RECOMMENDED FOR PUBLICATION
Pursuant to Sixth Circuit I.O.P. 32.1(b)
File Name: 21a0231p.06
UNITED STATES COURT OF APPEALS
FOR THE SIXTH CIRCUIT
┐
UNITED STATES OF AMERICA,
│
Plaintiff-Appellee, │
> Nos. 19-4247/4273
│
v. │
│
BOGDAN NICOLESCU (19-4247); RADU MICLAUS │
(19-4273), │
Defendants-Appellants. │
│
┘
Appeal from the United States District Court for the Northern District of Ohio at Cleveland.
No. 1:16-cr-00224—Patricia A. Gaughan, District Judge.
Argued: March 3, 2021
Decided and Filed: October 5, 2021
Before: WHITE, LARSEN, and NALBANDIAN, Circuit Judges.
_________________
COUNSEL
ARGUED: David L. Doughten, Cleveland, Ohio, for Appellant in 19-4247. Catherine Adinaro
Shusky, OFFICE OF THE FEDERAL PUBLIC DEFENDER, Cleveland, Ohio, for Appellant in
19-4273. Laura McMullen Ford, UNITED STATES ATTORNEY’S OFFICE, Cleveland, Ohio,
for Appellee. ON BRIEF: David L. Doughten, Cleveland, Ohio, for Appellant in 19-4247.
Catherine Adinaro Shusky, OFFICE OF THE FEDERAL PUBLIC DEFENDER, Cleveland,
Ohio, for Appellant in 19-4273. Laura McMullen Ford, UNITED STATES ATTORNEY’S
OFFICE, Cleveland, Ohio, for Appellee.
WHITE, J., announced the judgment and delivered the opinion of the court in which she
joined in all but Section III.D., and LARSEN and NALBANDIAN, JJ., joined in full. WHITE,
J. (pp. 28–29), delivered a separate opinion dissenting from Part III.D. of the court’s opinion.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 2
_________________
OPINION
_________________
HELENE N. WHITE, Circuit Judge [Except as to Section III.D.]. For nine years,
Defendants-Appellants Radu Miclaus and Bogdan Nicolescu ran a sophisticated, multimillion-
dollar cyber-fraud ring out of Romania. They were extradited to the United States, and a federal
jury in Ohio convicted them of wire fraud, conspiracy to commit wire fraud, conspiracy to
commit computer fraud, aggravated identity theft, conspiracy to commit money laundering, and
conspiracy to traffic in counterfeit service marks. The district court sentenced them to eighteen
and twenty years’ imprisonment, respectively. On appeal, they raise several challenges to their
convictions and sentences. We AFFIRM their convictions, VACATE their sentences, and
REMAND for resentencing.
I.
Beginning around 2007, Nicolescu, Miclaus, and a handful of coconspirators began
posting fake car auctions on eBay. Their group, dubbed “Bayrob” by the FBI (a combination of
“eBay” and “robbery”), set up auctions that appeared to show vehicles for sale by US-based
sellers. In reality, Bayrob had neither vehicles to sell nor a US address. Operating from in and
around Bucharest, Romania, the group used various technologies to conceal its IP addresses, and
employed US-based “money mules,” (falsely described to victims as “eBay Escrow Agents”) to
collect payments from unsuspecting buyers. The money mules then wired the victims’ payments
to various locations in Europe, where individuals associated with Bayrob collected the payments
and brought them to Miclaus and Nicolescu in Romania. All told, the Bayrob group orchestrated
the eBay fraud more than 1,000 times and reaped between $3.5 million and $4.5 million.
At some point in 2014, Bayrob began employing a custom-made trojan horse virus to
facilitate new money-making schemes. Nicolescu, a skilled computer programmer, created the
virus, which he embedded in links in the group’s eBay auctions and in spam emails widely
disseminated by Bayrob. Once a victim clicked the link and downloaded the virus onto the
victim’s computer, it ran quietly in the background until the unsuspecting victim tried to visit
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 3
certain popular websites, including eBay, Facebook, PayPal, Gmail, Yahoo, and Walmart. At
that point, instead of connecting to the real website, the virus discreetly redirected the victim’s
computer to a look-a-likewebsite created by Bayrob, which collected the victim’s account
credentials, identities, and credit-card information, and stored it all on Bayrob’s servers in
Romania. Bayrob collected more than 70,000 account credentials this way, including 25,000
stolen credit-card numbers. Bayrob used the stolen credit cards to pay its own expenses,
including costs for server space, VPNs, and registering domain names, and it sold some of the
stolen credit cards on AlphaBay, a website on the dark web frequented by criminals, for prices
ranging from $1–$35.
