[PUBLISH]
IN THE UNITED STATES COURT OF APPEALS
FOR THE ELEVENTH CIRCUIT FILED
________________________ U.S. COURT OF APPEALS
ELEVENTH CIRCUIT
AUGUST 11, 2011
No. 09-15295
JOHN LEY
________________________
CLERK
D. C. Docket No. 08-00050-CR-4-SPM-WCS
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
versus
MARCUS BARRINGTON,
Defendant-Appellant.
________________________
Appeal from the United States District Court
for the Northern District of Florida
_________________________
(August 11, 2011)
Before HULL and MARCUS, Circuit Judges, and WHITTEMORE,* District Judge.
WHITTEMORE, District Judge:
_____________________
* Honorable James D. Whittemore, United States District Judge, Middle District of Florida,
sitting by designation.
Marcus Barrington appeals his convictions for conspiracy to commit wire
fraud using a protected computer, accessing a protected computer without
authorization with intent to defraud, and three counts of aggravated identity theft.
Barrington also appeals his sentence, contending that his 84 month prison sentence
is procedurally and substantively unreasonable.1
Barrington challenges the admission of Rule 404(b) evidence at trial, the
district court’s restriction on cross-examination of a cooperating co-defendant, and
the sufficiency of the evidence supporting his aggravated identity theft convictions.
Additionally, he contends the conspiracy count in the indictment was duplicative
and the jury instructions on conspiracy and aggravated identity theft were
erroneous.
As for his sentence, he contends that the district court erred in calculating his
base offense level, infringed on his right against self-incrimination at sentencing,
erred in calculating loss, and erred in applying Guidelines enhancements for use of
sophisticated means, leadership role, device-making equipment, and production of
unauthorized access devices.
1
Barrington was sentenced to concurrent 60 month terms on the conspiracy and fraud
counts and 24 month terms on the three counts of aggravated identity theft, concurrent with each
other but consecutive to the 60 month terms on the conspiracy and fraud counts. His 84 month
sentence was within the advisory Guidelines range as to Counts 1 and 2, and statutorily
mandated as to Counts 3, 4, and 5.
2
For the reasons discussed below, we affirm Barrington’s convictions and
sentence.
I
Barrington and his co-defendants, Christopher Jacquette and Lawrence
Secrease, all undergraduate students at Florida A&M University (“FAMU”), were
indicted and charged in a five count indictment with conspiracy to commit wire
fraud using a protected computer in violation of 18 U.S.C. §§ 371 and 1349; fraud
using a protected computer in violation of 18 U.S.C. §§1030(a)(4) and (c)(3)(A)
and 2; and three counts of aggravated identity theft in violation of 18 U.S.C.
§§ 1028A and 2. Jacquette and Secrease pleaded guilty pursuant to plea
agreements, received substantial assistance departures pursuant to U.S.S.G.
§ 5K1.1, and were each sentenced to 22 months in prison and 3 year terms of
supervised release.
The offense conduct
Barrington’s convictions arose from a scheme he and his co-conspirators
concocted to access FAMU’s internet-based grading system. The scheme was
developed after Secrease and Barrington, roommates at the time, began discussing
how to change grades for friends who were applying to graduate school. During
the summer of 2007, Barrington changed grades for himself, Jacquette and several
3
fraternity brothers using forged University grade change slips. When that method
became ineffective in part because they ran out of blank grade change slips, they
developed a plan to access the system using keylogger software.2
Secrease was with Barrington in the Registrar’s Office in August 2007 when
they attempted to install the first keylogger. They eventually installed keylogger
software on various University computers, including an office computer used by a
Registrar employee and four terminals placed in the University’s grand ballroom
during registration. The keyloggers covertly recorded the keystrokes made by
Registrar employees as they signed onto their computers, capturing their
usernames and passwords. That data was automatically transmitted to various
email accounts, including Barrington’s personal email address.
Using the surreptitiously obtained usernames and passwords, the
conspirators accessed FAMU’s grading system, changed grades, added credits for
courses which had been failed or not taken, and changed the residencies of several
non-resident students to qualify them for in-state tuition.3 The changes were made
2
A keylogger, also referred to as a keystroke logger, captures every key depression, or
keystroke, made on a computer. PCMAG.com. “Keylogging,” the practice of covertly recording
and monitoring keystrokes made on a computer, is typically accomplished through use of a
dedicated software application or piece of implanted hardware. Collins English Dictionary,
Unabridged (10th ed. 2009).
3
For example, in September 2007, twin sisters who were non-resident students paid
$1200 to have their residencies changed. Jacquette negotiated the agreement, Secrease
transmitted their information to Barrington, and Barrington effected the change. The three of
4
via the Internet from the conspirators’ home computers, campus computers at
FAMU and Florida State University, and from several wireless laptops.
A joint investigation by FAMU’s Police Department and the FBI determined
that FAMU’s protected grading system had been accessed by unauthorized means.
The investigation was triggered after a FAMU professor discovered that one of his
students, Barrington’s sister, had received two unauthorized grade changes. The
University subsequently discovered that between August and October 2007,
approximately 30 to 35 unauthorized changes were made to Barrington’s grades,
all but one from a lower grade to an A. Barrington’s sister received 5 grade
changes from F or C to A. Jacquette received approximately 43 grade changes and
Secrease received approximately 36. Ultimately, the investigation revealed that in
excess of 650 unauthorized grade changes had been made, involving at least 90
students. As a result of the grade changes and residency changes, the University
incurred a loss of $137,000 in tuition it otherwise would have received.
In September 2007, Barrington and his sister were questioned by FAMU
police. Barrington denied any knowledge of the grade changes. Within hours, and
after learning that the University had reversed the grade changes, Barrington
them split the $1200. Jonathan Huggs and Secrease had their residencies changed as well.
Huggs received a tuition reimbursement and Secrease received a 75% refund totaling $15,000-
$20,000. Non-resident students paid approximately four times the tuition in-state students paid.
5
organized a meeting at his house with Jacquette, Secrease, and some of the
students whose grades had been changed. Barrington instructed them to deny all
knowledge of the scheme if questioned by police. They agreed to re-install
keyloggers on the Registrar’s computers so that the grades could be changed a
second time. Barrington drew a map and directed students where to go to carry out
the plan. Some of them went to the Registrar’s Office where they distracted
employees so that others could install keyloggers using flash drive devices.
Afterwards, the group celebrated at a local Chili’s restaurant.
At some point, Secrease was terminated from his job at the University,
losing access to the University’s computer lab. Barrington provided funds to
Jacquette for the purchase of a laptop computer. Notwithstanding that law
enforcement had discovered the scheme and the University was reversing the grade
changes, the conspirators continued to make grade changes using the laptop.
In an effort to conceal their involvement, the conspirators made random
grade changes for students who had not been involved originally. Jacquette
explained that this was done to “throw things off by broadening the list of names”
of students whose grades had been changed. Barrington told Jacquette that random
grade changes would indicate that either there was a “flaw or hiccup” in the
computer system, or that another group of students was responsible. According to
6
Jacquette, Barrington’s “logic was, if grade changes continue[d], there [was] no
way the police would think that [he did it because] he had to be an absolute idiot to
continue doing it after they’ve already contacted him. But if it continued, they
would think that it must be someone else.”
In November 2007, search warrants were executed at the conspirators’
residences, resulting in the seizure of documents containing the usernames and
passwords of seven FAMU Registrar employees, handwritten notes outlining
classes and grades and directing certain grade changes, FAMU student transcripts,
restricted student enrollment documents, and student class information and ID
numbers. In Barrington’s room, the officers found an index card with usernames
and passwords of Registrar employees written on it. They did not find the laptop
that had been used to make the grade and residency changes. It was later
determined that Barrington had taken it for safekeeping to the home of another
student, who ultimately turned it over to the police. An analysis of the laptop
confirmed that it had been used to effect grade and residency changes.
Jacquette consented to a search of his cell phone. On his phone were the
usernames and passwords of several Registrar employees. Jacquette testified that
this information came from an index card written by Barrington.
Barrington testified at trial. He essentially denied any involvement in the
7
scheme, claiming that he was merely present during the installation of the
keyloggers, the grade changing and the concealment activities. In rebuttal, an FBI
agent who took Barrington’s Rule 11 proffer testified that Barrington admitted to
having participated in the scheme to obtain the usernames and passwords, acting as
a lookout while Secrease and Jacquette installed the keyloggers on Registrar
computers, having used the passwords, and having asking to have his sister’s and
another female student’s grades changed. The Government also called Sheerie
Edwards, a friend of Barrington’s. She testified that after discussing with
Barrington that she had not done well in certain classes, he told her that her grades
could be “fixed.” She gave him a list of the classes. Later, Barrington called her
and told her to look at her grades online. When she did, she saw that her grades
had been changed.
