United States v. Joey Brunson

U.S. Court of Appeals for the Fourth Circuit
United States v. Joey Brunson, 968 F.3d 325 (4th Cir. 2020)

United States v. Joey Brunson

Opinion

PUBLISHED

UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT

No. 18-4696

UNITED STATES OF AMERICA,

Plaintiff - Appellee,

v.

JOEY LAMOND BRUNSON, a/k/a Flex,

Defendant - Appellant.

Appeal from the United States District Court for the District of South Carolina, at Columbia. Joseph F. Anderson, Jr., Senior District Judge. (3:14-cr-00604-JFA-18)

Argued: January 29, 2020 Decided: July 31, 2020

Before WILKINSON, NIEMEYER, and MOTZ, Circuit Judges.

Affirmed by published opinion. Judge Niemeyer wrote the opinion, in which Judge Wilkinson joined. Judge Motz wrote a dissenting opinion.

ARGUED: David Bruce Betts, Columbia, South Carolina, for Appellant. Thomas Ernest Booth, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellee. ON BRIEF: Brian A. Benczkowski, Assistant Attorney General, Matthew S. Miner, Deputy Assistant Attorney General, UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C.; Sherri A. Lydon, United States Attorney, Columbia, South Carolina, J.D. Rowell, Assistant United States Attorney, OFFICE OF THE UNITED STATES ATTORNEY, Denver, Colorado, for Appellee. NIEMEYER, Circuit Judge:

Joey Brunson, the defendant in this criminal prosecution, challenges the legality of

three orders authorizing wiretaps on the ground that the orders did not, on their face,

sufficiently identify the persons authorizing the applications for the orders, as required by

law. The district court denied his motion to suppress evidence obtained from the wiretaps,

and the evidence was used to convict Brunson of numerous drug-trafficking and related

crimes.

Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (“the Wiretap

Act”),

18 U.S.C. § 2510

et seq., authorizes federal judges to issue orders approving

wiretaps when detailed statutory requirements are met. And it provides that when certain

specified requirements are not met, the contents of any intercepted communications and

evidence derived from them must be suppressed.

Id.

§§ 2518(4)(a)–(e); § 2518(10)(a).

The Wiretap Act authorizes the Attorney General and various other designated

officials in the Department of Justice, including any Deputy Assistant Attorney General in

the Criminal Division or National Security Division, to apply for a wiretap order, and it

requires that the application for the order include the “identity of . . . the officer authorizing

the application,”

18 U.S.C. § 2518

(1)(a), and also that the order authorizing the wiretap

“specify . . . the identity of the agency authorized to intercept communications, and of the

person authorizing the application,”

id.

§ 2518(4)(d). Failing the inclusion of this

information, the order becomes “insufficient,” and evidence obtained from the wiretap

must be suppressed. See id. § 2518(10)(a)(ii).

2 In this case, the government identified in each application for a wiretap order the

senior Justice Department official by title and name who authorized the application, but in

each proposed order that it submitted to the district court, it included only the title, not the

name of the official. Each order stated that the application for the order was authorized by

“an appropriate official of the Criminal Division, United States Department of Justice,

Deputy Assistant Attorney General, pursuant to the power delegated to that official by

special designation of the Attorney General.” The district court signed the order as

submitted.

Brunson contends that because the orders did not include the name of each

authorizing official, the orders were statutorily insufficient and therefore all evidence

derived from them should have been suppressed. Accordingly, he argues that the district

court erred in denying his motion to suppress.

We conclude that the wiretap orders were sufficient under the Wiretap Act because

(1) the applications were in fact appropriately authorized by persons authorized by the

Wiretap Act; (2) the orders on their face identified, albeit not by name, the Justice

Department officials who authorized the applications; (3) the applications themselves, to

which the orders on their face referred, did contain both the title and name of the official

authorizing the application; and (4) the applications and proposed orders were submitted

together as one package to the judge who signed the orders and later to Brunson, whose

communications were intercepted, such that both the judge and Brunson actually knew

both the title and name of the official authorizing each application. In addition, even if we

were to assume that the omission of the name of the authorizing official in the orders was

3 a defect, it would not be the type of defect that rendered the orders “insufficient” under

§ 2518(10)(a)(ii). Therefore, we conclude that the district court did not err in denying

Brunson’s motion to suppress.

I

Joey Brunson was charged with participation in a drug-trafficking conspiracy in

South Carolina and related crimes. In particular, the second superseding indictment, which

the grand jury returned in March 2017, charged Brunson in Count 1 with conspiracy to

traffic five kilograms or more of cocaine and an additional quantity of crack cocaine, in

violation of

21 U.S.C. § 846

; in Counts 2–7, with using a telecommunications facility for

drug trafficking, in violation of

21 U.S.C. § 843

(b); in Count 8, with conspiracy to commit

money laundering, in violation of

18 U.S.C. § 1956

(h); in Count 9, with possession of

cocaine and marijuana with intent to distribute, in violation of

21 U.S.C. § 841

(a)(1); in

Count 10, with transporting a firearm by a felon, in violation of

18 U.S.C. § 922

(g)(1); in

Count 11, with possession of a firearm in furtherance of drug trafficking offense, in

violation of

18 U.S.C. § 924

(c)(1); and in Count 12, with perjury, in violation of

18 U.S.C. § 1621

.

In 2013, during the investigation that led to Brunson’s indictment, the government

sought judicial authorization under the Wiretap Act to intercept calls and texts over

specified telephones. The first application for a court order disclosed that it was authorized

by Deputy Assistant Attorney General Denis J. McInerney, and the district court issued the

government’s proposed order on July 31, 2013, authorizing the requested wiretaps. The

4 order stated that it was entered “pursuant to an application authorized by an appropriate

official of the Criminal Division, United States Department of Justice, Deputy Assistant

Attorney General, pursuant to the power delegated to that official by special designation of

the Attorney General,” but the order did not include the official’s name. Pursuant to the

order, the FBI intercepted various wire communications, including one on August 6, 2013,

to which Brunson was a party and which became the basis for Count 2.

In a second application submitted to extend the district court’s first order, the

government used the same form as the first application except that it disclosed that the

application was authorized by Deputy Assistant Attorney General Paul M. O’Brien. Again,

the proposed order that the district court signed on August 29, 2013, included O’Brien’s

title but not his name. Pursuant to the order, the FBI intercepted additional wire

communications, including one on September 3, 2013, to which Brunson was a party and

evidence of which was presented at trial but did not form the basis for any substantive

count.

