Elawyers Elawyers
Washington| Change

United States v. Rodney Foster, 13-1320 (2014)

Court: Court of Appeals for the Eighth Circuit Number: 13-1320 Visitors: 37
Filed: Jan. 30, 2014
Latest Update: Mar. 02, 2020
Summary: United States Court of Appeals For the Eighth Circuit _ No. 13-1320 _ United States of America lllllllllllllllllllll Plaintiff - Appellee v. Rodney Foster lllllllllllllllllllll Defendant - Appellant _ Appeal from United States District Court for the Western District of Missouri - Kansas City _ Submitted: November 20, 2013 Filed: January 30, 2014 _ Before BENTON, BEAM, and SHEPHERD, Circuit Judges. _ SHEPHERD, Circuit Judge. A jury convicted Rodney Foster of conspiracy to commit identity theft an
More
                  United States Court of Appeals
                             For the Eighth Circuit
                         ___________________________

                                 No. 13-1320
                         ___________________________

                              United States of America

                         lllllllllllllllllllll Plaintiff - Appellee

                                            v.

                                     Rodney Foster

                       lllllllllllllllllllll Defendant - Appellant
                                       ____________

                      Appeal from United States District Court
                 for the Western District of Missouri - Kansas City
                                  ____________

                           Submitted: November 20, 2013
                              Filed: January 30, 2014
                                  ____________

Before BENTON, BEAM, and SHEPHERD, Circuit Judges.
                           ____________

SHEPHERD, Circuit Judge.

       A jury convicted Rodney Foster of conspiracy to commit identity theft and wire
fraud for his involvement in a mortgage-fraud scheme that utilized a straw-buyer’s
identity. Foster appeals his conviction, arguing that the Government failed to
establish that the conspirators knew the straw-buyer’s identity belonged to a real
person, as required by the identity-theft statute. We hold that the Government
satisfied its burden in this respect and affirm the district court.1

                                            I.
       Foster and his wife owned a home in Lee’s Summit, Missouri. They listed the
house for sale but had difficulty finding a buyer. After their initial attempts to sell the
house were unsuccessful, Foster approached his brother-in-law Maurice Ragland for
help in selling the house.

       Ragland and some of his associates had formed a mortgage appraisal and
brokerage service called TERM. TERM performed both legal and illegal services.
TERM’s illegal activities often involved a straw-buyer serving as a fraudulent
borrower-buyer on a property listed by a TERM associate. TERM frequently utilized
actual identities when it arranged these fraudulent transactions. One such identity was
that of Christopher Taylor, which was used by the TERM conspirators several times.
Steven Edenfield, one of the conspirators, testified that he had posed as Christopher
Taylor for the photograph on a fake driver’s license in Taylor’s name.

       Ragland informed Foster that he could sell Foster’s house but that Foster could
not tell his wife (Ragland’s sister) the details of how the home was sold. Foster
agreed to Ragland’s terms, and Ragland informed Foster of the details of the plan,
including the use of a straw-buyer. Foster acted as the mortgage broker on the sale.
A fraudulent loan application was completed in Christopher Taylor’s name, using the
fake driver’s license that bore Edenfield’s photograph. The conspirators artificially
elevated the appraised value of the property so Foster’s mortgage on the property
could be repaid and excess funds would remain available for the conspirators to divide
among themselves. The sale was finalized in 2005.


      1
        The Honorable Brian C. Wimes, United States District Judge for the Western
District of Missouri.

                                           -2-
       All worked according to plan until Foster and his wife, Ragland’s sister,
divorced in 2009. After the divorce, Foster’s wife returned to Lee’s Summit to visit
her former house. Because her brother and his associates had been convicted for
mortgage-fraud activities, she became suspicious about the sale of the home after
seeing that the house was vacant. Soon after, Foster’s wife wrote a letter to the FDIC
stating that she feared the home may have been fraudulently sold. The FDIC began
its investigation into the sale of the house and Foster’s potential involvement. The
victim, Christopher Taylor, eventually was named as a defendant in a civil lawsuit for
unpaid homeowner’s association dues arising from his apparent ownership of the
Lee’s Summit home.

