Rashad Azmi Elqutob v. State

COURT OF APPEALS SECOND DISTRICT OF TEXAS FORT WORTH NO. 02-13-00393-CR RASHAD AZMI ELQUTOB APPELLANT V. THE STATE OF TEXAS STATE ---------- FROM CRIMINAL DISTRICT COURT NO. 3 OF TARRANT COUNTY TRIAL COURT NO. 1334940R ---------- MEMORANDUM OPINION 1 ---------- Rashad Azmi Elqutob brings eight points challenging his convictions and respective ten- and five-year sentences for engaging in organized criminal activity and for theft by receiving stolen property valued at more than $200,000. See Tex. Penal Code Ann. § 31.03(b)(2) (West Supp. 2014). The majority of his points concern his contention that, because of the wording of the indictment, the 1 See Tex. R. App. P. 47.4. jury charge, or both, he was not actually convicted of any offense under the penal code. In his final point, he argues that the trial court abused its discretion by excluding evidence of a witness’s prior criminal history. We affirm. Background The State initially charged appellant with three counts relating to his alleged participation in a scheme to buy and sell stolen cell phones. However, the State later waived count one, trying appellant on only counts two and three, which the parties agreed to renumber to counts one and two. The first count alleged that appellant, WITH THE INTENT TO ESTABLISH, MAINTAIN OR PARTICIPATE IN THE PROFITS OF A COMBINATION[,] . . . COMMITTED THEFT OVER $200,000 BY UNLAWFULLY APPROPRIATING, BY ACQUIRING OR OTHERWISE EXERCISING CONTROL OVER, PROPERTY OF THE VALUE OF MORE THAN TWO HUNDRED THOUSAND DOLLARS FROM THE OWNER OF THE PROPERTY WITH THE INTENT TO DEPRIVE THE OWNER OF THE PROPERTY; AND SAID DEFENDANT APPROPRIATED THE PROPERTY BELIEVING IT WAS STOLEN BY ANOTHER, PURSUANT TO ONE SCHEME AND CONTINUING COURSE OF CONDUCT THAT BEGAN ON OR ABOUT APRIL THE 7TH, 2009 AND CONTINUED UNTIL ON OR ABOUT OCTOBER THE 10TH, 2010 AND THE OWNER, QUANTITY, AND PROPERTY ARE LISTED BELOW: MIKE HOPKINS THE FOLLOWING QUANTITY AND TYPE OF CELL PHONES: [Listing 31 different types of cell phones with a different quantity of each] MONIQUE HEBERT-LOFGREN THE FOLLOWING QUANTITY AND TYPE OF CELL PHONES: [Listing 5 different types of cell phones in differing quantities] 2 MANUAL CANGAS THE FOLLOWING QUANTITY AND TYPE OF CELL PHONES: 50 BLACKBERRY BOLD In the second count, the State alleged that appellant, UNLAWFULLY APPROPRIATE[D], BY ACQUIRING OR OTHERWISE EXERCISING CONTROL OVER, PROPERTY OF THE VALUE OF MORE THAN TWO HUNDRED THOUSAND DOLLARS FROM THE OWNER OF THE PROPERTY WITH THE INTENT TO DEPRIVE THE OWNER OF THE PROPERTY; AND SAID DEFENDANT APPROPRIATED THE PROPERTY BELIEVING IT WAS STOLEN BY ANOTHER, PURSUANT TO ONE SCHEME AND CONTINUING COURSE OF CONDUCT THAT BEGAN ON OR ABOUT APRIL THE 7TH, 2009 AND CONTINUED UNTIL ON OR ABOUT OCTOBER THE 10TH, 2010 AND THE OWNER, QUANTITY, AND PROPERTY ARE LISTED BELOW: [Listing the same types, quantities and owners of cell phones as alleged in Count One]. The language in the jury charge tracked the language above from the indictment. The jury convicted appellant of both counts. Points on Appeal Seven of appellant’s eight points are related to the State’s word choice in the indictment and jury charge. They focus primarily on the variance between the language used in the indictment and charge to describe the theft offense (also the underlying offense for the engaging in organized criminal activity count)––whether appellant “appropriated the property believing it was stolen by another”––and the language used in the penal code definition of theft––providing 3 that appropriation of property is unlawful if, among other things, “the actor appropriates the property knowing it was stolen by another.” Id. (emphasis added). Appellant contends that “knowing” and “believing” have different definitions; in other words, appellant argues that by convicting him of offenses alleging that he appropriated property he only “believed” was stolen, the jury did not convict him of any offense under the penal code. Whether Indictment Alleged An Offense In his first and second points, appellant contends that the indictment is void for using the word “believing” instead of “knowing” in alleging the offenses. The State contends that appellant failed to preserve any error related to the substance or form of the indictment because he did not object to the language used in the indictment in the trial court. A defendant who does not object to defects of form or substance in an indictment before trial fails to preserve any complaint about such defects. Teal v. State, 230 S.W.3d 172, 176–77 (Tex. Crim. App. 2007). But an instrument that does not meet the constitutional requisites of an indictment fails to confer subject matter jurisdiction on the trial court; thus, a charging instrument that does not meet the constitutional definition of an indictment may be challenged for the first time on appeal. Smith v. State, 309 S.W.3d 10, 16–18 (Tex. Crim. App. 2010); Teal, 230 S.W.3d at 179. The State characterizes appellant’s argument as a complaint that the indictment fails to allege a required element of theft under the penal