DocketNumber: 12-3919, 13-1515
Citation Numbers: 763 F.3d 689, 2014 WL 3953934, 2014 U.S. App. LEXIS 15642
Judges: Wood, Easterbrook, Kanne
Filed Date: 8/14/2014
Status: Precedential
Modified Date: 10/19/2024
In the United States Court of Appeals For the Seventh Circuit ____________________ Nos. 12-3919 & 13-1515 UNITED STATES OF AMERICA, Plaintiff-Appellee, v. DONELL A. THOMAS and LAMAR CHRISTOPHER CHAPMAN III, Defendants-Appellants. ____________________ Appeals from the United States District Court for the Northern District of Illinois, Eastern Division. No. 10 CR 642 — Elaine E. Bucklo, Judge. ____________________ ARGUED JUNE 5, 2014 — DECIDED AUGUST 14, 2014 ____________________ Before WOOD, Chief Judge, and EASTERBROOK and KANNE, Circuit Judges. WOOD, Chief Judge. Donell Thomas and Lamar Chapman III were convicted of multiple counts of wire fraud after a jury trial. The jury found that they were part of a scheme to fleece real estate lenders by concocting multiple false sales of the same homes and using the loan proceeds from the later transactions to pay off the earlier lenders. Thomas was also convicted of aggravated identity theft for using a real estate 2 Nos. 12-3919 & 13-1515 investor’s identity without permission to craft a phony sale of a home that the victim never owned. Thomas and Chapman both challenge the sufficiency of the evidence underlying their convictions, though neither disputes the government’s general depiction of the scheme. Thomas claims only that the evidence was insufficient to convict him of aggravated identity theft because there was no proof that he created or used the falsified documents at issue. Chapman argues that there was no evidence that he— the defendant at the trial—was the Lamar Chapman identi- fied by the evidence, because no courtroom witness testified to that effect. Chapman also raises due process challenges to his conviction: he asserts that his rights were violated when the government dropped a co-defendant from the indict- ment and that the government failed to turn over unspeci- fied exculpatory evidence. We find that the evidence was sufficient to support the convictions of both defendants, and that Chapman’s due process claims are without merit. We therefore affirm the district court in all respects. I The government introduced a substantial amount of evi- dence detailing the scheme, including testimony from sever- al victims, an FBI investigator, an auditor, and an indicted co-defendant who had already pleaded guilty. As the precise details of the defendants’ misdeeds are largely immaterial to this appeal, we paint their activities with a broad brush and delve into minutiae only when necessary. The government initially charged Thomas, Chapman, Juan Orozco, and Eddie J. Cox, Jr., with wire fraud in July 2010. An indictment and superseding indictment followed Nos. 12-3919 & 13-1515 3 and added Anthony Allen as a defendant; Orozco and Allen pleaded guilty to the charges against them in this latter in- dictment pursuant to plea agreements. A second supersed- ing indictment charged Thomas with eight counts of wire fraud in violation of18 U.S.C. § 1343
, and Chapman with four counts of the same. It also charged Thomas with one count of aggravated identity theft in violation of 18 U.S.C. § 1028A. It was this indictment on which Thomas and Chapman went to trial. Cox, for his part, was dismissed from the case pursuant to a government motion shortly after the grand jury returned the second superseding indictment. The trial evidence showed that Thomas and Allen were the ringleaders of the operation, which was run out of a business called Chicago Abstract and Title Company. The group targeted short-term real estate lenders, referred to as “transactional lenders” at trial. Those lenders provide fund- ing for structured real estate transactions called “A to B, B to C” transactions: the property is first sold by the original owner (A) to a real estate investor or agent (B), and then re- sold (typically within 48 hours) to an end-purchaser (C). Critically, all aspects of the transaction are to be contemplat- ed in advance. The transactional lenders provide the funds to finance the front-end (A to B) transaction, although it might be more accurate to say they provide the assurance of funds, as they generally require the second sale to be com- pleted before they will release the funds for the first, in order to avoid taking on any risk. The defendants exploited this funding model by falsely representing to the lenders that they had completed back-end (B to C) sales of homes they acquired. This allowed them to secure release