COURT OF APPEALS OF VIRGINIA
UNPUBLISHED
Present: Chief Judge Decker, Judges Humphreys and Friedman
Argued at Lexington, Virginia
MELVIN AVON THOMAS
MEMORANDUM OPINION* BY
v. Record No. 0613-21-3 JUDGE FRANK K. FRIEDMAN
AUGUST 16, 2022
COMMONWEALTH OF VIRGINIA
FROM THE CIRCUIT COURT OF AUGUSTA COUNTY
W. Chapman Goodwin, Judge
Dana R. Cormier (Dana R. Cormier, P.L.C., on brief), for appellant.
Timothy J. Huffstutter, Assistant Attorney General (Jason S.
Miyares, Attorney General, on brief), for appellee.
The Augusta County Circuit Court convicted appellant of conspiracy to commit grand
larceny and two counts of grand larceny, in violation of Code §§ 18.2-22 and 18.2-95,
respectively, following a February 2021 bench trial. The court sentenced appellant to a total of
fifteen years of incarceration with eight years and six months suspended. On appeal, appellant
argues that the trial court erred in admitting evidence of “other crimes” that occurred in Hagerstown,
Maryland, Hanover, Virginia, and Campbell County, Virginia. He also asserts that the trial court
erred in admitting certain business records because they lacked sufficient indicia of trustworthiness.
Finally, appellant challenges the sufficiency of the evidence to sustain his convictions.
This case provides a stark reminder that our lives are constantly “tracked” via our cell
phones, GPS devices, and social media postings. Appellant, Melvin Avon Thomas, left a trail of
*
Pursuant to Code § 17.1-413, this opinion is not designated for publication.
evidence in the ether that abundantly supports his convictions. The question at hand is whether the
evidence against him was reliable and properly admitted at trial.
BACKGROUND
In accordance with familiar principles of appellate review, we state the facts “in the light
most favorable to the Commonwealth, the prevailing party at trial.” Gerald v. Commonwealth, 295
Va. 469, 472 (2018) (quoting Scott v. Commonwealth, 292 Va. 380, 381 (2016)). In doing so, we
discard any of appellant’s conflicting evidence, and regard as true all credible evidence favorable to
the Commonwealth and all inferences that may reasonably be drawn from that evidence. Id. at 473.
The Augusta County Heist Underlying Appellant’s Convictions
On the night of December 28, 2018, surveillance cameras recorded the theft of property
from the Beverage Tractor dealership in Augusta County, Virginia. At approximately 8:30 p.m.,
two men wearing dark clothing walked onto the lot and loaded a tractor on one trailer and two
Kubota skid steers onto another trailer.1 The men then departed in two white pickup trucks stolen
from the premises, a Dodge and a Ford F-350, each bearing the dealership’s logo and towing a
trailer. Collectively, the stolen property totaled $150,000 in value.
The Dodge that was taken was equipped with a GPS tracking device that recorded its
movements. The GPS data revealed that, immediately after the theft, the Dodge traveled north
along Interstate 81 before stopping at a gas station in New Market, Virginia at approximately
10:01 p.m. Surveillance video from the gas station depicted the suspects fueling one of the stolen
trucks after using cash to pay for gas. The truck displayed the Beverage Tractor dealership logo and
towed a trailer, although its load was outside of view. After leaving the gas station, the Dodge
1
A skid steer is a small, cabbed, rigid-framed, engine-powered piece of equipment with
lift arms that can connect to a wide variety of labor-saving tools or attachments. A skid steer can
perform a variety of functions ranging from moving, carrying, and loading materials to digging,
grading, and trenching operations.
-2-
continued traveling north on Interstate 81 before stopping on the shoulder at 10:48 p.m. The
following morning, on December 29, police discovered the truck abandoned near mile marker 296.
The trailer with the two Kubota skid steers was still attached and had a flat tire. Police did not
immediately locate the other stolen truck or equipment.
“Other Crimes” and the Related Police Investigation
In the early morning hours—at 3:08 a.m. on December 29—following the Augusta County
theft, surveillance cameras recorded two men stealing a Kubota skid steer from a heavy equipment
dealership in Hagerstown, Maryland. The men loaded the equipment onto a trailer and towed it
away using a white pickup truck displaying the Beverage Tractor dealership logo.
On January 25, 2019, Hanover County Sheriff’s Investigator Matthew Gathright arrived at a
heavy equipment dealership in Hanover, Virginia in response to a reported “larceny of a Kubota
skid steer.” From his review of surveillance video from the incident,2 Gathright determined that the
perpetrators loaded the skid steer onto a trailer attached to the same Beverage Tractor pickup truck
that was used to commit the theft in Hagerstown, Maryland.
Two days later, on January 27, Maryland Detective Ryan Minnick received a call reporting
that appellant had attempted to sell the caller a stolen Kubota skid steer.3 The caller provided police
with appellant’s name, cell phone number, and the address of a lot in Bowie, Maryland where the
caller had inspected the stolen skid steer. Minnick traveled to the Bowie address the same day,
where he found the skid steer from the Hanover dealership on a trailer attached to the Ford F-350
2
The trial transcript reflects that the Commonwealth played a portion of surveillance
video depicting the theft. It appears from the record, however, that the Commonwealth never
introduced the video as an exhibit. Nonetheless, appellant did not challenge Gathright’s
testimony regarding the video’s contents.
3
At trial, the Commonwealth introduced a copy of an affidavit seeking a search warrant
for appellant’s Google subscriber data. Although the caller never testified at trial, the affidavit
contained the information he relayed to police. Appellant did not object to the admissibility of
the affidavit on hearsay or confrontation grounds.
-3-
pickup truck that was stolen from Beverage Tractor. Minnick could not confirm the origin of the
trailer, however, because its “VIN plate”4 had been removed; he also observed that the stolen Ford
displayed a Maryland license plate that was not registered to the vehicle.
