UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JOEY LAMOND BRUNSON, a/k/a Flex, Defendant - Appellant.
No. 18-4696
UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT
Decided: July 31, 2020
PUBLISHED. Argued: January 29, 2020.
Appeal from the United States District Court for the District of South Carolina, at Columbia. Joseph F. Anderson, Jr., Senior District Judge. (3:14-cr-00604-JFA-18)
Before WILKINSON, NIEMEYER, and MOTZ, Circuit Judges.
Affirmed by published opinion. Judge Niemeyer wrote the opinion, in which Judge Wilkinson joined. Judge Motz wrote a dissenting opinion.
NIEMEYER, Circuit Judge:
Joey Brunson, the defendant in this criminal prosecution, challenges the legality of three orders authorizing wiretaps on the ground that the orders did not, on their face, sufficiently identify the persons authorizing the applications for the orders, as required by law. The district court denied his motion to suppress evidence obtained from the wiretaps, and the evidence was used to convict Brunson of numerous drug-trafficking and related crimes.
Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (“the Wiretap Act“),
The Wiretap Act authorizes the Attorney General and various other designated officials in the Department of Justice, including any Deputy Assistant Attorney General in the Criminal Division or National Security Division, to apply for a wiretap order, and it requires that the application for the order include the “identity of . . . the officer authorizing the application,”
In this case, the government identified in each application for a wiretap order the senior Justice Department official by title and name who authorized the application, but in each proposed order that it submitted to the district court, it included only the title, not the name of the official. Each order stated that the application for the order was authorized by “an appropriate official of the Criminal Division, United States Department of Justice, Deputy Assistant Attorney General, pursuant to the power delegated to that official by special designation of the Attorney General.” The district court signed the order as submitted.
Brunson contends that because the orders did not include the name of each authorizing official, the orders were statutorily insufficient and therefore all evidence derived from them should have been suppressed. Accordingly, he argues that the district court erred in denying his motion to suppress.
We conclude that the wiretap orders were sufficient under the Wiretap Act because (1) the applications were in fact appropriately
a defect, it would not be the type of defect that rendered the orders “insufficient” under
I
Joey Brunson was charged with participation in a drug-trafficking conspiracy in South Carolina and related crimes. In particular, the second superseding indictment, which the grand jury returned in March 2017, charged Brunson in Count 1 with conspiracy to traffic five kilograms or more of cocaine and an additional quantity of crack cocaine, in violation of
In 2013, during the investigation that led to Brunson‘s indictment, the government sought judicial authorization under the Wiretap Act to intercept calls and texts over specified telephones. The first application for a court order disclosed that it was authorized by Deputy Assistant Attorney General Denis J. McInerney, and the district court issued the government‘s proposed order on July 31, 2013, authorizing the requested wiretaps. The
order stated that it was entered “pursuant to an application authorized by an appropriate official of the Criminal Division, United States Department of Justice, Deputy Assistant Attorney General, pursuant to the power delegated to that official by special designation of the Attorney General,” but the order did not include the official‘s name. Pursuant to the order, the FBI intercepted various wire communications, including one on August 6, 2013, to which Brunson was a party and which became the basis for Count 2.
In a second application submitted to extend the district court‘s first order, the government used the same form as the first application except that it disclosed that the application was authorized by Deputy Assistant Attorney General Paul M. O‘Brien. Again, the proposed order that the district court signed on August 29, 2013, included O‘Brien‘s title but not his name. Pursuant to the order, the FBI intercepted additional wire communications, including one on September 3, 2013, to which Brunson was a party and evidence of which was presented at trial but did not form the basis for any substantive count.
Finally, the government submitted a third application to extend the district
Brunson filed a pretrial motion to suppress the evidence obtained from the intercepted communications on the ground that each of the district court‘s orders authorizing the interceptions failed to include the name of the official authorizing the application, and thus each order was “insufficient on its face,” as that phrase is used in
The jury thereafter convicted Brunson on all 12 counts of the indictment.
