People v. Wilson

Filed 10/21/20 CERTIFIED FOR PUBLICATION COURT OF APPEAL, FOURTH APPELLATE DISTRICT DIVISION ONE STATE OF CALIFORNIA THE PEOPLE, D074992 Plaintiff and Respondent, v. (Super. Ct. No. SCD263466) LUKE NOEL WILSON, Defendant and Appellant. APPEAL from a judgment of the Superior Court of San Diego County, Esteban Hernandez, Judge. Affirmed. Charles M. Sevilla, for Defendant and Appellant. Xavier Becerra, Attorney General, Lance E. Winters, Chief Assistant Attorney General, Julie L. Garland, Assistant Attorney General, Arlene A. Sevidal and Andrew Mestman, Deputy Attorneys General, for Plaintiff and Respondent. After the trial court denied his pretrial motion to suppress evidence obtained without a warrant, a jury convicted Luke Noel Wilson of one count of oral copulation of a child 10 years or younger (Pen. Code, § 288.7, subd. (b))1 and three counts of committing a lewd act upon a child (§ 288, subd. (a)), further finding true the allegations that two counts were committed against more than one victim. (§ 667.61, subds. (b), (c), and (e).) The court sentenced Wilson to an indeterminate prison term of 45 years to life. Wilson appeals, contending (1) the trial court erred in denying his motion to suppress; (2) the evidence was insufficient to support his convictions under section 288, subdivision (a); (3) he was denied his due process right to notice of the nature of the charges against him; (4) the prosecution knowingly introduced false evidence at trial; (5) the prosecution failed to produce exculpatory evidence before trial in violation of Brady v. Maryland (1963) 373 U.S. 83 (Brady); (6) the trial court’s jury instructions and answers to jury questions were incomplete, misstated the law, and were unduly prejudicial; (7) prosecutorial misconduct and the court’s failure to address the misconduct denied him his right to a fair trial; (8) the mandatory sentence was cruel and/or unusual as applied to Wilson; and (9) cumulative error. We conclude Wilson’s contentions lack merit. Accordingly, we affirm the judgment. FACTUAL BACKGROUND For purposes of this section, we state the evidence in the light most favorable to the judgment. (See People v. Osband (1996) 13 Cal.4th 622, 690; People v. Dawkins (2014) 230 Cal.App.4th 991, 994.) Additional facts will be discussed where relevant in the following sections. Using a website where women posted photos with the hopes of finding modeling and acting jobs, Wilson contacted an 18-year-old woman and hired 1 All further statutory references are to the Penal Code unless otherwise specified. 2 her to pose for a photo shoot. The woman was fully clothed in the initial photo shoot, but over time Wilson persuaded her to first pose partially nude and, eventually, fully nude in hotel rooms after plying her with alcohol and paying her to pose. The woman later introduced Wilson to her younger sister, J.A., who was only 15 years old at the time. Wilson paid the two sisters to pose, fully clothed, for photographs together in Balboa Park. At the Balboa Park photo shoot, Wilson asked J.A. for her phone number and began contacting her separately from her sister. J.A. later agreed to another photo shoot, this time in a hotel room in lingerie. Thereafter, Wilson continued to send her “proposals” via e-mail, text message, or a texting “app” for photo shoots, detailing how much he would pay her to pose in certain ways. Over time, but while she was still a minor, Wilson progressed to paying J.A. to pose for nude and sexually explicit photos. Providing J.A. with alcohol to get her “more settled and calm,” Wilson eventually paid J.A. to let him film her while he performed sexual acts and while she used sex toys on herself or allowed him to use the same toys on her body. These “photo shoots” occurred when J.A. was 15 or 16 years old. After the photo shoots, Wilson sent the photos to J.A., who testified that she liked the way she looked in the photos. By the time J.A. was 16 or 17 years old, Wilson was paying her to have sexual intercourse with him while he filmed the encounter. Occasionally, during photo shoots, Wilson would show J.A. child pornography. When J.A. was 17, she became pregnant with her boyfriend (not Wilson). She gave birth to her daughter in late 2013, after she turned 18 and shortly after her high school graduation. 3 J.A. continued to do photo shoots with Wilson while she was pregnant. The photo shoots with Wilson, including nude photo shoots and filming during sexual acts, also continued after J.A. gave birth to her daughter. Around the same time, J.A. lost her job and was no longer working. She continued to accept payments from Wilson to perform in photo shoots, explaining that she could make the same amount of money in exchange for one photo shoot that she would earn working for two weeks at her previous part-time job. Wilson later paid J.A. to send him a video of her having sex with her boyfriend. Over time, Wilson progressed to suggesting a proposal of paying J.A. to take photos of her touching her infant daughter. When her daughter was about nine months old, J.A. accepted a proposal from Wilson to pay her to take a photo with her hand on her daughter’s buttocks and send it to him. Thereafter, Wilson offered to pay J.A. to send him photos or videos showing her orally copulating her daughter. J.A. again accepted the proposal and sent Wilson a minute-long video. Wilson was also aware that J.A. often babysat her young cousin. Wilson began making offers to J.A. for her to touch her cousin in exchange for several hundred dollars. When the girl was about five years old, J.A. agreed to do so, sending Wilson photos of her touching her cousin’s bare buttocks. J.A. admitted to knowing at the time that what she was doing was wrong. Despite this knowledge, she continued to communicate regularly with Wilson without expressing any opposition. She admitted she never contacted the police, even after Wilson escalated to asking J.A. to perform and film sexual acts on minors. Instead of objecting, J.A. reacted with enthusiasm, responding to his proposals with e-mails full of exclamation points and frequently used the slang “lol,” meaning “laugh[ing] out loud,” in response to 4 his extreme proposals. When Wilson asked her to perform oral copulation on two other minor girls, J.A. responded that she would do it and suggested, “Let’s do [it] ASAP lol.” Later, Wilson sent her photographs of a young girl that he wanted J.A. to perform with, to which J.A. responded “Lol aw she’s soo small and cute lol.”2 Several months later, J.A. declined Wilson’s offers for additional photos of the young girls, claiming she felt guilty and was no longer comfortable with the idea. However, J.A. continued to communicate with Wilson up to the date of her arrest and participated in solo photo shoots for him. In August 2015, J.A. was contacted by federal law enforcement and initially denied knowing Wilson or participating in his photo shoots. When confronted with the photos of her daughter, J.A. admitted the truth and began cooperating. J.A. was initially charged with multiple offenses, but accepted a plea agreement wherein she pleaded guilty to four counts of felony child abuse (§ 273a, subd. (a)) and was sentenced to 10 years of probation. As detailed ante, part of Wilson’s course of conduct included offering to pay for photographs depicting lewd acts with minors, receiving the resulting photographs, and then distributing those photographs. Wilson used his “Gmail” e-mail account, hosted by Google, to communicate with the women. The Google Terms of Service specify that users may only use the Google 2 The record suggests J.A. never completed these acts involving girls other than her daughter and her cousin despite her willingness to do so. 5 services as “permitted by law.”3 Google informs users that it “may review content to determine whether it is illegal or violates our policies, and we may remove or refuse to display content that we reasonably believe violates our policies or the law. But that does not necessarily mean that we review content, so please don’t assume that we do.” Google, on its own initiative, took steps to ensure its systems were free of illegal content, particularly child sexual abuse material. Since 2008, Google has used a screening process utilizing a proprietary “hashing” technology to identify apparent child sexual abuse images on its services. Trained Google employees use software to generate a “hash” value for any image file they find depicting child pornography. The hash value is generated by a computer algorithm and consists of a short alphanumeric sequence that is considered unique to the computer file.4 (Power of the Hash, supra, 119 Harv. L.Rev.F. at p. 39.) The resulting hash values are then added to a repository. The repository therefore contains hash values, not the actual child pornography images. When a user uploads new content to its services, Google automatically scans and generates hash values for the uploaded files and compares those hash values to all known hash values in the repository. If Google’s system 3 In support of the People’s opposition to the motion to suppress, a Google employee submitted a declaration with the Google Terms of Service attached as an exhibit. The record contains no indication of whether Wilson reviewed these terms or was otherwise aware of their content. We resolve this case without addressing the terms of service. 4 By way of example, the hash value for a file produced by Google in this case is “73500566f447032d5137a91e931204eb.” Such a hash value is unique to the file, but cannot be “ ‘reversed’ ” to generate the contents of the file itself. (Salgado, Fourth Amendment Search and the Power of the Hash (2005) 119 Harv. L.Rev.F. 38, 40 (hereinafter Power of the Hash.) 6 detects a match between a hash value for uploaded content and a hash value in the repository for a file which was previously identified as containing apparent child pornography, the system generates a report to be sent to the National Center for Missing and Exploited Children (NCMEC) in the form of a “Cybertip.”5 In some cases, Google sends the report without opening the image file, while in other cases a Google employee opens the image for manual review to confirm it contains apparent child pornography. In June 2015, Google’s system identified four image files, each with hash values matching values for apparent child pornography images in its repository, attached to an e-mail created by the Gmail account later identified as belonging to Wilson.6 Google generated a Cybertip report to NCMEC identifying and forwarding the four image attachments. The report included only the four image files, not the e-mail body text or any other information specific to the e-mail. Google classified the images, using a common categorization matrix, as “A1,” indicating they depicted prepubescent minors engaged in sex acts. The report reflected that a Google employee did not manually review the files after they were flagged using Google’s hashing technology, and before sending them to NCMEC. 5 Under federal law, NCMEC is statutorily obligated to serve as a national clearinghouse and maintain a tip line for internet service providers to report suspected child sexual exploitation violations. (See, e.g., United States v. Ackerman (10th Cir. 2016) 831 F.3d 1292, 1296 (Ackerman); 18 U.S.C. § 2258A(c).) NCMEC is statutorily obligated to forward those reports, known as “Cybertips,” to federal law enforcement and may, and often does, forward the reports to state and local law enforcement. (Ackerman, at p. 1296.) 6 Although Google explains that its search is entirely voluntary and serves its own non-governmental interests, it has a duty under federal law to report apparent child pornography to the NCMEC once it obtains actual knowledge of such content. (18 U.S.C. § 2258A, subd. (a).) 