Filed 6/17/13 In re Anderson CA2/3
                  NOT TO BE PUBLISHED IN THE OFFICIAL REPORTS
California Rules of Court, rule 8.1115(a), prohibits courts and parties from citing or relying on opinions not certified for
publication or ordered published, except as specified by rule 8.1115(b). This opinion has not been certified for publication
or ordered published for purposes of rule 8.1115.


              IN THE COURT OF APPEAL OF THE STATE OF CALIFORNIA

                                     SECOND APPELLATE DISTRICT

                                                DIVISION THREE



In re                                                                    B232746

         WILLIAM FRENCH ANDERSON,                                       (Los Angeles County
                                                                        Super. Ct. No. BA255257)
         on

         Habeas Corpus.




         ORIGINAL PROCEEDINGS in habeas corpus. Michael E. Pastor, Judge.
Order to show cause discharged; petition for writ of habeas corpus denied.
         Douglas W. Otto for Petitioner.
         Kamala D. Harris, Attorney General, Dane R. Gillette, Chief Assistant Attorney
General, Lance E. Winters, Assistant Attorney General, Linda C. Johnson and Blythe J.
Leszkay, Deputy Attorneys General, for Respondent.

                                             _________________________
       Petitioner William French Anderson was the appellant in People v. Anderson
(2012) 208 Cal.App.4th 851, which affirmed the judgment entered following his
conviction by jury of continuous sexual abuse of a child under the age of 14 years and
three counts of lewd act with a child under the age of 14 years. (Pen. Code, §§ 288.5,
288, subd. (a).) In addition to the appeal from the judgment, Anderson filed this writ
petition to raise ineffective assistance of counsel issues. After ordering the petition
and the appeal to be considered concurrently, we severed the matters to prevent
further delay of the appeal. We now consider Anderson‟s claim counsel rendered
ineffective assistance in failing to challenge the admissibility of a secretly recorded
conversation in which the victim confronted Anderson and requested an apology for
his years of abuse. We issued an order to show cause. Upon review of the evidence
in the record and before us by declaration, we conclude an evidentiary hearing is
unnecessary, deny the petition and discharge the order to show cause.
                                       SUMMARY
       From Anderson: “Anderson, a medical doctor and the founder and director of a
genetic research laboratory, sexually molested the daughter of an employee of the
laboratory from the time the child was in the fourth or fifth grade until the ninth grade.
Anderson coached the victim in competitive karate; she won national karate competitions
when she was in the fourth and fifth grades in 1997 and 1998. He also assisted her
academically. However, they frequently were alone together and he regularly committed
lewd acts upon her. The victim‟s testimony was generic in that she testified generally
about a continuing course of misconduct. E-mails Anderson sent her after the abuse
ended but before she decided to report him in April of 2004 corroborated her testimony.
Because Anderson indicated in his e-mails he would apologize to her in person, she
agreed to meet him outside a public library while carrying a recording device provided by
detectives. On July 1, 2004, she surreptitiously recorded a conversation in which she
angrily confronted Anderson and asked why he had molested her. At trial, Anderson
claimed the apologies in his e-mails were for applying excessive pressure on her to

                                              2
succeed and at the library she was on the verge of going out of control and he was
willing to say whatever was necessary to calm her.” (People v. Anderson, supra,
208 Cal.App.4th at p. 856.)
       On appeal, Anderson claimed the trial court erroneously excluded evidence of his
conduct after the library confrontation, particularly, that he and his wife wrote a four-
page letter dated July 4, 2004, to Anderson‟s friend, San Marino Police Chief Arl Farris,
in which they reported the victim falsely had accused Anderson of sexual molestation in
November of 2003 and expressed their fear she had descended into drug abuse and might
try to extort money from them. We found no reversible error in the exclusion of this
evidence as hearsay and under Evidence Code section 352. We also rejected Anderson‟s
claim that application of these rules of evidence infringed upon his constitutional right to
testify in his own behalf. Moreover, any error was harmless as Anderson testified fully
with respect to all aspects of the case, including the e-mails and the recorded
conversation. We found evidence related to Anderson‟s conduct after the library
confrontation was not critical to his defense and admission of the evidence would not
have altered the outcome of the case. We also rejected Anderson‟s claim the prosecutor
unfairly exploited the exclusion of Anderson‟s post conversation conduct in argument to
the jury.
       Anderson now contends defense counsel rendered ineffective assistance in failing
to challenge the admissibility of the recorded conversation on authentication grounds
(Evid. Code, §§ 1400-1402), in failing to protect Anderson‟s right to testify fully and
credibly regarding the library confrontation, and in failing to investigate indicia of
alteration of the recording.1 He claims defense counsel should have known the recording
was incomplete or had been edited because there is a time disparity of two or three


1
       Anderson also contends defense counsel should have objected to the prosecutor‟s
improper exploitation of the trial court‟s exclusion of Anderson‟s post conversation
conduct. However, Anderson‟s claim of prosecutorial misconduct on this same ground
was rejected on appeal. Therefore, Anderson‟s related claim of ineffective assistance of
counsel also fails. (See People v. Collins (2010) 49 Cal.4th 175, 204-205.)
                                              3
minutes between the 12-minute recording of the conversation and the lead detective‟s
case log, which indicates the library meeting consumed approximately 14 minutes. Also,
the conversation starts awkwardly and Anderson told defense counsel the recording did
not include the initial portion of the conversation in which the victim, Y., accused him of
sexual molestation and he denied it. Anderson further claims proper investigation by
defense counsel would have discovered anomalies in the recorded conversation that were
found by Anderson‟s habeas experts. Anderson claims prejudice, asserting proper
investigation and an objection on authentication grounds would have, at minimum,
caused the jury to question the recording and the credibility of law enforcement.
       The success of Anderson‟s petition depends in great measure on his post-
conviction declaration in which he claims the recording of the library confrontation does
not include the first few minutes of the conversation in which Y. accused him of sexual
molestation and he denied it. Habeas counsel commenced oral argument with an
extensive quote from Anderson‟s declaration. However, Anderson‟s claim is inconsistent
with Anderson‟s statements to the police in which he insisted the meeting lasted only
three minutes and denied that Y. accused him of molestation during the meeting.
Also, Anderson testified extensively at trial but never mentioned this assertedly missing
conversation. We conclude Anderson‟s claim of extensive unrecorded conversation is
not credible.
       Anderson‟s further claim defense counsel should have subjected the recording to
an authentication challenge based on various indicia of untrustworthiness, such as the
time disparity, the awkward start of the conversation and anomalies uncovered by his
habeas experts, is also unavailing. None of the findings by the habeas experts or
otherwise indicates the defense would have prevailed on an authentication challenge.
Y. testified before the grand jury and at trial the recording accurately reflected her
conversation with Anderson. This testimony alone would have been sufficient to
authenticate the recording. However, additional support for the admission of the
recording is found in the testimony of the deputy sheriff responsible for transferring the
digital file from the recording device.

