United States v. Dainius Vysniauskas

NOT RECOMMENDED FOR PUBLICATION File Name: 15a0013n.06 No. 11-2503 UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT UNITED STATES OF AMERICA, ) FILED Jan 07, 2015 ) ) DEBORAH S. HUNT, Clerk Plaintiff-Appellee, ) ) v. ) ON APPEAL FROM THE UNITED ) STATES DISTRICT COURT FOR THE ) EASTERN DISTRICT OF MICHIGAN DAINIUS VYSNIAUSKAS, ) ) Defendant-Appellant. ) Before: BOGGS, GIBBONS, and COOK, Circuit Judges. BOGGS, Circuit Judge. Dainius Vysniauskas (true name Valentinas Babakinas) is a Lithuanian national who pleaded guilty to bank fraud. He now appeals his top-of-guidelines- range sentence of 71 months. Specifically, he argues that the district court incorrectly calculated the total loss from his fraud, applied sentencing enhancements not supported by the facts, and imposed a procedurally and substantively unreasonable sentence. We affirm. I A Vysniauskas entered the United States illegally in 1999. In 2002, he was caught attempting to shoplift at a grocery store under the false name Denius Norkus. Immigration and Customs Enforcement subsequently ordered his removal in October 2002, but Vysniauskas eluded immigration authorities until he was deported in 2006. He returned illegally to the United States at an unknown time. After his return to the United States, Vysniauskas became involved with Tatsiana Leichanka, a co-conspirator in the bank-fraud scheme and the mother of his now 4-year-old child. Starting in 2008, the two engaged in an extensive scheme of bank and retail fraud. Using false names backed by various forms of fake and stolen identification, the defendants set up dozens of accounts at several banks over the course of two years. The co-conspirators used these false accounts to defraud the banks and others in several different ways. First, they wrote checks from one of their accounts that did not have sufficient funds to another one of their accounts. Vysniauskas and Leichanka exploited the gap between the time a depository (payee) bank credits funds and the time a drawee (payor) bank returns a not-sufficient-funds check.1 During this gap, typically two or three days, they would make large cash withdrawals or other purchases. Once the check was dishonored, the account would go into a negative balance and they would abandon it. The government calculated that Vysniauskas and Leichanka wrote $44,250 in such returned checks, with actual damages in the range of $30,000. Second, it appears that Vysniauskas and Leichanka would also overdraw their accounts in a more straightforward manner, taking advantage of the overdraft protection offered by the banks. Often in tandem with the deposit of a bad check, defendants would withdraw funds that exceeded the balance of available funds and, as before, abandon the account without repaying. The government does not give a precise breakdown of overdraft losses, as these were a relatively small component of the overall fraud. Third, Vysniauskas and Leichanka fraudulently disputed over $8,000 in charges and ATM withdrawals that they in fact made themselves. Fourth, Vysniauskas used not-sufficient-funds 1 Federal law requires banks to promptly provide access to funds from deposited checks. Expedited Funds Availability Act, 12 U.S.C. §§ 4001–4010. 2 checks to make over $5,000 in purchases from Costco. Vysniauskas disputes that the fourth category of loss is relevant, as the bad checks were written and cashed before the more extensive bad-check-depositing scheme began. Nevertheless, as with the later fraud, the checks were drawn on an account made in a false name (Eduardus Zenkevicius) that was later used for other fraudulent accounts. Finally, Vysniauskas also made unauthorized purchases totaling $186.35 with the credit card of Anthony Demaree. Vysniauskas’s scheme was exposed in 2010, when Leichanka attempted to open a Chase bank account in Sterling Heights, Michigan, using the same false name that she had unsuccessfully tried to use the day before at a different branch. Leichanka fled to the parking lot, where she and Vysniauskas were arrested by the police. Upon arrest, both Leichanka and Vysniauskas gave false names to the police, who discovered several false identification documents, bank cards, and a large amount of cash in their car. At the station, Leichanka ultimately confessed to the fraud; Vysniauskas continued to deny involvement and gave yet another false name. Unknown to the police, Vysniauskas and Leichanka had left their then 16- month-old son alone in their apartment. Not wanting to involve the police—due to the incriminating evidence in the apartment— Vysniauskas made a call to a friend, whom he asked to break into the apartment to get the child and also to “take and keep” anything that would “get him in more trouble.” The friend was unable to gain entry, and eventually called to police to help. The police broke in at 2:35 a.m., finding the child sleeping on the floor after being left unattended for approximately 35 hours. While inside, the police observed boxes of checks and a crib full of mail addressed to different people. As a result, they obtained a search warrant for the apartment, finding vast amounts of stolen mail, mail sent to Vysniauskas’s various aliases, false 3 identification documents, hundreds of checkbooks, and 103 credit cards and other “financial transaction devices.” Vysniauskas pleaded guilty to identity theft in Macomb County, Michigan, Circuit Court, receiving a sentence of 78 days in custody on July 7, 2010. He escaped shortly thereafter, but was re-arrested trying to visit his son, again using false identification. He was sentenced to a year in jail for the escape. B In the meantime, the FBI had initiated an investigation into Vysniauskas’s bank fraud. Agent Neil Gavin compiled bank records from the affected financial institutions into a spreadsheet, confirming over $200,000 in deposits and withdrawals from accounts associated with the various aliases of Vysniauskas and Leichanka. On November 30, 2010, Vysniauskas was charged with bank fraud, in violation of 18 U.S.C. § 1344; and attempted bank fraud and conspiracy to commit bank fraud, in violation of 18 U.S.C. § 1349. He pleaded guilty without the benefit of a plea agreement, and, after an evidentiary hearing on disputed