                                 UNITED STATES DISTRICT COURT
                                 FOR THE DISTRICT OF COLUMBIA

    UNITED STATES OF AMERICA,

                            Plaintiff,
                                                            Criminal Action No. 14-57 (BAH)
                            v.
                                                            Chief Judge Beryl A. Howell
    AGUSTIN FLORES APODACA and
    PANFILO FLORES APODACA,

                            Defendants.

                                         MEMORANDUM OPINION

        This is the third opinion issued in this case. See United States v. Apodaca (“Apodaca I”),

251 F. Supp. 3d 1, 2 (D.D.C. 2017) (granting the government’s motion to enforce two

administrative subpoenas); United States v. Apodaca (“Apodaca II”), Crim. No. 14-57 (BAH),

2017 U.S. Dist. LEXIS 131617, at *73 (D.D.C. Aug. 17, 2017) (resolving pretrial motions).1

Having already resolved eight pretrial motions in Apodaca II, six additional pretrial motions

have now become ripe in advance of the trial, which is scheduled to begin on February 5, 2018.2

The defendants, Agustin Flores Apodaca (“Agustin”) and Panfilo Flores Apodaca (“Panfilo”),



1
         The following pretrial motions were denied in Apodaca II: (1) Agustin Flores Apodaca’s (“Augustin”)
Motion in Limine to Preclude Introduction of Post-Arrest Title III Intercepts, ECF No. 51; (2) the defendants’ Joint
Motion for Pretrial Hearing of Admissibility of Alleged Co-Conspirator Statements, ECF No. 52; (3) Agustin’s
Motion to Enforce the Rule of Specialty, ECF No. 54; (4) Agustin’s Motion to Suppress Statements, ECF No. 48;
(5) the defendants’ Joint Motion to Dismiss Count Two of Indictments, ECF No. 50; and (6) and (7) the defendants’
separate Motions to Strike Improper Aliases, ECF Nos. 53 and 56. See Apodaca II, 2017 U.S. Dist. LEXIS 131617,
at *73. The government’s Motion to Introduce Co-Conspirator Statements, Other Crimes Evidence at Trial, and
Allow Lead Agents at Counsel Table, ECF No. 55, was granted in part, with a ruling on the portion of that motion
seeking admission of intrinsic or other bad acts, under Federal Rule of Evidence 404(b), reserved pending
supplemental briefing, id. at *4, *74. This part of the government’s Motion to Introduce Other Crimes Evidence,
ECF No. 55, as well as the government’s Motion in Limine Related to Jencks Material and Certain Cross-
Examination by Defense Counsels, ECF No. 110, are not yet ripe for resolution.
2
         The trial was originally scheduled for September 18, 2017, but was postponed until February 5, 2018, at the
defendants’ request for additional time to conduct further investigation following the government’s disclosure, in
connection with its Motion to Introduce Other Crimes Evidence, ECF No. 55, of anticipated evidence to be
introduced at trial. Min. Order (dated Aug. 28, 2017).
who are indicted separately on two substantively similar counts of conspiring to traffic controlled

substances and possessing a firearm in furtherance of the same, have filed five of the pending

motions: (1) the defendants’ Joint Motion to Suppress Title III Intercepts (“Defs.’ Mot. Suppress

T. III Intercepts”), ECF No. 33; (2) Agustin’s Motion to Compel Discovery (“Agustin’s

Discovery Mot.”), ECF No. 40; (3) Panfilo’s Motion to Join and Supplement Agustin’s Motion

to Compel Discovery (“Panfilo’s Discovery Mot.”), ECF No. 41; (4) an amendment thereto

(“Panfilo’s Am. Discovery Mot.”), ECF No. 45; and (5) Agustin’s Motion for In Camera

Inspection of Grand Jury Minutes (“Def.’s Mot. GJ Inspection”), ECF No. 130. Also ripe for

resolution is the government’s Motion to Reconsider Use of Blackberry Communications

Transcripts (“Gov’t’s BBMT Mot.”), ECF No. 95.

         The pending motions are addressed in the following order: Part I discusses the

defendants’ four motions seeking suppression of intercepted BlackBerry text messages and

related discovery, ECF Nos. 33, 40, 41, and 45; Part II discusses the government’s motion

seeking reconsideration of the use at trial of certain transcripts of intercepted BlackBerry

messages, ECF No. 95; and, finally, Part III discusses Agustin’s motion for in camera inspection

of grand jury minutes, ECF No. 130.3

         The general factual and procedural background in this case has been amply described in

Apodaca II, 2017 U.S. Dist. LEXIS 131617, at *4–13, and will not be repeated here.




3
         The defendants and government filed certain of the pending motions and related briefing under seal, with
those papers subsequently unsealed, in full or in part, at the direction of this Court. See Min. Order (dated Sept. 5,
2017); Min. Order (dated Sept. 15, 2017). Any parts of documents that remain under seal and are discussed in this
Memorandum Opinion, including ECF Nos. 68-1, 68-2, are unsealed to the extent discussed herein in order to make
the reasoning intelligible.
                                                          2
    I.   DEFENDANTS’ CHALLENGES TO TITLE III INTERCEPTED
         COMMUNICATIONS

         As part of a multi-prong challenge to the government’s introduction of Title III intercepts

at trial, the defendants have jointly moved to suppress “any and all communications intercepted

by the Government pursuant to . . . Title III,” on the ground that the orders authorizing the

intercepts were “facially insufficient.” Defs.’ Mot. Suppress T. III Intercepts at 1.4 If their

suppression motion is denied, the defendants seek to compel discovery of “[a]ll interceptions

from the Title III investigation, from all target devices,” including “[m]inimized interceptions of

Defendant Panfilo.” Jt. Stm. Regarding Discovery (“Jt. Stm. Discovery”) ¶ 7, ECF No. 124;

Agustin’s Discovery Mot at 1; Panfilo’s Discovery Mot. at 1; Panfilo’s Am. Discovery Mot at 1.

The defendants’ suppression motion, followed by their motions to compel discovery, are

discussed in turn.

         A. Defendants’ Joint Motion to Suppress Title III Intercepts

         The government conducted a 22-month wiretap investigation between February 2013 and

December 2014, during which the government submitted and obtained 27 applications for

electronic intercepts and ultimately intercepted “thousands of pertinent electronic

communications (Blackberry Messenger text messages [‘BBMs’])” from “over [59] different

devices.” Gov’t’s Opp’n Defs.’ Mot. Suppress T. III Intercepts (“Gov’t’s First Opp’n T. III

Intercepts”) at 2–3, ECF No. 68. The first wiretap application and order targeted the electronic

communications of Panfilo, who was using “Target Device 1.” Id. at 3–4. Over the course of

the investigation, three additional BlackBerry devices used by Panfilo were subject to court-



4
         Three of the defendants’ previously-denied motions also challenged the introduction of intercepted
communications. See Apodaca II, 2017 U.S. Dist. LEXIS 131617, at *13–33 (denying defendants’ motions to
preclude introduction of post-arrest Title III Intercepts, hold a pre-trial hearing on the admissibility of alleged co-
conspirator statements, and enforce Rule of Specialty).
                                                            3
authorized interception. Id. In total, “[t]he government intercepted approximately 12,500

pertinent electronic communications between Panfilo and other [alleged] co-conspirators.” Id. at

4. Apparently, these pertinent BBMs of Panfilo’s were intercepted during thirteen months in

2013 and 2014: February through October, 2013, and May, June, July, and December 2014. See

Gov’t’s Opp’n Defs.’ Mot. Compel Discovery (“Gov’t’s Opp’n Defs.’ Discovery Mots.”) at 3–4,

ECF No. 44 (listing “periods of time” in which intercepted communications “are between Panfilo

and various co-conspirators”); Defs.’ Suppl. Reply Supp. Mot. Suppress T. III Intercepts (“Defs.’

Second Reply Mot. Suppress T. III Intercepts”) at 4 n.1, ECF No. 92-2 (noting that Panfilo’s

Blackberry “was not intercepted during the period after October 2013 except for 30 day periods

on or about May, July, and December 2014”). Agustin was imprisoned during the interceptions,

and none of his communications were intercepted. Gov’t’s First Opp’n T. III Intercepts at 4.

       The government’s initial application, seeking to intercept electronic communications over

Target Device #1 was granted by the District Court in the Western District of Texas, on February

19, 2013. See id. at 2–3; see also id., Ex. 1, Application for Interception for Electronic

Communications (“Initial T. III App.”) ¶ 2, ECF No. 68-1; id., Ex. 2, Order Authorizing the

Interception of Electronic Communications (“Initial T. III Order”) at 3–7, ECF No. 68-2. That

first application and order, as well as the twenty-six that followed, all contained “the same

information—a Government attorney’s name in the application and order, and reference [to] the

appropriately designated [Department of Justice (‘DOJ’)] official,” as is required by 18 U.S.C. §

2516(3) for interceptions of electronic communications. Gov’t’s First Opp’n T. III Intercepts at

3. Although “the Government sought only to intercept electronic communications when it first

applied for judicial authorization,” the wiretap also intercepted some “wire (voice)

communications,” mostly “in the form of ‘voice notes,’” which are in a compressed audio

                                                 4
Adaptive Multi-Rate (“AMR”) file format. Gov’t’s’ Third Suppl. Opp’n Defs.’ Mot. Suppress T.

III Intercepts (“Gov’t’s Fourth Opp’n T. III Intercepts”) at 3–4, ECF No. 113. The interception

of these voice notes, or AMR files, was due to BMM’s functionality in transmitting both audio

and text communications over the same network and the Blackberry service provider’s inability

to disaggregate the two formats of communications. Gov’t’s Suppl. Opp’n Defs.’ Mot. Suppress

T. III Intercepts (“Gov’t’s Second Opp’n T. III Intercepts”) at 3–4, ECF No. 89. As the

government explains, BBM is BlackBerry’s “proprietary instant messaging service,” and “[u]sers

of BBM are able to attach video and audio files, including ‘voice notes,’ to standard text

conversations and send these messages as BBM communications utilizing [BlackBerry’s]

network.” Id. at 3. BlackBerry announced the voice notes functionality in December 2012, three

months before the wiretap investigation in this case began. Defs.’ Third Reply Supp. Mot.

Suppress Title III Intercepts (“Defs.’ Fourth Reply Mot. Suppress T. III Intercepts”) at 2, ECF

No. 129.

        The government does not dispute that wire communications in the form of AMR files

were intercepted, along with the court-authorized electronic communications. To deal with the

occurrence of unauthorized intercepted wire communications, monitors at the reviewing site in

El Paso, Texas were directed, in accordance with the instructions in the government’s

applications and orders, promptly to minimize such communications. Gov’t’s Second Opp’n T.

III Intercepts at 4; see also, e.g., Initial T. III App. at 8; Initial T. III Order at 6–7, ECF No. 68-2.

