State Of Washington, V. Mehmet Bilgi ( 2021 )


Menu:
  •                                                                                                Filed
    Washington State
    Court of Appeals
    Division Two
    October 19, 2021
    IN THE COURT OF APPEALS OF THE STATE OF WASHINGTON
    DIVISION II
    STATE OF WASHINGTON,                                                No. 53464-9-II
    Respondent,
    v.
    MEHMET BILGI,                                             PUBLISHED IN PART OPINION
    Appellant.
    CRUSER, J.—Mehmet Bilgi was convicted of attempted rape of a child in the second degree
    and communication with a minor for immoral purposes. Bilgi appeals his convictions, arguing that
    (1) the trial court erred when it denied his motion to suppress text messages and e-mails obtained
    while law enforcement was violating Washington’s privacy act, chapter 9.73 RCW, (2) the trial
    court erred when it denied his motions to compel discovery related to the technology used by law
    enforcement, and (3) the prosecuting attorney committed misconduct in closing argument.
    In the published portion of this opinion, we hold that (1) the trial court did not err when it
    denied Bilgi’s motion to suppress because law enforcement did not intercept Bilgi’s text messages
    or e-mails in violation of the privacy act. In the unpublished portion of this opinion, we hold that
    (2) the trial court did not abuse its discretion when it denied Bilgi’s motions to compel discovery
    and that (3) the prosecuting attorney did not commit reversible misconduct. Therefore, we affirm
    Bilgi’s convictions.
    No. 53464-9-II
    FACTS
    I. FACTS UNDERLYING THE CHARGES
    Detective Kristl Pohl, working with Washington State Patrol’s (WSP) Missing and
    Exploited Children’s Task Force (MECTF), posted an advertisement on Doublelist, a website
    similar to Craigslist where people advertise for sexual encounters, as part of MECTF’s thirteenth
    “Net Nanny” operation.1 9 Verbatim Report of Proceedings (VRP) at 905. The advertisement
    asked, “where is the hook up spots in Puyallup that a yung [sic] hot guy could go?” Clerk’s Papers
    (CP) at 156. It included a picture of a young adult male with a Snapchat filter that made his face
    resemble a “koala bear.” 11 VRP at 1190. When Pohl answered messages directed to this
    advertisement, she assumed the persona of a 13-year-old boy named “Jake.” 9 VRP at 934.2
    Bilgi responded to Pohl’s advertisement with an e-mail message that said, “hey did you
    find your guy or spot yet ? hit me up and we can have some fun together.” Ex. 2 at 1. He attached
    a picture of an erect penis. Bilgi soon mentioned the possibility of meeting people at
    “neighborhood dive bars,” to which Jake responded that he was not old enough to go to bars. Id.
    1
    Detective Sergeant Carlos Rodriguez, the supervisor of MECTF, defined the Net Nanny
    operation as “a proactive undercover operation . . . looking for people who are offering children
    for sex, or any type of exploitation, or people seeking to have sex with kids, or sexually exploited
    children.” 9 VRP at 835.
    2
    Pohl did not ever use a name to identify herself when messaging Bilgi, but
    the State refers to the fictitious child as “Jake” throughout the proceedings.
    2
    No. 53464-9-II
    When Bilgi asked how old Jake was, Pohl said, “13.” Id. at 3. After initially expressing surprise,
    Bilgi responded, “so what do you wanna [sic] do?” Id.3
    After about a week of sending e-mail messages, Bilgi and Pohl switched to communicating
    through text messages. Bilgi texted using Google Voice, “a voiceover internet number” that was
    not connected to his cellular phone. 9 VRP at 931. He told Jake that he was 27 years old.4 Bilgi
    and Jake communicated periodically over the next month, with most of their conversations
    involving sexual content. Eventually, Bilgi arranged to meet Jake at a park.
    Prior to arriving at the park, Bilgi texted a picture of his face and a description of his car.
    When Bilgi arrived, Pohl texted, “can you roll down ur [sic] windows and wave?” CP at 318.
    Officers arrested Bilgi after they saw him roll down his window and wave. Officers later recovered
    condoms and personal lubricant from Bilgi’s car.
    The State charged Bilgi with attempted rape of a child in the second degree and
    communication with a minor for immoral purposes.
    II. PROCEDURAL HISTORY
    MOTIONS TO SUPPRESS COMMUNICATIONS
    During an interview with defense counsel, Detective Pohl disclosed that she used a
    software named Callyo to send text messages to Bilgi from her computer. Pohl explained that
    Callyo allows MECTF to sort messages by the phone number they are using and by the suspects’
    3
    Pohl inadvertently responded to Bilgi using the e-mail address mamaKK360@gmail.com, an
    address that she typically uses when adopting the persona of a mother, not a teenage boy. However,
    Bilgi did not “express any concern” about the e-mail name. 9 VRP at 920.
    4
    Bilgi was actually 35 years old.
    3
    No. 53464-9-II
    phone numbers. It also allows the detectives to download all of the messages associated with a
    particular suspect’s phone number in a zip file and to open those messages in a spreadsheet.
    After this interview, Bilgi moved to suppress “all evidence relating to the e[-]mail and text
    communications of the defendant, including oral testimony about them,” under the privacy act. Id.
    at 488. Bilgi argued that his text messages were unlawfully “intercepted and recorded by law
    enforcement using specialized computer surveillance software called ‘Callyo.’ ” Id. at 490. The
    State responded, “The messages were not intercepted at all. They were sent by the defendant to a
    boy he knew as ‘Jake’ at a specific phone number. They were received by ‘Jake’ at that same
    number. They were opened and read by ‘Jake.’ ” Supp. CP at 1240.
    At the CrR 3.6 hearing, Detective Sergeant Rodriguez testified that he controls the Callyo
    account for the Net Nanny operations. He explained that Callyo, like Google Hangouts, generates
    phone numbers for the officers to use to communicate with suspects, but Callyo is a preferable
    program because to document communications with Google Hangouts, the officers “would have
    to take screen shots . . . as [they] scrolled through [their] computer screen . . . and it was very
    tedious.” 4 VRP (May 21, 2019) at 233. With Callyo, they can download the entire conversation
    by clicking a button.
    When he first set up the Callyo account, Rodriguez assigned separate usernames to
    individuals working on the operation, but now he uses one login and password for the entire
    operation because multiple logins “just isn’t efficient.” Id. at 270. Now, if one of the other officers
    asks Rodriguez to review their chats, he “can either just move over to their seat and look, or [he]
    can do it right from [his] computer.” Id. at 255. The shared login also makes it easier for the officers
    to take over for one another. Multiple people can be logged in under the same username at the
    4
    No. 53464-9-II
    same time, and anybody who logs in has the ability to access and participate in any of the chats.
    Rodriguez testified that members of MECTF have “the explicit authority” to read messages sent
    through Callyo. Id. at 268.
    Pohl similarly testified that although she was the only person who messaged Bilgi,
    “anybody that has the log in and the password to the account could view it.” Id. at 313. She testified
    that she sent all of her text messages to Bilgi through the Callyo program, and that even if it was
    not specifically discussed, other members of the operation had her permission to access those
    messages.
    On the day of Bilgi’s arrest, Detective John Garden was performing surveillance. Garden
    testified that he was logged in to Callyo on his iPad, observing the communications between Pohl
    and Bilgi as they were occurring. Detective Kathryn Chovil-Peterson, who also performed
    surveillance for Bilgi’s arrest, testified that she was “capable of” accessing the chats while she was
    waiting for Bilgi to arrive at the arrest location, but she “[did not] recall . . . in Mr. Bilgi’s case if
    [she] was monitoring the conversations or not.” Id. at 301-02. Pohl was also logged in to Callyo at
    headquarters, and “[s]omebody in the room would have been acting as the incident commander
    and would have been the one responsible for passing that information onto the surveillance units.”
