United States v. Mario Smith

United States Court of Appeals For the Eighth Circuit ___________________________ No. 12-2866 ___________________________ United States of America lllllllllllllllllllll Plaintiff - Appellee v. Mario Darnell Smith lllllllllllllllllllll Defendant - Appellant ____________ Appeal from United States District Court for the Eastern District of Missouri - St. Louis ____________ Submitted: January 18, 2013 Filed: June 6, 2013 ____________ Before BYE and MELLOY, Circuit Judges, and KOPF,1 District Judge. ____________ MELLOY, Circuit Judge. Appellant Mario Darnell Smith entered a conditional guilty plea to one count of bank fraud in violation of 18 U.S.C. § 1344, three counts of aggravated identity theft in violation of 18 U.S.C. § 1028A(a)(1), and one count of conspiracy in violation 1 The Honorable Richard G. Kopf, United States District Court for the District of Nebraska, sitting by designation. of 18 U.S.C. § 371. He now appeals the district court's2 denial of his motion to suppress. For the following reasons, we affirm. Background In May 2011, an individual posing as an AmerenUE employee started contacting U.S. Bank. The individual attempted to set up a "cash vault delivery" from an AmerenUE account at U.S. Bank. Cash vault delivery is a service that allows authorized customers to select locations for cash deliveries. The individual made all of his attempts either over the telephone or through e-mail, using fake e-mail accounts and Internet domain names in an attempt to impersonate an AmerenUE employee. AmerenUE and U.S. Bank employees learned of the scheme and notified the Federal Bureau of Investigation (FBI). FBI Special Agent Brian Jackson was assigned to the case. He began his investigation by consulting with Special Agent Lyonel Myrthil, the bank crimes coordinator in the FBI's St. Louis office. Special Agent Myrthil informed Special Agent Jackson that he had heard of a similar scheme in Los Angeles that may have involved Mario Smith, who had since relocated to St. Louis.3 Smith was on supervised release in St. Louis for being a felon in possession of a firearm and had previously been convicted of fraud. Special Agent Jackson learned that most of the e-mails sent as part of the present scheme were sent from free, publicly available wireless access points. One 2 The Honorable Rodney W. Sippel, United States District Judge for the Eastern District of Missouri, adopting the Report and Recommendation of the Honorable Terry I. Adelman, United States Magistrate Judge for the Eastern District of Missouri. 3 No charges were brought for the scheme in Los Angeles. During a suppression hearing in the present case, Special Agent Myrthil testified that the investigation in Los Angeles may have involved an unconstitutional search. -2- access point was traced to a house across the street from Smith's residence. The wireless router at the house across the street was unprotected and anyone within range could use that access point. U.S. Bank provided Special Agent Jackson with the cash vault questionnaires that the individual behind the scheme completed to obtain the cash vault delivery. By analyzing the documents' data, Special Agent Jackson was able to learn that the username of the individual who completed the questionnaire was "bigdaddyallday." Special Agent Jackson conducted an Internet search for "bigdaddyallday" and discovered a YouTube account under that name. Smith was in several videos and photographs belonging to this account. Also, the investigation revealed that one of the cash vault delivery requests was made for pick-up in the Chicago area. On June 15, 2011, Smith requested permission from his probation officer to travel to Illinois.4 U.S. Bank also provided Special Agent Jackson with a recording of a phone conversation between a bank employee and the individual posing as an AmerenUE employee. Special Agent Myrthil identified the voice as Smith's. Special Agent Myrthil had listened to a televised interview with Smith and also had spoken with Smith and listened to Smith's voice on multiple other occasions. After learning the above information, on June 20, 2011, the FBI placed Smith under surveillance. That morning, an individual authorities suspected was Smith called U.S. Bank, and while impersonating an AmerenUE employee, requested a cash vault delivery of approximately $180,000. During surveillance, agents observed Smith drive, along with Sahib Lewis, to Smith's residence and pick up a messenger bag. Smith and Lewis then drove to a Quizno's restaurant in downtown St. Louis. Agents entered Quizno's to arrest Smith, but he was in the restroom. Agents arrested 4 However, Smith also had a scheduled court appearance in Illinois for the same day as the scheduled pick-up. -3- Smith once he exited the restroom. Smith was uncooperative during arrest, refusing to place his hands in the view of the officers or sit down. The agents were aware that Smith had a history of resisting arrest. Agents seized the messenger bag, which was roughly 15 to 20 feet away from Smith at a table with Lewis. While Smith was being handcuffed, he repeatedly told Lewis to take the bag. During Smith's arrest, Lewis was detained, but unrestrained, and could reach the bag. Special Agent Myrthil later stated he believed seizure of the bag was necessary for officer safety. Further, judging by the size and shape of the bag, agents believed the bag contained a laptop. The agents believed