Opinion
Defendants Avelino Leon and Victor Aceves were arrested as part of an investigation into the Arellano-Felix drug trafficking organization, which was “believed by law enforcement agencies to be one of the most violent drug trafficking organizations in the Republic of Mexico.”
(U.S. v. Hodoyan-Palacios
(S.D.Cal. 1998)
Both the superior court and the Court of Appeal determined that the wiretaps were lawful and denied defendants’ motion to suppress. (Pen. Code, § 629.72.) We affirm.
Background
The five wiretaps at issue here—wiretap Nos. 00-02 and 00-04, wiretap No. 00-02 extension No. 1, and wiretap No. 00-39 extension Nos. 1 and 2—were part of a multiagency task force investigation of a major Mexico-based narcotics trafficking organization that culminated in the arrest of 23 people in the United States. The arrests included narcotics suppliers, importers, distributors, transporters, and customers. Approximately 214 kilos of cocaine, 1,150 pounds of marijuana, $1.2 million in United States currency, and numerous firearms (including assault weapons) were seized.
Evidence obtained from the wiretaps was used to prosecute defendants Avelino Leon and Victor Aceves in state court. After the superior court denied their motions to suppress the contents of the wiretaps and any evidence seized therefrom (Pen. Code, § 629.72), Leon pleaded no contest to possession with intent to distribute in excess of 20 kilos of cocaine and was sentenced to 17 years in prison. Aceves pleaded no contest to conspiracy to sell in excess of 10 kilos of cocaine, as well as use of a false compartment in *381 a motor vehicle with intent to conceal controlled substances, and was sentenced to 15 years eight months.
Wiretap No. 00-02
The Los Angeles County District Attorney’s application for wiretap No. 00-02, dated January 25, 2000, was supported by an affidavit from Stephen P. Diederich, a special agent with the federal Drug Enforcement Administration. The application described “Target Telephone #1” as a prepaid cell phone subscribed to by one Guillermo Rodriguez of 4727 West 17th Street in Lawndale and requested authorization to intercept communications by Rodriguez, Leon, Aceves, unidentified males Nos. 1 and 2, and other coconspirators. Special Agent Diederich stated that Guillermo Rodriguez was an “unidentified person” and that the Lawndale address was a fictitious address—although defendants Leon and Aceves did reside at 4727 West 149th Street in Lawndale. Diederich explained that, in his experience, high-level drug traffickers frequently use prepaid cell phones because no identification is required, the phones can be thrown away at any time, and the replacement phone cannot be traced back to the user.
The affidavit described an ongoing investigation using wiretaps into a Mexican-based drug trafficking organization with associates in Los Angeles. The investigation had resulted in the arrests of several conspirators and the issuance of arrest warrants for other fugitives. A prior wiretap on a discarded prepaid cell phone (wiretap No. 99-32) had revealed numerous contacts during the period of April to June 1999 between narcotics traffickers from the Los Angeles-based distribution network and an unidentified male, who was believed to be a top-ranked United States-based manager for the organization. Special Agent Diederich believed that Target Telephone #1 was being used by the holder of the discarded cell phone that was the subject of the prior wiretap (No. 99-32), or by a person playing a similar role in the organization, because the phones had dialed more than two dozen numbers in common. Prior intercepts of conversations involving those common numbers related to the manufacturing of methamphetamine, money laundering, and illegal border crossings.
The affidavit declared that a wiretap was necessary in order to achieve the objectives of the investigation—namely, obtaining direct evidence to convince a jury beyond a reasonable doubt of the full scope, extent, and personnel of the narcotics trafficking conspiracies; the identities and roles of all suppliers of narcotics to the identified conspirators; the identities and roles of the main customers of the identified conspirators; the stash location where *382 the narcotics were stored before distribution; the organization’s method of distributing narcotics; and the management and disposition of proceeds generated by the organization’s narcotics trafficking. Special Agent Diederich then listed the investigative techniques he had already used or had considered using in the investigation and explained why these techniques were not likely to succeed in identifying all members of the organization and establishing beyond a reasonable doubt the full scope of the conspiracy. These techniques included the use of a confidential informant; the conduct of physical surveillance; the use of pen registers, trap-and-trace devices, toll analysis, and telephone subscriber information; search warrants and trash searches; and witness interviews, grand jury subpoenas, and grants of immunity. Diederich noted, in particular, that he had been unable to identify the true user of Target Telephone #1 or to locate the target telephone’s physical whereabouts.
