Matthew Tyler Pollard v. State of Florida

FIRST DISTRICT COURT OF APPEAL STATE OF FLORIDA _____________________________ No. 1D18-4572 _____________________________ MATTHEW TYLER POLLARD, Petitioner, v. STATE OF FLORIDA, Respondent. _____________________________ Petition for Writ of Prohibition—Original Jurisdiction. June 20, 2019 MAKAR, J. To what extent does the Fifth Amendment right against self- incrimination protect a suspect in a criminal case from the compelled disclosure of a password to an electronic communications device in the state’s possession? Courts differ in their legal analysis of this question, resulting in no consensus in state and federal courts; indeed, different approaches currently exist between two Florida appellate courts on the topic. In this case, we conclude that the proper legal inquiry on the facts presented is whether the state is seeking to compel a suspect to provide a password that would allow access to information the state knows is on the suspect’s cellphone and has described with reasonable particularity. Matthew Tyler Pollard was arrested and charged with armed robbery of two victims who were misled into believing they were buying drugs. Pursuant to a warrant, the state seized an iPhone® from Pollard’s car and filed a motion to compel Pollard to disclose the phone’s passcode so that it could access broad categories of encrypted information on the cellphone. The information sought was described in general terms and broad categories in the investigating detective’s affidavit in support of the search warrant: • Call/text/communication history on and between June 19, 2018 and June 25, 2018. • Content of communications on and between June 19, 2018 and June 25, 2018. • Picture(s) of narcotics, money, firearms. • Written information about the illegal purchase, possession, and sale of illegal narcotics, and or plans of a robbery on and between June 19, 2018 and June 25, 2018. • Activity listed in phone applications: Facebook, Facebook Messenger, etc., concerning buying, selling, or possessing illegal narcotics and or planning a robbery on and between June 19, 2018 and June 25, 2018. The affidavit did not state the existence or content of any specific text, picture, call or other particular information. It noted, however, that “it was reasonable to believe” that a co-defendant, Draven Rouse, had “communicated with Pollard via cell phone” both prior to and on the day of the robbery, presumably to coordinate the robbery. Based on his training and experience, the detective stated that persons in “criminal enterprises” sometimes use cellphones to communicate and coordinate activities with accomplices, to document criminal activities, and to compile contacts useful in a criminal investigation; he did not, however, identify any specific item that was on Pollard’s cellphone, only that the state wished to seize from the cellphone all items in the categories of information listed above. Accessing the cellphone’s content required a passcode, which the state in a one-page motion sought to compel from Pollard. The state’s motion—and the trial court’s favorable ruling—relied 2 exclusively on State v. Stahl, 206 So. 3d 124 (Fla. 2d DCA 2016), which upheld the compelled production of a cellphone’s passcode over a defendant’s Fifth Amendment objection that doing so violated his right not to testify as to the “contents of his mind,” i.e., knowledge of the passcode itself. The trial court relied on Stahl, even though it arose in another district and (as discussed later) involved different facts, because no other Florida court had weighed in on the general topic at that time. Pardo v. State, 596 So. 2d 665, 666 (Fla. 1992) (“in the absence of interdistrict conflict, district court decisions bind all Florida trial courts.”). Based on Stahl, the trial court held the state established that the cellphone was Pollard’s, that it was password protected, and that if the password compelled from Pollard made the cellphone’s content accessible, the password was deemed authentic, thereby requiring Pollard to provide the password. Quoting Stahl, the trial court also noted that the state had established by independent means the “‘existence, possession, and authenticity of the documents’ it seeks to recover from [Pollard’s] phone.” 206 So. 3d at 135. It concluded that the “State already knows the information it is seeking [Pollard] to produce and why.” The trial court did not identify any specific documents or information in this regard, but noted that “at [a] minimum, text messages” were part of the coordinated effort to conduct the robbery. No limits were placed on the scope of the search of the contents of the cellphone, but the state was prohibited from using the compelled production of Pollard’s password as evidence at trial; no limitation was put on use of the documents and information that might be discovered. The password was placed in a sealed and confidential file pending resolution of Pollard’s petition for writ of prohibition, which seeks to prevent the compelled use of the embargoed password. We treat the petition as a petition for writ of certiorari, which requires a departure from the essential requirements of the law that results in material injury that cannot be corrected post-judgment. Art. V, § 4(b)(3), Fla. Const. (2019); Stahl, 206 So. 3d at 129; Grant v. State, 832 So. 2d 770, 771 (Fla. 5th DCA 2002). Courts nationwide are struggling to find common legal ground on the