UNITED STATES OF AMERICA v. TIMOTHY DONOVAN BURNS
1:18CR492-1
1:18MJ307
IN THE UNITED STATES DISTRICT COURT FOR THE MIDDLE DISTRICT OF NORTH CAROLINA
May 10, 2019
L. Patrick Auld, United States Magistrate Judge
IN THE MATTER OF THE SEARCH OF A 2TB HITACHI HARD DRIVE, SERIAL NUMBER YFGNBBTA
MEMORANDUM OPINION AND ORDER
This matter comes before the undersigned United States Magistrate Judge on an Application for an Order to Require Defendant Burns to Assist in the Execution of a Search Warrant pursuant to the All Writs Act (the “Application“) (1:18MJ307, Docket Entry 3).1 For the reasons that follow, the undersigned Magistrate Judge will grant the Application.2
INTRODUCTION
On October 4, 2018, this Court (per the undersigned Magistrate Judge) issued a Search and Seizure Warrant (the “Warrant“) for a 2TB Hitachi Hard Drive, Serial Number YFGNBBTA (the “Device“). (1:18MJ307, Docket Entry 2.) “The [D]evice . . . is related to the investigation of Timothy Donovan Burns . . . .” (
On February 8, 2019, pursuant to a written Plea Agreement (signed by Burns and filed on January 30, 2019) (1:18CR492-1, Docket Entry 11) and a written Factual Basis (filed on February 5, 2019) (1:18CR492-1, Docket Entry 12), Burns pleaded guilty to receiving child pornography (before United States District Judge Loretta C. Biggs). (See 1:18CR492-1, Docket Entry dated Feb. 8, 2019.) In his Plea Agreement, Burns acknowledged that:
“[b]y pleading guilty . . ., [he] knowingly waive[d] and g[a]ve[] up his constitutional right[] . . . not to be compelled to incriminate himself” (1:18CR492-1, Docket Entry 11 at 4); - he “[wa]s going to plead guilty . . . because he [wa]s, in fact, guilty” (
id. at 5); - he “knowingly consent[ed] and agree[d] to forfeit to the United States all right, title, and interest in and to any and all visual depictions described in . . . Section 2252A, and any and all property, real or personal, used or intended to be used to commit or promote the commission of the offense [of receiving child pornography]” (
id. at 6); - “[t]he property to be forfeited include[d] . . . [the Device]” (
id. ; see alsoid. at 7 (“knowingly and voluntarily waiv[ing] all constitutional . . . claims, defenses and challenges to the forfeiture of [the Device]“)); and - “[n]o agreements, representations, or understandings ha[d] been made between the parties in this case other than those which [we]re explicitly set forth in th[at] Plea Agreement, and none w[ould] be entered into unless executed in writing and signed by all the parties” (
id. at 10).
The Factual Basis for Burns‘s guilty plea establishes that:
- law enforcement officers monitoring a computer-file-sharing network observed that someone using “IP address 174.111.32.203
. . . [i]n January and March 2018 . . . requested pieces of child pornography files” (1:18CR492-1, Docket Entry 12 at 6);3 - “records obtained from [an internet service provider] revealed that IP address 174.111.32.203 resolved to ‘Don Burns’ at his apartment in Kernersville, North Carolina” (
id. );4 - “[o]n March 14, 2018, [North Carolina State Bureau of Investigation Criminal Specialist (‘CS‘) Rodney] White and [a federal agent] traveled to Burns‘s apartment” (
id. at 6-7); - “Burns answered the door and agreed to speak with the agents inside” (
id. at 7);
“[u]pon entry, the agents observed a desktop computer in the living room connected to a bay of hard drives” ( id. );- “Burns explained that he lived alone and . . . formerly worked as a computer programmer” (
id. ); - “Burns admitted to using the [n]etwork [on which officers had observed his IP address requesting pieces of child pornography files]” (
id. ; see alsoid. (“Burns stated that he had been using [that network] for a few months.“)); - “[w]hen asked what he did with the child pornograрhy files, Burns explained that he downloaded the files to a hard drive and then sorted through them, deleting the files he didn‘t want” (
id. at 8; see alsoid. at 8-9 (“Burns said that he preferred minor girls 15 to 16 years of age. . . . CS White asked Burns which hard drive he used to save the child pornography that he downloaded. In response, Burns explained that there were three hard drives connected to his desktop computer. The first contained the computer‘s operating system, the second was the location to which files were downloaded, and the third contained music. During the interview with the agents, Burns sometimes qualified his answers by stating ‘If I was doing it’ and ‘I‘m not saying I did it’ and then smiling.” (internal ellipses omitted))); - “Burns denied using any type of encryption software to protect his files” (