The following day, police executed a search warrant at the Bowie, Maryland lot. Inside of a
camper on the property, Minnick found a box holding numerous documents containing appellant’s
name and contact information. A handwritten document resembling a lease listed appellant’s name,
the Bowie address, the name of the property’s landlord, and the landlord’s address. A letter from
December 2017 included appellant’s name and email address and identified a nearby residence in
Severn, Maryland as his home address. Other documents found on the Bowie, Maryland lot
included a 2017 bank statement, an expired vehicle registration, and insurance documents from
2018 which similarly contained appellant’s name and the same Severn, Maryland address. A 2017
repair invoice and a business card for a construction company found at the scene also displayed
appellant’s name and a cell phone number matching the number police obtained from the initial
caller who had notified police.5 On the opposite side of the lot, Minnick discovered a Ford F-150
pickup truck containing expired vehicle insurance and registration documents that listed appellant as
the truck’s registered owner and identified the same Severn, Maryland address as his residence.
In total, police discovered six vehicles, seven trailers, and two pieces of heavy equipment on
the Bowie lot. One of the vehicles, a stolen Ford F-450 tow truck, had been “re-painted black” from
its original color and was towing a sedan with a “punched out ignition.” Two other vehicles on the
lot also had “punched out” ignitions. Minnick ultimately determined that half of the vehicles on the
4
“VIN” is an acronym denoting “vehicle identification number.”
5
This cell phone number matched the number listed on the other documents found on the
Bowie lot bearing appellant’s name. Police later discovered that the same cell phone number
was linked to appellant’s Facebook and Google accounts.
-4-
premises were stolen. Other vehicles could not be identified because their VIN plates had been
removed.
On March 1, 2019, Jed Campbell reported the theft of a Kubota skid steer, a Ford F-250
pickup truck, and a trailer from his heavy equipment dealership in Campbell County, Virginia. The
stolen Ford had a GPS tracking device that recorded its location. From the vehicle’s GPS data,
Campbell County Sheriff’s Investigator Curtis Rice determined that the Ford left the dealership and
traveled north to a gas station following the theft. At 9:37 p.m., gas station surveillance cameras
recorded the Ford’s arrival as it towed the stolen equipment to a fuel pump. The truck’s driver and
sole occupant used cash to pay for gas and fueled the truck before driving away with the stolen
property. Rice developed appellant as a suspect in this Campbell County theft. Rice later used the
stolen Ford’s GPS location data to trace its route northward to an address in Baltimore, Maryland,
where he eventually “recovered” the stolen vehicle.
Phone Records, the Google “Geofence Warrant,” and Related Social Media Search Warrants
During his investigation, Gathright obtained a “Google geofence warrant” to identify
specific cellular devices that were in the vicinity of the dealerships in Augusta, Hagerstown, and
Hanover at the time of the thefts.6 In response, Google identified “two anonymized suspicious
device IDs that were in the immediate area of the three [dealerships] during the requested
6
According to Gathright, a “geofence” uses “GPS coordinates” to “set perimeters” around
specific locations of interest. In response to a geofence warrant, Google provides police with an
“itemized” list of “all devices that communicated with or probed the WiFi spots within the
‘geofence’” during a requested time frame.
While in recent years geofence warrants have been the subject of Fourth Amendment
debate, with concern expressed regarding their potential for overbreadth, here appellant does not
contest the validity of the Google geofence warrant, and we therefore do not address these
concerns. See, e.g., United States v. Chatrie, ___ F. Supp. 3d ___, ___ (E.D. Va. Mar. 3, 2022)
(finding a Google geofence warrant invalid where it did not establish particularized probable
cause to search every person within a particular area and warning that “[a]s Fourth Amendment
law develops in a slow drip, ‘technology [continues to] enhance[ ] the Government’s capacity to
encroach upon areas normally guarded from inquisitive eyes’” (quoting Carpenter v. United
States, 138 S. Ct. 2206, 2214 (2018))); cf. Matter of Search Warrant Application for Geofence
-5-
timeframe.” From that information, Gathright concluded that “the same device . . . was [present] at
all three of [the dealership] locations” during each theft. Gathright subsequently submitted a
“secondary search warrant” to Google requesting the identity of the subscriber associated with the
two “anonymized device IDs.” Google responded with business records identifying appellant as the
subscriber and disclosing his name, email address, and cell phone number.7
Gathright later forwarded appellant’s name and cell phone number to Virginia State Police
Trooper Jared Martin. Using that information, Martin identified a Facebook social media account
displaying photographs that matched known images of appellant. Martin subsequently submitted a
“preservation request” and a search warrant to Facebook “for any and all identifying information
related to that account.” In response, Facebook provided business records identifying appellant as
the account’s owner and disclosing his name, date of birth, email address, and cell phone number.8
In response to a subsequent search warrant seeking “account information” associated with
appellant’s cell phone number, Google disclosed appellant’s unique Google account number. At
trial, Martin testified that no other person or phone number was associated with that Google
account.
Martin obtained “a plethora of information” from Google pertaining to appellant’s Google
account and cell phone number, including GPS location data, internet search history data, map
Location Data Stored at Google Concerning an Arson Investigation, 497 F. Supp. 3d 345, 353
(N.D. Ill. 2020) (upholding a Google geofence warrant and noting that “the Fourth Amendment
does not deal in precision, but rather in probability” and that “the government must demonstrate
a fair probability that evidence of a crime will be located at a particular place, and a search
warrant need not be rooted in pinpoint accuracy”).
7
That information matched the identifying information found on the documents police
previously seized from the lot in Bowie, Maryland.
8
The subscriber information for the Facebook account and Google account was identical.
-6-
usage data, photographs, and videos. He also obtained appellant’s cell phone records, including
“call records” and “cell site data,” that “corresponded [to] the data from Google.”
Martin concluded from his review of the records that immediately prior to the Beverage
Tractor theft on December 28, 2018, appellant’s phone performed multiple internet searches for the
value of Kubota construction equipment, specific models of Kubota skid steers, the location of the
Beverage Tractor dealership, and other Kubota heavy equipment dealers in the area. At
approximately 10:15 p.m. on December 28, the phone searched for directions and navigated to
Hagerstown, Maryland; the phone also subsequently searched for directions to the Campbell County
dealership. Additionally, Martin discovered photographs taken at the Bowie, Maryland lot that
depicted appellant with heavy equipment. Police also found videos of appellant, including one
showing him holding large denominations of cash.
