United States v. Heath , 424 F. App'x 730 ( 2011 )


Menu:
  •                                                                          FILED
    United States Court of Appeals
    Tenth Circuit
    UNITED STATES COURT OF APPEALS                   May 25, 2011
    Elisabeth A. Shumaker
    TENTH CIRCUIT                      Clerk of Court
    UNITED STATES OF AMERICA,
    Plaintiff-Appellee,
    v.                                                      No. 10-7087
    JOSEPH WILLIAM HEATH,                        (D.C. No. 6:CR-10-00018-RAW-1)
    (E. D. Okla.)
    Defendant-Appellant.
    ORDER AND JUDGMENT *
    Before BRISCOE, Chief Judge, ANDERSON and MURPHY, Circuit Judges.
    After examining the briefs and appellate record, this panel has determined
    unanimously to honor the parties’ request for a decision on the briefs without oral
    argument. See Fed. R. App. P. 34(f); 10th Cir. R. 34.1(G). The case is,
    therefore, submitted without oral argument.
    Joseph William Heath pleaded guilty, without a plea agreement, to
    conspiracy to commit fraud in connection with access devices, in violation of 18
    *
    This order and judgment is not binding precedent, except under the
    doctrines of law of the case, res judicata, and collateral estoppel. It may be cited,
    however, for its persuasive value consistent with Fed. R. App. P. 32.1 and 10th
    Cir. R. 32.1.
    U.S.C. § 371. He was sentenced to thirty-two months’ incarceration and thirty-
    six months’ supervised release. Heath challenges the procedural reasonableness
    of his sentence, arguing that the district court improperly included a ten-level
    upward adjustment pursuant to U.S.S.G. § 2B1.1(b)(1)(F) based on an amount of
    loss greater than $120,000 but less than $200,000 and a four-level “leader or
    organizer” enhancement pursuant to U.S.S.G. § 3B1.1(a). Exercising jurisdiction
    pursuant to 
    18 U.S.C. § 3742
    (a) and 
    28 U.S.C. § 1291
    , we affirm.
    I. BACKGROUND
    Pursuant to a criminal investigation in Durant, Oklahoma into a scheme to
    use counterfeit credit cards to rent hotel rooms and steal items from the rooms,
    the Durant Police Department received information from employees at a local
    Hampton Inn that a group of individuals had rented two hotel rooms and that a
    television was missing from one of the rooms. ROA, Vol. 3 at 4–5. When police
    officers arrived at the Hampton Inn, an individual from the group was found
    sleeping in one of the identified rooms. 
    Id. at 5
    . Police officers questioned this
    individual, and she revealed the identities of the remaining members of the group
    and details regarding their vehicles. 
    Id.
    Based on this information, police officers located and stopped a “two-door
    silver Honda Civic” that Heath and Sarah Puryear occupied. 
    Id.
     When the
    vehicle was stopped, police officers “observed a television that appeared to match
    the description of the missing television . . . at the Hampton Inn.” 
    Id.
     Heath and
    2
    Puryear were arrested. 
    Id.
     The vehicle was impounded and, pursuant to a search
    warrant, the following items were found in the vehicle:
    265 registration forms from the Quality Inn, located [in] Arlington, Texas,
    which included copies of drivers licenses, credit card numbers, credit card
    expiration dates, and home addresses of persons who had previously stayed
    at the hotel; 14 altered gift cards; 20 unaltered gift cards, 3 label makers; 6
    labels with credit card numbers and letters printed on them; 15 sheets of
    Avery easy peal labels; 2 packages of Avery self adhesive laminating
    sheets; and, 2 multi-colored fingernail sanding blocks.
    
    Id.
     During questioning, Puryear explained that:
    Heath had . . . obtained the credit card information from a friend of his who
    was employed by the Quality Inn in Arlington, Texas. This employee
    showed Heath where the daily credit card receipts were stored. Heath
    would go there, break into the room and remove the documents. . . . [T]he
    information obtained was used by Heath to manufacture counterfeit credit
    cards.
    
    Id. at 6
    .
