Filed: Mar. 13, 2020
Latest Update: Mar. 13, 2020
Summary: Case: 19-11394 Date Filed: 03/13/2020 Page: 1 of 12 [DO NOT PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT _ No. 19-11394 Non-Argument Calendar _ D.C. Docket No. 1:18-cr-20760-CMA-1 UNITED STATES OF AMERICA, Plaintiff–Appellee, versus ISAIAH MEME, Defendant–Appellant. _ Appeal from the United States District Court for the Southern District of Florida _ (March 13, 2020) Before BRANCH, LUCK, and ANDERSON, Circuit Judges. PER CURIAM: Case: 19-11394 Date Filed: 03/13/2020
Summary: Case: 19-11394 Date Filed: 03/13/2020 Page: 1 of 12 [DO NOT PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT _ No. 19-11394 Non-Argument Calendar _ D.C. Docket No. 1:18-cr-20760-CMA-1 UNITED STATES OF AMERICA, Plaintiff–Appellee, versus ISAIAH MEME, Defendant–Appellant. _ Appeal from the United States District Court for the Southern District of Florida _ (March 13, 2020) Before BRANCH, LUCK, and ANDERSON, Circuit Judges. PER CURIAM: Case: 19-11394 Date Filed: 03/13/2020 P..
More
Case: 19-11394 Date Filed: 03/13/2020 Page: 1 of 12
[DO NOT PUBLISH]
IN THE UNITED STATES COURT OF APPEALS
FOR THE ELEVENTH CIRCUIT
________________________
No. 19-11394
Non-Argument Calendar
________________________
D.C. Docket No. 1:18-cr-20760-CMA-1
UNITED STATES OF AMERICA,
Plaintiff–Appellee,
versus
ISAIAH MEME,
Defendant–Appellant.
________________________
Appeal from the United States District Court
for the Southern District of Florida
________________________
(March 13, 2020)
Before BRANCH, LUCK, and ANDERSON, Circuit Judges.
PER CURIAM:
Case: 19-11394 Date Filed: 03/13/2020 Page: 2 of 12
Isaiah Meme was convicted of access device fraud, in violation of 18 U.S.C.
§ 1029(a)(2); aggravated identity theft, in violation of 18 U.S.C. § 1028A(a)(1);
and possession of 15 or more unauthorized access devices, in violation of 18
U.S.C. § 1029(a)(3). He appeals these convictions. On appeal, Meme argues that
there was insufficient evidence to support his convictions. For the reasons that
follow, we affirm Meme’s convictions.
BACKGROUND
Because Meme appeals his conviction, specifically arguing that the evidence
was insufficient to support a conviction, we review the evidence that was presented
at trial in some detail. Isaiah Meme was indicted on September 18, 2018, in a
multiple-count indictment alleging 1 count of access device fraud, in violation of
18 U.S.C. §1029(a)(2) (Count 1); 6 counts of aggravated identity theft, in violation
of 18 U.S.C. § 1028A(a)(1) (Counts 2–5, 7–8); and 1 count of possession of 15 or
more unauthorized access devices, in violation of 18 U.S.C. § 1029(a)(3) (Count
6). On the second day of trial, the district court granted the government’s motion
to dismiss Counts 2 and 3 on the grounds that Meme may have been a minor when
the offenses were committed.
Testimony at trial revealed the following. Robert Novakowski, an
investigator with JPMorgan Chase Bank, was investigating compromised debit
cards following customer complaints. Novakowski received a list of compromised
2
Case: 19-11394 Date Filed: 03/13/2020 Page: 3 of 12
debit cards and a list of transactions for those cards and obtained video surveillance
of the person making the transactions. He testified that images captured on drive-
up ATM cameras showed that Meme was making transactions with cards
belonging to other people and with counterfeit payment cards. Some of those
images showed Meme making transactions while driving a black Ford Mustang
with a bumper sticker. Novakowski sought the assistance of law enforcement in
identifying the person in the videos and images, and U.S. Secret Service Agent
Sterling Posten identified that person as Meme. Novakowski conceded that he
could not see the eye shape or eye color of the person in the images, but that the
person had the same face as Meme and that he independently reviewed all photos
and videos and, in so doing, was able to identify Meme as the person making the
transactions.
