PRECEDENTIAL
UNITED STATES COURT OF APPEALS
FOR THE THIRD CIRCUIT
____________
No. 19-1404
____________
CHRISTOPHER RAD,
Petitioner
v.
ATTORNEY GENERAL UNITED STATES OF AMERICA
____________
On Petition for Review of a Decision of
the Board of Immigration Appeals
[Agency No. A034-985-319]
Immigration Judge: John P. Ellington
____________
Argued September 15, 2020
Before: KRAUSE, RESTREPO, and BIBAS, Circuit Judges
(Opinion Filed: December 21, 2020)
Christopher Rad
Pike County Correctional Facility
175 Pike County Boulevard
Lords Valley, PA 18428
Pro Se Petitioner
Jacob A. Bashyrov
Craig A. Newell, Jr.[Argued]
United States Department of Justice
Office of Immigration Litigation
P.O. Box 878
Ben Franklin Station
Washington, DC 20044
Counsel for Respondent
Ana Builes
Hannah Mullen [Argued]
Tyler Purinton
Adam Walker
Brian S. Wolfman, Esq.
Georgetown University Law Center
600 New Jersey Avenue, N.W., Suite 312
Washington, DC 20001
Bradley Girard
Americans United for Separation of Church and State
1310 L Street, N.W., Suite 200
Washington, DC 20005
Court-Appointed Amicus Curiae
2
____________
OPINION OF THE COURT
____________
KRAUSE, Circuit Judge.
Since its earliest days, the internet has provided a forum
for users to share ideas, do business, and gather information in
relative anonymity. Whether the CAN-SPAM Act’s rarely-
invoked but potentially far-reaching criminal provisions alter
that paradigm is the central question presented by this appeal.
See 18 U.S.C. § 1037(a). In one view, the Act implements a
sweeping anti-anonymity principle that compels individuals
and businesses to disclose their identity in every commercial
email they send and every domain name they register.
Recognizing the troubling constitutional and practical
consequences of this approach, we read the Act differently.
Rather than penalizing everyday practices, the Act reflects and
reinforces longstanding norms. So long as marketers refrain
from making false statements in contexts where consumers
have come to expect accuracy, their conduct comports with the
norms embedded in the architecture of the internet—and with
the Act. With this narrow, norms-based interpretation in mind,
we conclude that Petitioner’s convictions for conspiring to
violate the CAN-SPAM Act necessarily entail deceit, and
therefore satisfy the first element of an aggravated felony under
8 U.S.C. § 1101(a)(43)(M)(i).
3
The second element, that Petitioner’s crimes inflicted
victim losses over $10,000, is a different story. In reviewing a
removal order, we are bound by one of administrative law’s
most fundamental principles: We judge the agency’s decision
“solely by the grounds [it] invoked,” SEC v. Chenery Corp.,
332 U.S. 194, 196 (1947). The Board of Immigration Appeals’
initial removal order overlooked crucial differences between
sentencing hearings and immigration proceedings, so we
remanded. But the revised order rests on the same flawed
understanding of the loss element as its predecessor, and we
therefore cannot approve the agency’s analysis. Even as we
reject the Board’s rationale, however, we hold that intended
losses, not just actual ones, may meet the loss requirement for
Petitioner’s conspiracy offenses, see 8 U.S.C.
§ 1101(a)(43)(U). Because the Board never addressed this
possibility, we are compelled to provide yet another
opportunity for it to examine the loss element.
I. Factual and Procedural Background
A. The CAN-SPAM Act
To provide context for this appeal, we offer a brief
introduction to the CAN-SPAM Act. The Act’s purpose is to
address the harms caused by “unsolicited commercial . . .
[e]mail,” otherwise known as spam. 15 U.S.C. § 7701(a)(2).
To that end, the Act empowers consumers to sue marketers
who relay misleading messages or refuse to honor opt-out
requests. Id. § 7703 et seq. It also enables prosecutors to bring
criminal charges against spammers who embrace especially
4
abusive tactics. See 18 U.S.C. § 1037(a). Two of those tactics
are the subject of this appeal.
The first involves falsifying an email’s header
information. By definition, a header records a message’s
“source, destination, and routing.” 15 U.S.C. § 7702(8). In
most cases, a sender’s computer populates the header with
accurate information about the message’s origin. See Dan
Boneh, The Difficulties of Tracing Spam Email 2-3, FTC (Sept.
9, 2004), https://perma.cc/7NG3-M4MV. In some cases,
however, spammers manipulate headers to report false
information. Id. This tactic, called “spoofing,” confuses spam
filters, misleads recipients, and impedes investigators. Id. at 4,
11. The Act therefore prohibits it. See 18 U.S.C. § 1037(a)(3).
The second tactic consists of registering a domain name
using a false identity. As a general matter, a domain name
describes an “alphanumeric designation which is registered
with . . . [a] registration authority as part of an electronic
address on the [i]nternet.” 15 U.S.C. § 7702(4). To prevent
multiple users from claiming the same domain, the Internet
Corporation for Assigned Names and Numbers (ICANN)
administers a registration system. What ICANN Does and
Doesn’t Do, ICANN (June 22, 2012),
https://www.icann.org/en/system/files/files/what-icann-does-
22jun12-en.pdf. Under ICANN’s rules, a registrant cannot
reserve a domain without publicly disclosing their contact
information. FAQ: Domain Name Registrant Contact
Information, ICANN (Feb. 25, 2012),
https://www.icann.org/resources/pages/faqs-f0-2012-02-25-
5
en. This requirement makes it easier for law enforcement
agencies to investigate fraud, hacking, and other criminal
activities conducted over the internet. See Jon Leibowitz,
Prepared Statement of the Federal Trade Commission Before
ICANN 4 (June 2006), https://perma.cc/98UG-9L9N. Not
surprisingly, spammers sometimes flout ICANN’s rules—and
avoid the scrutiny those rules facilitate—by registering domain
names using false contact information. This tactic, too,
violates the Act. See 18 U.S.C. § 1037(a)(4).
B. Rad’s Trial and Sentencing
Though the CAN-SPAM Act came into force almost
two decades ago, its criminal provisions have given rise to only
a handful of prosecutions, one of which underlies this case. In
2012, a grand jury approved a nine-count superseding
indictment against Petitioner Christopher Rad. According to
the indictment, Rad and several co-conspirators acquired
shares of penny stocks, “pumped” the prices of those stocks by
bombarding investors with misleading spam emails, and then
“dumped” their shares on the market at a profit. A.R. 75–76.
Of relevance here, Count I charged Rad with conspiring to
commit false header spamming, see § 1037(a)(3), false domain
name spamming, see § 1037(a)(4), and securities fraud, see 15
U.S.C. §§ 78j and 78ff.1 At trial, a jury convicted Rad of the
1
The remaining counts, which charge both substantive
and inchoate violations of the CAN-SPAM Act, played no part
in the Board’s removal decision, and are therefore irrelevant to
this appeal.
