{"id":37639,"date":"2019-05-12T07:59:13","date_gmt":"2019-05-12T12:59:13","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=37639"},"modified":"2019-05-18T09:42:41","modified_gmt":"2019-05-18T14:42:41","slug":"d-idaho-forced-use-of-fingerprint-biometric-to-unlock-a-smartphone-violates-5a","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=37639","title":{"rendered":"D.Idaho: Forced use of fingerprint biometric to unlock a smartphone violates 5A"},"content":{"rendered":"<p>The district court granted the initial search warrant based on the showing of probable cause, but then it denied a second application to force the owner to open it. The compelled use of biometrics to unlock the phone violates the Fifth Amendment. <a href=\"https:\/\/assets.documentcloud.org\/documents\/5995972\/Idaho-Judge-Denies-Search-Warrant-Asking-for.pdf\">In the Matter of the Search of a White Google Pixel 3XL Cell Phone<\/a>, 2019 U.S. Dist. LEXIS 83300 (D. Idaho May 8, 2019):<br \/>\n<!--more--><\/p>\n<blockquote><p><strong>B. Fifth Amendment Analysis<\/strong><\/p>\n<p>Under the Fifth Amendment, no person \u201cshall be compelled in any criminal case to be a witness against himself.\u201d U.S. CONST. amend V. It is intended \u201cto spare the accused from having to reveal, directly or indirectly, his knowledge of facts relating him to the offense or from having to share his thoughts and beliefs with the Government.\u201d Doe v. United States, 487 U.S. 201, 213, (1988). \u201cThe privilege afforded not only extends to answers that would in themselves support a conviction under a federal criminal statute but likewise embraces those which would furnish a link in the chain of evidence needed to prosecute the claimant for a federal crime.\u201d Hoffman v. United States, 341 U.S. 479, 486 (1951). \u201cThe values protected by the Fourth Amendment . . . substantially overlap those the Fifth Amendment helps to protect.\u201d Schmerber v. California, 384 U.S. 757, 767 (1966) (overruled on other grounds by Missouri v. McNealy, 569 U.S. 141 (2013)).<\/p>\n<p>\u201cThere is no special sanctity in papers, as distinguished from other forms of property, to render them immune from search and seizure, if only they fall within the scope of the principles of the cases in which other property may be seized, and if they be adequately described in the affidavit and warrant.\u201d Andresen v. Maryland, 427 U.S. 463, 474 (1976) (quoting Gouled v. United States, 255 U.S. 298, 309 (1921)). However, <\/p>\n<blockquote><p>\u201cA party is privileged from producing the evidence but not from its production.\u201d Johnson v. United States, 228 U.S. 457, 458 (1913). This principle recognizes that the protection afforded by the Self-Incrimination Clause of the Fifth Amendment \u201cadheres basically to the person, not to information that may incriminate him.\u201d Couch v. United States, 409 U.S. 322, 328 (1973). Thus, although the Fifth Amendment may protect an individual from complying with a subpoena for the production of his personal records in his possession because the very act of production may constitute a compulsory authentication of incriminating information, see Fisher v. United States, &#8230; a seizure of the same materials by law enforcement officers differs in a crucial respect the individual against whom the search is directed is not required to aid in the discovery, production, or authentication of incriminating evidence.<\/p><\/blockquote>\n<p>Id. at 473\u2013474.<\/p>\n<p>Moreover, \u201cthe protection of the privilege reaches an accused\u2019s communications, whatever form they might take, and the compulsion of responses which are also communications.\u201d Schmerber, 384 U.S. at 764. To qualify for the privilege, a communication must be (1) testimonial, (2) incriminating, and (3) compelled. Hiibel v. Sixth Jud. Dist. Ct. of Nev., Humboldt Cnty., 542 U.S. 177, 189 (2004). Each prong is considered in turn. <\/p>\n<p><strong>1. Testimonial Communication <\/strong><\/p>\n<p>&#8230; <\/p>\n<p>For either purpose, compliance with a warrant authorizing an attempt by law enforcement to unlock the phone with the individual\u2019s fingerprints inescapably requires a compelled testimonial communication because the individual would provide a \u201ccompulsory authentication of incriminating information\u201d and would \u201caid in the discovery, production, or authentication of incriminating evidence.\u201d Andresen, 427 U.S. at 474. <\/p>\n<p><strong>2. Self-incrimination <\/strong><\/p>\n<p>&#8230;<\/p>\n<p>Such reasoning echoes the holding in In re Application for a Search Warrant, 236 F. Supp. 3d 1066 (N.D. Ill. Feb. 16, 2017), where the court held that providing a fingerprint key to unlock a smartphone does explicitly or implicitly relate a factual assertion or disclose information: &#8230;<\/p>\n<p>The same constitutional heartwood is found in this case, where the use of the individual\u2019s biometrics (specifically, the fingerprints) may incriminate the individual by providing evidence of some association or \u201crelatively significant connection\u201d with the phone and, therefore, its contents. Further, compelling the use of fingerprints to unlock the phone could \u201cfurnish a link in the chain of evidence needed to prosecute the claimant for a federal crime.\u201d Hoffman, 341 U.S. at 486. <\/p>\n<p>In sum, what the Government would characterize as innocuous is instead a potentially self-incriminating testimonial communication because it involves the compelled use of biometrics\u2014unique to the individual\u2014to unlock the phone. <\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>The district court granted the initial search warrant based on the showing of probable cause, but then it denied a second application to force the owner to open it. The compelled use of biometrics to unlock the phone violates the &hellip; <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=37639\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,114],"tags":[],"class_list":["post-37639","post","type-post","status-publish","format-standard","hentry","category-cell-phones","category-privileges"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/37639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=37639"}],"version-history":[{"count":3,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/37639\/revisions"}],"predecessor-version":[{"id":37718,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/37639\/revisions\/37718"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=37639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=37639"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=37639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}