NOT RECOMMENDED FOR PUBLICATION
File Name: 21a0259n.06
Case No. 20-6131
UNITED STATES COURT OF APPEALS
FOR THE SIXTH CIRCUIT
FILED
May 27, 2021
UNITED STATES OF AMERICA, ) DEBORAH S. HUNT, Clerk
)
Plaintiff-Appellee, ) ON APPEAL FROM THE
) UNITED STATES DISTRICT
v. ) COURT FOR THE EASTERN
) DISTRICT OF TENNESSEE
JAMES JACKSON, )
)
Defendant-Appellant. ) OPINION
)
BEFORE: NORRIS, KETHLEDGE, and NALBANDIAN, Circuit Judges
NALBANDIAN, Circuit Judge. The best that he could, James Jackson turned
the evidence of his crimes into a pile of ashes. But the evidence that remained was
enough to convince a jury that Jackson ran an elaborate scheme of impersonating
deceased victims and then stealing their identities and savings. On appeal, he argues
that the evidence was insufficient for the convictions. He also challenges his sentence
as unreasonable. We AFFIRM the verdicts and the sentence.
BACKGROUND
In late 2014 and early 2015, investigators caught on to an identity theft and
mail fraud scheme in Tennessee involving fraudulent charges on accounts of recently
No. 20-6131, United States v. Jackson
deceased persons.1 The eventual indictment focused on six victims: Robert and Kim
Howe, Thomas Fitzgibbon, Peggye McNair, Charles Fulks, and Michael Almeida.
Kim Howe died in February 2015, predeceased by her husband Robert. After
her death, someone claiming to be Robert called Fidelity Investments, had the Howe’s
account address changed to a vacant house on Cameron Ridge Trail in Cordova,
Tennessee, and liquidated $350,000 in stocks. After Peggye McNair died in January
2015, someone accessed her Amex account and had cards sent to the same vacant
Cameron Ridge address. They charged over $13,700 to her account. Eugenie Almeida
reported fraudulent charges on her deceased husband’s debit card to the police, who
discovered that a recently issued card in Michael Almeida’s name had been used for
cash withdrawals at several Tennessee locations. Security footage showed a man
later identified as Derrick Ford—a friend of James Jackson’s—using the card.2
Yvonne Fitzgibbon likewise reported the theft of her late husband Thomas’ identity.
Government agents intercepted mail addressed to Thomas headed to a vacant
address on Waterdance Drive in a Memphis suburb, nowhere near where Thomas
had lived. As the investigation continued, officers also flagged financial mail headed
1 We state the facts in the light most favorable to the government, in keeping
with the standard of review. United States v. Fisher, 648 F.3d 442, 450 (6th Cir. 2011).
2 Ford also visited a La Quinta Inn in Memphis with a fake ID and tried to
retrieve mail from Capital One addressed to Robert Matthews. He arrived in a white
Mercedes SUV driven by someone else who was not visible in the security footage.
The desk clerk rebuffed his attempt to retrieve the mail after his card was flagged,
and he left.
-2-
No. 20-6131, United States v. Jackson
to the vacant Waterdance and Cameron Ridge addresses for several more identity
theft victims in addition to Robert and Kim Howe and Peggye McNair.
Investigators zeroed in on the culprit when they put a hold on mail headed to
the vacant houses, which included a Capital One card for Charles Fulks en route to
Waterdance Drive. Less than a month after Fulks’ death, someone claiming to be him
called the post office to ask about the mail.3 Officers planned to arrest him when he
came to pick up the mail, but he later called back and asked the post office to deliver
it to the vacant Cameron Ridge house. So they moved the operation to Cameron
Ridge, delivered the mail, and waited. Around ten o’clock that night, a man in a
bathrobe emerged from Jackson’s house across the street, walked to the vacant
Cameron Ridge house’s mailbox, took the mail addressed to Fulks, and returned to
Jackson’s house.