7 When it received the report from Google, NCMEC did not open or view the image files, but forwarded the report to the San Diego Internet Crimes Against Children (ICAC) task force after it determined the internet address associated with the Gmail account was in San Diego. The ICAC task force is an office comprised of individuals from multiple agencies, including the federal Department of Homeland Security and local law enforcement. When ICAC received the report, an administrative assistant with the San Diego Police Department printed the report with the attached electronic images, and provided them to two ICAC investigators. Those investigators viewed the images and determined the images warranted an investigation. An ICAC sergeant conducted his own review and agreed with that recommendation. Using the information contained in the report and based on his review of the images, an ICAC investigator obtained a search warrant to obtain from Google all content and user information associated with the identified Gmail address. The investigator’s affidavit establishing probable cause for the warrant was premised entirely on the investigator’s viewing of the images and did not discuss Google’s proprietary hash value technology, the underlying hash value match performed by Google, or even a general overview of this type of computerized matching system. The warrant resulted in the discovery of Wilson’s e-mails offering to pay J.A. to molest and exploit children. The investigator also reviewed e-mails in which Wilson distributed apparent child pornography to others. Using the information received from Google and from Wilson’s internet service provider to identify Wilson, the investigator then obtained a search warrant for Wilson’s apartment and vehicle, and to seize computer equipment, storage devices, and other effects. While executing the search warrant, a participating officer observed a backpack fall from Wilson’s 8 balcony. The officer retrieved the backpack, which held Wilson’s checkbook and a thumb drive containing thousands of images of child pornography. Additional images were found on devices in Wilson’s apartment. Using information gleaned from Wilson’s e-mails produced in response to the search warrant, the investigator was able to identify and locate the woman (J.A.) Wilson paid to perform the sex acts and send him some of the photographs. The investigator obtained additional warrants to search her residence and online accounts, leading to additional evidence used in Wilson’s prosecution. PROCEDURAL HISTORY Before trial, Wilson filed a motion to suppress evidence pursuant to section 1538.5. Wilson argued the warrantless “search” of the e-mail attachments was illegal, requiring the suppression of those images and all evidence obtained indirectly from the initial warrantless search, including all of his e-mails, the e-mails of the woman who sent him the images, and the evidence recovered from his home. At the hearing on the suppression motion, both parties stipulated to the admission as evidence of a declaration by a Google employee explaining Google’s hashing and reporting process, that any testimony she would have offered would be the same as the contents of her declaration, and to the admission into evidence of the Google Terms of Service attached to her declaration. The parties also stipulated that Wilson had a subjective expectation of privacy in his e-mail account. William Thompson, the ICAC investigator who reviewed Wilson’s e-mail attachments and sought the search warrants, testified about his investigation. Thompson acknowledged that neither Google nor NCMEC 9 opened the image files attached to the e-mail. Thompson did not obtain a warrant before viewing the attachments. Thompson also explained that in early 2017, ICAC changed its process relating to Cybertips with file attachments when the electronic service provider indicates it did not open the image files. Now, rather than immediately printing out the images and viewing them, the attached files are locked and ICAC first obtains a search warrant to view the attachments. A computer forensic agent working for the Department of Homeland Security testified about the hashing process. He opined that it would be “almost inconceivable” for two files to have the same hash value if the files were not exactly the same. Using an example of one commonly-used hash value algorithm, he explained the odds of matching hash values for different files would be “something like 340 billion, billion, billion, billion to one.” The court denied the motion to suppress. As the court explained, “it appears that the crux of the motion is that the visual inspection of the images that were flagged by Google’s proprietary hashing technology and whether or not it expanded beyond Google’s private search and therefore would require a warrant of searching.” The court found that Wilson had no reasonable expectation of privacy in the use of an e-mail account with Google for “misconduct or unlawful conduct.” The court explained that “bottom line when these kind of internet tools are used[,] [t]he tools have to be used in a lawful manner. And the terms of service alerts the users that Google may investigate this conduct or suspecting this conduct.” The court also found that no search under the Fourth Amendment occurred because law enforcement simply repeated the private search performed by Google. Acknowledging no employee at Google opened the file to look at the photos, the court found the opening of the photos was not a 10 significant expansion of Google’s private search because “Google had previously confirmed that each of the four images in defendant’s e-mail was child pornography. Special Agent Thompson already knew before visually examining the images, the court can reasonably infer from the A1 classification, that each of the four images depicted a prepubescent minor engaged in [a] sex act.” Thus, the court concluded that the investigator was certain that he would not learn anything by opening the attachment that “had not previously been learned during the private search,” such that opening the attachments and viewing the images did not constitute a search. After the preliminary hearing, the district attorney filed an information charging appellant with four offenses. Count One, alleging a violation of section 288.7, subdivision (b) for the oral copulation of a child of 10 years old or younger, was premised on Wilson paying J.A. to orally copulate her daughter. Count Two alleged a violation of section 288, subdivision (a) for the lewd and lascivious touching of a minor arising from the same incident as Count One. Counts Three and Four also alleged violations of section 288, subdivision (a), and were premised on J.A.’s touching of her daughter’s and cousin’s buttocks on separate occasions. Counts Two, Three, and Four also alleged that Wilson committed the acts against more than one victim within the meaning of section 667.61, subdivisions (b), (c), and (e). Following trial, the jury found Wilson guilty of all counts and found true the enhancement allegations pursuant to section 667.61, subdivisions (b), (c), and (e) as to two counts. The court denied Wilson’s motion for new trial and sentenced Wilson to an indeterminate prison term of 45 years to life. 11 DISCUSSION I Motion to Suppress: Private Search Doctrine A. Standard of Review “ ‘In reviewing a trial court’s ruling on a motion to suppress evidence, we defer to that court’s factual findings, express or implied, if they are supported by substantial evidence. [Citation.] We exercise our independent judgment in determining whether, on the facts presented, the search or seizure was reasonable under the Fourth Amendment.’ ” (Robey v. Superior Court (2013) 56 Cal.4th 1218, 1223 (Robey).) “Thus, while we ultimately exercise our independent judgment to determine the constitutional propriety of a search or seizure, we do so within the context of historical facts determined by the trial court.” (People v. Tully (2012) 54 Cal.4th 952, 979.) Here, the underlying facts surrounding the search were not in dispute. Thus, we exercise our independent judgment in answering whether the search was permissible under the Fourth Amendment. B. Governing Law “ ‘The Fourth Amendment proscribes all unreasonable searches and seizures, and it is a cardinal principle that “searches conducted outside the judicial process, without prior approval by judge or magistrate, are per se unreasonable under the Fourth Amendment—subject only to a few specifically established and well-delineated exceptions.” ’ ” (Robey, supra, 56 Cal.4th at p. 1224.) But the Fourth Amendment does not apply to private searches. (Burdeau v. McDowell (1921) 256 U.S. 465, 475 [finding that the “origin and history [of the Fourth Amendment] clearly show that it was intended as a restraint upon the activities of sovereign authority, and was not intended to 12 be a limitation upon other than governmental agencies”]; People v. North (1981) 29 Cal.3d 509, 514 [“Historically, courts have consistently held that the Fourth Amendment’s prohibition against unreasonable search and seizure does not apply to searches by private citizens.”].) Additionally, if a government search is preceded by a private search, the government search does not implicate the Fourth Amendment as long as it does not exceed the scope of the initial private search. (United States v. Jacobsen (1984) 466 U.S. 109, 115-117 (Jacobsen); see Walter v. United States (1980) 447 U.S. 649, 657 (Walter).)7 The parameters of this private search doctrine—relied upon by the Attorney General here—were discussed by the United States Supreme Court in Jacobsen. In that case, FedEx employees opened a package which had been damaged in transit. (Jacobsen, supra, 466 U.S. at p. 111.) The employees inspected the torn package, removed and cut open a tube found inside, and discovered plastic bags containing a suspicious white powdery substance. (Id. at pp. 111, 115.) The employees repackaged the shipment’s contents and contacted federal law enforcement agents with the Drug Enforcement Administration (DEA). (Id. at pp. 111-112.) The agents inspected the partially open container, removed the contents, opened the plastic bags, and removed a small quantity of the powder to perform a field chemical test, which identified the substance as cocaine. (Ibid.) The defendant challenged the agents’ opening of the package and testing of the powder as a warrantless search in violation of his Fourth 7 “Although the Fourth Amendment does not apply to a search or seizure, even an arbitrary one, effected by a private party on his own initiative, the Amendment protects against such intrusions if the private party acted as an instrument or agent of the Government.” (Skinner v. Ry. Labor Execs. Ass’n (1989) 489 U.S. 602, 614.) No argument has been made that Google was an “instrument or agent” of the government here. 13 Amendment rights. (Jacobsen, supra, 466 U.S. at p. 112.) In concluding no Fourth Amendment violation occurred, the Supreme Court first explained that the private search conducted by the FedEx employees did not implicate the Fourth Amendment. (Id. at p. 115 [“Whether [the initial invasions by the FedEx employees] were accidental or deliberate, and whether they were reasonable or unreasonable, they did not violate the Fourth Amendment because of their private character.”], fn. omitted.) The Court then explained that “[t]he additional invasions of [the defendant’s] privacy by the [g]overnment agent must be tested by the degree to which they exceeded the scope of the private search.” (Ibid.) The Court reasoned that “[o]nce frustration of the original expectation of privacy occurs, the Fourth Amendment does not prohibit governmental use of the now nonprivate information,” and “[t]he Fourth Amendment is implicated only if the authorities use information with respect to which the expectation of privacy has not already been frustrated.” (Id. at p. 117.) Applying these principles, the Court held that the government’s actions—in examining and then later testing the white powder—did not violate the Fourth Amendment. Since the agent’s “removal of the plastic bags from the tube and the agent’s visual inspection of their contents enabled the agent to learn nothing that had not previously been learned during the private search,” the Court held it “infringed no legitimate expectation of privacy and hence was not a ‘search’ within the meaning of the Fourth Amendment.” (Jacobsen, supra, 466 U.S. at p. 120.) The Court observed that, even though the white powder was not in plain view because it was still enclosed in some packaging, “there was a virtual certainty that nothing else of significance was in the package and that a manual inspection of the tube and its contents would not tell [the agent] anything more than he already had 14 been told” by the FedEx employees. (Id. at p. 119.) In other words, the government’s actions merely confirmed the FedEx employees’ recollection concerning the contents of the package. (Ibid.) “The advantage the [g]overnment gained thereby was merely avoiding the risk of a flaw in the employees’ recollection, rather than in further infringing respondents’ privacy. Protecting the risk of misdescription hardly enhances any legitimate privacy interest, and is not protected by the Fourth Amendment.” (Ibid.) Similarly, with respect to the field test, the Court held that testing the substance did not violate the Fourth Amendment because a “chemical test that merely discloses whether or not a particular substance is cocaine does not compromise any legitimate interest in privacy,” and therefore does not constitute a search. (Jacobsen, supra, 466 U.S. at p. 123.) As the Court explained: “Congress has decided—and there is no question about its power to do so—to treat the interest in ‘privately’ possessing cocaine as illegitimate; thus governmental conduct that can reveal whether a substance is cocaine, and no other arguably ‘private’ fact, compromises no legitimate privacy interest.” (Ibid.) The Court concluded that “the likelihood that official conduct of the kind disclosed by the record will actually compromise any legitimate interest in privacy seems much too remote to characterize the testing as a search subject to the Fourth Amendment.”8 (Id. at p. 124.) C. Application of the Private Search Doctrine Wilson contends the private search doctrine does not apply here and, even if it does, the government “far exceeded the scope of Google’s automated 8 The Court compared the government’s field testing to the government’s canine sniff of luggage in United States v. Place (1983) 462 U.S. 696, 707, which was held not to be a search because a sniff can disclose only the presence or absence of contraband. (Jacobsen, supra, 466 U.S. at pp. 123- 124.) 