-
Filed 10/24/13 P. v. Kuhn CA2/3 NOT TO BE PUBLISHED IN THE OFFICIAL REPORTS California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication or ordered published for purposes of rule 8.1115. IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA SECOND APPELLATE DISTRICT DIVISION THREE THE PEOPLE, B243792 Plaintiff and Respondent, (Los Angeles County Super. Ct. No. BA385064) v. MICHAEL ERIC KUHN, Defendant and Appellant. APPEAL from a judgment of the Superior Court of Los Angeles County, Patricia M. Schnegg, Judge. Affirmed. Law Offices of Joseph Shemaria and Joseph Shemaria for Defendant and Appellant. Kamala D. Harris, Attorney General, Dane R. Gillette, Chief Assistant Attorney General, Lance E. Winters, Assistant Attorney General, Scott A. Taryle and Stacy S. Schwartz, Deputy Attorneys General, for Plaintiff and Respondent. Defendant and appellant Michael Eric Kuhn appeals from the judgment entered following his no contest plea to possession of child pornography, entered after the trial court denied his motion to quash and traverse a search warrant and suppress evidence. Kuhn contends the trial court erred by denying his motion. We affirm. FACTUAL AND PROCEDURAL BACKGROUND 1. Facts. a. Issuance of search warrant for Kuhn’s apartment. On August 31, 2010, Los Angeles Police Department (L.A.P.D.) Officer Eric Good sought and obtained a warrant to search Kuhn’s Culver City apartment, vehicle, computer systems, and electronic equipment for child pornography and related materials. As pertinent here, the 19-page affidavit in support of the warrant stated the following. Officer Good had been employed by the City of Los Angeles since 2002, began working for the L.A.P.D.’s Juvenile Division in December 2008, and, when the affidavit was prepared, was assigned to the Juvenile Division’s Internet Crimes Against Children Unit (ICACU). One of the ICACU’s tasks was investigation of “child sexual predators who use computers and the Internet to pursue their sexual interest in children.” The affidavit described Good’s formal training and experience in the investigation of child abuse and exploitation, which included over 120 hours of training on crimes related to sexual exploitation of children on the Internet. Officer Good provided background information about users of child pornography. His affidavit stated: “I am aware that the following characteristics are generally found in varying combinations in people who produce, trade, distribute or possess images of child pornography: These people view children as sexual objects. They receive gratification from sexually explicit images of minors. They collect sexually explicit images of minors, which they use for their own sexual gratification and fantasy. They use these images as a means of reliving fantasies or actual sexual encounters. They rarely, if ever, dispose of sexually explicit images of minors because the images are treated as prized possessions. [¶] They store such images in many different formats including photographs, printouts, magazines, videotapes, and many other forms of digital media such as hard drives, 2 diskettes, CDs and/or DVDs and other storing devices,” and store them “in many different locations such as their home, their vehicle, their work areas, and other areas under their control.” Collectors of child pornography generally prefer to store images in electronic format as computer files. Officer Good had “personally witnessed collectors going to great lengths to protect their collection from discovery.” Such persons maintain images of minors with whom they had sexual contact; use the Internet to gain access to children for the purposes of sexual exploitation; and chat online with other suspects to share information on the sexual exploitation of children. Predators “will often exchange or purchase child pornography on the Internet or will entice children to meet with them for sexual purposes.” The affidavit described, in considerable detail, the technical process whereby investigators are able to identify persons who possess child pornography. Briefly summarized, that information included the following. The “Secure Hash Algorithm Version 1,” or “SHA1,” is a mathematical encryption method used to produce a unique digital signature of a computer file. No two files produce the same SHA1 value unless their contents are identical. Various government and private agencies cooperate to maintain a list of “verified positive child pornography SHA1 values.” Thus, the contents of computer files can be positively established without viewing the content, “once a known file with a certain SHA1 value has been identified.” Persons with an interest in child pornography frequently use peer-to-peer networks to trade and share such files. One such network is Gnutella, an “open-source,” publicly available network. Gnutella uses SHA1 values in its operation. On July 26, 2009, Detective Schlund identified a computer with the Internet Protocol, or IP, address of 76.171.169.96 as distributing images of child pornography via file sharing. Schlund observed that the computer was sharing a folder with 20 video files, all of which had titles that were indicative of child pornography. Schlund was unable to download files at that time due to a slow Internet connection. On July 28, 2009, by comparing the contents of the shared file with the library of known child pornography, 3 Schlund confirmed that at least one of the files in the shared folder depicted minors engaged in sexually explicit conduct, as defined by Penal Code section 311. Also on July 28, 2010, Schlund determined the Internet Service Provider for the computer was Time Warner Roadrunner. Schlund prepared a federal customs subpoena to obtain subscriber information. On September 8, 2009, Time Warner notified Schlund that Michael Kuhn, residing at an apartment located at 7777 West 91st Street in Playa Del Rey, was the subscriber assigned to the IP address of 76.171.169.96. On March 9, 2010, Officer Good matched the SHA1 signatures of known child pornography files with the files identified in the shared folder and confirmed that at least one of the files appeared to depict minors engaged in sexually explicit conduct. The file in question was a video entitled “ ‘14 kids teens women (porno-lolitas-preteens- reelkiddymov-r@ygold-hussyfans-underage-girls-children-pedofilia-pthc-ptsc-xxx- sexy).avi’ ” (hereinafter “14 kids”). (Bold in original omitted.) It was approximately 30 minutes long and showed a montage of young girls between the ages of 3 to 11 years, orally copulating and “being vaginally penetrated by unknown adult male penises.” On May 4, 2010, an investigator checked to see if there was any further activity on IP address 76.171.169.96. By comparing SHA1 values, the investigator learned that the IP address “76.171.169.96 was identified 3 times on January 7, 2010, as flagged for having SHA1 values of known child pornography.” On July 22, 2010, Officer Good learned from a homeowners’ association representative at the Playa Del Rey apartment complex that Kuhn was not living at the apartment. On August 24, 2010, Good contacted Postal Inspector Harjala and asked if any change of address records existed for Kuhn. Harjala advised that Kuhn had filed a form on March 16, 2010, changing his address from the West 91st Street apartment to an apartment on Culver Boulevard, in Culver City. Harjala stated that Kuhn had not subsequently