                                         COURT OF APPEALS OF VIRGINIA


            Present: Judges Humphreys, Beales and McCullough
PUBLISHED


            Argued at Alexandria, Virginia


            JOSHUA DADZIE ANAMAN, S/K/A
             JOSHUA E. DADZIE-ANAMAN
                                                                               OPINION BY
            v.     Record No. 2465-13-4                                 JUDGE RANDOLPH A. BEALES
                                                                            FEBRUARY 24, 2015
            COMMONWEALTH OF VIRGINIA


                              FROM THE CIRCUIT COURT OF ARLINGTON COUNTY
                                          Louise M. DiMatteo, Judge

                           Allison H. Carpenter, Senior Assistant Public Defender (Office of the
                           Public Defender, on brief), for appellant.

                           Elizabeth C. Kiernan, Assistant Attorney General (Mark R. Herring,
                           Attorney General, on brief), for appellee.


                   Joshua Dadzie Anaman (appellant) appeals his seven convictions by a jury for credit card

            theft, in violation of Code § 18.2-192, and his four convictions for unlawful use of a card

            scanning device or re-encoder, in violation of Code § 18.2-196.1.1 Appellant argues that the trial

            court erred when it allowed into evidence a “Declaration of Unauthorized Use” form (Exhibit

            5F) that one of the victims had completed after Citibank notified her that unauthorized charges

            had appeared on her credit card. Appellant further argues that the evidence was insufficient to

            support any of his eleven convictions. We hold that the trial court did not err when it allowed

            Exhibit 5F into evidence – and that the evidence was sufficient to support each of appellant’s




                   1
                      Appellant was found not guilty of two counts of credit card theft and not guilty of one
            count of unlawful use of a card scanning device. Three of appellant’s convictions for unlawful
            use of a card scanning device were felonies, and one was a misdemeanor.
eleven convictions. Accordingly, for the following reasons, we affirm appellant’s convictions

for credit card theft and his convictions for unlawful use of a card scanning device or re-encoder.

                                          I. BACKGROUND

       We consider the evidence on appeal “‘in the light most favorable to the Commonwealth,

as we must since it was the prevailing party’” in the trial court. Beasley v. Commonwealth, 60

Va. App. 381, 391, 728 S.E.2d 499, 504 (2012) (quoting Riner v. Commonwealth, 268 Va. 296,

330, 601 S.E.2d 555, 574 (2004)).

       In this case, each of the victims rented a car from the Ronald Reagan Washington

National Airport Budget Rental Car (Budget) branch sometime during August of 2011.

Appellant began working for Budget on March 15, 2011, and stopped working for Budget on

November 30, 2011. Shortly after renting a car from Budget, unauthorized charges would

appear on each of the victims’ credit cards or debit2 cards that he or she had used to rent a car

from Budget. The rental paperwork for each of the victims indicated that appellant, who was

identified in the rental paperwork by his agent ID number,3 had conducted the rental transaction

for each of the victims. All of the victims who testified at trial indicated that they had not given

appellant permission to withhold their credit card numbers or to use a card scanner to capture

information from their credit cards.




       2
          For purposes of the offenses at issue in this case, a debit card is treated the same way as
is a credit card. See Code § 18.2-191.
       3
          Diane Kees, a Budget employee, testified that each time a rental associate conducted a
rental transaction, he or she was required to enter his or her agent ID number and PIN into the
computer. Although employees would sometimes trade agent IDs and PINs with each other
when, for example, an employee got locked out of a computer, Kees testified that agents
generally would not have an incentive to share his or her agent ID and PIN with other employees
because any commission goes to the person who is associated with the agent ID number – and
not necessarily to the person who conducts the transaction.

                                                -2-
                          A. The Card Scanning Device and Re-Encoder

       Code § 18.2-196.1 defines “scanning device” as follows: “a scanner, reader, or any other

electronic device that is used to access, read, scan, obtain, memorize, temporarily store, or

permanently store encoded information on the magnetic strip or stripe of a payment card.” Code

§ 18.2-196.1 further defines “Re-encoder” as follows: “an electronic device that transfers

encoded information from the magnetic strip or stripe of a payment card onto the magnetic strip

or stripe of a different payment card.”