The government instructed monitors not to listen to any unauthorized intercepted wire

communications in both verbal instructions and in signs taped to monitors’ computers that stated

“Do Not Listen to Any Audio Files.” Jt. Stm. Discovery ¶ 5. At trial, the government plans to




                                                    5
use as evidence only “lawfully intercepted electronic communications.” Gov’t’s Opp’n Defs.’

Discovery Mots. at 3–4.

         The government has dribbled out information regarding the wiretaps, prompting over

four rounds of briefing and two status conferences to clarify the basic facts related to this aspect

of the government’s investigation.5 This approach to discovery is both unhelpful and

unnecessarily time-consuming for the Court and the parties. Now, in the face of more complete

discovery from the government, the defendants advance an evolved argument for suppression

based on their understanding of the government’s interceptions as being “hybrid” in nature and,

as such, requiring authorization pursuant to the “‘wire’ standard,” instead of the standard for

electronic communications. Defs.’ Fourth Reply Mot. Suppress T. III Intercepts” at 8–9; Defs.’

Reply Gov’t’s Second Suppl. Opp’n Defs.’ Mot. Suppress T. III Intercepts (“Defs.’ Third Reply

Mot. Suppress T. III Intercepts”) at 4, ECF No. 104-2.6


5
          The existence of the AMR files was first raised by defendants at an August 2, 2017 status hearing. See
Gov’t’s Second Opp’n T. III Intercepts at 2 (discussing hearing). In subsequent submissions, the government
acknowledged that 170 AMR files were sent by BlackBerry to the FBI’s Data Intercept Technology Unit (“DITU”)
for review, and that 163 of these files were minimized and seven “were erroneously marked “pertinent” by a
monitor. Id. at 3–4. The defendants also questioned the extent to which the government intercepted other types of
wire communications, including 25 MP4 (video) and MP3 (audio, often music) files, in addition to AMR type wire
communications. Defs.’ Second Reply Mot. Suppress T. III Intercepts at 2. The government responded by
explaining that “[t]he raw data exported for production in discovery to Defendants caused . . . three (3) unique MP4
files to be replicated within the raw data and to erroneously appear 25 different times within the raw data produced
to the Defendants.” Gov’t’s’ Second Suppl. Opp’n Defs.’ Mot. Suppress T. III Intercepts (“Gov’t’s Third Opp’n T.
III Intercepts”) at 5–6, ECF No. 101-2. With respect to the MP3 data, the government further explained that “MP3
files were not intercepted in this investigation and any reference to MP3 files within the communications is due to a
feature of BBM which alerts a user when another contact is available.” Id. at 13.
6
          The defendants assert a new argument in their most recent brief as a “second – and independent – basis for
suppression.” Defs.’ Fourth Reply Mot. Suppress T. III Intercepts at 2. Based on the government’s assertion that it
maintains “all the intercepted communications . . . on an FBI server in Quantico, Virginia,” the defendants contend
that the government has “fail[ed] to comply with the ‘sealing’ requirements of the Title III wiretap,” and “[t]his
failure warrants suppression of all the intercepts.” Id. at 2, 11–12 (citing United States v. Ojeda Rios, 495 U.S. 257,
263 (1990); United States v. Carson, 969 F.2d 1480 (3d Cir. 1992)). “In Ojeda Rios, the Supreme Court held that
tapes which were not sealed in a timely fashion under section 2518(8)(a) must be suppressed unless the government
offers a satisfactory, ‘objectively reasonable’ explanation for the belated sealing.” Carson, 969 F.2d at 1493
(finding 34-day delay in sealing for “necessity of enhancing original tapes” was not a satisfactory explanation). The
government, in this case, after ordered to respond to this new argument, see Min. Order (dated Dec. 12, 2017),
represents that “all target devices and interceptions were sealed by the authorizing court and there was no delay in
the sealing.” Gov’t’s Fourth Suppl. Opp’n Defs. Mot. Suppress at 1, 4, ECF No. 134. Only duplicate intercepts are
                                                           6
         Specifically, the defendants reason that “the Government knew – or should have known”

from the outset of the investigation that the wiretaps “would inevitably” capture both electronic

and wire communications. Id.; Defs.’ Second Reply Mot. Suppress T. III Intercepts at 7 (arguing

that “the Government, with its expertise in the use of Blackberrys, knew BBM communications

could or would invariably be a mixture of voice and audio communications”); Defs.’ Reply

Supp. Mot. Suppress T. III Intercepts at 4, ECF No. 82 (making same argument, citing Ian

Austen, BlackBerry Phones Get Free Calls Over Wi-Fi, N.Y. TIMES (Dec. 10, 2012),

https://bits.blogs.nytimes.com/2012/12/10/blackberry-phones-get-free-calls-over-wi-fi/). To

underscore the point, the defendants cite the 170 AMR files intercepted, seven of which were

erroneously marked “pertinent,” as well as the government’s representation that the first AMR

file was intercepted on March 23, 2013, just over a month after the initial application in the

wiretap, and that later wiretap affidavits and orders actually sought authorization to intercept

wire communications. Defs.’ Third Reply Mot. Suppress T. III Intercepts at 3; Defs.’ Fourth

Reply Mot. Suppress T. III Intercepts 2–7.7 Given the interceptions of “hybrid”



maintained on the FBI servers in Quantico for investigative purposes, as permitted by the wiretap statute. See 18
U.S.C. § 2518(8)(a) (“Duplicate recordings may be made for use or disclosure pursuant to the provisions of
subsections (1) and (2) of section 2517 of this chapter for investigations”); id. § 2517(1)–(2) (permitting
investigative or law enforcement officer to disclose contents of a wiretap investigation to another officer or use
content of the wiretap to the extent such disclosure or use “is appropriate to the proper performance of the official
duties” of the officers involved). Accordingly, no statutory sealing violation has occurred, and the government’s
maintenance of intercepted communications for investigative purposes on FBI servers in Quantico does not present
any statutory violation, let alone a violation supporting suppression.
7
          As belatedly detailed by the government, during discrete time periods, after the first six months of the
investigation, the government sought court authorization to intercept both wire and electronic communications, but
only in five of the 27 applications and for only four devices not used by Panfilo out of the total 59 devices subject to
the wiretaps. Gov’t’s Fourth Opp’n T. III Intercepts at 3–4 (noting the first of the five applications targeting wire
and electronic communications was filed in August 2013); Defs.’ Fourth Reply Mot. Suppress T. III Intercepts at 1
(listing the dates of the five applications for wire communications as August 12 and 30, 2013, January 27, 2014,
August 14, 2014, and September 11, 2014); Gov’t’s Third Opp’n T. III Intercepts at 14–15 (noting that “[i]n the
August 12 affidavit . . . the Government sought authority to intercept electronic communications over Target
Device[] 1 (Panfilo’s Device),” as well as “electronic . . . and wire communications over Target Device 10,” which
was not Panfilo’s device). These facts show that had the government wished to target interception of Panfilo’s wire,
in addition to his electronic, communications, such authority would have been sought, as with the four devices
subject to court-authorized wire interception.
                                                           7
communications, in the defendants’ view, the government should have sought authorization “to

intercept ‘wire communications’ ab initio,” and such authorization, unlike for electronic

communications, statutorily requires inclusion of the name of the authorizing high-ranking DOJ

official on all applications and orders. Id. at 1. Absent the name of the authorizing high-ranking

DOJ official, the defendants contend the interception orders are “facially defective” and must be

suppressed under United States v. Scurry, 821 F.3d 1 (D.C. Cir. 2016). Id. at 1, 10. Thus, the

defendants’ challenge to the facial validity of the wiretap applications and orders rests on

whether, in light of Blackberry’s functionality and associated challenges in disaggregating

different communication formats, the government was required to seek authorization to intercept

wire communications and comply with statutory requirements applicable to wire

communications, when only electronic communications were targeted for use at trial, with other

communication formats minimized.

       At the outset, the government concedes that the seven AMR files improperly marked as

pertinent must be suppressed. Gov’t’s Fourth Opp’n T. III Intercepts at 5 (citing United States v.

Suggs, 531 F. Supp. 2d 13, 24 (D.D.C. 2008), aff’d sub nom. United States v. Glover, 681 F.3d

411 (D.C. Cir. 2012)). The government posits, however, that suppression of the intercepted

electronic communications is not warranted because the government only targeted electronic

communications in connection with Panfilo and, thus, did not need to satisfy any different

statutory authorization requirements applicable to wire communications with respect to those

intercepts. See id. at 1. The fortuity “that voice notes can be transmitted over the BlackBerry

system does little to alter the fact that the Government did not seek to intercept such

communications for the first six months of this investigation.” Id. at 4. The government argues

that the defendants’ theory “would yield an absurd result” because “it would require the

                                                 8
Government to adhere to the standards for interception of wire communications even where the

Government seeks no such communications and lacks probable cause for such communications,

simply because it is technically possible to intercept wire communications concurrently with

electronic communications.” Id.8 For the reasons explained below, the Court agrees with the

government.

                  1.       Relevant Statutory Provisions

         When first enacted, Title III of the Omnibus Crime Control and Safe Streets Act of 1968,

codified at 18 U.S.C. §§ 2510–2522, addressed only the interception of wire and oral

communications, and barred admission at trial of such communications, plus “evidence derived

therefrom . . . if disclosure of that information would be in violation of this chapter,” 18 U.S.C.

§ 2515. This law also authorized “[a]ny aggrieved person” to seek suppression of such

communications, “or evidence derived therefrom,” on the following three grounds: “(i) the

communication was unlawfully intercepted; (ii) the order of authorization or approval under

which it was intercepted is insufficient on its face; or (iii) the interception was not made in

conformity with the order of authorization or approval.” Id. § 2518(10)(a). Title III was

amended in 1986, by the Electronic Communications Privacy Act of 1986 (“ECPA”), Pub. L.

No. 99-508, 100 Stat. 1848 (1986), to expand certain protections provided to wire and oral

communications, to electronic communications, see, e.g., 18 U.S.C. § 2511(1)(a),(c), (d) and (e)

(penalizing unauthorized interception of wire, oral and electronic communications).9 The parties



8
         The government also argues that “Agustin lacks standing to challenge the electronic interceptions evidence
because he fails to meet the statutory criteria of an ‘aggrieved party’ under Title III.” Gov’t’s First Opp’n T. III
Intercepts at 2, 13–17. This standing argument need not be addressed as this motion is resolved on alternative
grounds.
9
         ECPA added a definition of “electronic communications” to mean “any transfer of signs, signals, writing,
images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic,
photoelectronic or photooptical system that affects interstate or foreign commerce, but does not include,” inter alia,
“any wire or oral communication.” 18 U.S.C. § 2510(12).
                                                          9
agree that BBMs constitute “electronic communications” within the meaning of Title III. See

Gov’t’s First Opp’n T. III Intercepts at 5 (“Electronic communications are non-voice

communications made over a network in or affecting interstate commerce, which include

communications sent by [BBM] text messages . . . .”); Defs.’ Second Reply Mot. Suppress T. III

Intercepts at 4; see also United States v. Jones, 451 F. Supp. 2d 71, 75 (D.D.C. 2006), rev’d on

other grounds, 615 F.3d 544 (D.C. Cir. 2010), aff’d, 132 S. Ct. 945 (2012)). While not altering

the scope of the exclusion remedy, which continues to be limited to improper interception of

wire and oral communications, see 18 U.S.C. § 2515, ECPA did amend other provisions of Title

III to encompass “electronic communications.”

