United States v. James Jackson ( 2021 )


Menu:
  •                    NOT RECOMMENDED FOR PUBLICATION
    File Name: 21a0259n.06
    Case No. 20-6131
    UNITED STATES COURT OF APPEALS
    FOR THE SIXTH CIRCUIT
    FILED
    May 27, 2021
    UNITED STATES OF AMERICA,                       )                   DEBORAH S. HUNT, Clerk
    )
    Plaintiff-Appellee,                       )       ON APPEAL FROM THE
    )       UNITED STATES DISTRICT
    v.                                              )       COURT FOR THE EASTERN
    )       DISTRICT OF TENNESSEE
    JAMES JACKSON,                                  )
    )
    Defendant-Appellant.                      )                       OPINION
    )
    BEFORE:      NORRIS, KETHLEDGE, and NALBANDIAN, Circuit Judges
    NALBANDIAN, Circuit Judge. The best that he could, James Jackson turned
    the evidence of his crimes into a pile of ashes. But the evidence that remained was
    enough to convince a jury that Jackson ran an elaborate scheme of impersonating
    deceased victims and then stealing their identities and savings. On appeal, he argues
    that the evidence was insufficient for the convictions. He also challenges his sentence
    as unreasonable. We AFFIRM the verdicts and the sentence.
    BACKGROUND
    In late 2014 and early 2015, investigators caught on to an identity theft and
    mail fraud scheme in Tennessee involving fraudulent charges on accounts of recently
    No. 20-6131, United States v. Jackson
    deceased persons.1 The eventual indictment focused on six victims: Robert and Kim
    Howe, Thomas Fitzgibbon, Peggye McNair, Charles Fulks, and Michael Almeida.
    Kim Howe died in February 2015, predeceased by her husband Robert. After
    her death, someone claiming to be Robert called Fidelity Investments, had the Howe’s
    account address changed to a vacant house on Cameron Ridge Trail in Cordova,
    Tennessee, and liquidated $350,000 in stocks. After Peggye McNair died in January
    2015, someone accessed her Amex account and had cards sent to the same vacant
    Cameron Ridge address. They charged over $13,700 to her account. Eugenie Almeida
    reported fraudulent charges on her deceased husband’s debit card to the police, who
    discovered that a recently issued card in Michael Almeida’s name had been used for
    cash withdrawals at several Tennessee locations. Security footage showed a man
    later identified as Derrick Ford—a friend of James Jackson’s—using the card.2
    Yvonne Fitzgibbon likewise reported the theft of her late husband Thomas’ identity.
    Government agents intercepted mail addressed to Thomas headed to a vacant
    address on Waterdance Drive in a Memphis suburb, nowhere near where Thomas
    had lived. As the investigation continued, officers also flagged financial mail headed
    1 We state the facts in the light most favorable to the government, in keeping
    with the standard of review. United States v. Fisher, 
    648 F.3d 442
    , 450 (6th Cir. 2011).
    2 Ford also visited a La Quinta Inn in Memphis with a fake ID and tried to
    retrieve mail from Capital One addressed to Robert Matthews. He arrived in a white
    Mercedes SUV driven by someone else who was not visible in the security footage.
    The desk clerk rebuffed his attempt to retrieve the mail after his card was flagged,
    and he left.
    -2-
    No. 20-6131, United States v. Jackson
    to the vacant Waterdance and Cameron Ridge addresses for several more identity
    theft victims in addition to Robert and Kim Howe and Peggye McNair.
    Investigators zeroed in on the culprit when they put a hold on mail headed to
    the vacant houses, which included a Capital One card for Charles Fulks en route to
    Waterdance Drive. Less than a month after Fulks’ death, someone claiming to be him
    called the post office to ask about the mail.3 Officers planned to arrest him when he
    came to pick up the mail, but he later called back and asked the post office to deliver
    it to the vacant Cameron Ridge house. So they moved the operation to Cameron
    Ridge, delivered the mail, and waited. Around ten o’clock that night, a man in a
    bathrobe emerged from Jackson’s house across the street, walked to the vacant
    Cameron Ridge house’s mailbox, took the mail addressed to Fulks, and returned to
    Jackson’s house.
