DeWitt Insurance, Inc. v. Horton et al
Filing
18
MEMORANDUM AND ORDER: IT IS HEREBY ORDERED that Defendants Gregory R. Horton and Sarah A. King's Motion to Dismiss Plaintiff's Complaint for Failure to State a Claim Upon Which Relief Can Be Granted And To Decline Supplemental Jurisdicti on of State Claims 7 is DENIED as moot. IT IS FURTHER ORDERED that Defendants Gregory R. Horton and Sarah A. King's Motion to Dismiss Plaintiff's Amended Complaint for Failure to State a Claim Upon Which Relief Can Be Granted And To Dec line Supplemental Jurisdiction of State Claims 13 is GRANTED, in part, and DENIED, in part. The Court DISMISSES Counts II and IV for failure to state a claim pursuant to Fed.R.Civ.P. 12(b)(6). The Court DISMISSES Counts I, III, and V for lack of subject matter jurisdiction pursuant to Fed.R.Civ.P. 12(b)(1).. Signed by District Judge John A. Ross on 5/28/14. (LGK)
UNITED STATES DISTRICT COURT
EASTERN DISTRICT OF MISSOURI
EASTERN DIVISION
DEWITT INSURANCE, INC.,
Plaintiff,
v.
GREGORY R. HORTON, et al.,
Defendants.
)
)
)
)
)
)
)
)
)
)
)
No. 4:13-CV-2585 JAR
MEMORANDUM AND ORDER
This matter is before the court on Defendants Gregory R. Horton and Sarah A. King’s
Motion to Dismiss Plaintiff’s Amended Complaint for Failure to State a Claim Upon Which
Relief Can Be Granted And To Decline Supplemental Jurisdiction of State Claims (ECF No.
13).1
On February 26, 2014, Plaintiff filed a five-count Verified Amended Complaint for
Damages (“Amended Complaint”). (ECF No. 12). Defendants argue that Plaintiff fails to state a
claim as to the federal causes of action under the Computer Fraud and Abuse Act (“CFAA”), 18
U.S.C. §§1030, et seq., and the Racketeer Influenced and Corrupt Organizations Act (“RICO”),
18 U.S.C. §§1961, et seq.
In addition, Defendants argue that the state law fraud claims
(fraudulent concealment against Horton, fraudulent concealment against King) must be
dismissed because the claims lack specificity required by Fed.R.Civ.P. 9(b) and fail to properly
1
Defendants previously filed a Motion to Dismiss Plaintiff’s Complaint (ECF No. 7), but
Plaintiff filed an Amended Complaint (ECF No. 12), which is now the operative complaint.
Accordingly, the Court denies Defendants Gregory R. Horton and Sarah A. King’s Motion to
Dismiss Plaintiff’s Complaint for Failure to State a Claim Upon Which Relief Can Be Granted
And To Decline Supplemental Jurisdiction of State Claims (ECF No. 7) as moot.
allege causation or damages. Finally, Defendants assert that the Court should decline to exercise
supplemental jurisdiction as to the state law claims.
BACKGROUND2
Dewitt Insurance, Inc. (“Dewitt”) is an insurance management company.
(Verified
Amended Complaint for Damages (“Amended Complaint”), ECF No. 12, ¶8). Horton worked
for Dewitt as an independent agent and as a “producer” from March 20, 1998 through June 30,
2011. (Id., ¶¶9, 10).3 During some periods, Horton worked for DeWitt as a sole proprietor and,
during other periods, he worked through Zigzak, Inc. (“Zigzak”) and Cindeb, Inc. (“Cindeb”).4
(Id., ¶10). Horton led Dewitt to believe that he owned both Zigzak and Cindeb. (Id.)
In 2000, Horton was working as a sole proprietor and he told DeWitt’s John DePond that
he was considering forming a company for his insurance business. (Id., ¶11). DePond told
Horton that he could incorporate his business subject to some conditions.
(Id., ¶12).
Specifically, DePond told Horton that he had to notify DeWitt prior to transferring any
ownership interest in his book of business to anyone else. (Id.)
Around the time of this conversation with DePond, on April 10, 2000, Horton formed
Zigzak. (Id., ¶13).5 Despite the admonition to the contrary, Horton made his daughter, Sarah
King, the sole shareholder of Zigzak. (Id., ¶15). King was only 17 years old when Zigzak was
2
When ruling on a Federal Rule of Civil Procedure 12(b)(6) motion to dismiss for failure to state
a claim, the Court must take as true the alleged facts and determine whether they are sufficient to
raise more than a speculative right to relief. Bell Atl. Corp. v. Twombly, 550 U.S. 544, 555
(2007).