Around the same time, Bayrob concocted a third money-making scheme. This time it
harnessed the processing power of its network of 33,000 virus-infected computers to “mine” for
cryptocurrency. Nicolescu’s trojan horse virus worked by commandeering an infected
computer’s processor and forcing it to solve difficult mathematical equations that
generate bitcoin, a process known as “cryptomining.” With their computers’ processing power
tied up generating bitcoin for Bayrob, the victims’ computers slowed to a crawl. Bayrob
exchanged the bitcoins generated by its cryptomining activities for cash, generating
approximately $10,000–$20,000 per month in 2014, and $30,000–$40,000 per month in 2015
and 2016.
The FBI caught on to Bayrob’s activities in 2015 and executed a search warrant on the
cell phone of Tiberiu Danet, a Bayrob member, as he traveled through the Miami airport. Using
information obtained from Tiberiu’s phone, the FBI and Romanian police executed a search
warrant on Nicolescu’s, Miclaus’s, and Tiberiu’s residences in Romania. The searches turned up
a trove of servers, hard drives, and other computing equipment used by the group. The FBI was
not able to decrypt much of the information on Bayrob’s servers, but the cache of seized files the
FBI was able to review included spreadsheets the group used to keep track of its victims and
spreadsheets showing money Bayrob had moving through its money-mule network in the United
States and Europe.
In 2016, Nicolescu and Miclaus were indicted for conspiracy to commit wire fraud,
twelve counts of wire fraud, conspiracy to commit computer fraud, conspiracy to traffic in
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 4
counterfeit service marks, five counts of aggravated identity theft, and conspiracy to commit
money laundering. They were convicted on all counts after a two-and-a-half-week jury trial.1
At Defendants’ sentencing hearing, FBI agent Ryan MacFarlane testified that the eBay
scheme generated between $3.5 million and $4.5 million in losses. The FBI calculated that
figure by reviewing spreadsheets Bayrob used to keep track of its victims and cross-referencing
the information in the spreadsheets with victim complaints filed with the FBI’s Internet Crime
Complaint Center (ICCC). MacFarlane estimated that the true eBay loss figure was substantially
higher than $3.5 to $4.5 million, since only 30–35% of victims filed complaints with the ICCC.
According to MacFarlane, true losses may have been as high as $10 million to $30 million.
At the conclusion of the sentencing hearing, the district court calculated Nicolescu’s and
Miclaus’s Guidelines range for the conspiracy-to-commit-money-laundering grouping (Counts
1–15 and 21). The district court added eighteen levels to their Guidelines calculation under
U.S.S.G. § 2B1.1(b)(1)(J) for causing a loss between $3.5 and $9.5 million, two levels under
U.S.S.G. § 2B1.1(b)(4) for being in the business of receiving and selling stolen property, two
levels under U.S.S.G. § 2B1.1(b)(11)(B)(i) for trafficking unauthorized access devices, four
levels under U.S.S.G. § 2B1.1(b)(19)(A)(ii) for having been convicted of an offense under
18 U.S.C. § 1030(a)(5)(A), and four levels under U.S.S.G. § 3B1.1(a) for being an organizer or
leader of criminal activity, as well as other enhancements not at issue in this appeal. The result
was an adjusted offense level of forty-three, which at criminal history category I produced a
Guidelines range of life imprisonment. Since a life sentence exceeded the statutory twenty-year
maximum on any of the offenses in the grouping, the parties agreed to (and the district court
applied) a five-level reduction for an applied total offense level of thirty-eight. After the
five-level reduction, Nicolescu’s and Miclaus’s Guidelines range was 235 to 293 months. They
were sentenced to 216 and 192 months’ imprisonment, respectively, on Counts 1 through 13 and
21, concurrent sentences of sixty months on Count 14 and 120 months on Count 15, and
mandatory twenty-four month sentences on Counts 16 through 20, to run concurrently with each
1The jury acquitted Nicolescu and Miclaus on sentencing enhancements under 18 U.S.C. § 3559(g)(1) for
false registration of domain names (pertaining to all counts).
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 5
other but consecutively to all the other sentences, for a total sentence of 240 (Nicolescu) and 216
(Miclaus) months’ imprisonment.
This appeal followed.
II.
