F I L E D
United States Court of Appeals
Tenth Circuit
PUBLISH
DEC 2 2003
UNITED STATES COURT OF APPEALS
PATRICK FISHER
Clerk
TENTH CIRCUIT
UNITED STATES OF AMERICA,
Plaintiff-Appellant,
v. No. 02-1388
JOHN F. ROBERTSON,
Defendant-Appellee.
Appeal from the United States District Court
for the District of Colorado
(D.C. No. 02-CR-2-N)
James C. Murphy, Assistant United States Attorney (John W. Suthers, United
States Attorney, Linda A. McMahan and Jennifer Mardosz, Assistant United
States Attorneys, with him on the briefs), Denver, Colorado, for Plaintiff-
Appellant.
Raymond P. Moore, Assistant Federal Public Defender (Michael G. Katz, Federal
Public Defender, and John T. Carlson with him on the brief), Denver, Colorado,
for Defendant-Appellee.
Before MURPHY, Circuit Judge, BRORBY, Senior Circuit Judge, and
McCONNELL, Circuit Judge.
McCONNELL, Circuit Judge.
Some of the great virtues of the internet – its flexibility, universal
accessibility, and privacy – also make it an especially potent venue for sexual
predators to communicate with minors regarding illicit sexual encounters. The
anonymity of these communications, in particular, serves both to ensnare the child
and to thwart the protective efforts of law enforcement. Accordingly, at the
instruction of Congress, the Sentencing Commission has imposed a two-point
enhancement when the internet is used either to induce a minor to engage in
prohibited sexual conduct or to facilitate travel for that purpose. To counteract
the enforcement difficulties, child protective agencies turn the feature of
anonymity against the would-be predators by setting up sting operations designed
both to apprehend violators and to create a credible deterrent to predatory use of
the internet.
This case involves interpretation of one of the guidelines that enhance
sentences for child sexual abuse offenses involving use of a computer. The
guideline, by its terms, reaches broadly to cover any instance in which a
“computer or an Internet-access device” is used to “facilitate transportation or
travel, by the victim or a participant, to engage in prohibited sexual conduct.”
U.S.S.G § 2A3.2(b)(3) (the “Guideline”). Although the Guideline unquestionably
applies to direct communications with minors under the age of 16, with adults
with supervisory control over the minors, and with undercover agents posing as
-2-
minors as part of a sting operation, the district court held that it does not apply to
communications with undercover agents posing as adults with supervisory control
over fictitious minor victims. Because we find this interpretation inconsistent
with the language and purpose of the Guideline, we reverse.
FACTS
The facts in this case are undisputed. The following is a summary of the
stipulation of facts from the plea agreement.
In early summer, 2001, Defendant John F. Robertson contacted an internet
site advertising “fantasy tours,” which is apparently a euphemism for trips
involving paid sexual encounters. Unbeknownst to Mr. Robertson, this was a
sting operation. He contacted the site by e-mail and requested further
information. An undercover officer from the Sheriff’s Department of Pueblo
County, Colorado, sent Mr. Robertson a questionnaire to determine his
preferences. Mr. Robertson completed the questionnaire that day, indicating his
interest in “hot teen boys” and stating his age preference as “[t]he younger the
better – late teens is preferable.” Later, he narrowed his request to white boys
between the ages of thirteen and fifteen, preferably with long hair. In graphic
language not necessary to quote here, Mr. Robertson stated his desire to engage in
anal and oral sex with the boys; he also proposed the use of illegal drugs “to help
get the party started.” Plea Agreement & Statement of Facts Relevant to
-3-
Sentencing (“Plea Agreement”) at 4, App. 13.
During the course of communications between Mr. Robertson and the
undercover officer, the undercover officer accidentally sent a message from his
e-mail account at the Colorado Crimes Against Children Task Force. Mr.
Robertson, a former intelligence analyst for the Federal Bureau of Investigation,
e-mailed in reply: “Why did I get a response from the Colorado Crimes Against
Children Task Force detailing available tours? This sounds like some kind of
sting operation. I await your reply – JR.” Plea Agreement at 3, App. 12. The
undercover officer replied that he used the Colorado Crimes Against Children
address as part of his cover. He explained that it was his practice to “sit on
several high level committees in regards to child welfare so [he] can keep [his]
finger on the pulse of what the do-gooders are doing and in what direction they
are moving.” Id. Mr. Robertson answered: “Thanks for clearing everything
up. . . . [B]ear with me. I don’t want to spend several years living in ‘public
housing’ if you get my drift.” Id. He then proceeded to discuss the details of his
upcoming “fantasy tour.”