    Officers approached Jackson’s home and knocked on the door, but Jackson
    didn’t answer. They knocked louder and announced themselves as police, but there
    was no sign of Jackson. After almost an hour, two of the officers finally left to get a
    search warrant. While they were gone, the remaining officers saw smoke begin to
    billow from the house as an orange glow flickered inside. As smoke filled the house,
    Jackson’s girlfriend—Michelle Jones—leaned out a second-floor window and told the
    officers that she and her three children were inside and were having trouble
    breathing. Jones wanted to leave the house through the front door, but Jackson told
    3   At trial, Jones identified caller as Jackson.
    -3-
    No. 20-6131, United States v. Jackson
    her not to. Officers dissuaded her from jumping out the window and persuaded her—
    contrary to Jackson’s instructions—to open the front door and leave. The officers then
    entered, brought Jackson out of the home, and gave him oxygen.
    Inside the smoke-filled house, investigators found ashes in buckets, kitchen
    pots, the fireplace, and the toilets. The unburned evidence included an ID and social
    security card for someone named Michael Carter, a print-off of search results listing
    websites for finding personal information, a book called “How to Find Anyone or
    Anything: It’s A Lot Easier Than You Think,” and a legal pad with social security
    numbers and other personal identifying information (“PII”) belonging to celebrities.
    They also found a Forbes articled called “How to Ruin a Spouse’s Credit Legally and
    Keep Them Broke for Dear Life,” a laminator, a partly burned document with part of
    a social security number, three computers, two cheap burner phones, and a shredder
    containing an envelope for Amanda Montgomery.4 Police never located a bathrobe.
    Investigators also searched Jackson’s mother’s house, where they found Jackson’s
    business cards. He branded himself as “The Father of Identity Theft” and an “Identity
    Theft Expert.”
    Officers ran forensic analysis on the computers from Jackson’s bedroom, which
    revealed searches on Legacy.com (a source for obituaries), Intelius, BeenVerified,
    PeopleFinder, Credit Karma, Ancestry.com, 411.com, and LinkedIn. Many victims
    starred in Jackson’s search history, including Charles Fulks, the Almeidas, Thomas
    4Jackson also had at the house a yellow corvette, a black Mercedes, and a
    white Mercedes SUV resembling the one that dropped Ford off at the hotel.
    -4-
    No. 20-6131, United States v. Jackson
    Fitzgibbon, the Howes, Peggye McNair, and many others. Although the computer
    username logged for all these searches was “Michelle,” Jackson regularly used both
    computers.
    Along with the evidence above, the government showed at trial that many calls
    involved in the identity theft scheme were made using numbers ending in -1609—the
    number Jackson used to pose as Fulks in his calls to the post office—or -1935. The
    government traced most of these calls to a cell tower directly behind Jackson’s home
    on Cameron Ridge Trail, and Jackson’s girlfriend Michelle Jones identified him as
    the caller in several of the fraudulent calls when she testified against him at trial.
    Jackson was convicted of seven counts of mail fraud under 
    18 U.S.C. § 1341
    ;
    one count of aiding and abetting the use of unauthorized access devices under 
    18 U.S.C. §§ 2
    , 1029(a)(2); one count of possession of fifteen or more unauthorized access
    devices under 
    18 U.S.C. § 1029
    (a)(3); one count of mail theft under 
    18 U.S.C. § 1708
    ;
    and three counts of aggravated identity theft under 18 U.S.C. § 1028A(a)(1).5
    At sentencing, the district court applied several enhancements: fourteen levels
    because the intended loss exceeded $550,000, §2B1.1(b)(1)(H), two levels because
    there were more than ten victims involved, §2B1.1(b)(2)(A)(i), two levels because the
    scheme involved sophisticated means, §2b1.1(b)(10)(C), two levels because the
    scheme involved a conscious or reckless risk of death or serious bodily injury,
    §2B1.1(b)(16)(A), two levels because Jackson was an organizer, leader, manager, or
    5    Jackson’s co-defendant Derrick Ford pled guilty to using unauthorized access
    devices.
    -5-
    No. 20-6131, United States v. Jackson
    supervisor in criminal activity, §3B1.1(c), and two levels because Jackson willfully
    obstructed or impeded the administration of justice related to the investigation of his
    offense, §3C1.1. The district court sentenced Jackson to a within-guidelines sentence
    of 135 months plus 24 consecutive months for each count of aggravated identity theft,
    for a total of 207 months. 18 U.S.C. § 1028A(a)(1).