       Angel Ruiz, who is a detective with the airport police and had been investigating

appellant’s case, testified that card scanners “are portable devices that usually can be held in your

hands and manipulated such that you don’t have to – they’re not visible to anybody else.” He

further explained that card scanning devices “are small enough where they can fit in your palm”

and that “all you have to do – you can actually walk by a woman’s purse or a man’s wallet and

glide by their wallet or purse, and it will capture their credit card data.” Ruiz opined that card

scanners “are probably used by individuals that are conducting some kind of criminal activity.”

Ruiz explained that a person can use the information obtained on a card scanning device in one

of two ways: (1) he or she can use the information obtained on the scanning device to make

fraudulent purchases online, or (2) he or she can use a re-encoding device to transfer the

information the scanning device has captured onto the magnetic strip of another card, such as an

old credit card or a hotel key with a magnetic strip. Ruiz testified that, during his interview with

appellant, appellant stated that he used a card scanning device that required only a tap of a card

to the device to capture all of the information associated with the card.




                                                -3-
                            B. The Cardholders Who Testified at Trial

       M.M.4 testified that he rented a car from Budget on August 14, 2011. Although M.M.

was not certain if his credit card was out of sight during the rental transaction, M.M. did

recognize appellant as the rental associate who assisted him with the transaction. In addition,

M.M.’s Budget rental paperwork referenced appellant’s agent ID number. Shortly after M.M.

rented his car from Budget, on August 16, 2011, unauthorized transactions appeared on the card

that M.M. had used to rent his car. Specifically, M.M.’s credit card was used to purchase a $500

gift card from Wal-Mart.

       C.J. testified that she rented a car from Budget on August 12, 2011. C.J. testified that the

rental agent from whom she rented her car told her he was from Ghana, which is appellant’s

country of origin. C.J.’s rental paperwork referenced appellant’s agent ID number and, on

August 13, 2011, just one day after renting a car from Budget, unauthorized charges of $1,300

appeared on the card that C.J. had used to rent her car. C.J. testified that her credit card was out

of sight during the transaction.

       Another of the victims, P.W., rented a car from Budget on August 19, 2011. On August

24, 2011 and on August 26, 2011, unauthorized charges totaling $752.12 appeared on the credit

card he used to rent his car. Although P.W. did not remember who assisted him with his rental

transaction, his rental paperwork referenced appellant’s agent ID number. P.W. believed that the

rental agent took his card out of his sight during the transaction.

       D.L. testified that he rented a car from Budget on August 21, 2011. Just a few days later,

on August 24, 2011, unauthorized charges for gasoline appeared on the credit card he used to

rent the car from Budget. D.L. did not recognize the person who conducted his rental



       4
          In order to protect the privacy of the victims, this opinion will not reference them by
their full names.
                                                  -4-
transaction, but D.L.’s rental paperwork referenced appellant’s agent ID number. D.L. recalled

that his credit card was within his sight throughout the rental transaction.

       J.N., yet another victim, testified that he had rented a car from Budget on August 7, 2011.

Shortly thereafter, on August 13, 2011, unauthorized charges of $1,250 appeared on the debit

card that J.N. had used to rent his car from Budget. Although J.N. did not recognize the person

who processed his rental transaction, J.N.’s rental data referenced appellant’s agent ID number.

J.N. did not recall whether his debit card was within his sight at all times during the rental

transaction.

       Finally, E.V. testified that he rented a car from Budget on August 20, 2011. On August

30, 2011, unauthorized charges totaling $420.67 appeared on the card he used to rent the car.

Video surveillance actually captured the rental transaction between E.V. and appellant.

Appellant acknowledged that he was pictured in the video. E.V. could not recall whether his

credit card was within his sight at all times during the transaction.

                         C. Declaration of Unauthorized Use (Exhibit 5F)

       Another victim, N.M., used her credit card to rent a car from Budget on August 18, 2011.

The next day, on August 19, 2011, unauthorized charges appeared on N.M.’s credit card. N.M.’s

rental paperwork from Budget referenced appellant’s agent ID number.