3
Neither party defines what a “producer” is in this context.
None of the claims in the Amended Complaint relate to Cindeb.
5
DeWitt alleges that Horton chose to make his daughter the owner of Zigzak so that if Horton
and his wife, Debora Horton, divorced then his wife would not be eligible to receive the assets of
Zigzak. (Amended Complaint, ¶12).
4
-2-
formed. (Id., ¶16).
King has at all times had access to all of the information of Zigzak and
actively participated in Zigzak’s activities and business decisions. (Id., ¶¶17-18).
DeWitt alleges that Horton and King actively concealed from DeWitt the fact that King
was the owner of Zigzak and was actively involved in the management of Zigzak. (Id., ¶21).
DeWitt first learned that King was the owner of Zigzak in December 2013. (Id., ¶22).
DeWitt claims that it would not have agreed to do business with Zigzak if DeWitt had known
that King owned and controlled Zigzak. (Id., ¶25). Or, if DeWitt had known that King owned
Zigzak, DeWitt would have paid Zigzak at most 60% sales commissions, instead of the 80%
sales commissions that it paid. (Id.). DeWitt claims that Horton and King’s concealment of
King’s ownership interest and control of Zigzak caused DeWitt to defraud it into paying Zigzak
at least 33.33% more commissions than it should have received, based upon King’s ownership
and control. (Id., ¶29).
In its Amended Complaint, DeWitt alleged the following causes of action: Fraudulent
Concealment against Defendant Horton (Count I), Violation of the Computer Fraud and Abuse
Act, 18 U.S.C. §1030, et seq. against Defendant Horton (Count II), Fraudulent Concealment
against Defendant King (Count III), Violations of the Racketeer Influenced and Corrupt
Organizations Act, 18 U.S.C. §1961, et seq. against Defendants Horton and King (Count IV),
and Civil Conspiracy against Defendants Horton and King (Count V),
STANDARD FOR MOTION TO DISMISS
In ruling on a motion to dismiss, the Court must view the allegations in the Complaint
liberally in the light most favorable to Plaintiff. Eckert v. Titan Tire Corp., 514 F.3d 801, 806
(8th Cir. 2008) (citing Luney v. SGS Auto Servs., 432 F.3d 866, 867 (8th Cir. 2005)).
Additionally, the Court “must accept the allegations contained in the complaint as true and draw
-3-
all reasonable inferences in favor of the nonmoving party.” Coons v. Mineta, 410 F.3d 1036,
1039 (8th Cir. 2005) (citation omitted). To survive a motion to dismiss, a complaint must
contain “enough facts to state a claim to relief that is plausible on its face.” Bell Atl. Corp. v.
Twombly, 550 U.S. 544, 570 (2007) (abrogating the “no set of facts” standard for Fed. R. Civ. P.
12(b)(6) found in Conley v. Gibson, 355 U.S. 41, 45–46 (1957)). While a complaint attacked by
a Rule 12(b)(6) motion to dismiss does not need detailed factual allegations, a plaintiff’s
obligation to provide the grounds of his entitlement to relief “requires more than labels and
conclusions, and a formulaic recitation of the elements of a cause of action will not do.”
Twombly, 550 U.S. at 555; Huang v. Gateway Hotel Holdings, 520 F. Supp. 2d 1137, 1140
(E.D. Mo. 2007).
DISCUSSION
I.
CFAA in Count II
In Count II, Plaintiff attempts to allege a violation of the CFAA, 18 U.S.C. §1030(a)(4),6
which provides:
Whoever knowingly and with intent to defraud, accesses a protected computer
without authorization, or exceeds authorized access, and by means of such
conduct furthers the intended fraud and obtains anything of value, unless the
object of the fraud and the thing obtained consists only of the use of the computer
and the value of such use is not more than $5,000 in any 1-year period shall be
punished as provided in subsection (c) of this section.
Defendants contend that Count II under the CFAA fails to state a claim. First Defendants
argue that Plaintiff does not allege any of the essential elements of a CFAA claim. Defendants
argue that Plaintiff, for example, does not allege: that its computer system was hacked, that
6
In its Amended Complaint, Plaintiff did not identify the specific the CFAA provision under
which it was seeking relief. (ECF No. 12, ¶¶44-50). However, Plaintiff identified 18 U.S.C.
