People v. Meza

Filed 4/13/23 (review denied 8/16/23; reposted with Supreme Court order and statement) CERTIFIED FOR PUBLICATION IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA SECOND APPELLATE DISTRICT DIVISION SEVEN THE PEOPLE, B318310 Plaintiff and Respondent, (Los Angeles County Super. Ct. No. TA150314) v. DANIEL MEZA et al., Defendants and Appellants. APPEALS from judgments of the Superior Court of Los Angeles County, Tammy Chung Ryu, Judge, and Laura R. Walton, Judge. Affirmed. Sharon Fleming, under appointment by the court of appeal, for Defendant and Appellant Daniel Meza. Bess Stiffelman, under appointment by the court of appeal, for Defendant and Appellant Walter Meneses. Rob Bonta, Attorney General, Lance E. Winters, Chief Assistant Attorney General, Susan Sullivan Pithey, Senior Assistant Attorney General, Wyatt E. Bloomfield and Michael C. Keller, Deputy Attorneys General, for Plaintiff and Respondent. 1 Jennifer Lynch and Andrew Crocker for Electronic Frontier Foundation as Amicus Curiae on behalf of Defendants and Appellants. ________________________________ INTRODUCTION “A geofence is a virtual fence or perimeter around a physical location. Like a real fence, a geofence creates a separation between that location and the area around it. . . . [¶] It can be any size or shape, even a straight line between two points. [¶] Geofences are created using mapping software, which allow the user to draw the geofence over the desired geographic area. It is made up of a collection of coordinates (i.e., latitude and longitude) or in the case of a circular geofence one point that forms the center.”1 “Geofence warrants (sometimes called ‘reverse location searches’) are official requests by law enforcement authorities to access the device location data gathered by large tech companies like Google. The warrants specify a time and geographic area, and require the companies to turn over information on any devices that were in that area at that time. While this data is typically anonymized, it can be used in conjunction with other 1 Verizon Connect, What Is A Geofence? [as of April 13, 2023], archived at < https://perma.cc/A3A6-NPZ9>. 2 investigative techniques to tie devices to specific users—and identify persons of interest in a criminal investigation.”2 “The government filed its first geofence search warrant in 2016, and by the end of 2019, Google was receiving about 180 search warrant requests per week from law enforcement officials across the country. . . . Between 2018 and 2020, Google received about 20,000 geofence warrant requests for data, including over 11,500 in 2020 alone.”3 * * * Daniel Meza and Walter Meneses were identified as suspects in the murder of Adbadalla Thabet after a geofence search warrant directed to Google revealed cell phones signed in to Google accounts connected to them were in several of the same locations as Thabet on the day of his murder. After their motions to quash and suppress evidence were denied, Meza pleaded guilty to first degree murder; and Meneses pleaded no contest to second degree murder. On appeal Meza and Meneses contend the trial court erred in denying their motion to suppress, arguing the geofence 2 SecureMac, What Are Geofence Warrants? (Sept. 8, 2020) [as of April 13, 2023], archived at . 3 Owsley, The Best Offense Is A Good Defense: Fourth Amendment Implications of Geofence Warrants (2022) 50 Hofstra L.Rev. 829, 834; see also Brief of Amicus Curiae Google LLC in Support of Neither Party, filed December 20, 2019 in United States v. Chatrie (E.D.Va. 2019, No. 3:19-cr-00130-MHL) (Google Amicus Brief) (“Google has observed over a 1,500% increase in the number of geofence requests it received in 2018 compared to 2017; and to date, the rate has increased over 500% from 2018 to 2019”). 3 warrant violated their rights under the Fourth and Fourteenth Amendments to the United States Constitution and did not comply with the California Electronic Communications Privacy Act of 2016 (Pen. Code, § 1546 et seq.)4 (CalECPA). Although the geofence warrant satisfied the requirements of CalECPA, we agree it lacked the particularity required by the Fourth Amendment and was impermissibly overbroad. Nonetheless, we affirm Meza’s and Meneses’s convictions under the good faith exception to the exclusionary rule established by United States v. Leon (1984) 468 U.S. 897 (Leon). FACTUAL AND PROCEDURAL BACKGROUND 1. The Murder of Adbadalla Thabet and the Initial Investigation According to surveillance footage viewed by police officers, at approximately 10:30 a.m. on March 1, 2019 Thabet drove into the parking lot of a bank in Paramount, followed by a gray sedan and a red sedan.5 The driver of the red car parked, got out of his vehicle and walked to the gray car, where he stopped to speak to the driver of the gray car. The driver of the gray car then drove slowly toward Thabet’s parked car. The driver of the red car followed on foot. As Thabet got out of his vehicle, the gray car pulled up next to Thabet’s car; and an occupant of the gray car shot Thabet in the torso. Thabet fell to the ground as the gray car sped away. The driver of the red car approached Thabet, took his backpack, retreated to the red car and drove away. Thabet died from his injuries. 4 Statutory references are to this code. 5 Our factual summary is based on the preliminary hearing transcript and the search warrant affidavit. 4 The investigating officers were able to retrace Thabet’s steps from the morning of the shooting. They learned Thabet worked for his uncle’s business, which included managing several gas stations. Twice per week Thabet picked up cash receipts from the gas stations and deposited the cash at the bank in Paramount. The day of the shooting Thabet left his apartment building in Downey around 7:00 a.m. and drove to a gas station in Downey to pick up cash for deposit. Thabet was at the Downey gas station from approximately 7:15 a.m. to 7:30 a.m. Thabet then met his brother-in-law at approximately 9:00 a.m. at a gas station in Bellflower. Thabet and his brother-in-law departed the gas station in separate cars at approximately 9:40 a.m. and drove to a strip mall in Compton where the brother-in-law was contemplating renting retail space. Thabet left the strip mall alone, driving to a gas station in Lynwood to pick up cash receipts. From Lynwood Thabet drove to the bank in Paramount where he was killed. In addition to the video surveillance from the bank parking lot, investigators obtained video surveillance from other locations Thabet visited that morning. The gray and red vehicles from the bank surveillance footage were also identified in surveillance footage from at least two of those additional locations. Investigators concluded the suspects had been following Thabet, anticipating his arrival at the bank with the cash deposits. The license plate numbers of the gray and red vehicles were not legible in any of the footage. 2. The Search Warrant Affidavit a. Probable cause Los Angeles County Sheriff’s Detective Jonathan Bailey applied for a search warrant directing Google to identify 5 individuals whose location history data indicated they were in the vicinity of the six locations visited by Thabet on March 1, 2019. In an affidavit supporting the application, Bailey described Thabet’s murder as seen on the surveillance footage of the bank parking lot. Bailey stated he had viewed surveillance camera footage from several of the other locations Thabet had visited that morning and had seen the gray and red sedans in the footage. Bailey did not state how many of the six locations had available surveillance footage, nor did he identify the locations at which the red and gray cars were visible. The affidavit included a brief overview of how Google tracks and stores location history data, stating Google collected data through “Global Position System (GPS) data, cell site/cell tower information, Bluetooth connections, and Wi-Fi access points.” Bailey stated, “I know most people in today’s society possess cellular phones and other items (e.g. tablets, watches, laptops) used to communicate electronically. . . . Most people carry cellular phones on their person and will carry them whenever they leave their place of residence.” In addition, Bailey explained, “Suspects involved in criminal activity will typically use cellular phones to communicate when multiple suspects are involved.” Therefore, Bailey concluded, identification of individuals in Thabet’s vicinity on the day of the murder would assist