    Id. at 319.
    Bilgi contended that Garden’s admitted viewing of the messages while he was performing
    surveillance constituted a privacy act violation because Garden was not a party to the conversation
    and he did not have court authorization to view the messages in real time. Bilgi argued, “It is not
    reasonable for a sender of a communication to expect that that private communication will go to a
    surveillance software . . . where it will be stored and then transmitted to multiple people . . . in
    5
    No. 53464-9-II
    different locations, and who are not participating in the conversation in any way.” Id. at 256-57.
    The State responded that “once law enforcement lawfully possesses the information, that’s the end
    of the inquiry. . . . It’s delivered to one account, which is accessible by law enforcement as a whole
    because Carlos Rodriguez gave them the authority to do it.” Id. at 367-68.
    At the conclusion of the hearing, the trial court found that the communications between
    Bilgi and Pohl were private and that they were recorded on Pohl’s computer, which is an electronic
    device. It also found that Bilgi impliedly consented to the recording of his communications on
    Pohl’s device.
    The trial court noted that MECTF used a software that “allowed officers to communicate
    with multiple subjects at the same time, using the same undercover telephone number for outgoing
    messages, and then generate a report containing all the messages from a single incoming number,”
    but it found that Bilgi’s “consent is not based in any way on the nature of the software used by the
    recipient.” CP at 1202. It further found that both Rodriguez and Pohl consented to other members
    of the Net Nanny operation reading their text messages.
    The trial court rejected Bilgi’s argument that his “consent was limited to the intended
    recipient, ‘Jake’ (Det. Pohl), such that any other officer who read his messages ‘intercepted’ them.”
    Id. at 1203. “It is well-settled in this state that the sender of a text message runs the risk the recipient
    will share the content of that message with one or multiple other persons.” Id. Therefore, “Det.
    Pohl did not violate the Privacy Act by allowing other members of MECTF to read her
    communications with [Bilgi].” Id. at 1204. The trial court denied Bilgi’s motion to suppress his
    communications.
    6
    No. 53464-9-II
    At trial, the State admitted Bilgi’s text messages to Jake. The jury found him guilty as
    charged. Bilgi appeals his convictions.
    ANALYSIS
    WASHINGTON’S PRIVACY ACT
    Bilgi argues the trial court erred when it denied his motion to suppress because various
    members of MECTF intercepted his communications in violation of the privacy act. Bilgi concedes
    that he impliedly consented to the recording of his messages on Detective Pohl’s device, but he
    contends that MECTF used Callyo to “intercept[ his communications] and broadcast them,
    allowing anyone logged into the program to observe the communications as they occurred,” and
    that he did not consent to such an interception. Br. of Appellant at 25. Bilgi specifically challenges
    the trial court’s legal conclusion that his implied consent to record the messages was not limited
    to Jake’s, or Pohl’s, device, as well as the court’s legal conclusion that Pohl could allow other
    members of the operation to read the messages without violating the privacy act.5
    We hold that law enforcement did not intercept Bilgi’s text messages in violation of the
    privacy act because Bilgi intended to send messages to a fictitious child, and his messages were
    received by the account behind that fictitious child.
    5
    Bilgi actually assigns error to the trial court’s findings of fact XI and XII, but as he correctly
    notes, these findings were conclusions of law “and we treat [them] as such.” State v. Norris, 
    157 Wn. App. 50
    , 66, 
    236 P.3d 225
     (2010).
    7
    No. 53464-9-II
    A.     LEGAL PRINCIPLES
    Under Washington’s privacy act, communications may be intercepted or recorded only if
    all parties consent or if law enforcement receives specific court authorization. RCW 9.73.030.6 It
    is unlawful “to intercept, or record any . . . [p]rivate communication . . . by any device electronic
    or otherwise designed to record and/or transmit said communication . . . without first obtaining the
    consent of all the participants in the communication.” RCW 9.73.030(1)(a). The act includes
    exceptions for emergencies, threats, and the investigation of specific crimes, but those exceptions
    do not apply here. See RCW 9.73.030(2), .210, .230.
    Information obtained in violation of RCW 9.73.030 is inadmissible in a criminal trial.
    RCW 9.73.050. This exclusionary rule broadly encompasses “any information obtained while
    using unauthorized electronic broadcasts, including visual observations and assertive conduct.”
    State v. Fjermestad, 
    114 Wn.2d 828
    , 835, 
    791 P.2d 897
     (1990); see also State v. Gearhard, 13
    Wn. App. 2d 554, 560, 
    465 P.3d 336
     (explaining that if a recording does not fall within an
    exception to the privacy act, “neither the recording nor any testimony about the recorded
    conversation [is] admissible evidence”), review denied, 
    196 Wn.2d 1015
     (2020). Further, if
    information obtained in violation of the privacy act was used in an application for a search warrant,
    and the remaining evidence in support of the warrant is insufficient to support a finding of probable
    cause in the absence of the unlawfully obtained information, then any evidence obtained through
    the search warrant must also be excluded. State v. Salinas, 
    121 Wn.2d 689
    , 697, 
    853 P.2d 439
    (1993). “Failure to suppress evidence obtained in violation of the act is prejudicial unless, within
    6
    The legislature reenacted and amended this statute in 2021, but the amendment does not impact
    the provisions at issue in this case. See LAWS of 2021, ch. 329, § 21.
    8
    No. 53464-9-II
    reasonable probability, the erroneous admission of the evidence did not materially affect the
    outcome of the trial.” State v. Christensen, 
    153 Wn.2d 186
    , 200, 
    102 P.3d 789
     (2004).
    The Washington Supreme Court has identified four factors of a privacy act violation: “(1)
    a private communication transmitted by a device, which was (2) intercepted or recorded by use of
    (3) a device designed to record and/or transmit (4) without the consent of all parties to the private
    communication.” State v. Roden, 
    179 Wn.2d 893
    , 899, 
    321 P.3d 1183
     (2014). Bilgi’s challenge
    involves the second factor: whether Bilgi’s communications were intercepted.
    We review alleged violations of the privacy act de novo. State v. Racus, 7 Wn. App. 2d
    287, 297, 
    433 P.3d 830
    , review denied, 
    193 Wn.2d 1014
     (2019). Unchallenged findings of fact are
    considered verities on appeal, and the trial court’s conclusions of law must be supported by its
    findings of fact. State v. Homan, 
    181 Wn.2d 102
    , 106, 
    330 P.3d 182
     (2014); State v. Glant, 13 Wn.
    App. 2d 356, 364, 
    465 P.3d 382
    , review denied, 
    196 Wn.2d 1021
     (2020). We review the trial
    court’s conclusions of law de novo, and unchallenged conclusions of law become the law of the
    case. Glant, 13 Wn. App. 2d at 364; Nguyen v. City of Seattle, 
    179 Wn. App. 155
    , 163, 
    317 P.3d 518
     (2014).
    1.      DEFINING “INTERCEPT” UNDER THE PRIVACY ACT
    RCW 9.73.030(1) makes it unlawful “to intercept, or record” private communications. In
    interpreting the privacy act, “[w]here there is no statutory definition to guide us, words should be
    given their ordinary meaning.” Roden, 
    179 Wn.2d at 904
    .
