OPINION
1. INTRODUCTION
Defendants were convicted of five substantive counts of mail fraud and a sixth count of conspiracy to commit mail fraud in violation of 18 U.S.C. § 1341 and 18 U.S.C. § 371 respectively. Presently before me are their post-trial motions in which they contend principally that the acts for which they were convicted did not comprise a “scheme or artifice to defraud” within the meaning of the mail fraud statute and that the mails were not utilized for the purpose of executing the scheme. After a careful consideration of the matters raised by the defendants, I have concluded that the Government did allege and prove a cognizable violation of the mail fraud statute and conspiracy. Accordingly, the post-trial motions will be denied.
II. FACTUAL BACKGROUND
While employed at Sperry Univac’s applications development center 1 in Blue Bell, Pennsylvania, defendants David E. Kelly and Matthew Palmer, Jr., 2 attempted to *497 develop a system for computerizing the generation of sheet music. Simply described, the system involved the programming of musical scores into a computer storage facility and subsequently transcribing the programs into manuscript form by means of a plotting device. 3 This stands in distinct contrast to the process currently utilized in the music business which consists of someone’s reading a manuscript to an artist who manually draws the notes and symbols. The defendants’ computerized process would purportedly have resulted in significant savings of both time and cost to the music publishing industry. 4 In developing this program, the defendants utilized substantial amounts of computer time and storage capacity within the central processing unit of the applications development center. At no time did anyone from Sperry Univac give Kelly or Palmer authority to make such use of the company’s resources nor did either defendant advise anyone of their activities.
While still employed at Univac, Kelly, Palmer, and an associate, Sam Casale, entered into a business agreement with Broomall Industries, Inc. “to establish a working relationship with regard to the development and promotion of a Computer Aided Manuscript Preparation Service” (Tr. 5-83). Under the terms of the agreement, Broomall was to arrange financing and to furnish defendants with access to a flat bed plotter and other graphics equipment to permit the further development of what was christened the “allegro” system. 5 Thereafter, Kelly, Palmer, Casale, and Andrew Trolio, president of Broomall, caused certain promotional materials to be mailed to five musical publishing companies inviting them to send representatives to an allegro demonstration.
Eventually, defendants’ use of Univac’s resources was discovered by company personnel. Following an investigation by Uni-vac security officials and the F.B.I., Kelly and Palmer were indicted on five counts of mail fraud and one count of conspiracy to commit mail fraud. In essence, the indictment alleged that by unauthorizedly utilizing their employer’s computer time and storage facilities for the development of a private business venture, defendants defrauded Univac of their loyal and faithful services as employees and used the United States mails in furtherance of their fraudulent scheme by causing the promotional materials to be mailed. The defendants were found guilty by a jury on all counts.
III. GENERAL CONSIDERATIONS
In view of the unique factual circumstances giving rise to these convictions, it is necessary to consider the general purpose and scope of the mail fraud statute before addressing the many contentions advanced by the defendants. In pertinent part, 18 U.S.C. § 1341 provides:
Whoever, having devised or intending to devise any scheme or artifice to defraud ... for the purpose of executing such scheme or artifice or attempting to do so, places in any post office or authorized depository for mail matter, any matter or thing whatever to be sent or delivered by the Post Office ... or knowingly causes to be delivered by mail according to the direction thereon ... shall be fined not more than $1000.00 or imprisoned not more than five years or both.
*498
The essential elements of mail fraud are (1) a scheme or artifice to defraud and (2) the use of the United States mails in execution of the scheme.
Pereira v. United States,
As a result of the failure to limit the term “scheme or artifice to defraud” to common law definitions of fraud and false pretenses and schemes prohibited by State law, the mail fraud statute generally has been available to prosecute a scheme involving deception that employs the mails in its execution that is contrary to public policy and conflicts with accepted standards of moral uprightness, fundamental honesty, fair play and right dealing.
United States v. Mandel,
First enacted in 1872, the mail fraud statute, together with its lineal descendant, the wire fraud statute, has been characterized as the “first line of defense” against virtually every new area of fraud to develop in the United States in the past century. Its applications, too numerous to catalog, cover not only the full range of consumer frauds, stock frauds, land frauds, bank frauds, insurance frauds, and commodity frauds, but have extended even to such areas as blackmail, counterfeiting, election fraud, and bribery. In many of these and other areas, where legislatures have sometimes been slow to enact specific prohibitory legislation, the mail fraud statute has frequently represented the sole instrument of justice that could be wielded against the ever-innovative practitioners of deceit.
