United States v. Doe (In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011)

Decision Date23 February 2012
Docket NumberNos. 11–12268,11–15421.,s. 11–12268
Citation23 Fla. L. Weekly Fed. C 795,670 F.3d 1335
PartiesIn re GRAND JURY SUBPOENA DUCES TECUM DATED MARCH 25, 2011.United States of America, Plaintiff–Appellee, v. John Doe, Defendant–Appellant.
CourtU.S. Court of Appeals — Eleventh Circuit

OPINION TEXT STARTS HERE

Robert G. Davies, David Lance Goldberg, Nancy J. Hess, Pamela C. Marsh, Pensacola, FL, Josh Goldfoot, U.S. Dept. of Justice Computer Crime & IP Section, James Anthony Silver, U.S. Dept. of Justice–Crim. Div., Washington, DC, for PlaintiffAppellee.

Chet Kaufman, Randolph P. Murrell, Fed. Pub. Defenders, Tallahassee, FL, Randall Lockhart, Fed. Pub. Def., Pensacola, FL, for DefendantAppellant.

Hanni Fakhoury, Marcia Hofmann, Electronic Frontier Found., San Francisco, CA, for Electronic Frontier Found., Amicus Curiae.Appeals from the United States District Court for the Northern District of Florida.

Before TJOFLAT, MARTIN and HILL, Circuit Judges.

TJOFLAT, Circuit Judge:

This is an appeal of a judgment of civil contempt. On April 7, 2011, John Doe was served with a subpoena duces tecum requiring him to appear before a Northern District of Florida grand jury and produce the unencrypted contents located on the hard drives of Doe's laptop computers and five external hard drives.1 Doe informed the United States Attorney for the Northern District of Florida that, when he appeared before the grand jury, he would invoke his Fifth Amendment privilege against self-incrimination and refuse to comply with the subpoena.2 Because the Government considered Doe's compliance with the subpoena necessary to the public interest, the Attorney General, exercising his authority under 18 U.S.C. § 6003,3 authorized the U.S. Attorney to apply to the district court, pursuant to 18 U.S.C. §§ 60024 and 6003, for an order that would grant Doe immunity and require him to respond to the subpoena.

On April 19, 2011, the U.S. Attorney and Doe appeared before the district court.5 The U.S. Attorney requested that the court grant Doe immunity limited to “the use [of Doe's] act of production of the unencrypted contents” of the hard drives. That is, Doe's immunity would not extend to the Government's derivative use of contents of the drives as evidence against him in a criminal prosecution. The court accepted the U.S. Attorney's position regarding the scope of the immunity to give Doe and granted the requested order. The order “convey[ed] immunity for the act of production of the unencrypted drives, but [did] not convey immunity regarding the United States' [derivative] use” of the decrypted contents of the drives.

After the hearing adjourned, Doe appeared before the grand jury and refused to decrypt the hard drives. The U.S. Attorney immediately moved the district court for an order requiring Doe to show cause why Doe should not be held in civil contempt. The court issued the requested order, requiring Doe to show cause for his refusal to decrypt the hard drives. Doe, responding, explained that he invoked his Fifth Amendment privilege against self-incrimination because the Government's use of the decrypted contents of the hard drives would constitute derivative use of his immunized testimony, use not protected by the district court's grant of immunity.6 An alternative reason Doe gave as to why the court should not hold him in contempt was his inability to decrypt the drives. The court rejected Doe's alternative explanations, adjudged him in contempt of court, and ordered him incarcerated. Doe now appeals the court's judgment.

We review the district court's findings of relevant facts for clear error, see United States v. Doe, 465 U.S. 605, 613–14, 104 S.Ct. 1237, 1243, 79 L.Ed.2d 552 (1984) (stating that the Court would not overturn findings of fact unless they had no support in the record), and review the district court's application of the Fifth Amendment privilege de novo, United States v. Hernandez, 141 F.3d 1042, 1049 (11th Cir.1998). Part I briefly reviews the relevant factual background and procedural history of the case. Part II discusses the merits of Doe's Fifth Amendment claim. Part III upholds Doe's invocation of his Fifth Amendment right.7

I.