Finally, the government submitted a third application to extend the district court’s

second order, and again the application was in the same form as the previous two

applications, except that it disclosed that the application was authorized by Acting

Assistant Attorney General Mythili Raman. Again, the proposed order that the district

court signed on October 11, 2013, confirmed that the application had been authorized by

an appropriate official, but did not include Raman’s name. Pursuant to that order, the FBI

intercepted wire communications, to which Brunson was a party, between October 11

through October 24, 2013, which became the basis for Counts 3 through 7.

5 Brunson filed a pretrial motion to suppress the evidence obtained from the

intercepted communications on the ground that each of the district court’s orders

authorizing the interceptions failed to include the name of the official authorizing the

application, and thus each order was “insufficient on its face,” as that phrase is used in

18 U.S.C. § 2518

(10)(a)(ii). The district court denied the motion on the ground that the

wiretap orders substantially complied with the Wiretap Act because they were based on

and referred to the applications, which identified the authorizing officials both by title and

name.

The jury thereafter convicted Brunson on all 12 counts of the indictment.

Several months after Brunson was convicted, he filed a motion for a new trial based

on the intervening Supreme Court decision in Dahda v. United States,

138 S. Ct. 1491

(2018), in which the Supreme Court upheld as facially sufficient wiretap orders that

illegally authorized the interception of communications outside the district court’s

territorial jurisdiction. In its opinion, the Court explained that an order would be facially

insufficient if, for example, it “lack[ed] information that the wiretap statute [in

§§ 2518(4)(a)–(e)] require[d] it to include” but that the district court’s territorial

jurisdiction was not required to be included in wiretap orders. Dahda, 138 S. Ct. at 1499–

1500.

The district court denied Brunson’s motion for a new trial, ruling first that the

motion was untimely, as it was filed four months after Brunson’s conviction, and second,

that the Supreme Court’s holding in Dahda did not disturb its pretrial ruling denying

Brunson’s motion to suppress. In addition, the court noted that even though the wiretap

6 orders did not include the names of the officials authorizing the application, the orders

referred to the applications, which did include the names.

On September 24, 2018, the district court sentenced Brunson to life plus 60 months’

imprisonment. From the district court’s judgment dated September 25, 2018, Brunson filed

this appeal, contending that the district court erred in denying his motion to suppress

because the wiretap orders were facially insufficient as they failed to include the names of

the officials authorizing the various applications for the orders.

Almost three months after Brunson was sentenced and while this appeal was

pending, Congress enacted the First Step Act of 2018 (“FSA”),

Pub. L. 115-391, 132

Stat.

5194 (Dec. 21, 2018), which authorized some sentence reductions for offenses committed

“before the date of enactment of [the] Act, if [the] sentence for the offense ha[d] not been

imposed as of [the] date of enactment.” FSA § 401(c). Brunson filed a motion in the

district court on February 27, 2019, for a reduction of his sentence based on the FSA, and

on April 10, 2019, the district court denied the motion on the ground that the FSA did not

apply to Brunson because he was sentenced before the statute’s effective date. Brunson

also seeks review of the district court’s denial of FSA relief.

II

A

In support of his argument that the district court erred in denying his motion to

suppress evidence obtained by the wiretap orders, Brunson relies mainly on Dahda v.

United States,

138 S. Ct. 1491

(2018), which was decided after the district court ruled. He

7 argues that Dahda essentially overruled the test that the district court applied to uphold the

wiretap orders. According to Brunson, Dahda recognized that the Wiretap Act must be

enforced as written, and therefore a wiretap order that fails to identify the Department of

Justice official who had authorized the wiretap application, as required by § 2518(4)(d), is

insufficient, and the evidence obtained from the wiretap must be suppressed under

§ 2518(10)(a)(ii).

The government contends that the district court properly denied Brunson’s motion

to suppress because the wiretap orders were not facially insufficient, as the authorizing

officials “were specifically identified in the wiretap applications that accompanied the

orders and were referenced by and incorporated into the orders.” The government argues

further that Dahda, which acknowledges that not all facial defects render an order

insufficient, does not hold otherwise.

The Wiretap Act sets forth in detail procedures for the issuance of orders to allow

the interception of wire, oral, or electronic communications. To obtain a wiretap order

pursuant to the Act, the government must submit an application authorized by an

appropriately designated high-level Justice Department official to a judge of competent

jurisdiction and state the applicant’s authority to make such an application. See

18 U.S.C. §§ 2516

(1), 2518(1). On the basis of the application, the judge must make certain findings

to justify the issuance of the requested order. See

id.

at § 2518(3) (authorizing the entry of

an ex parte wiretap order if a judge determines, inter alia, that there is probable cause that

an individual is committing, has committed, or is about to commit an offense and that

normal investigative procedures will be unavailing or dangerous). If these requirements

8 are satisfied, the judge may issue an order authorizing the interception of wire, oral, or

electronic communications within the territorial jurisdiction of the court in which the judge

is sitting. See id. The order must specify:

(a) the identity of the person, if known, whose communications are to be intercepted;

(b) the nature and location of the communications facilities as to which, or the place where, authority to intercept is granted;

(c) a particular description of the type of communication sought to be intercepted, and a statement of the particular offense to which it relates;

(d) the identity of the agency authorized to intercept the communications, and of the person authorizing the application; and

(e) the period of time during which such interception is authorized, including a statement as to whether or not the interception shall automatically terminate when the described communication has been first obtained.

Id. § 2518(4) (emphasis added).

The Wiretap Act also regulates the use of communications intercepted pursuant to

a wiretap order. Section 2515 provides that “[w]henever any wire or oral communication

has been intercepted, no part of the contents of such communication and no evidence

derived therefrom may be received in evidence in any trial . . . if the disclosure of that

information would be in violation of this chapter.” The Act also authorizes “[a]ny

aggrieved person in any trial” to “move to suppress the contents of any wire or oral

communication intercepted pursuant to this chapter, or evidence derived therefrom, on the

grounds that — (i) the communication was unlawfully intercepted; (ii) the order of

authorization or approval under which it was intercepted is insufficient on its face; or

9 (iii) the interception was not made in conformity with the order of authorization or

approval.” Id. § 2518(10)(a) (emphasis added).

