                                      PUBLISHED

                       UNITED STATES COURT OF APPEALS
                           FOR THE FOURTH CIRCUIT


                                       No. 17-4148


UNITED STATES OF AMERICA,

                     Plaintiff − Appellee,

              v.

DARRA LEE SHEPHARD, a/k/a Nora Southerland, a/k/a Donna Ramirez,

                     Defendant – Appellant.


Appeal from the United States District Court for the Western District of North Carolina, at
Charlotte. Robert J. Conrad, Jr., District Judge. (3:13-cr-00021-RJC-DCK-3)


Argued: March 22, 2018                                            Decided: June 15, 2018


Before NIEMEYER, WYNN, and DIAZ, Circuit Judges.


Affirmed by published opinion. Judge Diaz wrote the majority opinion, in which Judge
Niemeyer joined. Judge Wynn wrote a dissenting opinion.


ARGUED: Chiege Ojugo Kalu Okwara, LAW OFFICE OF CHIEGE O. KALU
OKWARA, Charlotte, North Carolina, for Appellant. Joanna Katherine Wood Bowman,
UNITED STATES DEPARTMENT OF JUSTICE, Washington, D.C., for Appellee. ON
BRIEF: Kenneth A. Blanco, Acting Assistant Attorney General, Trevor N. McFadden,
Deputy Assistant Attorney General, Ellen R. Meltzer, William H. Bowne, Gustav W. Eyler,
Fraud Section, Criminal Division, UNITED STATES DEPARTMENT OF JUSTICE,
Washington, D.C.; Jill Westmoreland Rose, United States Attorney, OFFICE OF THE
UNITED STATES ATTORNEY, Charlotte, North Carolina, for Appellee.
DIAZ, Circuit Judge:

          Darra Lee Shephard conspired to defraud U.S. residents through a telemarketing

sweepstakes scheme. From a call center in Costa Rica, Shephard and others would tell

their unwitting victims that they had won a sweepstakes prize. The catch? Winners could

receive their prize money only after paying a “refundable insurance fee.” Victims of the

scheme wired thousands of dollars to the call center, but of course, no fees were refunded

and no prize money was ever paid.

          Shephard pleaded guilty to conspiracy to commit wire and mail fraud, conspiracy

to commit money laundering, eight substantive counts of wire fraud and aiding and

abetting, and four substantive counts of money laundering and aiding and abetting. She

was sentenced to ninety-six months in prison and ordered to pay $7,215,695.20 in

restitution. On appeal, she challenges (1) the district court’s application of the vulnerable

victim sentencing enhancement and (2) its calculation of the actual loss amount. We

affirm.


                                             I.

                                             A.

          From 2007 through February 2015, Shephard “participated in, and otherwise

facilitated,” a sweepstakes telemarketing call center in Costa Rica for the purpose of

defrauding U.S. residents by convincing them to pay money in order to claim a fake

sweepstakes prize. J.A. 158.




                                             2
       The call center required “openers” to call residents in the United States and inform

them that they had won second prize in a sweepstakes in the amount of $350,000 to

$450,000. The “openers”—often falsely representing themselves as U.S. government

employees—would explain that in order to receive the prize money, the U.S. resident must

pay a “refundable insurance fee” by wiring money via Western Union, MoneyGram or an

international bank. Victims then wired money to a “runner,” who would collect wire

transfers at banks in Costa Rica, or a “bridge,” who would receive the funds in the United

States and forward them along to the call center in Costa Rica.

       Once someone fell prey to the scam and made an initial payment, a “loader” would

call again and convince the victim to send more money. The “loader” would tell the victim

that a mistake had been made and he had actually won first prize, which was more than

$3,000,000. Of course, the victim would first need to pay thousands of additional dollars

in increased insurance fees to claim this larger prize. If the victim fell for the scheme again

and made another payment, the “loader” would continuously raise the sweepstakes prize

and ask for more money from the same victim. This process is known as “reloading.” At

various times throughout her tenure, Shephard worked in the call center as an “opener,” a

“runner,” and a “loader.”

                                              B.

       Shephard was arrested in Costa Rica in July 2015 and then extradited to the United

States. She pleaded guilty to all fourteen counts of her indictment without the benefit of a

plea agreement. Shephard also agreed to a written factual basis for her plea, which

described the sweepstakes scheme and her involvement. Shephard reserved her right to

                                              3
object to two proposed findings at sentencing: (1) that the loss amount was over $3,500,000

and (2) that she knew that many of the victims were over the age of fifty-five and

vulnerable.

       Shephard’s presentence report (“PSR”) relied on the factual basis, as well as two

written statements from Shephard, to calculate the appropriate Guidelines range. The PSR

applied a base offense level of 7 for wire fraud, a number of enhancements, and a three-

level downward adjustment for acceptance of responsibility. For our purposes, only two

of the enhancements matter: First, the PSR applied a two-level enhancement because the

offense involved vulnerable victims. U.S.S.G. § 3A1.1(b)(1). Second, it applied an

eighteen-level increase for a loss amount of more than $3,500,000 but less than or equal to

$9,500,000. U.S.S.G. § 2B1.1(b)(1)(J). The PSR relied on the financial analysis prepared

by the government, which explained that during Shephard’s involvement the loss amount

collected from victims via Western Union was $5,876,814.27 and the loss amount collected

via MoneyGram was $1,338,880.93, resulting in a total loss amount of $7,215,695.20.