Nicolescu and Miclaus each appeal one substantive count of conviction and the
application of multiple sentencing enhancements. We consider the challenges to their
substantive convictions first.
A.
Nicolescu contends the district court erred in denying his motion for acquittal based on
insufficiency of the evidence on Count 14, which charges conspiracy to violate 18 U.S.C.
§ 1030(a)(5)(A) and two other statutes.
We review a district court’s denial of a motion for judgment of acquittal de novo. United
States v. Howard, 947 F.3d 936, 947 (6th Cir. 2020). When reviewing the sufficiency of the
evidence, we assess “whether, after viewing the evidence in the light most favorable to the
prosecution, any rational trier of fact could have found the essential elements of the crime
beyond a reasonable doubt.” Jackson v. Virginia, 443 U.S. 307, 319 (1979).
The jury convicted Nicolescu and Miclaus on Count 14, which alleged a conspiracy with
three objects:
(i) to intentionally access a computer without authorization, and thereby obtain
information from a protected computer, and the offense was committed for
purposes of commercial advantage and private financial gain, in violation of Title
18, United States Code, Section 1030(a)(2)(C); and
(ii) to intentionally access a computer without authorization and by means of such
conduct furthered the intended fraud and obtained something of value,
specifically, money, in excess of 3 to 4 million dollars, in violation of Title 18,
United States Code, Section 1030(a)(4); and
(iii) to knowingly cause the transmission of a program, information, code, and
command, and, as a result of such conduct, intentionally cause damage without
authorization to a protected computer, and the offense caused damage affecting
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 6
ten or more protected computers in a one year period, in violation of Title 18,
United States Code, Sections 1030(a)(5)(A) and (c)(4)(B).
R. 1, PID. 24 (Indictment ¶ 89). On appeal, Nicolescu challenges the sufficiency of the evidence
on only the third object of the conspiracy, § 1030(a)(5)(A) and (c)(4)(B). Since this court must
assume the evidence on the two unchallenged objects was sufficient, his failure to challenge the
sufficiency of the evidence on the other two charged objects is fatal to his claim. See Griffin v.
United States, 502 U.S. 46, 56–57 (1991) (“[W]hen a jury returns a guilty verdict on an
indictment charging several acts in the conjunctive . . . the verdict stands if the evidence is
sufficient with respect to any one of the acts charged.” (alteration in original) (quoting Turner v.
United States, 396 U.S. 398, 420 (1970))). Moreover, the jury heard testimony from multiple
witnesses that Nicolescu’s computer virus caused its victims’ computers to run slowly because
the virus was using their computers’ processing power to mine for bitcoin. Such testimony was
enough for a reasonable juror to find that Nicolescu conspired to damage a protected computer,
in violation of § 1030(a)(5)(A) and (c)(4)(B).2
B.
Miclaus contends the district court erred in denying his motion for acquittal on Counts 16
through 20, which charged aggravated identity theft in violation of 18 U.S.C. § 1028A, because
2Nicolescu’s brief describes his challenge as one to the sufficiency of the evidence, see Nicolescu Br. at 43
(“The evidence is insufficient to establish that the appellant conspired to violate 18 U.S.C. §1030(a)(5)(A)”), but to
the extent Nicolescu intended to argue—as some of his briefing seems to suggest—that “slowing” of a computer
cannot constitute “damage” to a computer as a matter of law, see id. (“Here, Nicolescu challenges whether he caused
damage as required by the statute.”), this challenge too fails.
18 U.S.C. § 1030(e)(8) defines “damage” as “any impairment to the integrity or availability of data, a
program, a system, or information[.]” Applying the same statute in the civil context, we looked to the ordinary
meaning of the terms “impairment,” “integrity,” and “availability” and defined “damage” for purposes of
§ 1030(a)(5)(A) as “a transmission that weakens a sound computer system—or, similarly, one that diminishes a
plaintiff’s ability to use data or a system[.]” Pulte Homes, Inc. v. Laborers’ Int’l Union of N. Am., 648 F.3d 295,
301 (6th Cir. 2011). Nicolescu’s virus, which caused infected computers to “run very slowly,” R. 233, PID. 3729,
would constitute an “impairment to the integrity . . . of . . . [the] system.” See 18 U.S.C. § 1030(e)(8). In other
words, the virus was a “transmission that . . . diminishe[d] a [victim’s] ability to use . . . a system.” Pulte Homes,
Inc., 648 F.3d at 301; see also United States v. Carlson, 209 F. App’x 181, 184–85 (3d Cir. 2006) (finding that
criminal defendant intentionally caused “damage” to victim’s computer under § 1030(a)(5)(A) when he flooded
victim inboxes with thousands of spam emails, “which would clog the address, result in delays, and at times require
the purging of all e-mails, causing valuable business-related e-mails to be permanently lost”).
