NOT RECOMMENDED FOR FULL-TEXT PUBLICATION
File Name: 17a0635n.06
Case Nos. 16-1650/1706/1707/1708
UNITED STATES COURT OF APPEALS FILED
FOR THE SIXTH CIRCUIT Nov 15, 2017
DEBORAH S. HUNT, Clerk
UNITED STATES of AMERICA, )
)
Plaintiff-Appellee, )
)
v. )
) ON APPEAL FROM THE
NATHANIEL PEMBROOK, SHAEED ) UNITED STATES DISTRICT
CALHOUN, DAVID BRILEY, and ) COURT FOR THE EASTERN
ORLANDO JOHNSON, ) DISTRICT OF MICHIGAN
)
Defendants-Appellants. )
)
Before: BATCHELDER, GIBBONS, and COOK, Circuit Judges.
ALICE M. BATCHELDER, Circuit Judge. A federal jury convicted four co-
defendants of robbery, conspiracy, and firearms charges stemming from two jewelry store
robberies in Michigan on April 22, 2014, and the district court imposed lengthy prison sentences.
The defendant/appellants—Nathaniel Pembrook, Shaeed Calhoun, David Briley, and Orlando
Johnson—are African-American males, between the ages of 36 and 47, from Philadelphia,
Pennsylvania. The first robbery was at 12:30 p.m. at Medawar Fine Jewelry in Plainfield
Township, Michigan, a suburb of Grand Rapids. The second was at 5:15 p.m. at Tapper’s
Diamonds & Fine Jewelry in West Bloomfield Township, a suburb of Detroit. Both robberies
involved guns and force. The government prosecuted the defendants to conviction on five
counts: Hobbs Act robbery, in violation of 18 U.S.C. § 1951(a); use of a firearm in furtherance
of the robbery, § 924(c)(1)(A); conspiracy to commit robbery, § 1951(a); use of a firearm in
No. 16-1650
United States v. Pembrook, et al.
furtherance of the conspiracy, §§ 924(c)(1)(A) & (C)(i); and being a felon in possession of a
firearm, §§ 922(g)(1) and 924(a)(1)(D)(2). We AFFIRM the convictions and sentences.
I.
FBI Agent Brian Max began his investigation of two similar Michigan jewelry-store
robberies—separated by a drive of five hours and 150 miles—with a “tower dump” for the cell-
phone towers near the two stores.1 A “tower dump” is a chronological list of every phone
number that used the tower for any purpose (voice call, text, internet connection, etc.) regardless
of provider (e.g., Verizon, AT&T). Agent Max found that a phone number ending “1434”—
assigned to a recently activated, prepaid cell phone with no name on the account—had used a
tower or towers near each of the robberies at times corresponding to those robberies.
Agent Max then obtained the “call detail records” (a list of all calls to and from that
number, with dates, times, and tower locations) for the #1434-phone and tracked its path from
Philadelphia (April 21, 2014) to Milwaukee; to New Buffalo, Michigan, for an overnight stay; to
Plainfield Township, near the Medawar Jewelry store, 40 minutes before the first robbery (about
11:50 a.m.); to West Bloomfield Township, near the Tapper’s Jewelry store, 15 minutes before
the second robbery (5:00 p.m.); then back to Philadelphia the next day (April 23, 2014).
Plainfield Township is less than two hours’ drive north of New Buffalo; West Bloomfield
Township, near Detroit, is less than three hours’ drive from Plainfield Township.
Agent Max discovered three more phone numbers (ending 0033, 7819, and 1574) that
followed the same pattern.2 These four numbers had also contacted each other repeatedly during
the trip, including, for example, dozens of times in the hour before the Medawar robbery. Of
1
AUSA Kevin Mulcahy applied to the district court for orders compelling the “tower dump” of the cell-
tower records, pursuant to the Stored Communications Act, 18 U.S.C. § 2703(d). All told, there were four
applications and court orders. See United States v. Pembrook, 119 F. Supp. 3d 577, 580-83 (E.D. Mich. 2015).
2
Each phone was a recently activated, prepaid cell phone with no name on the account that traveled from
Philadelphia to Milwaukee on April 21, then overnight in New Buffalo, to locations near Medawar Jewelry at the
time of the first robbery and Tapper’s at the time of the second, and then back to Philadelphia on April 23.
2
No. 16-1650
United States v. Pembrook, et al.
particular interest, a call from the #0033-phone to Enterprise car rental made a record of
“Shaheed” Calhoun’s renting a white Volkswagen Passat from a location at the Philadelphia
train station on April 11 and returning it there on April 23 after driving it 3,463 miles. Calhoun
had provided Enterprise3 his Pennsylvania driver’s license and paid with his credit card.
In addition to Agent Max’s cell-tower and phone-records investigation, the FBI also had
witness statements and surveillance videos from the robberies. At 12:30 p.m. on April 22, 2014,
four men rushed into the Medawar Jewelry store,4 one suspiciously carrying a large bag.
Another had a hammer and began striking the glass jewelry cases (which did not break) while a
third ordered an employee at gunpoint to open a safe. There were no customers in the store. The
other employees, quickly recognizing the robbery, hid in the break room with the lights out,
watching on closed-circuit video while the owner retrieved his own handguns. When the owner
yelled for the robbers to leave because he was armed, one robber5—armed with a handgun—
instead pursued him. When that robber entered the break room, the owner shot at him, hitting
him in the arm. At that, the robbers fled, one dripping blood from the gunshot wound. They
were gone by the time police responded to the 911 call, but witnesses described a black, new
model Chrysler Town & Country minivan. Police tracked blood drops to a location behind the
store and exterior security videos had recorded the minivan parked there for an hour before the
robbery with two of the robbers milling about nearby. No employee was injured in the robbery
3
The vehicle was actually rented from Alamo Rent A Car, which is a subsidiary of Enterprise.
4
Medawar Jewelry is located near Grand Rapids, in the Western District of Michigan. Because the U.S.
District Court for the Eastern District of Michigan was not the proper venue for the adjudication of this robbery, the
government did not charge the defendants with the Medawar robbery as a “robbery”; instead, the government
charged the defendants with the Tapper’s robbery (for which venue was proper) and included the Medawar robbery
as part of a conspiracy to rob both.
5
Police ultimately determined this was Pembrook, based on DNA testing and ballistic evidence.
