                                                                 FILED
                                                     United States Court of Appeals
                      UNITED STATES COURT OF APPEALS         Tenth Circuit

                                TENTH CIRCUIT                                April 12, 2013
                       ___________________________________
                                                                         Elisabeth A. Shumaker
                                                                             Clerk of Court
UNITED STATES OF AMERICA,

       Plaintiff-Appellee,
v.                                                     Nos. 11-3130 & 11-3138
GLADSTONE McDOWELL,                               (D.C. No. 2:09-CR-20133-JWL-1)
                                                              (D. Kan.)
       Defendant-Appellant.
                   ___________________________________
                           ORDER AND JUDGMENT*
                      ____________________________________

Before LUCERO, BALDOCK, and TYMKOVICH, Circuit Judges.
                ____________________________________

       A jury convicted Defendant Gladstone McDowell on five charges arising from his

involvement in a drug trafficking conspiracy. The jury heard evidence obtained through

a wiretap of Defendant’s cellular phone and the phones of some of his co-conspirators.

On this appeal, we consider whether the district court abused its discretion in authorizing

the wiretaps. We have jurisdiction under 28 U.S.C. § 1291, and we affirm.

                                             I.

       The facts relating to the underlying marijuana trafficking conspiracy are set forth

more fully in United States v. Stephen Blackburn, --- F. App’x ---, No. 11-3294 (10th

Cir. 2013) (unpublished). The facts relevant to this case are as follows. In November


       *
         This order and judgment is not binding precedent except under the doctrines
of law of the case, res judicata, and collateral estoppel. It may be cited, however, for its
persuasive value consistent with Fed. R. App. P. 32.1 and 10th Cir. R. 32.1.
2007, Defendant was a passenger in a vehicle stopped on U.S. Highway 54 in Goodwell

County, Oklahoma. Police found $139,980 in cash in the vehicle, which Defendant

claimed verbally and in writing. In March 2008, the Drug Enforcement Administration

(DEA) began investigating Defendant and other persons for suspected drug trafficking in

the Kansas City, Missouri, area.

      In April 2009, DEA investigators applied to the U.S. District Court for the District

of Kansas for authorization to intercept wire communications from a number of suspects’

telephones, including Defendant’s cellular phone.      The affidavits in support of the

application detailed the techniques already used in the investigation, including physical

surveillance, pen registers, internet record searches, review of financial records, trash

searches, and interviews with confidential informants. By August 2009, or sometime

thereafter, the district court had authorized wiretaps for seven telephones, including

Defendant’s. The intercepts allowed investigators to identify packages of suspected

marijuana that were shipped from UPS stores in Phoenix, Arizona, and delivered to

addresses in or near Kansas City, Missouri.

      In November 2009, a federal grand jury issued a ten-count indictment against

Defendant and nineteen others. The superseding indictment charged Defendant with the

following five counts: (1) conspiracy to possess with intent to distribute 1000 kilograms

or more of marijuana, (2) participating in a continuing criminal enterprise, (3) conspiracy

to commit money laundering, (4) money laundering, and (5) attempted possession of

more than 50 kilograms of marijuana with intent to distribute. Prior to trial, Defendant

sought to suppress wiretap evidence against him on the basis that the wiretaps had been

                                           -2-
obtained in violation of 18 U.S.C. § 2518(1)(c). The district court denied this motion to

suppress, and a petit jury convicted Defendant on all five counts. The district court

sentenced him to 324 months’ imprisonment. Defendant now appeals the district court’s

denial of his motion to suppress.

                                            II.

       Federal law requires the Government to obtain a court order before intercepting

wire or other electronic communications. 18 U.S.C. § 2518(3). An appropriate court

may authorize the intercept if it determines, among other things, that the wiretap is

necessary—that is, normal investigative procedures have failed or are likely to fail.

§ 2518(3)(c). Thus, an application for a wiretap order must include “a full and complete

statement as to whether or not other investigative procedures have been tried and failed or

why they reasonably appear to be unlikely to succeed if tried or to be too dangerous.”