    A grand jury returned a three-count indictment against Heath, along with
    five other individuals, charging him with: (1) conspiracy to commit fraud in
    connection with access devices, in violation of 
    18 U.S.C. § 371
    ; (2) use of a
    counterfeit access device, in violation of 
    18 U.S.C. § 1029
    (a)(1); and (3)
    possession of fifteen or more counterfeit access devices, in violation of 
    18 U.S.C. § 1029
    (a)(3). ROA, Vol. 1 at 7–10. As one of the overt acts in furtherance of the
    charged conspiracy, the indictment asserted:
    [Heath] obtained valid credit card numbers, specifically:
    a.    300 registration packets from a Quality Inn [in] . . . Arlington,
    Texas. This information included copies of drivers licenses,
    credit card numbers, credit card expiration dates and home
    3
    addresses of persons who had previously stayed at this hotel.
    
    Id. at 8
    . Heath waived his “Sixth Amendment rights to a jury in all respects both
    as to guilt or innocence and as to sentencing,” 
    id. at 11
    , and he pleaded guilty,
    without a plea agreement, to the conspiracy charged in the indictment, 
    id. at 20
    .
    The remaining charges in the indictment were dismissed. 
    Id.
    The presentence investigation report (PSR) identified the base offense level
    as 6 for conspiracy to commit fraud in connection with access devices, in
    violation of 
    18 U.S.C. § 371
    . ROA, Vol. 3 at 9 (applying U.S.S.G. § 2X1.1 to
    incorporate the base offense level under U.S.S.G. § 2B1.1 for the substantive
    offense of use of an access device, in violation of 
    18 U.S.C. § 1029
    ). The PSR
    then included the following upward adjustments: a ten-level upward adjustment
    pursuant to U.S.S.G. § 2B1.1(b)(1)(F) based on the amount of intended loss from
    the scheme calculated as $143,000; and a two-level upward adjustment pursuant
    to U.S.S.G. § 2B1.1(b)(10)(A)(i) for the “possession or use of any device making
    equipment.” ROA, Vol. 3 at 9–10. The PSR also included a four-level
    enhancement pursuant to U.S.S.G. § 3B1.1(a) because Heath “was the organizer
    of the fraudulent use of access devices that involved five other participants.”
    ROA, Vol. 3 at 10.
    With regard to the ten-level upward adjustment for the amount of loss, the
    PSR explained that, while “[t]he actual loss in this case is $1,387.65,” “the total
    intended loss in this case is $143,000.” Id. at 9–10. Pursuant to Application Note
    4
    3(F)(i) to U.S.S.G. § 2B1.1, the PSR calculated the intended loss amount based on
    the fact that “[t]here were a minimum of 286 fraudulent ‘access devices’
    possessed by [Heath] in this case” and applying an assumed “loss of $500.00 per
    access device.” ROA, Vol. 3 at 10. As for the four-level “leader or organizer”
    enhancement, the PSR explained that:
    Heath secured fraudulent credit card numbers, recruited accomplices to
    include Puryear, [Laura Madden, Melissa Kulp, Daniel Jeffery, and Kelly
    Speigle], manufactured fraudulent credit cards and taught co-defendants to
    manufacture fraudulent cards, thereby, establishing that he was the
    organizer of the fraudulent use of access devices that involved five other
    participants.
    Id.
    The PSR included a three-level reduction pursuant to U.S.S.G. §§ 3E1.1(a)
    and (b) based on Heath’s “affirmative acceptance of personal responsibility for
    his conduct.” ROA, Vol. 3 at 10. As a result, the PSR calculated Heath’s total
    offense level as 19. Id. Based on the total offense level of 19 and his criminal
    history category of I, the PSR identified Heath’s applicable sentencing guidelines
    range as thirty to thirty-seven months’ incarceration. Id.
    Heath filed two objections to the PSR. Id. at 16, 23. First, Heath objected
    to the inclusion of the ten-level upward adjustment in his offense level, arguing
    that the PSR lacked adequate evidence to support the calculated intended loss of
    $143,000. Id. at 16. Heath specifically “dispute[d] that there is any proof
    developed in this case to support” the proposition that he possessed a “minimum
    5
    of 286 fraudulent ‘access devices.’” Id. While he recognized that there were “a
    number of credit card receipts that provide varying degrees of information which
    may or may not be sufficient to . . . create a fraudulent credit card,” he argued
    that “[a] credit card number in itself is not sufficient to create a fraudulent credit
    card.” Id. Thus, he argued that “[a]n unused credit card number is not an access
    device as that term is used in the sentencing guidelines.” Id. Second, Heath
    objected to the inclusion of the four-level “leader or organizer” enhancement. Id.
    at 23. He argued that the “events involved in this case did not support the
    enhancement.” Id.
