United States v. Chandra Jenkins-Watts ( 2009 )


Menu:
  •                    United States Court of Appeals
    FOR THE EIGHTH CIRCUIT
    ___________
    No. 08-2287
    ___________
    United States of America,             *
    *
    Appellee,                 *
    *
    v.                              *
    *
    Chandra L. Jenkins-Watts,             *
    *
    Appellant.                *
    ___________
    Appeals from the United States
    No. 08-2291                  District Court for the
    ___________                   Western District of Missouri.
    United States of America,             *
    *
    Appellee,                 *
    *
    v.                              *
    *
    Tarik I. Liwaru,                      *
    *
    Appellant.                *
    ___________
    No. 08-2295
    ___________
    United States of America,             *
    *
    Appellee,                 *
    *
    v.                                *
    *
    Carlton P. Strother,                    *
    *
    Appellant.                 *
    ___________
    Submitted: May 13, 2009
    Filed: August 4, 2009
    ___________
    Before WOLLMAN, JOHN R. GIBSON, and MURPHY, Circuit Judges.
    ___________
    WOLLMAN, Circuit Judge.
    Carlton Strother, Tarik Liwaru, and Chandra Jenkins-Watts,1 along with thirteen
    co-defendants, were indicted for their involvement in an instant credit fraud scheme
    and a loan fraud scheme. Strother, Liwaru, and Jenkins were tried jointly and
    convicted of the charges against them. Strother and Liwaru were convicted of
    conspiracy to commit aggravated identity theft, in violation of 18 U.S.C. §§ 371,
    1028A, and 1029; Strother and Jenkins were convicted of conspiracy to commit
    identity theft and aggravated identity theft, in violation of 18 U.S.C. §§ 371, 1028,
    1028A, and 1029; and Strother was convicted of access device fraud, in violation of
    18 U.S.C. § 1029(a)(5).
    The appellants raise a number of issues. Strother and Liwaru challenge their
    sentences and the sufficiency of the evidence to support their convictions. Liwaru
    1
    Consistent with her appellate briefs, we will refer to Chandra Jenkins-Watts
    as Jenkins.
    -2-
    argues that the district court2 erred in submitting a demonstrative exhibit to the jury
    and in providing supplemental instructions to the jury’s questions. Jenkins contends
    that her speedy trial rights were violated, that the district court erred in denying her
    motions to sever and to suppress, that the indictment was defective, and that there was
    insufficient evidence to convict her of aggravated identity theft. We affirm.
    I. Background
    We state the facts in the light most favorable to the jury verdict. United States
    v. Johnson, 
    450 F.3d 366
    , 369 (8th Cir. 2006).
    A. Instant Credit Fraud Scheme
    The instant credit fraud scheme in this case involved the use by Strother and his
    associates of counterfeit Kansas driver’s licenses to apply for instant credit,
    purchasing big-ticket items, and reselling them for about half their retail value. The
    resale proceeds usually would be split between Strother, who was providing the
    counterfeit identification, and the associate who utilized the instant credit.
    Strother chose identity theft victims based on their credit scores. He received
    credit reports from coconspirators, including Liwaru, who acquired the reports from
    legitimate businesses. A victim testified that he had refinanced his mortgage with
    Hearthside Lending before his identity was stolen, and the parties stipulated that the
    victims had applied for credit at either Hearthside Lending or an auto dealership
    before their identities were stolen. Coconspirator Michelle Williams testified that she
    witnessed Liwaru bring boxes of credit reports to Strother on two or three occasions
    and that those reports came from a mortgage company called “Heartland Mortgage.”
    2
    The Honorable Ortrie D. Smith, United States District Judge for the Western
    District of Missouri.
    -3-
    Strother and his associates would review the credit reports, setting aside the ones with
    a credit score of around 700. Williams stated that she would look for women with
    good credit scores who were approximately her age.
    Strother supplied the counterfeit Kansas driver’s licenses to the coconspirators.
    To create them, Strother would take a digital photograph of the person assuming the
    counterfeit identification or one would be given to him. Strother would then leave and
    return shortly thereafter with a counterfeit Kansas driver’s license, complete with the
    identity theft victim’s information, the coconspirator’s picture, and, in some cases, the
    holographic seal of Kansas. Toni Baker, a woman who had been involved in earlier
    identity theft schemes with Strother, testified that she had observed him making the
    counterfeit licenses. According to Baker, Strother would go to a friend’s house and
    create the licenses on the computer. Several witnesses attested to the quality of
    Strother’s work. For example, he made several counterfeit licenses for Williams, none
    of which were detected as fraudulent, even though she used them dozens of times.
    The coconspirators, and sometimes Strother himself, would travel to retailers
    throughout the lower Midwest to open instant credit accounts.3 After the retailer
    approved the instant credit, the shopper would spend the entire amount for which she
    or he was approved. Strother often had buyers lined up to purchase the stolen goods,
    and he frequently told the shoppers which items to purchase.
    In September 2005, a coconspirator was arrested at a Sam’s Club in Lenexa,
    Kansas, after attempting to open an instant credit account. Employees indicated that
    he had arrived in a blue Crown Victoria, which a responding officer saw leaving the
    parking lot. The officer stopped the vehicle, and the driver identified himself as
    3
    Several retailers offer instant credit, a practice that allows consumers to
    purchase items on credit immediately after their applications are approved.
    -4-
    Liwaru. He said he was coming from a friend’s house, but he could not remember the
    friend’s name or address.
    Law enforcement officers established video surveillance of Strother’s residence
    in January or February 2006 and tapped Strother’s phone in March 2006. In April
    2006, Liwaru called Strother to inform him that a coconspirator was arrested in
    Topeka, Kansas, to which Strother replied that he needed “to clean up house.”
    B. Loan Fraud Scheme
    In late 2004, Miles Thomas and Maurice Ragland recruited Stephen Edenfield
    and his girlfriend to join them in a mortgage fraud conspiracy. Thomas testified that
    he purchased counterfeit driver’s licenses in the names of Mr. and Mrs. Doe4 from
    Bryant Griffin-Bey, who served as the middleman between Thomas and Strother.
    Edenfield and his girlfriend then posed as the Does, applying for mortgage loans and
    appearing at real estate closings. The scheme was successful, and some of the loan
    proceeds were wired to a fraudulent bank account that Edenfield had opened. In early
    2006, Edenfield, Thomas, and Ragland discussed continuing the scheme in Dallas,
    Texas, but the plan was delayed when Edenfield was arrested in February 2006.
    After Edenfield’s arrest, Ragland, Thomas, and Ryan Miller revised the
    conspiracy, deciding to pursue business loans or lines of credit in Dallas. They chose
    Dallas because Jenkins, Ragland’s then-girlfriend, worked there as a business
    specialist at a bank, handling small business activity such as opening accounts and
    processing loans. Jenkins could serve as their inside connection and assist them with
    processing the fraudulent transactions.
    4
    We will refer to the mortgage fraud identity theft victims as the Does.
    -5-
    Ragland, Miller, Thomas, and Jenkins met at a casino in Kansas City to discuss
    the scheme. The plan involved acquiring the identity of an individual with a good
    credit score, finding someone to pose as that individual, purchasing a counterfeit
    identification card, registering a business, opening an account at the bank where
    Jenkins worked, and applying for credit and loans for the registered business. Miller
    announced that they would use the identity of Jane Doe5 and provided her social
    security number and birth date to Thomas.
    Thomas gave the information to a friend who worked at a mortgage company
    and asked her to pull Jane Doe’s credit report, which she did. The friend gave the
    report to Thomas, who in turn, gave it to Ragland, who said that he would fax it to
    Jenkins.
    A woman, unnamed at trial, originally agreed to pose as Jane Doe, and Thomas
    purchased a counterfeit identification from Griffin-Bey. After the unnamed woman
    withdrew, Miller and Ragland persuaded Sheri Zuber to join the scheme, and Thomas
    purchased a second identification from Griffin-Bey. Griffin-Bey knew that Thomas
    had been involved in fraudulent real estate transactions, but Thomas told Griffin-Bey
    that he was going to use the Jane Doe identification to pass checks, so Griffin-Bey
    charged him less than usual: $500 for the first license, $250 for the second license.
    Griffin-Bey brought the women’s digital photos to Strother, who created the
    counterfeit Kansas driver’s licenses, charging Griffin-Bey $250-300 for the first
    license, half that for the second. The Secret Service was monitoring Strother at the
    time and searching his trash. On March 29, 2006, an agent found photo paper with
    the images of two Kansas driver’s licenses, both displaying the identity information
