United States v. McCormick

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA UNITED STATES OF AMERICA v. Crim. No. 18-0359 (JDB) THOMAS KENNEDY MCCORMICK, Defendant. MEMORANDUM OPINION Before the Court are three pretrial motions filed by defendant Thomas Kennedy McCormick: (1) a motion to dismiss for preindictment delay; (2) a motion to suppress certain of his statements; and (3) a motion to dismiss counts 3–7 of the indictment. For the reasons that follow, the Court will deny each of the three motions. 1 Background Darkode was an invitation-only online forum that operated from approximately 2008 to December 2013. Tr. at 34; Indict. [ECF No. 8] ¶¶ 1, 29. 2 Darkode’s primary purpose was to facilitate the creation, exchange, and sale of computer malware and exploit kits. Tr. at 34. Darkode members used the forum to post and discuss completed malware, solicit advice and recommendations as to unfinished malware, and coordinate sales of malware to non-members. Id. McCormick, under the online moniker “Fubar,” began using Darkode in, at the latest, 2009, while he was a high-school student in Cambridge, MA. Id. at 65–66, 84, 89. Sometime in 2013, McCormick became an “administrator” of Darkode. Id. at 190–94; Indict. ¶ 84. 1 McCormick has also filed a motion to compel discovery. See Mot. to Compel Discovery [ECF No. 34]. The Court will continue to monitor discovery proceedings but does not think it necessary to rule on the motion at this time. The parties are directed to submit a joint status update as to any remaining discovery issues by not later than December 6, 2019. 2 All citations to “Tr.” refer to the official transcript from the evidentiary hearing held on October 25, 2019. See Transcript of Proceedings [ECF No. 86]. 1 The Federal Bureau of Investigation launched a criminal investigation into Darkode in 2008. Tr. at 35. As part of that investigation, in early 2010, an undercover FBI agent used Darkode to purchase malware named “Zeus” from Fubar. Id. at 38, 40. The Zeus malware was a “banking trojan” designed to steal banking credentials from unsuspecting victims. Id. at 75. At the time of the undercover purchase, the FBI did not know that Fubar was defendant McCormick. Id. at 38. Soon after the purchase, FBI agents began investigating the real-world identity of Fubar. Id. They eventually identified Fubar as McCormick in January 2011, and continued to look into his activities thereafter to develop a “fuller picture of the activities that [he was] engaged in.” Id. at 38–41, 55. On December 5, 2013, at about 6:15 a.m., FBI agents executed a search warrant on McCormick’s dorm room at the University of Massachusetts, Amherst, where he was then a student. Id. at 52, 90. The agents were not authorized to arrest McCormick. Id. at 61. The warrant authorized seizure of “any digital electronic device, to include memory storage and physical computers, and potentially financial documentation associated with proceeds of the crime.” Id. at 52. According to the government, several digital devices were found in McCormick’s room, including a USB drive containing over 30,000 credit and debit card numbers associated with over 1,600 separate financial institutions. Indict. ¶ 85. Subsequent investigation of the compromised accounts revealed that the financial institutions had reported at least $678,993 in fraudulent activity relating to those accounts. Id. ¶ 35. Agents executing the search warrant also sought to interview McCormick. After giving McCormick a chance to compose himself and get dressed following the agents’ entry into his dorm room, Special Agent David Hitchcock asked him if he would be “interested” in speaking with the agents in their unmarked FBI car parked outside the dorm. Tr. at 61. Hitchcock stressed that 2 McCormick “wasn’t under arrest,” that the interview was “completely voluntary,” and that “he could leave at any point in time.” Id. at 61–62. McCormick agreed to speak to Hitchcock and the other agents. Id. On the way to the FBI car, McCormick was allowed to use the restroom under the supervision of one of the agents. Id. at 63, 92–93. Once they arrived at the car, Hitchcock sat in the driver’s seat, McCormick sat in the passenger seat, and another agent sat behind McCormick in the rear right seat. Id. at 63. The car was a traditional civilian sedan, with no identifying law- enforcement marks or plastic barrier between the front and rear seats. Id. at 63–64. When McCormick and the agents were situated in the car, the interview commenced. Id. at 64–65. The agents did not read McCormick any