    During sentencing, the district court addressed Heath’s objections. First,
    with regard to Heath’s objection to the ten-level upward adjustment, the district
    court overruled the objection and “f[ound] by a preponderance of the evidence
    that the loss amount used in the calculation of the advisory guidelines was
    appropriate as included in the [PSR].” ROA, Vol. 2 at 15. The district court
    reasoned:
    Pursuant to [U.S.S.G. §] 2B1.1, Application Note 3(A), loss is the
    greater of actual or intended loss. Further, note (3)(F)(i) pertains to special
    rules that shall be used to assist in determining a loss with regard to stolen
    or counterfeit credit cards and access devices; purloined numbers -- access
    devices; purloined numbers and codes. It states that in a case involving any
    counterfeit access device or an unauthorized access device or unauthorized
    access devices shall not be less than $500.00 per access device. This
    subsection refers to Application Note 9(A) and subsequently 18 [U.S.C. §]
    1029(e)(3), for the meaning given the term “unauthorized access device.[”]
    Pursuant to 18 [U.S.C. §] 1029(e)(3), account numbers that can be used,
    alone or in conjunction with another access device, to obtain money, goods,
    6
    services, or any other thing of value are considered access devices. Based
    on the evidence in this case, the defendant possessed 286 account numbers.
    These numbers were taken from registration forms which included copies
    of driver’s licenses, credit card numbers, expiration dates, and home
    addresses, in addition to the credit card account numbers.
    Id. at 14–15. As a result, the district court determined that Heath possessed 286
    “access devices” pursuant to 
    18 U.S.C. § 1029
    . See 
    id.
     Based on the evidence
    that Heath possessed 286 access devices and applying the assumed loss of five
    hundred dollars per access device, the district court “found the same [$143,000]
    of loss” as identified in the PSR. 
    Id. at 15
    . Thus, the district court included the
    ten-level upward adjustment pursuant to U.S.S.G. § 2B1.1(b)(1)(F) for a loss
    greater than $120,000 but less than $200,000 when calculating Heath’s guidelines
    range.
    Second, the district court addressed Heath’s objection to the four-level
    enhancement for his organizational or leadership role in the scheme. See id. at
    15–17. The district court overruled Heath’s objection, “find[ing] by a
    preponderance of the evidence that the defendant was an organizer/leader in this
    scheme and is appropriately given a four level enhancement, pursuant to U.S.S.G.
    [§] 3B1.1(a).” Id. at 16–17. The district court reasoned:
    [U.S.S.G. §] 3B1.1, Application Note 4 states that the factors the
    Court should consider for an aggravating role adjustment includes the
    exercise of decision-making authority, the nature of participation in the
    commission of offense, the recruitment of accomplices, the claimed right to
    a larger share of the fruits of the crime, the degree of participation in
    planning or organizing the offense, the nature and scope of the illegal
    activity, and the degree of control and authority exercised over others.
    7
    Without Heath’s participation, there would have been no fraudulent access
    devices. Heath obtained registration forms that include had [sic] copies of
    driver’s license, credit card expiration dates, and home addresses, in
    addition to the credit card account numbers, which were used in the
    manufacture of fraudulent access devices . . . . Heath gave the illegally
    obtained credit card information to co-defendants, . . . and taught them to
    manufacture access devices and to call “merchant lines” to verify the
    numbers were valid. At Heath’s direction, [Speigle and Jeffery] traveled to
    Durant, Oklahoma, and used fraudulent cards, made by [H]eath, to secure
    hotel rooms and merchandise.
    Based on the evidence in this case, [Heath]’s actions of securing
    fraudulent credit card numbers, recruiting accomplices, manufacturing
    fraudulent credit cards and teaching others to manufacture fraudulent credit
    cards establish that he was the organizer of the criminal activity involving
    the fraudulent use of access devices. Furthermore, there were five other
    participants that were less culpable participants in this scheme.
