2021 IL App (4th) 210180 FILED
November 18, 2021
NO. 4-21-0180 Carla Bender
4th District Appellate
IN THE APPELLATE COURT Court, IL
OF ILLINOIS
FOURTH DISTRICT
THE PEOPLE OF THE STATE OF ILLINOIS, ) Appeal from the
Plaintiff-Appellant, ) Circuit Court of
v. ) De Witt County
KEIRON K. SNEED, ) No. 21CF13.
Defendant-Appellee. )
) Honorable
) Karle E. Koritz,
) Judge Presiding.
JUSTICE STEIGMANN delivered the judgment of the court, with opinion.
Justices DeArmond and Turner concurred in the judgment and opinion.
OPINION
¶1 In February 2021, the State charged defendant, Keiron K. Sneed, with two counts
of forgery (720 ILCS 5/17-3(a)(1) (West 2020)). The police later sought and obtained a search
warrant for defendant’s cell phone but were unable to execute the search because the cell phone
was passcode-protected and defendant declined to provide the passcode. The State filed a “Motion
to Compel Production of Cellular Phone Passcode,” but the trial court denied that motion. The
court ruled that the fifth amendment privilege against self-incrimination prevented defendant from
being compelled to provide the passcode to his cell phone.
¶2 The State appeals, arguing two reasons why the trial court erred by concluding the
fifth amendment protected defendant from being compelled to provide access to his lawfully seized
cell phone: (1) compelling defendant to provide access to his cell phone is neither testimonial nor
incriminating and (2) the foregone conclusion exception to the fifth amendment applies. Because
we agree with both of the State’s arguments, we reverse the judgment of the trial court and remand
for further proceedings consistent with this opinion.
¶3 I. BACKGROUND
¶4 A. The Charges
¶5 In February 2021, the State charged defendant by information with two counts of
forgery (id.). The charging documents alleged defendant made two false paychecks from Dairy
Queen with the intent to defraud Dairy Queen and “financial institutions.” Defendant and his wife,
Allora Spurling, were both arrested in connection with the false paychecks. When they were
arrested, the police seized two cell phones from their persons—one from defendant and one from
Spurling.
¶6 B. The Search Warrant
¶7 In March 2021, Detective Todd Ummel of the Clinton Police Department applied
for a search warrant to search the contents of both phones. He described the items to be searched
as (1) a “Samsung Galaxy A01” “belonging to [defendant]” and (2) a “Samsung Galaxy J2”
“belonging to [Spurling.]”
¶8 In his complaint for search warrant, Ummel attested to the following information.
In January 2021, Sara Schlesinger, a bookkeeper for Dairy Queen in Clinton, Illinois, reported to
the Clinton Police Department that she “came across” a paycheck in the amount of $274.33,
payable to defendant. Defendant had never been an employee of Dairy Queen, but his wife—
Spurling—was a current employee. Schlesinger reported that the paycheck had been cashed with
Citibank via mobile deposit (i.e., through the use of a cell phone). Schlesinger provided Clinton
police officer Alex Lovell with a text message Spurling sent to Schlesinger that stated as follows:
“I didn’t know anything about it. I guess it wasn’t meant to happen for real. It [sic]
-2-
was being curious and he didn’t think it would actually work cuz it wasn’t real. He
never got the money. *** I’m upset and embarrassed. And pissed. But please know
I had no clue about it[.] He doesn’t have a card for that bank or anything. Is there a
way to call the bank and get the money back cuz he didn’t get it[.]”
Schlesinger also provided Ummel with a second paycheck she discovered, payable to defendant
in the amount of $423.22. This check was also deposited by mobile deposit. Schlesinger confirmed
the amounts written on the paychecks were taken out of Dairy Queen’s bank account.
¶9 Ummel also stated in his complaint for search warrant that he sought to search
defendant’s phone to “confirm whom [sic] deposited the forged paycheck and to determine if any
additional forged paychecks have been deposited.” He further sought to “confirm that the text
messages from [Spurling] came from her phone.”
¶ 10 The trial court issued a search warrant granting Ummel permission to search both
phones.
¶ 11 C. The State’s Motion To Compel
¶ 12 A few days later, the State filed a “Motion to Compel Production of Cellular Phone
Passcode” in defendant’s case, which requested an order “to compel the entry of a passcode into a
cellular device.” The motion alleged that the police were prevented from executing the search
warrant because both phones were passcode-protected. (We note that this appeal pertains only to
defendant and access to the cell phone identified as his in the search warrant.)
¶ 13 Later that same month, the trial court conducted an evidentiary hearing on the
State’s motion, at which Ummel was the sole witness. He testified that the Clinton Police
Department was contacted by “[m]anagement” at Dairy Queen “[r]egarding fraudulent checks that
were cashed on the account of Dairy Queen.” Defendant had never been employed at Dairy Queen,
-3-
but defendant’s wife was an employee at the time the checks were cashed. Ummel testified that
both checks were cashed via mobile electronic deposit from a cellular phone. Ummel explained
that mobile deposit involves taking a photograph of a check and sending it electronically to a
financial institution for deposit.
¶ 14 Ummel further testified that he observed pictures of the two cashed checks. (The
record does not state where Ummel viewed the photographs, who showed him the photographs, or
whether they were physical or electronic photographs.) They were payable to defendant and
endorsed with the signature “Keiron Sneed.” Ummel also stated that Schlesinger provided him
with text messages in which Spurling admitted defendant cashed the checks. Schlesinger also
provided Ummel with bank records that showed the funds were missing from the Dairy Queen
account.
¶ 15 Ummel also testified that he obtained the search warrant to search defendant’s and
Spurling’s cell phones but discovered the phones were locked by security passcodes. He stated
defendant and Spurling would not provide him with the passcodes. The Clinton police did not have
the technology to “crack” the phone, and the agency that assisted him in the past—the Illinois State
Police—would not assist unless his investigation involved narcotics.
¶ 16 Ummel further testified that, following defendant’s arrest, defendant filled out a
bond form and provided a phone number that matched the phone that was seized from him. Ummel
testified he was “hoping to find *** that a photograph exists on that device from submitting the
mobile deposit.”
