Wed. Jan 15th, 2025

Fifth-Amendment-Password As a privacy advocate, Darren Chaker found forcing to disclose a password to bypass encryption often violates the Fifth Amendment, since compelling the Defendant to furnish his password would be testimonial, and thus would violate his rights against self-incrimination. There are several counter-forensic methods to protecting information, which the government, corporations, and private people use legitimately. With the evolution of technology, the availability to secure information with military grade encryption often forces police to force a suspect to provide a password.

Darren Chaker excryption
Darren Chaker directs clients to use encryption to keep information secure.

Under the Fifth Amendment, compelled communications that are testimonial and potentially incriminating are precluded by the privilege against self-incrimination. Schmerber v. California, 384 U.S. 757, 761 (1966). When police seek to compel a communication from a suspect in the form of a password, the nature of this compelled action would, independently, violate the Fifth Amendment since compelled communication that furnishes evidence is a violation of the constitution. Further, the act of furnishing a password would be testimonial in nature in violation of the Fifth Amendment, since it would serve to provide evidence of ownership and control of a particular computer seized by the police and could certainly imply knowledge and control of their contents. Encryption technology not only prohibits entry into a computer’s file structure but also provides distractions to mask the nature of the computer as encrypted, such as the appearance of an unlocked and operating computer.

Depictions of a particular computer’s screen does not necessarily create an inference of the Defendant’s ownership, control and use of the machine, because such images may be “prepared information” and not necessarily the computer’s desktop. It is common to ask the Defendant if the computer is his, if it is shared, or if he has exclusive use and control over it to denote dominion and control over its contents. Such questions are to incriminate the Defendant and discard any potential defense that he did not, for example, download illegal files, hack a bank account, or do some other nefarious act.

In several cases, the prosecutor would seek to compel the Defendant to unlock all encrypted devices found on the seized computer.  A presumption it is the Defendant who would admits to having the only password to his computer is common. Compelling the Defendant to unlock whichever computer is “his,” as would require the Defendant to select the particular computer to which he was referring and decrypt the files. To a more sophisticated Defendant, there is no evidence that he holds the passwords to the encrypted partition or hard drive – just that he has knowledge of their encrypted status. In a situation where multiple electronic devices are seized, the act of selecting a specific device of selecting the particular computer requires the use of the Defendant’s knowledge and thought process. Such a compelled extraction goes beyond a mere collection of physical evidence, such as fingerprints, DNA, or even handwriting exemplars. He would be forced to turn over his knowledge to be used against himself at trial. It is the physical expression of his knowledge that makes it constitutionally protected. As such, it is testimonial in nature. “An act is testimonial when the accused is forced to reveal his knowledge of facts relating him to the offense or from having to share his thoughts and beliefs with the government.” United States v. Kirschner, 823 F.Supp.2d 665 (E.D. Mich. 2010) (quoting Doe v. United States, 487 U.S. 201, 212 (1987)). Forcing a Defendant to reveal the passwords to the seized computers would communicate “that factual assertion to the government, and thus, is testimonial – it requires Defendant to communicate ‘knowledge, unlike the production of a handwriting sample or a voice exemplar. Id. at 669.

The Defendant has a right to refuse this request under the Fifth Amendment since it is the Defendant’s knowledge which is being tapped by the government. The federal appeals court for the Eleventh Circuit has recently addressed the same issue in United States v. Doe, Nos. 11-12268 & 11-15421, 2012 U.S. App. LEXIS 3894 (11th Cir. Feb. 23, 2012), where the court held that a suspect can refuse to provide the password required to decrypt a hard drive on Fifth Amendment grounds. In that case, the defendant was suspected of child pornography and his encrypted computers and hard drives were seized from his hotel room by the government, who then subpoenaed him to furnish the password to decrypt them. Id. at 6-7. The Eleventh Circuit found that the decryption and production of the contents of these computers and hard drives would have been the equivalent of self-incriminating testimony, even if the files themselves were not testimonial. Id. at 11. The court stated that “an act of production can be testimonial when that act conveys some explicit or implicit statement of fact that certain materials exist, are in the subpoenaed individual’s possession or control, or are authentic.” Id. at 20. The court added that “the touchstone of whether an act of production is testimonial is whether the government compels the *16 individual to use ‘the contents of his own mind’ to explicitly or implicitly communicate some statement of fact.” Id. at 20 (quoting Curcio v. United States, 354 U.S. 118 (1957)).

The Doe opinion acknowledged two exceptions: (1) when the government compelled a physical act that does not require an individual to “make use of the contents of his or her mind” and (2) under the foregone conclusion doctrine, if the government can show with “reasonable particularity” that, at the time it sought *17 to compel the act of production, it already knows of the materials, thereby making any testimonial aspect a “forgone conclusion.” Id. at 21. In Doe, the government could establish neither exception.