In Dahda, the Supreme Court considered wiretap orders that, contrary to the

Wiretap Act, included an authorization to intercept communications outside the territorial

jurisdiction of the issuing court, i.e., the District of Kansas. To address the consequence

of the defect, the Court looked to § 2518(10)(a)(ii), which requires suppression when a

wiretap order is facially insufficient. See

138 S. Ct. at 1494

. And in determining what

makes an order “insufficient,” the Court looked to §§ 2518(4)(a)–(e) (which requires

specific information, but not the order’s territoriality, to be included in an order), but it also

noted that insufficiency would not result from “each and every error that appears in an

otherwise sufficient order.” Id. at 1498. The Court concluded that although the orders

before it did in fact erroneously state the territorial area where they could lawfully be

enforced, that defect did not render the orders facially insufficient. Id. at 1499. The

territorial scope of the orders was evident from the authorizing judge’s territorial

jurisdiction — i.e., the District of Kansas — and the presumption in the statute that limited

the order’s scope to the issuing court’s jurisdiction. Id. The Court “fail[ed] to see how”

the error in describing the territorial scope of the orders “could render the Orders facially

insufficient,” because the information — the erroneous territorial provision — was

“surplus[age]” and was not required. Id.

Since the defect at issue did not implicate the requirements stated in §§ 2518(4)(a)–

(e), the Court did not address the consequence of a technical defect that might arise by a

failure to comply precisely with § 2518(4). Dahda,

138 S. Ct. at 1498

. Indeed, it stated

10 specifically that it was not resolving questions such as the consequence of a defect under

§ 2518(10)(a)(ii) based on “identifying the wrong Government official as authorizing the

application.” Id. In short, even though the government relied on courts of appeals cases

holding that defects arising from a failure to comply to the letter with the requirements of

§§ 2518(4)(a)–(e) did not warrant suppression, the Court refused to address the

consequence of such technical defects.

Because Dahda does not address how we, in this case, are to determine whether the

orders’ failure to include the names of authorizing officials renders them “insufficient,” we

must look elsewhere.

B

Brunson’s argument that the orders in this case failed adequately to include the

“identity . . . of the person authorizing the application” for each order, as required by

§ 2518(4)(d), arises from the undisputed fact that, even though each order described the

authorizing person by title, it did not include the person’s name, and reference to the name

in the application for the order was not an identification on the face of the order. He thus

contends that the orders were “insufficient on [their face],” requiring suppression under

§ 2518(10)(a)(ii) of any evidence derived from the wiretaps.

Each order in this case states that it was issued “pursuant to an application

authorized by an appropriate official of the Criminal Division, United States Department

of Justice, Deputy Assistant Attorney General, pursuant to the power delegated to that

official by special designation of the Attorney General.” Thus, while the orders identified

11 the authorizing official by title, they did not include the official’s name, instead referring

to the application where the name was provided. The question that Brunson thus presents

is whether the Wiretap Act requires that orders give the authorizing official’s name. But

his argument addressing that issue reveals that his framing of the issue is in fact incomplete.

Brunson agrees that if the orders stated that the “Attorney General,” without naming

him or her, authorized the application, the order would be sufficient because that title refers

to a unique, identifiable person. At the current time, for example, it is public knowledge,

or at least readily obtainable knowledge, that William P. Barr is the Attorney General.

Based on this logic, other courts have acknowledged that a name is not necessarily required

to provide identification. See, e.g., United States v. Scurry,

821 F.3d 1

, 8–9 (D.C. Cir.

2016) (holding that the identification requirement of the Wiretap Act is met “where the

language points unambiguously to a unique qualified officer holding a position that only

one individual can occupy at a time”). Brunson takes a different view, however, when an

order identifies a Deputy Assistant Attorney General in the Criminal Division as the

authorizing official because there are six persons who hold that title. Thus, he maintains

that reference to the “Attorney General,” without naming him is sufficient, but reference

to a Deputy Assistant Attorney General is not. Brunson’s own argument therefore indicates

that the issue of whether wiretap orders meet the identity requirement of § 2518(4)(d) rests

not on whether the authorizing official is named, but rather on whether the authorizing

officer is described with such particularity that only one person fits the description.

This recasting of the issue indeed comports more closely to what is required by the

text of the Wiretap Act, which employs the word “identity,” because that term is defined

12 to mean “the distinguishing character or personality of an individual,” Merriam-Webster’s

Collegiate Dictionary, 616 (11th ed. 2007) (emphasis added), and not necessarily the name

of the individual. Thus, when the statute requires that an order include the “identity” of

the person authorizing an action, the word “identity” requires a description of the person

that is sufficient to distinguish that person from others, but not necessarily the person’s

name. In short, whether a wiretap order sufficiently identifies a person turns on whether

the description of the person leads to but one person.

By this understanding then, when the order identifies the Attorney General by title

only as the authorizing official, it is sufficient because the Attorney General refers to one

person and his or her name, even though not given, can readily be obtained. With this same

reasoning, then, an “identification” by reference in an order to a Criminal Division Deputy

Assistant Attorney General would not, without more, be sufficient because there are six

such persons, and such identification simply by title would not point to the one person who

authorized the application.

The information contained in the orders in this case, however, is more complete than

a mere reference to one of six Criminal Division Deputy Assistant Attorney Generals. Each

order identifies, as the authorizing official, the Deputy Assistant Attorney General of the

Criminal Division of the Department of Justice who signed off on the application leading

to the issuance of the order. And the specific official who authorized the application was

readily obtainable from that application, which was submitted to the judge with the

proposed order and given to Brunson with the executed order. Thus, both the authorizing

judge and Brunson had a description sufficient to readily identify the one official who

13 authorized the application for the order. We therefore conclude that, in context, the orders

contained sufficient information to identify the authorizing officials.

Nonetheless, we would commend that, to avoid doubt and possible confusion in the

future, prosecutors include as a matter of prudence in wiretap orders both the title and name

of the official authorizing the application. And we understand that the Department of

Justice has already recognized this. Several years after the orders in this case were issued,

the Department sent a circular to all federal prosecutors recommending that the name of

the authorizing official be included in any proposed wiretap order.

At bottom, however, we conclude that the orders in this case, which identified the

officials authorizing the application by title and reference to the application where the

official’s name was included, were sufficient to satisfy the requirement of § 2518(4)(d).