id. at 8);
“Burns gave CS White verbal consent to take [Burns‘s] computer and hard drives and examine them for child pornography” ( id. ; see alsoid. at 9 (“Burns [also] executed a written consent . . . . With Burns‘s permission, CS White took custody of the computer and hard drives.“));- when “CS White forensically examined Burns‘s three computer hard drives,” CS White discovered that “[t]he first . . . was in fact the computer‘s operating system and contained deleted child pornography files, the second, [the Device], was fully encrypted by VeraCrypt software, and the third did in fact contain music files” (
id. at 9; see alsoid. (“The first hard drive, the operating system, contained 36 child pornography images that CS White recovered from unallocated space (i.e. they had been deleted from the active disk space).“)); - “the [first] hard drive‘s active space” contained “instructions on how to setup the [n]etwork . . . on a full disk encrypted hard drive” and on “how to use VeraCrypt software,” as well as actual “VeraCrypt software” (
id. at 9-10); - “[o]n March 20, 2018, the agents returned to Burns‘s residence to speak with him” and “Burns again agreed to speak with the agents inside” (
id. at 10); and - CS White “asked for the password to the [Device],” after which “Burns unequivocally stated that there was child pornography on the [Device], but declined to provide the password because, as
At the time of Burns‘s guilty plea, he “agree[d] to participate in a Psychosexual Evaluation.” (1:18CR492-1, Docket Entry dated Feb. 8, 2019.) According to records of the United States Probation Office, Psychosexual Evaluations:
- “include a personal clinical interview, review [of] available court documents regarding the offense . . . [as well as] victim impact information, and utiliz[ation of] a battery of tests” (1:18CR492-1, Docket Entry 21 at 1; see also
id. at 2 (stating that bar to “ask[ing] questions pertaining to the instant offense, or ask[ing] questions or administer[ing] tests that compel the defendant to make incriminating statements” applies only to “pretrial services defendants“), 3 (requiring evaluator to “review[] and consider[] . . . details of the current offense“)); - “provide a written clinical evaluation of a defendant‘s[] risk for re-offending and current amenability for treatment; to guide and direct specific recommendations for the conditions of treatment and supervision of a defendant[]; to provide information that will help to identify the optimal setting, intensity of intervention, and level of supervision[; as well as] to assess the potential dangerousness of the defendant[]” (
id. at 1); and - “shall consider . . . deviance and paraphilia, level and extent of pathology, deception and/or denial, . . . level of
Consistent with the foregoing guidance, the referral letter sent by the United States Probation Office to the entity performing Burns‘s Psychosexual Evaluation notes that agents acquired the Device from Burns (see 1:18CR492-1, Docket Entry 20 at 5), but found it “fully encrypted by VeraCrypt software” (
On February 25, 2019, the United States moved for entry of a forfeiture order as to the Device, on the ground that it “[wa]s
Shortly after Burns signed his Plea Agreement and just before Burns entered his guilty plea, the United States filed the Application, which “requests that the Court issue an order compelling [him] to produce [the Device] . . . in an unlocked and decrypted state.” (1:18MJ307, Docket Entry 3 at 1.) After Burns pleaded guilty (and agreed to a Psychosexual Evaluation) and after the Court (per Judge Biggs) ordered the Devicе forfeited (pursuant to Burns‘s admissions in his Plea Agreement and matters documented in the Factual Basis), Burns responded in opposition to the
DISCUSSION
The United States has filed the “Application under the All Writs Act, . . . seek[ing] an order requiring Burns to assist in the effectuation of the [ W]arrant . . . by producing the [Device] in a fully unlocked and unencrypted state.” (1:18MJ307, Docket Entry 3 at 9.) In support of the requеst for such a decryption order, the Application states: “Upon issuance of the [W]arrant, [a federal agent] sent a forensic copy of the [Device] to [the United States Department of Homeland Security‘s] Cyber Crime Center. [The Cyber Crime Center] attempted to access the hard drive by means of
The All Writs Act authorizes this Court to “issue all writs necessary or appropriate in aid of [its] respective jurisdiction[] and agreeable to the usages and principles of law.”
