ATTORNEY PAUL A. KSICINSKI 414-530-5214
ATTORNEY PAUL A. KSICINSKI
TOP 100 WISCONSIN CRIMINAL DEFENSE LAWYER
​414-530-5214
  • Home
  • References
  • PEER ENDORSEMENTS
  • PAST CASES
  • Blog
  • Contact
  • KNOW YOUR RIGHTS
  • How to deal with police
  • Practice Areas
  • About
  • Criminal Law Links
  • News

Discussion of current legal issues

Henry Nellum case selected by USA Network as a compelling homicide trial to keep an eye on in 2018

Button Text

COMING TO A CRIMINAL CASE NEAR YOU: THE FIFTH AMENDMENT PROTECTS YOU AGAINST THE GOVERNMENT FORCING YOU TO OPEN YOUR PERSONAL (COMPUTERIZED) DIARIES

7/20/2016

0 Comments

 
Picture

I have two younger sisters.  As we were growing up, at times I was a total pain to my one sister who kept a locked diary.  I was always trying to open the lock to the diary so I could read what she obviously said in secret.  At the time, I had not learned from our American history.

If I had looked closer I would have respected that American history has shown a deep respect for keeping communications secret.  Everyone from Jefferson and Madison to Abigail Adams tried to keep their communications secret.  The Founders used secret communications methods to deny information to those not intended to receive it and to act as a "secure seal." Ralph E. Weber, United States Diplomatic Codes and Ciphers, 1775-1938 88 (1979).  "As rebels and conspirators, the young nation's leaders ... turned to codes and ciphers in an effort to preserve the confidentiality of their communications.  One of the earliest acts of the Continental Congress was to order that its Committee handling foreign correspondence use "cyphers." Ralph E. Weber, Masked Dispatches: Cryptograms and Cryptology in American History, 1775-1900 5-6 n.6. (1993). “During the Revolutionary period cipher was employed extensively not only in public correspondence where secrecy was especially important but in the private correspondence of public men as well."  Edmund Cody Burnett, Ciphers of the Revolutionary Period, 22 American Historical Review 329 (1917).  "In the years after 1780, Jefferson, James Madison, James Monroe, and a covey of other political leaders in the United States often wrote in code in order to protect their personal views on tense domestic issues confronting the American nation. Employing many codes and a few ciphers, they sought safety for their dispatches: they built security fences to protect their correspondence from political rivals and American postal officials.”  ,Masked Dispatches: Cryptograms and Cryptology in American History, at 6.

Hit the fast forward button to move us to the present and people continue to do today what was done yesterday:  communicate in secret.  As always, the government says it has legitimate reasons to snoop into a citizen’s personal business.  For instance, in In re Grand Jury Subpoena Duces Tecum (Doe), 670 F.3d 1335 (11th Cir. 2012).  A grand jury issued a subpoena commanding Doe to decrypt and produce data from the laptop computers and hard drives, and Doe informed the US attorney that he refused to comply because doing so would violate his Fifth Amendment privilege against self-incrimination.  Recall that the Fifth Amendment protects the accused against perjury, contempt, or providing evidence against themselves.  Akhil R. Amar & Renee B. Lettow, Fifth Amendment First Principles: The Self-Incrimination clause, 93 MICH. L. REV. 857, 890 (1995).  Moreover, protects for the dignity of an individual's private thoughts from government invasion.  Michael Dann, The Fifth Amendment Privilege Against Self-Incrimination: Extorting Physical Evidence from a Suspect, 43 S. CAL. L. REV. 597, 611 (1970).  The prosecutor tried to end run the Fifth Amendment protections by getting a trial court order that granted Doe immunity for production of the data. However, the immunity was limited to the act of producing the data; in other words, the government could make “derivative use” of the data in a criminal prosecution of Doe. 
 
The Eleventh Circuit held that the act of decryption and production would constitute testimony, which would implicate the Fifth Amendment. The Eleventh Circuit also held that the trial judge “erred in limiting [Doe’s] immunity . . . to the Government’s use of his act of decryption and production, but allowing the Government derivative use of the evidence such act disclosed.” Doe, 670 F.3d at 1341.  In reaching this decision, the Doe court explained that “even if the decryption and production of the contents of the hard drives themselves are not incriminatory, they are a “link in the chain of evidence” that is designed to lead to incriminating evidence; this is sufficient to invoke the Fifth Amendment privilege. Hoffman v. United States, 341 U.S. 479, 486, 71 S. Ct. 814, 818, 95 L. Ed. 1118 (1951) (“The privilege afforded [by the Fifth Amendment] not only extends to answers that would in themselves support a conviction under a federal criminal statute but likewise embraces those which would furnish a link in the chain of evidence needed to prosecute.”  In re Grand Jury Subpoena Duces Tecum (Doe), at note 15.  Citing Curcio v. United States, 354 U.S. 118, 128, 77 S. Ct. 1145, 1151 (1957), the Doe court explained that an act of production is testimonial when “the government compels the individual to use ‘the contents of his own mind’ to explicitly or implicitly communicate some statement of fact.”  Under this test, “the decryption and production would be tantamount to testimony by Doe of his knowledge of the existence and location of potentially incriminating files; of his possession, control, and access to the encrypted portions of the drives; and of his capability to decrypt the files.”  Doe, at 1346. 
 
Finally, the Eleventh Circuit stated that the district court could have compelled decryption if it had offered "constitutionally sufficient immunity" and the government had shown that the accused was actually capable of decrypting the drive.  Id. at 1349–50.  Referring to the landmark case of Kastigar v. United States, 406 U.S. 441 (1972) the Eleventh Circuit noted that to be constitutionally sufficient, the immunity must be "co-extensive with the scope of the privilege."  Id. at 1350–51.  Although not mentioned by the Eleventh Circuit here, the finding that a password was testimonial has also been reached by district courts. See e.g. U. S. v. Kirschner, 823 F. Supp. 2d 665 (E.D. Mich. 2010). In Kirschner, the accused was subpoenaed to testify and provide his passwords to a grand jury. Id. at 666. The court found that the passwords were testimonial and therefore protected by the Fifth Amendment. Id. at 669.

0 Comments



Leave a Reply.

    Author

    These are reflections I have had about our criminal justice system.  Some of it may make sense, some of it might not.

    Archives

    March 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    February 2021
    January 2021
    November 2020
    October 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    October 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014

    Categories

    All

    RSS Feed

Proudly powered by Weebly