Officers approached Jackson’s home and knocked on the door, but Jackson
didn’t answer. They knocked louder and announced themselves as police, but there
was no sign of Jackson. After almost an hour, two of the officers finally left to get a
search warrant. While they were gone, the remaining officers saw smoke begin to
billow from the house as an orange glow flickered inside. As smoke filled the house,
Jackson’s girlfriend—Michelle Jones—leaned out a second-floor window and told the
officers that she and her three children were inside and were having trouble
breathing. Jones wanted to leave the house through the front door, but Jackson told
3 At trial, Jones identified caller as Jackson.
-3-
No. 20-6131, United States v. Jackson
her not to. Officers dissuaded her from jumping out the window and persuaded her—
contrary to Jackson’s instructions—to open the front door and leave. The officers then
entered, brought Jackson out of the home, and gave him oxygen.
Inside the smoke-filled house, investigators found ashes in buckets, kitchen
pots, the fireplace, and the toilets. The unburned evidence included an ID and social
security card for someone named Michael Carter, a print-off of search results listing
websites for finding personal information, a book called “How to Find Anyone or
Anything: It’s A Lot Easier Than You Think,” and a legal pad with social security
numbers and other personal identifying information (“PII”) belonging to celebrities.
They also found a Forbes articled called “How to Ruin a Spouse’s Credit Legally and
Keep Them Broke for Dear Life,” a laminator, a partly burned document with part of
a social security number, three computers, two cheap burner phones, and a shredder
containing an envelope for Amanda Montgomery.4 Police never located a bathrobe.
Investigators also searched Jackson’s mother’s house, where they found Jackson’s
business cards. He branded himself as “The Father of Identity Theft” and an “Identity
Theft Expert.”
Officers ran forensic analysis on the computers from Jackson’s bedroom, which
revealed searches on Legacy.com (a source for obituaries), Intelius, BeenVerified,
PeopleFinder, Credit Karma, Ancestry.com, 411.com, and LinkedIn. Many victims
starred in Jackson’s search history, including Charles Fulks, the Almeidas, Thomas
4Jackson also had at the house a yellow corvette, a black Mercedes, and a
white Mercedes SUV resembling the one that dropped Ford off at the hotel.
-4-
No. 20-6131, United States v. Jackson
Fitzgibbon, the Howes, Peggye McNair, and many others. Although the computer
username logged for all these searches was “Michelle,” Jackson regularly used both
computers.
Along with the evidence above, the government showed at trial that many calls
involved in the identity theft scheme were made using numbers ending in -1609—the
number Jackson used to pose as Fulks in his calls to the post office—or -1935. The
government traced most of these calls to a cell tower directly behind Jackson’s home
on Cameron Ridge Trail, and Jackson’s girlfriend Michelle Jones identified him as
the caller in several of the fraudulent calls when she testified against him at trial.
Jackson was convicted of seven counts of mail fraud under 18 U.S.C. § 1341;
one count of aiding and abetting the use of unauthorized access devices under 18
U.S.C. §§ 2, 1029(a)(2); one count of possession of fifteen or more unauthorized access
devices under 18 U.S.C. § 1029(a)(3); one count of mail theft under 18 U.S.C. § 1708;
and three counts of aggravated identity theft under 18 U.S.C. § 1028A(a)(1).5
At sentencing, the district court applied several enhancements: fourteen levels
because the intended loss exceeded $550,000, §2B1.1(b)(1)(H), two levels because
there were more than ten victims involved, §2B1.1(b)(2)(A)(i), two levels because the
scheme involved sophisticated means, §2b1.1(b)(10)(C), two levels because the
scheme involved a conscious or reckless risk of death or serious bodily injury,
§2B1.1(b)(16)(A), two levels because Jackson was an organizer, leader, manager, or
5 Jackson’s co-defendant Derrick Ford pled guilty to using unauthorized access
devices.
-5-
No. 20-6131, United States v. Jackson
supervisor in criminal activity, §3B1.1(c), and two levels because Jackson willfully
obstructed or impeded the administration of justice related to the investigation of his
offense, §3C1.1. The district court sentenced Jackson to a within-guidelines sentence
of 135 months plus 24 consecutive months for each count of aggravated identity theft,
for a total of 207 months. 18 U.S.C. § 1028A(a)(1).
Jackson now appeals his convictions and sentence, arguing that the evidence
was insufficient to convict and his sentence was procedurally and substantively
unreasonable.
DISCUSSION
I. Sufficiency of the Evidence
We review a sufficiency-of-the-evidence challenge de novo and affirm if,
“viewing the evidence in the light most favorable to the prosecution, any rational trier
of fact could have found the essential elements of the crime beyond a reasonable
doubt.” Fisher, 648 F.3d at 450 (emphasis in original) (quoting Jackson v. Virginia,
443 U.S. 307, 319 (1979)). We do not “reweigh the evidence, re-evaluate the credibility
of witnesses, or substitute our judgment for that of the jury.” Id. (quoting Brown v.
Konteh, 567 F.3d 191, 205 (6th Cir. 2009)). “Substantial and competent
circumstantial evidence by itself may support a verdict and need not remove every
reasonable hypothesis except that of guilt.” United States v. Lee, 359 F.3d 412, 418
(6th Cir. 2004) (quotation marks and citation removed). We view the evidence not “in
a vacuum” but “in relation to the other evidence in the case.” Davis v. Lafler, 658 F.3d
525, 533 (6th Cir. 2011).
-6-
No. 20-6131, United States v. Jackson
A. Mail Fraud and Mail Theft
Jackson first argues that no reasonable jury could have found him guilty of
mail fraud and mail theft. Mail fraud requires 1) “a scheme or artifice to defraud”; 2)
“use of mails in furtherance of the scheme”; 3) “intent to deprive the victim of money
or property”; and 4) material misrepresentation. United States v. McAuliffe, 490 F.3d
526, 531 (6th Cir. 2007); 18 U.S.C. § 1341. The elements of mail theft are that “(1) the
defendant possessed material stolen from the mail; (2) knowing same to be stolen; (3)
with intent to possess the material unlawfully.” United States v. Comer, 93 F.3d 1271,
1276 (6th Cir. 1996) (quotation marks and citation removed); 18 U.S.C. § 1708.
Jackson does not dispute that the activity the government alleges meets these
elements; he only argues that the government has not proven that he did what it
alleges. So we focus on the ways he argues that the evidence is insufficient to tie him
to the criminal acts. We find that the evidence presented at trial was enough for a
rational jury to find him guilty on these counts.
Jackson begins by arguing that officers never found any relevant mail, the
distinctive robe that the mail thief wore, or the cell phones at issue in the Cameron
Ridge Trail house. This argument lacks force because of the obvious reply that
Jackson anticipates: the ashes in the house likely contained much of the physical
evidence. The fragments of evidence that remained support this inference; the
shredder in the house had an envelope to Amanda Montgomery—who formerly lived
in the now-vacant Cameron Ridge house—and utility bills tying Jackson to the house
filled with smoldering papers. Near the fireplace, officers also found burnt paper
-7-
No. 20-6131, United States v. Jackson
fragments with part of a Social Security number and the issuing state. In Jackson’s
bedroom, officers found a Tennessee ID card and Social Security card in Michael
Carter’s name as well as a Georgia Motor Vehicle Department receipt and
registration in Phillip Landis Burnett’s name. A rational jury could conclude that the
reason the police did not find more evidence of identity theft in the house was that
Jackson burned it. And a rational jury could infer from Jackson’s destruction of
evidence that Jackson was conscious of his guilt. See Cyars v. Hofbauer, 383 F.3d 485,
492 (6th Cir. 2004) (holding that a reasonable jury could infer guilt from a collection
of evidence that included “discard[ing] the murder weapon and drugs in a manner
sufficient to prevent authorities from recovering the evidence”); United States v.
Poulsen, 655 F.3d 492, 508 (6th Cir. 2011) (“Our courts admit ‘spoliation evidence,
including evidence that a defendant attempted to bribe . . . a witness,’ because such
spoliation evidence shows ‘consciousness of guilt.’”) (alteration in original) (quoting
United States v. Mendez-Ortiz, 810 F.2d 76, 79 (6th Cir. 1986).