6
first two conspiracies, but failed to reach a verdict as to the
third.
In preparation for sentencing, the Probation Office
circulated a Presentence Investigation Report (“PSR”)
recommending that the District Court raise Rad’s offense level
to reflect the losses his crimes inflicted on investors. See
U.S.S.G. § 2B1.1(b)(1). The PSR began by estimating that
Rad realized about $2.9 million in “illicit gains” over the
course of the conspiracy. A.R. 42. It then acknowledged that,
because “countless victims” purchased stocks “based on the
spamming scheme,” the losses stemming from Rad’s conduct
could not “reasonabl[y] be determined.” Id. at 46. It
nonetheless advised the Court to treat Rad’s gains as a proxy
for victim losses and to lengthen his sentence accordingly. Id.;
see U.S.S.G. § 2B1.1, cmt. n.3(B) (“The court shall use the
gain that resulted from the offense as an alternative measure of
loss . . . if there is a loss but it reasonably cannot be
determined.”). For his part, Rad questioned whether his crimes
caused any losses and emphasized the absence of evidence
“that any single person lost anything” as a result of the
conspiracy. A.R. 67.
At sentencing, the District Court ordered Rad to serve a
total of seventy-one months in prison, including thirty-five
months attributable to Count I. Because neither party
introduced a transcript of the sentencing hearing, the
administrative record is silent as to how the Court analyzed and
7
resolved the victim loss issue.2 We upheld the District Court’s
judgment on appeal.
C. Removal Proceedings
Not long after the District Court sentenced Rad, the
Department of Homeland Security (“DHS”) initiated removal
proceedings. Under the Immigration and Naturalization Act
(“INA”), DHS retains authority to remove noncitizens who
commit “aggravated felonies.” 8 U.S.C. § 1227(a)(2)(A)(iii).
That category includes any crime that (1) “involves fraud or
deceit” (2) “in which the loss to the victim or victims exceeds
$10,000.” Id. § 1101(a)(43)(M)(i).
In proceedings before an Immigration Judge (“IJ”),
DHS characterized Rad’s CAN-SPAM Act convictions as
felonies involving deceit and the requisite level of victim
losses. The IJ agreed and the Board affirmed.
2
Despite the possible relevance of the transcript of
Rad’s sentencing hearing, we cannot take judicial notice of
materials outside the administrative record. See Berishaj v.
Ashcroft, 378 F.3d 314, 330 (3d Cir. 2004) (“[C]ourts
reviewing the determination of an administrative agency must
approve or reject the agency’s action purely on the basis of . . .
the record compiled before[] the agency itself.”); cf. Nbaye v.
Att’y Gen., 665 F.3d 57, 59–60 (3d Cir. 2011) (remanding to
permit the Board to consider extra-record information in the
first instance).
8
When Rad filed his first petition for review before this
Court, DHS urged us to remand to permit the Board to “further
consider[]” whether Rad’s offenses constitute aggravated
felonies. A.R. 318. In explaining why remand was warranted,
DHS collected controlling precedents that the Board had failed
to address in its initial order. We therefore sent the case back
to the Board.
On remand, the agency proceeded to retread the ground
it covered in its initial analysis of the loss element. Rather than
reviewing evidence from Rad’s sentencing hearing, the Board
depended on an inference drawn from the criminal judgment.
Because “a 35-month sentence was ultimately imposed for
[Count I],” the agency reasoned, “the sentencing judge [must
have] added at least 6 levels based on victim loss—a
determination that would have required the court to assess the
loss at greater than $40,000.” A.R. 5; see U.S.S.G.
§ 2B1.1(b)(1)(D). So, while the Board conceded that “the
precise quantum of victim loss is not readily ascertainable,” it
nevertheless presumed “the amount of loss . . . exceeded
$10,000.” A.R. 5. Having classified Rad’s crimes as
aggravated felonies, the agency ordered him removed from the
United States.
9
We now consider Rad’s second, timely-filed petition for
review.3
II. Jurisdiction and Standard of Review
The Board exercised jurisdiction under 8 C.F.R.
§ 1003.1(b)(3). We retain jurisdiction to consider “whether
[Rad]’s conviction qualifies as an aggravated felony because it
is a ‘purely legal question, and one that governs our own
jurisdiction.’” Fan Wang v. Att’y Gen., 898 F.3d 341, 343 (3d
Cir. 2018). Our review of that question is plenary. See Singh
v. Att’y Gen., 677 F.3d 503, 508 (3d Cir. 2012).
III. Analysis
To demonstrate that Rad’s crimes count as aggravated
felonies, DHS bears the burden of establishing two elements.
See Kiareldeen v. Ashcroft, 273 F.3d 542, 553–54 (3d Cir.
2001). The first is that violations of 18 U.S.C. §§ 1037(a)(3)
and (a)(4) categorically involve “fraud or deceit.” 8 U.S.C.
§ 1101(43)(M)(i). In analyzing this requirement, “we focus on
the crime’s statutory elements ‘rather than . . . the specific facts
3
Because Rad brought this appeal pro se, we asked
Georgetown University Law Center’s Appellate Courts
Immersion Clinic to serve as amicus. We express our gratitude
to the Clinic for accepting this matter pro bono, and we
commend the Clinic for its superb briefing and argument in this
complex case. Lawyers who act pro bono fulfill the highest
service that members of the bar can offer to indigent parties
and to the legal profession.
10
underlying the crime.’” Singh, 677 F.3d at 508 (alteration in
original) (quoting Kawashima v. Holder, 565 U.S. 478, 483
(2012)). The second element, whether Rad caused over
$10,000 in losses, 8 U.S.C. § 1101(43)(M)(i), is a different
story. That requirement hinges on “the specific way in which
[Rad] committed the crime[s],” and we therefore review the
indictment, judgment, presentence investigation report, and
any other “sentencing-related material” that sheds light on
Rad’s conduct. Nijhawan v. Holder, 557 U.S. 29, 34, 42
(2009). As we shall see, DHS has met its burden as to the first
element, but we must remand for the Board to revisit the
second.
A. The Fraud or Deceit Element
The central question presented here is whether 18
U.S.C. §§ 1037(a)(3) and (a)(4) categorically “involve[] fraud
or deceit.”4 8 U.S.C. § 1101(43)(M)(i). In answering this
question, we begin by defining deceit; we proceed to survey
the scope of the CAN-SPAM Act; and we conclude by asking
whether the least-culpable conduct covered by the Act entails
deceit. Because the parties focus on deceit, we do the same.
4
Although prosecutors charged Rad with conspiracy to
commit securities fraud, the jury failed to reach a verdict as to
that charge. DHS therefore concedes that the conspiracy to
commit securities fraud charge does not justify Rad’s removal.