                                              4
       Because it is clear Anderson‟s primary claim is not credible, and nothing in the
asserted indicia of untrustworthiness suggests the recording of the library confrontation
would have been excluded from evidence or substantially denigrated in the eyes of the
jury, Anderson is unable to demonstrate that any of the actions he now asserts should
have been undertaken would have resulted in a more favorable outcome. (Strickland v.
Washington (1984) 466 U.S. 668, 687-694 [80 L.Ed.2d 674].) We therefore reject his
claim of ineffective assistance of counsel, conclude no evidentiary hearing is required,
deny the petition and discharge the order to show cause.
                   FACTS AND PROCEDURAL BACKGROUND2
       1. The “time disparity.”
       Entries in Detective Ron Jester‟s case journal for the day of the library
confrontation indicate Anderson arrived at the library at 1:25 p.m. and Y. walked into the
library after the conversation ended at 1:39 p.m. The actual recorded conversation is
11 minutes and 48 seconds long.
       2. Anderson’s written and recorded statements.
       In the letter to Chief Farris dated July 4, 2004, Anderson stated the conversation
lasted approximately three minutes and began with Y. saying, “You ruined my life.”
       On July 9, 2004, in a recorded interview, Anderson told Detectives Duncan and
Boyett the conversation lasted approximately three minutes and Y.‟s first words were,
“You ruined my life.” Before the grand jury, Boyett testified that, during this interview,
he asked Anderson whether, during the meeting at the library, Y. mentioned “abusing
her, molesting her, touching her, anything like that” and Anderson responded, “No. No,
that never came out.”
       On July 30, 2004, Anderson told Detective Jester the library meeting was “real
brief” and estimated it lasted three minutes. When asked to recount the conversation,


2
       We incorporate by reference the Facts and Procedural Background as well as the
Discussion related to the admissibility of the letter to Chief Farris in People v. Anderson,
supra, 208 Cal.App.4th at pp. 858-875. We take judicial notice of the record on appeal in
People v. Anderson as well as the superior court file.
                                             5
Anderson said he came from behind and “said, „Hi, [Y].‟ And she turned around with
this look of hate and said, „You ruined my life.‟ ” Anderson said he did not respond to
that accusation. When told the meeting was not three minutes long, Anderson stated,
“Yes, it was.” Before the grand jury, Jester testified the meeting lasted “about 15
minutes.”
          3. Anderson’s declaration.
          In a declaration filed in support of his habeas petition, Anderson asserts that, upon
his release from custody on August 2, 2004, he received a copy of the “purported
transcript of the July 1, 2004 recording” and “immediately noticed” it “omitted the first
part of the conversation . . . .” Anderson declared: “I wrote out in longhand my best
recollection of the omitted part of the conversation . . . . At the point where she showed
me the cuts on her arms, I became very upset and concerned, and the rest of the missing
portion is the closest I could remember:
          “A: Hi, [Y.]!
          “Y: You ruined my life!
          “A: [Y.]?
          “Y: Why did you molest me?
          “A: Oh, [Y.], not again. You know I didn‟t.
          “Y: But you did ruin my life.
          “A: [Y.], we‟ve been through this and you know I‟m sorry. I thought you were
better.
          “Y: No, I‟m worse. Look at my arm! [shows fresh cuts on her arms]
          “A: Oh my heavens.
          “Y: You did this! You kept pushing me and I begged you to stop. I don‟t want to
go to Harvard. I don‟t want to be a scientist. I don‟t want to be your protégée. Why
didn‟t you stop when I asked?
          “A: I‟m sorry. I‟m sorry. I‟m sorry. (Long pause)
          [I am not certain of the exact order of each exchange from here on; also I may
have forgotten some exchanges]

                                                6
       “Y: That doesn‟t help. I‟m flunking all my classes. I‟m flunking all my classes.
It‟s your fault. You‟re just evil. (Pause)
       “A: I‟m so sorry. I feel so guilty. I know I was wrong. What can I do to help?
       “Y: Make things better. (Long pause) I‟ve tried to kill myself.
       “A: Oh, my God, [Y.]! (Long pause)
       “Y: Why did you do it? Why did you do it?
       “A: I‟m so sorry. I was just evil. (Pause)
       “Y: Why? Why?
       “A: Like I said in my e mails: I was just horribly horribly thoughtless. I thought
I was making you more successful. Oh, [Y.], I just feel terrible. Just awful. I can‟t
comprehend why I was so thoughtless. (Pause)
       “Y: You started pushing me in 5th grade. 5th Grade!
       “A: I made you a 2-time National Champion.
       “Y: But you couldn‟t leave it at that. You wanted me to be the National
Champion every year! That‟s why I quit. Can‟t you get that through your fucking head?
That‟s why I quit!
       “A: I‟m so sorry. What can I say? (Long pause)”
       At this point, the recorded conversation begins.3
       Anderson faxed his description of the omitted conversation to his attorney, Barry
Tarlow, and shortly thereafter met with Tarlow to discuss the case.4 Tarlow told
Anderson he had shredded the document and explained “he did not want to be wedded to



