NOT RECOMMENDED FOR FULL-TEXT PUBLICATION
File Name: 08a0531n.06
Filed: August 28, 2008
No. 07-3063
UNITED STATES COURT OF APPEALS
FOR THE SIXTH CIRCUIT
UNITED STATES OF AMERICA, )
)
Plaintiff-Appellee, )
)
v. ) ON APPEAL FROM THE UNITED
) STATES DISTRICT COURT FOR THE
MICHAEL W. MEEKS, ) NORTHERN DISTRICT OF OHIO
)
Defendant-Appellant. )
)
)
Before: KENNEDY, GILMAN and GIBBONS, Circuit Judges.
JULIA SMITH GIBBONS, Circuit Judge. Pursuant to a plea agreement, defendant-
appellant Michael W. Meeks pled guilty to one count of receiving and distributing child pornography
and one count of possession of child pornography. Prior to his trial, the district court denied his
motion to suppress. The district court sentenced Meeks to 80 months incarceration, followed by 10
years of supervised release with standard and special conditions. He appeals the denial of his motion
to suppress, the conditions of his supervised release, and the length of his sentence as exceeding a
“mandatory sentence.” For the following reasons, we affirm the judgment of the district court.
I.
In November 2002, a complainant in Denmark reported to the Federal Bureau of
Investigation’s (“FBI”) internet website that the Yahoo! group Muels_Playschooool was being used
to transmit child pornography. The complainant runs an electronic mail message (“e-mail”) service
and discovered the group while servicing the account of a client who sent and received e-mails from
the group. The complainant voluntarily provided the FBI with three compact discs that contained
more than three thousand e-mail messages from the client’s account, software to view the e-mails
and associated attachments, and instructions on how to install the software. The FBI conducted an
investigation. It determined “that the name of the group had changed more than once during the
existence of the group, but that the ListID remained constant.”1 For example, the group name
Muels_Playschooool had been changed to Muels_Playdays, but the ListID remained 4453502.
The FBI was not able to access the group directly because membership in the group was by
invitation only. It obtained a search warrant to Yahoo!, Inc., and shortly after it received the results,
Yahoo shut down the group. The FBI reviewed the evidence to identify persons in the United States
who transmitted child pornography. It obtained registration information for some members of the
group and photographs and e-mails that had been posted in the group.
One of the identified group members used the e-mail address ledbootz75@yahoo.com. On
October 26, 2002, four separate e-mails, each entitled “Our Girl Kate,” were sent to the group by
ledbootz75@yahoo.com. Each e-mail contained three images of a prepubescent female wearing an
oversized fishnet blouse which exposed her lower body. Each image also was titled, “Russian
Lolitas. Professional Series.” Each image listed an internet address, russianlolitas.net.
On November 18, 2002, ledbootz75@yahoo.com sent the group three additional e-mail
messages. One e-mail contained three images of a prepubescent female wearing an oversized shirt
and underwear that was loose enough to reveal her chest and genital areas. Each of the other two
1
A ListID is a unique number attached to a Yahoo! group.
2
e-mails contained three images of a prepubescent female wearing oversized underwear; the female
in each image was lying on her side on a blanket or lying or sitting on a blanket with her legs opened.
Each of these nine images was titled “GENJA.”
The FBI tracked the internet protocol (“IP”) address2 used by ledbootz75@yahoo.com. Level
3 Communications, a company that purchases blocks of IP addresses and resells them to other
companies that allocate individual IP addresses to individual clients, leased the IP address to SBC
Global. SBC Global, an internet service provider, assigned the IP address to Dora A. Meeks, who
had a username hootbomb@sbcglobal.net. Hootbomb@sbcglobal.net accessed the internet, logged
into the ledbootz75@yahoo.com account, and sent images of child pornography interstate through
Yahoo! services in Santa Clara, California. SBC identified the owner of the hootbomb account as
Dora A. Meeks, 65934 Endley Road, Cambridge, Ohio 43725 (“Endley residence”), telephone
number (216) 251-6824, with an enrollment date of September 10, 2002. The person who created
the ledbootz75@yahoo.com e-mail account identified himself as Jimmy Gent, Cleveland, Ohio
44102, a male carpenter born on May 19, 1979, information that was not verified prior to creation
of the account. The FBI was unable to locate a Jimmy Gent with that date of birth.