Police used appellant’s Google and telephone records to determine his cell phone’s location
at the time of the thefts. Virginia State Police Special Agent Travis Barr generated a series of slides
illustrating the phone’s movements and activities during each larceny. Barr testified that on the
night of the first theft, at 8:27 p.m. on December 28, 2018, appellant’s phone was within “67
meters” of Beverage Tractor. Appellant’s cell phone then traveled northward along Interstate 81
until, at 10:02 p.m., it arrived within “88 meters” of the New Market gas station.9 At 10:47 p.m.,
the phone traveled to within “3 meters” of mile marker 296 on Interstate 81.10 At the time of the
Hagerstown theft the following day, at 3:02 a.m. on December 29, appellant’s phone was within “72
9
That data coincided with the GPS data from the stolen Beverage Tractor Dodge, which
revealed that the truck traveled north along Interstate 81 until it stopped at the New Market gas
station at approximately 10:01 p.m., following the first theft.
10
This was the location where police discovered the stolen Beverage Tractor Dodge
abandoned by the highway on the morning after the first theft.
-7-
meters” of the Hagerstown dealership.11 Shortly after the theft, at 5:27 a.m., appellant’s phone was
within “1200 meters” of the Bowie, Maryland property. At 7:38 a.m., the phone was at appellant’s
Severn, Maryland address; the next day, it returned to the Bowie lot. Finally, Barr testified that at
4:06 a.m. on January 25, 2019, appellant’s phone traveled to the heavy equipment dealership in
Hanover County.
Thomas’ Arrest and Statements to Police
In June 2019, police arrested and interviewed appellant in Maryland. Appellant denied ever
traveling to Virginia and claimed that the cell phone number police attributed to him actually
belonged to his girlfriend.12
Relevant Rulings and Objections
The Commonwealth filed a motion in limine to obtain leave of court to introduce evidence
of the other unadjudicated thefts in Hagerstown, Maryland, Hanover, Virginia, and Campbell
County, Virginia as circumstantial evidence to establish a common plan or scheme and to establish
Thomas’ identity as the perpetrator of the Augusta County thefts from Beverage Tractor on
December 28, 2018. Thomas argued the “other crimes” (1) were not related to a specific, extrinsic
goal or plan, (2) were not sufficiently idiosyncratic to establish a common scheme, (3) did not
establish the identity of the perpetrators, and (4) did not have probative value outweighing their
prejudicial impact. The trial court rejected Thomas’ claims under Virginia Rule of Evidence
2:404(b) and admitted the evidence.
11
That data coincided with the time signature on the surveillance video from the
Hagerstown dealership, which indicated that the theft occurred there at 3:02 a.m. on December
29, 2018.
12
The cell phone number police attributed to appellant was the same one identified on
numerous documents as belonging to appellant and that was linked to appellant’s Facebook and
Google accounts.
-8-
At trial, Thomas also sought to exclude introduction of Google account information as a
business record after Google produced the record in response to a search warrant request. Thomas
contended the information was not trustworthy under Virginia Rule of Evidence 2:803(6). Again,
the trial court admitted the evidence.
At the conclusion of the Commonwealth’s case-in-chief, appellant moved to strike, arguing
that there was no proof of an agreement necessary to establish a conspiracy.13 The trial court found
that “there were at least two parties involved” in a “pretty coordinated operation.” The perpetrators
“went to the store the same way in each of the robberies,” proving that they “were involved in the
same crime” and “made plans” to commit it. Accordingly, the trial court denied the motion.
In closing argument, appellant argued the sufficiency of the evidence with respect to both
the conspiracy and larceny charges. Appellant first contended that the Commonwealth failed to
prove identity, arguing that although the evidence established that “a phone connected to a Google
account associated with [appellant]” was “in the vicinity” of the various thefts, it failed to prove that
appellant ever possessed the phone or any of the stolen items. Additionally, appellant argued that
“evidence of two people committing a crime together” is insufficient to prove “a pre-planned
agreement” necessary to establish conspiracy.
The trial judge, however, rejected these arguments. The court found that “there were a
minimum of two parties involved,” proving “an agreement between the parties” necessary for
conspiracy. The court also found that “the white truck from the [first theft] was clearly involved in
all of the robberies,” and appellant was “the only person tied to [the] phone” that was also “clearly
tied to all of the robberies” through “geotracking” evidence. Additionally, the court found that the
presence of documents bearing appellant’s identifying information proved his ownership or control
13
Appellant did not move to strike the grand larceny charges at the initial motion to
strike. The trial court, however, dismissed a related charge of grand larceny with intent to sell.
-9-
of the Bowie lot where much of the stolen property was located. Finally, the court found that
“there’s clearly evidence that the theft occurred” in Augusta County, “the value exceeded five
hundred dollars,” and the “totality of the circumstances” proved that appellant “committed the
crimes.”
This appeal follows.
ANALYSIS
I. Evidentiary Arguments
A. Standard of Review
“[W]e review a trial court’s decision to admit or exclude evidence using an abuse of
discretion standard and, on appeal, will not disturb a trial court’s decision to admit evidence
absent a finding of abuse of that discretion.” Kenner v. Commonwealth, 299 Va. 414, 423 (2021)
(quoting Avent v. Commonwealth, 279 Va. 175, 197 (2010)). “In evaluating whether a trial court
abused its discretion, . . . we do not substitute our judgment for that of the trial court. Rather, we
consider only whether the record fairly supports the trial court’s action.” Id. (quoting Carter v.
Commonwealth, 293 Va. 537, 543 (2017)). “The abuse-of-discretion standard [also] includes
review to determine that the discretion was not guided by erroneous legal conclusions.” Id.
(quoting Carter, 293 Va. at 543-44).