This case began with the lawful seizure of seven pieces of digital media during the course of a child pornography investigation. In March 2010, law enforcement officials began an investigation of an individual using the YouTube.com account [redacted] whom the Government suspected of sharing explicit materials involving underage girls. During the course of their investigation, officers from the Santa Rosa County (Florida) Sheriff's office obtained several internet protocol (“IP”) addresses from which [redacted] accessed the internet. Three of these IP addresses were then traced to hotels. Following a review of the hotels' guest registries, law enforcement officers found that the sole common hotel registrant during the relevant times was Doe.

In October 2010, law enforcement officers tracked Doe to a hotel in California and applied for a warrant to search his room. A judge granted the application and issued a search warrant, allowing the officers to seize all digital media, as well as any encryption devices or codes necessary to access such media. The officers seized seven pieces of digital media: two laptops—a 320–gigabyte (“GB”) Dell Studio laptop and a 160–GB laptop; and five external hard drives—a 1.5–terabyte (“TB”) Seagate external drive, a 1–TB Western Digital MyPassport external drive, a 1–TB external drive, a 500–GB Western Digital external drive, a 500–GB SimpleTech external drive.8 Federal Bureau of Investigation forensic examiners analyzed the digital media, but were unable to access certain portions of the hard drives.

The grand jury subpoena issued because the forensic examiners were unable to view the encrypted portions of the drives. The subpoena required Doe to produce the “unencrypted contents” of the digital media, and “any and all containers or folders thereon.” Doe informed the U.S. Attorney that compliance with the subpoena would violate his Fifth Amendment privilege against self-incrimination. It was in an attempt to avoid this constitutional issue that the U.S. Attorney requested that the district court grant Doe the limited act-of-production immunity.

Thus, the focus of the motion to show cause hearing on April 19, 2011, was, in essence, whether the Fifth Amendment would bar the Government from establishing before a petit jury—say, if Doe were indicted for possession of child pornography in violation of 18 U.S.C. § 2252—that the decrypted contents (child pornography) were Doe's because (1) the hard drives belonged to Doe (which was not in dispute), and (2) contained child pornography. Doe contended that the establishment of point (2) would constitute the derivative use of his immunized grand jury testimony. That is, by decrypting the contents, he would be testifying that he, as opposed to some other person, placed the contents on the hard drive, encrypted the contents, and could retrieve and examine them whenever he wished.9

The critical testimony during the show cause hearing came from forensic examiner Timothy McCrohan. McCrohan testified that he cloned over 5 TB of data from the digital media devices—an “enormous amount of data.” He also testified that over a million pieces of data could be stored on a typical 320–GB hard drive. McCrohan continued, “So when you're at five terabytes you're looking at 20 times that size. It could be in the multi-millions.” Notably, McCrohan testified that the forensic examination indicated that the hard drives had been encrypted with a software program called “TrueCrypt.” Essentially, TrueCrypt can make certain data inaccessible; in doing so, the program can create partitions within a hard drive so that even if one part of the hard drive is accessed, other parts of the hard drive remain secured. Because the hard drive was encrypted, the forensic examiners were unable to recover any data.10 Although they were unable to find any files, McCrohan testified that they believed that data existed on the still-encrypted parts of the hard drive. In support of this belief, the Government introduced an exhibit with nonsensical characters and numbers, which it argued revealed the encrypted form of data that it seeks.

In his testimony on cross-examination by Doe, however, McCrohan conceded that, although encrypted, it was possible that the hard drives contain nothing. Doe asked McCrohan, “So if a forensic examiner were to look at an external hard drive and just see encryption, does the possibility exist that there actually is nothing on there other than encryption? In other words, if the volume was mounted, all you would see is blank. Does that possibility exist?” McCrohan responded: “Well, you would see random characters, but you wouldn't know necessarily whether it was blank.”11

The forensic analysis was able to identify two passwords, neither of which revealed any information when entered. When pressed by Doe to explain why investigators believed something may be hidden, McCrohan replied, “The scope of my examination didn't go that far.” In response to further prodding, “What makes you think that there are still portions that have data[?],” McCrohan responded, We couldn't get into them, so we can't make that call.” Finally, when asked whether “random data is just random data,” McCrohan concluded that “anything is possible.” At the conclusion of the hearing, the district court held Doe in contempt and committed him to the custody of the United States Marshal.12

II.

We turn now to the merits of Doe's appeal. In compelling Doe to produce the unencrypted contents of the hard drives and then in holding him in contempt for failing to do so, the district court concluded that the Government's use of the unencrypted contents in a prosecution against Doe would not constitute the derivative use of compelled testimony protected by the Fifth Amendment privilege against...

