Introduction

Encrypted hard drives are virtually impenetrable, even to the government. That is by design—the whole point of encryption is to hide your data from those who should not see it.

Yet sometimes, the government not only should be able to see your data, it has the right to see it. In enforcing criminal laws, the government has seized data in the form of paper documents for decades, if not centuries. Now, these documents are increasingly digital, lying in hard drives instead of filing cabinets. This digitization and encryption of documents complicates government seizures in criminal investigations. Even if the government legally seizes a hard drive, it may still be unable to access the drive’s documents. The only way to obtain them may be through subpoenas for production of the drive’s password or its decrypted data.

But are these subpoenas constitutional? The Eleventh Circuit, the only federal appeals court answering this question, concluded negatively. 1 The Fifth Amendment’s Self Incrimination Clause (Fifth Amendment or privilege) bars this compulsion, that court held, absent a substantial showing that the government already knows exactly what’s on the drive. 2

This Essay advances the alternative conclusion—these subpoenas are constitutional—primarily for reasons not considered by the Eleventh Circuit. At its core, the Fifth Amendment seeks a fair balance between the state’s interest and the individual’s. The U.S. Supreme Court has repeatedly balanced in the state’s favor and limited the privilege’s scope where holding otherwise would render crimes almost impossible to prosecute. These consequences would attend a privilege protecting encrypted data, with criminal investigations derailed and previously discoverable information undiscoverable. So principally for this reason, the privilege should not protect against the compelled production of passwords or decrypted data.

Courts ruling on this issue have not considered how fair balancing impacts doctrinal interpretation. 3 Nor has the relevant scholarship done so. 4 Instead, both courts and scholars often see Supreme Court dicta as controlling the question. This dicta says that strongbox keys can be constitutionally compelled, but safe combinations cannot. 5 The Eleventh Circuit followed this dicta and extended it. It found passwords more like safe combinations than keys and therefore held that neither their production nor the production of decrypted data can be compelled. 6

Passwords should not be forced into this key-combination dichotomy. They are neither a key nor a combination, and Court doctrine suggests the dichotomy should not be mechanically applied to new unlocking mechanisms. The dichotomy developed because keys and combinations have different Fifth Amendment implications—only combinations present the danger of compelling the creation of evidence. So it follows that new unlocking mechanisms with new implications should also be treated differently. Passwords for encrypted data present new implications in interest balancing and therefore should be treated differently. First, consider the interest balancing with safe combinations. There, a fair state-individual balance favors the individual—and compelled production is prohibited—because there is little state need; law enforcement can easily crack a safe through its own efforts. Contrast that with passwords. Law enforcement usually cannot bypass them, leaving the data inaccessible and creating great need for the password or decrypted data’s production.

This Essay limits its focus to considering how the Fifth Amendment’s fair balancing aim affects doctrinal interpretation. Beyond its scope is the argument—since rejected by the Eleventh Circuit 7 —that the compelled production of decrypted data is constitutional, but the compelled production of a password is not. 8 To the extent this distinction remains persuasive, this Essay seeks only to provide further support for adopting it.

Part I of this Essay provides an introduction to encryption technology and its effect on law enforcement investigations. Part II then explains the Supreme Court’s Fifth Amendment doctrine, and Part III argues that a fair balance requires permitting the compelled production of decrypted data.

I. Encryption Technology

Encryption is “the process of concealing information.” 9 It transforms consumable information (or data) “into a coded form” that is unintelligible to persons without the encryption key or password unless those persons crack the encryption. 10 But assuming a strong password is used, cracking encryption is not realistically possible. 11 Thus, “[p]ractically speaking, encryption today is impenetrable insofar as it cannot be bypassed by available means within a reasonable amount of time.” 12

Encryption software is freely available 13 and easy to use. 14 Coupled with this mass availability, anecdotal data suggests that more people are encrypting data with strong passwords. Consider federal and state wiretaps. The latest wiretap report, for the year 2012, indicates this was the first year jurisdictions reported not being able to crack encryption, with this failure occurring in four wiretaps. 15 (Unfortunately, the report was unclear on whether this actually occurred in 2012 or instead occurred earlier and just reported in 2012. 16 ) Other data indicates that commercial use of encryption is also increasing. One study found that 27 percent of surveyed corporations extensively used encryption in 2012, nearly a 70 percent increase over 2005 numbers. 17 Finally, the increasing number of cases on the Fifth Amendment and Encryption—from zero to at least seven since 2007 18 —itself suggests that more people are encrypting their data.