sentencing issues, the district court sentenced him to 71 months, the top of the calculated guidelines range. In reaching this sentence, the district court applied, and Vysniauskas objected to, several sentencing enhancements. First, the district court found that the amount of loss caused or intended by the fraud was $138,466.27, warranting a sentence enhancement of ten levels for theft losses in the range of $120,000 to $200,000. USSG § 2B1.1(b)(1)(F). This loss total was comprised of six components: 1) $51,500 in presumed loss attributable to the 103 fraudulent access devices (applying the $500 per device minimum provided by the Guidelines); 2) $500 in presumed loss from the unauthorized use of Anthony Demaree’s credit card (actual loss was only $186.35); 3) 4 $28,042.21 in actual loss, as reported by the banks; 4) $44,250 in intended loss, from returned checks; 5) $8,517 in intended loss from the disputed-transaction claims; and 6) $5,657.06 in intended loss from not-sufficient-funds checks written to Costco. The district court’s loss total was significantly less than the probation office’s calculation, since the probation office included the total amount of all withdrawals from the fraudulent accounts. The district court also excluded actual losses that were not proven by a loss submission from one of the banks. Second, the district court applied a two-level enhancement for an offense involving ten or more victims. USSG § 2B1.1(b)(2)(A)(I). To reach ten victims, the court added the three banks with proven losses, two individuals whose names were used to set up accounts (Anthony Demaree and Maria Babanina), and five individuals whose mail, sent by federal agencies, was stolen. Although the Government submitted proofs that many more victims were involved, the court stopped after finding the ten necessary to support the enhancement. Third, the district court applied a two-level enhancement for an offense involving “sophisticated means.” USSG § 2B1.1(b)(9)(C) (2010). While finding the individual steps in Vysniauskas’s scheme not particularly sophisticated, when viewing the scheme in its totality, the court found that the sheer number of the fraudulent transactions, dozens of bank accounts, false identification documents, and his illegal alien status rendered the means of the offense “sophisticated.” Fourth, the district court found Vysniauskas’s call to his friend supported a two-level enhancement for obstruction of justice. USSG § 3C1.1. The court reasoned that providing false names and a false address was not enough to “significantly impede” the investigation, and so Leichanka did not receive an enhancement for her false statements. However, Vysniauskas’s 5 call was an active attempt to conceal and destroy material evidence, warranting an enhancement for him. Vysniauskas timely appealed these sentencing enhancements,2 and now argues on appeal that the sentence was also procedurally and substantively unreasonable. II A district court determines the amount of loss under the sentencing guidelines by a preponderance of the evidence, and we review that finding for clear error. United States v. McCarty, 628 F.3d 284, 290 (6th Cir. 2010). In its calculation, the district court “need only make a reasonable estimate of the loss.” Ibid. (quoting USSG § 2B1.1 cmt. n.3(C)). Nevertheless, we review the district court’s “methodology for calculating loss” de novo. Ibid. Under the Guidelines, loss is calculated as “the greater of the actual loss or the intended loss.” USSG § 2B1.1 cmt. n.3(A). “Intended loss” includes intended harm “that would have been impossible or unlikely to occur.” USSG § 2B1.1 cmt. n.3(A)(ii). A Before proceeding to the individual loss-calculation arguments, we discuss Vysniauskas’s fraudulent scheme in greater detail to help clarify our analysis. The district court described the conduct as “check kiting,” and cases with similar facts have used the same term. See United States v. Geevers, 226 F.3d 186 (3d Cir. 2000). The mere labeling of the scheme as “check kiting,” however, is not particularly useful for determining the proper loss-calculation methodology—as one commentator has noted, check kiting “is a loose concept meaning different things for different purposes, used more often to describe egregious behavior than to define it.” Alvin C. Harrell, Some Surprising New (and Old) Perspectives on Check-Kiting, 57 Consumer 2 The court also applied a two-level enhancement for unlawful use of a means of identification; Vysniauskas does not object to this. 6 Fin. L. Q. Rep. 214, 214 (2003). In a traditional check-kiting scheme, the kiter draws a check on one bank account—knowing the check is not backed by sufficient funds—and deposits it in another account. Taking advantage of the gap, or “float,” between the time checks are honored and cleared, the kiter then draws a second check on the second account and deposits it in the first account, to cover the first check. As long as the kiter continues writing new checks within the temporary clearance period, the balances of his accounts are permanently inflated, resulting in an interest-free loan in the amount of the kited check. See, e.g., Williams v. United States, 458 U.S. 279, 281 n.1 (1982); United States v. Stone, 954 F.2d 1187, 1188 n.1 (6th Cir. 1992). Although the scheme can work with two accounts, to avoid detection kiters will often use multiple accounts through which to circulate bad checks. This “circular” version of check kiting is distinct from the scheme engaged in by Vysniauskas. Vysniauskas had no intent of obtaining short-term loans from the banks, but instead, he intended to systematically defraud them by extracting the value of bad checks in cash. Such a scheme requires numerous bank accounts and false names, since each bank account must typically be abandoned after cashing only one bad check, when the balance becomes irretrievably negative. Vysniauskas passed relatively small bad checks (about $1,500 on average), so everyday ATM withdrawals and purchases were sufficient to extract most of the face value of the deposited check. In similar schemes involving much larger checks, however, the kiter may reasonably expect to extract only a small percentage of the value of the bad check. See, e.g., United States v. Higgins, 270 