Filed: Oct. 26, 2018
Latest Update: Mar. 03, 2020
Summary: Case: 17-13108 Date Filed: 10/26/2018 Page: 1 of 22 [DO NOT PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT _ No. 17-13108 Non-Argument Calendar _ D.C. Docket No. 0:16-cr-60238-JIC-1 UNITED STATES OF AMERICA, Plaintiff-Appellee, versus JONATHAN LEE EUBANKS, Defendant-Appellant. _ Appeal from the United States District Court for the Southern District of Florida _ (October 26, 2018) Before WILLIAM PRYOR, ANDERSON, and JULIE CARNES, Circuit Judges. PER CURIAM: Case: 17-131
Summary: Case: 17-13108 Date Filed: 10/26/2018 Page: 1 of 22 [DO NOT PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT _ No. 17-13108 Non-Argument Calendar _ D.C. Docket No. 0:16-cr-60238-JIC-1 UNITED STATES OF AMERICA, Plaintiff-Appellee, versus JONATHAN LEE EUBANKS, Defendant-Appellant. _ Appeal from the United States District Court for the Southern District of Florida _ (October 26, 2018) Before WILLIAM PRYOR, ANDERSON, and JULIE CARNES, Circuit Judges. PER CURIAM: Case: 17-1310..
More
Case: 17-13108 Date Filed: 10/26/2018 Page: 1 of 22
[DO NOT PUBLISH]
IN THE UNITED STATES COURT OF APPEALS
FOR THE ELEVENTH CIRCUIT
________________________
No. 17-13108
Non-Argument Calendar
________________________
D.C. Docket No. 0:16-cr-60238-JIC-1
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
versus
JONATHAN LEE EUBANKS,
Defendant-Appellant.
________________________
Appeal from the United States District Court
for the Southern District of Florida
________________________
(October 26, 2018)
Before WILLIAM PRYOR, ANDERSON, and JULIE CARNES, Circuit Judges.
PER CURIAM:
Case: 17-13108 Date Filed: 10/26/2018 Page: 2 of 22
A jury convicted Defendant Jonathan Eubanks of intentionally causing
damage without authorization to a protected computer, use of unauthorized access
devices, and three counts of aggravated identity theft. The district court sentenced
Defendant to 84 months’ imprisonment. Defendant now appeals, challenging the
sufficiency of the evidence as to one of his aggravated identity theft convictions.
He also argues that his sentence is procedurally and substantively unreasonable.
After careful review, we affirm.
I. BACKGROUND
A. Facts1
Navarro Security (“Navarro”) is a company that provides security services
for gated communities, individuals, and businesses. In October 2012, Navarro
hired Defendant for the position of road supervisor. As a road supervisor,
Defendant was responsible for checking on and assisting the security officers that
were stationed at each of Navarro’s customers. On January 8, 2013, Defendant’s
supervisor, Glenn Topping, demoted him from road captain to an officer.
Defendant did not return to work after that date, and Navarro officially terminated
Defendant’s employment on January 18, 2013.
1
The following facts are taken from the trial, viewed in the light most favorable to the
Government. See United States v. Wright,
392 F.3d 1269, 1273 (11th Cir. 2004). Because
Defendant challenges the sufficiency of the evidence as to only one of his convictions, the facts
focus on those relevant to the conviction at issue, as well as the sentencing challenges Defendant
raises on appeal.
2
Case: 17-13108 Date Filed: 10/26/2018 Page: 3 of 22
On January 27, 2013, Vern Reynolds, Navarro’s technical manager and
system administrator, was alerted to an issue concerning Navarro’s server. While
he was investigating the issue, Reynolds discovered that 12 years’ worth of files
were missing from the server. Reynolds was the only one with authorization to
delete files from the server and he had not done so. Although he was able to
recreate most of the files, he was unable to recreate three or four years’ worth of
documents.