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 7
the government did not present evidence that Miclaus aided and abetted the “use” of each of the
five aggravated-identity-theft victims’ credit cards. Miclaus Br. at 43–50.
We review the district court’s denial of Miclaus’s motion for judgment of acquittal de
novo, and again assess whether, viewing the evidence in the light most favorable to the
prosecution, any rational juror could have found the essential elements proven beyond a
reasonable doubt. Howard, 947 F.3d at 947.
To sustain a conviction for aggravated identity theft, the government must prove the
defendant “(1) knowingly used, without lawful authority, a means of identification of another
person; and (2) used that means of identification during and in relation to an enumerated
predicate felony.” United States v. Vance, 956 F.3d 846, 857 (6th Cir.), cert. denied, 140 S. Ct.
2819 (2020). Here, the alleged predicate felonies were computer fraud under § 1030 and wire
fraud under § 1343. The jury was instructed, pursuant to Sixth Circuit Pattern Jury Instruction
15.04, that “use” means “active employment of the means of identification during and in relation
to the [predicate felony]. Active employment includes activity such as displaying or bartering.
‘Use’ also includes a person’s reference to a means of identification in his possession for the
purpose of helping to commit the [predicate felony].” R. 242, PID. 5759–60. Miclaus does not
argue that a credit-card number is not a “means of identification,” nor does he challenge our
pattern jury instruction’s definition of “use,” so we assume the correctness of both here.
At trial, the jury heard that the names, addresses, and credit-card numbers of the five
victims identified in Counts 16 through 20 were found on one of Bayrob’s internal victim-
tracking spreadsheets (Exhibit 1204 at trial). An FBI agent testified that the FBI spoke with four
of the victims and the fifth victim’s wife and confirmed that the identity and credit-card
information in Bayrob’s spreadsheet was accurate. Some of the victims testified at trial and
confirmed the same. Valentin Dima, a Bayrob member who cooperated with the government,
testified that Bayrob had a practice of testing the validity of each credit-card number before
adding it to its victim-tracking spreadsheets by “creating e-mail addresses through Yahoo, and
then . . . upgrad[ing] the account [to] Yahoo plus,” which required a valid credit card, to see if
each stolen credit card was still valid. R. 240, PID. 5341–42. The spreadsheet contained a
column with “0’s” and “1’s” for each card, with “1” indicating that the card was still valid and
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 8
could be used for purchases, and “0” indicating that the card did not work. The spreadsheet
contained another column where Bayrob members noted operational purchases they made with
the stolen cards, including for website hosting and VPNs.
Miclaus contends the government failed to prove Bayrob “used” each victim’s credit-card
number because not every victim testified that fraudulent purchases were made on their credit
cards. Miclaus’s challenge fails because even if fraudulent purchases were not made on each
card, Dima testified that his job was to test each credit card before adding it to the spreadsheet,
and the jury could see that the spreadsheet contained “0’s” and “1’s” for each card. 3 A means of
identification is “used” whenever it is “employ[ed]” or “convert[ed] to one’s service.” United
States v. Michael, 882 F.3d 624, 626 (6th Cir. 2018) (quoting Webster’s New International
Dictionary 2806 (2d ed. 1942)). Sending a stolen credit-card number to Yahoo as part of a sham
email account upgrade transaction for the sole purpose of having Yahoo run that credit-card
number and report back whether it is still valid for future operational purchases is an “active
employment” of that stolen credit-card number. Indeed, situations where a defendant
impersonates a victim—as Bayrob did when it purported to be each of the victims in transactions
with Yahoo—were the “principal target” of § 1028A. Michael, 882 F.3d at 627. Accordingly,
when viewed in the light most favorable to the government, the evidence was sufficient for a
reasonable juror to find Miclaus guilty on Counts 16 through 20.
C.
Miclaus also challenges the substance of the district court’s aggravated-identity-theft jury
instruction. He contends that it omitted an element: that Miclaus be found to have committed an
enumerated felony.