Over the course of many months, Mr. Robertson and the undercover officer
used e-mail and the internet to coordinate the details of Mr. Robertson’s fantasy
tour, including date, itinerary, price, and mode of payment, as well as the
identification of two fictitious boys, “Michael” and “Andrew,” supposedly aged
-4-
thirteen and fourteen, who met Mr. Robertson’s specifications. Mr. Robertson
paid a down payment in advance of the trip.
On December 27, 2001, Mr. Robertson flew from his home in Pennsylvania
to Colorado Springs, Colorado, where he met the undercover officer, confirmed
his identity, and tendered the balance of the price for the “tour.” He brought two
Sony Walkman portable CD players as Christmas gifts for “Michael” and
“Andrew.” He was arrested on the spot.
In federal district court, Mr. Robertson was charged with knowingly
traveling in interstate commerce for the purpose of engaging in a sexual act with a
person under eighteen years of age, in violation of 18 U.S.C. § 2423(b). He pled
guilty. In the plea agreement, Mr. Robertson and the government agreed the
United States Sentencing Guidelines established a base level of twenty-one for
Mr. Robertson’s offense. See U.S.S.G. § 2A3.2(a)(2). The government, however,
contended that Mr. Robertson’s use of a computer should increase his offense
level by two under § 2A3.2(b)(3) of the Guidelines. Mr. Robertson disputed this
adjustment.
The district court rejected the government’s argument and ruled that the
two-point enhancement was not applicable:
I’ve also refused to place any upward adjustment for use
of a computer, even though it is plain to me that the
defendant did use a computer and that he did use the
computer to persuade, induce, entice or coerce this
-5-
fictitious victim into engaging in this prohibited sexual
conduct.
Tr. 31, App. 95. In a written Memorandum of Sentencing Hearing and Report of
Statement of Reasons, at 2, App. 101, the district court explained: “This case
appears to be one which falls outside the guideline’s plain language defining who
is a ‘victim,’ because, simply stated, the undercover officer did not represent to
defendant that he (the officer) had not attained the age of sixteen years.”
After making certain adjustments, described below, the district court
sentenced Mr. Robertson to two years in prison, with three years of supervised
release, which is the top of the applicable guideline range. The court explained:
I think his crime is a serious crime. He came here
intending to victimize two young boys. They were
fictitious, but they weren’t known by him to be
fictitious. The language in his e-mails concerning those
young boys is nothing short of brutal, so he deserves a
sentence at the top of this guideline range.
Tr. 31, App. 95.
The district court granted two downward adjustments. One of those – a
three-point adjustment for acceptance of responsibility, is not disputed. A second
three-point downward departure was made in response to what the district court
called an “apparent drafting lacuna in the guidelines,” which would have the
effect of sentencing defendants who have no sexual contact with a child more
severely than those who do. Sentencing Mem. at 3, App. 102. The district court
-6-
departed downward “to a level at which defendant would have been sentenced if
he had made sexual contact with his fictitious victims.” Id. The government and
Mr. Robertson agree that this downward departure required as a condition
precedent the conclusion that the computer-use enhancement did not apply. The
effect of reversing the district court with regard to the application of the
computer-use enhancement, therefore, would be to increase Mr. Robertson’s total
offense level by five points, nearly doubling his prison sentence.
The government appeals the district court’s ruling that the enhancement for
use of a computer in committing the crime was not applicable. Exercising
jurisdiction under 18 U.S.C. § 3742(b)(2), we reverse.
DISCUSSION
The district court’s interpretation of a sentencing guideline is a question of
law that we review de novo. See United States v. Smith, 133 F.3d 737, 744 (10th
Cir. 1997); United States v. Farnsworth, 92 F.3d 1001, 1007 (10th Cir. 1996).
“We interpret the Sentencing Guidelines according to accepted rules of statutory
construction.” United States v. Reaves, 253 F.3d 1201, 1203 (10th Cir. 2001). In
interpreting a guideline, we look at the language in the guideline itself, as well as
at the “interpretative and explanatory commentary to the guideline” provided by
the Sentencing Commission. United States v. Frazier, 53 F.3d 1105, 1112 (10th
Cir. 1995); see also 18 U.S.C. § 3553(a)(5). “[C]ommentary in the Guidelines
-7-
Manual that interprets or explains a guideline is authoritative unless it violates the
Constitution or a federal statute, or is inconsistent with, or a plainly erroneous
reading of, that guideline.” Stinson v. United States, 508 U.S. 36, 38 (1993).
