P. v. Rosa CA5

Filed 3/12/13 P. v. Rosa CA5 NOT TO BE PUBLISHED IN THE OFFICIAL REPORTS California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication or ordered published for purposes of rule 8.1115. IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA FIFTH APPELLATE DISTRICT THE PEOPLE, F063748 Plaintiff and Respondent, (Super. Ct. No. VCF231025) v. MICHAEL EDWARD ROSA, OPINION Defendant and Appellant. APPEAL from a judgment of the Superior Court of Tulare County. Gary L. Paden, Judge. Richard Power, under appointment by the Court of Appeal, for Defendant and Appellant. Kamala D. Harris, Attorney General, Dane R. Gillette, Chief Assistant Attorney General, Michael P. Farrell, Assistant Attorney General, Louis M. Vasquez and Rebecca Whitfield, Deputy Attorneys General, for Plaintiff and Respondent. -ooOoo- A jury convicted Michael Edward Rosa of (1) stalking, in violation of Penal Code section 646.9, subdivision (a)1 (one count); (2) false personation, in violation of section 529, subdivision (a)(3)2 (six counts); (3) identity theft, in violation of section 530.5, subdivision (a) (one count); and (4) unauthorized electronic distribution of personal identifying information, in violation of section 653.2, subdivision (a) (six counts). The charges arose after Rosa engaged in a course of conduct that terrorized his former wife. Rosa contends there was insufficient evidence to support the stalking, false personation, and identity theft convictions. He does not dispute the evidence, but argues the evidence relied on by the prosecution to support various elements of the crimes was not the type of evidence on which a conviction could be based. We reject each of these arguments and affirm the convictions. Rosa also raises two issues at sentencing. We conclude there is merit to each of these arguments and will remand the matter to permit the trial court to issue a new abstract of judgment that accurately reflects the time credits Rosa earned before sentencing and to correct two fines that were calculated incorrectly. FACTUAL AND PROCEDURAL SUMMARY Evidence in the Trial Court Jennifer Vander Tuig3 had been married to Rosa for approximately 10 years. The couple has two children as a result of the marriage. On several occasions during the marriage, Rosa threatened to kill Jennifer if she left him by chopping her up into little 1All further statutory references are to the Penal Code unless otherwise stated. 2We refer to section 529 in its current form. It was amended in 2011 without substantial changes. (Stats. 2011, ch. 15, § 381, eff. Apr. 4, 2011, operative Oct. 1, 2011.) 3Jennifer Vander Tuig was engaged to, and later married, James Vander Tuig. Most of the events occurred during her engagement. To ease the reader‟s task, we shall refer to her as Jennifer and to him by his first name or as Jennifer‟s current husband. 2. pieces and burying her in the oleander plants along Highway 99. The first occasion Rosa made this threat he did so in a joking manner while drinking beer with his friends, but over time Rosa issued the threat whenever the two fought and there was a possibility of divorce. At one point during the marriage, Rosa was employed by his brother-in-law, Kevin Riordan, in a business called North Idaho Freight Brokers. Jennifer and Rosa met and lived in California, but eventually moved to Idaho for a short period of time. Jennifer moved back to California when she and Rosa decided to end their marriage. Within weeks of returning to California, Jennifer filed for legal separation. In approximately April 2009, Rosa moved to California. Jennifer learned this when she saw Rosa following her around town. Rosa followed her on probably three or four occasions. In April 2009 Jennifer received a phone call shortly after picking up her children. In that phone call Rosa stated he was coming to California to put a bullet between her eyes and a bullet between her current husband‟s eyes. Jennifer believed Rosa, who owned guns when they lived in Idaho. Jennifer called the police and then moved out of the house for four days because she was afraid Rosa would carry out his threat. In August 2009 Jennifer was employed at a bank. While at work she received a phone call from a man who said he was calling about her ad on an Internet Web site. Jennifer informed this man he had the wrong number and he hung up. Within the hour she received multiple similar phone calls. Jennifer did not know what the callers were talking about because she had not placed an ad on the Web site and she had not authorized anyone to do so on her behalf. In addition, over a three-week period a dozen or so men whom Jennifer had never met came into the bank asking her about the ad posted on the Web site. One man yelled at her that she should be ashamed, teasing men by placing an ad like that on the Internet. Another man waited at her car for her to get off 3. work and made rude comments to her. The calls went on for weeks. Jennifer had to change jobs and her residence