FILED
Aug 21 2018, 9:51 am
CLERK
Indiana Supreme Court
Court of Appeals
and Tax Court
ATTORNEYS FOR APPELLANT ATTORNEYS FOR APPELLEE
William J. Webster Curtis T. Hill, Jr.
Carla V. Garino Attorney General of Indiana
Webster Legal, LLC Ellen H. Meilaender
Westfield, Indiana Supervising Deputy Attorney General
Indianapolis, Indiana
IN THE
COURT OF APPEALS OF INDIANA
Katelin Eunjoo Seo, August 21, 2018
Appellant-Defendant, Court of Appeals Case No.
29A05-1710-CR-2466
v. Appeal from the Hamilton
Superior Court
State of Indiana, The Honorable Steven R. Nation,
Appellee-Plaintiff. Judge
Trial Court Cause No.
29D01-1708-MC-5640
Mathias, Judge.
[1] Smartphones are ubiquitous in modern life. See Riley v. California, ___ U.S. ___,
134 S. Ct. 2473, 2484 (2014) (“[M]odern cell phones, . . . are now such a
pervasive and insistent part of daily life that the proverbial visitor from Mars
might conclude they were an important feature of human anatomy.”). The
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 1 of 68
amount of personal information contained on a typical smartphone is
astounding: photographs, contacts, emails, text messages, not to mention the
personal information that is contained in widely used smartphone social-media
applications such as Facebook, Instagram, LinkedIn, or Twitter. United States v.
Wurie, 728 F.3d 1, 7 (1st Cir. 2013) (noting that “[I]nformation [contained on a
modern cell phone] is, by and large, of a highly personal nature: photographs,
videos, written and audio messages (text, email, and voicemail), contacts,
calendar appointments, web search and browsing history, purchases, and
financial and medical records.”). Indeed, a modern smartphone is a
“telephone” only as a small part of its many functions. It is more accurately
described as a mobile computing and communications device with abilities that
were dreams in the realm of science fiction only a few decades ago.
[2] Thus, when the State seeks to search a smartphone, it seeks to inquire into far
more than “old-fashioned” information physically contained on paper. In truth,
nearly every smartphone contains data stored and arranged in such a way as to
uniquely reveal the innermost thoughts of its owner. A smartphone is a trove of
extremely personal information that is almost always embarrassing, and
potentially, incriminating. A modern smartphone, with its central purpose of
connecting its owner to the Internet and its ability to store and share incredible
amounts of information in “the Cloud” of online storage, is truly as close as
modern technology allows us to come to a device that contains all of its owner’s
conscious thoughts, and many of his or her unconscious thoughts, as well. So,
when the State seeks to compel a person to unlock a smartphone so that it may
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 2 of 68
search the phone without limitations, the privacy implications are enormous
and, arguably, unique. Cf. United States v. Otero, 563 F.3d 1127, 1132 (10th Cir.
2009) (“The modern development of the personal computer and its ability to
store and intermingle a huge array of one’s personal papers in a single place
increases law enforcement’s ability to conduct a wide-ranging search into a
person’s private affairs[.]”).
[3] In the present case, the Hamilton Superior Court issued a search warrant
ordering Katelin Eunjoo Seo (“Seo”) not only to produce her smartphone,1 but
also to permit the State to search Seo’s smartphone without limitation. Seo
refused to unlock the phone, citing her right against self-incrimination under the
Fifth Amendment to the Constitution of the United States (“Fifth
Amendment,” and “Constitution,” respectively), and the State sought to hold
her in contempt for her refusal to unlock the phone. The trial court agreed with
the State and held Seo in contempt for refusing to unlock her phone. Seo
appeals and argues that the trial court’s order requiring her to unlock her phone
violated the guarantee against self-incrimination contained in the Fifth
Amendment. We agree. Accordingly, we reverse the trial court’s order finding
Seo in contempt and remand for proceedings consistent with this opinion, with
1
The dissent claims that we “unnecessarily” hold that “a passcode is the equivalent of a combination to a
wall safe,” because the trial court did not ask Seo to reveal her password. Slip op., infra, at 55–56. The trial
court’s warrant and order, however, require Seo to unlock, and thereby decrypt, her phone. And the only
way to unlock and decrypt the phone is for Seo to enter her passcode into the phone. As explained infra, we
conclude that there is no meaningful difference between forcing Seo to reveal her passcode and forcing her to
input her passcode into her phone and then handing it over to the police. Thus, we do not share the dissent’s
belief that our holding is unnecessary.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 3 of 68
specific guidelines as to the reasonable specificity that prosecutors should show
concerning the information sought in such an instance.
Facts and Procedural History
[4] In July 2017, Seo contacted the Hamilton County Sheriff’s Department
(“HCSD”) claiming to be a victim of a rape committed by D.S. HCSD
Detective Bill Inglis (“Detective Inglis”) investigated Seo’s allegations. As part
of his investigation, Seo allowed Detective Inglis to view her smartphone, an
Apple iPhone 7 Plus. With Seo’s consent, Inglis also did a “forensic download”
of the contents of Seo’s iPhone and returned it to her. Tr. p. 6.
[5] After reviewing the contents of Seo’s iPhone, Inglis decided not to pursue any
charges against D.S. Instead, based on the contents of the phone and D.S.’s
statements, Inglis began to investigate Seo for stalking and harassing D.S.
When questioned, D.S. explained to Inglis that he received numerous calls and
text messages from Seo’s phone, up to thirty per day. At some point, however,
the phone number of the sender of these messages and calls began to change
daily, yet the conversations were linked and apparently sent by the same
person. Inglis suspected that Seo was using a third-party application to change
her phone number.2
2
Detective Inglis mentioned two apps that could be used to change the caller’s cellphone number: Google
Voice and “Pinger,” Tr. p. 8, the latter apparently a reference to the “Text Free Calling” app by Pinger, Inc.,
both of which are available for download on the Apple App Store for iPhones.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 4 of 68
[6] On July 19, 2017, the State charged Seo with Level 6 felony stalking, Class A
misdemeanor intimidation, Class A misdemeanor theft, and Class B
misdemeanor harassment. The information alleged that Seo had stalked and
harassed D.S. with the intent to get him to either marry her or impregnate her
against his will. The police arrested Seo at her place of employment that same
day. At the time of her arrest, Seo had in her possession a bag that contained an
iPhone and an iPad tablet. Seo admitted that the phone was hers but claimed
that the iPad belonged to someone else. The iPhone appeared to be the same
one she had earlier provided to the police, and the number for the iPhone
matched that of the phone used to make the earlier calls and send the text
messages to D.S. The police took possession of Seo’s iPhone at this time.
[7] On July 21, 2017, the State charged Seo under a new cause with thirteen counts
of Class A misdemeanor invasion of privacy, alleging that Seo violated a
protective order preventing her from contacting D.S. On August 8, 2017, the
State applied for and was granted a warrant to search Seo’s iPhone. Because
Seo’s iPhone is locked, the State also sought that same day a warrant and order
compelling her to unlock her iPhone so that police could search it. The trial
court issued a warrant providing in relevant part:
WHEREAS, William Inglis of the Hamilton County Sheriff’s
Department has given sworn probable cause testimony for
issuance of a Search Warrant. Based on that testimony, the Court
finds probable cause exists for issuance of this Search Warrant.
You are, therefore, authorized and ordered in the name of the
State of Indiana, with necessary and proper assistance, in the
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 5 of 68
daytime or nighttime, to search the property located at and
identified as:
5. for the purpose of searching items described in the sworn
evidence, to wit:
That Katelin Eunjoo Seo be compelled to unlock (via
biometric fingerprint passcode, password or otherwise) the I
Phone [sic] 7 plus with serial number ************ and
cellular phone number ******* pursuant to Indiana Code 35-
33-5-11(a) and that if she fails to comply with this order, that
she be subject to the contempt powers of the court.
You are further authorized to deliver any of said items to an
appropriate facility for analysis and comparison against other
evidence gathered in the investigation.
Appellant’s App. p. 49.3
[8] On August 15, 2017, Seo, now represented by counsel, notified the State that
she would not comply with the order to unlock the phone. Accordingly, the
State filed a motion that same day for a rule to show cause why Seo should not
be held in contempt. The trial court held a hearing on the matter on September
21, 2017. At the conclusion of the hearing, the trial court entered an order
finding Seo in contempt, which reads in relevant part as follows:
1. The State requested and the Court granted a search warrant
for the contents of the phone at issue (iPhone 7 plus bearing
serial number ************, previously connected with
number **********) under cause number 29D01-1708-MC-
3
The probable cause affidavit supporting the issuance of this search warrant is not in the record before us.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 6 of 68
5624, and the Court took Notice of such cause for the purpose
of ruling in this cause.
2. The State requested and the Court granted a search warrant
compelling the Defendant to unlock the phone by biometric
fingerprint access, keycode, password, passcode, or otherwise
under cause number 29D01-1708-MC-5640.
3. The Court finds that the statutory requirements as found in
Ind. Code 35-33-5-11 have been satisfied in this cause.
4. The act of unlocking the phone does not rise to the level of
testimonial self-incrimination that is protected by the Fifth
Amendment of the United States Constitution or by Article 1,
Section 14 of the Indiana Constitution.
5. Katelin Eunjoo Seo is found to be in contempt of Court for
failure to abide by the warrant issued under this cause: 29D0l-
1708-MC-5640.
IT IS THEREFORE ORDERED, ADJUDGED AND
DECREED as follows:
1. That Katelin Eunjoo Seo is ORDERED incarcerated in the
Hamilton County Jail and she shall surrender herself at the
Hamilton County Jail no later than 4:30 p.m. on today’s date,
Friday, September 22 unless and until she purges herself of
Contempt of Court.
2. That in order to purge herself of Contempt of Court, Katelin
Eunjoo Seo is ORDERED to unlock the phone at issue and to
(1) disable the passcode function on the phone, or (2) to
change the passcode on the phone to 1234.
Appellant’s App. pp. 6–7 (emphases in original).
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 7 of 68
[9] The same day that the trial court entered its contempt order, Seo filed a motion
to stay the contempt sanction pending appeal, which the trial court granted on
September 25, 2017. Seo filed a notice of appeal on October 20, 2017.4
I. Standard of Review
[10] The determination of whether a party is in contempt of court is a matter within
the sound discretion of the trial court. Jones v. State, 847 N.E.2d 190, 199 (Ind.
Ct. App. 2006), trans. denied. However, here, the question is whether forcing
Seo to unlock her phone or reveal her password is a violation of her Fifth
Amendment right against self-incrimination, and this is a pure question of law
that is reviewed de novo. See United States v. Neighbors, 590 F.3d 485, 492 (7th
Cir. 2009) (holding that the question of whether voice identification based on
in-court proceedings for a criminal defendant violated his Fifth Amendment
right against self-incrimination was a question of law reviewed de novo); Conn v.
State, 89 N.E.3d 1093, 1097 (Ind. Ct. App. 2017) (noting that pure questions of
law are reviewed de novo), trans. denied.
II. Encryption
[11] Because this case involves the technical aspects of locking and unlocking a
modern smartphone, and the current caselaw considers the method of
unlocking that information somewhat dispositive as to whether unlocking can
4
We held oral argument on this case on May 1, 2018. We commend counsel for the quality of their written
and oral advocacy.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 8 of 68
be coerced, a brief overview of the underlying technology is in order. One law
review note succinctly summarizes encryption as follows:
Encryption is the process of concealing information, and all such
systems have several similar characteristics. At its most basic
level, encryption involves transforming information or data,
called “plaintext,” into a coded form that cannot be understood
by outsiders. The process is performed according to the
encryption algorithm, a set of rules that governs how the
plaintext is transformed. While this can be as simple as
substituting each letter in a message with a corresponding
number, modern encryption algorithms often consist of a
complex series of mathematical functions. Regardless of the
manner of encryption, the result is that the plaintext is made
unintelligible to outsiders.
Andrew J. Ungberg, Protecting Privacy Through a Responsible Decryption Policy, 22
Harv. J.L. & Tech. 537, 540 (2009) (citation footnotes omitted).5 Another
commentator further explains:
When . . . [data] is encrypted using current technology an
“encryption key” is required to decrypt the message. An
encryption key is basically a very long string of numbers that is
stored in the encryption software’s memory. The software users
do not have to remember this long number; instead [they] can
enter a more easily remembered password or passphrase, which
in turn activates the encryption key. When the government seeks
to compel an ordinary citizen to turn over the means by which he
5
For a more detailed look at encryption and possible ways to defeat encryption, see Orin S. Kerr and Bruce
Schneier, Encryption Workarounds (March 22, 2017), 106 Geo. L.J. 989 (2018).
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 9 of 68
can decrypt the data, the disclosure order will typically compel
him to turn over his password rather than the encryption key.
Michael Wachtel, Give Me Your Password Because Congress Can Say So, 14 U. Pitt.
J. Tech. L. & Pol’y 44, 48 (2013) (citations and quotations omitted).
III. iPhone Security6
[12] The iPhone 7 Plus at issue here is locked, and therefore, the contents of the
phone are encrypted. See Apple, iOS Security p. 14 (Jan. 2018).7 That is, even if
the digital contents of the phone’s storage could be extracted from the phone,
those contents would still be undecipherable without also unencrypting the
contents.