    Jackson now appeals his convictions and sentence, arguing that the evidence
    was insufficient to convict and his sentence was procedurally and substantively
    unreasonable.
    DISCUSSION
    I. Sufficiency of the Evidence
    We review a sufficiency-of-the-evidence challenge de novo and affirm if,
    “viewing the evidence in the light most favorable to the prosecution, any rational trier
    of fact could have found the essential elements of the crime beyond a reasonable
    doubt.” Fisher, 
    648 F.3d at 450
     (emphasis in original) (quoting Jackson v. Virginia,
    
    443 U.S. 307
    , 319 (1979)). We do not “reweigh the evidence, re-evaluate the credibility
    of witnesses, or substitute our judgment for that of the jury.” 
    Id.
     (quoting Brown v.
    Konteh, 
    567 F.3d 191
    , 205 (6th Cir. 2009)). “Substantial and competent
    circumstantial evidence by itself may support a verdict and need not remove every
    reasonable hypothesis except that of guilt.” United States v. Lee, 
    359 F.3d 412
    , 418
    (6th Cir. 2004) (quotation marks and citation removed). We view the evidence not “in
    a vacuum” but “in relation to the other evidence in the case.” Davis v. Lafler, 
    658 F.3d 525
    , 533 (6th Cir. 2011).
    -6-
    No. 20-6131, United States v. Jackson
    A. Mail Fraud and Mail Theft
    Jackson first argues that no reasonable jury could have found him guilty of
    mail fraud and mail theft. Mail fraud requires 1) “a scheme or artifice to defraud”; 2)
    “use of mails in furtherance of the scheme”; 3) “intent to deprive the victim of money
    or property”; and 4) material misrepresentation. United States v. McAuliffe, 
    490 F.3d 526
    , 531 (6th Cir. 2007); 
    18 U.S.C. § 1341
    . The elements of mail theft are that “(1) the
    defendant possessed material stolen from the mail; (2) knowing same to be stolen; (3)
    with intent to possess the material unlawfully.” United States v. Comer, 
    93 F.3d 1271
    ,
    1276 (6th Cir. 1996) (quotation marks and citation removed); 
    18 U.S.C. § 1708
    .
    Jackson does not dispute that the activity the government alleges meets these
    elements; he only argues that the government has not proven that he did what it
    alleges. So we focus on the ways he argues that the evidence is insufficient to tie him
    to the criminal acts. We find that the evidence presented at trial was enough for a
    rational jury to find him guilty on these counts.
    Jackson begins by arguing that officers never found any relevant mail, the
    distinctive robe that the mail thief wore, or the cell phones at issue in the Cameron
    Ridge Trail house. This argument lacks force because of the obvious reply that
    Jackson anticipates: the ashes in the house likely contained much of the physical
    evidence. The fragments of evidence that remained support this inference; the
    shredder in the house had an envelope to Amanda Montgomery—who formerly lived
    in the now-vacant Cameron Ridge house—and utility bills tying Jackson to the house
    filled with smoldering papers. Near the fireplace, officers also found burnt paper
    -7-
    No. 20-6131, United States v. Jackson
    fragments with part of a Social Security number and the issuing state. In Jackson’s
    bedroom, officers found a Tennessee ID card and Social Security card in Michael
    Carter’s name as well as a Georgia Motor Vehicle Department receipt and
    registration in Phillip Landis Burnett’s name. A rational jury could conclude that the
    reason the police did not find more evidence of identity theft in the house was that
    Jackson burned it. And a rational jury could infer from Jackson’s destruction of
    evidence that Jackson was conscious of his guilt. See Cyars v. Hofbauer, 
    383 F.3d 485
    ,
    492 (6th Cir. 2004) (holding that a reasonable jury could infer guilt from a collection
    of evidence that included “discard[ing] the murder weapon and drugs in a manner
    sufficient to prevent authorities from recovering the evidence”); United States v.
    Poulsen, 
    655 F.3d 492
    , 508 (6th Cir. 2011) (“Our courts admit ‘spoliation evidence,
    including evidence that a defendant attempted to bribe . . . a witness,’ because such
    spoliation evidence shows ‘consciousness of guilt.’”) (alteration in original) (quoting
    United States v. Mendez-Ortiz, 
    810 F.2d 76
    , 79 (6th Cir. 1986).