§1030(a)(4) in its Response to Defendants’ Motion to Dismiss. (ECF No. 15).
-4-
Horton did not have authorization to access information, that information was deleted or
destroyed, that there was any service interruption, or that a computer was taken and not returned.
(ECF No. 14 at 6). In addition, Defendants maintain that Plaintiff fails to allege that its claimed
damages arose from any of the above-discussed the CFAA violations. (Id.) Defendants state
that Plaintiff has not identified how any damage was done to it through Horton’s alleged use of
Plaintiff’s computer systems. (Id.) Defendants note that Plaintiff alleges that Horton used
Plaintiff’s system to create loan applications, insurance applications, and tax returns containing
false and deceptive information, but Defendants maintain that Plaintiff has not identified what
information was false or deceptive or how the alleged acts are the cause of Plaintiff’s damages.
(Id.)
Plaintiff asserts that it has alleged all of the elements of a CFAA action under
§1030(a)(4). Plaintiff states that it alleged that Horton “intentionally” and “knowingly,” and
“with intention of defrauding DeWitt Insurance,” “exceeded his authorization to access DeWitt
Insurance’s protected computers,” and as a result “thereby obtain[ed] inflated commissions from
DeWitt Insurance in an amount at least 33.33% more than Zigzak, Inc. was entitled to.” (ECF
No. 15 at 3 (citing Amended Complaint, ¶¶8-35, 46, 48, 49)). In support of its damages
allegation, Plaintiff notes that it alleged “Horton’s unauthorized access proximately caused
DeWitt Insurance loss in excess of $5,000 during a one-year period. Specifically, DeWitt
Insurance suffered loss in the amount of 20% of all the commissions DeWitt Insurance paid to
Zigzak, Inc.” (ECF No. 15 at 3 (citing Amended Complaint, ¶50)). Plaintiff expansively claims
that this allegation qualified as a “loss” under the CFAA because a loss is defined only as “any
reasonable cost to any victim.” Plaintiff claims that the descriptions of “loss” in §1030(e)(11)
after the word “including” are only “examples.” (ECF No. 15 at 4); see 18 U.S.C. §1030(e)(11).
-5-
“The CFAA criminalizes various fraudulent or damaging activities related to the use of
computers.” Fiber Sys. Int’l v. Roehrs, 470 F.3d 1150, 1156 (5th Cir. 2006). A claim “alleging
a violation of Section 1030(a)(4) requires a showing that the defendant: (1) accessed a protected
computer, (2) without authorization or exceeding such authorization that was granted, (3)
knowingly and with intent to defraud, and thereby (4) furthered the intended fraud and obtained
anything or value, causing (5) a loss to one or more persons during any one-year period
aggregating at least $5,000 in value.” Absolute Energy Solutions, LLC v. Trosclair, CIV.A. H13-3358, 2014 WL 360503, at *2 (S.D. Tex. Feb. 3, 2014)(internal quotations and citations
omitted). The CFAA recognizes “private causes of action for individuals damaged by computer
fraud: ‘Any person who suffers damage or loss by reason of a violation of this section may
maintain a civil action against the violator to obtain compensatory damages and injunctive relief
or other equitable relief.’” In re AOL, Inc. Version 5.0 Software Litig., 168 F. Supp. 2d 1359,
1368 (S.D. Fla. 2001) (quoting 18 U.S.C. ' 1030(g)). The CFAA defines “loss” as “any
reasonable cost to any victim, including the cost of responding to an offense, conducting a
damage assessment, and restoring the data, program, system, or information to its condition prior
to the offense, and any revenue lost, cost incurred, or other consequential damages incurred
because of interruption of service.” 18 U.S.C. §1030(e)(11).