§ 2518(1)(c). If the Government fails to comply with the statutory requirements, the

evidence obtained through the wiretap must be suppressed. § 2515. United States v.

Faulkner, 439 F.3d 1221, 1223 (10th Cir. 2006).

       Defendant makes two arguments based on the wiretap statutes. First, he argues

the Government did not submit a “full and complete statement” in support of necessity

because it withheld material information. Second, he argues the district court erred in

concluding the wiretaps were necessary.

                                            A.

       We ordinarily review de novo whether the Government presented a full and

complete statement in support of a wiretap. United States v. Verdin-Garcia, 516 F.3d

                                           -3-
884, 890 (10th Cir. 2008). This inquiry is usually straightforward, requiring us to look at

the affidavit and see if it is complete. Here, however, Defendant claims the Government

“withheld information uncovered as part of the prior traditional investigation.”

Appellant’s Br. at 11. In this situation, we naturally must look beyond the four corners of

the affidavit to the allegedly omitted information.     But Defendant was not able to

introduce any of this information below because the district court denied him an

evidentiary hearing.

       We have held that evidentiary hearings in the context of wiretap applications are

subject to the requirements of Franks v. Delaware, 438 U.S. 154 (1978) and its progeny.

See United States v. Green, 175 F.3d 822, 828 (10th Cir. 1999). Franks held in the

Fourth Amendment context that a defendant could challenge a facially sufficient affidavit

supporting a search warrant on the basis that the police knowingly, intentionally, or

recklessly included false information. Franks, 428 U.S. at 155–56. If a defendant makes

a substantial showing of a Franks violation, “the Fourth Amendment requires that a

hearing be held at the defendant’s request.” Id. at 156. We have extended the Franks

framework to omissions of material information, which is what Defendant claims

occurred here. Green, 175 F.3d at 828.

       In the district court, Defendant argued the court would “need to hear evidence

from the Government to determine whether the requesting agent gave a ‘full and

complete statement’ to the issuing judge for each affidavit.” Record on Appeal (“ROA”),

vol. I at 135. The district court correctly concluded Franks provided the standard for



                                           -4-
                                                                               1
determining whether Defendant was entitled to an evidentiary hearing.              The court

concluded Defendant failed to make a substantial showing that the Government

intentionally or recklessly omitted material evidence from the seven wiretap applications.

Because Defendant was not entitled to a Franks hearing, the Court denied his suppression

motion “to the extent that [it is] based on alleged misrepresentations or omissions in the

affidavits or the alleged failure of the applicants to provide a full and complete statement

regarding necessity.” United States v. McDowell, 2011 WL 32440 at *4 (D. Kan. Jan. 4,

2011).

         Surprisingly, Defendant does not argue on appeal that the district court erred in

denying him a Franks hearing.        Instead, he only argues the district court erred in

concluding the wiretap applications contained a “full and complete statement” regarding

the wiretap’s necessity because the Government “withheld information uncovered as part

of the prior traditional investigation.”2 Appellant’s Br. at 11. This approach, however,

leaves Defendant’s argument hung out to dry.          Defendant asks us to conclude the

         1
         Defendant was under the mistaken impression that the evidentiary hearing he
sought was not a Franks hearing because he brought the motion to suppress under 18
U.S.C. § 2518(10)(a) as opposed to the Fourth Amendment. He thought the district court
would only need to conduct a Franks hearing if it determined Defendant “must raise the
issue in the form of a 4th Amendment violation.” ROA, vol. I at 135. Although Franks
arose in the Fourth Amendment context, Green clearly extended the Franks framework to
federal wiretap applications. And § 2518 does not explicitly provide for a Franks-style
hearing. So an evidentiary hearing in a wiretap suppression motion is authorized by this
circuit’s extension of Franks to the wiretap context, not an independent statutory
provision.
         2
         Defendant reiterated this position at oral argument. The Court asked, “So you’re
not arguing that [the district court] erred in not granting you a Franks hearing, you’re just
arguing that [the court] erred in saying that it was . . . complete?” Defense counsel
replied, “Correct.”
                                            -5-
Government omitted material facts. Because these omitted facts are, by definition, not

contained in the affidavit supporting the wiretap application, they needed to be presented

in a Franks hearing. Defendant could have appealed the district court’s denial of a Franks

hearing, but he did not. Instead he asks us to conclude the Government omitted material

information, even though we have no evidence that any additional material information

even existed. This we cannot do. See United States v. Yeje-Cabrera, 430 F.3d 1, 8 (1st