3
       The recording of the library confrontation commences:
       “Y: Hey?
       “A: (Inaudible)
       “Y: So?
       “A: Can we go somewhere?
       “Y: Why?
       “A: Because I think I‟m going to break down (INAUDIBLE) . . . [¶] . . .”
4
       Anderson was represented at trial by Barry Tarlow, Blair Berk and Saura Sahu.
                                             7
facts at the beginning of the case . . . .” Anderson declared that, during this meeting, he
told Tarlow what had been omitted from the transcript and that parts of the transcript
differed from his recollection.
       In preparation for trial, Tarlow told Anderson not to testify the beginning of the
conversation was missing from the recording in order to avoid cross-examination on this
point. Tarlow said it would hurt Anderson‟s credibility to claim the recording was
incomplete without independent proof the recording had been edited. Also, Tarlow told
Anderson he would ask whether Anderson knew the reason for Y.‟s professed problems
with relationships, referenced during the recorded conversation. Tarlow hoped the
prosecutor would follow up, thereby permitting Anderson to testify he had information
indicating Y. was gay, which the trial court had ruled inadmissible. Had Tarlow asked,
Anderson would have testified Y. took a girl to the prom and was evasive about it. Also,
Y. assertedly had an “odd relationship” with her best friend and seemed unusually
anxious to please her.
       Anderson declared Tarlow never discussed with him the feasibility of a challenge
to the recorded conversation on authentication grounds or based on the time disparity.
       4. Litigation with respect to the library confrontation.
       On August 22, 2005, Hon. Terri Schwartz ordered the prosecution to produce the
original recording of the library confrontation and the police interviews of Anderson
conducted on July 9 and July 30, 2004, and the equipment used to make them for
examination by the defense expert in the presence of a representative of the agency in
possession of the equipment, subject to the prosecutor‟s indication the agency would
claim the official information privilege under Evidence Code section 1040.
       On November 29, 2005, the defense filed numerous pretrial motions, two of which
are relevant here. One motion addressed the procedure governing the assertion of the
official information privilege and requested sanctions, including dismissal. The other
motion sought sanctions for the delay in complying with the order of August 22, 2005.
Both motions relied on a declaration of defense expert John Russ filed December 7, 2005,
under seal.

                                              8
       Russ, a fiber-optic engineer and an expert with respect to “recording analysis and
enhancement,” declared proper analysis of the recordings at issue required “access to the
real equipment and/or software, as well as the identity, the specifications (including serial
numbers, brand names and instruction manuals), the inspection and repair records, and/or
other similar information about some or all of (1) the microphones and containers
housing or concealing them when they were used; (2) any broadcasting devices; (3) all
cables and connections used; (4) possibly some or all component(s) of the recording
devices; and/or (5) all the equipment and/or software used to process or store the
recording after it was reduced to an original format.”
       Russ declared analysis of the recordings required “an audio expert to search for
and document subtle cues of evidentiary manipulation, as where the recording party
intends for the device to be capable of inaccurate or incomplete transmissions. Digital
media are more easily manipulable, and the manipulation is more difficult to detect, than
tape media. . . .” “[A]ccess to the original data is necessary to determine what, if any,
manipulation has occurred and whether the device was intentionally set up to be capable
of inaccurate or incomplete transmissions.” Russ opined “the microphone was not well
suited to the transmission and recording equipment.”
       In January of 2006, the People provided the defense a letter identifying the
recording equipment used to make the recordings. A memo from Attila Mathe, the
president of Adaptive Digital Systems (“ADS”), the manufacturer of the recording
device, is attached to the letter. The memo states recorded data is transferred from the
device to a write once CD or DVD and “write once” media is used to “add credibility to
the archived evidence.”
       On February 16, 2006, the matter was transferred to Department 100 for trial and
thereafter was assigned to Hon. Michael Pastor.




                                              9
       At a pretrial hearing on March 23, 2006, the prosecution provided the defense
disks of the original unenhanced recordings of the library conversation and the police
interviews of Anderson. At the hearing, defense counsel stated the disks were copies and
there was a dispute “about what the originals are” because “[t]he originals have been
taped over and don‟t exist.”
       Jury trial commenced on June 14, 2006.
       On June 27, 2006, the defense filed a motion seeking a ruling on the claim of the
official information privilege and whether sanctions should be imposed for its assertion.
The trial court conducted a hearing on the motion at which Sheriff‟s Detective Kurt Ebert
of the Southern California High Technology Task Force testified the microphone is
imbedded in the recorder and the device records “directly to flash memory inside” the
device and “the only way to get information out is to transfer it from the recorder to a
computer, and from the computer you subsequently copy those files to some archivable
permanent media you mark as evidence and make other copies or give to the investigator
or further enhance.” Ebert explained the original recording is in the manufacturer‟s
proprietary format and it is transferred to a computer with the manufacturer‟s proprietary
software. Ebert indicated the transfer is accomplished “with a pretty decent level of
verification. This thing was designed . . . for the FBI.” The original recording in
proprietary format is converted to a .wav file, “which is Windows standard format,” so it
can then be enhanced. Ebert took screen shots of the enhancement process to allow
anyone to duplicate the process but did not take a screen shot of the conversion of the
recording from the proprietary format to a .wav file. The original version of the
recording, the enhanced version and the screen shots were put on a CD that was provided
to the defense.




                                             10
       Regarding the privilege, Ebert testified, “the way [the device] works, and the
processes it does, and features it has, we feel [it] need[s] to be kept out of the realm of the
public. And the manufacturer, to my understanding, has federal mandates against the
stuff being released outside of law enforcement and the military.”
       The trial court conducted a further hearing in camera and sustained the claim of
privilege with respect to “the equipment itself, any proprietary processes regarding this
equipment as to its functionality and the specific features of the equipment, manuals
describing the features, and any attached or built-in devices . . . .”
       The defense thereafter requested an instruction advising the jury the prosecution
had refused to disclose information about the equipment used to record the conversation
and the jury should therefore disregard the recording. The defense argued it had been
deprived of a “meaningful attack” on the recording, citing Russ‟s previously filed
declaration, and claimed it had nothing with which to compare the enhanced version of
the recording. The trial court denied the request, ruling disclosure of the official
information was immaterial within the provisions of Evidence Code section 1042 and
would not “raise[] a reasonable possibility of exoneration.”
       In a letter from Russ to defense counsel Sahu dated July 14, 2006, the same day as
the trial court‟s ruling on the claim of privilege, Russ indicated the recordings he had
been provided appear to be normal but he needed to compare them to the originals in
order to detect any alterations or edits.
       5. Tarlow’s letter to habeas counsel. (Exhibit B to the petition.)
       In letters dated August 19, 2009, October 12, 2010, and November 29, 2010,
habeas counsel asked Tarlow to address the “time disparity” and Anderson‟s claim
substantial conversation was missing from the recording. The letter of August 19, 2009,
enclosed “a draft declaration confirming that [the failure to attack the recording based on
the time disparity] was an oversight on [Tarlow‟s] part . . . .” In the subsequent letters,
habeas counsel inquired whether Tarlow had considered “any other potential challenges
to the admissibility/reliability” of the recorded conversation.


