September 27, 2022

Volume XII, Number 270

Advertisement

September 26, 2022

Subscribe to Latest Legal News and Analysis
Advertisement

Massachusetts High Court Permits Compelled Decryption of Seized Digital Evidence

Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to encrypted digital evidence seized by the government without violating either the Fifth Amendment or Article Twelve of the Massachusetts Declaration of Rights.  This is an interesting development in an emerging issue in the law that has yet to percolate its way to the United States Supreme Court. Moreover, as critical case evidence continues its migration from the physical to the digital realm, it is an issue we can expect to encounter with growing frequency, and is all but certain to eventually require resolution by the Supreme Court.

The Massachusetts high court’s decision hinged on the so-called “foregone conclusion” exception to the Fifth Amendment privilege against self-incrimination, which provides that an “act of production” is not testimonial “where the facts conveyed already are known to the government, such that the individual ‘adds little or nothing to the sum total of the Government’s information.’” Because the defendant, during his postarrest interview, had admitted his ownership and control over the seized computers, his knowledge of their encrypted files, and his knowledge of the password, the Court concluded that compelling him to provide that password “is only telling the government what it already knows.” Providing the password under such circumstances therefore was held not to violate the defendant’s privilege against self-incrimination under either the federal or state constitutions.

In a forceful dissent, two Justices disagreed with the Court’s opinion, stating that the compelled decryption was tantamount to forced self-incrimination.  Describing the potential sweep of the Court’s decision, the dissent stated as follows: “The court holds today that the defendant … may be ordered to enter decryption keys sequentially on each and every electronic device seized from his home, his home office, and his automobile, in order to provide law enforcement officers with unencrypted access to those devices.”

The true scope of the Court’s holding, however, may not become clear until trial courts begin applying it under various factual scenarios, and those applications are tested in the appeals courts. For now, all that is clear is that under certain circumstances, even industrial-strength encryption may not place digital files beyond the government’s reach.

©1994-2022 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. All Rights Reserved.National Law Review, Volume IV, Number 176
Advertisement
Advertisement
Advertisement
Advertisement

About this Author

Matthew D. Levitt, Litigation Attorney, Mintz Levin,Securities Litigation White Collar Defense & Government Investigations Appellate Complex Commercial Litigation Health Care Enforcement & Investigations
Member

Matt is a trial-tested litigator who is equally adept at handling sophisticated civil and securities litigation matters and defending clients facing allegations of False Claims Act violations and white collar crime. He shepherds clients through all phases of civil and criminal litigation, starting with pre-case counseling and including discovery, trial, and the appellate process. His practice also encompasses ancillary proceedings, including SEC investigations and corporate internal investigations. Matt represents public and private companies, executives, and other individuals from a...

617-348-1646
Advertisement
Advertisement
Advertisement