    of Jane Doe.
    5
    We will refer to the loan fraud identity theft victim as Jane Doe.
    -6-
    Miller, Thomas, and Zuber drove overnight to Dallas, arriving on March 24,
    2006. They purchased a post office box in Jane Doe’s name and registered a business
    named Brooke Investments. They then drove to the bank where Jenkins worked.
    Zuber entered the bank alone, armed with Jane Doe’s identification and paperwork
    regarding Brooke Investments. Zuber asked to speak to Jenkins and gave Jenkins the
    paperwork.
    Jenkins submitted four loan applications over the course of fifty minutes. The
    first was an application for Brooke Investments, a Plano, Texas, construction company
    listed as having a gross annual revenue of $650,000. Shortly thereafter, Jenkins
    submitted an application for Brooke Agency, a Shawnee, Kansas, consulting business
    with a gross annual revenue of $300,000. Jenkins submitted a third loan application
    under the name Brooke Investments and a fourth under Brooke Agency. The
    applications requested business loans, lines of credit, and credit cards.
    After the bank learned that Jenkins was the subject of a federal criminal
    investigation, an investigator from the company interviewed her. Jenkins admitted
    that she suspected the customer identifying herself as Jane Doe was a straw buyer.
    The investigator searched Jenkins’s workspace and found a credit report for Jane Doe,
    which had been faxed to Jenkins on March 3, 2006. A business specialist would not
    have had access to credit reports, and the investigator interviewed Jenkins for a second
    time to ask her about the report. Jenkins said she did not remember receiving the fax
    and had no explanation for why it was in her workspace. Before terminating the
    interview, Jenkins told the investigator that she made up the business name Brooke
    Agency and had altered the dates of establishment of the business in an attempt to get
    the loans approved.
    C. Procedural Background
    The government charged sixteen defendants in a thirty-seven count superseding
    indictment on August 9, 2006. The conduct charged in the indictment included both
    -7-
    the instant credit and loan fraud schemes. Some of the defendants had not previously
    been charged, and the district court granted several trial continuances, one of which
    was requested by the government. The district court denied Jenkins’s motions to
    dismiss, to sever, and to suppress evidence.
    Strother, Liwaru, and Jenkins exercised their right to a jury trial, which
    commenced on October 22, 2007. The government presented substantial evidence of
    both the instant credit and loan fraud schemes over the course of the five-day trial,
    including the testimony of several coconspirators, identity theft victims, and law
    enforcement officials. After the close of the government’s evidence and again after
    the close of all evidence, Liwaru moved for a judgment of acquittal. The district court
    denied the motions, and the case was submitted to the jury.
    During the deliberations, the jury submitted a note requesting Exhibit 29A, a
    poster board showing Liwaru’s photo at the top of the “Hearthside Lending” scheme.
    There was some discussion about whether the exhibit was demonstrative or whether
    it had been admitted. The district court referred to its notes and determined that, “it
    was offered and admitted and unless everyone is in agreement that it was admitted
    only for demonstrative purposes, with the understanding that it wouldn’t be provided
    to the jury if requested, I’m going to send it back.” Exhibit 29A was then delivered
    to the jury without objection.
    The jury sent two notes concerning Liwaru and his connection to Hearthside
    Lending. The first asked, “[C]an we verify employment of Tarik Liwaru with
    Hearthside as a fact?” Liwaru’s attorney agreed with the district court’s response that
    “there’s no evidence that responds to the question,” and the jury was instructed “there
    was no evidence admitted which responds to your question.” The second note stated
    that “there seems to be no specific evidence admitted that Tarik Liwaru was employed
    at Hearthside however since no one, including Mr. Tarik Liwaru’s attorney, disputed
    the reference to his employment at Hearthside, can we, using our common sense,
    -8-
    assume that he was, in fact, an employee of Hearthside?” After some discussion, the
    district court responded, “You must rely on your collective memory of the evidence
    and the instructions. Beyond that I am unable to respond. You may use your common
    sense however you should not guess or speculate.” None of the defendants objected
    to this response.
    Following the jury’s verdicts against Strother, Liwaru, and Jenkins on all of the
    charges against them, the district court sentenced the defendants and denied Jenkins’s
    motion for dismissal based on the insufficiency of the indictment. This appeal
    followed.
    II. Carlton Strother
    Strother was convicted of two counts of conspiracy, thirteen counts of
    aggravated identity theft, and ten counts of access device fraud, in violation of 18
    U.S.C. §§ 371, 1028A, and 1029. He was sentenced to 234 months’ imprisonment.
    On appeal, he argues that the evidence was insufficient to support his conviction on
    the conspiracy count related to the loan fraud scheme and that the district court erred
    in enhancing his sentence under several sections in the United States Sentencing
    Guidelines (Guidelines or U.S.S.G.).
    A. Evidence Was Sufficient To Convict Strother of the Loan Fraud Conspiracy.
    Strother contends that the evidence was insufficient to convict him of the loan
    fraud conspiracy because he did not knowingly form an agreement to commit such
    fraud. We review the sufficiency of the evidence de novo. 
    Johnson, 450 F.3d at 372
    .
    “[W]e will affirm if the record, viewed most favorably to the government, contains
    substantial evidence supporting the jury’s verdict, which means evidence sufficient
    to prove the elements of the crime beyond a reasonable doubt.” United States v.
    Lopez, 
    443 F.3d 1026
    , 1030 (8th Cir. 2006) (en banc).
    -9-
    To convict a defendant of conspiracy, the government must prove that there was
    an agreement to achieve an illegal purpose, that the defendant knew of the agreement,
    and that the defendant knowingly became part of that agreement. United States v.
    McAdory, 
    501 F.3d 868
    , 871 (8th Cir. 2007). “[A] defendant may be convicted for
    even a minor role in a conspiracy, so long as the government proves beyond a
    reasonable doubt that he or she was a member of the conspiracy.” 
    Lopez, 443 F.3d at 1030
    . Moreover, “each member of a conspiracy may be held criminally liable for
    any substantive crime committed by a co-conspirator in the course and in furtherance
    of the conspiracy, even though those members did not participate or agree to the
    specific criminal act.” United States v. Hayes, 
    391 F.3d 958
    , 962 (8th Cir. 2004)
    (quoting United States v. Navarrete-Barron, 
    192 F.3d 786
    , 792 (8th Cir. 1999)); see
    also Pinkerton v. United States, 
    328 U.S. 640
    , 647 (1946). “A conspiracy may be
    proved by direct or circumstantial evidence.” United States v. Alama, 
    486 F.3d 1062
    ,
    1064 (8th Cir. 2007).
    We conclude that the evidence was sufficient to support Strother’s conviction.
    Griffin-Bey testified that he purchased counterfeit licenses from Strother to resell to
    Thomas, including two in Jane Doe’s name. After the first woman backed out of
    Thomas’s plan, Griffin-Bey and Strother agreed to charge Thomas half price for the
    second license. Although there was no evidence that Strother knew the details of the
    loan fraud scheme or all of the coconspirators’ identities, he was well aware that the
    counterfeit identifications he produced would be used to engage in illegal financial
    transactions. Because the government proved each element of conspiracy, we affirm
    Strother’s conviction.
    B. The Sentence Enhancements Imposed by the District Court Were Appropriate.
    We review the district court’s interpretation and application of the guidelines
    de novo and its findings of fact for clear error. United States v. Icaza, 
    492 F.3d 967
    ,
    969 (8th Cir. 2007). The district court concluded that Strother’s total offense level
    -10-
    was thirty-four and that his criminal history level was two, resulting in a Guidelines
    sentencing range between 168 and 210 months’ imprisonment. After adding a
    consecutive two-year term of imprisonment for aggravated identity theft, the district
    court sentenced Strother to 234 months’ imprisonment. See 18 U.S.C. § 1028A(a)(1)
    (mandating a consecutive two-year sentence for aggravated identity theft). Strother
    argues that the district court erred in imposing the following sentencing
    enhancements: four levels for role in the offense; fourteen levels for loss in excess of
    $400,000; four levels for fifty or more victims; two levels for production or trafficking
    an authentication device; and two levels for use of sophisticated means.
    Strother contends that there should have been no adjustment for his role in the
    offense, arguing that the district court erred in denying him a four-level reduction for
    his minimal role in the loan fraud scheme that would have negated the four-level
    enhancement for leadership in the instant credit fraud scheme. We review a district
    court’s denial of a mitigating role reduction for clear error. United States v. Godinez,
    