constitutionality of compelled password production under the Fifth Amendment and its application in specific cases. U.S. Const. amend. V. (“No person . . . shall be compelled in any 3 criminal case to be a witness against himself”); see also Art. I, § 9, Fla. Const. (2019) (same); see generally Marjorie A. Shields, Fifth Amendment Privilege Against Self-Incrimination as Applied to Compelled Disclosure of Password or Production of Otherwise Encrypted Electronically Stored Data, 84 A.L.R. 6th 251 (2019) (compiling Fifth Amendment cases involving “compelled disclosure of an individual's password, means of decryption, or unencrypted copy of electronically stored data.”). The Fifth Amendment forbids a governmentally-compelled testimonial communication (or act) that tends to incriminate the communicator (or actor). In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011, 670 F.3d 1335, 1341 (11th Cir. 2012). “The touchstone of whether an act of production is testimonial is whether the government compels the individual to use ‘the contents of his own mind’ to explicitly or implicitly communicate some statement of fact. Id. at 1345 (quoting Curcio v. United States, 354 U.S. 118, 128 (1957)). Forcing a defendant to disclose a password, whether by speaking it, writing it down, or physically entering it into a cellphone, compels information from that person’s mind and thereby falls within the core of what constitutes a testimonial disclosure. In this case, Pollard was compelled to act in a testimonial manner by disclosing a password known only in his mind. In this type of password compulsion case, the law is unsettled as to whether a “foregone conclusion” exception might apply, i.e., where the government knows that identifiable documents exist under a defendant’s control such that obtaining them via a compelled disclosure of a password is a mere formality and thereby non-testimonial. The Supreme Court has approved the exception’s use but not in the context of a compelled passcode disclosure. See G.A.Q.L., 257 So. 3d at 1066 (Fla. 4th DCA 2018) (“The Supreme Court has applied the foregone conclusion exception only when the compelled testimony has consisted of existing evidence such as documents.”) (Kuntz, J., concurring in result). Florida is no exception in the national judicial debate over compelled password production. Since the trial court’s ruling, the Fourth District issued its opinion in G.A.Q.L. v. State, 257 So. 3d 1058, 1062 (Fla. 4th DCA 2018), which seemingly conflicts with the approach taken in Stahl as to the foregone conclusion 4 exception and allows compelled production of information where the testimonial value of doing so is negligible. As a result, two different analytical methods currently exist in Florida, though both apply the same two-step framework, which asks (a) is the compelled production of the password a testimonial and potentially incriminating act, and, if so, (b) is the compelled password production nonetheless permissible under the foregone conclusion exception because its testimonial value is inconsequential due to the state already knowing of the existence of the requested information. Id. at 1063 (“Under this exception, an act of production is not a violation of the Fifth Amendment— even if it conveys a fact—if the state can show with reasonable particularity that, at the time it sought to compel the act of production, it already knew of the materials sought, thereby making any testimonial aspect a foregone conclusion.”); Stahl, 206 So. 3d at 135 (“That is, by implicitly admitting the existence of the evidence requested and that it is in the accused's possession the accused ‘adds little or nothing to the sum total of the Government's information’; the information provided is a foregone conclusion.”) (quoting Fisher v. United States, 425 U.S. 391, 411 (1976) (“The existence and location of the [tax-preparation] papers are a foregone conclusion” such that taxpayer’s compelled production of them “adds little or nothing to the sum total of the Government's information by conceding that he in fact has the papers. Under these circumstances by enforcement of the summons ‘no constitutional rights are touched. The question is not of testimony but of surrender.’”)) (citation omitted); see generally Fern L. Kletter, Construction and Application of "Foregone Conclusion" Exception to Fifth Amendment Privilege against Self- Incrimination, 25 A.L.R. Fed. 3d Art. 10 (2017) (compiling cases that discuss the foregone conclusion exception). For example, if the central feature in a criminal case is what files are on a cellphone, and the state can establish that a defendant’s cellphone contains files that are described with “reasonable particularity,” the compelled production of the password to access those files (but only those files) does no damage to the defendant’s constitutional right against self-incrimination where sufficient evidence establishes that it is his phone on which the files reside. In contrast, if a central feature of a criminal case is who owns a seized cellphone or has the code to access it, 5 compelling a defendant to provide a password may be testimonial and incriminating because it proves an unknown fact, i.e., who is the cellphone’s owner or who can access it. For instance, if an employee was alleged to have broken into a password protected computer system, and caused cyber-harm therein, evidence as to his ability to access the system (i.e., possession of the password) would