B. “Other Crimes” Evidence
The Commonwealth moved in limine to admit evidence of the thefts that occurred in
Hanover, Virginia, Campbell County, Virginia, and Hagerstown, Maryland, at appellant’s trial
for the Beverage Tractor thefts. The Commonwealth argued that the “other crimes” were
admissible as proof of a “common scheme or plan” and probative of appellant’s identity as the
perpetrator. Following briefing and argument, the trial court ruled in an opinion letter that the
evidence was admissible under Rule 2:404(b) to prove appellant’s identity. The court cited
- 10 -
Chichester v. Commonwealth, 248 Va. 311, 326 (1994) (quoting Spencer v. Commonwealth, 240
Va. 78, 89 (1990)), for the proposition that a defendant’s modus operandi is “competent
evidence where there is a disputed issue of identity.” The court concluded that the evidence was
admissible to prove identity because “a clear pattern exists with sufficient idiosyncrasies
showing the Defendant’s involvement with the theft in Augusta County.” The trial court also
ruled the evidence was admissible to show the existence of a common scheme or plan, finding
that “the evidence shows a common plan or scheme of stealing Kubota skid loaders and other
heavy equipment in Virginia and transporting them to Maryland to sell.”
On appeal, appellant contends that the trial court erred in granting the Commonwealth’s
motion in limine. Relying on Scott v. Commonwealth, 274 Va. 636 (2007), and Walker v.
Commonwealth, 289 Va. 410 (2016), appellant asserts that the other thefts were “not related to a
specific goal” necessary to establish a “common plan,” nor were they “sufficiently idiosyncratic”
to prove a “common scheme.” Moreover, appellant contends that the probative value of the
“other crimes” evidence was “insignificant when weighed against the prejudice” to him.
Generally, “evidence which shows or tends to show that the accused is guilty of other
crimes and offenses at other times, even though they are of the same nature as the one charged in
the indictment, is not admissible to show the accused’s commission of the particular crime
charged.” Kenner, 299 Va. at 424 (quoting Ortiz v. Commonwealth, 276 Va. 705, 714 (2008));
see also Va. R. Evid. 2:404(b) (barring evidence of prior bad acts to prove criminal propensity).
Rule 2:404(b) “explicitly allows” such evidence, however, “if its probative value outweighs its
incidental prejudice” and “if it tends to prove any relevant fact pertaining to the offense
charged,” including “where it is relevant to show motive, opportunity, intent, preparation, plan,
knowledge, identity, absence of mistake, accident, or if they are part of a common scheme or
- 11 -
plan.” Brooks v. Commonwealth, 73 Va. App. 133, 147 (2021) (emphasis added) (quoting Va.
R. Evid. 2:404(b)).
1. Common Schemes and Plans under Rule 2:404(b)
“[T]he terms ‘common scheme’ and ‘common plan’ are not synonymous.” Stickle v.
Commonwealth, 68 Va. App. 321, 339 (2017) (some internal quotation marks omitted) (quoting
Scott, 274 Va. at 651). “However, neither are they mutually exclusive.” Id. (citing Scott, 274
Va. at 646). “[A] series of crimes may exhibit both a common scheme and a common plan” and,
therefore, “it is possible for the same set of facts to meet both definitions.” Brooks, 73 Va. App.
at 142 (citing Scott, 274 Va. at 646).
A common plan is “a series of acts done with a relatively specific goal or outcome in
mind.” Walker, 289 Va. at 418 (quoting David P. Leonard, The New Wigmore: A Treatise on
Evidence § 9.2.2, at 572 (2009)). Such a goal “exists when the constituent offenses occur
sequentially or interdependently to advance some common, extrinsic objective.” Id. In Walker,
the Supreme Court explained that breaking into a bank president’s home to steal the bank keys in
order to rob the bank would exemplify a common plan. Id.
A “common scheme,” by contrast, is a series of “crimes that share features idiosyncratic
in character, which permit an inference that each individual offense was committed by the same
person or persons as part of a pattern of criminal activity involving certain identified crimes.”
Cousett v. Commonwealth, 71 Va. App. 49, 58 (2019) (citing Scott, 274 Va. at 645). The
possible range of idiosyncratic features that may prove a “common scheme” is very broad.
Brooks, 73 Va. App. at 143 (citing Scott, 274 Va. at 647); see also Walker, 289 Va. at 416
(“[O]ffenses may be considered parts of a common scheme or plan when they are ‘closely
connected in time, place, and means of commission.’” (quoting Satcher v. Commonwealth, 244
Va. 220, 229 (1992))). “However, the Commonwealth’s evidence regarding idiosyncratic
- 12 -
features must permit an inference of a pattern of criminal activity by the same person; mere
general similarities common to all offenses of the same type are insufficient.” Brooks, 73
Va. App. at 143 (citing Scott, 274 Va. at 646).
In Scott, the Supreme Court reversed a trial court’s joinder of nine separate robberies in a
single trial based on the premise that each offense constituted part of a “common scheme or
plan.” 274 Va. at 639-40. Each robbery occurred at night in the same city within a four-month
period and involved a single robber threatening a victim with a gun. Id. at 646. The Supreme
Court declined to find a “common scheme,” holding that the evidence proved “only separate
crimes of the same type that share features that are likely similar to numerous other robbery
offenses.” Id. at 647. The Court also declined to find a “common plan,” holding that “the
evidence completely lacked any proof that the offenses were related to one another for the
purpose of accomplishing a particular goal.” Id.
Similarly, in Walker, the Supreme Court reversed a trial court’s joinder of four drug
distribution charges where the defendant dealt drugs four times in the same neighborhood within
a thirteen-day period. 289 Va. at 419. The Court held that evidence that the defendant dealt the
drugs the same way, in the same area, and within a short time frame was insufficient to establish
a “common scheme” or modus operandi. Id. at 416. The Court also held that the
Commonwealth failed to establish a “common plan,” concluding that nothing proved that the
defendant had a “particular goal” that was “not obtainable by the commission of any of the
individual offenses.” Id. at 417.