The guideline at issue in this case mandates a two-level enhancement “[i]f a
computer or an Internet-access device was used to (A) persuade, induce, entice, or
coerce the victim to engage in prohibited sexual conduct; or (B) facilitate
transportation or travel, by the victim or a participant, to engage in prohibited
sexual conduct.” U.S.S.G § 2A3.2(b)(3). Mr. Robertson argues that the
application notes accompanying the Guideline preclude its application to cases in
which there was neither an actual minor victim nor an undercover officer posing
as one. The government argues that both subsection (A) and subsection (B) apply
in this case. Because we conclude that subsection (B) applies, we will not
consider applicability of subsection (A).
I. The Rationale for Enhanced Sentencing in Cases Involving
Computers
The enhancement at issue here was added in response to the Child
Protection and Sexual Predator Punishment Act of 1998, Pub. L. No. 105-314,
112 Stat. 2974, which addressed the problem that cyberspace provides an
increasingly common and effective medium by which would-be sexual predators
can contact minors, or persons in control of minors, to arrange for sexual
-8-
encounters. See generally United States v. Reaves, 253 F.3d 1201, 1203-05 (10th
Cir. 2001) (discussing the dangers of the internet in the context of another
computer-based enhancement). Children commonly make wide use of the
internet, often with little parental supervision, and sometimes with a dangerous
degree of naivete. Behind the anonymous veil of the internet, predators can
locate young people in teen chat rooms or other child-friendly sites, assume false
identities, establish relationships, deploy pornographic images and other sexual
enticements, and arrange for meetings – all shielded from the eyes of parents,
police, or other protectors. As Representative Hutchinson explained shortly
before the passage of the 1998 act:
[B]y the year 2002, 45 million children will use the
Internet to talk with friends, do homework assignments
and explore the vast world around them. Computer
technologies and Internet innovations have unveiled a
world of information that is literally just a mouse click
away.
Unfortunately, individuals who seek children to
sexually exploit and victimize them are also a mouse
click away. Sex offenders who prey on children no
longer need to hang out in parks or malls or school
yards. Instead, they can roam from web site to chat
room seeking victims with little risk of detection.
The anonymous nature of the online relationship
allows users to misrepresent their age, gender or
interests. Children are rarely supervised while they are
on the Internet. Unfortunately, this is exactly what
cyber-predators look for.
144 Cong. Rec. H10,571 (daily ed. Oct. 12, 1998). See also 144 Cong. Rec.
-9-
S10,522 (daily ed. Sept. 17, 1998) (statement of Senator Hatch) (“[W]e must also
be vigilant in seeking to ensure that the Internet is not perverted into a hunting
ground for pedophiles and other sexual predators, and a drive-through library and
post office for purveyors of child pornography. . . . One step that we can take is to
ensure strong penalties for those who use the Internet for these horrible
purposes.”).
Besides facilitating direct seduction of children, the internet also allows
panderers to advertise their wares anonymously in a national or even international
market, making it much easier for them to find willing customers. Moreover,
because these customers may come from afar and visit only briefly, it is more
difficult for law enforcement to track them down than it is to track down those
attracted by more traditional come-ons. Cf. H.R. Rep. No. 104-90, at 3-4 (1995),
reprinted in 1995 U.S.C.C.A.N. 759, 760-61, quoted in Reaves, 253 F.3d at 1205
(“Distributing child pornography through computers is particularly harmful
because it can reach an almost limitless audience. Because of its wide
dissemination and instantaneous transmission, computer-assisted trafficking is
also more difficult for law enforcement officials to investigate and prosecute.”)
To counter these evils, the 1998 act (among other things) directed the
Sentencing Commission to impose harsher penalties on sexual criminals who used
computers. Pub. L. No. 105-314, § 503, 112 Stat. at 2980-81. That directive
-10-
ultimately resulted in the addition of several similar enhancements, including the
one at issue here. See U.S.S.G. app. C, amend. 592, at 31-48 (Supp. 2002). In
interpreting its instructions from Congress, the Sentencing Commission concluded
that the new enhancements were to “ensure that persons who misrepresent
themselves to a minor, or use computers or Internet-access devices to locate and
gain access to a minor, are severely punished.” Id. at 48.
Law enforcement has responded to the new threat of cyber-predators by
setting up sting operations and enforcing the increased penalties now available
under the Guidelines. If a would-be predator cannot know whether the person
with whom he communicates is an undercover agent rather than a susceptible
minor or a pimp, and if the penalties for using the computer medium are
especially severe, the hope is that pedaphilic predators will cease to find
cyberspace such a safe and attractive hunting ground.