    474 F.3d 1039
    , 1042 (8th Cir. 2007). Under U.S.S.G. § 3B1.2(a), a defendant may
    be eligible for a role reduction if his culpability for the relevant conduct is minimal
    in comparison to that of other participants, but the mere fact that a defendant is less
    culpable does not entitle him to the reduction. See 
    id. at 1043
    (affirming district
    court’s denial of a two-level minor role reduction); United States v. Johnson, 
    408 F.3d 535
    , 538-39 (8th Cir. 2005) (same). The minimal participant reduction “is intended
    to cover defendants who are plainly among the least culpable of those involved in the
    conduct of a group.” U.S.S.G. § 3B1.2 cmt. n.4.
    We find no clear error in the district court’s denial of Strother’s request of a
    mitigating role reduction. Without the counterfeit identification, the loan fraud
    scheme could not have been executed. Strother created two counterfeit licenses for
    women to pose as Jane Doe, and there was no evidence that Thomas had access to
    counterfeit identification cards beyond those that Strother manufactured. We cannot
    say that it was clear error to find that Strother was not “plainly among the least
    culpable” of those involved in the loan fraud scheme. See 
    id. -11- Strother
    also contends that the loss attributable to the mortgage fraud scheme
    was not reasonably foreseeable and thus the district court erred in including that
    amount in its determination of Strother’s amount of loss enhancement. See U.S.S.G.
    § 2B1.1(b)(1) (amount of loss enhancement). The sentencing court calculates the
    amount of the loss based on a preponderance of the evidence, and we review the
    amount of loss determination for clear error. United States v. Boesen, 
    541 F.3d 838
    ,
    850 (8th Cir. 2008). The enhancement for the amount of loss may be based on either
    the actual or intended loss. U.S.S.G. § 2B1.1 cmt. n.3(A); United States v.
    Onwumere, 
    530 F.3d 651
    , 654 (8th Cir. 2008). Actual loss is defined as the
    “reasonably foreseeable pecuniary harm that resulted from the offense,” U.S.S.G. §
    2B1.1 cmt. n.3(A)(i), and in jointly undertaken criminal activity, a defendant’s
    relevant conduct includes “all reasonably foreseeable acts and omissions of others in
    furtherance of the jointly undertaken criminal activity.” U.S.S.G. § 1B1.3(a)(1)(B).
    We are hard pressed to believe that Strother—who was leading a profitable instant
    credit fraud scheme—could not reasonably foresee that the counterfeit driver’s
    licenses he was manufacturing would be used to obtain fraudulent mortgages. We
    find no clear error in the application of the fourteen-level amount of loss
    enhancement.
    We also find no clear error in the district court’s finding that Strother’s illegal
    conduct involved fifty or more victims. See U.S.S.G. § 2B1.1(b)(2) (number of
    victims enhancement). Strother argues that the evidence before the district court
    showed that there were only forty-eight victims. The presentence investigation report
    (PSR), however, identified four additional victims, who were not counted in Strother’s
    brief and who had their identities stolen by two coconspirators. Moreover, the
    government’s arguments at sentencing included information regarding victims not
    counted in the PSR, but who had been identified at trial. Because the government
    presented evidence sufficient to allow the district court to find that Strother’s conduct
    involved fifty or more victims, we conclude that Strother’s offense level was properly
    enhanced by four levels under Guideline § 2B1.1(b)(2)(B).
    -12-
    Strother contends that the district court committed procedural error in applying
    the Guideline § 2B1.1(b)(10) enhancement. As stated above, Strother was convicted
    of thirteen counts of aggravated identity theft in violation of 18 U.S.C. § 1028A,
    which mandates a consecutive two-year term of imprisonment. He argues that §
    2B1.6, the guideline concerning aggravated identity theft, disallows the application
    of the § 2B1.1(b)(10) enhancement in cases in which the defendant has been convicted
    of under § 1028A.
    Guideline § 2B1.1(b)(10) instructs the district court to increase the offense
    level by two levels if the offense involved:
    (A) the possession or use of any (i) device-making equipment, or (ii)
    authentication feature; (B) the production or trafficking of any (i)
    unauthorized access device or counterfeit access device, or (ii)
    authentication feature; or (C)(i) the unauthorized transfer or use of any
    means of identification unlawfully to produce or obtain any other means
    of identification, or (ii) the possession of 5 or more means of
    identification that unlawfully were produced from, or obtained by the use
    of, another means of identification.
    To avoid double counting of relevant conduct, however, § 2B1.6 limits the application
    of § 2B1.1(b)(10). Specifically, the commentary instructs that specific offense
    characteristics for the “transfer, possession, or use of a means of identification” do not
    apply when the court imposes a sentence for aggravated identity theft. § 2B1.6 cmt.
    n.2. Under § 1028A(a)(1), a sentence for aggravated identity theft is appropriate for
    the knowing transfer, possession, or use, without lawful authority, of a means of
    identification of another person during and in relation to certain felonies. The
    Guideline’s exclusion language tracks the language that triggers the statute’s
    consecutive term of imprisonment, but § 2B1.6 does not exclude all conduct described
    in § 2B1.1(b)(10).
    -13-
    A two-level enhancement under § 2B1.1(b)(10) may still apply to a defendant
    convicted under § 1028A. United States v. Jones, 
    551 F.3d 19
    , 25 (1st Cir. 2008); see
    also United States v. Lyons, 
    556 F.3d 703
    , 708-09 (8th Cir. 2009) (leaving open
    whether the § 2B1.1(b)(10) enhancement applies to a defendant who produced an
    unauthorized access device and who also was convicted of aggravated identity theft).
    For example, the production of a counterfeit access device or authentication feature
    is not conduct encompassed by the prohibition on double counting in the commentary
    to § 2B1.6. See U.S.S.G. § 2B1.1(b)(10)(B); 
    Jones, 551 F.3d at 25
    ; see also 
    Lyons, 556 F.3d at 708-09
    . The commentary defines production to include “manufacture,
    design, alteration, authentication, duplication, or assembly.” U.S.S.G. § 2B1.1 cmt.
    n.9.
    Strother qualifies for the § 2B1.1(b)(10) enhancement because he produced
    counterfeit Kansas driver’s licenses with realistic authentication features, conduct that
    § 2B1.6 does not exclude. We find no procedural error in the district court’s
    application of the Guidelines, and the evidence presented was sufficient to support the
    § 2B1.1(b)(10) enhancement.
    Finally, the district court’s finding that Strother employed sophisticated means
    is not clearly erroneous. See U.S.S.G. § 2B1.1(b)(9)(C) (sophisticated means
    enhancement). The sophisticated means enhancement applies when the offense
    involves “especially complex or especially intricate offense conduct pertaining to the
    execution or concealment of an offense.” U.S.S.G. § 2B1.1 cmt. n.8(B). “Even if any
    single step is not complicated, repetitive and coordinated conduct can amount to a
    sophisticated scheme.” United States v. Bistrup, 
    449 F.3d 873
    , 882 (8th Cir. 2006).
    Strother agues that he committed garden variety identity theft, but the evidence
    presented showed that Strother engineered an intricate overall instant credit scheme,
    complete with a vast network of coconspirators to carry out the scheme’s numerous
    steps. Strother obtained credit reports from at least two coconspirators, reviewing the
    reports for good credit scores. A victim with a good credit score would be matched
    -14-
    with a coconspirator, and Strother would manufacture high-quality counterfeit Kansas
    driver’s licenses containing the victim’s information and the coconspirator’s picture.
    In some instances, Strother had recruited the coconspirator to serve as a shopper in the
    scheme. At Strother’s direction, the coconspirator would open a line of credit at a
    retail establishment, purchase big-ticket items, and deliver the goods to Strother for
    resale. Strother and his associates carried out this conduct repeatedly, with minor
    variations. And to avoid detection, the coconspirators used several different identities
    and established fraudulent instant credit accounts at several different retailers and