       At the time of trial, N.M. was not available to testify since she was away on a military

tour of duty. Thus, the Commonwealth introduced Exhibit 5F, the Unauthorized Declaration of

Use form, through Steven Bishop, a fraud investigator for Citibank. Bishop testified that Exhibit

5F was a record that was made and kept in the ordinary course of business, that it was made at or

near the time the information was being reported to the bank, that he had knowledge of how it

was maintained, and that he had access to Unauthorized Declaration of Use records as part of his

job. When asked about the purpose of an Unauthorized Declaration of Use form, Bishop replied:

                                                -5-
               This is essentially a report from our cardholder to us declaring that
               there were certain unauthorized charges made on their credit card
               account. And so it’s an affidavit or a declaration or a statement,
               whichever word you would like to use, indicating that in this
               particular case, that the cardholder’s account was used without
               their permission . . . . [I]t generates a formal dispute by the
               cardholder with Citibank and allows us to begin to research the
               claim. And eventually the result is that we make the customer
               whole so that we reverse the charges off of the customer account.

       N.M. had faxed her completed Unauthorized Declaration of Use form (Exhibit 5F) to

Citibank on October 4, 2011. In the form, she alleged that her “account number was used in an

unauthorized fashion,” and stated that she “was informed by the Citibank fraud department on

19Aug11 that [her] card was used at Walmart. Total = $800.” N.M. further indicated on the

form that all of her credit cards were in her possession at the time of the fraudulent use. N.M.

wrote “None” in response to the following prompt: “I have reason to believe the following

individual(s) utilized or had access to my account without my authorization.” She signed the

bottom of the form, agreeing to the following statement: “I understand that Bankcard Security

investigates alleged fraudulent or unauthorized credit card usage and may refer the same to the

appropriate law enforcement agency. I agree to cooperate in the prosecution of individuals

charged with fraudulent or unauthorized credit card usage.” The form made no reference to

either appellant or Budget.

       At trial, appellant objected to the admission of Exhibit 5F on the ground that it was

testimonial and that it was hearsay that did not fit within the business records exception to the

hearsay rule. Appellant also argued below that certain statements contained within Exhibit 5F

constitute hearsay within hearsay, including the statement that “I was informed by the Citibank

fraud department on 19Aug11 that my card was used at a Walmart. Total = $800.”5


       5
         While appellant did argue below that certain statements contained within Exhibit 5F
constitute hearsay within hearsay, see Rule 5A:18, we do not address appellant’s hearsay within
hearsay argument on appeal because appellant did not include that argument within any of his
                                              -6-
                                    D. Appellant’s Confession

       On December 15, 2011, police officers executed a search warrant at appellant’s

residence. Appellant was read his Miranda rights and acknowledged that he understood his

rights and that he was willing to waive his rights. After an interview with the police, appellant

produced a written statement summarizing what he had said to police. In that written statement,

appellant explained that a man named Dre had approached him during a work break. According

to appellant, Dre had given appellant a card scanning device, and had promised to “take care of”

appellant as long as he gave Dre information that he obtained by using the scanning device.

After his initial meeting with Dre, appellant approached Dre a few days later and “insisted there

was nothing on it [the card scanning device].” Dre then gave appellant further instructions on

how to use the card scanning device. Appellant eventually met Dre a third time, and gave the

device back to Dre. In his written statement, appellant said that he “did a couple transaction [sic]

for [Dre].” Appellant said that he never saw Dre again, and Dre never followed through on his

promise to “take care of” appellant.

       At trial, appellant denied the veracity of his confession. He testified that he had told

officers that he had never seen a card scanning device in his life, that he only cooperated with

police because he feared that, if he did not do so, they would deport him to Ghana, that he did

not know anybody by the name of Dre, and that the police forced him to make a statement.

                                           II. ANALYSIS

                        A. Unauthorized Declaration of Use (Exhibit 5F)

       Appellant’s first assignment of error challenges the admission of Exhibit 5F on both

hearsay and Confrontation Clause grounds. “It is well settled that ‘[t]he admissibility of



assignments of error. See Rule 5A:12(c)(1)(i) (“Only assignments of error assigned in the
petition for appeal will be noticed by this Court.”).