Miclaus did not object to the instruction at trial, so we review for plain error. United
States v. Small, 988 F.3d 241, 254 (6th Cir. 2021). “In the context of challenges to jury
3Even if Dima did not specifically testify that he tested each of the five aggravated-identity-theft victims’
credit-card numbers, Dima’s testimony about his activities testing cards, coupled with the evidence that the
spreadsheet contained either a “0” or a “1” for every card, is circumstantial evidence that the five
aggravated-identity-theft victims’ credit-card numbers were tested. “Circumstantial evidence alone is sufficient to
sustain a conviction and such evidence need not remove every reasonable hypothesis except that of guilt.” Howard,
947 F.3d at 947 (quoting United States v. Lowe, 795 F.3d 519, 522–23 (6th Cir. 2015)).
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 9
instructions, plain error requires a finding that, taken as a whole, the jury instructions were so
clearly erroneous as to likely produce a grave miscarriage of justice.” Id. (quoting United States
v. Newsom, 452 F.3d 593, 605 (6th Cir. 2006)).
As noted in the preceding section, to sustain a conviction for aggravated identity theft, the
government must prove the defendant “(1) knowingly used, without lawful authority, a means of
identification of another person; and (2) used that means of identification during and in relation
to an enumerated predicate felony.” Vance, 956 F.3d at 857. Here, the indictment alleged the
predicate felonies were “Computer Fraud” under § 1030, and “Wire Fraud” under 18 U.S.C.
§ 1343, which are predicate felonies under § 1028A. See § 1028A(c)(4) (predicate offenses
include provisions in chapter 47, which includes § 1030 computer fraud); § 1028A(c)(5)
(predicate offenses include provisions in chapter 63, which includes § 1343 wire fraud).
Paragraph 123 of the indictment alleges:
123. From on or about February 25, 2013, through on or about July 1, 2015, in
the Northern District of Ohio, Eastern Division, and elsewhere, Defendants
BOGDAN NICOLESCU, TIBERIU DANET, and RADU MICLAUS, and others
presently known and unknown to the Grand Jury, did knowingly use, without
lawful authority, a means of identification of another person during and in relation
to a felony violation enumerated in Title 18, United States Code, Section
1028A(c), to wit, the commission of Computer Fraud, a violation of Title 18,
United States Code, Section 1030, and Wire Fraud, a violation of Title 18, United
States Code, Section 1343, knowing that the means of identification belonged to
another actual person, in violation of Title 18, United States Code, Sections
1028A(a)(l) and 2.
R. 1, PID 34 (Indictment ¶ 123). At trial, the district court’s jury instruction on the aggravated-
identity-theft count read:
Counts 16 through 20 of the indictment charge Defendants Bogdan Nicolescu and
Radu Miclaus with the crime of aggravated identity theft, Title 18 United States
Code, Sections 1028A(a)(1) and 2.
Count 16 through 20 of the indictment charge each Defendant with using a means
of identification of another person during and in relation to a felony violation
listed in the statute.
For you to find each Defendant guilty of this crime, you must find that the
Government has proved each and every one of the following elements beyond a
reasonable doubt.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 10
First, that each Defendant committed the following violation charged in Count 16
through 20. The violation charged in Count 16 through 20 is a felony violation
listed in the statute;
Second, that each Defendant knowingly used a means of identification of another
person without lawful authority;
Third, that each Defendant knew the means of identification belonged to another
person;
Fourth, that the use was during and in relation to the crime charged in Counts 16
through 20;
...
The term “during and in relation to” requires that the means of identification have
some purpose or effect with respect to the crime charged in Counts 16 through 20.
In other words, the means of identification must facilitate or further or have the
potential of facilitating or furthering the crime charged in Counts 16 through 20,
and its presence or involvement cannot be the result of accident or coincidence.
R. 242, PID. 5758–61.
Miclaus is correct that the district court’s aggravated-identity-theft jury instruction was
erroneous. The instruction should have specified, when describing the first and fourth elements
and defining the term “during and in relation to,” that the predicate felonies charged in Counts 16
through 20 were § 1343 wire fraud and § 1030 computer fraud. Instead, the instruction referred
back to Counts 16 to 20 as a whole. Such an error does not automatically warrant reversal,
however. See United States v. Kuehne, 547 F.3d 667, 682 (6th Cir. 2008) (failure to instruct jury
on elements of predicate offense in 18 U.S.C. § 924(c)(1) conviction was harmless because “the
jury was presented with uncontroverted evidence supporting the predicate drug offenses”).
Indeed, in the context of this case, we find it highly unlikely that the district court’s error led any
juror astray.