15 hash match.” Applying the principles set forth in Jacobsen, we reject Wilson’s claims and conclude the government’s actions did not violate the Fourth Amendment. We begin by examining Google’s actions. To summarize, Google has a team of employees who are trained on how to recognize child pornography and, since 2008, Google has used a computerized “hashing technology” to assist in this process. At least one Google employee reviews an offending child pornography image before it is assigned a unique hash value, or a “digital fingerprint,” that is then stored in Google’s repository of hash values. Google then scans all user content uploaded to its services and compares the content to the repository of hash values to identify any duplicate images of apparent child pornography as defined under 18 U.S.C. section 2256. Other users can also flag suspicious content and bring it to Google’s attention, but “[n]o hash is added to [Google’s] repository without the corresponding image first having been visually confirmed by a Google employee to be apparent child pornography.” When this process yields a match in hash values—i.e., the hash value of a user’s content matches a hash value corresponding with child pornography viewed by Google and stored in its repository—Google prepares a report to send to NCMEC. In some cases, a Google employee manually looks at the user content. In other cases, Google reports the user to NCMEC without again viewing the image whose hash value matches a hash value in its repository. In this case, Wilson uploaded four offending images (photographs) using Google’s services. Utilizing its scanning process and specifically its “hashing technology,” Google determined that the content constituted child pornography and classified the content as “A1,” indicating “that the content contained a depiction of prepubescent minor engaged in a sexual act.” Google 16 submitted a report, along with the four photographs, to NCMEC. It did not include “any email body text or header information associated with the reported content.” As in other cases where a Google employee has already reviewed an offending image in the past, in this case a Google employee did not re-review Wilson’s photographs concurrently to submitting the report to NCMEC. Google also did not review the content of the e-mail message to which the images were attached. Around the same time that it submitted the report to NCMEC, Google terminated Wilson’s account. All of Google’s actions—including scanning user content, assigning hash values to that content, comparing user content to a repository of hash values, flagging offending images with hash values that match previously- reviewed child pornography images, and sending the apparent child pornography to NCMEC—constitute private action that was not performed at the direction of the government.9 The Fourth Amendment’s protection “is wholly inapplicable ‘to a search or seizure, even an unreasonable one, effected by a private individual not acting as an agent of the [g]overnment or with the participation or knowledge of any governmental official.’ ” (Jacobsen, supra, 466 U.S. at pp. 113-114.) As such, no violation of the Fourth Amendment occurred as a result of Google’s private actions. The government’s subsequent actions—consisting of opening the electronic files submitted to it by NCMEC and viewing the four images attached to Google’s Cybertip—did not exactly replicate Google’s private actions. Applying Jacobsen, we therefore consider the degree to which the agent’s additional invasions of Wilson’s privacy exceeded the scope of Google’s 9 Google was not aware of any investigation involving Wilson prior to submitting its report to NCMEC. As previously indicated, Wilson does not contend that Google or NCMEC were acting as governmental agents in this case. 17 private search. (Jacobsen, supra, 466 U.S. at p. 115.) Before the government even received Wilson’s photographs, Google had already reviewed identical images in the past; scanned all of Wilson’s electronic communications to search for content with matching hash values; flagged four of Wilson’s images as matching images Google had previously observed; classified the matching images as A1, indicating they depicted prepubescent minors engaged in sexual acts; forwarded all four images to NCMEC as part of a Cybertip report; and terminated Wilson’s account. As the Court explained in Jacobsen, “[t]he Fourth Amendment is implicated only if the authorities use information with respect to which the expectation of privacy has not already been frustrated.” (Id. at p. 117.) Because Google’s actions, outlined above, frustrated any expectation of privacy Wilson possessed in the four photographs at issue, the government was free to use this now nonprivate information without violating the Fourth Amendment. (Ibid.)10 No privacy interest remained in the four images following the private search by Google. The agent in this case did not violate the Fourth Amendment when he opened and viewed the four photographs, just as the government did not violate the Fourth Amendment when it examined and later tested the white powder in Jacobsen. The DEA agent’s removal of the plastic bags and his visual inspection of their contents in Jacobsen enabled him to “learn nothing that had not previously been learned during the private search.” (Jacobsen, supra, 466 U.S. at p. 120.) Based on the FedEx employees’ testimony, it was virtually certain that the package contained nothing else of significance that the agents had not already learned from the private employees. The 10 We assume without deciding that Wilson had a legitimate expectation of privacy in the computer images at issue under the Fourth Amendment. We do not need to address the question of whether Google’s terms of service negated any reasonable expectation of privacy. 18 government was merely confirming the FedEx employees’ account regarding the suspected contents of the package. (Id. at p. 119.) Similarly, in this case, opening and viewing the four photographs merely enabled the government to confirm what Google had already conveyed through the Cybertip it generated after using its hashing technology—that the four images were suspected of constituting child pornography. The government did not further infringe on Wilson’s privacy, but rather guarded against the risk that Google’s report was wrong. (Ibid.) We acknowledge this case differs from Jacobsen insofar as the technology and procedures that were used by the parties. Unlike Jacobsen, where the FedEx employees visually observed and handed over the same white substance that was later tested by the government, in this case a Google employee did not contemporaneously view Wilson’s four photographs before sending them to NCMEC. But we conclude Jacobsen still applies despite these differences resulting from the use of Google’s hashing technology. A Google employee did review identical user content—which matched each of Wilson’s four images—although this review occurred at some point in the past rather than contemporaneously with the Cybertip report. A “digital fingerprint” was assigned to each of the four images, meaning that Wilson’s four images were identical to those in Google’s repository of hash values, and no hash values are stored in Google’s repository unless at least one Google employee has viewed the content and confirmed it constitutes 19 apparent child pornography.11 Google did not turn over anything else other than the discrete set of four matching images attached to the Cybertip report; it did not include any larger “files” from which the images were extracted (if any) and it did not include any e-mail body text or header information associated with any of Wilson’s files. (Cf. Ackerman, supra, 831 F.3d at pp. 1305-1306 [government agent expanded AOL’s private party search because, in addition to opening the attachment that had been flagged as having a matching hash value, it also opened an e-mail and three other attachments that AOL had not opened or processed through its hash value system].) The government was merely reviewing what Google had already found, but in a different format—visually reviewing the photographs with the agent’s human eyes versus replicating the computer’s generation of a numerical algorithm. Because the assigned numerical values, or “digital fingerprints,” are representative of the contents depicted in the photographs themselves, the government gained no new material information by viewing 11 Google explains that a comparison of these “digital fingerprints” allows it “to identify duplicate images of apparent child pornography to prevent them from continuing to circulate on [its] products.” (Italics added.) Other courts and commentators similarly describe hash matching as a highly accurate technology. (See, e.g., United States v. Reddick (5th Cir. 2018) 900 F.3d 636, 639 (Reddick) [“[H]ash value comparison ‘allows law enforcement to identify child pornography with almost absolute certainty.’ ”]; Power of the Hash, supra, 119 Harv. L.Rev.F. at p. 39 [explaining hash algorithms are designed to be “uniquely associated with the input,” such that no two files will have matching values “except a file that is identical, bit-for- bit”].) 20 the images. The agent merely confirmed Google’s report that Wilson uploaded content constituting apparent child pornography. 12 In sum, the government’s warrantless search of Wilson’s four images was permissible under the private search doctrine. Google’s private search frustrated Wilson’s expectation of privacy in the files before they were viewed by the government. Google had already identified Wilson’s files as having matching hash values to images that had previously been viewed and identified by a Google employee as apparent child pornography. The government’s subsequent opening and viewing of the four photographs did not significantly expand on the search that had previously been conducted by Google. The agent’s actions in opening the files and viewing the images merely confirmed that the flagged files were child pornography, as reflected in Google’s Cybertip report. D. Defendant’s Arguments Regarding the Private Search Doctrine Wilson’s arguments against application of the private search doctrine are not persuasive. We address these arguments in turn. 12 As previously noted, Jacobsen also separately discussed the government’s field test—concluding the testing of the white substance did not constitute a search within the meaning of the Fourth Amendment. (Jacobsen, supra, 466 U.S. at pp. 122-123.) Because the same cannot be said for the agent’s actions in opening and viewing Wilson’s digital images (i.e., these actions do constitute a search), this part of the Jacobsen decision does not directly apply here. To the extent it does apply, the Court’s reasoning further supports our conclusion that the government did not violate Wilson’s Fourth Amendment rights. Just as the chemical test could reveal whether the substance was cocaine, and no other arguably private fact, the agent’s visual observations here merely confirmed the presence or absence of suspected child pornography. The fact that the confirmation occurred through the use of the agent’s own eyes in this case, versus the chemical testing in Jacobsen, does not make the private search doctrine inapplicable. 