State v. Hebeishy
Citation522 P.3d 943, 2022 UT App 134
Date Filed2022-12-08
Docket20200463-CA
Cited0 times
StatusPublished
Full Opinion (html_with_citations)
2022 UT App 134
THE UTAH COURT OF APPEALS
STATE OF UTAH,
Appellee,
v.
SADAT AHMED HEBEISHY,
Appellant.
Opinion
No. 20200463-CA
Filed December 8, 2022
Second District Court, Ogden Department
The Honorable Ernest W. Jones
No. 161900099
Emily Adams and Benjamin Miller, Attorneys
for Appellant
Sean D. Reyes and Jeffrey D. Mann, Attorneys
for Appellee
JUSTICE JILL M. POHLMAN authored this Opinion, in which JUDGE
GREGORY K. ORME and JUSTICE DIANA HAGEN concurred. 1
POHLMAN, Justice:
¶1 Sadat Ahmed Hebeishy entered a conditional guilty plea
to one count of pattern of unlawful activity, reserving his right to
appeal the district courtâs denial of his motion to suppress
evidence obtained through two wiretaps. He now appeals,
arguing that the wiretap applications failed to meet the necessity
1. Justices Jill M. Pohlman and Diana Hagen began their work on
this case as members of the Utah Court of Appeals. They both
became members of the Utah Supreme Court thereafter and
completed their work on this case sitting by special assignment as
authorized by law. See generally Utah R. Jud. Admin. 3-108(4).
State v. Hebeishy
requirement of section 77-23a-10(1)(c) of Utahâs Interception of
Communications Act. We affirm. 2
BACKGROUND
¶2 The Titanic Crip Society (TCS) is a small criminal street
gang that has been operating in Weber County, Utah, since at least
the 1990s. In 2015, law enforcement observed an increase in the
number of crimes being committed by members of TCS and that
the gang was recruiting juveniles who were participating âin
fairly serious criminal offenses.â Within a few months, an officer
(Officer) of the Ogden Police Department who was assigned to the
FBIâs Safe Street Gang Unit Task Force began investigating TCS.
As part of his investigation, Officer reviewed police reports,
photographs, audio recordings, witness statements, and
interview notes.
¶3 Officerâs investigation revealed that TCSâs organization is
made up of âbig homies and little homies.â Big homies are the
âshot callersâ who âmanag[e] the affairs of the gangâ while taking
âa hands-off approachâ to the criminal conduct. The big homies
direct the little homies in âtheir behavior and their conduct within
the organization,â and the big homies utilize the little homies âto
recruit actively and often.â Officer identified Sadat 3 and his
brother, Tamer Hebeishy, as big homies within TCS.
2. This case is a companion case to State v. Pickett, 2022 UT App
135, and State v. Tamer Hebeishy,2022 UT App 136
, both of which also issue today. 3. Because Tamer and Sadat Hebeishy share the same last name, we refer to them by their first names, with no disrespect intended by the apparent informality. 20200463-CA 22022 UT App 134
State v. Hebeishy
The First Wiretap â Tamerâs Mobile Phone
¶4 In November 2015, Officer applied for a wiretap warrant
on Tamerâs mobile phone. In a 180-page affidavit supporting
the application, Officer identified three investigatory objectives
of the wiretap: (1) to document and confirm the identities of
TCS members, including those in positions of management;
(2) to â[d]issolve or . . . severely disruptâ TCSâs criminal
operations; and (3) to obtain âgang-specific intelligenceâ to aid
in âpreventing, managing, or suppressing future criminal
behavior(s).â In the affidavit, Officer asserted that the wiretap
was ânecessaryâ because of the difficulty in dismantling a
gang with TCSâs organizational structure. He explained: âThere
is a recurring theme which suggests TCS shot callers,
including Tamer and Sadat Hebeishy, encourage and direct the
criminal behavior of younger (often juvenile) and subordinate
members. Thus, the shot callers mitigate their own risk of
incarceration. This makes the dismantlement of the organization
a difficult task, as the gangâs leaders are free to repetitively recruit,
groom, and manipulate new and impressionable members.â
(Cleaned up.)
