United States v. Jonathan Lee Eubanks ( 2018 )


Menu:
  •           Case: 17-13108   Date Filed: 10/26/2018   Page: 1 of 22
    [DO NOT PUBLISH]
    IN THE UNITED STATES COURT OF APPEALS
    FOR THE ELEVENTH CIRCUIT
    ________________________
    No. 17-13108
    Non-Argument Calendar
    ________________________
    D.C. Docket No. 0:16-cr-60238-JIC-1
    UNITED STATES OF AMERICA,
    Plaintiff-Appellee,
    versus
    JONATHAN LEE EUBANKS,
    Defendant-Appellant.
    ________________________
    Appeal from the United States District Court
    for the Southern District of Florida
    ________________________
    (October 26, 2018)
    Before WILLIAM PRYOR, ANDERSON, and JULIE CARNES, Circuit Judges.
    PER CURIAM:
    Case: 17-13108       Date Filed: 10/26/2018       Page: 2 of 22
    A jury convicted Defendant Jonathan Eubanks of intentionally causing
    damage without authorization to a protected computer, use of unauthorized access
    devices, and three counts of aggravated identity theft. The district court sentenced
    Defendant to 84 months’ imprisonment. Defendant now appeals, challenging the
    sufficiency of the evidence as to one of his aggravated identity theft convictions.
    He also argues that his sentence is procedurally and substantively unreasonable.
    After careful review, we affirm.
    I.     BACKGROUND
    A.      Facts1
    Navarro Security (“Navarro”) is a company that provides security services
    for gated communities, individuals, and businesses. In October 2012, Navarro
    hired Defendant for the position of road supervisor. As a road supervisor,
    Defendant was responsible for checking on and assisting the security officers that
    were stationed at each of Navarro’s customers. On January 8, 2013, Defendant’s
    supervisor, Glenn Topping, demoted him from road captain to an officer.
    Defendant did not return to work after that date, and Navarro officially terminated
    Defendant’s employment on January 18, 2013.
    1
    The following facts are taken from the trial, viewed in the light most favorable to the
    Government. See United States v. Wright, 
    392 F.3d 1269
    , 1273 (11th Cir. 2004). Because
    Defendant challenges the sufficiency of the evidence as to only one of his convictions, the facts
    focus on those relevant to the conviction at issue, as well as the sentencing challenges Defendant
    raises on appeal.
    2
    Case: 17-13108     Date Filed: 10/26/2018   Page: 3 of 22
    On January 27, 2013, Vern Reynolds, Navarro’s technical manager and
    system administrator, was alerted to an issue concerning Navarro’s server. While
    he was investigating the issue, Reynolds discovered that 12 years’ worth of files
    were missing from the server. Reynolds was the only one with authorization to
    delete files from the server and he had not done so. Although he was able to
    recreate most of the files, he was unable to recreate three or four years’ worth of
    documents.
    The following day, January 28, 2013, the printer at Navarro stopped
    functioning and ultimately needed a new motherboard and operating system. In
    addition, the Navarro website was directing users to the websites of Navarro’s
    competitors. That same day, Reynolds received an email from Topping regarding
    Topping’s departure from Navarro. The email stood out to Reynolds because he
    knew that Topping was not in the office that day. Indeed, Topping had been let go
    for budgetary reasons a few days earlier. When Reynolds discovered that
    Topping’s computer was turned on and running, he concluded that it was being
    controlled by someone else from a remote location.
    Reynolds’s subsequent review of Topping’s hard drive revealed that a
    software program called LogMeIn—a program that allows a person to connect
    remotely to another computer—had been installed on Topping’s computer in
    December 2012. Another program called Cain & Abel—which captures the
    3
    Case: 17-13108   Date Filed: 10/26/2018   Page: 4 of 22
    username and password of anyone logging into a computer—was also installed on
    the computer. Reynolds ultimately learned that Topping’s computer had been
    remotely connected to on January 26, 27, and 28, from an IP address that was
    registered to Defendant’s home address. Reynolds was the only person authorized
    to install a program such as LogMeIn onto one of Navarro’s computers and he had
    not done so.
