UNITED STATES of America, Appellee, v. Rudolph SEDOVIC a/k/a Rudy Sedovic, Appellant.
No. 80-2080.
United States Court of Appeals, Eighth Circuit.
Decided June 7, 1982.
III.
Defendant contends that the district court erred and abused its discretion in denying his motion for severance. In pretrial motions, defendant claimed that certain coconspirators would present exculpatory statements and would give such testimony only at a separate trial. No other record was made. This court has ruled that there must be independent support in the record for such an assertion. United States v. Graham, 548 F.2d 1302, 1311–12 (8th Cir. 1977).
[7] Defendant has a heavy burden of demonstrating that the trial court abused its discretion. United States v. Anthony, 565 F.2d 533, 538 (8th Cir. 1977). Defendant primarily relies on United States v. Seifert, 648 F.2d 557 (8th Cir. 1980), and United States v. Vigil, 561 F.2d 1316 (9th Cir. 1977). In Seifert defendant‘s counsel made an offer of proof specifically outlining the expected testimony of the coconspirator, Ehrlich, that would exculpate defendant, and the offer of proof was supported by Ehrlich‘s affidavit. In Vigil an affidavit of defendant‘s counsel filed with the motion to sever specified that the coconspirator Vigil would exculpate Baca, and at trial, when told that Vigil would not testify, defendant‘s counsel sought to make an offer of proof as to Vigil‘s testimony. The offer was denied, defendant was forced to call Vigil to the stand, and Vigil refused to give testimony that would exculpate defendant and incriminate himself. The defendants in Seifert and Vigil presented a specific showing of evidence that would exculpate defendant. Defendant makes no such specific showing.
Defendant has shown no abuse of the trial court‘s discretion in its order denying severance.
IV.
Defendant objects to the court‘s permitting the witness Roberds to testify, claiming that the government had not informed him that she would be a witness. The government had informed the court and defense counsel that Roberds had viewed a photo array. The rule in this circuit has been that the government is not required in noncapital cases to disclose names and addresses of its witnesses. United States v. Little, 562 F.2d 578, 581 (8th Cir. 1977). Defendant demonstrates no error in this respect.
Piatt‘s claims of error have been carefully considered, and found to be without merit, and the judgment is affirmed.
Robert D. Kingsland, U. S. Atty., Edward L. Dowd, Jr., Asst. U. S. Atty., Thomas E. Dittmeier, U. S. Atty., St. Louis, Mo., for appellee.
Before HEANEY, HENLEY* and MCMILLIAN, Circuit Judges.
MCMILLIAN, Circuit Judge.
Rudolph Sedovic appeals from a final judgment entered in the District Court1 for the Eastern District of Missouri after a bench trial finding him guilty of three counts of mail fraud in violation of
Appellant was the chief auditor in the License Collector‘s Office of the City of St. Louis from 1975 through mid-1979. In July, 1979, appellant was indicted for mail fraud. The indictment charged appellant
I. Electronic Surveillance
Appellant first argues that the district court erred in admitting into evidence thirteen recorded conversations obtained as a result of two court-authorized periods of electronic surveillance of the License Collector‘s Office during the late spring of 1979. Having received prior authorization from the Assistant Attorney General, the government requested the first electronic surveillance order on April 25, 1979. The government‘s application was supported by the detailed affidavit of FBI Special Agent Martin J. Weber. The authorizing district judge2 found there was probable cause to believe that appellant, others named in the application, and persons unknown in the License Collector‘s Office had committed and were committing offenses involving extortion by public officials, bribery, racketeering, mail fraud, obstruction of justice, and conspiracy to commit those offenses. The district court then granted the government‘s application for twenty days of electronic surveillance, with periodic progress reports. On May 21, 1979, upon application by the government, the district judge authorized continued electronic surveillance for an additional thirty days, subject to periodic progress reports.
Appellant argues that electronic surveillance was unlawfully used to investigate an offense—mail fraud—not specifically listed in
Title III of the Omnibus Crime Control and Safe Streets Act of 1968,
Appellant correctly argues that mail fraud,
Section 2516, as amended in 1970, includes within the list of specific offenses for which interception of wire [and oral] communications is permitted, the activities penalized by
Thus, [the district court‘s] order permitted interceptions specifically authorized by section 2516—interceptions of conversations relating to mail fraud racketeering activities violative of
United States v. Daly, supra, 535 F.2d at 439.
In addition, we note that appellant does not challenge the district court‘s finding of probable cause to believe that appellant and others had committed and were committing offenses involving extortion, bribery, racketeering, mail fraud, obstruction of justice, and conspiracy. We have reviewed the government‘s electronic surveillance application and supporting affidavit and agree with the district court‘s finding of probable cause. In particular we note that appellant was convicted of participation in precisely the mail fraud scheme involving the handling of city business licenses by the License Collector‘s Office described in the application and supporting affidavit. In fact, at trial three specific instances of mail fraud were proven.
