People v. Meza ( 2023 )


Menu:
  • Filed 4/13/23 (review denied 8/16/23; reposted with Supreme Court order and
    statement)
    CERTIFIED FOR PUBLICATION
    IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA
    SECOND APPELLATE DISTRICT
    DIVISION SEVEN
    THE PEOPLE,                                       B318310
    Plaintiff and Respondent,                  (Los Angeles County
    Super. Ct. No. TA150314)
    v.
    DANIEL MEZA et al.,
    Defendants and Appellants.
    APPEALS from judgments of the Superior Court of
    Los Angeles County, Tammy Chung Ryu, Judge, and Laura R.
    Walton, Judge. Affirmed.
    Sharon Fleming, under appointment by the court of appeal,
    for Defendant and Appellant Daniel Meza.
    Bess Stiffelman, under appointment by the court of appeal,
    for Defendant and Appellant Walter Meneses.
    Rob Bonta, Attorney General, Lance E. Winters, Chief
    Assistant Attorney General, Susan Sullivan Pithey, Senior
    Assistant Attorney General, Wyatt E. Bloomfield and Michael C.
    Keller, Deputy Attorneys General, for Plaintiff and Respondent.
    1
    Jennifer Lynch and Andrew Crocker for Electronic Frontier
    Foundation as Amicus Curiae on behalf of Defendants and
    Appellants.
    ________________________________
    INTRODUCTION
    “A geofence is a virtual fence or perimeter around a
    physical location. Like a real fence, a geofence creates a
    separation between that location and the area around it. . . . [¶]
    It can be any size or shape, even a straight line between
    two points. [¶] Geofences are created using mapping software,
    which allow the user to draw the geofence over the desired
    geographic area. It is made up of a collection of coordinates
    (i.e., latitude and longitude) or in the case of a circular geofence
    one point that forms the center.”1
    “Geofence warrants (sometimes called ‘reverse location
    searches’) are official requests by law enforcement authorities to
    access the device location data gathered by large tech companies
    like Google. The warrants specify a time and geographic area,
    and require the companies to turn over information on any
    devices that were in that area at that time. While this data is
    typically anonymized, it can be used in conjunction with other
    1     Verizon Connect, What Is A Geofence?
    <https://www.verizonconnect.com/glossary/what-is-a-
    geofence/#:~:text=A%20geofence%20is%20a%20virtual,straight%
    20line%20between%20two%20points> [as of April 13, 2023],
    archived at < https://perma.cc/A3A6-NPZ9>.
    2
    investigative techniques to tie devices to specific users—and
    identify persons of interest in a criminal investigation.”2
    “The government filed its first geofence search warrant in
    2016, and by the end of 2019, Google was receiving about
    180 search warrant requests per week from law enforcement
    officials across the country. . . . Between 2018 and 2020, Google
    received about 20,000 geofence warrant requests for data,
    including over 11,500 in 2020 alone.”3
    *       *    *
    Daniel Meza and Walter Meneses were identified as
    suspects in the murder of Adbadalla Thabet after a geofence
    search warrant directed to Google revealed cell phones signed in
    to Google accounts connected to them were in several of the same
    locations as Thabet on the day of his murder. After their motions
    to quash and suppress evidence were denied, Meza pleaded guilty
    to first degree murder; and Meneses pleaded no contest to
    second degree murder.
    On appeal Meza and Meneses contend the trial court erred
    in denying their motion to suppress, arguing the geofence
    2     SecureMac, What Are Geofence Warrants? (Sept. 8, 2020)
    <https://www.securemac.com/blog/what-is-geofencing> [as of
    April 13, 2023], archived at <https://perma.cc/74XS-KWGZ>.
    3     Owsley, The Best Offense Is A Good Defense: Fourth
    Amendment Implications of Geofence Warrants (2022) 50 Hofstra
    L.Rev. 829, 834; see also Brief of Amicus Curiae Google LLC in
    Support of Neither Party, filed December 20, 2019 in United
    States v. Chatrie (E.D.Va. 2019, No. 3:19-cr-00130-MHL) (Google
    Amicus Brief) (“Google has observed over a 1,500% increase in
    the number of geofence requests it received in 2018 compared to
    2017; and to date, the rate has increased over 500% from 2018 to
    2019”).
    3
    warrant violated their rights under the Fourth and Fourteenth
    Amendments to the United States Constitution and did not
    comply with the California Electronic Communications Privacy
    Act of 2016 (Pen. Code, § 1546 et seq.)4 (CalECPA). Although the
    geofence warrant satisfied the requirements of CalECPA, we
    agree it lacked the particularity required by the Fourth
    Amendment and was impermissibly overbroad. Nonetheless, we
    affirm Meza’s and Meneses’s convictions under the good faith
    exception to the exclusionary rule established by United States v.
    Leon (1984) 
    468 U.S. 897
     (Leon).
    FACTUAL AND PROCEDURAL BACKGROUND
    1. The Murder of Adbadalla Thabet and the Initial
    Investigation
    According to surveillance footage viewed by police officers,
    at approximately 10:30 a.m. on March 1, 2019 Thabet drove into
    the parking lot of a bank in Paramount, followed by a gray sedan
    and a red sedan.5 The driver of the red car parked, got out of his
    vehicle and walked to the gray car, where he stopped to speak to
    the driver of the gray car. The driver of the gray car then drove
    slowly toward Thabet’s parked car. The driver of the red car
    followed on foot. As Thabet got out of his vehicle, the gray car
    pulled up next to Thabet’s car; and an occupant of the gray car
    shot Thabet in the torso. Thabet fell to the ground as the gray
    car sped away. The driver of the red car approached Thabet, took
    his backpack, retreated to the red car and drove away. Thabet
    died from his injuries.
    4     Statutory references are to this code.
    5     Our factual summary is based on the preliminary hearing
    transcript and the search warrant affidavit.
    4
    The investigating officers were able to retrace Thabet’s
    steps from the morning of the shooting. They learned Thabet
    worked for his uncle’s business, which included managing several
    gas stations. Twice per week Thabet picked up cash receipts
    from the gas stations and deposited the cash at the bank in
    Paramount. The day of the shooting Thabet left his apartment
    building in Downey around 7:00 a.m. and drove to a gas station
    in Downey to pick up cash for deposit. Thabet was at the Downey
    gas station from approximately 7:15 a.m. to 7:30 a.m. Thabet
    then met his brother-in-law at approximately 9:00 a.m. at a gas
    station in Bellflower. Thabet and his brother-in-law departed the
    gas station in separate cars at approximately 9:40 a.m. and drove
    to a strip mall in Compton where the brother-in-law was
    contemplating renting retail space. Thabet left the strip mall
    alone, driving to a gas station in Lynwood to pick up cash
    receipts. From Lynwood Thabet drove to the bank in Paramount
    where he was killed.
    In addition to the video surveillance from the bank parking
    lot, investigators obtained video surveillance from other locations
    Thabet visited that morning. The gray and red vehicles from the
    bank surveillance footage were also identified in surveillance
    footage from at least two of those additional locations.
    Investigators concluded the suspects had been following Thabet,
    anticipating his arrival at the bank with the cash deposits. The
    license plate numbers of the gray and red vehicles were not
    legible in any of the footage.
    2. The Search Warrant Affidavit
    a. Probable cause
    Los Angeles County Sheriff’s Detective Jonathan Bailey
    applied for a search warrant directing Google to identify
    5
    individuals whose location history data indicated they were in
    the vicinity of the six locations visited by Thabet on March 1,
    2019. In an affidavit supporting the application, Bailey described
    Thabet’s murder as seen on the surveillance footage of the bank
    parking lot. Bailey stated he had viewed surveillance camera
    footage from several of the other locations Thabet had visited
    that morning and had seen the gray and red sedans in the
    footage. Bailey did not state how many of the six locations had
    available surveillance footage, nor did he identify the locations at
    which the red and gray cars were visible.