¶ 17 D. The Trial Court’s Ruling
¶ 18 The trial court denied the State’s motion. The court first noted that the fifth
amendment privilege against self-incrimination applies only when an accused is compelled to
-4-
make a testimonial communication that is incriminating. But then, relying on People v. Spicer,
2019 IL App (3d) 170814, 125 N.E.3d 1286, the court found that the act of producing a cell phone
passcode is testimonial.
¶ 19 The trial court then examined whether the foregone conclusion doctrine—an
exception to the fifth amendment privilege—applied to the facts of this case. Again relying on
Spicer, the court found that, for the doctrine to apply, the State must show with reasonable
particularity that, when it sought the act of production, it “knew the evidence existed, the evidence
was in the [d]efendant’s possession and it was authentic.” The court noted (1) a valid search
warrant had issued for the phone’s contents, which defendant did not challenge, and (2) law
enforcement has a right to access the contents of the cell phone. The court concluded, however,
that it “would be speculation *** to presume at this point that the photograph would still be on the
phone,” and it “[could not] find here that it’s more likely to be found on the [d]efendant’s phone
any more than it might be on the [co-defendant’s] phone.” Accordingly, the court found that the
State did not show the foregone conclusion doctrine applied and denied the State’s motion to
compel defendant to provide access to his cell phone.
¶ 20 The State filed a certificate of substantial impairment, and this appeal followed. Ill.
S. Ct. R. 604(a)(1) (eff. July 1, 2017).
¶ 21 II. ANALYSIS
¶ 22 The State appeals, arguing two reasons why the trial court erred by concluding the
fifth amendment protected defendant from being compelled to provide access to his lawfully seized
cell phone: (1) compelling defendant to provide access to his cell phone is neither testimonial nor
incriminating and (2) the foregone conclusion exception to the fifth amendment applies.
¶ 23 Defendant initially responds that the State’s appeal should be dismissed for lack of
-5-
jurisdiction because the trial court’s order did not have the substantive effect of quashing the search
warrant and suppressing evidence, as required by Rule 604(a)(1). Id. Alternatively, defendant
argues that (1) the compelled production of a cell phone passcode is an act of production that is
protected by the fifth amendment and (2) the foregone conclusion doctrine does not apply to the
facts of this case.
¶ 24 Because we agree with both of the State’s arguments, we reverse the judgment of
the trial court and remand for further proceedings consistent with this opinion.
¶ 25 A. The Standard of Review
¶ 26 We review de novo whether the State may take an interlocutory appeal under Rule
604(a). People v. Drum, 194 Ill. 2d 485, 488, 743 N.E.2d 44, 46 (2000).
¶ 27 We apply a bifurcated standard of review to the trial court’s determination that the
fifth amendment privilege protects defendant from being compelled to provide his passcode. First,
we “accord great deference to the trial court’s factual findings, and *** reverse those findings only
if they are against the manifest weight of the evidence.” In re G.O., 191 Ill. 2d 37, 50, 727 N.E.2d
1003, 1010 (2000). Next, we review de novo the ultimate question of whether the privilege applies.
Id.; see also Spicer, 2019 IL App (3d) 170814, ¶ 14 (citing People v. McRae, 2011 IL App (2d)
090798, ¶ 25, 959 N.E.2d 1245); In re A.W., 231 Ill. 2d 92, 106, 896 N.E.2d 316, 324 (2008) (“The
standard of review for determining whether an individual’s [fifth amendment] rights have been
violated is de novo.” (Internal quotation marks omitted.)).
¶ 28 In this case, Ummel was the sole witness at the hearing on the State’s motion to
compel, and the trial court appeared to have no difficulty accepting his testimony. Thus, like the
trial court, we will accept his testimony and now review de novo the trial court’s determination
that the fifth amendment privilege against self-incrimination protected defendant from being
-6-
compelled to provide his passcode.
¶ 29 B. Jurisdiction
¶ 30 Defendant first argues that the State’s appeal should be dismissed for lack of
jurisdiction under Illinois Supreme Court Rule 604(a)(1) (eff. July 1, 2017) because the trial
court’s denial of the State’s motion to compel did not have the substantive effect of quashing the
search warrant and suppressing evidence. Defendant also contends that the impairment of the
State’s case is questionable. The State responds that the court’s order precluded the State from
accessing the information on the phone, which is no different than precluding the State from
presenting the information on the cell phone at trial. We agree with the State.
¶ 31 Rule 604(a)(1) reads as follows: “When State May Appeal. In criminal cases the
State may appeal only from an order or judgment the substantive effect of which results in ***
quashing an arrest or search warrant; or suppressing evidence.” Id.
¶ 32 Before the State may obtain review of a suppression order under Rule 604(a), the
State must certify to the trial court that the suppression order substantially impairs its ability to
prosecute the case. People v. Turner, 367 Ill. App. 3d 490, 494, 854 N.E.2d 1139, 1143 (2006).
“A good-faith evaluation by the prosecutor of the impact of a suppression order is sufficient to
meet the State’s burden.” Id. at 495 (citing People v. Keith, 148 Ill. 2d 32, 40, 591 N.E.2d 449,
452 (1992)); see also People v. Young, 82 Ill. 2d 234, 247-48, 412 N.E.2d 501, 507 (1980). “[T]he
substantive effect of a trial court’s pretrial order, not the label of the order or its underlying motion,
controls appealability under Rule 604(a)(1).” Drum, 194 Ill. 2d at 489. We agree with what the
Third District wrote in Spicer: “When a warrant has issued allowing a search of a defendant’s
phone, an order that denies a motion to compel the defendant to decrypt the phone is like an order
suppressing evidence.” Spicer, 2019 IL App (3d) 170814, ¶ 11.
-7-
¶ 33 Here, the State filed a certificate of substantial impairment, attesting that the trial
court’s order “effectively suppresse[s] evidence and prevent[s] the State from acquiring evidence
pursuant to a search warrant issued by the Court, thereby effectively quashing the search warrant,
substantially impair[ing] [the State’s] ability to prosecute this cause.”