Thus, Scott and Walker involved a series of repetitive, but individual, “stick-ups” and
drug sales that did not evidence a common undertaking. By contrast, in Brooks, we affirmed a
trial court’s joinder of six counts of grand larceny with intent to sell where each crime was part
of both a “common scheme” and a “common plan.” 73 Va. App. 133. Six times during a
- 13 -
four-month period, a thief stole rims and tires from “late-model” trucks parked overnight in
residential driveways, leaving the trucks behind on cinder blocks. Id. at 139-40. Any time a
truck was equipped with “lug nut locks,” the thief broke a window to access “lug nut lock keys”
inside the truck before removing its rims and tires. Id. GPS geolocation data from the
defendant’s truck established its presence at each theft. Id. at 140. Police found business cards
advertising the defendant’s tire re-sale business inside his apartment and storage unit. Id. The
“idiosyncratic features between the crimes” established a “common scheme” because they were
“more than general similarities common to all larcenies.” Id. at 144. Further, we held that each
theft was “committed in furtherance of [the defendant’s] common goal to steal tires and rims to
supply his business inventory,” proving a “common plan.” Id. at 144-45. We find the facts of
the instant case are analogous to those considered in Brooks, and are distinguishable from those
of Scott and Walker.
2. The “Other Crimes” Evidence was Properly Admitted under Rule 2:404(b)
a. The “Other Crimes” Evidence Tended to Prove Relevant Facts
Pertaining to the Offenses Charged
The commonalities and idiosyncratic similarities between the “other crimes” evidence
and the Augusta larcenies support the trial court’s ruling admitting the “other crimes” evidence
under the “common scheme or plan” exception to Rule 2:404(b).
First, the thefts in this case shared a constellation of “idiosyncratic” features establishing
a “common scheme.” Cousett, 71 Va. App. at 58 (citing Scott, 274 Va. at 645). Just as the thief
in Brooks exclusively burglarized “late-model” trucks parked overnight in residential driveways,
73 Va. App. at 139-40, the thieves here specifically targeted Kubota dealerships at night.
Additionally, just as GPS data placed the defendant’s truck at each theft in Brooks, 73 Va. App.
at 140, similar data proved that appellant’s cell phone was present during the thefts at the
Augusta County, Hagerstown, and Hanover dealerships and had searched for directions to the
- 14 -
Campbell County dealership before the fourth theft. In each theft, two men loaded skid steers
onto trailers already located on-site and used stolen pickup trucks to haul the equipment to
Maryland, paying cash for gas along the way. The thieves used the same pickup truck stolen
from Beverage Tractor to perpetrate the subsequent thefts in Hagerstown and Hanover.
Collectively, that evidence supports the trial court’s finding that each crime was part of a
“common scheme.”14
“Identity” and “common scheme” are listed as separate factors in Rule 2:404(b), but their
analysis is related. Commonalities among “other crimes” evidence can be relevant to prove
identity, typically through establishing a modus operandi. See Turner v. Commonwealth, 259
Va. 645, 651 (2000). The Supreme Court has held that “evidence of other crimes, to qualify for
admission as proof of modus operandi, need not bear such an exact resemblance to the crime on
trial as to constitute a ‘signature.’ Rather, it is sufficient if the other crimes bear ‘a singular
strong resemblance to the pattern of the offense charged.’” Spencer, 240 Va. at 90 (quoting
United States v. Hudson, 884 F.2d 1016, 1021 (7th Cir. 1989)).
In Brooks, this Court found that the perpetrator exhibited a distinctive modus operandi,
leaving vehicles on cinder blocks and breaking windows to access “lug nut keys” where
necessary. 73 Va. App. at 139-40. Here, as in Brooks, the evidence revealed a unique execution
method. In each theft, two men loaded skid steers onto trailers already located on site and used
stolen pickup trucks to haul the equipment to Maryland, paying cash for gas along the way.
Notably, the thieves used the same pickup truck stolen from Beverage Tractor to perpetrate the
14
The record in this case is much closer on the question of whether the Commonwealth
established that each theft occurred “sequentially or interdependently to advance some common,
extrinsic objective” proving a “common plan.” Walker, 289 Va. at 418. The exception under
Rule 2:404(b) involves a “common scheme or plan.” Having already found that a common
scheme was established, we need not address the common plan analysis. See Abdo v.
Commonwealth, 64 Va. App. 468, 473 n.1 (2010) (ruling on best and narrowest ground
available).
- 15 -
subsequent thefts in Hagerstown and Hanover. Thus, the other crimes “bear a singular strong
resemblance to the pattern of” the Augusta County theft and are “sufficiently idiosyncratic to
permit an inference of pattern for purposes of proof.” Scott, 274 Va. at 645. The trial court did
not abuse its discretion in finding that the other crimes evidence was relevant and probative here.
b. The Trial Court Did Not Abuse its Discretion in Finding that the
Probative Value of the “Other Crimes” Evidence Outweighed its
Prejudice to Appellant and was Admissible
Appellant contends that, even assuming that the “other crimes” evidence was relevant
under Rule 2:404(b), it remained inadmissible because its prejudice to appellant outweighed its
probative value. “In addition to being relevant and material, other crimes evidence ‘is subject to
the further requirement that the legitimate probative value of the evidence must exceed its
incidental prejudice to the defendant.’” Kenner, 299 Va. at 427 (quoting Rose v.
Commonwealth, 270 Va. 3, 11 (2005)). Accord Va. R. Evid. 2:404(b) (stating the requirement
that “the legitimate probative value of such proof outweighs its incidental prejudice”). “The
responsibility for balancing the two considerations rests in the trial court’s discretion and we will
not disturb the trial court’s determination in the absence of a clear abuse of discretion.” Kenner,
299 Va. at 427 (citing Ortiz, 276 Va. at 715; Spencer, 240 Va. at 90).
“[O]ther crimes evidence is, by its nature, highly prejudicial to an accused.” Wilson v.
Commonwealth, 16 Va. App. 213, 220 (1993) (quoting Kirkpatrick v. Commonwealth, 211 Va.
269, 272 (1970)). “[I]n a jury trial, the introduction of inadmissible evidence of another crime
. . . ‘confuses one offense with the other, . . . and, by showing that the accused has a criminal
propensity, tends to reverse [the] presumption of innocence.’” Purvis v. Commonwealth, 31
Va. App. 298, 308 (2000) (quoting Godwin v. Commonwealth, 6 Va. App. 118, 123 (1988)).
