NOT PRECEDENTIAL
UNITED STATES COURT OF APPEALS
FOR THE THIRD CIRCUIT
______
Nos. 08-1658, 08-3876, 08-3849, 08-3969, 08-4556, 08-4816
______
UNITED STATES OF AMERICA
v.
ANTOINE NORMAN,
Appellant in 08-1658 & 08-3876
CHARLES WHITE,
Appellant in 08-3849
ALLEN SMITH,
Appellant in 08-3969
AKINTUNDE CRAWFORD,
Appellant in 08-4556
MICHAEL MERIN,
Appellant in 08-4816
______
On Appeal from the United States District Court
for the Eastern District of Pennsylvania
(D.C. Criminal No. 2:06-cr-00377)
District Judge: Honorable R. Barclay Surrick
______
Submitted Pursuant to Third Circuit L.A.R. 34.1(a)
March 6, 2012
Before: SCIRICA, AMBRO, and VAN ANTWERPEN, Circuit Judges.
(Filed: March 7, 2012)
______
OPINION OF THE COURT
______
VAN ANTWERPEN, Circuit Judge.
In this consolidated appeal, we are asked to review alleged errors in the
convictions and sentences of appellants Akintunde Crawford, Michael Merin, Antoine
Norman, Allen Smith, and Charles White. Each of the five appellants was convicted of
conspiracy to commit bank fraud and aggravated identity theft, in violation of 18 U.S.C.
§ 371; bank fraud, in violation of 18 U.S.C. § 1344; and aggravated identity theft, in
violation of 18 U.S.C. § 1028A. For the reasons that follow, we will affirm all judgments
of conviction but will vacate all sentences and remand for resentencing.
I.
Because we write solely for the parties, we recount the facts and proceedings only
to the extent required for resolution of this appeal. From approximately February 2004 to
November 2005, the appellants actively participated in a bank fraud scheme that targeted
four FDIC-insured banks in the Philadelphia area: Commerce Bank, Wachovia Bank,
M&T Bank, and PNC Bank. Through repeated fraudulent transactions, appellants
defrauded the four banks of hundreds of thousands of dollars. The fraudulent
transactions were carried out by a group of ―check-runners,‖ five of whom were indicted
along with the appellants. The five check-runners—Terry Hughes, Rachel Lukovsky,
Kevin Norris, Lisa Smith, and Kelly Taylor—pleaded guilty to their applicable charges
and cooperated with the government in its prosecution of this case.
2
To accomplish their criminal objective, appellants unlawfully obtained the
personal identification information, including names, dates of birth, addresses, and social
security numbers, for customers at the four banks. With this information, appellants
recruited the check-runners to pose as the customers and cash counterfeit or closed-
account checks1 or withdraw money from the customers‘ accounts. Each of the four
banks allowed customers to cash checks prior to the checks clearing, but only so long as
the amount of the check was equal to or less than the customer‘s account balance.
Shortly before a check-runner would attempt to cash a check, therefore, appellants would
try to ascertain the customers‘ account balance: for check-runs at Commerce Bank,
appellants would do this by calling the bank‘s automated 1-800 telephone system and
entering the customers‘ account and personal identification numbers (PIN).2
Due to different security policies at the four banks, appellants employed two
different check-running schemes: a ―drive-through‖ scheme and a ―walk-in‖ scheme.
The drive-through scheme was used at Commerce Bank to take advantage of the bank‘s
drive-through service which did not require customers to provide picture identification
prior to cashing checks. By contrast, the other three banks did not have a drive-through
1
As defined in the government‘s indictment, ―[a] closed-account check is a check that
originally was issued to a customer of a bank but became worthless when the account on
which it first was issued later was closed. The worthless nature of a closed-account
check would not become apparent to the accepting bank until the issuing bank
determined that the account was closed and returned it to the accepting bank unpaid.‖
2
The default PIN for each customer was the last four digits of their social security
number.
3
service and required picture identification. At these three banks, the check-runners would
walk inside the bank and use a fake ID provided by the appellants.
Although each of the appellants played a significant role in the conspiracy, their
respective roles differed. White was the leader of the check-running operation, with
Norman acting as his principal associate. In this capacity, White and Norman performed
numerous acts, including obtaining the personal identification information of bank
customers; purchasing closed-account checks and fraudulently endorsing them; calling
Commerce Bank‘s automated telephone system shortly before check-runs; and providing
―cheat-sheets‖ to the check-runners containing information about the customer (e.g.,
social security number, date of birth) that the check-runner might be asked to provide. In
addition to White and Norman, Smith assisted the check-running operation by providing
fraudulent checks to the check-runners and other tasks. Crawford primarily assisted by
preparing fake photo IDs, including fake driver‘s licenses, for the walk-in transactions,
while Merin primarily assisted by providing roughly twenty social security numbers and
other personal identification information.
At trial, the government‘s evidence included, inter alia, testimony from several of
the check-runners; testimony from an undercover Postal Inspector, Yvette Thomas, who
infiltrated the conspiracy; phone records showing a high volume of phone calls between
appellants during the time frame of the conspiracy; and incriminating documents found in
police searches of a rental car driven by White and the basement of a store, Rah‘s
Fashion Boutique, where Crawford worked during the conspiracy. Based on this and
4
other evidence, each appellant was convicted of one count of conspiracy to commit bank
fraud and aggravated identity theft, 18 U.S.C. § 371, and a combination of bank fraud,
18 U.S.C. § 1344, and aggravated identity theft counts, 18 U.S.C. § 1028A.3
During sentencing, the District Court applied several enhancements to the
appellants‘ offense level. These included a fourteen-level enhancement, per U.S.S.G. §
2B1.1(b)(1), as an offense involving a loss exceeding $400,000; a four-level
enhancement, per U.S.S.G. § 2B1.1(b)(2), as an offense involving at least fifty victims;
and a two-level enhancement, per U.S.S.G. § 2B1.1(b)(10), as an offense involving
sophisticated means.
