A jury convicted Kelli Marie Balint of receiving stolen property. (Pen. Code, § 496; all statutory references are to the Penal Code.) She contends officers exceeded the scope of a search warrant for her residence when they confiscated an open laptop computer under a warrant clause authorizing seizure of “any items tending to show dominion and control” of the premises searched. We agree with the trial court
I
Facts
Erin Fouche’s Compaq-brand laptop computer was stolen from her car in Irvine on October 30, 2002. Anaheim police officers executing a search warrant on November 25, 2002, found the computer on a living room sofa in Balint and John Stephens’s Anaheim residence. The computer was open and turned on, and had been used repeatedly between October 30 and November 25. It contained data identifying Fouche as the owner. Investigators found two additional laptop computers, a damaged WinBook on the floor near the couch, and a Toshiba in a bedroom closet. The serial numbers on the computers had been removed.
Balint, who was not present during the search, telephoned police shortly after the search and asked an investigator whether they planned to arrest her. She claimed the Compaq computer belonged to her, explaining that she purchased it from a “girl” for $200. Asked if it was stolen, she admitted she “thought it was possible,” but “didn’t want to know if it was stolen.” She thought the Toshiba was stolen but claimed she purchased the WinBook at a swap meet. In a subsequent interview, Balint added she purchased the Compaq at a Cypress swap meet three to six months before the search. She now claimed to have purchased the WinBook from a “girl” at “Amy’s” house in Westminster for less than $150.
Following a trial in July 2004, a jury convicted Balint of receiving stolen property. (§ 496.) She admitted she had previously served a prison term within the meaning of section 667.5, subdivision (b). The court imposed the two-year midterm and struck punishment on the section 667.5 enhancement.
II
Discussion
Balint argues investigating officers illegally seized the Compaq computer while executing the search warrant. She notes the warrant did not identify the Compaq computer, either in the “specifically enumerated” list of stolen property police could seize, or in the “encyclopedic list” of items demonstrating “dominion and control” of the residence. In other words, the seizure of the computer exceeded the scope of the warrant and amounted to a general search. We conclude investigators properly seized the computer pursuant to the warrant’s dominion and control clause.
A. Suppression Motion Facts
The parties stipulated to the following facts for purposes of the suppression motion. On November 4, 2002, Anaheim police officers arrested Michael Maydon and others for failing to pay their motel room bill. Officers found a black bag in Maydon’s room that contained three credit cards issued to Jessica Jaynes. Contacting Jaynes, officers learned her wallet containing the credit cards and other property had been stolen at another motel about a week earlier. She suspected her “ex-friends” Maydon and John Stephens had stolen the items while visiting her at the motel. Both men had used methamphetamine with her in the past. A convicted methamphetamine addict herself, Jaynes had not reported the theft and “was going to accept the loss as a lesson.”
The next day, Anaheim Detective Tim Schmidt interviewed Maydon in jail. Maydon
Schmidt learned Stephens previously had been convicted of assault and burglary. On November 14, Jaynes directed investigators to a house in Anaheim where she believed Stephens and Balint lived. Schmidt checked with the water utility company and learned Balint had an active account at the location. Schmidt also learned police had responded to a “disturbance” involving Stephens at an address Balint had formerly provided to the Department of Motor Vehicles.
On November 18, Schmidt obtained a search warrant for the residence based on the above information and his belief, drawn from training and experience, that thieves commonly retain stolen property in their homes to use or to exchange for drugs. The warrant directed officers to search Stephens and his residence for tangible items related to the Jaynes theft. In an attachment to the warrant, Schmidt provided a list of stolen property including Jaynes’s Toshiba laptop computer. The warrant also authorized the search for “[a]ny items tending to show dominion and control of the location . . . .’ 1
On November 25, Schmidt served the warrant on Stephens after detaining him at a gas station. Stephens said his girlfriend had left the house earlier and no one was home. Ten officers participated in the house search. Schmidt seized an open Compaq-brand laptop computer that was “opened up and sitting on the sofa in the family room.” He also seized other equipment and computers, including Jaynes’s Toshiba laptop, located on a shelf in a bedroom closet. Investigators seized other documents, including a September water bill in Balint’s name.
At the police station, Stephens claimed the Compaq laptop belonged to Balint. The Toshiba was not hers, but he declined to say whether it belonged to him. Schmidt spoke to Balint about the Compaq and subsequently obtained a second search warrant to have it forensically examined, which led investigators to Fouche.
Balint moved to suppress the Compaq computer as outside the scope of the first search warrant. She noted the computer was not specifically listed in the stolen property list and it was not “readily apparent” the computer was stolen or being used for illegal activity. The prosecutor countered “data ordinarily contained in a computer includes information identifying its owner. The search warrant specifically authorized seizure of such identifying information, which was important to establish who exercised dominion and control over the residence named in the search warrant.” 2
B. Standard of Review
The standard of appellate review of a trial court’s ruling on a motion to suppress is well established. We defer to the trial court’s express or implied factual findings if supported by substantial evidence, but independently apply constitutional principles to the trial court’s factual findings in determining the legality of the search. Where the facts are undisputed, as here, we independently determine the legality of the search under the Fourth Amendment.
(People v. Glaser
(1995)
C. Investigators Properly Seized the Compaq Computer Under the Dominion and Control Clause
The Fourth Amendment requires that a search warrant describe with particularity “the place to be searched, and the person or things to be seized.”