that a laptop had been used in furtherance of the scheme because of the use of wireless access points to connect to the Internet. Special Agent Myrthil seized the bag and immediately after touching the bag could feel a laptop inside. Agents did not know whether the bag contained any weapons. Agents also seized three cell phones that were on Smith at the time of arrest. Agents then took the bag to the FBI office in St. Louis, where Detective Brian Mize inventoried the bag. Detective Mize discovered a laptop, a fourth cell phone, and bank records during the inventory. Agents then interviewed Smith after a valid Miranda waiver. Smith admitted to his involvement in the scheme. Special Agent Jackson then placed the four cell phones and the laptop in a "Faraday" bag to prevent remote access so the phone could not be remotely wiped. Special Agent Jackson also placed the phones in "airplane mode" to preserve battery life. He created an inventory list, but the list did not detail which cell phones were found on Smith's person and which were found in the bag. Special Agent Jackson obtained a search warrant for the bag, laptop, and four cell phones. Smith requested a Franks hearing to challenge the validity of the search warrant. The magistrate judge denied the request. Smith also filed a motion to -4- suppress, challenging his arrest, the search and seizure of his bag, and the admissibility of all evidence obtained as a result of the arrest, search, and seizure. The district court denied the motion. Smith then entered a conditional guilty plea to the counts listed above. Smith now appeals the denial of his motion to suppress. Discussion "In an appeal from a district court's denial of a motion to suppress evidence, this [C]ourt reviews factual findings for clear error, and questions of constitutional law de novo." United States v. Hollins, 685 F.3d 703, 705 (8th Cir. 2012). "We will affirm the denial of a suppression motion unless we find that the decision is unsupported by the evidence, based on an erroneous view of the law, or the Court is left with a firm conviction that a mistake has been made." United States v. Riley, 684 F.3d 758, 762 (8th Cir. 2012) (internal quotation marks omitted). I. Probable Cause to Arrest First, Smith argues that his arrest was not supported by probable cause, and therefore any evidence obtained as a result of the arrest is inadmissible under the exclusionary rule. Smith claims probable cause did not exist because agents learned of his identity based upon information obtained from an allegedly illegal search in Los Angeles. Further, Smith argues that the agents' voice identification, the connection to the "bigdaddyallday" account, and the wireless access point near Smith's home are insufficient to establish probable cause. "Probable cause to arrest exists when there is a reasonable ground for belief of guilt that is particularized with respect to the person to be searched or seized." United States v. Chauncey, 420 F.3d 864, 870 (8th Cir. 2005) (internal citations and quotation marks omitted). Whether probable cause exists is "viewed from the standpoint of an objectively reasonable police officer." Ornelas v. United States, 517 U.S. 690, 696 -5- (1996). "[W]e consider whether the facts and circumstances are sufficient to warrant a man of reasonable caution in the belief that [the person] was involved in the commission of a crime." Chauncey, 420 F.3d at 870 (internal quotation marks omitted). "A probability or substantial chance of criminal activity, rather than an actual showing of criminal activity is sufficient." United States v. Jones, 535 F.3d 886, 890 (8th Cir. 2008) (internal quotation marks omitted). The district court properly found that the agents had probable cause to arrest Smith. First, the agents knew that Smith was a suspect in a similar scheme conducted in Los Angeles. Further, Special Agents Jackson and Myrthil identified the voice of the individual calling U.S. Bank to set up the scheme as Smith's, and the district court's crediting of that identification was not clearly erroneous. See United States v. Kirk, 534 F.2d 1262, 1277 (8th Cir. 1976) ("Voice identification is not a subject of expert testimony. The standards for the admissibility of an opinion as to the identity of a speaker is merely that the identifier has heard the voice of the alleged speaker at any time." (internal citation and quotation marks omitted)). One of the documents sent to U.S. Bank to further the scheme was created by the user name "bigdaddyallday," which was also the name of a YouTube account featuring photographs and videos of Smith. All of the e-mails sent in an attempt to obtain a cash vault delivery were sent from various wireless access points—including an access point across the street from Smith's residence—which indicated that the scheme was completed using a laptop. Finally, on the date of his arrest, an individual agents believed was Smith contacted U.S. Bank requesting a cash vault delivery, and Smith was seen traveling with a laptop bag. Considering all of the facts laid out above, a "substantial chance" of criminal activity existed. Jones, 535 F.3d at 890. Further, we reject Smith's argument that the evidence that established probable cause was fruit of the poisonous tree from the allegedly illegal search in Los Angeles. Even assuming the Los Angeles investigation involved an illegal search, probable -6- cause still existed in this case because of