    Merriam-Webster defines “intercept” as (a) “to stop, seize, or interrupt in progress or
    course or before arrival” or (b) “to receive (a communication or signal directed elsewhere) usually
    secretly.”       MERRIAM-WEBSTER           ONLINE        DICTIONARY,         https://www.merriam-
    9
    No. 53464-9-II
    webster.com/dictionary/intercept (last visited Oct. 12, 2021). Black’s Law Dictionary at 966
    defines the verb “intercept” as “[t]o covertly receive or listen to (a communication)” and associates
    the term with “covert reception by a law-enforcement agency.” (11th ed. 2019).
    In Roden, an officer “opened, read, and responded to” text messages while the owner of
    the cell phone was in custody. 
    179 Wn.2d at 904
    . The supreme court found this to be “consistent
    with the ordinary definition of ‘intercept’—to ‘stop . . . before arrival . . . or interrupt the progress
    or course.’ ” 
    Id.
     (alteration in original) (quoting Webster’s Third New International Dictionary
    1176 (2002)). Analogizing sending a text message to mailing a letter, the court reasoned that “the
    ordinary meaning of ‘intercept’ would encompass opening and reading a letter in someone else’s
    mailbox before they receive it.” 
    Id. at 905
    . Further, the officer in Roden “did not merely see a
    message appear on the iPhone;” he “manipulated” another individual’s phone to access the
    message. 
    Id. at 906
    .
    With the exception of Roden, however, Washington courts have primarily analyzed
    interception in the context of oral communications. In State v. Faford, the supreme court held that
    a private individual unlawfully intercepted his neighbors’ communications when he used a police
    scanner to eavesdrop on their telephone conversations. 
    128 Wn.2d 476
    , 479, 
    910 P.2d 447
     (1996).
    In Christensen, the parties agreed that a mother violated the privacy act when she “activated the
    speakerphone function of the cordless telephone system by pressing a button on the base unit” and
    10
    No. 53464-9-II
    listened to a conversation between her daughter and her daughter’s boyfriend. 
    153 Wn.2d at 190, 192
    .7
    In Fjermestad, an undercover detective wore a body wire, without prior court authorization,
    while conducting a drug operation. 
    114 Wn.2d at 829-30
    . To ensure officer safety, this device
    transmitted audio of the undercover detective’s communications to two other officers who were
    positioned nearby. 
    Id.
     The supreme court held, “RCW 9.73 has no provisions for an undercover
    police operation to use electronic eavesdropping devices to transmit conversations without first
    obtaining court authorization, no matter how laudable the reasons.” 
    Id. at 836
    .8
    2.     SHARING RECORDED COMMUNICATIONS
    Washington courts have held that a person impliedly consents to the recording of their
    communications on an electronic device when they communicate through e-mail, text messaging,
    and some online instant messaging software. State v. Townsend, 
    147 Wn.2d 666
    , 675-77, 
    57 P.3d 255
     (2002); Glant, 13 Wn. App. 2d at 366; Racus, 7 Wn. App. 2d at 300. “[A] communicating
    party will be deemed to have consented to having his or her communication recorded when the
    party knows that the messages will be recorded.” Townsend, 
    147 Wn.2d at 675
    .
    7
    Since the parties agreed that the action in Christensen constituted an interception under the
    privacy act, the court did not engage in any analysis of the term “intercept.” The court commented
    that if the State had “argued and proved that [the mother’s] act of listening in to her daughter’s
    conversation with Christensen was not an intercept, the resolution of this case might well have
    proceeded down a different analytical path.” Christensen, 
    153 Wn.2d at 197
    .
    8
    The supreme court has also designated the use of a pen register as an “intercept . . . within the
    definition of a ‘private communication transmitted by telephone.’ ” State v. Gunwall, 
    106 Wn.2d 54
    , 69, 
    720 P.2d 808
     (1986) (quoting RCW 9.73.030(1)(a)). “ ‘A pen register is a mechanical
    device, usually installed at a central telephone company facility, that records on paper the numbers
    dialed from a particular telephone.’ ” 
    Id.
     at 63 n.15 (quoting Clifford S. Fishman, Pen Registers
    and Privacy: Risks, Expectations, and the Nullification of Congressional Intent, 29 CATH. U. L.
    REV. 557, 558 n.3 (1980)). A pen register does not record the contents of any communications. 
    Id.
    11
    No. 53464-9-II
    When the sender of a written electronic message impliedly consents to the message’s
    recording, they bear the risk that the intended recipient will share the message with others. In
    Glant, we reasoned that when a person sends e-mail or text messages, “they do so with the
    understanding that the messages [will] be available to the receiving party for reading or printing.”
    13 Wn. App. 2d at 365. In our view, it is logical to assume they do so with the additional
    understanding that the messages will be available to the receiving party for forwarding or sharing
    electronically.
    In Roden, the intercepted communications were recorded on the recipient’s phone, and the
    supreme court explained that “the privacy act was violated because the detective intercepted [ ]
    private communications without [the sender’s] or [the recipient’s] consent and without a court
    order.” 
    179 Wn.2d at 906-07
     (emphasis added). This conclusion suggests that the outcome could
    have been different if the recipient had willingly shared the recorded messages with the detective.
    B.     APPLICATION
    Here, the State conceded that Bilgi’s communications were private, and the trial court
    found that Bilgi’s communications were private, that they were recorded on Pohl’s computer,
    which was a device designed to record the communications, and that Bilgi impliedly consented to
    this recording. Bilgi does not dispute these findings on appeal. Rather, Bilgi contends that his
    communications were unlawfully intercepted by Callyo prior to Pohl’s receipt of the
    communication and that his communications were unlawfully intercepted by officers who were
    not the intended recipients, simultaneous to Pohl’s receipt of the communication. He argues that
    his implied consent to the recording was not an implied consent to the interception.
    12
    No. 53464-9-II
    As a preliminary matter, any argument that Callyo independently intercepted Bilgi’s
    communications was not preserved for appeal. In his motion to suppress communications pursuant
    to RCW 9.73.050, Bilgi argued only that “[t]he State, and specifically the law enforcement officers
    involved in the investigation and arrest of the defendant, violated RCW 9.73.030 when they
    illegally intercepted the private e[-]mail and text conversations of the defendant.” CP at 489
    (emphasis added). Bilgi did not argue that Callyo unlawfully intercepted his communications.
    Regardless, this argument fails on the merits because Callyo is incapable of intercepting a
    communication in violation of the privacy act. RCW 9.73.030(1) states, “[I]t shall be unlawful for
    any individual, partnership, corporation, association, or the state of Washington, its agencies, and
    political subdivisions to intercept, or record” private communications. (Emphasis added.) Callyo
    is a computer software, not an actor with agency.
    Bilgi makes two additional arguments. First, he argues that Pohl unlawfully intercepted his
    communications because she, in particular, was not his intended recipient. Second, he argues that
    the officers with whom Pohl shared Bilgi’s communications as they were being received
    unlawfully intercepted his communications because even if Pohl had been his intended recipient,
    he did not consent to Pohl sharing his communications with others.
    With respect to Bilgi’s first argument, we disagree that Pohl unlawfully intercepted Bilgi’s
    communications because she was not actually a 13-year-old boy named Jake. Bilgi willingly
    communicated with the person controlling the account purporting to be Jake, and thus there was
    no unlawful interception of his messages by the person behind the account. Bilgi’s displeasure
    with the ruse he failed to detect does not constitute a redressable legal harm. Moreover, Bilgi offers
    no authority for this novel and expansive application of the privacy act. See B. & B. Farms, Inc. v.
