People v. Petrovic

224 Cal. App. 4th 1510, 169 Cal. Rptr. 3d 648, 2014 WL 1244353, 2014 Cal. App. LEXIS 281
CourtCalifornia Court of Appeal
DecidedMarch 26, 2014
DocketB246250
StatusPublished
Cited by3 cases

This text of 224 Cal. App. 4th 1510 (People v. Petrovic) is published on Counsel Stack Legal Research, covering California Court of Appeal primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
People v. Petrovic, 224 Cal. App. 4th 1510, 169 Cal. Rptr. 3d 648, 2014 WL 1244353, 2014 Cal. App. LEXIS 281 (Cal. Ct. App. 2014).

Opinion

*1512 Opinion

GILBERT, P. J.

Defendant Zoran Petrovic appeals a judgment following Ms felony conviction of possession or control of child pornography with a prior conviction for child molestation. (Pen. Code, § 311.11, subd. (b).) 1

Petrovic relies on a dictum in Tecklenburg v. Appellate Division (2009) 169 Cal.App.4th 1402 [87 Cal.Rptr.3d 460] to argue that section 311.11 is to be interpreted the same way that U.S. v. Kuchinski (9th Cir. 2006) 469 F.3d 853 interprets a federal child pornography statute (18 U.S.C. § 2252A'(a)(5)(B)). We do not do so because the federal and state statutes are different and subject to different interpretations. However tantalizing, a dictum is not a holding. We affirm.

FACTS

Petrovic was arrested for a parole violation because he was loitering in a park. He suffered a prior conviction for committing a lewd act on a child. A parole condition prohibited him from “possessing or having access to any explicit pictures, video tapes or movies” that showed children engaged “in sexual acts.”

Petrovic’s parole agent told Mm she would conduct a forensic review of his computer to determine Ms compliance with parole conditions. Petrovic said, “You’ll find nothing on it,” and “I am the oMy one who uses it.” The parole agent asked if he uses the Internet. He responded, “I do not have access.” The forensic review revealed that he had viewed child pornography on Ms computer.

At trial, the prosecution and defense stipulated to the introduction of a forensic report by Jeff Joynt, a computer expert who had examined Petrovic’s computer. Joynt found “19 videos in a temporary folder” on the computer. He watched “several [of] these videos” and determined “they contain child pornography.” Joynt said Petrovic “used sopMsticate[d] means to Mde his Internet Mstory” and used “software programs to delete and hide files.” Petrovic had a “virus protection program,” but there was no evidence of any viruses on his computer.

Joynt said, “The video files [he] located in the Temp File were likely left there by mistake when [Petrovic] was transferring them to another location.” *1513 The evidence of child pornographic material was discovered in “temporary Internet files” (TIP). Joynt said, “It is my belief these temporary files were created when the suspect was accessing the Internet. . . . [Petrovic] neglected to delete the temporary file or did not even know it was created so he could delete it.” Joynt determined that on one day Petrovic went to the same child pornography Web site “on three separate occasions.”

In a parole report admitted into evidence, Petrovic’s parole agent said she reviewed the videos “and observed several that displayed young girls exposing their genitals, a young girl performing oral copulation, and a male.adult vaginally penetrating what appears to be an infant.”

Petrovic’s trial counsel stipulated that there were three videos “that would be considered prohibitive material under [section] 311.11.” But he claimed the images “were located in a temporary file as opposed to something that was saved directly on the hard drive.” Petrovic argues he did not know that his computer had the capability to save files in this fashion.

The trial court found Petrovic violated the statute because Petrovic’s past history “strongly indicates an interest in prepubescent children”; Petrovic admitted it was his computer and that no other person had access to it; and he had a “unique” computer “deletion program” to erase his Internet browser history. The court said, “I believe it is a reasonable inference that he said you won’t find anything because he didn’t think they’d be able to, not because he didn’t know it was there.”

DISCUSSION

Section 311.11

Petrovic contends there is no evidence to support a finding that he knowingly possessed or controlled child pornography on his computer. He claims the evidence shows only that he used his computer to visit child pornography Web sites. He argues such conduct is not a crime under section 311.11.

Section 311.11, subdivision (a) provides, in relevant part, “Every person who knowingly possesses or controls any matter, representation of information, data, or image, including, but not limited to, any film, filmstrip, *1514 photograph, negative, slide, photocopy, videotape, video laser disc, computer hardware, computer software, computer floppy disc, data storage media, CD-ROM, or computer-generated equipment or any other computer-generated, image that contains or incorporates in any manner, any film or filmstrip, the production of which involves the use of a person under 18 years of age, knowing that the matter depicts a person under 18 years of age personally engaging in or simulating sexual conduct ... is guilty of a felony . . . .” (Italics added.)

Section 311.11 contains broad language to achieve a remedial purpose. “The statutory language reflects a far-reaching intent by the Legislature to cover both traditional means of displaying child pornography and the new era of Internet use in an effort to reduce the exploitation of children.” (Tecklenburg v. Appellate Division, supra, 169 Cal.App.4th at p. 1418.)

Petrovic concedes the evidence shows he viewed child pornography on the Internet, but claims there is no evidence he knowingly possessed or controlled the images found on his computer. He claims the data found by law enforcement came from TIF’s automatically saved by the computer’s “cache” system when he went to Web sites.

“Every time a Web page is accessed on the Internet by the computer, the computer automatically saves the material, without any affirmative action by the computer user, in a TIF.” (Tecklenburg v. Appellate Division, supra, 169 Cal.App.4th at p. 1407.) A cache is a computer “ ‘storage mechanism designed to speed up the loading of Internet displays.’ ” (Id. at p. 1407, fn. 7.) “When a computer user views a webpage, the web browser stores a copy of the page on the computer’s hard drive in a folder or directory. That folder is known as the cache, and the individual files within the cache are known as [TIF].” (Ibid.)

Kuchinski

Petrovic suggests we apply the standard Kuchinski used in its interpretation of title 18 of the United States Code section 2252A(a)(5)(B). (U.S. v. Kuchinski, supra, 469 F.3d 853.) If he did not know that the cache automatically stores visits to Web sites in a TIF, he could have a defense under the federal act. In Kuchinski,

Free access — add to your briefcase to read the full text and ask questions with AI

Related

People v. Armas CA4/1
California Court of Appeal, 2022
People v. Waters CA1/4
California Court of Appeal, 2015
People v. Shepherd CA5
California Court of Appeal, 2015

Cite This Page — Counsel Stack

Bluebook (online)
224 Cal. App. 4th 1510, 169 Cal. Rptr. 3d 648, 2014 WL 1244353, 2014 Cal. App. LEXIS 281, Counsel Stack Legal Research, https://law.counselstack.com/opinion/people-v-petrovic-calctapp-2014.