II.4
A) Motion to Suppress (White)
We begin our analysis by addressing White‘s argument that the District Court
erred in denying his motion to suppress incriminating documents obtained from an
overdue rental car that his wife had rented and which had been reported stolen at the time
of the search. For the reasons that follow, we hold that White does not have standing to
bring this claim.
The undisputed facts underlying this dispute are as follows. On September 19,
2005, White was driving a rental car that had been reported to be stolen.5 Although the
3
White and Norman were each convicted of four counts of bank fraud, Crawford three,
Smith two, and Merin one. White was also convicted of sixteen counts of aggravated
felony, followed by Norman‘s twelve counts, Merin‘s nine counts, Crawford‘s seven
counts, and Smith‘s four counts.
4
The District Court had jurisdiction under 18 U.S.C. § 3231. We have jurisdiction under
both 18 U.S.C. § 3742 and 28 U.S.C. § 1291.
5
car was rented by White‘s wife, the rental agreement had expired. While White was
driving, two Philadelphia Police Officers, Thomas Farrell and Joseph Rapone, pulled up
behind his vehicle. Soon thereafter, Officer Rapone noticed that the license plate number
of the rental car was listed on the police ―hot sheet‖—a digest of vehicles reported as
being stolen within the previous five days.6 After a check of the Department of Motor
Vehicle‘s (DMV) database confirmed the car‘s stolen status, the officers signaled for
White to stop the vehicle, which he did.
Upon informing White that the car had been reported stolen, White produced a
copy of his wife‘s rental agreement and told the officers he was going to return the car
later that day. At that point, Officer Rapone called the rental company‘s theft department
and spoke with a representative who stated that the company considered the car ―stolen‖
and wanted to prosecute the case. White was then arrested and placed in the back of the
officers‘ vehicle. After calling a tow truck to return the car to the rental company,
Officer Rapone performed an inventory search during which he found a black leather
portfolio under the car‘s passenger-side seat. Inside the portfolio, Rapone found
photocopies of checks and what seemed to be fake driver‘s licenses and fraudulent
identifications.
Prior to trial, White filed a motion to suppress on the ground that the officers did
not have probable cause to make the arrest. White asserts that the officers lost whatever
5
Appellant Smith was in the passenger seat.
6
On the hot sheet, the license plate number was listed with a four-star notation. This
notation signified that police should ―try and locate‖ the vehicle.
6
probable cause they may have had once he produced his wife‘s rental agreement and told
the officers he would be returning the car later that day. According to White, the officers
merely had ―probable cause to believe that the vehicle was overdue back at the rental
agency.‖ The District Court, however, rejected this argument. It ruled that the officers‘
reliance on three separate sources of reliable information, each indicating that the car was
stolen, was more than sufficient to provide probable cause to make the arrest.
Accordingly, because the portfolio was found in the car‘s passenger compartment, the
District Court denied White‘s motion on the grounds that the search was incident to a
lawful arrest under this Court‘s then-prevailing interpretation7 of New York v. Belton, 453
U.S. 454 (1981).
When reviewing a district court‘s ruling on a suppression motion, we review ―for
clear error as to the underlying facts, but exercise plenary review as to [the search‘s]
legality in light of the court‘s properly found facts.‖ United States v. Kennedy, 638 F.3d
159, 163 (3d Cir. 2011) (internal quotation mark omitted)). ―[T]he proponent of a motion
to suppress ‗bears the burden of proving not only that the search . . . was illegal, but also
that he had a legitimate expectation of privacy in [the place searched].‘‖ United States v.
Stearn, 597 F.3d 540, 551 (3d Cir. 2010) (quoting Rawlings v. Kentucky, 448 U.S. 98,
7
Subsequent to the District Court‘s opinion, the Supreme Court issued Arizona v. Gant,
556 U.S. 332 (2009), wherein the Court rejected the broad reading of Belton that we, and
most other circuit courts, had adopted. See United States v. Schecter, 717 F.2d 864, 868
(3d Cir. 1983). This is of no moment to White‘s claim, however, because of our
determination that he lacks standing. Even if White had standing, ―[e]vidence obtained
during a search conducted in reasonable reliance on binding precedent is not subject to
the exclusionary rule.‖ Davis v. United States, 131 S. Ct. 2419, 2429 (2011).
7
104 (1980)). Without a legitimate expectation of privacy, the proponent of a suppression
motion has no standing to bring the claim. United States v. Baker, 221 F.3d 438, 441 (3d
Cir. 2000) (citing Rakas v. Illinois, 439 U.S. 128, 143 (1978)).
We begin our review by determining whether White has standing to bring the
claim.8 Although the standing inquiry is a ―fact-bound‖ one, we recently joined the
majority of circuits in adopting the ―general rule‖ that, under the precise factual scenario
presented here, the driver does not have a legitimate expectation of privacy. Kennedy,
638 F.3d at 165. As we stated in Kennedy, ―the driver of a rental car who has been
[loaned] the car by the renter, but who is not listed on the rental agreement as an
authorized driver, lacks a legitimate expectation of privacy in the car unless there exist
extraordinary circumstances suggesting an expectation of privacy.‖ Id. Because this
rule squarely applies to the facts of this case, and because there are no extraordinary
circumstances to justify an exception,9 our inquiry is at its end. White lacks standing to
bring the claim.
