PUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
No. 17-4148
UNITED STATES OF AMERICA,
Plaintiff − Appellee,
v.
DARRA LEE SHEPHARD, a/k/a Nora Southerland, a/k/a Donna Ramirez,
Defendant – Appellant.
Appeal from the United States District Court for the Western District of North Carolina, at
Charlotte. Robert J. Conrad, Jr., District Judge. (3:13-cr-00021-RJC-DCK-3)
Argued: March 22, 2018 Decided: June 15, 2018
Before NIEMEYER, WYNN, and DIAZ, Circuit Judges.
Affirmed by published opinion. Judge Diaz wrote the majority opinion, in which Judge
Niemeyer joined. Judge Wynn wrote a dissenting opinion.
ARGUED: Chiege Ojugo Kalu Okwara, LAW OFFICE OF CHIEGE O. KALU
OKWARA, Charlotte, North Carolina, for Appellant. Joanna Katherine Wood Bowman,
UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellee. ON
BRIEF: Kenneth A. Blanco, Acting Assistant Attorney General, Trevor N. McFadden,
Deputy Assistant Attorney General, Ellen R. Meltzer, William H. Bowne, Gustav W. Eyler,
Fraud Section, Criminal Division, UNITED STATES DEPARTMENT OF JUSTICE,
Washington, D.C.; Jill Westmoreland Rose, United States Attorney, OFFICE OF THE
UNITED STATES ATTORNEY, Charlotte, North Carolina, for Appellee.
DIAZ, Circuit Judge:
Darra Lee Shephard conspired to defraud U.S. residents through a telemarketing
sweepstakes scheme. From a call center in Costa Rica, Shephard and others would tell
their unwitting victims that they had won a sweepstakes prize. The catch? Winners could
receive their prize money only after paying a “refundable insurance fee.” Victims of the
scheme wired thousands of dollars to the call center, but of course, no fees were refunded
and no prize money was ever paid.
Shephard pleaded guilty to conspiracy to commit wire and mail fraud, conspiracy
to commit money laundering, eight substantive counts of wire fraud and aiding and
abetting, and four substantive counts of money laundering and aiding and abetting. She
was sentenced to ninety-six months in prison and ordered to pay $7,215,695.20 in
restitution. On appeal, she challenges (1) the district court’s application of the vulnerable
victim sentencing enhancement and (2) its calculation of the actual loss amount. We
affirm.
I.
A.
From 2007 through February 2015, Shephard “participated in, and otherwise
facilitated,” a sweepstakes telemarketing call center in Costa Rica for the purpose of
defrauding U.S. residents by convincing them to pay money in order to claim a fake
sweepstakes prize. J.A. 158.
2
The call center required “openers” to call residents in the United States and inform
them that they had won second prize in a sweepstakes in the amount of $350,000 to
$450,000. The “openers”—often falsely representing themselves as U.S. government
employees—would explain that in order to receive the prize money, the U.S. resident must
pay a “refundable insurance fee” by wiring money via Western Union, MoneyGram or an
international bank. Victims then wired money to a “runner,” who would collect wire
transfers at banks in Costa Rica, or a “bridge,” who would receive the funds in the United
States and forward them along to the call center in Costa Rica.
Once someone fell prey to the scam and made an initial payment, a “loader” would
call again and convince the victim to send more money. The “loader” would tell the victim
that a mistake had been made and he had actually won first prize, which was more than
$3,000,000. Of course, the victim would first need to pay thousands of additional dollars
in increased insurance fees to claim this larger prize. If the victim fell for the scheme again
and made another payment, the “loader” would continuously raise the sweepstakes prize
and ask for more money from the same victim. This process is known as “reloading.” At
various times throughout her tenure, Shephard worked in the call center as an “opener,” a
“runner,” and a “loader.”
B.
Shephard was arrested in Costa Rica in July 2015 and then extradited to the United
States. She pleaded guilty to all fourteen counts of her indictment without the benefit of a
plea agreement. Shephard also agreed to a written factual basis for her plea, which
described the sweepstakes scheme and her involvement. Shephard reserved her right to
3
object to two proposed findings at sentencing: (1) that the loss amount was over $3,500,000
and (2) that she knew that many of the victims were over the age of fifty-five and
vulnerable.
Shephard’s presentence report (“PSR”) relied on the factual basis, as well as two
written statements from Shephard, to calculate the appropriate Guidelines range. The PSR
applied a base offense level of 7 for wire fraud, a number of enhancements, and a three-
level downward adjustment for acceptance of responsibility. For our purposes, only two
of the enhancements matter: First, the PSR applied a two-level enhancement because the
offense involved vulnerable victims. U.S.S.G. § 3A1.1(b)(1). Second, it applied an
eighteen-level increase for a loss amount of more than $3,500,000 but less than or equal to
$9,500,000. U.S.S.G. § 2B1.1(b)(1)(J). The PSR relied on the financial analysis prepared
by the government, which explained that during Shephard’s involvement the loss amount
collected from victims via Western Union was $5,876,814.27 and the loss amount collected
via MoneyGram was $1,338,880.93, resulting in a total loss amount of $7,215,695.20.
