United States v. Meeks , 290 F. App'x 896 ( 2008 )


Menu:
  •                 NOT RECOMMENDED FOR FULL-TEXT PUBLICATION
    File Name: 08a0531n.06
    Filed: August 28, 2008
    No. 07-3063
    UNITED STATES COURT OF APPEALS
    FOR THE SIXTH CIRCUIT
    UNITED STATES OF AMERICA,                         )
    )
    Plaintiff-Appellee,                        )
    )
    v.                                                )   ON APPEAL FROM THE UNITED
    )   STATES DISTRICT COURT FOR THE
    MICHAEL W. MEEKS,                                 )   NORTHERN DISTRICT OF OHIO
    )
    Defendant-Appellant.                       )
    )
    )
    Before: KENNEDY, GILMAN and GIBBONS, Circuit Judges.
    JULIA SMITH GIBBONS, Circuit Judge. Pursuant to a plea agreement, defendant-
    appellant Michael W. Meeks pled guilty to one count of receiving and distributing child pornography
    and one count of possession of child pornography. Prior to his trial, the district court denied his
    motion to suppress. The district court sentenced Meeks to 80 months incarceration, followed by 10
    years of supervised release with standard and special conditions. He appeals the denial of his motion
    to suppress, the conditions of his supervised release, and the length of his sentence as exceeding a
    “mandatory sentence.” For the following reasons, we affirm the judgment of the district court.
    I.
    In November 2002, a complainant in Denmark reported to the Federal Bureau of
    Investigation’s (“FBI”) internet website that the Yahoo! group Muels_Playschooool was being used
    to transmit child pornography. The complainant runs an electronic mail message (“e-mail”) service
    and discovered the group while servicing the account of a client who sent and received e-mails from
    the group. The complainant voluntarily provided the FBI with three compact discs that contained
    more than three thousand e-mail messages from the client’s account, software to view the e-mails
    and associated attachments, and instructions on how to install the software. The FBI conducted an
    investigation. It determined “that the name of the group had changed more than once during the
    existence of the group, but that the ListID remained constant.”1 For example, the group name
    Muels_Playschooool had been changed to Muels_Playdays, but the ListID remained 4453502.
    The FBI was not able to access the group directly because membership in the group was by
    invitation only. It obtained a search warrant to Yahoo!, Inc., and shortly after it received the results,
    Yahoo shut down the group. The FBI reviewed the evidence to identify persons in the United States
    who transmitted child pornography. It obtained registration information for some members of the
    group and photographs and e-mails that had been posted in the group.
    One of the identified group members used the e-mail address ledbootz75@yahoo.com. On
    October 26, 2002, four separate e-mails, each entitled “Our Girl Kate,” were sent to the group by
    ledbootz75@yahoo.com. Each e-mail contained three images of a prepubescent female wearing an
    oversized fishnet blouse which exposed her lower body. Each image also was titled, “Russian
    Lolitas. Professional Series.” Each image listed an internet address, russianlolitas.net.
    On November 18, 2002, ledbootz75@yahoo.com sent the group three additional e-mail
    messages. One e-mail contained three images of a prepubescent female wearing an oversized shirt
    and underwear that was loose enough to reveal her chest and genital areas. Each of the other two
    1
    A ListID is a unique number attached to a Yahoo! group.
    2
    e-mails contained three images of a prepubescent female wearing oversized underwear; the female
    in each image was lying on her side on a blanket or lying or sitting on a blanket with her legs opened.
    Each of these nine images was titled “GENJA.”
    The FBI tracked the internet protocol (“IP”) address2 used by ledbootz75@yahoo.com. Level
    3 Communications, a company that purchases blocks of IP addresses and resells them to other
    companies that allocate individual IP addresses to individual clients, leased the IP address to SBC
    Global. SBC Global, an internet service provider, assigned the IP address to Dora A. Meeks, who
    had a username hootbomb@sbcglobal.net. Hootbomb@sbcglobal.net accessed the internet, logged
    into the ledbootz75@yahoo.com account, and sent images of child pornography interstate through
    Yahoo! services in Santa Clara, California. SBC identified the owner of the hootbomb account as
    Dora A. Meeks, 65934 Endley Road, Cambridge, Ohio 43725 (“Endley residence”), telephone
    number (216) 251-6824, with an enrollment date of September 10, 2002. The person who created
    the ledbootz75@yahoo.com e-mail account identified himself as Jimmy Gent, Cleveland, Ohio
    44102, a male carpenter born on May 19, 1979, information that was not verified prior to creation
    of the account. The FBI was unable to locate a Jimmy Gent with that date of birth.
    After reviewing the images and an attached affidavit, Judge James L. Graham issued a search
    warrant for Dora Meeks’s residence. On June 11, 2003, the FBI executed the search warrant and
    interviewed Dora Meeks. The FBI confirmed that Dora Meeks paid for the internet service but
    learned that it was provided to her other residence, 10605 Manoa Avenue, Brooklyn, Ohio 44144,
    2
    An IP address is issued by an internet service provider and is a number assigned to a specific
    transmission line such as a telephone or cable through which a computer accesses the internet.
    3
    (“Manoa residence”) where her son Michael Meeks resided. The FBI confirmed that the internet
    account at the Manoa residence was still active.
    Also on June 11, 2003, the FBI conducted surveillance on the Manoa residence and
    confirmed that Michael Meeks resided there.3 On that same date, Magistrate Judge Jack B. Streepy
    issued a search warrant for computer equipment at the Manoa residence. The FBI executed the
    search warrant on the Manoa residence on June 11, 2003. In a basement bedroom in the residence
    that contained some of Michael Meeks’s personal documents, agents found a computer monitor,
    printer, scanner, and keyboard. Agents did not find a central processing unit (“CPU”) containing a
    hard drive. The answering machine contained several messages from a female asking Michael
    Meeks to answer the telephone because she was worried about him.
    One item seized during the search was a notebook of five-by-eight-inch index cards
    containing detailed notes of e-mail addresses, passwords, and names of albums containing pictures
    and movies. The names of the directories and files included “Sweet Lolita Sisters,” “4yr-bj,” “Reel
    Kiddy Mov_Vicky_Sucking,” “dad eats tiny,” and “4 yo cummouth.” The notebook referenced a
    series of images it identified as “Genja.” It contained references to the ledbootz75@yahoo.com e-
    mail account and to other e-mail addresses containing ledbootz followed by different numbers along
    with passwords to these other e-mail accounts. The notebook also referred to eleven accounts on an
    internet site, PhotoIsland.com, a website that provides free online photography storage for up to ten
    megabytes of storage space per account. FBI Special Agent Brian Vigneaux accessed the accounts
    3
    Brian Vigneaux provided an affidavit along with the application for a search warrant for the
    Manoa residence. The above facts were all contained in the affidavit.
    4
    and changed the passwords in order to secure the evidence before obtaining a search warrant – but
    he did not conduct a search of the contents of the accounts.
    Fifteen floppy discs were seized from the bedroom cabinet. Two discs contained a series of
    32 pictures entitled “Gege” that appeared to be sexually explicit images of a young girl. The seized
    notebook contained a reference to “Gege” as a series associated with one of Meeks’s e-mail
    addresses.
    The seized notebook also contained references to e-mail addresses and passwords where
    Meeks stored pictures and movies, including Yahoo! accounts MilesBeyond_440 and
    Milesbeyond_led. Although he did not conduct a search, Vigneaux accessed the accounts and
    changed the passwords in order to secure the evidence. The seized notebook also listed multiple
    Yahoo! e-mail addresses and accounts that did not specify whether they were Yahoo! accounts.
    Many of the e-mail addresses had what appeared to be photo albums linked to them.
    On June 24, 2003, Magistrate Judge Streepy issued a search warrant for ArcSoft, Inc., the
    Fremont, California based internet service that controlled PhotoIsland.com. The search warrant was
    for Meeks’s eleven accounts at PhotoIsland.com. That same day, Magistrate Judge Streepy issued
    a search warrant to Yahoo!, Inc. for accounts associated with Michael Meeks.
