The government filed an application for a search warrant in this matter that sought to search a premises in the District of Columbia and to seize, among other things, evidence on cellphones and computers found on the premises which reasonably could contain evidence of the offenses under investigation. In addition, the government sought authorization from the Court to "compel biometric features of an individual believed to have perpetrated the alleged offenses under investigation [the "Subject"] in connection with any biometric recognition sensor-enabled" digital device
I. BACKGROUND
The government's affidavit in support of the warrant established probable cause to believe that the premises to be searched was the Subject's, an individual whom the government had probable cause to believe has violated
for any digital device which is capable of containing and reasonably could contain fruits, evidence, information, contraband, or instrumentalities as described in the search warrant affidavit and above, including but not limited to ... [a certain] computer referenced in the search warrant affidavit [that the Subject has been seen using]:
... evidence of who used, owned, or controlled the [Subject Devices] at the time the things described in this warrant were created, edited, or deleted, such as logs, registry entries, configuration files, saved usernames and passwords, documents, browsing history, user profiles, email, email contacts, "chat," instant messaging logs, photographs, and correspondence
....
Attachment B, ¶ 3.a. Attachment B further stated:
Although already generally covered by paragraph 3.a. above, during the execution of the search of the [premises] described in Attachment A, law enforcement personnel are also specifically authorized to compel [the Subject] to provide biometric features, including pressing his fingers (including thumbs)
against and/or putting his face before the sensor, or any other security feature requiring biometric recognition, of:
(a) any of the [Subject Devices] found at the [premises], and
(b) where the [Subject Devices] are limited to those which are capable of containing and reasonably could contain fruits, evidence, information, contraband, or instrumentalities of the offense(s) as described in the search warrant affidavit and warrant attachments,
for the purpose of attempting to unlock the [Subject Devices'] security features in order to search the contents as authorized by this warrant.
Attachment B, ¶ 4. The affidavit in support of the warrant application noted that, from both the affiant's "training and experience, [and] ... from information found in publicly available materials published by device manufacturers, ... many electronic devices, particularly newer mobile devices and laptops, offer their users the ability to unlock the device through biometric features" rather than with passwords or passcodes. Affidavit, ¶ 59.a. Importantly, the warrant made clear that law enforcement was not authorized "to compel any other individuals found at the [premises] to provide biometric features ... to access or otherwise unlock any [Subject Device]," or to request the Subject "to state or otherwise provide the password or any other means that may be used to unlock or access the [Subject Devices], including by identifying the specific biometric characteristics (including the unique finger(s) or other physical features) that may be used to unlock or access the [Subject Devices]." Attachment B, ¶ 4. That is, absent the Subject's Mirandized-waiver of constitutional rights, the government was not permitted to ask the Subject to disclose which biometric feature (e.g., which finger) would unlock any of the Subject Devices. Rather, law enforcement was required to select which biometric feature to test on a given device.
II. DISCUSSION
A. Fourth Amendment
"The Fourth Amendment provides in relevant part that '[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause.' " Missouri v. McNeely ,
"The overriding function of the Fourth Amendment is to protect personal privacy and dignity against unwarranted intrusion by the State." Schmerber v. California ,
The government's memorandum cites a number of cases to support the proposition that "obtaining an individual's physical characteristics," including fingerprints, palm prints, and photographic likenesses, "does not constitute an intrusion upon his privacy that warrants Fourth Amendment protection." Government Mem. at 5 (citing United States v. Farias-Gonzalez ,
The government's point is well-taken. For example, in Davis v. Mississippi ,
However, the fact that the Fourth Amendment is implicated when law enforcement detains an individual to obtain fingerprints (or similar physical characteristics) for an investigatory purpose does not mean that all such instances of fingerprinting violate the Constitution. As the Supreme Court observed in Davis , "[d]etentions for the sole purpose of obtaining fingerprints are no less subject to the constraints of the Fourth Amendment. It is arguable, however, that, because of the unique nature of the fingerprinting process, such detentions might, under narrowly defined circumstances, be found to comply with the Fourth Amendment even though there is no probable cause in the traditional sense."