21 Wilson contends the private search doctrine does not apply at all because Google’s use of its hashing technology does not “qualify as a private search under the Fourth Amendment.” Wilson reasons that only humans can frustrate one another’s reasonable expectations of privacy and, because Google’s hashing process is automated and no human looked at Wilson’s e-mail attachments until the agents did, no private search occurred at all and Wilson’s privacy interests remained intact. We reject Wilson’s narrow view of the process employed by Google here. Wilson’s assertion that “[n]o human looked at [his] email attachments until the agents did,” and his related claim that Google employed a “machine scan with no human involvement,” does not accurately account for the multi-step process used by Google here. A computer program was used, but it did not occur without “human involvement” or “human participation.” As already discussed, Google trains employees who are responsible for identifying child pornography on its systems. No image is assigned a hash value and added to Google’s repository of hash values associated with apparent child pornography unless an employee first looks at the actual image and confirms its contents. If someone uploads content that is scanned and determined to have a matching hash value, a Google employee then takes that flagged image and submits it to NCMEC in the form of a Cybertip. In addition to flagging the file as suspected child pornography based on its matching hash value, Google classifies the file’s contents based on the initial employee review of an identical duplicate image. In some cases, a Google employee looks at the duplicate image before sending it to NCMEC. But in other cases, as here, a Google employee does not perform this redundant step. In either case, Google’s actions in reviewing, scanning, and flagging user content—and assigning hash values to users’ files—are properly viewed in their entirety as 22 equivalent to a private search which frustrated any reasonable expectation of privacy in the subject files. (See Reddick, supra, 900 F.3d at p. 637 [a private company’s determination, using an automated computer program, that the hash values of defendant’s uploaded files corresponded to the hash values of known child pornography images, constituted a private search for Fourth Amendment purposes].)13 Citing Riley v. California (2014) 573 U.S. 373 and Carpenter v. United States (2018) 138 S.Ct. 2206, Wilson next contends that the United States Supreme Court is unwilling to “extend established Fourth Amendment doctrines in the face of technological innovations that permit greater privacy intrusions.” In Riley, the Supreme Court held that a warrant is generally required before the police may search an arrestee’s cell phone incident to arrest. (Riley, at p. 401.) In Carpenter, the Court held that the Fourth Amendment required a warrant for the automated search of historical cell site location information covering an extended period of time. (Carpenter, at pp. 2217, 2221.) Both cases referenced privacy concerns implicated by emerging technology. (See Riley, at pp. 393-395 [explaining that cell phones have an “immense storage capacity,” which allows people to carry a “cache of sensitive personal information” with them]; Carpenter, at p. 2220 [explaining that, with cell site location information technology, the wireless carrier holds a “detailed chronicle of a person’s physical presence compiled every day, every moment, over several years”].) But neither case assists Wilson here. The 13 Had the government itself engaged in this type of expansive review of user content (and in particular, a user’s e-mails) without a warrant, there is little doubt it would be considered a search under the Fourth Amendment. (See United States v. Warshak (6th Cir. 2010) 631 F.3d 266, 285-286 [applying Fourth Amendment protection to e-mail contents]; see also Kyllo v. United States (2001) 533 U.S. 27, 40 [concluding that the use of a thermal imaging technology constituted an unlawful search].) 23 present case does not involve the government’s use of technological advancements which pose a threat to a defendant’s Fourth Amendment rights. It involves a private search which does not implicate the Fourth Amendment at all. Even if we assume these cases suggest caution in applying the private search doctrine to digital devices such as cell phones or computers, we are not faced with that situation here. The government did not review evidence located on these types of devices. Google did not, for example, provide the government with access to all of Wilson’s electronic communications on his computer. Instead, the government viewed four discrete photographs that were attached to Google’s Cybertip. Wilson’s reliance on Riley and Carpenter is misplaced here. Wilson further contends the agent here significantly expanded on Google’s search. Wilson relies on the United States Supreme Court’s decision in Walter, and contends Jacobsen is inapposite. We disagree. In Walter, a private party mistakenly received a shipment containing several individual boxes of films with labels on the outside indicating the films contained obscene content. (Walter, supra, 447 U.S. at pp. 651-652 [explaining “one side of [the examined boxes contained] suggestive drawings, and on the other side were explicit descriptions of the contents”].) After one of the employees unsuccessfully attempted to view the films’ contents, the private party contacted the Federal Bureau of Investigation (FBI) to retrieve the shipment. (Id. at p. 652.) The FBI agents viewed the films with a projector without obtaining a warrant. (Ibid.) In a plurality opinion, the Court held that the government’s search violated the Fourth Amendment, explaining that “[t]he projection of the films was a significant expansion of the search that had been conducted previously by a private party.” (Id. at pp. 657-658.) 24 Wilson contends Google’s use of its hashing technology “was not materially different than reading the descriptive material on [the] film boxes” in Walter. This case is distinguishable. In Walter, prior to the FBI’s screening of the films, the agents “could only draw inferences about what was on the films” based solely on the labels. (Walter, supra, 447 U.S. at p. 657.) The private party attempted to, but could not, view what was inside. (Id. at p. 652.) Here, the digital fingerprints associated with Wilson’s files convey that the information in the four images is exactly the same as what was previously viewed by a Google employee. The hash value therefore is not like the labels or pictures on the boxes in Walter. The situation would be different, and Walter would likely control, if Google and the government here had relied on file names associated with the four images suggestive of child pornography. But Google’s hashing technology employs a much more sophisticated, multi-tiered process, matching files on its services only against hash values for images that have already been identified as apparent child pornography by its employees. Unlike the private party in Walter, Google used a reliable and accurate method of identifying the actual contents of the files that were provided to the government—all four files were duplicates of images that a Google employee previously reviewed and identified as apparent child pornography. Wilson also attempts to distinguish Jacobsen by pointing out that Google may have previously identified the subject images incorrectly: “a hash match involves origination subjectivity and does not provide a ‘virtual certainty’ that the suspect file is necessarily an image that has been previously correctly identified as child pornography.” We are not persuaded by Wilson’s attempt to distinguish Jacobsen on these grounds. There is no evidence in the record that Google’s initial identification of apparent child 25 pornography, and the associated hash value calculation, was erroneous. Even if some level of subjectivity is involved when a Google employee identifies suspected child pornography, that does not mean the private search doctrine does not apply. The Court in Jacobsen made clear that the DEA agents could rely on the testimony of the FedEx employees, and that they could also confirm the employees’ conclusions based on their private observations—and thereby guard against any errors or “flaw[s] in the employees’ recollection”—by viewing the contents of the container themselves. (Jacobsen, supra, 466 U.S. at p. 119.) The private search doctrine does not require perfection in the information conveyed by a private party. Unlike Walter, the government relied on much more than a mere label in this case. Like Jacobsen, where “the suspicious nature of the material made it virtually certain that the substance tested was in fact contraband” (id. at p. 125), the suspicious nature of the images was evident based on Google’s hashing technology. Before opening the four images, the government could not be one hundred percent certain the Google employee who previously viewed the four images was not mistaken about what was depicted in the pictures. But that possibility of error exists in all cases under the private search doctrine—there is some chance that the private party is conveying inaccurate information. In this case, however, it was reasonable for the government to conclude that the images were contraband based on the hashing process, the A1 designations associated with each of the four files, and the agent’s own knowledge and training as a member of the ICAC task force.14 (Cf. United States v. Runyan (5th Cir. 2001) 275 F.3d 449, 463 14 Wilson also argues that “the hash match cannot provide the same virtual certainty as [the] chemical test” in Jacobsen, but that is not the proper benchmark because the private party in Jacobsen did not perform the chemical test. A more appropriate comparison would be to the FedEx 26 [concluding that “police exceed the scope of a prior private search when they examine a closed container that was not opened by the private searchers unless the police are already substantially certain of what is inside that container based on the statements of the private searchers, their replication of the private search, and their expertise”].) Wilson also cites United States v. Keith (D.Mass. 2013) 980 F.Supp.2d 33, which dealt with a similar hash matching process and concluded that NCMEC, acting as a government agent, expanded on a private search by opening and viewing electronic files forwarded to it by a private internet service provider. (Id. at pp. 41, 43.) The court concluded Jacobsen was inapposite because, in that case, “the subsequent DEA search provided no more information than had already been exposed by the initial FedEx search.” (Id. at p. 43.) By contrast, the court reasoned that more information can be obtained from viewing a file’s contents: “That is surely why a CyberTipline analyst opens the file to view it, because the actual viewing of the contents provides information additional to the information provided by the hash match.” (Ibid.) But examining an item more closely and learning some additional details is not incompatible with applying the private search doctrine; the question is “the degree to which [the additional intrusions] exceeded the scope of the private search.” (Jacobsen, supra, 466 U.S. at p. 115.) Moreover, the fact that the agent learned more from his review of the pictures compared to his review of the numerical algorithm is not dispositive because the proper question is whether this additional knowledge exceeded the scope of the private party’s search. As we have already employees’ visual observations of the contents of the container and the white substance. Google’s extensive hash matching process provides even more information than those visual observations and inferences drawn from how the white substance was packaged. 27 discussed, the private party in this case did know all of the same details based on the prior visual review of the identical images by a Google employee and the government’s search did not exceed the private search. (See Reddick, supra, 900 F.3d at pp. 638-639 [a detective did not expand the scope of Microsoft’s private search; applying Jacobsen, the court concluded that “opening the file merely confirmed that the flagged file was indeed child pornography, as suspected” after Microsoft scanned the defendant’s files and determined the image file’s hash value was identical to the hash value of known child pornography]; United States v. Miller (E.D. Ky. 2017) 2017 WL 2705963, at *7 [“Google’s hash-value matching . . . does not reveal anything about an image that Google does not already know from the regular eyes of its employees. Put another way, hashing is not a futuristic substitute for a private search—it is merely a sophisticated way of confirming that Google already conducted a private search.”].)15 In addition, in Keith and unlike here, it was not clear who performed the initial private search. The court noted it was “possible that the hash value of a suspect file was initially generated by another provider and then shared with AOL.” (Keith, at p. 37, 15 Although the government could learn some details previously unknown to it, there is no likelihood that the government would learn something else of significance under the Fourth Amendment—i.e., a private fact in which a reasonable expectation of privacy remains—when it viewed the four images of child pornography following Google’s extensive, multi-step hashing process. (Cf. United States v. Lichtenberger (6th Cir. 2015) 786 F.3d 478, 488-489 [“[N]ot only was there no virtual certainty that [the officer’s] review [of a laptop computer] was limited to the photographs from [the private party’s] earlier search, there was a very real possibility [the officer] exceeded the scope of [the private] search and that he could have discovered something else on [defendant’s] laptop that was private, legal, and unrelated to the allegations prompting the search—precisely the sort of discovery the Jacobsen Court sought to avoid in articulating its beyond-the-scope test.”], italics added.) 