{"id":30665,"date":"2017-12-12T06:57:19","date_gmt":"2017-12-12T11:57:19","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=30665"},"modified":"2017-12-12T06:57:20","modified_gmt":"2017-12-12T11:57:20","slug":"ma-production-of-password-to-iphone-doesnt-violate-5a-because-ownership-of-iphone-is-foregone-conclusion","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=30665","title":{"rendered":"MA: Production of password to iPhone doesn&#8217;t violate 5A because ownership of iPhone is foregone conclusion"},"content":{"rendered":"<p>The state via a grand jury request sought the password to defendant\u2019s iPhone. Production of the password would implicate self-incrimination concerns, but, here, it\u2019s a foregone conclusion that it\u2019s his phone and there are no self-incrimination concerns. Civil contempt affirmed <a href=\"https:\/\/www.mass.gov\/files\/documents\/2017\/12\/11\/16P0215.pdf\">In the Matter of a Grand Jury Investigation<\/a>, 2017 Mass. App. LEXIS 158 (Dec. 11, 2017):<br \/>\n<!--more--><\/p>\n<blockquote><p>The foregone conclusion exception has applied when the government independently and with specificity established the authenticity, existence, and possession of the compelled information. Gelfgatt, supra at 522. In Gelfgatt, the Commonwealth possessed \u201cdetailed evidence\u201d of fraudulent mortgages linked to a financial services company. 468 Mass. at 523. When the defendant was arrested, he admitted to the police that he worked for the financial services company and had communications with the company contained on his home computers, which he had encrypted and only he could decrypt. Id. at 517. Although the court acknowledged that by entering an encryption key into his computers, \u201cthe defendant implicitly would be acknowledging that he has ownership and control of the computers and their contents[,] \u2026 facts that would be relevant to the Commonwealth&#8217;s case,\u201d id. at 522, the court found that \u201cthe factual statements that would be conveyed\u201d were a \u201cforegone conclusion,\u201d id. at 523, because \u201cthe defendant&#8217;s act of decryption would not communicate facts \u2026 beyond what the defendant already \u2026 admitted to investigators.\u201d Id. at 519.<\/p>\n<p>Here, the Commonwealth contends that the act of the petitioner entering the correct PIN code, in light of the evidence already known to the Commonwealth, communicates only evidence that is merely a foregone conclusion and \u201cadds little or nothing to the sum total of the Government&#8217;s information.\u201d Id. at 522, quoting from Fisher, supra. We agree. To meet its burden under this doctrine, the Commonwealth was required to demonstrate knowledge of the petitioner&#8217;s ownership and control of the iPhone and its contents, as well as \u201cknowledge of the fact of [PIN code protection], and knowledge of the [existence of the PIN code].\u201d Id. at 524. The Commonwealth was not required to show that it knew the specific content of the iPhone, but it did need to demonstrate knowledge of the existence and the location of the content. Id. at 523, citing United States v. Fricosu, 841 F. Supp. 2d 1232, 1237 (D. Colo. 2012) (\u201cFifth Amendment not implicated by requiring production of unencrypted contents of computer where government knew of existence and location of files, although not specific content of documents, and knew of defendant&#8217;s custody or control of computer\u201d).<\/p>\n<p>Here, the Commonwealth demonstrated sufficient knowledge to show that the factual statements that the petitioner&#8217;s act of entering his PIN code would convey are foregone conclusions. As summarized in the grand jury materials submitted to the judge under seal, the Commonwealth already knew that the iPhone contained files that were relevant to its investigation based, in part, on information provided by the petitioner. In addition, the Commonwealth knew that a PIN code was necessary to access the iPhone, that the petitioner possessed and controlled the iPhone, and that the petitioner knows the PIN code and is able to enter it. Accordingly, the Commonwealth established independently and with specificity the authenticity, existence, and possession of the compelled information.<\/p>\n<p>Thus, the order does not require the petitioner to communicate information that would fall within constitutional self-incrimination protection. The affidavit in support of the search warrant application established that the Commonwealth had probable cause to believe that the iPhone contained evidence of the crimes that are the subject of the grand jury investigation. The order simply allows execution of that warrant. See ibid., quoting from Fisher, 425 U.S. at 411 (\u201cIn those instances when the government produces evidence to satisfy the \u2018foregone conclusion\u2019 exception, \u2018no constitutional rights are touched. The question is not of testimony but of surrender\u2019\u201d).<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The state via a grand jury request sought the password to defendant\u2019s iPhone. Production of the password would implicate self-incrimination concerns, but, here, it\u2019s a foregone conclusion that it\u2019s his phone and there are no self-incrimination concerns. Civil contempt affirmed &hellip; <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=30665\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-30665","post","type-post","status-publish","format-standard","hentry","category-cell-phones"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/30665","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=30665"}],"version-history":[{"count":1,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/30665\/revisions"}],"predecessor-version":[{"id":30666,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/30665\/revisions\/30666"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=30665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=30665"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=30665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}