B) Sufficiency of the Evidence (Crawford & Smith)
8
Although the District Court did not base its decision on standing, that does not preclude
us from doing so here. See Kennedy, 638 F.3d at 163 (―The Court may . . . affirm the
district court on any ground supported by the record . . . .‖).
9
As we noted in Kennedy, an example of the ―extraordinary circumstances‖ that might
overcome the general rule would be a situation where ―the defendant was the husband of
the woman who had rented the car . . . and had himself ‗personally contacted the rental
car company . . . and reserved the vehicle in his name, using his own credit card, which
was billed for the rental.‘‖ Id. at 168 (second omission in original) (quoting United
States v. Smith, 263 F.3d 571, 582 (6th Cir. 2001)). Here, there is no evidence that White
contacted the rental car company, reserved the car in his name, or paid for the car.
8
Both Crawford and Smith challenge the sufficiency of the evidence upon which
they were convicted. While Crawford preserved his claim by filing a timely motion for
judgment of acquittal, Smith failed to raise his claims below. Accordingly, we will
review Smith‘s claims for plain error only.
When a defendant challenges the sufficiency of evidence upon which he was
convicted, our review ―is guided by strict principles of deference to a jury‘s verdict.‖
United States v. Rosario, 118 F.3d 160, 162–63 (3d Cir. 1997). Specifically, ―we must
view the evidence in the light most favorable to the Government,‖ and will only overturn
a jury‘s verdict ―when the record contains no evidence, regardless of how it is weighted,
from which the jury could find guilt beyond a reasonable doubt.‖ United States v. Riley,
621 F.3d 312, 329 (3d Cir. 2010) (internal quotation marks omitted). When an
insufficiency claim has not been preserved, the defendant‘s burden is even more onerous,
as we review for plain error only. See United States v. Mornan, 413 F.3d 372, 381 (3d
Cir. 2005). ―A conviction based on insufficient evidence is plain error only if the verdict
‗constitutes a fundamental miscarriage of justice.‘‖ United States v. Thayer, 201 F.3d
214, 219 (3d Cir. 1999) (quoting United States v. Barel, 939 F.2d 26, 37 (3d Cir. 1991)).
―Such a determination requires that the mistake ‗be so clear that the trial judge and
prosecutor were derelict in countenancing it, even absent the defendant‘s timely
assistance in detecting it.‘‖ United States v. Wright-Barker, 784 F.2d 161, 171 (3d Cir.
1986).
9
Crawford contests the sufficiency of the evidence upholding his conviction for
conspiracy to commit bank fraud and identity theft in violation of 18 U.S.C. § 371.10
According to Crawford, the record ―is utterly devoid of any direct or circumstantial
evidence‖ linking him to the conspiracy. A review of the record, however, belies
Crawford‘s claim. While there was no direct evidence proving Crawford‘s criminal
involvement, there was ample circumstantial evidence from which a reasonable jury
could have made that inference. We will briefly review some, but not all, of this
evidence.
First, one of the check-runners in the conspiracy, Terry Hughes, testified at trial
that White would frequently go to Crawford‘s store, Rah‘s Fashion Boutique,
immediately prior to, and after, the check-runs.11 Hughes testified that Crawford was
there ―pretty much every time I went there,‖ and that, after one check-run, he observed
Crawford and White counting up the money that had just been fraudulently obtained. On
another occasion, Crawford was alone with White in a car when White gave Hughes a
10
Although Crawford was also convicted of three counts of bank fraud, 18 U.S.C. §
1344, and seven counts of identity theft, 18 U.S.C. § 1028A, his brief focuses only on the
conspiracy count. To the extent, however, that the evidence was sufficient to convict
Crawford of the conspiracy, it would be sufficient to uphold the separate convictions, as
they were foreseeable crimes committed in furtherance of the conspiracy. See Pinkerton
v. United States, 328 U.S. 640, 645–48 (1946) (explaining that conspirator is liable for
reasonably foreseeable acts that further conspiracy‘s aims); United States v. Gonzalez,
918 F.2d 1129, 1135 (3d Cir. 1990) (same). Accordingly, we will limit our discussion
here to the conspiracy conviction.
11
Hughes‘s testimony was consistent with the testimony of Postal Inspector, Yvette
Thomas. At trial, Thomas testified that, during her undercover operation, White went to
Rah‘s Fashion Boutigue just prior to the check-run. After White returned from the store,
Thomas saw him with a Pennsylvania driver‘s license featuring a photograph of a black
female.
10
fake ID. Hughes also testified that, on one occasion, Crawford provided him new clothes
to wear just prior to one of his bank runs.
Second, police seized incriminating documents within an envelope addressed to
Crawford in the basement of Rah‘s Fashion Boutique. In the envelope were counterfeit
driver‘s licenses and numerous passport photographs of unidentified individuals.
Moreover, the envelope was found within a box that contained, inter alia, a manual for
making IDs, a computer disk with a digital image of a fake Delaware driver‘s license
with Crawford‘s photo superimposed on it, and an application for a Commerce Bank
account filled out by Kendrick Ellison. Ellison, who testified at trial, was one of the
scheme‘s victims.
While Crawford argues that there is no evidence showing that he actually
―possessed or used‖ the documents found in the store‘s basement, a rational jury could
have made that inference. Although the police did not search the store until November
2005, or about five months after the last documented check-run, this does not preclude
the jury from attributing the seized documents to Crawford, particularly considering that
several of the documents were in an envelope addressed to Crawford and that a
photograph of Crawford was found on one of the forged driver‘s licenses. While it is true
that Crawford stopped working at the store in October 2005, he stipulated at trial that he
continued to frequent the store in November 2005.