11
1. How the INA Defines Deceit
Our initial task is to stake out the boundaries of the
INA’s deceit provision. On this front, at least, we need not
write on a blank slate. We long ago recognized that the INA
uses “deceit” in its commonly accepted legal sense—namely,
“the act of intentionally giving a false impression.” Valansi v.
Ashcroft, 278 F.3d 203, 209 (3d Cir. 2002) (citing Black’s Law
Dictionary 413 (7th ed. 1999)). In the intervening years, at
least one of our sister circuits has endorsed this definition; none
have disputed it; and the IJ and DHS invoked it in this case.
See James v. Gonzales, 464 F.3d 505, 508 & n.14 (5th Cir.
2006); Patel v. Mukasey, 526 F.3d 800, 802–03 (5th Cir. 2008).
A similar understanding of deceit emerges from one of
the Supreme Court’s removal cases, Kawashima v. Holder, 565
U.S. 478 (2012). There, the Court equated “deceit” with “‘the
act or practice of deceiving (as by falsification, concealment,
or cheating).’” Id. at 484 (quoting Webster’s Third New
International Dictionary 584 (1993)). At its core, this
definition turns on the gerund “deceiving,” a word that means
“caus[ing] to believe the false.” Deceive, Merriam-Webster
Unabridged, https://www.unabridged.merriam-webster.com/
unabridged/deceiving (last visited Oct. 15, 2020). That leaves
little, if any, practical difference between Valansi’s and
Kawashima’s definitions. Here, for example, §§ 1037(a)(3)
and (a)(4) necessarily entail deceit, no matter which
formulation applies. To see why, we must abandon the
familiar domain of the INA and venture into the terra incognita
of the CAN-SPAM Act.
12
2. What the CAN-SPAM Act Prohibits
The categorical approach presupposes that we
understand the least-culpable conduct covered by a criminal
statute. Yet no controlling cases analyze §§ 1037(a)(3) and
(a)(4), and few courts at any level have done so. For their part,
the parties paint drastically different pictures of the Act. While
DHS depicts the false-header and domain-name spamming
provisions as proscribing a specific set of abuses, Amicus
portrays those provisions as announcing that all senders of
commercial email must comply with a sweeping anti-
anonymity principle. We conclude, however, that far from
upending pre-existing norms, the Act reflects and reinforces
them. To show how it does so, we look first to the Act’s text.
We then explain why the doctrine of constitutional avoidance
supports our narrow reading of the Act. And finally, we
identify where Amicus’s more expansive construction goes
astray.
a) Statutory text
Our inquiry begins—and, as it turns out, largely ends—
with the terms of the Act itself. In relevant part, 18 U.S.C.
§ 1037(a) specifies that:
Whoever, in or affecting interstate or foreign
commerce, knowingly
...
13
(3) materially falsifies header information in
multiple commercial electronic mail messages
and intentionally initiates the transmission of
such messages, [or]
(4) registers, using information that materially
falsifies the identity of the actual registrant, for
five or more electronic mail accounts or online
user accounts or two or more domain names, and
intentionally initiates the transmission of
multiple commercial electronic mail messages
from any combination of such accounts . . .
or conspires to do so, shall be punished . . . .
(emphasis added).
In advancing a far-reaching interpretation of the Act,
Amicus downplays these provisions, and instead highlights
Congress’s subsequent definition of the word “materially”:
For purposes of paragraphs (3) and (4) of
subsection (a), header information or registration
information is materially falsified if it is altered
or concealed in a manner that would impair the
ability of a recipient of the message, an Internet
access service processing the message on behalf
of a recipient, a person alleging a violation of this
section, or a law enforcement agency to identify,
locate, or respond to a person who initiated the
14
electronic mail message or to investigate the
alleged violation.
Id. § 1037(d)(2) (emphasis added). As Amicus would have it,
this language transforms a statute designed to target specific
abuses into one that compels marketers to divulge their
“identi[ty]” and “locat[ion]” in every email they send and
every domain name they register. Id. For example, Amicus
posits that a small business that uses a private
(“Anonymous@Generic.com”), vague
(“Jane@Sportsfan.com”) or whimsical
(“Bigfoot@Podiatry.com”) email address has “concealed” its
“identi[ty]” in a way that risks prosecution. Id. And, likewise,
Amicus predicts that the thousands of individuals who pay
proxies to register domain names on their behalf have similarly
“impair[ed]” recipients’ ability to “identify” or “locate” them.
Id. All of this commonplace conduct falls within the scope of
§§ 1037(a)(3) and (a)(4), Amicus warns, whenever the sender
conveys a sufficient quantity of commercial emails.5
5
The Act applies to defendants who send “multiple”
emails, which it defines as “more than 100 electronic mail
messages during a 24-hour period, more than 1,000 electronic
mail messages during a 30-day period, or more than 10,000
electronic mail messages during a 1-year period.” 18 U.S.C.
§ 1037(d)(3). This element does little to shield everyday
conduct from prosecution, given that businesses—from stores
announcing a new location to local politicians soliciting
donations—often have occasion to send more than a hundred
emails in a day.
15
But we normally refuse to construe statutes as
“criminaliz[ing] a broad range of day-to-day activity,” and the
CAN-SPAM Act is no exception. United States v. Kozminski,
487 U.S. 931, 949 (1988). Rather than penalizing everyday
practices, the Act implements pre-existing norms. Cf. Orin S.
Kerr, Norms of Computer Trespass, 116 COLUM. L. REV. 1143,
1146 (2016) (contending that computer trespass statutes should
be interpreted in light of prevailing norms). Since the
internet’s earliest days, the protocol that permits computers to
exchange emails has mandated that a message’s header include
a field that reflects its sender’s address. See David Dickinson,
Note, An Architecture for Spam Regulation, 57 FED. COMM.
L.J. 129, 132 (2004). And, for almost as long, ICANN has
required registrants to divulge their own contact information,
or that of a proxy, when claiming a domain name. FAQ:
Domain Name Registrant Contact Information, ICANN (Feb.
25, 2012), https://www.icann.org/resources/pages/faqs-f0-
2012-02-25-en.
These accountability mechanisms do not dictate that
senders reveal who they are or where they are located in every
message, and neither does the Act. Instead, senders need only
provide recipients with a reliable way of contacting them,
whether by replying to a particular account or by
communicating through a proxy. So long as individuals and
businesses refrain from inserting false contact information in
contexts where internet users have come to expect accuracy,
their conduct comports with prevailing norms—and with the
Act.
16
Start with the prohibition on false header spamming.