be incriminating because it supports the ability to access the system. In Stahl, a video voyeurism case, the defendant used a cellphone to take video under a customer’s skirt, was identified via store surveillance video, and arrested. After his locked cellphone was produced pursuant to a search warrant, he admitted it was his cellphone and initially agreed to permit police to search it for images, but he changed his mind, resulting in the state’s request to compel its password. Under those circumstances, the Second District concluded that compulsion of the passcode was not a Fifth Amendment violation under the foregone conclusion exception. The three-part test for the foregone conclusion exception requires that the state “must show with reasonable particularity that, at the time it sought the act of production, it already knew the evidence sought existed, the evidence was in the possession of the accused, and the evidence was authentic.” Stahl, 206 So. 3d at 135 (citing In re Grand Jury Subpoena, 670 F.3d at 1344 (“Where the location, existence, and authenticity of the purported evidence is known with reasonable particularity, the contents of the individual's mind are not used against him, and therefore no Fifth Amendment protection is available.”) (footnote omitted). Stahl’s application of foregone conclusion exception focused on disclosure of the password itself, rather than the information that access to the cellphone would produce. Stahl viewed the forced disclosure of the password as non-testimonial because the existence, custody, and authenticity of the password were a “foregone conclusion” under the facts of that case. No one disputed that the cellphone was the defendant’s and that he put it under a customer’s skirt with its flash enabled and appeared to take pictures that would be accessible in the cellphone’s memory (or via cloud storage). The testimonial value of compelling the cellphone’s password was negligible under the circumstances: it was Stahl’s phone, evidence established his use of the phone during the 6 incident for flash-photography, and he initially agreed to allow police to search the phone, thereby inferring his knowledge of the passcode and its authenticity. By its holding, Stahl stands for the proposition that where the state establishes factually that it knows that a password existed, that the suspect possesses or controls the password, and that the suspect’s actions disclosed or authenticated the password sought (here by Stahl initially agreeing to allow police to access the phone), it is a foregone conclusion to force its disclosure. A similar result arose in State v. Johnson, WD 80945, 2019 WL 1028462 (Mo. Ct. App. Mar. 5, 2019), which involved compelled production of a passcode by a defendant who had previously entered it into his phone in the presence of government actors. The facts conveyed through his act of producing the passcode were the existence of the passcode, his possession and control of the phone’s passcode, and the passcode’s authenticity. The State showed that it had prior knowledge of those facts because Johnson knowingly and voluntarily entered the passcode the first time in the presence of law enforcement and defense counsel for the purpose of having his expert examine the phone; hence, their disclosure a second time pursuant to the order to compel was a foregone conclusion. Id. at *14 (footnote omitted). Because the defendant had already openly used the passcode in the manner described, the “compelled act of production was not testimonial” and not a Fifth Amendment violations. Id. Unlike Stahl and Johnson, the decision in G.A.Q.L was not based on application of the foregone conclusion exception to unearth a passcode about which the state had prior knowledge via its open use by the suspect (Johnson) or the suspect’s initial agreement to disclose it (Stahl). Instead, G.A.Q.L. focused on the state’s goal of accessing the information on the suspect’s cellphone because the state lacked prior knowledge of the suspect’s password. In Stahl, the court noted that the state sought “the phone passcode not because it wants the passcode itself, but because it wants to know what communications lie beyond the 7 passcode wall.” G.A.Q.L., 257 So. 3d at 1062. The court in G.A.Q.L. concluded that compelling the passcode was akin to a testimonial act (i.e., revealing the “contents of the mind” of the minor) protected by the Fifth Amendment. It rejected Stahl’s analysis under the foregone conclusion exception, applying the three-part test to the information sought rather than the passcode. Id. at 1063 (“It is critical to note here that when it comes to data locked behind a passcode wall, the object of the foregone conclusion exception is not the password itself, but the data the state seeks behind the passcode wall.”). In rejecting Stahl’s password-centric approach, the court said that to do “otherwise would expand the contours of the foregone conclusion exception so as to swallow the protections of the Fifth Amendment.” Id. It pointed out that under the approach in Stahl “every password-protected phone would be subject to compelled unlocking since it would be a foregone conclusion that any password-protected phone would have a passcode. That interpretation is wrong and contravenes the protections of the Fifth Amendment.” Id. * The application of Stahl is inconsistent with protection of a defendant’s right against self-incrimination in situations where a