Rakoff, The Federal Mail Fraud Statute (Part I), 18 Duquesne Law Review 771, 772 (1980).
It is clear from this brief discussion that the propriety of defendants’ mail fraud convictions cannot be evaluated in a technical or mechanistic fashion. Rather, they must be considered in light of the broad language of the statute itself, the expansive interpretation which it has been accorded by the courts, and its general utility in meeting the multifarious types of schemes, complex or simple, which may be devised.
IV. THE POST-TRIAL MOTIONS
The defendants have filed a motion in arrest of judgment in which they challenge the sufficiency of the indictment, a motion
*499
for judgment of acquittal wherein they contend that the evidence failed to support the conviction, and a motion for new trial in which they assert that I committed reversible error in refusing certain requested points for charge. In essence, the defendants argue that the indictment did not charge nor did the evidence establish that they engaged in a cognizable scheme to defraud which was executed by the use of the mails. These contentions will be tested not only on the basis of the indictment but also in light of the evidence adduced at trial and the instructions given to the jury.
United States v. Brown,
A. Scheme to Defraud
The indictment in this case charged defendants with using Univac’s computer time and computer storage capacity for their own personal benefit thus defrauding their employer of the honest and faithful performance of their duties as employees. It is well established that a scheme which is directed at depriving an employer of the honest and faithful services of its employees or of its right to have its business conducted honestly may constitute a “scheme to defraud” within the meaning of the mail fraud statute.
United States v. Reece,
The defendants’ next contention is that an essential element of a scheme to defraud under the mail fraud statute is the intent to deprive the person being defrauded of money or some other tangible property right. They assert that the Government did not allege or prove that the purpose of defendants’ fraudulent scheme was to obtain money from Univac and therefore argue that it failed to establish the existence of a scheme to defraud within the meaning of 18 U.S.C. § 1341. As support for this proposition, defendants rely exclusively upon
Hammerschmidt v. United States,
The controlling interpretation of the statute is illustrated in
United States v. States,
Similarly, I am unpersuaded by the defendants’ analogous contention that even if the statute does not require that the purpose of the scheme be to deprive the employer of money, it must in some manner be directed against the employer’s economic interests. In United States v. Procter & Gamble, supra, the court articulated the rationale underlying the recreant employee doctrine:
When one tampers with that relationship for the purpose of causing the employee to breach his duty he in effect is defrauding the employer of a lawful right. The actual deception that is practised is in the continued representation of the employee to the employer that he is honest and loyal to the employer’s interests.
[I]t is clear that International Harvester was deprived of Bryza’s honest and faithful services in addition to the right to make the best possible purchase. Although Bryza argues he obtained the best possible contracts for his employer, I-H *501 was entitled to negotiate those purchases with the knowledge of its employee’s interest. Thus, even though I-H was satisfied with Bryza’s job performance and the products he purchased for I-H from its suppliers, and despite the fact that no preferential treatment, beyond receiving business, was accorded the suppliers, that the suppliers’ prices to I — H were fair and reasonable, that I-H was never shown to be dissatisfied with the suppliers’ prices or products, and that Bryza insisted upon efficiency, quality and fair prices from the suppliers, Bryza’s conduct nonetheless falls within the purview of the mail fraud statute. The fraud consisted in Bryza’s holding himself out to be a loyal employee, acting in I-H’s best interests, but actually not giving his honest and faithful services, to I-H’s real detriment.
In the recent case of
United States v. Von Barta,
The general principles articulated in these decisions are controlling here. The essence of the fraud involved in each was the employee’s manipulation of his employment in some way designed to bring him concealed financial gain thus depriving his employer of the undivided loyalty in job performance to which an employer is entitled. I therefore hold that in this case, it is simply of no moment that defendants’ scheme was not directed against Univac’s economic interests 9 since it was directed at depriving Univac of the loyal and conscientious performance of their duties as employees.
