People v. Kuhn CA2/3 ( 2013 )


Menu:
  • Filed 10/24/13 P. v. Kuhn CA2/3
    NOT TO BE PUBLISHED IN THE OFFICIAL REPORTS
    California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for
    publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication
    or ordered published for purposes of rule 8.1115.
    IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA
    SECOND APPELLATE DISTRICT
    DIVISION THREE
    THE PEOPLE,                                                          B243792
    Plaintiff and Respondent,                                   (Los Angeles County
    Super. Ct. No. BA385064)
    v.
    MICHAEL ERIC KUHN,
    Defendant and Appellant.
    APPEAL from a judgment of the Superior Court of Los Angeles County,
    Patricia M. Schnegg, Judge. Affirmed.
    Law Offices of Joseph Shemaria and Joseph Shemaria for Defendant and
    Appellant.
    Kamala D. Harris, Attorney General, Dane R. Gillette, Chief Assistant Attorney
    General, Lance E. Winters, Assistant Attorney General, Scott A. Taryle and Stacy S.
    Schwartz, Deputy Attorneys General, for Plaintiff and Respondent.
    Defendant and appellant Michael Eric Kuhn appeals from the judgment entered
    following his no contest plea to possession of child pornography, entered after the trial
    court denied his motion to quash and traverse a search warrant and suppress evidence.
    Kuhn contends the trial court erred by denying his motion. We affirm.
    FACTUAL AND PROCEDURAL BACKGROUND
    1. Facts.
    a. Issuance of search warrant for Kuhn’s apartment.
    On August 31, 2010, Los Angeles Police Department (L.A.P.D.) Officer Eric
    Good sought and obtained a warrant to search Kuhn’s Culver City apartment, vehicle,
    computer systems, and electronic equipment for child pornography and related materials.
    As pertinent here, the 19-page affidavit in support of the warrant stated the following.
    Officer Good had been employed by the City of Los Angeles since 2002, began
    working for the L.A.P.D.’s Juvenile Division in December 2008, and, when the affidavit
    was prepared, was assigned to the Juvenile Division’s Internet Crimes Against Children
    Unit (ICACU). One of the ICACU’s tasks was investigation of “child sexual predators
    who use computers and the Internet to pursue their sexual interest in children.” The
    affidavit described Good’s formal training and experience in the investigation of child
    abuse and exploitation, which included over 120 hours of training on crimes related to
    sexual exploitation of children on the Internet.
    Officer Good provided background information about users of child pornography.
    His affidavit stated: “I am aware that the following characteristics are generally found in
    varying combinations in people who produce, trade, distribute or possess images of child
    pornography: These people view children as sexual objects. They receive gratification
    from sexually explicit images of minors. They collect sexually explicit images of minors,
    which they use for their own sexual gratification and fantasy. They use these images as a
    means of reliving fantasies or actual sexual encounters. They rarely, if ever, dispose of
    sexually explicit images of minors because the images are treated as prized possessions.
    [¶] They store such images in many different formats including photographs, printouts,
    magazines, videotapes, and many other forms of digital media such as hard drives,
    2
    diskettes, CDs and/or DVDs and other storing devices,” and store them “in many
    different locations such as their home, their vehicle, their work areas, and other areas
    under their control.” Collectors of child pornography generally prefer to store images in
    electronic format as computer files. Officer Good had “personally witnessed collectors
    going to great lengths to protect their collection from discovery.”
    Such persons maintain images of minors with whom they had sexual contact; use
    the Internet to gain access to children for the purposes of sexual exploitation; and chat
    online with other suspects to share information on the sexual exploitation of children.
    Predators “will often exchange or purchase child pornography on the Internet or will
    entice children to meet with them for sexual purposes.”
    The affidavit described, in considerable detail, the technical process whereby
    investigators are able to identify persons who possess child pornography. Briefly
    summarized, that information included the following. The “Secure Hash Algorithm
    Version 1,” or “SHA1,” is a mathematical encryption method used to produce a unique
    digital signature of a computer file. No two files produce the same SHA1 value unless
    their contents are identical. Various government and private agencies cooperate to
    maintain a list of “verified positive child pornography SHA1 values.” Thus, the contents
    of computer files can be positively established without viewing the content, “once a
    known file with a certain SHA1 value has been identified.”
    Persons with an interest in child pornography frequently use peer-to-peer networks
    to trade and share such files. One such network is Gnutella, an “open-source,” publicly
    available network. Gnutella uses SHA1 values in its operation.
    On July 26, 2009, Detective Schlund identified a computer with the Internet
    Protocol, or IP, address of 76.171.169.96 as distributing images of child pornography via
    file sharing. Schlund observed that the computer was sharing a folder with 20 video files,
    all of which had titles that were indicative of child pornography. Schlund was unable to
    download files at that time due to a slow Internet connection. On July 28, 2009, by
    comparing the contents of the shared file with the library of known child pornography,
    3
    Schlund confirmed that at least one of the files in the shared folder depicted minors
    engaged in sexually explicit conduct, as defined by Penal Code section 311.
    Also on July 28, 2010, Schlund determined the Internet Service Provider for the
    computer was Time Warner Roadrunner. Schlund prepared a federal customs subpoena
    to obtain subscriber information.
    On September 8, 2009, Time Warner notified Schlund that Michael Kuhn, residing
    at an apartment located at 7777 West 91st Street in Playa Del Rey, was the subscriber
    assigned to the IP address of 76.171.169.96.
    On March 9, 2010, Officer Good matched the SHA1 signatures of known child
    pornography files with the files identified in the shared folder and confirmed that at least
    one of the files appeared to depict minors engaged in sexually explicit conduct. The file
    in question was a video entitled “ ‘14 kids teens women (porno-lolitas-preteens-
    reelkiddymov-r@ygold-hussyfans-underage-girls-children-pedofilia-pthc-ptsc-xxx-
    sexy).avi’ ” (hereinafter “14 kids”). (Bold in original omitted.) It was approximately
    30 minutes long and showed a montage of young girls between the ages of 3 to 11 years,
    orally copulating and “being vaginally penetrated by unknown adult male penises.”
    On May 4, 2010, an investigator checked to see if there was any further activity on
    IP address 76.171.169.96. By comparing SHA1 values, the investigator learned that the
    IP address “76.171.169.96 was identified 3 times on January 7, 2010, as flagged for
    having SHA1 values of known child pornography.”
    On July 22, 2010, Officer Good learned from a homeowners’ association
    representative at the Playa Del Rey apartment complex that Kuhn was not living at the
    apartment.
    On August 24, 2010, Good contacted Postal Inspector Harjala and asked if any
    change of address records existed for Kuhn. Harjala advised that Kuhn had filed a form
    on March 16, 2010, changing his address from the West 91st Street apartment to an
    apartment on Culver Boulevard, in Culver City. Harjala stated that Kuhn had not
    subsequently filed any additional change of address forms. Additionally, Harjala advised
    that three other persons—Felipe Serrano, Jeffrey Pederson, and Douglas Nicholas—had
    4
    also filed changes of address forms from the same Playa Del Rey apartment to the Culver
    Boulevard apartment.
