J. A20044/17
2017 PA Super 376
COMMONWEALTH OF PENNSYLVANIA : IN THE SUPERIOR COURT OF
: PENNSYLVANIA
v. :
:
JOSEPH J. DAVIS, : No. 1243 MDA 2016
:
Appellant :
Appeal from the Order Entered June 30, 2016,
in the Court of Common Pleas of Luzerne County
Criminal Division at Nos. CP-40-CR-0000291-2016,
CP-40-MD-0000011-2016
BEFORE: GANTMAN, P.J., PANELLA, J., AND FORD ELLIOTT, P.J.E.
OPINION BY FORD ELLIOTT, P.J.E.: FILED NOVEMBER 30, 2017
Joseph J. Davis appeals from the June 30, 2016 order granting the
Commonwealth’s pre-trial motion to compel appellant to provide the
password that will allow access to his lawfully-seized encrypted computer.
After careful review, we affirm.
The relevant facts and procedural history of this case are as follows.
On October 10, 2015, law enforcement officials executed a search warrant at
appellant’s residence after it was determined that a computer with an
IP address subscribed to appellant utilized peer-to-peer file sharing network,
eMule, to share videos depicting child pornography. During the course of
the search, law enforcement officials seized a password-encrypted
HP Envy 700 desktop computer. The Forensic Unit of the Pennsylvania
J. A20044/17
Office of Attorney General (“POAG”) was unable to examine the contents of
this computer due to the “TrueCrypt” encryption program installed on it and
appellant has refused to provide the password to investigating agents.
On December 17, 2015, the Commonwealth filed a pre-trial “Motion to
Compel Defendant to Provide Password for Encryption Enabled Device.” On
January 14, 2016, the trial court conducted an evidentiary hearing on the
Commonwealth’s motion. The testimony adduced at this hearing was
summarized by the trial court as follows:
TESTIMONY OF SPECIAL AGENT [JUSTIN] LERI
On July 14, 2014, [POAG] Agent Leri was
conducting an online investigation on the
eDonkey2000[1] network for offenders sharing child
pornography. On that date a computer was located
that was sharing files believed to be sharing other
files of child pornography. When the computer is
located that is suspected of sharing these files, the
IP address of that computer is recorded and one-to-
one connection is made.
Agent Leri testified that the focus of the
investigation was a device at IP address
98.235.69.242. This device had a 1-to-1 connection
to the [POAG] as a suspect file, depicting child
pornography. The agent was undercover in a peer to
peer connection. Later that same day, the file from
the suspect device was made available and
downloaded through the direct connection to the law
enforcement computer.
1 We note that the terms “eDonkey2000” and “eMule” are used
interchangeably throughout the transcript of the January 14, 2016 hearing
to describe the peer-to-peer file sharing network. (See notes of testimony,
1/14/16 at 5.)
-2-
J. A20044/17
Special Agent Leri personally viewed the file
identified as [boy+man][MB]NEW!!Man&Boy
13Yo.mpg. He described it as a video,
approximately twenty[-]six (26) minutes and fifty[-]
four (54) seconds in length, depicting a young
prepubescent boy. [Agent Leri’s description of the
contents of the video clearly established its extensive
pornographic nature.] Officer Leri is certain that the
video he watched came from [appellant’s] computer.
He attested that the law enforcement software is
retrofitted for law enforcement and the software logs
in the activity. The retrofit allows for one-to-one
connection only. According to Agent Leri, what this
means is that law enforcement is directly connected
to the subject’s computer and only the suspect’s
computer.
The IP address was registered to Comcast
Communication. After obtaining a court order
directing Comcast Cable to release the subscriber
information, [appellant] was identified as the
subscriber. The [POAG] then obtained a search
warrant for the listed address. The warrant was
executed on September 9, 2014. The agent testified
that [appellant] waived his Miranda[2] rights and
admitted that he did his time for prior pornography
arrests. He then refused to answer any questions.
SPECIAL AGENT [DANIEL] BLOCK
Agent Block testified that he is a special agent
assigned to the Child Predator Section of the
[POAG]. On October 4, 2015, an online investigation
on the eMule network for offenders sharing child
pornography was being conducted. The internet
provider was determined to be Comcast and an
administrative subpoena was issued which revealed
the billing information belonged to the billing
address. The focus of the investigation was
IP address 174.59.168.185, port 6350. The file was
downloaded and viewed.
