United States v. Shaeed Calhoun , 876 F.3d 812 ( 2017 )


Menu:
  •                NOT RECOMMENDED FOR FULL-TEXT PUBLICATION
    File Name: 17a0635n.06
    Case Nos. 16-1650/1706/1707/1708
    UNITED STATES COURT OF APPEALS                              FILED
    FOR THE SIXTH CIRCUIT                            Nov 15, 2017
    DEBORAH S. HUNT, Clerk
    UNITED STATES of AMERICA,                         )
    )
    Plaintiff-Appellee,                         )
    )
    v.                                 )
    )     ON APPEAL FROM THE
    NATHANIEL PEMBROOK, SHAEED                        )     UNITED STATES DISTRICT
    CALHOUN, DAVID BRILEY, and                        )     COURT FOR THE EASTERN
    ORLANDO JOHNSON,                                  )     DISTRICT OF MICHIGAN
    )
    Defendants-Appellants.                      )
    )
    Before: BATCHELDER, GIBBONS, and COOK, Circuit Judges.
    ALICE M. BATCHELDER, Circuit Judge.                 A federal jury convicted four co-
    defendants of robbery, conspiracy, and firearms charges stemming from two jewelry store
    robberies in Michigan on April 22, 2014, and the district court imposed lengthy prison sentences.
    The defendant/appellants—Nathaniel Pembrook, Shaeed Calhoun, David Briley, and Orlando
    Johnson—are African-American males, between the ages of 36 and 47, from Philadelphia,
    Pennsylvania. The first robbery was at 12:30 p.m. at Medawar Fine Jewelry in Plainfield
    Township, Michigan, a suburb of Grand Rapids. The second was at 5:15 p.m. at Tapper’s
    Diamonds & Fine Jewelry in West Bloomfield Township, a suburb of Detroit. Both robberies
    involved guns and force. The government prosecuted the defendants to conviction on five
    counts: Hobbs Act robbery, in violation of 18 U.S.C. § 1951(a); use of a firearm in furtherance
    of the robbery, § 924(c)(1)(A); conspiracy to commit robbery, § 1951(a); use of a firearm in
    No. 16-1650
    United States v. Pembrook, et al.
    furtherance of the conspiracy, §§ 924(c)(1)(A) & (C)(i); and being a felon in possession of a
    firearm, §§ 922(g)(1) and 924(a)(1)(D)(2). We AFFIRM the convictions and sentences.
    I.
    FBI Agent Brian Max began his investigation of two similar Michigan jewelry-store
    robberies—separated by a drive of five hours and 150 miles—with a “tower dump” for the cell-
    phone towers near the two stores.1 A “tower dump” is a chronological list of every phone
    number that used the tower for any purpose (voice call, text, internet connection, etc.) regardless
    of provider (e.g., Verizon, AT&T). Agent Max found that a phone number ending “1434”—
    assigned to a recently activated, prepaid cell phone with no name on the account—had used a
    tower or towers near each of the robberies at times corresponding to those robberies.
    Agent Max then obtained the “call detail records” (a list of all calls to and from that
    number, with dates, times, and tower locations) for the #1434-phone and tracked its path from
    Philadelphia (April 21, 2014) to Milwaukee; to New Buffalo, Michigan, for an overnight stay; to
    Plainfield Township, near the Medawar Jewelry store, 40 minutes before the first robbery (about
    11:50 a.m.); to West Bloomfield Township, near the Tapper’s Jewelry store, 15 minutes before
    the second robbery (5:00 p.m.); then back to Philadelphia the next day (April 23, 2014).
    Plainfield Township is less than two hours’ drive north of New Buffalo; West Bloomfield
    Township, near Detroit, is less than three hours’ drive from Plainfield Township.
    Agent Max discovered three more phone numbers (ending 0033, 7819, and 1574) that
    followed the same pattern.2 These four numbers had also contacted each other repeatedly during
    the trip, including, for example, dozens of times in the hour before the Medawar robbery. Of
    1
    AUSA Kevin Mulcahy applied to the district court for orders compelling the “tower dump” of the cell-
    tower records, pursuant to the Stored Communications Act, 18 U.S.C. § 2703(d). All told, there were four
    applications and court orders. See United States v. Pembrook, 
    119 F. Supp. 3d 577
    , 580-83 (E.D. Mich. 2015).
    2
    Each phone was a recently activated, prepaid cell phone with no name on the account that traveled from
    Philadelphia to Milwaukee on April 21, then overnight in New Buffalo, to locations near Medawar Jewelry at the
    time of the first robbery and Tapper’s at the time of the second, and then back to Philadelphia on April 23.
    2
    No. 16-1650
    United States v. Pembrook, et al.
    particular interest, a call from the #0033-phone to Enterprise car rental made a record of
    “Shaheed” Calhoun’s renting a white Volkswagen Passat from a location at the Philadelphia
    train station on April 11 and returning it there on April 23 after driving it 3,463 miles. Calhoun
    had provided Enterprise3 his Pennsylvania driver’s license and paid with his credit card.
    In addition to Agent Max’s cell-tower and phone-records investigation, the FBI also had
    witness statements and surveillance videos from the robberies. At 12:30 p.m. on April 22, 2014,
    four men rushed into the Medawar Jewelry store,4 one suspiciously carrying a large bag.
    Another had a hammer and began striking the glass jewelry cases (which did not break) while a
    third ordered an employee at gunpoint to open a safe. There were no customers in the store. The
    other employees, quickly recognizing the robbery, hid in the break room with the lights out,
    watching on closed-circuit video while the owner retrieved his own handguns. When the owner
    yelled for the robbers to leave because he was armed, one robber5—armed with a handgun—
    instead pursued him. When that robber entered the break room, the owner shot at him, hitting
    him in the arm. At that, the robbers fled, one dripping blood from the gunshot wound. They
    were gone by the time police responded to the 911 call, but witnesses described a black, new
    model Chrysler Town & Country minivan. Police tracked blood drops to a location behind the
    store and exterior security videos had recorded the minivan parked there for an hour before the
    robbery with two of the robbers milling about nearby. No employee was injured in the robbery
    3
    The vehicle was actually rented from Alamo Rent A Car, which is a subsidiary of Enterprise.
    4
    Medawar Jewelry is located near Grand Rapids, in the Western District of Michigan. Because the U.S.
    District Court for the Eastern District of Michigan was not the proper venue for the adjudication of this robbery, the
    government did not charge the defendants with the Medawar robbery as a “robbery”; instead, the government
    charged the defendants with the Tapper’s robbery (for which venue was proper) and included the Medawar robbery
    as part of a conspiracy to rob both.