    Based upon the foregoing, Officer Good opined that probable cause existed to
    show the crime of possession of child pornography in violation of Penal Code section
    311.11, subdivision (a), had been committed by a person residing at the Culver Boulevard
    address. Good then set forth, in considerable detail, information regarding the special
    circumstances related to searches of digital devices, explaining why they generally must
    be seized and examined by experts in a police laboratory, rather than at the scene of the
    search. Good also explained that “[e]lectronic files or remnants of such files can be
    recovered months or even years after they have been downloaded onto a hard drive,
    deleted or viewed via the Internet.”
    b. Search of Kuhn’s Culver City Apartment and discovery of child pornography.
    On September 1, 2010, Officer Good, along with other officers, executed the
    search warrant at Kuhn’s apartment in Culver City. Good seized two laptop computers,
    five hard drives, batteries and adaptors, memory cards, compact discs, a camera, a Time
    Warner bill, and a receipt, all found in Kuhn’s bedroom. A forensic examination of those
    items disclosed images of child pornography on one or more of the seized devices. When
    Good executed the search, he conducted a recorded interview of Kuhn. Kuhn admitted to
    Good that he had downloaded child pornography.1 Kuhn was arrested and charged with
    violating Penal Code section 311.11, subdivision (a)2 (possession of matter depicting a
    minor engaged in sexual conduct).
    c. Motion to quash and traverse the warrant and suppress evidence.
    Kuhn thereafter filed a motion pursuant to section 1538.5 to quash and traverse the
    search warrant and suppress the seized evidence and his statements. He alleged, inter
    alia, that the warrant affidavit was insufficient to establish probable cause because: (1) it
    1
    Because Kuhn pleaded no contest before trial, we glean these facts from the
    transcript of the preliminary hearing.
    2
    All further undesignated statutory references are to the Penal Code.
    5
    was based upon stale information and the “images in question were located at a different
    residence”; (2) the warrant affidavit contained intentionally misleading and/or false
    statements; (3) the warrant was a “prohibited general warrant” in that it was overbroad;
    and (4) the warrant was obtained without a good faith belief the affidavit provided
    sufficient probable cause to justify the search.
    On April 20, 2012, the trial court heard and denied Kuhn’s motion. The court
    credited Officer Good’s opinion that persons who possess child pornography rarely delete
    such files. It therefore rejected the argument that the information was too stale to
    establish probable cause, observing that child pornography was detected on Kuhn’s
    computer initially in July 2009 and again in January 2010. The court discounted Kuhn’s
    argument that the term “collector,” as used by Good in the warrant affidavit, was
    misleading, explaining the defense contention was “a linguistic argument that I do not
    find persuasive. [¶] . . . [¶] People who collect illegal material, I think it is reasonable to
    infer that they are going to be disinclined to delete such material and therefore there was
    nothing misleading provided to the issuing magistrate in that regard.” Furthermore, one
    week before issuance of the warrant, Good learned from Harjala that Kuhn had filed a
    change of address form. The court reasoned: “So this is a situation where law
    enforcement is not simply relying on information learned months before they enter the
    property in question but, in fact, take a very significant step to try and make sure that
    Mr. Kuhn has not moved to any new location and that investigation was done one week
    prior to the search.” The court expressed the view that people do not normally distance
    themselves from their personal computers, which are both highly portable and valuable.
    Common sense dictated that a computer owner would take his computer to his new
    residence. The court also rejected the argument that the warrant was overbroad: given
    the fact child pornography was discovered in July and again in January, “the investigation
    would suggest that there is a sufficient scope or breadth of material that needs to allow
    the investigating officer some degree of latitude to make sure that they’re not missing
    something. To suggest that they can only look for one particular title strikes this court as
    simply absurd.”
    6
    2. Procedure.
    After the trial court denied his suppression motion, Kuhn pleaded no contest to
    possession of child pornography (§ 311.11, subd. (a)). The court placed Kuhn on
    probation for three years, on the condition he serve two days in jail, with credit for two
    days served. It ordered that Kuhn register as a sex offender, and imposed a restitution
    fine, a suspended probation revocation restitution fine, a criminal conviction assessment,
    a court operations assessment, and a sex offender fine. Kuhn appeals.
    DISCUSSION
    Kuhn contends the trial court erred by denying his motions to quash and traverse
    the warrant and suppress evidence seized in the search, as well as his statements. He
    argues the affidavit in support of the search warrant failed to state facts sufficient to
    establish probable cause because it was based on stale information and contained
    unsupported conclusions and recklessly misleading misstatements; and the warrant was
    an overbroad “general warrant.” We disagree.
    1. Applicable legal principles.
    A search warrant may only be issued upon a showing of probable cause. (U.S.
    Const., 4th Amend.; § 1525.) Probable cause exists where there is a fair probability that
    contraband or evidence of a crime will be found in a particular place, at the time of the
    search. (Illinois v. Gates (1983) 
    462 U.S. 213
    , 238; People v. Carrington (2009) 
    47 Cal. 4th 145
    , 161; People v. Kraft (2000) 
    23 Cal. 4th 978
    , 1040-1041; People v. Gibson
    (2001) 
    90 Cal. App. 4th 371
    , 380.) The probable cause showing must appear in the
    affidavit offered in support of the warrant. (Carrington, at p. 161.) “ ‘The task of the
    issuing magistrate is simply to make a practical, common-sense decision whether, given
    all the circumstances set forth in the affidavit before him [or her], including the
    “veracity” and “basis of knowledge” of persons supplying hearsay information, there is a
    fair probability that contraband or evidence of a crime will be found in a particular
    place.’ ” (Ibid.; Illinois v. Gates, supra, at p. 238; People v. Scott (2011) 
    52 Cal. 4th 452
    ,
    483.) Probable cause may be shown by evidence that would not be competent at trial,
    7
    and a magistrate may reasonably rely on the special experience and expertise of the
    affiant officer. (People v. Varghese (2008) 
    162 Cal. App. 4th 1084
    , 1103.)
    On review, we defer to the trial court’s express and implied factual findings if
    supported by substantial evidence, but independently determine the legality of the search
    under the Fourth Amendment. (People v. Eubanks (2011) 
    53 Cal. 4th 110
    , 133; People v.
    Lenart (2004) 
    32 Cal. 4th 1107
    , 1119; People v. Hirata (2009) 
    175 Cal. App. 4th 1499
    ,
    1504.) “Because courts accord a preference to searches and seizures conducted pursuant
    to a search warrant, ‘in a doubtful or marginal case a search under a warrant may be
    sustainable where without one it would fall.’ ” (Eubanks, at p. 133.) Any challenge to
    the admissibility of a search or seizure must be evaluated solely under the Fourth
    Amendment. (People v. Carter (2005) 
    36 Cal. 4th 1114
    , 1141; People v. Stipo (2011)
    
    195 Cal. App. 4th 664
    , 668.)