As the Court emphasized in
Von Barta,
however, the mail fraud statute requires more than a failure to render loyal and faithful service; there must also be a scheme to deceive, mislead, or conceal material information. It is well established that such a scheme need not be fraudulent on its face “but must involve some sort of fraudulent misrepresentations or omissions reasonably calculated to deceive persons of ordinary prudence and comprehension.”
United States v. Pearlstein,
I cannot agree. “[A]n employee owes his employer a duty of loyalty which includes a *502 duty not to conceal facts known to him which he has reason to believe are material to the employer’s conduct of his business and affairs.” United States v. Bush, supra at 652. See also: United States v. Bohonus, supra at 1171. A review of the record shows more than ample evidence from which the jury could have determined that defendants took affirmative steps to conceal their unauthorized computer use from Univac. From this evidence, the jury could have inferred it was their intent to defraud Univac. Charles Card testified that in response to a terminal listing advising the computer users to review their files and eliminate any unnecessary usage, 15 files, some of which had starting indicators of K or M, 10 and which were primarily concerned with plotting routines or music were erased almost immediately (Tr. 1-60— 1-65). From this testimony, the jury could certainly have inferred that Kelly or Palmer or both had selectively erased certain programs to escape detection. Further, Card testified that Palmer and Kelly would have worked together in preparing the engineering/scientific group’s preliminary budget for fiscal year 1977. He stated that the preliminary budget was part of a general procedure in which each of the departments within the applications development center set forth their plans and objectives for the fiscal year involved so that management could authorize the funding necessary to support each program (Tr. 2-30). No project of the group could be authorized without going through the preliminary budget or some other type of management review (Tr. 2-34 — 2-35). Despite the fact that the music programs took up a substantial portion of the engineering/scientific group’s available storage space, no funding authorization for these programs was requested nor was mention of them made in the group’s budget projection (Tr. 2-34). Finally, Lester Weyant, a programmer at Univac who was hired by the defendants to “translate” the programmed music from COBOL to FORTRAN computer language 11 testified that Kelly had instructed him to “keep the entire matter quiet for some period of time.” (Tr. 6-32). It is clear that the jury could have determined that Kelly and Palmer attempted to conceal their CAMPS related activities from their employer.
The testimony was extensive and uncontradicted that Univac did not generally permit the use of its facilities to promote outside business ventures by its employees (Tr. 2-79 — 2-80; 3-87); that the use of its facilities for any purpose unrelated to business was permissible only when authorization was first obtained (Tr. 2-75; 3-35) 12 that defendants had never sought or received authorization to utilize Univac’s facilities to develop the allegro system (Tr. 2-45; 6-3), and that had they sought authorization for such activities it would have been denied (Tr. 6-19 — 6-20). In addition, both Kelly and Palmer had received and signed Uni-vac’s employee confidential information and invention agreement which gave Univac sole ownership of “any and all reports, drawings, blueprints, data writings and *503 technical information made or prepared” during the course of their employment with Univac (Tr. 2-42 — 2-43). Finally, the government introduced Univac’s conflict of interest policy statement which specifically proscribed the “engaging or continuing in outside business, or employment by an outside company that permits encroachment on Sperry Univac’s call for the full services of its employees, even though there may not be any other conflict.” (Tr. 2-^0 — 2-41). Despite the fact that only Palmer signed a certificate of no conflict of interest (Tr. 2-38), the jury could have inferred that both Kelly and Palmer, as supervisory personnel, were familiar with Univac’s policy regarding the outside business activities of its employees.
Thus, it is abundantly clear on this record that Kelly and Palmer were aware of Uni-vac’s policy against the use of its facilities for personal business ventures. They nevertheless made extensive use of the company’s computer facilities in furtherance of their own pecuniary interests, took steps to conceal their activities and willfully failed to seek authorization for them. The evidence was more than sufficient to sustain the jury’s determination that the defendants acted with intent to defraud.
