United States v. Jonathan Lee Eubanks

CourtCourt of Appeals for the Eleventh Circuit
DecidedOctober 26, 2018
Docket17-13108
StatusUnpublished

This text of United States v. Jonathan Lee Eubanks (United States v. Jonathan Lee Eubanks) is published on Counsel Stack Legal Research, covering Court of Appeals for the Eleventh Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Jonathan Lee Eubanks, (11th Cir. 2018).

Opinion

Case: 17-13108 Date Filed: 10/26/2018 Page: 1 of 22

[DO NOT PUBLISH]

IN THE UNITED STATES COURT OF APPEALS

FOR THE ELEVENTH CIRCUIT ________________________

No. 17-13108 Non-Argument Calendar ________________________

D.C. Docket No. 0:16-cr-60238-JIC-1

UNITED STATES OF AMERICA,

Plaintiff-Appellee,

versus

JONATHAN LEE EUBANKS,

Defendant-Appellant.

________________________

Appeal from the United States District Court for the Southern District of Florida ________________________

(October 26, 2018)

Before WILLIAM PRYOR, ANDERSON, and JULIE CARNES, Circuit Judges.

PER CURIAM: Case: 17-13108 Date Filed: 10/26/2018 Page: 2 of 22

A jury convicted Defendant Jonathan Eubanks of intentionally causing

damage without authorization to a protected computer, use of unauthorized access

devices, and three counts of aggravated identity theft. The district court sentenced

Defendant to 84 months’ imprisonment. Defendant now appeals, challenging the

sufficiency of the evidence as to one of his aggravated identity theft convictions.

He also argues that his sentence is procedurally and substantively unreasonable.

After careful review, we affirm.

I. BACKGROUND

A. Facts1

Navarro Security (“Navarro”) is a company that provides security services

for gated communities, individuals, and businesses. In October 2012, Navarro

hired Defendant for the position of road supervisor. As a road supervisor,

Defendant was responsible for checking on and assisting the security officers that

were stationed at each of Navarro’s customers. On January 8, 2013, Defendant’s

supervisor, Glenn Topping, demoted him from road captain to an officer.

Defendant did not return to work after that date, and Navarro officially terminated

Defendant’s employment on January 18, 2013.

1 The following facts are taken from the trial, viewed in the light most favorable to the Government. See United States v. Wright, 392 F.3d 1269, 1273 (11th Cir. 2004). Because Defendant challenges the sufficiency of the evidence as to only one of his convictions, the facts focus on those relevant to the conviction at issue, as well as the sentencing challenges Defendant raises on appeal. 2 Case: 17-13108 Date Filed: 10/26/2018 Page: 3 of 22

On January 27, 2013, Vern Reynolds, Navarro’s technical manager and

system administrator, was alerted to an issue concerning Navarro’s server. While

he was investigating the issue, Reynolds discovered that 12 years’ worth of files

were missing from the server. Reynolds was the only one with authorization to

delete files from the server and he had not done so. Although he was able to

recreate most of the files, he was unable to recreate three or four years’ worth of

documents.

The following day, January 28, 2013, the printer at Navarro stopped

functioning and ultimately needed a new motherboard and operating system. In

addition, the Navarro website was directing users to the websites of Navarro’s

competitors. That same day, Reynolds received an email from Topping regarding

Topping’s departure from Navarro. The email stood out to Reynolds because he

knew that Topping was not in the office that day. Indeed, Topping had been let go

for budgetary reasons a few days earlier. When Reynolds discovered that

Topping’s computer was turned on and running, he concluded that it was being

controlled by someone else from a remote location.

Reynolds’s subsequent review of Topping’s hard drive revealed that a

software program called LogMeIn—a program that allows a person to connect

remotely to another computer—had been installed on Topping’s computer in

December 2012. Another program called Cain & Abel—which captures the

3 Case: 17-13108 Date Filed: 10/26/2018 Page: 4 of 22

username and password of anyone logging into a computer—was also installed on

the computer. Reynolds ultimately learned that Topping’s computer had been

remotely connected to on January 26, 27, and 28, from an IP address that was

registered to Defendant’s home address. Reynolds was the only person authorized

to install a program such as LogMeIn onto one of Navarro’s computers and he had

not done so.