“However, the mere fact that a jury may consider evidence of a defendant’s guilt for
multiple offenses does not automatically constitute unfair prejudice . . . .” Brooks, 73 Va. App.
- 16 -
at 146. “If the evidence is also relevant to a contested issue in the case and otherwise admissible
. . . the evidence of other crimes, while certainly prejudicial, is not unfairly so.” Id. (emphasis
added) (citing Winston v. Commonwealth, 32 Va. App. 864, 872 (2000)). “The danger of unfair
prejudice can also be mitigated by an instruction to the jury that limits its consideration of other
crimes evidence to its proper purposes and application to each offense charged.” Id. at 148.
Moreover, in a bench trial, as occurred here, “the trial judge is presumed to disregard prejudicial
or inadmissible evidence, and this presumption will control in the absence of clear evidence to
the contrary.” Pierce v. Commonwealth, 50 Va. App. 609, 616 (2007).
Here, the Commonwealth established that the “other crimes” evidence tended to prove
relevant facts pertaining to the offense charged: namely, a common scheme and the perpetrator’s
identity. The “other crimes” evidence addressed a matter genuinely in dispute, Barlow v.
Commonwealth, 26 Va. App. 421, 428 (1998), and was not utilized unfairly to suggest the
defendant had a propensity to commit crimes.15 Similarly, the danger of prejudice from any
“propensity inference” is diminished here in a bench trial.16 Accordingly, we find that the trial
court did not abuse its discretion in balancing the probative value and prejudice of the “other
crimes” evidence and admitting it at trial.
15
Where evidence of other crimes fails to support a fact genuinely in dispute, the
evidence should not be admitted. Guill v. Commonwealth, 255 Va. 134, 138-39 (1998)
(reversing conviction where evidence introduced was irrelevant to intent). Similarly, where
tangential other crimes evidence seems calculated to inflame the passion of the jury, the evidence
is properly excluded. Cain v. Lee, 290 Va. 129, 137-38 (2015) (upholding exclusion of evidence
of a subsequent DUI charge that was calculated to stoke prejudice).
16
Again, we presume that the judge who presided as fact finder at appellant’s trial
“disregard[ed] prejudicial or inadmissible evidence,” as the record is devoid of “clear evidence to
the contrary.” Pierce, 50 Va. App. at 616. That presumption mitigates the “danger of unfair
prejudice” to appellant resulting from admission of the “other crimes” evidence. See Brooks, 73
Va. App. at 148 (holding that limiting instruction to jury could mitigate “danger of unfair
prejudice” from admitting “other crimes” evidence); cf. Wilson, 16 Va. App. at 223-24 (declining
to presume trial court disregarded prejudicial evidence where it “erroneously and
unconditionally” admitted evidence of prior drug distribution).
- 17 -
C. The Trial Court Did Not Abuse its Discretion in Admitting the Google Records
under the Business Records Exception to Hearsay
Appellant next contends that the trial court erred in admitting the Google records at trial
because they lacked sufficient indicia of trustworthiness for admission under the business records
exception to hearsay.
At trial, the Commonwealth sought to introduce a “Certificate of Authenticity” and
accompanying letter that Google provided in response to Gathright’s “secondary search warrant”
requesting subscriber information for the two “suspicious device IDs” present at each theft.
Appellant objected, arguing that the return was not admissible under the business records
exception to hearsay because the documents lacked sufficient indicia of trustworthiness.
Appellant argued that because neither document from Google explicitly referenced the two
device IDs identified in the search warrant, there was “nothing on the Google response which
would be a business record to connect it to the device.” Appellant stipulated that the search
warrant “requested specific information pertaining to a specific device” and that “Google
produced a certified business record for Google information pertaining to [appellant],” but
maintained that “Google may have made a mistake.”
Google’s letter accompanying the records certification did not explicitly reference the
two anonymized device IDs. It explained, however, that “the Device ID (or device tag) is not a
valid target identifier that can otherwise be used to search for information.” Rather, “[t]he
Device ID is used only for distinguishing unique devices in a particular user’s location history.”
Therefore, “Google has only provided basic subscriber information . . . for the requested
devices.” (Emphasis added).
Additionally, the “Certificate of Authenticity” expressly stated that the records were
certified by a proper custodian, that “Google servers record this data automatically at the time, or
reasonably soon after, it is entered or transmitted by the user,” and that “this data is kept in the
- 18 -
course of this regularly conducted activity and was made by regularly conducted activity as a
regular practice of Google.” The certification also states that the record is a “true duplicate of
original records that were generated by Google’s electronic process or system that produces an
accurate result” and that Google “regularly verifie[s]” the “accuracy of [its] electronic process
and system.”
Gathright also testified regarding the typical protocol for obtaining Google records,
stating that “[w]hen [police] request information in reference to the anonymized [device]
number, [Google] respond[s] back with the subscriber information for the device i.d.’s that we
requested.” He confirmed that he received the letter and “Certificate” from Google in response
to his search warrant. The trial court accepted that testimony and ruled that the return was
admissible, finding that Google’s response “came back in the ordinary course of business.”
Appellant does not dispute that the records were otherwise admissible under the business
records exception to hearsay. Rather, appellant’s sole contention is that the documents lacked
sufficient “indicia of trustworthiness” to qualify under the exception because neither document
from Google explicitly referenced the two device IDs identified in the search warrant.
Rule 2:803(6) permits the introduction of business records at trial as an exception to
hearsay if certain preconditions are satisfied17 and “neither the source of information nor the
17
Rule 2:803(6) provides that “[a] record of acts, events, calculations, or conditions” if
the following criteria are satisfied:
(A) the record was made at or near the time of the acts, events,
calculations, or conditions by--or from information transmitted
by--someone with knowledge;
(B) the record was made and kept in the course of a regularly
conducted activity of a business, organization, occupation, or
calling, whether or not for profit;
(C) making and keeping the record was a regular practice of that
activity;
- 19 -
method or circumstances of preparation indicate a lack of trustworthiness.” Va. R. Evid.
2:803(6)(E). In Melick v. Commonwealth, 69 Va. App. 122, 142 (2018), we observed that Rule
2:803(6)(E) is the “final condition necessary to establish that a document falls within the
business records exception” and “is essentially an overarching check on the exception.” “Thus,
if there is some reason to doubt the trustworthiness of the source of the information or the
circumstances of its preparation, the record will not fall within the exception even if the other
requirements of Rule 2:803(6) have been established.” Id. At the same time, “[t]he
trustworthiness or reliability of the records is guaranteed by the regularity of their preparation
and the fact that the records are relied upon in the transaction of business by the person or
entities for which they are kept.” Frank Shop v. Crown Cent. Petroleum Corp., 261 Va. 169, 175
(2001).
Here, while Thomas asserts the records could be erroneous, he offers no concrete “reason
to doubt the trustworthiness” of the Google records. Melick, 69 Va. App. at 142. Although the
Google letter did not explicitly reference the two anonymized device IDs, it explained why and
disclosed the information “for the requested devices” in reference to Gathright’s search warrant,
which did expressly identify the two specific device IDs. Gathright also confirmed that he
received Google’s response in a manner consistent with typical protocol. Finally, Google’s
business records certification clearly established “the regularity of [the records’] preparation and
the fact that the records are relied upon in the transaction of business by the person or entities for
which they are kept.” Frank Shop, 261 Va. at 175. Appellant has thus failed to identify anything
(D) all these conditions are shown by the testimony of the
custodian or another qualified witness, or by a certification that
complies with Rule 2:902(6) or with a statute permitting
certification; and
(E) neither the source of information nor the method or
circumstances of preparation indicate a lack of trustworthiness.
- 20 -
in the record that “indicate[s] a lack of trustworthiness” of the Google records, either regarding
“the source of information” or “the method or circumstances of preparation.” Va. R. Evid.
2:803(6)(E). Accordingly, we cannot say that the trial court abused its discretion in admitting
the records. See Melick, 69 Va. App. at 144 (affirming admission of business records where the
certification and supporting testimony established their trustworthiness).
Appellant’s complaints about the absence of device ID numbers on the Google records
are “relevant to the trier of fact’s assessment of its weight rather than its admissibility.” Church
v. Commonwealth, 71 Va. App. 107, 122-23 (2019) (citing Kettler & Scott, Inc. v. Earth Tech.
Cos., 248 Va. 450, 459 (1994) (noting that once the “threshold for proving admissibility has been
met, any gaps in the evidence are relevant to the trier of fact’s assessment of its weight
rather than its admissibility”)). It is well-established that “[t]he weight which should be given to
evidence” is a question “which the fact finder must decide.” Bridgeman v. Commonwealth, 3
Va. App. 523, 528 (1986). We will not overturn the trial court’s admission of the evidence here.
II. Sufficiency of the Evidence
Appellant argues that the evidence was insufficient to prove grand larceny and conspiracy
to commit grand larceny. He asserts that the Commonwealth proved merely that a “cell phone
using a number associated with [appellant]” was “in the vicinity” of the dealerships “at the time
of the thefts.” Appellant contends that the Commonwealth failed to prove his identity as the
perpetrator because no evidence proved his possession of either the cell phone or any stolen
property. Second, he argues that there was no evidence of “any agreement” to commit the thefts
as required to prove conspiracy.
A. Standard of Review
“When reviewing the sufficiency of the evidence, ‘[t]he judgment of the trial court is
presumed correct and will not be disturbed unless it is plainly wrong or without evidence to support
- 21 -
it.’” McGowan v. Commonwealth, 72 Va. App. 513, 521 (2020) (alteration in original) (quoting
Smith v. Commonwealth, 296 Va. 450, 460 (2018)). “In such cases, ‘[t]he Court does not ask itself
whether it believes that the evidence at the trial established guilt beyond a reasonable doubt.’” Id.
(alteration in original) (quoting Secret v. Commonwealth, 296 Va. 204, 228 (2018)). “Rather, the
relevant question is whether ‘any rational trier of fact could have found the essential elements of the
crime beyond a reasonable doubt.’” Vasquez v. Commonwealth, 291 Va. 232, 248 (2016) (quoting
Williams v. Commonwealth, 278 Va. 190, 193 (2009)). “If there is evidentiary support for the
conviction, ‘the reviewing court is not permitted to substitute its own judgment, even if its opinion
might differ from the conclusions reached by the finder of fact at the trial.’” McGowan, 72
Va. App. at 521 (quoting Chavez v. Commonwealth, 69 Va. App. 149, 161 (2018)).
B. The Evidence was Sufficient to Uphold Appellant’s Convictions for Grand Larceny
“At trial, the Commonwealth bears the burden of proving the identity of the accused as
the perpetrator beyond a reasonable doubt.” Cuffee v. Commonwealth, 61 Va. App. 353, 364
(2013) (quoting Blevins v. Commonwealth, 40 Va. App. 412, 423 (2003)). As with any element
of an offense, identity may be proved by direct or circumstantial evidence. Crawley v.
Commonwealth, 29 Va. App. 372, 375 (1999). “Circumstantial evidence is as competent and is
entitled to as much weight as direct evidence, provided it is sufficiently convincing to exclude
every reasonable hypothesis except that of guilt.” Holloway v. Commonwealth, 57 Va. App. 658,
665 (2011) (quoting Coleman v. Commonwealth, 226 Va. 31, 53 (1983)). “Circumstantial
evidence is not viewed in isolation.” Id. (quoting Commonwealth v. Hudson, 265 Va. 505, 513
(2003)). “While no single piece of evidence may be sufficient, the combined force of many
concurrent and related circumstances . . . may lead a reasonable mind irresistibly to a
conclusion.” Pijor v. Commonwealth, 294 Va. 502, 512-13 (2017) (quoting Muhammad v.
Commonwealth, 269 Va. 451, 479 (2005)).
