SARA LIOI, District Judge.
The Indictment charges the defendants, James C. Dimora and Michael D. Gabor,
On September 1, 2011, defendants filed a series of pre-trial motions. A hearing on all of the pre-trial motions was held October 5, 2011. The Court has already issued several opinions and orders addressing many of these motions. This opinion addresses the remaining pre-trial motions, specifically: Dimora's motion to suppress evidence seized from the search of his home and office (Doc. No. 422); Dimora's motion for disclosure of grand jury transcripts and the identities of confidential informants (Doc. No. 417); the motions of Gabor and Dimora to suppress wiretaps (Doc. No. 423 and 424, respectively); and Dimora's motion to suppress wiretaps based on a failure to minimize (Doc. No. 484).
Defendant Dimora seeks to suppress all evidence seized during the July 2008 searches of his home and office owing to what he perceives as insufficiencies in the search warrants and the affidavit offered in support of those warrants. Specifically, Dimora insists that: (1) the affidavit lacked the requisite nexus between the places to be searched and the evidence to be seized; (2) the search warrants were overly broad; (3) the search warrants authorized the seizure of political speech; (4) the affidavit relied on wiretaps obtained in violation of Title III of the Omnibus Crime Control and Safe Street Act of 1968; and (5) the warrants were not supported by probable cause. The government filed a response in opposition to Dimora's motion (Doc. No. 478.) and Dimora subsequently filed a reply (Doc. No. 511). Dimora's fourth contention will be addressed in the separate section of this opinion devoted exclusively to the defendants' motions to suppress the wiretaps. The remaining contentions are addressed directly below.
On July 25, 2008, a warrant application was submitted for the search of Dimora's office, as well as the work spaces of other individuals located within the Cuyahoga County Administration Building. (Doc. No. 422-1, Ex. A.) That same day (July 25, 2008), a second application was filed for the search of Dimora's home. (Doc. No. 422-2, Ex. B.) Both applications were supported by a Master Affidavit, totaling more than 365 pages and including contributions from IRS Agent Kelly Fatula and
The Fourth Amendment mandates that there must be probable cause for any search and seizure. U.S. CONST. amend. IV. "Probable cause has been defined as `reasonable grounds for belief, supported by less than prima facie proof but more than mere suspicion.'" United States v. Padro, 52 F.3d 120, 122-23 (6th Cir.1995) (quoting United States v. Bennett, 905 F.2d 931, 934 (6th Cir.1990)). "To demonstrate probable cause to justify the issuance of a search warrant, an affidavit must contain facts that indicate a fair probability that evidence of a crime will be located on the premises of the proposed search." United States v. Frazier, 423 F.3d 526, 531 (6th Cir.2005) (internal quotations and citation omitted). "Probable cause is based on the totality of the circumstances; it is a `practical, non-technical conception that deals with the factual and practical considerations of everyday life.'" United States v. Abboud, 438 F.3d 554, 571 (6th Cir.2006) (quoting Frazier, 423 F.3d at 531); see United States v. Lazar, 604 F.3d 230, 241-42 (6th Cir.2010) (trial judge properly found probable cause in commonsense manner where affidavit was based on two-year involvement in case, personal visits to locations, review of bills, and extensive interviews).
Dimora first challenges the sufficiency of the affidavit supporting the warrants because it allegedly failed to establish the necessary nexus between the places searched and the items to be seized. "To justify a search, the circumstances must indicate why evidence of illegal activity will be found `in a particular place.' There must, in other words, be a `nexus between the place to be searched and the evidence sought.'" United States v. Carpenter, 360 F.3d 591, 594 (6th Cir.2004) (quoting United States v. Van Shutters, 163 F.3d 331, 336-37 (6th Cir.1998)). See Frazier, 423 F.3d at 531 (internal quotation and citation omitted) ("To demonstrate probable cause to justify the issuance of a search warrant, an affidavit must contain facts that indicate a fair probability that evidence of a crime will be located on the premises of the proposed search.") Dimora suggests that the Master Affidavit merely recites conversations between himself and others, but "provides no real implication that any physical or tangible evidence supporting the allegations made in the affidavit would actually exist at the places to be searched." (Mot. at 6.)
With respect to his office, Dimora complains that the Master Affidavit "alleges only that Mr. Dimora's office possesses a fax machine, Mr. Dimora uses the fax machine and that Mr. Dimora's assistant was able to handle some business for him." (Mot. at 7.) He notes that it also alleges that records of calls and meetings may be found at his office.
According to Dimora, the Master Affidavit only offers evidence that he used his office (and his home) for work, and separately offers evidence that he engaged in illegal activity. He argues that there is no connection such that it would be likely that evidence of criminal activity would be found at either location. The Master Affidavit, however, provided more information supporting the searches, and supplied the link to illegal activity. Specifically, it provided:
(Curtis Master Aff. at 290-94.) This information clearly established that paperwork, along with records of calls, were flowing between Dimora's home and office. Moreover, the Master Affidavit provides that the work Dimora performed at his office allegedly included unlawful activity that advanced the conspiracy.
This same evidence supports a finding of a "fair probability" that evidence of criminal activity would be found in Dimora's home. The Master Affidavit provides a substantial basis for finding that Dimora did most of his Cuyahoga County Commissioner work from home, only coming into the office on days of scheduled commissioner meetings, that he regularly had employees deliver mail, call sheets, and other office paperwork to his home, and that this paperwork is believed to contain information that individuals asked Dimora to take official action in exchange for things of value. In fact, the Master Affidavit offered specific examples of such activity, including an incident on February 18, 2008, wherein Dimora instructed an employee to fax bids related to the sale of a parcel to a contractor.
Defendant Dimora insists that the warrants are merely "general" in nature, and, thus, violate the particularity requirement. The Fourth Amendment requires a warrant to "particularly describe the place to be searched, and the persons or things to be seized." U.S. CONST. amend. IV. "The purpose of this particularity requirement is to prevent the use of general warrants authorizing wide-ranging rummaging searches in violation of the Constitution's proscription against unreasonable searches and seizures." United States v. Logan, 250 F.3d 350, 365 (6th Cir.2001) (citing Andresen v. Maryland, 427 U.S. 463, 480, 96 S.Ct. 2737, 49 L.Ed.2d 627 (1976)). "[T]he degree of specificity required is flexible and will vary depending on the crime involved and the types of items sought." United States v. Henson, 848 F.2d 1374, 1383 (6th Cir. 1988); see United States v. Campbell, 256 F.3d 381, 389 (6th Cir.2001). A determination as to particularity is "best resolved upon examination of the circumstances of the particular case." Logan, 250 F.3d at 365. Further, a "description contained in a warrant is sufficiently particular if it is as specific as the circumstances and the nature of the alleged crime permit. In
Even broadly worded warrants allowing for the seizure of all business records have been upheld where the investigation has involved a "pervasive scheme to defraud." United States v. Martinelli, 454 F.3d 1300, 1308 (11th Cir.2006) (quoting United States v. Sawyer, 799 F.2d 1494, 1508 (11th Cir.1986)); see United States v. Smith, 424 F.3d 992, 1006 (9th Cir.2005) (internal quotation omitted) (stating that "even an `extraordinarily broad' warrant authorizing the seizure of essentially all business records may be justified when there is probable cause to believe that fraud permeated the entire business operation"); United States v. Travers, 233 F.3d 1327, 1330 (11th Cir.2000) (internal citation omitted) (noting that cases involving "complex financial fraud ... justify a more flexible reading of the fourth amendment particularity requirement").
Dimora argues that the warrants were overly broad because they permitted the seizure of "any information that pertains, in any way whatsoever, to over 80 different entities and individuals." (Mot. at 10.) Dimora's description fails to take into account the detail provided in the supporting documents, as well as the broad scope of the investigation.
Attached to each warrant was a picture of the place to be searched, along with a written description of the location. Also attached to each warrant was a multi-page list of fairly detailed categories of documents and other items that could be seized. Most of the categories were further limited by dates, with many limited to no more than five years preceding the search, and some limited further still to only two years prior to the search. The warrants also incorporated the 365-page Master Affidavit that included sworn statements from the agents seeking the warrants.
The Master Affidavit, in turn, included details relating to at least 60 fraudulent schemes in which Dimora and other co-conspirators were alleged to have been involved, the dates of the schemes, the names of other individuals or entities allegedly involved, and information indicating that the items sought were related to these schemes. (See Resp. at 9-15 (setting forth the citations in the Master Affidavit to the various schemes).) Further, the accompanying Master Affidavit provided an evidentiary basis for each scheme, see Logan, 250 F.3d at 365 (warrant sufficient where alleged items sought related to a fraudulent scheme, and the scheme was set forth in the warrant and accompanying affidavit), and it is clear that the categories of things to be searched were narrowly tailored to recover documents and other items that would amount to evidence of the fraud laid out in the accompanying Master Affidavit.
Dimora also argues that the warrants were overly broad because they sought documents reflecting his "awareness" of the County's policies on hiring, promotion, outside employment, lobbying, and ethics. Likewise, he argues that the fact that the warrants sought all documents reflecting his "awareness" of any "Sunshine laws" was overly broad. With respect to both of these categories of documents, Dimora suggests that the language did not allow law enforcement officials to "reasonably ascertain" or "identify" the things to be seized. (Mot. at 9.) However, in Logan, the Sixth Circuit upheld a similar search warrant where its apparently general nature was due to the fact that agents were investigating a complex and far-reaching fraud. Logan, 250 F.3d at 365. Viewing the sufficiency of the warrants from the specific circumstances surrounding the multiple and complex alleged fraudulent schemes under investigation, the categories of items identified in the warrants were sufficiently particular to allow the agents to recover relevant documents with only minimal judgment. Id.; see United States v. Blair, 214 F.3d 690, 697 (6th Cir.2000); United States v. Word, 806 F.2d 658, 661 (6th Cir.1986). Accordingly, there is no basis for invalidating the search warrants here on grounds that they lacked the necessary particularity.