¶5 Officer also detailed nearly twenty years of criminal
activity documented in police records, analyzed phone recordings
from the Weber County Jail, described evidence obtained from
previously seized mobile phones belonging to other TCS
members, and discussed an interview with Tamer and Sadatâs
brother, Sharif Hebeishy. Officer further explained that
âtraditional investigatory methods have failed to realize the
dissolution of [TCS]â and that âthose traditional methods which
have not been attempted are either unpractical, too dangerous, or
unlikely to result in the procurement of evidence to prosecute
fully the participants who engage in criminal conduct on behalf
and for the benefit of [TCS].â He then detailed the ineffectiveness
of eight investigatory techniques: physical surveillance, knock
20200463-CA 3 2022 UT App 134
State v. Hebeishy
and talks, 4 undercover or covert operations, confidential
informants, trash covers, 5 controlled buys, searches and search
warrants, and pen registers. 6
¶6 The district court authorized the wiretap of Tamerâs mobile
phone on November 13, 2015. It found âprobable cause to believe
that . . . [Tamer] and othersâ had and would continue to commit
crimes, and âprobable cause to believe that particular
communications concerning [those crimes would] . . . be obtained
throughâ a wiretap of Tamerâs phone. The court also determined
that ânormal investigative procedures ha[d] been tried and
failed,â were âunlikely to succeed,â or were âtoo dangerousâ
based on âthe specified objectives of this criminal investigation.â
Thus, the court concluded that the wiretap was ânecessary to
achieve the listed objectives of this criminal investigation.â
¶7 Four days after the wiretap was approved, Tamerâs phone
was intercepted. Interception continued until the middle of
January 2016 pursuant to two orders extending the duration of the
initial wiretap.
4. Officer explained in his affidavits that a âknock and talkâ is âa
commonly used expressionâ used by law enforcement âto
describe an investigative technique in which officers make contact
with suspected criminal offenders at their place(s) of residence.â
5. According to Officer, a âtrash coverâ is âa specialized technique
utilized by law enforcementâ that âincludes the covert
procurement and examination of the garbage which is abandoned
by the owners of a private residence.â
6. A âpen registerâ is âa device that records or decodes electronic
or other impulses that identify the numbers dialed or otherwise
transmitted on the telephone line to which the device is attached.â
Utah Code Ann. § 77-23a-3(14) (LexisNexis 2017). 20200463-CA 42022 UT App 134
State v. Hebeishy
The Second Wiretap â Sadatâs Mobile Phone
¶8 In December 2015, Officer applied for a wiretap warrant on
Sadatâs mobile phone. Officerâs supporting affidavit was
substantially similar to his affidavit in support of the wiretap on
Tamerâs mobile phone, but there were a few differences. In
addition to identifying the same overall investigatory objectives,
Officer explained that an additional objective of the second
wiretap was to identify Sadatâs âspecific roleâ within TCS and to
determine âhis individual rights and/or responsibilities . . . as one
of the gangâs primary managers.â Officer also explained that law
enforcement had recently utilized other traditional techniques to
investigate Sadat, including installing an electronic monitoring
device on his vehicle, conducting physical surveillance at his
residence, and collecting trash from a garbage can in front of that
residence. Those techniques, however, failed to yield the evidence
needed to achieve law enforcementâs goal of acquiring evidence
of Sadatâs âposition and influenceâ within TCS. Finally, the
affidavit contained a thirteen-page section on necessity similar to
that included in Officerâs first affidavit, detailing other
investigatory techniques that had been tried and failed, were not
likely to succeed, or were too dangerous. The district court
authorized the wiretap. 7
¶9 Sadatâs mobile phone was intercepted beginning in
December 2015 and continuing through January 2016.
The Motion to Suppress
¶10 Several months after collecting evidence through the
wiretaps, the State brought charges against Sadat and five other
7. The district courtâs order authorizing the wiretap on Sadatâs
mobile phone is not in the record, but the parties agree that the
wiretap was authorized and neither contends that the orderâs
absence from the record inhibits our ability to resolve this appeal.
