Red Dog

Federal criminal defense, blitzes and otherwise, in the Sixth Circuit and beyond.

To subscribe to this blog by e-mail, enter your e-mail address in the box below.
Showing posts with label Subpoenas. Show all posts
Showing posts with label Subpoenas. Show all posts

Wednesday, March 28, 2012

Proffers and Info in PSRs

United States v. Merlo, No. 10-2003 (6th Cir. Mar. 23, 2012) (unpublished).

Panel of Judges Merritt, Boggs, and Clay.

Just a quick note on this unpublished case that addresses the use of proffer info at sentencing.

Tax-fraud case.  Defendant argued on appeal that the government violated the plea agreement by using information he provided while cooperating against him at sentencing and for calculating restitution.  The COA affirmed. 

Plain-error review. 

The information the dist ct considered at sentencing was not new information the D had provided.  It was info the D had had to provide in answer to a grand-jury subpoena.  So dist ct did not err in considering it.  Also, it was not clear that the info was used to determine the GL range, the D's sentence within the range, or the extent of the the departure.

Regardless of the info at issue, there was ample evidence against the D.     

Monday, March 5, 2012

More Tech News: Searching Cell Phones

United States v. Flores-Lopez, No. 10-3803 (7th Cir. Feb. 29, 2012) (for publication).

Judges Bauer, Posner, and Rovner.

Seventh Circuit affirms district court's finding that cell-phone call history was admissible despite the fact that this history was obtained b/c the police searched the phone, without a warrant, to obtain the phone's number. 

This opinion is worth a read, especially on the heels of Jones and the GPS issue (see Jan. 25 post).

(I barely remember when phones looked like this one!)


A quick summary:

* Opening a diary found on a suspect whom the police have arrested, to verify the suspect's name and address and to discover whether the diary contains information relevant to the crime for which the suspect has been arrested, is permissible.  The cell-phone search is similar and "even less intrusive, since a cell phone’s phone number can be found without searching the phone’s contents."  
* This search did not touch on the use of an iCam to view the home of the owner of the seized cell phone.

* Other conspirators were involved in the drug distribution and they conceivably could have learned of the arrests (they could have been monitoring the drug deal from afar) and they could have wiped the cell phone remotely before the government could obtain and execute a warrant and conduct a search pursuant to the warrant to find the cell phone’s number.

* It is conceivable that the defendant might have had time to warn co-conspirators before the cell phone was taken from him, allowing time to wipe the phone.  While "conceivably” does not mean “probably,” the set off against the modest benefit to police of being able to obtain the cell phone’s phone number immediately comes at "only a modest cost in invasion of privacy."

* Armed with the phone number, the officers could obtain the call history at their leisure.  And if the number was lawfully obtained, subpoenaing the call history from the phone company would also be lawful.  A history thus obtained could properly be used in evidence against a defendant.

* It is "imperative" that officers have the authority to search or retrieve immediately, incident to a valid arrest, information from pagers in order to prevent destruction of evidence.  Same holds here.

* The court could "certainly imagine justifications for a more extensive search."  But the court leaves these questions for another day, as police here only obtained the phone’s number.

Monday, February 27, 2012

Really Exciting News from the 11th Cir. re Encrypted Files



In Re: Grand Jury Subpoena Duces Tecum Dated March 25, 2011: United States v. Doe, Nos. 11-12268 & 11-15421 (11th Cir. Feb. 23, 2012) (published).

Panel of Judges Tjoflat, Martin, and Hill.

CP case. 

Appeal of a civil contempt order.  D got subpoena to appear before grand jury and produce unencrypted contents of hard drives.  D told US Attorney that he would invoke his Fifth Amendment privilege against self-incrimination and refuse to comply with the subpoena.  US Attorney asked the district court for an order granting D immunity and requiring him to respond to the subpoena. 

The immunity would extend only to D's production of the unencrypted contents---not the gov's derivative use of the contents.  The district court issued the order.  D appeared before the grand jury and refused to decrypt the hard drives.  D invoked his Fifth Amendment rights (D was w/o counsel at these times).  D also claimed he could not decrypt the material.  The district court adjudged the D in contempt and incarcerated him. 

Authorities had gotten the hard drives after investigating CP allegations and tracing them back to the D and a hotel room in California.  Law enforcement got a warrant and seized all digital media and a number of encryption devices/codes to access the media.  Forensic examiners, however, were unable to view some of the material, which led to the proceedings at issue. 

D feared that his decryption of the materials would show he, and not another person, had placed the materials on the digital media and encrypted the materials. 

Conclusions:
* D's decryption and production of the hard drives' contents would trigger Fifth Amendment protection b/c it would be testimonial; such protection would extend to the gov's use of the materials. 
* Material that is a link in the chain that leads to incriminating evidence is enough to invoke the Fifth Amendment. 
* The files themselves are not testimonial.  But the actual contents of the drives were not the issue.  The issue was the act of production when that production explicitly or implicitly conveyed a statement of fact. 
* "Foregone conclusion" doctrine: the existence and location of papers are foregone conclusions, so the possessor of the documents adds little by conceding that he/she has the papers.  Not testimony then---just surrender---so no constitutional rights involved.  This doctrine does not apply when the gov does not know of the existence of documents beyond suspicion
* Test: "whether the government compels the individual to use 'the contents of his own mind' to explicitly or implicitly communicate some statement of fact." 
* An act of production is not testimonial if 1) the gov merely compels some physical act (no use of the mind), or 2) if the "foregone conclusion" doctrine applies b/c the gov "can show with 'reasonable particularity' that, at the time it sought to compel the act of production, it already knew of the materials." 
* Ct held that the act of decryption and production of the contents of the hard drives would implicate the Fifth Amendment.  The act would be testimonial---not merely physical and the factual communications associated with the decryption/production were not foregone conclusions. 
* Decryption requires use of the mind: tantamount to testimony that D knew of the materials, possessed/accessed them, and could decrypt them. 
* No "foregone conclusion" here b/c gov could not show it knew whether any files actually existed or the location of such files.  Gov could not even show it knew D could access the encrypted portions of the drives. 
* Encryption alone does not mean a person is trying to hide something. 
* Immunity granted here insufficient.  "Use and derivative-use immunity establishes the critical threshold to overcome an individual's invocation of the Fifth Amendment privilege against self-incrimination."  Gov did not give such immunity here.  So D could not be compelled to decrypt the drives. 
* D "properly invoked the Fifth Amendment privilege."  His refusal to decrypt the hard drives w/o sufficient immunity was justified.  District ct erred in adjudging him in civil contempt.  Dist ct's judgment reversed.