    Approximately two weeks later, on February 18, 2013, Navarro’s human
    resources director, Linda Blades, received a confirmation email from B&H Photo
    regarding a purchase order totaling $3,349.79. The purchase order was made by
    Maryam Ayam and paid for using a credit card in Ayam’s name. However, the
    order was to be shipped to 6928 Southwest 39th Street, Apt. 206, Fort Lauderdale,
    FL, 33314. Blades recognized the shipping address as the one Defendant had
    provided to Navarro as his home address. Blades had not made the purchase and
    she confirmed that Ayam was not a Navarro employee. B&H Photo later canceled
    the order after Ayam confirmed it was fraudulent. The bank statement for Ayam’s
    credit card showed that she had purchased Destiny Patrol Software in February
    2013. The statement also showed that Ayam received a new credit card number
    during the March 2013 billing cycle.
    In addition, Blades received email confirmations for two other orders made
    in February 2013: one for an interactive pen display totaling $2,499 and the other
    4
    Case: 17-13108     Date Filed: 10/26/2018   Page: 5 of 22
    for an Apple iPad in the amount of $1,188.70. Both orders were made under the
    name John Flores, were paid for with John Flores’s credit card, and listed Flores’s
    employer at the time, Platt Security, as the billing address. The shipping address
    listed on the purchase orders, however, was Defendant’s address. Neither Flores
    nor Blades made either of these purchases. Like Ayam, Flores had a monthly
    service charge to Destiny Patrol Software.
    On February 25, 2013, a purchase in the amount of $1,100.98 was made to
    Lecor Technologies using Mark Silverberg’s credit card. The order was placed
    from a computer at the Equus gatehouse—a location where Navarro has an
    employee stationed to work. A subsequent investigation revealed that the Equus
    computer had been logged into from a LogMeIn account at an IP address registered
    to Defendant’s home address. Silverberg did not place the order, but like Ayam
    and Flores, he had a transaction with Destiny Patrol Software between January and
    February 2013.
    In May 2013, law enforcement officials executed a search warrant at
    Defendant’s apartment. A forensic analysis of one of the computers seized from
    the apartment revealed programs used to access emails and login-emails for
    different people associated with destinypatrolsoftware.com. Officials also
    determined that the same computer had not only accessed Destiny Patrol
    Software’s administrative website—which had billing and credit card
    5
    Case: 17-13108    Date Filed: 10/26/2018    Page: 6 of 22
    information—but that Defendant was logged in as a superuser, meaning that he had
    more advanced privileges than a typical user. The computer contained LogMeIn
    files, as well as a file that contained Topping’s biographical information, including
    his address, date of birth, social security number, and employment information.
    B.     Procedural History
    In 2016, a federal grand jury issued an indictment charging Defendant with:
    (1) intentionally causing damage without authorization to a protected computer, in
    violation of 
    18 U.S.C. § 1030
    (a)(5)(A) and (c)(4)(B)(i) (Count 1); (2) knowingly
    using one or more unauthorized access devices with intent to defraud, in violation
    of 
    18 U.S.C. § 1029
    (a)(2) (Count 2); and (3) three counts of aggravated identity
    theft, in violation of 18 U.S.C. § 1028A(a)(1) (Counts 3–5). Count 4 charged that
    Defendant knowingly used the means of identification of “M.A.,” or Maryam
    Ayam. Defendant pled not guilty and proceeded to trial.
    At trial, the Government presented testimony from various witnesses,
    including representatives from Navarro, law enforcement officials, and two of the
    people whose credit cards were used fraudulently, Flores and Silverberg. Ayam
    did not testify at trial. At the close of the Government’s case-in-chief, Defendant
    moved for judgment of acquittal. Of relevance to this appeal, he argued that as to
    Count 4, the evidence was insufficient to show that any use of Ayam’s credit card
    6
    Case: 17-13108     Date Filed: 10/26/2018   Page: 7 of 22
    was not authorized because she had not testified at trial. The court denied his
    motion.