20200463-CA 5 2022 UT App 134
State v. Hebeishy
TCS co-defendants (including Tamer). Sadat was charged with
one count of pattern of unlawful activity with gang enhancement
and one count of possession of a dangerous weapon by a
restricted person. Prior to trial, Sadat filed a motion to suppress
the evidence obtained from the wiretaps. He argued, in part, that
Officerâs wiretap applications failed to show necessity because
Officer did not personally âattempt[]â or âseriously consider[]â
several traditional investigatory techniques before seeking the
wiretaps and because his affidavits were based mostly on
âgeneralities and conclusory statementsâ about the
ineffectiveness of those techniques.
¶11 After briefing and oral argument, the motion was denied.
The district court rejected Sadatâs argument that the affidavits
were conclusory and lacked supporting facts, and it found that
Officer âdescribed law enforcement techniques that had been
tried and failed, were not likely to succeed, or [were] too
dangerous to try.â Specifically, the court found that Officer
âexplained with factual information how surveillance, jail phone
calls, witness interviews, search warrants, trash runs, confidential
informants or undercover informants, and pen register-type
information had been obtained and failed to fully identify and
stop the leaders and members of TCS from the commission of
criminal activityâ and why those investigative techniques âwere
not likely to succeed if tried againâ or were âtoo dangerous to
try.â And based on those findings, the court determined that the
necessity requirement of Utahâs Interception of Communications
Act had been satisfied and that Sadat had failed to demonstrate
that the evidence obtained from the wiretaps should be
suppressed.
¶12 Sadat subsequently entered a conditional guilty plea to one
count of pattern of unlawful activity, reserving his right to appeal
the district courtâs ruling on his motion to suppress. Sadat now
appeals.
20200463-CA 6 2022 UT App 134
State v. Hebeishy
ISSUE AND STANDARD OF REVIEW
¶13 Sadat contends that the district court erred in denying his
motion to suppress evidence obtained through the two wiretaps.
More specifically, Sadat contends that the court incorrectly
determined that law enforcement had satisfied the necessity
requirement of Utahâs Interception of Communications Act.
¶14 The parties disagree over what standard of review applies
to this question. 8 Relying on the standard traditionally applied to
the review of denials of motions to suppress based on violations
of the Fourth Amendment, Sadat argues that we should review
this issue as a mixed question of law and fact, reviewing the
district courtâs factual findings for clear error but affording no
deference to the district courtâs necessity determination. The State,
in contrast, invites us to review the district courtâs necessity
determination for an abuse of discretion, contending that we
should adopt the standard applied by the majority of federal
appeals courts in reviewing necessity determinations under the
federal wiretap statute. See United States v. Ramirez-Encarnacion,
291 F.3d 1219, 1222 n.1 (10th Cir. 2002) (collecting cases). We need
not resolve this dispute because, even reviewing the district
courtâs necessity determination for correctness as urged by Sadat,
we discern no error by the district court.
ANALYSIS
¶15 The district court denied Sadatâs motion to suppress,
concluding that Officerâs applications demonstrated the necessity
required for the authorization of wiretaps of Tamerâs and Sadatâs
8. Utah appellate courts have yet to address the necessity
requirement in Utahâs Interception of Communications Act and
thus have had no occasion to articulate the appropriate standard
of review.
20200463-CA 7 2022 UT App 134
State v. Hebeishy
mobile phones. Sadat challenges the courtâs conclusion, arguing
that Officer failed to show that other more traditional
investigative procedures had been tried and failed or that other
investigative procedures reasonably appeared unlikely to succeed
or were too dangerous to be tried. We begin with a general
discussion of Utahâs Interception of Communications Act (the
Act), which to date has received limited attention from Utah
appellate courts. See generally Utah Code Ann. §§ 77-23a-1 to -16
(LexisNexis 2017 & Supp. 2022). We then address Sadatâs
challenge to the district courtâs determination that Officer had
demonstrated necessity under the Act.
