OPINION AND ORDER
The government has presented an application for a search and seizure warrant to seize various items presumed to be located at a particularly identified location (hereinafter “subject premises”). The warrant further requests the authority to seize various items (identified in Attachment B of the warrant application), including various forms of electronic storage media and computer equipment (hereinafter collectively
However, in its warrant application, the government also seeks the authority to compel any individual who is present at the subject premises at the time of the search to provide his fingerprints and/or thumbprints “onto the Touch ID sensor of any Apple iPhone, iPad, or other Apple brand device in order to gain access to the contents of any such device.” For the reasons set . forth below, this aspect of the search warrant application is denied.
To begin, there are several aspects of the warrant application that are noteworthy. First, the government has plainly established probable cause to believe that someone has been receiving and trafficking child pornography using the subject premises’ internet service. Obviously, these are extremely serious allegations. The warrant application makes plain multiple vulnerable victims are, or were, being sexually abused, and someone associated with the subject premises (although as explained below the exact nature of the association is not known) is- involved in trafficking these images.
Despite the apparent seriousness of the offenses involved, the Court notes that some of the “boilerplate” background information included in the warrant is a bit dated, such as its explanation that “[t]he internet allows any computer to connect to another computer [so] [electronic contact can be made to millions of computers around the world;” its explanation that a “Blackberry” is a common “Personal Digital Assistant” (see ¶ 19); and its' suggestion that the use of “cloud technology” is the exceptional way of transferring files and that transferring images to a computer by directly connecting a cable to a camera or other recording device is the expected means of data transfer. (¶ 18.)
The inclusion of this somewhat dated view of technology certainly does not distract' from the hpplication’s goal of establishing probable cause. However, the dated “boilerplate language” is problematic for what is not included. There is absolutely no discussion of wireless internet service and the possibilities and capabilities that wireless service presents in this context. For example, an unsophisticated internet user, or a- careless one, may fail to properly encrypt his wireless service' or may share the password injudiciously. Such practices leave1 open the possibility that it is not an inhabitant of the subject premises that has used the internet to gather and distribute child pornography, but rather it is a person who has access to the internet service at the subject premises. Obviously, this possibility holds true in all investigations that track the investigation outlined in the instant application. The limitations of this investigation are not fatal to establishing probable cause, but, in the Court’s view, these limitations do impact the ability of the government to seek the extraordinary authority related to compelling individuals to provide their fingerprints to unlock an Apple electronic device.
The warrant application also lacks any detailed information about the resident(s) of the subject premises other than the name of the individual who is likely residing there. There is no assertion that the resident' has a known link to criminal acts involving child exploitation. There is no
The above-noted deficiencies are not surprising. Based on the information contained in the search warrant application, the government’s investigation, ¡is still developing, and these questions may be answered in the future. As discussed below, however, these factual deficiencies are important for purposes of the.Fourth and Fifth Amendment issues presented by this case.
The issues presented in this warrant application are at the cross section of protections provided by the Fourth and Fifth Amendments. Essentially, 'the-government seeks an order from this Court that would allow agents ' executing this warrant to force “persons at the Subject Premises” to apply their thumbprints and fingerprints to any Apple electronic device recovered at the premises. (See Attach. B, ¶ 12.) The request is neither limited to a particular person nor a particular device. And, as noted below, the request is made without any specific facts as to who is involved in the criminal conduct linked to the subject premises, or specific facts as to what particular Apple-branded encrypted device is being employed (if any).
First, the Court finds that the warrant does not establish sufficient probable cause to compel any person who happens to be at the subject premises at the time of the search to give his fingerprint to unlock an unspecified Apple electronic device. The government argues that “there is no Fourth Amendment right implicated by taking a fingerprint.”
Significant to this Court is that the government is seeking “forced fingerprinting” of any person who happens to be at the subject premises — inclusive of any residents) or itinerant visitors. Courts have appropriately and practically recognized that when executing a search warrant, law enforcement officers may detain residents present at the time of the search, Michigan v. Summers,
Perhaps most significantly, the Summers case, which allows the Fourth Amendment event of seizing occupants of a residence, has been read narrowly by courts to be limited to the “residents” of the searched premises. Summers,
The Supreme Court found that under the Fourth Amendment, police officers have, the limited authority to. detain an occupant of premises being searched for-contraband pursuant to a valid warrant. Id. at 705,
Finally, to ensure clarity on this issue, the Court is not concerned with the privacy interests of a fingerprint. The courts have made clear that there is no protecta-ble Fourth Amendment interest in the print itself. Rather, it is the method of obtaining the print that is at issue. In United States v. Guevara-Martinez, the defendant was stopped and arrested after a traffic stop resulted in the discovery of narcotics.
Second, and in addition to the Fourth Amendment concerns articulated above, the Court believes that the government’s warrant application raises concerns under the Fifth Amendment’s protection prohibiting compelled self-incrimination. In its submission, the government argues that “[b]ecause. depressing a fingerprint to a device results in no ‘testimonial communication’ it does not implicate the Fifth Amendment rights of the user of device ... Here the finger is like the key to a strongbox, it is not a communication at all, let alone a testimonial one.” (Gvt. Mem. at 2) (citing Commonwealth v. Baust,
The government is generally correct that the production of physical characteristics generally do not raise Fifth Amendment concerns. See United States v. Dionisio,
In United States v. Doe, Defendant Doe was served with a subpoena requiring him to appear before a grand jury and produce encrypted contents located on the hard drives of his computer and external devices. United States v. Doe (In re Grand Jury Subpoena Duces Tecum),
In framing its analysis, the Court of Appeals relied heavily on Fisher v. United States,
The [Fisher] Court reasoned that, in essence, the taxpayer’s production of the subpoenaed documents would not be testimonial- because the Government knew of the existence of the documents, knew that the taxpayer possessed the documents, and could show their authenticity not through the use of the taxpayer’s mind, but rather through testimony from-others. Where the'location, existence, and authenticity of the purported -evidence is known with reasonable particularity, the contents of the individual’s mind are not used against him, and therefore no Fifth Amendment protection is available.