3
No. 16-1650
United States v. Pembrook, et al.
nor was anything of significant value stolen.6 The loss was $2,252 in damage to the store. None
of the victims was able to identify any of the robbers, either immediately or later at trial.
At 5:15 p.m. that same day, three men wearing masks and gloves entered the Tapper’s
Jewelry store7 near Detroit, and ordered the employees and customers down on the ground. The
first robber had a handgun and forced the security guard to the ground while the other two
ordered an employee to open the case of Rolex watches. One robber held a bag while the other
filled it with watches. This robbery lasted two minutes. An employee had tripped a silent alarm,
but the robbers were gone before the police arrived. Exterior surveillance video, beginning an
hour before the robbery, recorded the simultaneous arrival of the black Chrysler minivan and a
white Volkswagen Passat. One man got out of the minivan; two exited the Passat. They
separately went into a nearby shopping mall and returned without ever acknowledging each
other, but upon their return, the man from the van got into the Passat and the two from the Passat
got into the van. The first man moved the Passat to park it facing the Tapper’s entrance. The
van moved behind the store and three men wearing hoodies and gloves got out. Moments later,
the same three ran back to the van with two bags and drove off. No one was injured during the
robbery. The robbers made off with 123 Rolex watches, worth $853,957.8 None of the victims
was able to identify any of the robbers, either immediately or later at trial.
Further investigation led to a security video from a Comfort Inn in New Buffalo on April
21, the day before the robberies, which had recorded the simultaneous arrival of the Passat and
the minivan at about 10:30 p.m. The driver of the Passat rented three rooms,9 the cars pulled
6
Apparently certain personal documents, belonging to employees, were removed from the safe and taken.
7
Agent Max testified that, based on his review of the surveillance videos, he did not believe that Pembrook
was one of the three men who entered Tapper’s.
8
This value was used in the Presentence Reports. The parties have elsewhere asserted that 137 watches
were stolen, at a value of $1.2 to 1.3 million. The actual amount is not in dispute in this appeal.
9
The man used the name “Robert Packard” and a Chicago address, but did not give formal identification.
4
No. 16-1650
United States v. Pembrook, et al.
around to park, and six men got out of the two cars and shared the three rooms. A few minutes
after arriving, three men took the Passat and then the minivan across the street for gas at a Shell
station, as recorded on the Shell station’s surveillance video. The Comfort Inn video also
recorded four men leaving the motel the next morning at about 9:00 a.m., and those men were
recognizable in the jewelry stores’ videos as the men in the hotel videos.10
The cell-tower records had also placed the four suspected cell phones near this New
Buffalo location and the call-detail records helped put names to three of the numbers: Calhoun to
#0033 based on the aforementioned call to Enterprise as well as calls to his mother and
girlfriend; Johnson to #1434 based on calls to his girlfriend (over 100 calls); and Briley to #7819
based on calls to his ex-wife, current girlfriend, daughter, and mother. The Shell station
attendant, Sue Graff, later picked Calhoun and Briley from a police photo array. Johnson had
given the #1434-phone to a friend in Philadelphia, who gave it to the FBI when questioned and
who also identified Johnson in the videos from the Shell station and Tapper’s. Briley was most
evident in the videos from both the hotel and Tapper’s because of a distinctive outfit.
Meanwhile, the blood drops at Medawar Jewelry produced Pembrook’s name from the
DNA database. Police tracked him to a Philadelphia hospital at which he had arrived at 4:00
a.m. on April 23 for removal of the bullet from his arm. He left a day or so later, but had called
Briley from the phone in his hospital room before leaving. Ballistic tests matched the removed
bullet to the store owner’s gun. Philadelphia police arrested Pembrook and sent him back to
Detroit where he declined to cooperate and instead—using another inmate’s phone passcode—
called his girlfriend with a covert warning to the other robbers that the police were onto them.
Police eventually arrested the other three suspects and sent them to Detroit for
prosecution. When the police arrested Calhoun, he had in his wallet the credit card and driver’s
10
The other two suspects in the hotel surveillance videos were not identified, indicted, or prosecuted.
5
No. 16-1650
United States v. Pembrook, et al.
license used to rent the Passat. When the police arrested Briley, his cell phone had a picture of
him wearing the same outfit he was wearing in the Shell station surveillance video.
Facing robbery, conspiracy, and firearms charges, the defendants filed several pre-trial
motions, including one to dismiss the second § 924(c) count as duplicative, one to suppress the
cell-tower records or exclude testimony about it, and one to suppress the Shell station attendant’s
photo-array identifications. The district court denied the motions. See R. 75 and 85 (§ 924(c) as
duplicative); United States v. Pembrook, 119 F. Supp. 3d 577 (E.D. Mich. 2015) (cell tower data
and testimony); United States v. Pembrook, 2015 WL 6328186 (E.D. Mich. Oct. 21, 2015)
(photo array). The case proceeded to a jury trial, which lasted 16 days. At trial, amongst other
witnesses, FBI Agent Christopher Hess testified as an expert on cell-tower site information and
Agent Max testified as a lay witness, not an expert. Also, mid-trial, the government
unexpectedly called a jailhouse informant named James Jenkins to testify about his conversations
with Pembrook. This prompted Pembrook to demand all of Jenkins’s prison records, and the
other defendants to move to sever the trial. The district court denied the motions.
The jury convicted all four defendants on all counts and the district court sentenced each
of the four to 33 years in prison—one year each for the robbery, conspiracy, and felon-in-
possession counts, to run concurrently, and 32 years for the two § 924(c) convictions (seven for
the first and a mandatory 25 for the second, to run consecutively). All four defendants appeal.
II.
A.
The defendants claim that the pretrial photo-array identification was unduly suggestive.
We review “the denial of a motion to suppress identification evidence for clear error.” United
States v. Washington, 714 F.3d 962, 966 (6th Cir. 2013). “The burden rests on the defendant[s]
to demonstrate that the pretrial identification procedure was impermissibly suggestive.” Id.
6
No. 16-1650
United States v. Pembrook, et al.
(quotation marks omitted). “If the defendant[s] meet[] this burden, then the court must
determine, in light of all of the circumstances, whether the unfair suggestiveness was conducive
to a very substantial likelihood of irreparable misidentification[s].” Id. (marks omitted).
