Case: 14-13288 Date Filed: 03/28/2016 Page: 1 of 21
[PUBLISH]
IN THE UNITED STATES COURT OF APPEALS
FOR THE ELEVENTH CIRCUIT
________________________
No. 14-13288
________________________
D.C. Docket No. 0:14-cr-60009-JIC-1
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
versus
XAVIER TAYLOR,
Defendant-Appellant.
________________________
Appeal from the United States District Court
for the Southern District of Florida
________________________
(March 28, 2016)
Before WILSON, JULIE CARNES, and EBEL, ∗ Circuit Judges.
∗
Honorable David M. Ebel, United States Circuit Judge for the Tenth Circuit, sitting by
designation.
Case: 14-13288 Date Filed: 03/28/2016 Page: 2 of 21
WILSON, Circuit Judge:
Defendant-appellant Xavier Taylor used stolen identity information to add
himself as an authorized user to other individuals’ pre-existing credit card accounts
and open new accounts in the names of stolen identities, causing banks to create
new credit cards that included him as an authorized user. For this conduct, he was
charged with and pleaded guilty to one count of trafficking in unauthorized access
devices,1 in violation of 18 U.S.C. § 1029(a)(2), and one count of aggravated
identity theft, in violation of 18 U.S.C. § 1028A(a)(1). At sentencing, the district
court applied a two-level production enhancement pursuant to § 2B1.1 of the
United States Sentencing Guidelines (the Guidelines) to the § 1029(a) conviction
and sentenced Taylor to a total of sixty-one months’ imprisonment. This appeal
followed, in which Taylor argues that interrelated provisions of the Guidelines
preclude application of the production enhancement to his sentence.
Specifically, Taylor contends that he does not qualify for the § 2B1.1
production enhancement to his § 1029(a) conviction because a different provision
of the Guidelines—§ 2B1.6—prohibits this enhancement for defendants who, like
him, were also convicted under § 1028A. Taylor also avers that, even if the
enhancement can apply in a § 1028A case, he did not “produce” unauthorized
1
An unauthorized access device is “any access device that is . . . obtained with intent to
defraud.” 18 U.S.C. § 1029(e)(3); U.S.S.G. § 2B1.1 cmt. n.10(A). Unauthorized credit cards are
unauthorized access devices. See United States v. Klopf, 423 F.3d 1228, 1239–40 (11th Cir.
2005).
2
Case: 14-13288 Date Filed: 03/28/2016 Page: 3 of 21
access devices given that an innocent third party (the banks, not Taylor or a
criminal coconspirator) created the credit cards. We have not yet addressed these
issues in a published opinion.
After thorough consideration, we conclude that § 2B1.6 of the Guidelines
does not prevent application of a § 2B1.1 production enhancement to a sentence
imposed in conjunction with a § 1028A conviction when the underlying conduct at
issue involves “production,” rather than conduct limited to “transfer, possession, or
use.” We also hold that willfully causing an innocent third party to produce a
fraudulent credit card qualifies as “production” under the Guidelines.
Accordingly, we affirm the district court.
I. Background
Using stolen identities, Taylor contacted banks, gained access to credit card
accounts, and added himself as an authorized user of the accounts. The banks
issued new credit cards associated with those accounts. All of the credit cards the
banks issued exhibited the account numbers of the people whose identities Taylor
had stolen, and some of the credit cards were even issued in Taylor’s name. Upon
receiving the credit cards, Taylor activated them by telephone and began making
unauthorized purchases totaling several thousand dollars.
Agents from the United States Secret Service eventually obtained and
executed a search warrant for Taylor’s home. The search revealed approximately
3
Case: 14-13288 Date Filed: 03/28/2016 Page: 4 of 21
thirty-three credit cards linked to the accounts of Taylor’s victims. Taylor was
arrested and charged with five counts of access device fraud. Subsequently, Taylor
entered into a written plea agreement with the government. In exchange for
favorable sentencing considerations, Taylor agreed to plead guilty to one count of
trafficking in unauthorized access devices and one count of aggravated identity
theft in satisfaction of all five counts.
At sentencing, Taylor received several enhancements to his base offense
level, one of which was a two-level enhancement for an offense involving the
production of an unauthorized access device. See U.S.S.G. § 2B1.1(b)(11)(B)(i).