       In particular, as relevant to the instant suppression motion, Title III provides that an order

“authorizing or approving the interception of any wire, oral, or electronic communication” must

specify, inter alia, “the identity of the agency authorized to intercept the communications, and of

the person authorizing the application.” Id. § 2518(4)(d). The statute further dictates who

qualifies as a “person authorizing the application”: for wire and oral communications, “[t]he

Attorney General, Deputy Attorney General, [and] Associate Attorney General,” among other

high-level DOJ officials, “may authorize an application,” id. § 2516(1); and, for electronic

communications, the amendments effected by ECPA provide that “[a]ny attorney for the

Government (as such term is defined for purposes of the Federal Rules of Criminal Procedure)

may authorize an application,” id. § 2516(3) (emphasis added).

               2.      Analysis

       The defendants argue that the wiretap orders at issue in this case are “insufficient on

[their] face” for failing to identify the appropriate high-ranking DOJ official authorizing the

interceptions. See Defs.’ Mot. Suppress T. III Intercepts at 1, 4 (internal quotation marks and

                                                 10
citation omitted). In advancing this argument, the defendants rely on Scurry, in which the D.C.

Circuit held that “a [Title III] wiretap order is ‘insufficient on its face,’ 18 U.S.C.

§ 2518(10)(a)(ii), where it fails to identify the Justice Department official who approved the

underlying application, as required by Title III, id. § 2518(4)(d).” Scurry, 821 F.3d at 5. Given

that the orders authorizing the wiretaps in Scurry did not specify the statutorily required high-

ranking DOJ official who had signed off on the underlying application, the D.C. Circuit

mandated that the information collected pursuant to the wiretaps at issue be suppressed. Id.

        At issue in Scurry were wire communications.10 By contrast, as noted, an order and

application for interception of electronic communications may be authorized by “[a]ny attorney

for the Government,” as defined in the Federal Rules of Criminal Procedure. 18 U.S.C.

§ 2516(3). In this case, the applications were signed by “Andrea Goldbarg, Assistant Deputy

Chief in the United States Department of Justice,” Initial T. III App. at 1, and the initial order

authorizing the interceptions at issue indicated that the application for the order had been

submitted by “Andrea Goldbarg, Assistant Deputy Chief in the United States Department of

Justice,” Initial T. III Order at 1. The government maintains, and the defendants do not dispute,

that Ms. Goldbarg is an attorney for the government, as contemplated by the Federal Rules of

Criminal Procedure. See FED. R. CRIM. P. 1(b)(1) (defining “attorney for the government” in

pertinent part as “the Attorney General or an authorized assistant”); Gov’t’s First Opp’n T. III




10
         The D.C. Circuit did not expressly state that the intercepts at issue in Scurry involved wire
communications, as opposed to electronic communications, but a review of the record indicates that the warrants
issued authorized the relevant law enforcement authorities to intercept wire communications from the defendants’
cell phones. See United States v. Savoy, Crim. No. 10-310 (RCL) (D.D.C. 2012), ECF Nos. 59, 77, 90, 105, 108;
see also Scurry, 821 F.3d at 6 (referring to a “wiretap on Scurry’s cell phone” and “Scurry’s tapped calls”). In
addition, the D.C. Circuit’s textual analysis addressed only wire and oral communications since the Court cited 18
U.S.C. § 2516(1), Scurry, 821 F.3d at 8, which governs “wire and oral communications,” whereas a separate
subsection of the same provision governs “electronic communications,” see 18 U.S.C. § 2516(3).
                                                        11
Intercepts at 10.11 Thus, if the Title III orders at issue appropriately sought and were authorized

to intercept electronic communications, they are not “insufficient on [their] face,” 18 U.S.C.

§ 2518(10)(a)(ii), and the resultant interceptions are not subject to suppression. This leads

directly to the key issue raised by the defendants that, in light of the “hybrid” interceptions of

BBMs and AMR files, the applications and orders issued in connection with the underlying

investigation should have complied with the statutory requirements applicable to wire

communications.

         As noted, the defendants’ evolved position, which relies heavily on legislative history, is

that the government should have sought and obtained authorization to intercept both wire and

electronic communications. See Defs.’ Fourth Reply Mot. Suppress T. III Intercepts at 8–10;

Defs.’ Third Reply Mot. Suppress T. III Intercepts at 1–2. In particular, the defendants point to a

House Judiciary Committee Report on ECPA, stating that: “The Committee understands that

[DOJ] will apply for a court order under the ‘wire’ standards in cases where a tap may intercept


11
           Confusingly, the initial application and order authorizing interception of the electronic communications on
Target Device #1 uses language pertinent to oral and wire communications. See, e.g., Initial T. III App. ¶ 3 (stating
that, “[p]ursuant to Title 18, United States Code, Section 2516, an appropriate official of the Criminal Division,
United States Department of Justice, having been specially designated by the Attorney General pursuant to Order
Number 3055-2009 dated February 26, 2009, has authorized this application.”); Initial T. III Order at 4 (stating that,
“pursuant to the application authorized by an appropriate official of the Criminal Division, United States
Department of Justice, who has been specially designated by the Attorney General of the United States to exercise
the power conferred on him by Title 18, United States Code, Section 2516 are authorized to intercept electronic
communications . . . to and from TARGET DEVICE #1.”). Notwithstanding that both the application and order
include language pertinent to authorizing wire and oral communications, since § 2516 does not require sign-off by a
high-level DOJ official, this surplusage does not alter the validity of the order. See Scurry, 821 F.3d at 8 (“To
determine whether a wiretap order is facially insufficient, a reviewing court must examine the four corners of the
order and establish whether, on its fact, it contains all that Title III requires it to contain.”) (emphasis added); id. at
12 (noting that the D.C. Circuit’s previous opinion in United States v. Glover, 736 F.3d 509, 515 (D.C. Cir. 2013),
“left open the possibility that a ‘technical defect’ in a wiretap order might not rise to the level of facial insufficiency,
but rather would render the order ‘imperfect’”). As the government explains, “[t]he Title III application language
. . . regarding the identification of the ‘appropriate official’ reflects DOJ policy to secure additional internal approval
of applications for interception of electronic communications,” but this is “DOJ policy and is not statutorily
required.” Gov’t’s First Opp’n T. III Intercepts at 11 n.4 (citing U.S. DEP’T OF JUSTICE, UNITED STATES
ATTORNEYS’ MANUAL, § 9-7.100, https://www.justice.gov/usam/usam-9-7000-electronic-surveillance#9-7.100); see
also Gov’t’s Third Opp’n T. III Intercepts at 16 (further explaining that, in April 2013, government “began
including the name of the high-level DOJ official in the applications . . . based upon internal protocols and guidance
of the Office of Enforcement Operations of the Department of Justice, not due to statutory requirements.”).
                                                            12
mixed wire and electronic communications,” and “[a]s long as the wire standards are followed a

single court order should suffice to authorize the interception of both wire and electronic

communications involving the same lines of instruments.” Id. at 2 (quoting H.R. REP. NO. 99-

647, at 35–36 (1986)).12 This language is set in a paragraph acknowledging, given ECPA’s new

definition of “electronic communication,” that “[a] transaction may consist, in parts, of both

electronic communications and wire or oral communications,” and that while “the transmission

of data over the telephone is an electronic communication,” parties’ speaking “with one another

between data transmissions,” would be making a wire communication,” and “a party’s utterances

into the telephone mouthpiece are an oral communication.” H.R. REP. NO. 99-647, at 35. In

context, the purpose of this language appears to be to urge use of the “wire” standard when the

targeted “transaction” contains different types of communications, subject to differing rules of

disclosure; hence the report goes on to instruct that where interception of the entire

communication is sought, “a single court order should suffice to authorize the interception of

both wire and electronic communications involving the same lines or instruments.” Id. at 36.13

This language simply begs the question at issue here of whether compliance with this “wire”

standard is required when the “wire” parts of the communication are not part of the “transaction”

targeted for interception.




12
         The defendants also cite a handbook on surveillance prepared by the Internal Revenue Service (“IRS”)
Criminal Tax Division that focuses on the identical language of the House Judiciary Committee Report but
expressly states that the handbook is “not intended to have the force of law” or “replace thorough research.” See
Defs.’ Fourth Reply Mot. Suppress T. III Intercepts at 9; id., Ex. 1, IRS CRIMINAL TAX DIVISION, SURVEILLANCE
HANDBOOK at i, 39, ECF No. 129-1. Thus, this IRS handbook does little to advance the defendants’ argument.
13
         This somewhat opaque language in the House Judiciary Committee Report relied upon by the defendants is
notably absent from the Senate Judiciary Committee’s Report on ECPA, which report also makes a point of
“recogniz[ing] that a transaction may consist, in part of both electronic communications and wire or oral
communications” and that “different aspects of the same communication might be characterized differently.” S.
REP. NO. 99-541, at 16 (1986), as reprinted in 1986 U.S.C.C.A.N. 3555, 3570.
                                                       13
        In short, this House Judiciary Committee Report language may bear on situations in

which the government is actually seeking to capture both electronic and wire forms of

communications, but this was not the government’s intent here. The government only began

collecting these AMR files in this case because of “a technological limitation.” Gov’t’s’ Second

Suppl. Opp’n Defs.’ Mot. Suppress T. III Intercepts (“Gov’t’s Third Opp’n T. III Intercepts”) at

14, ECF No. 101-2. Indeed, as the government explains, BlackBerry was “unable to discern

[whether] a particular BBM contain[ed] an embedded wire communication unless it manually

reviewed the data for audio files, and concluded the audio files included the human voice,”

which BlackBerry declined to do. Gov’t’s Second Opp’n T. III Intercepts at 4; see also Status

Conf. Hr’g (rough) Tr. (Aug. 17, 2017) at 70–79. As a result, BlackBerry “automatically”

forwarded data, without separating the electronic from the wire communications, to the FBI Data

