                      Revised April 14, 1999

               IN THE UNITED STATES COURT OF APPEALS

                       FOR THE FIFTH CIRCUIT

                       _____________________

                            No. 97-41250
                       _____________________


          UNITED STATES OF AMERICA,

                               Plaintiff-Appellee,

          v.

          ALLEN PERRY SOAPE, JR,

                               Defendant-Appellant.

_________________________________________________________________

           Appeal from the United States District Court
                 for the Eastern District of Texas
_________________________________________________________________
                           March 9, 1999
Before KING, Chief Judge, POLITZ and BENAVIDES, Circuit Judges.

KING, Chief Judge:

     Defendant-appellant Allen Perry Soape, Jr. appeals his

conviction and sentence for conspiracy to fraudulently use

counterfeit access devices, unauthorized access devices, and

access devices issued to another person; fraudulent use of

unauthorized access devices; fraudulent use of counterfeit access

devices; fraudulently effecting transactions with access devices

issued to another person; use of a fictitious name or address;

and false use of a social security account number.     We affirm.

                 I. FACTUAL AND PROCEDURAL HISTORY
     On August 2, 1995, defendant-appellant Allen Perry Soape,

Jr. was transferred to the Jefferson County Jail from the

Angelina County Jail, where he had been incarcerated after his

arrest on charges unrelated to the instant case.   Soape turned

over to Jefferson County authorities a number of credit and

identification cards, and both Soape and the jail official who

processed him executed a property log.    While Soape was an inmate

at the Jefferson County Jail, Steven Michael Alexander contacted

Captain Michael Hebert, an internal affairs investigator for the

Jefferson County Sheriff’s Department, to complain that Soape

possessed credit cards issued in Alexander’s name.   Hebert

retrieved Soape’s personal effects from the property room at the

jail and found the following documents:

     1.   Two Direct Merchants Bank MasterCard credit cards in
          the name of Steven M. Alexander;

     2.   One NationsBank/NCNB Interact Pulse card in the name of
          Steven M. Alexander;

     3.   One Radio Shack American Technology Store card in the
          name of Steven M. Alexander;

     4.   One Boilermaker’s National Health and Welfare Fund card
          in the name of Steven M. Alexander;

     5.   One NationsBank MasterCard credit card in the name of
          Steven M. Alexander, Jr.; and

     6.   One Texas Department of Public Safety temporary
          driver’s license in the name of Steven Michael
          Alexander.




                                  2
Soape was charged by an indictment filed in the Eastern District

of Texas with (1) one count of conspiring with Joy A. Lovett1 to

violate 18 U.S.C. § 1029(a)(1), (2), and (5); (2) three counts of

fraudulently using unauthorized access devices in violation of 18

U.S.C. § 1029(a)(2); (3) one count of fraudulently using a

counterfeit access device in violation of 18 U.S.C. § 1029(a)(1);

(4) three counts of fraudulently effecting transactions with

access devices issued to another person in violation of 18 U.S.C.

§ 1029(a)(5); (5) one count of using a fictitious name or address

in violation of 18 U.S.C. § 1342; and (6) three counts of using a

false social security account number in violation of 42 U.S.C.

§ 408(a)(7)(B).   Soape pleaded not guilty to all counts and

proceeded to trial pro se.

     The evidence at trial consisted of the following.   First,

Alexander testified that he met and befriended Soape in the

1970s.   During this time, Soape had access to Alexander’s home

and personal effects and sometimes stayed at Alexander’s

residence.   From 1989 to 1992, Alexander permitted Soape to use

two of his credit cards, but he ultimately requested their

return, paid off the remaining balances, and canceled the cards.

Alexander also testified that at one point, Lovett informed him


     1
        Lovett and Soape were married prior to trial, and the
indictment was amended to read “Joy A. Soape, aka Joy A. Lovett.”
In order to distinguish Mrs. Soape from her husband, however,
this opinion refers to her as “Lovett” and to Mr. Soape as
“Soape.”

                                 3
that Soape had several credit cards in Alexander’s name.    With

respect to the documents retrieved from the Jefferson County

Jail, Alexander stated that he never applied for, or had any

knowledge of, the Direct Merchants Bank MasterCards, the

NCNB/Interact Pulse card, the Radio Shack card, or the

NationsBank MasterCard, and that he did not recognize some of the

addresses the applications and statements for these accounts

listed as his.   Furthermore, he testified, he never possessed the

temporary driver’s license found among Soape’s personal effects,

and it bore an address with which he was unfamiliar.

     In addition to Alexander, several bank employees and

government investigators testified regarding the specific

documents at issue.   Susan Dare of Medras, Inc., Direct Merchants

Bank’s parent company, testified that someone had applied by

phone for a credit card account in the name of Steven M.

Alexander, using his social security account number and an

address in Lufkin, Texas, and that the Direct Merchants Bank

MasterCards found in Soape’s possession were issued on that

account.   Don Walton of NationsBank testified that someone opened

a NationsBank checking account in the name of Steven M. Alexander

of Lufkin, Texas with the same social security account number and

that the NationsBank/NCNB Interact Pulse card found in Soape’s

possession was issued on that account.   Two wire transfers had

been made from that account to an account in Soape’s name at

First National Bank in Port Neches, Texas.   Walton also stated

                                 4
that an individual had applied for a NationsBank Gold MasterCard

account using the name Steven M. Alexander of Orange, Texas, with

Alexander’s social security account number, and that NationsBank

had issued a credit card on that account.   After the account was

opened, a request form seeking to add the names “J.A. Lovett” and

“A.P. Soape” to the account was submitted, and additional Gold

MasterCards were issued in those names.   The form included the

signatures of the primary cardholder, Alexander, and the two

individuals who were to be added.    Walton further identified two

Wal-Mart credit card receipts on the NationsBank MasterCard in

J.A. Lovett’s name, two rental car contracts charged on the

NationsBank MasterCard in Alexander’s name, a NationsBank

MasterCard charge to STS Audio Video in the name of J.A. Lovett,

and a convenience check, written on the same NationsBank

MasterCard account, from Steven M. Alexander, Jr. to J.A. Lovett.

