United States v. Hawes

Opinions of the United 2008 Decisions States Court of Appeals for the Third Circuit 3-27-2008 USA v. Hawes Precedential or Non-Precedential: Precedential Docket No. 06-3334 Follow this and additional works at: http://digitalcommons.law.villanova.edu/thirdcircuit_2008 Recommended Citation "USA v. Hawes" (2008). 2008 Decisions. Paper 1338. http://digitalcommons.law.villanova.edu/thirdcircuit_2008/1338 This decision is brought to you for free and open access by the Opinions of the United States Court of Appeals for the Third Circuit at Villanova University School of Law Digital Repository. It has been accepted for inclusion in 2008 Decisions by an authorized administrator of Villanova University School of Law Digital Repository. For more information, please contact Benjamin.Carlson@law.villanova.edu. PRECEDENTIAL UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT No. 06-3334 UNITED STATES OF AMERICA v. BRYAN J. HAWES a/k/a FINANCIAL MANAGEMENT ADVISORY SERVICES, INC. a/ka/ FINANCIAL MANAGEMENT SERVICES, INC. Bryan J. Hawes, Appellant Appeal from the United States District Court for the Western District of Pennsylvania (D.C. Criminal No. 04-cr-00082) District Judge: Honorable Donetta W. Ambrose Argued November 1, 2007 Before: RENDELL, WEIS and NYGAARD, Circuit Judges. (Filed: March 27, 2008) James J. Brink, Esq. [ARGUED] 428 Forbes Avenue, Suite 220 Lawyers Building Pittsburgh, PA 15219 Counsel for Appellant Robert L. Eberhardt, Esq. Michael L. Ivory, Esq. [ARGUED] Office of United States Attorney 700 Grant Street, Suite 4000 Pittsburgh, PA 15219 Counsel for Appellee OPINION OF THE COURT RENDELL, Circuit Judge. Brian Hawes appeals from his sentence imposed after a plea of guilty to two counts of mail fraud in violation of 18 U.S.C. § 1341. He was sentenced to a term of 78 months’ imprisonment. Hawes argues that the District Court improperly calculated the applicable Guideline range. We agree and will vacate the sentence imposed by the District Court and remand for resentencing. 2 I. F ACTS AND P ROCEDURAL H ISTORY Brian Hawes was a registered investment advisor and owner and president of two investment advisory services, Financial Management Advisory Services (“FMAS”) and Financial Management Services, Inc. (“FMS”). In 1997, he became an authorized representative of Fidelity Investments Investment Advisors Group (“Fidelity”). From 1988 through 2003, Hawes used his position as an investment advisor to defraud his clients of monies that they had entrusted to him. He would agree to purchase annuities on behalf of his clients, but instead would keep the money for personal use or buy the annuities as instructed but later liquidate them for his own use. To conceal his theft, he created false account statements, indicating higher account balances, and submitted them to his clients. In 1998, Hawes persuaded a number of his clients to move their assets into investment products offered by Fidelity. For these investment product accounts, Fidelity would mail account statements at regular intervals directly to a client’s residence or address of choice. Until 2002, Hawes would also issue statements to his clients through his investment advisory service, FMAS, that accurately reflected the Fidelity investments. As a financial advisor, he was authorized to use his clients’ social security numbers and other identifying information to access their Fidelity accounts and did so in the regular course of business. 3 Beginning in 2002, however, Hawes used his access to client accounts without his clients’ permission and changed the addresses to which his clients’ Fidelity account statements were mailed. In some instances, he mailed change of address forms to Fidelity Investments, indicating that future statements should be sent to his office address. In others, he accessed his clients’ online accounts and changed the addresses. Hawes then notified his clients that Fidelity would no longer be issuing paper statements and that FMAS would continue to issue paper account statements reflecting their balances with Fidelity. Hawes then began to divert and transfer client funds into an account for his personal use. To avoid discovery of his theft, he would transfer funds from one client account to another. Through FMAS, he would then issue and provide statements to his clients that did not report the transfers and falsely overstated the value of the Fidelity accounts. Having ensured that his clients would not receive accurate account statements from Fidelity, Hawes was able to hide the fraud from his clients. In 2003, after his father’s death, Hawes’ mother discovered that he had been stealing money that his parents had entrusted with him for investment and submitting statements to them that falsely reflected that annuities had been purchased and were earning money. She threatened to report his crime unless the money was repaid, and Hawes agreed to repay a total of $780,000 pursuant to a payment schedule. In order to make the first payment to his mother, Hawes stole $125,000 from other clients’ accounts. On October 31, 2003, Hawes’ fraud was uncovered and 4 his accounts frozen. On