    2. The search warrant affidavit supported the probable cause finding.
    a. Purportedly stale information.
    Kuhn contends the information in the affidavit did not supply probable cause
    because (1) there was a lengthy delay between the date investigators first identified files
    containing child pornography on his computer and sought issuance of the warrant; and
    (2) he moved during that period, but Officer Good failed to take sufficient steps to
    determine that he was living at the Culver City address and had taken the computer with
    him. These contentions lack merit.
    To justify issuance of a warrant, “[t]here must be probable cause to believe that
    the material sought to be seized will be on the premises to be searched when the warrant
    is served.” (People v. Gibson, supra, 90 Cal.App.4th at p. 380; People v. Hirata, supra,
    175 Cal.App.4th at p. 1504.) Information in a warrant affidavit that is remote in time, or
    “stale,” does not establish present probable cause for a search. (People v. Jones (2013)
    
    217 Cal. App. 4th 735
    , 741-742; People v. Hulland (2003) 
    110 Cal. App. 4th 1646
    , 1652;
    Gibson, at p. 380.) There is no bright line rule indicating when information becomes
    stale. (People v. Carrington, supra, 47 Cal.4th at p. 163; Jones, at pp. 741-742; Hirata,
    at p. 1504.) However, delays of more than four weeks are generally considered
    8
    insufficient to demonstrate present probable cause. (Jones, at pp. 741-742; Hirata, at
    p. 1504.) Longer delays are nonetheless justified where there is evidence of an activity
    continuing over a long period of time, or the nature of the activity is such as to justify the
    inference that it will continue until the time of the search. (Carrington, at p. 164, and
    cases cited therein; Jones, at p. 742; People v. Stipo, supra, 195 Cal.App.4th at p. 672;
    Hulland, at p. 1652.) The question of staleness turns on the facts of each particular case.
    (Carrington, at p. 163; Gibson, at p. 380; Jones, at p. 741.)
    “In the context of child pornography cases, courts have largely concluded that a
    delay—even a substantial delay—between distribution and the issuance of a search
    warrant does not render the underlying information stale.” (U.S. v. Richardson (4th Cir.
    2010) 
    607 F.3d 357
    , 370 [
    2010 U.S. App. LEXIS 11928
    ]; see, e.g., U.S. v. Lacy (9th Cir.
    1997) 
    119 F.3d 742
    , 745-746 [affidavit provided non-stale information despite 10-month
    lapse between computer download and issuance of the warrant]; U.S. v. Morales-
    Aldahondo (1st Cir. 2008) 
    524 F.3d 115
    , 119 [three-year delay between acquisition of
    child pornography and application for warrant did not render supporting information
    stale]; U.S. v. Irving (2d Cir. 2006) 
    452 F.3d 110
    , 125 [“When a defendant is suspected of
    possessing child pornography, the staleness determination is unique because it is well
    known that ‘images of child pornography are likely to be hoarded by persons interested in
    those materials in the privacy of their homes’ ”]; U.S. v. Allen (5th Cir. 2010) 
    625 F.3d 830
    , 842 [
    2010 U.S. App. LEXIS 22920
    ] [18-month-old information was not stale]; U.S.
    v. Newsom (7th Cir. 2005) 
    402 F.3d 780
    , 783 [one year not stale]; U.S. v. Lemon (8th Cir.
    2010) 
    590 F.3d 612
    , 614-615 [18-month-old information was not stale].) Computers and
    computer equipment are “not the type of evidence that rapidly dissipates or degrades.”
    (U.S. v. Vosburgh (3d Cir. 2010) 
    602 F.3d 512
    , 529 [
    2010 U.S. App. LEXIS 8140
    ]
    (Vosburgh).) Therefore, “the passage of weeks or months here is less important than it
    might be in a case involving more fungible or ephemeral evidence, such as small
    quantities of drugs or stolen music.” (Vosburgh, at p. 529.) “[I]nformation concerning
    [child pornography] crimes has a relatively long shelf life. It has not been, and should
    not be, quickly deemed stale.” (Ibid.)
    9
    Here, investigators determined that Kuhn’s computer contained child pornography
    files on July 26, 2009, and again on January 7, 2010. Officer Good sought issuance of
    the search warrant on August 31, 2010. Thus, there was a seven-and-a-half month delay
    between the last identification of contraband files on Kuhn’s computer and issuance of
    the warrant. On the facts of this case, the delay did not render the information stale for
    several reasons. First, from the information in the affidavit, the magistrate could
    reasonably believe Kuhn continued downloading child pornography several months after
    the initial download in July. From this, it was reasonable to infer Kuhn’s interest in
    Internet child pornography, and his downloading activity, was ongoing.
    Second, Officer Good—who had considerable experience in the investigation of
    child pornography—averred that persons who possess child pornography “rarely, if ever,
    dispose of sexually explicit images of minors because the images are treated as prized
    possessions.” Law enforcement officers may draw upon their expertise to interpret the
    facts in a search warrant application, and such expertise may be considered by the
    magistrate as a factor supporting probable cause. (People v. Nicholls (2008) 
    159 Cal. App. 4th 703
    , 711.) Here, Good had the necessary experience and training to describe
    the predilections and proclivities of persons who download child pornography.
    Good’s statement, which was credited by the trial court, demonstrated the likelihood that
    the pornographic files likely remained on Kuhn’s computer or other electronic media at
    the time the warrant was issued. (See, e.g., U.S. v. Lacy, supra, 119 F.3d at pp. 745-746
    [upholding warrant based on information that defendant downloaded child pornography
    10 months earlier, and on affiant’s assertion that collectors of child pornography
    generally retain the images]; U.S. v. Gourde (9th Cir. 2006) 
    440 F.3d 1065
    , 1072, and
    cases cited therein; United States v. Murray (D.Az. 2010) 
    696 F. Supp. 2d 1044
    , 1049
    [
    2010 U.S. Dist. LEXIS 26696
    ] (Murray); cf. People v. Stipo, supra, 195 Cal.App.4th at
    p. 672 [in computer hacking case, staleness argument rejected where the hacked
    information could be used for identity theft, was therefore valuable, and would likely
    have been retained by defendant]; People v. Jones, supra, 217 Cal.App.4th at p. 742.)
    10
    “Substantial delays do not render warrants stale where the defendant is not likely to
    dispose of the items police seek to seize.” (Stipo, at p. 672.)
