UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
UNITED STATES OF AMERICA,
Plaintiff,
Criminal Action No. 14-57 (BAH)
v.
Chief Judge Beryl A. Howell
AGUSTIN FLORES APODACA and
PANFILO FLORES APODACA,
Defendants.
MEMORANDUM OPINION
This is the third opinion issued in this case. See United States v. Apodaca (“Apodaca I”),
251 F. Supp. 3d 1, 2 (D.D.C. 2017) (granting the government’s motion to enforce two
administrative subpoenas); United States v. Apodaca (“Apodaca II”), Crim. No. 14-57 (BAH),
2017 U.S. Dist. LEXIS 131617, at *73 (D.D.C. Aug. 17, 2017) (resolving pretrial motions).1
Having already resolved eight pretrial motions in Apodaca II, six additional pretrial motions
have now become ripe in advance of the trial, which is scheduled to begin on February 5, 2018.2
The defendants, Agustin Flores Apodaca (“Agustin”) and Panfilo Flores Apodaca (“Panfilo”),
1
The following pretrial motions were denied in Apodaca II: (1) Agustin Flores Apodaca’s (“Augustin”)
Motion in Limine to Preclude Introduction of Post-Arrest Title III Intercepts, ECF No. 51; (2) the defendants’ Joint
Motion for Pretrial Hearing of Admissibility of Alleged Co-Conspirator Statements, ECF No. 52; (3) Agustin’s
Motion to Enforce the Rule of Specialty, ECF No. 54; (4) Agustin’s Motion to Suppress Statements, ECF No. 48;
(5) the defendants’ Joint Motion to Dismiss Count Two of Indictments, ECF No. 50; and (6) and (7) the defendants’
separate Motions to Strike Improper Aliases, ECF Nos. 53 and 56. See Apodaca II, 2017 U.S. Dist. LEXIS 131617,
at *73. The government’s Motion to Introduce Co-Conspirator Statements, Other Crimes Evidence at Trial, and
Allow Lead Agents at Counsel Table, ECF No. 55, was granted in part, with a ruling on the portion of that motion
seeking admission of intrinsic or other bad acts, under Federal Rule of Evidence 404(b), reserved pending
supplemental briefing, id. at *4, *74. This part of the government’s Motion to Introduce Other Crimes Evidence,
ECF No. 55, as well as the government’s Motion in Limine Related to Jencks Material and Certain Cross-
Examination by Defense Counsels, ECF No. 110, are not yet ripe for resolution.
2
The trial was originally scheduled for September 18, 2017, but was postponed until February 5, 2018, at the
defendants’ request for additional time to conduct further investigation following the government’s disclosure, in
connection with its Motion to Introduce Other Crimes Evidence, ECF No. 55, of anticipated evidence to be
introduced at trial. Min. Order (dated Aug. 28, 2017).
who are indicted separately on two substantively similar counts of conspiring to traffic controlled
substances and possessing a firearm in furtherance of the same, have filed five of the pending
motions: (1) the defendants’ Joint Motion to Suppress Title III Intercepts (“Defs.’ Mot. Suppress
T. III Intercepts”), ECF No. 33; (2) Agustin’s Motion to Compel Discovery (“Agustin’s
Discovery Mot.”), ECF No. 40; (3) Panfilo’s Motion to Join and Supplement Agustin’s Motion
to Compel Discovery (“Panfilo’s Discovery Mot.”), ECF No. 41; (4) an amendment thereto
(“Panfilo’s Am. Discovery Mot.”), ECF No. 45; and (5) Agustin’s Motion for In Camera
Inspection of Grand Jury Minutes (“Def.’s Mot. GJ Inspection”), ECF No. 130. Also ripe for
resolution is the government’s Motion to Reconsider Use of Blackberry Communications
Transcripts (“Gov’t’s BBMT Mot.”), ECF No. 95.
The pending motions are addressed in the following order: Part I discusses the
defendants’ four motions seeking suppression of intercepted BlackBerry text messages and
related discovery, ECF Nos. 33, 40, 41, and 45; Part II discusses the government’s motion
seeking reconsideration of the use at trial of certain transcripts of intercepted BlackBerry
messages, ECF No. 95; and, finally, Part III discusses Agustin’s motion for in camera inspection
of grand jury minutes, ECF No. 130.3
The general factual and procedural background in this case has been amply described in
Apodaca II, 2017 U.S. Dist. LEXIS 131617, at *4–13, and will not be repeated here.
3
The defendants and government filed certain of the pending motions and related briefing under seal, with
those papers subsequently unsealed, in full or in part, at the direction of this Court. See Min. Order (dated Sept. 5,
2017); Min. Order (dated Sept. 15, 2017). Any parts of documents that remain under seal and are discussed in this
Memorandum Opinion, including ECF Nos. 68-1, 68-2, are unsealed to the extent discussed herein in order to make
the reasoning intelligible.
2
I. DEFENDANTS’ CHALLENGES TO TITLE III INTERCEPTED
COMMUNICATIONS
As part of a multi-prong challenge to the government’s introduction of Title III intercepts
at trial, the defendants have jointly moved to suppress “any and all communications intercepted
by the Government pursuant to . . . Title III,” on the ground that the orders authorizing the
intercepts were “facially insufficient.” Defs.’ Mot. Suppress T. III Intercepts at 1.4 If their
suppression motion is denied, the defendants seek to compel discovery of “[a]ll interceptions
from the Title III investigation, from all target devices,” including “[m]inimized interceptions of
Defendant Panfilo.” Jt. Stm. Regarding Discovery (“Jt. Stm. Discovery”) ¶ 7, ECF No. 124;
Agustin’s Discovery Mot at 1; Panfilo’s Discovery Mot. at 1; Panfilo’s Am. Discovery Mot at 1.
The defendants’ suppression motion, followed by their motions to compel discovery, are
discussed in turn.
A. Defendants’ Joint Motion to Suppress Title III Intercepts
The government conducted a 22-month wiretap investigation between February 2013 and
December 2014, during which the government submitted and obtained 27 applications for
electronic intercepts and ultimately intercepted “thousands of pertinent electronic
communications (Blackberry Messenger text messages [‘BBMs’])” from “over [59] different
devices.” Gov’t’s Opp’n Defs.’ Mot. Suppress T. III Intercepts (“Gov’t’s First Opp’n T. III
Intercepts”) at 2–3, ECF No. 68. The first wiretap application and order targeted the electronic
communications of Panfilo, who was using “Target Device 1.” Id. at 3–4. Over the course of
the investigation, three additional BlackBerry devices used by Panfilo were subject to court-
4
Three of the defendants’ previously-denied motions also challenged the introduction of intercepted
communications. See Apodaca II, 2017 U.S. Dist. LEXIS 131617, at *13–33 (denying defendants’ motions to
preclude introduction of post-arrest Title III Intercepts, hold a pre-trial hearing on the admissibility of alleged co-
conspirator statements, and enforce Rule of Specialty).
3
authorized interception. Id. In total, “[t]he government intercepted approximately 12,500
pertinent electronic communications between Panfilo and other [alleged] co-conspirators.” Id. at
4. Apparently, these pertinent BBMs of Panfilo’s were intercepted during thirteen months in
2013 and 2014: February through October, 2013, and May, June, July, and December 2014. See
Gov’t’s Opp’n Defs.’ Mot. Compel Discovery (“Gov’t’s Opp’n Defs.’ Discovery Mots.”) at 3–4,
ECF No. 44 (listing “periods of time” in which intercepted communications “are between Panfilo
and various co-conspirators”); Defs.’ Suppl. Reply Supp. Mot. Suppress T. III Intercepts (“Defs.’
Second Reply Mot. Suppress T. III Intercepts”) at 4 n.1, ECF No. 92-2 (noting that Panfilo’s
Blackberry “was not intercepted during the period after October 2013 except for 30 day periods
on or about May, July, and December 2014”). Agustin was imprisoned during the interceptions,
and none of his communications were intercepted. Gov’t’s First Opp’n T. III Intercepts at 4.
The government’s initial application, seeking to intercept electronic communications over
Target Device #1 was granted by the District Court in the Western District of Texas, on February
19, 2013. See id. at 2–3; see also id., Ex. 1, Application for Interception for Electronic
Communications (“Initial T. III App.”) ¶ 2, ECF No. 68-1; id., Ex. 2, Order Authorizing the
Interception of Electronic Communications (“Initial T. III Order”) at 3–7, ECF No. 68-2. That
first application and order, as well as the twenty-six that followed, all contained “the same
information—a Government attorney’s name in the application and order, and reference [to] the
appropriately designated [Department of Justice (‘DOJ’)] official,” as is required by 18 U.S.C. §
2516(3) for interceptions of electronic communications. Gov’t’s First Opp’n T. III Intercepts at
3. Although “the Government sought only to intercept electronic communications when it first
applied for judicial authorization,” the wiretap also intercepted some “wire (voice)
communications,” mostly “in the form of ‘voice notes,’” which are in a compressed audio
4
Adaptive Multi-Rate (“AMR”) file format. Gov’t’s’ Third Suppl. Opp’n Defs.’ Mot. Suppress T.
III Intercepts (“Gov’t’s Fourth Opp’n T. III Intercepts”) at 3–4, ECF No. 113. The interception
of these voice notes, or AMR files, was due to BMM’s functionality in transmitting both audio
and text communications over the same network and the Blackberry service provider’s inability
to disaggregate the two formats of communications. Gov’t’s Suppl. Opp’n Defs.’ Mot. Suppress
T. III Intercepts (“Gov’t’s Second Opp’n T. III Intercepts”) at 3–4, ECF No. 89. As the
government explains, BBM is BlackBerry’s “proprietary instant messaging service,” and “[u]sers
of BBM are able to attach video and audio files, including ‘voice notes,’ to standard text
conversations and send these messages as BBM communications utilizing [BlackBerry’s]
network.” Id. at 3. BlackBerry announced the voice notes functionality in December 2012, three
months before the wiretap investigation in this case began. Defs.’ Third Reply Supp. Mot.
Suppress Title III Intercepts (“Defs.’ Fourth Reply Mot. Suppress T. III Intercepts”) at 2, ECF
No. 129.
The government does not dispute that wire communications in the form of AMR files
were intercepted, along with the court-authorized electronic communications. To deal with the
occurrence of unauthorized intercepted wire communications, monitors at the reviewing site in
El Paso, Texas were directed, in accordance with the instructions in the government’s
applications and orders, promptly to minimize such communications. Gov’t’s Second Opp’n T.
III Intercepts at 4; see also, e.g., Initial T. III App. at 8; Initial T. III Order at 6–7, ECF No. 68-2.