    In response to the search warrant, on July 9, 2003, Yahoo! provided Vigneaux with e-mail
    and IP history contents of the accounts. This information showed that Meeks was the group owner4
    of multiple Yahoo! groups. On August 14, 2003, Magistrate Judge Streepy issued a search warrant
    4
    When a user creates a Yahoo! group, that person becomes the group owner. The owner can
    restrict or close group membership, invite members to join the group, ban members from joining the
    group, limit accessibility to the group, and control the group’s administration.
    5
    to Yahoo! for the briefcase contents of the groups, including the picture files associated with the
    Yahoo! group accounts.
    An analysis of the floppy discs seized at Michael Meeks’s residence and 16 online accounts
    revealed 765 files containing child pornography. Five files contained images of child pornography
    with identified victims. At least three files depicted children being penetrated or in bondage.
    An indictment charged Meeks with one count of receiving and distributing material involving
    the sexual exploitation of minors (18 U.S.C. § 2252(a)(2)), one count of possession of material
    involving the sexual exploitation of minors (18 U.S.C. § 2252(a)(4)(B)), one count of receiving and
    distributing child pornography (18 U.S.C. § 2252A(a)(2)), and one count of possession of child
    pornography (18 U.S.C. § 2252(a)(5)(B)).
    Meeks filed a motion to suppress the evidence seized during the search of the Manoa
    residence. The district court held a suppression hearing. The district court denied Meeks’s motion
    to suppress. The district court clarified that it was not relying on the determinations made by Judge
    Graham. The district court read the affidavit and concluded that it was sufficient to establish
    probable cause. The owner of the account had been traced to Dora Meeks who told authorities that
    the account was in her name but the feed went to the Manoa residence where her son resided.
    Although this evidence was probably sufficient, the district court noted that authorities also
    established that Michael Meeks lived at the Manoa residence. The district court concluded that the
    description of the images and their titles could be viewed as pornographic. The district court stated:
    And I conclude that there was probable cause for the search for all the reasons stated,
    both because it’s clear cut to me that the information they received that they thought
    was pertinent to the Southern District was pertinent to the Northern District and was
    involved in the affidavit, and was put in the affidavit. And two, because the images
    depicted were such that the magistrate was entitled to conclude for purposes of
    6
    deciding whether to issue a search warrant that that was pornographic activity or was
    pornographic, the items depicted were pornographic in nature.
    Meeks pled guilty to one count of receiving and distributing child pornography and one count
    of possession of child pornography. Pursuant to the plea agreement, Meeks generally waived his
    right to appeal. But he preserved the right to appeal “(a) any punishment in excess of the statutory
    maximum; (b) any sentence to the extent it exceeds the maximum of the sentencing range
    determined under the advisory Sentencing Guidelines in accordance with the sentencing stipulation
    in this agreement, using the Criminal History Category found applicable by this Court; (c) this
    court’s order, dated April 13, 2005, denying Defendant’s motion to suppress evidence.”
    The district court sentenced Meeks to 80 months incarceration, followed by 10 years of
    supervised release with standard and special conditions, and ordered Meeks to pay a $200 special
    assessment. Meeks filed a timely notice of appeal.
    II.
    A.
    “The district court’s factual findings on a motion to suppress are reviewed for clear error and
    its legal determinations are reviewed de novo.” United States v. Martin, 
    526 F.3d 926
    , 936 (6th Cir.
    2008) (citation omitted). Whether probable cause to issue a warrant was present is also reviewed
    de novo. United States v. Garcia, 
    496 F.3d 495
    , 502 (6th Cir. 2007). The court reviews the evidence
    “in a light most likely to support the decision of the district court.” United States v. Frazier, 
    423 F.3d 526
    , 531 (6th Cir. 2005).