C

Even were we to assume that perfect compliance with § 2518(4)(d) would entail the

inclusion of the authorizing official’s name in the text of the order itself, as Brunson argues,

we would conclude that the lack of such specificity is a defect that does not amount to an

insufficiency. See Dahda, 138 S. Ct. at 1497–99 (holding that while “the core concerns

test” applied in United States v. Giordano,

416 U.S. 505, 527

(1974), to § 2518(10)(a)(i)

should not be applied to § 2518(10)(a)(ii) (the provision before us), still “not every defect

[in complying with subparagraph (ii)] results in an insufficiency”). While Dahda did not

undertake to describe the scope of defects that would render wiretap orders insufficient

under § 2518(10)(a)(ii), it did cite to cases where technical errors were held not to require

14 suppression under that subparagraph. See United States v. Moore,

41 F.3d 370

, 375–76

(8th Cir. 1994) (order missing judge’s signature); United States v. Joseph,

519 F.2d 1068, 1070

(5th Cir. 1975) (order identifying the wrong Government official as authorizing the

application); United States v. Vigi,

515 F.2d 290, 293

(6th Cir. 1975) (same). Here, the

wiretap orders, even if not in perfect compliance, nonetheless substantially complied with

the requirements of § 2518(4)(a)–(e), as the statute does not specifically require the name

of the person authorizing the application. Each application was in fact appropriately

approved; each order disclosed by title the authorizing official; and both the court issuing

the wiretap orders and later Brunson had actual knowledge of the name of each authorizing

official. In these circumstances, the identification in the wiretap orders did not deny

Brunson any information required by § 2518(4)(a)–(e). We would therefore conclude that

the absence of the official’s name from the face of the orders, even if technically a defect,

is not the type of defect that would render these orders facially insufficient.

III

Finally, even if the wiretap orders were thought to be facially insufficient, Brunson’s

motion to suppress would have appropriately been denied under the good faith doctrine

articulated in United States v. Leon,

468 U.S. 897

(1984).

In Leon, the Supreme Court held that evidence “seized in reasonable, good-faith

reliance on a search warrant that is subsequently held to be defective” is not subject to

suppression, despite the existence of a constitutional violation.

468 U.S. at 905

. The Court

noted that the social costs of excluding evidence to vindicate Fourth Amendment rights are

15 high, as the exclusion impedes the truth-finding functions of the judge and jury and

possibly results in guilty defendants going free or receiving reduced sentences. See

id. at 907

. And suppressing evidence “obtained in objectively reasonable reliance on a

subsequently invalidated search warrant” has only “marginal or nonexistent” benefits in

terms of deterring Fourth Amendment violations.

Id. at 922

. Thus, the Court observed,

where an officer acts in good faith, the benefits of suppressing the fruits of an invalid

warrant are outweighed by the harms of doing so. See

id.

While Leon carved out an exception to the judicially created exclusionary rule and

this case involves a statutory exclusionary rule, we note that when Congress enacted the

Wiretap Act, it did so against the backdrop of analogous Fourth Amendment jurisprudence.

Indeed, the accompanying Senate Report specifically states that the statutory suppression

remedy was designed to “largely reflect[] existing law.” S. Rep. No. 90-1097 (1968), as

reprinted in 1968 U.S.C.C.A.N. 2112, 2185. Moreover, Leon’s rationale is equally

applicable in the statutory suppression context — “when law enforcement officers have

acted in objective good faith or their transgressions have been minor,” requiring

suppression of evidence confers an unearned benefit on a guilty defendant that “offends

basic concepts of the criminal justice system.” Leon,

468 U.S. at 908

. Moreover, in the

same vein, the Supreme Court has specifically recognized that not every defect in a wiretap

order justifies exclusion under the Wiretap Act’s suppression provision. See Dahda,

138 S. Ct. at 1498

.

Thus, we conclude that where law enforcement officials have acted reasonably and

in good faith to comply with the central substantive requirements of the Wiretap Act, as is

16 the case here, suppression is not justified. See Moore, 41 F.3d at 376–77 (holding that the

good faith exception applied to the government’s interception of communications pursuant

to a wiretap order that was missing the judge’s signature); United States v. Brewer,

204 F. App’x 205, 208

(4th Cir. 2006) (per curiam) (unpublished) (holding in the alternative that

law enforcement officers “were entitled to rely on facially valid wiretap orders pursuant to

the good faith exception”). Even though the wiretap orders submitted by the government

did not contain the names of the authorizing officials, the accompanying applications did.

More importantly, there was plainly no attempt to obfuscate the identity of the relevant

officials, nor did the government fail to secure proper authorization for the applications

submitted. And at the time the orders in question were issued in 2013, no court of appeals

had held that a failure to include the name of the authorizing officer in the wiretap order

rendered such an order substantively deficient. Indeed, numerous courts had considered

challenges to similar orders and held that communications intercepted under those orders

were not subject to suppression. See, e.g., United States v. Gray,

521 F.3d 514

, 526–28

(6th Cir. 2008) (holding that the omission of the name of the authorizing officer from a

wiretap order was a technical defect that did not require suppression); United States v.

Callum,

410 F.3d 571, 576

(9th Cir. 2005) (same); United States v. Fudge,

325 F.3d 910, 918

(7th Cir. 2003) (same); United States v. Radcliff,

331 F.3d 1153, 1162

(10th Cir. 2003)

(same) (noting that “[e]very circuit to consider the question has held that § 2518(10)(a)(ii)

does not require suppression if the facial insufficiency of the wiretap order is no more than

a technical defect” (quoting Moore,

41 F.3d at 374

)). Finally, when the D.C. Circuit

declined to follow this line of cases, holding in 2016 that the omission of the authorizing

17 officer’s name rendered a wiretap order facially insufficient for purposes of

§ 2518(10)(a)(ii), see Scurry, 821 F.3d at 8–12, the Department of Justice changed its

practice to ensure that future orders did contain the name of the authorizing official.

In short, any defects in orders issued prior to 2016 resulted from good faith efforts

to comply with the requirements of the Wiretap Act and not from intentional wrongdoing

and therefore would not require suppression of the evidence obtained.

IV

Addressing his sentencing, Brunson contends that the First Step Act, which was

enacted on December 21, 2018, during the pendency of this appeal, invalidates the

mandatory life sentence imposed by the district court. As he correctly notes, § 401 of the

FSA reduced the mandatory term of life imprisonment without release previously required

under

21 U.S.C. § 841

(b)(1)(A) to a mandatory 25-year term. See FSA § 401(a)(2)(A)(ii).

But because Brunson was sentenced prior to the FSA’s enactment, the benefits of § 401

are not available to him. Section 401(c) of the Act, addressing the section’s “Applicability

to Pending Cases,” provides that § 401 “shall apply to any offense that was committed

before the date of enactment of this Act, if a sentence for the offense has not been imposed

as of such date of enactment.” FSA § 401(c) (emphasis added).

Brunson argues that the statutory language should be construed to extend the Act’s

coverage to “non-final criminal cases pending on direct review at the time of enactment.”