The government instructed monitors not to listen to any unauthorized intercepted wire
communications in both verbal instructions and in signs taped to monitors’ computers that stated
“Do Not Listen to Any Audio Files.” Jt. Stm. Discovery ¶ 5. At trial, the government plans to
5
use as evidence only “lawfully intercepted electronic communications.” Gov’t’s Opp’n Defs.’
Discovery Mots. at 3–4.
The government has dribbled out information regarding the wiretaps, prompting over
four rounds of briefing and two status conferences to clarify the basic facts related to this aspect
of the government’s investigation.5 This approach to discovery is both unhelpful and
unnecessarily time-consuming for the Court and the parties. Now, in the face of more complete
discovery from the government, the defendants advance an evolved argument for suppression
based on their understanding of the government’s interceptions as being “hybrid” in nature and,
as such, requiring authorization pursuant to the “‘wire’ standard,” instead of the standard for
electronic communications. Defs.’ Fourth Reply Mot. Suppress T. III Intercepts” at 8–9; Defs.’
Reply Gov’t’s Second Suppl. Opp’n Defs.’ Mot. Suppress T. III Intercepts (“Defs.’ Third Reply
Mot. Suppress T. III Intercepts”) at 4, ECF No. 104-2.6
5
The existence of the AMR files was first raised by defendants at an August 2, 2017 status hearing. See
Gov’t’s Second Opp’n T. III Intercepts at 2 (discussing hearing). In subsequent submissions, the government
acknowledged that 170 AMR files were sent by BlackBerry to the FBI’s Data Intercept Technology Unit (“DITU”)
for review, and that 163 of these files were minimized and seven “were erroneously marked “pertinent” by a
monitor. Id. at 3–4. The defendants also questioned the extent to which the government intercepted other types of
wire communications, including 25 MP4 (video) and MP3 (audio, often music) files, in addition to AMR type wire
communications. Defs.’ Second Reply Mot. Suppress T. III Intercepts at 2. The government responded by
explaining that “[t]he raw data exported for production in discovery to Defendants caused . . . three (3) unique MP4
files to be replicated within the raw data and to erroneously appear 25 different times within the raw data produced
to the Defendants.” Gov’t’s’ Second Suppl. Opp’n Defs.’ Mot. Suppress T. III Intercepts (“Gov’t’s Third Opp’n T.
III Intercepts”) at 5–6, ECF No. 101-2. With respect to the MP3 data, the government further explained that “MP3
files were not intercepted in this investigation and any reference to MP3 files within the communications is due to a
feature of BBM which alerts a user when another contact is available.” Id. at 13.
6
The defendants assert a new argument in their most recent brief as a “second – and independent – basis for
suppression.” Defs.’ Fourth Reply Mot. Suppress T. III Intercepts at 2. Based on the government’s assertion that it
maintains “all the intercepted communications . . . on an FBI server in Quantico, Virginia,” the defendants contend
that the government has “fail[ed] to comply with the ‘sealing’ requirements of the Title III wiretap,” and “[t]his
failure warrants suppression of all the intercepts.” Id. at 2, 11–12 (citing United States v. Ojeda Rios, 495 U.S. 257,
263 (1990); United States v. Carson, 969 F.2d 1480 (3d Cir. 1992)). “In Ojeda Rios, the Supreme Court held that
tapes which were not sealed in a timely fashion under section 2518(8)(a) must be suppressed unless the government
offers a satisfactory, ‘objectively reasonable’ explanation for the belated sealing.” Carson, 969 F.2d at 1493
(finding 34-day delay in sealing for “necessity of enhancing original tapes” was not a satisfactory explanation). The
government, in this case, after ordered to respond to this new argument, see Min. Order (dated Dec. 12, 2017),
represents that “all target devices and interceptions were sealed by the authorizing court and there was no delay in
the sealing.” Gov’t’s Fourth Suppl. Opp’n Defs. Mot. Suppress at 1, 4, ECF No. 134. Only duplicate intercepts are
6
Specifically, the defendants reason that “the Government knew – or should have known”
from the outset of the investigation that the wiretaps “would inevitably” capture both electronic
and wire communications. Id.; Defs.’ Second Reply Mot. Suppress T. III Intercepts at 7 (arguing
that “the Government, with its expertise in the use of Blackberrys, knew BBM communications
could or would invariably be a mixture of voice and audio communications”); Defs.’ Reply
Supp. Mot. Suppress T. III Intercepts at 4, ECF No. 82 (making same argument, citing Ian
Austen, BlackBerry Phones Get Free Calls Over Wi-Fi, N.Y. TIMES (Dec. 10, 2012),
https://bits.blogs.nytimes.com/2012/12/10/blackberry-phones-get-free-calls-over-wi-fi/). To
underscore the point, the defendants cite the 170 AMR files intercepted, seven of which were
erroneously marked “pertinent,” as well as the government’s representation that the first AMR
file was intercepted on March 23, 2013, just over a month after the initial application in the
wiretap, and that later wiretap affidavits and orders actually sought authorization to intercept
wire communications. Defs.’ Third Reply Mot. Suppress T. III Intercepts at 3; Defs.’ Fourth
Reply Mot. Suppress T. III Intercepts 2–7.7 Given the interceptions of “hybrid”
maintained on the FBI servers in Quantico for investigative purposes, as permitted by the wiretap statute. See 18
U.S.C. § 2518(8)(a) (“Duplicate recordings may be made for use or disclosure pursuant to the provisions of
subsections (1) and (2) of section 2517 of this chapter for investigations”); id. § 2517(1)–(2) (permitting
investigative or law enforcement officer to disclose contents of a wiretap investigation to another officer or use
content of the wiretap to the extent such disclosure or use “is appropriate to the proper performance of the official
duties” of the officers involved). Accordingly, no statutory sealing violation has occurred, and the government’s
maintenance of intercepted communications for investigative purposes on FBI servers in Quantico does not present
any statutory violation, let alone a violation supporting suppression.
7
As belatedly detailed by the government, during discrete time periods, after the first six months of the
investigation, the government sought court authorization to intercept both wire and electronic communications, but
only in five of the 27 applications and for only four devices not used by Panfilo out of the total 59 devices subject to
the wiretaps. Gov’t’s Fourth Opp’n T. III Intercepts at 3–4 (noting the first of the five applications targeting wire
and electronic communications was filed in August 2013); Defs.’ Fourth Reply Mot. Suppress T. III Intercepts at 1
(listing the dates of the five applications for wire communications as August 12 and 30, 2013, January 27, 2014,
August 14, 2014, and September 11, 2014); Gov’t’s Third Opp’n T. III Intercepts at 14–15 (noting that “[i]n the
August 12 affidavit . . . the Government sought authority to intercept electronic communications over Target
Device[] 1 (Panfilo’s Device),” as well as “electronic . . . and wire communications over Target Device 10,” which
was not Panfilo’s device). These facts show that had the government wished to target interception of Panfilo’s wire,
in addition to his electronic, communications, such authority would have been sought, as with the four devices
subject to court-authorized wire interception.
7
communications, in the defendants’ view, the government should have sought authorization “to
intercept ‘wire communications’ ab initio,” and such authorization, unlike for electronic
communications, statutorily requires inclusion of the name of the authorizing high-ranking DOJ
official on all applications and orders. Id. at 1. Absent the name of the authorizing high-ranking
DOJ official, the defendants contend the interception orders are “facially defective” and must be
suppressed under United States v. Scurry, 821 F.3d 1 (D.C. Cir. 2016). Id. at 1, 10. Thus, the
defendants’ challenge to the facial validity of the wiretap applications and orders rests on
whether, in light of Blackberry’s functionality and associated challenges in disaggregating
different communication formats, the government was required to seek authorization to intercept
wire communications and comply with statutory requirements applicable to wire
communications, when only electronic communications were targeted for use at trial, with other
communication formats minimized.
At the outset, the government concedes that the seven AMR files improperly marked as
pertinent must be suppressed. Gov’t’s Fourth Opp’n T. III Intercepts at 5 (citing United States v.
Suggs, 531 F. Supp. 2d 13, 24 (D.D.C. 2008), aff’d sub nom. United States v. Glover, 681 F.3d
411 (D.C. Cir. 2012)). The government posits, however, that suppression of the intercepted
electronic communications is not warranted because the government only targeted electronic
communications in connection with Panfilo and, thus, did not need to satisfy any different
statutory authorization requirements applicable to wire communications with respect to those
intercepts. See id. at 1. The fortuity “that voice notes can be transmitted over the BlackBerry
system does little to alter the fact that the Government did not seek to intercept such
communications for the first six months of this investigation.” Id. at 4. The government argues
that the defendants’ theory “would yield an absurd result” because “it would require the
8
Government to adhere to the standards for interception of wire communications even where the
Government seeks no such communications and lacks probable cause for such communications,
simply because it is technically possible to intercept wire communications concurrently with
electronic communications.” Id.8 For the reasons explained below, the Court agrees with the
government.
1. Relevant Statutory Provisions
When first enacted, Title III of the Omnibus Crime Control and Safe Streets Act of 1968,
codified at 18 U.S.C. §§ 2510–2522, addressed only the interception of wire and oral
communications, and barred admission at trial of such communications, plus “evidence derived
therefrom . . . if disclosure of that information would be in violation of this chapter,” 18 U.S.C.
§ 2515. This law also authorized “[a]ny aggrieved person” to seek suppression of such
communications, “or evidence derived therefrom,” on the following three grounds: “(i) the
communication was unlawfully intercepted; (ii) the order of authorization or approval under
which it was intercepted is insufficient on its face; or (iii) the interception was not made in
conformity with the order of authorization or approval.” Id. § 2518(10)(a). Title III was
amended in 1986, by the Electronic Communications Privacy Act of 1986 (“ECPA”), Pub. L.
No. 99-508, 100 Stat. 1848 (1986), to expand certain protections provided to wire and oral
communications, to electronic communications, see, e.g., 18 U.S.C. § 2511(1)(a),(c), (d) and (e)
(penalizing unauthorized interception of wire, oral and electronic communications).9 The parties
8
The government also argues that “Agustin lacks standing to challenge the electronic interceptions evidence
because he fails to meet the statutory criteria of an ‘aggrieved party’ under Title III.” Gov’t’s First Opp’n T. III
Intercepts at 2, 13–17. This standing argument need not be addressed as this motion is resolved on alternative
grounds.
9
ECPA added a definition of “electronic communications” to mean “any transfer of signs, signals, writing,
images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic,
photoelectronic or photooptical system that affects interstate or foreign commerce, but does not include,” inter alia,
“any wire or oral communication.” 18 U.S.C. § 2510(12).