The Court finds that Plaintiff’s Amended Complaint fails to allege a “loss” as defined
under the CFAA. “The weight of relevant authority restricts the CFAA ‘loss’ requirement to
actual computer impairment.” Harley Auto. Grp., Inc. v. AP Supply, Inc., CIV. 12-1110
DWF/LIB, 2013 WL 6801221, at *6 (D. Minn. Dec. 23, 2013)(citing ReMedPar, Inc. v. AllParts
Med., LLC, 683 F.Supp.2d 605, 614–15 (M.D. Tenn. 2010) (“investigation” of alleged wrongful
acts and costs incurred not “loss” under the CFAA; injuries associated with the misappropriation
-6-
of confidential information not “loss” under the CFAA); Von Holdt v. A–1Tool Corp., 714
F.Supp.2d 863, 875–76 (N.D.Ill.2010) (noting that the purpose of the CFAA is to punish those
who destroy data, not to cover a former employee who “walks off with confidential
information”); Am. Fam. Mut. Ins. Co. v. Rickman, 554 F.Supp.2d 766, 772 (N.D. Ohio 2008)
(“The CFAA does not contemplate consequential damages ... that are unrelated to harm to the
computer itself.”); Civic Ctr. Motors, Ltd. v. Mason St. Import Cars, Ltd., 387 F.Supp.2d 378,
382 (S.D. N.Y. 2005) (“[C]osts not related to computer impairment or computer damages are not
compensable under the CFAA.”)).
Here, Plaintiff has not alleged “loss” due to any impairment to its computer systems or
any interruption in service.
Instead, Plaintiff alleges that “Horton’s unauthorized access
proximately caused … DeWitt Insurance [to] suffer[] loss in the amount of 20% of all
commissions DeWitt Insurance paid to Zigzak, Inc.” (Amended Complaint, ¶50). Plaintiff has
alleged only economic harm due to its overpayment of commissions because of Defendants’
fraud. The Court finds that Plaintiff’s alleged “loss” for overpayment of commissions was not
proximately caused by Defendants’ use of Plaintiff’s computer systems. Further, Plaintiff’s
alleged financial injury is not the type of “loss” contemplated by the CFAA because it does not
relate to either responding to the offense or consequential damages due to interruption of service.
See NCMIC Fin. Corp. v. Artino, 638 F. Supp. 2d 1042, 1063-64 (S.D. Iowa 2009)(“Courts have
interpreted ‘loss’ to include the cost of responding to a security breach, such as the cost of
performing a computer system damage assessment, even if the losses are not derived from any
change to the computers themselves or the information contained on the computer.”)(citing
cases); Nexans Wires S.A. v. Sark-USA, Inc., 166 F. App'x 559, 562 (2d Cir. 2006)(“the plain
language of the statute treats lost revenue as a different concept from incurred costs, and permits
-7-
recovery of the former only where connected to an ‘interruption in service.’”). The Court finds
that Plaintiff’s alleged loss of a percentage of commissions that DeWitt paid to Zigzak
(Amended Complaint, ¶50) is too attenuated from Defendants’ use of Plaintiff’s computer
systems. Therefore, the Court holds that Plaintiff does not state a cognizable “loss” under the
CFAA and dismisses Plaintiff’s claim under the CFAA.
II.
RICO in Count IV
In Count IV, Plaintiff purports to allege a RICO claim against Defendants. Section 1962
of the RICO Act makes it “unlawful for any person employed by or associated with any
enterprise engaged in, or the activities of which affect, interstate or foreign commerce, to
conduct or participate, directly or indirectly, in the conduct of such enterprise’s affairs through a
pattern of racketeering activity or collection of unlawful debt.” Nitro Distrib., Inc. v. Alticor,
Inc., 565 F.3d 417, 428 (8th Cir. 2009) (quoting 18 U.S.C. § 1962(c)). The federal RICO statute
“provides a private right of action for any person injured in his business or property by reason of
[a RICO violation].” Crest Const. II, Inc. v. Doe, 660 F.3d 346, 353 (8th Cir. 2011) (internal
quotation marks and citation omitted); 18 U.S.C. § 1964(c). To demonstrate a RICO violation,
the plaintiff must show “(1) conduct (2) of an enterprise (3) through a pattern (4) of racketeering
activity.” Crest Constr. II, Inc., 660 F.3d at 353 (internal quotation marks and citation omitted).
In order to prove the last two elements, a plaintiff must demonstrate that the defendant
committed at least two predicate acts of racketeering which are delineated in the statute. 18
U.S.C. §§ 1961(1), (5).
For predicate acts of racketeering, Plaintiff alleges Defendants committed mail fraud and
wire fraud, in violation of 18 U.S.C. §1341 (wire fraud) and 18 U.S.C. §1341 (mail fraud), on
numerous occasions from 2000 through 2011. (ECF No. 15 at 10-11). Plaintiff alleges several
-8-
instances where Defendants used the internet, interstate emails, telephone calls to promote their
fraud. (Amended Complaint, ¶31).