Next, Jan Williamson of the Texas Department of Public Safety

testified that two licenses had been issued in the name of Steven

Michael Alexander, but that one license bore a post office box

address and Soape’s photograph as well as Alexander’s true

address.   Two United States Postal Service employees testified

that someone representing himself to be Steven Alexander applied

for the post office boxes in Lufkin and Orange, Texas that

appeared on the Direct Merchants Bank MasterCard statements and

the NationsBank Gold MasterCard application, respectively.

Finally, Nancy Grinnell of the Social Security Administration

                                 5
testified that the social security account number used in the

accounts described above was assigned to Steven Michael

Alexander, Jr.

     In addition, several store employees testified about

specific usages of the cards at issue.   Kristi Maxon, a Wal-Mart

employee, stated that both Wal-Mart receipts were from

transactions using NationsBank MasterCards issued in the name of

J.A. Lovett; one carried the signature of J.A. Lovett and the

other of “S.A. and maybe Steven Alexander.”   James Bailey, a

manager of STS Audio Video, stated that he sold a satellite

system to a customer who presented a credit card in the name of

J.A. Lovett and that the signature on the receipt was “J.A.

Lovett.”   He also prepared a work order directing his employees

to install the system at Joy Lovett’s residence.   According to

Bailey, the customer provided the address and signed the work

order “Joy Lovett.”   Bank employees testified that more than

$1000.00 was charged on the NationsBank MasterCard account in

1993, 1994, and 1995 and on the Direct Merchants account in 1995.

     Finally, prosecution witness Melissa McCaa, Lovett’s

daughter, took the stand.   McCaa recalled that Soape had used a

driver’s license bearing Alexander’s name but his own photograph

to make either a deposit or a withdrawal at NationsBank in

Lufkin, Texas and that he had paid for a hotel room and a rental

car in Las Vegas, Nevada with a NationsBank MasterCard in

Alexander’s name.   She confirmed that Lovett possessed a

                                 6
NationsBank MasterCard in the name of J.A. Lovett and had used it

to withdraw money from a Pulse automatic teller machine, make

purchases at Wal-Mart, and buy a satellite system.   Finally,

McCaa identified the signature and address on the STS receipt as

Lovett’s; the telephone number on the STS work order as Soape and

Lovett’s home number; the telephone number on the NationsBank

wire transfer documents, the NationsBank MasterCard application,

the NationsBank MasterCard request form, and the Las Vegas car

rental agreements as Soape and Lovett’s cellular telephone

number; the signatures on the NationsBank MasterCard form

requesting additional cards as Lovett’s and Soape’s; and the

signature endorsing the convenience check as Lovett’s.

     Soape called several defense witnesses whose testimony

suggested that Alexander had authorized Soape to use his name and

credit cards.   An officer at the Angelina County Jail, Lieutenant

Price, stated that he contacted a person whose name appeared on a

credit card in Soape’s possession and was advised by that person

that Soape had permission to use the card.   Although he could not

remember the identity of that person, Alexander’s name sounded

familiar.   Captain Hebert testified that he talked to Price after

Price had contacted this person, and Price indicated that he had

spoken with Alexander and that Alexander had given Soape

permission to use the cards.   Finally, Melinda Knost told the

jury that she observed Alexander give Soape a temporary driver’s

license and credit cards and sponsored a power of attorney, which

                                 7
she had notarized, granting Soape permission to act in

Alexander’s affairs.

     The jury convicted Soape on all counts.       The district court

sentenced him to eighteen months in prison and a three-year term

of supervised release on each of the thirteen counts against him,

all sentences to run concurrently.      It also imposed a special

assessment of $50.00 for each count for a total of $650.00 and

restitution in the amount of $18,632.60.       Soape appealed his

conviction and sentence.




                           II.    DISCUSSION

     Soape raises four distinct challenges to the judgment of the

district court.   First, he argues that the evidence is

insufficient to support his convictions for fraudulent use of

counterfeit access devices under 18 U.S.C. § 1029(a)(1) and for

conspiracy under 18 U.S.C. § 371.       Second, he contends that some

of the counts in the indictment are multiplicitous with other

counts.   Third, he claims that the district court violated his

Sixth Amendment right to compulsory process by denying certain of

his requests for subpoenas.      Finally, he charges that the

district court denied him due process and the effective

assistance of counsel by prohibiting contact with McCaa.        We

address each of these contentions in turn.



                                    8
A.   Sufficiency of the Evidence

     1.   Section 1029(a)(1)

     According to Soape, the evidence is insufficient to support

his § 1029(a)(1) convictions because the term “counterfeit access

device” does not encompass otherwise legitimate access devices

procured by fraud, but only devices that were actually created or

manufactured by persons without the right to do so.         The district

court’s interpretation of a federal statute is a question of law

that we review de novo.   See United States v. Courtney, 979 F.2d

45, 48 (5th Cir. 1992).

     We begin, of course, with the statute itself.       Section

1029(a)(1) provides that “[w]hoever . . . knowingly and with

intent to defraud produces, uses, or traffics in one or more

counterfeit access devices . . . shall, if the offense affects

interstate or foreign commerce, be punished as provided in

subsection (c) of this section.”       The statute defines “access

device” as including “any card . . . that can be used, alone or

in conjunction with another access device, to obtain money,

goods, services, or any other thing of value, or that can be used

to initiate a transfer of funds.”       Id. § 1029(e)(1).    A

“counterfeit access device” is “any access device that is

counterfeit, fictitious, altered, or forged, or an identifiable

component of an access device or a counterfeit access device.”