Taylor objected to the imposition of this enhancement. Following a sentencing
hearing, the district court overruled Taylor’s objection and, after considering the
advisory sentencing range of thirty-seven to forty-six months, imposed a thirty-
seven month sentence for the § 1029(a) conviction, followed by a consecutive
mandatory twenty-four month sentence for the § 1028A(a)(1) conviction, for a
total sixty-one month term of imprisonment.
II. Standard of Review
“We review a district court’s legal conclusions regarding the Sentencing
Guidelines de novo, and its factual findings for clear error.” United States v. Cruz,
713 F.3d 600, 605 (11th Cir. 2013). Questions of statutory or Guidelines
4
Case: 14-13288 Date Filed: 03/28/2016 Page: 5 of 21
interpretation receive de novo review. See United States v. Krawczak, 331 F.3d
1302, 1305 (11th Cir. 2003).
III. Discussion
On appeal, Taylor contends that the district court erroneously applied the
two-level enhancement pursuant to § 2B1.1(b)(11)(B)(i) for production of an
unauthorized access device (the production enhancement). Our resolution of
Taylor’s appeal requires us to answer two legal questions. First, does a
defendant’s conviction for aggravated identity theft under 18 U.S.C. § 1028A
preclude application of a production enhancement to the defendant’s sentence,
irrespective of the conduct involved? Second, does causing an unauthorized access
device to be produced by an innocent third party constitute “production” under the
Guidelines? We find that the answer to the first question is no, while the answer to
the second question is yes. We address each legal issue in turn and then apply our
conclusions to Taylor’s conduct.
A. Application of a Production Enhancement Despite a Conviction Under
18 U.S.C. § 1028A
As a threshold matter, we must determine whether a district court may apply
a production enhancement under § 2B1.1(b)(11)(B)(i) of the Guidelines when, as
here, the defendant has been convicted under both 18 U.S.C. § 1029(a) and
§ 1028A. By way of background, the advisory sentencing range for a § 1029(a)
conviction is calculated pursuant to the Sentencing Guidelines. In contrast, the
5
Case: 14-13288 Date Filed: 03/28/2016 Page: 6 of 21
Guidelines are not a factor in determining the sentence for a conviction under §
1028A(a)(1) because conviction for this latter offense results in a mandatory,
consecutive two-year term of imprisonment. See § 1028A(b). Yet, a conviction
under § 1028A can nonetheless impact the calculation of the Guidelines for a
§ 1029(a) conviction because § 2B1.6 potentially precludes application of the
§ 2B1.1(b)(11) production enhancement for a § 1029(a) conviction when the
defendant has also been convicted of § 1028A.
In pertinent part, § 2B1.1(b)(11) of the Guidelines provides a two-level
sentencing enhancement if the offense involved:
(A) the possession or use of any (i) device-making
equipment, or (ii) authentication feature;
(B) the production or trafficking of any (i) unauthorized
access device or counterfeit access device, or (ii)
authentication feature. 2
However, the text of § 2B1.6 of the Guidelines limits the application of sentencing
enhancements to an offense in the context of 18 U.S.C. § 1028A convictions.
Section 2B1.6 provides: “If the defendant was convicted of violating 18 U.S.C. §
1028A, the guideline sentence is the term of imprisonment required by statute.”
The Application Notes to § 2B1.6 explain that that legal provision prohibits
enhancements of offense levels when the enhancement relates to the “transfer,
2
Opinions filed prior to 2011 refer to this section as § 2B1.1(b)(10); the section was
redesignated as § 2B1.1(b)(11) in 2011 without substantive change. See U.S.S.G. app. C,
amend. 749; Cruz, 713 F.3d at 602 n.1.
6
Case: 14-13288 Date Filed: 03/28/2016 Page: 7 of 21
possession, or use” of a means of identification.3 See U.S.S.G. § 2B1.6 cmt. n.2.
This limitation is particularly relevant to § 2B1.1 because “means of identification”
may include access devices.4 See 18 U.S.C. § 1028(d)(7)(C), (D).
Section 2B1.6 is designed to prevent a defendant from being doubly
penalized for the same conduct. Under § 1028A, a defendant receives a mandatory
consecutive two-year term of imprisonment if convicted of certain predicate crimes
(like fraud) and if, during the commission of those predicate crimes, the defendant
“knowingly transfers, possesses, or uses, without lawful authority, a means of
identification of another person.” See 18 U.S.C. § 1028A(a)(1). Accordingly, a
defendant convicted under § 1028A automatically receives an additional two-year
increase to his or her sentence for transferring, possessing, or using a means of
identification of another. Section 2B1.6 proscribes any enhancement of the offense
level for a separate conviction for the underlying offense based on those acts.