I
¶16 The Act generally prohibits the nonconsensual interception
and disclosure of wire, electronic, or oral communications. See
generally id.§ 77-23a-2(4) (2017). 9 The Act, however, allows law enforcement in certain criminal investigations to seek court authorization to intercept and use such communications. See id. §§ 77-23a-2(3)â(4), -8, -10. In its findings that precede the substantive text of the Act, the Utah Legislature explains that because â[o]rganized criminals make extensive use of wire and oral communications in their criminal activities,â â[t]he interception of such communications to obtain evidence of the commission of crimes or to prevent their commission is an indispensable aid to law enforcement and the administration of justice.â Id. § 77-23a-2(3). Yet, â[t]o safeguard the privacy of innocent persons,â the legislature has approved the nonconsensual interception of wire or oral communications âonly when authorized by a court of competent jurisdictionâ pursuant to the requirements of the Act. See id. § 77-23a-2(4). If a defendant contends that a communication was âunlawfully intercepted,â the 9. Because there have been no substantive changes to the relevant statutory provisions, we cite the current version of the Utah Code for the readerâs convenience. 20200463-CA 82022 UT App 134
State v. Hebeishy
defendant may move to suppress the contents of the
communication on that basis. 10 Id.§ 77-23a-10(11)(a)(i). ¶17 One of the Actâs requirements is referred to by the parties as the necessity requirement. It requires that an application for a wiretap order âinclude . . . a full and complete statement as to whether other investigative procedures have been tried and failed or why they reasonably appear to be either unlikely to succeed if tried or too dangerous.â Id. § 77-23a-10(1)(c). And the judge who issues a wiretap order must find, based on the facts submitted by the applicant, that ânormal investigative procedures have been tried and have failed or reasonably appear to be either unlikely to succeed if tried or too dangerous.â 11 Id. § 77-23a-10(2)(c). Because the necessity requirement is framed in the disjunctive, law enforcement may establish necessity by showing any one of the 10. The Act allows any âaggrieved person in any trial, hearing, or proceeding in or before any courtâ to move to suppress an unlawfully intercepted communication. SeeUtah Code Ann. § 77
- 23a-10(11)(a) (LexisNexis 2017). An âaggrieved personâ is defined in the Act as âa person who was a party to any intercepted wire, electronic, or oral communication, or a person against whom the interception was directed.âId.
§ 77-23a-3(1). The State does not contest Sadatâs standing to challenge the wiretap on Tamerâs mobile phone. Thus, we assume that Sadat is an âaggrieved personâ under the Act for the purpose of both wiretaps. 11. In addition to the necessity requirement being satisfied, a court must also determine that there is probable cause to believe that (1) âan individual is committing, has committed, or is about to commit a particular offense,â (2) âcommunications concerning that offense will be obtained through the interception,â and (3) the place where the communications are to be intercepted is leased by, listed in the name of, or commonly used by the targeted individual. Id. § 77-23a-10(2)(a), (b), (d). Sadat does not contend that these other requirements were unmet. 20200463-CA 92022 UT App 134
State v. Hebeishy
three. See State v. Martinez, 896 P.2d 38, 40(Utah Ct. App. 1995) (holding that the âdisjunctive âorâ . . . delineates alternative waysâ to meet a statutory requirement). ¶18 Finally, as noted above, the issue of whether a wiretap application satisfies the necessity requirement of section 77-23a- 10(1)(c) of the Act appears to be one of first impression in Utah appellate courts. However, Utahâs necessity requirement is âsubstantially identicalâ to the necessity requirement in the federal wiretap statute, see United States v. Quintana,70 F.3d 1167, 1169
(10th Cir. 1995) (comparingUtah Code Ann. § 77
-23a-10(1)(c) with18 U.S.C. § 2518
(1)(c)), 12 and the federal necessity requirement has been extensively analyzed by the federal courts. Accordingly, the parties have relied on federal law in support of their arguments, and we will refer to federal law to the extent it aids in our review of the district courtâs application of the Act. See State v. Bradshaw,2006 UT 87, ¶ 11
,152 P.3d 288
(observing that
federal law may be âinstructive and aid us in our efforts to
interpret the Utah statuteâ where the Utah statute is modeled after
the federal statute).