    Defendant testified in his own defense. He denied having hacked into
    Navarro’s computer system and stated that he did not know about the hacking until
    the Federal Bureau of Investigation executed the search warrant at his apartment.
    He denied destroying Navarro’s files and sending emails from Topping’s account.
    He also denied connecting remotely to Navarro’s computer system in order to
    purchase merchandise using other people’s credit card numbers. After the defense
    rested, Defendant renewed his motion for judgment of acquittal. The court denied
    the motion. The jury returned a guilty verdict as to all five counts.
    In preparation for sentencing, the probation officer prepared a Presentence
    Investigation Report (“PSR”). The PSR assigned Defendant a base offense level of
    6, pursuant to U.S.S.G. § 2B1.1(a)(2). Defendant received the following
    enhancements: (1) an 8-level enhancement under § 2B1.1(b)(1)(E) because the
    loss was more than $95,000 but less than $150,000; (2) a 2-level enhancement
    under § 2B1.1(b)(10)(C) for sophisticated means; (3) a 2-level enhancement under
    § 2B1.1(b)(17) because the defendant was convicted of an offense under 
    18 U.S.C. § 1030
     and the offense involved the intent to obtain personal information or the
    public dissemination of personal information; and (4) a 4-level enhancement under
    § 2B1.1(b)(18)(A)(ii) because he was convicted of an offense under
    7
    Case: 17-13108     Date Filed: 10/26/2018   Page: 8 of 22
    § 1030(a)(5)(A). Defendant also received a two-level upward adjustment under
    U.S.S.G. § 3B1.3 because he used a special skill in a manner that facilitated
    concealment of the offense. Finally, he received a two-level enhancement for
    obstruction of justice under § 3C1.1. Defendant’s total offense level was 26.
    Based on a criminal history category of I and a total offense level of 26,
    Defendant’s guideline range was 63 to 78 months’ imprisonment. The PSR also
    stated that Counts 3, 4, and 5 carried a mandatory two-year term of imprisonment
    that must run consecutive to any other term of imprisonment. Of relevance to this
    appeal, Defendant objected to the two-level enhancement under § 2B1.1(b)(17).
    He argued that the offense he was convicted of under § 1030—intentionally
    causing damage to a protected computer without authorization—did not involve an
    intent to obtain personal information or the public dissemination of personal
    information. Defendant also objected to the two-level enhancement for obstruction
    of justice under § 3C1.1.
    At the sentencing hearing, the Government asserted that the § 2B1.1(b)(17)
    enhancement should apply because Defendant was convicted of an offense under
    § 1030 and the relevant conduct for that offense demonstrated an intent to obtain
    personal information. Specifically, Defendant hacked into Navarro’s server and
    accessed Blades’s and Topping’s personal email accounts. Additionally,
    Defendant viewed payroll information before deleting files from the Navarro
    8
    Case: 17-13108      Date Filed: 10/26/2018   Page: 9 of 22
    server. Defendant responded that the enhancement should only apply where the
    § 1030 offense contains as an element the intent to obtain personal information.
    Because Defendant’s offense of conviction—§ 1030(a)(5)(A)—contained no such
    element, he argued that the enhancement should not apply. The district court
    overruled Defendant’s objection, concluding that he was convicted of an offense
    under § 1030 and that the Government had established by a preponderance of the
    evidence that the relevant conduct related to his conviction demonstrated an intent
    to obtain personal information.
    As to Defendant’s objection to the enhancement for obstruction of justice,
    the Government argued that the enhancement should apply because Defendant
    testified falsely regarding a material matter during trial. Defendant responded that
    the enhancement was unconstitutional because it punishes defendants for
    exercising their right to testify where they ultimately do not prevail at trial. The
    district court overruled the objection. The district court sustained another
    objection not relevant to this appeal, resulting in an amended guideline range of 51
    to 63 months’ imprisonment as to Counts 1 and 2, followed by the consecutive 24-
    month sentence as to Counts 3 through 5.