Shephard objected to the vulnerable victim enhancement and the loss amount
calculation. She argued there was no evidence that the scheme targeted unusually
vulnerable victims or that Shephard knew it targeted such victims. As for the loss amount,
she claimed it should be less than $3,500,000 because the victims’ losses were not
adequately documented and her involvement in the call center was sporadic. The court
overruled the objection to the vulnerable victim enhancement “based on responses from
the government, consistent with my other rulings in other [related] call center cases that
. . . vulnerable victim enhancements were appropriate in the nature of how this fraud
4
activity worked.” J.A. 71. And it affirmed the loss amount as a “conservative estimate”
based on “solid methodology.” J.A. 70. The court further explained that Shephard was
responsible for the criminal activity of her coconspirators even after her personal
participation ended because she never affirmatively withdrew from the conspiracy.
The district court adopted the PSR’s Guidelines calculation, which applied a total
offense level of 34 and a criminal history of I for a Guidelines range of 151 to 188 months’
imprisonment. The court then departed and varied downward to arrive at a sentence of
ninety-six months’ imprisonment and $7,215,695.20 in restitution.
Shephard filed a timely appeal.
II.
We review criminal sentences for reasonableness using an abuse of discretion
standard. Gall v. United States, 552 U.S. 38, 51 (2007). A sentence based on an improperly
calculated Guidelines range is procedurally unreasonable. United States v. Davis, 679 F.3d
177, 182 (4th Cir. 2012). In reviewing whether a sentencing court properly calculated the
Guidelines range, we review the court’s factual findings for clear error and its legal
conclusions de novo. Id.
A.
The Sentencing Guidelines allow for a two-level enhancement “[i]f the defendant
knew or should have known that a victim of the offense was a vulnerable victim.” U.S.S.G.
§ 3A1.1(b)(1). A vulnerable victim is a person “(A) who is a victim of the offense of
conviction and any conduct for which the defendant is accountable . . . and (B) who is
5
unusually vulnerable due to age, physical or mental condition, or who is otherwise
particularly susceptible to the criminal conduct.” U.S.S.G. § 3A1.1 cmt. n.2.
For the vulnerable victim enhancement to apply, the record must show that (1) the
victim of the offense was unusually vulnerable and (2) the defendant knew or should have
known of the victim’s unusual vulnerability. United States v. Llamas, 599 F.3d 381, 388
(4th Cir. 2010). The enhancement thus “requires a fact-based explanation of why advanced
age or some other characteristic made one or more victims unusually vulnerable to the
offense conduct, and why the defendant knew or should have known of this unusual
vulnerability.” Id. (internal quotation marks omitted).
In this case, the factual basis and Shephard’s written statements to the probation
officer explain that the conspiracy involved “reloading” victims and that Shephard herself
worked as a “loader.” The practice of “reloading” involves targeting people who have
already fallen victim to the scheme at least once, if not repeatedly. The question, then, is
whether this practice of reloading, at least in the context of this particular telemarketing
sweepstakes conspiracy, is sufficient to support the vulnerable victim enhancement.
We have not yet addressed this issue, 1 but many of our sister circuits have,
concluding that evidence of reloading may support the enhancement. See United States v.
1
The dissent claims that our decision in Llamas is controlling and that if record
evidence of a reloading scheme were sufficient to uphold the application of the vulnerable
victim enhancement, we would have done so there. In Llamas, however, we rejected the
district court’s application of the enhancement because, after discussing how one victim
took medication for Alzheimer’s disease and another fell for the scheme when she was
expecting a call about her daughter’s health, the court provided no explanation as to why
6
Lloyd, 807 F.3d 1128, 1172‒73 (9th Cir. 2015); United States v. Hoffecker, 530 F.3d 137,
201‒02 (3d Cir. 2008); United States v. Day, 405 F.3d 1293, 1295‒96 (11th Cir. 2005);
United States v. Coe, 220 F.3d 573, 582 (7th Cir. 2000); United States v. Brawner, 173
F.3d 966, 972‒73 (6th Cir. 1999); United States v. O’Neil, 118 F.3d 65, 75‒76 (2d Cir.
1997). 2
As these courts have explained, a victim’s decision to wire money in response to the
initial fraudulent phone call is evidence that they are “particularly susceptible to the
criminal conduct” and that is why fraudsters then repeatedly target that victim through the
process of “reloading.” For example, in United States v. Jackson, which addressed a
similar fraudulent telemarketing scheme, the Seventh Circuit held the vulnerable victim
enhancement applied because the defendants “reloaded” victims. 95 F.3d 500, 502‒03 (7th
Cir. 1996). The court reasoned:
Whether these persons are described as gullible, overly trusting, or just naive
(and whatever the cause of this condition), . . . their readiness to fall for the
the defendant knew or should have known about these two victims’ unique vulnerabilities.
Llamas, 599 F.3d at 388‒89.