3
The pertinent commentary provides, in full:
Inapplicability of Chapter Two Enhancement.—If a sentence under
this guideline is imposed in conjunction with a sentence for an
underlying offense, do not apply any specific offense characteristic
for the transfer, possession, or use of a means of identification
when determining the sentence for the underlying offense. A
sentence under this guideline accounts for this factor for the
underlying offense of conviction, including any such enhancement
that would apply based on conduct for which the defendant is
accountable under 1B1.3 . . . .
U.S.S.G. § 2B1.6 cmt. n.2. (emphasis added).
4
For this reason, we use “access device” and “means of identification” interchangeably.
7
Case: 14-13288 Date Filed: 03/28/2016 Page: 8 of 21
In considering these provisions in a prior opinion, we held that § 2B1.6 does
not bar all sentencing enhancements for defendants convicted under § 1028A
because not all conduct under § 1028A involves merely transferring, possessing, or
using a means of identification of another. Cruz, 713 F.3d at 606–07; accord
United States v. Jenkins-Watts, 574 F.3d 950, 961–62 (8th Cir. 2009); United
States v. Sharapka, 526 F.3d 58, 62 (1st Cir. 2008). Section 2B1.6’s limitation on
sentencing enhancements exists solely as to the application of enhancements for
the same conduct already “enhanced” under § 1028A itself: transfer, possession, or
use of a means of identification of another. See Cruz, 713 F.3d at 606–07. Thus, if
the defendant’s underlying conduct is limited to transfer, possession, or use of a
means of identification of another, then the enhancement cannot apply; if the
conduct is different than or in addition to such transfer, possession, or use, then the
enhancement can apply.
We have directly applied this principle to subsection (A) of § 2B1.1(b)(11),
holding that use of device-making equipment is conduct different than the transfer,
possession, or use of a means of identification covered under § 1028A. See id. at
605–07. In contrast, when considering subsection (B) of § 2B1.1(b)(11), which is
relevant here, we have held that “trafficking” an unauthorized access device is a
form of conduct fully encompassed within transfer, possession, or use of a means
of identification. See United States v. Charles, 757 F.3d 1222, 1226–27 (11th Cir.
8
Case: 14-13288 Date Filed: 03/28/2016 Page: 9 of 21
2014). Specifically, we found that “trafficking” such a device covered the same
conduct as “transferring” the device. See id. at 1227. Therefore, per § 2B1.6, we
held that a § 2B1.1(b)(11)(B)(i) enhancement premised on trafficking could not be
applied. See id.; accord United States v. Doss, 741 F.3d 763, 767–68 (7th Cir.
2013). We also noted in a footnote that § 2B1.6 may not preclude an enhancement
based on the “production” of an unauthorized access device, but we “express[ed]
no opinion about ‘production’ and remand[ed] with directions that the district court
rule on the ‘production’ issue [in the first instance] and give reasons why.” See
Charles, 757 F.3d at 1227 & n.3.
Therefore, we have read the language in § 2B1.1(b)(11)(B) as providing two
separate bases for an enhanced sentence—(1) production or (2) trafficking—and
we have held that § 2B1.6 precludes enhancement in § 1028A cases for conduct
premised on § 2B1.1(b)(11)(B)’s trafficking prong.5 See id. at 1227. Today, with
the benefit of briefing and oral argument, we reach the issue of whether an
5
There is no binding precedent in this circuit pertaining to whether “production” is
conduct different than the conduct encompassed by § 1028A. While we have affirmed
§ 2B1.1(b)(11)(B) production enhancements in two published opinions where the defendants
were convicted under, inter alia, § 1028A, we did so without addressing the limiting language in
§ 2B1.6. See United States v. Baldwin, 774 F.3d 711, 728, 730 n.1 (11th Cir. 2014) (declining to
consider the § 2B1.6 argument because the defendant “failed to present th[e] argument to the
district court or raise it in his opening brief”), cert. denied, 135 S. Ct. 1882 (2015); United States
v. Barrington, 648 F.3d 1178, 1203 (11th Cir. 2011) (making no reference to § 2B1.6).