[13] The contents of the iPhone 7 series are encrypted with a strong 256-bit AES
encryption key.8 Instead of requiring each user to memorize a 256-bit key, the
key is instead itself encrypted with a “system key” unique to each phone, plus
6
The discussion that follows is focused on the smartphone at issue in this case, an iPhone 7 Plus. However,
the substance of the discussion also applies to smartphones manufactured under other brand names,
generally, and, in some instances, specifically.
7
https://www.apple.com/business/docs/iOS_Security_Guide.pdf
8
AES stands for “Advanced Encryption System.” Realnetworks, Inc. v. DVD Copy Control Ass’n, 641 F. Supp.
2d 913, 927 (N.D. Cal. 2009). A 256-bit AES encryption key is almost unfathomably strong because there are
2256 possible keys. 2256 is approximately equivalent to 1077. By way of comparison, scientists estimate that
there are 1086 (one-hundred thousand quadrillion vigintillion) atoms in the entire universe. See John Carl
Villanueva, How Many Atoms Are There in the Universe? (Apr. 22, 2018),
https://www.universetoday.com/36302/atoms-in-the-universe/. Thus, guessing a 256-bit key is effectively
impossible. See Kerr & Schneier, supra at 994 (noting that cracking a 256-bit key is “beyond the reach of any
foreseeable computer technology,” thus rendering a “brute force” repeated guessing of the key “effectively
impossible.”). But the implementation of an encryption system may contain errors that allow someone to
bypass this seemingly unbreakable security. Id. at 1005–06.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 10 of 68
the user-chosen passcode. Id. When a user enters her passcode, this is combined
with the system key to unlock the “File System Key,” which is used to decipher
the contents of the phone.9 Id.
[14] Thus, each time a user unlocks her phone, she is enabling the phone to recreate
all of the information on the phone, taking what was once indistinguishable
from random noise and deciphering it into the requested data. See Jeffrey Kiok,
Missing the Metaphor: Compulsory Decryption and the Fifth Amendment, 24 B.U.
Pub. Int. L.J. 53, 59 (2015) (discussing the process of on-the-fly encryption and
decryption).
9
More precisely, a file written to the storage on the iPhone can be of one of four different “Data Protection
Classes,” as assigned by the app that creates it. Apple, iOS Security p. 15. Files that are in the “Complete
Protection” class are protected by a class key derived from the user passcode and the phone’s unique
identifier (“UID”). “Shortly after the user locks a device . . . the decrypted class key is discarded, rendering
all data in this class inaccessible until the user enters the passcode again or unlocks the device using Touch
ID or Face ID.” Id. Files created in the “Protected Unless Open” class are those that need to be written even
when the device is locked, such as an email attachment downloading in the background. Id. at 16. Such files
are encrypted using a per-file asymmetric key, and the public key is stored with the encrypted per-file key. Id.
When a file in this class is closed, the per-file key is wiped from memory. Id. “To open the file again, the
shared secret is re-created using the Protected Unless Open class’s private key and the file’s ephemeral public
key, which are used to unwrap the per-file key that is then used to decrypt the file.” Id.
The third class is the “Protected Until First User Authentication.” Id. “This class behaves in the same way as
Complete Protection, except that the decrypted class key isn’t removed from memory when the device is
locked.” Id. Instead, the key is removed only on reboot. Id. “The protection in this class has similar properties
to desktop full-volume encryption, and protects data from attacks that involve a reboot.” Id. This is the
default class for all third-party app data not otherwise assigned to a Data Protection class.
The final class is “No Protection,” and is protected only with the UID. Id. “Since all the keys needed to
decrypt files in this class are stored on the device, the encryption only affords the benefit of fast remote wipe.”
Id. However, “[i]f a file isn’t assigned a Data Protection class, it is still stored in encrypted form (as is all data
on an iOS device).”
In the present case, there is nothing in the record to indicate which app created the information sought by the
State, nor under which Data Protection class the data sought falls within.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 11 of 68
[15] Randomly guessing the passcode (a “brute force” attack) can be automated and
accomplished at mind-boggling speeds by modern computers. See Paul Roberts,
Update: New 25 GPU Monster Devours Passwords in Seconds, Security Ledger (Dec.
4, 2012, 19:12) (reporting on a password-guessing cluster of computer graphics
cards that can guess 348 billion password hashes per second).10 But such brute
force attacks are difficult because of the iPhone’s software security features,
which incrementally increases the time allowed between such guesses. Apple,
iOS Security p. 15. This eventually allows only one guess every hour, or,
depending upon the settings of the phone, wipes the contents of the phone after
ten incorrect guesses, making repeated guessing of the password impractical.
[16] Thus, if the police want or need to gain access to an iPhone, the cooperation of
its owner is practically a necessity. But if the owner of the smartphone is
unwilling to cooperate with the police, then the police are faced with fewer
options. One of these options has been to attempt to bypass the encryption via
some error in the implementation of the encryption. The other has been to use
the power of the courts to compel the owner to unlock the phone. This case
presents the question of when the owner of the phone may refuse to cooperate
with the police based upon her rights not to incriminate herself found in the
U.S. Constitution.
10
https://securityledger.com/2012/12/new-25-gpu-monster-devours-passwords-in-seconds/
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 12 of 68
IV. The Fifth Amendment and Testimony
[17] Seo claims that the trial court’s order compelling her to unlock her phone11
violates her right under the Fifth Amendment12 not to be a witness against
herself. This appears to be a case of first impression in Indiana.
[18] The Self-incrimination Clause of the Fifth Amendment provides that “[n]o
person . . . shall be compelled in any criminal case to be a witness against
himself[.]” U.S. Const. amend. V. This constitutional safeguard is applicable to
state criminal cases by way of the Fourteenth Amendment. Bleeke v. Lemmon, 6
N.E.3d 907, 925 (Ind. 2014) (citing Withrow v. Williams, 507 U.S. 680, 688–89
(1993)). The Fifth Amendment prohibits compelled testimony that is
incriminating. Id. (citing Hiibel v. Sixth Judicial Dist. Ct. of Nev., 542 U.S. 177,
190 (2004)). Thus, the government cannot force someone to provide a
communication that is “testimonial” in character. In re Search Warrant
11
We take judicial notice that Seo’s iPhone 7 Plus is equipped with what Apple refers to as “Touch ID,” a
biometric fingerprint sensor that can be used to unlock the phone, instead of a typed-in password. See iPhone
7 Technical Specifications, https://www.apple.com/iphone-7/specs/ (last visited August 13, 2018); Apple,
iOS Security p. 7. The record is unclear as to which method of security Seo chose to use. See Tr. p. 9
(describing the phone as “locked,” but not indicating which method could be used to unlock it). However,
the search warrant applied to either method. See Appellant’s App. p. 49 (order compelling Seo to unlock her
phone “via biometric fingerprint, passcode, password, or otherwise[.]”).
12
Seo has yet to make any Fourth Amendment claim regarding the validity of the search warrant. Given the
early procedural posture of this case, we express no opinion as to the validity of the search warrant issued by
the trial court, as that issue has yet to be litigated in the first instance. We also note that Seo does not make
any separate argument under the anti-self-incrimination provision of the Indiana Constitution, other than to
mention the Indiana Constitution in her conclusion. We therefore focus our analysis solely on the Fifth
Amendment of the Constitution of the United States. See Holloway v. State, 69 N.E.3d 924, 931 (Ind. Ct. App.
2017) (noting that a defendant cannot invoke analysis of an issue under the Indiana Constitution without a
separate and independent analysis of the claim), trans. denied.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 13 of 68
Application for [redacted text], 279 F.Supp.3d 800, 803 (N.D. Ill. 2017) (citing
United States v. Hubbell, 530 U.S. 27, 34 (2000)).
[19] The Fifth Amendment privilege against self-incrimination reflects our nation’s
“fierce ‘unwillingness to subject those suspected of crime to the cruel trilemma
of self-accusation, perjury or contempt,’ that defined the operation of . . . [Great
Britain’s] Star Chamber, wherein suspects were forced to choose between
revealing incriminating private thoughts or forsaking their oath by committing
perjury.” Pennsylvania v. Muniz, 496 U.S. 582, 596 (1990) (quoting Doe v. United
States, 487 U.S. 201, 212 (1988) (“Doe II”)). Indeed, “[t]he Fifth Amendment
privilege against compulsory self-incrimination . . . protects ‘a private inner
sanctum of individual feeling and thought and proscribes state intrusion to
extract self-condemnation.’” Id. (quoting United States v. Nobles, 422 U.S. 225,
233 (1975)).
[20] To date, the United States Supreme Court has issued no opinion directly
addressing whether compelling a person to unlock a phone or provide a
passcode is testimonial.13 However, in a series of cases, the Court has explored
whether certain acts of producing documents can be testimonial for Fifth
Amendment purposes. Importantly, these cases span more than a century and
13
The Court has held that there is no Fifth Amendment problem with compelling a person to do something
that displays a physical characteristic that might be incriminating. See Hubbell, 530 U.S. at 35. Among the
compelled physical characteristics that have been held to be non-testimonial are fingerprints. Schmerber v.
California, 384 U.S. 757, 763–65 (1966)); United States v. Hook, 471 F.3d 766, 773–74 (7th Cir. 2006). This
reasoning is outdated and ironic when compared with the current, heightened, “state of the art” electronic
security provided by physical characteristics such as facial recognition and retinal scans.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 14 of 68
contain important developments during times when the internet and
smartphones did not exist.
[21] In the late 1800s, the Court held in Boyd v. United States, 116 U.S. 616, 633
(1886), that “[w]e have been unable to perceive that the seizure of a man’s
private books and papers to be used in evidence against him is substantially
different from compelling him to be a witness against himself.”14 In Fisher v.
United States, 425 U.S. 391 (1976), however, the Court backed away from its
earlier holding in Boyd, but never expressly overruled its prior holding. See
Fisher, 425 U.S. at 407 (stating that “[s]everal of Boyd’s express or implicit
declarations have not stood the test of time.”). Still, in Schmerber v. California,
384 U.S. 757, 763–64 (1966), the Court cited Boyd when holding that “[i]t is
clear that the protection of the [Fifth Amendment] privilege reaches an
accused’s communications, whatever form they might take, and the compulsion of
responses which are also communications, for example, compliance with a
subpoena to produce one’s papers.” (emphasis added).
[22] The Fisher Court proceeded to examine the question of what kinds of acts of
production are “testimonial.” Fisher involved two consolidated cases in which
the IRS served summonses on two attorneys, directing the attorneys to produce
documents obtained by their clients relating to tax returns. Both attorneys
argued inter alia that this would violate their clients’ rights against self-
14
See also Carpenter v. United States, 138 S. Ct. 2206, 2271 (2018) (Gorsuch, J., dissenting) (citing Richard A.
Nagareda, Compulsion “To Be a Witness” and the Resurrection of Boyd, 74 N.Y.U.L. Rev. 1575, 1605–23 (1999);
Rex v. Purnell, 96 Eng. Rep. 20 (K.B. 1748); Christopher Slobogin, Privacy at Risk 145 (2007)).
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 15 of 68
incrimination. The Court held that the Fifth Amendment privilege could apply
to situations where a defendant is compelled to produce incriminating evidence,
and that the act of producing even unprivileged evidence can have
communicative aspects itself and may be testimonial, entitling it to Fifth
Amendment protection. Id. at 409–10. Nevertheless, the Court noted that the
Government was “in no way relying on the ‘truth-telling’ of the taxpayer to
prove the existence of or his access to the documents,” and the production of
the documents did not authenticate the documents, because they had been
produced by accountants and not the taxpayers being investigated themselves.
Id. at 411.
[23] The Court further held that, because the existence, location, and authenticity of
the evidence sought was known to the government, the Fifth Amendment
privilege was inapplicable because the contents of the individual’s mind was not
used against him. See id. (“The existence and location of the papers are a
foregone conclusion and the taxpayer adds little or nothing to the sum total of
the Government’s information by conceding that he in fact has the papers.”).15
Thus, the Fifth Amendment privilege did not apply to the third-party
production of documents requested in Fisher. Id. at 414.
15
This is known as the “foregone conclusion” doctrine. Andrew T. Winkler, Password Protection and Self-
Incrimination: Applying the Fifth Amendment Privilege in the Technological Era, 39 Rutgers Computer & Tech. L.J.
194, 197 (2013). Many cases involving encryption have been decided under the foregone conclusion doctrine,
a doctrine outstripped by technology, as discussed in more detail below.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 16 of 68
[24] The Court in Doe II considered the legality of an order compelling the target of
a grand jury investigation to authorize foreign banks to disclose records of his
accounts. 487 U.S. at 202. The target of the investigation argued that
compelling him to sign the consent form would give the government access to
potentially incriminating records that would otherwise be unavailable to it, due
to the fact that the District Court had no power to order foreign banks to
produce the documents. Id. at 204. The Court rejected this argument and held
that “an accused’s communication must itself, explicitly or implicitly, relate a
factual assertion or disclose information.” Id. at 210.
[25] Justice John Paul Stevens dissented, and in its acknowledgement of his dissent,
the majority famously noted:
We do not disagree with the dissent that “[t]he expression of the
contents of an individual’s mind” is testimonial communication
for purposes of the Fifth Amendment. We simply disagree with
the dissent’s conclusion that the execution of the consent
directive at issue here forced petitioner to express the contents of
his mind. In our view, such compulsion is more like “be[ing] forced to
surrender a key to a strongbox containing incriminating documents”
than it is like “be[ing] compelled to reveal the combination to
[petitioner’s] wall safe.”
