United States v. Brunson, No. 18-4696 (4th Cir. 2020)

Annotate this Case
Justia Opinion Summary

The Fourth Circuit held that the district court did not err in denying defendant's motion to suppress evidence obtained from wiretaps. Defendant argued that because the wiretap orders did not include the name of each authorizing official, the orders were statutorily insufficient and therefore all evidence derived from them should have been suppressed.

The court held that the wiretap orders were sufficient under the Wiretap Act because (1) the applications were in fact appropriately authorized by persons authorized by the Wiretap Act; (2) the orders on their face identified, albeit not by name, the Justice Department officials who authorized the applications; (3) the applications themselves, to which the orders on their face referred, did contain both the title and name of the official authorizing the application; and (4) the applications and proposed orders were submitted together as one package to the judge who signed the orders and later to defendant, whose communications were intercepted, such that both the judge and defendant actually knew both the title and name of the official authorizing each application. Furthermore, even if the court were to assume that the omission of the name of the authorizing official in the orders was a defect, it would not be the type of defect that rendered the orders "insufficient" under Section 2518(10)(a)(ii) of the Wiretap Act.

Download PDF
PUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT No. 18-4696 UNITED STATES OF AMERICA, Plaintiff - Appellee, v. JOEY LAMOND BRUNSON, a/k/a Flex, Defendant - Appellant. Appeal from the United States District Court for the District of South Carolina, at Columbia. Joseph F. Anderson, Jr., Senior District Judge. (3:14-cr-00604-JFA-18) Argued: January 29, 2020 Decided: July 31, 2020 Before WILKINSON, NIEMEYER, and MOTZ, Circuit Judges. Affirmed by published opinion. Judge Niemeyer wrote the opinion, in which Judge Wilkinson joined. Judge Motz wrote a dissenting opinion. ARGUED: David Bruce Betts, Columbia, South Carolina, for Appellant. Thomas Ernest Booth, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellee. ON BRIEF: Brian A. Benczkowski, Assistant Attorney General, Matthew S. Miner, Deputy Assistant Attorney General, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C.; Sherri A. Lydon, United States Attorney, Columbia, South Carolina, J.D. Rowell, Assistant United States Attorney, OFFICE OF THE UNITED STATES ATTORNEY, Denver, Colorado, for Appellee. NIEMEYER, Circuit Judge: Joey Brunson, the defendant in this criminal prosecution, challenges the legality of three orders authorizing wiretaps on the ground that the orders did not, on their face, sufficiently identify the persons authorizing the applications for the orders, as required by law. The district court denied his motion to suppress evidence obtained from the wiretaps, and the evidence was used to convict Brunson of numerous drug-trafficking and related crimes. Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (“the Wiretap Act”), 18 U.S.C. § 2510 et seq., authorizes federal judges to issue orders approving wiretaps when detailed statutory requirements are met. And it provides that when certain specified requirements are not met, the contents of any intercepted communications and evidence derived from them must be suppressed. Id. §§ 2518(4)(a)–(e); § 2518(10)(a). The Wiretap Act authorizes the Attorney General and various other designated officials in the Department of Justice, including any Deputy Assistant Attorney General in the Criminal Division or National Security Division, to apply for a wiretap order, and it requires that the application for the order include the “identity of . . . the officer authorizing the application,” 18 U.S.C. § 2518(1)(a), and also that the order authorizing the wiretap “specify . . . the identity of the agency authorized to intercept communications, and of the person authorizing the application,” id. § 2518(4)(d). Failing the inclusion of this information, the order becomes “insufficient,” and evidence obtained from the wiretap must be suppressed. See id. § 2518(10)(a)(ii). 2 In this case, the government identified in each application for a wiretap order the senior Justice Department official by title and name who authorized the application, but in each proposed order that it submitted to the district court, it included only the title, not the name of the official. Each order stated that the application for the order was authorized by “an appropriate official of the Criminal Division, United States Department of Justice, Deputy Assistant Attorney General, pursuant to the power delegated to that official by special designation of the Attorney General.” The district court signed the order as submitted. Brunson contends that because the orders did not include the name of each authorizing official, the orders were statutorily insufficient and therefore all evidence derived from them should have been suppressed. Accordingly, he argues that the district court erred in denying his motion to suppress. We conclude that the wiretap orders were sufficient under the Wiretap Act because (1) the applications were in fact appropriately authorized by persons authorized by the Wiretap Act; (2) the orders on their face identified, albeit not by name, the Justice Department officials who authorized the applications; (3) the applications themselves, to which the orders on their face referred, did contain both the title and name of the official authorizing the application; and (4) the applications and proposed orders were submitted together as one package to the judge who signed the orders and later to Brunson, whose communications were intercepted, such that both the judge and Brunson actually knew both the title and name of the official authorizing each application. In addition, even if we were to assume that the omission of the name of the authorizing official in the orders was 3 a defect, it would not be the type of defect that rendered the orders “insufficient” under § 2518(10)(a)(ii). Therefore, we conclude that the district court did not err in denying Brunson’s motion to suppress. I Joey Brunson was charged with participation in a drug-trafficking conspiracy in South Carolina and related crimes. In particular, the second superseding indictment, which the grand jury returned in March 2017, charged Brunson in Count 1 with conspiracy to traffic five kilograms or more of cocaine and an additional quantity of crack cocaine, in violation of 21 U.S.C. § 846; in Counts 2–7, with using a telecommunications facility for drug trafficking, in violation of 21 U.S.C. § 843(b); in Count 8, with conspiracy to commit money laundering, in violation of 18 U.S.C. § 1956(h); in Count 9, with possession of cocaine and marijuana with intent to distribute, in violation of 21 U.S.C. § 841(a)(1); in Count 10, with transporting a firearm by a felon, in violation of 18 U.S.C. § 922(g)(1); in Count 11, with possession of a firearm in furtherance of drug trafficking offense, in violation of 18 U.S.C. § 924(c)(1); and in Count 12, with perjury, in violation of 18 U.S.C. § 1621. In 2013, during the investigation that led to Brunson’s indictment, the government sought judicial authorization under the Wiretap Act to intercept calls and texts over specified telephones. The first application for a court order disclosed that it was authorized by Deputy Assistant Attorney General Denis J. McInerney, and the district court issued the government’s proposed order on July 31, 2013, authorizing the requested wiretaps. The 4 order stated that it was entered “pursuant to an application authorized by an appropriate official of the Criminal Division, United States Department of Justice, Deputy Assistant Attorney General, pursuant to the power delegated to that official by special designation of the Attorney General,” but the order did not include the official’s name. Pursuant to the order, the FBI intercepted various wire communications, including one on August 6, 2013, to which Brunson was a party and which became the basis for Count 2. In a second application submitted to extend the district court’s first order, the government used the same form as the first application except that it disclosed that the application was authorized by Deputy Assistant Attorney General Paul M. O’Brien. Again, the proposed order that the district court signed on August 29, 2013, included O’Brien’s title but not his name. Pursuant to the order, the FBI intercepted additional wire communications, including one on September 3, 2013, to which Brunson was a party and evidence of which was presented at trial but did not form the basis for any substantive count. Finally, the government submitted a third application to extend the district court’s second order, and again the application was in the same form as the previous two applications, except that it disclosed that the application was authorized by Acting Assistant Attorney General Mythili Raman. Again, the proposed order that the district court signed on October 11, 2013, confirmed that the application had been authorized by an appropriate official, but did not include Raman’s name. Pursuant to that order, the FBI intercepted wire communications, to which Brunson was a party, between October 11 through October 24, 2013, which became the basis for Counts 3 through 7. 5 Brunson filed a pretrial motion to suppress the evidence obtained from the intercepted communications on the ground that each of the district court’s orders authorizing the interceptions failed to include the name of the official authorizing the application, and thus each order was “insufficient on its face,” as that phrase is used in 18 U.S.C. § 2518(10)(a)(ii). The district court denied the motion on the ground that the wiretap orders substantially complied with the Wiretap Act because they were based on and referred to the applications, which identified the authorizing officials both by title and name. The jury thereafter convicted Brunson on all 12 counts of the indictment. Several months after Brunson was convicted, he filed a motion for a new trial based on the intervening Supreme Court decision in Dahda v. United States, 138 S. Ct. 1491 (2018), in which the Supreme Court upheld as facially sufficient wiretap orders that illegally authorized the interception of communications outside the district court’s territorial jurisdiction. In its opinion, the Court explained that an order would be facially insufficient if, for example, it “lack[ed] information that the wiretap statute [in §§ 2518(4)(a)–(e)] require[d] it to include” but that the district court’s territorial jurisdiction was not required to be included in wiretap orders. Dahda, 138 S. Ct. at 1499– 1500. The district court denied Brunson’s motion for a new trial, ruling first that the motion was untimely, as it was filed four months after Brunson’s conviction, and second, that the Supreme Court’s holding in Dahda did not disturb its pretrial ruling denying Brunson’s motion to suppress. In addition, the court noted that even though the wiretap 6 orders did not include the names of the officials authorizing the application, the orders referred to the applications, which did include the names. On September 24, 2018, the district court sentenced Brunson to life plus 60 months’ imprisonment. From the district court’s judgment dated September 25, 2018, Brunson filed this appeal, contending that the district court erred in denying his motion to suppress because the wiretap orders were facially insufficient as they failed to include the names of the officials authorizing the various applications for the orders. Almost three months after Brunson was sentenced and while this appeal was pending, Congress enacted the First Step Act of 2018 (“FSA”), Pub. L. 115-391, 132 Stat. 5194 (Dec. 21, 2018), which authorized some sentence reductions for offenses committed “before the date of enactment of [the] Act, if [the] sentence for the offense ha[d] not been imposed as of [the] date of enactment.” FSA § 401(c). Brunson filed a motion in the district court on February 27, 2019, for a reduction of his sentence based on the FSA, and on April 10, 2019, the district court denied the motion on the ground that the FSA did not apply to Brunson because he was sentenced before the statute’s effective date. Brunson also seeks review of the district court’s denial of FSA relief. II A In support of his argument that the district court erred in denying his motion to suppress evidence obtained by the wiretap orders, Brunson relies mainly on Dahda v. United States, 138 S. Ct. 1491 (2018), which was decided after the district court ruled. He 7 argues that Dahda essentially overruled the test that the district court applied to uphold the wiretap orders. According to Brunson, Dahda recognized that the Wiretap Act must be enforced as written, and therefore a wiretap order that fails to identify the Department of Justice official who had authorized the wiretap application, as required by § 2518(4)(d), is insufficient, and the evidence obtained from the wiretap must be suppressed under § 2518(10)(a)(ii). The government contends that the district court properly denied Brunson’s motion to suppress because the wiretap orders were not facially insufficient, as the authorizing officials “were specifically identified in the wiretap applications that accompanied the orders and were referenced by and incorporated into the orders.” The government argues further that Dahda, which acknowledges that not all facial defects render an order insufficient, does not hold otherwise. The Wiretap Act sets forth in detail procedures for the issuance of orders to allow the interception of wire, oral, or electronic communications. To obtain a wiretap order pursuant to the Act, the government must submit an application authorized by an appropriately designated high-level Justice Department official to a judge of competent jurisdiction and state the applicant’s authority to make such an application. See 18 U.S.C. §§ 2516(1), 2518(1). On the basis of the application, the judge must make certain findings to justify the issuance of the requested order. See id. at § 2518(3) (authorizing the entry of an ex parte wiretap order if a judge determines, inter alia, that there is probable cause that an individual is committing, has committed, or is about to commit an offense and that normal investigative procedures will be unavailing or dangerous). If these requirements 8 are satisfied, the judge may issue an order authorizing the interception of wire, oral, or electronic communications within the territorial jurisdiction of the court in which the judge is sitting. See id. The order must specify: (a) the identity of the person, if known, whose communications are to be intercepted; (b) the nature and location of the communications facilities as to which, or the place where, authority to intercept is granted; (c) a particular description of the type of communication sought to be intercepted, and a statement of the particular offense to which it relates; (d) the identity of the agency authorized to intercept the communications, and of the person authorizing the application; and (e) the period of time during which such interception is authorized, including a statement as to whether or not the interception shall automatically terminate when the described communication has been first obtained. Id. § 2518(4) (emphasis added). The Wiretap Act also regulates the use of communications intercepted pursuant to a wiretap order. Section 2515 provides that “[w]henever any wire or oral communication has been intercepted, no part of the contents of such communication and no evidence derived therefrom may be received in evidence in any trial . . . if the disclosure of that information would be in violation of this chapter.” The Act also authorizes “[a]ny aggrieved person in any trial” to “move to suppress the contents of any wire or oral communication intercepted pursuant to this chapter, or evidence derived therefrom, on the grounds that — (i) the communication was unlawfully intercepted; (ii) the order of authorization or approval under which it was intercepted is insufficient on its face; or 9 (iii) the interception was not made in conformity with the order of authorization or approval.” Id. § 2518(10)(a) (emphasis added). In Dahda, the Supreme Court considered wiretap orders that, contrary to the Wiretap Act, included an authorization to intercept communications outside the territorial jurisdiction of the issuing court, i.e., the District of Kansas. To address the consequence of the defect, the Court looked to § 2518(10)(a)(ii), which requires suppression when a wiretap order is facially insufficient. See 138 S. Ct. at 1494. And in determining what makes an order “insufficient,” the Court looked to §§ 2518(4)(a)–(e) (which requires specific information, but not the order’s territoriality, to be included in an order), but it also noted that insufficiency would not result from “each and every error that appears in an otherwise sufficient order.” Id. at 1498. The Court concluded that although the orders before it did in fact erroneously state the territorial area where they could lawfully be enforced, that defect did not render the orders facially insufficient. Id. at 1499. The territorial scope of the orders was evident from the authorizing judge’s territorial jurisdiction — i.e., the District of Kansas — and the presumption in the statute that limited the order’s scope to the issuing court’s jurisdiction. Id. The Court “fail[ed] to see how” the error in describing the territorial scope of the orders “could render the Orders facially insufficient,” because the information — the erroneous territorial provision — was “surplus[age]” and was not required. Id. Since the defect at issue did not implicate the requirements stated in §§ 2518(4)(a)– (e), the Court did not address the consequence of a technical defect that might arise by a failure to comply precisely with § 2518(4). Dahda, 138 S. Ct. at 1498. Indeed, it stated 10 specifically that it was not resolving questions such as the consequence of a defect under § 2518(10)(a)(ii) based on “identifying the wrong Government official as authorizing the application.” Id. In short, even though the government relied on courts of appeals cases holding that defects arising from a failure to comply to the letter with the requirements of §§ 2518(4)(a)–(e) did not warrant suppression, the Court refused to address the consequence of such technical defects. Because Dahda does not address how we, in this case, are to determine whether the orders’ failure to include the names of authorizing officials renders them “insufficient,” we must look elsewhere. B Brunson’s argument that the orders in this case failed adequately to include the “identity . . . of the person authorizing the application” for each order, as required by § 2518(4)(d), arises from the undisputed fact that, even though each order described the authorizing person by title, it did not include the person’s name, and reference to the name in the application for the order was not an identification on the face of the order. He thus contends that the orders were “insufficient on [their face],” requiring suppression under § 2518(10)(a)(ii) of any evidence derived from the wiretaps. Each order in this case states that it was issued “pursuant to an application authorized by an appropriate official of the Criminal Division, United States Department of Justice, Deputy Assistant Attorney General, pursuant to the power delegated to that official by special designation of the Attorney General.” Thus, while the orders identified 11 the authorizing official by title, they did not include the official’s name, instead referring to the application where the name was provided. The question that Brunson thus presents is whether the Wiretap Act requires that orders give the authorizing official’s name. But his argument addressing that issue reveals that his framing of the issue is in fact incomplete. Brunson agrees that if the orders stated that the “Attorney General,” without naming him or her, authorized the application, the order would be sufficient because that title refers to a unique, identifiable person. At the current time, for example, it is public knowledge, or at least readily obtainable knowledge, that William P. Barr is the Attorney General. Based on this logic, other courts have acknowledged that a name is not necessarily required to provide identification. See, e.g., United States v. Scurry, 821 F.3d 1, 8–9 (D.C. Cir. 2016) (holding that the identification requirement of the Wiretap Act is met “where the language points unambiguously to a unique qualified officer holding a position that only one individual can occupy at a time”). Brunson takes a different view, however, when an order identifies a Deputy Assistant Attorney General in the Criminal Division as the authorizing official because there are six persons who hold that title. Thus, he maintains that reference to the “Attorney General,” without naming him is sufficient, but reference to a Deputy Assistant Attorney General is not. Brunson’s own argument therefore indicates that the issue of whether wiretap orders meet the identity requirement of § 2518(4)(d) rests not on whether the authorizing official is named, but rather on whether the authorizing officer is described with such particularity that only one person fits the description. This recasting of the issue indeed comports more closely to what is required by the text of the Wiretap Act, which employs the word “identity,” because that term is defined 12 to mean “the distinguishing character or personality of an individual,” Merriam-Webster’s Collegiate Dictionary, 616 (11th ed. 2007) (emphasis added), and not necessarily the name of the individual. Thus, when the statute requires that an order include the “identity” of the person authorizing an action, the word “identity” requires a description of the person that is sufficient to distinguish that person from others, but not necessarily the person’s name. In short, whether a wiretap order sufficiently identifies a person turns on whether the description of the person leads to but one person. By this understanding then, when the order identifies the Attorney General by title only as the authorizing official, it is sufficient because the Attorney General refers to one person and his or her name, even though not given, can readily be obtained. With this same reasoning, then, an “identification” by reference in an order to a Criminal Division Deputy Assistant Attorney General would not, without more, be sufficient because there are six such persons, and such identification simply by title would not point to the one person who authorized the application. The information contained in the orders in this case, however, is more complete than a mere reference to one of six Criminal Division Deputy Assistant Attorney Generals. Each order identifies, as the authorizing official, the Deputy Assistant Attorney General of the Criminal Division of the Department of Justice who signed off on the application leading to the issuance of the order. And the specific official who authorized the application was readily obtainable from that application, which was submitted to the judge with the proposed order and given to Brunson with the executed order. Thus, both the authorizing judge and Brunson had a description sufficient to readily identify the one official who 13 authorized the application for the order. We therefore conclude that, in context, the orders contained sufficient information to identify the authorizing officials. Nonetheless, we would commend that, to avoid doubt and possible confusion in the future, prosecutors include as a matter of prudence in wiretap orders both the title and name of the official authorizing the application. And we understand that the Department of Justice has already recognized this. Several years after the orders in this case were issued, the Department sent a circular to all federal prosecutors recommending that the name of the authorizing official be included in any proposed wiretap order. At bottom, however, we conclude that the orders in this case, which identified the officials authorizing the application by title and reference to the application where the official’s name was included, were sufficient to satisfy the requirement of § 2518(4)(d). C Even were we to assume that perfect compliance with § 2518(4)(d) would entail the inclusion of the authorizing official’s name in the text of the order itself, as Brunson argues, we would conclude that the lack of such specificity is a defect that does not amount to an insufficiency. See Dahda, 138 S. Ct. at 1497–99 (holding that while “the core concerns test” applied in United States v. Giordano, 416 U.S. 505, 527 (1974), to § 2518(10)(a)(i) should not be applied to § 2518(10)(a)(ii) (the provision before us), still “not every defect [in complying with subparagraph (ii)] results in an insufficiency”). While Dahda did not undertake to describe the scope of defects that would render wiretap orders insufficient under § 2518(10)(a)(ii), it did cite to cases where technical errors were held not to require 14 suppression under that subparagraph. See United States v. Moore, 41 F.3d 370, 375–76 (8th Cir. 1994) (order missing judge’s signature); United States v. Joseph, 519 F.2d 1068, 1070 (5th Cir. 1975) (order identifying the wrong Government official as authorizing the application); United States v. Vigi, 515 F.2d 290, 293 (6th Cir. 1975) (same). Here, the wiretap orders, even if not in perfect compliance, nonetheless substantially complied with the requirements of § 2518(4)(a)–(e), as the statute does not specifically require the name of the person authorizing the application. Each application was in fact appropriately approved; each order disclosed by title the authorizing official; and both the court issuing the wiretap orders and later Brunson had actual knowledge of the name of each authorizing official. In these circumstances, the identification in the wiretap orders did not deny Brunson any information required by § 2518(4)(a)–(e). We would therefore conclude that the absence of the official’s name from the face of the orders, even if technically a defect, is not the type of defect that would render these orders facially insufficient. III Finally, even if the wiretap orders were thought to be facially insufficient, Brunson’s motion to suppress would have appropriately been denied under the good faith doctrine articulated in United States v. Leon, 468 U.S. 897 (1984). In Leon, the Supreme Court held that evidence “seized in reasonable, good-faith reliance on a search warrant that is subsequently held to be defective” is not subject to suppression, despite the existence of a constitutional violation. 468 U.S. at 905. The Court noted that the social costs of excluding evidence to vindicate Fourth Amendment rights are 15 high, as the exclusion impedes the truth-finding functions of the judge and jury and possibly results in guilty defendants going free or receiving reduced sentences. See id. at 907. And suppressing evidence “obtained in objectively reasonable reliance on a subsequently invalidated search warrant” has only “marginal or nonexistent” benefits in terms of deterring Fourth Amendment violations. Id. at 922. Thus, the Court observed, where an officer acts in good faith, the benefits of suppressing the fruits of an invalid warrant are outweighed by the harms of doing so. See id. While Leon carved out an exception to the judicially created exclusionary rule and this case involves a statutory exclusionary rule, we note that when Congress enacted the Wiretap Act, it did so against the backdrop of analogous Fourth Amendment jurisprudence. Indeed, the accompanying Senate Report specifically states that the statutory suppression remedy was designed to “largely reflect[] existing law.” S. Rep. No. 90-1097 (1968), as reprinted in 1968 U.S.C.C.A.N. 2112, 2185. Moreover, Leon’s rationale is equally applicable in the statutory suppression context — “when law enforcement officers have acted in objective good faith or their transgressions have been minor,” requiring suppression of evidence confers an unearned benefit on a guilty defendant that “offends basic concepts of the criminal justice system.” Leon, 468 U.S. at 908. Moreover, in the same vein, the Supreme Court has specifically recognized that not every defect in a wiretap order justifies exclusion under the Wiretap Act’s suppression provision. See Dahda, 138 S. Ct. at 1498. Thus, we conclude that where law enforcement officials have acted reasonably and in good faith to comply with the central substantive requirements of the Wiretap Act, as is 16 the case here, suppression is not justified. See Moore, 41 F.3d at 376–77 (holding that the good faith exception applied to the government’s interception of communications pursuant to a wiretap order that was missing the judge’s signature); United States v. Brewer, 204 F. App’x 205, 208 (4th Cir. 2006) (per curiam) (unpublished) (holding in the alternative that law enforcement officers “were entitled to rely on facially valid wiretap orders pursuant to the good faith exception”). Even though the wiretap orders submitted by the government did not contain the names of the authorizing officials, the accompanying applications did. More importantly, there was plainly no attempt to obfuscate the identity of the relevant officials, nor did the government fail to secure proper authorization for the applications submitted. And at the time the orders in question were issued in 2013, no court of appeals had held that a failure to include the name of the authorizing officer in the wiretap order rendered such an order substantively deficient. Indeed, numerous courts had considered challenges to similar orders and held that communications intercepted under those orders were not subject to suppression. See, e.g., United States v. Gray, 521 F.3d 514, 526–28 (6th Cir. 2008) (holding that the omission of the name of the authorizing officer from a wiretap order was a technical defect that did not require suppression); United States v. Callum, 410 F.3d 571, 576 (9th Cir. 2005) (same); United States v. Fudge, 325 F.3d 910, 918 (7th Cir. 2003) (same); United States v. Radcliff, 331 F.3d 1153, 1162 (10th Cir. 2003) (same) (noting that “[e]very circuit to consider the question has held that § 2518(10)(a)(ii) does not require suppression if the facial insufficiency of the wiretap order is no more than a technical defect” (quoting Moore, 41 F.3d at 374)). Finally, when the D.C. Circuit declined to follow this line of cases, holding in 2016 that the omission of the authorizing 17 officer’s name rendered a wiretap order facially insufficient for purposes of § 2518(10)(a)(ii), see Scurry, 821 F.3d at 8–12, the Department of Justice changed its practice to ensure that future orders did contain the name of the authorizing official. In short, any defects in orders issued prior to 2016 resulted from good faith efforts to comply with the requirements of the Wiretap Act and not from intentional wrongdoing and therefore would not require suppression of the evidence obtained. IV Addressing his sentencing, Brunson contends that the First Step Act, which was enacted on December 21, 2018, during the pendency of this appeal, invalidates the mandatory life sentence imposed by the district court. As he correctly