    Defendant requested a downward variance, emphasizing his age, lack of
    criminal history, and computer-related talent. The Government asserted that a
    guideline sentence was reasonable given the seriousness and sophistication of the
    9
    Case: 17-13108       Date Filed: 10/26/2018       Page: 10 of 22
    offenses, Defendant’s interest in exerting power and control over the world, and
    his overall lack of honesty and candor. After considering the parties’ statements,
    the PSR, and the 
    18 U.S.C. § 3553
    (a) factors, the court sentenced Defendant to 84
    months’ imprisonment. The sentence consisted of a 60-month sentence as to
    Counts 1 and 2, to run concurrently, a 24-month sentence as to Counts 3 to run
    consecutive to Counts 1 and 2, and a 24-month sentence as to Counts 4 and 5, to
    run concurrently with each other and to the sentence in Count 3. This appeal
    followed.
    II.    DISCUSSION
    A.      Sufficiency of the Evidence
    Defendant argues that the evidence was insufficient to convict him of Count
    4—aggravated identity theft under 18 U.S.C. § 1028A(a)(1).2 Count 4 charged
    Defendant with using the means of identification of another person, specifically the
    debit card of Mayam Ayam, without lawful authority. Defendant asserts that the
    Government failed to prove beyond a reasonable doubt that Ayam’s identification
    was used without authorization because she did not testify at trial.
    We review de novo whether the evidence was sufficient to sustain a criminal
    conviction. United States v. Jiminez, 
    564 F.3d 1280
    , 1284 (11th Cir. 2009). In
    2
    Defendant does not challenge the sufficiency of the evidence as to any of his other convictions
    and has therefore abandoned any challenge he may have had. See United States v. Jernigan, 
    341 F.3d 1273
    , 1283 n.8 (11th Cir. 2003) (providing that issues that are not raised plainly and
    prominently in an appellate brief are deemed abandoned).
    10
    Case: 17-13108     Date Filed: 10/26/2018    Page: 11 of 22
    reviewing the denial of a motion for judgment of acquittal, we view the evidence in
    the light most favorable of the jury’s verdict. 
    Id.
     The evidence will be sufficient
    to sustain a conviction if a reasonable trier of fact could find that it established the
    defendant’s guilt beyond a reasonable doubt. 
    Id.
     at 1284–85. When the
    Government relies on circumstantial evidence, the conviction must be supported by
    reasonable inferences, not mere speculation. United States v. Friske, 
    640 F.3d 1288
    , 1291 (11th Cir. 2011).
    To establish a conviction under 18 U.S.C. § 1028A, “the evidence must
    establish that the defendant: (1) knowingly transferred, possessed, or used; (2) the
    means of identification of another person; (3) without lawful authority; (4) during
    and in relation to a felony enumerated in § 1028A(c).” United States v.
    Barrington, 
    648 F.3d 1178
    , 1192 (11th Cir. 2011) (quotations omitted); 18 U.S.C.
    § 1028A. Defendant argues only that the Government failed to establish that he
    acted without lawful authority when he used Ayam’s credit card. Because he does
    not challenge the sufficiency of the evidence as to any of the other § 1028A
    elements, he has abandoned any such challenge he may have had. See Jernigan,
    
    341 F.3d at
    1283 n.8.
    Here, the evidence presented at trial was sufficient to support Defendant’s
    conviction for aggravated identity theft in Count 4. Although Ayam did not testify,
    the Government presented circumstantial evidence at trial from which a reasonable
    11
    Case: 17-13108   Date Filed: 10/26/2018   Page: 12 of 22
    jury could infer that Ayam did not authorize Defendant to use her credit card.
    Indeed, the Government presented evidence showing that the purchase order made
    in Ayam’s name and paid for using Ayam’s credit card listed the shipping address
    as Defendant’s address. Moreover, the confirmation email for the order was not
    sent to Ayam. Instead, it was sent to Blades’s email address at Navarro and Ayam
    was not a Navarro employee. Further, Ayam’s bank statements show that she
    received a new card number in March 2013, which was the billing cycle
    immediately following the purchase order made on February 18, 2013. Records
    also showed that the purchase order was canceled after Ayam reported it to be
    fraudulent.