                                              11
       Tarlow responded in a letter dated December 30, 2010, exhibit B to the habeas
petition. In the letter, Tarlow stated he could not sign the declaration enclosed with the
August 19, 2009 correspondence “because it was not accurate.” Regarding the time
disparity, Tarlow noted “Jester‟s estimate that the „duration‟ of the library meeting was
about 15 minutes does not determine the length of the actual conversation or support a
claim that 3 minutes of conversation is missing.” Also, raising the issue of the time
disparity had negative implications for Anderson as he had been “recorded insisting that
the conversation/meeting was 3 minutes long.”
       Regarding the assertedly omitted conversation, Tarlow agreed Anderson
“repeatedly” claimed the conversation started with Y. saying, “ „you ruined my life,‟ and
that it was not on the recording.” Anderson also “may well have claimed to me at times
that there was a small amount of additional conversation also missing.” However,
Tarlow denied Anderson ever claimed “there were 3 minutes of missing conversation or
2 minutes.” Tarlow indicated “[Anderson] was discussing a missing portion of seconds
with me not 3 minutes.”
       Regarding “any other potential challenges” to the recording of the library
confrontation, Tarlow wrote: “I certainly recall that I considered attacking the
admissibility/reliability of the library tape recordings. [W]e . . . thoroughly reviewed and
analyzed all of the issues involving potential Secondary Evidence, Best Evidence, and
Authentication, objections to the admissibility of the library recording.”
       Tarlow noted the defense raised authentication and secondary evidence issues with
respect to documents in Y.‟s computer and stated: “I determined that the best available
approach was the one we followed . . . . We [sought] access to all of the necessary
original recordings, manuals and microphones, as well as the computers involved in the
enhancement process and the production process. Without these materials we could not
move forward to persuasively assert Constitutional or Evidentiary objections or
demonstrate the recordings had been manipulated.”




                                             12
       6. Other relevant declarations.
       In exhibit A to the petition, defense expert Russ declared that, after contracting
with Tarlow, he interacted exclusively with associate counsel Sahu. Russ stated he
“emphasized” to Sahu the defense had not been provided original recording data and
without that data, “reliable authentication of the CDs was virtually impossible.” Russ
stated the procedure recommended by ADS, i.e., transfer to a write once CD, “is a
reliable means of producing an accurate surrogate or proxy for the original digital data.
However, . . . in the Anderson case . . . the original data was transferred from the recorder
to the computer used by the law enforcement agent assigned to the case.” Russ declared
that, once the original data had been deleted from the recording device, “the recorder
could provide no assistance in determining the authenticity of the CD copies provided by
the prosecution.” Russ also claimed he “suggested” Sahu “consider having the CDs
examined by another expert with more specialized background in digital recording
issues.”
       In exhibit S to the petition, habeas counsel asserts a thorough search of “defense
counsel‟s files and billing records” revealed “no indication of any research, memoranda
or other work product reflecting consideration of Evidence Code section 1400, et seq.”
       Exhibit H to the petition is a declaration from habeas counsel indicating that on
December 20, 2010, Sergeant Powell of the Sheriff‟s Technical Crew stated he was
aware the manufacturer of the recording device recommended transfer of digitally
recorded data to a write once CD but, as a matter of internal policy, the Sheriff‟s
Department transferred data from the recorder to a computer and did not make a screen
shot of the transfer.
       7. Declarations re indicia of alteration of the recorded conversation.
       In support of the petition, Anderson submitted declarations of four experts.
       Yi Xu, Ph.D., an associate professor at University College London who
specialized in “speech prosody,” declared he found anomalies in the library recording
which are incompatible with the limitations of human vocalization. At 52:59 of the
recording, just prior to the phrase “Why did you molest me?”, Xu found four male vocal

                                             13
pulses with a total duration of 29.3 milliseconds. However, a human utterance requires a
minimum of 46 milliseconds. Xu opined, “[t]his brief vocalization is most likely the
beginning of a longer utterance that has been foreshortened through some mechanical
means during the processing of the recording.”
       At 53:07 of the recording, between the end of the phrase, “Why did you molest
me?” and the beginning of the next phrase, Xu found the pitch of the female voice rises
150 Hz in 189.05 milliseconds, which exceeds the capacity of an untrained voice. The
“brevity of the rise time makes it unlikely these utterances were spoken one after another,
as currently found on the recording.”
       At 54:47 of the recording, Xu found a pause of 62.9 milliseconds between two
female utterances, which is too short to be a normal pause, and concluded these
“utterances were therefore unlikely to have been spoken as they appear on the recording.”
       Xu indicated each anomaly “casts serious doubt as to the authenticity of the
recording of the conversation,” and “[w]hen viewed cumulatively, they constitute strong
evidence that the recording, as currently constituted, was altered from the original
conversation by some mechanical or digital means.”
       In a supplemental declaration, Xu asserted the pitch levels of Anderson‟s first six
utterances are below normal levels for social conversation and fall in the pitch range
indicating sadness. Thus, Anderson‟s first utterances likely were “made after . . . some
conversation that induced the sad emotional tenor . . . .”
       Curtis Crowe, assertedly an expert in the analysis of digital recordings, found an
electronic spike at 45:05 of the recording, approximately two seconds after a female
voice says, “Hey,” in a low tone. This spike “appears to contain two distinct impulses of
differing timing characteristics.” The sound and shape of the impulse “is consistent with
what we may see after a digital edit.”
       At 46:12.8, a male voice is cut off abruptly in a manner “consistent with a recorder
dropout or editing.” A similar abrupt termination occurs at 46:21.6, of the recording.
Finally, Crowe detected a 58.3 Hz signal, which is not normally associated with an
outdoor environment. The signal begins prior to the first word of the conversation and