Defendant Palmer next contends that there was insufficient evidence of his own unauthorized use of the Univac computer facilities or of his knowledge of Kelly’s activities to sustain his conviction under the substantive mail fraud counts. I cannot agree. One of the computer printouts identified by Charles Card as representing the programming of musical compositions had a mailing address 13 of “M. Palmer” (Tr. 2-23). As already noted, Card also testified that many of the programs containing musical scores or plotting routines had starting indicators of “K” or “M” (Tr. 1-60). Finally, F.B.I. Inspector Charles Owens, who interviewed Palmer during the Bureau’s investigation into this matter, testified that Palmer told him that he “began preliminary work on the software package to develop this system while employed at Univac.” (Tr. 7-79). Hence, there was adequate evidence from which the jury could have determined that Palmer directly participated in the unauthorized use of Univac’s computer facilities.
More significantly, the mail fraud statute, by its own terms, proscribes a
scheme
to defraud and is not necessarily limited to direct participation in all of the concrete actions taken to effectuate the scheme. Rather, a mail fraud conviction can be based upon a defendant’s willful participation in a scheme to defraud with knowledge of its fraudulent nature.
United States v. Pearlstein, supra,
at 537;
United States v. Tiche,
The defendants’ final contention with respect to the existence of a scheme to defraud is that the evidence is insufficient to sustain the conviction of conspiracy to commit mail fraud as alleged in Count VI of the indictment. This argument is without merit. “[P]roof of a mail fraud scheme involving two or more persons is analogous to the nature of proof in a conspiracy.”
United States v. Cohen, supra
at 1364.
See also: United States v. Serlin,
B. Use of the Mails
Thus far, this discussion has been concerned solely with the first element of a mail fraud violation — the existence of a scheme to defraud coupled with the necessary intent to do so. It is axiomatic, however, that:
The federal mail fraud statute does not purport to reach all frauds, but only those limited instances in which the use of the mails is a part of the execution of the fraud, leaving all other cases to be dealt with by appropriate state law.
Kann
v.
United States,
Defendants premise their first argument on the language of the indictment. In Counts I, II, and IV the defendants were accused of causing “to be delivered by mail” the promotional materials described therein. By contrast, Counts III and V simply alleged that they caused the materials “to be placed in an authorized depository for mail matter.” It is asserted that by using the
*505
divergent language in the indictment, the Government obligated itself to prove mailing under Counts III and V and actual delivery under Counts I, II, and IV. Defendants then contend that the evidence of mailing and delivery was insufficient to support convictions of the acts alleged. This argument is not persuasive. It is well settled that in order to establish a violation of the mail fraud statute it is not necessary to show that defendants actually mailed anything themselves. It is sufficient to prove that they
caused
it to be done.
Pereira v. United States, supra,
Where one does an act with knowledge that the use of the mails will follow in the ordinary course of business, or where such use can reasonably be foreseen, even though not actually intended, then he “causes” the mails to be used.
Pereira v. United States, supra,
Q. And approximately when did you send out the invitations and the letters?
A. Well, in the early part of the month of January, I believe.
Q. In 1976?
A. Yes.
Q. And you personally supervised the mailing?
A. Yes.
Q. What about getting the letters to the Post Office, how was that handled?
A. Well, I would mail them. I mailed them.
(Tr. 7-25 — 7-26). Viewing this evidence in the light most favorable to the Government, I conclude that this line of testimony was more than sufficient to permit the jury to determine that the defendants “caused” the use of the mails within the meaning of 18 U.S.C. § 1341. 17
*506
The defendants’ more substantial contention is that the nexus between the mailing of the promotional materials and the accomplishment of their scheme to defraud Univac was too attenuated to meet the statutory requirement that the mailing be “for the purpose of executing” the fraudulent scheme. In evaluating this argument, the essential question presented is “whether or not the mailings were sufficiently closely related to respondent’s scheme to bring his conduct within the statute.”
United States v. Maze, supra,
An examination of the cases in which these general principles have been applied will prove helpful in resolving the issues presented here. The Supreme Court has on several occasions considered the circumstances under which the use of the mails may be deemed “for the purpose of executing” a scheme to defraud. In
Kann v. United States, supra,
the defendant was convicted of two counts of mail fraud stemming from his participation in a scheme in which he and several others fraudulently obtained and cashed certain checks. The use of the mails upon which the mail fraud indictment was premised was the forwarding of the checks from the payor bank to the drawee bank for collection. In reversing the convictions, the Court held that the object of the scheme to defraud was the receipt of money which had been obtained “irrevocably” by the defendant upon cashing the checks. Thus, the mailing of the checks occurred after the object of the scheme had been achieved and could not have been incidental to its execution.