    Third, Good averred that electronic files or remnants of such files could be
    recovered months or even years after their original download using “readily-available
    forensics tools,” even if the user had deleted the files. This fact suggested the
    pornographic files would be found on the computer regardless of the delay. (See Murray,
    supra, 696 F.Supp.2d at p. 1049 [“Thanks to the long memory of computers, any
    evidence of [child pornography] was almost certainly still on [defendant’s] computer,
    even if he had tried to delete the images”]; U.S. v. Gourde, supra, 440 F.3d at p. 1071;
    Vosburgh, supra, 602 F.3d at p. 529; People v. Stipo, supra, 195 Cal.App.4th at p. 673
    [staleness argument rejected where traces of network intrusion likely remained on the
    defendant’s computer because they were automatically entered and difficult to remove].)
    Kuhn’s arguments that Officer Good failed to reliably determine he and his
    computer had actually moved to the Culver City address fare no better. The affidavit
    stated that on July 22, 2010, Good learned from a homeowner’s association
    representative at the Playa Del Ray apartments that there was no record of Kuhn living in
    the apartment. On August 24—just a week before seeking the warrant—Good spoke to
    Postal Inspector Harjala and learned that Kuhn had filed a form on March 16, 2010,
    changing his address from West 91st Street in Playa Del Rey to the Culver Boulevard
    apartment. Inspector Harjala told Good that Kuhn had not subsequently filed a change of
    address form. The most logical and reasonable inference from this information was that
    Kuhn moved from the Playa Del Rey apartment to the Culver City apartment in March
    2010. The absence of a subsequent change of address form made it reasonably probable
    that Kuhn was still living at the Culver City address when the warrant was sought. It was
    a reasonable inference that, having once filed a change of address when moving to a new
    residence, Kuhn would have done so again had he moved from the Culver City location.
    (See generally People v. Gibson, supra, 90 Cal.App.4th at pp. 380-381 [where there was
    no reason to believe appellant had moved in the five to six months preceding issuance of
    11
    the warrant, affidavit was not defective for failure to provide information she was still
    living there when the warrant was sought].)3
    It was eminently reasonable for the trial court to believe Kuhn took his computer
    with him when he moved. Computers are highly portable and usually quite valuable.
    Common sense and common experience teach that, in today’s society, computers are an
    oft-used and indispensible tool, and are generally used to store personal and financial
    data. They are not the type of item likely to be discarded or left behind when the owner
    moves. Kuhn’s move from Playa Del Rey to Culver City was not a transatlantic or cross-
    country move, making it even less likely he would have neglected to take the computer
    with him. (See People v. Miller (1978) 
    85 Cal. App. 3d 194
    , 200 [affidavits must be
    interpreted in a common sense fashion rather than a hypertechnical one; “[r]easonable
    and logical inferences may be drawn and the magistrate may consider matters of common
    knowledge concerning human behavior”]; Vosburgh, supra, 602 F.3d at p. 529
    [computers and computer equipment are not the type of property “that is usually[,]
    quickly or continuously discarded”]; People v. Stipo, supra, 195 Cal.App.4th at p. 672
    [because defendant was unaware he was a suspect, he was unlikely to dispose of his
    computer equipment during the six months between the crime and issuance of the
    warrant]; People v. Ulloa (2002) 
    101 Cal. App. 4th 1000
    , 1007 [it was reasonable to
    assume defendant’s computer would be located at his home].)
    Kuhn argues Officer Good could have taken additional steps to verify he was
    living at the Culver City address, still owned the computer, and had the computer with
    him, such as conducting surveillance or checking utility, rent, Internet provider, and
    
    3 U.S. v
    . Rowland (10th Cir. 1998) 
    145 F.3d 1194
    , 1205, cited by Kuhn, is factually
    distinguishable. That case involved an “anticipatory warrant” (that is, a warrant
    contingent on the occurrence of an anticipated future event), where government agents
    mailed child pornography to the defendant’s post office box as part of a sting operation.
    Because the delivery was made to the post office box, rather than the house to be
    searched, and the affidavit failed to establish a nexus between the contraband or criminal
    activity and the house, the warrant was invalid. (Id. at p. 1206.) The instant case does
    not involve similar facts.
    12
    Department of Motor Vehicles records. He also complains that Good failed to establish
    the computer was not accessed by other persons, or via an unsecured Internet connection.
    Such further investigation and information might have bolstered the probable cause
    showing, but was not required to establish it. “ ‘[T]he term “probable cause” . . . means
    less than evidence which would justify condemnation.’ ” (United States v. Ventresca
    (1965) 
    380 U.S. 102
    , 107.) Kuhn’s arguments attempt to “sidestep the ‘fair probability’
    standard and elevate probable cause to a test of near certainty,” in contravention of the
    teachings of the Supreme Court. (U.S. v. Gourde, supra, 440 F.3d at p. 1072; Illinois v.
    Gates, supra, 462 U.S. at p. 235.) Kuhn’s citation to cases in which a more extensive
    investigation was completed and additional evidence was presented in support of a
    warrant is unavailing. Each case must be considered on its own facts (People v.
    Carrington, supra, 47 Cal.4th at p. 163), and the circumstance that more, or stronger,
    evidence was present in another case does not demonstrate the probable cause showing
    was insufficient here.
    b. The warrant affidavit was not based upon unsupported conclusions.
    Kuhn next contends the warrant affidavit failed to establish probable cause
    because it was based on unsupported conclusions. We disagree.
    An affidavit based on mere suspicion or belief, or stating a mere conclusion
    without supporting facts, is insufficient to establish probable cause. (Illinois v. Gates,
    supra, 462 U.S. at p. 239; People v. Garcia (2003) 
    111 Cal. App. 4th 715
    , 721.)
    Kuhn first attacks the portion of the affidavit in which Officer Good described the
    typical characteristics of persons who possess child pornography. Kuhn points to Good’s
    statements that: (1) certain characteristics were “generally found in varying
    combinations in people who produce, trade, distribute or possess images of child
    pornography”; (2) such persons “rarely, if ever, dispose of sexually explicit images of
    minors because the images are treated as prized possessions”; (3) “collectors of child
    pornography generally prefer to store images in electronic format as computer files”; and
    (4) collectors will go to great lengths to protect their pornography from discovery.
    According to Kuhn, Good failed to provide facts to support these statements, explain
    13
    “what he mean[t] by a ‘collector’ of child pornography,” or state facts showing Kuhn met
    the definition of a collector.
    These contentions are meritless. As noted, the opinions of an experienced officer
    may be considered in the probable cause determination. (People v. Nicholls, supra, 159
    Cal.App.4th at p. 711; People v. Garcia, supra, 111 Cal.App.4th at p. 721; People v.
    Deutsch (1996) 
    44 Cal. App. 4th 1224
    , 1232.) The affidavit here detailed Good’s training
    in the area of investigating child pornography crimes, which included, in addition to
    training at the police academy and through Peace Officer Standards and Training courses,
    over 120 hours of training on Internet crimes involving children.4 He had personally
    examined digital videos, videotapes, and computer files depicting child pornography
    during the course of his work. It is not a stretch to believe Good’s training and
    experience encompassed the challenged aspects of the affidavit.