Id. at 210 n.9 (quoting id. at 219 n.1 (Stevens. J., dissenting) (emphasis added).
[26] Twelve years later, but before the advent of smartphones and a robust internet,
the Supreme Court again revisited this issue in United States v. Hubbell, 530 U.S.
27 (2000), a case that arose out of the Whitewater investigation. The target in
that case, Webster Hubbell, had pleaded guilty to charges of mail fraud and tax
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 17 of 68
evasion arising out of his billing practices. Id. at 30. In the plea agreement,
Hubbell promised to provide the Independent Counsel with “full, complete,
accurate, and truthful information” about matters relating to the Whitewater
investigation. Id.
[27] Later, while Hubbell was serving his twenty-one-month prison sentence, a
grand jury issued a subpoena duces tecum demanding the production of eleven
categories of documents. Id. at 31. Hubbell invoked his Fifth Amendment
privilege. Id. The Independent Counsel then produced an order from the
District Court directing Hubbell to comply with the subpoena and granting him
immunity against the government’s use and derivative use of the compelled
testimony. Id. Hubbell then delivered the specified documents and yet was
subsequently indicted again for various wire fraud, mail fraud, and tax crimes.
Id. The District Court dismissed this new indictment based on the violation of
the immunity previously granted. Id. at 32. The United States Court of Appeals
for the District of Columbia Circuit reversed and remanded, and the Supreme
Court granted certiorari.
[28] The Supreme Court, citing Fisher, reiterated that “a person may be required to
produce specific documents even though they contain incriminating assertions
of fact or belief because the creation of those documents was not ‘compelled’
within the meaning of the privilege.” Id. at 35–36. Accordingly, the simple fact
that the documents contained incriminating evidence did not mean that
Hubbell could avoid complying with the subpoena. Id. at 36.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 18 of 68
[29] Importantly, however, the Court made it clear that the very act of producing
documents in response to a subpoena may have a compelled testimonial aspect
in and of itself. Id. “The ‘compelled testimony’ that is relevant . . . is not to be
found in the contents of the documents produced in response to the subpoena. It
is, rather, the testimony inherent in the act of producing those documents.” Id. at 40
(emphasis added).
[30] In discussing the government’s subpoena, which had required the defendant to
provide numerous responses to very broad requests, the Court stated that “[t]he
assembly of those documents was like telling an inquisitor the combination to a
wall safe, not like being forced to surrender the key to a strongbox.” Id. at 43.
The Court then held that the “foregone conclusion” rationale did not apply to
overcome the testimonial aspects of Hubbell’s production of documents because
the government could not identify the files, describe what they were, tell
whether they existed, or whether Hubbell had knowledge of, possession of, or
access to them. See id. at 45 (“here the Government has not shown that it had
any prior knowledge of either the existence or the whereabouts of the 13,120
pages of documents ultimately produced by respondent.”). Only Hubbell’s
responses had provided the government with this information. See id. at 43 (“It
was unquestionably necessary for respondent to make extensive use of ‘the
contents of his own mind’ in identifying the hundreds of documents responsive
to the requests in the subpoena.”). The Court concluded that the Fifth
Amendment privilege did apply and that the grant of immunity extended to the
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 19 of 68
use and derivative use of the testimonial aspects of the production of those
documents. Id.
[31] We acknowledge that the United States Supreme Court has backtracked from
its earlier pronouncements that the protections afforded by the Fifth
Amendment, in addition to the Fourth Amendment, implicated privacy
concerns. Indeed, the Fisher Court noted that although it had “often stated that
one of the several purposes served by the constitutional privilege against
compelled testimonial self-incrimination is that of protecting personal privacy,”
it then held that “[w]e cannot cut the Fifth Amendment completely loose from
the moorings of its language, and make it serve as a general protector of
privacy—a word not mentioned in its text and a concept directly addressed in
the Fourth Amendment. We adhere to the view that the Fifth Amendment
protects against compelled self-incrimination, not [the disclosure] of private
information.” 425 U.S. at 399–401; see also United States v. Doe, 465 U.S. 605,
618 (1984) (“Doe I”) (O’Connor, J., concurring) (“The notion that the Fifth
Amendment protects the privacy of papers originated in Boyd [], but our
decision in Fisher [], sounded the death-knell for Boyd.”).
[32] Still, courts continue to acknowledge that the Fifth Amendment’s anti-self-
incrimination provision “protect[s] privacy in the sense of confidentiality.” See
Willan v. Columbia Cty., 280 F.3d 1160, 1163 (7th Cir. 2002). Thus, while we do
not consider the Fifth Amendment as a “general protector of privacy,” we
cannot ignore the privacy/confidentiality implications that compelled
revelation of a smartphone passcode would inevitably have based on the
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 20 of 68
extraordinary quantitative and qualitative differences between the amount of
digital information stored on a smartphone compared to traditional paper-
based media. See Section VI, infra. We believe that legal analysis of digital
information storage must change, and soon, in order to be relevant and
credible. See Section VI and Section VIII, infra.
V. The Testimonial Nature of a Passcode
[33] Under current, paper-based legal analysis, Seo argues that her passcode is
testimonial in nature, and that compelling her to reveal it, or compelling her to
unlock the phone using the passcode, would be a testimonial act that she cannot
be compelled to do without violating her Fifth Amendment privilege.
Contrasting the facts of the present case with those in Doe II, Seo notes that she
is being compelled to do more than merely sign a consent form to obtain
records from a third party; she is instead being compelled to reveal the contents
of her own mind—her password. She also argues that compelling her to reveal
her password is more invasive than just requiring her to assemble documents,
which was found to be testimonial in Hubbell. She is instead being compelled to
give the State access to the entire contents of her mobile phone, which in all
probability contains a wealth of digital information completely unrelated to the
focus of law enforcement needs in her case.
[34] The State contends that the Fifth Amendment is not implicated by the trial
court’s order because it does not compel Seo to reveal the password to the State;
it simply requires her to unlock the phone using her password (or other method)
and disable the password feature so that the State may continue to access it.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 21 of 68
Accordingly, the State argues, Seo need not reveal the password, and therefore
the “contents of her mind,” to the State at all. Therefore, according to the
State’s argument, the foregone conclusion doctrine from Fisher controls.
[35] Many courts that have considered this issue have held that forcing a person to
reveal their password is testimonial because, in the words of the Doe II Court, it
is “[t]he expression of the contents of an individual’s mind.” 487 U.S. at 210
n.9; see also United States v. Kirschner, 823 F.Supp.2d 665, 669 (E.D. Mich. 2010)
(holding that the government could not compel the defendant to reveal his
password because this amounted to “testimony” from him which would
“requir[e] him to divulge through his mental processes his password.”); Kiok,
supra at 76 (“Because a password comes from a defendant’s mind, its revelation
is testimonial.”).
[36] Indeed, when addressing Justice Stevens’s dissent in Doe, the majority of the
Court noted that compelling the defendant in that case to sign the bank
disclosure forms was more akin to “be[ing] forced to surrender a key to a
strongbox containing incriminating documents” than it was to “be[ing]
compelled to reveal the combination to [petitioner’s] wall safe.” 487 N.E.2d at
210 n.9. Here, under precedent as it now exists, we hold that the State is
seeking the electronic equivalent to a combination to a wall safe—the passcode
to unlock the iPhone.
[37] Moreover, some courts appear to have rejected the State’s attempt to
distinguish between compelling a defendant to reveal the passcode versus
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 22 of 68
merely compelling the defendant to unlock the phone herself and give the State
access to the unlocked phone. As summarized by one commentator:
But what about forcing you to enter a password? Is this a
compellable physical act? Three courts have answered no. In
their view, forcing a person to use a password to decrypt a hard
drive is not a physical act because it forces the person to use the
contents of his mind. Also prevalent in these courts’ reasoning is
the key-combination dicta already discussed: “A password, like a
combination, is in the suspect’s mind, and is therefore testimonial
. . . .”
Dan Terzian, The Micro-Hornbook on The Fifth Amendment and Encryption, 104
Geo. L. J. Online 168, 171–72 (2016).
[38] The three cases Terzian refers to are: In re Grand Jury Subpoena Duces Tecum
Dated March 25, 2011, 670 F.3d 1335, 1346 (11th Cir. 2012), which held that
“the decryption and production of the hard drives would require the use of the
contents of Doe’s mind and could not be fairly characterized as a physical act
that would be nontestimonial in nature.”; In re Boucher, 2007 WL 4246473, at
*3 (D. Vt. Nov. 29, 2007),16 which held that entering a password into a
computer implicitly communicates facts and was therefore testimonial in
nature; and Commonwealth v. Baust, 89 Va. Cir. 267 (2014), which held that
compelling defendant to provide access to his locked phone through his
16
The initial decision in Boucher was issued by the District Court Magistrate, whose decision was overturned
by the District Court Judge in the subsequent decision. But the subsequent decision was based on the
“foregone conclusion” doctrine. See In re Boucher, 2009 WL 424718 at *3 (D. Vt. Feb. 19, 2009) (citing Fisher,
425 U.S. at 411).
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 23 of 68
passcode was testimonial. See also Kiok, supra at 76 (“an order to compel
decryption [i.e., unlocking a smartphone] compels a testimonial act.”); Andrew
T. Winkler, Password Protection and Self-Incrimination: Applying the Fifth
Amendment Privilege in The Technological Era, 39 Rutgers Computer & Tech. L.J.
194, 209 (2013) (“Entering a password or otherwise decrypting the contents on
a computer is a testimonial act that receives the full protection of the Fifth
Amendment.”).17
[39] Upon consideration of this authority, and because we believe that electronic
data and the devices that contain it are fundamentally different than paper
documents and paper storage, we reject the State’s attempt to distinguish
between compelling Seo to convey her passcode to the State and compelling
Seo to simply unlock her phone by entering the passcode itself. It is a distinction
17
Interestingly, some courts have made a distinction between compelling a person to unlock a phone using a
password and compelling a person to unlock a phone using a fingerprint. As noted above, the Supreme Court
has held that forcing someone to submit to the taking of fingerprints is not testimonial. Schmerber, 384 U.S. at
764; see also Hook, 471 F.3d at 773–74. Because of this, at least two courts have held that there is no Fifth
Amendment problem with compelling a defendant to produce a fingerprint to unlock a smartphone. Baust, 89
Va. Cir. 267, at *4; State v. Diamond, 905 N.W.2d 870, 878 (Minn. 2018). As noted, supra, it is the height of
irony that the most secure current forms of electronic identification, the fingerprint, and more recently, facial
recognition or retinal scans, currently have no protection against compulsory use by law enforcement
authorities under Schmerber et al. This difference is reflective of legal thinking from a paper-based world that
courts currently are called upon to stretch to fit a world of electronic data about everything and everyone.
Our courts need a new paradigm that reflects our modern world.
However, even the fingerprint-unlocking function of the iPhone 7 at issue here will become inoperative after
forty-eight hours, thereby requiring the use of a passcode. See Terzian, 104 Geo. L. J. Online at 169 (citing
Apple, About Touch ID Advanced Security Technology (Sept. 11, 2017) (noting that a fingerprint alone is
insufficient to unlock an iPhone when “more than 48 hours have elapsed from the last time” the phone was
unlocked). Here, it has been well more than forty-eight hours since Seo’s phone has been unlocked by the
fingerprint sensor. Thus, even though the State might be able to compel Seo to attempt to use her fingerprint
to unlock the phone, this would, in all likelihood, be unsuccessful.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 24 of 68
without a difference because the end result is the same: the State is compelling
Seo to divulge the contents of her mind to obtain incriminating evidence.
[40] Furthermore, we consider Seo’s act of unlocking, and therefore decrypting the
contents of her phone, to be testimonial not simply because the passcode is akin
to the combination to a wall safe as discussed in Doe. We also consider it
testimonial because her act of unlocking, and thereby decrypting, her phone
effectively recreates the files sought by the State. As discussed above, when the
contents of a phone, or any other storage device, are encrypted, the cyphertext
is unintelligible, indistinguishable from random noise. In a very real sense, the
files do not exist on the phone in any meaningful way until the passcode is
entered and the files sought are decrypted. Thus, compelling Seo to unlock her
phone goes far beyond the mere production of paper documents at issue in
Fisher, Doe, or Hubbell. Because compelling Seo to unlock her phone compels
her to literally recreate the information the State is seeking, we consider this re-
creation of digital information to be more testimonial in nature than the mere
production of paper documents.
[41] Stripping legal precedent away from the issue, the very nature of a passcode
supports the conclusion that it is the product of one’s mind. Many people
choose a passcode that is uniquely memorable to them in some way. Often, the
password is an important date or other bit of information they hope will not be
easily guessed, but that is still uniquely memorable to them. To force Seo to
reveal her passcode is the very definition of compelling her to reveal the
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 25 of 68
contents of her mind. Accordingly, we hold that compelling Seo to unlock her
phone in any manner is testimonial.18
VI. The “Foregone Conclusion” Doctrine
[42] The State and the dissent argue that compelling Seo to unlock her phone is not
a violation of the Fifth Amendment privilege because of the “foregone
conclusion” doctrine. “Even if a response is testimonial, the privilege does not
apply where the testimonial portion is a foregone conclusion.” Dan Terzian,
Forced Decryption as a Foregone Conclusion, 6 Cal. L. Rev. Cir. 27, 28 (May 2015).
