United States Court of Appeals
         For the Eighth Circuit
     ___________________________

             No. 18-1071
     ___________________________

         United States of America,

    lllllllllllllllllllllPlaintiff - Appellee,

                       v.

           Momodu Babu Sesay,

   lllllllllllllllllllllDefendant - Appellant.
      ___________________________

             No. 18-1979
     ___________________________

         United States of America,

    lllllllllllllllllllllPlaintiff - Appellee,

                       v.

     Saddam Samaan Daoud Samaan,

   lllllllllllllllllllllDefendant - Appellant.
      ___________________________

             No. 18-3046
     ___________________________

         United States of America,

    lllllllllllllllllllllPlaintiff - Appellee,
                                           v.

                                  Fester Sayonkon,

                       lllllllllllllllllllllDefendant - Appellant.
                                       ____________

                    Appeals from United States District Court
                          for the District of Minnesota
                                 ____________

                             Submitted: June 13, 2019
                             Filed: September 11, 2019
                                   ____________

Before COLLOTON, KELLY, and ERICKSON, Circuit Judges.
                          ____________

COLLOTON, Circuit Judge.

       A jury convicted Fester Sayonkon and Saddam Samaan of aggravated identity
theft and conspiracy to commit bank fraud. See 18 U.S.C. §§ 1028A, 1344, 1349.
A third defendant, Momodu Sesay, pleaded guilty to one count of conspiracy to
commit bank fraud and testified for the prosecution. The district court1 sentenced the
defendants to terms of imprisonment. Sayonkon and Samaan appeal their
convictions, and all three defendants challenge their sentences. We affirm the
judgments.




      1
       The Honorable Ann D. Montgomery, United States District Judge for the
District of Minnesota.

                                          -2-
                                         I.

       In 2008, the Minnesota Financial Crimes Task Force began receiving reports
of an uptick in counterfeit checks deposited at banks around the Minneapolis-St. Paul
area. An investigation revealed a three-tiered check-fraud scheme. “Check printers”
generated counterfeit checks using check-writing software, blank check stock, and
valid bank account and routing number information. “Runners” negotiated or
deposited the fraudulent checks, often opening their own bank accounts and
attempting to withdraw as much cash as possible before the fraud was discovered.
“Recruiters” solicited and managed runners, transported them to bank locations,
coached them on how to carry out the transactions, and served as the intermediaries
between the printers and the runners.

       The Task Force identified Sesay and Sayonkon as two of the primary check
printers and recruiters. At trial, Sesay admitted that from October 2009 to December
2012, he generated up to six counterfeit checks per month, and coordinated a team of
runners and recruiters to negotiate or deposit those checks. During this same period,
Sayonkon printed his own fraudulent checks and recruited runners, but also obtained
fraudulent checks from Sesay and shared information and coordinated runners with
him.

      In late 2011, Sayonkon recruited Samaan to the conspiracy. Samaan was
incarcerated at the time, but he began providing Sayonkon with the names and
addresses of contacts in Jordan who might serve as runners and negotiate counterfeit
checks. After his release in March 2012, Samaan served as a runner for Sayonkon.

      In June 2012, the Task Force executed a search warrant at an apartment shared
by Sesay and another conspirator. Investigators seized two laptops loaded with
VersaCheck, a check-writing software designed for small businesses. Data obtained
from the computers showed names of payees and other details about the checks

                                         -3-
generated by the software. Investigators matched these payees to a number of known
runners, including Sayonkon. After Sesay agreed to cooperate with authorities, he
acknowledged that from October 2009 through June 2012, he and his fellow
conspirators caused or intended to cause over $1.4 million in losses at more than forty
financial institutions.

       A grand jury charged Sesay, Sayonkon, Samaan, and three others with
conspiracy to commit bank fraud, see 18 U.S.C. §§ 1344, 1349, and alleged that
Sayonkon and Samaan committed aggravated identity theft. See id. § 1028A. Sesay
pleaded guilty to one count of conspiring to commit bank fraud, and became a witness
for the government. A jury convicted Sayonkon and Samaan of the conspiracy and
aggravated identity theft charges.

      At Sesay’s sentencing, the court departed downward from the advisory
guideline range and imposed a term of 63 months’ imprisonment. Sayonkon was
sentenced to a total of 151 months in prison and Samaan to 87 months’ imprisonment.

                                          II.