Barrington was convicted on all counts.
II
Barrington first contends that the district court erred in admitting into
evidence testimony from Jacquette describing how Barrington had previously
changed grades using forged instructor signatures on University grade change
slips. Barrington contends that this testimony was inadmissible under Fed. R.
Evid. 404(b). We disagree. Such rulings are reviewed for abuse of discretion. See
8
United States v. Jernigan, 341 F.3d 1273, 1280 (11th Cir. 2003); United States v.
West, 898 F.2d 1493, 1499 (11th Cir. 1990).
Prior to trial, the Government filed a notice of its intent to introduce
testimony that Barrington had fraudulently changed student grades by “forging
legitimate student grade change forms and submitting them for processing.”
Barrington objected and before Jacquette testified, the district court considered the
Government’s proffer of the challenged evidence. It found that the evidence was
relevant to Barrington’s intent, that Jacquette’s testimony sufficiently established
that Barrington had engaged in the activity, and that the probative value was not
outweighed by unfair prejudice.
Extrinsic evidence of prior bad acts is admissible under Rule 404(b) to show,
among other things, motive, preparation, knowledge, and intent. United States v.
Perez, 443 F.3d 772, 779 (11th Cir. 2006). Rule 404(b) evidence, “like other
relevant evidence, should not lightly be excluded when it is central to the
prosecution’s case.” Jernigan, 341 F.3d at 1280 (quoting United States v. Perez-
Tosta, 36 F.3d 1552, 1562 (11th Cir. 1994)). A three step test is applied in
determining the admissibility of extrinsic 404(b) evidence: (1) the evidence must
be relevant to an issue other than the defendant's character; (2) there must be
sufficient proof so that the jury could find that the defendant committed the
9
extrinsic act; and (3) the evidence must possess probative value that is not
substantially outweighed by undue prejudice. Id.
By pleading not guilty, Barrington placed his intent to participate in the
grade changing scheme in issue. See United States v. Edouard, 485 F.3d 1324,
1345 (11th Cir. 2007). The Government could accordingly introduce qualifying
404(b) extrinsic act evidence to prove intent. Id. And because he raised the “mere
presence” defense, qualifying extrinsic act evidence became “highly probative.”
United States v. Delgado, 56 F.3d 1357, 1366 (11th Cir. 1995).
Where extrinsic act evidence is offered to prove intent, “its relevance is
determined by comparing the defendant’s state of mind in perpetrating both the
extrinsic and charged offenses.” United States v. Dorsey, 819 F.2d 1055, 1060
(11th Cir. 1987). Where, as here, the state of mind required for the charged
offense and the extrinsic act is identical, the first prong of the Rule 404(b) test is
satisfied. Id.
According to Jacquette, in the summer of 2007, the subject of changing
grades came up in a discussion with Barrington. Legitimate but blank University
grade change slips were filled out with the student’s information, class, and grade
to be changed. The instructor’s and chairman’s signatures were forged, and the
form was submitted to the Dean’s office for processing by the Registrar’s office.
10
Barrington changed two or three of his own grades, Jacquette’s Economics grade,
and a “couple of more” for fraternity brothers.
This grade changing activity was essentially a precursor to the charged
scheme. One reason Barrington switched from hard copy forgery of the grade
change slips to the keylogger scheme was that a grade change for his sister Mia
had been rejected. Barrington explained to Jacquette that the forms were
numbered and he could not obtain any additional slips. Subsequent discussions led
to the idea of using passwords of Registrar employees to access the University’s
system to change grades. When their effort to obtain passwords by “eyeballing”
the employees failed, Jacquette mentioned the use of keylogger programs, which
eventually became the operational method of the charged scheme.
Jacquette’s testimony describing Barrington’s grade changing through
forgery was properly admitted under Rule 404(b). First, both the extrinsic and
charged conduct involved the same intent. Barrington’s conduct was therefore
highly probative of his intent to participate in the charged scheme. Second, there
was an adequate basis for the jury to find that Barrington actually committed the
extrinsic acts. Jacquette’s uncorroborated testimony was sufficient, since he had
personal knowledge of Barrington’s conduct. United States v. Duran, 596 F.3d
1283, 1298 (11th Cir. 2010) (citing United States v. Dickerson, 248 F.3d 1036,
11
1047 (11th Cir. 2001); United States v. Bowe, 221 F.3d 1183, 1192 (11th Cir.
2000) (“In this circuit, the uncorroborated word of an accomplice . . . provides a
sufficient basis for concluding that the defendant committed extrinsic acts
admissible under Rule 404(b).”)), cert. denied, 131 S. Ct. 210 (2010).
Finally, the probative value of the extrinsic evidence was not outweighed by
unfair prejudice. The extrinsic act evidence was not only similar to the charged
scheme in its objectives, but explained the events immediately preceding the
formation of the charged conspiracy and the reason the scheme evolved as it did.4
The district court did not abuse its discretion in admitting the challenged
404(b) evidence.
III
Barrington also contends that the district court erred in preventing him from
cross-examining Jacquette on a pending state burglary charge. A district court's
decision limiting cross-examination is likewise reviewed for abuse of discretion.
United States v. Tokars, 95 F.3d 1520, 1531 (11th Cir. 1996).
The district court disallowed cross-examination into Jacquette’s pending
state burglary charge because it was unrelated to the case, had not been reduced to
a conviction for purposes of Rule 609, and there was no basis on which to believe
4
At the conclusion of trial, the jury was appropriately instructed on its consideration of
similar act (Rule 404 (b)) evidence, pursuant to Eleventh Circuit Pattern Special Instruction 4.
12
that Jacquette’s testimony would result in a favorable disposition of his burglary
charge. Barrington argues that this ruling prevented him from demonstrating that
Jacquette was testifying in an attempt to resolve the burglary charge “and his
responsibility for a burglary.” Barrington’s argument is unpersuasive.
The Sixth Amendment guarantees a criminal defendant the right to impeach
adverse witnesses through cross-examination. United States v. Arias-Izquierdo,
449 F.3d 1168, 1178 (11th Cir. 2006). “A defendant is entitled to cross-examine
government witnesses as to any possible motivation for lying or bias, including
plea agreements.” United States v. De Parias, 805 F.2d 1447, 1452 (11th Cir.
1986), overruled on other grounds by United States v. Kaplan, 171 F.3d 1351
(11th Cir. 1999)(en banc). Where the witness is a chief government witness, the
right to full cross-examination increases in importance. Arias-Izquierdo, 449 F.3d
at 1178. And the importance of such cross-examination is not dependent on
whether or not “some deal in fact exists between the witness and the government.”
United States v. Lankford, 955 F.2d 1545, 1548 (11th Cir. 1992).
The right to cross-examine is not unlimited, however. A defendant is not
entitled to cross-examine “in whatever way, and to whatever extent, the defense
might wish,” see Delaware v. Fensterer, 474 U.S. 15, 20 (1985)(per curiam), or to
conduct unlimited inquiry into the potential bias of a witness, De Parias, 805 F.2d
13
at 1452 (citing Delaware v. Van Arsdall, 475 U.S. 673 (1986)). The Sixth
Amendment is satisfied so long as a defendant is permitted cross-examination
which “exposes the jury to facts sufficient to evaluate the credibility of the witness
and enables defense counsel to establish a record from which he properly can argue
why the witness is less than reliable.” United States v. Baptista-Rodriguez, 17 F.3d
1354, 1371 (11th Cir. 1994) (citing United States v. Bennett, 928 F.2d 1548, 1554
(11th Cir. 1991)).
A district court retains wide latitude to impose reasonable limits on cross-
examination. United States v. Williams, 837 F.2d 1009, 1015 (11th Cir. 1988);
Baptista-Rodriguez, 17 F.3d at 1370-71. While cross-examination of a key
government witness is important and free cross-examination on possible bias and
motive is presumptively favored, “the mere fact that defense counsel sought to
explore a prosecution witness's bias does not automatically invalidate ‘the court's
ability to limit cross-examination.’” United States v. Orisnord, 483 F.3d 1169,
1178 (11th Cir. 2007) (quoting United States v. Lyons, 403 F.3d 1248, 1256 (11th
Cir. 2005)).
“The test for the Confrontation Clause is whether a reasonable jury
would have received a significantly different impression of the
witness' credibility had counsel pursued the proposed line of
cross-examination.” “As long as sufficient information is elicited from
the witness from which the jury can adequately assess possible motive
or bias, the Sixth Amendment is satisfied.”