- 22 -
Here, the Commonwealth presented overwhelming evidence identifying appellant as the
criminal agent. First, the geolocation and cellular data from appellant’s cell phone established
appellant’s opportunity to commit the crimes. Police obtained appellant’s cell phone number
from the initial call informing police of the attempted sale of the stolen goods and then, upon
checking the Bowie, Maryland lot, they discovered personal documents displaying appellant’s
contact information. Police used this information to identify appellant’s Google account and
telephone records. Based on those records, investigators determined that appellant’s cell phone
was present at the Augusta County, Hagerstown, and Hanover dealerships during the thefts, each
of which occurred at night or in the early morning hours when no one would have a legitimate
reason to be at the dealerships. Moreover, investigators traced the phone’s movements to and
from the dealerships, the Bowie lot where police discovered stolen equipment, and appellant’s
residence in Severn, Maryland. Finally, investigators discovered that appellant’s phone searched
for directions to the Campbell County dealership prior to that theft.
Collectively, that testimony firmly supported the rational inference that appellant had the
opportunity to commit the thefts and did so. See Brooks, 73 Va. App. at 143 (affirming
defendant’s convictions for grand larceny where GPS location data established his truck’s
presence during each theft); see also Edwards v. Commonwealth, 68 Va. App. 284, 299 (2017)
(affirming first-degree murder conviction where defendant’s cell tower location records
established his presence at the crime scene at the time of victim’s murder).
Similarly, the Commonwealth presented significant evidence establishing appellant’s
unexplained, exclusive possession of recently stolen property from which the trial court could
infer appellant’s identity as the thief. See Archer v. Commonwealth, 26 Va. App. 1, 14 (1997)
(inferring defendant’s theft of a recently stolen firearm from his possession of it). A month after
the Beverage Tractor thefts, and only two days following the Hanover theft, a caller reported that
- 23 -
appellant attempted to sell him a skid steer at the Bowie lot that was stolen from Hanover. Upon
scouting the Bowie lot, police discovered the stolen Hanover skid steer on a trailer attached to
the Ford F-350 stolen from Beverage Tractor—the same vehicle that was used to perpetrate at
least three of the thefts.
Inside of a camper on the premises, police discovered a trove of documents bearing
appellant’s identifying information, including a document purporting to be a lease of the
premises. Police also discovered additional documents belonging to appellant in a vehicle on the
opposite side of the lot. That testimony supports the trial court’s finding that appellant owned or
controlled the premises where police uncovered the stolen property and, combined with the other
evidence in this case, it supports the conclusion that appellant possessed the stolen property.
See Albert v. Commonwealth, 2 Va. App. 734, 742 (1986) (holding that the evidence established
that the defendant possessed contraband that was near “his wallet, identification papers and a
bottle of prescribed medicine bearing his name”).
The trial court also could infer appellant’s consciousness of guilt from his affirmative
acts of falsehood and efforts at concealment. See Palmer v. Commonwealth, 14 Va. App. 346,
348‑49 (1992). At the Bowie lot, police found that the Ford F-350 stolen from Beverage Tractor
bore a Maryland license plate that was not registered to it. Police also discovered several other
stolen vehicles and pieces of construction equipment that had their VIN plates removed, and at
least one had been “re-painted” from its original color. A rational inference from that evidence
is that appellant attempted to disguise the stolen property in an effort to avoid police detection.
Additionally, following his arrest, appellant told police that he had never traveled to
Virginia and that the cell phone number police ascribed to him belonged to his girlfriend. Yet
overwhelming evidence established that the cell phone number belonged to appellant, and
geolocation records proved that his phone was present in Virginia on multiple occasions. The
- 24 -
phone also contained various indicia that it belonged to Thomas, including photographs and
videos. The phone was also linked to Thomas’ Facebook and Google accounts. The trial court
was entitled to reject appellant’s protests that the phone was not his. See Shackleford v.
Commonwealth, 262 Va. 196, 209 (2001).
In sum, the above evidence overwhelmingly established appellant’s identity as the
criminal agent.
C. The Evidence was Sufficient to Prove an Agreement Necessary to Establish Conspiracy
Finally, appellant argues that the evidence failed to prove that he conspired to commit the
thefts because there was no evidence of an agreement to do so.
“Conspiracy is defined as ‘an agreement between two or more persons by some concerted
action to commit an offense.’” Speller v. Commonwealth, 69 Va. App. 378, 389 (2018) (quoting
Wright v. Commonwealth, 224 Va. 502, 505 (1982)). “The Commonwealth may prove the
existence of a conspiratorial agreement by circumstantial evidence and need not prove an explicit
agreement.” Id. (citing Gray v. Commonwealth, 30 Va. App. 725, 736 (1999)). Thus, “a
conspiracy may be inferred from the overt actions of the parties.” McQuinn v. Commonwealth,
19 Va. App. 418, 425 (1994). “[W]here it is shown that the defendants by their acts pursued the
same object, one performing one part and the other performing another part so as to complete it
or with a view to its attainment,” a trial court may conclude that “they were engaged in a
conspiracy to effect that object.” Amato v. Commonwealth, 3 Va. App. 544, 552 (1987).
The record amply supports the trial court’s finding of an agreement. Each theft involved
two confederates collaborating to load Kubota skid steers onto company trailers and drive them
away to Maryland for illicit re-sale, “one performing one part and the other performing another
part.” Id. In fact, the truck stolen in Augusta County was subsequently used to perpetrate
similar thefts in the same manner.
- 25 -
In particular, the Beverage Tractor theft could not have been accomplished without two
participants—the theft involved two people working together to load heavy machinery onto
trailers and then hauling those trailers with two stolen pickup trucks. The surveillance video
from the Beverage Tractor lot shows the two accomplices walking together through the lot,
working together to maneuver the pickup trucks through the lot, and later the two trucks
following each other out of the lot while towing the stolen equipment. That evidence was
sufficient to prove an agreement necessary to establish conspiracy. See Speller, 69 Va. App. at
390 (affirming defendant’s conviction for conspiracy to commit burglary where eyewitnesses
saw three men enter the victim’s home together, remove property, and leave together).
CONCLUSION
For the foregoing reasons, we affirm appellant’s convictions.
Affirmed.
- 26 -