Miranda warnings. Id. at 61. During the interview, McCormick explained his involvement with Darkode, going into some detail about his own activity as well as that of other Darkode members. Id. at 65, 73. McCormick also told the agents that he “wanted to cooperate” and “help out,” but was concerned about “screw[ing] himself.” Id. at 71, 73–74. At one point, McCormick asked the agents if he should get an attorney. Id. at 77. Hitchcock responded that McCormick needed to make that decision for himself, emphasizing then and again several other times throughout the interview that McCormick was “free to stop talking” and could leave at any time. Id. at 71, 77, 99. McCormick acknowledged that he understood but remained in the car and continued talking to the agents. Id. at 77. The interview concluded after approximately three hours, when McCormick stated that he would “really like to get back to preparing for [his] exams.” Id. at 80. At no point in the interview did the agents handcuff McCormick or restrict his movement, and when he said that he wanted to leave, he was allowed to do so. Id. at 78, 80–81. Several months later, with the assistance of an attorney, McCormick began participating in a series of voluntary debriefings with law enforcement that extended from 2013 to 2018. Id. at 3 175. Though a plea agreement was discussed at these meetings, a plea was never successfully negotiated. Id. at 197. On December 4, 2018—following the collapse of the plea negotiations— the government indicted McCormick and charged him with seven counts: one count of conspiracy to participate in a racketeering influenced corrupt organization in violation of 18 U.S.C. § 1962(d), one count of conspiracy to commit bank fraud and wire fraud in violation of 18 U.S.C. § 1349, and five counts of aggravated identity theft in violation of 18 U.S.C. § 1028A. See Indict. Three others were indicted along with McCormick, id., but to date are not in this country. These three pre-trial motions followed. The Court held a hearing on the motions on October 25, 2019. Analysis I. Motion to Dismiss for Preindictment Delay McCormick first moves to dismiss for preindictment delay. He argues that the government should have prosecuted him more quickly, and that its failure to do so prejudiced him by (1) depriving him of the protections of the Juvenile Delinquency Act (“JDA”), 18 U.S.C. § 5031, and (2) making it difficult for him to retrieve evidence as to the events of 2009 through 2013. Mot. to Dismiss for Preindict. Delay [ECF No. 36] at 6–8. McCormick also argues that any delay in prosecution was an intentional attempt to gain a tactical advantage. Id. at 8. Generally, the applicable “statute of limitations is the primary measuring stick to gauge whether a criminal charge is unduly stale.” United States v. Bridgeman, 523 F.2d 1099, 1112 (D.C. Cir. 1975). The Supreme Court has recognized, however, “that if preindictment delay is so substantial as to prejudice a defendant’s right to a fair trial, the Due Process Clause of the Fifth Amendment may necessitate dismissal.” United States v. Mahoney, 698 F. Supp. 344, 346 (D.D.C. 1988) (citing United States v. Marion, 404 U.S. 307, 324 (1971)). To prevail on such a claim, a 4 defendant must satisfy both parts of a two-part test. First, the delay must have “caused substantial prejudice to [the defendant’s] rights to a fair trial.” Marion, 404 U.S. at 324. Second, the delay must have been “an intentional device to gain tactical advantage over the accused.” Id. Neither of McCormick’s arguments as to prejudice are sufficient to satisfy the prejudice prong of this test. His first argument is that the government knew about some of his illegal conduct when he was under twenty-one, and that by waiting to indict him until after he was twenty-one, the government deprived him of the protections of the JDA. Mot. to Dismiss for Preindict. Delay at 5–6. Under the JDA, a juvenile court generally has jurisdiction over a defendant for acts of juvenile delinquency (that is, criminal conduct occurring before a defendant turns eighteen) until that defendant turns twenty-one. See 18 U.S.C. §§ 5031, 5032. McCormick turned eighteen on October 15, 2010, and twenty-one on October 15, 2013. Tr. at 121, 135–36. Thus, he would be entitled to the protections of the JDA only for prosecutions relating to offense conduct that occurred before October 15, 2010, and only then until he turned twenty-one in 2013. The only conduct charged in the original indictment that occurred before McCormick turned eighteen is his sale of Zeus