¶ 34 We accept the State’s good faith evaluation of the impact of the trial court’s order
on its ability to prosecute its case and agree that the trial court’s order is like an order suppressing
evidence. Accordingly, we conclude that we have jurisdiction to hear this appeal.
¶ 35 C. The Fifth Amendment Privilege Against Self-Incrimination
¶ 36 1. The Applicable Law
¶ 37 The fifth amendment to the United States Constitution provides that “[n]o person
*** shall be compelled in any criminal case to be a witness against himself.” U.S. Const., amend.
V. The Illinois Constitution similarly provides, “No person shall be compelled in a criminal case
to give evidence against himself ***.” Ill. Const. 1970, art. I, § 10. The state and federal
constitutional privileges against self-incrimination “differ in semantics rather than in substance
and have received the same general construction.” People ex rel. Hanrahan v. Power, 54 Ill. 2d
154, 160, 295 N.E.2d 472, 475 (1973).
¶ 38 The privilege against self-incrimination is intended to protect an accused “from
having to reveal, directly or indirectly, his knowledge of facts relating him to the offense or from
having to share his thoughts and beliefs with the Government.” Doe v. United States, 487 U.S.
201, 213 (1988) (Doe II). “[T]he Fifth Amendment does not independently proscribe the
compelled production of every sort of incriminating evidence but applies only when the accused
is compelled to make a testimonial communication that is incriminating.” (Emphasis omitted.)
Fisher v. United States, 425 U.S. 391, 408 (1976). “To establish a fifth amendment violation,
-8-
appellants must therefore demonstrate the existence of three elements: 1) compulsion, 2) a
testimonial communication, and 3) the incriminating nature of that communication.” In re Grand
Jury Subpoena, 826 F.2d 1166, 1168 (2d Cir. 1987).
¶ 39 a. What Constitutes a Testimonial Communication
¶ 40 “[T]o be testimonial, an accused’s communication must itself, explicitly or
implicitly, relate a factual assertion or disclose information.” Doe II, 487 U.S. at 210. It is “the
attempt to force [a suspect] ‘to disclose the contents of his own mind,’ [citation] that implicates
the Self-Incrimination Clause.” Id. at 211 (quoting Curcio v. United States, 354 U.S. 118, 128
(1957)). This requirement that the compelled communication assert a fact or disclose information
explains why certain acts, although incriminating, are not testimonial and do not enjoy fifth
amendment protection. See, e.g., Schmerber v. California, 384 U.S. 757, 765 (1966) (a suspect
may be compelled to furnish a blood sample); Gilbert v. California, 388 U.S. 263, 266-67 (1967)
(handwriting exemplar); United States v. Dionisio, 410 U.S. 1, 7 (1973) (voice exemplar); United
States v. Wade, 388 U.S. 218, 221-22 (1967) (stand in a lineup). The United States Supreme Court
has explained that the fifth amendment’s protections are limited to “testimonial” communications
because “there is a significant difference between the use of compulsion to extort communications
from a defendant and compelling a person to engage in conduct that may be incriminating.” United
States v. Hubbell, 530 U.S. 27, 34-35 (2000).
¶ 41 For example, in Doe II, 487 U.S. at 215-19, the Supreme Court held that an order
compelling the petitioner—who was the target of a grand jury investigation—to sign an
authorization that permitted foreign banks to disclose records of his accounts (if any existed) had
no testimonial significance because the mere act of signing the form made no statement, implicit
or explicit, regarding the existence of any foreign bank account, control over any such account, or
-9-
the authenticity of any records produced by any bank. The authorization was carefully drafted in
the hypothetical to not refer to any specific bank or account number so that it would not serve as
an acknowledgement by the target of the existence of any foreign bank account, his control over
any bank account, or the authenticity of any documents produced. Id. at 215-16. The Court rejected
the petitioner’s “blanket assertion” that a statement is testimonial if its content can be used to
obtain evidence. Id. at 208 n.6. In doing so, the Court reasoned that this argument “confuses the
requirement that the compelled communication be ‘testimonial’ with the separate requirement that
the communication be ‘incriminating.’ ” Id. “If a compelled statement is ‘not testimonial and for
that reason not protected by the privilege, it cannot become so because it will lead to incriminating
evidence.’ ” Id. (quoting In re Grand Jury Subpoena, 826 F.2d at 1171 n.2 (Newman, J.,
concurring)).
¶ 42 Certain communicative acts, however, may be testimonial for purposes of the fifth
amendment. For example, the act of producing documents in response to a subpoena could have
“communicative aspects of its own, wholly aside from the contents of the papers produced.”
Fisher, 425 U.S. at 410; see also Hubbell, 530 U.S. at 36 (“[T]he act of producing documents in
response to a subpoena may have a compelled testimonial aspect.”). “Compliance with [a]
subpoena tacitly concedes the existence of the papers demanded and their possession or control by
the [person subpoenaed].” Fisher, 425 U.S. at 410. This is known as the “act of production”
doctrine, which “permits an individual to assert his fifth amendment privilege against
self-incrimination and refuse to produce subpoenaed documents where the mere act of production,
rather than the content of the documents, has testimonial ramifications.” In re Grand Jury
Subpoena Duces Tecum No. 001144, 164 Ill. App. 3d 344, 347, 517 N.E.2d 1157, 1159 (1987).
¶ 43 b. The Foregone Conclusion Doctrine
- 10 -
¶ 44 A corollary doctrine—also formulated in Fisher—that serves as an exception to the
act of production doctrine is the “foregone conclusion” doctrine. Under this doctrine, the
testimonial value of the act of production is lost where the information conveyed by the act of
production is already known by the State. Fisher, 425 U.S. at 411. For this exception to apply, the
State must establish its knowledge of (1) the existence of the information demanded, (2) the
possession or control of that information by the defendant, and (3) the authenticity of the
information. Commonwealth v. Gelfgatt, 11 N.E.3d 605, 614 (Mass. 2014) (citing Fisher, 425 U.S.
at 410-13); see also United States v. Bright, 596 F.3d 683, 692 (9th Cir. 2010). Where these
elements are satisfied, the testimony implied by the defendant’s act of production is a “foregone
conclusion” that “adds little or nothing to the sum total of the Government’s information.” Fisher,
425 U.S. at 411. In that case, “no constitutional rights are touched. The question is not of testimony
but of surrender.” (Internal quotation marks omitted.) Id.
