Case: 15-13395 Date Filed: 08/21/2017 Page: 1 of 32
[PUBLISH]
IN THE UNITED STATES COURT OF APPEALS
FOR THE ELEVENTH CIRCUIT
________________________
No. 15-13395
________________________
D.C. Docket No. 9:13-cr-80054-KAM-1
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
versus
DONTAVIOUS M. BLAKE,
TARA JO MOORE,
Defendants-Appellants.
________________________
Appeals from the United States District Court
for the Southern District of Florida
________________________
(August 21, 2017)
Case: 15-13395 Date Filed: 08/21/2017 Page: 2 of 32
Before ED CARNES, Chief Judge, FAY, and PARKER, * Circuit Judges.
ED CARNES, Chief Judge:
After a nine-day trial, a jury found Dontavious Blake and Tara Jo Moore
guilty of child sex trafficking for managing a prostitution ring involving at least
two girls under the age of eighteen. Blake and Moore challenge numerous rulings
the district court made before and during trial, and at sentencing.
I. FACTUAL BACKGROUND
A. Pre-Trial
Blake and Moore had a system for running their prostitution ring. One of
them would post ads for prostitution services on the classifieds website Backpage.
Moore would then take phone calls from potential customers who were responding
to the ads. And Blake would give the prostitutes rides to their appointments and
provide muscle. The money was split 50/50 between the working prostitute on the
one hand and Blake and Moore on the other.
Through a variety of leads, the FBI discovered Blake and Moore’s
prostitution ring. It learned that the Backpage ads had been posted using an email
address (hereafter the “S.B. email address”), which the FBI determined belonged
to Moore. And it found out that at least two girls, known as T.H. and E.P., had
*
Honorable Barrington D. Parker, Jr., United States Circuit Judge for the Second Circuit,
sitting by designation.
2
Case: 15-13395 Date Filed: 08/21/2017 Page: 3 of 32
been under the age of eighteen when they engaged in prostitution for Blake and
Moore.
In the wake of those discoveries, the FBI arrested Blake and Moore. It
continued the investigation, executing four post-arrest search warrants relevant to
this appeal. First, it executed a warrant to seize and search electronics in Blake and
Moore’s townhouse, including an “Apple iPad tablet[ ].” Once in possession of
that iPad tablet, however, the FBI found itself unable to access any of the device’s
data due to its security features. So the FBI requested and received a district court
order, issued under the All Writs Act, 28 U.S.C. § 1651(a), requiring the iPad’s
manufacturer, Apple Inc., to assist the FBI in bypassing the iPad’s passcode lock
and other security measures. With Apple’s help, the FBI was able to successfully
unlock the device and download its data.
The second relevant search warrant the FBI executed directed Microsoft,
which owns Hotmail, to turn over emails from two of Blake and Moore’s email
accounts, including the S.B. email account. The Microsoft warrant did not seek all
emails in those two email accounts; instead, it was limited to certain categories of
emails in them that were linked to the sex trafficking charges against Blake and
Moore. For example, the warrant required Microsoft to turn over all “[e]mails,
correspondence, and contact information for Backpage.com” and all “[e]mails and
3
Case: 15-13395 Date Filed: 08/21/2017 Page: 4 of 32
correspondence from online adult services websites” that were contained within
the two email accounts.
Finally, the FBI also applied for and received two almost identical search
warrants for Moore’s Facebook account. Because that account was associated with
the S.B. email address and Moore’s phone number, the FBI knew it belonged to
her. At the time it executed the Facebook warrants, the FBI had extensive
evidence linking Moore to the prostitution ring, including statements by T.H.
inculpating her. And Moore’s Facebook account was suggestive of criminal
conduct: the publicly viewable version of the account listed Moore’s occupation
as “Boss Lady” at “Tricks R [U]s.”
The two warrants required Facebook to “disclose” to the government
virtually every type of data that could be located in a Facebook account, including
every private instant message Moore had ever sent or received, every IP address
she had ever logged in from, 1 every photograph she had ever uploaded or been
“tagged” in, every private or public group she had ever been a member of, every
search on the website she had ever conducted, and every purchase she had ever
made through “Facebook Marketplace,” as well as her entire contact list. The
disclosures were not limited to data from the period of time during which Moore
managed the prostitution ring; one warrant asked for all data “from the period of
1
Law enforcement officials can generally use an IP address to determine the physical
location from which an individual logged into Facebook.
4
Case: 15-13395 Date Filed: 08/21/2017 Page: 5 of 32
the creation of the account” and the other did not specify what period of time was
requested. The warrants did state that the only information that would be “seized,”
after all that data had been “disclosed” to the FBI, was data that “constitute[d]
fruits, evidence and instrumentalities” of a specified crime.
After the execution of those four warrants, a third superseding indictment
charged Blake and Moore with six violations of 18 U.S.C. § 1591: substantive
child sex trafficking of T.H. (Count 1); substantive child sex trafficking of E.P.
(Count 2); conspiracy to sex traffic children –– T.H. and E.P. (Count 3); two
substantive counts of sex trafficking adults by coercion (Counts 4 and 5); and one
count of conspiracy to sex traffic by coercion (Count 6).
Blake and Moore filed several pre-trial motions relevant to this appeal.
Moore moved to sever Counts 1 through 3, which involved sex trafficking of
children, from Counts 4 through 6, which involved sex trafficking of adults by
coercion. Blake and Moore moved to suppress evidence obtained from the iPad.
And they moved to suppress all the evidence gathered as a result of the search
warrants served on Microsoft and Facebook. The district court denied all of those
motions.