                                             14
stops almost exactly at the end of the conversation. Crowe could find no potential source
of this signal at or near where the conversation occurred.
       Craig Schick, B.S., an electronics engineer, also detected the 58.3 Hz signal which
commenced shortly before the start of the conversation. None of the comparison
recordings Schick made outside the library included a 58.3 Hz signal. Schick concluded
the recording had been edited in an environment that allowed the introduction of a 58.3
Hz signal, like a laboratory or office, and asserted with certainty the recording had been
“adulterated.”
       In a second declaration submitted with the traverse, Crowe indicated he analyzed
the sound of footfalls at the start of the recording and compared them to the sound of Y.‟s
footfalls as she walked from the scene of the conversation, at first on grass and then on
concrete. Crowe concluded the footfalls at the start of the conversation “appear to be
made on a hard or concrete surface,” not on the grassy surface where the conversation
occurred. Also, the sound of Y.‟s footfalls as she walked from the conversation are
distinctly different and consistent with the grassy surface where the conversation
occurred. “These anomalies, taken together, provide a stronger basis for inference that
the recording has been altered.”
       Catalin Grigoras, Ph.D., found three “counter” anomalies that indicate audio data
is missing from the recording. A two second jump occurs at 12:41:57. Four second
jumps occur at 13:04:53 and at 13:28:21, the latter occurring during conversation.
Grigoras hypothesized the missing data could be caused by recording system
malfunction, human intervention to delete data blocks or “an audio signal played back
through the microphone input that can be followed by human intervention on the file
structure to edit data blocks.” Grigoras declared: “Any intentional alteration that would
not be detected as a counter skip anomaly would likely necessitate a two-step process of
(a) editing the content of the recording while in WAV format, and then (b) re-recording
the edited version onto the recorder initially used. . . . [I]n order to determine the
feasibility of an intentional alteration, I need to examine the recorder used to make the
recording in this case.”

                                              15
       Finally, in the traverse, habeas counsel notes the recording of the library
conversation provided to the defense in December of 2010 bears a time stamp that
coincides with the observations of the surveilling deputies. However, a time stamp in the
“Properties” file of the same recording indicates the first file was transferred from the
recorder to a computer at 2:23 p.m. However, Detective Jester‟s case journal indicates he
did not deliver the recorder to the Sheriff‟s Technical Operations Office until 2:55 p.m.
       8. Declarations submitted with the return.
       In exhibit No. 2 to the return, Detective Jester declared the entries in his journal
reflect the time Jester received information, not the time the event occurred. Also, 1:25
p.m. indicates when Anderson arrived at the library, not when he began speaking to Y.
The 1:39 p.m. entry indicates when Jester was informed Y. had walked into the library
and was safe. Also, Jester records time without regard to seconds. Thus, 1:25 p.m. could
reflect a real time of either 1:25:05 or 1:25:55.
       In exhibit No. 3 to the return, Detective Ebert declared: “Generally, when
transferring a recording from a recorder made by Adaptive Digital Systems („ADS‟),
I would transfer the recording to a computer. This was done using proprietary software
from ADS, and the resultant file was in a proprietary format. I would then make at least
two exact CD copies of the recording in the proprietary format. One CD was archived,
and the other was given to the investigator on the case.” “The recording in this
proprietary format could only be played using the proprietary software, or converted to a
.wav file. It could not be edited, altered, or manipulated in any way. The recording in
this proprietary format was therefore protected.”
       “I generally transferred recordings from the ADS recorder to a computer instead of
to a write-once CD for two main reasons. First, it saved time because it was time-
consuming to transfer to a CD, and if there was an error, the entire process would have to
be repeated. Second, we usually needed multiple copies of a recording, and it was easier
and more reliable to make a CD from the computer than from another CD.” After Ebert
had “two good copies” of a recording in the proprietary format, the recording would be
erased so the recorder could be used again.

                                              16
        Ebert declared: “The transfer process from the recorder to the computer was an
automatic process. I would click a button that said „Transfer,‟ and . . . proprietary
software would then transfer the recording in its own format. . . . There was no way to
alter, manipulate, or edit the file during this process.” “Conversion from the proprietary
format to a .wav file was also an automatic process using the proprietary software. . . .
There was no way to alter, manipulate, or edit the file during this process. However,
once a file was in a .wav format, it was unprotected and could be easily edited or
enhanced by anyone who had it.” “In the thousands of recordings that I have worked on,
I never altered, manipulated, or edited any file without documenting it, as described
above . . . .”
        In exhibit No. 4 to the return, Sheriff‟s Sergeant John Powell declared:
“The original recording of the library conversation between Anderson and the victim
was provided to the defense in its proprietary format.” Further, in February of 2011,
Powell received a telephone call from Attila Mathe, the president of ADS, referring to a
letter Mathe had received from habeas counsel. The letter advised Mathe that habeas
counsel had “the recording in its proprietary format, and was able to play that recording
using the proprietary software, USB Bird Player . . . .” However, habeas counsel
“identified two separate places in the proprietary version of the recording where the time
skipped about three seconds: 13:04:53 and 13:28:22. He requested that ADS attempt to
restore the missing data.”
        After Powell verified habeas counsel‟s observations, he sent Mathe the recording
device and asked “him to have someone look at the original data files to see if there was a
clock error or something else. . . . In response, Mr. Mathe wrote the letter that is attached
to the Petition as exhibit O.”
        Exhibit O to the petition, an undated and unaddressed letter from Mathe, indicates:
“Blocks of the recording corresponding to the two missing approximately 3 second
sections contained zeros instead of audio data.” A diagnostic routine revealed two “bad
memory blocks” in the recorder which correspond with the segments of the recording that
contained zeros. Mathe concluded the two missing segments were the result of “memory

                                             17
block failure. . . . During the examination we did not find any evidence of data
tampering.”
                                       CONTENTIONS
       Anderson contends defense counsel rendered ineffective assistance in failing to
challenge the admissibility of the recording of the library confrontation on authentication
grounds, in failing to protect Anderson‟s right to testify fully and credibly regarding the
library confrontation, and in failing to investigate indicia of alteration of the recording of
the library confrontation. In the traverse, Anderson insists an evidentiary hearing is
necessary to resolve numerous factual matters.5
                                       DISCUSSION
       1. Anderson’s claim of approximately two or three minutes of unrecorded
conversation is entirely incredible.
       Anderson declares he advised Tarlow before their first meeting there was an
extended unrecorded conversation at the outset of the library confrontation in which Y.
accused him of sexual molestation and he denied it. Anderson claims this missing
conversation was critical to the jury‟s understanding of his explanation of the recorded
portion of the conversation. Anderson argues defense counsel rendered ineffective
assistance in failing to elicit Anderson‟s version of the conversation to allow Anderson to
testify to “his own version of events in his own words.” (Rock v. Arkansas (1987)
483 U.S. 44, 52 [97 L.Ed.2d 37].) Instead, during preparation for trial, defense counsel
told Anderson not to question the authenticity of the recording. Anderson asserts his
claim the recording did not include a portion of the conversation is supported by the time
disparity as well as the absence of normal social salutations at the start of the
conversation and the tenor of the initial exchange which suggests something not currently
contained in the recording caused Anderson to say he feared a break down.


