Filed 11/16/20 P. v. Ross CA4/3
NOT TO BE PUBLISHED IN OFFICIAL REPORTS
California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for
publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication
or ordered published for purposes of rule 8.1115.
IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA
FOURTH APPELLATE DISTRICT
DIVISION THREE
THE PEOPLE,
Plaintiff and Respondent, G057880
v. (Super. Ct. No. 14HF2219)
FRED HOWARD ROSS, JR., OPINION
Defendant and Appellant.
Appeal from a judgment of the Superior Court of Orange County, Richard
M. King, Judge. Affirmed.
The Law Offices of Charles M. Farano and Charles M. Farano for
Defendant and Appellant.
Xavier Becerra, Attorney General, Lance E. Winters, Chief Assistant
Attorney General, Susan Sullivan Pithey, Assistant Attorney General, Scott A. Taryle and
Viet H. Nguyen, Deputy Attorneys General, for Plaintiff and Respondent.
This appeal requires us to interpret Penal Code section 484e, which pertains
to the theft of access cards (e.g., credit and debit cards) and account information related
1
thereto. Subdivisions (a), (c) and (d) identify three forms of theft that require the intent
to defraud. The statute also describes a fourth form of theft, in subdivision (b), that does
not require such intent. That provision applies when, within any consecutive 12-month
period, the defendant acquires access cards issued to four or more persons under
circumstances indicating the cards were taken in violation of subdivision (a), (c) or (d).
Defendant Fred Ross, Jr., was convicted of, inter alia, seven counts of
violating subdivision (d) for acquiring the credit card numbers of seven different victims
with the intent to defraud. He does not dispute there is sufficient evidence to support his
convictions on those counts. However, he contends that instead of being charged with
seven counts under subdivision (d), he should have only been charged with one count
under subdivision (b). We disagree. When, as here, the evidence shows the defendant
unlawfully obtained credit card information from multiple victims with fraudulent intent,
the prosecution has the discretion to allege multiple violations of subdivision (d) in lieu
of a single violation of subdivision (b). Accordingly, we affirm the judgment.
FACTS
On January 26, 2013, defendant entered the Active Ride skateboard and
apparel store at the Irvine Spectrum mall. He walked directly to the watch case and told
the clerk he wanted to buy a Nixon ceramic, the most expensive watch in the store. The
clerk thought it odd defendant did not want to try on the watch before buying it, but he
proceeded to the checkout counter with the timepiece. Defendant grabbed a t-shirt and
hat off the shelves and met him there momentarily.
The total sales price for the merchandise was around $3,000. Defendant
tendered a Visa card for the purchase, but when the clerk swiped it through the magnetic
1
All statutory references are to the Penal Code, and all subdivision references are to section 484e.
2
credit card reader, no information came up on his computer screen. This was unusual;
typically, when a credit card is swiped, its number and user’s name appear on the screen.
When told his card was declined, defendant gave the clerk another credit card. When the
clerk swiped that one, the same thing happened.
Defendant told the clerk he would come back later for his merchandise.
After he left the store, the clerk swiped his own credit card to see if the reader was
working and saw that it was. He notified a mall security guard, who spotted defendant
walking toward the parking structure. The guard called the police, and within minutes,
Irvine police officers arrived on the scene and detained defendant.
During the detention, the officers legally searched defendant’s backpack
and found a laptop computer and linen paper. They also searched his wallet and found
two counterfeit $50 bills that had the same texture as the linen paper. In addition, the
2
police found about 45 access cards in defendant’s possession. Many of the cards had
fake logos and had been altered to show defendant’s name embossed on them.
The investigation into the contents of defendant’s computer revealed a
treasure trove of incriminating information. The police learned that not only had
defendant obtained personal identification information on over 100 people without their
knowledge, he had researched the physical properties of credit cards and attempted to
create multiple phony driver’s licenses and checking accounts. And, he had acquired
numerous credit card numbers of unsuspecting individuals. Defendant used those
numbers to produce bogus credits cards and purchase goods from a variety of retailers.