II. The Guideline
In this case, Mr. Robertson used the internet and e-mail to find and make
arrangements with an undercover officer he believed to have access or control
over young boys to travel from Pennsylvania to Colorado to meet two (fictitious)
boys, aged thirteen and fourteen, for sex and drug use. This conduct falls within
the plain language of subsection (b)(1)(B) of Guideline 2A3.2, which imposes a
-11-
two-level sentence enhancement “[i]f a computer or an Internet-access device was
used to . . . (B) facilitate transportation or travel, by the victim or a participant, to
engage in prohibited sexual conduct.” U.S.S.G § 2A3.2(b)(3).
This subsection applies when four conditions are met: (1) a computer or an
Internet-access device must be used, (2) to facilitate transportation or travel, (3)
by either a victim or a participant, (4) for the purpose of engaging in prohibited
sexual conduct. The district court expressly found, and Mr. Robertson does not
dispute, that a computer was used in the course of the offense. No one disputes
that the intended conduct falls within the category of “prohibited sexual conduct.”
According to Application Note 1, “prohibited sexual conduct” includes “any
sexual activity for which a person can be charged with a criminal offense.”
U.S.S.G. § 2A3.1, cmt. n.1 (cross-referenced in U.S.S.G. § 2A3.2, cmt. n.1). Mr.
Robertson pled guilty to knowingly traveling in interstate commerce for the
purpose of engaging in a sexual act with a minor, in violation of 18 U.S.C. §
2423(b), so his conduct clearly falls within this definition.
At the sentencing hearing and in his brief, Mr. Robertson disputed that he
used the computer to “facilitate” transportation or travel. Application Note 5
makes clear that the computer use to which the Guideline applies does not include
communications with a third party, such as use of an airline’s internet site to
purchase airline tickets. Mr. Robertson is therefore correct that his use of the
-12-
internet to obtain airline tickets is irrelevant. But the plea agreement stipulates
that Mr. Robertson and the undercover agent “communicated via e-mail over the
next several months coordinating the details of the tour and Defendant’s travel
plans.” Plea Agreement at 4, App. 13. 1 The communication covered, at the very
least, the date, time, and place of Mr. Robertson’s arrival in Colorado; the price
and method of payment; and plans regarding sexual activities and drug use.
Moreover, it is undisputed that the entire trip was made possible by Mr.
Robertson’s use of the internet to search for, and locate, a “fantasy tour” to his
liking.
Because the district court found that the enhancement did not apply in the
absence of an actual victim, it did not reach the question of whether Mr.
Robertson’s computer use facilitated his travel. However, in a companion case to
1
In his brief, Mr. Robertson states:
He and the undercover officer resumed their e-mail
exchange. They did not, contrary to the claim made in
the government’s opening brief, “coordinate[] the details
of . . . [Mr. Robertson’s] travel plans.” (As will become
clear later, the question whether Mr. Robertson arranged
or “facilitated” his travel to Colorado has implications
on his eligibility for the use-of-a-computer
enhancement.)
Appellee’s Answer Br., at 4 (brackets and ellipses in original; citation omitted).
The government’s statement, however, is a direct quotation from the factual
stipulation in the plea agreement, to which Mr. Robertson agreed, and which he
may not now attempt to challenge. To the extent Mr. Robertson’s argument
regarding “facilitation” is based on this attempted repudiation of the facts
stipulated in the plea agreement, it is without merit.
-13-
this one, involving almost identical facts and arising from the same sting
operation, that question was answered affirmatively by the district court and
briefed on appeal to this Court. See United States v. McGraw, No. 02-1407, slip
op. at 4-5 (10th Cir. Dec. 2, 2003) (published). Our opinion in McGraw holds
that the defendant did use a computer to “facilitate” his travel, because the
computer made it substantially easier for him to find and book a “fantasy tour,” as
well as to negotiate the details of the trip. See id., slip op. at 7. That analysis
applies equally to Mr. Robertson.
The final condition set forth in U.S.S.G § 2A3.2(b)(3)(B) is that the travel
facilitated by use of the computer or internet must be by “the victim or a
participant.” In interpreting this language, the district court placed great weight
on Application Note 1, which defines “victim” as “(A) an individual who, except
as provided in subdivision (B), had not attained the age of 16 years; or (B) an
undercover law enforcement officer who represented to a participant that the
officer had not attained the age of 16 years.” In this case, there was no actual
minor victim, and the undercover law enforcement officer posed not as a minor
but as a person with control of sexually pliant young boys. The court reasoned
that the Guideline therefore does not apply:
Subsection B [of the application note definition of
“victim”] appears to be an attempt to address a sting
operation. Subsection A appears to be an attempt to
address a situation where there is an actual victim not
-14-
having attained the age of 16 years.
The situation which is completely left out is a
situation where, as here, the undercover officer doesn’t
represent that the officer had not attained the 16 years,
but, rather, represents that the officer has control of
fictitious victims who have not attained the age of 16.
