-
Filed 6/1/21 CERTIFIED FOR PUBLICATION IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA FIRST APPELLATE DISTRICT DIVISION FOUR THE PEOPLE, Plaintiff and Respondent, A157205 v. ERIC CURTIS LUND, (Solano County Super. Ct. No. FCR310878) Defendant and Appellant. A jury convicted Eric Lund of one count of possession of more than 600 images of child pornography, at least 10 of which involved a prepubescent minor or a minor under 12 years old, in violation of Penal Code section 311.11, subdivision (c)(1). The trial court sentenced Lund to five years in prison. Lund contends the trial court committed four errors. First, he argues the trial court should have excluded some of the data produced by a computer program because the data was case- specific, testimonial hearsay under People v. Sanchez (2016)
63 Cal.4th 665(Sanchez). Second, he argues the prosecution failed to establish that the computer program was reliable and generally accepted in the scientific community under People v. Kelly (1976)
17 Cal.3d 24(Kelly) and Sargon Enterprises, Inc. v. University of Southern California (2012)
55 Cal.4th 747(Sargon). Third, Lund urges that his conviction should be reversed because the prosecutor committed repeated, pervasive misconduct. 1 Finally, he argues that the trial court abused its discretion under Evidence Code section 352 in allowing the prosecution to play for the jury a number of child pornography videos. We reject each of these arguments and therefore affirm the judgment. I. BACKGROUND A. Peer-to-peer networks Peer-to-peer networks allow sharing of files, including child pornography, over the internet. To access each different peer-to- peer network, users must download and install software that uses the programming protocol specific for that network. eDonkey is one example of a peer-to-peer network commonly used to share and download child pornography. eMule is a program people commonly use to get onto the eDonkey network. When a user installs peer-to-peer networking software, the software randomly generates a globally unique identifier (GUID), which is used to specifically identify the instance of the software being used. The software also designates a five-digit port number, which is necessary for the software to communicate with the network. When a user sends out a search query, the request goes to one or more other “peer” computers in the network, which in turn propagate the request to other peers, and so on. This process exponentially increases the number of computers effectively receiving the search request. Each peer receiving the query will respond to the original user with a list of files matching the query that the peer has available for download. Despite the exponential spread of a search query, a user’s query will not typically reach all other peers on the peer-to-peer 2 network and a user will not see every file from every computer on the network matching the query. When a computer connects to a peer-to-peer network, it will automatically start receiving queries from other users and returning a list of files that the computer has available. Peer-to-peer networks use hash values to identify each file being shared. A hash value is like a DNA signature for a digital file; it is statistically unique and never changes, so it provides a way to authenticate that two digital files are identical, even if the names are different. B. CPS Software In August 2014, Vacaville police detective Jeffrey Datzman was investigating child pornography cases over peer-to-peer networks. One of the tools Datzman used was privately- developed software called the Child Protection System (CPS). CPS is the web interface for viewing results from a suite of several software tools that each search for child pornography on a specific peer-to-peer network.1 It is used around the world in 84 countries by over 10,000 users, all of whom are law enforcement personnel. The CPS software suite automates the process of searching peer to peer networks. Previously, law enforcement officers would have to manually input keyword search terms to discover computers that were hosting suspected child pornography and then further investigate those GUIDs. By contrast, CPS sends 1 Some of the CPS components include Peer Spectre, Nordic Mule, Gnew Watch, and GT Logger. For simplicity, we use CPS to refer both to the web interface and the underlying tools. 3 out search terms continuously. CPS also compares the files listed in response to the keyword searches against CPS’s database of hash values, which contains the hash values of files that law enforcement officers somewhere in the world have previously tagged as being child pornography. If there is a match between the hash values for the files listed in response to the search and the hash values in the CPS database, CPS logs the details of the event in a CPS database for police officers to follow up on later. CPS logs the filenames and hash numbers of the suspected child pornography files being offered; the GUIDs, IP addresses, port number, and, in most cases, software used to offer the files; and the dates and times CPS detected the GUID with the files. Police officers obtain records from internet service providers to determine the physical location of the computer associated with the GUIDs, IP addresses, and port numbers logged by CPS. A match between the hash number of a particular file being offered and a hash number in CPS’s database suggests the file is likely child pornography. However, because child pornography laws can differ from one jurisdiction to another, CPS users are trained to always view a file personally in order to determine conclusively whether the file constitutes child pornography under applicable law. To assist with this, CPS also helps law enforcement users create their own separate, local databases of hash values called a media library. Where the CPS database contains only hash values and not the child pornography files, law enforcement users’ media libraries contain both the hash values and the corresponding files. Users can use their media 4 libraries when they cannot download a file from the offering computer directly to view it. In such cases, users can compare the hash value of the file being offered to the hash value of a file in the media library and then use the media library file to confirm that the file is child pornography under applicable law. C. Investigation of target GUID When Datzman signed on to CPS in August 2014, he noticed that there was one user, identified by a specific GUID, who possessed several suspected child pornography files. Datzman downloaded a few files from the target GUID and confirmed that the files were in fact child pornography under California law. This GUID moved between different IP addresses but kept returning to a few addresses. This was unique, because GUIDs that moved from one IP address to another usually did not return to any of the IP addresses. After analyzing the target GUID’s behavior, Datzman noticed that the GUID only showed activity overnight on Wednesday, Thursday, Friday, and Saturday nights. Because law enforcement officers often work overnight shifts four nights a week from Wednesday evening through Sunday morning, Datzman suspected that the target GUID user was a security guard, law enforcement officer, or someone else working such a shift. Datzman obtained the physical addresses for the IP addresses the target GUID was using. Because the target GUID was active in the middle of the night when the businesses were closed, Datzman did not consider the owners of any of the IP addresses to be suspects. The most frequently recurring IP 5 address in Vacaville belonged to a business called the Yogurt Beach Shack, which was owned by two former law enforcement officers Datzman knew. Datzman confirmed that the Yogurt Beach Shack’s wireless internet (wifi) router was “open,” meaning it did not require a password, and could be accessed from outside the building. Datzman therefore conducted overnight surveillance at the Yogurt Beach Shack in early October 2014. During the surveillance, Datzman connected to the Yogurt Beach Shack’s router so that he could observe whether any devices connected to the router and see such devices’ “mac ID,” which is a unique specific identifier for a device. On one night, at around 1:00 a.m., Datzman saw a device connect to the router, and he recorded the mac
ID.Datzman then drove around the outside of the building to see who was nearby that could be using the device. Datzman noticed a California Highway Patrol (CHP) vehicle parked near the business. Lund was the sole occupant of the vehicle, seated in the driver’s seat and looking down and to his right at a lighted object. Datzman then contacted Sergeant Jason Johnson in the Vacaville Police Department. Johnson agreed to contact Lund using a ruse to determine his name. The ruse succeeded and Lund told Johnson his name. After Johnson spoke to Lund, Lund drove away, and Datzman noticed that the mac ID of the device that was using the Yogurt Beach Shack router dropped off at the same time. No other devices connected to the router that night. Datzman later checked CPS to see if the target GUID had been detected at the time that Lund was seen at the Yogurt Beach Shack. CPS had no record of it at that IP 6 address at that time, but it detected the GUID at a different router later that night. Datzman contacted the CHP and learned from Lund’s commanding officer that Lund was a sergeant assigned to the Fairfield CHP office, worked alone, and worked a schedule that matched the target GUID’s pattern of activity. Lund lived in Chico, and stayed in a hotel in Vacaville during the days he was working. Every CHP patrol vehicle has a computer with software installed that, when an officer logs into it, logs activity and also activates a global positioning system (GPS) location tracker. However, Lund had not logged into the software between June and October 2014, so there was no GPS data for him. Additionally, the dispatcher had recorded activity for him only three times during that span. This paucity of records was unusual and surprising. It was common knowledge among CHP officers that logging into the vehicle computer would transmit location data. Datzman arranged with the commanding officer to put a GPS tracker on the two patrol cars assigned to CHP sergeants in the Fairfield office. The first night after the GPS trackers were installed, the GPS tracker showed that the car that Lund had been observed driving was stopped for over two hours at a location in Cordelia Park near a house with open wifi. CPS detected the target GUID with child pornography that night at that same location for about two hours. 