9
agree that BBMs constitute “electronic communications” within the meaning of Title III. See
Gov’t’s First Opp’n T. III Intercepts at 5 (“Electronic communications are non-voice
communications made over a network in or affecting interstate commerce, which include
communications sent by [BBM] text messages . . . .”); Defs.’ Second Reply Mot. Suppress T. III
Intercepts at 4; see also United States v. Jones, 451 F. Supp. 2d 71, 75 (D.D.C. 2006), rev’d on
other grounds, 615 F.3d 544 (D.C. Cir. 2010), aff’d, 132 S. Ct. 945 (2012)). While not altering
the scope of the exclusion remedy, which continues to be limited to improper interception of
wire and oral communications, see 18 U.S.C. § 2515, ECPA did amend other provisions of Title
III to encompass “electronic communications.”
In particular, as relevant to the instant suppression motion, Title III provides that an order
“authorizing or approving the interception of any wire, oral, or electronic communication” must
specify, inter alia, “the identity of the agency authorized to intercept the communications, and of
the person authorizing the application.” Id. § 2518(4)(d). The statute further dictates who
qualifies as a “person authorizing the application”: for wire and oral communications, “[t]he
Attorney General, Deputy Attorney General, [and] Associate Attorney General,” among other
high-level DOJ officials, “may authorize an application,” id. § 2516(1); and, for electronic
communications, the amendments effected by ECPA provide that “[a]ny attorney for the
Government (as such term is defined for purposes of the Federal Rules of Criminal Procedure)
may authorize an application,” id. § 2516(3) (emphasis added).
2. Analysis
The defendants argue that the wiretap orders at issue in this case are “insufficient on
[their] face” for failing to identify the appropriate high-ranking DOJ official authorizing the
interceptions. See Defs.’ Mot. Suppress T. III Intercepts at 1, 4 (internal quotation marks and
10
citation omitted). In advancing this argument, the defendants rely on Scurry, in which the D.C.
Circuit held that “a [Title III] wiretap order is ‘insufficient on its face,’ 18 U.S.C.
§ 2518(10)(a)(ii), where it fails to identify the Justice Department official who approved the
underlying application, as required by Title III, id. § 2518(4)(d).” Scurry, 821 F.3d at 5. Given
that the orders authorizing the wiretaps in Scurry did not specify the statutorily required high-
ranking DOJ official who had signed off on the underlying application, the D.C. Circuit
mandated that the information collected pursuant to the wiretaps at issue be suppressed. Id.
At issue in Scurry were wire communications.10 By contrast, as noted, an order and
application for interception of electronic communications may be authorized by “[a]ny attorney
for the Government,” as defined in the Federal Rules of Criminal Procedure. 18 U.S.C.
§ 2516(3). In this case, the applications were signed by “Andrea Goldbarg, Assistant Deputy
Chief in the United States Department of Justice,” Initial T. III App. at 1, and the initial order
authorizing the interceptions at issue indicated that the application for the order had been
submitted by “Andrea Goldbarg, Assistant Deputy Chief in the United States Department of
Justice,” Initial T. III Order at 1. The government maintains, and the defendants do not dispute,
that Ms. Goldbarg is an attorney for the government, as contemplated by the Federal Rules of
Criminal Procedure. See FED. R. CRIM. P. 1(b)(1) (defining “attorney for the government” in
pertinent part as “the Attorney General or an authorized assistant”); Gov’t’s First Opp’n T. III
10
The D.C. Circuit did not expressly state that the intercepts at issue in Scurry involved wire
communications, as opposed to electronic communications, but a review of the record indicates that the warrants
issued authorized the relevant law enforcement authorities to intercept wire communications from the defendants’
cell phones. See United States v. Savoy, Crim. No. 10-310 (RCL) (D.D.C. 2012), ECF Nos. 59, 77, 90, 105, 108;
see also Scurry, 821 F.3d at 6 (referring to a “wiretap on Scurry’s cell phone” and “Scurry’s tapped calls”). In
addition, the D.C. Circuit’s textual analysis addressed only wire and oral communications since the Court cited 18
U.S.C. § 2516(1), Scurry, 821 F.3d at 8, which governs “wire and oral communications,” whereas a separate
subsection of the same provision governs “electronic communications,” see 18 U.S.C. § 2516(3).
11
Intercepts at 10.11 Thus, if the Title III orders at issue appropriately sought and were authorized
to intercept electronic communications, they are not “insufficient on [their] face,” 18 U.S.C.
§ 2518(10)(a)(ii), and the resultant interceptions are not subject to suppression. This leads
directly to the key issue raised by the defendants that, in light of the “hybrid” interceptions of
BBMs and AMR files, the applications and orders issued in connection with the underlying
investigation should have complied with the statutory requirements applicable to wire
communications.
As noted, the defendants’ evolved position, which relies heavily on legislative history, is
that the government should have sought and obtained authorization to intercept both wire and
electronic communications. See Defs.’ Fourth Reply Mot. Suppress T. III Intercepts at 8–10;
Defs.’ Third Reply Mot. Suppress T. III Intercepts at 1–2. In particular, the defendants point to a
House Judiciary Committee Report on ECPA, stating that: “The Committee understands that
[DOJ] will apply for a court order under the ‘wire’ standards in cases where a tap may intercept
11
Confusingly, the initial application and order authorizing interception of the electronic communications on
Target Device #1 uses language pertinent to oral and wire communications. See, e.g., Initial T. III App. ¶ 3 (stating
that, “[p]ursuant to Title 18, United States Code, Section 2516, an appropriate official of the Criminal Division,
United States Department of Justice, having been specially designated by the Attorney General pursuant to Order
Number 3055-2009 dated February 26, 2009, has authorized this application.”); Initial T. III Order at 4 (stating that,
“pursuant to the application authorized by an appropriate official of the Criminal Division, United States
Department of Justice, who has been specially designated by the Attorney General of the United States to exercise
the power conferred on him by Title 18, United States Code, Section 2516 are authorized to intercept electronic
communications . . . to and from TARGET DEVICE #1.”). Notwithstanding that both the application and order
include language pertinent to authorizing wire and oral communications, since § 2516 does not require sign-off by a
high-level DOJ official, this surplusage does not alter the validity of the order. See Scurry, 821 F.3d at 8 (“To
determine whether a wiretap order is facially insufficient, a reviewing court must examine the four corners of the
order and establish whether, on its fact, it contains all that Title III requires it to contain.”) (emphasis added); id. at
12 (noting that the D.C. Circuit’s previous opinion in United States v. Glover, 736 F.3d 509, 515 (D.C. Cir. 2013),
“left open the possibility that a ‘technical defect’ in a wiretap order might not rise to the level of facial insufficiency,
but rather would render the order ‘imperfect’”). As the government explains, “[t]he Title III application language
. . . regarding the identification of the ‘appropriate official’ reflects DOJ policy to secure additional internal approval
of applications for interception of electronic communications,” but this is “DOJ policy and is not statutorily
required.” Gov’t’s First Opp’n T. III Intercepts at 11 n.4 (citing U.S. DEP’T OF JUSTICE, UNITED STATES
ATTORNEYS’ MANUAL, § 9-7.100, https://www.justice.gov/usam/usam-9-7000-electronic-surveillance#9-7.100); see
also Gov’t’s Third Opp’n T. III Intercepts at 16 (further explaining that, in April 2013, government “began
including the name of the high-level DOJ official in the applications . . . based upon internal protocols and guidance
of the Office of Enforcement Operations of the Department of Justice, not due to statutory requirements.”).
12
mixed wire and electronic communications,” and “[a]s long as the wire standards are followed a
single court order should suffice to authorize the interception of both wire and electronic
communications involving the same lines of instruments.” Id. at 2 (quoting H.R. REP. NO. 99-
647, at 35–36 (1986)).12 This language is set in a paragraph acknowledging, given ECPA’s new
definition of “electronic communication,” that “[a] transaction may consist, in parts, of both
electronic communications and wire or oral communications,” and that while “the transmission
of data over the telephone is an electronic communication,” parties’ speaking “with one another
between data transmissions,” would be making a wire communication,” and “a party’s utterances
into the telephone mouthpiece are an oral communication.” H.R. REP. NO. 99-647, at 35. In
context, the purpose of this language appears to be to urge use of the “wire” standard when the
targeted “transaction” contains different types of communications, subject to differing rules of
disclosure; hence the report goes on to instruct that where interception of the entire
communication is sought, “a single court order should suffice to authorize the interception of
both wire and electronic communications involving the same lines or instruments.” Id. at 36.13
This language simply begs the question at issue here of whether compliance with this “wire”
standard is required when the “wire” parts of the communication are not part of the “transaction”
targeted for interception.
12
The defendants also cite a handbook on surveillance prepared by the Internal Revenue Service (“IRS”)
Criminal Tax Division that focuses on the identical language of the House Judiciary Committee Report but
expressly states that the handbook is “not intended to have the force of law” or “replace thorough research.” See
Defs.’ Fourth Reply Mot. Suppress T. III Intercepts at 9; id., Ex. 1, IRS CRIMINAL TAX DIVISION, SURVEILLANCE
HANDBOOK at i, 39, ECF No. 129-1. Thus, this IRS handbook does little to advance the defendants’ argument.
13
This somewhat opaque language in the House Judiciary Committee Report relied upon by the defendants is
notably absent from the Senate Judiciary Committee’s Report on ECPA, which report also makes a point of
“recogniz[ing] that a transaction may consist, in part of both electronic communications and wire or oral
communications” and that “different aspects of the same communication might be characterized differently.” S.
REP. NO. 99-541, at 16 (1986), as reprinted in 1986 U.S.C.C.A.N. 3555, 3570.
13
In short, this House Judiciary Committee Report language may bear on situations in
which the government is actually seeking to capture both electronic and wire forms of
communications, but this was not the government’s intent here. The government only began
collecting these AMR files in this case because of “a technological limitation.” Gov’t’s’ Second
Suppl. Opp’n Defs.’ Mot. Suppress T. III Intercepts (“Gov’t’s Third Opp’n T. III Intercepts”) at
14, ECF No. 101-2. Indeed, as the government explains, BlackBerry was “unable to discern
[whether] a particular BBM contain[ed] an embedded wire communication unless it manually
reviewed the data for audio files, and concluded the audio files included the human voice,”
which BlackBerry declined to do. Gov’t’s Second Opp’n T. III Intercepts at 4; see also Status
Conf. Hr’g (rough) Tr. (Aug. 17, 2017) at 70–79. As a result, BlackBerry “automatically”
forwarded data, without separating the electronic from the wire communications, to the FBI Data
Intercept Technology Unit (“DITU”) server, which then “automatically forwarded the messages
in this case to specialized equipment located at the FBI El Paso Division, where it was reviewed
by the monitors.” Gov’t’s Second Opp’n T. III Intercepts at 3. To address this technical
challenge of disaggregating AMR files from the court-authorized electronic intercepts, the
government took steps to ensure monitors minimized and did not listen to any unauthorized
AMR and other audio files. See Gov’t’s Second Opp’n T. III Intercepts at 4; Jt. Stm. Discovery
¶ 5 (discussing verbal instructions and signage on minimization).14
The government contends that “simply because it is technically possible to intercept wire
communications concurrently with electronic communications,” law enforcement should not be
required to seek authority to intercept both under the wire standard. Gov’t’s Fourth Opp’n T. III
14
According to the government, even though audio files without the human voice would constitute electronic
communications under Title III, “in an abundance of caution,” the government “instructs monitors not to listen or
retain any audio files when it does not have authority to intercept wire communications in addition to electronic
communications.” Gov’t’s Second Opp’n T. III Intercepts 4 n.1.