    Id. at 15–16.
    After considering the 
    18 U.S.C. § 3553
    (a) factors, the district court
    sentenced Heath to thirty-two months’ incarceration and thirty-six months’
    supervised release. 
    Id.
     at 21–22. The district court also imposed restitution of
    $765.09 against Heath and his co-defendants jointly and severally. 
    Id. at 23
    .
    Heath appeals his sentence.
    II. ANALYSIS
    On appeal, Heath reasserts his challenges to the inclusion of the ten-level
    upward adjustment for the amount of loss and the four-level “leader or organizer”
    enhancement when calculating his guidelines range. Aplt. Br. at 5. First, Heath
    argues that the district court improperly applied a ten-level upward adjustment for
    the intended amount of loss calculated based on his possession of 286 “access
    8
    devices.” He contends that evidence of his possession of 286 valid credit card
    account numbers was insufficient to establish his possession of 286 “access
    devices” under 
    18 U.S.C. § 1029
    . 
    Id. at 9
    . Second, Heath argues that the district
    court lacked sufficient evidence to justify a four-level enhancement for his
    leadership or organizational role in the criminal activity. He contends that “[t]he
    statements in the [PSR] do not support a determination that Heath was an
    organizer or leader for purposes of [this enhancement].” 
    Id.
     at 11–12.
    A. Standard of review
    This court reviews a criminal sentence for reasonableness, under a
    deferential abuse of discretion standard. United States v. Alapizco-Valenzuela,
    
    546 F.3d 1208
    , 1214 (10th Cir. 2008). This reasonableness review has both
    procedural and substantive components. 
    Id.
     On appeal, Heath challenges the
    procedural reasonableness of his sentence, contending that the district court
    improperly calculated his guidelines range. See Gall v. United States, 
    552 U.S. 38
    , 51 (2007) (explaining that procedural errors include “improperly calculating[]
    the Guidelines range”). When evaluating the procedural reasonableness of a
    sentence, this court “review[s] the district court’s legal conclusions regarding the
    Guidelines de novo and its factual findings for clear error.” United States v.
    Hamilton, 
    587 F.3d 1199
    , 1219 (10th Cir. 2009).
    B. Upward adjustment based on the calculated amount of intended loss
    9
    Heath argues that the district court had inadequate evidence to support its
    calculation of the amount of intended loss from the scheme. While Heath does
    not dispute his possession of 286 valid credit card account numbers, he asserts
    that the credit card account numbers themselves do not constitute “access
    devices” within the meaning of 
    18 U.S.C. § 1029
    . This court reviews the district
    court’s interpretation of the term “access device” de novo. 1 See Hamilton, 
    587 F.3d at 1222
    . We conclude that the valid credit card account numbers Heath
    possessed constitute “access devices” under 
    18 U.S.C. § 1029
     and that the district
    court properly applied the ten-level upward adjustment based on the calculated
    intended loss of $143,000.
    Pursuant to U.S.S.G. § 2B1.1(b)(1)(F), when an offense involves fraud or
    altered or counterfeit instruments and results in a loss that exceeds $120,000 but
    is less than $200,000, ten levels are added to the base offense level. To determine
    the amount of loss, Application Note 3 explains that the “loss is the greater of
    actual loss or intended loss.” U.S.S.G. § 2B1.1 cmt. n.3(A). While the actual
    1
    Heath’s references to the district court’s fact-finding obligations pursuant
    to Federal Rule of Criminal Procedure 32(i)(3)(B) are inapplicable in this context.
    Rather than disputing the PSR’s factual findings, Heath challenged the application
    of the guidelines to the facts. See United States v. Cereceres-Zavala, 
    499 F.3d 1211
    , 1215 (10th Cir. 2007) (explaining that “[a]rguments that challenge the
    district court’s application of the guidelines to the facts and not the facts
    themselves do not trigger any obligation on the part of the district court to make
    specific findings” (internal quotation marks omitted)). Thus, Heath’s objection to
    the PSR did not trigger the district court’s fact-finding obligations pursuant to
    Rule 32(i)(3)(B).