What makes Amicus’s construction of § 1037(a)(3) so
sweeping is that it requires an email address’s semantic content
to match the sender’s reality. If a commercial message arrives
from “Jane@sportsfan.com,” for example, then Amicus reads
the Act as mandating that the sender be named Jane and enjoy
sports. In practice, of course, internet users routinely create
email addresses that imperfectly or inaccurately reflect their
true identities. By the same token, businesses often have
occasion to promote their services with addresses that pay
homage to fictional mascots (“Bulldog@Almamater.edu”),
celebrity endorsers (“Famous_Athlete@Nike.com”), or long-
gone founders (“Benjamin_Franklin@Printingpress.com”).
Nothing in § 1037(a)(3) criminalizes these
commonplace practices. By its terms, that subsection
prescribes penalties only for individuals who “falsify,” 18
U.S.C. § 1037(a)(3), the “source, destination, and routing
information attached to an electronic mail message,” 15 U.S.C.
§ 7702(8). In other words, the information displayed in an
email’s header must match the address from which the message
was actually sent—but not necessarily the sender’s true
identity. When a business owner conveys communications
from “Jane@Sportsfan.com,” for example, her emails’ headers
will report that address, foreclosing the application of
§ 1037(a)(3) no matter what her name is or whether she follows
sports. When a spammer manipulates her messages’ headers
so that they seem to originate from an account that does not
exist or that she does not control, by contrast, she violates the
Act. In this way, § 1037(a)(3) promotes the CAN-SPAM Act’s
17
stated purpose of enabling consumers “to decline to receive
additional commercial electronic mail from the same source,”
15 U.S.C. § 7701(b)(3), without mandating that marketers
disclose their identity and location in every message.
The same is true of the prohibition on domain-name
spamming. Under Amicus’s wide-ranging interpretation of
§ 1037(a)(4), anyone who employs a proxy service to register
a domain name risks federal prosecution. But while using a
proxy may sound complex or even criminal, it involves two
simple, innocuous steps. First, an individual pays a private
registration firm to claim a domain name on his behalf. See
Information for Privacy and Proxy Service Providers, ICANN
(Aug. 31, 2017), available at:
https://www.icann.org/resources/pages/pp-services-2017-08-
31-en. Second, the firm registers that domain with ICANN,
entering its own contact information, rather than that of the
individual who will use the domain. See id. If the Act
outlawed this popular practice, many thousands of individuals
might face criminal penalties.
Although the Ninth Circuit has hypothesized that proxy
registration “for the purpose of concealing the actual
registrant’s identity would constitute ‘material falsification,’”
we respectfully disagree. United States v. Kilbride, 584 F.3d
1240, 1259 (9th Cir. 2009). True, many domain-name owners
undoubtedly embrace proxy registration because it protects
their privacy. But the Act makes it illegal to “falsif[y] the
identity of the actual registrant,” § 1037(a)(4) (emphasis
added), and nowhere suggests that the registrant must serve as
18
the day-to-day owner of a domain. And, given that ICANN’s
rules expressly permit proxies to enter their own contact
information when claiming a domain name on someone else’s
behalf, we struggle to see how proxy registration reflects
“material falsifi[cation].” § 1037(a)(4); see also Dressler v.
Busch Entm’t Corp., 143 F.3d 778, 781 (3d Cir. 1998)
(defining “falsify” as “to engage in misrepresentation or
distortion”).
Instead, § 1037(a)(4) zeroes in on “registrant[s]”—
whether day-to-day domain users or their proxies—who claim
a domain using contact information that is not their own.6 This
prohibition reflects ICANN’s longstanding rules, which
mandate that a registrant disclose its contact information when
signing up for a domain name. FAQ: Domain Name Registrant
Contact Information, ICANN (Feb. 25, 2012),
https://www.icann.org/resources/pages/faqs-f0-2012-02-25-
en. Like its sister provision, § 1037(a)(4) therefore ensures
that recipients retain some way to communicate with the
senders of commercial emails, either by replying directly or by
contacting a proxy, without compelling senders to share who
they are and where they are from with everyone they contact.
6
Although courts and commentators typically describe
§ 1037(a)(4) as the domain-name spamming provision, that
provision also makes it illegal to register email addresses using
false information. Neither the parties nor Amicus identify any
reason to treat registration of domain names and email
addresses differently.
19
b) Constitutional avoidance
A contrary construction of §§ 1037(a)(3) and (a)(4)
would raise serious constitutional concerns. Though “the
overbreadth doctrine does not apply to commercial speech,”
Vill. of Hoffman Estates v. Flipside, Hoffman Estates, Inc., 455
U.S. 489, 497 (1982), restrictions on an author’s ability to
“remain anonymous” nonetheless implicate “the freedom of
speech protected by the First Amendment,” McIntyre v. Ohio
Elections Comm’n, 514 U.S. 334, 342 (1995). In the context
of political speech, for example, the Supreme Court has long
recognized that anonymity advances the First Amendment’s
core values: It enables “[p]ersecuted groups . . . to criticize
oppressive practices,” empowers “writer[s] who may be
personally unpopular to ensure that readers will not prejudge
[their] message[s],” and encourages dissidents to voice their
“conscience without fear of retaliation.” McIntyre, 514 U.S. at
342–43 (first alteration in original) (quoting Talley v.
California, 362 U.S. 60, 64–65 (1960)).
Whether and to what extent the First Amendment
shields speakers who share commercial messages
anonymously remains unsettled, but we see no need to wade
into that quagmire today. Cf. Sorrell v. IMS Health Inc., 564
U.S. 552, 567 (2011) (recognizing that “a great deal of vital
expression” results “from an economic motive”).
Understanding the Act narrowly, as limited to false assertions
in contexts where recipients expect accuracy, dispels the
constitutional concerns that would otherwise accompany
Amicus’s approach. See 44 Liquormart, Inc. v. Rhode Island,
20
517 U.S. 484, 496 (1996) (observing that the First Amendment
protects “the dissemination of truthful and nonmisleading
commercial messages” (emphasis added)).
c) Amicus’s arguments
Notwithstanding its excellent advocacy, Amicus offers
an interpretation of the interaction between the Act’s
substantive provisions, §§ 1037(a)(3) and (a)(4), and its
definitions, id. § 1037(d), with which we ultimately cannot
agree. Boiled down to their essence, (a)(3) and (a)(4) prohibit
commercial emailers from “materially falsif[ying]” header or
domain name information. Id. But Amicus urges that the
definition elaborated at § 1037(d)(2) does not just explain what
the word “materially” means; instead, it replaces the
“materially falsified” term altogether. Should that reading
prevail, §§ 1037(a)(3) and (a)(4) would make it a crime to
share commercial emails with header or registration
information that “conceal” the “identi[ty]” or “locat[ion]” of
the sender. Id. § 1037(d)(2). That would cast a pall over proxy
registration, anonymous emails, and the other commonplace
conduct discussed above.
