United States v. Joey Brunson ( 2020 )


Menu:
  •                                     PUBLISHED
    UNITED STATES COURT OF APPEALS
    FOR THE FOURTH CIRCUIT
    No. 18-4696
    UNITED STATES OF AMERICA,
    Plaintiff - Appellee,
    v.
    JOEY LAMOND BRUNSON, a/k/a Flex,
    Defendant - Appellant.
    Appeal from the United States District Court for the District of South Carolina, at
    Columbia. Joseph F. Anderson, Jr., Senior District Judge. (3:14-cr-00604-JFA-18)
    Argued: January 29, 2020                                    Decided: July 31, 2020
    Before WILKINSON, NIEMEYER, and MOTZ, Circuit Judges.
    Affirmed by published opinion. Judge Niemeyer wrote the opinion, in which Judge
    Wilkinson joined. Judge Motz wrote a dissenting opinion.
    ARGUED: David Bruce Betts, Columbia, South Carolina, for Appellant. Thomas Ernest
    Booth, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for
    Appellee. ON BRIEF: Brian A. Benczkowski, Assistant Attorney General, Matthew S.
    Miner, Deputy Assistant Attorney General, UNITED STATES DEPARTMENT OF
    JUSTICE, Washington, D.C.; Sherri A. Lydon, United States Attorney, Columbia, South
    Carolina, J.D. Rowell, Assistant United States Attorney, OFFICE OF THE UNITED
    STATES ATTORNEY, Denver, Colorado, for Appellee.
    NIEMEYER, Circuit Judge:
    Joey Brunson, the defendant in this criminal prosecution, challenges the legality of
    three orders authorizing wiretaps on the ground that the orders did not, on their face,
    sufficiently identify the persons authorizing the applications for the orders, as required by
    law. The district court denied his motion to suppress evidence obtained from the wiretaps,
    and the evidence was used to convict Brunson of numerous drug-trafficking and related
    crimes.
    Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (“the Wiretap
    Act”), 
    18 U.S.C. § 2510
     et seq., authorizes federal judges to issue orders approving
    wiretaps when detailed statutory requirements are met. And it provides that when certain
    specified requirements are not met, the contents of any intercepted communications and
    evidence derived from them must be suppressed. 
    Id.
     §§ 2518(4)(a)–(e); § 2518(10)(a).
    The Wiretap Act authorizes the Attorney General and various other designated
    officials in the Department of Justice, including any Deputy Assistant Attorney General in
    the Criminal Division or National Security Division, to apply for a wiretap order, and it
    requires that the application for the order include the “identity of . . . the officer authorizing
    the application,” 
    18 U.S.C. § 2518
    (1)(a), and also that the order authorizing the wiretap
    “specify . . . the identity of the agency authorized to intercept communications, and of the
    person authorizing the application,” 
    id.
     § 2518(4)(d).           Failing the inclusion of this
    information, the order becomes “insufficient,” and evidence obtained from the wiretap
    must be suppressed. See id. § 2518(10)(a)(ii).
    2
    In this case, the government identified in each application for a wiretap order the
    senior Justice Department official by title and name who authorized the application, but in
    each proposed order that it submitted to the district court, it included only the title, not the
    name of the official. Each order stated that the application for the order was authorized by
    “an appropriate official of the Criminal Division, United States Department of Justice,
    Deputy Assistant Attorney General, pursuant to the power delegated to that official by
    special designation of the Attorney General.” The district court signed the order as
    submitted.
    Brunson contends that because the orders did not include the name of each
    authorizing official, the orders were statutorily insufficient and therefore all evidence
    derived from them should have been suppressed. Accordingly, he argues that the district
    court erred in denying his motion to suppress.
    We conclude that the wiretap orders were sufficient under the Wiretap Act because
    (1) the applications were in fact appropriately authorized by persons authorized by the
    Wiretap Act; (2) the orders on their face identified, albeit not by name, the Justice
    Department officials who authorized the applications; (3) the applications themselves, to
    which the orders on their face referred, did contain both the title and name of the official
    authorizing the application; and (4) the applications and proposed orders were submitted
    together as one package to the judge who signed the orders and later to Brunson, whose
    communications were intercepted, such that both the judge and Brunson actually knew
    both the title and name of the official authorizing each application. In addition, even if we
    were to assume that the omission of the name of the authorizing official in the orders was
    3
    a defect, it would not be the type of defect that rendered the orders “insufficient” under
    § 2518(10)(a)(ii). Therefore, we conclude that the district court did not err in denying
    Brunson’s motion to suppress.
    I
    Joey Brunson was charged with participation in a drug-trafficking conspiracy in
    South Carolina and related crimes. In particular, the second superseding indictment, which
    the grand jury returned in March 2017, charged Brunson in Count 1 with conspiracy to
    traffic five kilograms or more of cocaine and an additional quantity of crack cocaine, in
    violation of 
    21 U.S.C. § 846
    ; in Counts 2–7, with using a telecommunications facility for
    drug trafficking, in violation of 
    21 U.S.C. § 843
    (b); in Count 8, with conspiracy to commit
    money laundering, in violation of 
    18 U.S.C. § 1956
    (h); in Count 9, with possession of
    cocaine and marijuana with intent to distribute, in violation of 
    21 U.S.C. § 841
    (a)(1); in
    Count 10, with transporting a firearm by a felon, in violation of 
    18 U.S.C. § 922
    (g)(1); in
    Count 11, with possession of a firearm in furtherance of drug trafficking offense, in
    violation of 
    18 U.S.C. § 924
    (c)(1); and in Count 12, with perjury, in violation of 
    18 U.S.C. § 1621
    .
    In 2013, during the investigation that led to Brunson’s indictment, the government
    sought judicial authorization under the Wiretap Act to intercept calls and texts over
    specified telephones. The first application for a court order disclosed that it was authorized
    by Deputy Assistant Attorney General Denis J. McInerney, and the district court issued the
    government’s proposed order on July 31, 2013, authorizing the requested wiretaps. The
    4
    order stated that it was entered “pursuant to an application authorized by an appropriate
    official of the Criminal Division, United States Department of Justice, Deputy Assistant
    Attorney General, pursuant to the power delegated to that official by special designation of
    the Attorney General,” but the order did not include the official’s name. Pursuant to the
    order, the FBI intercepted various wire communications, including one on August 6, 2013,
    to which Brunson was a party and which became the basis for Count 2.
    In a second application submitted to extend the district court’s first order, the
    government used the same form as the first application except that it disclosed that the
    application was authorized by Deputy Assistant Attorney General Paul M. O’Brien. Again,
    the proposed order that the district court signed on August 29, 2013, included O’Brien’s
    title but not his name.      Pursuant to the order, the FBI intercepted additional wire
    communications, including one on September 3, 2013, to which Brunson was a party and
    evidence of which was presented at trial but did not form the basis for any substantive
    count.
    Finally, the government submitted a third application to extend the district court’s
    second order, and again the application was in the same form as the previous two
    applications, except that it disclosed that the application was authorized by Acting
    Assistant Attorney General Mythili Raman. Again, the proposed order that the district
    court signed on October 11, 2013, confirmed that the application had been authorized by
    an appropriate official, but did not include Raman’s name. Pursuant to that order, the FBI
    intercepted wire communications, to which Brunson was a party, between October 11
    through October 24, 2013, which became the basis for Counts 3 through 7.
    5
    Brunson filed a pretrial motion to suppress the evidence obtained from the
    intercepted communications on the ground that each of the district court’s orders
    authorizing the interceptions failed to include the name of the official authorizing the
    application, and thus each order was “insufficient on its face,” as that phrase is used in 
    18 U.S.C. § 2518
    (10)(a)(ii). The district court denied the motion on the ground that the
    wiretap orders substantially complied with the Wiretap Act because they were based on
    and referred to the applications, which identified the authorizing officials both by title and
    name.
    The jury thereafter convicted Brunson on all 12 counts of the indictment.
    Several months after Brunson was convicted, he filed a motion for a new trial based
    on the intervening Supreme Court decision in Dahda v. United States, 
    138 S. Ct. 1491
    (2018), in which the Supreme Court upheld as facially sufficient wiretap orders that
    illegally authorized the interception of communications outside the district court’s
    territorial jurisdiction. In its opinion, the Court explained that an order would be facially
    insufficient if, for example, it “lack[ed] information that the wiretap statute [in
    §§ 2518(4)(a)–(e)] require[d] it to include” but that the district court’s territorial
    jurisdiction was not required to be included in wiretap orders. Dahda, 
    138 S. Ct. at
    1499–
    1500.
    The district court denied Brunson’s motion for a new trial, ruling first that the
    motion was untimely, as it was filed four months after Brunson’s conviction, and second,
    that the Supreme Court’s holding in Dahda did not disturb its pretrial ruling denying
    Brunson’s motion to suppress. In addition, the court noted that even though the wiretap
    6
    orders did not include the names of the officials authorizing the application, the orders
    referred to the applications, which did include the names.
    On September 24, 2018, the district court sentenced Brunson to life plus 60 months’
    imprisonment. From the district court’s judgment dated September 25, 2018, Brunson filed
    this appeal, contending that the district court erred in denying his motion to suppress
    because the wiretap orders were facially insufficient as they failed to include the names of
    the officials authorizing the various applications for the orders.
    Almost three months after Brunson was sentenced and while this appeal was
    pending, Congress enacted the First Step Act of 2018 (“FSA”), Pub. L. 115-391, 
    132 Stat. 5194