    The evidence further showed that the three identity-theft victims—Ayam,
    Flores, and Silverberg—all had transactions with Destiny Patrol Software. Law
    enforcement officials discovered that Defendant’s computer had login email
    addresses from different people associated with destinypatrolsoftware.com. Both
    Flores and Silverberg testified that the purchases made in their names were not
    authorized, and, like Ayam, these purchase orders listed Defendant’s home address
    as the location where the items were to be shipped. Given the similarities between
    the three purchase orders, a reasonable jury could infer that Ayam’s card was used
    without lawful authority.
    12
    Case: 17-13108       Date Filed: 10/26/2018       Page: 13 of 22
    Finally, Defendant took the stand in his own defense and denied having
    engaged in any misconduct, including having used other people’s credit cards.
    Because the jury returned a guilty verdict, it obviously did not believe Defendant’s
    statements and we may consider this as substantive evidence of guilt. See United
    States v. Kendrick, 
    682 F.3d 974
    , 985 (11th Cir. 2012) (“[W]hen a criminal
    defendant chooses to testify on his own behalf, his statements, if disbelieved by the
    jury, may be considered as substantive evidence of his guilt.”). Based on this
    evidence, a reasonable jury could conclude that Defendant acted without Ayam’s
    authorization when he used her credit card. Accordingly, the evidence was
    sufficient to support Defendant’s conviction on Count 4.
    B.      Defendant’s Sentence
    Using a two-step process, we review the reasonableness of a district court’s
    sentence for an abuse of discretion. United States v. Cubero, 
    754 F.3d 888
    , 892
    (11th Cir. 2014). We first look to whether the district court committed any
    significant procedural error, such as miscalculating the advisory guideline range,
    treating the Sentencing Guidelines as mandatory, failing to consider the 
    18 U.S.C. § 3553
    (a) factors,3 selecting a sentence based on clearly erroneous facts, or failing
    3
    The § 3553(a) factors include: (1) the nature and circumstances of the offense and the history
    and characteristics of the defendant; (2) the need to reflect the seriousness of the offense, to
    promote respect for the law, and to provide just punishment for the offense; (3) the need for
    deterrence; (4) the need to protect the public; (5) the need to provide the defendant with needed
    education or vocational training or medical care; (6) the kinds of sentences available; (7) the
    Sentencing Guidelines range; (8) pertinent policy statements of the Sentencing Commission;
    13
    Case: 17-13108        Date Filed: 10/26/2018       Page: 14 of 22
    to adequately explain the chosen sentence. Id. Then we examine whether the
    sentence is substantively reasonable in light of the totality of the circumstances.
    Id. The party challenging the sentence bears the burden of showing that it is
    unreasonable. United States v. Pugh, 
    515 F.3d 1179
    , 1189 (11th Cir. 2008).
    A.      Procedural Reasonableness
    1.     U.S.S.G. § 2B1.1(b)(17) Enhancement
    Defendant challenges the district court’s application of a two-level
    enhancement under § 2B1.1(b)(17). We review a district court’s factual findings
    for clear error and its interpretation of the Sentencing Guidelines de novo. United
    States v. Perez, 
    366 F.3d 1178
    , 1181 (11th Cir. 2004).
    Section 2B1.1(b)(17) of the Sentencing Guidelines provides for a two-level
    increase in a defendant’s offense level if “the defendant was convicted of an
    offense under 
    18 U.S.C. § 1030
    , and the offense involved an intent to obtain
    personal information, or . . . the offense involved the unauthorized public
    dissemination of personal information.” U.S.S.G. § 2B1.1(b)(17). Defendant
    argues that the district court erred by applying the enhancement under
    § 2B1.1(b)(17) because 
    18 U.S.C. § 1030
    (a)(5)(A)4—the statute of conviction—
    (9) the need to avoid unwarranted sentencing disparities; and (10) the need to provide restitution
    to victims. 