defendant has not given up his testimonial privilege in the * Judge Kuntz concurred in the result, noting that the “foregone conclusion exception is a judicially created exception” to the Fifth Amendment with limited application to compelled production of documents. G.A.Q.L., 257 So. 3d at 1066 (Kuntz, J., concurring in result). His conclusion, that “the foregone conclusion doctrine cannot apply to compelled oral testimony,” is based on the principle that forcing an “accused to orally communicate to the government information maintained only in his mind would certainly compel oral testimony.” Id. His bright-line approach is appealing and has the virtue of consistency with the intent of the Founders to protect against surrendering incriminating evidence before or at trial. See Donald Dripps, Self-Incrimination, in THE HERITAGE GUIDE TO THE CONSTITUTION 437-439 (David F. Forte & Matthew Spalding eds., 2d ed. 2014) (noting that the Supreme Court in the 1880s “took the view that the privilege protected private books and papers” but has since “changed significantly” Fifth Amendment doctrine.). 8 password itself. Unlike the situations in Stahl and Johnson, no evidence establishes that Pollard had previously given up his privilege in the password sought. In these situations, as the court in G.A.Q.L. noted, the three-part test is tautological when applied to passwords because all password-protected cellphones have an “authentic” password, making the Stahl test somewhat circular. In this regard, the court in Stahl said that “[i]f the phone or computer is accessible once the passcode or key has been entered, the passcode or key is authentic,” 206 So. 3d at 136, which begs the question of whether sufficient evidence established that the passcode is authentic before it had been compelled and used successfully. The state must have sufficient proof of authenticity before it can compel the password’s production; simply because a compelled password unlocks a cellphone after the fact doesn’t make it authentic ex ante. To do otherwise is “like telling an inquisitor the combination to a wall safe, not like being forced to surrender the key to a strongbox.” United States v. Hubbell, 530 U.S. 27, 43 (2000). The approach in Stahl makes sense, however, in those limited situations where the state establishes that the testimonial value of the compelled password has been abandoned, such as where a defendant has voluntarily entered his passcode to access his cellphone in the presence of law enforcement such that the testimonial value of compelling the passcode’s production a second time is negligible. Johnson, 2019 WL 1028462, at *14 (state showed that defendant “knowingly and voluntarily entered the passcode the first time in the presence of law enforcement and defense counsel for the purpose of having his expert examine the phone; hence, their disclosure a second time pursuant to the order to compel was a foregone conclusion.”). We note that it becomes predominantly a Fourth Amendment issue, not a Fifth Amendment one, in such cases as to the scope of what the state is allowed access in using the compelled password. Turning back to G.A.Q.L., that court held that “if the state can meet the requirements of the foregone conclusion exception, it may compel otherwise ostensibly self-incriminating testimonial production of information.” 257 So. 3d at 1063. 9 Under this exception, an act of production is not a violation of the Fifth Amendment—even if it conveys a fact—if the state can show with reasonable particularity that, at the time it sought to compel the act of production, it already knew of the materials sought, thereby making any testimonial aspect a foregone conclusion. . . . As it pertains to electronic files, this doctrine requires that the state demonstrate with reasonable particularity “that (1) the file exists in some specified location, (2) the file is possessed by the target of the subpoena, and (3) the file is authentic.” Id. (citing In re Grand Jury Subpoena, 670 F.3d at 1349 n.28). In applying the three-part test, the court concluded that the state failed to identify with reasonable particularity any specific files sought on the minor’s cellphone. It noted that “the state's subpoena fails to identify any specific file locations or even name particular files that it seeks from the encrypted, passcode-protected phone. Instead, it generally seeks essentially all communications, data, and images on the locked iPhone.” G.A.Q.L., 257 So. 3d at 1064 (emphasis added). At best, the prosecutor at a hearing said a surviving passenger had been communicating with the minor via Snapchat and text message on the day of the accident and after the accident, but it held that “this stand-alone statement is not enough to meet the ‘reasonable particularity’ requirement of the foregone conclusion exception.” Id. “It is not enough for the state to infer that evidence exists—it must identify what evidence lies beyond the passcode wall with reasonable particularity.” Id. The court in G.A.Q.L. therefore concluded that the foregone conclusion exception was not met. We agree with the Fourth District that unless the state can describe with reasonable particularity the information it seeks to access on a specific cellphone, an attempt to seek all communications, data and images “amount[s] to a mere fishing expedition.” Id. On the assumption that the foregone conclusion exception applies to core testimonial communications, such as a compelled