United States v. Yannotti

399 F. Supp. 2d 268, 2005 U.S. Dist. LEXIS 10015, 2005 WL 1231647
CourtDistrict Court, S.D. New York
DecidedMay 25, 2005
Docket04 CR.690(SAS)
StatusPublished
Cited by2 cases

This text of 399 F. Supp. 2d 268 (United States v. Yannotti) is published on Counsel Stack Legal Research, covering District Court, S.D. New York primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Yannotti, 399 F. Supp. 2d 268, 2005 U.S. Dist. LEXIS 10015, 2005 WL 1231647 (S.D.N.Y. 2005).

Opinion

OPINION & ORDER

SCHEINDLIN, District Judge.

I. INTRODUCTION

Michael Yannotti (‘Yannotti”) is charged with murder, two separate attempted murders, and loansharking in connection with an alleged racketeering enterprise and racketeering conspiracy in violation of the Racketeer Influenced and Corrupt Organizations Act. Yannotti has moved to suppress all evidence against him that was derived from a wiretap of a cellular telephone that he used while in Florida in 1996. In a Memorandum Opinion and Order dated April 15,- 2005, I denied three grounds for suppressing the wiretap evidence: (1) that there was insufficient probable cause to support the wiretap authorization; (2) that the Government’s application contained knowing and material falsehoods, warranting a hearing under Franks v. Delaware; and (3) that the tapes of the wiretapped conversations had been improperly sealed. 1 However, I allowed additional briefing of a fourth ground for suppression — that the Government was required to seek an amended wiretap order naming Yannotti as an interceptee — which was developed by Yannotti’s new counsel at oral argument on April 12, 2005. 2 Yannotti now contends that because the Government failed to seek an amended wiretap order, the interception of his calls (1) constituted an unreasonable search in violation of the Fourth Amendment, (2) exceeded the scope of the wiretap order, or in the alternative (3) rendered the wiretap order “akin to a general warrant.” 3 For the reasons that follow, Yannotti’s motion to suppress is denied.

II. BACKGROUND 4

In April 1996, the Government applied to Judge William J. Zloch of the United States District Court for the Southern District of Florida for a wiretap order to intercept wire communications of Nicholas Corozzo, 5 six other named interceptees, *270 and “others yet unknown,” over a cellular telephone that had been supplied to Corozzo by a confidential source. 6 The application alleged that Corozzo and the others were engaged in a racketeering conspiracy, whose activities included fraud, the sale or receipt of stolen goods, extortion, loansharking, and money laundering. 7 According to the application, a confidential source “furnished the target cellular telephone to COROZZO for his use in conducting the criminal activities referred to herein.” 8 The application further stated that “COROZZO is presently using the target cellular telephone.” 9

On the basis of the application, Judge Zloch found that there was probable cause to believe that Corozzo, the six named intereeptees, and “others as yet unknown” were engaged in a racketeering conspiracy and, furthermore, that the target cell phone would be used “in connection with [the] commission” of this criminal activity. 10 Accordingly, Judge Zloch authorized a thirty-day wiretap, commencing on April 12, 1996. 11

In a ten-day progress report submitted to the court on April 22, 1996, the Government stated that prior to returning to New York on April 13 — ’the day after the wiretap order was issued — Corozzo gave the target cellular phone to Yannotti, who was identified as an associate in the Gambino Crime Family who reported directly to Corozzo and was the “muscle” in his crew. 12 According to the report, Corozzo indicated at that time that he would return to southern Florida “within a couple of weeks.” 13 No calls made by Corozzo were ever intercepted over the target phone prior to his departure. Rather, the logs maintained by the monitoring agents show that all the calls from the beginning of the wiretap on April 12 until 6:21 p.m. on April 13 were from “UF” — i.e., an unidentified female — or “Eileen” (alternatively spelled “Ilean”). 14 According to the progress report, at 8:45 p.m. on April 13, Yannotti placed a call on the target phone to Salvatore Pecchio, who informed him that Corozzo had been dropped off at the Fort Lauderdale Airport. 15 The report stated that Corozzo “had just left for New York.” 16 Thus, the report shows that when Corozzo departed for New York, the Government knew that he left the target cell phone behind in Florida.

After Corozzo’s departure, the Government continued monitoring the target phone. The progress report alleged that Yannotti placed two calls, albeit in guarded language, concerning the collection of loansharking payments. 17 According to the Government, these payments were owed to *271 Corozzo. 18 On the basis of these conversations, the report concluded that Yannotti, Corozzo, and others would continue using the target phone to discuss the offenses described in the wiretap order. 19 The report also stated that the Government would identify Yannotti as a named interceptee in the event that the Government sought an extension of the wiretap. 20 No extension was sought.

III. APPLICABLE LAW

The Fourth Amendment requires that a warrant specify “the place to be searched, and the persons or things to be seized.” 21 “In the wiretap context, those requirements are satisfied by identification of the telephone line to be tapped and the particular conversations to be seized.” 22

In addition, Title III of the Omnibus Crime Control and Safe Street Act of 1968 23 governs the authorization of wiretaps. Section 2518 requires that an application for a wiretap order include, among other things:

(i) details as to the particular offense that has been, is being, or is about to be committed, (ii) ... a particular description of the nature and location of the facilities from which or the place where the communication is to be intercepted, (iii) a particular description of the type of communications sought to be intercepted, [and] (iv) the identity of the person, if known, committing the offense and whose communications are to be intercepted. 24

Similarly, the wiretap order itself must specify:

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Yannotti
Second Circuit, 2008

Cite This Page — Counsel Stack

Bluebook (online)
399 F. Supp. 2d 268, 2005 U.S. Dist. LEXIS 10015, 2005 WL 1231647, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-yannotti-nysd-2005.