Under the “foregone conclusion” doctrine:
the Fifth Amendment does not protect an act of production when
any potentially testimonial component of the act of production—
such as the existence, custody, and authenticity of evidence—is a
“foregone conclusion” that “adds little or nothing to the sum
total of the Government’s information.” [Fisher, 425 U.S. at 411].
For the rule to apply, the Government must be able to “describe
with reasonable particularity” the documents or evidence it seeks
to compel. [Hubbell, 530 U.S. at 30].
United States v. Apple MacPro Computer, 851 F.3d 238, 247 (3d Cir. 2017); see also
Kerr & Schneier, supra at 1002 (“The foregone conclusion doctrine teaches that,
18
For the Fifth Amendment privilege to apply, the testimony at issue must also be incriminating. Bleeke, 6
N.E.3d at 925 (citing Hiibel, 542 U.S. at 190). Here, neither party disputes that the information the State seeks
from Seo’s iPhone would be incriminating. Moreover, given the vast amounts of personal information
located on a typical smartphone, there should be a reasonable presumption that something incriminating
would be discovered during review of the contents of almost anyone’s smartphone. Consider the expansive
law enforcement claims that could be made under the plain view doctrine or the good faith exception to the
Fourth Amendment or Article 1 Section 11 of the Constitution of Indiana protections when searching a
smartphone. See note 26, infra.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 26 of 68
if the testimonial aspect of production is already known to the government and
is not to be proven by the testimonial act, then the testimony is a foregone
conclusion and the Fifth Amendment privilege does not apply.”).19
[43] “Although the State need not have ‘perfect knowledge’ of the requested
evidence,” for the foregone conclusion rationale to apply, “it ‘must know, and
not merely infer,’ that the evidence exists, is under the control of defendant, and
is authentic.” State v. Stahl, 206 So.3d 124, 135–36 (Fla. Dist. Ct. App. 2016)
(citing United States v. Greenfield, 831 F.3d 106, 116 (2d Cir. 2016)) (emphasis
removed). Thus, where the foregone conclusion rationale applies, the question
is not of testimony, but of surrender. Id. at 136 (citing Fisher, 425 U.S. at 411).
[44] In this sense, the foregone conclusion doctrine of Fifth Amendment
jurisprudence contains its own requirement of specificity regarding the
information sought from the defendant, i.e., that the State or government be
able to describe with reasonable particularity the documents or evidence it seeks
to compel. Very importantly, this particularity requirement prevents the
foregone conclusion exception from swallowing the rule by requiring that the
State already know the documents or evidence it seeks. So long as the State
already knows with reasonable particularity the documents or evidence it seeks,
the surrender of the evidence “adds little or nothing to the sum total of the
19
There appears to be some confusion as to whether the foregone conclusion rationale is a true exception to
the Fifth Amendment privilege as it applies to testimonial production of documents, or whether the foregone
conclusion rationale means that the production of the documents at issue is simply not testimonial. Either
way, however, if the foregone conclusion doctrine is applicable, under current precedent, there is no Fifth
Amendment protection.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 27 of 68
Government’s information.” Fisher, 425 U.S. at 411. In contrast, where the
State does not already know the evidence exists, it cannot describe with
reasonable particularity the evidence it seeks, and the foregone conclusion
exception will not apply.
[45] The State argues that the foregone conclusion should apply under the facts of
the present case. The State focuses its argument not on the contents of the phone,
but on the passcode itself. Specifically, the State claims, “the act of unlocking a
cell phone contains only one implied fact: the person knows the password to the
phone, which by inference says that the person has control over and possession
of the phone.” Appellee’s Br. at 19. The State therefore contends that the
foregone conclusion rationale should apply because “a person must know her
passcode to use her own phone, the testimony implicit in the act of unlocking the
phone is a foregone conclusion when the State has proven that the phone
belongs to her.” Id. at 22 (emphasis added).
[46] There is some support for the State’s position. Indeed, it is one of the two paths
of legal analysis using a paper-based analogy. For example, in State v. Stahl, the
court held that, in deciding whether providing a passcode to a locked phone fell
within the ambit of the foregone conclusion doctrine, “the relevant question is
whether the State has established that it knows with reasonable particularity
that the passcode exists, is within the accused’s possession or control, and is
authentic.” 206 So.3d at 136 (emphasis added); see United States v. Spencer, ___
F.Supp.3d ___, 2018 WL 1964588 at *3 (N.D. Cal. April 26, 2018) (holding
that, to determine whether the foregone conclusion doctrine applied, the
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 28 of 68
appropriate question was whether the government could show that it was a
foregone conclusion that the defendant could decrypt the devices);
Commonwealth v. Davis, 176 A.3d 869, 876 (Pa. Super. Ct. 2017) (holding that
the foregone conclusion doctrine applied where the state was able to show that
it knew that the passcode existed, it was within the defendant’s possession or
control, and was authentic); Commonwealth v. Gelfgatt, 11 N.E.3d 605, 615
(Mass. 2014) (concluding that the “factual statements that would be conveyed
by the defendant’s act of entering an encryption key in[to] the computers [were]
‘foregone conclusions[.]’”); United States v. Fricosu, 841 F. Supp. 2d 1232, 1236–
37 (D. Colo. 2012) (holding that the foregone conclusion doctrine applied
where the State had evidence proving the encrypted computer belonged to the
defendant and that she knew the password).
[47] However, Seo argues the other path of the paper-based legal analogy: the
foregone conclusion doctrine does not apply here because the State cannot
describe with reasonable particularity the digital files or evidence it seeks to
compel her to produce. That is, Seo argues that the focus of the foregone
conclusion analysis is not whether it is a foregone conclusion that Seo knows
her own passcode; rather, the focus should be on whether the State can describe
with reasonable particularity the digital information it seeks to compel her to
produce. See Apple MacPro Computer, 851 F.3d at 247 (citing Hubbell, 530 U.S. at
30). And there is support for Seo’s framing and application of the foregone
conclusion doctrine in other jurisdictions that have considered her argument.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 29 of 68
[48] In Commonwealth v. Baust, the court held that the password itself was not a
foregone conclusion because it was not known outside of the defendant’s mind.
89 Va. Cir. 267 at *4. Presaging Seo’s argument here, the Baust court held that,
“[u]nlike a document or tangible thing, such as an unencrypted copy of the
footage itself, if the password was a foregone conclusion, the Commonwealth
would not need to compel Defendant to produce it because they would already
know it.” Id.; see also In re Grand Jury Subpoena Duces Tecum Dated March 25,
2011, 670 F.3d at 1347 (holding that the foregone conclusion doctrine was
inapplicable where the government had not shown that it possessed knowledge
as to the “files on the [encrypted] hard drives at the time it attempted to compel
production.”); Sec. & Exch. Comm’n v. Huang, 2015 WL 5611644, at *4 (E.D. Pa.
Sept. 23, 2015) (holding that the foregone conclusion doctrine did not apply
because the SEC had no evidence any digital files it sought were actually
located on the target’s work-issued smartphones).
[49] With an eye toward a more comprehensive rethinking of the legal analysis
regarding digital information and storage, we believe these cases express the
better rationale.20 What is being compelled here is not merely the passcode. As
described above, compelling Seo to enter her password forces her to effectively
re-create the entire contents of her phone. In the words of the Third Circuit
20
This is one of the two available rationales under the outdated paper paradigm that our courts are stumbling
through in an effort to resolve information production disputes regarding electronic data on electronic
devices. Judge May in her dissent chooses the opposite alternative. We believe the alternative branch of cases
we have chosen contains the better rationale because it not only resolves the instant issue and case; it also
presages a suggested way forward in this important and continually evolving area.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 30 of 68
Court of Appeals, the State must be able to describe with reasonable
particularity the digital files it seeks to compel. Apple MacPro Computer, 851 F.3d
at 247 (citing Hubbell, 530 U.S. at 30). Here, what the State seeks to compel is
not merely the password, but the entire contents of Seo’s iPhone. Thus, for the
foregone conclusion doctrine to apply, the State must be able to describe with
reasonable particularity the discrete contents on Seo’s phone—e.g., all texts to
D.S. created on Seo’s iPhone—that it is compelling her to not only produce, but
to re-create by entering her passcode and decrypting the contents of the phone.
This is a burden the State has not met.
[50] To be sure, the investigating detective has already viewed Seo’s phone and has
seen information that caused him to believe that D.S. was the victim of stalking
and harassment by Seo. Indeed, Detective Inglis testified that he made a
“forensic download” of the contents of Seo’s phone. Tr. p. 6. We may therefore
presume that the State already has much of the information contained on Seo’s
phone.21 But it is not this information the State now seeks to compel. Instead,
what the State seeks now is evidence that might have been created on Seo’s
21
We also note that the information the State seeks is not of an emergency nature, or of a completely new
description or character from that information it already has. The State could potentially prove its case
entirely from the text messages received by D.S. and that may still be found on his cellphone, comparing the
alleged threats and harassment language after the protective order was issued to the threatening and harassing
texts contained in its forensic download of Seo’s cellphone with her consent. The State has also not shown
that it has tried unsuccessfully to obtain the desired information through readily available and far less
constitutionally intrusive methods, such as third-party subpoenas to Seo’s cell carrier regarding the texts at
issue or to Apple to inquire as to what applications she has downloaded, with an eye toward those apps or
services that could mask her cellphone number. A subpoena to Google could also reveal any Google Voice
numbers Seo has secured, and the State could compare those numbers to the sources of the texts to D.S.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 31 of 68
phone after this forensic download, i.e., evidence that Seo sent the flood of
threatening and harassing messages to D.S. But again, the State has not
described with any particularity the digital information it seeks to access.
[51] We acknowledge that the State secured a search warrant for the contents of
Seo's iPhone. However, this warrant did not describe with any reasonable
particularity the digital information the State sought to find, as the Fifth
Amendment requires.22 Instead, the warrant merely stated that the police were:
authorized and ordered in the name of the State of Indiana, with
necessary and proper assistance, in the daytime or nighttime, to
search the property located at and described as:
5. for purpose of searching items described in the sworn
evidence, to wit:
That Katelin Eunjoo Seo be compelled to unlock (via
biometric fingerprint, passcode, password, or otherwise) the I
Phone [sic] 7 plus with serial number ************ and
cellular phone number ******* pursuant to Indiana Code 35-
33-5-11(a) and that if she fails to comply with this order, that
she shall be subject to the contempt powers of the court.
22
We decline to address whether the issuance of a search warrant is sufficient to meet the State’s burden
under the foregone conclusion doctrine to describe with reasonable particularity the digital files or evidence it
seeks to compel. The Fourth Amendment requirement for probable cause requires only that the magistrate
issuing the warrant make a “practical, common-sense decision whether, given all the circumstances set forth
in the affidavit, there is a fair probability that contraband or evidence of a crime will be found in a particular
place.” State v. Spillers, 847 N.E.2d 949, 952–53 (Ind. 2006). This appears to us to be a lower standard than
that required for the foregone conclusion doctrine to apply, i.e., that the government be able to describe with
“reasonable particularity” the documents or evidence it seeks to compel. Hubbell, 530 U.S. at 44–45.
Moreover, here, there has yet to be a challenge to the propriety of the warrant. Indeed, such a challenge
would likely come only after the State has searched the phone, discovered incriminating evidence, if any, and
attempts to use that evidence at trial.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 32 of 68
Appellant’s App. p. 49.
[52] Thus, the warrant itself does not describe with any particularity the digital
information the State seeks to compel Seo to produce or the evidence the State
is authorized to search for.23 Nor does the trial court’s order on contempt
describe with any reasonable particularity the digital information the State seeks
to compel.24
[53] Going forward the State can, and should, describe the information it seeks and
the programs that contain it on Seo’s cellphone, e.g., any texts between Seo and
D.S., whether in Apple’s Message application, Facebook, Twitter or otherwise,
and the contents of any application that allows a user to change the apparent
telephone number originating an electronic communication, such as Google
Voice or Pinger. And perhaps more importantly, in its order the court should
also require the State to limit its search within messaging to variations of D.S’s
23
This observation is not a comment on the propriety of the search warrant for purposes of the Fourth
Amendment or Article 1, Section 11 of the Indiana Constitution. We merely hold that for purposes of
applying the foregone conclusion doctrine under the Fifth Amendment, the State has not described with
reasonable particularity the digital files or data it seeks to compel.
24
The dissent contends that, based on Detective Inglis’s testimony at the hearing on the State’s motion to
hold Seo in contempt, “it seems self-evident the State is seeking evidence on Seo’s phone of an App or
multiple Apps that would allow her to mask her identity and evidence that Seo’s phone had generated the
phone calls and texts that D.S. received from phone numbers that did not belong to any other person.” Slip
op. at 65 n.8. But by the time Detective Inglis testified, the State had already obtained a warrant compelling
Seo to unlock her phone. And there is nothing in the language of the warrant itself that describes with any
particularity the information the State was authorized to look for. Although the dissent faults Seo for failing
to present us with a more complete record, it is the language of the warrant itself, not the probable cause
affidavit or testimony supporting the warrant, that is the controlling legal document which compels Seo to
unlock her phone. And even after Detective Inglis’s testimony, the order holding Seo in contempt again does
not describe with any particularity the information the State seeks to compel.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 33 of 68
name, rather than allowing the State to view everything that is contained in the
messaging applications involved. These are not onerous requirements.