The following day, January 28, 2013, the printer at Navarro stopped
functioning and ultimately needed a new motherboard and operating system. In
addition, the Navarro website was directing users to the websites of Navarro’s
competitors. That same day, Reynolds received an email from Topping regarding
Topping’s departure from Navarro. The email stood out to Reynolds because he
knew that Topping was not in the office that day. Indeed, Topping had been let go
for budgetary reasons a few days earlier. When Reynolds discovered that
Topping’s computer was turned on and running, he concluded that it was being
controlled by someone else from a remote location.
Reynolds’s subsequent review of Topping’s hard drive revealed that a
software program called LogMeIn—a program that allows a person to connect
remotely to another computer—had been installed on Topping’s computer in
December 2012. Another program called Cain & Abel—which captures the
3
Case: 17-13108 Date Filed: 10/26/2018 Page: 4 of 22
username and password of anyone logging into a computer—was also installed on
the computer. Reynolds ultimately learned that Topping’s computer had been
remotely connected to on January 26, 27, and 28, from an IP address that was
registered to Defendant’s home address. Reynolds was the only person authorized
to install a program such as LogMeIn onto one of Navarro’s computers and he had
not done so.
Approximately two weeks later, on February 18, 2013, Navarro’s human
resources director, Linda Blades, received a confirmation email from B&H Photo
regarding a purchase order totaling $3,349.79. The purchase order was made by
Maryam Ayam and paid for using a credit card in Ayam’s name. However, the
order was to be shipped to 6928 Southwest 39th Street, Apt. 206, Fort Lauderdale,
FL, 33314. Blades recognized the shipping address as the one Defendant had
provided to Navarro as his home address. Blades had not made the purchase and
she confirmed that Ayam was not a Navarro employee. B&H Photo later canceled
the order after Ayam confirmed it was fraudulent. The bank statement for Ayam’s
credit card showed that she had purchased Destiny Patrol Software in February
2013. The statement also showed that Ayam received a new credit card number
during the March 2013 billing cycle.
In addition, Blades received email confirmations for two other orders made
in February 2013: one for an interactive pen display totaling $2,499 and the other
4
Case: 17-13108 Date Filed: 10/26/2018 Page: 5 of 22
for an Apple iPad in the amount of $1,188.70. Both orders were made under the
name John Flores, were paid for with John Flores’s credit card, and listed Flores’s
employer at the time, Platt Security, as the billing address. The shipping address
listed on the purchase orders, however, was Defendant’s address. Neither Flores
nor Blades made either of these purchases. Like Ayam, Flores had a monthly
service charge to Destiny Patrol Software.
On February 25, 2013, a purchase in the amount of $1,100.98 was made to
Lecor Technologies using Mark Silverberg’s credit card. The order was placed
from a computer at the Equus gatehouse—a location where Navarro has an
employee stationed to work. A subsequent investigation revealed that the Equus
computer had been logged into from a LogMeIn account at an IP address registered
to Defendant’s home address. Silverberg did not place the order, but like Ayam
and Flores, he had a transaction with Destiny Patrol Software between January and
February 2013.
In May 2013, law enforcement officials executed a search warrant at
Defendant’s apartment. A forensic analysis of one of the computers seized from
the apartment revealed programs used to access emails and login-emails for
different people associated with destinypatrolsoftware.com. Officials also
determined that the same computer had not only accessed Destiny Patrol
Software’s administrative website—which had billing and credit card
5
Case: 17-13108 Date Filed: 10/26/2018 Page: 6 of 22
information—but that Defendant was logged in as a superuser, meaning that he had
more advanced privileges than a typical user. The computer contained LogMeIn
files, as well as a file that contained Topping’s biographical information, including
his address, date of birth, social security number, and employment information.
B. Procedural History
In 2016, a federal grand jury issued an indictment charging Defendant with:
(1) intentionally causing damage without authorization to a protected computer, in
violation of 18 U.S.C. § 1030(a)(5)(A) and (c)(4)(B)(i) (Count 1); (2) knowingly
using one or more unauthorized access devices with intent to defraud, in violation
of 18 U.S.C. § 1029(a)(2) (Count 2); and (3) three counts of aggravated identity
theft, in violation of 18 U.S.C. § 1028A(a)(1) (Counts 3–5). Count 4 charged that
Defendant knowingly used the means of identification of “M.A.,” or Maryam
Ayam. Defendant pled not guilty and proceeded to trial.