Special Agent Diederich also explained that, based on his training and experience, leaders of narcotics trafficking organizations often do not physically handle the narcotics. Because high-level traffickers issue logistical instructions by telephone (and thus avoid contact with the narcotics), law enforcement would be able to discover, through the interception of Target Telephone #1, when narcotics shipments arrive and which cell heads are to receive those shipments.
Los Angeles County Superior Court Judge Larry P. Fidler approved the application on January 25, 2000, finding probable cause to believe that the target subjects had committed, were committing, and were about to commit offenses involving the importation, possession for sale, transportation, and sale of cocaine (and conspiracy to commit these offenses) (Pen. Code, § 629.52, subd. (a)); 1 probable cause to believe that communications concerning these crimes had been, were being, and would be made over Target Telephone #1, and that information concerning those crimes would be obtained through the interception (§ 629.52, subds. (b), (c)); and that normal investigative procedures had been tried and had failed or reasonably appeared either to be unlikely to succeed if tried or to be too dangerous (§ 629.52, subd. (d)). The wiretap was approved for 30 days.
The Remaining Wiretaps
Based on the information obtained from wiretap No. 00-02, Special Agent Diederich confirmed that Leon was the user of Target Telephone #1 and submitted a new application (wiretap No. 00-04) for that cell phone, four other cell phones, and two pagers. The affidavit disclosed that aerial surveil *383 lance in January 2000 had proved unhelpful, that the intercepted conversations had been “extremely coded” and the participants had identified themselves for the most part only by moniker, and that the identities of the users and the physical whereabouts of most of the phones were unknown.
The affidavits for the remaining wiretap application extensions recounted the progress of the investigation, including the seizure of eight kilos of cocaine from a Los Angeles hotel and the seizure of $260,125 in cash at the Los Angeles International Airport in January 2000, the seizure of 1,150 pounds of marijuana at an Alhambra apartment in February 2000, and the seizure of 172 kilos of cocaine in three separate incidents in April and May 2000. The affidavits also recited that the seizures nonetheless had yielded little information as to the organization’s source of supply or method of distribution; that the task force’s attempts at physical and aerial surveillance had been detected and, on occasion, compromised; and that Leon appeared to be coordinating a large shipment of narcotics in the near future. On September 13, 2000, agents from the Drug Enforcement Administration arrested 23 people, including Leon and Aceves.
Discussion
“In general, California law prohibits wiretapping.”
(People
v.
Zepeda
(2001)
Under current section 629.52, the designated judge may authorize a wiretap if there is probable cause to believe that an individual has committed, is committing, or is about to commit one or more of the listed crimes (§ 629.52, subd. (a)); there is probable cause to believe that communications concerning the illegal activities will be obtained through that interception (§ 629.52, subd. (b)); there is probable cause to believe that the communications device will be used by the person whose communications are to be intercepted (§ 629.52, subd. (c)); and “[n]ormal investigative procedures have been tried and have failed or reasonably appear either to be unlikely to succeed if tried or to be too dangerous” (§ 629.52, subd. (d) (section 629.52(d))).
Defendants do not challenge the issuing court’s finding of probable cause as to any of the wiretaps. They complain only that the wiretap applications were not supported by an adequate showing of necessity within the meaning of section 629.52(d), and that the evidence seized as fruit of the wiretaps must be suppressed under section 629.72.
2
Because defendants’ claim of constitutional error parallels their claim of statutory error, we begin with their claim that the wiretap applications failed to support Judge Fidler’s finding of necessity under section 629.52(d).
(People
v.
Jackson
(2005)
Our analysis of section 629.52 is necessarily informed by title III of the Omnibus Crime Control and Safe Streets Act of 1968, 18 United States Code sections 2510 to 2520, which “provides a ‘comprehensive scheme for the regulation of wiretapping and electronic surveillance.’ ”
(People v. Otto
(1992)
The requirement of necessity is designed to ensure that wiretapping is neither “routinely employed as the initial step in criminal investigation”
(United States v. Giordano
(1974)
The finding of necessity by the judge approving the wiretap application is entitled to substantial deference.