April 9, 2004, a two-count information was filed, alleging two counts of mail fraud in violation of 18 U.S.C. § 1341. On that same date, Hawes pleaded guilty to both counts. On August 4, 2004, he was sentenced to a term of 98 months’ imprisonment, followed by a three-year period of supervised release, and ordered to pay restitution in the amount of $2,601,961.60. In the wake of the Supreme Court’s decision in United States v. Booker, 543 U.S. 220 (2005), Hawes filed a motion for summary remand on May 3, 2004, and, on August 9, 2005, this Court affirmed Hawes’ conviction and remanded for resentencing. The trial court held sentencing hearings on January 30, March 29, and June 29, 2006. App. 78-417. During the course of the hearings, the District Court heard from Angelica Banta, the probation officer who prepared Hawes’ PSR.1 She testified that, in her opinion, an identity theft enhancement under U.S.S.G. § 2B1.1(b)(9)(C)(i) was proper because Hawes used the social security numbers of his clients to change their addresses so that he would receive the statements indicating the real balances of their investment accounts. Obtaining a change of address was regarded by Ms. Banta as obtaining another form of identification–his clients’ mail–and, therefore, subject to the identity theft enhancement. Counsel for the government argued that the name and address was a means 1 The relevant part of the sentencing hearing transcript refers to her as “Angelica Canvann.” However, it appears that this was a transcription error, Appellant’s Br. 13 n.6, and both the PSR and other portions of the sentencing hearing transcripts identify the probation officer as Angelica Banta. 5 of identification and changing an address was producing another means of identification. Hawes testified that his clients willingly provided him with certain information, including name, address, social security number, date of birth, phone number, and were assigned a unique identification number by the financial institution. He further testified that he had discretionary control over the accounts and prior authorization to engage in any transaction he deemed necessary. Moreover, after Hawes changed a client’s address online, by fax, or by email, Fidelity would send a confirmation of the change of address to the client’s former address. At the sentencing hearings, the government presented testimony as to the appropriateness of a vulnerable victim sentence enhancement under U.S.S.G. § 3A1.1(b). Clients defrauded by Hawes were elderly, ill, and unsophisticated. App. 399, 403. In particular, testimony showed that Hawes diverted $87,500 from an account belonging to Dorothy McKinney who, as he was aware, was in a nursing home and suffered from Alzheimer’s disease. He did so in order to repay his mother for the funds he had stolen and to prevent her from reporting him to the authorities. The District Court ruled that by changing the addresses of his clients, Hawes did illegally use a means of identification “to produce or alter duplicate means of identification” and applied a two-level enhancement under U.S.S.G. § 2B1.1(b)(9)(C)(i). The District Court also applied a vulnerable victim enhancement under U.S.S.G. § 3A1.1(b) upon finding that some of the victims were persons with whom Hawes had a close relationship and others were retired, elderly and suffering 6 from Alzheimer’s. The calculated Guideline Range was 70 to 87 months’ imprisonment. Hawes was ultimately sentenced to 78 months’ imprisonment, followed by a three-year period of supervised release, and ordered to pay $2,276,565.31 in restitution to his victims. Hawes timely appealed his sentence. II. D ISCUSSION Hawes raises a number of objections to his sentence: (1) that the District Court erroneously applied a two-level “identity theft” enhancement to his Base Offense Level under U.S.S.G. § 2B1.1(b)(9)(C)(i); (2) that the District Court erroneously applied a two-level “vulnerable victim” enhancement to his Base Offense Level under U.S.S.G. § 3A1.1(b)(1); (3) that his sentence is unreasonable; and (4) that the District Court did not consider the factors set forth in 18 U.S.C. § 3663 in determining the amount of restitution. We will consider each of these arguments in turn. We review the District Court’s application of the Guidelines to the facts for abuse of discretion. United States v. Cooper, 437 F.3d 324, 327-28 (3d Cir. 2006). To the extent that Hawes argues that the District Court made a legal error in its interpretation of the Guidelines, we conduct plenary review. See United States v. Newsome, 439 F.3d 181, 184 (3d Cir. 2006); United States v. Moorer, 383 F.3d 164, 167 (3d Cir. 2004). As to contentions that Hawes did not preserve in the District Court, we use the 7 more exacting plain error standard. See United States v. Merlino, 349 F.3d 144, 161 (3d Cir. 2003). A. The Identity Theft Enhancement Hawes contends that his conduct in concealing his fraud does not qualify for a two-level enhancement under U.S.S.G. § 2B1.1(b)(9)(C)(i). To determine whether the District Court erred in interpreting the identity theft enhancement to include Hawes’ changing of his clients’ addresses, we begin by looking to the language of the Guideline and the statutory language referenced therein. Under the Guidelines, a two-level enhancement to a defendant’s Base Offense Level is appropriate where the offense involved “the unauthorized transfer or use of any means of identification unlawfully to produce or obtain any other means of identification.” U.S.S.G. § 2B1.1(b)(9)(C)(i).2 The Guideline refers to 18 U.S.C. § 1028(d)(4) (now codified at 18 U.S.C. § 1028(d)(7)), which provides that: the term “means of identification” means any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual, including any-- 2 This citation is to the 2002 edition of the Federal Sentencing Guidelines Manual, which was used by the District Court and probation office in sentencing Hawes; this section is now at U.S.S.G. § 2B1.1(b)(10)(C)(i). 8 (A) name, social security number, date of birth, official State or government issued driver’s license or identification number, alien registration number, government passport number, employer or taxpayer identification number; (B) unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation; (C) unique electronic identification number, address, or routing code; or (D) telecommunication identifying information or access device (as defined in section 1029(e))3 Hawes contends that “the act of changing a person’s address is not engaging in the ‘unauthorized transfer or use of any means of identification unlawfully to alter or duplicate or assemble [an] alternate hybrid means of identification’ or using a means of identification to ‘produce an altered duplicate means of 3 The Commentary to U.S.S.G. § 2B1.1 provides that: “‘Means of identification’ has the meaning given that term in 18 U.S.C. 1028(d)(4), except that such means of identification shall be of an actual (i.e., not fictitious) individual, other than the defendant or person for whose conduct the defendant is accountable” under U.S.S.G. § 1B1.3. This is not at issue in this case as the means of identification used were of actual individuals, Hawes’ clients. 9 identification.’” Appellant’s Br. 21 (quoting United States v. Newsome, 439 F.3d 181, 185-86 (3d Cir. 2006)). We begin by asking whether the statute’s plain terms address the precise question of whether changing an address constitutes producing or obtaining “any other means of identification.” As the Court of Appeals for the Ninth Circuit has observed, “the enhancement is rather awkwardly written.” United States v. Melendrez, 389 F.3d 829, 832 (9th Cir. 2004). “Means of identification” is defined both in general terms as “any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual” and in specific terms as an extensive list of particular means of identification. 18 U.S.C. § 1028(d)(7). The text, however, is ambiguous as to whether changing an address falls within its ambit. What is clear is that the statute does not include mail or an address within the list of means of identification; nor are the examples easily analogized to a piece of mail or an address. Faced with ambiguities in the identity theft enhancement, courts have looked to the application notes, which set forth examples of the types of conduct to which the identification enhancement applies or does not apply.4 Accordingly, we turn 4 See, e.g., United States v. Lyle, 06-16574, 2007 WL 2344873, *2-3 (11th Cir. Aug. 17, 2007) (defendant’s “conduct is not meaningfully distinguishable from that described in the Application Notes”); United States v. Auguste, 392 F.3d 1266, 1268 (11th Cir. 2004) (looking first to application notes and then to the plain language of the guideline); United States v. 10 to them for guidance. The application notes provide: (i) In General.--Subsection (b)(10)(C)(i) applies in a case in which a means of identification of an individual other than the defendant (or a person for whose conduct the defendant is accountable under 1.3 (Relevant Conduct)) is used without that individual’s authorization unlawfully to produce or obtain another means of identification. (ii) Examples.--Examples of conduct to which subsection (b)(10)(C)(i) applies are as follows: (I) A defendant obtains an individual’s name and social security number from a source (e.g., from a piece of mail taken from the individual’s mailbox) and obtains a bank loan in that individual’s name. In this example, the account number of the bank loan is the other means of identification that has been obtained unlawfully. (II) A defendant obtains an individual’s name and address from a source (e.g., from a driver’s license in a stolen wallet) and applies for, obtains, and subsequently uses a credit card in that individual’s name. In this example, the credit Melendrez, 389 F.3d 829, 835 (9th Cir. 2004) (looking to application notes and reasoning that “[n]either set of examples perfectly matches Melendrez’s crime, but we conclude that his actions are more like those in the first set of examples.”). 11 card is the other means of identification that has been obtained unlawfully. (iii) Nonapplicability of Subsection (b)(10)(C)(i).