When the government on appeal argued the enhancement was appropriate because
Llamas “reloaded” persons who had already fallen for the sweepstakes scheme, we did not
reject the argument—we just noted that the district court never adopted it. We said the
enhancement “cannot be justified simply because there might be some evidence in the
record-not addressed by the sentencing court-supporting [it].” Id. at 389. Here, by contrast,
the sentencing court relied on the practice of reloading as evidence to support its
application of the vulnerable victim enhancement. See infra at 9‒10.
2
The dissent cites the Second Circuit’s decision in United States v. Dupre, 462 F.3d
131 (2d Cir. 2006). There, the court did note that simply asking a fraud victim for more
money does not warrant application of the vulnerable victim enhancement, but it expressly
left open the possibility that “repeated targeting of certain victims” could justify the
enhancement, as it did in O’Neil. Id. at 146.
7
telemarketing rip-off, not once but twice (and in [one] case, four times),
demonstrated that their personalities made them vulnerable in a way and to a
degree not typical of the general population. . . . The structuring of the
reloading process, the designating of customers as “reloads,” . . . the charging
of higher sums to reloads, and the systematic re-victimizing of people . . .
amply demonstrate that the defendants believed the reloaded persons to be
especially vulnerable and that they specifically targeted them because of this
vulnerability.
Id. at 508.
In other words, the reloading process was sufficient to support a finding that the
victims were unusually vulnerable and that the defendants targeted them because of their
vulnerability. The dissent contends that the district court there made findings about one
particular victim. But the court did not just find one or two victims to be unusually
vulnerable. Instead, the court “focussed on the technique of reloading” and concluded
“those who were successfully reloaded” were unusually vulnerable. Id. at 507‒08.
Likewise, the Third and Eleventh Circuits affirmed applications of the vulnerable victim
enhancement based on the simple fact that reloading—the repeated targeting of a victim—
“constitutes evidence that the defendant knew the victim was particularly vulnerable to the
fraud scheme.” Day, 405 F.3d at 1296; Hoffecker, 530 F.3d at 201 (quoting Day).
We believe the reasoning of our sister circuits is sound and applies here. The record
shows that the more experienced telemarketers in this fraudulent sweepstakes scheme,
including Shephard, were specifically designated as “loaders.” The “loaders” called
victims who had already fallen for the scheme and tried to get them to make additional
payments. Shephard explained that she and her coconspirators “would reload the victim
as long as the victim was willing and able to continue to transfer funds” and that “[m]any
8
victims sent tens of thousands of dollars” in response to these calls. J.A. 442. Further, the
individual victim impact statements attached to the presentence report demonstrate, as one
would suspect, that the victims were in fact unusually vulnerable. Thus, we find no clear
error in the district court’s determination that some victims were particularly vulnerable
and that Shephard was aware of this vulnerability. It is why she and her coconspirators
purposefully targeted such victims again and again. 3
Shephard also argues that the district court did not sufficiently explain its decision
to apply the vulnerable victim enhancement. A district court must provide a “sufficient
explanation of its rationale” to enable review, United States v. Wilkinson, 590 F.3d 259,
269 (4th Cir. 2010), and must “place on the record an individualized assessment based on
the particular facts of the case before it,” United States v. Carter, 564 F.3d 325, 330 (4th
Cir. 2009) (internal quotation marks omitted). The district court here overruled Shephard’s
objection to the vulnerable victim enhancement “based on responses from the government,
consistent with my other rulings in other [related] call center cases that there were
vulnerable victim enhancements were appropriate in the nature of how this fraud activity
worked. [sic]” J.A. 71.
Although the district court’s explanation was terse, we find it sufficient. First, the
court based its decision to apply the enhancement on the government’s response. The
3
We need not (and do not) decide whether the mere practice of reloading (without
more) will always justify applying the vulnerable victim enhancement. There may be
unique factual scenarios that rebut the strong inference that defendants who reload victims
target them because they are unusually vulnerable. But here, the district court’s
determination to apply the enhancement was entirely appropriate.
9
government’s response to Shephard’s objection was that “the practice of reloading victims
evinces an offense reliant on unusually vulnerable victims.” J.A. 380. The government
fully explained the argument and cited a number of cases. Second, the court said the
enhancement was appropriate given “the nature of how this fraud activity worked,” which
further confirms that the court found the practice of reloading sufficient to support the
enhancement.
We therefore affirm the district court’s decision to apply the vulnerable victim
enhancement.
B.
Shephard also objects to the loss amount used to justify an eighteen-level
enhancement. Shephard argues that the district court clearly erred in finding a loss amount
of $7,215,695.20. In her view, the real loss amount is under $3,500,000, which should
have resulted in a sixteen rather than eighteen-level enhancement. See U.S.S.G.
§ 2B1.1(b)(1)(I)‒(J).
We review a district court’s calculation of loss amount for clear error. United States
v. Jones, 716 F.3d 851, 859‒60 (4th Cir. 2013). “Loss” is “the greater of actual loss or
intended loss.” U.S.S.G. § 2B1.1 cmt. n.3(A). Here, the court relied on “actual loss,”
defined as “the reasonably foreseeable pecuniary harm that resulted from the offense.”
