United States v. Segura, No. 08-4067 (10th Cir. 2009)

Annotate this Case
Download PDF
FILED United States Court of Appeals Tenth Circuit UNITED STATES COURT OF APPEALS April 1, 2009 TENTH CIRCUIT Elisabeth A. Shumaker Clerk of Court UNITED STATES OF AMERICA, Plaintiff-Appellee, v. No. 08-4067 (D.C. No. 2:05-CR-00895-DAK-9) (D. Utah) JAVIER SEGURA, Defendant-Appellant. ORDER AND JUDGMENT * Before BRISCOE, EBEL, and GORSUCH, Circuit Judges. Javier Segura entered a conditional plea of guilty to conspiracy to distribute methamphetamine in violation of 21 U.S.C. § 841(a)(1) and 21 U.S.C. § 846. The district court sentenced Segura to 70 months imprisonment followed by 60 months supervised release. Segura appeals the district court s denial of his motion to suppress evidence from two wiretaps. We have jurisdiction pursuant to * This order and judgment is not binding precedent, except under the doctrines of law of the case, res judicata, and collateral estoppel. It may be cited, however, for its persuasive value consistent with Fed. R. App. P. 32.1 and 10th Cir. R. 32.1. 28 U.S.C. § 1291, and affirm. I During an investigation of a drug trafficking operation, a special agent with the Drug Enforcement Administration ( DEA ) submitted affidavits in support of applications for orders authorizing the interception of wire communications, commonly known as wiretapping. Two affidavits are presently at issue. The agent submitted the first on August 22, 2005, and the second on October 24, 2005. Each affidavit is approximately fifty pages in length and provides details of: (1) the agent s professional experience; (2) the telephone number for the intercepted communications; (3) the targeted individuals of the investigation; (4) the objectives of the investigation and the intercepted communications; (5) prior applications for wiretaps; (6) the history of the investigation; and (7) the requested duration of the wiretaps. Additionally, each affidavit contains a section that addresses investigative techniques that have been tried, or reasonably appear likely to fail if tried, or are likely to be dangerous to employ. Each affidavit concludes with a discussion of efforts that will be employed to minimize the monitoring of communications unrelated to the investigation. Based upon the representations in the affidavits, a district court judge authorized both of the requested wiretaps. As a result of the wiretaps, Segura and eighteen co-defendants were indicted. The United States charged Segura with one count of conspiring to 2 possess methamphetamine with intent to distribute and eight counts of possession of methamphetamine with intent to distribute. Segura moved to suppress evidence obtained from the August 22, 2005 and October 24, 2005 wiretaps. A magistrate judge issued a Report and Recommendation denying the motion. Segura objected. Over this objection, the district court adopted the Report and Recommendation. Segura entered a conditional guilty plea to the conspiracy charge, and the United States dismissed the remaining counts. After the district court sentenced Segura, he timely appealed the denial of his motion to suppress. II Title 18 U.S.C. § 2518 establishes the procedure and requirements for obtaining a wiretap. Segura cites two requirements of this statute, the necessity requirement and the minimization requirement, as the basis for his motion to suppress. A. Necessity The necessity requirement mandates that each application for a wiretap shall include a full and complete statement as to whether or not other investigative procedures have been tried and failed or why they reasonably appear to be unlikely to succeed if tried or to be too dangerous. 18 U.S.C. 2518(1)(c); United States v. Zapata, 546 F.3d 1179, 1185 86 (10th Cir. 2008) (identifying this rule as the necessity requirement and defining its purpose as to ensure that wiretapping . . . is not used in situations where traditional investigative 3 techniques would be sufficient to expose the criminal activity ). After reviewing the wiretap application, the judge must determine whether normal investigative procedures have been tried and have failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous[.] 18 U.S.C. § 2518(3)(c). As a result of these two statutory provisions 18 U.S.C. § 2518(1)(c) and (3)(c) our standard of review for challenges to the necessity requirement is twopronged. Although we examine de novo whether a full and complete statement was submitted meeting section 2518(1)(c) s requirements, we review the conclusion that the wiretap [ ][was] necessary [under § 2518(3)(c)] in each situation for an abuse of discretion. United States v. Mitchell, 274 F.3d 1307, 1311 (10th Cir. 2001) (third alteration added). When reviewing de novo whether the government submitted a full and complete statement under 18 U.S.C. § 2518(1)(c) to satisfy the necessity requirement, we apply a common sense approach. United States v. VerdinGarcia, 516 F.3d 884, 890 (10th Cir. 2008) ( The necessity requirement is not to be treated hypertechnically. We expect the government to act in a common sense fashion . . . . (quotation omitted)). Accordingly, we consider all the facts and circumstances. Id. Although [t]he overall burden on the government is not great, id. (quoting United States v. Wilson, 484 F.3d 267, 281 (4th Cir. 2007)), generalities or conclusory statements are insufficient to support a wiretap application, United States v. Cline, 349 F.3d 1276, 1280 81 (10th Cir. 2003). 