5
       Anderson has not presented a declaration from any of the three attorneys who
represented him at trial. Tarlow‟s letter to habeas counsel, exhibit B, is not submitted
under penalty of perjury. However, as relevant to the resolution of Anderson‟s writ
petition, the matters set forth in Tarlow‟s letter are apparently based on the record.
                                              18
       “A petition for a writ of habeas corpus is a collateral attack on a presumptively
final judgment; therefore, „the petitioner bears a heavy burden initially to plead sufficient
grounds for relief, and then later to prove them‟ [citation].” (In re Crew (2011)
52 Cal.4th 126, 149.) Anderson has failed to carry this burden.
       Anderson‟s claim that two or three minutes of conversation are missing from the
recording is inconsistent with his prior statements found in the record. In the letter to
Chief Ferris and in the interviews of Anderson conducted on July 9 and July 30, 2004,
Anderson said the conversation was brief, lasting only a few minutes. He did not state on
any of these three occasions that Y. accused him of molestation at the outset of the
conversation and he denied it. In the interview conducted by Detectives Boyett and
Duncan on July 9, 2004, Anderson denied that Y. mentioned molestation during the
library confrontation.
       Also, Anderson testified at length at trial and was questioned, line by line, about
the library confrontation. He did not testify the conversation started with Y.‟s accusation
of sexual molestation and his denial. His claim that, on advice of counsel, he failed to
mention substantial unrecorded conversation that supported his position is not worthy of
belief.6
       The time disparity does not support Anderson‟s claim of substantial unrecorded
conversation. Detective Jester explained in his declaration he recorded the time events
were reported to him, not the time the events occurred, and he disregarded seconds when
he recorded the relevant times. Also, the 1:25 p.m. entry reflects the time Anderson


6
        Anderson‟s lack of credibility in this regard likely informed the decision to file the
instant writ petition in this court, rather than the trial court. We note that, after the People
requested dismissal of Anderson‟s petition for failure to state his CDC number, place of
incarceration and “the circumstances justifying an application to this court,” rather than
the trial court (Cal. Rules of Court, rule 8.384(a)(1); Form MC-275, p. 6), Anderson
provided his CDC number and place of incarceration but did not state the circumstances
justifying application to this court in the first instance. The failure to address this point,
in our view, speaks to Anderson‟s desire to avoid further litigation before Judge Pastor,
who found Anderson‟s trial testimony incredible and so advised Anderson‟s supporters at
sentencing.
                                              19
arrived at the library, not the start of the conversation, and the 1:39 entry indicates when
Y. entered the library at the end of the conversation. Thus, the 14-minute duration of the
meeting as reflected in Jester‟s case journal is consistent with a 12-minute recorded
conversation.
         With respect to Anderson‟s argument the conversation begins awkwardly and
nothing on the recording explains why Anderson feared a breakdown at the outset, this
was not a normal social encounter. Anderson and Y. had not met face-to-face in
approximately one year and, in the interim, Y. had written e-mails to Anderson advising
him of the distress occasioned by his abuse, her struggle with whether to report him and
her insistence that Anderson participate in therapy. Given the circumstances, it is not
surprising that the conversation begins in a disjointed and emotional manner.
         Thus, we reject as incredible Anderson‟s claim there was extended unrecorded
conversation at the outset of the library confrontation in which Y. specifically accused
him of sexual molestation and he denied it. Tarlow cannot be faulted for failing to elicit
Anderson‟s testimony in this regard and referral of the matter for an evidentiary hearing
to determine the truth of Anderson‟s assertion would constitute an idle act.
         2. No ineffective assistance with respect to the failure to object to the recording of
the library confrontation on authentication grounds.
                a. Authentication.
         Evidence Code sections 1400 and 1401 require a writing to be authenticated
before the writing or secondary evidence of its content may be received in evidence. 7
A ”writing” includes an audio recording. (§ 250.) “Authentication of a writing means
(a) the introduction of evidence sufficient to sustain a finding that it is the writing that the
proponent of the evidence claims it is or (b) the establishment of such facts by any other
means provided by law.” (People v. Skiles (2011) 51 Cal.4th 1178, 1187, citing section
1400.)




7
         Subsequent unspecified statutory references are to the Evidence Code.
                                               20
       Authentication is a preliminary fact first determined by the trial court subject to
redetermination by the jury. (People v. Marshall (1996) 13 Cal.4th 799, 832; People v.
Fonville (1973) 35 Cal.App.3d 693, 708-709.) The proponent of the writing has the
burden of establishing its authenticity. The proponent‟s threshold burden “is not to
establish validity or negate falsity in a categorical fashion, but rather to make a showing
on which the trier of fact reasonably could conclude the proffered writing is authentic.”
(People v. Valdez (2011) 201 Cal.App.4th 1429, 1437.)
       The proponent‟s burden is met “when sufficient evidence has been produced to
sustain a finding that the document is what it purports to be [citation].” (Jazayeri v. Mao
(2009) 174 Cal.App.4th 301, 321.) “This foundation is usually provided by the testimony
of a person who was present at the time the picture was taken, or who is otherwise
qualified to state that the representation is accurate.” (People v. Bowley (1963) 59 Cal.2d
855, 862.)
       When sufficient evidence of authenticity is provided, “[t]he trial court [is] required
to admit the document in evidence . . . .” (People v. Morris (1991) 53 Cal.3d 152, 205,
disapproved on other grounds in People v. Stansbury (1995) 9 Cal.4th 824, 830, fn. 1.)
The fact that “ „conflicting inferences can be drawn regarding authenticity goes to the
document‟s weight as evidence, not its admissibility.‟ ” (People v. Valdez, supra,
201 Cal.App.4th at p. 1435, quoting Jazayeri v. Mao, supra, 174 Cal.App.4th at p. 321.)
       With respect to alteration, section 1402 states, “The party producing a writing as
genuine which has been altered, or appears to have been altered, after its execution, in a
part material to the question in dispute, must account for the alteration or appearance
thereof. He may show that the alteration was made by another, without his concurrence,
or was made with the consent of the parties affected by it, or otherwise properly or
innocently made, or that the alteration did not change the meaning or language of the
instrument. If he does that, he may give the writing in evidence, but not otherwise.”
(§ 1402.) Under section 1402, the test of materiality of an alteration is “whether it
changes the rights or duties of the parties, or either of them.” (Consolidated Loan Co.
v. Harman (1957) 150 Cal.App.2d 488, 491.)

