United States v. Mario Smith ( 2013 )


Menu:
  •                   United States Court of Appeals
    For the Eighth Circuit
    ___________________________
    No. 12-2866
    ___________________________
    United States of America
    lllllllllllllllllllll Plaintiff - Appellee
    v.
    Mario Darnell Smith
    lllllllllllllllllllll Defendant - Appellant
    ____________
    Appeal from United States District Court
    for the Eastern District of Missouri - St. Louis
    ____________
    Submitted: January 18, 2013
    Filed: June 6, 2013
    ____________
    Before BYE and MELLOY, Circuit Judges, and KOPF,1 District Judge.
    ____________
    MELLOY, Circuit Judge.
    Appellant Mario Darnell Smith entered a conditional guilty plea to one count
    of bank fraud in violation of 
    18 U.S.C. § 1344
    , three counts of aggravated identity
    theft in violation of 18 U.S.C. § 1028A(a)(1), and one count of conspiracy in violation
    1
    The Honorable Richard G. Kopf, United States District Court for the District
    of Nebraska, sitting by designation.
    of 
    18 U.S.C. § 371
    . He now appeals the district court's2 denial of his motion to
    suppress. For the following reasons, we affirm.
    Background
    In May 2011, an individual posing as an AmerenUE employee started
    contacting U.S. Bank. The individual attempted to set up a "cash vault delivery" from
    an AmerenUE account at U.S. Bank. Cash vault delivery is a service that allows
    authorized customers to select locations for cash deliveries. The individual made all
    of his attempts either over the telephone or through e-mail, using fake e-mail accounts
    and Internet domain names in an attempt to impersonate an AmerenUE employee.
    AmerenUE and U.S. Bank employees learned of the scheme and notified the Federal
    Bureau of Investigation (FBI).
    FBI Special Agent Brian Jackson was assigned to the case. He began his
    investigation by consulting with Special Agent Lyonel Myrthil, the bank crimes
    coordinator in the FBI's St. Louis office. Special Agent Myrthil informed Special
    Agent Jackson that he had heard of a similar scheme in Los Angeles that may have
    involved Mario Smith, who had since relocated to St. Louis.3 Smith was on
    supervised release in St. Louis for being a felon in possession of a firearm and had
    previously been convicted of fraud.
    Special Agent Jackson learned that most of the e-mails sent as part of the
    present scheme were sent from free, publicly available wireless access points. One
    2
    The Honorable Rodney W. Sippel, United States District Judge for the Eastern
    District of Missouri, adopting the Report and Recommendation of the Honorable
    Terry I. Adelman, United States Magistrate Judge for the Eastern District of Missouri.
    3
    No charges were brought for the scheme in Los Angeles. During a suppression
    hearing in the present case, Special Agent Myrthil testified that the investigation in
    Los Angeles may have involved an unconstitutional search.
    -2-
    access point was traced to a house across the street from Smith's residence. The
    wireless router at the house across the street was unprotected and anyone within range
    could use that access point.
    U.S. Bank provided Special Agent Jackson with the cash vault questionnaires
    that the individual behind the scheme completed to obtain the cash vault delivery. By
    analyzing the documents' data, Special Agent Jackson was able to learn that the
    username of the individual who completed the questionnaire was "bigdaddyallday."
    Special Agent Jackson conducted an Internet search for "bigdaddyallday" and
    discovered a YouTube account under that name. Smith was in several videos and
    photographs belonging to this account. Also, the investigation revealed that one of
    the cash vault delivery requests was made for pick-up in the Chicago area. On June
    15, 2011, Smith requested permission from his probation officer to travel to Illinois.4
    U.S. Bank also provided Special Agent Jackson with a recording of a phone
    conversation between a bank employee and the individual posing as an AmerenUE
    employee. Special Agent Myrthil identified the voice as Smith's. Special Agent
    Myrthil had listened to a televised interview with Smith and also had spoken with
    Smith and listened to Smith's voice on multiple other occasions.
