UNITED STATES оf America, Plaintiff-Appellee, v. Xavier TAYLOR, Defendant-Appellant.
No. 14-13288.
United States Court of Appeals, Eleventh Circuit.
March 28, 2016.
816 F.3d 671
Congrеss has the power to require international sex traffickers to pay restitution to their victims even when the sex trafficking occurs exclusively in another country. Baston must pay restitution to K.L. for her prostitution in Australia. The district court erred when it reduced her restitution award.
IV. CONCLUSION
We AFFIRM Baston‘s judgment of convictions and sentence and VACATE the order of restitution and REMAND with an instruction to increase the award of restitution for K.L.‘s prostitution in Australia.
Michael G. Smith, The Law Offices of Michael G. Smith, Fort Lauderdale, FL, for Defendant-Appellant.
Before WILSON, JULIE CARNES, and EBEL,* Circuit Judges.
WILSON, Circuit Judge:
Defendant-appellant Xavier Taylor used stolen identity information to add himself as an authorized user to other individuals’ pre-existing credit card accounts and open new accounts in the names of stolen identities, causing banks to create new credit cards that included him as an authorized user. For this conduct, he was charged with and pleaded guilty to one count of trafficking in unauthorized access devices,1 in violation of
Specifically, Taylor contends that he does not qualify for the
After thorough consideration, we conclude that
I. Background
Using stolen identities, Taylor contacted banks, gained access to credit card accounts, and added himself as an authorized user of the accounts. The banks issued new credit cards associated with those accounts. All of the credit cards the banks issued exhibited the account numbers of the people whose identities Taylor had stolen, and some of the credit cards were even issued in Taylor‘s name. Upon receiving the crеdit cards, Taylor activated them by telephone and began making unauthorized purchases totaling several thousand dollars.
Agents from the United States Secret Service eventually obtained and executed a search warrant for Taylor‘s home. The search revealed approximately thirty-three credit cards linked to the accounts of Taylor‘s victims. Taylor was arrested and charged with five counts of access device fraud. Subsequently, Taylor entered into a written plea agreement with the government. In exchange for favorable sentencing considеrations, Taylor agreed to plead guilty to one count of trafficking in unauthorized access devices and one count of aggravated identity theft in satisfaction of all five counts.
At sentencing, Taylor received several enhancements to his base offense level, one of which was a two-level enhancement for an offense involving the production of an unauthorized access device. See
II. Standard of Review
“We review a district court‘s legal conclusions regarding the Sentencing Guidelines de novo, and its factual findings for clear error.” United States v. Cruz, 713 F.3d 600, 605 (11th Cir.2013). Ques-
III. Discussion
On appeal, Taylor contends that the district court erroneously applied the two-level enhancement pursuant to
A. Application of a Production Enhancement Despite a Conviction Under 18 U.S.C. § 1028A
As a threshold matter, we must determine whether a district court may apply a production enhancement under
In pertinent part,
(A) the possession or use of any (i) device-making equipment, or (ii) authentication feature;
(B) the production or trafficking of any (i) unauthorized access device or counterfeit access device, or (ii) authentication feature.2
However, the text of
Section 2B1.6 is designed to prevent a defendant from being doubly penalized for the same conduct. Under
In considering these provisions in a prior opinion, we held that
We have directly applied this principle to subsection (A) of
Therefore, we have read the language in
As indicated above,
We begin our analysis with the text. The Guidelines define “production” as “includ[ing] manufacture, design, alteration, authentication, duplication, or assembly.”