--Examples of conduct to which subsection (b)(10)(C)(i) does not apply are as follows: (I) A defendant uses a credit card from a stolen wallet only to make a purchase. In such a case, the defendant has not used the stolen credit card to obtain another means of identification. (II) A defendant forges another individual’s signature to cash a stolen check. Forging another individual’s signature is not producing another means of identification. Application Note 9(C) to U.S.S.G. § 2B1.1. Most, if not all, cases involving the identity theft enhancement have factual scenarios that are explicitly laid out in the application notes. See United States v. Townsend, 67 Fed. Appx. 986, 987 (8th Cir. 2003) (holding that defendant’s use of another’s information to apply for a credit card was set forth in comment 7(C)(ii)); United States v. Geeslin, No. 05-60616, 2007 WL 756457 (5th Cir. Mar. 9, 2007) (observing that “[i]n the typical § 2B1.1(b)(10)(C)(i) case, a court will impose the enhancement because a defendant used false identification to secure a bank loan”); United States v. Edelmann, 192 Fed. Appx. 578, 582 (8th Cir. 2006) (holding that “the application notes to the guidelines clearly encompass a situation like 12 Edelmann’s, where another individual’s name and Social Security number are unlawfully used to obtain credit.... [T]he use of a name other than the victim’s on an unlawfully obtained account does not mitigate the harm caused by the use of ‘someone’s identifying information to establish new credit.’”) (citations omitted); United States v. Cage, 134 Fed. Appx. 833, 837 (6th Cir. 2005) (“Cage used her position to gather names, dates of birth, and social security numbers to obtain credit cards, loans, and bank accounts. These facts...mirror the examples listed in the application notes.”). Similarly, in cases where the examples in the application notes are not directly on point, the facts are much more closely analogous to the examples than the facts we have here. See, e.g., United States v. Samet, 200 Fed. Appx. 15 (2d Cir. 2006). Neither we nor any other court has held that changing an address constitutes obtaining or producing a new means of identification. Indeed, in United States v. Auguste, where defendant had added herself to another person’s credit card account as a secondary cardholder and had changed the account’s address in order to receive the secondary card, the enhancement applied not because she had changed the address but because she had taken an account number and added her own name to it, thereby creating a new means of identification. 392 F.3d 1266, 1267-68 (11th Cir. 2004). There is a paucity of case law in this Circuit or others, largely because this sentencing enhancement was only enacted in 2000. United States v. Cisse, 103 Fed. Appx. 27 (7th Cir. 2004) (noting that “Section 2B1.1(b)(C)(i) was added to the Guidelines in November 2000, and we have found only one 13 published case [United States v. Williams, 355 F.3d 893 (6th Cir. 2003)] discussing its application”). We have issued only one decision interpreting this Guideline, United States v. Newsome, 439 F.3d 181 (3d Cir. 2006), which both parties cite and upon which the District Court relied to conclude that the enhancement applied. In Newsome, defendants obtained personal contact and account information of Fleet Bank customers and used it to produce drivers’ licenses with photographs of defendants and the victims’ information, which they then used to withdraw funds from the accounts. Id. at 183. The district court held that “Newsome had illegally used one means of identification to produce another,” and we agreed that the enhancement was properly allowed. Id. at 184. The fraud victim’s information–name, birth date, driver’s license number, and employee identification number–was a means of identification under 18 U.S.C. § 1028(d)(7). Id. The question was whether the information on the new drivers’ licenses constituted “any other means of identification.” Newsome argued that what he did was use an existing means of identification to obtain cash, not to obtain a new means of identification, like a social security number or a loan account number. We disagreed, reasoning that U.S.S.G. § 2B1.1(b)(9)(C)(i) can be read as requiring the enhancement for “the unauthorized transfer or use of any means of identification unlawfully to alter or duplicate or assemble any alternate hybrid means of identification.” Id. at 185. Newsome, however, is not very helpful to our analysis, both because the means of identification produced, a driver’s license, is specifically mentioned in the commentary to the 14 Guideline and because it involved the sort of “breeding” of means of identification that is targeted by the enhancement. Id. at 186; see Commentary to U.S.S.G. § 2B1.1, Background (noting that the enhancement “focuses principally on an aggravated form of identity theft known as ‘affirmative identity theft’ or ‘breeding’). Neither one’s mail nor address are specifically mentioned in the Guidelines nor is Hawes’ conduct easily categorized as breeding means of identification. We believe that, in light of the language of the Guideline and the examples in the application notes, Hawes’ conduct does not qualify for