     (Dec. 21, 2018), which authorized some sentence reductions for offenses committed
    “before the date of enactment of [the] Act, if [the] sentence for the offense ha[d] not been
    imposed as of [the] date of enactment.” FSA § 401(c). Brunson filed a motion in the
    district court on February 27, 2019, for a reduction of his sentence based on the FSA, and
    on April 10, 2019, the district court denied the motion on the ground that the FSA did not
    apply to Brunson because he was sentenced before the statute’s effective date. Brunson
    also seeks review of the district court’s denial of FSA relief.
    II
    A
    In support of his argument that the district court erred in denying his motion to
    suppress evidence obtained by the wiretap orders, Brunson relies mainly on Dahda v.
    United States, 
    138 S. Ct. 1491
     (2018), which was decided after the district court ruled. He
    7
    argues that Dahda essentially overruled the test that the district court applied to uphold the
    wiretap orders. According to Brunson, Dahda recognized that the Wiretap Act must be
    enforced as written, and therefore a wiretap order that fails to identify the Department of
    Justice official who had authorized the wiretap application, as required by § 2518(4)(d), is
    insufficient, and the evidence obtained from the wiretap must be suppressed under
    § 2518(10)(a)(ii).
    The government contends that the district court properly denied Brunson’s motion
    to suppress because the wiretap orders were not facially insufficient, as the authorizing
    officials “were specifically identified in the wiretap applications that accompanied the
    orders and were referenced by and incorporated into the orders.” The government argues
    further that Dahda, which acknowledges that not all facial defects render an order
    insufficient, does not hold otherwise.
    The Wiretap Act sets forth in detail procedures for the issuance of orders to allow
    the interception of wire, oral, or electronic communications. To obtain a wiretap order
    pursuant to the Act, the government must submit an application authorized by an
    appropriately designated high-level Justice Department official to a judge of competent
    jurisdiction and state the applicant’s authority to make such an application. See 
    18 U.S.C. §§ 2516
    (1), 2518(1). On the basis of the application, the judge must make certain findings
    to justify the issuance of the requested order. See 
    id.
     at § 2518(3) (authorizing the entry of
    an ex parte wiretap order if a judge determines, inter alia, that there is probable cause that
    an individual is committing, has committed, or is about to commit an offense and that
    normal investigative procedures will be unavailing or dangerous). If these requirements
    8
    are satisfied, the judge may issue an order authorizing the interception of wire, oral, or
    electronic communications within the territorial jurisdiction of the court in which the judge
    is sitting. See id. The order must specify:
    (a) the identity of the person, if known, whose communications are to
    be intercepted;
    (b) the nature and location of the communications facilities as to
    which, or the place where, authority to intercept is granted;
    (c) a particular description of the type of communication sought to be
    intercepted, and a statement of the particular offense to which it
    relates;
    (d) the identity of the agency authorized to intercept the
    communications, and of the person authorizing the application; and
    (e) the period of time during which such interception is authorized,
    including a statement as to whether or not the interception shall
    automatically terminate when the described communication has been
    first obtained.
    Id. § 2518(4) (emphasis added).
    The Wiretap Act also regulates the use of communications intercepted pursuant to
    a wiretap order. Section 2515 provides that “[w]henever any wire or oral communication
    has been intercepted, no part of the contents of such communication and no evidence
    derived therefrom may be received in evidence in any trial . . . if the disclosure of that
    information would be in violation of this chapter.” The Act also authorizes “[a]ny
    aggrieved person in any trial” to “move to suppress the contents of any wire or oral
    communication intercepted pursuant to this chapter, or evidence derived therefrom, on the
    grounds that — (i) the communication was unlawfully intercepted; (ii) the order of
    authorization or approval under which it was intercepted is insufficient on its face; or
    9
    (iii) the interception was not made in conformity with the order of authorization or
    approval.” Id. § 2518(10)(a) (emphasis added).
    In Dahda, the Supreme Court considered wiretap orders that, contrary to the
    Wiretap Act, included an authorization to intercept communications outside the territorial
    jurisdiction of the issuing court, i.e., the District of Kansas. To address the consequence
    of the defect, the Court looked to § 2518(10)(a)(ii), which requires suppression when a
    wiretap order is facially insufficient. See 
    138 S. Ct. at 1494
    . And in determining what
    makes an order “insufficient,” the Court looked to §§ 2518(4)(a)–(e) (which requires
    specific information, but not the order’s territoriality, to be included in an order), but it also
    noted that insufficiency would not result from “each and every error that appears in an
    otherwise sufficient order.” Id. at 1498. The Court concluded that although the orders
    before it did in fact erroneously state the territorial area where they could lawfully be
    enforced, that defect did not render the orders facially insufficient. Id. at 1499. The
    territorial scope of the orders was evident from the authorizing judge’s territorial
    jurisdiction — i.e., the District of Kansas — and the presumption in the statute that limited
    the order’s scope to the issuing court’s jurisdiction. Id. The Court “fail[ed] to see how”
    the error in describing the territorial scope of the orders “could render the Orders facially
    insufficient,” because the information — the erroneous territorial provision — was
    “surplus[age]” and was not required. Id.
    Since the defect at issue did not implicate the requirements stated in §§ 2518(4)(a)–
    (e), the Court did not address the consequence of a technical defect that might arise by a
    failure to comply precisely with § 2518(4). Dahda, 
    138 S. Ct. at 1498
    . Indeed, it stated
    10
    specifically that it was not resolving questions such as the consequence of a defect under
    § 2518(10)(a)(ii) based on “identifying the wrong Government official as authorizing the
    application.” Id. In short, even though the government relied on courts of appeals cases
    holding that defects arising from a failure to comply to the letter with the requirements of
    §§ 2518(4)(a)–(e) did not warrant suppression, the Court refused to address the
    consequence of such technical defects.
    Because Dahda does not address how we, in this case, are to determine whether the
    orders’ failure to include the names of authorizing officials renders them “insufficient,” we
    must look elsewhere.
    B
    Brunson’s argument that the orders in this case failed adequately to include the
    “identity . . . of the person authorizing the application” for each order, as required by
    § 2518(4)(d), arises from the undisputed fact that, even though each order described the
    authorizing person by title, it did not include the person’s name, and reference to the name
    in the application for the order was not an identification on the face of the order. He thus
    contends that the orders were “insufficient on [their face],” requiring suppression under
    § 2518(10)(a)(ii) of any evidence derived from the wiretaps.
    Each order in this case states that it was issued “pursuant to an application
    authorized by an appropriate official of the Criminal Division, United States Department
    of Justice, Deputy Assistant Attorney General, pursuant to the power delegated to that
    official by special designation of the Attorney General.” Thus, while the orders identified
    11
    the authorizing official by title, they did not include the official’s name, instead referring
    to the application where the name was provided. The question that Brunson thus presents
    is whether the Wiretap Act requires that orders give the authorizing official’s name. But
    his argument addressing that issue reveals that his framing of the issue is in fact incomplete.
    Brunson agrees that if the orders stated that the “Attorney General,” without naming
    him or her, authorized the application, the order would be sufficient because that title refers
    to a unique, identifiable person. At the current time, for example, it is public knowledge,
    or at least readily obtainable knowledge, that William P. Barr is the Attorney General.
    Based on this logic, other courts have acknowledged that a name is not necessarily required
    to provide identification. See, e.g., United States v. Scurry, 
    821 F.3d 1
    , 8–9 (D.C. Cir.
    2016) (holding that the identification requirement of the Wiretap Act is met “where the
    language points unambiguously to a unique qualified officer holding a position that only
    one individual can occupy at a time”). Brunson takes a different view, however, when an
    order identifies a Deputy Assistant Attorney General in the Criminal Division as the
    authorizing official because there are six persons who hold that title. Thus, he maintains
    that reference to the “Attorney General,” without naming him is sufficient, but reference
    to a Deputy Assistant Attorney General is not. Brunson’s own argument therefore indicates
    that the issue of whether wiretap orders meet the identity requirement of § 2518(4)(d) rests
    not on whether the authorizing official is named, but rather on whether the authorizing
    officer is described with such particularity that only one person fits the description.
    This recasting of the issue indeed comports more closely to what is required by the
    text of the Wiretap Act, which employs the word “identity,” because that term is defined
    12
    to mean “the distinguishing character or personality of an individual,” Merriam-Webster’s
    Collegiate Dictionary, 616 (11th ed. 2007) (emphasis added), and not necessarily the name
    of the individual. Thus, when the statute requires that an order include the “identity” of
    the person authorizing an action, the word “identity” requires a description of the person
    that is sufficient to distinguish that person from others, but not necessarily the person’s
    name. In short, whether a wiretap order sufficiently identifies a person turns on whether
    the description of the person leads to but one person.
    By this understanding then, when the order identifies the Attorney General by title
    only as the authorizing official, it is sufficient because the Attorney General refers to one
    person and his or her name, even though not given, can readily be obtained. With this same