    5
    Police ultimately determined this was Pembrook, based on DNA testing and ballistic evidence.
    3
    No. 16-1650
    United States v. Pembrook, et al.
    nor was anything of significant value stolen.6 The loss was $2,252 in damage to the store. None
    of the victims was able to identify any of the robbers, either immediately or later at trial.
    At 5:15 p.m. that same day, three men wearing masks and gloves entered the Tapper’s
    Jewelry store7 near Detroit, and ordered the employees and customers down on the ground. The
    first robber had a handgun and forced the security guard to the ground while the other two
    ordered an employee to open the case of Rolex watches. One robber held a bag while the other
    filled it with watches. This robbery lasted two minutes. An employee had tripped a silent alarm,
    but the robbers were gone before the police arrived. Exterior surveillance video, beginning an
    hour before the robbery, recorded the simultaneous arrival of the black Chrysler minivan and a
    white Volkswagen Passat. One man got out of the minivan; two exited the Passat. They
    separately went into a nearby shopping mall and returned without ever acknowledging each
    other, but upon their return, the man from the van got into the Passat and the two from the Passat
    got into the van. The first man moved the Passat to park it facing the Tapper’s entrance. The
    van moved behind the store and three men wearing hoodies and gloves got out. Moments later,
    the same three ran back to the van with two bags and drove off. No one was injured during the
    robbery. The robbers made off with 123 Rolex watches, worth $853,957.8 None of the victims
    was able to identify any of the robbers, either immediately or later at trial.
    Further investigation led to a security video from a Comfort Inn in New Buffalo on April
    21, the day before the robberies, which had recorded the simultaneous arrival of the Passat and
    the minivan at about 10:30 p.m. The driver of the Passat rented three rooms,9 the cars pulled
    6
    Apparently certain personal documents, belonging to employees, were removed from the safe and taken.
    7
    Agent Max testified that, based on his review of the surveillance videos, he did not believe that Pembrook
    was one of the three men who entered Tapper’s.
    8
    This value was used in the Presentence Reports. The parties have elsewhere asserted that 137 watches
    were stolen, at a value of $1.2 to 1.3 million. The actual amount is not in dispute in this appeal.
    9
    The man used the name “Robert Packard” and a Chicago address, but did not give formal identification.
    4
    No. 16-1650
    United States v. Pembrook, et al.
    around to park, and six men got out of the two cars and shared the three rooms. A few minutes
    after arriving, three men took the Passat and then the minivan across the street for gas at a Shell
    station, as recorded on the Shell station’s surveillance video. The Comfort Inn video also
    recorded four men leaving the motel the next morning at about 9:00 a.m., and those men were
    recognizable in the jewelry stores’ videos as the men in the hotel videos.10
    The cell-tower records had also placed the four suspected cell phones near this New
    Buffalo location and the call-detail records helped put names to three of the numbers: Calhoun to
    #0033 based on the aforementioned call to Enterprise as well as calls to his mother and
    girlfriend; Johnson to #1434 based on calls to his girlfriend (over 100 calls); and Briley to #7819
    based on calls to his ex-wife, current girlfriend, daughter, and mother.                           The Shell station
    attendant, Sue Graff, later picked Calhoun and Briley from a police photo array. Johnson had
    given the #1434-phone to a friend in Philadelphia, who gave it to the FBI when questioned and
    who also identified Johnson in the videos from the Shell station and Tapper’s. Briley was most
    evident in the videos from both the hotel and Tapper’s because of a distinctive outfit.
    Meanwhile, the blood drops at Medawar Jewelry produced Pembrook’s name from the
    DNA database. Police tracked him to a Philadelphia hospital at which he had arrived at 4:00
    a.m. on April 23 for removal of the bullet from his arm. He left a day or so later, but had called
    Briley from the phone in his hospital room before leaving. Ballistic tests matched the removed
    bullet to the store owner’s gun. Philadelphia police arrested Pembrook and sent him back to
    Detroit where he declined to cooperate and instead—using another inmate’s phone passcode—
    called his girlfriend with a covert warning to the other robbers that the police were onto them.
    Police eventually arrested the other three suspects and sent them to Detroit for
    prosecution. When the police arrested Calhoun, he had in his wallet the credit card and driver’s
    10
    The other two suspects in the hotel surveillance videos were not identified, indicted, or prosecuted.
    5
    No. 16-1650
    United States v. Pembrook, et al.
    license used to rent the Passat. When the police arrested Briley, his cell phone had a picture of
    him wearing the same outfit he was wearing in the Shell station surveillance video.
    Facing robbery, conspiracy, and firearms charges, the defendants filed several pre-trial
    motions, including one to dismiss the second § 924(c) count as duplicative, one to suppress the
    cell-tower records or exclude testimony about it, and one to suppress the Shell station attendant’s
    photo-array identifications. The district court denied the motions. See R. 75 and 85 (§ 924(c) as
    duplicative); United States v. Pembrook, 
    119 F. Supp. 3d 577
    (E.D. Mich. 2015) (cell tower data
    and testimony); United States v. Pembrook, 
    2015 WL 6328186
    (E.D. Mich. Oct. 21, 2015)
    (photo array). The case proceeded to a jury trial, which lasted 16 days. At trial, amongst other
    witnesses, FBI Agent Christopher Hess testified as an expert on cell-tower site information and
    Agent Max testified as a lay witness, not an expert.            Also, mid-trial, the government
    unexpectedly called a jailhouse informant named James Jenkins to testify about his conversations
    with Pembrook. This prompted Pembrook to demand all of Jenkins’s prison records, and the
    other defendants to move to sever the trial. The district court denied the motions.
    The jury convicted all four defendants on all counts and the district court sentenced each
    of the four to 33 years in prison—one year each for the robbery, conspiracy, and felon-in-
    possession counts, to run concurrently, and 32 years for the two § 924(c) convictions (seven for
    the first and a mandatory 25 for the second, to run consecutively). All four defendants appeal.
    II.
    A.
    The defendants claim that the pretrial photo-array identification was unduly suggestive.
    We review “the denial of a motion to suppress identification evidence for clear error.” United
    States v. Washington, 
    714 F.3d 962
    , 966 (6th Cir. 2013). “The burden rests on the defendant[s]
    to demonstrate that the pretrial identification procedure was impermissibly suggestive.” 
    Id. 6 No.
    16-1650
    United States v. Pembrook, et al.
    (quotation marks omitted).             “If the defendant[s] meet[] this burden, then the court must
    determine, in light of all of the circumstances, whether the unfair suggestiveness was conducive
    to a very substantial likelihood of irreparable misidentification[s].” 
