<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[iPhone - Law Office of W.F. ''Casey'' Ebsary Jr]]></title>
        <atom:link href="https://www.centrallaw.com/blog/categories/iphone/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.centrallaw.com/blog/categories/iphone/</link>
        <description><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr's Website]]></description>
        <lastBuildDate>Fri, 11 Apr 2025 23:27:11 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Search Warrant Cell Phone | Florida Attorney]]></title>
                <link>https://www.centrallaw.com/blog/search-warrant-i-phone-cell-phone-florida-attorney/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/search-warrant-i-phone-cell-phone-florida-attorney/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Fri, 21 Mar 2025 15:15:08 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[Criminal Defense]]></category>
                
                    <category><![CDATA[iPhone]]></category>
                
                    <category><![CDATA[Phone Search Warrant]]></category>
                
                    <category><![CDATA[Search Warrant]]></category>
                
                
                    <category><![CDATA[I Phone]]></category>
                
                
                
                    <media:thumbnail url="https://centrallaw-com.justia.site/wp-content/uploads/sites/411/2023/11/5a_IPhoneSearchWarrant.jpg" />
                
                <description><![CDATA[<p>Search Warrant Cell Phone: Protecting Your Rights in Florida | W.F. “Casey” Ebsary Jr. In the digital age, your cell phone holds a vast repository of personal information, making it a prime target for law enforcement. If you’re facing a search warrant cell phone scenario in Florida, understanding your rights is paramount. A search warrant&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<h2 class="wp-block-heading" id="h-search-warrant-cell-phone-protecting-your-rights-in-florida-w-f-casey-ebsary-jr"><strong>Search Warrant Cell Phone: Protecting Your Rights in Florida | W.F. “Casey” Ebsary Jr.</strong></h2>



<p>In the digital age, your cell phone holds a vast repository of personal information, making it a prime target for law enforcement. If you’re facing a <strong>search warrant cell phone</strong> scenario in Florida, understanding your rights is paramount. A <strong>search warrant cell phone</strong> specifically authorizes law enforcement to extract data from your device, potentially revealing private communications, location data, and sensitive personal files. Navigating the legal complexities surrounding <strong>search warrant cell phone</strong> procedures requires the expertise of a seasoned Florida attorney. W.F. “Casey” Ebsary Jr., with his deep understanding of both technology and criminal defense, can provide the critical legal guidance necessary to protect your privacy and challenge unlawful searches. When a <strong>search warrant cell phone</strong> is executed, the implications can be far-reaching, demanding immediate and strategic legal intervention.</p>



<h3 class="wp-block-heading" id="h-navigating-the-complexities-of-cell-phone-search-warrants-in-florida"><strong>Navigating the Complexities of Cell Phone Search Warrants in Florida</strong></h3>



<p>W.F. “Casey” Ebsary, Jr., a Tampa-based attorney with a specialized focus on the intersection of technology and criminal defense, brings to light the critical legal intricacies surrounding cell phone search warrants. The case of the Apple iPhone 4G prototype, while originating outside Florida, serves as a stark reminder of the pervasive role cell phones play in contemporary criminal investigations. In Florida, as across the nation, law enforcement increasingly relies on data extracted from smartphones to build cases. This necessitates a thorough understanding of the Fourth Amendment of the U.S. Constitution, which protects against unreasonable searches and seizures, and its application to digital devices.</p>



<h3 class="wp-block-heading" id="h-the-legal-framework-and-your-rights"><strong>The Legal Framework and Your Rights</strong></h3>



<p>A search warrant for a cell phone must adhere to strict legal standards. According to the Fourth Amendment, a warrant must be supported by probable cause, particularly describing the place to be searched and the persons or things to be seized. In Florida, this translates to specific requirements for warrants targeting digital devices. Florida Statute 933.02 outlines the grounds for issuance of search warrants, emphasizing the need for particularity. The legal landscape is further shaped by landmark cases like <em>Riley v. California</em>, where the U.S. Supreme Court recognized the unique privacy concerns associated with cell phones, requiring a warrant for most searches.</p>



