SlideShare a Scribd company logo
1 of 26
Download to read offline
TECHNOLOGY CASELAW UPDATE
When They Want Your Client's Cellphone and Its Contents
REMOTE FOLKS, TWEET
QUESTIONS TO:
@JSCOTTKEY
#KEYCASELAW
CONTACT ME
➤ Twitter:
➤ @jscottkey
➤ @millerandkeylaw
➤ Instagram:
➤ MillerAndKeyLaw
➤ Scott Key
➤ Email and Phone:
➤ 678.610.6624
➤ skey@millerandkeylaw.com
MY BLOG
georgiacriminalappellatelawblog.com
3 TOPICS
➤ 4th Amendment and Cell
Phone Searches
➤ 5th Amendment and Order to
Decrypt and Unlock
➤ Subpoenas and Search
Warrants for Subscriber
Information
THEME: DON'T BE A DINOSAUR
(THE LAW MOVES SLOWER
THAN THE TECH)
WHY IS THIS IMPORTANT
➤ There's a Tech Component to
Every Criminal Case
➤ If you Don't Understand
Facebook, Twitter, Snapchat,
Instagram, Twitter, or the
Next 5 Things, You Will:
➤ Nuke Your Client's Appeal
➤ Miss Legal Issues
➤ Sound Dumb to the Jury
HOW WELL DO YOU NEED
TO KNOW IT
You need to know enough to teach it to the judges
and justices who don't get it
Pro-Tip -- Read Opinions of the Judges Who "Get"
It (GA: Dillard / TX: Justice Don Willett)
NEW V. STATE
327 GA. APP. 87 (2014)
Jury Question About Whether Deleted Contraband
Images Were in the Possession of the Guy in Possession of
the Computer
---
Read for the Rule and to Learn How to Write Briefs with
Tech Issues
4TH AMEND. AND CELL
PHONES
What is a Cell Phone for 4th Amendment
Purpose?
RILEY V.
CALIFORNIA ,
134 S. CT.
2473 (2014)
GOVERNMENT PROPOSED TWO RULES TO DECIDE THE CASE
➤ Arizona v. Gant Methodology
➤ Warantless Search of Contents of Phone Permitted if there
is reason to believe that the phone contains evidence of the
crime of arrest
➤ Analogue Test
➤ Warrantless Search is Permissible if law enforcement could
have obtained the same information contained on the cell
phone from some pre-digital counterpart to the contents of
the phone
➤ These exceptions Would Swallow The Rule
Balancing Test:
1. Government's Interest in Immediate Search
* Officer Safety
* Risk of Erasure
Versus
2. Privacy Interests of the Individual
* Vast Data Can Be Stored On Phone
* Our Whole Lives Are There
TAKEAWAY FROM RILEY
➤ Searches of Contents of Cell
Phones Require a Warrant
unless There is Truly an
Exigent Circumstance
(Instructions to Stop a Ticking
Time Bomb)
➤ This Balance Will Almost
Always Tip Toward Privacy
➤ Try to Keep This Framework
in mind in other contexts.
ORDERS FOR PASSWORDS AND
DECRYPTION
U.S. V. DOE
(IN RE
GRAND JURY
SUBPOENA)
570 F.3d 1335 (11th Cir.
2012)
THE TRICK HERE
➤ The Question Does Not Turn
on the Privacy Interests in the
Contents of the Hard Drive or
Device
➤ The Question Turns on
Whether the Act of
Decryption or of Disclosing
the Password is "Testimony"
THE HOLDING
➤ Any Order to Decrypt Contents of a Hard Drive Is An Order
to Compel Testimony
➤ Immunity That Leaves Room for the Government to Derive
Use of that Testimony to Develop a Criminal Case Against the
Witness Does Not Protect Against Self-Incrimination for 5th
Amendment Purposes
SEC V. HUANG
➤ USDC for ED of Pennsylvania
➤ No 15-269 (2015)
➤ What if the Holder of the
Password is an individual
employee in possession of a
corporate phone?
➤ Remember the Analysis --
the Focus is the Act not the
Contents
THE TAKEAWAY
➤ Where the issue is court-ordered decryption or court ordered
production of a password, the issues is not 4th Amendment
But 5th amendment
➤ The Act of decryption or the providing of a password is
Testimony for 5th Amendment Purposes
➤ Full Immunity May Require Production
➤ And If the Contents are Particularly described, then the
foregone Conclusion may favor the gvt., but not yet
QUESTIONS AHEAD
➤ What if a bond condition is
"Provide law enforcement your
password, and you get a bond"
➤ Is this Jackson/Denno --
Miranda Self Incrimination?
➤ Is this speech with a hope of
benefit / Fear of Punishment
SUBSCRIBER INFO.
➤ U.S. v. Graham, 824 F. 3d 421
(4th Cir. 2016)
➤ U.S. V. Davis, 785 F.3d 498
(11th Cir. 2015)
➤ U.S. V. Carpenter (6th Cir.
2016)
➤ Every Circuit has followed the
3rd Party Doctine
CONCLUSION
➤ Cell Phone Searches Almost
Always Will Require a Warrant --
Riley
➤ A Person will Not be Required to
Decrypt a Hard Drive or Provide a
Passcode to his or her device
without a grant of full immunity
-- US v. Doe
➤ The Government May Freely get
Access to Cell Phone Location
Data and Without a Warrant --
Graham, Davis, Carpenter
➤ Stay Current on Tech and the Law
so That you Can be Creative
About it Going Forward