U.S.S.G. § 2B1.1 cmt. n.3(A)(i). The government must establish the amount of loss by a
preponderance of evidence. United States v. Catone, 769 F.3d 866, 876 (4th Cir. 2014).
But the court need only make a “reasonable estimate” of the loss. U.S.S.G. § 2B1.1 cmt.
n.3(C).
10
In the case of a conspiracy, loss is attributable to a defendant “if it results from the
conduct of others so long as the conduct was in furtherance of, and reasonably foreseeable
in connection with the criminal activity.” United States v. Otuya, 720 F.3d 183, 191 (4th
Cir. 2013) (internal quotation marks omitted). “A defendant’s membership in a conspiracy
is presumed to continue until he withdraws from the conspiracy by affirmative action.
Withdrawal must be shown by evidence that the defendant acted to defeat or disavow the
purposes of the conspiracy.” United States v. Allmendinger, 706 F.3d 330, 341 (4th Cir.
2013) (internal quotation marks omitted). “[M]ere cessation of activity in furtherance of
the conspiracy is insufficient.” United States v. Walker, 796 F.2d 43, 49 (4th Cir. 1986).
The defendant must point to “[a]ffirmative acts inconsistent with the object of the
conspiracy and communicated in a manner reasonably calculated to reach co-conspirators.”
United States v. U.S. Gypsum Co., 438 U.S. 422, 464–65 (1978). The burden of proving
withdrawal rests with the defendant. Walker, 796 F.2d 43, 49 (4th Cir. 1986).
Shephard first argues that the loss amount is wrong because it includes MoneyGram
wire transfers even though the substantive wire fraud and money laundering counts in the
indictment speak only of Western Union transfers. But this argument fails because the
factual basis and Shephard’s written statements to the probation officer clearly establish
that MoneyGram transfers were part of the conspiracy described in counts 1 and 10 of the
indictment.
Next, Shephard argues that the calculation wrongly includes losses accrued through
February 2015 even though she stopped working at the call center in December 2012.
Shephard, however, stipulated in the factual basis supporting the plea that she participated
11
in, or otherwise facilitated, the conspiracy from 2007 through February 2015. And
although Shephard reserved the right to object to the loss amount and whether she
knowingly targeted vulnerable victims, she twice told the court that she agreed “with
everything else” in the factual basis. J.A. 49‒50. This express acknowledgment of her
involvement in the conspiracy through February 2015 is a sufficient basis for including
losses through February 2015 in the loss calculation. See United States v. Gilliam, 987
F.2d 1009, 1013 (4th Cir. 1993) (finding government may use defendant’s
acknowledgements during the Rule 11 colloquy or sentencing proceedings to establish
facts for sentencing purposes).
Further, even if Shephard stopped actively participating in the conspiracy in
December 2012, there is no evidence that she acted to defeat or disavow the purposes of
the conspiracy. Withdrawal requires more than the mere cessation of activity in
furtherance of the conspiracy. Walker, 796 F.2d at 49. The record indicates Shephard’s
involvement in the conspiracy was “on and off” and that, at times, she held legitimate jobs.
Without evidence of an affirmative withdrawal, we don’t know if Shephard was taking
another temporary hiatus from the call center or if she had really abandoned the criminal
enterprise.
Finally, Shephard claims the district court didn’t make any particularized findings
that the MoneyGram transfers or post-2012 Western Union transfers were within the scope
of the criminal activity Shephard agreed to jointly undertake. No such findings are
necessary, however, because it’s clear on the face of the indictment, as well as the factual
basis, that the conspiracy involved MoneyGram transfers. Further, the factual basis
12
establishes Shephard’s involvement in the conspiracy through February 2015 and, even if
she did leave earlier, there’s no allegation that the conspiracy changed in any unforeseeable
way after December 2012. And as we’ve noted, absent proof of an affirmative withdrawal
from the conspiracy, Shephard is liable for the losses her coconspirators continued to
inflict. 4
III.
For the reasons given, we affirm the district court’s judgment.
AFFIRMED
4
The parties dispute whether the spreadsheet of wire transfers that the government
entered as an exhibit at sentencing was complete. We are satisfied that the exhibit as
presently constituted, in conjunction with the rest of the record, establishes a total loss of
$7,215,695.20 based on sound methodology. Accordingly, we deny the government’s
motion to supplement the Joint Appendix and also deny as moot Shephard’s motion to
strike the same.
13
WYNN, Circuit Judge, dissenting in part:
I agree with the majority opinion’s approach to calculating the loss amount in this
case, and I join fully in that portion of the majority opinion. I write separately, however,
because I disagree with the majority opinion’s holding regarding the vulnerable victim
enhancement, U.S.S.G. § 3A1.1(b)(1). I do not believe the district court sufficiently
explained its rationale for imposing that enhancement, which would therefore lead me to
vacate the Defendant’s sentence and remand for resentencing.
