{"id":250,"date":"2019-03-12T15:02:17","date_gmt":"2019-03-12T19:02:17","guid":{"rendered":"https:\/\/pbacyber.com\/?p=250"},"modified":"2019-03-12T15:02:17","modified_gmt":"2019-03-12T19:02:17","slug":"massachusetts-high-court-holds-suspect-can-be-compelled-to-unlock-smart-phone","status":"publish","type":"post","link":"https:\/\/pbacyber.com\/index.php\/2019\/03\/12\/massachusetts-high-court-holds-suspect-can-be-compelled-to-unlock-smart-phone\/","title":{"rendered":"Massachusetts High Court Holds Suspect Can Be Compelled to Unlock Smart Phone"},"content":{"rendered":"<p>By Sara Beth A.R. Kohut, <a href=\"https:\/\/www.youngconaway.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Young Conaway Stargatt &amp; Taylor LLP<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The highest court of Massachusetts recently held that a suspect can be compelled to enter his passcode to unlock and decrypt his cell phone where the government showed the suspect\u2019s knowledge of the passcode was a foregone conclusion.<\/p>\n<p>&nbsp;<\/p>\n<p>In <a href=\"https:\/\/www.mass.gov\/files\/documents\/2019\/03\/06\/12564.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Commonwealth v. Jones<\/em>, SJC-12564 (Mass. Mar. 6, 2019)<\/a>, a grand jury indicted Dennis Jones for sex trafficking.\u00a0 During his arrest, the Commonwealth seized a cell phone. Based upon information that the phone included material evidence, the Commonwealth sought a warrant to search the phone. The warrant was issued but the Commonwealth could not execute it because the phone could only be unlocked and decrypted upon entry of a passcode.<\/p>\n<p>&nbsp;<\/p>\n<p>The Superior Court denied the Commonwealth\u2019s motion to compel Jones to unlock the phone on the ground that it would violate Jones\u2019 privilege against self-incrimination under the Fifth Amendment to the U.S. Constitution and Article 12 of the Massachusetts Declaration of Rights.\u00a0 The lower court found that the government failed to prove that Jones\u2019s knowledge of the passcode was a foregone conclusion.<\/p>\n<p>&nbsp;<\/p>\n<p>Upon a renewed motion months later, the lower court again denied the motion, noting that additional evidence raised in the renewed motion had been available at the time the first motion was made and still did not change the conclusion. The government\u2019s evidence came from a woman who called police and accused Jones of stealing her purse. She also then alleged that Jones induced her into working as a prostitute. The woman provided evidence that linked Jones to the cell phone and identified communications she had with Jones via the phone, as well as photos and other evidence on the phone related to prostitution.<\/p>\n<p>&nbsp;<\/p>\n<p>The Massachusetts Supreme Judicial Court reversed and remanded, concluding that the foregone conclusion exception applied, that the Commonwealth met its burden, and the lower court should have considered the additional information raised in the renewed motion to compel entry of the passcode.<\/p>\n<p>&nbsp;<\/p>\n<p>While recognizing the importance of the Fifth Amendment, the court noted that the privilege against self-incrimination did not apply to prohibit testimonial acts that conveyed facts already known to the government such that they are a \u201cforegone conclusion.\u201d Prior precedent in Massachusetts had extended the foregone conclusion to compel production of a password to encrypted computer files. The high court held that a defendant could be compelled to decrypt a device by entering a passcode if the government proved beyond a reasonable doubt that the defendant knows the passcode. The facts-including that the defendant had the phone with him when arrested, subscriber and other information about the phone that corroborated he had control over the phone, and the woman witness\u2019s statements combined with reasonable inferences-were sufficient to meet that standard. Accordingly, the court reversed and remanded the case.<\/p>\n<p>&nbsp;<\/p>\n<p>One justice concurred in the court\u2019s holding, but would have required the government to show with reasonable particularity that it already knew of relevant files on the device, a standard the justice found was met with respect to Jones based on the facts used to conclude he knew the passcode. Because the majority decision did not require such a showing to access files on the phone once unlocked, the concurring justice described the decision as \u201csound[ing] the death knell for a constitutional protection against compelled self-incrimination in the digital age\u201d because it allowed the government to compel access to \u201ca trove of potential incriminating and highly personal data on an electronic device\u201d simply by showing the defendant knows the passcode.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><em><a href=\"https:\/\/www.youngconaway.com\/sara-beth-a-r-kohut\" target=\"_blank\" rel=\"noopener noreferrer\">Sara Beth Kohut<\/a> co-chairs the Cybersecurity, Privacy, and Data Protection group at Young Conaway in Wilmington, Delaware. Her practice focuses on advising legal representatives for future claimants in connection with asbestos mass tort insolvency matters and settlement trusts. She also advises clients on strategies for protecting information assets and complying with obligations governing the privacy and security of sensitive data. <\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Sara Beth A.R. Kohut, Young Conaway Stargatt &amp; Taylor LLP &nbsp; The highest court of Massachusetts recently held that a suspect can be compelled to enter his passcode to unlock and decrypt his cell phone where the government showed the suspect\u2019s knowledge of the passcode was a foregone conclusion. &nbsp; In Commonwealth v. Jones, <br \/><a class=\"read-more-button\" href=\"https:\/\/pbacyber.com\/index.php\/2019\/03\/12\/massachusetts-high-court-holds-suspect-can-be-compelled-to-unlock-smart-phone\/\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[31,29],"tags":[],"_links":{"self":[{"href":"https:\/\/pbacyber.com\/index.php\/wp-json\/wp\/v2\/posts\/250"}],"collection":[{"href":"https:\/\/pbacyber.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pbacyber.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pbacyber.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pbacyber.com\/index.php\/wp-json\/wp\/v2\/comments?post=250"}],"version-history":[{"count":1,"href":"https:\/\/pbacyber.com\/index.php\/wp-json\/wp\/v2\/posts\/250\/revisions"}],"predecessor-version":[{"id":251,"href":"https:\/\/pbacyber.com\/index.php\/wp-json\/wp\/v2\/posts\/250\/revisions\/251"}],"wp:attachment":[{"href":"https:\/\/pbacyber.com\/index.php\/wp-json\/wp\/v2\/media?parent=250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pbacyber.com\/index.php\/wp-json\/wp\/v2\/categories?post=250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pbacyber.com\/index.php\/wp-json\/wp\/v2\/tags?post=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}