notes, § 401 of the FSA reduced the mandatory term of life imprisonment without release previously required under 21 U.S.C. § 841(b)(1)(A) to a mandatory 25-year term. See FSA § 401(a)(2)(A)(ii). But because Brunson was sentenced prior to the FSA’s enactment, the benefits of § 401 are not available to him. Section 401(c) of the Act, addressing the section’s “Applicability to Pending Cases,” provides that § 401 “shall apply to any offense that was committed before the date of enactment of this Act, if a sentence for the offense has not been imposed as of such date of enactment.” FSA § 401(c) (emphasis added). Brunson argues that the statutory language should be construed to extend the Act’s coverage to “non-final criminal cases pending on direct review at the time of enactment.” This reading, however, is contrary to the plain meaning of the statute’s text, which on its face restricts applicability to defendants whose sentences had not yet been “imposed” at 18 the time of the Act’s enactment, and a sentence is “imposed” when it is pronounced by the sentencing court, i.e., the district court. Indeed, we recently recognized as much in United States v. Jordan, 952 F.3d 160 (4th Cir. 2020), which held that § 403 of the FSA, which contains the same retroactivity provision as does § 401, did not apply to a defendant whose sentence was pronounced — but not finalized after direct appeal — prior to the FSA’s enactment. See id. at 172. As we noted in Jordan, this common-sense understanding is consistent with numerous provisions of federal law that govern sentencing in the district court. See, e.g., 18 U.S.C. § 3553(a) (listing “factors to be considered [by the district court] in imposing a sentence” emphasis added)); 21 U.S.C. § 851(b) (“If the United States attorney files an information under this section, the court shall after conviction but before pronouncement of sentence . . . inform [the defendant] that any challenge to a prior conviction which is not made before sentence is imposed may not thereafter be raised to attack the sentence” (emphasis added)). Unlike district courts, a court of appeals does not “impose” sentences. Its role is limited to affirming or vacating the sentence imposed by the district court. See Jordan, 952 F.3d at 172 (“[I]mposing sentences is the business of the district courts, while courts of appeals are tasked with reviewing them” (quoting United States v. Aviles, 938 F.3d 503, 510 (3d Cir. 2019))). To support his argument to the contrary, Brunson relies on United States v. Clark, 110 F.3d 15, 17 (6th Cir. 1997), where the court held that 18 U.S.C. § 3553(f) (the safety valve statute applying “to all sentences imposed on or after” the date of enactment) applied to cases pending on appeal when the statute was enacted. In reaching this conclusion, the 19 Sixth Circuit reasoned that the safety valve statute should be applied broadly and noted that “[a] case is not yet final when it is pending on appeal. The initial sentence has not been finally ‘imposed’ within the meaning of the safety valve statute because it is the function of the appellate court to make it final after review or see that the sentence is changed if in error.” Id. But in Jordan, we rejected a request to extend Clark to § 403 of the FSA, noting that we could find “no other circuit court decision applying [Clark’s] definition of ‘imposed’ even under the statute at issue in Clark, let alone applying it in any other context.” Jordan, 952 F.3d at 173. In short, we find Clark’s reasoning unpersuasive and decline to extend its holding to § 401 of the FSA. Brunson also argues that a “presumption of retroactivity” requires applying the FSA’s amendments to sentences that were not final at the time of enactment, citing Bradley v. School Bd. of City of Richmond, 416 U.S. 696, 710–12 (1974). But Bradley stands only for the proposition that a change in the law may be given effect in pending cases even in the absence of clear legislative intent. Id. at 715. Here, in contrast to Bradley, Congress did expressly provide for retroactive application of the changed law, but it limited that application to defendants whose sentences had not been imposed as of the date the law was enacted. At bottom, we conclude that the FSA does not provide any benefit to Brunson. * * * The judgment of the district court is accordingly AFFIRMED. 20 DIANA GRIBBON MOTZ, Circuit Judge, dissenting: The plain language of 18 U.S.C. § 2518(4), as the Supreme Court recognized in Dahda v. United States, 138 S. Ct. 1491 (2018), forecloses any holding that the wiretap orders relied on here were facially sufficient. Accordingly, I must dissent. I. A. Title III of the Omnibus Crime Control and Safe Streets Act of 1968, codified at 18 U.S.C. § 2510 et seq. (“Title III”), has the “dual purpose” of protecting individual privacy and setting forth uniform conditions for law enforcement interception of wire and oral communications. S. Rep. No. 90-1097, at 66 (1968). The statute balances the need to combat serious crime and the equally pressing imperative of safeguarding individual privacy from government overreach. See id. at 66–67. It does so by prohibiting all interstate interceptions of wire, oral, and electronic communications with limited exceptions, such as for law enforcement to investigate specified types of serious crime. Cf. United States v. Hoffman, 832 F.2d 1299, 1306 (1st Cir. 1987) (“[I]n a society which values privacy and the rights of the individual, wiretapping is to be distinctly the exception — not the rule.”). Title III specifies the obligations of both law enforcement and the authorizing court. It requires law enforcement to submit a detailed wiretap application to a court of competent jurisdiction and delineates the specific information that must be contained in that application. 18 U.S.C. § 2518(1). Only after a court independently makes the findings 21 required by the statute can it issue an order authorizing the interception. Id. § 2518(3). Title III also separately lists the information that must appear in the court’s order. Id. § 2518(4). It is the court’s order, not the application, that authorizes the interception and provides a defense to civil penalties for unauthorized snooping. Id. § 2520(d)(1). An application without a subsequent court order is, legally speaking, no more than a piece of a paper. 1 B. An individual may move to suppress evidence obtained via wiretap and any information derived therefrom if: “(i) the communication was unlawfully intercepted; (ii) the order of authorization or approval under which it was intercepted is insufficient on its face; or (iii) the interception was not made in conformity with the order of authorization or approval.” 18 U.S.C. § 2518(10). The Supreme Court has interpreted § 2518(10) on several occasions, most recently in Dahda v. United States, 138 S. Ct. 1491 (2018). See also United States v. Donovan, 429 U.S. 413 (1977); United States v. Chavez, 416 U.S. 562 (1974); United States v. Giordano, 416 U.S. 505 (1974). Together, these cases clarify the distinction between an “unlawful[]” wiretap under § 2518(10)(a)(i) and a wiretap authorized by an order that is “insufficient on its face” under § 2518(10)(a)(ii). As Giordano established and Dahda reaffirmed, a wiretap is “unlawful[]” within the meaning of subparagraph (i) if the wiretap violates those Title III statutory provisions 1 There is a limited exception, not relevant here, for specific “emergency situation[s]” enumerated by the statute. 18 U.S.C. § 2518(7). 22 that implement the wiretap-related congressional concerns motivating passage of Title III. Giordano, 416 U.S. at 527 (“[W]e think Congress intended to require suppression where there is failure to satisfy any of those statutory requirements that directly and substantially implement the congressional intention to limit the use of intercept procedures to those situations clearly calling for the employment of this extraordinary investigative device.”). 