At trial, the Government presented testimony from various witnesses,
including representatives from Navarro, law enforcement officials, and two of the
people whose credit cards were used fraudulently, Flores and Silverberg. Ayam
did not testify at trial. At the close of the Government’s case-in-chief, Defendant
moved for judgment of acquittal. Of relevance to this appeal, he argued that as to
Count 4, the evidence was insufficient to show that any use of Ayam’s credit card
6
Case: 17-13108 Date Filed: 10/26/2018 Page: 7 of 22
was not authorized because she had not testified at trial. The court denied his
motion.
Defendant testified in his own defense. He denied having hacked into
Navarro’s computer system and stated that he did not know about the hacking until
the Federal Bureau of Investigation executed the search warrant at his apartment.
He denied destroying Navarro’s files and sending emails from Topping’s account.
He also denied connecting remotely to Navarro’s computer system in order to
purchase merchandise using other people’s credit card numbers. After the defense
rested, Defendant renewed his motion for judgment of acquittal. The court denied
the motion. The jury returned a guilty verdict as to all five counts.
In preparation for sentencing, the probation officer prepared a Presentence
Investigation Report (“PSR”). The PSR assigned Defendant a base offense level of
6, pursuant to U.S.S.G. § 2B1.1(a)(2). Defendant received the following
enhancements: (1) an 8-level enhancement under § 2B1.1(b)(1)(E) because the
loss was more than $95,000 but less than $150,000; (2) a 2-level enhancement
under § 2B1.1(b)(10)(C) for sophisticated means; (3) a 2-level enhancement under
§ 2B1.1(b)(17) because the defendant was convicted of an offense under 18 U.S.C.
§ 1030 and the offense involved the intent to obtain personal information or the
public dissemination of personal information; and (4) a 4-level enhancement under
§ 2B1.1(b)(18)(A)(ii) because he was convicted of an offense under
7
Case: 17-13108 Date Filed: 10/26/2018 Page: 8 of 22
§ 1030(a)(5)(A). Defendant also received a two-level upward adjustment under
U.S.S.G. § 3B1.3 because he used a special skill in a manner that facilitated
concealment of the offense. Finally, he received a two-level enhancement for
obstruction of justice under § 3C1.1. Defendant’s total offense level was 26.
Based on a criminal history category of I and a total offense level of 26,
Defendant’s guideline range was 63 to 78 months’ imprisonment. The PSR also
stated that Counts 3, 4, and 5 carried a mandatory two-year term of imprisonment
that must run consecutive to any other term of imprisonment. Of relevance to this
appeal, Defendant objected to the two-level enhancement under § 2B1.1(b)(17).
He argued that the offense he was convicted of under § 1030—intentionally
causing damage to a protected computer without authorization—did not involve an
intent to obtain personal information or the public dissemination of personal
information. Defendant also objected to the two-level enhancement for obstruction
of justice under § 3C1.1.
At the sentencing hearing, the Government asserted that the § 2B1.1(b)(17)
enhancement should apply because Defendant was convicted of an offense under
§ 1030 and the relevant conduct for that offense demonstrated an intent to obtain
personal information. Specifically, Defendant hacked into Navarro’s server and
accessed Blades’s and Topping’s personal email accounts. Additionally,
Defendant viewed payroll information before deleting files from the Navarro
8
Case: 17-13108 Date Filed: 10/26/2018 Page: 9 of 22
server. Defendant responded that the enhancement should only apply where the
§ 1030 offense contains as an element the intent to obtain personal information.
