THE PEOPLE, Plaintiff and Respondent, v. KEVIN CHRISTOPHER BOLLAERT, Defendant and Appellant.
No. D067863
Court of Appeal, Fourth District, Division One, California
June 28, 2016
248 Cal. App. 4th 699
COUNSEL
Patrick J. Hennessey, Jr., under appointment by the Court of Appeal, for Defendant and Appellant.
Kamala D. Harris, Attorney General, Gerald A. Engler and Julie L. Garland, Assistant Attorneys General, Eric A. Swenson, Junichi P. Semitsu and Garrett A. Gorlitsky, Deputy Attorneys General, and Steven Taylor Oetting, Deputy Solicitor General, for Plaintiff and Respondent.
OPINION
O’ROURKE, J.—A jury convicted Kevin Christopher Bollaert of extortion (
Bollaert contends his convictions under
We conclude the evidence is sufficient to support Bollaert’s convictions for unlawful use of personal identifying information as well as extortion, and that the jury’s rejection of CDA immunity is likewise supported by evidence that Bollaert developed, at least in part, the offensive content on his Web site by requiring users to input private and personal information as a condition of posting the victims’ pictures, making him an information content provider within the meaning of the CDA. We further conclude Bollaert invited the claimed instructional error, but hold in any event that he has not shown error in the instructions as a whole. We affirm the judgment.
FACTUAL AND PROCEDURAL BACKGROUND4
In 2012, 2013 and 2014, a number of individuals discovered that photographs of themselves, including nude photographs, as well as their names, hometowns, and social media addresses, had been posted without their permission on a Web site, UGotPosted.com. Most of the pictures were taken by or for former significant others or friends.5 Some of the pictures the victims had taken on their own phones or placed on personal webpages for private viewing by themselves or select others. Some had been taken while the victim was drugged and in a compromised state or otherwise unaware of the photographing. Victims received harassing and vulgar messages from strangers. Many of the victims contacted the Web site administrator at UGotPosted.com to try to get their photographs and information removed, without success. One of the victims testified that when she tried to communicate with the UGotPosted.com contact, she reached a person named “James Smith,” not realizing it was Bollaert, who told her that to remove her photos she would have to provide two forms of identification and show an unspecified sign. The UGotPosted Web site contained a link to another Web site, ChangeMyReputation.com, where victims were told that, for payment of a specified amount of money, their pictures and information would be taken
Bollaert was the administrator and registered owner of the UGotPosted Web site. He created it with another person, Eric Chanson, who eventually declined to participate and transferred his interest to Bollaert. Bollaert was in control of the Web site, and he managed and maintained it; changed, added and deleted content; and updated software that operated the site. He designed the Web site so that he had to review the content before it was posted, and it had “required fields” by which a user who wanted to post pictures of another person had to input that other person’s full name, age, location (“city, state, country“) and Facebook link. Bollaert had the only user account on the computer; he looked at every single post that came through the Web site and decided what would get posted on it, placed watermarks on each photograph to discourage others from stealing the pictures, and accessed the site remotely. He kept a spreadsheet recording every single post. Bollaert would not post pictures that he deemed “garbage,” including pictures that did not include nude persons. He removed pictures of minors and some other content depending on the nature of the request. He moderated and approved the comments that were posted on the Web site, and edited the contents of the posts. At some point, Bollaert received about $800 or $900 in monthly income from advertising on the site. Bollaert felt the Web site was “kinda fun and entertaining” at the beginning, but he later took it down because it was causing him stress and “ruining his life.”
Bollaert also set up and managed the Web site ChangeMyReputation.com, to which individuals who had pictures posted on the UGotPosted.com site would be directed and told they could pay money to have the information removed. A Department of Justice forensic auditor determined that victims paid a total of $30,147.73, which eventually was forwarded to Bollaert’s personal PayPal account. Law enforcement later used Bollaert’s site to contact victims. At one point, a legal analyst with the Attorney General’s office created a user account and attempted to post pictures of her pet cats on the Web site, but they never appeared.
At trial, the People proceeded on the charges of unlawful use of personal identifying information (
DISCUSSION
I. Convictions for Unlawful Use of Personal Identifying Information (§ 530.5 )
Bollaert contends the evidence is insufficient to support his convictions under
A. Standard of Review
The principles governing sufficiency of the evidence claims are “clear and well settled.” (People v. Abilez (2007) 41 Cal.4th 472, 504 [61 Cal.Rptr.3d 526, 161 P.3d 58].) ” ‘The proper test . . . is whether, on the entire record, a rational trier of fact could find the defendant guilty beyond a reasonable doubt. [Citations.] On appeal, we must view the evidence in the light most favorable to the People and must presume in support of the judgment the existence of every fact the trier could reasonably deduce from the evidence.’ ” (People v. Perez (2010) 50 Cal.4th 222, 229 [112 Cal.Rptr.3d 310, 234 P.3d 557]; see People v. Rangel (2016) 62 Cal.4th 1192, 1212-1213 [200 Cal.Rptr.3d 265, 367 P.3d 649] [relevant question is ” ‘whether, after viewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt’ “].) ” ‘Circumstantial evidence may be sufficient to connect a defendant with the crime and to prove his guilt beyond a reasonable doubt.’ ” (People v. Abilez, supra, 41 Cal.4th at p. 504.) “If the circumstances reasonably justify the trier of fact’s findings, reversal of the judgment is not warranted simply because the circumstances might also reasonably be reconciled with a contrary finding.” (People v. Lindberg (2008) 45 Cal.4th 1, 27 [82 Cal.Rptr.3d 323, 190 P.3d 664].) We may reverse for lack of substantial evidence only if ” ‘upon no hypothesis whatever is there sufficient substantial evidence to support’ the jury’s verdict.” (People v. Zamudio (2008) 43 Cal.4th 327, 357 [75 Cal.Rptr.3d 289, 181 P.3d 105].)
