10-2019-cr
United States v. Henderson
UNITED STATES COURT OF APPEALS
FOR THE SECOND CIRCUIT
SUMMARY ORDER
Rulings by summary order do not have precedential effect. Citation to a summary order filed on or after January
1, 2007, is permitted and is governed by Federal Rule of Appellate Procedure 32.1 and this court’s Local Rule 32.1.1.
When citing a summary order in a document filed with this court, a party must cite either the Federal Appendix
or an electronic database (with the notation “summary order”). A party citing a summary order must serve a copy
of it on any party not represented by counsel.
At a stated term of the United States Court of Appeals for the Second Circuit, held at the
Daniel Patrick Moynihan United States Courthouse, 500 Pearl Street, in the City of New York,
on the 29th day of September, two thousand eleven.
PRESENT:
ROGER J. MINER,
PIERRE N. LEVAL,
PETER W. HALL,
Circuit Judges.
______________________________________________
UNITED STATES OF AMERICA,
Appellee,
v. No. 10-2019-cr
KWANE HENDERSON, AKA MICHAEL EDWARDS,
Defendant-Appellant.
______________________________________________
FOR APPELLEE: Jessica Ortiz, Assistant United States
Attorney (Katherine Polk Failla, Assistant
United States Attorney, of counsel) for Preet
Bharara, United States Attorney for the
Southern District of New York, New York,
New York.
FOR DEFENDANT-APPELLANT Jeffrey Pittell, Maher & Pittell, LLP,
KWANE HENDERSON: Great Neck, New York.
Appeal from a judgment of the United States District Court for the Southern District of
New York (Rakoff, J.). UPON DUE CONSIDERATION, IT IS HEREBY ORDERED,
ADJUDGED, AND DECREED that the judgment of the district court is AFFIRMED.
Defendant-Appellant Kwane Henderson appeals from the district court’s judgment
entered on May 17, 2010, convicting him, after a bench trial on stipulated facts (the
“Stipulation”), of access device fraud in violation of 18 U.S.C. § 1029(a)(5) and (b)(1) (Count
One); aggravated identity theft in violation of 18 U.S.C. § 1028A (Count Two); and possession
of fifteen or more counterfeit and unauthorized access devices in violation of 18 U.S.C. §
1029(a)(3) (Count Four). On appeal, Henderson challenges the district court’s denial of his
suppression motion, which sought suppression of items seized from his vehicle and person on
April 22, 2009, when he was arrested. He also argues that the evidence was insufficient to
convict him of aggravated identity theft and access device fraud. Although we assume the
parties’ familiarity with the underlying facts and procedural history in this case, we discuss those
facts that are pertinent to our decision.
Henderson contends that because he had been removed from his car following his arrest,
he was not within reaching distance of the passenger compartment, and therefore the search of
the car incident to his arrest violated his Fourth Amendment Rights. He further claims that there
was no reasonable basis for the police to conclude that his car would contain evidence of the
identity theft offense for which he was arrested, which had taken place eighteen months
previously. Henderson also asserts that the inventory search of his car was improper for a
number of reasons, including the fact that the police did not impound the car, it was parked on
the street, and it did not require towing.
-2-
We review the district court’s ruling on a suppression motion for “clear error as to the
district court’s factual findings, viewing the evidence in the light most favorable to the
government, and de novo as to questions of law.” United States v. Rodriguez, 356 F.3d 254, 257
(2d Cir. 2004). Inventory searches and searches incident to a lawful arrest are settled exceptions
to the Fourth Amendment’s search warrant requirement. See, e.g., Arizona v. Gant, 556 U.S.
332, 129 S. Ct. 1710, 1723 (2009); Whren v. United States, 517 U.S. 806, 811-12 (1996).
With regard to a search of a car incident to a lawful arrest, the Supreme Court has held
that “[p]olice may search a vehicle incident to a recent occupant’s arrest only if the arrestee is
within reaching distance of the passenger compartment at the time of the search or it is
reasonable to believe the vehicle contains evidence of the offense of arrest.” Gant, 129 S. Ct. at
1723 (emphasis added). At the suppression hearing, the district court credited the testimony of
the lead detective, Detective Keane, who testified that identity theft offenses inherently involve
mobility in a car, since perpetrators have to travel to different stores in order to use counterfeit
credit cards.
