United States v. Michael Merin ( 2012 )


Menu:
  •                                                   NOT PRECEDENTIAL
    UNITED STATES COURT OF APPEALS
    FOR THE THIRD CIRCUIT
    ______
    Nos. 08-1658, 08-3876, 08-3849, 08-3969, 08-4556, 08-4816
    ______
    UNITED STATES OF AMERICA
    v.
    ANTOINE NORMAN,
    Appellant in 08-1658 & 08-3876
    CHARLES WHITE,
    Appellant in 08-3849
    ALLEN SMITH,
    Appellant in 08-3969
    AKINTUNDE CRAWFORD,
    Appellant in 08-4556
    MICHAEL MERIN,
    Appellant in 08-4816
    ______
    On Appeal from the United States District Court
    for the Eastern District of Pennsylvania
    (D.C. Criminal No. 2:06-cr-00377)
    District Judge: Honorable R. Barclay Surrick
    ______
    Submitted Pursuant to Third Circuit L.A.R. 34.1(a)
    March 6, 2012
    Before: SCIRICA, AMBRO, and VAN ANTWERPEN, Circuit Judges.
    (Filed: March 7, 2012)
    ______
    OPINION OF THE COURT
    ______
    VAN ANTWERPEN, Circuit Judge.
    In this consolidated appeal, we are asked to review alleged errors in the
    convictions and sentences of appellants Akintunde Crawford, Michael Merin, Antoine
    Norman, Allen Smith, and Charles White. Each of the five appellants was convicted of
    conspiracy to commit bank fraud and aggravated identity theft, in violation of 
    18 U.S.C. § 371
    ; bank fraud, in violation of 
    18 U.S.C. § 1344
    ; and aggravated identity theft, in
    violation of 18 U.S.C. § 1028A. For the reasons that follow, we will affirm all judgments
    of conviction but will vacate all sentences and remand for resentencing.
    I.
    Because we write solely for the parties, we recount the facts and proceedings only
    to the extent required for resolution of this appeal. From approximately February 2004 to
    November 2005, the appellants actively participated in a bank fraud scheme that targeted
    four FDIC-insured banks in the Philadelphia area: Commerce Bank, Wachovia Bank,
    M&T Bank, and PNC Bank. Through repeated fraudulent transactions, appellants
    defrauded the four banks of hundreds of thousands of dollars. The fraudulent
    transactions were carried out by a group of ―check-runners,‖ five of whom were indicted
    along with the appellants. The five check-runners—Terry Hughes, Rachel Lukovsky,
    Kevin Norris, Lisa Smith, and Kelly Taylor—pleaded guilty to their applicable charges
    and cooperated with the government in its prosecution of this case.
    2
    To accomplish their criminal objective, appellants unlawfully obtained the
    personal identification information, including names, dates of birth, addresses, and social
    security numbers, for customers at the four banks. With this information, appellants
    recruited the check-runners to pose as the customers and cash counterfeit or closed-
    account checks1 or withdraw money from the customers‘ accounts. Each of the four
    banks allowed customers to cash checks prior to the checks clearing, but only so long as
    the amount of the check was equal to or less than the customer‘s account balance.
    Shortly before a check-runner would attempt to cash a check, therefore, appellants would
    try to ascertain the customers‘ account balance: for check-runs at Commerce Bank,
    appellants would do this by calling the bank‘s automated 1-800 telephone system and
    entering the customers‘ account and personal identification numbers (PIN).2
    Due to different security policies at the four banks, appellants employed two
    different check-running schemes: a ―drive-through‖ scheme and a ―walk-in‖ scheme.
    The drive-through scheme was used at Commerce Bank to take advantage of the bank‘s
    drive-through service which did not require customers to provide picture identification
    prior to cashing checks. By contrast, the other three banks did not have a drive-through
    1
    As defined in the government‘s indictment, ―[a] closed-account check is a check that
    originally was issued to a customer of a bank but became worthless when the account on
    which it first was issued later was closed. The worthless nature of a closed-account
    check would not become apparent to the accepting bank until the issuing bank
    determined that the account was closed and returned it to the accepting bank unpaid.‖
    2
    The default PIN for each customer was the last four digits of their social security
    number.
    3
    service and required picture identification. At these three banks, the check-runners would
    walk inside the bank and use a fake ID provided by the appellants.
    Although each of the appellants played a significant role in the conspiracy, their
    respective roles differed. White was the leader of the check-running operation, with
    Norman acting as his principal associate. In this capacity, White and Norman performed
    numerous acts, including obtaining the personal identification information of bank
    customers; purchasing closed-account checks and fraudulently endorsing them; calling
    Commerce Bank‘s automated telephone system shortly before check-runs; and providing
    ―cheat-sheets‖ to the check-runners containing information about the customer (e.g.,
    social security number, date of birth) that the check-runner might be asked to provide. In
    addition to White and Norman, Smith assisted the check-running operation by providing
    fraudulent checks to the check-runners and other tasks. Crawford primarily assisted by
    preparing fake photo IDs, including fake driver‘s licenses, for the walk-in transactions,
    while Merin primarily assisted by providing roughly twenty social security numbers and
    other personal identification information.
    At trial, the government‘s evidence included, inter alia, testimony from several of
    the check-runners; testimony from an undercover Postal Inspector, Yvette Thomas, who
    infiltrated the conspiracy; phone records showing a high volume of phone calls between
    appellants during the time frame of the conspiracy; and incriminating documents found in
    police searches of a rental car driven by White and the basement of a store, Rah‘s
    Fashion Boutique, where Crawford worked during the conspiracy. Based on this and
    4
    other evidence, each appellant was convicted of one count of conspiracy to commit bank
    fraud and aggravated identity theft, 
    18 U.S.C. § 371
    , and a combination of bank fraud,
    
    18 U.S.C. § 1344
    , and aggravated identity theft counts, 18 U.S.C. § 1028A.3
    During sentencing, the District Court applied several enhancements to the
    appellants‘ offense level. These included a fourteen-level enhancement, per U.S.S.G. §
    2B1.1(b)(1), as an offense involving a loss exceeding $400,000; a four-level
    enhancement, per U.S.S.G. § 2B1.1(b)(2), as an offense involving at least fifty victims;
    and a two-level enhancement, per U.S.S.G. § 2B1.1(b)(10), as an offense involving
    sophisticated means.
