In this consolidated criminal appeal, defendant appeals two judgments of conviction, raising multiple assignments of error.
I. WHAT CONSTITUTES A “TRANSFER” FOR PURPOSES OF ORS 165.800(1)
We begin with defendant’s first and second assignments of error, in which he asserts that the trial court erred when it denied his motions for judgment of acquittal on two counts of identity theft. Both assignments of error present the same legal question — whether the trial court’s rulings were based on a proper interpretation of the term “transfers” in ORS 165.800(1). “A trial court’s interpretation of a statute is reviewed for legal error.” State v. Thompson,
A. Factual Background
The victim returned from running errands on July 31, 2012, to discover that someone had broken into his house in Lane County and stolen property worth about $30,000, including a credit card and jewelry. The victim had been away from his house for roughly 45 minutes. When he arrived home, the victim noticed that the back door of his house was “all busted up,” his belongings were “scattered all over,” and his safe had been broken into. The victim reported the crime at 12:03 p.m.
That same day, at about 12:00 p.m., defendant, accompanied by Seaward, made a purchase at a Kohl’s store with the credit card that was stolen from the victim’s home. In completing the purchase, defendant swiped the credit card at the sales counter. At 12:56 p.m., defendant, still accompanied by Seaward, sold some of the jewelry that had been stolen from the victim’s hоme to a business called Gold Buyers. At 3:27 p.m., defendant and Seaward entered a Macy’s department store and picked out some items. Defendant left the store as Seaward was purchasing the items with the victim’s stolen credit card. Seaward completed the purchase by swiping the credit card at the sales counter. At 5:15 p.m., defendant sold more of the stolen jewelry to a second-hand store called Your Place. Two days later, on August 2, defendant sold more of the victim’s jewelry at Eugene Coin and Jewelry.
In case number 20-12-18630, defendant was charged with one count of burglary in the first degree (Count 1) and one count of aggravated theft in the first degree (Count 2) for the break-in and theft of items from the victim’s home, two counts of identity theft (Counts 3 and 4) for the use of the victim’s credit card at Kohl’s and Macy’s, and two counts of first-degree theft (Counts 5 and 6) for selling jewelry that had been stolen from the victim’s home to Gold Buyers and Your Place. In case number 20-13-03790, defendant was charged with one count of first-degree theft for selling more of the victim’s jewelry to Eugene Coin and Jewelry.
The first identity theft charge, Count 3, alleged that defendant, “did unlawfully, with the intent to deceive or defraud, transfer
The trial court denied defendant’s motion for judgment of acquittal, stating that “a person commits the crime of identity theft if that person transfers to the person’s own use” the credit card of another person. It ruled that “the evidence suggests that that’s exactly what defendant did. He transferred to his personal use the credit card number of the victim and he used it to buy things with it.” Additionally, at the close of trial, defendant renewed his motion for a judgment of acquittal without further argument and the trial court denied the renewed motion for the same reason thаt it had denied the earlier motion.
A jury found defendant guilty of all of the charged crimes. In case number 20-12-18630, the jury found defendant guilty of burglary in the first degree (Count 1), aggravated theft in the first degree (Count 2), two counts of identity theft (Counts 3 and 4), and two counts of first-degree theft (Counts 5 and 6). The convictions on Counts 5 and 6 were merged with the conviction on Count 2, aggravated theft in the first degree. In case number 20-13-03790, defendant was found guilty of one count of theft in the first degree, and that conviction was also merged with the conviction for Count 2, aggravated theft in the first degree, in case number 20-12-18630.
On appeal, defendant renews his argument that the legislature did not intend the term “transfers,” as it is used in ORS 165.800(1), to include tendering a credit card of another in the course of making a purchase. The state responds, contending that the plain meaning of the word “transfer” in ORS 165.800(1), read in the greater context of the statute, reveаls that the legislature intended that the term “transfers” would cover such an unauthorized use of another person’s credit card.