Because Defendant’s offense of conviction—§ 1030(a)(5)(A)—contained no such
element, he argued that the enhancement should not apply. The district court
overruled Defendant’s objection, concluding that he was convicted of an offense
under § 1030 and that the Government had established by a preponderance of the
evidence that the relevant conduct related to his conviction demonstrated an intent
to obtain personal information.
As to Defendant’s objection to the enhancement for obstruction of justice,
the Government argued that the enhancement should apply because Defendant
testified falsely regarding a material matter during trial. Defendant responded that
the enhancement was unconstitutional because it punishes defendants for
exercising their right to testify where they ultimately do not prevail at trial. The
district court overruled the objection. The district court sustained another
objection not relevant to this appeal, resulting in an amended guideline range of 51
to 63 months’ imprisonment as to Counts 1 and 2, followed by the consecutive 24-
month sentence as to Counts 3 through 5.
Defendant requested a downward variance, emphasizing his age, lack of
criminal history, and computer-related talent. The Government asserted that a
guideline sentence was reasonable given the seriousness and sophistication of the
9
Case: 17-13108 Date Filed: 10/26/2018 Page: 10 of 22
offenses, Defendant’s interest in exerting power and control over the world, and
his overall lack of honesty and candor. After considering the parties’ statements,
the PSR, and the 18 U.S.C. § 3553(a) factors, the court sentenced Defendant to 84
months’ imprisonment. The sentence consisted of a 60-month sentence as to
Counts 1 and 2, to run concurrently, a 24-month sentence as to Counts 3 to run
consecutive to Counts 1 and 2, and a 24-month sentence as to Counts 4 and 5, to
run concurrently with each other and to the sentence in Count 3. This appeal
followed.
II. DISCUSSION
A. Sufficiency of the Evidence
Defendant argues that the evidence was insufficient to convict him of Count
4—aggravated identity theft under 18 U.S.C. § 1028A(a)(1).2 Count 4 charged
Defendant with using the means of identification of another person, specifically the
debit card of Mayam Ayam, without lawful authority. Defendant asserts that the
Government failed to prove beyond a reasonable doubt that Ayam’s identification
was used without authorization because she did not testify at trial.
We review de novo whether the evidence was sufficient to sustain a criminal
conviction. United States v. Jiminez,
564 F.3d 1280, 1284 (11th Cir. 2009). In
2
Defendant does not challenge the sufficiency of the evidence as to any of his other convictions
and has therefore abandoned any challenge he may have had. See United States v. Jernigan,
341
F.3d 1273, 1283 n.8 (11th Cir. 2003) (providing that issues that are not raised plainly and
prominently in an appellate brief are deemed abandoned).
10
Case: 17-13108 Date Filed: 10/26/2018 Page: 11 of 22
reviewing the denial of a motion for judgment of acquittal, we view the evidence in
the light most favorable of the jury’s verdict.
Id. The evidence will be sufficient
to sustain a conviction if a reasonable trier of fact could find that it established the
defendant’s guilt beyond a reasonable doubt.
Id. at 1284–85. When the
Government relies on circumstantial evidence, the conviction must be supported by
reasonable inferences, not mere speculation. United States v. Friske,
640 F.3d
1288, 1291 (11th Cir. 2011).
To establish a conviction under 18 U.S.C. § 1028A, “the evidence must
establish that the defendant: (1) knowingly transferred, possessed, or used; (2) the
means of identification of another person; (3) without lawful authority; (4) during
and in relation to a felony enumerated in § 1028A(c).” United States v.
Barrington,
648 F.3d 1178, 1192 (11th Cir. 2011) (quotations omitted); 18 U.S.C.
§ 1028A. Defendant argues only that the Government failed to establish that he
acted without lawful authority when he used Ayam’s credit card. Because he does
not challenge the sufficiency of the evidence as to any of the other § 1028A
elements, he has abandoned any such challenge he may have had. See
Jernigan,
341 F.3d at 1283 n.8.
Here, the evidence presented at trial was sufficient to support Defendant’s
conviction for aggravated identity theft in Count 4. Although Ayam did not testify,
the Government presented circumstantial evidence at trial from which a reasonable
11
Case: 17-13108 Date Filed: 10/26/2018 Page: 12 of 22
jury could infer that Ayam did not authorize Defendant to use her credit card.