    Id. (marks omitted).
    Calhoun and Briley claim that the district court erred by denying their motion to suppress
    Shell station attendant Sue Graff’s identification of them from the photo arrays and argue that the
    photo arrays were unduly suggestive, her testimony about her memory was equivocal, and her
    recollection came only from watching the surveillance videos later. For his part, Calhoun says
    that because there was no memorable event at the Shell station that would have caused Graff to
    remember the defendants, she identified them only from the video, not her recollection.
    Briley’s theory is more nuanced.11 He begins with the premise that Graff’s identification
    was unreliable because: (1) she initially claimed the video was too “grainy” and she did not have
    her proper eyeglasses; (2) she made no written statement, but just initialed her choice on the
    photo array (for Briley, number 4 of 6); (3) she told police her recollection was based on Briley’s
    washed out skin and lips—“like Michael Jackson”—but omitted Briley’s “most remarkable
    feature—that Briley had a beard with no mustache”; (4) at trial, she identified the wrong person
    on the photo-array (number 1 instead of 4) until the prosecutor directed her to her initials by
    Briley’s photo (number 4), which changed her mind; and (5) the prosecutor did not ask her to
    identify Briley (or Calhoun) at trial, but relied solely on the photo array(s).12
    Briley also accuses the police of coaching Graff with the video and withholding this from
    discovery, based on his interpretation of Graff’s testimony: that she had seen the video before the
    11
    Briley’s theory in the district court had been that the photo array was unduly suggestive because the other
    people pictured did not look like him. The court disagreed as a factual matter. Pembrook, 
    2015 WL 6328186
    at *3.
    12
    Briley’s attorney makes much of these last two items in his Reply Brief (i.e., that Graff initially identified
    the wrong photo and the prosecutor did not have her identify Briley at trial) but these things would actually appear
    to help Briley’s defense inasmuch as the jury saw her misidentification, and we see nothing that prevented Briley’s
    counsel during cross examination from emphasizing this error and exploring this perceived inability to identify
    Briley at trial, or from challenging her to identify Briley in court even though the prosecutor had not.
    7
    No. 16-1650
    United States v. Pembrook, et al.
    photo-array identification but could not have seen it at the Shell station because it was locked in
    the manager’s office beyond her access, so “someone” from the government must have shown it
    to her, though she could not recall who.13 The police investigator denied this. Proceeding on
    this theory that some unknown police officer surreptitiously showed the surveillance video to
    Graff and coached her to identify Briley (and Calhoun) in the photo array, Briley contends that
    the inquiry was improperly suggestive, that Graff’s identification was unreliable and “implicates
    concerns related to cross-racial identification,” and that the district court erred by refusing to
    suppress Graff’s testimony. Moreover, Briley contends that the government’s failure to disclose
    this supposed meeting and the officer involved violated Brady v. Maryland, 
    473 U.S. 83
    (1963).
    Because this claim rests on Graff’s cross-examination testimony, in which she allegedly
    revealed this (secret and improper) meeting with an unknown police officer, who used the
    surveillance video to coach her to identify Briley and Calhoun, that testimony bears quoting:
    Q.        Did you, on occasion, look at those videos just to see what was on them?
    A.        No, I’m not allowed to go back in the manager’s office. I have no access to that,
    she [the Shell station manager] keeps that under lock and key.
    Q.        Before any officer traveled down to Grand Rapids or some place out of town to look
    at these tapes, did you see them?
    A.        Did I see them when?
    Q.        With the manager of the store, did you go into his [actually her] office and look at
    them for that night?
    A.        I don’t know who I looked [at] them with. It wasn’t that night though.
    Q.        Okay. Well, it was some time before the officer came [with the photo array], wasn’t
    it? You’re shaking your head.
    A.        I do believe so, yes, but I don’t think it was with the manager.
    Q.        How much time did you spend looking at them then?
    A.        I really couldn’t tell you a time.
    Q.        You had some idea when you looked at them, though, about what time it was that
    the officers were interested?
    13
    All defendants and attorneys knew that Graff had viewed the surveillance video prior to her photo-array
    identification, as it was openly discussed at the July 21, 2015, hearing on Calhoun’s motion to suppress that
    identification. See R. 85 at 14, 22. The “new” aspect to this was the accusation that the police had shown it to her.
    8
    No. 16-1650
    United States v. Pembrook, et al.
    A.    Right, but then it refreshed my memory when I seen them people. I gave them a
    description because our screen was grainy.
    Q.    Okay. So, before the officers came, I think that what you said, if I’m not correct,
    please let me know, that you looked at the tapes with someone, right?
    A.    Yes.
    Q.    Did you do that more than once?
    A.    I couldn’t tell you. I couldn’t remember on that one.
    Q.    Okay. And looking at them gave you the opportunity to see what was on those
    tapes, isn’t that right?
    A.    Yes.
    Q.    So, that when it came some later point in time, an officer came with photos [i.e., the
    photo array] that you’ve seen here this morning, right?
    A.    Right.
    Q.    And before those individual photos, you had seen these tapes?
    A.    It was days prior to that.
    Q.    Right. And what you were thinking about in your head was as best as you could
    remember and all these things that included what you could remember about
    working back in April, that was one thing in your memory, right?
    A.    Um-hum.
    Q.    And another thing that was in your memory is what you had seen looking at those
    tapes, right?
    A.    Yes.
    Q.    And so the officer then asked you to look at some photos that you’ve said here today
    are the ones that were shown to you; isn’t that right?
    A.    Correct.
    Q.    And then when you went through this process of picking out someone, what you
    were doing was basing your conclusion, what you thought in response to his
    question, about everything that was in your memory, right?
    A.    Yes.
    Detective Justin DeBoode was the lead investigator for this New Buffalo aspect of the
    investigation and, as such, reviewed the Shell station surveillance video with the station
    manager, questioned Graff with the photo array, and testified as the only witness at the pretrial
    hearing on the defendants’ motion to suppress that photo-array identification. The Shell video
    recorded the suspects on April 21 but the police did not learn of the video until May 28 and
    9
    No. 16-1650
    United States v. Pembrook, et al.
    DeBoode did not speak with Graff until June 3. DeBoode testified that when he first spoke with
    Graff on June 3, which was by telephone, she had already watched the video—he reiterated this
    four times during his testimony—and he assumed that the Shell station manager or another
    employee had shown it to her. According to DeBoode, he met with Graff to view the photo array
    on June 23, almost three weeks later. He testified that neither he nor anyone else from law
    enforcement watched the video with Graff or ever advised her to watch it herself.