To continue reading

Request your trial
58 cases
  • In re Search of [Redacted] Wash., Case No. 18–sw–0122 (GMH)
    • United States
    • United States District Courts. United States District Court (Columbia)
    • June 26, 2018
    ...act, i.e. , where the individual is not called upon to make use of the contents of his mind." In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011 , 670 F.3d 1335, 1345 (11th Cir. 2012).That rule dooms the Federal Public Defender's "decryption" argument, as well. There, it contends th......
  • State v. Valdez
    • United States
    • Court of Appeals of Utah
    • February 11, 2021
    ...contents of his own mind’ to explicitly or implicitly communicate some statement of fact." See In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011 , 670 F.3d 1335, 1345 (11th Cir. 2012) (quoting Curcio v. United States , 354 U.S. 118, 128, 77 S.Ct. 1145, 1 L.Ed.2d 1225 (1957) ); see ......
  • State v. Andrews
    • United States
    • United States State Supreme Court (New Jersey)
    • August 10, 2020
    ...housed on the encrypted device. See, e.g., United States v. Doe (In re Grand Jury Subpoena Duces Tecum dated March 25, 2011 ), 670 F.3d 1335, 1346 (11th Cir. 2012) (analogizing decryption to the production of a combination to a safe because it uses the contents of the defendant's mind and i......
  • Seo v. State
    • United States
    • Supreme Court of Indiana
    • June 23, 2020
    ...required the government to identify the information sought with reasonable particularity. See In re Grand Jury Subpoena Duces Tecum Dated Mar. 25, 2011 , 670 F.3d 1335, 1345–47 (11th Cir. 2012) ; In re Decryption of a Seized Data Storage Sys. , No. 13-M-449, 2013 WL 12327372, at *4 (E.D. Wi......
  • Request a trial to view additional results
1 firm's commentaries
  • Game Of Phones: Employer-Issued Smartphones And Employee Fifth Amendment Protections
    • United States
    • Mondaq United States
    • November 20, 2015
    ...accused of possessing child pornography from having to decrypt a hard drive. See In re Grand Jury Duces Tecum Dated March 25, 2011, 670 F.3d 1335 (11th Cir. 2012); United States v. Kirschner, 823 F. Supp. 2d 665 (E.D. Mich.2010). In contrast, providing fingerprints to unlock a smartphone ha......
40 books & journal articles
  • Search and Seizure of Electronic Devices
    • United States
    • James Publishing Practical Law Books Archive Suppressing Criminal Evidence - 2017 Contents
    • August 4, 2017
    ...argue that your client has a Fifth Amendment right to refuse to do so. In United States v. Doe (In re Grand Jury Subpoena Duces Tecum), 670 F.3d 1335 (11th Cir. §8:20 SUPPRESSING CRIMINAL EVIDENCE 8-8 2012), the court held decryption and production of a computer hard drive would be testimon......
  • Evidence
    • United States
    • James Publishing Practical Law Books Archive Texas Criminal Lawyer's Handbook. Volume 2 - 2017 Contents
    • August 17, 2017
    ...that such protection extends to the Government’s use of the drive’s contents. In Re Grand Jury Subpoena Duces Tecum Dated March 25, 2011, 670 F.3d 1335 (11th Cir. 2012). A defendant can be convicted of possessing child pornography images when they are found in the “free space” of his comput......
  • Self-Incrimination
    • United States
    • James Publishing Practical Law Books Archive Texas Criminal Forms. Volume I - 2014 Contents
    • August 12, 2014
    ...that such protection extends to the Government’s use of the drives’ contents. In re Grand Jury Subpoena Duces Tecum Dated Mar. 25, 2011, 670 F.3d 1335 (11th Cir. 2012) Law enforcement officers may search a cell phone without a warrant pursuant to a lawful arrest when the scope of the search......
  • Grand jury practice
    • United States
    • James Publishing Practical Law Books Criminal Defense Tools and Techniques
    • March 30, 2017
    ...must choose either to immunize the witness or forego the decryption. [ In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011 , 670 F.3d 1335 (11th Cir. 2012).]; United States v. Kirschner , 823 F. Supp. 2d 665, 669 (E.D. Mich. 2010) (providing the password is testimonial and protected ......
  • Request a trial to view additional results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT