USA v. Isaiah Meme, No. 19-11394 (11th Cir. 2020)

Annotate this Case
Download PDF
Case: 19-11394 Date Filed: 03/13/2020 Page: 1 of 12 [DO NOT PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT ________________________ No. 19-11394 Non-Argument Calendar ________________________ D.C. Docket No. 1:18-cr-20760-CMA-1 UNITED STATES OF AMERICA, Plaintiff–Appellee, versus ISAIAH MEME, Defendant–Appellant. ________________________ Appeal from the United States District Court for the Southern District of Florida ________________________ (March 13, 2020) Before BRANCH, LUCK, and ANDERSON, Circuit Judges. PER CURIAM: Case: 19-11394 Date Filed: 03/13/2020 Page: 2 of 12 Isaiah Meme was convicted of access device fraud, in violation of 18 U.S.C. § 1029(a)(2); aggravated identity theft, in violation of 18 U.S.C. § 1028A(a)(1); and possession of 15 or more unauthorized access devices, in violation of 18 U.S.C. § 1029(a)(3). He appeals these convictions. On appeal, Meme argues that there was insufficient evidence to support his convictions. For the reasons that follow, we affirm Meme’s convictions. BACKGROUND Because Meme appeals his conviction, specifically arguing that the evidence was insufficient to support a conviction, we review the evidence that was presented at trial in some detail. Isaiah Meme was indicted on September 18, 2018, in a multiple-count indictment alleging 1 count of access device fraud, in violation of 18 U.S.C. §1029(a)(2) (Count 1); 6 counts of aggravated identity theft, in violation of 18 U.S.C. § 1028A(a)(1) (Counts 2–5, 7–8); and 1 count of possession of 15 or more unauthorized access devices, in violation of 18 U.S.C. § 1029(a)(3) (Count 6). On the second day of trial, the district court granted the government’s motion to dismiss Counts 2 and 3 on the grounds that Meme may have been a minor when the offenses were committed. Testimony at trial revealed the following. Robert Novakowski, an investigator with JPMorgan Chase Bank, was investigating compromised debit cards following customer complaints. Novakowski received a list of compromised 2 Case: 19-11394 Date Filed: 03/13/2020 Page: 3 of 12 debit cards and a list of transactions for those cards and obtained video surveillance of the person making the transactions. He testified that images captured on driveup ATM cameras showed that Meme was making transactions with cards belonging to other people and with counterfeit payment cards. Some of those images showed Meme making transactions while driving a black Ford Mustang with a bumper sticker. Novakowski sought the assistance of law enforcement in identifying the person in the videos and images, and U.S. Secret Service Agent Sterling Posten identified that person as Meme. Novakowski conceded that he could not see the eye shape or eye color of the person in the images, but that the person had the same face as Meme and that he independently reviewed all photos and videos and, in so doing, was able to identify Meme as the person making the transactions. Secret Service Agent Greg Narano testified that the Secret Service had obtained surveillance of people conducting unauthorized ATM withdrawals, one of whom was Meme. Accordingly, the Secret Service set up surveillance on several ATMs in an attempt to locate a black Mustang that was connected to some of these unauthorized withdrawals. While conducting surveillance, Narano saw a person driving a black Mustang with a bumper sticker use an ATM. Narano maintained surveillance, identified the person in the car as Meme, and took several photos of him. He followed Meme to Meme’s father’s house and continued his surveillance. 3 Case: 19-11394 Date Filed: 03/13/2020 Page: 4 of 12 Narano conceded in cross-examination that the Mustang was not registered in Meme’s name, that Meme’s father owned the house, and that, based on his surveillance at the ATM, he was unable to determine the build of the person in the car or whether that person had facial hair. On redirect, he emphasized that he was able to identify the person in the Mustang as Meme because he had an unobstructed view of Meme’s face at one point. Secret Service Agent Ken Adams testified to the following. He, like Narano, was assigned to conduct surveillance at a Chase Bank ATM, saw a black Mustang pull up to the ATM, watched the driver commit a fraudulent transaction, identified the driver as Meme, and followed Meme to Meme’s father’s house. He also participated in Meme’s arrest, after which he recovered two cell phones from the Mustang. On cross-examination, Adams conceded that there were no debit cards, credit cards, or large amounts of cash in the car when Meme was arrested. Agent Posten then testified. He executed a search warrant of Meme’s father’s house and in one bedroom, recovered five plastic cards, a laptop, a firearm-training certificate in Meme’s name, several pieces of unopened mail, and high school textbooks. Accordingly, Posten concluded that the bedroom belonged to Meme. In a room that he concluded belonged to Meme’s brother, he recovered a plastic card, a personal check not belonging to anybody living in the house, a 4 Case: 19-11394 Date Filed: 03/13/2020 Page: 5 of 12 money order, and a re-encoded plastic card.1 In the living room of the house, Posten found a vehicle title belonging to Meme and traffic citations issued to Meme. He also found other pieces of mail, like bank records, that did not belong to anyone in the house—which he concluded was an indication of fraud taking place in the house. Posten conceded that the Mustang was a rental vehicle that was not rented by Meme; that according to the Florida Department of Highway Safety and Motor Vehicles, Meme