More Related Content

Viewers also liked

CSA-Student-Priorities-OSAP-Transformation-FINAL
CSA-Student-Priorities-OSAP-Transformation-FINALCSA-Student-Priorities-OSAP-Transformation-FINAL
CSA-Student-Priorities-OSAP-Transformation-FINAL
Ciara Byrne
 

Viewers also liked (12)

Ewrt 2 class 19 essay exam 4
Ewrt 2 class 19 essay exam 4Ewrt 2 class 19 essay exam 4
Ewrt 2 class 19 essay exam 4
 
Mida
MidaMida
Mida
 
Habari apresentação
Habari apresentaçãoHabari apresentação
Habari apresentação
 
El administrador
El administradorEl administrador
El administrador
 
Tallerpractico10 maria-luisa-andrade
Tallerpractico10 maria-luisa-andradeTallerpractico10 maria-luisa-andrade
Tallerpractico10 maria-luisa-andrade
 
“Reaksi Kimia Bersyair Dalam Gerakan Literasi Sekolah”
“Reaksi Kimia Bersyair Dalam Gerakan Literasi Sekolah”“Reaksi Kimia Bersyair Dalam Gerakan Literasi Sekolah”
“Reaksi Kimia Bersyair Dalam Gerakan Literasi Sekolah”
 
Actividad 2 módulo 4
Actividad 2 módulo 4Actividad 2 módulo 4
Actividad 2 módulo 4
 
Tips for parents 1
Tips for parents 1Tips for parents 1
Tips for parents 1
 
жумахан+жамиля+инкубатор+клиенты4,1
жумахан+жамиля+инкубатор+клиенты4,1жумахан+жамиля+инкубатор+клиенты4,1
жумахан+жамиля+инкубатор+клиенты4,1
 
Mery Ariza Guerrero 40512020
Mery Ariza Guerrero 40512020Mery Ariza Guerrero 40512020
Mery Ariza Guerrero 40512020
 
CSA-Student-Priorities-OSAP-Transformation-FINAL
CSA-Student-Priorities-OSAP-Transformation-FINALCSA-Student-Priorities-OSAP-Transformation-FINAL
CSA-Student-Priorities-OSAP-Transformation-FINAL
 
07.실행환경 교육교재(표준프레임워크 세부 적용기준)
07.실행환경 교육교재(표준프레임워크 세부 적용기준)07.실행환경 교육교재(표준프레임워크 세부 적용기준)
07.실행환경 교육교재(표준프레임워크 세부 적용기준)
 

Similar to Cell Phones, the Fourth Amendment, and the Fifth Amendment

Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
CTIN
 
WhenCartelInvestigatorsComeCalling
WhenCartelInvestigatorsComeCallingWhenCartelInvestigatorsComeCalling
WhenCartelInvestigatorsComeCalling
James (Jim) Nelson
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
drennanmicah
 
Criminal Lawyer Mobile
Criminal Lawyer MobileCriminal Lawyer Mobile
Criminal Lawyer Mobile
crate2gold
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
LeonardN9WWelchw
 