    The Fourth Amendment states, in relevant part, that “no Warrants shall issue, but upon
    probable cause, supported by Oath or affirmation. . . .” U.S. Const. amend. IV. Probable cause is
    7
    “a fair probability that contraband or evidence of a crime will be found in a particular place.” Illinois
    v. Gates, 
    462 U.S. 213
    , 238 (1983). Whether probable cause is present is determined by examining
    the totality of the circumstances “to make a practical, commonsense” determination of whether
    probable cause is present. 
    Id. We “ensure
    that the [judge] had a substantial basis for . . .
    conclud[ing] that probable cause existed” 
    Id. at 238-39
    (internal quotation marks and citation
    omitted). “A [judge’s] determination of probable cause is afforded great deference by the reviewing
    court and should only be reversed if arbitrarily made.” United States v. Johnson, 
    351 F.3d 254
    , 258
    (6th Cir.2003) (internal quotation marks and citation omitted). We “review the sufficiency of the
    affidavit in a commonsense, rather than hypertechnical manner.” 
    Id. (quoting United
    States v.
    Greene, 
    250 F.3d 471
    , 479 (6th Cir. 2001)).
    1.
    Meeks argues that Vigneaux’s affidavit failed to allege sufficient probable cause to search
    the Manoa residence. Specifically, he argues that “[t]here was nothing alleged in the affidavit which
    would indicate that anything illegal or unlawful would be found at the Manoa Avenue residence.”
    “For a search warrant to be valid, the place to be searched must be connected to the crime
    alleged.” United States v. Wagers, 
    452 F.3d 534
    , 539 (6th Cir. 2006). The affidavit established that
    ledbootz75@yahoo.com sent e-mail messages through the internet on October 26, 2002, and
    November 18, 2002, that combined contained 21 images of minors engaged in sexually explicit
    conduct.     The affidavit established that the FBI tracked the IP address used by
    ledbootz75@yahoo.com, which Level 3 Communications leased to SBC Global. SBC Global, an
    internet service provider, assigned the IP address to Dora A. Meeks, who had a username
    hootbomb@sbcglobal.net. It stated that hootbomb@sbcglobal.net accessed the internet, logged into
    8
    the ledbootz75@yahoo.com account, and sent images of child pornography interstate through
    Yahoo! services. SBC identified the owner of the hootbomb account as Dora A. Meeks, 65934
    Endley Road, Cambridge, Ohio 43725, telephone number (216) 251-6824, with an enrollment date
    of September 10, 2002.
    The affidavit also linked the Manoa residence to the investigation. It stated that on June 11,
    2003, the FBI executed the search warrant on the Endley residence and interviewed Dora Meeks.
    The FBI confirmed that Dora Meeks paid for the internet service but learned that it was provided to
    her other residence, 10605 Manoa Avenue, Brooklyn, Ohio 44144, where her son Michael Meeks
    resided. The FBI confirmed that the internet account at the Manoa residence was still active. Also
    on June 11, 2003, the FBI conducted surveillance on the Manoa residence and confirmed that
    Michael Meeks resided there.
    In United States v. Terry, e-mail messages containing child pornography were intercepted
    and traced to an AOL account, skippie4u. 
    522 F.3d 645
    , 647 (6th Cir. 2008). The account was one
    of three accounts traced to the master account of Roy Terry, 10 Township Avenue, Cincinnati, Ohio.
    
    Id. The skippie4u
    account was actually registered to Roy’s son, Brent Terry. 
    Id. When a
    search
    warrant was executed at the Township Avenue residence, investigators learned from Roy Terry that
    Brent Terry lived at 16 Walnut Street, Cincinnati, Ohio, where he had a computer and accessed the
    skippie4u account. 
    Id. Investigators obtained
    and executed a search warrant for the Walnut Street
    residence. 
    Id. Brent Terry
    moved to suppress evidence seized at the Walnut Street residence,
    arguing that there was an insufficient nexus connecting the intercepted child pornography images
    to his home computer. 
    Id. at 648.
    We concluded that probable cause existed, stating that “the
    district court did not err in concluding that ‘as a matter of plain common sense, if . . . a pornographic
    9
    image has originated or emanated from a particular individual’s email account, it logically follows
    that the image is likely to be found on that individual’s computer or on storage media associated with
    the computer.’” 