<h4 class="wp-block-heading" id="h-key-legal-considerations"><strong>Key Legal Considerations:</strong></h4>



<ul class="wp-block-list">
<li><strong>Probable Cause:</strong> The warrant must be based on a showing of probable cause, meaning there must be sufficient evidence to believe a crime has been committed and that the cell phone contains evidence of that crime.</li>



<li><strong>Particularity:</strong> The warrant must specifically describe the data to be searched. A general warrant authorizing a broad search of all data on the phone is likely unconstitutional.</li>



<li><strong>Exigent Circumstances:</strong> In rare cases, law enforcement may be able to search a cell phone without a warrant if there are exigent circumstances, such as an immediate threat to public safety. However, these exceptions are narrowly construed.</li>



<li><strong>Suppression of Evidence:</strong> If a search warrant is deemed unlawful, any evidence obtained as a result of the search may be suppressed and excluded from trial.</li>
</ul>



<h2 class="wp-block-heading" id="h-case-study-the-apple-iphone-4g-prototype"><strong>Case Study: The Apple iPhone 4G Prototype</strong></h2>



<p>The case involving the Apple iPhone 4G prototype illustrates the potential scope of a cell phone search warrant. The warrant authorized the search of Jason Chen’s residence and the seizure of various electronic devices, including an iPhone, MacBooks, and hard drives. This case highlights the importance of:</p>



<ul class="wp-block-list">
<li>Careful review of the warrant and affidavit.</li>



<li>Challenging the scope of the search.</li>



<li>Protecting against overbroad seizures of electronic data.</li>
</ul>



<h3 class="wp-block-heading" id="h-penalties-and-legal-repercussions"><strong>Penalties and Legal Repercussions</strong></h3>



<p>The penalties associated with crimes involving cell phone data can be severe. In Florida, charges can range from misdemeanor offenses, such as unlawful access to electronic devices, to felony charges, such as theft of trade secrets or identity theft.</p>



<h2 class="wp-block-heading" id="h-potential-cell-phone-crimes-penalties"><strong>Potential Cell Phone Crimes Penalties:</strong></h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><th>Offense</th><th>Florida Statute</th><th>Potential Penalties</th></tr><tr><td>Unlawful Access to Electronic Devices</td><td><a href="https://law.justia.com/codes/florida/title-xlvi/chapter-815/section-815-06/">Florida Statute 815.06</a></td><td>Misdemeanor or Felony, depending on the extent of the offense.</td></tr><tr><td>Theft of Trade Secrets</td><td><a href="https://law.justia.com/codes/florida/title-xlvi/chapter-812/section-812-081/">Florida Statute 812.081</a></td><td>Third-degree felony, punishable by up to 5 years in prison and a $5,000 fine.</td></tr><tr><td>Identity Theft</td><td><a href="https://law.justia.com/codes/florida/title-xlvi/chapter-817/part-i/section-817-568/">Florida Statute 817.568</a></td><td>Third-degree felony to first-degree felony, depending on the financial loss, with penalties ranging from 5 to 30 years in prison and fines up to $10,000.</td></tr><tr><td>Possession of Child Pornography</td><td><a href="https://law.justia.com/codes/florida/title-xlvi/chapter-827/section-827-071/#:~:text=(2)%20A%20person%20is%20guilty,such%20child%20in%20a%20sexual">Florida Statute 827.071</a></td><td>3rd degree felony to 1st degree felony depending on the number of images.</td></tr></tbody></table></figure>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading" id="h-protecting-your-digital-privacy-a-call-to-action"><strong>Protecting Your Digital Privacy: A Call to Action</strong></h2>



<p>If you are facing a search warrant for your cell phone in Florida, it is essential to act quickly. Contact W.F. “Casey” Ebsary Jr. immediately to protect your rights and ensure your privacy is safeguarded.</p>



<h3 class="wp-block-heading" id="h-call-to-action"><strong>Call to Action:</strong></h3>