B. Section 530.5 and CDA Immunity
In the CDA, Congress declared that “[n]o provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” (
C. The Evidence Demonstrates Bollaert Willfully Obtained the Victims’ Personal Identifying Information and Used It for an Unlawful Purpose
Before we reach the question of CDA immunity, we address Bollaert’s challenge to the evidence supporting the elements of
1. Willful Conduct
” ‘The word “willfully,” when applied to the intent with which an act is done or omitted, implies simply a purpose or willingness to commit the act, or make the omission referred to.’ In other words, ‘[t]he word “willfully” as generally used in the law is a synonym for “intentionally,” [citation], and “. . . implies no evil intent; “it implies that the person knows what he is doing, intends to do what he is doing and is a free agent.” ’ ” (In re Rolando S. (2011) 197 Cal.App.4th 936, 941 [129 Cal.Rptr.3d 49].) In Rolando S., the Court of Appeal upheld a petition finding a minor willfully obtained personal identifying information of another in violation of
Here, the evidence shows Bollaert designed the UGotPosted.com Web site for the specific purpose of eliciting nude photographs and private information of other persons; the information was not provided to him by the victims depicted in the photographs, whose names and locations were used. Because Bollaert “freely accepted” all of the victims’ personal information, intended to continue to possess it, and used it for his own purposes, i.e., for display on his Web site and receipt of advertising income as well as payments from ChangeMyReputation.com, Bollaert willfully obtained the information for purposes of
2. Unlawful Purpose
We further conclude substantial evidence demonstrates Bollaert obtained and retained the information for an unlawful purpose, namely, to invade the victims’ privacy. In In re Rolando S., the court was faced with the minor’s claim that he did not use the victim’s information for an unlawful purpose, because at most he “possibly defamed” the victim and such civil torts did not meet that standard. (In re Rolando S., supra, 197 Cal.App.4th at p. 942.) In addressing that contention, the court examined the legislative history of
Thus, the term “unlawful” as used in
Nevertheless, we conclude substantial evidence supports the jury’s verdicts on a theory of invasion of privacy based on intrusion into private affairs. “A privacy violation based on the common law tort of intrusion has two elements. First, the defendant must intentionally intrude into a place, conversation, or matter as to which the plaintiff has a reasonable expectation of privacy. Second, the intrusion must occur in a manner highly offensive to a reasonable person.” (Hernandez v. Hillsides, Inc. (2009) 47 Cal.4th 272, 286 [97 Cal.Rptr.3d 274, 211 P.3d 1063]; see Shulman, supra, 18 Cal.4th at p. 231 [” ‘[o]ne who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person’ “].) “To prove actionable intrusion, the plaintiff must show the defendant penetrated some zone of physical or sensory privacy surrounding, or obtained unwanted access to data about, the plaintiff.” (Shulman, at p. 232, italics added.)
Bollaert suggests that liability for this tort would attach only to the third parties who “of their own free will” posted the offensive content without the victim’s permission, that he is not responsible because he “could not tell from the submissions whether the people submitting the photos were submitting photos of themselves or other people without their permission.” Interpreting this challenge as directed to the intent element, we reject it. As the People point out, the tort is proven where the defendant obtains unwanted access to private data about the plaintiff (Shulman, supra, 18 Cal.4th at p. 232), and evidence of Bollaert’s willful receipt of the intimate photographs from others without the victims’ consent meets that standard. Additionally, the evidence contradicts Bollaert’s assertions concerning his lack of knowledge, as the evidence shows he required users to post both their own e-mail address as well as the full name of the victim and the victim’s Facebook link. The People’s forensic computer expert testified that Bollaert viewed the Facebook pages of victims on 2,300 occasions, permitting the jury to conclude that Bollaert indeed sought to verify the identity of the persons in the photographs.
As for the victims’ photographs themselves, the People correctly point out that complete confidentiality or privacy is not required. The California Supreme Court has recognized limited privacy interests in private communications to others that the press had intercepted for wider dissemination, and its holdings by extension compel the conclusion in this case that the victims’ acts of sharing their intimate photographs with a limited number of persons did not extinguish their expectation of privacy as to the Internet or the outside world in general. (See Sanders v. American Broadcasting Companies (1999) 20 Cal.4th 907, 911 [85 Cal.Rptr.2d 909, 978 P.2d 67] [an intrusion cause of action “is not defeated as a matter of law simply because the events or conversations upon which the defendant allegedly intruded were not completely private from all other eyes and ears“]; Hernandez v. Hillsides, Inc., supra, 47 Cal.4th at p. 289.) In Hernandez, the court, summarizing and quoting its holding in Sanders, stated that “privacy expectations can be reasonable even if they are not absolute. ‘[P]rivacy, for purposes of the intrusion tort, is not a binary, all-or-nothing characteristic. There are degrees and nuances to societal recognition of our expectations of privacy: the fact that the privacy one expects in a given setting is not complete or absolute does not render the expectation unreasonable as a matter of law.’ ” (Hernandez, at p. 289.) Thus, in Sanders, where a reporter secretly videotaped and recorded a plaintiff’s interactions with other persons in an area that was closed to the public but where coworkers could be seen and heard nearby, the court held the plaintiff could nevertheless have a cause of action for invasion of privacy by intrusion based on the reporter’s covert videotaping. (Sanders, supra, 20 Cal.4th at pp. 914, 917-918, 923.) “Defendants’ claim, that a ‘complete expectation of privacy’ is necessary to recover for intrusion, . . . fails as inconsistent with case law as well as with the common understanding of privacy. Privacy, for purposes of the intrusion tort must be evaluated with respect to the identity of the alleged intruder and the nature of the intrusion. . . . [A]n employee may, under some circumstances, have a
In this case, there is no question based on the evidence concerning the inherently personal nature of the images, the testimony of the victims who sent their images only to another person or select others, the victims’ generally shocked and horrified reaction to the display of those images on Bollaert’s Web site, and their attempts to get them removed, that the jury could conclude each of those victims reasonably expected his or her images to be private as to that person or persons to whom they were sent.
