Elawyers Elawyers
Washington| Change

United States v. Isaiah Meme, 19-11394 (2020)

Court: Court of Appeals for the Eleventh Circuit Number: 19-11394 Visitors: 5
Filed: Mar. 13, 2020
Latest Update: Mar. 13, 2020
Summary: Case: 19-11394 Date Filed: 03/13/2020 Page: 1 of 12 [DO NOT PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT _ No. 19-11394 Non-Argument Calendar _ D.C. Docket No. 1:18-cr-20760-CMA-1 UNITED STATES OF AMERICA, Plaintiff–Appellee, versus ISAIAH MEME, Defendant–Appellant. _ Appeal from the United States District Court for the Southern District of Florida _ (March 13, 2020) Before BRANCH, LUCK, and ANDERSON, Circuit Judges. PER CURIAM: Case: 19-11394 Date Filed: 03/13/2020
More
           Case: 19-11394   Date Filed: 03/13/2020   Page: 1 of 12



                                                         [DO NOT PUBLISH]



            IN THE UNITED STATES COURT OF APPEALS

                    FOR THE ELEVENTH CIRCUIT
                      ________________________

                            No. 19-11394
                        Non-Argument Calendar
                      ________________________

                 D.C. Docket No. 1:18-cr-20760-CMA-1



UNITED STATES OF AMERICA,

                                                              Plaintiff–Appellee,

                                  versus

ISAIAH MEME,

                                                         Defendant–Appellant.

                      ________________________

               Appeal from the United States District Court
                   for the Southern District of Florida
                     ________________________

                            (March 13, 2020)

Before BRANCH, LUCK, and ANDERSON, Circuit Judges.

PER CURIAM:
              Case: 19-11394    Date Filed: 03/13/2020   Page: 2 of 12



      Isaiah Meme was convicted of access device fraud, in violation of 18 U.S.C.

§ 1029(a)(2); aggravated identity theft, in violation of 18 U.S.C. § 1028A(a)(1);

and possession of 15 or more unauthorized access devices, in violation of 18

U.S.C. § 1029(a)(3). He appeals these convictions. On appeal, Meme argues that

there was insufficient evidence to support his convictions. For the reasons that

follow, we affirm Meme’s convictions.

                                 BACKGROUND

      Because Meme appeals his conviction, specifically arguing that the evidence

was insufficient to support a conviction, we review the evidence that was presented

at trial in some detail. Isaiah Meme was indicted on September 18, 2018, in a

multiple-count indictment alleging 1 count of access device fraud, in violation of

18 U.S.C. §1029(a)(2) (Count 1); 6 counts of aggravated identity theft, in violation

of 18 U.S.C. § 1028A(a)(1) (Counts 2–5, 7–8); and 1 count of possession of 15 or

more unauthorized access devices, in violation of 18 U.S.C. § 1029(a)(3) (Count

6). On the second day of trial, the district court granted the government’s motion

to dismiss Counts 2 and 3 on the grounds that Meme may have been a minor when

the offenses were committed.

      Testimony at trial revealed the following. Robert Novakowski, an

investigator with JPMorgan Chase Bank, was investigating compromised debit

cards following customer complaints. Novakowski received a list of compromised


                                         2
                Case: 19-11394   Date Filed: 03/13/2020   Page: 3 of 12



debit cards and a list of transactions for those cards and obtained video surveillance

of the person making the transactions. He testified that images captured on drive-

up ATM cameras showed that Meme was making transactions with cards

belonging to other people and with counterfeit payment cards. Some of those

images showed Meme making transactions while driving a black Ford Mustang

with a bumper sticker. Novakowski sought the assistance of law enforcement in

identifying the person in the videos and images, and U.S. Secret Service Agent

Sterling Posten identified that person as Meme. Novakowski conceded that he

could not see the eye shape or eye color of the person in the images, but that the

person had the same face as Meme and that he independently reviewed all photos

and videos and, in so doing, was able to identify Meme as the person making the

transactions.