    reasoning, then, an “identification” by reference in an order to a Criminal Division Deputy
    Assistant Attorney General would not, without more, be sufficient because there are six
    such persons, and such identification simply by title would not point to the one person who
    authorized the application.
    The information contained in the orders in this case, however, is more complete than
    a mere reference to one of six Criminal Division Deputy Assistant Attorney Generals. Each
    order identifies, as the authorizing official, the Deputy Assistant Attorney General of the
    Criminal Division of the Department of Justice who signed off on the application leading
    to the issuance of the order. And the specific official who authorized the application was
    readily obtainable from that application, which was submitted to the judge with the
    proposed order and given to Brunson with the executed order. Thus, both the authorizing
    judge and Brunson had a description sufficient to readily identify the one official who
    13
    authorized the application for the order. We therefore conclude that, in context, the orders
    contained sufficient information to identify the authorizing officials.
    Nonetheless, we would commend that, to avoid doubt and possible confusion in the
    future, prosecutors include as a matter of prudence in wiretap orders both the title and name
    of the official authorizing the application. And we understand that the Department of
    Justice has already recognized this. Several years after the orders in this case were issued,
    the Department sent a circular to all federal prosecutors recommending that the name of
    the authorizing official be included in any proposed wiretap order.
    At bottom, however, we conclude that the orders in this case, which identified the
    officials authorizing the application by title and reference to the application where the
    official’s name was included, were sufficient to satisfy the requirement of § 2518(4)(d).
    C
    Even were we to assume that perfect compliance with § 2518(4)(d) would entail the
    inclusion of the authorizing official’s name in the text of the order itself, as Brunson argues,
    we would conclude that the lack of such specificity is a defect that does not amount to an
    insufficiency. See Dahda, 
    138 S. Ct. at
    1497–99 (holding that while “the core concerns
    test” applied in United States v. Giordano, 
    416 U.S. 505
    , 527 (1974), to § 2518(10)(a)(i)
    should not be applied to § 2518(10)(a)(ii) (the provision before us), still “not every defect
    [in complying with subparagraph (ii)] results in an insufficiency”). While Dahda did not
    undertake to describe the scope of defects that would render wiretap orders insufficient
    under § 2518(10)(a)(ii), it did cite to cases where technical errors were held not to require
    14
    suppression under that subparagraph. See United States v. Moore, 
    41 F.3d 370
    , 375–76
    (8th Cir. 1994) (order missing judge’s signature); United States v. Joseph, 
    519 F.2d 1068
    ,
    1070 (5th Cir. 1975) (order identifying the wrong Government official as authorizing the
    application); United States v. Vigi, 
    515 F.2d 290
    , 293 (6th Cir. 1975) (same). Here, the
    wiretap orders, even if not in perfect compliance, nonetheless substantially complied with
    the requirements of § 2518(4)(a)–(e), as the statute does not specifically require the name
    of the person authorizing the application. Each application was in fact appropriately
    approved; each order disclosed by title the authorizing official; and both the court issuing
    the wiretap orders and later Brunson had actual knowledge of the name of each authorizing
    official. In these circumstances, the identification in the wiretap orders did not deny
    Brunson any information required by § 2518(4)(a)–(e). We would therefore conclude that
    the absence of the official’s name from the face of the orders, even if technically a defect,
    is not the type of defect that would render these orders facially insufficient.
    III
    Finally, even if the wiretap orders were thought to be facially insufficient, Brunson’s
    motion to suppress would have appropriately been denied under the good faith doctrine
    articulated in United States v. Leon, 
    468 U.S. 897
     (1984).
    In Leon, the Supreme Court held that evidence “seized in reasonable, good-faith
    reliance on a search warrant that is subsequently held to be defective” is not subject to
    suppression, despite the existence of a constitutional violation. 
    468 U.S. at 905
    . The Court
    noted that the social costs of excluding evidence to vindicate Fourth Amendment rights are
    15
    high, as the exclusion impedes the truth-finding functions of the judge and jury and
    possibly results in guilty defendants going free or receiving reduced sentences. See 
    id. at 907
    .   And suppressing evidence “obtained in objectively reasonable reliance on a
    subsequently invalidated search warrant” has only “marginal or nonexistent” benefits in
    terms of deterring Fourth Amendment violations. 
    Id. at 922
    . Thus, the Court observed,
    where an officer acts in good faith, the benefits of suppressing the fruits of an invalid
    warrant are outweighed by the harms of doing so. See 
    id.
    While Leon carved out an exception to the judicially created exclusionary rule and
    this case involves a statutory exclusionary rule, we note that when Congress enacted the
    Wiretap Act, it did so against the backdrop of analogous Fourth Amendment jurisprudence.
    Indeed, the accompanying Senate Report specifically states that the statutory suppression
    remedy was designed to “largely reflect[] existing law.” S. Rep. No. 90-1097 (1968), as
    reprinted in 1968 U.S.C.C.A.N. 2112, 2185. Moreover, Leon’s rationale is equally
    applicable in the statutory suppression context — “when law enforcement officers have
    acted in objective good faith or their transgressions have been minor,” requiring
    suppression of evidence confers an unearned benefit on a guilty defendant that “offends
    basic concepts of the criminal justice system.” Leon, 
    468 U.S. at 908
    . Moreover, in the
    same vein, the Supreme Court has specifically recognized that not every defect in a wiretap
    order justifies exclusion under the Wiretap Act’s suppression provision. See Dahda, 
    138 S. Ct. at 1498
    .
    Thus, we conclude that where law enforcement officials have acted reasonably and
    in good faith to comply with the central substantive requirements of the Wiretap Act, as is
    16
    the case here, suppression is not justified. See Moore, 41 F.3d at 376–77 (holding that the
    good faith exception applied to the government’s interception of communications pursuant
    to a wiretap order that was missing the judge’s signature); United States v. Brewer, 204 F.
    App’x 205, 208 (4th Cir. 2006) (per curiam) (unpublished) (holding in the alternative that
    law enforcement officers “were entitled to rely on facially valid wiretap orders pursuant to
    the good faith exception”). Even though the wiretap orders submitted by the government
    did not contain the names of the authorizing officials, the accompanying applications did.
    More importantly, there was plainly no attempt to obfuscate the identity of the relevant
    officials, nor did the government fail to secure proper authorization for the applications
    submitted. And at the time the orders in question were issued in 2013, no court of appeals
    had held that a failure to include the name of the authorizing officer in the wiretap order
    rendered such an order substantively deficient. Indeed, numerous courts had considered
    challenges to similar orders and held that communications intercepted under those orders
    were not subject to suppression. See, e.g., United States v. Gray, 
    521 F.3d 514
    , 526–28
    (6th Cir. 2008) (holding that the omission of the name of the authorizing officer from a
    wiretap order was a technical defect that did not require suppression); United States v.
    Callum, 
    410 F.3d 571
    , 576 (9th Cir. 2005) (same); United States v. Fudge, 
    325 F.3d 910
    ,
    918 (7th Cir. 2003) (same); United States v. Radcliff, 
    331 F.3d 1153
    , 1162 (10th Cir. 2003)
    (same) (noting that “[e]very circuit to consider the question has held that § 2518(10)(a)(ii)
    does not require suppression if the facial insufficiency of the wiretap order is no more than
    a technical defect” (quoting Moore, 41 F.3d at 374)). Finally, when the D.C. Circuit
    declined to follow this line of cases, holding in 2016 that the omission of the authorizing
    17
    officer’s name rendered a wiretap order facially insufficient for purposes of
    § 2518(10)(a)(ii), see Scurry, 821 F.3d at 8–12, the Department of Justice changed its
    practice to ensure that future orders did contain the name of the authorizing official.
    In short, any defects in orders issued prior to 2016 resulted from good faith efforts
    to comply with the requirements of the Wiretap Act and not from intentional wrongdoing
    and therefore would not require suppression of the evidence obtained.
    IV
    Addressing his sentencing, Brunson contends that the First Step Act, which was
    enacted on December 21, 2018, during the pendency of this appeal, invalidates the
    mandatory life sentence imposed by the district court. As he correctly notes, § 401 of the
    FSA reduced the mandatory term of life imprisonment without release previously required
    under 
    21 U.S.C. § 841
    (b)(1)(A) to a mandatory 25-year term. See FSA § 401(a)(2)(A)(ii).
    But because Brunson was sentenced prior to the FSA’s enactment, the benefits of § 401
    are not available to him. Section 401(c) of the Act, addressing the section’s “Applicability
    to Pending Cases,” provides that § 401 “shall apply to any offense that was committed
    before the date of enactment of this Act, if a sentence for the offense has not been imposed
    as of such date of enactment.” FSA § 401(c) (emphasis added).
    Brunson argues that the statutory language should be construed to extend the Act’s
    coverage to “non-final criminal cases pending on direct review at the time of enactment.”
    This reading, however, is contrary to the plain meaning of the statute’s text, which on its
    face restricts applicability to defendants whose sentences had not yet been “imposed” at
    18
    the time of the Act’s enactment, and a sentence is “imposed” when it is pronounced by the
    sentencing court, i.e., the district court. Indeed, we recently recognized as much in United
    States v. Jordan, 
    952 F.3d 160
     (4th Cir. 2020), which held that § 403 of the FSA, which
    contains the same retroactivity provision as does § 401, did not apply to a defendant whose
    sentence was pronounced — but not finalized after direct appeal — prior to the FSA’s
    enactment. See id. at 172.
    As we noted in Jordan, this common-sense understanding is consistent with
    numerous provisions of federal law that govern sentencing in the district court. See, e.g.,
    