filed any additional change of address forms. Additionally, Harjala advised that three other persons—Felipe Serrano, Jeffrey Pederson, and Douglas Nicholas—had 4 also filed changes of address forms from the same Playa Del Rey apartment to the Culver Boulevard apartment. Based upon the foregoing, Officer Good opined that probable cause existed to show the crime of possession of child pornography in violation of Penal Code section 311.11, subdivision (a), had been committed by a person residing at the Culver Boulevard address. Good then set forth, in considerable detail, information regarding the special circumstances related to searches of digital devices, explaining why they generally must be seized and examined by experts in a police laboratory, rather than at the scene of the search. Good also explained that “[e]lectronic files or remnants of such files can be recovered months or even years after they have been downloaded onto a hard drive, deleted or viewed via the Internet.” b. Search of Kuhn’s Culver City Apartment and discovery of child pornography. On September 1, 2010, Officer Good, along with other officers, executed the search warrant at Kuhn’s apartment in Culver City. Good seized two laptop computers, five hard drives, batteries and adaptors, memory cards, compact discs, a camera, a Time Warner bill, and a receipt, all found in Kuhn’s bedroom. A forensic examination of those items disclosed images of child pornography on one or more of the seized devices. When Good executed the search, he conducted a recorded interview of Kuhn. Kuhn admitted to Good that he had downloaded child pornography.1 Kuhn was arrested and charged with violating Penal Code section 311.11, subdivision (a)2 (possession of matter depicting a minor engaged in sexual conduct). c. Motion to quash and traverse the warrant and suppress evidence. Kuhn thereafter filed a motion pursuant to section 1538.5 to quash and traverse the search warrant and suppress the seized evidence and his statements. He alleged, inter alia, that the warrant affidavit was insufficient to establish probable cause because: (1) it 1 Because Kuhn pleaded no contest before trial, we glean these facts from the transcript of the preliminary hearing. 2 All further undesignated statutory references are to the Penal Code. 5 was based upon stale information and the “images in question were located at a different residence”; (2) the warrant affidavit contained intentionally misleading and/or false statements; (3) the warrant was a “prohibited general warrant” in that it was overbroad; and (4) the warrant was obtained without a good faith belief the affidavit provided sufficient probable cause to justify the search. On April 20, 2012, the trial court heard and denied Kuhn’s motion. The court credited Officer Good’s opinion that persons who possess child pornography rarely delete such files. It therefore rejected the argument that the information was too stale to establish probable cause, observing that child pornography was detected on Kuhn’s computer initially in July 2009 and again in January 2010. The court discounted Kuhn’s argument that the term “collector,” as used by Good in the warrant affidavit, was misleading, explaining the defense contention was “a linguistic argument that I do not find persuasive. [¶] . . . [¶] People who collect illegal material, I think it is reasonable to infer that they are going to be disinclined to delete such material and therefore there was nothing misleading provided to the issuing magistrate in that regard.” Furthermore, one week before issuance of the warrant, Good learned from Harjala that Kuhn had filed a change of address form. The court reasoned: “So this is a situation where law enforcement is not simply relying on information learned months before they enter the property in question but, in fact, take a very significant step to try and make sure that Mr. Kuhn has not moved to any new location and that investigation was done one week prior to the search.” The court expressed the view that people do not normally distance themselves from their personal computers, which are both highly portable and valuable. Common sense dictated that a computer owner would take his computer to his new residence. The court also rejected the argument that the warrant was overbroad: given the fact child pornography was discovered in July and again in January, “the investigation would suggest that there is a sufficient scope or breadth of material that needs to allow the investigating officer some degree of latitude to make sure that they’re not missing something. To suggest that they can only look for one particular title strikes this court as simply absurd.” 6 2. Procedure. After the trial court denied his suppression motion, Kuhn pleaded no contest to possession of child pornography (§ 311.11, subd. (a)). The court placed Kuhn on probation for three years, on the condition he serve two days in jail, with credit for two days served. It ordered that Kuhn register as a sex offender, and imposed a restitution fine, a suspended probation revocation restitution fine, a criminal conviction assessment, a court operations assessment, and a sex offender fine. Kuhn appeals. DISCUSSION Kuhn contends the trial court erred by denying his motions to quash and traverse the warrant and suppress evidence seized in the search, as well as his statements. He argues the affidavit in support of the search warrant failed to state facts sufficient to establish probable cause because it was based on stale information and contained unsupported conclusions and recklessly misleading misstatements; and the warrant was an overbroad “general warrant.” We disagree. 1. Applicable legal principles. A search warrant may only be issued upon a showing of probable cause. (U.S. Const., 4th Amend.; § 1525.) Probable cause exists where there is a fair probability that contraband or evidence of a crime will be found in a particular place, at the time of the search. (Illinois v. Gates (1983)
462 U.S. 213, 238; People v. Carrington (2009)
47 Cal. 4th 145, 161; People v. Kraft (2000)
23 Cal. 4th 978, 1040-1041; People v. Gibson (2001)
90 Cal. App. 4th 371, 380.) The probable cause showing must appear in the affidavit offered in support of the warrant. (Carrington, at p. 161.) “ ‘The task of the issuing magistrate is simply to make a practical, common-sense decision whether, given all the circumstances set forth in the affidavit before him [or her], including the “veracity” and “basis of knowledge” of persons supplying hearsay information, there is a fair probability that contraband or evidence of a crime will be found in a particular place.’ ” (Ibid.; Illinois v. Gates, supra, at p. 238; People v. Scott (2011)
52 Cal. 4th 452, 483.) Probable cause may be shown by evidence that would not be competent at trial, 7 and a magistrate may reasonably rely on the special experience and expertise of the affiant officer. (People v. Varghese (2008)
162 Cal. App. 4th 1084, 1103.) On review, we defer to the trial court’s express and implied factual findings if supported by substantial evidence, but independently determine the legality of the search under the Fourth Amendment. (People v. Eubanks (2011)
53 Cal. 4th 110, 133; People v. Lenart (2004)
32 Cal. 4th 1107, 1119; People v. Hirata (2009)