Secret Service Agent Greg Narano testified that the Secret Service had
obtained surveillance of people conducting unauthorized ATM withdrawals, one of
whom was Meme. Accordingly, the Secret Service set up surveillance on several
ATMs in an attempt to locate a black Mustang that was connected to some of these
unauthorized withdrawals. While conducting surveillance, Narano saw a person
driving a black Mustang with a bumper sticker use an ATM. Narano maintained
surveillance, identified the person in the car as Meme, and took several photos of
him. He followed Meme to Meme’s father’s house and continued his surveillance.
3
Case: 19-11394 Date Filed: 03/13/2020 Page: 4 of 12
Narano conceded in cross-examination that the Mustang was not registered in
Meme’s name, that Meme’s father owned the house, and that, based on his
surveillance at the ATM, he was unable to determine the build of the person in the
car or whether that person had facial hair. On redirect, he emphasized that he was
able to identify the person in the Mustang as Meme because he had an
unobstructed view of Meme’s face at one point.
Secret Service Agent Ken Adams testified to the following. He, like
Narano, was assigned to conduct surveillance at a Chase Bank ATM, saw a black
Mustang pull up to the ATM, watched the driver commit a fraudulent transaction,
identified the driver as Meme, and followed Meme to Meme’s father’s house. He
also participated in Meme’s arrest, after which he recovered two cell phones from
the Mustang. On cross-examination, Adams conceded that there were no debit
cards, credit cards, or large amounts of cash in the car when Meme was arrested.
Agent Posten then testified. He executed a search warrant of Meme’s
father’s house and in one bedroom, recovered five plastic cards, a laptop, a
firearm-training certificate in Meme’s name, several pieces of unopened mail, and
high school textbooks. Accordingly, Posten concluded that the bedroom belonged
to Meme. In a room that he concluded belonged to Meme’s brother, he recovered
a plastic card, a personal check not belonging to anybody living in the house, a
4
Case: 19-11394 Date Filed: 03/13/2020 Page: 5 of 12
money order, and a re-encoded plastic card.1 In the living room of the house,
Posten found a vehicle title belonging to Meme and traffic citations issued to
Meme. He also found other pieces of mail, like bank records, that did not belong
to anyone in the house—which he concluded was an indication of fraud taking
place in the house. Posten conceded that the Mustang was a rental vehicle that was
not rented by Meme; that according to the Florida Department of Highway Safety
and Motor Vehicles, Meme did not live with his father; and that none of the cards
in Meme’s bedroom had been re-encoded.
Secret Service Agents Marcos Morales and Allen Thomasson testified that
they had analyzed the phones recovered during Meme’s arrest. Morales
discovered that one of the phones was registered to a user identified as
“MasonM1267.” Thomasson’s analysis of the text messages in the phones
revealed that one of the phones had received text messages that identified the
recipient (and thus, the phone owner) as Meme. He also reviewed the email
account on the phone and discovered several emails received by an account
belonging to “MasonM1267” and several emails containing credit and debit card
1
In this context, re-encoding a plastic card serves to change the data on the card—in other words,
from what source the card pulled funds or registered transactions—so that it no longer matched
the information embossed on the card, e.g., the name or displayed number. See, e.g., United States
v. Cruz,
713 F.3d 600, 608 (11th Cir. 2013) (discussing re-encoding credit and debit cards). Re-
encoding cards is frequently charged as a violation of section 1029(a)(3), which prohibits the
knowing, and with intent to defraud, possession of “devices which are counterfeit or unauthorized
access devices.” E.g., United States v. Grimon,
923 F.3d 1302, 1306–1307 (11th Cir. 2019) (citing
18 U.S.C. § 1029(a)(3).
5
Case: 19-11394 Date Filed: 03/13/2020 Page: 6 of 12
numbers. Thomasson also found data on the phone showing that the phone’s
owner had visited commercial background search websites (which are frequently
used for identity theft and fraud) and disposable email service websites.
