United States v. Kenneth Steven Bailey

41 F.3d 413, 94 Cal. Daily Op. Serv. 7987, 76 Rad. Reg. 2d (P & F) 1346, 94 Daily Journal DAR 14768, 1994 U.S. App. LEXIS 29178, 1994 WL 571913
CourtCourt of Appeals for the Ninth Circuit
DecidedOctober 20, 1994
Docket92-50721
StatusPublished
Cited by24 cases

This text of 41 F.3d 413 (United States v. Kenneth Steven Bailey) is published on Counsel Stack Legal Research, covering Court of Appeals for the Ninth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Kenneth Steven Bailey, 41 F.3d 413, 94 Cal. Daily Op. Serv. 7987, 76 Rad. Reg. 2d (P & F) 1346, 94 Daily Journal DAR 14768, 1994 U.S. App. LEXIS 29178, 1994 WL 571913 (9th Cir. 1994).

Opinion

WIGGINS, Circuit Judge:

Appellant United States of America (the “government”) appeals the acquittal of Kenneth Steven Bailey (“Defendant”) of charges involving production of, and trafficking in, counterfeit access devices in violation of 18 U.S.C. § 1029(a). We have jurisdiction pursuant to 28 U.S.C. § 1291 and reverse the district court.

I. Background

A. Facts

A cellular phone places a call by transmitting its permanently assigned identification number (known as the electronic serial number or “ESN”), its assigned phone number (the Mobile Identification Number or “MIN”), and the number being called to a nearby antenna or “cell.” For a local customer, the local network confirms that the ESN and MIN match before completing the call.

To accommodate customers out of then-service area, local cellular networks permit phones other than those subscribing to the local service to complete calls in “roaming” mode. At the time of Defendant’s activities, roaming mode was more vulnerable to fraud than was the service to local subscribers. When a call was placed by a phone with an out-of-area MIN, the local service would first determine whether there was a roaming-agreement between the local carrier and the carrier responsible for the MIN (the “distant carrier”); if there was, the local carrier would connect the call unless the ESN was found in a list of invalid ESNs, known as the “negative file.” In roaming mode, the local carrier could not confirm that the ESN and the MIN matched.

Defendant modified cellular telephones so as to fool the local network into permitting calls placed by those phones to be completed in roaming mode, even though the call could never be billed. This sort of scheme is known in the industry as “tumbling the ESN.” The process involves altering the programming embedded in the hardware of the telephone to cause the phone to send out random ESNs. By changing the MIN in the phone to one in another area, the user could force the phone to place calls in roaming mode. Then, by transmitting any ESN not listed in the negative file, the user could trick the local carrier into connecting the call. The liability of the distant carrier for calls by “tumbler” phones is not entirely clear. 1 We assume solely for the sake of argument that the local carrier is not reimbursed by the distant carrier for such calls because the local carrier cannot establish that the call was made by a valid subscriber to the distant carrier’s service.

Defendant read the program in the phone and rewrote it so that it randomly changed *416 the ESN. He then encoded the program (“burned” it) into new chips (“EPROMs”) that could replace the chips in the phones. Defendant was arrested after selling five of the modified chips to an undercover Secret Service agent. Defendant consented to a search of his motel room, which produced materials and equipment used to produce the chips, including extra chips, computer software, a data erase clip used to erase chips, and a receipt for purchase of Mitsubishi cellular phones. He admitted that he had produced and sold some 150 chips with his program to override the internal security program of the phone. The chips sold to the Secret Service agent contained modified versions of the original programs on the chips installed in Mitsubishi phones.