    retail locations throughout the lower Midwest. We find no clear error in the district
    court’s finding that Strother employed sophisticated means.
    III. Tarik Liwaru
    Liwaru was convicted of one count of conspiracy to defraud the United States,
    in violation of 18 U.S.C. §§ 371, 1028A, and 1029, and was sentenced to five years’
    imprisonment, the maximum sentence allowed under § 371. He argues that the
    evidence was insufficient to support his conviction, that the district court improperly
    submitted Exhibit 29A to the jury and improperly answered the jury’s questions, and
    that the district court erred in enhancing his sentence for amount of loss, number of
    victims, unauthorized transfer of identification, and sophisticated means.
    A. Evidence Was Sufficient To Convict Liwaru.
    Having reviewed the record de novo, we conclude that it contains substantial
    evidence supporting the jury’s verdict convicting Liwaru of conspiracy. See 
    Alama, 486 F.3d at 1064
    ; 
    Lopez, 443 F.3d at 1030
    . Williams testified that Liwaru delivered
    boxes of credit reports to Strother, and the reports allowed Strother and Williams to
    identify victims with good credit scores. During trial, the government asked
    Williams:
    -15-
    Q:     Did the Kansas driver’s licenses that we have discussed, [naming
    victims], did at least some of those come out of the boxes of stuff
    that Tarik brought over?
    A:     I’m sure almost all of them did.
    That Williams identified the source of the credit reports as “Heartland Mortgage”
    rather than Hearthside Lending is inconsequential, particularly in light of the fact that
    the named victims in the government’s question had submitted credit applications to
    Hearthside Lending.
    We disagree with Liwaru’s contention that Williams’s testimony is incredible
    or insubstantial on its face. Credibility challenges are for the jury, and “[t]he test for
    rejecting evidence as incredible is extraordinarily stringent and is often said to bar
    reliance only on testimony asserting facts that are physically impossible.” United
    States v. McAtee, 
    481 F.3d 1099
    , 1105 (8th Cir. 2007) (quoting United States v.
    Crenshaw, 
    359 F.3d 977
    , 988 (8th Cir. 2004)). Williams gave a thorough account of
    the instant credit scheme and was subjected to vigorous cross examination. She had
    personal knowledge of the conspiracy because she was deeply involved with it herself.
    Nothing in her testimony is incredible or insubstantial on its face.
    The government also presented corroborating evidence of Liwaru’s
    involvement in the conspiracy. The evidence suggested that Liwaru drove at least one
    coconspirator to a retail location to open a fraudulent instant credit account. A law
    enforcement officer testified that he stopped Liwaru after a coconspirator, who had
    been the passenger in the car Liwaru was driving, was arrested for attempting to open
    an instant credit account with a counterfeit Kansas driver’s license. The government
    also presented taped telephone calls between Strother and Liwaru, including one in
    which Liwaru warns Strother that a coconspirator had been arrested. Viewing the
    evidence in the light most favorable to the verdict, we conclude that the evidence was
    sufficient to support Liwaru’s conviction.
    -16-
    B. Submission of Exhibit 29A to the Jury During Deliberations Did Not Affect
    Liwaru’s Substantial Rights.
    Liwaru contends that Exhibit 29A, a chart showing the interconnection of the
    instant credit fraud scheme coconspirators, should not have been allowed in the jury
    room during deliberations because it was a demonstrative exhibit. Liwaru did not
    object to the chart’s submission to the jury during the deliberations, and thus we
    review the district court’s decision for plain error. Fed. R. Crim. P. 52(b). Under
    plain error review, we reverse only if there has been an error, that is plain, and that
    affects substantial rights. United States v. Cvijanovich, 
    556 F.3d 857
    , 864 (8th Cir.
    2009); see also United States v. Olano, 
    507 U.S. 725
    , 732-36 (1993). The plain error
    must have been prejudicial, a requirement that can normally be met only by showing
    that the error affected the outcome of the case. 
    Cvijanovich, 556 F.3d at 864-65
    .
    Exhibit 29A was not formally offered and admitted into evidence, but the
    district court incorrectly remembered that it had been and submitted it to the jury
    without a limiting instruction. See United States v. Possick, 
    849 F.2d 332
    , 339 (8th
    Cir. 1988) (“The submission of purely demonstrative charts to the jury is disfavored,
    and therefore limiting instructions are more strongly suggested.”) (internal citations
    omitted)). Assuming that such submission was plain error, Liwaru has failed to show
    that it affected his substantial rights. The jury had seen the chart several times during
    the government’s presentation of its case. Moreover, as stated above, the evidence
    established that Liwaru brought credit reports from Hearthside Lending to Strother for
    use in the instant credit fraud scheme. Accordingly, we cannot say that the alleged
    error affected the outcome of the case.
    C. The District Court’s Supplemental Instructions Were Not Erroneous.
    Liwaru also alleges prejudicial error in the district court’s supplemental
    instructions in response to the jury’s questions during deliberations. Specifically, he
    -17-
    contends that the district court’s instructions might have prompted the jury to believe
    that there was extrinsic evidence regarding Liwaru’s employment at Hearthside
    Lending. Liwaru did not object to the district court’s responses, and we review them
    for plain error. See Fed. R. Crim. P. 52(b); United States v. Garcia, 
    562 F.3d 947
    , 956
    (8th Cir. 2009) (standard of review).
    We find no error in the district court’s supplemental instructions in response to
    the jury’s questions. “When a jury explicitly requests a supplemental instruction, a
    trial court must take great care to ensure that any supplemental instructions are
    accurate, clear, neutral, and non-prejudicial.” 
    Garcia, 562 F.3d at 957
    (quoting United
    States v. Morrison, 
    332 F.3d 530
    , 532 (8th Cir. 2003)) (internal alterations omitted).
    The jury requested verification of Liwaru’s employment at Hearthside Lending, and
    the district court replied by saying, “There is no evidence admitted which responds to
    your question.” The jury then asked whether it could assume that he was an employee
    there, to which the district court instructed the jury to rely on collective memory, use
    common sense, but “you should not guess or speculate.” These supplemental
    instructions were specific and neutral, accurately responding to the jury’s questions.
    Assuming, as we do, that the jury followed these supplemental instructions, it knew
    that there was no admitted evidence regarding Liwaru’s employment at Hearthside
    and that it could not speculate as to his employment there.
    D. The Sentence Enhancements Imposed by the District Court Were Appropriate.
    The district court determined that Liwaru’s total offense level was twenty-two
    and his criminal history category was five, resulting in a Guidelines sentencing range
    of seventy-seven to ninety-six months’ imprisonment. The district court held Liwaru
    responsible for $160,272.90 in losses and more than ten victims, which accounted for
    the loss and victims related to the Hearthside Lending credit reports. Liwaru argues
    that the district court erred in enhancing his sentence for amount of loss, number of
    victims, use of sophisticated means, and unauthorized use of identification.
    -18-
    We find no clear error in the district court’s ten-level enhancement of Liwaru’s
    sentence for losses greater than $120,000 and its two-level enhancement for ten or
    more victims. See U.S.S.G. § 2B1.1(b)(1)-(2) (amount of loss and number of victims
    enhancements). Liwaru contends that the evidence was insufficient to hold him
    responsible for the losses attributed to the Hearthside Lending victims, rehashing his
    argument that there was insufficient evidence to convict him. As set forth above,
    however, evidence at trial established that Liwaru supplied Strother with the credit
    reports from Hearthside Lending and was otherwise involved in the instant credit
    scheme. Those credit reports allowed Strother to create counterfeit identities of
    victims with good credit scores and perpetuate instant credit fraud. Liwaru also asks