F.3d 1070, 1075 (7th Cir. 2001) ($69,990 out of a $420,000 check); Geevers, 226 F.3d at 189 (out of $2,000,000 in bad checks, $400,000 attempted and $160,000 successfully withdrawn). Although there was significant circular 7 activity in Vysniauskas’s accounts, it appears the purpose was to mask his overdrafts and large withdrawals, not to obtain a short-term loan. Given the variety of potential kiting schemes, we must be careful to employ a loss methodology appropriate to the case at hand: loss calculations in prior check-kiting cases might not be relevant precedent. With this in mind, we now address the specific issues with the district court’s loss calculation. B The first question is whether, in a non-circular check-kiting scheme, the entire face value of dishonored checks may be presumed to be the intended loss. Vysniauskas argues that the actual withdrawals taken from the bank accounts are a “clear manifestation of [his] intent,” since during the “temporary credit” period after the deposit of the kited check, the amounts withdrawn were within his control. Appellant’s Br. at 26. If he had intended to cause more loss, Vysniauskas contends, he would have. The district court properly rejected this argument. An intended loss need not be likely or even possible, USSG § 2B1.1 cmt. n.3(A)(ii), and as Geevers explained, “expectation is not synonymous with intent when a criminal does not know what he may expect to obtain, but intends to take what he can.” Geevers, 226 F.3d at 193. The same principle is applicable here. Vysniauskas may not have expected to withdraw the full face value of the bad checks, but if a bank had been slow in dishonoring the check, there was nothing to stop Vysniauskas from continuing to make withdrawals. Vysniauskas’s argument is especially weak here, where the actual losses caused by Vysniauskas were more than 50% of the face value of the bad checks, 8 and in some cases Vysniauskas successfully withdrew more than the face value of the check.3 A defendant is free to introduce evidence to overcome the presumption that intended loss is less than the face value of bad checks, see, e.g., Higgins, 270 F.3d at 1075, but Vysniauskas has made no such showing here. This methodological holding should not be extended to “circular” check-kiting schemes. The district court was correct in not following the methodology used in United States v. Swanson, 360 F.3d 1155 (10th Cir. 2004), and United States v. Deutsch, 987 F.2d 878 (2d Cir. 1993), both of which used the amount of overdrafts instead of the face value of bad checks to calculate loss. This is not because those cases had unsound reasoning, but because those cases dealt with fundamentally different types of check kiting—there is no “circuit split,” as suggested by Vysniauskas. Appellant’s Br. at 34 & n.4. Swanson involved a classic “circular” check- kiting scheme, in which a Kansas businessman used overdrafts and non-sufficient-funds checks circulated among his eleven bank accounts to fund his day-trading activities. Swanson, 360 F.3d at 1158–59. The bank ultimately detected the unusual activity and immediately charged all outstanding checks, resulting in an overdraft of over $500,000. Id. at 1160. Over the course of his scheme, Swanson had circulated over $70,000,000 in kited checks. Ibid. No party suggested that $70,000,000 was the proper figure for intended loss, and $500,000—the amount of the overdraft—was used for sentencing. Id. at 1167. Deutsch involved a more unusual variant of check kiting, which might be termed “telescoping” rather than “circular.” Deutsch obtained a credit card from AT&T with a limit of $8,000, using false information. Deutsch, 987 F.2d at 881. AT&T had a policy of giving immediate credit upon the receipt of payments. Ibid. Taking advantage of this, whenever his 3 For example, in the National City account under the name Ulugbek Khaydarov, Vysniauskas successfully withdrew $2000 after depositing a bad $1600 check, using the overdraft protection offered by the bank. Gov’t App’x at 5 [Gov’t Exh. 8]. 9 credit limit was exhausted, Deutsch would pay off his balance with a check drawn on a closed account. Ibid. When the check was dishonored—as expected—Deutsch would simply write a new, larger check to cover it and any further expenses that had been incurred. Ibid. This was repeated nine times over three months, allowing Deutsch to spend $34,000 before being caught. Ibid. The district court added up the face value of all the checks to get at an intended loss amount of $114,000. Id. at 886. The Second Circuit disagreed, reasoning that “[e]ach check, in effect, replaced all the previous checks and was not cumulative.” Ibid. As a result, only the face value of the last check was relevant to the intended loss. Taken together, Deutsch, Swanson, and Geevers stand for a simple proposition: in a fraudulent scheme, potential losses—however unlikely—and impossible losses may be included in the loss calculation, but double counting is not acceptable. See also United States v. Watkins, 994 F.2d 1192, 1196 n.5 (6th Cir. 1993) (noting that “the record contains indications that the sentencing judge might have counted some funds twice by adding together several transactions involving the same amount of bogus funds.”).4 Factually impossible and legally impossible frauds involve actual intent to cause loss. See, e.g., United States v. Younes, 194 F. App’x 302, 315–16 (6th Cir. 2006) (all fraudulent attempts to obtain student aid included in loss total, although some students were eligible in fact); United States v. Schlei, 122 F.3d 944, 996 (11th Cir. 1997) (government sting). Bad checks passed in a circular fashion, on the other hand, may not always be individually intended to cause loss. A methodology involving double counting must be avoided, not because such losses are impossible, but because they are not intended. 4 Watkins, which relied on the Sixth Circuit’s prior rule that “intended loss must have been possible to be deemed relevant,” United States v. Khan, 969 F.2d 218, 221 (6th Cir. 1992), was effectively abrogated in 2001 by the amendment to the Sentencing Guidelines now at USSG § 2B1.1 cmt. n.3(A)(ii), which specifically allowed for impossible losses. USSG App’x C, Amendment 617 (effective November 1, 2001). 