Can the Government Force Suspects to Decrypt Incriminating Files? | Brookings (2024)

  • 4 min read

In October 2010, law enforcement agents pursuing a child p*rnography investigation tracked a Florida man suspected of sharing illegal images to a hotel room in California. After obtaining a search warrant, they raided the room, seizing computers and hard drives with nearly five terabytes of total storage capacity. However, they soon hit a roadblock: Portions of the hard drives had been encrypted and were unreadable without a password. The suspect refused to decrypt the drives, and a federal district court in Florida held him in contempt and ordered him incarcerated. However, late last month, a federal appeals court overturned the contempt holding, ruling that the suspect’s refusal was protected under the Fifth Amendment right against self-incrimination.

What happens when the government’s desire to access a suspect’s encrypted electronic documents runs up against the Fifth Amendment? As with so many of today’s technology-related constitutional questions, the answers are complex, evolving, and sometimes contradictory. However, across the relatively small set of court rulings that have directly addressed this issue, a few key things stand out.

Courts have consistently held that defendants cannot be forced to divulge passwords. However, and more practically with respect to the end result, a defendant can sometimes be forced to use a decryption password—without divulging it—and then to provide the files in readable form. Whether the government can compel decryption in this manner depends on a legal doctrine called “foregone conclusion” that was first articulated in a 1976 Supreme Court ruling relating to paper documents in a tax fraud case.

Under the “foregone conclusion” doctrine as applied to digital documents, handing over files is not considered testimony if the government already knows that the files exist and what machines they live on. And when there is no testimony, the protection of the Fifth Amendment’s self-incrimination clause is not available. Prosecutors with specific information about the existence and location of files on encrypted hard drives are more likely to convince a court to order a suspect to decrypt them.

In another child p*rnography case, officials at a Vermont border crossing inspected a laptop in a car entering the United States from Canada. Upon seeing filenames suggesting illegal images, they seized the computer and arrested its owner. The laptop turned out to be encrypted, and in February 2009 a federal district court judge ordered the defendant to reveal its contents, largely on the grounds that the government already knew it contained incriminating files. The defendant complied and was later convicted.

By contrast, an ongoing mortgage fraud case in Colorado involved a more nuanced set of issues. Investigators seized an encrypted laptop and subsequently recorded a phone conversation in which the defendant suggested that it contained incriminating files. In January, a judge ordered the defendant to decrypt the laptop’s hard drive—but also acknowledged that the investigators did not know the “specific content of any specific documents” that might be found. The order became effectively moot in late February when authorities found a way to decrypt the drive without the defendant’s help.

Let’s return now to the Florida man who refused to decrypt his seized hard drives. In that case the government suspected, but did not know with certainty, that the hard drives contained incriminating files. As Judge Gerald Bard Tjoflat, writing for a three-judge panel of the 11th U.S. Circuit Court of Appeals, explained in the decision, “We find no support in the record for the conclusion that the Government, at the time it sought to compel production, knew to any degree of particularity what, if anything, was hidden behind the encrypted wall.”

This ruling has been hailed as a victory for constitutional rights, and in a sense, it is. But there is also a potential dark side that we would be remiss not to acknowledge. Do we really want to provide terrorists and human traffickers with an impenetrable legal shield for documents that might otherwise incriminate them? Is the greater good really served if a rape or murder suspect escapes conviction because he hid evidence—for example, digital maps of a victim’s address—behind encryption? Could this legal framework allow encrypted, illegal images of children to be stored and exchanged with impunity?

These questions illustrate the contemporary challenges of determining the scope of the Fifth Amendment. It was ratified in 1791 and now is being applied, with the aid of a 1970s-era legal precedent, to 21st-century digital encryption. In the pre-digital age, there was a distinct boundary between the information that resided only in our minds and the information that we committed to paper. The former was afforded strong constitutional protection; the latter, much less so. But modern encryption blurs that boundary by enabling the storage of essentially infinite amounts of information that can be unlocked only by passwords stored in our minds. (If only all criminals hid Post-Its with their passwords under their keyboards.) Put another way, encryption creates the possibility that our digital data and devices will be viewed, in the legal sense, as extensions of ourselves.

It is, of course, too early to know what the Supreme Court will say on this matter. But at some point, it will weigh in. And when it does, what is the proper way to handle the intersection of encryption and the Fifth Amendment? The solution will probably require updating the “foregone conclusion” doctrine. In particular, its requirement related to the location of incriminating documents is not well matched to a world with billions of electronic devices, and in which cloud computing is rapidly becoming the norm. Instead, a requirement that the government must be able to show possession of incriminating documents before being able to compel their decryption might be more appropriate for the 21st century.

This piece originally appeared at

Slate.com

.

The geopolitics of generative AI

Upcoming Event

July 19

2023

Artificial Intelligence & Emerging Technology The geopolitics of generative AI

Online only

3:00 pm - 4:00 pm EDT

Can the Government Force Suspects to Decrypt Incriminating Files? | Brookings (2024)

FAQs

Can the Government Force Suspects to Decrypt Incriminating Files? | Brookings? ›

Courts have consistently held that defendants cannot be forced to divulge passwords. However, and more practically with respect to the end result, a defendant can sometimes be forced to use a decryption password—without divulging it—and then to provide the files in readable form.

What is compelled decryption under the 5th Amendment? ›

Numeric or Alphanumeric Locks: Courts have generally found that compelling individuals to provide their numeric or alphanumeric passcode is potentially testimonial under the Fifth Amendment, as it forces the defendant to reveal “the contents of his own mind.” In Re Grand Jury Subpoena Duces Tecum 670 F.