Indeed, the Government presented evidence showing that the purchase order made
in Ayam’s name and paid for using Ayam’s credit card listed the shipping address
as Defendant’s address. Moreover, the confirmation email for the order was not
sent to Ayam. Instead, it was sent to Blades’s email address at Navarro and Ayam
was not a Navarro employee. Further, Ayam’s bank statements show that she
received a new card number in March 2013, which was the billing cycle
immediately following the purchase order made on February 18, 2013. Records
also showed that the purchase order was canceled after Ayam reported it to be
fraudulent.
The evidence further showed that the three identity-theft victims—Ayam,
Flores, and Silverberg—all had transactions with Destiny Patrol Software. Law
enforcement officials discovered that Defendant’s computer had login email
addresses from different people associated with destinypatrolsoftware.com. Both
Flores and Silverberg testified that the purchases made in their names were not
authorized, and, like Ayam, these purchase orders listed Defendant’s home address
as the location where the items were to be shipped. Given the similarities between
the three purchase orders, a reasonable jury could infer that Ayam’s card was used
without lawful authority.
12
Case: 17-13108 Date Filed: 10/26/2018 Page: 13 of 22
Finally, Defendant took the stand in his own defense and denied having
engaged in any misconduct, including having used other people’s credit cards.
Because the jury returned a guilty verdict, it obviously did not believe Defendant’s
statements and we may consider this as substantive evidence of guilt. See United
States v. Kendrick,
682 F.3d 974, 985 (11th Cir. 2012) (“[W]hen a criminal
defendant chooses to testify on his own behalf, his statements, if disbelieved by the
jury, may be considered as substantive evidence of his guilt.”). Based on this
evidence, a reasonable jury could conclude that Defendant acted without Ayam’s
authorization when he used her credit card. Accordingly, the evidence was
sufficient to support Defendant’s conviction on Count 4.
B. Defendant’s Sentence
Using a two-step process, we review the reasonableness of a district court’s
sentence for an abuse of discretion. United States v. Cubero,
754 F.3d 888, 892
(11th Cir. 2014). We first look to whether the district court committed any
significant procedural error, such as miscalculating the advisory guideline range,
treating the Sentencing Guidelines as mandatory, failing to consider the 18 U.S.C.
§ 3553(a) factors,3 selecting a sentence based on clearly erroneous facts, or failing
3
The § 3553(a) factors include: (1) the nature and circumstances of the offense and the history
and characteristics of the defendant; (2) the need to reflect the seriousness of the offense, to
promote respect for the law, and to provide just punishment for the offense; (3) the need for
deterrence; (4) the need to protect the public; (5) the need to provide the defendant with needed
education or vocational training or medical care; (6) the kinds of sentences available; (7) the
Sentencing Guidelines range; (8) pertinent policy statements of the Sentencing Commission;
13
Case: 17-13108 Date Filed: 10/26/2018 Page: 14 of 22
to adequately explain the chosen sentence.
Id. Then we examine whether the
sentence is substantively reasonable in light of the totality of the circumstances.
Id. The party challenging the sentence bears the burden of showing that it is
unreasonable. United States v. Pugh,
515 F.3d 1179, 1189 (11th Cir. 2008).
A. Procedural Reasonableness
1. U.S.S.G. § 2B1.1(b)(17) Enhancement
Defendant challenges the district court’s application of a two-level
enhancement under § 2B1.1(b)(17). We review a district court’s factual findings
for clear error and its interpretation of the Sentencing Guidelines de novo. United
States v. Perez,
366 F.3d 1178, 1181 (11th Cir. 2004).
Section 2B1.1(b)(17) of the Sentencing Guidelines provides for a two-level
increase in a defendant’s offense level if “the defendant was convicted of an
offense under 18 U.S.C. § 1030, and the offense involved an intent to obtain
personal information, or . . . the offense involved the unauthorized public
dissemination of personal information.” U.S.S.G. § 2B1.1(b)(17). Defendant
argues that the district court erred by applying the enhancement under
§ 2B1.1(b)(17) because 18 U.S.C. § 1030(a)(5)(A)4—the statute of conviction—
(9) the need to avoid unwarranted sentencing disparities; and (10) the need to provide restitution
to victims. 18 U.S.C. § 3553(a).