2 Following Giordano, courts assessing whether a wiretap was “unlawfully intercepted” pursuant to subparagraph (i) look to whether the Department of Justice has substantially complied with Title III’s requirements and will suppress the wiretap evidence only if the alleged impropriety implicates those core concerns. This assessment has become known as the “core concerns” test. Dahda, 138 S. Ct. at 1498 (referring to the “core concerns test”). For many years, some courts applied Giordano’s core concerns test not only to evaluate whether a wiretap was “unlawful[]” under subparagraph (i) but also to determine whether it was “insufficient on its face” under subparagraph (ii). So long as the Department of Justice substantially complied with Title III’s core concerns, these courts deemed suppression unwarranted, even where the defendant challenged an order as facially insufficient under subparagraph (ii). For example, most courts refused to find wiretap orders “insufficient on [their] face” under subparagraph (ii) where the order failed to name the authorizing official, so long as the wiretap application had in fact been authorized by 2 A wiretap may also be unlawful under subparagraph (i) if it violates the Constitution, for example where the Government lacks probable cause. See Giordano, 416 U.S. at 525–26. 23 an appropriate official. See, e.g., United States v. Callum, 410 F.3d 571, 576 (9th Cir. 2005); United States v. Radcliff, 331 F.3d 1153, 1160–63 (10th Cir. 2003); United States v. Traitz, 871 F.2d 368, 379 (3d Cir. 1989). 3 In Dahda, the Supreme Court implicitly overruled those cases, holding that Giordano’s “core concerns” analysis applies only to subparagraph (i), and does not apply to the question of whether a wiretap order is “insufficient on its face” under subparagraph (ii). Dahda, 138 S. Ct. at 1498 (concluding “that subparagraph (ii) does not contain a Giordano-like ‘core concerns’ requirement”). The Dahda Court reasoned that, unlike the assessment of whether a wiretap is unlawful under subparagraph (i), which looks to whether the Government has substantially complied with the statute’s objectives, the assessment of whether an order is facially insufficient under subparagraph (ii) is a mechanical test: if the order does not contain the information required by § 2518(4), it is facially insufficient: It is clear that subparagraph (ii) covers at least an order’s failure to include information that § 2518(4) specifically requires the order to contain. An order lacking that information would deviate from the uniform authorizing requirements that Congress explicitly set forth, while also falling literally within the phrase “insufficient on its face.” Id. (emphases added) (citations omitted). 3 Reflecting confusion on this issue, prior to Dahda, some courts failed to explain whether they refused to suppress pursuant to subparagraph (i) or subparagraph (ii), presumably because they applied the same core concerns test regardless of the statutory basis for suppression. See, e.g., United States v. Gray, 521 F.3d 514, 526–28 (6th Cir. 2008); United States v. Fudge, 325 F.3d 910, 918 (7th Cir. 2003). 24 In sum, when assessing facial sufficiency under subparagraph (ii), Giordano’s “core concerns” test is irrelevant. Rather, Dahda’s test controls. Id. The Dahda analysis is simple: when an order lacks the information that 2518(4) specifically requires, it must be suppressed as insufficient on its face. See also United States v. Scurry, 821 F.3d 1, 8, 13 (D.C. Cir. 2016) (adopting the mechanical test to determine whether an order is facially sufficient). II. Given that § 2518(4)(d) specifically requires that a wiretap order contain the “identity . . . of the person” who authorized the wiretap application, a straightforward application of Dahda requires us to hold that failure to provide the “identity of the person” who authorized the application in the orders challenged here is a defect that renders them “insufficient on [their] face” under subparagraph (ii) of § 2518(10)(a). Accordingly, the district court should have suppressed the wiretaps and any “evidence derived therefrom.” 18 U.S.C. § 2518(10)(a). A. At oral argument, the Government twice acknowledged that it was the position of the Department of Justice that § 2518(4)(d)’s requirement that an order containing the “identity . . . of the person” means the name of the Deputy Assistant Attorney General official who authorized the order, which is precisely what the orders here lacked. Oral Arg. at 19:49–20:41; see also id. at 33:21–34:22. I see no reason to construe “identity” to mean anything different. 25 But, despite its concession, the Government claims that omission of the names of the authorizing officials here is without consequence because the orders assertedly incorporate by reference their names from the applications. According to the Government, “an order that does not itself identify the authorizing official by name, but incorporates a wiretap application that does name the official, complies with Section 2518(4)(d).” Supp. Br. at 16. The Government maintains that because the orders at issue here cross-reference the wiretap applications, the judge and the defendant could verify that the Department of Justice had complied with Title III’s requirements. There are several problems with this argument. The first is that it is in considerable tension with Title III itself. If incorporation by reference were acceptable, the entire order would need be little more than a single sentence incorporating the application by reference. This would eviscerate Title III, which enumerates in § 2518(1) the precise information required to be contained in an application and separately enumerates in § 2518(4) the precise information required in an order. At bottom, the Government’s argument amounts to an assertion that a wiretap application can be a substitute for a wiretap order, an approach that Congress plainly rejected. I cannot accept the Government’s unwitting koan that an order can be facially sufficient by referring to an external document. As the D.C. Circuit explained in factually indistinguishable circumstances: Title III’s facial sufficiency inquiry is limited to the four corners of the wiretap order. There is something incongruous about an interpretation that would let extrinsic documents transform an order that is “insufficient on its face” into one that is sufficient “on its face.” Further, the Government’s interpretation would allow it, in every case, to satisfy Title III’s order identification requirement by satisfying its application identification requirement, effectively rendering section 2518(4)(d) superfluous. 26 Scurry, 821 F.3d at 9 (citations omitted). Moreover, the Government’s theory rests on the unfounded assumption that the applications and orders necessarily move together. The D.C. Circuit remarked on the problem with the logic in this argument: the “complete overlap” between the information required in the order and application “makes little sense if Congress expected the order always to travel with the application.” Id. at 10. Moreover, as the Government acknowledged at oral argument, while it aims to keep these documents together, it cannot guarantee that they remain so. When asked if there was a uniform, mandatory method of keeping the wiretap applications and orders together, the Government’s answer was “probably not.” Oral Arg. at 35:35–36:56. Accordingly, the Government has not and cannot establish that the underlying applications always move with the orders. In the case at hand, the Government implies that its incorporation by reference theory would cause no harm because these documents traveled together. Supp. Br. at 16– 17 (explaining both the issuing judge and Brunson were provided with the applications, which included the authorizing officials’ names). In fact, it is not clear that they did in this case, 4 or that it is uncommon for problems to arise related to accounting for these papers over time. See Traitz, 871 F.2d at 376 (noting that draft order was missing a page when it 4 Brunson’s pro se suppression motion suggests that he did not receive all of the orders at issue in this case, although he implies that he received all the applications. See Mot. Suppress 2 ECF No. 1969 (referencing applications, including July 31 application, but noting that he “never received [the July 31st, 2013 order] in discovery materials”); id. at 6 (“No order for original interception for target phones #7, #8, #9 from July 31, 2013.”). 