Several months after Brunson was convicted, he filed a motion for a new trial based on the intervening Supreme Court decision in Dahda v. United States, 138 S. Ct. 1491 (2018), in which the Supreme Court upheld as facially sufficient wiretap orders that illegally authorized the interception of communications outside the district court‘s territorial jurisdiction. In its opinion, the Court explained that an order would be facially insufficient if, for example, it “lack[ed] information that the wiretap statute [in
The district court denied Brunson‘s motion for a new trial, ruling first that the motion was untimely, as it was filed four months after Brunson‘s conviction, and second, that the Supreme Court‘s holding in Dahda did not disturb its pretrial ruling denying Brunson‘s motion to suppress. In addition, the court noted that even though the wiretap
orders did not include the names of the officials authorizing the application, the orders referred to the applications, which did include the names.
On September 24, 2018, the district court sentenced Brunson to life plus 60 months’ imprisonment. From the district court‘s judgment dated September 25, 2018, Brunson filed this appeal, contending that the district court erred in denying his motion to suppress because the wiretap orders were facially insufficient as they failed to include the names of the officials authorizing the various applications for the orders.
Almost three months after Brunson was sentenced and while this appeal was pending, Congress enacted the
II
A
In support of his argument that the district court erred in denying his motion to suppress evidence obtained by the wiretap orders, Brunson relies mainly on Dahda v. United States, 138 S. Ct. 1491 (2018), which was decided after the district court ruled. He
argues that Dahda essentially overruled the test that the district court applied to uphold the wiretap orders. According to Brunson, Dahda recognized that the Wiretap Act must be enforced as written, and therefore a wiretap order that fails to identify the Department of Justice official who had authorized the wiretap application, as required by
The government contends that the district court properly denied Brunson‘s motion to suppress because the wiretap orders were not facially insufficient, as the authorizing officials “were specifically identified in the wiretap applications that accompanied the orders and were referenced by and incorporated into the orders.” The government argues further that Dahda, which acknowledges that not all facial defects render an order insufficient, does not hold otherwise.
The Wiretap Act sets forth in detail procedures for the issuance of orders to allow the interception of wire, oral, or electronic communications. To obtain a wiretap order pursuant to the Act, the government must submit an application authorized by an appropriately designated high-level Justice Department official to a judge of competent jurisdiction and state the applicant‘s authority to make such an application. See
are satisfied, the judge may issue an order authorizing the interception of wire, oral, or electronic communications within the territorial jurisdiction of the court in which the judge is sitting. See
(a) the identity of the person, if known, whose communications are to be intercepted;
(b) the nature and location of the communications facilities as to which, or the place where, authority to intercept is granted;
(c) a particular description of the type of communication sought to be intercepted, and a statement of the particular offense to which it relates;
(d) the identity of the agency authorized to intercept the communications, and of the person authorizing the application; and
(e) the period of time during which such interception is authorized, including a statement as to whether or not the interception shall automatically terminate when the described communication has been first obtained.
The Wiretap Act also regulates the use of communications intercepted pursuant to a wiretap order. Section 2515 provides that “[w]henever any wire or oral communication has been intercepted, no part of the contents of such communication and no evidence derived therefrom may be received in evidence in any trial . . . if the disclosure of that information would be in
(iii) the interception was not made in conformity with the order of authorization or approval.”
In Dahda, the Supreme Court considered wiretap orders that, contrary to the Wiretap Act, included an authorization to intercept communications outside the territorial jurisdiction of the issuing court, i.e., the District of Kansas. To address the consequence of the defect, the Court looked to
Since the defect at issue did not implicate the requirements stated in
specifically that it was not resolving questions such as the consequence of a defect under
Because Dahda does not address how we, in this case, are to determine whether the orders’ failure to include the names of authorizing officials renders them “insufficient,” we must look elsewhere.
B
Brunson‘s argument that the orders in this case failed adequately to include the “identity . . . of the person authorizing the application” for each order, as required by
Each order in this case states that it was issued “pursuant to an application authorized by an appropriate official of the Criminal
the authorizing official by title, they did not include the official‘s name, instead referring to the application where the name was provided. The question that Brunson thus presents is whether the Wiretap Act requires that orders give the authorizing official‘s name. But his argument addressing that issue reveals that his framing of the issue is in fact incomplete.
Brunson agrees that if the orders stated that the “Attorney General,” without naming him or her, authorized the application, the order would be sufficient because that title refers to a unique, identifiable person. At the current time, for example, it is public knowledge, or at least readily obtainable knowledge, that William P. Barr is the Attorney General. Based on this logic, other courts have acknowledged that a name is not necessarily required to provide identification. See, e.g., United States v. Scurry, 821 F.3d 1, 8–9 (D.C. Cir. 2016) (holding that the identification requirement of the Wiretap Act is met “where the language points unambiguously to a unique qualified officer holding a position that only one individual can occupy at a time“). Brunson takes a different view, however, when an order identifies a Deputy Assistant Attorney General in the Criminal Division as the authorizing official because there are six persons who hold that title. Thus, he maintains that reference to the “Attorney General,” without naming him is sufficient, but reference to a Deputy Assistant Attorney General is not. Brunson‘s own argument therefore indicates that the issue of whether wiretap orders meet the identity requirement of
This recasting of the issue indeed comports more closely to what is required by the text of the Wiretap Act, which employs the word “identity,” because that term is defined
to mean “the distinguishing character or personality of an individual,” Merriam-Webster‘s Collegiate Dictionary, 616 (11th ed. 2007) (emphasis added), and not necessarily the name of the individual. Thus, when the statute requires that an order include the “identity” of the person authorizing an action, the word “identity” requires a description of the person that is sufficient to distinguish that person from others, but not necessarily the person‘s name. In short, whether a wiretap order sufficiently identifies a person turns on whether the description of the person leads to but one person.
By this understanding then, when the order identifies the Attorney General by title only as the authorizing official, it is sufficient because the Attorney General refers to one person and his or her name, even though not given, can readily be obtained. With this same reasoning, then, an “identification” by reference in an order to a Criminal Division Deputy Assistant Attorney General would not, without more, be sufficient because there are six such persons, and such identification simply by title would not point to the one person who authorized the application.
The information contained in the orders in this case, however, is more complete than a mere reference to one of six Criminal Division Deputy Assistant Attorney Generals. Each order identifies, as the authorizing official, the Deputy Assistant Attorney General of the Criminal Division of the Department of Justice who signed off on the application leading to the issuance of the order. And the specific official who
authorized the application for the order. We therefore conclude that, in context, the orders contained sufficient information to identify the authorizing officials.
Nonetheless, we would commend that, to avoid doubt and possible confusion in the future, prosecutors include as a matter of prudence in wiretap orders both the title and name of the official authorizing the application. And we understand that the Department of Justice has already recognized this. Several years after the orders in this case were issued, the Department sent a circular to all federal prosecutors recommending that the name of the authorizing official be included in any proposed wiretap order.
At bottom, however, we conclude that the orders in this case, which identified the officials authorizing the application by title and reference to the application where the official‘s name was included, were sufficient to satisfy the requirement of
C
Even were we to assume that perfect compliance with
suppression under that subparagraph. See United States v. Moore, 41 F.3d 370, 375–76 (8th Cir. 1994) (order missing judge‘s signature); United States v. Joseph, 519 F.2d 1068, 1070 (5th Cir. 1975) (order identifying the wrong Government official as authorizing the application); United States v. Vigi, 515 F.2d 290, 293 (6th Cir. 1975) (same). Here, the wiretap orders, even if not in perfect compliance, nonetheless substantially complied with the requirements of
III
Finally, even if the wiretap orders were thought to be facially insufficient, Brunson‘s motion to suppress would have appropriately been denied under the good faith doctrine articulated in United States v. Leon, 468 U.S. 897 (1984).
In Leon,
high, as the exclusion impedes the truth-finding functions of the judge and jury and possibly results in guilty defendants going free or receiving reduced sentences. See id. at 907. And suppressing evidence “obtained in objectively reasonable reliance on a subsequently invalidated search warrant” has only “marginal or nonexistent” benefits in terms of deterring Fourth Amendment violations. Id. at 922. Thus, the Court observed, where an officer acts in good faith, the benefits of suppressing the fruits of an invalid warrant are outweighed by the harms of doing so. See id.