because of the constant harassment. Jennifer eventually checked the Web site and found the advertisement in the personal ads section. The ads contained four photographs of Jennifer in the nude that were taken during her marriage to Rosa. Jennifer never intended for anyone to see the photos but Rosa. She never gave Rosa permission to display the photos publicly. Jennifer was shocked and upset by the advertisement. She called the police and made a report. Jennifer was in constant fear for her life. She would not go out at night by herself, and she did not permit her children to play outside. She constantly checked to see if Rosa was following her whenever she went to the store. Kathleen Taylor, Jennifer‟s mother, received a phone call from Rosa in the spring of 2009. In this phone call Rosa demanded Jennifer‟s phone number. When Taylor refused the request, Rosa threatened to kill Taylor and Jennifer. Rosa‟s threats caused Taylor to be frightened. Taylor called Jennifer and then went to her home. That was the last time Rosa called Taylor. William H. Cooper, Jr., Jennifer‟s father, spoke with Rosa in April 2009. During that conversation Rosa stated he was going to come to California with two bullets, one for Jennifer and one for her current husband. Cooper called Jennifer to warn her. That was the last phone call Cooper had with Rosa. Elizabeth Jones, Jennifer‟s cousin, ran into Rosa in the courthouse. Rosa told Jones he had been working out in mixed martial arts and he hoped to run into Jennifer and her current husband so he could “fuck ‟em up.” Jones told Jennifer about the threat. James, Jennifer‟s current husband, was in Idaho in the spring of 2009 with Jennifer for a child custody hearing. While James was seated outside the courtroom, Rosa stated, “You‟re gonna get a bullet right between your eyes.” James notified the police and he and Jennifer were escorted out of the courthouse by police officers. 4. James explained that as a result of Rosa‟s threats, Jennifer had become “really terrified, fear[ed] for her life,” and was afraid to leave the house. James also saw nude photos of Jennifer posted on an Internet Web site. Jennifer was with him at the time and was very upset. The photos caused significant stress in their lives. Debra Kwake is Rosa‟s sister and was married to Kevin Riordan, who died in January 2009. Riordan worked full time at a medical center, but he also set up a business called North Idaho Freight Brokers to make extra money. The business apparently arranged transportation of freight on trucks. Rosa was in the same business, and the two worked together. Kwake did not give Rosa permission to use the business name North Idaho Freight Brokers at any time after Riordan died. Rosa lived with Kwake for a short while in early 2009. While living there, Rosa told Kwake he had some nude pictures of Jennifer that a friend was going to post on the Internet in a way that no one would be able to learn who had done so. James William Kelly, a corporal with the Tulare Police Department, investigated the Web site postings. As the result of subpoenas he issued, Kelly learned the Internet Protocol (IP) address (67.187.225.193) and e-mail address (allupinyah1@yahoo.com) of the person who had posted the advertisements purportedly from Jennifer. Using this information, Kelly obtained from the Web site provider seven different advertisements purportedly posted by Jennifer. The advertisements stored by the Web site service provider included only text. Each advertisement was similar and provided Jennifer‟s name and stated she wanted to meet men for oral sex. The advertisements Kelly was able to locate online included nude pictures of Jennifer that had been taken by Rosa during their marriage. Each of the advertisements had been taken down after only a short time. Kelly subpoenaed the records from the Internet service provider to identify the subscriber identified by the IP address that had posted the advertisements. The Internet 5. service provider provided records that identified the subscriber‟s address as 610 North Bonita Drive, Tulare, California. A search warrant was obtained for 610 North Bonita Drive and, when it was executed, Kelly found the address was Rosa‟s residence. A computer was seized during the search. Rosa was interviewed during the search. Rosa initially denied, but eventually admitted, that he had posted the personal advertisements allegedly from Jennifer. He also admitted that allupinyah1@yahoo.com was his e-mail account. He also admitted he had nude pictures of Jennifer on his laptop. Robert Ellison lived with Rosa in the summer of 2009 at 610 North Bonita Drive, Tulare, California. Rosa told Ellison he had put a picture of Jennifer on an Internet Web site and included a message to “Call for a good time.” In the picture Jennifer was naked. A representative from the Web site testified an advertisement was posted using the e-mail address of allupinyah1@yahoo.com. A copy of the posting was entered into evidence. A representative from an Internet service provider established that North Idaho Freight Brokers started an Internet service account on July 8, 2009, and terminated the service on October 7, 2009. The service was provided to 610 North Bonita Drive, Tulare, California. The IP address for the service was 67.187.225.193. Charges The information charged Rosa with one count of stalking (§ 646.9), seven counts of false personation (§ 529), one count of unauthorized use of personal identifying information (identity theft) (§ 530.5), and seven counts of unauthorized electronic distribution of personal identifying information (§ 653.2). 