[54] Accordingly, we conclude that the State has not met the requirements of the
foregone conclusion doctrine because it has not demonstrated that it can, with
reasonable particularity, identify any files or describe where they are. See
Hubbell, 530 U.S. at 45; In re Grand Jury Subpoena Duces Tecum Dated March 25,
2011, 670 F.3d at 1347; Sec. & Exch. Comm’n, 2015 WL 5611644 at *4. Instead,
here, all the State has demonstrated is that evidence relating to the harassment
and intimidation charges is probably on the phone. But it has failed to describe
with adequate reasonable particularity the files or evidence it seeks on Seo’s
smartphone.
[55] It bears repeating that writs of assistance were the immediate evils that
motivated the framing and adoption of the Fourth Amendment. Payton v. New
York, 445 U.S. 573, 583 (1980). Although this case does not directly involve the
Fourth Amendment, in criminal cases raising the Fifth Amendment, the law
requires the State to describe the information it seeks to compel production of
with reasonable particularity.
[56] Even in civil cases, modern, electronic discovery standards require that the
requesting party specifically tailor its request to discover relevant information.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 34 of 68
See Zubulake v. UBS Warburg LLC, 217 F.R.D. 309, 322 (S.D.N.Y. 2003).25 And
in civil cases, opponents are also required to detail and attempt to obtain the
information sought from third-party sources before seeking to compel the
opponent to produce the information directly. The same should be true in
criminal cases as well. Only then is an assault on Fifth Amendment privilege
against self-incrimination a reasonable option under the law.
[57] As noted above, the Fifth Amendment privilege against self-incrimination
reflects our nation’s fundamental principles. These principles should not be
altered by the advance of technology. To the contrary, they must be applied
consistently and with recognition of the technology that has replaced physical
papers, files, boxes and safes. Cf. Carpenter v. United States, 138 S. Ct. 2206, 2222
(2018) (“When confronting new concerns wrought by digital technology, this
Court has been careful not to uncritically extend existing precedents.”); Collins
v. Virginia, 138 S. Ct. 1663, 1671 (2018) (declining to expand the automobile
exception to the warrant requirement to include a search of a vehicle parked in
the curtilage of a home because to do so would “undervalue the core Fourth
Amendment protection afforded to the home and its curtilage and ‘untether’ the
automobile exception ‘from the justifications underlying’ it.”) (quoting Riley v.
California, 573 U.S. ___, 134 S. Ct. 2473, 2485 (2014)). Indeed, these principles
25
In civil cases involving requests for discovery of electronic information, courts have applied a multi-factor
test that includes consideration of the extent to which the request is specifically tailored to discover relevant
information and the availability of such information from other sources. Zubulake, 217 F.R.D. at 322.
Certainly, such concerns are all the more pressing in criminal cases where the State seeks production of
digital information that may incriminate the defendant or others.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 35 of 68
are all the more important given the amount and potentially incriminating
nature of information contained in a smartphone.
VII. Outdated Analogies
[58] Advances in technology have rendered paper-based analogies more and more
inapt, if not wholly inadequate. See Kiok, supra at 76 (“Many analogies to older
technology simply do not replicate how electronic encryption actually works.
Although metaphors are useful in analogizing new technology to older, more
familiar one[s], if the metaphor is stretched too far, it loses its usefulness to
courts and commentators.”). Thus, to compare a smartphone and its contents
to a paper file located in a locked file cabinet or wall safe, as the current case
law does, is at the very least, a gross oversimplification. The information stored
on a smartphone is qualitatively and quantitatively unique.
[59] As indicated in our introduction, the sheer quantity of personal information
contained on a typical smartphone is truly astounding. In the years that the
paper-based analogies were first made, it would have taken thousands, if not
millions, of sheets of paper and photographs to equal the amount of digital
information, such as email, text messages, photographs, and videos, stored in a
modern smartphone.
[60] As recently as 2000, “only” 80 billion consumer photos were taken annually.
Since the advent of the smartphone, this number has grown at an astonishing
rate: by 2010, the number of photos taken annually had nearly tripled to over
200 billion, with projections that 1.3 trillion photos would be taken by 2017, and
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 36 of 68
over 79% of these photos were taken with some kind of phone. See Stephen
Heyman, Photos, Photos Everywhere, N.Y. Times, July 29, 2015.26 These
predictions were pretty accurate, as it was reported that 1.2 trillion photos were
taken in 2017, 85% taken with smartphones. See Caroline Cakebread, People will
take 1.2 trillion digital photos this year — thanks to smartphones, Business Insider,
Aug. 31, 2017.27 A 2015 study revealed that the average smartphone user takes
150 photos per month and has 630 photos stored on the phone. See Janko
Roettgers, Special report: How we really use our camera phones, GigaOm (Jan. 23,
2015, 5:00 a.m. CDT).28 These numbers can only have grown since then with
the increased storage capacity of more recent smartphones.
[61] Text messaging presents a similar story. A 2011 study by the Pew Research
Center showed that users sent or received an average of 41.5 messages per day.
See Aaron Smith, How Americans Use Text Messaging, Pew Research Center
(Sept. 19, 2011).29 This number has certainly only grown. Indeed, one report
indicated that between 2011 and 2014, global text message usage grew by
140%. Kenneth Burke, How Many Texts Do People Send Every Day?, Text Request
(May 18, 2016).30 This same report indicates that globally 18.7 billion text
26
Available at https://www.nytimes.com/2015/07/23/arts/international/photos-photos-everywhere.html
27
http://www.businessinsider.com/12-trillion-photos-to-be-taken-in-2017-thanks-to-smartphones-chart-
2017-8
28
https://gigaom.com/2015/01/23/personal-photos-videos-user-generated-content-statistics/
29
Available at http://www.pewinternet.org/2011/09/19/how-americans-use-text-messaging/
30
https://www.textrequest.com/blog/how-many-texts-people-send-per-day/
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 37 of 68
messages were sent every day. Id. And these statistics do not include two of the
most widely used app-to-app messaging platforms, WhatsApp and Facebook
Messenger, which then combined for 60 billion messages per day. Id. Apple’s
Messages app sent over 40 billion notifications per day in 2016 and peaked at
200,000 messages per second. See Kif Leswing, Apple says people send as many as
200,000 iMessages per second, Business Insider, Feb. 13, 2016 (citing an interview
of Apple Services Vice President Eddy Cue).31
[62] The point of these statistics is not to overwhelm the reader with numbers, but
simply to illustrate how different a smartphone is from traditional paper-based
media. To compare a smartphone to a locked strongbox or a wall safe, as the
currently existing case law does, stretches these analogies beyond the breaking
point. Perhaps a more apt analogy would be to compare a smartphone to a
literal warehouse containing thousands of personal photographs, millions of
lines of text contained in emails, messages, personal conversations, medical
information, and other items of the most intimate nature. Some commentators
have even compared a smartphone to a “second brain” or “an extension of the
mind.” See Yo Zushi, Life with a smartphone is like having a second brain in your
31
http://www.businessinsider.com/eddy-cue-200k-imessages-per-second-2016-2 (citing The Talk Show,
Daring Fireball (Feb. 12, 2016), https://daringfireball.net/thetalkshow/2016/02/12/ep-146
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 38 of 68
pocket, New Statesman (Feb. 22, 2017);32 Karina Vold, Is Your Smartphone an
Extension of Your Mind?, Motherboard (Mar. 2, 2018, 10:00 a.m.).33
[63] The paper-based analogies are also less and less apt as technology advances. In
the days of the floppy disk, it was understandable to compare a digital file
stored on such a disk to a physical piece of paper stored in a filing cabinet.
Indeed, the basis of the most computer user interfaces retains the “desktop
metaphor” of files, folders, and trash cans and recycling bins. But the advent of
readily available, reliable, fast, and easy-to-use encryption has changed this
metaphor. As noted above, encryption takes existing information and obscures
it in such a manner that it is unreadable and unrecoverable unless it is decrypted
with the proper key. To use the wall-safe metaphor, with encryption, when one
locks the safe with the combination, the letter inside is shredded into millions of
tiny pieces that no person could ever hope to reassemble; yet when one reenters
the combination and unlocks the safe, the pieces of the letter almost magically
reassemble themselves to reconstitute the letter.
[64] Despite the weaknesses of the current paper-based metaphors, the controlling
Fifth Amendment case law still uses these metaphors. And we are not at liberty
to create our own analogies or frameworks when it comes to the federal
Constitution. This is a task reserved for the High Court itself. Thus, as we have
explained, we believe that compelling an individual to unlock her smartphone
32
https://www.newstatesman.com/science-tech/2017/02/life-smartphone-having-second-brain-your-pocket
33
https://motherboard.vice.com/en_us/article/qvemgb/is-your-smartphone-an-extension-of-your-mind
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 39 of 68
by passcode is a testimonial act more akin to unlocking a wall safe than
handing over the key to a locked strongbox.
VIII: A Way Forward?
[65] Electronic data storage of any type has stretched paper-based rules, rubrics, and
rationales beyond their breaking points. As the Fisher court observed about the
ruling in Boyd ninety years earlier, today, many paper-based rules, rubrics and
rationales have not stood the test of time, especially as time is accelerated by
developments in technology.34 Simply said, electronic data and its storage are,
by their nature, intrinsically different than records stored on paper, and the law
must recognize that difference in order to honor our shared belief in a free
society, limited only as reasonably required for public safety.35 Going forward,
we ask reviewing courts of last resort to consider the following structure for
resolving decryption requests from law enforcement authorities:
34
In 1965, American computer engineer Gordon Moore predicted that the number of transistors in a silicon
chip would double every year. He later revised this prediction to a doubling of transistors every two years, but
in reality, the pace has been a doubling every eighteen months. See Moore’s Law, Encyclopædia Britannica
(Nov. 29, 2017), available at https://www.britannica.com/technology/Moores-law. However, the laws of
both physics and economics have recently brought the continuing validity of Moore’s prediction into
question. See Tom Simonite, Moore’s Law is Dead. Now What?, MIT Technology Review (May 13, 2016),
https://www.technologyreview.com/s/601441/moores-law-is-dead-now-what/; End of Moore’s Law: It’s Not
Just About Physics, Scientific American (last visited Aug. 13, 2018),
https://www.scientificamerican.com/article/end-of-moores-law-its-not-just-about-physics/.
35
We must keep in mind that the Federalist Framers were forced to include a Bill of Rights, including the
Fourth and Fifth Amendments, by their opponents, the Anti-Federalists, in the state ratification conventions.
See United States v. Emerson, 270 F.3d 203, 237 (5th Cir. 2001) (noting that the Anti-Federalists wanted the
United States Constitution, like most of the state Constitutions, to contain a Bill of Rights to prevent the
federal government from infringing upon the fundamental rights of the people). Without the clear recognition
of these personal rights, the United States, as we know it, would never have existed.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 40 of 68
1. Requiring a defendant to decrypt digital data should be legally
recognized for what it is—coerced recreation of incriminating evidence—
and compulsory process for that purpose should be strictly limited for
precisely that reason.
2. In some instances, law enforcement officials will have legitimate need of
digital information that is protected by encryption.
3. If the law enforcement request is a bona fide emergency, with verified
concern about the possibility of further and immediate serious criminal
acts, a warrant that describes the other imminent crime(s) suspected and
the relevant information sought through a warrant, both with reasonable
particularity, will likely satisfy Fourth and Fifth Amendment
requirements.
4. In non-emergency situations, law enforcement should be required to first
seek the digital data it wants from third parties, such as internet “cloud”
sources, cellphone companies, or internet providers (ISPs), where a
defendant has practically, if not explicitly, consented to production upon
legal process from a court of competent jurisdiction.36
5. Exceptions to the Fourth Amendment and its state analogues, such as
the plain view doctrine and the good faith exception, should be
36
Defendants in criminal cases are entitled to at least the same rights in this regard as are parties in civil
cases. See Zubulake, 217 F.R.D. at 322.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 41 of 68
inapplicable to, or strictly limited in, the search and seizure of digital data
stored on devices owned or controlled by that defendant, or from
“Cloud” subscriptions that defendant owns or uses. 37
Conclusion
[66] Courts will continue to be faced with issues involving the intersection of the law
and rapidly-emerging technology. Technology moves faster than the law. See,
e.g., People v. Kramer, 706 N.E.2d 731, 734 (N.Y. 1998). But the principles
embodied in the Bill of Rights by our Founding Fathers are timeless. See id.
(“[Technology] cannot be allowed to outpace the array of checks and balances
and protections affecting [] privacy intrusions, important to individuals and
society at large[.]”).
[67] In this case, we apply these founding principles to modern technology and
conclude that compelling Seo to unlock her iPhone, under the threat of
contempt and imprisonment, is constitutionally prohibited by the Fifth
Amendment because revealing or using the passcode to do so is a testimonial
37
See Orin S. Kerr, Digital Evidence and the New Criminal Procedure, 105 Colum. L. Rev. 279, 314 (Jan. 2005)
(suggesting that the plain view doctrine be abolished in computer searches because “computers often must be
searched comprehensively to locate the evidence sought,” and “the plain view rule threatens to collapse the
distinction between particular and general warrants. A particular warrant in theory may become a general
warrant in practice, as all of the evidence in the computer may come into plain view during the course of the
forensic analysis.”); Orin S. Kerr, Searches and Seizures in a Digital World, 119 Harv. L. Rev. 531, 576 (Apr.