While Leon carved out an exception to the judicially created exclusionary rule and this case involves a statutory exclusionary rule, we note that when Congress enacted the Wiretap Act, it did so against the backdrop of analogous Fourth Amendment jurisprudence. Indeed, the accompanying Senate Report specifically states that the statutory suppression remedy was designed to “largely reflect[] existing law.” S. Rep. No. 90-1097 (1968), as reprinted in 1968 U.S.C.C.A.N. 2112, 2185. Moreover, Leon‘s rationale is equally applicable in the statutory suppression context — “when law enforcement officers have acted in objective good faith or their transgressions have been minor,” requiring suppression of evidence confers an unearned benefit on a guilty defendant that “offends basic concepts of the criminal justice system.” Leon, 468 U.S. at 908. Moreover, in the same vein, the Supreme Court has specifically recognized that not every defect in a wiretap order justifies exclusion under the Wiretap Act‘s suppression provision. See Dahda, 138 S. Ct. at 1498.
Thus, we conclude that where law enforcement officials have acted reasonably and in good faith to comply with the central substantive requirements of the Wiretap Act, as is
the case here, suppression is not justified. See Moore, 41 F.3d at 376–77 (holding that the good faith exception applied to the government‘s interception of communications pursuant to a wiretap order that was missing the judge‘s signature); United States v. Brewer, 204 F. App‘x 205, 208 (4th Cir. 2006) (per curiam) (unpublished) (holding in the alternative that law enforcement officers “were entitled to rely on facially valid wiretap orders pursuant to the good faith exception“). Even though the wiretap orders submitted by the government did not contain the names of the authorizing officials, the accompanying applications did. More importantly, there was plainly no attempt to obfuscate the identity of the relevant officials, nor did the government fail to secure proper authorization for the applications submitted. And at the time the orders in question were issued in 2013, no court of appeals had held that a failure to include the name of the authorizing officer in the wiretap order rendered such an order substantively deficient. Indeed, numerous courts had considered challenges to similar orders and held that communications intercepted under those orders were not subject to suppression. See, e.g., United States v. Gray, 521 F.3d 514, 526–28 (6th Cir. 2008) (holding that the omission of the name of the authorizing officer from a wiretap order was a technical defect that did not require suppression); United States v. Callum, 410 F.3d 571, 576 (9th Cir. 2005) (same); United States v. Fudge, 325 F.3d 910, 918 (7th Cir. 2003) (same); United States v. Radcliff, 331 F.3d 1153, 1162 (10th Cir. 2003) (same) (noting that “[e]very circuit to consider the question has held that
officer‘s name rendered a wiretap order facially insufficient for purposes of
In short, any defects in orders issued prior to 2016 resulted from good faith efforts to comply with the requirements of the Wiretap Act and not from intentional wrongdoing and therefore would not require suppression of the evidence obtained.
IV
Addressing his sentencing, Brunson contends that the First Step Act, which was enacted on December 21, 2018, during the pendency of this appeal, invalidates the mandatory life sentence imposed by the district court. As he correctly notes, § 401 of the FSA reduced the mandatory term of life imprisonment without release previously required under
Brunson argues that the statutory language should be construed to extend the Act‘s coverage to “non-final criminal cases pending on direct review at the time of enactment.” This reading, however, is contrary to the plain meaning of the statute‘s text, which on its face restricts applicability to defendants whose sentences had not yet been “imposed” at
the time of the Act‘s enactment, and a sentence is “imposed” when it is pronounced by the sentencing court, i.e., the district court. Indeed, we recently recognized as much in United States v. Jordan, 952 F.3d 160 (4th Cir. 2020), which held that § 403 of the FSA, which contains the same retroactivity provision as does § 401, did not apply to a defendant whose sentence was pronounced — but not finalized after direct appeal — prior to the FSA‘s enactment. See id. at 172.
As we noted in Jordan, this common-sense understanding is consistent with numerous provisions of federal law that govern sentencing in the district court. See, e.g.,
To support his argument to the contrary, Brunson relies on United States v. Clark, 110 F.3d 15, 17 (6th Cir. 1997), where the court held that
Sixth Circuit reasoned that the safety valve statute should be applied broadly and noted that “[a] case is not yet final when it is pending on appeal. The initial sentence has not been finally ‘imposed’ within the meaning of the safety valve statute because it is the function of the appellate court to make it final after review or see that the sentence is changed if in error.” Id. But in Jordan, we rejected a request to extend Clark to § 403 of the FSA, noting that we could find “no other circuit court decision applying [Clark‘s] definition of ‘imposed’ even under the statute at issue in Clark, let alone applying it in any other context.” Jordan, 952 F.3d at 173. In short, we find Clark‘s reasoning unpersuasive and decline to extend its holding to § 401 of the FSA.