“Here, thе [undersigned] Magistrate Judge had subject matter jurisdiction under
Burns‘s Response challenges the foregoing analysis by arguing that the United States “has failed to show such a[ decryption] order either necessary or appropriate. The description of the [Cyber Crime Center‘s] attempt to gain access to the [D]evice[] is vague at best and does not demonstrate a need so pressing as to be either necessary or appropriate . . . .” (1:18CR492-1, Docket Entry 16 at 2; see also
Next, Burns‘s Response оpposes entry of the requested decryption order under the All Writs Act, on the ground that, “[b]y going to the third-party manufacturer[ of VeraCrypt], the government could avoid [the] direct Fifth Amendment implications [of requiring him to produce the Device in an unencrypted form] and
[IDRIX] ha[s] not implemented any “backdoor” in VeraCrypt (and will never implement any even if asked to do so by a government agency), because it would defeat the purpose of the software. VeraCrypt does not allow decryption of data without knowing the correct password or key. [IDRIX] cannot recover [a VeraCrypt user‘s] data because [IDRIX] do[es] not know and cannot determine the password [the user] chose or the key [the user] generated using VeraCrypt. The only way to recover [a VeraCrypt user‘s] files is to try to “crack” the password or the key, but it could take thousands or millions of years (depending on the length and quality of the password or keyfiles, on the software/hardware performance, algorithms, and other factors).
(1:18CR492-1, Docket Entry 18 at 2; see also
Put another way, “the Fifth Amendment does not independently proscribe the compelled production of every sort of incriminating evidence but applies only when the accused is [1] compelled to make [2] a [t]estimonial [c]ommunication [3] that is incriminating.” Id. at 408 (emphasis added); see also Hiibel v. Sixth Judicial Dist. Ct. of Nev., Humboldt Cty., 542 U.S. 177, 189 (2004) (“To qualify for the Fifth Amendment privilege, a communication must be testimonial, incriminating, and compelled.“). Accordingly, an individual “cannot avoid compliance with [a legal command to produce an item of evidence] merely by asserting that the item of evidence which he is required to produce contains incriminating [contents] . . . .” Fisher, 425 U.S. at 410; see also United States v. Hubbell, 530 U.S. 27, 35-36 (2000) (“[A] person may be required to produce specific documents even though they cоntain incriminating assertions of fact or belief because the creation of those documents was not ‘compelled’ within the meaning of the
As to whether the act of producing an item of evidenсe in response to a legal command results in “compelled testimonial self-incrimination,”
In light of that authority and given the state of the record (documented in the Introduction and summarized below), Burns‘s “Fifth Amendment claim, based on the fact that . . . [the requested decryption order effectively] ask[s] for, and reveal[s his possession of], the password to the [Device], [thus] fails. Any self-incriminating testimon[ial communication] that [Burns] may have [to] provide[] by [enter]ing the password [i]s already a ‘foregone conclusion’ because the Government independently proved that [he] was the sole user and possessor of the [Device].” United States v. Gavegnano, 305 F. App‘x 954, 956 (4th Cir. 2009). Moreover, to the extent that (contrary to the implications of the Fourth Circuit‘s ruling in Gavegnano), “where the government seeks decryption of hard drives,” United States v. Spencer, No. 17CR259, 2018 WL 1964588, at *2 (N.D. Cal. Apr. 26, 2018) (unpublished), in
- through the express terms of Burns‘s Plea Agreement (as subsequently endorsed at his plea hearing), Burns admitted not only
- the Factual Basis (and CS White‘s credible testimony) confirms that (A) during Burns‘s initial interview with law enforcement agents, he admitted that he lived alone, possessed computer expertise, and downloaded сhild pornography files to (and saved child pornography he liked, such as files with 15 and 16 year-old females, on) the Device, which he used in conjunction with a separate hard drive that housed his computer operating system, (B) a forensic review of the hard drive that Burns identified as containing his computer operating system verified that fact and revealed instructions for encrypting a hard drive and for using VeraCrypt software, as well as a copy of VeraCrypt software, (C) a forensic review of the Device could not proceed due to the encryption of all its contents with VeraCrypt software, and (D) during a follow-up interview with law enforcement agents, when asked for the password to decrypte the Device, Burns did not deny knowledge of the encryption or the decryption password and did not deny the presence of child pornography files on the Device, but
- based on Burns‘s admissions in his Plea Agreement and the uncontested information in the Factual Basis, the Court (per Judge Biggs) concluded that Burns used the Device to receive child pornography (and that he alone held any interest in the Device).
