United States v. Lennon Brown
Opinion
Lennon Ray Brown, a former Citibank employee, pleaded guilty to intentionally damaging a protected computer in violation of
I
Brown was a system specialist at Citibank's Global Control Center in Irving, Texas. On December 23, 2013, Brown was called into a meeting with his supervisors and presented with a formal "Performance Improvement Plan" based on accusations of poor work performance. Brown refused to participate in the plan. At 6:03 p.m., about an hour after leaving the meeting, Brown connected to Citibank's secure network and intentionally executed commands to disrupt network traffic through ten of Citibank's data routers, ultimately impacting nine. Brown's sabotage resulted in a loss of connectivity to some but not all of Citibank's North American data centers, campuses, call centers, and sixty-nine ATMs. He then left the building, informing a coworker that he would not be returning. The Global Control Center almost immediately received an automatic alert notifying it of the outage and promptly committed company resources to resolve the problem. By 10:17 p.m., Citibank had restored ninety percent of the lost connectivity, and by 4:21 a.m. the next morning had fully restored the network.
Brown pleaded guilty without a plea agreement to a one-count indictment charging him with intentional damage to a protected computer in violation of
Brown subsequently filed a sentencing memorandum, requesting a downward variance and disputing the loss calculations and other facts included in the PSR. Brown alleged that his offense level was erroneously calculated under the Guidelines and proposed an alternative calculation that, relevant to this appeal, eliminated the six-level enhancement and corresponding level increase under § 2B1.1(b)(18)(A)(iii) and (18)(B) and substituted a mutually exclusive four-level enhancement under § 2B1.1(b)(18)(A)(ii). In its response, the Government stated that Brown "appear[ed] to object to the loss figure [and] the 6 level increase pursuant to § 2B1.1(b)(18)(A)(iii) for a substantial disruption of a critical infrastructure." The Government contended that the § 2B1.1(b)(18)(A)(iii) enhancement was correctly applied because Brown "shut down nine (9) [of] CITI's routers, causing a substantial disruption to CITI's call centers, and deleting essential encryption in the ATM systems and Global Transaction systems."
At sentencing, the district court concluded that the $56,202 figure included in the PSR's loss calculation as the amount attributable to increased customer contacts with Citibank's call center was too speculative and thus determined that the total loss *284 suffered was $77,200. This lowered Brown's Guidelines range to thirty-seven to forty-six months of incarceration. On the Government's request, the district court then addressed other objections implicit in Brown's sentencing memorandum, ruling that "[t]o the extent those were objections, they are overruled." Citing Brown's otherwise upstanding personal history, the district court found that Brown's conviction constituted aberrant conduct and downwardly departed under U.S.S.G. § 5K2.20, imposing a sentence of 21 months of incarceration followed by two years of supervised release.
Brown appeals, challenging only the application of the enhancements under U.S.S.G. § 2B1.1(b)(18)(A)(iii) and (18)(B) for "substantial disruption of a critical infrastructure."
II
We review a district court's interpretation and application of the Guidelines de novo.
United States v. Hernandez
,
The Government argues that Brown failed to preserve his issue on appeal by not raising it before the district court and, consequently, his claim is subject to plain error review. In order to preserve an argument for appeal, it "must be raised to such a degree that the district court has an opportunity to rule on it."
United States v. Soza
,
Brown's sentencing memorandum did not explicitly argue that his conduct did not amount to a substantial disruption of critical infrastructure. However, he did directly dispute the calculation of his Guidelines range, proposing an alternative calculation that eliminated the enhancement under (18)(A)(iii) and substituted a different enhancement:
The base offense level, 2B 1.1 is -6 Loss between 5,000.-101[,]000 -2 1030(a)(5)A -4 There is no sophisticated means 0 Total 12 __
Brown's proposed calculation does not include an enhancement under (18)(A)(iii). Instead, it includes a four-level enhancement for "1030(a)(5)A." This amounts to an objection that his sentence should have been enhanced under § 2B.1.1(b)(18)(A)(ii),
*285
which imposes a four-level increase for offenses committed under this particular subsection of
The Government's response demonstrates that Brown's sentencing memorandum put it on notice of this particular argument. The Government acknowledged that Brown, by proposing this alternative Guidelines calculation, "appears to object to ... the 6 level increase pursuant to U.S.S.G. § 2B1.1(b)(18)(A)(iii) for a substantial disruption of a critical infrastructure," and then rebutted that implicit objection.