Given the foregoing conclusions, we need not decide whether the evidence is likewise sufficient to support Bollaert’s
D. The Evidence Is Sufficient to Support Bollaert’s Convictions under Section 530.5 Regardless of CDA Immunity Because There Is Evidence from Which the Jury Could Reasonably Find Bollaert Retained or Acquired Personal Information with the Intent to Defraud
Bollaert contends the People presented no evidence supporting their claim that he possessed personal information with the intent to defraud by operating the ChangeMyReputation.com Web site so as to deceive victims into thinking they were paying money to a Web site unconnected with UGotPosted.com. Bollaert points out that his UGotPosted.com Web site contained a link to ChangeMyReputation.com, showing he was not hiding the connection between the sites, and that one victim testified it was “obvious” to her that the same person was behind both sites. He maintains the victims paid money because they wanted their pictures removed, not because they were deceived.
“An intent to defraud is an intent to deceive another person for the purpose of gaining a material advantage over that person or to induce that person to part with property or alter that person’s position by some false statement or false representation of fact, wrongful concealment or suppression of the truth or by any artifice or act designed to deceive.” (People v. Pugh (2002) 104 Cal.App.4th 66, 72 [127 Cal.Rptr.2d 770], citing People v. Booth (1996) 48 Cal.App.4th 1247, 1253 [56 Cal.Rptr.2d 202].) In Booth, the court further explained: ” ‘Intent to defraud is an intent to commit a fraud.’ [Citation.] ‘Fraud’ and ‘dishonesty’ are closely synonymous. Fraud is defined as ‘a dishonest stratagem.’ [Citation.] It ‘may consist in the misrepresentation or the concealment of material facts’ [citation], or a statement of fact made with ‘conscious[ness] of [its] falsity.’ ” (Booth, at p. 1253.) This court has recently held that to “defraud” means ” ‘to injure someone in their pecuniary or property rights.’ ” (People v. Isom (2015) 240 Cal.App.4th 1146, 1150 [193 Cal.Rptr.3d 58], quoting Lewis v. Superior Court (1990) 217 Cal.App.3d 379, 393-394 [265 Cal.Rptr. 855].)
Specific intent to defraud is often proven by circumstantial evidence; it is thus typically inferred from all of the facts and circumstances. (People v. Williams (2013) 218 Cal.App.4th 1038, 1066 [160 Cal.Rptr.3d 779], citing People v. Abilez, supra, 41 Cal.4th at p. 508; People v. Smith (1998) 64 Cal.App.4th 1458, 1469 [76 Cal.Rptr.2d 75]; People v. Wilkins (1972) 27 Cal.App.3d 763, 773 [104 Cal.Rptr. 89]; People v. Hambleton (1963) 218 Cal.App.2d 479, 482 [32 Cal.Rptr. 471] [“The intent to defraud can be inferred from all the facts and need not be proved by direct evidence“].) Furthermore, “[p]roof of a false factual representation need not be by words alone; it may be implied from conduct; it may be made either expressly or by implication; the form of the words in which the pretense is couched is immaterial; if the words or conduct are intended to create the impression that
Here, the evidence showed that when many of the victims e-mailed the webmaster contact at UGotPosted.com and pleaded to have their personal information removed, they received no response. For at least one victim, Bollaert used a false name when he acted as the UGotPosted.com contact person. But victims who contacted and paid ChangeMyReputation.com were successful in their efforts. One victim, Brian, communicated with the e-mail associated with ChangeMyReputation.com to remove his photos and asked whether he could submit payment after his photographs were removed; he received a response telling him, “[W]e can’t remove it until you pay.” When he expressed his suspicion that the Web sites involved “most likely the same people,” the only response he received was a message telling him, “Once it is removed it will not be reposted or we will remove it again.” His information was removed after he made his payment. Another victim testified that after receiving no response to her e-mails to UGotPosted.com, she sent an e-mail to ChangeMyReputation.com and “within minutes” received a response containing payment instructions. Her photographs were removed minutes after she submitted payment. According to another victim, ChangeMyReputation.com purported to remove content from all Web sites, not just UGotPosted.com. She testified she and her ex-boyfriend made two separate payments to ChangeMyReputation.com; after he made the first payment, her photographs appeared again on other Web sites and she then paid an additional amount to have those photographs removed.