4
Section 1030(a)(5)(A) provides that a defendant violates the statute if he “knowingly causes
the transmission of a program, information, code, or command, and as a result of such conduct,
14
Case: 17-13108 Date Filed: 10/26/2018 Page: 15 of 22
does not involve “an intent to obtain personal information” or “the unauthorized
public dissemination of personal information.” Stated another way, Defendant
asserts that the § 2B1.1(b)(17) enhancement applies only where the § 1030 offense
in question includes as an element “an intent to obtain personal information” or
“the unauthorized public dissemination of personal information.”
We are not, however, persuaded by Defendant’s narrow interpretation of the
term “offense” under § 2B1.1(b)(17). The term “offense” is broadly defined in the
Guidelines to mean “the offense of conviction and all relevant conduct under
§ 1B1.3 (Relevant Conduct) unless a different meaning is specified or is otherwise
clear from the context.” U.S.S.G. § 1B1.1, comment. (n.1(H)) (emphasis added);
see United States v. De La Cruz Suarez,
601 F.3d 1202, 1221 (11th Cir. 2010)
(explaining that the term offense is defined as “the offense of conviction” and “all
relevant conduct”). Relevant conduct, in turn, is defined as “all acts and omissions
committed, aided, abetted, counseled, commanded, induced, procured, or willfully
caused by the defendant . . . that occurred during the commission of the offense of
conviction.” U.S.S.G. § 1B1.3(a)(1)(A). Section 2B1.1(b)(17) does not specify a
different meaning for the term offense, nor is it clear from the context that the term
intentionally causes damage without authorization, to a protected computer.” 18 U.S.C.
§ 1030(a)(5)(A).
15
Case: 17-13108 Date Filed: 10/26/2018 Page: 16 of 22
should be interpreted differently under this provision. See U.S.S.G. § 1B1.1,
comment. (n.1(H)); U.S.S.G. § 2B1.1(b)(17).
To support his argument, Defendant asserts that because there are certain
subsections of § 1030 that require an intent to obtain personal information or the
public dissemination of information, the § 2B1.1(b)(17) enhancement should apply
to convictions under those subsections, not to his offense of conviction,
§ 1030(a)(5)(A). One of the subsections Defendant identifies is § 1030(a)(2)(C),
which makes it a violation for a defendant to “intentionally access[] a computer
without authorization or exceed[] authorized access, and thereby obtain[] . . .
information from any protected computer.” 18 U.S.C. § 1030(a)(2)(C). Contrary
to Defendant’s assertions, however, § 1030(a)(2)(C) does not contain an element of
intent to obtain personal information or involve the public dissemination of
personal information. See 18 U.S.C. § 1030(a)(2)(C). We are therefore not
persuaded by this argument.
Here, the district court determined that the enhancement under
§ 2B1.1(b)(17) applied because Defendant was convicted of an offense under
§ 1030, namely § 1030(a)(5)(A), and the relevant conduct related to that offense
involved the intent to obtain personal information. We discern no error in the
district court’s interpretation of this enhancement. Moreover, Defendant does not
challenge the district court’s finding that the relevant conduct related to the offense
16
Case: 17-13108 Date Filed: 10/26/2018 Page: 17 of 22
involved the intent to obtain personal information.5 Accordingly, the district court
did not err by applying the two-level enhancement under § 2B1.1(b)(17).6
2. Obstruction-of-Justice Enhancement
Defendant also challenges the district court’s imposition of a two-level
enhancement for obstruction of justice under U.S.S.G. § 3C1.1. Specifically, he
argues that the district court failed to make an explicit finding that he willfully
obstructed justice. Defendant, however, did not challenge the enhancement on this
basis before the district court. Instead, he argued that the enhancement unfairly
punished him for exercising his constitutional right to testify. Because Defendant
argues for the first time on appeal that the district court was required to make an
explicit willfulness finding, our review is limited to plain error. 7 See United States
5
But regardless, the district court did not clearly err by finding that the conduct related to the
offense involved the intent to obtain personal information. Specifically, Defendant hacked into
Navarro’s computer system by using programs that enabled him to capture usernames and
passwords. In doing so, he gained access to, among other things, payroll information and
Topping’s email account and other biographical information. See U.S.S.G. § 2B1.1, comment.