Third, phone records introduced at trial established that, during the course of the
conspiracy, Crawford had 279 phone calls with White, the conspiracy‘s ring leader.
11
Although Crawford and White are brothers-in-law, a rational jury would be justified in
discrediting the inference that Crawford would have it draw—i.e., that 279 phone calls
over the course of a year merely pertained to family and personal matters. Such an
inference is improbable in light of other evidence showing Crawford regularly had phone
conversations with other co-conspirators. Indeed, according to the phone records,
Crawford had 128 phone calls with Merin, 47 phone calls with Smith, and 5 phone calls
with Norman. Taken together, the evidence is more than sufficient to uphold Crawford‘s
conviction for conspiracy.
We now turn to Smith‘s claim that the evidence was insufficient to support his
conviction for conspiracy. In making this claim, Smith‘s brief ignores the fact that
Rachel Lukovsky, a check-runner, testified at trial that Smith provided her with checks to
cash at the banks. This evidence, in and of itself, is sufficient to sustain Smith‘s
conviction. See United States v. Perez, 280 F.3d 318, 344 (3d Cir. 2002) (stating that
―uncorroborated accomplice testimony may constitutionally provide the exclusive basis
for a criminal conviction‖ (quoting United States v. DeLarosa, 450 F.2d 1057, 1060 (3d
Cir. 1971))). This is ―particularly‖ true where defense counsel, as was the case here, had
―ample opportunity to cross-examine the Government‘s witnesses.‖ Id. Although
Lukovsky‘s testimony was not the only evidence implicating Smith, it is sufficient to
dispose of Smith‘s claim.
12
Smith also argues that the evidence was insufficient to convict him of aggravated
identity theft in violation of 18 U.S.C. § 1028A.12 Smith contends the government failed
to establish that he personally knew the means of identification he unlawfully used
belonged to real people. In support of this argument, Smith cites the Supreme Court‘s
opinion in Flores-Figueroa v. United States, 129 S. Ct. 1886 (2009). There, the Court
held that the aggravated identity theft statute, 18 U.S.C. § 1028A, requires proof the
defendant knew the means of identification actually belonged to another person. Flores-
Figueroa, 129 S. Ct. at 1888. The Flores-Figueroa Court recognized, however, that ―in
the classic case of identity theft, intent is generally not difficult to prove.‖ Id. at 1893.
As the Court noted, ―where a defendant has used another person‘s identification
information to get access to that person‘s bank account, the Government can prove
knowledge with little difficulty.‖ Id. Under Flores-Figueroa, therefore, the
government‘s burden of proving knowledge in a case such as this is minimal. Because
Smith‘s involvement in the bank fraud scheme would have been pointless if the means of
identification did not belong to real customers, the government‘s burden was met.
C) Prejudicial Variance Between Indictment and Trial Evidence (Smith)
12
Although Smith did file a motion for judgment of acquittal on the aggravated identity
theft claims, he did not raise the theory he advances here on appeal. We need not decide
what standard of review is appropriate, however, as Smith is not entitled to relief under
any standard.
13
Smith advances another theory on which to overturn his conviction for conspiracy:
a prejudicial variance between the conspiracy charged in the indictment and the proof
offered at trial.13 See United States v. Kelly, 892 F.2d 255, 258 (3d Cir. 1990) (―A
conviction must be vacated when (1) there is a variance between the indictment and the
proof presented at trial and (2) the variance prejudices a substantial right of the
defendant.‖). According to Smith, the government charged one conspiracy in the
indictment but proved two conspiracies at trial. Specifically, Smith contends that the
―drive-through scheme and walk-in scheme represented different conspiracies,‖ as
evident by ―the refusal of some of the check-runners to participate in the walk-in scheme
and Mr. White‘s practice of talking up the walk-in scheme‘s profitability and
minimiz[ing its] risk.‖ Smith claims that this variance prejudiced him ―by lumping him
in with members of both conspiracies for a single determination of his guilt or
innocence.‖ We disagree. What Smith characterizes as two ―conspiracies‖ were merely
two schemes within the same conspiracy.
As we have previously made clear, ―a conspiracy with a single objective may be
implemented by multiple means and remain a single conspiracy.‖ United States v.
Schurr, 775 F.2d 549, 554 n.8 (3d Cir. 1985). Here, the conspiracy clearly had a single
objective: to make money by defrauding banks. The walk-in and drive-through schemes
13
Since Smith did not raise this issue below, we will review for plain error. Under any
standard of review, however, the claim would fail.
14
were simply different means to accomplish this common objective.14 A finding of a
single conspiracy is further indicated where the ―participants overlap in the various
dealings.‖ Kelly, 892 F.2d at 259. Here, there was extensive overlap. Along with Smith,
White, and the other appellants, two of the five check-runners (Lisa Smith and Terry
Hughes) participated in both schemes. This was not a case, therefore, of ―separate
networks operating independently of each other,‖ which is how we have previously
defined separate conspiracies. United States v. Barr, 963 F.2d 641, 648 (3d Cir. 1992)
(internal quotation marks omitted). Accordingly, there was no variance between the
indictment and the proof offered at trial.
D) Sixth Amendment Right to a Jury (Norman & White)
We now turn to the appellants‘ arguments regarding the sentencing proceedings.
We begin first with Norman and White‘s as-applied Sixth Amendment challenge.
Because this claim presents a question of law, our review is plenary. United States v.
Barbosa, 271 F.3d 438, 452 (3d Cir. 2001).