We conclude based on all of these facts, that the circumstantial evidence was sufficient for a jury to find Bollaert acquired and retained all of the victims’ personal identifying information with the intent to defraud. That is, Bollaert purposely set up UGotPosted.com so that it directed victims to an entirely separate Web site where they could remove the content for a fee; he named the Web sites differently and used different e-mail addresses, suggesting he intended to conceal the fact the Web sites were operated by the same person and induce victims to believe they were making the payment to a different entity; he at times used a pseudonym and never disclosed the Web sites were operated by the same person despite at least one victim expressing his suspicion that such was the case; and he thereby duped the victims into paying money to him, the very same operator of the UGotPosted.com Web site, unbeknownst to them. It was only after payment that he would remove the offensive content. It is of no moment that one victim was not fooled, but believed correctly that the Web sites were operated by the same person, as the evidence must demonstrate only Bollaert’s fraudulent intent, not actual success in his efforts. (People v. Reed, supra, 190 Cal.App.2d at p. 353
Under
E. The Evidence Is Sufficient to Support the Jury’s Finding That Bollaert Is an Information Content Provider Not Immunized by the CDA
At both parties’ request, the court instructed the jury that
In arguing he cannot be an information content provider subject to liability, Bollaert compares his conduct to that of the defendants in Zeran, supra, 129 F.3d 327, Carafano, supra, 339 F.3d 1119 and Jones, supra, 755 F.3d 398, who were held to fall within the scope of CDA immunity. As we explain, we reject these comparisons, and hold that Bollaert’s design and operation of UGotPosted.com—which required users who wished to use the Web site to provide content that violated other persons’ privacy—does not
In Roommates, supra, 521 F.3d 1157, the defendant Web site, Roommate.com (Roommate), matched potential landlords and renters, while collecting a profit from advertisers and subscribers. (Id. at p. 1161.) As the Ninth Circuit en banc majority described it: “Before subscribers can search listings or post housing opportunities on Roommate’s website, they must create profiles, a process that requires them to answer a series of questions. In addition to requesting basic information—such as name, location and e-mail address—Roommate requires each subscriber to disclose his sex, sexual orientation and whether he would bring children to a household. Each subscriber must also describe his preferences in roommates with respect to the same three criteria: sex, sexual orientation and whether they will bring children to the household. The site also encourages subscribers to provide ‘Additional Comments’ describing themselves and their desired roommate in an open-ended essay. After a new subscriber completes the application, Roommate assembles his answers into a ‘profile page.’ The profile page displays the subscriber’s pseudonym, his description and his preferences, as divulged through answers to Roommate’s questions.” (Id. at p. 1161.) The plaintiff sued the defendant for violations of the Fair Housing Act (FHA;
On appeal, the plaintiff argued that the defendant violated the FHA and analogous California law by posing illegal questions during the registration process, and also by requiring the subscribers to answer the questions as a condition of using the defendant’s services. (Roommates, supra, 521 F.3d at pp. 1164, 1165.) The Ninth Circuit agreed that Roommate was an “information content provider” within the meaning of the CDA as to the questions it posed: the defendant “created the questions and choice of answers, and designed its website registration process around them” and thus could not claim CDA immunity for posting the questions on its Web site or for forcing subscribers to answer them as a condition of using its services. (Id. at p. 1164.) The court pointed out that a party responsible for putting information online may be subject to liability even if the information originated with a user. (Id. at p. 1165, citing Batzel v. Smith, supra, 333 F.3d at p. 1033.) It explained, “By requiring subscribers to provide the information as a condition of accessing its service, and by providing a limited set of pre-populated”
In reaching its conclusions, the Ninth Circuit majority declined to read the statutory term “development” so narrowly as to apply only to content that originated entirely with the Web site. (Roommates, supra, 521 F.3d at p. 1167.) “We believe that both the immunity for passive conduits and the exception for co-developers must be given their proper scope and, to that end, we interpret the term ‘development’ as referring not merely to augmenting the content generally, but to materially contributing to its alleged unlawfulness. In other words, a website helps to develop unlawful content, and thus falls within the exception to
It also clarified its reasoning in Carafano, supra, 339 F.3d 1119, which Bollaert sees as analogous. In Carafano, the question was whether the defendant dating service Web site was statutorily immune under the CDA for false content in a dating profile provided by someone posing as the celebrity plaintiff. (Id. at p. 1120.) The dating Web site gave users a “detailed questionnaire” that included multiple-choice questions wherein “members select answers . . . from menus providing between four and nineteen options,” including some sexually suggestive answers. (Id. at p. 1121.)11 The profile at issue included the plaintiff’s home address and telephone number, causing the plaintiff to receive sexually explicit and threatening messages and calls. (Carafano, at pp. 1120-1121.)
Pointing to the breadth of the latter statement in Carafano, supra, 339 F.3d 1119, the majority in Roommates disavowed any suggestion that Carafano had held an information content provider automatically immune so long as the content originated with another information content provider. (Roommates, supra, 521 F.3d at p. 1171, fn. 31.) It explained, “[E]ven if the data are supplied by third parties, a website operator may still contribute to the content’s illegality and thus be liable as a developer. Providing immunity every time a website uses data initially obtained from third parties would eviscerate the exception to section 230 for ‘develop[ing]’ unlawful content ‘in whole or in part.’ ” (Id. at p. 1171.) The Ninth Circuit clarified that in Carafano, the defendant was immune because “[t]he allegedly libelous content there—the false implication that [the plaintiff] was unchaste—was created and developed entirely by the malevolent user, without prompting or help from the website operator.” (Roommates, at p. 1171.) Though the defendant provided “neutral tools” used by the poster, it “did absolutely nothing to encourage the posting of defamatory content—indeed, the defamatory posting was contrary to the website’s express policies. . . . With respect to the defamatory content, the website operator was merely a passive conduit and thus could not be held liable for failing to detect and remove it.” (Id. at pp. 1171-1172.)