    The affidavit included a brief overview of how Google tracks
    and stores location history data, stating Google collected data
    through “Global Position System (GPS) data, cell site/cell tower
    information, Bluetooth connections, and Wi-Fi access points.”
    Bailey stated, “I know most people in today’s society possess
    cellular phones and other items (e.g. tablets, watches, laptops)
    used to communicate electronically. . . . Most people carry
    cellular phones on their person and will carry them whenever
    they leave their place of residence.” In addition, Bailey
    explained, “Suspects involved in criminal activity will typically
    use cellular phones to communicate when multiple suspects are
    involved.” Therefore, Bailey concluded, identification of
    individuals in Thabet’s vicinity on the day of the murder would
    assist investigators in locating the drivers of the vehicles involved
    in the murder, who investigators believed had been following
    Thabet throughout the morning.
    b. Search parameters
    The warrant application sought location history data for
    individuals within six target locations. The first location was
    Thabet’s apartment, which was located in the middle of a large
    6
    city block, surrounded by both residential and retail buildings.
    The area designated for the search was a circle with a radius of
    100 meters from the center of the apartment complex
    (approximately seven and a half acres). It included the entire
    apartment building as well as portions of several surrounding
    buildings and approximately three-quarters of the street in front
    of the building. The timeframe for this search was 6:00 a.m. to
    7:15 a.m. on March 1, 2019.
    The second location was the gas station in Downey where
    Thabet picked up cash for deposit. The gas station is on the
    corner of a large intersection and is surrounded by other retail
    establishments. The search area consisted of a circle with a
    radius of 75 meters from the approximate center of the gas
    station (more than four acres). Included in the circle were the
    gas station, a restaurant and portions of other businesses, as well
    as the intersection in front of the gas station and the two main
    streets bordering the gas station. The timeframe for this search
    was 7:00 a.m. to 7:30 a.m. on March 1, 2019.
    The third location was the gas station in Bellflower. The
    search area consisted of a circle with a radius of 50 meters from
    the approximate center of the gas station (almost two acres).
    Included in the circle were part of the intersection and
    approximately 50 meters of the streets bordering the gas station,
    as well as portions of the surrounding businesses. The timeframe
    for this search was 7:30 a.m. to 9:40 a.m.
    The fourth location was the strip mall in Compton. The
    search area was a rectangle that included the strip mall,
    three streets bordering it and some neighboring buildings and
    parking lots (approximately one and one-half acres). The
    timeframe for this search was 9:40 a.m. to 10:15 a.m.
    7
    The fifth location was the gas station in Lynwood. The
    search area was a rectangle that included the gas station,
    neighboring buildings, including buildings across the street that
    appeared to be residences and the intersection bordering the gas
    station (approximately three acres). The timeframe for this
    search was 10:15 a.m. to 10:30 a.m.
    The sixth and final location was the bank in Paramount
    where the murder took place. The search area was a circle with a
    radius of 75 meters from the center of the bank building (more
    than four acres). The search area included the bank and parking
    lot, neighboring businesses and parking lots, the intersection in
    front of the bank and approximately 50 meters of the streets
    bordering the bank.
    c. The warrant process
    The warrant set forth a three-step process by which Google
    would respond to the request for information. At step one, Google
    was directed to search location history data for the six designated
    locations and times and produce an anonymized list of devices
    found within the search areas in the designated timeframes,
    including the individual times each device was recorded in the
    search area during the applicable time period.
    At step two, law enforcement would review the anonymized
    list of devices “to remove devices that are not relevant to the
    investigation, for example, devices that were not in the location
    for a sufficient period of time.” If law enforcement believed
    additional information was needed to determine whether a
    particular device was relevant to the investigation, law
    enforcement could request that Google provide additional location
    history information for that device even if that information fell
    outside of the initial geographic and temporal search parameters.
    8
    At step three, law enforcement could demand identifying
    information from Google for all devices law enforcement deemed
    relevant to the investigation. The warrant directed Google to
    provide this identifying information without additional legal
    process.
    3. Execution of the Search Warrant and Charges Against
    Meza and Meneses
    A Los Angeles superior court judge, acting as magistrate,
    signed the geofence search warrant on March 21, 2019.
    After reviewing the anonymized data provided by Google,
    the Sheriff’s Department sought identifying information for
    eight devices that had been in the relevant locations on March 1,
    2019. Google provided corresponding email addresses to law
    enforcement. The Sheriff’s Department then drafted additional
    search warrants related to two of those email addresses, which
    eventually led to the identification of Meza and Meneses as
    suspects.
    In an information filed December 4, 2020 Meza and
    Meneses were charged with murder (Pen. Code, § 187, subd. (a))
    with three special circumstances—murder for financial gain
    (§ 190.2, subd. (a)(1)), murder by means of lying in wait (§ 190.2,
    subd. (a)(15)) and intentionally discharging a firearm with intent
    to inflict death (§ 190.2, subd. (a)(21)). It was specially alleged as
    to the murder charge that a principal was armed with a rifle
    within the meaning of section 12022, subdivision (a)(2). The
    information included special firearm-use enhancement
    allegations as to Meza (§ 12022.53, subds. (b), (c) and (d)).
    Meneses was also charged with two counts of possession of a
    firearm by a felon (§ 29800, subd. (a)(1)), possession of an assault
    weapon (§ 30605, subd. (a)) and unlawful possession of
    9
    ammunition (§ 30305, subd. (a)(1)). Finally, the information
    specially alleged Meneses had suffered a prior serious felony
    conviction within the meaning of section 667, subdivision (a)(1).
    4. The Motion To Quash and Suppress
    On March 18, 2021 Meza moved pursuant to section 1538.5
    to quash the geofence warrant and suppress all evidence seized
    as a result of the warrant, including evidence seized pursuant to
    subsequent warrants and statements made by witnesses and
    other individuals. Meneses joined the motion. The motion
    contended Detective Bailey’s affidavit failed to establish probable
    cause and the geofence warrant lacked the particularity required
    by the Fourth Amendment. In a supplemental brief Meza and
    Meneses argued the geofence warrant did not comply with
    CalECPA because it did not adequately identify the target
    individuals or accounts and applications to be searched.
    A hearing on the motion was held on April 12, 2021.
    Spencer McInvaille, an expert on geolocation and mobile devices,
    testified on behalf of Meza and Meneses. McInvaille’s testimony
    was based on his training and experience, as well as his review of
    documents publicly filed by Google.6
    6      One such document was the Google Amicus Brief filed in
    United States v. Chatrie (E.D.Va. 2022) 
    590 F.Supp.3d 901
    , which
    was admitted as an exhibit without objection at the hearing.
    McInvaille also considered two declarations of Google employees
    filed in United States v. Chatrie, which the superior court
    received into evidence without objection. These documents
    describe Google’s location data collection and storage procedures
    as well as its process for responding to warrants for location
    history data.
    10
    McInvaille explained Google’s location data is derived from
    several sources: GPS, Bluetooth signals, cellular network data
    and the strength of nearby WiFi networks.7 Google logs each
    device’s location hundreds of times each day—as often as every
    two minutes according to some estimates. (See United States v.
    Chatrie (E.D.Va. 2022) 
    590 F.Supp.3d 901
    , 908 & fn. 10
    (Chatrie).) However, Google cannot pinpoint a user’s location
    with 100 percent accuracy. McInvaille stated the longitude and
    latitude recorded by Google as the device’s location is “not a
    physical actual location of the device. It’s just the estimate
    derived from the measurement that they took.” Thus, Google
    also reports a confidence interval, measured in meters, that
    indicates Google’s confidence in the location of the device. For
    example, a confidence interval of 15 meters indicates Google
    estimates the device is within a 15 meter radius of the given
    coordinates. The size of the confidence interval varies depending
    on the type of data from which the measurement was taken.