Intercept Technology Unit (“DITU”) server, which then “automatically forwarded the messages

in this case to specialized equipment located at the FBI El Paso Division, where it was reviewed

by the monitors.” Gov’t’s Second Opp’n T. III Intercepts at 3. To address this technical

challenge of disaggregating AMR files from the court-authorized electronic intercepts, the

government took steps to ensure monitors minimized and did not listen to any unauthorized

AMR and other audio files. See Gov’t’s Second Opp’n T. III Intercepts at 4; Jt. Stm. Discovery

¶ 5 (discussing verbal instructions and signage on minimization).14

        The government contends that “simply because it is technically possible to intercept wire

communications concurrently with electronic communications,” law enforcement should not be

required to seek authority to intercept both under the wire standard. Gov’t’s Fourth Opp’n T. III


14
         According to the government, even though audio files without the human voice would constitute electronic
communications under Title III, “in an abundance of caution,” the government “instructs monitors not to listen or
retain any audio files when it does not have authority to intercept wire communications in addition to electronic
communications.” Gov’t’s Second Opp’n T. III Intercepts 4 n.1.
                                                       14
Intercepts at 4. The perverse result of such a requirement would be that some communication

technologies might be put outside the reach altogether of Title III surveillance or, alternatively,

more intrusive surveillance may ensue. For example, if the government seeks, and only has

probable cause sufficient, to intercept electronic communications, but due to the unique

technology involved, the targeted electronic communications are transmitted simultaneously with

wire communications, the government would be unable to obtain court authorization for the

interception, at least or until, sufficient probable cause were developed to meet the standard for

wire communication interceptions as well. Likewise, where the government may be able to

establish probable cause to intercept wire communications, but only wants to obtain electronic

communications, the government would have to seek authority for a hybrid wiretap, leading to

more expansive surveillance, with concomitant privacy intrusions for the targets of the

surveillance and the increased burden on the government to manage surveillance of multiple

communication formats. This simply makes no sense as a policy matter, and is not required by

the wiretap statute, which instead expressly contemplates using minimization procedures to

address the capture of unauthorized communications, either in terms of format or content. 18

U.S.C. § 2518 (instructing that “[e]very order and extension thereof . . . shall be conducted in

such a way as to minimize the interception of communications not otherwise subject to

interception under this chapter”).

       The Court concludes that the government took appropriate steps to minimize wire

communications, which were intercepted due to the technology subject to surveillance, and that

the Title III applications and orders at issue are facially valid since they sought only the




                                                 15
interception of electronic communications and, consequently, reflect the appropriate authorizing

government attorney’s approval.15

         The final issue raised by the defendants is whether the interception of seven AMR files,

which the government concedes are wire communications and therefore were improperly marked

“pertinent,” requires suppression of the entire wiretap. See Defs.’ Second Reply Mot. Suppress

T. III Intercepts at 2; Gov’t’s Fourth Opp’n T. III Intercepts 4–5. As noted, the government

reports that approximately 170 AMR files were intercepted, 163 of which were minimized and

seven of which were “erroneously marked pertinent.” Gov’t’s Second Opp’n T. III Intercepts at

4. The monitors were instructed “not to open or listen to an AMR files because they did not have

authorization to intercept wire communications.” Id. According to the government, the seven

AMR files marked pertinent “were all received within the same [monitoring] session by the same

monitor.” Id. at 5. “Based upon discussions with law enforcement agents, the monitor who

marked the seven (7) AMR files as pertinent did not listen to the audio contained within them.”

Id. at 4–5. This was confirmed by a “firewall agent,” who “reviewed the transcripts and

summaries of the electronic communications that contained the AMR files in order to determine

if the AMR files were transcribed or summarized.” Id. at 5. Thus, the AMR files appear to have



15
          In any event, even the defendants were able to show some statutory violation, which they have not,
suppression of the intercepted BBM communications is not available here. As noted, the ECPA amendments to
Title III did not add “electronic communications” to either § 2515 (directing that “no part of the contents” of “any
wire or oral communication” may be introduced at trial “if the disclosure of that information would be in violation
of this chapter”) or § 2518(10)(a) (authorizing motion by “aggrieved person . . . to suppress the contents of any wire
or oral communication intercepted pursuant to this chapter” if, inter alia, the order authorizing the interception of
such communications is “insufficient on its face”) (emphasis added). Thus, ECPA “does not apply the statutory
exclusionary rule contained in title III of the Omnibus Crime Control and Safe Streets Act of 1968 to the
interception of electronic communications.” S. REP. No. 99-541 at 23 (1986); see also United States v. Reed, 575
F.3d 900, 915 (9th Cir. 2009) (finding that “the failure to seal [electronic communications] would not require
suppression” because “[s]uppression for violation of the statute is permitted only for ‘wire or oral
communications.’”); United States v. Steiger, 318 F.3d 1039, 1050–51 (11th Cir. 2003) (finding that electronic
communications are not subject to suppression for a non-constitutional violation under Title III); United States v.
Meriwether, 917 F.2d 955, 960 (6th Cir. 1990) (“The ECPA does not provide an independent statutory remedy of
suppression for interceptions of electronic communications.”).
                                                         16
been “marked pertinent due to human error by a monitor, and otherwise handled in the same

manner as other communications marked non-pertinent and minimized.” Id. Consequently,

“[t]he Government has not listened to these files and has not relied upon them in any way during

its investigation.” Id.

       The statutory requirement that government surveillance of communications “minimize

the interception of communications not otherwise subject to interception under this chapter,” 18

U.S.C. § 2518(5), does not create an “inflexible rule of law.” Scott v. United States, 436 U.S.

128, 139 (1978). Rather the requirement demands an evaluation of the “facts and circumstances

of each case.” Id. at 140. In this case, the government took reasonable efforts, given the

technical obstacles to avoiding collection of AMR files during court-authorized interception of

electronic communications, to minimize the wire communications. Indeed, the only alternative

suggested by the defendants is for the government to have sought and obtained additional

authority to expand the surveillance to encompass all wire communications, see Defs.’ Second

Reply Mot. Suppress T. III Intercepts at 3, which is no solution at all to the minimization

challenge.

       The proper remedy here is to suppress only those seven AMR files erroneously marked

pertinent, similar to situations in which partial suppression is ordered when the government has

failed to minimize certain intercepted communications properly. Gov’t’s Fourth Opp’n T. III

Intercepts at 5 (citing Suggs, 531 F. Supp. 2d at 24). In Suggs, the court explained that “[t]otal

suppression ‘is not appropriate unless the moving party shows that there was a taint upon the

investigation as a whole sufficient to warrant sweeping relief . . . and is reserved for the

particularly horrendous case . . . where the government has made effectively no effort towards

minimization whatsoever.” 531 F. Supp. 2d at 24 (internal quotation marks and citations

                                                 17
omitted). Suppressing all the BBM interceptions in this case due to the interception of AMR

files would not be appropriate where, as here, the AMR files were transmitted with, and

inseparable from, the lawfully intercepted electronic communications and were effectively

minimized.

         Accordingly, the defendants’ motion to suppress the entire Title III intercept is DENIED

and only the seven AMR files erroneously marked pertinent must be suppressed.16

         B. Defendants’ Motion to Compel Discovery

         Both defendants have moved, pursuant to Federal Rule of Criminal Procedure 16, to

compel discovery of material related to the Title III wiretaps. See generally Agustin’s Discovery

Mot.; Panfilo’s Discovery Mot.; Panfilo’s Am. Discovery Mot. Specifically, the defendants seek

to compel the government’s production of two groups of intercepted communications: (1)

“[m]inimized interceptions of Defendant Panfilo” (“Panfilo’s minimized intercepts”); and (2)

“[a]ll interceptions from the Title III investigation, from all target devices, including pertinent

and minimized communications,” and including intercepts between alleged co-conspirators (“co-

conspirator intercepts”). Jt. Stm. Discovery ¶ 7; see also Panfilo’s Reply Gov’t’s Opp’n Defs.’

Mots. Compel (“Panfilo’s Reply Discovery Mot.”) at 3, ECF No. 58. The government has

already produced to the defendants the intercepts from the BlackBerry devices used by Panfilo

and the underlying applications and orders for those intercepts, as well as the “applications,

affidavits, and orders related to the interception of target devices utilized by individuals other

than Defendant Panfilo,” Gov’t’s Opp’n Defs.’ Discovery Mots. at 3–4, but not any minimized




16
          The defendants appear to dispute that human error caused the erroneous non-minimization of seven AMR
files and, for this reason, seek disclosure of all the minimized intercepts to confirm the government’s explanation.
See Jt. Stm. Discovery ¶ 7. This discovery request is discussed infra in Part I.B.
                                                         18
communications or pertinent intercepted communications of only co-conspirators, Panfilo’s

Reply Discovery Mot. at 2–3.17

         The defendants seek both Panfilo’s minimized intercepts and co-conspirator intercepts in

order to “argue that the Government improperly minimized the communications . . . and search

for exculpatory information.” Jt. Stm. Discovery ¶ 7.18 Obviously, if the defendants succeeded

in this request, they would be buried in massive discovery from the intercepted communications

of almost sixty devices for almost two years, the vast majority of which discovery would not be

used against them at trial, and the government would have the burdensome task of preparing all

of these materials for production. The government declines to produce these materials because:

“1) the Government does not intend to rely upon them in their case in chief; 2) the Defendants

are not entitled to these materials; and 3) the Defendant’s proposed use of the minimized

communications to argue that the Government improperly minimized the communications is not

the appropriate method, as established by the case law, to challenge the Government’s

minimization of the intercepts.” Id. Moreover, the government contends, “Defendants are not

entitled to an ‘open file’ search of the Government’s evidence.” Id.19 The government is

correct.


17
          Despite initially refusing, the government ultimately produced these materials to Agustin. See Gov’t’s
Resp. Suggestion of Court Regarding Discovery (“Gov’t’s Resp. Discovery”) at 1, ECF No. 80. The government
has also produced, pursuant to the defendants’ initial motions to compel: (1) to both defendants, minimization
documents, including minimization instructions in Government counsel’s possession, see Gov’t’s Opp’n Defs.’
Discovery Mots. at 5 (distinguishing “minimization documents” from “minimized intercepts”); Jt. Stm. Discovery ¶
5; Gov’t’s Resp. Discovery at 1, and (2) to Panfilo, “the [California] state-authorized pertinent intercepts,” which the
government only discovered around the time of filing its original opposition to the motions to compel, see Gov’t’s
Opp’n Defs.’ Discovery Mots. at 5; see also Agustin’s Reply Mem. Supp. Discovery Mot. (“Agustin’s Reply Supp.
Discovery Mot.”) at 1 n.1, ECF No. 57.
18
          The defendants also seek this discovery to “independently determine when audio files were first
intercepted,” Jt. Stm. Discovery ¶ 7, but this reason seems particularly weak. The government has already conceded
that the first wire intercept occurred on March 23 2013, just over a month after the wiretap surveillance began, id. at
¶ 6, and “independent” verification of this, or an even earlier, date of minimized communications is entirely
immaterial.
19
          As with Agustin’s motion to suppress the wiretaps, the government challenges Agustin’s discovery motion
on standing grounds, reasoning that “[b]ecause Defendant Agustin lacks standing to challenge the Title III electronic
                                                          19
                  1.       Relevant Legal Standard

         “Rule 16 is a discovery rule designed to protect defendants by compelling the prosecution

to turn over to the defense evidence material to the charges at issue.” Yates v. United States, 135

S. Ct. 1074, 1083 (2015). Specifically, five types of evidence must be turned over: (1) the

defendant’s oral, written, or recorded statements, FED. R. CRIM. P. 16(a)(1)(A)–(B); (2) the

defendant’s prior criminal record, FED. R. CRIM. P. 16(a)(1)(D); (3) certain documents and

objects, “if the item is within the government’s possession, custody, or control,” FED. R. CRIM. P.

16(a)(1)(E); (4) the results or reports of any physical or mental examination, test, or experiment,

FED. R. CRIM. P. 16(a)(1)(F); and (5) a written summary of any expert testimony that the

government intends to use during its case-in-chief at trial, FED. R. CRIM. P. 16(a)(1)(G). The

defendants’ instant motions to compel hinge on the third category of evidence. See FED. R.

CRIM. P. 16(a)(1)(E).20




interceptions, he has failed to show that the pertinent intercepts and corresponding Title III documents are material
to his defense.” Gov’t’s Opp’n Defs.’ Discovery Mots. at 7–8. Agustin counters that “[t]he issue of this defendant’s
‘standing’ to challenge the wiretap is . . . irrelevant to the question of whether the materials should be produced
under Rule 16.” Agustin’s Reply Supp. Discovery Mot at 4. Since this motion is resolved on alternative grounds,
the government’s standing argument need not be addressed. See supra note 8.
20
          In his latest filing on this issue, Panfilo argues that “the minimized communications” are “relevant under
Rule 16(a)(1)(B(i) [sic] as statements of the Defendant, his role in the alleged conspiracy, and must be reviewed by
the defense to aid in determining if the Government fulfilled its minimization requirements.” Panfilo’s Reply
Discovery Mot. at 3 (citing FED. R. CRIM. P. 16(a)(1)(B)(i)). “Rule 16’s provision for the discovery of oral
statements is intended, in part, to ‘facilitate the raising of objections to admissibility prior to trial,’” which
“contributes to the efficient administration of justice,” protects “the defendant’s right to a fair trial,” and “prevents
unfair surprise.” United States v. McElroy, 697 F.2d 459, 463–64 (2d Cir. 1982) (quoting FED. R. CRIM. P. 16
advisory committee’s note to the 1974 amendments); see also United States v. Smith, Crim. No. 16-91-01-JL, 2017
U.S. Dist. LEXIS 201062, at *19–20 (D.N.H. Oct. 18, 2017) (“Rule 16’s mandatory discovery provisions were
designed to contribute to the fair and efficient administration of justice by providing the defendant with sufficient
information upon which to base an informed plea and litigation strategy; by facilitating the raising of objections to
admissibility prior to trial; by minimizing the undesirable effect of surprise at trial; and by contributing to the
accuracy of the fact-finding process.”) (internal quotation marks and citation omitted). Since minimized intercepted
communications, by definition, are not going to be used by the government in its case-in-chief or at all, a defendant
has no need for disclosure of such material in order to raise any admissibility challenge. Moreover, to the extent a
defendant seeks disclosure of such minimized intercepted communications as somehow exculpatory, this argument
fails. See U.S. v. Scarpa, 913 F.2d 993, 1011 (2d Cir. 1990) (“A defendant may not seek to establish his innocence .
. . through proof of the absence of criminal acts on specific occasions.”). For these reasons, minimized
communications are not automatically “relevant” within the meaning of Rule 16(a)(1)(B)(i), and absent any such
                                                           20
        Under Rule 16(a)(1)(E), “the government must permit the defendant to inspect and to

copy or photograph books, papers, documents, data, photographs, tangible objects, buildings or

places, or copies or portions of any of these items, if the item is within the government’s

possession, custody, or control and,” inter alia, “the item is material to preparing the defense” or

“the government intends to use the item in its case-in-chief at trial.” FED. R. CRIM. P.

16(a)(1)(E)(i)–(ii); see United States v. Thompson, 562 F.3d 387, 396 (D.C. Cir. 2009). Here,

the government intends to use Panfilo’s electronic communications in its case-in-chief “as direct

evidence against Defendant Panfilo and as statements made in furtherance of the conspiracy

against Defendant Agustin,” Gov’t’s Opp’n Defs.’ Discovery Mots. at 3–4, but the government

does not plan to rely on any electronic communications not involving Panfilo in its case-in-chief,

id. at 4–5; Jt. Stm. Discovery ¶ 7. Thus, to be entitled, under Rule 16(a)(1)(E), to Panfilo’s

minimized intercepts and/or co-conspirator intercepts, the defendants must show that these

communications are “material to preparing the defense.” Fed. R. Crim. P. 16(a)(1)(E)(i).

“[I]n the context of Rule 16, ‘the defendant’s defense’ means the defendant’s response to the

Government’s case in chief.” United States v. Armstrong, 517 U.S. 456, 462 (1996). To qualify

as “material for preparing the defense,” the D.C. Circuit has explained that the discovery sought

must be related “to refutation of the government’s case in chief,” and not “to establishment of an

independent . . . bar to the prosecution.” United States v. Rashed, 234 F.3d 1280, 1285 (D.C.

Cir. 2000); see also United States v. Marshall, 132 F.3d 63, 67 n.1 (D.C. Cir. 1998) (“The

Supreme Court recently clarified the meaning of the phrase ‘material to the preparation of the

defendant's defense.’ The phrase ‘authorizes defendants to examine government documents




showing of relevance, Panfilo is not entitled to compel disclosure of any oral statements captured in minimized
AMR files.
                                                        21
material to the preparation of their defense against the Government’s case-in-chief . . . .’”)

(quoting Armstrong, 517 U.S. at 463).

       In other word, “the evidence must not simply bear some abstract relationship to the issues

in the case, . . . and the government must disclose Rule 16 evidence only if such evidence

enables the defendant significantly to alter the quantum of proof in his favor.” United States v.

Libby, 429 F. Supp. 2d 1, 7 (D.D.C. 2006) (internal quotation marks and citation omitted). Rule

16(a)(1)(E) applies equally to exculpatory and inculpatory evidence, since “it is just as important

to the preparation of a defense to know its potential pitfalls as it is to know its strengths.”

Marshall, 132 F.3d at 67.

       As a general matter, “Rule 16 establishes ‘the minimum amount of discovery to which

the parties are entitled. It is not intended to limit the judge’s discretion to order broader

discovery in appropriate cases.’” United States v. Karake, 281 F. Supp. 2d 302, 306 (D.D.C.

2003) (quoting FED. R. CRIM. P. 16 advisory committee’s note to the 1974 amendments). That

being said, “Rule 16 does not authorize a blanket request to see the prosecution’s file.” United

States v. Maranzino, 860 F.2d 981, 985–86 (10th Cir. 1988) (citing Jencks v. United States, 353

U.S. 657, 667 (1957)).

               2.      Analysis

       The defendants fail to demonstrate that the minimized Panfilo intercepts and co-

conspirator intercepts are “material” to preparing their defenses in “response to the

Government’s case in chief.” Armstrong, 517 U.S. at 462. To the contrary, the two reasons the

defendants have put forward to compel this discovery—the possibility of finding some

exculpatory information and to verify the government’s minimization procedures—fall far short

of justifying the massive discovery undertaking contemplated by this request. They are simply

                                                  22
not entitled to the broad, time-consuming and burdensome fishing expedition encompassed by

this discovery demand. Cf. United States v. George, 786 F. Supp. 11, 14 (D.D.C. 1991) (“At

least one of the rationales behind the materiality requirement (and limiting discovery by criminal

defendants generally) is to insure that the government not expend excessive time and effort

securing documents for the defendant.”).

       First, the defendants’ vague asserted need for potentially exculpatory evidence that might

be contained in the minimized and co-conspirator intercepts does not pass muster. See United

States v. Williams-Davis, 90 F.3d 490, 514 (D.C. Cir. 1996) (rejecting, in the Brady context,

“bare speculation [of] . . . the existence of favorable materials”); United States v. Sims, 508 Fed.

App’x 452, 460–61 (6th Cir. 2012) (denying a Rule 16(a)(1)(E) motion to compel discovery

because the defendant’s motion was predicated on “a series of generalities based upon an

unsubstantiated possibility”) (internal quotation marks omitted). With respect to the alleged co-

conspirators’ intercepts, Panfilo suggests that “if the Defendant is not the subject of nor any of

his communications captured in any of the intercepts of his co-conspirators, these

communications have apparent exculpatory value.” Panfilo’s Reply Discovery Mot. at 3. As

noted, supra note 20, Panfilo’s absence from certain pertinent intercepts of co-conspirators does

little to rebut the inculpatory evidence contained in the approximately 12,500 Panfilo intercepts

the government seeks to use at trial. See U.S. v. Scarpa, 913 F.2d 993, 1011 (2d Cir. 1990) (“A

defendant may not seek to establish his innocence . . . through proof of the absence of criminal

acts on specific occasions.”). Moreover, far easier methods to establish the fact that Panfilo is

not a party to the requested co-conspirator intercepts are available than wholesale production of

those intercepts. A straight-forward question to an appropriate law enforcement agent or a




                                                 23
stipulation with the government regarding the fact that the government has identified intercepts

as containing communications of co-conspirators, and not Panfilo, come to mind.

       Agustin has provided a similarly vague rationale for seeking the minimized and co-

conspirator intercepts: “The defense must have access to all the intercepts in order to analyze

their contents and determine what evidence exists that both potentially inculpates or exculpates

him of the charges in this case.” Agustin’s Discovery Mot. at 4. As a threshold matter, the

government has stated that the undisclosed intercepts will not be introduced in the government’s

case-in-chief, and, accordingly, the inculpatory nature of any of these communications is not

material. Moreover, Agustin has provided absolutely no information about why communications

to which he was not a party because he was incarcerated would contain any exculpatory

information about him. The defendants’ mere desire to “search” the intercepts “for exculpatory

information,” Jt. Stm. Discovery ¶ 7, reveals this request as the fishing expedition it is.

       In contrast to the defendants’ speculative reasons proffered here, in other cases in which a

defendant has made a Rule 16(a)(1)(E) motion to compel discovery based on its potential

exculpatory value, the defendant clearly identified how the evidence would further the defense.