B. Statutory Interpretation of “Transfers” Under ORS 165.800(1)
As noted above, “a trial court’s interpretation of a statute is reviewed for legal error.” Thompson,
We start with the statutory text because it is “the best evidence of the legislature’s intent.” PGE v. Bureau of Labor and Industries,
We first review the various dictionary definitions presented by the parties. Considering the plain, natural, and ordinary meaning of “transfers” in this case, that term could be interpreted to encompass defendant’s conduct. See Websters Third New Int’l Dictionary 2426-27 (unabridged ed 2002) (defining “transfer” as “to cause to pass from one person or thing to another: transmit”). Under such an interpretation, swiping a credit card would likely constitute a transfer because it would “transmit” the identifying number of a person’s credit card account “from one person or thing to another.” Id.
“Transfers” could also be interpreted more narrowly as “to make over or negotiate the possession or control of (a right, title, or property) by a legal process usu. for a consideration [.]” Id. Furthermore, “transfer” is defined by Black’s Law Dictionary 1636 (9th ed 2009), as “to pass or hand over from one to another, esp. to change over the possession or control of. * * * To sell or give.” See State v. Hess,
As we conclude below, context dictates construing the term “transfers” in ORS 165.800(1) as selling or giving possession or control of another person’s personal identification to a third person for fraudulent or deceptive purposes. Context supports that construction of the term “transfers” because there is a general assumption that “when the legislature employs different terms within the same statute, it intends different meanings for those terms.” State v. Meek,
In ORS 165.800(1), the term “transfers” appears with five other verbs, each describing different ways of committing identity theft: “obtains, possesses, transfers, creates, utters or converts to the person’s own use” the personal identification of another. Read together, those different verbs address particular acts that constitute the crime of identity theft and, as noted, we assume that the legislature used different terms in order to specify various types of aсts that could constitute the crime of identity theft. If we construe “transfers” as defendant proposes, it would address the specific act of trafficking personal identification — the situation in which a person “transfers” the personal identification of another by selling or giving possession or control of that personal identification to a third person for fraudulent or deceptive purposes. That construction would “give effect to all” the particular provisions in the statute. ORS 174.010; State v. Stamper,
Additionally, we consider prior interpretations of the terms in ORS 165.800(1) when we are analyzing the text in its context. Cloutier,
The court examined how the terms “utter” and “converts to the person’s own use” are used in related statutes. Id. at 266-68 (citing Cloutier,
Next, the court determined that “to convert another person’s personal identification to his or her own use, a defendant must take, appropriate, or somehow divest the other person of their personal identification and, with the requisite intent, use that personal identification for the defendant’s own purposes.” Medina,
Accordingly, although the various ways to commit the offense of identity theft described in ORS 165.800(1) may have some overlap, Medina tends to rebut the state’s argument that the various means of committing the offense must be construed as broadly as possible. The court in Medina noted the differences in these prohibited acts, construed the various means of committing identity theft in ORS 165.800(1) as distinct acts that can constitute the crime of identity theft, and limited the state to “the substantive allegations in the indictment.” Id. at 267.