This record material belies the assertion in Burns‘s Response that “the contents of [the Device] are completely unknown to the [United States]” (1:18CR492-1, Docket Entry 16 at 16), as well as the Response‘s contention that “Burns never provided investigators with any evidence that he knew the password for the encrypted
As a last matter, the more hyperbolic flurries within Burns‘s Response -- including that the United States has “ignore[d] the Fifth Amendment” (1:18CR492-1, Docket Entry 16 at 2), that construing the All Writs Act to authorize a decryption order “would fly right in the face of long standing Constitutional protections”
Further, although non-frivolous arguments against issuance of decryption orders under the All Writs Act in general and/or of the decryption order specifically requested in this сase may exist, as this Order shows, no “long standing Constitutional protections” (1:18CR492-1, Docket Entry 16 at 4) bar such use of the All Writs Act generally or render its specific application to Burns an affront to “the very foundation of our adversarial legal system” (
CONCLUSION
The All Writs Act authorizes entry of an order requiring Burns to decrypt the Device to effectuate and/or to avoid frustration of the Warrant. The “forgone conclusion” doctrine defeats Burns‘s assertion of a Fifth Amendment privilege against entry of (and compliance with) such a decryption order.
IT IS THEREFORE ORDERED that the Application (1:18MJ307, Docket Entry 3) is GRANTED, in that, on or before May 28, 2019, Burns shall assist the United States in the execution of the Warrant (1:18MJ307, Docket Entry 2), as follows: the United States shall make the Device (or a forensic image thereof) available to Burns, who shall produce the Device (or forensic image thereof) in a fully unlocked and unencrypted state.
IT IS FURTHER ORDERED that, on or before May 28, 2019, the parties shall file a joint notice in case number 1:18CR492-1, setting out their shared or competing positions about the propriety of continued sealing of the Warrant (1:18MJ307, Docket Entry 2), the Application (1:18MJ307, Docket Entry 3), the Response (1:18CR492-1, Docket Entry 16), and the Supplemental Pleading (1:18CR492-1, Docket Entry 18), including (if either party contends that any such document should remain under seal) legal argument and authority justifying that position.
/s/ L. Patrick Auld
L. Patrick Auld
United States Magistrate Judge
May 10, 2019
Notes
- “When asked [during the first interview] what he did with the child pornography files, Burns explained that he downloaded the files to a hard drive and then sorted through them, deleting the files he didn‘t want.” (1:18CR492-1, Docket Entry 12 at 8.);
- “CS White asked Burns [during the first interview] which hard drive he used to save the child pornogrаphy that he downloaded. In response, Burns explained that there were three hard drives connected to his desktop computer. The first contained the computer‘s operating system, the second [i.e., the Device] was the location to which files were downloaded, and the third contained music.” (
Id. at 8-9.); and - “[During the second interview,] Burns unequivocally stated that there was child pornography on the [Device], but declined to provide the password because, as he put it, letting the agents see the files would not be in his best interest.” (
Id. at 10.)
