FILED
United States Court of Appeals
Tenth Circuit
UNITED STATES COURT OF APPEALS May 25, 2011
Elisabeth A. Shumaker
TENTH CIRCUIT Clerk of Court
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
v. No. 10-7087
JOSEPH WILLIAM HEATH, (D.C. No. 6:CR-10-00018-RAW-1)
(E. D. Okla.)
Defendant-Appellant.
ORDER AND JUDGMENT *
Before BRISCOE, Chief Judge, ANDERSON and MURPHY, Circuit Judges.
After examining the briefs and appellate record, this panel has determined
unanimously to honor the parties’ request for a decision on the briefs without oral
argument. See Fed. R. App. P. 34(f); 10th Cir. R. 34.1(G). The case is,
therefore, submitted without oral argument.
Joseph William Heath pleaded guilty, without a plea agreement, to
conspiracy to commit fraud in connection with access devices, in violation of 18
*
This order and judgment is not binding precedent, except under the
doctrines of law of the case, res judicata, and collateral estoppel. It may be cited,
however, for its persuasive value consistent with Fed. R. App. P. 32.1 and 10th
Cir. R. 32.1.
U.S.C. § 371. He was sentenced to thirty-two months’ incarceration and thirty-
six months’ supervised release. Heath challenges the procedural reasonableness
of his sentence, arguing that the district court improperly included a ten-level
upward adjustment pursuant to U.S.S.G. § 2B1.1(b)(1)(F) based on an amount of
loss greater than $120,000 but less than $200,000 and a four-level “leader or
organizer” enhancement pursuant to U.S.S.G. § 3B1.1(a). Exercising jurisdiction
pursuant to 18 U.S.C. § 3742(a) and 28 U.S.C. § 1291, we affirm.
I. BACKGROUND
Pursuant to a criminal investigation in Durant, Oklahoma into a scheme to
use counterfeit credit cards to rent hotel rooms and steal items from the rooms,
the Durant Police Department received information from employees at a local
Hampton Inn that a group of individuals had rented two hotel rooms and that a
television was missing from one of the rooms. ROA, Vol. 3 at 4–5. When police
officers arrived at the Hampton Inn, an individual from the group was found
sleeping in one of the identified rooms. Id. at 5. Police officers questioned this
individual, and she revealed the identities of the remaining members of the group
and details regarding their vehicles. Id.
Based on this information, police officers located and stopped a “two-door
silver Honda Civic” that Heath and Sarah Puryear occupied. Id. When the
vehicle was stopped, police officers “observed a television that appeared to match
the description of the missing television . . . at the Hampton Inn.” Id. Heath and
2
Puryear were arrested. Id. The vehicle was impounded and, pursuant to a search
warrant, the following items were found in the vehicle:
265 registration forms from the Quality Inn, located [in] Arlington, Texas,
which included copies of drivers licenses, credit card numbers, credit card
expiration dates, and home addresses of persons who had previously stayed
at the hotel; 14 altered gift cards; 20 unaltered gift cards, 3 label makers; 6
labels with credit card numbers and letters printed on them; 15 sheets of
Avery easy peal labels; 2 packages of Avery self adhesive laminating
sheets; and, 2 multi-colored fingernail sanding blocks.
Id. During questioning, Puryear explained that:
Heath had . . . obtained the credit card information from a friend of his who
was employed by the Quality Inn in Arlington, Texas. This employee
showed Heath where the daily credit card receipts were stored. Heath
would go there, break into the room and remove the documents. . . . [T]he
information obtained was used by Heath to manufacture counterfeit credit
cards.
Id. at 6.
A grand jury returned a three-count indictment against Heath, along with
five other individuals, charging him with: (1) conspiracy to commit fraud in
connection with access devices, in violation of 18 U.S.C. § 371; (2) use of a
counterfeit access device, in violation of 18 U.S.C. § 1029(a)(1); and (3)
possession of fifteen or more counterfeit access devices, in violation of 18 U.S.C.