After reviewing the images and an attached affidavit, Judge James L. Graham issued a search
warrant for Dora Meeks’s residence. On June 11, 2003, the FBI executed the search warrant and
interviewed Dora Meeks. The FBI confirmed that Dora Meeks paid for the internet service but
learned that it was provided to her other residence, 10605 Manoa Avenue, Brooklyn, Ohio 44144,
2
An IP address is issued by an internet service provider and is a number assigned to a specific
transmission line such as a telephone or cable through which a computer accesses the internet.
3
(“Manoa residence”) where her son Michael Meeks resided. The FBI confirmed that the internet
account at the Manoa residence was still active.
Also on June 11, 2003, the FBI conducted surveillance on the Manoa residence and
confirmed that Michael Meeks resided there.3 On that same date, Magistrate Judge Jack B. Streepy
issued a search warrant for computer equipment at the Manoa residence. The FBI executed the
search warrant on the Manoa residence on June 11, 2003. In a basement bedroom in the residence
that contained some of Michael Meeks’s personal documents, agents found a computer monitor,
printer, scanner, and keyboard. Agents did not find a central processing unit (“CPU”) containing a
hard drive. The answering machine contained several messages from a female asking Michael
Meeks to answer the telephone because she was worried about him.
One item seized during the search was a notebook of five-by-eight-inch index cards
containing detailed notes of e-mail addresses, passwords, and names of albums containing pictures
and movies. The names of the directories and files included “Sweet Lolita Sisters,” “4yr-bj,” “Reel
Kiddy Mov_Vicky_Sucking,” “dad eats tiny,” and “4 yo cummouth.” The notebook referenced a
series of images it identified as “Genja.” It contained references to the ledbootz75@yahoo.com e-
mail account and to other e-mail addresses containing ledbootz followed by different numbers along
with passwords to these other e-mail accounts. The notebook also referred to eleven accounts on an
internet site, PhotoIsland.com, a website that provides free online photography storage for up to ten
megabytes of storage space per account. FBI Special Agent Brian Vigneaux accessed the accounts
3
Brian Vigneaux provided an affidavit along with the application for a search warrant for the
Manoa residence. The above facts were all contained in the affidavit.
4
and changed the passwords in order to secure the evidence before obtaining a search warrant – but
he did not conduct a search of the contents of the accounts.
Fifteen floppy discs were seized from the bedroom cabinet. Two discs contained a series of
32 pictures entitled “Gege” that appeared to be sexually explicit images of a young girl. The seized
notebook contained a reference to “Gege” as a series associated with one of Meeks’s e-mail
addresses.
The seized notebook also contained references to e-mail addresses and passwords where
Meeks stored pictures and movies, including Yahoo! accounts MilesBeyond_440 and
Milesbeyond_led. Although he did not conduct a search, Vigneaux accessed the accounts and
changed the passwords in order to secure the evidence. The seized notebook also listed multiple
Yahoo! e-mail addresses and accounts that did not specify whether they were Yahoo! accounts.
Many of the e-mail addresses had what appeared to be photo albums linked to them.
On June 24, 2003, Magistrate Judge Streepy issued a search warrant for ArcSoft, Inc., the
Fremont, California based internet service that controlled PhotoIsland.com. The search warrant was
for Meeks’s eleven accounts at PhotoIsland.com. That same day, Magistrate Judge Streepy issued
a search warrant to Yahoo!, Inc. for accounts associated with Michael Meeks.
In response to the search warrant, on July 9, 2003, Yahoo! provided Vigneaux with e-mail
and IP history contents of the accounts. This information showed that Meeks was the group owner4
of multiple Yahoo! groups. On August 14, 2003, Magistrate Judge Streepy issued a search warrant
4
When a user creates a Yahoo! group, that person becomes the group owner. The owner can
restrict or close group membership, invite members to join the group, ban members from joining the
group, limit accessibility to the group, and control the group’s administration.
5
to Yahoo! for the briefcase contents of the groups, including the picture files associated with the
Yahoo! group accounts.
An analysis of the floppy discs seized at Michael Meeks’s residence and 16 online accounts
revealed 765 files containing child pornography. Five files contained images of child pornography
with identified victims. At least three files depicted children being penetrated or in bondage.
An indictment charged Meeks with one count of receiving and distributing material involving
the sexual exploitation of minors (18 U.S.C. § 2252(a)(2)), one count of possession of material
involving the sexual exploitation of minors (18 U.S.C. § 2252(a)(4)(B)), one count of receiving and
distributing child pornography (18 U.S.C. § 2252A(a)(2)), and one count of possession of child
pornography (18 U.S.C. § 2252(a)(5)(B)).