The majority correctly cites the controlling test for whether the vulnerable victim
enhancement applies, although the majority’s paraphrasing of the law misses a key aspect
of the inquiry. This Court has said that applying the vulnerable victim enhancement
requires satisfying a two-part test. See United States v. Llamas, 599 F.3d 381, 388 (4th
Cir. 2010) [“Llamas I”]. “First, a sentencing court must determine that a victim was
unusually vulnerable. Second, the court must then assess whether the defendant knew or
should have known of such unusual vulnerability.” Id. (internal citation omitted). This
discussion makes clear that the district court must identify at least one specific victim who
serves as a basis for applying the enhancement—not that the record must merely reflect
such possible applicability—and then also find that the defendant knew or should have
known of that victim’s unusual vulnerability. The next sentence in Llamas I makes this
requirement all the more clear: “In other words, applying the vulnerable victim adjustment
‘requires a fact-based explanation of why advanced age or some other characteristic made
one or more victims unusually vulnerable to the offense conduct, and why the defendant
knew or should have known of this unusual vulnerability.’” Id. (quoting United States v.
14
Vega-Iturrino, 565 F.3d 430, 434 (8th Cir. 2009) (discussing importance of “evidentiary
support” particularized to the specific victim or victims, such as a victim who “had received
only an eighth grade education [and] had no experience or understanding of investments
outside of connection with the defendant”)).
Additionally, as the majority opinion correctly recognizes, when a district court
applies a sentencing enhancement—like the vulnerable victim enhancement—the “district
court must provide a ‘sufficient explanation of its rationale’ to enable review.” Ante at 9
(quoting United States v. Wilkinson, 590 F.3d 259, 269 (4th Cir. 2010)). And a district
court “must ‘place on the record an individualized assessment based on the particular facts
of the case before it.’” Id. (quoting United States v. Carter, 564 F.3d 325, 330 (4th Cir.
2009) (emphasis added) (internal quotation marks omitted)). In light of this standard, the
majority opinion acknowledges that the district court’s explanation for applying the
vulnerable victim enhancement in this case was “terse.” Id. at 9. Nonetheless, the majority
opinion finds the district court’s rationale “sufficient” to pass muster. Id. I disagree.
To begin, I want to emphasize just how “terse” the district court’s rationale for
imposing the enhancement was. The district court’s entire explanation for imposing the
enhancement reads as follows:
I will overrule that objection based on responses from the government,
consistent with my other rulings in other Bonner call center cases that there
were vulnerable victim enhancements were [sic] appropriate in the nature of
how this fraud activity worked
15
J.A. 71. Parsing out this rationale makes clear that it is not sufficiently “tailored to the
particular case at hand . . . to permit ‘meaningful appellate review.’” Carter, 564 F.3d at
330 (quoting Gall v. United States, 552 U.S. 38, 50 (2007)).
I start with the latter portion of the district court’s rationale: that the decision to
apply the enhancement was “consistent with my other rulings in other Bonner call center
cases that . . . vulnerable victim enhancements were appropriate in the nature of how this
fraud activity worked.” J.A. 71. Here, the district court alludes to Defendant’s co-
defendants, Jeffrey Bonner (who ran the call center) and another individual who worked
there, as well as other defendants in related cases. But the government did not have
transcripts prepared of the sentencings for Defendant’s co-defendants, nor has the
government provided us with transcripts from any of the related cases. The district court’s
explanations in those cases are thus not before this Court. Consequently, although the
district court knew what reasoning was provided for sentencing Defendant’s co-
defendants—reasons that may have included significant factual findings—that information
has not been conveyed to this Court in the record presented to us. Accordingly, the district
court’s reference to the other cases is a quintessential example of when a record does not
allow for “meaningful appellate review.” Carter, 564 F.3d at 330. From the documents
provided, this Court simply has no way of knowing what rationale the district court may
have used in those other cases.
The closest the district court comes to explaining its rationale in the previous cases
was to say that the enhancement was appropriate, given “the nature of how this fraud
activity worked.” J.A. 71. This statement, albeit vague, corresponds with the other basis
16
listed by the district court for its holding—the “responses from the government.” Id. The
government laid out its position on the enhancement in two places: the “United States’
Response to Defendant’s Objections to the Draft Presentence Investigation Report” and the
Final Presentence Report. J.A. 379–81, 453–454. ∗ At the sentencing hearing, no party
offered substantive argument on the issue, instead relying on their written submissions.
J.A. 71. So, when the district court refers to the “responses from the government,” it
presumably is referring to these written filings, both of which, like the district court’s
comment about the “nature” of the fraud, relied on a generalized argument about the
structure of the sweepstakes scheme. Id.
To give greater detail, in these filings, the government argued that Defendant
“would seek out individuals gullible enough to believe her false promises and send money
overseas, and then repeatedly victimize those same individuals until they had nothing left
to send.” J.A. 379–80. The government then argued that, “[i]t is well established that the
practice of reloading victims evinces an offense reliant on unusually vulnerable victims.”
J.A. 380. To support that proposition, the government listed one case from the Fourth
Circuit, two from the Ninth Circuit, and one case from the Seventh Circuit. See id. These
cases do not bear the weight claimed, however.