did not live with his father; and that none of the cards in Meme’s bedroom had been re-encoded. Secret Service Agents Marcos Morales and Allen Thomasson testified that they had analyzed the phones recovered during Meme’s arrest. Morales discovered that one of the phones was registered to a user identified as “MasonM1267.” Thomasson’s analysis of the text messages in the phones revealed that one of the phones had received text messages that identified the recipient (and thus, the phone owner) as Meme. He also reviewed the email account on the phone and discovered several emails received by an account belonging to “MasonM1267” and several emails containing credit and debit card 1 In this context, re-encoding a plastic card serves to change the data on the card—in other words, from what source the card pulled funds or registered transactions—so that it no longer matched the information embossed on the card, e.g., the name or displayed number. See, e.g., United States v. Cruz, 713 F.3d 600, 608 (11th Cir. 2013) (discussing re-encoding credit and debit cards). Reencoding cards is frequently charged as a violation of section 1029(a)(3), which prohibits the knowing, and with intent to defraud, possession of “devices which are counterfeit or unauthorized access devices.” E.g., United States v. Grimon, 923 F.3d 1302, 1306–1307 (11th Cir. 2019) (citing 18 U.S.C. § 1029(a)(3). 5 Case: 19-11394 Date Filed: 03/13/2020 Page: 6 of 12 numbers. Thomasson also found data on the phone showing that the phone’s owner had visited commercial background search websites (which are frequently used for identity theft and fraud) and disposable email service websites. On the other phone, Thomasson also found information that identified Meme as the account owner—the phone had sent a picture of Meme’s driver’s license and the received texts referred to the phone’s owner as Meme. He also discovered pictures of the Mustang, email accounts registered to “MasonM1267,” debit card numbers and personal identification numbers, and correspondence relating to purchasing debit card numbers and PINs on the phone, and that the phone had visited commercial background search websites and websites for selling stolen card numbers. Thomasson also testified that he analyzed the laptop recovered from what Posten had identified as Meme’s room. He discovered that the computer’s user account was “MasonM1627.” He also found credit card and debit card numbers, the card-owners’ personal information, software used to read and encode magnetic strips in cards, software used to read and encode card microchips, bank identification numbers, and bank routing numbers on the computer. All told, Thomasson estimated that hundreds of individuals’ personal information and 120 different debit and credit card numbers were on Meme’s laptop. He also discovered that the user of the laptop had visited websites selling credit card 6 Case: 19-11394 Date Filed: 03/13/2020 Page: 7 of 12 numbers and commercial background search websites. On cross-examination, he conceded that he could not tell whether someone other than Meme had used the laptop and phones. After the government rested its case, Meme moved for a judgment of acquittal. He argued that the government had failed to prove the existence of some of the victims named in the indictment, venue was improper, and some of the alleged criminal acts occurred while he was a minor. The district court denied Meme’s motion. Meme’s case solely consisted of calling his stepmother, Willaine Amedee, who testified that Meme had never lived in his father’s house or kept any belongings in the house. Meme rested, and then renewed his motion for a judgment of acquittal based on insufficient evidence. The district court again denied his motion. The jury found Meme guilty of Counts 1 and 4–8. The district court sentenced Meme to a 39-month prison term, which consisted of 15-month concurrent sentences on Counts 1 and 6 and a 24-month sentence on Counts 4–5 and 7–8. Meme timely appealed to us. ANALYSIS On appeal, Meme argues that the evidence was insufficient to support his conviction. We review the sufficiency of the evidence de novo, “viewing the 7 Case: 19-11394 Date Filed: 03/13/2020 Page: 8 of 12 evidence in the light most favorable to the government and drawing all reasonable inferences in favor of the verdict.” United States v. Schier, 438 F.3d 1104, 1107 (11th Cir. 2006). The district court’s denial of “motions for a judgment of acquittal will be upheld if a reasonable trier of fact could conclude that the evidence establishes the defendant’s guilt beyond a reasonable doubt.” United States v. Rodriguez, 218 F.3d 1243, 1244 (11th Cir. 2000). “[T]he issue is not whether a jury reasonably could have acquitted but whether it reasonably could have found guilt beyond a reasonable doubt,” so we will not reverse a conviction solely because the defendant “put forth a reasonable hypothesis of innocence” at trial. United States v. Campo, 840 F.3d 1249, 1258 (11th Cir. 2016) (quotation omitted). We are bound by a jury’s “rejection of the inferences raised by the defendant.” United States v. Hernandez, 433 F.3d 1328, 1334–35 (11th Cir. 2005). Furthermore, we consider all evidence produced at trial against the defendant in evaluating his claim of insufficient evidence. United States v. Thomas, 8 F.3d 1552, 1558 n.12 (11th Cir. 1993). An individual is guilty of access device fraud when he “knowingly and with intent to defraud traffics in or uses one or more unauthorized access devices during any one-year period, and by such conduct obtains anything of value aggregating $1,000 or more during that period.” 