28 fn. 2; see also id. at p. 43 [“the provenance of that designation [of the original file as child pornography] is unknown”].) By contrast, “[n]o hash is added to [Google’s] repository without the corresponding image first having been visually confirmed by a Google employee to be apparent child pornography.” Finally, Wilson contends he can establish a violation of his Fourth Amendment rights based on a trespass theory, irrespective of whether his privacy interests were invaded. The government violates the Fourth Amendment by either infringing on a defendant’s constitutionally protected expectation of privacy (Katz v. United States (1967) 389 U.S. 347, 351-353; id. at p. 361 (Harlan, J., concurring)), or by physically intruding (trespassing) on a defendant’s property to obtain information (United States v. Jones (2012) 565 U.S. 400, 404-411). But as previously discussed, it was a private party, not the government, who searched and seized Wilson’s property. The government merely viewed what the private party had turned over through a private Cybertip. The Fourth Amendment only prohibits governmental action. Wilson provides no sound basis for finding a Fourth Amendment violation under these circumstances, even if Google’s search can be characterized as an unlawful trespass, a physical intrusion on defendant’s property interests, or any other type of wrongful conduct. (See Walter, supra, 447 U.S. at p. 656 [“a wrongful search or seizure conducted by a private party does not violate the Fourth Amendment and . . . such private wrongdoing does not deprive the government of the right to use evidence that it has acquired lawfully”]; Jacobsen, supra, 466 U.S. at pp. 114, 119 [finding that the DEA agent’s “viewing of what a private party had freely made available for his inspection did not violate the Fourth Amendment,” even though the private actor’s conduct “might have been impermissible for a government agent”]; People v. Otto (1992) 2 Cal.4th 1088, 1112 [the exclusionary rule 29 “does not preclude the state from using the fruits of illegal searches and seizures by private citizens”]; People v. Wilkinson (2008) 163 Cal.App.4th 1554, 1564 [“[t]he Fourth Amendment’s prohibition against unreasonable searches and seizures does not apply to searches by private citizens, even if the private citizens act unlawfully, unless the private citizen can be said to be acting as an agent for the government”].) II. Sufficiency of the Evidence: Section 288(a) Wilson contends the evidence does not support the jury’s verdict finding him guilty of Counts Two, Three, and Four, for which he was charged with aiding and abetting, or conspiring to commit, J.A.’s lewd and lascivious acts on her daughter and cousin in violation of section 288, subdivision (a) because J.A. did not harbor the requisite sexual intent. We disagree. “Our task is clear. ‘On appeal we review the whole record in the light most favorable to the judgment to determine whether it discloses substantial evidence—that is, evidence that is reasonable, credible, and of solid value— from which a reasonable trier of fact could find the defendant guilty beyond a reasonable doubt.’ ” (People v. Cravens (2012) 53 Cal.4th 500, 507.) “In applying this test, we review the evidence in the light most favorable to the prosecution and presume in support of the judgment the existence of every fact the jury could reasonably have deduced from the evidence. [Citation.] ‘Conflicts and even testimony [that] is subject to justifiable suspicion do not justify the reversal of a judgment, for it is the exclusive province of the trial judge or jury to determine the credibility of a witness and the truth or falsity of the facts upon which a determination depends. [Citation.] We resolve neither credibility issues nor evidentiary conflicts; we look for substantial evidence. [Citation.]’ [Citation.] A reversal 30 for insufficient evidence ‘is unwarranted unless it appears “that upon no hypothesis whatever is there sufficient substantial evidence to support” ’ the jury’s verdict.” (People v. Zamudio (2008) 43 Cal.4th 327, 357.) Both parties agree that for the jury to convict Wilson of committing lewd and lascivious acts on a child under the age of 14 on the theory that he aided or abetted, or conspired with, J.A. when she committed those acts, the jury was required to find that J.A., as the principal perpetrator, touched the children “with the intent of arousing, appealing to, or gratifying the lust, passions, or sexual desires of [herself] or the child.” (§ 288, subd. (a).) This element is the only element which Wilson contends was not supported by sufficient evidence. For purposes of this appeal, Wilson does not contend that J.A. did not touch the children, but only that the evidence did not support the jury’s conclusion that she did so with the requisite intent. Wilson argues J.A. did not lust after her infant daughter and young cousin and touch them with the aim of satisfying her own sexual desires, but rather that the evidence established that she touched the children only because Wilson paid her to do so and she was desperate for money. “Regarding a specific intent element of a crime, [our Supreme Court has] explained that ‘[e]vidence of a defendant’s state of mind is almost inevitably circumstantial, but circumstantial evidence is as sufficient as direct evidence to support a conviction.’ [Citation.] Moreover, the standard of review that applies to insufficient evidence claims involving circumstantial evidence is the same as the standard of review that applies to claims involving direct evidence. ‘We “must accept logical inferences that the jury might have drawn from the circumstantial evidence. [Citation.]” [Citation.] “Although it is the jury’s duty to acquit a defendant if it finds the 31 circumstantial evidence susceptible of two reasonable interpretations, one of which suggests guilt and the other innocence, it is the jury, not the appellate court that must be convinced of the defendant’s guilt beyond a reasonable doubt. [Citation.]” [Citation.] Where the circumstances reasonably justify the trier of fact’s findings, a reviewing court’s conclusion the circumstances might also reasonably be reconciled with a contrary finding does not warrant the judgment’s reversal.’ ” (People v. Manibusan (2013) 58 Cal.4th 40, 87.) To sustain a conviction under section 288, subdivision (a), the prosecution must present evidence regarding the intent of the person touching the minor. “As the vast majority of courts have long recognized, the only way to determine whether a particular touching is permitted or prohibited is by reference to the actor’s intent as inferred from all the circumstances.” (People v. Martinez (1995) 11 Cal.4th 434, 450.) Convictions under section 288, subdivision (a) “have been obtained and upheld only where the defendant’s lustful intent was manifest under the particular circumstances. In all cases arising under the statute, the People are required to prove that the defendant touched the child in order to obtain immediate sexual gratification.” (Martinez, at p. 452.) “Of course, the manner of touching is not irrelevant under this view. ‘[T]he trier of fact looks to all the circumstances, including the charged act, to determine whether it was performed with the required specific intent.’ [Citations.] Other relevant factors can include the defendant’s extrajudicial statements [citation], other acts of lewd conduct admitted or charged in the case [citations], the relationship of the parties [citation], and any coercion, bribery, or deceit used to obtain the victim’s cooperation or avoid detection [citation].” (Id. at p. 445.) 32 With these principles in mind, we conclude the evidence supports Wilson’s conviction on the theory that J.A. harbored the requisite sexual intent when she touched the girls. Viewed in the light most favorable to the prosecution, the evidence shows that J.A. touched the girls, including orally copulating her daughter, to satisfy her lust, passion, and sexual desire directed toward young girls. As she admitted, there was no medical reason for touching the girls. She also admitted she knew that what she was doing was “wrong” and that she “sinned” when she touched the girls, reasonably supporting the inference that she understood her feelings toward the girls were lewd and lascivious. During the time period in which she was touching the girls, she never objected to Wilson’s sexualized comments regarding young girls and even participated in watching child pornography with Wilson. J.A. did not reject Wilson’s proposals. And she did not merely accept Wilson’s proposal to perform oral copulation on two young girls; she responded by laughing and asking to “do [it] ASAP.” When Wilson showed her photos of a young girl that he wanted her to sexually abuse, J.A. did not react with disgust, but instead expressed she found the girl to be “soo small and cute lol.” This evidence, viewed in the light most favorable to the jury’s verdict, supports the conclusion that J.A. touched the girls to obtain her own immediate sexual gratification. Additionally, as the prosecution argued in opposition to Wilson’s pretrial motion to set aside the information, the evidence established that J.A. participated in “ ‘non-mainstream’ ” sexual activities, supporting an inference that she would also participate in “ ‘non-mainstream’ ” child molestation. On appeal, Wilson points to J.A.’s own statements that she had no sexual intent when she touched the girls. He also points to other evidence in 33 the record suggesting she had no sexual interest in young girls because the incidents giving rise to the offenses here were isolated incidents tied to her need for money and she never lewdly touched any other minors. However, it is not this court’s role on appeal to reweigh the evidence, resolve conflicts in the evidence, or make our own credibility determinations. (See, e.g., People v. Ochoa (1993) 6 Cal.4th 1199, 1206; People v. Jones (1990) 51 Cal.3d 294, 314 (Jones).) The jury rejected J.A.’s self-serving statements denying her sexual interest in children despite the evidence to the contrary and we must accept that determination. Considered as a whole, the evidence supports the jury’s verdict. III. Wilson’s Due Process Right to Notice of the Nature of the Charges Wilson contends his due process right to notice of the charges against him was violated when J.A. changed her testimony after the preliminary hearing regarding the timing and contents of the photos she sent to Wilson and which formed the basis for the charges against him. He asserts that J.A.’s changing testimony between the preliminary hearing and trial deprived him of adequate notice of the charges against him. A. Additional Background At the preliminary hearing, J.A. testified that she believed the videos of her touching her daughter’s buttocks and orally copulating her daughter were filmed and sent to Wilson on July 17, 2014. J.A. additionally testified that she could not remember when she took the photo of her cousin and sent it to Wilson, but that it occurred before the incidents involving videos of her daughter. 34 The information filed after the preliminary hearing alleged that all acts underlying the offenses occurred “between January 1, 2014 and August 20, 2015.” At trial, J.A. changed her testimony to now reflect her understanding that the girl in the July 17, 2014 video was her cousin, not her daughter. She admitted that she met with the prosecution immediately before trial and realized that the girl in the July video was not wearing a diaper, meaning it could not be her infant daughter. She further testified that the videos depicting her daughter were filmed and sent to Wilson in December 2014. Concerned with this change in testimony and the apparent lack of evidence to support the change, Wilson moved for a mistrial. The trial court denied the motion. B. Analysis In Jones, supra, 51 Cal.3d 294, another child molestation case, the Supreme Court considered “the extent to which the defendant’s due process rights are implicated by the inability of his young accuser to give specific details regarding the time, place and circumstances of various alleged assaults.” (Id. at p. 299.) As the court explained, “[t]he ‘preeminent’ due process principle is that one accused of a crime must be ‘informed of the nature and cause of the accusation.’ (U.S. Const., Amend. VI.) Due process of law requires that an accused be advised of the charges against him so that he has a reasonable opportunity to prepare and present his defense and not be taken by surprise by evidence offered at his trial.” (Id. at p. 317.) When a case is initiated with the filing of an information, the defendant is afforded “ ‘practical notice of the criminal acts against which he must defend’ ” primarily by way of the preliminary hearing transcript. (Jones, supra, 51 Cal.3d at p. 317.) A defendant’s right to notice does not encompass 35 “notice of the specific time or place of an offense, so long as it occurred within the applicable limitation period.” (Ibid., italics added.) “ ‘[A]t a minimum, a defendant must be prepared to defend against all offenses of the kind alleged in the information as are shown by evidence at the preliminary hearing to have occurred within the timeframe pleaded in the information.’ ” (Ibid., quoting People v. Gordon (1985) 165 Cal.App.3d 839, 870-871.) Here, the information alleged that all offenses occurred between January 1, 2014, and August 20, 2015. The information also specifically alleged that Wilson, through J.A., committed the specific acts of (1) orally copulating J.A.’s daughter and lewdly touching her vagina; (2) touching her buttocks; and (3) touching the buttocks of J.A.’s cousin. Although J.A. repeatedly stated she could not recall specific dates, the evidence at the preliminary hearing and at trial was consistent with the dates in the information and consistent with the acts described in the information and at trial against the same victims. Wilson compares this case to People v. Ochoa (2016) 2 Cal.App.5th 1227, in which the appellate court held that when the information alleged defendant committed the offenses against one victim, the prosecution could not seek his conviction at trial based on evidence that the offense was instead committed against a different victim. (Id. at pp. 1231-1232.) Doing so, the court reasoned, would violate the defendant’s due process right to notice of the charges against him. (Id. at p. 1232.) Here, unlike Ochoa, the allegations in the information and the testimony at the preliminary hearing were consistent with the evidence at trial regarding the identity of Wilson’s victims and the offenses committed against them. At most, J.A.’s testimony differed on the specific dates on which the offenses were committed, but those dates remained within the time 36 period alleged in the information. Variances between the preliminary hearing testimony and trial testimony regarding the time at which specific acts occurred are not material and do not deprive a defendant of adequate notice. (People v. Calhoun (2019) 38 Cal.App.5th 275, 306-309.) Accordingly, Wilson’s contentions to the contrary have no merit.16 IV. False Evidence Wilson argues that the prosecution knowingly adduced false testimony at trial to support its framing of the case. He contends that the prosecution argued to the jury that Wilson “groomed” the sisters by starting with innocuous photo shoots and slowly progressing to asking them to perform sexual acts. Wilson asserts this framing was only possible because of the false testimony by J.A. and her sister regarding their first photo shoot together. As Wilson asserts, J.A. testified she never participated in a photo shoot in lingerie with her sister, who in turn testified that she did participate in such a photo shoot with J.A., but it occurred at least a year after the initial, fully-clothed photo shoot with both sisters. In his motion for a new trial, Wilson presented evidence that the sisters posed in lingerie the same day as their initial photo shoot and soon thereafter posed several times in increasingly risqué photo shoots. 16 Shortly before oral argument, Wilson submitted a notice of new authority pursuant to rule 8.254 of the California Rules of Court. In his notice, Wilson suggests that the recent decision in People v. Hughes (2020) 50 Cal.App.5th 257 supports his claim that his due process right to notice was violated. However, Hughes did not directly address the defendant’s due process right to notice, but rather involved the prosecution’s duties under section 1054 et seq. to disclose information and materials related to an expert witness’s testimony before trial. (Hughes, at pp. 278-279.) Accordingly, the decision in Hughes does not change our opinion in this case. 37 The trial court denied the motion for new trial, finding that the evidence suggested the sister merely could not remember details, that the evidence to the contrary was available to Wilson before trial, and that any error was harmless because such evidence was not material. As the Attorney General acknowledges on appeal, “[a] criminal judgment obtained through use of false evidence violates due process, whether the prosecution solicits the false evidence or simply allows it to go uncorrected when it appears.” (Campbell v. Superior Court (2008) 159 Cal.App.4th 635, 652.) The prosecution may not knowingly present false evidence and must correct testimony “that it knows, or should know, is false or misleading.” (People v. Morrison (2004) 34 Cal.4th 698, 716.) Wilson, however, offers nothing more than speculation that the sisters knowingly committed perjury or that the prosecution knew their testimony was false. As both sisters frequently testified, they admittedly could not remember the exact sequence of the numerous photo shoots that had taken place years earlier and had actively tried to forget what they had done with Wilson. The plain impression of their testimony suggests that given the sheer multitude of photo shoots, the sisters could not remember some of the specific events and their timing, not that they were intentionally offering false testimony. Given this topic was not a central element of the offenses, the record likewise does not establish the prosecution knowingly adduced this testimony or failed to correct it despite its knowledge of its falsity. Moreover, even assuming some error, Wilson does not establish he was prejudiced. A conviction premised on false evidence is reversible only when the defendant shows that if such evidence were not introduced, it is reasonably probable that the jury would have reached a different result. (See, e.g., In re Roberts (2003) 29 Cal.4th 726, 742.) 38 Wilson does not meet his burden. Given the overwhelming evidence at trial regarding Wilson’s treatment of the sisters, any discrepancy in the precise sequence of their earlier photo shoots was immaterial and it is not reasonably probable that if the jury was aware of the true sequence of photo shoots, it would have concluded that Wilson did not aid and abet the touching of the young girls. On appeal, Wilson contends that J.A.’s false testimony regarding the early photo shoots was part of her effort to rehabilitate her own image and “lay blame on [Wilson] for the molests of her daughter and [cousin].” However, even accepting this framing, J.A. failed to rehabilitate her image regardless of her testimony regarding the early photo shoots. As discussed ante, the jury did not believe J.A.’s testimony regarding her own sexual desires for her daughter and cousin and suggestion that she was merely Wilson’s unwitting pawn. In light of the jury’s disregard for other portions of J.A.’s testimony aimed at evading responsibility, it is unlikely that more information regarding her participation in the early risqué photo shoots would have led to a different result as to Wilson. Accordingly, there is no basis for reversal in this regard. V. Brady Error In an argument related to his claim regarding false evidence, Wilson contends the prosecution failed to disclose photos in its possession depicting the early “sexually charged photo shoots” with both sisters, which could have been used at trial to impeach their testimony that no such photo shoot occurred. Wilson contends this failure to disclose the photos stored on hard drives seized from him violated the prosecution’s duties under Brady, supra, 373 U.S. 83. 39 Wilson raised this claim at trial after the sisters completed their testimony. He asked the court to order the prosecution to turn over any photos in its possession depicting either of the sisters. The prosecutor informed the court that he had offered to provide those photos to Wilson’s counsel months before trial, but defense counsel declined. Wilson’s counsel admitted that he declined the offer, but told the court that given the sister’s unexpected testimony he thought the photos were now relevant. The court accepted the prosecution’s consent to providing the photos as soon as possible. However, at the end of the last day of testimony at trial, the prosecution informed the court that it learned it would take at least a week to obtain the photos given the complex standards for copying and producing such sensitive files. Defense counsel suggested he needed to review the files before the trial concluded to preserve Wilson’s rights to a fair trial, but the court denied the request. The court noted that any deprivation in this regard was the fault of defense counsel, who declined the prosecution’s offer to disclose the material over a month before trial. Wilson later raised the same issue in his motion for new trial, which the trial court likewise denied. The trial court explained that this photographic evidence “was not exculpatory evidence, at best it impeached [the sisters] on a minor point.” Finding the evidence had been offered to Wilson before trial, the court ultimately concluded that Wilson was not prejudiced because “[i]t is not reasonably probable that the result would have been different had the evidence been disclosed.” We agree with the trial court. Under Brady, the prosecution has the obligation to disclose to the defense all material exculpatory evidence. (Brady, supra, 373 U.S. at p. 87.) “There are three components of a true Brady violation: The evidence at issue must be favorable to the accused, either because it is exculpatory, or because it is impeaching; that evidence 40 must have been suppressed by the State, either willfully or inadvertently; and prejudice must have ensued.” (Strickler v. Greene (1999) 527 U.S. 263, 281-282; see also People v. Superior Court (Johnson) (2015) 61 Cal.4th 696, 710.) A defendant establishes prejudice by showing the evidence was material, i.e., if the evidence had been disclosed, there is a reasonable probability that the result of the trial would have been different. (People v. Jenkins (2000) 22 Cal.4th 900, 954.) On appeal, we review a claim of Brady error de novo “but give great weight to any trial court findings of fact that are supported by substantial evidence.” (People v. Letner and Tobin (2010) 50 Cal.4th 99, 176.) Here, Wilson fails to establish that the evidence was suppressed by the government. Before trial, the prosecution offered the photos to Wilson’s counsel, but he declined to review them. Moreover, even assuming the prosecution had some duty to produce the photos despite defense counsel’s disinterest, Wilson fails to demonstrate the requisite prejudice because the photos were not material. As discussed ante regarding the same evidence, the minor issue regarding the sequence of the early photo shoots was not a central element of the prosecution’s case, even if we focus, as Wilson requests, on the “grooming theory” of Wilson’s liability. If Wilson obtained the photos to use as impeachment evidence at trial, he would have merely shown that the sisters had imperfect recollection of their past interactions with Wilson. Regardless of the sequence of events not directly related to the charged offenses, it is not reasonably probable that the jury would have reached a different result if it heard impeachment evidence on this issue. Thus, we conclude there was no Brady error requiring reversal. Wilson alternatively argues that his counsel’s failure to obtain the photos before trial constitutes ineffective assistance of counsel. Like the 41 standard for Brady error, an appellant asserting his counsel was ineffective must show a deficient performance and that absent the alleged ineffectiveness, there is a reasonable probability of a more favorable result. (People v. Waidla (2000) 22 Cal.4th 690, 718.) For the same reasons discussed ante, we conclude there was no such prejudice even assuming counsel’s performance was deficient. VI. Instructional Error Wilson raises four claims regarding jury instructions. He contends the court erred in failing to give two additional instructions regarding unanimity and conspiracy, a set of instructions was unduly prejudicial, and the court’s response to a jury question misconstrued the law. A. Unanimity Instruction Wilson alleges the trial court had a duty to provide a unanimity instruction to the jury. We disagree. Wilson contends that J.A.’s testimony presented multiple instances that could separately support the charged offenses because she testified she touched the girls on multiple occasions. According to Wilson, in light of the possibility that the jurors relied on separate instances to support their verdict, the court erred in not instructing the jury that it must unanimously agree on the same specific act as supporting its verdict as to each offense. 