United States v. Kuc , 737 F.3d 129 ( 2013 )


Menu:
  •           United States Court of Appeals
    For the First Circuit
    No. 12-2496
    UNITED STATES OF AMERICA,
    Appellee,
    v.
    MATTHEW J. KUC,
    Defendant, Appellant.
    APPEAL FROM THE UNITED STATES DISTRICT COURT
    FOR THE DISTRICT OF MASSACHUSETTS
    [Hon. Douglas P. Woodlock, U.S. District Judge]
    Before
    Lynch, Chief Judge,
    Torruella and Thompson, Circuit Judges.
    Dana A. Curhan, for appellant.
    Mark T. Quinlivan, Assistant United States Attorney, with whom
    Carmen M. Ortiz, United States Attorney, was on brief for appellee.
    December 10, 2013
    TORRUELLA, Circuit Judge. Defendant-Appellant Matthew J.
    Kuc ("Kuc") was indicted for fraudulently obtaining computer parts
    and selling them for profit.      After a four-day jury trial, Kuc was
    convicted of four counts of wire fraud, one count of possession of
    stolen property, and one count of aggravated identity theft.               On
    appeal,   Kuc   presents   two   claims:   1)   the   search    warrant   was
    defective because it violated the Fourth Amendment's particularity
    requirement, and 2) the evidence was insufficient to convict Kuc of
    aggravated identity theft.       Neither claim has merit, and for the
    reasons that follow, we affirm.
    I. Background
    Because Kuc challenges the sufficiency of the evidence
    against him, "we rehearse the facts in the light most favorable to
    the jury verdict, consistent with record support."             United States
    v. Valerio, 
    676 F.3d 237
    , 240-41 (1st Cir. 2012) (citations
    omitted).
    A.   Kuc's Fraudulent Scheme
    From June 1, 2005 until December 14, 2010, Kuc engaged in
    a fraudulent scheme to obtain computer parts from several computer
    companies, including Dell, 3Com, Hewlett-Packard, and Lenovo.              He
    would begin by contacting a computer company via telephone or
    online chat session, claiming that he needed a replacement part for
    a defective computer component that was under warranty.            As proof,
    Kuc would provide the company with a serial number or service tag
    -2-
    that belonged to a real piece of computer equipment under warranty.
    The company would then mail Kuc a free replacement part with the
    expectation that he would return the defective part upon receipt,
    but in most instances, Kuc failed to do so.             This is because Kuc
    neither owned nor had the right to service the components that he
    falsely claimed were defective.              Instead, he manipulated the
    companies'    warranty   procedures     to    receive   free   "replacement"
    computer parts, including tape drives, motherboards, hard drives,
    and processors, which he subsequently sold online for profit.
    To prevent the companies from detecting his fraudulent
    activities, Kuc used multiple shipping addresses when requesting
    replacement    parts.    In    addition,     Kuc   utilized    a   variety    of
    alternate spellings of each address, such as "3-6 Laurelwood Drive"
    and "36 Louralwood Drive." Each version was sufficiently different
    to slip through the companies' internal fraud-detection system but
    sufficiently similar to a real address that deliveries would still
    arrive at their intended destination.           Kuc also used hundreds of
    aliases, such as "Tadeusz Tadeusz," "Ray Di Ciaccio," and "Sue
    Parchesco,"     to   request    the    warranty     replacement      parts.
    Additionally, he used alternate spellings of his own and other
    names, such as "Matt Kook," "Matt Kuk," and "Matt Cook."
    One of the names that Kuc used on numerous occasions was
    Francisco Samuel ("Samuel").      Samuel, a business associate of Kuc,
    gave Kuc permission to deliver packages to Samuel's business at 42
    -3-
    Union Street in Attleboro, Massachusetts because Kuc told Samuel
    that no one was present to accept morning deliveries at Kuc's place
    of employment.     Samuel and Kuc did not discuss the use of Samuel's
    name   on   the   packages,   and   Samuel   did    not   know   about   Kuc's
    fraudulent scheme.       Nevertheless, Kuc used Samuel's name and
    variations of Samuel's name, together with variations of the name
    of Samuel's company, to receive computer parts at 42 Union Street
    and other addresses.