18 U.S.C. § 1029(a)(2). An individual is guilty of possession of 15 or more unauthorized access devices if he possesses such 8 Case: 19-11394 Date Filed: 03/13/2020 Page: 9 of 12 devices knowingly and with intent to defraud. Id. § 1029(a)(3). An individual is guilty of aggravated identity theft when he “knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person” during a felony violation of, among other things, “any provision contained in this chapter” relating to fraud. Id. §§ 1028A(a)(1), (c)(4). An “‘access device’ means any card, . . . account number, electronic serial number, . . . personal identification number, . . . or other means of account access that can be used, alone or in conjunction with another access device, to obtain money . . . or that can be used to initiate a transfer of funds.” Id. § 1029(e)(1). An “‘unauthorized access’ device means any access device that is lost, stolen, . . . or obtained with intent to defraud.” Id. § 1029(e)(3). We read Meme’s arguments on appeal as essentially arguing for a more favorable inference of the facts. He argues that fraud was taking place at his father’s house (but he was not a part of it), that the Secret Service agents could not identify who used the phones or computer, that the ATM surveillance photos were poor-quality and did not lend themselves to identification, that no one described the physical characteristics of the person who was using the access devices, that Novakowski’s identification of him was tainted, and that no counterfeit access devices were found in his “actual or constructive possession.” These arguments are unavailing. These arguments echo what Meme argued at trial—both to the district court and to the jury in his arguments for acquittal— 9 Case: 19-11394 Date Filed: 03/13/2020 Page: 10 of 12 and the jury was entitled to reject those arguments and draw a different inference. We are not able to revisit the inference that the jury drew. Hernandez, 433 F.3d at 1334–35. In any event, we conclude that the evidence at trial was sufficient to support Meme’s conviction for two reasons: (1) the phone and laptop evidence showed that Meme was committing access device fraud and (2) Meme was identified as the person committing access device fraud. We address each in turn. First, the testimony at trial clearly showed—although somewhat circumstantially—that Meme was committing access device fraud. With regard to the phones, the agents testified that Meme visited commercial background search websites and websites where he could purchase stolen card numbers, had stolen card numbers stored on his phones, and had correspondence relating to his purchase thereof. The agents found similar evidence on Meme’s laptop. Meme does not, and cannot, seriously contest the evidence found on both devices—and so he instead suggests that other people were using the devices. We wholly reject this argument, because it requires us to substitute the jury’s reasonable inference based on the evidence presented at trial for an unreasonable inference that happens to be more favorable to Meme. We think it is clear that the devices both belonged to, and were used by, Meme. Contrary to Meme’s argument, the phones were found in his “actual or constructive possession,” i.e., the car he was driving at the time he was arrested. And while the laptop was found 10 Case: 19-11394 Date Filed: 03/13/2020 Page: 11 of 12 in a room that Agent Posten had merely identified as Meme’s room, the evidence certainly supports an inference that the room was Meme’s. His argument that he did not live in the house, and thus that the room was not his, is strongly contradicted by the extent to which his belongings were found both in the room and elsewhere in the house. It is not likely that Meme’s firearm-training certificate, vehicle title, and traffic citations would be in a house where he did not live. Finally, we find it significant that the user account on Meme’s laptop was identical to the username of the email accounts on Meme’s phones. Second, Meme was identified as the person committing identity fraud. Though it is true that Novakowski’s identification was at least partially predicated on Agent Posten’s suggestion, we note that he testified that he independently reviewed all of the videos and images of the fraudulent ATM transactions and he provided an in-court identification of Meme. As we have explained previously, “[a]n in-court identification, even if preceded by a suggestive out-of-court identification procedure, is nevertheless admissible if the in-court identification has an independent source.” United States v. Cannington, 729 F.2d 702, 711 (11th Cir. 1984). But even if we concluded that Novakowski’s identification of Meme was impermissible, we note that there are two additional—and more persuasive— witnesses who identified Meme. Both Agents Adams and Narano identified Meme 11 Case: 19-11394 Date Filed: 03/13/2020 Page: 12 of 12 as the person in the black Mustang who made fraudulent transactions at an ATM. Their identification is significant—both were surveilling him and followed him to his father’s house, and Adams participated in Meme’s arrest. Accordingly, we conclude that the evidence was sufficient to support Meme’s conviction. The evidence as to the devices—both the phones in Meme’s constructive possession at the time of his arrest and the laptop that was clearly Meme’s—is persuasive evidence of Meme’s fraud. And the identification of Meme, especially the eyewitness testimony of Secret Service agents who saw Meme committing access device fraud, is even more persuasive. We reject Meme’s arguments to the contrary. AFFIRMED. 12

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.