We conclude that this capacious interpretation is
incompatible with the Act’s text and structure. Most
important, understanding § 1037(d)(2) as modifying the
“materially falsifies” term would render the verb “falsifies”
superfluous, a disfavored and here unnecessary outcome. See
Corley v. United States, 556 U.S. 303, 314 (2009). It would be
equally difficult to square with § 1037(d)’s structure. That
21
subsection defines specific terms, set off in a distinct typeface,
including “loss,” (d)(1), “multiple,” (d)(3), and “materially,”
(d)(2). By so designating the term “materially,” and not the
term “materially falsifies,” Congress sent a strong signal that
(d)(2)’s definition modifies that word alone.
Should any doubt remain, a comparison between
§ 1037(d)(2) and its civil counterpart confirms our conclusion.
In 15 U.S.C. § 7704(a)(1), Congress authorized civil suits
against senders who dispatch “materially false” or “materially
misleading” emails. The drafters went on to articulate a series
of definitions, including the following:
[T]he term “materially”, when used with respect
to false or misleading header information,
includes the alteration or concealment of header
information in a manner that would impair the
ability of an Internet access service processing
the message on behalf of a recipient, a person
alleging a violation of this section, or a law
enforcement agency to identify, locate, or
respond to a person who initiated the electronic
mail message or to investigate the alleged
violation, or the ability of a recipient of the
message to respond to a person who initiated the
electronic message.
Id. § 7704(a)(6). If this language seems familiar, that is
because it tracks § 1037(d)(2) almost word for word. Indeed,
the only meaningful difference is that § 7704(a)(6) leaves no
22
doubt that it modifies the word “materially,” not the term
“materially false.” We see little reason to distinguish
§ 1037(d)(2) and § 7704(a)(6), and good reason to read them
in parallel, given that Congress is unlikely to have intended to
enact a criminal provision that sweeps more broadly than its
civil analogue. See United States v. McKie, 112 F.3d 626, 632
(3d Cir. 1997) (recognizing that our normal practice is to
“interpret criminal statutes strictly”).
The bottom line is that we decline Amicus’s invitation
to construe §§ 1037(a)(3) and (a)(4) as requiring that
commercial emailers adhere to an anti-anonymity principle.
Instead, we embrace a narrow, norms-based reading that
reflects the Act’s text. Having traced the boundaries of the
Act’s criminal provisions, and having found this unfamiliar
territory to be smaller and less dangerous than it may first
appear, we are now equipped to answer the categorical
question at the heart of this appeal.
3. Why §§ 1037(a)(3) and (a)(4) Involve
Deceit
With a definition of deceit in mind, and a map of the
CAN-SPAM Act in view, all that remains is to decide whether
the prohibitions on false header and domain name spamming
“necessarily entail” deceit.7 Kawashima, 565 U.S. at 484. In
7
That Rad was convicted of conspiring to violate
§§ 1037(a)(3) and (a)(4), rather than substantive violations of
those provisions, does not alter our analysis of this element.
Because “[c]onspiracy to commit an aggravated felony is itself
23
applying the categorical approach, we “presume that [Rad’s]
conviction ‘rested upon [nothing] more than the least of th[e]
acts’ criminalized, and then determine whether even those acts
are encompassed by the generic federal offense.” Moncrieffe
v. Holder, 569 U.S. 184, 190–91 (2013) (quoting Johnson v.
United States, 559 U.S. 133, 137 (2010)) (second and third
alteration in original). As it happens, our adoption of a norms-
based reading of the Act requires that we resolve this issue in
DHS’s favor.
To see why, a brief review of the Supreme Court’s
decision in Kawashima is essential. That case centered on 26
U.S.C. § 7206(1), a provision that makes it illegal to insert
false statements in a tax return. To prove a violation of
§ 7206(1), the government must establish “that the document
in question was false as to a material matter, that the defendant
did not believe the document to be true and correct as to every
material matter, and that he acted willfully with the specific
intent to violate the law.” Kawashima, 565 U.S. at 483.
Because a defendant cannot be convicted without “knowingly
and willfully submitt[ing] a tax return that [i]s false as to a
material matter,” the Court held that § 7206(1) embodies
deceit. Id. at 484.
an aggravated felony,” we “proceed as though [the non-
citizen] had been convicted of the substantive offense . . .
though in fact he [was convicted of] conspiracy to commit that
offense.” Tran v. Gonzales, 414 F.3d 464, 468 n.3 (3d Cir.
2005) (citing 8 U.S.C. § 1101(a)(43)(U)).
24
The same logic extends to §§ 1037(a)(3) and (a)(4). In
Kawashima, the relevant offense concerned the entry of false
information in a tax return, a document that ordinarily contains
truthful statements. Here, likewise, the Act targets senders
who falsify email headers and domain name registration
entries, both contexts where consumers expect accuracy.
When it comes to § 1037(a)(3), for example, recipients
presume that header information reflects a sender’s email
address. Any deviation from that norm risks giving readers “a
false impression” as to a message’s origin. Valansi, 278 F.3d
at 209 (internal quotation marks omitted); see also Kawashima,
565 U.S. at 484 (classifying “falsification” as a form of
“deceit”). And when it comes to § 1037(a)(4), ICANN’s
longstanding rules mandate accurate disclosure of a
registrant’s contact information. In that context, too,
falsification tends to cause recipients, investigators, and
internet service providers “to believe what is false.” Valansi,
278 F.3d at 211. We therefore conclude that, like the provision
at issue in Kawashima, §§ 1037(a)(3) and (a)(4) necessarily
entail deceit.
Neither of Amicus’s counterarguments convinces us
otherwise. Its main contention is that many types of conduct
contravene the CAN-SPAM Act without implicating deceit.
What unites Amicus’s examples is that they assume that any
mismatch between a commercial emailer’s address and his true
identity triggers liability under § 1037(a)(3). But, as we
explained already, no matter whether a message comes from a
25
private, vague, or whimsical address, the sender remains safe
from prosecution unless he manipulates the email’s header.8
This point is best illustrated by Kilbride, a CAN-SPAM
Act prosecution that Amicus argues did not feature fraud or
deceit. The Kilbride defendants altered their emails’ headers
by “tak[ing] the user name of the person receiving the email
and put[ting] it in the user name space of the return path.”
United States v. Kilbride, 507 F. Supp. 2d 1051, 1062 (D. Ariz.
2007). For example, if the defendants sent an email “using the
domain name ‘shouldertricks.com’ and [if] the email was
8
A related issue—albeit one that neither the parties nor
Amicus explore—is whether providing ICANN with contact
information that many observers will recognize as false
qualifies as deceit. In theory, for instance, a domain registrant
could list her mailing address as Mars, Atlantis, or El Dorado.
