People v. Ross CA4/3 ( 2020 )


Menu:
  • Filed 11/16/20 P. v. Ross CA4/3
    NOT TO BE PUBLISHED IN OFFICIAL REPORTS
    California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for
    publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication
    or ordered published for purposes of rule 8.1115.
    IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA
    FOURTH APPELLATE DISTRICT
    DIVISION THREE
    THE PEOPLE,
    Plaintiff and Respondent,                                          G057880
    v.                                                            (Super. Ct. No. 14HF2219)
    FRED HOWARD ROSS, JR.,                                                  OPINION
    Defendant and Appellant.
    Appeal from a judgment of the Superior Court of Orange County, Richard
    M. King, Judge. Affirmed.
    The Law Offices of Charles M. Farano and Charles M. Farano for
    Defendant and Appellant.
    Xavier Becerra, Attorney General, Lance E. Winters, Chief Assistant
    Attorney General, Susan Sullivan Pithey, Assistant Attorney General, Scott A. Taryle and
    Viet H. Nguyen, Deputy Attorneys General, for Plaintiff and Respondent.
    This appeal requires us to interpret Penal Code section 484e, which pertains
    to the theft of access cards (e.g., credit and debit cards) and account information related
    1
    thereto. Subdivisions (a), (c) and (d) identify three forms of theft that require the intent
    to defraud. The statute also describes a fourth form of theft, in subdivision (b), that does
    not require such intent. That provision applies when, within any consecutive 12-month
    period, the defendant acquires access cards issued to four or more persons under
    circumstances indicating the cards were taken in violation of subdivision (a), (c) or (d).
    Defendant Fred Ross, Jr., was convicted of, inter alia, seven counts of
    violating subdivision (d) for acquiring the credit card numbers of seven different victims
    with the intent to defraud. He does not dispute there is sufficient evidence to support his
    convictions on those counts. However, he contends that instead of being charged with
    seven counts under subdivision (d), he should have only been charged with one count
    under subdivision (b). We disagree. When, as here, the evidence shows the defendant
    unlawfully obtained credit card information from multiple victims with fraudulent intent,
    the prosecution has the discretion to allege multiple violations of subdivision (d) in lieu
    of a single violation of subdivision (b). Accordingly, we affirm the judgment.
    FACTS
    On January 26, 2013, defendant entered the Active Ride skateboard and
    apparel store at the Irvine Spectrum mall. He walked directly to the watch case and told
    the clerk he wanted to buy a Nixon ceramic, the most expensive watch in the store. The
    clerk thought it odd defendant did not want to try on the watch before buying it, but he
    proceeded to the checkout counter with the timepiece. Defendant grabbed a t-shirt and
    hat off the shelves and met him there momentarily.
    The total sales price for the merchandise was around $3,000. Defendant
    tendered a Visa card for the purchase, but when the clerk swiped it through the magnetic
    1
    All statutory references are to the Penal Code, and all subdivision references are to section 484e.
    2
    credit card reader, no information came up on his computer screen. This was unusual;
    typically, when a credit card is swiped, its number and user’s name appear on the screen.
    When told his card was declined, defendant gave the clerk another credit card. When the
    clerk swiped that one, the same thing happened.
    Defendant told the clerk he would come back later for his merchandise.
    After he left the store, the clerk swiped his own credit card to see if the reader was
    working and saw that it was. He notified a mall security guard, who spotted defendant
    walking toward the parking structure. The guard called the police, and within minutes,
    Irvine police officers arrived on the scene and detained defendant.
    During the detention, the officers legally searched defendant’s backpack
    and found a laptop computer and linen paper. They also searched his wallet and found
    two counterfeit $50 bills that had the same texture as the linen paper. In addition, the
    2
    police found about 45 access cards in defendant’s possession. Many of the cards had
    fake logos and had been altered to show defendant’s name embossed on them.
    The investigation into the contents of defendant’s computer revealed a
    treasure trove of incriminating information. The police learned that not only had
    defendant obtained personal identification information on over 100 people without their
    knowledge, he had researched the physical properties of credit cards and attempted to
    create multiple phony driver’s licenses and checking accounts. And, he had acquired
    numerous credit card numbers of unsuspecting individuals. Defendant used those
    numbers to produce bogus credits cards and purchase goods from a variety of retailers.