That situation is simply not addressed by the
language of the Sentencing Commission. And therefore,
I am satisfied the 2-level increase does not apply in this
situation.
Tr. 26, App. 90.
The flaw in this analysis is that the only use of the term “victim” in
subsection (B) of the Guideline is the reference to travel by “the victim or a
participant.” U.S.S.G § 2A3.2(b)(3)(B) (emphasis added). Thus, under the plain
language of the Guideline, it does not matter whether there was a “victim”
(meaning either an actual minor victim or an undercover officer posing as a
minor); the Guideline applies if the computer or internet is used to facilitate travel
by a “participant.” Application Note 1 defines “participant” as follows:
A “participant” is a person who is criminally responsible
for the commission of the offense, but need not have
been convicted. A person who is not criminally
responsible for the commission of the offense (e.g., an
undercover law enforcement officer) is not a participant.
U.S.S.G § 3B1.1, cmt. n.1 (cross-referenced in U.S.S.G § 2A3.2(b)(3), cmt. n.1).
Under this definition, Mr. Robertson was a “participant,” and because it was his
travel that was “facilitated” – not the victim’s – the Guideline applies,
notwithstanding the fact that there was no “victim.”
-15-
All four conditions set forth for application of the Guideline are therefore
present. A computer or internet-access device was used to facilitate travel by a
participant for prohibited purposes. Moreover, while it is not necessary to look
beyond the plain language, we note that this interpretation is consistent with the
purposes of the provision. The Guideline was intentionally crafted to include
sting operations within its scope; that is an effective way to deter would-be
predators from using the internet for these purposes. There is no reason to limit
application of the Guideline to just one kind of sting operation, one in which the
undercover officer poses as a child. That may be a sensible restriction on the
scope of subsection (A), where the gravamen of the enhancement is use of the
computer to entice a child, but it bears no logical relation to subsection (B),
where the gravamen is use of the computer to facilitate travel by the participant
himself. For that purpose, it matters not at all whether the undercover officer
making the arrangements on the other end is a virtual victim or a virtual pimp.
The evil is the same.
III. The Application Notes
Although Mr. Robertson argues – incorrectly, as we have already explained
– that the plain language of the Guideline supports his position, his principal
reliance is on the interplay of two application notes. See Summary of Argument,
-16-
Appellee’s Answer Br. 4-5. Application Note 5 includes a definition of “use of
computer or internet-access device,” and Application Note 1 includes a definition
of “victim.” Neither application note, read independently, supports Mr.
Robertson’s interpretation of the Guideline; each is addressed to a question other
than that posed by this case. But when the definition of “victim” from
Application Note 1 is read into the definition of computer “use” in Application
Note 5, Mr. Robertson argues that the result supports his interpretation of the
Guideline.
Application Note 5 is addressed to use of the internet for such collateral
purposes as making airline ticket reservations. It states:
Subsection (b)(3) is intended to apply only to the use of
a computer or an Internet-access device to communicate
directly with the victim or with a person who exercises
custody, care, or supervisory control of the victim.
Accordingly, the enhancement would not apply to the
use of a computer or an Internet-access device to obtain
airline tickets for the victim from an airline’s Internet
site.
U.S.S.G. § 2A3.2, cmt. n.5. This note is not addressed to the question whether
there must be an actual victim. Rather, it draws a line between “direct”
communications setting up the illegal sexual encounter, and collateral
communications with third parties having no immediate connection to sexual
predation. The application note thus focuses application of the Guideline on
communications in which the computer is an especially insidious tool for sexual
-17-
predation, and not on indirect communications, such as use of the internet to make
airline reservations, which fall outside the rationale for enhanced sentences under
the Guideline.
Indeed, the major thrust of Application Note 5 supports application of the
Guideline to this case. It might be thought that the evil addressed by the
Guideline is that young people are particularly susceptible to being lured via
computer, perhaps because of their naivete regarding false identities (a problem
addressed separately in subsection (b)(2) of the Guideline) or because of a
“child’s general fascination with computer technology.” Reaves, 253 F.3d at
1205. This might suggest that communications with adults fall outside the
Guideline’s intended scope. That suggestion, however, is refuted by Application
Note 5, which makes clear that the Guideline applies to communications with
minors and to communications with the adults who control access to them.
Nor does Application Note 1 suggest that the Guideline applies only when
there is an actual minor victim. On the contrary, the note defines a “victim” as
“(A) an individual who . . . had not attained the age of 16 years; or (B) an
undercover law enforcement officer who represented to a participant that the
officer had not attained the age of 16 years.” U.S.S.G. § 2A3.2, cmt. n.1. As the
Commission explained, the purpose of this definition is to “ensure that offenders
who are apprehended in an undercover operation are appropriately punished.” See
-18-
U.S.S.G. app. C, amend. 592, at 49 (Supp. 2002). Because Application Note 1
makes clear the Commission’s intent to apply the sentencing enhancement in sting
operations as well as in cases involving actual victims, it supports application of
the Guideline to this case.