Defendants contend that Plaintiff’s RICO claim fails because it did not allege the RICO
claim with the particularity required under Rule 9(b) and because it has not stated the essential
elements of a RICO claim. Because the Court finds that Plaintiff did not allege a “pattern of
racketeering” the Court will dismiss Plaintiff’s RICO claim.
A. Particularity under Rule 9(b)
With respect to allegations of mail or wire fraud such as those contained in the
Complaint, Rule 9(b) requires a party alleging fraud to state with heightened “particularity” the
circumstances constituting fraud or mistake. Crest Constr. II, Inc., 660 F.3d at 353. In other
words, Rule 9(b) requires plaintiffs to plead ‘the who, what, when, where, and how: the first
paragraph of any newspaper story.’” Summerhill v. Terminix, Inc., 637 F.3d 877, 880 (8th Cir.
2011)(citing Great Plains Trust Co. v. Union Pac. R.R. Co., 492 F.3d 986, 995 (8th Cir. 2007)).
“Federal courts have long held civil RICO complaints to a somewhat higher standard of pleading
and required a plaintiff to ‘specifically identify, and factually plead, each element of a viable
RICO claim.’” Crest Const. II, Inc. v. On Time Auto, 07-0728-CV-W-DGK, 2010 WL 3456690,
at *1 (W.D. Mo. Aug. 27, 2010) aff'd sub nom. Crest Const. II, Inc. v. Doe, 660 F.3d 346 (8th
Cir. 2011)(quoting Gregory P. Joseph, Civil RICO: A Definitive Guide § 23, at 207 (3rd ed.
2010)).
In their motion, Defendants claim that Plaintiff has not alleged the predicate acts, mail
and wire fraud, with particularity and only pleaded a pattern of racketeering activity in a
conclusory manner. (ECF No. 14 at 8; ECF No. 16 at 8). Defendants note that “[t]here is no
particularity as to what specific items of mail and wire fraud are alleged, how any of the alleged
-9-
e-mails, telephone calls or mailings were fraudulent, when they specifically occurred, what they
contained, when they happened or who did them.” (ECF No. 14 at 8-9). Defendants assert that
Plaintiff’s Amended Complaint contains only formulaic statements that Defendants committed
mail and wire fraud, and fails to provide any details as to how this allegedly injured Plaintiff.
(Id. at 9). In sum, Defendants contend that Plaintiff’s purported RICO action is merely a
dressed-up garden variety tort claim, and a RICO claim is not pleaded simply because of
Defendants’ incidental use of mails and wires. (Id. at 9-10).
In response, Plaintiff asserts that it has sufficiently identified the “who, what, when,
where and how” of its RICO claim, as required by Fed.R.Civ.P. 9(b). (ECF No. 15 at 6-9); see
also Crest Const. II, Inc., 660 F.3d at 353; Summerhill, 637 F.3d at 880. Plaintiff notes that
Horton, in Missouri, used interstate telephone calls on an almost daily basis from 2000 until
2011 to DeWitt’s employees, DePond and Bommarito in Florida or Texas, and Horton sent
interstate emails to DePond, Bommarito and Denise Lowery. (ECF No. 15 at 10). In addition,
Plaintiff made interstate telephone calls and sent interstate emails almost daily from July 2000
through January 2012 to DeWitt personnel about his sales and commission. (Id.).
Plaintiff
further notes that as a result of these actions, DeWitt sent Zigzak a commission check through
the U.S. Mail or direct deposit every month from July 2000 through January 2012.
(Id.)
Specifically, Plaintiff alleges that Defendants used interstate emails and telephone calls in the
first part of 2000 to form Zigzak; Defendants exchanged monthly emails from 2000 until 2011
with John DePond and Lowery at DeWitt to report Zigzak’s sales and commissions; and
Defendants used monthly interstate telephone calls between Horton and DePond and between
Horton and Theresa Bommarito to report Zigzak’s sales and commissions. (Amended Complaint,
¶65). Plaintiff allege that Defendants employed the United States Mail, the internet, email, and
- 10 -
telephone, which constitutes mail fraud and wire fraud, in violation of 18 U.S.C. §1961(1)(B).
(Amended Complaint, ¶66).
The Court holds that the circumstances allegedly constituting the fraud are stated with
sufficient particularity as required by Rule 9(b). Plaintiff alleges the approximate dates that the
mail and wire frauds occurred. Plaintiff also alleges the parties involved in setting up Zigzak, the
parties who made the monthly telephone calls, and the parties that received the monthly
excessive commission checks. Based upon these allegations, the Court finds that the allegedly
fraudulent scheme is set out with sufficient reference to the who, what, when, where and how
and, therefore, is unpersuaded that Plaintiff’s pleading should be dismissed for failure to comply
with Rule 9(b).
