United States v. Jack Brewer

835 F.2d 550, 1987 WL 24864
CourtCourt of Appeals for the Fifth Circuit
DecidedJanuary 28, 1988
Docket87-1431
StatusPublished
Cited by32 cases

This text of 835 F.2d 550 (United States v. Jack Brewer) is published on Counsel Stack Legal Research, covering Court of Appeals for the Fifth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Jack Brewer, 835 F.2d 550, 1987 WL 24864 (5th Cir. 1988).

Opinion

PATRICK E. HIGGINBOTHAM, Circuit Judge:

A defendant appeals from his conviction for illegally possessing and trafficking in counterfeit long distance telephone service access codes, claiming that the statute under which he was convicted is not applicable to misuse of such codes. We are persuaded that the conduct complained of here falls under a practical reading of the statute and affirm.

I

Texas National Telecommunications is a long distance telephone company. A customer calls TNT’s toll free phone number, punches in a personal access code, and if the access code is determined to be valid by the TNT computer, the customer gets a dial tone enabling him to place a long distance call. The call is then billed to the customer through the access number.

The government urged that Brewer was “hacking” — placing numerous calls to the TNT toll-free number and trying out various number combinations until he found one that the computer would accept as valid. By this process, it was urged, Brew *552 er gathered a number of personal access codes that could be used to make long distance phone calls without identification of the user.

TNT became concerned about a large number of calls being charged to unassigned personal access codes and asked the Secret Service and Southwestern Bell Telephone Co. to investigate. The investigators traced calls placed to the 800 number to three phones — all owned by Brewer. The investigators estimated that Brewer would have thirty access codes at that time, and they cancelled all but five of them. Secret Service Agent Rico contacted Brewer and asked to purchase telephone service for a wide telemarketing research project. Rico met with Brewer on October 27, 1986 and asked him for 15 codes, and Brewer told him the fee would be $200 per code, giving him a list of around 17 codes. Rico used Brewer’s phone, tried out each of the codes on the list, and reported that only five were working and that he would need more. The next morning, October 28, in a two hour period the investigators traced 57 phone calls placed from Brewer’s phone to the TNT 800 number. That afternoon, Rico returned to Brewer’s office and Brewer gave him the same list with new numbers penciled in. He again tested the numbers from Brewer’s phone and verified that 17 of the new codes worked. Brewer wrote an invoice to Rico selling him the access codes for 14 days “replacement guaranteed.”

This evidence was presented to a jury who convicted Brewer of violating 18 U.S. C. § 1029 by trafficking in counterfeit long distance access codes and possessing 15 or more counterfeit and unauthorized access devices on October 27, Counts 1 & 2, and of illegally trafficking in and possessing 15 or more counterfeit and unauthorized access devices on October 28, Counts 3 & 4. The court sentenced Brewer to five years in prison for Count 2 followed by concurrent terms of five years probation for Counts 2, 3, and 4.

Brewer appeals his conviction, arguing that Congress did not intend for 18 U.S.C. § 1029 to reach misuse of telephone access codes, and that even if the statute did apply, Brewer’s specific conduct does not fall within the statute because (1) an access code cannot be both “unauthorized” and “counterfeit”; (2) a working access code cannot be “counterfeit;” and, (3) a terminated access code cannot be “unauthorized.”

II

Brewer was indicted under 18 U.S. C. §§ 1029(a)(1) and (a)(3), which provide: (1) Whoever—

(1) knowingly and with intent to defraud produces, uses, or traffics in one or more counterfeit access devices;
[or]
(3) knowingly and with intent to defraud possesses fifteen or more devices which are counterfeit or unauthorized access devices;
shall, if the offense affects interstate or foreign commerce, be punished as provided in subsection (c) of this section.

The statute also provides the following definitions:

(e) As used in this section—
(1) the term “access device” means any card, plate, code, account number, or other means of account access that can be used, alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds (other than a transfer originated solely by paper instrument);
(2) the term “counterfeit access device” means any access device that is counterfeit, fictitious, altered, or forged, or an identifiable component of an access device or a counterfeit access device;
(3) the term “unauthorized access device” means any access device that is lost, stolen, expired, revoked, canceled, or obtained with intent to defraud;
(4) the term “produce” includes design, alter, authenticate, duplicate, or assemble;
*553 (5) the term “traffic” means transfer, or otherwise dispose of, to another, or obtain control of with intent to transfer or dispose of; and
(6) the term “device-making equipment” means any equipment mechanism, or impression designed or primarily used for making an access device or a counterfeit access device.

Although its legislative history suggests that the primary focus of section 1029 was to fill cracks in the criminal law targeted at credit card abuse, we are persuaded that Brewer’s conduct is reached by a practical reading of the statute. Both the Senate and House Reports on the statute state that the definition of “access device” was intended to be “broad enough to encompass technological advances.” 1 Both reports also make specific reference to personal identification codes such as those used to obtain cash from automatic teller machines. 2 Thus, although apparently this is the first case to do so, we need not stretch to read long distance access codes into the section 1029 definition of “access device.”

Our reading denies none of Brewer’s rights to due process because the language of the statute gives fair notice that misuse of a long distance access code constitutes a crime under section 1029. The test of whether a statute is unconstitutionally vague so as to deprive fair notice is whether it provides a person of ordinary intelligence a reasonable opportunity to know what is proscribed. 3 This test is met. Furthermore, “the requirement that statutes give fair notice cannot be used as a shield by one who is already bent on serious wrongdoing.” 4 At the very least, Brewer must have known that hacking out long distance access codes to obtain free long distance service was “wrong.”

Ill

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Martin Steinberg
669 F. App'x 198 (Fifth Circuit, 2016)
United States v. Seleznev
177 F. Supp. 3d 1301 (W.D. Washington, 2016)
United States v. Onyesoh
674 F.3d 1157 (Ninth Circuit, 2012)
United States v. Uresti-Careaga
281 F. App'x 404 (Fifth Circuit, 2008)
United States v. Bruce
531 F. Supp. 2d 983 (N.D. Illinois, 2008)
United States v. Komolafe
246 F. App'x 806 (Third Circuit, 2007)
United States v. Jackson
484 F. Supp. 2d 572 (W.D. Texas, 2006)
United States v. Klouse
210 F. App'x 398 (Fifth Circuit, 2006)
United States v. Kun Yun Jho
465 F. Supp. 2d 618 (E.D. Texas, 2006)
United States v. Humes
312 F. Supp. 2d 893 (E.D. Michigan, 2004)
United States v. Edmonson
175 F. Supp. 2d 889 (S.D. Mississippi, 2001)
United States v. Bankston
182 F.3d 296 (Fifth Circuit, 1999)
United States v. Goodson
Fifth Circuit, 1999
United States v. Soape
Fifth Circuit, 1999
United States v. Allen Perry Soape, Jr.
169 F.3d 257 (Fifth Circuit, 1999)
United States v. Sepulveda
115 F.3d 882 (Eleventh Circuit, 1997)
People v. Butler
43 Cal. App. 4th 1224 (California Court of Appeal, 1996)

Cite This Page — Counsel Stack

Bluebook (online)
835 F.2d 550, 1987 WL 24864, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-jack-brewer-ca5-1988.