In both Daly and the present case evidence obtained as a result of electronic surveillance authorized to investigate racketeering activity involving mail fraud was introduced in a prosecution for mail fraud. See id. at 440 n.6. We do not find Daly distinguishable from the present case on the ground that in Daly, in addition to being charged with mail fraud, the defendant had earlier “pleaded guilty to participating in a pattern of racketeering under
II. Use of Mails as Integral Part of Scheme
Appellant next argues that the district court erred in finding that the use of the mails was an integral part of the scheme or artifice. Appellant contends that because the mailings upon which the government relies occurred after the alleged receipt of payment, the mails were not used in furtherance of the scheme but were merely collateral or incidental to it. In support of his argument appellant relies upon United States v. Edwards, 458 F.2d 875, 880-83 (5th Cir.), cert. denied, 409 U.S. 891, 93 S.Ct. 118, 34 L.Ed.2d 148 (1972), which held that a clear and definite relationship must exist between the fraudulent scheme and the use of the mails.5
To establish a violation of
fraud and the mailing of a letter or other instrument for the purpose of executing the scheme. Although “it is not necessary that the scheme contemplate the use of the mails as an essential element,” it is necessary for the mailings to be “sufficiently closely related to [appellant‘s] scheme to bring his conduct within the statute.” If the appellant‘s scheme reached fruition prior to the mailings as did the respondent‘s in United States v. Maze, 414 U.S. 395, 402, 94 S.Ct. 645, 649, 38 L.Ed.2d 603 (1974), the mailings were not sufficiently related to the scheme to bring his conduct within the statute. United States v. Cooper, 596 F.2d 327, 329 (8th Cir. 1979) (citations omitted).
Appellant‘s argument fails because, although he had been paid prior to the mailing of the bogus business licenses, the scheme was not complete until the merchants or manufacturers were in receipt of their licenses. United States v. Edwards, supra, 458 F.2d at 883-85, is distinguishable because the transactions in that case did not involve an ongoing series of fraudulent representation on the part of both the dispatcher and the receiver of the mails.
The Eighth Circuit has said that the federal mail fraud statute is to be read “expansively,” United States v. Cady, 567 F.2d 771, 775 (8th Cir. 1977), cert. denied, 435 U.S. 944, 98 S.Ct. 1526, 55 L.Ed.2d 541 (1978); United States v. McNeive, 536 F.2d 1245, 1247 (8th Cir. 1976). In the case at bar the evidence showed that the use of the mail was an integral part of the fraudulent scheme to obtain business licenses at an illicitly reduced rate. The use of the mail, through which payments were received and business licenses were dispatched, was a critical step in the process of issuing business licenses.
We believe the district court correctly found7 the mailings charged were used for the purpose of executing the fraudulent scheme.
III. Appellant Devised the Scheme to Defraud
As his final argument appellant asserts that the district court‘s finding that appellant devised the scheme to defraud was not supported by sufficient evidence. We disagree.
In addition to establishing the existence of a scheme to defraud, it is also necessary that the government prove that the defendant was a part of that scheme. United States v. Pearlstein, 576 F.2d 531, 534 (3d Cir. 1978). Under the mail fraud statute, proof is required of specific intent, United States v. Payne, 474 F.2d 603, 604 (9th Cir. 1973); however, “[i]t is not necessary for the government to prove that [the defendant] was one of those who originally devised the scheme. When [the defendant] joined in the ... misrepresentations and deceptions ... he brought himself within the provisions of the statute.” Reistroffer v. United States, 258 F.2d 379, 395 (8th Cir. 1958), cert. denied, 358 U.S. 927, 79 S.Ct. 313, 3 L.Ed.2d 301 (1959).
In this case it is conceded in appellant‘s brief “that a scheme existed.” While the evidence does not establish that appel-
IV. Conclusion
We conclude that the district court did not err in (1) admitting into evidence the results of the electronic surveillance, (2) finding that the mails were an integral part of appellant‘s fraudulent scheme, and (3) finding that appellant “devised” the scheme to defraud as required by
Accordingly, the judgment of the district court is affirmed.
HEANEY, Circuit Judge, concurring.
