UNITED STATES of America, Plaintiff-Appellee, v. John Manuel MELENDREZ, Defendant-Appellant.
No. 03-30221
United States Court of Appeals, Ninth Circuit
Nov. 9, 2004
Argued and Submitted March 4, 2004. Filed Nov. 9, 2004.
No. 02-72480: PETITION FOR REVIEW GRANTED, REVERSED and REMANDED with instructions.
Nos. 03-35082 and 03-35286: APPEALS DISMISSED AS MOOT; INJUNCTION VACATED.
Deoderico Polintan SAN PEDRO, Petitioner, v. John ASHCROFT, Attorney General, Respondent.
No. 02-74367.
United States Court of Appeals, Ninth Circuit.
Nov. 8, 2004.
Robert B. Jobe, San Francisco, CA, for Petitioner.
Regional Counsel, Laguna Niguel, CA, District Director, San Diego, CA, Ronald E. LeFevre, Chief Legal Officer, San Francisco, CA, OIL, Donald E. Keener, Alison Marie Igoe, Washington, DC, for Respondent.
Before D.W. NELSON, KOZINSKI, and GRABER, Circuit Judges.
ORDER WITHDRAWING OPINION
ORDER
The opinion filed June 23, 2004, and appearing at 372 F.3d 1118 (9th Cir. 2004) is withdrawn. It may not be cited as precedent by or to this court or any district court of the Ninth Circuit.
Sean B. Hoar, Assistant United States Attorney, Eugene, OR, for the plaintiff-appellee.
Before: HUG, McKEOWN and FISHER, Circuit Judges.
FISHER, Circuit Judge:
John Manuel Melendrez used six stolen Social Security numbers to manufacture bogus identification documents on his computer, including Social Security cards and Armed Forces Report of Separation Forms (“DD Forms 214“). The Social Security cards and DD Forms 214 were a mix of the real and fictitious: Melendrez made up a fake name to go with each of the real Social Security numbers he used to produce those identification documents.
At issue is whether the district court correctly applied to Melendrez‘s base offense level a six-level enhancement intended to target “identity theft.” See
Melendrez claims that the enhancement should not apply because “[e]ach of the documents created by [Melendrez] were [sic] in his own name or the name of a fictitious individual.” This argument mis-
I.
From September to November 2001, Melendrez used his computer to create at least eight identification documents bearing six victims’ Social Security numbers. Each document associated a made-up name with each of the Social Security numbers. For example, Melendrez paired Social Security number ***-**-39112 with the fake name “Paris Alicia Dupree” to create both a Social Security card and a DD Form 214 bearing this number and name. He followed the same modus operandi in fashioning six other bogus Social Security cards or DD Forms 214.3
On January 9, 2003, Melendrez pled guilty without a plea agreement to a single-count indictment charging him with unlawfully producing more than five identification documents in violation of
II.
Aided substantially by the convoluted wording and structure of the enhancement and its commentary, Melendrez asserts here as he did in the district court that the enhancement should not apply because the identification documents he produced did not use the actual names of the persons to whom the Social Security numbers were assigned. The district court rejected this argument because, “regardless of the name, the Social Security number is still used in [a] fashion to identify a specific individual to [whom] the number was originally assigned.” We agree with the district court.
We treat the Sentencing Guidelines as a statute for interpretation purposes. See United States v. Soberanes, 318 F.3d 959, 963 n. 4 (9th Cir. 2003); United States v. Gonzalez-Mendez, 150 F.3d 1058, 1060 (9th Cir. 1998). We review the district court‘s interpretation and ap-
Section 2B1.1(b)(9)(C) of the Sentencing Guidelines implemented section 4 of the Identity Theft and Assumption Deterrence Act of 1998 (the “Identity Theft Act“), Pub.L. No. 105-318 (enacted).4 The enhancement is intended to target “an aggravated form of identity theft known as ‘affirmative identity theft’ or ‘breeding,’ in which a defendant uses another individual‘s name, social security number, or some other form of identification (the ‘means of identification‘) to ‘breed’ (i.e., produce or obtain) new or additional forms of identification.”
We begin with the pertinent language of
(b) Specific Offense Characteristics
* * *
(9) If the offense involved
* * *
(C)(i) the unauthorized transfer or use of any means of identification unlawfully to produce or obtain any other means of identification; or
(ii) the possession of 5 or more means of identification that unlawfully were produced from, or obtained by the use of, another means of identification,
increase by 2 levels. If the resulting offense is less than level 12, increase to level 12.