Calhoun and Briley claim that the district court erred by denying their motion to suppress
Shell station attendant Sue Graff’s identification of them from the photo arrays and argue that the
photo arrays were unduly suggestive, her testimony about her memory was equivocal, and her
recollection came only from watching the surveillance videos later. For his part, Calhoun says
that because there was no memorable event at the Shell station that would have caused Graff to
remember the defendants, she identified them only from the video, not her recollection.
Briley’s theory is more nuanced.11 He begins with the premise that Graff’s identification
was unreliable because: (1) she initially claimed the video was too “grainy” and she did not have
her proper eyeglasses; (2) she made no written statement, but just initialed her choice on the
photo array (for Briley, number 4 of 6); (3) she told police her recollection was based on Briley’s
washed out skin and lips—“like Michael Jackson”—but omitted Briley’s “most remarkable
feature—that Briley had a beard with no mustache”; (4) at trial, she identified the wrong person
on the photo-array (number 1 instead of 4) until the prosecutor directed her to her initials by
Briley’s photo (number 4), which changed her mind; and (5) the prosecutor did not ask her to
identify Briley (or Calhoun) at trial, but relied solely on the photo array(s).12
Briley also accuses the police of coaching Graff with the video and withholding this from
discovery, based on his interpretation of Graff’s testimony: that she had seen the video before the
11
Briley’s theory in the district court had been that the photo array was unduly suggestive because the other
people pictured did not look like him. The court disagreed as a factual matter. Pembrook, 2015 WL 6328186 at *3.
12
Briley’s attorney makes much of these last two items in his Reply Brief (i.e., that Graff initially identified
the wrong photo and the prosecutor did not have her identify Briley at trial) but these things would actually appear
to help Briley’s defense inasmuch as the jury saw her misidentification, and we see nothing that prevented Briley’s
counsel during cross examination from emphasizing this error and exploring this perceived inability to identify
Briley at trial, or from challenging her to identify Briley in court even though the prosecutor had not.
7
No. 16-1650
United States v. Pembrook, et al.
photo-array identification but could not have seen it at the Shell station because it was locked in
the manager’s office beyond her access, so “someone” from the government must have shown it
to her, though she could not recall who.13 The police investigator denied this. Proceeding on
this theory that some unknown police officer surreptitiously showed the surveillance video to
Graff and coached her to identify Briley (and Calhoun) in the photo array, Briley contends that
the inquiry was improperly suggestive, that Graff’s identification was unreliable and “implicates
concerns related to cross-racial identification,” and that the district court erred by refusing to
suppress Graff’s testimony. Moreover, Briley contends that the government’s failure to disclose
this supposed meeting and the officer involved violated Brady v. Maryland, 473 U.S. 83 (1963).
Because this claim rests on Graff’s cross-examination testimony, in which she allegedly
revealed this (secret and improper) meeting with an unknown police officer, who used the
surveillance video to coach her to identify Briley and Calhoun, that testimony bears quoting:
Q. Did you, on occasion, look at those videos just to see what was on them?
A. No, I’m not allowed to go back in the manager’s office. I have no access to that,
she [the Shell station manager] keeps that under lock and key.
Q. Before any officer traveled down to Grand Rapids or some place out of town to look
at these tapes, did you see them?
A. Did I see them when?
Q. With the manager of the store, did you go into his [actually her] office and look at
them for that night?
A. I don’t know who I looked [at] them with. It wasn’t that night though.
Q. Okay. Well, it was some time before the officer came [with the photo array], wasn’t
it? You’re shaking your head.
A. I do believe so, yes, but I don’t think it was with the manager.
Q. How much time did you spend looking at them then?
A. I really couldn’t tell you a time.
Q. You had some idea when you looked at them, though, about what time it was that
the officers were interested?
13
All defendants and attorneys knew that Graff had viewed the surveillance video prior to her photo-array
identification, as it was openly discussed at the July 21, 2015, hearing on Calhoun’s motion to suppress that
identification. See R. 85 at 14, 22. The “new” aspect to this was the accusation that the police had shown it to her.
8
No. 16-1650
United States v. Pembrook, et al.
A. Right, but then it refreshed my memory when I seen them people. I gave them a
description because our screen was grainy.
Q. Okay. So, before the officers came, I think that what you said, if I’m not correct,
please let me know, that you looked at the tapes with someone, right?
A. Yes.
Q. Did you do that more than once?
A. I couldn’t tell you. I couldn’t remember on that one.
Q. Okay. And looking at them gave you the opportunity to see what was on those
tapes, isn’t that right?
A. Yes.
Q. So, that when it came some later point in time, an officer came with photos [i.e., the
photo array] that you’ve seen here this morning, right?
A. Right.
Q. And before those individual photos, you had seen these tapes?
A. It was days prior to that.
Q. Right. And what you were thinking about in your head was as best as you could
remember and all these things that included what you could remember about
working back in April, that was one thing in your memory, right?
A. Um-hum.
Q. And another thing that was in your memory is what you had seen looking at those
tapes, right?
A. Yes.
Q. And so the officer then asked you to look at some photos that you’ve said here today
are the ones that were shown to you; isn’t that right?
A. Correct.
Q. And then when you went through this process of picking out someone, what you
were doing was basing your conclusion, what you thought in response to his
question, about everything that was in your memory, right?
A. Yes.
Detective Justin DeBoode was the lead investigator for this New Buffalo aspect of the
investigation and, as such, reviewed the Shell station surveillance video with the station
manager, questioned Graff with the photo array, and testified as the only witness at the pretrial
hearing on the defendants’ motion to suppress that photo-array identification. The Shell video
recorded the suspects on April 21 but the police did not learn of the video until May 28 and
9
No. 16-1650
United States v. Pembrook, et al.
DeBoode did not speak with Graff until June 3. DeBoode testified that when he first spoke with
Graff on June 3, which was by telephone, she had already watched the video—he reiterated this
four times during his testimony—and he assumed that the Shell station manager or another
employee had shown it to her. According to DeBoode, he met with Graff to view the photo array
on June 23, almost three weeks later. He testified that neither he nor anyone else from law
enforcement watched the video with Graff or ever advised her to watch it herself.