Additionally, the various unpublished opinions the parties cite have no precedential value.
Moore v. Barnhart, 405 F.3d 1208, 1211 n.3 (11th Cir. 2005) (per curiam) (citing 11th Cir. R.
36–2).
9
Case: 14-13288 Date Filed: 03/28/2016 Page: 10 of 21
enhancement for conduct premised on the production prong may apply in § 1028A
cases.
As indicated above, § 2B1.6 permits an offense-level enhancement when a
defendant’s criminal activity involved conduct that is separate from or in addition
to the simple transfer, possession, or use of the means of identification at issue.
See id.; cf. Cruz, 713 F.3d at 607. Based on our following analysis of the text,
structure, and purpose of the relevant Guidelines provisions, we conclude that the
production of an unauthorized access device/means of identification is separate and
distinguishable from the mere transfer, possession, or use of such device. Thus, we
hold that imposition of the two-level enhancement pursuant to § 2B1.1(b)(11)(B)(i)
is not prohibited in § 1028A cases, so long as the enhancement is premised on the
defendant’s “production” of an unauthorized access device and the party seeking
the enhancement sufficiently shows that the defendant engaged in such conduct.
See United States v. Askew, 193 F.3d 1181, 1183 (11th Cir. 1999) (“The
[g]overnment bears the burden of establishing by a preponderance of the evidence
the facts necessary to support a sentencing enhancement.”); see also United States
v. Salem, 587 F.3d 868, 870–71 (8th Cir. 2009) (per curiam) (requiring evidence of
manufacture or production—more than mere use—to support the production
enhancement).
10
Case: 14-13288 Date Filed: 03/28/2016 Page: 11 of 21
We begin our analysis with the text. The Guidelines define “production” as
“includ[ing] manufacture, design, alteration, authentication, duplication, or
assembly.” U.S.S.G. § 2B1.1 cmt. n.10(A). This definition plainly covers conduct
different from or in addition to mere “transfer, possession, or use.” When a
defendant manufactures, designs, alters, authenticates, duplicates, or assembles a
device, he is doing something to the device. In contrast, transfer, possession, and
use only require a defendant to do something with a device. For example, a
defendant who manufactures counterfeit checks engages in categorically different
conduct than a defendant who simply makes purchases with counterfeit checks,
because the first defendant takes action that affects the checks themselves (creating
them), whereas the second defendant simply uses the checks. Given this
distinction, the § 2B1.1 production enhancement is not limited by § 2B1.6 in the
context of § 1028A cases.
Our conclusion finds further support in the structure of the Guidelines
provisions at issue. We presume that the “inclusion or exclusion of language [in
the Guidelines] is intentional and purposeful,” United States v. Perez, 366 F.3d
1178, 1182 (11th Cir. 2004); Cruz, 713 F.3d at 607, and that “the Sentencing
Commission intended to apply separate guideline sections cumulatively, unless
specifically directed otherwise,” United States v. Matos-Rodriguez, 188 F.3d 1300,
1310 (11th Cir. 1999) (emphasis omitted). Here, we presume that the inclusion of
11
Case: 14-13288 Date Filed: 03/28/2016 Page: 12 of 21
the word “production” in § 2B1.1(b)(11)(B)(i) was intentional and that its
exclusion in Application Note 2 of § 2B1.6 was also intentional. It follows, then,
that the Sentencing Commission did not intend for the commentary to § 2B1.6 to
limit the application of the two-level enhancement in subsection (B) of
§ 2B1.1(b)(11) with regard to relevant conduct involving the production of an
unauthorized access device. And, because no language in § 2B1.6 “specifically
direct[s]” the disqualification of § 2B1.1(b)(11)(B)(i)’s two-level enhancement for
the production of unauthorized access devices when a defendant has been charged
under § 1028A, we may apply these separate Guidelines sections cumulatively.
See Matos-Rodriguez, 188 F.3d at 1310.
Finally, it makes sense that the Sentencing Commission would include a
sentencing enhancement for producing, rather than simply transferring, a
fraudulent access device: the conduct entailed in production may be more
problematic than mere transference. By producing unauthorized devices, a
defendant furthers the criminal scheme and creates more opportunities for the
prohibited conduct to continue. That specific conduct enhances the criminal act
more so than simply stealing a credit card and misusing it (or using an expired,
revoked, or canceled device): it causes the proliferation of unauthorized devices.