Although Mr. Robertson does not make his argument so explicitly, it
appears to be based on the theory that the two application notes should be
combined. Application Note 5 refers to communications with a person in custody
or control of “the victim,” and Application Note 1 defines “victim” as either an
actual minor or an uncover officer posing as a minor. Putting the two application
notes together, the Guideline can be read as restricted to cases involving “the use
of a computer or an Internet-access device to communicate directly with [(A) an
individual who . . . had not attained the age of 16 years; or (B) an undercover law
enforcement officer who represented to a participant that the officer had not
attained the age of 16 years] or with a person who exercises custody, care, or
supervisory control of [(A) an individual who . . . had not attained the age of 16
years; or (B) an undercover law enforcement officer who represented to a
participant that the officer had not attained the age of 16 years].” The practical
effect is to exclude sting operations where the undercover agent poses as a
panderer rather than as a child.
The argument is clever, but not persuasive. The legally operative language
-19-
is found in the Guideline itself, which as we have explained, supports application
to this case. The application notes are also binding, but they are binding in the
sense of being authoritative interpretations of the Guideline. Reading Guideline
§ 2A3.2(b)(3)(B) in light of the application notes results in the same conclusion
that we reach reading the Guideline alone. Only if the application notes are read
independently of the Guideline, without regard to the issues they address or any
conceivable purpose they might serve, do they even arguably produce a different
result. We decline to import a definition from one application note into a separate
application note, and thereby restrict the Guideline in a way unsupported by the
Guideline’s own language or by the language or purpose of either note read
separately.
Not only does Mr. Robertson’s reading strain linguistic plausibility, but it
also corresponds to no conceivable statutory (or Guideline) purpose. Under his
interpretation, the Guideline applies when the perpetrator communicates with an
actual minor victim, with an undercover officer posing as an actual minor victim,
or with an actual panderer, but does not apply when an undercover officer poses
as a panderer. Mr. Robertson offers no reason for this distinction in light of the
purposes of the Guideline. One could imagine limiting the Guideline to cases
involving an actual victim; but that interpretation is foreclosed by Application
Note 1. One could similarly imagine limiting the Guideline to communications
-20-
with minors rather than adults; but that interpretation is foreclosed by Application
Note 5. There is no reason to distinguish between two different varieties of sting
operation, in which the role of the computer and the reprehensibility of the
conduct is essentially the same. 2 Deterring would-be predators from taking
advantage of internet-based “fantasy tour” offerings like the one in this case falls
squarely within the purpose of the Guideline.
In conclusion, to read the Guideline as applying when the undercover
officer poses as a child but not when he poses as a panderer is supported by
neither the language of the Guideline, which draws no such distinction, nor the
2
An early version of the legislation authorizing the Guideline’s
enhancement criminalized certain activity directed toward “a person who had
been ‘represented’ to be a minor, even if that person was, in fact, an adult.” 144
Cong. Rec. S10,521 (daily ed. Sept. 17, 1998) (statement of Senator Leahy). The
reasons for dropping that language are significant:
The evident purpose was to make clear that the targets
of sting operations are not relieved of criminal liability
merely because their intended victim turned out to be an
undercover agent and not a child. The new “sting”
provisions addressed a problem that simply does not
currently exist: no court has ever endorsed an
impossibility defense along the lines anticipated by the
House bill. The creation of special “sting” provisions in
this one area could lend credence to impossibility
defenses raised in other sting and undercover situations.
Id. Thus, Congress understood the preexisting law to allow sting operations of all
kinds, and did not want to encourage defendants to argue otherwise on the
principle of inclusio unius, exclusio alterius. Absent a clear manifestation of the
Commission’s intent to distinguish among sting operations, we agree with the
Congress that such arguments should not be countenanced.
-21-
relevant application notes when read separately. In light of their actual purposes,
each of the application notes supports application of the Guideline in this case.
Thus, we conclude the district court erred when it held that § 2A3.2(b)(3)(B) of
the Sentencing Guidelines does not apply to this case because there was no
“victim.”
CONCLUSION
For the reason stated, we REVERSE Mr. Robertson’s sentence and remand
to the district court for resentencing.
-22-
United States v. Robertson, No. 02-1388
Brorby, Senior Circuit Judge, dissenting.
I respectfully dissent.