¶ 45 Thus, the United States Supreme Court has identified two means by which an act
of production is not testimonial and, as such, falls outside the protection of the fifth amendment:
(1) where the act of production compels a mere physical act (Doe II, 487 U.S. at 215) and (2) where
the act of production conveys information that is a “foregone conclusion” (Fisher, 425 U.S. at 410-
14). For the reasons that follow, we conclude the trial court erred because both means apply to the
facts of this case.
¶ 46 2. This Case
¶ 47 a. Testimonial vs. Non-testimonial
¶ 48 The State first argues that compelling defendant to provide entry to his
passcode-protected phone is not a testimonial act of production because it is a mere physical act,
such as providing a thumbprint, blood sample, or voice exemplar. Defendant responds that
- 11 -
compelling him to provide access to his passcode-protected phone is a testimonial act of
production because it requires him to utilize the “contents of his mind.” See Hubbell, 530 U.S. at
43; Doe II, 487 U.S. at 210 n.9. Defendant contends the act of providing entry to his cell phone is
more like “telling an inquisitor the combination to a wall safe” than “being forced to surrender the
key to a strongbox.” See Hubbell, 530 U.S. at 43; see also Doe II, 487 U.S. at 210 n.9.
¶ 49 Consistent with defendant’s position, several courts have held the compelled
production of a passcode or decryption key to be a testimonial act because it reveals the “contents
of the person’s mind.” See, e.g., In re Search Warrant Application for [Redacted Text], 279 F.
Supp. 3d 800, 806 (N.D. Ill. 2017); In re Grand Jury Subpoena Duces Tecum Dated March 25,
2011, 670 F.3d 1335, 1346 (11th Cir. 2012); United States v. Kirschner, 823 F. Supp. 2d 665,
668-69 (E.D. Mich. 2010). Under this rationale, the “physical/mental production” dichotomy is “a
critical distinction” in determining whether an act is testimonial or non-testimonial.
Commonwealth v. Davis, 220 A.3d 534, 547-48 (Pa. 2019) (“Consistent with a physical/mental
production dichotomy, in conveying the combination to a wall safe, versus surrendering a key to
a strongbox, a person must use the ‘contents of [his] own mind.’ ”).
¶ 50 However, an examination of the origin of the “mental/physical production”
dichotomy leads us to question whether it is properly applied in the context of compelled access
to a passcode-protected phone.
¶ 51 i. The Origins of the Mental/Physical Production Dichotomy
¶ 52 The dichotomy originates in Doe II, where the United States Supreme Court
determined that the petitioner was not protected by the fifth amendment from being compelled to
sign an authorization that would allow foreign banks to disclose documents relating to his
accounts, if those accounts existed. Doe II, 487 U.S. at 203, 215. Justice Stevens dissented and
- 12 -
opined that a defendant cannot “be compelled to use his mind to assist the prosecution in convicting
him of a crime.” Id. at 219 (Stevens, J., dissenting). He reasoned that a defendant “may in some
cases be forced to surrender a key to a strongbox containing incriminating documents, but I do not
believe he can be compelled to reveal the combination to his wall safe—by word or deed.” Id. The
majority addressed Justice Stevens’s analogy and expressed its agreement that “[t]he expression
of the contents of an individual’s mind” is testimonial but disagreed that the execution of the
authorization at issue “forced [the] petitioner to express the contents of his mind.” (Internal
quotation marks omitted.) Id. at 210 n.9 (majority opinion). The majority believed the compelled
execution of the authorization was more like surrendering a key than providing a combination. Id.
¶ 53 Thereafter, in Hubbell, a case involving a subpoena duces tecum, the Supreme
Court rejected the government’s argument that the respondent’s act of producing documents was
merely a physical act. Hubbell, 530 U.S. at 41-43. The government’s subpoena sought the
production of 11 categories of documents. Id. at 31. The respondent “produced 13,120 pages of
documents and records and responded to a series of questions that established that those were all
of the documents in his custody or control that were responsive to the commands in the subpoena.”
Id. The Court observed the following:
“The assembly of literally hundreds of pages of material in response to a request
for ‘any and all documents reflecting, referring, or relating to any direct or indirect
sources of money or other things of value received by or provided to’ an individual
or members of [respondent’s] family during a 3-year period *** is the functional
equivalent of the preparation of an answer to either a detailed written interrogatory
or a series of oral questions at a discovery deposition.” Id. at 41-42.
The Court also observed that the respondent “took the mental and physical steps necessary to
- 13 -
provide the prosecutor with an accurate inventory of the many sources of potentially incriminating
evidence sought by the subpoena.” Id. at 42. The Court explained the government’s possession of
the documents was not the fruit of a mere physical act of production. Instead, “it was
unquestionably necessary for respondent to make extensive use of ‘the contents of his own mind’
in identifying the hundreds of documents responsive to the requests in the subpoena.” Id. at 43.
The Court then repeated Justice Stevens’s analogy from Doe II, observing, “[t]he assembly of
those documents was like telling an inquisitor the combination to a wall safe, not like being forced
to surrender the key to a strongbox.” Id.
¶ 54 ii. Lower Courts’ Interpretations
¶ 55 Several courts have since held that the compelled production of a passcode (or
unlocked/decrypted device) is a testimonial act of production because it requires the use of the
“contents of the mind.” See, e.g., In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011,
670 F.3d at 1346 (“[T]he decryption and production of the hard drives would require the use of
the contents of [the defendant’s] mind.”); G.A.Q.L. v. State, 257 So. 3d 1058, 1061 (Fla. Dist. Ct.