    us to exclude the loss amounts and victims attributed to unknown coconspirators, but
    given the time frame, the fact that the victims had submitted their private financial
    information to Hearthside Lending, and that the fraudulent transactions involved
    instant credit, the district court could have reasonably concluded that those amounts
    and victims were attributable to the instant credit scheme and the credit reports that
    Liwaru provided.6 The district court properly increased Liwaru’s offense level by ten
    for amount of loss and by two for ten or more victims.
    The district court’s assessment of a two-level increase for unauthorized use of
    identifications under Guideline § 2B1.1(b)(10) was similarly appropriate. As stated
    above, the Guideline provides for a two-level enhancement for the “unauthorized
    transfer or use of any means of identification unlawfully to produce or maintain any
    other means of identification.” U.S.S.G. § 2B1.1(b)(10)(C)(i). Liwaru’s offense
    conduct, which involved providing credit reports to Strother, fits squarely into this
    Guideline enhancement, and we find no clear error in the district court’s application
    of it.
    6
    Even if we were to exclude the amounts that Williams received from cashing
    stolen checks, a transaction Liwaru argues is separate from the instant credit scheme,
    the loss amount would remain more than $120,000, and thus the ten-level
    enhancement would continue to apply.
    -19-
    Finally, Liwaru challenges the district court’s imposition of the sophisticated
    means enhancement. Under the advisory guidelines, Liwaru “is responsible under
    principles of ‘relevant conduct’ for acts of others that were taken in furtherance of a
    jointly undertaken criminal activity, if they were reasonably foreseeable by [Liwaru]
    in connection with the criminal activity.” 
    Lyons, 556 F.3d at 707
    . The evidence
    tended to show that Liwaru was aware of how the conspiracy worked—from the
    identification of victims to the creation of the counterfeit driver’s licenses to the
    applications for and use of instant credit. At the very least, the conspiracy’s criminal
    conduct was reasonably foreseeable. Accordingly, the sophisticated means
    enhancement applies to Liwaru for the same reasons it applied to Strother, and the
    district court’s finding that the conspiracy employed sophisticated means is not clearly
    erroneous.
    IV. Chandra Jenkins-Watts
    Jenkins was convicted of one count of conspiracy to commit identity theft, in
    violation of 18 U.S.C. §§ 371 and 1028 (a)(7), and four counts of aggravated identity
    theft, in violation of 18 U.S.C. §§ 1028A(a)(1), and was sentenced to twenty-five
    months’ imprisonment. Jenkins contends that her speedy trial rights were violated,
    that the indictment was defective, that there was insufficient evidence to convict her,
    and that the district court erred in denying her motion to sever and her motion to
    suppress.
    A. Jenkins’s Speedy Trial Rights Were Not Violated.
    Jenkins argues that her statutory and constitutional speedy trial rights were
    violated because she was originally indicted on April 19, 2006, and she was not tried
    until October 22, 2007. We review the district court’s factual findings for clear error
    -20-
    and its legal conclusions de novo. United States v. Titlbach, 
    339 F.3d 692
    , 699 (8th
    Cir. 2003).
    The trial of a criminal defendant shall commence within seventy days from the
    filing date of the indictment or from the date of the defendant’s appearance, whichever
    is later. 18 U.S.C. § 3161(c)(1). “[W]hen a newly indicted or arraigned defendant is
    joined with a defendant whose speedy trial clock has already started running, the latter
    defendant’s speedy trial clock will be reset so that it reflects the speedy trial clock of
    the newly added codefendant.” United States v. Lightfoot, 
    483 F.3d 876
    , 885-86 (8th
    Cir. 2007). Delay caused by pretrial motions is excluded from the calculation of this
    time frame, as are continuances granted by the court in order to best serve the ends of
    justice. 18 U.S.C. §§ 3161(h)(1)(F), (h)(8)(A); see also United States v. Shepard, 
    462 F.3d 847
    , 863 (8th Cir. 2006).
    Jenkins was originally indicted in April 2006. In August, the government filed
    a superseding indictment that charged sixteen defendants, some of whom had not
    previously been charged in relation to the instant credit or loan fraud schemes. The
    defendants made their initial appearances in August and September 2006. Jenkins
    speedy trial clock was thus reset in early September, when the last of the newly
    indicted codefendants appeared.
    A number of defendants requested continuances throughout the pretrial period,
    the first of which was filed in September 2006. The district court granted their
    motions, and trial was set for June 2007. In May 2007, the government moved for a
    continuance due to the unavailability of a witness, which was granted. In its written
    orders, the district court explained the reasons that the continuance served the ends of
    justice. Given the joinder of defendants and pretrial motions in this case, Jenkins’s
    Speedy Trial Act rights were not violated because her speedy trial clock was reset in
    early September 2006 and the time from the first motion for a continuance to trial is
    excluded from the speedy trial calculation.
    -21-
    “It would be unusual to find the Sixth Amendment has been violated when the
    Speedy Trial Act has not.” 
    Titlbach, 339 F.3d at 699
    . “The Sixth Amendment right
    attaches at the time of arrest or indictment, whichever comes first, and continues until
    the trial commences.” 
    Shepard, 462 F.3d at 864
    (quoting United States v. Perez-
    Perez, 
    337 F.3d 692
    , 600 (8th Cir. 2003)) (internal quotations omitted). We consider
    the following four factors when evaluating a Sixth Amendment claim for pretrial
    delay: (1) length of delay, (2) reason for the delay, (3) defendant’s assertion of her
    speedy trial right, and (4) prejudice to the defendant. 
    Id. A delay
    approaching one
    year may meet the presumption of prejudicial delay and require the application of the
    other factors. 
    Id. The eighteen-month
    delay was the result of justifiable circumstances. As stated
    above, the trial date was continued because a number of defendants were joined,
    several defendants asked for continuances, and one of the government’s witnesses
    became temporarily unavailable. Jenkins’s assertion that the government caused the
    delay “for the purpose of getting them to turn on each other” is baseless, and she
    provides no citation to the record or to any supporting case law. See Jenkins Br. at 31.
    Although the delay may have caused Jenkins anxiety, she was released on bail during
    the pendency of her case and allowed to appear via telephone for most pretrial
    conferences. Most importantly, there is no indication that the passage of time
    impaired her defense. Thus, although the delay was lengthy and Jenkins repeatedly
    asserted her right to a speedy trial, Jenkins’s constitutional right was not violated.
    -22-
    B. The District Court Did Not Err in Denying Jenkins’s Motion To Sever.
    Jenkins argues that she is entitled to a new trial because the indictment
    improperly joined the defendants and the district court erred in denying her motion to
    sever. We review the claim of misjoinder de novo and the denial of the motion to
    sever for abuse of discretion. United States v. Liveoak, 
    377 F.3d 859
    , 864 (8th Cir.
    2004); see also United States v. Crumley, 
    528 F.3d 1053
    , 1062 (8th Cir. 2008)
    (determining that a defendant need not always move for severance at the end of trial
    to preserve the issue for appeal). Reversal is required only if the appellant
    demonstrates that misjoinder resulted in actual prejudice, i.e., the misjoinder has “a
    substantial and injurious effect or influence in determining the verdict.” 
    Liveoak, 377 F.3d at 865
    .
    Federal Rule of Criminal Procedure 8(b) provides that an indictment “may
    charge 2 or more defendants if they are alleged to have participated in the same act or
    transaction, or in the same series of acts or transactions, constituting an offense or
    offenses.” All defendants need not be charged in each count, and the prerequisites are
    liberally construed in favor of joinder. 
    Liveoak, 377 F.3d at 864
    . “Once defendants
    are properly joined under Rule 8, there is a strong presumption for their joint trial.”
    