14
Intercepts at 4. The perverse result of such a requirement would be that some communication
technologies might be put outside the reach altogether of Title III surveillance or, alternatively,
more intrusive surveillance may ensue. For example, if the government seeks, and only has
probable cause sufficient, to intercept electronic communications, but due to the unique
technology involved, the targeted electronic communications are transmitted simultaneously with
wire communications, the government would be unable to obtain court authorization for the
interception, at least or until, sufficient probable cause were developed to meet the standard for
wire communication interceptions as well. Likewise, where the government may be able to
establish probable cause to intercept wire communications, but only wants to obtain electronic
communications, the government would have to seek authority for a hybrid wiretap, leading to
more expansive surveillance, with concomitant privacy intrusions for the targets of the
surveillance and the increased burden on the government to manage surveillance of multiple
communication formats. This simply makes no sense as a policy matter, and is not required by
the wiretap statute, which instead expressly contemplates using minimization procedures to
address the capture of unauthorized communications, either in terms of format or content. 18
U.S.C. § 2518 (instructing that “[e]very order and extension thereof . . . shall be conducted in
such a way as to minimize the interception of communications not otherwise subject to
interception under this chapter”).
The Court concludes that the government took appropriate steps to minimize wire
communications, which were intercepted due to the technology subject to surveillance, and that
the Title III applications and orders at issue are facially valid since they sought only the
15
interception of electronic communications and, consequently, reflect the appropriate authorizing
government attorney’s approval.15
The final issue raised by the defendants is whether the interception of seven AMR files,
which the government concedes are wire communications and therefore were improperly marked
“pertinent,” requires suppression of the entire wiretap. See Defs.’ Second Reply Mot. Suppress
T. III Intercepts at 2; Gov’t’s Fourth Opp’n T. III Intercepts 4–5. As noted, the government
reports that approximately 170 AMR files were intercepted, 163 of which were minimized and
seven of which were “erroneously marked pertinent.” Gov’t’s Second Opp’n T. III Intercepts at
4. The monitors were instructed “not to open or listen to an AMR files because they did not have
authorization to intercept wire communications.” Id. According to the government, the seven
AMR files marked pertinent “were all received within the same [monitoring] session by the same
monitor.” Id. at 5. “Based upon discussions with law enforcement agents, the monitor who
marked the seven (7) AMR files as pertinent did not listen to the audio contained within them.”
Id. at 4–5. This was confirmed by a “firewall agent,” who “reviewed the transcripts and
summaries of the electronic communications that contained the AMR files in order to determine
if the AMR files were transcribed or summarized.” Id. at 5. Thus, the AMR files appear to have
15
In any event, even the defendants were able to show some statutory violation, which they have not,
suppression of the intercepted BBM communications is not available here. As noted, the ECPA amendments to
Title III did not add “electronic communications” to either § 2515 (directing that “no part of the contents” of “any
wire or oral communication” may be introduced at trial “if the disclosure of that information would be in violation
of this chapter”) or § 2518(10)(a) (authorizing motion by “aggrieved person . . . to suppress the contents of any wire
or oral communication intercepted pursuant to this chapter” if, inter alia, the order authorizing the interception of
such communications is “insufficient on its face”) (emphasis added). Thus, ECPA “does not apply the statutory
exclusionary rule contained in title III of the Omnibus Crime Control and Safe Streets Act of 1968 to the
interception of electronic communications.” S. REP. No. 99-541 at 23 (1986); see also United States v. Reed, 575
F.3d 900, 915 (9th Cir. 2009) (finding that “the failure to seal [electronic communications] would not require
suppression” because “[s]uppression for violation of the statute is permitted only for ‘wire or oral
communications.’”); United States v. Steiger, 318 F.3d 1039, 1050–51 (11th Cir. 2003) (finding that electronic
communications are not subject to suppression for a non-constitutional violation under Title III); United States v.
Meriwether, 917 F.2d 955, 960 (6th Cir. 1990) (“The ECPA does not provide an independent statutory remedy of
suppression for interceptions of electronic communications.”).
16
been “marked pertinent due to human error by a monitor, and otherwise handled in the same
manner as other communications marked non-pertinent and minimized.” Id. Consequently,
“[t]he Government has not listened to these files and has not relied upon them in any way during
its investigation.” Id.
The statutory requirement that government surveillance of communications “minimize
the interception of communications not otherwise subject to interception under this chapter,” 18
U.S.C. § 2518(5), does not create an “inflexible rule of law.” Scott v. United States, 436 U.S.
128, 139 (1978). Rather the requirement demands an evaluation of the “facts and circumstances
of each case.” Id. at 140. In this case, the government took reasonable efforts, given the
technical obstacles to avoiding collection of AMR files during court-authorized interception of
electronic communications, to minimize the wire communications. Indeed, the only alternative
suggested by the defendants is for the government to have sought and obtained additional
authority to expand the surveillance to encompass all wire communications, see Defs.’ Second
Reply Mot. Suppress T. III Intercepts at 3, which is no solution at all to the minimization
challenge.
The proper remedy here is to suppress only those seven AMR files erroneously marked
pertinent, similar to situations in which partial suppression is ordered when the government has
failed to minimize certain intercepted communications properly. Gov’t’s Fourth Opp’n T. III
Intercepts at 5 (citing Suggs, 531 F. Supp. 2d at 24). In Suggs, the court explained that “[t]otal
suppression ‘is not appropriate unless the moving party shows that there was a taint upon the
investigation as a whole sufficient to warrant sweeping relief . . . and is reserved for the
particularly horrendous case . . . where the government has made effectively no effort towards
minimization whatsoever.” 531 F. Supp. 2d at 24 (internal quotation marks and citations
17
omitted). Suppressing all the BBM interceptions in this case due to the interception of AMR
files would not be appropriate where, as here, the AMR files were transmitted with, and
inseparable from, the lawfully intercepted electronic communications and were effectively
minimized.
Accordingly, the defendants’ motion to suppress the entire Title III intercept is DENIED
and only the seven AMR files erroneously marked pertinent must be suppressed.16
B. Defendants’ Motion to Compel Discovery
Both defendants have moved, pursuant to Federal Rule of Criminal Procedure 16, to
compel discovery of material related to the Title III wiretaps. See generally Agustin’s Discovery
Mot.; Panfilo’s Discovery Mot.; Panfilo’s Am. Discovery Mot. Specifically, the defendants seek
to compel the government’s production of two groups of intercepted communications: (1)
“[m]inimized interceptions of Defendant Panfilo” (“Panfilo’s minimized intercepts”); and (2)
“[a]ll interceptions from the Title III investigation, from all target devices, including pertinent
and minimized communications,” and including intercepts between alleged co-conspirators (“co-
conspirator intercepts”). Jt. Stm. Discovery ¶ 7; see also Panfilo’s Reply Gov’t’s Opp’n Defs.’
Mots. Compel (“Panfilo’s Reply Discovery Mot.”) at 3, ECF No. 58. The government has
already produced to the defendants the intercepts from the BlackBerry devices used by Panfilo
and the underlying applications and orders for those intercepts, as well as the “applications,
affidavits, and orders related to the interception of target devices utilized by individuals other
than Defendant Panfilo,” Gov’t’s Opp’n Defs.’ Discovery Mots. at 3–4, but not any minimized
16
The defendants appear to dispute that human error caused the erroneous non-minimization of seven AMR
files and, for this reason, seek disclosure of all the minimized intercepts to confirm the government’s explanation.
See Jt. Stm. Discovery ¶ 7. This discovery request is discussed infra in Part I.B.
18
communications or pertinent intercepted communications of only co-conspirators, Panfilo’s
Reply Discovery Mot. at 2–3.17
The defendants seek both Panfilo’s minimized intercepts and co-conspirator intercepts in
order to “argue that the Government improperly minimized the communications . . . and search
for exculpatory information.” Jt. Stm. Discovery ¶ 7.18 Obviously, if the defendants succeeded
in this request, they would be buried in massive discovery from the intercepted communications
of almost sixty devices for almost two years, the vast majority of which discovery would not be
used against them at trial, and the government would have the burdensome task of preparing all
of these materials for production. The government declines to produce these materials because:
“1) the Government does not intend to rely upon them in their case in chief; 2) the Defendants
are not entitled to these materials; and 3) the Defendant’s proposed use of the minimized
communications to argue that the Government improperly minimized the communications is not
the appropriate method, as established by the case law, to challenge the Government’s
minimization of the intercepts.” Id. Moreover, the government contends, “Defendants are not
entitled to an ‘open file’ search of the Government’s evidence.” Id.19 The government is
correct.
17
Despite initially refusing, the government ultimately produced these materials to Agustin. See Gov’t’s
Resp. Suggestion of Court Regarding Discovery (“Gov’t’s Resp. Discovery”) at 1, ECF No. 80. The government
has also produced, pursuant to the defendants’ initial motions to compel: (1) to both defendants, minimization
documents, including minimization instructions in Government counsel’s possession, see Gov’t’s Opp’n Defs.’
Discovery Mots. at 5 (distinguishing “minimization documents” from “minimized intercepts”); Jt. Stm. Discovery ¶
5; Gov’t’s Resp. Discovery at 1, and (2) to Panfilo, “the [California] state-authorized pertinent intercepts,” which the
government only discovered around the time of filing its original opposition to the motions to compel, see Gov’t’s
Opp’n Defs.’ Discovery Mots. at 5; see also Agustin’s Reply Mem. Supp. Discovery Mot. (“Agustin’s Reply Supp.
Discovery Mot.”) at 1 n.1, ECF No. 57.
18
The defendants also seek this discovery to “independently determine when audio files were first
intercepted,” Jt. Stm. Discovery ¶ 7, but this reason seems particularly weak. The government has already conceded
that the first wire intercept occurred on March 23 2013, just over a month after the wiretap surveillance began, id. at
¶ 6, and “independent” verification of this, or an even earlier, date of minimized communications is entirely
immaterial.