    13
    No. 53464-9-II
    Matlock’s Fruit Farms, Inc., 
    73 Wn.2d 146
    , 152, 
    437 P.2d 178
     (1968) (declaring that where the
    petitioner fails to cite authority to support their position, “we will not presume that such authority
    exists”).
    Additionally, the viewing of the electronic communications by other officers who, like
    Pohl, made up the law enforcement team in control of the account posing as Jake did not constitute
    an unlawful interception of Bilgi’s communications. The officers did not covertly receive
    messages that were directed elsewhere. Nor is there evidence that other officers “manipulated”
    Pohl’s device or opened the messages before they were received by Pohl. Roden, 
    179 Wn.2d at 906
    . Bilgi sent messages to a fictitious child, and his messages were received by the account behind
    that fictitious child. When an account is held by multiple people, the account holders do not violate
    the privacy act by simultaneously receiving messages sent to that account. Jake’s phone number,
    which was associated with MECTF’s Callyo account, was Bilgi’s intended recipient. The
    messages were received by the intended recipient. The fact that multiple officers were authorized
    to access the account does not change this conclusion.
    It is commonly understood that a written communication, once sent to its intended
    recipient, can be passed on or shared by the recipient. See Glant, 13 Wn. App. 2d at 365. With the
    prevalence of web-based software such as e-mail accounts and Apple IDs, there is also a general
    recognition that usernames and passwords may be shared and that multiple people may log in to
    the same account at the same time. Even if the person controlling the account in this case had
    actually been a 13-year-old boy named Jake, Bilgi had no ability to restrain Jake from sharing his
    communications with anyone Jake so chose. Likewise, whether Pohl shared the communications
    she received from Bilgi with other officers as she received them, or the other officers with access
    14
    No. 53464-9-II
    to the account were logged in and read them on their own devices as they were received, there was
    no violation of the privacy act.
    Bilgi relies on Faford, Christensen, and Fjermestad, but these cases are distinguishable.
    Both Faford and Christensen involved unrecorded oral communications that were intercepted by
    a third party without the consent of either of the conversation’s participants.
    In Fjermestad, the trial court suppressed testimony about unrecorded oral communications
    that were intercepted, and the defendant was convicted based only on a detective’s simultaneous
    visual observations. 
    114 Wn.2d at 829-30
    . Therefore, the question on appeal was limited to the
    scope of the privacy act’s exclusionary rule. See 
    id. at 834-35
    . The supreme court did not consider
    whether the defendant could have impliedly consented to others hearing his communications. If it
    had, the analysis would have focused on the defendant’s expectations of privacy in his in-person
    oral communications—a situation that is not comparable to the one presented here. “Generally,
    two people in a conversation hold a reasonable belief that one of them is not recording the
    conversation.” State v. Kipp, 
    179 Wn.2d 718
    , 732, 
    317 P.3d 1029
     (2014). In contrast, when a
    written communication is recorded by a recipient’s device, there is a general understanding that
    the recipient could share it.
    CONCLUSION
    We hold that MECTF did not intercept Bilgi’s communications in violation of the privacy
    act when it used a single, shared account for its Net Nanny operation. It is not legally significant
    that the account was created using Callyo. Therefore, the trial court properly denied Bilgi’s motion
    to suppress all evidence relating to his communications. We affirm Bilgi’s convictions.
    15
    No. 53464-9-II
    A majority of the panel having determined that only the foregoing portion of this opinion
    will be printed in the Washington Appellate Reports and that the remainder shall be filed for public
    record in accordance with RCW 2.06.040, it is so ordered.
    Bilgi appeals his convictions for attempted second degree rape of a child and
    communication with a child for immoral purposes, arguing that the trial court abused its discretion
    when it denied his motions to compel discovery relating to Callyo and that the prosecutor
    committed reversible misconduct during closing argument. We hold that the trial court did not
    abuse its discretion, and none of the prosecuting attorney’s arguments warrant reversal.
    ADDITIONAL FACTS
    I. PRETRIAL MOTIONS
    A.     DISCOVERY MOTIONS
    1.      MOTION TO COMPEL DISCOVERY
    After learning that MECTF used a software called Callyo to text with suspects, Bilgi filed
    a motion to compel discovery related to Callyo. The motion requested that the trial court order
    WSP to provide a copy of the Callyo program or, in the alternative, to provide defense counsel and
    a defense expert “meaningful access” to the program. CP at 99. Bilgi asserted that “[t]he reports
    generated by this application [were] the cornerstone of the State’s case against [him].” 
    Id. at 101
    .
    Bilgi further asserted that defense counsel was unable to purchase Callyo herself because she was
    not law enforcement and the prosecuting attorney “declined to provide assistance” in facilitating
    16
    No. 53464-9-II
    access to the program. 
    Id. at 102
    . Bilgi argued that he was entitled to investigate the Callyo
    program to (1) ensure its reliability and (2) develop a record for a privacy act claim.9
    Bilgi retained a computer forensics expert to investigate the software. Defense counsel then
    represented to the trial court that, based on an initial review of 20 patent applications, Callyo
    appeared to be “significantly more complicated and significantly more important to the case than
    we previously could have recognized.” 5 VRP (Mar. 14, 2019) at 64. These patents illustrated “a
    non-exhaustive set of possible embodiments of the technology,” such as monitoring
    communications in real time, recording phone calls, accessing personal information connected to
    a phone number, configuring a device into a “mobile bug,” and geolocating a suspect. CP at 114,
    118 (emphasis added). Later interviews with law enforcement, however, showed only that MECTF
    used Callyo to send and download text messages, and to occasionally view one another’s
    communications.10
    2.      SUPPLEMENTAL DISCOVERY DEMAND & AMENDED MOTION TO COMPEL
    Bilgi later filed a supplemental discovery demand, demanding Callyo user guides, manuals,
    and training materials; confidentiality agreements between the State or law enforcement and
    Callyo’s vendor; marketing materials; and “information concerning when the prosecuting attorney
    became aware of the use of Callyo.” 
    Id. at 105
    . He then filed an amended motion to compel
    discovery, requesting:
    9
    Bilgi does not raise reliability as a basis for his discovery argument on appeal.
    10
    In its findings of fact regarding Bilgi’s motions to suppress, the trial court also stated, “This
    software program operation has additional features, like GPS [Global Positioning System] location
    service and subscriber inquiry service, but there is no evidence that any of those features were used
    in this defendant’s case.” CP at 1202 n.1.
    17
    No. 53464-9-II
    Callyo master source code, executable program files, user manual, installation
    manual, training manual, administrative manual, confidentiality or nondisclosure
    agreements between the State or law enforcement and the vendor of Callyo,
    requests for proposal and contracts between Washington State Patrol and Callyo,
    marketing materials provided to the State or law enforcement pertaining to Callyo,
    information concerning when the prosecuting attorney became aware of the use of
    Callyo and the existence of confidentiality agreements, and all Callyo files or
    reports pertaining to the case involving Mr. Bilgi.
    
    Id. at 105-06
    . Bilgi moved the trial court to compel this discovery from Callyo’s vendor if it was
    not within the possession or control of the State or WSP. He argued that discovery “pertaining to
    the functioning and use of the Callyo program” was necessary to develop various motions to
    suppress evidence and to prepare for cross-examination of the State’s witnesses. 
    Id. at 121
    .
    A supplement to the amended motion to compel discovery added transcripts from
    interviews with Detectives Garden and Chovil-Peterson stating that they log in to Callyo to view
    communications in real time when they perform surveillance.