    Id. We relied
    upon evidence that (1) the skippie4u account sent images containing
    child pornography, (2) Brent Terry was the registered user of the account, (3) Brent Terry lived at
    16 Walnut Street at the time that he sent the e-mails, and (4) Brent Terry had a home computer
    through which he accessed the skippie4u account. 
    Id. As the
    warrant here contained the same type of evidence, the evidence is sufficient to
    establish probable cause in connection with the Manoa residence. The affidavit traced the
    ledbootz75@yahoo.com account and linked the IP address to the Endley residence. Dora Meeks told
    investigators that the account – which investigators confirmed was active – was actually in use at
    the Manoa residence, where investigators confirmed that Michael Meeks resided. This established
    “a fair probability that contraband or evidence” of child pornography would be found at the Manoa
    residence. See 
    Gates, 462 U.S. at 238
    ; see also 
    Wagers, 452 F.3d at 540
    (“The evidence in our case
    connecting the defendant, his computer, his IP address, and his home to the offense is considerably
    stronger, particularly where the criminal activity (viewing child pornography) is much more tied to
    a place of privacy, seclusion, and high-speed Internet connectivity (e.g. a home or office) than the
    storing of drugs (which can take place in a car, a ditch, a hole in the ground, etc.”).5 We therefore
    conclude that the affidavit established probable cause to search the Manoa residence.
    5
    Meeks cites several cases involving confidential informants in cases outside the child
    pornography context in support of his argument that there was no probable cause to search the
    Manoa residence. See, e.g., United States v. Weaver, 
    99 F.3d 1372
    , 1377-80 (6th Cir. 1996) (drugs);
    United States v. Leake, 
    998 F.2d 1359
    , 1365 (6th Cir. 1993) (drugs). Here, however, there was no
    such informant. While a person in Denmark notified the FBI of the Muels_Playschooool site, the
    FBI conducted an investigation in order to connect Meeks to the site.
    10
    2.
    Meeks also argues that nothing in the affidavit falls within the definition of child
    pornography, including a description “of a prepubescent female ‘wearing only an oversized, fishnet
    blouse thereby exposing her lower body,’” because it was not an image of a minor engaged in
    sexually explicit conduct, as defined in 18 U.S.C. § 2256. Meeks does not cite any cases in support
    of his argument.
    Judge Graham reviewed the actual images, determining they were sexually explicit images
    involving minors before issuing a warrant for the Endley residence. Magistrate Judge Streepy
    reviewed Vigneaux’s affidavit, which included descriptions of the images and a statement that Judge
    Graham had determined that they were child pornography, before determining probable cause existed
    to search the Manoa residence.
    In denying the motion to suppress, the district court clarified that it was not relying on the
    determinations made by Judge Graham but instead read the affidavit and concluded that it was
    sufficient to establish probable cause. The district court concluded that the description of the images
    and their titles could be viewed as pornographic. The district court stated, in relevant part:
    And I conclude that there was probable cause for the search . . . because the images
    depicted were such that the magistrate was entitled to conclude for purposes of
    deciding whether to issue a search warrant that that was pornographic activity or was
    pornographic, the items depicted were pornographic in nature.
    According to 18 U.S.C. § 2256, a minor is a person under the age of eighteen, and sexually
    explicit conduct includes, among other things, “lascivious exhibition of the genitals or pubic area
    of any person.” 
    Id. § 2256(1),
    (2)(A)(v). The descriptions of the images, along with their titles and
    other information stated in the affidavit, were sufficient to establish probable cause as they described
    11
    lascivious images of the genitals or pubic areas of minors. For example, the email entitled “Our Girl
    Kate,” contained images entitled, “Russian Lolitas. Professional Series.” A Lolita is a “seductive
    adolescent girl.” The American Heritage Dictionary of the English Language, Fourth Edition.