      Foster was indicted on one count of conspiracy, under 18 U.S.C. § 371, to
commit identity theft and wire fraud. See 18 U.S.C. § 1028(a)(7) (identity theft); 18
U.S.C. § 1343 (wire fraud).2 After the defense presented its case, Foster moved for
a judgment of acquittal, which the district court denied. The jury found Foster guilty
of conspiracy, and Foster brings this appeal.

                                          II.
       We review a district court’s denial of a motion for judgment of acquittal de
novo. United States v. Clark, 
668 F.3d 568
, 573 (8th Cir. 2012). Just like our review
in a sufficiency-of-the-evidence challenge, “‘[w]e view the evidence in the light most
favorable to the guilty verdict, granting all reasonable inferences that are supported
by that evidence.’” 
Id. (quoting United
States v. Milk, 
447 F.3d 593
, 598 (8th Cir.
2006)). We must affirm the verdict if a reasonable juror could have found the


      2
       The identity-theft provision in contest, section 1028(a)(7), forbids the use of
another person’s identity in connection with “any unlawful activity” that violates
federal law or constitutes a felony under state or local law. 18 U.S.C. § 1028(a)(7).
The underlying federal offense Foster is alleged to have committed is a violation of
the wire fraud statute. See 18 U.S.C. § 1343. Thus, Foster was convicted of
conspiring to use the identity of another person to commit wire fraud.

                                         -3-
defendant guilty of the crime charged beyond a reasonable doubt. 
Id. “Circumstantial evidence
alone can prove the elements of conspiracy.” United States v. Dotson, 
570 F.3d 1067
, 1068 (8th Cir. 2009).

       To support Foster’s conspiracy conviction, the Government was required to
show: (1) an agreement between Foster and one or more persons to use the identity
of another person to commit wire fraud; (2) Foster knew of the agreement; and (3)
Foster intentionally joined the agreement. See United States v. Cole, 
721 F.3d 1016
,
1021 (8th Cir. 2013). Foster does not directly address any of the elements of
conspiracy in this appeal. Instead, both Foster and the Government frame their
arguments in terms of whether Foster committed the offense of identity theft, one of
the objectives of the conspiracy for which Foster was charged. Foster contends that:
(1) the Government failed to establish that the conspirators knew Christopher Taylor’s
identity belonged to an actual person, and (2) the Government failed to show that the
“means of identification” the conspirators used would be sufficient to “identify a
specific individual.”

       Foster’s arguments concerning the underlying offense of identity theft are
relevant to Foster’s conspiracy conviction insofar as “a conspiracy to commit [an]
offense is nothing more than an agreement to engage in the prohibited conduct.” See
United States v. Bertling, 
611 F.3d 477
, 480-81 (8th Cir. 2010) (quoting United States
v. Feola, 
420 U.S. 671
, 687 (1975)); see also United States v. Hyles, 
521 F.3d 946
,
955-56 (8th Cir. 2008) (analyzing whether the defendant knew the individual to which
she was delivering a gun was a felon when the defendant was charged with conspiracy
to deliver a firearm to a felon). The identity-theft provision Foster conspired to
violate, found in section 1028(a)(7), provides as follows:

      [Whoever] knowingly transfers, possesses, or uses, without lawful
      authority, a means of identification of another person with the intent to
      commit, or to aid or abet, or in connection with, any unlawful activity


                                         -4-
      that constitutes a violation of Federal law, or that constitutes a felony
      under any applicable State or local law
      ...
      shall be punished as provided in subsection (b) of this section.