Can BitLocker be cracked by the government? ›

According to Microsoft sources, BitLocker does not contain an intentionally built-in backdoor, so there is no Microsoft-provided way for law enforcement to have guaranteed access to the data on a user's drive.

Can law enforcement in the US compel suspects to provide decryption keys? ›

Law enforcement in the US can compel suspects to provide decryption keys in the event encrypted evidence is identified on their digital devices but there is no information present to suggest there is incriminating evidence present in those files.

How does the government violate the 5th Amendment? ›

Even if a person is guilty of a crime, the Fifth Amendment demands that the prosecutors come up with other evidence to prove their case. If police violate the Fifth Amendment by forcing a suspect to confess, a court may suppress the confession, that is, prohibit it from being used as evidence at trial.

Can the government break 256 bit encryption? ›

Is AES-256 Encryption Crackable? AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities. However, no encryption standard or system is completely secure.

Can police decrypt FileVault? ›

Maybe. FileVault doesn't have any active component guarding the keys and limiting the rate at which you can make guesses. The storage FileVault protects is also not physically bonded to anything intended to protect it.

What triggers BitLocker encryption? ›

Because BitLocker is designed to protect computers from numerous attacks, there are numerous reasons why BitLocker could start in recovery mode. For example: Changing the BIOS boot order to boot another drive in advance of the hard drive. Adding or removing hardware, such as inserting a new card in the computer.

What is compelled decryption? ›

1 When someone is arrested while carrying a phone, the government must get a warrant before searching it. Armed with a warrant, the government can search the phone. But if the phone is locked with an encrypted passcode, the government has two choices: hack in, or force the suspect to unlock it.

What is the 5th Amendment compelled? ›

This right is often referred to as the Fifth Amendment Privilege or, more colloquially, as the right to “take the Fifth.” The Supreme Court has many times affirmed the most natural understanding of these words: the defendant in a criminal case cannot be compelled to testify—that is, she can't be called to the stand and ...

What is not protected by the Fifth Amendment? ›

The Grand Jury Clause of the Fifth Amendment does not protect those serving in the armed forces, whether during wartime or peacetime. Members of the state militia called up to serve with federal forces are not protected under the clause either.

What does I invoke the 5th Amendment? ›

The Fifth Amendment also protects criminal defendants from having to testify if they may incriminate themselves through the testimony. A witness may "plead the Fifth" and not answer if the witness believes answering the question may be self-incriminatory. In the landmark Miranda v.

Top Articles
IBISWorld - Industry Market Research, Reports, and Statistics
Palm Beach County - Get Your Green On
Craigslist Livingston Montana
Chris Provost Daughter Addie
Form V/Legends
Women's Beauty Parlour Near Me
Parks in Wien gesperrt
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Xm Tennis Channel
Missing 2023 Showtimes Near Landmark Cinemas Peoria
Regular Clear vs Low Iron Glass for Shower Doors
Shariraye Update
Mlb Ballpark Pal
UEQ - User Experience Questionnaire: UX Testing schnell und einfach
Ts Lillydoll
Nwi Arrests Lake County
Minecraft Jar Google Drive
Costco Gas Foster City
New Stores Coming To Canton Ohio 2022
Troy Bilt Mower Carburetor Diagram
Lazarillo De Tormes Summary and Study Guide | SuperSummary
라이키 유출
Craigslist Red Wing Mn
Iu Spring Break 2024
All Obituaries | Gateway-Forest Lawn Funeral Home | Lake City FL funeral home and cremation Lake City FL funeral home and cremation
Greenville Sc Greyhound
TeamNet | Agilio Software
*!Good Night (2024) 𝙵ull𝙼ovie Downl𝚘ad Fr𝚎e 1080𝚙, 720𝚙, 480𝚙 H𝙳 HI𝙽DI Dub𝚋ed Fil𝙼yz𝚒lla Isaidub
Isablove
County Cricket Championship, day one - scores, radio commentary & live text
Inmate Search Disclaimer – Sheriff
Red Sox Starting Pitcher Tonight
Ultra Clear Epoxy Instructions
Greencastle Railcam
Marine Forecast Sandy Hook To Manasquan Inlet
oklahoma city community "puppies" - craigslist
Nearest Ups Office To Me
Joey Gentile Lpsg
Taylor University Baseball Roster
Questions answered? Ducks say so in rivalry rout
Dcilottery Login
Ucsc Sip 2023 College Confidential
Best Restaurants West Bend
Umd Men's Basketball Duluth
Lyndie Irons And Pat Tenore
Fedex Passport Locations Near Me
How to Install JDownloader 2 on Your Synology NAS
Tropical Smoothie Address
Conan Exiles Colored Crystal
Joy Taylor Nip Slip
Rovert Wrestling
Diamond Desires Nyc
Latest Posts
Article information

Author: Roderick King

Last Updated:

Views: 5951

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Roderick King

Birthday: 1997-10-09

Address: 3782 Madge Knoll, East Dudley, MA 63913

Phone: +2521695290067

Job: Customer Sales Coordinator

Hobby: Gunsmithing, Embroidery, Parkour, Kitesurfing, Rock climbing, Sand art, Beekeeping

Introduction: My name is Roderick King, I am a cute, splendid, excited, perfect, gentle, funny, vivacious person who loves writing and wants to share my knowledge and understanding with you.