Defendant Dimora suggests that there is a lack of probable cause because the Master Affidavit merely strings together conversations involving Dimora and others, with no evidence to support the conclusions reached by the affiant. He also complains that the warrants gratuitously include "salacious" facts and draw improper inferences from Dimora's innocent receipt of dinners and invitations to family and friends' barbecues.
The Master Affidavit incorporates sworn statements from IRS Special Agent Fatula and FBI Special Agent Curtis. S.A. Fatula details her review of the financial and other bank records of various co-conspirators, and demonstrates that many of the public officials under investigation, including Dimora, appeared to be living beyond their means. (Fatula Master Aff. at 1-48.) S.A. Curtis's affidavit begins with his representation that there is probable cause to believe that Dimora and other co-conspirators had committed certain crimes, including Hobbs Act violations, 18 U.S.C. § 1951; obstruction, 18 U.S.C. § 1512; bank fraud, 18 U.S.C. § 1344; and other related crimes.
Before identifying with particularity the places to be searched, the Curtis Affidavit describes the scope of the investigation and the use of various investigatory techniques. His affidavit explains that a focus of the investigation had been Dimora's and Frank Russo's "obtaining or being offered things of value from local contractors and individuals seeking to do business with Cuyahoga County." (Curtis Master Aff. at 21.) It also details the use of confidential sources, the nature and length of the relationship between the affiant and the source, the reliability of the source, and each source's connection to the alleged public corruption fraud under investigation.
The next section of the Curtis Master Affidavit lays out the numerous schemes in which Dimora and his co-conspirators are alleged to have participated. For all of the approximately 60 schemes, the affiant provides identifies the participants in each scheme and the participants' alleged roles, along with a detailed account of the evidence that supports the affiant's conclusion that the scheme involved criminal activity. Included in these recitations are word-for-word accounts of intercepted communications,
For example, the very first scheme identified involved a trip to Las Vegas by Dimora, Gabor, Kevin Kelley, Steve Pumper, Frank Russo, and others. It was alleged that the trip was funded by Ferris Kleem, who owned Blaze Construction and was a part owner of Phoenix Cement, and that Kleem financed the trip in exchange for influence from Dimora on the awarding of County projects. In support of this scheme, the Master Affidavit details phone conversations between Dimora and others wherein Dimora expressed his understanding that Kleem would pay for the trip and various expenses incurred during the trip. Phone conversations also supported a finding that Kleem covered the expenses in the hopes of receiving favorable consideration from Dimora on certain public works contracts. (Curtis Master Aff. at 31-37.)
Additional schemes provided details as to (1) the other things of value that Dimora and Russo allegedly received in exchange for official action and (2) the conversations and other evidence that supported such allegations. These schemes establish probable cause to believe that Dimora had committed violations of the Hobbs Act, 18 U.S.C. § 1951. See United States v. Loftus, 992 F.2d 793, 796 (8th Cir.1993) (quoting McCormick v. United States, 500 U.S. 257, 273, 111 S.Ct. 1807, 114 L.Ed.2d 307 (1991)) ("When a public official accepts money and `asserts that his official conduct will be controlled by the terms of the promise or undertaking,' that official has received money `under color of official right within the meaning of the Hobbs Act.'"); United States v. Collins, 78 F.3d 1021, 1033-34 (6th Cir.1996) (same); see also United States v. Ostrander, 411 F.3d 684, 691 (6th Cir.2005) (to prove a Hobbs Act violation, the government must prove the interference with interstate commerce, in the course of a substantive criminal act).
The Curtis Master Affidavit also outlined and detailed evidence that supported a probable cause determination that Dimora had engaged in obstruction. See United States v. Collis, 128 F.3d 313, 318 (6th Cir.1997) (outlining the elements of obstruction). For example, the Master Affidavit offered evidence that, after Pumper was approached by the FBI in connection with allegations that he had bribed a City of Cleveland building inspector, Dimora instructed Pumper, Forlani, and others to create false invoices for work done on Dimora's house in order to make it appear as though Dimora had paid for such work when in fact it was done in exchange for help securing County contracts. (Curtis Master Aff. at 93-125.)
There was substantial evidence in the Master Affidavit connecting Dimora to alleged fraud, obstruction, and Hobbs Act violations, and providing support for the search of his office and home. Dimora, however, selectively identifies a few instances where he believes that the Master Affidavit fails to make a direct connection between the conversations and the alleged criminal activity. While it is true that some schemes describe a quid pro quo without direct evidence of the connection, such a connection can be established by circumstantial evidence. See United States v. Bryant, 655 F.3d 232, 243-44 (3d Cir.2011) (in honest services fraud case, evidence of quid pro quo arrangement may be established with circumstantial evidence). For example, at the time that Dimora was allegedly using his office to secure County funding for Alternatives Agency, co-conspirator Kevin Kelley was depositing checks from Alternatives Agency totaling more than $75,000 into his
Likewise, the Hegedus Empire Tree scheme, highlighted by Dimora, was supported by more than amassed conversations and logical leaps. The Master Affidavit demonstrated that Hegedus solicited Dimora's influence over a judicial proceeding involving Hegedus and one of its employees, as well as Dimora's efforts to obtain public works contracts for the company in exchange for personal benefit. In the conversation, Dimora makes a clear reference to Hegedus's willingness to contribute to events. (Id. at 276-79.) Further, while Dimora characterizes the Hegedus barbecue he attended as a "private barbecue hosted by a friend," the government argues that the inference remains that it was a thing of value received by Dimora in exchange for him exercising his public duties.
Not all schemes relied on inference and circumstantial evidence. Some schemes were far more specific. The Master Affidavit sets forth a scheme whereby Dimora allegedly used his influence with County Sheriff Gerald McFaul to obtain County employment for co-conspirator Jerry Skuhrovec in exchange for Skuhrovec holding a fundraiser for Anthony Russo and for another unspecified thing of value. According to the Master Affidavit, Dimora
In another scheme highlighted by Dimora, he complains that there were insufficient facts to set forth probable cause to believe that he had accepted things of value from Ken Fisher in exchange for assisting Fisher in obtaining County legal work and securing an appointment to a Cleveland Metroparks position for an unidentified individual. He notes that a reference to "go[ing] back" to a restaurant does not supply probable cause that Fisher had bought Dimora dinner in the past and would do so again. (See id. at 165.)
Of course, if the Court were to consider this portion of the Master Affidavit in a vacuum, it might find that probable cause was lacking. The Court is required, however, to consider the entire affidavit and determine whether, under the totality of circumstances, there is probable cause to believe that a crime has been committed and that evidence of such crime will be discovered during a search of the premises in question. See United States v. Olson, 408 F.3d 366, 372 (7th Cir.2005) (affirming denial of motion to suppress; individual details were not sufficient for probable cause but together supported issuance of search warrant); United States v. Maddox, No. 2:09-CR-045, 2010 WL 3155896, at *2 (E.D.Tenn. Aug. 10, 2010) (quoting United States v. Landmesser, 553 F.2d 17, 20 (6th Cir. 1977) ("Individual paragraphs should not be read `in isolation from the remainder of the affidavit.'")).
On the whole, the Master Affidavit provided a sufficient basis for the neutral magistrate to conclude that there was probable cause to believe that Dimora and others had engaged in criminal activity and that evidence of such activity was likely to be found in Dimora's office and home. For this reason alone, Dimora's motion to suppress must be denied.
Even if probable cause were lacking, however, the searches would still be upheld under the good faith exception articulated in United States v. Leon, 468 U.S. 897, 104 S.Ct. 3430, 82 L.Ed.2d 677 (1984). Under this exception, the exclusionary rule will not apply to bar the admission of evidence seized in violation of the Fourth Amendment where the officers had a "good-faith reliance on a search warrant that is subsequently held to be defective." United States v. Weaver, 99 F.3d 1372, 1380 (6th Cir.1996). The "good-faith inquiry is confined to the objectively ascertainable question whether a reasonably well trained officer would have known that the search was illegal despite the magistrate's authorization. In making this determination, all of the circumstances ... may be considered." Leon, 468 U.S. at 922-23 n. 23, 104 S.Ct. 3405.
The good-faith defense will not apply, however, where: (1) the supporting affidavit contains information the affiant knew or should have known is false; (2) the issuing magistrate lacked neutrality and detachment; (3) the affidavit is devoid of information that would support a probable cause determination making any belief that probable cause exists completely unreasonable; or (4) the warrant is facially deficient. Leon, 468 U.S. at 923, 104 S.Ct. 3405; United States v. Helton, 314 F.3d 812, 824 (6th Cir.2003).