    Retrieved from Dictionary.com website. The use of the term “Russian Lolitas,” along with the
    reference to “Our Girl Kate,” and the description of the images of a prepubescent female wearing
    an oversized fishnet blouse which exposed her lower body were sufficient to establish probable cause
    of child pornography. Similarly, the descriptions of a prepubescent female wearing an oversized
    shirt and underwear that was loose enough to reveal her chest and genital areas and of a prepubescent
    female wearing oversized underwear while either lying on her side on a blanket or lying or sitting
    on a blanket with her legs opened are not poses one would expect a young girl to be in and are
    suggestive of child pornography. The affidavit established probable cause that child pornography
    would be found.
    3.
    Meeks argues that the search warrant was overbroad and did not describe the things to be
    seized, in violation of the Fourth Amendment.6 The warrant was for computer-related equipment,
    discs, records, and notes and diaries related to child pornography. “A search warrant must
    particularly describe the things to be seized, but the description, whose specificity will vary with the
    circumstances of the case, will be valid if it is as specific as the circumstances and the nature of the
    activity under investigation permit.” Guest v. Leis, 
    255 F.3d 325
    , 336 (6th Cir. 2001) (internal
    6
    Meeks asserts that “the command of the search warrant did not authorize the computer itself
    to be searched or downloaded.” Given that agents did not find a central processing unit (“CPU”)
    containing a hard drive during the search, this argument is moot. Furthermore, in support of this
    portion of his argument, Meeks cites Warshak v. United States, which has been vacated. 
    490 F.3d 455
    (6th Cir. 2007), reh’g en banc granted, opinion vacated Oct. 9, 2007.
    12
    quotation marks and citation omitted). Here, the warrant described computer equipment and
    computer-related materials, which is as specific as the circumstances allowed, given the information
    investigators had. The notebook and the computer discs are within the realm of the search warrant.
    To the extent Meeks argues that the search warrant did not cover the contents of the PhotoIsland.com
    and Yahoo! accounts, Vigneaux accessed the accounts to change the passwords but did not peruse
    their contents until he obtained separate search warrants. Meeks’s Fourth Amendment rights were
    not violated.
    4.
    Meeks argues that the warrant infringed on his First Amendment rights because his
    computer- related items were seized without a prior adversary hearing, citing Stanford v. Texas, 
    379 U.S. 476
    , 485 (1965) (“In short, what this history indispensably teaches is that the constitutional
    requirement that warrants must particularly describe the ‘things to be seized’ is to be accorded the
    most scrupulous exactitude when the ‘things’ are books, and the basis for their seizure is the ideas
    which they contain.”). The same probable cause standard applies when the First Amendment is
    implicated as applies when there is no First Amendment concern, i.e., there is no heightened
    standard. New York v. P.J. Video, Inc., 
    475 U.S. 868
    , 875 (1986) (“We think, and accordingly hold,
    that an application for a warrant authorizing the seizure of materials presumptively protected by the
    First Amendment should be evaluated under the same standard of probable cause used to review
    warrant applications generally.”) Furthermore, child pornography is not protected by the First
    Amendment. New York v. Ferber, 
    458 U.S. 747
    , 764-66 (1982). Thus, we conclude that there was
    no violation of Meeks’s First Amendment rights.
    5.
    13
    Meeks argues that information obtained during the search “was then used to obtain additional
    search warrants for other services,” resulting in an illegal search that must be suppressed. To the
    extent that Meeks is referring to the notebook containing user names and passwords, it was not
    illegally obtained and fell within the realm of the search warrant. Thus, subsequent warrants
    obtained to access PhotoIsland and Yahoo! accounts need not be suppressed.
    B.
    Meeks appeals the conditions of supervised release imposed and the length of his sentence.
    The government argues that, pursuant to the plea agreement, he waived his right to appeal these
    aspects of his sentence.
    “This Court reviews the question of whether a defendant waived his right to appeal his
    sentence in a valid plea agreement de novo.” United States v. Murdock, 
    398 F.3d 491
    , 496 (6th Cir.
    2005) (citation omitted).