oral disclosure of a password, it is not applicable here because the state failed to identify with particularity and certainty what information existed beyond the password-protected cellphone wall; mere inference that evidence may exist is not 10 enough. In re Grand Jury Subpoena, 670 F.3d at 1347 (“Case law from the Supreme Court does not demand that the Government identify exactly the documents it seeks, but it does require some specificity in its requests—categorical requests for documents the Government anticipates are likely to exist simply will not suffice.”). Applied here, the state’s generalized requests for multiple categories of communications, pictures, and social media activity fit the description of net cast far too broadly. The only category of information that potentially meets the reasonable particularity standard is the investigating officer’s affidavit, which avers only that “it is reasonable to believe” that a co-defendant had “communicated with Pollard via cell phone” leading up to and on the day the robbery occurred. The basis for this belief is that because the co-defendant had sent text messages to another person involved in the robbery, it would be reasonable to believe that the co-defendant must have communicated with Pollard in a similar manner as well, even though no specific communication is identified or alleged. As in G.A.Q.L., the evidentiary record is too thin to conclude that the foregone conclusion exception applies. At best, the officer believed that text messages likely existed on Pollard’s phone because most criminal enterprises of this type operate via coordinated electronic communications that would leave a discoverable digital trail, but this generalized belief falls short of the reasonable particularity standard. See Hubbell, 530 U.S. at 45 (government’s deficient identification of particular documents sought cannot be cured by “the overbroad argument that a businessman such as [Hubbell] will always possess general business and tax records that fall within the broad categories described in this subpoena.”). In conclusion, we grant the writ of certiorari and quash the trial court’s order. PETITION GRANTED; ORDER QUASHED JAY, J., concurs; WINOKUR, J., dissents with opinion. 11 _____________________________ Not final until disposition of any timely and authorized motion under Fla. R. App. P. 9.330 or 9.331. _____________________________ WINOKUR, J., dissenting. The Fifth Amendment’s Self-Incrimination Clause, the relevant provision here, “provides: ‘No person ... shall be compelled in any criminal case to be a witness against himself’” and, at its core, “is a prohibition on compelling a criminal defendant to testify against himself at trial.” United States v. Patane, 542 U.S. 630, 637 (2004) (quoting amend. V, U.S. Const.). Upon compulsion, an “act of producing evidence” that is incriminating could have “communicative aspects” sufficient to implicate the Fifth Amendment, but this is not the case when the evidence the state seeks to compel production of is a “foregone conclusion” known by the state, eliminating its testimonial worth. Fisher v. United States, 425 U.S. 391, 410-11 (1976). In holding that the Fifth Amendment bars the state from compelling an accused to produce the password to his cell phone—where he does not dispute the existence of the password or his knowledge of it—the majority conflates Fifth Amendment jurisprudence with the protections provided in the Fourth Amendment, 1 which is not at issue. I would deny relief. I. Matthew Pollard was arrested and charged, along with co- defendants, with armed robbery. The state proved to the trial court 1 “The Fourth Amendment protects ‘[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures,’” Carpenter v. United States, 138 S. Ct. 2206, 2213 (2018), and was purposed “to safeguard the privacy and security of individuals against arbitrary invasions by governmental officials,” id. (quoting Camara v. Mun. Court of City & Cty. of San Francisco, 387 U.S. 523, 528 (1967)). 12 that Pollard participated in the robbery and provided the firearm, and that he and the co-defendants planned the robbery through text messages. The state sought a search warrant for Pollard’s phone, asserting probable cause that the phone contained incriminating evidence, which the trial court issued and Pollard unsuccessfully challenged. After seizing Pollard’s phone, law enforcement was unable to access its contents without his passcode and the state filed a motion to compel him to produce it. Pollard objected, arguing that production of the password could not be severed from production of the data inside the phone (which is what the state truly sought) and the state has not adequately identified the data in the phone for the “foregone conclusion” exception to apply. The trial court found that the phone belonged to Pollard, he knew its passcode, and it could not be accessed without the passcode—none of which was disputed—and granted the motion to compel pursuant to State v. Stahl, 206 So. 3d 124 (Fla. 2d DCA 2016). The trial court ordered Pollard to provide his passcode, ruled that the state could not use his production of the passcode as evidence at trial, and allowed the passcode he provided to be sealed pending our review. II. The Fifth Amendment “applies only when the accused is compelled to make a Testimonial Communication that is incriminating.” Fisher, 425 U.S. at 408; see also Doe v. United States, 487 U.S. 201, 207 (1988) (finding that compliance would be compelled and incriminating, thus the only question is whether it would be a “testimonial communication”). Here, the parties do not dispute that disclosure of the passcode is being compelled or that it would be incriminating. The question at issue is whether Pollard’s act of producing his password is a testimonial communication. Testimonial Communication “[I]n order to be testimonial, an accused’s communication must itself, explicitly or implicitly, relate a factual assertion or disclose information.” Doe, 487 U.S. at 210. For this reason, compelled acts that do not require an accused to disclose his knowledge—such as furnishing a blood sample, providing a voice or handwriting exemplar, or standing in a lineup—are not 13 testimonial and are not protected by the Fifth Amendment. Id. at 210-11 (collecting cases). Whether a particular compelled communication is testimonial “depend[s] on the facts and circumstances” of the particular case. Fisher, 425 U.S. at 410. The Fourth District in G.A.Q.L. v. State, 257 So. 3d 1058, 1061-62 (Fla. 4th DCA 2018), found that disclosing a password “is testimonial and can violate the Fifth Amendment privilege against compelled self-incrimination” because the “very act of revealing a password asserts a fact: that the defendant knows the password.” But see Stahl, 206 So. 3d at 133-34 (finding that disclosure of the password was not testimonial because the password was not itself significant or an acknowledgment of the incriminating evidence found on the phone). Generally, I agree that when an accused provides a passcode to a cell phone, he engages “in a testimonial act utilizing the ‘contents of his mind’ and demonstrating as a factual matter that he knows how to access the phone.” G.A.Q.L., 257 So. 3d at 1062. Pollard’s production of his password is testimonial in that it shows that he has control over the phone and can access its contents, an incriminating fact if the phone contains plans for committing an armed robbery. Foregone Conclusion While production of the password may generally be testimonial, the Fifth Amendment may not bar compulsion if the state already knows of the testimonial aspect of the communication. In Fisher, the Supreme Court considered whether compelled production implicated the Fifth Amendment. Even if the act of production would include testimonial self-incrimination, the Court held that compelled production was permissible because the existence and location of the evidence was known to the Government, or was a “foregone conclusion.” 425 U.S. at 411. “Under these circumstances by enforcement of the summons ‘no constitutional rights are touched. The question is not of testimony but of surrender.’” Id. (quoting In re Harris, 221 U.S. 274, 279 (1911)). Under this exception, an act of production is not a violation of the Fifth Amendment—even if it conveys a fact—if the state can show with reasonable particularity that, at the time it sought to compel the act of production, 14 it already knew of the materials sought, thereby making any testimonial aspect a foregone conclusion. G.A.Q.L., 257 So. 3d at 1063.; see also United States v. Apple MacPro Computer, 851 F.3d 238, 247 (3d Cir. 2017), cert. denied sub nom. Doe v. United States, 138 S. Ct. 1988 (2018) (“[T]he Fifth Amendment does not protect an act of production when any potentially testimonial component of the act of production—such as the existence, custody, and authenticity of evidence—is a ‘foregone conclusion’ that ‘adds little or nothing to the sum total of the Government's information.’” (quoting Fisher, 425 U.S. at 411)). In contrast, compelling the production of incriminating evidence (which implicitly admits existence and possession) violated the Fifth Amendment where the state’s demand was akin to a “detailed written interrogatory or a series of oral questions at a discovery deposition,” characterized “as a ‘fishing expedition.’” United States v. Hubbell, 530 U.S. 27, 36, 41-42 (2000). Here, the state’s only demand of Pollard is to produce his passcode. The state is not asking him to recover or retrieve any files that might exist on his phone. Because production of the passcode is the only communication the state seeks, this is where the analysis must be focused. See Stahl, 206 So. 3d at 136 (holding that the relevant question is whether the state “has established that it knows with reasonable particularity that the passcode exists, is within the accused’s possession or control, and is authentic”); Apple MacPro Computer, 851 F.3d at 248 n.7 (“[A] very sound argument can be made that the foregone conclusion doctrine properly focuses on whether the Government already knows the testimony that is implicit in the act of production. In this case, the fact known to the government that is implicit in the act of providing the password for the devices is ‘I, John Doe, know the password for these devices.’”); State v. Johnson, No. WD80945, 2019 WL 1028462, at *14 (Mo. Ct. App. Mar. 5, 2019) (“The focus of the foregone conclusion exception is the extent of the State’s knowledge of the existence of the facts conveyed through the compelled act of production. Here, Johnson was ordered to produce the passcode to his phone. The facts conveyed through his act of producing the passcode were the existence of the passcode, his possession and control of the phone’s passcode, and the passcode’s authenticity.”). 