    10
    loss incurred in this case was $1,387.65, ROA, Vol. 3 at 9, the district court
    calculated the intended loss as $143,000, see ROA, Vol. 2 at 14 (agreeing to the
    intended loss calculated in the PSR).
    According to Application Note 3, intended loss “means the pecuniary harm
    that was intended to result from the offense.” U.S.S.G. § 2B1.1 cmt. n.3(A)(ii).
    The guidelines specify that, for offenses involving “any counterfeit access device
    or unauthorized access device, loss . . . shall be not less than $500 per access
    device.” Id. cmt. n.3(F)(i). To define the terms “counterfeit access device” and
    “unauthorized access device,” the guidelines refer to the definitions in 
    18 U.S.C. § 1029
    . U.S.S.G. § 2B1.1 cmt. n.3(F)(i) (referring to id. cmt. n.9(A), which
    incorporates the “meaning[s] given th[ose] term[s] in 
    18 U.S.C. § 1029
    []”).
    Pursuant to 
    18 U.S.C. §§ 1029
    (e)(2) and (3), the definitions of the terms
    “counterfeit access device” and “unauthorized access device” both incorporate the
    term “access device.” The term “access device” is then defined as:
    any card, plate, code, account number, electronic serial number, mobile
    identification number, personal identification number, or other
    telecommunications service, equipment, or instrument identifier, or other
    means of account access that can be used, alone or in conjunction with
    another access device, to obtain money, goods, services, or any other thing
    of value, or that can be used to initiate a transfer of funds (other than a
    transfer originated solely by paper instrument).
    
    18 U.S.C. § 1029
    (e)(1).
    Heath argues that credit card account numbers alone do not constitute
    “access devices” within the meaning of 
    18 U.S.C. § 1029
    (e)(1). See Aplt. Br. at
    11
    9. In his objections to the PSR, Heath asserted:
    What there is in this case is a number of credit card receipts with varying
    degrees of information which may or not be sufficient to allow the
    information to be used to create a fraudulent credit card. The counterfeiter
    needs not only the credit card number, but expiration date, name of credit
    cardholder and billing address. Additionally, the card must be active at the
    time of the attempted use.
    ROA, Vol. 3 at 16. We disagree with Heath’s interpretation.
    First, Heath’s interpretation of the term “access device” is inconsistent with
    the plain language of the statute. The plain language of 
    18 U.S.C. § 1029
    (e)(1)
    specifically identifies an “account number” as an “access device.” Further,
    because the statute requires only that a “means of account access” be capable of
    obtaining anything of value either alone or in conjunction with another access
    device, Heath’s argument that a credit card account number is insufficient to
    create a fraudulent credit card is meritless. 2 Thus, the valid credit card account
    numbers Heath possessed constitute “access devices” pursuant to the plain
    language of 
    18 U.S.C. § 1029
    (e)(1).
    Second, Heath’s interpretation of the term “access device” is inconsistent
    with this court’s prior statements regarding the scope of 
    18 U.S.C. § 1029
    . This
    court has explained:
    2
    We note here that Heath’s own actions through his use of credit card
    numbers and names assigned thereto to rent hotel rooms for himself and his
    accomplices establish that an actual credit card need not be created in order “to
    obtain money, goods, services, or any other thing of value . . . .” 
    18 U.S.C. § 1029
    (e)(1).
    12
    In enacting [18 U.S.C.] § 1029, Congress was focused upon the fraudulent
    use of access devices in connection with credit transactions. Congress
    sought to address the growing problem in counterfeit credit cards and
    unauthorized use of account numbers or access codes to banking system
    accounts. Congress sought to include in its definition of access devices,
    credit cards, debit cards, account numbers and combinations of these and
    other methods of obtaining goods and services.
    United States v. McNutt, 
    908 F.2d 561
    , 563 (10th Cir. 1990) (emphasis added)
    (internal quotation marks, ellipses, and citations omitted). Thus, the credit card
    account numbers Heath possessed fall within the intended scope of the term
    “access device” in 
    18 U.S.C. § 1029
    . Because Heath did not dispute his
    possession of 286 valid credit card account numbers, the district court properly
    found that he possessed 286 “access devices.” Applying the assumed loss of five
    hundred dollars per access device, the district court properly calculated the
    intended amount of loss as $143,000. Thus, we conclude that the district court
    properly included the ten-level upward adjustment to Heath’s offense level.