    “It is well settled that a defendant in a criminal case may waive his right to appeal his
    sentence in a valid plea agreement.” United States v. Smith, 
    344 F.3d 479
    , 483 (6th Cir. 2003). “The
    sine qua non of a valid waiver is that the defendant enter into the agreement knowingly and
    voluntarily.” United States v. Fleming, 
    239 F.3d 761
    , 764 (6th Cir. 2001). A defendant “may waive
    constitutional or statutory rights then in existence as well as those that courts may recognize in the
    future.” United States v. Bradley, 
    400 F.3d 459
    , 463 (6th Cir. 2005), cert. denied, 
    546 U.S. 862
    (2005). “When a defendant waives his right to appeal his sentence in a valid plea agreement, this
    Court is bound by that agreement and will not review the sentence except in limited circumstances.”
    
    Smith, 344 F.3d at 483
    (citation omitted).
    14
    Pursuant to the plea agreement, Meeks generally waived his right to appeal. The plea
    agreement stated, in relevant part:
    Defendant acknowledges having been advised by counsel of Defendant’s rights, in
    limited circumstances, to appeal the conviction or sentence in this case, including the
    appeal right conferred by 18 U.S.C. § 3742, and to challenge the conviction or
    sentence collaterally through a post-conviction proceeding, including a proceeding
    under 28 U.S.C. § 2255. Defendant expressly waives those rights, except as reserved
    below. Defendant reserves the right to appeal (a) any punishment in excess of the
    statutory maximum; (b) any sentence to the extent it exceeds the maximum of the
    sentencing range determined under the advisory Sentencing Guidelines in accordance
    with the sentencing stipulation in this agreement, using the Criminal History
    Category found applicable by this Court; (c) this court’s order, dated April 13, 2005,
    denying Defendant’s motion to suppress evidence. Nothing in this paragraph shall
    act as a bar to the Defendant perfecting any legal remedies Defendant may otherwise
    have on appeal or collateral attack respecting claims of ineffective assistance of
    counsel or prosecutorial misconduct.
    Meeks initialed the page containing the waiver. His initials indicate that he was aware of the waiver
    at the time he entered into his plea agreement. He also signed the plea agreement, which stated that
    he had read the entire agreement and discussed it with his attorney. The plea agreement explicitly
    explained that initialing each page indicated that Meeks “read, understood, and approved the
    provisions on that page” and that he entered into the plea agreement voluntarily.
    Furthermore, at his change-of-plea hearing, Meeks indicated that he had read the plea
    agreement, had discussed it with his attorney, and had had his questions about it answered. At the
    hearing, the government indicated that Meeks had waived his right to appeal, other than punishment
    in excess of the statutory maximum and the denial of the motion to suppress. Furthermore, the
    district court stated:
    No Defendant can waive ineffective assistance of counsel or prosecutorial conduct
    [sic], and you did not waive your right to appeal or your right to appeal my ruling,
    which denied your motion to suppress in this case. You didn’t waive that, but as Mr.
    15
    Mancino probably explained, you waived most of your appeal rights, including
    collateral attack rights. Do you understand that?
    Meeks responded, “Yes.” The district court found that Meeks’s plea of guilty was knowing and
    voluntary.
    In the plea agreement, Meeks stipulated that the statutory maximum sentence was 20 years
    for the count of receiving and distributing child pornography with a mandatory minimum sentence
    of 5 years and that the statutory maximum sentence was 10 years for possession of child
    pornography. Furthermore, each count carried a maximum term of supervised release of life. He
    further stipulated to special conditions of supervised release. Meeks’s sentence of 80 months
    incarceration, followed by 10 years of supervised release with standard and special conditions, is not
    in excess of either the statutory maximum or the sentencing range pursuant to the Sentencing
    Guidelines for offense level 28 and criminal history category I (78 to 97 months). Because Meeks
    voluntarily and knowingly entered into a plea agreement in which he waived his right to appeal, he
    waived the right to appeal his sentence and the conditions of supervised release.
    III.
    For the foregoing reasons, we affirm the judgment of the district court.
    16