of the transac- tional lenders’ funds and enabled them to take a cut for themselves. They then repaid the short-term loan money by 4 Nos. 12-3919 & 13-1515 falsifying another B-to-C transaction involving the same property with a different transactional lender, and used the loan proceeds from that “sale” to pay back the previous lender, in much the same manner that one would run a Ponzi scheme. Thomas and Allen recruited Orozco, a closing agent at Chicago Abstract, to process the transactions, release the short-term lenders’ funds, and pay back the lenders with proceeds from a different lender. Chapman, who has never been licensed to practice law, became involved as the opera- tion’s putative attorney, corresponding with transactional lenders to discuss funding for the deals and putting them off the scent of the rotten transactions lying behind the deals. Though Thomas proved adept at using fake names to avoid detection, the conspirators generally used real homes in connection with their fraudulent transactions; that is, the “A-to-B” portion of the structured sale was real, and only the “B-to-C” sale was a fake. In at least one case, however, Thomas concocted a “sale” that was a fiction from the start; this was the basis for his aggravated identity theft charge. Among the documents found at Chicago Abstract’s office when it was finally audited at the request of a jilted lender was an agreement to sell a home on South Langley Avenue in Chicago, signed by purported homeowner Oscar Corona with Thomas listed as the buyer. This document was accom- panied by a HUD-1 statement for the “sale” dated October 8, 2008. Further documents included a letter from the lender about the disbursement of the $1,050,000 paid for the proper- ty and documents related to the back-end of the “sale,” in- cluding an agreement signed by Thomas to sell to an end- buyer. Nos. 12-3919 & 13-1515 5 Corona is an actual person and real estate investor with whom Thomas had worked previously. There is no indication that he was involved with the scheme or knew about the fraud Thomas was engineering at the back end of the transaction. Corona testified at trial that he never owned the home on South Langley and had no idea that Thomas was using his name for the sale. He stated that he never signed or initialed the sales documents; to the contrary, he testified, the signature on the document “looked like” Thomas’s, and the buyer listed on the documents was a corporation that Thomas had used when actually buying property from him. The defendants were caught when a targeted lender dis- covered that a person named “Chad Marks” who had re- quested transactional funding was not an employee of the title company he claimed to be. The lender contacted law en- forcement and cooperated in an investigation, and Thomas was arrested immediately after completing the purported closing. The others’ involvement came to light from there. Thomas was ultimately convicted of eight counts of wire fraud and sentenced to serve 70 months in prison on each, to run concurrently, as well as one count of aggravated identity theft for which he was sentenced to 24 months’ imprison- ment, to run consecutively to the other counts. Chapman was convicted of four counts of wire fraud and sentenced to serve 65-month concurrent terms of imprisonment. II On appeal, Thomas urges that the evidence was insuffi- cient to support his conviction for aggravated identity theft. When a defendant challenges the sufficiency of the evidence 6 Nos. 12-3919 & 13-1515 underlying a conviction, we will reverse only if no rational trier of fact, viewing the evidence in the light most favorable to the government, could have found the defendant guilty beyond a reasonable doubt. United States v. Chapman,692 F.3d 822
, 825 (7th Cir. 2012). This is an “extremely deferen- tial” standard that presents a “nearly insurmountable hur- dle” for a defendant. United States v. Teague,956 F.2d 1427
, 1433 (7th Cir. 1992). The aggravated identity theft statute, 18 U.S.C. § 1028A(a)(1), reads: Whoever, during and in relation to any felony viola- tion enumerated in subsection (c), knowingly trans- fers, possesses, or uses, without lawful authority, a means of identification of another person shall, in ad- dition to the punishment provided for such felony, be sentenced to a term of imprisonment of 2 years. To prove aggravated identity theft, the government must es- tablish beyond a reasonable doubt that the defendant: 1) knowingly transferred, possessed, or used; 2) a “means of identification”; 3) that he knew belonged to another person, see Flores-Figueroa v. United States,556 U.S. 646