Following a jury trial, defendant was convicted of identity theft, second
degree burglary, possessing counterfeit currency and forging an official seal. He was
also convicted in counts five through eleven with credit card theft under section 484e,
subdivision (d), for unlawfully acquiring credit card numbers from seven individuals with
2
The cards were a hodgepodge of credit, debit and gift cards.
3
the intent to defraud. The trial court sentenced him to seven years and eight months in
custody for his crimes.
DISCUSSION
Defendant’s appeal is limited to the seven counts of credit card theft under
subdivision (d). He accuses the trial court of improperly instructing the jury on those
counts. He does not assert the trial court’s instructions incorrectly described the elements
of subdivision (d), but rather insists he was improperly charged with seven violations of
that subdivision. In defendant’s view, his extensive credit card thievery should have only
been charged as one violation of subdivision (b), and the trial court should have
instructed the jury only as to that single count. He also alleges his trial attorney was
ineffective for failing to ensure he was charged, and the jury was instructed, in that
fashion. We find defendant’s arguments unpersuasive.
Section 484e states in full:
“(a) Every person who, with intent to defraud, sells, transfers, or conveys,
an access card, without the cardholder’s or issuer’s consent, is guilty of grand theft.
“(b) Every person, other than the issuer, who within any consecutive 12-
month period, acquires access cards issued in the names of four or more persons which he
or she has reason to know were taken or retained under circumstances which constitute a
violation of subdivision (a), (c), or (d) is guilty of grand theft.
“(c) Every person who, with the intent to defraud, acquires or retains
possession of an access card without the cardholder’s or issuer’s consent, with intent to
use, sell, or transfer it to a person other than the cardholder or issuer is guilty of petty
theft.
“(d) Every person who acquires or retains possession of access card account
information with respect to an access card validly issued to another person, without the
cardholder’s or issuer’s consent, with the intent to use it fraudulently, is guilty of grand
theft.”
4
The statute was enacted to protect innocent consumers from fraudulent
practices involving access cards. (People v. Molina (2004) 120 Cal.App.4th 507, 512,
516 (Molina).) To that end, subdivision (d) targets the unlawful acquisition or retention
of “access card account information.” (§ 484e, subd. (d).) It was intended to protect
people from the “injury, expense and inconvenience arising from the fraudulent use” of
such information. (Molina, supra, 120 Cal.App.4th at p. 516.)
Consistent with the statute’s goal, the term “access card” is broadly defined
to include any card, plate, code or account number that can be used to obtain anything of
value. (Molina, supra, 120 Cal.App.4th at p. 512, citing § 484d, subd. (2).) Thus, “[a]n
access card account number (such as a credit card number) is both an access card
[citation] and access card account information.” (Id. at p. 517.)
That point is central to defendant’s argument because by unlawfully
acquiring the credit card numbers of the victims named in counts five thru eleven, he not
only violated subdivision (d), which pertains to “access card account information,” he
also may have violated subdivision (b), which speaks to the acquisition of “access cards.”
Although the evidence at trial did not reveal when defendant acquired those credit card
numbers, it is possible he acquired them within a consecutive 12-month period, as
required under subdivision (b). Therefore, for purposes of the defendant’s argument we
will assume his conduct implicated both subdivision (d) and subdivision (b).
Still, that invites the broader question of whether the prosecution was
required to charge defendant under subdivision (b) in lieu of subdivision (d). Comparing
the wording of the two subdivisions, it is apparent they have different elements. Unlike
subdivision (b), subdivision (d) only applies to access cards that were validly issued to
another person. In addition, whereas subdivision (d) requires the intent to defraud,
subdivision (b) merely requires the defendant to have reason to know the subject cards
were obtained fraudulently.
5
In that sense, subdivision (b) is analogous to the crime of receiving stolen
property, which is aimed at people who deal in stolen property, as opposed to people who
steal it in the first place. (See People v. Jaramillo (1976) 16 Cal.3d 752, 758 [receiving
stolen property “‘is directed at the traditional “fence” and at those who lurk in the
background of criminal ways in order to provide the thieves with a market or depository
for their loot. Such offenses are essentially different from the actual theft of
property.’”].) Indeed, a review of the legislative history materials pertaining to
subdivision (b) confirms it was aimed at the “widespread racket in the sale of stolen
credit cards” and intended to crack down on those who operate in that secondary market.