See id.,
Pereira asked his then wife if she would join him in the hotel venture and advance $35,000 toward the purchase price of $78,-000. She agreed. It was then agreed, between her and Pereira, that she would sell some securities that she possessed in Los Angeles, and bank the money in a bank of his choosing in El Paso. On June 15, she received the check for $35,000 on the Citizens National Bank of Los Angeles from her brokers in Los Angeles and gave it to Pereira, who endorsed it for collection to the State National Bank of El Paso. The check cleared, and on June 18, a cashier’s check for $35,000 was drawn in favor of Pereira.
Id.,
*507
In
Parr v. United States,
The leading Third Circuit case on this issue is United States v. Tarnopol, supra. In Tarnopol, the defendants were officers in two corporations which were engaged in the production, marketing, and sale of records. They would order shipments of records to be made directly from the manufacturer to their customers. Each shipment was accompanied by a packing slip of which there were two copies. The manufacturer kept one copy and forwarded the second “confirmation copy” to the defendants’ corporations. The defendants would intercept the packing slip thus preventing the transaction from being entered on the company’s ledger and retain the proceeds of the sale for their own use. They were indicted and convicted on numerous counts of mail fraud. On appeal, the convictions were reversed. The Court determined that the mailing of the packing slip, although contemporaneous with and generally part of the fraudulent transaction, was unrelated to the actual execution of the scheme. Rather, the packing slips were utilized by the defendants “merely as a convenient but not essential tool in carrying out [their] object.” Id. at 472. See also: United States v. Brown, supra at 665-66. 19
In
United States v. Britzman,
By contrast, in United States v. Lea, supra, the defendant was a purchasing agent in the meat department of Safeway. He became involved in a kickback scheme with two brokers of meat products. The mailings at issue were statements of account and checks which were mailed between the brokers and the sellers with whom they dealt. Despite the fact that defendant did not participate in any of the mailings, the Court held that they were instrumental in the accomplishment of the object of his fraudulent scheme and sustained the mail fraud conviction:
Here, the items mailed, though probably not absolutely essential to success, furthered the scheme. To obtain funds to pay the kickbacks, Mutual had to secure commission payments from the suppliers who sold to Safeway. In the ordinary course of business, the confirmations and commission statements facilitated receipt of the commission checks, which after being deposited in Mutual’s bank account, served as the source of funds for the payments to Lea.
Id.
at 431. Finally, in
United States v. Rodgers,
It is true that the scheme to defraud did not concern the performance of the contract work itself. Rather the scheme primarily involved the allocation of the contractors to perform that work. Nevertheless, the scheme defrauded the government of its right to depend upon the competitive process to allocate the jobs and to set the cost of those jobs. The scheme would have been meaningless, incomplete, and futile without final award and payment which were accomplished through the mail. Clearly, the mails were used “in furtherance” of the scheme.
Id. at 1310. (footnote omitted).
It remains to apply these principles to the present case. The defendants contend that the mailing of the promotional materials was related only to their goal of ultimately making money from the completed allegro system. It did not, they assert, further the unauthorized use of Univac’s computer facilities and therefore was unrelated to the execution of the fraudulent scheme. In so arguing, defendants posit an unduly restrictive interpretation of the perimeters of their scheme to defraud. Under the terms of the indictment, Kelly and Palmer were charged with defrauding Univac by using its resources for their own personal gain. The evidence at trial clearly established that while the defendants were utilizing Univac’s facilities to develop the technologi *509 cal viability of the system, they were actively engaged in attempting to develop a market for the completed allegro program. Stephen P. Rauch, president of Big Bells, Inc., a musical publishing house, testified that in late 1974 or early 1975 he was contacted by Matthew Palmer who submitted a proposal that Big Bells undertake the financing of the allegro system. The proposal set forth both anticipated sales and anticipated net profits for the first two years of the system’s operation (Tr. 7-61— 7-63). When this proposal did not work out, defendants engaged in negotiations with Andrew Trolio which led to the June 5, 1975 joint venture agreement and eventually the incorporation of CAMPS, Inc. (Tr. 5-82 — 5-83). Between the date of the agreement and December of 1975, Kelly and Palmer continued to develop the system until, in Trolio’s words “we decided that we would have a promotional.” (Tr. 5-85). At that point, defendants caused the mailing of the materials which form the basis of the mail fraud indictment.