Jackson’s suggestion that he was not the person who stole the last piece of mail
and burnt all the evidence is equally unpersuasive. An officer testified that a black
male walked from Jackson’s Cameron Ridge house to the vacant house’s mailbox, took
the mail, and walked back. He identified the person as Jackson. And no other adult
male was at the house that night. Jackson refused to answer the door as police
knocked “very loudly” right after the mail theft. And he instructed Jones not to open
the front door, even as the house filled with smoke. Afterward, he persuaded Jones
to marry him, hoping that she would not have to testify against him if they were wed.
-8-
No. 20-6131, United States v. Jackson
The jury could infer that Jackson stole the mail and then tried to destroy evidence of
his guilt by burning incriminating materials.
Jackson also argues that the government never tied him to any of the addresses
where the stolen mail went. That’s not true. The transaction confirmation for the sale
of the Howes’ stocks—although it was gone by the time the officer’s searched—went
to the same vacant Cameron Ridge address from which Jackson stole the last piece
of mail. The government also showed that some victims had mail sent to both the
Waterdance address and to the Cameron Ridge address. A witness also testified that
some of the victims’ mail went first to a Turco Drive address before switching to
Waterdance. All three houses were vacant. A reasonable jury could infer that Jackson
had used these addresses as drop locations for mail fraud and theft, and those
addresses cover all but one of Jackson’s mail fraud victims.
The jury heard other evidence from which it could conclude that Jackson was
the perpetrator of the mail fraud, including recorded phone calls made to the victims’
financial institutions. After hearing the tapes played in open court, Jones identified
the caller in both fraudulent Almeida calls as Jackson. She also identified him as the
voice on several other fraudulent calls. The government also showed that Jackson’s
computer had logged many searches of the victims and their personal information,
including searches for Eugenie Almeida’s birthday and information about Michael
Almeida. Although the username logged for these searches was “Michelle,” the jury
could conclude that the username did not reflect the person who ran the searches
because it is not a verified record of who was using the computer at the time.
-9-
No. 20-6131, United States v. Jackson
Jackson argues that the government never tied him to the phone number that
called the Cordova Post Office about Fulks’s stolen mail. But the government
presented evidence that many of the fraudulent calls, including those to the post
office, came from an area that included Jackson’s home. And when the government
played a recording of the Cordova Post Office call, Jones identified the caller as
Jackson. Taken together, the evidence at trial was enough to allow a rational jury to
conclude that Jackson did the acts that the government alleged.
B. Aiding and Abetting Fraud in Connection with Access Devices
The jury also convicted Jackson of aiding and abetting access device fraud
which covers anyone who “knowingly and with intent to defraud traffics in or uses
one or more unauthorized access devices during any one-year period, and by such
conduct obtains anything of value aggregating $1,000 or more during that period.” 18
U.S.C. § 1029(a)(2). Access devices include cards, account numbers, or other means
of account access, and an “unauthorized” access device is “any access device that is
lost, stolen, expired, revoked, canceled, or obtained with intent to defraud.” 18 U.S.C.
§ 1029(e)(1), (e)(3). “As at common law, a person is liable under [18 U.S.C.] § 2 for
aiding and abetting a crime if (and only if) he (1) takes an affirmative act in
furtherance of that offense, (2) with the intent of facilitating the offense’s
commission.” Rosemond v. United States, 572 U.S. 65, 71 (2014).
This conviction stands if there is sufficient evidence for a rational jury to
conclude that Jackson helped obtain and use credit cards with Derrick Ford. A police
officer testified that he had photos of Derrick Ford using different victims’ credit
- 10 -
No. 20-6131, United States v. Jackson
cards—including Michael Almeida’s—at Kroger. And as we detail above, the jury
could reasonably conclude that Jackson was part of the mail fraud that involved
getting a replacement debit card tied to the Almeidas’ account. Jackson and Ford
stole $56,909.43 from the Almeidas. This fraud alone suffices to support the jury’s
verdict on this count.