II
¶19 Sadat contends that the district court erred in determining
that Officerâs applications for authorization to wiretap Tamerâs
12. An application to intercept wire, oral, or electronic
communications under the federal wiretap statute requires âa full
and complete statement as to whether or not other investigative
procedures have been tried and failed or why they reasonably
appear to be unlikely to succeed if tried or to be too dangerous.â
18 U.S.C. § 2518(1)(c). Before issuing the wiretap order, a judge must find, based on the facts submitted, that ânormal investigative procedures have been tried and have failed or reasonably appear to be unlikely to succeed if tried or to be too dangerous.âId.
§ 2518(3)(c). 20200463-CA 102022 UT App 134
State v. Hebeishy
and Sadatâs mobile phones satisfied the Actâs necessity
requirement. In particular, Sadat contends that Officerâs affidavits
demonstrated other investigative techniques had proven
successful in the past, and that the district court erred in finding
Officer had adequately explained why those same techniques
were inadequate (or too dangerous) to achieve Officerâs stated
investigatory goals. We disagree with Sadat.
¶20 To satisfy the Actâs necessity requirement, Officer was
required to include with his wiretap applications âa full and
complete statement as to whether other investigative procedures
have been tried and failed or why they reasonably appear to be
either unlikely to succeed if tried or too dangerous.â Utah Code
Ann. § 77-23a-10(1)(c) (LexisNexis 2017) (emphasis added). The district court correctly determined that Officerâs applications met this statutory standard. Officer chronicled other investigative procedures that had been used in the past as part of law enforcementâs ongoing efforts to investigate TCSâs criminal activity and explained why those same procedures reasonably appeared to be unlikely to succeed in achieving Officerâs investigatory goals. ¶21 To put his claims of necessity in context, Officer first identified the three goals of his investigation: (1) to document and confirm the identities of TCS members, including those in management positions; (2) to dissolve or at least severely disrupt TCSâs criminal operations; and (3) to obtain âgang-specific intelligenceâ to aid in preventing or suppressing future criminal behavior. The affidavit for the wiretap of Sadatâs phone included the additional goal of discovering details about Sadatâs âspecific roleâ in the gang. Officer explained that âshot callersâ like Tamer and Sadat evade prosecution by hiding behind subordinate gang members whom they direct to commit crimes on behalf of the criminal enterprise. Thus, the affidavits made clear that Officer hoped to dismantle TCS by developing prosecutable evidence against its shot callers. 20200463-CA 112022 UT App 134
State v. Hebeishy
¶22 As the district court determined, these are investigatory
goals that federal courts have often found warranted the use of
wiretaps because the goals were ânot likely to be met by
traditional law enforcement techniques.â Indeed, ânormal
investigative techniques . . . are sometimes insufficient to
determine the scope of the conspiracy or the nature of the
conspiracy leaderâs on-going criminal activity.â United States v.