                                             21
       We review a ruling on authentication matters for an abuse of discretion.
(People v. Hovarter (2008) 44 Cal.4th 983, 1014.)
              b. Anderson’s contention.
       Anderson contends defense counsel knew or should have known the People would
have difficulty authenticating the recording of the library confrontation based on his
consistent claim the conversation began with Y saying, “You ruined my life,” which is
not included in the recording, and the failure of the Sheriff‟s Department to memorialize
the original data in the manner prescribed by the manufacturer. Also, had defense
counsel consulted other experts as Russ assertedly recommended, the defense could have
shown the vocal anomalies uncovered by the habeas experts which cast doubt on the
integrity of the recording and constitute strong evidence the recording was altered.
Anderson claims a timely challenge would have resulted in exclusion of the recording or
admission of the recording with evidence calling its authenticity into question and an
instruction directing the jury to determine its authenticity before considering it.
According to Anderson, either result undermined the prosecution‟s case and supports a
finding of prejudice.
              c. Y.’s testimony, corroborated by Ebert’s testimony, was sufficient to
authenticate the recording.
       Before the grand jury, the prosecutor asked Y. to listen to the recording because
“I am going to ask you afterwards . . . if this is the complete conversation between both
of you.” After playing the recording, the prosecutor asked if “that was an accurate tape
of the conversation,” and Y. responded, “Yes.”
       When a knowledgeable witness testifies a writing or recording is accurate, the trial
court is “amply justified in rejecting defendant‟s view that the copy was altered or
incomplete.” (People v. Morris, supra, 53 Cal.3d at p. 205 [trial court properly rejected
authentication objection where defendant claimed a page of his letter was missing and
handwriting expert suggested possibility of a missing page, but recipient testified letter
was accurate]; People v. Bowley, supra, 59 Cal.2d at p. 862.) Similarly, at trial Y.


                                             22
testified she had the recorder in her purse when she met Anderson at the library and the
recording was an accurate rendition of their conversation.
       Defense counsel would have been familiar with the grand jury proceedings and
thus would have been aware of Y.‟s ability to authenticate the recording of the library
confrontation. Because an authentication challenge to the library recording would have
failed, the decision not to bring a futile motion was a reasonable strategic choice.
(See People v. Prieto (2003) 30 Cal.4th 226, 261 [“counsel‟s decision to forgo
implausible arguments or objections does not constitute deficient performance”];
People v. Torrez (1995) 31 Cal.App.4th 1084, 1091 [counsel is not required to make
futile motions to appear competent].)
       Y.‟s testimony was corroborated by Detective Ebert‟s testimony in the trial court
and by declaration here. Ebert explained the procedure by which he transferred the
original digital data to a computer in proprietary format and thereafter placed copies of
the proprietary file on CD‟s provided to the defense. Ebert declared he “never altered,
manipulated, or edited any file without documenting” the editing process. Given Ebert‟s
testimony, any material alteration to the recording, other than the documented
enhancements performed on the recording, must have been innocently made.
       Anderson argues the Grigoras declaration demonstrates alteration of the recording
was not innocent. Grigoras declared that, in order to edit the recording so as to eliminate
the blank blocks where erasures had occurred, the original recording would have to be
removed from the recording device, converted to a .wav file which would have been
edited and then re-recorded onto the device in the edited form. Such a course of conduct
would have required a concerted effort on behalf of law enforcement and simply is not
plausible. (See People v. Lewis and Oliver (2006) 39 Cal.4th 970, 992 [affirming denial
of motion for discovery of police personnel records finding defendant‟s “grandiose”
allegations of a police conspiracy to frame him were not plausible].)
       Based on the foregoing, we confidently conclude the recording of the library
confrontation would have survived an authentication challenge. As previously noted, the
time disparity and the awkward nature of the start of the conversation do not indicate

                                             23
portions of the recording had not been recorded. They similarly do not indicate the
recording had been altered.
       Russ‟s most recent declaration states he “suggested” Sahu “consider having the
recording examined by an expert with more specialized background in digital recording
issues.” Russ does not indicate when he made this suggestion and the suggestion does
not appear in Russ‟s letter to counsel dated July 14, 2006.
       In any event, even had defense counsel raised the anomalies noted by the habeas
experts, the absence of a screen-shot of the initial transfer from the recorder to the
computer, and the time discrepancy in the Properties window of the file provided to the
defense, these matters would have gone to the weight of the evidence, not its
admissibility. (See People v. Martinez (2000) 22 Cal.4th 106, 128 [“[A]n objection that a
[computerized] record is „incomplete‟ generally „go[es] to the weight of th[e] evidence
and not its admissibility‟ ”]; Jazayeri v. Mao, supra, 174 Cal.App.4th at p. 321.)
       Assuming the science Anderson‟s experts rely upon, such as speech prosody,
would have been admissible in court (see People v. Kelly (1976) 17 Cal.3d 24, 30,
abrogated by statute on another point as explained in People v. Wilkinson (2004)
33 Cal.4th 821, 845-848), the anomalies found by Anderson‟s habeas experts fail to
inspire any confidence in a reasonable probability of a different result. Two three-second
jumps identified by the recorder‟s manufacturer due to memory block failure likely
would provide an innocent explanation for at least some of the anomalies detected by the
experts. In any event, the declarations of the habeas experts would not have overcome
Y.‟s testimony the conversation was accurately recorded and Detective Ebert‟s testimony
about how the recording was transferred from the recording device to a computer in
proprietary format.
       Further, under section 1402, the prosecution only would have been required to
explain any real or apparent alteration that was “material to the question in dispute.”
(§ 1402; People v. Hovarter, supra, 44 Cal.4th at p. 1014.) The asserted omission of
“You ruined my life,” was entirely consistent with the rest of the recorded conversation
and thus not material to any question in dispute. Also, Anderson has failed to show the