2005) (“[A] tightening of the plain view doctrine may be necessary to ensure that computer warrants that are
narrow in theory do not become broad in practice.”); see also Orin S. Kerr, Executing Warrants for Digital
Evidence: The Case for Use Restrictions on Nonresponsive Data, 48 Tex. Tech L. Rev. 1, 21 (2015) (revisiting the
author’s earlier conclusions and suggesting that “[t]he plain view doctrine might not be the problem, and
eliminating the plain view exception might not be the answer,” and arguing that the use of non-responsive
data found during a search instead renders the seizure unreasonable).
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 42 of 68
act. In addition, to date, the State has not met the requirements of the foregone
conclusion doctrine: to describe with reasonable particularity the information it
seeks to compel Seo to produce and why. In this non-emergency situation, the
State should also first seek the evidence it feels it needs to prosecute the crime(s)
alleged from third-party sources. We therefore reverse the order of the trial
court finding Seo in contempt and remand for proceedings consistent with this
opinion.38
[68] Reversed and remanded.
Riley, J., concurs in result.
May, J., dissents with opinion.
38
As noted above, our opinion today does not foreclose the possibility of the State continuing the
prosecution of Seo. See note 21, supra. Furthermore, the State may have other means of discovering the
contents of Seo’s phone. Although the contents of the phone itself are encrypted, some of the information
might still be in the possession of third parties, such as the manufacturer of the phone (Apple, as to cellphone-
number-spoofing apps downloaded by Seo) or her service provider (such as AT&T, Verizon, T-Mobile,
Sprint, etc., as to when text messages were sent). And at least one manufacturer sells a turn-key solution that
claims to be able to exploit an as-yet unrevealed vulnerability in the iPhone’s passcode lockout feature to
circumvent the lockout and enable police to brute-force the password. See Thomas Fox-Brewster, Mysterious
$15,000 ‘GrayKey’ Promises To Unlock iPhone X For The Feds, Forbes (March 5, 2018, 12:10 p.m.),
https://www.forbes.com/sites/thomasbrewster/2018/03/05/apple-iphone-x-graykey-hack/. However, a
recently released update to the iPhone software apparently thwarts this exploit. See Chris Welch, Apple releases
iOS 11.4.1 and blocks passcode cracking tools used by police, The Verge (July 9, 2018, 2:17 p.m.),
https://www.theverge.com/2018/7/9/17549538/apple-ios-11-4-1-blocks-police-passcode-cracking-tools.
This is all the more reason for courts to consider both smartphone users’ privacy rights and the reasonable
needs of law enforcement in a comprehensive way as soon as possible.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 43 of 68
ATTORNEYS FOR APPELLANT ATTORNEYS FOR APPELLEE
William J. Webster Curtis T. Hill, Jr.
Carla V. Garino Attorney General of Indiana
Webster Legal, LLC Ellen H. Meilaender
Westfield, Indiana Supervising Deputy Attorney General
Indianapolis, Indiana
IN THE
COURT OF APPEALS OF INDIANA
Katelin Eunjoo Seo, Court of Appeals Case No.
29A05-1710-CR-2466
Appellant-Defendant,
v.
State of Indiana,
Appellee-Plaintiff.
May, Judge, dissenting.
[69] When Seo wanted to have charges brought against D.S., she unlocked her cell
phone and gave it to police so they could download its contents. Only by
viewing those contents and then talking to D.S. did police learn that charges
might instead be brought against Seo. Thus, the police already have proof that
the cell phone in question belongs to Seo and that Seo can open it. Given that
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 44 of 68
those facts are a foregone conclusion, Seo’s act of producing her unencrypted
cell phone does not provide an inference of any “incriminating testimony” and,
therefore, under the specific facts before us, I would hold Seo’s Fifth
Amendment right against self-incrimination is not being violated by the order
that she unlock the phone. See, e.g., United States v. Spencer, 2018 WL 1964588
(N.D. Cal. 2018) (Fifth Amendment not violated by order for Spencer to
decrypt the device where the State demonstrated, by clear and convincing
evidence, that Spencer’s ability to decrypt the device is a foregone conclusion).
Accordingly, I respectfully dissent.
[70] To explain why I reach that conclusion and where my understanding of Fifth
Amendment jurisprudence diverges from the majority’s opinion, I need to
address numerous parts of the majority’s analysis.
Privacy and the Fifth Amendment
[71] As the majority notes, modern Fifth Amendment jurisprudence begins with
Boyd v. United States, 116 U.S. 616 (1886). Slip op. at 15 (discussing Boyd). See
also Wayne R. LaFave, Jerold H. Israel, Nancy J. King, & Orin S. Kerr,
Criminal Procedure: The Boyd “principle”, in 3 CRIM. PROC. § 8.12(a) (4th ed.,
Dec. 2017 Update) (hereinafter “LaFave et al., Boyd principle”) (“the Boyd
analysis remains a universally accepted starting point for understanding the
many strands of current Fifth Amendment doctrine applicable to the subpoena
duces tecum”). Boyd held “the seizure of a man’s private books and papers to be
used in evidence against him is [not] substantially different from compelling
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 45 of 68
him to be a witness against himself.” Boyd, 116 U.S. at 633. As LaFave and his
colleagues explain:
Boyd relied on what has been described as a “property oriented”
view of the Fourth and Fifth Amendments, built upon the
owner’s right of privacy in the control of his lawfully held
possessions. It recognized a special Fifth Amendment interest in
the privacy of documents, viewing the forced production of their
contents as equivalent to requiring a subpoenaed party to reveal
that content through his testimony. . . . [T]he key to the Court’s
analysis appeared to be invasion through forced production of
the individual’s privacy interest in his possession of property in
which the public had no entitlement.
LaFave et al., Boyd principle.
[72] Since that time, however, the Supreme Court has “gradually developed a series
of doctrines that chipped away at the broad implications of Boyd’s property-
rights/privacy analysis of Fifth Amendment protection,” id., such that “very
little if anything, remains of Boyd’s Fifth Amendment analysis.” Id. See also
Carpenter v. United States, 2018 WL 3073916 at *66 (2018) (Gorsuch, J.,
dissenting) (“To be sure, we must be wary of returning to the doctrine of Boyd . .
. [which] invoked the Fourth Amendment to restrict the use of subpoenas even
for ordinary business records and, as Justice Alito notes, eventually proved
unworkable.”). In fact, in 1976, the Supreme Court explicitly rejected the idea
that the Fifth Amendment was intended to protect private information:
The proposition that the Fifth Amendment protects private
information obtained without compelling self-incriminating
testimony is contrary to the clear statements of this Court that
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 46 of 68
under appropriate safeguards private incriminating statements of
an accused may be overheard and used in evidence, if they are
not compelled at the time they were uttered; and that disclosure
of private information may be compelled if immunity removes
the risk of incrimination. If the Fifth Amendment protected
generally against the obtaining of private information from a
man’s mouth or pen or house, its protections would presumably
not be lifted by probable cause and a warrant or by immunity.
The privacy invasion is not mitigated by immunity; and the Fifth
Amendment’s strictures, unlike the Fourth’s, are not removed by
showing reasonableness. The Framers addressed the subject of
personal privacy directly in the Fourth Amendment. They struck
a balance so that when the State’s reason to believe incriminating
evidence will be found becomes sufficiently great, the invasion of
privacy becomes justified and a warrant to search and seize will
issue. They did not seek in still another Amendment the Fifth to
achieve a general protection of privacy but to deal with the more
specific issue of compelled self-incrimination.
We cannot cut the Fifth Amendment completely loose from the
moorings of its language, and make it serve as a general protector
of privacy a word not mentioned in its text and a concept directly
addressed in the Fourth Amendment. We adhere to the view
that the Fifth Amendment protects against “compelled self-
incrimination, not (the disclosure of) private information.”
Fisher v. United States, 425 U.S. 391, 400-01 (1976). See also Dan Terzian, The
Fifth Amendment, Encryption, and the Forgotten State Interest, 61 UCLA L. Rev.
Discourse 298, 307 (2014) (“Privacy is no longer a Fifth Amendment value.”).
[73] Because the United States Supreme Court has explicitly rejected the notion that
the Fifth Amendment is intended to protect any privacy interest in information,
I find irrelevant my colleagues’ repeated references to the “trove of . . . almost
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 47 of 68
always embarrassing, and potentially, incriminating” information they keep on
their cell phones. Slip op. at 2-3; see also id. at 1-2 (“The amount of personal
information contained on a typical smartphone is astounding[.]”); id. at 26 n.20
(“[G]iven the vast amounts of personal information located on a typical
smartphone, there should be a reasonable presumption that something
incriminating would be discovered during review of the contents of almost
anyone’s smartphone.”) (emphasis in original); 39 and id. at 36-38 (discussing the
amount of data processed by and kept on phones).
Encryption and Its Implications
[74] Part of the reasoning behind the majority’s holding that forcing Seo to unlock
her phone implicates the Fifth Amendment is because
her act of unlocking, and thereby decrypting, her phone
effectively recreates the files sought by the State. . . . In a very
real sense, the files do not exist on the phone in any meaningful
way until the passcode is entered and the files sought are
decrypted.
39
In the same footnote, my colleagues express concern about “the expansive law enforcement claims that
could be made under the plain view doctrine or the good faith exception to the Fourth Amendment or Article
1 Section 11 of the Constitution of Indiana protections when searching a smartphone.” Slip op. at 26 n.20.
While I am not unconcerned about the implications of plain view and good faith when the police are given
unfettered access to the contents of a citizen’s smartphone, I also recognize that the application of the Fourth
Amendment is not before us in this appeal and that our decision under the Fifth Amendment ought not be
conflated with Fourth Amendment concerns. See Carpenter, 2018 WL 3073916 at *13 (“Our decision today is
a narrow one. We do not express a view on matters not before us.”); and see Fisher, 425 U.S. at 401 (“the
Fifth Amendment protects against ‘compelled self-incrimination, not (the disclosure of) private
information’”).
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 48 of 68
Slip op. at 25. I concede that encryption turns readable digital data into digital
random noise. I cannot, however, agree that decryption constitutes “creation of
testimony” that should implicate the Fifth Amendment.
[75] Seo is not being forced, under the penalties of perjury or torture, to download
new Apps or to write and send new text messages. The evidence being sought
from Seo’s phone – text messages matching those received by D.S. from phone
numbers that were not assigned to any identifiable person and identity masking
applications – already are among the files on Seo’s phone, otherwise they could
not have been encrypted when Seo locked her phone.40 As such, decryption
does not use the contents of Seo’s mind to create new information. Instead, pre-
existing information is simply being rendered intelligible.
[76] Therefore, in my opinion, the law ought to treat files on a cell phone –
encrypted or not – like prior-produced documents sitting in a file cabinet, which
do not enjoy Fifth Amendment protection. See United States v. Hubbell, 530 U.S.
27, 35-36 (2000) (“a person may be required to produce specific documents
even though they contain incriminating assertions of fact or belief because the
creation of those documents was not ‘compelled’ within the meaning of the
privilege”); id. at 36 (“Hubbell could not avoid compliance with the subpoena
served on him merely because the demanded documents contained
incriminating evidence, whether written by others or voluntarily prepared by
40
The question of whether the State has probable cause to believe it will find that expected evidence of the
alleged crimes on Seo’s phone is a Fourth Amendment question that, once again, is not before us in this
appeal. See supra n. 39. Accordingly, for my analysis, I assume arguendo the evidence exists on her phone.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 49 of 68
himself.”); Fisher, 425 U.S. at 409-410 (“the preparation of all of the papers
sought in these cases was wholly voluntary, and they cannot be said to contain
compelled testimonial evidence, either of the taxpayers or of anyone else”). See
also In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011, 670 F.3d 1335,
1342 (11th Cir. 2012) (“the files, if there are any at all in the hidden portions of
the hard drives, are not themselves testimonial”).
[77] To hold otherwise as to data on encrypted devices creates an ever-increasingly
unpoliceable “zone of lawlessness” that could not have been envisioned when
the Fifth Amendment was adopted. See Dan Terzian, The Micro-Hornbook on the
Fifth Amendment and Encryption, 104 Geo. L.J. Online 168 (2016) (“The DOJ
calls encryption a “zone of lawlessness.”); see also Slip op. at 12 (advanced
security features on modern cellphones render nearly impossible brute force
attacks on passcodes, such that “if the police want or need to gain access to an
iPhone, the cooperation of its owner is practically a necessity”). The Fifth
Amendment, like other portions of the Bill of Rights, was intended to balance
the government’s interest in policing to maintain the common welfare of the
people with each individual citizen’s interest in liberty from government
intrusion. See California v. Byers, 402 U.S. 424, 427 (1971) (Fifth Amendment
questions “must be resolved in terms of balancing the public need on the one
hand, and the individual claim to constitutional protections on the other;
neither interest can be treated lightly.”); see also Terzian, 61 UCLA L. Rev.
Discourse at 307 (“Forming the Fifth Amendment’s core value, then, is its aim
to achieve a fair state-individual balance. Where there is a real societal need to
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 50 of 68
limit the privilege, the Court has repeatedly permitted compulsion upon the
defendant.”). I do not believe the creation of a zone-of-lawlessness outside a
person’s mind from which individual citizens could commit crimes against
others without government recourse can be a proper balancing of those
interests. See generally id. Accordingly, I believe we must find a path forward
that balances the governmental and individual interests without creating a zone
of lawlessness from which one citizen may harass another without government
intervention. See, e.g., Kastigar v. United States, 406 U.S. 441, 445-46 (1972)
(statutes granting immunity for compelled testimony “seek a rational
accommodation between the imperatives of the privilege and the legitimate
demands of government to compel citizens to testify”), reh’g denied.