Under the Sixth Amendment, a criminal defendant has ―the right to demand that a
jury find him guilty of all the elements of the crime with which he is charged.‖ United
States v. Booker, 543 U.S. 220, 230 (2005) (quoting United States v. Gaudin, 515 U.S.
506, 511 (1995)). In the sentencing context, this right ensures that ―[a]ny fact (other than
a prior conviction) which is necessary to support a sentence exceeding the maximum
14
This theory of the case should have been no surprise to Smith as it was expressly set
forth in the government‘s indictment. Indeed, in describing the ―manner and means‖ of
the conspiracy, the indictment described the drive-through and walk-in schemes in
separate subsections.
15
authorized by the facts established by a plea of guilty or a jury verdict must be admitted
by the defendant or proved to a jury beyond a reasonable doubt.‖ Id. at 244. The
maximum sentence authorized by a jury verdict is the maximum sentence established by
the legislature (i.e., the ―statutory maximum‖), which, in the federal sentencing context,
is the United States Code. See United States v. Grier, 475 F.3d 556, 565 (3d Cir. 2007)
(en banc) (―Post-Booker, the punishments chosen by Congress in the United States Code
determine the statutory maximum for a crime.‖).
Here, the sentences Norman and White received—thirteen and twenty-one years
respectively—were both well below the statutory maximum. See 18 U.S.C. § 1344
(establishing maximum prison sentence of thirty years for bank fraud). Norman and
White nevertheless advance a theory, one endorsed by Justice Scalia, that the Sixth
Amendment right to a jury trial is violated if the sentence would otherwise be
unreasonable in the absence of judicially found facts. See Rita v. United States, 551 U.S.
338, 375 (2007) (Scalia, J., concurring) (stating that Supreme Court precedent ―does not
rule out as-applied Sixth Amendment challenges to sentences that would not have been
upheld as reasonable on the facts encompassed by the jury verdict or guilty plea‖); see
also Gall v. United States, 552 U.S. 38, 60 (2007) (Scalia, J., concurring) (same). In
Norman‘s case, his Guidelines sentence, based solely on the facts determined by the jury
and his prior criminal history, was 8 to 14 months. This range, however, was increased
during sentencing to 135 to 168 months based on the District Court‘s findings regarding
(1) the extent of loss caused by the conspiracy, (2) the number of victims suffering a loss,
16
and (3) Norman‘s role as a manager or supervisor in the conspiracy. Because Norman
believes his within-Guidelines sentence of 156 months would be substantively
unreasonable in the absence of the District Court‘s factual findings, he argues that the
case presents the type of ―as-applied‖ challenge endorsed by Justice Scalia. White makes
a roughly similar argument.
Although appellants‘ characterization of the right to a jury trial has its adherents, it
has been uniformly and unequivocally rejected by the federal circuit courts, including our
own. See Grier, 475 F.3d at 564–65; United States v. Hernandez, 633 F.3d 370, 373–74
(5th Cir. 2011); United States v. Treadwell, 593 F.3d 990, 1017 (9th Cir. 2010); United
States v. Ashqar, 582 F.3d 819, 824–25 (7th Cir. 2009); United States v. White, 551 F.3d
381, 386 (6th Cir. 2008); United States v. Benkahla, 530 F.3d 300, 312 (4th Cir. 2008);
United States v. Redcorn, 528 F.3d 727, 745–46 (10th Cir. 2008). In Grier, we stated
that the only facts a jury must determine are those ―that increase the statutory maximum
punishment. . . . [O]nce these facts are found, the judge may impose a sentence anywhere
under that maximum without jury determinations and proof beyond a reasonable doubt.‖
475 F.3d at 565. Although Grier involved a Fifth Amendment challenge, our
interpretation of Booker left no room for doubt regarding our view of the Sixth
Amendment question at issue here See id. at 564–65 (stating that the nonmandatory
nature of the Guidelines after Booker ―makes all of the difference‖ with respect to Sixth
Amendment claims). Accordingly, appellants‘ Sixth Amendment claim fails.
E) Enhancement for Fifty or More Victims (All Appellants)
17
Appellants15 argue, and the government concedes, that the District Court‘s
conclusion with respect to the number of victims must be reconsidered in light of our
opinion in United States v. Kennedy, 554 F.3d 415, 419 (3d Cir. 2009). Our review of a
district court‘s interpretation of the Guidelines is plenary. Grier, 475 F.3d at 570.
Under the Guidelines, the offense level of a fraud crime is enhanced by two levels
if it involved ten or more victims and by four levels if it involved fifty or more victims.
U.S.S.G. § 2B1.1(b)(2)(B). At sentencing, the government argued that appellants‘
scheme had approximately 146 victims. These victims included the four defrauded banks
and the many account holders at these banks whose accounts were compromised.
Because the account holders were reimbursed for their losses, however, Norman and
White argued that the account holders had not suffered an ―actual loss‖ and were thus not
―victims‖ under the Guidelines; an argument consistent with the prevailing rule of our
sister circuits. E.g., United States v. Conner, 537 F.3d 480, 489 (5th Cir. 2008); United
States v. Icaza, 492 F.3d 967, 969–970 (8th Cir. 2007); United States v. Yagar, 404 F.3d
967, 971–72 (6th Cir. 2005). At the time of sentencing, however, this Court had yet to
address the issue, and the District Court accepted the government‘s theory that temporary
losses could constitute actual loss. Accordingly, the District Court found that the account
holders were victims and added a four-level enhancement to the appellant‘s offense level.