       Shephard objected to the vulnerable victim enhancement and the loss amount

calculation.   She argued there was no evidence that the scheme targeted unusually

vulnerable victims or that Shephard knew it targeted such victims. As for the loss amount,

she claimed it should be less than $3,500,000 because the victims’ losses were not

adequately documented and her involvement in the call center was sporadic. The court

overruled the objection to the vulnerable victim enhancement “based on responses from

the government, consistent with my other rulings in other [related] call center cases that

. . . vulnerable victim enhancements were appropriate in the nature of how this fraud

                                            4
activity worked.” J.A. 71. And it affirmed the loss amount as a “conservative estimate”

based on “solid methodology.” J.A. 70. The court further explained that Shephard was

responsible for the criminal activity of her coconspirators even after her personal

participation ended because she never affirmatively withdrew from the conspiracy.

       The district court adopted the PSR’s Guidelines calculation, which applied a total

offense level of 34 and a criminal history of I for a Guidelines range of 151 to 188 months’

imprisonment. The court then departed and varied downward to arrive at a sentence of

ninety-six months’ imprisonment and $7,215,695.20 in restitution.

       Shephard filed a timely appeal.


                                            II.

       We review criminal sentences for reasonableness using an abuse of discretion

standard. Gall v. United States, 552 U.S. 38, 51 (2007). A sentence based on an improperly

calculated Guidelines range is procedurally unreasonable. United States v. Davis, 679 F.3d

177, 182 (4th Cir. 2012). In reviewing whether a sentencing court properly calculated the

Guidelines range, we review the court’s factual findings for clear error and its legal

conclusions de novo. Id.

                                            A.

       The Sentencing Guidelines allow for a two-level enhancement “[i]f the defendant

knew or should have known that a victim of the offense was a vulnerable victim.” U.S.S.G.

§ 3A1.1(b)(1). A vulnerable victim is a person “(A) who is a victim of the offense of

conviction and any conduct for which the defendant is accountable . . . and (B) who is


                                             5
unusually vulnerable due to age, physical or mental condition, or who is otherwise

particularly susceptible to the criminal conduct.” U.S.S.G. § 3A1.1 cmt. n.2.

       For the vulnerable victim enhancement to apply, the record must show that (1) the

victim of the offense was unusually vulnerable and (2) the defendant knew or should have

known of the victim’s unusual vulnerability. United States v. Llamas, 599 F.3d 381, 388

(4th Cir. 2010). The enhancement thus “requires a fact-based explanation of why advanced

age or some other characteristic made one or more victims unusually vulnerable to the

offense conduct, and why the defendant knew or should have known of this unusual

vulnerability.” Id. (internal quotation marks omitted).

       In this case, the factual basis and Shephard’s written statements to the probation

officer explain that the conspiracy involved “reloading” victims and that Shephard herself

worked as a “loader.” The practice of “reloading” involves targeting people who have

already fallen victim to the scheme at least once, if not repeatedly. The question, then, is

whether this practice of reloading, at least in the context of this particular telemarketing

sweepstakes conspiracy, is sufficient to support the vulnerable victim enhancement.

       We have not yet addressed this issue, 1 but many of our sister circuits have,

concluding that evidence of reloading may support the enhancement. See United States v.



       1
          The dissent claims that our decision in Llamas is controlling and that if record
evidence of a reloading scheme were sufficient to uphold the application of the vulnerable
victim enhancement, we would have done so there. In Llamas, however, we rejected the
district court’s application of the enhancement because, after discussing how one victim
took medication for Alzheimer’s disease and another fell for the scheme when she was
expecting a call about her daughter’s health, the court provided no explanation as to why

                                             6
Lloyd, 807 F.3d 1128, 1172‒73 (9th Cir. 2015); United States v. Hoffecker, 530 F.3d 137,

201‒02 (3d Cir. 2008); United States v. Day, 405 F.3d 1293, 1295‒96 (11th Cir. 2005);

United States v. Coe, 220 F.3d 573, 582 (7th Cir. 2000); United States v. Brawner, 173

F.3d 966, 972‒73 (6th Cir. 1999); United States v. O’Neil, 118 F.3d 65, 75‒76 (2d Cir.