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0http
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0httphttpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0http
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0http
LizbethQuinonez813
 
The Fourth Amendment Explained
The Fourth Amendment ExplainedThe Fourth Amendment Explained
The Fourth Amendment Explained
Jeremy Duncan
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
itgsabc
 

Similar to Cell Phones, the Fourth Amendment, and the Fifth Amendment (20)

Fingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides NovaFingerprints, Passcodes, and Self Incrimination - BSides Nova
Fingerprints, Passcodes, and Self Incrimination - BSides Nova
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
Poliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bgPoliy Debate topic analysis 15 16-bg
Poliy Debate topic analysis 15 16-bg
 
Smartphones are smarter than you thought geo bellas
Smartphones are smarter than you thought   geo bellasSmartphones are smarter than you thought   geo bellas
Smartphones are smarter than you thought geo bellas
 
WhenCartelInvestigatorsComeCalling
WhenCartelInvestigatorsComeCallingWhenCartelInvestigatorsComeCalling
WhenCartelInvestigatorsComeCalling
 
Keynote - Cindy Cohn
Keynote - Cindy CohnKeynote - Cindy Cohn
Keynote - Cindy Cohn
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
WOC 2016: Want a Security Clearance? This is what you need to know
WOC 2016: Want a Security Clearance? This is what you need to knowWOC 2016: Want a Security Clearance? This is what you need to know
WOC 2016: Want a Security Clearance? This is what you need to know
 
1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx1Figures title5Civil Liberties and the Supreme Court.docx
1Figures title5Civil Liberties and the Supreme Court.docx
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick BellData Privacy and Security in the Digital age Ukraine - Patrick Bell
Data Privacy and Security in the Digital age Ukraine - Patrick Bell
 
BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"BSidesPDX "An update from the crypto wars 2.0"
BSidesPDX "An update from the crypto wars 2.0"
 
Social media competence and ethics Oklahoma
Social media competence and ethics OklahomaSocial media competence and ethics Oklahoma
Social media competence and ethics Oklahoma
 
Criminal Lawyer Mobile
Criminal Lawyer MobileCriminal Lawyer Mobile
Criminal Lawyer Mobile
 
Police can no longer search your phone without a warrant, rules Supreme Court
Police can no longer search your phone without a warrant, rules Supreme CourtPolice can no longer search your phone without a warrant, rules Supreme Court
Police can no longer search your phone without a warrant, rules Supreme Court
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docxGovernment Employs Backdoor Searches ACSB standards- Social and Ethica.docx
Government Employs Backdoor Searches ACSB standards- Social and Ethica.docx
 
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0http
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0httphttpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0http
httpswww.youtube.comembedRTvzNCxewQIwmode=opaque&rel=0http
 
The Fourth Amendment Explained
The Fourth Amendment ExplainedThe Fourth Amendment Explained
The Fourth Amendment Explained
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 

Recently uploaded

一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
Airst S
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
JosephCanama
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
Airst S
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
e9733fc35af6
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 

Recently uploaded (20)