Id. at 1344 (internal citations omitted). This reasoning has been labeled the “foregone conclusion'doctrine.”
In contrast, in Hubbell, defendant invoked the Fifth Amendment privilege after a grand jury subpoenaed certain documents.
Whatever the scope of this “foregone conclusion” - rationale, the facts of this case plainly fall outside of it. While in Fisher the Government already knew that the documents were in the attorneys’ possession and could independently confirm their existence and authenticity through the accountants who -created them, here the; Government has not shown that it had any 'prior knowledge of either the existence or the whereabouts of the 13,120 pages of documents ultimately produced by respondent.'The Government cannot cure this deficiency through the overbroad argument that a businessman such as respondent will always possess -general business and tax records -that- fall within the broad categories- described in this subpoena. The' Doe subpoenas ' also sought several broad categories of general business records, yet we upheld the District Court’s finding that the act of producing those records would' involve testimonial self-incrimination.
Id. at 4445,
In light of these two opinions, the Doe court concluded that an “act of production can be .testimonial when that act conveys some explicit or implicit statement of fact that certain materials exist, are in .the subpoenaed individual’s possession or control, or are authentic” and the. “touchstone” of whether production is testimonial is if the “government compels, the individual to use ‘the contents of his own mind’ to explicitly or implicitly communicate some statement of fact.” Id. at 1345 (citing Curcio v. United States,
In Doe, the government was unaware of what, -if any, files existed, or the location of the files-on the hard drive. Id. at 1347. The
In the instant case, the government argues that the presentation of a fingerprint is not testimonial because under Doe v. United States,
The government cites United States v. Wade, for the proposition that, the Fifth Amendment privilege against self-incrimination offers no protection against compulsion to submit to fingerprinting. (Gvt. Mem. at 2) (citing Wade,
The societal concerns of privacy raised in Riley provide an important backdrop to the issue presented in the instant case. The Riley court recognized that the modern day cell phone, based in part on the personal and intimate information regularly stored on such devices, is subject to higher Fourth Amendment protections than other items that might be found on a person. Id. at 2486. The considerations informing the Court’s' Fourth Amendment analysis of a cell phone’s role in modern day life, we believe raise Fifth Amendment concerns as well. We do not believe that a simple analogy that equates the limited protection afforded a fingerprint used for identification purposes to forced fingerprinting to unlock an Apple electronic device that potentially contains some of the
In closing, upon presentation of the warrant application to this .Court, the government identified for this Court that the warrant application was seeking the forced fingerprinting discussed herein. The government further noted “[t]his is the language that we are making standard in all of our search warrants.” This declaration of standardization is perhaps the crux of the problem. As the Court hopes it is plain from the above, the issues presented here require a fact-intensive inquiry both for purposes of the Fourth Amendment and the Fifth Amendment. This opinion should not be understood to mean that the government’s request for forced fingerprinting will always be problematic. In circumstances where the existence and nature of the electronic information sought is a “foregone conclusion,” Fifth Amendment jurisprudence tells us that the concerns noted above may be obviated. Similarly, under Fourth Amendment jurisprudence where there is an individualized showing more firmly establishing a connection between an individual and criminal conduct, the Fourth Amendment concerns raised herein may fall to the wayside. Indeed, after the execution of this warrant, the government may garner additional evidence that addresses both of these concerns such that the government can promptly apply for additional search warrants. We simply are not there yet.
For the reasons stated, the Court does not find, under the circumstances presented here, that the government has established a proper basis to force any individual at the subject premises to provide a fingerprint or thumbprint in an attempt to unlock any Apple device that may be found.
SO ORDERED.
Notes
. Why Apple devices are likely to be found at the premises is not explained. The Court is aware that Apple has a large market share in online hardware, but Microsoft's Windows operating systems continue to dominate the overall market, share of operating, systems used. See Joel Hruska, Windows Drops Below 90% Market Share for the First Time in Years; Windows 7 Falls Below, Extreme Tech (Dec. 19, 2016), . https://www.extremetech.com/ computing/227693-windows-drops-below-90-market-share-for-the-first-timé-in-years-windows-7-falls-below-50).
. At" the Court’s request, the government prepared a memorandum of law in support of its warrant application, Government’s Memorandum of Law on Compelling Fingerprints to Unlock Encrypted Devices (hereinafter "Gvt. Mem.”) The Court appreciates that the government promptly provided this document to support its legal position. Given the short timeframe the government had to prepare this document, the Court recognizes that Gvt. Mem. does not reflect an exhaustive document supporting the government’s position. Similarly, this Court, in an effort to timely address the warrant application, has not been able to prepare an opinion that is as exhaustive, an exploration of the issues as the Court would prefer to prepare given more time to do so. This Court presented its order to the government for its consideration. Following that exchange, the Court has made minor edits to the opinion and amplified the Fifth Amendment analysis prior to publishing this order.
. The strength and depth of that connection may still be at issue, but connecting a suspect to contraband via biometric evidence is a large step forward in the criminal investigatory process.