Id. § 1029(e)(2).


                                   9
     We do not believe that this definition excludes credit cards

obtained through the submission of false information.       The term

“counterfeit” means “[m]ade in imitation of something else;

‘imitation’, not genuine.”    3 OXFORD ENGLISH DICTIONARY 1027 (2d ed.

1989), while “fictitious” denotes something “[c]ounterfeit,

‘imitation’, sham; not genuine,” 5 id. at 873, and “forged”

refers to an object “[m]ade in fraudulent imitation of something

genuine; counterfeit, false, spurious,” 6 id. at 69.       Soape’s

credit cards are fraudulent imitations of genuine cards, which

must not only be issued by authorized banks and credit card

companies (as Soape’s undoubtedly were), but also obtained with

truthful information.    In other words, a “genuine” credit card

must be legitimately and honestly obtained; Soape’s cards, being

but imitations of these, are “counterfeit,” “fictitious,” and

“forged.”

     Our reading of § 1029(a)(1) is in accord with our own

precedent and that of our sister circuits.     In United States v.

Brewer, 835 F.2d 550 (5th Cir. 1987), a hacker called a long

distance telephone company’s toll free phone number, punched in

possible access code combinations until he found valid ones that

allowed him to obtain telephone service, and sold the codes to an

undercover agent.   See id. at 551-52.    We held that his actions

violated § 1029(a)(1).    The codes were “counterfeit,” we said,

because they were “fictitious” and “forged.”      See id. at 553.

This was so even though Brewer’s codes were genuine:

                                 10
     [W]e are unpersuaded by Brewer’s broader argument that a
     legitimate access code cannot ever be “counterfeit.” Brewer
     argues that the codes he obtained were genuine code numbers
     placed in the [long distance telephone company’s] computer
     and thus were not “counterfeit.” However, an equally
     plausible interpretation is that Brewer did not “obtain” the
     codes from the computer but fabricated codes that just
     happened to be identical to the [company’s] codes. By
     analogy, someone who manufactures phony credit cards is no
     less a “counterfeiter” because he happens to give them
     numbers that match valid accounts.

Id. at 554.   Unlike Brewer, of course, Soape did not himself

fabricate counterfeit access devices.   But he unquestionably

caused their manufacture.   Confronted with the same situation,

the Ninth Circuit concluded in United States v. Brannan, 898 F.2d

107 (9th Cir. 1990), that the term “counterfeit access device,”

as used in § 1029(a)(1), encompasses access devices acquired

through the submission of false information:

     What Brannan did was use fictitious information to cause the
     victim companies to issue counterfeit cards. By his
     conduct, Brannan caused the manufacture of an invalid
     device. The conduct was functionally equivalent to the
     manufacture of a counterfeit device by Brannan himself. We
     believe that Congress by this statute intended to proscribe
     use of such devices.
          Because Brannan’s conduct does constitute employment of
     counterfeit access devices under the statute, we uphold the
     conviction. According to Webster’s New International
     Dictionary, (2d ed. 1941), the word “counterfeit” denotes
     “that which is made in imitation of something with an intent
     to deceive.” Brannan here initiated and contributed to the
     process of making illegitimate credit cards, even if he did
     not personally perform every step of the procedure.

Id. at 109.   In the same way, Soape counterfeited cards as

effectively--and perhaps more so--as if he had personally

manufactured them.



                                11
     The legislative history of § 1029 supports our broad

interpretation of the definition of “counterfeit access device.”

First, we note that Congress intended to draft a broad statute so

as to close loopholes in existing federal legislation addressing

credit card abuse and counterfeiting.   See S. REP. NO. 98-368, at

2-5 (1984), reprinted in 1984 U.S.C.C.A.N. 3647, 3648-51; H.R.

REP. NO. 98-894, at 4-5, 6-8, 19 (1984), reprinted in 1984

U.S.C.C.A.N. 3689, 3689-91, 3692-94, 3705; United States v.

