UNITED STATES of America, Plaintiff-Appellee, v. Joanne TRAGAS, Defendant-Appellant.
No. 11-1637.
United States Court of Appeals, Sixth Circuit.
Argued: Aug. 2, 2013. Decided and Filed: Aug. 23, 2013.
727 F.3d 610
Before: CLAY, SUTTON, and GRIFFIN, Circuit Judges.
OPINION
CLAY, Circuit Judge.
Defendant Joanne Tragas was indicted on numerous charges relating to her participation in an international credit and debit card fraud conspiracy. She was convicted by a jury and sentenced to 300 months’ imprisonment. On appeal, Defendant challenges her conviction by arguing that the prosecutor improperly read certain evidence aloud, that the district court should have given the jury a specific unanimity instruction, that her Travel Act convictions were not supported by sufficient evidence, and that her Vienna Convention rights were violated. She further argues that the district court improperly calculated her sentence by using an incorrect version of the Sentencing Guidelines in violation of the Ex Post Facto Clause. We reject Defendant‘s challenges to her conviction but agree that the district court used an incorrect version of the Guidelines. Accordingly, we AFFIRM Defendant‘s convictions, VACATE her sentence, and REMAND for resentencing.
BACKGROUND
The evidence at Defendant‘s trial established that she acted as a middleman between overseas suppliers of stolen credit and debit card information and street-level users of that information. Defendant‘s suppliers obtained the information that is typically encoded in the magnetic strip on the back of credit and debit cards and sold the information to her using international wire transfers. After receiving the stolen data, Defendant re-sold the information to her co-conspirators in the United States. Defendant‘s customers, many of whom later became her co-defendants, used machines to encode the information they received from Defendant onto the magnetic strips of actual plastic cards. Any card with a magnetic strip could be and was used, including gift cards, hotel key cards, and actual credit cards. Once encoded, these cards contained the same information that the legitimate cards contained.
Thus armed with these “clones” of legitimate credit and debit cards, the conspirators purchased various kinds of consumer
The government introduced the transcripts of these chat conversations into evidence, and the prosecutor, together with Secret Service Agent Robert Kuykendall, read many of the conversations aloud to the jury. Although the parties to these communications did not use names, a picture of Defendant was the profile picture associated with the ICQ account-holder that supplied the Hunters with stolen data. Furthermore, Defendant was shown to have made purchases with the gift card information exchanged during the ICQ conversations with the Hunters. Circumstantial evidence also indicated that the individual conversing with the Hunters and supplying them with stolen information was in fact Defendant. For example, Defendant purchased a house in Florida after the Hunters’ supplier talked of buying and furnishing a new beach house in Florida.
These conversations revealed the scope and nature of Defendant‘s role in the conspiracy. She sold credit and debit card information to the Hunters in exchange for payment in a variety of different forms, including cash deposits into her bank account, wire transfers, and information that allowed her to use the genuine gift cards that the Hunters and others purchased with stolen card data. Defendant used the money she received to pay her overseas suppliers, and she sometimes directed the Hunters to wire money directly in order to facilitate these payments. Defendant purchased and re-sold the stolen personal information of hundreds of credit and debit card users, and their financial institutions suffered losses of approximately $2.18 million as a result.
Defendant was arrested in June 2009 and was ultimately charged in a superseding indictment with one count of conspiracy to commit various access device fraud offenses, in violation of
DISCUSSION
I. Reading Evidence Aloud
Defendant first argues that a new trial is warranted because the prosecutor, together with Agent Kuykendall, read to the jury transcripts of online chat conversations between Defendant and her co-conspirators. The exact basis for Defendant‘s objection to this evidence is difficult to pin down, but for the reasons that fol
The argument is rather unusual. Defendant does not seem to dispute that the written communications were properly admitted into evidence under the hearsay exclusion in
However, Defendant offers no support for her proposition that the mere reading aloud of previously admitted documentary evidence is improper or prejudicial. On the contrary, there is nothing inherently problematic about reading such evidence to the jury. See Bank of Nova Scotia v. United States, 487 U.S. 250, 262-63, 108 S.Ct. 2369, 101 L.Ed.2d 228 (1988) (finding no prejudice to a defendant where two IRS agents read in tandem from a transcript before a grand jury); United States v. Chambers, 441 F.3d 438, 456-57 (6th Cir. 2006) (finding no unfair prejudice where a police officer read portions of a defendant‘s previously admitted diary to the jury). As long as the evidence itself is properly admitted pursuant to the Rules of Evidence and does not run afoul of other safeguards like the Confrontation Clause, we do not see how a defendant could be prejudiced if the evidence is read aloud to the jury.