                                               -7-
evidence is within the broad discretion of the trial court, and a ruling will not be disturbed on

appeal in the absence of an abuse of discretion.’” Wood v. Commonwealth, 57 Va. App. 286,

304, 701 S.E.2d 810, 818 (2010) (quoting James v. Commonwealth, 18 Va. App. 746, 753, 446

S.E.2d 900, 904 (1994)). To the extent that appellant’s first assignment of error presents a

question involving constitutional interpretation, we apply a de novo standard of review. See

Gallagher v. Commonwealth, 284 Va. 444, 449, 732 S.E.2d 22, 24 (2012) (citing Montgomery

County v. Virginia Dep’t of Rail & Pub. Trans., 282 Va. 422, 435, 719 S.E.2d 294, 300 (2011)).

       The Supreme Court has explained the business records exception to the hearsay rule as

follows:

               “In Virginia, the business records exception to the hearsay rule,
               also referred to as the ‘modern shop book rule,’ permits the
               admission of verified regular entries of a business provided that
               such evidence has a direct or circumstantial guarantee of
               trustworthiness. We have further explained that the
               trustworthiness or reliability of such records is guaranteed by the
               fact that they are regularly prepared and relied on in the conduct of
               business by the persons or entities for which the records are kept.
               Therefore, to be admissible as a business record, a document must
               be produced by its proper custodian, be a record kept in the
               ordinary course of business, and be made at the time of an event by
               a person having a duty to keep a true record of that event.”

Stokes v. Commonwealth, 49 Va. App. 401, 409, 641 S.E.2d 780, 784 (2007) (quoting 1924

Leonard Rd., L.L.C. v. Van Roekel, 272 Va. 543, 554-55, 636 S.E.2d 378, 385 (2006)). In

addition, Rule 2:803(6) provides, in relevant part, that:

               The following are not excluded by the hearsay rule, even though
               the declarant is available as a witness: . . . (6) Business records – A
               memorandum, report, or data compilation, in any form, of acts,
               events, calculations or conditions, made at or near the time by, or
               from information transmitted by, a person with knowledge in the
               course of a regularly conducted business activity, and if it was the
               regular practice of that business activity to make and keep the
               memorandum, report, record, or data compilation, all as shown by
               the testimony of the custodian or other qualified witness, unless the
               source of information or the method or circumstances of
               preparation indicate lack of trustworthiness.
                                                -8-
Thus, the record may be authenticated by the testimony of the custodian or any “other qualified

witness.” Id.; see McDowell v. Commonwealth, 48 Va. App. 104, 109, 628 S.E.2d 542, 545

(2006), aff’d, 273 Va. 431, 641 S.E.2d 507 (2007); Lee v. Commonwealth, 28 Va. App. 571,

576, 507 S.E.2d 629, 632 (1998).

       The trial court did not abuse its discretion when it admitted Exhibit 5F as a business

record. At trial, Bishop indicated that Exhibit 5F was made and kept in the ordinary course of

business, that it was made at or near the time the information contained within it was being

reported, that he had knowledge of how Unauthorized Declaration of Use forms are maintained,

and that he had access to Unauthorized Declaration of Use forms as part of his job duties.

Receipt of the Declaration of Unauthorized use form would generate a formal dispute between

the cardholder and Citibank and would “allow[] [Citibank] to begin to research the claim.” After

researching the claim, Citibank would generally “make the customer whole” by removing the

unauthorized charges from the cardholder’s account. Because Citibank relied on Unauthorized

Declaration of Use forms when deciding whether to credit a customer’s account, because such

forms were kept in Citibank’s ordinary course of business, and because they were timely

completed, Declaration of Unauthorized Use forms in general and Exhibit 5F in particular

constitute business records.6 See 1924 Leonard Rd., L.L.C., 272 Va. at 554-55, 636 S.E.2d at