7 D. Searches of devices in Lund’s desk, car, and locker Pursuant to search warrants, Vacaville police officers then searched Lund’s desk at work and his personal car. Police found a flash drive in the center console of Lund’s car. This flash drive did not contain child pornography. In the trunk of the car were Lund’s CHP uniforms, his citation book, his old cell phone in a box, a USB wifi adaptor, and a tan backpack. Inside the backpack were two long range USB wifi adaptors with a panel antenna that could be used to pick up a wifi signal from greater distances, a laptop, two external hard drives, and three flash drives. One of the USB wifi adaptors had a mac ID identical to the one Datzman recorded from the router at the Yogurt Beach Shack. The cell phone and one of the flash drives from the trunk of the car did not contain child pornography. This flash drive had been connected to a computer in Lund’s home. The other two flash drives contained deleted child pornography videos and pictures that Datzman forensically recovered. The external hard drives together contained over 10,000 files that Datzman suspected to be child pornography, based on their hash values’ matches to the CPS database. Datzman reviewed a sample of 73 videos from the hard drives and confirmed that they were child pornography, with almost all of them containing at least one prepubescent minor. One of the hard drives also contained the same version of eMule that the target GUID used and the software necessary to use the panel antenna. Datzman concluded that one of the hard drives had 8 been used to store child pornography since 2012 because one of the folders on it indicated that eMule had been used with the hard drive since that date. The laptop contained a copy of the eMule software with the same version number, GUID, and port number that CPS had detected. eMule had been used to download over 3,000 complete files whose names suggested they were child pornography. Like the flash drive from his desk and one of the hard drives, the laptop had the software necessary to use the panel wifi antenna. The laptop showed it had connected to the router at the Yogurt Beach Shack and had run eMule on the night Datzman and Johnson observed Lund there, but the program had crashed. The laptop also showed it had connected to the router where the IP address in Cordelia Park was located. The laptop had been used to access email and Facebook accounts, but the lack of activity in those accounts or information available about the named users indicated that the accounts did not belong to real people. The laptop’s last wifi connection was to the network at the Fairfield Inn in Vacaville an hour before Lund’s arrest. This hotel was across the street from the hotel where Lund had a reservation and where his car was seen during the day of his arrest, before he came to the office. With a panel range antenna, the laptop could have accessed the Fairfield Inn’s internet from Lund’s room. The laptop’s user viewed child pornography files throughout that day, and CPS detected the target GUID as being active throughout that day. 9 Lund’s desk, which was known to other officers to be unlockable, contained Lund’s active cell phone and three flash drives. All three flash drives showed they had been used with the computer on Lund’s desk. None of the devices contained pornography, but one flash drive contained a copy of the eMule program and the software for the long range wifi adaptor found in the trunk of Lund’s car. About a week after Vacaville police searched Lund’s desk and personal car, CHP officers searched Lund’s locker at the Fairfield CHP building. They found hotel breakfast cards and a Diskgo flash drive with the first three digits of Lund’s CHP badge number written on it. CHP Officer Ryan Duplissey took the Diskgo flash drive for analysis. In his report, Duplissey originally stated that the flash drive was found connected to Lund’s work computer, but he later corrected his report to reflect that it was found in his locker. Datzman later acquired the drive and performed his own analysis. Both analyses showed the flash drive contained documents associated with Lund as well as 10 child pornography files that had been marked for deletion but could be forensically recovered. CHP officers also searched electronic devices found in Lund’s home but did not find any child pornography on them. E. Procedural history After Lund was arrested and charged, pretrial litigation relating to the constitutionality of the searches stretched over the course of several years and involved two writ petitions to this court. A jury trial in the summer of 2018 resulted in a mistrial. 10 At the second trial in October 2018, the prosecution played for the jury brief portions of some of the child pornography files found on each device that Datzman had confirmed were child pornography. Unlike the first trial, Lund testified in his own defense. He denied ever possessing or downloading child pornography. Lund said he was sitting in the Yogurt Beach Shack parking lot to eat and denied having a laptop in the car or connecting to the internet. He said the CHP computer in his vehicle, which was to the driver’s right, would glow at night. He denied driving the patrol car that was recorded by GPS in Cordelia Park on the same night that CPS detected activity there and said he was in the office the whole night. On cross-examination, however, he admitted that he sent his wife a text that night saying he was going to go out and drive for fresh air. Lund also denied that the electronic devices found in his car, desk, or locker were his. He claimed other officers used his desk when he was not there. Lund testified that he never locked his locker because he had once forgotten the key at home in Chico and been unable to get his uniform, but he admitted on cross-examination this was not general knowledge. He said he kept hotel breakfast cards in his desk, not his locker, so someone at CHP must have moved them into the locker. Lund explained he did not use the CHP computer in the patrol car because he thought it was unsafe. Lund said he instead used his radio to make requests through dispatch. He claimed the records of his radio activity were not obtained from 11 the correct office, and the proper records would have shown more activity. Lund admitted he had been suspended in 1996 for using a screensaver on his work computer that displayed adult pornography. Lund claimed that Datzman planted the evidence against him but had no theory for why. In rebuttal, the prosecution called retired CHP Sergeant Steven Lott, who testified that officers used to tell him they could not reach Lund on the radio during his shifts. Lott also recalled that Lund would leave the office in the middle of the night complaining about the office being too hot or needing to stay awake, but it seemed like an excuse to leave the office. The jury found Lund guilty and the trial court sentenced him to five years in prison. II. DISCUSSION A. Sanchez error Lund first challenges the trial court’s admission of the hash value information from the CPS database. He contends William Wiltse’s and Officer Datzman’s testimony about the CPS hash values corresponding to suspected child pornography files was inadmissible hearsay because the hash value database consists of out of court statements made by unidentified officers across the country and around the world.2 He further argues the admission of this testimony violated his Sixth Amendment right to confront and cross-examine the witnesses against him. 2 Wiltse oversees the development of the CPS software, and has himself written certain components of the software. 12 Relevant legal principles and standard of review “[A] hearsay statement is one in which a person makes a factual assertion out of court and the proponent seeks to rely on the statement to prove that assertion is true. Hearsay is generally inadmissible unless it falls under an exception.” (Sanchez, supra, 63 Cal.4th at p. 674.) “Documents like letters, reports, and memoranda are often hearsay because they are prepared by a person outside the courtroom and are usually offered to prove the truth of the information they contain.” (Id. at pp. 674.) However, “ ‘[o]nly people can make hearsay statements; machines cannot.’ ” (Id. at p. 690, fn. 16.) The use of hearsay potentially conflicts with defendants’ rights under the Sixth Amendment to the U.S. Constitution to confront witnesses against them. (Sanchez, supra, 63 Cal.4th at pp. 679–680.) As the California Supreme Court summarized, “In light of our hearsay rules and Crawford [v. Washington (2004)
541 U.S. 36(Crawford)], a court addressing the admissibility of out-of-court statements must engage in a two-step analysis. The first step is a traditional hearsay inquiry: Is the statement one made out of court; is it offered to prove the truth of the facts it asserts; and does it fall under a hearsay exception? If a hearsay statement is being offered by the prosecution in a criminal case, and the Crawford limitations of unavailability, as well as cross- examination or forfeiture, are not satisfied, a second analytical step is required. Admission of such a statement violates the right to confrontation if the statement is testimonial hearsay, as the high court defines that term.” (Id. at p. 680, italics omitted.) 