    3.     MOTIONS HEARING
    Bilgi argued that for “a surveillance team to monitor the communications as they are
    coming in and going out” is an interception in violation of the privacy act, and he requested
    “additional discovery to make a full and accurate record of what exactly happened here.” 1 VRP
    (Mar. 25, 2019) at 9-10. He explained, “Of particular importance to me under the Privacy Act is,
    if there is any sort of documentation of when members of the surveillance team or other law
    enforcement officers logged in and were able to view communications as they were occurring.”
    Id. at 21.
    The State suggested that Bilgi was overestimating Callyo’s role in the operation and
    described Callyo as “a data compilation program that lets you print out text messages.” Id. at 22.
    It also argued that “ultimately it doesn’t really matter what else Callyo can do. It only matters what
    18
    No. 53464-9-II
    Callyo did, and in this case what it did is printed out the text messages.” Id. at 33. Defense counsel
    admitted, “I can’t say exactly what [Callyo] did in this case, unless we had access to the
    information to have a full and fair investigation of those issues.” Id. at 37.
    The trial court determined that Bilgi was requesting disclosure “beyond that which the
    prosecutor is specifically obligated to disclose,” so it analyzed the request under CrR 4.7(e), which
    permits additional discovery within the trial court’s discretion. CP at 913. CrR 4.7(e) requires (1)
    that the requested information be material to the preparation of the defense and (2) that the request
    be reasonable. Id. at 914. The trial court ruled that Bilgi failed to meet the first requirement because
    his reliability concerns were “no more than conjecture” and a copy of “the source code of any
    software that produced a transcript of the chat . . . does nothing to advance” the privacy issue. Id.
    at 915.
    4.     MOTION TO RECONSIDER
    The trial court’s ruling on Bilgi’s discovery motion was based, in part, on its understanding
    that the State had turned over not only paper copies of the chats between Detective Pohl and Bilgi,
    but also copies of the Callyo reports “in electronic format, (zip files) . . . , which included the .txt
    files (metadata). The metadata allows one to see who created the document and when, who last
    modified it and when, and who can access or update it, as well as other information relevant to the
    foundation for admissibility.” Id. at 911. Bilgi filed a motion to reconsider, explaining that he had
    not received the Callyo reports or text messages in a zip or .txt format. Once the State provided
    this evidence in its electronic format, the parties agreed that the State was in compliance with the
    trial court’s discovery ruling.
    19
    No. 53464-9-II
    Bilgi also argued again that “[a]ccess to logs or records indicating who had access to the
    livestream of the communications and who was logged into the Callyo program and able to view
    the communications is material to the Defendant’s motion to suppress.” Id. at 920. He submitted
    a transcript from an interview with Program Specialist Rhonda Tucker, where Tucker admitted
    that she accessed Callyo for her role as an analyst. She explained that when she is logged into
    Callyo, the phone numbers and messages “pop up” on the screen as the communications come in.
    Id. at 944. Tucker confirmed that she “can read that message as it is coming through,” but she does
    “[n]ot usually” read the messages. Id. at 945-46.
    The trial court denied Bilgi’s motion to reconsider the ruling in its entirety. Bilgi then
    moved this court for discretionary review of the trial court’s orders denying Bilgi’s motions to
    compel discovery and for a stay while the orders were reviewed. We denied Bilgi’s emergency
    motion for a stay, advising that any issue with the motion to compel could be reviewed on direct
    appeal.
    5.     SECOND SUPPLEMENTAL MOTION TO COMPEL DISCOVERY
    Bilgi filed an additional discovery motion, requesting:
    Callyo log files for users involved in the Net Nanny Thirteen Operation during the
    time period between July 26, 2018 (when communications with Mr. Bilgi began)
    and September 11, 2018 (when the Callyo files provided in discovery were
    downloaded from the program); usernames of Callyo users who were involved in
    the Net Nanny Thirteen Operation or Mr. Bilgi’s arrest; Callyo manuals; MD5 hash
    values for all evidence files created, collected, or maintained by the Callyo program
    in connection with Mr. Bilgi’s case; and the identity of the system administrator for
    the Callyo program at Washington State Patrol.
    Id. at 995. He argued that interviews with law enforcement established a likely privacy act
    violation and that “the additional discovery sought is required for the defendant to conclusively
    establish the violation.” Id. at 1001.
    20
    No. 53464-9-II
    Bilgi attached a declaration from a digital forensics expert, Steve Simpson, explaining that
    if Simpson had access to log files from Callyo, meaning files that record “an action or event
    occurring on a computer device, a computer system, a computer network, or a computer
    application,” then he could likely create an audit trail, which “documents the sequence of activities
    that have affected a specific operation, procedure, or event that occurs within a program or on a
    device.” Id. at 955-56. An audit trail could show several things, including “[t]he date, time, and
    user name for each instance in which a user accessed text message communications between Mr.
    Bilgi and Detective Pohl,” and “[w]hether other features of the Callyo program (e.g. the GPS
    location module or mobile bug module) were used in Mr. Bilgi’s case.” Id. at 957.
    Simpson also explained how some of the other requested materials could be helpful, such
    as the user manuals, which would show the program’s default settings, “describe what information
    users are able to access and how that information is accessed,” and “identify which events are
    logged and how a particular program sorts, stores, and names log files.” Id. at 958-59.
    6.      SECOND MOTIONS HEARING
    Bilgi made an offer of proof based on the interviews with Garden, Chovil-Peterson, and
    Tucker that Bilgi’s messages had likely been intercepted in violation of the privacy act. However,
    he acknowledged, “the witnesses indicate they couldn’t recall -- they didn’t write reports detailing
    their specific viewing of communications in Mr. Bilgi’s case.” 3 VRP (May 20, 2019) at 133. Bilgi
    again requested additional discovery “to find evidence of a particular violation in this case since
    there was not an adequate record . . . , although it’s undisputed that the program is used in that way
    [to monitor other officers’ communications in real time].” Id.
    21
    No. 53464-9-II
    The State argued that once Bilgi consented to the recording of his messages, he “[ran] the
    risk that the person who received them [would] disseminate them in any way that they want[ed]
    to, and that means they can show their friends, or have them live streamed if they want to.” Id. at
    149.
    The trial court again denied Bilgi’s motion to compel discovery, concluding that he again
    failed to show materiality: “the defendant’s general claim that the material may be helpful and the
    general speculation that it might yield information do not suffice to establish materiality. The
    defendant must present some facts that would tend to show the material sought would be helpful
    to the defense being raised at this trial.” CP at 1099.
    B.     MOTIONS IN LIMINE
    Bilgi moved in limine to exclude testimony on the general history and statistics of Net
    Nanny operations. In reviewing the motions with the parties, the trial court stated that it would
    allow the question of how many arrests had been made as a result of the Net Nanny operations,
    along with the expected answer of “a hundred plus” arrests. 3 VRP (May 20, 2019) at 197.
    Additionally, the trial court would allow defense counsel to draft and propose a limiting instruction
    explaining that this testimony is “to be used only for purposes of information or context, and should
    not prejudice the defendant in any way.” Id. at 198. In its written order, the trial court denied
    Bilgi’s motion to exclude “an estimated number of arrests resulting from the operations,” without
    specifying an anticipated number, and it again advised that “defense counsel is allowed to propose
    a limiting instruction about the number of arrests.” Supp. CP at 1256.
    22
    No. 53464-9-II
    II. TRIAL
    At trial, Bilgi’s defense focused on the intent element of attempted rape of a child and
    challenged the State’s proof that Bilgi actually intended to have sexual intercourse with a child. In
    her opening statement, defense counsel told the jury, “[T]he State is attempting to have you convict
    Mr. Bilgi based on what is in Mr. Bilgi’s mind, and the State doesn’t have a magic machine that
    allows you to look into people’s minds.” 9 VRP at 819.