Cir. 2005) (observing that “[a] Franks hearing, not de novo review in this court, is the

proper route for addressing” the concern that “the government omitted material

information that would have prevented a finding of necessity”).

                                            B.

      We may, however, consider Defendant’s argument that the facts recited in the

affidavit were insufficient to support the district court’s finding of necessity. We review

the court’s decision for abuse of discretion. United States v. Ramirez-Incarnacion, 291

F.3d 1219, 1222 n.1 (10th Cir. 2002) (en banc footnote). Once a court has authorized a

wiretap, the defendant bears the burden of proving the wiretap was invalid. Id. at 1222.

A wiretap is “necessary” if traditional investigative techniques have been tried

unsuccessfully, reasonably appear to be unsuccessful if tried, or are too dangerous to try.

Id.   Traditional investigative techniques include: (1) standard surveillance; (2)

questioning and interrogating witnesses or suspects, including through the use of grand

jury proceedings; (3) search warrants; (4) infiltration of criminal groups by confidential

informants and undercover agents; (5) pen registers; and (6) trap and trace devices.

United States v. Foy, 641 F.3d 455, 464 (10th Cir. 2011). But the Government need not

                                           -6-
“exhaust[] all possibilities,” and the “overall burden on the government is not great.”

Verdin-Garcia, 516 F.3d at 890 (internal quotation marks omitted). Furthermore, “the

law enforcement goal of uncovering the size and scope of the conspiracy may justify the

authorization of wiretaps.” Foy, 641 F.3d at 464–65.

                                             1.

       Defendant first argues the wiretap applications were supported by “generalized

and conclusory allegations” rather than specific facts.      Appellant’s Br. at 14.      He

identifies three such generalities. First, he points to the statement that “members of this

[Drug Trafficking Organization] have proven consistently that they are technologically

savvy and are extremely smart in the ways of avoiding detection by law enforcement.”

ROA, vol. IV at 98.        Defendant says the affidavits gave no examples of this

sophistication. But, in fact, the affidavits detailed a confidential source’s statement that

one conspirator “frequently dumps his phones.” Id. at 52. They also showed that

members of the organization used phones subscribed under other names or that listed no

subscriber at all. See, e.g., ROA, vol IV at 266. The affidavits indicated members of the

organization communicated with each other through computer-based social networking

sites. Id. at 99. Finally, the affidavits documented the use of video cameras outside a

house used as the organization’s “hub.” Id. at 106. These specific facts back up the

general statement that the conspirators were technologically savvy.

       The next generality Defendant identifies is the affidavits’ statements that cellular

phone companies frequently allow customers to register under fictitious names “or to

provide no subscriber information at all (as in pre-pay cell phones).”           Id. at 99.

                                           -7-
Defendant says the affidavit provided “[n]o examples of cell phones being acquired under

a false name or the use of pre-pay cell phones in this particular investigation.”

Appellant’s Br. at 17. But, in fact, the affidavit for Target Telephone #4 indicates the

telephone was a “pre-paid cellular phone serviced by T-Mobile USA.” ROA, vol. IV at

266.   The record also indicates that Target Telephone #7 was a “prepaid cellular

telephone.” Id. at 817. And although the affidavits gave no specific evidence that the

phones were registered under fictitious names, they did indicate that five of the seven

phones were used by someone to whom they were not registered or subscribed.

Additionally, one phone used by conspirator Michael Francois (later identified by his real

name, Curtis Pitter) was subscribed to “Rhon Dean,” while another of Francois’s

telephones was registered to “Dean Rhonld.” Id. at 198, 347. A trained DEA agent, and

a district court, could reasonably infer these names were fictitious, even though an actual

member of the conspiracy was identified as “Dean Rhone.” Id. at 41.