(People v. Zepeda, supra,
*386 A. The Application for Wiretap No. 00-02
We begin our review of Judge Fidler’s findings of necessity by examining the affidavits filed in support of the wiretap applications. (§ 629.50, subd. (a)(4)(B); see
United States v. Martinez
(9th Cir. 1978)
The affidavit began by recounting an investigation begun in 1997 into the Arellano-Felix drug trafficking organization, which engaged in the transportation of multiton quantities of cocaine from Mexico into the United States. The investigation resulted in the arrest in June 1998 of Jorge Castro, a high-ranking member of the organization, and other coconspirators, as well as the seizure of 3,500 kilos of cocaine and over $15 million in proceeds. Unfortunately, even after the arrests, many of the distribution cells to which Castro had delivered cocaine remained intact. Through wiretaps on a since discarded target telephone, the task force had discovered that an unidentified person was in contact with narcotics traffickers from the Los Angeles-based distribution network cells that used to receive cocaine from the Castro organization and with numerous Mexico-based telephone numbers known to be used by members of the Arellano-Felix organization. Based on its investigation, the task force believed the unidentified person who had used the discarded target telephone was a top-ranked United States-based manager for the Arellano-Felix organization, with responsibilities that paralleled those formerly held by Castro. Although the discarded target telephone was deactivated for lack of payment in July 1999, the task force believed, based on the large number of telephone numbers in common, that Target Telephone #1 was being used by the same person or a close associate.
The affidavit also noted that Target Telephone #1 was a prepaid cell phone and had been purchased by someone providing a fictitious address and possibly a fictitious name. High-level drug traffickers frequently use prepaid *387 cell phones because no identification is required for activation, the phone can be discarded at any time, and law enforcement will be unable to track down the user’s new telephone.
The discussion of the necessity for the wiretap was set forth in a separate section of the affidavit consisting of 20 numbered paragraphs. The affidavit stated that normal investigative techniques had failed, appeared reasonably unlikely to succeed if tried, or were too dangerous to achieve the objectives of the investigation, “that is, to obtain direct evidence that will convince a jury beyond a reasonable doubt of [j[] a. The full scope, extent and personnel of the narcotics trafficking conspiracies to which I believe [the target subjects] belong; [][] b. The identity and role of all suppliers of narcotics to the identified conspirators; H] c. The identity and role of the main customers of the identified conspirators; [f] d. The stash location where the narcotics are stored before distribution; ['[[] e. The organization’s method of distribution of narcotics; and [][] f. The management and disposition of proceeds generated by the organization’s narcotics trafficking.” The affidavit then listed the investigative techniques the task force had used or had considered using, with an explanation as to why each was unlikely to succeed in identifying all members of the organization and establishing beyond a reasonable doubt the full scope of the conspiracy:
As to undercover agents and confidential informants, the affidavit stated that a confidential informant could not be introduced at that time because the true user of Target Telephone #1 and the phone’s physical whereabouts were unknown. Nor, for the same reasons, would it be useful to introduce an undercover agent. When the user of Target Telephone #1 was identified, the task force would consider the use of a confidential informant or undercover agent. Such a person, however, would be unlikely to assist in achieving the goals of the investigation, inasmuch as members of a large narcotics trafficking organization generally deal only with known and trusted individuals; the organization’s structure is compartmentalized such that suppliers, transporters, distributors, customers, and money launderers do not even know each other; and the organization could become suspicious merely by having an unknown person attempt to engage the organization.