(n.1) (defining “personal information” to mean “sensitive or private information involving an
identifiable individual” including private correspondence, such as emails, medical records, or
financial records).
6
The Government also argues that the district court’s application of the enhancement under
§ 2B1.1(b)(17) does not constitute double counting. Because this argument was not “plainly and
prominently” raised in Defendant’s brief, we do not address this argument. See
Jernigan, 341
F.3d at 1283 n.8.
7
“The plain-error test has four prongs: there must be (1) an error (2) that is plain and (3) that
has affected the defendant’s substantial rights; and if the first three prongs are met, then a court
may exercise its discretion to correct the error if (4) the error ‘seriously affects the fairness,
integrity or public reputation of judicial proceedings.’” United States v. Madden,
733 F.3d 1314,
1320 (11th Cir. 2013) (alteration accepted) (quoting United States v. Olano,
507 U.S. 725, 732
(1993).
17
Case: 17-13108 Date Filed: 10/26/2018 Page: 18 of 22
v. Rodriguez,
398 F.3d 1291, 1298 (11th Cir. 2005) (providing that a sentencing
objection raised for the first time on appeal is reviewed for plain error).
We conclude that the district court did not err, plainly or otherwise, by
applying the obstruction-of-justice enhancement without making an explicit
finding that Defendant willfully provided false testimony. Section 3C1.1 of the
Guidelines provides for a two-level increase in a defendant’s offense level if “the
defendant willfully obstructed or impeded, or attempted to obstruct or impede, the
administration of justice with respect to the investigation, prosecution, or
sentencing of the instant offense of conviction, and . . . the obstructive conduct
related to (A) the defendant’s offense of conviction and any relevant conduct; or
(B) a closely related offense.” U.S.S.G. § 3C1.1.
The Guidelines’ commentary identifies perjury as an example of conduct
that warrants application of the enhancement. U.S.S.G. § 3C1.1, comment.
(n.4(B)). For purposes of this enhancement, the Supreme Court has defined
perjury as “false testimony concerning a material matter with the willful intent to
provide false testimony, rather than as a result of confusion, mistake, or faulty
memory.” United States v. Dunnigan,
507 U.S. 87, 94 (1993). Although the
district court should make specific factual findings concerning the elements of
perjury, we have explained that application of the obstruction-of-justice
enhancement may be affirmed where the district court makes a general finding that
18
Case: 17-13108 Date Filed: 10/26/2018 Page: 19 of 22
the defendant committed perjury as to material matters and that finding is
supported by the record. United States v. Dobbs,
11 F.3d 152, 155 (11th Cir.
1994); see also United States v. Hatney,
80 F.3d 458, 463 (11th Cir. 1996) (“[W]e
may affirm a district court’s enhancement even absent particularized findings
regarding the defendant’s perjury so long as the district court found in general that
the defendant’s testimony was perjurious as to material matters and the record
supports that finding.”).