C. Possession of At Least Fifteen Unauthorized Access Devices
The jury convicted Jackson of violating 18 U.S.C. § 1029(a)(3) by “knowingly
and with intent to defraud,” possessing at least fifteen “counterfeit or unauthorized
access devices.” Jackson does not contest that social security numbers are access
devices. See United States v. Wright, 862 F.3d 1265, 1275 (11th Cir. 2017); United
States v. Gilmore, 431 F. App’x 428, 429 (6th Cir. 2011) (counting social security
numbers among access devices). Instead, he argues that the government did not prove
either his fraudulent intent or that he possessed the access devices at the same time.
On the intent to defraud, the jury was free to conclude that Jackson had
fraudulent intent based on “circumstantial evidence and by inferences drawn from
examining the scheme itself.” United States v. Winkle, 477 F.3d 407, 413 (6th Cir.
2007). Whether Jackson had the intent to defraud “is generally considered to be one
of fact to be resolved by the trier of the facts and the determination thereof should
not be lightly overturned.” Id. (ellipses, quotation marks, and citation removed). The
jury heard that officers recovered a yellow notepad filled with names and social
security numbers in Jackson’s kitchen. They also found that Jackson was involved in
identity theft with other people’s social security numbers and personal information.
- 11 -
No. 20-6131, United States v. Jackson
The jury could reasonably conclude that Jackson possessed the social security
numbers for fraudulent purposes. Jackson argues that his business card identifying
him as an identity theft expert provided a better explanation for his possession of the
social security numbers. Although this may seem like a plausible explanation to
Jackson, it did not appear so to the jury. And the evidence taken in the light most
favorable to the government supports their conclusion.
Jackson’s other argument that he did not possess all the access devises at once
has no merit. The statute does not require that all fifteen access devices be obtained
at the same time. Jackson only had to possess all fifteen at one time, which he did—
all on the same notepad.
D. Aggravated Identity Theft
Aggravated identity theft includes committing a predicate felony, which
“during and in relation to” the defendant “knowingly transfers, possesses, or uses,
without lawful authority, a means of identification of another person.” 18 U.S.C.
§ 1028A(a)(1). There are four elements: “(1) the defendant committed a specified
predicate felony; (2) the defendant knowingly transferred, possessed, or used a means
of identification of another person without lawful authority; (3) the defendant knew
that the means of identification belonged to another person; and (4) the transfer,
possession, or use was during and in relation to the predicate felony.” United States
v. Gandy, 926 F.3d 248, 258 (6th Cir. 2019). Mail fraud is a predicate felony. 18 U.S.C.
§ 1028A(c)(5); 18 U.S.C. § 1341. The jury convicted Jackson of aggravated identity
theft of the Almeida’s bank account and social security number; Peggye McNair’s
- 12 -
No. 20-6131, United States v. Jackson
name, date of birth, mother’s maiden name, middle name, and name of bank for bill
pay; and Robert Howe’s name, social security number, and brokerage account
number.
For the Almeidas, Jackson argues that the only evidence was that Ford used
the debit card and that Jackson’s computer logged a search for Mrs. Almeida’s
birthday. He admits that Jones identified the fraudulent Almeida caller as Jackson,
but he urges that the jury should not have believed her because she was biased. But
Jones’ credibility was a question for the jury, not for us to second-guess on appeal.
“[A]ttacks on witness credibility are simply challenges to the quality of the
government’s evidence and not to the sufficiency of the evidence.” United States v.
Carter, 355 F.3d 920, 925 (6th Cir. 2004) (emphasis in original) (quotation marks and
citation removed). For this reason and the reasons we have already discussed, this
argument lacks merit.
For Peggye McNair, Jackson argues that the evidence was insufficient because
no evidence linked Jackson to the vacant Cameron Ridge address, the computer
searches for McNair’s personal information, or the phone number used for fraudulent
calls in McNair’s name. Each of these arguments is meritless. An officer testified that
he saw Jackson steal mail from the vacant Cameron Ridge address. Jackson had
access to the computer that made the searches, and Jones testified that he used the
computers in his bedroom home office. And the phone number that made the
fraudulent calls also had ties to the cell tower immediately adjacent Jackson’s home.
- 13 -
No. 20-6131, United States v. Jackson
Jackson’s claim that no evidence supports this conviction ignores much of the trial
record.