B. Trial and Sentencing
At trial T.H. testified about her time prostituting for Blake and Moore,
starting when she was sixteen years old. To explain why she turned to prostitution,
5
Case: 15-13395 Date Filed: 08/21/2017 Page: 6 of 32
T.H. described her difficult upbringing. She explained that her great uncle had
sexually abused her when she was between the ages of five and eight. During that
same period, her parents separated, her father left her life, and her mother fell into
a deep depression, leaving T.H.’s older sister to raise her. That older sister was a
drug addict who physically abused her.
E.P. testified as well. She stated that she called Blake after she found his
business card and started prostituting for him soon thereafter. She was sixteen
when she started — young enough that Blake had to buy her cigarettes. On cross
examination she admitted that she saw Moore only six times “at most.” One of
those times was when Moore spent about twenty minutes taking pictures of her for
a Backpage ad.
The government also called Khrystyna Trejo, an adult prostitute who had
spent time working alongside T.H. and E.P. She testified that, although E.P. had
told her that she was eighteen, E.P.’s way of “approach[ing] certain things” and her
interest in children’s television shows made her seem “younger than what . . . she
said she was.”
In addition to testimony related solely to the child sex trafficking charges,
the government called several witnesses in an attempt to prove its theory that Blake
and Moore “coerced” adult prostitutes by controlling their drug supply, evidence
that went to Counts 4 through 6. Several adult prostitutes testified both to the
6
Case: 15-13395 Date Filed: 08/21/2017 Page: 7 of 32
general structure of the prostitution ring and the fact that almost all the money the
prostitutes made was immediately spent buying drugs from Blake. The
government also called an addiction expert who testified about the physical and
neurological characteristics of drug dependency and withdrawal.
At the close of the government’s case in chief, the district court granted
Blake and Moore’s motion for a judgment of acquittal on the adult sex trafficking
by coercion charges (Counts 4 through 6), after finding that the government had
not proven the “coercion” element of the offense. The court instructed the jury not
to “draw any conclusions or inferences one way or the other because [Counts 4
through 6] are no longer involved in the case.”
Blake and Moore did not present any evidence of their own. The jury found
them guilty of the remaining charges — two substantive counts of child sex
trafficking and one count of conspiracy to sex traffic children, and the district court
entered judgment of conviction on those counts.
After applying a number of enhancements, the district court sentenced Blake
to 324 months imprisonment, followed by supervised release for a term of life.
And it sentenced Moore to 180 months imprisonment followed by 240 months
supervised release.
7
Case: 15-13395 Date Filed: 08/21/2017 Page: 8 of 32
II. ANALYSIS
A. Severance of Charges
Blake and Moore first challenge the district court’s denial of their motion to
sever the child sex trafficking charges from the sex trafficking by coercion charges.
We review the denial of a motion to sever charges only for an abuse of discretion.
United States v. Barsoum, 763 F.3d 1321, 1336 (11th Cir. 2014). We will not
reverse the district court’s decision unless Blake and Moore “demonstrate that
[they] received an unfair trial and suffered compelling prejudice.” United States v.
Slaughter, 708 F.3d 1208, 1213 (11th Cir. 2013) (quotation marks omitted).
That is a “heavy” burden, id., and Blake and Moore have not carried it. First
of all, a significant part of the testimony underlying the sex trafficking by coercion
charges was also relevant to the child sex trafficking charges. For example, in
closing arguments Blake’s counsel argued that the only T.H. Backpage ad
presented at trial was posted under the category of “body rubs” (as opposed to
under the “escorts” category), indicating that T.H. had not engaged in prostitution.
But given the testimony of some of the adult prostitutes that Blake and Moore
generally used Backpage to advertise prostitution, the jury could have inferred that
the T.H. ad was actually for commercial sex acts, whatever category it was posted
under. Similarly, the testimony of the adult prostitutes that Moore handled
interactions with customers undermined her argument that she was not a co-
8
Case: 15-13395 Date Filed: 08/21/2017 Page: 9 of 32
manager of the conspiracy. Because much of the evidence presented in connection
with the sex trafficking by coercion charges could have been and likely would have
been presented even if the trial had involved only the child sex trafficking charges,
Blake and Moore did not suffer “compelling prejudice” from having the charges
tried together. 2
Blake and Moore argue that, even if the evidence was generally relevant to
both sets of charges, the inflammatory nature of the sex trafficking by coercion
charges resulted in compelling prejudice. We disagree. Sex trafficking by
coercion is an abhorrent crime, but so is child sex trafficking. And there is no
compelling prejudice where both sets of charges are inflammatory. See United
States v. Hersh, 297 F.3d 1233, 1243 (11th Cir. 2002) (holding that there was no
compelling prejudice where “a reasonable jury undoubtedly would have found
both the evidence of [the defendant’s] child molestation and the evidence of [his]
child pornography very inflammatory”). The district court’s denial of Blake and
Moore’s motion to sever was not an abuse of discretion.
B. The Bypass Order
Blake and Moore next contend that the order requiring Apple to assist in
bypassing the iPad’s security features — what we will call the “bypass order” —
2
The government concedes that the addiction expert’s testimony may not have been
relevant to the child sex trafficking charges. That testimony, however, did not cause compelling
prejudice and did not make Blake and Moore’s trial “unfair.” See Slaughter, 708 F.3d at 1213.
9
Case: 15-13395 Date Filed: 08/21/2017 Page: 10 of 32
exceeded the authority granted by the All Writs Act. As a threshold matter, we
must address whether Blake and Moore have standing to make this challenge.