175 Cal. App. 4th 1499, 1504.) “Because courts accord a preference to searches and seizures conducted pursuant to a search warrant, ‘in a doubtful or marginal case a search under a warrant may be sustainable where without one it would fall.’ ” (Eubanks, at p. 133.) Any challenge to the admissibility of a search or seizure must be evaluated solely under the Fourth Amendment. (People v. Carter (2005)
36 Cal. 4th 1114, 1141; People v. Stipo (2011)
195 Cal. App. 4th 664, 668.) 2. The search warrant affidavit supported the probable cause finding. a. Purportedly stale information. Kuhn contends the information in the affidavit did not supply probable cause because (1) there was a lengthy delay between the date investigators first identified files containing child pornography on his computer and sought issuance of the warrant; and (2) he moved during that period, but Officer Good failed to take sufficient steps to determine that he was living at the Culver City address and had taken the computer with him. These contentions lack merit. To justify issuance of a warrant, “[t]here must be probable cause to believe that the material sought to be seized will be on the premises to be searched when the warrant is served.” (People v. Gibson, supra, 90 Cal.App.4th at p. 380; People v. Hirata, supra, 175 Cal.App.4th at p. 1504.) Information in a warrant affidavit that is remote in time, or “stale,” does not establish present probable cause for a search. (People v. Jones (2013)
217 Cal. App. 4th 735, 741-742; People v. Hulland (2003)
110 Cal. App. 4th 1646, 1652; Gibson, at p. 380.) There is no bright line rule indicating when information becomes stale. (People v. Carrington, supra, 47 Cal.4th at p. 163; Jones, at pp. 741-742; Hirata, at p. 1504.) However, delays of more than four weeks are generally considered 8 insufficient to demonstrate present probable cause. (Jones, at pp. 741-742; Hirata, at p. 1504.) Longer delays are nonetheless justified where there is evidence of an activity continuing over a long period of time, or the nature of the activity is such as to justify the inference that it will continue until the time of the search. (Carrington, at p. 164, and cases cited therein; Jones, at p. 742; People v. Stipo, supra, 195 Cal.App.4th at p. 672; Hulland, at p. 1652.) The question of staleness turns on the facts of each particular case. (Carrington, at p. 163; Gibson, at p. 380; Jones, at p. 741.) “In the context of child pornography cases, courts have largely concluded that a delay—even a substantial delay—between distribution and the issuance of a search warrant does not render the underlying information stale.” (U.S. v. Richardson (4th Cir. 2010)
607 F.3d 357, 370 [
2010 U.S. App. LEXIS 11928]; see, e.g., U.S. v. Lacy (9th Cir. 1997)
119 F.3d 742, 745-746 [affidavit provided non-stale information despite 10-month lapse between computer download and issuance of the warrant]; U.S. v. Morales- Aldahondo (1st Cir. 2008)
524 F.3d 115, 119 [three-year delay between acquisition of child pornography and application for warrant did not render supporting information stale]; U.S. v. Irving (2d Cir. 2006)
452 F.3d 110, 125 [“When a defendant is suspected of possessing child pornography, the staleness determination is unique because it is well known that ‘images of child pornography are likely to be hoarded by persons interested in those materials in the privacy of their homes’ ”]; U.S. v. Allen (5th Cir. 2010)
625 F.3d 830, 842 [
2010 U.S. App. LEXIS 22920] [18-month-old information was not stale]; U.S. v. Newsom (7th Cir. 2005)
402 F.3d 780, 783 [one year not stale]; U.S. v. Lemon (8th Cir. 2010)
590 F.3d 612, 614-615 [18-month-old information was not stale].) Computers and computer equipment are “not the type of evidence that rapidly dissipates or degrades.” (U.S. v. Vosburgh (3d Cir. 2010)
602 F.3d 512, 529 [
2010 U.S. App. LEXIS 8140] (Vosburgh).) Therefore, “the passage of weeks or months here is less important than it might be in a case involving more fungible or ephemeral evidence, such as small quantities of drugs or stolen music.” (Vosburgh, at p. 529.) “[I]nformation concerning [child pornography] crimes has a relatively long shelf life. It has not been, and should not be, quickly deemed stale.” (Ibid.) 9 Here, investigators determined that Kuhn’s computer contained child pornography files on July 26, 2009, and again on January 7, 2010. Officer Good sought issuance of the search warrant on August 31, 2010. Thus, there was a seven-and-a-half month delay between the last identification of contraband files on Kuhn’s computer and issuance of the warrant. On the facts of this case, the delay did not render the information stale for several reasons. First, from the information in the affidavit, the magistrate could reasonably believe Kuhn continued downloading child pornography several months after the initial download in July. From this, it was reasonable to infer Kuhn’s interest in Internet child pornography, and his downloading activity, was ongoing. Second, Officer Good—who had considerable experience in the investigation of child pornography—averred that persons who possess child pornography “rarely, if ever, dispose of sexually explicit images of minors because the images are treated as prized possessions.” Law enforcement officers may draw upon their expertise to interpret the facts in a search warrant application, and such expertise may be considered by the magistrate as a factor supporting probable cause. (People v. Nicholls (2008)
159 Cal. App. 4th 703, 711.) Here, Good had the necessary experience and training to describe the predilections and proclivities of persons who download child pornography. Good’s statement, which was credited by the trial court, demonstrated the likelihood that the pornographic files likely remained on Kuhn’s computer or other electronic media at the time the warrant was issued. (See, e.g., U.S. v. Lacy, supra, 119 F.3d at pp. 745-746 [upholding warrant based on information that defendant downloaded child pornography 10 months earlier, and on affiant’s assertion that collectors of child pornography generally retain the images]; U.S. v. Gourde (9th Cir. 2006)
440 F.3d 1065, 1072, and cases cited therein; United States v. Murray (D.Az. 2010)
696 F. Supp. 2d 1044, 1049 [
2010 U.S. Dist. LEXIS 26696] (Murray); cf. People v. Stipo, supra, 195 Cal.App.4th at p. 672 [in computer hacking case, staleness argument rejected where the hacked information could be used for identity theft, was therefore valuable, and would likely have been retained by defendant]; People v. Jones, supra, 217 Cal.App.4th at p. 742.) 