§ 1029(a)(3). ROA, Vol. 1 at 7–10. As one of the overt acts in furtherance of the
charged conspiracy, the indictment asserted:
[Heath] obtained valid credit card numbers, specifically:
a. 300 registration packets from a Quality Inn [in] . . . Arlington,
Texas. This information included copies of drivers licenses,
credit card numbers, credit card expiration dates and home
3
addresses of persons who had previously stayed at this hotel.
Id. at 8. Heath waived his “Sixth Amendment rights to a jury in all respects both
as to guilt or innocence and as to sentencing,” id. at 11, and he pleaded guilty,
without a plea agreement, to the conspiracy charged in the indictment, id. at 20.
The remaining charges in the indictment were dismissed. Id.
The presentence investigation report (PSR) identified the base offense level
as 6 for conspiracy to commit fraud in connection with access devices, in
violation of 18 U.S.C. § 371. ROA, Vol. 3 at 9 (applying U.S.S.G. § 2X1.1 to
incorporate the base offense level under U.S.S.G. § 2B1.1 for the substantive
offense of use of an access device, in violation of 18 U.S.C. § 1029). The PSR
then included the following upward adjustments: a ten-level upward adjustment
pursuant to U.S.S.G. § 2B1.1(b)(1)(F) based on the amount of intended loss from
the scheme calculated as $143,000; and a two-level upward adjustment pursuant
to U.S.S.G. § 2B1.1(b)(10)(A)(i) for the “possession or use of any device making
equipment.” ROA, Vol. 3 at 9–10. The PSR also included a four-level
enhancement pursuant to U.S.S.G. § 3B1.1(a) because Heath “was the organizer
of the fraudulent use of access devices that involved five other participants.”
ROA, Vol. 3 at 10.
With regard to the ten-level upward adjustment for the amount of loss, the
PSR explained that, while “[t]he actual loss in this case is $1,387.65,” “the total
intended loss in this case is $143,000.” Id. at 9–10. Pursuant to Application Note
4
3(F)(i) to U.S.S.G. § 2B1.1, the PSR calculated the intended loss amount based on
the fact that “[t]here were a minimum of 286 fraudulent ‘access devices’
possessed by [Heath] in this case” and applying an assumed “loss of $500.00 per
access device.” ROA, Vol. 3 at 10. As for the four-level “leader or organizer”
enhancement, the PSR explained that:
Heath secured fraudulent credit card numbers, recruited accomplices to
include Puryear, [Laura Madden, Melissa Kulp, Daniel Jeffery, and Kelly
Speigle], manufactured fraudulent credit cards and taught co-defendants to
manufacture fraudulent cards, thereby, establishing that he was the
organizer of the fraudulent use of access devices that involved five other
participants.
Id.
The PSR included a three-level reduction pursuant to U.S.S.G. §§ 3E1.1(a)
and (b) based on Heath’s “affirmative acceptance of personal responsibility for
his conduct.” ROA, Vol. 3 at 10. As a result, the PSR calculated Heath’s total
offense level as 19. Id. Based on the total offense level of 19 and his criminal
history category of I, the PSR identified Heath’s applicable sentencing guidelines
range as thirty to thirty-seven months’ incarceration. Id.
Heath filed two objections to the PSR. Id. at 16, 23. First, Heath objected
to the inclusion of the ten-level upward adjustment in his offense level, arguing
that the PSR lacked adequate evidence to support the calculated intended loss of
$143,000. Id. at 16. Heath specifically “dispute[d] that there is any proof
developed in this case to support” the proposition that he possessed a “minimum
5
of 286 fraudulent ‘access devices.’” Id. While he recognized that there were “a
number of credit card receipts that provide varying degrees of information which
may or may not be sufficient to . . . create a fraudulent credit card,” he argued
that “[a] credit card number in itself is not sufficient to create a fraudulent credit
card.” Id. Thus, he argued that “[a]n unused credit card number is not an access
device as that term is used in the sentencing guidelines.” Id. Second, Heath
objected to the inclusion of the four-level “leader or organizer” enhancement. Id.
at 23. He argued that the “events involved in this case did not support the
enhancement.” Id.
