United States v. Inman

411 F.3d 591, 2005 U.S. App. LEXIS 10444, 2005 WL 1332282
CourtCourt of Appeals for the Fifth Circuit
DecidedJune 7, 2005
Docket04-10136
StatusPublished
Cited by61 cases

This text of 411 F.3d 591 (United States v. Inman) is published on Counsel Stack Legal Research, covering Court of Appeals for the Fifth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Inman, 411 F.3d 591, 2005 U.S. App. LEXIS 10444, 2005 WL 1332282 (5th Cir. 2005).

Opinion

BENAVIDES, Circuit Judge:

Appellant Franklin Delano Inman appeals his conviction and sentence for wire fraud under 18 U.S.C. § 1343 and access device fraud under 18 U.S.C. '§ 1029(a)(2). As discussed below, we affirm Inman’s conviction and prison sentence but remand the restitution portion of Inman’s sentence for modification.

I. Background

From April 1997 through March 2001, Inman worked as a computer system administrator in the information technology (“IT”) department of Corning Systems (“Corning”), a wholesale business that manufactures equipment for telephones. During that time, Jean Maddox (“Maddox”) worked in Coming’s IT department as a leasing administrator. Her duties included purchasing computer parts for employees in the company. Corning issued to Maddox a Wachovia VISA credit card, which Maddox, Inman, and other IT employees were authorized to use for company purchases, but not for personal purchases.

During his employment with Corning, Inman repeatedly used the VISA card to make purchases from a company named Cutting Edge Technologies (“Cutting Edge”). Cutting Edge was a shell company (an entity that sold no product or service) that Inman had started. The shell company was able to make phantom credit card sales through a merchant account set up in October, 1997, with Nova Information Systems, a credit card processing company. Proceeds from the phantom purchases were deposited by Nova into a Bank One account that Inman had opened for “Inman Consulting, Incorporated” in September 1997.

Maddox became suspicious of Inman in early 2001 because of the numerous purchases from Cutting Edge that appeared on the VISA statement and because she never saw any of the items Inman allegedly purchased. After Maddox reported the suspicious activity to the IT Department Manager, it was discovered that Cutting Edge did not really exist. When asked to explain the purchases, Inman told the IT Department Manager that he would explain the transactions after he returned to work from vacation. However, Inman never returned.

Subsequently, a jury convicted Inman on ten counts of wire fraud in violation of 18 U.S.C. § 1343 and one count of access device fraud in violation of 18 U.S.C. § 1029(a)(2). The district court sentenced Inman to 21 months of imprisonment, a 3-year term of supervised release, a $1,100 mandatory special assessment, and $135,283.11 in restitution.

*594 II. Discussion

Inman challenges his conviction, restitution order, and sentence enhancements. First, he argues that there was insufficient evidence to uphold his conviction for access device fraud under 18 U.S.C. § 1029(a)(2). Second, he contends that the trial court’s restitution order was improper because it exceeded the temporal scope of the indictment. Third, Inman argues that his prison sentence is unconstitutional because the district court enhanced his sentence based on facts not found by a jury. We discuss each argument in turn.

A. Insufficiency of Evidence

Inman first argues that there is insufficient evidence to sustain his conviction under 18 U.S.C. § 1029(a)(2) because one of the statutory elements of that provision, the use of an unauthorized access device, was not proved at trial. Thus, he contends that the district court’s denial of his timely motion for a new trial was erroneous.

We review the evidence to determine whether any reasonable trier of fact could have found that the evidence established guilt beyond a reasonable doubt. United States v. Martinez, 975 F.2d 159, 160-61 (5th Cir.1992). We view the evidence in the light most favorable to the government, drawing all reasonable inferences from the evidence in favor of the jury’s verdict. Id. at 161; United States v. Shabazz, 993 F.2d 431, 441 (5th Cir.1993).

Section 1029(a)(2) provides that a person who “knowingly and with intent to defraud traffics in or uses one or more unauthorized access devices during any one-year period, and by such conduct obtains anything of value aggregating $1,000 or more during that period” is subject to criminal penalties. 18 U.S.C. § 1029(a)(2).

According to Inman, the evidence at trial showed that the credit card was an authorized access device, rather than an unauthorized one, and that Corning was aware of the charges he made on the credit card. Inman acknowledges that arguably he may have exceeded his authority to charge on the card, but he asserts that such action does not violate § 1029(a)(2). We disagree.

Section 1029(e)(3) defines an “unauthorized access device” as “any access device that is lost, stolen, expired, revoked, canceled, or obtained with intent to defraud.” 18 U.S.C. § 1029(e)(3). Because neither party claims that the VISA credit card used by Inman was stolen, expired, revoked, or canceled, the relevant inquiry here is whether the card was “obtained with intent to defraud.”

The evidence at trial showing that Inman intended to defraud Corning when he obtained the card from Maddox was substantial. The government presented evidence that before obtaining the VISA card, Inman had already created the fraudulent company, Cutting Edge, from which he would later falsely purchase products; acquired a merchant account for the company; and opened a recipient bank account for the transfer of the credit card transaction proceeds. Thus, a jury would have sufficient evidence to find that Inman obtained the card with intent to fraudulently collect money from the VISA card issuer at Coming’s expense.

Moreover, while Inman had authorization to use the VISA card for company purchases, he was unauthorized to use the card for personal purchases. Thus, Inman directly violated Coming’s mandate against using the card for personal purchases when he fraudulently made phantom purchases from Cutting Edge. Such misuse of the card served as further evidence of an unauthorized access device. See H.R. Rep. 98-894, *14, 1984 U.S.C.C.A.N. 2689, * *3700, 3703 (describ *595 ing an unauthorized access device as a “genuine access deviee[ ] being used without authority” and “genuine but misused” in distinguishing between “counterfeit access device” as defined in § 1029(E)(2) and an “unauthorized access device” in § 1029(E)(3)).

B. Restitution Order

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Nelson
Fifth Circuit, 2024
United States v. Shah
84 F.4th 190 (Fifth Circuit, 2023)
United States v. Reinhart
Fifth Circuit, 2023
United States v. Oliver
Fifth Circuit, 2023
United States v. Bell
Fifth Circuit, 2022
United States v. Gassaway
Fifth Circuit, 2021
United States v. Gregory Bane
948 F.3d 1290 (Eleventh Circuit, 2020)
United States v. Paul Suarez
879 F.3d 626 (Fifth Circuit, 2018)
United States v. Jim Dial
705 F. App'x 250 (Fifth Circuit, 2017)
United States v. Jackson Desouza
630 F. App'x 339 (Fifth Circuit, 2016)
United States v. Jeffrey St. John
625 F. App'x 661 (Fifth Circuit, 2015)
United States v. San Juanita Lozano
791 F.3d 535 (Fifth Circuit, 2015)
United States v. Stephanie Bevon
602 F. App'x 147 (Fifth Circuit, 2015)
United States v. Jessica Bagley
578 F. App'x 343 (Fifth Circuit, 2014)
United States v. Jermaine Frazier
577 F. App'x 271 (Fifth Circuit, 2014)

Cite This Page — Counsel Stack

Bluebook (online)
411 F.3d 591, 2005 U.S. App. LEXIS 10444, 2005 WL 1332282, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-inman-ca5-2005.