II. Fifth Amendment Doctrine

The Fifth Amendment provides that “[n]o person . . . shall be compelled in any criminal case to be a witness against himself.” 19 Where applicable, it grants a person the privilege against self-incrimination, thus limiting the government’s ability to obtain evidence. 20 The Amendment applies where three elements are met: “(1) compulsion, (2) a testimonial communication or act, and (3) incrimination.” 21 The focus here—both in practice and in this Essay—is the communication’s testimonial qualities; there is little question that a contested subpoena involves compulsion and incriminating documents. 22

A communication or act can be testimonial in two ways: based on any implied communication it conveys and based on its cognitive content. Implied communications arise from the process of producing documents. For example, every response to a subpoena contains the implied communications that the respondent possesses or controls the produced documents, that the documents are authentic, and that she believes them responsive to the subpoena. 23 These three implied communications alone can be testimonial. 24 But even if they are, the government can still compel production when it grants act of production immunity to the respondent. This “immuniz[es] the testimonial component of the act”—the government cannot use the act of producing a document to prove possession of that document—but still permits the government to use the substance of the documents produced. 25 Because act of production immunity is available, this Essay focuses not on implied communications but on a communication’s cognitive content.

Communications can also be testimonial based on their cognitive content. Communications requiring extensive mental use are testimonial, and those requiring little are not. 26 Many compelled acts—the taking of blood, handwriting, and voice samples, for example—do not require meaningful mental use, so they are not testimonial. 27 The same analysis applies to the production of documents, with the court examining the mental effort needed to compile and produce them. If response requires the “respondent to make extensive use of ‘the contents of his own mind,’” producing those documents is testimonial. 28 Such extensive use has been held to occur, for example, where the respondent must search eleven broad categories of documents to identify over 13,000 responsive pages. 29

The Supreme Court has applied this testimonial framework to other areas as well. Relevant here, the Court applied it to unlocking mechanisms similar to passwords—strongbox keys and safe combinations. In dicta, it declared that “being forced to surrender a key to a strongbox” is not testimonial, but “being compelled to reveal the combination to [a] wall safe” is. 30 No rationale was provided. Nor is one immediately obvious. Both acts involve essentially the same trivial amount of thought, and the distinction leads to apparently arbitrary results: A safe key can be compelled, but a safe combination cannot; a fingerprint that unlocks an iPhone can be compelled, but an iPhone’s numeric password cannot. 31

The best rationale for this distinction is that it presents a third way communications can be testimonial, one not based on cognition or implied communications but on another Fifth Amendment interest: concern over the compelled creation of documents. 32 The Court has indicated that such compulsion is more likely to yield a testimonial response. 33 Thus, the analyses for keys and combinations diverge. Strongbox keys always exist in the physical world, so a subpoena for the key involves only its production. But this is not so with a safe combination. It may exist only in one’s mind, and producing it would require first creating a physical document. 34

With encryption and passwords, courts’ analyses gravitate to the key-combination dichotomy. 35 Take the Eleventh Circuit’s recent decision in In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011. 36 That court addressed the question of whether the Fifth Amendment bars the compelled decryption and production of the now-unencrypted data. It held affirmatively and explicitly framed the issue within this dichotomy, finding compelled decryption “most certainly more akin to requiring the production of a combination.” 37

This reasoning ignores a pivotal prefatory question: Do passwords even belong in this dichotomy? A computer password is not a safe combination. Sure, they are similar, but that does not mean they must be treated the same. Combinations and keys are similar—both unlock safes—yet they are treated differently because only the former implicates compelled creation concerns.

It follows, then, that courts should treat passwords and combinations differently if they have meaningfully different Fifth Amendment implications. And they do. Passwords and encrypted data implicate fair balancing concerns that support permitting compelled production, while combinations do not.

III. Balancing Interests

The Supreme Court has recognized seven “fundamental values” underlying the Fifth Amendment. They are:

[(1)] our unwillingness to subject those suspected of crime to the cruel trilemma of self-accusation, perjury or contempt; [(2)] our preference for an accusatorial rather than an inquisitorial system of criminal justice; [(3)] our fear that self-incriminating statements will be elicited by inhumane treatment and abuses; [(4)] our sense of fair play which dictates a fair state-individual balance by requiring the government to leave the individual alone until good cause is shown for disturbing him and by requiring the government in its contest with the individual to shoulder the entire load[]; [(5)] our respect for the inviolability of the human personality and of the right of each individual to a private enclave where he may lead a private life[]; [(6)] our distrust of self-deprecatory statements; and [(7)] our realization that the privilege, while sometimes a shelter to the guilty, is often a protection to the innocent. 38

Six of these seven values do not meaningfully affect the analysis here. Privacy is no longer a Fifth Amendment value. 39 As for the other five, they are not absolutes; they are only strong preferences for not permitting compulsion. We have “unwillingness” to subject the accused to a cruel trilemma; we “prefer[] . . . an accusatorial” system over an inquisitorial one; we “fear that self-incriminating statements” were the products of abuse; and we “distrust” those statements.