Brunson also argues that a “presumption of retroactivity” requires applying the FSA‘s amendments to sentences that were not final at the time of enactment, citing Bradley v. School Bd. of City of Richmond, 416 U.S. 696, 710–12 (1974). But Bradley stands only for the proposition that a change in the law may be given effect in pending cases even in the absence of clear legislative intent. Id. at 715. Here, in contrast to Bradley, Congress did expressly provide for retroactive application of the changed law, but it limited that application to defendants whose sentences had not been imposed as of the date the law was enacted.
At bottom, we conclude that the FSA does not provide any benefit to Brunson.
* * *
The judgment of the district court is accordingly
AFFIRMED.
DIANA GRIBBON MOTZ, Circuit Judge, dissenting:
The plain language of
I.
A.
Title III of the Omnibus Crime Control and Safe Streets Act of 1968, codified at
Title III specifies the obligations of both law enforcement and the authorizing court. It requires law enforcement to submit a
B.
An individual may move to suppress evidence obtained via wiretap and any information derived therefrom if: “(i) the communication was unlawfully intercepted; (ii) the order of authorization or approval under which it was intercepted is insufficient on its face; or (iii) the interception was not made in conformity with the order of authorization or approval.”
The Supreme Court has interpreted
As Giordano established and Dahda reaffirmed, a wiretap is “unlawful[]” within the meaning of subparagraph (i) if the wiretap violates those Title III statutory provisions that implement the wiretap-related congressional concerns motivating passage of Title III. Giordano, 416 U.S. at 527 (“[W]e think Congress intended to require suppression where there is failure to satisfy any of those statutory requirements that directly and substantially implement the congressional intention to limit the use of intercept procedures to those situations clearly calling for the employment of this extraordinary investigative device.“).2
Following Giordano, courts assessing whether a wiretap was “unlawfully intercepted” pursuant to subparagraph (i) look to whether the Department of Justice has substantially complied with Title III‘s requirements and will suppress the wiretap evidence only if the alleged impropriety implicates those core concerns. This assessment has become known as the “core concerns” test. Dahda, 138 S. Ct. at 1498 (referring to the “core concerns test“).
For many years, some courts applied Giordano‘s core concerns test not only to evaluate whether a wiretap was “unlawfully intercepted” under subparagraph (i) but also to determine whether it was “insufficient on its face” under subparagraph (ii). So long as the Department of Justice substantially complied with Title III‘s core concerns, these courts deemed suppression unwarranted, even where the defendant challenged an order as facially insufficient under
In Dahda, the Supreme Court implicitly overruled those cases, holding that Giordano‘s “core concerns” analysis applies only to subparagraph (i), and does not apply to the question of whether a wiretap order is “insufficient on its face” under subparagraph (ii). Dahda, 138 S. Ct. at 1498 (concluding “that subparagraph (ii) does not contain a Giordano-like ‘core concerns’ requirement“).
The Dahda Court reasoned that, unlike the assessment of whether a wiretap is unlawful under subparagraph (i), which looks to whether the Government has substantially complied with the statute‘s objectives, the assessment of whether an order is facially insufficient under subparagraph (ii) is a mechanical test: if the order does not contain the information required by
It is clear that subparagraph (ii) covers at least an order‘s failure to include information that
§ 2518(4) specifically requires the order to contain. An order lacking that information would deviate from the uniform authorizing requirements that Congress explicitly set forth, while also falling literally within the phrase “insufficient on its face.”
Id. (emphases added) (citations omitted).
In sum, when assessing facial sufficiency under subparagraph (ii), Giordano‘s “core concerns” test is irrelevant. Rather, Dahda‘s test controls. Id. The Dahda analysis is simple: when an order lacks the information that
II.
Given that
A.
At oral argument, the Government twice acknowledged that it was the position of the Department of Justice that
There are several problems with this argument. The first is that it is in considerable tension with Title III itself. If incorporation by reference were acceptable, the entire order would need be little more than a single sentence incorporating the application by reference. This would eviscerate Title III, which enumerates in
Title III‘s facial sufficiency inquiry is limited to the four corners of the wiretap order. There is something incongruous about an interpretation that would let extrinsic documents transform an order that is “insufficient on its face” into one that is sufficient “on its face.” Further, the Government‘s interpretation would allow it, in every case, to satisfy Title III‘s order identification requirement by satisfying its application identification requirement, effectively rendering
section 2518(4)(d) superfluous.