Carafano’s conclusion, the Ninth Circuit held, could not apply to the defendant in Roommates: “By contrast, Roommate both elicits the allegedly illegal content and makes aggressive use of it in conducting its business.
The Ninth Circuit in Roommates likewise distinguished Zeran, supra, 129 F.3d 327, on which Bollaert relies. Zeran involved the plaintiff’s negligence action against America Online (AOL) alleging that AOL had “ ‘unreasonably delayed in removing defamatory messages posted by an unidentified third party, refused to post retractions of those messages, and failed to screen for similar postings thereafter.’ ” (Zeran, supra, 129 F.3d at p. 328.) The Ninth Circuit in Roommates observed that the Fourth Circuit in Zeran held AOL immune under the CDA for the defamatory and harassing message board postings, pointing out that “AOL did not solicit the harassing content, did not encourage others to post it, and had nothing to do with its creation other than through AOL’s role as the provider of a generic message board for general discussions.” (Roommates, supra, 521 F.3d at p. 1172, fn. 33.) We agree there is no indication that AOL in that case acted as anything other than a passive conduit for the allegedly harmful content.
Here, the evidence shows that like the Web site in Roommates, Bollaert created UGotPosted.com so that it forced users to answer a series of questions with the damaging content in order to create an account and post photographs. That content—full names, locations, and Facebook links, as well as the nude photographs themselves—exposed the victims’ personal identifying information and violated their privacy rights. As in Roommates, but unlike Carafano or Zeran, Bollaert’s Web site was “designed to solicit” (Roommates, supra, 521 F.3d at p. 1170, italics added) content that was unlawful, demonstrating that Bollaert’s actions were not neutral, but rather materially contributed to the illegality of the content and the privacy invasions suffered by the victims. In that way, he developed in part the content, taking him outside the scope of CDA immunity.
Bollaert would have us follow the Sixth Circuit’s decision in Jones, supra, 755 F.3d 398, involving a “user-generated, online tabloid” where users could
II. Sufficiency of Evidence of Extortion
Bollaert contends the evidence is insufficient to support his convictions for extortion. He reiterates the People’s extortion theory that he threatened to injure the victims by publishing their images on his UGotPosted.com Web site and used the postings to illegally obtain money via ChangeMyReputation.com by charging to have the photos removed. Bollaert does not challenge evidence of his specific intent to extort; rather, he maintains that as an interactive computer service provider and access software provider, he was under no legal obligation to remove third party postings from his Web site even if they were negative, but instead “merely offered a service to remove the photos.” According to Bollaert, he was “engaging in standard business practice,” and not extortion, similar to the practices approved by the Ninth Circuit in Levitt v. Yelp! Inc. (9th Cir. 2014) 765 F.3d 1123 (Levitt). Bollaert also contends there is no evidence he directly or impliedly threatened any of the victims, and that the information, which was already publicly available and exposed on his Web site, cannot constitute a secret for purposes of extortion.
The People respond that Bollaert used the implicit threat of continued exposure of the victims’ pictures and information to extort money from them, and because his Web site contained, and indeed required, posters to provide the victims’ personal identifying information, he was obligated to remove the
A. Trial Evidence
At trial, victim Rebecca testified that after her manager at work had been told one of his employees “was doing suspicious activity on the Internet,” she discovered that intimate photographs of herself and her ex-fiancée, as well as her full name, work location, Facebook link and age, were posted on UGotPosted.com without her consent. Rebecca felt “extremely violated” by the situation, which was very hurtful and embarrassing to her. She e-mailed the Web site and demanded the photographs be taken down, but received no response. She also e-mailed ChangeMyReputation.com, and within minutes received a response directing her to pay $249.99 via PayPal. Rebecca paid the money because she felt the images were disgusting and, though her manager and others had already seen them, she was worried the images would be exposed to more people.
Victim Jennifer testified that after she discovered nude pictures of her had been posted to UGotPosted.com without her consent (in addition to her full name and work location) she e-mailed the Web site and demanded the content be removed. Based on the e-mails she had sent, as well as the link on UGotPosted.com, she became aware of ChangeMyReputation.com, which Jennifer described as a PayPal account where one could pay money to have the content removed within 48 hours. Jennifer then paid $249.99, and her photographs were removed. Jennifer was subjected to racial slurs directed at her as a result of the posting, and she felt “horrible,” “dirty,” and afraid that someone was going to find her. She was afraid to leave her apartment and missed two weeks of school.
Victim Alaina testified that after she discovered her own nude pictures, full name, age, city and school were posted on UGotPosted.com without her consent, she sent five to 10 messages to the Web site in an effort to have the content removed, without response. Alaina testified she then “paid the blackmail fee of $350” to ChangeMyReputation.com, which stated it would take photographs down upon payment. The content was removed the next
Victim Jasmine testified that she was surprised to find nude pictures of her, her first and last name, and “all of [her] social media” had been placed on UGotPosted.com. She worked for a large retailer at the time; her employer called to tell her that the company had been informed about her pictures and she would be fired if they were not taken down. Jasmine felt “really embarrassed and ashamed” when she saw the photos, and it was a frightening experience for her because she “didn’t want anybody to know.” Jasmine paid $249.99 to ChangeMyReputation.com and the content was removed from UGotPosted.com, but her ex-boyfriend had to pay another $249.99 to ChangeMyReputation.com to have the photographs removed from other Web sites where the information later appeared. Nobody from UGotPosted.com ever contacted her about the photographs.