code. See Studer v. State, 799 S.W.2d 263, 271–72 (Tex. Crim. App. 4 1990) (holding that a charging instrument may be an indictment as contemplated by the Texas constitution even if fails to charge each element of an offense). But although appellant does state in his brief that because the indictment alleged an incorrect mental state, it “failed to allege an element of the offense of theft,” he also contends that the indictment is void because it wholly fails to allege an offense. See Cook v. State, 902 S.W.2d 471, 477 (Tex. Crim. App. 1995) (holding that a charging instrument must allege (1) a person and (2) the commission of an offense to be an indictment under the constitution). The proper test to determine if a charging instrument alleges an offense is whether the allegations in it are clear and specific enough so that a person can identify the offense alleged, i.e., the penal statute under which the State intends to prosecute the defendant. Teal, 230 S.W.3d at 180; Duron v. State, 956 S.W.2d 547, 550–51 (Tex. Crim. App. 1997). If the allegations are sufficiently clear and specific, the indictment is sufficient to confer subject matter jurisdiction. Teal, 230 S.W.3d at 180. “Stated another way: Can the trial court (and appellate courts who give deference to the trial court’s assessment) and the defendant identify what penal code provision is alleged and is that penal code provision one that vests jurisdiction in the trial court?” Id. Section 31.03 of the penal code provides that (1) “[a] person commits an offense if he unlawfully appropriates property with intent to deprive the owner of property,” (2) that “[a]ppropriation of property is unlawful if . . . the property is stolen and the actor appropriates the property knowing it was stolen by another,” 5 and (3) that such an offense is “a felony of the first degree if the value of the property stolen is $200,000 or more.” Tex. Penal Code Ann. § 31.03(a), (b)(2), (e)(7). Comparing the wording of this statute and the wording of the two counts in the indictment, we conclude that––regardless of how appellant has characterized his argument––he is essentially complaining that the indictment used an incorrect word to describe the mens rea of the alleged offenses. One can discern from the wording of the indictment that the State is alleging in both counts that (1) appellant (2) with the intent to deprive the complainants of cell phones (3) unlawfully appropriated those cell phones (4) which were valued at more than $200,000 and (5) that he thought another person had stolen the cell phones. The code of criminal procedure, like the Texas Constitution, does not require an indictment to directly track the wording used in the penal code to describe an offense. See Tex. Code Crim. Proc. Ann. art. 21.17 (West 2009) (“Words used in a statute to define an offense need not be strictly pursued in the indictment; it is sufficient to use other words conveying the same meaning, or which include the sense of the statutory words.”). We conclude and hold that the indictment––by alleging that appellant unlawfully appropriated property he believed to be stolen––was sufficiently clear and specific to allege the offenses in counts one and two. Thus, the indictment is not constitutionally defective such that appellant was relieved of the responsibility to object to its use of the word “believing” rather than “knowing,” and appellant’s complaint about the wording of 6 the indictment was not preserved for appeal. We overrule appellant’s first and second points. Whether Material Variance Renders Conviction Infirm In his sixth point, appellant contends that there is a fatal variance between the language of the indictment, the jury charge, and the statute; thus, according to appellant, the evidence is insufficient to support his convictions. However, rather than explaining why the evidence adduced at trial does not support the convictions under a hypothetically correct jury charge, appellant argues that the evidence is insufficient “because the hypothetically correct jury charge is not supported by the indictment.” This is not the standard of review that we must follow. To determine whether the State has met its burden under Jackson v. Virginia to prove a defendant guilty beyond a reasonable doubt, we compare the elements of the crime as defined by the hypothetically correct jury charge to the evidence adduced at trial. Thomas v. State, 444 S.W.3d 4, 8 (Tex. Crim. App. 2014). A hypothetically correct jury charge is one that “accurately sets out the law, is authorized by the indictment, does not unnecessarily increase the State’s burden of proof or unnecessarily restrict the State’s theories of liability, and adequately describes the particular offense for which the defendant was tried.” Id. (quoting Malik v. State, 953 S.W.2d 234, 240 (Tex. Crim. App. 1997)). The law as authorized by the indictment consists of the statutory elements of the offense and those elements as modified by the indictment. Id. 7 There are two types of variances in an evidentiary-sufficiency analysis: material variances and immaterial