Although Defendant decries what she asserts was a “remarkable departure from traditional American trial practice,” she points to nothing in the record that would suggest that the prosecutor and case agent did anything other than read the transcripts aloud. A staged performance or re-enactment of an event by a prosecutor would undoubtedly be problematic insofar as it strayed from the direct evidence introduced at trial or reflected the prosecutor‘s opinions, although we have approved video reenactments in certain circumstances. See, e.g., Persian Galleries, Inc. v. Transcontinental Ins. Co., 38 F.3d 253, 257-58 (6th Cir. 1994). However, the prosecutor‘s conduct in this case cannot possibly be described as a re-enactment. Although Defendant points to some minor discrepancies between the reading and the written text, none of these discrepancies are material, and the jury had copies of the written transcripts with which to follow along. Nothing in the record indicates that the prosecutor or Agent Kuykendall “performed” a scene in any meaningful sense. Rather, they merely read aloud from documents that Defendant concedes were properly admitted into evidence.
Next, Defendant argues that the prosecutor‘s reading of the chat conversations constitutes impermissible vouching, which occurs when “a prosecutor supports the credibility of a witness by indicating a personal belief in the witness‘s credibility thereby placing the prestige of the office of the United States Attorney behind that witness.” United States v. Trujillo, 376 F.3d 593, 607 (6th Cir. 2004). This seems to be a different theory to support Defendant‘s primary argument that, merely by uttering the words from a document aloud, a prosecutor imbues the evidence with some sort of magical power. However, Defendant fails to identify any comments or statements that could be construed as bolstering or vouching for the evidence, and we find no support for the proposition that admissible documentary evidence somehow becomes more credible if the prosecutor reads it aloud.
Finally, Defendant contends that because the prosecutor is not a witness and cannot be cross-examined, any opinions, testimony, or interpretations of evidence offered by the prosecutor are prohibited by the Confrontation Clause of the Sixth Amendment. As with her other arguments, Defendant‘s contention fails because she can point to nothing in the record indicating that the prosecutor actually made any such statements or verbally interpreted the evidence in any particular way. As for the transcripts themselves, we note that Defendant‘s own statements were properly admitted as statements by a party-opponent under
II. Specific Unanimity Instruction
The indictment charged Defendant with a conspiracy to “commit an offense or offenses contrary to
The Sixth Amendment does not expressly require that jury verdicts be unanimous, but the Supreme Court has long held that jury unanimity is “one of the indispensable features” of federal criminal trials. Johnson v. Louisiana, 406 U.S. 366, 369-71, 92 S.Ct. 1635, 32 L.Ed.2d 162 (1972) (Powell, J., concurring). In practice, this means that “a jury in a federal criminal case cannot convict unless it unanimously finds that the Government has proved each element [of the crime].” Richardson v. United States, 526 U.S. 813, 817, 119 S.Ct. 1707, 143 L.Ed.2d 985 (1999). For defendants charged with conspiracy, the object offense of the conspiracy is an element of the crime. See United States v. Caver, 470 F.3d 220, 232 (6th Cir. 2006). Therefore, where a defendant is charged in a single count with a conspiracy to commit multiple crimes, the jury must unanimously decide which crime the defendant conspired to commit. See United States v. Long, 450 Fed.Appx. 457, 460 (6th Cir. 2011); United States v. Capozzi, 486 F.3d 711, 717–18 (1st Cir. 2007); United States v. Hughes, 310 F.3d 557, 561 (7th Cir. 2002).
The government argues that the indictment alleged a conspiracy to commit a single offense: access device fraud. In contrast, Defendant argues that she was charged with conspiring to commit five separate offenses. The statute defines the offenses in these subsections as follows:
(a) Whoever—
(1) knowingly and with intent to defraud produces, uses, or traffics in one or more counterfeit access devices;
(2) knowingly and with intent to defraud traffics in or uses one or more unauthorized access devices during any one-year period, and by such conduct obtains anything of value aggregating $1,000 or more during that period;
(3) knowingly and with intent to defraud possesses fifteen or more devices which are counterfeit or unauthorized access devices;
(4) knowingly, and with intent to defraud, produces, traffics in, has control or custody of, or possesses device-making equipment;
(5) knowingly and with intent to defraud effects transactions, with 1 or more access devices issued to another person or persons, to receive payment or any other thing of value during any 1-year period the aggregate value of which is equal to or greater than $1,000 ...
shall, if the offense affects interstate or foreign commerce, be punished as provided in subsection (c) of this section.