1997). 2

       As these courts have explained, a victim’s decision to wire money in response to the

initial fraudulent phone call is evidence that they are “particularly susceptible to the

criminal conduct” and that is why fraudsters then repeatedly target that victim through the

process of “reloading.” For example, in United States v. Jackson, which addressed a

similar fraudulent telemarketing scheme, the Seventh Circuit held the vulnerable victim

enhancement applied because the defendants “reloaded” victims. 95 F.3d 500, 502‒03 (7th

Cir. 1996). The court reasoned:

       Whether these persons are described as gullible, overly trusting, or just naive
       (and whatever the cause of this condition), . . . their readiness to fall for the

the defendant knew or should have known about these two victims’ unique vulnerabilities.
Llamas, 599 F.3d at 388‒89.
        When the government on appeal argued the enhancement was appropriate because
Llamas “reloaded” persons who had already fallen for the sweepstakes scheme, we did not
reject the argument—we just noted that the district court never adopted it. We said the
enhancement “cannot be justified simply because there might be some evidence in the
record-not addressed by the sentencing court-supporting [it].” Id. at 389. Here, by contrast,
the sentencing court relied on the practice of reloading as evidence to support its
application of the vulnerable victim enhancement. See infra at 9‒10.
       2
        The dissent cites the Second Circuit’s decision in United States v. Dupre, 462 F.3d
131 (2d Cir. 2006). There, the court did note that simply asking a fraud victim for more
money does not warrant application of the vulnerable victim enhancement, but it expressly
left open the possibility that “repeated targeting of certain victims” could justify the
enhancement, as it did in O’Neil. Id. at 146.

                                              7
       telemarketing rip-off, not once but twice (and in [one] case, four times),
       demonstrated that their personalities made them vulnerable in a way and to a
       degree not typical of the general population. . . . The structuring of the
       reloading process, the designating of customers as “reloads,” . . . the charging
       of higher sums to reloads, and the systematic re-victimizing of people . . .
       amply demonstrate that the defendants believed the reloaded persons to be
       especially vulnerable and that they specifically targeted them because of this
       vulnerability.

Id. at 508.

       In other words, the reloading process was sufficient to support a finding that the

victims were unusually vulnerable and that the defendants targeted them because of their

vulnerability. The dissent contends that the district court there made findings about one

particular victim. But the court did not just find one or two victims to be unusually

vulnerable. Instead, the court “focussed on the technique of reloading” and concluded

“those who were successfully reloaded” were unusually vulnerable.            Id. at 507‒08.

Likewise, the Third and Eleventh Circuits affirmed applications of the vulnerable victim

enhancement based on the simple fact that reloading—the repeated targeting of a victim—

“constitutes evidence that the defendant knew the victim was particularly vulnerable to the

fraud scheme.” Day, 405 F.3d at 1296; Hoffecker, 530 F.3d at 201 (quoting Day).

       We believe the reasoning of our sister circuits is sound and applies here. The record

shows that the more experienced telemarketers in this fraudulent sweepstakes scheme,

including Shephard, were specifically designated as “loaders.” The “loaders” called

victims who had already fallen for the scheme and tried to get them to make additional

payments. Shephard explained that she and her coconspirators “would reload the victim

as long as the victim was willing and able to continue to transfer funds” and that “[m]any


                                             8
victims sent tens of thousands of dollars” in response to these calls. J.A. 442. Further, the

individual victim impact statements attached to the presentence report demonstrate, as one

would suspect, that the victims were in fact unusually vulnerable. Thus, we find no clear

error in the district court’s determination that some victims were particularly vulnerable

and that Shephard was aware of this vulnerability. It is why she and her coconspirators

purposefully targeted such victims again and again. 3

       Shephard also argues that the district court did not sufficiently explain its decision

to apply the vulnerable victim enhancement. A district court must provide a “sufficient

explanation of its rationale” to enable review, United States v. Wilkinson, 590 F.3d 259,

269 (4th Cir. 2010), and must “place on the record an individualized assessment based on

the particular facts of the case before it,” United States v. Carter, 564 F.3d 325, 330 (4th

Cir. 2009) (internal quotation marks omitted). The district court here overruled Shephard’s

objection to the vulnerable victim enhancement “based on responses from the government,

consistent with my other rulings in other [related] call center cases that there were

vulnerable victim enhancements were appropriate in the nature of how this fraud activity

worked. [sic]” J.A. 71.

       Although the district court’s explanation was terse, we find it sufficient. First, the

court based its decision to apply the enhancement on the government’s response. The


       3
        We need not (and do not) decide whether the mere practice of reloading (without
more) will always justify applying the vulnerable victim enhancement. There may be
unique factual scenarios that rebut the strong inference that defendants who reload victims
target them because they are unusually vulnerable. But here, the district court’s
determination to apply the enhancement was entirely appropriate.

                                             9
government’s response to Shephard’s objection was that “the practice of reloading victims

evinces an offense reliant on unusually vulnerable victims.” J.A. 380. The government

fully explained the argument and cited a number of cases. Second, the court said the

enhancement was appropriate given “the nature of how this fraud activity worked,” which

further confirms that the court found the practice of reloading sufficient to support the

enhancement.

       We therefore affirm the district court’s decision to apply the vulnerable victim

enhancement.

                                             B.

       Shephard also objects to the loss amount used to justify an eighteen-level

enhancement. Shephard argues that the district court clearly erred in finding a loss amount

of $7,215,695.20. In her view, the real loss amount is under $3,500,000, which should

have resulted in a sixteen rather than eighteen-level enhancement.            See U.S.S.G.

§ 2B1.1(b)(1)(I)‒(J).