    II.4
    A) Motion to Suppress (White)
    We begin our analysis by addressing White‘s argument that the District Court
    erred in denying his motion to suppress incriminating documents obtained from an
    overdue rental car that his wife had rented and which had been reported stolen at the time
    of the search. For the reasons that follow, we hold that White does not have standing to
    bring this claim.
    The undisputed facts underlying this dispute are as follows. On September 19,
    2005, White was driving a rental car that had been reported to be stolen.5 Although the
    3
    White and Norman were each convicted of four counts of bank fraud, Crawford three,
    Smith two, and Merin one. White was also convicted of sixteen counts of aggravated
    felony, followed by Norman‘s twelve counts, Merin‘s nine counts, Crawford‘s seven
    counts, and Smith‘s four counts.
    4
    The District Court had jurisdiction under 
    18 U.S.C. § 3231
    . We have jurisdiction under
    both 
    18 U.S.C. § 3742
     and 
    28 U.S.C. § 1291
    .
    5
    car was rented by White‘s wife, the rental agreement had expired. While White was
    driving, two Philadelphia Police Officers, Thomas Farrell and Joseph Rapone, pulled up
    behind his vehicle. Soon thereafter, Officer Rapone noticed that the license plate number
    of the rental car was listed on the police ―hot sheet‖—a digest of vehicles reported as
    being stolen within the previous five days.6 After a check of the Department of Motor
    Vehicle‘s (DMV) database confirmed the car‘s stolen status, the officers signaled for
    White to stop the vehicle, which he did.
    Upon informing White that the car had been reported stolen, White produced a
    copy of his wife‘s rental agreement and told the officers he was going to return the car
    later that day. At that point, Officer Rapone called the rental company‘s theft department
    and spoke with a representative who stated that the company considered the car ―stolen‖
    and wanted to prosecute the case. White was then arrested and placed in the back of the
    officers‘ vehicle. After calling a tow truck to return the car to the rental company,
    Officer Rapone performed an inventory search during which he found a black leather
    portfolio under the car‘s passenger-side seat. Inside the portfolio, Rapone found
    photocopies of checks and what seemed to be fake driver‘s licenses and fraudulent
    identifications.
    Prior to trial, White filed a motion to suppress on the ground that the officers did
    not have probable cause to make the arrest. White asserts that the officers lost whatever
    5
    Appellant Smith was in the passenger seat.
    6
    On the hot sheet, the license plate number was listed with a four-star notation. This
    notation signified that police should ―try and locate‖ the vehicle.
    6
    probable cause they may have had once he produced his wife‘s rental agreement and told
    the officers he would be returning the car later that day. According to White, the officers
    merely had ―probable cause to believe that the vehicle was overdue back at the rental
    agency.‖ The District Court, however, rejected this argument. It ruled that the officers‘
    reliance on three separate sources of reliable information, each indicating that the car was
    stolen, was more than sufficient to provide probable cause to make the arrest.
    Accordingly, because the portfolio was found in the car‘s passenger compartment, the
    District Court denied White‘s motion on the grounds that the search was incident to a
    lawful arrest under this Court‘s then-prevailing interpretation7 of New York v. Belton, 
    453 U.S. 454
     (1981).
    When reviewing a district court‘s ruling on a suppression motion, we review ―for
    clear error as to the underlying facts, but exercise plenary review as to [the search‘s]
    legality in light of the court‘s properly found facts.‖ United States v. Kennedy, 
    638 F.3d 159
    , 163 (3d Cir. 2011) (internal quotation mark omitted)). ―[T]he proponent of a motion
    to suppress ‗bears the burden of proving not only that the search . . . was illegal, but also
    that he had a legitimate expectation of privacy in [the place searched].‘‖ United States v.
    Stearn, 
    597 F.3d 540
    , 551 (3d Cir. 2010) (quoting Rawlings v. Kentucky, 
    448 U.S. 98
    ,
    7
    Subsequent to the District Court‘s opinion, the Supreme Court issued Arizona v. Gant,
    
    556 U.S. 332
     (2009), wherein the Court rejected the broad reading of Belton that we, and
    most other circuit courts, had adopted. See United States v. Schecter, 
    717 F.2d 864
    , 868
    (3d Cir. 1983). This is of no moment to White‘s claim, however, because of our
    determination that he lacks standing. Even if White had standing, ―[e]vidence obtained
    during a search conducted in reasonable reliance on binding precedent is not subject to
    the exclusionary rule.‖ Davis v. United States, 
    131 S. Ct. 2419
    , 2429 (2011).
    7
    104 (1980)). Without a legitimate expectation of privacy, the proponent of a suppression
    motion has no standing to bring the claim. United States v. Baker, 
    221 F.3d 438
    , 441 (3d
    Cir. 2000) (citing Rakas v. Illinois, 
    439 U.S. 128
    , 143 (1978)).
    We begin our review by determining whether White has standing to bring the
    claim.8 Although the standing inquiry is a ―fact-bound‖ one, we recently joined the
    majority of circuits in adopting the ―general rule‖ that, under the precise factual scenario
    presented here, the driver does not have a legitimate expectation of privacy. Kennedy,
    
    638 F.3d at 165
    . As we stated in Kennedy, ―the driver of a rental car who has been
    [loaned] the car by the renter, but who is not listed on the rental agreement as an
    authorized driver, lacks a legitimate expectation of privacy in the car unless there exist
    extraordinary circumstances suggesting an expectation of privacy.‖ 
    Id.