       Sayonkon and Samaan challenge their convictions for conspiracy to commit
bank fraud. Each argues that the government presented evidence of two separate
conspiracies and created a prejudicial variance from the single conspiracy charged in
the indictment. Where a defendant claims a variance based on proof of multiple
conspiracies, we will reverse only if the evidence is insufficient to support a finding
of a single conspiracy and the defendant was prejudiced. United States v. Longs, 613
F.3d 1174, 1176 (8th Cir. 2010).

       The evidence presented at trial supports the jury’s finding of a single
conspiracy. Sayonkon played a key role in the conspiracy, serving as both a check
printer and a recruiter. Sayonkon brought Samaan into the fold, recruiting him while

                                         -4-
he was still incarcerated. Samaan quickly became an active member in the
conspiracy: jailhouse telephone calls reveal that he encouraged Sayonkon to send
counterfeit checks to Samaan’s relatives in Jordan, where Samaan believed his
contacts would cash them and send back the resulting gains.

       While still in jail, Samaan also gained the confidence of another inmate, K.F.
Samaan acquired legitimate account information for K.F.’s former employer, Visi,
Inc., and for K.F.’s 401(k) account at BNY Mellon Asset Servicing. Sayonkon and
Sesay used K.F.’s information to produce several counterfeit checks that drew on
these accounts. Data gathered from Sesay’s VersaCheck program included account
information for Visi, Inc. Sesay himself signed and deposited a check allegedly from
Visi, Inc. in April 2012. During April and May 2012, Samaan deposited fraudulent
checks linked back to Sesay’s computer and was arrested in possession of more such
checks.

       This evidence is sufficient to show that Samaan, Sayonkon, and Sesay were
participants in one check-writing fraud scheme. A reasonable jury could have
concluded that all three defendants shared a common purpose and acted in
furtherance of a single conspiracy. See Longs, 613 F.3d at 1176.

      Samaan maintains that his criminal endeavor was separate from the larger
conspiracy involving Sesay. He notes that the government presented no evidence that
the two defendants knew each other. He highlights Sesay’s testimony that he did not
remember anything about the Visi, Inc. account and did not recall working with
Samaan as part of the check-fraud scheme. This argument is unavailing, for there is
no requirement that all conspirators know each other. United States v. Watts, 950
F.2d 508, 512 (8th Cir. 1991). “A single conspiracy may exist even if the participants
and their activities change over time, and even if many participants are unaware of,
or uninvolved in, some of the transactions.” Longs, 613 F.3d at 1176 (internal
quotation omitted).

                                         -5-
       Sayonkon also argues that the district court erred in denying his request for a
jury instruction on multiple conspiracies. He contends that without the instruction,
the jury may have improperly transferred guilt from one conspiracy to another.
Sayonkon cites a question from the jury during deliberations about whether it was
sufficient to find that the two defendants conspired with each other, rather than with
the members of the larger conspiracy. He maintains that this inquiry demonstrates the
jury’s confusion and shows that he was prejudiced by the absence of an instruction
on multiple conspiracies.

       Even assuming for the sake of analysis that the evidence supported giving a
multiple-conspiracies instruction, see United States v. Nevils, 897 F.2d 300, 307 (8th
Cir. 1990), Sayonkon cannot demonstrate prejudice from the court’s unwillingness
to include it. Sayonkon was free to argue his multiple-conspiracies theory to the jury,
and the court instructed the jury that it could convict him only if he was a member of
the single conspiracy charged in the indictment. When the jury asked a question
about conspiracy law, the court properly referred the jury back to the indictment and
the instructions. “If the evidence supports a single conspiracy, the failure to give a
multiple conspiracies instruction is not reversible error.” United States v. Roach, 164
F.3d 403, 412 (8th Cir. 1998). As noted, the government presented sufficient
evidence of a single conspiracy involving Sesay, Sayonkon, and Samaan, so there was
no reversible error in the instructions.

                                         III.

       Samaan raises two more challenges to his conviction. He first claims that the
district court erred in denying his motion to suppress evidence gathered when police
examined the guest registry at a motel where he was staying. While Samaan was
registered at a motel in August 2012, officers inspected the registry and used the
information to check for outstanding warrants. While performing this work, officers
determined that Samaan had presented a fraudulent identification card to the motel.

                                         -6-
       The next day, officers followed Samaan as he left the motel. When Samaan
stopped in a parking lot, officers approached him concerning a traffic violation. After
he failed to provide a legitimate form of identification, police arrested him. Officers
seized a fake Minnesota identification card from Samaan’s wallet and other
documents from his vehicle. These materials included a resident alien card for a
person with initials D.S.A., a social security card for D.S.A., and several counterfeit
checks. Police then executed a search warrant at Samaan’s motel room and seized a
computer and a printer.