To start, the jury had the indictment during its deliberations and the indictment clearly
explains that the predicate offenses are § 1030 computer fraud and § 1343 wire fraud. The jury
was instructed on the substantive elements of § 1030 computer fraud when it was instructed on
Count 14, which charged conspiracy to commit computer fraud, and on the substantive elements
of wire fraud when it was instructed on Counts 2 through 13, which charged wire fraud.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 11
It convicted Nicolescu and Miclaus on all twenty-one counts, including wire fraud and
conspiracy to commit computer fraud.
Further, the aggravated-identity-theft allegations were inextricably intertwined with the
computer-fraud and wire-fraud allegations. Over the course of the two-week trial, the jury heard
testimony from some of the aggravated-identity-theft victims that their computers became
infected with a virus after visiting an eBay auction, and it heard from the FBI that the
aggravated-identity-theft victims’ credit-card information was found in Bayrob’s internal
spreadsheets. That created the strong inference that Nicolescu and Miclaus obtained the victims’
credit-card information via the virus, and the jury was presented with no alternative explanation
for how the aggravated-identity-theft victims’ credit-card information ended up in
Bayrob’s spreadsheets. The jury then heard that Bayrob tested the stolen credit cards in
preparation for—and in some cases to actually make—operational purchases necessary to
support its vast online operation. This all adds up to a strong circumstantial case for aggravated
identity theft: Bayrob came into possession of the aggravated-identity-theft victims’ credit-card
information using the fake eBay auctions and the virus, which violated § 1343 and § 1030, and
they used the stolen credit-card information when they verified the cards and made operational
purchases with them, in violation of § 1028A. Because the offenses were so intertwined, it is
unlikely that any juror could have believed that Miclaus was guilty of aggravated identity theft
without also believing he was guilty of computer and wire fraud. We therefore find it unlikely
that the district court’s error “produce[d] a grave miscarriage of justice” here. Newsom, 452 F.3d
at 605. Miclaus’s claim is without merit.
III.
Nicolescu and Miclaus also challenge multiple sentencing enhancements applied by the
district court. We consider each in turn.
A.
The district court applied an eighteen-level Guidelines enhancement under U.S.S.G.
§ 2B1.1(b)(1)(J) for causing losses of more than $3.5 million and less than $9.5 million.
Nicolescu contends that was error because the government’s evidence only established a
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 12
$1.1 million gain for Bayrob as a result of the eBay scheme and $100,000 in fraudulent
purchases on victims’ credit cards. Nicolescu argues that though a loss calculation under
§ 2B1.1(b)(1)(J) may include intended losses in addition to proven losses, doing so in this case
rendered the district court’s loss calculation unduly speculative, since the government did not
provide wire transfer information for all $3.5 million in alleged losses and instead relied on a
$500-per-stolen-credit-card multiplier found in the Guidelines commentary to reach the
estimated loss figure. Nicolescu contends that the government should have been required to
present evidence of the credit limit of each of the stolen credit cards.
Under the Guidelines, if the loss attributable to a theft exceeds $3.5 million but is less
than $9.5 million, the district court is instructed to increase the offense level by eighteen levels.
§ 2B1.1(b)(1)(J). Section 2B1.1’s application notes define the applicable loss amount as “the
greater of actual loss or intended loss.” Id. § 2B1.1 cmt. n.3(A). “Actual loss” is “the reasonably
foreseeable pecuniary harm that resulted from the offense.” Id. § 2B1.1 cmt. n.3(A)(i).
“Intended loss” is “the pecuniary harm that the defendant purposely sought to inflict[,]” which
may include losses “that would have been impossible or unlikely to occur[.]” Id. § 2B1.1 cmt.
n.3(A)(ii). In calculating the loss amount, the district court “need only make a reasonable
estimate of the loss,” and its determinations are “entitled to appropriate deference.” Id. § 2B1.1
cmt. n.3(C). If the loss amount cannot reasonably be determined, the district court may use “the
gain that resulted from the offense as an alternative measure[.]” Id. § 2B1.1 cmt. n.3(B).
As a threshold matter, the district court cited both Agent MacFarlane’s testimony
regarding the eBay-auction scheme and the credit cards Bayrob sold on AlphaBay when
addressing the $3.5 million loss figure, but the district court found that “Agent Mac[F]arlane’s
testimony [about the losses attributable to the eBay scheme] alone satisfies the Government’s
burden.” R. 230, PID. 3257. Therefore, even if this court’s recent decision in United States v.