investigators in locating the drivers of the vehicles involved in the murder, who investigators believed had been following Thabet throughout the morning. b. Search parameters The warrant application sought location history data for individuals within six target locations. The first location was Thabet’s apartment, which was located in the middle of a large 6 city block, surrounded by both residential and retail buildings. The area designated for the search was a circle with a radius of 100 meters from the center of the apartment complex (approximately seven and a half acres). It included the entire apartment building as well as portions of several surrounding buildings and approximately three-quarters of the street in front of the building. The timeframe for this search was 6:00 a.m. to 7:15 a.m. on March 1, 2019. The second location was the gas station in Downey where Thabet picked up cash for deposit. The gas station is on the corner of a large intersection and is surrounded by other retail establishments. The search area consisted of a circle with a radius of 75 meters from the approximate center of the gas station (more than four acres). Included in the circle were the gas station, a restaurant and portions of other businesses, as well as the intersection in front of the gas station and the two main streets bordering the gas station. The timeframe for this search was 7:00 a.m. to 7:30 a.m. on March 1, 2019. The third location was the gas station in Bellflower. The search area consisted of a circle with a radius of 50 meters from the approximate center of the gas station (almost two acres). Included in the circle were part of the intersection and approximately 50 meters of the streets bordering the gas station, as well as portions of the surrounding businesses. The timeframe for this search was 7:30 a.m. to 9:40 a.m. The fourth location was the strip mall in Compton. The search area was a rectangle that included the strip mall, three streets bordering it and some neighboring buildings and parking lots (approximately one and one-half acres). The timeframe for this search was 9:40 a.m. to 10:15 a.m. 7 The fifth location was the gas station in Lynwood. The search area was a rectangle that included the gas station, neighboring buildings, including buildings across the street that appeared to be residences and the intersection bordering the gas station (approximately three acres). The timeframe for this search was 10:15 a.m. to 10:30 a.m. The sixth and final location was the bank in Paramount where the murder took place. The search area was a circle with a radius of 75 meters from the center of the bank building (more than four acres). The search area included the bank and parking lot, neighboring businesses and parking lots, the intersection in front of the bank and approximately 50 meters of the streets bordering the bank. c. The warrant process The warrant set forth a three-step process by which Google would respond to the request for information. At step one, Google was directed to search location history data for the six designated locations and times and produce an anonymized list of devices found within the search areas in the designated timeframes, including the individual times each device was recorded in the search area during the applicable time period. At step two, law enforcement would review the anonymized list of devices “to remove devices that are not relevant to the investigation, for example, devices that were not in the location for a sufficient period of time.” If law enforcement believed additional information was needed to determine whether a particular device was relevant to the investigation, law enforcement could request that Google provide additional location history information for that device even if that information fell outside of the initial geographic and temporal search parameters. 8 At step three, law enforcement could demand identifying information from Google for all devices law enforcement deemed relevant to the investigation. The warrant directed Google to provide this identifying information without additional legal process. 3. Execution of the Search Warrant and Charges Against Meza and Meneses A Los Angeles superior court judge, acting as magistrate, signed the geofence search warrant on March 21, 2019. After reviewing the anonymized data provided by Google, the Sheriff’s Department sought identifying information for eight devices that had been in the relevant locations on March 1, 2019. Google provided corresponding email addresses to law enforcement. The Sheriff’s Department then drafted additional search warrants related to two of those email addresses, which eventually led to the identification of Meza and Meneses as suspects. In an information filed December 4, 2020 Meza and Meneses were charged with murder (Pen. Code, § 187, subd. (a)) with three special circumstances—murder for financial gain (§ 190.2, subd. (a)(1)), murder by means of lying in wait (§ 190.2, subd. (a)(15)) and intentionally discharging a firearm with intent to inflict death (§ 190.2, subd. (a)(21)). It was specially alleged as to the murder charge that a principal was armed with a rifle within the meaning of section 12022, subdivision (a)(2). The information included special firearm-use enhancement allegations as to Meza (§ 12022.53, subds. (b), (c) and (d)). Meneses was also charged with two counts of possession of a firearm by a felon (§ 29800, subd. (a)(1)), possession of an assault weapon (§ 30605, subd. (a)) and unlawful possession of 9 ammunition (§ 30305, subd. (a)(1)). Finally, the information specially alleged Meneses had suffered a prior serious felony conviction within the meaning of section 667, subdivision (a)(1). 4. The Motion To Quash and Suppress On March 18, 2021 Meza moved pursuant to section 1538.5 to quash the geofence warrant and suppress all evidence seized as a result of the warrant, including evidence seized pursuant to subsequent warrants and statements made by witnesses and other individuals. Meneses joined the motion. The motion contended Detective Bailey’s affidavit failed to establish probable cause and the geofence warrant lacked the particularity required by the Fourth Amendment. In a supplemental brief Meza and Meneses argued the geofence warrant did not comply with CalECPA because it did not adequately identify the target individuals or accounts and applications to be searched. A hearing on the motion was held on April 12, 2021. Spencer McInvaille, an expert on geolocation and mobile devices, testified on behalf of Meza and Meneses. McInvaille’s testimony was based on his training and experience, as well as his review of documents publicly filed by Google.6 6 One such document was the Google Amicus Brief filed in United States v. Chatrie (E.D.Va. 2022) 590 F.Supp.3d 901, which was admitted as an exhibit without objection at the hearing. McInvaille also considered two declarations of Google employees filed in United States v. Chatrie, which the superior court received into evidence without objection. These documents describe Google’s location data collection and storage procedures as well as its process for responding to warrants for location history data. 10 McInvaille explained Google’s location data is derived from several sources: GPS, Bluetooth signals, cellular network data and the strength of nearby WiFi networks.7 Google logs each device’s location hundreds of times each day—as often as every two minutes according to some estimates. (See United States v. Chatrie (E.D.Va. 2022) 590 F.Supp.3d 901, 908 & fn. 10 (Chatrie).) However, Google cannot pinpoint a user’s location with 100 percent accuracy. McInvaille stated the longitude and latitude recorded by Google as the device’s location is “not a physical actual location of the device. It’s just the estimate derived from the measurement that they took.” Thus, Google also reports a confidence interval, measured in meters, that indicates Google’s confidence in the location of the device. For example, a confidence interval of 15 meters indicates Google estimates the device is within a 15 meter radius of the given coordinates. The size of the confidence interval varies depending on the type of data from which the measurement was taken. 