GEORGE Z. SINGAL, District Judge.
Before the Court is Defendant Jonathan Sullivan's Motion To Suppress With Incorporated Memorandum Of Law: Intercepted Telephone Conversations (ECF No. 76) ("Motion to Suppress"). Defendant George Noonan joined the Motion to Suppress. (ECF No. 77.) The Court has determined that no hearing is necessary to decide these pending motions. For the reasons explained below, the Court DENIES the Motion to Suppress. (ECF No. 76 & 77.)
On December 28, 2012, the Government submitted an application and 73-page supporting affidavit of FBI Special Agent Patrick M. Clancy (the "December 28 Affidavit") to the Court. The application sought authorization to intercept wire and electronic communications occurring over the cellular telephone assigned telephone number (207) 523-9978 ("Target Telephone #1" or "TT1"). The Court then authorized interceptions of wire and electronic communications occurring over TT1, and original interception of Target Telephone #1 began on December 28, 2012.
On January 25, 2013, the Government submitted an application and 70-page supporting affidavit of SA Clancy (the "January 25 Affidavit") to a different judge of this Court. This application sought a 30-day extension of wire and electronic interceptions occurring over TT1 as well as original wire interceptions occurring over the cellular telephone assigned telephone number (781) 983-7616 ("Target Telephone #2" or "TT2"). Subsequently, the Court issued an Order authorizing an additional 30 days of interceptions of wire and electronic communications occurring over TT1 and an original 30 days of interceptions over TT2. Interception of TT1 pursuant to this authorization began on January 25, 2013 and ended on February 23, 2013. Interception of TT2 pursuant to this authorization began on January 26, 2013 and ended on February 24, 2013.
On April 18, 2013, the Government submitted an application and 66-page supporting affidavit of SA Clancy (the "April 18 Affidavit") to the Court. The application sought authorization to renew interceptions of wire and electronic communications occurring over TT1. The Court then authorized interceptions of wire and electronic communications occurring over TT1. Interception of TT1 pursuant to this authorization began on April 23, 2013 and ended on May 22, 2013.
On June 14, 2013, a criminal complaint was filed against George Noonan alleging a single count of distribution of cocaine in violation of 21 U.S.C. § 841(a)(1). (ECF No. 1.) On September 10, 2013, an indictment was filed against Noonan charging one count of distribution of cocaine in violation of 21 U.S.C. § 841(a)(1). (ECF No. 30.) On December 12, 2013, a superseding indictment was filed against Noonan and George Sullivan, alleging seven counts of distribution of cocaine in violation of 21 U.S.C. § 841(a)(1) against Noonan (Counts 1-7), one count of possession with intent to distribute cocaine in violation of 21 U.S.C. § 841(a)(1) against Noonan (Count 8) and one count of conspiracy to distribute cocaine in violation of 21 U.S.C. §§ 841(a)(1) and 846 against Noonan and Sullivan.
On May 5, 2014, Sullivan filed this Motion to Suppress (ECF No. 76), which was joined by Noonan (ECF No. 77). Through the Motion to Suppress Wiretap, Defendants Sullivan and Noonan raise five challenges to the wiretap evidence: (1) the intercept orders are insufficient; (2) the applications failed to establish necessity; (3) the affidavits include false statements and material omissions; (4) conversations were not properly minimized; and (5) the affidavits relied on informants with compromised credibility. The Court will address each argument in turn.
Through the Motion to Suppress, Defendants argue that the applications for the wiretaps and the Orders authorizing intercepts are facially insufficient because they fail to: (1) provide a sufficiently particular description of the type of communication sought to be intercepted; (2) describe the particular offense to which they relate; and (3) identify the law enforcement officers conducting the interceptions. The Court notes that this argument is copied almost verbatim from a suppression motion filed in
As in
Title 18, United States Code, Section 2518 requires that each application for interception of wire communications include certain information, including: "a full and complete statement as to whether or not other investigative procedures have been tried and failed or why they reasonably appear to be unlikely to succeed if tried or to be too dangerous." 18 U.S.C. § 2518(c). This "necessity requirement was designed to assure that wiretapping is not resorted to in situations where traditional investigative techniques would suffice to expose the crime."
To show necessity, "the government must demonstrate that it has made `a reasonable, good faith effort to run the gamut of normal investigative procedures before resorting to means so intrusive as electronic interception of telephone calls."
First, the application and affidavit establish that the first wiretap on TT1 was necessary to achieve the goals of the investigation. The December 28 Affidavit indicates that:
The objective was not simply to obtain probable cause to arrest conspirators known by December 28, 2012. Instead, the objective was to identify, prosecute and convict Noonan's sources of supply for illegal drugs and other significant co-conspirators.
In the December 28 Affidavit, SA Clancy describes law enforcement efforts using traditional techniques. For example, confidential sources were used with success during the course of the investigation that preceded the application for the wire intercepts. As outlined in the affidavit, CS-1 was able to purchase drugs directly from Noonan and could continue to do so. Nonetheless, the December 28 Affidavit states:
(December 28 Affidavit ¶ 85.) The December 28 affidavit further describes how the other known confidential sources were of limited utility in achieving the goals of this investigation. Another shortcoming of the confidential sources was they were all subject to impeachment. The Government is entitled to secure evidence to corroborate testimony of cooperating sources who may be subject to impeachment.
Although the use of confidential sources provided some valuable assistance in the investigation much of the conspiracy's scope and dealings remained undisclosed, rendering the wiretaps necessary.