2 Miranda v. Arizona, 384 U.S. 436 (1966).
-3-
J. A20044/17
[Agent Block’s testimony indicated that the
video in question depicted a prepubescent boy
between the ages of nine and eleven years old and
clearly described the extensive pornographic content
of the video.]
Special Agent Block indicated that the Log File
provides the date and time of the download and the
client user’s hashtag which is unique to [appellant].
Again Comcast Cable identified, through a Court
Order, the subscriber was [appellant]. A search
warrant was prepared and executed at [appellant’s]
home. Agent Block executed a search warrant on
[appellant] at his residence and gave [appellant] his
Miranda warnings. While he was at [appellant’s]
home, [appellant] spoke to Agent Block telling him
he resided alone at the apartment since 2006 and
that he was hardwired internet services which are
password protected. According to Agent Block,
[appellant] stated he uses this service so no one else
can steal his Wi-Fi. There was only one computer in
the house and that [no]one else uses it.
[Appellant] told Agent Block that he was
previously arrested for child pornography related
crimes. His reasoning was that it is legal in other
countries like Japan and [the] Czech Republic, and
he does not know why it is illegal here. He stated
“what people do in the privacy of their own homes is
their own business. It’s all over the Internet. I don’t
know why you guys care so much about stuff when
people are getting killed and those videos are being
posted.”
Agent Block testified that [appellant’s]
IP address was used during downloads on the
following dates: July 4, 2015; July 5, 2015; July 6,
2015; July 19, 2015; July 20, 2015, August 2, 2015;
August 9, 2015; August 16, 2015; September 5,
2015; September 12, 2015; September 13, 2015;
September 14, 2015; September 19, 2015;
September 20, 2015; September 23, 2015;
September 26, 2015; September 27, 2015;
October 4, 2015; October 5, 2015; October 10,
-4-
J. A20044/17
2015; October 17, 2015; October 18, 2015 and
October 19, 2015.
While transporting [appellant] to his
arraignment, [appellant] spoke about gay, X-rated
movies that he enjoyed watching. He stated that he
liked 10, 11, 12 & 13 year olds, referring to them as,
“[a] perfectly ripe apple.” Agent Block requested
that [appellant] give him his password. [Appellant]
replied that it is sixty-four (64) characters and “Why
would I give that to you?” “We both know what’s on
there. It’s only going to hurt me. No f[***]ing way
I’m going to give it to you.”
TESTIMONY OF AGENT BRADEN COOK
After [appellant] was arrested and the various
devices were confiscated, Agent Cook previewed the
computer. The hard drive was found to contain a
“TrueCrypt” encrypted protected password setup
with TrueCrypt 7.1 aBootloader. The user must
input the password for the TrueCrypt encrypted
volume in order to boot the system into the
Operating System.
Agent Cook stated that [appellant] told him
that he could not remember the password. Moreover
[appellant] stated that although the hard drive is
encrypted, Agent Cook knows what is on the hard
drive.
Trial court opinion, 6/30/16 at 3-7 (citations to notes of testimony omitted).
On February 11, 2016, appellant was charged with two counts of
distribution of child pornography and two counts of criminal use of a
communication facility.3 Thereafter, on June 30, 2016, the trial court
granted the Commonwealth’s motion to compel and directed appellant to
3 18 Pa.C.S.A. §§ 6312(c) and 7512(a), respectively.
-5-
J. A20044/17
supply the Commonwealth with the password used to access his computer
within 30 days. (Trial court order, 6/30/16; certified record at no. 4.) In
reaching this decision, the trial court reasoned that appellant’s argument
under the Fifth Amendment right against self-incrimination is meritless
because “[his] act of [providing the password in question] loses its
testimonial character because the information is a for[e]gone conclusion.”
(See trial court opinion, 6/30/16 at 13 (internal quotation marks omitted).)
On July 15, 2016, appellant filed a motion to immediately appeal the
trial court’s June 30, 2016 order. On July 19, 2016, the trial court granted
appellant’s motion by amending its June 30, 2016 order to include the
42 Pa.C.S.A. § 702(b) language.4 On July 21, 2016, appellant filed a timely
4 42 Pa.C.S.A. § 702(b) provides as follows:
(b) Interlocutory appeals by permission.--
When a court or other government unit, in
making an interlocutory order in a matter in
which its final order would be within the
jurisdiction of an appellate court, shall be of
the opinion that such order involves a
controlling question of law as to which there is
substantial ground for difference of opinion and
that an immediate appeal from the order may
materially advance the ultimate termination of
the matter, it shall so state in such order. The
appellate court may thereupon, in its
discretion, permit an appeal to be taken from
such interlocutory order.