Forming the Fifth Amendment’s core value, then, is its aim to achieve a fair state-individual balance. Where there is a real societal need to limit the privilege, the Court has repeatedly permitted compulsion upon the defendant. 40 Already the law permits compelling defendants to “produc[e] incriminating documents, giv[e] pretrial notice of defenses and of the evidence used to support them, provid[e] copies of defense investigative reports, and suppl[y] all forms of nontestimonial evidence,” 41 such as blood, 42 voice, 43 and fingerprint 44 samples. 45 While none of these compulsions force the accused to “take the stand and testify as a witness,” they do “in other ways . . . treat him like a witness to be observed by the jury.” 46

This fair balancing aim often serves as a jurisprudential lodestar when the Court decides questions of the Amendment’s scope. Recognizing this explicitly are a plurality opinion by Chief Justice Burger and a decision by Chief Justice Rehnquist, writing in his capacity as Circuit Justice. Both say that these questions “must be resolved in terms of balancing the public need on the one hand, and the individual claim to constitutional protections on the other.” 47

Balancing appears throughout Fifth Amendment doctrine. The Supreme Court balanced interests in Miranda v. Arizona, 48 holding that the state’s interest in custodial interrogation without providing a rights advisal could not overcome the accused’s interests in “individual liberty” and having a “full opportunity to exercise the privilege.” 49 Nearly two decades later, the Court balanced again, but this time tilting in the state’s favor. Where public safety is at stake, “the need for answers . . . outweighs the need for the prophylactic rule protecting the Fifth Amendment’s privilege against self-incrimination.” 50 The balancing again favored the state when the Court considered what effect a belated Miranda-rights advisal had on a confession occurring after that advisory. In holding the confession still admissible, the Court reasoned that ruling otherwise would yield a “high cost to legitimate law enforcement activity, while adding little desirable protection to the individual’s interest in not being compelled to testify against himself.” 51 In a similar vein, a plurality of the Court this past term required that a defendant expressly invoke the privilege, because permitting silent invocations “would needlessly burden the Government’s interest in obtaining testimony and prosecuting criminal activity.” 52

Two more recent examples cement the prevalence of balancing. A 2002 plurality opinion by Justice Kennedy balances the state’s interest in running a prison—“an inordinately difficult undertaking”—against an inmate’s interest in the privilege, and the state’s interest prevailed. 53 Then there is Kansas v. Cheever. 54 There the Court found the privilege not violated where the government introduces “evidence from a court-ordered mental evaluation of a criminal defendant to rebut that defendant’s presentation of expert testimony in support” of his defense. 55 The Court reached this conclusion partly through balancing. The court ordered evaluation is “the only effective means of challenging [the defendant’s] evidence.” 56 And the government’s interest in the pursuit of justice “prevail[s] in the balance of considerations determining the scope and limits of the privilege against self-incrimination.” 57

A final example of balancing occurs in Kastigar v. United States. 58 There, the Court considered what type of immunity the Fifth Amendment requires—transactional immunity (an absolute immunity) or instead just “use and derivative use”—for witnesses who assert the privilege when compelled to testify before a grand jury. 59 The Court concluded that transactional immunity is not required, in part because requiring it would effectively grant “amnesty,” and “[t]here can be no justification in reason or policy for holding that the Constitution requires [such] a[] . . . grant.” 60 In other words, the state’s interest in prosecution won yet again.

Now, none of this means that fair balancing displaces the doctrinal framework. No case holds that. But these cases do demonstrate that the Court often considers fair balancing. And this balancing influences the Court to interpret doctrine in a manner permitting compulsion where doing otherwise would make a crime “difficult . . . [or] almost impossible[] to prosecute.” 61 That is precisely what will happen as use of encryption continues to proliferate: It will be unfairly difficult to prosecute crimes if the government cannot obtain the encrypted hard drive’s password or its decrypted data. Suspects will be able to place encrypted “data beyond the reach of law enforcement,” which may “shut the door on effective prosecution.” 62 This data is information that law enforcement could previously obtain through its own skill but now no longer can. 63 Loss of this information could be devastating, as “computers have become an increasingly important source of evidence,” and searching them is more and more “an essential step in the investigation.” 64 In turn, a fair balance requires giving the state additional latitude in confronting these technological roadblocks. 65

This incredible state need for compulsion makes Supreme Court dicta on safe combinations unpersuasive in this context. With safe combinations, the government does not need to compel the combination’s production to access the safe’s contents. It can realistically crack the safe on its own. 66 Thus, the balancing favors the accused because there is no real state interest in compelling production.