Hughey, 147 F.3d 423, 434 (5th Cir. 1998).   Second, the

legislative history indicates that a card containing some valid

components may still be counterfeit within the meaning of

§ 1029(a)(1).   See S. REP. NO. 98-368, at 3, reprinted in 1984

U.S.C.C.A.N. 3649 (“Cards are counterfeited through two popular

techniques.   Blank plastic cards may be made to look like

legitimate cards through ‘silkscreening’ or photo offset

printing, and valid account numbers obtained by fraudulent means

are embossed onto the card.   Alternately, a lost or stolen card

may be embossed with a new account number.”); H.R. REP. NO. 98-

894, at 7, reprinted in 1984 U.S.C.C.A.N. 3693 (“One common

counterfeiting technique utilizes ‘silkscreening’ or offset

printing of the registered design or service marks of an

organization followed by embossing fraudulently obtained valid

account numbers on a card.”).   Similarly, the cards in this case

contained fraudulently obtained names and account numbers; they

differ from the counterfeit cards described in the House Report

                                12
only in that they were physically manufactured by a bank or

credit card company rather than by the defendant himself.    That,

we think, is a distinction without a difference.   See Brannan,

898 F.2d at 109-10 (“The House Report evinces an intent that the

definition of counterfeit access devices be construed broadly and

we believe that the language may be fairly interpreted to

sanction the widespread fraudulent inducement of credit card

generation by legitimate issuers as well as the relatively rare

homemade creation of convincing replicas.”).   Because Soape’s

credit cards are counterfeit access devices, the evidence was

sufficient to support his § 1029(a)(1) conviction.2

     2.   Section 371

     Soape also argues that the evidence is insufficient to

support his conviction for conspiracy under 18 U.S.C. § 371

because the government failed to show that he and his only

     2
        At oral argument, Soape’s counsel also presented a
relatively skeletal contention that credit cards obtained through
the submission of false information cannot be both “counterfeit”
under 18 U.S.C. § 1029(a)(1) and “unauthorized” under 18 U.S.C.
§ 1029(a)(2) and that therefore, if we affirm Soape’s conviction
under the former statute, we must vacate his convictions under
the latter. A “counterfeit” card, counsel asserted, is by
definition “fictitious,” and § 1029(a)(2), which criminalizes
certain uses of “unauthorized” cards, presupposes a genuine card
that is later used without authority. We rejected a similar
argument in Brewer, concluding that the terms “counterfeit” and
“unauthorized” as used in § 1029 are not mutually exclusive. See
Brewer, 835 F.2d at 553; see also Brannan, 898 F.2d at 110
(“[T]here is no indication in the legislative history that
Congress intended subsections (a)(1) and (a)(2) to be mutually
exclusive.”); United States v. Gugino, 860 F.2d 546, 549 (2d Cir.
1988) (“[I]t does not follow that the same access device cannot
be both unauthorized and counterfeit at the same time.”).

                               13
alleged co-conspirator, Lovett, agreed to engage in unlawful

conduct and that Lovett had the requisite intent to commit the

offenses that were allegedly the object of the conspiracy.    In

short, Soape claims that he is not guilty of conspiracy because

he conspired with no one.   We review such a claim in the light

most favorable to the verdict, accepting all credibility choices

and reasonable inferences made by the jury, see United States v.

McCord, 33 F.3d 1434, 1439 (5th Cir. 1994), and must uphold the

conviction if a rational jury could have found that the

government proved the essential elements of the crime charged

beyond a reasonable doubt, see United States v. Ruiz, 986 F.2d

905, 908 (5th Cir. 1993).   It is not necessary that the evidence

exclude every reasonable hypothesis of innocence or be wholly

inconsistent with every conclusion except that of guilt.     See

United States v. Lopez, 74 F.3d 575, 577 (5th Cir. 1996).    This

standard of review is the same regardless of whether the evidence

is direct or circumstantial.   See United States v. Cardenas, 9

F.3d 1139, 1156 (5th Cir. 1993).

     To establish a violation of 18 U.S.C. § 371, the government

must prove beyond a reasonable doubt (1) that two or more people

agreed to pursue an unlawful objective, (2) that the defendant

voluntarily agreed to join the conspiracy, and (3) that one or

more members of the conspiracy committed an overt act to further

the objectives of the conspiracy.    See United States v. Campbell,

64 F.3d 967, 974 (5th Cir. 1995).    Moreover, the government must

                                14
prove “at least the degree of criminal intent necessary for the

substantive offense itself.”   United States v. Osunegbu, 822 F.2d

472, 475 (5th Cir. 1987) (quoting United States v. Ortiz-Loya,

777 F.2d 973, 981 (5th Cir. 1985)) (internal quotation marks

omitted).   Although such intent may not be proven solely by a

family relationship, see United States v. Ismoila, 100 F.3d 380,

389 (5th Cir. 1996), it may be shown by circumstantial evidence,

see United States v. Beckner, 134 F.3d 714, 719 (5th Cir. 1998),

and “when inferences drawn from the existence of a family

relationship or ‘mere knowing presence’ are combined with other

circumstantial evidence, there may be sufficient evidence to

support a conspiracy conviction.”    United States v. Williams-

Hendricks, 805 F.2d 496, 503 (5th Cir. 1986).

     After a careful review of the record, we believe that there

is sufficient evidence to support the conclusion that Lovett

agreed with Soape to engage in unlawful conduct and that she had

the requisite intent to commit the underlying offenses, each of

which requires that the defendant act “knowingly and with intent

to defraud.”   18 U.S.C. § 1029(a)(1), (2), (5).   Lovett signed a

request form, on which her own cellular phone number appeared as

the phone number of the primary cardholder, to add herself to a

MasterCard account in Alexander’s name.   She used the credit card

issued on that account on a number of occasions, including the

charging of $1400.00 at STS Audio Video and $207.16 at Wal-Mart;

in addition, someone used her card to charge $249.12 at Wal-Mart,

                                15
signing the receipt “S.A. and maybe Steven Alexander.”   Lovett

also endorsed a convenience check for $1200.00, purportedly

written by Alexander on the NationsBank MasterCard account but

bearing an address in Lufkin, Texas, a city in which Alexander

did not live.   There are, of course, innocent explanations for

Lovett’s behavior; for example, Alexander could have, as Soape

claims, authorized Lovett’s charges on his account, or Lovett

could have been her husband’s trusting dupe, honestly believing

that his friend was willing to subsidize her Wal-Mart purchases

and satellite system and neglecting to notice or question the

appearance of her own phone number as the primary cardholder’s

and the mistake in Alexander’s address on a check made out to

her.   But, as we observed above, it is not necessary that

circumstantial evidence of conspiracy be wholly inconsistent with

every conclusion except that of guilt.   See Lopez, 74 F.3d at

577.   A rational jury could have concluded from the combination

of Lovett’s own actions and her close relationship with Soape

that she agreed with him to violate § 1029(a)(1), (2) and (5) and

that she had the requisite intent to commit the offenses

proscribed by those statutes.   Compare Osunegbu, 822 F.2d at 476-

77 (finding sufficient evidence to support a wife’s conviction

for conspiring with her husband to steal mail where she had

called to inquire whether there was mail at a post office box to

which stolen packages were being sent, opened a box addressed to

someone else, removed the tags from the skirt inside, and thrown

                                16
away the box, from which the mailing label had been removed),

with United States v. Forrest, 620 F.2d 446, 450-51 (5th Cir.