10 C Vysniauskas argues that the district court improperly added actual losses to intended losses despite the fact that the two kinds of loss overlap. In particular, he argues that the intended-loss calculation of $44,250 based on the face value of the returned checks overlaps with the actual-loss estimate of $28,042.21 as reported by the banks. If a fraud involves both successful and unsuccessful attempts, total loss may include both actual and intended losses. United States v. Brown, 151 F.3d 476, 489–90 (6th Cir. 1998). But as intended loss “necessarily includes all actual losses,” United States v. Tate, 126 F. App’x 821, 826 (6th Cir. 2005), courts must be careful not to double count. The government does not dispute the legal proposition that actual losses should not be double counted in the intended-loss estimate, but argues that “[t]he evidence submitted to the court properly separated actual from intended loss such that the district court could determine both in its finding of total loss.” Appellee’s Br. at 27. Vysniauskas’s argument is perhaps best illustrated with an example. Consider the following scenario: Vysniauskas writes a $500 check on his account with Bank A and deposits it in his Bank B account. Assume that both accounts initially have zero balances. Bank B then gives Vysniauskas temporary credit for the face value of the check, and Vysniauskas withdraws the $500 from Bank B. Now, when Bank B presents the check to Bank A, either Bank A honors it, in which case Bank A is out the $500, or Bank A returns it to Bank B, in which case Bank B is out the $500. Either way, the actual loss is $500, and is equal to the intended loss of $500, as reflected in the face value of the check. Vysniauskas’s argument is that, where the check was returned, adding its value to the amount of the actual loss sustained by Bank B effectively double-counts that loss. 11 But Vysniauskas fails to account for the fact that the victims of his actual and intended losses in the above scenario are different—in other words, the losses are not, in fact, identical. Consider the above hypothetical from the perspective of Bank A only. If Bank A is presented with the check and honors it, it incurs an actual loss of $500. If Bank A dishonors the check and returns it, it incurs no loss, but there is nonetheless an intended-but-unrealized loss with respect to Bank A of $500. So, with respect to Bank A, the correct way to compute the amount of loss would be to add the actual losses (from checks honored or amounts otherwise withdrawn despite insufficient funds) to the intended-but-unrealized losses (from returned checks). That appears to be exactly what the district court did. The court appears to have calculated the amount of loss by adding up the actual losses and the intended-but-unrealized losses for each victim bank. As Agent Gavin testified, only checks that were actually returned were used to support the intended-loss figure. This is supported by his spreadsheet, and is methodologically sound: honored checks are like those in a “circular” check-kiting scheme, and should not be included in intended loss. In his testimony, Agent Gavin also agreed that “[i]f the check was not honored by a bank . . . then it would not be included in that affidavit of actual loss” for that bank. This means that the actual losses tallied in the bank affidavits are not included in the intended-loss calculation from the face values of the returned checks. Although Vysniauskas’s double-counting argument may be appealing at first blush, it falls short for several reasons. First, although Vysniauskas’s gain in the above example might only be $500—no matter which bank it ultimately came from—he exposed each bank to the risk of loss. Even if only one bank would ultimately incur the loss, “[i]ntended loss . . . includes intended pecuniary harm that would have been impossible or unlikely to occur.” See USSG 12 § 2B1.1 cmt. n.3(A)(ii). Corroborating this point is the fact that, as explained in Part II-E of this opinion, one may be found guilty of bank fraud under 18 U.S.C. § 1344 for writing not- sufficient-funds checks to retailers, since the bank is exposed to an actual risk of loss, regardless of whether any loss is ultimately incurred. United States v. Reaume, 338 F.3d 577, 581 (6th Cir. 2003) (“[W]hen the Bank receives an NSF check, it makes a decision to either honor the check anyway or to dishonor the check. If the check is dishonored, the Bank does not lose any money, but if the check is honored, and the account holder fails to pay back that debt to the Bank, the Bank suffers a loss.”). In the example described above, holding Vysniauskas responsible for only one bank’s actual or intended loss would be inconsistent with the undisputed fact that both banks are “victims” under law.5 In addition, the district court’s approach of calculating the amount of loss separately for each victim finds significant support in the Guidelines. Application Note 3(C)(iv) explains that a reasonable loss estimate may be based on “[t]he approximate number of victims multiplied by the average loss to each victim,” where, again, “loss” is defined as “the greater of actual loss or intended loss,” USSG § 2B1.1 cmt. n.3(A). A fair reading of Application Note 3(C)(iv), then, is that loss estimates may be based on “[t]he approximate number of victims multiplied by the average [of the greater of actual loss or intended loss] to each victim.” The Guidelines commentary concerning losses in “Ponzi and Other Fraudulent Investment Schemes” is also instructive. That commentary explains that “the gain to an individual investor in the scheme shall not be used to offset the loss to another individual investor in the scheme.” Id. at cmt. n.3(F)(iv). The point is: victims are not fungible. 5 Note that calculation of amount of loss for sentencing purposes is distinct from restitution, which may only be awarded for losses actually caused by the defendant, and not for intended losses. Younes, 194 F. App’x at 317 (“While for sentencing purposes ‘loss' is defined as the greater of either the ‘actual’ or the ‘intended’ amount lost due to the fraud, for restitution purposes the [Mandatory Victims Restitution Act, 18 U.S.C. § 3663] implicitly requires that the restitution award be based on the amount of loss actually caused by the defendant's offense.”). 