Keys, Combinations, and the “Contents of One’s Mind”
[78] As the majority discusses, in 1988, the United States Supreme Court decided a
citizen’s Fifth Amendment privilege against self-incrimination was not violated
by an order that compelled him to sign a consent form authorizing foreign
banks to release any records of accounts in his name to the United States
government. Doe v. United States, 487 U.S. 201, 219 (1988) (hereinafter “Doe
2”). Justice Stevens dissented from that decision, arguing that a citizen “may in
some cases be forced to surrender a key to a strongbox containing incriminating
documents, but I do not believe he can be compelled to reveal the combination
to his wall safe—by word or by deed.” Id. at 219 (Stevens, J., dissenting). In
response, the Court’s majority noted:
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 51 of 68
We do not disagree with the dissent that “[t]he expression of the
contents of an individual’s mind” is testimonial communication
for purposes of the Fifth Amendment. We simply disagree with
the dissent’s conclusion that the execution of the consent
directive at issue here forced petitioner to express the contents of
his mind. In our view, such compulsion is more like “be[ing]
forced to surrender a key to a strongbox containing incriminating
documents” than it is like “be[ing] compelled to reveal the
combination to [petitioner’s] wall safe.”
Id. at 210 n.9.
[79] A majority of the Supreme Court again referenced this key-combination
dichotomy when it decided Hubbell:
It was unquestionably necessary for respondent to make
extensive use of “the contents of his own mind” in identifying the
hundreds of documents responsive to the requests in the
subpoena. The assembly of those documents was like telling an
inquisitor the combination to a wall safe, not like being forced to
surrender the key to a strongbox.
Hubbell, 530 U.S. at 43 (Hubbell’s Fifth Amendment privilege was violated by a
subpoena that forced him to comb through thousands of documents to find
those that fit the government’s request.).
[80] Based on that language from Doe 2 and Hubbell, courts being asked to determine
whether a citizen could be forced to reveal the passcode for locked electronic
devices have frequently turned to this key-combination dichotomy and asked
whether the electronic passcode is more like a key or a combination. Some
courts have held that a passcode is more like a combination because both are
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 52 of 68
kept in a person’s mind, such that the production of the password would be
testimonial and is prohibited by the Fifth Amendment.41 See, e.g., United States
v. Kirschner, 823 F.Supp. 2d 665, 668-9 (E.D. Mich. 2010) (government cannot
compel disclosure of password because it requires defendant “to divulge
through his mental processes his password”); In re Boucher, No. 2:06-mj-91,
2007 WL 4246473, at *4 (D. Vt. Nov. 28, 2007) (“A password, like a
combination, is in the suspect’s mind, and is therefore testimonial and beyond
the reach of the grand jury subpoena.”) (hereinafter “Boucher 1”, rev’d, No. 2:06-
mj-91, 2009 WL 424718 (D. Vt. Feb 19, 2009) (enforcing subpoena seeking
decrypted data, but not the password itself) (hereinafter “Boucher 2”).
[81] However, at least one commentator on Fifth Amendment jurisprudence argues
courts ought to reconsider whether to apply this key-combination dichotomy to
electronic passcodes:
Passwords should not be forced into this key-combination
dichotomy. They are neither a key nor a combination, and Court
doctrine suggests the dichotomy should not be mechanically
applied to new unlocking mechanisms. This dichotomy
developed because keys and combinations have different Fifth
Amendment implications—only combinations present the danger
of compelling the creation of evidence. So it follows that new
unlocking mechanisms with new implications should also be
treated differently. Passwords for encrypted data present new
41
If, however, the passcode were written down on a piece of paper and placed in a drawer, then production
of that passcode undoubtedly could be compelled because in those circumstances the passcode is
indistinguishable from a key. Terzian, 104 Geo. L.J. Online at 169 n.8 (noting “if the password is physically
recorded somewhere, the government can subpoena the production of that password” but “the subpoena
won’t yield anything if (when) the defendant responds that there is no written password”).
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 53 of 68
implications in interest balancing and therefore should be treated
differently. First, consider the interest balancing with safe
combinations. There, a fair state-individual balance favors the
individual—and compelled production is prohibited—because
there is little state need; law enforcement can easily crack a safe
through its own efforts. Contrast that with passwords. Law
enforcement usually cannot bypass them, leaving the data
inaccessible and creating great need for the password or
decrypted data’s production.
Terzian, 61 UCLA L. Rev. Discourse at 301-2.
[82] Others have challenged the logic of applying this key-combination dichotomy
because the government’s ability to open an electronic device should not be
determined by “whether [someone] protected that drive using a fingerprint key
or a password composed of symbols.” Spencer, 2018 WL 1964588 at *2. See
also State v. Stahl, 206 So.3d 124, 135 (Fla. Ct. App. 2016) (“we are not inclined
to believe that the Fifth Amendment should provide greater protection to
individuals who passcode protect their iPhones with letter and number
combinations than to individuals who use their fingerprint as the passcode”).
As the majority notes, there is little doubt that the government could compel a
citizen to display a physical characteristic, even if that characteristic might be
incriminating, because it is not testimonial. Slip op. at 14 n.14.42 Thus,
arguably, courts could compel citizens to open an electronic device that is
42
The majority then asserts this reasoning is “outdated and ironic when compared with” modern electronic
scanning mechanisms. Slip op. at 14 n.14. The majority does not explain how or why advanced scanning
equipment should lead courts to overturn the long-standing rule that physical characteristics are not
testimony, and I thus cannot agree with the majority that this rule is “outdated and ironic.” Id.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 54 of 68
unlocked by fingerprint, retinal scan, or face scan, because production of those
physical characteristics is not “testimony” prohibited by the Fifth Amendment.
See Schmerber v. California, 384 U.S. 757, 764 (1966) (physical evidence can be
compelled and Fifth Amendment does not protect against the compulsion to
provide fingerprints); Hubbell, 530 U.S. at 34-5 (“[E]ven though the act may
provide incriminating evidence, a criminal suspect may be compelled to put on
a shirt, to provide a blood sample or handwriting exemplar, or to make a
recording of his voice.”) (footnotes omitted); United States v. Hook, 471 F.3d 766,
773-74 (7th Cir. 2006) (“[T]he taking of blood samples or fingerprints is not
testimonial evidence and as such is not protected by the Fifth Amendment.”),
cert. denied. 549 U.S. 1343.
[83] The majority herein decides: “under the precedent as it now exists, we hold that
the State is seeking the electronic equivalent to a combination to a wall safe—
the passcode to unlock the iPhone.” Slip op. at 22. I do not believe the
precedent compels the result the majority reaches, because while a passcode is
similar to a combination, an electronic device arguably is materially
distinguishable from a wall safe. Nor do I believe the majority ought to be
deciding an issue that is not before us today, as Seo has not been asked to reveal
her password. See Carpenter, 2018 WL 3073916 at *13 (“Our decision today is a
narrow one. We do not express a view on matters not before us. . . . As Justice
Frankfurter noted when considering new innovations in airplanes and radios,
the Court must tread carefully in such cases, to ensure that we do not
‘embarrass the future.’”). I accordingly dissent from the majority’s
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 55 of 68
unnecessarily holding a passcode is the equivalent of a combination to a wall
safe.
[84] The trial court instead ordered Seo to produce the decrypted device. The
Eleventh Circuit considered whether forced decryption was testimonial and
determined it too was compelled testimony prohibited by the Fifth Amendment
because “the decryption and production of the hard drives would require the
use of the contents of Doe’s mind and could not be fairly characterized as a
physical act that would be nontestimonial in nature.” In re Grand Jury Subpoena
Duces Tecum Dated March 25, 2011, 670 F.3d at 1346.
[85] This Eleventh Circuit holding has been challenged on two grounds:
First, it misreads Supreme Court dicta. The dicta regards only
compelling production: The government can compel the
production of keys but not the production of combinations. It’s
silent on whether the government can compel unlocking (i.e.,
forcing a person to enter a combination without producing a
copy). This silence, coupled with the dicta’s rationale, suggests
that compelling unlocking may be constitutional. The reason for
the Court distinguishing between key- and combination-
productions stems from the Court’s concern over compelled
creation. Combinations may not exist outside a person’s mind,
so producing them would require compelling the creation of a
physical version, and it is this compelled creation that makes the
response testimonial. There are no such compelled creation
concerns with compelled unlocking through forced decryption—
the data is already there, the person just needs to unlock it; and
unlocking it does not require creating a physical copy of the
password.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 56 of 68
The second stumble comes in the Eleventh Circuit’s analysis of
mental effort. Entering an oft-used password requires no more
mental effort than finding a key. You remember the key’s
location and then find it, just as you remember the password and
then input it.
Dan Terzian, Forced Decryption as Equilibrium—Why It’s Constitutional and How
Riley Matters, 109 Nw. U. L. Rev. Online 56, 59-60 (2014).43
[86] The majority herein explicitly rejects the State’s attempt to distinguish
production of the passcode from production of the unlocked device “because
the end result is the same: the State is compelling Seo to divulge the contents of
her mind.” Slip op. at 25. By so holding, the majority has fallen into the first
“stumble” noted above – Seo is not being required to “divulge” anything from
her mind. Just the opposite, she is unlocking the device without revealing the
contents of her mind, and to the extent she is required to use her mind to do so,
the mental effort is no greater than the mental effort required to locate and
43
Elsewhere, Terzian objected to the Eleventh Circuit’s decision thus:
[The Eleventh Circuit] addressed the question of whether the Fifth Amendment bars the
compelled decryption and production of the now-unencrypted data. It held affirmatively
and explicitly framed the issue within this dichotomy, finding compelled decryption “most
certainly more akin to requiring the production of a combination.”
This reasoning ignores a pivotal prefatory question: Do passwords even belong in this
dichotomy? A computer password is not a safe combination. Sure, they are similar, but
that does not mean they must be treated the same. Combinations and keys are similar—
both unlock safes—yet they are treated differently because only the former implicated
compelled creation concerns.
It follows, then, that courts should treat passwords and combinations differently if they
have meaningfully different Fifth Amendment implications. And they do. Passwords and
encrypted data implicate fair balancing concerns that support permitting compelled
production, while combinations do not.
Terzian, 61 UCLA L. Rev. Discourse at 306.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 57 of 68
produce a key to a file cabinet. For these reasons, I would hold the only self-
incrimination ground for challenging the compelled production of an unlocked
and decrypted electronic device “lies in the testimonial aspects of the act-of-
production,” just as it does with the production of preexisting papers. Wayne
R. LaFave, Jerold H. Israel, Nancy J. King, & Orin S. Scott, The Schmerber rule,
3 CRIM. PROC. § 8.12(d) n.48 (4th ed. Dec. 2017 Update) (hereinafter “LaFave
et al., Schmerber rule”). And it is to this issue that I turn next.
Act of Production, Foregone Conclusion, & Reasonable Specificity
[87] The act of producing a decrypted device might itself be protected by the Fifth
Amendment. See Hubbell, 530 U.S. at 37 (“Whether the constitutional privilege
protects . . . the act of production itself . . . is a question that is distinct from the
question whether the unprotected contents of the documents themselves are
incriminating.”). To explain why I do not believe Seo’s production of her
decrypted iPhone implicates Fifth Amendment concerns, I begin with a
discussion of the relevant case law.
[88] Our country’s Highest Court explained:
The act of producing evidence in response to a subpoena
nevertheless has communicative aspects of its own, wholly aside
from the contents of the papers produced. Compliance with the
subpoena tacitly concedes the existence of the papers demanded
and their possession or control by the taxpayer. It would also
indicate the taxpayer’s belief that the papers are those described
in the subpoena. The elements of compulsion are clearly present,
but the more difficult issues are whether the tacit averments of
the taxpayer are both “testimonial” and “incriminating” for
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 58 of 68
purposes of applying the Fifth Amendment. These questions
perhaps do not lend themselves to categorical answers; their
resolution may instead depend on the facts and circumstances of
particular cases or classes thereof.
Fisher, 425 U.S. at 410 (internal citation omitted).
[89] In Fisher, the government subpoenaed tax preparation documents that had been
produced by an accountant and were in the accountant’s files. The Court noted
the Fifth Amendment did not apply to the documents themselves “because the
documents were created voluntarily and the Government had not compelled
their creation.” Jeffrey Kiok, Missing the Metaphor: Compulsory Decryption and the
Fifth Amendment, 24 B.U. Pub. Int. L.J. 53, 61 (Winter 2015) (citing Fisher, 425
U.S. at 410 n.11). The Fisher Court determined “the act of producing [the
papers] would not itself involve testimonial self-incrimination.” 425 U.S. at
411.
The papers belong to the accountant, were prepared by him, and
are the kind usually prepared by an accountant working on the
tax returns of his client. Surely the Government is in no way
relying on the “truth-telling” of the taxpayer to prove the
existence of or his access to the documents. The existence and
location of the papers are a foregone conclusion and the taxpayer
adds little or nothing to the sum total of the Government’s
information by conceding that he in fact has the papers. Under
these circumstances by enforcement of the summons “no
constitutional rights are touched. The question is not of
testimony but of surrender.”