1980) (finding insufficient evidence to support a wife’s

conviction for possession of stolen goods where she had done no

more than send a message to her husband, who was involved in the

criminal scheme, and accepted money from one of his employees at

his direction).     The evidence is therefore sufficient to support

Soape’s conspiracy conviction.

B.   Multiplicity

     Soape also argues that Counts Two, Three, and Four of his

indictment, which charge violations of 18 U.S.C. § 1029(a)(2),

are multiplicitous with Counts Six, Seven, and Eight, which

allege violations of 18 U.S.C. § 1029(a)(5).    We review issues of

multiplicity de novo.     See United States v. Cluck, 143 F.3d 174,

179 (5th Cir. 1998) (citing United States v. Dupre, 117 F.3d 810,

818 (5th Cir. 1997)).

     We turn first to the government’s contention that Soape has

waived the multiplicity issue.    Although a complaint about the

multiplicity of sentences can be raised for the first time on

appeal, see United States v. Stovall, 825 F.2d 817, 821 (5th Cir.

1987) (citing Osunegbu, 822 F.2d at 481 n.26), a defendant must

raise multiplicity of the indictment as a defense before trial

pursuant to Federal Rule of Criminal Procedure 12(b)(2) to

preserve error, unless he can show cause for failing to do so,



                                  17
see FED. R. CRIM. P. 12(f); Stovall, 825 F.2d at 821 (citing

United States v. Gerald, 624 F.2d 1291, 1300 (5th Cir. 1980)).

From his brief, it appears that Soape’s multiplicity complaint

goes to his indictment alone, not to his sentence:    In his

summary of argument, he states in a section labeled

“Multiplicity” that “[t]he government charged Mr. Soape with the

same offense three times; counts two, three, and four charge the

same crimes as do counts six, seven, and eight.   The elements of

the offenses as charged are identical” (emphasis added).    He

makes no mention of the sentences imposed on the allegedly

multiplicitous counts.   Similarly, in the body of his brief,

Soape argues that the charges against him are multiplicitous but

does not refer to any multiplicity of sentence.   It thus appears

that Soape’s challenge goes only to his indictment, and he was

therefore required to raise his multiplicity objection prior to

trial or show cause for failing to do so.   He did not do so, and

he may not now challenge his convictions as multiplicitous.      See

United States v. Galvan, 949 F.2d 777, 781 (5th Cir. 1991);

United States v. Lemons, 941 F.2d 309, 316 n.4 (5th Cir. 1991);

United States v. Marroquin, 885 F.2d 1240, 1245 (5th Cir. 1989).3

     3
        We are aware that some of our fellow courts of appeals
have treated a failure to challenge the multiplicity of an
indictment before trial somewhat differently. The Second Circuit
has reviewed a claim such as Soape’s where the defendant made no
multiplicity objection before trial but did so afterward in a
motion to set aside the verdict. See United States v. Chacko,
No. 98-1087, 1999 WL 101272, at *3-*4 (2d Cir. Mar. 1, 1999).
The Eighth Circuit has applied the plain error standard in a case

                                18
     Even if Soape could challenge his indictment on appeal, the

§ 1029(a)(2) counts are not multiplicitous with the § 1029(a)(5)

counts.4   In general, “multiplicity” is the charging of a single

offense under more than one count of an indictment.   See United

States v. Nguyen, 28 F.3d 477, 482 (5th Cir. 1994).   “The chief

danger raised by a multiplicitous indictment is the possibility

that the defendant will receive more than one sentence for a

single offense.”   Cluck, 143 F.3d at 179 (quoting United States

v. Swaim, 757 F.2d 1530, 1537 (5th Cir. 1985) (internal quotation



in which the defendant failed to challenge the multiplicity of
his indictment prior to trial. See United States v. Jackson, 155
F.3d 942, 947 (8th Cir. 1998). Unlike the defendant in Chacko,
however, Soape raises his multiplicity challenge for the first
time on appeal, and our court has consistently declined to review
such an argument for plain error, see, e.g., Galvan, 949 F.2d at
781 (“Galvan acknowledges not having filed the requisite pre-
trial motion; because she did not, she may not challenge the
convictions as multiplicious.”) (emphasis added).
     4
        The concurrent sentence doctrine would not apply in
Soape’s case. Under this doctrine, a tool of judicial economy,
the existence of one valid sentence makes unnecessary the review
of other sentences that run concurrently with it. See Stovall,
825 F.2d at 824. Applying the doctrine in a manner that removes
the adverse collateral consequences of the sentence, we have
adopted the policy of vacating the unreviewed sentence and
suspending imposition of that sentence. See id. We cannot apply
the doctrine at all, however, where not all the sentences are
concurrent, including where the defendant’s liability for a
special assessment depends on the validity of each of the
convictions. See Ray v. United States, 481 U.S. 736, 737 (1987).
While the district court sentenced Soape to concurrent 18-month
terms of imprisonment and three-year terms of supervised release
for each of the thirteen counts on which he was convicted, it
also imposed a $50.00 special assessment for each count. Soape’s
monetary sanctions therefore depend on the validity of each
count, including the allegedly multiplicitous ones, and the
concurrent sentence doctrine does not apply.