<ul class="wp-block-list">
<li><strong>Call <a href="/lawyers/w-f-casey-ebsary-jr/">W.F. “Casey” Ebsary Jr. </a>at 813-222-2220 <a class="gv-tel-link" title="Call +1 813-222-2220 via Google Voice" href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noopener"></a><a href="http://voice.google.com/calls?a=nc,%2B18132222220" target="_blank" rel="noreferrer noopener"></a>for immediate legal assistance.</strong></li>



<li><strong>Visit our website at <a href="https://www.centrallaw.com/" target="_blank" rel="noreferrer noopener">https://www.centrallaw.com/</a> for more information.</strong></li>



<li><strong>Contact us via our contact page: <a href="https://www.centrallaw.com/contact-us/" target="_blank" rel="noreferrer noopener">https://www.centrallaw.com/contact-us/</a></strong></li>
</ul>



<h3 class="wp-block-heading" id="h-contact-us"><strong>Contact Us:</strong></h3>



<p>The contact page for The Law Office of W.F. “Casey” Ebsary Jr. is designed to be user friendly and efficient. You can easily submit a message, or call the office directly. By using this page, you can get the help you need, and get the process started quickly.</p>



<h2 class="wp-block-heading" id="h-important-considerations-in-cell-phone-cases"><strong>Important Considerations in Cell Phone Cases</strong></h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><th>Consideration</th><th>Description</th></tr><tr><td>Digital Forensics</td><td>The analysis of digital devices to recover, analyze, and preserve digital evidence. Vital for both prosecution and defense.</td></tr><tr><td>Data Preservation</td><td>Steps taken to ensure that digital evidence is not altered or destroyed. Crucial for maintaining the integrity of evidence.</td></tr><tr><td>Privacy Rights</td><td>The legal protections afforded to individuals regarding their personal information stored on digital devices.</td></tr><tr><td>Federal Law</td><td>Federal laws such as the stored communications act, and the computer fraud and abuse act, can also become relevant in cell phone search cases.</td></tr></tbody></table></figure>



<h2 class="wp-block-heading" id="h-frequently-asked-cell-phone-leagal-questions-q-amp-a"><strong>Frequently Asked Cell Phone Leagal Questions (Q&A):</strong></h2>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="559" src="/static/2025/04/FAQ-1024x559.png" alt="FAQ" class="wp-image-3771" srcset="/static/2025/04/FAQ-1024x559.png 1024w, /static/2025/04/FAQ-300x164.png 300w, /static/2025/04/FAQ-768x419.png 768w, /static/2025/04/FAQ.png 1408w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">FAQ</figcaption></figure>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1744394837319"><strong class="schema-faq-question"><strong>What should I do if law enforcement presents a search warrant for my cell phone?</strong></strong> <p class="schema-faq-answer">Remain calm and polite. Do not resist the search, but do not consent to any searches beyond the scope of the warrant. Immediately contact an attorney.</p> </div> <div class="schema-faq-section" id="faq-question-1744406744777"><strong class="schema-faq-question"><strong>Can law enforcement search my cell phone without a warrant?</strong></strong> <p class="schema-faq-answer">Generally, no. However, there are limited exceptions, such as exigent circumstances.</p> </div> <div class="schema-faq-section" id="faq-question-1744406769757"><strong class="schema-faq-question"><strong>What is probable cause?</strong></strong> <p class="schema-faq-answer">Probable cause is a reasonable belief, supported by facts, that a crime has been committed and that evidence of the crime is located on the cell phone.</p> </div> <div class="schema-faq-section" id="faq-question-1744406785131"><strong class="schema-faq-question"><strong>How can I challenge a search warrant?</strong></strong> <p class="schema-faq-answer">An attorney can review the warrant and affidavit for legal deficiencies and file a motion to suppress any illegally obtained evidence.</p> </div> <div class="schema-faq-section" id="faq-question-1744406808463"><strong class="schema-faq-question"><strong>What types of data can law enforcement obtain from my cell phone?</strong></strong> <p class="schema-faq-answer">Law enforcement can potentially obtain text messages, emails, photos, videos, location data, and call logs.</p> </div> <div class="schema-faq-section" id="faq-question-1744406819309"><strong class="schema-faq-question"><strong>What is the importance of digital forensics in these cases?</strong></strong> <p class="schema-faq-answer">Digital forensics is vital for analyzing and preserving digital evidence, and it can be used to challenge the prosecution’s findings.</p> </div> <div class="schema-faq-section" id="faq-question-1744406836796"><strong class="schema-faq-question"><strong>What is the stored communications act?</strong></strong> <p class="schema-faq-answer">The stored communications act is a federal law that restricts the voluntary disclosure of stored electronic communications.</p> </div> <div class="schema-faq-section" id="faq-question-1744406858612"><strong class="schema-faq-question"><strong>What is the Computer Fraud and Abuse Act?</strong></strong> <p class="schema-faq-answer">The Computer Fraud and Abuse Act (CFAA) is a United States federal law that criminalizes unauthorized access to protected computer systems.</p> </div> <div class="schema-faq-section" id="faq-question-1744406870171"><strong class="schema-faq-question"><strong>Can I delete data from my phone before handing it over?</strong></strong> <p class="schema-faq-answer">Deleting data can lead to additional charges, such as obstruction of justice. It is best to consult with an attorney before taking any action.</p> </div> <div class="schema-faq-section" id="faq-question-1744406901231"><strong class="schema-faq-question"><strong>Why is it important to hire an attorney with technology expertise?</strong></strong> <p class="schema-faq-answer">Technology-related cases require a deep understanding of digital evidence and the legal complexities surrounding electronic devices.</p> </div> </div>