19
As with Agustin’s motion to suppress the wiretaps, the government challenges Agustin’s discovery motion
on standing grounds, reasoning that “[b]ecause Defendant Agustin lacks standing to challenge the Title III electronic
19
1. Relevant Legal Standard
“Rule 16 is a discovery rule designed to protect defendants by compelling the prosecution
to turn over to the defense evidence material to the charges at issue.” Yates v. United States, 135
S. Ct. 1074, 1083 (2015). Specifically, five types of evidence must be turned over: (1) the
defendant’s oral, written, or recorded statements, FED. R. CRIM. P. 16(a)(1)(A)–(B); (2) the
defendant’s prior criminal record, FED. R. CRIM. P. 16(a)(1)(D); (3) certain documents and
objects, “if the item is within the government’s possession, custody, or control,” FED. R. CRIM. P.
16(a)(1)(E); (4) the results or reports of any physical or mental examination, test, or experiment,
FED. R. CRIM. P. 16(a)(1)(F); and (5) a written summary of any expert testimony that the
government intends to use during its case-in-chief at trial, FED. R. CRIM. P. 16(a)(1)(G). The
defendants’ instant motions to compel hinge on the third category of evidence. See FED. R.
CRIM. P. 16(a)(1)(E).20
interceptions, he has failed to show that the pertinent intercepts and corresponding Title III documents are material
to his defense.” Gov’t’s Opp’n Defs.’ Discovery Mots. at 7–8. Agustin counters that “[t]he issue of this defendant’s
‘standing’ to challenge the wiretap is . . . irrelevant to the question of whether the materials should be produced
under Rule 16.” Agustin’s Reply Supp. Discovery Mot at 4. Since this motion is resolved on alternative grounds,
the government’s standing argument need not be addressed. See supra note 8.
20
In his latest filing on this issue, Panfilo argues that “the minimized communications” are “relevant under
Rule 16(a)(1)(B(i) [sic] as statements of the Defendant, his role in the alleged conspiracy, and must be reviewed by
the defense to aid in determining if the Government fulfilled its minimization requirements.” Panfilo’s Reply
Discovery Mot. at 3 (citing FED. R. CRIM. P. 16(a)(1)(B)(i)). “Rule 16’s provision for the discovery of oral
statements is intended, in part, to ‘facilitate the raising of objections to admissibility prior to trial,’” which
“contributes to the efficient administration of justice,” protects “the defendant’s right to a fair trial,” and “prevents
unfair surprise.” United States v. McElroy, 697 F.2d 459, 463–64 (2d Cir. 1982) (quoting FED. R. CRIM. P. 16
advisory committee’s note to the 1974 amendments); see also United States v. Smith, Crim. No. 16-91-01-JL, 2017
U.S. Dist. LEXIS 201062, at *19–20 (D.N.H. Oct. 18, 2017) (“Rule 16’s mandatory discovery provisions were
designed to contribute to the fair and efficient administration of justice by providing the defendant with sufficient
information upon which to base an informed plea and litigation strategy; by facilitating the raising of objections to
admissibility prior to trial; by minimizing the undesirable effect of surprise at trial; and by contributing to the
accuracy of the fact-finding process.”) (internal quotation marks and citation omitted). Since minimized intercepted
communications, by definition, are not going to be used by the government in its case-in-chief or at all, a defendant
has no need for disclosure of such material in order to raise any admissibility challenge. Moreover, to the extent a
defendant seeks disclosure of such minimized intercepted communications as somehow exculpatory, this argument
fails. See U.S. v. Scarpa, 913 F.2d 993, 1011 (2d Cir. 1990) (“A defendant may not seek to establish his innocence .
. . through proof of the absence of criminal acts on specific occasions.”). For these reasons, minimized
communications are not automatically “relevant” within the meaning of Rule 16(a)(1)(B)(i), and absent any such
20
Under Rule 16(a)(1)(E), “the government must permit the defendant to inspect and to
copy or photograph books, papers, documents, data, photographs, tangible objects, buildings or
places, or copies or portions of any of these items, if the item is within the government’s
possession, custody, or control and,” inter alia, “the item is material to preparing the defense” or
“the government intends to use the item in its case-in-chief at trial.” FED. R. CRIM. P.
16(a)(1)(E)(i)–(ii); see United States v. Thompson, 562 F.3d 387, 396 (D.C. Cir. 2009). Here,
the government intends to use Panfilo’s electronic communications in its case-in-chief “as direct
evidence against Defendant Panfilo and as statements made in furtherance of the conspiracy
against Defendant Agustin,” Gov’t’s Opp’n Defs.’ Discovery Mots. at 3–4, but the government
does not plan to rely on any electronic communications not involving Panfilo in its case-in-chief,
id. at 4–5; Jt. Stm. Discovery ¶ 7. Thus, to be entitled, under Rule 16(a)(1)(E), to Panfilo’s
minimized intercepts and/or co-conspirator intercepts, the defendants must show that these
communications are “material to preparing the defense.” Fed. R. Crim. P. 16(a)(1)(E)(i).
“[I]n the context of Rule 16, ‘the defendant’s defense’ means the defendant’s response to the
Government’s case in chief.” United States v. Armstrong, 517 U.S. 456, 462 (1996). To qualify
as “material for preparing the defense,” the D.C. Circuit has explained that the discovery sought
must be related “to refutation of the government’s case in chief,” and not “to establishment of an
independent . . . bar to the prosecution.” United States v. Rashed, 234 F.3d 1280, 1285 (D.C.
Cir. 2000); see also United States v. Marshall, 132 F.3d 63, 67 n.1 (D.C. Cir. 1998) (“The
Supreme Court recently clarified the meaning of the phrase ‘material to the preparation of the
defendant's defense.’ The phrase ‘authorizes defendants to examine government documents
showing of relevance, Panfilo is not entitled to compel disclosure of any oral statements captured in minimized
AMR files.
21
material to the preparation of their defense against the Government’s case-in-chief . . . .’”)
(quoting Armstrong, 517 U.S. at 463).
In other word, “the evidence must not simply bear some abstract relationship to the issues
in the case, . . . and the government must disclose Rule 16 evidence only if such evidence
enables the defendant significantly to alter the quantum of proof in his favor.” United States v.
Libby, 429 F. Supp. 2d 1, 7 (D.D.C. 2006) (internal quotation marks and citation omitted). Rule
16(a)(1)(E) applies equally to exculpatory and inculpatory evidence, since “it is just as important
to the preparation of a defense to know its potential pitfalls as it is to know its strengths.”
Marshall, 132 F.3d at 67.
As a general matter, “Rule 16 establishes ‘the minimum amount of discovery to which
the parties are entitled. It is not intended to limit the judge’s discretion to order broader
discovery in appropriate cases.’” United States v. Karake, 281 F. Supp. 2d 302, 306 (D.D.C.
2003) (quoting FED. R. CRIM. P. 16 advisory committee’s note to the 1974 amendments). That
being said, “Rule 16 does not authorize a blanket request to see the prosecution’s file.” United
States v. Maranzino, 860 F.2d 981, 985–86 (10th Cir. 1988) (citing Jencks v. United States, 353
U.S. 657, 667 (1957)).
2. Analysis
The defendants fail to demonstrate that the minimized Panfilo intercepts and co-
conspirator intercepts are “material” to preparing their defenses in “response to the
Government’s case in chief.” Armstrong, 517 U.S. at 462. To the contrary, the two reasons the
defendants have put forward to compel this discovery—the possibility of finding some
exculpatory information and to verify the government’s minimization procedures—fall far short
of justifying the massive discovery undertaking contemplated by this request. They are simply
22
not entitled to the broad, time-consuming and burdensome fishing expedition encompassed by
this discovery demand. Cf. United States v. George, 786 F. Supp. 11, 14 (D.D.C. 1991) (“At
least one of the rationales behind the materiality requirement (and limiting discovery by criminal
defendants generally) is to insure that the government not expend excessive time and effort
securing documents for the defendant.”).
First, the defendants’ vague asserted need for potentially exculpatory evidence that might
be contained in the minimized and co-conspirator intercepts does not pass muster. See United
States v. Williams-Davis, 90 F.3d 490, 514 (D.C. Cir. 1996) (rejecting, in the Brady context,
“bare speculation [of] . . . the existence of favorable materials”); United States v. Sims, 508 Fed.
App’x 452, 460–61 (6th Cir. 2012) (denying a Rule 16(a)(1)(E) motion to compel discovery
because the defendant’s motion was predicated on “a series of generalities based upon an
unsubstantiated possibility”) (internal quotation marks omitted). With respect to the alleged co-
conspirators’ intercepts, Panfilo suggests that “if the Defendant is not the subject of nor any of
his communications captured in any of the intercepts of his co-conspirators, these
communications have apparent exculpatory value.” Panfilo’s Reply Discovery Mot. at 3. As
noted, supra note 20, Panfilo’s absence from certain pertinent intercepts of co-conspirators does
little to rebut the inculpatory evidence contained in the approximately 12,500 Panfilo intercepts
the government seeks to use at trial. See U.S. v. Scarpa, 913 F.2d 993, 1011 (2d Cir. 1990) (“A
defendant may not seek to establish his innocence . . . through proof of the absence of criminal
acts on specific occasions.”). Moreover, far easier methods to establish the fact that Panfilo is
not a party to the requested co-conspirator intercepts are available than wholesale production of
those intercepts. A straight-forward question to an appropriate law enforcement agent or a
23
stipulation with the government regarding the fact that the government has identified intercepts
as containing communications of co-conspirators, and not Panfilo, come to mind.
Agustin has provided a similarly vague rationale for seeking the minimized and co-
conspirator intercepts: “The defense must have access to all the intercepts in order to analyze
their contents and determine what evidence exists that both potentially inculpates or exculpates
him of the charges in this case.” Agustin’s Discovery Mot. at 4. As a threshold matter, the
government has stated that the undisclosed intercepts will not be introduced in the government’s
case-in-chief, and, accordingly, the inculpatory nature of any of these communications is not
material. Moreover, Agustin has provided absolutely no information about why communications
to which he was not a party because he was incarcerated would contain any exculpatory
information about him. The defendants’ mere desire to “search” the intercepts “for exculpatory
information,” Jt. Stm. Discovery ¶ 7, reveals this request as the fishing expedition it is.
In contrast to the defendants’ speculative reasons proffered here, in other cases in which a
defendant has made a Rule 16(a)(1)(E) motion to compel discovery based on its potential
exculpatory value, the defendant clearly identified how the evidence would further the defense.