    In Briley’s pre-trial motion to suppress Graff’s testimony as improperly relying on the
    surveillance video rather than her own recollection, the district court explained:
    Briley argued that because Graff reviewed the security camera footage before
    viewing the lineup, her identification was not based on her ‘honest recollection’
    of the suspect, but rather, on the image portrayed in the security video. But
    DeBoode testified that neither he nor any other law enforcement agent instructed
    Graff to review the security camera footage before viewing the photo lineup.
    Thus, this is not an argument that the ‘procedure itself’ [i.e., the actions taken by
    the police] rendered the lineup unduly suggestive, but rather that Graff herself
    took certain actions that made her more likely to pick a suspect resembling the
    one pictured on the security video. This is certainly relevant for purposes of
    cross-examination, but it does not bar the admissibility of the identification.
    DeBoode further testified that the hat and clothing worn by the subject on the
    video is different from that being worn by Briley in the photo array, which further
    minimizes the risk that Graf[f] selected Briley merely because she reviewed the
    video and not based on her independent recollection.
    Pembrook, 
    2015 WL 6328186
    at *4 (citation omitted). This reflects that the district court
    believed Detective DeBoode’s testimony that police did not view the surveillance video with
    Graff, a finding of fact regarding witness credibility to which we owe great deference on appeal.
    As for Briley’s Brady claim, the record contains no evidence that any government agent
    showed the surveillance video to Graff, much less coached her, and the government is not
    obliged to produce evidence that it does not have or that does not exist. See United States v.
    Graham, 
    484 F.3d 413
    , 417 (6th Cir. 2007) (“Brady clearly does not impose an affirmative duty
    upon the government to take action to discover information which it does not possess.”); United
    States v. Edwards, 
    442 F.3d 258
    , 266 (5th Cir. 2006) (“The prosecution has no duty to turn over
    10
    No. 16-1650
    United States v. Pembrook, et al.
    to the defense evidence that does not exist.” (editorial marks omitted)); United States v.
    Sukumolachan, 
    610 F.2d 685
    , 687 (9th Cir. 1980) (“Brady [] does not require the government to
    create exculpatory material that does not exist.” (citation omitted)).
    The district court properly denied this motion.
    B.
    The defendants appeal the denial of a pretrial motion to suppress the cell-tower location
    evidence. “In reviewing a ruling on a motion to suppress, we will uphold a district court’s
    factual findings unless they are clearly erroneous, but will conduct a de novo review of a district
    court’s legal determinations.” United States v. Dunning, 
    857 F.3d 342
    , 346 (6th Cir. 2017).
    Prior to trial, the defendants moved to suppress the cell-tower location information that
    Agent Max had obtained and used in the investigation, arguing that they had a legitimate
    expectation of privacy in that information under the Fourth Amendment such that its collection
    required probable cause or a warrant. Agent Max had no warrant, but instead used the Stored
    Communications Act, 18 U.S.C. § 2701, et seq. In short:
    A governmental entity may require a provider of electronic communication
    service or remote computing service to disclose a record or other information
    pertaining to a subscriber to or customer of such service (not including the
    contents of communications) . . . when the governmental entity . . . obtains a court
    order for such disclosure under subsection (d) of this section[.]
    18 U.S.C. § 2703(c)(1)(B). Under subsection (d), such a court order “shall issue only if the
    governmental entity offers specific and articulable facts showing that there are reasonable
    grounds to believe that the contents of a wire or electronic communication, or the records or
    other information sought, are relevant and material to an ongoing criminal investigation.” 
    Id. at §
    2703(d). There is no dispute that “this statutory standard is less than the probable cause
    standard for a search warrant.” United States v. Davis, 
    785 F.3d 498
    , 505 (11th Cir. 2015).
    11
    No. 16-1650
    United States v. Pembrook, et al.
    The district court denied the defendants’ motion to suppress and held that, even if
    mistaken, the government had “an objectively reasonable good-faith belief” that no warrant was
    required. 
    Pembrook, 119 F. Supp. 3d at 595-96
    . “[N]o Supreme Court authority established by
    mid-2014 that obtaining cell-site data—even data that might reveal [the defendants’] daily travel
    over a six-week period or disclose [their] presence in a private place—was a search within the
    meaning of the Fourth Amendment,” 
    id. at 591;
    nor did any Sixth Circuit case establish such
    precedent, 
    id. at 592-93;
    nor was the out-of-Circuit precedent compelling (or consistent), 
    id. at 593-95.
    The district court concluded that, “[a]lthough it may ultimately become settled [law]
    that long-term tracking via cell phones . . . requires a warrant supported by probable cause, that
    law was not established at the time the Government sought and obtained the cell-site data at issue
    in this case. Deterrence, therefore, will not be forwarded by suppression.” 
    Id. at 599.
    We agree
    and find no constitutional reason to suppress the cell-tower location evidence.14
    Calhoun also argued for suppression on the basis that Agent Max had provided the court
    an insufficient factual basis, which failed to satisfy the “reasonable grounds” requirement of the
    Stored Communications Act, 18 U.S.C. § 2703(d). But the district court explained that even if
    that accusation were true (without conceding that it was), because the Act’s remedy provision,
    § 2707, does not provide for suppression as a remedy, the court was not authorized to suppress
    the cell-tower location information on such a theory. 
    Pembrook, 119 F. Supp. 3d at 585
    .
    In the initial application for the “tower dump,” the AUSA (on behalf of Agent Max)
    briefly informed the magistrate judge about the particulars of the two robberies—the severity, the
    violence, and their similarities, such as that the surveillance video from the two stores supported
    14
    Since the district court ruled, we (temporarily, it turns out) held that cell-tower location information is
    not protected. United States v. Carpenter, 
    819 F.3d 880
    , 890 (6th Cir. 2016) (“[W]e hold that the government’s
    collection of business records containing cell-site data was not a search under the Fourth Amendment.”). But the
    Supreme Court granted certiorari in Carpenter, No. 16-402, 
    2017 WL 2407484
    (June 5, 2017), which vacated it and
    holds open the possibility of a different rule. Therefore, we do not rely on Carpenter in this decision.
    12
    No. 16-1650
    United States v. Pembrook, et al.
    the suspicion that the same robbers committed both—and concluded that he “believe[d] that cell
    tower information in the two locations may reveal a common [cell phone] number that was
    active at each location around the time of the crime [and] identification of this number w[ould]
    aid in identifying potential suspects involved in the robberies.” Calhoun’s primary complaint is
    that “[t]he application provided no facts to establish cause to believe any cell phone was used.”
    That is a specious claim.