Let’s review this Essay’s main points so far. The Supreme Court often seeks a fair state-individual balance when interpreting the Fifth Amendment. This may even be why the Court developed the key-combination dichotomy: It would be unfair to force the accused to create evidence against himself (by memorializing the combination) when the state can easily crack the safe on its own. The same cannot be said of encrypted hard drives. The government cannot realistically crack them, so it has a significant interest in compelling the decrypted data's production.

These principles serve as guideposts in interpreting Fifth Amendment doctrine. If the doctrine can be interpreted in a manner both permitting compulsion and avoiding compelled creation, courts should adopt that interpretation. This interpretation is possible. 67 Producing documents may be compelled where it requires little mental cognition, which is why the government can compel the production of keys. Compelling a key’s production comprises three acts, only one of which cognitive: remembering the key’s location, retrieving it, and producing it. Producing a decrypted hard drive involves essentially the same acts and cognition: remembering the password, entering it, and producing the decrypted drive. Note that the immediate results of these two productions differ; one produces the key to the storage device, the other the unlocked device itself. This difference should not matter. The results are functionally the same, with the state obtaining the device’s contents either way. 68

This is not how the Eleventh Circuit analyzed the issue. That court found the mental cognition from producing decrypted data more demanding because it is “more akin to requiring the production of a combination.” 69 But this rationale proves too much. The reason combinations cannot be compulsively produced is not because of cognitive concerns but because of compelled creation concerns. So the similarities between compelling the production of combinations and of passwords are immaterial to analyzing the cognitive efforts.

The conclusion that courts should allow the compelled production of decrypted data carries a caveat. So far, this Essay has assumed there will always be a real state need for compelling this production. But sometimes there will not be. Occasionally, the password may be realistically obtained through means that do not touch on the Fifth Amendment. Maybe a simple password can be easily cracked; 70 maybe the password is written somewhere and easily found; maybe even others know the password and they readily produce it. 71 The point is that sometimes reasonable investigatory effort will yield the password without requiring compulsion upon the defendant.

Interest balancing must vary with the effort required to obtain the password through investigatory means. With passwords discoverable through minimal or reasonable effort, the state’s interest in compelled production is little to none. Contrast that with passwords that are not discoverable, reasonably or otherwise, where the state’s need for compulsion remains incredible.

If we take interest balancing seriously and use it to favor doctrinal interpretations permitting compulsion, as this Essay does, then we should also consider what happens where there is little state need for compulsion. One option is that the result remains the same—the decrypted data can still be compelled—on the same grounds already highlighted. Because fair balancing was only a reason for adopting that interpretation, it does not necessarily add fair balancing to the testimonial calculus.

Alternatively, courts could explicitly incorporate interest balancing into the calculus. So the decrypted data could be compelled only if there is a significant state need for compulsion. Drawing this line in practice would not be difficult. Imagine the government subpoenas the accused for the production of decrypted data and the accused moves to quash on Fifth Amendment grounds. Under this approach, the motion would be denied if the government shows it could not realistically obtain the data through investigatory effort. This procedure would not be uncommon, as similar iterations exist elsewhere in criminal procedure. Obtaining a search warrant, for example, requires the government first show the existence of probable cause, 72 and a later determination that cause was deficient may result in excluding any evidence obtained under the warrant. 73

Conclusion

So far, analysis of the Fifth Amendment’s application to encrypted data has largely been limited to whether passwords are more like combinations than keys. This dichotomy is faulty and the analysis incomplete. Passwords are not like combinations: Only passwords make their contents effectively impenetrable to law enforcement. This impenetrability creates a significant state interest in permitting compelled production, and achieving a fair balance of interests often requires permitting that compulsion. Courts should therefore allow this compulsion on fair balancing grounds. Or in the very least, they should consider the state’s heightened interest when ruling on this issue.

  1. SeegenerallyInre Grand Jury Subpoena Duces Tecum Dated March 25, 2011, 670 F.3d 1335 (11th Cir. 2012). ↩