B. Pattern of Racketeering
By statute, the “pattern” element requires a plaintiff to show at least two predicate acts of
“racketeering activity,” which is defined to include violations of specified federal laws, such as
the mail and wire fraud statutes. See 18 U.S.C. § 1961(1)(B),(5). “Although showing two
predicate acts is the only statutory requirement, case law establishes that this is not sufficient to
prove a ‘pattern’-the plaintiff also must demonstrate that the ‘predicates are related, and that they
amount to or pose a threat of continued criminal activity.’” Efron v. Embassy Suites (Puerto
Rico), Inc., 223 F.3d 12, 15 (1st Cir. 2000)(quoting H.J. Inc. v. Northwestern Bell Tel. Co., 492
U.S. 229, 239, 109 S.Ct. 2893, 106 L.Ed.2d 195 (1989)); see also Sutherland v. O'Malley, 882
F.2d 1196, 1203 (7th Cir. 1989); see Craig Outdoor Adver., Inc., v. Viacom Outdoor, Inc., 528
F.3d 1001, 1028 (8th Cir.2008)(“[T]o prove a pattern of racketeering activity a plaintiff ... must
show that the racketeering predicates are related, and that they amount to or pose a threat of
continued criminal activity.”)(emphasis in original). “Courts must examine a number of relevant
- 11 -
factors when determining whether the predicate acts alleged are sufficiently continuous to
constitute a pattern; these factors include the number and variety of predicate acts and the length
of time over which they were committed, the number of victims, the presence of separate
schemes and the occurrence of distinct injuries.”
quotations omitted).
Sutherland, 882 F.2d at 1204 (internal
“The determination of a pattern of racketeering activity is a factual
determination.” Terry A. Lambert Plumbing, Inc. v. W. Sec. Bank, 934 F.2d 976, 980 (8th Cir.
1991)(citing H.J. Inc. v. Nw. Bell Tel. Co., 492 U.S. 229, 242, 109 S. Ct. 2893, 2902, 106 L. Ed.
2d 195 (1989)). “The specific facts of each case must be examined to determine whether the
predicate acts relied upon by the plaintiff establish a threat of continuing racketeering activity.”
Terry A. Lambert Plumbing, Inc., 934 F.2d at 980 (quoting Sutherland, 882 F.2d at 1204).
“However, RICO ‘does not cover all instances of wrongdoing. Rather, it is a unique cause of
action that is concerned with eradicating organized, long-term, habitual criminal activity.’” Crest
Const. II, Inc, 660 F.3d at 353 (citing Gamboa v. Velez, 457 F.3d 703, 705 (7th Cir.2006)).
Defendants argue that Plaintiff fails to plead a pattern of racketeering activity. (ECF No.
16 at 7). Defendants assert that mail and wire fraud, without more, does not amount to a RICO
claim. (ECF No. 16 at 7-8). Further, Defendants maintain that Plaintiff has failed to identify
what fraudulent misrepresentations were made in the emails and telephone calls that form the
basis of the alleged RICO claim. (ECF No. 16 at 8).
In response, Plaintiff asserts that it has alleged a pattern of racketeering activity through
Defendants’ activities from July 2000 through January 2012. (ECF No. 15 at 9). Plaintiff alleges
a common purpose of defrauding DeWitt out of portions of commissions. (Amended Complaint,
¶63). Plaintiff claims that Horton accomplished this end through “almost daily” interstate
telephone calls and emails with DeWitt personnel from 2000 until 2011. (ECF No. 15 at 9).
- 12 -
Plaintiff emphasizes that a pattern is established because Zigzak received commission checks
every month for 139 months. (Id.).
Assuming for the sake of argument that commission payments by different checks can
constitute multiple predicate acts, the Court nonetheless finds that Plaintiff cannot state a claim
under RICO because it has failed to allege the necessary pattern of racketeering activity.