    Once Kuc received the "replacement" computer equipment,
    he sold the parts online through a business he called Total Asset
    Recovery.    In total, Kuc received in excess of $3,576,000 worth of
    replacement parts from computer companies, and he made a total of
    $1,322,066 from online sales.1
    B.   The Search of Kuc's Residence
    The North Attleboro Police Department initially learned
    of Kuc's scheme in 2009 from investigators who were working for one
    of the defrauded computer companies.               In 2010, Special Agent
    Kenneth Heitkamp of the Federal Bureau of Investigation, working in
    concert with the North Attleboro police, discovered that Kuc was
    selling parts from other computer manufacturers as well.                    On
    December 10, 2010, Agent Heitkamp applied for and received a
    1
    The record is not clear as to what percentage, if any, of Kuc's
    business at Total Asset Recovery was based on non-fraudulent
    acquisitions and sales.
    -4-
    warrant to search Kuc's residence.         The search warrant specified
    the location to be searched and authorized the seizure of:
    All records, in whatever form, and tangible
    objects that constitute evidence, fruits, and
    instrumentalities of violations of 18 U.S.C.
    §§ 1343 (wire fraud), 2314 (interstate
    transportation of stolen property), 2315
    (storage and sale of stolen property in
    interstate commerce), and 2 (aiding and
    abetting), including, without limitation:
    [list of twenty-three categories of items].
    On December 14, 2010, agents searched Kuc's residence and
    seized over 170 boxes of computer parts with markings from Dell,
    3COM, Lenovo, and Hewlett-Packard.         Agents also seized a notebook
    and computer files containing lists of different names, companies,
    and addresses that Kuc had used to receive computer parts.                  A
    forensic examiner later discovered computer files with scripted
    chat conversations that Kuc had used to request replacement parts.
    On March 1, 2012, Kuc filed a motion to suppress the
    fruits   of    the   search   warrant,   arguing   that   it   violated   the
    particularity requirement of the Fourth Amendment.              On June 14,
    2012, the district court denied the motion, and the evidence taken
    from Kuc's residence was admitted at trial.          Ultimately, the jury
    convicted Kuc of four counts of wire fraud, in violation of 18
    U.S.C. § 1343; one count of receipt, possession, and storage of
    stolen property in interstate commerce, in violation of 18 U.S.C.
    § 2315; and one count of aggravated identity theft, in violation of
    18 U.S.C. § 1028A.
    -5-
    II. Analysis
    Kuc makes two claims of error on appeal.                   First, he
    argues that the district court erred in denying his motion to
    suppress the fruits of an invalid search warrant.                   Second, he
    claims that the court erred in denying his motion for judgment of
    acquittal on the aggravated identity theft charge.                 We take each
    claim in turn.
    A.   The Motion to Suppress
    When reviewing a district court's denial of a motion to
    suppress, we review factual findings for clear error and legal
    conclusions de novo.      United States v. Crooker, 
    688 F.3d 1
    , 6 (1st
    Cir. 2012).   If "any reasonable view of the evidence supports the
    decision," we must affirm.        United States v. Tiem Trinh, 
    665 F.3d 1
    , 9 (1st Cir. 2011) (quoting United States v. Woodbury, 
    511 F.3d 93
    , 97 (1st Cir. 2007)).
    Kuc   argues    that    the       search    warrant   violated     the
    particularity    requirement      of   the    Fourth   Amendment    because    it
    contained broad language and provided effectively no limitations on
    the scope of the search.       To support this claim, he relies on the
    first paragraph of the warrant's text, which authorizes the seizure
    of "[a]ll records . . . and tangible objects that constitute
    evidence, fruits, and instrumentalities of violations of [specified
    criminal   statutes]      including,         without   limitation,"     certain
    -6-
    enumerated categories of items.2    The language "including, without
    limitation," is -- according to Kuc -- evidence that this was a
    general warrant contravening the Fourth Amendment's requirement
    that   warrants   must   "particularly   describ[e]   the   place   to   be
    searched, and the persons or things to be seized."           U.S. Const.
    amend. IV. The references to certain criminal statutes cannot save
    the warrant, Kuc adds, because a general warrant limited only by
    reference to a broad criminal statute has "no limitation at all."
    See United States v. Roche, 
    614 F.2d 6
    , 8 (1st Cir. 1980) (finding
    that search warrant violated particularity requirement where its
    only limitation was a reference to the mail fraud statute).