10 “Substantial delays do not render warrants stale where the defendant is not likely to dispose of the items police seek to seize.” (Stipo, at p. 672.) Third, Good averred that electronic files or remnants of such files could be recovered months or even years after their original download using “readily-available forensics tools,” even if the user had deleted the files. This fact suggested the pornographic files would be found on the computer regardless of the delay. (See Murray, supra, 696 F.Supp.2d at p. 1049 [“Thanks to the long memory of computers, any evidence of [child pornography] was almost certainly still on [defendant’s] computer, even if he had tried to delete the images”]; U.S. v. Gourde, supra, 440 F.3d at p. 1071; Vosburgh, supra, 602 F.3d at p. 529; People v. Stipo, supra, 195 Cal.App.4th at p. 673 [staleness argument rejected where traces of network intrusion likely remained on the defendant’s computer because they were automatically entered and difficult to remove].) Kuhn’s arguments that Officer Good failed to reliably determine he and his computer had actually moved to the Culver City address fare no better. The affidavit stated that on July 22, 2010, Good learned from a homeowner’s association representative at the Playa Del Ray apartments that there was no record of Kuhn living in the apartment. On August 24—just a week before seeking the warrant—Good spoke to Postal Inspector Harjala and learned that Kuhn had filed a form on March 16, 2010, changing his address from West 91st Street in Playa Del Rey to the Culver Boulevard apartment. Inspector Harjala told Good that Kuhn had not subsequently filed a change of address form. The most logical and reasonable inference from this information was that Kuhn moved from the Playa Del Rey apartment to the Culver City apartment in March 2010. The absence of a subsequent change of address form made it reasonably probable that Kuhn was still living at the Culver City address when the warrant was sought. It was a reasonable inference that, having once filed a change of address when moving to a new residence, Kuhn would have done so again had he moved from the Culver City location. (See generally People v. Gibson, supra, 90 Cal.App.4th at pp. 380-381 [where there was no reason to believe appellant had moved in the five to six months preceding issuance of 11 the warrant, affidavit was not defective for failure to provide information she was still living there when the warrant was sought].)3 It was eminently reasonable for the trial court to believe Kuhn took his computer with him when he moved. Computers are highly portable and usually quite valuable. Common sense and common experience teach that, in today’s society, computers are an oft-used and indispensible tool, and are generally used to store personal and financial data. They are not the type of item likely to be discarded or left behind when the owner moves. Kuhn’s move from Playa Del Rey to Culver City was not a transatlantic or cross- country move, making it even less likely he would have neglected to take the computer with him. (See People v. Miller (1978)
85 Cal. App. 3d 194, 200 [affidavits must be interpreted in a common sense fashion rather than a hypertechnical one; “[r]easonable and logical inferences may be drawn and the magistrate may consider matters of common knowledge concerning human behavior”]; Vosburgh, supra, 602 F.3d at p. 529 [computers and computer equipment are not the type of property “that is usually[,] quickly or continuously discarded”]; People v. Stipo, supra, 195 Cal.App.4th at p. 672 [because defendant was unaware he was a suspect, he was unlikely to dispose of his computer equipment during the six months between the crime and issuance of the warrant]; People v. Ulloa (2002)
101 Cal. App. 4th 1000, 1007 [it was reasonable to assume defendant’s computer would be located at his home].) Kuhn argues Officer Good could have taken additional steps to verify he was living at the Culver City address, still owned the computer, and had the computer with him, such as conducting surveillance or checking utility, rent, Internet provider, and
3 U.S. v. Rowland (10th Cir. 1998)
145 F.3d 1194, 1205, cited by Kuhn, is factually distinguishable. That case involved an “anticipatory warrant” (that is, a warrant contingent on the occurrence of an anticipated future event), where government agents mailed child pornography to the defendant’s post office box as part of a sting operation. Because the delivery was made to the post office box, rather than the house to be searched, and the affidavit failed to establish a nexus between the contraband or criminal activity and the house, the warrant was invalid. (Id. at p. 1206.) The instant case does not involve similar facts. 12 Department of Motor Vehicles records. He also complains that Good failed to establish the computer was not accessed by other persons, or via an unsecured Internet connection. Such further investigation and information might have bolstered the probable cause showing, but was not required to establish it. “ ‘[T]he term “probable cause” . . . means less than evidence which would justify condemnation.’ ” (United States v. Ventresca (1965)
380 U.S. 102, 107.) Kuhn’s arguments attempt to “sidestep the ‘fair probability’ standard and elevate probable cause to a test of near certainty,” in contravention of the teachings of the Supreme Court. (U.S. v. Gourde, supra, 440 F.3d at p. 1072; Illinois v. Gates, supra, 462 U.S. at p. 235.) Kuhn’s citation to cases in which a more extensive investigation was completed and additional evidence was presented in support of a warrant is unavailing. Each case must be considered on its own facts (People v. Carrington, supra, 47 Cal.4th at p. 163), and the circumstance that more, or stronger, evidence was present in another case does not demonstrate the probable cause showing was insufficient here. b. The warrant affidavit was not based upon unsupported conclusions. Kuhn next contends the warrant affidavit failed to establish probable cause because it was based on unsupported conclusions. We disagree. An affidavit based on mere suspicion or belief, or stating a mere conclusion without supporting facts, is insufficient to establish probable cause. (Illinois v. Gates, supra, 462 U.S. at p. 239; People v. Garcia (2003)
111 Cal. App. 4th 715, 721.) Kuhn first attacks the portion of the affidavit in which Officer Good described the typical characteristics of persons who possess child pornography. Kuhn points to Good’s statements that: (1) certain characteristics were “generally found in varying combinations in people who produce, trade, distribute or possess images of child pornography”; (2) such persons “rarely, if ever, dispose of sexually explicit images of minors because the images are treated as prized possessions”; (3) “collectors of child pornography generally prefer to store images in electronic format as computer files”; and (4) collectors will go to great lengths to protect their pornography from discovery. According to Kuhn, Good failed to provide facts to support these statements, explain 13 “what he mean[t] by a ‘collector’ of child pornography,” or state facts showing Kuhn met the definition of a collector. These contentions are meritless. As noted, the opinions of an experienced officer may be considered in the probable cause determination. (People v. Nicholls, supra, 159 Cal.App.4th at p. 711; People v. Garcia, supra, 111 Cal.App.4th at p. 721; People v. Deutsch (1996)