Meeks filed a motion to suppress the evidence seized during the search of the Manoa
residence. The district court held a suppression hearing. The district court denied Meeks’s motion
to suppress. The district court clarified that it was not relying on the determinations made by Judge
Graham. The district court read the affidavit and concluded that it was sufficient to establish
probable cause. The owner of the account had been traced to Dora Meeks who told authorities that
the account was in her name but the feed went to the Manoa residence where her son resided.
Although this evidence was probably sufficient, the district court noted that authorities also
established that Michael Meeks lived at the Manoa residence. The district court concluded that the
description of the images and their titles could be viewed as pornographic. The district court stated:
And I conclude that there was probable cause for the search for all the reasons stated,
both because it’s clear cut to me that the information they received that they thought
was pertinent to the Southern District was pertinent to the Northern District and was
involved in the affidavit, and was put in the affidavit. And two, because the images
depicted were such that the magistrate was entitled to conclude for purposes of
6
deciding whether to issue a search warrant that that was pornographic activity or was
pornographic, the items depicted were pornographic in nature.
Meeks pled guilty to one count of receiving and distributing child pornography and one count
of possession of child pornography. Pursuant to the plea agreement, Meeks generally waived his
right to appeal. But he preserved the right to appeal “(a) any punishment in excess of the statutory
maximum; (b) any sentence to the extent it exceeds the maximum of the sentencing range
determined under the advisory Sentencing Guidelines in accordance with the sentencing stipulation
in this agreement, using the Criminal History Category found applicable by this Court; (c) this
court’s order, dated April 13, 2005, denying Defendant’s motion to suppress evidence.”
The district court sentenced Meeks to 80 months incarceration, followed by 10 years of
supervised release with standard and special conditions, and ordered Meeks to pay a $200 special
assessment. Meeks filed a timely notice of appeal.
II.
A.
“The district court’s factual findings on a motion to suppress are reviewed for clear error and
its legal determinations are reviewed de novo.” United States v. Martin, 526 F.3d 926, 936 (6th Cir.
2008) (citation omitted). Whether probable cause to issue a warrant was present is also reviewed
de novo. United States v. Garcia, 496 F.3d 495, 502 (6th Cir. 2007). The court reviews the evidence
“in a light most likely to support the decision of the district court.” United States v. Frazier, 423
F.3d 526, 531 (6th Cir. 2005).
The Fourth Amendment states, in relevant part, that “no Warrants shall issue, but upon
probable cause, supported by Oath or affirmation. . . .” U.S. Const. amend. IV. Probable cause is
7
“a fair probability that contraband or evidence of a crime will be found in a particular place.” Illinois
v. Gates, 462 U.S. 213, 238 (1983). Whether probable cause is present is determined by examining
the totality of the circumstances “to make a practical, commonsense” determination of whether
probable cause is present. Id. We “ensure that the [judge] had a substantial basis for . . .
conclud[ing] that probable cause existed” Id. at 238-39 (internal quotation marks and citation
omitted). “A [judge’s] determination of probable cause is afforded great deference by the reviewing
court and should only be reversed if arbitrarily made.” United States v. Johnson, 351 F.3d 254, 258
(6th Cir.2003) (internal quotation marks and citation omitted). We “review the sufficiency of the
affidavit in a commonsense, rather than hypertechnical manner.” Id. (quoting United States v.
Greene, 250 F.3d 471, 479 (6th Cir. 2001)).
1.
Meeks argues that Vigneaux’s affidavit failed to allege sufficient probable cause to search
the Manoa residence. Specifically, he argues that “[t]here was nothing alleged in the affidavit which
would indicate that anything illegal or unlawful would be found at the Manoa Avenue residence.”
“For a search warrant to be valid, the place to be searched must be connected to the crime
alleged.” United States v. Wagers, 452 F.3d 534, 539 (6th Cir. 2006). The affidavit established that
ledbootz75@yahoo.com sent e-mail messages through the internet on October 26, 2002, and
November 18, 2002, that combined contained 21 images of minors engaged in sexually explicit
conduct. The affidavit established that the FBI tracked the IP address used by
ledbootz75@yahoo.com, which Level 3 Communications leased to SBC Global. SBC Global, an
internet service provider, assigned the IP address to Dora A. Meeks, who had a username
hootbomb@sbcglobal.net. It stated that hootbomb@sbcglobal.net accessed the internet, logged into
8
the ledbootz75@yahoo.com account, and sent images of child pornography interstate through
Yahoo! services. SBC identified the owner of the hootbomb account as Dora A. Meeks, 65934
Endley Road, Cambridge, Ohio 43725, telephone number (216) 251-6824, with an enrollment date
of September 10, 2002.