    7      According to Google, a user must not only enable location
    tracking on his or her device but also must opt-in to having that
    location data saved. Specifically, Google “saves a record of the
    user’s travels only when the user opts into [location history] as a
    setting on her Google account, enables the ‘Location Reporting’
    feature for at least one mobile device, enables the device-location
    setting on that mobile device, permits that device to share
    location data with Google, powers on and signs into her Google
    account on that device, and then travels with it.” (Google Amicus
    Brief, supra, at p. 8.) Nevertheless, some reports indicate Google
    can track a user’s location history even when the user has opted
    out of location reporting. (See In re Search of Information that Is
    Stored at the Premises Controlled by Google LLC (D.D.C. 2021)
    
    579 F.Supp.3d 62
    , 70 & fn. 8.)
    11
    Google aims to estimate a device’s location with 68 percent
    accuracy—that is, there will be a 68 percent chance the user was
    actually within the circle created by the confidence interval.
    When responding to a geofence warrant, Google considers a
    device within the search parameter if the estimated location is
    within the search boundaries even if the confidence interval
    extends beyond the search boundaries. Similarly, a device with
    an estimated location outside the search boundaries will not be
    included in the search results even if the confidence interval
    extends within the search boundaries.
    Romy Haas, a crime analyst for the Sheriff’s Department,
    testified for the prosecution regarding the application for and
    execution of the geofence warrant in this case. Haas explained
    she typically consults with detectives prior to drafting a geofence
    warrant application and assists in establishing the geographic
    parameters and timeframes of the requested warrant. She had
    participated in drafting and processing returns on more than
    50 geofence warrants by the time of the motion to suppress
    hearing in 2021, but at the time she assisted Detective Bailey
    with drafting the geofence warrant in this case in 2019 she had
    worked on only two other geofence warrants. Haas had
    participated in a number of trainings regarding location history
    data and geofence warrants, most of which took place after the
    warrant had been drafted in this case.
    The court directly questioned Haas regarding how she and
    Detective Bailey decided on the search parameters for the
    warrant. For the first location (Thabet’s apartment building),
    Haas testified the search radius of 100 meters from the center of
    the apartment building was selected so that it would capture the
    street in front of the building “in the event that [Thabet] was
    12
    being watched before he left.” Haas explained it was typical with
    early geofence warrants to draw a circle from a midpoint, but she
    noted a polygon “will help reduce the number of devices that will
    show up in the geofence.”
    For the second location, Haas testified the geofence
    perimeter was again drawn to capture the streets bordering the
    gas station “to see if . . . someone had been coming down those
    streets or parked on those streets if the—if someone was
    watching the victim at that location.” The perimeter for the third
    location was drawn to include the street on the north side of the
    gas station because there was surveillance video footage showing
    the suspect vehicles parked on that street. The perimeters for
    locations four and five were drawn as rectangles because Haas
    found using a circle captured too much area and would
    “encompass a bunch of devices that I didn’t feel would be
    necessary because they were in the outer neighborhood.”
    Instead, for location four she drew a rectangle that encompassed
    the area the victim visited inside the strip mall, and for location
    five the rectangle encompassed a parking lot across the street
    from the gas station where one of the suspect vehicles had been
    seen on surveillance video.
    Haas also testified regarding the warrant’s three-step
    process for Google’s production of data in response to the
    warrant. Haas explained the process was mandated by Google as
    the procedure that would most likely ensure Google’s compliance
    with a geofence warrant.8 However, the process was not strictly
    8      See generally Chatrie, supra, 590 F.Supp.3d at page 914
    (“[I]n 2018, Google held both internal discussions with its counsel
    and external discussions with law enforcement agencies,
    including the Computer Crime and Intellectual Property Section
    13
    followed in this case. Rather than produce an anonymized list of
    users found within the six geofence perimeters at step one, a
    Google employee called Haas and told her the strip mall location
    had produced “voluminous results.” Google requested Haas
    either shorten the timeframe or decrease the search area to
    reduce the number of responsive results. Haas testified she
    declined the request because “based on our careful consideration
    of the location and the timeframe involved, I didn’t think that
    would be fair to the case to do that. . . . I in discussion explained
    to [the Google employee] really what I was looking for based on
    the facts of the case. . . . I said I was looking to find devices that
    were [in] at least two or more of the geofence locations.” The
    Google representative responded she could filter the search and
    produce information for devices that were only in two or more of
    the specified locations at the applicable times. Haas agreed.
    Google produced a list of eight anonymized accounts that
    had been at two or more of the six locations at the relevant time
    periods. Of the eight accounts, one had been at four of the
    geofence locations, one at three locations and the remaining six
    had been at two locations. Haas requested, and Google produced,
    identification information for all eight accounts. Two of those
    of the United States Department of Justice (‘CCIPS’), to develop
    internal procedures on how to respond to geofence warrants. ‘To
    ensure privacy protections for Google users, . . . Google instituted
    a policy of objecting to any warrant that failed to include
    de[-]identification and narrowing measures.’ [Citation.]
    Seemingly developed as a result of Google’s collaboration with
    CCIPS, this de-identification and narrowing ‘protocol typically
    . . . entails a three-step process’”).
    14
    accounts (the ones that had been at three and four of the
    locations) ultimately led authorities to Meza and Meneses.
    5. The Superior Court’s Denial of the Motions To Suppress
    The superior court found there was sufficient probable
    cause to support issuance of the geofence warrant. The fact that
    the two suspect cars were seen in multiple surveillance videos
    made it reasonably probable “that they were using their phones
    to communicate or to determine the location that they’re going
    to.” The court further found the warrant satisfied the
    particularity requirements of the United States Constitution and
    CalECPA. The court stated it was satisfied the boundaries of the
    search areas were based on the locations of the suspect vehicles
    as seen in the video footage and were not so broad as to
    unnecessarily include devices of uninvolved bystanders. Finally,
    the court ruled, even if the warrant had been defective, the
    officers were entitled to rely on it under the good faith exception
    of United States v. Leon (1984) 
    468 U.S. 897
     (Leon). Accordingly,
    the court denied the motions to suppress.
    6. The Pleas and Sentences
    Following denial of the motions to suppress evidence, Meza
    pleaded guilty to first degree murder and Meneses pleaded no
    contest to second degree murder. Pursuant to negotiated
    agreements the special circumstances and special allegations
    were stricken, and the remaining counts as to Meneses were
    dismissed. Meza was sentenced to an indeterminate state prison
    term of 25 years to life. Meneses was sentenced to an
    indeterminate state prison term of 15 years to life.
    15
    DISCUSSION
    1. The Geofence Warrant Violated the Fourth Amendment
    a. Governing Law and Standard of Review
    The Fourth Amendment to the United States Constitution,
    applicable to the States by the Fourteenth Amendment, prohibits
    unreasonable searches and seizures and guarantees that “no
    Warrants shall issue, but upon probable cause, supported by
    Oath or affirmation, and particularly describing the place to be
    searched, and the persons or things to be seized.” (U.S. Const.,
    4th Amend.; see People v. Robinson (2010) 
    47 Cal.4th 1104
    , 1131;
    People v. Camacho (2000) 
    23 Cal.4th 824
    , 830-831.)9
    9        Article I, section 13 of the California Constitution similarly
    provides, “The right of the people to be secure in their persons,
    houses, papers, and effects against unreasonable seizures and
    searches may not be violated; and a warrant may not issue except
    on probable cause, supported by oath or affirmation, particularly
    describing the place to be searched and the persons and things to
    be seized.” Notwithstanding this separate warrant requirement
    in the California Constitution, pursuant to article I, section 28,
    subdivision (f)(2), of the state Constitution (the Truth-in-
    Evidence provision), “evidence sought to be introduced at a
    criminal trial is subject to suppression as the fruit of an
    unconstitutional search and seizure ‘only if exclusion
    is . . . mandated by the federal exclusionary rule applicable to
    evidence seized in violation of the Fourth Amendment [of the
    United States Constitution].’” (People v. Maikhio (2011)
    
    51 Cal.4th 1074
    , 1089; accord, In re Lance W. (1985) 
    37 Cal.3d 873
    , 896.)