    Following a jury trial, defendant was convicted of identity theft, second
    degree burglary, possessing counterfeit currency and forging an official seal. He was
    also convicted in counts five through eleven with credit card theft under section 484e,
    subdivision (d), for unlawfully acquiring credit card numbers from seven individuals with
    2
    The cards were a hodgepodge of credit, debit and gift cards.
    3
    the intent to defraud. The trial court sentenced him to seven years and eight months in
    custody for his crimes.
    DISCUSSION
    Defendant’s appeal is limited to the seven counts of credit card theft under
    subdivision (d). He accuses the trial court of improperly instructing the jury on those
    counts. He does not assert the trial court’s instructions incorrectly described the elements
    of subdivision (d), but rather insists he was improperly charged with seven violations of
    that subdivision. In defendant’s view, his extensive credit card thievery should have only
    been charged as one violation of subdivision (b), and the trial court should have
    instructed the jury only as to that single count. He also alleges his trial attorney was
    ineffective for failing to ensure he was charged, and the jury was instructed, in that
    fashion. We find defendant’s arguments unpersuasive.
    Section 484e states in full:
    “(a) Every person who, with intent to defraud, sells, transfers, or conveys,
    an access card, without the cardholder’s or issuer’s consent, is guilty of grand theft.
    “(b) Every person, other than the issuer, who within any consecutive 12-
    month period, acquires access cards issued in the names of four or more persons which he
    or she has reason to know were taken or retained under circumstances which constitute a
    violation of subdivision (a), (c), or (d) is guilty of grand theft.
    “(c) Every person who, with the intent to defraud, acquires or retains
    possession of an access card without the cardholder’s or issuer’s consent, with intent to
    use, sell, or transfer it to a person other than the cardholder or issuer is guilty of petty
    theft.
    “(d) Every person who acquires or retains possession of access card account
    information with respect to an access card validly issued to another person, without the
    cardholder’s or issuer’s consent, with the intent to use it fraudulently, is guilty of grand
    theft.”
    4
    The statute was enacted to protect innocent consumers from fraudulent
    practices involving access cards. (People v. Molina (2004) 
    120 Cal. App. 4th 507
    , 512,
    516 (Molina).) To that end, subdivision (d) targets the unlawful acquisition or retention
    of “access card account information.” (§ 484e, subd. (d).) It was intended to protect
    people from the “injury, expense and inconvenience arising from the fraudulent use” of
    such information. 
    (Molina, supra
    , 120 Cal.App.4th at p. 516.)
    Consistent with the statute’s goal, the term “access card” is broadly defined
    to include any card, plate, code or account number that can be used to obtain anything of
    value. 
    (Molina, supra
    , 120 Cal.App.4th at p. 512, citing § 484d, subd. (2).) Thus, “[a]n
    access card account number (such as a credit card number) is both an access card
    [citation] and access card account information.” (Id. at p. 517.)
    That point is central to defendant’s argument because by unlawfully
    acquiring the credit card numbers of the victims named in counts five thru eleven, he not
    only violated subdivision (d), which pertains to “access card account information,” he
    also may have violated subdivision (b), which speaks to the acquisition of “access cards.”
    Although the evidence at trial did not reveal when defendant acquired those credit card
    numbers, it is possible he acquired them within a consecutive 12-month period, as
    required under subdivision (b). Therefore, for purposes of the defendant’s argument we
    will assume his conduct implicated both subdivision (d) and subdivision (b).
    Still, that invites the broader question of whether the prosecution was
    required to charge defendant under subdivision (b) in lieu of subdivision (d). Comparing
    the wording of the two subdivisions, it is apparent they have different elements. Unlike
    subdivision (b), subdivision (d) only applies to access cards that were validly issued to
    another person. In addition, whereas subdivision (d) requires the intent to defraud,
    subdivision (b) merely requires the defendant to have reason to know the subject cards
    were obtained fraudulently.
    5
    In that sense, subdivision (b) is analogous to the crime of receiving stolen
    property, which is aimed at people who deal in stolen property, as opposed to people who
    steal it in the first place. (See People v. Jaramillo (1976) 
    16 Cal. 3d 752
    , 758 [receiving
    stolen property “‘is directed at the traditional “fence” and at those who lurk in the
    background of criminal ways in order to provide the thieves with a market or depository
    for their loot. Such offenses are essentially different from the actual theft of
    property.’”].) Indeed, a review of the legislative history materials pertaining to
    subdivision (b) confirms it was aimed at the “widespread racket in the sale of stolen
    credit cards” and intended to crack down on those who operate in that secondary market.