The affidavit also linked the Manoa residence to the investigation. It stated that on June 11,
2003, the FBI executed the search warrant on the Endley residence and interviewed Dora Meeks.
The FBI confirmed that Dora Meeks paid for the internet service but learned that it was provided to
her other residence, 10605 Manoa Avenue, Brooklyn, Ohio 44144, where her son Michael Meeks
resided. The FBI confirmed that the internet account at the Manoa residence was still active. Also
on June 11, 2003, the FBI conducted surveillance on the Manoa residence and confirmed that
Michael Meeks resided there.
In United States v. Terry, e-mail messages containing child pornography were intercepted
and traced to an AOL account, skippie4u. 522 F.3d 645, 647 (6th Cir. 2008). The account was one
of three accounts traced to the master account of Roy Terry, 10 Township Avenue, Cincinnati, Ohio.
Id. The skippie4u account was actually registered to Roy’s son, Brent Terry. Id. When a search
warrant was executed at the Township Avenue residence, investigators learned from Roy Terry that
Brent Terry lived at 16 Walnut Street, Cincinnati, Ohio, where he had a computer and accessed the
skippie4u account. Id. Investigators obtained and executed a search warrant for the Walnut Street
residence. Id. Brent Terry moved to suppress evidence seized at the Walnut Street residence,
arguing that there was an insufficient nexus connecting the intercepted child pornography images
to his home computer. Id. at 648. We concluded that probable cause existed, stating that “the
district court did not err in concluding that ‘as a matter of plain common sense, if . . . a pornographic
9
image has originated or emanated from a particular individual’s email account, it logically follows
that the image is likely to be found on that individual’s computer or on storage media associated with
the computer.’” Id. We relied upon evidence that (1) the skippie4u account sent images containing
child pornography, (2) Brent Terry was the registered user of the account, (3) Brent Terry lived at
16 Walnut Street at the time that he sent the e-mails, and (4) Brent Terry had a home computer
through which he accessed the skippie4u account. Id.
As the warrant here contained the same type of evidence, the evidence is sufficient to
establish probable cause in connection with the Manoa residence. The affidavit traced the
ledbootz75@yahoo.com account and linked the IP address to the Endley residence. Dora Meeks told
investigators that the account – which investigators confirmed was active – was actually in use at
the Manoa residence, where investigators confirmed that Michael Meeks resided. This established
“a fair probability that contraband or evidence” of child pornography would be found at the Manoa
residence. See Gates, 462 U.S. at 238; see also Wagers, 452 F.3d at 540 (“The evidence in our case
connecting the defendant, his computer, his IP address, and his home to the offense is considerably
stronger, particularly where the criminal activity (viewing child pornography) is much more tied to
a place of privacy, seclusion, and high-speed Internet connectivity (e.g. a home or office) than the
storing of drugs (which can take place in a car, a ditch, a hole in the ground, etc.”).5 We therefore
conclude that the affidavit established probable cause to search the Manoa residence.
5
Meeks cites several cases involving confidential informants in cases outside the child
pornography context in support of his argument that there was no probable cause to search the
Manoa residence. See, e.g., United States v. Weaver, 99 F.3d 1372, 1377-80 (6th Cir. 1996) (drugs);
United States v. Leake, 998 F.2d 1359, 1365 (6th Cir. 1993) (drugs). Here, however, there was no
such informant. While a person in Denmark notified the FBI of the Muels_Playschooool site, the
FBI conducted an investigation in order to connect Meeks to the site.
10
2.
Meeks also argues that nothing in the affidavit falls within the definition of child
pornography, including a description “of a prepubescent female ‘wearing only an oversized, fishnet
blouse thereby exposing her lower body,’” because it was not an image of a minor engaged in
sexually explicit conduct, as defined in 18 U.S.C. § 2256. Meeks does not cite any cases in support
of his argument.
Judge Graham reviewed the actual images, determining they were sexually explicit images
involving minors before issuing a warrant for the Endley residence. Magistrate Judge Streepy
reviewed Vigneaux’s affidavit, which included descriptions of the images and a statement that Judge
Graham had determined that they were child pornography, before determining probable cause existed
to search the Manoa residence.