Finally, for Robert Howe, Jackson repeats that the mail addressed to the
vacant Cameron Ridge address is irrelevant because Jackson has no ties to that
address, and he again argues that no mail addressed to any victims was found in
Jackson’s (ash-filled) home. He also repeats that the computer searches and the
phone calls coming from the area immediately around his house were not persuasive
evidence. We need not repeat the responses to these arguments. The record does not,
as Jackson asserts, show a case “devoid of evidence” of Jackson’s guilt. (Appellant’s
Br. at 44.) Instead, it shows evidence that a reasonable jury could weigh in
determining that Jackson committed the crimes charged beyond a reasonable doubt.
Disagreement with how the jury weighed the evidence is different from having a
record devoid of evidence.
In sum, the evidence taken in the light most favorable to the government would
allow a jury to convict Jackson on all counts. We affirm the convictions.
II. Sentence Enhancements
While Jackson presents his next claims as challenging both the procedural and
substantive reasonableness of his sentence, his arguments go only to whether the
district court correctly applied sentencing enhancements. Misinterpretation of a
guideline would yield a procedurally unreasonable sentence. United States v.
Riccardi, 989 F.3d 476, 481 (6th Cir. 2021). We “accept the findings of fact of the
district court unless they are clearly erroneous” and generally “give due deference to
- 14 -
No. 20-6131, United States v. Jackson
the district court’s application of the guidelines to the facts.” 18 U.S.C. § 3742(e);
United States v. Abdalla, 972 F.3d 838, 850 (6th Cir. 2020), cert. denied, 141 S. Ct.
1250 (2021).
A. Loss Amount Enhancement
Jackson claims that the district court unreasonably calculated the loss amount
and wrongly applied the fourteen-level enhancement for loss over $550,000. On
appeal, Jackson details his arguments against the enhancement in a table, where he
points out amounts that he does not believe should have been included. We review
the court’s determination of the amount of loss for clear error, but we review the
method of calculating the loss and interpretation of the guidelines de novo. Riccardi,
989 F.3d at 481.
If we add together the amounts that Jackson does not dispute, he should still
receive the fourteen-level enhancement. Of the twenty-six entries, Jackson marked
eleven as having no issue. Those add up to $882,036.98—well above the $550,000
threshold.6 U.S.S.G. § 2B1.1(b)(1)(H). By Jackson’s own estimate, the district court
was not unreasonable in applying the fourteen-level enhancement.
B. Number-of-Victims Enhancement
The district court applied a two-level enhancement because Jackson’s crime
involved ten or more victims. U.S.S.G. § 2B1.1(b)(2)(A)(i). Jackson argues that the
government did not prove that there were at least ten victims because anyone who
6 This includes the higher of the actual or intended loss listed on any line to
which Jackson did not object, the lower of the two numbers if Jackson objected to the
higher number, and no amounts from the lines that Jackson object to altogether.
- 15 -
No. 20-6131, United States v. Jackson
was quickly reimbursed is not a “victim.” “Whether a person is a victim under the
Sentencing Guidelines is a legal conclusion that appellate courts review de novo.”
United States v. Stubblefield, 682 F.3d 502, 510 (6th Cir. 2012) (cleaned up).
Victims include both those suffering “actual loss”—including “individuals,
corporations, companies, associations, firms, partnerships, societies, and joint stock
companies”—and “any individual whose means of identification was used unlawfully
or without authority.” U.S.S.G. § 2B1.1(b)(2)(A)(i), cmt. n.1, n.4(E). Jackson only
argues that some victims the district court factored in did not lose money. He does
not dispute that the individuals the district court named were victims of the second
kind, those whose means of identification Jackson used unlawfully: the Almeidas,
Ballinger, Best, Dulin, Fulks, Fitzgibbon, Hill, the Howes, Hughes, Jackson, King,
Lambert, McNair, Olschwanger, the Rudolphs, and Silva. Jackson victimized more
than ten people.