13 Finally, it is no answer to say that, in the scenario in which Bank A does not honor the check, Vysniauskas should somehow receive a “credit” for the intended-but-unrealized loss to Bank A based on the actual loss to Bank B. Under the Guidelines, criminals may receive “Credits Against Loss” for the amount of “money returned . . . by the defendant or other persons acting jointly with the defendant, to the victim before the offense was detected.” Id. at cmt. n.3(E)(i) (emphasis added). Vysniauskas should not receive credit for the fact that Bank A decided not to honor his checks when presented with them. After all, Bank A’s losses in that scenario were reduced not by Vysniauskas’s actions but by the bank’s own actions. The Seventh Circuit appears to have considered this same question—i.e., whether the amount of loss may include both the intended loss to one victim and the actual loss to another, with respect to the same sum. See United States v. Lauer, 148 F.3d 766, 767 (7th Cir. 1998). Lauer involved a Ponzi scheme with numerous victims. The court held as follows: If the defendant intended to steal $5 million and succeeded in stealing $1 million, it would be absurd to reckon the loss at $6 million, for this would result in his being punished more severely than if his theft had been a complete success. But here we have multiple victims, and we cannot think of any objection to adding the actual loss of one to the intended loss of another, any more than it would be objectionable to punish the defendant separately for murdering X and attempting to murder Y, as distinct from punishing him separately for murdering and attempting to murder X. Ibid. (emphasis added). To be sure, one may distinguish the Lauer court’s murder example on the ground that, in that case, both deaths are intended, whereas here, only one loss is ultimately intended. Nevertheless, that distinction does not affect the outcome. It is helpful to consider Vysniauskas’s actions in the example given earlier sequentially. First he deposits a non- sufficient-funds check into Bank B and redeems the cash, causing a loss to Bank B. That loss may eventually be passed on, but at this point, Bank B has incurred the loss, and Vysniauskas has acted with the requisite intent with respect to that loss. A few days later, Bank B presents the 14 check to Bank A. Depending on how it responds, Bank A will suffer an actual loss or an intended-but-unrealized loss, and Vysniauskas will have acted with the requisite intent with respect to that loss as well. To summarize, Vysniauskas imposed the loss on Bank B, and then attempted to impose that same loss on Bank A. Like the Lauer court, we see no reason not to hold Vysniauskas accountable for the amount of loss that he both actually imposed or intended to impose on each victim. That approach is consistent with the text of the Guidelines and their intention to accord victims individualized treatment. Accordingly, we cannot conclude that the district court’s methodology for calculating loss was improper. D Vysniauskas also objects to the district court’s addition of $500 in damages for each of the 103 access devices (i.e., credit cards, bank cards, and PIN numbers) found in his apartment. As a general matter, such a presumption is “reasonable,” and authorized by the Sentencing Guidelines, which provides that the loss associated with each such device “shall not be less than $500.” USSG § 2B1.1 cmt. n.3(F)(i). Admitting this, Vysniauskas makes three specific objections: 1) unusable cards should be excluded, 2) cards in his and Leichanka’s actual names should be excluded, and 3) cards actually used to set up fraudulent accounts should not be double counted with the actual and check-face-value loss totals. Under the Sentencing Guidelines, “unauthorized access device” has the meaning that the term is given in 18 U.S.C. § 1029, which deals with fraud in connection with access devices. Section (e)(1) of the statute defines “access device” as “any card . . . or other means of account access that can be used . . . to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds.” 18 U.S.C. § 1029(e)(1). Section (e)(3) adds that 15 “unauthorized” refers to devices “lost, stolen, expired, revoked, canceled, or obtained with intent to defraud.” 18 U.S.C. § 1029(e)(3). Actual use is not required. United States v. Shifu Lin, 508 F. App’x 398, 403–04 (6th Cir. 2012), cert. denied, 133 S. Ct. 1300 (U.S. 2013); United States v. Gilmore, 431 F. App’x 428, 430 (6th Cir. 2011). Although neither the statute nor the Guidelines specifically require “usability,” in interpreting the statute the Ninth Circuit has read in such a requirement. United States v. Onyesoh, 674 F.3d 1157, 1159 (9th Cir. 2012). To the extent we recognize a “usability” requirement, it must be permissive enough to encompass the “expired, revoked, [and] canceled” devices expressly included in the statute. Thus a device need not be usable in its primary “access” sense: unauthorized charges are not the only way credit cards can be misused. In a check-fraud case, bank and credit cards—whether expired, fake, or un- activated—can be used to create and corroborate false identities. Where the usability of access devices is “self-evident” from the nature of the fraud, further proof is unnecessary. See Onyesoh, 674 F.3d at 1160. Nor is there good reason to exclude the cards in Vysniauskas’s and Leichanka’s true names. The statutory definition includes not just lost or stolen devices in other people’s names, but any device “obtained with intent to defraud.” This phrase naturally encompasses devices obtained under real names as well as false names, especially when backed by other false information or an overriding fraudulent purpose. Here, as the district court found, there is sufficient evidence that the eight devices in their true names were associated with accounts involved in the overall fraudulent scheme. Even if all of the purchases and transactions made through these accounts were legitimate, they helped to provide a cover of ordinary activity that lowered the banks’ suspicions of the fraudulent withdrawals. 