7 According to Google, a user must not only enable location tracking on his or her device but also must opt-in to having that location data saved. Specifically, Google “saves a record of the user’s travels only when the user opts into [location history] as a setting on her Google account, enables the ‘Location Reporting’ feature for at least one mobile device, enables the device-location setting on that mobile device, permits that device to share location data with Google, powers on and signs into her Google account on that device, and then travels with it.” (Google Amicus Brief, supra, at p. 8.) Nevertheless, some reports indicate Google can track a user’s location history even when the user has opted out of location reporting. (See In re Search of Information that Is Stored at the Premises Controlled by Google LLC (D.D.C. 2021) 579 F.Supp.3d 62, 70 & fn. 8.) 11 Google aims to estimate a device’s location with 68 percent accuracy—that is, there will be a 68 percent chance the user was actually within the circle created by the confidence interval. When responding to a geofence warrant, Google considers a device within the search parameter if the estimated location is within the search boundaries even if the confidence interval extends beyond the search boundaries. Similarly, a device with an estimated location outside the search boundaries will not be included in the search results even if the confidence interval extends within the search boundaries. Romy Haas, a crime analyst for the Sheriff’s Department, testified for the prosecution regarding the application for and execution of the geofence warrant in this case. Haas explained she typically consults with detectives prior to drafting a geofence warrant application and assists in establishing the geographic parameters and timeframes of the requested warrant. She had participated in drafting and processing returns on more than 50 geofence warrants by the time of the motion to suppress hearing in 2021, but at the time she assisted Detective Bailey with drafting the geofence warrant in this case in 2019 she had worked on only two other geofence warrants. Haas had participated in a number of trainings regarding location history data and geofence warrants, most of which took place after the warrant had been drafted in this case. The court directly questioned Haas regarding how she and Detective Bailey decided on the search parameters for the warrant. For the first location (Thabet’s apartment building), Haas testified the search radius of 100 meters from the center of the apartment building was selected so that it would capture the street in front of the building “in the event that [Thabet] was 12 being watched before he left.” Haas explained it was typical with early geofence warrants to draw a circle from a midpoint, but she noted a polygon “will help reduce the number of devices that will show up in the geofence.” For the second location, Haas testified the geofence perimeter was again drawn to capture the streets bordering the gas station “to see if . . . someone had been coming down those streets or parked on those streets if the—if someone was watching the victim at that location.” The perimeter for the third location was drawn to include the street on the north side of the gas station because there was surveillance video footage showing the suspect vehicles parked on that street. The perimeters for locations four and five were drawn as rectangles because Haas found using a circle captured too much area and would “encompass a bunch of devices that I didn’t feel would be necessary because they were in the outer neighborhood.” Instead, for location four she drew a rectangle that encompassed the area the victim visited inside the strip mall, and for location five the rectangle encompassed a parking lot across the street from the gas station where one of the suspect vehicles had been seen on surveillance video. Haas also testified regarding the warrant’s three-step process for Google’s production of data in response to the warrant. Haas explained the process was mandated by Google as the procedure that would most likely ensure Google’s compliance with a geofence warrant.8 However, the process was not strictly 8 See generally Chatrie, supra, 590 F.Supp.3d at page 914 (“[I]n 2018, Google held both internal discussions with its counsel and external discussions with law enforcement agencies, including the Computer Crime and Intellectual Property Section 13 followed in this case. Rather than produce an anonymized list of users found within the six geofence perimeters at step one, a Google employee called Haas and told her the strip mall location had produced “voluminous results.” Google requested Haas either shorten the timeframe or decrease the search area to reduce the number of responsive results. Haas testified she declined the request because “based on our careful consideration of the location and the timeframe involved, I didn’t think that would be fair to the case to do that. . . . I in discussion explained to [the Google employee] really what I was looking for based on the facts of the case. . . . I said I was looking to find devices that were [in] at least two or more of the geofence locations.” The Google representative responded she could filter the search and produce information for devices that were only in two or more of the specified locations at the applicable times. Haas agreed. Google produced a list of eight anonymized accounts that had been at two or more of the six locations at the relevant time periods. Of the eight accounts, one had been at four of the geofence locations, one at three locations and the remaining six had been at two locations. Haas requested, and Google produced, identification information for all eight accounts. Two of those of the United States Department of Justice (‘CCIPS’), to develop internal procedures on how to respond to geofence warrants. ‘To ensure privacy protections for Google users, . . . Google instituted a policy of objecting to any warrant that failed to include de[-]identification and narrowing measures.’ [Citation.] Seemingly developed as a result of Google’s collaboration with CCIPS, this de-identification and narrowing ‘protocol typically . . . entails a three-step process’”). 14 accounts (the ones that had been at three and four of the locations) ultimately led authorities to Meza and Meneses. 5. The Superior Court’s Denial of the Motions To Suppress The superior court found there was sufficient probable cause to support issuance of the geofence warrant. The fact that the two suspect cars were seen in multiple surveillance videos made it reasonably probable “that they were using their phones to communicate or to determine the location that they’re going to.” The court further found the warrant satisfied the particularity requirements of the United States Constitution and CalECPA. The court stated it was satisfied the boundaries of the search areas were based on the locations of the suspect vehicles as seen in the video footage and were not so broad as to unnecessarily include devices of uninvolved bystanders. Finally, the court ruled, even if the warrant had been defective, the officers were entitled to rely on it under the good faith exception of United States v. Leon (1984) 468 U.S. 897 (Leon). Accordingly, the court denied the motions to suppress. 6. The Pleas and Sentences Following denial of the motions to suppress evidence, Meza pleaded guilty to first degree murder and Meneses pleaded no contest to second degree murder. Pursuant to negotiated agreements the special circumstances and special allegations were stricken, and the remaining counts as to Meneses were dismissed. Meza was sentenced to an indeterminate state prison term of 25 years to life. Meneses was sentenced to an indeterminate state prison term of 15 years to life. 15 DISCUSSION 1. The Geofence Warrant Violated the Fourth Amendment a. Governing Law and Standard of Review The Fourth Amendment to the United States Constitution, applicable to the States by the Fourteenth Amendment, prohibits unreasonable searches and seizures and guarantees that “no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” (U.S. Const., 4th Amend.; see People v. Robinson (2010) 47 Cal.4th 1104, 1131; People v. Camacho (2000) 23 Cal.4th 824, 830-831.)9 9 Article I, section 13 of the California Constitution similarly provides, “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable seizures and searches may not be violated; and a warrant may not issue except on probable cause, supported by oath or affirmation, particularly describing the place to be searched and the persons and things to be seized.” Notwithstanding this separate warrant requirement in the California Constitution, pursuant to article I, section 