As to physical surveillance, the affidavit reiterated that the user of Target Telephone #1 and the phone’s whereabouts were unknown and therefore could not be subjected to physical surveillance. The task force had conducted limited physical surveillance of defendants’ residence, but “nothing significant was observed.” Special Agent Diederich also stated, based on his training and experience with over 100 narcotics investigations as an agent with the Drug Enforcement Administration, that physical surveillance alone, without wiretap intercepts, could not achieve this investigation’s objectives. *388 Although physical surveillance can be useful in confirming the fact of meetings and other interactions among participants, such observations are generally insufficient to prove their purpose or their content. Moreover, inasmuch as narcotics traffickers run trivial errands most of the time, it was highly likely that blanket surveillance would be detected by the target prior to the pickup or delivery of any significant amount of narcotics, which would compromise the larger investigation. High-level narcotics traffickers, such as the ones here, use sophisticated countersurveillance driving techniques to thwart surveillance. Wiretap intercepts, by contrast, would permit the task force to assemble surveillance for specific meetings and to conduct the surveillance at the meeting place, not at the target’s home, which further reduces the risk that the surveillance would be detected.
As to pen registers, trap-and-trace devices, toll analysis, and subscriber information, the affidavit explained that these measures, at best, could provide only a list of the telephone numbers called and the identity provided to the telephone provider but not the content of or the parties to the calls. Inasmuch as toll records had already been used to establish the connection between the discarded target telephone and Target Telephone #1, little more could be gained by these methods of investigation without the assistance of a wiretap. The affidavit also stated that narcotics traffickers often use fictitious information or the assistance of unwitting persons as subscribers for their telephones in order to thwart investigation into their illegal activities—and pointed out that such false information had indeed been given for Target Telephone #1.
As to search warrants, the affidavit explained that they would not be effective because the true user of Target Telephone #1 and the phone’s physical location were unknown. Search warrants at this stage thus “could result in law enforcement compromising the larger investigation with minimal results.” Once the wiretap revealed the timing of cocaine deliveries and stash locations, the task force would consider the use of search warrants. However, such searches alone would not disclose the full scope of the organization’s criminal activities, the methods used by members of the organization, or the identities of those involved. Special Agent Diederich added that, in his experience, records kept by narcotics conspirators are coded and difficult to interpret.
As to witness interviews, grand jury subpoenas, and immunity, Special Agent Diederich declared, based on his training and experience, that these were unlikely to advance—and, indeed, would likely impede—the investigation. Narcotics dealers and customers are unwilling to talk to police or testify before grand juries or at trial because of fears for their safety or for their own culpability. Even when granted immunity, a member of the organization who was of sufficient rank to provide meaningful testimony about the entire *389 organization would be unlikely to share it because of the fear of retribution against himself or his family. For these reasons, Diederich believed that any attempt to contact a member of the organization would likely cause that person to inform other members of the organization and thus jeopardize the investigation.
As to trash searches, the affidavit reiterated that the true user of Target Telephone #1 and the phone’s physical location were unknown. Once locations were identified, the task force would consider the use of trash searches. However, even if trash could be removed without detection (and thus without compromising the investigation), Special Agent Diederich declared, based on his experience, that it would be unlikely to yield significant evidence. Narcotics traffickers go to great lengths to destroy evidence that is possibly incriminating and frequently will dispose of their trash at a site away from their residence.
As to consensual recordings, the affidavit stated that these techniques are subject to the same limitations as confidential informants and undercover agents, discussed above.
Special Agent Diederich concluded by emphasizing that, in his experience, leaders of narcotics trafficking organizations rarely touch the contraband themselves and coordinate the logistics of their criminal activities over the phone. He therefore believed that the only viable means of building an effective case against the target subjects was to intercept their telephone communications, including those made over Target Telephone #1.
B. The Record Supported the Finding of Necessity for the Wiretaps Within the Meaning of Section 629.52(d)
Defendants attack Judge Fidler’s finding of necessity on a number of grounds. None has merit.
1. Boilerplate Allegations
Defendants complain first that the affidavit included “boilerplate” discussion of the limitations of traditional investigative techniques and failed to identify any ways in which the investigation into this drug trafficking conspiracy differed from drug trafficking conspiracies generally. Although it is true that “ ‘[generalities, or statements in the conclusory language of the statute, are insufficient to support a wiretap application’ ”
(U.S.
v.
Cline
(10th Cir. 2003)
Defendants’ reliance on
United States
v.