    Jackson’s suggestion that he was not the person who stole the last piece of mail
    and burnt all the evidence is equally unpersuasive. An officer testified that a black
    male walked from Jackson’s Cameron Ridge house to the vacant house’s mailbox, took
    the mail, and walked back. He identified the person as Jackson. And no other adult
    male was at the house that night. Jackson refused to answer the door as police
    knocked “very loudly” right after the mail theft. And he instructed Jones not to open
    the front door, even as the house filled with smoke. Afterward, he persuaded Jones
    to marry him, hoping that she would not have to testify against him if they were wed.
    -8-
    No. 20-6131, United States v. Jackson
    The jury could infer that Jackson stole the mail and then tried to destroy evidence of
    his guilt by burning incriminating materials.
    Jackson also argues that the government never tied him to any of the addresses
    where the stolen mail went. That’s not true. The transaction confirmation for the sale
    of the Howes’ stocks—although it was gone by the time the officer’s searched—went
    to the same vacant Cameron Ridge address from which Jackson stole the last piece
    of mail. The government also showed that some victims had mail sent to both the
    Waterdance address and to the Cameron Ridge address. A witness also testified that
    some of the victims’ mail went first to a Turco Drive address before switching to
    Waterdance. All three houses were vacant. A reasonable jury could infer that Jackson
    had used these addresses as drop locations for mail fraud and theft, and those
    addresses cover all but one of Jackson’s mail fraud victims.
    The jury heard other evidence from which it could conclude that Jackson was
    the perpetrator of the mail fraud, including recorded phone calls made to the victims’
    financial institutions. After hearing the tapes played in open court, Jones identified
    the caller in both fraudulent Almeida calls as Jackson. She also identified him as the
    voice on several other fraudulent calls. The government also showed that Jackson’s
    computer had logged many searches of the victims and their personal information,
    including searches for Eugenie Almeida’s birthday and information about Michael
    Almeida. Although the username logged for these searches was “Michelle,” the jury
    could conclude that the username did not reflect the person who ran the searches
    because it is not a verified record of who was using the computer at the time.
    -9-
    No. 20-6131, United States v. Jackson
    Jackson argues that the government never tied him to the phone number that
    called the Cordova Post Office about Fulks’s stolen mail. But the government
    presented evidence that many of the fraudulent calls, including those to the post
    office, came from an area that included Jackson’s home. And when the government
    played a recording of the Cordova Post Office call, Jones identified the caller as
    Jackson. Taken together, the evidence at trial was enough to allow a rational jury to
    conclude that Jackson did the acts that the government alleged.
    B. Aiding and Abetting Fraud in Connection with Access Devices
    The jury also convicted Jackson of aiding and abetting access device fraud
    which covers anyone who “knowingly and with intent to defraud traffics in or uses
    one or more unauthorized access devices during any one-year period, and by such
    conduct obtains anything of value aggregating $1,000 or more during that period.” 
    18 U.S.C. § 1029
    (a)(2). Access devices include cards, account numbers, or other means
    of account access, and an “unauthorized” access device is “any access device that is
    lost, stolen, expired, revoked, canceled, or obtained with intent to defraud.” 
    18 U.S.C. § 1029
    (e)(1), (e)(3). “As at common law, a person is liable under [18 U.S.C.] § 2 for
    aiding and abetting a crime if (and only if) he (1) takes an affirmative act in
    furtherance of that offense, (2) with the intent of facilitating the offense’s
    commission.” Rosemond v. United States, 
    572 U.S. 65
    , 71 (2014).
    This conviction stands if there is sufficient evidence for a rational jury to
    conclude that Jackson helped obtain and use credit cards with Derrick Ford. A police
    officer testified that he had photos of Derrick Ford using different victims’ credit
    - 10 -
    No. 20-6131, United States v. Jackson
    cards—including Michael Almeida’s—at Kroger. And as we detail above, the jury
    could reasonably conclude that Jackson was part of the mail fraud that involved
    getting a replacement debit card tied to the Almeidas’ account. Jackson and Ford
    stole $56,909.43 from the Almeidas. This fraud alone suffices to support the jury’s
    verdict on this count.