一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 

Cell Phones, the Fourth Amendment, and the Fifth Amendment

  • 1. TECHNOLOGY CASELAW UPDATE When They Want Your Client's Cellphone and Its Contents
  • 2. REMOTE FOLKS, TWEET QUESTIONS TO: @JSCOTTKEY #KEYCASELAW
  • 3. CONTACT ME ➤ Twitter: ➤ @jscottkey ➤ @millerandkeylaw ➤ Instagram: ➤ MillerAndKeyLaw ➤ Scott Key ➤ Email and Phone: ➤ 678.610.6624 ➤ skey@millerandkeylaw.com
  • 5. 3 TOPICS ➤ 4th Amendment and Cell Phone Searches ➤ 5th Amendment and Order to Decrypt and Unlock ➤ Subpoenas and Search Warrants for Subscriber Information
  • 6. THEME: DON'T BE A DINOSAUR (THE LAW MOVES SLOWER THAN THE TECH)
  • 7. WHY IS THIS IMPORTANT ➤ There's a Tech Component to Every Criminal Case ➤ If you Don't Understand Facebook, Twitter, Snapchat, Instagram, Twitter, or the Next 5 Things, You Will: ➤ Nuke Your Client's Appeal ➤ Miss Legal Issues ➤ Sound Dumb to the Jury
  • 8. HOW WELL DO YOU NEED TO KNOW IT You need to know enough to teach it to the judges and justices who don't get it Pro-Tip -- Read Opinions of the Judges Who "Get" It (GA: Dillard / TX: Justice Don Willett)
  • 9. NEW V. STATE 327 GA. APP. 87 (2014) Jury Question About Whether Deleted Contraband Images Were in the Possession of the Guy in Possession of the Computer --- Read for the Rule and to Learn How to Write Briefs with Tech Issues
  • 10. 4TH AMEND. AND CELL PHONES What is a Cell Phone for 4th Amendment Purpose?
  • 11.
  • 12. RILEY V. CALIFORNIA , 134 S. CT. 2473 (2014)
  • 13. GOVERNMENT PROPOSED TWO RULES TO DECIDE THE CASE ➤ Arizona v. Gant Methodology ➤ Warantless Search of Contents of Phone Permitted if there is reason to believe that the phone contains evidence of the crime of arrest ➤ Analogue Test ➤ Warrantless Search is Permissible if law enforcement could have obtained the same information contained on the cell phone from some pre-digital counterpart to the contents of the phone ➤ These exceptions Would Swallow The Rule
  • 14.
  • 15. Balancing Test: 1. Government's Interest in Immediate Search * Officer Safety * Risk of Erasure Versus 2. Privacy Interests of the Individual * Vast Data Can Be Stored On Phone * Our Whole Lives Are There
  • 16. TAKEAWAY FROM RILEY ➤ Searches of Contents of Cell Phones Require a Warrant unless There is Truly an Exigent Circumstance (Instructions to Stop a Ticking Time Bomb) ➤ This Balance Will Almost Always Tip Toward Privacy ➤ Try to Keep This Framework in mind in other contexts.
  • 17. ORDERS FOR PASSWORDS AND DECRYPTION
  • 18. U.S. V. DOE (IN RE GRAND JURY SUBPOENA) 570 F.3d 1335 (11th Cir. 2012)
  • 19.
  • 20. THE TRICK HERE ➤ The Question Does Not Turn on the Privacy Interests in the Contents of the Hard Drive or Device ➤ The Question Turns on Whether the Act of Decryption or of Disclosing the Password is "Testimony"
  • 21. THE HOLDING ➤ Any Order to Decrypt Contents of a Hard Drive Is An Order to Compel Testimony ➤ Immunity That Leaves Room for the Government to Derive Use of that Testimony to Develop a Criminal Case Against the Witness Does Not Protect Against Self-Incrimination for 5th Amendment Purposes
  • 22. SEC V. HUANG ➤ USDC for ED of Pennsylvania ➤ No 15-269 (2015) ➤ What if the Holder of the Password is an individual employee in possession of a corporate phone? ➤ Remember the Analysis -- the Focus is the Act not the Contents
  • 23. THE TAKEAWAY ➤ Where the issue is court-ordered decryption or court ordered production of a password, the issues is not 4th Amendment But 5th amendment ➤ The Act of decryption or the providing of a password is Testimony for 5th Amendment Purposes ➤ Full Immunity May Require Production ➤ And If the Contents are Particularly described, then the foregone Conclusion may favor the gvt., but not yet
  • 24. QUESTIONS AHEAD ➤ What if a bond condition is "Provide law enforcement your password, and you get a bond" ➤ Is this Jackson/Denno -- Miranda Self Incrimination? ➤ Is this speech with a hope of benefit / Fear of Punishment
  • 25. SUBSCRIBER INFO. ➤ U.S. v. Graham, 824 F. 3d 421 (4th Cir. 2016) ➤ U.S. V. Davis, 785 F.3d 498 (11th Cir. 2015) ➤ U.S. V. Carpenter (6th Cir. 2016) ➤ Every Circuit has followed the 3rd Party Doctine
  • 26. CONCLUSION ➤ Cell Phone Searches Almost Always Will Require a Warrant -- Riley ➤ A Person will Not be Required to Decrypt a Hard Drive or Provide a Passcode to his or her device without a grant of full immunity -- US v. Doe ➤ The Government May Freely get Access to Cell Phone Location Data and Without a Warrant -- Graham, Davis, Carpenter ➤ Stay Current on Tech and the Law so That you Can be Creative About it Going Forward