People v. Bernal CA6 ( 2014 )


Menu:
  • Filed 9/11/14 P. v. Bernal CA6
    NOT TO BE PUBLISHED IN OFFICIAL REPORTS
    California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for
    publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication
    or ordered published for purposes of rule 8.1115.
    IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA
    SIXTH APPELLATE DISTRICT
    THE PEOPLE,                                                          H040437
    (Santa Clara County
    Plaintiff and Respondent,                                   Super. Ct. No. C1242138)
    v.
    JEREMY ROCHA BERNAL,
    Defendant and Appellant.
    I.        INTRODUCTION
    After the trial court denied his motion to suppress evidence, defendant Jeremy
    Rocha Bernal pleaded no contest to possession of child pornography. (Pen. Code,
    § 311.11, subd. (a).1) Defendant was placed on probation and ordered to serve four
    months in county jail plus 60 days of hard labor.
    On appeal, defendant contends the trial court erred by denying his motion to
    suppress. He argues that there was no probable cause to support issuance of a search
    warrant for his residence, which was associated with an internet protocol address from
    which child pornography was being transmitted. We disagree and will affirm the
    judgment.
    1
    All further statutory references are to the Penal Code unless otherwise indicated.
    II.    BACKGROUND
    A.     Factual Background
    On August 2, 2011, while working with the Silicon Valley Internet Crimes
    Against Children Task Force, San Jose Police Officer Russell Chubon applied for and
    obtained a search warrant for the premises of 752 Wedgewood Drive.
    In his probable cause statement, Officer Chubon described his training and
    expertise in investigating sexual assaults, child pornography, child sexual exploitation,
    and child molestation. His training included a 40-hour course on child pornography
    investigative techniques, a 28-hour course on child pornography peer-to-peer
    investigations, and a 21-hour course on commercial sexual exploitation of children.
    Officer Chubon explained that peer-to-peer networks are frequently used by
    persons trading in child pornography. A person can install peer-to-peer software in order
    to search for and download pornography that is located on other users’ computers.
    Officer Chubon further explained that Internet Protocol (IP) addresses are used to identify
    the location of computers on the internet. With an IP address, police can identify a user’s
    internet service provider, and the service provider can identify the account holder.
    On separate occasions, Officer Chubon and another officer had both used peer-to-
    peer software to locate a computer that was sharing files containing child pornography.
    The computer had an IP address of 98.248.73.18. That IP address was assigned to
    Comcast Cable Communications, Inc., which informed the officers that the account was
    associated with a residence at 752 Wedgewood Drive. The account was in defendant’s
    uncle’s name.
    On August 4, 2011, officers served the search warrant at 752 Wedgewood Drive, a
    three or four bedroom single family residence where five or six people lived, including
    defendant. In a hall closet, officers found compact discs and DVD’s containing child
    pornography. Defendant was present during the search and acknowledged the items in
    the closet belonged to him. Defendant’s sister confirmed that defendant had been
    2
    sleeping on the couch and keeping his belongings in the hall closet. Defendant’s sister
    also stated that defendant was in charge of maintaining the family computer.
    B.     Procedural Background
    Defendant was charged with possession of child pornography. (§ 311.11,
    subd. (a).) He subsequently filed a motion to quash the search warrant and suppress
    evidence. In the motion, defendant argued that the search warrant was issued without
    probable cause and that the good faith exception to the exclusionary rule did not apply
    because a reasonable and well-trained officer would have known that the affidavit failed
    to establish probable cause. Specifically, defendant argued that because his residence
    was equipped with an “open wireless router,” another person could have been linked into
    the IP address from which the child pornography had been shared. Defendant attached a
    declaration from an expert who asserted that “anyone in range of the wireless router
    could connect to the network in the Bernal residence without a password” and that
    activities performed by such a person could be traced back to the IP address associated
    with that residence.
    The prosecution filed a memorandum in opposition to defendant’s motion to
    suppress. The prosecution argued that probable cause to search existed despite the
    possibility that someone else had accessed the network at defendant’s residence, and that
    in any event, the officers executing the search relied in good faith on the issuance of the
    warrant.
    At the hearing on defendant’s motion to suppress, trial counsel asserted that an IP
    address is not associated with a particular computer, but with a signal. Since the signal
    came from a wireless network, it could have been accessed by someone outside the
    residence. He argued that because there was no “corroboration that this computer
    actually rested inside that house,” there was not a “fair probability” that the child
    pornography would be found in the house.