    C. Possession of At Least Fifteen Unauthorized Access Devices
    The jury convicted Jackson of violating 
    18 U.S.C. § 1029
    (a)(3) by “knowingly
    and with intent to defraud,” possessing at least fifteen “counterfeit or unauthorized
    access devices.” Jackson does not contest that social security numbers are access
    devices. See United States v. Wright, 
    862 F.3d 1265
    , 1275 (11th Cir. 2017); United
    States v. Gilmore, 431 F. App’x 428, 429 (6th Cir. 2011) (counting social security
    numbers among access devices). Instead, he argues that the government did not prove
    either his fraudulent intent or that he possessed the access devices at the same time.
    On the intent to defraud, the jury was free to conclude that Jackson had
    fraudulent intent based on “circumstantial evidence and by inferences drawn from
    examining the scheme itself.” United States v. Winkle, 
    477 F.3d 407
    , 413 (6th Cir.
    2007). Whether Jackson had the intent to defraud “is generally considered to be one
    of fact to be resolved by the trier of the facts and the determination thereof should
    not be lightly overturned.” 
    Id.
     (ellipses, quotation marks, and citation removed). The
    jury heard that officers recovered a yellow notepad filled with names and social
    security numbers in Jackson’s kitchen. They also found that Jackson was involved in
    identity theft with other people’s social security numbers and personal information.
    - 11 -
    No. 20-6131, United States v. Jackson
    The jury could reasonably conclude that Jackson possessed the social security
    numbers for fraudulent purposes. Jackson argues that his business card identifying
    him as an identity theft expert provided a better explanation for his possession of the
    social security numbers. Although this may seem like a plausible explanation to
    Jackson, it did not appear so to the jury. And the evidence taken in the light most
    favorable to the government supports their conclusion.
    Jackson’s other argument that he did not possess all the access devises at once
    has no merit. The statute does not require that all fifteen access devices be obtained
    at the same time. Jackson only had to possess all fifteen at one time, which he did—
    all on the same notepad.
    D. Aggravated Identity Theft
    Aggravated identity theft includes committing a predicate felony, which
    “during and in relation to” the defendant “knowingly transfers, possesses, or uses,
    without lawful authority, a means of identification of another person.” 18 U.S.C.
    § 1028A(a)(1). There are four elements: “(1) the defendant committed a specified
    predicate felony; (2) the defendant knowingly transferred, possessed, or used a means
    of identification of another person without lawful authority; (3) the defendant knew
    that the means of identification belonged to another person; and (4) the transfer,
    possession, or use was during and in relation to the predicate felony.” United States
    v. Gandy, 
    926 F.3d 248
    , 258 (6th Cir. 2019). Mail fraud is a predicate felony. 18 U.S.C.
    § 1028A(c)(5); 
    18 U.S.C. § 1341
    . The jury convicted Jackson of aggravated identity
    theft of the Almeida’s bank account and social security number; Peggye McNair’s
    - 12 -
    No. 20-6131, United States v. Jackson
    name, date of birth, mother’s maiden name, middle name, and name of bank for bill
    pay; and Robert Howe’s name, social security number, and brokerage account
    number.
    For the Almeidas, Jackson argues that the only evidence was that Ford used
    the debit card and that Jackson’s computer logged a search for Mrs. Almeida’s
    birthday. He admits that Jones identified the fraudulent Almeida caller as Jackson,
    but he urges that the jury should not have believed her because she was biased. But
    Jones’ credibility was a question for the jury, not for us to second-guess on appeal.
    “[A]ttacks on witness credibility are simply challenges to the quality of the
    government’s evidence and not to the sufficiency of the evidence.” United States v.
    Carter, 
    355 F.3d 920
    , 925 (6th Cir. 2004) (emphasis in original) (quotation marks and
    citation removed). For this reason and the reasons we have already discussed, this
    argument lacks merit.
    For Peggye McNair, Jackson argues that the evidence was insufficient because
    no evidence linked Jackson to the vacant Cameron Ridge address, the computer
    searches for McNair’s personal information, or the phone number used for fraudulent
    calls in McNair’s name. Each of these arguments is meritless. An officer testified that
    he saw Jackson steal mail from the vacant Cameron Ridge address. Jackson had
    access to the computer that made the searches, and Jones testified that he used the
    computers in his bedroom home office. And the phone number that made the
    fraudulent calls also had ties to the cell tower immediately adjacent Jackson’s home.
    - 13 -
    No. 20-6131, United States v. Jackson
    Jackson’s claim that no evidence supports this conviction ignores much of the trial
    record.