See, e.g., United States v. O’Keefe, Crim. No. 06-249 (PLF), 2007 U.S. Dist. LEXIS 31053, *2,
11 (D.D.C. Apr. 27, 2007) (granting a motion to compel in a corruption case where the evidence
sought would prove that there was “no ‘official act’ as a matter of law and that the defendants
did not have the requisite criminal intent as a matter of fact”); Libby, 429 F. Supp. at 14–17
(granting in part the defendant’s motion to compel and ordering disclosure of the topics covered
during briefings to aid the defendant in his defense that he was preoccupied during the relevant
time period); Karake, 281 F. Supp. 2d at 308 (granting the defendants’ motion to compel
discovery where the information sought was “crucial to their ability to file motions to suppress
24
[their] statements . . . , and may reveal mitigating evidence arising from the circumstances of
their extradition”).
In any event, the government represents that it is “unaware of any exculpatory material
regarding the Defendants in this case” and affirms that it has and will continue to comply with its
obligations under Brady v. Maryland, 373 U.S. 83 (1963); Giglio v. United States, 405 U.S. 150
(1972); and Weatherford v. Bursey, 429 U.S. 545 (1977). Gov’t’s Opp’n Defs.’ Discovery Mots.
at 9. The government reiterated this point during the August 2, 2017 hearing and added that the
members of the Meza Flores DTO (the distribution cell of a larger Mexican drug trafficking
organization at issue in this case) used many different modes of communication. See Status
Conf. Hr’g (rough) Tr. (Aug. 2, 2017) at 38–39. Thus, even if Panfilo were not a participant in
all of the intercepted Blackberry messages among DTO members, this would not necessarily be
exculpatory. Based on the government’s written and oral assurances, the Court is satisfied that
the government has been and will remain “vigilant in ensuring that it fulfills its discovery and
Brady/Giglio obligations.” Karake, 281 F. Supp. 2d at 306 (accepting the government’s
assertion that it was aware of “no Brady information of the type described”).
The next reason given by the defendants for compelling discovery of the minimized
Panfilo and co-conspirator intercepts shows plainly that this discovery demand is not intended to
prepare a defense in response to the government’s case-in-chief. The defendants argue that
receiving all intercepts, including those of alleged co-conspirators and minimized, will help
show that the government improperly minimized the communications. See Jt. Stm. Discovery ¶
7. Although the erroneous marking of seven AMR files as “pertinent” rightfully raises some
concern, seven is a “small number” compared to the approximately 12,500 electronic
communications marked pertinent and not minimized. Gov’t’s Third Opp’n T. III Intercepts at
25
18. In addition, given the detailed description provided by the government of the minimization
procedures employed, and the fact that the seven AMR files were all received in the same
session by the same monitor and have no accompanying transcript, Gov’t’s Second Opp’n T. III
Intercepts at 5, the defendants’ argument that additional minimization violations may be
uncovered through the requested compelled discovery is purely speculative.
This defense effort to find additional evidence to bolster arguments challenging the
minimization procedures used during the wiretap phase of the investigation does not refute any
of the government’s direct evidence against the defendants. To the contrary, even if additional
minimization violations were found, the wiretap statute does not provide a suppression remedy
for Panfilo’s intercepted electronic communications, which could still be used in the
government’s case-in-chief. Consequently, the defendants’ wishful thinking of finding
additional minimization violations does not justify the requested discovery under Rule 16. See,
e.g., United States v. Pray, 734 F. Supp. 2d 158, 159–60 (D.D.C. 2010) (denying defendants’
motion to compel discovery of periodic wiretap reports for use in challenging, inter alia,
minimization and propriety of government’s procedures since such evidence “do[es] not
constitute material evidence”); United States v. Trabelsi, Crim. No. 06-89 (RWR), 2015 U.S.
Dist. LEXIS 189343, *6–7 (D.D.C. May 8, 2015) (finding that defendant’s request for discovery
to was “not warranted under Rule 16(a)(1)(E)(i)” since it is “not to rebut the government’s case
in chief but to support an independent argument to dismiss the indictment”).
Accordingly, the defendants’ motions to compel discovery are DENIED.
II. GOVERNMENT’S MOTION TO RECONSIDER USE OF NON-LITERAL
TRANSLATIONS OF INTERCEPTED COMMUNICATIONS TRANSCRIPTS
The government has moved to use at trial transcripts of intercepted BlackBerry
Messenger communications (“BBMs”) in the form produced to the defendants on August 8,
26
2017. Gov’t’s BBMT Mot. at 1 & n.1. Shortly after initial production of the transcripts at issue,
the defendants raised concern at a status conference held on August 11, 2017, that the
government’s proposed transcripts did not provide literal translations of certain words but instead
interpreted Spanish slang to have potentially prejudicial meaning, like “cocaine” for a word
literally translated as “parakeet.” Status Conf. Hr’g (rough) Tr. (Aug. 11, 2017) at 4–5.21
Conceding that literal translations are not used for certain Spanish words in these
proposed transcripts, the government argues that the transcripts reflect “English translations of
Spanish slang words or colloquialisms that are acceptable translations of the Spanish language
BBM communications,” based upon the “knowledge and experience” of the translator. Gov’t’s
BBMT Mot. at 2. According to the government, if literal translations are used, the translator
“would be unable to testify that the translation is a fair and accurate translation of the Spanish
communication based upon her expertise and based on the context of the conversation,” since
interpreting the import of the communication requires more than “taking statements in one
language and expressing them in a different language” but instead reflects “a continuing exercise
of judgment and analysis of what is meant or intended to be said by the parties.” Id. at 6–7
(internal quotation marks and citation omitted).
Specifically, the government has enumerated eleven words set out in the chart below that
have been translated differently from the literal meaning to reflect the common slang
understanding. See id.22
21
The government was directed to provide the Defendants with “literal” translations of the intercepted BBM
communications by August 15, 2017, see Minute Order (Aug. 11, 2017) (directing government “to re-produce to the
defendants, by August 15, 2017, transcripts for Blackberry intercepts, containing literal translations of all words”),
and the government generally complied by providing “updated” transcripts. In the instant motion, the government
seeks to use the original transcripts produced on August 8, 2017.
22
The defendants mentioned the word “perico” as an example of an inaccurately translated word, Status
Conf. Hr’g (rough) Tr. (Aug. 11, 2017) at 4, but the government indicates this word may be literally translated at
“cocaine,” Gov’t’s BBMT Mot. at 1 n.1 (noting that the REAL ACADEMIA ESPAÑOLA (“RAE”), a recognized Spanish
27
Intercepted Literal Translation Slang Translation Used in Proposed
Spanish Word BBM Transcripts
1 Simón Simon yes
2 Sale leave alright
3 Jale pull work, job, stuff
4 Fierro iron guns; also interjection like “Alright” or
“go for it!”
5 Paro Stop; strike;
stoppage “hacerme el paro” is to do me a favor
6 Chale chalet No way!; Oh my God!; sure
7 Aguitarse (no definition) bummed; bummed out
8 Parrque park ammunition; ammo
9 Morros snout/nose kid; boy
10 Pedo fart no hay pedo; there’s no problem
11 Vato (no definition) dude
Here, without identifying any of the eleven words or other particular words or phrases
used in the proposed transcripts as disputed, the defendants have generally challenged the
transcripts’ accuracy and requested “a pre-trial hearing to determine the admissibility of the
materials.” Defs.’ Opp’n Gov’t’s BBMT Mot. at 1, ECF No. 100.23 The government’s
translator, Judi O’Brien, has “approximately 20 years of experience as a Spanish language
translator and interpreter,” an advanced Master of Arts degree in Spanish and Latin American
Studies from American University, and has, for the past seven years, “been employed as a
translator and language services coordinator with the Narcotic and Dangerous Drug Section, U.S.
dictionary, lists “cocaine” as an acceptable definition of the word “perico”). The defendants do not contest this
assertion in their opposition. See generally Defs.’ Opp’n Gov’t’s BBMT Mot., ECF No. 100.
23
The defendants initially contended that insufficient information was provided about the qualifications of the
government’s translator “to determine if she even has the expertise to translate the materials,” citing the lack of any
“expert notice pursuant to Federal Rule of Criminal Procedure 702 for the witness,” or “information concerning the
qualifications and methodology used to create the English language transcripts,” or “what materials the translator
was provided in this case.” Defs.’ Opp’n Gov’t’s BBMT Mot. at 1–3. Less than one week after the defendants
pointed out the lack of a government expert notice for the translator of the proposed BBM transcripts, the
government filed such a notice for Judi O’Brien, who is a certified Spanish to English translator. See Gov’t’s Not.
Expert Testimony of Judi O’Brien at 1–2, ECF No. 106.
28
Department of Justice.” Gov’t’s Not. Expert Testimony of Judi O’Brien at 1–2, ECF No. 106.24
Despite these qualifications, the defendants question the translator’s “proficiency” in interpreting
“the dialect of Mexican Spanish that will be at issue in this case,” since her “Spanish language
education took place in Costa Rica.” Defs.’ Resp. Gov’t’s Not. Intent to Call Expert Witnesses
(“Defs.’ Resp. Gov’t’s Not. Expert Witnesses”) at 2, ECF No. 123. The defendants, however,
“will not object to the Government proceeding at their own peril with the use of Ms. O’Brien as
their expert,” and are trying to locate their own qualified expert “to review the tapes and
blackberry messages and will provide the Government with the results of any forthcoming
analysis as soon as it is prepared.” Id. at 3; see Gov’t’s Reply Further Supp. Not. Intent to Call
Expert Witnesses at 2, ECF No. 125 (noting that “the Defendants’ [sic] do not challenge the
sufficiency of the notices regarding Judi O’Brien”).
To the extent the defendants challenge the interpretation reflected in the transcripts, the
government contends that they may do so “through cross-examination or by the presentation of
another qualified translator with a contrary view.” Gov’t’s BBMT Mot. at 3 (citing United
States v. Verdin-Garcia, 516 F.3d 884, 892–93 (10th Cir. 2008) (emphasis in original); id. at 3–5
(discussing United States v. Khan, 794 F.3d 1288, 1294–97 (11th Cir. 2015) (affirming ruling
admitting non-literal transcripts at trial, noting that “[d]efendants who object to the manner in
which a translator has performed the difficult and delicate task of moving meaning between two
languages have a number of tools at their disposal—Rule 702, cross-examination, and limiting
instructions, to name a few”)). The government is correct.
24
Ms. O’Brien has also provided testimony in three other trials in this court, Gov’t’s Not. Expert Testimony
of Judi O’Brien at 2, though without being qualified as an expert, Defs.’ Resp. Gov’t’s Not. Intent to Call Expert
Witnesses (“Defs.’ Resp. Gov’t’s Not. Expert Witnesses”) at 3, ECF No. 123.
