United States v. Armen Bislamian

FILED NOT FOR PUBLICATION APR 03 2018 UNITED STATES COURT OF APPEALS MOLLY C. DWYER, CLERK U.S. COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, No. 16-50106 Plaintiff-Appellee, D.C. No. 2:14-cr-00494-PA-1 v. MEMORANDUM* ARMEN BISLAMIAN, AKA Eric Doski, Defendant-Appellant. Appeal from the United States District Court for the Central District of California Percy Anderson, District Judge, Presiding Argued and Submitted February 15, 2018 Pasadena, California Before: BERZON and BYBEE, Circuit Judges, and GLEASON,** District Judge. Defendant Armen Bislamian appeals the imposition of three computer and Internet search and monitoring conditions attached to his supervised release. He maintains that the conditions are neither sufficiently narrowly tailored nor * This disposition is not appropriate for publication and is not precedent except as provided by Ninth Circuit Rule 36-3. ** The Honorable Sharon L. Gleason, United States District Judge for the District of Alaska, sitting by designation. reasonably related to his conviction for conspiracy to commit bank fraud, and so, under 18 U.S.C. § 3583(d), must be vacated. We disagree and affirm. 1. As Bislamian concedes, he did not object to the three conditions before the district court. We therefore may vacate the conditions only if their imposition was in plain error. United States v. LaCoste, 821 F.3d 1187, 1190 (9th Cir. 2016). We conclude that any potential error by the district court in this case was not plain, “clear[,] or obvious.” United States v. Wolf Child, 699 F.3d 1082, 1095 (9th Cir. 2012) (internal quotation marks omitted). Bislamian used various pieces of digital technology to commit his crime: a “skimming device,” credit card encoding equipment, data storage devices, and a personal computer. The district court thus could have found a “reasonabl[e] relat[ionship]” between Bislamian’s crime and criminal history, on the one hand, and the computer and computer-related devices subject to search and seizure, on the other. 18 U.S.C. § 3583(d)(1). The record does not definitively indicate that Bislamian used the Internet to commit his crime, but the district court could have inferred as much. Bislamian admitted to “obtain[ing] additional victim account holders’ information, including credit profiles and zip codes, in order to facilitate the use of the re-encoded [fraudulent] cards.” It would be reasonable to infer that Bislamian did so using the Internet, or would do so in the future using the Internet, as non-Internet sources for 2 the information obtained would be considerably more difficult to access. Given that reasonable inference, the Internet monitoring conditions were “reasonably related” to Bislamian’s crime and “involve[d] no greater deprivation of liberty than [wa]s reasonably necessary.” 18 U.S.C. § 3583(d)(1), (d)(2); cf. United States v. Bare, 806 F.3d 1011, 1017-20 (9th Cir. 2015). 2. Bislamian points to two cases—United States v. Sales, 476 F.3d 732 (9th Cir. 2007), and United States v. Barsumyan, 517 F.3d 1154 (9th Cir. 2008)—and maintains that they “make clear that it is improper to impose computer and Internet restrictions where the underlying offense was not the direct result of using the Internet.” Those cases do not make that point sufficiently clear to warrant reversal on plain error review. Barsumyan vacated a condition of supervised release under which the defendant was prohibited from accessing “any computer or computer-related devices in any manner . . . unless approved in advance.” 517 F.3d at 1157. All that Barsumyan made “clear” was that “a mere nexus between the crime and a computer does not justify proscribing the use of anything containing a circuit board or microchips.” Id. at 1161 (emphasis added and footnote omitted). This case concerns something else: searches of computers via real-time monitoring, not prohibitions or restrictions on their use. “While we have on occasion vacated 3 conditions of supervised release limiting or restricting the ability to use computers and access the Internet, we have not taken such a heavy hand with respect to general search conditions of personal computers.” Bare, 806 F.3d at 1017. Similarly, Sales does not plainly require reversal. In Sales, aside from the defendant’s use of his personal scanner and printer, “his unlawful activity did not utilize any other devices, and in no way involved or relied upon the internet, electronic bulletin boards, or other networks.” 476 F.3d at 736. The court reasoned that, as to a computer monitoring condition imposed on the defendant, “further tailoring and clarification [were] required” in light of the fact that the monitoring apparently extended to any device used by the defendant “for work or personal purposes,” whether or not he owned the device. Id. at 737. The monitoring condition was also “overbroad in other respects”: “[T]o comply with the Fourth Amendment, it must be narrowly tailored,” yet “the text g[ave] no indication as to what kinds or degrees of monitoring [were] authorized,” despite the fact that “monitoring software and/or hardware takes many forms, with greatly varying degrees of intrusiveness.” Id. at 737-38; see also United States v. Quinzon, 643 F.3d 1266, 1271-72 (9th Cir. 2011) (reviewing the breadth of various computer and Internet monitoring programs). 4 Here, Bislamian’s monitoring conditions are more tailored than those in Sales; Bislamian’s conditions list the particular devices to which they extend, and they do not extend to devices owned by any employer. Further, unlike in Sales, each condition could be related to the defendant’s crime and “the need for adequate deterrence.” Bare, 806 F.3d at 1020. Bislamian’s crime certainly involved computer use, and, unlike in Sales, the district court could properly infer that it involved Internet use. In light of the deferential standard of review applicable to this case, we conclude that the district court did not plainly err by imposing the challenged search conditions. AFFIRMED. 5