13 Sanchez applied both steps of this inquiry to expert testimony. (Sanchez, supra, 63 Cal.4th at pp. 680, 687.) Experts had long been allowed to rely on hearsay when offering their opinions. (Id. at p. 676.) This rule arose because experts frequently acquire general knowledge in their field of expertise from third parties, but the rule was extended to apply to case- specific facts as well. (Id. at pp. 676, 678–679.) Case-specific facts are “those relating to the particular events and participants alleged to have been involved in the case being tried.” (Id. at p. 676.) Courts had recognized the tension between experts’ need to consider extrajudicial matters with defendants’ interest in avoiding the substantive use of unreliable hearsay. (Id. at p. 679.) They had tried to balance these concerns by generally allowing experts to explain the bases for their opinions, even when those bases were general or case-specific hearsay, subject to an instruction that juries should only consider such hearsay as the basis for the expert’s opinion and not for its truth. (Ibid.) Sanchez concluded this was a mistake because a jury cannot avoid considering the truth of case-specific hearsay underlying an expert’s testimony. (Sanchez, supra, 63 Cal.4th at pp. 679, 684.) Sanchez explained, “When an expert is not testifying in the form of a proper hypothetical question and no other evidence of the case-specific facts presented has or will be admitted, there is no denying that such facts are being considered by the expert, and offered to the jury, as true.” (Id. at p. 684.) The court therefore adopted “the following rule: When any expert relates to the jury case-specific out-of-court 14 statements, and treats the content of those statements as true and accurate to support the expert’s opinion, the statements are hearsay. It cannot logically be maintained that the statements are not being admitted for their truth. If the case is one in which a prosecution expert seeks to relate testimonial hearsay, there is a confrontation clause violation unless (1) there is a showing of unavailability and (2) the defendant had a prior opportunity for cross-examination, or forfeited that right by wrongdoing.” (Id. at p. 686, fn. omitted.) Sanchez noted, however, that experts can still “rely on information within their personal knowledge, and they can give an opinion based on a hypothetical including case- specific facts that are properly proven. They may also rely on nontestimonial hearsay properly admitted under a statutory hearsay exception.” (Id. at p. 685.) As to the second step of the hearsay inquiry, Sanchez reviewed several Supreme Court decisions dealing with statements made to police officers and summarized, “Testimonial statements are those made primarily to memorialize facts relating to past criminal activity, which could be used like trial testimony. Nontestimonial statements are those whose primary purpose is to deal with an ongoing emergency or some other purpose unrelated to preserving facts for later use at trial.” (Sanchez, supra, 63 Cal.4th at p. 689.) Sanchez did not address the standard of review for determining whether a statement is case-specific, testimonial hearsay. As the first step of the analysis is a “traditional hearsay inquiry” into whether a statement was made out of court and is 15 offered for its truth, we apply the abuse of discretion standard at this step. (Sanchez, supra, 63 Cal.4th at p. 680.) “A trial court’s decision to admit or exclude evidence is reviewed for abuse of discretion, and it will not be disturbed unless there is a showing that the trial court acted in an arbitrary, capricious, or absurd manner resulting in a miscarriage of justice.” (People v. Wall (2017)
3 Cal.5th 1048, 1069.) By contrast, Sanchez’s second step, concerning whether a statement is testimonial, implicates the constitutional right of confrontation, so we independently review that issue. (People v. Nelson (2010)
190 Cal.App.4th 1453, 1466.) Analysis Lund contends testimony from both Wiltse and Datzman violated Sanchez because both witnesses relied on CPS’s database of hash values corresponding to previously identified child pornography. As to Wiltse, Lund asserts that Wiltse testified that CPS uses its hash value database to search peer-to- peer networks and that officers can determine whether a file offered by a suspect is child pornography, even if they cannot download the file, by comparing the file’s hash value to CPS’s hash value database. Lund also contends that both Wiltse and Datzman testified that CPS showed the target GUID downloaded a file that CPS had tagged as child pornography. As to Datzman, Lund asserts that Datzman opined that the hash value of a file is very important to determining whether the file is child pornography. Lund also cites Datzman’s testimony that he used a computer program to compare the hash values of files on the hard drives found in Lund’s trunk to the CPS hash value 16 database and Datzman’s opinion that the hard drive had been using eMule to obtain child pornography as early as 2012. Lund argues this testimony violates Sanchez because it is case-specific, testimonial hearsay. He contends it is case-specific hearsay because the entirety of the case against him was based on the CPS data and CPS cannot work without the assumption that whoever put a hash value in the CPS database correctly tagged it as child pornography. He argues the CPS hash value data is testimonial because it represents the fruits of previous law enforcement investigations. We conclude the trial court did not abuse its discretion in determining the CPS hash values were not hearsay in this case because they were not admitted for their truth, so we do not reach the question of whether the hash values are testimonial.3 Preliminarily, Lund’s Sanchez arguments regarding the CPS hash values rest on a misinterpretation of the record, stemming from the fact that the CPS software relies on hash values in two separate databases. First, CPS maintains a database of hash values on its own servers, without associated files. It uses this database as part of its searches of peer-to-peer networks. CPS uses keywords to search the peer-to-peer networks, then matches the hash values of the files that are listed in response to those keyword searches against the CPS 3 While we apply the abuse of discretion standard in this case, as explained above, we would reach the same conclusion even if we were to independently review the trial court’s conclusion that the CPS hash values are not hearsay. 17 database of hash values of suspected child pornography. In cases where the hash values match, the software logs the file being offered on the peer to peer network as suspected child pornography and saves the record for law enforcement officials to review later. Second, CPS assists law enforcement officers with maintaining a media library, which is a local database of child pornography files and associated hash values. Police officers use this media library, not the CPS hash value database, to determine whether a file that they cannot download from a suspect is in fact child pornography. The police officer does so by matching the hash value of the suspect’s file to the hash value of a file in the library. Using the copy of the file in the media library, the officer can opine conclusively that the file is child pornography. Wiltse and Datzman explained carefully and repeatedly that the only way to determine whether a file is child pornography is for an officer to personally view a file or have personally viewed an identical copy of the file (meaning a matching hash value) in the past. This is because the police officer who input a hash value in the CPS database could have erred, and because the legal definitions of child pornography differ between jurisdictions. Wiltse testified consistently that the hash value database exists to create criminal leads about suspected but unconfirmed child pornography, not to provide definitive proof that any file is child pornography. Moreover, Datzman’s conclusion that the hard drive had been used to store 18 downloaded child pornography since 2012 was not based on the CPS hash values, but rather on the fact that there were folders indicating that eMule had been used with the hard drive since then. This proper understanding of the record regarding CPS demonstrates why Lund’s Sanchez argument fails at the first step. “ ‘Out-of-court statements that are not offered for their truth are not hearsay under California law [citations], nor do they run afoul of the confrontation clause.’ ” (People v. Bell (2019)
7 Cal.5th 70, 100.) Neither Wiltse nor Datzman relied on the CPS hash values for their truth to opine that any file was child pornography. The prosecution used Wiltse’s and Datzman’s testimony about the hash values only to explain Datzman’s course of conduct in investigating the GUID and Lund. Lund’s defense that Datzman or someone else planted the evidence in his car, desk, and locker made it fair for the prosecution to show that Datzman followed reasonable leads. This is an example of the principle that “ ‘ “ ‘[e]vidence of a declarant’s statement that is offered to prove that the statement imparted certain information to the hearer and that the hearer, believing such information to be true, acted in conformity with that belief . . . is not hearsay, since it is the hearer’s reaction to the statement that is the relevant fact sought to be proved, not the truth of the matter asserted in the statement.’ ” ’ ” (Ibid.) Even if every entry in the CPS hash value database were wrong, such hypothetical errors would not undermine the prosecution’s proof of the elements of the charge against Lund. The prosecution proved the 19 files found on devices associated with Lund were pornography either by showing them to the jury or by having Datzman testify that he personally viewed them and verified that they met the legal description.4 Even if Lund were correct that the CPS hash value data constituted hearsay that was also testimonial, its admission was harmless beyond a reasonable doubt. (See Sanchez, supra, 63 Cal.4th at p. 698 [applying federal standard of harmlessness beyond a reasonable doubt to violation of Confrontation Clause through admission of testimonial hearsay].) At its core, the prosecution proved its case by establishing that the police found child pornography on electronic devices found in Lund’s locker and in the trunk of his car. These devices were found in locations within his control, particularly his car. This evidence is circumstantial but strongly persuasive, especially because Lund 4 The facts of this case are therefore distinguishable from cases like U.S. v. Juhic (8th Cir. 2020)
954 F.3d 1084, 1088–1089, and U.S. v. Bates (11th Cir. 2016)