In Briley’s pre-trial motion to suppress Graff’s testimony as improperly relying on the
surveillance video rather than her own recollection, the district court explained:
Briley argued that because Graff reviewed the security camera footage before
viewing the lineup, her identification was not based on her ‘honest recollection’
of the suspect, but rather, on the image portrayed in the security video. But
DeBoode testified that neither he nor any other law enforcement agent instructed
Graff to review the security camera footage before viewing the photo lineup.
Thus, this is not an argument that the ‘procedure itself’ [i.e., the actions taken by
the police] rendered the lineup unduly suggestive, but rather that Graff herself
took certain actions that made her more likely to pick a suspect resembling the
one pictured on the security video. This is certainly relevant for purposes of
cross-examination, but it does not bar the admissibility of the identification.
DeBoode further testified that the hat and clothing worn by the subject on the
video is different from that being worn by Briley in the photo array, which further
minimizes the risk that Graf[f] selected Briley merely because she reviewed the
video and not based on her independent recollection.
Pembrook, 2015 WL 6328186 at *4 (citation omitted). This reflects that the district court
believed Detective DeBoode’s testimony that police did not view the surveillance video with
Graff, a finding of fact regarding witness credibility to which we owe great deference on appeal.
As for Briley’s Brady claim, the record contains no evidence that any government agent
showed the surveillance video to Graff, much less coached her, and the government is not
obliged to produce evidence that it does not have or that does not exist. See United States v.
Graham, 484 F.3d 413, 417 (6th Cir. 2007) (“Brady clearly does not impose an affirmative duty
upon the government to take action to discover information which it does not possess.”); United
States v. Edwards, 442 F.3d 258, 266 (5th Cir. 2006) (“The prosecution has no duty to turn over
10
No. 16-1650
United States v. Pembrook, et al.
to the defense evidence that does not exist.” (editorial marks omitted)); United States v.
Sukumolachan, 610 F.2d 685, 687 (9th Cir. 1980) (“Brady [] does not require the government to
create exculpatory material that does not exist.” (citation omitted)).
The district court properly denied this motion.
B.
The defendants appeal the denial of a pretrial motion to suppress the cell-tower location
evidence. “In reviewing a ruling on a motion to suppress, we will uphold a district court’s
factual findings unless they are clearly erroneous, but will conduct a de novo review of a district
court’s legal determinations.” United States v. Dunning, 857 F.3d 342, 346 (6th Cir. 2017).
Prior to trial, the defendants moved to suppress the cell-tower location information that
Agent Max had obtained and used in the investigation, arguing that they had a legitimate
expectation of privacy in that information under the Fourth Amendment such that its collection
required probable cause or a warrant. Agent Max had no warrant, but instead used the Stored
Communications Act, 18 U.S.C. § 2701, et seq. In short:
A governmental entity may require a provider of electronic communication
service or remote computing service to disclose a record or other information
pertaining to a subscriber to or customer of such service (not including the
contents of communications) . . . when the governmental entity . . . obtains a court
order for such disclosure under subsection (d) of this section[.]
18 U.S.C. § 2703(c)(1)(B). Under subsection (d), such a court order “shall issue only if the
governmental entity offers specific and articulable facts showing that there are reasonable
grounds to believe that the contents of a wire or electronic communication, or the records or
other information sought, are relevant and material to an ongoing criminal investigation.” Id. at
§ 2703(d). There is no dispute that “this statutory standard is less than the probable cause
standard for a search warrant.” United States v. Davis, 785 F.3d 498, 505 (11th Cir. 2015).
11
No. 16-1650
United States v. Pembrook, et al.
The district court denied the defendants’ motion to suppress and held that, even if
mistaken, the government had “an objectively reasonable good-faith belief” that no warrant was
required. Pembrook, 119 F. Supp. 3d at 595-96. “[N]o Supreme Court authority established by
mid-2014 that obtaining cell-site data—even data that might reveal [the defendants’] daily travel
over a six-week period or disclose [their] presence in a private place—was a search within the
meaning of the Fourth Amendment,” id. at 591; nor did any Sixth Circuit case establish such
precedent, id. at 592-93; nor was the out-of-Circuit precedent compelling (or consistent), id. at
593-95. The district court concluded that, “[a]lthough it may ultimately become settled [law]
that long-term tracking via cell phones . . . requires a warrant supported by probable cause, that
law was not established at the time the Government sought and obtained the cell-site data at issue
in this case. Deterrence, therefore, will not be forwarded by suppression.” Id. at 599. We agree
and find no constitutional reason to suppress the cell-tower location evidence.14
Calhoun also argued for suppression on the basis that Agent Max had provided the court
an insufficient factual basis, which failed to satisfy the “reasonable grounds” requirement of the
Stored Communications Act, 18 U.S.C. § 2703(d). But the district court explained that even if
that accusation were true (without conceding that it was), because the Act’s remedy provision,
§ 2707, does not provide for suppression as a remedy, the court was not authorized to suppress
the cell-tower location information on such a theory. Pembrook, 119 F. Supp. 3d at 585.
In the initial application for the “tower dump,” the AUSA (on behalf of Agent Max)
briefly informed the magistrate judge about the particulars of the two robberies—the severity, the
violence, and their similarities, such as that the surveillance video from the two stores supported
14
Since the district court ruled, we (temporarily, it turns out) held that cell-tower location information is
not protected. United States v. Carpenter, 819 F.3d 880, 890 (6th Cir. 2016) (“[W]e hold that the government’s
collection of business records containing cell-site data was not a search under the Fourth Amendment.”). But the
Supreme Court granted certiorari in Carpenter, No. 16-402, 2017 WL 2407484 (June 5, 2017), which vacated it and
holds open the possibility of a different rule. Therefore, we do not rely on Carpenter in this decision.
12
No. 16-1650
United States v. Pembrook, et al.
the suspicion that the same robbers committed both—and concluded that he “believe[d] that cell
tower information in the two locations may reveal a common [cell phone] number that was
active at each location around the time of the crime [and] identification of this number w[ould]
aid in identifying potential suspects involved in the robberies.” Calhoun’s primary complaint is
that “[t]he application provided no facts to establish cause to believe any cell phone was used.”
That is a specious claim.