, 657 (2009); 4) with knowledge that such use was without lawful authority; 5) in connection with a qualifying felony. Thomas challenges the sufficiency of the government’s evidence only with respect to the first of these elements: knowing transfer, possession, or use. He was prudent to lim- it his appeal in this way, as the evidence easily supports the other elements. Forging someone’s name on a document is surely a knowing use of that name without lawful authority, and a name is a “means of identification” within the mean- Nos. 12-3919 & 13-1515 7 ing of the statute. See United States v. Spears,729 F.3d 753
, 755 (7th Cir. 2013) (en banc). Thomas knew that Corona was a real person because they had done over a dozen property deals together. And wire fraud is a qualifying felony under 18 U.S.C. § 1028A(c)(5). That leaves the “knowing use” element, which breaks down into two parts: whether Thomas was the person who filled out the false sales documents with Corona’s name, and whether those documents were ever used or if the plan was abandoned before he did something with them. On the latter score, there can be no serious question that the evidence was sufficient to show that Thomas used the documents. The evidence presented at trial included a letter from the targeted transactional lender, First Funding, informing Orozco that Chicago Abstract would “receive funds totaling $1,050,000 on Wednesday October 8 for the real property interests … [at] S. Langley, Chicago IL 60636.” The completed HUD-1 form and documents for Thomas’s subsequent sale of the home provide further bases for the jury’s finding that the documents were used. The other question is whether Thomas was the person who filled out the false statements. We have no trouble con- cluding that it was permissible for the jury to find that he did so even though no person actually saw him fabricate the documents. Corona testified that the signature on the docu- ments “looked like” Thomas’s, and that details such as the name of the company used to purchase the property (Bosch & Cohen) matched prior transactions he had completed with Thomas. The jury could make its own comparison of that signature with other authentic examples of Thomas’s signa- ture in the record. See FED. R. EVID. 901(b)(3). Orozco, testify- 8 Nos. 12-3919 & 13-1515 ing pursuant to his plea agreement, verified that all of the documents came from Chicago Abstract, and that Thomas was generally the person who provided information to transactional lenders in the scheme. The evidence is circum- stantial, to be sure, but it is substantial, and direct evidence is not required to find an element of a crime beyond a rea- sonable doubt. See United States v. Briscoe,896 F.2d 1476
, 1505 (7th Cir. 1990). All of this added up to enough evidence to convict Thomas of aggravated identity theft, and we therefore affirm that conviction. III Chapman, like Thomas, has no squabble with the details of the wire fraud scheme. His main argument is that no evi- dence was introduced at trial to link him, the person sitting at the defendant’s table, with the “Lamar Chapman” who participated in the scheme. In this connection, he places great weight on the fact that no witness made an in-court identification of him at trial. In essence, Chapman is arguing that identification is unique among facts required for conviction, in that (in his view) it can be established exclusively through direct, in- court testimony, and never through circumstantial evidence. That is an interesting theory, but it is not one for which we find any support in the law. Though in-court identification is preferred to prove identity, it is not required if the defend- ant’s identity can be inferred from the circumstances. See United States v. Prieto,549 F.3d 513
, 525 (7th Cir. 2008). A good example of circumstantial proof of identity can be found in United States v. Weed, in which we upheld the con- Nos. 12-3919 & 13-1515 9 viction without in-court identification of a person who was caught carrying some $28,000 in German and U.S. currency through customs after he answered “no” to the question whether he was carrying over $5,000 in currency.689 F.2d 752
, 753–54 (7th Cir. 1982). Despite the lack of in-court iden- tification, we were satisfied that identity could be inferred because none of the witnesses ever hinted that the man on trial was not the same Weed that they had stopped with the currency. Both the prosecution and defense counsel referred to Weed as the person involved in the events, and defense counsel never objected to the prosecution’s references to Weed as the accused.Id.