    Detective Sergeant Rodriguez testified that as a result of Net Nanny operations, there had
    been “200 plus” arrests. Id. at 857. Bilgi did not object to this answer. Nor did he request a
    responsive limiting instruction.
    In the State’s closing argument, the prosecuting attorney first advised the jury, “[N]othing
    that I’m saying to you is my personal opinion. I represent the State of Washington and I’m speaking
    on behalf of the State of Washington. It’s just easier to say ‘I’ than it is to say the ‘State of
    Washington’ every single time.” 11 VRP at 1216. Bilgi objected, and the trial court overruled the
    objection. Id. at 1217.
    The State then argued, “You were told in opening statement by the defense that the State
    has to prove what’s in Mr. Bilgi’s mind. That’s not entirely accurate. What we have to prove is
    what he did.” Id. at 1218. Bilgi objected, and the objection was overruled. Id. The State explained
    that the law requires proof of a substantial step because “we don’t punish per se thinking about
    doing something, or talking about doing something. We punish for doing it.” Id. at 1219. It
    summarized by saying,
    [T]he question is going to be: Did the State prove to you that Mr. Bilgi thought that
    he was talking to a 13 year old when he communicated for sexually immoral
    purposes, and did he take a substantial step towards the completion of the crime of
    Rape of a Child, 2.
    23
    No. 53464-9-II
    Id.
    In reviewing the elements of the crime, the State suggested, “[L]et’s talk about what is not
    going to be disputed, so that we can then focus on what really is going to be disputed.” Id. at 1221.
    Bilgi objected, claiming that this undermined the presumption of innocence, and the trial court
    overruled the objection. The State then argued, without objection, that the jurisdiction, time frame,
    and use of electronic communications were not disputed. It reasoned, “So really the only thing that
    we are talking about is what was in the defendant’s head, and did he take a substantial step.” Id.
    The State reminded the jury, “What you have is the defendant getting into his car, driving
    over an hour, having lubricant and condoms with him when he shows up . . . . It doesn’t seem like
    there is really a dispute about whether or not the defendant’s conduct is a substantial step.” Id.
    Bilgi objected, and the trial court overruled the objection. The State later argued, “Most of the
    evidence that was presented to you by the State was not contested and is not disputed.” Id. at 1223.
    Bilgi again objected, and the trial court again overruled the objection.
    Finally, the State recalled Detective Pohl’s e-mail to Bilgi, wherein she stated that Jake
    was 13 years old. The State argued to the jury, “So to the extent that you hear argument about
    whether or not the State proved that this was a 13 year old, ask yourself what other evidence there
    is.” Id. Bilgi objected, claiming that this constituted burden shifting, and the trial court overruled
    the objection. The State reiterated that the key question for the jury was “Did Mehmet Bilgi think
    that he was coming to that park to have sexual intercourse with a 13-year-old.” Id. at 1224.
    In the defense’s closing argument, counsel suggested that there was insufficient proof of
    Bilgi’s intent because he responded to an advertisement with an adult’s picture on a website
    intended for adults. Counsel advised the jury,
    24
    No. 53464-9-II
    The elements that the State has to prove beyond a reasonable doubt . . . are intent,
    that Mr. Bilgi intended to have sex with a child age 12 or 13. And substantial step,
    that Mr. Bilgi took a substantial step that strongly corroborates that intent to have
    sex, not just sex generally, but sex with a child ages 12 or 13.
    Id. at 1238. Counsel described the intent element as “the central focus.” Id.
    Defense counsel argued that Pohl did not “understand the community that she was
    operating in on Doublelist” because “Doublelist is a site that is intended for adults 18 and over”
    and “a site that has strict posting guidelines.” Id. at 1240-41. Counsel compared Pohl to Rodriguez
    and suggested that, unlike Rodriguez, Pohl did not effectively target people who were actually
    interested in sex with children because she did not suggest a young age in her advertisement and
    she did not use an e-mail address that was consistent with her persona. Defense counsel encouraged
    the jury to “consider what Sergeant Rodriguez said about the importance of being clear about what
    it is that you are offering” and to compare that with “the fact that Detective Pohl only mentioned
    this age of 13 one time.” Id. at 1244-45.
    In its rebuttal, the State told the jury that this case is not “a referendum on Detective Pohl,
    . . . what she didn’t do, what she could have done better, what she should have done different. . . .
    200-plus arrests from the MECTF in over 15 operations.” Id. at 1253. Bilgi objected to this
    statement, without providing a basis for the objection, and the trial court overruled it. Id.
    The jury found Bilgi guilty as charged. Bilgi appeals his convictions.
    ANALYSIS
    I. DISCOVERY
    Bilgi argues the trial court abused its discretion because it reviewed his discovery requests
    under the discretionary provision of the discovery rule, CrR 4.7(e), when he was entitled to
    25
    No. 53464-9-II
    discovery under the mandatory provisions of the rule, CrR 4.7(a), (c), and (d). We disagree and
    hold that the trial court did not abuse its discretion.
    A.      LEGAL PRINCIPLES
    “The scope of discovery in a criminal case is within the sound discretion of the trial court
    and will not be disturbed absent a manifest abuse of discretion.” State v. Norby, 
    122 Wn.2d 258
    ,
    268, 
    858 P.2d 210
     (1993). The trial court abuses its discretion “if its decision is manifestly
    unreasonable or exercised on untenable grounds or for untenable reasons.” State v. Finch, 
    181 Wn. App. 387
    , 395, 
    326 P.3d 148
     (2014).
    CrR 4.7(a) addresses the State’s standard discovery obligations, including “any books,
    papers, documents, photographs, or tangible objects, which the prosecuting attorney intends to use
    in the hearing or trial or which were obtained from or belonged to the defendant.” CrR 4.7(a)(1)(v).
    Evidence that the State intends to use in a hearing or trial has “inherent materiality.” State v. Boyd,
    
    160 Wn.2d 424
    , 437, 
    158 P.3d 54
     (2007). This section also covers “any material or information
    within the prosecuting attorney’s knowledge which tends to negate defendant’s guilt as to the
    offense charged.” CrR 4.7(a)(3). “The prosecuting attorney’s obligation under this section is
    limited to material and information within the knowledge, possession or control of members of the
    prosecuting attorney’s staff.” CrR 4.7(a)(4).
    In Boyd, our supreme court held that where a defendant is charged with offenses involving
    child pornography based on images on his computer, “adequate representation requires providing
    a ‘mirror image’ of that hard drive; enabling the defense attorney to consult with computer experts
    who can tell how the evidence made its way onto the computer.” 
    160 Wn.2d at 436
    ; see also State
    v. Grenning, 
    169 Wn.2d 47
    , 56, 
    234 P.3d 169
     (2010). The court reasoned, “The evident purpose
    26
    No. 53464-9-II
    of the disclosure requirement [in CrR 4.7(a)(1)(v)] is to protect the defendant’s interests in getting
    meaningful access to evidence supporting the criminal charges in order to effectively prepare for
    trial and provide adequate representation.” Boyd, 
    160 Wn.2d at 432
    . Where the defendant requests
    the evidence “offered to substantiate the criminal charges” against them, they are entitled to
    “meaningful access to copies” of the evidence under CrR 4.7(a). 
    Id. at 432-33
    .