665 Fed.Appx. 810, 814–815, which held that CPS reports were inadmissible testimonial hearsay. In those cases, it appears the prosecution used the reports’ notation that certain files had been previously identified as child pornography as evidence that files were indeed child pornography. (Juhic, at p. 1089 [CPS reports were “out-of-court statements offered for the truth of the matter asserted: that the videos and images were child pornography”]; Bates, at p. 815 [“The record shows that the government used the reports to demonstrate the steps of [the officer’s] investigation and to prove that the files [the defendant] downloaded were child pornography”].) There is no indication in these decisions that any witnesses identified any files as child pornography after viewing them, like Datzman did here. 20 does not explain how someone would have gained access to his car. Lund notes that the cell phone and the flash drive found in his trunk, which had been connected to a computer in his home, contained no child pornography. He therefore asserts that none of the digital devices containing child pornography could be linked to him. This argument ignores the critical fact of the devices found in the trunk of his car, as well as the flash drive found in his locker. That flash drive, which contained deleted child pornography, could be tied to Lund both by its location and by the presence of Lund’s files on it. It was not common knowledge that Lund’s locker was unlocked. Lund contended the devices were planted, but he offered the jury no reason why Datzman or any of the officers who performed the searches of his car, desk, and locker would have wanted to frame him or had the opportunity to do so. Lund also takes the position that the theory that he used eMule to download child pornography was essential to the prosecution’s case. He observes that the CPS evidence helped refute Lund’s defense that the electronic devices were planted by showing Lund was at the same locations as the devices containing the pornography. While the CPS evidence was not legally essential, it was certainly helpful for rebutting Lund’s defense. But the CPS data that rebutted the defense was the date, time, and IP address information, since these types of data helped establish the connections with Lund’s movements. The GUID, eMule version number, and port also helped connect Lund 21 to the laptop found in his trunk. The CPS hash values were not helpful to this rebuttal. For example, if CPS had logged the target GUID as offering some other type of file, like copyrighted movies or music, the CPS location-related and laptop-related data would have been just as powerful for the prosecution’s effort to undermine Lund’s defense. Lund does not argue CPS’s date, time, IP address, GUID, version number, or port data are hearsay, nor could he, because they were all generated automatically by the CPS software. (Sanchez, supra, 63 Cal.4th at p. 690, fn. 16 [“ ‘Only people can make hearsay statements; machines cannot’ ”].) Lund instead appears to assume that if the CPS hash values were hearsay, the rest of the CPS data would have been excluded. This assumption is unfounded, as the hash values could easily have been omitted from the relevant exhibits and testimony. Lund also maintains the CPS hash value data helped establish that Datzman conducted a thorough investigation, in response to Lund’s attempts to show the investigation was flawed. This is true, but Lund’s attacks on the investigation’s minor flaws were not so strong that the CPS hash value evidence was necessary to refute them, and thus the admission of that evidence—even if erroneous—did not cause prejudice. B. Kelly and Sargon error In his second argument, Lund argues the trial court should have granted his motion in limine to exclude evidence of CPS entirely because the prosecution failed to establish that CPS satisfied the standard for admission of new scientific evidence 22 under Kelly, supra,
17 Cal.3d 24, and because the trial court failed to perform its gatekeeping function under Sargon, supra,
55 Cal.4th 747. He argues the admission of CPS evidence rendered his trial fundamentally unfair in violation of the 14th Amendment and was not harmless under the federal or state standards. Relevant legal principles and standard of review a. Kelly “Kelly was the genesis of a rule, previously called the ‘Kelly/Frye rule,’ [5] that governs the admissibility of evidence derived from new scientific techniques. ‘Under Kelly, the proponent of evidence derived from a new scientific technique must establish that (1) the reliability of the new technique has gained general acceptance in the relevant scientific community, (2) the expert testifying to that effect is qualified to give an opinion on the subject, and (3) the correct scientific procedures were used.’ ” (People v. Jones (2013)
57 Cal.4th 899, 936.) “The purpose of these threshold requirements—commonly referred to as the Kelly test—is to protect against the risk of credulous juries attributing to evidence cloaked in scientific terminology an aura of infallibility.” (People v. Peterson (2020)
10 Cal.5th 409, 444 (Peterson).) “Not every subject of expert testimony needs to satisfy the Kelly test. Courts determining whether Kelly applies must 5“See Frye v. U.S. (D.C.Cir.1923)
293 F. 1013, 1014, superseded by statute as explained in Daubert v. Merrell Dow Pharmaceuticals, Inc. (1993)
509 U.S. 579[(Daubert)].” 23 consider, first, whether the technique at issue is novel, because Kelly ‘ “only applies to that limited class of expert testimony which is based, in whole or part, on a technique, process, or theory which is new to science and, even more so, the law.” ’ [Citation.] Second, courts should consider whether the technique is one whose reliability would be difficult for laypersons to evaluate. A ‘Kelly hearing may be warranted when “the unproven technique or procedure appears in both name and description to provide some definitive truth which the expert need only accurately recognize and relay to the jury.” ’ [Citation.] Conversely, no Kelly hearing is needed when ‘[j]urors are capable of understanding and evaluating’ the reliability of expert testimony based in whole or in part on the novel technique.” (Peterson, supra, 10 Cal.5th at p. 444.) “Appellate courts review de novo the determination that a technique is subject to Kelly.” (People v. Jackson (2016)
1 Cal.5th 269, 316.) b. Sargon Regardless of whether expert evidence relates to a new scientific technique under Kelly, a trial court must ensure that expert testimony has a sufficient basis to merit the jury’s consideration. (Sargon, supra, 55 Cal.4th at p. 770.) “[U]nder Evidence Code sections 801, subdivision (b), and 802, the trial court acts as a gatekeeper to exclude expert opinion testimony that is (1) based on matter of a type on which an expert may not reasonably rely, (2) based on reasons unsupported by the material on which the expert relies, or (3) speculative.” (Id. at 24 pp. 771–772.) “The trial court’s preliminary determination whether the expert opinion is founded on sound logic is not a decision on its persuasiveness. The court must not weigh an opinion’s probative value or substitute its own opinion for the expert’s opinion. Rather, the court must simply determine whether the matter relied on can provide a reasonable basis for the opinion or whether that opinion is based on a leap of logic or conjecture. The court does not resolve scientific controversies. Rather, it conducts a ‘circumscribed inquiry’ to ‘determine whether, as a matter of logic, the studies and other information cited by experts adequately support the conclusion that the expert’s general theory or technique is valid.’ [Citation.] The goal of trial court gatekeeping is simply to exclude ‘clearly invalid and unreliable’ expert opinion. [Citation.] In short, the gatekeeper’s role ‘is to make certain that an expert, whether basing testimony upon professional studies or personal experience, employs in the courtroom the same level of intellectual rigor that characterizes the practice of an expert in the relevant field.’ ” (Id. at p. 772.) “Except to the extent the trial court bases its ruling on a conclusion of law (which we review de novo), we review its ruling excluding or admitting expert testimony for abuse of discretion.” (Sargon, supra, 55 Cal.4th at p. 773.) Analysis a. Kelly Lund argues the trial court should have excluded all evidence regarding CPS under Kelly because CPS is an unproven, 25 largely untested, and inherently unreliable computer program. He contends it had the appearance of reliability but there was no evidence that CPS was widely accepted or that CPS followed the correct procedures. Lund’s argument bypasses the threshold Kelly question of whether the testimony about CPS is part of “ ‘ “that limited class of expert testimony which is based, in whole or part, on a technique, process, or theory which is new to science and, even more so, the law,” ’ ” whether it “ ‘appears in both name and description to provide some definitive truth which the expert need only accurately recognize and relay to the jury,’ ” and whether jurors “ ‘are capable of understanding and evaluating’ the reliability of expert testimony based in whole or in part” on CPS. (Peterson, supra, 10 Cal.5th at p. 444.) Instead, he simply assumes both that CPS itself is a scientific process or technique, rather than a program using such a technique, and that it was novel. These assumptions are misplaced. CPS is not a technique or process; it is a program that deploys a technique or executes a process. (Cf. People v. Nolan (2002)
95 Cal.App.4th 1210, 1215 [“a Kelly/Frye hearing is not required for new devices; it applies to new methodologies”]; People v. Lazarus (2015)
238 Cal.App.4th 734, 782–786 [distinguishing between new DNA test kit and the existing technique it used].) And the technique or process that CPS uses is not novel, nor is it so persuasive that it threatens to beguile a jury with misleading scientific certainty. Before CPS, a police investigator investigating peer-to-peer networks had to manually enter search terms in a software 26 program, record the results, and follow up on leads by obtaining records from internet service providers to connect IP addresses to physical locations. The only novelty in CPS lies in its approach of automating the pre-existing search process. Instead of officers needing to perform manual searches during working hours and noting the pertinent information regarding any leads, CPS runs searches around the clock and has the computer log the relevant details regarding leads. (U.S. v. Thomas (2d Cir. 2015)
788 F.3d 345, 348 [describing CPS’s operation].) CPS’s process or technique, then, is simply to perform the same searches that law enforcement officers used to do, but in larger volume and at all times of the day, and record the results for later perusal. CPS’s ability to generate a larger volume of search results over a longer period of time undoubtedly makes it a useful, time- saving device. It also unlocks the possibility of using the search results for different purposes, such as the prosecution’s approach here of using CPS results to map the behavior and location of the target GUID over time. But CPS’s results themselves do not purport to offer any more scientific or technical certainty regarding the data they contain than the manual searches CPS replaced. Computers are now commonplace, so the general public can be expected to be generally familiar with the notions that software can repeatedly perform simple tasks that previously would have taken extensive human labor to complete in the same quantity and that the resulting quantity of data can be analyzed and used in different ways that were not possible before. We do not see how CPS’s addition of automation to the routine police 27 work of finding and recording evidence is so mysterious or seemingly authoritative that it would be difficult for laypersons to understand or evaluate it. As a federal district court remarked when considering the admissibility of evidence from software like CPS, “Computer programming is not a scientific theory or technique, it is not new or novel, and it does not implicate the [c]ourt’s responsibility to keep ‘junk science’ out of the courtroom. Any doubts about whether [the software] operates in the manner that [its creator] represents go to the weight, and not the admissibility, of his testimony.” (United States v. Blouin (W.D. Wash., Aug. 15, 2017, No. CR16-307 TSZ)