The government argues that, given the level of detail in the Master Affidavit, setting forth over 60 schemes, many of which contained "explicit exchanges of things of value for official acts," and the details and specific terms of the categories of documents to be retrieved, the officers acted in
Dimora challenges a finding of good faith, however, arguing that the absence of probable cause is so great as to render it unreasonable that any officer would have found probable cause, due to a lack of nexus between the items sought and the location to be searched. However, "[w]here a warrant is held invalid due to a simple error in the determination of probable cause, the evidence should be suppressed only if the supporting affidavit was `so lacking in indicia of probable cause as to render official belief in its existence entirely unreasonable.'" United States v. Savoca, 761 F.2d 292, 296 (6th Cir.1985) (quoting Leon, 468 U.S. at 923, 104 S.Ct. 3405) (emphasis in original). As set forth above, the agents offered detailed information as to Dimora's use of his home and office and why evidence of suspected illegal activity would be found at these locations. Even if this information was technically insufficient to establish the necessary nexus, which this Court does not believe that it was, "the connection was not so remote as to trip on the `so lacking' hurdle." United States v. Schultz, 14 F.3d 1093, 1098 (6th Cir.1994) (quoting Leon, 468 U.S. at 923, 104 S.Ct. 3405) (finding the existence of good faith even though the affidavits failed to establish the necessary nexus); see Van Shutters, 163 F.3d at 338 (same). The Court thus finds that the searches were constitutionally valid for the additional reason that the officers executed the search warrants in good faith.
Defendant Dimora also complains that the warrants sought information, including campaign contributions, which could be categorized as protected by the First Amendment, and suggests that the directive to seize documents containing such information was based on mere "conclusions" that were not supported by "concrete evidence" that Dimora accepted campaign contributions in exchange for steering bond issuances and providing other official acts. (Mot. at 13.)
It is true that the seizure of protected speech requires an application of the Fourth Amendment with "scrupulous
Here, the affidavit offered in support of the warrants established multiple schemes, the existence of which was supported by information from confidential sources and intercepted wiretaps involving Dimora and others, wherein Dimora was allegedly motivated in the performance of his official duties by the likely receipt of campaign contributions. (See Curtis Master Aff. at 22, 41, 156, 157, 158-61, 162-65, 189-91, 273-74, 276-78, 281-85.) The fact that some of the seized property was protected by the First Amendment does not insulate it from seizure where the other requirements of the Fourth Amendment — probable cause, particularity, and sufficient nexus — are met. See Frisby, 79 F.3d at 32.
Because the warrants and the supporting affidavit satisfy the Fourth Amendment's requirements and because the warrants were executed in good faith, Dimora's motion to suppress the evidence resulting from the search of his home and office is DENIED.
Defendant Dimora moves for the disclosure of all grand jury transcripts, as well as the identification of all confidential sources and government deals. He bases his request for grand jury transcripts on the following grounds: (1) extensive and ongoing use of the grand jury; (2) such information may contain "relevant and possibly exculpatory [Brady] evidence"; (3) the inability to identify any of the government's confidential sources; and (4) extensive publicity. He makes further claims with respect to his request for the identities of confidential informants and any deals they may have been given, noting that without such information he will be unable to investigate whether such individuals have relevant or exculpatory evidence. According to Dimora, there is a "possibility that an informant may possess evidence relevant to Mr. Dimora's innocence." (Mot. at 7.) The government filed a response to Dimora's motion (Doc. No. 481) and Dimora subsequently filed a reply (Doc. No. 502.)
A party seeking disclosure of grand jury material under Rule 6(e) of the Federal Rules of Criminal Procedure must demonstrate a particularized need. See Douglas Oil Co. v. Petrol Stops Northwest, 441 U.S. 211, 228, 99 S.Ct. 1667,
Dimora offers nothing more than general representations that the transcripts may contain relevant and/or exculpatory evidence. This generalized request is insufficient to establish a particularized need for the transcripts. See, e.g., United States v. Miramontez, 995 F.2d 56, 59-60 (5th Cir.1993) (particularized need not shown because request was general and did not specify which portions of proceedings should be disclosed); United States v. Azad, 809 F.2d 291, 294-95 (6th Cir.1986) (particularized need not shown when request for wide-ranging search to bolster unsubstantiated claim of prosecutorial misconduct was based on prosecutor's "off-hand remarks"); cf. In re Grand Jury Proceedings, 838 F.2d 304, 308 (8th Cir. 1988) (particularized need existed because plaintiff's case significantly hampered without grand jury materials, documents sought generated independently of grand jury, grand jury long dissolved, and disclosure carefully limited).
Defendant Dimora's request for grand jury transcripts is, therefore, DENIED.
Dimora also seeks the identification of all confidential sources. He argues that "[b]oth the identity and information regarding any confidential informants is important to the defense because of the possibility that an informant may possess evidence relevant to Mr. Dimora's innocence." (Mot. at 7.) He further notes that his request also encompasses the government's entire internal "Confidential Source file." (Id.)
The government has a limited privilege to withhold the identity of a confidential informant. Roviaro v. United States, 353 U.S. 53, 59-62, 77 S.Ct. 623, 1 L.Ed.2d 639 (1957); United States v. Jenkins, 4 F.3d 1338, 1341 (6th Cir.1993); see United States v. Moore, 954 F.2d 379, 381 (6th Cir.1992). "The purpose of the privilege is the furtherance and protection of the public interest in effective law enforcement." Roviaro, 353 U.S. at 59, 77 S.Ct. 623. It encourages persons to cooperate with the police in such a capacity. Id. The privilege is not, however, absolute. "Where disclosure of an informant's identity is relevant and helpful to the defense of an accused, or is essential to a fair adjudication of the case, the privilege must give way." United States v. Leslie, No. 4:02CR039, 2002 WL 32059743, at *3 (E.D.Tenn. Oct. 4, 2002) (citing Roviaro, 353 U.S. at 60-61, 77 S.Ct. 623) (omitting further citations); see United States v. Hammons, 411 Fed.Appx. 837, 843 (6th Cir.2011); Moore, 954 F.2d at 381 (quoting Roviaro, 353 U.S. at 62, 77 S.Ct. 623) ("The court must `balance the public interest in protecting the flow of information against the individual's right to `prepare his defense.'").
The burden of establishing the need for disclosure of an informant's identity is upon the party who seeks the disclosure. See Moore, 954 F.2d at 381; United States v. Sharp, 778 F.2d 1182, 1185 (6th Cir.1985). A mere request is not sufficient to establish need. United States v. Smith, 90 Fed.Appx. 120, 125 (6th Cir.2004) (quoting
Here, Dimora offers nothing more than the "possibility" that such disclosure might lead to exculpatory evidence; this is insufficient to meet his burden. Further, the government has indicated that, to the extent such information triggers its discovery obligations under Giglio, Brady, and the Jenks Act, it will disclose the information in accordance with the rules of law enunciated under these authorities.
At the hearing on October 5, 2011, counsel for Dimora indicated that they were in possession of information that they believed called into question the integrity of a particular confidential source. Specifically, counsel indicated that they had engaged in conversations with counsel for the individual they believe to be the confidential source in question, and he shared with them his client's belief that he did not say certain things that were allegedly attributed to him in the Master Affidavit. The Court granted Dimora leave to supplement his motion with evidence that would substantiate his counsel's claims. His supplement (see Doc. No. 519, filed under seal) merely reiterates the suspicions his counsel shared with the Court at the hearing, but provides no substantiation (such as an affidavit) for these claims. These bare suspicions are insufficient to justify requiring the government to identify this, or any, confidential source.
Dimora has failed to meet his burden of demonstrating the need for such information. His motion to compel the government to reveal the identities of the confidential sources is, therefore, DENIED.
Both defendants seek the suppression of all the wiretap communications intercepted by the FBI in which they are parties, as well as the suppression of all information derived therefrom. The government has filed an "Omnibus Response" (Doc. No. 476) to the defendants' motions to suppress the wiretaps and fruits of the wiretaps,
The first wiretap application was filed by the government on December 5, 2007, and the first order of authorization was also filed on December 5, 2007. This application was renewed for the first time on December 21, 2007. Additional applications for renewal followed. While each subsequent application included different factual details and identified new schemes as they were unearthed during the investigation, each of the applications mirrored the original application. The first order of authorization was also issued on December 5, 2007, and each of the subsequent orders likewise mirrored the order issued on December 5, 2007. The Court's analysis therefore applies to all of the applications and orders.
Title III of the Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. §§ 2510-2520, allows an aggrieved person
18 U.S.C. § 2518(10)(a).
Both the Fourth Amendment and Title III require a showing of probable cause before a wiretap authorization order may issue. Specifically, Title III requires a finding of probable cause as to three circumstances. The judge reviewing a wiretap application must determine, among other things, that
18 U.S.C. 2518(3)(a)-(d). The challenges to probable cause brought by Dimora and Gabor deal primarily with the probable cause requirements found in paragraphs (a) and (b).
"[I]n evaluating the existence of probable cause, reviewing courts must give substantial deference to the [issuing judge's] determination." United States v. Leon, 468 U.S. 897, 967, 104 S.Ct. 3430, 82 L.Ed.2d 677 (1984) (Stevens, J., concurring in part and dissenting in part) (citations omitted). "Thus, the fact that a later trial judge or reviewing court may feel that a different conclusion was appropriate does not require, nor even authorize, the suppression of evidence gained through" the issuance of the wiretap order in question. Alfano, 838 F.2d at 162. An issuing judge's "determination on the question of probable cause will not be reversed if the record contains a `substantial basis for his probable cause findings.'" Id. (quoting United States v. Lambert, 771 F.2d 83, 93 (6th Cir.1985), cert. denied, 474 U.S. 1034, 106 S.Ct. 598, 88 L.Ed.2d 577 (1985)); see also United States v. Allen, 211 F.3d 970, 973 (6th Cir.2000) (citation omitted) (Regarding probable cause determinations, "an issuing magistrate's discretion should only be reversed if it was arbitrarily exercised.").