6. Verdict and Sentencing The jury found Rosa guilty of stalking, identity theft, six counts of false personation, and six counts of unauthorized electronic distribution of personal information. Rosa was found not guilty of one count of false personation and one count of unauthorized electronic distribution of personal information. The trial court sentenced Rosa to the midterm of two years for the stalking and an additional eight months for one count of false personation. The sentences on the remaining counts were either imposed concurrently or stayed pursuant to section 654. DISCUSSION I. False Personation Rosa was convicted in counts three through eight of false personation, in violation of section 529. This section criminalizes a defendant‟s use of another person‟s identity under specific circumstances. Rosa was convicted under subdivision (a)(3), which, as relevant here, punishes using another person‟s identity for any act “whereby any benefit might accrue to the party personating, or to any other person.” The prosecution argued that Rosa violated this code section when he posted the seven personal advertisements on an Internet Web site, which included nude photographs of Jennifer and offered sexual services.4 Rosa concedes he posted the personal advertisements, but asserts the convictions cannot stand for two reasons. First, he argues that no benefit accrued to him, and therefore he did not violate the statute. Second, he argues he did not do an act in addition to impersonating Jennifer, which is necessary under the statute. 4Seven personal advertisements were posted, but the jury convicted Rosa of only six counts of violating section 530.5. 7. Benefit The parties each cite People v. Rathert (2000) 24 Cal.4th 200 (Rathert), which defines the mental state required to violate the statute. The Supreme Court concluded that section 529, subdivision (a)(3) “is violated when one intentionally falsely personates another and, in such assumed character, does any act that might cause the liability or benefit described in the statute. [Subdivision (a)(3)], in other words, requires the existence of no state of mind or criminal intent beyond that plainly expressed on the face of the statute.” (Rathert, at p. 202.) The Supreme Court‟s explanation of how it reached this conclusion is enlightening: “Section 529, [subdivision (a)(3)] does not explicitly require that a defendant who impersonates another specifically intend to cause the latter to become liable to any suit or prosecution or to pay any sum of money, or specifically intend to benefit defendant himself or another person. The Legislature included in [subdivision (a)(3)] none of the language typically denoting specific intent, such as „with the intent that‟ or „for the purpose of.‟ [Citation.] To the contrary, [subdivision (a)(3)] is framed in language reasonably susceptible of only one interpretation: that the Legislature sought to deter and to punish all acts by an impersonator that might result in a liability or a benefit, whether or not such a consequence was intended or even foreseen. No fewer than seven times does the word „any‟ appear in the statute: „[A]ny other act … in any event … any suit or prosecution … any sum of money … any charge … any benefit … any other person.‟ [Citation.] The impersonator‟s act, moreover, is criminal provided it might result in any such consequence; no higher degree of probability is required.” (Rathert, supra, 24 Cal.4th at pp. 205-206.) In People v. Vaughn (1961) 196 Cal.App.2d 622, also cited by the parties, the appellate court rejected the defendant‟s argument that section 529, subdivision (a)(3) required pecuniary or material benefit. “[T]he word „benefit‟ as used in the statute is not 8. limited to pecuniary or material gain. The word „benefit‟ denotes any form of advantage. [Citations.]” (Vaughn, at p. 630.) These cases establish that the word “benefit,” as used in the statute, is defined broadly as any form of advantage that may possibly accrue to the defendant. As noted by the Supreme Court in Rathert, the Legislature used the term “any” no fewer than seven times in section 529, subdivision (a), including modifying the term “benefit.” Nor did the Legislature attempt to limit the type of benefit that would support criminal prosecution in any manner, such as requiring the benefit derived to be tangible or monetary in nature. This