2017 WL 3485736, *7.)6 The prosecution’s use of CPS can be analogized to the computerized fingerprint matching program challenged in People v. Farnam (2002)
28 Cal.4th 107. In that case, the police had used a computerized database for fingerprint matching to produce a list of candidates, including the defendant, whose fingerprints resembled those at the crime scene. (Id. at p. 159.) Fingerprint analysts then compared the defendant’s fingerprint to a fingerprint found at the crime scene and concluded they matched. (Ibid.) The California Supreme Court held that the evidence regarding the computerized fingerprint matching program did not implicate Kelly. (Id. at p. 160.) The expert who 6 Though the federal Daubert standard for admission of scientific evidence differs somewhat from the Kelly standard, appellate decisions affirming the admission of scientific evidence under that standard are relevant to the Kelly analysis. (People v. Venegas (1998)
18 Cal.4th 47, 88 [relying in part on state court decisions using the Daubert standard]; People v. Buell (2017)
16 Cal.App.5th 682, 690–691 [same].) 28 relied on the database never claimed that the database positively identified the defendant’s print. (Ibid.) The jurors could determine the reliability of the database by comparing the defendant’s fingerprint to that found at the crime scene. (Ibid.) And no opinion regarding the fingerprint identification was based on the computer results. (Ibid.) The mere use of the computer system to narrow the range of potential candidates was insignificant because the prosecution relied on the long- established method of expert fingerprint comparison to show the defendant’s prints matched. (Ibid.) People v. Johnson (2006)
139 Cal.App.4th 1135followed People v. Farnam in the context of a DNA database. There, a lab technician obtained a DNA profile obtained from analysis of a sexual assault examination kit taken from the victim. (Johnson, at p. 1143.) The technician submitted the sample to a computerized DNA database and found a match to the defendant. (Ibid.) A blood sample was then taken from the defendant, and the technician matched the DNA profiles of the rape kit sample and the defendant’s sample. (Ibid.) The court affirmed the admission of this DNA evidence, in part because the DNA analysis techniques at issue had been generally accepted for some time. (Id. at p. 1149.) But the court further rejected the defendant’s argument that the expert erred in calculating the probability of a match between a random person and the rape kit DNA profile. (Ibid.) The court stated, “the use of database searches as a means of identifying potential suspects is not new or novel,” because DNA databases and data bank statutes have 29 been enacted in all 50 states and by the federal government. (Ibid.) The court made clear that its “core point” was that “the database search merely provides law enforcement with an investigative tool, not evidence of guilt.” (Id. at p. 1150.) In the court’s view, “the means by which a particular person comes to be suspected of a crime—the reason law enforcement’s investigation focuses on him—is irrelevant to the issue to be decided at trial, i.e., that person’s guilt or innocence, except insofar as it provides independent evidence of guilt or innocence.” (Ibid.) Like the fingerprint database in People v. Farnam,
supra,28 Cal.4th at page 159 or the DNA database in People v. Johnson, supra, 139 Cal.App.4th at page 1149, CPS automated the process of searching for computers suspected of containing child pornography. But as in those cases, a police officer, Datzman— not CPS—made the ultimate conclusion that the files on the devices linked to Lund were child pornography. The prosecution’s use of CPS went slightly beyond the fingerprint or DNA databases in those cases, since the prosecution relied on CPS to match the target GUID’s patterns and locations to Lund’s schedule and movements. In this regard, the CPS information could be said to provide, as the court put it in Johnson, at page 1150, evidence of guilt independent of the child pornography found on the devices. Nonetheless, we do not view this fact as significant because, as in People v. Farnam, the reliability of this information was readily apparent to the jury. The CPS data had no aura of authority on its own because CPS had no records mentioning Lund specifically or matching to 30 an address that could be tied to him. The CPS evidence was only persuasive to the extent that the target GUID’s behavior and locations matched Lund’s schedule and movements, and the jury was well-equipped to evaluate whether the two matched. The prosecution’s evidence on that point was also strong. At precisely the time that Datzman observed a device access the router at the Yogurt Beach Shack and then drop off, Datzman and Johnson observed Lund in his police car outside the business and then drive away. The long range antenna found in Lund’s trunk matched the mac ID Datzman observed access the router. The antenna was used with the laptop found in the trunk. The laptop had accessed the router at the Yogurt Beach Shack at the same time Lund was there. The laptop also had a copy of eMule with the same GUID and port number that CPS detected. The laptop accessed the router near Cordelia Park, at the same time that CPS detected the GUID there and the police car Lund was driving was located by GPS there. CPS detected the GUID using the Fairfield Inn internet at the same time Lund’s car was observed at the hotel nearby, where he also had a reservation. The only point on which CPS did not match Lund’s movements was that CPS did not detect the GUID at the Yogurt Beach Shack when Lund was there. But Datzman’s later analysis of the laptop suggested it was because the eMule program crashed when Lund was trying to use it there. The jury could evaluate the credibility of the individual witnesses’ testimony that the prosecution used to establish Lund’s movements, and then determine for itself whether that 31 testimony matched the data from CPS. CPS did not have any particular heightened power to dazzle the jury, so there was no need to hold a Kelly hearing to evaluate it. b. Sargon Even though Kelly did not apply to the CPS evidence, the trial court was still obligated under Sargon to exclude the CPS testimony if it was “(1) based on matter of a type on which an expert may not reasonably rely, (2) based on reasons unsupported by the material on which the expert relies, or (3) speculative.” (Sargon, supra, 55 Cal.4th at pp. 771–772.) Lund contends Wiltse’s and Datzman’s expert testimony based on CPS failed under Sargon because there was insufficient evidence to show that CPS reliably worked. We disagree. The trial court did not abuse its discretion in finding Wiltse provided sufficient information to demonstrate CPS was reliable enough to be presented to the jury. Wiltse opined directly, as an expert, that the software is reliable and widely used in 84 countries by over 10,000 licensed users. Wiltse wrote the code for many of the tools in the CPS, and he oversaw the development of others as a supervisor. Wiltse had never had a complaint from users that CPS’s leads were unsubstantiated. CPS itself had never been hacked or corrupted by an external source. Wiltse tested the program extensively in a closed environment to ensure its accuracy before using it on the wider internet. Wiltse explained this initial testing was sufficient because there was no way to test it outside the closed environment and until the peer- to-peer network protocol changed, there was no need to change 32 the CPS software. Wiltse had testified before as an expert in Oregon, Illinois, Utah, New Mexico, Vermont, and Florida, and had twice participated in court-ordered testing of the program for federal courts in California. Wiltse was not aware of any convictions ever being reversed as a result of him being allowed to testify about CPS. Lund offers several theories as to how Wiltse failed to prove CPS’s reliability, such as the contentions that Wiltse improperly assumed that the peer-to-peer protocols did not change, failed to show the software remained reliable after its release, relied on the absence of anecdotal reports of error to conclude the software was reliable, and did not subject the software to third-party testing. These arguments are speculative. Lund cross-examined Wiltse at the pre-trial hearing and at trial about any flaws in CPS or need for third party testing, but he did not succeed in casting any doubt on its operations. Nor has Lund presented in this court any specific reasons to discount Wiltse’s testimony. To the contrary, the trial court could have reasonably concluded that the pre-release testing and track record of success demonstrated that CPS was sufficiently reliable to provide the basis for Wiltse’s and Datzman’s testimony. Lund contends Wiltse should have provided more detail about how CPS worked, such as its source code and how it determined what items to search for and where to search for them. He also argues there was no evidence about how CPS stored information, how it chose what information to store, and how CPS took information from the peer-to-peer network and 33 saved it within the CPS program. But Wiltse explained that CPS searches using terms commonly associated with child pornography files, and its different component programs searched different peer-to-peer networks that commonly offered child pornography. He talked about how CPS populated its database with information other computers provided in response to queries of the peer-to-peer networks or, in the case of hash values, by CPS users worldwide. He also detailed how the CPS component used here, Nordic Mule, logs its own dates and times that files are being offered and makes direct connections to computers hosting suspected child pornography to verify those IP addresses, so that those fields in its database are absolutely accurate. Lund does not cite authority for or explain how technical detail about the source code or algorithms was required (or even helpful) to establish CPS’s reliability. Finally, we note that many courts have concluded CPS is sufficiently reliable to provide probable cause for a search under the Fourth Amendment. (E.g., U.S. v. Thomas, supra, 788 F.3d at p. 353 [“we discern no error—much less, clear error—in the District Court’s finding that CPS was a reliable tool that could serve as the basis of a search warrant affidavit”]; U.S.A. v. McKinion (C.D. Cal., July 21, 2017, No. 2:14-CR-00124-CAS-1)