Moreover, such conduct may be harder to detect. For instance, if a credit card is
simply stolen, a victim may cancel the card when he or she realizes that card is
12
Case: 14-13288 Date Filed: 03/28/2016 Page: 13 of 21
missing. But if the defendant instead creates a new card and begins using it, the
victim may not notice the fraud until discovering the unauthorized charges on his
or her account. Nevertheless, under Taylor’s preferred reading of the Guidelines,
sentencing courts would not be permitted to differentiate between those who use or
transfer unauthorized devices and those who create the means for that subsequent
criminal activity. That is to say, a defendant who produced a fraudulent card
would be subject to the same sentence as another defendant who, for instance,
simply purchased the card from the first defendant. By including an enhancement
for production, the Sentencing Commission clearly did not intend that result.
Instead, a defendant who creates the means for not only himself, but also others, to
engage in criminal activity should not enjoy the same punishment as the individual
who simply uses an already-existing item to engage in criminal activity. 6
Accordingly, the plain language of the Guidelines, the structure of the
relevant Guidelines provisions, and the purposes underlying those provisions
support our conclusion today. Therefore, we hold that the district courts may apply
the § 2B1.1(b)(11)(B)(i) enhancement to a defendant’s sentence—even when that
defendant has also been convicted of violating § 1028A—if the government
6
Contrary to Taylor’s assertions, this interpretation of the term “production” does not
mandate the production enhancement any time a defendant commits the underlying offense.
“Unauthorized access device” is defined as “any access device that is lost, stolen, expired,
revoked, canceled, or obtained with intent to defraud.” 18 U.S.C. § 1029(e)(3); U.S.S.G.
§ 2B1.1 cmt. n.10(A). A defendant may use a lost, stolen, expired, revoked, or canceled device
and be subject to liability under § 1028A without necessarily “producing” the device and being
subjected to the production enhancement.
13
Case: 14-13288 Date Filed: 03/28/2016 Page: 14 of 21
demonstrates, by a preponderance of the evidence, that the defendant’s relevant
conduct included the “production” of an unauthorized access device.
B. Conduct Constituting “Production” under § 2B1.1(b)(11)(B)(i)
Having determined that a sentence may be subject to the two-level
production enhancement in § 2B1.1(b)(11)(B) even when the defendant was also
convicted under § 1028A, we turn now to whether a defendant “produces” an
unauthorized access device when he causes an innocent third party to physically
create or otherwise generate that device. Taylor avers that such conduct is not
“production” within the meaning of the Guidelines because “production” requires
first-hand creation.
While our court has concluded that a defendant can be subjected to a
sentencing enhancement based on the actions of a co-conspirator, 7 we have never
squarely held whether a defendant is liable for “producing” a device when neither
the defendant nor a co-conspirator directly manufactured the item. Consequently,
the second legal issue in this case is whether “production” encompasses a situation
in which the defendant caused an innocent third party to create the fraudulent
device at the defendant’s behest. Taylor argues that this conduct should not
7
A sentencing enhancement may apply even when premised on a co-conspirator’s
actions because a defendant is responsible for the reasonably foreseeable acts of his co-
conspirators. See, e.g., Cruz, 713 F.3d at 607–08 (defendant liable for device-making equipment
when co-conspirator possessed and used the equipment); see also U.S.S.G. § 1B1.3(a)(1)(B)(iii)
(a defendant’s “relevant conduct” includes “reasonably foreseeable” acts of others in furtherance
of a jointly undertaken criminal activity).
14
Case: 14-13288 Date Filed: 03/28/2016 Page: 15 of 21
constitute “production” because it simply involves “procuring” the device (here, a
credit card) after it was produced by an innocent third party (a bank). According to
Taylor, only a defendant who creates cards personally or through criminal
associates deserves an enhancement for production of an unauthorized access
device. However, we hold that “production” for purposes of the §
2B1.1(b)(11)(B)(i) enhancement includes a situation in which a defendant willfully
causes or induces an innocent third party to produce an unauthorized access device.
The Guidelines’ plain language, our precedents, and guidance from our sister
circuits direct this conclusion.