Victim Manuel testified that he was shocked to discover that nude photographs of himself that he had sent to one individual, as well as his full name, town, and Facebook link, had been placed on UGotPosted.com. The situation was upsetting because he was gay and had not informed family or friends to whom the photographs were sent. Strangers submitted commentary and were tracking him, causing him fear and concern. Manuel found the link to ChangeMyReputation.com via a victim’s forum and also through UGotPosted.com, submitted a required photograph and a picture of his driver’s license, and paid $250 to have the content removed.
Victim Brian testified he was astounded, angry and embarrassed to find his nude pictures, full name, hometown, and Facebook link posted on UGotPosted.com without his consent. He was immediately scared for his job and that his parents would find out about the situation, though they never did learn about it. He e-mailed the Web site administrator at UGotPosted.com. He also e-mailed ChangeMyReputation.com, and received a response stating: “Once you pay, they will be removed immediately. If not, you can request a refund through PayPal.” Brian asked whether he could pay after he was notified the photographs were removed, and received an e-mail stating: “No, we can’t remove until you pay.” After he expressed concern over possibly sending money to the same operator of UGotPosted.com, he received a response telling him, “Make a payment, and we will remove the content, thanks.” After Brian paid $250, the content was removed. The situation caused him shame, embarrassment and stress, as he knew his high school classmates saw the posting and he was worried about who else would see it in the future.
B. Legal Principles
“Extortion is the obtaining of property from another, with his consent . . . induced by a wrongful use of force or fear . . . .” (
“In order to establish extortion, ‘the wrongful use of force or fear must be the operating or controlling cause compelling the victim’s consent to surrender the thing to the extortionist.’ ” (Chan v. Lund (2010) 188 Cal.App.4th 1159, 1171 [116 Cal.Rptr.3d 122], quoting People v. Goodman (1958) 159 Cal.App.2d 54, 61 [323 P.2d 536].) “The ‘secret’ referred to in the statute is a matter ‘unknown to the general public, or to some particular part thereof which might be interested in obtaining knowledge of the secret; the secret must concern some matter of fact, relating to things past, present or future; the secret must affect the threatened person in some way so far unfavorable to the reputation or to some other interest of the threatened person, that threatened exposure thereof would be likely to induce him through fear to pay out money or property for the purpose of avoiding the exposure.’ [Citation.] Whether a threatened exposure would have this effect on the victim is a factual question and depends on the nature of the threat and the susceptibility of the victim.” (Philippine Export & Foreign Loan Guarantee Corp. v. Chuidian (1990) 218 Cal.App.3d 1058, 1078 [267 Cal.Rptr. 457]; see also Cross v. Cooper (2011) 197 Cal.App.4th 357, 387 [127 Cal.Rptr.3d 903].)
The threat may be implied from all of the circumstances: “ ‘No precise or particular form of words is necessary in order to constitute a threat under the circumstances. Threats can be made by innuendo and the circumstances under which the threat is uttered and the relations between [the defendant] and the [target of the threats] may be taken into consideration in making a determination of the question involved.’ [Citations.] . . . ‘The more vague and general the terms of the accusation the better it would subserve the purpose of the accuser in magnifying the fears of his victim, and the better also it would serve to protect him in the event of the failure to accomplish his extortion and of a prosecution for his attempted crime.’ ” (Stenehjem v. Sareen (2014) 226 Cal.App.4th 1405, 1424 [173 Cal.Rptr.3d 173]; see also People v. Choynski (1892) 95 Cal. 640, 642 [30 P. 791] [persons guilty of extortion “seldom possess the hardihood to speak out boldly and plainly, but deal in mysterious and ambiguous phrases”].)
C. The Evidence Is Sufficient to Establish Both a Threat and a Secret Within the Meaning of the Extortion Statute
We first reject Bollaert’s contentions concerning the absence of evidence of any threat or secret for purposes of extortion. Whether the evidence shows Bollaert engaged in the requisite threat by referring victims who desired to remove the offensive content to ChangeMyReputation.com for the purpose of having them pay to remove it, must be analyzed in the entire factual context. (Stenehjem v. Sareen, supra, 226 Cal.App.4th at p. 1424; People v. Massengale (1968) 261 Cal.App.2d 758, 765 [68 Cal.Rptr. 415].) We conclude the threats were inherent and implied in the very structure and content of Bollaert’s Web sites, which Bollaert himself created and operated. When victims were directed via UGotPosted.com to the ChangeMyReputation.com Web site, they were informed either via the Web site or e-mail they could have their photos removed for a fee, from which victims could infer that if they did not pay, the offensive content would remain on the site in further public view. Those victims who communicated with Bollaert before they paid were told the content would only be removed upon payment, and Bollaert only removed the content when the victims paid the requested fee, which eventually was deposited in Bollaert’s personal account. There is no question based on the victims’ testimony that the display of their private images and information subjected them to shame, disgrace and embarrassment as to their reputation and character, and they would continue to be exposed to other people if the content was not removed. The fact Bollaert did not take affirmative action to seek out or contact the victims, but merely responded to the victims’ pleas to remove their content, does not render the threat element unsupported by the evidence. Further, as we explain more fully below, Bollaert’s act in removing the victims’ personal identifying information from his Web site, which he expressly solicited in the first place, did not give him a lawful right to collect a fee.