    This limitation on the suppression of unlawfully obtained
    evidence does not apply if the search violated state law and
    exclusion was authorized “by statute hereafter enacted by a two-
    16
    A search is presumptively reasonable, and thus in
    compliance with the Fourth Amendment, if supported by a
    warrant describing with particularity the thing or the place to be
    searched. (See People v. Weiss (1999) 
    20 Cal.4th 1073
    , 1082.)
    “‘The manifest purpose of this particularity requirement [is] to
    prevent general searches. By limiting the authorization to search
    to the specific areas and things for which there is probable cause
    to search, the requirement ensures that the search will be
    carefully tailored to its justifications, and will not take on the
    character of the wide-ranging exploratory searches the Framers
    intended to prohibit.’” (People v. Amador (2000) 
    24 Cal.4th 387
    ,
    392; accord, Maryland v. Garrison (1987) 
    480 U.S. 79
    , 84.)
    Accordingly, in determining the validity of a warrant,
    courts examine three main factors: probable cause, particularity
    and overbreadth.10 Probable cause will be found to support the
    thirds vote of the membership of each house of the Legislature.”
    (Cal. Const., art. I, § 28, subd. (f)(2).)
    10     As a threshold matter no warrant is required if an
    individual has no reasonable expectation of privacy in the place
    or thing searched. (See People v. Camacho, 
    supra,
     23 Cal.4th at
    pp. 830-831.) As the Attorney General recognizes, the prosecutor
    did not argue this point in the trial court; and, thus, the issue is
    forfeited. (See People v. Nottoli (2011) 
    199 Cal.App.4th 531
    , 561
    [“[s]ince the prosecutor failed, in opposing the suppression
    motion, to assert that Barry had no reasonable expectation of
    privacy in the vehicle or cell phone, the People have forfeited that
    issue on review of the suppression ruling”].) Nevertheless, the
    United States Supreme Court has suggested that an individual
    has a right to privacy regarding his or her current and historical
    location. (See Carpenter v. United States (2018) __ U.S. __,
    [
    138 S.Ct. 2206
    , 2219] [retrieval of wireless carrier cell tower
    data to determine suspect’s location “invaded [suspect’s]
    17
    issuance of a warrant if “‘the magistrate had a substantial basis
    for concluding a fair probability existed that a search would
    uncover wrongdoing.’” (People v. Westerfield (2019) 
    6 Cal.5th 632
    ,
    659-660; accord, People v. Miles (2020) 
    9 Cal.5th 513
    , 576; People
    v. Kraft (2000) 
    23 Cal.4th 978
    , 1040-1041; see Illinois v. Gates
    (1983) 
    462 U.S. 213
    , 238-239 (Gates).)
    “Particularity is the requirement that the warrant must
    clearly state what is sought.” (In re Grand Jury Subpoenas
    Dated Dec. 10, 1987 (9th Cir. 1991) 
    926 F.2d 847
    , 856.) To satisfy
    this requirement, “[c]omplete precision in describing the place to
    be searched is not required.” (People v. Amador, supra,
    24 Cal.4th at p. 392; accord, People v. Minder (1996)
    
    46 Cal.App.4th 1784
    , 1788.) “‘It is enough if the description is
    such that the officer with a search warrant can with reasonable
    effort ascertain and identify the place intended.’” (Amador, at
    p. 392; accord, Steele v. United States (1925) 
    267 U.S. 498
    , 503.)
    “Breadth deals with the requirement that the scope of the
    warrant be limited by the probable cause on which the warrant is
    based.” (In re Grand Jury Subpoenas Dated Dec. 10, 1987, supra,
    926 F.2d at pp. 856-857.) This is distinct from the particularity
    requirement because it “prevents the magistrate from making a
    mistaken authorization to search for particular objects in the first
    instance, no matter how well the objects are described.” (United
    States v. Weber (9th Cir. 1990) 
    923 F.2d 1338
    , 1342 [although
    rules regarding particularity and overbreadth “serve the same
    ultimate purpose, they achieve the purpose in distinct ways”]; see
    reasonable expectation of privacy in the whole of his physical
    movements”]; Riley v. California (2014) 
    573 U.S. 373
    , 395-396
    [citing location history data as one of the privacy interests
    implicated by search of a cell phone’s contents].)
    18
    also United States v. Purcell (2d Cir. 2020) 
    967 F.3d 159
    , 179 [“A
    warrant that comports with the particularity requirements may,
    however, be defective due to overbreadth. ‘[B]readth and
    particularity are related but distinct concepts’”].)
    “In reviewing the trial court’s suppression ruling, we defer
    to its factual findings if supported by substantial evidence. We
    independently assess the legal question of whether the
    challenged search or seizure satisfies the Fourth Amendment.”
    (People v. Brown (2015) 
    61 Cal.4th 968
    , 975; accord, People v.
    Eubanks (2011) 
    53 Cal.4th 110
    , 133.)
    b. The Search Warrant Was Supported by Probable
    Cause
    Meza and Meneses contend Detective Bailey’s assertion of
    probable cause in his affidavit was insufficient because “[t]here
    was absolutely no evidence that either suspect had, or was using,
    a phone or other device at any time during the relevant
    timeframe.” Accordingly, they argue, there was no basis for
    determining that searching cell phone location history would lead
    to the identity of potential suspects or the recovery of other
    evidence related to the murder.
    Probable cause does not require conclusive evidence that a
    search will uncover relevant evidence, only that “‘there is a fair
    probability that contraband or evidence of a crime will be found
    in a particular place.’” (People v. Kraft, supra, 23 Cal.4th at
    p. 1041; accord, Gates, 
    supra,
     462 U.S. at p. 238.) “‘“[S]ufficient
    probability, not certainty, is the touchstone of reasonableness
    under the Fourth Amendment.”’” (People v. Beck and Cruz (2019)
    
    8 Cal.5th 548
    , 592; see also People v. Carrington (2009)
    
    47 Cal.4th 145
    , 163 [“[t]he showing required in order to establish
    probable cause is less than a preponderance of the evidence or
    19
    even a prima facie case”].) In making this determination a
    magistrate may draw reasonable inferences about where
    evidence is likely to be found based on the nature of the evidence
    and the type of offense. (See Gates, at p. 240; People v. Sandlin
    (1991) 
    230 Cal.App.3d 1310
    , 1315.)
    It was reasonable for the magistrate to conclude the
    perpetrators were carrying cell phones the morning of the murder
    and used them in coordinating their movements. Not only did
    Detective Bailey opine, based on his training and experience, that
    criminal suspects use cell phones to coordinate criminal activity,
    but also such an inference was reasonable in today’s society,
    especially given the suspected movement of the individuals to
    various locations in separate vehicles. (See Riley v. California
    (2014) 
    573 U.S. 373
    , 385, 401 [cell phones “are now such a
    pervasive and insistent part of daily life that the proverbial
    visitor from Mars might conclude they were an important feature
    of human anatomy”; “[c]ell phones have become important tools
    in facilitating coordination and communication among members
    of criminal enterprises”]; United States v. James (8th Cir. 2021)
    
    3 F.4th 1102
    , 1105 [finding probable cause supported warrant for
    cell phone records “[e]ven if nobody knew for sure whether the
    robber actually possessed a cell phone, the judges were not
    required to check their common sense at the door and ignore the
    fact that most people ‘compulsively carry cell phones with them
    all the time’”].)
    c. The Search Warrant Lacked Sufficient Particularity
    As discussed, the “purpose of the ‘particularity’
    requirement of the Fourth Amendment is to avoid general and
    exploratory searches by requiring a particular description of the
    items to be seized.” (People v. Bradford (1997) 
    15 Cal.4th 1229
    ,
    20
    1296.) “However, a warrant ‘need only be reasonably specific’
    [citation], and the ‘specificity required “varies depending on the
    circumstances of the case and the type of items involved.”’”