44 Cal. App. 4th 1224, 1232.) The affidavit here detailed Good’s training in the area of investigating child pornography crimes, which included, in addition to training at the police academy and through Peace Officer Standards and Training courses, over 120 hours of training on Internet crimes involving children.4 He had personally examined digital videos, videotapes, and computer files depicting child pornography during the course of his work. It is not a stretch to believe Good’s training and experience encompassed the challenged aspects of the affidavit. Good provided an explanation of why possessors of child pornography prefer to store it on computers as electronic files: “The computer’s ability to store images in digital format makes a computer an ideal repository for child pornography. Portable disks can contain thousands . . . of child pornography images. The portable digital media are particularly well suited to conceal images of child pornography.” The statement that collectors attempt to conceal pornography was based on Good’s personal experience; as he explained in the affidavit, “I have personally witnessed collectors going to great lengths to protect their collection from discovery.” Thus, none of these statements lacked a sufficient factual foundation. Nor are we persuaded by Kuhn’s argument that Good failed to adequately define “collector.” The term, as used in the affidavit, is readily understandable by reference to 4 Good had attended a 36-hour Internet Crimes Against Children Investigative Techniques course through the Office of Juvenile Justice and Delinquency Prevention; a 36-hour Internet Crimes Against Children Undercover Chat Class taught by experts in the field, which included instruction on the preservation of digital evidence; 20 hours of training by experts at the 2009 Silicon Valley Internet Crimes Against Children Conference; and 36 hours of training at the 2010 Internet Crimes Against Children National Conference, where experts instructed regarding the investigation of crimes related to the sexual exploitation of children on the Internet. 14 its plain meaning, that is, a person who downloads or otherwise obtains, and keeps, child pornography. There was a factual basis for a conclusion Kuhn was a collector who would retain his child pornography. The affidavit stated that on July 26, 2006, an IP address later connected to Kuhn was sharing 20 files with titles indicating child pornography. On January 7, 2010, Kuhn’s IP address was “identified 3 times” as “flagged for having SHA1 values of known child pornography.” A person who has over 20 child pornography files can reasonably be considered a collector. Kuhn also complains that Officer Good failed to describe the contents of the SHA1 files identified on January 7, 2010. From this he reasons that there was insufficient information the January 7 files “really [did] involve child pornography.” Not so. Good explained at length that a SHA1 value is essentially a digital signature, and no two files will have the same SHA1 value unless they are identical. By matching SHA1 values with files already identified as containing child pornography, an investigator could reliably determine that a file contained such material, without actually viewing its contents. The affidavit stated that a detective “discovered that IP address 76.171.169.96 was identified 3 times on January 7, 2010, as flagged for having SHA1 values of known child pornography.” Because the files, identified by their unique digital signatures, had already been determined to contain child pornography, Good did not need to further describe the files’ contents in order for the trial court to reasonably conclude they involved child pornography. Kuhn next avers that Good’s statement that possessors of child pornography always keep it is an impermissible “ ‘profile’ allegation that does not provide probable cause.” In support, he cites Richards v. Wisconsin (1997)
520 U.S. 385, 394. In Richards, the United States Supreme Court held that the Fourth Amendment does not permit a blanket exception to the knock-and-announce requirement in felony drug investigations. (Id. at pp. 387-388.) Although felony drug investigations frequently involve both danger to police officers and the likelihood evidence will be destroyed if advance notice is given, this did not justify dispensing with a case-by-case evaluation of the manner in which a search is executed. (Id. at pp. 391, 394.) Kuhn attempts to 15 analogize Richards and similar cases (e.g., U.S. v. Granville (9th Cir. 2000)
222 F.3d 1214, 1219; People v. Gastelo (1967)
67 Cal. 2d 586, 588), arguing that “there is no such thing as ‘profile probable cause’ to allow the search of the residence for items of a crime without individual specific information that evidence of a crime would be at that location at that time.” But this case does not involve a proposed blanket exception to the knock-and- announce rule; Good’s statements about the proclivities of possessors of child pornography were not used to justify a per se exception to Fourth Amendment requirements. The warrant affidavit here did contain specific information regarding Kuhn that provided probable cause for the search. Indeed, numerous federal courts have found similar statements by affiant officers supported a probable cause finding. (See, e.g., U.S. v. Lacy, supra, 119 F.3d at p. 746; U.S. v. Gourde, supra, 440 F.3d at p. 1072 [“[t]he details provided on the use of computers by child pornographers and the collector profile” provided support for a finding of probable cause]; U.S. v. Riccardi (10th Cir. 2005)
405 F.3d 852, 860-861 [probable cause finding based in part on “the observation that possessors often keep electronic copies of child pornography”]; Vosburgh, supra, 602 F.3d at p. 528; U.S. v. Lemon, supra, 590 F.3d at p. 615 [“Many courts, including our own, have given substantial weight to testimony from qualified law enforcement agents about the extent to which pedophiles retain child pornography”]; U.S. v. Richardson, supra, 607 F.3d at p. 370, and cases cited therein].) U.S. v. Weber (9th Cir. 1990)
923 F.2d 1338, and U.S. v. Zimmerman (3d Cir. 2002)
277 F.3d 426, cited by Kuhn, are distinguishable on their facts.5 5 In Weber, the Ninth Circuit rejected information regarding the practices of child molesters because there was “not a whit of evidence” in the affidavit indicating the defendant was a child molester. (U.S. v. Weber, supra, 923 F.2d at p. 1345.) In Zimmerman, the warrant application contained no information suggesting the defendant ever possessed child pornography in his home, and only minimal, stale evidence suggested adult pornography would be found there; on these facts, there was no probable cause to search for either. (U.S. v. Zimmerman, supra, 277 F.3d at pp. 433-435.) In contrast, here the affidavit contained sufficient evidence Kuhn had downloaded and collected files containing child pornography on his computer, which could reasonably be 16 c. The warrant affidavit did not contain recklessly misleading statements. Kuhn next contends his motions should have been granted because the affidavit contained recklessly misleading statements. He is incorrect. A defendant has a limited right to challenge the veracity of statements contained in an affidavit of probable cause made in support of the issuance of a search warrant. (Franks v. Delaware (1978)
438 U.S. 154, 155-156; People v. Scott, supra, 52 Cal.4th at p. 484; People v. Lewis and Oliver (2006)
39 Cal. 4th 970, 988.) When presented with such a challenge, a trial court must conduct an evidentiary hearing on the question if the defendant makes a substantial showing that (1) the affidavit contains statements that are deliberately false or were made in reckless disregard of the truth, and (2) the affidavit’s remaining contents, after the false statements are excised, are insufficient to support a finding of probable cause. (People v. Bradford (1997)
15 Cal. 4th 1229, 1297; Scott, at p. 484; Lewis and Oliver, at p. 989; People v. Luera (2001)