Id. (internal citations omitted).
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 59 of 68
[90] That holding by the Fisher Court created what has become known as the
foregone conclusion standard, which has been described thus:
Where the existence and possession of the documents to be
produced are a “foregone conclusion,” the act of production
similarly “adds little or nothing to the sum total of the
government’s information” and therefore is no more testimonial
than other compelled physical acts. The government in such a
case obviously is not seeking the assertions of the subpoenaed
party as to the facts of existence and possession, and his
incidental communication as to those facts, inherent in the
physical act that the government had the authority to compel,
therefore does not rise to the level of compelled “testimony.”
Wayne R. LaFave, Jerold H. Israel, Nancy J. King, & Orin S. Kerr, Testimonial
character and the foregone conclusion standard, 3 CRIM. PROC. § 8.13(a) (4th ed.
Dec. 2017 Update) (hereinafter “LaFave et al., Foregone Conclusion”).
[91] In United States v. Doe, 465 U.S. 605, 613 (1984) (hereinafter, “Doe 1”), the
Supreme Court was again asked to decide whether the act of producing
documents would violate a citizen’s Fifth Amendment right. The District
Court had found “enforcement of the subpoenas would compel [respondent] to
admit that the records exist, that they are in his possession, and that they are
authentic.” Id. at 613 n.11. The Supreme Court noted it could “not over turn
that finding unless it has no support in the record.” Id. at 614. Based thereon,
the Supreme Court held Doe’s act of producing the subpoenaed documents to
be protected by the Fifth Amendment privilege against self-incrimination. Id. at
614.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 60 of 68
Subsequent to Doe [1], lower court rulings generally insisted that
the foregone conclusion standard be met by the government
“demonstrat[ing] with reasonable particularity that it knows of
the existence and location of subpoenaed documents.” Those
rulings recognized, however, that there are a variety of ways in
which such a demonstration may be made. These include: some
prior action by the subpoenaed party acknowledging that the
particular documents existed and were in his possession;
identification of some person (as in the case of the accountants in
Fisher) who can testify that the particular documents were
previously in the possession of the subpoenaed party; documents
or similar evidence in the government’s possession which would
indicate that the subpoenaed documents exist and are in the
subpoenaed person’s possession; and the fact that the documents
are of a type regularly sent to the subpoenaed person by another
doing business with that person, combined with absence of any
dispute as to whether he received such documents. Similarly, as
to authentication, courts held that the foregone conclusion
standard is met where the government can point to another
person (e.g., the preparer of the document) who can authenticate,
or where authentication can be achieved by other means (e.g.,
comparison with other documents independently authenticated
or matching the handwriting with that of the subpoenaed party).
As with existence and possession, the government must point to
a specific avenue of authentication “by means independent of the
producer’s act of production. To merely state that [the
government] will not utilize the act of production would amount
to no more than an informal offer of immunity, which Doe [1]
rejected as an inappropriate grounding for enforcing the
subpoena.
LaFave et al., Foregone Conclusion (footnotes omitted).
[92] Then, in Hubbell, the Supreme Court was asked to decide “whether the Fifth
Amendment privilege protects a witness from being compelled to disclose the
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 61 of 68
existence of incriminating documents that the Government is unable to describe
with reasonable particularity[.]” Hubbell, 530 U.S. at 29-30 (footnote omitted).
There, the governments subpoenaed eleven categories of documents from a
grand jury witness, Hubbell. Hubbell invoked his Fifth Amendment privilege
and refused to admit whether he had such documents. The prosecutor then
promised Hubbell immunity, and Hubbell produced 13,120 pages of documents
and testified those were all the documents in his control that were requested by
the subpoena.44 Id. at 31. Based on the information in those documents, the
government brought a second set of charges against Hubbell for crimes the
government had not been investigating when Hubbell responded to the
subpoena. Instead, the government had discovered those crimes by studying
the contents of the documents Hubbell produced. Id. at 32.
[93] The Supreme Court noted:
[W]hen the custodian of documents responds to a subpoena, he
may be compelled to take the witness stand and answer questions
designed to determine whether he has produced everything
demanded by the subpoena. The answers to those questions, as
well as the act of production itself, may certainly communicate
information about the existence, custody, and authenticity of the
documents.
44
All, that is, except those protected by attorney-client privilege or work-product privilege. Hubbell, 530 U.S.
at 31.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 62 of 68
Id. at 37. The Court then held Hubbell’s act of production had a testimonial
aspect because the government had not demonstrated the testimony produced
was a foregone conclusion:
Whatever the scope of this “foregone conclusion” rationale, the
facts of this case plainly fall outside of it. While in Fisher the
Government already knew that the documents were in the
attorneys’ possession and could independently confirm their
existence and authenticity through the accountants who created
them, here the Government has not shown that it had any prior
knowledge of either the existence or the whereabouts of the
13,120 pages of documents ultimately produced by respondent.
Id. at 44-45.
[94] Because Hubbell did not clarify the scope of the foregone conclusion standard,
lower courts have continued to struggle with determining whether an act of
production is both testimonial and incriminating based “on the facts and
circumstances of particular cases.” Fisher, 425 U.S. at 410. Courts have
especially had difficulty when applying this standard to compulsory decryption
of an electronic device, “often reconsidering and overturning their own prior
orders when faced with changing facts, or facts that were not well-understood in
the first place.” Kiok, 24 B.U. Pub. Int. L.J. at 65.
[95] The majority’s review of the parties’ arguments provides citation to many of
these cases, with parentheticals describing the various holdings, so I need not
repeat all of them here. See Slip op. at 29-31. Instead, I provide this summary:
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 63 of 68
A defendant’s ability to invoke the Fifth Amendment in the
context of a compulsory order to decrypt will depend on the
foregone conclusion doctrine and events that in all likelihood
long preceded the subpoena or warrant. The foregone conclusion
doctrine will permit the Government to compel a defendant
when the Government can otherwise prove that the hard drive
and its data was the sole property of the defendant. If a
defendant confesses to possession of the drive, that may suffice.
If the Government can view some portion of the hard drive and
determine that the files belonged to one individual, that too may
suffice.
Kiok, 24 B.U. Pub. Int. L.J at 77-78 (footnotes omitted).
[96] Herein, the majority holds that
what the State seeks to compel is not merely the password, but
the entire contents of Seo’s iPhone. Thus, for the foregone
conclusion rationale to apply, the State must be able to describe
with reasonable particularity the discrete contents on Seo’s
phone—e.g., all texts to D.S. created on Seo’s iPhone—that it is
compelling her to not only produce, but to re-create by entering
her passcode and decrypting the contents of the phone. This is a
burden the State has not met.
Slip op. at 31 (emphasis in original).
[97] However, in so holding, the majority has followed authority that, I believe,
misapplies the foregone conclusion doctrine to electronic devices. 45 The State
45
In addition, the majority’s holding relies on a premise that I do not accept – that the contents of a
decrypted electronic device are the equivalent of testimony created by compulsion. See supra Encryption and
Its Implications.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 64 of 68
has not presented Seo with a subpoena requiring her to produce each text
message she sent to D.S., such that Seo must, like Hubbell, use her mind to
discern which text messages fit within the categories of messages requested and
then testify that she produced all relevant requested evidence. See Hubbell, 530
U.S. at 45 (“the Government has not shown that it had any prior knowledge of
either the existence or the whereabouts of the 13,120 pages of documents
ultimately produced by respondent”). Nor has Seo been ordered to sort
through thousands of electronic devices in her possession to produce those
devices that contain the requested evidence.
[98] Instead, the State has asked Seo to unlock a file cabinet so that the State may
search within that file cabinet for evidence of specific crimes the State is already
investigating. The State’s right to access such a file cabinet will undoubtedly
require a Fourth Amendment showing of probable cause to believe the
particular evidence sought will exist within that cabinet. See U.S. Const.
amend. IV (“no Warrants shall issue, but upon probable cause, supported by
Oath or affirmation, and particularly describing the place to be searched, and
the persons or things to be seized”). But the validity under the Fourth
Amendment of the order for Seo to open her phone is not before us, and the
Fifth Amendment does not require the State to demonstrate in advance “the
discrete contents” of the evidence that will be found in a cabinet,46 see United
46
Even if I could agree with my colleagues that the reasonable particularity standard required the State to
make a showing, with reasonable particularity, of the evidence it expects to find within the electronic device
being sought, I would be hesitant to hold, based on the record before us, that the State had not met that
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 65 of 68
States v. Fricosu, 841 F.Supp.2d 1232, 1237 (D. Col. 2012) (“[T]he government
knows of the existence and location of the computer’s files. The fact that it
does not know the specific content of any specific documents is not a barrier to
production[.]”), because the Fifth Amendment does not protect the content of
the documents. See Fisher, 425 U.S. at 409 (“the Fifth Amendment would not
be violated by the fact alone that the papers on their face might incriminate the
taxpayer, for the privilege protects a person only against being incriminated by
his own compelled testimonial communications”).
standard herein. At the hearing on the State’s motion for rule to show cause, Detective Inglis testified that
Seo initially used her own phone number to contact D.S.; however,
[t]hen the contact to [D.S.] started coming from more random phone numbers that when I
would try and research the phone number to find out who it belonged to, or who it was
assigned to, there was no record of it being assigned to anybody and the numbers would
change. He would get a dozen or 30 phone calls or texts from one number and then the
next day it would be a different number but it would obviously be conversations that were
linked with the same.
(Tr. at 7.) D.S. was contacted by “dozens of phone numbers.” (Id.) Detective Inglis said “it appeared that
she was using an ap [sic] or an internet program such as Google Voice or Pinger to disguise her phone
number so that it wouldn’t show up in his caller ID.” (Id. at 8.) The State asked Detective Inglis if he had
subpoenaed the Apps or Internet services that could mask identity, and he testified:
There are numerous, and there’s probably some that I’m not even aware of, numerous
entities out there like Google Voice and Pinger and Text Now and Text Me, and I don’t
know, I don’t have an all-encompassing list of them, however if I had the phone I could see
which ones she had accessed.
(Tr. at 12.) Thus, it seems self-evident the State is seeking evidence on Seo’s phone of an App or multiple
Apps that would allow her to mask her identity and evidence that Seo’s phone had generated the phone calls
and texts that D.S. received from phone numbers that did not belong to any other person.
Also troubling for me is the majority’s insistence “the State has not described with reasonable particularity
the digital files or data it seeks to compel,” (Slip op. at 33 n.25; and see id. at 32), when the Record provided to
us on Appeal does not contain any of the documentation or testimony provided to the trial court before the
search warrant was issued. I acknowledge “the warrant itself does not describe with any particularity the
digital information the State seeks to compel,” (id. at 33), but I would not infer from the absence of such
description in the warrant that the evidence is likewise absent from portions of the Record that Seo has not
provided to us.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 66 of 68
[99] Because of this material distinction between the order in Hubbell and this order
to open an iPhone, the only testimony being implied by Seo’s act of decrypting
the phone is that the phone is hers and she has the ability to unlock it. 47 These
are facts the State can already prove by “clear and convincing evidence,”
Spencer, 2018 WL 1964588 at *3 (“The appropriate standard is instead clear and
convincing evidence. This places a high burden on the government to
demonstrate that the defendant’s ability to decrypt the device at issue is a
foregone conclusion.”), because Seo has already unlocked the phone for police
when she gave it to them to download, the investigating officer had called Seo
at the phone number associated with the phone in question, and Seo admitted
the phone was hers when she was arrested. As such, Seo’s act of production
does “not itself involve testimonial self-incrimination.” Fisher, 425 U.S. at 411;
see Spencer, 2018 WL 1964588 (foregone conclusion applies where defendant
admitted buying and encrypting external hard drive matching one found in his
house); Friscosu, 841 F. Supp. 2d at 1236-37 (foregone conclusion applies where
State knows computer belongs to defendant and knows she has password).
In Summary
[100] The Fifth Amendment is intended to prohibit the government from compelling
incriminating testimony, not to protect the privacy of personal information.
The Fifth Amendment could not have been intended to create a zone-of-
47
Moreover, it is unnecessary to “ask whether the government has established with ‘reasonable particularity’
that the defendant is able to decrypt a device. . . . [A] defendant’s ability to decrypt is not subject to the same
sliding scale. He is either able to do so, or he is not.” Spencer, 2018 WL 1964588 at *3.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 67 of 68
lawlessness outside a person’s mind that the government would be unable to
police to maintain the safety of all citizens. While decrypting an electronic
device requires the use of the contents of the owner’s mind, the task requires
such little mental effort that I would hold the only Fifth Amendment barrier to
production of the decrypted device is if the act of production itself implies
incriminating testimony. The act of production cannot, however, produce
incriminating testimony when the facts confirmed by that decryption – that the
citizen owns the device and has the ability to decrypt it – are a foregone
conclusion because the government already has clear and convincing evidence
of those facts.
[101] As Seo unlocked her phone for police on another occasion, as police had
contacted Seo on that phone, and as Seo admitted the phone was hers when she
was arrested, I would hold Seo’s possession and ability to decrypt the phone are
foregone conclusions. Seo therefore can be compelled to decrypt her phone
without infringing the Fifth Amendment.
[102] For all these reasons, I respectfully dissent.
Court of Appeals of Indiana | Opinion 29A05-1710-CR-2466 | August 21, 2018 Page 68 of 68