United States v. Heath, No. 10-7087 (10th Cir. 2011)

Annotate this Case
Download PDF
FILED United States Court of Appeals Tenth Circuit UNITED STATES COURT OF APPEALS May 25, 2011 TENTH CIRCUIT Elisabeth A. Shumaker Clerk of Court UNITED STATES OF AMERICA, Plaintiff-Appellee, v. No. 10-7087 JOSEPH WILLIAM HEATH, (D.C. No. 6:CR-10-00018-RAW-1) (E. D. Okla.) Defendant-Appellant. ORDER AND JUDGMENT * Before BRISCOE, Chief Judge, ANDERSON and MURPHY, Circuit Judges. After examining the briefs and appellate record, this panel has determined unanimously to honor the parties request for a decision on the briefs without oral argument. See Fed. R. App. P. 34(f); 10th Cir. R. 34.1(G). The case is, therefore, submitted without oral argument. Joseph William Heath pleaded guilty, without a plea agreement, to conspiracy to commit fraud in connection with access devices, in violation of 18 * This order and judgment is not binding precedent, except under the doctrines of law of the case, res judicata, and collateral estoppel. It may be cited, however, for its persuasive value consistent with Fed. R. App. P. 32.1 and 10th Cir. R. 32.1. U.S.C. § 371. He was sentenced to thirty-two months incarceration and thirtysix months supervised release. Heath challenges the procedural reasonableness of his sentence, arguing that the district court improperly included a ten-level upward adjustment pursuant to U.S.S.G. § 2B1.1(b)(1)(F) based on an amount of loss greater than $120,000 but less than $200,000 and a four-level leader or organizer enhancement pursuant to U.S.S.G. § 3B1.1(a). Exercising jurisdiction pursuant to 18 U.S.C. § 3742(a) and 28 U.S.C. § 1291, we affirm. I. BACKGROUND Pursuant to a criminal investigation in Durant, Oklahoma into a scheme to use counterfeit credit cards to rent hotel rooms and steal items from the rooms, the Durant Police Department received information from employees at a local Hampton Inn that a group of individuals had rented two hotel rooms and that a television was missing from one of the rooms. ROA, Vol. 3 at 4 5. When police officers arrived at the Hampton Inn, an individual from the group was found sleeping in one of the identified rooms. Id. at 5. Police officers questioned this individual, and she revealed the identities of the remaining members of the group and details regarding their vehicles. Id. Based on this information, police officers located and stopped a two-door silver Honda Civic that Heath and Sarah Puryear occupied. Id. When the vehicle was stopped, police officers observed a television that appeared to match the description of the missing television . . . at the Hampton Inn. Id. Heath and 2 Puryear were arrested. Id. The vehicle was impounded and, pursuant to a search warrant, the following items were found in the vehicle: 265 registration forms from the Quality Inn, located [in] Arlington, Texas, which included copies of drivers licenses, credit card numbers, credit card expiration dates, and home addresses of persons who had previously stayed at the hotel; 14 altered gift cards; 20 unaltered gift cards, 3 label makers; 6 labels with credit card numbers and letters printed on them; 15 sheets of Avery easy peal labels; 2 packages of Avery self adhesive laminating sheets; and, 2 multi-colored fingernail sanding blocks. Id. During questioning, Puryear explained that: Heath had . . . obtained the credit card information from a friend of his who was employed by the Quality Inn in Arlington, Texas. This employee showed Heath where the daily credit card receipts were stored. Heath would go there, break into the room and remove the documents. . . . [T]he information obtained was used by Heath to manufacture counterfeit credit cards. Id. at 6. A grand jury returned a three-count indictment against Heath, along with five other individuals, charging him with: (1) conspiracy to commit fraud in connection with access devices, in violation of 18 U.S.C. § 371; (2) use of a counterfeit access device, in violation of 18 U.S.C. § 1029(a)(1); and (3) possession of fifteen or more counterfeit access devices, in violation of 18 U.S.C. § 1029(a)(3). ROA, Vol. 1 at 7 10. As one of the overt acts in furtherance of the charged conspiracy, the indictment asserted: [Heath] obtained valid credit card numbers, specifically: a. 300 registration packets from a Quality Inn [in] . . . Arlington, Texas. This information included copies of drivers licenses, credit card numbers, credit card expiration dates and home 3 addresses of persons who had previously stayed at this hotel. Id. at 8. Heath waived his Sixth Amendment rights to a jury in all respects both as to guilt or innocence and as to sentencing, id. at 11, and he pleaded guilty, without a plea agreement, to the conspiracy charged in the indictment, id. at 20. The remaining charges in the indictment were dismissed. Id. The presentence investigation report (PSR) identified the base offense level as 6 for conspiracy to commit fraud in connection with access devices, in violation of 18 U.S.C. § 371. ROA, Vol. 3 at 9 (applying U.S.S.G. § 