    Crumley, 528 F.3d at 1063
    (quoting United States v. Flores, 
    362 F.3d 1030
    , 1039 (8th
    Cir. 2004)).
    A district court may sever the jointly indicted defendants’ trials if joinder
    appears to prejudice a defendant or the government. Fed. R. Crim. P. 14(a). “To grant
    a motion for severance, the necessary prejudice must be severe or compelling.”
    
    Liveoak, 377 F.3d at 864
    (quoting United States v. Pherigo, 
    327 F.3d 690
    , 693) (8th
    Cir. 2003)) (internal quotations omitted). Severance becomes necessary where the
    proof is such that a jury could not be expected to compartmentalize the evidence as
    it relates to the separate defendants. United States v. Bauer, 
    551 F.3d 786
    , 791 (8th
    Cir. 2008).
    -23-
    We conclude that joinder was proper in this case. Count two of the indictment
    charged Strother, Thomas, Zuber, Edenfield, and Jenkins, along with three other co-
    defendants, with conspiracy. The indictment described the overarching loan fraud
    scheme, including the mortgage fraud transactions that took place in Missouri and the
    attempted fraudulent business loan transactions in Texas. Although Jenkins did not
    seem to be involved in the Missouri transactions, the plan was to continue the scheme
    in Texas, where Jenkins worked at a bank and was able to process credit applications.
    Edenfield’s arrest delayed the plan, and the coconspirators reformulated the scheme,
    recruiting Zuber to pose as Jane Doe and apply for business credit cards, lines of
    credit, and business loans. Strother fueled both the instant credit scheme and the loan
    fraud scheme with the counterfeit Kansas driver’s licenses.
    Even if joinder was improper, Jenkins has shown no actual prejudice. The
    evidence against Jenkins was substantial and compelling, and the district court
    carefully instructed the jury:
    Keep in mind that Counts One and Two charge two separate conspiracies
    and that you must give separate consideration to the evidence about each
    individual defendant. Each defendant is entitled to be treated separately,
    and you must return a separate verdict for each defendant. Also keep in
    mind that you must consider, separately, each crime charged against each
    individual defendant, and must return a separate verdict for each of those
    crimes charged.
    Jenkins’s general assertions of prejudice have failed to demonstrate that joinder had
    a substantial and injurious effect on the jury’s determination of her guilt, and we find
    no abuse of discretion in the district court’s denial of Jenkins’s motion to sever.
    -24-
    C. The District Court Did Not Err in Denying Jenkins’s Motion to Suppress.
    Jenkins argues that the district court erred in denying her motion to suppress the
    statements she made to bank personnel, whom she contends were acting as
    government agents, during the bank’s internal investigation. Jenkins contends that the
    statements were elicited in violation of Miranda v. Arizona, 
    384 U.S. 436
    (1966). We
    find no clear error in the district court’s factual finding that the bank investigators
    were private citizens, not law enforcement officers, and affirm its legal conclusion that
    Miranda warnings were thus not required. See United States v.Garlock, 
    19 F.3d 441
    ,
    442-44 (8th Cir. 1994) (holding that the defendant failed to show that the private
    persons acted as an instrument or agent of the government and thus there could be no
    Miranda violation).
    D. The Indictment Was Sufficient To Charge Jenkins with
    Aggravated Identity Theft.
    Jenkins moved for dismissal after she was sentenced, contending that the
    indictment was insufficient because it failed to define the elements of access device
    fraud, the predicate offense to the aggravated identity theft count. On appeal from the
    denial of the motion, Jenkins renews her argument and contends that we should
    review the sufficiency of the indictment de novo.
    Motions alleging that the indictment fails to invoke the court’s jurisdiction or
    state an offense may be raised at any time while the case is pending. Fed. R. Crim. P.
    12(b)(3)(B). When an indictment is challenged for the first time after the verdict is
    returned, we apply a deferential standard of review, upholding the indictment “unless
    it is so defective that by no reasonable construction can it be said to charge the offense
    for which the defendants were convicted.” United States v. Redzic, 569 F3d 841, 845
    (8th Cir. 2009) (quoting United States v. Pennington, 
    168 F.3d 1060
    , 1064-65 (8th
    Cir. 1996)). An indictment is insufficient if it fails to allege an essential element of
    -25-
    the crime charged. 
    Id. “[I]n determining
    whether an essential element has been
    omitted, ‘a court may not insist that a particular word or phrase appear in the
    indictment when the element is alleged “in a form” which substantially states the
    element.’” 
    Id. (quoting United
    States v. Mallen, 
    843 F.3d 1096
    , 1102 (8th Cir. 1988)).
    Section 1028A(a)(1) provides that “[w]hoever, during and in relation to any
    felony violation enumerated in subsection (c), knowingly transfers, possesses, or uses
    without lawful authority, a means of identification of another person shall, in addition
    to the punishment provided for such felony, be sentenced to a term of imprisonment
    of 2 years.” The enumerated felonies include access device fraud, in violation of 18
    U.S.C. § 1029(a)(5), which punishes a defendant who “knowingly and with the intent
    to defraud effects transactions, with 1 or more access devices issued to another person
    or persons, to receive payment or any other thing of value during any 1-year period
    the aggregate value of which is equal or greater to $1,000.”
    Counts thirty-four through thirty-seven of the superseding indictment charged
    Jenkins with aggravated identity theft and closely tracked the language of §
    1028A(a)(1), stating that Jenkins “did knowingly and without lawful authority
    transfer, use, and possess one or more means of identification of another person,
    namely XXXX, during and in relation to a predicate felony offense, that being access
    device fraud as defined by Chapter 47, Title 18, United States Code, Section
    1029(a)(5).” The indictment incorporated by reference the offense conduct described
    in the loan fraud conspiracy count and went on to list the counts, the credit application
    number, and the bank’s credit product. Jenkins complains that the indictment did not
    refer to § 1029 (a)(5)’s scienter requirement (knowingly and with the intent to
    defraud) or value amount ($1000 or more).
    We conclude that the allegations contained in the indictment were sufficient to
    charge Jenkins with aggravated identity theft. While it may have been preferable to
    include the elements of access device fraud, their omission is not fatal. In reviewing
    -26-
    whether the evidence was sufficient to convict a defendant of aggravated identity
    theft, we have said that the government must prove that the defendant “knowingly
    used the means of identification of another person without lawful authority during and
    in relation to an enumerated felony.” United States v. Kowal, 
    527 F.3d 741
    , 746 (8th
    Cir. 2008); see also United States v. Hines, 
    472 F.3d 1038
    , 1039 (8th Cir. 2007) (per
    curiam).7 The government charged the above-listed elements, identified the