Regarding Title III probable cause determinations, a careful reading of § 2518(3) shows that provision contains no requirement that, in order for a valid wiretap order to issue, probable cause be demonstrated as to every individual who is either named as a possible interceptee or who is unnamed yet ultimately intercepted. Rather, the issuing judge need only determine that there is probable cause that "an individual is committing, has committed, or is about to commit a" qualifying offense. 18 U.S.C. § 2518(3)(a) (emphasis added). Probable cause need not exist as to every individual named in the wiretap application and order. United States v. Martin, 599 F.2d 880, 885 (9th Cir.1979) ("Section 2518(3)(a) permits a judge to issue an authorization order upon a showing that probable cause exists with respect to an individual; it does not expressly require a similar showing with respect to each person named in the application."); see also, e.g., United States v. Figueroa, 757 F.2d 466, 475 (2d Cir.1985) (quoting United States v. Tortorello, 480 F.2d 764, 775 (2d Cir.1973)) ("`[T]he government need not establish probable cause as to all participants in a conversation. If probable cause has been shown as to one such participant, the statements of the other participants may be intercepted if pertinent to the investigation.'"); United States v. Domme, 753 F.2d 950, 954 n. 2 (11th Cir.1985) (citations omitted) ("A wiretap application need not provide probable cause of criminal activity for each person named in an application, or even every resident of the place where the wiretap is sought. What is required is sufficient information so that a judge could find probable cause to believe that the telephone in question is being used in an illegal operation.") (citation omitted); United States v. Dorfman, 542 F.Supp. 345, 377-78 n. 30 (N.D.Ill.1982) (citation omitted), judgment aff'd sub nom. United States v. Williams, 737 F.2d 594 (7th Cir.1984) ("[T]he government need not demonstrate probable cause for every person named as an interceptee in the order, and ... suppression is not required
To require a showing of probable cause as to every potential interceptee named in the application and order would place the government in a most untenable position. The Supreme Court has held that "a wiretap application must name an individual if the Government has probable cause to believe that the individual is engaged in the criminal activity under investigation and expects to intercept the individual's conversations over the target telephone." United States v. Donovan, 429 U.S. 413, 428, 97 S.Ct. 658, 50 L.Ed.2d 652 (1977); see also United States v. Kahn, 415 U.S. 143, 155, 94 S.Ct. 977, 39 L.Ed.2d 225 (1974) ("Title III requires the naming of a person in the application or interception order only when the law enforcement authorities have probable cause to believe that that individual is `committing the offense' for which the wiretap is sought."). If the government were also required to exclude from its list of interceptees all individuals for whom it did not have probable cause, it would be left on a tightrope with no room for even the slightest error when making probable cause determinations. The smallest misstep in either direction would render it in violation of Title III or the Fourth Amendment. Failure to name an individual for whom there was probable cause would violate Donovan, and failure to exclude an individual for whom probable cause was lacking would also amount to a violation. See United States v. Rodriguez, 606 F.Supp. 1363, 1370 (D.Mass.1985) ("To require identification of persons for whom probable cause exists, yet punish for naming a person for whom it does not exist would be to force passage between Scylla and Charybdis."); Martin, 599 F.2d at 885 (noting that such a requirement would create "an impossible burden of exactness" for the government). This task would be especially harrowing in investigations which — like the one underlying the case at bar — involve a very large number of alleged participants and potential participants.
Moreover, the naming in an application and order of individuals against whom the government has not demonstrated probable cause but whose conversations may nevertheless be intercepted often redounds to the benefit of those interceptees. Section 2518(8)(d) requires that after-the-fact notice of the interception (or lack thereof if the judge reviewing the application for wiretap denies the application) be issued to all those "named in the order or the application." In light of these provisions, "over-inclusion of persons in [a] wiretap affidavit is not a cause for suppression but rather `furthers the policy of preventing unreasonable invasions of privacy' by ensuring that persons will be given notice of the order and intercepted communications." United States v. Ambrosio, 898 F.Supp. 177, 184 (S.D.N.Y.1995) (quoting and characterizing United States v. Milan-Colon, Nos. S2, S3 91CR.685(SWK), 1992 WL 236218 (S.D.N.Y. Sept. 8, 1992)).
Additionally, § 2518(1)(e) requires the wiretap applicant to supply the reviewing judge with "a full and complete statement of the facts concerning all previous applications known to" the applicant where such applications involved an individual named in the current application. This provision allows the reviewing judge to examine the fruit — or lack thereof — of past wiretaps and thus make a more informed decision as to the propriety of the wiretap application in question. See CLIFFORD FISHMAN & ANNE MCKENNA, WIRETAPPING & EAVESDROPPING: SURVEILLANCE IN THE INTERNET AGE § 8:33 (2010) (discussing the benefits — for both the named individual and the government — of including individuals in a
Analogy to a conventional search and seizure further demonstrates the soundness of the principle that probable cause as to every interceptee is not necessary. If probable cause exists to believe that documents relating to the execution of a crime are housed in a specified residence and a warrant is issued as to that residence and those documents, they may be seized even if they were written in whole or in part by an individual against whom the searching authority did not have probable cause to believe was personally involved in the crime. See generally Kahn, 415 U.S. at 155 n. 15, 94 S.Ct. 977 (analogizing wiretap orders to conventional search and seizure warrants in a related context).
Both defendants challenge the veracity or reliability and basis of knowledge of the confidential sources relied upon by the government to demonstrate probable cause in its wiretap applications. Defendant Dimora contends that the information obtained from the confidential sources "was from unreliable individuals looking to avoid their own legal problems, lacked any explicit or detailed information, was often second hand and was often easily contradicted with a simple public records check or investigation." (Dimora Mot. at 12.)
It appears that Dimora's challenges to veracity or reliability and basis of knowledge are limited to five of the ten confidential sources relied upon in the affidavit accompanying the government's December 5th wiretap application. For these five confidential sources, Dimora brings three main types of concerns: (1) that the information provided by the confidential source constituted hearsay or rumor (e.g., id. at 16, 19); (2) that the confidential source erred on a factual detail (e.g., id. at 13, 14, 20, 33); and (3) that the confidential source is known to have himself
Defendant Gabor's arguments are similar, though he raises challenges to nine of the ten confidential sources relied upon in the government's December 5th application. Gabor asserts that, though the government is required to establish the veracity or reliability and basis of knowledge for all the confidential sources, it has instead merely alleged "in vague terms" that these factors are present for each confidential source and "provides no specific details for corroboration." (Gabor Mot. at 8.) Where acts of specific corroboration are presented in the affidavit, Gabor contends that the facts corroborated consist only of information that is "generally known" or "common knowledge." (Gabor Reply at 3, 4.) Gabor also raises several specific concerns as to the reliability of individual sources. (E.g., Gabor Mot. at 8; Gabor Reply at 3.)
Informants are frequently used as sources for establishing probable cause in Title III wiretap applications. While, all other things being equal, named informants are understandably considered more reliable than confidential ones, see United States v. Ferguson, 252 Fed.Appx. 714, 720-21 (6th Cir.2007), use of confidential informants is nevertheless common, and often necessary. Moreover, "[a]n informant's willingness to be named is not necessarily a better predictor of reliability... than an informant's having a track record of providing reliable information." United States v. McCraven, 401 F.3d 693, 698 (6th Cir.2005).
The issuing judge here — District Judge Lesley Wells — had sufficient information to make an independent determination as to the weight that should be given to the confidential source information contained in the application and as to the presence or absence of probable cause for issuance of the wiretap order. Though the defendants raise a number of specific concerns regarding the reliability of the confidential sources, they are so focused on these "trees" of concern that they have lost sight of the probable cause "forest" that surrounds them.
For each of the ten confidential sources relied upon in the December 5th affidavit (Doc. No. 430-1), the affiant informs the issuing judge how long the confidential source has been providing the FBI with information. The length of relationship varies considerably, the longest being seven years and the shortest being sometime in 2007 before the December 5th affidavit was sworn.
Defendant Gabor contends that these sorts of "vague" assertions were not sufficient to allow Judge Wells to assess the confidential sources' reliability. "However, Sixth Circuit precedent clearly establishes that the affiant need only specify that the confidential informant has given accurate information in the past to qualify as reliable." United States v. Greene, 250 F.3d 471, 480 (6th Cir.2001). Here, the affiant averred that, for every confidential source relied upon, (1) that source has provided information in the past, (2) at least some of that information has been independently verified, and (3) the source had never been found to be false or misleading.
Even if the reliability of one or more of the confidential sources had been called into question by the affiant or otherwise, that ten apparently-autonomous individuals served as confidential sources in this case — and that they all provided information tending to show the existence of a public corruption conspiracy about which information could be gathered through a wiretap of the telephone facilities in question — would still constitute strong evidence from which an issuing court could infer probable cause. See United States v. Hyde, 574 F.2d 856, 863 (5th Cir.1978) (even though investigators admitted none of the sources were "independently completely reliable," fact that ten different informants who had no special reason to collaborate supplied information that agreed in many particulars and "was mutually reinforcing and corroborative" meant that probable cause could still be inferred). When multiple individuals, even those much less reliable than the confidential sources in this case, provide the same or similar information, the probability that that information is accurate greatly increases. See id. ("When three unreliable but unconnected persons all report the same fact, it is probable that the fact is true.").
