Crime in the Suites: An Analyis of Current Issues in White Collar Defense
Archive for the ‘Fifth Amendment’ Category
Jan 17

Alexa: Play Confession

It sits in your house, passively recording everything you say.  It knows what you like.  It knows what you listen to.  It knows what you buy.  It knows who’s in the room with you.  And now, it might tell the police all about it.

“It” is the Amazon Echo, a revolution in the “internet of things.”  The Echo is a smart speaker that connects directly to Amazon’s cloud-based personal assistant service, Alexa.  It can play music; give you the traffic, weather, and news; handle your shopping; put things on your calendar; play games; and even respond appropriately to a wide array of cultural references, all in response to voice commands.  If you have the right add-ons, Alexa can even control your entire home, dimming your lights, adjusting the thermostat, and locking the doors.

It does this by passively listening for a given activation phrase—the default is “Alexa.”  Generally, Alexa does not record anything else (although it may store up to sixty seconds at a time in a buffer).  Once it hears its name, Alexa will begin recording and will send what follows to Amazon for processing—both to respond to a given request, and to store to improve responsiveness later.  On one hand, this means that Amazon is not actually recording everything you say, but only those specific commands directed to Alexa.  On the other hand, it means that Alexa is always listening.

This became relevant in a recent murder case in Bentonville Arkansas, in which police obtained a warrant for recordings from Amazon of commands given to the suspect’s Echo.  It is far from clear what police hope to gain from these recordings; they have a large amount of traditional evidence and, unless the murderer specifically asked Alexa for help, the recordings are unlikely to be incriminating.  Nevertheless, an attempt by police to seek recordings from a device that is virtually always listening to us in our homes is extremely disturbing.

These efforts are made even more concerning by recent court rulings on cell phone location data.  According to two federal appellate courts, because cell phones send this information to a third party (that is, to cell phone and app providers), it is not considered sufficiently private for protection from searches and seizures.  That means that police can access this data—which often allows an individual to be physically tracked from moment-to-moment—without even requesting a warrant.

If this principle is upheld by the Supreme Court (which, so far, has refused to consider the issue), it would mean that police could access daily recordings from the privacy of your own home on little more than a hunch and an informal request.  Though many may say they have nothing to hide, I doubt most of us would be comfortable knowing a police officer was looking over our shoulder twenty-four hours a day.

There is one barrier to that terrifying outcome, which is that Amazon has refused to comply with the Bentonville warrant and officers there have decided not to press the issue.  Like Apple, Amazon has taken it upon itself to protect its customers’ privacy.  But a private company cannot be expected to be the defender of its customers’ civil rights forever.

But until the law catches up to the state of technology, every one of our devices is capable of being turned into an informant against us.  And though Alexa can do a lot, it has yet to learn how to invoke its Fifth Amendment right to remain silent. Until it does, you might want to think twice before inviting Alexa–and potentially the police–into your home.

Jul 08

The Right to Remain Silent Does Not Extend to Computer/Phone Passwords

Recently the Massachusetts Supreme Judicial Court ruled that under certain circumstances, a court may compel a criminal defendant to provide the password to encrypted digital evidence without violating the defendant’s constitutional rights. This is an increasingly prevalent issue that has divided courts across the country and may be presented to the United States Supreme Court for review soon.

Leon Gelfgatt was indicted in 2010 for allegedly operating a mortgage fraud scheme that fraudulently collected more than $13 million. During the investigation, Massachusetts state troopers seized four computers, all of which were protected by encryption software that Gelfgatt refused to remove. Lawyers for the Commonwealth of Massachusetts filed a motion in Superior Court asking the court to compel Gelfgatt to enter the password for his encryption software so that law enforcement could review the contents. The Superior Court denied the motion, stating that the Commonwealth was asking for the defendant’s assistance in accessing potentially incriminating evidence.

In a 5-2 ruling, the Massachusetts Supreme Court reversed the lower court ruling and held that police could compel Gelfgatt to decrypt his files, because he told investigators that the computer belonged to him and he had the encryption key. The majority opinion reasoned that Gelfgatt’s disclosure to investigators that he had the password to access the encrypted materials was sufficient to satisfy the “foregone conclusion” exception to the Fifth Amendment protection against self-incrimination. The court did not specify if Gelfgatt would have been compelled to decrypt the computers if he did not tell law enforcement that he owned the computers and had the ability to decrypt them, which may limit the reach of this opinion.

In a strong dissenting opinion, two justices found compelling a criminal defendant to decrypt the files is the functional equivalent to forced self-incrimination.

After the decision, one of Gelfgatt’s lawyers indicated that they planned to appeal the decision to the U.S. Supreme Court, which has not yet considered the issue that has divided jurisdictions across the country.  In 2012, the U.S. Court of Appeals for the Eleventh Circuit held that a man under criminal investigation could not be compelled to decrypt his computer hard drives for the government without a showing by the government of specific knowledge about the contents of the hard drive, an opinion referred to by the dissenting opinion in this case.

In a time when law enforcement is increasingly relying on digital evidence in building cases against criminal defendants, issues regarding encryption and password protected materials will continue to arise.  We hope the Supreme Court will grant an appeal and clarify that law enforcement cannot compel criminal defendants to decrypt files without violating the Fifth Amendment right against self-incrimination.