                                19
marks omitted).    “[W]here the same act or transaction constitutes

a violation of two distinct statutory provisions, the test to be

applied to determine whether there are two offenses or only one,

is whether each provision requires proof of a fact which the

other does not.”    Blockburger v. United States, 284 U.S. 299, 304

(1932); see Cluck, 143 F.3d at 179; Nguyen, 28 F.3d at 482.       When

the legislature writes two criminal statutes, and each statute

contains an independent element from the other statute, we

presume that it intends to define two separate offenses that

generally entail two punishments.     See United States v. Cruce, 21

F.3d 70, 73 (5th Cir. 1994) (citing Missouri v. Hunter, 459 U.S.

359, 367 (1983)).    The fact that “there is a substantial overlap

in the proof offered to establish the crimes” does not prohibit

conviction and punishment for both.    See Stovall, 825 F.2d at

822.

       The focus in determining the issue of multiplicity is on the

statutory elements of the offenses, not on their application to

the facts of the specific case before the court.    See United

States v. Flores-Peraza, 58 F.3d 164, 167 (5th Cir. 1995) (“The

question for the court to determine is not, as Flores argues,

whether his specific violation of § 1326(a) necessarily

encompassed or included his specific violation of § 1325(a), but

whether all violations of § 1326(a) constitute violations of

§ 1325(a).”) (citing United States v. Singleton, 16 F.3d 1419,

1422 (5th Cir. 1994)).    Because § 1029(a)(2) and § 1029(a)(5)

                                 20
each require proof of an element that the other does not, an

indictment charging that the same conduct violates both is not

multiplicitous.

     Section 1029(a)(2) prohibits “knowingly and with intent to

defraud traffic[king] in or us[ing] one or more unauthorized

access devices during any one-year period, and by such conduct

obtain[ing] anything of value aggregating $1,000 or more during

that period . . . if the offense affects interstate or foreign

commerce.”   Thus, to establish that Soape committed an offense

under this section, the government was required to prove the

following elements:

     1.   That Soape used one or more unauthorized access
          devices;
     2.   That Soape thereby obtained something of value
          aggregating at least $1000.00 during a one-year period;
     3.   That Soape acted knowingly and with intent to defraud;
          and
     4.   That Soape’s conduct affected interstate or foreign
          commerce.

Section 1029(a)(5) criminalizes “knowingly and with intent to

defraud effect[ing] transactions, with 1 or more access devices

issued to another person or persons, to receive payment or any

other thing of value during any 1-year period the aggregate value

of which is equal to or greater than $1,000 . . . if the offense

affects interstate or foreign commerce.”   To establish that Soape

violated § 1029(a)(5), the government was required to prove the

following elements:

     1.   That Soape effected transactions with one or more
          access devices issued to another person or persons;

                                   21
     2.     That Soape thereby obtained something of value
            aggregating at least $1000.00 during a one-year period;
     3.     That Soape acted knowingly and with intent to defraud;
            and
     4.     That Soape’s conduct affected interstate or foreign
            commerce.

The first element is clearly different.   Conviction under

§ 1029(a)(2) requires proof that the access device be

“unauthorized,” meaning “lost, stolen, expired,

revoked, canceled, or obtained with intent to defraud.”   18

U.S.C. § 1029(e)(3).   Conviction under § 1029(a)(5) requires

proof that the access device be “issued to another person or

persons.”   An access device can be “unauthorized” in the sense

that it is expired, revoked, or canceled, but not be issued to

another person.   By the same token, an access device can be

issued to another person, and used to effect transactions with

intent to defraud, without having been lost, stolen, expired,

revoked, canceled, or even obtained with intent to defraud, for

example if one individual allows another to charge certain items

on his valid card, but the latter goes beyond the scope of that

authorization.    Thus, even if Soape had properly preserved error,

his multiplicity argument would lack merit.

C.   Sixth Amendment Right to Compulsory Process

     Soape next contends that the district court’s denial of his

subpoena requests under Federal Rule of Criminal Procedure 17(b)5

     5
        The Federal Rules of Criminal Procedure create a
mechanism to realize the Sixth Amendment right to compulsory
process:

                                 22
for the long distance telephone records of the Angelina County

Sheriff’s Department and for Robert Inselmann, an attorney who

had represented him in the past, violated his Sixth Amendment

right to compulsory process.     We have “generally given district

courts wide discretion in determining whether subpoenas should

issue under Rule 17(b),”     United States v. Ramirez, 765 F.2d 438,

441 (5th Cir. 1985), but only “within the limits imposed by the

Constitution,” id. (quoting United States v. Webster, 750 F.2d

307, 329 (5th Cir. 1984)).    Whether the trial court’s refusal to

subpoena a witness violates the Sixth Amendment is, if course, a

question of law that we review de novo.     See United States v.

Lampton, 158 F.3d 251, 255 (5th Cir. 1998).

     The Sixth Amendment provides in relevant part, “In all

criminal prosecutions, the accused shall enjoy the right . . . to

have compulsory process for obtaining witnesses in his favor.”

U.S. CONST. amend. VI.    The Supreme Court has recognized that this

right “is an essential attribute of the adversary system itself”

and that “[f]ew rights are more fundamental than that of an

accused to present witnesses in his own defense.”     Taylor v.




     The court shall order at any time that a subpoena be issued
     for service on a named witness upon an ex parte application
     of a defendant upon a satisfactory showing that the
     defendant is financially unable to pay the fees of the
     witness and that the presence of the witness is necessary to
     an adequate defense.

FED. R. CRIM. P. 17(b).