Calhoun’s legal argument is that the factual rendition supplied to the magistrate judge did
not provide “reasonable grounds to believe that the . . . records . . . sought[] [we]re relevant and
material to an ongoing criminal investigation,” § 2703(d), but was instead a “fishing expedition”
akin to a “general warrant” prohibited by the Fourth Amendment. But under the statutory
standard of “reasonable grounds to believe the records are material to an ongoing investigation,”
we conclude that the facts provided here were sufficient.
The district court properly denied this motion.
C.
The defendants claim the district court improperly admitted expert and lay testimony
about the cell-tower-location evidence. We review the district court’s admission of testimony at
trial for an abuse of discretion. United States v. LaVictor, 848 F.3d 428, 440 (6th Cir. 2017).
Pembrook argues that the district court abused its discretion by allowing FBI Agents
Christopher Hess and Brian Max to testify as expert and lay witness, respectively, about the cell-
tower-location data, specifically about how the cell-site analysis placed phones linked to the
defendants in proximity to the robberies. Pembrook relies primarily on United States v.
Reynolds, 626 F. App’x 610 (6th Cir. 2015), for the proposition that such analysis is unreliable.
The government answers that cell-site analysis is reliable, citing United States v. Hill, 818 F.3d
13
No. 16-1650
United States v. Pembrook, et al.
289, 299 (7th Cir. 2016) (“The science and methods upon which the technique is based are
understood and well documented.”), and argues that “Reynolds is flawed.” 15
Flawed or not, the cell-site analysis proffered in Reynolds differs significantly from the
cell-site analysis here, based on the precision of the location. The cell-site analysis in Reynolds
was focused on a cell-site’s “sector” (the area in range of a specific tower) with the actual
question being whether certain calls established that the phone owner was outside a certain
sector, so as to exclude those phone owners as suspects. Here, in contrast, the cell-site analysis
was of a much larger geographical area, and focused on whether the calls established that the
phone owners (from Philadelphia) were in the proximity of Medawar jewelry (Plainfield
Township, Michigan, near Grand Rapids) at noon, Tapper’s jewelry (West Bloomfield
Township, Michigan, near Detroit) at 5:00 p.m., and New Buffalo, Michigan, the night before.
At this level of geographic distance, cell-site analysis is established as reliable.16 See United
States v. Lewisbey, 843 F.3d 653, 659 (7th Cir. 2016) (“Using call records and cell towers to
determine the general location of a phone at specific times is a well-accepted, reliable
methodology.”). In fact, even Reynolds appears to contradict Pembrook’s argument. See
Reynolds, 626 F. App’x at 617-18 (explaining that “such a challenge speaks to the weight of the
evidence, and not to its inherent reliability, because there are identifiable, measurable, and
scientifically accepted factors that determine a cell tower’s maximum coverage range”).
Pembrook continues on the same theme by arguing that the cell-site analysis—and,
therefore, Hess’s expert testimony about it—did not satisfy Daubert v. Merrell Dow
15
The government argues that Reynolds misread its cited cases, relied on an outdated technical manual, and
made unfounded assumptions. Moreover, Reynolds is unreported and, therefore, not controlling.
16
As the district court framed this: “The Government explains that it ‘is not attempting to put a particular
cell phone in a very specific location via Agent Hess’[s] testimony’; instead, it ‘is attempting to show how the four
phones in question originated in [] Philadelphia, Pennsylvania[,] on April 21, 2014, traveled in a similar pattern over
the next few days, were in the Grand Rapids and West Bloomfield areas around the time[s] of the robberies, and
traveled back to Philadelphia on April 22-23, 2014.’ The Government ‘concedes’ that cell-site data cannot place
Defendants ‘in a precise location.’” Pembrook, 119 F. Supp. 3d at 597 (citations and editorial marks omitted).
14
No. 16-1650
United States v. Pembrook, et al.
Pharmaceuticals, Inc., 509 U.S. 579, 595 (1993), or Federal Rule of Evidence 702(c). In
testifying about how he used cell-site analysis to track the phones in question (i.e., Philadelphia
to New Buffalo, to near Medawar at the time of the first robbery, to near Tapper’s at the time of
the second robbery, and back to Philadelphia), Hess explained that cell phones connect to a
nearby tower but not necessarily the closest tower; rather the phones connect to the tower with
the strongest signal, so distance is just one factor, along with others such as geography, physical
obstruction, interaction with other towers, or the number of users in the system. A cell phone
could connect to a tower as much as seven miles away, but obviously a phone in Philadelphia
would not connect to a tower in Michigan, nor would a phone in Grand Rapids connect to a
tower in Detroit (150 miles away).
Pembrook’s argument that Hess’s expert testimony was improper because cell-site
analysis is unproven and unreliable under Daubert and FRE 702(c) unravels before it begins
because the particular form of cell-site analysis and corresponding testimony used here was
reliable. To the extent that Pembrook contends that this form of cell-cite analysis has not been
objectively tested or subjected to peer review, Daubert, 509 U.S. at 595, that contention appears
to be incorrect. See, e.g., Aaron Blank, The Limitations and Admissibility of Using Historical
Cellular Site Data to Track the Location of a Cellular Phone, 18 RICH. J.L. & TECH. 3 (2011).
And to the extent that Pembrook complains about the absence of error rate data, such analysis is
inapplicable to the particular form of analysis and expert testimony at issue. Because the cell-
site analysis and associated testimony presented here was reliable, the absence of a Daubert
hearing or 702(c) inquiry does nothing to undermine the court’s ruling.17
17
In his Reply Brief, Pembrook argues that a “forensic radio survey” was necessary to “pinpoint” the call
origin, without which the cell site information was useless and Hess’s testimony inadmissible. This is the first
mention of a forensic radio survey, so this argument was forfeited, but even if it had been raised, it is irrelevant
inasmuch as Hess was not “pinpointing” locations, as we explained in the text above.
15
No. 16-1650
United States v. Pembrook, et al.
Finally, Pembrook argues that Agent Max, a lay witness, gave expert testimony in
violation of FRE 701(c) and testified about parts of the investigation that were outside of his
personal knowledge. But Agent Max did not explain how the cell-site analysis works, he
testified about his use of reports to locate the suspects; that is, he used a report that matched a
cell phone number to a tower and its location at a certain time, testimony that requires no
expertise. Agent Max also testified about certain background activities (such as the tower dump,
the delay in obtaining the records, and certain errors in those records, including a misspelling of
Detroit) that led up to his portion of the investigation, all of which was within his personal
knowledge even though he did not actually conduct those preliminary activities. This was
legitimate lay testimony. See United States v. Wilson, 653 F. App’x 433, 443 (6th Cir. 2016).