The court concluded that although the police might not find documents used in the
specific identity theft for which the person was arrested, particularly if that offense took place
months ago, the search was still lawful because “identity theft by its very nature is something
that’s going to require proof of intent, proof of pattern, proof of [Fed. R. Evid. 404(b)]-type
evidence,” which “one could expect to find reasonably in those circumstances.” Accordingly,
the district court ruled that Detective Keane had a reasonable basis to believe that Henderson’s
wallet and vehicle would yield evidence of the offense for which he was being arrested. Under
-3-
Gant, that is all that is required for a search incident to a lawful arrest, and the district court did
not err in denying the motion to suppress on that ground.
Henderson’s suppression challenge based on the inventory search of his vehicle fares no
better. Inventory searches “serve to protect an owner’s property while it is in the custody of the
police, to insure against claims of lost, stolen, or vandalized property, and to guard the police
from danger.” Colorado v. Bertine, 479 U.S. 367, 372 (1987). We accord “deference to police
caretaking procedures designed to secure and protect vehicles and their contents within police
custody.” Id. Where officers have a right to impound a car, it does not matter whether the
inventory search takes place on the street or at the police station. See United States v. Little, 945
F. Supp. 79, 84 (S.D.N.Y. 1996); accord United States v. Hall, 497 F.3d 846, 851-52 (8th Cir.
2007).
The district court properly upheld the search of Henderson’s vehicle as an inventory
search, in light of the evidence introduced at the suppression hearing. After Henderson was
placed under arrest, Detective Keane, who had been investigating the case, retrieved
Henderson’s wallet from the car, stating that he was “responsible for the prisoner and all of his
property during an arrest.” While in the car, he observed papers, cellphones, credit cards, and
gift cards and also recovered numerous items from the trunk. Detective Keane inventoried and
vouchered these items. Following this search, Detective Keane and his partner discussed
impounding the vehicle to safeguard it, but Henderson requested instead that the vehicle be left
so that his sister could pick it up. Detective Keane parked the car on the street, locked it, and
later gave the keys to Henderson’s sister.
-4-
The facts here, credited by the district court, demonstrate that Detective Keane properly
acted to safeguard the car and eliminate the possibility of a later claim of lost property or
damages, particularly under the circumstances where the police had intended to impound the
vehicle but left it on the street, acceding to Henderson’s request that another person retrieve the
car. Henderson’s many arguments on appeal that the inventory search was unlawful are without
merit as they either depend on immaterial or unsupportable facts or a misunderstanding of the
law. Henderson offers a related argument that because the items mentioned in the criminal
complaint were unconstitutionally seized from his vehicle, the remaining allegations in the
complaint were insufficient to establish probable cause for his arrest and therefore certain items
seized from his person should have been suppressed. This contention fails, given that there were
no Fourth Amendment infirmities in the searches.
Henderson next challenges the sufficiency of the evidence. He first asserts that the
Stipulation does not state expressly that, during the course of committing the Access Device
Fraud offense (charged in Count 1), he used a means of identification which he knew belonged
to actual (as opposed to fictitious) persons, which would support a guilty verdict for Aggravated
Identity Theft1 (charged in Count 2). He cites Flores-Figueroa v. United States, 129 S. Ct. 1886
(2009), in which the Supreme Court held that to prove Aggravated Identity Theft, the
government had to show “that the defendant knew that the means of identification at issue
belonged to another person.” Id. at 1894.
1
The crime of Aggravated Identity Theft covers “[w]hoever, during and in relation to any
felony violation [including Access Device Fraud] knowingly transfers, possesses, or uses,
without lawful authority, a means of identification of another person” and provides that, in
addition to the punishment provided for such felony, the individual shall “be sentenced to a term
of imprisonment of 2 years.” 18 U.S.C. § 1028A(a)(1).
-5-
We review de novo a challenge to the sufficiency of the evidence. United States v.
Yannotti, 541 F.3d 112, 120 (2d Cir. 2008). “A defendant challenging his conviction on [this]
basis bears a heavy burden. Evidentiary rulings are reviewed for abuse of discretion. A district
court’s factual findings are reviewed for clear error.” Id. (internal quotation marks and citations
omitted). We thus credit “‘every inference that the [factfinder] might have drawn in favor of the
government, and we may overturn the conviction only if no rational trier of fact could have
found the essential elements of a crime beyond a reasonable doubt.’” United States v. Morrison,
153 F.3d 34, 49 (2d Cir. 1998) (quoting United States v. Hernandez, 85 F.3d 1023, 1030 (2d Cir.
1996)).