The Guidelines provide for a broad interpretation of “production” under
§ 2B1.1(b)(11)(B)(i). We interpret the Guidelines using “its plain language and,
absent ambiguity, no additional inquiry is necessary.” Cruz, 713 F.3d at 607
(internal quotation marks omitted). As discussed above, the Guidelines define
“production” as “includ[ing] manufacture, design, alteration, authentication,
duplication, or assembly.” U.S.S.G. § 2B1.1 cmt. n.10(A). This far-reaching
definition clearly encompasses a wide range of behaviors. In addition, under the
Guidelines, specific offense enhancements may be determined by “all acts and
omissions committed, aided, abetted, counseled, commanded, induced, procured,
15
Case: 14-13288 Date Filed: 03/28/2016 Page: 16 of 21
or willfully caused by the defendant.” Id. § 1B1.3(a)(1)(A).8 Reading these
provisions together, “production” plainly includes conduct where an individual
either commits or willfully causes the “manufacture, design, alteration,
authentication, duplication, or assembly” of an unauthorized access device.
This interpretation of “production” is consistent with the broad
interpretations adopted by this court and other circuits. We have held that
“production” applies to a defendant’s “capture, storage, and transmittal” of
preexisting passwords and user names because “production” includes
“‘duplication’ or ‘assembly’ of preexisting items.” See Barrington, 648 F.3d at
1203 (affirming production enhancement where defendants “view[ed] or
record[ed] . . . personal identification data” (internal quotation marks omitted)).
Similarly, the First Circuit gave broad effect to conduct qualifying as
“production” when it found the production enhancement could be applied in the
case of a defendant who, recognizing that air bubbles in the laminate of a
fraudulent driver’s license could undermine its appearance as legitimate, either
popped the bubbles herself or instructed her co-conspirator to do so. See United
States v. Jones, 551 F.3d 19, 25–26 (1st Cir. 2008). The court held that this
8
The crimes set forth in 18 U.S.C. §§ 1028A and 1029(a)(2) are specific intent offenses.
Section 1028A requires that the defendant have “knowingly transfer[red], possesse[d], or use[d],
without lawful authority, a means of identification of another person. See 18 U.S.C. §
1028A(a)(1) (emphasis added). Section 1029(a)(2) requires the government to prove the
defendant “knowingly and with intent to defraud traffic[ked] or use[d] one or more unauthorized
access devices during any one-year period, and by such conduct obtain[ed] anything of value
aggregating $1,000 or more during that period.” 18 U.S.C. § 1029(a)(2) (emphasis added).
16
Case: 14-13288 Date Filed: 03/28/2016 Page: 17 of 21
conduct was the type of behavior the Guidelines attempt to capture in the
production enhancement because, although the physical act of popping air bubbles
might seem minor, this small act of alteration “transformed the flawed driver’s
license into a usable counterfeit access device.” Id. at 26. An even more
persuasive example comes from the Seventh Circuit, where the court held that the
production enhancement could be applied to a defendant discovered with credit
and debit cards imprinted with the names of the defendant and his co-conspirators.
See United States v. Hinds, 770 F.3d 658, 663–64 (7th Cir. 2014). The court
explained that “the [embossed] names on the cards speak for themselves. This is
not a crime where [the defendant] used the stolen credit cards of John or Jane Doe.
His crime . . . involved cards designed specifically for him to use; they had his
name on them and were linked to various active accounts.” Id. The court decided
this sufficiently demonstrated that the defendant, “his co-conspirators, or someone
acting on their behalf, must have designed or created these counterfeit cards in
preparation for their crimes.” 9 See id. at 663. Based on this undisputed evidence,
the court held that the production enhancement was justified. See id. at 664.
9
Taylor avers that the phrase “in preparation for their crimes” means that the Seventh
Circuit based its conclusion on an understanding that someone within the conspiracy created the
cards. Even if we were to accept this arguable reading of the language in Hinds, the plain
language of the Guidelines states that a defendant’s sentence may be enhanced by all actions
willfully caused or induced by the defendant. See U.S.S.G. § 1B1.3(a)(1)(A). Hinds did not
address this important language, and Taylor has presented no reason why it does not control.
17
Case: 14-13288 Date Filed: 03/28/2016 Page: 18 of 21
In sum, the definition of “production” is broadly written in the Guidelines
and, for that reason, has been broadly construed. And the Guidelines provision for
determining specific offense enhancements makes clear that a defendant is
responsible for all actions he willfully causes or induces. Consequently, we hold
that the production enhancement is applicable to conduct involving third-party
production—whether physically performed by a criminal co-conspirator or by an
innocent party—that has been willfully induced by the defendant.