The district court did not abuse its discretion by admitting this testimony.
D.
The defendants claim a Brady/Giglio violation regarding background information on the
inmate witness. If a defendant properly preserves his Brady/Giglio claim,18 then our review is de
novo. United States v. Rafidi, 829 F.3d 437, 446-47 (6th Cir. 2016). But if the defendant fails to
properly preserve the claim, then our review is for plain error. United States v. Crayton,
357 F.3d 560, 569 (6th Cir. 2004). We need not decide whether this claim was properly
preserved because even under de novo review this claim would fail.
Pembrook argues that the government violated Brady and Giglio by withholding certain
background information about jailhouse-informant-witness James Jenkins. He points
Pembrook also complains that Hess “failed to disclose the serious pitfalls of cell-site analysis” and “failed
to provide adequate disclaimers about the unreliability of his methodology.” Of course, this would have been good
information for Pembrook’s attorney to draw out on cross examination.
18
See Brady v. Maryland, 373 U.S. 83, 87 (1963) (holding that “the suppression by the prosecution of
evidence favorable to an accused upon request violates due process where the evidence is material either to guilt or
to punishment, irrespective of the good faith or bad faith of the prosecution”); Giglio v. United States, 405 U.S. 150,
154-55 (1972) (holding that Brady requires the disclosure of an agreement between the prosecution and its witness).
16
No. 16-1650
United States v. Pembrook, et al.
specifically to Jenkins’s complete Michigan Department of Corrections prison disciplinary
records that defense counsel theoretically could have used for impeachment, though Pembrook
does not specify how.
The government responds that Michigan state prison records do not fall within Brady’s
coverage of materials that the federal prosecutor would have in its possession. See, e.g., United
States v. Aichele, 941 F.2d 761, 764 (9th Cir. 1991) (holding that a federal prosecutor had no
duty to procure materials prepared for the state courts which were not otherwise under federal
control). Moreover, disciplinary records, which would not bear on Jenkins’s truthfulness, were
neither material nor admissible at trial. United States v. Phibbs, 999 F.2d 1053, 1089 (6th Cir.
1993) (“Frequently, though, evidence associated with ‘suspected’ wrongdoing will not be
admissible even for impeachment purposes, having no bearing on the capacity for truth of any
witness.”). Finally, because Pembrook failed to specify, let alone prove, how the records would
have changed the trial’s outcome, he has shown no prejudice from the alleged withholding.
This claim has no merit.
E.
The defendants claim the district court erred by denying their Bruton-based motion to
sever the trials. An alleged Bruton violation is a Confrontation Clause challenge, which we
review de novo. United States v. Ford, 761 F.3d 641, 652 (6th Cir. 2014).
Calhoun claims that the district court improperly refused to sever the trials when the
government called inmate James Jenkins to testify about Pembrook’s jailhouse admissions to the
conspiracy and his identification of the other defendants. And Johnson claims that the inability
to cross-examine co-defendant Pembrook about his conversation with Jenkins, particularly the
alleged admission and identifications, violated his (and Calhoun’s and Briley’s) Sixth
17
No. 16-1650
United States v. Pembrook, et al.
Amendment right to confront the witness against him, pursuant to Bruton v. United States,
391 U.S. 123 (1968), which found such a violation due to a co-defendant’s confession.
But “the Confrontation Clause has no bearing on nontestimonial out-of-court statements,”
United States v. Johnson, 581 F.3d 320, 325 (6th Cir. 2009), which means that Bruton is limited
to only testimonial statements, United States v. Crowe, 614 F. App’x 303, 307 (6th Cir. 2015)
(“Because the Bruton principle is premised upon the Confrontation Clause, the principle applies
only to testimonial statements.”). And statements from one inmate to another are not
testimonial. Fields v. Birkett, 461 F. App’x 454, 457-58 (6th Cir. 2012); see also Davis v.
Washington, 547 U.S. 813, 825 (2006) (opining that the statements from one prisoner to another
in Dutton v. Evans, 400 U.S. 74, 87-89 (1970) “were clearly nontestimonial”).
This claim has no merit.
F.
The defendants claim that the evidence was insufficient to support their convictions. We
review sufficiency of the evidence de novo, asking whether, upon viewing all of the evidence in
the light most favorable to the prosecution, any rational juror could have found all of the
elements beyond a reasonable doubt. Jackson v. Virginia, 443 U.S. 307, 319 (1979).
Some facts are not in dispute. At noon on a Tuesday, four masked men robbed the
Medawar jewelry store by force, brandishing guns and threatening employees. One was
Pembrook, whose participation was established by DNA and ballistic evidence. All four drove
off together in a black Chrysler Town & Country minivan. At 5:15 p.m. that same day, three
masked men similarly robbed the Tapper’s jewelry store by force, brandishing guns and
threatening employees. In the surveillance video, these three were dressed the same as the men
involved in the earlier robbery and appeared to be the same men, minus Pembrook. They also
drove off in a black Chrysler Town & Country minivan that appeared to be the same van as had
18
No. 16-1650
United States v. Pembrook, et al.
been used in the earlier robbery. In the videos, these three and this van were also associated with
a white Volkswagen Passat. None of this is in any reasonable dispute. On the other hand, no
witnesses to the robberies could actually identify any of the robbers.
There is overwhelming evidence that Pembrook and three other robbers were guilty of
the robbery, conspiracy, and firearms crimes as charged. See United States v. Graewe, 774 F.2d
106, 107-08 (6th Cir. 1985) (“[A] conspirator may be held liable of a substantive offense
committed by co-conspirators provided the substantive offense was committed in furtherance of
the conspiracy and as part of it.”). The question is whether Briley, Calhoun, and Johnson were
the three other robbers. More to the point, the question is whether the government proved it.