4 Once a judge authorizes a wiretap, we presume its validity and we place the burden on the defendant to prove its invalidity. Verdin-Garcia, 516 F.3d at 890 (citing United States v. Radcliff, 331 F.3d 1153, 1160 (10th Cir. 2003)). Consequently, we review the district court s conclusion that a wiretap was necessary for abuse of discretion. Zapata, 546 F.3d at 1185. For a judge to authorize the wiretap, the judge must determine, based on the submitted affidavit, that normal investigative procedures have been tried and have failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous[.] 18 U.S.C. § 2518(3)(c). This court has defined normal investigative procedures to include: (1) standard visual and aural surveillance; (2) questioning witnesses and participants, including through the use of grand juries ; (3) search warrants; (4) infiltration of criminal enterprises by undercover agents or confidential informants ; and (5) the use of pen registers and telephone tracing devices. Zapata, 546 F.3d at 1185 (citing United States v. Killingsworth, 117 F.3d 1159, 1163 (10th Cir. 1997)); Cline, 349 F.3d at 1280 (identifying pen registers and trap and trace devices as traditional [investigative] techniques ). To meet the necessity requirement, however, the government does not have to exhaust all other conceivable investigative procedures before resorting to wiretapping. Zapata, 546 F.3d at 1186 (quotation omitted). Segura argues that the district court abused its discretion by determining that a wiretap was necessary and further that the government s submissions failed 5 to meet the necessity requirement. Aplt. Br. at 6. Segura contends the government failed to demonstrate with specificity that the use of three normal investigative procedures standard visual and aural surveillance, search warrants, and infiltration by undercover agents or informants have been tried and failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous. Aplt. Br. at 9 (citing United States v. Small, 423 F.3d 1164, 1172 (10th Cir. 2005) (quoting 18 U.S.C. § 2518(3)(c))). Segura also contends that the submitted affidavits discussions of these techniques rely on generalities and conclusory statements that could apply to every member of every alleged drug conspiracy. Aplt. Br. at 10. After reviewing the submitted affidavits, we disagree. In contrast to Segura s assertions, the affidavits provide extensive details of the investigation techniques utilized and why they have failed or were inadequate in this case. We address individually the investigative techniques that Segura challenges. 1. Standard Visual and Aural Surveillance Segura argues that the affidavits are insufficient because the affidavits statements Physical surveillance of the subjects of this investigation . . . is unlikely to provide sufficient further evidence . . . and much of the illegal activity associated with this organization takes place inside locations which are o[u]t of view of law enforcement surveillance efforts . . . are general and conclusory. Aplt. Br. at 10. 6 First, we note that the description of activity in this investigation occurring indoors is neither general, nor conclusory. See Zapata, 546 F.3d at 1187 ( [B]ecause members of the organization were . . . more thoroughly concealing their activities, [the investigating agent] explained that extensive surveillance . . . [was] unlikely to produce information . . . . ). Second, Segura s argument ignores several other details provided in the affidavits explanation for why standard surveillance was insufficient for this investigation s objectives. Some of these details include: (1) indications by the target of the investigation that he is aware of police surveillance, including his pointing out police vehicles to the affiant and moving locations of transactions at the last minute; (2) difficulties in following the target of the investigation because he uses a variety of vehicles and switches vehicles during a drug transaction; and (3) difficulty in even determining where the target of the investigation is living on a daily basis. These facts are similar to the facts of Verdin-Garcia. In Verdin-Garcia, we noted that the affidavits: describe how the subjects became evasive under surveillance, and note that continued blanket surveillance would likely compromise the investigation . . . [and] explain that visual surveillance, however successful, cannot do much to establish the relationships between the investigation s subjects, the structure of their organization, the purposes of meetings, or the sources of their drug supply. 