15 Before the trial court, the state proved—and Pollard conceded—that the phone belonged to Pollard, that he had control over it, and that he knew the passcode to unlock it. Thus, the facts making this communication implicitly “testimonial” are not in dispute, but are a foregone conclusion. 2 See Com. v. Gelfgatt, 11 N.E.3d 605, 615 (Mass. 2014) (“The facts that would be conveyed by the defendant through his act of decryption—his ownership and control of the computers and their contents, knowledge of the fact of encryption, and knowledge of the encryption key—already are known to the government and, thus, are a ‘foregone conclusion.’”). 3 2 Unlike compelling one to produce documents, requiring someone to produce a passcode to unlock a cell phone does not implicate a question of authenticity. See State v. Stahl, 206 So. 3d 124, 136 (Fla. 2d DCA 2016) (“[W]e must recognize that the technology is self-authenticating—no other means of authentication may exist. If the phone or computer is accessible once the passcode or key has been entered, the passcode or key is authentic.” (citation omitted)); Com. v. Gelfgatt, 11 N.E.3d 605, 616 n.14 (Mass. 2014) (“Here, the defendant’s decryption of his computers does not present an authentication issue analogous to that arising from a subpoena for specific documents because he is not selecting documents and producing them, but merely entering a password into encryption software.”). 3 See also State v. Andrews, 197 A.3d 200, 207 (N.J. Super. Ct. App. Div. 2018), leave to appeal granted, No. 082209, 2019 WL 2011594 (N.J. May 3, 2019) (“[D]efendant’s Fifth Amendment right against self-incrimination is not violated by requiring him to disclose the passcodes for his iPhones, which the State lawfully possessed. The act of producing the passcodes has testimonial aspects because defendant is acknowledging ownership, possession, and control of the devices. He is also acknowledging he has the ability to access the contents of the phone. However, by producing the passcodes, defendant is not implicitly conveying any information the State does not already possess. Defendant is not telling the government something it does not already know. Therefore, the implicit facts conveyed by the act of producing the passcodes is a ‘foregone conclusion’ and compelled disclosure of the passcodes does not violate defendant’s Fifth Amendment right against self-incrimination.”); Commonwealth v. Davis, 176 A.3d 16 The question is not whether Pollard knows the password, but whether he must surrender it, see Fisher, 425 U.S. at 411, so the Fifth Amendment’s protection against self-incrimination does not apply. III. G.A.Q.L. focused on the contents of the phone when determining whether the testimony is a foregone conclusion. 257 So. 3d at 1063 (“[T]he object of the foregone conclusion exception is not the password itself, but the data the state seeks behind the passcode wall.”). The majority now follows suit. 4 In this view, “it is not enough to know that a passcode wall exists, but rather, the state must demonstrate with reasonable particularity that what it is looking for is in fact located behind that wall” because “the ‘evidence sought’ in a password production case such as this is not the password itself; rather, it is the actual files or evidence on the 869, 876 (Pa. Super. Ct. 2017), appeal granted, 195 A.3d 557 (Pa. 2018) (citing, inter alia, Apple MacPro Computer and Gelfgatt and agreeing that the “appellant’s act of providing the password in question is not testimonial in nature and his Fifth Amendment right against self-incrimination would not be violated” where the appellant admitted that he knew the password to the computer). 4 The majority asserts that the “password-centric approach” “makes sense . . . where the state establishes that the testimonial value of the compelled password has been abandoned, such as where a defendant has voluntarily entered his passcode to access his cellphone in the presence of law enforcement such that the testimonial value of compelling the passcode’s production a second time is negligible,” and such a situation “becomes predominantly a Fourth Amendment issue, not a Fifth Amendment one[.]” Maj. op. at 8-9. This distinction is without a difference as applied to this case. If the analysis is properly focused on the accused’s knowledge of the passcode when he has entered it in the presence of law enforcement previously, there is no reason it should be centered elsewhere when the accused simply admits that he knows it and can enter it. 17 locked phone.” Id. at 1063-64. 5 Thus, G.A.Q.L. holds, the state must identify with reasonable particularity the evidence on the phone to compel an accused to produce his password. Id. at 1064. It is true that the state does not seek the passcode for itself, but as a means to access the files in the phone. This, however, does not change what the accused is being compelled to produce. See, e.g., State v. Andrews, 197 A.3d 200, 205 (N.J. Super. Ct. App. Div. 2018), leave to appeal granted, No. 082209, 2019 WL 2011594 (N.J. May 3, 2019) (“Defendant argues the State is unaware of all of the possible contents of defendant’s devices. This is immaterial because the order requires defendant to disclose the passcodes, not the contents of the phones unlocked by those passcodes.”). In no other context does the foregone-conclusion analysis focus on evidence other than the evidence being compelled, and there is no reason to shift the focus now. G.A.Q.L. is correct that the state