28, subdivision (f)(2), of the state Constitution (the Truth-in- Evidence provision), “evidence sought to be introduced at a criminal trial is subject to suppression as the fruit of an unconstitutional search and seizure ‘only if exclusion is . . . mandated by the federal exclusionary rule applicable to evidence seized in violation of the Fourth Amendment [of the United States Constitution].’” (People v. Maikhio (2011) 51 Cal.4th 1074, 1089; accord, In re Lance W. (1985) 37 Cal.3d 873, 896.) This limitation on the suppression of unlawfully obtained evidence does not apply if the search violated state law and exclusion was authorized “by statute hereafter enacted by a two- 16 A search is presumptively reasonable, and thus in compliance with the Fourth Amendment, if supported by a warrant describing with particularity the thing or the place to be searched. (See People v. Weiss (1999) 20 Cal.4th 1073, 1082.) “‘The manifest purpose of this particularity requirement [is] to prevent general searches. By limiting the authorization to search to the specific areas and things for which there is probable cause to search, the requirement ensures that the search will be carefully tailored to its justifications, and will not take on the character of the wide-ranging exploratory searches the Framers intended to prohibit.’” (People v. Amador (2000) 24 Cal.4th 387, 392; accord, Maryland v. Garrison (1987) 480 U.S. 79, 84.) Accordingly, in determining the validity of a warrant, courts examine three main factors: probable cause, particularity and overbreadth.10 Probable cause will be found to support the thirds vote of the membership of each house of the Legislature.” (Cal. Const., art. I, § 28, subd. (f)(2).) 10 As a threshold matter no warrant is required if an individual has no reasonable expectation of privacy in the place or thing searched. (See People v. Camacho, supra, 23 Cal.4th at pp. 830-831.) As the Attorney General recognizes, the prosecutor did not argue this point in the trial court; and, thus, the issue is forfeited. (See People v. Nottoli (2011) 199 Cal.App.4th 531, 561 [“[s]ince the prosecutor failed, in opposing the suppression motion, to assert that Barry had no reasonable expectation of privacy in the vehicle or cell phone, the People have forfeited that issue on review of the suppression ruling”].) Nevertheless, the United States Supreme Court has suggested that an individual has a right to privacy regarding his or her current and historical location. (See Carpenter v. United States (2018) __ U.S. __, [138 S.Ct. 2206, 2219] [retrieval of wireless carrier cell tower data to determine suspect’s location “invaded [suspect’s] 17 issuance of a warrant if “‘the magistrate had a substantial basis for concluding a fair probability existed that a search would uncover wrongdoing.’” (People v. Westerfield (2019) 6 Cal.5th 632, 659-660; accord, People v. Miles (2020) 9 Cal.5th 513, 576; People v. Kraft (2000) 23 Cal.4th 978, 1040-1041; see Illinois v. Gates (1983) 462 U.S. 213, 238-239 (Gates).) “Particularity is the requirement that the warrant must clearly state what is sought.” (In re Grand Jury Subpoenas Dated Dec. 10, 1987 (9th Cir. 1991) 926 F.2d 847, 856.) To satisfy this requirement, “[c]omplete precision in describing the place to be searched is not required.” (People v. Amador, supra, 24 Cal.4th at p. 392; accord, People v. Minder (1996) 46 Cal.App.4th 1784, 1788.) “‘It is enough if the description is such that the officer with a search warrant can with reasonable effort ascertain and identify the place intended.’” (Amador, at p. 392; accord, Steele v. United States (1925) 267 U.S. 498, 503.) “Breadth deals with the requirement that the scope of the warrant be limited by the probable cause on which the warrant is based.” (In re Grand Jury Subpoenas Dated Dec. 10, 1987, supra, 926 F.2d at pp. 856-857.) This is distinct from the particularity requirement because it “prevents the magistrate from making a mistaken authorization to search for particular objects in the first instance, no matter how well the objects are described.” (United States v. Weber (9th Cir. 1990) 923 F.2d 1338, 1342 [although rules regarding particularity and overbreadth “serve the same ultimate purpose, they achieve the purpose in distinct ways”]; see reasonable expectation of privacy in the whole of his physical movements”]; Riley v. California (2014) 573 U.S. 373, 395-396 [citing location history data as one of the privacy interests implicated by search of a cell phone’s contents].) 18 also United States v. Purcell (2d Cir. 2020) 967 F.3d 159, 179 [“A warrant that comports with the particularity requirements may, however, be defective due to overbreadth. ‘[B]readth and particularity are related but distinct concepts’”].) “In reviewing the trial court’s suppression ruling, we defer to its factual findings if supported by substantial evidence. We independently assess the legal question of whether the challenged search or seizure satisfies the Fourth Amendment.” (People v. Brown (2015) 61 Cal.4th 968, 975; accord, People v. Eubanks (2011) 53 Cal.4th 110, 133.) b. The Search Warrant Was Supported by Probable Cause Meza and Meneses contend Detective Bailey’s assertion of probable cause in his affidavit was insufficient because “[t]here was absolutely no evidence that either suspect had, or was using, a phone or other device at any time during the relevant timeframe.” Accordingly, they argue, there was no basis for determining that searching cell phone location history would lead to the identity of potential suspects or the recovery of other evidence related to the murder. Probable cause does not require conclusive evidence that a search will uncover relevant evidence, only that “‘there is a fair probability that contraband or evidence of a crime will be found in a particular place.’” (People v. Kraft, supra, 23 Cal.4th at p. 1041; accord, Gates, supra, 462 U.S. at p. 238.) “‘“[S]ufficient probability, not certainty, is the touchstone of reasonableness under the Fourth Amendment.”’” (People v. Beck and Cruz (2019) 8 Cal.5th 548, 592; see also People v. Carrington (2009) 47 Cal.4th 145, 163 [“[t]he showing required in order to establish probable cause is less than a preponderance of the evidence or 19 even a prima facie case”].) In making this determination a magistrate may draw reasonable inferences about where evidence is likely to be found based on the nature of the evidence and the type of offense. (See Gates, at p. 240; People v. Sandlin (1991) 230 Cal.App.3d 1310, 1315.) It was reasonable for the magistrate to conclude the perpetrators were carrying cell phones the morning of the murder and used them in coordinating their movements. Not only did Detective Bailey opine, based on his training and experience, that criminal suspects use cell phones to coordinate criminal activity, but also such an inference was reasonable in today’s society, especially given the suspected movement of the individuals to various locations in separate vehicles. (See Riley v. California (2014) 573 U.S. 373, 385, 401 [cell phones “are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy”; “[c]ell phones have become important tools in facilitating coordination and communication among members of criminal enterprises”]; United States v. James (8th Cir. 2021) 3 F.4th 1102, 1105 [finding probable cause supported warrant for cell phone records “[e]ven if nobody knew for sure whether the robber actually possessed a cell phone, the judges were not required to check their common sense at the door and ignore the fact that most people ‘compulsively carry cell phones with them all the time’”].) c. The Search Warrant Lacked Sufficient Particularity As discussed, the “purpose of the ‘particularity’ requirement of the Fourth Amendment is to avoid general and exploratory searches by requiring a particular description of the items to be seized.” (People v. Bradford (1997) 15 Cal.4th 1229, 20 1296.) “However, a warrant ‘need only be reasonably specific’ [citation], and the ‘specificity required “varies depending on the circumstances of the case and the type of items involved.”’” (People v. Robinson, supra, 47 Cal.4th at p. 1132 [“particularity ‘is a flexible concept, reflecting the degree of detail available from the facts known to the affiant and presented to the issuing magistrate’”].) “‘[T]his requirement is held to be satisfied if the warrant imposes a meaningful restriction upon the objects to be seized.’” (People v. Frank (1985) 38 Cal.3d 711, 724.) In other words, “[t]he description in a search warrant must be sufficiently definite that the officer conducting the search ‘can, with reasonable effort ascertain and identify the place intended.’ [Citation.] Nothing should be left to the discretion of the officer.” (People v. Dumas (1973) 9 Cal.3d 871, 880; see also United States v. Blakeney (4th Cir. 2020) 949 F.3d 851, 863 [warrants met particularity requirement where they “describe the items to be seized with enough particularity to constrain the discretion of the executing officers and prevent a general search”]; United States v. Collins (9th Cir. 1987) 830 F.2d 145, 145-146 [warrant not sufficiently particular where it contained an incorrect address and imprecise description, resulting in search of the wrong house].) The warrant in this case sufficiently described the place to be searched (Google’s database of users’ location history) and the items to be retrieved from that search (designated records for users found within the boundaries of certain coordinates at certain times). Indeed, Mesa and Meneses do not argue there was any ambiguity in the warrant that would lead law enforcement or Google personnel to search an incorrect database 21 or to identify individuals not contemplated by the text of the warrant. However, the warrant here failed to meet the particularity requirement because it provided law enforcement with unbridled discretion regarding whether or how to narrow the initial list of users identified by Google. Once the step one search had been conducted, law enforcement officials were able to enlarge the geographic parameters of the search and request additional information on any of the potentially thousands of users identified without any objective criteria limiting their discretion. Again, at step three law enforcement could seek identifying information of any of the users found within the search parameters without restriction on how many users could be identified or any further showing that information concerning each individual user would be relevant to the case. This failure to place any meaningful restriction on the discretion of law enforcement officers to determine which accounts would be subject to further scrutiny or deanonymization renders the warrant invalid. (See Chatrie, supra, 590 F.Supp.3d at p. 934 [geofence warrant lacks requisite particularity because “Steps 2 and 3 of this warrant leave the executing officer with unbridled discretion and lack any semblance of objective criteria to guide how officers would narrow the lists of users”]; In re Search of: Info. Stored at Premises Controlled by Google (N.D.Ill. 2020) 481 F.Supp.3d 730, 754 (In re Google N.D.Ill) [denying geofence warrant application because “the warrant puts no limit on the government’s discretion to select the device IDs from which it may then derive identifying information from among the anonymized list of Google-connected devices that traversed the geofences”]; In re Search of Info. Stored at the Premises 22 Controlled by Google (Va.Cir.Ct., Feb. 24, 2022, KM-2022-79) 2022 Va.Cir. Lexis 12, at pp. *24-*25 [denying geofence warrant application that allowed police to “unilaterally . . . enlarge the Court-authorized search zone” and “unilaterally tell Google which cell phones it wants to unmask to obtain the owner’s personal information”].)11 d. The Search Warrant Was Overbroad In determining whether a warrant is overbroad courts consider “whether probable cause existed to seize all items of a category described in the warrant” and “whether the government could have described the items more particularly in light of the information available to it at the time the warrant issued.” (United States v. Shi (9th Cir. 2008) 525 F.3d 709, 731-732; see also People v. Hepner (1994) 21 Cal.App.4th 761, 778 [“overbreadth also hinges on whether a more precise description [of the items to be seized] was reasonably possible”]; People v. MacAvoy (1984) 162 Cal.App.3d 746, 754-755 [“[o]n its face, the warrant would allow the officers to search every part of the fraternity house; since probable cause existed to search 11 While not the only way to address unfettered law enforcement discretion at steps two and three, judicial oversight at those steps, not just prior to issuance of the warrant, would resolve many of the constitutional deficiencies discussed. (See, e.g., In re Search of Information that Is Stored at the Premises Controlled by Google LLC (D.D.C. 2021) 579 F.Supp.3d 62, 88-89 [granting geofence warrant application requiring law enforcement to seek second court authorization for additional information regarding anonymous users initially identified by Google; this process “eliminated law enforcement’s discretion at step two by requiring it to return to the Court and justify any device deanonymization”].) 23 appellant’s room only, the warrant, as a general rule, is void”]; Owens v. Lott (4th Cir. 2004) 372 F.3d 267, 276 [warrant authorizing search of “all persons” at certain location was valid “if the affidavit and information provided to the magistrate supply enough detailed information to establish probable cause to believe that all persons on the premises at the time of the search are involved in the criminal activity”]; In re Grand Jury Subpoenas Dated Dec. 10, 1987, supra, 926 F.2d at p. 857 [“the concept of breadth may be defined as the requirement that there be probable cause to seize the particular thing named in the warrant”].) The geofence warrant in this case ran afoul of both of these requirements. First, the warrant authorized the identification of any individual within six large search areas without any particularized probable cause as to each person or their location. For example, the first search location, the area around Thabet’s apartment complex, allowed law enforcement to obtain information on every individual in a seven-and-a-half-acre area over a 75 minute period in the early morning. The search area included Thabet’s entire apartment complex and surrounding buildings despite the lack of any evidence (or supported inference) that the suspects left their vehicles, let alone entered the apartment building. Given the early morning timeframe for the search, the warrant permitted identification of numerous individuals with no connection to the murder who were simply still at home. Indeed, for many of the search locations, the geographic boundaries incorporated more surface area where the suspects were not believed to have been present (inside buildings) than area where they were (adjacent roads and intersections). This overbreadth is even more pernicious given that individuals 24 (especially those near the perimeters of the search area) would be included in the warrant return despite an estimated 32 percent chance they were actually not within the search parameter at all. Second, law enforcement officials failed to draw the search boundaries as narrowly as they could have given the information available. For the first location Haas explained her goal was to capture the street in front of the apartment complex. Rather than draw a shape that would include only that targeted area, Haas used the center of the apartment building as a starting point for a circle large enough to incorporate the desired area. Haas implicitly conceded this method resulted in an overbroad search and no longer constituted best practices, explaining, “I feel that sometimes a polygon shape will help reduce the number of devices that will show up in the geofence. But a lot of circles in this type of shape [were] being used in the beginning to indicate the actual geofence.” The timeframes designated in the geofence warrant were also not narrowly tailored. The most striking example of this overbreadth was with location three, the Bellflower gas station where Thabet met his brother-in-law. According to preliminary hearing testimony, Thabet’s brother-in-law told police he met Thabet at the gas station at approximately 9:00 a.m. and they left at approximately 9:40 a.m. The warrant, however, directed Google to search the location for any devices present between 7:30 a.m. and 9:40 a.m. Even allowing for some uncertainty, there is no evidence Thabet or the suspects were at the gas station 90 minutes before the time that the brother-in-law recalled arriving. Given this was a gas station in a metropolitan area during normal commuting hours, there were likely many 25 devices travelling through the search area during that 90 minutes that were entirely unrelated to Thabet’s murder. Haas’s testimony