In addition to the large number of confidential sources and the affiant's general assertions of corroboration and reliability found in the opening pages of the December 5th affidavit, the affidavit also contains a wide variety of other information that would have helped the issuing judge make an informed decision as to the reliability of the confidential sources and the existence of probable cause. First, as already indicated, the affidavit lists for each confidential source the various methods by which investigators corroborated that source's information. This includes, for three of the sources, the use of consensual recordings. The affidavit relies most heavily on two confidential sources in particular. Both of these sources participated in a number of consensual recordings and the single confidential, source who contributed most to the government's case for probable cause is averred to have made more than 500 consensual recordings. (12/5/07 Aff. at ¶ 5.I.) The government also goes even further by recounting in some detail a number of specific recordings made by some of the confidential informants — recordings some of which strongly reinforce the government's
The government also details other ways in which it has verified source information. The government discusses specific instances where physical surveillance, pen registry data, public records checks, and a "trash pull" were used to corroborate source information. In short, there was a great deal of information available upon which the issuing judge was able to rely in making an independent assessment of the reliability of the confidential sources in this case and of the existence of probable cause.
The defendants' general concerns as to the reliability of the confidential informants and the vagueness of the information supplied to support the sources' reliability now having been dealt with, we turn to the defendants' source-specific concerns. This topic can be dealt with rather briefly, as some of these concerns have already been addressed and the remainder are not sufficient to warrant a reconsideration of the issuing judge's assessment of the sources' reliability. Defendant Dimora's concerns as to the criminal records or other criminal involvement of some of the confidential sources fall into the former category. As already stated, the December 5th affidavit contains information as to the criminal history of each confidential source — information that the issuing judge was free to weigh as he felt appropriate in making her reliability and probable cause determinations. Defendant Dimora also asserts that some of the information gleaned from the confidential sources constitutes rumor or hearsay (sometimes multiple levels of hearsay). Inclusion of hearsay information in such an affidavit is far from unheard of. See, e.g., United States v. Graham, 275 F.3d 490, 503 (6th Cir. 2001) (stating affiant in search warrant affidavit relied in part on hearsay). Indeed, most statements made by any informant which are then offered in the affidavit by an affiant in order to demonstrate the truth of those statements are hearsay by definition. Dimora's major qualm here, however, is with the instances where the affiant relied upon statements conveyed to him through multiple layers of hearsay. It is true that, as a general rule, a statement's reliability is inversely proportional to its indirectness. But Judge Wells was certainly competent to take this factor into consideration when making her probable cause determination.
Dimora also points out approximately four instances where he contends a confidential source misstated specific facts. (E.g., Dimora Mot. at 13, 14, 20, 33.) None of the four — nor the four combined — would alter the overall reliability or probable cause calculus significantly. One of the alleged misstatements can be recognized only by one truly skilled in hair-splitting. Dimora asserts that a confidential source was untrustworthy in part because that source indicated that money would flow from a specified entity, "through" a certain individual who sat on the board of that entity, and on to Dimora. (Dimora Mot. at 20.) Dimora takes issue with the use of this preposition, asserting that it is impossible for money to flow "through" an individual who serves in such capacity. (Id.)
Only one of these alleged misstatements has any possible potential to damage the case for probable cause. A confidential source reported that over the two years leading up to the date of the affidavit, a specified company had "made large contributions to Dimora in exchange for public contract awards." (12/5/07 Aff. at ¶ 13.) Dimora asserts that, during the two-year period in question, he received no contributions from the company and that the company received only a single contract
The specific "errors" pointed out by Gabor are likewise insufficient to raise significant doubts as to probable cause. Some, in fact, are not errors at all. Gabor asserts that the fact that one confidential source had served as a reliable informant six years earlier could not be used to support the source's reliability now in part because the information was "stale." (Gabor Mot. at 8.) Gabor appears to be confusing this situation — where information on past reliability is being used to support present reliability — with the doctrine of staleness which applies to information included in the affidavit and used to support probable cause as to whether the things or information to be seized are likely still present. See, e.g., United States v. Brooks, 594 F.3d 488 (6th Cir.2010) (applying the staleness doctrine in determining whether probable cause existed at the time of the search warrant, not to determine the veracity of the source).
Gabor also points to several instances of FBI corroboration that were quite weak. The clearest example of weak corroboration identified by Gabor is found in paragraph nine of the February 4, 2008, affidavit. There, the affiant averred that, after receiving information from one of the confidential sources regarding statements made by a certain attorney who had met with Dimora, the FBI determined that the attorney did indeed exist and that he had an office in the city reported by the confidential source. Gabor is right to point out the minimal value of corroborating such an insignificant and relatively simple fact. (Gabor Reply at 4.) Such corroboration contributes little, if anything, to the reliability of the confidential source or to the existence of probable cause. But Gabor neglects the considerable quantity of other information, some of which has already been discussed, that was at the issuing judge's disposal in making her initial determination as to the reliability of the confidential sources. For instance, this particular source's reliability had also been verified through, among other methods, consensual recordings. (12/5/07 Aff. at ¶ 5.) Further, this instance of corroboration was offered by the government in its response merely to indicate that the FBI was continuing to verify the reliability of its confidential sources well after the December 5th wiretap order was issued and the first round of wiretaps was completed. It was not held forth as a model of diligent investigative corroboration.
Both defendants direct the bulk of their arguments in these wiretap motions toward questioning the existence of probable cause in ways beyond the reliability of the confidential sources. Gabor attacks the sufficiency of the substantive bribery schemes alleged in the affidavits. He asserts that the evidence provided in the December 5th and December 21st affidavits was "insufficient to establish probable cause with respect to Gabor." (Gabor Mot. at 7 (emphasis added).)
The weight of Gabor's attack is targeted at the December 5th affidavit, and is thus largely in vain. As already set forth above, the wiretap application and order need not demonstrate probable cause "with respect to Gabor." Rather, the only probable cause requirements are the three found in paragraphs (a), (b), and (d) of § 2518(3). For the wiretap applications to withstand probable cause scrutiny, therefore, they must demonstrate probable cause only as to the following: (1) that "an individual is committing, has committed, or is about to commit" a qualifying offense; (2) that "particular communications concerning that offense will be obtained through" the wiretap; and (3) that the telephone to be tapped "[is] being used, or [is] about to be used, in connection with the commission of" a qualifying offense or is "leased to, listed in the name of, or commonly used by" an individual involved with the crime. (Emphasis added).
As to the December 5, 2007, application and order, Gabor was not even named as a potential interceptee, let alone a "target interceptee" or "target subject." It appears from the December 5th affidavit that, as of that date, Gabor was not even a subject of the investigation. Rather, Gabor became a target of the investigation based, at least in part, on the information gleaned from the first round of wiretaps effected under the December 5th order. So long as the probable cause requirements above were met, this is perfectly acceptable. One of the main purposes of many wiretaps, after all, is to determine the extent of the alleged conspiracy, both in terms of the "magnitude" of wrongdoing and the number of people involved. Indeed, the December 5th affidavit states that "others yet unknown" were likely also involved in committing the "target offenses." Cf. United States v. Kahn, 415 U.S. 143, 94 S.Ct. 977, 39 L.Ed.2d 225 (1974) (contents of wife's conversation with a gambling conspiracy member on the wiretapped telephone facility was admissible even where the application and order listed only conversations of husband and "of others yet unknown" as covered under the wiretap order). Even if the investigators believed that it was likely that Gabor would be involved in some of the conversations intercepted, "[i]t is not a constitutional requirement that all those likely to be overheard engaging in incriminating conversations be named." Donovan, 429 U.S. at 427 n. 15, 97 S.Ct. 658.
In short, there was no assertion by the government in the December 5th affidavit that it had probable cause to believe Gabor was involved in any target offense, nor did the authorizing court make such a finding. Therefore, to the extent that Gabor attacks the existence of probable cause as to himself in the December 5th authorization order, his attack is of no avail, assuming that probable cause existed as to at least one of the targets using the telephone facility for which the wiretap order was issued (an issue discussed in detail below).
The government did claim probable cause as to Gabor in its December 21st application. Gabor is correct that the information included in the December 21st affidavit is at best tenuous support for probable cause as to Gabor, but that has
Dimora's probable cause challenges extend to four of the wiretap applications: those dated December 5, 2007; December 21, 2007; January 19, 2008; and February 4, 2008. Dimora's challenges to the December 5th application are the most important, as the information gleaned from the wiretap order authorized in light of that application was used to help build the case for the December 21st and subsequent applications. Many of Dimora's arguments go to the reliability of the confidential sources, a topic already fully addressed. Dimora's other probable cause arguments mostly either allege minor factual discrepancies or assert that there are missing pieces to the puzzle, that is, that there was not enough information provided in the affidavit to show probable cause that Dimora was engaged in illegal conduct.
But as previously noted, in order for the wiretap order to issue, probable cause need be established as to only one target interceptee. Even more important in light of the arguments advanced here, Dimora loses sight of the fact that an issuing judge is to "consider whether the totality of the circumstances supports a finding of probable cause, rather than engaging in line-by-line scrutiny." United States v. Woosley, 361 F.3d 924, 926 (6th Cir.2004) (citing United States v. Greene, 250 F.3d 471, 479 (6th Cir.2001)). The affidavit must be read as a whole, not disassembled and scrutinized bit by bit. See United States v. Jewell, 60 F.3d 20, 23 (1st Cir.1995) (rejecting "piecemeal" review of a warrant affidavit and stating instead that affidavit must be reviewed "as a whole").