In H.J. Inc. v. Nw. Bell Tel. Co., the Supreme Court rejected a multiple scheme test for
the continuity prong of a RICO pattern. H.J. Inc., 492 U.S. 229, 240 (1989). Although the Court
acknowledges that under H.J. a single scheme can constitute a RICO claim, the “single scheme
must still meet the requirements of relatedness and continuity.” Terry A. Lambert Plumbing,
Inc., 934 F.2d at 981; Larry Good & Associates v. Williams & Co. Consulting, 8:06CV280, 2006
WL 3257180, at *2 (D. Neb. Nov. 9, 2006) (“The Company must allege a pattern of racketeering
activity to show continuing activities and distinct schemes in excess of a single injury, which is
more than garden variety fraud.”). “A single ‘scheme’ may be reached by RICO, see H.J. Inc.,
492 U.S. at 240-41, 109 S.Ct. 2893, but only if it is reasonably broad and far reaching.” Sys.
Mgmt., Inc. v. Loiselle, 303 F.3d 100, 105 (1st Cir. 2002). “[W]hile acknowledging H.J.’s
teaching, … a number of courts since that decision have found the continuity prong to be absent
for allegations involving unlawful activities too small in scale or scope.” AB Mauri Food, Inc. v.
Harold, 4:07CV811-DJS, 2008 WL 878451, at *3 (E.D. Mo. Mar. 27, 2008)(citing Edmondson
& Gallagher v. Alban Towers Tenants Ass'n, 48 F.3d 1260, 1265 (D.C.Cir.1995); Western
Associates Limited Partnership v. Market Square Associates, 235 F.3d 629, 634 (D.C.Cir.2001);
Efron v. Embassy Suites (Puerto Rico), Inc., 223 F.3d 12, 18-19 (1st Cir.2000)). The Eighth
Circuit has reasoned that “‘it places a real strain on the language [of RICO] to speak of a single
fraudulent effort, implemented by several fraudulent acts, as a pattern of racketeering activity.’”
- 13 -
Associated Petroleum Producers, Inc. v. Treco 3 Rivers Energy Corp., 692 F.Supp. 1070, 1072
(E.D. Mo. 1988) (quoting Superior Oil Co. v. Fulmer, 785 F.2d 252, 257 (8th Cir.1986)).
Although Plaintiff has alleged that Defendants engaged in multiple fraudulent acts, the
Court holds that the email, mail and wire transfers utilized by Defendants are insufficient to
establish a pattern of racketeering because they were, at most, performed as part of a single effort
to defraud Plaintiff of some commissions and do not sufficiently allege continuity. (Amended
Complaint, ¶67). The alleged predicate acts are Defendants’ alleged mail and wire fraud to set
up Zigzak and obtain excessive commissions from Plaintiff. Plaintiff’s Amended Complaint
does not allege that Defendants acted in regard to any other victims, nor does it allege a threat of
continued fraudulent activity. Plaintiff has alleged merely a “narrow criminal episode,” even if
the regular mailings and wire transfers may constitute several injuries.
Sys. Mgmt., Inc., 303
F.3d at 105; Larry Good & Associates, 2006 WL 3257180, at *2 (citing Madden v. Gluck, 815
F.2d 1163, 1163 (8th Cir.1987))(“Injury resulting from mere subdivisions of one fraudulent
scheme is not sufficient to form a pattern of racketeering activity.”). There is no allegation that
Defendants’ fraud or alleged racketeering activity will continue as to Plaintiff or that
Defendants’ activities threatened or will threaten any other victim. See H.J. Inc., 492 U.S. at 240
(“To establish a RICO pattern it must also be shown that the predicates themselves amount to, or
that they otherwise constitute a threat of, continuing racketeering activity.”)(emphasis in
original). This case involves only one set of perpetrators, one victim and one fraudulent goal.
Plaintiff alleges no “societal” threat, but rather a directed, targeted injury to a then-employer.
See AB Mauri Food, Inc., 2008 WL 878451, at *4. “Viewing the complaint in the light most
favorable to the plaintiff, this case involves, at most, a plan to defraud a single company in
connection with a single contract.”
Larry Good & Associates, 2006 WL 3257180, at *3
- 14 -
(dismissing RICO civil claim). A single, fraudulent contractual business venture, which is
narrowly tailored toward one victim does not constitute the pattern of racketeering required for
criminal activity under a RICO claim. The Court finds that the alleged acts of everyday business
emails and the monthly commission checks received by Horton/Zigzak are neither broad nor far
reaching enough to constitute a pattern of racketeering under RICO. See Sys. Mgmt., Inc., 303
F.3d at 105.