       We review a district court’s calculation of loss amount for clear error. United States

v. Jones, 716 F.3d 851, 859‒60 (4th Cir. 2013). “Loss” is “the greater of actual loss or

intended loss.” U.S.S.G. § 2B1.1 cmt. n.3(A). Here, the court relied on “actual loss,”

defined as “the reasonably foreseeable pecuniary harm that resulted from the offense.”

U.S.S.G. § 2B1.1 cmt. n.3(A)(i). The government must establish the amount of loss by a

preponderance of evidence. United States v. Catone, 769 F.3d 866, 876 (4th Cir. 2014).

But the court need only make a “reasonable estimate” of the loss. U.S.S.G. § 2B1.1 cmt.

n.3(C).

                                             10
       In the case of a conspiracy, loss is attributable to a defendant “if it results from the

conduct of others so long as the conduct was in furtherance of, and reasonably foreseeable

in connection with the criminal activity.” United States v. Otuya, 720 F.3d 183, 191 (4th

Cir. 2013) (internal quotation marks omitted). “A defendant’s membership in a conspiracy

is presumed to continue until he withdraws from the conspiracy by affirmative action.

Withdrawal must be shown by evidence that the defendant acted to defeat or disavow the

purposes of the conspiracy.” United States v. Allmendinger, 706 F.3d 330, 341 (4th Cir.

2013) (internal quotation marks omitted). “[M]ere cessation of activity in furtherance of

the conspiracy is insufficient.” United States v. Walker, 796 F.2d 43, 49 (4th Cir. 1986).

The defendant must point to “[a]ffirmative acts inconsistent with the object of the

conspiracy and communicated in a manner reasonably calculated to reach co-conspirators.”

United States v. U.S. Gypsum Co., 438 U.S. 422, 464–65 (1978). The burden of proving

withdrawal rests with the defendant. Walker, 796 F.2d 43, 49 (4th Cir. 1986).

       Shephard first argues that the loss amount is wrong because it includes MoneyGram

wire transfers even though the substantive wire fraud and money laundering counts in the

indictment speak only of Western Union transfers. But this argument fails because the

factual basis and Shephard’s written statements to the probation officer clearly establish

that MoneyGram transfers were part of the conspiracy described in counts 1 and 10 of the

indictment.

       Next, Shephard argues that the calculation wrongly includes losses accrued through

February 2015 even though she stopped working at the call center in December 2012.

Shephard, however, stipulated in the factual basis supporting the plea that she participated

                                              11
in, or otherwise facilitated, the conspiracy from 2007 through February 2015. And

although Shephard reserved the right to object to the loss amount and whether she

knowingly targeted vulnerable victims, she twice told the court that she agreed “with

everything else” in the factual basis. J.A. 49‒50. This express acknowledgment of her

involvement in the conspiracy through February 2015 is a sufficient basis for including

losses through February 2015 in the loss calculation. See United States v. Gilliam, 987

F.2d 1009, 1013 (4th Cir. 1993) (finding government may use defendant’s

acknowledgements during the Rule 11 colloquy or sentencing proceedings to establish

facts for sentencing purposes).

         Further, even if Shephard stopped actively participating in the conspiracy in

December 2012, there is no evidence that she acted to defeat or disavow the purposes of

the conspiracy.    Withdrawal requires more than the mere cessation of activity in

furtherance of the conspiracy. Walker, 796 F.2d at 49. The record indicates Shephard’s

involvement in the conspiracy was “on and off” and that, at times, she held legitimate jobs.

Without evidence of an affirmative withdrawal, we don’t know if Shephard was taking

another temporary hiatus from the call center or if she had really abandoned the criminal

enterprise.

       Finally, Shephard claims the district court didn’t make any particularized findings

that the MoneyGram transfers or post-2012 Western Union transfers were within the scope

of the criminal activity Shephard agreed to jointly undertake. No such findings are

necessary, however, because it’s clear on the face of the indictment, as well as the factual

basis, that the conspiracy involved MoneyGram transfers. Further, the factual basis

                                            12
establishes Shephard’s involvement in the conspiracy through February 2015 and, even if

she did leave earlier, there’s no allegation that the conspiracy changed in any unforeseeable

way after December 2012. And as we’ve noted, absent proof of an affirmative withdrawal

from the conspiracy, Shephard is liable for the losses her coconspirators continued to

inflict. 4


                                              III.

         For the reasons given, we affirm the district court’s judgment.

                                                                                 AFFIRMED




         4
         The parties dispute whether the spreadsheet of wire transfers that the government
entered as an exhibit at sentencing was complete. We are satisfied that the exhibit as
presently constituted, in conjunction with the rest of the record, establishes a total loss of
$7,215,695.20 based on sound methodology. Accordingly, we deny the government’s
motion to supplement the Joint Appendix and also deny as moot Shephard’s motion to
strike the same.

                                              13
WYNN, Circuit Judge, dissenting in part:

       I agree with the majority opinion’s approach to calculating the loss amount in this

case, and I join fully in that portion of the majority opinion. I write separately, however,

because I disagree with the majority opinion’s holding regarding the vulnerable victim

enhancement, U.S.S.G. § 3A1.1(b)(1). I do not believe the district court sufficiently

explained its rationale for imposing that enhancement, which would therefore lead me to

vacate the Defendant’s sentence and remand for resentencing.

