Lead Opinion
Michael Musacchio appeals his conviction and sentence for conspiracy and substantive violations of the Computer Fraud and Abuse Act. We affirm.
I.
Musacchio was the president of Exel Transportation Services (“ETS”) until he resigned in 2004. ETS is a transportation brokerage company that arranges freight shipments for business clients; it relies on independent agents to sell its services. In 2005, Musacchio founded a competing company, Total Transportation Services (“TTS”), and two ETS employees, Roy Brown and Michael Kelly, followed him. Beginning in 2006, several agents moved from ETS to TTS.
At about the same time, the new ETS president, Jim Damman, undertook to sign new contracts with agents. He noticed, however, that some agents seemed aware of the new terms before they had been disclosed. One agent revealed Brown had shown him an undisclosed ETS contract addendum; Damman became suspicious and hired a forensic firm to investigate the leak. The firm discovered Musacchio and Brown had been accessing ETS’s servers. ETS sued TTS, Musacchio, Brown, and others, and the parties settled for $10 million.
At trial, the government introduced evidence that, after Musacchio left ETS but before Brown did, Musacchio asked Brown to access other employees’ email to collect information. Brown had previously worked in ETS’s information-technology department and had the ability, though not the authority, to access other employees’ email. Brown complied with Musacchio’s requests. After resigning from ETS, Brown used another administrator account to access ETS’s servers remotely, and when that stopped working, Kelly provided Musacchio and Brown with other administrator accounts. In addition, the government presented evidence that Kim Shipp, an ETS employee who had been Musac-chio’s assistant, shared the email of Steve Bowers, an ETS executive, with Musacchio at his request. As Bowers’s assistant, Shipp had the authority to access Bowers’s email but not to share it with Musacchio.
The government’s proposed jury instructions for Count 1 stated the jury had to find Musacchio agreed to “intentionally access® a protected computer(s) without authorization.” It did not mention exceeding authorized access. The court revised the instructions, defining the underlying offense as “to intentionally access a protected computer without authorization and exceed authorized access.” Neither the government nor Musacchio objected to the conjunctive instructions. The court instructed the jury that its “verdict must be unanimous on each count of the indictment.” The jury found Musacchio guilty on all three counts.
. The presentence investigation report (“PSR”) calculated Musacchio’s criminal history category as I and the offense level as 36. A significant component of the latter calculation was an estimate that the loss was $10 million, which increased the offense level by twenty compared to a loss of $5,000 or less. See U.S. Sentencing Guidelines Manual (“U.S.S.G.”) § 2Bl.l(b)(l). Musacchio and the government objected to the loss calculation. Mu-sacchio claimed the forensic firm’s fees, $322,000, were a reasonable estimate of the total loss. The government suggested $160 million, which it said was the loss in business value and profits. Two of Musac-chio’s experts alleged the conspiracy had a negligible impact on agent departures and estimated the loss to be, at most, less than $200,000. Jim Shields, TTS’s attorney during the settlement negotiations in the civil case, testified that approximately $135,000 of the $10 million settlement represented ETS’s lost profit from agents’ departures attributable to the conspiracy.
Musacchio also objected to the PSR’s application of a two-level enhancement for sophisticated means. See id. § 2Bl.l(b)(10)(C). The court rejected his contention, finding that the conspirators’ efforts to conceal their access to ETS’s servers constituted sophisticated means.
Based on these rulings, the court calculated Musacchio’s total offense level as 26, resulting in a guideline range of 63 to 78 months. The court imposed concurrent 60-month sentences on Counts 1 and 2 and a consecutive three-month sentence on Count 8.
II.
Musacchio challenges the sufficiency of the evidence on Count 1. The court incorrectly instructed the jury that it had to find that Musacchio had agreed to make unauthorized access and exceed authorized access. The statute requires only that he agreed to make unauthorized access or exceed authorized access. Musacchio urges that the erroneous instruction became the law of the case, obligating the government to prove he agreed to both elements. He believes the evidence was insufficient to prove he agreed to exceed authorized access. We review de novo a properly preserved challenge to the sufficiency of the evidence, United States v. Brown,
In general, “[a]n instruction that increases the government’s' burden and to which the government does not object becomes the law of the case,” United States v. Jokel,
The court instructed the jury that “18 U.S.C. § 1030(a)(2)(C) makes it a crime for a person to intentionally access a protected computer without authorization and exceed authorized access....” The statute, by contrast, applies to anyone who “intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains information from any protected computer.” 18 U.S.C. § 1030(a)(2)(C). The replacement of “or” with “and” was an obvious clerical error, not a possible alternative description of the offense.
Nor was the issue misstated in the indictment.
Therefore, Guevara controls, and the government was required to prove only that Musacchio agreed to make unauthorized access. Musacchio does not dispute the sufficiency of the evidence on that element, so he cannot prevail on his challenge to the sufficiency of the evidence on Count 1.
III.
Musacchio attacks the jury instructions on Count 1 as plainly erroneous. In his view, the court should have told the jury it had to be unanimous as to one of the two possible elements — making unauthorized access or exceeding authorized access.
Where the claim is properly preserved, we review a failure to provide a requested jury instruction for abuse of discretion. United States v. Grant,
“[A] general unanimity instruction is ordinarily sufficient,” United States v. Mason,
Dillman forecloses Musacchio’s challenge to the jury instructions on Count 1. No specific unanimity instruction was necessary, and the court properly declined to provide one. Further, there was no risk of jury confusion, because the jury found Mu-sacchio guilty of two substantive counts of making unauthorized access. There was no plain error.