the identity theft enhancement. An address or piece of mail does not seem to fit the Guideline’s definition of “means of identification.” The government suggests that the general definition of “means of identification” includes a name plus any other piece of information and thus includes a name plus an address. To take the government’s argument to its logical conclusion, a name plus shoe size or hair color could constitute a means of identification. We believe that the statute, as the language suggests, requires that the means of identification be specific or unique. The examples enumerated in 18 U.S.C. § 1028(d)(7) are of unique identifying information, primarily numbers. As the Court of Appeals for the Second Circuit has reasoned, “[b]oth the statute and the Note focus on the generation of a unique identifying number different than any number used to obtain it, not on whether a document would be proffered as a form of identification.” United States v. Samet, 200 Fed. Appx. 15, 23 (2d Cir. 2006). Similarly, when addressing the argument that bank accounts are not means of identification, the Court of 15 Appeals for the Eighth Circuit found it determinative that “a bank account number is a unique identification number.” United States v. Scott, 448 F.3d 1040 (8th Cir. 2006). A social security number, account number, or any of the other examples provided within the statute identify one particular individual. At sentencing, the government also argued that the name and address was a means of identification because it was “the way that Fidelity identified clients in this case.” App. 381. From a common sense standpoint, we find this argument difficult to accept. Financial institutions identify their clients, not by name or address (which can be non-unique identifiers), but rather by account number. As Hawes testified, Fidelity was given certain information about clients to set up an account and “[t]he way Fidelity identified a client after that was by the account number.” App. 384. The Application Note examples are similarly confined to a common sense meaning of identity theft through breeding a new means of identification. The examples of when the enhancement applies involve the production of a specific form of identifying information, which is then used for improper purposes, i.e., taking another’s identity to use as one’s own. In the first example, the defendant uses the victim’s name and social security number to obtain a bank loan, the “means of identification” bred. In the second example, the defendant uses the victim’s name and address to apply for and obtain a credit card, another unique “means of identification.” By contrast, in the examples of when the enhancement does not apply, the defendant has not generated any additional identifying information or engaged in the “breeding” targeted by the 16 enhancement. Changing an address is not easily analogous to the examples in the application notes. In comparison to the facts in other cases, Hawes’ conduct seems closer to the Application Note’s examples of conduct that does not constitute identity theft, such as stealing an existing credit card or cashing a check from an existing bank account. Discussing these examples in the application notes, the Court of Appeals for the Sixth Circuit observed that “while the use of someone’s credit card to make a purchase is a punishable offense, the nature of the harm is different from that which results from using someone’s identifying information to establish new credit.” United States v. Williams, 355 F.3d 893, 900 (6th Cir. 2003). Likewise, although stealing from client accounts he was authorized to manage is deserving of punishment, the harm caused by Hawes was not the breeding of new identification information or running up new credit, but rather the theft of funds entrusted to him. The change of address was to thwart the discovery of, not enable, the illicit activity. As the foregoing discussion makes clear, the Guideline, referenced statute, and application notes do not lead to the conclusion that the identity theft enhancement was meant to apply to a change of address. This conclusion is bolstered by the legislative history of the Identity Theft and Assumption Deterrence Act of 1998, Pub. 17 L. No. 105-318, 112 Stat. 3007 (1998) (“ITADA”).5 The ITADA was enacted to make “fraud in connection with identification information [not just identification documents] a crime.” S. Rep. No. 105-274, at 5 (1998) (“Today, criminals do not necessarily need a document to assume an identity; often they just need the information itself to facilitate . . . crimes . . . . [T]his statute can keep pace with criminals’ technological advances.”). The ITADA provided that although “there exists no clear definition of identity fraud,” it typically “involves ‘stealing’ another person’s personal identifying information . . . to fraudulently establish credit, run up debt, or to take over existing financial accounts.” Id. at 7. In enacting the ITADA, the Sentencing Commission explained that subsection (b)(10)(C): focuses principally on an aggravated form of identity theft known as “affirmative identity theft” or “breeding”, in which a defendant uses another individual’s name, social security number, or some other form of identification (the “means of identification”) to “breed” (i.e., produce or obtain) new or additional forms of 5 Because the statutory meaning is unclear, the legislative history can aid us in discerning the Guideline’s purpose and interpreting it appropriately. See Patterson v. Shumate, 504 U.S. 753, 761 (1992) (stating that resort to statutory history is appropriate where language of statute is ambiguous or confusing); United States v. Pollen, 978 F.2d 78, 85 (3d Cir. 1992). 