malware to an undercover FBI agent. See Indict. ¶¶ 80–82. But the indictment alleges that this sale was merely an early act in what was a lengthy conspiracy that continued long after McCormick turned eighteen. Courts have unanimously concluded that prosecutors can charge a defendant with an adult conspiracy where he or she entered into the conspiracy as a juvenile but committed further overt acts as an adult. See, e.g., United States v. Delatorre, 157 F.3d 1205, 1209 (10th Cir. 1998) (“No circuit has applied the JDA to an adult conspiracy or racketeering prosecution simply because defendant’s participation in the crimes began prior to his eighteenth birthday.”). Courts have simply required that there be “some demonstration of post-eighteen participation in such crimes.” Id. Here, for each count of the 5 indictment, the government has alleged overt acts after McCormick turned eighteen on October 15, 2010, including at least one act for each subsequent year of the charged 2008–2013 bank fraud and RICO conspiracies. See, e.g., Indict. ¶ 78 (alleging that McCormick “advertised for sale on the Darkode Forum malware known as ngrBot” between February 13, 2011, and July 11, 2011); id. ¶ 83 (alleging that McCormick “intruded into a website called ziddu.com and discovered vulnerabilities which allowed [him] to steal 4.8 million user email addresses and passwords” in August 2012); id. ¶ 85 (alleging that McCormick possessed devices with stolen banking credentials on December 5, 2013). Therefore, because none of the counts of this indictment charge McCormick solely with pre-eighteen conduct, the JDA is inapplicable. 3 Moreover, the government has already agreed to strike the sale of the Zeus malware from the indictment. See Order of September 9, 2019 [ECF No. 71] at 1. As a result, the indictment, as it currently stands, does not even charge McCormick for his pre-eighteen involvement in the conspiracies, making it still clearer that he is not and was not entitled to the protections of the JDA. McCormick’s second argument is that the delay in prosecution resulted in unfair prejudice because his memories of the events in question have faded and he was not able to “secure and preserve” certain chat logs from the Darkode forum that may have been exculpatory. Mot. to Dismiss for Preindict. Delay at 7. The problem with this argument is that both the D.C. Circuit and the Supreme Court have unambiguously rejected allegations of prejudice resulting from “a general dimming of memories and loss of evidence.” Bridgeman, 523 F.2d at 1112; see Marion, 404 U.S. at 325–26 (noting that the possibility that “memories will dim, witnesses [will] become 3 Nor does United States v. Hoo, 825 F.2d 667 (2d Cir. 1987), a case that McCormick repeatedly cites, help him. The Hoo court explicitly stated that it “believe[s] that the due process clause does not require that decisions to prosecute be subjected to pre-indictment judicial inquiry simply because the timing of the decision affects the availability of juvenile procedures.” Id. at 671. The court also stated that “a rule . . . requiring in essence that prosecutors bring charges against twenty-year-olds as soon as they are able to do so [] would ‘pressure prosecutors into resolving doubtful cases in favor of early—and possibly unwarranted—prosecutions.’” Id. (quoting United States v. Lovasco, 431 U.S. 783, 793 (1977)). 6 inaccessible, and evidence [will] be lost” is not in itself “enough to demonstrate that [defendant] cannot receive a fair trial”). The “primary guarantee against . . . overly stale charges” is the applicable statute of limitations, not the Fifth Amendment, and McCormick concedes that the charges here were properly brought within the limitations period. See Mot. to Dismiss for Preindict. Delay at 2. Ultimately, McCormick offers nothing more than an argument that the delay “has unnecessarily increased the difficulty of mounting a defense in this case.” Mahoney, 698 F. Supp. at 346. Bridgeman and Marion preclude that argument. Because both of McCormick’s contentions of prejudice fail to satisfy the first Marion prong, the Court has no need to address whether any delay here was an “intentional device to gain tactical advantage” under the second Marion prong. Marion, 404 U.S. at 324. The Court therefore will deny McCormick’s motion to dismiss for preindictment delay. II. Motion to Suppress McCormick next moves to suppress all the statements he made during his interview with FBI agents on December 5, 2013. Mot. to Suppress [ECF No. 35] at 1. In his view, this interview