42 Pa.C.S.A. § 702(b).
-6-
J. A20044/17
notice of appeal, pursuant to Pa.R.A.P. 313(b).5 The trial court ordered
appellant to file a concise statement of errors complained of on appeal, in
accordance with Pa.R.A.P. 1925(b), on July 29, 2016. Thereafter, on
August 8, 2016, this court entered an order directing appellant to show
cause why the appeal should not be quashed. On August 17, 2016,
appellant filed a timely Rule 1925(b) statement. Appellant then filed a
response to our show-cause order on August 22, 2016. On September 27,
2016, the trial court filed a one-page Rule 1925(a) opinion that incorporated
by reference its prior June 30, 2016 opinion. On October 5, 2016, this court
entered an order denying appellant’s July 15, 2016 motion, which we treated
as a petition for permission to appeal, discharging the show-cause order,
and referring the issue of appealability to the merits panel.
Appellant raises the following issue for our review:
Whether [a]ppellant should be compelled to provide
his encrypted digital password despite the rights and
protection provided by the Fifth Amendment to the
United States Constitution and Article 1, Section 9 of
the Pennsylvania Constitution?
Appellant’s brief at 4.
5 We note that appellant should have filed a petition for permission to
appeal, since the trial court granted his petition to amend the underlying
June 30, 2016 order. See Pa.R.A.P. 1311(b) (stating, “[p]ermission to
appeal from an interlocutory order containing the statement prescribed by
42 Pa.C.S. § 702(b) may be sought by filing a petition for permission to
appeal with the prothonotary of the appellate court within 30 days after
entry of such order in the lower court . . . .”).
-7-
J. A20044/17
Before we may entertain the merits of appellant’s underlying claim, we
must first determine whether this court has jurisdiction to consider the
appeal under Pa.R.A.P. 313. Although the Commonwealth has not raised a
question regarding our jurisdiction over the trial court’s interlocutory order,
we may nevertheless raise the issue of jurisdiction sua sponte.
Commonwealth v. Shearer, 882 A.2d 462, 465 n.4 (Pa. 2005).
It is well settled that, generally, appeals may
be taken only from final orders; however, the
collateral order doctrine permits an appeal as of right
from a non-final order which meets the criteria
established in Pa.R.A.P. 313(b). Pa.R.A.P. 313 is
jurisdictional in nature and provides that “[a]
collateral order is an order [1] separable from and
collateral to the main cause of action where [2] the
right involved is too important to be denied review
and [3] the question presented is such that if review
is postponed until final judgment in the case, the
claim will be irreparably lost.” Pa.R.A.P. 313(b).
Thus, if a non-final order satisfies each of the
requirements articulated in Pa.R.A.P. 313(b), it is
immediately appealable.
Commonwealth v. Blystone, 119 A.3d 306, 312 (Pa. 2015) (case citations
omitted; quotation marks in original).
Upon review, we conclude that the order in question satisfies each of
the three requirements articulated in Rule 313(b). Specifically, the trial
court’s June 30, 2016 order is clearly “separable from and collateral to the
main cause of action” because the issue of whether the act of compelling
appellant to provide his computer’s password violates his Fifth Amendment
right against self-incrimination can be addressed without consideration of
-8-
J. A20044/17
appellant’s underlying guilt. See Pa.R.A.P. 313(b). Second, courts in this
Commonwealth have continually recognized that the Fifth Amendment right
against self-incrimination is the type of privilege that is deeply rooted in
public policy and “too important to be denied review.” Id.; see, e.g.,
Veloric v. Doe, 123 A.3d 781, 786 (Pa.Super. 2015) (stating that, “the
privilege against self-incrimination is protected under both the United States
and Pennsylvania Constitutions . . . and is so engrained in our nation that it
constitutes a right deeply rooted in public policy[]”(citations and internal
quotation marks omitted)); Ben v. Schwartz, 729 A.2d 547, 552 (Pa.