    CrR 4.7(c), entitled “Additional Disclosures Upon Request and Specification,” requires the
    prosecuting attorney to disclose, “upon request of the defendant,” “any relevant material and
    information regarding . . . [t]he acquisition of specified statements from the defendant.” CrR
    4.7(c)(2). We have considered the State’s disclosure obligation under CrR 4.7(c) to be limited “
    ‘to material and information within the knowledge, possession or control of members of the
    prosecuting attorney’s staff.’ ” State v. Vance, 
    184 Wn. App. 902
    , 911, 
    339 P.3d 245
     (2014)
    (internal quotation marks omitted) (quoting State v. Blackwell, 
    120 Wn.2d 822
    , 826, 
    845 P.2d 1017
    (1993)).
    CrR 4.7(d) covers the disclosure of material and information in the possession of third
    parties. If the defendant requests and designates “material or information in the knowledge,
    possession or control of other persons which would be discoverable if in the knowledge, possession
    or control of the prosecuting attorney,” then the prosecuting attorney must “attempt to cause such
    material or information to be made available to the defendant.” CrR 4.7(d); State v. Salgado-
    Mendoza, 
    189 Wn.2d 420
    , 430, 
    403 P.3d 45
     (2017). If the prosecuting attorney is unsuccessful,
    “and if such material or persons are subject to the jurisdiction of the court,” then the court must
    issue subpoenas or orders to obtain the information. CrR 4.7(d). However, the trial court is only
    required to issue subpoenas under CrR 4.7(d) if the requested information is material to the
    27
    No. 53464-9-II
    defense. See Blackwell, 
    120 Wn.2d at 827-28
     (“Assuming the records were shown to be material
    to the defense, the trial court should have issued a subpoena pursuant to CrR 4.7(d).”); State v.
    Kilgore, 
    107 Wn. App. 160
    , 176, 
    26 P.3d 308
     (2001) (“[I]f A.B.’s testimony negated guilt, the trial
    court should have subpoenaed A.B.”).
    Finally, CrR 4.7(e)(1) allows the trial court to authorize disclosure of “relevant material
    and information not covered by sections (a), (c) and (d).” But unlike sections (a), (c), and (d),
    which involve mandatory disclosures, disclosure under (e) is within the trial court’s discretion.
    The trial court “in its discretion may require disclosure” of additional relevant material, if the
    defendant shows the information’s “materiality to the preparation of the defense” and if “the
    request is reasonable.” CrR 4.7(e)(1). The trial court abuses its discretion if it orders discovery
    under CrR 4.7(e) without requiring a showing of materiality. Finch, 181 Wn. App. at 396.
    To show materiality under CrR 4.7(e), the defendant must “provide some factual basis
    making it reasonably likely that the requested evidence would give rise to information material to
    the defense.” Id. It is not enough to make “broad, unsupported” claims that the requested
    disclosures “may lead to material information.” Blackwell, 
    120 Wn.2d at 829
    .
    B.     APPLICATION
    Here, the trial court did not abuse its discretion in denying Bilgi’s discovery motions. The
    requested materials did not fall within the prosecutor’s standard disclosure obligations under CrR
    4.7(a) because the State was not intending to use documents describing how Callyo operates at
    any hearings or at Bilgi’s trial, and these documents did not tend to negate Bilgi’s guilt for the
    charged crime. The State used downloaded spreadsheets of Bilgi’s communications to substantiate
    the charges against him, and the State satisfied its obligations under Boyd and Grenning when it
    28
    No. 53464-9-II
    provided electronic copies of these conversations. It was not obligated under CrR 4.7(a) to provide
    additional documentation detailing how the Callyo software operated.
    Bilgi was not entitled to the requested discovery under CrR 4.7(c) either. Although Callyo
    was the software used to record Bilgi’s statements, its executable files, source code, and user
    manuals were not relevant to Bilgi’s claims that law enforcement unlawfully intercepted the
    communications. The important facts here were that Bilgi’s messages were received by the
    intended recipient, that he impliedly consented to their recording, and that he assumed the risk of
    their content being shared. The trial court correctly concluded that a copy of “the source code of
    any software that produced a transcript of the chat . . . does nothing to advance” the privacy issue.
    CP at 915.
    Because the requested discovery would not have been “discoverable if in the knowledge,
    possession or control of the prosecuting attorney” under CrR 4.7(a) or (c), the trial court was not
    required to issue subpoenas to WSP or Callyo’s vendor under CrR 4.7(d).
    Since Bilgi’s discovery requests did not fall under the State’s standard discovery
    obligations, the trial court correctly reviewed the requests under CrR 4.7(e). Bilgi needed to
    “provide some factual basis making it reasonably likely that the requested evidence would give
    rise to information material to the defense.” Finch, 181 Wn. App. at 396.
    Bilgi submitted several patent applications illustrating “a non-exhaustive set of possible
    embodiments of the technology,” CP at 114, but he admitted that he “[could not] say exactly what
    [Callyo] did in this case,” 1 VRP (Mar. 25, 2019) at 37. Details on how Callyo could operate were
    not material to Bilgi’s privacy act claim, which necessarily challenged how MECTF actually used
    29
    No. 53464-9-II
    Callyo in his case. Interviews with law enforcement showed only that MECTF used Callyo to send
    and download text messages, and to occasionally view one another’s communications.
    Even if Bilgi had gathered additional information showing exactly when specific messages
    were viewed by specific officers, this would not have established a privacy act violation. As
    discussed above, it is not an unlawful interception to log in to a shared account and view messages
    intentionally sent to that account. Bilgi consented to the recording of his written communications,
    and Rodriguez and Pohl lawfully permitted others to access and view those messages. Bilgi failed
    to show how the requested discovery could give rise to information material to his defense, so the
    trial court did not abuse its discretion in denying Bilgi’s motions to compel additional discovery.
    II. PROSECUTORIAL MISCONDUCT
    Bilgi also contends that prosecutorial misconduct during closing argument violated his
    rights to due process and a fair trial. Specifically, Bilgi claims the prosecuting attorney invoked
    the prestige of his office, misstated the law, shifted the burden of proof, and argued facts not in
    evidence to appeal to the jury’s passions. We disagree.
    A.     LEGAL PRINCIPLES
    Prosecutorial misconduct may deprive a defendant of their constitutional right to a fair trial
    under the Sixth and Fourteenth Amendments to the United States Constitution and article I, section
    22 of the Washington Constitution. In re Pers. Restraint of Glasmann, 
    175 Wn.2d 696
    , 703-04,
    
    286 P.3d 673
     (2012) (plurality opinion). We review the prosecutor’s arguments “ ‘in the context
    of the total argument, the issues in the case, the evidence addressed in the argument, and the
    instructions given.’ ” State v. Thierry, 
    190 Wn. App. 680
    , 689, 
    360 P.3d 940
     (2015) (quoting State
    v. Russell, 
    125 Wn.2d 24
    , 85-86, 
    882 P.2d 747
     (1994)).
    30
    No. 53464-9-II
    To establish prosecutorial misconduct, a defendant bears the burden of proving that the
    prosecutor’s conduct was both improper and prejudicial. State v. Emery, 
    174 Wn.2d 741
    , 760, 
    278 P.3d 653
     (2012). If the defendant objected to the alleged misconduct at trial, as Bilgi did in each
    of the instances challenged here, then they may establish prejudice by showing that the misconduct
    “had a substantial likelihood of affecting the jury’s verdict.” 
    Id.