    enumerated felony it would prove at trial (access device fraud), and cited the statute
    criminalizing access device fraud (18 U.S.C. § 1029(a)(5)). Accordingly, the
    government charged the final element in a form that substantially stated the element.
    Jenkins has acknowledged as much in her reply brief, “[t]he government attempts,
    albeit inadequately, [to] define and allege the elements of Section 1029(a) because it
    knew it had to.” Jenkins Reply Br. at 10.
    Jenkins’s argument that the jury instructions constructively amended the
    indictment is misplaced. “A constructive amendment occurs when the essential
    elements of the offense as charged in the indictment are altered in such a
    manner—often through the evidence presented at trial or the jury instructions—that
    the jury is allowed to convict the defendant of an offense different from or in addition
    to the offenses charged in the indictment.” United States v. Starr, 
    533 F.3d 985
    , 997
    (8th Cir. 2008) (quoting United States v. Whirlwind Soldier, 
    499 F.3d 862
    , 870 (8th
    Cir. 2007)); see also United States v. Buchanan, No. 08-3515, 
    2009 WL 2213475
    at
    *7 (8th Cir. July 27, 2009) (rejecting appellant’s constructive amendment claim). The
    jury was instructed that the elements of aggravated identity theft were, “One, the
    defendant knowingly used a means of identification of another person; Two, the
    defendant did so without lawful authority; and Three, the defendant did so during and
    7
    Section 1028A(a)(1) requires the government to show that the defendant knew
    that the means of identification belonged to another person. Flores-Figueroa v. United
    States, 
    129 S. Ct. 1886
    , 1894 (2009). Jenkins does not contend that the indictment
    was insufficient to charge this requirement, nor does she argue that she did not know
    that the means of identification belonged to another person.
    -27-
    in relation to a criminal offense, namely Access Device Fraud, as described in
    Instruction Number 45.” The jury thus knew that it was required to find that Jenkins
    committed access device fraud, as defined in the instructions, before it could find that
    Jenkins committed aggravated identity theft. The jury instructions did not alter or
    expand the offense charged in the indictment, and the jury convicted Jenkins of the
    exact offense charged in the indictment.
    In her reply brief and at oral argument, Jenkins argued that her conviction of
    aggravated identity theft cannot stand because the government did not charge her with
    access device fraud. Without separate counts and convictions of the predicate offense
    under § 1029(a)(5), Jenkins contends that she cannot be charged or convicted under
    § 1028A. This issue of first impression should have been raised earlier, and we
    ordinarily do not address issues raised for the first time in an appellant’s reply brief.
    See United States v. Coplen, 
    533 F.3d 929
    , 930 (8th Cir. 2008) (declining to address
    issues first raised in reply brief). Suffice it to say that the government’s decision to
    charge Jenkins with four counts of aggravated identity theft, and not an additional four
    counts of access device fraud, did not render the indictment fatally insufficient so as
    to fail to charge the offense of conviction or deprive the court of jurisdiction. See
    United States v. Vidal-Reyes, 
    562 F.3d 43
    , 55 n.9 (1st Cir. 2009) (assuming without
    deciding that the government may charge the defendant with violating § 1028A
    without charging the predicate offense); cf. United States v. Green, 
    521 F.3d 929
    , 934
    (8th Cir. 2008) (concluding that the government’s dismissal of the predicate offense
    was irrelevant “since a [18 U.S.C.] § 924(c) defendant need not be convicted of the
    underlying crime of violence”); Myers v. United States, 
    993 F.2d 171
    , 172 (8th Cir.
    1993) (per curiam) (holding that a defendant charged with violating § 924(c) must be
    proven to have committed the underlying crime, but he need not be separately charged
    with and convicted of the underlying offense).
    -28-
    E. The Evidence Was Sufficient To Support Jenkins’s Convictions.
    Jenkins contends that the government failed to prove the elements of access
    device fraud to support her conviction of aggravated identity theft. We disagree.
    The government proved that Jenkins knowingly and with intent to defraud
    effected transactions using one or more access device to receive payment of more than
    $1000. See 18 U.S.C. § 1029(a)(5). Jenkins’s intent can be inferred from the
    evidence adduced at trial. Thomas and Edenfield testified that Jenkins would serve
    as the inside connection at the bank in Dallas. Her supervisor testified at length about
    the four applications for credit that Jenkins processed for Brooke Investments and
    Brooke Agency. Over the course of the four applications, the following information
    changed: the name of the business, its location, its income, its date of establishment,
    and the amount of credit requested. The bank investigator testified that Jenkins had
    said that she made up the name Brooke Agency and that she altered the dates of
    establishment of the businesses to try to get the loan approved. Based on this
    evidence, the jury could reasonably find that Jenkins knowingly and with the intent
    to defraud engaged in access device fraud.
    Jenkins argument that she used only counterfeit paper documents, and not an
    access device, to initiate the transactions is without merit. Access device is defined
    as
    any card, plate, code, account number . . . or other means of account
    access that can be used, alone or in conjunction with another access
    device, to obtain money, goods, services, or any other thing of value, or
    that can be used to initiate a transfer of funds (other than a transfer
    originated solely by paper instrument).
    18 U.S.C. § 1029(e)(1). Jenkins’s supervisor testified that Jenkins opened two
    checking accounts using Jane Doe’s personal information and then submitted four
    -29-
    fraudulent applications for business loans and other forms of credit, directing
    electronic fund transfers to be deposited in the newly opened accounts. The statutory
    language itself includes account numbers within the definition of access devices, and
    account numbers are a means of account access, which can be used alone or in
    conjunction with other access devices to initiate a transfer of funds. See 
    id. The government
    thus presented sufficient evidence to allow the jury to find that Jenkins
    effected transactions with one or more access devices.
    Finally, Jenkins contends that the government failed to prove that she obtained
    or received money or things of value over $1000. The statute, however, criminalizes
    the use of access devices to effect transactions to receive $1000 or more. See 18
    U.S.C. § 1029(a)(5). Jenkins submitted four applications for fraudulent loans and
    lines of credits in excess of $1000, and Jenkins’s supervisor discussed each
    application at length. In light of the evidence presented at trial, the jury could
    reasonably find that Jenkins committed aggravated identity theft during and in relation
    to the crime of access device fraud.
    Conclusion
    We affirm the convictions and sentences.
    ______________________________
    -30-
    