During sentencing, the district court addressed Heath’s objections. First,
with regard to Heath’s objection to the ten-level upward adjustment, the district
court overruled the objection and “f[ound] by a preponderance of the evidence
that the loss amount used in the calculation of the advisory guidelines was
appropriate as included in the [PSR].” ROA, Vol. 2 at 15. The district court
reasoned:
Pursuant to [U.S.S.G. §] 2B1.1, Application Note 3(A), loss is the
greater of actual or intended loss. Further, note (3)(F)(i) pertains to special
rules that shall be used to assist in determining a loss with regard to stolen
or counterfeit credit cards and access devices; purloined numbers -- access
devices; purloined numbers and codes. It states that in a case involving any
counterfeit access device or an unauthorized access device or unauthorized
access devices shall not be less than $500.00 per access device. This
subsection refers to Application Note 9(A) and subsequently 18 [U.S.C. §]
1029(e)(3), for the meaning given the term “unauthorized access device.[”]
Pursuant to 18 [U.S.C. §] 1029(e)(3), account numbers that can be used,
alone or in conjunction with another access device, to obtain money, goods,
6
services, or any other thing of value are considered access devices. Based
on the evidence in this case, the defendant possessed 286 account numbers.
These numbers were taken from registration forms which included copies
of driver’s licenses, credit card numbers, expiration dates, and home
addresses, in addition to the credit card account numbers.
Id. at 14–15. As a result, the district court determined that Heath possessed 286
“access devices” pursuant to 18 U.S.C. § 1029. See id. Based on the evidence
that Heath possessed 286 access devices and applying the assumed loss of five
hundred dollars per access device, the district court “found the same [$143,000]
of loss” as identified in the PSR. Id. at 15. Thus, the district court included the
ten-level upward adjustment pursuant to U.S.S.G. § 2B1.1(b)(1)(F) for a loss
greater than $120,000 but less than $200,000 when calculating Heath’s guidelines
range.
Second, the district court addressed Heath’s objection to the four-level
enhancement for his organizational or leadership role in the scheme. See id. at
15–17. The district court overruled Heath’s objection, “find[ing] by a
preponderance of the evidence that the defendant was an organizer/leader in this
scheme and is appropriately given a four level enhancement, pursuant to U.S.S.G.
[§] 3B1.1(a).” Id. at 16–17. The district court reasoned:
[U.S.S.G. §] 3B1.1, Application Note 4 states that the factors the
Court should consider for an aggravating role adjustment includes the
exercise of decision-making authority, the nature of participation in the
commission of offense, the recruitment of accomplices, the claimed right to
a larger share of the fruits of the crime, the degree of participation in
planning or organizing the offense, the nature and scope of the illegal
activity, and the degree of control and authority exercised over others.
7
Without Heath’s participation, there would have been no fraudulent access
devices. Heath obtained registration forms that include had [sic] copies of
driver’s license, credit card expiration dates, and home addresses, in
addition to the credit card account numbers, which were used in the
manufacture of fraudulent access devices . . . . Heath gave the illegally
obtained credit card information to co-defendants, . . . and taught them to
manufacture access devices and to call “merchant lines” to verify the
numbers were valid. At Heath’s direction, [Speigle and Jeffery] traveled to
Durant, Oklahoma, and used fraudulent cards, made by [H]eath, to secure
hotel rooms and merchandise.
Based on the evidence in this case, [Heath]’s actions of securing
fraudulent credit card numbers, recruiting accomplices, manufacturing
fraudulent credit cards and teaching others to manufacture fraudulent credit
cards establish that he was the organizer of the criminal activity involving
the fraudulent use of access devices. Furthermore, there were five other
participants that were less culpable participants in this scheme.