Mar 18

‘Taking the Fifth’ Before Congress: A New Ethics Twist

It’s unethical for a prosecutor to put a witness on the stand in a criminal trial when he or she knows in advance that the witness is going to take the Fifth Amendment and refuse to testify at all.

Legal ethics authorities reason that the only effect of that kind of testimony is not to bring out relevant evidence but simply to prejudice the jury against the witness. After all, the jury would conclude, if the witness didn’t have something to hide, why did he or she take the Fifth? It’s a violation of the witness’s constitutional rights to permit that kind of inference to be made by a jury.

What about testimony before a congressional committee? Can a lawyer for a committee haul a witness before the panel, knowing that the witness will claim the Fifth Amendment?

In Washington, D.C., where congressional probes often go on at the same time as parallel criminal prosecutions, that can be a key question.

The Legal Ethics Committee of the D.C. Bar has issued an opinion that opens the door considerably wider than before for congressional staff lawyers to do this.

In an opinion issued in January, the committee wrote that an earlier opinion on the subject that it wrote in 1977 should be interpreted in a limited manner. At that time, it wrote that it is improper to call a witness to a congressional hearing “when it is known in advance that no information will be obtained and the sole effect of the summons will be to pillory the witness.”

The new opinion makes it clear that “there may be legitimate reasons for a congressional committee to summon a witness who expresses an intention to assert her privilege against self-incrimination.” Thus, the bar committee found that the Rules of Professional Conduct are violated only if “there is no substantial purpose in calling a witness other than embarrassment, burden, or delay.”

There’s no blanket rule that this type of testimony is prohibited; it is unethical, the committee wrote, only when summoning the witness “will provide no information to the committee and (2) is intended merely to degrade a witness.”

Since a congressional committee lawyer can almost always think of some reason to call a witness other than embarrassment, burden, or delay, the new opinion makes it significantly more likely that congressional panels will try to take this step. We suggest that defense lawyers need to be aware of this tactic. If it won’t necessarily convict their client in court, it can go a long way towards convicting the client in the court of public opinion.

Nov 30

Is the Second Circuit Ready to Recognize a Limited Fifth Amendment Privilege for One Person Corporations?

On Monday, November 30, 2009, oral argument will be held in the United States Court of Appeals for the Second Circuit before Justices Raggi, McLaughlin, and Walker in the matter of In re: Grand Jury Subpoena  Account Services v. U.S. Attorney’s Office, No.: 09-3561-cv.  This matter is being heard on appeal from the United States District Court for the District of New York [hereinafter “District Court”].  The question before the Second Circuit is whether the Fifth Amendment protection against self-incrimination applies in the context of a one-man corporation, where the sole employee, officer, and shareholder of a corporation is being compelled by subpoena to produce corporate documents and testify regarding same. 

This issue was addressed, but left unanswered, in a footnote in the Supreme Court case of Braswell v. United States, 487 U.S. 99 (1988). There, the Court held that, because a collective entity does not enjoy Fifth Amendment protections, an individual officer acting in a representative capacity for the collective entity can be compelled to produce business records, even if those records incriminate him.  In footnote 11 of its opinion, however, the Court reserved judgment on the issue of whether the rationale supporting compelling a custodian to produce corporate records extends to a situation where the custodian is able to establish, by showing that he is the sole employee and officer of the corporation, that the jury would inevitably conclude that he produced the records. 

Judge Swain, writing on behalf of the District Court, described the holding in Braswell as a “broadly stated categorical rule” that “[a] custodian may not resist a subpoena for corporate records on Fifth Amendment grounds.”  The District Court further opined that “it makes little sense to read footnote eleven as calling into question the scope of a rule expressed categorically and supported by detailed analysis several times within the very same opinion.”  Thus, although acknowledging Braswell’s footnote eleven, the District Court did not recognize a potential exception to what it described as the “broad,” general rule. 

Monday’s hearing will determine whether the Second Circuit will find that the Supreme Court expressly carved out an exception to the “broadly stated categorical rule” and whether it will extend Fifth Amendment protections to a sole employee acting in a representative capacity on behalf of a one-man corporation—a situation where there is no real distinction between the individual and the corporation itself.

posted in:
Fifth Amendment
Connect with Us Share

About Ifrah Law

Crime in the Suites is authored by the Ifrah Law Firm, a Washington DC-based law firm specializing in the defense of government investigations and litigation. Our client base spans many regulated industries, particularly e-business, e-commerce, government contracts, gaming and healthcare.

Ifrah Law focuses on federal criminal defense, government contract defense and procurement, health care, and financial services litigation and fraud defense. Further, the firm's E-Commerce attorneys and internet marketing attorneys are leaders in internet advertising, data privacy, online fraud and abuse law, iGaming law.

The commentary and cases included in this blog are contributed by founding partner Jeff Ifrah, partners Michelle Cohen and George Calhoun, counsels Jeff Hamlin and Drew Barnholtz, and associates Rachel Hirsch, Nicole Kardell, Steven Eichorn, David Yellin, and Jessica Feil. These posts are edited by Jeff Ifrah. We look forward to hearing your thoughts and comments!

Visit the Ifrah Law Firm website