    Calhoun’s legal argument is that the factual rendition supplied to the magistrate judge did
    not provide “reasonable grounds to believe that the . . . records . . . sought[] [we]re relevant and
    material to an ongoing criminal investigation,” § 2703(d), but was instead a “fishing expedition”
    akin to a “general warrant” prohibited by the Fourth Amendment. But under the statutory
    standard of “reasonable grounds to believe the records are material to an ongoing investigation,”
    we conclude that the facts provided here were sufficient.
    The district court properly denied this motion.
    C.
    The defendants claim the district court improperly admitted expert and lay testimony
    about the cell-tower-location evidence. We review the district court’s admission of testimony at
    trial for an abuse of discretion. United States v. LaVictor, 
    848 F.3d 428
    , 440 (6th Cir. 2017).
    Pembrook argues that the district court abused its discretion by allowing FBI Agents
    Christopher Hess and Brian Max to testify as expert and lay witness, respectively, about the cell-
    tower-location data, specifically about how the cell-site analysis placed phones linked to the
    defendants in proximity to the robberies.        Pembrook relies primarily on United States v.
    Reynolds, 626 F. App’x 610 (6th Cir. 2015), for the proposition that such analysis is unreliable.
    The government answers that cell-site analysis is reliable, citing United States v. Hill, 
    818 F.3d 13
    No. 16-1650
    United States v. Pembrook, et al.
    289, 299 (7th Cir. 2016) (“The science and methods upon which the technique is based are
    understood and well documented.”), and argues that “Reynolds is flawed.” 15
    Flawed or not, the cell-site analysis proffered in Reynolds differs significantly from the
    cell-site analysis here, based on the precision of the location. The cell-site analysis in Reynolds
    was focused on a cell-site’s “sector” (the area in range of a specific tower) with the actual
    question being whether certain calls established that the phone owner was outside a certain
    sector, so as to exclude those phone owners as suspects. Here, in contrast, the cell-site analysis
    was of a much larger geographical area, and focused on whether the calls established that the
    phone owners (from Philadelphia) were in the proximity of Medawar jewelry (Plainfield
    Township, Michigan, near Grand Rapids) at noon, Tapper’s jewelry (West Bloomfield
    Township, Michigan, near Detroit) at 5:00 p.m., and New Buffalo, Michigan, the night before.
    At this level of geographic distance, cell-site analysis is established as reliable.16 See United
    States v. Lewisbey, 
    843 F.3d 653
    , 659 (7th Cir. 2016) (“Using call records and cell towers to
    determine the general location of a phone at specific times is a well-accepted, reliable
    methodology.”).        In fact, even Reynolds appears to contradict Pembrook’s argument.                          See
    Reynolds, 626 F. App’x at 617-18 (explaining that “such a challenge speaks to the weight of the
    evidence, and not to its inherent reliability, because there are identifiable, measurable, and
    scientifically accepted factors that determine a cell tower’s maximum coverage range”).
    Pembrook continues on the same theme by arguing that the cell-site analysis—and,
    therefore, Hess’s expert testimony about it—did not satisfy Daubert v. Merrell Dow
    15
    The government argues that Reynolds misread its cited cases, relied on an outdated technical manual, and
    made unfounded assumptions. Moreover, Reynolds is unreported and, therefore, not controlling.
    16
    As the district court framed this: “The Government explains that it ‘is not attempting to put a particular
    cell phone in a very specific location via Agent Hess’[s] testimony’; instead, it ‘is attempting to show how the four
    phones in question originated in [] Philadelphia, Pennsylvania[,] on April 21, 2014, traveled in a similar pattern over
    the next few days, were in the Grand Rapids and West Bloomfield areas around the time[s] of the robberies, and
    traveled back to Philadelphia on April 22-23, 2014.’ The Government ‘concedes’ that cell-site data cannot place
    Defendants ‘in a precise location.’” 
    Pembrook, 119 F. Supp. 3d at 597
    (citations and editorial marks omitted).
    14
    No. 16-1650
    United States v. Pembrook, et al.
    Pharmaceuticals, Inc., 
    509 U.S. 579
    , 595 (1993), or Federal Rule of Evidence 702(c). In
    testifying about how he used cell-site analysis to track the phones in question (i.e., Philadelphia
    to New Buffalo, to near Medawar at the time of the first robbery, to near Tapper’s at the time of
    the second robbery, and back to Philadelphia), Hess explained that cell phones connect to a
    nearby tower but not necessarily the closest tower; rather the phones connect to the tower with
    the strongest signal, so distance is just one factor, along with others such as geography, physical
    obstruction, interaction with other towers, or the number of users in the system. A cell phone
    could connect to a tower as much as seven miles away, but obviously a phone in Philadelphia
    would not connect to a tower in Michigan, nor would a phone in Grand Rapids connect to a
    tower in Detroit (150 miles away).
    Pembrook’s argument that Hess’s expert testimony was improper because cell-site
    analysis is unproven and unreliable under Daubert and FRE 702(c) unravels before it begins
    because the particular form of cell-site analysis and corresponding testimony used here was
    reliable. To the extent that Pembrook contends that this form of cell-cite analysis has not been
    objectively tested or subjected to peer review, 
    Daubert, 509 U.S. at 595
    , that contention appears
    to be incorrect. See, e.g., Aaron Blank, The Limitations and Admissibility of Using Historical
    Cellular Site Data to Track the Location of a Cellular Phone, 18 RICH. J.L. & TECH. 3 (2011).
    And to the extent that Pembrook complains about the absence of error rate data, such analysis is
    inapplicable to the particular form of analysis and expert testimony at issue. Because the cell-
    site analysis and associated testimony presented here was reliable, the absence of a Daubert
    hearing or 702(c) inquiry does nothing to undermine the court’s ruling.17
    17
    In his Reply Brief, Pembrook argues that a “forensic radio survey” was necessary to “pinpoint” the call
    origin, without which the cell site information was useless and Hess’s testimony inadmissible. This is the first
    mention of a forensic radio survey, so this argument was forfeited, but even if it had been raised, it is irrelevant
    inasmuch as Hess was not “pinpointing” locations, as we explained in the text above.
    15
    No. 16-1650
    United States v. Pembrook, et al.
    Finally, Pembrook argues that Agent Max, a lay witness, gave expert testimony in
    violation of FRE 701(c) and testified about parts of the investigation that were outside of his
    personal knowledge. But Agent Max did not explain how the cell-site analysis works, he
    testified about his use of reports to locate the suspects; that is, he used a report that matched a
    cell phone number to a tower and its location at a certain time, testimony that requires no
    expertise. Agent Max also testified about certain background activities (such as the tower dump,
    the delay in obtaining the records, and certain errors in those records, including a misspelling of
    Detroit) that led up to his portion of the investigation, all of which was within his personal
    knowledge even though he did not actually conduct those preliminary activities. This was
    legitimate lay testimony. See United States v. Wilson, 653 F. App’x 433, 443 (6th Cir. 2016).