This reading, however, is contrary to the plain meaning of the statute’s text, which on its

face restricts applicability to defendants whose sentences had not yet been “imposed” at

18 the time of the Act’s enactment, and a sentence is “imposed” when it is pronounced by the

sentencing court, i.e., the district court. Indeed, we recently recognized as much in United

States v. Jordan,

952 F.3d 160

(4th Cir. 2020), which held that § 403 of the FSA, which

contains the same retroactivity provision as does § 401, did not apply to a defendant whose

sentence was pronounced — but not finalized after direct appeal — prior to the FSA’s

enactment. See id. at 172.

As we noted in Jordan, this common-sense understanding is consistent with

numerous provisions of federal law that govern sentencing in the district court. See, e.g.,

18 U.S.C. § 3553

(a) (listing “factors to be considered [by the district court] in imposing a

sentence” emphasis added));

21 U.S.C. § 851

(b) (“If the United States attorney files an

information under this section, the court shall after conviction but before pronouncement

of sentence . . . inform [the defendant] that any challenge to a prior conviction which is not

made before sentence is imposed may not thereafter be raised to attack the sentence”

(emphasis added)). Unlike district courts, a court of appeals does not “impose” sentences.

Its role is limited to affirming or vacating the sentence imposed by the district court. See

Jordan,

952 F.3d at 172

(“[I]mposing sentences is the business of the district courts, while

courts of appeals are tasked with reviewing them” (quoting United States v. Aviles,

938 F.3d 503, 510

(3d Cir. 2019))).

To support his argument to the contrary, Brunson relies on United States v. Clark,

110 F.3d 15, 17

(6th Cir. 1997), where the court held that

18 U.S.C. § 3553

(f) (the safety

valve statute applying “to all sentences imposed on or after” the date of enactment) applied

to cases pending on appeal when the statute was enacted. In reaching this conclusion, the

19 Sixth Circuit reasoned that the safety valve statute should be applied broadly and noted that

“[a] case is not yet final when it is pending on appeal. The initial sentence has not been

finally ‘imposed’ within the meaning of the safety valve statute because it is the function

of the appellate court to make it final after review or see that the sentence is changed if in

error.”

Id.

But in Jordan, we rejected a request to extend Clark to § 403 of the FSA, noting

that we could find “no other circuit court decision applying [Clark’s] definition of

‘imposed’ even under the statute at issue in Clark, let alone applying it in any other

context.” Jordan,

952 F.3d at 173

. In short, we find Clark’s reasoning unpersuasive and

decline to extend its holding to § 401 of the FSA.

Brunson also argues that a “presumption of retroactivity” requires applying the

FSA’s amendments to sentences that were not final at the time of enactment, citing Bradley

v. School Bd. of City of Richmond,

416 U.S. 696

, 710–12 (1974). But Bradley stands only

for the proposition that a change in the law may be given effect in pending cases even in

the absence of clear legislative intent.

Id. at 715

. Here, in contrast to Bradley, Congress

did expressly provide for retroactive application of the changed law, but it limited that

application to defendants whose sentences had not been imposed as of the date the law was

enacted.

At bottom, we conclude that the FSA does not provide any benefit to Brunson.

* * *

The judgment of the district court is accordingly

AFFIRMED.

20 DIANA GRIBBON MOTZ, Circuit Judge, dissenting:

The plain language of

18 U.S.C. § 2518

(4), as the Supreme Court recognized in

Dahda v. United States,

138 S. Ct. 1491

(2018), forecloses any holding that the wiretap

orders relied on here were facially sufficient. Accordingly, I must dissent.

I.

A.

Title III of the Omnibus Crime Control and Safe Streets Act of 1968, codified at

18 U.S.C. § 2510

et seq. (“Title III”), has the “dual purpose” of protecting individual privacy

and setting forth uniform conditions for law enforcement interception of wire and oral

communications. S. Rep. No. 90-1097, at 66 (1968). The statute balances the need to

combat serious crime and the equally pressing imperative of safeguarding individual

privacy from government overreach. See

id.

at 66–67. It does so by prohibiting all

interstate interceptions of wire, oral, and electronic communications with limited

exceptions, such as for law enforcement to investigate specified types of serious crime. Cf.

United States v. Hoffman,

832 F.2d 1299, 1306

(1st Cir. 1987) (“[I]n a society which values

privacy and the rights of the individual, wiretapping is to be distinctly the exception — not

the rule.”).

Title III specifies the obligations of both law enforcement and the authorizing court.

It requires law enforcement to submit a detailed wiretap application to a court of competent

jurisdiction and delineates the specific information that must be contained in that

application.

18 U.S.C. § 2518

(1). Only after a court independently makes the findings

21 required by the statute can it issue an order authorizing the interception.

Id.

§ 2518(3).

Title III also separately lists the information that must appear in the court’s order. Id.

§ 2518(4). It is the court’s order, not the application, that authorizes the interception and

provides a defense to civil penalties for unauthorized snooping. Id. § 2520(d)(1). An

application without a subsequent court order is, legally speaking, no more than a piece of

a paper. 1

B.

An individual may move to suppress evidence obtained via wiretap and any

information derived therefrom if: “(i) the communication was unlawfully intercepted; (ii)

the order of authorization or approval under which it was intercepted is insufficient on its

face; or (iii) the interception was not made in conformity with the order of authorization or

approval.”

18 U.S.C. § 2518

(10).

The Supreme Court has interpreted § 2518(10) on several occasions, most recently

in Dahda v. United States,

138 S. Ct. 1491

(2018). See also United States v. Donovan,

429 U.S. 413

(1977); United States v. Chavez,

416 U.S. 562

(1974); United States v. Giordano,

416 U.S. 505

(1974). Together, these cases clarify the distinction between an “unlawful[]”

wiretap under § 2518(10)(a)(i) and a wiretap authorized by an order that is “insufficient on

its face” under § 2518(10)(a)(ii).

As Giordano established and Dahda reaffirmed, a wiretap is “unlawful[]” within

the meaning of subparagraph (i) if the wiretap violates those Title III statutory provisions

1 There is a limited exception, not relevant here, for specific “emergency situation[s]” enumerated by the statute.

18 U.S.C. § 2518

(7). 22 that implement the wiretap-related congressional concerns motivating passage of Title III.