    18 U.S.C. § 3553
    (a) (listing “factors to be considered [by the district court] in imposing a
    sentence” emphasis added)); 
    21 U.S.C. § 851
    (b) (“If the United States attorney files an
    information under this section, the court shall after conviction but before pronouncement
    of sentence . . . inform [the defendant] that any challenge to a prior conviction which is not
    made before sentence is imposed may not thereafter be raised to attack the sentence”
    (emphasis added)). Unlike district courts, a court of appeals does not “impose” sentences.
    Its role is limited to affirming or vacating the sentence imposed by the district court. See
    Jordan, 952 F.3d at 172 (“[I]mposing sentences is the business of the district courts, while
    courts of appeals are tasked with reviewing them” (quoting United States v. Aviles, 
    938 F.3d 503
    , 510 (3d Cir. 2019))).
    To support his argument to the contrary, Brunson relies on United States v. Clark,
    
    110 F.3d 15
    , 17 (6th Cir. 1997), where the court held that 
    18 U.S.C. § 3553
    (f) (the safety
    valve statute applying “to all sentences imposed on or after” the date of enactment) applied
    to cases pending on appeal when the statute was enacted. In reaching this conclusion, the
    19
    Sixth Circuit reasoned that the safety valve statute should be applied broadly and noted that
    “[a] case is not yet final when it is pending on appeal. The initial sentence has not been
    finally ‘imposed’ within the meaning of the safety valve statute because it is the function
    of the appellate court to make it final after review or see that the sentence is changed if in
    error.” 
    Id.
     But in Jordan, we rejected a request to extend Clark to § 403 of the FSA, noting
    that we could find “no other circuit court decision applying [Clark’s] definition of
    ‘imposed’ even under the statute at issue in Clark, let alone applying it in any other
    context.” Jordan, 952 F.3d at 173. In short, we find Clark’s reasoning unpersuasive and
    decline to extend its holding to § 401 of the FSA.
    Brunson also argues that a “presumption of retroactivity” requires applying the
    FSA’s amendments to sentences that were not final at the time of enactment, citing Bradley
    v. School Bd. of City of Richmond, 
    416 U.S. 696
    , 710–12 (1974). But Bradley stands only
    for the proposition that a change in the law may be given effect in pending cases even in
    the absence of clear legislative intent. 
    Id. at 715
    . Here, in contrast to Bradley, Congress
    did expressly provide for retroactive application of the changed law, but it limited that
    application to defendants whose sentences had not been imposed as of the date the law was
    enacted.
    At bottom, we conclude that the FSA does not provide any benefit to Brunson.
    *      *      *
    The judgment of the district court is accordingly
    AFFIRMED.
    20
    DIANA GRIBBON MOTZ, Circuit Judge, dissenting:
    The plain language of 
    18 U.S.C. § 2518
    (4), as the Supreme Court recognized in
    Dahda v. United States, 
    138 S. Ct. 1491
     (2018), forecloses any holding that the wiretap
    orders relied on here were facially sufficient. Accordingly, I must dissent.
    I.
    A.
    Title III of the Omnibus Crime Control and Safe Streets Act of 1968, codified at 
    18 U.S.C. § 2510
     et seq. (“Title III”), has the “dual purpose” of protecting individual privacy
    and setting forth uniform conditions for law enforcement interception of wire and oral
    communications. S. Rep. No. 90-1097, at 66 (1968). The statute balances the need to
    combat serious crime and the equally pressing imperative of safeguarding individual
    privacy from government overreach. See 
    id.
     at 66–67. It does so by prohibiting all
    interstate interceptions of wire, oral, and electronic communications with limited
    exceptions, such as for law enforcement to investigate specified types of serious crime. Cf.
    United States v. Hoffman, 
    832 F.2d 1299
    , 1306 (1st Cir. 1987) (“[I]n a society which values
    privacy and the rights of the individual, wiretapping is to be distinctly the exception — not
    the rule.”).
    Title III specifies the obligations of both law enforcement and the authorizing court.
    It requires law enforcement to submit a detailed wiretap application to a court of competent
    jurisdiction and delineates the specific information that must be contained in that
    application. 
    18 U.S.C. § 2518
    (1). Only after a court independently makes the findings
    21
    required by the statute can it issue an order authorizing the interception. 
    Id.
     § 2518(3).
    Title III also separately lists the information that must appear in the court’s order. Id.
    § 2518(4). It is the court’s order, not the application, that authorizes the interception and
    provides a defense to civil penalties for unauthorized snooping. Id. § 2520(d)(1). An
    application without a subsequent court order is, legally speaking, no more than a piece of
    a paper. 1
    B.
    An individual may move to suppress evidence obtained via wiretap and any
    information derived therefrom if: “(i) the communication was unlawfully intercepted; (ii)
    the order of authorization or approval under which it was intercepted is insufficient on its
    face; or (iii) the interception was not made in conformity with the order of authorization or
    approval.” 
    18 U.S.C. § 2518
    (10).
    The Supreme Court has interpreted § 2518(10) on several occasions, most recently
    in Dahda v. United States, 
    138 S. Ct. 1491
     (2018). See also United States v. Donovan, 
    429 U.S. 413
     (1977); United States v. Chavez, 
    416 U.S. 562
     (1974); United States v. Giordano,
    