16 Vysniauskas’s final contention is likewise unpersuasive. The Guidelines entitle the government to apply a presumption of $500 loss per card unless it seeks to establish a higher loss amount. USSG § 2B1.1 cmt. 3(F)(i). Vysniauskas argues that the government cannot apply the $500-per-card figure because it failed to show that it did not already establish a loss amount for each of the 103 cards in calculating actual and intended losses to banks. However, the government does not need to show the absence of double counting in order to benefit from this presumption because the burden of rebutting the government’s presumption falls upon Vysniauskas. See, e.g., St. Mary’s Honor Ctr. v. Hicks, 509 U.S. 502, 507 (1993) (“To establish a ‘presumption’ is to say that a finding of the predicate fact . . . produces a ‘required conclusion in the absence of explanation’ . . . .”);.see also, Usery v. Turner Elkhorn Mining Co., 428 U.S. 1, 26 (1976) (“Each presumption is explicitly rebuttable, and the effect of each is simply to shift the burden of going forward with evidence from the claimant to the [defendant].”). Vysniauskas does not produce any evidence that the government doubled counted the loss amount with respect to any of the 103 cards and, therefore, the government is entitled to apply the $500-per- card presumption. E Vysniauskas also objects to the inclusion in the loss total of $5,657.09 in non-sufficient- funds checks written to Costco, since 1) the government did not prove the loss by a preponderance of the evidence, 2) passing bad checks to retailers is not bank fraud, and 3) the activity was too remote from the offense of conviction. The district court did not clearly err in finding the not-sufficient-funds loss to be proven by a preponderance of the evidence. The loss was established by a report from the Oakland County Sheriff’s Department; the checks were signed by Eduardas Zenkevicius, one of 17 Vysniauskas’s known aliases; the associated bank account had been subpoenaed by the FBI during its fraud investigation; and numerous Costco membership cards were found in the search of Vysniauskas’s apartment. It is true that Agent Gavin misspoke, in stating that the Comerica bank account on which the checks were drawn was included in the government’s spreadsheet of fraudulent accounts. However, the district court did not rely on this statement, specifically noting that “in addition to the fraudulent checks summarized by the Government’s Exhibit 8 [the spreadsheet], the Government provided evidence . . . that Vysniauskas . . . issued non-sufficient funds checks to Costco.” Dist. Ct. Op. at 14 (emphasis added). Vysniauskas’s second argument is incorrect. As mentioned, writing not-sufficient-funds checks to merchants can support bank fraud under 18 U.S.C. § 1344, since the bank is exposed to an actual risk of loss. Reaume, 338 F.3d at 581. Vysniauskas argues, however, that his 2008 Costco fraud is not sufficiently related to his kiting to be considered “relevant conduct” under the Guidelines. For the purposes of sentencing, judges may only take into account “relevant conduct,” that is, offenses “part of the same course of conduct or common scheme or plan as the offense of conviction.” United States v. Hill, 79 F.3d 1477, 1481 (6th Cir. 1996) (quoting USSG § 1B1.3(a)(2)). The Guidelines require the offenses to be either “substantially connected to each other by at least one common factor, such as common victims, common accomplices, common purpose, or similar modus operandi,” USSG § 1B1.3 cmt. n.9(A), or “part of a single episode, spree, or ongoing series of offenses,” USSG § 1B1.3 cmt. n.9(B). Conduct not charged in the indictment may be considered, although if the offense is sufficiently remote in time, the district court will err in considering it. United States v. Kappes, 936 F.2d 227, 229, 230–31 (6th Cir. 1991). 18 The district court did not clearly err in considering the not-sufficient-funds checks to Costco as relevant to his check-kiting fraud. Although the primary victims were different, both schemes shared the same underlying characteristic: passing bad checks under a false name, with intent to cash out as much of the value as possible. In addition, a search of Vysniauskas’s apartment turned up numerous Costco and other membership cards, presumably still a part of the ongoing fraud. The relevance of the Costco scheme is especially clear when viewed in light of the diversity of Vysniauskas’s fraud: in addition to the kiting, he fraudulently disputed transactions, made charges on a stolen credit card, and simply overdrew accounts. The district court did not clearly err in finding evidence of a “single evolving [] conspiracy” rather than “several discrete and separate” frauds. United States v. Barbour, 393 F.3d 82, 92 (1st Cir. 2004). Vysniauskas argues that the Costco checks should not be included because they predated the conduct charged in the indictment by 17 months. However, the spreadsheet compiled by the FBI showed kiting activity going back a full year before the date indicated in the indictment. The gap in the records, therefore, is only five months (May to October 2008). This is not enough to negate the conclusion that Vsyniauskas engaged in a prolonged, albeit varied, course of bank fraud. Until 2010, even the check-kiting activity was intermittent, with multiple multi-month gaps between bad checks—the longest from January to August 2009. This “ongoing series of offenses” is sufficient to constitute the “same course of conduct” under the Guidelines. III Vysniauskas also raises various other challenges to sentencing enhancements applied by the district court. As with loss, the district court’s factual determinations here are reviewed for clear error. United States v. Maken, 510 F.3d 654, 656–57 (6th Cir. 2007); see also United States v. Kraig, 99 F.3d 1361 (“sophisticated means” is question of fact). Whether a person is a 19 victim under the Guidelines, on the facts found by the district court, is a legal question we review de novo. United States v. Stubblefield, 682 F.3d 502, 510 (6th Cir. 2012). Likewise, the “mixed law-and-fact conclusion that the facts found by the district court constituted an obstruction of justice” is reviewed de novo. United States v. Lineberry, 7 F. App’x 520 (6th Cir. 2001). A Vysniauskas contends that the district court improperly applied an enhancement