is a clear indication that the Legislature intended the term “benefit” to be interpreted broadly. Undoubtedly, Rosa performed the acts to cause emotional pain, suffering, and embarrassment to Jennifer and to damage her reputation. Indeed, it is inconceivable that he would have performed these acts except for the expectation that Jennifer would be harmed. Also, Rosa created the strong possibility that he would benefit in his ongoing custody dispute with Jennifer. We conclude the satisfaction that Rosa received from this anticipated harm and the anticipated impact on the divorce case were benefits to Rosa within the meaning of section 529, subdivision (a)(3). Additional Act Rosa also argues these convictions must be overturned because the only act he performed was impersonating Jennifer. As explained in People v. Cole (1994) 23 Cal.App.4th 1672, 1675 (Cole), in addition to the act of impersonation, the People were required to prove an act in addition to the act of impersonating Jennifer that benefitted Rosa or some other person. Rosa asserts there was no evidence of an additional act. Rosa views the evidence much too broadly. Rosa‟s act of impersonating Jennifer was complete when the personal advertisement he created stated that Jennifer had placed the advertisement (“My name is Jennifer”). He did much more than simply state the advertisement was from Jennifer. He also solicited sex on her behalf and then posted 9. nude photographs of her on the Web site. These were two additional acts within the meaning of the statute. The facts in Cole and People v. Robertson (1990) 223 Cal.App.3d 1277 (Robertson), the cases cited by the parties, are much different. Cole was arrested for burglary, apparently while he was awaiting trial on another felony charge. He gave the arresting officer a false name and the impersonated individual‟s date of birth. He also confirmed to the officer the middle name of the impersonated individual after the officer checked the name in a police database. The appellate court concluded that Cole had not committed a separate act apart from impersonating another person. (Cole, supra, 23 Cal.App.4th at p. 1675.) In reaching this conclusion, the appellate court rejected the People‟s argument that Cole committed separate acts when he gave the officer the birth date of the impersonated individual and confirmed the middle name of the impersonated individual. “Here, however, giving a false birth date and middle name was no more than part of the act of providing the false information upon which the false identity was based. Each statement made in the course of providing contemporaneous statements amounting to false identification logically cannot be construed as separate acts compounding each prior statement.” (Id. at p. 1676.) Robertson was arrested for vehicle theft. When arrested, Robertson falsely identified himself using his brother‟s name. Robertson signed his brother‟s name on the booking form. Robertson continued the impersonation at his arraignment. He was released on his own recognizance but failed to appear at the next hearing. A bench warrant was issued. Robertson‟s brother was arrested in Texas and extradited to California where he was found incompetent to stand trial. Authorities discovered they had the wrong individual in custody approximately 18 months after Robertson‟s brother was committed to a mental hospital. 10. While the issue in Robertson was unrelated to the question of whether Robertson had committed a separate act, the appellate court did note that it “[found] no basis to upset” the determination that Roberson had violated section 529, subdivision (a)(3). (Robertson, supra, 223 Cal.App.3d at p. 1283.) On that basis, we can assume the appellate court found that Robertson had committed a separate act, a conclusion with which we agree. Not only did Robertson impersonate his brother, he also signed numerous documents with the assumed name and appeared in court for an arraignment on a crime his brother had been accused of committing. Undoubtedly, these were separate acts within the meaning of the statute. People v. Chardon (1999) 77 Cal.App.4th 205 (Chardon) addressed the separate act requirement. Chardon was driving with a suspended license when she was stopped for speeding. She gave her sister‟s name to the officer and claimed not to have her driver‟s license with her. The officer cited her for the traffic violation, and Chardon signed her sister‟s name to the citation. Chardon argued there was no evidence she committed any act other than impersonating her sister. The appellate court disagreed, concluding that when Chardon signed her sister‟s name to the citation she committed the requisite additional act that subjected her sister to criminal prosecution. (Chardon, supra, 77 Cal.App.4th at p. 212.) The appellate court also rejected Chardon‟s argument that the separate act must occur on a different occasion. “[T]he statute does not require the additional act to occur on a separate occasion. Penal Code