     Because this
    rule squarely applies to the facts of this case, and because there are no extraordinary
    circumstances to justify an exception,9 our inquiry is at its end. White lacks standing to
    bring the claim.
    B) Sufficiency of the Evidence (Crawford & Smith)
    8
    Although the District Court did not base its decision on standing, that does not preclude
    us from doing so here. See Kennedy, 
    638 F.3d at 163
     (―The Court may . . . affirm the
    district court on any ground supported by the record . . . .‖).
    9
    As we noted in Kennedy, an example of the ―extraordinary circumstances‖ that might
    overcome the general rule would be a situation where ―the defendant was the husband of
    the woman who had rented the car . . . and had himself ‗personally contacted the rental
    car company . . . and reserved the vehicle in his name, using his own credit card, which
    was billed for the rental.‘‖ 
    Id. at 168
     (second omission in original) (quoting United
    States v. Smith, 
    263 F.3d 571
    , 582 (6th Cir. 2001)). Here, there is no evidence that White
    contacted the rental car company, reserved the car in his name, or paid for the car.
    8
    Both Crawford and Smith challenge the sufficiency of the evidence upon which
    they were convicted. While Crawford preserved his claim by filing a timely motion for
    judgment of acquittal, Smith failed to raise his claims below. Accordingly, we will
    review Smith‘s claims for plain error only.
    When a defendant challenges the sufficiency of evidence upon which he was
    convicted, our review ―is guided by strict principles of deference to a jury‘s verdict.‖
    United States v. Rosario, 
    118 F.3d 160
    , 162–63 (3d Cir. 1997). Specifically, ―we must
    view the evidence in the light most favorable to the Government,‖ and will only overturn
    a jury‘s verdict ―when the record contains no evidence, regardless of how it is weighted,
    from which the jury could find guilt beyond a reasonable doubt.‖ United States v. Riley,
    
    621 F.3d 312
    , 329 (3d Cir. 2010) (internal quotation marks omitted). When an
    insufficiency claim has not been preserved, the defendant‘s burden is even more onerous,
    as we review for plain error only. See United States v. Mornan, 
    413 F.3d 372
    , 381 (3d
    Cir. 2005). ―A conviction based on insufficient evidence is plain error only if the verdict
    ‗constitutes a fundamental miscarriage of justice.‘‖ United States v. Thayer, 
    201 F.3d 214
    , 219 (3d Cir. 1999) (quoting United States v. Barel, 
    939 F.2d 26
    , 37 (3d Cir. 1991)).
    ―Such a determination requires that the mistake ‗be so clear that the trial judge and
    prosecutor were derelict in countenancing it, even absent the defendant‘s timely
    assistance in detecting it.‘‖ United States v. Wright-Barker, 
    784 F.2d 161
    , 171 (3d Cir.
    1986).
    9
    Crawford contests the sufficiency of the evidence upholding his conviction for
    conspiracy to commit bank fraud and identity theft in violation of 
    18 U.S.C. § 371.10
    According to Crawford, the record ―is utterly devoid of any direct or circumstantial
    evidence‖ linking him to the conspiracy. A review of the record, however, belies
    Crawford‘s claim. While there was no direct evidence proving Crawford‘s criminal
    involvement, there was ample circumstantial evidence from which a reasonable jury
    could have made that inference. We will briefly review some, but not all, of this
    evidence.
    First, one of the check-runners in the conspiracy, Terry Hughes, testified at trial
    that White would frequently go to Crawford‘s store, Rah‘s Fashion Boutique,
    immediately prior to, and after, the check-runs.11 Hughes testified that Crawford was
    there ―pretty much every time I went there,‖ and that, after one check-run, he observed
    Crawford and White counting up the money that had just been fraudulently obtained. On
    another occasion, Crawford was alone with White in a car when White gave Hughes a
    10
    Although Crawford was also convicted of three counts of bank fraud, 
    18 U.S.C. § 1344
    , and seven counts of identity theft, 18 U.S.C. § 1028A, his brief focuses only on the
    conspiracy count. To the extent, however, that the evidence was sufficient to convict
    Crawford of the conspiracy, it would be sufficient to uphold the separate convictions, as
    they were foreseeable crimes committed in furtherance of the conspiracy. See Pinkerton
    v. United States, 
    328 U.S. 640
    , 645–48 (1946) (explaining that conspirator is liable for
    reasonably foreseeable acts that further conspiracy‘s aims); United States v. Gonzalez,
    
    918 F.2d 1129
    , 1135 (3d Cir. 1990) (same). Accordingly, we will limit our discussion
    here to the conspiracy conviction.
    11
    Hughes‘s testimony was consistent with the testimony of Postal Inspector, Yvette
    Thomas. At trial, Thomas testified that, during her undercover operation, White went to
    Rah‘s Fashion Boutigue just prior to the check-run. After White returned from the store,
    Thomas saw him with a Pennsylvania driver‘s license featuring a photograph of a black
    female.
    10
    fake 
    ID.
     Hughes also testified that, on one occasion, Crawford provided him new clothes
    to wear just prior to one of his bank runs.
    Second, police seized incriminating documents within an envelope addressed to
    Crawford in the basement of Rah‘s Fashion Boutique. In the envelope were counterfeit
    driver‘s licenses and numerous passport photographs of unidentified individuals.
    Moreover, the envelope was found within a box that contained, inter alia, a manual for
    making IDs, a computer disk with a digital image of a fake Delaware driver‘s license
    with Crawford‘s photo superimposed on it, and an application for a Commerce Bank
    account filled out by Kendrick Ellison. Ellison, who testified at trial, was one of the
    scheme‘s victims.
    While Crawford argues that there is no evidence showing that he actually
    ―possessed or used‖ the documents found in the store‘s basement, a rational jury could
    have made that inference. Although the police did not search the store until November
    2005, or about five months after the last documented check-run, this does not preclude
    the jury from attributing the seized documents to Crawford, particularly considering that
    several of the documents were in an envelope addressed to Crawford and that a
    photograph of Crawford was found on one of the forged driver‘s licenses. While it is true
    that Crawford stopped working at the store in October 2005, he stipulated at trial that he
    continued to frequent the store in November 2005.