    After learning the above information, on June 20, 2011, the FBI placed Smith
    under surveillance. That morning, an individual authorities suspected was Smith
    called U.S. Bank, and while impersonating an AmerenUE employee, requested a cash
    vault delivery of approximately $180,000. During surveillance, agents observed
    Smith drive, along with Sahib Lewis, to Smith's residence and pick up a messenger
    bag. Smith and Lewis then drove to a Quizno's restaurant in downtown St. Louis.
    Agents entered Quizno's to arrest Smith, but he was in the restroom. Agents arrested
    4
    However, Smith also had a scheduled court appearance in Illinois for the same
    day as the scheduled pick-up.
    -3-
    Smith once he exited the restroom. Smith was uncooperative during arrest, refusing
    to place his hands in the view of the officers or sit down. The agents were aware that
    Smith had a history of resisting arrest.
    Agents seized the messenger bag, which was roughly 15 to 20 feet away from
    Smith at a table with Lewis. While Smith was being handcuffed, he repeatedly told
    Lewis to take the bag. During Smith's arrest, Lewis was detained, but unrestrained,
    and could reach the bag. Special Agent Myrthil later stated he believed seizure of the
    bag was necessary for officer safety. Further, judging by the size and shape of the
    bag, agents believed the bag contained a laptop. The agents believed that a laptop had
    been used in furtherance of the scheme because of the use of wireless access points
    to connect to the Internet. Special Agent Myrthil seized the bag and immediately after
    touching the bag could feel a laptop inside. Agents did not know whether the bag
    contained any weapons. Agents also seized three cell phones that were on Smith at
    the time of arrest.
    Agents then took the bag to the FBI office in St. Louis, where Detective Brian
    Mize inventoried the bag. Detective Mize discovered a laptop, a fourth cell phone,
    and bank records during the inventory. Agents then interviewed Smith after a valid
    Miranda waiver. Smith admitted to his involvement in the scheme.
    Special Agent Jackson then placed the four cell phones and the laptop in a
    "Faraday" bag to prevent remote access so the phone could not be remotely wiped.
    Special Agent Jackson also placed the phones in "airplane mode" to preserve battery
    life. He created an inventory list, but the list did not detail which cell phones were
    found on Smith's person and which were found in the bag. Special Agent Jackson
    obtained a search warrant for the bag, laptop, and four cell phones.
    Smith requested a Franks hearing to challenge the validity of the search
    warrant. The magistrate judge denied the request. Smith also filed a motion to
    -4-
    suppress, challenging his arrest, the search and seizure of his bag, and the
    admissibility of all evidence obtained as a result of the arrest, search, and seizure. The
    district court denied the motion. Smith then entered a conditional guilty plea to the
    counts listed above. Smith now appeals the denial of his motion to suppress.
    Discussion
    "In an appeal from a district court's denial of a motion to suppress evidence, this
    [C]ourt reviews factual findings for clear error, and questions of constitutional law de
    novo." United States v. Hollins, 
    685 F.3d 703
    , 705 (8th Cir. 2012). "We will affirm
    the denial of a suppression motion unless we find that the decision is unsupported by
    the evidence, based on an erroneous view of the law, or the Court is left with a firm
    conviction that a mistake has been made." United States v. Riley, 
    684 F.3d 758
    , 762
    (8th Cir. 2012) (internal quotation marks omitted).
    I.    Probable Cause to Arrest
    First, Smith argues that his arrest was not supported by probable cause, and
    therefore any evidence obtained as a result of the arrest is inadmissible under the
    exclusionary rule. Smith claims probable cause did not exist because agents learned
    of his identity based upon information obtained from an allegedly illegal search in Los
    Angeles. Further, Smith argues that the agents' voice identification, the connection
    to the "bigdaddyallday" account, and the wireless access point near Smith's home are
    insufficient to establish probable cause.