They satisfy the three requirements of constitutional standing because they
“(1) suffered an injury in fact, (2) that is fairly traceable to the challenged conduct
. . . and (3) that is likely to be redressed by a favorable judicial decision.” Spokeo
v. Robins, 578 U.S. __, 136 S. Ct. 1540, 1547 (2016). Specifically, they were
injured because the evidence gathered as a result of the bypass order was used to
convict them. That injury is fairly traceable to the government’s request for and
the district court’s issuance of the bypass order. And if a court ruled in their favor
on the All Writs Act issue, and if a court further ruled that suppression was the
proper remedy for the violation of the All Writs Act, Blake and Moore’s injury
would be redressed.3
In addition to the three constitutional standing requirements, “the Supreme
Court has held that prudential requirements pose additional limitations on
standing.” Wolff v. Cash 4 Titles, 351 F.3d 1348, 1353 (11th Cir. 2003). One of
those prudential limitations is the rule that a litigant “generally must assert his own
legal rights and interests, and cannot rest his claim to relief on the legal rights or
3
It is an open question whether suppression would have been the proper remedy if the
district court had found that the bypass order violated the All Writs Act. But as long as a litigant
has a nonfrivolous claim that a requested remedy could be awarded by the court, he has satisfied
the redressability prong of constitutional standing if that remedy would redress his injury. See
Steel Co. v. Citizens for a Better Env’t, 523 U.S. 83, 108 n.9, 118 S. Ct. 1003, 1019 n.9 (1998).
Whether or not they would ultimately be entitled to suppression, Blake and Moore’s request for
that remedy if they prevail is not frivolous.
10
Case: 15-13395 Date Filed: 08/21/2017 Page: 11 of 32
interests of third parties.” Warth v. Seldin, 422 U.S. 490, 499, 95 S. Ct. 2197,
2205 (1975); see also Craig v. Boren, 429 U.S. 190, 193, 97 S. Ct. 451, 455 (1976)
(explaining that the limitation on asserting third parties’ rights is not
“constitutionally mandated” but instead “stem[s] from a salutary rule of self-
restraint”) (quotation marks omitted). Here, Blake and Moore are attempting to
invoke All Writs Act protections, such as its restriction that any burden imposed on
a third party not be “unreasonable,” that shield third parties like Apple, not
criminal defendants. See United States v. N.Y. Tel. Co., 434 U.S. 159, 171, 98 S.
Ct. 364, 372 (1977). In other words, they are attempting to assert Apple’s legal
rights, not their own. 4
There are exceptions to the rule that a litigant can’t assert a third party’s
rights, see, e.g., Craig, 429 U.S. at 192–94, 97 S. Ct. at 454–55 (holding that a beer
4
The government couches its argument on this point in terms of “Fourth Amendment
standing,” a similar but analytically distinct limitation that applies only when a defendant is
challenging a search or seizure on Fourth Amendment grounds. See Rakas v. Illinois, 439 U.S.
128, 139, 99 S. Ct. 421, 428 (1978) (explaining that Fourth Amendment standing is part of
substantive Fourth Amendment law and is “separate” from the more general concept of
standing). To the extent that Fourth Amendment standing applies to Blake and Moore’s All
Writs Act challenge, they do have it. In order to have the standing required to claim protection
of the Fourth Amendment, “the person invoking the protection must have an objectively
reasonable expectation of privacy in the place searched or item seized.” Rehberg v. Paulk, 611
F.3d 828, 842 (11th Cir. 2010). Blake and Moore had a reasonable expectation of privacy in the
password-locked iPad, which was owned by one of them, used by one or both of them, and kept
inside the house they both lived in. See, e.g., United States v. Heckenkamp, 482 F.3d 1142,
1146 (9th Cir. 2007) (holding that a college student had a reasonable expectation of privacy in
his dorm room computer); United States v. Lifshitz, 369 F.3d 173, 190 (2d Cir. 2004)
(“Individuals generally possess a reasonable expectation of privacy in their home computers.”);
Guest v. Leis, 255 F.3d 325, 333 (6th Cir. 2001) (“Home owners would of course have a
reasonable expectation of privacy in their homes and in their belongings — including computers
— inside the home.”).
11
Case: 15-13395 Date Filed: 08/21/2017 Page: 12 of 32
vendor had third-party standing to assert the equal protection rights of beer
buyers), and whether there is an exception that would allow Blake and Moore to
assert Apple’s rights is a thorny question. But “because prudential standing is
flexible and not jurisdictional in nature,” and deciding that issue will not affect the
result in this case, we can bypass it and reach the less difficult issue of whether the
bypass order violated the requirements of the All Writs Act. See Am. Iron & Steel
Inst. v. OSHA, 182 F.3d 1261, 1274 n.10 (11th Cir. 1999). Our decision to move
straight to the merits of Blake and Moore’s claim does not imply any view about
whether they could meet the prudential standing requirements for challenging the
All Writs Act order.
On the merits, Blake and Moore contend that the district court did not have
the authority to issue the bypass order, and, as a result, it should have suppressed
any evidence resulting from Apple’s compliance with that order. 5 We review de
novo the basic premise of that contention, which is that the order exceeded the
court’s authority under the All Writs Act. See Midrash Sephardi, Inc. v. Town of
Surfside, 366 F.3d 1214, 1223 (11th Cir. 2004) (holding that the construction of a
statute is a question of law that we review de novo); United States v. Perry, 360
5
As we have mentioned, it is not settled whether suppression would have been the proper
remedy if the district court had ruled that its authority under the All Writs Act had been
exceeded. In view of our decision that the order was proper, we need not decide what, if any,
remedy would have been appropriate if it had not been.