        Samaan argues that the search of the motel’s guest registry violated his Fourth
Amendment rights, and that the evidence seized from his hotel room and during the
traffic stop must be suppressed as fruit of an unlawful search. To establish a violation
of rights under the Fourth Amendment, a person must have a “constitutionally
protected reasonable expectation of privacy” in the area searched or the items seized.
United States v. McIntyre, 646 F.3d 1107, 1111 (8th Cir. 2011) (quoting California
v. Ciraolo, 476 U.S. 207, 211 (1986)). A motel guest, for example, has a reasonable
expectation of privacy in his rented room. See United States v. Williams, 521 F.3d
902, 906 (8th Cir. 2008). Samaan argues that he also had a reasonable expectation
of privacy in his registration as a guest at the motel, and that officers violated his
Fourth Amendment rights by demanding to inspect the registry. He relies on City of
Los Angeles v. Patel, 135 S. Ct. 2443 (2015), which held that “a hotel owner must be
afforded an opportunity to have a neutral decisionmaker review an officer’s demand
to search the registry before he or she faces penalties for failing to comply.” Id. at
2453 (emphasis added and omitted).

       Samaan’s contention fails under the so-called third-party doctrine: “a person
has no legitimate expectation of privacy in information he voluntarily turns over to
third parties.” Smith v. Maryland, 442 U.S. 735, 743-44 (1979). Even where a
person discloses information to a third party “on the assumption that it will be used
only for a limited purpose,” the government typically is free to obtain that information

                                          -7-
without infringing on a legitimate expectation of privacy of the person who made the
original disclosure. See United States v. Carpenter, 138 S. Ct. 2206, 2216 (2018)
(quoting United States v. Miller, 425 U.S. 435, 443 (1976)). While this doctrine does
not extend to the novel phenomenon of cell phone location records, id. at 2217, it
encompasses checks and deposit slips retained by a bank, income tax returns provided
to an accountant, and electricity-usage statistics tracked by a utility company. See
McIntyre, 646 F.3d at 1111 (collecting cases). We conclude that Samaan likewise
had no legitimate expectation of privacy in the identification card that he provided
when registering at the motel. Patel’s ruling in favor of hotel owners does not
support Samaan’s contention. The Court did not hold that motel guests have a
privacy interest in registration records; to the contrary, the decision acknowledged
that “hotel operators remain free to consent to searches of their registries.” 135 S. Ct.
at 2454.

        Samaan next challenges the sufficiency of the evidence supporting his
conviction for aggravated identity theft under 18 U.S.C. § 1028A(a)(1). Although he
concedes that he used an identification card bearing the name of a person with the
initials D.S.A. when opening bank accounts, he claims that the government failed to
show that D.S.A. was a real person and that Samaan knowingly stole his identity.

       The evidence supports the jury’s finding. At the time of Samaan’s arrest,
police seized a fake Minnesota identification card from Samaan’s wallet and resident
alien card and social security cards for D.S.A. from Samaan’s vehicle. Although the
identification card bore Samaan’s photograph, the name matched that from D.S.A.’s
legitimate resident alien and social security cards, and the birth date varied from
D.S.A.’s by only one day. The government presented D.S.A.’s Michigan driving
records and California driver’s license to prove that the resident alien card belonged
to a real person. The resident alien card displayed a photograph of a person who was
not Samaan. And Samaan used the Minnesota identification and the social security
card to open various bank accounts. Viewing the record in the light most favorable

                                          -8-
to the verdict, a reasonable jury could find that Samaan knowingly used another
person’s identification.

       Samaan also suggests that the statute’s requirement that an offender knowingly
use “a means of identification of another person” means that the government must
prove the theft of a living person’s identity. See 18 U.S.C. § 1028A(a)(1) (emphasis
added). Samaan did not raise this point in a motion for judgment of acquittal, so we
review for plain error, United States v. Samuels, 874 F.3d 1032, 1036 (8th Cir. 2017),
and the contention is foreclosed in any event by circuit precedent. We held in United
States v. Kowal, 527 F.3d 741 (8th Cir. 2008), that “another person” includes both the
living and the deceased. Id. at 746-47. Samaan questions the continuing vitality of
Kowal after Flores-Figueroa v. United States, 556 U.S. 646 (2009), where the
Supreme Court concluded that § 1028A(a)(1) requires proof “that the defendant knew
that the means of identification at issue belonged to another person.” Id. at 657. But
Flores-Figueroa did not address liability for the theft of a decedent’s identity and
thus did not undermine Kowal’s conclusion that “person” in § 1028A(a)(1) includes
a deceased person.