C. Sophisticated Means Enhancement
The district court applied a two-level enhancement because Jackson’s scheme
“involved sophisticated means.” U.S.S.G. 2B1.1(b)(10). The commentary adds that
“especially complex or especially intricate offense conduct pertaining to the execution
or concealment of an offense” invokes this enhancement, including “hiding assets or
transactions, or both, through the use of fictitious entities, corporate shells, or
offshore financial accounts.” Id. at cmt. n.9(B). This is a factual finding that we review
for clear error. United States v. Igboba, 964 F.3d 501, 510 (6th Cir. 2020). Jackson
argues that his scheme was not sophisticated because he only used the internet and
- 16 -
No. 20-6131, United States v. Jackson
a telephone. We do not look at the elements of a scheme “in isolation”; we account for
the strategy as a whole. United States v. Tandon, 111 F.3d 482, 491 (6th Cir. 1997).
Jackson’s scheme was sophisticated. “[T]he repeated use of fictitious identities
can justify a sophisticated means enhancement, particularly when the identity is
reinforced through other deceptive practices . . . .” United States v. Crosgrove, 637
F.3d 646, 667 (6th Cir. 2011). Jackson used multiple mailing addresses—none of
which were his own—to avoid detection. See Igboba, 964 F.3d at 512. Jackson used
multiple websites to collect data on recently deceased victims so that he could contact
the banks soon after the victims’ deaths. He also used multiple phone numbers to
conceal his identity, and he impersonated his victims over the phone. The district
court did not clearly err in finding that Jackson’s scheme was sophisticated.
D. Leadership Enhancement
The district court applied a two-level enhancement for being a “organizer,
leader, manager, or supervisor” of criminal activity. U.S.S.G. § 3B1.1(c). We review
this determination deferentially. United States v. Washington, 715 F.3d 975, 983 (6th
Cir. 2013). Jackson argues that this enhancement was inappropriate because no
evidence tied him to Ford’s fraudulent acts.
Jackson again misstates the record. But because this argument is the same as
his objection to the conviction for aiding and abetting fraud, we need not rehash the
evidence we discussed above in Section I.B. The district court did not err in applying
this enhancement.
- 17 -
No. 20-6131, United States v. Jackson
E. Risk of Injury Enhancement
The district court applied a two-level enhancement for involving “the conscious
or reckless risk of death or serious bodily injury.” U.S.S.G. § 2B1.1(b)(16)(A).
“Because the question of what constitutes endangerment is a mixed question of law
and fact that is highly fact-based, we give significant deference to the district court.”
United States v. Stafford, 721 F.3d 380, 401 (6th Cir. 2013) (cleaned up). Jackson
argues that the enhancement was improper because he did not perceive the risk he
was creating and because no serious bodily injury resulted from his action.
Jackson’s argument that he did not realize a risk to the people inside the
smoke-filled house rings hollow. Assuming that awareness of risk is necessary for
recklessness, there is still enough evidence to conclude that Jackson knew he was
creating a risk to Jones and the children. Jones testified that she told Jackson that
she and the children needed to exit the smoke-filled house, and he responded by
telling them to stay inside. And the district court noted that Jackson himself needed
oxygen after exiting the house. His own experience of oxygen deprivation would have
triggered an awareness that his actions were dangerous, even if he were
astonishingly unaware of that fact when he began burning the papers. The district
court did not err in applying this enhancement.
F. Obstruction of Justice Enhancement
Finally, the district court applied a two-step enhancement for obstruction of
justice. U.S.S.G. § 3C1.1. For this enhancement, we review the district court’s factual
determinations for clear error, its “determination that certain conduct constitutes
- 18 -
No. 20-6131, United States v. Jackson
obstruction of justice” de novo, and “the application of the obstruction enhancement”
de novo. United States v. Baggett, 342 F.3d 536, 540–41 (6th Cir. 2003). Jackson
argues that this enhancement is improper because the government did not present
enough evidence that the documents Jackson burnt were material evidence. We
already addressed this argument in Section I.A. The jury could reasonably conclude
that Jackson was burning evidence from the circumstances and from the fragments
of evidence that remained, despite Jackson’s best efforts.
CONCLUSION
For these reasons, we AFFIRM the district court.
- 19 -