86 Cal. App. 4th 513, 524- 525.) If the statements are proved false or reckless at the hearing, they must be excised. If the remaining contents of the affidavit are insufficient to establish probable cause, the warrant must be voided and any evidence seized pursuant to the warrant suppressed. (Franks v. Delaware, supra, at pp. 155-156; Bradford, at p. 1297.) “Innocent or negligent misrepresentations will not support a motion to traverse.” (Scott, at p. 484; Lewis and Oliver, at pp. 988-989.) The defendant must make his or her showing by a preponderance of the evidence, and the affidavit is presumed valid. (Scott, at p. 484.) Echoing his arguments in the preceding section, Kuhn urges that Officer Good’s statements that collectors of child pornography typically store such materials as computer files and go to great lengths to protect them from discovery were “certainly reckless.” He repeats his concerns that the affidavit did not sufficiently define “collector” or provide information showing he was a collector. We have already explained that the affidavit did contain information sufficient to show Kuhn was a collector of child pornography. It expected to be at the Culver City address. (See U.S. v. Lacy, supra, 119 F.3d at p. 746, fn. 6 [distinguishing Weber]; Vosburgh, supra, 602 F.3d at pp. 530-531 [distinguishing Zimmerman]; People v. Nicholls, supra, 159 Cal.App.4th at pp. 713-714.) 17 could not have been “reckless” for Good to describe the habits of collectors of child pornography, as such information was relevant and based upon his training and expertise. Kuhn also complains that his child pornography was not hidden, but was available to the general public through Gnutella. Assuming this assertion is accurate, it does not demonstrate the falsity of Good’s statement that collectors often attempt to hide their materials. Kuhn further complains that the affidavit contained an inaccurate statement that all three of the co-occupants of the Playa Del Rey apartment filed change of address forms in March 2010. According to the affidavit, Postal Inspector Harjala told Good that Serrano, Pederson, and Nicholas also filled out change of address forms indicating a move from the Playa Del Rey apartment to the Culver City apartment. According to a declaration filed by Kuhn’s counsel in support of the suppression motion below, when the warrant was executed, “Serrano denied ever living at 7777 W. 91st Street . . . and Michael Kuhn and Jeffrey Pederson also denied that Felipe Serrano lived there.” Kuhn asserts that this inaccuracy “calls into question all the information from the Postal Inspector.” It does not. Assuming arguendo that counsel’s averments were accurate, they do not demonstrate any deliberately false or recklessly misleading statements by Good. Even if Harjala was mistaken, there is no reason to assume Good knew or had any reason to doubt her statements. (See People v. Lewis and Oliver, supra, 39 Cal.4th at p. 989; People v. Lieng (2010)
190 Cal. App. 4th 1213, 1229.) Moreover, excising this information from the warrant affidavit would have had no effect on the probable cause showing. The federal cases cited by Kuhn (United States v. Stanert (9th Cir. 1985)
762 F.2d 775; United States v. Davis (9th Cir. 1983)
714 F.2d 896; United States v. Chesher (9th Cir. 1982)
678 F.2d 1353; U.S. v. DeLeon (9th Cir. 1992)
979 F.2d 761), are not factually similar to the instant matter. 18 3. The warrant was not an overbroad “general warrant,” either as written or as executed . Appellant next avers that the search warrant was an impermissible “general warrant” that allowed a search for “essentially anything.” He is incorrect. The Fourth Amendment requires that a search warrant particularly describe the place to be searched and the things to be seized. (People v. Eubanks, supra, 53 Cal.4th at p. 133; U.S. Const., 4th Amend.; see also Cal. Const., art. I, § 13; § 1525.) The Constitution prohibits the issuance of “ ‘[g]eneral warrants’ ” that allow for a “ ‘ “general, exploratory rummaging in a person’s belongings.” ’ ” (People v. Ulloa, supra, 101 Cal.App.4th at p. 1004, citing Andresen v. Maryland (1976)
427 U.S. 463.) The particularized description requirement “ ‘ “ ‘makes general searches . . . impossible and prevents the seizure of one thing under a warrant describing another. As to what is to be taken, nothing is left to the discretion of the officer executing the warrant.’ ” [Citations.]’ ” (Ulloa, at p. 1004.) A warrant that fails to particularly describe the evidence sought is unconstitutional. (People v. Superior Court (Nasmeh) (2007)
151 Cal. App. 4th 85, 95 (Nasmeh).) “ ‘Specificity has two aspects: particularity and breadth. [] Particularity is the requirement that the warrant must clearly state what is sought. [Citation.] Breadth deals with the requirement that the scope of the warrant be limited by the probable cause on which the warrant is based.’ ” (Ulloa, at p. 1005.) Whether a warrant is sufficiently particular is a question of law subject to independent review by an appellate court. (People v. Eubanks, supra, 53 Cal.4th at p. 133; People v. Kraft, supra, 23 Cal.4th at p. 1041; Nasmeh, supra, 151 Cal.App.4th at p. 95.) In analyzing this question, we consider the purpose of the warrant, the nature of the items sought, and the totality of the circumstances surrounding the case. “A warrant that permits a search broad in scope may be appropriate under some circumstances, and the warrant’s language must be read in context and with common sense.” (Eubanks, at pp. 133-134.) Here, the warrant specified that the areas to be searched were the Culver City apartment, including “any attics, basements, garages, storage lockers, safes, buildings 19 attached or unattached that are readily accessible to, under the control of or used by the occupants. It is also to include the vehicles parked on the property, adjacent to the property or in the street that are owned by or under the control of any occupants of” the Culver Boulevard apartment. The “subject items” to be seized were described as: (1) “Any digital device capable of storing any ‘writing’ as defined by Evidence Code [s]ection 250 of child pornography as defined by California Penal Code [s]ection 311”; and (2) “Any ‘writing’ that constitutes evidence of child sexual exploitation as defined by California Penal Code [s]ection 311.3.” The warrant further defined “writing” and “digital device.”6 The warrant allowed any digital devices or writings seized to be removed and subsequently searched for: visual depictions of minors engaged in sexually explicit conduct as defined in section 311; writings pertaining to the possession, production, reproduction, receipt, or distribution of such depictions; writings sent with the intent to seduce a minor, or for purposes of arranging to meet with a minor for the purpose of sexually exploiting the minor; writings showing use of digital devices containing such evidence; credit card information, bills, and payment records for Internet services and receipt of child pornography; writings tending to identify the children depicted; items that would show an unusual interest in children or children’s activities, including collections of photographs and magazines depicting children; and writings showing dominion and 6 The warrant defined “writing” as “handwriting, typewriting, printing, Photostatting, photographing, photocopying, transmitted by electronic mail or facsimile, and every other means of recording upon any tangible thing, any form of communication or representation, including letters, words, pictures, sounds, or symbols, or combinations thereof, and any record thereby created, regardless of the manner in which the record has been stored.” “ ‘[D]igital device’ ” included “any electronic system or device capable of storing and/or processing data in digital form, including: central processing units; laptop or notebook computers; personal digital assistants; wireless communication devices such as telephone paging devices, beepers, and mobile telephones; peripheral input/output devices such as keyboards, printers, scanners, plotters, monitors, and drives intended for removable media; related communications devices such as modems, cables, and connections; storage media such as hard disk drives, floppy disks, compact disks, magnetic tapes, and memory chips; and security devices.” 