    (Analysis of Sen. Bill No. 1055 prepared for Sen. Jud. Com. hearing of June 1, 1967;
    C.E.B., Review of Selected 1967 Code Legislation, pp. 152-153.)
    The wording of subdivision (b) also supports the conclusion it was intended
    to target people who receive access cards after they have already been stolen. By its
    terms, the provision applies when the defendant “acquires” access cards he has reason to
    know were “taken or retained” under circumstances that violate subdivision (a), (c) or
    (d). (§ 484d, subd. (b).) This phrasing implies a two-step process in which the
    acquisition of the cards and the taking/retention thereof are carried out by different
    people at different times. Subdivision (b) was designed to ensure people involved in the
    second step of the process – receivers of stolen credit cards and credit card information –
    do not escape liability, even if they lack the intent to defraud.
    In contrast, subdivision (d) speaks to the first step of the process. It applies
    to any person who acquires access card account information with fraudulent intent, not
    someone who subsequently obtains that information.
    In this case, defendant’s conduct fits more squarely into subdivision (d)
    than subdivision (b) in that he unlawfully acquired the victims’ credit card numbers with
    the intent to use them fraudulently. In fact, the evidence showed he utilized the victims’
    credit card numbers to acquire a considerable amount of merchandise using the phony
    6
    credit cards he made from those numbers. Because defendant was not simply a
    repository for stolen credit numbers but was actively involved in their acquisition and
    harbored the intent to defraud, subdivision (d) is more descriptive of his conduct than
    subdivision (b).
    Even if both subdivisions were implicated under the facts of this case, the
    Molina decision supports respondent’s position that the prosecution was within its rights
    in charging defendant with violating subdivision (d) instead of subdivision (b). In
    Molina, the defendant was convicted of grand theft for violating subdivision (d). He
    argued his conviction should be overturned because his conduct also came within the
    terms of subdivision (c), which constitutes mere petty theft. However, the Molina court
    rejected this argument out of deference to the prosecution’s charging authority. The court
    held that even if the two subdivisions were coextensive, the prosecution could charge the
    harsher subdivision, so long as its decision to do so was not motivated by a
    discriminatory intent. 
    (Molina, supra
    , 120 Cal.App.4th at pp. 517-518.)
    Defendant does not ascribe any discriminatory motive to the prosecution’s
    decision to charge him with violating subdivision (d) as opposed to subdivision (b).
    Rather, he contends the decision violates the holding of People v. Shabtay (2006) 
    138 Cal. App. 4th 1184
    (Shabtay).) However, Shabtay addressed a different issue altogether.
    In that case, the court was not asked to decide whether it was permissible for the
    prosecution to charge the defendant with one particular subdivision of section 484e over
    another. Instead, the court was confronted with the question of whether the defendant
    could be charged with multiple violations of subdivision (b) based on his acquisition of
    11 access cards over a 12-month period. (Id. at pp. 1187-1188.)
    The state argued defendant was guilty of two counts of subdivision (b), one
    for the first four cards he acquired, and one for the second four cards he acquired.
    However, based on the plain language of subdivision (b), the Shabtay court disagreed.
    Given that subdivision defines grand theft as acquiring access cards of four or more
    7
    persons during a particular time span, the court ruled “that no matter how many cards are
    accessed in excess of four, there is only one offense within any consecutive 12-month
    period.” 
    (Shabtay, supra
    , 138 Cal.App.4th at p. 1191.) Thus, the defendant should have
    been charged and convicted of one count under subdivision (b), not two. (Id. at p. 1192.)
    Justice Turner concurred in this holding. But instead of basing his decision
    on the text of subdivision (b), he relied on the rule of lenity, which requires courts to
    interpret statutory provisions in favor of the defendant when they are susceptible of two
    reasonable interpretations. 
    (Shabtay, supra
    , 138 Cal.App.4th at pp. 1192-1196 [concur.
    opn. of Turner, P.J.].) Because none of the justices in Shabtay addressed the interplay
    between subdivision (b) and subdivision (d), that decision is not controlling on the
    question of whether defendant was properly charged with violating subdivision (d) in our
    case. (See People v. Evans (2008) 
    44 Cal. 4th 590
    , 599 [cases are not authority for issues
    they did not consider or decide].)