    The district court did not abuse its discretion by admitting this testimony.
    D.
    The defendants claim a Brady/Giglio violation regarding background information on the
    inmate witness. If a defendant properly preserves his Brady/Giglio claim,18 then our review is de
    novo. United States v. Rafidi, 
    829 F.3d 437
    , 446-47 (6th Cir. 2016). But if the defendant fails to
    properly preserve the claim, then our review is for plain error. United States v. Crayton,
    
    357 F.3d 560
    , 569 (6th Cir. 2004). We need not decide whether this claim was properly
    preserved because even under de novo review this claim would fail.
    Pembrook argues that the government violated Brady and Giglio by withholding certain
    background information about jailhouse-informant-witness James Jenkins.                                  He points
    Pembrook also complains that Hess “failed to disclose the serious pitfalls of cell-site analysis” and “failed
    to provide adequate disclaimers about the unreliability of his methodology.” Of course, this would have been good
    information for Pembrook’s attorney to draw out on cross examination.
    18
    See Brady v. Maryland, 
    373 U.S. 83
    , 87 (1963) (holding that “the suppression by the prosecution of
    evidence favorable to an accused upon request violates due process where the evidence is material either to guilt or
    to punishment, irrespective of the good faith or bad faith of the prosecution”); Giglio v. United States, 
    405 U.S. 150
    ,
    154-55 (1972) (holding that Brady requires the disclosure of an agreement between the prosecution and its witness).
    16
    No. 16-1650
    United States v. Pembrook, et al.
    specifically to Jenkins’s complete Michigan Department of Corrections prison disciplinary
    records that defense counsel theoretically could have used for impeachment, though Pembrook
    does not specify how.
    The government responds that Michigan state prison records do not fall within Brady’s
    coverage of materials that the federal prosecutor would have in its possession. See, e.g., United
    States v. Aichele, 
    941 F.2d 761
    , 764 (9th Cir. 1991) (holding that a federal prosecutor had no
    duty to procure materials prepared for the state courts which were not otherwise under federal
    control). Moreover, disciplinary records, which would not bear on Jenkins’s truthfulness, were
    neither material nor admissible at trial. United States v. Phibbs, 
    999 F.2d 1053
    , 1089 (6th Cir.
    1993) (“Frequently, though, evidence associated with ‘suspected’ wrongdoing will not be
    admissible even for impeachment purposes, having no bearing on the capacity for truth of any
    witness.”). Finally, because Pembrook failed to specify, let alone prove, how the records would
    have changed the trial’s outcome, he has shown no prejudice from the alleged withholding.
    This claim has no merit.
    E.
    The defendants claim the district court erred by denying their Bruton-based motion to
    sever the trials. An alleged Bruton violation is a Confrontation Clause challenge, which we
    review de novo. United States v. Ford, 
    761 F.3d 641
    , 652 (6th Cir. 2014).
    Calhoun claims that the district court improperly refused to sever the trials when the
    government called inmate James Jenkins to testify about Pembrook’s jailhouse admissions to the
    conspiracy and his identification of the other defendants. And Johnson claims that the inability
    to cross-examine co-defendant Pembrook about his conversation with Jenkins, particularly the
    alleged admission and identifications, violated his (and Calhoun’s and Briley’s) Sixth
    17
    No. 16-1650
    United States v. Pembrook, et al.
    Amendment right to confront the witness against him, pursuant to Bruton v. United States,
    
    391 U.S. 123
    (1968), which found such a violation due to a co-defendant’s confession.
    But “the Confrontation Clause has no bearing on nontestimonial out-of-court statements,”
    United States v. Johnson, 
    581 F.3d 320
    , 325 (6th Cir. 2009), which means that Bruton is limited
    to only testimonial statements, United States v. Crowe, 614 F. App’x 303, 307 (6th Cir. 2015)
    (“Because the Bruton principle is premised upon the Confrontation Clause, the principle applies
    only to testimonial statements.”).     And statements from one inmate to another are not
    testimonial. Fields v. Birkett, 461 F. App’x 454, 457-58 (6th Cir. 2012); see also Davis v.
    Washington, 
    547 U.S. 813
    , 825 (2006) (opining that the statements from one prisoner to another
    in Dutton v. Evans, 
    400 U.S. 74
    , 87-89 (1970) “were clearly nontestimonial”).
    This claim has no merit.
    F.
    The defendants claim that the evidence was insufficient to support their convictions. We
    review sufficiency of the evidence de novo, asking whether, upon viewing all of the evidence in
    the light most favorable to the prosecution, any rational juror could have found all of the
    elements beyond a reasonable doubt. Jackson v. Virginia, 
    443 U.S. 307
    , 319 (1979).
    Some facts are not in dispute. At noon on a Tuesday, four masked men robbed the
    Medawar jewelry store by force, brandishing guns and threatening employees.             One was
    Pembrook, whose participation was established by DNA and ballistic evidence. All four drove
    off together in a black Chrysler Town & Country minivan. At 5:15 p.m. that same day, three
    masked men similarly robbed the Tapper’s jewelry store by force, brandishing guns and
    threatening employees. In the surveillance video, these three were dressed the same as the men
    involved in the earlier robbery and appeared to be the same men, minus Pembrook. They also
    drove off in a black Chrysler Town & Country minivan that appeared to be the same van as had
    18
    No. 16-1650
    United States v. Pembrook, et al.
    been used in the earlier robbery. In the videos, these three and this van were also associated with
    a white Volkswagen Passat. None of this is in any reasonable dispute. On the other hand, no
    witnesses to the robberies could actually identify any of the robbers.
    There is overwhelming evidence that Pembrook and three other robbers were guilty of
    the robbery, conspiracy, and firearms crimes as charged. See United States v. Graewe, 
    774 F.2d 106
    , 107-08 (6th Cir. 1985) (“[A] conspirator may be held liable of a substantive offense
    committed by co-conspirators provided the substantive offense was committed in furtherance of
    the conspiracy and as part of it.”). The question is whether Briley, Calhoun, and Johnson were
    the three other robbers. More to the point, the question is whether the government proved it.