20 control of the property searched. The affidavit explained that searching digital devices is a highly technical process requiring expertise and specialized equipment. Digital data is vulnerable to inadvertent or intentional modification or destruction, and in order to recover hidden, deleted, compressed, encrypted, or password protected data, examination in a controlled environment such as a law enforcement laboratory is essential to a complete and accurate analysis. Moreover, the volume of data typically stored on digital devices is so large as to make it impractical to search them at the time the warrant is executed. a. Particularity. It is readily apparent from the foregoing that the warrant described the items to be seized with sufficient particularity. (See People v. Ulloa, supra, 101 Cal.App.4th at p. 1005.) It did not provide for a “wide open” search for “evidence of general offenses not mentioned in the affidavit,” or seizure of “virtually all ‘writing’ in the apartment,” as Kuhn contends. The affidavit specifically identified the alleged criminal activities at issue. It authorized officers to search only the apartment and areas under the occupants’ control, only for writings and digital devices related to child pornography activities. Officers had no discretion to seize writings that did not pertain to child pornography, or search any items that could not contain such writings. Kuhn argues the warrant was not sufficiently precise because it failed to name him or his roommates specifically; failed to describe the subject computer by its IP address; and failed to list the “14 kids” video by name. But the “14 kids” file and the computer’s IP address were described elsewhere in the affidavit and obviously fell within the categories of items listed in the warrant. It was also clear from the affidavit that Kuhn was one of the occupants of the Culver City apartment, and the main focus of the search. Under these circumstances, we do not discern how the failure to include his name, the “14 kids” file name, or the computer’s IP address in the listing of items to be seized rendered the warrant unconstitutionally imprecise. “ ‘[T]he requirement that a search warrant describe its objects with particularity is a standard of “practical accuracy” rather 21 than a hypertechnical one.’ [Citations.]” (Nasmeh, supra, 151 Cal.App.4th at p. 96; see also People v. Smith (1994)
21 Cal. App. 4th 942, 948-949.) b. Overbreadth. Nor was the warrant’s scope overbroad. To the contrary, “the breadth of the warrant . . . was commensurate with the scope of the investigation.” (People v. Kraft, supra, 23 Cal.4th at p. 1043.) As described ante, there was probable cause to believe Kuhn downloaded, possessed, or shared child pornography on his computer at his apartment. Based on his training and experience, Officer Good averred that child pornography collectors “store the images in many different locations such as their home, their vehicle, their work areas, and other areas under their control” and sometimes go to great lengths to hide their pornography. Therefore, the search of Kuhn’s entire apartment and other areas on the premises where he could have stored or concealed child pornography was reasonable and within the scope of the probable cause showing. “The connection between the items to be seized and the place to be searched need not rest on direct observation. It may be inferred from the type of crime involved, the nature of the item, and the normal inferences as to where a criminal might likely hide incriminating evidence.” (People v. Miller, supra, 85 Cal.App.3d at p. 201.) The warrant was not overbroad in regard to the categories of writings sought. Obviously, a search for writings containing actual child pornography was justified by the probable cause showing. Evidence showing ownership of seized digital devices, payment for internet services, and payment for pornography itself was relevant to the determination of who in the apartment had downloaded the pornography. (See People v. Eubanks, supra, 53 Cal.4th at pp. 133-134 [search for items showing “dominion and control” was not overly broad or nonparticular]; People v. Nicolaus (1991)
54 Cal. 3d 551, 575 [officers acted properly in seeking independent evidence to establish defendant’s occupancy of apartment and control over evidence seized therefrom].) Likewise, items showing an unusual interest in children potentially had relevance to prove possession of child pornography. 22 Kuhn nevertheless contends the scope of the warrant was overbroad in several respects. He avers the warrant improperly allowed for the seizure of all digital devices in the apartment, whereas Good only had information that the single computer with the IP address 76.171.169.96 contained child pornography files. But it is common knowledge that computer files can be moved, copied, or stored on more than one device. Therefore, the warrant provided probable cause to search digital devices in addition to the single computer previously identified. In a similar vein, he contends that the warrant should not have authorized a search for anything beyond the “14 kids” video or “at most” the additional SHA1 files identified in January 2010. The trial court found this contention “absurd.” We agree. We see no reason why the search had to be limited to the files already identified. (See Andresen v. Maryland, supra, 427 U.S. at p. 479, fn. 10 [warrant allowing for “ ‘fruits, instrumentalities and evidence of crime at this [time] unknown’ ” was lawful because in context, the phrase permitted officers to seize evidence of other fraudulent real estate transactions relevant to the defendant’s methods and motives in the charged crime]; People v. Eubanks, supra, 53 Cal.4th at p. 134 [discussing Andresen].) U.S. v. Rabe (9th Cir. 1988)
848 F.2d 994, cited by Kuhn, does not suggest a contrary conclusion. In Rabe, the Ninth Circuit rejected an overbreadth challenge where the warrant for the most part limited the officer’s search to materials depicting minors engaged in sexually explicit conduct, as well as documents evidencing the purchase, sale, or trade of such material. (Id. at pp. 997-998.) Rabe undercuts, rather than supports, Kuhn’s contention. Contrary to Kuhn’s argument, the instant case bears no resemblance to People v. Frank (1985)