the attenuation doctrine. As this Court has stated: The attenuation doctrine is a well-established exception to the exclusionary rule. A mere causal connection between information gathered during an illegal search and evidence prepared for trial does not require automatic exclusion of evidence. "Such connection may have become so attenuated as to dissipate the taint." Nardone v. United States, 308 U.S. 338, 341 (1939). Moreover, in determining whether exclusion is proper, the court does not simply inquire whether the evidence would have been discovered "but for" the illegal conduct. "Rather, the more apt question in such a case is 'whether, granting establishment of the primary illegality, the evidence to which instant objection is made has been come at by exploitation of that illegality or instead by means sufficiently distinguishable to be purged of the primary taint.'" Wong Sun v. United States, 371 U.S. 471, 487–88 (1963) (quoting Maguire, Evidence of Guilt 221 (1959)). The mere fact that information gained during an illegal search gives rise to a subsequent, separate investigation of an individual does not necessarily taint the later investigation. . . . Furthermore, if the information merely facilitates or shortens the subsequent investigation, it does not taint the investigation's results. United States v. Watson, 950 F.2d 505, 507–08 (8th Cir. 1991). In Watson, officers searched a defendant's house on a warrant authorizing a search for drugs and illegal weapons. Id. at 506. During the search, officers photographed or copied down information about the defendant's bank accounts— which the Court assumed was an illegal search. Id. at 506, 507. Later, a grand jury charged the defendant for various violations of currency-transaction reporting requirements under 31 U.S.C. §§ 5324(2), 5322(b). Id. at 506–07. The only information used from the search to indict the defendant was his name, his alias, and the names of various banks at which the defendant had accounts. Id. The defendant moved to suppress "all documents and testimony concerning his deposits and -7- withdrawals of currency in various financial institutions," claiming the evidence was poisonous fruit of the illegal search. Id. at 507. The Court upheld a denial of the suppression motion, finding "that where a law enforcement officer merely recommends investigation of a particular individual based on suspicions arising serendipitously from an illegal search, the causal connection is sufficiently attenuated so as to purge the later investigation of any taint from the original illegality." Id. at 508. The Court determined that "[a] contrary conclusion would amount to granting the suspect life-long immunity from investigation and prosecution" and that "[i]n such situations, the societal cost of imposing the exclusionary rule outweighs any deterrent effect." Id. (internal citation and quotation marks omitted). Therefore, even assuming agents learned of Smith's potential involvement in a similar scheme in Los Angeles through an illegal search, the evidence is not fruit of the poisonous tree. Similar to the actions of the agents in Watson, Special Agent Myrthil simply provided Special Agent Jackson with Smith's name. II. Seizure and Inventory Search of Bag Smith also alleges that, even if the arrest was supported by probable cause, the bag was illegally seized and searched such that the bag and its contents should have been deemed inadmissible. We find that the seizure of the bag was justified in order to preserve evidence. "A 'seizure' of property occurs when there is some meaningful interference with an individual's possessory interests in that property." United States v. Jacobsen, 466 U.S. 109, 113 (1984). "Where law enforcement authorities have probable cause to believe that a container holds contraband or evidence of a crime, but have not secured a warrant, the [Supreme] Court has interpreted the [Fourth] Amendment to permit seizure of the property, pending issuance of a warrant to examine its contents, if the exigencies of the circumstances demand it or some other -8- recognized exception to the warrant requirement is present." United States v. Place, 462 U.S. 696, 701 (1983). "[U]nder these circumstances, the risk of the item's disappearance or use for its intended purpose before a warrant may be obtained outweighs the interest in possession." Id. at 701–02. For example, in United States v. Clutter, we upheld the seizure of a defendant's computers on multiple grounds, including because officers "had probable cause to believe the computers contained evidence of child pornography offenses." 674 F.3d 980, 985 (8th Cir. 2012). We reasoned that the seizure was necessary "'to ensure that the hard drive was not tampered with before a warrant was obtained.'" Id. (quoting United States v. Mitchell, 565 F.3d 1347, 1350 (11th Cir. 2009)). The district court properly determined that the agents in the current case had probable cause to believe that the laptop bag contained evidence of a crime. Every agent, and the district court, agreed that the bag looked like one used to transport a laptop. As discussed, agents determined that because e-mails were sent from various access points, a laptop likely was used to further the scheme. Also, the documents were made under username "bigdaddyallday," a name linked to Smith. Further, as in Clutter, immediate seizure was necessary to prevent destruction of evidence. Smith's statements to