12
Case: 15-13395 Date Filed: 08/21/2017 Page: 13 of 32
F.3d 519, 533 (6th Cir. 2004) (“Appellate courts review a district court’s assertion
of jurisdiction under the All Writs Act de novo.”).
The All Writs Act provides in full:
The Supreme Court and all courts established by Act of Congress may
issue all writs necessary or appropriate in aid of their respective
jurisdictions and agreeable to the usages and principles of law.
28 U.S.C. § 1651(a). The Supreme Court has recognized five requirements that
must be met before a court can compel under the All Writs Act the assistance of a
third party in a criminal investigation: (1) the order must be necessary or
appropriate to effectuate a previously issued order, (2) it must not be covered by
another statute, (3) it must not be inconsistent with the intent of Congress, (4) the
third party must not be too far removed from the underlying case, and (5) the
burden imposed on the third party must not be unreasonable. See United States v.
N.Y. Tel. Co., 434 U.S. 159, 172–78, 98 S. Ct. 364, 372–75 (1977).
1. Necessary or Appropriate
The first requirement for use of the All Writs Act is that the use be necessary
or appropriate to carry out an issued order. See id. at 172, 98 S. Ct. at 372 (“This
Court has repeatedly recognized the power of a federal court to issue such
commands under the All Writs Act as may be necessary or appropriate to
effectuate and prevent the frustration of orders it has previously issued . . . .”). The
bypass order in this case was necessary or appropriate because there was no other
13
Case: 15-13395 Date Filed: 08/21/2017 Page: 14 of 32
way for the FBI to execute the district court’s order to search the contents of the
iPad. See In re Grand Jury Subpoena Duces Tecum Dated March 25, 2011, 670
F.3d 1335, 1346–49 (11th Cir. 2012) (holding that compelling a defendant to
produce data protected by his password without providing constitutionally
sufficient immunity violates the Fifth Amendment).
2. Not Otherwise Covered by Statute
The authority granted by the All Writs Act is broad but not boundless. The
Act “is a residual source of authority” that permits issuing writs only if they “are
not otherwise covered by statute.” Penn. Bureau of Corr. v. U.S. Marshals Serv.,
474 U.S. 34, 43, 106 S. Ct. 355, 361 (1985). It is a gap filler. “Where a statute
specifically addresses the particular issue at hand, it is that authority, and not the
All Writs Act, that is controlling.” Id. And where Congress has proscribed a
certain type of judicial action, the Act cannot overcome that proscription. See id.
The bypass order meets this requirement because no statute expressly permits or
prohibits it.
3. Not Inconsistent with Intent of Congress
Even where, as here, no statute expressly permits or prohibits a particular
judicial action, the court cannot always use the Act to fill the gap. Any order
issued under the All Writs Act must still be “consistent with the intent of
Congress.” See N.Y. Tel., 434 U.S. at 172, 98 S. Ct. at 372. To determine if a
14
Case: 15-13395 Date Filed: 08/21/2017 Page: 15 of 32
judicial action is consistent with congressional intent, it is not enough to ask
whether there is an on-point statute. We must also look at laws that are not directly
on point but that speak to similar issues in order to determine whether the proposed
judicial action is in line with congressional intent. See id. 172, 176–78, 98 S. Ct. at
372, 374–75. If the legislative context bearing on the proposed action suggests that
Congress did not intend for the court to have a given power, taking the action
under the All Writs Act is inconsistent with congressional intent and cannot be the
basis for the action. See id.
The Supreme Court’s decision in New York Telephone illustrates this
principle. In that case the district court had issued an order under the All Writs Act
requiring a phone company to assist the FBI in installing pen registers on certain
phone lines. Id. at 161–62, 98 S. Ct. at 367. The Supreme Court held the order
was consistent with congressional intent for two reasons. Id. at 176–78, 98 S. Ct.
at 374–75. First, the legislative history of Title III of the Omnibus Crime Control
and Safe Streets Act, which governs the issuance of wiretaps, makes clear that
Congress intended for courts to be able to order the installation of pen registers.
See id. at 176–77, 98 S. Ct. at 374. Second, amendments to Title III had
authorized courts to compel assistance in installing wiretaps, though they did not
specifically mention pen registers. Id. at 176–77, 98 S. Ct. at 374–75. The Court
reasoned that Congress likewise intended for courts to be able to compel assistance
15
Case: 15-13395 Date Filed: 08/21/2017 Page: 16 of 32
in installing pen registers when assistance was necessary. Id. at 177–78, 98 S. Ct.
at 374–75. As a result, the Court held that the district court’s order was within the
authority granted by the All Writs Act. Id. at 177–78, 98 S. Ct. at 375.
Blake and Moore argue that the New York Telephone case is distinguishable
because, unlike the pen register order involved in that case, the issuance of the
bypass order in this case is contrary to congressional intent. They rely on the
Communications Assistance for Law Enforcement Act (CALEA), 47 U.S.C.
§§ 1001–1010, for that proposition. Section 1002, which is part of CALEA,
requires “telecommunications carrier[s]” to provide certain forms of assistance to
law enforcement, while exempting “information services” companies — a category
that includes Apple — from those same requirements. 6 See id. §§ 1001(6),
1002(a), (b)(2). Blake and Moore assert that the “information services” exemption
in § 1002 shows that Congress intends for companies like Apple to be insulated
from court-ordered law enforcement cooperation through bypass orders.