App. 2018) (“[R]evealing one’s password *** probes into the contents of an individual’s mind.”);
Davis, 220 A.3d at 548 (“[O]ne cannot reveal a passcode without revealing the contents of one’s
mind.”). This group includes the only Illinois court to address the issue, Spicer, 2019 IL App (3d)
170814, discussed in further detail infra, ¶¶ 72-81.
¶ 56 Other courts have questioned whether the strongbox key/wall safe combination
analogy is appropriate for the digital world. See State v. Stahl, 206 So. 3d 124, 135 (Fla. Dist. Ct.
App. 2016) (“We question whether identifying the key which will open the strongbox—such that
the key is surrendered—is in fact, distinct from telling an officer the combination. More
importantly, we question the continuing viability of any distinction as technology advances.”);
- 14 -
State v. Andrews, 234 A.3d 1254, 1274 (N.J. 2020) (“[I]n some cases, a biometric device lock can
be established only after a passcode is created, calling into question the testimonial/non-testimonial
distinction in this context.”). Although the Andrews court ultimately held that the production of a
passcode is testimonial, it noted that “passcodes are a series of characters without independent
evidentiary significance and are therefore of ‘minimal testimonial value’—their value is limited to
communicating the knowledge of the passcodes.” Id. at 1274 (citing United States v. Apple
MacPro Computer, 851 F.3d 238, 248 n.7 (3d Cir. 2017)).
¶ 57 The Andrews and Stahl courts also expressed concern that, under the
physical/mental dichotomy, fifth amendment protection may apply to a phone that is protected by
a numeric passcode, but not to a phone protected by a thumbprint. See, e.g., Andrews, 234 A.3d at
1274 (“We also share the concerns voiced by other courts that holding passcodes exempt from
production whereas biometric device locks may be subject to compulsion creates inconsistent
approaches based on form rather than substance.”); Stahl, 206 So. 3d at 135 (“[W]e are not inclined
to believe that the Fifth Amendment should provide greater protection to individuals who passcode
protect their iPhones with letter and number combinations than to individuals who use their
fingerprint as the passcode.”).
¶ 58 iii. This Court’s Conclusion: Production of a Passcode Is Non-testimonial
¶ 59 The questions raised in Stahl and Andrews regarding the continued viability of the
key/combination analogy (i.e., mental/physical dichotomy) in the digital age deserve
consideration. We, too, observe that a cell phone passcode is string of letters or numbers that an
individual habitually enters into his electronic device throughout the day. A passcode may be used
so habitually that its retrieval is a function of muscle memory rather than an exercise of conscious
thought. A fair question that arises, then, is whether the rote application of a series of numbers
- 15 -
should be treated the same as the Hubbell respondent’s “exhaustive use of the ‘contents of his
mind’ ” to produce hundreds of pages of responsive documents. The two scenarios appear to bear
no resemblance to each other.
¶ 60 We share the concerns expressed in Stahl and Andrews and observe that, given the
advancements in technology, a cell phone passcode is more akin to a key to a strongbox than a
combination to a safe. Or, at the very least, perhaps in this digital age the distinction between a
physical key and a combination to a safe has become blurred, with a cellular phone passcode
encompassing both. This blurring of distinctions would diminish the analytical value of the
analogy that so many courts have relied on to hold that the act of providing a passcode is
testimonial.
¶ 61 Moreover, at least one federal court has hinted that the act of unlocking a phone
may not be testimonial if (1) no dispute exists that the suspect owns the phone, (2) the suspect is
not asked to reveal the passcode to the police, and (3) the suspect makes the contents of her cell
phone accessible to the police by entering it herself without telling the police the passcode. See
United States v. Oloyede, 933 F.3d 302, 309 (4th Cir. 2019) (“[Defendant] has not shown that her
act communicated her cell phone’s unique passcode. Unlike a circumstance, for example, in which
she gave the passcode to an agent for the agent to enter, here she simply used the unexpressed
contents of her mind to type in the passcode herself.”). In Oloyede, the defendant entered the
passcode herself and gave the unlocked phone to the police officer. Id. at 308. The officer did not
ask for the passcode or observe the defendant enter the passcode, and the defendant did not reveal
the passcode to the police. Id. Similarly, in the case before us, the State is requesting an order that
the defendant “provide entry” to his cell phone. That means that defendant, like the defendant in
Oloyede, could simply enter his passcode into his phone and thereby make its contents accessible
- 16 -
to the police without ever telling the police the passcode.
¶ 62 Notably, the trial court in this case, when ruling on the State’s motion, expressed
its belief that the facts here were “no different than compelling a Defendant to disclose a key to a
storage unit or a lockbox or something of that nature.” The court then observed, “Here, disclosing
the passcode would not seem to make extensive use of the contents of the Defendant’s mind” and
expressed its opinion that “an objective, reasonable judge could reach the conclusion that the
production of the pass code is not testimonial.” However, the court correctly acknowledged that it
was obligated to follow the Third District’s holding in Spicer that the production of a passcode is
testimonial because no other Illinois court of review had yet spoken on the issue.
¶ 63 For the reasons stated, we conclude that requiring defendant to provide entry or the
passcode to the phone does not compel him to provide testimony within the meaning of the fifth
amendment.
¶ 64 b. The Foregone Conclusion Doctrine
¶ 65 The State also argues that even if we conclude that the act of providing entry or the
passcode to defendant’s phone is testimonial, the foregone conclusion doctrine applies. The State
contends the trial court erred in its application of the foregone conclusion doctrine because it
equated the act of providing access to the phone with the act of collecting the evidence from the
phone. Defendant responds that the trial court properly found the foregone conclusion doctrine did
not apply because the State did not establish that, at the time it requested production, it knew of
the existence, possession, and authenticity of the information it sought within the phone.
¶ 66 We agree with the State that the foregone conclusion doctrine applies. This
conclusion is a second and separate reason for holding that the trial court erred by denying the
State’s motion.