    However, it is important to point out that, in contrast to subdivision (b), the
    provision at issue in Shabtay, subdivision (d) does not define the type of theft it describes
    in relation to any time period or number of victims. The provision is not ambiguous in
    terms of its application when multiple victims are involved; rather, it plainly applies
    whenever a defendant acquires access card account information with respect to a card
    that was validly issued to any other person. Because the wording of the statute is not
    uncertain in this regard, the rule of lenity does not apply. (See People v. Avery (2002) 
    27 Cal. 4th 49
    , 58 [rule only applies when there is an egregious ambiguity in a statute such
    that the court can only guess what the Legislature intended].)
    In his reply brief, defendant correctly points out People v. Bailey (1961) 
    55 Cal. 2d 514
    (Bailey) held that a person generally may not be convicted of more than one
    theft if he commits multiple acts of theft pursuant to a single overarching theme.
    However, the Bailey decision does not apply to cases such as the present one, where the
    8
    defendant steals from multiple victims. (People v. Reid (2016) 
    246 Cal. App. 4th 822
    ,
    3
    831-835.) Therefore, defendant cannot avail himself of that decision either. (Ibid.)
    In attacking his convictions under subdivision (d), defendant also alludes to
    the so-called Williamson rule. (See In re Williamson (1954) 
    43 Cal. 2d 651
    .) That rule
    “precludes prosecution under a general statute when a more specific one describes the
    conduct involved.” (Finn v. Superior Court (1984) 
    156 Cal. App. 3d 268
    , 271.) But the
    rule only applies when “‘each element of the general statute corresponds to an element on
    the face of the special statute’ or (2) when ‘it appears from the statutory context that a
    violation of the special statute will necessarily or commonly result in a violation of the
    general statute.’ [Citation.]” (People v. Murphy (2011) 
    52 Cal. 4th 81
    , 86.)
    As we have explained, the elements of subdivision (d), the supposed
    general statute in this case, do not correspond to the elements of subdivision (b), the
    purported special statute. Furthermore, a violation of subdivision (b) for receiving stolen
    credit card information will not necessarily or commonly result in a violation of
    subdivision (d) because people who deal in the secondary market for such information
    are often far removed from the initial taking process. And, there is no requirement that
    they possess the intent to defraud, which is a key distinguishing feature of subdivision
    (d). Suffice it to say, there is insufficient overlap between subdivision (b) and
    subdivision (d) to conclude the Williamson rule precludes application of subdivision (d)
    in this case.
    Defendant next invokes section 654 to overturn his convictions under
    subdivision (d). However, that section concerns multiple punishment, not multiple
    convictions. (People v. Correa (2012) 
    54 Cal. 4th 331
    , 336.) It does not mandate a
    reversal of defendant’s convictions in this case.
    3
    In People v. Whitmer (2014) 
    59 Cal. 4th 733
    , the Supreme Court further limited the reach of Bailey
    by ruling it does not apply if the defendant’s thefts were separate and distinct from each other. (Id. at p. 740.)
    However, that limitation does not apply here because the defendant’s thefts occurred before the Whitmer decision
    was handed down. (Id. at p. 742.)
    9
    Lastly, defendant contends his subdivision (d) convictions must be reversed
    on grounds of ineffective assistance. He contends his trial attorney was remiss for failing
    to challenge the prosecution’s decision to charge him with multiple violations of
    subdivision (d), as opposed to a single violation of subdivision (b). However, our
    foregoing discussion demonstrates defendant was properly charged with and convicted of
    seven counts of violating subdivision (d). Therefore, counsel was not derelict for failing
    4
    to mount a challenge to the charges. (Strickland v. Washington (1984) 
    466 U.S. 668
    .)
    DISPOSITION
    The judgment is affirmed.
    BEDSWORTH, ACTING P. J.
    WE CONCUR:
    FYBEL, J.
    THOMPSON, J.
    4
    The record shows defendant was actually represented by multiple attorneys over the course of his
    prosecution. In the conclusion section of his opening brief, he alleges he was “haphazardly ‘[k]icked around’” by
    his attorneys. However, other than faulting them for not contesting the charges under subdivision (d), defendant
    does not explain how his various attorneys failed to provide him with effective assistance or otherwise mistreated
    him. Therefore, we need not delve into his Sixth Amendment claim any further. (See Paterno v. State of California
    (1999) 
    74 Cal. App. 4th 68
    , 106 [appellant has the duty to explain the basis for the claims he raises on appeal].)
    10