Scurry, 821 F.3d at 9 (citations omitted).
Moreover, the Government‘s theory rests on the unfounded assumption that the applications and orders necessarily move together. The D.C. Circuit remarked on the problem with the logic in this argument: the “complete overlap” between the information required in the order and application “makes little sense if Congress expected the order always to travel with the application.” Id. at 10. Moreover, as the Government acknowledged at oral argument, while it aims to keep these documents together, it cannot guarantee that they remain so. When asked if there was a uniform, mandatory method of keeping the wiretap applications and orders together, the Government‘s answer was “probably not.” Oral Arg. at 35:35–36:56. Accordingly, the Government has not and cannot establish that the underlying applications always move with the orders.
In the case at hand, the Government implies that its incorporation by reference theory would cause no harm because these documents traveled together. Supp. Br. at 16–17 (explaining both the issuing judge and Brunson were provided with the applications, which included the authorizing officials’ names). In fact, it is not clear that they did in this case,4 or that it is uncommon
Additionally, despite the Government‘s argument that specific language in the orders incorporates the applications by reference, I am skeptical that this language clearly does so. Compare the language in the orders, prepared by the Government, which the Government now asserts incorporates the applications by reference: “pursuant to an application authorized by an appropriate official” and “full consideration having been given to the matters set forth therein,“; with the explicit incorporation by reference in one of the Government‘s wiretap applications in this case: “[o]n the basis of the allegations contained in this application and on the basis of the Affidavit of Special Agent [omitted], which is fully incorporated herein by reference.” (emphasis added). As evidenced by the latter example, the Government knows how to clearly incorporate by reference when it intends to do so. The language in the orders hardly constitutes a clear statement of intent to incorporate the applications by reference.
B.
Rather than relying on the Government‘s incorporation by reference theory, the majority offers a theory of its own, one that the Government has expressly disavowed. Oral Arg. at 33:21–34:48. The majority‘s starting point is the Government‘s asserted belief that an order may identify the Attorney General as the authorizing official by title alone.5 According to the majority, this reasoning means that every authorizing official can be identified by title rather than by name, so long as the official “is described with such particularity that only one person fits the description.” Maj. Op. at 12. Thus, the majority concludes that “whether a wiretap order sufficiently identifies a person turns” not on that person‘s name, but “on whether the description of the person leads to but one person.” Id. at 13.
The problem with this argument, as the Government recognizes, is that the title of the authorizing officials other than the Attorney General do not “lead to but one person” — which is why the Government concedes that the most natural understanding of the “identity” in this context means name, not title. As the D.C. Circuit explained in rejecting the majority‘s argument:
The text is plain and unambiguous: every wiretap court order must identify the individual high-level Justice Department official who . . . authorized the underlying wiretap application. This requirement may be met where the language points unambiguously to a unique qualified officer holding a position that only one individual can occupy at a time, but here there is more than one Deputy Assistant Attorney General and no individual Deputy is identified on the face of [the challenged] wiretap orders. This would appear to end this part of our inquiry.
In sum, the majority‘s definitional sleight of hand cannot cover up its flawed
The other problem with the majority‘s analysis is its suggestion that the Government‘s substantial compliance with the core concerns of the statute is relevant to the inquiry concerning whether the orders are sufficient on their face. For example, the majority explains that the wiretap orders were sufficient in part because “the applications were in fact appropriately authorized,” id. at 3, and the orders were not defective because “[e]ach application was in fact appropriately approved” and “both the court issuing the wiretap orders and later Brunson had actual knowledge of the name of each authorizing official,” id. at 15. But, as the Government has recognized, the Supreme Court in Dahda explicitly rejected an approach that assesses facial sufficiency by reference to whether the Government has substantially complied with Title III; instead, Dahda directs courts to determine whether, on its face, a wiretap order contains the information required by
Dahda‘s explicit disavowal of the core concerns test in determining facial sufficiency under subparagraph (ii) was no anomaly. It has been the Supreme Court‘s consistent position for more than forty years that each of the three subparagraphs requiring suppression under
III.