∗
The latter version filed with the Final Presentence Report quoted almost entirely
from the earlier response and is not different from the prior version in any material way.
Thus, for the sake of consistency, this opinion will quote from the first version, since that
is the version quoted by the majority opinion.
17
The sole Fourth Circuit case cited by the government for that proposition deserves
some introduction. The government cited United States v. Llamas, 473 Fed. App’x. 176
(4th Cir. 2012) [“Llamas II”], an unpublished opinion rendered by a panel of this Court
after Llamas I vacated the defendant’s sentence on grounds that the district court failed to
adequately support the application of the vulnerable victim enhancement. The facts of the
Llamas cases are strikingly similar to those here. The defendant in Llamas was part of a
sweepstakes scheme based out of Costa Rica that operated in a manner almost
indistinguishable from the call center in this case. Llamas I, 599 F.3d at 383–85. At
sentencing, the district court identified two specific victims that it viewed as unusually
vulnerable: one had Alzheimer’s disease; the other “had been expecting a call from a doctor
regarding her daughter’s health,” which put her in a vulnerable, high-stress state of mind.
Id. at 386. Critically, however, the district court did not make any findings about how the
defendant knew or should have known about those vulnerabilities. Id. at 389. And for that
reason, this Court found that the district court did not provide adequate reasons for applying
the enhancement and vacated the defendant’s sentence. Id.
Thus, the district court in Llamas I actually gave more reasons than the district court
did in this case—and this Court nonetheless vacated the defendant’s sentence. The district
court in Llamas I identified specific victims and gave a detailed explanation as to why those
victims were vulnerable. Those vulnerabilities were individualized to specific victims, not
just blanket assertions premised on how the general structure of the fraudulent scheme
targeted gullible people. In fact, had record evidence of a reloading scheme been sufficient,
by itself, to apply the enhancement—as the majority opinion appears to conclude—the
18
Llamas I Court would have upheld the application of the vulnerable victim enhancement,
because the scheme in that case relied on a reloading system almost identical to the one
here. See id. at 384. Instead, this Court vacated the sentence because the district court’s
findings were insufficient. See id. at 389.
Here, in contrast with Llamas I, the district court did not identify any specific
victims as unusually vulnerable or make any findings as to why Defendant had knowledge
of that vulnerability. The district court merely referenced the government’s written
submissions, which themselves relied on a vague theory that reloading schemes target
gullible people. I do not discount the possibility that an individual could be so gullible to
qualify as unusually vulnerable. But, at the very minimum, the Guidelines require the
district court to identify the specific victims it found to be so vulnerable that they would
serve as a basis for applying the enhancement. As the case stands, however, nothing in the
record indicates which victims the government or the district court believed supported
application of the enhancement. We simply know that some individuals (although who
specifically, we do not know) gave money more than once to the scheme, which, according
to the government, makes them unusually vulnerable (despite not knowing any more details
about why these victims contributed to the scheme multiple times or any other information
supporting this alleged vulnerability).
The approach to the enhancement I am describing also best accords with the
enhancement’s application note. That commentary states: “The adjustment would apply,
for example, in a fraud case in which the defendant marketed an ineffective cancer cure or
in a robbery in which the defendant selected a handicapped victim. But it would not apply
19
in a case in which the defendant sold fraudulent securities by mail to the general public and
one of the victims happened to be senile.” U.S.S.G. § 3A1.1 cmt. n.2. The case at issue
here is analogous to the situation described in the second part of the application note—at
least as the case is currently described by the government and the district court.
Defendant’s co-conspirators called members of the general public and sought money.
Presumably, many would decline, while some would provide the requested money. As the
application note example contemplated, however, some of the people called would be
gullible enough to fall for the scheme. But, at least upon initial phone contact, the co-
conspirators had no way of differentiating the gullible from the savvy. Once someone gave
to the scheme, however, then the co-conspirators would come back to that person over and
over again. Returning to previous victims potentially could cross the line to exploiting a
vulnerable victim, but the key problem is that we do not know who those specific
vulnerable victims were in this case. The record does not explain which victims were
targeted multiple times, what actions the conspiracy took toward those specific individuals,
and whether or how Defendant knew or should have known about those particular victims’
vulnerabilities.
The majority opinion claims the victim impact statements demonstrate that there
were unusually vulnerable victims, but the statements do not provide that level of detail.
For example, the statements do not ask questions that would indicate who was reloaded,
which, according to the government, is the key indicator of vulnerability. The other
documents in the record are similarly vague on this point. For example, the government
provided the district court with various charts detailing the total amounts of money taken
20
from each victim, but these documents do not also reveal who was reloaded, because they
do not show discrete transactions. An appellate court reviewing this record is left to guess
who was reloaded based upon the total money an individual lost to the scheme.
Furthermore, even if this Court could discern who specifically was reloaded from these
documents, we have no additional details explaining what may have motivated an
individual to contribute to the scheme more than once and how Defendant would have
known of that person’s alleged vulnerability. Without directing us toward specific
information about particular victims, the district court’s findings do not satisfy the standard
established by this Court in Llamas I. See 599 F.3d at 387–89.