       The majority correctly cites the controlling test for whether the vulnerable victim

enhancement applies, although the majority’s paraphrasing of the law misses a key aspect

of the inquiry. This Court has said that applying the vulnerable victim enhancement

requires satisfying a two-part test. See United States v. Llamas, 599 F.3d 381, 388 (4th

Cir. 2010) [“Llamas I”]. “First, a sentencing court must determine that a victim was

unusually vulnerable. Second, the court must then assess whether the defendant knew or

should have known of such unusual vulnerability.” Id. (internal citation omitted). This

discussion makes clear that the district court must identify at least one specific victim who

serves as a basis for applying the enhancement—not that the record must merely reflect

such possible applicability—and then also find that the defendant knew or should have

known of that victim’s unusual vulnerability. The next sentence in Llamas I makes this

requirement all the more clear: “In other words, applying the vulnerable victim adjustment

‘requires a fact-based explanation of why advanced age or some other characteristic made

one or more victims unusually vulnerable to the offense conduct, and why the defendant

knew or should have known of this unusual vulnerability.’” Id. (quoting United States v.

                                             14
Vega-Iturrino, 565 F.3d 430, 434 (8th Cir. 2009) (discussing importance of “evidentiary

support” particularized to the specific victim or victims, such as a victim who “had received

only an eighth grade education [and] had no experience or understanding of investments

outside of connection with the defendant”)).

       Additionally, as the majority opinion correctly recognizes, when a district court

applies a sentencing enhancement—like the vulnerable victim enhancement—the “district

court must provide a ‘sufficient explanation of its rationale’ to enable review.” Ante at 9

(quoting United States v. Wilkinson, 590 F.3d 259, 269 (4th Cir. 2010)). And a district

court “must ‘place on the record an individualized assessment based on the particular facts

of the case before it.’” Id. (quoting United States v. Carter, 564 F.3d 325, 330 (4th Cir.

2009) (emphasis added) (internal quotation marks omitted)). In light of this standard, the

majority opinion acknowledges that the district court’s explanation for applying the

vulnerable victim enhancement in this case was “terse.” Id. at 9. Nonetheless, the majority

opinion finds the district court’s rationale “sufficient” to pass muster. Id. I disagree.

       To begin, I want to emphasize just how “terse” the district court’s rationale for

imposing the enhancement was. The district court’s entire explanation for imposing the

enhancement reads as follows:

       I will overrule that objection based on responses from the government,
       consistent with my other rulings in other Bonner call center cases that there
       were vulnerable victim enhancements were [sic] appropriate in the nature of
       how this fraud activity worked




                                             15
J.A. 71. Parsing out this rationale makes clear that it is not sufficiently “tailored to the

particular case at hand . . . to permit ‘meaningful appellate review.’” Carter, 564 F.3d at

330 (quoting Gall v. United States, 552 U.S. 38, 50 (2007)).

       I start with the latter portion of the district court’s rationale: that the decision to

apply the enhancement was “consistent with my other rulings in other Bonner call center

cases that . . . vulnerable victim enhancements were appropriate in the nature of how this

fraud activity worked.” J.A. 71. Here, the district court alludes to Defendant’s co-

defendants, Jeffrey Bonner (who ran the call center) and another individual who worked

there, as well as other defendants in related cases. But the government did not have

transcripts prepared of the sentencings for Defendant’s co-defendants, nor has the

government provided us with transcripts from any of the related cases. The district court’s

explanations in those cases are thus not before this Court. Consequently, although the

district court knew what reasoning was provided for sentencing Defendant’s co-

defendants—reasons that may have included significant factual findings—that information

has not been conveyed to this Court in the record presented to us. Accordingly, the district

court’s reference to the other cases is a quintessential example of when a record does not

allow for “meaningful appellate review.” Carter, 564 F.3d at 330. From the documents

provided, this Court simply has no way of knowing what rationale the district court may

have used in those other cases.

       The closest the district court comes to explaining its rationale in the previous cases

was to say that the enhancement was appropriate, given “the nature of how this fraud

activity worked.” J.A. 71. This statement, albeit vague, corresponds with the other basis

                                             16
listed by the district court for its holding—the “responses from the government.” Id. The

government laid out its position on the enhancement in two places: the “United States’

Response to Defendant’s Objections to the Draft Presentence Investigation Report” and the

Final Presentence Report. J.A. 379–81, 453–454. ∗ At the sentencing hearing, no party

offered substantive argument on the issue, instead relying on their written submissions.

J.A. 71. So, when the district court refers to the “responses from the government,” it

presumably is referring to these written filings, both of which, like the district court’s

comment about the “nature” of the fraud, relied on a generalized argument about the

structure of the sweepstakes scheme. Id.

       To give greater detail, in these filings, the government argued that Defendant

“would seek out individuals gullible enough to believe her false promises and send money

overseas, and then repeatedly victimize those same individuals until they had nothing left

to send.” J.A. 379–80. The government then argued that, “[i]t is well established that the

practice of reloading victims evinces an offense reliant on unusually vulnerable victims.”