    (People v. Robinson, supra, 47 Cal.4th at p. 1132 [“particularity
    ‘is a flexible concept, reflecting the degree of detail available from
    the facts known to the affiant and presented to the issuing
    magistrate’”].) “‘[T]his requirement is held to be satisfied if the
    warrant imposes a meaningful restriction upon the objects to be
    seized.’” (People v. Frank (1985) 
    38 Cal.3d 711
    , 724.) In other
    words, “[t]he description in a search warrant must be sufficiently
    definite that the officer conducting the search ‘can, with
    reasonable effort ascertain and identify the place intended.’
    [Citation.] Nothing should be left to the discretion of the officer.”
    (People v. Dumas (1973) 
    9 Cal.3d 871
    , 880; see also United States
    v. Blakeney (4th Cir. 2020) 
    949 F.3d 851
    , 863 [warrants met
    particularity requirement where they “describe the items to be
    seized with enough particularity to constrain the discretion of the
    executing officers and prevent a general search”]; United States v.
    Collins (9th Cir. 1987) 
    830 F.2d 145
    , 145-146 [warrant not
    sufficiently particular where it contained an incorrect address
    and imprecise description, resulting in search of the wrong
    house].)
    The warrant in this case sufficiently described the place to
    be searched (Google’s database of users’ location history) and the
    items to be retrieved from that search (designated records for
    users found within the boundaries of certain coordinates at
    certain times). Indeed, Mesa and Meneses do not argue there
    was any ambiguity in the warrant that would lead law
    enforcement or Google personnel to search an incorrect database
    21
    or to identify individuals not contemplated by the text of the
    warrant.
    However, the warrant here failed to meet the particularity
    requirement because it provided law enforcement with unbridled
    discretion regarding whether or how to narrow the initial list of
    users identified by Google. Once the step one search had been
    conducted, law enforcement officials were able to enlarge the
    geographic parameters of the search and request additional
    information on any of the potentially thousands of users
    identified without any objective criteria limiting their discretion.
    Again, at step three law enforcement could seek identifying
    information of any of the users found within the search
    parameters without restriction on how many users could be
    identified or any further showing that information concerning
    each individual user would be relevant to the case.
    This failure to place any meaningful restriction on the
    discretion of law enforcement officers to determine which
    accounts would be subject to further scrutiny or deanonymization
    renders the warrant invalid. (See Chatrie, supra, 590 F.Supp.3d
    at p. 934 [geofence warrant lacks requisite particularity because
    “Steps 2 and 3 of this warrant leave the executing officer with
    unbridled discretion and lack any semblance of objective criteria
    to guide how officers would narrow the lists of users”]; In re
    Search of: Info. Stored at Premises Controlled by Google (N.D.Ill.
    2020) 
    481 F.Supp.3d 730
    , 754 (In re Google N.D.Ill) [denying
    geofence warrant application because “the warrant puts no limit
    on the government’s discretion to select the device IDs from
    which it may then derive identifying information from among the
    anonymized list of Google-connected devices that traversed the
    geofences”]; In re Search of Info. Stored at the Premises
    22
    Controlled by Google (Va.Cir.Ct., Feb. 24, 2022, KM-2022-79)
    2022 Va.Cir. Lexis 12, at pp. *24-*25 [denying geofence warrant
    application that allowed police to “unilaterally . . . enlarge the
    Court-authorized search zone” and “unilaterally tell Google which
    cell phones it wants to unmask to obtain the owner’s personal
    information”].)11
    d. The Search Warrant Was Overbroad
    In determining whether a warrant is overbroad courts
    consider “whether probable cause existed to seize all items of a
    category described in the warrant” and “whether the government
    could have described the items more particularly in light of the
    information available to it at the time the warrant issued.”
    (United States v. Shi (9th Cir. 2008) 
    525 F.3d 709
    , 731-732; see
    also People v. Hepner (1994) 
    21 Cal.App.4th 761
    , 778
    [“overbreadth also hinges on whether a more precise description
    [of the items to be seized] was reasonably possible”]; People v.
    MacAvoy (1984) 
    162 Cal.App.3d 746
    , 754-755 [“[o]n its face, the
    warrant would allow the officers to search every part of the
    fraternity house; since probable cause existed to search
    11     While not the only way to address unfettered law
    enforcement discretion at steps two and three, judicial oversight
    at those steps, not just prior to issuance of the warrant, would
    resolve many of the constitutional deficiencies discussed. (See,
    e.g., In re Search of Information that Is Stored at the Premises
    Controlled by Google LLC (D.D.C. 2021) 
    579 F.Supp.3d 62
    , 88-89
    [granting geofence warrant application requiring law
    enforcement to seek second court authorization for additional
    information regarding anonymous users initially identified by
    Google; this process “eliminated law enforcement’s discretion at
    step two by requiring it to return to the Court and justify any
    device deanonymization”].)
    23
    appellant’s room only, the warrant, as a general rule, is void”];
    Owens v. Lott (4th Cir. 2004) 
    372 F.3d 267
    , 276 [warrant
    authorizing search of “all persons” at certain location was valid
    “if the affidavit and information provided to the magistrate
    supply enough detailed information to establish probable cause to
    believe that all persons on the premises at the time of the search
    are involved in the criminal activity”]; In re Grand Jury
    Subpoenas Dated Dec. 10, 1987, supra, 926 F.2d at p. 857 [“the
    concept of breadth may be defined as the requirement that there
    be probable cause to seize the particular thing named in the
    warrant”].)
    The geofence warrant in this case ran afoul of both of these
    requirements. First, the warrant authorized the identification of
    any individual within six large search areas without any
    particularized probable cause as to each person or their location.
    For example, the first search location, the area around Thabet’s
    apartment complex, allowed law enforcement to obtain
    information on every individual in a seven-and-a-half-acre area
    over a 75 minute period in the early morning. The search area
    included Thabet’s entire apartment complex and surrounding
    buildings despite the lack of any evidence (or supported
    inference) that the suspects left their vehicles, let alone entered
    the apartment building. Given the early morning timeframe for
    the search, the warrant permitted identification of numerous
    individuals with no connection to the murder who were simply
    still at home. Indeed, for many of the search locations, the
    geographic boundaries incorporated more surface area where the
    suspects were not believed to have been present (inside buildings)
    than area where they were (adjacent roads and intersections).
    This overbreadth is even more pernicious given that individuals
    24
    (especially those near the perimeters of the search area) would be
    included in the warrant return despite an estimated 32 percent
    chance they were actually not within the search parameter at all.
    Second, law enforcement officials failed to draw the search
    boundaries as narrowly as they could have given the information
    available. For the first location Haas explained her goal was to
    capture the street in front of the apartment complex. Rather
    than draw a shape that would include only that targeted area,
    Haas used the center of the apartment building as a starting
    point for a circle large enough to incorporate the desired area.
    Haas implicitly conceded this method resulted in an overbroad
    search and no longer constituted best practices, explaining, “I feel
    that sometimes a polygon shape will help reduce the number of
    devices that will show up in the geofence. But a lot of circles in
    this type of shape [were] being used in the beginning to indicate
    the actual geofence.”
    The timeframes designated in the geofence warrant were
    also not narrowly tailored. The most striking example of this
    overbreadth was with location three, the Bellflower gas station
    where Thabet met his brother-in-law. According to preliminary
    hearing testimony, Thabet’s brother-in-law told police he met
    Thabet at the gas station at approximately 9:00 a.m. and they left
    at approximately 9:40 a.m. The warrant, however, directed
    Google to search the location for any devices present between
    7:30 a.m. and 9:40 a.m. Even allowing for some uncertainty,
    there is no evidence Thabet or the suspects were at the gas
    station 90 minutes before the time that the brother-in-law
    recalled arriving. Given this was a gas station in a metropolitan
    area during normal commuting hours, there were likely many
    25
    devices travelling through the search area during that
    90 minutes that were entirely unrelated to Thabet’s murder.