    "Probable cause to arrest exists when there is a reasonable ground for belief of
    guilt that is particularized with respect to the person to be searched or seized." United
    States v. Chauncey, 
    420 F.3d 864
    , 870 (8th Cir. 2005) (internal citations and quotation
    marks omitted). Whether probable cause exists is "viewed from the standpoint of an
    objectively reasonable police officer." Ornelas v. United States, 
    517 U.S. 690
    , 696
    -5-
    (1996). "[W]e consider whether the facts and circumstances are sufficient to warrant
    a man of reasonable caution in the belief that [the person] was involved in the
    commission of a crime." Chauncey, 
    420 F.3d at 870
     (internal quotation marks
    omitted). "A probability or substantial chance of criminal activity, rather than an
    actual showing of criminal activity is sufficient." United States v. Jones, 
    535 F.3d 886
    , 890 (8th Cir. 2008) (internal quotation marks omitted).
    The district court properly found that the agents had probable cause to arrest
    Smith. First, the agents knew that Smith was a suspect in a similar scheme conducted
    in Los Angeles. Further, Special Agents Jackson and Myrthil identified the voice of
    the individual calling U.S. Bank to set up the scheme as Smith's, and the district
    court's crediting of that identification was not clearly erroneous. See United States v.
    Kirk, 
    534 F.2d 1262
    , 1277 (8th Cir. 1976) ("Voice identification is not a subject of
    expert testimony. The standards for the admissibility of an opinion as to the identity
    of a speaker is merely that the identifier has heard the voice of the alleged speaker at
    any time." (internal citation and quotation marks omitted)). One of the documents
    sent to U.S. Bank to further the scheme was created by the user name
    "bigdaddyallday," which was also the name of a YouTube account featuring
    photographs and videos of Smith. All of the e-mails sent in an attempt to obtain a
    cash vault delivery were sent from various wireless access points—including an
    access point across the street from Smith's residence—which indicated that the scheme
    was completed using a laptop. Finally, on the date of his arrest, an individual agents
    believed was Smith contacted U.S. Bank requesting a cash vault delivery, and Smith
    was seen traveling with a laptop bag. Considering all of the facts laid out above, a
    "substantial chance" of criminal activity existed. Jones, 535 F.3d at 890.
    Further, we reject Smith's argument that the evidence that established probable
    cause was fruit of the poisonous tree from the allegedly illegal search in Los Angeles.
    Even assuming the Los Angeles investigation involved an illegal search, probable
    -6-
    cause still existed in this case because of the attenuation doctrine. As this Court has
    stated:
    The attenuation doctrine is a well-established exception to the
    exclusionary rule. A mere causal connection between information
    gathered during an illegal search and evidence prepared for trial does not
    require automatic exclusion of evidence. "Such connection may have
    become so attenuated as to dissipate the taint." Nardone v. United
    States, 
    308 U.S. 338
    , 341 (1939). Moreover, in determining whether
    exclusion is proper, the court does not simply inquire whether the
    evidence would have been discovered "but for" the illegal conduct.
    "Rather, the more apt question in such a case is 'whether, granting
    establishment of the primary illegality, the evidence to which instant
    objection is made has been come at by exploitation of that illegality or
    instead by means sufficiently distinguishable to be purged of the primary
    taint.'" Wong Sun v. United States, 
    371 U.S. 471
    , 487–88 (1963)
    (quoting Maguire, Evidence of Guilt 221 (1959)). The mere fact that
    information gained during an illegal search gives rise to a subsequent,
    separate investigation of an individual does not necessarily taint the later
    investigation. . . . Furthermore, if the information merely facilitates or
    shortens the subsequent investigation, it does not taint the investigation's
    results.
    United States v. Watson, 
    950 F.2d 505
    , 507–08 (8th Cir. 1991).
    In Watson, officers searched a defendant's house on a warrant authorizing a
    search for drugs and illegal weapons. 
    Id. at 506
    . During the search, officers
    photographed or copied down information about the defendant's bank accounts—
    which the Court assumed was an illegal search. 
    Id. at 506, 507
    . Later, a grand jury
    charged the defendant for various violations of currency-transaction reporting
    requirements under 
    31 U.S.C. §§ 5324
    (2), 5322(b). 
    Id.
     at 506–07. The only
    information used from the search to indict the defendant was his name, his alias, and
    the names of various banks at which the defendant had accounts. 
    Id.