2X1.1 to incorporate the base offense level under U.S.S.G. § 2B1.1 for the substantive offense of use of an access device, in violation of 18 U.S.C. § 1029). The PSR then included the following upward adjustments: a ten-level upward adjustment pursuant to U.S.S.G. § 2B1.1(b)(1)(F) based on the amount of intended loss from the scheme calculated as $143,000; and a two-level upward adjustment pursuant to U.S.S.G. § 2B1.1(b)(10)(A)(i) for the possession or use of any device making equipment. ROA, Vol. 3 at 9 10. The PSR also included a four-level enhancement pursuant to U.S.S.G. § 3B1.1(a) because Heath was the organizer of the fraudulent use of access devices that involved five other participants. ROA, Vol. 3 at 10. With regard to the ten-level upward adjustment for the amount of loss, the PSR explained that, while [t]he actual loss in this case is $1,387.65, the total intended loss in this case is $143,000. Id. at 9 10. Pursuant to Application Note 4 3(F)(i) to U.S.S.G. § 2B1.1, the PSR calculated the intended loss amount based on the fact that [t]here were a minimum of 286 fraudulent access devices possessed by [Heath] in this case and applying an assumed loss of $500.00 per access device. ROA, Vol. 3 at 10. As for the four-level leader or organizer enhancement, the PSR explained that: Heath secured fraudulent credit card numbers, recruited accomplices to include Puryear, [Laura Madden, Melissa Kulp, Daniel Jeffery, and Kelly Speigle], manufactured fraudulent credit cards and taught co-defendants to manufacture fraudulent cards, thereby, establishing that he was the organizer of the fraudulent use of access devices that involved five other participants. Id. The PSR included a three-level reduction pursuant to U.S.S.G. §§ 3E1.1(a) and (b) based on Heath s affirmative acceptance of personal responsibility for his conduct. ROA, Vol. 3 at 10. As a result, the PSR calculated Heath s total offense level as 19. Id. Based on the total offense level of 19 and his criminal history category of I, the PSR identified Heath s applicable sentencing guidelines range as thirty to thirty-seven months incarceration. Id. Heath filed two objections to the PSR. Id. at 16, 23. First, Heath objected to the inclusion of the ten-level upward adjustment in his offense level, arguing that the PSR lacked adequate evidence to support the calculated intended loss of $143,000. Id. at 16. Heath specifically dispute[d] that there is any proof developed in this case to support the proposition that he possessed a minimum 5 of 286 fraudulent access devices. Id. While he recognized that there were a number of credit card receipts that provide varying degrees of information which may or may not be sufficient to . . . create a fraudulent credit card, he argued that [a] credit card number in itself is not sufficient to create a fraudulent credit card. Id. Thus, he argued that [a]n unused credit card number is not an access device as that term is used in the sentencing guidelines. Id. Second, Heath objected to the inclusion of the four-level leader or organizer enhancement. Id. at 23. He argued that the events involved in this case did not support the enhancement. Id. During sentencing, the district court addressed Heath s objections. First, with regard to Heath s objection to the ten-level upward adjustment, the district court overruled the objection and f[ound] by a preponderance of the evidence that the loss amount used in the calculation of the advisory guidelines was appropriate as included in the [PSR]. ROA, Vol. 2 at 15. The district court reasoned: Pursuant to [U.S.S.G. §] 2B1.1, Application Note 3(A), loss is the greater of actual or intended loss. Further, note (3)(F)(i) pertains to special rules that shall be used to assist in determining a loss with regard to stolen or counterfeit credit cards and access devices; purloined numbers -- access devices; purloined numbers and codes. It states that in a case involving any counterfeit access device or an unauthorized access device or unauthorized access devices shall not be less than $500.00 per access device. This subsection refers to Application Note 9(A) and subsequently 18 [U.S.C. §] 1029(e)(3), for the meaning given the term unauthorized access device.[ ] Pursuant to 18 [U.S.C. §] 1029(e)(3), account numbers that can be used, alone or in conjunction with another access device, to obtain money, goods, 6 services, or any other thing of value are considered access devices. Based on the evidence in this case, the defendant possessed 286 account numbers. These numbers were taken from registration forms which included copies of driver s licenses, credit card numbers, expiration dates, and home addresses, in addition to the credit card account numbers. Id. at 14 15. As a result, the district court determined that Heath possessed 286 access devices pursuant to 18 U.S.C. § 1029. See id. Based on the evidence that Heath possessed 286 access devices and applying the assumed loss of five hundred dollars per access device, the district court found the same [$143,000] of loss as