As I explained in that post, Sebastien Boucher was crossing the border from Canada into the United States when a Customs inspector flagged his laptop for further inspection. The inspector saw files on the laptop that he believed contained child pornography.
The inspector and an Immigration and Customs Enforcement (ICE) agent looked at more files and then ran into a drive – the Z drive – they couldn’t access. At their request, Boucher opened the Z drive and the agent saw more of what he thought was child pornography. He arrested Boucher, seized the laptop and shut it down. He then got a warrant to search the laptop:
In the course of creating a mirror image of the contents of the laptop, however, the government discovered that it could not find or open the Z drive because it is protected by encryption algorithms from the computer software `Pretty Good Protection,’ which requires a password to obtain access. The government is not able to open the encrypted files without knowing the password. In order to gain access to the Z drive, the government is using an automated system which attempts to guess the password, a process that could take years.In re Boucher, 2009 WL 424718 (U.S. District Court for the District of Vermont).
As I explained in my last post, the government (a U.S. Department of Justice prosecutor) got a grand jury to subpoena Boucher and order him to produce the password needed to access the Z drive on his laptop. Boucher took the 5th Amendment and refused to comply; he argued that requiring him to produce the password would in effect require him to give testimony that could incriminate him.
As I explained in my earlier post, his argument was based on an aspect of the 5th Amendment privilege against self-incrimination that lets you take the 5th Amendment as the basis for refusing to produce evidence – computer files, a gun, any kind of physical evidence – that can be used to convict you of a crime. As I also explained, the U.S. Magistrate who had to decide whether to enforce the grand jury subpoena agreed with Boucher; the Magistrate said he could claim the 5th Amendment privilege and refuse to give up the encryption key . . . which essentially meant that the evidence on the laptop was beyond the government’s reach.
I was sure the U.S. Department of Justice would appeal the ruling, and it did. Since a U.S. Magistrate issued the ruling, the first step in appealing it was to ask the U.S. District Judge who supervises the Magistrate to decide whether the Magistrate was correct.
As I said last time, I think the U.S. Magistrate got it exactly right. Basically, the government wanted to do the same thing it tried in the Webster Hubbell case: While Hubbell was in jail on other charges, the Department of Justice served him with a grand jury subpoena that ordered him to produce lots of documents to the grand jury. U.S. v. Hubbell, 530 U.S. 27 (2000). Hubbell took the 5th Amendment and refused to produce them, making the same argument Boucher made: that producing the evidence would incriminate him.
To get around Hubbell’s invoking the privilege, the U.S. Department of Justice gave him immunity, which stripped him of his 5th Amendment privilege with regard to what the subpoena ordered him to do, so he produced the documents. Since he produced the documents under a grant of immunity, the government could not use his act of producing them or the contents of the documents against him. But the Department of Justice went through the documents and used what they found in them to charge Hubbell with new crimes. Hubbell moved to dismiss the charges, arguing that the government violated his 5th Amendment privilege; he said the government basically tricked him into producing the documents on the understanding they would not be used against him. Since they were used against him, Hubbell argued that what the Justice Department did violated his 5th Amendment privilege, and the U.S. Supreme Court agreed. It upheld the U.S. District Court’s granting the motion to dismiss the charges, so Hubbell walked. U.S. v. Hubbell, supra.
Boucher relied on the same principle. And like Hubbell, he is (IMHO) entitled to take the 5th Amendment privilege against self-incrimination as the basis for refusing to give the government the password for the Z drive. As I pointed out in my earlier post, the government could give him immunity for the act of producing it, but that would mean they couldn’t use any of the files on the laptop . . . which would make it impossible to prosecute him for the child pornography – if any – found on it. So there'd be no point in proceeding, from the government's perspective.