    18 U.S.C. § 3553
    (a).
    4
    Section 1030(a)(5)(A) provides that a defendant violates the statute if he “knowingly causes
    the transmission of a program, information, code, or command, and as a result of such conduct,
    14
    Case: 17-13108       Date Filed: 10/26/2018      Page: 15 of 22
    does not involve “an intent to obtain personal information” or “the unauthorized
    public dissemination of personal information.” Stated another way, Defendant
    asserts that the § 2B1.1(b)(17) enhancement applies only where the § 1030 offense
    in question includes as an element “an intent to obtain personal information” or
    “the unauthorized public dissemination of personal information.”
    We are not, however, persuaded by Defendant’s narrow interpretation of the
    term “offense” under § 2B1.1(b)(17). The term “offense” is broadly defined in the
    Guidelines to mean “the offense of conviction and all relevant conduct under
    § 1B1.3 (Relevant Conduct) unless a different meaning is specified or is otherwise
    clear from the context.” U.S.S.G. § 1B1.1, comment. (n.1(H)) (emphasis added);
    see United States v. De La Cruz Suarez, 
    601 F.3d 1202
    , 1221 (11th Cir. 2010)
    (explaining that the term offense is defined as “the offense of conviction” and “all
    relevant conduct”). Relevant conduct, in turn, is defined as “all acts and omissions
    committed, aided, abetted, counseled, commanded, induced, procured, or willfully
    caused by the defendant . . . that occurred during the commission of the offense of
    conviction.” U.S.S.G. § 1B1.3(a)(1)(A). Section 2B1.1(b)(17) does not specify a
    different meaning for the term offense, nor is it clear from the context that the term
    intentionally causes damage without authorization, to a protected computer.” 
    18 U.S.C. § 1030
    (a)(5)(A).
    15
    Case: 17-13108     Date Filed: 10/26/2018    Page: 16 of 22
    should be interpreted differently under this provision. See U.S.S.G. § 1B1.1,
    comment. (n.1(H)); U.S.S.G. § 2B1.1(b)(17).
    To support his argument, Defendant asserts that because there are certain
    subsections of § 1030 that require an intent to obtain personal information or the
    public dissemination of information, the § 2B1.1(b)(17) enhancement should apply
    to convictions under those subsections, not to his offense of conviction,
    § 1030(a)(5)(A). One of the subsections Defendant identifies is § 1030(a)(2)(C),
    which makes it a violation for a defendant to “intentionally access[] a computer
    without authorization or exceed[] authorized access, and thereby obtain[] . . .
    information from any protected computer.” 
    18 U.S.C. § 1030
    (a)(2)(C). Contrary
    to Defendant’s assertions, however, § 1030(a)(2)(C) does not contain an element of
    intent to obtain personal information or involve the public dissemination of
    personal information. See 
    18 U.S.C. § 1030
    (a)(2)(C). We are therefore not
    persuaded by this argument.
    Here, the district court determined that the enhancement under
    § 2B1.1(b)(17) applied because Defendant was convicted of an offense under
    § 1030, namely § 1030(a)(5)(A), and the relevant conduct related to that offense
    involved the intent to obtain personal information. We discern no error in the
    district court’s interpretation of this enhancement. Moreover, Defendant does not
    challenge the district court’s finding that the relevant conduct related to the offense
    16
    Case: 17-13108        Date Filed: 10/26/2018        Page: 17 of 22
    involved the intent to obtain personal information.5 Accordingly, the district court
    did not err by applying the two-level enhancement under § 2B1.1(b)(17).6
    2.      Obstruction-of-Justice Enhancement
    Defendant also challenges the district court’s imposition of a two-level
    enhancement for obstruction of justice under U.S.S.G. § 3C1.1. Specifically, he
    argues that the district court failed to make an explicit finding that he willfully
    obstructed justice. Defendant, however, did not challenge the enhancement on this
    basis before the district court. Instead, he argued that the enhancement unfairly
    punished him for exercising his constitutional right to testify. Because Defendant
    argues for the first time on appeal that the district court was required to make an
    explicit willfulness finding, our review is limited to plain error. 7 See United States
    5
    But regardless, the district court did not clearly err by finding that the conduct related to the
    offense involved the intent to obtain personal information. Specifically, Defendant hacked into
    Navarro’s computer system by using programs that enabled him to capture usernames and
    passwords. In doing so, he gained access to, among other things, payroll information and
    Topping’s email account and other biographical information. See U.S.S.G. § 2B1.1, comment.