Riccardi renders invalid any loss calculation based on a $500-per-stolen-credit-card multiplier,
we need not address the stolen credit cards Bayrob sold on AlphaBay if the losses from the eBay
scheme —which do not rely on a multiplier—totaled more than $3.5 million. See 989 F.3d 476,
489 (6th Cir. 2021) (invalidating § 2B1.1 cmt. n.3(F)(i)’s $500-per-access-device multiplier).
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 13
We review the district court’s findings regarding the losses attributable to the eBay
scheme under a deferential clear-error standard. Id. at 487. In arriving at the $3.5 million loss
figure, the district court relied heavily on Agent MacFarlane’s testimony at the sentencing
hearing that the eBay scheme generated losses between $3.5 million and $4.5 million. The FBI
calculated that figure after reviewing victim information found in an unencrypted spreadsheet
that Bayrob members used to track payments from their victims, and then cross-referencing that
information with complaints in the FBI’s ICCC database and tallying the loss amounts from
those complaints. The FBI was able to match the information found on Bayrob’s servers with
particular victim complaints by looking at “specific indicators that were associated with the
Bayrob Group, such as known e-mail accounts, known money mules, known fax numbers and
other technical indicators that allowed [the FBI] to identify complaints that were related to the
Bayrob Group[.]” R. 230, PID. 3201. According to MacFarlane, the $3.5 million figure is based
only on “actual observed transactions” from ICCC “complaints that [the FBI was] able to
identify” that were also “consistent with the behavior of the Bayrob eBay fraud operation.” Id. at
3201–03. The FBI discounted ICCC complaints that alleged loss amounts that “weren’t
realistic.” Id. at 3202. And, according to MacFarlane, the $3.5 million figure is a “conservative
estimate” because only 30–35% of the eBay victims the FBI identified on Bayrob’s servers also
filed complaints with the ICCC. Id. at 3203–04. The FBI estimates that the actual losses from
the eBay scheme may have been as high as $30 million.
“In challenging the court’s loss calculation, [Nicolescu] must carry the heavy burden of
persuading this Court that the evaluation of the loss was not only inaccurate, but was outside the
realm of permissible computations.” United States v. Jackson, 25 F.3d 327, 330 (6th Cir. 1994).
Nicolescu’s primary argument is that the district court should have used traceable gains: here the
$1.1 million in wire transfers the FBI was able to trace through one of Bayrob’s money mules
back to Europe, instead of the $3.5 million figure provided by the FBI, which was based on
verified ICCC victim complaints, but was not always backed up by evidence of specific wire
transfers showing how each victim’s money ended up in Bayrob’s possession. The FBI was not
able to trace more victim wire transfers back to Bayrob because the FBI was not able to decrypt
much of the information on Bayrob’s servers, and MacFarlane testified that Nicolescu and
Miclaus declined to assist the FBI in identifying the other money mules the group used.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 14
Although more specificity about Bayrob’s illicit gains may have been preferable, “the
district court need only make a reasonable estimate of the loss using a preponderance of the
evidence standard.” United States v. Ellis, 938 F.3d 757, 760 (6th Cir. 2019) (quoting United
States v. Wendlandt, 714 F.3d 388, 393 (6th Cir. 2013)). And the Guidelines commentary
provides that the district court “shall use the gain that resulted from the offense as an alternative
measure of loss only if there is a loss but it reasonably cannot be determined.” § 2B1.1 cmt.
n.3(B) (emphasis added). Here, the district court based its $3.5 million loss calculation on
(i) Agent MacFarlane’s detailed testimony about the FBI’s efforts to identify specific victim
complaints attributable to Bayrob, including his assurances that the $3.5 million loss figure was
based on “actual observed transactions,” (ii) the district court’s own review of Bayrob’s internal
victim-tracking spreadsheets, and (iii) victim statements submitted to the district court. R. 230,
PID. 3258. Given the practical difficulties the government and the district court faced in
obtaining more precise detail about victim losses—some of which can be attributed to
Defendants’ decision to encrypt the files on their servers and their refusal to provide the FBI with
the decryption key—the district court’s reliance on victim statements and ICCC complaints was
reasonable, and we cannot say on the record before us that the district court’s $3.5 million loss
calculation was clearly erroneous.
B.
U.S.S.G. § 2B1.1(b)(4) provides for a two-level increase if “the offense involved
receiving stolen property, and the defendant was a person in the business of receiving and selling
stolen property[.]” At the sentencing hearing, the district court applied the two-level
§ 2B1.1(b)(4) enhancement because it found that Nicolescu and Miclaus “operated a long-
standing and highly sophisticated scheme” whereby they “obtained vast amounts of credit card
data, which [they] did, in fact, sell” on AlphaBay “even if [they were] not initially in the business
of buying and selling property.” R. 230, PID. 3263–64.