(U.S. Const., 4th Amend.) The particularity requirement precludes “a general, exploratory rummaging in a person’s belongings”
(Coolidge v. New Hampshire
(1971)
The dominion and control clause at issue here is a standard feature in search warrant practice. Houses and vehicles ordinarily contain evidence identifying those individuals occupying or controlling them. Evidence identifying those in control of premises where stolen property is found tends to aid in conviction of the guilty party. (See
Warden
v.
Hayden
(1967)
Courts have found sufficient particularity in dominion and control clauses similar to the one before us. (See
People v. Alcala
(1992)
Balint does not claim the dominion and control clause lacked sufficient particularity. Rather, she argues that the omission of a laptop computer from the detailed and extensive list of items in the dominion and control clause demonstrates a conscious decision by the affiant and issuing magistrate that a laptop computer would not provide evidence of occupancy over the residence. We disagree.
The scope of a warrant is determined by its language, reviewed under an objective standard without regard to the subjective intent of the issuing magistrate or the officers who secured or executed the warrant. (See
Whren
v.
United States
(1996)
Here, the warrant authorized seizure of
“any
items tending to show dominion and control, including [list of items].” (Italics added.) This language authorizes seizure of unenumerated items “tending to show dominion and control” of the premises. In other words, the itemized list following the word “including” may reasonably be interpreted as nonexclusive and merely descriptive of examples of items likely to show who occupied the residence. (Cf.
Ornelas
v.
Randolph
(1993)
This interpretation accounts for the different forms such evidence may take, while cabining the officers’ search to the principle articulated in the warrant, namely, the items seized must be reasonably expected
Gall
is particularly instructive concerning the seizure of laptop computers. In determining whether seizure of particular items exceeds the scope of the warrant, courts examine whether the items “are similar to, or the ‘functional equivalent’ of, items enumerated in the warrant, as well as containers in which they are reasonably likely to be found.”
(Gall, supra,
The Colorado Supreme Court first noted that police officers may search the location authorized by the warrant, including any “containers” at that location that are reasonably likely to contain items described in the warrant.
(Gall, supra,
Gall
concluded the laptop computers were reasonably likely to serve as containers for writings, or the functional equivalent
Persuaded by the foregoing analysis, we conclude the open laptop computer at issue here amounts to an electronic container capable of storing data similar in kind to the documents stored in an ordinary filing cabinet, and thus potentially within the scope of the warrant.
4
We perceive no reasonable basis to distinguish between records stored electronically on the laptop and documents placed in a filing cabinet or information stored in a microcassette. (See
United States v. Hargus
(10th Cir. 1999)
Balint argues that the information on a laptop computer, in contrast to an immobile desktop computer, might reveal ownership of the computer but not
information concerning ownership of the premises searched. We disagree. Many people use laptops as their primary computers and, in any event, a willingness to leave a mobile—and often expensive—device unattended in a residence suggests occupancy. Additionally, as the Attorney General points out, laptop computers are commonly used for personal correspondence, electronic payment of bills, and storing other information analogous to the examples listed in the warrant that are responsive to the dominion and control principle. Under the functional equivalency test, the fact these documents are in digital form does not bar officers from seizing the evidence. In particular, we note the police discovered the laptop computer in its “open” position, suggesting it was not merely stored on the premises. (See
Gall, supra,
Balint asserted at oral argument that the removal of the laptop from the residence and the subsequent procurement of a second warrant to search the laptop’s files demonstrates the officers understood
Finally, Balint complains that sanctioning the seizure here would authorize general warrants because virtually any item within a residence might have some identifying mark, such as a novel with a personal inscription or a certificate of ownership on the back of a painting. We are not called upon to decide whether these hypothetical cases would pass muster under a dominion and control clause that often varies depending on the location searched. Suffice it to say that an open laptop in plain view presents an obvious source of potentially responsive evidence that the officers here were not required to ignore. Accordingly, we conclude the trial court properly denied the motion to suppress. 5
III
Disposition
Judgment affirmed.
Sills, P. J., and O’Leary, J., concurred.
A petition for a rehearing was denied April 11, 2006, and appellant’s petition for review by the Supreme Court was denied June 21, 2006, S143008.
Notes
The complete clause reads: “Any items tending to show dominion and control of the location, including delivered mail, whether inside the location or in the mail box, utility bills, phone bills, rent receipts, safe deposit box keys and receipts, keys and receipts for rental storage space, keys and receipts for post office box or mail drop rentals, ignition keys, car door and truck keys, recordation of voice transmissions on telephone answering machines, audio tapes and phone message receipts books, and written phone messages, and photographs tending to show occupation of residence and connection between co-conspirators, whether identified or unidentified. And any examples of handwriting including letters, address books, business records, cancelled checks, notes and/or lists.”
The prosecution did not argue that investigators could seize the Compaq computer under the plain view doctrine. (See 2 LaFave, Search and Seizure (4th ed. 2004) § 4.11(b) & (d), pp. 782, 791-802 (LaFave), and cases cited [incriminating character of article seized must be immediately apparent, i.e., probable cause to believe the object is a fruit, instrumentality or evidence of a crime].)
Numerous courts have approved this procedure. (See, e.g.,
United States
v.
Schandl
(11th Cir. 1992)
We acknowledge computer technology may minimize governmental intrusion by limiting the search of computer files in ways not possible in a traditional document search. This is a separate inquiry from whether the laptop computer is likely to contain the information sought in the warrant, and is not raised in this appeal.
In light of our disposition, we need not address the Attorney General’s argument the good faith exception to the warrant requirement also justifies admission of the evidence.
(United States
v.
Leon
(1984)