1999) (holding that orders overruling claims of privilege and requiring
disclosures were immediately appealable under Rule 313(b)). Lastly, we
agree with appellant that if review of this issue is postponed and appellant is
compelled to provide a password granting the Commonwealth access to
potentially incriminating files on his computer, his claim will be irreparably
lost. See Commonwealth v. Harris, 32 A.3d 243, 249 (Pa. 2011)
(concluding that appeal after final judgment is not an adequate vehicle for
vindicating a claim of privilege and reaffirming the court’s position in Ben
“that once material has been disclosed, any privilege is effectively
destroyed[]”). Accordingly, we deem the order in question immediately
appealable and proceed to address the merits of appellant’s claim.
The question of whether compelling an individual to provide a digital
password is testimonial in nature, thereby triggering the protections afforded
-9-
J. A20044/17
by the Fifth Amendment right against self-incrimination, and is an issue of
first impression for this court. As this issue involves a pure question of law,
“our standard of review is de novo and our scope of review is plenary.”
Commonwealth v. 1997 Chevrolet & Contents Seized from Young,
160 A.3d 153, 171 (Pa. 2017) (citation omitted).
The Fifth Amendment provides “no person . . .
shall be compelled in any criminal case to be a
witness against himself[.]” U.S. Const. amend. V.
This prohibition not only permits an individual to
refuse to testify against himself when he is a
defendant but also privileges him not to answer
official questions put to him in any other proceeding,
civil or criminal, formal or informal, where the
answers might incriminate him in future criminal
proceedings.
Commonwealth v. Cooley, 118 A.3d 370, 375 (Pa. 2015) (case citations
and some internal quotation marks omitted). “To qualify for the Fifth
Amendment privilege, a communication must be testimonial, incriminating
and compelled.” Commonwealth v. Reed, 19 A.3d 1163, 1167 (Pa.Super.
2011) (citation omitted), appeal denied, 30 A.3d 1193 (Pa. 2011).6
Although not binding on this court, the Supreme Judicial Court of
Massachusetts examined the Fifth Amendment implications of compelling an
individual to produce a password key for an encrypted computer and its
6 We note that our supreme court has recognized that Article I, § 9 of the
Pennsylvania Constitution “affords no greater protections against
self-incrimination than the Fifth Amendment to the United States
Constitution.” Commonwealth v. Knoble, 42 A.3d 976, 979 n.2 (Pa.
2012) (citation omitted).
- 10 -
J. A20044/17
relation to the “forgone conclusion” doctrine in Commonwealth v.
Gelfgatt, 11 N.E.3d 605 (2014). The Gelfgatt court explained that,
[t]he “foregone conclusion” exception to the Fifth
Amendment privilege against self-incrimination
provides that an act of production does not involve
testimonial communication where the facts conveyed
already are known to the government, such that the
individual “adds little or nothing to the sum total of
the Government’s information.” For the exception to
apply, the government must establish its knowledge
of (1) the existence of the evidence demanded;
(2) the possession or control of that evidence by the
defendant; and (3) the authenticity of the evidence.
Id. at 614, citing Fisher v. United States, 425 U.S. 391, 410-413 (1976)
(quotation marks in original; remaining citations omitted).
More recently, in United States v. Apple MacPro Computer, 851
F.3d 238 (3d. Cir. 2017), the Third Circuit Court of Appeals explained that in
order for the foregone conclusion exception to apply, the Commonwealth
“must be able to describe with reasonable particularity the documents or
evidence it seeks to compel.” Id. at 247, citing United States v. Bright,
596 F.3d 683, 692 (9th Cir. 2010).
Additionally, in State v. Stahl, 206 So.3d 124 (Fla. Dist. Ct. App.
2016), the Second District Court of Appeals of Florida addressed a similar
issue in the context of a motion to compel a defendant charged with video
voyeurism to produce the passcode for his iPhone. The Stahl court held
that requiring a defendant to produce his passcode did not compel him to
- 11 -
J. A20044/17
communicate information that had testimonial significance. Id. at 135. The
Stahl court reasoned as follows:
To know whether providing the passcode
implies testimony that is a foregone conclusion, the
relevant question is whether the State has
established that it knows with reasonable
particularity that the passcode exists, is within the
accused’s possession or control, and is authentic.
....
The State established that the phone could not be
searched without entry of a passcode. A passcode
therefore must exist. It also established, with
reasonable particularity based upon cellphone carrier
records and Stahl’s identification of the phone and
the corresponding phone number, that the phone
was Stahl’s and therefore the passcode would be in
Stahl’s possession. That leaves only authenticity.