variances. Id. at 9. Immaterial variances do not affect the validity of a criminal conviction; thus, a hypothetically correct jury charge need not incorporate allegations that would give rise to only immaterial variances. Id. But a material variance renders a conviction infirm, and the only remedy is to render an acquittal. Id. Here, a hypothetically correct charge would have asked the jury in both counts whether appellant unlawfully appropriated property “knowing” it was stolen by another. See Tex. Penal Code Ann. § 31.03(b)(2). Appellant contends that by charging him with unlawfully appropriating stolen property “believing” it was stolen by another, the indictment modified the hypothetically correct jury charge to change the mens rea of the offenses so that the State had to prove appellant committed the offense of theft as set forth in section 31.03(b)(3) of the penal code, which provides that appropriation of property is unlawful if “property in the custody of any law enforcement agency was explicitly represented by any law enforcement agent to the actor as being stolen and the actor appropriates the property believing it was stolen by another.” Id. § 31.03(b)(3). Although we agree that the evidence does not support convictions for theft as defined in penal code section 31.03(b)(3) 2 or engaging in organized criminal activity based on the same theft offense, we do not agree that the evidence is insufficient to support 2 As appellant states in his brief, “As the record demonstrates the facts alleged, offense charged, and jury charge do not fit in this category.” 8 his convictions based on the definition of theft in penal code section 31.03(b)(2), according to the hypothetically correct jury charge as further defined by the indictment. The penal code provides that “[a] person acts knowingly, or with knowledge, with respect to the nature of his conduct or to circumstances surrounding his conduct when he is aware of the nature of his conduct or that the circumstances exist.” Id. § 6.03(b) (West 2011). “Believe” has been defined as “to accept as the truth; to take as true, real”; or “to have confidence in a promise or statement of (another person).” Flowers v. State, 890 S.W.2d 906, 916 (Tex. App.––El Paso 1994, no pet.) (quoting Webster’s New Universal Unabridged Dictionary 169 (1983)); see also Tex. Gov’t Code Ann. § 311.011(a) (West 2013) (“Words and phrases shall be read in context and construed according to the rules of grammar and common usage.”); Black’s Law Dictionary 184 (10th ed. 2014) (defining “believe” as “[t]o feel certain about the truth of”). The Court of Criminal Appeals has held in an indictment-sufficiency case that “[t]he word ‘knowingly,’ as used in the context that a defendant knowingly receives property that has been stolen, requires actual subjective knowledge, rather than knowledge that would have indicated to a reasonably prudent man that the property was stolen.” Dennis v. State, 647 S.W.2d 275, 280 (Tex. Crim. App. 1983). But the Court of Criminal Appeals has also held that “[k]nowledge that property was stolen can be shown by circumstantial evidence.” Chudleigh v. State, 540 S.W.2d 314, 317 (Tex. Crim. App. 1976). 9 In construing the meaning of the word “know” as used in sections 22.011(b)(3) or (5) of the Penal Code, the First Court of Appeals discussed section 31.03(b)(3) and held that the ordinary meaning of the word “know”––as opposed to the statutory definition of “knowingly”––includes what is subjectively true but also what the actor subjectively “believes” to be true but is untrue. See Jiminez v. State, 727 S.W.2d 789, 792–93 (Tex. App.––Houston [1st Dist.] 1987, pet. ref’d). Thus, a person can believe something to be true when it is not true, but a person can also believe something to be true because it is true. Contrary to appellant’s contention, then, the use of the word “believes” in the indictment did not necessarily limit the jury to considering only whether appellant “possessed knowledge that would have indicated to a reasonably prudent man that the property was stolen”––in other words, that he believed the phones to be stolen but they were not––rather than, also, whether appellant subjectively believed the cell phones were stolen because they actually were. Appellant contends that the only evidence that could possibly support that he knew the cell phones were actually stolen is testimony from J.A., an employee at a Radio Shack kiosk in a Sam’s Club. 3 J.A. testified that he stole new Sprint 3 Appellant states in his brief: “One of the more important State’s witnesses was J.A. (5 R.R. at 180). Mr. J.A. is the only person who testified that he communicated with Appellant about cell phones and that Appellant had any knowledge that any cell phones were stolen; thus, his testimony was vital to this case.” We will use initials to refer to the witness as appellant did in his brief. 