The question then is-even where the government is permitted to detain briefly an individual during a search warrant's execution consistent with Bailey and Broussard -what further showing does the Fourth Amendment require before the government may be authorized to compel the use of an individual's biometric features in an attempt to unlock a digital device that it is authorized to search pursuant to a warrant? The decision is not without consequence, and rightfully so given the privacy interests at stake recognized in Davis. See Davis ,
At oral argument, the government argued that the Court should not further define the standard beyond that of the "reasonableness" that the Fourth Amendment requires of law enforcement whenever it executes a search warrant. Under that standard, provided a warrant is properly issued, "it is generally left to the discretion of the executing officers to determine the details of how best to proceed with the performance of the search authorized by the warrant-subject of course to the general Fourth Amendment protection 'against unreasonable searches and seizures.' " Dalia v. United States ,
Here, however, the government asked for prior authorization from the Court to place an individual's fingerprints on certain digital devices (or to use other biometric features to gain access to them): namely, the warrant "specifically authorize[s]" law enforcement to compel the Subject to provide biometric features. Attachment B, ¶ 4. Such authorization can have significant consequences for the individual whose biometric features are tested by the government. Nor did the government deny at oral argument that it might later argue that it reasonably relied on the Court's authorization if its compelled use of the individual's biometric features is challenged. See, e.g., United States v. Cardoza ,
For its part, the Federal Public Defender proposed at oral argument that, before receiving court approval to use biometric features to attempt to unlock a digital device, the government should be required to establish probable cause to believe that the device belongs to the suspect. But while the taking of a fingerprint is undeniably a search, see, e.g., Hayes ,
There is ... support in our cases for the view that the Fourth Amendment would permit seizures for the purpose of fingerprinting, if there is reasonable suspicion that the suspect has committed a criminal act, if there is a reasonable basis for believing that fingerprinting will establish or negate the suspect's connection with that crime, and if the procedure is carried out with dispatch.
Moreover, the reasonable suspicion standard is similar to the reasonableness standard proposed by the government-which already governs the conduct of law enforcement when executing a search warrant, see, e.g., Dalia ,
Using Hayes as its guide, the Court thus finds that, when attempting to
B. Fifth Amendment
The Fifth Amendment provides, in relevant part, that "[n]o person
Here, the seizure of any incriminating information found on the phones or computers discovered during the search of the premises would not violate the Fifth Amendment because the "creation" of that information was voluntary and "not 'compelled' within the meaning of the privilege [against self-incrimination]." Hubbell ,
The Supreme Court has held that testimonial communications for purposes of the Fifth Amendment include not only oral communications but also certain communicative acts. In Hubbell , for example, the Court considered whether a witness' response to a subpoena calling for the production of eleven categories of documents could be deemed testimonial.
the act of producing documents in response to a subpoena may have a compelled testimonial aspect. We have held that "the act of production" itself may implicitly communicate "statements offact." By "producing documents in compliance with a subpoena, the witness would admit that the papers existed, were in his possession or control, and were authentic."
The Federal Public Defender equates the conduct at issue here to the production of documents in response to the subpoena in Hubbell . It contends that the compelled use of biometric features to unlock a phone or computer is "inherently testimonial" because it "would implicitly communicate that the suspect possessed or controlled the device with incriminating evidence." Amicus Curiae Mem. at 3. However, the Hubbell Court emphasized that, in responding to the subpoena, "[i]t was unquestionably necessary for respondent to make extensive use of 'the contents of his own mind' in identifying the hundreds of documents responsive to the requests in the subpoena."
Admittedly, the line between testimonial and non-testimonial communications under the Fifth Amendment is not crystal clear. Here, however, the compelled use of the Subject's biometric features is far more akin to the surrender of a safe's key than its combination.
For example, in Schmerber the Supreme Court held that "not even the shadow of testimonial compulsion or enforced communication by the accused was involved" in drawing a defendant's blood and testing it for blood-alcohol level, which was then used to convict him of driving under the influence.
Similarly, in Doe II , the Supreme Court held that compelling a defendant to sign a directive consenting to the disclosure of his bank accounts, which applied to "any and all accounts over which [he] had a right of withdrawal, without acknowledging the existence of any such account" was not testimonial under the Fifth Amendment.
Amicus contends that Doe II supports its argument because, while the defendant in that case "was not acknowledging control of any particular bank account," here, "the compelled access would reveal exactly what particular device the person possessed or controlled."
That rule dooms the Federal Public Defender's "decryption" argument, as well.
Hubbell and In re Subpoena Duces Tecum are instructive. In Hubbell , the Supreme Court held that the subpoena respondent's "assembly" of information for the government-a concept that amicus invokes in its argument-can constitute a testimonial act of production. However, the respondent's "assembly of literally hundreds of pages of material in response to a request for 'any and all documents reflecting, referring, or relating to any direct or indirect sources of money or other things of value received or provided to' an individual or members of his family during a 3-year period," Hubbell ,
The Eleventh Circuit in In re Subpoena Duces Tecum found that compelled decryption of information on a number of digital devices did violate the Fifth Amendment.
* * * * *
Like other courts addressing similar issues, this Court is mindful of the important privacy interests at stake when government accesses information on a digital device. See, e.g., Carpenter , 585 U.S. at ----,
III. CONCLUSION
For the foregoing reasons, the government's application for a search warrant including authorization to compel the use of the Subject's biometric features such as his fingerprints, face, or irises to unlock any Subject Devices found at the premises to be searched was granted.