<p><strong>Legal Resources:</strong></p>



<ol class="wp-block-list"></ol>



<ul class="wp-block-list">
<li>Fourth Amendment of the U.S. Constitution: <a href="https://constitution.congress.gov/constitution/amendment-4/" target="_blank" rel="noreferrer noopener">https://constitution.congress.gov/constitution/amendment-4/</a></li>



<li>Florida Statute 933.02 (Grounds for issuance of search warrants): <a href="https://www.google.com/search?q=https://law.justia.com/codes/florida/2023/title-xlvii/chapter-933/section-933-02/" target="_blank" rel="noreferrer noopener">https://law.justia.com/codes/florida/2023/title-xlvii/chapter-933/section-933-02/</a></li>



<li>Florida Statute 815.06 (Unlawful Access to Electronic Devices): <a href="https://law.justia.com/codes/florida/2023/title-xlvi/chapter-815/section-815-06/" target="_blank" rel="noreferrer noopener">https://law.justia.com/codes/florida/2023/title-xlvi/chapter-815/section-815-06/</a></li>



<li>Florida Statute 812.081 (Theft of Trade Secrets): <a href="https://www.google.com/search?q=https://law.justia.com/codes/florida/2023/title-xlvi/chapter-812/section-812-081/" target="_blank" rel="noreferrer noopener">https://law.justia.com/codes/florida/2023/title-xlvi/chapter-812/section-812-081/</a></li>



<li>Florida Statute 817.568 (Identity Theft): <a href="https://www.google.com/search?q=https://law.justia.com/codes/florida/2023/title-xlvi/chapter-817/section-817-568/" target="_blank" rel="noreferrer noopener">https://law.justia.com/codes/florida/2023/title-xlvi/chapter-817/section-817-568/</a></li>



<li>Riley v. California: <a href="https://supreme.justia.com/cases/federal/us/573/373/" target="_blank" rel="noreferrer noopener">https://supreme.justia.com/cases/federal/us/573/373/</a></li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity" />



<h2 class="wp-block-heading" id="h-original-post-begins-here-search-warrant-for-a-cell-phone">Original Post Begins Here: Search Warrant for a Cell Phone</h2>



<p>W.F. “Casey” Ebsary, Jr., a Tampa attorney with expertise in both technology and criminal defense, took a close look at an intriguing search warrant involving an iPhone, pursued by Apple. This warrant serves as a reminder that cell phones, texts, and emails are often central to law enforcement’s investigations in technology cases. See for yourself what the warrant authorized and what was seized.</p>