The problem is that the § 1002 requirements are all about design choices and
ensuring that telephone networks “are capable of” delivering evidence to law
enforcement. See id. § 1002(a). If this case were about a court order forcing
Apple to initially design its devices so that law enforcement would be capable of
accessing them in the future, § 1002’s exemption of information services
6
CALEA defines “telecommunications carrier[s]” as common carrier phone companies
such as AT&T. See id. § 1001(8)(A).
16
Case: 15-13395 Date Filed: 08/21/2017 Page: 17 of 32
companies would be relevant. But that is not what this case is about. It is, instead,
about a device that has already been designed, manufactured, sold, and used, and
about how to access the information on that device. In light of the distinction
between initial design and later access, § 1002 does not show that bypass orders
are inconsistent with congressional intent.
4. Third Party Not Too Far Removed from Underlying Case
The fourth requirement for use of the All Writs Act, at least for compelling a
non-party in a criminal case, is that the non-party not be “so far removed from the
underlying controversy that its assistance could not be permissibly compelled.”
N.Y. Tel., 434 U.S. at 174, 98 S. Ct. at 373. Blake and Moore argue that “Apple’s
connection to the case [is] merely that it . . . originally manufactured the iPad,” so
it is too far removed for its assistance to be compelled. That argument misstates
the technology. Apple continued being connected to Blake and Moore’s use of the
iPad even after they bought it: the iPad ran on an operating system owned by
Apple (Blake and Moore were only licensing it); Apple servers conveyed messages
sent from the iPad; and Apple servers backed up the iPad’s data. See Apple, Inc.,
Apple iOS Software License Agreement 1 (2016), http://apple.co/2nl946W; Greg
Kumparak, Apple Explains Exactly How Secure iMessage Really Is, TechCrunch
(Feb. 27, 2014), http://tcrn.ch/2kNxy3q. Apple’s continued connection to the case
17
Case: 15-13395 Date Filed: 08/21/2017 Page: 18 of 32
means that it was not so far removed from the underlying controversy that its
assistance could not be compelled.
5. Not Unreasonable Burden on Third Party
The final New York Telephone requirement is that any burden imposed on
the compelled party must not be “unreasonable.” N.Y. Tel., 434 U.S. at 172, 98 S.
Ct. at 372. To comply with the bypass order, Apple simply had to have an
employee plug the iPad into a special computer and then transfer the iPad’s data to
a thumb drive. That is not an unreasonable burden, especially in light of the fact
that Apple did not object to the bypass order’s requirements.
6. Summary
The bypass order was necessary or appropriate to carry out the search
warrant the district court had issued, the assistance sought was not specifically
addressed by another statute, the bypass order was not inconsistent with Congress’
intent, Apple was not too far removed from the underlying controversy, and the
burden the order imposed on it was not unreasonable. See id. at 172–74, 98 S. Ct.
at 372–73. It follows that the bypass order did not exceed the district court’s
authority and the evidence gathered as a result of that order did not have to be
suppressed.
18
Case: 15-13395 Date Filed: 08/21/2017 Page: 19 of 32
C. The Microsoft and Facebook Searches
Moore also contends that the district court erred in not excluding evidence
gathered as a result of the FBI’s search of her email and Facebook accounts
because the search warrants were flawed. “We review a district court’s denial of a
defendant’s motion to suppress evidence as a mixed question of law and fact. We
review only for clear error the court’s findings of fact, but we review de novo the
court’s application of the law to those facts.” United States v. Noriega, 676 F.3d
1252, 1259 (11th Cir. 2012) (citation omitted).
Moore argues that the search warrants were flawed in two ways. First, she
asserts that the government lacked probable cause to search her Facebook account.
That assertion is meritless. By the time the FBI applied for the Facebook warrants,
it had collected a wealth of evidence, which was set out in the affidavits supporting
the warrants, showing that she was part of the prostitution conspiracy. Moore’s
argument that there was no probable cause to believe that evidence of her
participation would be found in her Facebook account is refuted by the fact that in
it she listed her occupation as “Boss Lady” at “Tricks R [U]s,” thereby linking her
Facebook account to the conspiracy.
Second, Moore asserts that the Microsoft warrant and the Facebook warrants
were so broad that they violated the Fourth Amendment’s particularity
requirement. The Fourth Amendment requires that “those searches deemed
19
Case: 15-13395 Date Filed: 08/21/2017 Page: 20 of 32
necessary should be as limited as possible.” Coolidge v. New Hampshire, 403
U.S. 443, 467, 91 S. Ct. 2022, 2038 (1971). The “specific evil” that limitation
targets “is not that of intrusion per se, but of a general, exploratory rummaging in a
person’s belongings.” Id. That type of rummaging was permitted during the
colonial era by the “general warrant,” an instrument “abhorred by the colonists.”
Id. The Fourth Amendment is intended to preclude “general warrants” by
“requiring a ‘particular description’ of the things to be seized.” Id. at 467, 91 S.
Ct. at 2038–39.
Viewed against that constitutional history, the Microsoft warrant complied
with the particularity requirement. It limited the emails to be turned over to the
government, ensuring that only those that had the potential to contain incriminating
evidence would be disclosed. Those limitations prevented “a general, exploratory
rummaging” through Moore’s email correspondence. The Microsoft warrant was
okay. 7
The Facebook warrants are another matter. They required disclosure to the
government of virtually every kind of data that could be found in a social media
account. See p. 4, above. And unnecessarily so. With respect to private instant
7
It is somewhat troubling that the Microsoft warrant did not limit the emails sought to
emails sent or received within the time period of Moore’s suspected participation in the
conspiracy. Nevertheless, the warrant was appropriately limited in scope because it sought only
discrete categories of emails that were connected to the alleged crimes. As a result, the lack of a
time limitation did not render the warrant unconstitutional.