J.A. 380. To support that proposition, the government listed one case from the Fourth

Circuit, two from the Ninth Circuit, and one case from the Seventh Circuit. See id. These

cases do not bear the weight claimed, however.




       ∗
         The latter version filed with the Final Presentence Report quoted almost entirely
from the earlier response and is not different from the prior version in any material way.
Thus, for the sake of consistency, this opinion will quote from the first version, since that
is the version quoted by the majority opinion.

                                             17
       The sole Fourth Circuit case cited by the government for that proposition deserves

some introduction. The government cited United States v. Llamas, 473 Fed. App’x. 176

(4th Cir. 2012) [“Llamas II”], an unpublished opinion rendered by a panel of this Court

after Llamas I vacated the defendant’s sentence on grounds that the district court failed to

adequately support the application of the vulnerable victim enhancement. The facts of the

Llamas cases are strikingly similar to those here. The defendant in Llamas was part of a

sweepstakes scheme based out of Costa Rica that operated in a manner almost

indistinguishable from the call center in this case. Llamas I, 599 F.3d at 383–85. At

sentencing, the district court identified two specific victims that it viewed as unusually

vulnerable: one had Alzheimer’s disease; the other “had been expecting a call from a doctor

regarding her daughter’s health,” which put her in a vulnerable, high-stress state of mind.

Id. at 386. Critically, however, the district court did not make any findings about how the

defendant knew or should have known about those vulnerabilities. Id. at 389. And for that

reason, this Court found that the district court did not provide adequate reasons for applying

the enhancement and vacated the defendant’s sentence. Id.

       Thus, the district court in Llamas I actually gave more reasons than the district court

did in this case—and this Court nonetheless vacated the defendant’s sentence. The district

court in Llamas I identified specific victims and gave a detailed explanation as to why those

victims were vulnerable. Those vulnerabilities were individualized to specific victims, not

just blanket assertions premised on how the general structure of the fraudulent scheme

targeted gullible people. In fact, had record evidence of a reloading scheme been sufficient,

by itself, to apply the enhancement—as the majority opinion appears to conclude—the

                                             18
Llamas I Court would have upheld the application of the vulnerable victim enhancement,

because the scheme in that case relied on a reloading system almost identical to the one

here. See id. at 384. Instead, this Court vacated the sentence because the district court’s

findings were insufficient. See id. at 389.

       Here, in contrast with Llamas I, the district court did not identify any specific

victims as unusually vulnerable or make any findings as to why Defendant had knowledge

of that vulnerability. The district court merely referenced the government’s written

submissions, which themselves relied on a vague theory that reloading schemes target

gullible people. I do not discount the possibility that an individual could be so gullible to

qualify as unusually vulnerable. But, at the very minimum, the Guidelines require the

district court to identify the specific victims it found to be so vulnerable that they would

serve as a basis for applying the enhancement. As the case stands, however, nothing in the

record indicates which victims the government or the district court believed supported

application of the enhancement. We simply know that some individuals (although who

specifically, we do not know) gave money more than once to the scheme, which, according

to the government, makes them unusually vulnerable (despite not knowing any more details

about why these victims contributed to the scheme multiple times or any other information

supporting this alleged vulnerability).

       The approach to the enhancement I am describing also best accords with the

enhancement’s application note. That commentary states: “The adjustment would apply,

for example, in a fraud case in which the defendant marketed an ineffective cancer cure or

in a robbery in which the defendant selected a handicapped victim. But it would not apply

                                              19
in a case in which the defendant sold fraudulent securities by mail to the general public and

one of the victims happened to be senile.” U.S.S.G. § 3A1.1 cmt. n.2. The case at issue

here is analogous to the situation described in the second part of the application note—at

least as the case is currently described by the government and the district court.

Defendant’s co-conspirators called members of the general public and sought money.

Presumably, many would decline, while some would provide the requested money. As the

application note example contemplated, however, some of the people called would be

gullible enough to fall for the scheme. But, at least upon initial phone contact, the co-

conspirators had no way of differentiating the gullible from the savvy. Once someone gave

to the scheme, however, then the co-conspirators would come back to that person over and

over again. Returning to previous victims potentially could cross the line to exploiting a

vulnerable victim, but the key problem is that we do not know who those specific

vulnerable victims were in this case. The record does not explain which victims were

targeted multiple times, what actions the conspiracy took toward those specific individuals,

and whether or how Defendant knew or should have known about those particular victims’

vulnerabilities.

       The majority opinion claims the victim impact statements demonstrate that there

were unusually vulnerable victims, but the statements do not provide that level of detail.

For example, the statements do not ask questions that would indicate who was reloaded,

which, according to the government, is the key indicator of vulnerability. The other

documents in the record are similarly vague on this point. For example, the government

provided the district court with various charts detailing the total amounts of money taken

                                             20
from each victim, but these documents do not also reveal who was reloaded, because they

do not show discrete transactions. An appellate court reviewing this record is left to guess

who was reloaded based upon the total money an individual lost to the scheme.