section 529[, subdivision (a)(3)] only requires that there be an additional act by the perpetrator which exposes the impersonated person to liability or benefits the perpetrator or another.” (Id. at pp. 212-213.) People v. Casarez (2012) 203 Cal.App.4th 1173 also addressed the additional act requirement. Casarez was riding in a vehicle that was stopped by officers for a traffic violation. A warrant had been issued for his arrest. When asked his name, Casarez gave his brother‟s name. Casarez had his brother‟s birth certificate in his possession for the 11. purpose of establishing the false identity. The officers were not convinced and were able to confirm Casarez‟s true identity and arrested him. Casarez argued to this court that the evidence was insufficient to establish a separate act in addition to impersonating his brother. Casarez was prosecuted under section 529, subdivision (a)(2), which punishes the act of verifying, publishing, acknowledging, or providing any written instrument in the impersonated person‟s name with the intent that the written instrument be recorded, delivered, or used as true. In concluding the statute had not been violated, we observed “section 529 requires more than mere impersonation. It requires that the impersonator use—not just assert—the false identity in one of the ways listed in the three … subdivisions. Without an additional act, the mere impersonation generally constitutes only a misdemeanor. ” (Casarez, supra, 203 Cal.App.4th at p. 1190.) Finally, this issue was addressed in People v. Stacy (2010) 183 Cal.App.4th 1229 (Stacy). Stacy gave her cousin‟s name when she was stopped for suspected driving while intoxicated. She was arrested and transported to the police station where she repeatedly gave the same false name. She also refused to complete the breathalyzer test and refused permission for a blood draw, even after being informed her driving privilege would be suspended if she did not cooperate. She finally allowed a blood draw, although she did not consent or assist in the procedure. Stacy argued there was insufficient evidence that she committed an act in addition to impersonating her cousin. The appellate court noted that “[t]he additional act required by section 529 is something beyond, or compounding, the initial false personation to the arresting officer; it must be more than simply providing information regarding the false identity. [Citations.]” (Stacy, supra, 183 Cal.App.4th at p. 1235.) It concluded, however, that Stacy had committed a separate act when she refused to complete the chemical test because doing so exposed her cousin to an immediate suspension of her driving privilege. 12. While the acts in this case are far different than those in the cited cases, which comprise virtually every published decision addressing the issue, we are confident we have reached the correct conclusion. Rosa went beyond impersonating Jennifer. He used Jennifer‟s identity to solicit sex and to humiliate her by publishing pictures of her in the nude. His actions were designed to injure Jennifer, which provided him with some satisfaction, and also created the strong possibility that he would benefit in his dealing with her on child custody issues or other unresolved issues related to their divorce. Accordingly, we conclude there was substantial evidence to support the convictions. II. Stalking Rosa contends the stalking conviction must be reversed because he did not have the ability to carry out the threats at the time they were made because he was living in Idaho, and Jennifer resided in California. According to Rosa, the distance between them rendered the threat incredible because he did not have the apparent ability to carry out the threat. Section 646.9, subdivision (a), the statutory basis for Rosa‟s stalking conviction, prohibits willful conduct that maliciously harasses another and includes a credible threat to harm that person.5 Rosa‟s argument focuses on whether he made a credible threat as 5Section646.9, subdivision (a) states in full: “(a) Any person who willfully, maliciously, and repeatedly follows or willfully and maliciously harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her safety, or the safety of his or her immediate family is guilty of the crime of stalking, punishable by imprisonment in a county jail for not more than one year, or by a fine of not more than one thousand dollars ($1,000), or by both that fine and imprisonment, or by imprisonment in the state prison. [¶] (b) Any person who violates subdivision (a) when there is a temporary restraining order, injunction, or any other court order in effect prohibiting the behavior described in subdivision (a) against the same party, shall be punished by imprisonment in the state prison for two, three, or four years. [¶] (c)(1) Every person who, after having been convicted of a felony under Section 273.5, 273.6, or 422, commits a violation of subdivision (a) shall be punished by imprisonment in a county jail for not more than