- 17 -
¶ 67 i. The Proper Focus of the Foregone Conclusion Analysis
¶ 68 (a) Passcode vs. Contents of the Phone
¶ 69 The parties’ initial disagreement centers upon whether a court conducting a
foregone conclusion analysis should focus on (1) the compelled communication itself (i.e., the
entry of the passcode) or (2) the information to be revealed by the entry of the passcode. One
scholar has helpfully described these competing focuses as (1) the act that opens the door and
(2) the treasure that lies beyond the door. See Orin S. Kerr, Compelled Decryption and the
Privilege Against Self-Incrimination, 97 Tex. L. Rev. 767, 777 (2019).
¶ 70 Courts are also split on this issue. Several courts have held that the proper focus of
the foregone conclusion analysis is on the testimonial value of the act of producing the passcode.
See Andrews, 234 A.3d at 1273 (“[W]e find that the foregone conclusion test applies to the
production of the passcodes themselves, rather than to the phones’ contents.”); Stahl, 206 So. 3d
at 136 (“[T]he relevant question is whether the State has established that it knows with particularity
that the passcode exists, is within the accused’s possession or control, and is authentic.”); Gelfgatt,
11 N.E.3d at 615 (“[W]e conclude that the factual statements that would be conveyed by the
defendant’s act of entering an encryption key in the computers are ‘foregone conclusions’ and,
therefore, the act of decryption is not a testimonial communication that is protected by the Fifth
Amendment.”); State v. Johnson, 576 S.W.3d 205, 227 (Mo. 2019) (“The focus of the foregone
conclusion exception is the extent of the State’s knowledge of the existence of the facts conveyed
through the compelled act of production. Here, [defendant] was ordered to produce the passcode
to his phone.”); Commonwealth v. Jones, 117 N.E.3d 702, 710 (Mass. 2019) (“[F]or the foregone
conclusion exception to apply, the Commonwealth must establish that it already knows the
testimony that is implicit in the act of the required production. [Citation.] In the context of
- 18 -
compelled decryption, the only fact conveyed by compelling a defendant to enter the password to
an encrypted electronic device is that the defendant knows the password, and can therefore access
the device.”).
¶ 71 Other courts have placed the focus of the foregone conclusion analysis on the files
stored on the device. See In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011, 670
F.3d at 1346 (“Nothing in the record before us reveals that the Government knows whether any
files exist and are located on the hard drives ***.”); Seo v. State, 148 N.E.3d 952, 958 (Ind. 2020)
(“This leads us to the following inquiry: has the State shown that (1) [defendant] knows the
password for her iPhone; (2) the files on the device exist; and (3) she possessed those files?”);
G.A.Q.L., 257 So. 3d at 1063 (“It is not the verbal recitation of a passcode, but rather the
documents, electronic or otherwise, hidden by an electronic wall that are the focus of this
exception.”).
¶ 72 (b) People v. Spicer: Focus on the Contents of the Phone
¶ 73 The only Illinois court to consider the application of the foregone conclusion
doctrine in the context of a motion to compel production of a cell phone passcode is Spicer. In
Spicer, the defendant was pulled over for a traffic violation. Spicer, 2019 IL App (3d) 170814, ¶ 3.
A drug dog alerted on the vehicle, and officers found a pill bottle containing cocaine inside a bag
in the area where the defendant had been sitting. Id. ¶ 5. The police arrested the defendant for
possession of a controlled substance, and the State later charged him with possession with intent
to deliver. Id. ¶ 3. The police obtained a search warrant for a cell phone they seized from the
defendant during his arrest. Id. ¶ 4. After the defendant declined to provide the passcode to the
phone, the State filed a motion to compel its production. Id.
¶ 74 The Third District concluded the foregone conclusion exception did not apply
- 19 -
because the State did not establish with reasonable particularity “the contents of the phone.” Id.
¶ 21. In framing its analysis, the court noted that “Illinois courts [had] not decided whether
compelling a defendant to provide his passcode is testimonial,” and acknowledged the analytical
split among foreign jurisdictions on the issue. Id. ¶¶ 16-17. For guidance, the Third District looked
to a case from the Florida District Court of Appeals, G.A.Q.L., 257 So. 3d at 1062, which examined
the compelled production of an iTunes password. Spicer, 2019 IL App (3d) 170814, ¶ 19.
¶ 75 In G.A.Q.L., the court first determined that the compelled production of the
password was testimonial because it necessitates the use of the mind. G.A.Q.L., 257 So. 3d at 1062.
The court next determined that “the object of the foregone conclusion exception is not the
password itself, but the data the state seeks behind the passcode wall.” Id. at 1063. The court then
held that foregone conclusion doctrine did not apply because the State “fail[ed] to identify any
specific file locations or even name particular files that it [sought] from the *** passcode-protected
phone.” Id. at 1064. Instead, it “generally [sought] essentially all communications, data, and
images on the locked iPhone” based on “the prosecutor’s statement at the hearing that the surviving
passenger [of a DUI-related accident] had been communicating with [the defendant] via Snapchat
and text message on the day of the accident and after the accident.” Id.
¶ 76 The Third District found G.A.Q.L. persuasive and held that the focus of a foregone
conclusion analysis should be placed on the contents of the phone instead of the production of the
passcode. Spicer, 2019 IL App (3d) 170814, ¶ 21.
¶ 77 In applying this analytical framework to the facts before it, the Third District
concluded that the State “does not know what information might be on [the defendant’s] phone
but surmises that cell phones are often used in unlawful drug distribution and such information
would be available on [the defendant’s] phone.” Id. ¶ 22. The court noted that the search warrant
- 20 -
permitted the State to access “most of the information” on the defendant’s phone, and the State
“[did] not identify any documents or specific information it [sought] with reasonable particularity.”
Id.
¶ 78 We view Spicer and G.A.Q.L. as factually distinguishable. In contrast to those
cases, here, the State has described with reasonable particularity the information it seeks.
¶ 79 Ummel testified he believed he would find on defendant’s phone photographs of
the false paychecks and evidence of their electronic deposit. Ummel also testified he observed
photographs of the false paychecks, which were payable to defendant and endorsed in defendant’s
name for mobile deposit to Citibank and Varo Bank. Ummel also observed Spurling’s text message
to Schlesinger, which stated that defendant deposited the checks by mobile deposit. Ummel also
explained that mobile deposit involves taking a photograph of a check and sending it electronically
to a financial institution.