B. Prior Proceedings

Defendant was indicted on January 22, 1991, for manufacturing and trafficking in counterfeit access devices, in violation of 18 U.S.C. § 1029(a)(1), and possession of equipment to make such devices, in violation of 18 U.S.C. § 1029(a)(4). A superseding indictment also charged attempted manufacture of, and traffic in, counterfeit access devices in count one. During trial, Defendant moved for acquittal on the ground that the computer chips in question were not “counterfeit access devices” within the meaning of the statute. The motion was denied. On June 1, 1992, a jury convicted Defendant of both counts. Defendant made a Rule 29 motion for a judgment of acquittal on the same basis as his earlier motion. The district court granted that motion on November 9, 1992. The government timely appeals, joined by two amici, the Cellular Telecommunications Industry Association and the Communications Fraud Control Association, and challenges the district court’s interpretation of the statute.

II. Discussion

A. Issue on Appeal

We review de novo the district court’s interpretation of section 1029. United States v. Brannan, 898 F.2d 107, 109 (9th Cir.), cert. denied, 498 U.S. 833, 111 S.Ct. 100, 112 L.Ed.2d 71 (1990). That statute provides that “[wjhoever ... knowingly and with intent to defraud produces, uses or traffics in one or more counterfeit access devices” is guilty of an offense if it affects interstate commerce. 18 U.S.C. § 1029(a)(1). “Access device” is defined as “any card, plate, code, account number or other means of account access that can be used, alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds (other than a transfer originated solely by paper instrument).” 18 U.S.C. § 1029(e)(1). “‘[CJounterfeit access device’ means any access device that is counterfeit, fictitious, altered, or forged, or an identifiable component of an access device or a counterfeit access device.” 18 U.S.C. § 1029(e)(2).

The district court decided that Defendant’s handiwork did not constitute an “access device” within the meaning of the statute. The court explained its conclusion by stating that

[wjhat legislative history there is indicates that the purpose of this legislation was to prevent access to accounts.... [I]f you follow the Government’s line of reasoning then even a.crowbar could be an access device because you could use it to pry open an ATM machine. I mean that’s a line of — that’s a conclusion if you follow the Government’s line of thinking, anything that you can use to get into a system that has accounts is an access device. And a crowbar would fit that definition perfectly as much as an EPROM.

The district court seemed persuaded by the idea that there was no evidence that the distant carrier ever suffered a direct accounting loss (i.e., had to disburse funds) due to the tumbling. It seemed to believe that the inability to bill for the calls was just a failure to collect additional revenue from potential customers, and that there was no additional cost to providing the additional calls.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

State Of Washington v. Angel Rose Marie Nelson
381 P.3d 84 (Court of Appeals of Washington, 2016)
State v. Rose
282 P.3d 1087 (Washington Supreme Court, 2012)
United States v. Onyesoh
674 F.3d 1157 (Ninth Circuit, 2012)
United States v. Truong
587 F.3d 1049 (Ninth Circuit, 2009)
United States v. Bruce
531 F. Supp. 2d 983 (N.D. Illinois, 2008)
United States v. Jackson
484 F. Supp. 2d 572 (W.D. Texas, 2006)
United States v. Humes
312 F. Supp. 2d 893 (E.D. Michigan, 2004)
United States v. Edmonson
175 F. Supp. 2d 889 (S.D. Mississippi, 2001)
United States v. Sepulveda
115 F.3d 882 (Eleventh Circuit, 1997)
United States v. Kenneth Steven Bailey
116 F.3d 486 (Ninth Circuit, 1997)
United States v. Qadeer
953 F. Supp. 1570 (S.D. Georgia, 1997)
United States v. Baird
85 F.3d 450 (Ninth Circuit, 1996)
United States v. Morris
81 F.3d 131 (Eleventh Circuit, 1996)
People v. Butler
43 Cal. App. 4th 1224 (California Court of Appeal, 1996)

Cite This Page — Counsel Stack

Bluebook (online)
41 F.3d 413, 94 Cal. Daily Op. Serv. 7987, 76 Rad. Reg. 2d (P & F) 1346, 94 Daily Journal DAR 14768, 1994 U.S. App. LEXIS 29178, 1994 WL 571913, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-kenneth-steven-bailey-ca9-1994.