Under the first exception in Doe, the court ruled “that the decryption and production would be tantamount to testimony by Doe of his knowledge of the existence and location of potentially incriminating files; of his possession, control, and access to the encrypted portions of the drives; and of his capability to decrypt the drives.” Id. at 22.

Under the second exception in Doe, the foregone conclusion doctrine, the court found that the government did not have any evidence that any incriminating evidence or files existed on the hard drive or even know whether the defendant had access to the encrypted parts of the drives. Id. at 23. The court distinguished United States v. Fricosu, No. 10-CR-00509 (D. Colo. Jan. 23, 2012), where the government knew that the defendant had specific encrypted contents on his computer from conversations recorded with her ex-husband and alleged co-conspirator, and thus had independent knowledge of the contents, location, or existence of the sought-after documents. Doe at 28.

Similarly, in United States v. Hubbell, 530 U.S. 27, 44-45 (2000), the Court held that Hubbell’s act of production was sufficiently testimonial to trigger Fifth Amendment protection since his knowledge of the implicit testimonial facts associated with his act of production was not a foregone conclusion. In doing so, the Court distinguished  Fisher v. United States, 425 U.S. 391 (1976), in which the production of tax records was a foregone conclusion since the government could have obtained the records from a legitimate source wholly independent of the compelled testimony. Specifically, in Fisher the government already knew the documents were in the attorneys’ possession and could independently confirm their existence and authenticity through the accountants who created them. Hubbell, 530 U.S. at 44-45.

Further, Darren Chaker notes in Hubbell, by contrast, the government could not show that it had prior knowledge of either the existence or the whereabouts of the documents ultimately produced by the respondent, nor could the government cure this deficiency through the overbroad argument that a businessman will always process general business and tax records that fall within the broad categories of a subpoena. Id. Thus, in Fisher the act of production was not testimonial because the government had knowledge of each fact that had the potential of being testimonial, whereas in Hubbell there was testimony in the production of the documents since the government had no knowledge of the existence of documents, other than a suspicion that documents likely existed and, if they did exist, that they would fall within the broad categories requested. Id.

Alternative methods of obtaining a password (aka passphrase) would be to implant a keylogger on the computer to record each stroke on the keyboard when the computer is booted, or encrypted partition accessed. Other posts Darren Chaker will focus on counter-measures to such methods, including how to conduct a threat assessment as well as proper policies to prevent access, be it physical or electronic, to the target computer.  The methods are the same or similar to those taught by other security professionals intended to prevent industrial espionage. However, in this day in age, being security conscious should extend to not only the corporate executive, local tax preparer, but down to the little league coach who has a roster of his players’ names, addresses, and birth dates. All information is fair game unless precautions are taken.