Lewis to take the bag illustrate that he was attempting to keep the bag from the agents. See United States v. Beasley, 688 F.3d 523, 530 (8th Cir. 2012) (probable cause existed to justify temporary seizure of evidence where defendant made "apparent efforts to conceal the property"). Next, Smith argues that the search of the bag at the station before obtaining a warrant violated the Fourth Amendment. Smith claims the search was not a valid inventory search because the agent deviated from FBI inventory policy. "We . . . review the district court's findings of fact regarding the circumstances of an inventory search for clear error, including the question of pretext." United States v. Taylor, 636 F.3d 461, 463–64 (8th Cir. 2011) (internal citation omitted). -9- Inventory searches are one exception to the general rule that searches conducted without a warrant are unreasonable. Id. at 464. The purpose of an inventory search is to protect the "owner's property while it remains in police custody," as well as to protect "police against claims or disputes over lost or stolen property" and "from potential danger[s]." South Dakota v. Opperman, 428 U.S. 364, 369 (1976). An inventory search must "be reasonable under the totality of the circumstances . . . and may not be a ruse for general rummaging in order to discover incriminating evidence." Taylor, 636 F.3d at 464 (internal quotation marks omitted). "The reasonableness requirement is met when an inventory search is conducted according to standardized police procedures, which generally remove the inference that the police have used inventory searches as a purposeful and general means of discovering evidence of a crime." Id. (internal quotation marks omitted). However, "inventory searches need not be conducted in a totally mechanical, all or nothing fashion." United States v. Garreau, 658 F.3d 854, 858 (8th Cir. 2011) (internal quotation marks omitted). And, "[e]ven when law enforcement fails to conduct a search according to standardized procedures, this does not mandate the suppression of the evidence discovered as a result of the search." United States v. Rowland, 341 F.3d 774, 780 (8th Cir. 2003). "There must be something else; something to suggest the police raised 'the inventory-search banner in an after-the-fact attempt to justify' a simple investigatory search for incriminating evidence." Id. (quoting United States v. Marshall, 986 F.2d 1171, 1175 (8th Cir. 1993)). The district court did not clearly err when determining that the inventory search was not merely a pretext to search for evidence. The district court credited Detective Mize's testimony that he complied with FBI policy when conducting the inventory search. Detective Mize stated he "ruffled" through documents, only attempting to look for valuable or dangerous items. We agree with the district court that it was reasonable for agents to place cell phones in "airplane mode" and to store the electronics in the protective bag. Further, minor deviations from procedure, such as failing to indicate which cell phone was found in the bag and which cell phones were -10- found on Smith's person, do not invalidate the inventory search. See Garreau, 658 F.3d at 858. III. Validity of the Warrant Smith argues that the evidence revealed from the post-warrant search of the laptop bag and its contents must be suppressed under Franks v. Delaware, 438 U.S. 154 (1978), because the affidavit in support of the warrant contained material and misleading statements. "To prevail on a Franks challenge, a defendant must show the following: (1) the affiant officer knowingly and intentionally, or with reckless disregard for the truth, included a false or misleading statement in, or omitted information from, the affidavit in support of the warrant; and (2) the affidavit would not establish probable cause if the allegedly false information is ignored or the omitted information is supplemented." United States v. Cowling, 648 F.3d 690, 695 (8th Cir. 2011) (internal quotation marks omitted). "Allegations of negligence or innocent mistake are insufficient." Franks, 438 U.S. at 171. Smith claims the following statements and omissions invalidate the search warrant: 1) failing to explain that agents initially learned of Smith's identity from the Los Angeles investigation, 2) failing to include that Smith was traveling to Illinois—the location of a cash vault delivery request—for a court hearing, 3) stating that all four cell phones and the laptop bag were in Smith's possession at the time of the arrest, and 4) implying that the cell phone used to call U.S. Bank was found on Smith's person at the time of his arrest, when it may have been found in his bag. The district court held that any allegedly false statement or omission was not intentionally or recklessly made. Further, the court held that there was "very little, if anything, misleading in the affidavit in any respect." After analyzing the record, we believe the district court's findings regarding the statements in the warrant are not clearly -11- erroneous. See United States v. Puckett, 466 F.3d 626, 629 (8th Cir. 2006) (standard of review).5 Conclusion For the foregoing reasons, we affirm. ______________________________ 5 Because we have determined that Smith's arrest, the search and seizure of his bag, and the warrant were all valid, Smith's argument that all later obtained evidence must be suppressed as fruit of the poisonous tree is without merit. -12-