See, e.g., United States v. O’Keefe, Crim. No. 06-249 (PLF), 2007 U.S. Dist. LEXIS 31053, *2,

11 (D.D.C. Apr. 27, 2007) (granting a motion to compel in a corruption case where the evidence

sought would prove that there was “no ‘official act’ as a matter of law and that the defendants

did not have the requisite criminal intent as a matter of fact”); Libby, 429 F. Supp. at 14–17

(granting in part the defendant’s motion to compel and ordering disclosure of the topics covered

during briefings to aid the defendant in his defense that he was preoccupied during the relevant

time period); Karake, 281 F. Supp. 2d at 308 (granting the defendants’ motion to compel

discovery where the information sought was “crucial to their ability to file motions to suppress

                                                 24
[their] statements . . . , and may reveal mitigating evidence arising from the circumstances of

their extradition”).

        In any event, the government represents that it is “unaware of any exculpatory material

regarding the Defendants in this case” and affirms that it has and will continue to comply with its

obligations under Brady v. Maryland, 373 U.S. 83 (1963); Giglio v. United States, 405 U.S. 150

(1972); and Weatherford v. Bursey, 429 U.S. 545 (1977). Gov’t’s Opp’n Defs.’ Discovery Mots.

at 9. The government reiterated this point during the August 2, 2017 hearing and added that the

members of the Meza Flores DTO (the distribution cell of a larger Mexican drug trafficking

organization at issue in this case) used many different modes of communication. See Status

Conf. Hr’g (rough) Tr. (Aug. 2, 2017) at 38–39. Thus, even if Panfilo were not a participant in

all of the intercepted Blackberry messages among DTO members, this would not necessarily be

exculpatory. Based on the government’s written and oral assurances, the Court is satisfied that

the government has been and will remain “vigilant in ensuring that it fulfills its discovery and

Brady/Giglio obligations.” Karake, 281 F. Supp. 2d at 306 (accepting the government’s

assertion that it was aware of “no Brady information of the type described”).

        The next reason given by the defendants for compelling discovery of the minimized

Panfilo and co-conspirator intercepts shows plainly that this discovery demand is not intended to

prepare a defense in response to the government’s case-in-chief. The defendants argue that

receiving all intercepts, including those of alleged co-conspirators and minimized, will help

show that the government improperly minimized the communications. See Jt. Stm. Discovery ¶

7. Although the erroneous marking of seven AMR files as “pertinent” rightfully raises some

concern, seven is a “small number” compared to the approximately 12,500 electronic

communications marked pertinent and not minimized. Gov’t’s Third Opp’n T. III Intercepts at

                                                25
18. In addition, given the detailed description provided by the government of the minimization

procedures employed, and the fact that the seven AMR files were all received in the same

session by the same monitor and have no accompanying transcript, Gov’t’s Second Opp’n T. III

Intercepts at 5, the defendants’ argument that additional minimization violations may be

uncovered through the requested compelled discovery is purely speculative.

          This defense effort to find additional evidence to bolster arguments challenging the

minimization procedures used during the wiretap phase of the investigation does not refute any

of the government’s direct evidence against the defendants. To the contrary, even if additional

minimization violations were found, the wiretap statute does not provide a suppression remedy

for Panfilo’s intercepted electronic communications, which could still be used in the

government’s case-in-chief. Consequently, the defendants’ wishful thinking of finding

additional minimization violations does not justify the requested discovery under Rule 16. See,

e.g., United States v. Pray, 734 F. Supp. 2d 158, 159–60 (D.D.C. 2010) (denying defendants’

motion to compel discovery of periodic wiretap reports for use in challenging, inter alia,

minimization and propriety of government’s procedures since such evidence “do[es] not

constitute material evidence”); United States v. Trabelsi, Crim. No. 06-89 (RWR), 2015 U.S.

Dist. LEXIS 189343, *6–7 (D.D.C. May 8, 2015) (finding that defendant’s request for discovery

to was “not warranted under Rule 16(a)(1)(E)(i)” since it is “not to rebut the government’s case

in chief but to support an independent argument to dismiss the indictment”).

       Accordingly, the defendants’ motions to compel discovery are DENIED.

 II.      GOVERNMENT’S MOTION TO RECONSIDER USE OF NON-LITERAL
          TRANSLATIONS OF INTERCEPTED COMMUNICATIONS TRANSCRIPTS

          The government has moved to use at trial transcripts of intercepted BlackBerry

Messenger communications (“BBMs”) in the form produced to the defendants on August 8,
                                                  26
2017. Gov’t’s BBMT Mot. at 1 & n.1. Shortly after initial production of the transcripts at issue,

the defendants raised concern at a status conference held on August 11, 2017, that the

government’s proposed transcripts did not provide literal translations of certain words but instead

interpreted Spanish slang to have potentially prejudicial meaning, like “cocaine” for a word

literally translated as “parakeet.” Status Conf. Hr’g (rough) Tr. (Aug. 11, 2017) at 4–5.21

         Conceding that literal translations are not used for certain Spanish words in these

proposed transcripts, the government argues that the transcripts reflect “English translations of

Spanish slang words or colloquialisms that are acceptable translations of the Spanish language

BBM communications,” based upon the “knowledge and experience” of the translator. Gov’t’s

BBMT Mot. at 2. According to the government, if literal translations are used, the translator

“would be unable to testify that the translation is a fair and accurate translation of the Spanish

communication based upon her expertise and based on the context of the conversation,” since

interpreting the import of the communication requires more than “taking statements in one

language and expressing them in a different language” but instead reflects “a continuing exercise

of judgment and analysis of what is meant or intended to be said by the parties.” Id. at 6–7

(internal quotation marks and citation omitted).

         Specifically, the government has enumerated eleven words set out in the chart below that

have been translated differently from the literal meaning to reflect the common slang

understanding. See id.22



21
         The government was directed to provide the Defendants with “literal” translations of the intercepted BBM
communications by August 15, 2017, see Minute Order (Aug. 11, 2017) (directing government “to re-produce to the
defendants, by August 15, 2017, transcripts for Blackberry intercepts, containing literal translations of all words”),
and the government generally complied by providing “updated” transcripts. In the instant motion, the government
seeks to use the original transcripts produced on August 8, 2017.
22
         The defendants mentioned the word “perico” as an example of an inaccurately translated word, Status
Conf. Hr’g (rough) Tr. (Aug. 11, 2017) at 4, but the government indicates this word may be literally translated at
“cocaine,” Gov’t’s BBMT Mot. at 1 n.1 (noting that the REAL ACADEMIA ESPAÑOLA (“RAE”), a recognized Spanish
                                                         27
                Intercepted            Literal Translation          Slang Translation Used in Proposed
               Spanish Word                                                   BBM Transcripts
        1          Simón                        Simon                                  yes
        2           Sale                        leave                                alright
        3           Jale                         pull                           work, job, stuff
        4          Fierro                        iron               guns; also interjection like “Alright” or
                                                                                   “go for it!”
        5             Paro                  Stop; strike;
                                             stoppage                “hacerme el paro” is to do me a favor

        6           Chale                      chalet                     No way!; Oh my God!; sure
        7          Aguitarse               (no definition)                  bummed; bummed out
        8          Parrque                      park                          ammunition; ammo
        9           Morros                   snout/nose                            kid; boy
       10            Pedo                       fart                    no hay pedo; there’s no problem
       11            Vato                  (no definition)                           dude

         Here, without identifying any of the eleven words or other particular words or phrases

used in the proposed transcripts as disputed, the defendants have generally challenged the

transcripts’ accuracy and requested “a pre-trial hearing to determine the admissibility of the

materials.” Defs.’ Opp’n Gov’t’s BBMT Mot. at 1, ECF No. 100.23 The government’s

translator, Judi O’Brien, has “approximately 20 years of experience as a Spanish language

translator and interpreter,” an advanced Master of Arts degree in Spanish and Latin American

Studies from American University, and has, for the past seven years, “been employed as a

translator and language services coordinator with the Narcotic and Dangerous Drug Section, U.S.


dictionary, lists “cocaine” as an acceptable definition of the word “perico”). The defendants do not contest this
assertion in their opposition. See generally Defs.’ Opp’n Gov’t’s BBMT Mot., ECF No. 100.
23
         The defendants initially contended that insufficient information was provided about the qualifications of the
government’s translator “to determine if she even has the expertise to translate the materials,” citing the lack of any
“expert notice pursuant to Federal Rule of Criminal Procedure 702 for the witness,” or “information concerning the
qualifications and methodology used to create the English language transcripts,” or “what materials the translator
was provided in this case.” Defs.’ Opp’n Gov’t’s BBMT Mot. at 1–3. Less than one week after the defendants
pointed out the lack of a government expert notice for the translator of the proposed BBM transcripts, the
government filed such a notice for Judi O’Brien, who is a certified Spanish to English translator. See Gov’t’s Not.
Expert Testimony of Judi O’Brien at 1–2, ECF No. 106.
                                                         28
Department of Justice.” Gov’t’s Not. Expert Testimony of Judi O’Brien at 1–2, ECF No. 106.24

Despite these qualifications, the defendants question the translator’s “proficiency” in interpreting

“the dialect of Mexican Spanish that will be at issue in this case,” since her “Spanish language

education took place in Costa Rica.” Defs.’ Resp. Gov’t’s Not. Intent to Call Expert Witnesses

(“Defs.’ Resp. Gov’t’s Not. Expert Witnesses”) at 2, ECF No. 123. The defendants, however,

“will not object to the Government proceeding at their own peril with the use of Ms. O’Brien as

their expert,” and are trying to locate their own qualified expert “to review the tapes and

blackberry messages and will provide the Government with the results of any forthcoming

analysis as soon as it is prepared.” Id. at 3; see Gov’t’s Reply Further Supp. Not. Intent to Call

Expert Witnesses at 2, ECF No. 125 (noting that “the Defendants’ [sic] do not challenge the

sufficiency of the notices regarding Judi O’Brien”).

         To the extent the defendants challenge the interpretation reflected in the transcripts, the

government contends that they may do so “through cross-examination or by the presentation of

another qualified translator with a contrary view.” Gov’t’s BBMT Mot. at 3 (citing United

States v. Verdin-Garcia, 516 F.3d 884, 892–93 (10th Cir. 2008) (emphasis in original); id. at 3–5

(discussing United States v. Khan, 794 F.3d 1288, 1294–97 (11th Cir. 2015) (affirming ruling

admitting non-literal transcripts at trial, noting that “[d]efendants who object to the manner in

which a translator has performed the difficult and delicate task of moving meaning between two

languages have a number of tools at their disposal—Rule 702, cross-examination, and limiting

instructions, to name a few”)). The government is correct.