Giordano, 416 U.S. at 527 (“[W]e think Congress intended to require suppression where

there is failure to satisfy any of those statutory requirements that directly and substantially

implement the congressional intention to limit the use of intercept procedures to those

situations clearly calling for the employment of this extraordinary investigative device.”). 2

Following Giordano, courts assessing whether a wiretap was “unlawfully intercepted”

pursuant to subparagraph (i) look to whether the Department of Justice has substantially

complied with Title III’s requirements and will suppress the wiretap evidence only if the

alleged impropriety implicates those core concerns. This assessment has become known

as the “core concerns” test. Dahda,

138 S. Ct. at 1498

(referring to the “core concerns

test”).

For many years, some courts applied Giordano’s core concerns test not only to

evaluate whether a wiretap was “unlawful[]” under subparagraph (i) but also to determine

whether it was “insufficient on its face” under subparagraph (ii). So long as the Department

of Justice substantially complied with Title III’s core concerns, these courts deemed

suppression unwarranted, even where the defendant challenged an order as facially

insufficient under subparagraph (ii). For example, most courts refused to find wiretap

orders “insufficient on [their] face” under subparagraph (ii) where the order failed to name

the authorizing official, so long as the wiretap application had in fact been authorized by

2 A wiretap may also be unlawful under subparagraph (i) if it violates the Constitution, for example where the Government lacks probable cause. See Giordano, 416 U.S. at 525–26.

23 an appropriate official. See, e.g., United States v. Callum,

410 F.3d 571, 576

(9th Cir.

2005); United States v. Radcliff,

331 F.3d 1153

, 1160–63 (10th Cir. 2003); United States

v. Traitz,

871 F.2d 368, 379

(3d Cir. 1989). 3

In Dahda, the Supreme Court implicitly overruled those cases, holding that

Giordano’s “core concerns” analysis applies only to subparagraph (i), and does not apply

to the question of whether a wiretap order is “insufficient on its face” under subparagraph

(ii). Dahda,

138 S. Ct. at 1498

(concluding “that subparagraph (ii) does not contain a

Giordano-like ‘core concerns’ requirement”).

The Dahda Court reasoned that, unlike the assessment of whether a wiretap is

unlawful under subparagraph (i), which looks to whether the Government has substantially

complied with the statute’s objectives, the assessment of whether an order is facially

insufficient under subparagraph (ii) is a mechanical test: if the order does not contain the

information required by § 2518(4), it is facially insufficient:

It is clear that subparagraph (ii) covers at least an order’s failure to include information that § 2518(4) specifically requires the order to contain. An order lacking that information would deviate from the uniform authorizing requirements that Congress explicitly set forth, while also falling literally within the phrase “insufficient on its face.”

Id. (emphases added) (citations omitted).

3 Reflecting confusion on this issue, prior to Dahda, some courts failed to explain whether they refused to suppress pursuant to subparagraph (i) or subparagraph (ii), presumably because they applied the same core concerns test regardless of the statutory basis for suppression. See, e.g., United States v. Gray,

521 F.3d 514

, 526–28 (6th Cir. 2008); United States v. Fudge,

325 F.3d 910, 918

(7th Cir. 2003). 24 In sum, when assessing facial sufficiency under subparagraph (ii), Giordano’s “core

concerns” test is irrelevant. Rather, Dahda’s test controls.

Id.

The Dahda analysis is

simple: when an order lacks the information that 2518(4) specifically requires, it must be

suppressed as insufficient on its face. See also United States v. Scurry,

821 F.3d 1, 8, 13

(D.C. Cir. 2016) (adopting the mechanical test to determine whether an order is facially

sufficient).

II.

Given that § 2518(4)(d) specifically requires that a wiretap order contain the

“identity . . . of the person” who authorized the wiretap application, a straightforward

application of Dahda requires us to hold that failure to provide the “identity of the person”

who authorized the application in the orders challenged here is a defect that renders them

“insufficient on [their] face” under subparagraph (ii) of § 2518(10)(a). Accordingly, the

district court should have suppressed the wiretaps and any “evidence derived therefrom.”

18 U.S.C. § 2518

(10)(a).

A.

At oral argument, the Government twice acknowledged that it was the position of

the Department of Justice that § 2518(4)(d)’s requirement that an order containing the

“identity . . . of the person” means the name of the Deputy Assistant Attorney General

official who authorized the order, which is precisely what the orders here lacked. Oral Arg.

at 19:49–20:41; see also id. at 33:21–34:22. I see no reason to construe “identity” to mean

anything different. 25 But, despite its concession, the Government claims that omission of the names of

the authorizing officials here is without consequence because the orders assertedly

incorporate by reference their names from the applications. According to the Government,

“an order that does not itself identify the authorizing official by name, but incorporates a

wiretap application that does name the official, complies with Section 2518(4)(d).” Supp.

Br. at 16. The Government maintains that because the orders at issue here cross-reference

the wiretap applications, the judge and the defendant could verify that the Department of

Justice had complied with Title III’s requirements.

There are several problems with this argument. The first is that it is in considerable

tension with Title III itself. If incorporation by reference were acceptable, the entire order

would need be little more than a single sentence incorporating the application by reference.

This would eviscerate Title III, which enumerates in § 2518(1) the precise information

required to be contained in an application and separately enumerates in § 2518(4) the

precise information required in an order. At bottom, the Government’s argument amounts

to an assertion that a wiretap application can be a substitute for a wiretap order, an approach

that Congress plainly rejected. I cannot accept the Government’s unwitting koan that an

order can be facially sufficient by referring to an external document. As the D.C. Circuit

explained in factually indistinguishable circumstances:

Title III’s facial sufficiency inquiry is limited to the four corners of the wiretap order. There is something incongruous about an interpretation that would let extrinsic documents transform an order that is “insufficient on its face” into one that is sufficient “on its face.” Further, the Government’s interpretation would allow it, in every case, to satisfy Title III’s order identification requirement by satisfying its application identification requirement, effectively rendering section 2518(4)(d) superfluous.

26 Scurry,

821 F.3d at 9

(citations omitted).

Moreover, the Government’s theory rests on the unfounded assumption that the

applications and orders necessarily move together. The D.C. Circuit remarked on the

problem with the logic in this argument: the “complete overlap” between the information

required in the order and application “makes little sense if Congress expected the order

always to travel with the application.”

Id. at 10

. Moreover, as the Government

acknowledged at oral argument, while it aims to keep these documents together, it cannot

guarantee that they remain so. When asked if there was a uniform, mandatory method of

keeping the wiretap applications and orders together, the Government’s answer was

“probably not.” Oral Arg. at 35:35–36:56. Accordingly, the Government has not and

cannot establish that the underlying applications always move with the orders.