Keeping this standard in mind, there was ample information in the December 5th affidavit for the issuing judge to make the determination that probable cause as to Dimora himself was present. Looking at only two of the numerous "schemes" discussed in the affidavit demonstrates that this is the case.
Another "scheme" discussed in the affidavit involved the pending sale of a building owned by Cuyahoga County. The following information supporting probable cause that Dimora was involved in criminal activity which he would discuss over the Pumper telephone is found in this other "scheme" (¶¶ 60-68): (1) on November 15, 2007, the Cuyahoga County Commissioners voted to place the property in question up for sale (¶ 62); the affiant indicated that Pumper had close ties to a certain company ("Company A") (¶ 61); (2) telephone toll data indicated that a number of calls were placed on the evening of November 15th between, variously, Dimora, Company A, Pumper, and Michael Forlani (another major contractor with allegedly close ties to Dimora and Pumper) (¶ 64); (3) during the consensually-recorded meeting mentioned above between Pumper and the confidential source, Pumper, after rubbing his fingers together in a "money" gesture, stated that the County Commissioners often "want a little action" (¶ 66); and (4) Pumper indirectly indicated to the confidential source that the reason the County had opted to purchase the now-for-sale building in the first place instead of another property under consideration was because the owner of the other property refused to pay bribes or kickbacks (¶ 66-67).
Other "schemes" provided a large amount of evidence supporting probable cause that Dimora was involved in criminal activity yet did not make a strong connection between that activity and use of the Pumper telephone. By viewing the affidavit as a whole, however, this information can be coupled with the evidence, found elsewhere in the affidavit, of the close relationship and frequent telephone calls between Dimora and Pumper. One example of such a scheme is that involving the bidding process for a contract for "soft demolition" in a building owned by the County. This scheme included the following information supporting probable cause as to Dimora (¶¶ 38-57): (1) pen registry data showed that, in the hours following the county commissioners' meeting at which contractor bids for the project were opened, a number of calls were placed between Dimora's telephone and a major Cleveland area contracting company (this company was not mentioned as being involved in the bidding process, however)
These are only three of the at least seven different "schemes" laid out in the December 5th affidavit. And the information provided here goes only to probable cause as to a single interceptee — Dimora. As might be expected, the case for probable cause as to Steve Pumper, the individual whose phone was the one against which the December 5th wiretap order was directed, is likewise very strong. Moreover, Dimora and Pumper are only two of the four "target interceptees" named in the affidavit. (¶ 5.)
As to the December 21st application, probable cause to continue the wiretap on the Pumper telephone is easily established. The affidavit incorporates by reference the contents of the earlier December 5th affidavit. (¶ 8.) In addition, the affidavit discusses multiple calls intercepted pursuant to the December 5th order in which Pumper made his influence with Dimora evident and available to others. (¶ 16.) The affidavit also documents a new bribe paid by Pumper to one of the confidential sources. (¶¶ 17-18.) Furthermore, the affidavit identifies telephone calls where Pumper appears to be arranging gifts for a member of the Cleveland City Council (¶ 16(j)) and Dimora (¶ 38(a)). These are just some examples of information provided in the December 21st affidavit that supports probable cause as to the continued interception of Pumper (and Dimora, among others) on Pumper's telephone.
The December 21st affidavit (Doc. No. 430-2) also includes a request to tap a phone owned by J. Kevin Kelley. Another of the confidential sources who has made consensual recordings as part of the investigation identified Kelley as Dimora's "bagman." (¶ 20). Kelley was a member of the Parma City School Board, and another confidential source reported that Kelley was involved in contract steering and kickbacks awarded to the school board. (¶ 22.) One such contract-for-kickback scheme involved one of Pumper's companies. (Id.) Telephone records identified 905 calls made between the Kelley telephone sought to be tapped and Dimora's home and cellular telephones from July 24, 2006, through December 15, 2007. (¶ 35.) Six hundred seventy-six calls were made between Kelley's telephone and Pumper's from November 8, 2006, through December 15 of the following year. (Id.). The affidavit provides information from a call intercepted during the first round of Pumper telephone wiretaps wherein
From the December 21st application forward, probable cause only continues to build as to Dimora, Gabor, and others. While Dimora and Gabor both attack details of later affidavits, their attacks are not broad-ranging enough to call Judge Wells's probable cause determination into question. Their motions to suppress the wiretaps in this case due to lack of probable cause are thus DENIED.
Both defendants suggest that the government failed to establish the necessity for wiretaps. Title III dictates that an application for a wiretap contain "`a full and complete statement as to whether or not other investigative procedures have been tried and failed or why they reasonably appear to be unlikely to succeed if tried or to be too dangerous.'" United States v. Stewart, 306 F.3d 295, 304 (6th Cir.2002) (quoting 18 U.S.C. § 2518(1)(c)). The purpose of this "necessity" requirement is "to ensure that a wiretap `is not resorted to in situations where traditional investigative techniques would suffice to expose the crime.'" Alfano, 838 F.2d at 163 (quoting United States v. Kahn, 415 U.S. 143, 153 n. 12, 94 S.Ct. 977, 39 L.Ed.2d 225 (1974)). "Further, the necessity requirement protects against the impermissible use of a wiretap as the `initial step in [a] criminal investigation.'" United States v. Rice, 478 F.3d 704, 710 (6th Cir.2007) (quoting United States v. Giordano, 416 U.S. 505, 515, 94 S.Ct. 1820, 40 L.Ed.2d 341 (1974)).
In establishing the necessity of the tap, "the government is not required to prove that every other conceivable method has been tried and failed or that all avenues of investigation have been exhausted." Alfano, 838 F.2d at 163. Instead, "`all that is required is that the investigators gave serious consideration to the non-wiretap techniques prior to applying for wiretap authority and that the court be informed of the reasons for the investigator's belief that such non-wiretap techniques have been or will likely be inadequate.'" Id. at 163-64 (quoting United States v. Lambert, 771 F.2d 83, 91 (6th Cir.1985)).
In Rice, the court affirmed the district court's finding that there was insufficient credible evidence that other investigative methods had been considered. The district court had determined that the explanations offered for not attempting certain techniques were merely pro forma recitations of the general shortcomings of each technique, and that the statements regarding physical surveillance were made recklessly inasmuch as they suggested that such a technique had been attempted when it had not. Stripping away the misleading information, the district court determined that the affidavit merely offered generalized and uncorroborated information about why certain techniques would not work, and did nothing more than establish that a confidential source was unable to penetrate the drug conspiracy and that the pen registers revealed a possible connection between the defendant and others with histories of drug-related arrests. The Sixth Circuit found that the district court
Relying on Rice, Dimora claims that the affidavits merely offer conclusory statements on why certain techniques are not likely to succeed. He also notes that other methods, such as trash pulls, were used with success. Gabor offers similar challenges as to "necessity," noting that the affidavits also indicate that interviews and physical surveillance had been highly effective. In particular, he observes that a combination of interviews and consensual recordings had yielded all of the evidence necessary to fully investigate a scheme involving Steve Pumper's bribery of a building inspector.
The government posits that each affidavit gave a lengthy and thorough discussion as to why alternative methods of investigation had been attempted and failed, why continued use of certain techniques would not yield the necessary results, or why certain techniques were unlikely to succeed. The affidavits discussed the past use of interviews, search warrants, trash pulls, surveillance, pen registers, confidential sources, consensual monitoring, and trap and trace, as well as the relative success of each technique. For example, with respect to interviews, the December 5th affidavit noted that, while interviews had been conducted in the past, many of the people interviewed did not have direct knowledge or were "no longer in a position to be directly involved in the illegal activity." (12/5/07 Aff. at ¶ 124.) It further noted that interviews of conspirators were likely to compromise the investigation by tipping off others involved and resulting in the destruction of evidence.
The affidavits also recount the past success of various other techniques, but explain why such techniques were likely to yield diminishing returns. For example, while noting that trash pulls at Dimora's house in September 2007 had netted some documents, subsequent pulls uncovered the fact that Dimora was shredding many of his discarded documents. The "mere fact that some investigative techniques were successful in uncovering evidence of wrongdoing does not mandate that a court negate the need for wiretap surveillance." Stewart, 306 F.3d at 305. As for confidential sources, the December 5th affidavit included a specific example of Dimora patting down an acquaintance to ensure that the person was not wearing a recording device. (¶ 143.) Further, while Dimora and Gabor challenge the affidavits' representation
"Far from being an initial step," the affidavits describe a lengthy and involved investigation into ongoing public corruption where a variety of investigatory techniques were utilized before wiretap authorization was sought. United States v. Sherrills, 432 Fed.Appx. 476, 481 (6th Cir. 2011) (citing Rice, and finding the necessity of wiretaps was established where affidavit set forth the details regarding a seven-month drug investigation involving the use of a variety of investigatory techniques and the limitations associated with a continued reliance on these methods). Indeed, numerous less intrusive methods were employed with varying success. The affidavits document these past successes and specific shortcomings, and demonstrate why wiretaps were necessary to advance the investigation. As such, the necessity requirement was met.