(Analysis of Sen. Bill No. 1055 prepared for Sen. Jud. Com. hearing of June 1, 1967;
C.E.B., Review of Selected 1967 Code Legislation, pp. 152-153.)
The wording of subdivision (b) also supports the conclusion it was intended
to target people who receive access cards after they have already been stolen. By its
terms, the provision applies when the defendant “acquires” access cards he has reason to
know were “taken or retained” under circumstances that violate subdivision (a), (c) or
(d). (§ 484d, subd. (b).) This phrasing implies a two-step process in which the
acquisition of the cards and the taking/retention thereof are carried out by different
people at different times. Subdivision (b) was designed to ensure people involved in the
second step of the process – receivers of stolen credit cards and credit card information –
do not escape liability, even if they lack the intent to defraud.
In contrast, subdivision (d) speaks to the first step of the process. It applies
to any person who acquires access card account information with fraudulent intent, not
someone who subsequently obtains that information.
In this case, defendant’s conduct fits more squarely into subdivision (d)
than subdivision (b) in that he unlawfully acquired the victims’ credit card numbers with
the intent to use them fraudulently. In fact, the evidence showed he utilized the victims’
credit card numbers to acquire a considerable amount of merchandise using the phony
6
credit cards he made from those numbers. Because defendant was not simply a
repository for stolen credit numbers but was actively involved in their acquisition and
harbored the intent to defraud, subdivision (d) is more descriptive of his conduct than
subdivision (b).
Even if both subdivisions were implicated under the facts of this case, the
Molina decision supports respondent’s position that the prosecution was within its rights
in charging defendant with violating subdivision (d) instead of subdivision (b). In
Molina, the defendant was convicted of grand theft for violating subdivision (d). He
argued his conviction should be overturned because his conduct also came within the
terms of subdivision (c), which constitutes mere petty theft. However, the Molina court
rejected this argument out of deference to the prosecution’s charging authority. The court
held that even if the two subdivisions were coextensive, the prosecution could charge the
harsher subdivision, so long as its decision to do so was not motivated by a
discriminatory intent. (Molina, supra, 120 Cal.App.4th at pp. 517-518.)
Defendant does not ascribe any discriminatory motive to the prosecution’s
decision to charge him with violating subdivision (d) as opposed to subdivision (b).
Rather, he contends the decision violates the holding of People v. Shabtay (2006) 138
Cal.App.4th 1184 (Shabtay).) However, Shabtay addressed a different issue altogether.
In that case, the court was not asked to decide whether it was permissible for the
prosecution to charge the defendant with one particular subdivision of section 484e over
another. Instead, the court was confronted with the question of whether the defendant
could be charged with multiple violations of subdivision (b) based on his acquisition of
11 access cards over a 12-month period. (Id. at pp. 1187-1188.)
The state argued defendant was guilty of two counts of subdivision (b), one
for the first four cards he acquired, and one for the second four cards he acquired.
However, based on the plain language of subdivision (b), the Shabtay court disagreed.
Given that subdivision defines grand theft as acquiring access cards of four or more
7
persons during a particular time span, the court ruled “that no matter how many cards are
accessed in excess of four, there is only one offense within any consecutive 12-month
period.” (Shabtay, supra, 138 Cal.App.4th at p. 1191.) Thus, the defendant should have
been charged and convicted of one count under subdivision (b), not two. (Id. at p. 1192.)
Justice Turner concurred in this holding. But instead of basing his decision
on the text of subdivision (b), he relied on the rule of lenity, which requires courts to
interpret statutory provisions in favor of the defendant when they are susceptible of two
reasonable interpretations. (Shabtay, supra, 138 Cal.App.4th at pp. 1192-1196 [concur.
opn. of Turner, P.J.].) Because none of the justices in Shabtay addressed the interplay
between subdivision (b) and subdivision (d), that decision is not controlling on the
question of whether defendant was properly charged with violating subdivision (d) in our
case. (See People v. Evans (2008) 44 Cal.4th 590, 599 [cases are not authority for issues
they did not consider or decide].)