The Sentencing Guideline specifies that the critical term here—“means of identification“—“has the meaning given that term in
(i) the unauthorized transfer or use of any means of identification [i.e., “any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual, including any social security number ....” and which “shall be of an actual (i.e., not fictitious) individual, other than the defendant ...“] unlawfully to produce or obtain any other means of identification [as defined]; or
(ii) the possession of 5 or more means of identification [as defined] that unlawfully were produced from, or obtained by the use of, another means of identification [as defined].
See
As noted before, the enhancement identifies two means of identification relevant here: the source ID numbers and the produced ID numbers, both of which must “be of an actual (i.e., not fictitious) individual, other than the defendant.”
Melendrez‘s argument appears to confuse the term “means of identification” with another statutorily defined term, “identification document.” An identification document is “a document ... intended or commonly accepted for the purpose of identification.”
That real Social Security numbers shared space on bogus identification documents with fictitious names does not make the enhancement inapplicable. Those nine digits tied the victims to the identification documents, regardless of the names with which the Social Security numbers were paired.
The dissent argues that “[t]he critical point is that the enhancement requires one ‘means of identification’ to produce another ‘means of identification.’ A single ‘means of identification’ is not sufficient.” Dissent at 838. In other words, the source ID number and the produced ID number must be different. We respectfully disagree; there is no requirement that the source ID and the produced ID be different numbers. Under the dissent‘s reading, an individual could use an actual person‘s driver‘s license number to breed a new driver‘s license and not be subject to the enhancement. As shown below, “Jan Smith” could create a fake license using Jane Doe‘s real driver‘s license number and, for instance, incur numerous driving tickets, all of which would be tied to Jane Doe (and her actual driver‘s license number).
| REAL ID (Source ID) | Fake ID (Produced ID) |
|---|---|
| Jane Doe | Jan Smith |
| DL # 12345 | DL # 12345 |
| Los Angeles, California | Los Angeles, California |
Contrary to the dissent‘s reading, this act of breeding falls precisely within the language of the enhancement: Jan Smith has used one means of identification (Jane Doe‘s real driver‘s license number) to breed another means of identification (the fake ID with the real driver‘s license number). Because the fake ID contains Jane Doe‘s real driver‘s license number, it could be used to identify her. As a consequence, Jane Doe will have to suffer the consequences of Jan Smith‘s use and misuse of her driver‘s license number included in the fake ID. This act of breeding is specifically the kind of conduct that the enhancement targets.10
Accordingly, the enhancement, as applied to Melendrez, is appropriate under either subsection (i) or (ii). Melendrez used the six Social Security numbers “unlawfully to produce or obtain” other “means of identification,”
Attempting to undermine the common-sense interpretation of the enhancement, Melendrez points to application notes in which the Sentencing Commission sets forth examples of conduct to which
Neither set of examples perfectly matches Melendrez‘s crime, but we conclude that his actions are more like those in the first set of examples. Unlike the second set, Melendrez produced another means of identification (the Social Security number) by duplicating the source ID number on bogus identification documents.12 As discussed above, that Melen-
Melendrez also posits that the enhancement should apply only when a defendant poses as the victim to whom the pilfered means of identification belongs. The enhancement clearly is not so limited, however, because the commentary states that an upward departure may be appropriate when a defendant “produced or obtained numerous means of identification with respect to one individual and essentially assumed that individual‘s identity.”
Finally, Melendrez asks for application of the rule of lenity. Under this rule, we construe ambiguities in criminal statutes in favor of defendants, but only if the statute is truly ambiguous. See United States v. Gonzalez-Mendez, 150 F.3d 1058, 1061 (9th Cir. 1998). Although this guideline could be stated with less com-
plexity, its meaning is not sufficiently ambiguous to invoke the rule of lenity.
III.
For the foregoing reasons, we hold that the district court correctly enhanced Melendrez‘s sentence under
AFFIRMED.