       6
          Appellant argues that this case is distinguishable from Stokes, where this Court held
that the “affidavits of forgery” in that case fit within the business records exception to the
hearsay rule. 49 Va. App. at 409, 641 S.E.2d at 784. In that case, the Vice President of the bank
met with the victim and had him complete “affidavits of forgery.” Id. at 405, 641 S.E.2d at 782.
The Vice President of the bank in Stokes explained that the bank typically used the “affidavits of
forgery” to investigate fraudulent transactions and that, in that particular case, the bank lost
money as a result of crediting the money back to the victim after the victim had completed the
affidavits of forgery. Id. Appellant attempts to distinguish Stokes on the ground that the bank
Vice President in that case assisted the victim by helping her to complete the affidavits of
forgery. Here, unlike in Stokes, N.M. did not receive any assistance from a bank official when
she completed the Declaration of Unauthorized Use form. This distinction is immaterial – just
because the customers complete the Declaration of Unauthorized Use forms does not mean that
Exhibit 5F falls outside of the business records exception to the hearsay rule. Regardless of who
                                                  -9-
385. Moreover, given that Unauthorized Declaration of Use forms are created for business

purposes alone, the trial court’s admission of Exhibit 5F did not violate appellant’s Confrontation

Clause rights.

       The Confrontation Clause of the Sixth Amendment provides: “In all criminal

prosecutions, the accused shall enjoy the right . . . to be confronted with the witnesses against

him.” U.S. Const. amend. VI. The United States Supreme Court has explained that the

Confrontation Clause prohibits “admission of testimonial statements of a witness who did not

appear at trial unless he was unavailable to testify, and the defendant had had a prior opportunity

for cross-examination.” Crawford v. Washington, 541 U.S. 36, 53-54 (2004). “‘Where

testimonial statements are at issue, the only indicium of reliability sufficient to satisfy

constitutional demands is the one the Constitution actually prescribes: confrontation.’” Crawford

v. Commonwealth, 281 Va. 84, 97-98, 704 S.E.2d 107, 115 (2011) (quoting Crawford v.

Washington, 541 U.S. at 68-69). Thus, “[i]f the statement is found to be testimonial, ‘the Sixth

Amendment demands what the common law required: [in-court confrontation or] unavailability

and a prior opportunity for cross-examination.’” Crawford, 281 Va. at 97, 704 S.E.2d at 115

(quoting Crawford v. Washington, 541 U.S. at 68).

       The United States Supreme Court has clarified what constitutes a “testimonial”

statement:

                 Ex parte in-court testimony or its functional equivalent—that is,
                 material such as affidavits, custodial examinations, prior testimony
                 that the defendant was unable to cross-examine, or similar pretrial
                 statements that declarants would reasonably expect to be used
                 prosecutorially; extrajudicial statements . . . contained in
                 formalized testimonial materials such as affidavits, depositions,
                 prior testimony, or confessions; statements that were made under

completes the information contained within the form, Citibank prepared the forms and the
questions in them (and, thus, required certain information to be provided), then relies on the
forms in the transaction of its ordinary business affairs, and the forms are kept in the ordinary
course of business. See 1924 Leonard Rd., L.L.C., 272 Va. at 554-55, 636 S.E.2d at 385.
                                               - 10 -
               circumstances which would lead an objective witness reasonably to
               believe that the statement would be available for use at a later trial.

541 U.S. at 51-52 (internal quotation marks and citations omitted). In addition,

               “Statements are nontestimonial when made in the course of police
               interrogation under circumstances objectively indicating that the
               primary purpose of the interrogation is to enable police assistance
               to meet an ongoing emergency. They are testimonial when the
               circumstances objectively indicate that there is no such ongoing
               emergency, and that the primary purpose of the interrogation is to
               establish or prove past events potentially relevant to later criminal
               prosecution.”

Crawford, 281 Va. at 98, 704 S.E.2d at 116 (quoting Davis v. Washington, 547 U.S. 813, 822

(2006)). As the Virginia Supreme Court has explained,

               Crawford and Melendez-Diaz . . . made it clear that the admission
               of documentary evidence in lieu of the live testimony of witnesses
               violates a criminal defendant’s confrontation rights under the Sixth
               Amendment, if the documents are testimonial in nature, because
               such documents cannot be tested “in the crucible of
               cross-examination.”

Walker v. Commonwealth, 281 Va. 227, 231, 704 S.E.2d 124, 126 (2011) (quoting Crawford,

541 U.S. at 61). The admission of non-testimonial documentary evidence, however, “does not

offend the confrontation clause. Business and public records, for example, are not testimonial

because they are created for the administration of affairs generally ‘and not for the purpose of

establishing or proving some fact at trial.’” Id. (quoting Melendez-Diaz v. Massachusetts, 557

U.S. 305, 324 (2009) (emphasis added)).