These examples may well involve material falsification within
the meaning of the CAN-SPAM Act, given that the use of a
false address makes it more difficult for investigators to locate
the sender. See 18 U.S.C. § 1037(d)(2). But even these
hypotheticals entail deceit. While listing one’s home address
as Mars may come across as obviously untrue to an average
adult, it will still “giv[e] a false impression” to children and the
credulous. Valansi, 278 F.3d at 209. And Kawashima
implicitly rejected a parallel hypothetical: A conceivable way
of falsifying a tax return would be to include an imaginary
number or a figure with an impossible number of digits; yet
this possibility failed to prevent the Supreme Court from
classifying § 7206(1) as a crime that categorically entails
deceit. See Kawashima, 565 U.S. at 483–84. We follow the
same approach here.
26
received by an individual with the email address of
‘trresa@aol.com,’ [the] program would . . . show a return path
for the email of ‘trresa@shouldertricks.com.’” Id. Amicus
makes much of Kilbride because, as DHS admits, “[n]o
reasonable recipient would have been misled into thinking he
sent himself [emails].” Dep’t’s Supp. Br. at 25. But recipients
(or, as is more likely, law enforcement investigators) may well
have been misled into thinking the messages originated from
the account displayed in the headers. That constitutes deceit.
Amicus’s fallback argument draws on the CAN-SPAM
Act’s larger structure. In the subsection immediately
preceding §§ 1037(a)(3) and (a)(4), Congress made it a crime
“to relay or retransmit” commercial emails “with the intent to
deceive or mislead recipients . . . as to the origin of such
messages.” 18 U.S.C. § 1037(a)(2). According to Amicus, the
drafters’ use of the verb “deceive” in an adjacent provision
establishes that the “materially falsifies” element cannot be
coextensive with deceit. See Russello v. United States, 464
U.S. 16, 23 (1983). We agree that the juxtaposition of
§§ 1037(a)(3) and (a)(4), on one hand, and (a)(2), on the other,
reveals that “falsifi[cation]” and “decei[t]” are not identical.
That provides little help to Rad, however, because the Act
reflects that §§ 1037(a)(3) and (a)(4) focus more narrowly than
(a)(2), not more broadly. Unlike their sister provision, the
prohibitions on header and domain name spamming include
the limiting adverb “materially.” §§ 1037(a)(3), (a)(4). They
also hinge on “falsification,” id., and therefore exclude other
ways of deceiving others, such as “concealment or cheating,”
Kawashima, 565 U.S. at 484. So, while the Act’s structure
27
suggests that §§ 1037(a)(3) and (a)(4) may not criminalize all
deceitful conduct, it confirms that the only conduct those
provisions prohibit involves deceit.
In the end, our narrow, norms-based reading of
§§ 1037(a)(3) and (a)(4) turns out to be decisive.9 Because the
Act targets false statements made in contexts where internet
users expect accuracy, even the least culpable violations entail
deceit. We thus affirm the Board’s judgment that Rad’s
offenses fulfill 8 U.S.C. § 1101(a)(43)(M)(i)’s fraud or deceit
requirement. That does not end our inquiry, however, because
DHS also bears the burden of showing that Rad’s crimes reflect
over $10,000 in victim losses. To that subject, we now turn.
9
We acknowledge that our reading diverges from the
Board’s. But the Board’s interpretation, which construes the
Act’s interstate commerce element as including a mens rea
requirement, conflicts with well-settled interpretative
principles. See Torres v. Lynch, 136 S. Ct. 1619, 1631 (2016)
(“[C]ourts have routinely held that a criminal defendant need
not know of a federal crime’s interstate commerce connection
to be found guilty.”). And, “[a]lthough we give Chevron
deference to the [Board]’s interpretation of the aggravated
felony provisions of the INA if we determine that the statute is
ambiguous,” the Board “is not entitled to Chevron deference
as to whether a particular federal criminal offense is an
aggravated felony.” Bobb v. Att’y Gen., 458 F.3d 213, 217 n.4
(3d Cir. 2006).
28
B. The Victim Loss Element
The final question we confront is whether Rad’s crimes
inflicted victim losses that exceed the statutory threshold.
Unlike the categorical approach applied above, our evaluation
of this element depends on “the specific way in which an
offender committed the crime” and we therefore retain
authority to consider any “sentencing-related material[]” that
sheds light on Rad’s conduct. Fan Wang, 898 F.3d at 349–50
(quoting Nijhawan, 557 U.S. at 42). In reviewing the Board’s
analysis of that material, we are bound by one of administrative
law’s most fundamental principles: We must judge an
agency’s decision “solely [on] the grounds [it] invoked.” Dia
v. Ashcroft, 353 F.3d 228, 241 (3d Cir. 2003) (quoting SEC v.
Chenery Corp., 332 U.S. 194, 196 (1947)).10 Because the
challenged order overlooks crucial differences between
sentencing hearings and immigration proceedings, we cannot
adopt the Board’s reasoning. Below, we catalog the problems
with its analysis, and then explain our decision to give DHS
one last chance to make its case.
1. Where the Challenged Order Errs
To understand why remand is required, one need look
no further than the Board’s order. Rather than examining
evidence from Rad’s sentencing hearing, the agency fixated on
10
“Where, as here, the B[oard] issues a written decision
on the merits, we review its decision, not that of the IJ.”
Moreno v. Att’y Gen., 887 F.3d 160, 163 (3d Cir. 2018)
(internal quotation marks omitted).
29
the outcome of that proceeding. Working backwards from the
thirty-five month sentence the District Court imposed for
Count I, the Board surmised that the Court must have “added
at least 6 levels based on victim loss—a determination that
would have required the court to assess the loss at greater than
$40,000.” A.R. 5. Otherwise, the Board reasoned, it would
have been “mathematically impossible” for the Court to
sentence Rad to as many months in prison as it did. Id. Having
inferred that the District Court found Rad responsible for over
$10,000 in losses under the Sentencing Guidelines, the Board
presumed it could do the same under the INA. What underlies
this result is the premise that loss determinations follow the
same rules no matter whether they occur in the course of an
immigration proceeding or a sentencing hearing.
But that premise is fundamentally flawed. Rather than
codifying similar standards for calculating losses, the
Guidelines and INA prescribe frameworks that differ in almost
every respect: They require that losses be connected to
different types of conduct, elaborate different tests for deciding
when an offender’s gains serve as a proxy for victims’ losses,
and hold the government to different burdens of proof. See
Singh, 677 F.3d at 511 (describing the Guidelines and INA as
“apples and oranges”). We outline these distinctions below,
and, in doing so, lay bare three defects in the Board’s
reasoning.
30
a) Whether Losses Must be Tied to
Convicted Conduct
One way that loss determinations under the Guidelines
and the INA diverge is that they train on different kinds of
conduct. For sentencing purposes, a district court may review
losses resulting from any “relevant conduct,” which “need not
be admitted, charged in the indictment, or proven to a jury.”