was a custodial interrogation, and because he was never given Miranda warnings, any statements he made are inadmissible under the Fifth Amendment. Id. at 2–3. In order to use statements obtained during a “custodial interrogation” of a defendant, the government must first give the defendant Miranda warnings. See United States v. Burden, 934 F.3d 675, 693 (D.C. Cir. 2019). It is undisputed that McCormick was not given Miranda warnings before the statements at issue here were made. Tr. at 61. Accordingly, the question before the Court is whether McCormick’s statements were given during a custodial interrogation. A defendant is “in custody” for purposes of Miranda when a reasonable person in the defendant’s position would have “felt he or she was not at liberty to terminate the interrogation 7 and leave.” Thompson v. Keohane, 516 U.S. 99, 112 (1995). The inquiry as to whether a defendant was in custody is an objective one that must take into account all of the circumstances of the interrogation. See Burden, 934 F.3d at 694. “Relevant factors include the location of the questioning, its duration, statements made during the interview, the presence or absence of physical restraints during the questioning, and the release of the interviewee at the end of the questioning.” Howes v. Fields, 565 U.S. 499, 509 (2012) (internal citations omitted). Here, a reasonable person in McCormick’s position would have understood that he was not subject to “a formal arrest or restraint on freedom of movement of the degree associated with a formal arrest,” Stansbury v. California, 511 U.S. 318, 322 (1994) (internal quotation marks omitted), and would have felt free to terminate the interview and leave. A number of facts support this conclusion. First, when FBI agents began talking to McCormick on the morning of December 5, 2013, they informed him that they were there to execute a search warrant, that they did not have an arrest warrant, that an interview was not part of the search warrant, that speaking to the agents was voluntary, and that he was free to leave at any time. Tr. at 61–62. McCormick stated that he understood. Id. Over the course of the interview, the agents repeatedly reminded McCormick that the interview was voluntary and that he was free to leave. Id. at 71, 79. Each time, McCormick indicated that he understood that he was not under arrest, and that he wanted to cooperate with the agents, so long as he didn’t “screw” himself. Id. at 71, 74, 79. McCormick thus had several opportunities, from the very beginning of his encounter with the FBI agents, to simply decline to be interviewed. Cf. United States v. Robinson, 256 F. Supp. 3d 15, 25 (D.D.C. 2017) (finding no “custodial interrogation” based, in part, on the fact that the defendant could have declined to be interviewed). 8 Second, McCormick was not handcuffed or restrained at any point in the interview, nor was he deprived of food or water or of the ability to use the restroom. Tr. at 63, 72, 78, 81. Third, while the interview did take place in an unmarked FBI car, the car was parked in a familiar location (McCormick’s campus), and given the cold weather in Massachusetts in December, it is not surprising that the interview was conducted in the heated car rather than outside. Id. at 61, 90, 94; cf. United States v. Ford, 401 F. App’x 852, 855–56 (4th Cir. 2010) (concluding that interview in police vehicle had not been “custodial interrogation” because, in part, conditions outside of the vehicle were not ideal for conducting interview). McCormick cites two cases in an attempt to demonstrate that interviews in police cars are per se custodial interrogations. See Figg v. Shroeder, 312 F.3d 625, 632 (4th Cir. 2002); United States v. Richardson, 949 F.2d 851, 856 (6th Cir. 1991). But even setting aside the fact that those cases addressed whether a defendant has been seized under the Fourth Amendment, rather than whether he or she has been subjected to a custodial interrogation (as is the relevant question here), in those cases officers told the defendants that they were not free to leave; here, the agents repeatedly told McCormick that he was free to leave. Cf. United States v. Dates, 752 F. App’x 570, 577–78 (10th Cir. 2018) (concluding that a reasonable person, “after having entered a [police] vehicle of his own free will to talk to federal agents, would understand that he was similarly free to terminate the conversation and go about his day”). Fourth, during the interview, McCormick informed the agents that he had an exam that afternoon that he needed to