We decline to delve into the intricacies of the interpretation of
We find that Defendant‘s substantial rights were not affected by any error in the jury instructions. By finding Defendant guilty of conspiracy, the jury necessarily concluded that she voluntarily joined the Hunters and their compatriots in creating and using counterfeit access devices. (See R. 365, at 83 (instructing the jury that it must find that “the defendant knowingly and voluntarily joined the conspiracy” to convict her on Count 1).) To properly convict, the jury would have only had to find that Defendant conspired to commit one of the offenses in
The evidence more than established that the Hunters and others conspired to produce and use counterfeit access devices with the intent to defraud in violation of
III. The Travel Act Counts
Defendant argues that the government‘s evidence was insufficient to support her convictions on seven counts of aiding and abetting unlawful activity under the Travel Act,
Where, as here, a defendant does not move for a judgment of acquittal pursuant to
To prove a violation of
Defendant‘s only argument that the evidence was insufficient is that the government did not prove she had knowledge of the Hunters’ interstate travel at the time she received unlawful money transfers and gift card information. However, Defendant points to no legal authority to support the proposition that contemporaneous knowledge of interstate travel is required to establish that a defendant aided or abetted a violation of the Travel Act. Although most other circuits have held that a Travel Act defendant need not have specific knowledge of any interstate travel, the Sixth Circuit has held that a defendant must at least be generally aware of the principal‘s interstate travel. See United States v. Gallo, 763 F.2d 1504, 1521-22 (6th Cir. 1985).1 However, a defendant need not “know the circumstances of each instance of travel or the identity of each traveler-participant in a criminal activity.” Id. at 1522.
The evidence at trial established that Defendant was aware that the Hunters traveled across state lines from their home in Detroit in furtherance of the access device fraud scheme. Online conversations between Defendant and the Hunters established that the Hunters wired Defendant money or gave her gift card information as payment for stolen credit card numbers. Dionte Hunter wired money from Atlanta, Louisville, and a town just outside Pittsburgh. The government further proved that Defendant used gift cards to make online purchases and that the gift cards were purchased in Kentucky, Texas, Ohio, and Pennsylvania.
Based on Defendant‘s responses in her online conversations with the Hunters and the originating cities of the gift cards and wire transfers, a reasonable jury could have found that Defendant had knowledge of the Hunters’ interstate travel. Defendant specifically acknowledged several times that Dionte Hunter was in states other than Michigan. Most significantly, when Hunter complained that some of the
IV. Vienna Convention
Defendant asserts that under Article 36 of the Vienna Convention, the government was obligated to inform her of her right to consular access because she is a citizen of Greece and Canada. However, Defendant acknowledges that this panel is bound by our decision in United States v. Emuegbunam, 268 F.3d 377 (6th Cir. 2001), which held that the Vienna Convention does not confer rights on individual criminal defendants that are enforceable by the federal courts. Id. at 389-90. Defendant acknowledges that we are bound by Emuegbunam, and she raised this argument only to preserve the issue for possible future review by the en banc Sixth Circuit or the Supreme Court. On the authority of Emuegbunam, we reject this argument.
V. Ex Post Facto Violation at Sentencing
Defendant argues that the district court erroneously imposed a 6-level en
Defendant did not object to the PSR‘s determination that her offense involved more than 250 victims. In her initial brief on appeal, Defendant argued that the district court committed plain error by counting as “victims” individuals who did not suffer financial harm. See Appellant‘s Br. 47-50. The government countered in its appellate brief that the Sentencing Commission had amended the Guidelines in 2009 to expand the definition of “victim” to those who have had their identities stolen. See
At oral argument, the government essentially conceded that the district court
Defendant was indicted for a conspiracy that ended on July 20, 2009, the date that she was arrested. Prior to November 1, 2009, the Guidelines defined “victim” as “any person who sustained any part of the actual loss” or “any individual who sustained bodily injury as a result of the offense.”
After November 2009, the Guidelines expanded the definition of “victim” to include “any individual whose means of identification was used unlawfully or without authority.”
CONCLUSION
For the foregoing reasons, we AFFIRM Defendant‘s convictions, VACATE her sentence, and REMAND for resentencing.