    Good provided an explanation of why possessors of child pornography prefer to
    store it on computers as electronic files: “The computer’s ability to store images in
    digital format makes a computer an ideal repository for child pornography. Portable
    disks can contain thousands . . . of child pornography images. The portable digital media
    are particularly well suited to conceal images of child pornography.” The statement that
    collectors attempt to conceal pornography was based on Good’s personal experience; as
    he explained in the affidavit, “I have personally witnessed collectors going to great
    lengths to protect their collection from discovery.” Thus, none of these statements lacked
    a sufficient factual foundation.
    Nor are we persuaded by Kuhn’s argument that Good failed to adequately define
    “collector.” The term, as used in the affidavit, is readily understandable by reference to
    4
    Good had attended a 36-hour Internet Crimes Against Children Investigative
    Techniques course through the Office of Juvenile Justice and Delinquency Prevention; a
    36-hour Internet Crimes Against Children Undercover Chat Class taught by experts in the
    field, which included instruction on the preservation of digital evidence; 20 hours of
    training by experts at the 2009 Silicon Valley Internet Crimes Against Children
    Conference; and 36 hours of training at the 2010 Internet Crimes Against Children
    National Conference, where experts instructed regarding the investigation of crimes
    related to the sexual exploitation of children on the Internet.
    14
    its plain meaning, that is, a person who downloads or otherwise obtains, and keeps, child
    pornography. There was a factual basis for a conclusion Kuhn was a collector who
    would retain his child pornography. The affidavit stated that on July 26, 2006, an IP
    address later connected to Kuhn was sharing 20 files with titles indicating child
    pornography. On January 7, 2010, Kuhn’s IP address was “identified 3 times” as
    “flagged for having SHA1 values of known child pornography.” A person who has over
    20 child pornography files can reasonably be considered a collector.
    Kuhn also complains that Officer Good failed to describe the contents of the
    SHA1 files identified on January 7, 2010. From this he reasons that there was
    insufficient information the January 7 files “really [did] involve child pornography.” Not
    so. Good explained at length that a SHA1 value is essentially a digital signature, and no
    two files will have the same SHA1 value unless they are identical. By matching SHA1
    values with files already identified as containing child pornography, an investigator could
    reliably determine that a file contained such material, without actually viewing its
    contents. The affidavit stated that a detective “discovered that IP address 76.171.169.96
    was identified 3 times on January 7, 2010, as flagged for having SHA1 values of known
    child pornography.” Because the files, identified by their unique digital signatures, had
    already been determined to contain child pornography, Good did not need to further
    describe the files’ contents in order for the trial court to reasonably conclude they
    involved child pornography.
    Kuhn next avers that Good’s statement that possessors of child pornography
    always keep it is an impermissible “ ‘profile’ allegation that does not provide probable
    cause.” In support, he cites Richards v. Wisconsin (1997) 
    520 U.S. 385
    , 394. In
    Richards, the United States Supreme Court held that the Fourth Amendment does not
    permit a blanket exception to the knock-and-announce requirement in felony drug
    investigations. (Id. at pp. 387-388.) Although felony drug investigations frequently
    involve both danger to police officers and the likelihood evidence will be destroyed if
    advance notice is given, this did not justify dispensing with a case-by-case evaluation of
    the manner in which a search is executed. (Id. at pp. 391, 394.) Kuhn attempts to
    15
    analogize Richards and similar cases (e.g., U.S. v. Granville (9th Cir. 2000) 
    222 F.3d 1214
    , 1219; People v. Gastelo (1967) 
    67 Cal. 2d 586
    , 588), arguing that “there is no such
    thing as ‘profile probable cause’ to allow the search of the residence for items of a crime
    without individual specific information that evidence of a crime would be at that location
    at that time.”
    But this case does not involve a proposed blanket exception to the knock-and-
    announce rule; Good’s statements about the proclivities of possessors of child
    pornography were not used to justify a per se exception to Fourth Amendment
    requirements. The warrant affidavit here did contain specific information regarding
    Kuhn that provided probable cause for the search. Indeed, numerous federal courts have
    found similar statements by affiant officers supported a probable cause finding. (See,
    e.g., U.S. v. Lacy, supra, 119 F.3d at p. 746; U.S. v. Gourde, supra, 440 F.3d at p. 1072
    [“[t]he details provided on the use of computers by child pornographers and the collector
    profile” provided support for a finding of probable cause]; U.S. v. Riccardi (10th Cir.
    2005) 
    405 F.3d 852
    , 860-861 [probable cause finding based in part on “the observation
    that possessors often keep electronic copies of child pornography”]; Vosburgh, supra,
    602 F.3d at p. 528; U.S. v. Lemon, supra, 590 F.3d at p. 615 [“Many courts, including our
    own, have given substantial weight to testimony from qualified law enforcement agents
    about the extent to which pedophiles retain child pornography”]; U.S. v. Richardson,
    supra, 607 F.3d at p. 370, and cases cited therein].) U.S. v. Weber (9th Cir. 1990) 
    923 F.2d 1338
    , and U.S. v. Zimmerman (3d Cir. 2002) 
    277 F.3d 426
    , cited by Kuhn, are
    distinguishable on their facts.5
    5
    In Weber, the Ninth Circuit rejected information regarding the practices of child
    molesters because there was “not a whit of evidence” in the affidavit indicating the
    defendant was a child molester. (U.S. v. Weber, supra, 923 F.2d at p. 1345.) In
    Zimmerman, the warrant application contained no information suggesting the defendant
    ever possessed child pornography in his home, and only minimal, stale evidence
    suggested adult pornography would be found there; on these facts, there was no probable
    cause to search for either. (U.S. v. Zimmerman, supra, 277 F.3d at pp. 433-435.) In
    contrast, here the affidavit contained sufficient evidence Kuhn had downloaded and
    collected files containing child pornography on his computer, which could reasonably be
    16
    c. The warrant affidavit did not contain recklessly misleading statements.
    Kuhn next contends his motions should have been granted because the affidavit
    contained recklessly misleading statements. He is incorrect.
    A defendant has a limited right to challenge the veracity of statements contained in
    an affidavit of probable cause made in support of the issuance of a search warrant.
    (Franks v. Delaware (1978) 
    438 U.S. 154
    , 155-156; People v. Scott, supra, 52 Cal.4th at
    p. 484; People v. Lewis and Oliver (2006) 
    39 Cal. 4th 970
    , 988.) When presented with
    such a challenge, a trial court must conduct an evidentiary hearing on the question if the
    defendant makes a substantial showing that (1) the affidavit contains statements that are
    deliberately false or were made in reckless disregard of the truth, and (2) the affidavit’s
    remaining contents, after the false statements are excised, are insufficient to support a
    finding of probable cause. (People v. Bradford (1997) 
    15 Cal. 4th 1229
    , 1297; Scott, at
    p. 484; Lewis and Oliver, at p. 989; People v. Luera (2001) 
    86 Cal. App. 4th 513
    , 524-
    525.) If the statements are proved false or reckless at the hearing, they must be excised.