Alaka v. Att’y Gen., 456 F.3d 88, 108 (3d Cir. 2006); see
U.S.S.G. § 1b1.3(a); United States v. Payano, 930 F.3d 186,
198 (3d Cir. 2019) (“[A] sentencing court possesses great
discretion in the conduct it may consider . . . even if the
conduct was not proven at trial[.]”). For immigration purposes,
however, the agency must “focus narrowly on the loss amounts
that are particularly tethered to convicted counts.”11 Alaka,
456 F.3d at 107; see Knutsen v. Gonzales, 429 F.3d 733, 736–
37 (7th Cir. 2005) (explaining that the “plain language” of the
INA “forecloses inclusion of losses stemming from
unconvicted offenses”). And even then, in contrast to the
Guidelines, see Singh, 677 F.3d at 511–12, the amounts must
reflect actual and not merely intended losses, at least in the case
11
To be clear, while the Board cannot consider losses
stemming from unconvicted conduct when analyzing
§ 1101(a)(43)(M)(i), our decision today does not prevent the
agency from reviewing that conduct when deciding whether to
grant discretionary relief, such as cancellation of removal, see
id. § 1229b(b)(1). See In re C-V-T-, 22 I. & N. Dec. 7, 11–12
(BIA 1998) (empowering IJs to account for the “nature,
recency, and seriousness” of a noncitizen’s crimes when
determining whether to afford discretionary relief).
31
of substantive offenses, see Section III.B.2 infra (addressing
conspiracy and attempt offenses). To visualize the relationship
between these standards, imagine two concentric circles: The
INA, the inner circle, covers actual losses tied to the convicted
conduct itself, while the Guidelines, the outer circle,
encompasses both actual and intended losses from convicted
conduct and all other related conduct.
This case illustrates that distinction. At its core, the
Board’s loss analysis centers on the allegations that Rad
conspired to “pump” the price of penny stocks by misleading
investors and then “dump” his shares of those stocks at a profit.
A.R. 4–5. But most of the indictment’s counts feature CAN-
SPAM Act charges, and only one, the conspiracy-to-commit-
securities-fraud count, alleges that Rad duped investors into
buying stocks that later declined in value. And, although the
Board presumed Rad was guilty of securities fraud, the verdict
form reveals that the jury declined to convict Rad of that
charge. Thus, the agency’s loss analysis rests on the mistaken
assumption that the District Court found Rad guilty of
securities fraud, and that victim losses are attributable to him
on that basis.
That error would make little difference if the Guidelines
governed. In that scenario, the Board could easily characterize
the unconvicted aspects of the pump-and-dump scheme as
“related” to Rad’s CAN-SPAM Act convictions. Id.; see
U.S.S.G. § 1B1.3(a) (defining as related conduct “all acts and
omissions . . . by the defendant . . . that occurred during the
commission of the defense of conviction”). Under the INA,
32
however, the agency can only consider losses stemming from
the pump-and-dump scheme if that scheme embodies the
“specific way” Rad committed the CAN-SPAM Act
conspiracy counts, Nijhawan, 557 U.S. at 34, or if a “direct
link” ties the conduct underlying those counts to investors’
losses, Fan Wang, 898 F.3d at 351. It could be the case, for
example, that Rad’s use of false headers and domain names
enabled him to reach more investors or earn greater trust from
the investors he did reach, prompting them to purchase stocks
that ultimately declined in value. Whatever the connection
between Rad’s CAN-SPAM Act offenses and investor losses,
however, the challenged order omits any discussion of it.
Whether any victim losses are “particularly tethered” to Rad’s
convictions is thus an issue we must leave for the BIA to
resolve in the first instance. Alaka, 456 F.3d at 107.
b) How an Offender’s Gains Affect
the Loss Calculation
Another difference between sentencing hearings and
immigration proceedings is the role an offender’s gains play in
the loss determination. The Guidelines make clear that when
“there is a loss but it reasonably cannot be determined,” a
district court may increase the offense level based on “the gain
that resulted from the offense.” U.S.S.G. § 2B1.1, cmt. n.3(b).
The relevant INA section, by contrast, trains on “loss to the
victim or victims,” 8 U.S.C. § 1101(a)(43)(M)(i), and makes
33
no provision for the agency to treat gains and losses as
interchangeable.12
This is not to say that the Board may never use an
offender’s gains to support the loss element. In many cases, a
defendant’s earnings will provide powerful circumstantial
evidence of victim loss.13 In a fraud case, for instance, DHS
may be able to show the statutory threshold is satisfied by using
the defendant’s commission percentage to estimate the volume
of fraudulent sales. As this example attests, DHS can establish
the loss element without specifically identifying a victim or
12
The Board’s decision does not purport to interpret the
INA’s loss element, and, in any event, we refuse to afford
Chevron deference to unpublished Board decisions. See Mahn
v. Att’y Gen., 767 F.3d 170, 173 (3d Cir. 2014) (“We join our
sister circuits in concluding that unpublished, single-member
B[oard] decisions are not entitled to Chevron deference.”).
13
In this respect, the INA resembles a previous version
of the Guidelines, which did not authorize courts to treat gains
as a substitute for losses. See United States v. Hoffecker, 530
F.3d 137, 197 (3d Cir. 2008) (“The court need only make a
reasonable estimate of the loss, given the available
information.”) (quoting U.S.S.G. § 2F1.1, cmt. 8 (1997), a
now-deleted subsection). Under that version of the Guidelines,
the question was whether “some logical relationship [links] the
victim’s loss and the defendant’s gain so that the latter can
reasonably serve as a surrogate for the former.” United States
v. Dickler, 64 F.3d 818, 826 (3d Cir. 1995). We read the INA
as requiring the agency to answer a similar question whenever
it uses an offender’s gains as a proxy for victim losses.
34
victims; all the statutory text requires is that victims exist, and
that they have collectively lost over $10,000. See 8 U.S.C.
§ 1101(a)(43)(M)(i).