       Both the testimony of Steve Bishop and the content of Exhibit 5F make clear that the

primary purpose of Exhibit 5F was not “to establish or prove past events potentially relevant to

later criminal prosecution.” Davis, 547 U.S. at 822. As explained, supra, Citibank relied on

Declaration of Unauthorized Use forms to initiate fraud investigations and to decide whether to

credit a customer’s account. No part of Bishop’s testimony indicated that Declaration of



                                               - 11 -
Unauthorized Use forms were generated so that they could be later used in a criminal

prosecution.

       The content of the Declaration of Unauthorized Use form also suggests that it is a

non-testimonial document. In response to the prompt on the form stating, “I have reason to

believe the following individual(s) utilized or had access to my account number without my

authorization,” N.M. wrote “none.” N.M. never mentioned either appellant or Budget anywhere

on the Declaration of Unauthorized Use form. The boilerplate language at the end of the form –

stating “I understand that Bankcard Security investigates alleged fraudulent or unauthorized

credit card usage and may refer the same to the appropriate law enforcement agency. I agree to

cooperate in the prosecution of individuals charged with fraudulent or unauthorized credit card

usage” – does not render the Declaration of Unauthorized Use form testimonial. Nothing in this

boilerplate language indicates that the Declaration of Unauthorized Use form itself is created so

that it can be used in a later criminal prosecution. Thus, Bishop’s testimony and the content of

the form establish that Exhibit 5F is non-testimonial because it was not prepared to be used in a

later criminal prosecution.

                                  B. Sufficiency of the Evidence

       Appellant’s second and third assignments of error challenge the sufficiency of the

evidence to support his credit card theft convictions and his use of a card scanning device or

re-encoder convictions. When considering the sufficiency of the evidence on appeal, “a

reviewing court does not ‘ask itself whether it believes that the evidence at the trial established

guilt beyond a reasonable doubt.’” Crowder v. Commonwealth, 41 Va. App. 658, 663, 588

S.E.2d 384, 387 (2003) (quoting Jackson v. Virginia, 443 U.S. 307, 318-19 (1979)). “Viewing

the evidence in the light most favorable to the Commonwealth, as we must since it was the

prevailing party in the trial court,” Riner, 268 Va. at 330, 601 S.E.2d at 574, “[w]e must instead

                                                - 12 -
ask whether ‘any rational trier of fact could have found the essential elements of the crime

beyond a reasonable doubt,’” Crowder, 41 Va. App. at 663, 588 S.E.2d at 387 (quoting Kelly v.

Commonwealth, 41 Va. App. 250, 257, 584 S.E.2d 444, 447 (2003) (en banc)). See also

Maxwell v. Commonwealth, 275 Va. 437, 442, 657 S.E.2d 499, 502 (2008). “This familiar

standard gives full play to the responsibility of the trier of fact fairly to resolve conflicts in the

testimony, to weigh the evidence, and to draw reasonable inferences from basic facts to ultimate

facts.” Jackson, 443 U.S. at 319.

        Code § 18.2-192(1)(a) provides, in relevant part, that:

                A person is guilty of credit card or credit card number theft when:
                He takes, obtains or withholds a credit card or credit card number
                from the person, possession, custody or control of another without
                the cardholder’s consent or who, with knowledge that it has been
                so taken, obtained or withheld, receives the credit card or credit
                card number with intent to use it or sell it, or to transfer it to a
                person other than the issuer or the cardholder.

Code § 18.2-196.1(A) provides that “[a]ny person who with malicious intent uses a scanning

device or a re-encoder on the payment card of another without the permission of the authorized

payment card user is guilty of a Class 1 misdemeanor.” In addition, Code § 18.2-196.1(B)

provides that “[a]ny person who violates this section and sells or distributes such information to

another is guilty of a Class 6 felony.”