    3
    The trial court noted there was a “possibility” that someone outside the home had
    accessed the network, but that there was “still a fair probability” that the child
    pornography was actually located in the home. The trial court denied defendant’s motion
    to suppress.
    III.   DISCUSSION
    Defendant contends the trial court erred by denying his motion to suppress. He
    claims the search warrant affidavit was based on speculation that child pornography
    would be located at 752 Wedgewood Drive, since the IP address could have been
    accessed by someone else over the open wireless network.
    A.      Standard of Review
    “In ruling on a motion to suppress, the trial court must find the historical facts,
    select the rule of law, and apply it to the facts in order to determine whether the law as
    applied has been violated. [Citation.] We review the court’s resolution of the factual
    inquiry under the deferential substantial evidence standard. The ruling on whether the
    applicable law applies to the facts is a mixed question of law and fact that is subject to
    independent review. [Citation.]” (People v. Ramos (2004) 
    34 Cal. 4th 494
    , 505.)
    B.      Probable Cause Standard
    “Probable cause to search exists when, based upon the totality of the
    circumstances described in the affidavit, ‘there is a fair probability that contraband or
    evidence of a crime will be found in a particular place.’ [Citations.]” (People v. Farley
    (2009) 
    46 Cal. 4th 1053
    , 1098, quoting Illinois v. Gates (1983) 
    462 U.S. 213
    , 238.) “A
    ‘practical, nontechnical’ probability that incriminating evidence is involved is all that is
    required.” (Texas v. Brown (1983) 
    460 U.S. 730
    , 742.) “ ‘The process does not deal with
    hard certainties, but with probabilities.’ ” (Ibid.)
    4
    C.     Analysis
    Defendant has not cited, and we have not found, any published California case
    supporting his argument.2 Federal cases have uniformly rejected the claim that the use of
    an unsecured wireless network vitiates the probable cause that would otherwise exist to
    search the home of an Internet subscriber whose IP address is used to access child
    pornography. (See, e.g., United States v. Vosburgh (3d Cir. 2010) 
    602 F.3d 512
    , 526 &
    fn. 13 [listing cases]; United States v. Perez (5th Cir. 2007) 
    484 F.3d 735
    , 740 (Perez);
    United States v. Hay (9th Cir. 2000) 
    231 F.3d 630
    , 634-635; U.S. v. Carter (D. Nev.
    2008) 
    549 F. Supp. 2d 1257
    , 1267 [affidavit was not misleading insofar as it represented
    that there was probable cause to believe child pornography was located at premises
    associated with a particular IP address].)
    In Perez, the defendant claimed “that the association of an IP address with a
    physical address does not give rise to probable cause to search that address,” since
    neighbors could have accessed an unsecure wireless connection to make the illicit
    transmissions. 
    (Perez, supra
    , 484 F.3d at p. 740.) The Fifth Circuit rejected the claim:
    “[T]hough it was possible that the transmissions originated outside of the residence to
    which the IP address was assigned, it remained likely that the source of the transmissions
    was inside that residence. [Citation.] ‘[P]robable cause does not require proof beyond a
    reasonable doubt.’ [Citation.]” (Ibid., italics added, fn. omitted.)
    We agree with the federal cases cited above. Here, it was possible that the child
    pornography originated outside of the residence to which the IP address was assigned, but
    2
    Defendant cites several unpublished federal district court opinions that recognize
    it is possible for neighbors and passersby to access an unsecured wireless network, but he
    does not claim that any cases have held that this possibility vitiates probable cause for a
    search warrant. Defendant also asserts that “[r]ecognized experts in the area of cyber
    crimes have long agreed that the identification of an IP address alone is insufficient to
    support . . . the issuance of a search warrant,” and he quotes from a journal article, but
    provides an insufficient citation for the journal.
    5
    “it remained likely that the source of the transmissions was inside that residence.” (See
    
    Perez, supra
    , 484 F.3d at p. 740.) In other words, although it may not have been certain
    that the child pornography came from the residence associated with the IP address, there
    remained at least “a fair probability that contraband or evidence of a crime” would be
    found there. (Illinois v. 
    Gates, supra
    , 462 U.S. at p. 238.) The trial court did not err by
    denying defendant’s motion to suppress.
    IV.   DISPOSITION
    The judgment is affirmed.
    6
    ___________________________________________
    BAMATTRE-MANOUKIAN, ACTING P.J.
    WE CONCUR:
    __________________________
    MÁRQUEZ, J.
    __________________________
    GROVER, J.