    Haas’s testimony there was surveillance footage from the
    Bellflower location showing one or both suspect cars parked on
    the street near the gas station constituted further evidence of the
    failure to narrow the parameters. The Sheriff’s Department
    presumably could have determined a far shorter time period
    during which the suspects were present based on a timestamp in
    the surveillance footage, but they failed to narrow the search
    accordingly. In fact, the evidence presented to the magistrate
    was devoid of any detail regarding the surveillance footage that
    would have supported a finding of probable cause for the
    particular search areas and times. Detective Bailey’s affidavit
    stated only that surveillance footage was available at “several
    locations” without identifying which locations had surveillance
    footage and which footage showed the suspects’ vehicles, let alone
    the precise location and time the suspects’ vehicles were seen.
    This information should have been used to more narrowly focus
    the search parameters.
    The failure to sufficiently narrow the search parameters
    potentially allowed a location-specific identification of thousands
    of individuals—likely a search within the ambit of the Fourth
    Amendment12— for whom no probable cause existed. While we
    12     See Note, Geofence Warrants and the Fourth Amendment
    (2021) 134 Harv. L.Rev. 2508, 2510-2511 (whether geofence
    warrants are Fourth Amendment searches is an open question;
    “[o]n the one hand, the [Supreme] Court has recognized that, in
    certain circumstances, individuals have reasonable expectations
    of privacy in their location information”; “[o]n the other hand,
    there is a strong argument that the third party doctrine—which
    states that individuals have no reasonable expectation of privacy
    26
    recognize it may be impossible to eliminate the inclusion of all
    uninvolved individuals in a geofence warrant, it is the
    constitutionally imposed duty of the government to carefully
    tailor its search parameters to minimize infringement on the
    privacy rights of third parties. (See In re Search Warrant
    Application for Geofence Location Data Stored at Google
    Concerning Arson Investigation (N.D.Ill. 2020) 
    497 F.Supp.3d 345
    , 362 (In re Arson Investigation) [“[I]t is nearly impossible to
    pinpoint a search where only the perpetrator’s privacy interests
    are impacted. Similarly, in the geofence context, there is no way
    to exclude the possibility that at any given time a delivery truck
    may drop off a parcel within the geofence location. The proper
    line of inquiry is not whether a search of location data could
    impact even one uninvolved person’s privacy interest, but rather
    the reasonableness of the search, the probability of finding
    evidence at the location, and the particularity of the search
    request”]; In the Matter of the Search of Information Associated
    with the Facebook Account Identified by the Username
    Aaron.Alexis That Is Stored at Premises Controlled by Facebook,
    Inc. (D.D.C. 2013) 
    21 F.Supp.3d 1
    , 7 [rejecting “overly broad
    search and seizure warrant application directed to Facebook, at
    least in part because it unduly invaded the privacy of third
    parties”].) The warrant here, authorizing the search of more than
    20 acres total over a cumulative period of more than five hours in
    residential and commercial areas did not meet this fundamental
    threshold requirement.
    in information they voluntarily provide to third parties—applies
    to these warrants” (fn. omitted)).
    27
    Other cases that have considered the validity of geofence
    warrants have also, almost uniformly, determined that such
    warrants are valid only if they are narrowly tailored to avoid
    unnecessary infringement on the privacy of uninvolved third
    parties. For example, in Chatrie a geofence warrant was issued
    directing Google to search a 17.5-acre area surrounding a bank
    where a robbery had occurred. The timeframe was for
    approximately 30 minutes prior to the robbery and 30 minutes
    after the robbery—a total of one hour. The district court noted
    the search area included a church and the search identified
    individuals “who may not have been remotely close enough to the
    Bank to participate in or witness the robbery.” (Chatrie, supra,
    590 F.Supp.3d at p. 930.) The court found the warrant was
    overbroad because it failed to “include any facts to establish
    probable cause to collect such broad and intrusive data” from
    each individual within the search area. (Id., at p. 929;13 see also
    In re Search of Information That Is Stored at the Premises
    Controlled by Google, LLC (D.Kan. 2021) 
    542 F.Supp.3d 1153
    ,
    1158 (In re Google D.Kan.) [denying geofence warrant application
    because search area included two public streets and an
    uninvolved business with no explanation as to why suspects
    might be found in those locations and contained no justification
    for the time period requested]; In re Google N.D.Ill, supra,
    481 F.Supp.3d at p. 757 [denying geofence warrant application
    because search area included unrelated business, public street,
    residential units and parking lot during 90 minute period despite
    13    Despite finding the geofence warrant invalid the Chatrie
    court ultimately denied the defendant’s motion to suppress based
    on the good faith exception of Leon, 
    supra,
     
    468 U.S. 897
    .
    28
    no showing all individuals in those locations were involved in the
    offense].)
    An example at the other end of the spectrum is In re Google
    D.D.C., supra, 
    579 F.Supp.3d 62
    . In that case, police were
    investigating criminal activity at a business located in an
    industrial area. Police obtained surveillance footage from inside
    the business showing the suspects engaging in criminal activity.
    Based on the precise locations of the suspects and the times
    depicted in the footage, police designated a geofence area of less
    than a quarter of an acre, including the front-half of the business
    and the parking lot but excluding another business in the
    building and the road bordering the building. The time period in
    the warrant totaled 185 minutes in increments of two to
    27 minutes on 8 different days based on when police knew the
    suspects had been present. The warrant affidavit also explained
    that, during the designated time periods, the suspects were
    either alone inside the business or were in the proximity of “‘on
    average’ no more than 2 or 3 others.” (Id. at p. 73.) The
    magistrate judge granted the warrant application, finding the
    government had “appropriately contoured the temporal and
    geographic windows in which it is seeking location data” and the
    warrant did not “have the potential of sweeping up the location
    data of a substantial number of uninvolved persons.” (Id. at
    pp. 80 & 85; see also In re Arson Investigation, supra,
    497 F.Supp.3d at p. 353 [granting geofence warrant application
    where search area excluded residences and commercial buildings,
    time periods sought were approximately 15 to 30 minutes per
    location and there was evidence premises in search areas were
    unoccupied during relevant time periods; “the government has
    structured the geofence zones to minimize the potential for
    29
    capturing location data for uninvolved individuals and maximize
    the potential for capturing location data for suspects and
    witnesses”]; United States v. Rhine (D.D.C. Jan. 24, 2023, No. 21-
    0687) 2023 U.S.Dist. Lexis 12308, at pp. *95-*103 [denying
    motion to suppress where geofence warrant had sought
    identification of individuals in the United States Capitol Building
    over a four and a half hour period on January 6, 2021; court
    found warrant was narrowly tailored to include individuals
    improperly inside the Capitol given that the building was closed
    to the public and the search area excluded nearby grounds, did
    not include any commercial businesses or residences and there
    had been substantial road closures during the relevant time
    period].)
    2. The Officers Reasonably Relied on the Geofence Warrant
    in Good Faith
    “In Leon, the [United States] Supreme Court held that
    when ‘an officer acting with objective good faith has obtained a
    search warrant from a judge or magistrate and acted within its
    scope,’ the ‘marginal or nonexistent benefits’ produced by
    suppressing the evidence obtained ‘cannot justify the substantial
    costs of exclusion.’” (People v. Lazarus (2015) 
    238 Cal.App.4th 734
    , 766, quoting Leon, 
    supra,
     468 U.S. at pp. 920-922.)
    Accordingly, denial of the motion to suppress must be upheld
    under the “good faith” exception to the exclusionary rule where a
    search has been conducted “in objectively reasonable reliance on
    a subsequently invalidated search warrant.” (Leon, at p. 922.)