10 cell phones 4 intended for a free-phone sales promotion by falsely indicating in the business’s inventory system that the phones had been given to a customer as part of the promotion when he had instead appropriated them. One day, J.A. took several of the stolen BlackBerrys in new packaging to a gas station in Arlington. He offered to sell the cell phones to several people; some declined, but appellant agreed to buy them. 5 Over the next month or so, appellant bought twenty or thirty cell phones from J.A. at the same gas station, meeting him between ten and fifteen times. 6 J.A. did not tell appellant the phones were stolen, but at some point, he told appellant that he was getting the phones from work. 7 Eventually, appellant asked J.A. to get him a different, more expensive model of phone, and J.A. did so. Also, appellant introduced J.A. to his father and told J.A. that his father would be buying the phones from now on. J.A. sold between four to eight phones at a time to appellant’s father. Appellant and his father both paid cash for the phones and were able to negotiate a lower price for the phones from J.A. J.A. testified about when the police finally questioned him; 4 Even on cross-examination, J.A. testified unequivocally that he had stolen the cell phones. 5 Specifically, J.A. told appellant, “I got some BlackBerr[y]s for cheap.” 6 J.A. testified that appellant told him, “If you keep them coming, I can keep on buying them.” 7 J.A. had to tell appellant about where he was getting the phones because appellant had started to complain that some of the phones had been locked. 11 he told them, “how [he] met [appellant] and sold him a few phones, and how [J.A.] was stealing them and . . . was getting them out [of] the system through Sprint mainly.” J.A. explained that he stole the phones by either adding them to an existing customer’s phone line without that customer’s permission or by creating a new phone line specifically for that phone. After he added the phone to a line, however, he would change the phone’s ESN 8 in the Sprint computer system so that the ESN would no longer be associated with a phone line. According to J.A., a phone reported stolen or attributed to an existing account for too long without being used is put on a “hot list,” and the phone is locked. 9 According to J.A., both appellant and his father had complained to him that some of the phones they sold to other people were unusable because they were on a hot list, and they asked J.A. to fix the problem. This occurred a few times when J.A. had forgotten to switch the ESN in the system after adding a phone to a line. At the request of appellant or his father, J.A. would remove the hot listed phone’s ESN from the existing phone line, so that it would no longer show up on the hot list. J.A. told both appellant and his father that he would fix the hot list problem with 8 ESN stands for electronic serial number. Each phone is assigned an ESN that is assigned only to that phone and “should never change.” 9 One witness testified that if a cell phone is reported to a provider as being stolen or lost, it cannot then be activated on that company’s network. She further testified that in 2009, the hot list was available to businesses but not the general public. 12 those phones by “get[ting] them out [of] the system.” According to J.A., “Once they [referring to appellant and his father] couldn’t use them, they knew [the phones] had a phone number on them.” J.A. had also told appellant’s father to sell the phones quickly so that they would not end up on the hot list. J.A. said that appellant and his father bought four more phones “right after” complaining about other phones J.A. sold them being on the hot list. An investigator who interviewed J.A. about the stolen phones read part of J.A.’s second statement to law enforcement: “I met his son [appellant] like two months before I met him. It was in July. I sold him two phones -- the first two phones. I sold him like 15 more until he finally said, ‘They caught my dad.’” According to appellant, the jury could only reasonably have inferred from J.A.’s testimony that a reasonable person would have believed that the phones were stolen, not that appellant had actual, subjective knowledge that the phones J.A. was selling him were stolen. However, the jury could have reasonably inferred from other circumstantial evidence in the record that appellant subjectively knew the phones were stolen, in other words, that he believed the phones were stolen and that they actually were stolen. See, e.g., Chudleigh, 540 S.W.2d at 317. Geoff Neimeth, the former director of security and loss prevention for ATC Logistics & Electronics, a cell phone distributor for AT&T, testified about his 2009 investigation into missing, new BlackBerry Bold devices at the ATC facility. According to Neimeth, ATC discovered that over 450 phones that had been 13 logged in as arriving at the facility could not be accounted for. After a thorough investigation, Neimeth concluded that the phones had been stolen although he was never able to identify the method by which they were stolen or the person who took them from the facility. The phones were discovered to be missing in increments after periodic inventory counts: 19 on March 11, 2009, another 239 on April 7, 2009, another 102 