prepare for. Tr. at 80. The agents kept McCormick apprised of the time throughout the interview, and when McCormick stated that he needed to leave to study, the agents allowed him to leave. Id. McCormick thus did in fact feel free to “terminate the interrogation and leave,” Thompson, 516 U.S. at 112, since he did just that. 9 For these reasons, the interview on December 5, 2013, was not a “custodial interrogation.” Hence, the government’s failure to give McCormick Miranda warnings is not a basis to suppress his statements. The Court will deny his motion to suppress. III. Motion to Dismiss Counts 3–7 Finally, McCormick moves to dismiss counts 3–7 of the indictment, which are five separate counts of aggravated identity theft under 18 U.S.C. § 1028A. These counts are based on McCormick’s December 5, 2013 possession of expired credit-card numbers and associated identification information of five District of Columbia residents. Indict. ¶¶ 93–94. McCormick asserts that the relevant statutory scheme includes a requirement that credit-card numbers be “usable,” and that because the cards here were expired, the government cannot satisfy this requirement. Mot. to Dismiss Counts 3–7 [ECF No. 69] at 3. The aggravated identity theft statute provides that “[w]hoever, during and in relation to any felony violation enumerated in subsection (c),[4] knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person shall, in addition to the punishment provided for such felony, be sentenced to a term of imprisonment of 2 years.” 18 U.S.C. § 1028A(a)(1). A “means of identification” is defined, as relevant here, as “any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual, including any . . . (D) telecommunication identifying information or access device.” Id. § 1028(d)(7). And an “access device” is defined as any card, plate, code, account number, electronic serial number, mobile identification number, personal identification number, or other telecommunications service, equipment, or instrument identifier, or other means of account access that can be used, alone or in conjunction with another access device, to obtain money, 4 McCormick does not dispute that the RICO and bank fraud conspiracies charged in counts 1 and 2 of his indictment fall under subsection (c). 10 goods, services, or any other thing of value, or that can be used to initiate a transfer of funds (other than a transfer originated solely by paper instrument). Id. § 1029(e)(1). Also relevant is the statute’s definition of a limited subset of access devices, “unauthorized access devices,” which includes “any access device that is lost, stolen, expired, revoked, canceled, or obtained with intent to defraud.” Id. § 1029(e)(3). The government argues that the credit-card numbers forming the basis of McCormick’s five counts of aggravated identity theft are “access devices.” Gov’t’s Opp. to Def.’s Mot. to Dismiss Counts 3–7 at 4. In response, McCormick homes in on the statutory language that an access device is something “that can be used . . . to obtain money, goods, services, or any other thing of value.” Id. § 1029(e)(1) (emphasis added). He contends that, because the credit-card numbers all expired between 2008 and 2012, they could not be “used” as of December 5, 2013, when the FBI discovered the numbers in McCormick’s possession. Mot. to Dismiss Counts 3–7 at 2–3. Four circuits have addressed the question whether access devices must be usable. The Ninth Circuit, in United States v. Onyesoh, 674 F.3d 1157 (9th Cir. 2012), held that access devices, and the smaller subset of unauthorized access devices, “must be usable,” id. at 1159. In accordance with this ruling, the court determined that in the context of expired credit cards, the government must “prove the usability of the expired credit card numbers by a preponderance of the evidence,” for instance by presenting “expert testimony to establish usability” or evidence that a defendant “was prepared to use the numbers in combination with another device.” Id. at 1159–60. The Onyesoh court concluded that the government had not adequately presented such evidence and remanded to the district court to allow it “to hear evidence of usability.” Id. at 1160. Upon remand, the government presented evidence that expired credit cards are usable, and the district court found 11 that this evidence established by a preponderance that the numbers were in fact “usable.” 