Id. at 15–16.
After considering the 18 U.S.C. § 3553(a) factors, the district court
sentenced Heath to thirty-two months’ incarceration and thirty-six months’
supervised release. Id. at 21–22. The district court also imposed restitution of
$765.09 against Heath and his co-defendants jointly and severally. Id. at 23.
Heath appeals his sentence.
II. ANALYSIS
On appeal, Heath reasserts his challenges to the inclusion of the ten-level
upward adjustment for the amount of loss and the four-level “leader or organizer”
enhancement when calculating his guidelines range. Aplt. Br. at 5. First, Heath
argues that the district court improperly applied a ten-level upward adjustment for
the intended amount of loss calculated based on his possession of 286 “access
8
devices.” He contends that evidence of his possession of 286 valid credit card
account numbers was insufficient to establish his possession of 286 “access
devices” under 18 U.S.C. § 1029. Id. at 9. Second, Heath argues that the district
court lacked sufficient evidence to justify a four-level enhancement for his
leadership or organizational role in the criminal activity. He contends that “[t]he
statements in the [PSR] do not support a determination that Heath was an
organizer or leader for purposes of [this enhancement].” Id. at 11–12.
A. Standard of review
This court reviews a criminal sentence for reasonableness, under a
deferential abuse of discretion standard. United States v. Alapizco-Valenzuela,
546 F.3d 1208, 1214 (10th Cir. 2008). This reasonableness review has both
procedural and substantive components. Id. On appeal, Heath challenges the
procedural reasonableness of his sentence, contending that the district court
improperly calculated his guidelines range. See Gall v. United States, 552 U.S.
38, 51 (2007) (explaining that procedural errors include “improperly calculating[]
the Guidelines range”). When evaluating the procedural reasonableness of a
sentence, this court “review[s] the district court’s legal conclusions regarding the
Guidelines de novo and its factual findings for clear error.” United States v.
Hamilton, 587 F.3d 1199, 1219 (10th Cir. 2009).
B. Upward adjustment based on the calculated amount of intended loss
9
Heath argues that the district court had inadequate evidence to support its
calculation of the amount of intended loss from the scheme. While Heath does
not dispute his possession of 286 valid credit card account numbers, he asserts
that the credit card account numbers themselves do not constitute “access
devices” within the meaning of 18 U.S.C. § 1029. This court reviews the district
court’s interpretation of the term “access device” de novo. 1 See Hamilton, 587
F.3d at 1222. We conclude that the valid credit card account numbers Heath
possessed constitute “access devices” under 18 U.S.C. § 1029 and that the district
court properly applied the ten-level upward adjustment based on the calculated
intended loss of $143,000.
Pursuant to U.S.S.G. § 2B1.1(b)(1)(F), when an offense involves fraud or
altered or counterfeit instruments and results in a loss that exceeds $120,000 but
is less than $200,000, ten levels are added to the base offense level. To determine
the amount of loss, Application Note 3 explains that the “loss is the greater of
actual loss or intended loss.” U.S.S.G. § 2B1.1 cmt. n.3(A). While the actual
1
Heath’s references to the district court’s fact-finding obligations pursuant
to Federal Rule of Criminal Procedure 32(i)(3)(B) are inapplicable in this context.
Rather than disputing the PSR’s factual findings, Heath challenged the application
of the guidelines to the facts. See United States v. Cereceres-Zavala, 499 F.3d
1211, 1215 (10th Cir. 2007) (explaining that “[a]rguments that challenge the
district court’s application of the guidelines to the facts and not the facts
themselves do not trigger any obligation on the part of the district court to make
specific findings” (internal quotation marks omitted)). Thus, Heath’s objection to
the PSR did not trigger the district court’s fact-finding obligations pursuant to
Rule 32(i)(3)(B).
10
loss incurred in this case was $1,387.65, ROA, Vol. 3 at 9, the district court
calculated the intended loss as $143,000, see ROA, Vol. 2 at 14 (agreeing to the
intended loss calculated in the PSR).