     The defendant
    moved to suppress "all documents and testimony concerning his deposits and
    -7-
    withdrawals of currency in various financial institutions," claiming the evidence was
    poisonous fruit of the illegal search. 
    Id. at 507
    .
    The Court upheld a denial of the suppression motion, finding "that where a law
    enforcement officer merely recommends investigation of a particular individual based
    on suspicions arising serendipitously from an illegal search, the causal connection is
    sufficiently attenuated so as to purge the later investigation of any taint from the
    original illegality." 
    Id. at 508
    . The Court determined that "[a] contrary conclusion
    would amount to granting the suspect life-long immunity from investigation and
    prosecution" and that "[i]n such situations, the societal cost of imposing the
    exclusionary rule outweighs any deterrent effect." 
    Id.
     (internal citation and quotation
    marks omitted).
    Therefore, even assuming agents learned of Smith's potential involvement in
    a similar scheme in Los Angeles through an illegal search, the evidence is not fruit of
    the poisonous tree. Similar to the actions of the agents in Watson, Special Agent
    Myrthil simply provided Special Agent Jackson with Smith's name.
    II.   Seizure and Inventory Search of Bag
    Smith also alleges that, even if the arrest was supported by probable cause, the
    bag was illegally seized and searched such that the bag and its contents should have
    been deemed inadmissible. We find that the seizure of the bag was justified in order
    to preserve evidence. "A 'seizure' of property occurs when there is some meaningful
    interference with an individual's possessory interests in that property." United States
    v. Jacobsen, 
    466 U.S. 109
    , 113 (1984). "Where law enforcement authorities have
    probable cause to believe that a container holds contraband or evidence of a crime, but
    have not secured a warrant, the [Supreme] Court has interpreted the [Fourth]
    Amendment to permit seizure of the property, pending issuance of a warrant to
    examine its contents, if the exigencies of the circumstances demand it or some other
    -8-
    recognized exception to the warrant requirement is present." United States v. Place,
    
    462 U.S. 696
    , 701 (1983). "[U]nder these circumstances, the risk of the item's
    disappearance or use for its intended purpose before a warrant may be obtained
    outweighs the interest in possession." 
    Id.
     at 701–02. For example, in United States
    v. Clutter, we upheld the seizure of a defendant's computers on multiple grounds,
    including because officers "had probable cause to believe the computers contained
    evidence of child pornography offenses." 
    674 F.3d 980
    , 985 (8th Cir. 2012). We
    reasoned that the seizure was necessary "'to ensure that the hard drive was not
    tampered with before a warrant was obtained.'" 
    Id.
     (quoting United States v.
    Mitchell, 
    565 F.3d 1347
    , 1350 (11th Cir. 2009)).
    The district court properly determined that the agents in the current case had
    probable cause to believe that the laptop bag contained evidence of a crime. Every
    agent, and the district court, agreed that the bag looked like one used to transport a
    laptop. As discussed, agents determined that because e-mails were sent from various
    access points, a laptop likely was used to further the scheme. Also, the documents
    were made under username "bigdaddyallday," a name linked to Smith. Further, as in
    Clutter, immediate seizure was necessary to prevent destruction of evidence. Smith's
    statements to Lewis to take the bag illustrate that he was attempting to keep the bag
    from the agents. See United States v. Beasley, 
    688 F.3d 523
    , 530 (8th Cir. 2012)
    (probable cause existed to justify temporary seizure of evidence where defendant
    made "apparent efforts to conceal the property").
    Next, Smith argues that the search of the bag at the station before obtaining a
    warrant violated the Fourth Amendment. Smith claims the search was not a valid
    inventory search because the agent deviated from FBI inventory policy. "We . . .
    review the district court's findings of fact regarding the circumstances of an inventory
    search for clear error, including the question of pretext." United States v. Taylor, 
    636 F.3d 461
    , 463–64 (8th Cir. 2011) (internal citation omitted).
    -9-
    Inventory searches are one exception to the general rule that searches conducted
    without a warrant are unreasonable. 