5 United States v. Onyesoh, 549 F. App’x 700, 701 (9th Cir. 2013). The Ninth Circuit affirmed this finding. Id. at 702. Three other circuits, however, have rejected Onyesoh’s conclusion that access devices must be usable. In United States v. Carver, 916 F.3d 398 (4th Cir. 2019), the Fourth Circuit “decline[d] to adopt Onyesoh’s usability standard,” id. at 402. The court based its conclusion on the fact that unauthorized access devices, which include “expired, revoked, [or] canceled” cards, are a subset of access devices, and so are also subject to the usability standard. Id. at 402–03. But the court thought it obvious that such cards “cannot be used to obtain money,” and therefore the Onyesoh usability standard was inconsistent with the full statutory scheme. See id. In the Fourth Circuit’s view, a better reading was that the “general words ‘can be used’ signify a [congressional] intent to expand the reach of the definition.” Id. at 403. As support for this “perfectly natural” reading, the court used the following analogy: A salesperson describing the features of a universal remote control might say, “This can be used on any model of television we sell.” No one would think the salesperson is representing that the remote control would be currently functional— it might need batteries, reprogramming, or various other adjustments before it would work. The promise is that it is the kind of thing that, under plausible circumstances, could change channels, adjust volume, and so forth on televisions. The same is true of a fraudulently altered card. Even if it could not complete a transaction now, it is the type of thing that could do so, and was altered for precisely that purpose. 5 The government’s evidence consisted of expert testimony that: • Credit card account numbers do not change when they expire; rather, a new card is issued with the same account number and a new expiration date. • An expired credit card account number, in conjunction with the true account holder’s name, address, and other personal identifiers, allows a person to obtain a duplicate card to make Internet purchases, enter ATM transactions, and obtain cash advances. • Identity thieves typically collect identity theft victim profiles, stolen mail, checks, SIM cards, and credit reports for use in applying for new credit cards, all of which were found during a search of defendant’s home. Id. at 701. 12 Id. As a result, the court determined that prosecutors need not prove “an extra element of current functionality,” but instead must show “only that [each device] was in principle the sort of thing that people use to obtain money (like a credit card or bank number).” Id. The Sixth and Seventh Circuits have adopted similar readings of the “can be used” language. See United States v. Popovski, 872 F.3d 552, 553 (7th Cir. 2017) (concluding that § 1029(e)(1) “defines an ‘access device’ according to its nature—the sort of thing that could in principle be used to get goods or funds, whether or not it would work in practice”); United States v. Moon, 808 F.3d 1085, 1091 (6th Cir. 2015) (“We . . . reject [defendant’s] argument for a ‘usability’ requirement.”). This Court concludes that the Fourth, Sixth, and Seventh Circuits have the better of the argument. The Ninth Circuit’s usability requirement cannot be squared with the fact that “lost, stolen, expired, revoked, [or] canceled” cards are also access devices, yet are unlikely to be able to be “used” to obtain money. Hence, this Court concludes that there is no usability requirement as described in Onyesoh. Instead, as the Fourth Circuit concluded, the government must show “only that [each access device] was in principle the sort of thing that people use to obtain money.” Carver, 916 F.3d at 403. The basis for McCormick’s motion to dismiss counts 3–7, in essence, is that usability is an element of the statute that the government, as a matter of law, could not satisfy at trial with respect to expired credit credits. See Mot. to Dismiss Counts 3–7 at 1–2. Because the Court rejects that view of the statute, the motion will be denied. 6 6 The Court notes that even if it had adopted Onyesoh’s view of the statute, the pretrial dismissal of counts 3–7, as McCormick requests, would still be inappropriate. Onyesoh merely requires the government to present, at trial, evidence of usability. See Onyesoh, 674 F.3d at 1159–60. 13 Conclusion For the foregoing reasons, the Court will (1) deny McCormick’s motion to dismiss for preindictment delay; (2) deny McCormick’s motion to suppress; and (3) deny McCormick’s motion to dismiss counts 3–7. A separate order has been issued on this date. /s/ JOHN D. BATES United States District Judge Dated: November 25, 2019 14