Notes
The relevant submissions for the purpose of this opinion are (1) Application for a Search Warrant ("Warrant"), including the Affidavit in Support ("Affidavit"), Attachment A, and Attachment B; (2) the government's Memorandum in Support of an Application under Rule 41 for a Warrant to Search and Seize ("Government Mem."); (3) Brief of Amicus Curiae Federal Public Defendant for the District of Columbia ("Amicus Curiae Mem."); (4) Reply Memorandum in Support of an Application under Rule 41 for a Warrant to Search and Seize ("Reply Mem.").
The Court thanks the Federal Public Defender for its submission and participation at oral argument, both of which were of considerable assistance in resolving the government's application.
Based on the limited information that was provided as part of the Court's order to submit an amicus brief, the Federal Public Defender argued that "the government's request to generally search any digital device(s) that may be found at the premises likely violates the Fourth Amendment's particularity requirement." Amicus Curiae Mem. at 1 n.1. The concern of amicus is understandable in light of the fact that it has seen neither the proposed warrant, itself, nor the affidavit supporting it. However, the government's warrant was sufficiently particularized.
The Fourth Amendment's particularity requirement has three components: a warrant "must identify the specific offense" for which law enforcement has established probable cause; it must "describe the place to be searched"; and it must "specify the 'items to be seized by their relation to designated crimes.' " United States v. Galpin ,
In this regard, the Court sees no principled distinction that can be made between the intrusiveness of the government's compelled use of an individual's fingerprints versus his or her face or irises.
This application did not present the question of the proper standard to apply when law enforcement seeks to compel use of biometric features to access a digital device at a time other than during the search of a premises pursuant to a search warrant, and the Court does not address that issue.
In two recent cases, the Supreme Court has addressed the warrant requirement as it applies to cell phones. Carpenter v. United States held that law enforcement must get a warrant in order to access historical cell-site location information from a phone; Riley v. California required a warrant to search the contents of a cell phone seized incident to arrest. Carpenter v. United States , 585 U.S. ----, ----,
Further, the government would be prohibited from using the Court's authorization as a basis to coerce any individual to consent to collection of their biometric features. See, e.g., Moran v. Burbine ,
While prior judicial authorization would not be required where the exigencies of the situation would make doing so impossible, the government's decision to seek such authorization in this case is consistent with the Supreme Court's instruction in Terry and McNeely that prior judicial authorization for searches and seizures must be sought whenever practicable. See McNeely ,
The Federal Public Defender objects to analogizing the seizing of a key from a suspect to open a strongbox, which is a non-testimonial act, to the use of biometric features to unlock a device, arguing that "[a] physical key does not necessarily connote possession, control, or prior access the way a fingerprint or facial technology does" because "[o]ne can borrow, find, or steal a physical key." Amicus Curiae Mem. at 7. But surely the possession of a key that turns a strongbox's lock denotes present access, from which prior access can be inferred (and argued in a prosecution). The fact that the possessor of the key has a more credible counter-argument-that a key may be borrowed, found, or stolen, an argument that would be difficult to maintain regarding a fingerprint-speaks to the incriminatory nature of the possession of the object: that possessing a borrowed, found, or stolen key to a strongbox may have a weaker incriminatory consequence than would bearing a fingerprint that opens a device. But the notion that one might have more incriminatory power than the other is not relevant to whether the compelled use of a fingerprint is any more testimonial than the compelled use of a key; "the requirement that the compelled communication be 'testimonial' " is "separate [from the] requirement that the communication be 'incriminating.' " Doe II ,
As noted in footnote 9, supra , that position overstates the case.
Neither party presented a clear description of the state of data on a digital device before and after it is unlocked, failing to explain whether application of a biometric feature merely unlocks the device or actually decrypts the data on it. Nor is the case law particularly helpful in this regard. For example, in In re Subpoena Duces Tecum , the court simply states that the target was ordered "to produce the unencrypted contents of [certain] hard drives," that "the decryption and production of the hard drives would require the use of Doe's mind," and referring in passing to a "decryption password," without clearly defining or explaining what is meant by "decryption," the manner in which the decryption would be accomplished, or how, precisely, it would involve the contents of the target's mind.
At oral argument, the Federal Public Defender posited that one whose cellphone can be accessed and decrypted using a fingerprint has used the contents of his or her mind to set up that security feature and that, therefore, the compelled unlocking via the fingerprint a fortiori reveals the contents of his or her mind. The problem with that argument is that configuring the device to use the fingerprint (or face or iris) to unlock and decrypt it was not compelled; only the present use of the fingerprint has been compelled. See, e.g., United States v. Doe ,
In its opening memorandum, the government argues that its request regarding the use of biometric features was authorized under Rule 41 of the Federal Rules of Criminal Procedure, which governs search and seizure warrants. Government Mem. at 12-14. Amicus did not address that question in its opposition. The Court need not decide that question, however, because, even if Rule 41 does not countenance an authorization such as this, the government is correct that the All Writs Act,