20
Case: 15-13395 Date Filed: 08/21/2017 Page: 21 of 32
messages, for example, the warrants could have limited the request to messages
sent to or from persons suspected at that time of being prostitutes or customers.
And the warrants should have requested data only from the period of time during
which Moore was suspected of taking part in the prostitution conspiracy.
Disclosures consistent with those limitations might then have provided probable
cause for a broader, although still targeted, search of Moore’s Facebook account.
That procedure would have undermined any claim that the Facebook warrants were
the internet-era version of a “general warrant.” See Coolidge, 403 U.S. at 467, 91
S. Ct. at 2038; cf. Riley v. California, 573 U.S. __, 134 S. Ct. 2473, 2488–91
(2014) (“The sum of an individual’s private life can be reconstructed through a
thousand photographs labeled with dates, locations, and descriptions . . . .”).
We are not convinced that the cases the government relies on, which involve
seizing an entire hard drive located in the defendant’s home and then later
searching it at the government’s offices, are applicable in the social media account
context. See, e.g., United States v. Evers, 669 F.3d 645, 652 (6th Cir. 2012);
United States v. Stabile, 633 F.3d 219, 234 (3d Cir. 2011). The means of hiding
evidence on a hard drive — obscure folders, misnamed files, encrypted data — are
not currently possible in the context of a Facebook account. Hard drive searches
require time-consuming electronic forensic investigation with special equipment,
and conducting that kind of search in the defendant’s home would be impractical,
21
Case: 15-13395 Date Filed: 08/21/2017 Page: 22 of 32
if not impossible. By contrast, when it comes to Facebook account searches, the
government need only send a request with the specific data sought and Facebook
will respond with precisely that data. See generally Information for Law
Enforcement Authorities, Facebook, http://bit.ly/QkrAHX (last visited July 27,
2017). That procedure does not appear to be impractical for Facebook or for the
government. Facebook produced data in response to over 9500 search warrants in
the six-month period between July and December 2015. United States Law
Enforcement Requests for Data, Facebook, http://bit.ly/2aICDHg (last visited July
27, 2017).
That said, we need not decide whether the Facebook warrants violated the
Fourth Amendment because, even if they did, the district court did not err in
allowing the government to use evidence gathered as a result of them. The
Facebook warrants fall into the “good-faith exception” to the exclusionary rule
established by United States v. Leon, 468 U.S. 897, 104 S. Ct. 3405 (1984). See
United States v. Herring, 492 F.3d 1212, 1215 (11th Cir. 2007) (“[W]hether to
apply the exclusionary rule is an issue separate from the question [of] whether the
Fourth Amendment . . . [was] violated by police conduct.”) (quotation marks
omitted), aff’d, 555 U.S. 135, 129 S. Ct. 695 (2009).
In Leon the Supreme Court held that “evidence obtained in objectively
reasonable reliance on a subsequently invalidated search warrant” should generally
22
Case: 15-13395 Date Filed: 08/21/2017 Page: 23 of 32
not be excluded. 468 U.S. at 922, 104 S. Ct. at 3420. The Court noted two
circumstances that could justify exclusion in a case like this one: (1) if the warrant
was based on an affidavit “so lacking in indicia of probable cause as to render
official belief in its existence entirely unreasonable” or (2) if the warrant was “so
facially deficient — i.e., in failing to particularize the place to be searched or the
things to be seized — that the executing officers c[ould not have] reasonably
presume[d] it to be valid.” Id. at 923, 104 S. Ct. at 3421.
The Facebook warrants do not fall within either category of excludable
warrants. As we have already explained, probable cause supported issuance of the
warrants. And while the warrants may have violated the particularity requirement,
whether they did is not an open and shut matter; it is a close enough question that
the warrants were not “so facially deficient” that the FBI agents who executed
them could not have reasonably believed them to be valid. As a result, we affirm
the district court’s decision not to suppress the evidence gathered as a result of
Microsoft warrant and the Facebook warrants.
D. Trial Issues
Moore raises two issues with respect to her trial.
1. T.H.’s Testimony About Her Upbringing
Moore first contends that the district court should not have permitted T.H. to
testify about her difficult childhood, which are events that occurred before T.H.
23
Case: 15-13395 Date Filed: 08/21/2017 Page: 24 of 32
joined the prostitution ring. Moore argues that testimony was not relevant under
Federal Rule of Evidence 401, or if it was relevant, that it was inadmissible under
Federal Rule of Evidence 403 because its probative value was substantially
outweighed by its danger of unfair prejudice. “We review evidentiary rulings for
abuse of discretion.” United States v. Wilk, 572 F.3d 1229, 1234 (11th Cir. 2009).
There was none.
T.H.’s statements about her upbringing were relevant under Rule 401
because they tended to make the fact that she ran away from home to prostitute
herself more probable. See Fed. R. Evid. 401 (providing that evidence is relevant
if “it has any tendency to make a fact more or less probable than it would be
without the evidence”). And her testimony was not so inflammatory that the
“extraordinary remedy” of Rule 403 exclusion was appropriate. See United States
v. Alfaro-Moncada, 607 F.3d 720, 732 (11th Cir. 2010).
Moore relies on United States v. Hands, 184 F.3d 1322 (11th Cir. 1999), in
which we stated that the district court should have excluded testimony about the
defendant’s history of abusing his partner. Id. at 1328. But there the challenged
testimony was that the defendant was the abuser, creating a risk that the jury may
have convicted him for abusing his partner, not for the unrelated crime he had been
charged with. See id. at 1328–29. By contrast, it was clear that Blake and Moore
24
Case: 15-13395 Date Filed: 08/21/2017 Page: 25 of 32
did not inflict the abuse T.H. suffered at home. There was no unfair prejudice, and
Rule 403 exclusion was not necessary.