for ten or more victims under § 2B1.1(b)(2)(A), specifically arguing that there was insufficient evidence that one of his alleged identity-theft victims, Maria Babanina, was a real person; and that there was insufficient evidence that his mail-theft victims were real, or that their mail was undelivered. The notes to the Sentencing Guidelines define “victim” as “any person who sustained any part of the actual loss.” USSG § 2B1.1 cmt. n.1. However, in addition to this general definition, the Guidelines also include “any person who was the intended recipient, or addressee, of [] undelivered United States mail” and “any individual whose means of identification was used unlawfully or without authority.” USSG § 2B1.1 cmt. n.4(C), (E). Thus for such victims the government need not prove actual loss. The district court did not clearly err in finding that Maria Babanina was an identity-theft victim. Agent Gavin recovered an identity document, which he determined to be legitimate, with the name, information, and picture of a person named Maria Babanina. He also recovered a fraudulent identification document with the same name and information, but Leichanka’s picture. The natural conclusion is that Babanina’s ID was lost or stolen, and Leichanka used the information to forge her own. Vysniauskas has provided no other explanation for the existence of this seemingly legitimate identification document. 20 Nor did the district court clearly err in finding five victims of mail fraud. The stolen mail was official correspondence from the Social Security Administration and the United States Treasury; it is reasonable to assume these agencies were corresponding with real people. Further, the mail was addressed to various apartments in the same complex as Anthony Demaree, a victim of Vysniauskas who actually suffered fraudulent charges on his credit card. The evidence also supports a finding that the mail was undelivered: the apartment complex’s mailboxes were outdoors and unsecured, and “mail taken from [an] addressee’s mail box” is considered undelivered. USSG § 2B1.1 cmt. n.4(C)(iii). B Vysniauskas also argues the district court erred in applying a “sophisticated means” enhancement under § 2B1.1(b)(9), characterizing his fraud as time-consuming, but not “especially complex or especially intricate.” USSG § 2B1.1 cmt. n.8(B). If mere use of false identities is enough to constitute sophistication, he argues, nearly every instance of fraud will necessitate this enhancement. In applying this enhancement, courts do not look to the “individual steps” of the scheme, but instead to “the totality of the defendant’s conduct.” United States v. Masters, 216 F. App’x 524, 526 (6th Cir. 2007); see also United States v. Tandon, 111 F.3d 482, 491 (6th Cir. 1997). Here, Vysniauskas set up dozens of bank accounts at several financial institutions, stole real identification information and forged identification documents, and tried to cover up fraudulent withdrawals with nearly $200,000 of “legitimate” transactions. Our case law supports that such repeated use of false identities in an extensive and repetitive scheme supports such an enhancement, even if “the information used was not itself unduly complex or difficult to obtain.” United States v. Kopietz, 126 F. App’x 708, 711 (6th Cir. 2005) (filing 15 fictitious and fraudulent tax returns); see also United States v. Crosgrove, 637 F.3d 21 646, 667 (6th Cir. 2011) (use of pseudonym and issuance of fraudulent insurance certificates); United States v. Middleton, 246 F.3d 825, 848 (6th Cir. 2001) (tax fraud concealed by opening of several bank accounts under different company names, repetitive small withdrawals, and use of cash). The district court did not err in ruling that this extensive fraud was accomplished through “sophisticated means.” C Vysniauskas challenges the two-level obstruction-of-justice enhancement imposed as a result of his attempt to have his friend conceal evidence. USSG § 3C1.1. The request to have his friend “take and keep” the “envelopes, money, watches,” and other “stuff in his apartment which will get him into more trouble” is within the core definition of obstruction of justice under the Guidelines. USSG § 3C1.1 cmt. n.4(D) (“directing or procuring another person to destroy or conceal evidence that is material”). Vysniauskas objects that his obstruction did not occur during the federal “investigation, prosecution, or sentencing of the instant offense,” as only a state investigation had been initiated at the time. USSG § 3C1.1. The Guidelines, however, do not draw any such distinction between federal and state investigations. See United States v. Ayers, 416 F.3d 131, 134–35 (4th Cir. 2005) (enhancement warranted where defendant ordered friend to destroy gun during state-police investigation); see also United States v. Roberts, 243 F.3d 235, 238 (6th Cir. 2001) (enhancement warranted where defendant escaped from state authorities before start of federal investigation). The only requirement is that the state and federal investigations be for the same “instant offense.” Here, the state investigation arose out of exactly the same offense that the federal charges were ultimately based on: attempting to set up bank accounts for fraudulent purposes, using false identification. 22 Vysniauskas’s argument that he had no reason believe there was a “further investigation” underway after his arrest also fails. When the Guidelines were amended in 2006, the Commission replaced the language “during the course of the investigation, prosecution, or sentencing” with “with respect to the investigation, prosecution, or sentencing” to make clear that pre-investigative conduct can form the basis of an adjustment under § 3C1.1, expressly rejecting United States v. Bagget, 342 F.3d 536, 542 (6th Cir. 2003), in favor of the majority view. USSG Appendix C, amend. 