<p><strong>Tampa Technology Lawyer</strong>&nbsp;and&nbsp;<strong>Criminal Defense Expert</strong>, W.F. ”Casey” Ebsary, Jr. in&nbsp;<strong>Florida&nbsp;</strong>has spent time reviewing a rather interesting&nbsp;<strong>Search Warrant</strong>&nbsp;for a&nbsp;<strong>cellular telephone</strong>. Specifically, an&nbsp;<strong>iPhone&nbsp;</strong>that Apple Computer Corporation wanted to retrieve. Take a look at &nbsp;<strong>warrant&nbsp;</strong>and what was seized for yourself: Cell phones, text messages, and email are a&nbsp;frequent&nbsp;target of state and federal law enforcement when investigating technology cases.</p>



<p><strong>iPhone Search Warrant</strong></p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="155" height="200" src="/static/2023/11/5a_IPhoneSearchWarrant.jpg" alt="IPhone Search Warrant" class="wp-image-243" title="Search Warrant | I Phone | Cell Phone | Florida Attorney" /><figcaption class="wp-element-caption">Cell Phone Search Warrant</figcaption></figure></div>


<p>Search warrant and affidavit related to the theft and sale of an Apple iPhone 4G prototype in 2010.</p>



<div data-wp-interactive="core/file" id="IPhone-Inventory" class="wp-block-file"><object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="/static/2010/07/Pages-from-iphone_affidavitCompressed-2.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of Pages from iphone_affidavitCompressed-2."></object><a id="wp-block-file--media-665a34f8-ecef-4202-a22a-f746a8d07b00" href="/static/2010/07/Pages-from-iphone_affidavitCompressed-2.pdf">Pages from iphone_affidavitCompressed-2</a><a href="/static/2010/07/Pages-from-iphone_affidavitCompressed-2.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-665a34f8-ecef-4202-a22a-f746a8d07b00">Download</a></div>



<p>Here’s a summary of the key points:</p>



<ul class="wp-block-list">
<li><strong>Incident:</strong>&nbsp;An Apple employee, Robert “Gray” Powell, lost an unreleased iPhone 4G prototype at a restaurant. Brian Hogan found the phone and subsequently sold it to Jason Chen. Chen then provided the prototype to the website Gizmodo.com, which published images and details of the device.</li>



<li><strong>Investigation:</strong>&nbsp;Detective Matthew Broad of the San Mateo County Sheriff’s Office conducted the investigation. The affidavit details the events leading to the search warrant, including interviews with Apple representatives, witnesses, and the individuals involved.</li>



<li><strong>Search Warrant:</strong>&nbsp;The document includes a request for an ex-parte order to seal documents, the return to the search warrant, and the actual search warrant. It authorizes the search of Jason Chen’s residence at 40726 Greystone Terrace, Fremont, CA, for evidence related to the purchase, copying, and publishing of the iPhone prototype.</li>



<li><strong>Items Seized:</strong>&nbsp;The search warrant inventory lists numerous electronic devices and documents seized from Chen’s residence, including various Apple MacBooks, hard drives, digital cameras, and an iPhone.</li>



<li><strong>Charges:</strong>&nbsp;The affidavit mentions potential charges against Jason Chen, including buying or receiving stolen property, theft of trade secrets, and maliciously damaging property.</li>



<li><strong>Appendices:</strong>&nbsp;The document includes appendices detailing the location to be searched (Chen’s residence) and the specific property to be seized, such as computer systems, digital storage devices, records, data, and personal property that could establish identity and control over the premises.</li>
</ul>



<p><strong>Search Warrant for a Cell Phone? Tell Your Story Toll Free (813) 222-2220.</strong></p>
]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Can the Police Force You to Give up the Password to Your Phone?]]></title>
                <link>https://www.centrallaw.com/blog/police-password-phone-warrant/</link>
                <guid isPermaLink="true">https://www.centrallaw.com/blog/police-password-phone-warrant/</guid>
                <dc:creator><![CDATA[Law Office of W.F. ''Casey'' Ebsary Jr]]></dc:creator>
                <pubDate>Thu, 15 Dec 2016 16:32:16 GMT</pubDate>
                