at 755–56. In the final analysis, the defendant’s identity is nothing more or less than an element that must be established be- yond a reasonable doubt in order to demonstrate guilt. That is, of course, a demanding standard, and if there were any reason to think that the “Chapman” in the courtroom was not the same “Chapman” involved in the scheme, the de- fense was free to make this argument, and the prosecution would have borne the risk of uncertainty. Identity, in short, is not a unique issue that can be proved only by someone pointing a finger at the defendant in the courtroom. Indeed, the Federal Rules of Evidence allow for a variety of means of proving identity: it is a permissible use of “other acts” evi- dence under Rule 404(b)(2), and Rule 901(b) lists several ways by which evidence can be linked to a defendant be- yond direct witness testimony, including handwriting and voice comparisons, distinctive characteristics, and telephone records. If the evidence at trial was sufficient to permit jurors to find beyond a reasonable doubt that the man seated at the defense table was the same person referred to in the account of the offense, then there is no reason to overturn the jury’s 10 Nos. 12-3919 & 13-1515 conviction based on the government’s alleged failure to prove identity. Judged against that standard, a reasonable jury could find that Chapman’s identity as the “Chapman” identified by the evidence was established beyond a reasonable doubt. Chapman’s son-in-law testified that Chapman ran one of the “businesses” identified with the scheme (the firm of Alexan- der, Cavanaugh, and Block), and he identified Chapman’s signature on a letter to one of the targeted lenders. The son- in-law never suggested that the person on trial was not his father-in-law, nor that there was any sort of identity mix-up. If there were anything to this point, Chapman could have cross-examined his son-in-law about it. The fact that he did not is one reason for the jury to infer, reasonably, that the correct “Chapman” had been brought before the court. Fur- ther evidence supporting that inference included telephone records from AT&T that linked Chapman’s phone to one used in the scheme and provided a link to his address. Another reason the jury had no cause to doubt that the right man was on trial was his lawyer’s trial strategy, which was inconsistent with an identity-based defense. At one point during closing arguments, counsel argued that Chap- man “g[ot] involved” in the scheme by speaking with one of the targets. He argued that Chapman was only trying to help her, not to delude her. This statement would make little sense if Chapman wanted the jury to believe that the gov- ernment was charging the wrong person named “Chap- man,” or that Chapman’s name was being used without his permission. We recognize that counsel’s arguments are gen- erally not evidence. See United States v. Henry,2 F.3d 792
, 795 (7th Cir. 1993). But unlike, for example, a characterization of Nos. 12-3919 & 13-1515 11 fact that does not conform to the evidence, counsel’s version of events that is at odds with the defendant’s own asserted theory of the facts comes close to being a factual concession. Cf. United States v. Rusan,460 F.3d 989
, 993–94 (8th Cir. 2006) (concessions made by counsel as part of trial strategy can be considered evidence). That said, we need not rely on the statement or decide whether counsel crossed the line divid- ing “zealous advocacy” and admissions. See Ferroline Corp. v. General Aniline & Film Corp.,207 F.2d 912
, 916–17 (7th Cir. 1953). The jury had sufficient grounds to infer Chapman’s identity even without characterizing counsel’s argument as a concession. Proof of identity can be especially difficult when crimes can be committed from a remote location and without direct contact with the victim—a possibility that is likely to become increasingly common as technology continues to evolve. Chapman played his role in the scheme entirely from the other end of a cell phone or via correspondence, and so it would be all but impossible for any of the victims or investi- gators to take the stand and say that Chapman was the per- son they “saw” committing the wire fraud. Someone may be able to identify the