Briley claims that Graff’s identification was tainted, unreliable, and irrelevant in that it
did not place him at either robbery. And he says the other circumstantial evidence was severely
flawed, to wit: (1) while the distinctive outfit of bomber jacket and long flannel shirt was seen in
both the photo from his phone and certain surveillance videos, the government could not prove
they were exactly the same or that others could not have had that same outfit, and that outfit did
not appear in the robbery surveillance videos; (2) the images in the surveillance videos were not
clear enough to conclusively match the suspect (alleged to be Briley) in the New Buffalo videos
to the suspect in the jewelry store videos, and even the government argued only that the suspects
had a “similar build” or “similar clothes”; and (3) while the government had tracked a cell phone
with a number ending 7819 along the robbery pattern and had attributed that #7819-phone to
Briley based on calls to his ex-wife, current girlfriend, daughter, and mother, Briley had
presented certain evidence that his only cell phone number ended with 6615, and phone records
19
No. 16-1650
United States v. Pembrook, et al.
showed that the #6615-phone had been in Philadelphia, making and receiving texts and calls,
during the April 21 to 23 timeframe of the robberies in Michigan.19
The government points to six things that, taken together, are sufficient to permit a rational
juror to convict Briley: (1) the #7819-phone was linked to Briley by calls to his family and
friends, followed the robbery pattern, and had nine calls on the day of the robberies to the
Calhoun and Johnson phones; (2) the jury saw the Tapper’s exterior video, in which Briley was
recognizable getting out of the Passat, walking around, and returning to the black minivan (from
which three masked robbers next emerged, wearing the same outfits as the Medawar robbers had
worn); (3) the jury saw the surveillance video of the black minivan at the Medawar robbery and
of both the Passat and minivan at the New Buffalo Comfort Inn the night before; (4) the jury saw
the Shell station surveillance video with the “grainy” images, and heard testimony (from cashier
Sue Graff) that identified Briley as one of the customers; (5) Briley’s cell phone seized by police
contained a photograph of him wearing the same recognizable outfit as in the Shell video and
outside Tapper’s; and (6) Pembrook called Briley from his hospital room the day after the
robberies. This evidence is enough to support a juror’s conclusion that Briley was one of the
robbers, and Briley’s arguments to the contrary do not undermine this conclusion in any
meaningful way.
Calhoun claims that the district court erred by denying his motion for acquittal because
the government’s circumstantial evidence was insufficient: no witness identified Calhoun at
either robbery, no evidence (testimonial or otherwise) proved that Calhoun ever had a gun or
agreed to any conspiracy, the identification by the Shell station witness (Graff) was equivocal
19
This evidence was two-fold: when the police arrested Briley, he had the #6615-phone in his possession
(not the #7819-phone, which was never physically connected to him); also, Briley introduced as evidence an email
that he sent to his daughter from prison in which he wrote that his only cell phone number was the one ending 6615.
20
No. 16-1650
United States v. Pembrook, et al.
and unreliable, and no witness actually identified Calhoun as the renter of the Passat—the
connection instead was based only on rental records, namely, his driver’s license and credit card.
The government points to five things that, taken together, are sufficient to permit a
rational juror to convict Calhoun: (1) the #0033-phone was linked to Calhoun by calls to his
mother and girlfriend, as well as the recorded call to Enterprise in which he identified himself by
name, that phone followed the robbery pattern, and that phone had 15 calls on the day of the
robberies to the Briley and Johnson phones; (2) Calhoun’s driver’s license and credit card were
used to rent the white Volkswagen Passat that was with the black minivan in the videos from the
New Buffalo Comfort Inn and Shell station on April 21 and outside Tapper’s before the robbery;
(3) when arrested, Calhoun was with Briley and was carrying the driver’s license and credit card
used to rent the Passat; (4) Sue Graff identified Briley as one of the customers in the Shell station
on April 21; and (5) the jurors watched the multiple surveillance videos for themselves. This is
enough evidence to support a juror’s conclusion that Calhoun was one of the robbers, and his
arguments to the contrary do not undermine this conclusion in any meaningful way.
Johnson admits to being in the vicinity of the robberies, but argues that the government
did not prove that he was one of the robbers. He also argues that nothing proves that the use of a
gun in the conspiracy was separate and distinct from the use of a gun in the Tapper’s robbery.
The government points to three things that, taken together, are sufficient to permit a
rational juror to convict Johnson: (1) the #1434-phone that he gave to a friend who gave it to the
FBI, was linked to Calhoun by over 100 calls to his girlfriend, followed the robbery pattern, and
called the Briley and Calhoun phones numerous times throughout the day of the robberies;
(2) Johnson’s friend—to whom he had given the cell phone—identified Johnson in the Shell
station surveillance video; (3) the jurors watched the surveillance videos for themselves,
including video of Johnson loitering outside Tapper’s before the robbery and the video of the
21
No. 16-1650
United States v. Pembrook, et al.
suspect wearing the same outfit as Johnson had been wearing in his Facebook page photos. This
is enough evidence to support a juror’s conclusion that Johnson was one of the four robbers, and
his arguments to the contrary do not undermine this conclusion in any meaningful way.
These sufficiency-of-the-evidence claims fail.
G.
The defendants claim the verdict on the second § 924(c) charge violated due process.
Calhoun and Johnson argue that the § 924(c) charge in Count 4 was duplicative of the § 924(c)
charge in Count 2, because both were predicated on the same underlying conduct (the Tapper’s
robbery), subjecting them to double jeopardy in violation of the Constitution. The district court
disagreed, explaining at least three times20 that Count 2 addressed the defendants’ decision to use
a firearm during the Tapper’s robbery while Count 4 addressed the decision to use a firearm in
connection with the conspiracy (to travel across four states and rob Tapper’s and Medawar),
which were separate crimes. Johnson protests that “there is no way to distinguish the use of a
gun in the conspiracy from the use of a gun at the Tapper’s robbery,” so they must be the same
crime, not two separate crimes.
Briley also argues that the counts are duplicative, quoting United States v. Vichitvongsa,
819 F.3d 260, 269 (6th Cir. 2016) (“the government must prove both a use, carry, or possession,
as well as a qualifying crime”), and insists that the robbery and conspiracy offenses occurred
simultaneously, were based on the same course of conduct, and were limited to only one actual
act of brandishing. To be sure, Vichitvongsa holds that “one affirmative firearm act (brandishing
a handgun) [that] simultaneously commit[s] two predicate offenses (conspiring to commit Hobbs
20
Calhoun raised this argument in a pre-trial motion to dismiss either Count 2 or 4, which the court denied.
