In re Boucher
{{Infobox United States District Court case
| name = In re Boucher
| court = United States District Court for the District of Vermont
| image =
| imagesize =
| caption =
| full name = In re Grand Jury Subpoena to Sebastien Boucher
| date decided = Feb 19, 2009
| citations = {{cite court |litigants=In re Grand Jury Subpoena to Sebastien Boucher |vol= |reporter= |opinion=No. 2:06-mj-91, 2009 WL 424718 |pinpoint= |court=D. Vt. |date=Feb 19, 2009 |url=http://federalevidence.com/pdf/2009/03-March/InreBoucherI.pdf |quote= |archive-url=https://web.archive.org/web/20150917031047/http://federalevidence.com/pdf/2009/03-March/InreBoucherI.pdf |url-status=dead }}
| transcripts =
| judge = William K. Sessions III
| prior actions = {{cite court |litigants=Motion to quash subpoena granted |vol= |reporter= |opinion=WL 4246473 |pinpoint= |court=D. Vt. |date=2007 |url=http://www.volokh.com/files/Boucher.pdf |quote=}}
| subsequent actions =
| holding = * Boucher's motion to quash the subpoena was denied. He was ordered to provide an unencrypted version of the hard drive in question.
- The Government's appeal of the magistrate judge's opinion and order is sustained.
| keywords = encryption, self-incrimination
}}
In re Boucher (case citation: No. 2:06-mJ-91, 2009 WL 424718) is a federal criminal case in Vermont, which was the first to directly address the question of whether investigators can compel a suspect to reveal their encryption passphrase or password, despite the U.S. Constitution's Fifth Amendment protection against self-incrimination. A magistrate judge held that producing the passphrase would constitute self-incrimination. In its submission on appeal to the District Court, the Government stated that it does not seek the password for the encrypted hard drive, but only sought to force Boucher to produce the contents of his encrypted hard drive in an unencrypted format by opening the drive before the grand jury. A District Court judge agreed with the government, holding that, given Boucher's initial cooperation in showing some of the content of his computer to border agents, producing the complete contents would not constitute self-incrimination.
In late 2009, Boucher finally gave up his password and investigators found numerous images and videos depicting sexual abuse of children. In January 2010, Boucher was sentenced to 3 years in prison and deported.{{cite news |url=http://www.cbc.ca/news/canada/montreal/quebec-man-sentenced-in-u-s-child-porn-case-1.904930|title=Quebec man sentenced in U.S. child porn case|date=January 22, 2010 |work=Canadian Broadcasting Corporation|accessdate=October 4, 2019}}
Facts
On 17 December 2006, the laptop computer of defendant Sebastien D. Boucher (born in 1977){{cite news| url=https://www.washingtonpost.com/wp-dyn/content/article/2008/01/15/AR2008011503663.html | newspaper=The Washington Post | first=Ellen | last=Nakashima | title=In Child Porn Case, a Digital Dilemma | date=January 16, 2008}}http://www.katzjustice.com/boucherdocket.pdf{{Dead link|date=November 2019 |bot=InternetArchiveBot |fix-attempted=yes }} was inspected when he crossed the border from Canada into the United States at Derby Line, Vermont. The laptop was powered-up when the border was crossed, which allowed its contents to be browsed. Images containing child pornography were allegedly seen by Immigration and Customs Enforcement (ICE) border agents who seized the laptop, questioned Boucher and then arrested him on a complaint
charging him with transportation of child pornography in violation of 18 U.S.C. 2252A(a)(1). The laptop was subsequently powered-down. When the laptop was switched on and booted on 29 December 2006, it was not possible to access its entire storage capability. This was because the laptop had been protected by PGP Disk encryption.{{cite web |url=http://federalevidence.com/pdf/2009/03-March/InreBoucherI.pdf |title=In Re Boucher |first=Jerome J. |last=Niedermeier |accessdate=August 29, 2009 |archive-date=September 17, 2015 |archive-url=https://web.archive.org/web/20150917031047/http://federalevidence.com/pdf/2009/03-March/InreBoucherI.pdf |url-status=dead }} As a result, investigators working for the US government were unable to view the contents of drive "Z:", which allegedly contained the illegal content. A grand jury then subpoenaed the defendant to provide the password to the encryption key protecting the data.
Decision of the United States District Court
On November 29, 2007, U.S. Magistrate Judge Jerome Niedermeier of the United States District Court for the District of Vermont stated "Compelling Boucher to enter the password forces him to produce evidence that could be used to incriminate him." Accordingly, Niedermeier quashed the subpoena.
On January 2, 2008, the United States appealed the magistrate's opinion to the District Court in a sealed motion (court docket, case #: 2:06-mJ-00091-wks-jjn-1).{{cite news |url=http://www.iht.com/articles/2008/01/07/america/legal.php |title=U.S. courts consider legality of laptop inspections |publisher=International Herald Tribune |first=Adam |last=Liptak |date=January 7, 2008 |accessdate=August 29, 2009}} The appeal was heard by U.S. District Judge William K. Sessions.{{cite news |url=http://news.cnet.com/8301-13578_3-9854034-38.html |title=Feds appeal loss in PGP compelled-passphrase case |publisher=The Iconoclast |access-date=2009-08-29 |archive-date=2012-01-06 |archive-url=https://web.archive.org/web/20120106000337/http://news.cnet.com/8301-13578_3-9854034-38.html |url-status=dead }} Oral arguments were scheduled for April 30, 2008.{{cite web |url=https://ecf.vtd.uscourts.gov/doc1/1851300930 |title=CM/ECF Filer or PACER Login}}
On February 19, 2009, Judge Sessions reversed the magistrate's ruling and directed Boucher "to provide an unencrypted version of the Z drive viewed by the ICE agent."