That backdrop—the binding precedent of Llamas I and its impact on this case—sets
the stage for the government’s filings below, in which it cited the unpublished opinion in
Llamas II to support the allegedly “well established” principle of applying the vulnerable
victim enhancement to reloading schemes. J.A. 380. Llamas II was issued after the district
court resentenced the defendant and again applied the vulnerable victim enhancement. 473
Fed. App’x at 177–78 & n.1. Significantly, the defense did not challenge the application
of the enhancement in the second appeal; it only challenged the district court’s
consideration of the sentencing factors found in 18 U.S.C. § 3553(a) for procedural and
substantive reasonableness. See id. at 179. In fact, this Court specifically said, “[b]ecause
Llamas does not challenge his Guidelines calculation, we do not need to address that stage
of the resentencing.” Id. at 178 n.2. Nonetheless, in its filings below, the government
described this case as “affirming [a] sentence incorporating [the] vulnerable victim
adjustment against a similarly situated Costa Rican telemarketing fraud defendant.” J.A.
21
380. Although technically true, the government’s characterization omits the crucial fact
that the panel in Llamas II expressly declined to opine on the appropriateness of the
enhancement’s application, because that issue was not appealed. Thus, even if it were
binding precedent, Llamas II does not carry the weight the government tries to place on it.
The Fourth Circuit has not previously applied the vulnerable victim enhancement in the
way the majority opinion appears to do here. To the contrary, the binding case on this
issue—Llamas I—undercuts the government’s argument by requiring detailed findings
from the district court. A panel of this Court has since reiterated that holding. See United
States v. Johnson, 480 Fed. App’x. 186, 189 (4th Cir. 2012) (quoting Llamas I for the
proposition that “our precedent stresses the importance of an adequate explanation” for
applying the vulnerable victim enhancement and then finding application of the
enhancement procedurally unreasonable because the district court “failed to make explicit
findings on the record as to the victims, their unusual vulnerability, and [the defendant’s]
knowledge of such vulnerability”). Yet the government appears to take great pains to avoid
citing a published case that diminishes its argument, instead relying on a misleading
characterization of a subsequent unpublished opinion to make its point.
The government’s filings below also relied on three other cases: one from the
Seventh Circuit and two from the Ninth Circuit. The Seventh Circuit case, like Llamas,
does not help the government’s argument. See United States v. Jackson, 95 F.3d 500 (7th
Cir. 1996). The Seventh Circuit in Jackson upheld the application of the vulnerable victim
enhancement in a case factually similar to the one here. See id. at 502–04, 506–08. Unlike
in this case, however, the district court in Jackson identified at least one particular victim
22
as vulnerable, detailed the conspiracy’s actions to take advantage of that person, and
explained why the defendant should have known about that particular victim’s
vulnerability. See id. at 507–08. Thus, the court in Jackson made the critical factual
findings absent in this case.
Contrary to the majority opinion’s characterization of Jackson, the vulnerability of
specific victims played a key role in the outcome of that case. The Seventh Circuit
articulated the enhancement’s requirements as being that “the district court must find both
1) that a victim of the defendant’s crime was unusually vulnerable in some way, and 2) that
the defendant targeted that victim because of this vulnerability.” 95 F.3d at 507 (emphases
added). The court’s subsequent explanation follows that standard. For example,
throughout the opinion, the court discusses J.Z., one of the scheme’s victims. See id. at
504, 507–08. The opinion details how J.Z. was defrauded into contributing to the scheme
four times and the amounts he contributed on each occasion. See id. at 504. Thus, although
the Seventh Circuit may have appeared to speak in general terms—which the majority is
quick to emphasize—the court’s analysis was firmly grounded in the specifics of a
particular victim’s case. See, e.g., id. at 508 (“[T]he district court clearly determined that
[the victims’] readiness to fall for the telemarketing rip-off, not once but twice (and in J.Z.’s
case, four times), demonstrated that their personalities made them vulnerable in a way and
to a degree not typical of the general population.”); id. (“[T]he systematic re-victimizing
of people like J.Z. amply demonstrate[s] that the defendants believed the reloaded persons
to be especially vulnerable.”).
23
Only the Ninth Circuit cases cited by the government may support its argument,
because it is unclear from the appellate opinions whether the district court made findings
about particular victims. See United States v. Durant, 89 Fed. App’x 56, 58 (9th Cir. 2004);
United States v. Randall, 162 F.3d 557, 560–61 (9th Cir. 1998). Yet the import of that
precedent is unclear, because, for example, a more recent Ninth Circuit opinion goes into
significant detail about the specific findings made about particular victims and why the
defendant in a reloading scheme knew about the vulnerabilities of those victims. See
United States v. Lloyd, 807 F.3d 1128, 1172–73 (9th Cir. 2015).