In denying the motion to suppress, the district court clarified that it was not relying on the
determinations made by Judge Graham but instead read the affidavit and concluded that it was
sufficient to establish probable cause. The district court concluded that the description of the images
and their titles could be viewed as pornographic. The district court stated, in relevant part:
And I conclude that there was probable cause for the search . . . because the images
depicted were such that the magistrate was entitled to conclude for purposes of
deciding whether to issue a search warrant that that was pornographic activity or was
pornographic, the items depicted were pornographic in nature.
According to 18 U.S.C. § 2256, a minor is a person under the age of eighteen, and sexually
explicit conduct includes, among other things, “lascivious exhibition of the genitals or pubic area
of any person.” Id. § 2256(1), (2)(A)(v). The descriptions of the images, along with their titles and
other information stated in the affidavit, were sufficient to establish probable cause as they described
11
lascivious images of the genitals or pubic areas of minors. For example, the email entitled “Our Girl
Kate,” contained images entitled, “Russian Lolitas. Professional Series.” A Lolita is a “seductive
adolescent girl.” The American Heritage Dictionary of the English Language, Fourth Edition.
Retrieved from Dictionary.com website. The use of the term “Russian Lolitas,” along with the
reference to “Our Girl Kate,” and the description of the images of a prepubescent female wearing
an oversized fishnet blouse which exposed her lower body were sufficient to establish probable cause
of child pornography. Similarly, the descriptions of a prepubescent female wearing an oversized
shirt and underwear that was loose enough to reveal her chest and genital areas and of a prepubescent
female wearing oversized underwear while either lying on her side on a blanket or lying or sitting
on a blanket with her legs opened are not poses one would expect a young girl to be in and are
suggestive of child pornography. The affidavit established probable cause that child pornography
would be found.
3.
Meeks argues that the search warrant was overbroad and did not describe the things to be
seized, in violation of the Fourth Amendment.6 The warrant was for computer-related equipment,
discs, records, and notes and diaries related to child pornography. “A search warrant must
particularly describe the things to be seized, but the description, whose specificity will vary with the
circumstances of the case, will be valid if it is as specific as the circumstances and the nature of the
activity under investigation permit.” Guest v. Leis, 255 F.3d 325, 336 (6th Cir. 2001) (internal
6
Meeks asserts that “the command of the search warrant did not authorize the computer itself
to be searched or downloaded.” Given that agents did not find a central processing unit (“CPU”)
containing a hard drive during the search, this argument is moot. Furthermore, in support of this
portion of his argument, Meeks cites Warshak v. United States, which has been vacated. 490 F.3d
455 (6th Cir. 2007), reh’g en banc granted, opinion vacated Oct. 9, 2007.
12
quotation marks and citation omitted). Here, the warrant described computer equipment and
computer-related materials, which is as specific as the circumstances allowed, given the information
investigators had. The notebook and the computer discs are within the realm of the search warrant.
To the extent Meeks argues that the search warrant did not cover the contents of the PhotoIsland.com
and Yahoo! accounts, Vigneaux accessed the accounts to change the passwords but did not peruse
their contents until he obtained separate search warrants. Meeks’s Fourth Amendment rights were
not violated.
4.
Meeks argues that the warrant infringed on his First Amendment rights because his
computer- related items were seized without a prior adversary hearing, citing Stanford v. Texas, 379
U.S. 476, 485 (1965) (“In short, what this history indispensably teaches is that the constitutional
requirement that warrants must particularly describe the ‘things to be seized’ is to be accorded the
most scrupulous exactitude when the ‘things’ are books, and the basis for their seizure is the ideas
which they contain.”). The same probable cause standard applies when the First Amendment is
implicated as applies when there is no First Amendment concern, i.e., there is no heightened
standard. New York v. P.J. Video, Inc., 475 U.S. 868, 875 (1986) (“We think, and accordingly hold,
that an application for a warrant authorizing the seizure of materials presumptively protected by the
First Amendment should be evaluated under the same standard of probable cause used to review
warrant applications generally.”) Furthermore, child pornography is not protected by the First
Amendment. New York v. Ferber, 458 U.S. 747, 764-66 (1982). Thus, we conclude that there was
no violation of Meeks’s First Amendment rights.
5.
13
Meeks argues that information obtained during the search “was then used to obtain additional
search warrants for other services,” resulting in an illegal search that must be suppressed. To the
extent that Meeks is referring to the notebook containing user names and passwords, it was not
illegally obtained and fell within the realm of the search warrant. Thus, subsequent warrants
obtained to access PhotoIsland and Yahoo! accounts need not be suppressed.