Finally, Dimora raised a number of miscellaneous issues relating to other Title III wiretap requirements. First, he claims that the wiretaps were not authorized by the proper authority under 18 U.S.C. § 2516(1), because they were authorized by John Roth, Acting Deputy Assistant Attorney General of the Criminal Division. This contention is wholly without merit. Section 2516(1) authorizes "any Deputy Assistant Attorney General or Acting Deputy Assistant General in the Criminal Division specially designated by the Attorney General" to authorize a Title III application. Exhibit 1 to the December 5th application contained the Attorney General's Order designating "any Acting Deputy Assistant Attorney General of the Criminal Division" to authorize wiretap applications. Exhibit 2 contained the authorization letter, signed by Acting Deputy Assistant Attorney General John Roth.
Dimora also suggests that the Title III orders do not identify the "person, if known, whose communications are to be intercepted," as required by 18 U.S.C. § 2518(4)(a), and do not identify the things to be seized with particularity. The Court previously considered, and rejected, similar
As he did with respect to the search warrants, Dimora also complains that the Title III wiretap orders impermissibly sought the interception of political speech. He states that "[t]he statements authorizing the seizure of this speech were overly broad and allowed law enforcement to seize all communications of Mr. Dimora many of which are constitutionally protected." (Mot. at 45.) As set forth above, the orders described with particularity the communications that were to be intercepted. That the monitoring agents may have
Gabor also requests a hearing pursuant to Franks v. Delaware, 438 U.S. 154, 98 S.Ct. 2674, 57 L.Ed.2d 667 (1978). Franks stands for the proposition that, when a defendant makes a "substantial preliminary showing that a false statement" is (1) "knowingly and intentionally, or with reckless disregard for the truth,... included by the affiant in the warrant affidavit" and (2) "necessary to the finding of probable cause," the Fourth Amendment entitles the defendant to a hearing. Id. at 155-56, 98 S.Ct. 2674. If, at the hearing, the defendant demonstrates by a preponderance of the evidence that the above are in fact true, "the search warrant must be voided and the fruits of the search excluded to the same extent as if probable cause was lacking on the face of the affidavit." Id. at 156, 98 S.Ct. 2674. Although material omissions, as opposed to affirmatively false statements, included in an affidavit, "are not immune from inquiry under Franks, ... an affidavit which omits potentially exculpatory information is less likely to present a question of impermissible official conduct than one which affirmatively includes false information." United States v. Atkin, 107 F.3d 1213, 1217 (6th Cir.1997) (citation omitted). After reviewing six separate affidavits totaling some 466 pages and containing a multitude of statements, Gabor identifies a scant seven, possibly eight, alleged false or incomplete statements that he asserts give him the right to a Franks hearing.
Even if all of these statements were found to be knowingly and intentionally false and therefore excised from the affidavits, the probable cause calculus would hardly be affected. The alleged false or incomplete statements for the most part go only to very specific issues. For perhaps a few of the statements, their effects
Furthermore, none of the statements are knowingly and intentionally false. Including analysis in this opinion of every allegedly false statement identified by Gabor is unnecessary. A representative statement or two, however, illustrate the futility of his attack. During a conversation between Kelley and Pumper, Kelley tells Pumper in regard to the personal construction work one of Pumper's companies is doing for Kelley, "You know I am not paying anyway, so it does not matter, right"? (12/21/07 Aff. at ¶ 29(d)). Later in the paragraph, the affiant concludes that the call demonstrated that Pumper "will be providing a thing of value in the form of free or discounted work." (Id.). Gabor asserts that Kelley's comment was "made in jest, a fact omitted from the affidavit." (Gabor Mot. at 22.) In fact Gabor's characterization comes closer to being a misrepresentation than does the government's. Immediately after the Kelley quote, above, the affidavit reads: "P[umper] laughed." (12/21/07 Aff. at ¶ 29(d)).
Gabor also challenges the government's conclusion that "[b]ased on the nature of the conversation," a call made on January 19, 2008, discussed kickbacks to Dimora. (Gabor Mot. at 22 (quoting 2/4/08 Aff. at ¶ 50(C)). But when the government sets forth a portion of the content of a call and then draws a conclusion, that conclusion is not a false statement. The issuing judge can decide whether she agrees with the conclusion or not. Moreover, it was perfectly reasonable, at least based on the excerpts of the call provided by the government in the February 4th affidavit, for the government to draw such a conclusion. Gabor asserts that, based on the nature of the call in its entirety, the government's conclusion is false, but Gabor does not provide the remainder of the call to the Court. Regarding this call and others, Gabor also asserts that the government "frequently omit[s]" the fact that Pumper, Gabor, Dimora, and other interceptees were personal friends. But personal friends can still violate the Hobbs Act, and many of the dealings detailed in the affidavits are not of the kind common among those interested only in friendship.
Because Gabor has not demonstrated that any of the statements made by the affiant in any of the wiretap affidavits at issue in this case were knowingly and intentionally false, let alone that such statements were crucial to a finding of probable cause, his request for a Franks hearing is DENIED.
Title III requires the government to conduct electronic surveillance "in such a way as to minimize the interception of communications not otherwise subject to interception." 18 U.S.C. § 2518(5). To assess minimization efforts, the Court conducts "an objective assessment of the officer's actions in light of the facts and circumstances confronting him at the time." Scott v. United States, 436 U.S. 128, 136, 98 S.Ct. 1717, 56 L.Ed.2d 168 (1978); see United States v. Feldman, 606 F.2d 673, 678 (6th Cir.1979) (citation and internal
Initially, the government must make a prima facie showing of reasonable minimization. See United States v. Yarbrough, 527 F.3d 1092, 1098 (10th Cir.2008) (citing United States v. Willis, 890 F.2d 1099, 1102 (10th Cir.1989)); United States v. Gray, 372 F.Supp.2d 1025, 1042 (N.D.Ohio 2005), aff'd in relevant part, 521 F.3d 514 (6th Cir.2008). "Then, the burden shifts to the defendant to show that more effective minimization was possible." Gray, 372 F.Supp.2d at 1042 (citing Willis, 890 F.2d at 1102). As to the defendant's burden, "it is not enough to identify particular calls which [he] contend[s] should not have been intercepted; [he] must establish a pattern of interception of innocent conversations which developed over the period of the wiretap." United States v. Lawson, 780 F.2d 535, 540 (6th Cir.1985) (internal citations and quotations omitted.) If the defendant fails to meet this burden, the court will deny the motion to suppress, "even if the defendant has identified isolated instances where the [g]overnment failed to minimize non-pertinent conversations." Gray, 372 F.Supp.2d at 1042-43 (citing United States v. Armocida, 515 F.2d 29, 45 (3rd Cir.1975)).
In applying the reasonableness standard articulated in Scott, courts look to a variety of factors including: "the nature and scope of the criminal investigation; the [g]overnment's reasonable expectations of the character of conversations; and, the extent of judicial supervision over the surveillance." Feldman, 606 F.2d at 678 (collecting cases); see United States v. Uribe, 890 F.2d 554, 557 (1st Cir.1989); United States v. Thomas, No. 5:07 CR 00563, 2008 WL 5378345, at *2 (N.D.Ohio Dec. 19, 2008). Courts may also consider "at exactly what point during the authorized period the interception was made," Scott, 436 U.S. at 141, 98 S.Ct. 1717, as well as the government's internal monitoring of minimization. United States v. Parks, No. 95 CR 510, 1997 WL 136761, at *13 (N.D.Ill. Mar. 24, 1997) (citing United States v. Dorfman, 542 F.Supp. 345, 391 (N.D.Ill.1982)); United States v. Villegas, No. 92 CR 699(CSH), 1993 WL 535013, at *9 (S.D.N.Y. Dec. 22, 1993).
With respect to the nature and scope of the criminal investigation, "when the investigation is focusing on what is thought to be a widespread conspiracy more extensive surveillance may be justified in an attempt to determine the precise scope of the enterprise. And it is possible that many more conversations will be permissibly intercepted because they will involve one or more of the co-conspirators." Scott, 436 U.S. at 140, 98 S.Ct. 1717; see United States v. Adams, 759 F.2d 1099, 1115 (3d Cir.1985); Parks, No. 95 CR 510, 1997 WL 136761, at *12 ("The fact that this investigation was directed against a broad conspiracy eases the government's minimization burden.") The investigation further increases in complexity where the target interceptees intermingle conversations about legitimate business with those about corrupt business or illegal activity, see United States v. Abascal, 564 F.2d 821, 827 (9th Cir.1977) ("The conversing conspirators
The Court begins with the government's duty to make a prima facie showing of reasonableness, and observes that it previously considered the reasonableness of the government's efforts as to these particular wiretaps. In United States v. McCafferty, this Court found that the government had made a showing that its minimization efforts were objectively reasonable. 772 F.Supp.2d at 870-74. Specifically, the Court held:
There is nothing presently before the Court that would cause it to disturb its earlier determination that the government met its initial burden. By implication, Dimora suggests that the Court's prior determination that the government produced substantial evidence that the co-conspirators employed ambiguous or coded language during their phone conversations was in error. Dimora claims that the target interceptees and those they contacted "spoke of their business and personal dealings in clear and unambiguous language." (Mot. at 8.) Yet, the calls demonstrate that certain code was, indeed, employed by the participants.
Perhaps even more significant was the use of ambiguous or guarded language. Participants often made vague references to prior unidentified meetings, discussions, or projects, and many calls were merely continuations of prior conversations (which may or may not have been captured) where each participant assumed that the person on the other end understood the subject matter that was up for discussion.