Thus, the utilization of Univac’s computer facilities cannot be viewed in isolation. As the evidence makes abundantly clear, the primary, if not exclusive, motivating factor in defendants’ unauthorized use of their employer’s computer storage facility was their desire to market the completed allegro system at a substantial pecuniary gain for themselves. Hence, Kelly and Palmer’s attempts to develop the technological capabilities of the system cannot be viewed as distinct from their attempts to sell it. Both activities were directed at the achievement of a single goal — to derive financial gain from the marketing of the completed allegro system. Indeed without this goal, the computer use was merely an academic exercise by the defendants not unlike the games of Star Trek and chess in which Univac’s other employees occasionally engaged during off hours.
The obvious purpose of the promotional material was to solicit potential sales for the completed allegro system. Viewed on this context, the mailings were directly related to the achievement of the fruits of defendants’ scheme. I therefore conclude that the mailing in question was “for the purpose of executing” the scheme to defraud.
V. CONCLUSION
For all of the foregoing reasons, the defendants’ posttrial motions will be denied.
Notes
. The function of the applications development center is to develop and maintain programs which can be utilized by Sperry Univac’s customers. (Tr. 1-22)
. Palmer was employed as a group manager within the applications development center. Kelly was the manager of the engineering/scientific group, a subdivision of the applications development center, which developed and *497 maintained computer programs for use by the company’s engineering and other science oriented customers. (Tr. 1-22)
. A plotting device is a machine which is used to convert computer output into high quality graphic display. It consists of a moving arm with a pen attached. The computer essentially causes the arm to move in accordance with information which has been programmed into it. In this case, the plotter was used to draw clefs, ledgers and other graphic components of sheet music. (Tr. 2-7 — 2-9; 5-71)
. Unfortunately, the system did not fulfill its theoretical potential. It never became capable of turning out a complete musical score without making numerous errors which required human intervention to correct. (Tr. 7-9)
. Several months after the promotional demonstration was held, the business venture was incorporated as CAMPS, INC. with Kelly, Palmer, and Casale each as a 10 per cent shareholder. CAMPS is an acronym for Computer Aided Manuscript Preparation Service (Tr. 5-95).
. The statute does not specifically state that intent to defraud is a necessary element of a mail fraud violation. However, because only a scheme to defraud and not actual fraud is required, it is well established that fraudulent intent must be proven.
United States v. Diggs,
. It is frequently held that the “gist” of a mail fraud violation is not the scheme to defraud itself but rather the use of the United States mails in its execution.
United States v. Young,
. Both
Louderman
and
Condolon
dealt with convictions under the wire fraud statute, 18 U.S.C. § 1343, which proscribes the use of the facilities of interstate communication to execute “any scheme or artifice to defraud.” As the Court of Appeals recently held, the wire and mail fraud statutes are
in pari materia
and cases involving one of the statutes may properly be utilized in interpreting the other.
United States v. Giovengo,
. I note parenthetically that there was testimony to the effect that defendants’ activities had adversely affected Univac’s long term economic interests. Charles Card, group mánager of Univac’s computation service facility, testified that as a result of the extensive amount of computer space taken up by the music programming, Univac may have invested more money in disc storage and memory capacity than was necessary in light of actual business related usage (Tr. 2-64 — 2-65). He further indicated that Kelly and Palmer may not have aggressively pursued the development of certain packages which subsequently proved popular with Univac’s customers (Tr. 2-66).
. Card further testified that it was not unusual for each computer programmer to use an indicator generally based upon an initial or derivation of his name (Tr. 3-17). The jury could certainly have concluded that “K” referred to Kelly and “M” to Matthew Palmer.
. FORTRAN is an acronym for “formula translator” and is a computer language utilized for programming science related matters. COBOL is an acronym for “common business oriented language” and is utilized in programming business related matters (Tr. 6-27).