    If the remaining contents of the affidavit are insufficient to establish probable cause, the
    warrant must be voided and any evidence seized pursuant to the warrant suppressed.
    (Franks v. Delaware, supra, at pp. 155-156; Bradford, at p. 1297.) “Innocent or
    negligent misrepresentations will not support a motion to traverse.” (Scott, at p. 484;
    Lewis and Oliver, at pp. 988-989.) The defendant must make his or her showing by a
    preponderance of the evidence, and the affidavit is presumed valid. (Scott, at p. 484.)
    Echoing his arguments in the preceding section, Kuhn urges that Officer Good’s
    statements that collectors of child pornography typically store such materials as computer
    files and go to great lengths to protect them from discovery were “certainly reckless.” He
    repeats his concerns that the affidavit did not sufficiently define “collector” or provide
    information showing he was a collector. We have already explained that the affidavit did
    contain information sufficient to show Kuhn was a collector of child pornography. It
    expected to be at the Culver City address. (See U.S. v. Lacy, supra, 119 F.3d at p. 746,
    fn. 6 [distinguishing Weber]; Vosburgh, supra, 602 F.3d at pp. 530-531 [distinguishing
    Zimmerman]; People v. Nicholls, supra, 159 Cal.App.4th at pp. 713-714.)
    17
    could not have been “reckless” for Good to describe the habits of collectors of child
    pornography, as such information was relevant and based upon his training and expertise.
    Kuhn also complains that his child pornography was not hidden, but was available to the
    general public through Gnutella. Assuming this assertion is accurate, it does not
    demonstrate the falsity of Good’s statement that collectors often attempt to hide their
    materials.
    Kuhn further complains that the affidavit contained an inaccurate statement that all
    three of the co-occupants of the Playa Del Rey apartment filed change of address forms
    in March 2010. According to the affidavit, Postal Inspector Harjala told Good that
    Serrano, Pederson, and Nicholas also filled out change of address forms indicating a
    move from the Playa Del Rey apartment to the Culver City apartment. According to a
    declaration filed by Kuhn’s counsel in support of the suppression motion below, when the
    warrant was executed, “Serrano denied ever living at 7777 W. 91st Street . . . and
    Michael Kuhn and Jeffrey Pederson also denied that Felipe Serrano lived there.” Kuhn
    asserts that this inaccuracy “calls into question all the information from the Postal
    Inspector.”
    It does not. Assuming arguendo that counsel’s averments were accurate, they do
    not demonstrate any deliberately false or recklessly misleading statements by Good.
    Even if Harjala was mistaken, there is no reason to assume Good knew or had any reason
    to doubt her statements. (See People v. Lewis and Oliver, supra, 39 Cal.4th at p. 989;
    People v. Lieng (2010) 
    190 Cal. App. 4th 1213
    , 1229.) Moreover, excising this
    information from the warrant affidavit would have had no effect on the probable cause
    showing. The federal cases cited by Kuhn (United States v. Stanert (9th Cir. 1985) 
    762 F.2d 775
    ; United States v. Davis (9th Cir. 1983) 
    714 F.2d 896
    ; United States v. Chesher
    (9th Cir. 1982) 
    678 F.2d 1353
    ; U.S. v. DeLeon (9th Cir. 1992) 
    979 F.2d 761
    ), are not
    factually similar to the instant matter.
    18
    3. The warrant was not an overbroad “general warrant,” either as written or as
    executed .
    Appellant next avers that the search warrant was an impermissible “general
    warrant” that allowed a search for “essentially anything.” He is incorrect.
    The Fourth Amendment requires that a search warrant particularly describe the
    place to be searched and the things to be seized. (People v. Eubanks, supra, 53 Cal.4th at
    p. 133; U.S. Const., 4th Amend.; see also Cal. Const., art. I, § 13; § 1525.) The
    Constitution prohibits the issuance of “ ‘[g]eneral warrants’ ” that allow for a
    “ ‘ “general, exploratory rummaging in a person’s belongings.” ’ ” (People v. Ulloa,
    supra, 101 Cal.App.4th at p. 1004, citing Andresen v. Maryland (1976) 
    427 U.S. 463
    .)
    The particularized description requirement “ ‘ “ ‘makes general searches . . . impossible
    and prevents the seizure of one thing under a warrant describing another. As to what is to
    be taken, nothing is left to the discretion of the officer executing the warrant.’ ”
    [Citations.]’ ” (Ulloa, at p. 1004.) A warrant that fails to particularly describe the
    evidence sought is unconstitutional. (People v. Superior Court (Nasmeh) (2007) 
    151 Cal. App. 4th 85
    , 95 (Nasmeh).) “ ‘Specificity has two aspects: particularity and breadth.
    [] Particularity is the requirement that the warrant must clearly state what is sought.
    [Citation.] Breadth deals with the requirement that the scope of the warrant be limited by
    the probable cause on which the warrant is based.’ ” (Ulloa, at p. 1005.)
    Whether a warrant is sufficiently particular is a question of law subject to
    independent review by an appellate court. (People v. Eubanks, supra, 53 Cal.4th at
    p. 133; People v. Kraft, supra, 23 Cal.4th at p. 1041; Nasmeh, supra, 151 Cal.App.4th at
    p. 95.) In analyzing this question, we consider the purpose of the warrant, the nature of
    the items sought, and the totality of the circumstances surrounding the case. “A warrant
    that permits a search broad in scope may be appropriate under some circumstances, and
    the warrant’s language must be read in context and with common sense.” (Eubanks, at
    pp. 133-134.)
    Here, the warrant specified that the areas to be searched were the Culver City
    apartment, including “any attics, basements, garages, storage lockers, safes, buildings
    19
    attached or unattached that are readily accessible to, under the control of or used by the
    occupants. It is also to include the vehicles parked on the property, adjacent to the
    property or in the street that are owned by or under the control of any occupants of” the
    Culver Boulevard apartment.
    The “subject items” to be seized were described as: (1) “Any digital device
    capable of storing any ‘writing’ as defined by Evidence Code [s]ection 250 of child
    pornography as defined by California Penal Code [s]ection 311”; and (2) “Any ‘writing’
    that constitutes evidence of child sexual exploitation as defined by California Penal Code
    [s]ection 311.3.” The warrant further defined “writing” and “digital device.”6
    The warrant allowed any digital devices or writings seized to be removed and
    subsequently searched for: visual depictions of minors engaged in sexually explicit
    conduct as defined in section 311; writings pertaining to the possession, production,
    reproduction, receipt, or distribution of such depictions; writings sent with the intent to
    seduce a minor, or for purposes of arranging to meet with a minor for the purpose of
    sexually exploiting the minor; writings showing use of digital devices containing such
    evidence; credit card information, bills, and payment records for Internet services and
    receipt of child pornography; writings tending to identify the children depicted; items that
    would show an unusual interest in children or children’s activities, including collections
    of photographs and magazines depicting children; and writings showing dominion and
    6
    The warrant defined “writing” as “handwriting, typewriting, printing,
    Photostatting, photographing, photocopying, transmitted by electronic mail or facsimile,
    and every other means of recording upon any tangible thing, any form of communication
    or representation, including letters, words, pictures, sounds, or symbols, or combinations
    thereof, and any record thereby created, regardless of the manner in which the record has
    been stored.” “ ‘[D]igital device’ ” included “any electronic system or device capable of
    storing and/or processing data in digital form, including: central processing units; laptop
    or notebook computers; personal digital assistants; wireless communication devices such
    as telephone paging devices, beepers, and mobile telephones; peripheral input/output
    devices such as keyboards, printers, scanners, plotters, monitors, and drives intended for
    removable media; related communications devices such as modems, cables, and
    connections; storage media such as hard disk drives, floppy disks, compact disks,
    magnetic tapes, and memory chips; and security devices.”