See
Ocana
,
Though Brown could have raised his objection more explicitly and thoroughly below, we conclude that he presented both the Government and the district court the opportunity to address Brown's issue on appeal, and consequently sufficiently preserved this issue for our review.
Cf.
United States v. Neal
,
III
Under U.S.S.G. § 2B.1.1(b)(18)(A)(iii), a six-level increase is warranted if a defendant is convicted of an offense under
The commentary to the 2015 Sentencing Guidelines defines "critical infrastructure" as "systems and assets vital to national defense, national security, economic security, public health or safety, or any combination of these matters." U.S. Sentencing Guidelines Manual § 2B1.1(b)(18) cmt. n.14 (U.S. Sentencing Comm'n 2015). The enumerated examples include public and private "financing and banking systems."
Other language in § 2B1.1 indicates what is
not
a substantial disruption. Under § 2B1.1(b)(18)(A)(i), a defendant is eligible for only a two-level increase for a § 1030 conviction that, inter alia, "involved
*286
a computer system used to maintain or operate a critical infrastructure." If, like Brown, a defendant is convicted under § 1030(a)(5)(A) for conduct involving such a computer system, then § 2B1.1(b)(18)(A)(ii) would apply instead, resulting in a four-level enhancement. This subsection of § 1030 criminalizes "knowingly caus[ing] the transmission of a program, information, code, or command, and as a result of such conduct, intentionally caus[ing] damage without authorization, to a protected computer."
In contrast, the Commentary discusses conduct that is more egregious than that which causes a "substantial disruption." U.S. Sentencing Guidelines Manual § 2B1.1(b)(18) cmt. n.20(B) (U.S. Sentencing Comm'n 2015). This portion of the commentary recommends an upward departure "in a case in which subsection (b)(18)(A)(iii) applies and the disruption to the critical infrastructure(s) is
so substantial as to have a debilitating impact
on national security, national economic security, [and/or] national public health or safety."
The Commentary further directs readers to § 2B1.1(b)(18)(A)(iii)'s statutory origins. U.S. Sentencing Guidelines Manual § 2B.1.1(b)(18) cmt. background (U.S. Sentencing Comm'n 2015). It notes that "[s]ubsection (b)(18) implements the directive in section 225(b) of Public Law 107-296," also known as the Cyber Security Enhancement Act of 2002.
According to the Commentary, § 2B1.1(b)(18)(A)(iii)'s enhancement for a "substantial disruption of a critical infrastructure" implements this directive from Congress by imposing harsher sentencing recommendations for those offenses that could have a "serious impact" on "national security, national economic security, national public health or safety, or a combination of any of these matters." U.S. Sentencing Guidelines Manual § 2B.1.1(b)(18) cmt. background (U.S. Sentencing Comm'n 2015). In specifying how this provision satisfies the statutory directive, the Commentary here suggests a limiting principle: to determine whether § 2B1.1(b)(18)(A)(iii) can be applied to a particular defendant, a court must ask whether his conduct was that which could have a "serious impact" on "national security, national economic
*287
security, [and/or] national public health or safety."
Using the Commentary to guide our analysis, Brown's conduct did not constitute a "substantial disruption of a critical infrastructure." There is no indication that Brown's conduct affecting a portion of Citibank's operations for a short period of time could have had a serious impact on national economic security. As a result of Brown's actions, Citibank suffered relatively minor financial losses 2 and was temporarily unable to optimally serve its customers. Neither of these harms threatened to disrupt the nation's economy, and, in light of Citibank's demonstrated ability to quickly resolve the disruption and mitigate in the interim, there is no other evidence that Brown's conduct had the potential to do so. Accordingly, we hold that the district court erred by applying an enhancement that we conclude is reserved for conduct that disrupts a critical infrastructure in a way that could have a serious impact on national economic security.
***
For these reasons, the sentence imposed by the district court is VACATED. The case is REMANDED for resentencing consistent with this ruling, with instructions to expedite proceedings in light of Brown's scheduled release from custody.
In
United States v. Mitra
,
Citibank is one of the world's largest banks with over $1.4 trillion in assets. Consumer Fin. Prot. Bureau , CFPB Takes Action Against Citibank For Student Loan Servicing Failures That Harmed Borrowers , (Nov. 21, 2017), https://www.consumerfinance.gov/about-us/newsroom/cfpb-takes-action-against-citibank-student-loan-servicing-failures-harmed-borrowers/.
Reference
- Full Case Name
- UNITED STATES of America, Plaintiff-Appellee v. Lennon Ray BROWN, Defendant-Appellant
- Cited By
- 1 case
- Status
- Published