{{blockquote|Boucher accessed the Z drive of his laptop at the ICE agent's request. The ICE agent viewed the contents of some of the Z drive's files, and ascertained that they may consist of images or videos of child pornography. The Government thus knows of the existence and location of the Z drive and its files. Again providing access to the unencrypted Z drive 'adds little or nothing to the sum total of the Government's information about the existence and location of files that may contain incriminating information. Fisher, 425 U.S. at 411.
Boucher's act of producing an unencrypted version of the Z drive likewise is not necessary to authenticate it. He has already admitted to possession of the computer, and provided the Government with access to the Z drive. The Government has submitted that it can link Boucher with the files on his computer without making use of his production of an unencrypted version of the Z drive, and that it will not use his act of production as evidence of authentication.{{cite web|url=http://volokh.com/files/BoucherDCT.1.pdf |title=In re Grand Jury Subpoena to Sebastien Boucher, Memorandum of Decision |date=February 19, 2009 |work=The Volokh Conspiracy |accessdate=2009-08-29}}}}
See also
{{Portal|Law}}
- In re
- Key disclosure law
- United States v. Hubbell, {{ussc|530|27|2000}} {{Cite web |url=http://federalevidence.com/pdf/2000/US_v._Hubbell.pdf |title=Archived copy |access-date=2012-01-29 |archive-date=2012-10-06 |archive-url=https://web.archive.org/web/20121006200724/http://federalevidence.com/pdf/2000/US_v._Hubbell.pdf |url-status=dead }}
- United States v. Arnold[https://www.eff.org/cases/us-v-arnold Electronic Frontier Foundation: U.S. v. Arnold]
- United States v. Fricosu{{Cite web |url=http://federalevidence.com/pdf/Comput/Fricosu.Ord.1-23-12.pdf |title=U.S. v. Fricosu |access-date=2012-01-29 |archive-date=2013-04-13 |archive-url=https://web.archive.org/web/20130413003244/http://federalevidence.com/pdf/Comput/Fricosu.Ord.1-23-12.pdf |url-status=dead }}
{{Clear}}
References
{{reflist}}
Further reading
- {{cite journal |last=Casey |first=Eoghan |author2=Stellatos, Gerasimos J. |year=2008 |title=The impact of full disk encryption on digital forensics |journal=Operating Systems Review |volume=42 |issue=3 |pages=93–98 |doi=10.1145/1368506.1368519 |s2cid=5793873 }}
- {{ cite journal | last = Clemens | first = Aaron M. | year = 2004 | title = No Computer Exception to the Constitution: The Fifth Amendment Protects Against Compelled Production of an Encrypted Document or Private Key | journal = Journal of Law and Technology | volume = 8 | issue = 1 | url = http://www.lawtechjournal.com/articles/2004/02_040413_clemens.php }}
- {{cite news |first=John |last=Curran |title=Encrypted laptop poses 5th Amendment dilemma |url=https://www.usatoday.com/tech/news/techpolicy/2008-02-07-encrypted-laptop-child-porn_N.htm |work=USA Today |date=2008-02-07 }}
- {{cite news |first=Ellen |last=Nakashima |title=In Child Porn Case, a Digital Dilemma: U.S. Seeks to Force Suspect to Reveal Password to Computer Files |url=https://www.washingtonpost.com/wp-dyn/content/article/2008/01/15/AR2008011503663.html?nav=hcmodule |newspaper=Washington Post |date=January 16, 2008 }}
- {{cite journal |last=Sergienko |first=Greg S. |year=1996 |title=Self Incrimination and Cryptographic Keys |journal=Richmond Journal of Law and Technology |volume=2 |page=1 |url=http://jolt.richmond.edu/v2i1/sergienko.html }}
External links
- [https://web.archive.org/web/20150915172641/http://federalevidence.com/node/368 Compelling Access To An Encrypted Laptop (Part I)], by Federal Evidence Blog
- [https://web.archive.org/web/20150810023445/http://federalevidence.com/node/1393 Compelling Access To An Encrypted Laptop (Part II)], by Federal Evidence Blog
- [http://news.cnet.com/8301-13578_3-9834495-38.html Judge: Man can't be forced to divulge encryption passphrase], by Declan McCullagh, CNet News
- [http://news.cnet.com/8301-13578_3-9854034-38.html Feds appeal loss in PGP compelled-passphrase case] {{Webarchive|url=https://web.archive.org/web/20120106000337/http://news.cnet.com/8301-13578_3-9854034-38.html |date=2012-01-06 }}, by Declan McCullagh, CNet News
- [https://ecf.vtd.uscourts.gov/doc1/1851273316 Opinion and Order In re: Grand Jury Subpoena], Nov. 29, 2007, Case No. 2:06-mJ-91, document 35. PACER account registration required, but there is no charge for viewing this document.
- [http://privacylaw.proskauer.com/2008/10/articles/international/uk-court-parts-with-us-court-regarding-compelled-disclosure-of-encryption-keys/ UK Court Parts with US Court Regarding Compelled Disclosure of Encryption Keys]
Category:Cryptography case law
Category:United States Fifth Amendment self-incrimination case law