Dimora also references a report containing statistics regarding the average number of intercepted communications in this district, which shows that the average investigation nets considerably fewer than the 44,000 calls that were captured with the present wiretaps. However, as defendants have often reminded this Court, this case is far from average, and with a large number of schemes and participants, along with the extensive use of cellular telephones to facilitate the conspiracy, it is not surprising that the wiretaps yielded a large number of calls. Dimora further questions, without support, whether the government submitted bi-monthly reports to Judge Wells. There is nothing in the record to suggest that the government failed to submit such reports, and the fact that the Title III orders required the submission of such reports, coupled with the issuing judge's approval of subsequent orders,
In sum, the Court finds that the government has met its burden of demonstrating a prima face case of reasonable minimization. The burden now shifts to Dimora to show a pattern of intercepting innocent conversations. Dimora fails to meet this burden.
In an effort to demonstrate a pattern, Dimora focuses on the minimization of certain cellular and home telephone lines, making some general statements as to the effectiveness of the government's efforts as to each line. In support of his general statements, he offers a sample of calls that he believes shows a chronic failure to minimize. A discussion of these highlighted calls, however, demonstrates that his "proof" falls far short of establishing a pattern of intercepting and monitoring innocent conversations.
First, Dimora maintains that, prior to February 2008, "the Government failed to minimize 100% of Mr. Dimora's phone calls." (Mot. at 11.) He begins with calls on Mr. Pumper's phone. As the government points out, however, prior to February 2008, only five calls were intercepted between Pumper and Dimora. (See Session Nos. 1156PCT, 1275PCT, 1300PCT, 1504PCT, 4028PCT.) Four of the calls were less than two minutes and were not, therefore, subject to minimization. The fifth call (Session No. 1156PCT) involved Pumper asking Dimora and Kelley if they were going to the Browns game. When Dimora indicated that Pumper had not yet invited them, Pumper reminded Dimora that he had given him, Kelly, and another public official loge tickets for the last game. Inasmuch as the RICO conspiracy under investigation involved public officials receiving things of value for official action, this call — wherein a contractor was recounting his providing public officials with free tickets to sporting events — was properly intercepted. The treatment of these calls, therefore, cannot establish a pattern of a failure to minimize.
Dimora represents that the treatment of Kelley's cellular line was much more telling, and he cites 36 calls which he maintains should have been minimized because they "discuss little more than Mr. Dimora's ailing father and the desire of the group of friends to schedule a poker game." (Mot. at 11.). Dimora's characterization of these calls fails to take into consideration the nature of the investigation, the alleged criminal activity that was being investigated, and the difficulties associated with such an investigation.
A recurring theme in this investigation was that of public officials performing official acts in exchange for things of value, including meals, and the practice of obtaining "sponsors" (usually individuals and entities seeking public contracts) to pay for meals and social events. (See, e.g., Session Nos. 566KCT and 567KCT as examples of meal sponsorship.) For example, Dimora cites Session No. 694KCT, which was a continuation of a discussion of a dinner at a restaurant that was apparently being organized by a contractor and would be attended by several public officials. Based upon this and other calls related to this dinner, it appears that Dimora ultimately paid for some or all of the expenses from this event. The Court will not, however, review the government's minimization efforts through the perfect vision that hindsight affords. See United States v. Vento, 533 F.2d 838, 854 (3d Cir.1976) ("Minimization is not to be judged by a rigid hindsight that ignores the problems confronting the officers at the time of the investigation.") Because it was unclear from this and prior conversations relating to this dinner (see Session Nos. 450KCT and 547KCT) whether Dimora was expecting to pay for some or any of his bill, it was properly intercepted.
Many of the calls cited by Dimora illustrate further difficulties the agents experienced in attempting to filter out innocent calls. Dimora and other co-conspirators had a habit of putting people on hold while tending to other matters or attempting to connect other individuals to the call. (See calls cited by Dimora: Session Nos. 694KCT, 699KCT, 1037KCT, 1082KCT, 1116KCT, 1166KCT, 1248KCT, 1547KCT, 1949KCT, and 2905KCT.) This resulted in considerable stretches of "dead air" and, if an additional individual was connected to the conversation, the result often was a change of topic. Obviously agents could not discern from "dead air" whether a call was going to be personal in nature, and the monitoring of such "dead air" was not inappropriate. Nor was it inappropriate to continue to monitor for a short period an otherwise personal call when a new participant (especially an alleged co-conspirator) entered the conversation, as the conversation may have turned to matters specifically covered by the wiretap warrants.
Viewing these calls with the benefit of hindsight, it is clear that some ultimately involved alleged co-conspirators merely socializing without discussing anything related to the conspiracy under investigation. The monitoring agents did not, however, have the luxury of hindsight. Instead, they were faced with a wide-reaching conspiracy where alleged co-conspirators routinely mixed business with pleasure, often with meals and other social events either providing platforms for advancing the conspiracy or representing the "thing of value" that the public official received. Under these circumstances, the Court cannot find that the interception of these calls constitutes a pattern of a failure to mitigate.
Finally, Dimora focuses on the monitoring of his home and cellular lines. He claims that only 17% of the calls on his cellular phone, and only 47.5% of the calls on his home line were minimized.
Of the calls he identifies from his cellular phone, two calls followed a phone conversation in which Dimora discussed attempting to steer County contract work to an attorney (Session Nos.1912DCT and 1933DCT, connected to Session No. 129DCT), and two other calls provide further
Likewise, a review of the calls identified on Dimora's home line demonstrates that arguably three of them should have been minimized. Session No. 137DHT involves a brief conversation between an individual identified only as "Colleen" and Lori Dimora, the wife of defendant Dimora. While the government argues that agents were entitled to continue to monitor this communication to ascertain the identity of Colleen, it has failed to point to any evidence that Dimora's wife was suspected of having a role in the conspiracy. Consequently, her conversation with "Colleen" should not have been suspect. Similarly, Session No. 185DHT involved Lori Dimora's discussion of a life insurance policy issued to Dimora's father, and Session No. 2477DHT involved a conversation between defendant Dimora and "Chris" about the same insurance policy. Neither defendant in this case is charged with insurance fraud, nor has the government suggested that the use of private insurance policies played any role in the alleged conspiracy. It is not lost on the Court that all of these calls were intercepted within the first week of the wiretaps on Dimora's home phone, and agents were still attempting to learn the pattern of calls on these lines.
That said, Dimora has merely established that a handful of calls should have been minimized but were not. These few isolated calls fail to show a "pattern of interception of innocent conversations which developed over the period of the wiretap." United States v. Lawson, 780 F.2d 535, 540 (6th Cir.1985) (quoting United States v. Dorfman, 542 F.Supp. 345, 391 (N.D.Ill.1982)). Instead, as the government
Of course, even if these few calls constituted a pattern, which the Court does not believe they do, it would not warrant the drastic remedy Dimora seeks — suppression of all calls captured by the wiretaps. At most, suppression of only the non-pertinent calls that were improperly minimized would be appropriate. See United States v. Baltas, 236 F.3d 27, 32 (1st Cir.2001), cert. denied, 532 U.S. 1030, 121 S.Ct. 1982, 149 L.Ed.2d 773 (2001) ("[E]rrors in minimizing one particular interception within the context of a lengthy and complex investigation ... do not automatically warrant suppression of all the evidence obtained through electronic surveillance."); see Gray, 372 F.Supp.2d at 1046. The First Circuit has noted that "in a particularly horrendous case, total suppression may be ... an `appropriate' solution," but the court also noted that the "sweeping relief of complete suppression is only appropriate upon a showing of "taint upon the investigation as a whole...." Hoffman, 832 F.2d at 1309 (While the district court suppressed 22 calls it believed to be improperly minimized, defendant was not entitled to total suppression because the "minimization effort, assayed in light of the totality of the circumstances, was managed reasonably."); see United States v. Mansoori, 304 F.3d 635, 648 (7th Cir.2002) (If the defendants were to prevail on their minimization argument, "the appropriate relief likely would be to suppress any conversation or conversations that were inappropriately monitored."); United States v. Charles, 213 F.3d 10, 22 (1st Cir.2000) (district court properly suppressed only the call that violated the minimization order, and not the entire wiretap, where no evidence that entire investigation was tainted); United States v. West, No. 06-20185, 2009 WL 4506420, at *1 (E.D.Mich. Nov. 30, 2009) ("suppression of all wiretap evidence is only appropriate when the failure to minimize is egregious").
In support of the drastic remedy of complete suppression, Dimora cites United States v. George, 465 F.2d 772 (6th Cir. 1972), and United States v. Focarile, 340 F.Supp. 1033 (D.Md.1972). Both cases pre-date the Supreme Court's decision on minimization in Scott, and have been rejected as authority for total suppression. See Gray, 372 F.Supp.2d at 1046 (rejecting George and Focarile as support for suppression of all intercepts and noting that George involved a situation where agents were never told which conversations to intercept and were not given a copy of the intercept order). Dimora cannot establish that the failure to minimize a few calls (one of which was admittedly difficult to minimize) was egregious enough to warrant suppression of all intercepted communications.
For all of the foregoing reasons, Dimora's motions to suppress evidence from the searches of his office and home, to compel production of grand jury transcripts and identification of confidential informants, as well as the motions of Dimora and Gabor to suppress evidence of intercepted wire communications, are DENIED.