14
Orisnord, 483 F.3d at 1179 (citations omitted).
Cross-examination of Jacquette on his pending state burglary charge would
not have presented a significantly different impression of his credibility. On direct
examination, Jacquette told the jury he was in jail, charged with battery, violation
of probation and contempt of court as a result of a fight he had with Barrington.
The jury understood that Jacquette had been indicted as a co-defendant with
Barrington, had pleaded guilty and was testifying pursuant to a Plea and
Cooperation Agreement with the United States Attorney’s Office, in which the
government agreed not to file any additional criminal charges against him in
exchange for his cooperation. During cross-examination, Jacquette acknowledged
that he hoped to receive a sentence below the Guidelines through a substantial
assistance motion from the U.S. Attorney’s Office pursuant to U.S.S.G. § 5K1.1.
From this line of inquiry, a reasonable juror would appreciate that Jacquette was
motivated to testify favorably for the government in hopes of receiving a reduced
sentence.
Further, Jacquette acknowledged that Barrington had obtained a state-court
restraining order against him and that he had knowingly violated the restraining
order by fighting with Barrington, resulting in his contempt of court charge.
Cross-examination also brought out that Jacquette harbored ill feelings toward
15
Barrington, and that there had been issues between them which had escalated into
arguments and a fight, pitting one against the other as the criminal investigation
progressed.
Jacquette explained that when it became clear that criminal charges would
be brought against them for the grade changing scheme, he and Barrington argued
and had a “falling out” because Barrington told him “since he and I were close, and
we were smarter than [Secrease], that he and I should collaborate our stories and
place blame on Lawrence, and let Lawrence take the fall for it.” Jacquette
explained that a couple of days later, Secrease called him and shared that
Barrington had approached him and suggested that “him and Lawrence should
make sure that I take the blame.”
In sum, through cross-examination, Barrington’s counsel elicited sufficient
information from Jacquette to enable the jury to assess his credibility, including
possible motives and personal bias he held against Barrington. Considering that
Jacquette was testifying pursuant to a cooperation agreement with the government
and hoped to receive a reduced sentence as a result, questioning him about the
pending state burglary charge would not have presented a significantly different
impression of his credibility to the jury. At most, Jacquette’s unrelated pending
state burglary charge was only marginally relevant, particularly since there was no
16
showing that he had any agreement, understanding, or “deal” with the government
to have that charge favorably disposed of. See Francis v. Dugger, 908 F.2d 696,
702 (11th Cir. 1990)(per curiam). Accordingly, the district court did not abuse its
discretion by preventing cross-examination on his pending state burglary charges.5
See United States v. Farmer, 923 F.2d 1557, 1567 n.23 (11th Cir. 1991).
IV
Barrington next contends that Count One of the indictment was duplicative
in that it charged two distinct statutory conspiracies, resulting in an improper
joinder of offenses. He correctly points out that Count One alleged a conspiracy
which violated two statutes, sections 371 and 1349 of Title 18 of the United States
Code. Barrington contends that the district court erred in failing to require the
Government to elect between the two conspiracy statutes and that the jury should
have been instructed on the duplicative nature of Count One and the substantive
law of 18 U.S.C. § 1349.
Generally, a defendant must object before trial to defects in an indictment
and the failure to do so waives any claimed defects. Fed. R. Cr. P. 12(b)(3)(B), (e);
United States v. Ramirez, 324 F.3d 1225, 1227-28 (11th Cir. 2003)(per curiam).
Barrington did not challenge the indictment in the district court or seek to have the
5
It necessarily follows that Barrington’s claim of cumulative evidentiary error is without
merit.
17
Government elect under which of the two conspiracy statutes to proceed. Indeed,
in his Rule 29 motion for judgment of acquittal on Count One, he confined his
argument to alleged evidentiary deficiencies in the charged § 371 conspiracy, never
mentioning § 1349 or any of the contentions he now raises.
Barrington concedes that he did not raise these contentions in the district
court. Accordingly, he is deemed to have waived them, absent “good cause.”
United States v. Seher, 562 F.3d 1344, 1359 n.15 (11th Cir. 2009).6 See Fed. R.
Crim. P. 12(e) (“For good cause, the court may grant relief from this waiver.”).
And he has not demonstrated “good cause” to exempt him from application of this
waiver rule. Seher, 562 F.3d at 1359 n.15 (“Good cause is not shown where the
defendant had all the information necessary to bring a Rule 12(b) motion before
the date set for pretrial motions, but failed to file it by that date.”).
Nor did Barrington object to the district court’s use of the Eleventh Circuit’s
pattern jury instruction on a § 371 conspiracy or request “an instruction on the
duplicitous nature of the indictment” as he now urges should have been given. In
6
Absent plain error, an issue which was not raised below will not be considered. Harden
v. United States, 688 F.2d 1025, 1032 (5th Cir. Unit B 1982). There is no plain error here.
Notwithstanding that the conspiracy alleged in Count One violated two distinct conspiracy
statutes, 18 U.S.C. § 371 and § 1349, the district court, through a jury instruction expressly
requested by Barrington, limited Count One to a § 371 violation. Any claimed duplicity was
thereby rendered harmless. See Reno v. United States, 317 F.2d 499, 502 (5th Cir. 1963)
(duplicity not a fatal defect and where charge is limited to a single violation, any possible
duplicity is rendered harmless).
18
fact, defense counsel requested that Eleventh Circuit Pattern Jury Instruction 13.1
(General Conspiracy Charge, 18 U.S.C. § 371) be used.
Barrington’s failure to object to the instruction or submit an alternative
instruction results in a waiver unless the instructions which were given constitute
plain error. Fed. R. Cr. P 30(d); United States v. Belfast, 611 F.3d 783, 822 (11th
Cir. 2010). Before an error which was not raised below will be rectified,
Barrington must establish (1) error, (2) that is plain, and (3) which affected his
substantial rights. United States v. McNair, 605 F.3d 1152, 1222 (11th Cir. 2010),
cert. denied, ___U.S. ___, 131 S.Ct. 1600, 179 L.Ed.2d 499 (2011). If those three
conditions are met, we may exercise our discretion to correct the forfeited error if it
“seriously affects the fairness, integrity, or public reputation of judicial
proceedings.” Id.
The jury was correctly instructed on the single conspiracy charged in Count
One and the two objects of that conspiracy.7 Moreover, Barrington agreed to
Count One being submitted to the jury as a violation of 18 U.S.C. § 371.8 There
was no error, much less error giving rise to a likelihood of a miscarriage of justice
7
Barrington does not challenge the sufficiency of the evidence supporting the jury’s
verdict as to each object of the charged conspiracy. See United States v. Ross, 131 F.3d 970, 984
(11th Cir. 1997) (multi-object conspiracy will be upheld if the evidence is sufficient to support a
conviction of any of the alleged objects).
8
The record does not explain why the parties agreed to submit Count One to the jury
solely as a § 371 conspiracy.
19
or error which affected the fairness of the trial.
Finally, Barrington contends that he was prosecuted on a “legally erroneous
fraud theory.” Although his argument is not fully developed, he essentially
contends that the grades which were changed do not constitute a property interest
and therefore the Government’s proof did not establish the requisite financial
deprivation under the wire fraud statute, 18 U.S.C. § 1343. He argues that the jury
“was permitted to convict the defendant merely on the theory that he sought to
obtain grade changes.”
We construe Barrington’s argument as a contention that the jury’s verdict on
Count One rests on an insufficient legal theory. See United States v. Shotts, 145
F.3d 1289, 1293 n.3 (11th Cir. 1998). Notwithstanding that Barrington waived this
contention by failing to raise it in the district court, we have reviewed for plain
error. Finding no plain error, we affirm Barrington’s conviction on Count One.
Count One properly alleged a conspiracy with two objects, the commission
of a scheme to defraud by wire and computer fraud. See United States v. Woodard,
459 F.3d 1078, 1084 (11th Cir. 2006)(per curiam)(single conspiracy with two
unlawful objects). The jury expressly found Barrington guilty of conspiring to
commit both objects of the charged conspiracy.
20
The wire fraud statute, 18 U.S.C. § 1343,9 like the mail fraud statute,
protects property rights, and the “words ‘to defraud’ signify the deprivation of
something of value by trick, deceit, chicane or overreaching.” United States v.