    Third, phone records introduced at trial established that, during the course of the
    conspiracy, Crawford had 279 phone calls with White, the conspiracy‘s ring leader.
    11
    Although Crawford and White are brothers-in-law, a rational jury would be justified in
    discrediting the inference that Crawford would have it draw—i.e., that 279 phone calls
    over the course of a year merely pertained to family and personal matters. Such an
    inference is improbable in light of other evidence showing Crawford regularly had phone
    conversations with other co-conspirators. Indeed, according to the phone records,
    Crawford had 128 phone calls with Merin, 47 phone calls with Smith, and 5 phone calls
    with Norman. Taken together, the evidence is more than sufficient to uphold Crawford‘s
    conviction for conspiracy.
    We now turn to Smith‘s claim that the evidence was insufficient to support his
    conviction for conspiracy. In making this claim, Smith‘s brief ignores the fact that
    Rachel Lukovsky, a check-runner, testified at trial that Smith provided her with checks to
    cash at the banks. This evidence, in and of itself, is sufficient to sustain Smith‘s
    conviction. See United States v. Perez, 
    280 F.3d 318
    , 344 (3d Cir. 2002) (stating that
    ―uncorroborated accomplice testimony may constitutionally provide the exclusive basis
    for a criminal conviction‖ (quoting United States v. DeLarosa, 
    450 F.2d 1057
    , 1060 (3d
    Cir. 1971))). This is ―particularly‖ true where defense counsel, as was the case here, had
    ―ample opportunity to cross-examine the Government‘s witnesses.‖ 
    Id.
     Although
    Lukovsky‘s testimony was not the only evidence implicating Smith, it is sufficient to
    dispose of Smith‘s claim.
    12
    Smith also argues that the evidence was insufficient to convict him of aggravated
    identity theft in violation of 18 U.S.C. § 1028A.12 Smith contends the government failed
    to establish that he personally knew the means of identification he unlawfully used
    belonged to real people. In support of this argument, Smith cites the Supreme Court‘s
    opinion in Flores-Figueroa v. United States, 
    129 S. Ct. 1886
     (2009). There, the Court
    held that the aggravated identity theft statute, 18 U.S.C. § 1028A, requires proof the
    defendant knew the means of identification actually belonged to another person. Flores-
    Figueroa, 
    129 S. Ct. at 1888
    . The Flores-Figueroa Court recognized, however, that ―in
    the classic case of identity theft, intent is generally not difficult to prove.‖ 
    Id. at 1893
    .
    As the Court noted, ―where a defendant has used another person‘s identification
    information to get access to that person‘s bank account, the Government can prove
    knowledge with little difficulty.‖ 
    Id.
     Under Flores-Figueroa, therefore, the
    government‘s burden of proving knowledge in a case such as this is minimal. Because
    Smith‘s involvement in the bank fraud scheme would have been pointless if the means of
    identification did not belong to real customers, the government‘s burden was met.
    C) Prejudicial Variance Between Indictment and Trial Evidence (Smith)
    12
    Although Smith did file a motion for judgment of acquittal on the aggravated identity
    theft claims, he did not raise the theory he advances here on appeal. We need not decide
    what standard of review is appropriate, however, as Smith is not entitled to relief under
    any standard.
    13
    Smith advances another theory on which to overturn his conviction for conspiracy:
    a prejudicial variance between the conspiracy charged in the indictment and the proof
    offered at trial.13 See United States v. Kelly, 
    892 F.2d 255
    , 258 (3d Cir. 1990) (―A
    conviction must be vacated when (1) there is a variance between the indictment and the
    proof presented at trial and (2) the variance prejudices a substantial right of the
    defendant.‖). According to Smith, the government charged one conspiracy in the
    indictment but proved two conspiracies at trial. Specifically, Smith contends that the
    ―drive-through scheme and walk-in scheme represented different conspiracies,‖ as
    evident by ―the refusal of some of the check-runners to participate in the walk-in scheme
    and Mr. White‘s practice of talking up the walk-in scheme‘s profitability and
    minimiz[ing its] risk.‖ Smith claims that this variance prejudiced him ―by lumping him
    in with members of both conspiracies for a single determination of his guilt or
    innocence.‖ We disagree. What Smith characterizes as two ―conspiracies‖ were merely
    two schemes within the same conspiracy.
    As we have previously made clear, ―a conspiracy with a single objective may be
    implemented by multiple means and remain a single conspiracy.‖ United States v.
    Schurr, 
    775 F.2d 549
    , 554 n.8 (3d Cir. 1985). Here, the conspiracy clearly had a single
    objective: to make money by defrauding banks. The walk-in and drive-through schemes
    13
    Since Smith did not raise this issue below, we will review for plain error. Under any
    standard of review, however, the claim would fail.
    14
    were simply different means to accomplish this common objective.14 A finding of a
    single conspiracy is further indicated where the ―participants overlap in the various
    dealings.‖ Kelly, 
    892 F.2d at 259
    . Here, there was extensive overlap. Along with Smith,
    White, and the other appellants, two of the five check-runners (Lisa Smith and Terry
    Hughes) participated in both schemes. This was not a case, therefore, of ―separate
    networks operating independently of each other,‖ which is how we have previously
    defined separate conspiracies. United States v. Barr, 
    963 F.2d 641
    , 648 (3d Cir. 1992)
    (internal quotation marks omitted). Accordingly, there was no variance between the
    indictment and the proof offered at trial.
    D) Sixth Amendment Right to a Jury (Norman & White)
    We now turn to the appellants‘ arguments regarding the sentencing proceedings.
    We begin first with Norman and White‘s as-applied Sixth Amendment challenge.
    Because this claim presents a question of law, our review is plenary. United States v.