there was surveillance footage from the Bellflower location showing one or both suspect cars parked on the street near the gas station constituted further evidence of the failure to narrow the parameters. The Sheriff’s Department presumably could have determined a far shorter time period during which the suspects were present based on a timestamp in the surveillance footage, but they failed to narrow the search accordingly. In fact, the evidence presented to the magistrate was devoid of any detail regarding the surveillance footage that would have supported a finding of probable cause for the particular search areas and times. Detective Bailey’s affidavit stated only that surveillance footage was available at “several locations” without identifying which locations had surveillance footage and which footage showed the suspects’ vehicles, let alone the precise location and time the suspects’ vehicles were seen. This information should have been used to more narrowly focus the search parameters. The failure to sufficiently narrow the search parameters potentially allowed a location-specific identification of thousands of individuals—likely a search within the ambit of the Fourth Amendment12— for whom no probable cause existed. While we 12 See Note, Geofence Warrants and the Fourth Amendment (2021) 134 Harv. L.Rev. 2508, 2510-2511 (whether geofence warrants are Fourth Amendment searches is an open question; “[o]n the one hand, the [Supreme] Court has recognized that, in certain circumstances, individuals have reasonable expectations of privacy in their location information”; “[o]n the other hand, there is a strong argument that the third party doctrine—which states that individuals have no reasonable expectation of privacy 26 recognize it may be impossible to eliminate the inclusion of all uninvolved individuals in a geofence warrant, it is the constitutionally imposed duty of the government to carefully tailor its search parameters to minimize infringement on the privacy rights of third parties. (See In re Search Warrant Application for Geofence Location Data Stored at Google Concerning Arson Investigation (N.D.Ill. 2020) 497 F.Supp.3d 345, 362 (In re Arson Investigation) [“[I]t is nearly impossible to pinpoint a search where only the perpetrator’s privacy interests are impacted. Similarly, in the geofence context, there is no way to exclude the possibility that at any given time a delivery truck may drop off a parcel within the geofence location. The proper line of inquiry is not whether a search of location data could impact even one uninvolved person’s privacy interest, but rather the reasonableness of the search, the probability of finding evidence at the location, and the particularity of the search request”]; In the Matter of the Search of Information Associated with the Facebook Account Identified by the Username Aaron.Alexis That Is Stored at Premises Controlled by Facebook, Inc. (D.D.C. 2013) 21 F.Supp.3d 1, 7 [rejecting “overly broad search and seizure warrant application directed to Facebook, at least in part because it unduly invaded the privacy of third parties”].) The warrant here, authorizing the search of more than 20 acres total over a cumulative period of more than five hours in residential and commercial areas did not meet this fundamental threshold requirement. in information they voluntarily provide to third parties—applies to these warrants” (fn. omitted)). 27 Other cases that have considered the validity of geofence warrants have also, almost uniformly, determined that such warrants are valid only if they are narrowly tailored to avoid unnecessary infringement on the privacy of uninvolved third parties. For example, in Chatrie a geofence warrant was issued directing Google to search a 17.5-acre area surrounding a bank where a robbery had occurred. The timeframe was for approximately 30 minutes prior to the robbery and 30 minutes after the robbery—a total of one hour. The district court noted the search area included a church and the search identified individuals “who may not have been remotely close enough to the Bank to participate in or witness the robbery.” (Chatrie, supra, 590 F.Supp.3d at p. 930.) The court found the warrant was overbroad because it failed to “include any facts to establish probable cause to collect such broad and intrusive data” from each individual within the search area. (Id., at p. 929;13 see also In re Search of Information That Is Stored at the Premises Controlled by Google, LLC (D.Kan. 2021) 542 F.Supp.3d 1153, 1158 (In re Google D.Kan.) [denying geofence warrant application because search area included two public streets and an uninvolved business with no explanation as to why suspects might be found in those locations and contained no justification for the time period requested]; In re Google N.D.Ill, supra, 481 F.Supp.3d at p. 757 [denying geofence warrant application because search area included unrelated business, public street, residential units and parking lot during 90 minute period despite 13 Despite finding the geofence warrant invalid the Chatrie court ultimately denied the defendant’s motion to suppress based on the good faith exception of Leon, supra, 468 U.S. 897. 28 no showing all individuals in those locations were involved in the offense].) An example at the other end of the spectrum is In re Google D.D.C., supra, 579 F.Supp.3d 62. In that case, police were investigating criminal activity at a business located in an industrial area. Police obtained surveillance footage from inside the business showing the suspects engaging in criminal activity. Based on the precise locations of the suspects and the times depicted in the footage, police designated a geofence area of less than a quarter of an acre, including the front-half of the business and the parking lot but excluding another business in the building and the road bordering the building. The time period in the warrant totaled 185 minutes in increments of two to 27 minutes on 8 different days based on when police knew the suspects had been present. The warrant affidavit also explained that, during the designated time periods, the suspects were either alone inside the business or were in the proximity of “‘on average’ no more than 2 or 3 others.” (Id. at p. 73.) The magistrate judge granted the warrant application, finding the government had “appropriately contoured the temporal and geographic windows in which it is seeking location data” and the warrant did not “have the potential of sweeping up the location data of a substantial number of uninvolved persons.” (Id. at pp. 80 & 85; see also In re Arson Investigation, supra, 497 F.Supp.3d at p. 353 [granting geofence warrant application where search area excluded residences and commercial buildings, time periods sought were approximately 15 to 30 minutes per location and there was evidence premises in search areas were unoccupied during relevant time periods; “the government has structured the geofence zones to minimize the potential for 29 capturing location data for uninvolved individuals and maximize the potential for capturing location data for suspects and witnesses”]; United States v. Rhine (D.D.C. Jan. 24, 2023, No. 21- 0687) 2023 U.S.Dist. Lexis 12308, at pp. *95-*103 [denying motion to suppress where geofence warrant had sought identification of individuals in the United States Capitol Building over a four and a half hour period on January 6, 2021; court found warrant was narrowly tailored to include individuals improperly inside the Capitol given that the building was closed to the public and the search area excluded nearby grounds, did not include any commercial businesses or residences and there had been substantial road closures during the relevant time period].) 