In the case at hand, the Government implies that its incorporation by reference

theory would cause no harm because these documents traveled together. Supp. Br. at 16–

17 (explaining both the issuing judge and Brunson were provided with the applications,

which included the authorizing officials’ names). In fact, it is not clear that they did in this

case, 4 or that it is uncommon for problems to arise related to accounting for these papers

over time. See Traitz,

871 F.2d at 376

(noting that draft order was missing a page when it

4 Brunson’s pro se suppression motion suggests that he did not receive all of the orders at issue in this case, although he implies that he received all the applications. See Mot. Suppress 2 ECF No. 1969 (referencing applications, including July 31 application, but noting that he “never received [the July 31st, 2013 order] in discovery materials”); id. at 6 (“No order for original interception for target phones #7, #8, #9 from July 31, 2013.”). 27 was signed by the district judge). Thus, I am unable to accept an incorporation by reference

argument that is based on the unproven assumption that these documents remain together.

Additionally, despite the Government’s argument that specific language in the

orders incorporates the applications by reference, I am skeptical that this language clearly

does so. Compare the language in the orders, prepared by the Government, which the

Government now asserts incorporates the applications by reference: “pursuant to an

application authorized by an appropriate official” and “full consideration having been

given to the matters set forth therein,”; with the explicit incorporation by reference in one

of the Government’s wiretap applications in this case: “[o]n the basis of the allegations

contained in this application and on the basis of the Affidavit of Special Agent [omitted],

which is fully incorporated herein by reference.” (emphasis added). As evidenced by the

latter example, the Government knows how to clearly incorporate by reference when it

intends to do so. The language in the orders hardly constitutes a clear statement of intent

to incorporate the applications by reference.

B.

Rather than relying on the Government’s incorporation by reference theory, the

majority offers a theory of its own, one that the Government has expressly disavowed. Oral

Arg. at 33:21–34:48. The majority’s starting point is the Government’s asserted belief that

an order may identify the Attorney General as the authorizing official by title alone. 5

According to the majority, this reasoning means that every authorizing official can be

5 I express no view regarding whether an order that identifies the Attorney General by title but not name would be sufficient on its face, as that question is not presented. 28 identified by title rather than by name, so long as the official “is described with such

particularity that only one person fits the description.” Maj. Op. at 12. Thus, the majority

concludes that “whether a wiretap order sufficiently identifies a person turns” not on that

person’s name, but “on whether the description of the person leads to but one person.” Id.

at 13.

The problem with this argument, as the Government recognizes, is that the title of

the authorizing officials other than the Attorney General do not “lead to but one person” —

which is why the Government concedes that the most natural understanding of the

“identity” in this context means name, not title. As the D.C. Circuit explained in rejecting

the majority’s argument:

The text is plain and unambiguous; every wiretap court order must identify the individual high-level Justice Department official who . . . authorized the underlying wiretap application. This requirement may be met where the language points unambiguously to a unique qualified officer holding a position that only one individual can occupy at a time, but here there is more than one Deputy Assistant Attorney General and no individual Deputy is identified on the face of [the challenged] wiretap orders. This would appear to end this part of our inquiry.

Scurry, 821 F.3d at 8–9.

In sum, the majority’s definitional sleight of hand cannot cover up its flawed logic:

there simply is not enough information on the face of these orders to sufficiently ascertain

the “identity” of the specific official at the Department of Justice who authorized the

applications. The majority can claim that the orders provided enough of a description to

“lead to but one person” only by reference to the applications. See Maj. Op. at 13

(reasoning that because the orders referred to the official “who signed off on the

29 application,” and “the specific official who authorized the application was readily

obtainable from that application,” the orders were facially sufficient). In other words, this

is but a variation of the Government’s incorporation by reference theory. It fails for the

same reasons. An order cannot be sufficient on its face by reference to an external

document.

The other problem with the majority’s analysis is its suggestion that the

Government’s substantial compliance with the core concerns of the statute is relevant to

the inquiry concerning whether the orders are sufficient on their face. For example, the

majority explains that the wiretap orders were sufficient in part because “the applications

were in fact appropriately authorized,” id. at 3, and the orders were not defective because

“[e]ach application was in fact appropriately approved” and “both the court issuing the

wiretap orders and later Brunson had actual knowledge of the name of each authorizing

official,” id. at 15. But, as the Government has recognized, the Supreme Court in Dahda

explicitly rejected an approach that assesses facial sufficiency by reference to whether the

Government has substantially complied with Title III; instead, Dahda directs courts to

determine whether, on its face, a wiretap order contains the information required by

§ 2518(4). See Dahda,

138 S. Ct. at 1498

. 6

Dahda’s explicit disavowal of the core concerns test in determining facial

sufficiency under subparagraph (ii) was no anomaly. It has been the Supreme Court’s

6 The Government conceded at oral argument that, after Dahda, “substantial compliance” could not cure a facially insufficient warrant, as Dahda explicitly rejected applying a “core concerns” test in the context of 2518(10)(a)(ii). Oral Arg. at 23:30–23:50. 30 consistent position for more than forty years that each of the three subparagraphs requiring

suppression under § 2518(10)(a) must be given independent effect. See Dahda,

138 S. Ct. at 1498

(“The underlying point of Giordano’s limitation was to help give independent

meaning to each of § 2518(10)(a)’s subparagraphs. It thus makes little sense to extend the

core concerns test to subparagraph (ii) . . . .”); Giordano,

416 U.S. at 527

(“[I]t does appear

that paragraphs (ii) and (iii) must be deemed to provide suppression for failure to observe

some statutory requirements that would not render interceptions unlawful under paragraph

(i).”). Dahda’s embrace of a mechanical test when assessing facial sufficiency under

subparagraph (ii) is necessary to give independent meaning to each of § 2518(10)(a)’s three

bases for suppression. In stating that the orders here are facially sufficient in part because

they were in fact appropriately authorized, the majority has conflated errors under

subparagraph (i) with errors under subparagraph (ii). 7 Consequently, the majority’s

analysis will sow unnecessary confusion among district courts and litigants alike.

7 Resisting the conclusion that Dahda resolves this case, the majority maintains that the failure of the orders to contain the names of the authorizing officers is merely a technical defect, and Dahda “did not address the consequence of a technical defect that might arise by a failure to comply precisely with § 2518(4).” Maj. Op. at 10. Dahda did leave open the question of how broadly lower courts should construe the class of errors that result in facial insufficiency.

138 S. Ct. at 1498

. But the error here is squarely controlled by the Dahda Court’s explicit reasoning. See

id.