In sum, there is ample evidence from which the jury could conclude Bollaert’s joint operation and connection of the two Web sites in this manner, as well as his communications to the victims, was a means to obtain their money by wrongful use of fear, namely the threat to “impute to [them] . . . disgrace” (
We further conclude alternatively there is substantial evidence that the victims’ photographs and personal identifying information constituted a secret within the meaning of the crime of extortion, notwithstanding its posting on the Internet and viewing by some individuals. We are guided by People v. Peniston, supra, 242 Cal.App.2d 719. In Peniston, the victim, during her relationship with the defendant, gave the defendant partially nude photographs of herself. (Id. at p. 721.) After the relationship ended and she married her husband, the defendant returned and asked her to give him money or he would take the pictures to her husband and parents. (Ibid.) She paid him, but the defendant contacted her again and when she asked him to return her pictures, he asked for more money, prompting her to go to police. (Ibid.) On appeal from his extortion and attempted extortion convictions, the defendant challenged the evidence supporting the finding that he had threatened to expose a secret, pointing to evidence that the pictures were only some of a number of modeling pictures taken of the victim that had been circulated throughout the West Coast. (Id. at p. 722.) The victim had testified her husband knew some pictures existed but not their nature, and neither he nor her mother were aware of her modeling activities. (Ibid.) She testified that she was on probation from a prostitution charge and her parents had threatened to remove her children from her if she got into more trouble. (Ibid.) She did not want her husband or parents to see the photographs and other motion pictures, which unbeknownst to her had been exhibited in arcades in San Fernando Valley. (Ibid.)
The Peniston court pointed out that to suffice for extortion, the “ ‘thing held secret must be unknown to the general public, or to some particular part thereof which might be interested in obtaining knowledge of the secret’ in addition to affecting the threatened person in some way so far unfavorable to the reputation, or to some other interest of the threatened person, that threatened exposure thereof would be likely to induce the victim through fear to pay money so as to avoid the exposure. (People v. Peniston, supra, 242 Cal.App.2d at p. 722, italics added, quoting People v. Lavine (1931) 115 Cal.App. 289, 295 [1 P.2d 496]; see also Cross v. Cooper, supra, 197 Cal.App.4th at p. 387.) It held based on the evidence, a trier of fact could reasonably infer the victim feared that disclosure of the pictures to her husband and parents might lead to adverse probation consequences and the loss of her children, making the evidence sufficient to establish a secret within the meaning of section 519. (Peniston, at p. 722.) In response to the defendant’s further claim that the motion pictures were not a secret to the general public, the Peniston court stated: “We think the trial judge correctly focused on the true issues in the case, whether [the victim’s] husband and
As in Peniston, where dissemination of the victim’s images to the general public via arcades or other means did not render the evidence insufficient to establish a secret for purposes of extortion because the victim’s family had not seen them, here, the fact the victims’ photographs were placed on the Internet and exposed to the public did not mean that some other “ ‘particular part [of the public]’ ” (People v. Peniston, supra, 242 Cal.App.2d at p. 722)—namely, family members, classmates, coworkers, or employers who might be interested—had seen them. The People presented direct testimony from some of the six victims concerning their fear that others would see their images if they did not pay to have them removed, as well as evidence as to all of the victims that they quickly paid for removal, from which the jury could readily infer the victims were fearful of continued exposure. The jury could reasonably conclude the photographs therefore remained a secret to persons who had not viewed the Web site, and reasonably found it was the victims’ fear that others would see the content, causing further humiliation or damage to their reputation, that compelled them to pay Bollaert’s fee.
Bollaert relies on Cross v. Cooper, supra, 197 Cal.App.4th 357 for the proposition that “ ‘information publicly available on Web sites ‘to anyone interested in knowing about it’ ” does not constitute a secret within the meaning of the extortion statute. But Cross was decided in the context of an anti-SLAPP motion (
D. Bollaert Was Not Engaged in a Legitimate Service or Business Practice
We further reject Bollaert’s claim that he was engaged in a lawful or legitimate business practice and not extortionate conduct. His claim is based on the factual premise, which we have rejected ante, that he acted merely as an interactive computer service and thus was not legally required to remove the offensive content, as well as on the Ninth Circuit’s decision in Levitt, supra, 765 F.3d 1123, which he claims discussed “extortion as it relates to Internet service providers [sic].”