on April 28, 2009, and, finally, another 101 on May 6, 2009. He found at least one of the phones in use, which indicated to him that it, like the rest of the phones, had been stolen from the facility. Neimeth searched for sellers of BlackBerry Bold devices and discovered that appellant was advertising unlocked BlackBerry Bold phones on eBay and Craigslist. Neimeth explained that when a phone is unlocked, it will work on any carrier’s network for which it is compatible, not just the carrier from whom the consumer bought the phone. Neimeth also opined that there is no reason a legitimate seller of a brand-new, in-the-box cell phone would offer it for sale unlocked. However, he also admitted on cross-examination that a phone is not necessarily stolen if it is unlocked. Manuel Cangas, the security manager for ATC, reported to Neimeth and assisted with the investigation of the missing phones from ATC’s facility. Cangas used a list of the missing phones’ serial numbers to search whether any of them had been activated on a cell provider’s network. Cangas was able to contact one of the phone users, who had bought his phone from Reemsales, a company run by appellant. Cangas was also able to determine that appellant’s SIM card had 14 been activated in at least two of the missing phones. 10 Finally, ATC was able to locate at least six people who had purchased a missing ATC phone from appellant. The evidence showed that appellant was an AT&T employee and that he maintained a cell site for AT&T as a technician. Juan Wallace, a former AT&T loss prevention investigator, was assigned to investigate the complaint regarding the BlackBerry devices missing from ATC. Because some of the missing devices showed evidence of activation with a company-owned AT&T device, Wallace focused his investigation on “competitive employment and misuse of company property.” Wallace discovered that appellant had been assigned five company- owned AT&T devices––including a laptop and BlackBerry––and that he had two personal employee cell phone numbers with AT&T. Wallace then ran a report on each of the devices and phone numbers; between May 2005 and 2009, he found over 1,122 activations on the SIM cards for the company-owned devices issued to appellant: 564 on the “UMTS Voice” device’s card, 135 on the scanner’s card, 240 on the BlackBerry’s card, 54 on the “Device Testing” unit’s card, and 129 on the laptop’s card. According to Wallace, “That’s the most activations I’ve ever 10 Cangas explained that when you take a SIM card out of one cell phone, and place it in another, the phone in which the card is placed records the card as an activation. In other words, placing a SIM card in any phone creates a “trail” in that particular phone showing that the SIM card was at one time placed there. The cell phone providers can trace these activations on any of their phones. 15 seen on any one SIM card.” 11 Wallace further found 63 activations on a SIM card associated with one of appellant’s personal AT&T phone numbers, and 34 activations on the other. Wallace interviewed appellant about the missing phones in December 2009. Ralph Wilson, appellant’s supervisor at AT&T, testified that several different company devices were assigned to appellant. Wilson explained that appellant was part of a special team of employees who tested new AT&T devices; however, he also said that someone in appellant’s job would have no need to be switching SIM cards between five and six times a day. Wilson said that appellant called him before the interview with Wallace in December 2009 and asked for Wilson’s spare computer, but appellant was not able to get it before Wilson and appellant were called to AT&T headquarters for the interview. According to Wilson, appellant was quiet during the interview, seemed “somewhat nervous,” and would not answer all the questions Wallace asked. Wilson confirmed that appellant asked Wallace during the interview, “If I . . . submit my resignation, will this end this discussion?” Wallace confirmed that appellant did resign during the interview after Wallace asked him where he got two BlackBerrys he had activated and sold that were missing from ATC. Appellant told Wallace that he believed he had paid about $400 for each from an unknown seller on Craigslist. 11 It is difficult to tell from the questioning whether Wallace was referring to the 564 activations or the collective total of activations from all of the devices. 