    Briley claims that Graff’s identification was tainted, unreliable, and irrelevant in that it
    did not place him at either robbery. And he says the other circumstantial evidence was severely
    flawed, to wit: (1) while the distinctive outfit of bomber jacket and long flannel shirt was seen in
    both the photo from his phone and certain surveillance videos, the government could not prove
    they were exactly the same or that others could not have had that same outfit, and that outfit did
    not appear in the robbery surveillance videos; (2) the images in the surveillance videos were not
    clear enough to conclusively match the suspect (alleged to be Briley) in the New Buffalo videos
    to the suspect in the jewelry store videos, and even the government argued only that the suspects
    had a “similar build” or “similar clothes”; and (3) while the government had tracked a cell phone
    with a number ending 7819 along the robbery pattern and had attributed that #7819-phone to
    Briley based on calls to his ex-wife, current girlfriend, daughter, and mother, Briley had
    presented certain evidence that his only cell phone number ended with 6615, and phone records
    19
    No. 16-1650
    United States v. Pembrook, et al.
    showed that the #6615-phone had been in Philadelphia, making and receiving texts and calls,
    during the April 21 to 23 timeframe of the robberies in Michigan.19
    The government points to six things that, taken together, are sufficient to permit a rational
    juror to convict Briley: (1) the #7819-phone was linked to Briley by calls to his family and
    friends, followed the robbery pattern, and had nine calls on the day of the robberies to the
    Calhoun and Johnson phones; (2) the jury saw the Tapper’s exterior video, in which Briley was
    recognizable getting out of the Passat, walking around, and returning to the black minivan (from
    which three masked robbers next emerged, wearing the same outfits as the Medawar robbers had
    worn); (3) the jury saw the surveillance video of the black minivan at the Medawar robbery and
    of both the Passat and minivan at the New Buffalo Comfort Inn the night before; (4) the jury saw
    the Shell station surveillance video with the “grainy” images, and heard testimony (from cashier
    Sue Graff) that identified Briley as one of the customers; (5) Briley’s cell phone seized by police
    contained a photograph of him wearing the same recognizable outfit as in the Shell video and
    outside Tapper’s; and (6) Pembrook called Briley from his hospital room the day after the
    robberies. This evidence is enough to support a juror’s conclusion that Briley was one of the
    robbers, and Briley’s arguments to the contrary do not undermine this conclusion in any
    meaningful way.
    Calhoun claims that the district court erred by denying his motion for acquittal because
    the government’s circumstantial evidence was insufficient: no witness identified Calhoun at
    either robbery, no evidence (testimonial or otherwise) proved that Calhoun ever had a gun or
    agreed to any conspiracy, the identification by the Shell station witness (Graff) was equivocal
    19
    This evidence was two-fold: when the police arrested Briley, he had the #6615-phone in his possession
    (not the #7819-phone, which was never physically connected to him); also, Briley introduced as evidence an email
    that he sent to his daughter from prison in which he wrote that his only cell phone number was the one ending 6615.
    20
    No. 16-1650
    United States v. Pembrook, et al.
    and unreliable, and no witness actually identified Calhoun as the renter of the Passat—the
    connection instead was based only on rental records, namely, his driver’s license and credit card.
    The government points to five things that, taken together, are sufficient to permit a
    rational juror to convict Calhoun: (1) the #0033-phone was linked to Calhoun by calls to his
    mother and girlfriend, as well as the recorded call to Enterprise in which he identified himself by
    name, that phone followed the robbery pattern, and that phone had 15 calls on the day of the
    robberies to the Briley and Johnson phones; (2) Calhoun’s driver’s license and credit card were
    used to rent the white Volkswagen Passat that was with the black minivan in the videos from the
    New Buffalo Comfort Inn and Shell station on April 21 and outside Tapper’s before the robbery;
    (3) when arrested, Calhoun was with Briley and was carrying the driver’s license and credit card
    used to rent the Passat; (4) Sue Graff identified Briley as one of the customers in the Shell station
    on April 21; and (5) the jurors watched the multiple surveillance videos for themselves. This is
    enough evidence to support a juror’s conclusion that Calhoun was one of the robbers, and his
    arguments to the contrary do not undermine this conclusion in any meaningful way.
    Johnson admits to being in the vicinity of the robberies, but argues that the government
    did not prove that he was one of the robbers. He also argues that nothing proves that the use of a
    gun in the conspiracy was separate and distinct from the use of a gun in the Tapper’s robbery.
    The government points to three things that, taken together, are sufficient to permit a
    rational juror to convict Johnson: (1) the #1434-phone that he gave to a friend who gave it to the
    FBI, was linked to Calhoun by over 100 calls to his girlfriend, followed the robbery pattern, and
    called the Briley and Calhoun phones numerous times throughout the day of the robberies;
    (2) Johnson’s friend—to whom he had given the cell phone—identified Johnson in the Shell
    station surveillance video; (3) the jurors watched the surveillance videos for themselves,
    including video of Johnson loitering outside Tapper’s before the robbery and the video of the
    21
    No. 16-1650
    United States v. Pembrook, et al.
    suspect wearing the same outfit as Johnson had been wearing in his Facebook page photos. This
    is enough evidence to support a juror’s conclusion that Johnson was one of the four robbers, and
    his arguments to the contrary do not undermine this conclusion in any meaningful way.
    These sufficiency-of-the-evidence claims fail.
    G.
    The defendants claim the verdict on the second § 924(c) charge violated due process.
    Calhoun and Johnson argue that the § 924(c) charge in Count 4 was duplicative of the § 924(c)
    charge in Count 2, because both were predicated on the same underlying conduct (the Tapper’s
    robbery), subjecting them to double jeopardy in violation of the Constitution. The district court
    disagreed, explaining at least three times20 that Count 2 addressed the defendants’ decision to use
    a firearm during the Tapper’s robbery while Count 4 addressed the decision to use a firearm in
    connection with the conspiracy (to travel across four states and rob Tapper’s and Medawar),
    which were separate crimes. Johnson protests that “there is no way to distinguish the use of a
    gun in the conspiracy from the use of a gun at the Tapper’s robbery,” so they must be the same
    crime, not two separate crimes.
    Briley also argues that the counts are duplicative, quoting United States v. Vichitvongsa,
    
    819 F.3d 260
    , 269 (6th Cir. 2016) (“the government must prove both a use, carry, or possession,
    as well as a qualifying crime”), and insists that the robbery and conspiracy offenses occurred
    simultaneously, were based on the same course of conduct, and were limited to only one actual
    act of brandishing. To be sure, Vichitvongsa holds that “one affirmative firearm act (brandishing
    a handgun) [that] simultaneously commit[s] two predicate offenses (conspiring to commit Hobbs
    20
    Calhoun raised this argument in a pre-trial motion to dismiss either Count 2 or 4, which the court denied.