        Viewing the evidence in the light most favorable to the Commonwealth (as we must since

it was the prevailing party at trial), a rational trier of fact could find appellant guilty beyond a

reasonable doubt of both credit card theft and unlawful use of a card scanning device or

re-encoder. In a circumstantial evidence case, such as this one, the “combined force of many

concurrent and related circumstances, each insufficient in itself, may lead a reasonable mind

irresistibly to a conclusion.” Dowden v. Commonwealth, 260 Va. 459, 470, 536 S.E.2d 437, 443

(2000). Here, the combined force of several circumstances in the record suggests that a finder of

                                                 - 13 -
fact reasonably could have found appellant guilty of seven counts of credit card theft and four

counts of unlawful use of a card scanning device or re-encoder.

       Appellant confessed in a written statement to police that he used a card scanning device

and “did a couple transaction [sic] for [Dre].” “‘[S]light corroboration of the confession is

required to establish corpus delicti beyond a reasonable doubt.’” Allen v. Commonwealth, 287

Va. 68, 74, 752 S.E.2d 856, 860 (2014) (quoting Cherrix v. Commonwealth, 257 Va. 292, 305,

513 S.E.2d 642, 651 (1999)). The slight corroboration, however, “need not be ‘of all the

contents of the confession, or even all the elements of the crime.’” Id. (quoting Watkins v.

Commonwealth, 238 Va. 341, 348, 385 S.E.2d 50, 54 (1989)). In this case, an overwhelming

amount of evidence corroborates appellant’s confession.

       Appellant’s agent ID appeared on the Budget rental paperwork of all of the victims.

Appellant contends that other agents could have used his agent ID to conduct the transactions,

but this argument is unpersuasive. As Diane Kees, the Budget employee who testified in this

case, explained, employees generally do not have an incentive to use the agent ID of another

employee since any commission is given to the Budget employee whose agent ID number is

associated with the transaction. Although appellant did share his agent ID with other employees

on some occasions, additional circumstances and evidence – each mounting upon the other –

foreclose the possibility that another employee conducted the transactions at issue.

       First, beyond considering just appellant’s agent ID number, additional evidence amply

points to appellant’s presence at the rental car transactions with many of the victims. One of the

victims, M.M., positively identified appellant. Another of the victims, C.J., testified that the

Budget rental agent who had rented her the car also told her that he was from Ghana – which is

appellant’s country of origin. Moreover, appellant actually identified himself as the one who

was conducting the transaction with E.V. that the surveillance camera captured.

                                               - 14 -
           Second, in each case, the fraud occurred within just a few days of the rental transaction.

           Third, because appellant needed only to tap a credit card against his very small card

scanning device to obtain information, the fact that a number of the witnesses either could not

recall whether their credit card went out of sight during the transaction or were certain the credit

card remained within their sight during the transaction is immaterial.

           Fourth, the jury was entitled to disbelieve appellant’s self-serving testimony at trial that

the police coerced him into making a statement of confession and his testimony that, to the

contrary, he had never seen a card scanning device in his life – and that he did not know who Dre

was. See Sandoval v. Commonwealth, 20 Va. App. 133, 138, 455 S.E.2d 730, 732 (1995)

(explaining that “[t]he credibility of the witnesses and the weight accorded the evidence are

matters solely for the factfinder who has the opportunity to see and hear that evidence as it is

presented”); Marable v. Commonwealth, 27 Va. App. 505, 509-10, 500 S.E.2d 233, 235 (1998)

(stating that “[i]n its role of judging witness credibility, the fact finder is entitled to disbelieve the

self-serving testimony of the accused and to conclude that the accused is lying to conceal his

guilt”).

           Thus, a rational trier of fact could find that appellant obtained the credit card numbers of

his customers without their consent and, at least in four instances, used a card scanning device to

obtain information related to the credit card.

                                            III. CONCLUSION

           The trial court did not err when it admitted Exhibit 5F into evidence, as Exhibit 5F was

non-testimonial, and it also fell within the business records exception to the hearsay rule.

Moreover, viewing the evidence in the light most favorable to the Commonwealth, as we must

since the Commonwealth prevailed below, the jury properly found appellant guilty of seven

counts of credit card theft and four counts of unlawful use of a card scanning device or

                                                   - 15 -
re-encoder. Accordingly, we affirm appellant’s convictions for credit card theft under Code

§ 18.2-192 and unlawful use of a card scanning device or re-encoder under Code § 18.2-196.1.



                                                                                      Affirmed.




                                             - 16 -