18 identification. Commentary to U.S.S.G. § 2B1.1, Background. As we said in Newsome, “Congress wanted to provide increased punishment for identity theft that involved creation of means of counterfeit identification rather than the plain vanilla type of identity theft that occurs when person A steals and uses person B’s credit card. ... This multiplication of means of identification is the type of identity theft that Congress believed deserved greater punishment.” Newsome, 439 F.3d at 186. As other courts of appeals have observed, “[t]he ‘nature of the harm’ meant to be targeted by this enhancement is, in part, ‘that which results from using someone’s identifying information to establish new credit.’” United States v. Oates, 427 F.3d 1086, 1090 (8th Cir. 2005) (quoting United States v. Williams, 355 F.3d 893, 900 (6th Cir. 2003)). Given the purpose of the enhancement, we will not read the Guideline to apply to Hawes’ conduct in changing the addresses on his clients’ account statements lest we produce absurd or unintended results “demonstrably at odds with the intentions of [the statute’s] drafters.” Griffin v. Oceanic Contractors, Inc., 458 U.S. 564, 571 (1982). Here, Hawes misused his clients’ accounts and abused their trust. He did not, however, establish new credit or “breed” new forms of identification, as contemplated by Congress and the Sentencing Commission in enacting this enhancement. Hawes’ conduct does not qualify for the two-level enhancement under U.S.S.G. § 2B1.1(b)(9)(C)(i). We therefore find that the District Court erred in imposing the enhancement. 19 B. Harmless Error Analysis and Guideline Calculation The government urges us to hold that the erroneous application of the identity theft enhancement to the calculation of Hawes’ Guidelines Range was harmless. Our recent decision in United States v. Langford, 516 F.3d 205 (3d Cir. 2008), controls our analysis of this issue.6 For us to uphold Hawes’ sentence, “it must be clear that the error did not affect the district court’s selection of the sentence imposed.” Id. at 215. As the party defending the sentence imposed, the government bears the burden of “persuad[ing] the court of appeals that the district court would have imposed the same sentence absent the erroneous factor.” Williams v. United States, 503 U.S. 193, 203 (1992). In the present case, based on the identity theft enhancement, the District Court calculated the total offense level to be 27, instead of 25, which resulted in a Guideline Range of 70 to 87 months’ imprisonment, rather than 57 to 71 months. The Court acknowledged that the advisory Guideline range of 70 to 87 months was the starting point for any sentence she would impose. The judge indicated her belief that “a 6 Although the error at issue in Langford concerned a miscalculation of the criminal history level rather than the offense level, there is no reason to treat one type of miscalculation of the Guidelines differently from another. Regardless of the nature of the error, it may affect the Guideline range chosen and the sentence ultimately imposed. 20 sentence within the advisory guideline range does appropriately concern and address all of the concerns of sentencing” and stated her intention to “sentence within that range.” App. 411. On the basis of its evaluation of the § 3553(a) factors, the Court then imposed a sentence of 76 months in the middle to low end of the advisory Guidelines range it had calculated.7 The government has not met its burden of showing that the error was harmless. It is by no means “unambiguous” that Hawes’ sentence would be the same regardless of whether the identity theft enhancement applied. See Langford, 516 F.3d at 217. It is clear from the record that the sentencing court intended to and did in fact select Hawes’ sentence from the calculated range. Hawes’ sentence was in the mid- to low- point of the calculated range. Because the enhancement was erroneously applied, the Court imposed a sentence outside the proper Guideline range of 57 to 71 months. In order to impose a 76-month sentence, the Court would have had to depart upward from the Guidelines, reasoning through the § 3553(a) factors and explaining why the defendant merited a greater term 7 In Langford, we noted the possibility that, based on a miscalculation, a District Court might compare a defendant to others who actually have higher offense levels. That possibility became a reality here, as the District Court indicated that the sentence she imposed avoided “impos[ing] a sentence that would result in disparities among other people who have engaged in like conduct.” However, given the proper range, the sentence she imposed resulted in the disparity she was seeking to avoid. 