¶ 80 Dairy Queen’s bank records confirmed that the false paychecks were deposited in
this manner and the funds were missing from Dairy Queen’s accounts. In other words, Ummel
described the documents and evidence he was looking for and explained why he expected it to be
found on defendant’s phone.
¶ 81 In addition to viewing Spicer and G.A.Q.L. as factually distinguishable, we also do
not believe—for reasons we discuss in greater detail infra, ¶¶ 82-95—that the Third District was
correct to conclude that the focus of the foregone conclusion doctrine is properly placed on the
information on the phone. On that issue, we find more persuasive the reasoning of the New Jersey
Supreme Court in Andrews, 234 A.3d at 1273, which held that “the foregone conclusion test
applies to the production of the passcodes themselves, rather than to the phones’ contents.”
¶ 82 (c) State v. Andrews: Focus on the Passcode
- 21 -
¶ 83 In Andrews, the defendant was a former sheriff’s deputy who was charged with
official misconduct for revealing the existence of an undercover narcotics investigation to its
target. Id. at 1261. According to the target, the defendant also advised him to (1) remove a tracking
device from his vehicle and (2) discard cell phones. Id. at 1259. The communications occurred
largely through the iPhone FaceTime application and text messages. Id. at 1260. The State seized
the defendant’s cell phones and obtained a warrant to search them but was unable to access the
phones’ contents without the passcodes. Id. at 1261. The State moved to compel the defendant to
disclose the passcodes to his two phones. Id.
¶ 84 In considering whether the fifth amendment protected the defendant from
disclosing the passcodes to his phones, the court first examined the history of the fifth amendment
privilege in the context of compelled communications, including United States v. Doe, 465 U.S.
605 (1984) (Doe I), Fisher, and Hubbell. Andrews, 234 A.3d at 1266-69. The court noted that these
cases all involved the production of documents and gave rise to the inference that the act of
production “must be considered in its own right, separate from the documents sought.” Id. at 1269
(citing Fisher, 425 U.S. at 410 (“The act of producing evidence *** has communicative aspects of
its own, wholly aside from the contents of the papers produced.”), Doe I, 465 U.S. at 612
(“Although the contents of a document may not be privileged, the act of producing the document
may be.”), and Hubbell, 530 U.S. at 40 (“The ‘compelled testimony’ that is relevant in this case is
not to be found in the contents of the documents produced in response to the subpoena. It is, rather,
the testimony inherent in the act of producing those documents.”)).
¶ 85 The Andrews court concluded, “To be consistent with the Supreme Court case law
that gave rise to the exception, we find that the foregone conclusion test applies to the production
of the passcodes themselves, rather than to the phones’ contents.” Andrews, 234 A.3d at 1273.
- 22 -
¶ 86 (d) Our Conclusion: The Focus Is on the Passcode
¶ 87 We agree with Andrews and find further support for its conclusion in Doe II, in
which the Supreme Court rejected “[p]etitioner’s blanket assertion that a statement is testimonial
for Fifth Amendment purposes if its content can be used to obtain evidence” because it “confuses
the requirement that the compelled communication be ‘testimonial’ with the separate requirement
that the communication be ‘incriminating.’ ” Doe II, 487 U.S. at 208 n.6. As the Supreme Court
observed, “If a compelled statement is not testimonial and for that reason not protected by the
privilege, it cannot become so because it will lead to incriminating evidence.” (Internal quotation
marks omitted.) Id. at 208 n.6.
¶ 88 Additionally, the Hubbell court noted, “Whether the constitutional privilege ***
protects the act of production itself, is a question that is distinct from the question whether the
unprotected contents of the documents themselves are incriminating.” Hubbell, 530 U.S. at 37.
¶ 89 Placing the focus of the foregone conclusion doctrine on the passcode rather than
the documents or evidence contained on the phone appears to strike the most appropriate balance
between fifth amendment concerns and fourth amendment concerns. In this case, the State’s
motion seeks the compelled production of the passcode. The production of the passcode will lead
to the contents of the phone, for which the State has obtained a valid search warrant that defendant
does not challenge.
¶ 90 In ruling on the State’s motion to compel, the trial court addressed whether “the
evidence sought for purposes of the foregone conclusion doctrine consist[s] of the pass code or the
contents of the phone.” The court observed, “perhaps the better-reasoned argument is that *** the
foregone conclusion exception should only apply to the pass code,” but again acknowledged its
obligation, in the absence of any binding authority to the contrary, to follow the Third District’s
- 23 -
holding in Spicer.
¶ 91 In applying the Third District’s analytical framework (placing the focus on the
contents of the phone rather than the passcode), the trial court observed that, to obtain a search
warrant, the State “must articulate with particularity the person and place to be searched and the
person and things to be seized. But for the foregone conclusion exception to apply, the State must
know—it requires knowledge, but that knowledge is qualified with reasonable particularity.” This
observation illustrates how the Spicer approach conflates the act of production with the contents
of the phone. That is to say, it allows the fifth amendment to swallow the fourth amendment,
thereby permitting a suspect to “hide” behind a passcode evidence to which the State is lawfully
entitled pursuant to the issuance of the search warrant.
¶ 92 The contents of the phone are protected by the fourth amendment, and in this case,
the State followed proper procedures to obtain a valid search warrant to seize that information.
The testimonial value of the act of producing the passcode—a series of letters or numbers which
“opens the door” to permit the State to execute that valid warrant—must be analyzed separately
from the State’s authority to seize the evidence on the phone. And it bears repeating that defendant
does not challenge the probable cause supporting the search warrant that authorizes seizure of the
contents of his phone. Instead, he seeks to utilize the fifth amendment to prevent the operation of
the fourth amendment, which authorizes (as here) the issuance of a search warrant based upon a
verified complaint showing probable cause for the presence of evidence of a crime in the premises
(here, the cell phone) to be searched.