    (n.1) (defining “personal information” to mean “sensitive or private information involving an
    identifiable individual” including private correspondence, such as emails, medical records, or
    financial records).
    6
    The Government also argues that the district court’s application of the enhancement under
    § 2B1.1(b)(17) does not constitute double counting. Because this argument was not “plainly and
    prominently” raised in Defendant’s brief, we do not address this argument. See Jernigan, 
    341 F.3d at
    1283 n.8.
    7
    “The plain-error test has four prongs: there must be (1) an error (2) that is plain and (3) that
    has affected the defendant’s substantial rights; and if the first three prongs are met, then a court
    may exercise its discretion to correct the error if (4) the error ‘seriously affects the fairness,
    integrity or public reputation of judicial proceedings.’” United States v. Madden, 
    733 F.3d 1314
    ,
    1320 (11th Cir. 2013) (alteration accepted) (quoting United States v. Olano, 
    507 U.S. 725
    , 732
    (1993).
    17
    Case: 17-13108     Date Filed: 10/26/2018    Page: 18 of 22
    v. Rodriguez, 
    398 F.3d 1291
    , 1298 (11th Cir. 2005) (providing that a sentencing
    objection raised for the first time on appeal is reviewed for plain error).
    We conclude that the district court did not err, plainly or otherwise, by
    applying the obstruction-of-justice enhancement without making an explicit
    finding that Defendant willfully provided false testimony. Section 3C1.1 of the
    Guidelines provides for a two-level increase in a defendant’s offense level if “the
    defendant willfully obstructed or impeded, or attempted to obstruct or impede, the
    administration of justice with respect to the investigation, prosecution, or
    sentencing of the instant offense of conviction, and . . . the obstructive conduct
    related to (A) the defendant’s offense of conviction and any relevant conduct; or
    (B) a closely related offense.” U.S.S.G. § 3C1.1.
    The Guidelines’ commentary identifies perjury as an example of conduct
    that warrants application of the enhancement. U.S.S.G. § 3C1.1, comment.
    (n.4(B)). For purposes of this enhancement, the Supreme Court has defined
    perjury as “false testimony concerning a material matter with the willful intent to
    provide false testimony, rather than as a result of confusion, mistake, or faulty
    memory.” United States v. Dunnigan, 
    507 U.S. 87
    , 94 (1993). Although the
    district court should make specific factual findings concerning the elements of
    perjury, we have explained that application of the obstruction-of-justice
    enhancement may be affirmed where the district court makes a general finding that
    18
    Case: 17-13108     Date Filed: 10/26/2018    Page: 19 of 22
    the defendant committed perjury as to material matters and that finding is
    supported by the record. United States v. Dobbs, 
    11 F.3d 152
    , 155 (11th Cir.
    1994); see also United States v. Hatney, 
    80 F.3d 458
    , 463 (11th Cir. 1996) (“[W]e
    may affirm a district court’s enhancement even absent particularized findings
    regarding the defendant’s perjury so long as the district court found in general that
    the defendant’s testimony was perjurious as to material matters and the record
    supports that finding.”).