B.
Meeks appeals the conditions of supervised release imposed and the length of his sentence.
The government argues that, pursuant to the plea agreement, he waived his right to appeal these
aspects of his sentence.
“This Court reviews the question of whether a defendant waived his right to appeal his
sentence in a valid plea agreement de novo.” United States v. Murdock, 398 F.3d 491, 496 (6th Cir.
2005) (citation omitted).
“It is well settled that a defendant in a criminal case may waive his right to appeal his
sentence in a valid plea agreement.” United States v. Smith, 344 F.3d 479, 483 (6th Cir. 2003). “The
sine qua non of a valid waiver is that the defendant enter into the agreement knowingly and
voluntarily.” United States v. Fleming, 239 F.3d 761, 764 (6th Cir. 2001). A defendant “may waive
constitutional or statutory rights then in existence as well as those that courts may recognize in the
future.” United States v. Bradley, 400 F.3d 459, 463 (6th Cir. 2005), cert. denied, 546 U.S. 862
(2005). “When a defendant waives his right to appeal his sentence in a valid plea agreement, this
Court is bound by that agreement and will not review the sentence except in limited circumstances.”
Smith, 344 F.3d at 483 (citation omitted).
14
Pursuant to the plea agreement, Meeks generally waived his right to appeal. The plea
agreement stated, in relevant part:
Defendant acknowledges having been advised by counsel of Defendant’s rights, in
limited circumstances, to appeal the conviction or sentence in this case, including the
appeal right conferred by 18 U.S.C. § 3742, and to challenge the conviction or
sentence collaterally through a post-conviction proceeding, including a proceeding
under 28 U.S.C. § 2255. Defendant expressly waives those rights, except as reserved
below. Defendant reserves the right to appeal (a) any punishment in excess of the
statutory maximum; (b) any sentence to the extent it exceeds the maximum of the
sentencing range determined under the advisory Sentencing Guidelines in accordance
with the sentencing stipulation in this agreement, using the Criminal History
Category found applicable by this Court; (c) this court’s order, dated April 13, 2005,
denying Defendant’s motion to suppress evidence. Nothing in this paragraph shall
act as a bar to the Defendant perfecting any legal remedies Defendant may otherwise
have on appeal or collateral attack respecting claims of ineffective assistance of
counsel or prosecutorial misconduct.
Meeks initialed the page containing the waiver. His initials indicate that he was aware of the waiver
at the time he entered into his plea agreement. He also signed the plea agreement, which stated that
he had read the entire agreement and discussed it with his attorney. The plea agreement explicitly
explained that initialing each page indicated that Meeks “read, understood, and approved the
provisions on that page” and that he entered into the plea agreement voluntarily.
Furthermore, at his change-of-plea hearing, Meeks indicated that he had read the plea
agreement, had discussed it with his attorney, and had had his questions about it answered. At the
hearing, the government indicated that Meeks had waived his right to appeal, other than punishment
in excess of the statutory maximum and the denial of the motion to suppress. Furthermore, the
district court stated:
No Defendant can waive ineffective assistance of counsel or prosecutorial conduct
[sic], and you did not waive your right to appeal or your right to appeal my ruling,
which denied your motion to suppress in this case. You didn’t waive that, but as Mr.
15
Mancino probably explained, you waived most of your appeal rights, including
collateral attack rights. Do you understand that?
Meeks responded, “Yes.” The district court found that Meeks’s plea of guilty was knowing and
voluntary.
In the plea agreement, Meeks stipulated that the statutory maximum sentence was 20 years
for the count of receiving and distributing child pornography with a mandatory minimum sentence
of 5 years and that the statutory maximum sentence was 10 years for possession of child
pornography. Furthermore, each count carried a maximum term of supervised release of life. He
further stipulated to special conditions of supervised release. Meeks’s sentence of 80 months
incarceration, followed by 10 years of supervised release with standard and special conditions, is not
in excess of either the statutory maximum or the sentencing range pursuant to the Sentencing
Guidelines for offense level 28 and criminal history category I (78 to 97 months). Because Meeks
voluntarily and knowingly entered into a plea agreement in which he waived his right to appeal, he
waived the right to appeal his sentence and the conditions of supervised release.
III.
For the foregoing reasons, we affirm the judgment of the district court.
16