2. Sufficiency of Evidence as to Count 2
Moore also contends that the government presented insufficient evidence to
sustain her conviction on Count 2, which was the substantive charge that she sex
trafficked E.P., because the evidence did not establish that she interacted with E.P.
enough to satisfy the knowledge element of 18 U.S.C. § 1591(a). “[W]e review
the sufficiency of evidence de novo, viewing the evidence in the light most
favorable to the government and drawing all reasonable inferences and credibility
choices in favor of the jury’s verdict.” United States v. Lumley, 135 F.3d 758, 759
(11th Cir. 1998).
Under 18 U.S.C. § 1591(c), in order to prove knowledge for the purposes of
§ 1591(a) the government did not need to prove that Moore had actual knowledge
that E.P. was underage; it needed to prove only that Moore had a “reasonable
opportunity” to observe E.P. E.P. testified that she came into contact with Moore
“at most” six times. At least one of those encounters involved considerable
interaction between the two of them — when Moore spent twenty minutes taking
photographs of E.P. for her Backpage ad. Furthermore, Trejo, an adult prostitute
who spent time with E.P., testified that E.P.’s manner of talking and
“approach[ing] certain things” made her seem younger “than what she said she
25
Case: 15-13395 Date Filed: 08/21/2017 Page: 26 of 32
was.” In light of that, the jury could have reasonably concluded that five or six
interactions were “a reasonable opportunity” for Moore to have observed E.P.,
which, under § 1591(c), satisfied § 1591(a)’s knowledge requirement. There was
sufficient evidence to convict her on Count 2.
E. Sentencing Issues
Blake and Moore also raise several challenges to their sentences. “We
review the district court’s interpretation and application of the sentencing
guidelines de novo and its findings of fact for clear error.” United States v. Bane,
720 F.3d 818, 824 (11th Cir. 2013).
1. The Calculation of Blake’s Sentence
Because the victims were over the age of fourteen but below the age of
eighteen, the presentence investigation report noted that Blake’s base offense level
was 30. See United States Sentencing Guidelines § 2G1.3(a)(2) (Nov. 2014)
(citing 18 U.S.C. § 1591(b)(2)). After applying a number of enhancements, the
PSR calculated his adjusted offense level as 51, but it was reduced to 43 because
that is the maximum offense level permitted by the guidelines. See id. § 5A cmt.
n.2. With a criminal history category of IV, the advisory guidelines range was life.
See id. § 5A.
Blake made several objections to his PSR, including two that are relevant to
his appeal. First, he contended that the PSR should not have applied a two-level
26
Case: 15-13395 Date Filed: 08/21/2017 Page: 27 of 32
enhancement under U.S.S.G. § 2G1.3(b)(2)(B) because he did not “unduly
influence” T.H. and E.P. to engage in “prohibited sexual conduct.” Second, he
contended that the PSR had erroneously applied a two-level enhancement under
§ 2G1.3(b)(4), which applies to offenses “involv[ing] the commission of a sex act
or sexual conduct.”
At the sentence hearing the district court sustained some of Blake’s
objections but overruled his objections to the § 2G1.3(b)(2)(B) and § 2G1.3(b)(4)
enhancements. The result was that Blake’s adjusted offense level remained at 43
and his criminal history score stayed at IV, so his advisory guidelines range was
still life. The district court then discussed and applied the sentencing factors
contained in 18 U.S.C. § 3553(a). It noted that the case was “horrific,” that
Blake’s actions were “despicable,” and that his “history and characteristics aren’t
the most favorable.” But it also found that the advisory guidelines range for
Blake’s crimes of conviction was “excessive.” On that basis, the court granted
Blake a downward variance, sentencing him to 324 months imprisonment,
followed by supervised release for a term of life.
2. Blake’s Sentencing Issues
Blake contends that the district court erred in applying the two-level
§ 2G1.3(b)(2)(B) enhancement, which applies where the defendant “unduly
influenced a minor to engage in prohibited sexual conduct.” See U.S.S.G.
27
Case: 15-13395 Date Filed: 08/21/2017 Page: 28 of 32
§ 2G1.3(b)(2)(B). Blake argues that because T.H. and E.P. sought him out, he did
not “unduly influence[ ]” them; if anything, he says, they influenced him. As
§ 2G1.3’s commentary shows, however, because Blake was more than ten years
older than the victims he had to overcome a presumption that he unduly influenced
them. See id. § 2G1.3 cmt. n.3(B). He did not overcome that presumption. In
determining whether a defendant used undue influence, courts may consider
whether his conduct “displaye[d] an abuse of superior knowledge, influence and
resources.” United States v. Root, 296 F.3d 1222, 1234 (11th Cir. 2002),
superseded on other grounds by Amend. 732, U.S.S.G. App. C (2009). Blake
abused his superior knowledge and resources by managing the prostitution ring,
posting ads on Backpage using his personal electronic devices, and using his car to
drive T.H. and E.P. to their prostitution appointments. Considering the
presumption of undue influence and Blake’s facilitation of T.H. and E.P.’s
prohibited sexual conduct, the district court did not clearly err in finding that Blake
unduly influenced T.H. and E.P.