    416 U.S. 505
     (1974). Together, these cases clarify the distinction between an “unlawful[]”
    wiretap under § 2518(10)(a)(i) and a wiretap authorized by an order that is “insufficient on
    its face” under § 2518(10)(a)(ii).
    As Giordano established and Dahda reaffirmed, a wiretap is “unlawful[]” within
    the meaning of subparagraph (i) if the wiretap violates those Title III statutory provisions
    1
    There is a limited exception, not relevant here, for specific “emergency
    situation[s]” enumerated by the statute. 
    18 U.S.C. § 2518
    (7).
    22
    that implement the wiretap-related congressional concerns motivating passage of Title III.
    Giordano, 
    416 U.S. at 527
     (“[W]e think Congress intended to require suppression where
    there is failure to satisfy any of those statutory requirements that directly and substantially
    implement the congressional intention to limit the use of intercept procedures to those
    situations clearly calling for the employment of this extraordinary investigative device.”). 2
    Following Giordano, courts assessing whether a wiretap was “unlawfully intercepted”
    pursuant to subparagraph (i) look to whether the Department of Justice has substantially
    complied with Title III’s requirements and will suppress the wiretap evidence only if the
    alleged impropriety implicates those core concerns. This assessment has become known
    as the “core concerns” test. Dahda, 
    138 S. Ct. at 1498
     (referring to the “core concerns
    test”).
    For many years, some courts applied Giordano’s core concerns test not only to
    evaluate whether a wiretap was “unlawful[]” under subparagraph (i) but also to determine
    whether it was “insufficient on its face” under subparagraph (ii). So long as the Department
    of Justice substantially complied with Title III’s core concerns, these courts deemed
    suppression unwarranted, even where the defendant challenged an order as facially
    insufficient under subparagraph (ii). For example, most courts refused to find wiretap
    orders “insufficient on [their] face” under subparagraph (ii) where the order failed to name
    the authorizing official, so long as the wiretap application had in fact been authorized by
    2
    A wiretap may also be unlawful under subparagraph (i) if it violates the
    Constitution, for example where the Government lacks probable cause. See Giordano, 
    416 U.S. at
    525–26.
    23
    an appropriate official. See, e.g., United States v. Callum, 
    410 F.3d 571
    , 576 (9th Cir.
    2005); United States v. Radcliff, 
    331 F.3d 1153
    , 1160–63 (10th Cir. 2003); United States
    v. Traitz, 
    871 F.2d 368
    , 379 (3d Cir. 1989). 3
    In Dahda, the Supreme Court implicitly overruled those cases, holding that
    Giordano’s “core concerns” analysis applies only to subparagraph (i), and does not apply
    to the question of whether a wiretap order is “insufficient on its face” under subparagraph
    (ii). Dahda, 
    138 S. Ct. at 1498
     (concluding “that subparagraph (ii) does not contain a
    Giordano-like ‘core concerns’ requirement”).
    The Dahda Court reasoned that, unlike the assessment of whether a wiretap is
    unlawful under subparagraph (i), which looks to whether the Government has substantially
    complied with the statute’s objectives, the assessment of whether an order is facially
    insufficient under subparagraph (ii) is a mechanical test: if the order does not contain the
    information required by § 2518(4), it is facially insufficient:
    It is clear that subparagraph (ii) covers at least an order’s failure to include
    information that § 2518(4) specifically requires the order to contain. An
    order lacking that information would deviate from the uniform authorizing
    requirements that Congress explicitly set forth, while also falling literally
    within the phrase “insufficient on its face.”
    Id. (emphases added) (citations omitted).
    3
    Reflecting confusion on this issue, prior to Dahda, some courts failed to explain
    whether they refused to suppress pursuant to subparagraph (i) or subparagraph (ii),
    presumably because they applied the same core concerns test regardless of the statutory
    basis for suppression. See, e.g., United States v. Gray, 
    521 F.3d 514
    , 526–28 (6th Cir.
    2008); United States v. Fudge, 
    325 F.3d 910
    , 918 (7th Cir. 2003).
    24
    In sum, when assessing facial sufficiency under subparagraph (ii), Giordano’s “core
    concerns” test is irrelevant. Rather, Dahda’s test controls. 
    Id.
     The Dahda analysis is
    simple: when an order lacks the information that 2518(4) specifically requires, it must be
    suppressed as insufficient on its face. See also United States v. Scurry, 
    821 F.3d 1
    , 8, 13
    (D.C. Cir. 2016) (adopting the mechanical test to determine whether an order is facially
    sufficient).
    II.
    Given that § 2518(4)(d) specifically requires that a wiretap order contain the
    “identity . . . of the person” who authorized the wiretap application, a straightforward
    application of Dahda requires us to hold that failure to provide the “identity of the person”
    who authorized the application in the orders challenged here is a defect that renders them
    “insufficient on [their] face” under subparagraph (ii) of § 2518(10)(a). Accordingly, the
    district court should have suppressed the wiretaps and any “evidence derived therefrom.”
    