Poirier, 321 F.3d 1024, 1029 (11th Cir. 2003) (quoting McNally v. United States,
483 U.S. 350, 358 (1987)). Similarly, the computer fraud statute, 18 U.S.C.
§ 1030(a)(4), protects “things of value” by prohibiting unauthorized access to
protected computers with the intent to defraud. 10
We have no hesitation in concluding that the Government’s theory rested on
a legally cognizable theory of conspiracy to defraud by wire and computer, through
which the conspirators deprived FAMU of its property interest in tuition. Count
One expressly alleged that the changing of student grades from failing to passing
“had the effect of awarding the students who had received the ‘F’ grades thousands
of dollars in credit hours to which they were not entitled” and that the change in
residency of out-of-state students reduced “the total tuition owed by these students
9
Section 1343 provides in pertinent part that “[w]hoever, having devised or intending to
devise any scheme or artifice to defraud, or for obtaining money or property by means of false or
fraudulent pretenses, representations, or promises, transmits or causes to be transmitted by
means of wire . . . in interstate or foreign commerce, any . . . signals . . . for the purpose of
executing such scheme or artifice, shall be fined . . . or imprisoned . . . or both.” 18 U.S.C.
§ 1343.
10
Section 1030(a)(4) provides in pertinent part that one who “knowingly and with intent
to defraud, accesses a protected computer without authorization . . . and by means of such
conduct furthers the intended fraud and obtains anything of value . . .” commits the offense of
computer fraud.
21
to FAMU by thousands of dollars.”
Barrington’s focus on whether a student’s grade constitutes a property
interest is far too narrow.11 Although changing grades was the manner in which
the scheme was carried out, the “money or property” of which FAMU was
deprived was the lost tuition resulting from the unearned hours credited to the
students, rather than the actual grades. Moreover, Barrington ignores the
demonstrated financial loss FAMU suffered as a result of the companion aspect of
the scheme, the reimbursement of tuition to the out-of-state students whose
residencies had been changed.
FAMU undeniably has a property right in tuition generated by class hours a
student registers for, as well as the higher tuition paid by non-resident students. By
changing failing grades to passing grades, the conspirators endeavored to obtain
unearned credit hours for students who were not entitled to them. Had their grades
not been changed, those students would have had to repeat the failed classes or
take equivalent hours, either of which would have generated additional tuition for
11
Notwithstanding, the Government makes a compelling argument that the students’
willingness to pay to have their grades changed from, for example, a “D” to a “B,” indicates that
they placed value in higher grades. Although a higher grade may not be quantifiable in financial
terms, the University certainly has an intangible property interest in the integrity of its grading
system. Moreover, as alleged in the indictment, increased grade point averages resulting from
the grade changes made students eligible for financial aid such as scholarships, loans and grants.
Others were able to maintain their scholarships because of their improved GPAs. In sum, there
is ample evidence that the scheme alleged in Count One deprived FAMU of property or money
and “things of value,” independent of an improved grade in and of itself.
22
FAMU. By changing the residencies of out-of-state students, the conspirators
sought to obtain tuition reimbursement for those students, who otherwise would
have been required to pay higher, non-resident tuition. The unearned credit hours
and reimbursed tuition constitute “money or property” obtained by wire fraud, as
well as “things of value” obtained through computer fraud. No plain error is
shown.
V
Barrington next contends that the evidence was insufficient to support his
convictions on Counts Three, Four and Five for aggravated identity theft. He
argues that the passwords the conspirators used to access the Registrar’s computer
system belonged to the university and do not constitute personal identity
information of the individual university employees.
Although Barrington moved for judgment of acquittal pursuant to Rule 29,
he did not move for judgment of acquittal on the aggravated identity theft counts.
Accordingly, we review the sufficiency of the evidence supporting these
convictions for plain error. United States v. Olano, 507 U.S. 725, 732-36, 113 S.Ct.
1770, 123 L.Ed.2d 508 (1993); United States v. Snipes, 611 F.3d 855, 867 n.7
(11th Cir. 2010).
23
There is no plain error. To prove a violation of 18 U.S.C. § 1028A,12 the
evidence must establish “that the defendant: (1) knowingly transferred, possessed,
or used; (2) the means of identification of another person; (3) without lawful
authority; (4) during and in relation to a felony enumerated in § 1028A(c).” United
States v. Hurtado, 508 F.3d 603, 607 (11th Cir. 2007)(per curiam)(footnote
omitted), abrogated on other grounds by Flores-Figueroa v. United States, ___
U.S. ___, 129 S. Ct. 1886, 173 L.Ed.2d 853 (2009). Wire fraud is one of the
enumerated felonies in § 1028A(c).
To gain access to the Registrar’s protected grading system, the conspirators
targeted specific “higher up” Registrar employees who they knew had access to the
system through their individualized usernames and passwords, which the
employees changed every thirty days. Secrease identified the targeted employees
and explained that the group established “very close relationships” with these
individuals so that “they could get access to their computers.”13 The keyloggers
were installed on the computers of these targeted employees to obtain their
12
Section 1028A(a)(1), provides in pertinent part that “[w]hoever, during and in relation
to any felony violation enumerated in subsection (c), knowingly transfers, possesses, or uses,
without lawful authority, a means of identification of another person shall, in addition to the
punishment provided for such felony, be sentenced to a term of imprisonment of 2 years.” 18
U.S.C. § 1028A(a)(1).
13
The username was the employee’s first name, followed by a dot, then the employee’s
last name.
24
confidential and unique passwords.
Each of the key elements required for a conviction under § 1028A was
proven. The Government proved that Barrington, without authority, knowingly
used the usernames and passwords of the Registrar employees during and in
relation to the wire fraud conspiracy. The conspirators knew that the usernames
and passwords were unique to the employees and would enable them to access the
protected grading system. Barrington and his co-conspirators targeted them for
that very purpose.
The usernames and passwords were sufficient to identify the specific
Registrar employees who had authority to access FAMU’s protected grading
system. By statutory definition, a “means of identification” includes “any name or
number” when used in conjunction with any other information “to identify a
specific individual.” 18 U.S.C. § 1028(d)(7); United States v. Mitchell, 518 F.3d
230, 234 (4th Cir. 2008). The “overriding requirement” of the definition is that the
means of identification “must be sufficient to identify a specific individual.”
Mitchell, 518 F.3d at 234(internal quotation marks omitted).
Clearly, the usernames and passwords, considered together, constituted a
“means of identification” for those specific individuals and Barrington knew that.
Flores-Figueroa, 129 S. Ct. at 1894 (“We conclude that § 1028A(a)(1) requires the
25
Government to show that the defendant knew that the means of identification at
issue belonged to another person.”). In sum, the evidence was sufficient to support
Barrington’s convictions for aggravated identity theft. There is no plain error.
Next, Barrington contends that the district court erred (1) in failing to
instruct the jury that the Government must prove that he “knowingly” used a
means of identification that he knew “belonged” to another person and (2) failed to
instruct the jury on the term “means of identification,” citing Flores-Figueroa v.
United States, supra. We review for plain error because Barrington did not object
to the district court’s instructions. Fed. R. Crim. P. 30(d); United States v. Belfast,
supra; United States v. Sanchez, 269 F.3d 1250, 1280-81 (11th Cir. 2001) (en
banc), cert. denied, 535 U.S. 942, 122 S. Ct. 1327, 152 L. Ed.2d 234 (2002).14
The district court instructed the jury that it could find Barrington guilty
“only if all of the following facts are proved beyond a reasonable
doubt:
First: That the defendant knowingly possessed a
means of identification of another person;
and
Second: That the defendant possessed the means of
identification without lawful authority; and
Third: That the defendant possessed the means of
14
In fairness to the district court, this case was tried before Flores-Figueroa v. United
States was decided.
26
identification during and in relation to a
violation of Title 18, United States Code,
Section 1343, namely wire fraud.
While the district court did instruct the jury that Barrington must “knowingly”
possess a means of identification, the court did not instruct the jury that Barrington
must know that the identification belonged to another person or define the term
“means of identification.”
However, even assuming there was arguably plain error in the instructions,
Barrington has not carried his burden to show his substantial rights were affected.
The evidence was overwhelming that Barrington and his co-conspirators knew that
the usernames and passwords they surreptitiously obtained were unique to specific
employees of the Registrar’s office. Likewise, the evidence demonstrated beyond
all reasonable doubt that they knew that the passwords were a means of verifying
those employees’ identities and their authority to access the grading system and
therefore belonged to the specific employee. Considering the strength of the
evidence and the instruction which was given, we find that the failure of the district
court to define the term “means of identification” did not affect Barrington’s
substantial rights. Nor, in the context of this case, did the absence of an instruction
on the knowing use of a means of identification belonging to another person affect
his substantial rights.