    Id. at 464
    . The purpose of an inventory search
    is to protect the "owner's property while it remains in police custody," as well as to
    protect "police against claims or disputes over lost or stolen property" and "from
    potential danger[s]." South Dakota v. Opperman, 
    428 U.S. 364
    , 369 (1976). An
    inventory search must "be reasonable under the totality of the circumstances . . . and
    may not be a ruse for general rummaging in order to discover incriminating evidence."
    Taylor, 
    636 F.3d at 464
     (internal quotation marks omitted). "The reasonableness
    requirement is met when an inventory search is conducted according to standardized
    police procedures, which generally remove the inference that the police have used
    inventory searches as a purposeful and general means of discovering evidence of a
    crime." 
    Id.
     (internal quotation marks omitted). However, "inventory searches need
    not be conducted in a totally mechanical, all or nothing fashion." United States v.
    Garreau, 
    658 F.3d 854
    , 858 (8th Cir. 2011) (internal quotation marks omitted). And,
    "[e]ven when law enforcement fails to conduct a search according to standardized
    procedures, this does not mandate the suppression of the evidence discovered as a
    result of the search." United States v. Rowland, 
    341 F.3d 774
    , 780 (8th Cir. 2003).
    "There must be something else; something to suggest the police raised 'the
    inventory-search banner in an after-the-fact attempt to justify' a simple investigatory
    search for incriminating evidence." 
    Id.
     (quoting United States v. Marshall, 
    986 F.2d 1171
    , 1175 (8th Cir. 1993)).
    The district court did not clearly err when determining that the inventory search
    was not merely a pretext to search for evidence. The district court credited Detective
    Mize's testimony that he complied with FBI policy when conducting the inventory
    search. Detective Mize stated he "ruffled" through documents, only attempting to
    look for valuable or dangerous items. We agree with the district court that it was
    reasonable for agents to place cell phones in "airplane mode" and to store the
    electronics in the protective bag. Further, minor deviations from procedure, such as
    failing to indicate which cell phone was found in the bag and which cell phones were
    -10-
    found on Smith's person, do not invalidate the inventory search. See Garreau, 
    658 F.3d at 858
    .
    III.   Validity of the Warrant
    Smith argues that the evidence revealed from the post-warrant search of the
    laptop bag and its contents must be suppressed under Franks v. Delaware, 
    438 U.S. 154
     (1978), because the affidavit in support of the warrant contained material and
    misleading statements. "To prevail on a Franks challenge, a defendant must show the
    following: (1) the affiant officer knowingly and intentionally, or with reckless
    disregard for the truth, included a false or misleading statement in, or omitted
    information from, the affidavit in support of the warrant; and (2) the affidavit would
    not establish probable cause if the allegedly false information is ignored or the omitted
    information is supplemented." United States v. Cowling, 
    648 F.3d 690
    , 695 (8th Cir.
    2011) (internal quotation marks omitted). "Allegations of negligence or innocent
    mistake are insufficient." Franks, 
    438 U.S. at 171
    .
    Smith claims the following statements and omissions invalidate the search
    warrant: 1) failing to explain that agents initially learned of Smith's identity from the
    Los Angeles investigation, 2) failing to include that Smith was traveling to
    Illinois—the location of a cash vault delivery request—for a court hearing, 3) stating
    that all four cell phones and the laptop bag were in Smith's possession at the time of
    the arrest, and 4) implying that the cell phone used to call U.S. Bank was found on
    Smith's person at the time of his arrest, when it may have been found in his bag. The
    district court held that any allegedly false statement or omission was not intentionally
    or recklessly made. Further, the court held that there was "very little, if anything,
    misleading in the affidavit in any respect." After analyzing the record, we believe the
    district court's findings regarding the statements in the warrant are not clearly
    -11-
    erroneous. See United States v. Puckett, 
    466 F.3d 626
    , 629 (8th Cir. 2006) (standard
    of review).5
    Conclusion
    For the foregoing reasons, we affirm.
    ______________________________
    5
    Because we have determined that Smith's arrest, the search and seizure of his
    bag, and the warrant were all valid, Smith's argument that all later obtained evidence
    must be suppressed as fruit of the poisonous tree is without merit.
    -12-