16 Monique Hebert-Lofgren, a loss prevention manager for Radio Shack, testified that she started an investigation in September 2009 involving “unauthorized lines being added to people’s accounts.” Sprint notified Radio Shack of some suspicious deactivations of accounts; Radio Shack ran the ESNs for those phones in their system to see when they were added into the register at the time of sale. She was able to trace the activations and deactivations to two employees, one of whom was J.A. Radio Shack was able to compile a list of the phones it believed had been stolen by these employees; that list was admitted at trial. All of Radio Shack’s phones have unique stickers on them identifying them as Radio Shack phones. K.P., a former worker at New Breed, a Verizon phone refurbisher, testified about how she stole phones from the facility where she worked. She said she would meet appellant and his father at an El Chico restaurant and would sell them the phones she had stolen. Sometimes she would sell thirty or forty phones at a time. 12 She thought that the first time she sold about thirty-five phones to appellant and his father together, and they paid her $1,000. She typically sold them each phone for “30, 40, or 60,” and they paid her in cash. After the first meeting, she only met with appellant’s father. They only bought new phones from her, which she packaged in a shoebox or noodle box. K.P. told appellant and his father she got the phones from other people. 12 The evidence showed that she stole over 700 phones. 17 K.P.’s daughter, who accompanied her mother to the meetings, testified that she did not know the phones her mother was selling were stolen. After the first meeting, though, appellant asked K.P. if she could get more phones “in bulks.” K.P.’s daughter then became suspicious after her mother started getting more and more phones in bulk. An investigator for the Tarrant County District Attorney’s office’s economic crimes unit testified about how law enforcement was able to link the email address appellant used for his eBay and Craigslist advertisements to two companies, Reemsales and Deal Maker, and to two Wells Fargo accounts associated with appellant. The investigator also assisted in executing a search of appellant’s father’s home in December 2009 in connection with the investigation of appellant. The investigator said that the home’s front office had boxes full of cell phones and that officers found over 1,000 phones there that day. The officers also found mail addressed to appellant and six checkbooks for Deal Maker. Although officers did not find any of the Radio Shack phones at the house, they did find 117 of the missing ATC phones and about 800 of the Verizon phones that K.P. had stolen; the Verizon phones had stickers on them specific to the New Breed facility. Authorities also found $20,251 in cash at the home with a purple sticker on it that said “Rashad.” Officers further seized a notebook with handwritten lists of phones along with the phones’ serial numbers. 18 They discovered after analyzing the notebook that the IMEI numbers 13 for 115 ATC phones and 49 New Breed phones were listed in the notebook. At appellant’s residence, which officers searched the same day as his father’s home, officers seized numerous phones throughout the house. They found more checkbooks and other records for Deal Maker as well as numerous SIM cards and appellant’s AT&T-issued equipment. Officers also found a notebook with phone serial numbers listed in it; the handwriting in the notebook appears to match that in the notebook found in Arlington. Investigators found three stolen phones at appellant’s residence: an AT&T phone from the ATC facility, one Radio Shack phone, and one of the Verizon phones from the New Breed facility. The State also introduced evidence that the SIM cards for all five of appellant’s AT&T-issued devices had been placed into each of the phones they found at his house and that it had to have been done “[q]uite often.” Investigators also found flash boxes at appellant’s home. Flash boxes are used for unlocking phones: “Basically, you use these to unlock phones so they can be used by other carriers. At that time if you were pretty much locked into contracts with whatever cell phone company you had, if you had one of these, you could free up your phone to be used on another network.” When asked if there was “any legitimate reason to have those if you’re a legitimate reseller of 13 An IMEI number is another type of number unique to a particular cell phone. 19 brand new phones,” a Secret Service agent who participated in the investigation answered, “No.” In reviewing the business records for Deal Maker, investigators found no receipts for purchases of phones from March 19 when phones were first discovered missing at ATC through April 23 when one of those phones was sold on Craigslist. However, they did find receipts for purchases of many accessories compatible with those types of phones. Carl Allen, a former Verizon employee, examined the data from some of the phones seized pursuant to the warrants. The trial court admitted evidence of data from some of the phones seized from appellant’s house. One of the text messages read, “Please sell the bad ESN phones for whatever you can get for them, and I will take care of you on the rest.” A text exchange between one of appellant’s numbers and his father’s number reads as follows: “Okay, text me or the bad ESN -- for the bad ESN numbers. . . . He will take care of it if they are three only. . . . I need a list of the IMEI numbers for the phones that you need unlocked. Try to unlock them all first, please, and then if it does not work, just get me the IMEI numbers.” Appellant changed his email address after law enforcement searched his and his father’s homes and began selling phones under the name Wireless World Warehouse. The evidence showed that although the volume of sales through appellant’s entities decreased in December 2009, he was still making 20 sales until October 2010, when law enforcement searched his home a second time. Appellant admitted that he was the owner of Deal Maker. However, appellant also testified that his father was running the cell phone business by himself by the end of 2008. 