15
Although only Norman, Smith, and White raise this argument on appeal, in the interest
of uniformity and justice we will apply our decision to vacate the sentence and remand
for resentencing to all five appellants. See Silber v. United States, 370 U.S. 717, 717–18
(1962).
18
Subsequent to the District Court‘s decision, we held in Kennedy that bank account
holders who are later reimbursed for their losses are not victims under 2B1.1(b)(2)(B).
554 F.3d at 419. We did note in Kennedy, however, that account holders who are later
reimbursed may nevertheless qualify as victims if they ―spent time or money seeking
reimbursement.‖ Id. at 422. We will thus remand this matter for proceedings consistent
with our opinion in Kennedy. In so doing, we will leave it to the District Court‘s
discretion as to whether to allow additional evidence. See United States v. Coward, 296
F.3d 176, 180 (3d Cir. 1990) (―[D]ecisions to reopen proceedings are ‗traditionally a
discretionary matter for the district court.‘‖ (quoting United States v. Vastola, 915 F.2d
865, 876 (3d Cir. 1990))).
F) Loss Attributable to the Conspiracy (Smith & Merin)
Smith and Merin contend that the District Court erred in calculating the total loss
attributable to the conspiracy. Under the Guidelines, the loss caused by a fraud offense is
a specific offense characteristic that can increase the offense level. U.S.S.G. §
2B1.1(b)(1). Losses exceeding $200,000 but not $400,000 trigger a twelve-level
enhancement, while losses exceeding $400,000 but not $1,000,000 trigger a fourteen-
level enhancement. Id. To determine loss, a sentencing court ―need only make a
reasonable estimate‖ based on the available evidence—precision is not required. United
States v. Ali, 508 F.3d 136, 145 (3d Cir. 2007) (quoting U.S.S.G. § 2B1.1 cmt. 3(C)). As
with other sentencing facts, the government bears the burden of proving loss by a
preponderance of the evidence. United States v. Fumo, 655 F.3d 288, 310 (3d Cir. 2011).
19
Where, as here, the sentencing court‘s factual findings are challenged, we review for
clear error. United States v. Napier, 273 F.3d 276, 278 (3d Cir. 2001).
Here, Smith and Merin agree with the District Court that the total loss is between
$400,000 and $1,000,000. However, whereas the District Court found a total loss of
$789,665, appellants argue that the correct figure is $417,185. While appellants‘
argument is without practical significance (i.e., even if correct, it would not reduce the
offense level), we will nevertheless address it because the issue of total loss does bear on
the appellants‘ arguments with respect to the amount of loss that is individually
attributable.
After holding an evidentiary hearing and after accepting written briefs from the
parties, the District Court issued a written decision in which it carefully explained its
determination that the conspiracy caused $789,665 in financial loss. In its analysis, the
District Court scrutinized each of the government‘s eleven exhibits (Exhibits A–K), and
rejected the government‘s claim that the total loss exceeded $1,000,000. On appeal,
Smith and Merin accept the District Court‘s findings with respect to Exhibits A–E and K
($417,185), but dispute the court‘s findings with respect to Exhibits F, G, H, I, and J.
Although we have reviewed the District Court‘s findings for each exhibit, we will limit
our discussion here to Exhibits G and J, as they represent over ninety percent of the
losses in dispute. As will be seen, Smith and Merin have failed to identify any errors, let
alone clear errors, in the District Court‘s opinion.
20
We begin with Exhibit G, which covers $85,130 in total losses associated with the
conspiracy. Exhibit G lists incidents where customers of Commerce Bank were
defrauded shortly after their account information was accessed through phone calls to the
bank‘s automated phone system. In its brief to the District Court, the appellants objected
to Exhibit G on the grounds that the government witness, Inspector Khary Freeland, had
failed to establish at the evidentiary hearing how many of the phone numbers listed as
having called the bank belonged to members of the conspiracy. In response to this
concern, the District Court independently reviewed each of the phone numbers listed in
Exhibit G and found that ―all‖ of them were associated with conspiracy members. The
District Court also found that ―a close correlation‖ existed ―between the date and time of
the inquiry into the account, and the date of the fraud.‖ In other words, shortly after the
conspirators called the automated phone system, the accounts that they accessed were
defrauded. In their brief to this Court, Smith and Merin act as if the District Court never
made these findings, as they simply repeat their earlier argument about Inspector
Freeland‘s testimony without reference to the District Court‘s subsequent analysis.
Accordingly, Smith and Merin have shown no error with respect to the District Court‘s
findings regarding Exhibit G.
Smith and Merin‘s arguments regarding Exhibit J are similarly flawed. Exhibit J
lists fraudulent transactions involving closed-account checks with names that the
conspiracy‘s check-runners were known to have used on other occasions. In their briefs
to the District Court, three of the appellants argued that Inspector Freeland had failed to
21
specifically demonstrate during his testimony what percentage of the transactions in
Exhibit J were connected to the conspiracy. After receiving these briefs, therefore, the
District Court reviewed Exhibit J to assess each transaction‘s connection with the
conspiracy. The results, it noted, were ―compelling,‖ with ―most of the Exhibit J checks .
. . passed within days and at most two weeks, of similar checks passed by the
[conspiracy‘s] runners.‖ As a representative example, the District Court referenced a
series of Mode Mederne, Inc., checks, ranging from $900 to $980 in value, which were
listed in Exhibit J as being passed on June 9, 2004. This closely correlated with evidence
from Exhibit A documenting that one of the conspiracy‘s check-runners, Kelly Taylor,
had cashed three Mode Mederne checks on June 13, 2004, for $960, $980, and $990. In
total, the District Court found that $259,222 of the $295,579 in losses identified in
Exhibit J were connected to the conspiracy.