21 of imprisonment than that contemplated by the Guidelines. Here, by contrast, the Court made clear that a within-Guidelines range was appropriate for Hawes based on its § 3553(a) analysis. The miscalculation of the Guideline range by the District Court also affected the arguments that the parties made at sentencing. After the Court decided that the enhancement would apply and the range would be 70 to 87 months, defense counsel argued for a sentence at the bottom of the Guidelines, that is, a 70-month sentence. Under the correct range, counsel would have urged the Court to impose a 57-month sentence instead. Because the error was not harmless, we will remand to the District Court for resentencing in light of the foregoing. C. Hawes’ remaining objections to his sentence Because we will remand for resentencing, we must address the other errors that Hawes alleges were committed by the District Court in calculating his Guideline range. 1. Vulnerable victim enhancement Hawes challenges the District Court’s decision to impose a two-level enhancement under U.S.S.G. § 3A1.1(b)(1), which provides for such enhancement “[i]f the defendant knew or should have known that a victim of the offense was a vulnerable victim....” A vulnerable victim “means a person (A) who is a victim of the offense of conviction and any conduct for which 22 the defendant is accountable under § 1B1.3 (Relevant Conduct); and (B) who is unusually vulnerable due to age, physical or mental condition, or who is otherwise particularly susceptible to the criminal conduct.” U.S.S.G. § 3A1.1(b)(1), Application Note 2. Hawes argues that the District Court failed to comply with our decision in United States v. Iannone, 184 F.3d 214 (3d Cir. 1999). In Iannone, we set forth a three-factor test to determine whether conduct merits the application of the vulnerable victim enhancement: (1) the victim was particularly susceptible or vulnerable to the criminal conduct; (2) the defendant knew or should have known of this susceptibility or vulnerability; and (3) this vulnerability or susceptibility facilitated the defendant’s crime in some manner; that is, there was “a nexus between the victim’s vulnerability and the crime’s ultimate success.” 184 F.3d at 220 (quoting United States v. Monostra, 125 F.3d 183, 190 (3d Cir. 1997). In particular, Hawes argues that the District Court failed to find that there was “a nexus between the victim’s vulnerability” and the success of his fraudulent scheme. The District Court did not cite Iannone in finding that the vulnerable victim enhancement applied. Its failure to use the case name during sentencing in open court does not, however, indicate that the application of the enhancement was error. Indeed, the record supports the District Court’s finding 23 that Hawes’ offense qualified for this enhancement. First, the victims of Hawes’ fraud met the standard for vulnerability. The District Court referred to the victims’ impact statements and “the close personal relationship the Defendant has had with some of his clients, not only his parents, who could not be more susceptible, but also to other clients who he personally knew or who were referred to him by friends and relatives.” App. 402. It also found that “many of these individuals were retired, elderly, some suffering from diseases.” App. 403. Second, Hawes knew of his victims’ vulnerability. Many of his clients were known to him personally or referred to him by friends or relatives. As regards one of his victims, Dorothy McKinney, Hawes knew that she was in a nursing home suffering from Alzheimer’s and was legally blind. Third, there was a nexus between the vulnerability of the victims and the continued success of his fraud. The vulnerable status of Ms. McKinney in particular made it easier to continue the fraud. Specifically, when Hawes’ mother discovered that Hawes had stolen hundreds of thousands of dollars and demanded that he repay $125,000 immediately, Hawes procured the bulk of this sum from Ms. McKinney’s account, knowing that her particular vulnerabilities made it more likely the theft would go undetected. Taking this money to pay his mother was meant to prevent his family from reporting the theft and allow it to continue. We, therefore, find that the District Court did not err in enhancing Hawes’ offense level under § 3A1.1(b) and affirm its application of the vulnerable victim enhancement. 