      Secret Service Agent Greg Narano testified that the Secret Service had

obtained surveillance of people conducting unauthorized ATM withdrawals, one of

whom was Meme. Accordingly, the Secret Service set up surveillance on several

ATMs in an attempt to locate a black Mustang that was connected to some of these

unauthorized withdrawals. While conducting surveillance, Narano saw a person

driving a black Mustang with a bumper sticker use an ATM. Narano maintained

surveillance, identified the person in the car as Meme, and took several photos of

him. He followed Meme to Meme’s father’s house and continued his surveillance.


                                          3
              Case: 19-11394    Date Filed: 03/13/2020   Page: 4 of 12



Narano conceded in cross-examination that the Mustang was not registered in

Meme’s name, that Meme’s father owned the house, and that, based on his

surveillance at the ATM, he was unable to determine the build of the person in the

car or whether that person had facial hair. On redirect, he emphasized that he was

able to identify the person in the Mustang as Meme because he had an

unobstructed view of Meme’s face at one point.

      Secret Service Agent Ken Adams testified to the following. He, like

Narano, was assigned to conduct surveillance at a Chase Bank ATM, saw a black

Mustang pull up to the ATM, watched the driver commit a fraudulent transaction,

identified the driver as Meme, and followed Meme to Meme’s father’s house. He

also participated in Meme’s arrest, after which he recovered two cell phones from

the Mustang. On cross-examination, Adams conceded that there were no debit

cards, credit cards, or large amounts of cash in the car when Meme was arrested.

      Agent Posten then testified. He executed a search warrant of Meme’s

father’s house and in one bedroom, recovered five plastic cards, a laptop, a

firearm-training certificate in Meme’s name, several pieces of unopened mail, and

high school textbooks. Accordingly, Posten concluded that the bedroom belonged

to Meme. In a room that he concluded belonged to Meme’s brother, he recovered

a plastic card, a personal check not belonging to anybody living in the house, a




                                         4
                Case: 19-11394        Date Filed: 03/13/2020       Page: 5 of 12



money order, and a re-encoded plastic card.1 In the living room of the house,

Posten found a vehicle title belonging to Meme and traffic citations issued to

Meme. He also found other pieces of mail, like bank records, that did not belong

to anyone in the house—which he concluded was an indication of fraud taking

place in the house. Posten conceded that the Mustang was a rental vehicle that was

not rented by Meme; that according to the Florida Department of Highway Safety

and Motor Vehicles, Meme did not live with his father; and that none of the cards

in Meme’s bedroom had been re-encoded.

       Secret Service Agents Marcos Morales and Allen Thomasson testified that

they had analyzed the phones recovered during Meme’s arrest. Morales

discovered that one of the phones was registered to a user identified as

“MasonM1267.” Thomasson’s analysis of the text messages in the phones

revealed that one of the phones had received text messages that identified the

recipient (and thus, the phone owner) as Meme. He also reviewed the email

account on the phone and discovered several emails received by an account

belonging to “MasonM1267” and several emails containing credit and debit card


1
  In this context, re-encoding a plastic card serves to change the data on the card—in other words,
from what source the card pulled funds or registered transactions—so that it no longer matched
the information embossed on the card, e.g., the name or displayed number. See, e.g., United States
v. Cruz, 
713 F.3d 600
, 608 (11th Cir. 2013) (discussing re-encoding credit and debit cards). Re-
encoding cards is frequently charged as a violation of section 1029(a)(3), which prohibits the
knowing, and with intent to defraud, possession of “devices which are counterfeit or unauthorized
access devices.” E.g., United States v. Grimon, 
923 F.3d 1302
, 1306–1307 (11th Cir. 2019) (citing
18 U.S.C. § 1029(a)(3).
                                                5
              Case: 19-11394     Date Filed: 03/13/2020   Page: 6 of 12



numbers. Thomasson also found data on the phone showing that the phone’s

owner had visited commercial background search websites (which are frequently

used for identity theft and fraud) and disposable email service websites.

      On the other phone, Thomasson also found information that identified Meme

as the account owner—the phone had sent a picture of Meme’s driver’s license and

the received texts referred to the phone’s owner as Meme. He also discovered

pictures of the Mustang, email accounts registered to “MasonM1267,” debit card

numbers and personal identification numbers, and correspondence relating to

purchasing debit card numbers and PINs on the phone, and that the phone had

visited commercial background search websites and websites for selling stolen

card numbers.