698. Even under the prior version of the Guidelines, however, Vysniauskas’s actions are clearly within the scope of the enhancement: arrest is typically sufficient to trigger the start of police investigation or prosecution. See USSG § 3C1.1 cmt. n.4(D) (expressly including destroying or concealing evidence “contemporaneously with arrest”); United States v. Waldon, 206 F.3d 597, 608 (6th Cir. 2000) (enhancement for phone call to conceal evidence six hours after arrest); see also United States v. Micklin, 89 F. App’x 977, 982 (6th Cir. 2004), vacated due to United States v. Booker, 543 U.S. 220 (2005) (enhancement for disposal of evidence several hours after execution of search warrant). While in custody, both Leichanka and Vysniauskas were being actively questioned, and Vysniauskas’s suggestion that state police were planning no further investigation after finding fraudulent documents in the initial car search is pure speculation. A phone call to conceal evidence while in post-arrest custody is clearly obstruction “with respect to the investigation, prosecution, or sentencing.” USSG § 3C1.1. IV Finally, Vysniauskas argues that his sentence is both procedurally and substantively unreasonable. Sentences are reviewed for procedural and substantive unreasonableness under an abuse-of-discretion standard. Gall v. United States, 552 U.S. 38, 51 (2007). A district court 23 commits procedural error by “failing to calculate (or improperly calculating) the Guidelines range, treating the Guidelines as mandatory, failing to consider the § 3553(a) factors, selecting a sentence based on clearly erroneous facts, or failing to adequately explain the chosen sentence.” Ibid. A sentence is substantively unreasonable if the sentence is “greater than necessary,” as when the district court “selects the sentence arbitrarily, bases the sentence on impermissible factors, fails to consider pertinent § 3553(a) factors or gives an unreasonable amount of weight to any pertinent factor.” United States v. Tristan-Madrigal, 601 F.3d 629, 632–33 (6th Cir. 2010). Where a party has failed to object to a procedural defect, as is the case here, we review claims of procedural unreasonableness for plain error. United States v. Vonner, 516 F.3d 382, 385–86 (6th Cir. 2008) (en banc). To show plain error, a defendant must show 1) error 2) that was obvious or clear, 3) that affected defendant’s substantial rights and 4) that affected the fairness, integrity, or public reputation of the judicial proceedings. Vonner, 516 F.3d at 386. First, Vysniauskas argues that the sentence was procedurally unreasonable because the district court relied on facts that it specifically found were not supported by a preponderance of the evidence. The presentence report stated that ten of the aliases used by Vysniauskas and Leichanka were identified as those of real individuals. In a subsequent opinion and order, the district court found that only two of the aliases were proven by a preponderance of the evidence to be of real people, for the purposes of the ten-or-more-victims enhancement. In apparent contradiction to this finding, at the sentencing hearing the district court referred back to the presentence report, stating that “ten of [Vysniauskas’s aliases] were identified as legitimate and real individuals” and explaining that it was “troubling” that he was “using the identification of real individuals who were going to have real consequences in terms of their credit, their lives.” Vysniauskas did not object at the hearing, thus we review for plain error. Despite appearances, 24 these statements are not completely inconsistent. As the district court recognized, to be an identity theft “victim” under § 2B1.1(b)(2)(A), the false identification must be “used.” USSG § 2B1.1 cmt. n.4(E). As a result, the court excluded these individuals from the victim count only because there was no proof of use of their information, not because of lack of proof of their existence.6 At sentencing, the district court could consider the potential risk of harm faced by these individuals, even though lack of actual use prevented their characterization as “victims” for enhancement purposes. Nor was the district court’s concern about the “real consequences” of using the identification of real individuals problematic simply because there was no evidence of actual credit problems. The district court made its statement only in terms of possibility (“were going to” as opposed to “did”), and a court is free to consider the risk of foreseeable harms in sentencing. See United States v. Karro, 257 F.3d 112, 121 (2d Cir. 2001) (holding that “the risk of non-monetary harms associated with identity theft” is a permissible basis for upward departure). Vysniauskas also argues that the district court unreasonably failed to give him either a concurrent sentence or credit for time served on his state offense, and also failed to provide a reason for the denial. A district court has discretion to impose a concurrent sentence under USSG § 5G1.3 and 18 U.S.C. § 3584(a); USSG § 5G1.3 also permits the district court to adjust the sentence downward for time served. Since, in exercising this discretion, the court is to consider same § 3553(a) factors that must be addressed in determining the length of the sentence, 18 U.S.C. § 3584(b), the district court’s determinations of sentence length and concurrency are “intertwined.” United States v. Johnson, 640 F.3d 195, 208 (6th Cir. 2011). Thus there is no need for “the district court to state a ‘specific reason’ for a consecutive sentence,” especially 6 Tellingly, Vysniauskas did not object at the time, failing to challenge the ten-or-more-victims enhancement at all. (Amended Sentencing Memorandum, R.54 at 5.) 25 because the Guidelines “presume that multiple terms of imprisonment imposed at different times are consecutive.” Id. at 209. Here, the district court heard argument, recognized its discretion, and addressed the appropriate factors. There was no error. Vysniauskas’s substantive unreasonableness argument is based solely on his never having served a jail sentence before the 78-day term imposed after his April 2010 arrest. To start, a within-Guidelines sentence is presumptively reasonable on appellate review. United States v. Christman, 607 F.3d 1110, 1118 (6th Cir. 2010). The main problem with the argument, however, is that Vysniauskas had only avoided jail in the past by failing to appear for arraignment, using multiple false identities, and illegally immigrating back into the United States. As the district court recognized, this is reason to impose a harsher, not a more lenient sentence. V Because Vyniauskas’s arguments are without merit, we AFFIRM his sentence. 26