[Orin Kerr] Thoughts on the Third Circuit’s decryption and self-incrimination oral argument
The Volokh Conspiracy 2016-09-18
Summary:
I have blogged before about the Third Circuit’s pending case on the Fifth Amendment limits of ordering a suspect to decrypt his hard drive by entering in the password. The court heard argument in the case Wednesday, and the oral argument recording has been posted on the court’s website.
Here are six thoughts on the argument, in no particular order:
1. Judge Jordan repeatedly pushed counsel to articulate if there was anything testimonial about entering in a password beyond the implicit statement, “I know the password.” The lawyers couldn’t come up with anything, although their answers weren’t as direct on this as they could have been. To my mind, Jordan correctly identified the key to the case and the way to resolve it: Because the only testimonial aspect of entering in a password is knowledge of the password, there is no Fifth Amendment bar to an order to enter in the password if the defendant’s knowledge of the password is a foregone conclusion. Whether the defendant knew what files are on the hard drive is irrelevant, as the act of entering in the password does not imply any statements about that. Near the end of the argument, Judge Nygaard chimed in with short comment that suggested to me he probably agreed with that approach (although it was a short comment, so it’s not clear).
2. Judge Vanaskie’s questioning focused on whether the government would use evidence of crime outside the scope of the warrant if it gets access to the plaintext. He wanted to know if the government would waive reliance on the plain view exception, and he expressed concern that the government could use the power to search the hard drive to obtain other evidence. On one hand, I agree with Judge Vanaskie that this is a major problem. I have written articles here and here arguing that the plain view exception shouldn’t be allowed in computer search cases (or, as I later updated the idea, that there should be use restrictions on computer searches). Judge Vanaskie, who himself lectures on computer crime investigations, is right to be concerned about the issue. With that said, I agree with DOJ’s lawyer, Nathan Judish, that the scope of plain view is a separate Fourth Amendment question that would have to be raised later, after a search occurs, rather than now when the government is seeking to decrypt the hard drive.
3. Counsel for the defendant argued that entering in a password is blocked by the Fifth Amendment because it is like being forced to translate all of the contents of the hard drive. Even assuming the Fifth Amendment would bar the compelled translation of the contents of the hard drive, I don’t think the analogy works. If you are compelled to translate a document, your implicit testimony includes a few things: you generally know the language that is being translated; you can read that language; you can read, understand, and translate the specific words used; and you would translate them in the specific way you are suggesting is best. None of that is implicit testimony with entering in a password. Entering in a password that unlocks the password only says, “I know the password.” It doesn’t say anything about understanding how decryption works. The fact that the process by which the plaintext appears involves essentially “making” the plaintext from ciphertext is irrelevant to the Fifth Amendment. The Fifth Amendment issue is only about what you had to say, not about what other people or machines did in response to what you had to say.
4. There was some discussion of whether, if the government wins and the defendant enters in the password, prosecutors could tell the jury about how the defendant decrypted the hard drive. DOJ’s Judish acknowledged that there may be Fifth Amendment problems with that, and he explained that the government would not plan to tell the jury about the defendant’s act. I think the DC Circuit’s dicta in In re Sealed Case is relevant here:
If, moreover, the Government attempts to introduce at trial the Witness’ production of the companies’ records to prove the existence or authenticity of the documents or his possession or control of them, instead of introducing independent evidence to the same effec