Our review of the legislative history supports the conclusion that the term “transfers” was included to address the particular act of trafficking personal identification — that is, the situation in which a person “transfers” the personal identification of another by selling or giving possession or control of that personal identification to a third person for fraudulent or deceptive purposes. As discussed below, that history strongly suggests that the term “transfers” was written into ORS 165.800(1) as part of an effort to harmonize that statute with a federal identity theft law that made it a federal offense for someone to “knowingly transfer [] or use[], without lawful authority, a means of identification of another person with the intent to commit, or to aid and abet, any
We begin with Oregon’s identity theft law which, when first introduced to the Oregon legislature as House Bill 2623 (HB 2623), did not contain the term “transfers.” Bill File, HB 2623, Feb 1, 1999. Rather, HB 2623 would have made it a crime where someone “[Represents that the person is another person” and “ [u] ses or attempts to use” the other person’s “personal identifying information or personal identification document *** to obtain anything of value.” Id.', see also Medina,
Adam Heaton, an intern for Rep. Roger Beyer, had researched the federal legislation and testified that the “House has passed HR 4151, the Federal Identity Theft and Assumption Deterrence Act of 1998” and that it was waiting for the President’s signature. Id. (statement of Adam Heaton). Following that testimony, committee chairman Rep. Kevin Mannix said, “So what we should do is * * * look to how we can make sure that our law or our legislation blends — not that we feel directed by Congress, but we certainly would want to see if we’re copacetic with whatever is being done at the national level.” Id. (statement of Rep Kevin Mannix). Later in the hearing, Rep. Mannix added: “That measure, according to this summary, makes it * * * a federal crime to knowingly possess, transfer or use, without lawful authority, a means of identification of another person with the intent to commit an unlawful act.” Tape Recording, House Judiciary Criminal Law Committee, HB 2623, Mar 25, 1999, Tape 106, Side A (statement of Rep Kevin Mannix). Although the language quoted by Rep. Mannix appears to have come from a prior Senate version of the federal law, S 512, U.S. Rep. Bill McCollum, explained during the Congressional proceedings on HR 4151 that, as amended, the “language will be similar to the text of S. 512, a bill on this same subject that passed in the other body by unanimous consent” and would “delete the mere possession of personal identifying information from the offense [.]” 144 Cong Rec H9993, H9997 (Oct 7, 1998) (statement of Rep Bill McCollum); compare Senate Bill S 512, 105th Cong § 2 (1998) (as reported by Senate Committee on Judiciаry, July 9, 1998) (making it a crime where one “knowingly possesses, transfers, or uses, without lawful authority, a means of identification of another person”) with Identity Theft and Assumption Deterrence Act of 1998, Pub L 105-318, § 3,112 Stat 3007 (1998) (amending 18 USC section 1028 to make it a crime where one “knowingly transfers or uses, without lawful authority, a means of identification of another”).
On May 4, 1999, following the March hearing on HB 2623, the committee stripped the identity theft provisions from HB 2623 and inserted them into a separate bill, HB 3057. Tape Recording, House Judiciary Criminal Law Committee, HB 3057, May 4, 1999, Tape 179, Side A (statement of committee counsel); Medina,
When the Oregon legislature adopts a statute based on federal law, we may examine the legislative history of that federal law for guidance in interpreting the state statute. PSU Association of University Professors v. PSU,
The Identity Theft Assumption and Deterrence Act of 1998 (the 1998 Act) was enacted to amend an existing statute that dealt with identity document fraud, 18 USC § 1028, by adding new provisions to address identity information fraud. S Rep No 105-274,105th Cong, 2d Sess (1998), 4 (stating that a principle purpose of the bill was “to extend 18 USC [§] 1028, which criminalizes fraud in connection with identification documents, to cover the unlawful transfer and use of identity information”).
As originally enacted, 18 USC § 1028(a) set out six subsections creating different offenses related to identity document fraud. False Identification Crime Control Act of 1982, Pub L No 97-398, 96 Stat 2009 (1982). Subsection (a)(2) made it a crime where a person “knowingly transfers an identification document or a false identification document knowing that such document was stolen or produced without lawful authority.” Id.; 18 USC § 1028(a)(2) (1982). The House Report for the False Identification Crime Contrоl Act of 1982 (the 1982 Act) explained in its section-by-section analysis that “[t]he second offense is the knowing transfer of an identification document * * *. This offense covers those who traffic in stolen or false identification, irrespective of whether consideration was received.” HR Rep No 97-802, 97th Cong, 2d Sess, reprinted in 1982 USCCAN 3519, 3528 (emphasis added). The House Report distinguished the meaning of the phrase “the intent to use unlawfully” from the meaning of the phrase “the intent to transfer unlawfully.” Id. at 3529 (emphases added). The report explains that “[t]he intent to use unlawfully is the intent to * * * present, display, certify, or otherwise give currency to *** the identification document in any manner so that it would be accepted [,]” whereas “the intent to transfer unlawfully is the intent to sell, pledge, distribute, give, loan or otherwise transfer an identification in a manner forbidden by federal, state or local law.” Id.