Further, as noted by several circuit courts, this type of garden variety fraud does not state
a claim under RICO simply because Defendants allegedly used the internet, interstate mail, and
interstate wires to implement their fraud:
Virtually every garden-variety fraud is accomplished through a series of wire or
mail fraud acts that are ‘related’ by purpose and spread over a period of at least
several months. Where such a fraudulent scheme inflicts or threatens only a single
injury, we continue to doubt that Congress intended to make the availability of
treble damages and augmented criminal sanctions dependent solely on whether
the fraudulent scheme is well enough conceived to enjoy prompt success or
requires pursuit for an extended period of time. Given its ‘natural and common
sense approach to RICO's pattern element,’ we think it unlikely that Congress
intended RICO to apply in the absence of a more significant societal threat.
Marshall–Silver Constr. Co., Inc. v. Mendel, 894 F.2d 593, 597 (3d Cir.1990); U.S. Textiles, Inc.
v. Anheuser-Busch Companies, Inc., 911 F.2d 1261, 1268 (7th Cir. 1990); see also Menasco,
Inc. v. Wasserman, 886 F.2d 681, 685 (4th Cir. 1989)(“ If the pattern requirement has any force
whatsoever, it is to prevent this type of ordinary commercial fraud from being transformed into a
federal RICO claim.”); Larry Good & Associates, 2006 WL 3257180, at *2 (“The Company
must allege a pattern of racketeering activity to show continuing activities and distinct schemes
in excess of a single injury, which is more than garden variety fraud.”). “Repetitive fraudulent
conduct by one set of perpetrators against a single victim, narrowly directed toward a single
fraudulent goal-there as here recovering excessive commissions from plaintiff beyond those
contemplated by the parties’ agreement-is a ‘garden variety fraud’ rather than a ‘pattern’ with the
- 15 -
species of continuity required for RICO liability.” AB Mauri Food, Inc., 2008 WL 878451, at *4;
Secure Energy, Inc. v. Coal Synthetics, LLC, 4:08CV1719 JCH, 2010 WL 1691327, at *2 (E.D.
Mo. Apr. 27, 2010). The Court finds that the fraud alleged in the Amended Complaint is simple,
garden variety fraud and does not allege a pattern of racketeering for a RICO action. Applying a
“natural and commonsense approach to RICO's pattern element,” the Court believes that the
facts alleged are no different from those alleged in any common, repetitive fraud claim. See H.J.
Inc., 492 U.S. at 237.
Because the Court finds that Plaintiff has not alleged a pattern of racketeering, the Court
grants Defendants’ Motion to Dismiss the RICO count and dismisses Count IV under
Fed.R.Civ.P. 12(b)(6) for failure to state a claim.
III.
State Law Claims
Federal Rule of Civil Procedure 12(b)(1) requires dismissal if the Court lacks subject matter
jurisdiction over the claim. Plaintiff alleged that this Court has subject matter jurisdiction over
this action pursuant to 28 U.S.C. §1331. The Court dismisses Counts II and IV, the only counts
alleging claims under federal law.
Plaintiff alleged that that this Court had supplemental
jurisdiction under 28 U.S.C. §1367(a) over the remaining state law claims in Counts I, III, and V.
Because this Court dismisses the federal claims, the Court declines to exercise supplemental
jurisdiction over Counts I, III, and V. The Court also declines to rule on the pending motion to
dismiss as to the state law claims. Such arguments can be addressed if the state law claims are
refiled in state court.
- 16 -
Accordingly,
IT IS HEREBY ORDERED that Defendants Gregory R. Horton and Sarah A. King’s
Motion to Dismiss Plaintiff’s Complaint for Failure to State a Claim Upon Which Relief Can Be
Granted And To Decline Supplemental Jurisdiction of State Claims [7] is DENIED as moot.
IT IS FURTHER ORDERED that Defendants Gregory R. Horton and Sarah A. King’s
Motion to Dismiss Plaintiff’s Amended Complaint for Failure to State a Claim Upon Which
Relief Can Be Granted And To Decline Supplemental Jurisdiction of State Claims [13] is
GRANTED, in part, and DENIED, in part. The Court DISMISSES Counts II and IV for failure
to state a claim pursuant to Fed.R.Civ.P. 12(b)(6). The Court DISMISSES Counts I, III, and V
for lack of subject matter jurisdiction pursuant to Fed.R.Civ.P. 12(b)(1).
Dated this 28th day of May, 2014.
JOHN A. ROSS
UNITED STATES DISTRICT JUDGE
- 17 -
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?