    Barbosa, 
    271 F.3d 438
    , 452 (3d Cir. 2001).
    Under the Sixth Amendment, a criminal defendant has ―the right to demand that a
    jury find him guilty of all the elements of the crime with which he is charged.‖ United
    States v. Booker, 
    543 U.S. 220
    , 230 (2005) (quoting United States v. Gaudin, 
    515 U.S. 506
    , 511 (1995)). In the sentencing context, this right ensures that ―[a]ny fact (other than
    a prior conviction) which is necessary to support a sentence exceeding the maximum
    14
    This theory of the case should have been no surprise to Smith as it was expressly set
    forth in the government‘s indictment. Indeed, in describing the ―manner and means‖ of
    the conspiracy, the indictment described the drive-through and walk-in schemes in
    separate subsections.
    15
    authorized by the facts established by a plea of guilty or a jury verdict must be admitted
    by the defendant or proved to a jury beyond a reasonable doubt.‖ Id. at 244. The
    maximum sentence authorized by a jury verdict is the maximum sentence established by
    the legislature (i.e., the ―statutory maximum‖), which, in the federal sentencing context,
    is the United States Code. See United States v. Grier, 
    475 F.3d 556
    , 565 (3d Cir. 2007)
    (en banc) (―Post-Booker, the punishments chosen by Congress in the United States Code
    determine the statutory maximum for a crime.‖).
    Here, the sentences Norman and White received—thirteen and twenty-one years
    respectively—were both well below the statutory maximum. See 
    18 U.S.C. § 1344
    (establishing maximum prison sentence of thirty years for bank fraud). Norman and
    White nevertheless advance a theory, one endorsed by Justice Scalia, that the Sixth
    Amendment right to a jury trial is violated if the sentence would otherwise be
    unreasonable in the absence of judicially found facts. See Rita v. United States, 
    551 U.S. 338
    , 375 (2007) (Scalia, J., concurring) (stating that Supreme Court precedent ―does not
    rule out as-applied Sixth Amendment challenges to sentences that would not have been
    upheld as reasonable on the facts encompassed by the jury verdict or guilty plea‖); see
    also Gall v. United States, 
    552 U.S. 38
    , 60 (2007) (Scalia, J., concurring) (same). In
    Norman‘s case, his Guidelines sentence, based solely on the facts determined by the jury
    and his prior criminal history, was 8 to 14 months. This range, however, was increased
    during sentencing to 135 to 168 months based on the District Court‘s findings regarding
    (1) the extent of loss caused by the conspiracy, (2) the number of victims suffering a loss,
    16
    and (3) Norman‘s role as a manager or supervisor in the conspiracy. Because Norman
    believes his within-Guidelines sentence of 156 months would be substantively
    unreasonable in the absence of the District Court‘s factual findings, he argues that the
    case presents the type of ―as-applied‖ challenge endorsed by Justice Scalia. White makes
    a roughly similar argument.
    Although appellants‘ characterization of the right to a jury trial has its adherents, it
    has been uniformly and unequivocally rejected by the federal circuit courts, including our
    own. See Grier, 
    475 F.3d at
    564–65; United States v. Hernandez, 
    633 F.3d 370
    , 373–74
    (5th Cir. 2011); United States v. Treadwell, 
    593 F.3d 990
    , 1017 (9th Cir. 2010); United
    States v. Ashqar, 
    582 F.3d 819
    , 824–25 (7th Cir. 2009); United States v. White, 
    551 F.3d 381
    , 386 (6th Cir. 2008); United States v. Benkahla, 
    530 F.3d 300
    , 312 (4th Cir. 2008);
    United States v. Redcorn, 
    528 F.3d 727
    , 745–46 (10th Cir. 2008). In Grier, we stated
    that the only facts a jury must determine are those ―that increase the statutory maximum
    punishment. . . . [O]nce these facts are found, the judge may impose a sentence anywhere
    under that maximum without jury determinations and proof beyond a reasonable doubt.‖
    
    475 F.3d at 565
    . Although Grier involved a Fifth Amendment challenge, our
    interpretation of Booker left no room for doubt regarding our view of the Sixth
    Amendment question at issue here See 
    id.
     at 564–65 (stating that the nonmandatory
    nature of the Guidelines after Booker ―makes all of the difference‖ with respect to Sixth
    Amendment claims). Accordingly, appellants‘ Sixth Amendment claim fails.
    E) Enhancement for Fifty or More Victims (All Appellants)
    17
    Appellants15 argue, and the government concedes, that the District Court‘s
    conclusion with respect to the number of victims must be reconsidered in light of our
    opinion in United States v. Kennedy, 
    554 F.3d 415
    , 419 (3d Cir. 2009). Our review of a
    district court‘s interpretation of the Guidelines is plenary. Grier, 
    475 F.3d at 570
    .
    Under the Guidelines, the offense level of a fraud crime is enhanced by two levels
    if it involved ten or more victims and by four levels if it involved fifty or more victims.
    U.S.S.G. § 2B1.1(b)(2)(B). At sentencing, the government argued that appellants‘
    scheme had approximately 146 victims. These victims included the four defrauded banks
    and the many account holders at these banks whose accounts were compromised.
    Because the account holders were reimbursed for their losses, however, Norman and
    White argued that the account holders had not suffered an ―actual loss‖ and were thus not
    ―victims‖ under the Guidelines; an argument consistent with the prevailing rule of our
    sister circuits. E.g., United States v. Conner, 
    537 F.3d 480
    , 489 (5th Cir. 2008); United
    States v. Icaza, 
    492 F.3d 967
    , 969–970 (8th Cir. 2007); United States v. Yagar, 
    404 F.3d 967
    , 971–72 (6th Cir. 2005). At the time of sentencing, however, this Court had yet to
    address the issue, and the District Court accepted the government‘s theory that temporary
    losses could constitute actual loss. Accordingly, the District Court found that the account
    holders were victims and added a four-level enhancement to the appellant‘s offense level.