To the extent that my position splits with that of the Ninth Circuit in Durant and
Randall, I believe the Ninth Circuit’s approach, as described in the cases cited by the
government below, are at odds with this Circuit’s binding precedent in Llamas I. The
majority opinion also cites cases from other circuits to support the proposition that
“evidence of reloading may support the enhancement.” Ante at 6–7 (collecting cases). The
cases cited do support the proposition that a reloading scheme may support applying the
vulnerable victim enhancement—a conclusion with which I agree. My dispute with the
majority opinion stems from whether a reloading scheme is sufficient to warrant applying
the enhancement. The majority appears to argue that it is, thereby creating a broad rule
that would apply the enhancement to any case where a victim falls prey to a similar scheme
more than once—without any limiting principle in sight. In contrast, I argue that a district
court must make adequate factual findings about at least one specific victim to justify
applying the enhancement. The cases cited by the majority, like the Ninth Circuit opinions
in Durant and Randall, leave unclear the extent to which the relevant district courts may
24
have made specific findings about particular victims. See United States v. Hoffecker, 530
F.3d 137, 201–02 (3d Cir. 2008); United States v. Day, 405 F.3d 1293, 1295–96 (11th Cir.
2005); United States v. Coe, 220 F.3d 573, 582 (7th Cir. 2000); United States v. Brawner,
173 F.3d 966, 972–73 (6th Cir. 1999); United States v. O’Neil, 118 F.3d 65, 75–76 (2d Cir.
1997). Thus, as the majority opinion notes, these cases stand merely for the proposition
that a reloading scheme can support applying the enhancement; they do not address the key
distinction between my view and that of the majority. That said, to the extent any of those
cases indeed uphold application of the enhancement absent particularized findings about
specific victims, I believe that approach conflicts with this Circuit’s binding precedent, as
articulated in Llamas I.
Furthermore, the approach taken by the Ninth Circuit in Durant and Randall
diverges from that of several other circuits. The Second Circuit, for example, has spoken
particularly well on the matter in United States v. Dupre, 462 F.3d 131 (2d Cir. 2006). In
that case, co-conspirators targeted evangelical Christians by using Christian imagery and
rhetoric to ask them to provide money again and again to a fraudulent investment scheme.
See id. at 134–36, 144–45. Although such “[s]chemes . . . inevitably attract the gullible,”
the Second Circuit rejected applying the vulnerable victim enhancement in the case solely
based on such a generalized argument. Id. at 145. The court specifically said that “a
criminal successfully asking a fraud victim for additional money does not itself
demonstrate that the victim is especially vulnerable.” Id. at 146. The court further
elaborated:
25
We have no reason to believe that evangelical Christians as a class are
‘unusually susceptible’ to fraud. The application notes reiterate that the
vulnerable victims enhancement is improper except in cases where
defendants ‘should have known’ of their victims’ unusual vulnerability, such
as ‘in a fraud case in which the defendant marketed an ineffective cancer
cure’ . . . . Absent findings by the District Court that any specific victim was
especially gullible because of his religion, we cannot conclude that
evangelical Christian victims were susceptible to fraudulent schemes
involving religious imagery in a manner analogous to how desperate cancer
patients might be susceptible to con artists selling placebos.
Id. at 145 (emphasis added) (internal footnote omitted) (quoting U.S.S.G. § 3A1.1 cmt. 2).
This case presents the same situation. “Absent findings by the District Court that any
specific victim was especially gullible,” we cannot meaningfully review this record and
find that the enhancement was appropriately applied. Id. (emphasis added).
My good colleagues in the majority fail to grasp the basis of my reliance on Llamas
I and Dupre. Indeed, I do not dispute that evidence of a reloading scheme can support
application of the vulnerable victim enhancement, nor do I argue that Llamas I and Dupre
bar reliance on such a scheme as a basis for applying the enhancement. Rather, I rely on
Llamas I and Dupre for the proposition that a court may not apply the vulnerable victim
enhancement unless the government introduces victim-specific, as opposed to generalized,
evidence. Notably, like Llamas I and Dupre, several other circuit opinions have vacated
sentences applying the vulnerable victim enhancement when a district court failed to make
factual findings regarding specific victims. See, e.g., United States v. Angeles-Mendoza,
407 F.3d 742, 747–48 (5th Cir. 2005) (vacating application of the enhancement when the
district court’s “scant, generalized findings” mentioned only “general characteristics
commonly held” by the victims and “inherent” in the class of victims targeted); United
26
States v. Anderson, 349 F.3d 568, 573 (8th Cir. 2003) (vacating application of the
enhancement when the “general, not thorough” explanation provided below gave “no
detailed analysis of why th[e] evidence established that [the defendant] knew or should
have known that any victim was unusually vulnerable”).
Accordingly, our binding precedent in Llamas I required the district court to identify
at least one specific victim who served as the basis for applying the vulnerable victim
enhancement and to explain why the defendant knew or should have known of that
particular victim’s unusual vulnerability. The district court did not do so in this case.
Therefore, I would vacate the Defendant’s sentence and remand her case for resentencing.
Because the majority opinion reaches a different conclusion, I respectfully dissent.
27