In Levitt, the plaintiff small businesses sued Yelp! Inc. (Yelp), an online forum for persons to express opinions about businesses, claiming it extorted or attempted to extort advertising payments from them including by manipulating or removing positive user-generated reviews about their business. (Levitt, supra, 765 F.3d at pp. 1126, 1134.) They brought claims for violation of California’s unfair competition law (UCL;
Bollaert mischaracterizes Levitt, which we do not follow in any event. Contrary to Bollaert’s suggestion, Levitt’s holding did not turn on Yelp’s status as an interactive computer service or CDA immunity, which the Ninth Circuit expressly did not address. (Levitt, supra, 765 F.3d at p. 1129.) The question was whether Yelp’s alleged actions were extortionate and thus unlawful under California’s UCL. (Id. at p. 1130) Even assuming arguendo Levitt is consistent with California law,13 as Levitt itself pointed out, California does not recognize a claim-of-right defense where a defendant does not “threaten ‘economic loss’ or make a threat that involves ‘the exploitation of [economic] fears ....’ ” (Levitt, supra, 765 F.3d at p. 1133 & fn. 3 [threat to accuse a person of a crime not subject to a claim-of-right defense].) Here, Bollaert’s threat was continued exposure of private personal information resulting in a violation of the victims’ privacy rights and emotional distress, not a threat to cause them economic harm. Though some victims expressed fear of losing their jobs, Bollaert’s threat was not directed to the victims’ workplaces or in any way related to their continued employment. Finally, Bollaert’s conduct is nothing like the legitimate albeit “hard bargaining” business tactics discussed in Levitt. Bollaert, who did not merely decline to remove harmful content but solicited and developed the unlawful content, did not have a lawful right to collect a fee to remove the victims’ personal information. And unlike the plaintiffs in Levitt who did not have a preexisting right to have positive reviews appear on Yelp’s Web site (id. at p. 1133), the victims here had a preexisting right—under privacy law—to be free of Bollaert’s threatened harm and not have their personal identifying information solicited and placed on UGotPosted.com without their consent.
III. Instruction with CACI Nos. 1800 and 1801
Bollaert contends the trial court erred when it instructed the jury with CACI No. 1800 pertaining to the tort of invasion of privacy by intrusion into private
The People respond that Bollaert invited any error regarding these instructions as his counsel requested they be given for a tactical reason. In reply, Bollaert does not challenge the People’s position other than to point out that his counsel requested the CACI instruction in response to the court’s expressed intention to give some type of civil jury instruction as to the violation of section 653m.
We agree Bollaert’s instructional challenge is barred because he invited any assumed error. “Under the invited error doctrine, a defendant cannot complain that the court erred in giving an instruction that he requested. [Citation.] The invited error doctrine applies when the defense has made a ‘ “conscious and deliberate tactical choice” ’ in asking for the instruction in question.” (People v. Merriman (2014) 60 Cal.4th 1, 104 [177 Cal.Rptr.3d 1, 332 P.3d 1187]; see also People v. Scott (2015) 61 Cal.4th 363, 400 [188 Cal.Rptr.3d 328, 349 P.3d 1028] [“ ‘Invited error . . . will only be found if counsel expresses a deliberate tactical purpose in resisting or acceding to the complained-of instruction’ ”].) The rule is designed to prevent a defendant from gaining reversal on appeal because of an error he or she intentionally caused the trial court to make. (People v. Coffman and Marlow (2004) 34 Cal.4th 1, 49 [17 Cal.Rptr.3d 710, 96 P.3d 30].) It will not apply if counsel acted out of ignorance or mistake. (Ibid.) If defense counsel takes affirmative action, a clearly implied tactical purpose will suffice to invoke the doctrine. (Ibid.)
The record shows that during the jury instruction conference, Bollaert’s counsel objected to the People’s proposed use of BAJI Nos. 7.20 and 7.21 respectively on the elements of intrusion into private affairs and public disclosure of private facts, but she had submitted the CACI jury instructions and asked the court to use CACI No. 1800 in lieu of BAJI No. 7.20, and CACI No. 1801 in lieu of BAJI No. 7.21. She did so for an expressly tactical purpose, pointing out that the instructions were similar except that CACI No. 1800 contained one element not present in the BAJI instruction: “[W]ith respect to intrusion into private affairs, it contains an element that I wish to
In any event, our agreement with In re Rolando S., supra, 197 Cal.App.4th 936 disposes of the premise of Bollaert’s challenge, which is that civil wrongs cannot be equated with a “criminal wrong—an unlawful purpose.” Rolando S. explained in a reasoned analysis that “unlawful conduct includes acts prohibited by the common law or nonpenal statutes, such as intentional civil torts.” (Rolando S., at p. 946.)
Bollaert’s instructional challenge similarly fails on grounds he has not demonstrated that the instructions as a whole were misleading or improper, or that the instructions, the People, or the court somehow suggested or informed the jury that a lesser standard applied. Our role is to determine the correctness of the jury instructions “ ‘from the entire charge of the court, not from a consideration of parts of an instruction or from a particular instruction.’ ” (People v. Castillo (1997) 16 Cal.4th 1009, 1016 [68 Cal.Rptr.2d 648, 945 P.2d 1197].) Here, the trial court instructed the jury accordingly: that they “should not single out or place added emphasis on a particular instruction” but must “consider the instructions as a whole, a complete statement of what the Court considers to be the applicable law.” It instructed the jury as to the presumption of innocence and its requirement that the People prove “the truth of what they have alleged” beyond a reasonable doubt. It instructed the jury that the People were required to prove each of the elements of the crime of unauthorized use of personal identifying information beyond a reasonable doubt including the element that Bollaert “willfully used that information for an unlawful purpose”; that Bollaert was being prosecuted for that crime under the People’s three separate theories; that “[e]ach of these is a separate theory, legal theory, as to how [Bollaert] committed the crime”; and “[e]ach of them has its own elements, its own requirements which must be proved beyond a reasonable doubt.” Under the circumstances, the jury could not have understood from the instructions given that they were to apply any lesser standard than proof beyond a reasonable doubt to the element of use of personal identifying information for an unlawful purpose and the various elements of both invasion of privacy theories. Bollaert has not demonstrated instructional error.
DISPOSITION
The judgment is affirmed.
McConnell, P. J., and Huffman, J., concurred.
Appellant’s petition for review by the Supreme Court was denied October 12, 2016, S236235.
