United States v. Zhou Chen

508 F. App'x 398
CourtCourt of Appeals for the Sixth Circuit
DecidedDecember 11, 2012
Docket11-2554, 11-2555, 11-2556
StatusUnpublished
Cited by5 cases

This text of 508 F. App'x 398 (United States v. Zhou Chen) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Zhou Chen, 508 F. App'x 398 (6th Cir. 2012).

Opinion

HELENE N. WHITE, Circuit Judge.

After a joint-jury trial, Defendants Shifu Lin, Kang He, and Zhou Chen (collectively, “Defendants”) were convicted of conspiracy to commit fraud, 18 U.S.C. § 371, access-device fraud, 18 U.S.C. § 1029(a)(2), and aggravated identity theft, 18 U.S.C. § 1028A(a)(l). The district court sentenced Defendants to concurrent terms of 60 months’ imprisonment and 78 months’ imprisonment for the first two convictions, respectively, and 24 months’ imprisonment for the third conviction, to be served consecutively to the sentences for the first two convictions. Defendants appeal, claiming that there was insufficient evidence to convict them of aggravated identity theft, and that the court committed sentencing error in finding facts by a preponderance of the evidence at sentencing, improperly applying a two-level sentencing enhancement for the use of “sophisticated means,” and calculating $500 of loss for credit-card numbers that Defendants possessed but did not use. We granted the government’s motion to consolidate the three cases for briefing and submission. We AFFIRM.

I.

On January 11, 2011, a loss-prevention employee from a Meijer, Inc. grocery store (“Meijer”) contacted the Kent County Sheriffs Department regarding a group of Asian males conducting suspicious credit-card transactions in the Grand Rapids, Michigan area. Meijer store employees reported that three men were repeatedly purchasing gift cards using multiple credit-card numbers and that some of these transactions were being declined. Meijer security reported the suspects’ movement in real-time to police over the phone. Sheriffs deputies located a car that fit the description the Meijer employees had provided, followed it from one Meijer store to another, and eventually arrested Defendants after observing their behavior.

The deputies’ search of the vehicle yielded more than 100 plastic gift cards with magnetic strips on the back, 72 of which had their magnetic strips re-encoded with stolen credit-card account numbers. These re-encoded gift cards allowed Defendants to use the cards as cloned credit cards to purchase new gift cards and other items. The deputies also found four laptop computers, two of which contained evidence that Defendants were purchasing credit-card account numbers online. A search of the laptops’ files revealed several “data dumps” — files that contain numerous credit-card account numbers and, in some cases, the names of the individuals whose names were on the accounts. Inside the laptop bags, the deputies found several Western Union wire-transfer receipts documenting multiple wire transfers to Russia and Ukraine. The deputies also found a magnetic strip reader/writer device hidden in the rear of the car that could re-encode the magnetic strips on the back of the gift *400 cards with stolen credit-card account numbers. Further, each Defendant possessed two wallets containing gift cards that had been re-encoded with stolen credit-card numbers. Deputies found fake identification cards in the wallets of He (“Jie Gao”) and Chen (“Chun Chen”). Deputies also found a Western Union receipt for a transfer of funds in the name of “Chun Chen” to an individual in Russia.

Records and video surveillance from Me-ijer showed that Defendants had visited numerous Meijer stores in the western Michigan area, purchasing gift cards and other items with stolen credit-card numbers. The credit-card account numbers on the Meijer records matched the unauthorized numbers found on the gift cards Defendants possessed, as well as the numbers found in the data dumps on Defendants’ computers. When one of the credit cards was declined, Defendants would try another credit card in a back-to-back transaction. Meijer also produced video stills of Defendants purchasing Western Union wire transfers that were sent to Ukraine and Russia. An inspection of Defendants’ computers revealed instant-message conversations between Defendants and unknown individuals in Russia and Ukraine, negotiating the purchase of credit-card numbers. Defendants were told by the sellers that the numbers had to be used 'within 24 hours or they would not work.

Prior to trial, Defendants entered into stipulations with the government agreeing that the account numbers listed in the indictment were valid credit-card numbers, possessed by actual individuals who did not authorize Defendants to use their credit-card account number at any time. At trial, the court read the stipulations to the jury and instructed that it may assume the stipulated facts to be true. The court denied Defendants’ motion for judgment of acquittal, finding that the combination of direct and circumstantial evidence, when viewed in the light most favorable to the government, would allow a jury to conclude beyond a reasonable doubt that Defendants were guilty of each charge of the indictment. Defendants presented no evidence and the jury returned a verdict of guilty on all counts as to all three Defendants.

The presentence report (“PSR”) calculated the total offense level for each Defendant as 80, yielding a guideline range of 97 to 121 months under criminal history category I. To a base offense level of 6, U.S.S.G. § 2Bl.l(a)(2), 14 levels were added because the loss involved was calculated as $857,937.74 (loss greater than $400,000 but less than $1,000,000). Id. at (b)(1)(H). The PSR added an additional six levels because the offense involved 250 or more victims, Id. at (b)(2)(C), and an additional two levels for the use of “sophisticated means.” Id. at (b)(10)(C). Another two levels were added based on the possession or use of device-making equipment and production or trafficking of unauthorized access devices. Id. at (b)(ll)(A)(i) and (B)(i). This gave each Defendant a total offense level of 30. In addition, 18 U.S.C. § 1028A(a)(l) mandates a consecutive two-year term of imprisonment for aggravated identity theft in addition to any other term of imprisonment imposed.

At sentencing, Defendants objected to the enhancements for more than 250 victims, and use of sophisticated means, and to the attribution of $500 of loss per unauthorized access device possessed. Defendants also moved for judgment of acquittal on the aggravated identity-theft conviction. Because all three Defendants raised these objections, the court consolidated a portion of the sentencing hearing to resolve the common issues. The court denied the motion for acquittal, noting:

[Wjhile I understand that the defendants are protesting lack of knowledge *401 that these numbers were assigned to individuals, I think it’s also reasonably inferable from the totality of the evidence here that the means in which they acquired the numbers, that is through the Ukraine clandestinely, the guidance from individuals they were talking to that these numbers had a very short life span because fraudulent use would be detected quickly, I think that evidence also adds to the government’s circumstantial case admittedly concerning the knowledge of the defendants ...

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Jimmie Moon
808 F.3d 1085 (Sixth Circuit, 2015)
United States v. Charles Finley
600 F. App'x 964 (Sixth Circuit, 2015)
United States v. Dainius Vysniauskas
593 F. App'x 518 (Sixth Circuit, 2015)
United States v. Ulysses Lewis, Jr.
545 F. App'x 365 (Sixth Circuit, 2013)

Cite This Page — Counsel Stack

Bluebook (online)
508 F. App'x 398, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-zhou-chen-ca6-2012.