2. The Officers Reasonably Relied on the Geofence Warrant in Good Faith “In Leon, the [United States] Supreme Court held that when ‘an officer acting with objective good faith has obtained a search warrant from a judge or magistrate and acted within its scope,’ the ‘marginal or nonexistent benefits’ produced by suppressing the evidence obtained ‘cannot justify the substantial costs of exclusion.’” (People v. Lazarus (2015) 238 Cal.App.4th 734, 766, quoting Leon, supra, 468 U.S. at pp. 920-922.) Accordingly, denial of the motion to suppress must be upheld under the “good faith” exception to the exclusionary rule where a search has been conducted “in objectively reasonable reliance on a subsequently invalidated search warrant.” (Leon, at p. 922.) Leon set forth four scenarios in which such objectively reasonable reliance should not be found and suppression remained the appropriate remedy: (1) “[T[he magistrate or judge in issuing a warrant was misled by information in an affidavit that the 30 affiant knew was false or would have known was false except for his reckless disregard of the truth”; (2) if “the issuing magistrate wholly abandoned his [or her] judicial role”; (3) the affidavit is “‘so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable’”; or (4) if the warrant was “so facially deficient—i.e., in failing to particularize the place to be searched or the things to be seized—that the executing officers cannot reasonably presume it to be valid.” (Id. at p. 923.) The government bears the burden to establish applicability of the good faith exception. (People v. Willis (2002) 28 Cal.4th 22, 36- 37.) Meza and Meneses argue both the third and fourth Leon scenarios—a total lack of probable cause and an obvious failure to satisfy the requirement of particularity—apply here. As discussed, probable cause supported issuance of the warrant. This factor does not preclude application of the good faith exception. In determining whether the warrant was so facially deficient that the executing officers could not have reasonably presumed it to be valid, “we apply the objective test of ‘whether a reasonably well trained officer would have known that the search was illegal despite the magistrate’s authorization.’” (People v. Hochanadel (2009) 176 Cal.App.4th 997, 1015; see also People v. Camarella (1991) 54 Cal.3d 592, 605.) “This objective standard ‘requires officers to have a reasonable knowledge of what the law prohibits.’” (People v. Gotfried (2003) 107 Cal.App.4th 254, 265.) That standard was not met here. At the time law enforcement officers sought and executed the search warrant, geofence warrants were still a novel investigative tool. The warrant was only the third prepared by Haas, and she had not 31 yet had much of the training on the practice that she would eventually receive. In early 2019 when this warrant was drafted and executed, there were no published cases anywhere in the country, let alone in California, analyzing the constitutionality of geofence warrants. (See Chatrie, supra, 590 F.Supp.3d at p. 938 [when warrant was obtained in June 2019, “no court had yet ruled on the legality” of geofence warrants]; In re Search of: Information Stored at Premises Controlled by Google (N.D.Ill. July 8, 2020, No. 20 M 297) 2020 U.S.Dist. Lexis 165185, at p. *9 [noting no controlling authority addressing constitutional validity of geofence warrants].) Furthermore, as the preceding analysis demonstrates, “the permissibility of geofence warrants is a complex topic, requiring a detailed, nuanced understanding and application of Fourth Amendment principles.” (Chatrie, at p. 938.) Meza and Meneses argue the good faith exception should not apply here because, instead of following the three steps described in the warrant, “Haas and Bailey disregarded the express terms set forth in the warrant, and essentially fashioned their own search warrant.” While officers may not rely on the good faith exception when they have knowingly exceeded the scope of a warrant (see Leon, supra, 468 U.S. at p. 918, fn. 19 [the good faith exception “assumes, of course, that the officers properly executed the warrant and searched only those places and for those objects that it was reasonable to believe were covered by the warrant”]; see also People v. Nguyen (2017) 12 Cal.App.5th 574, 586-587), the manner of execution in this case (Google’s filtering of the results at step one) narrowed, not expanded, the search authorized by the warrant. Rather than receiving a list of many thousands of anonymized devices from 32 Google that could then be filtered and matched, law enforcement received only information about eight specific devices—as if only two rooms of a house were searched pursuant to a warrant that authorized searching the entire property. Given the dearth of authority directly on point and the novelty of the particular surveillance technique at issue, the officers were not objectively unreasonable in believing the warrant was valid, even if the issue, upon close legal examination, is not a particularly close one. (See People v. Rowland (2022) 82 Cal.App.5th 1099, 1124 [applying good faith exception where no California precedent existed on the issue]; People v. Pressey (2002) 102 Cal.App.4th 1178, 1191 [same]; see also United States v. Smith (N.D.Miss. Feb. 10, 2023, No. 3:21-cr- 107-SA) 2023 U.S.Dist. Lexis 22944, at pp. *37-*38 [applying good faith exception to geofence warrant given lack of legal authority on the issue]; Chatrie, supra, 590 F.Supp.3d at p. 938 [same].)14 3. The Geofence Warrant Did Not Violate CalECPA Effective January 1, 2016, CalECPA requires law enforcement officials to obtain a warrant in order to compel production of electronic communication information and 14 Meza and Meneses attempt to distinguish Chatrie because in that case the detective sought advice from prosecutors before applying for the geofence warrant. While such a practice is certainly prudent when dealing with a novel search technique and a lack of legal authority, we cannot say in this particular instance the failure to do so rendered law enforcement’s reliance on the warrant objectively unreasonable. 33 electronic device information from a service provider.15 (§ 1546.1, subd. (b).) Covered information includes “information stored on or generated through the operation of an electronic device, including the current and prior locations of the device.” (§ 1546, subd. (g).) Any warrant issued pursuant to CalECPA “shall describe with particularity the information to be seized by specifying, as appropriate and reasonable, . . . the target individuals or accounts” and “the applications or services covered.” (§ 1546.1, subd. (d)(1).) A party “may move to suppress any electronic information obtained or retained in violation of the Fourth Amendment to the United States Constitution or of this chapter.” (§ 1546.4, subd. (a).)16 Meza and Meneses first argue the geofence warrant in this case violated CalECPA because it “fails to specifically target individuals or accounts. No individual’s name was included in the warrant, nor was any specific cell phone number, email address, or account information.” Their argument ignores the 15 Prior to passage of CalECPA, California law did not require law enforcement officials to obtain a warrant to access most electronic information. Proponents of CalECPA sought to update the law for “the digital age” and “properly safeguard the robust constitutional privacy and free speech rights of Californians, spur innovation, and support public safety by instituting clear warrant standards for government access to electronic information.” (Sen. Com. on Public Safety, Analysis of Sen. Bill No. 178 (2015-2016 Reg. Sess.) Mar. 24, 2015; see also Freiwald, At the Privacy Vanguard: California’s Electronic Communications Privacy Act (CalECPA) (2018) 33 Berkeley Tech. L.J. 131, 143-147.) 16 Senate Bill No. 178 (Stats. 2015, ch. 651) was adopted by a greater-than-two-thirds vote by both the state Senate and Assembly. See foonote 9, above. 