    Leon set forth four scenarios in which such objectively reasonable
    reliance should not be found and suppression remained the
    appropriate remedy: (1) “[T[he magistrate or judge in issuing a
    warrant was misled by information in an affidavit that the
    30
    affiant knew was false or would have known was false except for
    his reckless disregard of the truth”; (2) if “the issuing magistrate
    wholly abandoned his [or her] judicial role”; (3) the affidavit is
    “‘so lacking in indicia of probable cause as to render official belief
    in its existence entirely unreasonable’”; or (4) if the warrant was
    “so facially deficient—i.e., in failing to particularize the place to
    be searched or the things to be seized—that the executing officers
    cannot reasonably presume it to be valid.” (Id. at p. 923.) The
    government bears the burden to establish applicability of the
    good faith exception. (People v. Willis (2002) 
    28 Cal.4th 22
    , 36-
    37.)
    Meza and Meneses argue both the third and fourth Leon
    scenarios—a total lack of probable cause and an obvious failure to
    satisfy the requirement of particularity—apply here. As
    discussed, probable cause supported issuance of the warrant.
    This factor does not preclude application of the good faith
    exception.
    In determining whether the warrant was so facially
    deficient that the executing officers could not have reasonably
    presumed it to be valid, “we apply the objective test of ‘whether a
    reasonably well trained officer would have known that the search
    was illegal despite the magistrate’s authorization.’” (People v.
    Hochanadel (2009) 
    176 Cal.App.4th 997
    , 1015; see also People v.
    Camarella (1991) 
    54 Cal.3d 592
    , 605.) “This objective standard
    ‘requires officers to have a reasonable knowledge of what the law
    prohibits.’” (People v. Gotfried (2003) 
    107 Cal.App.4th 254
    , 265.)
    That standard was not met here. At the time law
    enforcement officers sought and executed the search warrant,
    geofence warrants were still a novel investigative tool. The
    warrant was only the third prepared by Haas, and she had not
    31
    yet had much of the training on the practice that she would
    eventually receive. In early 2019 when this warrant was drafted
    and executed, there were no published cases anywhere in the
    country, let alone in California, analyzing the constitutionality of
    geofence warrants. (See Chatrie, supra, 590 F.Supp.3d at p. 938
    [when warrant was obtained in June 2019, “no court had yet
    ruled on the legality” of geofence warrants]; In re Search of:
    Information Stored at Premises Controlled by Google (N.D.Ill.
    July 8, 2020, No. 20 M 297) 2020 U.S.Dist. Lexis 165185, at p. *9
    [noting no controlling authority addressing constitutional validity
    of geofence warrants].) Furthermore, as the preceding analysis
    demonstrates, “the permissibility of geofence warrants is a
    complex topic, requiring a detailed, nuanced understanding and
    application of Fourth Amendment principles.” (Chatrie, at
    p. 938.)
    Meza and Meneses argue the good faith exception should
    not apply here because, instead of following the three steps
    described in the warrant, “Haas and Bailey disregarded the
    express terms set forth in the warrant, and essentially fashioned
    their own search warrant.” While officers may not rely on the
    good faith exception when they have knowingly exceeded the
    scope of a warrant (see Leon, 
    supra,
     468 U.S. at p. 918, fn. 19 [the
    good faith exception “assumes, of course, that the officers
    properly executed the warrant and searched only those places
    and for those objects that it was reasonable to believe were
    covered by the warrant”]; see also People v. Nguyen (2017)
    
    12 Cal.App.5th 574
    , 586-587), the manner of execution in this
    case (Google’s filtering of the results at step one) narrowed, not
    expanded, the search authorized by the warrant. Rather than
    receiving a list of many thousands of anonymized devices from
    32
    Google that could then be filtered and matched, law enforcement
    received only information about eight specific devices—as if only
    two rooms of a house were searched pursuant to a warrant that
    authorized searching the entire property.
    Given the dearth of authority directly on point and the
    novelty of the particular surveillance technique at issue, the
    officers were not objectively unreasonable in believing the
    warrant was valid, even if the issue, upon close legal
    examination, is not a particularly close one. (See People v.
    Rowland (2022) 
    82 Cal.App.5th 1099
    , 1124 [applying good faith
    exception where no California precedent existed on the issue];
    People v. Pressey (2002) 
    102 Cal.App.4th 1178
    , 1191 [same]; see
    also United States v. Smith (N.D.Miss. Feb. 10, 2023, No. 3:21-cr-
    107-SA) 2023 U.S.Dist. Lexis 22944, at pp. *37-*38 [applying
    good faith exception to geofence warrant given lack of legal
    authority on the issue]; Chatrie, supra, 590 F.Supp.3d at p. 938
    [same].)14
    3. The Geofence Warrant Did Not Violate CalECPA
    Effective January 1, 2016, CalECPA requires law
    enforcement officials to obtain a warrant in order to compel
    production of electronic communication information and
    14    Meza and Meneses attempt to distinguish Chatrie because
    in that case the detective sought advice from prosecutors before
    applying for the geofence warrant. While such a practice is
    certainly prudent when dealing with a novel search technique
    and a lack of legal authority, we cannot say in this particular
    instance the failure to do so rendered law enforcement’s reliance
    on the warrant objectively unreasonable.
    33
    electronic device information from a service provider.15 (§ 1546.1,
    subd. (b).) Covered information includes “information stored on
    or generated through the operation of an electronic device,
    including the current and prior locations of the device.” (§ 1546,
    subd. (g).) Any warrant issued pursuant to CalECPA “shall
    describe with particularity the information to be seized by
    specifying, as appropriate and reasonable, . . . the target
    individuals or accounts” and “the applications or services
    covered.” (§ 1546.1, subd. (d)(1).) A party “may move to suppress
    any electronic information obtained or retained in violation of the
    Fourth Amendment to the United States Constitution or of this
    chapter.” (§ 1546.4, subd. (a).)16
    Meza and Meneses first argue the geofence warrant in this
    case violated CalECPA because it “fails to specifically target
    individuals or accounts. No individual’s name was included in
    the warrant, nor was any specific cell phone number, email
    address, or account information.” Their argument ignores the
    15    Prior to passage of CalECPA, California law did not require
    law enforcement officials to obtain a warrant to access most
    electronic information. Proponents of CalECPA sought to update
    the law for “the digital age” and “properly safeguard the robust
    constitutional privacy and free speech rights of Californians, spur
    innovation, and support public safety by instituting clear warrant
    standards for government access to electronic information.” (Sen.
    Com. on Public Safety, Analysis of Sen. Bill No. 178 (2015-2016
    Reg. Sess.) Mar. 24, 2015; see also Freiwald, At the Privacy
    Vanguard: California’s Electronic Communications Privacy Act
    (CalECPA) (2018) 
    33 Berkeley Tech. L.J. 131
    , 143-147.)
    16    Senate Bill No. 178 (Stats. 2015, ch. 651) was adopted by a
    greater-than-two-thirds vote by both the state Senate and
    Assembly. See foonote 9, above.
    34
    plain language of the statute, which provides that a warrant
    shall describe with particularity the information to be seized “as
    appropriate and reasonable.” (§ 1546.1, subd. (d)(1).) The
    warrant in this case described the target individuals and
    accounts with the greatest degree of particularity available to
    investigators—individuals whose devices were located within the
    search boundaries at certain times. There is no requirement in
    the statute that a suspect’s name or other identifying information
    be included in the warrant to ensure its validity. In fact,
    CalECPA specifically contemplates a scenario where there is “no
    identified target of a warrant” and provides that, in such an
    instance, because notice of the warrant cannot be served upon
    any individual, the law enforcement agency seeking the warrant
    must notify the California Department of Justice. (§ 1546.2,
    subd. (c).) Accordingly, the failure to specify an individual’s name
    or other identifying information did not render the warrant
    invalid under CalECPA.