2017 WL 3137574, at *4, fn. 7; U.S. v. Collins (S.D. Iowa 2009)
753 F.Supp.2d 804, 809 [Peer Spectre, one of the CPS component tools, “is routinely and widely used by law enforcement officers to conduct [peer-to-peer] investigations, with wide-ranging acceptance for reliability,” notwithstanding the defendant’s 34 expert’s claims to the contrary]; U.S. v. Naylor (S.D. W.Va. 2015)
99 F.Supp.3d 638, 643 [finding, based in part on police officer’s experience of 100% reliability of CPS in 50 cases, that “CPS software appears to be a reliable investigative tool for law enforcement”]; People v. Worrell (N.Y. Sup. Ct. 2018)
71 N.Y.S.3d 839, 854, affd. (N.Y. App. Div. 2019)
170 A.D.3d 1048[noting how numerous state and federal courts had rejected Fourth Amendment challenges to the use of CPS in part because courts “have repeatedly found CPS to be . . . a reliable investigative tool”].) Lund has cited and our research has discovered no case that has determined in any context that evidence from CPS or programs like it is unsupported or unreliable. The apparently 35 uniform acceptance and reliance on CPS evidence supports the trial court’s decision to admit the CPS evidence here.7 C. Prosecutorial misconduct Next, Lund argues the prosecutor engaged in repeated, pervasive misconduct that violated state law and rendered his trial fundamentally unfair, denying him his federal right to due process. Lund bases these contentions on four areas of alleged misconduct by the prosecutor: asking objectionable questions, engaging in repeated argumentative questioning, asking Lund to comment on the testimony of other witnesses, and testifying as a witness. He further asserts the pervasive nature of the 7 Our holdings that the prosecution’s CPS evidence did not need to undergo Kelly review and was admissible under Sargon should not be taken to preclude inquiry, through cross- examination or discovery, into the possible fallibility of the software. Lund was still entitled to attack the weight of that evidence, which he might have done by, for example, examining the source code and pointing out any flaws in its operation. (See, e.g., U.S. v. Budziak (9th Cir. 2012)
697 F.3d 1105, 1111–1113 [district court abused its discretion in denying discovery into software like CPS]; U.S. v. Hartman (C.D. Cal., Nov. 24, 2015, No. SACR 15-00063-JLS) 2015 U.S. Dist. Lexis 197382 at *30– *41 [allowing discovery into software used to investigate peer-to- peer networks, including two components of CPS].) Lund initially sought the CPS source code from the prosecution in discovery, and the prosecution did not dispute that such evidence was relevant. The trial court denied his request because it concluded CPS’s creators were not part of the prosecution team for the purposes of criminal discovery, but it did so without prejudice to Lund seeking such evidence via subpoena. There is no indication in the record that Lund sought the source code via subpoena. 36 misconduct was prejudicial under both state and federal standards for reversal. We are not persuaded. Relevant legal principles “ ‘ “A prosecutor who uses deceptive or reprehensible methods to persuade the jury commits misconduct, and such actions require reversal under the federal Constitution when they infect the trial with such ‘ “unfairness as to make the resulting conviction a denial of due process.” ’ ” ’ [Citation.] ‘ “Under state law, a prosecutor who uses such methods commits misconduct even when those actions do not result in a fundamentally unfair trial.” ’ [Citation.] . . . Prosecutorial misconduct can result in reversal under state law if there was a ‘reasonable likelihood of a more favorable verdict in the absence of the challenged conduct’ and under federal law if the misconduct was not ‘harmless beyond a reasonable doubt.’ ” (People v. Rivera (2019)
7 Cal.5th 306, 333–334.) A showing of bad faith is not required to establish prosecutorial misconduct; “the term prosecutorial ‘misconduct’ is somewhat of a misnomer to the extent that it suggests a prosecutor must act with a culpable state of mind. A more apt description of the transgression is prosecutorial error.” (People v. Hill (1998)
17 Cal.4th 800, 823, fn. 1.) “ ‘As a general rule a defendant may not complain on appeal of prosecutorial misconduct unless in a timely fashion— and on the same ground—the defendant made an assignment of misconduct and requested that the jury be admonished to disregard the impropriety.’ ” (People v. Prieto (2003)
30 Cal.4th 226, 259.) “ ‘[O]nly if an admonition would not have cured the 37 harm is the claim of misconduct preserved for review.’ ” (People v. Friend (2009)
47 Cal.4th 1, 29.) Analysis a. Repeated objectionable questions We begin with Lund’s argument that the prosecutor committed misconduct by repeatedly asking him objectionable questions during cross-examination. Lund contends that it is misconduct for a prosecutor to purposefully try to elicit inadmissible testimony, especially after defense counsel has objected or a trial court has already ruled. He claims the prosecutor violated this principle by (a) posing five questions that had previously been asked and answered, (b) asking several questions that infringed on the attorney-client privilege, and (c) asking him to discuss other evidence introduced at trial that was outside his personal knowledge, even though the trial court repeatedly sustained his objections to all of the questions. Lund did not raise in the trial court his argument that the pattern of the prosecutor’s behavior constituted misconduct. However, he did raise the issue of misconduct with respect to the questions that he contends intruded on the attorney-client privilege, and the trial court sua sponte admonished the prosecutor with regard to some of her questions asking Lund about other evidence at trial. We therefore conclude the issue has been sufficiently preserved for review on appeal. The prosecutor’s questions do not rise to the level of misconduct. Lund cites cases holding that a prosecutor may commit misconduct by intentionally seeking to admit 38 inadmissible evidence. (People v. Smithey (1999)
20 Cal.4th 936, 960; People v. Bell (1989)
49 Cal. 3d 502, 532; People v. Johnson (1978)
77 Cal.App.3d 866, 873–874.) But those cases involved situations in which prosecutors tried to introduce evidence that was inadmissible in its entirety, particularly when the trial court had already so ruled. The principle illustrated by those decisions is not on point here, where the prosecutor asked Lund the same questions he had already answered or asked him questions designed to contrast his testimony with evidence that had already been admitted. To be sure, a prosecutor may engage in misconduct by repeatedly asking these types of questions, but such repetition would have to be far more extensive than the few questions Lund highlights. (People v. Armstrong (2019)
6 Cal.5th 735, 795–796 [hostile, repetitive, and argumentative cross- examination of capital murder defendant was not misconduct].) Lund’s argument based on the attorney-client privilege is unpersuasive, but for a different reason. The prosecutor asked Lund whether a computer expert gave Lund any reason to doubt Datzman’s testimony, whether Lund called that expert at trial, whether Lund would have called the expert if the expert could dispute Datzman’s actions, and whether Lund hired the expert but decided not to call him. Lund objected to these questions on bases other than attorney-client privilege, and the trial court sustained the objections though not necessarily for the reasons Lund asserted. Lund later argued outside the jury’s presence that the questions were misconduct because they intruded on the attorney-client privilege. The trial court indicated it had 39 sustained some of Lund’s objections because of the privilege and said that if the issue recurred it would admonish the jury to disregard questions to which the court sustained an objection. But the prosecutor said she was done with that area of questioning, so the issue did not recur. Reasonable minds might differ, but the trial court did not abuse its discretion in sustaining objections to the prosecutor’s questions, since they perhaps could have called for discussions of trial strategy. But we find no merit in Lund’s contention that the questions constituted misconduct by allowing the jury to infer that he did not call the expert because the expert’s testimony would not have helped his defense. “[P]rosecutorial comment upon a defendant’s failure ‘to introduce material evidence or to call logical witnesses’ is not improper.” (People v. Wash (1993)
6 Cal.4th 215, 263.) Lund points out that there were innocuous, irrelevant reasons why he might not have called the expert and that it was his counsel’s ultimate decision whether to call the expert. This may be true, but it does not negate the prosecutor’s right to comment on his failure to call the expert or convert any such comment into an intrusion on attorney-client confidences. If Lund were correct, then prosecutors would be barred from commenting on a defendant’s failure to call any witness, which would give defendants an unfair advantage at trial. As the trial court indicated, the prosecutor should have waited to make such commentary in her closing argument rather than introducing the point through her questioning. But because the failure to call a defense expert was a proper subject for prosecutorial comment, 40 the improper introduction of the concept in Lund’s cross- examination was not prejudicial misconduct. b. Argumentative questioning Lund’s second misconduct argument is more accurately characterized as a subset of his first. Lund contends that the prosecutor engaged in misconduct by continuing to ask argumentative questions even though the trial court repeatedly sustained his objections. “An argumentative question is a speech to the jury masquerading as a question. The questioner is not seeking to elicit relevant testimony. Often it is apparent that the questioner does not even expect an answer. The question may, indeed, be unanswerable.” (People v. Chatman (2006)