27 was signed by the district judge). Thus, I am unable to accept an incorporation by reference argument that is based on the unproven assumption that these documents remain together. Additionally, despite the Government’s argument that specific language in the orders incorporates the applications by reference, I am skeptical that this language clearly does so. Compare the language in the orders, prepared by the Government, which the Government now asserts incorporates the applications by reference: “pursuant to an application authorized by an appropriate official” and “full consideration having been given to the matters set forth therein,”; with the explicit incorporation by reference in one of the Government’s wiretap applications in this case: “[o]n the basis of the allegations contained in this application and on the basis of the Affidavit of Special Agent [omitted], which is fully incorporated herein by reference.” (emphasis added). As evidenced by the latter example, the Government knows how to clearly incorporate by reference when it intends to do so. The language in the orders hardly constitutes a clear statement of intent to incorporate the applications by reference. B. Rather than relying on the Government’s incorporation by reference theory, the majority offers a theory of its own, one that the Government has expressly disavowed. Oral Arg. at 33:21–34:48. The majority’s starting point is the Government’s asserted belief that an order may identify the Attorney General as the authorizing official by title alone. 5 According to the majority, this reasoning means that every authorizing official can be 5 I express no view regarding whether an order that identifies the Attorney General by title but not name would be sufficient on its face, as that question is not presented. 28 identified by title rather than by name, so long as the official “is described with such particularity that only one person fits the description.” Maj. Op. at 12. Thus, the majority concludes that “whether a wiretap order sufficiently identifies a person turns” not on that person’s name, but “on whether the description of the person leads to but one person.” Id. at 13. The problem with this argument, as the Government recognizes, is that the title of the authorizing officials other than the Attorney General do not “lead to but one person” — which is why the Government concedes that the most natural understanding of the “identity” in this context means name, not title. As the D.C. Circuit explained in rejecting the majority’s argument: The text is plain and unambiguous; every wiretap court order must identify the individual high-level Justice Department official who . . . authorized the underlying wiretap application. This requirement may be met where the language points unambiguously to a unique qualified officer holding a position that only one individual can occupy at a time, but here there is more than one Deputy Assistant Attorney General and no individual Deputy is identified on the face of [the challenged] wiretap orders. This would appear to end this part of our inquiry. Scurry, 821 F.3d at 8–9. In sum, the majority’s definitional sleight of hand cannot cover up its flawed logic: there simply is not enough information on the face of these orders to sufficiently ascertain the “identity” of the specific official at the Department of Justice who authorized the applications. The majority can claim that the orders provided enough of a description to “lead to but one person” only by reference to the applications. See Maj. Op. at 13 (reasoning that because the orders referred to the official “who signed off on the 29 application,” and “the specific official who authorized the application was readily obtainable from that application,” the orders were facially sufficient). In other words, this is but a variation of the Government’s incorporation by reference theory. It fails for the same reasons. An order cannot be sufficient on its face by reference to an external document. The other problem with the majority’s analysis is its suggestion that the Government’s substantial compliance with the core concerns of the statute is relevant to the inquiry concerning whether the orders are sufficient on their face. For example, the majority explains that the wiretap orders were sufficient in part because “the applications were in fact appropriately authorized,” id. at 3, and the orders were not defective because “[e]ach application was in fact appropriately approved” and “both the court issuing the wiretap orders and later Brunson had actual knowledge of the name of each authorizing official,” id. at 15. But, as the Government has recognized, the Supreme Court in Dahda explicitly rejected an approach that assesses facial sufficiency by reference to whether the Government has substantially complied with Title III; instead, Dahda directs courts to determine whether, on its face, a wiretap order contains the information required by § 2518(4). See Dahda, 138 S. Ct. at 1498. 6 Dahda’s explicit disavowal of the core concerns test in determining facial sufficiency under subparagraph (ii) was no anomaly. It has been the Supreme Court’s 6 The Government conceded at oral argument that, after Dahda, “substantial compliance” could not cure a facially insufficient warrant, as Dahda explicitly rejected applying a “core concerns” test in the context of 2518(10)(a)(ii). Oral Arg. at 23:30–23:50. 30 consistent position for more than forty years that each of the three subparagraphs requiring suppression under § 2518(10)(a) must be given independent effect. See Dahda, 138 S. Ct. at 1498 (“The underlying point of Giordano’s limitation was to help give independent meaning to each of § 2518(10)(a)’s subparagraphs. It thus makes little sense to extend the core concerns test to subparagraph (ii) . . . .”); Giordano, 416 U.S. at 527 (“[I]t does appear that paragraphs (ii) and (iii) must be deemed to provide suppression for failure to observe some statutory requirements that would not render interceptions unlawful under paragraph (i).”). Dahda’s embrace of a mechanical test when assessing facial sufficiency under subparagraph (ii) is necessary to give independent meaning to each of § 2518(10)(a)’s three bases for suppression. In stating that the orders here are facially sufficient in part because they were in fact appropriately authorized, the majority has conflated errors under subparagraph (i) with errors under subparagraph (ii). 7 Consequently, the majority’s analysis will sow unnecessary confusion among district courts and litigants alike. 7 Resisting the conclusion that Dahda resolves this case, the majority maintains that the failure of the orders to contain the names of the authorizing officers is merely a technical defect, and Dahda “did not address the consequence of a technical defect that might arise by a failure to comply precisely with § 2518(4).” Maj. Op. at 10. Dahda did leave open the question of how broadly lower courts should construe the class of errors that result in facial insufficiency. 