Perhaps recognizing the logical contortions required of its holding, the majority (in what is plainly dicta) also adopts the Government‘s alternative argument that we should apply the good faith exception set forth in United States v. Leon, 468 U.S. 897 (1984). Invocation of Leon in the Title III context is misguided. The exception is relevant in cases of constitutional suppression; it is a judicially created exception to a judicially created remedy to protect a constitutional right. See id. at 906. This, however, is not a constitutional case; the statute controls, and the statute does not provide a good faith exception. Cf. Giordano, 416 U.S. at 524 (“The issue [of suppression] does not turn on the judicially fashioned exclusionary rule aimed at deterring violations of Fourth Amendment rights, but upon the provisions of Title III . . . .“). Rather, the statute directs a court to suppress orders that are “insufficient on [their] face.”
In opining to the contrary, the majority relies in part on its observation that, with respect to Title III, Congress legislated “against the backdrop of analogous Fourth Amendment jurisprudence” and that Congress intended the suppression remedy to “largely reflect[] existing law.” Maj. Op. at 16. This is uncontroversial — as far as it goes. But Congress enacted Title III almost twenty years before the Supreme Court issued Leon. Thus, in so legislating, Congress could hardly have intended Title III to reflect the Leon rule that did not yet exist. See United States v. Rice, 478 F.3d 704, 713 (6th Cir. 2007) (“Congress obviously could not know that Fourth Amendment search and seizure law would embrace a good-faith exception sixteen years after the passage of Title III, and the language from the Senate Report indicates a desire to incorporate only the search and seizure law that was in place at the time of the passage of Title III.“). Nor has Congress subsequently amended Title III to provide for such an exception.
The majority also leans on Leon‘s policy rationales to support its conclusion that we should import Leon into the Title III context. The majority believes it is unfair to law enforcement to “confer[] an unearned benefit on a guilty defendant” for a mistake made in good faith. Maj. Op. at 16. Importing this reasoning is into Title III is a fundamentally flawed exercise. Whether to “confer[]” such a “benefit” is not a choice that we are free to make. The decision whether to suppress evidence, and in what circumstances, constitute policy judgments already expressly made by Congress. We do not have the authority to disregard those judgments. See Nickey Gregory Co., LLC v. AgriCap, LLC, 597 F.3d 591, 608 (4th Cir. 2010) (Niemeyer, J.) (“The judiciary, however, should not insert itself in these policy matters by questioning or debating legislative judgments, as it is constituted only to comprehend,
IV.
The Government‘s last refuge, an argument that the majority does not adopt, is that, if suppression is warranted and the good-faith exception does not apply, any error was harmless because of the “overwhelming, independent” non-wiretap evidence against Brunson. Supp. Br. at 9. Assuming harmless error applies,8 however, examination of the trial record renders laughable the Government‘s contention that “the intercepted wire communications were a small part of the [G]overnment‘s overall case.” Supp. Br. at 22.
In fact, the record reveals that the intercepted calls were unquestionably the linchpin of the Government‘s case. The calls were repeatedly played for the jury and were discussed throughout the trial by the Government and its witnesses (including Greenan, Wright, Ravenel, Gates, and Davis). See, e.g., JA 88–91 (FBI agent testifying about contents of wiretaps), 94-95 (same); JA 96 (intercepted wiretap audio recording played for the jury), 97 (same), 99 (same), 102 (same), 233 (same), 234 (same), 248 (same), 256 (same), 259 (same), 262 (same), 264 (same), 266 (same), 270 (same), 271 (same), 273 (same), 280 (same), 284 (same), 285 (same), 288 (same), 290 (same), 291 (same), 406 (same), 427 (same), 467 (same), 511 (same). Given the Government‘s repeated use of and reference to these tapes throughout the trial, it is impossible to conclude that discussing and playing these incriminating audio recordings did not substantially influence the jury‘s view of Brunson‘s culpability. This certainly is sufficient to conclude that the error was not harmless. See Kotteakos v. United States, 328 U.S. 750, 765 (1946) (“The inquiry cannot be merely whether there was enough [evidence] to support the result, apart from the phase affected by the error. It is rather, even so, whether the error itself had substantial influence. If so, or if one is left in grave doubt, the conviction cannot stand.“).
V.
For the foregoing reasons, I respectfully dissent.9