Blake contends that the district court’s application of a two-level
enhancement under U.S.S.G. § 2G1.3(b)(4)(A) after his base offense level was set
by § 2G1.3(a)(2) amounted to impermissible double counting. “Impermissible
double counting occurs only when one part of the Guidelines is applied to increase
a defendant’s punishment on account of a kind of harm that has already been fully
28
Case: 15-13395 Date Filed: 08/21/2017 Page: 29 of 32
accounted for by application of another part of the Guidelines.” United States v.
Matos-Rodriguez, 188 F.3d 1300, 1309 (11th Cir. 1999). That did not happen
here.
Section 2G1.3(a)(2) sets the base offense level for convictions under 18
U.S.C. § 1591 where the child sex trafficking victims were older than fourteen but
younger than eighteen. See 18 U.S.C. § 1591(b)(2). The guideline incorporates
the elements of § 1591, which applies where a defendant knows or acts in reckless
disregard of the fact that the victim “has not attained the age of 18 years and will
be caused to engage in a commercial sex act.” Meanwhile, § 2G1.3(b)(4)(A)
applies where the offense “involved the commission of a sex act or sexual
contact.” Blake asserts that an element of § 1591 is that the victim committed a
sex act, and for that reason applying both § 2G1.3(a)(2) and the § 2G1.3(b)(4)(A)
“commission of a sex act” enhancement double counted engagement in sex acts.
The assertion underlying Blake’s argument cannot be squared with our
decision in United States v. Mozie, 752 F.3d 1271 (11th Cir. 2014), which held
that the commission of a sex act is not an element of § 1591. Id. at 1286–87; see
also United States v. Garcia-Gonzalez, 714 F.3d 306, 312 (5th Cir. 2013) (“The
future verb tense of the phrase ‘will be caused’ . . . indicates that a sex act does not
have to occur to satisfy the elements of the child-sex-trafficking offense.”). Put
another way, to be criminally liable under § 1591, and thus to be subject to
29
Case: 15-13395 Date Filed: 08/21/2017 Page: 30 of 32
§ 2G1.3(a)(2), a defendant need only put the victim in a position where a sex act
could occur, regardless of whether a sex act eventually did occur. See Mozie, 752
F.3d at 1286–87 (“It is enough that Mozie ‘recruited’ the victims . . . to engage in
commercial sex acts even though they did not actually do so.”). By contrast, the
§ 2G1.3(b)(4)(A) enhancement reaches only offenses where a sex act or sexual
conduct actually did occur. It follows that § 2G1.3(a)(2) and § 2G1.3(b)(4)(A)
punish different harms. And because they do, applying both of them did not
amount to impermissible double counting. See Matos-Rodriguez, 188 F.3d at
1309.
Finally, Blake contends that his sentence is substantively unreasonable. We
review the substantive reasonableness of a sentence only for an abuse of discretion.
United States v. Irey, 612 F.3d 1160, 1188–89 (11th Cir. 2010) (en banc). “That
familiar standard allows a range of choice for the district court, so long as that
choice does not constitute a clear error of judgment.” Id. at 1189 (quotation marks
omitted). “A district court abuses its discretion when it (1) fails to afford
consideration to relevant factors that were due significant weight, (2) gives
significant weight to an improper or irrelevant factor, or (3) commits a clear error
of judgment in considering the proper factors.” Id. “In the context of sentencing,
the proper factors” for the district court to consider “are set out in 18 U.S.C.
§ 3553(a).” Id.
30
Case: 15-13395 Date Filed: 08/21/2017 Page: 31 of 32
The district court carefully considered the § 3553(a) factors before it handed
down Blake’s sentence. It granted him a downward variance from a guideline
range of life imprisonment to 324 months because it considered the guidelines
range “excessive.” Given all of the facts and circumstances, it is not an
unreasonable sentence.
3. The Calculation of Moore’s Sentence
The PSR stated that Moore’s base offense level was 30, and after applying
the relevant enhancements it calculated her total offense level to be 49. Like
Blake’s, Moore’s offense level was then readjusted to the maximum permissible
level, 43. See U.S.S.G. § 5A cmt. n.2. With a criminal history category of I, her
guidelines range was life. See id. § 5A. She made a number of objections to the
PSR, including adopting Blake’s arguments with respect to the double-counting
issue.
After overruling the § 2G1.3(b)(4) objection and resolving her other
objections, the district court calculated Moore’s adjusted offense level as 41, with a
corresponding advisory guidelines range of 324 to 405 months imprisonment. See
id. § 5A. In applying the § 3553(a) factors to Moore, the district court explained
that Moore “[was] a victim of Mr. Blake” and that Blake had “s[een] a vulnerable,
undereducated, insecure, weak individual who had a troubled past, just like the
victims, used her as a victim of prostitution, and then used her as his right-hand
31
Case: 15-13395 Date Filed: 08/21/2017 Page: 32 of 32
person to perpetrate the crimes that we’re here for.” The court balanced Moore’s
victimization with her culpability, sentencing her to 180 months imprisonment
followed by 240 months supervised release. That term of imprisonment was a
downward variance 144 months below the low end of Moore’s advisory guidelines
range.
2. Moore’s Sentencing Issues
Moore raises two issues about her sentence. The first one is the same
impermissible double-counting issue as Blake, and we reject her arguments for the
same reasons we rejected Blake’s identical arguments on that issue.
Like Blake, Moore challenges the substantive reasonableness of her
sentence, which was 180 months imprisonment. As we have just pointed out, that
sentence resulted from a 144-month downward variance from the bottom of her
guideline range of 324 to 405 months. Given that substantial downward variance
and all of the other facts and circumstances in the case, we cannot conclude that
Moore’s sentence amounts to an abuse of discretion or a clear error of judgment on
the part of the district court.
AFFIRMED.
32