    20
    control of the property searched. The affidavit explained that searching digital devices is
    a highly technical process requiring expertise and specialized equipment. Digital data is
    vulnerable to inadvertent or intentional modification or destruction, and in order to
    recover hidden, deleted, compressed, encrypted, or password protected data, examination
    in a controlled environment such as a law enforcement laboratory is essential to a
    complete and accurate analysis. Moreover, the volume of data typically stored on digital
    devices is so large as to make it impractical to search them at the time the warrant is
    executed.
    a. Particularity.
    It is readily apparent from the foregoing that the warrant described the items to be
    seized with sufficient particularity. (See People v. Ulloa, supra, 101 Cal.App.4th at
    p. 1005.) It did not provide for a “wide open” search for “evidence of general offenses
    not mentioned in the affidavit,” or seizure of “virtually all ‘writing’ in the apartment,” as
    Kuhn contends. The affidavit specifically identified the alleged criminal activities at
    issue. It authorized officers to search only the apartment and areas under the occupants’
    control, only for writings and digital devices related to child pornography activities.
    Officers had no discretion to seize writings that did not pertain to child pornography, or
    search any items that could not contain such writings.
    Kuhn argues the warrant was not sufficiently precise because it failed to name him
    or his roommates specifically; failed to describe the subject computer by its IP address;
    and failed to list the “14 kids” video by name. But the “14 kids” file and the computer’s
    IP address were described elsewhere in the affidavit and obviously fell within the
    categories of items listed in the warrant. It was also clear from the affidavit that Kuhn
    was one of the occupants of the Culver City apartment, and the main focus of the search.
    Under these circumstances, we do not discern how the failure to include his name, the
    “14 kids” file name, or the computer’s IP address in the listing of items to be seized
    rendered the warrant unconstitutionally imprecise. “ ‘[T]he requirement that a search
    warrant describe its objects with particularity is a standard of “practical accuracy” rather
    21
    than a hypertechnical one.’ [Citations.]” (Nasmeh, supra, 151 Cal.App.4th at p. 96; see
    also People v. Smith (1994) 
    21 Cal. App. 4th 942
    , 948-949.)
    b. Overbreadth.
    Nor was the warrant’s scope overbroad. To the contrary, “the breadth of the
    warrant . . . was commensurate with the scope of the investigation.” (People v. Kraft,
    supra, 23 Cal.4th at p. 1043.) As described ante, there was probable cause to believe
    Kuhn downloaded, possessed, or shared child pornography on his computer at his
    apartment. Based on his training and experience, Officer Good averred that child
    pornography collectors “store the images in many different locations such as their home,
    their vehicle, their work areas, and other areas under their control” and sometimes go to
    great lengths to hide their pornography. Therefore, the search of Kuhn’s entire apartment
    and other areas on the premises where he could have stored or concealed child
    pornography was reasonable and within the scope of the probable cause showing. “The
    connection between the items to be seized and the place to be searched need not rest on
    direct observation. It may be inferred from the type of crime involved, the nature of the
    item, and the normal inferences as to where a criminal might likely hide incriminating
    evidence.” (People v. Miller, supra, 85 Cal.App.3d at p. 201.)
    The warrant was not overbroad in regard to the categories of writings sought.
    Obviously, a search for writings containing actual child pornography was justified by the
    probable cause showing. Evidence showing ownership of seized digital devices, payment
    for internet services, and payment for pornography itself was relevant to the
    determination of who in the apartment had downloaded the pornography. (See People v.
    Eubanks, supra, 53 Cal.4th at pp. 133-134 [search for items showing “dominion and
    control” was not overly broad or nonparticular]; People v. Nicolaus (1991) 
    54 Cal. 3d 551
    , 575 [officers acted properly in seeking independent evidence to establish
    defendant’s occupancy of apartment and control over evidence seized therefrom].)
    Likewise, items showing an unusual interest in children potentially had relevance to
    prove possession of child pornography.
    22
    Kuhn nevertheless contends the scope of the warrant was overbroad in several
    respects. He avers the warrant improperly allowed for the seizure of all digital devices in
    the apartment, whereas Good only had information that the single computer with the IP
    address 76.171.169.96 contained child pornography files. But it is common knowledge
    that computer files can be moved, copied, or stored on more than one device. Therefore,
    the warrant provided probable cause to search digital devices in addition to the single
    computer previously identified.
    In a similar vein, he contends that the warrant should not have authorized a search
    for anything beyond the “14 kids” video or “at most” the additional SHA1 files identified
    in January 2010. The trial court found this contention “absurd.” We agree. We see no
    reason why the search had to be limited to the files already identified. (See Andresen v.
    Maryland, supra, 427 U.S. at p. 479, fn. 10 [warrant allowing for “ ‘fruits,
    instrumentalities and evidence of crime at this [time] unknown’ ” was lawful because in
    context, the phrase permitted officers to seize evidence of other fraudulent real estate
    transactions relevant to the defendant’s methods and motives in the charged crime];
    People v. Eubanks, supra, 53 Cal.4th at p. 134 [discussing Andresen].) U.S. v. Rabe (9th
    Cir. 1988) 
    848 F.2d 994
    , cited by Kuhn, does not suggest a contrary conclusion. In Rabe,
    the Ninth Circuit rejected an overbreadth challenge where the warrant for the most part
    limited the officer’s search to materials depicting minors engaged in sexually explicit
    conduct, as well as documents evidencing the purchase, sale, or trade of such material.
    (Id. at pp. 997-998.) Rabe undercuts, rather than supports, Kuhn’s contention. Contrary
    to Kuhn’s argument, the instant case bears no resemblance to People v. Frank (1985)
    
    38 Cal. 3d 711
    , or the federal cases he cites.
    Next, Kuhn complains the search was overbroad as to time, because there was no
    limit on the dates of materials to be seized and searched. While such an omission might
    be problematic in certain cases, here it was not. The fact a writing was not recent would
    not negate its relevance: if, for example, Kuhn possessed vintage magazines or photos
    showing child pornography, he would still have been in violation of section 311.11.