I write separately simply to express my concern that the government‘s application for an order authorizing electronic surveillance and supporting affidavits do not establish probable cause to believe that the appellants had violated and were violating RICO. The application and affidavits allege a pattern of racketeering involving mail fraud conducted through the License Collector‘s Office of the City of St. Louis. This Court, in affirming the district court‘s finding of probable cause, implicitly assumes that the License Collector‘s Office is an “enterprise” within the meaning of RICO‘s prohibition against conducting the affairs of an enterprise through a pattern of racketeering. I disagree with this assumption because, in my view, governmental entities are not “enterprises” under RICO. I agree with Judge Peck, writing for the Sixth Circuit in United States v. Thompson, 669 F.2d 1143, 1149 (6th Cir. 1982), that it is “a perversion of Congress‘s intent to continue to allow the potent weapons created in RICO to be lifted casually against every instance of venality in state and local governments.”
As Judge Peck notes, passage of the Organized Crime Control Act of 1970,
Another section of the bill which merits special attention, Mr. President, is title IX.
Recent studies of the phenomenon of organized crime, including that of the National Crime Commission, have identified its alarming expansion into the field of legitimate business as a major threat to our institutions. This penetration of legitimate business by organized crime poses two distinct but related dangers:
First, the economic strength of the underlying illegal operations of organized crime is perpetuated and made more profitable if tainted proceeds can be safely invested in legitimate enterprises, even if those enterprises are operated in a lawful manner.
Second, the free channels of trade are threatened by organized crime‘s propensity to obtain for itself monopoly control of its areas by whatever means are available, including brutal and strongarm tactics.
The techniques and methods used in such infiltration of legitimate business enterprises are many and varied. A few case histories will demonstrate how easily a business can fall captive to its awesome power.
*
*
*
*
*
*
The legislative proposals contained in title IX of this act, entitled “Racketeer Influenced and Corrupt Organizations,” constitute a carefully structured program which can drastically curtail—and eventually eradicate—the vast expansion of organized crime‘s economic power which operates outside the rules of fair competition of the American marketplace. Broadly speaking, this title would create strict criminal penalties for using the proceeds of racketeering activity characteristic of organized crime to acquire an interest in businesses engaged in interstate commerce, or to acquire or operate such businesses by racketeering methods.
116 Cong.Rec. 606-607, quoted in United States v. Thompson, supra, 669 F.2d at 1147-1148.
Judge Peck further notes the anomalous result of applying the Act‘s remedial provisions to violations involving governmental entities. The Act empowers the court, inter alia, to “[prohibit] any person from engaging in the same type of endeavor as the enterprise engaged in” and to “[order] dissolution or reorganization of any enterprise.”
I am aware that this Circuit has held to the contrary in United States v. Clark, 646 F.2d 1259, 1264 (8th Cir. 1981). I find the reasoning of the Sixth Circuit‘s Thompson decision more persuasive, however. The Clark Court concludes that because the pertinent statutory language does not distinguish between public and private “legal entities,” and because Congress failed to use terms such as “private,” “business” or “commercial” enterprises, the statute necessarily applies to governmental entities. In my view, this approach is overly simplistic and results in an extension of the Act beyond its intended scope.
Although I do not agree with the majority that probable cause existed to believe that RICO violations were being committed, appellant Sedovic did not challenge that probable cause finding in the court below. Accordingly, I join in the Court‘s opinion upholding the use of mail fraud evidence obtained as a result of investigating the alleged racketeering offenses.
Notes
In enacting
Congress intended that judicial approval of the interception of evidence relating to unauthorized offenses might retroactively be granted pursuant to
the original order was lawfully obtained, that it was sought in good faith and not as a subterfuge search, and that the communication was in fact incidentally intercepted during the course of a lawfully executed order.
United States v. Masciarelli, 558 F.2d 1064, 1066-68 (2d Cir. 1977) (citations and footnotes omitted), citing S.Rep.No.90-1097, 90th Cong., 2d Sess., reprinted in [1968] U.S.Code Cong. & Ad.News 2112, 2189. See also United States v. Cox, 449 F.2d 679, 683-87 (10th Cir. 1971), cert. denied, 406 U.S. 934, 92 S.Ct. 1783, 32 L.Ed.2d 136 (1972); United States v. Tortorello, 342 F.Supp. 1029, 1038 (S.D.N.Y.1972), aff‘d, 480 F.2d 764 (2d Cir.), cert. denied, 414 U.S. 866, 94 S.Ct. 63, 38 L.Ed.2d 86 (1973); see generally J. Carr, The Law of Electronic Surveillance § 5.09-.12 (1977).
Whoever, having devised or intending to devise any scheme or artifice to defraud, or for
[t]he [three] mailings ... were an integral part of the defendant‘s scheme to defraud since they each represented a critical step in the business licensing process. Without the mailing of a tax payment or the license itself, the objective of securing a business license at an illicitly reduced tax rate, with defendant‘s participation, could not have been achieved. United States v. Sedovic, 500 F.Supp. at 518 (E.D.Mo.1980).