      Thomasson also testified that he analyzed the laptop recovered from what

Posten had identified as Meme’s room. He discovered that the computer’s user

account was “MasonM1627.” He also found credit card and debit card numbers,

the card-owners’ personal information, software used to read and encode magnetic

strips in cards, software used to read and encode card microchips, bank

identification numbers, and bank routing numbers on the computer. All told,

Thomasson estimated that hundreds of individuals’ personal information and 120

different debit and credit card numbers were on Meme’s laptop. He also

discovered that the user of the laptop had visited websites selling credit card


                                          6
              Case: 19-11394    Date Filed: 03/13/2020   Page: 7 of 12



numbers and commercial background search websites. On cross-examination, he

conceded that he could not tell whether someone other than Meme had used the

laptop and phones.

      After the government rested its case, Meme moved for a judgment of

acquittal. He argued that the government had failed to prove the existence of some

of the victims named in the indictment, venue was improper, and some of the

alleged criminal acts occurred while he was a minor. The district court denied

Meme’s motion.

      Meme’s case solely consisted of calling his stepmother, Willaine Amedee,

who testified that Meme had never lived in his father’s house or kept any

belongings in the house. Meme rested, and then renewed his motion for a

judgment of acquittal based on insufficient evidence. The district court again

denied his motion.

      The jury found Meme guilty of Counts 1 and 4–8. The district court

sentenced Meme to a 39-month prison term, which consisted of 15-month

concurrent sentences on Counts 1 and 6 and a 24-month sentence on Counts 4–5

and 7–8. Meme timely appealed to us.

                                   ANALYSIS

      On appeal, Meme argues that the evidence was insufficient to support his

conviction. We review the sufficiency of the evidence de novo, “viewing the


                                         7
              Case: 19-11394     Date Filed: 03/13/2020   Page: 8 of 12



evidence in the light most favorable to the government and drawing all reasonable

inferences in favor of the verdict.” United States v. Schier, 
438 F.3d 1104
, 1107

(11th Cir. 2006). The district court’s denial of “motions for a judgment of acquittal

will be upheld if a reasonable trier of fact could conclude that the evidence

establishes the defendant’s guilt beyond a reasonable doubt.” United States v.

Rodriguez, 
218 F.3d 1243
, 1244 (11th Cir. 2000). “[T]he issue is not whether a

jury reasonably could have acquitted but whether it reasonably could have found

guilt beyond a reasonable doubt,” so we will not reverse a conviction solely

because the defendant “put forth a reasonable hypothesis of innocence” at trial.

United States v. Campo, 
840 F.3d 1249
, 1258 (11th Cir. 2016) (quotation omitted).

We are bound by a jury’s “rejection of the inferences raised by the defendant.”

United States v. Hernandez, 
433 F.3d 1328
, 1334–35 (11th Cir. 2005).

Furthermore, we consider all evidence produced at trial against the defendant in

evaluating his claim of insufficient evidence. United States v. Thomas, 
8 F.3d 1552
, 1558 n.12 (11th Cir. 1993).

      An individual is guilty of access device fraud when he “knowingly and with

intent to defraud traffics in or uses one or more unauthorized access devices during

any one-year period, and by such conduct obtains anything of value aggregating

$1,000 or more during that period.” 18 U.S.C. § 1029(a)(2). An individual is

guilty of possession of 15 or more unauthorized access devices if he possesses such


                                          8
               Case: 19-11394     Date Filed: 03/13/2020     Page: 9 of 12



devices knowingly and with intent to defraud. 
Id. § 1029(a)(3).
An individual is

guilty of aggravated identity theft when he “knowingly transfers, possesses, or

uses, without lawful authority, a means of identification of another person” during

a felony violation of, among other things, “any provision contained in this chapter”

relating to fraud. 
Id. §§ 1028A(a)(1),
(c)(4). An “‘access device’ means any card,

. . . account number, electronic serial number, . . . personal identification number,

. . . or other means of account access that can be used, alone or in conjunction with

another access device, to obtain money . . . or that can be used to initiate a transfer

of funds.” 
Id. § 1029(e)(1).
An “‘unauthorized access’ device means any access

device that is lost, stolen, . . . or obtained with intent to defraud.” 
Id. § 1029(e)(3).
      We read Meme’s arguments on appeal as essentially arguing for a more

favorable inference of the facts. He argues that fraud was taking place at his

father’s house (but he was not a part of it), that the Secret Service agents could not

identify who used the phones or computer, that the ATM surveillance photos were

poor-quality and did not lend themselves to identification, that no one described

the physical characteristics of the person who was using the access devices, that

Novakowski’s identification of him was tainted, and that no counterfeit access

devices were found in his “actual or constructive possession.”