The 1998 Act inserted a new subsection, (a)(7), which made it a crime where a person “knowingly transfеrs or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity * * *.” Identity Theft and Assumption Deterrence Act of 1998, Pub L 105-318, § 3, 112 Stat 3007 (1998); 18 USC § 1028(a)(7) (1998). We have identified nothing in the 1998 Act or its legislative history that suggests that Congress intended the term “transfers,” as used in subsection (a)(7), to have a different meaning than in subsection (a)(2). Rather, the placement of the identity theft provision among other subsections using the same term indicates the intent to maintain the same meaning of transfer that was intended by Congress in the 1982 Act. See Barnhill v. Johnson,
References to the term “transfers” in the legislative history of the 1998 Act confirm our conclusion. Those references consistently reflect that the “transfer” of personal identification refers to the trafficking of personal identification, and that the “transfer” of personal identification is something different from the “use” of personal identification. For example, U.S. Rep. Bill McCollum, stated that “unfortunately, * * * [a]t present, while the use of false identity documents is a crime, the gathering * * * and sale of personal identifying information is not *** [and] [b]ecause of this gap in the law, law
“[t]he Secret Service has informed the Committee on the Judiciary that if the transfer of personal identifiers were a crime, they would be able to prosecute those persons who traffic in this information and in many cases prevent the fraud that is later committed by those who buy this information from those who sell it.”
Id. (emphases added). Additiоnally, Rep. Bill McCollum explained that, as introduced, the identity theft provision required a defendant to have “transferred five or more means of identification in order to prove the crime had been committed,” while requiring proof of only a single use to violate the law. Id. at H9997. Rep. McCollum then explained that the committee had “eliminate [d] this distinction” between the number of means of identification required to prove each act, and added that he “believe [d] that allowing even one person’s identity to be sold to another person unlawfully should be punished.” Id. Rep. McCollum noted that, “as amended, the bill * * * requires that the government prove an unlawful use or transfer to another person of the personal information in order to prove the crime.” Id. (emphasis added).
In light of that legislative history, which shows that Congress intended the term “transfers,” as used in 18 USC section 1028 and the Identity Theft and Assumption Deterrence Act of 1998, to mean something different from “uses,” and, specifically, to prohibit the trafficking of identification documents and information, our construction of the term “transfers” in ORS 165.800(1) comports with the Oregon legislature’s apparent intent to “make sure” that the Oregon law “blends” with the federal law and, as explained previously, that construction is also supported by the text and context of ORS 165.800(1).
The trial court’s ruling that “a person commits the crime of identity theft if that person transfers to the person’s own use” the credit card of another person, renders the phrase “converts to the person’s own use” in ORS 165.800(1) “meaningless surplusage.” Stamper,
Therefore, as used in ORS 165.800(1), we conclude that a person “transfers” the personal identification of another by selling or giving possession or control of that personal identification to a third person for fraudulent or deceptive purposes. That construction addresses the particular harm of trafficking in personal identification — the fraud or identity theft that may be committed by third parties who obtain stolen personal identification from those who “transfer” it.
We now apply that understanding of the term “transfers” to the facts of this case. As previously noted, the state argues that defendant transferred the identifying number of the victim’s credit card account two separate times.
C. Count 3: Identity Theft
With regard to the use of the stolen credit card at the Kohl’s store, similar to the reasoning of the Supreme Court regarding the defendant in Medina, defendant may have been guilty of another prohibited act under ORS 165.800(1), but the state charged defendant only with transferring the personal identification of another. For example, the state may have been able to prove that defendant converted the credit card to his own use by “tak[ing], appropriate [ing], or somehow divest [ing]” the victim of his credit card and swiping the credit card for his own use. See Medina,
D. Count 4: Identity Theft
With regard to the use of the stolen credit card at Macy’s, the evidence shows that after defendant used the credit card to make the purchase at Kohl’s, Seaward possessed the credit card at Macy’s. Additionally, both defendant and Seaward entered Macy’s, picked out items, and then defendant left the store as Seaward was purchasing the items with the credit card. A rational trier of fact could reasonably infer from that evidence that defendant gave Seward possession of the viсtim’s stolen credit card after he used it at Kohl’s so Seward could use it to defraud the victim at Macy’s. Thus, the trial court did not err when it concluded that a rational trier of fact could reasonably find that defendant “transferred” the credit card to Seward under ORS 165.800(1) and, therefore, it correctly denied defendant’s motion for judgment of acquittal with respect to Count 4.