516 F.3d at 890. As in Verdin-Garcia, we conclude that Segura has shown no deficiency in the government s proffered rationale for needing wiretaps when 7 traditional surveillance was insufficient. Id. at 890 91; see also Zapata, 546 F.3d at 1186 ( Agent . . . stated that members of the organization were extremely surveillance conscious . . . . ). 2. Search Warrants Segura argues that the government has failed to adequately demonstrate with specificity that the use of search warrants has failed. Aplt. Br. at 11. This argument attempts to relegate the affidavits discussion of the use of search warrants to one sentence. Here, the only sentence Segura referenced from the affidavits is: Execution of any search warrants prior to arrest would inevitably tip-off the targets of this investigation and bring it to a premature close. Aplt. Br. at 11. We have considered such descriptions relevant in determining whether the government s submissions met the necessity requirement. See Verdin-Garcia, 516 F.3d at 891 ( Searches at these locations would alert the target subjects to the government s investigation and cause them to flee . . . and/or drastically change their operations. (emphasis and quotation omitted)). Segura omits other statements in the affidavits that explain why the use of search warrants would be an insufficient investigative technique in this case. The affidavits include additional details that address the uncertainty about the location of the narcotics and the transactions, and the need to intercept communications to determine the various locations of the narcotics to allow for the execution of simultaneous search warrants. In prior cases, we have held similar assertions 8 regarding the use of search warrants to be sufficient to meet the necessity requirement. E.g., Veradin-Garcia, 516 F.3d at 891; Cline, 349 F.3d at 1283 ( While [search warrants] had resulted in the seizure of drugs and methamphetamine laboratories and proceeds, they had failed to uncover the scope of the operations, or identify the sources of the precursor chemicals, the methods of distribution, and other members of the conspiracy. ); Garcia, 232 F.3d at 1314 ( The affidavit also indicates that further search warrants would not reveal the full extent of [the target s] activities or his suppliers. ). 3. Infiltration by Undercover Agents or Confidential Informants As seen in his prior arguments concerning the adequacy of the affidavits at issue, Segura focuses upon a single statement in the affidavits discussion of infiltration of the target organization by undercover agents or confidential informants. While he acknowledges that the affidavits contain broader descriptions, Segura argues that the affidavits only rely on the general statement that individuals involved in narcotic distribution try to protect themselves by not disclosing the details of their business to low-level associates and outsiders. Aplt. Br. at 13. The affidavits in fact provide significant details about the possibility of infiltrating the target organization. The affidavits indicate that the target has declined to make larger purchases, maintained a secretive attitude, not discussed the source of his supply, and limited the involvement of other conspirators in the 9 undercover drug sales. These additional details are sufficient to meet the necessity requirement regarding the ineffectiveness of infiltration of the criminal enterprise. E.g., Zapata, 546 F.3d at 1186 ( [The agent] stated that [the target] had demonstrated a reluctance to do business with unknown persons and that the organization consisted of close knit family members who tend to deal amongst themselves. (quotation omitted)); Cline, 349 F.3d at 1282 ( The affidavits adequately established that, due to the close-knit community, as well as the suspicious nature of those involved in the drug organization and the difficulty of introducing anyone new into it, the traditional investigative technique of informants had been tried but was unlikely to meet with further success. ); United States v. VanMeter, 278 F.3d 1156, 1164 (10th Cir. 2002) ( [B]ecause the cooperating informants were outside the circle of trusted conspirators, they could obtain only limited information. ); Garcia, 232 F.3d at 1315 ( We conclude that law enforcement officers had made reasonable attempts to use informants, but that further use of this technique or attempts to infiltrate the organization would be ineffective and potentially dangerous. ). Moreover, when considering infiltration of criminal enterprises by undercover agents or confidential informants, we have noted that under our common sense approach the inherent danger in any such infiltration is an important consideration. Veradin-Garcia, 516 F.3d at 891 92 ( In considering whether the government acted in a common sense fashion on this issue, we are 10 keenly aware that infiltration of a criminal organization is extremely dangerous and is used sparingly by most law enforcement agencies. (quotations and brackets omitted)). While not included in the discussion of other investigative techniques, we note that