29
Although “[t]he ideal procedure for testing accuracy is to have the prosecution and
defense attorneys stipulate to a transcript,” United States v. Slade, 627 F.2d 293, 302 (D.C. Cir.
1980), the D.C. Circuit has provided guidance as to the appropriate procedures when, as here, the
accuracy of transcripts is disputed. In this circumstance, “the trial court can make a pretrial
determination of accuracy after comparing the proposed transcript against the tapes or provide
the jury with one transcript reflecting the prosecution’s interpretation of the recording and one
version reflecting the defendant’s interpretation,” United States v. Holton, 116 F.3d 1536, 1541
(D.C. Cir 1997); see also Slade, 627 F. 2d at 303 (“A third alternative is to present the jury with
two transcripts, containing both sides’ versions, and let the jury determine which is more
accurate,” in which “situation, because no one transcript is presented as ‘correct,’ the judge need
not necessarily listen to the tapes or pass on the accuracy of any transcript.”) (internal quotation
marks and citation omitted). If two competing versions of the same recording are presented, the
jury “should be instructed that there is a difference of opinion as to the accuracy of the
transcripts and that it is up to them to decide which, if any, version to accept. The jurors also
should be instructed that they should disregard any portion of the transcript or transcripts that
they think differs from what they hear on the tape recording.” Holton, 116 F.3d at 1543. If only
the government submits a transcript, then cautionary instructions should be given that “the
transcript is only one party’s version,” United States v. Law, 528 F.3d 888, 901–02 (D.C. Cir.
2008) (quoting Holton, 116 F.3d at 1542).
The precise procedure to be used at trial remains unclear due to the defendants’ expressed
need to locate their own qualified expert interpreter. Defs.’ Resp. Gov’t’s Not. Expert Witnesses
at 3. The defendants have now had since August 8, 2017, or over four months, to do so, as well
as to determine precisely which interpretations in the proposed transcripts are disputed and to
30
prepare versions of their own transcripts, as necessary. Thus, the parties are required to submit
jointly, by January 10, 2018, before the pretrial conference, a notice (1) detailing any
outstanding disputes regarding the proposed transcripts produced on August 8, 2017; (2) whether
any defendant intends to offer alternative transcripts; (3) if any defendant intends to offer
alternative interpretations of the recordings, whether the parties intend to introduce one transcript
containing both versions of the disputed portions of the recording or two separate transcripts; (4)
the text of any requested cautionary instructions regarding the transcripts; and (5) any objection
to permitting the jury to use the transcripts during deliberations. See United States v. Edwards,
887 F. Supp. 2d 63, 71–73 (D.D.C. 2012).
In view of the defendants’ withdrawal of their objection to the government’s translator’s
qualifications, their request for a pretrial hearing to evaluate and hear expert testimony about the
proposed August 8, 2017 BBM transcripts is DENIED. Further, based upon the qualifications of
the government’s translator, whose expertise and methodology used to prepare the English
transcripts at issue will be subject to cross examination at trial, the government’s motion to use at
trial the version of transcripts of intercepted BBMs produced on August 8, 2017, is GRANTED.
III. DEFENDANT AGUSTIN’S MOTION TO INSPECT GRAND JURY MINUTES
Both defendants previously unsuccessfully moved to dismiss Count Two of the
Indictment charging a firearm offense, in violation of 18 U.S.C. § 924(c), as not applying
extraterritorially and for being facially defective. See Apodaca II, 2017 U.S. Dist. LEXIS
131617, at *66 (denying defendants’ motions to dismiss Count Two and finding that “§ 924(c)
also applies extraterritorially” and “adequately informs the defendants of the § 924(c) offenses
with which they are charged”). Undeterred, Agustin now raises a new challenge to Count Two
and moves for “an in camera inspection of the grand jury minutes to determine what specific
31
evidence was presented concerning the possession of a firearm charged in Count Two of the
Indictment,” and what “legal instructions” were “provided to the grand jurors concerning Count
Two’s ‘aiding and abetting’ theory.” Def.’s Mot. GJ Inspection at 1.25 In particular, Agustin
suspects that, first, the government’s trial evidence may “constructively amend the Indictment,”
and, second, the grand jury was not properly instructed about “controlling law” requiring “that an
aider and abettor had ‘actual knowledge’ that a firearm would be used in the commission of the
offense,” and failure to provide such instruction “would undermine the validity of the
Indictment. Id. (citing Bank of Nova Scotia v. United States, 487 U.S. 250, 256 (1988)). The
government objects, contending that this defendant “has not met his burden to overcome the
presumption of regularity surrounding grand jury proceedings.” Gov’t’s Opp’n Def.’s Mot. In
Camera Inspection of Grand Jury Minutes (“Gov’t’s Opp’n Def.’s Mot. GJ Inspection”) at 1,
ECF No. 131. As explained below, the Court agrees with the government.
In evaluating this motion, the charge itself and the government’s proffered evidence are
first reviewed, before turning to analysis of whether either of Agustin’s arguments warrant
inspection of the grand jury minutes. Count Two charges, in relevant part, that the defendant,
“[f]rom in or about July 2010, and continuing thereafter, up to and including May 2012, . . . did
knowingly and intentionally use, carry, and brandish a firearm, during and in relation to one or
more drug trafficking crimes, to wit: the crimes charged in Count One, and . . . possess a firearm
in furtherance of such drug trafficking crimes.” Agustin’s Indictment, United States v. Agustin
Flores Apodaca, Crim. No. 12-116 (BAH) at 1–3 (D.D.C. May 2, 2012), ECF No. 1. The
25
The defendant states that the belated filing of this motion on November 6, 2017, when the scheduling order
required substantive motions to be filed by June 28, 2017, Min. Order (dated Mar. 3, 2017) is because the grounds
for the motion did not become “apparent to defense counsel until the Government filed its Supplemental Notices
concerning other crimes evidence and the Court resolved the originally filed legal motions.” Def.’s Mot. GJ
Inspection at 1.
32
government has proffered as evidence for this charge that: (1) cooperating witnesses will testify
about Agustin’s possession of firearms in the course of the drug trafficking activities charged in
Count One of the Indictment; (2) in about December 2009, in El Burrion in Sinaloa, Mexico,
Agustin carried firearms during a violent shoot-out; (3) in September 2010, Agustin attempted to
trade drugs for .50 caliber machine guns for use against a rival drug cartel; and (4) in October
2013, in Santa Maria del Oro in the state of Nayarit, Mexico, co-defendant Panfilo and co-
conspirators possessed weapons while fleeing from, and being involved in a shoot-out with,
Mexican Marines. Apodaca II, 2017 U.S. Dist. LEXIS 131617, at *65.
A. Requested Inspection of Evidence Presented To Grand Jury
With respect to the first proffered basis for inspection of the grand jury minutes, Agustin
denies that he is challenging “the sufficiency of the evidence presented to the grand jury,” Def.’s
Mot. GJ Inspection at 5; see Def.’s Reply Supp. Mot. In Camera Inspection of Grand Jury
Minutes (“Def.’s Reply Mot. GJ Inspection”) at 1, ECF No. 132, but requests only that the Court
inspect “what evidence was presented . . . and take appropriate steps to ensure that the charge is
not constructively amended at trial . . . ,” Def.’s Mot. GJ Inspection at 5 (emphasis in original).
He points out that: the last three alleged events do not support Count Two, since the December,
2009 evidence falls outside the two-year date range of the firearms charge; the September 2010
evidence amounts to an attempt, which is “a theory that is not included in the Indictment”; and
the October 2013 evidence occurred after the Indictment had been returned on May 2, 2012. Id.
at 4–5. Agustin concedes that more generalized testimony from cooperating witnesses about his
possession of firearms in the course of drug trafficking activities would be sufficient to support
the charge, but nonetheless urges inspection of the grand jury minutes apparently to ensure that
such generalized evidence was, in fact, provided and to assess whether some undefined
33
“appropriate steps” must be taken to avoid constructive amendment of the indictment at trial,
with the concomitant risk “of infecting the trial with reversible error,” id. at 5, by
“supplement[ing] the factual basis of criminal liability at the trial,” Def.’s Reply Mot. GJ
Inspection at 2.
At the outset, the government’s response lacks any specific assurances about the evidence
presented to the grand jury to support Count Two. Id. at 1 (noting that “Government has [not]
even offered an informal ‘proffer’ as to the evidentiary predicate for Count Two presented to the
grand jury”). Nevertheless, as Agustin concedes, the government had cooperating witnesses’
testimony available in some form to present to the grand jury, and such evidence would be
sufficient to support Count Two. Thus, despite his denial that he is challenging the sufficiency
of the grand jury evidence, Agustin’s request for in camera review of grand jury minutes to
ascertain what evidence was presented to support the grand jury’s finding of probable cause to
believe the defendant committed the firearms offense charged, amounts to the same thing. Yet,
the law is well-established that challenges to the sufficiency of the evidence presented to the
grand jury are not permitted. See, e.g., United States v. Williams, 504 U.S. 36, 54–66 (1992)
(“[I]t would run counter to the whole history of the grand jury institution’ to permit an
indictment to be challenged ‘on the ground that there was inadequate or incompetent evidence
before the grand jury.”) (quoting Costello v. United States, 350 U.S. 359, 363–364 (1956)); Bank
of Nova Scotia, 487 U.S. at 261 (explaining “a challenge to the reliability or competence of
evidence presented to the grand jury” will not be heard, and “the mere fact that evidence itself is
unreliable is not sufficient to require a dismissal of the indictment”).
This law reflects “a long-established policy that maintains the secrecy of the grand jury
proceedings in the federal courts,” United States v. Procter & Gamble Co., 356 U.S. 677, 681
34
(1958), and “a presumption of regularity,” with respect to grand jury proceedings, “which
generally may be dispelled only upon particularized proof of irregularities in the grand jury
process,” United States v. Mechanik, 475 U.S. 66, 75 (1986). Under Federal Rules of Criminal
Procedure 6(e), grand jury materials are subject to disclosure when the defendant succeeds in
carrying the heavy burden of showing “that a particularized need exists” that “outweighs the
policy of secrecy.” Pittsburgh Plate Glass Co. v. United States, 360 U.S. 395, 400 (1959)
(internal quotation marks omitted); see also id. at 399 (“Petitioners concede, as they must, that
any disclosure of grand jury minutes is covered by [FED. R. CRIM. P. 6(e)].”) The Supreme Court
has found this burden met where “the Government concedes that the importance of preserving
the secrecy of the grand jury minutes is minimal and also admits the persuasiveness of the
arguments advanced in favor of disclosure.” Dennis v. United States, 384 U.S. 855, 871–72
(1966); see also De Binder v. United States, 292 F.2d 737, 739 (D.C. Cir. 1961) (determining
that defendant met burden for inspection of grand jury minutes where “ample ground” existed for
“suspicion” of “inconsistencies” between grand jury and trial testimony of prosecution’s “sole,
key, eyewitness”).