38 Cal.4th 344, 384 (Chatman).) Lund directs us to eight questions and comments he claims are argumentative. Lund did not object to all of these questions, did not always raise the issue of argumentative questioning when he did object, and never raised the issue of misconduct or asked the trial court to admonish the prosecutor to refrain from such questions. However, the trial court stopped the questions even when Lund did not object and twice admonished the prosecutor sua sponte. We will therefore proceed to examine Lund’s argument on the merits. First, after the trial court had sustained his objection to a question and no question was pending, Lund interjected that he couldn’t answer the prosecutor’s questions because she would not let him read the exhibits. The prosecutor responded, “Do you think you just get to talk when you want to?” Lund did not 41 object, but the trial court sua sponte admonished the prosecutor, “Don’t do that.” Second, the prosecutor asked Lund whether he was aware she had a rebuttal witness coming to contradict his testimony. Lund objected that the question was argumentative, and the trial court sustained the objection, on the basis that the question called for speculation. Third, after Lund stated that he believed it was unsafe to have computers in patrol cars, despite the CHP policy mandating such computers, the prosecutor asked, “So you know better than all the people that decided that these should go in the CHP patrol cars?” The trial court sustained Lund’s objection that the question was argumentative. Fourth, shortly after asking Lund about a text message he sent in which he described himself as a “neurosurgeon” in comparison to his fellow CHP officers, whom he described as “idiots,” the prosecutor asked Lund, concerning a CHP policy he said he was not familiar with, “So you’re the neurosurgeon but you never read the policy?” The court sustained the objection that the question was argumentative. Fifth, after Lund testified that other officers used his desk when he was not in the office, the prosecutor asked, apparently referring to Lund’s lack of witnesses corroborating his claims, “Let me guess, you have a witness coming in to say that?” The trial court sustained Lund’s objection that the question was argumentative. 42 Sixth, when Lund told the prosecutor that the pornography in his locker was not his but he did not know who put it there, the prosecutor rejoined, “Okay. You have no answers?” The trial court sua sponte ruled that the question was argumentative. Seventh, when Lund testified that he could not find a witness to corroborate his claim that another sergeant had a key to his locker because “[i]t’s been five years ago,” the prosecutor responded, “But it’s not been five years since day one.” The trial court sua sponte admonished the prosecutor, “We don’t need to keep repeating that.” Finally, after Lund admitted that he had been disciplined earlier in his career for viewing pornography on his work computer, the prosecutor asked how many other CHP officers had gotten in trouble for that. Lund objected that the question was argumentative, and the trial court sustained the objection on the grounds of relevance. The prosecutor then asked whether Lund had a “golden” career, referring to a text message in which he had said that. The trial court sustained Lund’s objection that the question had been asked and answered. Lund contends these questions were argumentative and demonstrated the prosecutor’s attempt to agitate and belittle Lund to make the jury not like him. Assuming all of the questions were argumentative, only the first question, in which the prosecutor asked whether Lund thought he could talk whenever he wanted, constituted misconduct. That question was not designed to elicit information, or even make an argument to the jury cloaked as a question, but rather aimed to belittle Lund. 43 However, on its own this single instance of misconduct is de minimis. (People v. Collins (2010)
49 Cal.4th 175, 208.) None of the other questions, singly or together, rises to the level of “ ‘deceptive or reprehensible methods’ ” that the doctrine of prosecutorial misconduct prohibits. (People v. Rivera, supra, 7 Cal.5th at p. 333; People v. Armstrong, supra, 6 Cal.5th at p. 796 [“Effective and legitimate cross-examination may involve assertive and even harsh questioning”].) Despite the questions’ sarcastic or biting tone, Lund “identifies no line of questioning, and the transcript reveals none, that crossed over any boundaries of fair play or that would have led the jury to decide this case on anything other than the facts and the law.” (Armstrong, at p. 96.) Even if these questions did constitute misconduct, we are satisfied under any standard of prejudice that they did not affect the outcome of the trial. The trial court sustained Lund’s objections, dispelling any prejudice. (People v. Fuiava (2012)
53 Cal.4th 622, 687.) Additionally, as discussed above, the evidence connecting Lund to the devices containing child pornography was very strong, and the prosecution buttressed it with the striking correspondence between the CPS data and Lund’s schedule and movements. c. Asking whether witnesses were lying Lund further contends the prosecutor erred by asking him whether other witnesses were lying. Lund objected to only one of the first questions in the prosecutor’s series of questions on this topic, on the grounds that it called for speculation and was improper. The trial court overruled the objection. We assume 44 the objection of impropriety was equivalent to a request for an admonition. Because the court overruled the objection, we conclude any objections to the rest of the questions would have been futile. We will therefore examine Lund’s argument on the merits. (People v. Hill,
supra,17 Cal.4th at p. 820.) Lund relies on People v. Zambrano (2004)
124 Cal.App.4th 228, 242, which held that it is misconduct to ask a defendant if other witnesses are lying where the question serves no evidentiary purpose and serves only to berate the defendant and inflame the passions of the jury.8 But as Chatman,
supra,38 Cal.4th at pages 377–384, later made clear, such questions can serve an evidentiary purpose. Chatman explained that a “party who testifies to a set of facts contrary to the testimony of others may be asked to clarify what his position is and give, if he is able, a reason for the jury to accept his testimony as more reliable.” (Id. at p. 382.) The court noted that Zambrano had held a prosecutor committed misconduct by asking the defendant whether other witnesses were lying, when the defendant did not know the other witnesses, could not testify about their bias, interest, and motive to be untruthful, and had already contradicted their testimony with his own. (Id. at p. 381.) In Chatman, by contrast, the prosecutor’s questions were proper, because the defendant “was not asked to opine on whether other 8 Lund also cites U.S. v. Sanchez (9th Cir. 1999)
176 F.3d 1214, 1219, which held that asking whether other witnesses are lying is improper because witness credibility is a question for the jury. Chatman,
supra,38 Cal.4th at pages 380, 382, rejected this principle. 45 witnesses should be believed” but instead “asked to clarify his own position and whether he had any information about whether other witnesses had a bias, interest, or motive to be untruthful.” (Id. at p. 383.) The defendant had relevant personal knowledge and knew the other witnesses, who were his friends or relatives. (Ibid.) The prosecutor’s questions here fall squarely within the ambit of Chatman. The prosecutor did not ask Lund to opine generally on whether the jury should believe the other witnesses, but instead asked more specifically whether he had any reason to believe the other witnesses would make up lies against him. Because Lund took the stand and claimed the witnesses against him were wrong in a way that could only result from deception or bias, it was fair for the prosecution to explore the basis for Lund’s belief. This is especially true because Lund worked with many of the witnesses against him and so might have been able to offer some specific testimony regarding any biases or improper motives. Accordingly, the prosecutor’s questions about other witnesses do not constitute misconduct. d. Prosecutor testifying as a witness Lund argues the prosecutor committed misconduct by testifying as a witness about Duplissey’s correction of his report. Lund objected to only two questions in the exchange he cites; he objected that the questions called for hearsay or were leading and called for speculation. Because Lund neither objected to the prosecutor’s line of questioning on the ground he now raises nor requested an admonition, he has forfeited this argument. (People 46 v. Prieto,
supra,30 Cal.4th at p. 259.) Even were we to consider the argument on the merits, we would reject it because the prosecutor’s questions of Duplissey about interactions she had with him are not equivalent to her appearing as a witness. D. Child pornography videos Lund’s final argument focuses on the child pornography videos the prosecution played for the jury. Lund asserts the prosecution played 50 video segments and argues the prejudicial effect of this evidence substantially outweighed its probative value under Evidence Code section 352. He also asserts the court’s decision to admit the evidence without reviewing it in advance was arbitrary. He further argues the admission of this evidence deprived him of a fair trial and violated his right to due process. “Under Evidence Code section 352, a trial court may exclude otherwise relevant evidence when its probative value is substantially outweighed by concerns of undue prejudice, confusion, or consumption of time. ‘Evidence is substantially more prejudicial than probative [citation] if, broadly stated, it poses an intolerable “risk to the fairness of the proceedings or the reliability of the outcome.” ’ ” (People v. Riggs (2008)
44 Cal.4th 248, 290.) “In applying this statute we evaluate the ‘risk of “undue” prejudice, that is, “ ‘evidence which uniquely tends to evoke an emotional bias against the defendant as an individual and which has very little effect on the issues,’ ” not the prejudice “that naturally flows from relevant, highly probative evidence.” ’ ” (People v. Salcido (2008)