Approximately two weeks later, on February 18, 2013, Navarro’s human

resources director, Linda Blades, received a confirmation email from B&H Photo

regarding a purchase order totaling $3,349.79. The purchase order was made by

Maryam Ayam and paid for using a credit card in Ayam’s name. However, the

order was to be shipped to 6928 Southwest 39th Street, Apt. 206, Fort Lauderdale,

FL, 33314. Blades recognized the shipping address as the one Defendant had

provided to Navarro as his home address. Blades had not made the purchase and

she confirmed that Ayam was not a Navarro employee. B&H Photo later canceled

the order after Ayam confirmed it was fraudulent. The bank statement for Ayam’s

credit card showed that she had purchased Destiny Patrol Software in February

2013. The statement also showed that Ayam received a new credit card number

during the March 2013 billing cycle.

In addition, Blades received email confirmations for two other orders made

in February 2013: one for an interactive pen display totaling $2,499 and the other

4 Case: 17-13108 Date Filed: 10/26/2018 Page: 5 of 22

for an Apple iPad in the amount of $1,188.70. Both orders were made under the

name John Flores, were paid for with John Flores’s credit card, and listed Flores’s

employer at the time, Platt Security, as the billing address. The shipping address

listed on the purchase orders, however, was Defendant’s address. Neither Flores

nor Blades made either of these purchases. Like Ayam, Flores had a monthly

service charge to Destiny Patrol Software.

On February 25, 2013, a purchase in the amount of $1,100.98 was made to

Lecor Technologies using Mark Silverberg’s credit card. The order was placed

from a computer at the Equus gatehouse—a location where Navarro has an

employee stationed to work. A subsequent investigation revealed that the Equus

computer had been logged into from a LogMeIn account at an IP address registered

to Defendant’s home address. Silverberg did not place the order, but like Ayam

and Flores, he had a transaction with Destiny Patrol Software between January and

February 2013.

In May 2013, law enforcement officials executed a search warrant at

Defendant’s apartment. A forensic analysis of one of the computers seized from

the apartment revealed programs used to access emails and login-emails for

different people associated with destinypatrolsoftware.com. Officials also

determined that the same computer had not only accessed Destiny Patrol

Software’s administrative website—which had billing and credit card

5 Case: 17-13108 Date Filed: 10/26/2018 Page: 6 of 22

information—but that Defendant was logged in as a superuser, meaning that he had

more advanced privileges than a typical user. The computer contained LogMeIn

files, as well as a file that contained Topping’s biographical information, including

his address, date of birth, social security number, and employment information.

B. Procedural History

In 2016, a federal grand jury issued an indictment charging Defendant with:

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. De La Cruz Suarez
601 F.3d 1202 (Eleventh Circuit, 2010)
United States v. Hatney
80 F.3d 458 (Eleventh Circuit, 1996)
United States v. Jernigan
341 F.3d 1273 (Eleventh Circuit, 2003)
United States v. Emilio A. Perez
366 F.3d 1178 (Eleventh Circuit, 2004)
United States v. Pugh
515 F.3d 1179 (Eleventh Circuit, 2008)
United States v. Williams
526 F.3d 1312 (Eleventh Circuit, 2008)
United States v. Hunt
526 F.3d 739 (Eleventh Circuit, 2008)
United States v. Gonzalez
550 F.3d 1319 (Eleventh Circuit, 2008)
United States v. Jiminez
564 F.3d 1280 (Eleventh Circuit, 2009)
United States v. Dunnigan
507 U.S. 87 (Supreme Court, 1993)
United States v. Olano
507 U.S. 725 (Supreme Court, 1993)
United States v. Irey
612 F.3d 1160 (Eleventh Circuit, 2010)
United States v. Friske
640 F.3d 1288 (Eleventh Circuit, 2011)
United States v. Barrington
648 F.3d 1178 (Eleventh Circuit, 2011)
United States v. Christopher H. Dobbs
11 F.3d 152 (Eleventh Circuit, 1994)
United States v. Jesse Wright, Jr., A.K.A. Jessie Wright
392 F.3d 1269 (Eleventh Circuit, 2004)
United States v. Willis Kendrick, III
682 F.3d 974 (Eleventh Circuit, 2012)
United States v. Kenneth Lamar Madden
733 F.3d 1314 (Eleventh Circuit, 2013)
United States v. Francisco Cubero
754 F.3d 888 (Eleventh Circuit, 2014)
United States v. Jesus Rosales-Bruno
789 F.3d 1249 (Eleventh Circuit, 2015)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Jonathan Lee Eubanks, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-jonathan-lee-eubanks-ca11-2018.