Kalustian
(9th Cir. 1975)
Defendants’ reliance on
U.S. v. Blackmon
(9th Cir. 2001)
2. The Relevance of the Conspiracy Allegations
Defendants argue next that section 629.52(d) does not set forth a lower standard of necessity for conspiracy cases. We agree that a mere allegation “that a person is a member of a conspiracy ... is not a sufficient reason to obtain a wiretap”
(U.S. v. Carneiro
(9th Cir. 1988)
In this case, no one disputes that telephones were the primary means of communication among the conspirators. “It would have been difficult if not impossible by means other than wiretap to determine the scope of the conspiracy or to develop enough evidence to successfully prosecute the conspirators.”
(U.S. v. Carrillo
(D.Colo. 2000)
3. Failure to Exhaust or Otherwise Justify the Failure to Attempt Normal Investigative Techniques
Defendants then argue that the government failed to exhaust several investigative techniques. As they concede, however, the adequacy of the showing concerning other investigative techniques is “ ‘to be tested in a practical and commonsense fashion,’ [citation] that does not ‘hamper unduly the investigative powers of law enforcement agents’ ”
(U.S.
v.
Smith, supra,
(a) Confidential Informants
Defendants, pointing to a sealed portion of the affidavit that indicated the existence of a confidential informant, fault the affidavit for failing to explain why the investigation could not proceed through that informant. Yet defendants fail to explain how the informant could even have identified the user of Target Telephone #1, whose identity and location were unknown, without raising suspicion. As the affidavit explained, members of the organization could be “alarmed by an informant simply approaching one of them and could become concerned that the organization was under investigations.” More generally, the affidavit recited that large-scale narcotics organizations are compartmentalized in order to protect the organizations and that confidential informants therefore would not be successful in identifying the full nature and scope of the organizations.
(U.S. v. Canales Gomez, supra,
358 F.3d at
*393
p. 1226.) Under these circumstances, the government could reasonably have concluded that attempting to connect the informant to this part of the organization would have aroused the suspicions of other participants, thus endangering both its informant and the investigation, without providing sufficient information to achieve its goals.
(U.S.
v.
Carter
(D.C. Cir. 2006)
(b) Pen Registers
Defendants complain that the affidavit merely identified the limitations of pen registers and similar techniques and therefore could not establish necessity for a wiretap. We disagree. “[A]lthough the affidavit’s assertions of inadequacy ‘might appear boilerplate, the fact that drug investigations suffer from common investigatory problems does not make these problems less vexing.’ ”
(U.S.
v.
Thompson, supra,
(c) Search Warrants
Defendants once again fault the affidavit for relying on limitations that would apply to “ ‘most if not all narcotics investigations.’ ” What defendants overlook, however, is that the affidavit also explained why those generic limitations applied to this investigation. In particular, defendants do not challenge Special Agent Diederich’s statement that “[a]t this time, I know of no locations at which to [execute] search warrants,” given that the stash locations, the timing of deliveries, the identity of the user of Target Telephone #1, or the user’s location were all unknown. Defendants also challenge the affidavit’s failure to discuss the possibility of searching their residence, which was known to the task force—yet offer nothing to suggest that probable cause existed to search their residence. (See
U.S. v. Carrillo, supra,
*394 (d) Physical Surveillance
Defendants characterize the affidavit’s analysis of physical surveillance as “stating that it is just too bothersome to follow a suspect around while he does ‘trivial errands’ ” and assert that “[b]lanket surveillance may be inconvenient and costly, but it can be done and does work.” Yet, as the affidavit discloses, limited surveillance had already been conducted at defendants’ residence without success, and the task force knew of no other locations at which to conduct surveillance, especially since the identity and whereabouts of the user of Target Telephone #1 were unknown. Moreover, the affidavit’s reference to “trivial errands” was merely to illustrate that without the wiretap, the task force would have to place the known targets under blanket surveillance, which would make it “highly likely” the surveillance would be detected and the investigation compromised. (See
U.S. v. Martinez, supra,
(e) Trash Searches
Defendants’ contention that the affidavit failed to provide a specific, particularized reason for rejecting this technique is belied by the affidavit itself, which reiterates that the address of the user of Target Telephone #1 was unknown, that narcotics traffickers go to great lengths to destroy incriminating evidence (including carrying their trash away to a different site), and that trash removal by law enforcement poses the risk of detection. Although defendants suggest that the task force could have conducted a trash search of their residence, they have not shown that there was a basis for believing significant evidence would be uncovered though such a search. Defendants thus offer no basis for second-guessing the relative risks and benefits of trash searches in this case.