    Kuc is certainly correct insofar as he argues that
    general warrants "authoriz[ing] the wholesale rummaging through a
    person's property" are invalid.     United States v. Upham, 
    168 F.3d 532
    , 535 (1st Cir. 1999).      The particularity requirement demands
    that a valid warrant: (1) must supply enough information to guide
    and control the executing agent's judgment in selecting where to
    search and what to seize, and (2) cannot be too broad in the sense
    that it includes items that should not be seized.           Id.; see also
    United States v. Abrams, 
    615 F.2d 541
    , 545-46 (1st Cir. 1980).
    2
    We note that Kuc has elected not to argue on appeal that any of
    the twenty-three categories of items violated the particularity
    requirement, and thus such argument is deemed waived. See Dialysis
    Access Ctr., LLC v. RMS Lifeline, Inc., 
    638 F.3d 367
    , 374 n.7 (1st
    Cir. 2011).
    -7-
    Despite Kuc's assertions to the contrary, however, the warrant in
    this case did not run afoul of the particularity requirement.
    Kuc's argument misses the mark because he reads the
    warrant's first clause in isolation.               We recognized long ago that
    a warrant's language must be read in context, such that "the
    'general' tail of the search warrant will be construed so as not to
    defeat the 'particularity' of the main body of the warrant."
    
    Abrams, 615 F.2d at 547
    (citing Andresen v. Maryland, 
    427 U.S. 463
    ,
    480-81 (1976)).        In Andresen, the Supreme Court rejected the claim
    that an otherwise valid warrant was rendered impermissibly general
    by    the   addition      of   the    phrase    "together   with   other     fruits,
    instrumentalities, and evidence of crime at this (time unknown),"
    because the phrase had to be read in context and together with the
    warrant's "lengthy list of specified and particular items to be
    
    seized." 427 U.S. at 479-81
    .            Similarly, in United States v.
    Bucuvalas, 
    970 F.2d 937
    (1st Cir. 1992), abrogated on other grounds
    by Cleveland v. United States, 
    531 U.S. 12
    , 18 (2000), this court
    upheld      a   warrant   that    authorized      the   seizure    of   "[r]ecords,
    documents, notes and physical objects which constitute evidence of
    and    instrumentalities         of    [four    specified      crimes],    and,   in
    particular,       records,       documents,     notes    and    physical    objects
    [evidencing specified criminal acts by the suspect]."                     
    Id. at 941
    n.5.    We recognized that the language "and, in particular," simply
    served to transition from the first clause, which identified the
    -8-
    criminal offenses that the evidence was expected to establish, to
    the second clause, which imposed more specific search constraints.
    
    Id. at 942
    ("[B]ut for the search constraints in the second clause
    we might agree that the particularity requirement of the Fourth
    Amendment would not have been met.          In light of the specific types
    of items described in the second clause, however, the warrant met
    the Fourth Amendment particularity requirement.").
    Here, as in Bucuvalas, the search warrant includes a
    transitional phrase that connects a broad first clause, which
    identifies the criminal offenses that the target evidence was
    expected to establish, with a detailed and particularized second
    clause. The second clause, the particularity of which Kuc does not
    challenge on appeal, details the companies that Kuc was suspected
    of defrauding as well as the aliases, street addresses, and e-mail
    addresses he was believed to have used in his scheme.                   As in
    Bucuvalas, the "second clause . . . in the instant warrant tracked
    the allegations . . . for which probable cause was established in
    the accompanying affidavit."       
    Id. The phrase
    "including, without
    limitation"   is   certainly    not    a    model   of   precise   drafting.
    Nevertheless, it does not make the warrant constitutionally infirm
    because it is a transitional phrase linking to the second, very
    particular clause, and it must be read in that context, as in
    Andresen and Bucuvalas.        Thus, we agree with the district court
    that the "general" transitional phrase in this case should not be
    -9-
    construed to defeat the particularity of the main body of the
    warrant.
