PEOPLE OF MI V PATRICK MICHAEL BASKIN JR

Annotate this Case
Download PDF
STATE OF MICHIGAN COURT OF APPEALS PEOPLE OF THE STATE OF MICHIGAN, UNPUBLISHED September 29, 2009 Plaintiff-Appellee, v No. 286878 Kent Circuit Court LC No. 08-001401-FH PATRICK MICHAEL BASKIN, JR., Defendant-Appellant. Before: Murphy, P.J., and Meter and Beckering, JJ. PER CURIAM. Defendant appeals as of right his jury-trial conviction for identity theft, MCL 445.65. We affirm. On December 7, 2007, defendant’s girlfriend, Julisa Thompson, with whom he has a minor child, was working as a seasonal cashier at a Sears department store. Thompson submitted a rapid credit card application for a Sears credit card at her cash register during her shift. She filled out the application using personal information given to her by defendant during a telephone conversation. The social security number that Thompson entered on the application did not belong to defendant. The application was subsequently approved for a credit card under the name of a woman unknown to either defendant or Thompson. A temporary shopping pass with a bar code allowing use of this account was then printed. Defendant later arrived at the store and picked out some merchandise with Thompson. They thereafter went to Thompson’s cash register in order to use the newly-opened credit account to purchase the goods. After Thompson scanned the bar code on the shopping pass and obtained purchase authorization over the telephone, the signature capture pad attached to the cash register activated. Defendant signed a name, which was not his own, on the pad in order to complete the transaction. He then tried to leave the store but was stopped by one of Sears’s loss prevention employees. Subsequently, defendant was interviewed by the loss prevention manager and a police officer. Both the manager and police officer testified at trial that defendant informed them that, before signing the signature capture pad, he saw it display a woman’s name. At that time, he asked Thompson what he should do. She told him to sign someone else’s name in order to finalize the purchase, which he did. The police officer also testified that defendant admitted knowing that the credit account was not his when he signed the pad in order to complete the transaction and purchase the goods. -1- Defendant argues that there was insufficient evidence to support a finding that he had the requisite intent to defraud or violate the law when he used another person’s personal identifying information to purchase the merchandise. We review claims of insufficient evidence de novo. People v Lueth, 253 Mich App 670, 680; 660 NW2d 322 (2002). When ascertaining whether sufficient evidence was presented at trial to support a conviction, this Court must view the evidence in a light most favorable to the prosecution and determine whether a rational trier of fact could find that the essential elements of the crime were proven beyond a reasonable doubt. People v Wolfe, 440 Mich 508, 515-516; 489 NW2d 748 (1992), amended 441 Mich 1201 (1992). This Court will not interfere with the trier of fact’s role of determining the weight of the evidence or the credibility of witnesses. Id. at 514-515. Circumstantial evidence and reasonable inferences that arise from such evidence can constitute satisfactory proof of the elements of the crime. People v Carines, 460 Mich 750, 757; 597 NW2d 130 (1999). All conflicts in the evidence must be resolved in favor of the prosecution. People v Terry, 224 Mich App 447, 452; 569 NW2d 641 (1997). “[B]ecause it can be difficult to prove a defendant's state of mind on issues such as knowledge and intent, minimal circumstantial evidence will suffice to establish the defendant's state of mind, which can be inferred from all the evidence presented.” People v Kanaan, 278 Mich App 594, 622; 751 NW2d 57 (2008). MCL 445.65 provides in pertinent part: (1) A person shall not do any of the following: (a) With intent to defraud or violate the law, use or attempt to use the personal identifying information of another person to do either of the following: (i) Obtain credit, goods, services, money, property, a vital record, a confidential telephone record, medical records or information, or employment.1 Sufficient evidence of intent to defraud has been found under circumstances where a defendant signed a business check without authorization. People v Susalla, 392 Mich 387, 393; 220 NW2d 405 (1974) (The defendant signed the check absent “authority to do so, therefore he acted with fraudulent intent.”). Sufficient evidence of intent to defraud also existed where a defendant signed the account holder’s name on a bank withdrawal slip without authorization. People v Van Horn, 127 Mich App 489; 339 NW2d 475 (1983). This case presents a similar scenario. It is undisputed that defendant signed someone else’s