    Meza and Meneses next argue the warrant violated
    CalECPA because it did not specify the “applications and services
    covered” by the warrant. CalECPA does not define “applications
    and services”; and Meza and Meneses have not explained what
    they believe it means, what particular information they contend
    should have been included in the warrant, or how the warrant
    was ambiguous absent such unspecified information. The
    common sense meaning of the statute appears to be that, when
    law enforcement seeks to recover the content of electronic
    communications, such as emails or text messages, the warrant
    must specify, as appropriate and reasonable, the particular mail
    or text message applications and services from which law
    enforcement seeks to retrieve information. With a geofence
    35
    warrant, however, the government is not seeking data or content
    related to a particular application or service. Rather, what is
    sought is the service provider’s record of all electronic contact
    with that device, regardless of which applications or services
    originated the contact. Accordingly, the failure to name a
    particular application or service in this instance does not result
    in a violation of CalECPA.
    Finally, Meza and Meneses argue any constitutional
    infirmities in the warrant create an independent violation of
    CalECPA.17 Meza and Meneses do not explain precisely how a
    constitutional violation is also a statutory violation. However, it
    appears they rely on CalECPA’s requirement that a warrant
    must comply with all “provisions of California and federal law”
    (§ 1546.1, subd. (d)(3)) and its grant of standing to “any person”
    to “move to suppress any electronic information obtained or
    retained in violation of the Fourth Amendment to the United
    States Constitution or of this chapter” (§ 1546.4, subd. (a)).
    Those provisions do nothing more than expressly preserve an
    individual’s existing rights under the federal Constitution. There
    is nothing in the cited language that, without more, converts a
    Fourth Amendment violation into a statutory violation.
    17    Establishing an independent CalECPA violation in addition
    to a Fourth Amendment violation is crucial to Meza and
    Meneses’s position because they contend the Leon good faith
    exception is not applicable to a CalECPA violation. We need not
    address that issue.
    36
    DISPOSITION
    The judgments are affirmed.
    PERLUSS, P. J.
    We concur:
    SEGAL, J.
    FEUER, J.
    37
    Filed 8/16/23
    Court of Appeal, Second Appellate District, Division Seven - No. B318310
    S280089
    IN THE SUPREME COURT OF CALIFORNIA
    En Banc
    ________________________________________________________________________
    THE PEOPLE, Plaintiff and Respondent,
    v.
    DANIEL MEZA et al., Defendants and Appellants.
    ________________________________________________________________________
    Defendant Meneses’s motion to join defendant Meza’s petition for review is
    granted.
    The petitions for review are denied.
    Liu and Evans, JJ., are of the opinion the petition should be granted.
    (See Dissenting Statement by Liu, J.)
    ____________/s/__________________
    Chief Justice
    PEOPLE v. MEZA
    S280089
    Dissenting Statement by Justice Liu
    The Electronic Communications Privacy Act (CalECPA;
    Pen. Code, § 1546 et seq.) governs law enforcement’s ability to
    “compel the production of or access to electronic communication
    information from a service provider.” (Id., § 1546.1, subd. (b).)
    “Any warrant for electronic information” must meet certain
    requirements:      it must “describe with particularity the
    information to be seized” and “require that any information
    obtained . . . that is unrelated to the objective of the warrant
    shall be sealed.” (Id., § 1546.1, subd. (d)(1), (2)). In addition, the
    warrant must “comply with all other provisions of California
    and federal law, including any provisions prohibiting, limiting,
    or imposing additional requirements on the use of search
    warrants.” (Id., § 1546.1, subd. (d)(3).)
    Here, law enforcement used a geofence warrant — a
    “ ‘ “reverse location search[]” ’ ” request — to access device
    location data gathered by Google. (People v. Meza (2023) 
    90 Cal.App.5th 520
    , 525 (Meza).) The warrant directed Google to
    search certain location history data, produce an anonymized list
    of devices, and turn over identifying information for devices that
    law enforcement deemed relevant to the investigation. (Id. at
    pp. 529–530.) This led to the identification of defendants Daniel
    Meza and Walter Meneses, whose cell phones, while “signed in
    to Google accounts connected to them[,] were in several of the
    same locations” as the victim. (Id. at p. 526.) Meza and Meneses
    challenge the warrant and admission of the resulting evidence
    1
    PEOPLE v. MEZA
    Liu, J., dissenting statement upon denial of review
    under the Fourth Amendment to the United States Constitution
    and CalECPA.
    The Court of Appeal concluded the geofence warrant
    violated the Fourth Amendment because it “lacked the
    particularity required by the Fourth Amendment and was
    impermissibly overbroad.” (Meza, supra, 90 Cal.App.5th at
    p. 526.) It then held that the warrant did not violate CalECPA,
    rejecting an argument that the “constitutional infirmities in the
    warrant create an independent violation” of the statute. (Meza,
    at p. 546.) The Court of Appeal’s analysis was minimal. It
    reasoned that “nothing in the [statutory] language . . . , without
    more, converts a Fourth Amendment violation into a statutory
    violation.” (Ibid.)
    It is not apparent what “more” is necessary here. Penal
    Code section 1546.1, subdivision (d)(3) requires all warrants to
    comply with “all other provisions of California and federal law,”
    which includes the Fourth Amendment.                  CalECPA’s
    incorporation of the Fourth Amendment’s requirements seems
    unambiguous: a warrant that violates federal law also violates
    CalECPA. Consistent with this reading, the statute’s remedy
    provision specifically references Fourth Amendment violations:
    “Any person in a trial, hearing, or proceeding may move to
    suppress any electronic information obtained or retained in
    violation of the Fourth Amendment to the United States
    Constitution or of this chapter.” (Pen. Code, § 1546.4, subd. (a).)
    The Court of Appeal held that these “provisions do nothing
    more than expressly preserve an individual’s existing rights
    under the federal Constitution.” (Meza, supra, 90 Cal.App.5th
    at p. 546.) But there is no need for a state statute to “expressly
    preserve” federal rights.         An individual can always
    2
    PEOPLE v. MEZA
    Liu, J., dissenting statement upon denial of review
    independently pursue a federal constitutional challenge, as
    Meza and Meneses did here. CalECPA did not purport to
    supplant the requirements of federal law; in fact, it would have
    been impermissible for the statute to do so. (See Sibron v. New
    York (1968) 
    392 U.S. 40
    , 60–61 [a state “is, of course, free to
    develop its own law of search and seizure to meet the needs of
    local law enforcement” but “may not . . . authorize police conduct
    which trenches upon Fourth Amendment rights”].) Interpreting
    these provisions as solely preserving existing federal rights
    appears to give them no effect.
    The consequences of this decision are potentially
    significant. Despite finding that the warrant violated the
    Fourth Amendment, the Court of Appeal declined to apply the
    exclusionary rule under the good faith exception of United
    States v. Leon (1984) 
    468 U.S. 897
    . (Meza, supra, 90 Cal.App.5th
    at p. 544.) It is not clear whether such an exception applies to
    violations of CalECPA, and there are plausible arguments on
    both sides of the question. (See Freiwald, At the Privacy
    Vanguard: California’s Electronic Communications Privacy Act
    (CalECPA) (2018) 
    33 Berkeley Tech. L.J. 131
    , 161 [“[T]he state
    procedures do not incorporate the expansive exceptions that
    courts have used to deny suppression remedies in Fourth
    Amendment cases under the doctrine of good faith.”], fn.
    omitted; Meza, at p. 546, fn. 17 [declining to reach the question];
    cf. People v. Jackson (2005) 
    129 Cal.App.4th 129
    , 153–160
    [considering various factors in concluding that the good faith
    exception does not apply to evidence gathered in violation of
    California’s wiretap law].) If the exception does not apply, then
    the identifying evidence would be suppressed under CalECPA,
    thus affecting the validity of Meza’s and Meneses’s convictions.
    3
    PEOPLE v. MEZA
    Liu, J., dissenting statement upon denial of review
    CalECPA is a “significant” statute that made “the law
    governing access to electronic communications by law
    enforcement in California . . . much more protective of
    communications privacy.” (Freiwald, supra, 33 Berkeley Tech.
    L.J. at p. 133.) Because I find questionable the Court of Appeal’s
    interpretation of this important state law, and because of the
    practical importance of the issue, I would grant review.
    LIU, J.
    I Concur:
    EVANS, J.
    4