2. Failure to consider 18 U.S.C. § 3663 in entering the 24 restitution order Hawes contends that the District Court failed to consider “the financial resources of the defendant, the financial needs and earning ability of the defendant, and the defendant’s dependents, and such other factors as the court deems appropriate” as required by 18 U.S.C. § 3663(a)(1)(B)(i)(II). The parties agree that Hawes failed to raise this objection at sentencing. We, therefore, review the order of restitution for plain error. Fed. R. Crim. P. 52(b); United States v. Lloyd, 469 F.3d 319, 320 (3d Cir. 2006). We find no plain error on the record here. Hawes entered into a plea agreement with the government pursuant to which the parties agreed to the amount of loss and restitution. The Second Addendum to the Presentence Report included a spreadsheet reflecting the agreed-to amounts and was adopted by the District Court when it issued the restitution order. During the sentencing hearing, the Court was informed that, with the exception of two victims, the parties had “agreed to what the restitution is and ... agreed to what the amount of loss attributable to each victim is.” App. 370. Hawes’ current or future ability to pay restitution was never before the District Court. Although the Court was not required to accept the parties’ agreement as to restitution, the Court committed no plain error in accepting it. We will therefore affirm the order of restitution. 3. Reasonableness of Hawes’ sentence Hawes also argues that his sentence was unreasonable 25 because the District Court gave presumptive weight to the guidelines and imposed a sentence greater than necessary to meet the purposes of sentencing. Because we find that the miscalculation of the Guideline range was not harmless error, we cannot review the sentence for reasonableness. See Langford, 516 F.3d at 214-15, 220. We are confident that the District Court will not give presumptive weight to the Guidelines on remand as the Supreme Court has recently made clear that this is error. Gall v. United States, 128 S. Ct. 586, 597 (2007). III. C ONCLUSION For the foregoing reasons, we will vacate Hawes’ sentence and remand to the District Court for resentencing. Weis, J., Circuit Judge, Concurring. I agree that the identification enhancement should not have been factored into the Guidelines calculation. The Guidelines are advisory, not mandatory, and an error in the Guidelines computation may be neutralized by the overarching scrutiny required by the sentencing court’s application of 18 U.S.C. § 3553(a). The sentence here is substantively reasonable. The 26 District Court set out in detail the factors that affected the sentence. In her remarks from the bench at the hearing, the judge said, in part, “The law requires that I impose a sentence that is sufficient to but not greater than necessary to fulfill the purpose of sentencing. . . . First of all, the nature and seriousness of the offense. Quite frankly, the offense is awful. It’s awful. To ruin peoples’ lives, to be held in trust and to betray. These are serious offenses. . . . [T]his is a very serious offense, and just punishment is required under the law. Because you have done such a terrible thing to so many people you have to be deterred and others have to be deterred who might consider engaging in like conduct. There is a need to be protected from any additional crimes that you might commit and to do that it is my belief that you should be provided with correctional treatment that can most effectively help you to understand what it is that you have done and what the repercussions and consequences are. The starting point for any sentence . . . is the advisory guideline range which I have indicated to you is a level 27, category 1, 70-87 months.” 27 It is obvious that the district judge intended to impose a substantial sentence. She then explained, “I believe that a sentence within the advisory guideline range does appropriately concern and address all of the concerns of sentencing that I have mentioned this afternoon.” In my view, our ruling that the Guidelines calculation was erroneous has created substantial uncertainty over the District Court’s intent in sentencing defendant. If the judge believed, after performing the overall review, that under § 3553(a) a sentence of 76 months was the appropriate punishment regardless of whether that number came within the Guidelines range, the sentence should be affirmed. On the other hand, if the judge believed that the appropriate sentence must be within the correct Guidelines range, whatever that may be, and did not mean to deviate from it, precedents of this Court would seem to require a remand. The District Court may have believed that the appropriate sentence under § 3553(a) was a term of 76-months imprisonment and, coincidentally, concluded that the figure was within the erroneous Guidelines computation. The record is ambiguous on this point. Because they can override the advisory Guidelines, district judges should carefully articulate their rationale in arriving at a sentence under the § 3553(a) calculus in order to avoid unnecessary resentencing. 28 Because on the record before us I am unable to determine the sentencing judge’s intention, I join in the order to remand.8 8 I disassociate myself from the citations to non precedential opinions. Our Internal Operating Procedures (I.O.P.) 5.7 provides, “[t]he court by tradition does not cite to its not precedential opinions as authority. Such opinions are not regarded as precedents that bind the court because they do not circulate to the full court before filing.” That same policy applies to panel decisions of other courts which have not been recognized as authoritative by the authoring court. 29