McKEOWN, Circuit Judge, dissenting:
In my view, despite its efforts at “parsing” the enhancement language challenged by Melendrez, the majority has garbled a different aspect of
What Melendrez did—manufacture bogus identification documents on his computer—was illegal. And because he pleaded guilty to unlawfully “produc[ing] an identification document or a false identification document,”
As the majority aptly notes, we are presented with “the convoluted wording and structure of the enhancement and its commentary.” Op. at 831-32. The language is ambiguous at best—a point underscored by the ink spilled by both the majority and the dissent. Here, the lack of clarity requires that we invoke the rule of lenity and adopt a narrow construction of the en-
I. The Text of the Sentencing Provision
United States Sentencing Guidelines
At first blush, the text of the enhancement provision appears relatively straightforward. But upon closer examination, it becomes apparent that the term “means of identification” conceals a number of potential pitfalls. Although intuition might suggest that a hard copy document such as a driver‘s license card or Social Security card falls under its definition, the statute itself reveals otherwise. See
Applying this formulation to the facts at hand, each bogus Social Security card or DD Form 214 Melendrez crafted on his computer contained one “means of identification” of an actual person—the Social Security number itself. But in each instance, only one “identifying name or number” was ever involved. None of the Social Security numbers was produced or obtained from “another” or “any other” “identifying name or number.” Indeed, in the words of the majority, “the produced ID numbers [were] the same Social Security numbers as the source ID numbers.” Op. at 833. Close examination thus reveals that the Social Security cards and DD Forms 214 do not support the district court‘s application of
The majority‘s comfort with the opposite conclusion is odd indeed. Unlike the district court, the majority avoids the most tempting misconstruction of the sentencing provision yet somehow still reaches the wrong result. Its trajectory from acknowledging that the means of identification were “the same,” Op. at 833 (emphasis in original), to its assertion that “Melendrez produced another means of identification (the Social Security number) by duplicating the source ID number,” id. at 835 (emphasis added), can perhaps best be understood as arising from an error we have recently described as a “category mistake.” See Planned Parenthood v. Wasden, 376 F.3d 908, 930 n. 21 (9th Cir. July 16, 2004) (“[A] category mistake treats a concept as if it belonged to one logical type or category when it actually belongs to another.” (alterations omitted)). In other words, the majority confuses the identifying number (a concept) with its representative symbols as they appear on paper (an iteration of the concept).
The majority‘s approach would be correct if the sentencing provision targeted the production of another iteration of an identifying name or number. After all, Melendrez took one iteration of a Social Security number (either written on a piece of paper or simply in his head) and produced another iteration (on the false Social Security card). But the plain text of
II. The Purpose of § 2B1.1(b)(9)(C)
The legislative history surrounding the adoption of
ITADA‘s directive to the Sentencing Commission contemplated “enhanced penalties for aggravating circumstances often associated with identity theft crimes.” Id. at 5. Recognizing that “there exists no clear definition of identity fraud,” but that it generally “involves ‘stealing’ another person‘s personal identifying information ... to fraudulently establish credit, run up debt, or to take over existing financial accounts,” id. at 7, Congress urged the Sentencing Commission to consider the impact on identity theft victims as a possible “measure for establishing penalties.” Id. at 12. Individual victims, Congress reported, can sometimes suffer “devastating” harm. Id. at 7. Particularly unfortunate victims have had “their credit ratings ruined and be[come] unable to get credit cards, student loans, or mortgages.... [And some victims] have even been arrested for crimes they never committed.” Id. at 16 (additional views of Senator Leahy).
When the Sentencing Commission implemented ITADA, it “determined that the more aggravated and sophisticated forms of identity theft, about which Congress seemed particularly concerned, should be the focus of enhanced punishment under the guidelines.”
It is evident from this legislative background that the “affirmative identity theft” targeted by
In contrast, in the scenarios offered by the Sentencing Commission as examples of where the enhancement would be inapplicable, the defendant has not generated any
Thus, while I agree with the majority that
The majority‘s interpretation, in contrast, would subject to the enhancement an underage student trying to enter a bar with a fake ID he created using a real person‘s driver‘s license number. This result Congress surely did not intend. Cf. S.Rep. No. 105-274, at 17 (Additional Views of Senator Leahy) (explaining that the bill was tailored to avoid “federalization of the status offenses of underage teenagers using fake ID cards to gain entrance to bars or to buy cigarettes“). Nor does such a sweeping interpretation make much sense. Congress made explicit that ITADA was meant to address the developing new problem of identification information misuse, not the old problem of fake identification document production. The majority‘s reading of
Accordingly, I respectfully dissent.
Stephan PARDI, Plaintiff-Appellant, v. KAISER FOUNDATION HOSPITALS, Defendant-Appellee.
No. 02-16447.
United States Court of Appeals, Ninth Circuit.
Argued and Submitted Jan. 16, 2004.
Filed Nov. 15, 2004.