one year, or by a fine of not more than one thousand dollars ($1,000), or by both that fine and imprisonment, or by imprisonment in the state 13. prison for two, three, or five years. [¶] (2) Every person who, after having been convicted of a felony under subdivision (a), commits a violation of this section shall be punished by imprisonment in the state prison for two, three, or five years. [¶] (d) In addition to the penalties provided in this section, the sentencing court may order a person convicted of a felony under this section to register as a sex offender pursuant to Section 290.006. [¶] (e) For the purposes of this section, „harasses‟ means engages in a knowing and willful course of conduct directed at a specific person that seriously alarms, annoys, torments, or terrorizes the person, and that serves no legitimate purpose. [¶] (f) For the purposes of this section, „course of conduct‟ means two or more acts occurring over a period of time, however short, evidencing a continuity of purpose. Constitutionally protected activity is not included within the meaning of „course of conduct.‟ [¶] (g) For the purposes of this section, „credible threat‟ means a verbal or written threat, including that performed through the use of an electronic communication device, or a threat implied by a pattern of conduct or a combination of verbal, written, or electronically communicated statements and conduct, made with the intent to place the person that is the target of the threat in reasonable fear for his or her safety or the safety of his or her family, and made with the apparent ability to carry out the threat so as to cause the person who is the target of the threat to reasonably fear for his or her safety or the safety of his or her family. It is not necessary to prove that the defendant had the intent to actually carry out the threat. The present incarceration of a person making the threat shall not be a bar to prosecution under this section. Constitutionally protected activity is not included within the meaning of „credible threat.‟ [¶] (h) For purposes of this section, the term „electronic communication device‟ includes, but is not limited to, telephones, cellular phones, computers, video recorders, fax machines, or pagers. „Electronic communication‟ has the same meaning as the term defined in Subsection 12 of Section 2510 of Title 18 of the United States Code. [¶] (i) This section shall not apply to conduct that occurs during labor picketing. [¶] (j) If probation is granted, or the execution or imposition of a sentence is suspended, for any person convicted under this section, it shall be a condition of probation that the person participate in counseling, as designated by the court. However, the court, upon a showing of good cause, may find that the counseling requirement shall not be imposed. [¶] (k)(1) The sentencing court also shall consider issuing an order restraining the defendant from any contact with the victim, that may be valid for up to 10 years, as determined by the court. It is the intent of the Legislature that the length of any restraining order be based upon the seriousness of the facts before the court, the probability of future violations, and the safety of the victim and his or her immediate family. [¶] (2) This protective order may be issued by the court whether the defendant is sentenced to state prison, county jail, or if imposition of sentence is suspended and the defendant is placed on probation. [¶] (l) For purposes of this section, „immediate family‟ means any spouse, parent, child, any person related by consanguinity or affinity within the second degree, or any other person who regularly resides in the household, or who, within the prior six months, regularly resided in the household. [¶] 14. required by the statute. A credible threat is defined as a “verbal or written threat … made with the intent to place the person that is the target of the threat in reasonable fear for his or her safety … and made with the apparent ability to carry out the threat so as to cause the person who is the target of the threat to reasonably fear for his or her safety .…” (Id., subd. (g).) Implicit in Rosa‟s argument is the assertion that only threats that can be carried out immediately after being made, or a very short time after being made, are credible threats. We disagree. We first note the timeframe Rosa is arguing must be met is very narrow. While Rosa apparently was in Idaho when the threat was made, the time to drive from Idaho to Tulare County is approximately 13 hours, and the flight time considerably less. 6 In essence, Rosa‟s argument seeks to add language to the statute. As the portion of the statute quoted above establishes, section 646.9 requires only an apparent ability to carry out the threat so that the target reasonably fears for his or her safety. Rosa would have us read the statute as requiring an apparent ability immediately to carry out the threat. It is not our province to add words to the statute the