¶ 93 By focusing (1) the fifth amendment analysis on the production of the passcode and
(2) the fourth amendment analysis on the evidence contained on the phone, one constitutional
provision does not become either superior or subservient to the other. Further, doing so ensures
- 24 -
that the protection against compelled self-incrimination and the interests of law enforcement in
executing a valid search warrant are both respected.
¶ 94 These considerations provide further support for our conclusion that the Third
District in Spicer erroneously relied on the faulty reasoning of the G.A.Q.L. court to hold that the
proper focus of a foregone conclusion analysis is on the contents of the phone instead of the
production of the passcode. Spicer, 2019 IL App (3d) 170814, ¶ 21. The G.A.Q.L. court reasoned
that the phone’s contents is where the proper focus should lie because that is what the government
truly seeks, not the passcode itself. G.A.Q.L., 257 So. 3d at 1062. However, as illustrated above,
this reasoning conflates fourth amendment concerns with fifth amendment concerns.
¶ 95 As the Fisher court explained,
“We cannot cut the Fifth Amendment completely loose from the moorings
of its language, and make it serve as a general protector of privacy[,] a word not
mentioned in its text and a concept directly addressed in the Fourth Amendment.
We adhere to the view that the Fifth Amendment protects against ‘compelled self-
incrimination, not (the disclosure of) private information.’ ” Fisher, 425 U.S. at 401
(quoting United States v. Nobles, 422 U.S. 225, 233 n.7 (1975)).
¶ 96 We acknowledge the Illinois Supreme Court’s recent decision in People v.
McCavitt, 2021 IL 125550, ¶ 4, which addressed “a person’s reasonable expectation of privacy in
data on an electronic storage device that is subject to search” and “the fourth amendment’s
particularity requirement as applied to electronic storage devices.” However, in the case before us,
defendant has not challenged the validity of the search warrant, which authorizes the State to seize
the contents of his phone. McCavitt does not address the application of the fifth amendment where
a phone that is the subject of a lawful search warrant is passcode-protected and the owner of the
- 25 -
phone declines to provide the passcode.
¶ 97 ii. Application of the Foregone Conclusion Doctrine to This Case
¶ 98 Applying these principles to the case before us, for the forgone conclusion doctrine
to apply, the State must establish with reasonable particularity (1) it knows the passcode exists,
(2) the passcode is within the defendant’s possession or control, and (3) the passcode is authentic.
See Andrews, 234 A.3d at 1274-75; Stahl, 206 So. 3d at 136.
¶ 99 Ummel testified that (1) the phone is locked by a security passcode, (2) defendant
has not provided him with the passcode, and (3) Ummel does not have the technology to “crack”
the passcode. This evidence establishes with reasonable particularity that a passcode for the phone
exists.
¶ 100 Ummel further testified that one phone was retrieved from defendant and another
was retrieved from Spurling. Defendant provided his phone number on a jail form when bonding
out. When Ummel dialed that phone number, the phone Ummel identified as belonging to
defendant in the complaint for search warrant would ring. This evidence establishes with
reasonable particularity that defendant has had possession or control of the phone and, accordingly,
has possession or control of the passcode required to access and utilize the phone.
¶ 101 Last, the courts in Andrews and Stahl addressed the authenticity element in the
context of a cell phone passcode, noting that a passcode is self-authenticating. Stahl, 206 So. 3d at
136; Andrews, 234 A.3d at 1275. That is, if the passcode provides entry to the phone, the passcode
is authentic. Stahl, 206 So. 3d at 136; Andrews, 234 A.3d at 1275. Therefore, the authenticity
element will be determined when the passcode is entered into the phone.
¶ 102 Accordingly, the State has shown with reasonable particularity that the passcode
exists and is within defendant’s possession or control. The passcode will self-authenticate if it
- 26 -
unlocks the phone. As such, the foregone conclusion doctrine is satisfied, rendering the act of
producing the passcode non-testimonial and outside the protection of the fifth amendment
privilege against self-incrimination.
¶ 103 Even applying Spicer’s analytical framework to the facts of this case, the foregone
conclusion doctrine applies because, as discussed supra, ¶¶ 78-80, the State has also established
with reasonable particularity the “contents of the phone.”
¶ 104 c. Evidence of the Act of Production at Trial
¶ 105 At the hearing on the motion to compel, and in its brief before this court, the State
represented that it would not use at trial evidence of defendant’s act of production of the passcode.
The State explained that it “doesn’t need an intricate pass code to prove ownership of the phone
or its contents.” That is precisely the point of the foregone conclusion doctrine; the testimony
implied by the act of producing the passcode—i.e., the defendant has knowledge of the passcode—
“adds little or nothing to the sum total of the Government’s information.” Fisher, 425 U.S. at 411.
¶ 106 We agree with the State that the defendant’s knowledge of the phone’s passcode
and his knowledge of the phone’s contents are two different things. Because of the commitment
the State has made to the trial court—namely, that it will not use evidence of defendant’s act of
production at trial—the State will be required to prove defendant’s knowledge of the phone’s
contents through other means. And on remand, the State’s commitment is enforceable by the trial
court.
¶ 107 III. CONCLUSION
¶ 108 For the reasons stated, we reverse the judgment of the trial court and remand for
further proceedings consistent with this opinion.
¶ 109 Reversed and remanded.
- 27 -
- 28 -
No. 4-21-0180
Cite as: People v. Sneed, 2021 IL App (4th) 210180
Decision Under Review: Appeal from the Circuit Court of De Witt County, No. 21-CF-13;
the Hon. Karle E. Koritz, Judge, presiding.
Attorneys Daniel Markwell, State’s Attorney, of Clinton (Patrick Delfino,
for David J. Robinson, David E. Mannchen, and James C. Majors, of
Appellant: State’s Attorneys Appellate Prosecutor’s Office, of counsel), for
the People.
Attorneys James E. Chadd, Catherine K. Hart, and Joshua Scanlon, of State
for Appellate Defender’s Office, of Springfield, for appellee.
Appellee:
- 29 -