    In the present case, the district court concluded that Defendant “provided
    materially false testimony under oath in that he specifically denied his involvement
    in intruding into the Navarro computer testimony” and therefore “is being punished
    for providing perjured testimony.” Although the district court did not make an
    explicit finding as to willfulness, the record amply supports the district court’s
    finding that Defendant perjured himself on material matters when he unequivocally
    denied any involvement in the intrusion into Navarro’s computer system. Indeed,
    the evidence showed that Defendant installed programs on Navarro’s computers
    that enabled him to access usernames and passwords and to connect remotely to
    Navarro’s computer system. Additionally, the forensic analysis of Defendant’s
    computer showed that he had accessed Topping’s email account, his biographical
    information, and Navarro’s payroll information. Moreover, during his testimony,
    Defendant did not indicate that he was confused or mistaken about his recollection
    19
    Case: 17-13108     Date Filed: 10/26/2018    Page: 20 of 22
    of the issues in this case. See Dunnigan, 
    507 U.S. at 95
     (indicating that inaccurate
    testimony does not constitute perjury if it is the result of confusion, mistake, or a
    faulty memory). In short, Defendant cannot establish that the district court’s
    application of the obstruction-of-justice enhancement constituted plain error.
    B.     Substantive Reasonableness
    Finally, Defendant argues that his sentence is substantively unreasonable.
    We disagree. First, Defendant’s 84-month sentence—which consisted of a 60-
    month sentence as to Counts 1 and 2 and a consecutive 24-month sentence as to
    Counts 3, 4, and 5—was within the guideline range of 51 to 63 months’
    imprisonment as to Counts 1 and 2 and the mandatory 24-month sentence as to
    each of Counts 3 through 5. See United States v. Hunt, 
    526 F.3d 739
    , 746 (11th
    Cir. 2008) (explaining that this Court normally expects a sentence within the
    guideline range to be reasonable). The 60-month sentence as to Counts 1 and 2
    was also significantly below the statutory maximum of 120 months’ imprisonment
    for those offenses. See United States v. Gonzalez, 
    550 F.3d 1319
    , 1324 (11th Cir.
    2008) (explaining that a sentence well below the statutory maximum is an indicator
    of reasonableness). And notably, the district court had discretion to run the 24-
    month sentences as to Counts 3 through 5 consecutive to each other, but instead
    chose to run them concurrent to each other. See 18 U.S.C. § 1028A(b)(2), (b)(4).
    20
    Case: 17-13108     Date Filed: 10/26/2018   Page: 21 of 22
    Defendant’s 84-month sentence is also supported by the § 3553(a) factors,
    including the nature and circumstances of the offense and Defendant’s history and
    characteristics. As noted by the district court, Defendant’s offenses were serious
    and complex. Indeed, the Government emphasized that Defendant’s crimes—
    which involved hacking into his former employer’s computer system, accessing
    email accounts and other personal information of employees, destroying files, and
    obtaining credit card numbers to make unauthorized purchases—were not isolated
    or spur-of-the-moment offenses, but instead had required deliberate planning and
    preparation over a period of time.
    Although Defendant argues that the court did not adequately consider his
    lack of criminal history or the fact that his actions were merely an immature
    response to his demotion at Navarro, the weight the court assigned to each factor
    was entirely within its discretion. See United States v. Rosales-Bruno, 
    789 F.3d 1249
    , 1254 (11th Cir. 2015) (“The decision about how much weight to assign a
    particular sentencing factor is ‘committed to the sound discretion of the district
    court.’” (quoting United States v. Williams, 
    526 F.3d 1312
    , 1322 (11th Cir. 2008)).
    And contrary to Defendant’s argument that the district court sentenced him based
    on its assumption that he harbored anti-government sentiments, the district court
    explicitly stated that it was giving Defendant the benefit of the doubt that he was
    not an anti-government supporter.
    21
    Case: 17-13108      Date Filed: 10/26/2018   Page: 22 of 22
    In short, we are not “left with the definite and firm conviction that the
    district court committed a clear error of judgment in weighing the § 3553(a) factors
    by arriving at a sentence that lies outside the range of reasonable sentences dictated
    by the facts of the case.” United States v. Irey, 
    612 F.3d 1160
    , 1190 (11th Cir.
    2010) (quotations omitted). Accordingly, Defendant has not met his burden of
    showing that his 84-month sentence is substantively unreasonable.
    III.   CONCLUSION
    Based on the foregoing reasons, Defendant’s convictions and sentences are
    AFFIRMED.
    22