138 S. Ct. at 1498. But the error here is squarely controlled by the Dahda Court’s explicit reasoning. See id. (“It is clear that subparagraph (ii) covers at least an order’s failure to include information that § 2518(4) specifically requires the order to contain.” (emphasis added)). The Court’s unambiguous language thus forecloses the argument that the kind of error here — the omission of the identity of the authorizing official, which is one of the pieces of information that § 2518(4) requires — can ever result in a facially sufficient order. In short, the majority’s supposition that this type of error was unresolved in Dahda is baseless. 31 III. Perhaps recognizing the logical contortions required of its holding, the majority (in what is plainly dicta) also adopts the Government’s alternative argument that we should apply the good faith exception set forth in United States v. Leon, 468 U.S. 897 (1984). Invocation of Leon in the Title III context is misguided. The exception is relevant in cases of constitutional suppression; it is a judicially created exception to a judicially created remedy to protect a constitutional right. See id. at 906. This, however, is not a constitutional case; the statute controls, and the statute does not provide a good faith exception. Cf. Giordano, 416 U.S. at 524 (“The issue [of suppression] does not turn on the judicially fashioned exclusionary rule aimed at deterring violations of Fourth Amendment rights, but upon the provisions of Title III . . . .”). Rather, the statute directs a court to suppress orders that are “insufficient on [their] face.” 18 U.S.C. § 2518(10)(a)(ii). Accordingly, as the Government itself acknowledged at oral argument, the Supreme Court has never imported the good faith exception into Title III. Oral Arg. at 28:26–28:34. In opining to the contrary, the majority relies in part on its observation that, with respect to Title III, Congress legislated “against the backdrop of analogous Fourth Amendment jurisprudence” and that Congress intended the suppression remedy to “largely reflect[] existing law.” Maj. Op. at 16. This is uncontroversial — as far as it goes. But Congress enacted Title III almost twenty years before the Supreme Court issued Leon. Thus, in so legislating, Congress could hardly have intended Title III to reflect the Leon rule that did not yet exist. See United States v. Rice, 478 F.3d 704, 713 (6th Cir. 2007) 32 (“Congress obviously could not know that Fourth Amendment search and seizure law would embrace a good-faith exception sixteen years after the passage of Title III, and the language from the Senate Report indicates a desire to incorporate only the search and seizure law that was in place at the time of the passage of Title III.”). Nor has Congress subsequently amended Title III to provide for such an exception. The majority also leans on Leon’s policy rationales to support its conclusion that we should import Leon into the Title III context. The majority believes it is unfair to law enforcement to “confer[] an unearned benefit on a guilty defendant” for a mistake made in good faith. Maj. Op. at 16. Importing this reasoning is into Title III is a fundamentally flawed exercise. Whether to “confer[]” such a “benefit” is not a choice that we are free to make. The decision whether to suppress evidence, and in what circumstances, constitute policy judgments already expressly made by Congress. We do not have the authority to disregard those judgments. See Nickey Gregory Co., LLC v. AgriCap, LLC, 597 F.3d 591, 608 (4th Cir. 2010) (Niemeyer, J.) (“The judiciary, however, should not insert itself in these policy matters by questioning or debating legislative judgments, as it is constituted only to comprehend, interpret, and apply what Congress has duly provided.”). IV. The Government’s last refuge, an argument that the majority does not adopt, is that, if suppression is warranted and the good-faith exception does not apply, any error was harmless because of the “overwhelming, independent” non-wiretap evidence against 33 Brunson. Supp. Br. at 9. Assuming harmless error applies, 8 however, examination of the trial record renders laughable the Government’s contention that “the intercepted wire communications were a small part of the [G]overnment’s overall case.” Supp. Br. at 22. In fact, the record reveals that the intercepted calls were unquestionably the linchpin of the Government’s case. The calls were repeatedly played for the jury and were discussed throughout the trial by the Government and its witnesses (including Greenan, Wright, Ravenel, Gates, and Davis). See, e.g., JA 88–91 (FBI agent testifying about contents of wiretaps), 94–95 (same); JA 96 (intercepted wiretap audio recording played for the jury), 97 (same), 99 (same), 102 (same), 233 (same), 234 (same), 248 (same), 256 (same), 259 (same), 262 (same), 264 (same), 266 (same), 270 (same), 271 (same), 273 (same), 280 (same), 284 (same), 285 (same), 288 (same), 290 (same), 291 (same), 406 (same), 427 (same), 467 (same), 511 (same). Given the Government’s repeated use of and reference to 8 Some out-of-circuit precedent suggests harmless error applies in the Title III context. See, e.g., United States v. Quintero, 38 F.3d 1317, 1331 (3d Cir. 1994). We have previously declined to apply harmless error to a Title III case but have never squarely determined whether it would be appropriate to do so. See United States v. Crabtree, 565 F.3d 887, 892 (4th Cir. 2009). However, the conclusion that a harmless error analysis is appropriate is neither obvious nor compelled by controlling authority. Federal Rule of Criminal Procedure 52(a) generally requires courts to apply harmless error to all trial errors. See Neder v. United States, 527 U.S. 1, 7 (1999). See generally Kotteakos v. United States, 328 U.S. 750, 760–65 (1946). But Rule 52(a) is a congressional command that can be overridden by statute. In Zedner v. United States, 547 U.S. 489 (2006), the Court rejected the Government’s argument that harmless error applied in the Speedy Trial Act context. Id. at 507–09. The critical test, according to the Court, was Congress’s intent, shown in part through that statute’s “detailed requirements . . . regulating ends-of-justice continuances.” Id. at 508. Of course, the Speedy Trial Act is not Title III. I assume harmless error applies here, as Brunson appears to have conceded the point, but I note that, following Zedner, there is at least a colorable argument as to whether harmless error has been displaced by Title III’s detailed requirements governing suppression. 34 these tapes throughout the trial, it is impossible to conclude that discussing and playing these incriminating audio recordings did not substantially influence the jury’s view of Brunson’s culpability. This certainly is sufficient to conclude that the error was not harmless. See Kotteakos v. United States, 328 U.S. 750, 765 (1946) (“The inquiry cannot be merely whether there was enough [evidence] to support the result, apart from the phase affected by the error. It is rather, even so, whether the error itself had substantial influence. If so, or if one is left in grave doubt, the conviction cannot stand.”). V. For the foregoing reasons, I respectfully dissent. 9 9 Because I believe Brunson’s conviction should ultimately be vacated on the count related to his First Step Act motion, I do not address that claim. 35
Primary Holding

The district court did not err in denying defendant's motion to suppress evidence obtained from wiretaps because the wiretap orders were sufficient under the Wiretap Act.


Disclaimer: Justia Annotations is a forum for attorneys to summarize, comment on, and analyze case law published on our site. Justia makes no guarantees or warranties that the annotations are accurate or reflect the current state of law, and no annotation is intended to be, nor should it be construed as, legal advice. Contacting Justia or any attorney through this site, via web form, email, or otherwise, does not create an attorney-client relationship.

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.