      These arguments are unavailing. These arguments echo what Meme argued

at trial—both to the district court and to the jury in his arguments for acquittal—


                                            9
             Case: 19-11394     Date Filed: 03/13/2020    Page: 10 of 12



and the jury was entitled to reject those arguments and draw a different inference.

We are not able to revisit the inference that the jury drew. 
Hernandez, 433 F.3d at 1334
–35. In any event, we conclude that the evidence at trial was sufficient to

support Meme’s conviction for two reasons: (1) the phone and laptop evidence

showed that Meme was committing access device fraud and (2) Meme was

identified as the person committing access device fraud. We address each in turn.

      First, the testimony at trial clearly showed—although somewhat

circumstantially—that Meme was committing access device fraud. With regard to

the phones, the agents testified that Meme visited commercial background search

websites and websites where he could purchase stolen card numbers, had stolen

card numbers stored on his phones, and had correspondence relating to his

purchase thereof. The agents found similar evidence on Meme’s laptop.

      Meme does not, and cannot, seriously contest the evidence found on both

devices—and so he instead suggests that other people were using the devices. We

wholly reject this argument, because it requires us to substitute the jury’s

reasonable inference based on the evidence presented at trial for an unreasonable

inference that happens to be more favorable to Meme. We think it is clear that the

devices both belonged to, and were used by, Meme. Contrary to Meme’s

argument, the phones were found in his “actual or constructive possession,” i.e.,

the car he was driving at the time he was arrested. And while the laptop was found


                                          10
              Case: 19-11394     Date Filed: 03/13/2020    Page: 11 of 12



in a room that Agent Posten had merely identified as Meme’s room, the evidence

certainly supports an inference that the room was Meme’s. His argument that he

did not live in the house, and thus that the room was not his, is strongly

contradicted by the extent to which his belongings were found both in the room

and elsewhere in the house. It is not likely that Meme’s firearm-training

certificate, vehicle title, and traffic citations would be in a house where he did not

live. Finally, we find it significant that the user account on Meme’s laptop was

identical to the username of the email accounts on Meme’s phones.

      Second, Meme was identified as the person committing identity fraud.

Though it is true that Novakowski’s identification was at least partially predicated

on Agent Posten’s suggestion, we note that he testified that he independently

reviewed all of the videos and images of the fraudulent ATM transactions and he

provided an in-court identification of Meme. As we have explained previously,

“[a]n in-court identification, even if preceded by a suggestive out-of-court

identification procedure, is nevertheless admissible if the in-court identification has

an independent source.” United States v. Cannington, 
729 F.2d 702
, 711 (11th Cir.

1984).

      But even if we concluded that Novakowski’s identification of Meme was

impermissible, we note that there are two additional—and more persuasive—

witnesses who identified Meme. Both Agents Adams and Narano identified Meme


                                          11
             Case: 19-11394     Date Filed: 03/13/2020    Page: 12 of 12



as the person in the black Mustang who made fraudulent transactions at an ATM.

Their identification is significant—both were surveilling him and followed him to

his father’s house, and Adams participated in Meme’s arrest.

      Accordingly, we conclude that the evidence was sufficient to support

Meme’s conviction. The evidence as to the devices—both the phones in Meme’s

constructive possession at the time of his arrest and the laptop that was clearly

Meme’s—is persuasive evidence of Meme’s fraud. And the identification of

Meme, especially the eyewitness testimony of Secret Service agents who saw

Meme committing access device fraud, is even more persuasive. We reject

Meme’s arguments to the contrary.

      AFFIRMED.




                                          12

Source:  CourtListener

Can't find what you're looking for?

Post a free question on our public forum.
Ask a Question
Search for lawyers by practice areas.
Find a Lawyer