                                  23
Illinois, 484 U.S. 400, 408 (1988).6   Accordingly, “at a

minimum . . . criminal defendants have the right to the

government’s assistance in compelling the attendance of favorable

witnesses at trial and the right to put before a jury evidence

that might influence the determination of guilt.”    Pennsylvania

v. Ritchie, 480 U.S. 39, 56 (1987).    The compulsory process right

is not absolute, however; when requesting a court to subpoena a

witness, a defendant has the duty to demonstrate the necessity of

the witness’s testimony.   See United States v. Gonzales, 79 F.3d

413, 424 (5th Cir. 1996); see also United States v. Valenzula-

Bernal, 458 U.S. 858, 867 (1982) (holding that a defendant cannot

establish a violation of the constitutional right to compulsory

process merely by showing that he was deprived of certain

testimony but must make some plausible showing of how that


     6
        A defendant’s right to present witnesses in his favor is
also a fundamental element of due process of law, as the Supreme
Court decided when holding that the Sixth Amendment’s compulsory
process guarantee applies to the states:

     The right to offer the testimony of witnesses, and to compel
     their attendance, if necessary, is in plain terms the right
     to present a defense, the right to present the defendant’s
     version of the facts as well as the prosecution’s to the
     jury so it may decide where the truth lies. Just as an
     accused has the right to confront the prosecution’s
     witnesses for the purpose of challenging their testimony, he
     has the right to present his own witnesses to establish a
     defense. This right is a fundamental element of due process
     of law.

Washington v. Texas, 388 U.S. 14, 19 (1967). Soape claims only a
violation of his Sixth Amendment rights, not his Fifth Amendment
due process rights.

                                24
testimony would have been both material and favorable to his

defense).   The government may respond by demonstrating that the

facts upon which the defense relies are inaccurate, or that the

evidence sought is immaterial, irrelevant, cumulative or

otherwise unnecessary.    See Gonzales, 79 F.3d at 424; Webster,

750 F.2d at 329-30.

     With these principles in mind, we turn to Soape’s subpoena

requests.   First, Soape requested a subpoena duces tecum for the

long distance telephone records of the Angelina County Sheriff’s

Department.   On appeal, Soape contends that the district court’s

refusal to issue such a subpoena prevented him from obtaining

evidence going to the heart of his defense, namely that Alexander

had authorized him to use the credit cards.   The telephone

records, Soape claims, would have demonstrated that the

individual whom Price called and who told him that Soape had

permission to use the credit cards was, in fact, Alexander.    This

evidence was critical, Soape argues, because Price testified at

trial that he could not remember that person’s identity and

because the government asserted during closing argument that

Price could not have called Alexander because he had dialed a

local number although Alexander lived outside Angelina County.

     When requesting the district court to issue a subpoena,

however, Soape had a duty to demonstrate the necessity of the

telephone records.    See Gonzales, 79 F.3d at 424.   During the ex

parte hearing at which he asked the court to subpoena the

                                 25
records, Soape made no effort to explain why they were necessary

to his defense.   Indeed, even if he had made the same arguments

that he now does, he would not have met the threshold showing of

necessity.   As Soape concedes in his opening brief, the records

could only have bolstered his contention that he acted with

Alexander’s permission.   Such authorization is not, however, a

defense to the offenses with which Soape was charged.   The

indictment alleged that Soape violated 18 U.S.C. § 1029(a)(1),

(2), and (5), 18 U.S.C. § 1342, and 42 U.S.C. § 408(a)(7)(B).7

Even if Alexander had given Soape permission to apply for and use

credit cards in his name, they still would be “counterfeit”

within the meaning of § 1029(a)(1) because they would have been

obtained through the submission of information that was false as

to Soape.8   Such cards also would be “unauthorized” under

§ 1029(a)(2) because they would have been obtained with the

intent to defraud banks and credit card companies into believing

     7
        In addition, it also charged him with conspiracy to
violate § 1029(a)(1), (2), and (5), in violation of 18 U.S.C.
§ 371, and aiding and abetting the violation of § 1029(a)(1),
(2), and (5), in violation of 18 U.S.C. § 2.
     8
        Don Walton of NationsBank testified that the bank never
would have issued the NationsBank MasterCard if it had known that
Soape was using Alexander’s name and social security account
number, even if Alexander had authorized him to do so, and would
have blocked the card immediately upon discovering that the
person who had applied for it had not used his true name and
social security account number. Thus, it appears that, at least
from the issuer’s point of view, a credit card obtained with
false personal information would not be genuine, even if the
applicant had the permission of the individual as to whom that
information was true.

                                26
that they were issuing cards to Alexander.   Cf. United States v.

Jacobowitz, 877 F.2d 162, 165-67 (2d Cir. 1989) (holding that

even as to a credit card obtained by the cardholder from the

issuer without fraudulent intent, use of that card by a third

person to defraud the issuer with the consent of the holder

violates § 1029(a)(2)).   And, of course, there is no doubt that

the cards would have been “issued to another person” within the

meaning of § 1029(a)(5) even if Alexander had approved Soape’s

conduct.

     Proof of Alexander’s consent does not help Soape on his

other convictions, either.   Section 1342 of Title 18, United

States Code, provides:

          Whoever, for the purpose of conducting, promoting, or
     carrying on by means of the Postal Service, any scheme or
     device mentioned in section 1341 of this title or any other
     unlawful business, uses or assumes, or requests to be
     addressed by, any fictitious, false, or assumed title, name,
     or address or name other than his own proper name, or takes
     or receives from any post office or authorized depository of
     mail matter, any letter, postal card, package, or other mail
     matter addressed to any such fictitious, false, or assumed
     title, name, or address, or name other than his own proper
     name, shall be fined under this title or imprisoned not more
     than five years, or both.

18 U.S.C. § 1342.   The consent of the individual whose true name

is used by another is not a defense to this section; Alexander’s

consent to Soape’s use of his name and address do not make them

any less fictitious, false, or assumed as to Soape.   Finally, 42

U.S.C. § 408(a)(7)(B) prohibits a person from, for certain

purposes, “with intent to deceive, falsely represent[ing] a


                                27
number to be the social security account number assigned by the

Commissioner of Social Security to him or to another person, when

in fact such number is not the social security account number

assigned by the Commissioner of Social Security to him or to such

other person.”   As with 18 U.S.C. § 1342, Alexander’s consent to

Soape’s use of Alexander’s social security number does not make

that number any less false as to Soape, nor does it negate any

intent on Soape’s part to deceive persons other than Alexander.