    18 U.S.C. § 2518
    (10)(a).
    A.
    At oral argument, the Government twice acknowledged that it was the position of
    the Department of Justice that § 2518(4)(d)’s requirement that an order containing the
    “identity . . . of the person” means the name of the Deputy Assistant Attorney General
    official who authorized the order, which is precisely what the orders here lacked. Oral Arg.
    at 19:49–20:41; see also id. at 33:21–34:22. I see no reason to construe “identity” to mean
    anything different.
    25
    But, despite its concession, the Government claims that omission of the names of
    the authorizing officials here is without consequence because the orders assertedly
    incorporate by reference their names from the applications. According to the Government,
    “an order that does not itself identify the authorizing official by name, but incorporates a
    wiretap application that does name the official, complies with Section 2518(4)(d).” Supp.
    Br. at 16. The Government maintains that because the orders at issue here cross-reference
    the wiretap applications, the judge and the defendant could verify that the Department of
    Justice had complied with Title III’s requirements.
    There are several problems with this argument. The first is that it is in considerable
    tension with Title III itself. If incorporation by reference were acceptable, the entire order
    would need be little more than a single sentence incorporating the application by reference.
    This would eviscerate Title III, which enumerates in § 2518(1) the precise information
    required to be contained in an application and separately enumerates in § 2518(4) the
    precise information required in an order. At bottom, the Government’s argument amounts
    to an assertion that a wiretap application can be a substitute for a wiretap order, an approach
    that Congress plainly rejected. I cannot accept the Government’s unwitting koan that an
    order can be facially sufficient by referring to an external document. As the D.C. Circuit
    explained in factually indistinguishable circumstances:
    Title III’s facial sufficiency inquiry is limited to the four corners of the wiretap
    order. There is something incongruous about an interpretation that would let
    extrinsic documents transform an order that is “insufficient on its face” into one
    that is sufficient “on its face.” Further, the Government’s interpretation would
    allow it, in every case, to satisfy Title III’s order identification requirement by
    satisfying its application identification requirement, effectively rendering
    section 2518(4)(d) superfluous.
    26
    Scurry, 821 F.3d at 9 (citations omitted).
    Moreover, the Government’s theory rests on the unfounded assumption that the
    applications and orders necessarily move together. The D.C. Circuit remarked on the
    problem with the logic in this argument: the “complete overlap” between the information
    required in the order and application “makes little sense if Congress expected the order
    always to travel with the application.”        Id. at 10.    Moreover, as the Government
    acknowledged at oral argument, while it aims to keep these documents together, it cannot
    guarantee that they remain so. When asked if there was a uniform, mandatory method of
    keeping the wiretap applications and orders together, the Government’s answer was
    “probably not.” Oral Arg. at 35:35–36:56. Accordingly, the Government has not and
    cannot establish that the underlying applications always move with the orders.
    In the case at hand, the Government implies that its incorporation by reference
    theory would cause no harm because these documents traveled together. Supp. Br. at 16–
    17 (explaining both the issuing judge and Brunson were provided with the applications,
    which included the authorizing officials’ names). In fact, it is not clear that they did in this
    case, 4 or that it is uncommon for problems to arise related to accounting for these papers
    over time. See Traitz, 
    871 F.2d at 376
     (noting that draft order was missing a page when it
    4
    Brunson’s pro se suppression motion suggests that he did not receive all of the
    orders at issue in this case, although he implies that he received all the applications. See
    Mot. Suppress 2 ECF No. 1969 (referencing applications, including July 31 application,
    but noting that he “never received [the July 31st, 2013 order] in discovery materials”); id.
    at 6 (“No order for original interception for target phones #7, #8, #9 from July 31, 2013.”).
    27
    was signed by the district judge). Thus, I am unable to accept an incorporation by reference
    argument that is based on the unproven assumption that these documents remain together.
    Additionally, despite the Government’s argument that specific language in the
    orders incorporates the applications by reference, I am skeptical that this language clearly
    does so. Compare the language in the orders, prepared by the Government, which the
    Government now asserts incorporates the applications by reference: “pursuant to an
    application authorized by an appropriate official” and “full consideration having been
    given to the matters set forth therein,”; with the explicit incorporation by reference in one
    of the Government’s wiretap applications in this case: “[o]n the basis of the allegations
    contained in this application and on the basis of the Affidavit of Special Agent [omitted],
    which is fully incorporated herein by reference.” (emphasis added). As evidenced by the
    latter example, the Government knows how to clearly incorporate by reference when it
    intends to do so. The language in the orders hardly constitutes a clear statement of intent
    to incorporate the applications by reference.
    B.
    Rather than relying on the Government’s incorporation by reference theory, the
    majority offers a theory of its own, one that the Government has expressly disavowed. Oral
    Arg. at 33:21–34:48. The majority’s starting point is the Government’s asserted belief that
    an order may identify the Attorney General as the authorizing official by title alone. 5
    According to the majority, this reasoning means that every authorizing official can be
    5
    I express no view regarding whether an order that identifies the Attorney General
    by title but not name would be sufficient on its face, as that question is not presented.
    28
    identified by title rather than by name, so long as the official “is described with such
    particularity that only one person fits the description.” Maj. Op. at 12. Thus, the majority
    concludes that “whether a wiretap order sufficiently identifies a person turns” not on that
    person’s name, but “on whether the description of the person leads to but one person.” Id.
    at 13.
    The problem with this argument, as the Government recognizes, is that the title of
    the authorizing officials other than the Attorney General do not “lead to but one person” —
    which is why the Government concedes that the most natural understanding of the
    “identity” in this context means name, not title. As the D.C. Circuit explained in rejecting
    the majority’s argument:
    The text is plain and unambiguous; every wiretap court order must identify
    the individual high-level Justice Department official who . . . authorized the
    underlying wiretap application. This requirement may be met where the
    language points unambiguously to a unique qualified officer holding a
    position that only one individual can occupy at a time, but here there is more
    than one Deputy Assistant Attorney General and no individual Deputy is
    identified on the face of [the challenged] wiretap orders. This would appear
    to end this part of our inquiry.
    Scurry, 821 F.3d at 8–9.
    In sum, the majority’s definitional sleight of hand cannot cover up its flawed logic:
    there simply is not enough information on the face of these orders to sufficiently ascertain
    the “identity” of the specific official at the Department of Justice who authorized the
    applications. The majority can claim that the orders provided enough of a description to
    “lead to but one person” only by reference to the applications. See Maj. Op. at 13
    (reasoning that because the orders referred to the official “who signed off on the
    29
    application,” and “the specific official who authorized the application was readily
    obtainable from that application,” the orders were facially sufficient). In other words, this
    is but a variation of the Government’s incorporation by reference theory. It fails for the
    same reasons. An order cannot be sufficient on its face by reference to an external
    document.
    The other problem with the majority’s analysis is its suggestion that the
    Government’s substantial compliance with the core concerns of the statute is relevant to
    the inquiry concerning whether the orders are sufficient on their face. For example, the
    majority explains that the wiretap orders were sufficient in part because “the applications
    were in fact appropriately authorized,” id. at 3, and the orders were not defective because
    “[e]ach application was in fact appropriately approved” and “both the court issuing the
    wiretap orders and later Brunson had actual knowledge of the name of each authorizing
    official,” id. at 15. But, as the Government has recognized, the Supreme Court in Dahda
    explicitly rejected an approach that assesses facial sufficiency by reference to whether the
    Government has substantially complied with Title III; instead, Dahda directs courts to
    determine whether, on its face, a wiretap order contains the information required by
    § 2518(4). See Dahda, 
    138 S. Ct. at 1498
    . 6
    Dahda’s explicit disavowal of the core concerns test in determining facial