                    <category><![CDATA[Computers]]></category>
                
                    <category><![CDATA[iPhone]]></category>
                
                    <category><![CDATA[Password]]></category>
                
                    <category><![CDATA[Search Warrant]]></category>
                
                
                    <category><![CDATA[Cell Phone]]></category>
                
                
                
                <description><![CDATA[<p>“we are not inclined to believe that the Fifth Amendment should provide greater protection to individuals who passcode protect their iPhones “ A court in Florida just ruled that a defendant could be forced to provide the password to his iPhone. A distinction is important – they got a search warrant. Without a warrant, the&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" src="/static/2023/12/image-3.jpeg" alt="Phone" class="wp-image-2473" style="width:500px;height:500px" width="500" height="500" srcset="/static/2023/12/image-3.jpeg 500w, /static/2023/12/image-3-300x300.jpeg 300w, /static/2023/12/image-3-150x150.jpeg 150w" sizes="auto, (max-width: 500px) 100vw, 500px" /><figcaption class="wp-element-caption">Can Police Force You to Give Up iPhone Password?</figcaption></figure></div>


<p class="has-text-align-right"><strong>“we are not inclined to believe that the Fifth Amendment should provide greater protection to individuals who passcode protect their iPhones “</strong></p>



<p>A court in Florida just ruled that a defendant could be forced to provide the password to his iPhone. A distinction is important – they got a search warrant. Without a warrant, the case may have been decided in favor of protecting the phone owner’s privacy. The phone had a cracked screen and had been allegedly used to take photographs that would have been useful in the prosecution of the phone’s owner. You can review a typical<a href="/blog/search-warrant-i-phone-cell-phone-florida-attorney/"> iPhone Search Warrant</a> here. At the bottom of this article are numerous other articles we have written on this topic.</p>



<h2 class="wp-block-heading" id="h-right-to-remain-silent">Right to Remain Silent</h2>



<p>Usually, we think that we have a right not to incriminate ourselves. However, this Florida Court in the Tampa Bay area ruled that providing the password did not constitute testimony against one’s self. In a convoluted 19-page ruling the court found that while there may be evidence of a crime, providing the passcode was not testimonial.</p>



<h2 class="wp-block-heading" id="h-here-are-some-excerpts-from-the-iphone-court-s-ruling">Here Are Some Excerpts from the iPhone Court’s Ruling.</h2>



<p>“That an accused may be “forced to surrender a key to a strongbox containing incriminating documents,” but he cannot “be compelled to reveal the combination to his wall safe,” Doe, 487 U.S. at 219 (Stevens, J., dissenting), is another often repeated quote. See, e.g., Hubbell, 530 U.S. at 43; Doe, 487 U.S. at 210 n.9; In re Grand Jury, 670 F.3d at 1345; Kirschner, 823 F. Supp. 2d at 669. Despite the many cases referencing the quote, we have found none that provide details of “surrender[ing] a key.” We question whether identifying the key which will open the strongbox—such that the key is surrendered—is, in fact, distinct from telling an officer the combination. More importantly, we question the continuing viability of any distinction as technology advances. See Fisher, 425 U.S. at 407 (“Several of Boyd[ v. United States, 116 U.S. 616 (1886)]’s express or implicit declarations have not stood the test of time.”). In that respect, we are not inclined to believe that the Fifth Amendment should provide greater protection to individuals who passcode protect their iPhones with letter and number . . . . ”</p>



<p>“In this case, the communication was sought only for its content and the content has no other value or significance.11 By providing the passcode, Stahl would not be acknowledging that the phone contains evidence of video voyeurism. See Doe, 487 U.S. at 215. Moreover, although the passcode would allow the State access to the phone, and therefore to a source of potential evidence, the State has a warrant to search the phone—the source of evidence had already been uncovered. See id. Providing the passcode does not “betray any knowledge [Stahl] may have about the circumstances of the offenses” for which he is charged. See id. at 219 (Stevens, J., dissenting). It does not implicitly “relate a factual assertion or disclose information.””</p>