identified in the PSR. Id. at 15. Thus, the district court included the ten-level upward adjustment pursuant to U.S.S.G. § 2B1.1(b)(1)(F) for a loss greater than $120,000 but less than $200,000 when calculating Heath s guidelines range. Second, the district court addressed Heath s objection to the four-level enhancement for his organizational or leadership role in the scheme. See id. at 15 17. The district court overruled Heath s objection, find[ing] by a preponderance of the evidence that the defendant was an organizer/leader in this scheme and is appropriately given a four level enhancement, pursuant to U.S.S.G. [§] 3B1.1(a). Id. at 16 17. The district court reasoned: [U.S.S.G. §] 3B1.1, Application Note 4 states that the factors the Court should consider for an aggravating role adjustment includes the exercise of decision-making authority, the nature of participation in the commission of offense, the recruitment of accomplices, the claimed right to a larger share of the fruits of the crime, the degree of participation in planning or organizing the offense, the nature and scope of the illegal activity, and the degree of control and authority exercised over others. 7 Without Heath s participation, there would have been no fraudulent access devices. Heath obtained registration forms that include had [sic] copies of driver s license, credit card expiration dates, and home addresses, in addition to the credit card account numbers, which were used in the manufacture of fraudulent access devices . . . . Heath gave the illegally obtained credit card information to co-defendants, . . . and taught them to manufacture access devices and to call merchant lines to verify the numbers were valid. At Heath s direction, [Speigle and Jeffery] traveled to Durant, Oklahoma, and used fraudulent cards, made by [H]eath, to secure hotel rooms and merchandise. Based on the evidence in this case, [Heath] s actions of securing fraudulent credit card numbers, recruiting accomplices, manufacturing fraudulent credit cards and teaching others to manufacture fraudulent credit cards establish that he was the organizer of the criminal activity involving the fraudulent use of access devices. Furthermore, there were five other participants that were less culpable participants in this scheme. Id. at 15 16. After considering the 18 U.S.C. § 3553(a) factors, the district court sentenced Heath to thirty-two months incarceration and thirty-six months supervised release. Id. at 21 22. The district court also imposed restitution of $765.09 against Heath and his co-defendants jointly and severally. Id. at 23. Heath appeals his sentence. II. ANALYSIS On appeal, Heath reasserts his challenges to the inclusion of the ten-level upward adjustment for the amount of loss and the four-level leader or organizer enhancement when calculating his guidelines range. Aplt. Br. at 5. First, Heath argues that the district court improperly applied a ten-level upward adjustment for the intended amount of loss calculated based on his possession of 286 access 8 devices. He contends that evidence of his possession of 286 valid credit card account numbers was insufficient to establish his possession of 286 access devices under 18 U.S.C. § 1029. Id. at 9. Second, Heath argues that the district court lacked sufficient evidence to justify a four-level enhancement for his leadership or organizational role in the criminal activity. He contends that [t]he statements in the [PSR] do not support a determination that Heath was an organizer or leader for purposes of [this enhancement]. Id. at 11 12. A. Standard of review This court reviews a criminal sentence for reasonableness, under a deferential abuse of discretion standard. United States v. Alapizco-Valenzuela, 546 F.3d 1208, 1214 (10th Cir. 2008). This reasonableness review has both procedural and substantive components. Id. On appeal, Heath challenges the procedural reasonableness of his sentence, contending that the district court improperly calculated his guidelines range. See Gall v. United States, 552 U.S. 38, 51 (2007) (explaining that procedural errors include improperly calculating[] the Guidelines range ). When evaluating the procedural reasonableness of a sentence, this court review[s] the district court s legal conclusions regarding the Guidelines de novo and its factual findings for clear error. United States v. Hamilton, 587 F.3d 1199, 1219 (10th Cir. 2009). B. Upward adjustment based on the calculated amount of intended loss 9 Heath argues that the district court had inadequate evidence to support its calculation of the amount of intended loss from the scheme. While Heath does not dispute his possession of 286 valid credit card account numbers, he asserts that the credit card account numbers themselves do not constitute access devices within the meaning of 18 U.S.C. § 1029. This court reviews the district court s interpretation of the term access device de novo. 1 See Hamilton, 587 F.3d at 1222. We conclude that the valid credit card account numbers Heath possessed constitute access devices