       The third “generality” Defendant identifies is the following statement in the

affidavits: “I know, based on my training and experience, that, as a security measure,

high-ranking members of large-scale narcotics trafficking organizations normally only

conduct narcotics transactions or provide specific information pertaining to their

organization to trusted family members or associates within the organization.” Id. at 101.

Defendant says the affidavits did not connect this “broad characterization of all

trafficking organizations” to the particular facts of this case. Appellant’s Br. at 17. But

Defendant has cited no authority suggesting a law enforcement officer cannot include in a



                                           -8-
wiretap application information that he knows from his training or experience.3 Nor does

Defendant explain how this generalization undermines the district court’s determination

that the wiretap was necessary. The district court was free to give this generalization the

appropriate weight. So this is an insufficient basis to overturn the court’s necessity

determination.

                                            2.

      Next, Defendant argues the investigators left untried a number of traditional

investigatory methods that could have succeeded. Specifically, he says they could have

used confidential informants, undercover agents, additional surveillance, and trash

searches.   The district court addressed each of these techniques when ruling on

Defendant’s motion to dismiss.       The affidavits explained that Francois offered a

confidential source, CS1, the opportunity to receive direct shipments of marijuana

through the mail. But Francois did not suggest CS1 would be privy to any additional

information about the conspiracy or be told where the marijuana was coming from. The

affidavits also said it would be unlikely that an undercover agent could infiltrate the

close-knit organization, especially considering that most of the organization’s members

were related by blood or marriage. We have noted that a “tight-knit, familial [drug

trafficking] organization would be exceedingly unlikely to accept outsiders into its

confidence. Verdin-Garcia, 516 F.3d at 891. So the affidavits adequately explained why


      3
         In the search warrant context, officers frequently recite facts they know through
their training and experience, and we consider those facts in determining whether
probable cause supported the warrant. See United States v. Mathis, 357 F.3d 1200, 1205
(10th Cir. 2004).
                                           -9-
further use of confidential informants or undercover agents was unlikely to succeed.

      Defendant argues the Government had a duty to make at least some “minimal

efforts to use undercover agents and confidential informants.” Appellant’s Br. at 20. He

cites the district court case of United States v. Wright, 156 F. Supp. 2d 1218 (D. Kan.

2001), where the Government tried unsuccessfully to use three informants to investigate a

drug conspiracy. But the wiretap statute does not require the Government to try every

normal investigative procedure and apply for a wiretap only when they fail. See Foy, 641

F.3d at 464. Rather, the court may authorize a wiretap if normal investigative procedures

“reasonably appear to be unlikely to succeed if tried.” 18 U.S.C. § 2518(3)(c).

      The affidavits said additional physical surveillance was unlikely to yield more

evidence because the organization’s members had become “evasive and unusually

cautious in their movements.” Id. at 103. The affidavits detailed the use of security

cameras for counter-surveillance. And ordinary surveillance had only resulted in the

identification of low-level participants without showing the scope of the conspiracy.

Finally, the affidavits said additional trash searches were unlikely to be profitable

because Francois was observed burning his trash at one house, no trash was ever left out

at another location, and the “hub” house was equipped with exterior surveillance

cameras.

      Based on this evidence in the affidavits, the district court could conclude that

“normal investigative procedures have been tried and have failed or reasonably appear to

be unlikely to succeed if tried or to be too dangerous.”       Id.   Although traditional

investigatory methods allowed investigators to locate some of the conspirators at various

                                          - 10 -
times, they provided little information about “the size and scope of the conspiracy.” Foy,

641 F.3d at 464–65. And the Government demonstrated that traditional investigative

techniques were unlikely to yield the needed information. Accordingly, the district court

did not abuse its discretion in denying Defendant’s motion to suppress.

      AFFIRMED.

                                         Entered for the Court,



                                         Bobby R. Baldock
                                         United States Circuit Judge




                                          - 11 -