    Moreover, even if we were to find that the language in
    this case exceeded the bounds of Bucuvalas              and violated the
    particularity requirement of the Fourth Amendment, suppression
    still would not be necessary pursuant to the good faith exception
    to the exclusionary rule. This is because -- as the district court
    correctly    noted   --   the   warrant,   read   comprehensively   and   in
    context, was not so "facially deficient . . . that the executing
    officers [could not] reasonably presume it to be valid."            United
    States v. Leon, 
    468 U.S. 897
    , 923 (1984).            Given our holding in
    Bucuvalas, we cannot conclude that "a reasonably well trained
    officer would have known that the search was illegal despite the
    magistrate's authorization."        
    Id. at 922
    n.23.      Thus, the good
    faith exception to the exclusionary rule would apply.
    We therefore find that the district court properly denied
    Kuc's motion to suppress.
    B.   The Motion for Acquittal
    Kuc's second argument is that the district court erred
    when it denied his motion for a judgment of acquittal as to the
    aggravated identity theft charge. We review the denial of a motion
    for judgment of acquittal de novo.          
    Valerio, 676 F.3d at 243-44
    (citing United States v. Lipscomb, 
    539 F.3d 32
    , 40 (1st Cir.
    2008)).     Viewing the evidence in the light most favorable to the
    -10-
    government and taking all reasonable inferences in the government's
    favor, we must ask whether "a rational factfinder could find,
    beyond a reasonable doubt, that the prosecution successfully proved
    the essential elements of the crime."            
    Id. at 244
    (quoting United
    States v. Hernández, 
    146 F.3d 30
    , 32 (1st Cir. 1998)).
    In short, Kuc argues that the prosecution failed to prove
    that   he   unlawfully    used    a   "means    of   identification"     in    his
    fraudulent scheme as described in 18 U.S.C. § 1028A(a)(1) because
    the use of someone's name -- without more -- cannot suffice to
    constitute a "means of identification."                Pursuant to 18 U.S.C.
    § 1028A(a)(1), a person is guilty of aggravated identity theft if,
    in relation to any crime listed in § 1028A(c), he "knowingly . . .
    uses, without lawful authority, a means of identification of
    another     person."      The    statute     defines   the     term   "means    of
    identification" to mean "any name or number that may be used, alone
    or in conjunction with any other information, to identify a
    specific individual, including any[] name, social security number,
    [or] date of birth."      
    Id. at §
    1028(d)(7)(A).         Relying on a Fourth
    Circuit     decision,    Kuc    argues   that   "means    of    identification"
    includes only the use of information that "identifies a specific
    individual," and contends that, because many people share the same
    name, a name alone is rarely sufficiently unique to identify a
    specific person.       See United States v. Mitchell, 
    518 F.3d 230
    , 234
    (4th Cir. 2008). Therefore, Kuc concludes that his use of Samuel's
    -11-
    name alone to receive stolen computer parts did not qualify as
    using a "means of identification" because Samuel's name is not
    sufficiently unique to identify him as a specific individual.
    We need not reach the merits of Kuc's statutory argument.
    Even assuming that the phrase "means of identification" requires
    the sum total of the identifying pieces of information to identify
    a   specific    individual,     Kuc's   use    of    Samuel's       identifying
    information meets that standard.        Kuc did not, as he argues, only
    use Samuel's name.        In reality, he used Samuel's full name in
    addition to the name of Samuel's company to ship stolen computer
    parts   to   multiple     addresses.3      Together,   the    two    pieces   of
    identifying information are sufficient to identify Samuel as a
    specific individual and thus to support the aggravated identity
    theft conviction.
    Viewing the evidence in the light most favorable to the
    government, a rational factfinder could easily find that the
    prosecution successfully proved beyond a reasonable doubt that Kuc
    used    a   "means   of   identification"     as   required   by     18   U.S.C.
    3
    Kuc argues that we should not consider evidence of computer
    parts that were sent to 42 Union Street in Samuel's name because
    they were sent with Samuel's permission.       We view this claim
    skeptically, noting that Samuel certainly did not give permission
    for his name to be used to perpetuate a fraudulent scheme. Even if
    we do as Kuc asks, however, there were at least two documented
    instances in which Kuc used Samuel's personal name, "Francisco
    Samuel" together with Samuel's company name, "Abacus Software," to
    receive packages at an address other than 42 Union Street.
    -12-
    § 1028A(a)(1). Therefore, we affirm the district court's denial of
    Kuc's motion for a judgment of acquittal.
    Affirmed.
    -13-