I suspect the federal prosecutors knew Boucher’s argument was valid . . . which is why they modified the grand jury subpoena before they asked the U.S. District Court Judge to decide whether the U.S. Magistrate’s opinion should stand. Instead of ordering Boucher to produce the Department of Justice had the subpoena modified so that now
it does not . . . seek the password for the encrypted hard drive, but requires Boucher to produce the contents of his encrypted hard drive in an unencrypted format by opening the drive before the grand jury. In oral argument and post-argument submissions, the Government stated that it intends only to require Boucher to provide an unencrypted version of the drive to the grand jury.In re Boucher (2009), supra. Why did they do this? Well, I still think it doesn’t work, but it gave the prosecution a new argument.
As I explained in my earlier post, the Supreme Court has held that you can take the 5th Amendment when your act of producing evidence tells the government something it doesn’t already know. If you’re telling the government something it doesn’t already know, you’re testifying; if you’re just giving the government something it already knows you have and knows about, you’re not testifying. You’re just handing over physical evidence. The Department of Justice modified the Boucher subpoena to try to bring it within that loophole: handing over physical evidence instead of testifying.
The U.S. District Court Judge bought the argument. The Supreme Court has held that an essential part of telling the government something it doesn’t know (testifying) is authenticating the evidence you hand over. So, say a grand jury subpoenas me and orders me to “produce the gun you used to kill John X.” If I show up and hand over a gun, I’m implicitly testifying that yes, I have the gun and this gun I’m giving you is in fact the gun I used to kill John X. If the subpoena tells me to produce “the Taurus 38 caliber revolver serial # 3810384 you used to kill John X,” then I’m not telling the government anything when I produce the gun. The existence of the gun and the fact I have it and used it to kill John X are a “foregone conclusion.”
Getting back to Boucher, the Justice Department argued that by ordering him to produce an unencrypted version of the Z drive on his laptop, it wasn’t requiring him to testify:
Boucher accessed the Z drive of his laptop at the ICE agent's request. The ICE agent viewed the contents of some of the Z drive's files, and ascertained that they may consist of images or videos of child pornography. The Government thus knows of the existence and location of the Z drive and its files. Again providing access to the unencrypted Z drive “adds little or nothing to the sum total of the Government's information” about the existence and location of files that may contain incriminating information.In re Boucher (2009), supra. So the U.S. District Court judge denied Boucher’s motion to quash the grand jury subpoena (make it go away) and ordered him “to provide an unencrypted version of the Z drive viewed by the ICE agent” to the grand jury. In re Boucher (2009), supra.
Boucher's act of producing an unencrypted version of the Z drive likewise is not necessary to authenticate it. He has already admitted to possession of the computer, and provided the Government with access to the Z drive. The Government has submitted that it can link Boucher with the files on his computer without making use of his production of an unencrypted version of the Z drive, and that it will not use his act of production as evidence of authentication.
Where does that leave Boucher? He has two choices: comply with the subpoena and give the grand jury an unencrypted (and unaltered) copy of the Z drive; or appeal the U.S. District Judge’s opinion.
If he turns over the drive, he may be prosecuted for, and convicted of, possessing child pornography. If he appeals, he might win; I think he would have a good shot at winning because I don’t buy the government’s position that producing an unencrypted version of the drive isn’t testimony within the 5th Amendment privilege. The issue isn’t producing the password; the issue is producing the drive and the contents of the drive.
The problem for Boucher is that since the U.S. District Judge has held that he can’t invoke the 5th Amendment, he’ll be held in contempt if he does not provide the grand jury with unencrypted version of the Z drive by the date specified on the subpoena. That means he’ll be held in civil contempt. As I explain to my students, when you’re held in civil contempt for failure to comply with a grand jury subpoena, you sit in jail until you are either willing to comply or can persuade a Court of Appeals to hold that you can, in fact, invoke the 5th Amendment and refuse to comply with the subpoena. Getting a case to and through the Court of Appeals could take a year, or two, at least (it took over a year for the government to get the U.S. District Court Judge to review the Magistrate’s order).
Selfishly, I hope Boucher takes the issue to the Court of Appeals because I think the 5th Amendment should protect encrypted files and I’d like to see that issue resolved. But I don’t have to sit in jail for a long time to see that happen.