    15
    Although only Norman, Smith, and White raise this argument on appeal, in the interest
    of uniformity and justice we will apply our decision to vacate the sentence and remand
    for resentencing to all five appellants. See Silber v. United States, 
    370 U.S. 717
    , 717–18
    (1962).
    18
    Subsequent to the District Court‘s decision, we held in Kennedy that bank account
    holders who are later reimbursed for their losses are not victims under 2B1.1(b)(2)(B).
    
    554 F.3d at 419
    . We did note in Kennedy, however, that account holders who are later
    reimbursed may nevertheless qualify as victims if they ―spent time or money seeking
    reimbursement.‖ 
    Id. at 422
    . We will thus remand this matter for proceedings consistent
    with our opinion in Kennedy. In so doing, we will leave it to the District Court‘s
    discretion as to whether to allow additional evidence. See United States v. Coward, 
    296 F.3d 176
    , 180 (3d Cir. 1990) (―[D]ecisions to reopen proceedings are ‗traditionally a
    discretionary matter for the district court.‘‖ (quoting United States v. Vastola, 
    915 F.2d 865
    , 876 (3d Cir. 1990))).
    F) Loss Attributable to the Conspiracy (Smith & Merin)
    Smith and Merin contend that the District Court erred in calculating the total loss
    attributable to the conspiracy. Under the Guidelines, the loss caused by a fraud offense is
    a specific offense characteristic that can increase the offense level. U.S.S.G. §
    2B1.1(b)(1). Losses exceeding $200,000 but not $400,000 trigger a twelve-level
    enhancement, while losses exceeding $400,000 but not $1,000,000 trigger a fourteen-
    level enhancement. Id. To determine loss, a sentencing court ―need only make a
    reasonable estimate‖ based on the available evidence—precision is not required. United
    States v. Ali, 
    508 F.3d 136
    , 145 (3d Cir. 2007) (quoting U.S.S.G. § 2B1.1 cmt. 3(C)). As
    with other sentencing facts, the government bears the burden of proving loss by a
    preponderance of the evidence. United States v. Fumo, 
    655 F.3d 288
    , 310 (3d Cir. 2011).
    19
    Where, as here, the sentencing court‘s factual findings are challenged, we review for
    clear error. United States v. Napier, 
    273 F.3d 276
    , 278 (3d Cir. 2001).
    Here, Smith and Merin agree with the District Court that the total loss is between
    $400,000 and $1,000,000. However, whereas the District Court found a total loss of
    $789,665, appellants argue that the correct figure is $417,185. While appellants‘
    argument is without practical significance (i.e., even if correct, it would not reduce the
    offense level), we will nevertheless address it because the issue of total loss does bear on
    the appellants‘ arguments with respect to the amount of loss that is individually
    attributable.
    After holding an evidentiary hearing and after accepting written briefs from the
    parties, the District Court issued a written decision in which it carefully explained its
    determination that the conspiracy caused $789,665 in financial loss. In its analysis, the
    District Court scrutinized each of the government‘s eleven exhibits (Exhibits A–K), and
    rejected the government‘s claim that the total loss exceeded $1,000,000. On appeal,
    Smith and Merin accept the District Court‘s findings with respect to Exhibits A–E and K
    ($417,185), but dispute the court‘s findings with respect to Exhibits F, G, H, I, and J.
    Although we have reviewed the District Court‘s findings for each exhibit, we will limit
    our discussion here to Exhibits G and J, as they represent over ninety percent of the
    losses in dispute. As will be seen, Smith and Merin have failed to identify any errors, let
    alone clear errors, in the District Court‘s opinion.
    20
    We begin with Exhibit G, which covers $85,130 in total losses associated with the
    conspiracy. Exhibit G lists incidents where customers of Commerce Bank were
    defrauded shortly after their account information was accessed through phone calls to the
    bank‘s automated phone system. In its brief to the District Court, the appellants objected
    to Exhibit G on the grounds that the government witness, Inspector Khary Freeland, had
    failed to establish at the evidentiary hearing how many of the phone numbers listed as
    having called the bank belonged to members of the conspiracy. In response to this
    concern, the District Court independently reviewed each of the phone numbers listed in
    Exhibit G and found that ―all‖ of them were associated with conspiracy members. The
    District Court also found that ―a close correlation‖ existed ―between the date and time of
    the inquiry into the account, and the date of the fraud.‖ In other words, shortly after the
    conspirators called the automated phone system, the accounts that they accessed were
    defrauded. In their brief to this Court, Smith and Merin act as if the District Court never
    made these findings, as they simply repeat their earlier argument about Inspector
    Freeland‘s testimony without reference to the District Court‘s subsequent analysis.
    Accordingly, Smith and Merin have shown no error with respect to the District Court‘s
    findings regarding Exhibit G.
    Smith and Merin‘s arguments regarding Exhibit J are similarly flawed. Exhibit J
    lists fraudulent transactions involving closed-account checks with names that the
    conspiracy‘s check-runners were known to have used on other occasions. In their briefs
    to the District Court, three of the appellants argued that Inspector Freeland had failed to
    21
    specifically demonstrate during his testimony what percentage of the transactions in
    Exhibit J were connected to the conspiracy. After receiving these briefs, therefore, the
    District Court reviewed Exhibit J to assess each transaction‘s connection with the
    conspiracy. The results, it noted, were ―compelling,‖ with ―most of the Exhibit J checks .
    . . passed within days and at most two weeks, of similar checks passed by the
    [conspiracy‘s] runners.‖ As a representative example, the District Court referenced a
    series of Mode Mederne, Inc., checks, ranging from $900 to $980 in value, which were
    listed in Exhibit J as being passed on June 9, 2004. This closely correlated with evidence
    from Exhibit A documenting that one of the conspiracy‘s check-runners, Kelly Taylor,
    had cashed three Mode Mederne checks on June 13, 2004, for $960, $980, and $990. In
    total, the District Court found that $259,222 of the $295,579 in losses identified in
    Exhibit J were connected to the conspiracy.