II. JURY CONCURRENCE INSTRUCTION
Next, we consider defendant’s seventh assignment of error. As noted, in his seventh assignment, defendant argues that the trial court plainly erred by failing to sua sponte instruct the jury that 10 or more jurors needed to concur on whether defendant was guilty of each charge as the principal or as an aider and abettor.
Prior to closing arguments, the trial court reviewed the proposed jury instructions with the parties. After reviewing the instructions, defendant told the court, “I don’t see any errors or omissions.” The trial court then gave the instructions to the jurors on the elements of each charge in terms of defendant’s liability as the principal. Additionally, the trial court included instructions for accomplice liability and aiding and abetting. However, the trial court did not instruct the jurors that they were required to concur on whether defendant was guilty as a principal or an accomplice.
Recent case law on jury concurrence instructions guides our analysis in this case. In State v. Gaines,
Accordingly, after Phillips and Gaines, it is error to not give a jury concurrence instruction if there are competing theories of liability as to whether a defendant was the principal or an aider and abettor. However,
“(1) it must be legal error; (2) it must be ‘apparent,’ such that ‘the legal point is obvious, not reasonably in dispute’; and (3) it must appear on the face of the record, such that ‘we need not go outside the record or choose between competing inferences to find it, and the facts that compromise the error are irrefutable.’”
State v. Jury,
With regard to the first and third requirements for an error to qualify for plain error review, in Gaines we noted that “the Supreme Court and this court have generally held that ‘the question of what must be included in a jury instruction is a question of law, and what was or was not included is readily determined by examining the instructions given.’”
However, we still must determine whether the error is apparent, such that the legal point is obvious and not reasonably in dispute for the error to qualify for plain error review. In Gaines, with regard to the second requirement for plain error review, we held that “[a]fter Phillips, it is ‘obvious’ that, when the state advances competing theories of liability based on a defendant’s acts as [the] principal or as an aider and abettor * * * a jury must be instructed that at least 10 jurors must agree that the defendant is liable under one theory or the other.” Id. at 748. Accordingly, we examine each count, except Count 3,
A. Counts 1 and 2: Burglary and Aggravated Theft
The instruction for burglary (Count 1) stated that “the state must prove beyond a reasonable doubt * * * [that defendant] entered or remаined unlawfully in the premises described in the charge.” The instruction for aggravated theft in the first degree (Count 2) stated that “the state must prove beyond a reasonable doubt * * * [that defendant], with the intent [to] appropriate property to himself took property and jewelry from the owner.” During its deliberations, the jury submitted two questions to the court concerning aiding-and-abetting a burglary. First, the jury asked, “For burglary in the first degree, does the defendant have to enter or remain in the dwelling? Or, does the rule regarding aid or abet apply, or criminal liability for conduct of another person apply?” The court responded that “[t]he instruction regarding liability for conduct of another person and aid or abet apply to each count.” Next, the jury asked, “In regard to burglary in the first degree, in aid or abet, does the word procure mean procuring the stolen goods, or dоes it mean procuring (funding or contracting) the crime of burglary?” The court responded that “there is no further definition.” As noted above, the jury found defendant guilty of burglary and aggravated theft in the first degree, but there is no indication on the verdict form as to whether
With regard to defendant’s convictions for burglary and aggravated theft in the first degree, for the break-in and theft of items valued at over $10,000 from the victim’s home, the state presented no evidence as to whether it was defendant or Seaward who actually broke into the house and stole the items. The state argued that the jury could infer from the short period of time between the break-in and when defendant and Seaward began using the stolen credit card and selling the stolen items, that defendant was involved in the burglary. Specifically, in closing argument, the state told the jury, “I can’t tell you if this defendant was the one who actually went into the house,” but “I don’t even have to show that he actually entered the house, * * * just that he was a participant in that particular — in that particular burglary.” The state continued, arguing that “it’s clear from the surrounding evidence that he was an active participant in that burglary. There’s a principal and an aider and abettor.”