must identify with particularity the files on the phone it seeks. But when these files are not what the state is compelling production of, the Fifth Amendment is not implicated. The Fifth Amendment does not “protect[] private information obtained without compelling self- incriminating testimony[.]” Fisher, 425 U.S. at 400. “Insofar as private information not obtained through compelled self- incriminating testimony is legally protected, its protection stems from other sources” such as “the Fourth Amendment’s protection 5 G.A.Q.L. drew on the analysis in In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011, 670 F.3d 1335, 1349 (11th Cir. 2012), which found that the government failed to prove that it “knew to any degree of particularity what, if anything, was hidden behind the encrypted wall.” However, the Eleventh Circuit also found that the government did not show “any basis, let alone shown a basis with reasonable particularity, for its belief that encrypted files exist on the drives, that [the accused] has access to those files, or that he is capable of decrypting the files.” Id. In contrast, the state here had probable cause that the phone contained incriminating text messages, from which it obtained a warrant to seize the phone, and showed that the phone belonged to Pollard and that he knew the passcode to unlock it. 18 against seizures without warrant or probable cause,” the First Amendment’s protection against being compelled to disclose who you associate with, “or evidentiary privileges such as the attorney- client privilege.” Id. at 401. The state’s obligation to describe with particularity the files it seeks is required because the “Fourth Amendment by its terms requires particularity in the [search] warrant[.]” Groh v. Ramirez, 540 U.S. 551, 557 (2004); see also Massachusetts v. Sheppard, 468 U.S. 981, 988 n.5 (1984) (“The uniformly applied rule is that a search conducted pursuant to a warrant that fails to conform to the particularity requirement of the Fourth Amendment is unconstitutional.”). Here, as in G.A.Q.L., the validity of the search warrant and the Fourth Amendment are not at issue. The Fourth Amendment protected Pollard’s phone from search and seizure until a search warrant issued. Whether Pollard must produce the passcode to his phone—enabling the state to search and seize what is already entitled to—depends on whether that compelled act is testimonial and self-incriminating. Here, the only testimonial aspect of the production—Pollard’s ownership and control of the phone—is undisputed and a foregone conclusion. The Fifth Amendment, contrary to the analysis of the majority and the Fourth District in G.A.Q.L., does not provide any further quasi- Fourth-Amendment protections where the state is not compelling production of the phone or data on it and the state possesses a valid search warrant for the phone. 6 See United States v. Spencer, No. 17-Cr-00259-CRB-1, 2018 WL 1964588, at *3 (N.D. Cal. Apr. 26, 6 The Supreme Court explained the issue of privacy in relation to the Fourth and Fifth Amendments in Fisher, 425 U.S. at 400: The Framers addressed the subject of personal privacy directly in the Fourth Amendment. They struck a balance so that when the State’s reason to believe incriminating evidence will be found becomes sufficiently great, the invasion of privacy becomes justified and a warrant to search and seize will issue. They did not seek in still another Amendment the Fifth to achieve a general protection of privacy but to deal with the more specific issue of compelled self-incrimination. 19 2018) (“To the extent Spencer contends that the government has not adequately identified the files it seeks” in the devices it compelled him to decrypt, “that is an issue properly raised under the Fourth Amendment, not the Fifth.”). 7 IV. In this case, we do not need to determine whether the state can sufficiently describe the evidence it seeks on the phone because the state has not compelled Pollard to produce that evidence and the Fourth Amendment is not at issue. Pollard argues that he may not be compelled to produce the passcode to his cell phone due to the Fifth Amendment’s Self-Incrimination Clause, but this argument fails where the testimonial component of the communication is undisputed. I would deny Pollard’s petition for writ of certiorari. _____________________________ Stacy A. Scott, Public Defender, and Logan P. Doll, Assistant Public Defender, Gainesville, for Petitioner. Ashley Moody, Attorney General, and Benjamin L. Hoffman, Assistant Attorney General, Tallahassee, for Respondent. 7 We need not decide whether the state may compel an accused to disclose his passcode orally or in writing. Several authorities have distinguished whether the state may “compel the defendant to disclose -- whether orally or in writing -- the actual password, as opposed to cases requiring merely physically entering it into the device.” Commonwealth v. Jones, 117 N.E.3d 702, 710 n.9 (Mass. 2019); see also G.A.Q.L., 257 So. at 1061-62 (Kuntz, J., concurring in result) (concluding “that the foregone conclusion doctrine cannot apply to compelled oral testimony”). Here, Pollard does not distinguish between the act of entering the passcode and disclosure of the passcode orally or in writing. Instead, he argues that the passcode and phone data are so intertwined that the proper inquiry concerns the state’s knowledge of the data on the phone. As stated above, I disagree with this position. 20