Bailey, 840 F.3d 99, 116(3d Cir. 2016) (cleaned up); see also United States v. Foy,641 F.3d 455
, 464â65 (10th Cir. 2011) (â[W]e have held on numerous occasions that the law enforcement goal of uncovering the size and scope of the conspiracy may justify the authorization of wiretaps.â); United States v. Villarman-Oviedo,325 F.3d 1, 10
(1st Cir. 2003) (approving wiretap authorization when investigative goals involved âuncovering the full scope of the potential crimes under investigation, as well as the identities of those responsible for the unlawful manufacture, possession, sale and distribution of narcotics in Puerto Ricoâ and âobtaining evidence of the totality of offenses in which the targets of the investigation were involvedâ); United States v. Johnson,645 F.2d 865, 867
(10th Cir. 1981) (affirming the district courtâs necessity determination and stating that â[t]he FBI was properly concerned . . . with identifying all of the members of the conspiracy, as well as the precise nature and scope of the illegal activityâ). Further, the legislature recognized the value of wiretaps in disrupting organized crime when it deemed wiretaps to be an âindispensable aid to law enforcement and the administration of justiceâ given the extensive use of wire and oral communications made by â[o]rganized criminals.â SeeUtah Code Ann. § 77
-23a-2(3) (LexisNexis 2017). ¶23 Next, Officer detailed the traditional techniques that law enforcement had used for nearly two decades to investigate TCSâs criminal activities, which included shootings, assaults, other violent crimes, and drug distribution. For example, Officer described how law enforcement had previously used knock and talks, confidential informants, trash covers, controlled buys, and 20200463-CA 122022 UT App 134
State v. Hebeishy
searches in its efforts to uncover evidence of TCSâs criminal
activities. In chronicling this lengthy history, Officer described
instances where law enforcement was able to gather intelligence,
seize evidence, and, in some cases, make arrests that led to the
prosecution of some TCS members. But in most instances, law
enforcementâs success was limited to the seizure of small amounts
of drugs and paraphernalia with scant information discovered
about the gang. Through its efforts, law enforcement did not
â[d]issolveâ or âseverely disruptâ TCSâs criminal operations
because it was unable to hold shot callers like Sadat accountable
for the serious crimes committed at their direction.
¶24 Further, Officer explained in his second affidavit that
before obtaining the wiretap on Sadatâs phone, law enforcement
again tried other investigative techniques like installing âan
electronic monitoring device onto a vehicle registered and used
by Sadat,â âconducting physical surveillance at Sadatâs
residence,â and completing a trash cover operation where officers
âcollected trash from a garbage can placed on the street in front of
[Sadatâs] residence.â Officer reported that these efforts âyielded
nothing of valueâ in his effort to prosecute Sadat for his part in
directing TCSâs criminal activities because, as a shot caller, Sadat
âavoids direct participationâ in those activities.
¶25 Finally, Officer tied the stated goals and the investigative
history together by explaining why the traditional investigative
techniques, if employed again, appeared unlikely to produce
different results or evidence that would allow law enforcement to
achieve its goal of dissolving or severely disrupting TCSâs
criminal operations through prosecution of its shot callers.
Specifically, Officer detailed why âother investigative
proceduresâ used by law enforcement âreasonably appear[ed] to
be either unlikely to succeed if tried or too dangerousâ in
achieving that goal. See id.§ 77-23a-10(1)(c). 20200463-CA 132022 UT App 134
State v. Hebeishy
¶26 Surveillance. Officer explained that physical surveillance
reasonably appeared unlikely to succeed in achieving the
investigatory goals because (1) the shot callers âdistance[d]â
themselves from the criminal activity, meaning that surveillance
would not allow law enforcement to witness them committing
crimes and (2) surveillance would not capture the
communications between the shot callers and their subordinates
so as to establish their âculpability for the crimes committed by
others.â Thus, surveillance created âlittle chanceâ of disrupting
the gangâs criminal operations through prosecution of its
leadership.
¶27 Knock and talks. Officer described how law enforcement
had attempted to interview Tamer and Sadat and âmany of [their]
gang associatesâ with little success because of a general
unwillingness âto entertain any form of consensual interaction
with police.â And although Officer agreed that knock and talks
could result in the discovery of evidence of some criminal activity,
he opined based on prior experiences that those efforts reasonably
appeared to be unlikely to produce the kind of information that
would establish Sadatâs position in the gang and evidence of the
direction he gave to junior gang members. After all, TCS members
were encouraged by those in positions of authority either to refuse
to speak to police or to deny involvement in criminal activity.