Calhoun raised it again during trial in his motions for acquittal, which the court denied. And Calhoun raised this
argument in his post-trial motion for a new trial or relief from judgment. Again, the court denied the motion. It
does not appear from the record or from Calhoun’s rendition in his brief that he modified this argument in any way
at any point.
22
No. 16-1650
United States v. Pembrook, et al.
Act robbery and to traffic drugs), . . . does not support two § 924(c) convictions,” because
Vichitvongsa only used the gun once. Id. at 267. Thus, we acknowledged that “the imposition
of separate consecutive sentences for multiple § 924(c) violations occurring during the same
criminal episode [is] lawful,” id. at 269 (quotation marks omitted), but “the defendant must use,
carry, or possess a firearm—even if it is the same [firearm]—more than once,” id. at 269, so the
question is “whether the defendant made more than one choice to use, carry, or possess a
firearm,” id. at 270. Briley is right about the law but wrong about the facts. As the district court
explained repeatedly: the defendants used, carried, or possessed a firearm in (1) possessing and
transporting for the purpose of the robberies (conspiracy); (2) robbing the Medawar store (here
charged as part of the conspiracy); and (3) robbing the Tapper’s store (robbery). Focusing on the
Medawar robbery as the basis for the conspiracy, the two crimes (Medawar-based conspiracy
and Tapper’s robbery) did not occur simultaneously, were not the same course of conduct, and
were not limited to only one actual act of brandishing. These were two separate crimes.
Pembrook argues that, given the evidence that he did not physically participate in the
Tapper’s robbery (his having already been shot),21 the court’s verdict form limited the jury to
either of two improper bases for convicting him on the second § 924(c) use-of-a-firearm charge:
either by implicitly convicting him of the Medawar robbery, which was not charged and was
outside the venue of the Eastern District of Michigan; or by convicting him twice for the same
conspiracy charge, in that his “participation” in the Tapper’s robbery—at most, aiding and
abetting—is the same conduct as the conspiracy. The question on the verdict form was this:
If guilty as to Count Four [the second § 924(c) charge], we unanimously find that
the use and carry of the firearm was during and in relation to, conduct separate
and distinct from the conduct charged in Count One [the Tapper’s robbery][.]
21
Note that the evidence does not show or prove that Pembrook was entirely absent from the Tapper’s
robbery; rather, there is a lack of evidence that he was inside the Tapper’s store during the robbery. Where he
actually was is not in evidence, but he did not show up at the hospital until nearly twelve hours after the robbery.
23
No. 16-1650
United States v. Pembrook, et al.
R. 146 (verdict form). The jury convicted Pembrook on Count 1.
Beguiling though Pembrook’s argument might be, his problem is that aiding-and-abetting
is merely a constructive version of the substantive robbery offense and is, therefore, a separate
crime from conspiring. United States v. Bradley, 421 F.2d 924, 927-28 (6th Cir. 1970) (relying
on Pereira v. United States, 347 U.S. 1, 11 (1954) (“Aiding, abetting, and counseling are not
terms which presuppose the existence of an agreement.”)). Therefore, the government charged
—and the jury convicted—Pembrook on two separate crimes: aiding-and-abetting the Tapper’s
robbery and conspiring via the Medawar robbery. And, as has already been explained herein, the
government produced sufficient evidence of each to support the two convictions.
This claim has no merit.
H.
The defendants claim that 18 U.S.C. § 924(c)(3)(B) is unconstitutionally vague, such that
the § 924(c) minimum sentences do not apply and resentencing is warranted. This argument is
that the conspiracy in this case (conspiracy to commit Hobbs Act robbery) is not a crime of
violence because § 924(c)(3)(B) is unconstitutionally vague and therefore invalid, as the Court
found § 924(e)(2)(B) to be in Johnson v. United States, 135 S. Ct. 2551 (2015). The problem for
the defendants is that we have, since Johnson, held that § 924(c)(3)(B) is not vague (i.e., it is
valid), see United States v. Taylor, 814 F.3d 340, 376-79 (6th Cir. 2016). But the defendants
preserve this claim on the possibility that the case of Sessions v. Dimaya, No. 15-1498, 137
S. Ct. 31 (2016), pending in the Supreme Court on the question of whether 18 U.S.C. § 16(b) is
unconstitutionally vague per Johnson, will result in their favor. Their theory, which they say was
24
No. 16-1650
United States v. Pembrook, et al.
raised at oral argument in Dimaya (Jan. 17, 2017), is that § 16(b) and § 924(c)(3)(B) are
materially identical, so if one is vague then the other must be also.22
Were the defendants correct that § 924(c)(3)(B) is invalid and the conspiracy (and Hobbs
Act robbery as well, Pembrook claims23) is not a crime of violence, such that the § 924(c)
sentencing minimum does not apply, they would be entitled to resentencing. But that is not
correct under our presently prevailing law. Taylor, 814 F.3d at 376-79.
This claim fails per our decision in Taylor, though it is preserved for possible
reconsideration pending the forthcoming decision in Dimaya.
III.
For the foregoing reasons, we AFFIRM the judgment of the district court.
22
Calhoun concedes that “[t]his issue was not specifically raised in the district court.” But, given that
Johnson is retroactive, per Welch v. United States, 136 S. Ct. 1257 (2016), then Dimaya would likely apply anyway
and even preservation may be unnecessary.
Calhoun urges us to reverse Taylor (he says “modify” but his desired modification is actually a reversal) on
two bases: (1) the intervening Supreme Court cases of Welch and Mathis v. United States, 136 S. Ct. 2243 (2016),
have overruled it; and (2) two subsequent Sixth Circuit cases have found to be unconstitutional certain statutes with
“almost identical” language, in United States v. Pawlak, 822 F.3d 902 (6th Cir. 2016) (abrogated), and Shuti v.
Lynch, 828 F.3d 440 (6th Cir. 2016). The first contention is simply not true; as to the latter, even if it were relevant,
in the time since Calhoun filed his brief, the Supreme Court abrogated Pawlak in Beckles v. United States, 137 S. Ct.
886 (2017), and the government filed a certiorari petition in Shuti, which is pending.
23
The government argues that Hobbs Act robbery is a crime of violence under the force clause,
§ 924(c)(3)(A), without regard to the residual clause, so Dimaya would have no effect on that count regardless.
25