44 Cal.4th 93, 148.) We review for 47 abuse of discretion a trial court’s decision based on Evidence Code section 352. (Riggs, at p. 290.) Lund’s assertion that the prosecutor played 50 video segments is misleading. In response to Lund’s motion in limine to exclude the child pornography images and videos, the trial court limited the prosecutor to playing five files from each of the six devices. The prosecutor played even fewer than that, displaying only 15 files to the jury. The prosecutor also skipped ahead quickly in the video files she played for the jury rather than playing entire files. It appears from the record that many video segments were very brief, sometimes a matter of seconds. Lund’s approach of counting multiple portions of a single video file as separate video segments would penalize the prosecutor for her apparent attempt to minimize the time spent displaying child pornography. We therefore reject Lund’s attempt to inflate the number of videos at issue and will analyze Lund’s arguments using the number of 15 child pornography files. Lund first challenges the files as lacking probative value. He points out that he did not dispute that the files constituted child pornography, merely his knowing possession of them, so he contends the child pornography itself was not probative of his guilt. Lund recognizes the prosecution had to prove that he possessed child pornography, but he maintains the prosecution could have used Datzman’s testimony about the videos for this purpose, so the videos were cumulative. We reject these arguments because the law is clear that “the prosecution was not required to accept defense concessions as a sanitized alternative 48 to the full presentation of its case.” (People v. Zambrano (2007)
41 Cal.4th 1082, 1149, disapproved on other grounds by People v. Doolin (2009)
45 Cal.4th 390.) This is especially true here, where the videos were not merely circumstantial evidence like a crime scene in a murder case, but rather constituted direct evidence of one of the elements of the possession of child pornography charge against Lund. (Pen. Code., § 311.11, subds. (a), (c)(1); People v. Holford (2012)
203 Cal.App.4th 155, 171 (Holford).) Lund’s contention that the videos were unfairly prejudicial by their very nature therefore misses the mark. The relevant question is not whether the prosecution was allowed to show child pornography to the jury, but how much. On that score, we conclude the trial court did not abuse its discretion in allowing the prosecution to play portions of a few files from each of the electronic devices found to contain child pornography. Holford, supra,
203 Cal.App.4th 155is instructive. There, the defendant was charged with possessing a single 25- minute child pornography video. (Id. at pp. 158–159.) Without watching the video first, the trial court ruled the entire video was admissible, and the prosecution played all 25 minutes of it for the jury. (Id. at pp. 165–166.) On appeal, the court found the video was highly probative because it proved one element of the crime and its length and the obviously young age of the minor in it created an inference that the defendant knowingly possessed it. (Id. at pp. 171–173 & fn. 8.) The court further found that while the video was disturbing, “the trial court’s determination that the probative value of establishing defendant’s knowledge was not 49 ‘substantially’ outweighed by a ‘substantial danger’ of prejudice was not arbitrary, capricious nor patently absurd.” (Id. at p. 174.) The court stated that while it did not condone the practice of ruling on the admissibility of the video without watching it first, the trial court was entitled to rely on an offer of proof and it apparently did so by accepting the parties’ agreement that the video was graphic. (Id. at pp. 174–175.) The court also noted that the trial court’s ruling would have been the same regardless since it reaffirmed its ruling after watching the video. (Id. at p. 175.) In comparison to Holford, where there was a single video at issue and the prosecution played all of it, the prosecution’s approach here appears to strike a reasonable balance between the potential undue prejudice and the prosecution’s desire to present a compelling case. The prosecutor told the court at the hearing before Lund’s second trial on Lund’s motion to exclude the child pornography that she would follow the same practice that she did at the first, which entailed playing brief portions from up to the first five videos from each device. The trial court estimated the prosecutor spent about 8 to 10 minutes in total displaying photos or videos to the jury in the first trial. The record does not indicate how much time elapsed during the playing of the videos at the second trial, but from the court reporter’s transcription of the prosecutor’s remarks as she was playing the files, this estimate seems fair. Considering the electronic devices contained thousands of images and videos, eight to ten minutes does not seem excessive, especially because 50 that total amount of time was broken up into smaller chunks of time for each device. Lund contends the material issue in Holford was whether the defendant knew the video was child pornography, and contrasts that with his defense, which turned only on how the electronic devices came to be found in his locker, desk, and car. He concludes the videos themselves carried little relevance. But as we have noted, the nature of the videos and images as child pornography was still an element of the prosecution’s case, and the prosecution was not required to sanitize its case before the jury. The question is one of balance, and Lund does not offer any argument for how much child pornography the prosecution should have been allowed to show, aside from saying that the amount played at trial was too much. Lund points out that Holford suggested its balancing analysis might have come out differently had the defendant been alleged to possess multiple pieces of pornography, like Lund was. (Holford, supra, 203 Cal.App.4th at p. 171, fn. 7.) Holford stated, “[I]n a case involving multiple pieces of child pornography, the probative value of admitting the entirety of a defendant’s collection may not be any higher than admitting only a few pieces unless there are other circumstances. Moreover, depending on the depictions in the collection and other circumstances in the case, the danger of prejudice resulting from the admission of an entire collection could substantially outweigh the probative value, particularly since admitting the extra pieces could have 51 very little effect on the issues given the charging rules for possession of child pornography in California.” (Ibid.) These statements are obviously dicta, but they also do not reflect the current state of the law. When Holford was decided in 2012, as the court stated, the possession of multiple pieces of child pornography was chargeable as only a single criminal offense. (Holford, supra, 203 Cal.App.4th at p. 171, fn. 7.) In 2013, the Legislature amended Penal Code section 311.11 to create the separate offense of possession of over 600 child pornography images, more than 10 of which involve a minor under the age of 12, with one video equal to 50 images. (Stats. 2013, ch. 777, § 3.) Now, when a prosecutor is trying to prove such an offense, the display of multiple child pornography images or videos has significant probative value to show a defendant possessed 600 images or 12 videos. Even so, Evidence Code section 352 still plays a role in such cases. The statute does not set any minimum length for a video to qualify as 50 images, so the new offense does not mean a prosecutor can necessarily play the entirety of 12 videos like the 25-minute video at issue in Holford. Conversely, a trial court does not necessarily abuse its discretion in allowing a prosecutor to play more than 12 videos, like the prosecutor here, even when the nature of the videos as child pornography is not disputed. The balancing of probative value against the risk of undue prejudice under Evidence Code section 352 remans an issue for the trial court’s sound discretion. And under the circumstances here, where the prosecutor displayed one image and portions of 15 videos for what appears to 52 be a total of approximately eight to ten minutes, we cannot find that the court abused its discretion in striking the balance as it did. Lund finally argues the trial court abdicated its role as the gatekeeper of evidence by not previewing any of the videos that the prosecution played for the jury, just like the trial court in Holford, supra, 203 Cal.App.4th at pages 174–175. He contends the trial court’s admission of the videos could only have been arbitrary because the prosecution did not even make an offer of proof as to the number of videos, how long the videos were, or the file names of the videos. This argument misconstrues the record. As noted above, the prosecution told the trial court at a pretrial hearing before the second trial that she would limit herself to the first five files from each device, just as she had in the first trial. The record shows the prosecutor did just that. The same judge presided over both trials, and the trials took place only a few months apart, so the trial court was well aware of the nature of the child pornography before the prosecutor played it. Lund quibbles over whether this procedure technically qualified as an offer of proof as to the content of the files, but it amounts to the same thing. The trial court specifically noted that the prosecutor’s approach in the first trial was not excessive and she ultimately displayed fewer files to the jury than the trial court had authorized. The second trial was similar, with the prosecution displaying 15 videos and one image to the jury, not the full 30 files authorized by the trial court’s ruling. Because the trial court had already seen the videos that would be played, 53 its decision was “an informed one and not ‘ “a shot in the dark.” ’ ” (Id. at p. 174.) The trial court did not abdicate its role.9 III. DISPOSITION The judgment is affirmed. BROWN, J. WE CONCUR: POLLAK, P. J. STREETER, J. People v. Lund (A157205) 9The only error that Lund has shown in his trial was the de minimis misconduct of one improper statement by the prosecutor. As a result, we need not consider Lund’s contention that the cumulative effects of multiple errors in his trial made it fundamentally unfair in violation of due process. 54 Trial Court: Solano County Superior Court Trial Judge: Hon. Daniel J. Healy Counsel: Law Offices of Beles & Beles, Robert J. Beles, Joseph L.Ryan, for Defendant and Appellant. Xavier Becerra, Attorney General, Lance E. Winters, Chief Assistant Attorney General, Julie L. Garland, Assistant Attorney General, A. Natasha Cortina, Annie Featherman Fraser, Deputy Attorneys General, for Plaintiff and Respondent. 55
Document Info
Docket Number: A157205
Filed Date: 6/1/2021
Precedential Status: Precedential
Modified Date: 6/1/2021