¶28 Undercover operations and confidential informants. Officer
explained that engaging in undercover operations or employing
confidential informants to try to disrupt the TCS organization was
impractical and unlikely to succeed. Among other things, Officer
described the relatively small size of the TCS gang and explained
that because of that size, it was âsimply not practicalâ to introduce
an undercover operative. Officer also explained that TCSâs
preference for juvenile inductees, who are recruited by invitation
only, would make it particularly difficult to engage in an
undercover operation. Officer also discounted the use of
confidential informants given the tight-knit nature of the gang
20200463-CA 14 2022 UT App 134
State v. Hebeishy
and the lack of a âsuitable candidate.â Further, âinformation
pertaining to the gangâs day-to-day operationsââthat is, the
information law enforcement needed to disrupt the
organizationâwas âwell protected.â
¶29 Trash covers. Officer described how trash covers had been
used in the past but explained that the evidence gathered was
âinadequate in terms of preventing the perpetual criminal actions
taken by members of . . . TCS.â Officer also revealed that Tamer
was âaware of the technique,â making it even less likely to lead to
incriminating evidence.
¶30 Controlled buys. Officer explained that law enforcement
had, with some success, used controlled buys with members of
TCS to obtain evidence of drug offenses. But despite that âlimited
and localized successâ at bringing drug charges, controlled buys
did not reasonably appear likely to aid in the investigatory
goalsâspecifically, the dismantling of TCS through the
prosecution of the shot callers. Further, there was no intelligence
that TCS was currently distributing drugs since TCSâs primary
distributor was incarcerated.
¶31 Searches. Officer explained that prior searches, while
occasionally resulting in drug charges, had proven ineffective in
dissolving the organization. Despite occasional prosecutions for
drug-related offenses, the operation continued, and searches were
unlikely to produce evidence of TCSâs âstructure and/or criminal
directive model of operation.â
¶32 Pen registers. Finally, Officer explained that the use of pen
registers would be âunlikely to provide any additional
informationâ because Officer already had similar data from jail
phone records, from the extraction of digital data from mobile
phones of subordinate members, and from âcall detail recordsâ of
Tamerâs mobile phone number. And Officer explained that pen
registers were not âa means by which essential information would
20200463-CA 15 2022 UT App 134
State v. Hebeishy
be obtained.â See Utah Code Ann. § 77-23a-3(14) (LexisNexis 2017). ¶33 In sum, Officerâs fact-specific and detailed explanations show that law enforcementâs investigative goal to âdiscover[] and prosecute the entire leadership and membership of [TCS] and discover the conspiracy between its members [was] a legitimate investigative goal that was not likely to be met by traditional law enforcement techniques.â Although traditional investigative techniques may have been sufficient to bring charges against some TCS members for some criminal activity, Officer demonstrated necessity for the wiretaps of Tamerâs and Sadatâs mobile phones given that those traditional techniques were not reasonably likely to aid in the investigative goal of disrupting TCS through the prosecution of its shot callers. See, e.g., United States v. Encarnacion,26 F.4th 490, 501
(1st Cir. 2022) (concluding that the government had met the federal wiretap necessity requirement where it had âplausibly explained why traditional means of investigation, including those it had already attempted, were insufficient to achieve the stated goals of the investigationâ); United States v. Braddy,722 F. Appâx 231
, 235 (3d Cir. 2017)
(holding that âwiretaps were necessary to uncover the full scope
of the conspiracyâ despite the fact that âtraditional investigative
techniques may be sufficient to implicate some members of a
conspiracyâ). Thus, we conclude that the district court correctly
determined that Officer had complied with the necessity
requirement of section 77-23a-10(1)(c) of the Act and did not err
in denying the motion to suppress.
CONCLUSION
¶34 In seeking authorization for wiretaps of the mobile phones
of Tamer and Sadat Hebeishy, Officer demonstrated that ânormal
investigative procedures have been tried and have failed or
reasonably appear to be either unlikely to succeed if tried or too
20200463-CA 16 2022 UT App 134
State v. Hebeishy
dangerous.â See Utah Code Ann. § 77-23a-10(2)(c) (LexisNexis 2017). Specifically, Officer showed that normal investigative procedures would have been insufficient to achieve the investigatory goal of severely disrupting TCSâs organization by prosecuting its shot callers. Thus, the district court did not err in denying the motion to suppress based on its conclusion that Officer satisfied the necessity requirement of section 77-23a- 10(1)(c) of the Act. We affirm. 20200463-CA 172022 UT App 134