In their attack on the necessity, Defendants claim that "the investigative techniques being employed by the Government were in fact working, thereby countering the necessity of a wiretap order." (Motion to Suppress at 9.) This argument is too narrow. As described above, one informant's ability to make ongoing controlled purchases of drugs from Noonan would not achieve the stated objectives of the investigation, which were substantially broader. Because the investigation targeted the entire organization and unknown confederates, CS-1's ability to buy drugs from Noonan was insufficient to achieve the goals of the investigation.
The investigation at issue here also included use of pole cameras, surveillance and use and analysis of court-authorized pen registers and telephone records. (December 28 Affidavit ¶¶ 100-110) Employment of such methods of law enforcement, even with some success, weighs in favor of a finding of necessity rather than against one.
SA Clancy explains the risk of flight and compromise to the objectives of the investigation with premature arrests of lower level participants (December 28 Affidavit ¶¶ 95-96), the inability to introduce an undercover agent (
(December 28 Affidavit ¶ 72). The December 28 Affidavit sufficiently demonstrates that the source(s) of supply were unknown and unlikely to be learned through traditional law enforcement techniques and that the wiretap was necessary to develop a provable case against all significant members of the conspiracy.
Defendants next argue that the January 25 Affidavit contains "the same conclusory statements made in the December [28] Affidavit" and that CS-1's recent controlled purchase of drugs from Noonan and his/her providing information about Richard Petrucci's involvement in other criminal activity undercuts necessity. Defendants make necessity challenges to the April Affidavit based on another controlled purchase with CS-1 and information from a new informant. However, as described below, the extension of the wiretap on TT1 and the activation of a wiretap on TT2 were necessary to achieve the goals of the investigation.
In the January 25 Affidavit, SA Clancy acknowledges that progress has been made but that the objectives of the investigation have not been accomplished. (January 25 Affidavit ¶ 91.) SA Clancy described the most recent drug purchase from Noonan and explained why CS-1's ongoing ability to purchase drugs from Noonan remained insufficient to accomplish the objectives of the investigation. (
Defendants' challenge to the April 18 Affidavit is based on CS-1's ability to make drug purchases and the development of a new informant. SA Clancy described the most recent drug purchase from Noonan and explained why CS-1's ongoing ability to purchase drugs from Noonan still remained insufficient to accomplish the objectives of the investigation. (April 18 Affidavit ¶ 87.) SA Clancy also described the information received by CS-5 — the informant at issue in the Defendants' challenge to the April 18 Affidavit. Specifically, SA Clancy described CS-5's claims that he/she claims to have been approached about drug trafficking by members of this organization but declined. (
(
Defendants next argue that the wiretap affidavits contain false statements and material omissions. This argument is predicated on SA Clancy's statements that there was probable cause to believe that the targets were committing money laundering offenses. SA Clancy's affidavits set forth in substantial detail the facts giving rise to his belief that Noonan and others are involved in drug trafficking. It necessarily follows that members of this conspiracy would generate proceeds from a specified unlawful activity as defined in 18 U.S.C. 1956(c)(7)(B)(i). Therefore, financial transactions with these proceeds constitute money laundering. Faced with a similar objection, Judge Hornby concluded:
Section 2518(5) sets forth the minimization requirement of the statute governing wiretaps, providing in relevant part that:
18 U.S.C. § 2518(5). "The statute does not forbid the interception of all nonrelevant conversations, but rather instructs the agents to conduct the surveillance in such a manner as to `minimize' the interception of such conversations."
In evaluating the Government's minimization efforts, courts look to "several factors, including: (1) the nature and complexity of the suspected crimes; (2) the thoroughness of the government's precautions to bring about minimization; and (3) the degree of judicial supervision over the surveillance process."
Here, the Defendants have failed to point to any evidence of a lack of thoroughness in the Government's precautions to bring about minimization. The Government set forth its anticipated minimization efforts in each affidavit sworn to by SA Clancy (
Finally, in challenging the probable cause supporting the wiretaps, the Defendants claim that "the government relied heavily on information provided by confidential informants in order to make its purported showing of probable cause." (Motion to Suppress at 12.) This assertion is inaccurate. The December 28 Affidavit establishes the requisite probable cause through information obtained through numerous avenues including confidential sources, controlled purchases, surveillance of the targets and analysis of telephone data. A review of the information set forth in the December 28 Affidavit clearly shows that the information provided by all these sources established that there was a fair probability that a wiretap would uncover evidence of a crime. Information from the confidential sources was only one aspect of the probable cause calculus — no more weighted than the other factors establishing probable cause.
In evaluating the value of the confidential source information in the probable cause calculus, Defendants acknowledge that information from informants may provide the basis for probable cause. Although Defendants attack the use of unnamed informants, the First Circuit has explicitly held that unnamed informants can form the basis for probable cause so long as the issuing court can assess the credibility of the informant's information.
Application of these factors to the present case shows that the Court reasonably relied on the confidential informant information. The December 28 Affidavit outlined information from five informants — three of whom provided information that came from personal first-hand dealings with members of the purported conspiracy. An informant's credibility is enhanced to the extent he has provided information based upon personal observation which indicates firsthand knowledge.
Information from confidential informants also cross-corroborated the other informants' information (save perhaps for CS-4, who had little knowledge). Cross-corroboration of information sufficiently reduces the likelihood of a lying or inaccurate informant.
The reliability of the source information is not altered by the fact that the sources' identities remain protected — the information provided by the sources was timely, detailed and corroborated by other source information and other avenues. The source information was established as accurate information that the Court relied upon, along with the other information outlined in the affidavit, in determining that each application for a wiretap was supported by sufficient probable cause. Accordingly, the Court DENIES the Motion on this ground.
For the above-stated reasons, the Motion to Suppress (ECF Nos. 76 & 77) is DENIED.
SO ORDERED.