(“It is clear that subparagraph (ii) covers at least an order’s failure to include information that § 2518(4) specifically requires the order to contain.” (emphasis added)). The Court’s unambiguous language thus forecloses the argument that the kind of error here — the omission of the identity of the authorizing official, which is one of the pieces of information that § 2518(4) requires — can ever result in a facially sufficient order. In short, the majority’s supposition that this type of error was unresolved in Dahda is baseless. 31 III.

Perhaps recognizing the logical contortions required of its holding, the majority (in

what is plainly dicta) also adopts the Government’s alternative argument that we should

apply the good faith exception set forth in United States v. Leon,

468 U.S. 897

(1984).

Invocation of Leon in the Title III context is misguided. The exception is relevant in cases

of constitutional suppression; it is a judicially created exception to a judicially created

remedy to protect a constitutional right. See

id. at 906

. This, however, is not a

constitutional case; the statute controls, and the statute does not provide a good faith

exception. Cf. Giordano,

416 U.S. at 524

(“The issue [of suppression] does not turn on the

judicially fashioned exclusionary rule aimed at deterring violations of Fourth Amendment

rights, but upon the provisions of Title III . . . .”). Rather, the statute directs a court to

suppress orders that are “insufficient on [their] face.”

18 U.S.C. § 2518

(10)(a)(ii).

Accordingly, as the Government itself acknowledged at oral argument, the Supreme Court

has never imported the good faith exception into Title III. Oral Arg. at 28:26–28:34.

In opining to the contrary, the majority relies in part on its observation that, with

respect to Title III, Congress legislated “against the backdrop of analogous Fourth

Amendment jurisprudence” and that Congress intended the suppression remedy to “largely

reflect[] existing law.” Maj. Op. at 16. This is uncontroversial — as far as it goes. But

Congress enacted Title III almost twenty years before the Supreme Court issued Leon.

Thus, in so legislating, Congress could hardly have intended Title III to reflect the Leon

rule that did not yet exist. See United States v. Rice,

478 F.3d 704, 713

(6th Cir. 2007) 32 (“Congress obviously could not know that Fourth Amendment search and seizure law

would embrace a good-faith exception sixteen years after the passage of Title III, and the

language from the Senate Report indicates a desire to incorporate only the search and

seizure law that was in place at the time of the passage of Title III.”). Nor has Congress

subsequently amended Title III to provide for such an exception.

The majority also leans on Leon’s policy rationales to support its conclusion that we

should import Leon into the Title III context. The majority believes it is unfair to law

enforcement to “confer[] an unearned benefit on a guilty defendant” for a mistake made in

good faith. Maj. Op. at 16. Importing this reasoning is into Title III is a fundamentally

flawed exercise. Whether to “confer[]” such a “benefit” is not a choice that we are free to

make. The decision whether to suppress evidence, and in what circumstances, constitute

policy judgments already expressly made by Congress. We do not have the authority to

disregard those judgments. See Nickey Gregory Co., LLC v. AgriCap, LLC,

597 F.3d 591, 608

(4th Cir. 2010) (Niemeyer, J.) (“The judiciary, however, should not insert itself in these

policy matters by questioning or debating legislative judgments, as it is constituted only to

comprehend, interpret, and apply what Congress has duly provided.”).

IV.

The Government’s last refuge, an argument that the majority does not adopt, is that,

if suppression is warranted and the good-faith exception does not apply, any error was

harmless because of the “overwhelming, independent” non-wiretap evidence against

33 Brunson. Supp. Br. at 9. Assuming harmless error applies, 8 however, examination of the

trial record renders laughable the Government’s contention that “the intercepted wire

communications were a small part of the [G]overnment’s overall case.” Supp. Br. at 22.

In fact, the record reveals that the intercepted calls were unquestionably the linchpin

of the Government’s case. The calls were repeatedly played for the jury and were discussed

throughout the trial by the Government and its witnesses (including Greenan, Wright,

Ravenel, Gates, and Davis). See, e.g., JA 88–91 (FBI agent testifying about contents of

wiretaps), 94–95 (same); JA 96 (intercepted wiretap audio recording played for the jury),

97 (same), 99 (same), 102 (same), 233 (same), 234 (same), 248 (same), 256 (same), 259

(same), 262 (same), 264 (same), 266 (same), 270 (same), 271 (same), 273 (same), 280

(same), 284 (same), 285 (same), 288 (same), 290 (same), 291 (same), 406 (same), 427

(same), 467 (same), 511 (same). Given the Government’s repeated use of and reference to

8 Some out-of-circuit precedent suggests harmless error applies in the Title III context. See, e.g., United States v. Quintero,

38 F.3d 1317, 1331

(3d Cir. 1994). We have previously declined to apply harmless error to a Title III case but have never squarely determined whether it would be appropriate to do so. See United States v. Crabtree,

565 F.3d 887, 892

(4th Cir. 2009). However, the conclusion that a harmless error analysis is appropriate is neither obvious nor compelled by controlling authority. Federal Rule of Criminal Procedure 52(a) generally requires courts to apply harmless error to all trial errors. See Neder v. United States,

527 U.S. 1, 7

(1999). See generally Kotteakos v. United States,

328 U.S. 750

, 760–65 (1946). But Rule 52(a) is a congressional command that can be overridden by statute. In Zedner v. United States,

547 U.S. 489

(2006), the Court rejected the Government’s argument that harmless error applied in the Speedy Trial Act context.

Id.

at 507–09. The critical test, according to the Court, was Congress’s intent, shown in part through that statute’s “detailed requirements . . . regulating ends-of-justice continuances.”

Id. at 508

. Of course, the Speedy Trial Act is not Title III. I assume harmless error applies here, as Brunson appears to have conceded the point, but I note that, following Zedner, there is at least a colorable argument as to whether harmless error has been displaced by Title III’s detailed requirements governing suppression.

34 these tapes throughout the trial, it is impossible to conclude that discussing and playing

these incriminating audio recordings did not substantially influence the jury’s view of

Brunson’s culpability. This certainly is sufficient to conclude that the error was not

harmless. See Kotteakos v. United States,

328 U.S. 750, 765

(1946) (“The inquiry cannot

be merely whether there was enough [evidence] to support the result, apart from the phase

affected by the error. It is rather, even so, whether the error itself had substantial influence.

If so, or if one is left in grave doubt, the conviction cannot stand.”).

V.

For the foregoing reasons, I respectfully dissent. 9

9 Because I believe Brunson’s conviction should ultimately be vacated on the count related to his First Step Act motion, I do not address that claim. 35

Reference

Cited By
10 cases
Status
Published