And as has been seen, the act of production and
foregone conclusion doctrines cannot be seamlessly
applied to passcodes and decryption keys. If the
doctrines are to continue to be applied to passcodes,
decryption keys, and the like, we must recognize
that the technology is self-authenticating—no other
means of authentication may exist. If the phone or
computer is accessible once the passcode or key has
been entered, the passcode or key is authentic.
Id. at 136 (citations omitted). With these principles in mind, we turn to the
issue presented.
Appellant contends that the act of compelling him to disclose the
password in question is tantamount to his testifying to the existence and
location of potentially incriminating computer files, and that contrary to the
trial court’s reasoning, it is not a “foregone conclusion” that the computer in
question contains child pornography because the Commonwealth conceded it
- 12 -
J. A20044/17
does not actually know what exact files are on the computer. (Appellant’s
brief at 7-8.) We disagree.
As noted, the United States Supreme Court has long recognized that
the Fifth Amendment right against self-incrimination is not violated when the
information communicated to the government by way of a compelled act of
production is a foregone conclusion. See Fisher, 425 U.S. at 409.
Instantly, the record reflects that appellant’s act of disclosing the password
at issue would not communicate facts of a testimonial nature to the
Commonwealth beyond that which he has already acknowledged to
investigating agents.
Specifically, the testimony at the January 14, 2016 hearing established
that the Commonwealth “knows with reasonable particularity that the
passcode exists, is within the accused’s possession or control, and
is authentic.” See Stahl, 206 So.3d at 136 (emphasis added). First, the
Commonwealth clearly established that the computer in question could not
be searched without entry of a password. The computer seized from
appellant’s residence was encrypted with “TrueCrypt” software that required
a 64-character password to bypass. (Notes of testimony, 1/14/16 at 26, 30,
42.) Second, the Commonwealth clearly established that the computer
belonged to appellant and the password was in his possession. Appellant
acknowledged to both Agent Leri and Agent Block that he is the sole user of
the computer and the only individual who knows the password in question.
- 13 -
J. A20044/17
(Id. at 11, 26-28.) As noted, appellant repeatedly refused to disclose said
password, admitting to Agent Block that “we both know what is on [the
computer]” and stating “[i]t’s only going to hurt me.” (Id. at 30.)
Additionally, appellant informed Agent Leri that giving him the password
“would be like . . . putting a gun to his head and pulling the trigger” and that
“he would die in jail before he could ever remember the password.” (Id. at
36, 37.) Third, we agree with the court in Stahl that “technology is
self-authenticating.” Stahl, 206 So.3d at 136. Namely, if appellant’s
encrypted computer is accessible once its password has been entered, it is
clearly authentic.
Moreover, we recognize that multiple jurisdictions have recognized
that the government’s knowledge of the encrypted documents or evidence
that it seeks to compel need not be exact. See Securities and Exchange
Commission v. Huang, 2015 WL 5611644, at *3 (E.D. Pa. 2015) (stating,
“the Government need not identify exactly the underlying documents it
seeks[.]” (citation and internal quotation marks omitted)); Stahl, 206 So.3d
at 135 (stating, “the State need not have perfect knowledge of the
requested evidence[.]” (citation and internal quotation marks omitted)).
Herein, the record reflects that there is a high probability that child
pornography exists on said computer, given the fact that the POAG’s
investigation determined that a computer with an IP address subscribed to
appellant utilized a peer-to-peer file sharing network, eMule, approximately
- 14 -
J. A20044/17
25 times in 2015 to share videos depicting child pornography (notes of
testimony, 1/14/16 at 5-8, 19-24, 28-29); the sole computer seized from
appellant’s residence had hard-wired internet that was inaccessible via a
WiFi connection and contained a Windows-based version of the eMule
software (see id. at 7, 12, 26); and as noted, appellant implied as to the
nefarious contents of the computer on numerous occasions (see id. at 30,
36-37).
Based on the forgoing, we agree with the trial court that appellant’s
act of providing the password in question is not testimonial in nature and his
Fifth Amendment right against self-incrimination would not be violated.
Accordingly, we discern no error on the part of the trial court in granting the
Commonwealth’s pre-trial motion to compel appellant to provide the
password that will allow access to his lawfully seized encrypted computer.
Order affirmed.
Judgment Entered.
Joseph D. Seletyn, Esq.
Prothonotary
Date: 11/30/2017
- 15 -