27
In this day and age of protected computer access, jurors are well equipped to
apply a common sense definition to the term “means of identification” in the
context of this case. No reasonable juror would fail to appreciate that the unique
passwords of the targeted Registrar employees belonged to them in the sense that
they were “sufficient to identify a specific individual.” Any error in the
instructions did not adversely affect the outcome of the trial or the substantial
rights of Barrington.
VI
Barrington contends that his 84 month sentence was procedurally and
substantively unreasonable. Specifically, he argues that the district court (1) erred
in calculating his base offense level under U.S.S.G. § 2B1.1(a)(1); (2) infringed on
his right against self incrimination during sentencing by inquiring and commenting
on his failure to admit guilt; (3) erred in calculating the loss amount under
U.S.S.G. § 2B1.1(b)(1)(F) by including the value of fraudulently received
academic credit obtained as a result of grade changes; (4) erred in applying
enhancements for the use of sophisticated means under U.S.S.G. § 2B1.1(b)(9)(C)
and for a leadership role under U.S.S.G. § 3B1.1(c); and (5) erred in finding that he
used device-making equipment and produced unauthorized access devices to
support the enhancement under U.S.S.G. § 2B1.1(b)(10)(A)(i) and (B)(i). He also
28
contends that his sentence was unnecessarily harsh and punitive, considering the
sentences of his co-conspirators and those who had participated in the conspiracy
but were not charged.
After United States v. Booker, 543 U.S. 220, 125 S.Ct. 738 (2005), “a
sentence may be reviewed for procedural or substantive unreasonableness.” United
States v. Ellisor, 522 F.3d 1255, 1273 (11th Cir. 2008) (internal quotation marks
omitted). We first review for procedural unreasonableness, to
ensure that the district court committed no significant procedural
error, such as failing to calculate (or improperly calculating) the
Guidelines range, treating the Guidelines as mandatory, failing to
consider the § 3553(a) factors, selecting a sentence based on clearly
erroneous facts, or failing to adequately explain the chosen
sentence-including an explanation for any deviation from the
Guidelines range.
United States v. Shaw, 560 F.3d 1230, 1237 (11th Cir.) (internal quotation marks
omitted), cert. denied, 129 S.Ct. 2847 (2009).
The procedural reasonableness of a sentence is reviewed for abuse of
discretion, “but the degree of deference that is due varies with the type of
procedural error alleged.” Ellisor, 522 F.3d at 1273 n.25. For example, “[a]
district court abuses its discretion if it applies an incorrect legal standard, follows
improper procedures in making the determination, or makes findings of fact that
are clearly erroneous.” Id. (internal quotation marks omitted). Therefore, “[w]e
29
review de novo the district court’s interpretation of the Guidelines and its
application of the Guidelines to the facts,” and we review the district court’s
findings of fact for clear error. United States v. Campbell, 491 F.3d 1306, 1315
(11th Cir. 2007) (internal quotation marks omitted). “A factual finding is clearly
erroneous when although there is evidence to support it, the reviewing court on the
entire evidence is left with the definite and firm conviction that a mistake has been
committed.” Ellisor, 522 F.3d at 1273 n.25 (internal quotation marks omitted).
Base offense level
Barrington contends that his conviction under 18 U.S.C. § 1349 was
unlawful and therefore the district court erred in relying on that conviction to set
the base offense level at 7. Barrington did not object to the calculation of his base
offense level in the district court. We review sentencing arguments raised for the
first time on appeal for plain error. United States v. Aguillard, 217 F.3d 1319, 1320
(11th Cir. 2000)(per curiam).
The district court correctly set the Base Offense Level at 7 pursuant to
U.S.S.G. § 2B1.1(a)(1), since the substantive offense Barrington was convicted of
conspiring to commit, wire fraud, carries a maximum statutory penalty of 20
years.15 There is no error, much less plain error.
15
Counts One and Two were grouped pursuant to U.S.S.G. § 3D1.2(b). Pursuant to
U.S.S.G. § 2X1.1, the Base Offense Level for conspiracy is the base offense level from the
30
Infringement on right against self incrimination
Nor do we find plain error in the district court’s query to Barrington during
sentencing as to whether he maintained that he did nothing wrong. Near the end of
the sentencing hearing, after Barrington’s allocution, the district court addressed
him:
Mr. Barrington, I sat through your trial. As you know, I was the trial
judge. I heard all of the testimony, including yours. And I have yet to
hear you say you did wrong. Do you still maintain that you did
nothing wrong?
Through counsel, Barrington declined to respond. Counsel explained that if
Barrington had not made a showing of remorse, “it’s because of my advice, not
that it’s not coming from him, Your Honor.” Barrington did not object under the
Fifth Amendment to the district court’s question. Accordingly, we review for plain
error. Aguillard, 217 F.3d at 1320.
Barrington contends that the district court’s question infringed upon his Fifth
Amendment privilege against self-incrimination. Since Barrington cites Mitchell v.
United States, 526 U.S. 314, 119 S.Ct. 1307, 143 L.Ed. 2d 424 (1999), we construe
his contention to be that the district court impermissibly drew an adverse inference
from Barrington’s refusal to answer the question and considered that inference in
determining the appropriate sentence. See Mitchell, 526 U.S. at 328-330
Guidelines for the substantive offense.
31
(determining, in cocaine conspiracy case where the defendant pled guilty, no
negative factual inference may be drawn from a defendant's silence during
sentencing with respect to the extent of her participation in the cocaine offense and
the amount of cocaine attributable to the defendant).16
The privilege against self-incrimination applies in a sentencing hearing, and
any effort to compel a defendant to testify against his will during sentencing
“clearly would contravene the Fifth Amendment.” Estelle v. Smith, 451 U.S. 454,
463, 101 S. Ct. 1866, 1873, 68 L. Ed. 359 (1981). And when a defendant shows
some sign of remorse but exercises constitutional or statutory rights to remain
silent, “the sentencing judge may not balance the exercise of those rights against
the defendant's expression of remorse to determine whether the ‘acceptance’ [of
responsibility] is adequate.” United States v. Rodriguez, 959 F.2d 193, 197 (11th
Cir. 1992)(per curiam)(determining, in a cocaine conspiracy case, that the district
court erred in denying the defendant a reduction in the offense level calculations
for acceptance of responsibility based on consideration of defendant’s intention to
appeal verdict and refusal to admit guilt in open court). Mitchell and Rodriquez,
16
But cf. Mitchell, 526 U.S. at 330 (“Whether silence bears upon the determination of a
lack of remorse, or upon acceptance of responsibility for purposes of the downward adjustment
provided in § 3E1.1 of the United States Sentencing Guidelines (1998), is a separate question. It
is not before us, and we express no view on it.”); United States v. Henry, 883 F.2d 1010, 1011-
12 (11th Cir. 1989)(per curiam)(conditioning sentence reductions on a defendant's acceptance of
responsibility does not violate the Fifth Amendment because such reductions likely will be
unavailable to defendants who choose to exercise their Fifth Amendment rights).
32
however, are factually different because they involve specific Guidelines
calculations and other matters, and did not directly address whether the defendant’s
silence, after some allocution, can bear generally upon a lack of remorse.17 We
need not address that question because the alleged error did not affect Barrington’s
substantial rights in any event.
While Barrington did not expressly address his involvement in the offense
when he allocuted, Barrington certainly attempted to portray himself in a favorable
light, alluding to what he had learned from his experience in custody, his attempts
to assist other prisoners in attaining their GEDs, and his plan to leave prison a
better person. Conspicuously absent from his allocution was any acknowledgment
of the offenses for which he had been convicted, or any semblance of remorse.
That, coupled with Barrington’s trial testimony, apparently prompted the district
court to pose the challenged query.
We acknowledge that the district court’s question (“Do you still maintain
that you did nothing wrong?”) and subsequent observation that Barrington had not
accepted responsibility might otherwise suggest that it engaged in an
impermissible balancing of Barrington’s lack of acceptance of responsibility
against his exercise of his Fifth Amendment rights. Considered in the proper
17
Barrington allocuted to some extent. There is no indication that the defendants in
Mitchell or Rodriquez did the same.
33
context, however, the question and comment, even if error, did not affect
Barrington’s substantial rights.
In allocuting, Barrington offered nothing by way of remorse, apologizing
only to his mother. And it was undisputed that Barrington did not qualify for a
downward adjustment for acceptance of responsibility under § 3E1.1 of the
Guidelines. During his trial testimony, despite overwhelming evidence against
him, Barrington maintained that he had done nothing wrong.