under 18 U.S.C. § 1029 and that the district court properly applied the ten-level upward adjustment based on the calculated intended loss of $143,000. Pursuant to U.S.S.G. § 2B1.1(b)(1)(F), when an offense involves fraud or altered or counterfeit instruments and results in a loss that exceeds $120,000 but is less than $200,000, ten levels are added to the base offense level. To determine the amount of loss, Application Note 3 explains that the loss is the greater of actual loss or intended loss. U.S.S.G. § 2B1.1 cmt. n.3(A). While the actual 1 Heath s references to the district court s fact-finding obligations pursuant to Federal Rule of Criminal Procedure 32(i)(3)(B) are inapplicable in this context. Rather than disputing the PSR s factual findings, Heath challenged the application of the guidelines to the facts. See United States v. Cereceres-Zavala, 499 F.3d 1211, 1215 (10th Cir. 2007) (explaining that [a]rguments that challenge the district court s application of the guidelines to the facts and not the facts themselves do not trigger any obligation on the part of the district court to make specific findings (internal quotation marks omitted)). Thus, Heath s objection to the PSR did not trigger the district court s fact-finding obligations pursuant to Rule 32(i)(3)(B). 10 loss incurred in this case was $1,387.65, ROA, Vol. 3 at 9, the district court calculated the intended loss as $143,000, see ROA, Vol. 2 at 14 (agreeing to the intended loss calculated in the PSR). According to Application Note 3, intended loss means the pecuniary harm that was intended to result from the offense. U.S.S.G. § 2B1.1 cmt. n.3(A)(ii). The guidelines specify that, for offenses involving any counterfeit access device or unauthorized access device, loss . . . shall be not less than $500 per access device. Id. cmt. n.3(F)(i). To define the terms counterfeit access device and unauthorized access device, the guidelines refer to the definitions in 18 U.S.C. § 1029. U.S.S.G. § 2B1.1 cmt. n.3(F)(i) (referring to id. cmt. n.9(A), which incorporates the meaning[s] given th[ose] term[s] in 18 U.S.C. § 1029[] ). Pursuant to 18 U.S.C. §§ 1029(e)(2) and (3), the definitions of the terms counterfeit access device and unauthorized access device both incorporate the term access device. The term access device is then defined as: any card, plate, code, account number, electronic serial number, mobile identification number, personal identification number, or other telecommunications service, equipment, or instrument identifier, or other means of account access that can be used, alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds (other than a transfer originated solely by paper instrument). 18 U.S.C. § 1029(e)(1). Heath argues that credit card account numbers alone do not constitute access devices within the meaning of 18 U.S.C. § 1029(e)(1). See Aplt. Br. at 11 9. In his objections to the PSR, Heath asserted: What there is in this case is a number of credit card receipts with varying degrees of information which may or not be sufficient to allow the information to be used to create a fraudulent credit card. The counterfeiter needs not only the credit card number, but expiration date, name of credit cardholder and billing address. Additionally, the card must be active at the time of the attempted use. ROA, Vol. 3 at 16. We disagree with Heath s interpretation. First, Heath s interpretation of the term access device is inconsistent with the plain language of the statute. The plain language of 18 U.S.C. § 1029(e)(1) specifically identifies an account number as an access device. Further, because the statute requires only that a means of account access be capable of obtaining anything of value either alone or in conjunction with another access device, Heath s argument that a credit card account number is insufficient to create a fraudulent credit card is meritless. 2 Thus, the valid credit card account numbers Heath possessed constitute access devices pursuant to the plain language of 18 U.S.C. § 1029(e)(1). Second, Heath s interpretation of the term access device is inconsistent with this court s prior statements regarding the scope of 18 U.S.C. § 1029. This court has explained: 2 We note here that Heath s own actions through his use of credit card numbers and names assigned thereto to rent hotel rooms for himself and his accomplices establish that an actual credit card need not be created in order to obtain money, goods, services, or any other thing of value . . . . 18 U.S.C. § 1029(e)(1). 