42 The Attorney General does not dispute that the jury’s verdict must be unanimous, but contends no unanimity instruction was required here.17 A criminal defendant has a constitutional right to a unanimous jury. (See, e.g., People v. Russo (2001) 25 Cal.4th 1124, 1132.) “To protect this right, ‘if one criminal act is charged, but the evidence tends to show the commission of more than one such act, “either the prosecution must elect the specific act relied upon to prove the charge to the jury, or the court must instruct the jury that it must unanimously agree that the defendant committed the same specific criminal act.” [Citations.]’ (People v. Napoles (2002) 104 Cal.App.4th 108, 114.)” (People v. Brown (2017) 11 Cal.App.5th 332, 341 (Brown).) As Wilson notes, the jury heard evidence tending to show the commission of more than one act that could support some of the charged offenses. This, however, does not necessarily mean a unanimity instruction was required. As the Brown court explained, the presentation of evidence showing the commission of more than one act supporting a charged offense creates the requirement of either a unanimity instruction or the “ ‘prosecution must elect the specific act relied upon to prove the charge to the jury.’ ” (Brown, supra, 11 Cal.App.5th at p. 341.) “The prosecution can make an election by ‘tying each specific count to specific criminal acts elicited from the victims’ testimony’—typically in opening statement and/or closing argument. [Citations.] Such an election removes the need for a unanimity 17 In his notice of new authority, Wilson also cites the Supreme Court’s recent decision in Ramos v. Louisiana (2020) ___ U.S. ___ [140 S.Ct. 1390, 206 L.Ed.2d 583], which held that the Sixth Amendment’s unanimity requirement applies to criminal trials in state courts. Given California’s existing requirement of a unanimous verdict, the Supreme Court’s decision has no direct effect on California and does not change our analysis. Nothing in Ramos suggests that a unanimity instruction was required in this case under the factual circumstances we discuss post. 43 instruction. [Citation.] [¶] Under these principles, there is an implicit presumption that the jury will rely on the prosecution’s election and, indeed, is bound by it.” (Ibid.) Here, the prosecution made such an election in closing argument. The prosecution expressly claimed that the first two counts were premised on J.A.’s oral copulation of her daughter in December. Similarly, the prosecution argued that Counts Three and Four were premised on the specific acts of touching the two girls in the incidents where J.A. sent the photographs and videos to Wilson. Although J.A. suggested she touched her cousin on a different occasion, the prosecution expressly did not seek to establish Wilson’s guilt on an incident in which there was no photograph or video shown at trial. By making such an election, the prosecution negated the need for a unanimity instruction. (Brown, supra, 11 Cal.App.5th at p. 341.) Thus, Wilson’s claim to the contrary has no merit. B. Conspiracy Instructions Wilson asserts the trial court had a sua sponte duty to give a jury instruction clarifying that Wilson was not responsible for J.A.’s acts before he joined the alleged conspiracy. As Wilson notes, “[a] conspirator cannot be held liable for a substantive offense committed pursuant to the conspiracy if the offense was committed before he joined the conspiracy.” (People v. Marks (1988) 45 Cal.3d 1335, 1345.) On this point, Wilson contends the court should have instructed the jury with CALCRIM No. 419, which provides: “(The/A) defendant is not responsible for any acts that were done before (he/ [or] she) joined the conspiracy. [¶] You may consider evidence of acts or statements made before the defendant joined the conspiracy only to show the nature and goals of the conspiracy. You may not consider any such evidence 44 to prove that the defendant is guilty of any crimes committed before (he/ [or] she) joined the conspiracy.” “A trial court’s duty to instruct, sua sponte, on particular defenses arises ‘ “only if it appears that the defendant is relying on such a defense, or if there is substantial evidence supportive of such a defense and the defense is not inconsistent with the defendant’s theory of the case.” ’ ” (People v. Maury (2003) 30 Cal.4th 342, 424.) Wilson contends on appeal that his central defense falls under this instruction and there was “substantial evidence the charged acts occurred before [Wilson] joined any conspiracy or aided and abetted the charged crimes.” This contention on appeal, however, is belied by the evidence at trial. As Wilson did not testify at trial and offered no affirmative evidence in defense, his opening brief on appeal relies primarily on his counsel’s closing argument to claim there was evidence he did not join the conspiracy until after J.A. committed the acts. As the jury was instructed, however, the arguments of counsel are not evidence. At most, Wilson points to an e-mail introduced at trial in which he told another woman that J.A. sent him a video with her daughter as a surprise and “ ‘I didn’t even ask for it.’ ” This evidence, however, does not support his contention on appeal that he joined the conspiracy with J.A. after she performed her criminal act. Rather, it supports his central defense that there was no conspiracy at any time. Wilson’s chief defense at trial was that the prosecution failed to show that he solicited the photos and videos such that there was no conspiracy or aiding and abetting. Following his statement to the other woman in the e-mail, he asserted J.A. sent him the photos and videos on her own initiative 45 and her evidence to the contrary was not unequivocally supported by the record of their communications. In accordance with this defense, the jury was properly instructed on the elements of conspiracy, including, inter alia, the requirement that Wilson agreed with J.A. to commit the offenses. In contrast to his defense that he never joined the conspiracy, no evidence at trial suggested Wilson did join the conspiracy, but only did so after J.A. had already committed any acts underlying the charged offenses. Thus, an additional instruction was not warranted in this regard. Regardless, we conclude that even if the trial court had a sua sponte duty to instruct the jury with CALCRIM No. 419, and even if that error constituted misinstruction on the elements of an offense, the error was harmless beyond a reasonable doubt. (Chapman v. California (1967) 386 U.S. 18, 24.) The conspiracy instructions that were given clearly informed the jury that Wilson’s culpability required an agreement to commit the offenses before J.A. committed the acts, which the evidence undisputedly showed J.A. did commit. The evidence also established that Wilson repeatedly made “proposals” to J.A. to pay her to perform the acts, record them, and send him copies of the resulting photos and videos. In the absence of any evidence to the contrary, there was no prejudicial error. C. Instructions Regarding Evidence of Other Crimes At trial, the prosecution presented evidence regarding uncharged criminal offenses. The prosecution relied on this evidence of similar yet uncharged crimes to prove Wilson’s propensity to commit the charged offenses. (See, e.g., Evid. Code, § 1108; People v. Villatoro (2012) 54 Cal.4th 1152, 1159-1166.) The court instructed the jury that “The People presented evidence that the defendant” committed these uncharged offenses, which if 46 proven by a preponderance of the evidence, could be considered “for the limited purpose of deciding whether the defendant acted” with the requisite intent for the charged offenses. The court repeated the phrase, “The people presented evidence that the defendant” committed criminal offenses, multiple times in succession. As Wilson concedes on appeal, he did not object to these instructions. However, asserting the issue is not forfeited, he contends that the repetition of the phrasing that the prosecution “presented evidence that the defendant” committed offenses improperly signaled to the jury that the court was giving an opinion that the evidence established that Wilson did indeed commit the referenced offenses. We reject Wilson’s claim of alleged prejudice. Standard jury instructions regarding the use of uncharged offenses to establish intent include the introductory phrase that Wilson challenges here. (See, e.g., CALCRIM Nos. 375, 852A, 852B, 1191A, 2840.) An instruction simply stating that the prosecution “presented evidence” that the defendant committed a crime is not synonymous with stating the evidence is credible or that the defendant did indeed commit the crime. The given jury instructions properly informed the jury of its role in evaluating whether the evidence was sufficient to establish Wilson’s guilt. The jury was properly instructed that it had the duty to decide “what the facts are,” that Wilson is presumed to be innocent, and that the prosecution must prove Wilson’s guilt beyond a reasonable doubt. Considering the totality of the instructions, we conclude that the instructions did not mislead the jury or otherwise suggest to the jury that the court had determined Wilson was guilty. (See, e.g., People v. Reliford (2003) 29 Cal.4th 1007, 1013 [“[W]e must view a challenged portion ‘in the context of the instructions as a whole and the trial record’ to 47 determine ‘ “whether there is a reasonable likelihood that the jury has applied the challenged instruction in a way” that violates the Constitution.’ ”].) D. Response to Jury Question Regarding J.A.’s Sexual Intent Wilson contends the court erred in answering a jury question regarding the element of J.A.’s intent for the section 288, subdivision (a) offenses. The jury was correctly instructed that the People had to prove that J.A. “committed the act with the intent of arousing, appealing to, or gratifying the lust, passions, or sexual desires of herself or the child.” As discussed ante, J.A. testified that she touched the children only because she needed money. After it began deliberations, the jury sent a question to the court, asking whether the “lust” and “passion” referred to in the jury instruction could be “financial, or other types of ‘lust, passion.’ ” After consulting with the parties’ counsel, the court replied that “[t]he specific intent required for Counts 2-4 cannot be solely financial. ‘Lust’ refers to sexual arousal or sexual gratification of the perpetrator or child.” Wilson’s counsel argued before the trial court that stating the intent cannot be “solely financial” (italics added) may be confusing, but the court explained that the intent of the first sentence was to “make[] it clear that there could be multiple intents going on.” On appeal, Wilson contends the court’s answer misconstrued the law and altered the intent requirement for section 288. We disagree. “When reviewing ambiguous instructions, we inquire whether the jury was ‘reasonably likely’ to have construed them in a manner that violates the defendant’s rights.” (People v. Rogers (2006) 39 Cal.4th 826, 873.) The court’s reply clearly indicated to the jury that it must find J.A. acted with sexual intent. Simply stating that J.A. could have acted for 48 multiple reasons, both sexual and financial, did not alter the requisite finding of sexual intent. Wilson provides no authority to suggest that a perpetrator must commit a section 288, subdivision (a) offense with a singular, sexual intent. Nothing in the evidence suggests that sexual intent and financial intent are mutually exclusive, or that any financial intent affected J.A.’s sexual intent. The jury was not reasonably likely to have construed the court’s reply as negating its duty to make the required finding of sexual intent. We reject Wilson’s claim of error. VII. Prosecutorial Misconduct Wilson asserts his due process rights were infringed due to several prosecutorial errors that rendered the trial inherently unfair. He contends the prosecutor (1) falsely claimed in his opening statement that text messages sent by Wilson to J.A. existed but those text messages were not introduced into evidence at trial; (2) met with J.A. immediately before trial to “script[]” her testimony to fit the documentary evidence; (3) used inflammatory language by calling Wilson a “special type of child molester” during his opening statement; and (4) improperly vouched for J.A.’s credibility. He also contends the court erred in not correcting these errors, regardless of whether Wilson’s counsel objected at the time. As Wilson concedes on appeal, his counsel did not object to any of these allegedly improper acts by the prosecution.18 Setting aside any issues of forfeiture, we conclude there was no prejudicial error by the prosecutor and, by extension, the trial court. Most importantly, even assuming each act complained of by Wilson was wrongful, Wilson fails to establish that the 18 Wilson argues the issues were not forfeited, but also contends that to the extent an objection was necessary, his counsel was ineffective for failing to object. 