Despite the District Court‘s findings regarding Exhibit J, Smith and Merin focus
almost entirely on the alleged inadequacies in Inspector Freeland‘s testimony.16
Moreover, the only attempt that Smith or Merin make at discrediting the District Court‘s
analysis does not withstand scrutiny. Smith and Merin state that the District Court‘s
finding regarding the Mode Moderne checks was directly at odds with Inspector
Freeland‘s testimony. This is so, they argue, because Freeland ―explicitly testified that he
16
Smith and Merin‘s account of Freeland‘s testimony regarding Exhibit J is riddled with
mischaracterizations. They state, for example, that the ―extent of the link‖ established by
Inspector Freeland was a few checks from an account belonging to Lou Galdieri.
Freeland made it clear, however, that he was simply citing the Lou Galdieri checks as
representative examples of the types of transactions catalogued in Exhibit J.
22
could not draw any link between [the Mode Moderne] checks and the conspiracy.‖ An
examination of Freeland‘s testimony, however, reveals no so such assertion. When asked
about the Mode Moderne checks, Freeland merely testified that he could not recall how
they were connected with the conspiracy without looking at his records, which he was not
given the opportunity to do. By contrast, the District Court had the benefit of examining
these records in detail. Accordingly, neither Smith nor Merin have pointed to anything in
the record indicating the District Court‘s estimation of loss to be unreasonable.
G) Individually Attributable Loss (Crawford, Merin, and Smith)
Crawford, Merin, and Smith argue that the District Court erred in attributing the
entire loss of the conspiracy to them individually. Under the Guidelines, the loss caused
by one conspirator may be attributed to another conspirator if the loss resulted from
―reasonably foreseeable acts and omissions . . . in furtherance of the jointly undertaken
criminal activity.‖ U.S.S.G. § 1B1.3(a)(1)(B). As we have previously explained, this
requires that the acts of the other conspirator(s) be ―(1) in furtherance of the jointly
undertaken activity; (2) within the scope of the defendant‘s agreement; and (3)
reasonably foreseeable in connection with the criminal activity the defendant agreed to
undertake.‖ United States v. Duliga, 204 F.3d 97, 100 (3d Cir. 2000). The mere fact that
the defendant played a ―substantial‖ role is not sufficient. United States v. Collado, 975
F.2d 985, 995 (3d Cir. 1992). Instead, we must determine the scope of the joint criminal
activity agreed to by the defendant, and assess whether the acts of others were
foreseeable from that vantage point. Duliga, 204 F.3d at 100; Collado, 975 F.2d at 995.
23
1) Loss Attributable to Smith
Smith argues that the District Court erred by attributing to him the $54,600 in
losses suffered by M&T Bank and PNC Bank. Smith bases this argument on the fact that
he was acquitted of the bank fraud charges involving these two banks. While Smith‘s
claim fails for several reasons, we address only one of them here. Because Smith failed
to raise this argument below, he must demonstrate plain error to prevail, which he clearly
cannot do. See United States v. Olano, 507 U.S. 725, 731–32 (1993). Even if we were to
assume that the District Court erred by attributing the M&T and PNC Banks‘ losses to
Smith, this would have no impact on the fourteen-level enhancement that Smith received
for causing a loss exceeding $400,000. As detailed above, the District Court reasonably
estimated that the total loss caused by the conspiracy was $789,665. Since a reduction by
$54,600 would not have placed the loss below $400,000, Smith‘s sentence was not
affected by the alleged error.
2) Loss Attributable to Merin
Merin argues that a maximum of $50,000 in losses can be attributed to him.
Merin derives this estimate by calculating the losses that resulted from the transactions
involving the twenty social security numbers he provided to White and Norman.
According to Merin, these transactions were the ―only evidence‖ linking him to the
conspiracy, as ―no evidence‖ demonstrated his awareness ―of any of the other Defendants
or any of the other transactions at any of the other banks.‖ As the District Court noted,
however, there is plenty of other evidence linking Merin to the conspiracy, including,
24
inter alia: testimony from Kelly Taylor that Merin assisted her and White in some of the
check-runs; records showing that Merin called Commerce Bank nineteen times and
Wachovia Bank five times during the span of the conspiracy (despite not having an
account at either bank); records showing Merin accessed Dax Enterprise‘s account on
Commerce Bank‘s automated phone system moments before Mike Dicero fraudulently
passed a check involving the Dax Enterprise account; statements from Decero that Merin
assisted him with fraudulent cash-checking activities; and the discovery of documents at
Rah‘s Fashion Boutique that suggest a link between the defrauding of Dax Enterprise and
the larger conspiracy. The District Court also emphasized phone records showing that
Merin had at least 314 phone calls with White, 178 phone calls with Norman, 128 phone
calls with Crawford, and 6 phone calls with Smith during the course of the conspiracy.
As noted by the District Court, it is difficult to believe that the sale of twenty social
security numbers required more than 620 phone calls over a twelve-month period.
In his appeal, Merin does not acknowledge or make an attempt to counter the
District Court‘s analysis. Instead, he simply repeats his claim that his ―only
involvement‖ with the conspiracy was his sale of the twenty social security numbers.