However, it is important to point out that, in contrast to subdivision (b), the
provision at issue in Shabtay, subdivision (d) does not define the type of theft it describes
in relation to any time period or number of victims. The provision is not ambiguous in
terms of its application when multiple victims are involved; rather, it plainly applies
whenever a defendant acquires access card account information with respect to a card
that was validly issued to any other person. Because the wording of the statute is not
uncertain in this regard, the rule of lenity does not apply. (See People v. Avery (2002) 27
Cal.4th 49, 58 [rule only applies when there is an egregious ambiguity in a statute such
that the court can only guess what the Legislature intended].)
In his reply brief, defendant correctly points out People v. Bailey (1961) 55
Cal.2d 514 (Bailey) held that a person generally may not be convicted of more than one
theft if he commits multiple acts of theft pursuant to a single overarching theme.
However, the Bailey decision does not apply to cases such as the present one, where the
8
defendant steals from multiple victims. (People v. Reid (2016) 246 Cal.App.4th 822,
3
831-835.) Therefore, defendant cannot avail himself of that decision either. (Ibid.)
In attacking his convictions under subdivision (d), defendant also alludes to
the so-called Williamson rule. (See In re Williamson (1954) 43 Cal.2d 651.) That rule
“precludes prosecution under a general statute when a more specific one describes the
conduct involved.” (Finn v. Superior Court (1984) 156 Cal.App.3d 268, 271.) But the
rule only applies when “‘each element of the general statute corresponds to an element on
the face of the special statute’ or (2) when ‘it appears from the statutory context that a
violation of the special statute will necessarily or commonly result in a violation of the
general statute.’ [Citation.]” (People v. Murphy (2011) 52 Cal.4th 81, 86.)
As we have explained, the elements of subdivision (d), the supposed
general statute in this case, do not correspond to the elements of subdivision (b), the
purported special statute. Furthermore, a violation of subdivision (b) for receiving stolen
credit card information will not necessarily or commonly result in a violation of
subdivision (d) because people who deal in the secondary market for such information
are often far removed from the initial taking process. And, there is no requirement that
they possess the intent to defraud, which is a key distinguishing feature of subdivision
(d). Suffice it to say, there is insufficient overlap between subdivision (b) and
subdivision (d) to conclude the Williamson rule precludes application of subdivision (d)
in this case.
Defendant next invokes section 654 to overturn his convictions under
subdivision (d). However, that section concerns multiple punishment, not multiple
convictions. (People v. Correa (2012) 54 Cal.4th 331, 336.) It does not mandate a
reversal of defendant’s convictions in this case.
3
In People v. Whitmer (2014) 59 Cal.4th 733, the Supreme Court further limited the reach of Bailey
by ruling it does not apply if the defendant’s thefts were separate and distinct from each other. (Id. at p. 740.)
However, that limitation does not apply here because the defendant’s thefts occurred before the Whitmer decision
was handed down. (Id. at p. 742.)
9
Lastly, defendant contends his subdivision (d) convictions must be reversed
on grounds of ineffective assistance. He contends his trial attorney was remiss for failing
to challenge the prosecution’s decision to charge him with multiple violations of
subdivision (d), as opposed to a single violation of subdivision (b). However, our
foregoing discussion demonstrates defendant was properly charged with and convicted of
seven counts of violating subdivision (d). Therefore, counsel was not derelict for failing
4
to mount a challenge to the charges. (Strickland v. Washington (1984) 466 U.S. 668.)
DISPOSITION
The judgment is affirmed.
BEDSWORTH, ACTING P. J.
WE CONCUR:
FYBEL, J.
THOMPSON, J.
4
The record shows defendant was actually represented by multiple attorneys over the course of his
prosecution. In the conclusion section of his opening brief, he alleges he was “haphazardly ‘[k]icked around’” by
his attorneys. However, other than faulting them for not contesting the charges under subdivision (d), defendant
does not explain how his various attorneys failed to provide him with effective assistance or otherwise mistreated
him. Therefore, we need not delve into his Sixth Amendment claim any further. (See Paterno v. State of California
(1999) 74 Cal.App.4th 68, 106 [appellant has the duty to explain the basis for the claims he raises on appeal].)
10