24
         Ms. O’Brien has also provided testimony in three other trials in this court, Gov’t’s Not. Expert Testimony
of Judi O’Brien at 2, though without being qualified as an expert, Defs.’ Resp. Gov’t’s Not. Intent to Call Expert
Witnesses (“Defs.’ Resp. Gov’t’s Not. Expert Witnesses”) at 3, ECF No. 123.
                                                         29
       Although “[t]he ideal procedure for testing accuracy is to have the prosecution and

defense attorneys stipulate to a transcript,” United States v. Slade, 627 F.2d 293, 302 (D.C. Cir.

1980), the D.C. Circuit has provided guidance as to the appropriate procedures when, as here, the

accuracy of transcripts is disputed. In this circumstance, “the trial court can make a pretrial

determination of accuracy after comparing the proposed transcript against the tapes or provide

the jury with one transcript reflecting the prosecution’s interpretation of the recording and one

version reflecting the defendant’s interpretation,” United States v. Holton, 116 F.3d 1536, 1541

(D.C. Cir 1997); see also Slade, 627 F. 2d at 303 (“A third alternative is to present the jury with

two transcripts, containing both sides’ versions, and let the jury determine which is more

accurate,” in which “situation, because no one transcript is presented as ‘correct,’ the judge need

not necessarily listen to the tapes or pass on the accuracy of any transcript.”) (internal quotation

marks and citation omitted). If two competing versions of the same recording are presented, the

jury “should be instructed that there is a difference of opinion as to the accuracy of the

transcripts and that it is up to them to decide which, if any, version to accept. The jurors also

should be instructed that they should disregard any portion of the transcript or transcripts that

they think differs from what they hear on the tape recording.” Holton, 116 F.3d at 1543. If only

the government submits a transcript, then cautionary instructions should be given that “the

transcript is only one party’s version,” United States v. Law, 528 F.3d 888, 901–02 (D.C. Cir.

2008) (quoting Holton, 116 F.3d at 1542).

       The precise procedure to be used at trial remains unclear due to the defendants’ expressed

need to locate their own qualified expert interpreter. Defs.’ Resp. Gov’t’s Not. Expert Witnesses

at 3. The defendants have now had since August 8, 2017, or over four months, to do so, as well

as to determine precisely which interpretations in the proposed transcripts are disputed and to

                                                 30
prepare versions of their own transcripts, as necessary. Thus, the parties are required to submit

jointly, by January 10, 2018, before the pretrial conference, a notice (1) detailing any

outstanding disputes regarding the proposed transcripts produced on August 8, 2017; (2) whether

any defendant intends to offer alternative transcripts; (3) if any defendant intends to offer

alternative interpretations of the recordings, whether the parties intend to introduce one transcript

containing both versions of the disputed portions of the recording or two separate transcripts; (4)

the text of any requested cautionary instructions regarding the transcripts; and (5) any objection

to permitting the jury to use the transcripts during deliberations. See United States v. Edwards,

887 F. Supp. 2d 63, 71–73 (D.D.C. 2012).

       In view of the defendants’ withdrawal of their objection to the government’s translator’s

qualifications, their request for a pretrial hearing to evaluate and hear expert testimony about the

proposed August 8, 2017 BBM transcripts is DENIED. Further, based upon the qualifications of

the government’s translator, whose expertise and methodology used to prepare the English

transcripts at issue will be subject to cross examination at trial, the government’s motion to use at

trial the version of transcripts of intercepted BBMs produced on August 8, 2017, is GRANTED.

III.   DEFENDANT AGUSTIN’S MOTION TO INSPECT GRAND JURY MINUTES

       Both defendants previously unsuccessfully moved to dismiss Count Two of the

Indictment charging a firearm offense, in violation of 18 U.S.C. § 924(c), as not applying

extraterritorially and for being facially defective. See Apodaca II, 2017 U.S. Dist. LEXIS

131617, at *66 (denying defendants’ motions to dismiss Count Two and finding that “§ 924(c)

also applies extraterritorially” and “adequately informs the defendants of the § 924(c) offenses

with which they are charged”). Undeterred, Agustin now raises a new challenge to Count Two

and moves for “an in camera inspection of the grand jury minutes to determine what specific

                                                 31
evidence was presented concerning the possession of a firearm charged in Count Two of the

Indictment,” and what “legal instructions” were “provided to the grand jurors concerning Count

Two’s ‘aiding and abetting’ theory.” Def.’s Mot. GJ Inspection at 1.25 In particular, Agustin

suspects that, first, the government’s trial evidence may “constructively amend the Indictment,”

and, second, the grand jury was not properly instructed about “controlling law” requiring “that an

aider and abettor had ‘actual knowledge’ that a firearm would be used in the commission of the

offense,” and failure to provide such instruction “would undermine the validity of the

Indictment. Id. (citing Bank of Nova Scotia v. United States, 487 U.S. 250, 256 (1988)). The

government objects, contending that this defendant “has not met his burden to overcome the

presumption of regularity surrounding grand jury proceedings.” Gov’t’s Opp’n Def.’s Mot. In

Camera Inspection of Grand Jury Minutes (“Gov’t’s Opp’n Def.’s Mot. GJ Inspection”) at 1,

ECF No. 131. As explained below, the Court agrees with the government.

        In evaluating this motion, the charge itself and the government’s proffered evidence are

first reviewed, before turning to analysis of whether either of Agustin’s arguments warrant

inspection of the grand jury minutes. Count Two charges, in relevant part, that the defendant,

“[f]rom in or about July 2010, and continuing thereafter, up to and including May 2012, . . . did

knowingly and intentionally use, carry, and brandish a firearm, during and in relation to one or

more drug trafficking crimes, to wit: the crimes charged in Count One, and . . . possess a firearm

in furtherance of such drug trafficking crimes.” Agustin’s Indictment, United States v. Agustin

Flores Apodaca, Crim. No. 12-116 (BAH) at 1–3 (D.D.C. May 2, 2012), ECF No. 1. The



25
         The defendant states that the belated filing of this motion on November 6, 2017, when the scheduling order
required substantive motions to be filed by June 28, 2017, Min. Order (dated Mar. 3, 2017) is because the grounds
for the motion did not become “apparent to defense counsel until the Government filed its Supplemental Notices
concerning other crimes evidence and the Court resolved the originally filed legal motions.” Def.’s Mot. GJ
Inspection at 1.
                                                        32
government has proffered as evidence for this charge that: (1) cooperating witnesses will testify

about Agustin’s possession of firearms in the course of the drug trafficking activities charged in

Count One of the Indictment; (2) in about December 2009, in El Burrion in Sinaloa, Mexico,

Agustin carried firearms during a violent shoot-out; (3) in September 2010, Agustin attempted to

trade drugs for .50 caliber machine guns for use against a rival drug cartel; and (4) in October

2013, in Santa Maria del Oro in the state of Nayarit, Mexico, co-defendant Panfilo and co-

conspirators possessed weapons while fleeing from, and being involved in a shoot-out with,

Mexican Marines. Apodaca II, 2017 U.S. Dist. LEXIS 131617, at *65.

       A. Requested Inspection of Evidence Presented To Grand Jury

       With respect to the first proffered basis for inspection of the grand jury minutes, Agustin

denies that he is challenging “the sufficiency of the evidence presented to the grand jury,” Def.’s

Mot. GJ Inspection at 5; see Def.’s Reply Supp. Mot. In Camera Inspection of Grand Jury

Minutes (“Def.’s Reply Mot. GJ Inspection”) at 1, ECF No. 132, but requests only that the Court

inspect “what evidence was presented . . . and take appropriate steps to ensure that the charge is

not constructively amended at trial . . . ,” Def.’s Mot. GJ Inspection at 5 (emphasis in original).

He points out that: the last three alleged events do not support Count Two, since the December,

2009 evidence falls outside the two-year date range of the firearms charge; the September 2010

evidence amounts to an attempt, which is “a theory that is not included in the Indictment”; and

the October 2013 evidence occurred after the Indictment had been returned on May 2, 2012. Id.

at 4–5. Agustin concedes that more generalized testimony from cooperating witnesses about his

possession of firearms in the course of drug trafficking activities would be sufficient to support

the charge, but nonetheless urges inspection of the grand jury minutes apparently to ensure that

such generalized evidence was, in fact, provided and to assess whether some undefined

                                                 33
“appropriate steps” must be taken to avoid constructive amendment of the indictment at trial,

with the concomitant risk “of infecting the trial with reversible error,” id. at 5, by

“supplement[ing] the factual basis of criminal liability at the trial,” Def.’s Reply Mot. GJ

Inspection at 2.

       At the outset, the government’s response lacks any specific assurances about the evidence

presented to the grand jury to support Count Two. Id. at 1 (noting that “Government has [not]

even offered an informal ‘proffer’ as to the evidentiary predicate for Count Two presented to the

grand jury”). Nevertheless, as Agustin concedes, the government had cooperating witnesses’

testimony available in some form to present to the grand jury, and such evidence would be

sufficient to support Count Two. Thus, despite his denial that he is challenging the sufficiency

of the grand jury evidence, Agustin’s request for in camera review of grand jury minutes to

ascertain what evidence was presented to support the grand jury’s finding of probable cause to

believe the defendant committed the firearms offense charged, amounts to the same thing. Yet,

the law is well-established that challenges to the sufficiency of the evidence presented to the

grand jury are not permitted. See, e.g., United States v. Williams, 504 U.S. 36, 54–66 (1992)

(“[I]t would run counter to the whole history of the grand jury institution’ to permit an

indictment to be challenged ‘on the ground that there was inadequate or incompetent evidence

before the grand jury.”) (quoting Costello v. United States, 350 U.S. 359, 363–364 (1956)); Bank

of Nova Scotia, 487 U.S. at 261 (explaining “a challenge to the reliability or competence of

evidence presented to the grand jury” will not be heard, and “the mere fact that evidence itself is

unreliable is not sufficient to require a dismissal of the indictment”).

       This law reflects “a long-established policy that maintains the secrecy of the grand jury

proceedings in the federal courts,” United States v. Procter & Gamble Co., 356 U.S. 677, 681

                                                  34
(1958), and “a presumption of regularity,” with respect to grand jury proceedings, “which

generally may be dispelled only upon particularized proof of irregularities in the grand jury

process,” United States v. Mechanik, 475 U.S. 66, 75 (1986). Under Federal Rules of Criminal

Procedure 6(e), grand jury materials are subject to disclosure when the defendant succeeds in

carrying the heavy burden of showing “that a particularized need exists” that “outweighs the

policy of secrecy.” Pittsburgh Plate Glass Co. v. United States, 360 U.S. 395, 400 (1959)

(internal quotation marks omitted); see also id. at 399 (“Petitioners concede, as they must, that

any disclosure of grand jury minutes is covered by [FED. R. CRIM. P. 6(e)].”) The Supreme Court

has found this burden met where “the Government concedes that the importance of preserving

the secrecy of the grand jury minutes is minimal and also admits the persuasiveness of the

arguments advanced in favor of disclosure.” Dennis v. United States, 384 U.S. 855, 871–72

(1966); see also De Binder v. United States, 292 F.2d 737, 739 (D.C. Cir. 1961) (determining

that defendant met burden for inspection of grand jury minutes where “ample ground” existed for

“suspicion” of “inconsistencies” between grand jury and trial testimony of prosecution’s “sole,

key, eyewitness”).