<p>“The Fifth Amendment privilege against self-incrimination has been held to apply not only to verbal and written communications but also to the production of documents, usually in response to a subpoena or summons, because the act of production itself could communicate incriminatory statements. See Fisher, 425 U.S. at 410. The courts that have addressed the Fifth Amendment implications for providing decryption keys and passcodes have largely applied the act-of-production doctrine and the foregone conclusion exception. See, e.g., Sec. & Exch. Comm’n v. Huang, No. 15-269, 2015 WL 5611644, *1 (E.D. Penn. Sept. 23, 2015); United States v. Fricosu, 841F. Supp. 2d 1232, 1235 (D. Col. 2012); In re Grand Jury Subpoena to Boucher (In re Boucher), 2:06-MJ-91, 2009 WL 424718, *2-3 (D. Vt. Feb. 19, 2009); Gelfgatt, 11 N.E.3d at 612; Commonwealth v. Baust, 89 Va. Cir. 267 (Va. Cir. Ct. 2014). But see United States v. Kirschner, 823 F. Supp. 2d 665, 669 (E.D. Mich. 2010) (concluding that providing the password was testimony protected by the privilege against self-incrimination).”</p>



<p>“Invoking the privilege still requires the accused to establish compulsion, a testimonial communication, and incrimination. And as we have said, in this case compulsion and incrimination are not at issue, leaving only the testimonial element. Testimonial elements of production include (1) the existence of the documents, (2) the accused’s possession or control of the documents, and (3) the authenticity of the documents. Hubbell, 530 U.S. at 36.”</p>



<p>“The difficult question whether a compelled communication is testimonial for purposes of applying the Fifth Amendment often depends on the facts and circumstances of the particular case.” Doe, 487 U.S. at 214-15. Here, the trial court rested its determination that producing the passcode would be testimonial exclusively on the concept that production would require “the use of the contents” of Stahl’s mind. The phrase “the contents of the accused’s mind” has often been repeated in cases discussing the privilege. See, e.g., Hubbell, 530 U.S. at 43; Doe, 487 U.S. at 211; In re Grand Jury, 670 F.3d at 1345; Kirschner, 823 F. Supp. 2d at 669. And although the trial court correctly quoted the Eleventh Circuit’s statement in In re Grand Jury, that “[t]he touchstone of whether an act of production is testimonial is whether the government compels the individual to use ‘the contents of his own mind’ to explicitly or implicitly communicate some statement of fact,” 670 F.3d at 1345, the trial court did not consider the law as stated in Hubbell and Doe—that the contents of the accused’s mind must be “extensive[ly] use[d]” in creating the response, Hubbell, 530 U.S. at 43, or must “relat[e] him to the offense,” Doe, 487 U.S. at 2013.10 That is, “it is not enough that the compelled communication is sought for its content. The content itself must have testimonial significance.” Doe, 487 U.S. at 211 n.10 (emphasis added) (first citing Fisher, 425 U.S. at 408; then citing Gilbert v. California, 388 U.S. 263, 267 (1967); and then citing United States v. Wade, 388 U.S. 218, 222 (1967)). ”</p>



<p>“Although the phrase “the use of the contents of the accused’s mind” has been used in act-of-production cases, we note that the case cited by the Eleventh Circuit for its proposition that the use of the contents of the accused’s mind is the touchstone of whether an act of production is testimonial does not so hold. Curcio v. United States, 354 U.S. 118 (1957), provides that there “is a great difference” between compelled production of documents and compelled testimony, specifying that testifying as to the location of documents “requires him to disclose the contents of his own mind.” Id. at 127-28. ”</p>



<p>Source: STATE OF FLORIDAv AARON STAHL Case No. 2D14-4283 Opinion filed December 7, 2016.</p>
]]></content:encoded>
            </item>
        
    </channel>
</rss>