    Despite the District Court‘s findings regarding Exhibit J, Smith and Merin focus
    almost entirely on the alleged inadequacies in Inspector Freeland‘s testimony.16
    Moreover, the only attempt that Smith or Merin make at discrediting the District Court‘s
    analysis does not withstand scrutiny. Smith and Merin state that the District Court‘s
    finding regarding the Mode Moderne checks was directly at odds with Inspector
    Freeland‘s testimony. This is so, they argue, because Freeland ―explicitly testified that he
    16
    Smith and Merin‘s account of Freeland‘s testimony regarding Exhibit J is riddled with
    mischaracterizations. They state, for example, that the ―extent of the link‖ established by
    Inspector Freeland was a few checks from an account belonging to Lou Galdieri.
    Freeland made it clear, however, that he was simply citing the Lou Galdieri checks as
    representative examples of the types of transactions catalogued in Exhibit J.
    22
    could not draw any link between [the Mode Moderne] checks and the conspiracy.‖ An
    examination of Freeland‘s testimony, however, reveals no so such assertion. When asked
    about the Mode Moderne checks, Freeland merely testified that he could not recall how
    they were connected with the conspiracy without looking at his records, which he was not
    given the opportunity to do. By contrast, the District Court had the benefit of examining
    these records in detail. Accordingly, neither Smith nor Merin have pointed to anything in
    the record indicating the District Court‘s estimation of loss to be unreasonable.
    G) Individually Attributable Loss (Crawford, Merin, and Smith)
    Crawford, Merin, and Smith argue that the District Court erred in attributing the
    entire loss of the conspiracy to them individually. Under the Guidelines, the loss caused
    by one conspirator may be attributed to another conspirator if the loss resulted from
    ―reasonably foreseeable acts and omissions . . . in furtherance of the jointly undertaken
    criminal activity.‖ U.S.S.G. § 1B1.3(a)(1)(B). As we have previously explained, this
    requires that the acts of the other conspirator(s) be ―(1) in furtherance of the jointly
    undertaken activity; (2) within the scope of the defendant‘s agreement; and (3)
    reasonably foreseeable in connection with the criminal activity the defendant agreed to
    undertake.‖ United States v. Duliga, 
    204 F.3d 97
    , 100 (3d Cir. 2000). The mere fact that
    the defendant played a ―substantial‖ role is not sufficient. United States v. Collado, 
    975 F.2d 985
    , 995 (3d Cir. 1992). Instead, we must determine the scope of the joint criminal
    activity agreed to by the defendant, and assess whether the acts of others were
    foreseeable from that vantage point. Duliga, 
    204 F.3d at 100
    ; Collado, 
    975 F.2d at 995
    .
    23
    1) Loss Attributable to Smith
    Smith argues that the District Court erred by attributing to him the $54,600 in
    losses suffered by M&T Bank and PNC Bank. Smith bases this argument on the fact that
    he was acquitted of the bank fraud charges involving these two banks. While Smith‘s
    claim fails for several reasons, we address only one of them here. Because Smith failed
    to raise this argument below, he must demonstrate plain error to prevail, which he clearly
    cannot do. See United States v. Olano, 
    507 U.S. 725
    , 731–32 (1993). Even if we were to
    assume that the District Court erred by attributing the M&T and PNC Banks‘ losses to
    Smith, this would have no impact on the fourteen-level enhancement that Smith received
    for causing a loss exceeding $400,000. As detailed above, the District Court reasonably
    estimated that the total loss caused by the conspiracy was $789,665. Since a reduction by
    $54,600 would not have placed the loss below $400,000, Smith‘s sentence was not
    affected by the alleged error.
    2) Loss Attributable to Merin
    Merin argues that a maximum of $50,000 in losses can be attributed to him.
    Merin derives this estimate by calculating the losses that resulted from the transactions
    involving the twenty social security numbers he provided to White and Norman.
    According to Merin, these transactions were the ―only evidence‖ linking him to the
    conspiracy, as ―no evidence‖ demonstrated his awareness ―of any of the other Defendants
    or any of the other transactions at any of the other banks.‖ As the District Court noted,
    however, there is plenty of other evidence linking Merin to the conspiracy, including,
    24
    inter alia: testimony from Kelly Taylor that Merin assisted her and White in some of the
    check-runs; records showing that Merin called Commerce Bank nineteen times and
    Wachovia Bank five times during the span of the conspiracy (despite not having an
    account at either bank); records showing Merin accessed Dax Enterprise‘s account on
    Commerce Bank‘s automated phone system moments before Mike Dicero fraudulently
    passed a check involving the Dax Enterprise account; statements from Decero that Merin
    assisted him with fraudulent cash-checking activities; and the discovery of documents at
    Rah‘s Fashion Boutique that suggest a link between the defrauding of Dax Enterprise and
    the larger conspiracy. The District Court also emphasized phone records showing that
    Merin had at least 314 phone calls with White, 178 phone calls with Norman, 128 phone
    calls with Crawford, and 6 phone calls with Smith during the course of the conspiracy.
    As noted by the District Court, it is difficult to believe that the sale of twenty social
    security numbers required more than 620 phone calls over a twelve-month period.
    In his appeal, Merin does not acknowledge or make an attempt to counter the
    District Court‘s analysis. Instead, he simply repeats his claim that his ―only
    involvement‖ with the conspiracy was his sale of the twenty social security numbers.