person in the courtroom as Lamar Chris- topher Chapman, but that would hardly solve the problem of proving that he was the Lamar Chapman involved in the scheme; it would prove only that 1) this man is named La- mar Chapman and 2) the Lamar Chapman name was used in the scheme. With such crimes, juries will often be forced to rely on circumstantial evidence to determine that the de- fendant has been correctly identified. That evidence may be substantial, but it does require in the end that an inference be drawn. But, as we said at the outset, circumstantial evi- dence is entirely acceptable to prove even such a weighty 12 Nos. 12-3919 & 13-1515 point as who pulled the trigger. It is also permissible to use for identity. In fact, given mounting scientific evidence about the unreliability of eyewitness identification, establishing or bolstering evidence of the defendant’s identity through means other than eyewitness testimony may in many cases be desirable. See, e.g., Hal Arkowitz & Scott O. Lilienfeld, Why Science Tells Us Not to Rely on Eyewitness Accounts, SCI. AM., Jan.-Feb. 2010, available at http://www.scientific american.com/article/do-the-eyes-have-it/?page=1 (last visit- ed Aug. 14, 2014); Henry F. Fradella, Why Judges Should Ad- mit Expert Testimony on the Unreliability of Eyewitness Testimo- ny, 2006 FED. CTS. L. REV. 3. Finally, Chapman’s case is an es- pecially unattractive one in which to break new ground, since he did not raise this point at trial and did not present any argument to the jury that might have caused it to ques- tion the identity of the defendant. The last issues before us are Chapman’s due process ar- guments. He first claims that the government should be ju- dicially estopped from prosecuting him (we assume) be- cause it initially indicted Eddie J. Cox as part of the scheme, but later dismissed Cox from the indictment. This change of position on Cox, says Chapman, deprived him (Chapman) of due process. He does not indicate why that should be so. The requirements for judicial estoppel—a party taking two inconsistent litigating positions, successfully persuading a court to accept the earlier position before asserting the latter, and thereby deriving an unfair advantage if not estopped— are not met here. See Wells v. Coker,707 F.3d 756
, 760 (7th Cir. 2013) (estoppel requirements). No court ever accepted any position regarding Eddie Cox’s role in the scheme. And there is certainly no rule requiring the government to bring all de- fendants initially charged into a case to trial or plead them Nos. 12-3919 & 13-1515 13 out, lest they be “estopped” from trying the other defend- ants. Here, for example, the government dropped Cox be- cause it determined that it was Thomas using Cox’s name on the relevant documents, rather than Cox himself. There is nothing to this point. Finally, Chapman argues that the government failed to turn over evidence favorable to him, as required under Brady v. Maryland,373 U.S. 83
(1963). He does not identify what this evidence is. He just thinks that it must exist because, he reasons, whatever caused the government to drop Cox from the case must also have been favorable to Chapman. He points to nothing, however, to support that hypothesis. And in any event, without a showing that certain evidence has been withheld there is nothing to support a Brady claim. IV In today’s world, as this scheme illustrates, frauds can be committed without ever meeting the victims face-to-face. The evidence here was sufficient to show, for Chapman, that the government had the right person in the dock. It also suf- ficed to prove the aggravated identity theft charge against Thomas. Finally, neither of Chapman’s due process argu- ments has any merit. We AFFIRM the judgments entered against both defendants.
Brady v. Maryland , 83 S. Ct. 1194 ( 1963 )
United States v. John Weed , 689 F.2d 752 ( 1982 )
United States v. Prieto , 549 F.3d 513 ( 2008 )
United States v. Ricardo Rusan , 460 F.3d 989 ( 2006 )
United States v. Joseph W. Henry , 2 F.3d 792 ( 1993 )
Flores-Figueroa v. United States , 129 S. Ct. 1886 ( 2009 )
United States v. Kenneth E. Teague , 956 F.2d 1427 ( 1992 )
united-states-v-phyliss-briscoe-folorunsho-ogundipe-abdul-disu-isaac , 896 F.2d 1476 ( 1990 )