Legislature has not deemed necessary, especially when it would change the meaning of the statute significantly. Rosa has not cited any case to support this assertion, nor could we locate such a case. The cases cited by Rosa, People v. Borrelli (2000) 77 Cal.App.4th 703, People v. Halgren (1996) 52 Cal.App.4th 1223, People v. Falck (1997) 52 Cal.App.4th 287, and People v. McClelland (1996) 42 Cal.App.4th 144, address situations where the threats (m) The court shall consider whether the defendant would benefit from treatment pursuant to Section 2684. If it is determined to be appropriate, the court shall recommend that the Department of Corrections and Rehabilitation make a certification as provided in Section 2684. Upon the certification, the defendant shall be evaluated and transferred to the appropriate hospital for treatment pursuant to Section 2684.” 6Itis unclear from the record of Rosa‟s exact location in Idaho at the time the threat was made. 15. were made by an individual located in the vicinity of the purported victim. None of these cases, however, imposes such a requirement. The statute requires the apparent ability to carry out the threat. This portion of the statute refers to the person making the threat. That Rosa possessed guns and the ability to travel from Idaho to California was substantial evidence that he had the ability to carry out his threat within the meaning of the statute. While the “apparent ability to carry out the threat” requirement of section 646.9 may preclude a conviction under some undefined circumstances, this is not that case. III. Identity Theft Rosa was convicted in count nine of identity theft, in violation of section 530.5, subdivision (a). This section makes it unlawful for a defendant willfully to obtain the personal identifying information of another and then use “that information for any unlawful purpose” without the consent of the person whose identity was obtained. The statute also lists examples of unlawful purposes, such as obtaining credit, goods, services, real property, or medical information. “[T]o be guilty under section 530.5, subdivision (a), the defendant must (1) willfully obtain personal identifying information of another person, and (2) use the identifying information for an unlawful purpose without the person‟s consent.” (People v. Tillotson (2007) 157 Cal.App.4th 517, 533.) Rosa focuses on the second element of the crime -- the use of Jennifer‟s identifying information for an unlawful purpose. He argues his conduct, in assuming Jennifer‟s identity and posting on the Internet personal advertisements soliciting sex, was not unlawful under the statute. This court rejected this argument in In re Rolando S. (2011) 197 Cal.App.4th 936 (Rolando S.). Someone sent Rolando the e-mail address and password of a female classmate. Rolando used this information to change the classmate‟s Facebook password. Rolando, posing as the classmate, then posted messages on other individuals‟ Facebook 16. pages suggesting they get together for sex. Rolando also changed the classmate‟s Facebook profile, including a statement that she enjoyed engaging in oral copulation. The juvenile court found true a petition charging Rolando with, among other criminal violations, identity theft, in violation of section 530.5, subdivision (a). Rolando argued his conduct was not unlawful under the statute. After reviewing the legislative history of the statute, particularly the 1998 amendment to the statute (Stats. 1998, ch. 488, § 1, p. 3531) that added the phrase “any unlawful purpose,” we explained: “Prior to the amendment, identity theft was a misdemeanor crime and had to specifically involve the perpetrator‟s use of the victim‟s information „to obtain, or attempt to obtain, credit, goods, or services‟ in the name of the victim without his or her consent. [Citation.] In adding „for any unlawful purpose, including‟ before the clause beginning „to obtain,‟ the amendment expanded the range of unlawful purposes for which a perpetrator could be found guilty of committing identity theft and specifically denoted the nonexclusive nature of the list of unlawful purposes set forth in the statute. The Legislature clearly intended to greatly expand the scope of unlawful conduct underlying the identity theft offense.” (Rolando S., supra, 197 Cal.App.4th at pp. 944-945, fn. omitted.) After noting the Legislature had not done anything to narrow the type of conduct that could violate the statute, we concluded that the phrase “any unlawful purpose” included more than just criminal acts. “Crimes are strictly creatures of penal statutes, and require both a prohibited act and a punishment. [Citation.] Our Supreme Court has defined the term „unlawful‟ to include wrongful conduct which is not criminal. In determining the scope of the term, it held that an act is „unlawful … if it is proscribed by some constitutional, statutory, regulatory, common law, or other determinable legal standard. [Citation.]