In the present case, the district court concluded that Defendant “provided
materially false testimony under oath in that he specifically denied his involvement
in intruding into the Navarro computer testimony” and therefore “is being punished
for providing perjured testimony.” Although the district court did not make an
explicit finding as to willfulness, the record amply supports the district court’s
finding that Defendant perjured himself on material matters when he unequivocally
denied any involvement in the intrusion into Navarro’s computer system. Indeed,
the evidence showed that Defendant installed programs on Navarro’s computers
that enabled him to access usernames and passwords and to connect remotely to
Navarro’s computer system. Additionally, the forensic analysis of Defendant’s
computer showed that he had accessed Topping’s email account, his biographical
information, and Navarro’s payroll information. Moreover, during his testimony,
Defendant did not indicate that he was confused or mistaken about his recollection
19
Case: 17-13108 Date Filed: 10/26/2018 Page: 20 of 22
of the issues in this case. See
Dunnigan, 507 U.S. at 95 (indicating that inaccurate
testimony does not constitute perjury if it is the result of confusion, mistake, or a
faulty memory). In short, Defendant cannot establish that the district court’s
application of the obstruction-of-justice enhancement constituted plain error.
B. Substantive Reasonableness
Finally, Defendant argues that his sentence is substantively unreasonable.
We disagree. First, Defendant’s 84-month sentence—which consisted of a 60-
month sentence as to Counts 1 and 2 and a consecutive 24-month sentence as to
Counts 3, 4, and 5—was within the guideline range of 51 to 63 months’
imprisonment as to Counts 1 and 2 and the mandatory 24-month sentence as to
each of Counts 3 through 5. See United States v. Hunt,
526 F.3d 739, 746 (11th
Cir. 2008) (explaining that this Court normally expects a sentence within the
guideline range to be reasonable). The 60-month sentence as to Counts 1 and 2
was also significantly below the statutory maximum of 120 months’ imprisonment
for those offenses. See United States v. Gonzalez,
550 F.3d 1319, 1324 (11th Cir.
2008) (explaining that a sentence well below the statutory maximum is an indicator
of reasonableness). And notably, the district court had discretion to run the 24-
month sentences as to Counts 3 through 5 consecutive to each other, but instead
chose to run them concurrent to each other. See 18 U.S.C. § 1028A(b)(2), (b)(4).
20
Case: 17-13108 Date Filed: 10/26/2018 Page: 21 of 22
Defendant’s 84-month sentence is also supported by the § 3553(a) factors,
including the nature and circumstances of the offense and Defendant’s history and
characteristics. As noted by the district court, Defendant’s offenses were serious
and complex. Indeed, the Government emphasized that Defendant’s crimes—
which involved hacking into his former employer’s computer system, accessing
email accounts and other personal information of employees, destroying files, and
obtaining credit card numbers to make unauthorized purchases—were not isolated
or spur-of-the-moment offenses, but instead had required deliberate planning and
preparation over a period of time.
Although Defendant argues that the court did not adequately consider his
lack of criminal history or the fact that his actions were merely an immature
response to his demotion at Navarro, the weight the court assigned to each factor
was entirely within its discretion. See United States v. Rosales-Bruno,
789 F.3d
1249, 1254 (11th Cir. 2015) (“The decision about how much weight to assign a
particular sentencing factor is ‘committed to the sound discretion of the district
court.’” (quoting United States v. Williams,
526 F.3d 1312, 1322 (11th Cir. 2008)).
And contrary to Defendant’s argument that the district court sentenced him based
on its assumption that he harbored anti-government sentiments, the district court
explicitly stated that it was giving Defendant the benefit of the doubt that he was
not an anti-government supporter.
21
Case: 17-13108 Date Filed: 10/26/2018 Page: 22 of 22
In short, we are not “left with the definite and firm conviction that the
district court committed a clear error of judgment in weighing the § 3553(a) factors
by arriving at a sentence that lies outside the range of reasonable sentences dictated
by the facts of the case.” United States v. Irey,
612 F.3d 1160, 1190 (11th Cir.
2010) (quotations omitted). Accordingly, Defendant has not met his burden of
showing that his 84-month sentence is substantively unreasonable.
III. CONCLUSION
Based on the foregoing reasons, Defendant’s convictions and sentences are
AFFIRMED.
22