    Finally, for Robert Howe, Jackson repeats that the mail addressed to the
    vacant Cameron Ridge address is irrelevant because Jackson has no ties to that
    address, and he again argues that no mail addressed to any victims was found in
    Jackson’s (ash-filled) home. He also repeats that the computer searches and the
    phone calls coming from the area immediately around his house were not persuasive
    evidence. We need not repeat the responses to these arguments. The record does not,
    as Jackson asserts, show a case “devoid of evidence” of Jackson’s guilt. (Appellant’s
    Br. at 44.) Instead, it shows evidence that a reasonable jury could weigh in
    determining that Jackson committed the crimes charged beyond a reasonable doubt.
    Disagreement with how the jury weighed the evidence is different from having a
    record devoid of evidence.
    In sum, the evidence taken in the light most favorable to the government would
    allow a jury to convict Jackson on all counts. We affirm the convictions.
    II. Sentence Enhancements
    While Jackson presents his next claims as challenging both the procedural and
    substantive reasonableness of his sentence, his arguments go only to whether the
    district court correctly applied sentencing enhancements. Misinterpretation of a
    guideline would yield a procedurally unreasonable sentence. United States v.
    Riccardi, 
    989 F.3d 476
    , 481 (6th Cir. 2021). We “accept the findings of fact of the
    district court unless they are clearly erroneous” and generally “give due deference to
    - 14 -
    No. 20-6131, United States v. Jackson
    the district court’s application of the guidelines to the facts.” 
    18 U.S.C. § 3742
    (e);
    United States v. Abdalla, 
    972 F.3d 838
    , 850 (6th Cir. 2020), cert. denied, 
    141 S. Ct. 1250
     (2021).
    A. Loss Amount Enhancement
    Jackson claims that the district court unreasonably calculated the loss amount
    and wrongly applied the fourteen-level enhancement for loss over $550,000. On
    appeal, Jackson details his arguments against the enhancement in a table, where he
    points out amounts that he does not believe should have been included. We review
    the court’s determination of the amount of loss for clear error, but we review the
    method of calculating the loss and interpretation of the guidelines de novo. Riccardi,
    989 F.3d at 481.
    If we add together the amounts that Jackson does not dispute, he should still
    receive the fourteen-level enhancement. Of the twenty-six entries, Jackson marked
    eleven as having no issue. Those add up to $882,036.98—well above the $550,000
    threshold.6 U.S.S.G. § 2B1.1(b)(1)(H). By Jackson’s own estimate, the district court
    was not unreasonable in applying the fourteen-level enhancement.
    B. Number-of-Victims Enhancement
    The district court applied a two-level enhancement because Jackson’s crime
    involved ten or more victims. U.S.S.G. § 2B1.1(b)(2)(A)(i). Jackson argues that the
    government did not prove that there were at least ten victims because anyone who
    6 This includes the higher of the actual or intended loss listed on any line to
    which Jackson did not object, the lower of the two numbers if Jackson objected to the
    higher number, and no amounts from the lines that Jackson object to altogether.
    - 15 -
    No. 20-6131, United States v. Jackson
    was quickly reimbursed is not a “victim.” “Whether a person is a victim under the
    Sentencing Guidelines is a legal conclusion that appellate courts review de novo.”
    United States v. Stubblefield, 
    682 F.3d 502
    , 510 (6th Cir. 2012) (cleaned up).
    Victims include both those suffering “actual loss”—including “individuals,
    corporations, companies, associations, firms, partnerships, societies, and joint stock
    companies”—and “any individual whose means of identification was used unlawfully
    or without authority.” U.S.S.G. § 2B1.1(b)(2)(A)(i), cmt. n.1, n.4(E). Jackson only
    argues that some victims the district court factored in did not lose money. He does
    not dispute that the individuals the district court named were victims of the second
    kind, those whose means of identification Jackson used unlawfully: the Almeidas,
    Ballinger, Best, Dulin, Fulks, Fitzgibbon, Hill, the Howes, Hughes, Jackson, King,
    Lambert, McNair, Olschwanger, the Rudolphs, and Silva. Jackson victimized more
    than ten people.