14 Although there is evidence that appellant’s father was involved in many of the actual purchases of the phones from J.A. and K.P., there was sufficient evidence linking both appellant and his father to the businesses through which appellant sold the phones on Craigslist and eBay, including Deal Maker and Reemsales. Appellant disclaimed any knowledge that the phones he had sold were stolen. He agreed that he had run into a problem with a phone being hot listed and had therefore developed a procedure for checking whether a phone was on a hot list before buying it: In the cell phone business you got two types of phones. You have CDMA, which is covered by Verizon, Sprint, MetroPCS, and then you got GSM. That’s covered by AT&T, T-Mobile, any company that takes a SIM card. .... . . . On CDMA phones there is now three things I check before I buy them. I call the company. I ask them if the phone has ever been reported lost or stolen. I asked the phone, if it’s been 14 The State introduced evidence that appellant paid his father a salary and that his father was listed as a contract worker on appellant’s tax return for 2009. Appellant testified that his father’s trusting and “hardheaded” nature caused his father to lose a gas station business, which is why appellant handed over the cell phone business to him. 21 blacklisted. And then the new key question that I never asked before, if the phone has ever been activated on an account and deactivated, which at that time is what those people did. Appellant also testified that he had trained his father in these procedures and could not understand why his father would not have followed them except that he was “hardheaded.” According to appellant, J.A. called him first; appellant assumed J.A. got his number from Craigslist. Appellant said he checked out the phones he bought from J.A. at a Sprint store before buying them. However, appellant testified that he met with J.A. only three times and bought only six phones. Appellant testified that he knew Sprint was running an upgrade special and that he bought phones from lots of customers who were upgrading their phones so they could sell them. He admitted he bought phones from K.P.’s daughter but said she told him she had bought the phones from other sellers. Appellant denied ever meeting K.P. Based on the above, we conclude and hold that there is sufficient evidence other than appellant’s mere possession of stolen property from which the jury could have reasonably determined that appellant committed theft by receiving property that (a) was actually stolen and (b) he subjectively knew was stolen. See, e.g., Chudleigh, 540 S.W.2d at 317; Pollan v. State, 247 S.W.2d 889, 891– 92 (Tex. Crim. App. 1952) (op. on reh’g); Hart v. State, No. 05-08-01225-CR, 2010 WL 851405, at *5 (Tex. App.––Dallas Feb. 26, 2010, pet. ref’d) (not designated for publication). We overrule appellant’s sixth point. Because his 22 seventh point alleges that the trial court should have granted him a new trial for the same reason raised in his sixth point, we overrule his seventh point as well. Whether Charge Error Harmful In his third through fifth points, appellant contends that the charge, by tracking the language of the indictment, improperly instructed the jury, causing the jury to convict him of behavior that does not constitute an offense. Thus, his third through fifth points are based on the same arguments he raises in his first, second, sixth, and seventh points. The State conceded in its response to appellant’s motion for new trial that the use of the word “believing” in the jury charge was error. However, because appellant failed to object to the wording of the charge at trial, we must review the entire record to determine whether the error caused appellant egregious harm. Kirsch v. State, 357 S.W.3d 645, 649 (Tex. Crim. App. 2012); Almanza v. State, 686 S.W.2d 157, 171 (Tex. Crim. App. 1985) (op. on reh’g); see Tex. Code Crim. Proc. Ann. art. 36.19 (West 2006). Here, the court reporter did not record closing argument or voir dire; 15 thus, we look to the clerk’s record and the recorded parts of the trial and any pretrial proceedings. Errors that result in egregious harm are those “that affect the very basis of the case, deprive the defendant of a valuable right, vitally affect the defensive 15 It is unclear from the court reporter’s notes whether the parties agreed not to have these parts of the trial recorded. Nevertheless, appellant has not raised the lack of their recording as error. 