18 U.S.C. § 1028(a)(7). The Government concedes that section 1028(a)(7) requires
it to prove that the defendant knew that the means of identification at issue belonged
to an actual person. See Flores-Figueroa v. United States, 
556 U.S. 646
, 657 (2009).3
In this case, therefore, the Government was required to show that Foster “knew of and
participated in an agreement the ‘essential object’ of which was” to use a means of
identification of an actual person to commit wire fraud. See United States v. Calhoun,
721 F.3d 596
, 601-02 (8th Cir. 2013); see also 
id. at 601
(“‘Conspiracy to commit a
particular substantive offense cannot exist without at least the degree of criminal
intent necessary for the substantive offense itself.’” (emphasis omitted) (quoting
Ingram v. United States, 
360 U.S. 672
, 678 (1959))).

      Viewing this appeal in light of the crime for which Foster was
charged—conspiracy to commit identity theft and wire fraud—we reject Foster’s two




      3
        Although Flores-Figueroa construed section 1028A(a)(1), the text of section
1028(a)(7) is identical. Compare 18 U.S.C. § 1028(a)(7) (“Whoever . . . knowingly
transfers, possesses, or uses, without lawful authority, a means of identification of
another person . . . .”), with 18 U.S.C. § 1028A(a)(1) (“Whoever . . . knowingly
transfers, possesses, or uses, without lawful authority, a means of identification of
another person . . . .”). Thus, we interpret section 1028(a)(7) to require the
Government to prove that the defendant knew the identity used belonged to an actual
person. See United States v. Berry, 369 F. App’x 500, 501-02 (4th Cir. 2010); see
also United States v. Bruguier, 
735 F.3d 754
, 760 (8th Cir. 2013) (en banc) (reasoning
that “‘similarity of language’ in two different statutes was ‘strong indication that the
two statutes should be interpreted’ the same” (quoting Northcross v. Bd. of Educ., 
412 U.S. 427
, 428 (1973) (per curiam))).


                                          -5-
arguments and hold that the district court did not err in denying Foster’s motion for
judgment of acquittal.

      First, the Government presented sufficient proof to show that the conspirators
agreed to use the identity of an actual person. Maurice Ragland testified that he
informed Foster of all of the details of his past mortgage-fraud schemes, including his
frequent use of real identities. Ragland’s testimony provided strong evidence that
Foster was informed that the victim would be real:

      Government: So when you told [Foster], did you tell [Foster] that there
      would be a straw buyer?
      Ragland: Yes.
      Government: And it was going to be identity theft?
      Ragland: Yes.

Trial Tr. at 190. Moreover, Christopher Taylor’s specific identity had been used on
multiple occasions. Steven Edenfield, the man who posed as Taylor for the driver’s
license photograph, testified to the following when asked about the conspirators’ use
of the Christopher Taylor driver’s license:

      Government: The picture on that driver’s license is you?
      Edenfield: Yes
      Government: And do you recognize the name on the license?
      Edenfield: Yes
      Government: Do you know Christopher Taylor, the real Christopher
      Taylor?
      Edenfield: No
      ...




                                         -6-
      Government: All right. Did it look to you like it was a pretty good
      counterfeit of a real driver’s license?
      Edenfield: Very.
      Government: Were you able to successfully use it on multiple
      occasions?
      Edenfield: Yes.
      Government: And was that to purchase houses?
      Edenfield: Yes.
      ...
      Government: Do you recall that one of the houses that you used this
      driver’s license to buy was a house on Huntbrook Terrace in Lee’s
      Summit, Missouri?
      Edenfield: Yes, sir.
      ...
      Government: Did you actually go to a closing?
      Edenfield: I did.
      Government: Portraying yourself as Christopher Taylor?
      Edenfield: Yes.

Trial Tr. at 220-22. Christopher Taylor verified Edenfield’s testimony, stating that
Taylor’s identity had been used to obtain several fraudulent home loans.