    C. Sophisticated Means Enhancement
    The district court applied a two-level enhancement because Jackson’s scheme
    “involved sophisticated means.” U.S.S.G. 2B1.1(b)(10). The commentary adds that
    “especially complex or especially intricate offense conduct pertaining to the execution
    or concealment of an offense” invokes this enhancement, including “hiding assets or
    transactions, or both, through the use of fictitious entities, corporate shells, or
    offshore financial accounts.” Id. at cmt. n.9(B). This is a factual finding that we review
    for clear error. United States v. Igboba, 
    964 F.3d 501
    , 510 (6th Cir. 2020). Jackson
    argues that his scheme was not sophisticated because he only used the internet and
    - 16 -
    No. 20-6131, United States v. Jackson
    a telephone. We do not look at the elements of a scheme “in isolation”; we account for
    the strategy as a whole. United States v. Tandon, 
    111 F.3d 482
    , 491 (6th Cir. 1997).
    Jackson’s scheme was sophisticated. “[T]he repeated use of fictitious identities
    can justify a sophisticated means enhancement, particularly when the identity is
    reinforced through other deceptive practices . . . .” United States v. Crosgrove, 
    637 F.3d 646
    , 667 (6th Cir. 2011). Jackson used multiple mailing addresses—none of
    which were his own—to avoid detection. See Igboba, 964 F.3d at 512. Jackson used
    multiple websites to collect data on recently deceased victims so that he could contact
    the banks soon after the victims’ deaths. He also used multiple phone numbers to
    conceal his identity, and he impersonated his victims over the phone. The district
    court did not clearly err in finding that Jackson’s scheme was sophisticated.
    D. Leadership Enhancement
    The district court applied a two-level enhancement for being a “organizer,
    leader, manager, or supervisor” of criminal activity. U.S.S.G. § 3B1.1(c). We review
    this determination deferentially. United States v. Washington, 
    715 F.3d 975
    , 983 (6th
    Cir. 2013). Jackson argues that this enhancement was inappropriate because no
    evidence tied him to Ford’s fraudulent acts.
    Jackson again misstates the record. But because this argument is the same as
    his objection to the conviction for aiding and abetting fraud, we need not rehash the
    evidence we discussed above in Section I.B. The district court did not err in applying
    this enhancement.
    - 17 -
    No. 20-6131, United States v. Jackson
    E. Risk of Injury Enhancement
    The district court applied a two-level enhancement for involving “the conscious
    or reckless risk of death or serious bodily injury.” U.S.S.G. § 2B1.1(b)(16)(A).
    “Because the question of what constitutes endangerment is a mixed question of law
    and fact that is highly fact-based, we give significant deference to the district court.”
    United States v. Stafford, 
    721 F.3d 380
    , 401 (6th Cir. 2013) (cleaned up). Jackson
    argues that the enhancement was improper because he did not perceive the risk he
    was creating and because no serious bodily injury resulted from his action.
    Jackson’s argument that he did not realize a risk to the people inside the
    smoke-filled house rings hollow. Assuming that awareness of risk is necessary for
    recklessness, there is still enough evidence to conclude that Jackson knew he was
    creating a risk to Jones and the children. Jones testified that she told Jackson that
    she and the children needed to exit the smoke-filled house, and he responded by
    telling them to stay inside. And the district court noted that Jackson himself needed
    oxygen after exiting the house. His own experience of oxygen deprivation would have
    triggered an awareness that his actions were dangerous, even if he were
    astonishingly unaware of that fact when he began burning the papers. The district
    court did not err in applying this enhancement.
    F. Obstruction of Justice Enhancement
    Finally, the district court applied a two-step enhancement for obstruction of
    justice. U.S.S.G. § 3C1.1. For this enhancement, we review the district court’s factual
    determinations for clear error, its “determination that certain conduct constitutes
    - 18 -
    No. 20-6131, United States v. Jackson
    obstruction of justice” de novo, and “the application of the obstruction enhancement”
    de novo. United States v. Baggett, 
    342 F.3d 536
    , 540–41 (6th Cir. 2003). Jackson
    argues that this enhancement is improper because the government did not present
    enough evidence that the documents Jackson burnt were material evidence. We
    already addressed this argument in Section I.A. The jury could reasonably conclude
    that Jackson was burning evidence from the circumstances and from the fragments
    of evidence that remained, despite Jackson’s best efforts.
    CONCLUSION
    For these reasons, we AFFIRM the district court.
    - 19 -