C. Whether the District Court Erred in Applying the Production
Enhancement Based on Taylor’s Relevant Conduct
The evidence submitted by the government in this case shows that Taylor
induced and willfully caused the production of unauthorized access devices when
he contacted banks using stolen identities, added himself as an authorized user to
the accounts associated with those identities, and directed the banks to issue new
credit cards. Put simply, Taylor caused the bank to physically produce credit cards
bearing his name. Thus, while the credit cards were not Taylor-made, they were
certainly tailor-made for his offense.
Taylor’s relevant conduct is captured by the broad language of the
“production” definition and the plain meaning of “induced” and “willfully caused”
in the Guidelines. See U.S.S.G. § 2B1.1 cmt. n.10(A); id. § 1B1.3(a)(1)(A). The
evidence shows that after Taylor was added to an account, the bank would produce
a new credit card, bearing Taylor’s name and the account number, and send it to
18
Case: 14-13288 Date Filed: 03/28/2016 Page: 19 of 21
him. Taylor obtained these newly produced credit cards without the consent of the
true account holders and with intent to defraud, making the credit cards
“unauthorized access devices.” See 18 U.S.C. § 1029(a)(2), (e)(3); U.S.S.G. §
2B1.1 cmt. n.10(A).
Accordingly, as in Jones, where the defendant’s bubble-popping alteration
of a driver’s license created a usable counterfeit access device, Taylor’s actions—
getting a bank to add his name to an account and manufacture a new card
embossed with his name—created a usable unauthorized access device. 10 See
Jones, 551 F.3d at 25–26; U.S.S.G. § 2B1.1 cmt. n.10(A); cf. Salem, 587 F.3d at
870–71 (determining production enhancement was improper where “there was no
evidence presented at sentencing about how [the defendant] procured the
fraudulent bar code labels used in his scheme, or who produced or manufactured
them”). Indeed, Taylor’s conduct exceeded simply using a means of identification
(a stolen identity) to get access to another means of identification/unauthorized
access devices (a credit card)—he had the bank add him to the account and create a
new credit card with his name on it.11 See Hinds, 770 F.3d at 663–64. Taylor
10
For this reason, Taylor’s argument that “production” does not encompass innocent
third-party production in the ordinary course of that party’s business practices fails. The fact that
banks are ordinarily engaged in credit card production is not the same as the banks ordinarily
being involved in (or, rather, induced to commit) fraudulent credit card production.
11
We pass no judgment on whether this conduct could have qualified for an enhancement
under the production prong of § 2B1.1(b)(11)(C)(i) instead. See United States v. Auguste, 392
F.3d 1266, 1267–68 (11th Cir. 2004). The government neither raised this issue in the district
court nor addressed it on appeal. See Access Now, Inc. v. Sw. Airlines Co., 385 F.3d 1324, 1330
19
Case: 14-13288 Date Filed: 03/28/2016 Page: 20 of 21
“willfully caused” or “induced” the production of the unauthorized access devices
by impersonating legitimate account holders and requesting that the banks create
and issue new credit cards to him. See U.S.S.G. § 1B1.3(a)(1)(A).
Consequently, because Taylor induced and willfully caused banks to
produce new credit cards, the district court did not err in applying the
§ 2B1.1(b)(11)(B)(i) enhancement for “production” of an unauthorized access
device.
IV. Conclusion
We conclude that the § 2B1.1(b)(11)(B) production enhancement applies to
the Guidelines’ calculation for Taylor’s § 1029(a)(2) sentence, even though Taylor
was also sentenced under § 1028A, because his relevant conduct included actions
sufficiently distinct from the mere transfer, possession, or use of an unauthorized
access device/means of identification. That is to say, Taylor also produced
unauthorized access devices. We reach the conclusion that he engaged in
“production” because willfully causing an innocent third party to produce the
devices meets the meaning of “production” under the Guidelines. Therefore, the
two-level enhancement to Taylor’s offense level pursuant to § 2B1.1(b)(11)(B)(i)
(11th Cir. 2004); Iraola & CIA, S.A. v. Kimberly-Clark Corp., 325 F.3d 1274, 1284–85 (11th
Cir. 2003).
20
Case: 14-13288 Date Filed: 03/28/2016 Page: 21 of 21
for production of an unauthorized access device is warranted. We affirm the
district court.
AFFIRMED.
21