    Prosecuting attorneys “ ‘are permitted latitude to argue the facts in evidence and reasonable
    inferences’ in their closing arguments.” State v. Dhaliwal, 
    150 Wn.2d 559
    , 577, 
    79 P.3d 432
     (2003)
    (quoting State v. Smith, 
    104 Wn.2d 497
    , 510, 
    707 P.2d 1306
     (1985)). They cannot, however, argue
    facts that are not in the record or appeal to the passions and prejudices of the jury. State v. Pierce,
    
    169 Wn. App. 533
    , 553, 
    280 P.3d 1158
     (2012). They cannot use their “position of power and
    prestige to sway the jury” or to “express an individual opinion of the defendant’s guilt, independent
    of the evidence actually in the case.” Glasmann, 
    175 Wn.2d at 706
    . They cannot misstate the law.
    State v. Jones, 13 Wn. App. 2d 386, 403, 
    463 P.3d 738
     (2020).
    It is also “flagrant misconduct to shift the burden of proof to the defendant.” State v. Miles,
    
    139 Wn. App. 879
    , 890, 
    162 P.3d 1169
     (2007). The prosecuting attorney is not permitted to
    “comment on the lack of defense evidence because the defendant has no duty to present evidence.”
    State v. Cheatam, 
    150 Wn.2d 626
    , 652, 
    81 P.3d 830
     (2003). However, “a prosecutor is entitled to
    point out the . . . lack of evidentiary support for the defense theory of the case.” State v. Osman,
    
    192 Wn. App. 355
    , 367, 
    366 P.3d 956
     (2016).
    In Osman, for example, the defendant was charged with unlawful imprisonment and
    assault, and the prosecutor asked the jury, “If a struggle or some type of confrontation didn’t occur
    in the car[,] how did that earring come out of her ear and get left on the floor and how did she
    31
    No. 53464-9-II
    break those fingernails if an encounter did not, and a struggle, did not occur?” 
    Id.
     Division One
    held that this argument did not shift the burden of proof because it focused on the evidence
    presented. Id. at 368. Rather than suggesting that “the defense had failed to offer another
    reasonable explanation” for the misplaced earring and broken fingernails, “the prosecutor argued
    that the evidence did not support any other reasonable explanation.” Id. at 367.
    B.      APPLICATION
    1.       PRESTIGE OF THE OFFICE
    Bilgi first challenges the prosecuting attorney’s assertion that he was “speaking on behalf
    of the State of Washington” as an improper invocation of the prestige of his office. 11 VRP at
    1216. But the prosecuting attorney was representing the State, and he offered this clarification to
    avoid having his statements misconstrued as personal opinions. He expressly cautioned the jury,
    “[N]othing that I’m saying to you is my personal opinion. I represent the State of Washington and
    I’m speaking on behalf of the State of Washington.” Id. It was not improper to offer this
    clarification.
    2.       MISSTATING THE LAW
    Next, Bilgi contends that the prosecuting attorney misstated the law on intent when he
    argued that the State was not required “to prove what’s in Mr. Bilgi’s mind.” Id. at 1218. However,
    we review the prosecutor’s arguments “ ‘in the context of the total argument.’ ” Thierry, 190 Wn.
    App. at 689 (quoting Russell, 
    125 Wn.2d at 85-86
    ). The State repeatedly told the jury that what
    Bilgi thought about the arranged meeting was critical to a determination of his guilt. Therefore, in
    the context of the State’s entire argument, the brief comment that the State did not have to prove
    what was “in Mr. Bilgi’s mind” was not prejudicial. 11 VRP at 1218. Moreover, this comment was
    32
    No. 53464-9-II
    made in response to defense counsel’s opening argument: “[T]he State is attempting to have you
    convict Mr. Bilgi based on what is in Mr. Bilgi’s mind, and the State doesn’t have a magic machine
    that allows you to look into people’s minds.” 9 VRP at 819.
    3.      SHIFTING THE BURDEN OF PROOF
    Bilgi claims the prosecuting attorney improperly shifted the burden of proof when he told
    the jury that reasonable doubt requires a witness “who comes in here and says [Bilgi] didn’t do it”
    and when he remarked that there was no evidence indicating Bilgi did not intend to meet up with
    a 13-year-old child. 11 VRP at 1230. Bilgi argues these statements “convey the defendant had a
    duty to testify, or to present witnesses on his own behalf.” Br. of Appellant at 45. He also claims
    it was improper for the prosecutor to suggest that some of the elements of the crime were not
    disputed.
    First, it is clear from context that when the prosecuting attorney referenced a witness “who
    comes in here and says [Bilgi] didn’t do it,” he was not defining “reasonable doubt.” 11 VRP 1230.
    He was merely giving an example of evidence that could generate a reasonable doubt. He
    immediately followed this statement with an assertion that reasonable doubt could also arise from
    the State failing to present sufficient evidence. This is consistent with the trial court’s instruction
    that “[a] reasonable doubt is one for which a reason exists and may arise from the evidence or lack
    of evidence.” CP at 1111.
    Second, when the prosecuting attorney asked the jury, “So to the extent that you hear
    argument about whether or not the State proved that this was a 13 year old, ask yourself what other
    evidence there is,” he was permissibly arguing based on the evidence presented. 11 VRP at 1223.
    He did not say that Bilgi should have testified about what he was thinking or that Bilgi should have
    33
    No. 53464-9-II
    countered the State’s evidence by calling his own witnesses. Like the counsel in Osman, the
    prosecuting attorney challenged whether the evidence supported the defense’s theory of the case.
    Third, although it may have been improper to claim that Bilgi did not dispute the State’s
    characterization of his conduct as a substantial step, Bilgi did not directly challenge this evidence
    in his closing argument—that Bilgi drove to the park with lubricant and condoms in his car. Bilgi
    noted that the State needed to prove beyond a reasonable doubt that he “took a substantial step that
    strongly corroborates that intent to have sex, not just sex generally, but sex with a child ages 12 or
    13, and that that step was more than mere preparation.” Id. at 1238. But he did not challenge the
    State’s assertion that he went to the park for a sexual encounter. He challenged only the State’s
    characterization of who he expected to meet and described the intent element as “the central focus.”
    Id. Therefore, any impropriety in the State’s suggestion that this element was not controverted was
    not prejudicial.
    4.      “200 PLUS” ARRESTS
    Bilgi also claims the State argued facts not in evidence and made an emotional appeal to
    the jury when it stated in its rebuttal, “200-plus arrests from the MECTF in over 15 operations.”
    Id. at 1253.
    This information was part of the evidence presented. The trial court denied Bilgi’s motion
    to exclude questions about “an estimated number of arrests resulting from the operations.” Supp.
    CP at 1256. On direct examination, Detective Sergeant Rodriguez testified there had been “200
    plus” arrests as a result of Net Nanny operations. 9 VRP at 857.
    The prosecuting attorney did not use this statistic to appeal to the jury’s emotions or to
    emphasize the operations’ importance. Rather, he highlighted the success of the operations in
    34
    No. 53464-9-II
    response to defense counsel’s suggestion that Detective Pohl did not know what she was doing or
    should have conducted her investigation differently. Further, the defense could have proposed a
    limiting instruction to guide the jury’s consideration of information related to other Net Nanny
    operations, but it did not. Bilgi failed to show that any of the prosecutor’s arguments were both
    improper and prejudicial.
    CONCLUSION
    The trial court did not abuse its discretion when it denied Bilgi’s motions to compel
    additional discovery, and the prosecuting attorney did not commit reversible misconduct.
    Therefore, we affirm Bilgi’s convictions.
    CRUSER, J.
    We concur:
    WORSWICK, J.
    LEE, C.J.
    35