    Accordingly, we will affirm the District Court‘s determination, as we can find no clear
    error in its conclusion that Merin was ―aware of the scope and purpose‖ of the
    conspiracy, that his conduct ―contributed significantly‖ to its success, and that the acts of
    the co-conspirators were ―entirely foreseeable and within the scope of the criminal
    activity that Merin agreed to undertake.‖
    25
    3) Loss Attributable to Crawford
    Crawford argues that the District Court erred in attributing to him the losses
    caused by the drive-through scheme. According to Crawford, the most the government
    could prove was that he helped provide false identifications and clothes to check-runners
    involved in the walk-in scheme. As we have already discussed, however, the walk-in and
    drive-through operations do not represent multiple conspiracies, but merely different
    schemes within the same conspiracy. Moreover, even if this distinction were somehow
    relevant here, the record contradicts Crawford‘s claim that he was only involved with
    walk-ins. As the District Court noted, the documents seized from Crawford‘s store
    ―contained templates for fake checks, which were used during drive-through runs.‖
    Crawford‘s store also contained documents linking him to the defrauding of Dax
    Enterprise, which was based entirely on drive-through frauds. In his appeal, Crawford—
    like Smith and Merin—simply repeats the argument he made before the District Court
    without countering the District Court‘s analysis. Since we find persuasive the District
    Court‘s factual basis for rejecting Merin‘s argument, we will affirm.
    H) Enhancement for Sophisticated Means (Smith)
    We turn now to Smith‘s claim that the District Court erred by assigning a two-
    level enhancement because the instant offense involved ―sophisticated means‖ per
    U.S.S.G. § 2B1.1(b)(10). Smith argues that this enhancement was not deserved because
    ―the persons involved in the conspiracy . . . did nothing more complicated than pretend to
    be people they were not.‖ We disagree. Smith and his conspirators trained a network of
    26
    check-runners and created numerous false identifications and counterfeit checks in a
    sufficiently convincing manner to evade detection from four major financial institutions
    despite hundreds of transactions in which the appellants collected over $780,000. As
    other federal circuit courts have previously held, ―[r]epetitive and coordinated conduct,
    though no one step is particularly complicated, can be a sophisticated scheme.‖ United
    States v. Finck, 
    407 F.3d 908
    , 915 (8th Cir. 2005) (citing United States v. Jackson, 
    346 F.3d 22
    , 25 (2d Cir. 2003) and United States v. Rettenberger, 
    344 F.3d 702
    , 709 (7th Cir.
    2003)); see also United States v. Lewis, 
    93 F.3d 1075
    , 1083 (2d Cir. 1996) (upholding
    enhancement even though ―each step in the planned tax evasion was simple, [because]
    when viewed together, the steps comprised a plan more complex than merely filling out a
    false tax return‖). It is also worth noting that this Court has previously upheld a
    sophisticated means-enhancement for a fraudulent tax scheme arguably much less
    elaborate than the instant one. See United States v. Saybolt, 
    577 F.3d 195
    , 197–98 & n.1
    (3d Cir. 2009). Accordingly, we find no error in the District Court‘s factual
    determination.
    I) Criminal History Score (Smith)
    Smith argues that the District Court erred in determining his criminal history
    score. Smith, who was assigned seven criminal history points, contends that the District
    Court erred in assigning three of these criminal history points: one point for a prior
    prostitution offense, and two points for a DUI sentence that Smith claims was suspended.
    The government concedes that it was plain error to assign a point for the prostitution
    27
    offense, but not an error to assign the two points for the DUI sentence. We agree that it
    was plain error to assign a point for the prostitution offense.
    Under the Guidelines, criminal history points are only assigned for a prior
    prostitution offense if the offense resulted in ―a term of probation of more than one year
    or a term of imprisonment of at least thirty days,‖ or if the offense was similar to the
    instant offense. U.S.S.G. § 4A1.2(c)(1). Here, Smith‘s prostitution offense only resulted
    in a fine of $300 plus court costs, and is not similar to the instant offense. It was thus
    incorrect for the District Court to assign the point. Because the addition of the point
    increased Smith‘s criminal history category from III to IV, the error prejudiced Smith.
    Accordingly, we will remand so that Smith‘s criminal history score can be reduced to six.
    Although Smith also argues that the District Court erred in assigning two points
    for his DUI sentence, this claim is meritless. A district court must assign two points for a
    prior sentence where the maximum sentence imposed was at least sixty days but not more
    than thirteen months. Id. §§ 4A1.1(b), 4A1.2(b). Here, the PSR states that Smith ―was
    sentenced to a term of imprisonment of not less than 48 hours nor more than 12 months.‖
    While Smith claims the sentence was suspended, he did not present any evidence to
    substantiate this claim. Accordingly, the District Court did not err by relying on the
    information in the PSR. See United States v. Campbell, 
    295 F.3d 398
    , 407 (3d Cir. 2002)
    (ruling that sentencing court ―did not need to make a further inquiry‖ into facts in PSR
    28
    where defendant failed to present ―any evidence . . . cast[ing] doubt‖ on PSR‘s
    accuracy).17
    J) Downward Departure (Smith)
    Smith also argues that the District Court erred in refusing to grant a downward
    departure under U.S.S.G. § 4A1.3. Because it is clear from the record, however, that the
    District Court knowingly declined to exercise its discretion to grant this departure, we
    have no jurisdiction to review the claim. See United States v. King, 
    604 F.3d 125
    , 141
    n.9 (3d Cir. 2010).
    K) Reasonableness of Sentence (Smith & White)
    Finally, both Smith and White argue that the District Court imposed a
    substantively unreasonable sentence by failing to adequately consider the 
    18 U.S.C. § 3553
    (a) factors. However, because we have found procedural error in this case, we need
    not consider arguments about substantive reasonableness at this juncture. See United
    States v. Merced, 
    603 F.3d 203
    , 214 (3d Cir. 2010) (―If the district court commits
    procedural error, our preferred course is to remand the case for re-sentencing, without
    going any further.‖).
    17
    Even if the District Court did err, it would not constitute plain error since Smith‘s
    criminal history category would still be III.
    29
    IV.
    To summarize, we will affirm the judgments of conviction, but vacate the
    sentences of all appellants so that, on remand, the District Court can reconsider its
    determination of both the number of victims and appellant Smith‘s criminal history score.
    30