34 plain language of the statute, which provides that a warrant shall describe with particularity the information to be seized “as appropriate and reasonable.” (§ 1546.1, subd. (d)(1).) The warrant in this case described the target individuals and accounts with the greatest degree of particularity available to investigators—individuals whose devices were located within the search boundaries at certain times. There is no requirement in the statute that a suspect’s name or other identifying information be included in the warrant to ensure its validity. In fact, CalECPA specifically contemplates a scenario where there is “no identified target of a warrant” and provides that, in such an instance, because notice of the warrant cannot be served upon any individual, the law enforcement agency seeking the warrant must notify the California Department of Justice. (§ 1546.2, subd. (c).) Accordingly, the failure to specify an individual’s name or other identifying information did not render the warrant invalid under CalECPA. Meza and Meneses next argue the warrant violated CalECPA because it did not specify the “applications and services covered” by the warrant. CalECPA does not define “applications and services”; and Meza and Meneses have not explained what they believe it means, what particular information they contend should have been included in the warrant, or how the warrant was ambiguous absent such unspecified information. The common sense meaning of the statute appears to be that, when law enforcement seeks to recover the content of electronic communications, such as emails or text messages, the warrant must specify, as appropriate and reasonable, the particular mail or text message applications and services from which law enforcement seeks to retrieve information. With a geofence 35 warrant, however, the government is not seeking data or content related to a particular application or service. Rather, what is sought is the service provider’s record of all electronic contact with that device, regardless of which applications or services originated the contact. Accordingly, the failure to name a particular application or service in this instance does not result in a violation of CalECPA. Finally, Meza and Meneses argue any constitutional infirmities in the warrant create an independent violation of CalECPA.17 Meza and Meneses do not explain precisely how a constitutional violation is also a statutory violation. However, it appears they rely on CalECPA’s requirement that a warrant must comply with all “provisions of California and federal law” (§ 1546.1, subd. (d)(3)) and its grant of standing to “any person” to “move to suppress any electronic information obtained or retained in violation of the Fourth Amendment to the United States Constitution or of this chapter” (§ 1546.4, subd. (a)). Those provisions do nothing more than expressly preserve an individual’s existing rights under the federal Constitution. There is nothing in the cited language that, without more, converts a Fourth Amendment violation into a statutory violation. 17 Establishing an independent CalECPA violation in addition to a Fourth Amendment violation is crucial to Meza and Meneses’s position because they contend the Leon good faith exception is not applicable to a CalECPA violation. We need not address that issue. 36 DISPOSITION The judgments are affirmed. PERLUSS, P. J. We concur: SEGAL, J. FEUER, J. 37 Filed 8/16/23 Court of Appeal, Second Appellate District, Division Seven - No. B318310 S280089 IN THE SUPREME COURT OF CALIFORNIA En Banc ________________________________________________________________________ THE PEOPLE, Plaintiff and Respondent, v. DANIEL MEZA et al., Defendants and Appellants. ________________________________________________________________________ Defendant Meneses’s motion to join defendant Meza’s petition for review is granted. The petitions for review are denied. Liu and Evans, JJ., are of the opinion the petition should be granted. (See Dissenting Statement by Liu, J.) ____________/s/__________________ Chief Justice PEOPLE v. MEZA S280089 Dissenting Statement by Justice Liu The Electronic Communications Privacy Act (CalECPA; Pen. Code, § 1546 et seq.) governs law enforcement’s ability to “compel the production of or access to electronic communication information from a service provider.” (Id., § 1546.1, subd. (b).) “Any warrant for electronic information” must meet certain requirements: it must “describe with particularity the information to be seized” and “require that any information obtained . . . that is unrelated to the objective of the warrant shall be sealed.” (Id., § 1546.1, subd. (d)(1), (2)). In addition, the warrant must “comply with all other provisions of California and federal law, including any provisions prohibiting, limiting, or imposing additional requirements on the use of search warrants.” (Id., § 1546.1, subd. (d)(3).) Here, law enforcement used a geofence warrant — a “ ‘ “reverse location search[]” ’ ” request — to access device location data gathered by Google. (People v. Meza (2023) 90 Cal.App.5th 520, 525 (Meza).) The warrant directed Google to search certain location history data, produce an anonymized list of devices, and turn over identifying information for devices that law enforcement deemed relevant to the investigation. (Id. at pp. 529–530.) This led to the identification of defendants Daniel Meza and Walter Meneses, whose cell phones, while “signed in to Google accounts connected to them[,] were in several of the same locations” as the victim. (Id. at p. 526.) Meza and Meneses challenge the warrant and admission of the resulting evidence 1 PEOPLE v. MEZA Liu, J., dissenting statement upon denial of review under the Fourth Amendment to the United States Constitution and CalECPA. The Court of Appeal concluded the geofence warrant violated the Fourth Amendment because it “lacked the particularity required by the Fourth Amendment and was impermissibly overbroad.” (Meza, supra, 90 Cal.App.5th at p. 526.) It then held that the warrant did not violate CalECPA, rejecting an argument that the “constitutional infirmities in the warrant create an independent violation” of the statute. (Meza, at p. 546.) The Court of Appeal’s analysis was minimal. It reasoned that “nothing in the [statutory] language . . . , without more, converts a Fourth Amendment violation into a statutory violation.” (Ibid.) It is not apparent what “more” is necessary here. Penal Code section 1546.1, subdivision (d)(3) requires all warrants to comply with “all other provisions of California and federal law,” which includes the Fourth Amendment. CalECPA’s incorporation of the Fourth Amendment’s requirements seems unambiguous: a warrant that violates federal law also violates CalECPA. Consistent with this reading, the statute’s remedy provision specifically references Fourth Amendment violations: “Any person in a trial, hearing, or proceeding may move to suppress any electronic information obtained or retained in violation of the Fourth Amendment to the United States Constitution or of this chapter.” (Pen. Code, § 1546.4, subd. (a).) The Court of Appeal held that these “provisions do nothing more than expressly preserve an individual’s existing rights under the federal Constitution.” (Meza, supra, 90 Cal.App.5th at p. 546.) But there is no need for a state statute to “expressly preserve” federal rights. An individual can always 2 PEOPLE v. MEZA Liu, J., dissenting statement upon denial of review independently pursue a federal constitutional challenge, as Meza and Meneses did here. CalECPA did not purport to supplant the requirements of federal law; in fact, it would have been impermissible for the statute to do so. (See Sibron v. New York (1968) 392 U.S. 40, 60–61 [a state “is, of course, free to develop its own law of search and seizure to meet the needs of local law enforcement” but “may not . . . authorize police conduct which trenches upon Fourth Amendment rights”].) Interpreting these provisions as solely preserving existing federal rights appears to give them no effect. The consequences of this decision are potentially significant. Despite finding that the warrant violated the Fourth Amendment, the Court of Appeal declined to apply the exclusionary rule under the good faith exception of United States v. Leon (1984) 468 U.S. 897. (Meza, supra, 90 Cal.App.5th at p. 544.) It is not clear whether such an exception applies to violations of CalECPA, and there are plausible arguments on both sides of the question. (See Freiwald, At the Privacy Vanguard: California’s Electronic Communications Privacy Act (CalECPA) (2018) 33 Berkeley Tech. L.J. 131, 161 [“[T]he state procedures do not incorporate the expansive exceptions that courts have used to deny suppression remedies in Fourth Amendment cases under the doctrine of good faith.”], fn. omitted; Meza, at p. 546, fn. 17 [declining to reach the question]; cf. People v. Jackson (2005) 129 Cal.App.4th 129, 153–160 [considering various factors in concluding that the good faith exception does not apply to evidence gathered in violation of California’s wiretap law].) If the exception does not apply, then the identifying evidence would be suppressed under CalECPA, thus affecting the validity of Meza’s and Meneses’s convictions. 3 PEOPLE v. MEZA Liu, J., dissenting statement upon denial of review CalECPA is a “significant” statute that made “the law governing access to electronic communications by law enforcement in California . . . much more protective of communications privacy.” (Freiwald, supra, 33 Berkeley Tech. L.J. at p. 133.) Because I find questionable the Court of Appeal’s interpretation of this important state law, and because of the practical importance of the issue, I would grant review. LIU, J. I Concur: EVANS, J. 4