12 In enacting [18 U.S.C.] § 1029, Congress was focused upon the fraudulent use of access devices in connection with credit transactions. Congress sought to address the growing problem in counterfeit credit cards and unauthorized use of account numbers or access codes to banking system accounts. Congress sought to include in its definition of access devices, credit cards, debit cards, account numbers and combinations of these and other methods of obtaining goods and services. United States v. McNutt, 908 F.2d 561, 563 (10th Cir. 1990) (emphasis added) (internal quotation marks, ellipses, and citations omitted). Thus, the credit card account numbers Heath possessed fall within the intended scope of the term access device in 18 U.S.C. § 1029. Because Heath did not dispute his possession of 286 valid credit card account numbers, the district court properly found that he possessed 286 access devices. Applying the assumed loss of five hundred dollars per access device, the district court properly calculated the intended amount of loss as $143,000. Thus, we conclude that the district court properly included the ten-level upward adjustment to Heath s offense level. C. Leader or organizer enhancement Heath argues that the district court had insufficient evidence to justify the inclusion of the four-level enhancement for his organizational role in the scheme. Aplt. Br. at 9. He contends that [t]he statements in the [PSR] do not support a determination that Heath was an organizer or leader for purposes of [U.S.S.G.] § 3B1.1(a) because there is a lack of evidence that Heath exercised decision making authority over the other participants, any recruitment of accomplices, a claimed right to a larger share of the fruits of the crime, or any degree of control and 13 authority exercised by him over the others. No one in this conspiracy worked for Heath, nor did he control or have any responsibility for their activities. Aplt. Br. at 11 12. We conclude that the district court s factual finding was not clearly erroneous. Pursuant to U.S.S.G. § 3B1.1(a), a defendant s offense level is increased four levels [i]f [he] was an organizer or leader of a criminal activity that involved five or more participants. Thus, [t]o impose the 4-level increase, the sentencing court must make two findings of fact: first, that defendant is an organizer or leader; and second, that the criminal activity involved five or more participants. United States v. Roberts, 14 F.3d 502, 523 (10th Cir. 1993). Heath challenges only the finding that he was an organizer of the scheme. This court has noted that [t]he gravamen of the enhancement is either the exercise of control over other participants or the organization of others for the purpose of carrying out the crime. United States v. Spears, 197 F.3d 465, 469 (10th Cir. 1999) (internal quotation marks omitted). Application Note 4 to U.S.S.G. § 3B1.1 provides the following factors that a sentencing court should consider when determining whether an individual was a leader or organizer of criminal activity: the exercise of decision making authority, the nature of participation in the commission of the offense, the recruitment of accomplices, the claimed right to a larger share of the fruits of the crime, the degree of participation in planning or organizing the offense, the nature and scope of the illegal activity, and the degree of control and authority exercised over others. 14 U.S.S.G. § 3B1.1 cmt. n.4. We conclude that the PSR provided sufficient evidence to support the district court s finding that Heath was an organizer of the scheme. The PSR provided evidence that Heath obtained the credit card information used to manufacture the counterfeit credit cards, distributed the credit card information to other participants in the scheme, and taught other participants how to manufacture the counterfeit cards. According to the PSR, Puryear explained that Heath obtained the credit card information and would verify that the credit card account number was activated. ROA, Vol. 3 at 6. Puryear also explained that Heath had taught [Kulp and Madden] how [to manufacture the counterfeit credit cards], and that [Heath] was the one who provided the credit card numbers to them. Id. According to the PSR, Madden confirmed that [s]he and Kulp would obtain the numbers from Heath, and Kulp would manufacture the counterfeit credit cards. Id. at 7. Further, Kulp explained that Heath taught her how to manufacture the counterfeit credit cards and that Heath would supply the numbers from the stolen credit card receipts he was getting from a hotel. Id. at 8. The PSR also included evidence that Heath coordinated the rental of hotel rooms and recruited accomplices to meet in Durant. According to the PSR, Madden explained that Heath called in a stolen credit card number to the Hampton Inn and rented two rooms and that Heath would tell them what name to use, and they would check into the rooms using those names. Id. at 7. 15 Further, according to the PSR, Speigle explained that Heath called her while she was in Dallas, Texas, and asked her if she would pick up Daniel Jeffery and bring him to Durant, Oklahoma. Id. at 7 8. Heath did not object to these factual findings. Thus, based on this evidence, we conclude that the district court s finding that Heath was an organizer of this scheme did not constitute clear error and that the district court properly included the four-level enhancement. III. CONCLUSION Heath s sentence is AFFIRMED. Entered for the Court Mary Beck Briscoe Chief Judge 16

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.