On the other phone, Thomasson also found information that identified Meme
as the account owner—the phone had sent a picture of Meme’s driver’s license and
the received texts referred to the phone’s owner as Meme. He also discovered
pictures of the Mustang, email accounts registered to “MasonM1267,” debit card
numbers and personal identification numbers, and correspondence relating to
purchasing debit card numbers and PINs on the phone, and that the phone had
visited commercial background search websites and websites for selling stolen
card numbers.
Thomasson also testified that he analyzed the laptop recovered from what
Posten had identified as Meme’s room. He discovered that the computer’s user
account was “MasonM1627.” He also found credit card and debit card numbers,
the card-owners’ personal information, software used to read and encode magnetic
strips in cards, software used to read and encode card microchips, bank
identification numbers, and bank routing numbers on the computer. All told,
Thomasson estimated that hundreds of individuals’ personal information and 120
different debit and credit card numbers were on Meme’s laptop. He also
discovered that the user of the laptop had visited websites selling credit card
6
Case: 19-11394 Date Filed: 03/13/2020 Page: 7 of 12
numbers and commercial background search websites. On cross-examination, he
conceded that he could not tell whether someone other than Meme had used the
laptop and phones.
After the government rested its case, Meme moved for a judgment of
acquittal. He argued that the government had failed to prove the existence of some
of the victims named in the indictment, venue was improper, and some of the
alleged criminal acts occurred while he was a minor. The district court denied
Meme’s motion.
Meme’s case solely consisted of calling his stepmother, Willaine Amedee,
who testified that Meme had never lived in his father’s house or kept any
belongings in the house. Meme rested, and then renewed his motion for a
judgment of acquittal based on insufficient evidence. The district court again
denied his motion.
The jury found Meme guilty of Counts 1 and 4–8. The district court
sentenced Meme to a 39-month prison term, which consisted of 15-month
concurrent sentences on Counts 1 and 6 and a 24-month sentence on Counts 4–5
and 7–8. Meme timely appealed to us.
ANALYSIS
On appeal, Meme argues that the evidence was insufficient to support his
conviction. We review the sufficiency of the evidence de novo, “viewing the
7
Case: 19-11394 Date Filed: 03/13/2020 Page: 8 of 12
evidence in the light most favorable to the government and drawing all reasonable
inferences in favor of the verdict.” United States v. Schier,
438 F.3d 1104, 1107
(11th Cir. 2006). The district court’s denial of “motions for a judgment of acquittal
will be upheld if a reasonable trier of fact could conclude that the evidence
establishes the defendant’s guilt beyond a reasonable doubt.” United States v.
Rodriguez,
218 F.3d 1243, 1244 (11th Cir. 2000). “[T]he issue is not whether a
jury reasonably could have acquitted but whether it reasonably could have found
guilt beyond a reasonable doubt,” so we will not reverse a conviction solely
because the defendant “put forth a reasonable hypothesis of innocence” at trial.
United States v. Campo,
840 F.3d 1249, 1258 (11th Cir. 2016) (quotation omitted).
We are bound by a jury’s “rejection of the inferences raised by the defendant.”
United States v. Hernandez,
433 F.3d 1328, 1334–35 (11th Cir. 2005).
Furthermore, we consider all evidence produced at trial against the defendant in
evaluating his claim of insufficient evidence. United States v. Thomas,
8 F.3d
1552, 1558 n.12 (11th Cir. 1993).
An individual is guilty of access device fraud when he “knowingly and with
intent to defraud traffics in or uses one or more unauthorized access devices during
any one-year period, and by such conduct obtains anything of value aggregating
$1,000 or more during that period.” 18 U.S.C. § 1029(a)(2). An individual is
guilty of possession of 15 or more unauthorized access devices if he possesses such
8
Case: 19-11394 Date Filed: 03/13/2020 Page: 9 of 12
devices knowingly and with intent to defraud.
Id. § 1029(a)(3). An individual is
guilty of aggravated identity theft when he “knowingly transfers, possesses, or
uses, without lawful authority, a means of identification of another person” during
a felony violation of, among other things, “any provision contained in this chapter”
relating to fraud.
Id. §§ 1028A(a)(1), (c)(4). An “‘access device’ means any card,
. . . account number, electronic serial number, . . . personal identification number,
. . . or other means of account access that can be used, alone or in conjunction with
another access device, to obtain money . . . or that can be used to initiate a transfer
of funds.”