       By contrast, where a defendant fails to provide a discrete reason, and instead relies on

speculation or unsupported assumptions, courts have made clear that disclosure of grand jury

minutes is not warranted. See, e.g., Procter & Gamble, 356 U.S. at 682–83 (noting that

defendants’ showings “fall short of proof that without the [grand jury] transcript a defense would

be greatly prejudiced or that without reference to it an injustice would be done,” and thus the

case was not one of those “cases of particularized need where the secrecy of the proceedings is

lifted discretely and limitedly”); Jackson v. United States, 297 F.2d 195, 197–98 (D.C. Cir.

1961) (explaining, after finding “not the slightest evidence of inconsistency” between witness’s

                                                35
trial and grand jury testimony, that “[i]f defendant’s position is correct . . . defense counsel in

every case [might] be allowed to go upon a fishing expedition in the hope of developing

something favorable to the defense”); United States v. Borda, 905 F. Supp. 2d 201, 205 (D.D.C.

2012) (finding defendants did not demonstrate particular need for inspection of grand jury

minutes where their assertions about misleading evidence were “completely speculative” and

relied on a “tenuous” connection between an affidavit and testimony presented to the grand jury);

United States v. Hernandez, No. CR-14-0120 EMC, 2015 U.S. Dist. LEXIS 96402, at *29 (N.D.

Cal. July 23, 2015) (finding, where “[i]ndictment is sufficiently factually specific,” defendants

have “no particularized need . . . to obtain the grand jury transcripts so that they can ‘confirm’

that the grand jury did not pass on the factual allegations the Government intends to prove at

trial”). Only in “exceedingly rare cases” are defendants “able to make a factually based showing

of particularized need for the production and inspection of grand jury materials.” United States

v. Naegele, 474 F. Supp. 2d 9, 10–11 (D.D.C. 2007) (allowing inspection of grand jury minutes

because government misled the grand jury about the existence of a page of a document that had

been the basis for “[a]t least five counts of the original eleven-count indictment”).

       In this case, Agustin contends that the grand jury minutes should be inspected to guard

against any constructive amendment of the indictment stemming from variance between the

evidence considered by the grand jury and the anticipated proof at trial. He speculates about

“what evidence was presented to the grand jury” to raise “a very real possibility” that

“constructive amendment of the Indictment” may occur. Def.’s Reply Mot. GJ Inspection at 1–

2. While constructive amendment of an indictment violates the Fifth Amendment’s presentment

clause where substantial “variance” exists between the “charging terms of the indictment left

unaltered” and “evidence offered at trial prov[ing] facts materially different from those alleged in

                                                  36
the indictment,” Gaither v. United States, 413 F.2d 1061, 1071 (D.C. Cir. 1969); see also Stirone

v. United States, 361 U.S. 212, 218 (1960) (“[T]he basic protection the grand jury was designed

to afford is defeated by a device or method which subjects the defendant to prosecution for [an

offense] which the grand jury did not charge.”), Agustin has not presented any sufficient reason,

let alone a particularized need, to overcome the presumption against disclosure of the grand jury

materials.

       Even if Agustin is correct that all of the evidence regarding the firearms charge that the

government intends to introduce at trial was not presented to the grand jury, this does not amount

to an improper variance of proof or demonstrate a particularized need for inspection of the

evidence presented to the grand jury. As long as the defendant is on notice of the charges against

him and the trial evidence does not alter “an essential element of the charge,” the law permits

some variance in proof between the grand jury and at trial. United States v. Hitt, 249 F.3d 1010,

1028 (D.C. Cir. 2001) (permitting “flexibility in proof” at trial, where “the defendant was given

notice of the core of criminality to be proven at trial.” (quoting Berger, 224 F.3d 107, 117 (2d.

Cir. 2000)); see United States v. Sitzmann, 74 F. Supp. 3d 96, 122 (D.D.C. 2014) (“[W]here ‘a

generally framed indictment encompasses the specific legal theory or evidence used at trial, there

is no constructive amendment.’”) (quoting United States v. Rigas, 490 F.3d 208, 228 (2d Cr.

2007)); accord United States v. Dowdell, 595 F.3d 50, 68 (1st Cir. 2010) (explaining that, given

notice of charge given to defendant, any “variance” in proof “would have been a harmless one”

and not in violation of the Fifth Amendment); United States v. Wiley, 29 F.3d 345, 352 (8th Cir.

1994) (finding where defendant “was on notice before trial that the government intended to

present” certain evidence, “any variance did not affect his substantial rights or cause actual

prejudice”). For instance, “[t]here is no constructive amendment when a court ‘admit[s]

                                                 37
evidence of other criminal conduct that is inextricably intertwined with the charged offense or

that completes the story of the charged offense.’” McClurge v. United States, No. 04 C 3628,

2004 U.S. Dist. LEXIS 25108, at *10 (N.D. Ill. Dec. 13, 2004) (alteration in original) (quoting

United States v. King, 126 F.3d 987, 995 (7th Cir. 1997)). Thus, to the extent Agustin is

concerned that the government will present at trial other crimes or intrinsic evidence supporting

Count Two that was not previously submitted to the grand jury, this additional proof does not

amount to an improper variance and consequently does not warrant inspection of the grand jury

minutes.

        Given the adequate notice of the firearms charge afforded to the defendants, see Apodaca

II, 2017 U.S. Dist. LEXIS 131617 at *66, and Agustin’s failure to provide any actual

“particularized need” for disclosure of grand jury materials, especially in light of his concession

that cooperating witnesses may provide sufficient support for the charge against him, the first

basis of his motion for inspection of grand jury minutes fails.

        B. Alleged Improper Legal Instructions to Grand Jury

        The second basis for Agustin’s motion for in camera inspection of the grand jury minutes

is to check whether the grand jury was properly instructed on the law regarding aiding and

abetting liability. In this regard, Agustin is correct that criminal liability for aiding and abetting a

violation of 18 U.S.C. § 924(c) requires that the defendant has “actual knowledge” of the use of a

firearm by the principal. See Rosemond v. United States, 134 S. Ct. 1240, 1243 (2014) (“We

hold that the Government makes its case by proving that the defendant actively participated in

the underlying drug trafficking or violent crime with advance knowledge that a confederate

would use or carry a gun during the crime’s commission.”); United States v. Slatten, 865 F.3d

767, 793 (D.C. Cir. 2017) (citing Rosemond, and finding “sufficient evidence to support []

                                                  38
convictions under an aiding-and-abetting theory” where defendant at issue “actively participated

in a gunbattle in which” victims were killed and “the gunfire of each shooter hindered potential

escape, leaving victims exposed to the others’ bullets”); United States v. Powell, 929 F.2d 724,

729 (D.C. Cir. 1991) (requiring proof that aider and abettor “knew to a practical certainty that his

drug-peddling associates would be carrying a gun in connection with their joint venture”);

United States v. García-Ortiz, 792 F.3d 184, 189–90 (1st Cir. 2015) (stating “requirement that

an aider and abettor of a § 924(c) crime have advance knowledge of the principal’s intent to use

a weapon”). Citing a single paragraph in the prosecutor’s extradition request, which Agustin

claims provides an “incomplete statement of the law” applicable to aiding and abetting, he

contends this provides “good reason to believe that any instructions [to the grand jury] were

incomplete.” Def.’s Mot. GJ Inspection at 7–8.

       With this argument, Agustin again fails to meet his burden for demonstrating a

“particularized need” to overcome the presumption of secrecy and regularity that materials from

grand jury proceedings enjoy. See Procter & Gamble, 356 U.S. at 683; Pittsburgh Plate Glass,

360 U.S. at 400. His argument essentially relies on what is missing in the extradition request,

which, as the government points out, is governed by treaty and does not require “a complete set

of jury instructions.” Gov’t’s’ Opp’n Def.’s Mot. GJ Inspection at 7–8. Moreover, as discussed

above, the indictment has already been deemed facially valid, which undermines Agustin’s

theory that the grand jury instructions may have been incomplete. See United States v. Espy, 23

F. Supp. 2d 1, 10 (D.D.C. 1998) (denying motion for disclosure of grand jury materials where

“facially valid indictment undermines any ‘particularized need’ the alleged grand jury

instructions demonstrate for disclosure of the grand jury transcripts”); see also United States v.

Singhal, 876 F. Supp. 2d 82, 99 (D.D.C. 2012) (rejecting disclosure of grand jury materials

                                                 39
where “[d]efendants are unable to identify any portion of the Indictment that suggests that any

charge to the grand jury was legally erroneous, and resorts to speculation about what the grand

jury was instructed based on what is not stated in the Indictment”) (emphasis in original); United

States v. Trie, 23 F. Supp. 2d 55, 62 (D.D.C. 1998) (finding where “the indictment is facially

valid” that “the mere suspicion that the grand jury may not have been properly instructed . . . is

insufficient to establish that [the defendant] is entitled either to dismissal of the indictment or to

disclosure of grand jury materials”).

       For these reasons, Agustin has failed to show any “particularized need” for inspection of

the instructions to the grand jury about Count Two, and his attempt to relitigate his earlier

challenge to this charge in the indictment must be rejected. Accordingly, Agustin’s motion for

an in camera review of the grand jury minutes is DENIED.

IV.    CONCLUSION

       For the foregoing reasons, the following motions are DENIED: (1) the defendants’

Motion to Suppress Title III Intercepts, ECF No. 33; (2) the defendants’ motions to compel

discovery, ECF Nos. 40, 41 and 45; and (3) Agustin’s motion for in camera inspection of the

grand jury minutes, ECF No. 130. The government’s motion to use at trial transcripts of

intercepted BlackBerry Messenger communications in the form produced to the defendants on

August 8, 2017, ECF No. 95, is GRANTED, and, as explained supra in Part II, the parties must

jointly submit, by January 10, 2018, a notice (1) detailing any outstanding disputes regarding

the proposed transcripts produced on August 8, 2017; (2) whether any defendant intends to offer

alternative transcripts; (3) if any defendant intends to offer alternative interpretations of the

recordings, whether the parties intend to introduce one transcript containing both versions of the

disputed portions of the recording or two separate transcripts; (4) the text of any requested

                                                  40
cautionary instructions regarding the transcripts; and (5) any objection to permitting the jury to

use the transcripts during deliberations.

       An Order consistent with this Memorandum Opinion will issue contemporaneously.

       Date: December 28, 2017




                                                      __________________________
                                                      BERYL A. HOWELL
                                                      Chief Judge




                                                 41