49 alleged errors warrant reversal. Wilson must establish that “there is at least a reasonable probability that a more lenient verdict would have been returned in the absence of the errors.” (See, e.g., People v. Vance (2010) 188 Cal.App.4th 1182, 1207; see also People v. Rodriguez (2020) 9 Cal.5th 474, 487 [reviewing claims of improper prosecutorial vouching and noting “that courts have often found that brief statements such as those before us have limited prejudicial effect”]; People v. Armstrong (2019) 6 Cal.5th 735, 798 [holding prosecutorial misconduct was not prejudicial under standard established by People v. Watson (1956) 46 Cal.2d 818, 836].) Wilson fails to meet this standard. Even if we consider the claims of misconduct cumulatively, they are not sufficient to have deprived Wilson of a fair trial. The evidence of his guilt was so overwhelming that it is not reasonably probable the jury would have reached a different verdict in the absence of the alleged prosecutorial acts. VIII. Cruel and Unusual Punishment Wilson asserts his indeterminate term of life imprisonment constitutes cruel and unusual punishment in violation of both the California and United States Constitution “under the facts and circumstances of this case and for this offender.” (See U.S. Const., 8th Amend.; Cal. Const., art. I, § 17.) “Whether a punishment is cruel and/or unusual is a question of law subject to our independent review, but underlying disputed facts must be viewed in the light most favorable to the judgment.” (People v. Palafox (2014) 231 Cal.App.4th 68, 82.) Wilson does not dispute that the trial court’s imposed sentence was mandatory under the relevant statutes given his conviction of oral copulation under section 288.7, subdivision (b), and the jury’s true findings under 50 section 667.61, subdivision (b). (§ 667.61, subds. (b), (c)(7), (c)(8), (e)(4) [establishing mandatory sentence of 15 years to life for any person convicted of multiple enumerated sexual offenses against more than one victim].) He also does not appear to challenge the sentencing scheme facially. Instead, he focuses on the imposed sentence as applied to him. Although the mandatory nature of his sentence does not end our inquiry, we grant the Legislature great deference. “[T]he determination of whether a legislatively prescribed punishment is constitutionally excessive is not a duty which the courts eagerly assume or lightly discharge. Here, as in other contexts, ‘ “mere doubt does not afford sufficient reason for a judicial declaration of invalidity. Statutes must be upheld unless their unconstitutionality clearly, positively and unmistakably appears.” ’ ” (In re Lynch (1972) 8 Cal.3d 410, 414-415 (Lynch).) Findings of disproportionality are exceedingly rare and occur only in extraordinary cases. (Lockyer v. Andrade (2003) 538 U.S. 63, 73; People v. Em (2009) 171 Cal.App.4th 964, 972 (Em).) The Eighth Amendment of the United States Constitution forbids only sentences that are “grossly disproportionate” to the crime. (Ewing v. California (2003) 538 U.S. 11, 20.) This proportionality principle is narrow when applied in noncapital cases. (Ibid.) Somewhat distinctly, under the California Constitution, a punishment is cruel or unusual “if, although not cruel or unusual in its method, it is so disproportionate to the crime for which it is inflicted that it shocks the conscience and offends fundamental notions of human dignity.” (Lynch, supra, 8 Cal.3d at p. 424; see also People v. Dillon (1983) 34 Cal.3d 441, 478 (Dillon).) “Lynch describes three ‘techniques’ to determine whether a sentence is so disproportionate to the crime as to constitute cruel or unusual 51 punishment. [Citation.] We first consider ‘the nature of the offense and/or the offender, with particular regard to the degree of danger both present to society.’ [Citation.] Next, we compare the sentence to ‘punishments prescribed in the same jurisdiction for different offenses which, by the same test, must be deemed more serious.’ [Citation.] Finally, we compare the sentence ‘with the punishments prescribed for the same offense in other jurisdictions having an identical or similar constitutional provision.’ [Citation.] The weight afforded to each prong may vary by case. [Citation.] ‘Disproportionality need not be established in all three areas.’ ” (People v. Baker (2018) 20 Cal.App.5th 711, 723 (Baker).) On appeal, Wilson does not present an argument regarding each of these techniques, but rather focuses on what he characterizes as his minimal culpability as a non-perpetrator. As Wilson argues, he “was not present when [J.A.] committed the molest acts, did not force her to commit them, and was not aware she was committing the acts when she did them.” Wilson’s argument ignores that under California law, a direct aider and abettor with the requisite mental state is equally guilty of committing the intended crime as the direct perpetrator. (§ 31.) “ ‘[W]hen an accomplice chooses to become a part of the criminal activity of another, [he] says in essence, “your acts are my acts,” and forfeits [his] personal identity. We euphemistically may impute the actions of the perpetrator to the accomplice by “agency” doctrine; in reality, we demand that [he] who chooses to aid in a crime forfeits [his] right to be treated as an individual.’ ” (People v. Prettyman (1996) 14 Cal.4th 248, 259.) In People v. Gonzales (2001) 87 Cal.App.4th 1, the court rejected the defendants’ argument that because they were merely aiders and abettors, their sentences equal to that imposed on a direct perpetrator were cruel and 52 unusual. (Id. at pp. 16-17.) Looking at the circumstances of the offense—a murder in that case—and the defendants’ participation, the court concluded that the imposed sentences were not cruel and/or unusual as applied to the defendants even though they were not the shooter. (Ibid.; see also Em, supra, 171 Cal.App.4th at pp. 974-975 [considering proportionality of aider and abettor’s sentences based on their “integral assistance” in commission of offense].) We apply the same analysis here. Wilson’s role as an aider and abettor does not negate his significant participation in the offenses. Although he did not directly molest the girls, Wilson was the central figure leading to their sexual abuse. The evidence at trial established that he sent proposals to J.A. to take advantage of her trusted role as a mother and caretaker to reach young children that were beyond Wilson’s own reach. By taking advantage of J.A.’s desperate financial need and leading her into increasingly sexually explicit acts, Wilson enabled the molestation of these young, vulnerable children. Although the jury found J.A. harbored her own sexual desires, there is a strong likelihood that without Wilson’s instigation and offer of payment, the abuse would have never occurred. Thus, rather than being an unwitting minor assistant, Wilson was the central figure in the offenses. We also reject Wilson’s suggestion that unlike other sexual offenses against older children, the harm to the victims here was minimal because there is no evidence the girls “were even aware the conduct occurred or suffered any type of psychological or physical trauma.” California courts have long recognized “a strong public policy to protect children of tender years.” (People v. Olsen (1984) 36 Cal.3d 638, 646.) “Along a spectrum ranging from murder, mayhem, and torture on one end to petty theft on the other, ‘lewd conduct on a child may not be the most grave of all offenses, but 53 its seriousness is considerable.’ ” (Baker, supra, 20 Cal.App.5th at pp. 724- 725.) Rather than decreasing his culpability, the vulnerability of the girls given their young age is an aggravating circumstance. (Id. at p. 725.) Similarly, Wilson’s culpability is heightened by aiding J.A. to abuse her trusted position as a mother and caregiver to assault the children by invidiously abusing the trust the girls placed in her. (See, e.g., People v. Gomez (2018) 30 Cal.App.5th 493, 501-502.) Wilson also relies on his criminal-free history, college education, and general good standing in society to suggest the punishment is disproportionate when applied to him. “Although these factors are favorable to him, they do not outweigh the other factors.” (Baker, supra, 20 Cal.App.5th at p. 725.) Rather than suggesting a need for leniency, his education and self-proclaimed success in life suggest he was aware of the severity of his actions and did not embark on his criminal path due to an incomplete understanding of its severity and effect. A college education and good job are not a “free pass” to commit heinous acts while avoiding the harshest penalties that apply to those perceived to be of a lower standing. Finally, Wilson contends that the prosecution’s plea deal with J.A., which resulted in her not serving any prison time despite her role as the direct perpetrator, demonstrates how disproportionate his sentence is to his culpability. To support this contention, Wilson relies on the Supreme Court’s decision in Dillon, in which the court relied on the discrepancy between the defendant’s life sentence and the sentences of his aiders and abettors, none of whom were sentenced to any prison time. (Dillon, supra, 34 Cal.3d at p. 488.) The court held that the excessiveness of the defendant’s sentence was “underscored by the petty chastisements handed out to the six other youths who participated with him in the same offenses.” (Ibid.) Thus, the difference 54 between defendant’s heavy sentence compared to “the proverbial slap on the wrist” received by the other defendants was a relevant factor in the court’s holding that the defendant’s life sentence was cruel and unusual. (Ibid.) Wilson, however, ignores that while the Dillon court compared the defendant’s sentence to some of his aiders and abettors, it declined to compare the defendant’s sentence to the one aider and abettor who was granted immunity “for giving evidence against all the others.” (Dillon, supra, 34 Cal.3d at p. 488, fn. 40.) Plea agreements premised, in part, on an offender’s cooperation with law enforcement are not unusual and an admission of guilt and agreement to cooperate often has an effect on the imposed sentence. (See, e.g., People v. Perez (2016) 243 Cal.App.4th 863, 879-880.) Here, J.A. entered an agreement with the prosecution premised on her cooperation with law enforcement and agreement to testify against Wilson. Wilson, obviously, did not cooperate and still denies his guilt. Accordingly, comparing the sentences of Wilson and J.A. by ignoring the effect of J.A.’s cooperation fails to provide an appropriate comparison in regard to proportionality. Beyond his challenge to his sentence as a non-perpetrator as compared to the sentence for J.A. and reliance on his personal history, Wilson makes no effort on appeal to challenge his sentence as being disproportionate as compared to the sentences for other more serious crimes or sentences imposed for similar sentences in other states. By failing to make a challenge to his sentence under those techniques for applying the constitutional analysis in his opening brief, we deem the issues forfeited. (See, e.g., People v. Duff (2014) 58 Cal.4th 527, 550, fn. 9.) Considering the claims raised by Wilson, we do not find this case to be one of the exceedingly rare cases warranting a finding that the imposed sentence is disproportionate to 55 defendant’s culpability. Accordingly, Wilson fails to show that his sentence violates the Eighth Amendment or the California Constitution. IX. Cumulative Error Wilson contends that even if the alleged errors standing alone did not deny him a fair trial, the cumulative effect of these errors unfairly denied him his due process rights. His claim of cumulative error must demonstrate that absent the errors, there is a reasonable probability the jury would have reached a more favorable result. (People v. Holt (1984) 37 Cal.3d 436, 458.) Wilson has not met this burden. For the reasons stated ante, we conclude his conviction was not the result of any prejudicial error. For the same reasons, his claim of cumulative error has no merit. DISPOSITION The judgment is affirmed. GUERRERO, J. WE CONCUR: McCONNELL, P. J. BENKE, J. 56