the affidavits describe the target of the investigation as paranoid, cautious, and highly aware of police activity around him. After reviewing the government s submissions de novo, we conclude that the government provided a full and complete statement that explained sufficiently why the wiretaps were necessary. Based on that conclusion and that the submitted affidavits gave reasons that corresponded to similar situations in our cases upholding the necessity of wiretaps we also conclude that the district court did not abuse its discretion in authorizing the wiretaps. B. Minimization Section 2518(5) states in pertinent part: Every order and extension thereof shall contain a provision that the authorization to intercept shall be executed as soon as practicable, shall be conducted in such a way as to minimize the interception of communications not otherwise subject to interception under this chapter, and must terminate upon attainment of the authorized objective, or in any event in thirty days. 18 U.S.C. § 2518(5) (emphasis added). This minimization requirement does not forbid the interception of all nonrelevant conversations, but rather instructs the agents to conduct the surveillance in such a manner as to minimize the interception of such conversations. United States v. Yarbrough, 527 F.3d 1092, 11 1097 (10th Cir. 2008) (quotations omitted). If a wiretap s execution does not conform to this minimization requirement, a defendant may move to suppress evidence obtained from the wiretap. Id. Segura appeals the district court s denial of his motion to suppress, which was based in part on the minimization requirement. On appeal from the denial of a motion to suppress evidence obtained pursuant to a wiretap, this court accepts the district court s factual findings unless clearly erroneous, reviews questions of law de novo, and views the evidence in the light most favorable to the government. Id. We also note that whether the wiretap was executed in accordance with the minimization requirement depends on the facts and circumstances of each case. Id. at 1097 98. Here, the orders authorizing the wiretaps included instructions to minimize the interception and disclosure of communications subject to interception. Nonetheless, Segura contends that sixteen of the calls monitored during the wiretaps should have been minimized as irrelevant. Segura identified the same sixteen calls during the magistrate judge s initial consideration of the motion to suppress. Segura presently argues that the district court improperly relied on the government s explanation of the minimization techniques used during the challenged wiretaps. The government explained that two minutes was provided to agents as a reasonable and permissible time period in which to initially monitor a call. Aplt. Br. at 15. Segura states that this blanket instruction . . . violates 12 the statute s minimization requirement. Aplt. Br. at 16. Segura also critiques the omission of this two-minute-limit instruction from the submitted affidavits. While the Supreme Court and this court have established a proper procedure for determining the reasonableness of governmental efforts to avoid monitoring non-pertinent calls and identified several factors to aid in this procedure, Yarbrough, 527 F.3d at 1098, such analysis is unnecessary to resolve Segura s present arguments. Segura contends that the government s two-minute instruction violates the minimization requirement. We disagree. [C]onsistent with Supreme Court and Tenth Circuit precedent, in analyzing the reasonableness of the government s minimization efforts, we exclude calls under two minutes. Yarbrough, 527 F.3d at 1098 (citing Scott v. United States, 436 U.S. 128, 140 (1978), for the statement agents can hardly be expected to know that [very short] calls are non pertinent prior to their termination and United States v. Willis, 890 F.2d 1099, 1102 (10th Cir. 1989), as an example of a court excluding from minimization analysis calls which lasted less than two minutes ). Segura s criticism that the two-minute instruction does not appear in the agent s affidavits is similarly baseless. The minimization requirement applies to the order authorizing the wiretap, not the application for a wiretap. 18 U.S.C. § 2518(5) (applying minimization to [e]very order ). The orders authorizing the present wiretaps contained the requisite instructions to minimize the interception and disclosure of communications not otherwise subject to interception. As 13 noted, our precedent establishes that the two-minute instruction complies with these instructions. Segura does not challenge the district court s factual findings regarding the minimization requirement. As regards Segura s legal challenge to the minimization requirement, we conclude the district court properly rejected this contention as well. III We affirm the district court s denial of Segura s motion to suppress evidence obtained from the wiretaps. Entered for the Court Mary Beck Briscoe Circuit Judge 14

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.