I disagree with the majority’s conclusion Mr. Robertson used “a computer
or Internet-access device ... to facilitate transportation or travel, by the victim or a
participant, to engage in prohibited sexual conduct.” U.S.S.G. §2A3.2(b)(3)(B).
As the majority explains, subpart B of the guideline, on its face, appears to
apply to Mr. Robertson’s conduct. The majority believes “it is not necessary to
look beyond the plain language” of the guideline. I disagree. According to the
Supreme Court, we are additionally bound by the Sentencing Commission’s
interpretations or explanations in the commentary to the guideline unless the
commentary “violates the Constitution or a federal statute, or is inconsistent with,
or a plainly erroneous reading of, that guideline.” Stinson v. United States, 508
U.S. 36, 38 (1993). Commentary may “explain[] the guidelines and provide[]
concrete guidance as to how even unambiguous guidelines are to be applied in
practice.” See id. at 44 (emphasis added). Within the ambit of interpreting and
explaining a guideline, commentary may “demonstrate that the purview of the
guideline is narrower than that which may be discerned from a literal reading of
the guideline.” United States v. Frazier, 53 F.3d 1105, 1113 (10th Cir. 1995).
In this case, the commentary does permissibly narrow the application of the
guideline. Commentary note 5 explains the guideline “is intended to apply only to
the use of a computer or an Internet-access device to communicate directly with
the victim or with a person who exercises custody, care, or supervisory control of
the victim.” U.S.S.G. §2A3.2, cmt. n.5. Further guidance comes from
commentary note 1, which defines a “victim” as “(A) an individual who ... had
not attained the age of 16 years; or (B) an undercover law enforcement officer
who represented to a participant that the officer had not attained the age of 16
years.” U.S.S.G. §2A3.2, cmt. n.1.
In this case it is undisputed Mr. Robertson did not communicate directly
with a child under sixteen or an undercover officer posing as a child under
sixteen. The majority nevertheless applies subpart B of the guideline concluding
Mr. Robertson communicated with a person who exercised custody, care, or
supervisory control of the victim. This conclusion ignores the term “victim” in
the commentary. In this case, the undercover officer did not have custody, care or
supervisory control over a child under sixteen. Furthermore, there was no
undercover officer posing as a child under the age of sixteen. Consequently,
subpart B of the guideline (as informed by the commentary) does not apply to Mr.
Robertson’s conduct.
-2-
The majority believes that neither commentary note 1 nor commentary note
5, when read independently, precludes application of the guideline to Mr.
Robertson’s conduct. Thus, the majority declines to read the two commentary
notes together. This method of interpretation has the effect of making the
commentary’s definition of “victim” applicable to the guideline itself but not to
the accompanying commentary. I know of no precedent requiring us to view
individual commentary notes in isolation. To me it seems far more reasonable to
apply the commentary’s definition of “victim” whenever the term appears in both
the guideline and the commentary.
If, however, comment 1’s definition of “victim” is not incorporated into
comment 5, the term “victim” should retain its common meaning of a real child
victim, rather than an undercover officer posing as a child. Cf. U.S.S.G. App. C,
amdt. 592, at 49 (Supp. 2002) (explaining the commentary’s definition of
“victim” is intended to “clarify[] that ‘victim’ includes an undercover police
officer who represents to the perpetrator of the offense that the officer was under
the age of 16 years”). Under the common definition of “victim,” the guideline is
equally inapplicable because this case did not involve communication with an
individual exercising custody, care, or supervisory control over a real child
victim.
-3-
The majority avoids this result by restricting the breadth of commentary
note 5. According to the majority, commentary note 5 “is not addressed to the
question whether there must be an actual victim.” Instead, the majority focuses
on the illustration in commentary note 5. It states: “Accordingly, the
enhancement would not apply to the use of a computer or an Internet-access
device to obtain airline tickets for the victim from an airline’s Internet site.”
U.S.S.G. §2A3.2, cmt. n.5. Based on the illustration, the majority asserts the
commentary is intended to “draw[] a line between ‘direct’ communications ...
with third parties having no immediate connection to sexual predation.” Under
this theory, the note allows enhancement of Mr. Robertson’s sentence because his
communication with the undercover officer had an immediate connection to
sexual predation.
I believe the majority’s interpretation ignores the relevant language in
commentary note 5. The commentary plainly limits “use” to “the use of a
computer or an Internet-access device to communicate directly with the victim or
with a person who exercises custody, care, or supervisory control of the victim.”
Id. The commentary’s illustration concerning the online purchase of airline
tickets should not usurp the plain language of the first sentence of note 5.