In light of the instructions given and the state’s theory of defendant’s liability, the jury should have been instructed that at least 10 jurors must agree that defendant was liable as the principal or as an aider and abettor, as the instructions permitted the jury to find defendant guilty as the principal and as an aider and abettor. Thus, the instructional error is apparent, such that the legal point is obvious and not reasonably in dispute with regard to Counts 1 and 2, and is reviewable as plain error.
B. Count 4: Identity Theft
With regard to defendant’s conviction on Count 4, identity theft for transferring the personal identification for use at the Macy’s store, the instruction stated that “the state must prove beyond a reasonable doubt * * * [that defendant], acting with the intent to deceive or defraud, transferred the personal identification of [the victim] at Macy’s store.” The evidence and arguments could only reasonably support one theory of liability: that defendant acted as the principal when he transferred the stolen credit card to Seaward for her to use at Macy’s. The instructional error with regard to Count 4 is not apparent, such that the legal point is obvious and not reasonably in dispute and, thus, not reviewable as plain error.
C. Counts 5 and 6: Theft in the First Degree
With regard to Counts 5 and 6 for first-degree theft, the instruction for Count 5 stated that “the state must prove beyond a reasonable doubt *** [that defendant], with the intent to appropriate property to himself disposed of the property owned by [the victim], by selling the property at the Gold Buyers business; and * * * [defendant] knew or believed the property was the subject of theft.” The instructions for Count 6 were identical, except that the jury had to find the defendant guilty beyond a reasonable doubt for “selling the property at Your Place business.” The evidence and arguments did not present competing theories of defendant’s liability as a principal or aider and abettor. The charges were based on defendant’s sale of jewelry that he knew was stolen. The evidence shows that, for Count 5, defendant was identified by the manager at Gold Buyer’s as the seller of the stolen property and that for Count 6 he was identified by the owner of Your Place as the seller of the stolen jewеlry. Thus, the only possible theory for those counts is that defendant was acting as the principal when he sold the stolen jewelry. Accordingly, any error with regard to Counts 5 and 6 is not apparent, such that the legal point is
D. Case Number 20-13-03790: Theft in the First Degree
Finally, in case number 20-13-03790, for a single count of first-degree theft, the instruction was identical to Counts 5 and 6 above, except that the state had to prove that defendant sold “the property at Eugene Coin and Jewelry business.” The owner of Eugene Coin and Jewelry identified defendant as the person who sold the stolen jewelry. Thus, as with Counts 5 and 6 above, there were not competing theories of liability, and the evidence shows that defendant was acting as the principal when he sold the stolen jewelry. Any error with regard to the first degree theft charge in case number 20-13-03790 is not aрparent, such that the legal point is obvious and not reasonably in dispute and, thus, not reviewable as plain error.
E. Exercise of Discretion
Given our conclusion that the claimed error for Counts 1 and 2 is reviewable as plain error, we must decide whether to exercise our discretion to correct the error. When deciding whether to exercise our discretion to correct a plain error we consider
“the competing interests of the parties; the nature of the case; the gravity of the error; the ends of justice in the particular case; how the error came to the court’s attention; and whether the policies behind the general rule requiring preservation of error have been served in the case in another way, i.e., whether the trial court was, in some manner, presented with both sides of the issue and given an opportunity to correct any error.”