‟ [Citation.] Under this definition, unlawful conduct includes acts prohibited by the common law or nonpenal statutes, such as intentional civil torts. “Libel is an intentional tort. [Citation.] Civil Code section 45 defines the civil tort of libel: „Libel is a false and unprivileged publication by writing, printing, picture, effigy, or other fixed representation to the eye, which exposes any person to hatred, contempt, ridicule, or obloquy, or which causes him to be shunned or avoided, or which has a tendency to 17. injure him in his occupation.‟ Appellant practically concedes the point, arguing the „prosecution proved only that [appellant] humiliated, embarrassed, and defamed [the victim].‟ Here, appellant wrote sexually explicit and vulgar comments on the victim[‟s] friends‟ walls, accessible by the victim[‟s] friends and acquaintances, and purportedly as her. Appellant clearly exposed the victim to hatred, contempt, ridicule and obloquy with his actions.” (In re Rolando S., supra, 197 Cal.App.4th at pp. 946-947, fn. omitted.) Rosa is in a virtually identical position. He used Jennifer‟s personal information to pose as her on the Internet and post sexually explicit and vulgar comments in a personal advertisement on a Web site page available to be seen by anyone with access to the Internet. In doing so, he exposed Jennifer to hatred, contempt, ridicule, and obloquy within the meaning of Civil Code section 45 and exposed himself to prosecution for identity theft. IV. Sentencing Rosa asserts three errors were made at sentencing. The People concede that the fines imposed pursuant to Penal Code section 1465.8 and Government Code section 70373 are incorrect. Each fine is imposed once for each conviction. The probation report incorrectly counted the number of convictions as 14 instead of 12. As a result, the fines imposed pursuant to these code sections are greater than permitted. The remaining issues concern the amount of conduct credit Rosa was entitled to for time spent in custody before sentencing and the accuracy of the written order and the abstract of judgment. The trial court orally awarded Rosa 70 days‟ credit, consisting of 35 days in custody and 35 days conduct credit. The written order for the sentencing hearing states, “Defendant given credit for 51 days actual time plus 35 days conduct credit for a total of 8 days served awaiting sentence,” which is obviously incorrect. The abstract of judgment lists the total credits as 51 days, 35 days for time in custody, plus eight days of conduct credit, which does not total 51 days. 18. Rosa argues he is entitled to the 70 days of credit, while the People disagree. Both parties agree that section 4019 governs the issue. We must determine which version of section 4019, which repeatedly has been amended, was in effect at the time of Rosa‟s crimes. Rosa committed these crimes in 2009 and 2010. In 2009, section 4019 provided that for each four days spent in custody, Rosa was entitled to credit for six days if he qualified for good conduct and worktime credit. (Former § 4019, subds. (b), (c), (f), as amended by Stats. 1982, ch. 1234, § 7, pp. 4553-4554.) Effective January 25, 2010, section 4019 was amended to provide that for every two days actually spent in custody, the defendant was entitled to a total credit of four days. (Former § 4019, subds. (b), (c), (f), as amended by Stats. 2009, 3d Ex. Sess. 2009-2010, ch. 28, § 50.) Effective September 28, 2010, section 4019 again was amended to provide that qualified prisoners would earn six days of custody credit for every four days spent in custody. (Former § 4019, subds. (b), (c), (f), as amended by Stats. 2010, ch. 246, § 2.) However, subdivision (g) of section 4019, added by the amendment, stated that the changes would apply only to crimes committed after the effective date of the amendment, or September 28, 2010. All of Rosa‟s crimes were committed before September 28, 2010. Although section 4019 subsequently has been amended, subdivision (g) has not changed, so that all amendments apply only to crimes committed after the effective date of the amendment. Accordingly, Rosa was entitled to be sentenced under the version of section 4019 that was effective on January 25, 2010, and was entitled to four days of custody credit for each two days actually served, assuming he qualified for good conduct and work credits. Since the trial court awarded him full credits, we must assume Rosa qualified for the credit. Accordingly, the trial court‟s oral pronouncement of judgment was correct, and the abstract of judgment must be corrected. 19. DISPOSITION The convictions are affirmed, but the matter is remanded to the trial court to correct the erroneous fines and the time credits stated in the abstract of judgment. The trial court is directed to prepare a corrected abstract of judgment and to forward a certified copy of the abstract to the appropriate authorities. _____________________ CORNELL, Acting P.J. WE CONCUR: _____________________ KANE, J. _____________________ POOCHIGIAN, J. 20.