The language of the Stipulation–-which the district court stated “appear[ed] to be a
stipulation to each and every element of each of the four counts of the indictment”—undercuts
Henderson’s sufficiency argument. For example, paragraph 19 of the Stipulation provides that
he “knowingly and without lawful authority possessed and used means of identification[ ] of
other persons during and in relation to an offense of access device fraud, specifically the
defendant’s fraudulent use of the Marcis Account and the Lewis Account as described in
paragraphs 8 and 9.” Paragraph 1(d) refers to a Mastercard bearing the number of a “Chase
Bank credit card account number held by a person named [Redacted] Lewis,” showing that the
Lewis Account belonged to a real person. Similarly, paragraph 1(f) refers to gift cards
purchased with a Chase Bank credit card “held by a person named [Redacted] Marcis,” showing
that the Marcis Account belonged to a real person. The district court found that paragraph 19
supported Henderson’s conviction for Aggravated Identity Theft beyond a reasonable doubt.
-6-
The evidence amply supported the finding that Henderson used access devices of real persons,
and that he did so knowingly, as the Stipulation expressly included the word “knowingly.”
Henderson’s next contends that, in order to have been found guilty of Access Device
Fraud2, the Stipulation had to demonstrate that he actually knew the access devices that he used
to commit the offense belonged to another person. He asserts the Stipulation did not so provide.
Given the text of the Stipulation, this argument is similarly unpersuasive. Henderson stipulated
that he possessed “Social Security numbers, credit card account numbers, savings account
numbers, checking account numbers, dates of birth, telephone numbers and names” that were
“‘means of identification,’ as defined by 18 U.S.C. § 1028(d)(7), of other people.” He stipulated
that he used a counterfeit MasterCard bearing his name and an embossed account number to
commit Access Device Fraud and that he “knowingly, willfully and with intent to defraud”
effected numerous transactions using credit cards accounts of actual people to obtain things of
value. Henderson further stipulated that the credit card numbers were access devices as defined
in the statute, that were issued to persons other than him, and certain of the credit cards and gift
cards were “counterfeit access devices” as defined in the statute. All of these stipulated facts,
plus the reasonable inferences the district court drew from these facts, sufficed to establish
Henderson’s guilt for Access Device Fraud.
Finally, Henderson argues that the Stipulation does not support his conviction for
Aggravated Identity Theft because that offense requires use of both an access device needed to
2
The crime of Access Device Fraud covers “[w]hoever . . .knowingly and with intent to
defraud effects transactions, with 1 or more access devices issued to another person or persons,
to receive payment or any other thing of value during any 1-year period the aggregate value of
which is equal to or greater than $1,000[ ] . . . if the offense affects interstate or foreign
commerce.” 18 U.S.C. § 1029(a)(5).
-7-
satisfy Access Device Fraud under § 1025(a)(5) and an additional “means of identification” of
another person. See 18 U.S.C. § 1028(d)(7) (defining the term “means of identification” to
include “any name or number that may be used, alone or in conjunction with any other
information, to identify a specific individual”). Henderson argues that the access device used to
establish the offense of Access Device Fraud cannot also be used to establish the “means of
identification” of Aggravated Identity Theft. Assuming without deciding that Henderson is
correct in his contention that the “means of identification” must be separate and in addition to an
access device, the Stipulation nonetheless supports his conviction. Paragraph 1(d) of the
Stipulation states that Henderson used a counterfeit credit card bearing his name and an encoded
account number which belonged to another person named Lewis. The card was an access
device. Lewis’s account number encoded on the counterfeit credit card was an additional
“means of identification” under § 1028(d)(7), which includes as the definition of a “means of
identification” any “number that may be used, alone or in conjunction with any other
information, to identify a specific individual, including any . . . (C) unique electronic
identification number. . . .” The stipulated facts were sufficient to establish all of the elements
for Aggravated Identity Theft.
Accordingly, for the reasons stated, the judgment of the district court is AFFIRMED.
FOR THE COURT:
Catherine O’Hagan Wolfe, Clerk
-8-