Ailes v. Portland Meadows, Inc.,
The state argues that we should not exercise our discretion to correct any error because defendant encouraged the error by “representing that he noted no ‘errors or omissions’ in the proposed instructions.” Defendant contends that we should exercise our discretion in light of the convictions being for serious felonies, the lengthy sentence imposed, and defendant’s interest in a fair trial. In Gaines, we chose to exercise our discretion to correct the trial court’s plain error when the “defendant was convicted of second-degree robbery — a serious felony — and sentenced to 70 months’ imprisonment,” a sufficient number of jurors may not have concurred on a single theory of liability, and beсause “at the time of defendant’s trial, whether a jury concurrence instruction was required when the state presented competing theories of liability was not as certain as it was after Phillips”
For the reasons articulated in Gaines, we exercise our discretion to correct the error on Counts 1 and 2. Here, defendant was convicted of two felonies — burglary and first-degree aggravated theft — and sentenced to 26 months’ imprisonment for the burglary conviction and 52 months for the aggravated theft conviction. As noted above, the state’s theory of liability rested on the inference that defendant possessed the stolen items shortly after the burglary and, thus, “we are not persuaded that a sufficient number of jurors concurred on a single theory of liability.” Id. at 750. Additionally, as in Gaines, defendant’s jury instructions were given on March 6, 2013, before Phillips was decided on December 27, 2013, and “we can discern no plausible inference that defense counsel strategically elected to not seek such an instruction on the off chance that the Supreme Court would later make the requirement for such an instruction ‘obvious’ before our decision in defendant’s appeal.” Id. at 751.
In Case Number 20-12-18630 reversed on Count 3; reversed and remanded on Counts 1 and 2; remanded for resentencing; otherwise affirmed. In Case Number 20-13-03790, affirmed.
Notes
Case numbers 20-12-18630 and 20-13-03790 were consolidated for trial.
ORS 165.800(1) provides, in part: “A person commits the crime of identity theft if the person, with the intent to deceive or to defraud, * * * transfers * * * the personal identification of another person.” Additionally, “personal identification” includes “a credit card account.” ORS 165.800(4)(b)(H).
On appeal, the state argues that ‘“transfers’ encompasses handing a stolen credit card to a store clerk for processing.” We decline to reach that argument because it was never made at trial; the state’s argument at trial was that swiping the credit card was a “transfer.” See Outdoor Media Dimensions, Inc. v. State of Oregon,
ORS 165.007(l)(b), provides that “[a] person commits the crime of forgery in the second degree if, with the intent to injure or defraud, the person *** [u] tiers a written instrument that the person knows to be forged.” ORS 165.002(7) provides, in part, that, “unless the context requires otherwise *** [t] o ‘utter’ means to issue, deliver, publish, circulate, disseminate, transfer or tender a written instrument or other object to another.” (Emphasis added.) To “utter” is the only way by which to commit the criminal conduct described in ORS 165.007(l)(b) and as a general prohibition it is broadly defined by ORS 165.002(7) to encompass various acts. Conversely, as we note in our discussion, ORS 165.800 uses different verbs to describe the particular acts that are meant to be covered under the statute and, consequently, the term “transfers,” as it is used in ORS 165.800, describes an act that is distinct from “uttering” the personal identification of another. See Crystal Communications, Inc.,
ORS 165.055 addresses the specific act defendant committed when he swiped the stolen credit card to pay for items: “A person commits the crime of fraudulent use of a credit card if, with the intent to injure or defraud, the person uses a credit card for the purpose of obtaining property or services with the knowledge that *** [t]he card is stolenf.]” See Medina,
“Put differently, if the state seeks to hold a defendant liable either as the principal or as an aider and abettor * * * the trial court should instruсt the jury that at least 10 jurors must agree on each legislatively defined element necessary to find the defendant liable under one theory or the other.” Phillips,
“[F] or us to decide whether instructional error is plain error, our analysis is normally limited to determining whether the error was ‘obvious,’” i.e., apparent. Gaines,
We do not analyze Count 3 here because we have already determined that the trial court erred when it denied defendant’s motion for judgment of acquittal.
In Gaines, we addressed “any possible inference that [the] defendant made a strategic choice to not request a concurrence instruction in our analysis of whether to exercise our discretion to correct any error.”