name, and not his own, in order to complete the transaction. The loss prevention manager and the police officer who interviewed defendant both testified that defendant said that he observed a female’s name on the signature capture pad, and he then signed a different female’s name (the name of Thompson’s cousin) as instructed by Thompson after he asked her what to do. Although Thompson testified that defendant did not ask her any questions about a woman’s name appearing on the signature 1 Defendant does not dispute that another person’s name, social security number, and credit card number constitute “personal identifying information.” MCL 445.63(o). -2- capture pad, and although there was a dispute at trial regarding whether the pad actually displayed the account holder’s name, we resolve all conflicts in the evidence in favor of the prosecution and do not interfere with the jury’s credibility determinations. The testimony of the loss prevention manager and police officer is sufficient to establish, beyond a reasonable doubt, that immediately before completing the purchase, defendant knew that the personal identifying information relative to the credit account did not pertain to him but to someone else. Because defendant nevertheless signed a fictitious name on the capture pad in order to complete the transaction, there was sufficient evidence to show that defendant knowingly used the credit card in order to obtain the merchandise that he picked out with Thompson. Only minimal circumstantial evidence was needed to establish that defendant possessed the intent to defraud. Kanaan, supra at 622. Accordingly, there was sufficient evidence presented to enable a reasonable jury to find, beyond a reasonable doubt, that defendant possessed the intent to defraud when he used the personal identifying information of another person in an attempt to obtain various merchandise. MCL 445.65.2 On the record before us, we conclude that there was also sufficient evidence to establish that defendant aided and abetted Thompson in committing identity theft. The jury was instructed in the alternative that defendant could be guilty as an aider and abettor in the identity theft. “Every person concerned in the commission of an offense, whether he directly commits the act constituting the offense or procures, counsels, aids, or abets in its commission may hereafter be prosecuted, indicted, tried and on conviction shall be punished as if he had directly committed such offense.” MCL 767.39. The elements necessary to support a conviction for aiding and abetting are: “‘(1) the crime charged was committed by the defendant or some other person, (2) the defendant performed acts or gave encouragement that assisted the commission of the crime, and (3) the defendant intended the commission of the crime or had knowledge that the principal intended its commission at the time that [the defendant] gave aid and encouragement.’” Carines, supra at 768 (citation omitted). Thompson pleaded guilty to identity theft. Defendant performed acts that assisted Thompson in committing identity theft where he provided his driver’s license and other information to apply for the credit card, knowingly provided a false social security number, helped select the merchandise, and where he assisted in completing the transaction by signing someone else’s name on the signature capture pad. The record provides sufficient evidence 2 The account was set up in the name of Yvette Didierjean, and Didierjean testified that she did not make the credit application. Defendant argues that there was no evidence that he had ever even heard the name Didierjean “much less that he had ever intended to commit identity theft against this particular individual.” MCL 445.65(1) does not require the prosecution to prove that a defendant knows the victim of the identity theft or that a defendant must intend to defraud a particular person. MCL 445.65(1) only requires proof of use of the personal identifying information “of another person” with intent to defraud, which would necessarily mean anyone other than the defendant himself, and the account here was not set up in defendant’s name. It matters not that defendant may not have personally known or intended to specifically defraud Didierjean in particular; it was sufficient that he knew that the personal identifying information of a person other than himself was being used in furtherance of a fraud. -3- showing that defendant intended the commission of the crime, and, given the evidence of the interactions and communications between defendant and Thompson, there was sufficient evidence that defendant had knowledge that Thompson intended to commit identity theft when he gave aid. Affirmed. /s/ William B. Murphy /s/ Patrick M. Meter /s/ Jane M. Beckering -4-

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.