(U.S. v. Canales Gomez, supra,
(f) Interviews, Grand Jury Subpoenas, and Immunity
Defendants claim that the affidavit’s discussion of these techniques “completely ignore[s] the possibility of a confession being obtained, perhaps based upon a promise of leniency” as well as the potential of detaining a material witness in custody, which “might solve the problem of tipping off others with specific information.” In truth, the affidavit considered the possibility that a high-level member of the organization might provide information in exchange for leniency but considered it unlikely “because of fear of retribution against himself or his family.” Special Agent Diederich considered it more likely that the conspirator who received such an offer would “inform other members of the organization and thus jeopardize the investigation.” Neither a promise of leniency nor the detention of a material witness in custody would alleviate
*395
these concerns. Moreover, granting immunity to an organization member who was at a sufficiently high level to provide significant information would “insulate highly culpable members of the conspiracy from prosecution.”
(U.S.
v.
Martinez, supra,
4. Failure to Consider Aerial Surveillance or Witness Relocation
Finally, defendants claim the affidavit was deficient in failing to consider two additional investigative techniques: aerial surveillance and witness relocation. Before analyzing these techniques, we note at the outset that “courts are reluctant to impose their hindsight upon law enforcement agencies, and the proponent of the application need not establish that ‘every other imaginable mode of investigation would be unsuccessful.’ ”
(U.S. v. Guerra-Marez, supra,
Neither of the techniques above was likely to have succeeded in fulfilling the goals of the investigation. Aerial surveillance falls within the affidavit’s category of “Physical Surveillance” and suffers from the same limitations and the same risks as surveillance on foot or by automobile. Indeed, as recounted in the application for wiretap No. 00-04, the task force
did
engage in aerial surveillance on January 26, 2000. However, the helicopter lost the “visual” of the open trunk because it had to orbit, and a member of the organization subsequently became aware of the surveillance and employed countersurveillance techniques. Knowledge of the physical surveillance, of course, only increased the necessity for the wiretap.
(U.S. v. Decoud, supra,
As demonstrated above, the wiretap was not sought as the first step in this investigation, nor did the government bypass viable alternative techniques in a rush to use this extraordinary method of investigation. “Few threats to liberty exist which are greater than that posed by the use of eavesdropping devices”
(Berger v. New York
(1967)
C. Remaining Issues
Having rejected defendants’ claim that the wiretaps violated section 629.52(d), we reject as well defendants’ contention that the wiretaps violated the Fourth Amendment, which rests on the same facts and legal standards discussed above. (See
People v. Boyer
(2006)
*397 Disposition
The judgment of the Court of Appeal is affirmed.
George, C. J., Kennard, J., Werdegar, J., Chin, J., Moreno, J., and Corrigan, J., concurred.
Notes
All further statutory references are to the Penal Code unless otherwise indicated.
Section 629.72 provides: “Any person in any trial, hearing, or proceeding, may move to suppress some or all of the contents of any intercepted wire, electronic pager, or electronic cellular telephone communications, or evidence derived therefrom, only on the basis that the contents or evidence were obtained in violation of the Fourth Amendment of the United States Constitution or of this chapter. The motion shall be made, determined, and be subject to review in accordance with the procedures set forth in Section 1538.5.”
Although the parties agree that we review deferentially the issuing judge’s determination that the wiretap was necessary, they disagree as to the precise formulation of the standard of review. Defendants, for the first time in this proceeding, urge us to follow the Eighth Circuit, which has held that the necessity finding predicate to the issuance of a wiretap order under 18 United States Code section 2518(3)(c) is a factual determination reviewed for clear error.
(U.S. v. Jackson
(8th Cir. 2003)
Leon makes no independent challenge to the other wiretap applications; he argues summarily only that those subsequent filings suffer from “essentially the same” defects as the affidavit in support of wiretap No. 00-02 to the extent they reiterate its analysis or, to the extent they contain new information, are the tainted fruit of the prior wiretap. Aceves, who simply joins in Leon’s arguments on the merits, likewise makes no separate challenge to the other wiretap orders.