                                          IV.

       All three defendants challenge their sentences. Sayonkon contends that the
district court erred in applying a two-level increase under the advisory sentencing
guidelines for his role as “an organizer, leader, manager, or supervisor” of the check-
fraud scheme. USSG § 3B1.1(c). He describes himself as “simply a participant,” and
argues that he “never controlled or directed the actions of others.” We review the
district court’s interpretation and application of the guidelines de novo and its factual
findings for clear error. United States v. Markert, 732 F.3d 920, 932 (8th Cir. 2013).

      Although mere participation in a conspiracy is not sufficient to establish a
leadership role, the two-level increase applies if a defendant was the organizer,


                                          -9-
leader, manager, or supervisor of one other participant in criminal activity that did not
involve five or more persons. USSG § 3B1.1(c) & comment. (n.2). Sayonkon
managed at least one runner as part of the charged conspiracy from October 2009
through December 2012. Sayonkon also recruited Samaan into the conspiracy, and
he coordinated sending counterfeit checks to Samaan’s contacts in Jordan while
Samaan was still in jail. The district court did not clearly err in applying an increase
under § 3B1.1. Whether Sayonkon should have received a three- or four-level
increase based on criminal activity involving five or more participants is not before
us, because the government has not cross-appealed. See Greenlaw v. United States,
554 U.S. 237 (2008); cf. USSG § 3B1.1(a), (b).

        Samaan argues that the district court erred in calculating his loss amount at
more than $250,000 and applying the corresponding twelve-level increase to his base
offense level under USSG § 2B1.1(b)(1)(G). He claims that the district court’s
finding of $395,535.87 was inflated and that the evidence supported a loss of no
greater than $95,000 and a six-level increase. See id. § 2B1.1(b)(1)(D). We review
a district court’s loss calculation for clear error. See United States v. Killen, 761 F.3d
945, 948 (8th Cir. 2014).

       Under the guidelines, the district court is to “make a reasonable estimate of the
loss” by considering “the greater of actual loss or intended loss.” USSG § 2B1.1,
comment. (n.3(A), (C)). Intended loss is “the pecuniary harm that the defendant
purposely sought to inflict,” id. § 2B1.1, comment. (n.3(A)(ii)), and it includes actual
losses suffered. See United States v. Ware, 334 F. App’x 49, 50 (8th Cir. 2009) (per
curiam); United States v. Carboni, 204 F.3d 39, 47 (2d Cir. 2000).

       The district court did not clearly err in concluding that Samaan was responsible
for a loss amount of over $250,000. In the period from May 23 to May 29, 2012,
Samaan deposited and was arrested in possession of counterfeit checks valued at
$83,670.68. Investigators seized counterfeit checks totaling at least another

                                          -10-
$236,112.12 from the vehicle that Samaan was driving at the time of his second arrest
in August 2012. This evidence totals $319,782.80 and supports the court’s finding
that Samaan was responsible for an intended loss of over $250,000.

       Sesay challenges the length of his sentence. He disputes the extent of the
district court’s downward departure under the guidelines, but alleges no
unconstitutional motive by the court, so the extent of the downward departure is
unreviewable. United States v. Sykes, 356 F.3d 863, 865 (8th Cir. 2004).

       Sesay also contends that the sentence is unreasonable under 18 U.S.C.
§ 3553(a), and we review that challenge under a deferential abuse-of-discretion
standard. Gall v. United States, 552 U.S. 38, 51 (2007). Sesay complains that the
district court gave too little weight to his difficult childhood, his significant family
responsibilities, an asserted low risk of recidivism, and the substantial assistance that
he provided to the government. The district court expressly addressed Sesay’s
familial responsibilities and provision of assistance, and presumably considered the
other proffered mitigating circumstances. But the court also weighed Sesay’s lengthy
criminal history, his failure to maintain legitimate employment, and his violation of
the terms of his supervised release. Given the deference accorded to the district court
in balancing the relevant factors, we conclude that the district court did not abuse its
discretion in imposing Sesay’s below-guidelines sentence.

                                   *       *       *

      For the foregoing reasons, the judgments of the district court are affirmed.
                      ______________________________




                                          -11-