According to Application Note 3, intended loss “means the pecuniary harm
that was intended to result from the offense.” U.S.S.G. § 2B1.1 cmt. n.3(A)(ii).
The guidelines specify that, for offenses involving “any counterfeit access device
or unauthorized access device, loss . . . shall be not less than $500 per access
device.” Id. cmt. n.3(F)(i). To define the terms “counterfeit access device” and
“unauthorized access device,” the guidelines refer to the definitions in 18 U.S.C.
§ 1029. U.S.S.G. § 2B1.1 cmt. n.3(F)(i) (referring to id. cmt. n.9(A), which
incorporates the “meaning[s] given th[ose] term[s] in 18 U.S.C. § 1029[]”).
Pursuant to 18 U.S.C. §§ 1029(e)(2) and (3), the definitions of the terms
“counterfeit access device” and “unauthorized access device” both incorporate the
term “access device.” The term “access device” is then defined as:
any card, plate, code, account number, electronic serial number, mobile
identification number, personal identification number, or other
telecommunications service, equipment, or instrument identifier, or other
means of account access that can be used, alone or in conjunction with
another access device, to obtain money, goods, services, or any other thing
of value, or that can be used to initiate a transfer of funds (other than a
transfer originated solely by paper instrument).
18 U.S.C. § 1029(e)(1).
Heath argues that credit card account numbers alone do not constitute
“access devices” within the meaning of 18 U.S.C. § 1029(e)(1). See Aplt. Br. at
11
9. In his objections to the PSR, Heath asserted:
What there is in this case is a number of credit card receipts with varying
degrees of information which may or not be sufficient to allow the
information to be used to create a fraudulent credit card. The counterfeiter
needs not only the credit card number, but expiration date, name of credit
cardholder and billing address. Additionally, the card must be active at the
time of the attempted use.
ROA, Vol. 3 at 16. We disagree with Heath’s interpretation.
First, Heath’s interpretation of the term “access device” is inconsistent with
the plain language of the statute. The plain language of 18 U.S.C. § 1029(e)(1)
specifically identifies an “account number” as an “access device.” Further,
because the statute requires only that a “means of account access” be capable of
obtaining anything of value either alone or in conjunction with another access
device, Heath’s argument that a credit card account number is insufficient to
create a fraudulent credit card is meritless. 2 Thus, the valid credit card account
numbers Heath possessed constitute “access devices” pursuant to the plain
language of 18 U.S.C. § 1029(e)(1).
Second, Heath’s interpretation of the term “access device” is inconsistent
with this court’s prior statements regarding the scope of 18 U.S.C. § 1029. This
court has explained:
2
We note here that Heath’s own actions through his use of credit card
numbers and names assigned thereto to rent hotel rooms for himself and his
accomplices establish that an actual credit card need not be created in order “to
obtain money, goods, services, or any other thing of value . . . .” 18 U.S.C. §
1029(e)(1).
12
In enacting [18 U.S.C.] § 1029, Congress was focused upon the fraudulent
use of access devices in connection with credit transactions. Congress
sought to address the growing problem in counterfeit credit cards and
unauthorized use of account numbers or access codes to banking system
accounts. Congress sought to include in its definition of access devices,
credit cards, debit cards, account numbers and combinations of these and
other methods of obtaining goods and services.
United States v. McNutt, 908 F.2d 561, 563 (10th Cir. 1990) (emphasis added)
(internal quotation marks, ellipses, and citations omitted). Thus, the credit card
account numbers Heath possessed fall within the intended scope of the term
“access device” in 18 U.S.C. § 1029. Because Heath did not dispute his
possession of 286 valid credit card account numbers, the district court properly
found that he possessed 286 “access devices.” Applying the assumed loss of five
hundred dollars per access device, the district court properly calculated the
intended amount of loss as $143,000. Thus, we conclude that the district court
properly included the ten-level upward adjustment to Heath’s offense level.