       This evidence, and the reasonable inferences that arise from it, was sufficient
to permit a reasonable jury to find that Foster and his conspirators agreed to use the
identity of a real person, specifically, Christopher Taylor. The conspirators’ repeated
subjection of Christopher Taylor’s identity to a lender’s scrutiny provides strong
circumstantial evidence that the conspirators knew the identity was real. See United
States v. Doe, 
661 F.3d 550
, 562-63 (11th Cir. 2011) (“[Eleventh Circuit caselaw]
stand[s] for the unremarkable proposition that a defendant’s repeated and successful
testing of the authenticity of a victim’s identifying information prior to the crime at

                                         -7-
issue is powerful circumstantial evidence that the defendant knew the identifying
information belonged to a real person as opposed to a fictitious one.”). A reasonable
juror could also infer that the defendants, as mortgage brokers, knew that their scheme
would be more successful if real identities were used because those real identities
would be connected to actual credit scores. Cf. United States v. Clark, 
668 F.3d 568
,
574 (8th Cir. 2012) (“A reasonable juror could infer that [the defendant], being a bank
account holder and prior perpetrator of identity theft, knew that banks open accounts
for, and give credit to only real people.”). We also note that the conspirators need not
have known Christopher Taylor personally; they need only have known that an actual
Christopher Taylor existed. See United States v. Retana, 
641 F.3d 272
, 275 (8th Cir.
2011). In sum, Foster’s first argument is unavailing.

       Second, a reasonable juror could conclude that the “means of identification” the
conspirators agreed to use would be sufficient to “identify a specific individual,” as
section 1028(d)(7) requires. Section 1028(a)(7) prohibits the use of “a means of
identification of another person” to accomplish a crime. The phrase “means of
identification” is defined as “any name or number that may be used, alone or in
conjunction with any other information, to identify a specific individual.” The section
then lists several examples of the type of information that may help to specify an
individual, including, but not limited to, a social security number, date of birth,
driver’s license number, or taxpayer identification number. Section 1028(a)(7),
therefore, incorporating the definition of “means of identification” from section
1028(d)(7), prohibits the knowing use of another person’s personal information when
the information used is sufficient to identify a specific person. See United States v.
Mitchell, 
518 F.3d 230
, 232, 234-35 (4th Cir. 2008) (holding that the Government
failed to present sufficient information that could connect the name on the driver’s
license to an actual, existing person when driver’s license was a muddled mix of real
and fictional identifiers that, taken together, could not be used to pinpoint a specific
person).



                                          -8-
       At trial, the Government presented several of the documents the conspirators
used to carry out their scheme, including the forged Christopher Taylor driver’s
license, the HUD settlement statement, and the residential-loan application.
Significantly, the conspirators’ use of the information contained on these documents
provided enough specifying detail to permit the homeowner’s association and lender
on the Lee’s Summit house to locate Christopher Taylor and name him as a defendant
in a lawsuit to collect past-due association dues. Thus, a reasonable juror could draw
the inference that the information the conspirators agreed to use was sufficient to
identify a specific individual (i.e., Christopher Taylor) because two creditors actually
were able to do so. See United States v. Castellanos-Loya, 503 F. App’x 240, 241
(4th Cir. 2013) (unpublished per curiam); see also United States v. Alexander, 
725 F.3d 1117
, 1117-18, 1121 (9th Cir. 2013) (“To the extent that a forged check contains
a victim’s true name, bank account number, and routing number—personal data that
easily may be used to identify a specific individual—such a check plainly and
comfortably fits within the broad language of § 1028(d)(7) . . . .” (alteration omitted)
(internal quotation marks omitted)).

       “While the government’s proof was less than overwhelming, ‘[t]he jury’s
verdict must be upheld if there is an interpretation of the evidence that would allow
a reasonable-minded jury to conclude guilt beyond a reasonable doubt.’” United
States v. Ford, 
717 F.3d 612
, 619 (8th Cir. 2013) (alteration in original) (quoting
United States v. Erdman, 
953 F.2d 387
, 389 (8th Cir. 1992)). Given this standard of
review, the evidence submitted by the Government was sufficient to convict Foster
of conspiracy to commit identity theft and wire fraud.

                                       III.
      Accordingly, we affirm Foster’s conviction.
                     ______________________________




                                          -9-

Source:  CourtListener

Can't find what you're looking for?

Post a free question on our public forum.
Ask a Question
Search for lawyers by practice areas.
Find a Lawyer