    23
    Nor was suppression required because the warrant allowed officers to search for
    writings showing attempts to seduce or arrange a meeting with a minor. Kuhn argues that
    because Officer Good had no information he had or would engage in such behavior, there
    was no probable cause to seize items related to such activities. We do not necessarily
    agree with this contention. “[T]here is no requirement that each item seized be supported
    by probable cause” and no requirement “that there must be a precise correlation between
    the items in the warrant and the probable cause declarations in the affidavit.” (People v.
    Ulloa, supra, 101 Cal.App.4th at pp. 1005, 1007; People v. Kraft, supra, 23 Cal.4th at
    p. 1050.) But we need not reach this question because the record does not reflect that any
    evidence Kuhn attempted to meet with or seduce a minor was recovered in the search.
    Therefore, even if this aspect of the warrant was overbroad, he has no cause to complain.
    (See People v. Carpenter (1999) 
    21 Cal. 4th 1016
    , 1043-1044 [defendant contended
    portions of warrant were overbroad; however, he “has not identified any item seized
    under any of [the assertedly overbroad] provisions that was admitted at trial.
    Accordingly, even if we assume some provision of the warrant was overbroad, defendant
    has not shown that any evidence should have been suppressed”]; People v. Camarella
    (1991) 
    54 Cal. 3d 592
    , 607, fn. 7 [“ ‘Even when a warrant is overbroad in part, evidence
    will not be suppressed if it was seized pursuant to a portion of the warrant which was
    not’ ”]; People v. Farley (2009) 
    46 Cal. 4th 1053
    , 1101-1102; U.S. v. Rabe, supra, 848
    F.2d at p. 998 [even if sections of warrant were impermissibly overbroad, “no evidence
    was obtained in reliance upon them”].)
    For the same reason, we reject Kuhn’s contentions that the warrant was overbroad
    because it allowed a search of the entire apartment, as opposed to only his room and the
    common areas; of buildings or vehicles accessible to the all occupants of the apartment;
    and of computers and digital equipment that belonged to his roommates, rather than to
    him. Again, while we do not necessarily agree these categories were overbroad, the only
    items seized in the search were found in Kuhn’s bedroom in the Culver City apartment.
    Because no items were seized pursuant to the portions of the warrant Kuhn contends were
    overbroad, he fails to show suppression of any of the evidence was required. (People v.
    24
    Carpenter, supra, 21 Cal.4th at pp. 1043-1044; People v. Camarella, supra, 54 Cal.3d at
    p. 607, fn. 7; People v. Farley, supra, 46 Cal.4th at pp. 1101-1102.)
    Kuhn argues that as executed, the search actually conducted amounted to a general
    warrant search. (See United States v. Rettig (9th Cir. 1978) 
    589 F.2d 418
    , 423 [although
    warrant was not a general warrant on its face, agents did not confine their search in good
    faith to the objects of the warrant].) The only basis for Kuhn’s assertion appears to be
    that the officers searched “all the digital devices in the apartment for essentially any
    writing or crime involving children.” However, as we have explained, the warrant
    properly allowed for a search of all digital devices. Kuhn points to nothing in the record
    showing the officers searched for evidence of crimes other than those related to child
    pornography, or otherwise exceeded the parameters of the warrant.
    Finally, Kuhn complains that “the search warrant did not set forth a protocol for a
    limited search of the digital storage devices” and “did not restrict its execution to a digital
    expert using a ‘hashing’ program.” However, Kuhn cites no California or United States
    Supreme Court case requiring such a protocol. The Ninth Circuit cases he does cite—
    U.S. v. Comprehensive Drug Testing, Inc. (9th Cir. 2010) 
    621 F.3d 1162
     [2010 U.S. App.
    LEXIS 19070] (CDT), and United States v. Tamura (9th Cir. 1982) 
    694 F.2d 591
    , do not
    impose such a requirement either. Tamura was decided in 1982, “just preceded the dawn
    of the information age,” and concerned paper, not electronic, records. (CDT, at p. 1169;
    see also U.S. v. Stabile (3d Cir. 2011) 
    633 F.3d 219
    , 324 [
    2011 U.S. App. LEXIS 1945
    ].)
    CDT involved a federal investigation into steroid use by professional baseball players. In
    CDT, the Ninth Circuit offered “[c]oncluding [t]houghts” about “the challenges faced by
    modern law enforcement in retrieving information it needs to pursue and prosecute
    wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal
    investigation.” (CDT, at p. 1175.) The court opined that the “pressing need of law
    enforcement for broad authorization to examine electronic records . . . creates a serious
    risk that every warrant for electronic information will become, in effect, a general
    warrant, rendering the Fourth Amendment irrelevant.” (Id. at p. 1176.) The court
    explained that electronic files are generally found on media containing “thousands or
    25
    millions of other files among which the sought-after data may be stored or concealed. By
    necessity, government efforts to locate particular files will require examining a great
    many other files to exclude the possibility that the sought-after data are concealed there.”
    (Ibid.)
    In a concurrence, Chief Judge Kozinski offered “guidance” about “how to deal
    with searches of electronically stored data in the future so that the public, the government
    and the courts of our circuit can be confident such searches and seizures are conducted
    lawfully.” (CDT, supra, 621 F.3d at p. 1178.) Among other things, Judge Kozinski
    suggested the following: “The process of sorting, segregating, decoding and otherwise
    separating seizable data (as defined by the warrant) from all other data should . . . be
    designed to achieve that purpose and that purpose only. Thus, if the government is
    allowed to seize information pertaining to ten names, the search protocol should be
    designed to discover data pertaining to those names only, not to others, and not those
    pertaining to other illegality. For example, the government has sophisticated hashing
    tools at its disposal that allow the identification of well-known illegal files (such as child
    pornography) without actually opening the files themselves. These and similar search
    tools should not be used without specific authorization in the warrant, and such
    permission should only be given if there is probable cause to believe that such files can
    be found on the electronic medium to be seized.” (Id. at p. 1179 (Kozinski, C.J.,
    concurring), italics added.) Thus, apart from the facts that Chief Judge Kozinski’s
    concurrence comprised guidance, rather than mandatory procedures, and CDT is not
    binding on this court (People v. Williams (1997) 
    16 Cal. 4th 153
    , 190), CDT did not
    require that files in child pornography cases be examined only using a “hashing tool” as
    Kuhn appears to suggest.7
    7
    Because we conclude that the information in the affidavit provided probable cause
    to support the search warrant, which met the particularity requirement, we need not
    consider the People’s assertion that the good faith exception to the warrant requirement
    applies. (People v. Jones, supra, 217 Cal.App.4th at p. 742.)
    26
    DISPOSITION
    The judgment is affirmed.
    NOT TO BE PUBLISHED IN THE OFFICIAL REPORTS
    ALDRICH, J.
    We concur:
    CROSKEY, Acting P. J.
    KITCHING, J.
    27