C. Leader or organizer enhancement
Heath argues that the district court had insufficient evidence to justify the
inclusion of the four-level enhancement for his organizational role in the scheme.
Aplt. Br. at 9. He contends that “[t]he statements in the [PSR] do not support a
determination that Heath was an organizer or leader for purposes of [U.S.S.G.] §
3B1.1(a)” because
there is a lack of evidence that Heath exercised decision making authority
over the other participants, any recruitment of accomplices, a claimed right
to a larger share of the fruits of the crime, or any degree of control and
13
authority exercised by him over the others. No one in this conspiracy
worked for Heath, nor did he control or have any responsibility for their
activities.
Aplt. Br. at 11–12. We conclude that the district court’s factual finding was not
clearly erroneous.
Pursuant to U.S.S.G. § 3B1.1(a), a defendant’s offense level is increased
four levels “[i]f [he] was an organizer or leader of a criminal activity that
involved five or more participants.” Thus, “[t]o impose the 4-level increase, the
sentencing court must make two findings of fact: first, that defendant is an
organizer or leader; and second, that the criminal activity involved five or more
participants.” United States v. Roberts, 14 F.3d 502, 523 (10th Cir. 1993). Heath
challenges only the finding that he was an organizer of the scheme.
This court has noted that “[t]he gravamen of the enhancement is either the
exercise of control over other participants or the organization of others for the
purpose of carrying out the crime.” United States v. Spears, 197 F.3d 465, 469
(10th Cir. 1999) (internal quotation marks omitted). Application Note 4 to
U.S.S.G. § 3B1.1 provides the following factors that a sentencing court should
consider when determining whether an individual was a leader or organizer of
criminal activity:
the exercise of decision making authority, the nature of participation in the
commission of the offense, the recruitment of accomplices, the claimed
right to a larger share of the fruits of the crime, the degree of participation
in planning or organizing the offense, the nature and scope of the illegal
activity, and the degree of control and authority exercised over others.
14
U.S.S.G. § 3B1.1 cmt. n.4.
We conclude that the PSR provided sufficient evidence to support the
district court’s finding that Heath was an organizer of the scheme. The PSR
provided evidence that Heath obtained the credit card information used to
manufacture the counterfeit credit cards, distributed the credit card information to
other participants in the scheme, and taught other participants how to manufacture
the counterfeit cards. According to the PSR, Puryear explained that Heath
obtained the credit card information and would verify that the credit card account
number was activated. ROA, Vol. 3 at 6. Puryear also explained that “Heath had
taught [Kulp and Madden] how [to manufacture the counterfeit credit cards], and
that [Heath] was the one who provided the credit card numbers to them.” Id.
According to the PSR, Madden confirmed that “[s]he and Kulp would obtain the
numbers from Heath, and Kulp would manufacture the counterfeit credit cards.”
Id. at 7. Further, Kulp explained that Heath taught her how to manufacture the
counterfeit credit cards and that “Heath would supply the numbers from the stolen
credit card receipts he was getting from a hotel.” Id. at 8.
The PSR also included evidence that Heath coordinated the rental of hotel
rooms and recruited accomplices to meet in Durant. According to the PSR,
Madden explained that “Heath called in a stolen credit card number to the
Hampton Inn and rented two rooms” and that “Heath would tell them what name
to use, and they would check into the rooms using those names.” Id. at 7.
15
Further, according to the PSR, Speigle explained that “Heath called her while she
was in Dallas, Texas, and asked her if she would pick up Daniel Jeffery and bring
him to Durant, Oklahoma.” Id. at 7–8. Heath did not object to these factual
findings. Thus, based on this evidence, we conclude that the district court’s
finding that Heath was an organizer of this scheme did not constitute clear error
and that the district court properly included the four-level enhancement.
III. CONCLUSION
Heath’s sentence is AFFIRMED.
Entered for the Court
Mary Beck Briscoe
Chief Judge
16