     Second, Soape complains of the district court’s refusal to

issue a subpoena for Inselmann, an attorney who he claims

possesses a power of attorney that would have tended to undermine

the government’s argument that the document sponsored by Knost

was a recent fabrication.   Like the telephone records, Soape

claims, the power of attorney proves that he acted with

Alexander’s permission, and depriving him of compulsory process

for securing its presence violated his Sixth Amendment rights.

Soape filed two written motions for a subpoena for Inselmann,

neither of which shows any necessity for Inselmann’s testimony.

He also made an oral ex parte application for such a subpoena, in

which he similarly failed to demonstrate that Inselmann’s

testimony and the power of attorney in his possession was

necessary to his defense and indeed was unable coherently to

explain the gist of Inselmann’s expected testimony.   And even if

he had made the same arguments before the district court that he



                                28
does on appeal, he would not have met the threshold showing of

necessity.   Inselmann and the power of attorney could only show

that Soape had Alexander’s permission to act as he did.   As we

explained above, such authorization was not a defense to the

crimes with which Soape was charged.   Accordingly, we find that

the district court’s refusal to issue a subpoena for the Angelina

County Sheriff’s Department telephone records and for Inselmann

did not violate Soape’s Sixth Amendment right to compulsory

process.



D.   Fifth Amendment Right to Due Process and Sixth Amendment
     Right to Counsel

      Finally, Soape complains that the district court denied him

due process and the effective assistance of counsel.   On March

17, 1997, the government moved to modify the conditions of

Soape’s pretrial release so as to preclude him from having any

contact with prosecution witness McCaa.   The motion alleged that

on March 14, 1997, Soape and Lovett placed an audio tape in

McCaa’s mailbox intended to harass and intimidate her and that

McCaa was concerned for her welfare and safety.   The court

granted the motion.   On appeal, Soape, who was acting pro se at

trial, contends that the ban on contact with McCaa precluded him

from properly preparing his defense and thereby violated both his

Fifth Amendment right to due process and his Sixth Amendment

right to effective assistance of counsel.   We review such

                                29
constitutional questions de novo.      See United States v. Osborne,

68 F.3d 94, 98 (5th Cir. 1995).

     Soape is correct that as a general rule, “[w]itnesses,

particularly eye witnesses, to a crime are the property of

neither the prosecution nor the defense.     Both sides have an

equal right, and should have an equal opportunity, to interview

them.”   Gregory v. United States, 369 F.2d 185, 188 (D.C. Cir.

1966).   This does not mean, however, that a trial court may not

limit a defendant’s access to witnesses to prevent harassment or

other wrongdoing.   See United States v. Whittington, 783 F.2d

1210, 1219 (5th Cir. 1986) (holding that a prosecutor may

investigate prospective defense witnesses if his conduct is

neither prompted by the possibility of their testifying nor

harassing or threatening, because “[t]he prosecutor’s hands are

not tied so tightly as to prevent good faith efforts to avert

perjury or to investigate past offenses”); United States v.

Heatley, 994 F. Supp. 483, 489 (S.D.N.Y. 1998) (limiting defense

access to prosecution witnesses where such contact would place

the witnesses in “substantial and immediate risk”).9     In this

case, the district court determined that Soape’s conduct toward

     9
        We also note that “a government witness who does not wish
to speak to or be interviewed by the defense prior to trial may
not be required to do so.” United States v. Caldwell, 750 F.2d
341, 346 (5th Cir. 1984) (quoting United States v. Benson, 495
F.2d 475, 479 (5th Cir. 1974)). Although McCaa was ultimately
called only by the government, Soape expressed an intent to call
her as a defense witness at various times during this criminal
proceeding.

                                  30
McCaa was harassing and intimidating,10 and it imposed the ban on

contact to protect her and the integrity of the trial process.

In doing so, it did not infringe upon Soape’s Fifth and Sixth

Amendment rights.   The challenged order explicitly permitted

Soape to subpoena McCaa, and it did not prohibit him from

requesting alternative methods of ascertaining McCaa’s testimony,

such as an interview before the trial court or an opportunity for

voir dire when the witness testified.   Cf. Parsons v. United

States, 919 F. Supp. 86, 90 (N.D.N.Y. 1996) (“In any event, faced

with the belief that he was unable to have personal contact with

[the witness], the reasonable course would have been for

petitioner’s counsel to obtain the court’s permission to speak

with her for the purpose of preparing a defense.   There is no

indication in the record that [counsel] pursued such an avenue.

The court therefore rejects the premise advanced by petitioner

that his counsel was precluded by a court order from having any

contact with a potential witness in order to prepare a

defense.”).   Accordingly, we conclude that the ban on contact


     10
        Soape urges us to find the ban on contact with McCaa
unconstitutional because the district court later determined,
during the sentencing hearing, that the tape was not an attempt
to obstruct justice. We decline to do so. We see no reason why
a post-trial determination that a particular action of the
defendant does not trigger an obstruction of justice enhancement
under United States Sentencing Guidelines Manual § 3C1.1 should
render unconstitutional a trial court’s pretrial decision to
impose limitations on defendant-witness contact because of the
same action, which at the time appeared harassing or
intimidating.

                                31
with McCaa did not rise to the level of a constitutional

violation.

                        III.   CONCLUSION

     For the foregoing reasons, we AFFIRM the judgment of the

district court.




                                32