Furthermore, even if this Court could discern who specifically was reloaded from these

documents, we have no additional details explaining what may have motivated an

individual to contribute to the scheme more than once and how Defendant would have

known of that person’s alleged vulnerability.        Without directing us toward specific

information about particular victims, the district court’s findings do not satisfy the standard

established by this Court in Llamas I. See 599 F.3d at 387–89.

       That backdrop—the binding precedent of Llamas I and its impact on this case—sets

the stage for the government’s filings below, in which it cited the unpublished opinion in

Llamas II to support the allegedly “well established” principle of applying the vulnerable

victim enhancement to reloading schemes. J.A. 380. Llamas II was issued after the district

court resentenced the defendant and again applied the vulnerable victim enhancement. 473

Fed. App’x at 177–78 & n.1. Significantly, the defense did not challenge the application

of the enhancement in the second appeal; it only challenged the district court’s

consideration of the sentencing factors found in 18 U.S.C. § 3553(a) for procedural and

substantive reasonableness. See id. at 179. In fact, this Court specifically said, “[b]ecause

Llamas does not challenge his Guidelines calculation, we do not need to address that stage

of the resentencing.” Id. at 178 n.2. Nonetheless, in its filings below, the government

described this case as “affirming [a] sentence incorporating [the] vulnerable victim

adjustment against a similarly situated Costa Rican telemarketing fraud defendant.” J.A.

                                              21
380. Although technically true, the government’s characterization omits the crucial fact

that the panel in Llamas II expressly declined to opine on the appropriateness of the

enhancement’s application, because that issue was not appealed. Thus, even if it were

binding precedent, Llamas II does not carry the weight the government tries to place on it.

The Fourth Circuit has not previously applied the vulnerable victim enhancement in the

way the majority opinion appears to do here. To the contrary, the binding case on this

issue—Llamas I—undercuts the government’s argument by requiring detailed findings

from the district court. A panel of this Court has since reiterated that holding. See United

States v. Johnson, 480 Fed. App’x. 186, 189 (4th Cir. 2012) (quoting Llamas I for the

proposition that “our precedent stresses the importance of an adequate explanation” for

applying the vulnerable victim enhancement and then finding application of the

enhancement procedurally unreasonable because the district court “failed to make explicit

findings on the record as to the victims, their unusual vulnerability, and [the defendant’s]

knowledge of such vulnerability”). Yet the government appears to take great pains to avoid

citing a published case that diminishes its argument, instead relying on a misleading

characterization of a subsequent unpublished opinion to make its point.

       The government’s filings below also relied on three other cases: one from the

Seventh Circuit and two from the Ninth Circuit. The Seventh Circuit case, like Llamas,

does not help the government’s argument. See United States v. Jackson, 95 F.3d 500 (7th

Cir. 1996). The Seventh Circuit in Jackson upheld the application of the vulnerable victim

enhancement in a case factually similar to the one here. See id. at 502–04, 506–08. Unlike

in this case, however, the district court in Jackson identified at least one particular victim

                                             22
as vulnerable, detailed the conspiracy’s actions to take advantage of that person, and

explained why the defendant should have known about that particular victim’s

vulnerability. See id. at 507–08. Thus, the court in Jackson made the critical factual

findings absent in this case.

       Contrary to the majority opinion’s characterization of Jackson, the vulnerability of

specific victims played a key role in the outcome of that case. The Seventh Circuit

articulated the enhancement’s requirements as being that “the district court must find both

1) that a victim of the defendant’s crime was unusually vulnerable in some way, and 2) that

the defendant targeted that victim because of this vulnerability.” 95 F.3d at 507 (emphases

added).    The court’s subsequent explanation follows that standard.             For example,

throughout the opinion, the court discusses J.Z., one of the scheme’s victims. See id. at

504, 507–08. The opinion details how J.Z. was defrauded into contributing to the scheme

four times and the amounts he contributed on each occasion. See id. at 504. Thus, although

the Seventh Circuit may have appeared to speak in general terms—which the majority is

quick to emphasize—the court’s analysis was firmly grounded in the specifics of a

particular victim’s case. See, e.g., id. at 508 (“[T]he district court clearly determined that

[the victims’] readiness to fall for the telemarketing rip-off, not once but twice (and in J.Z.’s

case, four times), demonstrated that their personalities made them vulnerable in a way and

to a degree not typical of the general population.”); id. (“[T]he systematic re-victimizing

of people like J.Z. amply demonstrate[s] that the defendants believed the reloaded persons

to be especially vulnerable.”).



                                               23
       Only the Ninth Circuit cases cited by the government may support its argument,

because it is unclear from the appellate opinions whether the district court made findings

about particular victims. See United States v. Durant, 89 Fed. App’x 56, 58 (9th Cir. 2004);

United States v. Randall, 162 F.3d 557, 560–61 (9th Cir. 1998). Yet the import of that

precedent is unclear, because, for example, a more recent Ninth Circuit opinion goes into

significant detail about the specific findings made about particular victims and why the

defendant in a reloading scheme knew about the vulnerabilities of those victims. See

United States v. Lloyd, 807 F.3d 1128, 1172–73 (9th Cir. 2015).