Document Info

Docket Number: 08-2287

Filed Date: 8/4/2009

Precedential Status: Precedential

Modified Date: 10/14/2015

Authorities (41)

United States v. Vidal-Reyes , 562 F.3d 43 ( 2009 )

United States v. Jones , 551 F.3d 19 ( 2008 )

United States v. Sheila Lou Garlock, Now Known as Sheila ... , 19 F.3d 441 ( 1994 )

United States v. Corey Louis Hines , 472 F.3d 1038 ( 2007 )

United States v. Troy James Morrison, Also Known as Troy ... , 332 F.3d 530 ( 2003 )

United States v. Steven B. Pherigo, United States of ... , 327 F.3d 690 ( 2003 )

UNITED STATES OF AMERICA, — v. HOMERO BUSTOS FLORES, — ... , 362 F.3d 1030 ( 2004 )

United States v. Kenneth A. Possick, A/K/A Kenneth Roberts , 849 F.2d 332 ( 1988 )

united-states-v-reginald-dinez-johnson-also-known-as-cedric-miller , 450 F.3d 366 ( 2006 )

United States v. Cvijanovich , 556 F.3d 857 ( 2009 )

United States v. Keith Bernard Crenshaw, United States of ... , 359 F.3d 977 ( 2004 )

United States v. Onwumere , 530 F.3d 651 ( 2008 )

united-states-v-erroll-flynn-shepard-united-states-of-america-v-tony , 462 F.3d 847 ( 2006 )

United States v. Xavier Lightfoot , 483 F.3d 876 ( 2007 )

United States v. Kelley Anne Liveoak, United States of ... , 377 F.3d 859 ( 2004 )

United States v. Icaza , 492 F.3d 967 ( 2007 )

United States v. Bauer , 551 F.3d 786 ( 2008 )

United States v. Kowal , 527 F.3d 741 ( 2008 )

United States v. McAdory , 501 F.3d 868 ( 2007 )

United States v. Lyons , 556 F.3d 703 ( 2009 )

View All Authorities »