    sufficiency under subparagraph (ii) was no anomaly. It has been the Supreme Court’s
    6
    The Government conceded at oral argument that, after Dahda, “substantial
    compliance” could not cure a facially insufficient warrant, as Dahda explicitly rejected
    applying a “core concerns” test in the context of 2518(10)(a)(ii). Oral Arg. at 23:30–23:50.
    30
    consistent position for more than forty years that each of the three subparagraphs requiring
    suppression under § 2518(10)(a) must be given independent effect. See Dahda, 
    138 S. Ct. at 1498
     (“The underlying point of Giordano’s limitation was to help give independent
    meaning to each of § 2518(10)(a)’s subparagraphs. It thus makes little sense to extend the
    core concerns test to subparagraph (ii) . . . .”); Giordano, 
    416 U.S. at 527
     (“[I]t does appear
    that paragraphs (ii) and (iii) must be deemed to provide suppression for failure to observe
    some statutory requirements that would not render interceptions unlawful under paragraph
    (i).”). Dahda’s embrace of a mechanical test when assessing facial sufficiency under
    subparagraph (ii) is necessary to give independent meaning to each of § 2518(10)(a)’s three
    bases for suppression. In stating that the orders here are facially sufficient in part because
    they were in fact appropriately authorized, the majority has conflated errors under
    subparagraph (i) with errors under subparagraph (ii). 7        Consequently, the majority’s
    analysis will sow unnecessary confusion among district courts and litigants alike.
    7
    Resisting the conclusion that Dahda resolves this case, the majority maintains that
    the failure of the orders to contain the names of the authorizing officers is merely a
    technical defect, and Dahda “did not address the consequence of a technical defect that
    might arise by a failure to comply precisely with § 2518(4).” Maj. Op. at 10. Dahda did
    leave open the question of how broadly lower courts should construe the class of errors
    that result in facial insufficiency. 
    138 S. Ct. at 1498
    . But the error here is squarely
    controlled by the Dahda Court’s explicit reasoning. See 
    id.
     (“It is clear that subparagraph
    (ii) covers at least an order’s failure to include information that § 2518(4) specifically
    requires the order to contain.” (emphasis added)). The Court’s unambiguous language thus
    forecloses the argument that the kind of error here — the omission of the identity of the
    authorizing official, which is one of the pieces of information that § 2518(4) requires —
    can ever result in a facially sufficient order. In short, the majority’s supposition that this
    type of error was unresolved in Dahda is baseless.
    31
    III.
    Perhaps recognizing the logical contortions required of its holding, the majority (in
    what is plainly dicta) also adopts the Government’s alternative argument that we should
    apply the good faith exception set forth in United States v. Leon, 
    468 U.S. 897
     (1984).
    Invocation of Leon in the Title III context is misguided. The exception is relevant in cases
    of constitutional suppression; it is a judicially created exception to a judicially created
    remedy to protect a constitutional right.      See 
    id. at 906
    .     This, however, is not a
    constitutional case; the statute controls, and the statute does not provide a good faith
    exception. Cf. Giordano, 
    416 U.S. at 524
     (“The issue [of suppression] does not turn on the
    judicially fashioned exclusionary rule aimed at deterring violations of Fourth Amendment
    rights, but upon the provisions of Title III . . . .”). Rather, the statute directs a court to
    suppress orders that are “insufficient on [their] face.”       
    18 U.S.C. § 2518
    (10)(a)(ii).
    Accordingly, as the Government itself acknowledged at oral argument, the Supreme Court
    has never imported the good faith exception into Title III. Oral Arg. at 28:26–28:34.
    In opining to the contrary, the majority relies in part on its observation that, with
    respect to Title III, Congress legislated “against the backdrop of analogous Fourth
    Amendment jurisprudence” and that Congress intended the suppression remedy to “largely
    reflect[] existing law.” Maj. Op. at 16. This is uncontroversial — as far as it goes. But
    Congress enacted Title III almost twenty years before the Supreme Court issued Leon.
    Thus, in so legislating, Congress could hardly have intended Title III to reflect the Leon
    rule that did not yet exist. See United States v. Rice, 
    478 F.3d 704
    , 713 (6th Cir. 2007)
    32
    (“Congress obviously could not know that Fourth Amendment search and seizure law
    would embrace a good-faith exception sixteen years after the passage of Title III, and the
    language from the Senate Report indicates a desire to incorporate only the search and
    seizure law that was in place at the time of the passage of Title III.”). Nor has Congress
    subsequently amended Title III to provide for such an exception.
    The majority also leans on Leon’s policy rationales to support its conclusion that we
    should import Leon into the Title III context. The majority believes it is unfair to law
    enforcement to “confer[] an unearned benefit on a guilty defendant” for a mistake made in
    good faith. Maj. Op. at 16. Importing this reasoning is into Title III is a fundamentally
    flawed exercise. Whether to “confer[]” such a “benefit” is not a choice that we are free to
    make. The decision whether to suppress evidence, and in what circumstances, constitute
    policy judgments already expressly made by Congress. We do not have the authority to
    disregard those judgments. See Nickey Gregory Co., LLC v. AgriCap, LLC, 
    597 F.3d 591
    ,
    608 (4th Cir. 2010) (Niemeyer, J.) (“The judiciary, however, should not insert itself in these
    policy matters by questioning or debating legislative judgments, as it is constituted only to
    comprehend, interpret, and apply what Congress has duly provided.”).
    IV.
    The Government’s last refuge, an argument that the majority does not adopt, is that,
    if suppression is warranted and the good-faith exception does not apply, any error was
    harmless because of the “overwhelming, independent” non-wiretap evidence against
    33
    Brunson. Supp. Br. at 9. Assuming harmless error applies, 8 however, examination of the
    trial record renders laughable the Government’s contention that “the intercepted wire
    communications were a small part of the [G]overnment’s overall case.” Supp. Br. at 22.
    In fact, the record reveals that the intercepted calls were unquestionably the linchpin
    of the Government’s case. The calls were repeatedly played for the jury and were discussed
    throughout the trial by the Government and its witnesses (including Greenan, Wright,
    Ravenel, Gates, and Davis). See, e.g., JA 88–91 (FBI agent testifying about contents of
    wiretaps), 94–95 (same); JA 96 (intercepted wiretap audio recording played for the jury),
    97 (same), 99 (same), 102 (same), 233 (same), 234 (same), 248 (same), 256 (same), 259
    (same), 262 (same), 264 (same), 266 (same), 270 (same), 271 (same), 273 (same), 280
    (same), 284 (same), 285 (same), 288 (same), 290 (same), 291 (same), 406 (same), 427
    (same), 467 (same), 511 (same). Given the Government’s repeated use of and reference to
    8
    Some out-of-circuit precedent suggests harmless error applies in the Title III
    context. See, e.g., United States v. Quintero, 
    38 F.3d 1317
    , 1331 (3d Cir. 1994). We have
    previously declined to apply harmless error to a Title III case but have never squarely
    determined whether it would be appropriate to do so. See United States v. Crabtree, 
    565 F.3d 887
    , 892 (4th Cir. 2009). However, the conclusion that a harmless error analysis is
    appropriate is neither obvious nor compelled by controlling authority. Federal Rule of
    Criminal Procedure 52(a) generally requires courts to apply harmless error to all trial
    errors. See Neder v. United States, 
    527 U.S. 1
    , 7 (1999). See generally Kotteakos v. United
    States, 
    328 U.S. 750
    , 760–65 (1946). But Rule 52(a) is a congressional command that can
    be overridden by statute. In Zedner v. United States, 
    547 U.S. 489
     (2006), the Court
    rejected the Government’s argument that harmless error applied in the Speedy Trial Act
    context. 
    Id.
     at 507–09. The critical test, according to the Court, was Congress’s intent,
    shown in part through that statute’s “detailed requirements . . . regulating ends-of-justice
    continuances.” 
    Id. at 508
    . Of course, the Speedy Trial Act is not Title III. I assume
    harmless error applies here, as Brunson appears to have conceded the point, but I note that,
    following Zedner, there is at least a colorable argument as to whether harmless error has
    been displaced by Title III’s detailed requirements governing suppression.
    34
    these tapes throughout the trial, it is impossible to conclude that discussing and playing
    these incriminating audio recordings did not substantially influence the jury’s view of
    Brunson’s culpability. This certainly is sufficient to conclude that the error was not
    harmless. See Kotteakos v. United States, 
    328 U.S. 750
    , 765 (1946) (“The inquiry cannot
    be merely whether there was enough [evidence] to support the result, apart from the phase
    affected by the error. It is rather, even so, whether the error itself had substantial influence.
    If so, or if one is left in grave doubt, the conviction cannot stand.”).
    V.
    For the foregoing reasons, I respectfully dissent. 9
    9
    Because I believe Brunson’s conviction should ultimately be vacated on the count
    related to his First Step Act motion, I do not address that claim.
    35
    