Our conclusion finds further support in the structure of the Guidelines provisions at issue. We presume that the “inclusion or exclusion of language [in the Guidelines]
Finally, it makes sense that the Sentencing Commission would include a sentencing enhancement for producing, rather than simply transferring, a fraudulent access device: the conduct entailed in production may be more problematic than mere transference. By рroducing unauthorized devices, a defendant furthers the criminal scheme and creates more opportunities for the prohibited conduct to continue. That specific conduct enhances the criminal act more so than simply stealing a credit card and misusing it (or using an expired, revoked, or canceled device): it causes the proliferation of unauthorized devices. Moreover, such conduct may be harder to detect. For instance, if a credit card is simply stolen, a victim may cancel the card when he or she realizes that card is missing. But if the defеndant instead creates a new card and begins using it, the victim may not notice the fraud until discovering the unauthorized charges on his or her account. Nevertheless, under Taylor‘s preferred reading of the Guidelines, sentencing courts would not be permitted to differentiate between those who use or transfer unauthorized devices and those who create the means for that subsequent criminal activity. That is to say, a defendant who produced a fraudulent card would be subject to the same sentence as another defendant who, for instance, simply purchased the card frоm the first defendant. By including an enhancement for production, the Sentencing Commission clearly did not intend that result. Instead, a defendant who creates the means for not only himself, but also others, to engage in criminal activity should not enjoy the same punishment as the individual who simply uses an already-existing item to engage in criminal activity.6
Accordingly, the plain language of the Guidelines, the structure of the relevant Guidelines provisions, and the purposes underlying those provisions support our conclusion today. Therefore, we hold that the district courts may apply the
B. Conduct Constituting “Production” under § 2B1.1(b)(11)(B)(i)
Having determined that a sentence may be subject to the two-level production enhancement in
While our court has concluded that a defendant can be subjected to a sentencing enhancement based on the actions of a co-conspirator,7 we have never squarely held whether a defendant is liable for “producing” a device when neither the defendant nor a co-conspirator directly manufactured the item. Consequently, the second legal issue in this case is whether “production” еncompasses a situation in which the defendant caused an innocent third party to create the fraudulent device at the defendant‘s behest. Taylor argues that this conduct should not constitute “production” because it simply involves “procuring” the device (here, a credit card) after it was produced by an innocent third party (a bank). According to Taylor, only a defendant who creates cards personally or through criminal associates deserves an enhancement for production of an unauthorized access device. However, we hold that “production” for purposes of the
The Guidelines provide for a broad interpretation of “production” under
This interpretation of “production” is consistent with the broad interpretations adopted by this court and other circuits. We have held that “production” applies to a defendant‘s “capture, storage, and transmittal” of preexisting passwords and user names because “production” includes “‘duplication’ or ‘assembly’ of preexisting items.” See Barrington, 648 F.3d at 1203 (affirming production enhancement where defendants “view[ed] or record[ed] . . . personal identification data” (internal quotation marks omitted)).
Similarly, the First Circuit gave broad effect to conduct qualifying as “productiоn” when it found the production enhancement could be applied in the case of a defendant who, recognizing that air bubbles in the laminate of a fraudulent driver‘s license could undermine its appearance as legitimate, either popped the bubbles herself or instructed her co-conspirator to do so. See United States v. Jones, 551 F.3d 19, 25-26 (1st Cir.2008). The court held that this conduct was the type of behavior the Guidelines attempt to capture in the production enhancement because, although the physical act of popping air bubbles might seem minor, this small act of alteration “transformed the flawed driver‘s license into a usable counterfeit access device.” Id. at 26. An even more persuasive example comes from the Seventh Circuit, where the court held that the production enhancement could be applied to a defendant discovered with credit and debit cards imprinted with the names of the defendant and his co-conspirators. See United States v. Hinds, 770 F.3d 658, 663-64 (7th Cir.2014). The court explained that “the [embossed] names on the cards speak for themselves. This is not a crime where [the defendant] used the stolen credit cards of John or Jane Doe. His crime . . . invоlved cards designed specifically for him to use; they had his name on them and were linked to various active accounts.” Id. at 663. The court decided this sufficiently demonstrated that the defendant, “his co-conspirators, or someone acting on their behalf, must have designed or created these counterfeit cards in preparation for their crimes.”9 See id. Based on this undisputed evidence, the court held that the production enhancement was justified. See id. at 664.
In sum, the definition of “production” is broadly written in the Guidelines and, for that reason, has been broadly construed. And the Guidelines provision for determining specific offense enhancements makes clear that a defendant is responsible for all actions he willfully causes or induces. Consequently, we hold that the production enhancement is applicable to conduct involving third-party production—whether physically performed by a criminal co-conspirator or by an innocent party—that has been willfully induced by the defendant.
C. Whether the District Court Erred in Applying the Production Enhancement Based on Taylor‘s Relevant Conduct
The evidence submitted by the government in this case shows that Taylor induced and willfully caused the production of unauthorized access devicеs when he contacted banks using stolen identities, added himself as an authorized user to the accounts associated with those identities, and directed the banks to issue new credit cards. Put simply, Taylor caused the bank to physically produce credit cards bearing his name. Thus, while the credit cards were not Taylor-made, they were certainly tailor-made for his offense.
Taylor‘s relevant conduct is captured by the broad language of the “production” definition and the plain meaning of “induced” and “willfully caused” in the Guidelines. See
Accordingly, as in Jones, where the defendant‘s bubble-popping alteration of a driver‘s license created a usable counterfeit access device, Taylor‘s actions—getting a bank to add his name to an account and manufacture a new card embоssed with his name—created a usable unauthorized access device.10 See Jones, 551 F.3d at 25-26;
Consequently, because Taylor induced and willfully caused banks to produce new credit cards, the district court did not err in applying the
IV. Conclusion
We conclude that the
AFFIRMED.
WILSON
UNITED STATES CIRCUIT JUDGE
Notes
Inapplicability of Chapter Two Enhancement.—If a sentence under this guideline is imposed in conjunction with a sentence for an underlying offense, do not apply any specific offense characteristic for the transfer, possession, or use of a means of identification when determining the sentence for the underlying offense. A sentence under this guideline accounts for this factor for the underlying offense of conviction, including any such enhancement that would apply based on conduct for which the defendant is accountable under 1B1.3. . . .