Barrington’s trial testimony impacted his sentence in two ways. First, the
district court found that Barrington’s trial testimony was “materially false” and
imposed a two-level enhancement for obstruction of justice pursuant to U.S.S.G.
§ 3C1.1.18 Second, contrasting the evidence of good character Barrington
presented at sentencing with his lack of acceptance of responsibility during the
trial, the district court noted the overwhelming evidence of guilt “displayed an
arrogance and contempt for the law.”
It is apparent that the district court’s question, considered in light of the
overwhelming evidence and Barrington’s demeanor at trial, was simply an attempt
to determine whether Barrington, having had time to reflect, was the least bit
18
The district court found that Barrington’s attempt to conceal from law enforcement the
laptop computer used to make the grade changes also supported the obstruction of justice
enhancement.
34
remorseful. He was not.
Further, Barrington’s failure to accept responsibility was an appropriate
consideration in the determination of his sentence. Rodriquez, 959 F.2d at 197
(“The sentencing court is justified in considering the defendant's conduct prior to,
during, and after the trial to determine if the defendant has shown any remorse
through his actions or statements.”). His lack of remorse, coupled with his false
trial testimony, obstructive conduct during the investigation, and what the district
court described as his “arrogance and contempt for the law,” certainly justified the
sentence imposed, which we note was at the low-end of the Guidelines range.
Finally, Barrington’s contention that the district court drew an adverse
inference from his silence is entirely speculative. Nothing in the district court’s
comments evinced an intent to impose a more severe sentence based on
Barrington’s failure to respond to the district court’s question.19 Barrington merely
assumes that the district court relied on an adverse inference in view of the
perceived harshness of his sentence. However, his low-end Guidelines sentence
belies any such inference having been drawn by the district court. We find no
plain error which affected Barrington’s substantial rights.
19
Compare Thomas v. United States, 368 F.2d 941, 945 n.10 (5th Cir. 1966) (district
court abused its discretion in threatening the defendant with a longer sentence if he did not
“come clean and make a clean breast of this thing for once and for all”).
35
Calculation of financial loss
The district court's determination of loss is reviewed for clear error. United
States v. Bonilla, 579 F.3d 1233, 1239 (11th Cir. 2009); United States v.
Manoocher Nosrati-Shamloo, 255 F.3d 1290, 1291 (11th Cir. 2001) (per curiam).
And we review the district court's interpretation of the Sentencing Guidelines de
novo. United States v. Jordi, 418 F.3d 1212, 1214 (11th Cir. 2005).
The Guidelines do not require a precise determination of loss. United States
v. Cabrera, 172 F.3d 1287, 1292 (11th Cir. 1999). “A sentencing court need only
make a reasonable estimate of the loss, given the available information.” United
States v. Lee, 427 F.3d 881, 893 (11th Cir. 2005). Nevertheless, a sentencing judge
may not speculate about the existence of a fact that would result in a higher
sentence, and the government must support its loss calculation with “reliable and
specific evidence.” Cabrera, 172 F.3d at 1292(internal quotation marks omitted).
The Guidelines provide that “loss is the greater of actual loss or intended
loss.” U.S.S.G. § 2B1.1. cmt. n. 3(A). “Intended loss” is the pecuniary harm that
was intended to result from the offense. Id., at cmt. n. 3(A)(ii). The Guidelines
acknowledge that a sentencing judge is in a unique position to assess the evidence
and estimate the loss and therefore “the court’s loss determination is entitled to
appropriate deference.” Id. at cmt. n. 3(C). And the Guidelines allow
36
consideration of the fair market value or replacement cost of the lost property. Id.
at cmt. n. 3 (C)(i).
Barrington contends that the district court erred in calculating financial loss
based on the value of changed grades. The only aspect of intended loss Barrington
challenges is the loss attributed to courses in which failing grades were changed to
passing grades. He argues that there was no evidence that FAMU either lost or
gained money as a result of failing grades being changed to passing grades and the
district court’s calculation of loss was therefore speculative. Barrington’s
contentions are unpersuasive, and we find no clear error in the district court’s loss
calculation.
The Guidelines acknowledge the difficulty in accurately calculating the
amount of loss caused by fraud and therefore require only a reasonable estimate of
loss. United States v. Miller, 188 F.3d 1312, 1317 (11th Cir. 1999)(per curiam);
U.S.S.G. § 2B1.1, cmt. n. 3(C). Upon review of the record, we find that the district
court’s estimate of loss was reasonable.
The district court correctly noted that the Guidelines “allow[] the Court to
consider the revenue that would have been generated, as well as the fair market
value and replacement cost.” It found that passing grades were assigned “to
students who did not earn them, and these grades could not have been obtained by
37
students without retaking the classes.” Further, it found that the “value of the
grade change is the cost for retaking the class, which is the figure that has been
used to calculate the loss amount.” This finding was based on reliable, specific
evidence.
The district court calculated intended loss at $ 141,830.42, noting that the
loss amount was a “conservative and reasonable estimate of the value of the
grades.”20 Of that amount, $ 87,579.52 represented lost tuition for changes from
out-of-state to in-state student residencies and $ 54,250.90 represented 319 credit
hours lost for 119 courses for which grades had been changed from failing to
passing or had been awarded for classes never taken or from which students had
withdrawn.21 The loss for each credit hour was determined based on whether the
student would have paid in-state or out-of-state tuition.
The district court reasonably concluded that a fraudulent grade represented
an academic credit which had a calculable monetary value. The value of the credit
hours fraudulently received by the students could be accurately calculated, and the
district court’s calculation of loss based on the value of those credit hours was a
20
According to the Florida Department of Law Enforcement (“FDLE”) forensic
examination, 650 grades had been changed, and 124 of those were changed from failing to
passing grades, resulting in more than $ 137,000 in lost revenue for FAMU. That amount
included, however, the lost tuition resulting from the changed student residencies.
21
The loss amount did not include an amount for passing grades which had been changed
to higher grades.
38
reasonable estimate based on the evidence. Testimony established that grades were
changed to enhance students’ GPAs and qualify them for the next step in their
respective academic progressions, including graduate school. Estimating intended
loss for those credit hours was hardly speculative, since the students would have
had to retake the failed course and pay tuition for the credit hours in order to
accomplish their academic goals.22
In sum, we find that the district court’s findings were not clearly erroneous
and its determination of intended loss under U.S.S.G. § 2B1.1 was a correct
application of the Guidelines.
Sophisticated means enhancement
Barrington next challenges the two-level enhancement for use of
sophisticated means. A district court's finding that sophisticated means were used
is a finding of fact reviewed for clear error. United States v. Barakat, 130 F.3d
1448, 1456-57 (11th Cir.1997). After careful review, we affirm.
The Guidelines provide for a two-level enhancement if an offense involves
“sophisticated means.” U.S.S.G. § 2B1.1(b)(9)(C). The commentary to
§ 2B1.1(b)(9)(C) instructs that “‘sophisticated means’ means especially complex or
22
This logical result was explained by FDLE Special Agent Edward Waters during trial,
who calculated FAMU’s lost revenue from the scheme.
39
especially intricate offense conduct pertaining to the execution or concealment of
an offense.” Id. at cmt. n.8 (B). Each action by a defendant need not be
sophisticated in order to support this enhancement. It is sufficient if the totality of
the scheme was sophisticated. See United States v. Finck, 407 F.3d 908, 915 (8th
Cir. 2005) (“Repetitive and coordinated conduct, though no one step is particularly
complicated, can be a sophisticated scheme.”).
The district court found that Barrington “used sophisticated means in the
execution and attempted concealment of the offense.” Referring to the evidence,
the judge noted that after the conspirators failed to obtain the unique Registrar
employee passwords by simply watching employees log in to the system, they
installed keyloggers on Registrar computers “using stealthy means and personal
contacts to do so.” When passwords were changed, the conspirators surreptitiously
gained after-hours access to the Registrar computers, installed keyloggers and
retrieved the new passwords. When the investigation began and passwords were
changed back by the University, the conspirators installed keyloggers again.
As the district court found, “[e]ach of these attempts involved a great deal of
planning and inside information,” and “[o]nce the passwords were obtained, the
defendants had to learn how to negotiate the FAMU computer system” and “logged
on on multiple occasions to practice and learn.” The district court noted that when
40
the investigation was underway, “the defendants changed random grades in an
effort to throw off the investigation, or throw it off track,” and the execution of the
scheme and the attempted concealment “involved more than minimal planning and
was sophisticated.”