Document Info

Docket Number: 18-4696

Filed Date: 7/31/2020

Precedential Status: Precedential

Modified Date: 9/22/2020

Authorities (20)

United States v. Giordano , 94 S. Ct. 1820 ( 1974 )

Bradley v. School Bd. of Richmond , 94 S. Ct. 2006 ( 1974 )

United States v. Donovan , 97 S. Ct. 658 ( 1977 )

Nickey Gregory Co., LLC v. AGRICAP, LLC , 597 F.3d 591 ( 2010 )

United States v. Betty Erdman, United States of America v. ... , 515 F.2d 290 ( 1975 )

Dahda v. United States , 200 L. Ed. 2d 842 ( 2018 )

Kotteakos v. United States , 66 S. Ct. 1239 ( 1946 )

Neder v. United States , 119 S. Ct. 1827 ( 1999 )

united-states-v-reginald-shantez-rice-jose-alberto-jimenez-huerta-german , 478 F.3d 704 ( 2007 )

United States v. Leon , 104 S. Ct. 3405 ( 1984 )

United States v. John Joseph, Bryan Roberts, Milton Kothman,... , 519 F.2d 1068 ( 1975 )

united-states-v-melba-quintero-in-93-1377-maria-rodriguez-in-93-1386 , 38 F.3d 1317 ( 1994 )

United States v. Gray , 521 F.3d 514 ( 2008 )

United States v. Aja E. Fudge, Lamont C. Gordon, Edward L. ... , 325 F.3d 910 ( 2003 )

United States v. Radcliff , 331 F.3d 1153 ( 2003 )

United States v. Crabtree , 565 F.3d 887 ( 2009 )

United States v. Kelly Ann Clark , 110 F.3d 15 ( 1997 )

united-states-v-garland-callum-united-states-of-america-v-steven-ray , 410 F.3d 571 ( 2005 )

united-states-v-stephen-traitz-jr-appeal-of-stephen-traitz-jr-in-no , 871 F.2d 368 ( 1989 )

United States v. Barry Hoffman , 832 F.2d 1299 ( 1987 )

View All Authorities »