Id. § 1029(e)(1). An “‘unauthorized access’ device means any access
device that is lost, stolen, . . . or obtained with intent to defraud.”
Id. § 1029(e)(3).
We read Meme’s arguments on appeal as essentially arguing for a more
favorable inference of the facts. He argues that fraud was taking place at his
father’s house (but he was not a part of it), that the Secret Service agents could not
identify who used the phones or computer, that the ATM surveillance photos were
poor-quality and did not lend themselves to identification, that no one described
the physical characteristics of the person who was using the access devices, that
Novakowski’s identification of him was tainted, and that no counterfeit access
devices were found in his “actual or constructive possession.”
These arguments are unavailing. These arguments echo what Meme argued
at trial—both to the district court and to the jury in his arguments for acquittal—
9
Case: 19-11394 Date Filed: 03/13/2020 Page: 10 of 12
and the jury was entitled to reject those arguments and draw a different inference.
We are not able to revisit the inference that the jury drew.
Hernandez, 433 F.3d at
1334–35. In any event, we conclude that the evidence at trial was sufficient to
support Meme’s conviction for two reasons: (1) the phone and laptop evidence
showed that Meme was committing access device fraud and (2) Meme was
identified as the person committing access device fraud. We address each in turn.
First, the testimony at trial clearly showed—although somewhat
circumstantially—that Meme was committing access device fraud. With regard to
the phones, the agents testified that Meme visited commercial background search
websites and websites where he could purchase stolen card numbers, had stolen
card numbers stored on his phones, and had correspondence relating to his
purchase thereof. The agents found similar evidence on Meme’s laptop.
Meme does not, and cannot, seriously contest the evidence found on both
devices—and so he instead suggests that other people were using the devices. We
wholly reject this argument, because it requires us to substitute the jury’s
reasonable inference based on the evidence presented at trial for an unreasonable
inference that happens to be more favorable to Meme. We think it is clear that the
devices both belonged to, and were used by, Meme. Contrary to Meme’s
argument, the phones were found in his “actual or constructive possession,” i.e.,
the car he was driving at the time he was arrested. And while the laptop was found
10
Case: 19-11394 Date Filed: 03/13/2020 Page: 11 of 12
in a room that Agent Posten had merely identified as Meme’s room, the evidence
certainly supports an inference that the room was Meme’s. His argument that he
did not live in the house, and thus that the room was not his, is strongly
contradicted by the extent to which his belongings were found both in the room
and elsewhere in the house. It is not likely that Meme’s firearm-training
certificate, vehicle title, and traffic citations would be in a house where he did not
live. Finally, we find it significant that the user account on Meme’s laptop was
identical to the username of the email accounts on Meme’s phones.
Second, Meme was identified as the person committing identity fraud.
Though it is true that Novakowski’s identification was at least partially predicated
on Agent Posten’s suggestion, we note that he testified that he independently
reviewed all of the videos and images of the fraudulent ATM transactions and he
provided an in-court identification of Meme. As we have explained previously,
“[a]n in-court identification, even if preceded by a suggestive out-of-court
identification procedure, is nevertheless admissible if the in-court identification has
an independent source.” United States v. Cannington,
729 F.2d 702, 711 (11th Cir.
1984).
But even if we concluded that Novakowski’s identification of Meme was
impermissible, we note that there are two additional—and more persuasive—
witnesses who identified Meme. Both Agents Adams and Narano identified Meme
11
Case: 19-11394 Date Filed: 03/13/2020 Page: 12 of 12
as the person in the black Mustang who made fraudulent transactions at an ATM.
Their identification is significant—both were surveilling him and followed him to
his father’s house, and Adams participated in Meme’s arrest.
Accordingly, we conclude that the evidence was sufficient to support
Meme’s conviction. The evidence as to the devices—both the phones in Meme’s
constructive possession at the time of his arrest and the laptop that was clearly
Meme’s—is persuasive evidence of Meme’s fraud. And the identification of
Meme, especially the eyewitness testimony of Secret Service agents who saw
Meme committing access device fraud, is even more persuasive. We reject
Meme’s arguments to the contrary.
AFFIRMED.
12