By contrast, where a defendant fails to provide a discrete reason, and instead relies on
speculation or unsupported assumptions, courts have made clear that disclosure of grand jury
minutes is not warranted. See, e.g., Procter & Gamble, 356 U.S. at 682–83 (noting that
defendants’ showings “fall short of proof that without the [grand jury] transcript a defense would
be greatly prejudiced or that without reference to it an injustice would be done,” and thus the
case was not one of those “cases of particularized need where the secrecy of the proceedings is
lifted discretely and limitedly”); Jackson v. United States, 297 F.2d 195, 197–98 (D.C. Cir.
1961) (explaining, after finding “not the slightest evidence of inconsistency” between witness’s
35
trial and grand jury testimony, that “[i]f defendant’s position is correct . . . defense counsel in
every case [might] be allowed to go upon a fishing expedition in the hope of developing
something favorable to the defense”); United States v. Borda, 905 F. Supp. 2d 201, 205 (D.D.C.
2012) (finding defendants did not demonstrate particular need for inspection of grand jury
minutes where their assertions about misleading evidence were “completely speculative” and
relied on a “tenuous” connection between an affidavit and testimony presented to the grand jury);
United States v. Hernandez, No. CR-14-0120 EMC, 2015 U.S. Dist. LEXIS 96402, at *29 (N.D.
Cal. July 23, 2015) (finding, where “[i]ndictment is sufficiently factually specific,” defendants
have “no particularized need . . . to obtain the grand jury transcripts so that they can ‘confirm’
that the grand jury did not pass on the factual allegations the Government intends to prove at
trial”). Only in “exceedingly rare cases” are defendants “able to make a factually based showing
of particularized need for the production and inspection of grand jury materials.” United States
v. Naegele, 474 F. Supp. 2d 9, 10–11 (D.D.C. 2007) (allowing inspection of grand jury minutes
because government misled the grand jury about the existence of a page of a document that had
been the basis for “[a]t least five counts of the original eleven-count indictment”).
In this case, Agustin contends that the grand jury minutes should be inspected to guard
against any constructive amendment of the indictment stemming from variance between the
evidence considered by the grand jury and the anticipated proof at trial. He speculates about
“what evidence was presented to the grand jury” to raise “a very real possibility” that
“constructive amendment of the Indictment” may occur. Def.’s Reply Mot. GJ Inspection at 1–
2. While constructive amendment of an indictment violates the Fifth Amendment’s presentment
clause where substantial “variance” exists between the “charging terms of the indictment left
unaltered” and “evidence offered at trial prov[ing] facts materially different from those alleged in
36
the indictment,” Gaither v. United States, 413 F.2d 1061, 1071 (D.C. Cir. 1969); see also Stirone
v. United States, 361 U.S. 212, 218 (1960) (“[T]he basic protection the grand jury was designed
to afford is defeated by a device or method which subjects the defendant to prosecution for [an
offense] which the grand jury did not charge.”), Agustin has not presented any sufficient reason,
let alone a particularized need, to overcome the presumption against disclosure of the grand jury
materials.
Even if Agustin is correct that all of the evidence regarding the firearms charge that the
government intends to introduce at trial was not presented to the grand jury, this does not amount
to an improper variance of proof or demonstrate a particularized need for inspection of the
evidence presented to the grand jury. As long as the defendant is on notice of the charges against
him and the trial evidence does not alter “an essential element of the charge,” the law permits
some variance in proof between the grand jury and at trial. United States v. Hitt, 249 F.3d 1010,
1028 (D.C. Cir. 2001) (permitting “flexibility in proof” at trial, where “the defendant was given
notice of the core of criminality to be proven at trial.” (quoting Berger, 224 F.3d 107, 117 (2d.
Cir. 2000)); see United States v. Sitzmann, 74 F. Supp. 3d 96, 122 (D.D.C. 2014) (“[W]here ‘a
generally framed indictment encompasses the specific legal theory or evidence used at trial, there
is no constructive amendment.’”) (quoting United States v. Rigas, 490 F.3d 208, 228 (2d Cr.
2007)); accord United States v. Dowdell, 595 F.3d 50, 68 (1st Cir. 2010) (explaining that, given
notice of charge given to defendant, any “variance” in proof “would have been a harmless one”
and not in violation of the Fifth Amendment); United States v. Wiley, 29 F.3d 345, 352 (8th Cir.
1994) (finding where defendant “was on notice before trial that the government intended to
present” certain evidence, “any variance did not affect his substantial rights or cause actual
prejudice”). For instance, “[t]here is no constructive amendment when a court ‘admit[s]
37
evidence of other criminal conduct that is inextricably intertwined with the charged offense or
that completes the story of the charged offense.’” McClurge v. United States, No. 04 C 3628,
2004 U.S. Dist. LEXIS 25108, at *10 (N.D. Ill. Dec. 13, 2004) (alteration in original) (quoting
United States v. King, 126 F.3d 987, 995 (7th Cir. 1997)). Thus, to the extent Agustin is
concerned that the government will present at trial other crimes or intrinsic evidence supporting
Count Two that was not previously submitted to the grand jury, this additional proof does not
amount to an improper variance and consequently does not warrant inspection of the grand jury
minutes.
Given the adequate notice of the firearms charge afforded to the defendants, see Apodaca
II, 2017 U.S. Dist. LEXIS 131617 at *66, and Agustin’s failure to provide any actual
“particularized need” for disclosure of grand jury materials, especially in light of his concession
that cooperating witnesses may provide sufficient support for the charge against him, the first
basis of his motion for inspection of grand jury minutes fails.
B. Alleged Improper Legal Instructions to Grand Jury
The second basis for Agustin’s motion for in camera inspection of the grand jury minutes
is to check whether the grand jury was properly instructed on the law regarding aiding and
abetting liability. In this regard, Agustin is correct that criminal liability for aiding and abetting a
violation of 18 U.S.C. § 924(c) requires that the defendant has “actual knowledge” of the use of a
firearm by the principal. See Rosemond v. United States, 134 S. Ct. 1240, 1243 (2014) (“We
hold that the Government makes its case by proving that the defendant actively participated in
the underlying drug trafficking or violent crime with advance knowledge that a confederate
would use or carry a gun during the crime’s commission.”); United States v. Slatten, 865 F.3d
767, 793 (D.C. Cir. 2017) (citing Rosemond, and finding “sufficient evidence to support []
38
convictions under an aiding-and-abetting theory” where defendant at issue “actively participated
in a gunbattle in which” victims were killed and “the gunfire of each shooter hindered potential
escape, leaving victims exposed to the others’ bullets”); United States v. Powell, 929 F.2d 724,
729 (D.C. Cir. 1991) (requiring proof that aider and abettor “knew to a practical certainty that his
drug-peddling associates would be carrying a gun in connection with their joint venture”);
United States v. García-Ortiz, 792 F.3d 184, 189–90 (1st Cir. 2015) (stating “requirement that
an aider and abettor of a § 924(c) crime have advance knowledge of the principal’s intent to use
a weapon”). Citing a single paragraph in the prosecutor’s extradition request, which Agustin
claims provides an “incomplete statement of the law” applicable to aiding and abetting, he
contends this provides “good reason to believe that any instructions [to the grand jury] were
incomplete.” Def.’s Mot. GJ Inspection at 7–8.
With this argument, Agustin again fails to meet his burden for demonstrating a
“particularized need” to overcome the presumption of secrecy and regularity that materials from
grand jury proceedings enjoy. See Procter & Gamble, 356 U.S. at 683; Pittsburgh Plate Glass,
360 U.S. at 400. His argument essentially relies on what is missing in the extradition request,
which, as the government points out, is governed by treaty and does not require “a complete set
of jury instructions.” Gov’t’s’ Opp’n Def.’s Mot. GJ Inspection at 7–8. Moreover, as discussed
above, the indictment has already been deemed facially valid, which undermines Agustin’s
theory that the grand jury instructions may have been incomplete. See United States v. Espy, 23
F. Supp. 2d 1, 10 (D.D.C. 1998) (denying motion for disclosure of grand jury materials where
“facially valid indictment undermines any ‘particularized need’ the alleged grand jury
instructions demonstrate for disclosure of the grand jury transcripts”); see also United States v.
Singhal, 876 F. Supp. 2d 82, 99 (D.D.C. 2012) (rejecting disclosure of grand jury materials
39
where “[d]efendants are unable to identify any portion of the Indictment that suggests that any
charge to the grand jury was legally erroneous, and resorts to speculation about what the grand
jury was instructed based on what is not stated in the Indictment”) (emphasis in original); United
States v. Trie, 23 F. Supp. 2d 55, 62 (D.D.C. 1998) (finding where “the indictment is facially
valid” that “the mere suspicion that the grand jury may not have been properly instructed . . . is
insufficient to establish that [the defendant] is entitled either to dismissal of the indictment or to
disclosure of grand jury materials”).
For these reasons, Agustin has failed to show any “particularized need” for inspection of
the instructions to the grand jury about Count Two, and his attempt to relitigate his earlier
challenge to this charge in the indictment must be rejected. Accordingly, Agustin’s motion for
an in camera review of the grand jury minutes is DENIED.
IV. CONCLUSION
For the foregoing reasons, the following motions are DENIED: (1) the defendants’
Motion to Suppress Title III Intercepts, ECF No. 33; (2) the defendants’ motions to compel
discovery, ECF Nos. 40, 41 and 45; and (3) Agustin’s motion for in camera inspection of the
grand jury minutes, ECF No. 130. The government’s motion to use at trial transcripts of
intercepted BlackBerry Messenger communications in the form produced to the defendants on
August 8, 2017, ECF No. 95, is GRANTED, and, as explained supra in Part II, the parties must
jointly submit, by January 10, 2018, a notice (1) detailing any outstanding disputes regarding
the proposed transcripts produced on August 8, 2017; (2) whether any defendant intends to offer
alternative transcripts; (3) if any defendant intends to offer alternative interpretations of the
recordings, whether the parties intend to introduce one transcript containing both versions of the
disputed portions of the recording or two separate transcripts; (4) the text of any requested
40
cautionary instructions regarding the transcripts; and (5) any objection to permitting the jury to
use the transcripts during deliberations.
An Order consistent with this Memorandum Opinion will issue contemporaneously.
Date: December 28, 2017
__________________________
BERYL A. HOWELL
Chief Judge
41