23 theory, or make a case for conviction clearly and significantly more persuasive.” Taylor v. State, 332 S.W.3d 483, 490 (Tex. Crim. App. 2011). The purpose of this review is to illuminate the actual, not just theoretical, harm to the accused. Almanza, 686 S.W.2d at 174. Appellant’s main argument is that by using the word believing rather than knowing, the charge lessened the State’s burden of proof: “The heart of Appellant’s defense was [that he was] not guilty of a theft because he did not know the cell phones were stolen.” We have explained why the evidence shows that appellant was not convicted on a lesser burden of proof. Moreover, in reviewing the entire record for evidence of harm, we note that the clerk’s record contains numerous Brady notices to appellant’s trial counsel from the State, many of which relate to evidence suggesting that appellant did not know the phones he was selling were stolen. Thus, pretrial filings indicate that appellant’s knowledge or lack thereof would be an issue in the trial. Additionally, the State attached to its motion for new trial copies of Power Point slides it presented to the jury during its closing argument, several of which reiterated, “he knew,” with references to evidence of appellant’s knowledge that the phones were stolen, such as that he was buying new-in-the-box phones with specific identifying provider stickers on them for substantially less than what appellant had paid for new phones from other sellers. Our review of the appellate record indicates that appellant was not deprived of a valuable right or the ability to present a defensive theory by virtue 24 of the error in the charge: appellant’s counsel emphasized during trial the extent of appellant’s father’s participation in buying the phones, and appellant’s own testimony was mainly focused on his contention that he did not know the phones were stolen. Indeed, the State contends in its motion for new trial that appellant’s counsel knew of the jury charge error, allowed it to stand, and pressured the State to make a misdemeanor plea offer because of the error while the jury was deliberating. We conclude and hold that the record does not show egregious harm because of the inclusion of the word “believing” instead of “knowing” in the charge. We overrule appellant’s third through fifth points. Whether Impeachment Evidence Improperly Excluded In his eighth point, appellant challenges the trial court’s ruling that he could not ask J.A. about a past misdemeanor conviction for marijuana possession. Although appellant acknowledges that rule of evidence 608(b) generally prohibits use of a misdemeanor conviction to impeach a witness’s credibility, he urges that the trial court should have nevertheless allowed him to ask the question because he proved an exception to rule 608(b)’s general prohibition: that J.A. opened the door to questioning about his conviction by leaving a false impression about the extent of his prior criminal history. Tex. R. Evid. 608(b); see West v. State, 169 S.W.3d 275, 278 (Tex. App.––Fort Worth 2005, pet. ref’d). The following exchange occurred at the beginning of the State’s direct examination of J.A.: Q. [J.A.], will you state your name for the jury. 25 .... Q. [A]re you currently employed? A. Not anymore. Q. Have you been charged with a crime? Let’s start with that. A. Any crime? Q. This phone stealing engaging in organized crime case. A. No, ma’am. Q. In this case you’ve been charged with a crime, right? A. Okay, convicted. I’m sorry. Q. You’re not convicted. Charged? A. Charged, yes. Yes, ma’am. Sorry. Q. And is that case still pending? A. Yes, ma’am. Q. And, in fact, you had court this week, right? A. Yes. [Emphasis added.] Appellant claims that this exchange opened the door to an examination of J.A.’s entire past criminal history. Here, however, the context of the exchange is limited to whether J.A. was facing charges for stealing the Radio Shack phones, and neither the State’s questions nor J.A.’s testimony that he had not yet been convicted or charged creates a false impression that he had a past history of law- abiding behavior. See Hammett v. State, 713 S.W.2d 102, 106–07 (Tex. Crim. App. 1986) (examining context of questioning and testimony to determine 26 whether false impression of past law-abiding behavior given); James v. State, 102 S.W.3d 162, 181 (Tex. App.––Fort Worth 2003, pet. ref’d) (“[T]he ‘false impression’ exception is given a narrow construction by the case law. . . . In order to open the door to use of prior crimes for impeachment, the witness must do more than simply imply that he abides by the law; he must in some way convey the impression that he has never committed a crime.” (citation omitted)). Accordingly, we conclude and hold that the trial court did not abuse its discretion by prohibiting appellant from inquiring into J.A.’s past misdemeanor conviction. We overrule appellant’s eighth point. Conclusion Having overruled appellant’s eight points, we affirm the trial court’s judgments. /s/ Terrie Livingston TERRIE LIVINGSTON CHIEF JUSTICE PANEL: LIVINGSTON, C.J.; DAUPHINOT and MEIER, JJ. DAUPHINOT, J., concurs without opinion. DO NOT PUBLISH Tex. R. App. P. 47.2(b) DELIVERED: April 9, 2015 27