Accordingly, we will affirm the District Court‘s determination, as we can find no clear
error in its conclusion that Merin was ―aware of the scope and purpose‖ of the
conspiracy, that his conduct ―contributed significantly‖ to its success, and that the acts of
the co-conspirators were ―entirely foreseeable and within the scope of the criminal
activity that Merin agreed to undertake.‖
25
3) Loss Attributable to Crawford
Crawford argues that the District Court erred in attributing to him the losses
caused by the drive-through scheme. According to Crawford, the most the government
could prove was that he helped provide false identifications and clothes to check-runners
involved in the walk-in scheme. As we have already discussed, however, the walk-in and
drive-through operations do not represent multiple conspiracies, but merely different
schemes within the same conspiracy. Moreover, even if this distinction were somehow
relevant here, the record contradicts Crawford‘s claim that he was only involved with
walk-ins. As the District Court noted, the documents seized from Crawford‘s store
―contained templates for fake checks, which were used during drive-through runs.‖
Crawford‘s store also contained documents linking him to the defrauding of Dax
Enterprise, which was based entirely on drive-through frauds. In his appeal, Crawford—
like Smith and Merin—simply repeats the argument he made before the District Court
without countering the District Court‘s analysis. Since we find persuasive the District
Court‘s factual basis for rejecting Merin‘s argument, we will affirm.
H) Enhancement for Sophisticated Means (Smith)
We turn now to Smith‘s claim that the District Court erred by assigning a two-
level enhancement because the instant offense involved ―sophisticated means‖ per
U.S.S.G. § 2B1.1(b)(10). Smith argues that this enhancement was not deserved because
―the persons involved in the conspiracy . . . did nothing more complicated than pretend to
be people they were not.‖ We disagree. Smith and his conspirators trained a network of
26
check-runners and created numerous false identifications and counterfeit checks in a
sufficiently convincing manner to evade detection from four major financial institutions
despite hundreds of transactions in which the appellants collected over $780,000. As
other federal circuit courts have previously held, ―[r]epetitive and coordinated conduct,
though no one step is particularly complicated, can be a sophisticated scheme.‖ United
States v. Finck, 407 F.3d 908, 915 (8th Cir. 2005) (citing United States v. Jackson, 346
F.3d 22, 25 (2d Cir. 2003) and United States v. Rettenberger, 344 F.3d 702, 709 (7th Cir.
2003)); see also United States v. Lewis, 93 F.3d 1075, 1083 (2d Cir. 1996) (upholding
enhancement even though ―each step in the planned tax evasion was simple, [because]
when viewed together, the steps comprised a plan more complex than merely filling out a
false tax return‖). It is also worth noting that this Court has previously upheld a
sophisticated means-enhancement for a fraudulent tax scheme arguably much less
elaborate than the instant one. See United States v. Saybolt, 577 F.3d 195, 197–98 & n.1
(3d Cir. 2009). Accordingly, we find no error in the District Court‘s factual
determination.
I) Criminal History Score (Smith)
Smith argues that the District Court erred in determining his criminal history
score. Smith, who was assigned seven criminal history points, contends that the District
Court erred in assigning three of these criminal history points: one point for a prior
prostitution offense, and two points for a DUI sentence that Smith claims was suspended.
The government concedes that it was plain error to assign a point for the prostitution
27
offense, but not an error to assign the two points for the DUI sentence. We agree that it
was plain error to assign a point for the prostitution offense.
Under the Guidelines, criminal history points are only assigned for a prior
prostitution offense if the offense resulted in ―a term of probation of more than one year
or a term of imprisonment of at least thirty days,‖ or if the offense was similar to the
instant offense. U.S.S.G. § 4A1.2(c)(1). Here, Smith‘s prostitution offense only resulted
in a fine of $300 plus court costs, and is not similar to the instant offense. It was thus
incorrect for the District Court to assign the point. Because the addition of the point
increased Smith‘s criminal history category from III to IV, the error prejudiced Smith.
Accordingly, we will remand so that Smith‘s criminal history score can be reduced to six.
Although Smith also argues that the District Court erred in assigning two points
for his DUI sentence, this claim is meritless. A district court must assign two points for a
prior sentence where the maximum sentence imposed was at least sixty days but not more
than thirteen months. Id. §§ 4A1.1(b), 4A1.2(b). Here, the PSR states that Smith ―was
sentenced to a term of imprisonment of not less than 48 hours nor more than 12 months.‖
While Smith claims the sentence was suspended, he did not present any evidence to
substantiate this claim. Accordingly, the District Court did not err by relying on the
information in the PSR. See United States v. Campbell, 295 F.3d 398, 407 (3d Cir. 2002)
(ruling that sentencing court ―did not need to make a further inquiry‖ into facts in PSR
28
where defendant failed to present ―any evidence . . . cast[ing] doubt‖ on PSR‘s
accuracy).17
J) Downward Departure (Smith)
Smith also argues that the District Court erred in refusing to grant a downward
departure under U.S.S.G. § 4A1.3. Because it is clear from the record, however, that the
District Court knowingly declined to exercise its discretion to grant this departure, we
have no jurisdiction to review the claim. See United States v. King, 604 F.3d 125, 141
n.9 (3d Cir. 2010).
K) Reasonableness of Sentence (Smith & White)
Finally, both Smith and White argue that the District Court imposed a
substantively unreasonable sentence by failing to adequately consider the 18 U.S.C. §
3553(a) factors. However, because we have found procedural error in this case, we need
not consider arguments about substantive reasonableness at this juncture. See United
States v. Merced, 603 F.3d 203, 214 (3d Cir. 2010) (―If the district court commits
procedural error, our preferred course is to remand the case for re-sentencing, without
going any further.‖).
17
Even if the District Court did err, it would not constitute plain error since Smith‘s
criminal history category would still be III.
29
IV.
To summarize, we will affirm the judgments of conviction, but vacate the
sentences of all appellants so that, on remand, the District Court can reconsider its
determination of both the number of victims and appellant Smith‘s criminal history score.
30