The district court’s findings were supported by the evidence and therefore
are not clearly erroneous. The evidence established that Barrington and his co-
conspirators repeatedly accessed FAMU’s protected computer grading system
using log-in information retrieved through the keyloggers. The hacking involved
multiple, repetitive and coordinated steps to deceive and exploit FAMU’s protected
system. Even if each step in the scheme was not necessarily sophisticated, suffice
it to say that the scheme as a whole used sophisticated means to obtain the unique
usernames and passwords and access the Registrar’s protected computer system.
See Campbell, 491 F.3d at 1315-16.
On this record, we discern no clear error in the district court's factual
findings. Barrington’s fraud scheme involved sophisticated means, considering
that it involved repetitive and coordinated activities by numerous individuals who
used sophisticated technology to perpetrate and attempt to conceal the scheme.
The two level enhancement for use of sophisticated means was a correct
application of the Guidelines under the circumstances.
41
Leadership role enhancement
Barrington also challenges his two-level leadership-role enhancement under
U.S.S.G. § 3B1.1 (c). He contends that the scheme consisted of a “group of
students conducting a loosely coordinated college grades offense,” without a
“hierarchy among the college students, who neither worked for each other nor
acted as persons subject to the orders of others.” Barrington seemingly ignores the
evidence from which the district court made its findings in support of this
enhancement.
“A defendant’s role as an organizer or leader is a factual finding that we
review for clear error to determine if the enhancement under § 3B1.1 was applied
appropriately.” United States v. Ramirez, 426 F.3d 1344, 1355 (11th Cir.
2005)(per curiam); United States v. DeVaron, 175 F.3d 930, 937 (11th Cir. 1999)
(en banc). The leadership-role enhancement applies if “the defendant was an
organizer, leader, manager, or supervisor in any criminal activity . . . .” U.S.S.G.
§ 3B1.1(c). The defendant does not have to be the sole leader of the conspiracy for
the enhancement to apply, and the decision of the district court on this issue is
entitled to deference on appeal. Ramirez, 426 F.3d at 1355.
The district court articulated several findings in support of the leadership-
role enhancement, including that Barrington “led the scheme to change grades by
first using paper grade change forms to change his own grades, his sister’s grades,
42
Christopher Jacquette’s grades and the grades of his fraternity brothers,” and
“[w]hen that plan did not work, [he] developed another plan to change grades by
accessing the FAMU computer system” and “solicited his co-defendants and others
to help;” that Barrington organized a meeting at his residence “and outlined the
plan to reinstall keyloggers on the Registrar’s computers, change back the
corrected grades and change other grades to throw the investigation off”; that
Barrington convinced Jacquette to continue with the grade changing after Jacquette
expressed reluctance to continue; and that most of the grade changes were “made
from the defendant’s laptop computer.”
We find no error in these findings, much less clear error. Application of the
leadership-role enhancement pursuant to § 3B1.1(c) was correct, as demonstrated
by the district court’s summary of its findings and justification: “. . . because the
defendant initiated the scheme, solicited others to help, and was a driving force
behind the attempt to throw off the investigation and continue making grade
changes.”
Enhancement for device-making equipment and production of access devices
Barrington’s next challenge is directed to the two-level enhancement for use
of “device-making equipment” (keyloggers) and the production of unauthorized
access devices (usernames and passwords) under U.S.S.G. § 2B1.1(b)(10). This
section authorizes a two-level enhancement if the offense involved (A) “the
43
possession or use of any (i) device-making equipment . . . ” or (B) “the production
or trafficking of any (i) unauthorized access device . . . .”
Section 2B1.1(b)(10)(A) applies to an offense involving “the possession or
use of any (i) device-making equipment . . . .” For purposes of § 2B1.1(b)(10),
“‘Device-making equipment’ has the meaning given that term in 18 U.S.C.
1029(e)(6); and (ii) includes (I) any hardware or software that has been configured
as described in 18 U.S.C. 1029(a)(9); and (II) a scanning receiver referred to in 18
U.S.C. 1029(a)(8).” U.S.S.G. § 2B1.1 cmt. n.9(A). “‘Scanning receiver’ has the
meaning given that term in 18 U.S.C. 1029(e)(8).” Id.
“Device-making equipment” is defined to include “any equipment,
mechanism, or impression designed or primarily used for making an access device
. . . .” 18 U.S.C. § 1029(e)(6). “Scanning receiver” is defined as “a device or
apparatus that can be used to intercept a wire or electronic communication in
violation of chapter 119 [the Federal Wiretap Act, 18 U.S.C. §§ 2510-2522] or to
intercept an electronic serial number, mobile identification number, or other
identifier of any telecommunications service, equipment, or instrument.” 18 U.S.C.
§ 1029(e)(8).
Section 2B1.1(b)(10)(B) applies to an offense involving “the production or
trafficking of any (i) unauthorized access device . . . .” U.S.S.G. § 2B1.1(10)(B).
“‘Production’ includes manufacture, design, alteration, authentication, duplication,
44
or assembly.” Id. at cmt. n.9(A). “Unauthorized access device” means “any
access device that is lost, stolen, expired, revoked, canceled, or obtained with
intent to defraud.” 18 U.S.C. § 1029(e)(3); see also U.S.S.G. § 2B1.1 cmt. n.9(A)
(“‘Unauthorized access device’ has the meaning given that term in 18 U.S.C.
1029(e)(3).”).
For purposes of both the statutory definition of “device-making equipment”
and the text of U.S.S.G § 2B1.1(b)(10)(B), an “access device” means “any card,
plate, code, account number, electronic serial number, mobile identification
number, personal identification number, or other telecommunications service,
equipment, or instrument identifier, or other means of account access that can be
used, alone or in conjunction with another access device, to obtain money, goods,
services, or any other thing of value, or that can be used to initiate a transfer of
funds (other than a transfer originated solely by paper instrument).” 18 U.S.C.
§ 1029(e)(1).23
Barrington objected to the Presentence Investigation Report on the ground
that “use of key logger software . . . does not satisfy the definition of an apparatus
for intercepting the ‘communication’ of identification data.” (Dkt. 140 at 4).
23
In view of the plain language of this definition and the legislative history of the statute
containing it, we have broadly construed the definition of access device to include “innovative
means that parties use to gain unauthorized information to engage in fraudulent activities.”
United States v. Dabbs, 134 F.3d 1071, 1081 (11th Cir. 1998); see also United States v.
Sepulveda, 115 F.3d 882, 887 n.10 (11th Cir. 1997).
45
Similarly, Appellant now contends that the district court erred in treating the
keylogger software as equivalent to a scanning receiver. Without citing any
authority, he also argues that the enhancement in § 2B1.1(b)(10)(A) applies only
where the defendant employs an apparatus that remotely intercepts “the
‘communication’ of identification data.”
Appellant did not contend below and does not now contend that the
usernames and passwords obtained through use of the keylogger were not a “means
of account access” within the meaning of 18 U.S.C. § 1029(e)(1). As explained
during trial by FAMU’s Network Infrastructure manager, a keylogger is a device,
either hardware-or software-based, that captures “everything a user does, including
keystrokes typed or entered on the computer.” He explained that data captured by
a keylogger can be retrieved through automatic email, which transmits the
keystrokes to a remote email address without the knowledge of the user.
Further, Special Agent Ed Waters described the forensic examination of the
Registrar computers and Barrington’s laptop. Agent Waters confirmed that the
keyloggers installed on the Registrar computers had captured the usernames and
passwords typed into the Registrar computers and that the data had been stored in
keylogger logs. The keylogger was configured to send the data to two email
addresses associated with Barrington and his co-conspirators, and the keylogger
logs reflected that the data had been transmitted to those email addresses.
46
The explanations of these witnesses support the district court’s finding that
the keyloggers used by Barrington and his co-conspirators constituted device-
making equipment. The keyloggers captured, stored and were configured to
transmit the username and password of an authorized user, and were therefore
designed to capture and transmit, and thereby “make” the access device which
enabled the conspirators to access identifiable student accounts.24
The username and password combinations could be used to access FAMU’s
protected computer system and the students’ accounts to obtain credit hours for
classes either failed or not taken and to obtain partial refunds of tuition payments.
As discussed, those credits are unquestionably things of value.
Additionally, the conspirators obtained the usernames and passwords with
intent to defraud FAMU, thereby rendering them “unauthorized access devices” as
defined in 18 U.S.C. § 1029(e)(3) (“any access device that is . . . obtained with
intent to defraud.”).
In sum, the record evidence sufficiently supports a finding that keyloggers
constitute device-making equipment as defined in 18 U.S.C. § 1029(e)(6).
However, the district court apparently based its conclusion that the keylogger
24
We have suggested in dictum that the definition of access device in 18 U.S.C.