. Defendants elicited a considerable amount of evidence that Univac employees routinely used the computer facilities for playing games such as “Star Trek” and “chess” and that it was Univac’s policy to permit use of its computer facilities for educational and other purposes unrelated to Univac’s business. This evidence does not derogate from the fraudulent nature of defendants’ activities. The testimony was clear that Univac permitted the use of the computer terminals to play games in order to give its employees confidence in their ability to utilize the computer equipment (Tr. 2-75). Further, such use was restricted to non-business hours (Tr. 2-75 — 2-76). In addition, the utilization of the facilities for outside activities was permissible only when authorization was obtained from the appropriate managerial or supervisory personnel (Tr. 2-77).
. Card testified that each computer listing had a “mailing address” which was essentially the name of the user. The purpose of the mailing address was to allow the system administrator te identify the user and deliver the listing to him if it was not claimed within a certain period of time after the computer’s use (Tr. 2-6).
. As is discussed in more detail, infra, I am unable to agree with defendants’ assertion that their development of the allegro system can be neatly divided into two distinct phases — the use of Univac’s computer facilities and the formation of CAMPS, INC. and its marketing activities. Rather, I view both of these activities as aspects of an overall scheme to defraud. Therefore, Palmer’s activities concerning CAMPS, INC. and the allegro demonstration may properly be viewed as evidencing his knowledge of and participation in the scheme to defraud Univac.
. Principles applicáble to the law of conspiracy are frequently utilized in cases concerned with a mail fraud scheme involving two or more persons. It is well settled, for example, that once the existence of a scheme to defraud is established, declarations by one defendant may be attributed as evidence to the others,
United States v. Freeman,
. As was indicated at page 498 of this opinion, however, the existence of a “scheme to defraud” under the mail fraud statute is not contingent upon the violation of a state law.
Duriand v. United States,
. I am unable to agree with defendants’ assertion that under Counts I, II, and IV of the indictment, the government obligated itself to prove that the promotional materials were actually delivered to the publishing houses. A similar argument was advanced in the recent case of
United States v. Anderson,
Therefore, he argued that the evidence was at variance with the allegations in Counts 3-10 of the indictment. In rejecting this argument, the Court held as follows:
Here, the evidence introduced at trial showed that Anderson prepared the change-of-address cards and that the cards were processed through the mail. Substantial evidence was presented to the jury from which it could conclude that Anderson, at a minimum, “knowingly caused to be delivered by the mail” the cards in violation of section 1341. In fact, as stated above, Anderson does not appeal those counts of the indictment which contained the former language. The variance between the words in the indictment and the proof offered at trial did not prejudice or affect the substantial rights of Anderson.
Id. at 490. So here, the Government introduced more than ample evidence from which the jury could have determined that one of the elements of a mail fraud violation had been met, i. e., defendants knowingly caused the *506 mailing of the promotional materials in the execution of their scheme to defraud. It was not necessary for it to prove actual delivery to meet the divergence in the language of the indictment.
. The Supreme Court has also held that a mailing may be “for the purpose of executing” a scheme to defraud when it is intended to lull the victim into a false sense of security or in some way cause the victim to postpone reporting the fraud to the authorities.
United States v. Sampson,
. Defendants argue that the evidence shows the mailings in the instant case to be routine, intrinsically innocent business mailings within the meaning of United States v. Tarnopol, supra, which could not be deemed instrumental in executing a scheme to defraud. However, even assuming arguendo that the mailings in this case were routine, intrinsically innocent business mailings, this would not in and of itself remove them from the scope of the mail fraud statute. In United States v. Brown, supra, the Court of Appeals rejected the contention that the language in Tarnopol had established a class of mailings automatically exempt from mail fraud prosecution:
We do not believe that Tarnopol created a per se exception for any mailing which can be regarded as a “routine business mailing.” The case merely applied the already established notion that mailings which are too remote from a fraudulent scheme will not support a mail fraud charge....
Thus, Tarnopol determined on the particular facts presented that the purpose of the mailings was not closely connected to the fraudulent scheme. The case did not hold that a “routine business mailing” which is closely bound with the scheme cannot support a mail fraud charge. Similarly, the cases relied upon by Senior Judge Maris did not create a per se defense for business mailings, but looked to whether a mailing was too remote from the fraud.