By Darren Chaker

For almost two decades Darren Chaker regularly has worked with defense attorneys and high net worth people on a variety of sensitive issues from Los Angeles to Dubai. With a gift of knowledge about the First Amendment and big firm expertise in brief research and writing, Darren Chaker puts his knowledge to use for law firms and non-profit organizations. When it comes to forensics and social media investigations Darren Chaker has advanced training to connect the dots where issues arise related to Twitter, Instagram, Snapchat, or Facebook, Instagram, and similar apps. When the dots need to be disconnected, Darren Chaker has extensive training in counter-forensic methods with an emphasis on network security, secure communications, combined with experience with implementing and deploying policy control, encryption, anonymization, data integrity, policy control features in large scale infrastructures. Additional training in malware analysis, Security Operating system security and hardening (Linux, Windows, Solaris), Firewalls, Intrusion detection systems, hacker, counter-hack methods, encryption, forensics, web application security is also employed for his client base. Since history is written by winners, let me write a bit: In 2005, Darren Chaker invalidated a California criminal statute aimed at suppressing speech. In Chaker v. Crogan, 428 F.3d 1215 C.A.9 (Cal.),2005, Cert. denied, 547 U.S. 1128, 126 S.Ct. 2023, is a case Darren Chaker personally handled and laid the ground work to allow appellate counsel to strike down a statute based on First Amendment rights. Subsequent to winning before the 9th Circuit, the State challenged the decision before the United States Supreme Court. Darren Chaker retained a former US Supreme Court Clerk and head of United States Supreme Court litigation for a major firm, Joshua Rosenkranz. The New York attorney defeated the State's petition to review the Ninth Circuit ruling causing multiple states to rewrite their own flawed statute since they were premised the California statute Darren Chaker struck down. Darren Chaker personally litigated Chaker v. Crogan for 7 of its 10-year lifespan. Darren Chaker’s victory invalidated a statute on First Amendment grounds and overruled the California Supreme Court‘s unanimous decision in People v. Stanistreet, 127 Cal.Rptr.2d 633. Soon after Chaker v. Crogan, it was also used to strike down Nevada's analogous statute forcing the legislature to rewrite the law, but also nullified a similar Washington statute as well. (De La O v. Arnold-Williams, 2006 WL 2781278) and used as the backbone authority in Gibson v. City of Kirkland, 2009 WL 564703, *2+ (W.D.Wash. Mar 03, 2009). The case has been cited hundreds of times and continues to be a leading authority on viewpoint discrimination. In 2010, Darren Chaker prevailed in Nathan Enterprises Corp. v. Chaker, 2010 Cal. App. Unpub. LEXIS 7604, through his counsel Timothy Coates who has prevailed multiple times before the United States Supreme Court. also prevailed for Darren Chaker where the Court of Appeal affirmed an anti-SLAPP ruling where the underlying conduct was found to have been within those protected by his First Amendment rights. In 2012 Darren Chaker prevailed on a First Amendment issue before the Texas Attorney where issued Opinion 2012-06088 where he established the right to obtain the names of peace officers regardless of undercover status. The Texas Attorney General opinion has been used as authority thousands of times by citizens and news agencies to learn more about Texas peace officers. In 2016, Darren Chaker was victorious in US v. Chaker (9th Cir. 2016) 654 F.App'x 891, 892. The ACLU, Electronic Frontier Foundation, First Amendment Coalition, Cato Institute, and the University of Florida reversed a conviction premised on First Amendment rights where blog postings were at issue. In 2017, Darren Chaker prevailed in a RICO lawsuit aimed at suppressing speech filed by San Diego attorney Scott McMillan. In McMillan v. Chaker (S.D.Cal. Sep. 29, 2017, No. 16cv2186-WQH-MDD) 2017 U.S.Dist.LEXIS 163990 the court found by blogging did not constitute extortion as no demand for money to cease blogging was made. The judge found the case to be meritless, stating in part, “The Court concludes that these factual allegations are insufficient to establish that Defendant Darren Chaker obtained something of value from Plaintiffs…. The motion to dismiss the cause of action under 18 U.S.C.§ 1962(c) filed by Defendant Darren Chaker is granted.” In 2020, San Diego attorney Scott McMillan lost a heavily litigated appeal believing the court erred in dismissing his lawsuit against Darren Chaker. Mr. Chaker was represented by former Los Angeles federal judge Stephen Larson. The Ninth Circuit in McMillan v. Chaker (9th Cir. 2020) 791 F.App'x 666, affirmed the dismissal of a RICO lawsuit premised on alleged defamation of Scott McMillan. The court stated in part, “Plaintiffs failed to allege extortionate conduct because there are no allegations that Mr. Chaker obtained property from Plaintiffs that he could “exercise, transfer, or sell. ”See Scheidler, 537 U.S. at 405. Plaintiffs’ claim also fails because there are no allegations to support the “with [Plaintiffs’] consent” element. United Bhd. of Carpenters & Joiners of Am., 770 F.3d at 843.” In sum, Scott McMillan filed a lawsuit in direct conflict with established United States Supreme Court precedent and lost – twice. Also, in 2020, Darren Chaker was sued for defamation by Las Vegas attorney Thomas Michaelides. When Darren Chaker became aware of the lawsuit, he retained Olson, Cannon, Gormley, Angulo & Stoberski to defend him. Darren Chaker found a court order Mr. Michaelides submitted to Google that was reported to LumensDataBase.org. Several inconsistencies were noticed on the court order submitted to Google. Most notably the court docket does not show Mr. Michaelides submitted an order to the court for the judge’s signature. The court docket does not reflect the court ever signed the order Mr. Michaelides submitted to Google. Ultimately, the Nevada court dismissed the lawsuit and sanctioned Mr. Michaelides $51,000 for suing Darren Chaker for conduct within his First Amendment rights and for filing a meritless lawsuit. See forged order and judgment against Thomas Michaelides here. Darren Chaker donates time to post-conviction relief organizations to seal arrests and convictions to increase opportunity for those who were convicted of crimes, conducts research and brief writing on First Amendment issues, and also enjoys promoting non-profit organizations such as the ACLU and various domestic violence shelters through his resources within the entertainment industry, including Jason Statham and Eric Roberts. Darren Chaker also enjoys traveling, being a phenomenal father, and forwarding his education with post graduate degree work.

error: Content is protected !!