§ 1029(e)(1) should not be extended beyond “devices which access an individual account,” such
as a credit card, because, to find otherwise, “would ‘turn § 1029 into a general theft statute
applicable whenever a company can document a loss through fraud.’” United States v. Morris,
81 F.3d 131, 134 (11th Cir. 1996) (quoting United States v. Brady, 13 F.3d 334, 340 (10th Cir.
1993)).
47
software constituted device-making equipment on the finding that the keylogger
software constituted a “scanning receiver.” See Dkt. 169 at 46 (“I find that the
keylogger software that defendants installed constitutes a scanning receiver and
therefore meets the definition of device making equipment.”) (emphasis added).
We do not believe this finding is adequately supported by the record.
“Scanning receiver” is defined to include any “device or apparatus that can
be used to intercept a wire or electronic communication in violation of [the
Wiretap Act] . . . .” 18 U.S.C. § 1029(e)(8). The Wiretap Act provides criminal
and civil sanctions for the unlawful interception of electronic communications. See
id. §§ 2511(1), 2520. “Intercept” means “the aural or other acquisition of the
contents of any wire, electronic, or oral communication through the use of any
electronic, mechanical, or other device.” Id. § 2510(4). With exceptions not
relevant here, “electronic communication” is defined as “any transfer of signs,
signals, writing, images, sounds, data, or intelligence of any nature transmitted in
whole or in part by a wire, radio, electromagnetic, photoelectronic or photooptical
system that affects interstate or foreign commerce . . . .” Id. § 2510(12) (emphasis
added).
We have held that, to violate the Wiretap Act, an interception of electronic
communications must occur contemporaneously with their transmission. United
States v. Steiger, 318 F.3d 1039, 1048-49 (11th Cir. 2003). Accordingly, use of a
48
keylogger will not violate the Wiretap Act if the signal or information captured
from the keystrokes is not at that time being transmitted beyond the computer on
which the keylogger is installed (or being otherwise transmitted by a system that
affects interstate commerce).25
Conceivably, the keylogger software at issue here could be used to
contemporaneously capture information or signals being transmitted beyond the
user’s computer. If so, this would bring the keylogger software within the
definition of a scanning receiver as “a device or apparatus that can be used to
intercept a wire or electronic communication in violation of [the Wiretap Act].” 18
U.S.C. § 1029(e)(8) (emphasis added). However, the Government points to no
evidence in the record showing that the keylogger at issue here had that capacity
and we have found none.
Arguably, the district court’s inadequately supported characterization of the
keylogger software as a scanning receiver was merely an aspect of a more
fundamental finding that the keylogger software constituted device-making
equipment, which is fully supported by the record. We need not decide the point
because the two-level enhancement was independently supported under U.S.S.G.
25
Cf. United States v. Scarfo, 180 F. Supp. 2d 572, 582 & n.5 (D.N.J. 2001) (keylogger
configured to record a keystroke only if all the computer’s communications ports were inactive
did not entail interception of a communication); United States v. Ropp, 347 F. Supp. 2d 831,
837-38 (C.D. Cal. 2004) (Wiretap Act’s definition of electronic communications applies only to
data that is in fact being transmitted beyond a local computer by a system that affects interstate
commerce).
49
§ 2B1.1(10)(B).26
Appellant contends that “viewing or recording of personal identification
data” does not constitute “production” of such data within the meaning of U.S.S.G.
§ 2B1.1(10)(B). That is, Appellant contends that the conspirators did not
“produce” an access device within the meaning of the Guideline by acquiring the
Registrar employees’ passwords and usernames because those passwords and
usernames already existed.
Appellant is mistaken. The contention that a preexisting means of account
access cannot be “produced” is contradicted by the plain language of the Guideline
application note, which defines the term “production” to include “duplication” or
“assembly” of preexisting items. See U.S.S.G. § 2B1.1 cmt. n.9(A) (“‘Production’
includes manufacture, design, alteration, authentication, duplication, or
assembly.”). The capture, storage, and transmittal of the Registrar employees’
usernames and passwords was at least a duplication or assembly of the usernames
and passwords. That the usernames and passwords already existed when they were
duplicated or assembled does not matter.
26
See Williams v. United States, 503 U.S. 193, 203 (1992) (stating that misapplication of
the Guideline requires remand “unless the reviewing court concludes, on the record as a whole,
that the error was harmless, i.e., that the error did not affect the district court's selection of the
sentence imposed.”); United States v. Kendrick, 22 F.3d 1066, 1068 (11th Cir. 1994)
(recognizing that if a Guidelines error “did not affect the district court's selection of the sentence
imposed” the sentence should be affirmed)(quoting United States v. Jones, 1 F.3d 1167, 1171
(11th Cir. 1993)).
50
The district court expressly found that the “defendants produced
unauthorized access devices when they retrieved the passwords and user names
from the data on the keyloggers.” That finding was not clear error and the
application of the two-level enhancement for production of an unauthorized access
device under U.S.S.G. § 2B1.1(10)(B) was proper.
In conclusion, the district court did not abuse its discretion with respect to
any of Barrington’s claimed procedural errors. None of the issues have merit and
his sentence was procedurally reasonable.
Substantive Reasonableness
Having concluded that the district court’s sentence was procedurally sound,
we turn to Barrington’s challenge to the substantive reasonableness of his sentence.
Gall v. United States, 552 U.S. 38, 51, 128 S. Ct. 586, 597 (2007). The substantive
reasonableness of a sentence is reviewed for abuse of discretion, based on the
totality of the circumstances. United States v. Livesay, 525 F.3d 1081, 1091 (11th
Cir. 2008).
In arriving at a substantively reasonable sentence, the district court must
consider the sentencing factors listed in 18 U.S.C. § 3553(a), including (1) the
nature and circumstances of the offense and the history and characteristics of the
defendant; (2) the need to reflect the seriousness of the offense, to promote respect
51
for the law, and to provide just punishment for the offense; (3) the need for
deterrence; (4) the need to protect the public; (5) the need to provide the defendant
with needed educational or vocational training or medical care; (6) the kinds of
sentences available; (7) the Sentencing Guidelines range; (8) pertinent policy
statements of the Sentencing Commission; (9) the need to avoid unwanted
sentencing disparities; and (10) the need to provide restitution to victims. United
States v. Talley, 431 F.3d 784, 786 (11th Cir. 2005)(per curiam)(citing 18 U.S.C. §
3553(a)).
Although the district court must consider the § 3553(a) factors, it need not
“state on the record that it has explicitly considered each of the § 3553(a) factors or
. . . discuss each of [them].” United States v. Scott, 426 F.3d 1324, 1329 (11th Cir.
2005). It is sufficient for the district court to explicitly acknowledge that it
considered the parties’ arguments at sentencing which were based on the
sentencing factors, and that it considered the factors in § 3553(a). Id. The weight
given to each factor in § 3553(a) is “a matter committed to the sound discretion of
the district court.” United States v. Clay, 483 F.3d 739, 743 (11th Cir. 2007)
(internal quotation marks omitted). “The fact that [we] might reasonably have
concluded that a different sentence was appropriate is insufficient to justify
reversal of the district court.” Gall, 552 U.S. at 51, 128 S.Ct at 597.
52
We review for reasonableness in light of the § 3553(a) factors, including
whether the sentence “fail[ed] to achieve the purposes of sentencing as stated in
section 3553(a).” Id. Barrington bears the burden of showing that his sentence
was unreasonable. Talley, 431 F.3d at 788; United States v. Tome, 611 F.3d 1371,
1378 (11th Cir.), cert. denied, 131 S.Ct. 674 (2010). He has not met his burden.
In announcing its sentence, the district court explicitly considered the
§ 3553(a) factors, expressly noting the “facts and circumstances surrounding this
particular case,” and the seriousness of the offense. Barrington’s sentence was at
the low end of the advisory Guidelines, suggesting that the district court considered
Barrington’s mitigation arguments. While a range of reasonable sentences is
available to the district court, ordinarily a sentence within the advisory Guidelines
range is reasonable. United States v. Chavez, 584 F.3d 1354, 1365 (11th Cir.
2009), cert. denied, 131 S.Ct. 436 (2010).
Upon consideration of the parties’ briefs and a review of the record, we
conclude, based on the totality of the circumstances, that Barrington’s low-end
Guideline range sentence was consistent with the § 3553(a) factors and therefore
reasonable. United States v. Pugh, 515 F.3d 1179, 1190 (11th Cir. 2008).
Accordingly, we affirm.
AFFIRMED.
53