       To the extent that my position splits with that of the Ninth Circuit in Durant and

Randall, I believe the Ninth Circuit’s approach, as described in the cases cited by the

government below, are at odds with this Circuit’s binding precedent in Llamas I. The

majority opinion also cites cases from other circuits to support the proposition that

“evidence of reloading may support the enhancement.” Ante at 6–7 (collecting cases). The

cases cited do support the proposition that a reloading scheme may support applying the

vulnerable victim enhancement—a conclusion with which I agree. My dispute with the

majority opinion stems from whether a reloading scheme is sufficient to warrant applying

the enhancement. The majority appears to argue that it is, thereby creating a broad rule

that would apply the enhancement to any case where a victim falls prey to a similar scheme

more than once—without any limiting principle in sight. In contrast, I argue that a district

court must make adequate factual findings about at least one specific victim to justify

applying the enhancement. The cases cited by the majority, like the Ninth Circuit opinions

in Durant and Randall, leave unclear the extent to which the relevant district courts may

                                            24
have made specific findings about particular victims. See United States v. Hoffecker, 530

F.3d 137, 201–02 (3d Cir. 2008); United States v. Day, 405 F.3d 1293, 1295–96 (11th Cir.

2005); United States v. Coe, 220 F.3d 573, 582 (7th Cir. 2000); United States v. Brawner,

173 F.3d 966, 972–73 (6th Cir. 1999); United States v. O’Neil, 118 F.3d 65, 75–76 (2d Cir.

1997). Thus, as the majority opinion notes, these cases stand merely for the proposition

that a reloading scheme can support applying the enhancement; they do not address the key

distinction between my view and that of the majority. That said, to the extent any of those

cases indeed uphold application of the enhancement absent particularized findings about

specific victims, I believe that approach conflicts with this Circuit’s binding precedent, as

articulated in Llamas I.

       Furthermore, the approach taken by the Ninth Circuit in Durant and Randall

diverges from that of several other circuits. The Second Circuit, for example, has spoken

particularly well on the matter in United States v. Dupre, 462 F.3d 131 (2d Cir. 2006). In

that case, co-conspirators targeted evangelical Christians by using Christian imagery and

rhetoric to ask them to provide money again and again to a fraudulent investment scheme.

See id. at 134–36, 144–45. Although such “[s]chemes . . . inevitably attract the gullible,”

the Second Circuit rejected applying the vulnerable victim enhancement in the case solely

based on such a generalized argument. Id. at 145. The court specifically said that “a

criminal successfully asking a fraud victim for additional money does not itself

demonstrate that the victim is especially vulnerable.” Id. at 146. The court further

elaborated:



                                             25
      We have no reason to believe that evangelical Christians as a class are
      ‘unusually susceptible’ to fraud. The application notes reiterate that the
      vulnerable victims enhancement is improper except in cases where
      defendants ‘should have known’ of their victims’ unusual vulnerability, such
      as ‘in a fraud case in which the defendant marketed an ineffective cancer
      cure’ . . . . Absent findings by the District Court that any specific victim was
      especially gullible because of his religion, we cannot conclude that
      evangelical Christian victims were susceptible to fraudulent schemes
      involving religious imagery in a manner analogous to how desperate cancer
      patients might be susceptible to con artists selling placebos.

Id. at 145 (emphasis added) (internal footnote omitted) (quoting U.S.S.G. § 3A1.1 cmt. 2).

This case presents the same situation. “Absent findings by the District Court that any

specific victim was especially gullible,” we cannot meaningfully review this record and

find that the enhancement was appropriately applied. Id. (emphasis added).

      My good colleagues in the majority fail to grasp the basis of my reliance on Llamas

I and Dupre. Indeed, I do not dispute that evidence of a reloading scheme can support

application of the vulnerable victim enhancement, nor do I argue that Llamas I and Dupre

bar reliance on such a scheme as a basis for applying the enhancement. Rather, I rely on

Llamas I and Dupre for the proposition that a court may not apply the vulnerable victim

enhancement unless the government introduces victim-specific, as opposed to generalized,

evidence. Notably, like Llamas I and Dupre, several other circuit opinions have vacated

sentences applying the vulnerable victim enhancement when a district court failed to make

factual findings regarding specific victims. See, e.g., United States v. Angeles-Mendoza,

407 F.3d 742, 747–48 (5th Cir. 2005) (vacating application of the enhancement when the

district court’s “scant, generalized findings” mentioned only “general characteristics

commonly held” by the victims and “inherent” in the class of victims targeted); United


                                            26
States v. Anderson, 349 F.3d 568, 573 (8th Cir. 2003) (vacating application of the

enhancement when the “general, not thorough” explanation provided below gave “no

detailed analysis of why th[e] evidence established that [the defendant] knew or should

have known that any victim was unusually vulnerable”).

       Accordingly, our binding precedent in Llamas I required the district court to identify

at least one specific victim who served as the basis for applying the vulnerable victim

enhancement and to explain why the defendant knew or should have known of that

particular victim’s unusual vulnerability. The district court did not do so in this case.

Therefore, I would vacate the Defendant’s sentence and remand her case for resentencing.

Because the majority opinion reaches a different conclusion, I respectfully dissent.




                                             27