38 Cal. 3d 711, or the federal cases he cites. Next, Kuhn complains the search was overbroad as to time, because there was no limit on the dates of materials to be seized and searched. While such an omission might be problematic in certain cases, here it was not. The fact a writing was not recent would not negate its relevance: if, for example, Kuhn possessed vintage magazines or photos showing child pornography, he would still have been in violation of section 311.11. 23 Nor was suppression required because the warrant allowed officers to search for writings showing attempts to seduce or arrange a meeting with a minor. Kuhn argues that because Officer Good had no information he had or would engage in such behavior, there was no probable cause to seize items related to such activities. We do not necessarily agree with this contention. “[T]here is no requirement that each item seized be supported by probable cause” and no requirement “that there must be a precise correlation between the items in the warrant and the probable cause declarations in the affidavit.” (People v. Ulloa, supra, 101 Cal.App.4th at pp. 1005, 1007; People v. Kraft, supra, 23 Cal.4th at p. 1050.) But we need not reach this question because the record does not reflect that any evidence Kuhn attempted to meet with or seduce a minor was recovered in the search. Therefore, even if this aspect of the warrant was overbroad, he has no cause to complain. (See People v. Carpenter (1999)
21 Cal. 4th 1016, 1043-1044 [defendant contended portions of warrant were overbroad; however, he “has not identified any item seized under any of [the assertedly overbroad] provisions that was admitted at trial. Accordingly, even if we assume some provision of the warrant was overbroad, defendant has not shown that any evidence should have been suppressed”]; People v. Camarella (1991)
54 Cal. 3d 592, 607, fn. 7 [“ ‘Even when a warrant is overbroad in part, evidence will not be suppressed if it was seized pursuant to a portion of the warrant which was not’ ”]; People v. Farley (2009)
46 Cal. 4th 1053, 1101-1102; U.S. v. Rabe, supra, 848 F.2d at p. 998 [even if sections of warrant were impermissibly overbroad, “no evidence was obtained in reliance upon them”].) For the same reason, we reject Kuhn’s contentions that the warrant was overbroad because it allowed a search of the entire apartment, as opposed to only his room and the common areas; of buildings or vehicles accessible to the all occupants of the apartment; and of computers and digital equipment that belonged to his roommates, rather than to him. Again, while we do not necessarily agree these categories were overbroad, the only items seized in the search were found in Kuhn’s bedroom in the Culver City apartment. Because no items were seized pursuant to the portions of the warrant Kuhn contends were overbroad, he fails to show suppression of any of the evidence was required. (People v. 24 Carpenter, supra, 21 Cal.4th at pp. 1043-1044; People v. Camarella, supra, 54 Cal.3d at p. 607, fn. 7; People v. Farley, supra, 46 Cal.4th at pp. 1101-1102.) Kuhn argues that as executed, the search actually conducted amounted to a general warrant search. (See United States v. Rettig (9th Cir. 1978)
589 F.2d 418, 423 [although warrant was not a general warrant on its face, agents did not confine their search in good faith to the objects of the warrant].) The only basis for Kuhn’s assertion appears to be that the officers searched “all the digital devices in the apartment for essentially any writing or crime involving children.” However, as we have explained, the warrant properly allowed for a search of all digital devices. Kuhn points to nothing in the record showing the officers searched for evidence of crimes other than those related to child pornography, or otherwise exceeded the parameters of the warrant. Finally, Kuhn complains that “the search warrant did not set forth a protocol for a limited search of the digital storage devices” and “did not restrict its execution to a digital expert using a ‘hashing’ program.” However, Kuhn cites no California or United States Supreme Court case requiring such a protocol. The Ninth Circuit cases he does cite— U.S. v. Comprehensive Drug Testing, Inc. (9th Cir. 2010)
621 F.3d 1162[2010 U.S. App. LEXIS 19070] (CDT), and United States v. Tamura (9th Cir. 1982)
694 F.2d 591, do not impose such a requirement either. Tamura was decided in 1982, “just preceded the dawn of the information age,” and concerned paper, not electronic, records. (CDT, at p. 1169; see also U.S. v. Stabile (3d Cir. 2011)
633 F.3d 219, 324 [
2011 U.S. App. LEXIS 1945].) CDT involved a federal investigation into steroid use by professional baseball players. In CDT, the Ninth Circuit offered “[c]oncluding [t]houghts” about “the challenges faced by modern law enforcement in retrieving information it needs to pursue and prosecute wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal investigation.” (CDT, at p. 1175.) The court opined that the “pressing need of law enforcement for broad authorization to examine electronic records . . . creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant.” (Id. at p. 1176.) The court explained that electronic files are generally found on media containing “thousands or 25 millions of other files among which the sought-after data may be stored or concealed. By necessity, government efforts to locate particular files will require examining a great many other files to exclude the possibility that the sought-after data are concealed there.” (Ibid.) In a concurrence, Chief Judge Kozinski offered “guidance” about “how to deal with searches of electronically stored data in the future so that the public, the government and the courts of our circuit can be confident such searches and seizures are conducted lawfully.” (CDT, supra, 621 F.3d at p. 1178.) Among other things, Judge Kozinski suggested the following: “The process of sorting, segregating, decoding and otherwise separating seizable data (as defined by the warrant) from all other data should . . . be designed to achieve that purpose and that purpose only. Thus, if the government is allowed to seize information pertaining to ten names, the search protocol should be designed to discover data pertaining to those names only, not to others, and not those pertaining to other illegality. For example, the government has sophisticated hashing tools at its disposal that allow the identification of well-known illegal files (such as child pornography) without actually opening the files themselves. These and similar search tools should not be used without specific authorization in the warrant, and such permission should only be given if there is probable cause to believe that such files can be found on the electronic medium to be seized.” (Id. at p. 1179 (Kozinski, C.J., concurring), italics added.) Thus, apart from the facts that Chief Judge Kozinski’s concurrence comprised guidance, rather than mandatory procedures, and CDT is not binding on this court (People v. Williams (1997)
16 Cal. 4th 153, 190), CDT did not require that files in child pornography cases be examined only using a “hashing tool” as Kuhn appears to suggest.7 7 Because we conclude that the information in the affidavit provided probable cause to support the search warrant, which met the particularity requirement, we need not consider the People’s assertion that the good faith exception to the warrant requirement applies. (People v. Jones, supra, 217 Cal.App.4th at p. 742.) 26 DISPOSITION The judgment is affirmed. NOT TO BE PUBLISHED IN THE OFFICIAL REPORTS ALDRICH, J. We concur: CROSKEY, Acting P. J. KITCHING, J. 27
Document Info
Docket Number: B243792
Filed Date: 10/24/2013
Precedential Status: Non-Precedential
Modified Date: 10/30/2014