What is fatal to the challenged order is not that the
agency used gains to estimate losses, but that it simply equated
them, without evaluating how, if at all, Rad’s earnings relate to
investor harms. And, contrary to DHS’s suggestion, the
District Court’s sentencing decision cannot fill the gap left by
the agency’s missing analysis. Considering that the Guidelines
leave open the possibility that the District Court elevated Rad’s
offense level without calculating the losses attributable to his
conduct, and that the Probation Office urged that approach, we
have no assurance that the Court found Rad’s crimes to have
caused over $10,000 in losses. Ultimately, then, the Board’s
failure to substantiate any relationship between Rad’s profits
and investors’ injuries supplies a second ground on which to
disapprove the challenged order.
c) Which Burden of Proof Governs
A third distinction between the Guidelines and the INA
is that they articulate different burdens of proof. While a
preponderance-of-the-evidence standard applies at sentencing,
see United States v. Fisher, 502 F.3d 293, 305 (3d Cir. 2007),
a clear-and-convincing evidence standard governs removal
proceedings, see Kiareldeen, 273 F.3d at 553. Given that the
District Court analyzed the loss issue under a different and less
demanding burden of proof, the agency would have needed to
perform an independent review of the evidence to confirm that
35
Rad’s crimes inflicted harm. See Nijhawan, 557 U.S. at 42
(directing the Board to “assess findings made at sentencing
‘with an eye . . . to the burden of proof of employed’”) (quoting
In re Babaisakov, 24 I. & N. Dec. 306, 319 (2007)). Neither
the Board nor the IJ did so. That provides us with yet another
reason to reject the agency’s loss analysis.
To sum up, whether a victim loss question implicates
the Guidelines or the INA has sweeping consequences. It
determines whether losses must be tethered to convicted
conduct, dictates the role the offender’s gains play in the loss
calculation, and decides the relevant burden of proof. Yet the
challenged order glosses over these differences and instead
treats the Guidelines and the INA as coextensive. This error
infects almost every aspect of the agency’s analysis, from the
conduct it examined to the standard it applied. Because we are
bound to review what the Board did, not what it might have
done, we have no choice but to vacate the challenged order.
See Dia, 353 F.3d at 241.
2. Why Remand Is Warranted
All that remains is to decide whether to give the Board
what would be a third chance to evaluate this element. When
an agency has “had two opportunities to address the legal and
factual issues” in a case, we normally refuse to “give it a third
bite at th[e] apple.” Yusupov v. Att’y Gen., 650 F.3d 968, 993
(3d Cir. 2011) (quoting Zhu v. Gonzales, 493 F.3d 588, 602
(5th Cir. 2007)). That is especially true where, as here, the
Board failed to meaningfully revise its reasoning after the first
36
remand. Though DHS’s motion to remand highlighted
controlling cases that the initial order overlooked, including an
opinion that emphasizes the disjunction between the INA and
the Guidelines, see Singh, 677 F.3d at 511, the agency persisted
in ignoring those authorities. Should this troubling trend
continue, we will have no choice but to eschew remand and
instead direct the Board to reject DHS’s request to remove Rad.
See, e.g., Yusupov, 650 F.3d at 993.
In this case, however, we find ourselves compelled to
give the Board one last opportunity to review the victim loss
element. The Supreme Court announced in Florida Power &
Light Co. v. Lorion that “if [an] agency has not considered all
relevant factors . . . the proper course, except in rare
circumstances, is to remand to the agency for additional
investigation or explanation.” 470 U.S. 729, 744 (1985).
Thus, we remand at this point not to permit the Board to retread
the evidence and arguments it has twice encountered, but to
allow it to examine an avenue for attributing victim losses that
it never considered. See Kang v. Att’y Gen., 611 F.3d 157, 168
(3d Cir. 2010) (explaining that we decline to remand only when
“application of the correct legal principles to the record could
lead . . . to [a single] conclusion” (emphasis omitted)).
More specifically, Rad’s offenses may reflect intended,
rather than actual, losses. As discussed above, the jury
convicted Rad of conspiracy to violate §§ 1037(a)(3) and
(a)(4), not substantive violations of those provisions. That
matters because Rad’s crimes implicate 8 U.S.C.
§ 1101(a)(43)(U), which establishes that “an attempt or
37
conspiracy to commit” an offense under § 1101(a)(43)(M)
counts as an aggravated felony. In the past, we have
acknowledged that a question exists as to whether “intended
loss” may “satisf[y] the loss requirement for attempts or
conspiracies to commit a deceit offense under subparagraph
(U),” but we have not had occasion to resolve the issue. Singh,
677 F.3d at 511 n.7.
Today, we join the Second Circuit, Ninth Circuit, and
Board in recognizing that a conspiracy or attempt to commit
fraud or deceit involving over $10,000 in intended losses
qualifies as an aggravated felony.14 See Li v. Ashcroft, 389
F.3d 892, 896 n.8 (9th Cir. 2004), overruled on other grounds
by Nijhawan, 557 U.S. 29; Ljutica v. Holder, 588 F.3d 119,
125–26 (2d Cir. 2009); In re S-I-K-, 24 I. & N. Dec. 324, 327
(BIA 2007). This makes sense both as a textual matter and as
a practical one. Read together, subsections M and U define an
“offense” as conduct that “involves fraud or deceit in which the
loss to the victim . . . exceeds $10,000,” and go on to clarify
that “an attempt or conspiracy to commit” that “offense”
constitutes an aggravated felony. 8 U.S.C.
14
The Ninth Circuit also suggested that “potential” loss
may satisfy 8 U.S.C. § 1101(a)(43)(U). Li, 389 F.3d at 896
n.8. Under our precedent, however, a conspiracy must feature
“an intent to achieve a common illegal goal.” United States v.
John-Baptiste, 747 F.3d 186, 204–05 (3d Cir. 2014) (emphasis
added). Thus, a noncitizen cannot “conspir[e] to commit” an
offense under § 1101(a)(43)(M)(i) unless he intends to commit
a crime that would, if completed, result in over $10,000 in
losses. § 1101(a)(43)(U).
38
§§ 1101(a)(43)(M)(i), (U). It follows that a conspiracy to
inflict losses satisfies subsection U, even if it never produces
harm. And, because many conspiracies involve no actual
losses at all, a contrary conclusion would dramatically limit the
scope of subsection U as applied to subsection M—a result
Congress is unlikely to have intended. See United States v.
Watkins, 339 F.3d 167, 178 (3d Cir. 2003) (“A conspiracy
charge does not require proof of success in committing the
offense[.]”).
On remand, the Board must decide whether, in
conspiring to violate §§ 1037(a)(3) and (a)(4), Rad intended to
cause over $10,000 in investor losses. Perhaps Rad agreed to
use false headers and domain names to evade spam filters,
reach a larger audience, and induce more investors to purchase
stocks he expected to plummet in value. Perhaps Rad meant
for the false headers and domain names to confuse investors,
prompting them to launch costly investigations. See, e.g., Tian
v. Holder, 576 F.3d 890, 896 (8th Cir. 2009) (finding that
expenses a victim incurred in investigating computer crimes
satisfied the INA’s $10,000 loss requirement). Or perhaps not.
We express no opinion as to the ultimate outcome and leave it
to the agency to explore these and other possibilities on
remand.
IV. Conclusion
For the foregoing reasons, we grant the petition for
review, vacate the Board’s removal order, and remand for
39
further consideration of whether Rad’s CAN-SPAM Act
convictions reflect over $10,000 in intended losses.
40