    C. Leader or organizer enhancement
    Heath argues that the district court had insufficient evidence to justify the
    inclusion of the four-level enhancement for his organizational role in the scheme.
    Aplt. Br. at 9. He contends that “[t]he statements in the [PSR] do not support a
    determination that Heath was an organizer or leader for purposes of [U.S.S.G.] §
    3B1.1(a)” because
    there is a lack of evidence that Heath exercised decision making authority
    over the other participants, any recruitment of accomplices, a claimed right
    to a larger share of the fruits of the crime, or any degree of control and
    13
    authority exercised by him over the others. No one in this conspiracy
    worked for Heath, nor did he control or have any responsibility for their
    activities.
    Aplt. Br. at 11–12. We conclude that the district court’s factual finding was not
    clearly erroneous.
    Pursuant to U.S.S.G. § 3B1.1(a), a defendant’s offense level is increased
    four levels “[i]f [he] was an organizer or leader of a criminal activity that
    involved five or more participants.” Thus, “[t]o impose the 4-level increase, the
    sentencing court must make two findings of fact: first, that defendant is an
    organizer or leader; and second, that the criminal activity involved five or more
    participants.” United States v. Roberts, 
    14 F.3d 502
    , 523 (10th Cir. 1993). Heath
    challenges only the finding that he was an organizer of the scheme.
    This court has noted that “[t]he gravamen of the enhancement is either the
    exercise of control over other participants or the organization of others for the
    purpose of carrying out the crime.” United States v. Spears, 
    197 F.3d 465
    , 469
    (10th Cir. 1999) (internal quotation marks omitted). Application Note 4 to
    U.S.S.G. § 3B1.1 provides the following factors that a sentencing court should
    consider when determining whether an individual was a leader or organizer of
    criminal activity:
    the exercise of decision making authority, the nature of participation in the
    commission of the offense, the recruitment of accomplices, the claimed
    right to a larger share of the fruits of the crime, the degree of participation
    in planning or organizing the offense, the nature and scope of the illegal
    activity, and the degree of control and authority exercised over others.
    14
    U.S.S.G. § 3B1.1 cmt. n.4.
    We conclude that the PSR provided sufficient evidence to support the
    district court’s finding that Heath was an organizer of the scheme. The PSR
    provided evidence that Heath obtained the credit card information used to
    manufacture the counterfeit credit cards, distributed the credit card information to
    other participants in the scheme, and taught other participants how to manufacture
    the counterfeit cards. According to the PSR, Puryear explained that Heath
    obtained the credit card information and would verify that the credit card account
    number was activated. ROA, Vol. 3 at 6. Puryear also explained that “Heath had
    taught [Kulp and Madden] how [to manufacture the counterfeit credit cards], and
    that [Heath] was the one who provided the credit card numbers to them.” Id.
    According to the PSR, Madden confirmed that “[s]he and Kulp would obtain the
    numbers from Heath, and Kulp would manufacture the counterfeit credit cards.”
    Id. at 7. Further, Kulp explained that Heath taught her how to manufacture the
    counterfeit credit cards and that “Heath would supply the numbers from the stolen
    credit card receipts he was getting from a hotel.” Id. at 8.
    The PSR also included evidence that Heath coordinated the rental of hotel
    rooms and recruited accomplices to meet in Durant. According to the PSR,
    Madden explained that “Heath called in a stolen credit card number to the
    Hampton Inn and rented two rooms” and that “Heath would tell them what name
    to use, and they would check into the rooms using those names.” Id. at 7.
    15
    Further, according to the PSR, Speigle explained that “Heath called her while she
    was in Dallas, Texas, and asked her if she would pick up Daniel Jeffery and bring
    him to Durant, Oklahoma.” Id. at 7–8. Heath did not object to these factual
    findings. Thus, based on this evidence, we conclude that the district court’s
    finding that Heath was an organizer of this scheme did not constitute clear error
    and that the district court properly included the four-level enhancement.
    III. CONCLUSION
    Heath’s sentence is AFFIRMED.
    Entered for the Court
    Mary Beck Briscoe
    Chief Judge
    16