IV.
Musacchio claims his prosecution on Count 2 was barred by the statute of limitations. But a limitations defense is waived if, as here, it was not raised at trial. United States v. Arky,
Musacchio points to United States v. Shipley,
The other case Musacchio cites, Putman v. United States,
V.
Musacchio contends the errors in his' trial combined to render it unconstitutionally unfair. Under the cumulative-error doctrine, “an aggregation of non-reversible errors ... can yield a denial of the constitutional right to a fair trial, which calls for reversal.” United States v. Munoz,
VI.
Musacchio urges that the court miscalculated the loss under the sentencing guidelines. First, he claims the court should have considered only the costs of investigating and remediating the computer intrusion, not business losses. Second, he alleges the court miscalculated the loss even under the government’s interpretation of the guidelines.
We review de novo interpretations of the guidelines and the method of calculating the loss. United States v. Nelson,
The guidelines provide for an offense-level increase based on the loss, defined as “the greater of actual loss or intended loss.” U.S.S.G. § 2B1.1 cmt. n. 3(A). Actual loss is “the reasonably foreseeable pecuniary harm that resulted from the offense,” id. cmt. n. 3(A)(i), while intended loss is “the pecuniary harm that was intended to result from the offense,” id. cmt. n. 3(A)(ii). The guidelines include an addi
(v) Rules of Construction in Certain Cases. — In the cases described in subdivisions (I) through (III), reasonably foreseeable pecuniary harm shall be considered to include the pecuniary harm specified for those cases as follows:
(III) Offenses Under 18 U.S..C. § 1080. — In the case of an offense under 18 U.S.C. § 1030, actual loss includes the following pecuniary harm, regardless of whether such pecuniary harm was reasonably foreseeable: any reasonable cost to any victim, including the cost of responding to an offense, conducting a damage assessment, and restoring the data, program, system, or information to its condition prior to the offense, and any revenue lost, cost incurred, or other damages incurred because of interruption of service.
Id. cmt. n. 3(A)(v)(III) (emphasis omitted).
Musacchio’s first contention, that only the costs described in the latter provision should have been included, is incorrect. To begin with, his approach is contrary to the guideline language. The use of the word “includes” in Note 3(A)(v)(III) indicates the loss described in that provision should be considered in addition to actual loss, as defined in Note 3(A)(i).
Moreover, the caselaw is contrary to Musacchio’s position. The out-of-circuit cases he cites concerning the guidelines, as distinguished from the Act’s similarly worded civil provisions, provide little support. Musacchio concedes that United States v. Batti,
*366 “Actual loss” under the sentencing guidelines, “means the reasonably foreseeable pecuniary harm that resulted from the offense.” ... Additionally, in cases involving fraud and related activity in connection with computers, the sentencing guidelines include in the calculation of actual loss [the costs described in Note 3(A)(v)(III) ], regardless of whether such pecuniary harm was reasonably foreseeable....
Id. at 619 (emphasis added) (quoting U.S.S.G. § 2B1.1 cmt. n. 3(A))' Under Schuster, then, the loss includes both foreseeable harm and the costs listed in Note 3(A)(v)(III). Other cases have interpreted the guidelines similarly.
Musacchio’s second claim, that the court miscalculated the loss even under the government’s interpretation of the guidelines, is equally unavailing. Shields’ testimony provided a basis for the finding that the loss was $1 million or less, showing it “is plausible in light of the record read as a whole.” Krenning,
VII.
Musacchio criticizes the application of the sophisticated-means enhancement, claiming his conduct fell short of the sophistication required to trigger it. We review for clear error a determination that a defendant used sophisticated means. United States v. Roush,
Musacchio’s efforts to conceal his activities meet this standard. He and his coconspirators used administrator accounts to read ETS employees’ email, which concealed their identities. They forwarded the text of the email using webmail accounts in an attempt to avoid leaving records. Though many individuals familiar with computers likely could have developed a similar process, we previously have applied the enhancement “in cases involv
AFFIRMED.
Notes
Pursuant to 5th Cir. R. 47.5, the court has determined that this opinion should not be published and is not precedent except under the limited circumstances set forth in 5th Cir. R. 47.5.4.
. Musacchio tacitly concedes this, noting he “was indicted in Count 1 of the second superseding indictment for conspiracy to make unauthorized access to a protected computer" and referring to the "two superseding indictments ... which abandoned the ‘exceeding authorized access' crime."
. Apparently Musacchio is taking inconsistent positions on appeal and claiming the jury had to find only one of the two elements. No specific unanimity instruction would have been necessary had the government been required to prove both elements.
. See United States v. Baker,
. U.S. Sentencing Comm’n, Report to the Congress: Increased Penalties for Cyber Security Offenses 1 (2003) (emphasis added).
. See, e.g., United States v. Willis,
. See Anderson v. City of Bessemer City, N.C.,
.See United States v. Kennedy,
. See, e.g., United States v. Wright,
Concurrence Opinion
concurring:
I concur fully in the judgment of the court. I do not join in the reasoning of Section II of the opinion, however, because I would conclude that the Government sufficiently proved both prongs (“exceeds authorized use” and “unauthorized access”) and, therefore would not reach the issue discussed in Section II. United States v. John,