                                             24
recording was altered “after its execution,” as opposed to omitting a portion of the
conversation. (§ 1402; see People v. Hovarter, supra, at p. 1014 [defendant challenged
authentication of document on which handwritten markings may not have existed on the
originals].) Because there was no indication the recording had been materially altered,
there was no “genuine dispute . . . concerning material terms.” (§ 1521, subd. (a)(1).)
Nor was there any showing that “justice require[d] the exclusion” of the recording or that
admission of secondary evidence of its content would be unfair. (§ 1521, subd. (a)(1)
& (2).) Consequently, even if the CDs did not qualify as originals, they were admissible
secondary evidence.
       Anderson also invokes section 412, which provides, “If weaker and less
satisfactory evidence is offered when it was within the power of the party to produce
stronger and more satisfactory evidence, the evidence offered should be viewed with
distrust.” Because the record indicates the defense had a digital copy of the recording in
proprietary format, section 412 has no application.
       In sum, the new declarations do not support a finding of a material alteration of the
recording or contradict Anderson‟s admissions in the recorded conversation.
       Further, it appears defense counsel acted reasonably in seeking to obtain the
recording device and, when the trial court upheld the claim of official information
privilege, seeking sanctions under section 1040. The Russ declaration filed under seal in
the trial court indicated detection of any manipulation of the recording required access to
the original recording, microphone, recording device and “all the equipment and/or
software used to process or store the recording after it was reduced to an original format.”
Russ told defense counsel he could not do a meaningful analysis without the original
recording or recorder, the recordings he had “seem[ed] to be normal,” and alterations in
digital recordings were difficult to detect. Based on this advice, defense counsel
reasonably focused on obtaining access to the recording equipment used to record the
conversation as well as the original recording. (See People v. Williams (1988) 44 Cal.3d
883, 945-946; Fields v. Brown (9th Cir. 2005) 431 F.3d 1186, 1205.)


                                            25
       Indeed, habeas expert Grigoras reiterated the need for the recording equipment and
declared that, in order to determine the feasibility of an intentional alteration of the
recording, he had to examine the recording device. Thus, defense counsel cannot be seen
to have acted unreasonably in seeking to obtain the equipment used to make the
recording.
       The absence of any indication defense counsel considered an authentication
challenge to the recording of the library confrontation in defense counsel‟s files or billing
records does not show defense counsel failed to consider such a challenge or
misunderstood the burden of proof in an authentication proceeding. Defense counsel
objected to the introduction of other evidence, such as Y.‟s e-mails to Anderson, on
authentication grounds. The trial court overruled the objection and admitted many e-
mails into evidence, even where Y.‟s testimony was the only evidence supporting the
claim the e-mails had been sent. Thus, the record demonstrates defense counsel was
aware of the availability of an authentication challenge.
       Further, Anderson‟s claim Y. started the conversation by saying, “You ruined by
life,” carried with it substantial negative implications for Anderson. Had Anderson made
this claim at trial, it would have prompted the prosecution to cross-examine Anderson
with respect to his repeated insistence the meeting lasted only three minutes. This would
have permitted the prosecution to argue Anderson‟s attempt to dismiss the conversation
as a brief encounter demonstrated consciousness of guilt. Thus, defense counsel
reasonably could conclude Y.‟s asserted statement, “You ruined my life,” was
unnecessary to Anderson‟s defense and, in fact, harmed his case. Such a tactical decision
was well within the wide range of reasonable professional assistance. (Strickland v.
Washington, supra, 466 U.S. at p. 689.)




                                              26
        3. Failure to protect Anderson’s right to testify fully and credibly in his own
defense.
        During the recorded conversation, Y. complained she had experienced difficulty
with interpersonal relationships, showed Anderson cuts on her arms and demanded an
explanation. Anderson eventually said, “I‟m sorry, [Y.]”
        Anderson contends defense counsel should have asked the trial court to permit
Anderson to testify Y.‟s sexual orientation caused her self-destructive behavior and
difficulty with relationships. However, the trial court sustained relevance objections
whenever defense counsel attempted to elicit this information. During cross-examination
of Y.‟s friend, the trial court sustained a relevance objection when defense counsel asked
if she and Y. were “girlfriend and girlfriend.”
        At the close of Y.‟s trial testimony, defense counsel asked that Y. remain on call,
noting the prosecutor intended to elicit the opinion of an expert “that cutting and burning
is [a] symptom of sexual molestation . . . .” Defense counsel argued such behavior can
also be caused by sexual identity issues and offered to demonstrate Y. “is gay and
therefore had these problems which an expert will testify are reasons for cutting and
burning.”
        The trial court ruled both sides could ask the experts about factors that could cause
someone to cut or burn themselves and could inquire “regarding specific factors like
anxiety and depression, and physical abuse, and sexual abuse, and issues regarding sexual
orientation or sexual dysfunction as precipitating cutting and burning . . . . [¶] But to
specifically make direct comments upon the sexuality, sexual orientation of a nine, ten,
12, eleven, 13-year-old, or 14-year-old” would be precluded under section 352. The trial
court also noted the issue was disputed and collateral and would “engender even more
delays in this case . . . .”




                                             27
       Defense counsel argued the expert testimony would have no meaning if the
defense could not also present evidence indicating Y. is gay. The trial court indicated it
would allow the inquiry if it “relate[d] to substantive issues in this case,” but no such
showing had been made.
       Thereafter, defense counsel elicited Anderson‟s testimony he “knew the reasons
for the cutting. Well, I assume the reasons for the cutting.” However, defense counsel
did not ask Anderson what those reasons were, hoping the prosecutor would cross-
examine Anderson on this point, thereby opening the door to the evidence. Anderson
claims defense counsel should have asked the trial court to revisit its ruling. He argues
his knowledge of Y.‟s sexual orientation was essential to explain his conduct during the
library conversation and thus related to a substantive issue in the case. He notes defense
counsel argued to the jury there was an explanation for Y.‟s difficulties but it was not in
the record because no one asked Anderson about it. Anderson asserts the jury must have
viewed this as bizarre, given that defense counsel conducted extensive examination of
Anderson.
       However, the jury likely concluded defense counsel would have asked Anderson
the source of Y.‟s difficulty had the trial court permitted the inquiry. In any event,
defense counsel reasonably could conclude the trial court would not change its ruling
merely because Anderson believed Y.‟s sexual orientation was the cause of her
destructive behavior. (People v. Prieto, supra, 30 Cal.4th at p. 261.)
       Further, the defense presented evidence indicating Y. had been the victim of
physical abuse at the hands of her father in 1998 which resulted in a referral to the
Department of Children and Family Services. Thus, even without the sexual identity
evidence, the defense suggested explanations for Y.‟s destructive behavior other than
sexual molestation. No ineffective assistance of counsel appears.




                                             28
                                  DISPOSITION
     The petition is denied. The order to show cause is discharged.
     NOT TO BE PUBLISHED IN THE OFFICIAL REPORTS




                                              KLEIN, P. J.


We concur:



             CROSKEY, J.




             KITCHING, J.




                                         29