    Calhoun raised it again during trial in his motions for acquittal, which the court denied. And Calhoun raised this
    argument in his post-trial motion for a new trial or relief from judgment. Again, the court denied the motion. It
    does not appear from the record or from Calhoun’s rendition in his brief that he modified this argument in any way
    at any point.
    22
    No. 16-1650
    United States v. Pembrook, et al.
    Act robbery and to traffic drugs), . . . does not support two § 924(c) convictions,” because
    Vichitvongsa only used the gun once. 
    Id. at 267.
    Thus, we acknowledged that “the imposition
    of separate consecutive sentences for multiple § 924(c) violations occurring during the same
    criminal episode [is] lawful,” 
    id. at 269
    (quotation marks omitted), but “the defendant must use,
    carry, or possess a firearm—even if it is the same [firearm]—more than once,” 
    id. at 269
    , so the
    question is “whether the defendant made more than one choice to use, carry, or possess a
    firearm,” 
    id. at 270.
    Briley is right about the law but wrong about the facts. As the district court
    explained repeatedly: the defendants used, carried, or possessed a firearm in (1) possessing and
    transporting for the purpose of the robberies (conspiracy); (2) robbing the Medawar store (here
    charged as part of the conspiracy); and (3) robbing the Tapper’s store (robbery). Focusing on the
    Medawar robbery as the basis for the conspiracy, the two crimes (Medawar-based conspiracy
    and Tapper’s robbery) did not occur simultaneously, were not the same course of conduct, and
    were not limited to only one actual act of brandishing. These were two separate crimes.
    Pembrook argues that, given the evidence that he did not physically participate in the
    Tapper’s robbery (his having already been shot),21 the court’s verdict form limited the jury to
    either of two improper bases for convicting him on the second § 924(c) use-of-a-firearm charge:
    either by implicitly convicting him of the Medawar robbery, which was not charged and was
    outside the venue of the Eastern District of Michigan; or by convicting him twice for the same
    conspiracy charge, in that his “participation” in the Tapper’s robbery—at most, aiding and
    abetting—is the same conduct as the conspiracy. The question on the verdict form was this:
    If guilty as to Count Four [the second § 924(c) charge], we unanimously find that
    the use and carry of the firearm was during and in relation to, conduct separate
    and distinct from the conduct charged in Count One [the Tapper’s robbery][.]
    21
    Note that the evidence does not show or prove that Pembrook was entirely absent from the Tapper’s
    robbery; rather, there is a lack of evidence that he was inside the Tapper’s store during the robbery. Where he
    actually was is not in evidence, but he did not show up at the hospital until nearly twelve hours after the robbery.
    23
    No. 16-1650
    United States v. Pembrook, et al.
    R. 146 (verdict form). The jury convicted Pembrook on Count 1.
    Beguiling though Pembrook’s argument might be, his problem is that aiding-and-abetting
    is merely a constructive version of the substantive robbery offense and is, therefore, a separate
    crime from conspiring. United States v. Bradley, 
    421 F.2d 924
    , 927-28 (6th Cir. 1970) (relying
    on Pereira v. United States, 
    347 U.S. 1
    , 11 (1954) (“Aiding, abetting, and counseling are not
    terms which presuppose the existence of an agreement.”)). Therefore, the government charged
    —and the jury convicted—Pembrook on two separate crimes: aiding-and-abetting the Tapper’s
    robbery and conspiring via the Medawar robbery. And, as has already been explained herein, the
    government produced sufficient evidence of each to support the two convictions.
    This claim has no merit.
    H.
    The defendants claim that 18 U.S.C. § 924(c)(3)(B) is unconstitutionally vague, such that
    the § 924(c) minimum sentences do not apply and resentencing is warranted. This argument is
    that the conspiracy in this case (conspiracy to commit Hobbs Act robbery) is not a crime of
    violence because § 924(c)(3)(B) is unconstitutionally vague and therefore invalid, as the Court
    found § 924(e)(2)(B) to be in Johnson v. United States, 
    135 S. Ct. 2551
    (2015). The problem for
    the defendants is that we have, since Johnson, held that § 924(c)(3)(B) is not vague (i.e., it is
    valid), see United States v. Taylor, 
    814 F.3d 340
    , 376-79 (6th Cir. 2016). But the defendants
    preserve this claim on the possibility that the case of Sessions v. Dimaya, No. 15-1498, 
    137 S. Ct. 31
    (2016), pending in the Supreme Court on the question of whether 18 U.S.C. § 16(b) is
    unconstitutionally vague per Johnson, will result in their favor. Their theory, which they say was
    24
    No. 16-1650
    United States v. Pembrook, et al.
    raised at oral argument in Dimaya (Jan. 17, 2017), is that § 16(b) and § 924(c)(3)(B) are
    materially identical, so if one is vague then the other must be also.22
    Were the defendants correct that § 924(c)(3)(B) is invalid and the conspiracy (and Hobbs
    Act robbery as well, Pembrook claims23) is not a crime of violence, such that the § 924(c)
    sentencing minimum does not apply, they would be entitled to resentencing. But that is not
    correct under our presently prevailing law. 
    Taylor, 814 F.3d at 376-79
    .
    This claim fails per our decision in Taylor, though it is preserved for possible
    reconsideration pending the forthcoming decision in Dimaya.
    III.
    For the foregoing reasons, we AFFIRM the judgment of the district court.
    22
    Calhoun concedes that “[t]his issue was not specifically raised in the district court.” But, given that
    Johnson is retroactive, per Welch v. United States, 
    136 S. Ct. 1257
    (2016), then Dimaya would likely apply anyway
    and even preservation may be unnecessary.
    Calhoun urges us to reverse Taylor (he says “modify” but his desired modification is actually a reversal) on
    two bases: (1) the intervening Supreme Court cases of Welch and Mathis v. United States, 
    136 S. Ct. 2243
    (2016),
    have overruled it; and (2) two subsequent Sixth Circuit cases have found to be unconstitutional certain statutes with
    “almost identical” language, in United States v. Pawlak, 
    822 F.3d 902
    (6th Cir. 2016) (abrogated), and Shuti v.
    Lynch, 
    828 F.3d 440
    (6th Cir. 2016). The first contention is simply not true; as to the latter, even if it were relevant,
    in the time since Calhoun filed his brief, the Supreme Court abrogated Pawlak in Beckles v. United States, 
    137 S. Ct. 886
    (2017), and the government filed a certiorari petition in Shuti, which is pending.
    23
    The government argues that Hobbs Act robbery is a crime of violence under the force clause,
    § 924(c)(3)(A), without regard to the residual clause, so Dimaya would have no effect on that count regardless.
    25