-4-
This case is particularly troubling because the majority seems primarily
concerned that reading the two commentary notes together has the “practical
effect [of] exclud[ing] sting operations where the undercover agent poses as a
panderer rather than as a child.” The majority sees “no conceivable statutory (or
Guideline) purpose” for excluding the type of sting in this case from enhancement
under the guideline. Instead, the majority focuses on Congress’ and the
Commission’s general desire to punish sex offenders who use the internet to
ensnare child victims, using this general desire as justification for applying the
enhancement in this case.
While I have no doubt Congress and the Commission intended stiff
punishment for sex offenders who attempt to prey on children via the Internet, I
do not think this congressional intent gives the court license to rewrite the
guideline and its accompanying commentary. Rather, “‘courts should strive to
apply the sentencing guidelines as written, giving full force and effect to the
Sentencing Commission’s interpretive commentary and application notes.’”
United States v. Sedoma, 332 F.3d 20, 27 (1st Cir. 2003) (quoting Unites States v.
Zapa, 1 F.3d 46, 47 (1st Cir. 1993). “Under our constitutional framework, federal
courts do not sit as councils of revision, empowered to rewrite legislation [or
Sentencing Commission Guidelines] in accord with their own conceptions of
-5-
prudent public policy.” United States v. Rutherford, 442 U.S. 544, 555 (1979).
I am particularly unwilling to ignore the plain language of the guideline and
its commentary, in this case where the legislative history and the Sentencing
Commission history at most evidence a general intent to punish offenders caught
in sting operations. See, e.g., U.S.S.G. App. C, amdt. 592, at 48 (“[L]egislative
history ... indicates congressional intent to ensure that persons who misrepresent
themselves to a minor, or use computers or Internet-access devices to locate and
gain access to a minor, are severely punished.”). Nowhere in the history is there
evidence Congress or the Commission specifically intended the enhancement to
apply when an undercover agent poses as a panderer. Furthermore, the
Sentencing Commission could have defined “victim” in such a way as to allow the
enhancement to encompass sting operations like the one used here. For example,
the Commission elsewhere defined “minor victim” as “(A) an undercover law
enforcement officer who represented to the defendant that the officer was a
minor; or (B) any minor the officer represented to the defendant would be
involved in the prohibited sexual conduct.” U.S.S.G. §4B1.5 cmt. n.1. The
Commission knew how to make the guideline applicable to such an operation but
chose not to. Cf. Russello v. United States, 464 U.S. 16, 23 (1983) (“[W]here
Congress includes particular language in one section of a statute but omits it in
-6-
another section of the same Act, it is generally presumed that Congress acts
intentionally and purposely in the disparate inclusion or exclusion.” (Quotation
marks and citations omitted.)); United States v. Blackwell, 323 F.3d 1256, 1260-
61 (10th Cir. 2003). Consequently, while there might be public policy arguments
for punishing Mr. Robertson harshly, I would not depart from the plain language
of the guideline and accompanying commentary.
Of course, the majority believes its opinion embraces the plain meaning of
the guideline and commentary and that the reading espoused by Mr. Robertson (as
well as myself and the district judge) “strain[s] linguistic plausibility.” While I
firmly believe my interpretation is the most natural reading of the commentary, in
the event the guideline and commentary are actually ambiguous, the rule of lenity
should apply. “The rule of lenity requires courts to interpret ambiguous statutes,
including the Sentencing Guidelines, in favor of criminal defendants.” United
States v. Gay, 240 F.3d 1222, 1232 (10th Cir. 2001) (citing Ladner v. United
States, 358 U.S. 169, 178 (1958) and United States v. Blake, 59 F.3d 138, 140
(10th Cir. 1995)). If the rule of lenity were applied, Mr. Robertson’s sentence
would not be enhanced under subpart B of the guideline.
Having concluded subpart B of the guideline does not apply, I turn briefly
-7-
to subpart A. It allows a two-level enhancement if Mr. Robertson used his
computer to “persuade, induce, entice, or coerce the victim to engage in
prohibited sexual conduct.” U.S.S.G. §2A3.2(b)(3)(A). In this case, Mr.
Robertson did not use his computer to persuade, induce, entice or coerce a
“victim,” i.e., a child or an undercover officer posing as a child. See U.S.S.G.
§2A3.2, cmt. n.1. Instead, Mr. Robertson used his computer to communicate with
a law enforcement officer posing as someone who had access to children. No
“victim” was ever involved. Because Mr. Robertson did not use his computer to
persuade, induce, entice, or coerce a “victim,” as defined by the commentary, I
conclude the two-level enhancement under U.S.S.G. §2A3.2(b)(3)(A) is not
applicable.
For the foregoing reasons, I cannot agree with the majority and would
instead affirm the district court’s opinion.
-8-