Defendant-appellant Darían Lyons was convicted of two counts of transporting stolen property in connection with the theft of computer equipment from the UNISYS corporation. He appeals his conviction and sentence on various grounds. Our jurisdiction arises under 28 U.S.C. § 1291 and 18 U.S.C. § 3742 and we affirm.
Background
UNISYS, a computer and information technology company, employed Mr. Lyons from 1987 to 1990. While working at the UNISYS facility in Uxbridge, England, Mr. Lyons stole a UNISYS U6000/50 computer and associated components, which he later sent to a post office box in Utah. Mr. Lyons returned to the United States, retrieved the equipment, and began working for UNISYS at its Salt Lake City office. That office then experienced a series of thefts of equipment compatible with the U6000. After quitting his job with UNISYS, Mr. Lyons transported *1031 the stolen equipment to his new address in Massachusetts.
An FBI investigation resulted in execution of a warrant to search Mr. Lyons’ Massachusetts home, where agents found most of the stolen equipment, including hard disks belonging to UNISYS. Some time after seizing the equipment, and without first obtaining a separate warrant, FBI agents supervised a UNISYS technician who searched the contents of the hard disks. The technician discovered several valuable proprietary programs, apparently also stolen from UNISYS, stored on the disks.
A grand jury returned an indictment on one count of transporting stolen property across international borders and one count of transporting stolen equipment across state lines. See 18 U.S.C. § 2314. A jury convicted Mr. Lyons on both counts, and the district court imposed a sentence of thirty-nine months under the Sentencing Guidelines.
Discussion
Mr. Lyons’ appeal raises numerous issues, many of them frivolous. However, two issues merit discussion: (1) whether the discovery of the software on one of the stolen hard drives was the product of a Fourth Amendment violation, and (2) whether the value of stolen computer software may be included in calculating a sentence under U.S.S.G. §§ 1B1.3 and 2B1.2.
I. Discovery of Stolen Computer Software During The Search Of The Hard Drive
Mr. Lyons claims that the discovery of the computer software was the product of an unreasonable search. Our analysis of this question raises but one issue: whether Mr. Lyons had an objectively reasonable expectation of privacy in the contents of the hard drive. Although the district court did not base its denial of the motion to suppress on this ground, the facts as they pertain to this inquiry are uncontroverted and we consider this threshold inquiry de novo.
See United States v. Rubio-Rivera,
After being seized by law enforcement authorities, the stolen hard disks along with other items of seized personal property were taken to the FBI evidence room. A few days later, a UNISYS employee, while performing an inventory of the items seized, searched the contents of the disks and discovered proprietary software.
Because Fourth Amendment rights are personal, Mr. Lyons, as the proponent of the motion to suppress, had the burden of proving that his own Fourth Amendment rights were violated by the search in question.
Rakas v. Illinois,
Those portions of the record furnished by the parties in their appendices reflect that no attempt was made to show that Mr. Lyons had any rightful claim to the hard disks that were seized pursuant to the warrant.
See United States v. Arango,
II. Stolen Computer Software And The Sentencing Guidelines
Mr. Lyons asserts that he was convicted of transporting only stolen computer
hardware,
and that our decision in
United States v. Brown,
Sentencing on a charge of transporting stolen property requires calculation of the total value of the property stolen. U.S.S.G. § 2B1.2(b)(1). The district court calculated the total value of the stolen property at $292,000: $27,000 for the value of the hardware and $265,000 for the software. We review the court’s factual findings supporting calculation of loss under the clearly erroneous standard, but review de novo questions of law regarding the application of the Sentencing Guidelines.
United States v. Smith,
As an initial matter, we question Mr. Lyons’ assertion that he was not convicted for the theft of software. The court granted Mr. Lyons’ motion to strike the phrase “and computer software” from the indictment as surplus language. The remaining words of the indictment charged Mr. Lyons with transportation of stolen “computer components and computer equipment.” During the hearing on the motion to strike, the parties discussed how the changes would affect the remaining charges, which concluded:
The Court: And I say, well, why are [the words “and computer software”] surplus language? And the only . argument it seems to me is they’re surplus language because all of these are computer components or computer equipment. They’re embraced by the larger term, and thus we don’t need the lesser, more specific term. Defense Counsel: Your honor, I’ve consulted with my client, and we accept the court’s interpretation.
The Court: But namely, when we’re talking about computer software, that that’s embraced within the larger terms of “computer components” and “computer equipment”?
Defense Counsel: That’s correct____
Aplee.App. at 26-27. Given this concession by defense counsel, we find that the language of the modified indictment included software offenses. Convicted of transporting both stolen hardware and software, Mr. Lyons’ sentence properly aggregated the total value of these items.
We believe that the verbal exchange between defense counsel and the court demonstrates that all parties accepted that the software offenses would still remain in the indictment, arguments to the contrary notwithstanding. We nonetheless recognize that the district court’s written order striking the language from the indictment did not specify that the remaining language included software. Therefore, we hold in the alternative that even if the charges of conviction did not include transportation of stolen software, consideration of unconvicted software offenses would still have been appropriate at sentencing.
The Guidelines permit the sentencing court to look beyond the charges of conviction in computing a sentence.
United States v. Underwood,
Mr. Lyons contends that even if he stole the software, our decision in
Brown
precludes consideration of its value. In
Brown,
we applied the Supreme Court’s decision in
Dowling v. United States,
In an age where the intangible intellectual property value of goods may vastly exceed the intrinsic worth of accompanying tangible goods, application of the letter and intent of the Sentencing Guidelines mandates that courts include intangible value when thefts of tangible objects occur. For example, the Guidelines assess value for criminal copyright infringement on the basis of the market value of the infringing items, even though that value arises from its worth as intangible intellectual property. U.S.S.G. § 2B5.3. This market value may far exceed the loss or gain due to the offense. Id. The same approach is used for calculating the value of intercepted transmissions prosecuted under the Electronic Communications Act of 1986, in which case the intercepted transmissions are completely intangible. Id. comment.
We also reject Mr. Lyons’ contention that the court overestimated the value of the software. Testimony at the sentencing hearing indicated that $265,000 would have been the cost of a single sublicensed copy of the items stolen. The court’s calculation of value was not clearly erroneous.
III. The Validity Of The Warrant
Mr. Lyons also challenges the validity and scope of the warrant and subsequent search. Contrary to Mr. Lyons’ allegations, the government presented the magistrate with probable cause to issue the warrant, the warrant was not the product of material misrepresentations of fact, the warrant specifically identified the evidence sought, and the scope of the search did not exceed the scope of the warrant. We therefore reject Mr. Lyons’ challenges to the warrant and the subsequent search.
AFFIRMED.