Nicolescu and Miclaus contend that was error because § 2B1.1(b)(4) was intended to
apply to defendants who “fence” stolen goods for others, and Bayrob was not a fence: it only
sold credit cards on the dark web that the group itself stole. Nicolescu Br. at 30; Miclaus Br. at
18. The government’s brief takes a broader view of the reach of the Guideline: the government
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 15
contends that § 2B1.1(b)(4) is not limited to fencing cases, and the language of § 2B1.1(b)(4)
covers situations where defendants “receive” stolen goods from a computer virus and then sell
them on the dark web. Appellee’s Br. at 44–45. Additionally, the government suggests that the
enhancement can apply when a defendant “receives” stolen property from a coconspirator and
then sells it—even when the object of the conspiracy was to steal the same property.
“When reviewing the district court’s application of the Sentencing Guidelines, we review
the district court’s factual findings for clear error and mixed questions of law and fact de novo.”
United States v. Tolbert, 668 F.3d 798, 800 (6th Cir. 2012) (quoting United States v. May,
568 F.3d 597, 604 (6th Cir. 2009)). We review the district court’s interpretation of the
Sentencing Guidelines de novo. Id.
By its terms, § 2B1.1(b)(4) applies “[i]f the offense involved receiving stolen property”
and “the defendant” was “in the business of receiving and selling stolen property[.]”
In determining whether a defendant is “in the business of” receiving and selling stolen property,
Application Note 5 to § 2B1.1 instructs courts to consider “(A) [t]he regularity and sophistication
of the defendant’s activities; (B) [t]he value and size of the inventory of stolen property
maintained by the defendant; (C) [t]he extent to which the defendant’s activities encouraged or
facilitated other crimes; [and] (D) [t]he defendant’s past activities involving stolen property.”
§ 2B1.1 cmt. n.5.
We have not yet addressed whether § 2B1.1(b)(4) is limited in its application to
defendants who sell goods that others have stolen, as opposed to defendants who sell goods they
have stolen themselves, but in United States v. Warshawsky, we addressed a prior version of the
same Guideline and explained that “[a] person ‘in the business of receiving and selling stolen
property’ is a person once referred to less flatteringly as a ‘fence.’” 20 F.3d 204, 214 (6th Cir.
1994). A few months later, citing Warshawsky, we recognized that for purposes of the
enhancement, there is a difference between “a person who receives stolen property” and a person
“who sells property that he himself has stolen[,]” because the Sentencing Commission “decided
that fences deserve longer sentences than mere thieves” because fencing facilitates and
encourages other crimes while mere thievery does not. United States v. Koehler, 24 F.3d 867,
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 16
871 (6th Cir. 1994). Accordingly, we explained that only those who sell goods that others have
stolen are subject to the “fencing” enhancement. Id.
Warshawsky and Koehler interpreted U.S.S.G. § 2B1.2, which was deleted and
consolidated with § 2B1.1 in November 1993. United States v. Vigil, 644 F.3d 1114, 1119 (10th
Cir. 2011). The 1993 amendment also added the first clause to the current iteration of the
enhancement, which now requires that “the offense involved receiving stolen property[.]” Id.
But neither the addition of the first clause nor consolidation with § 2B1.1 provides us with
reason to question what we said in Warshawsky and Koehler: the defendant must “receive”
stolen goods before he can be “in the business of receiving and selling stolen property.”
A defendant does not “receive” goods he himself stole. See United States v. McMinn, 103 F.3d
216, 219 (1st Cir. 1997) (“Under the common-law tradition, stealing property from another
normally does not equate with ‘receiving’ property from its rightful owner.”); Baugh v. United
States, 540 F.2d 1245, 1246 (4th Cir. 1976) (“[L]ogic . . . instructs us that there is an inherent
inconsistency in treating a taking as a receipt.”). Accordingly, § 2B1.1(b)(4) is limited in its
application to professional fences—it does not apply to thieves who merely sell goods they
stole.4 Our sister circuits have almost unanimously reached the same conclusion. See, e.g.,
United States v. Borders, 829 F.3d 558, 568 (8th Cir. 2016); Vigil, 644 F.3d at 1118; United
States v. Bradley, 644 F.3d 1213, 1287 (11th Cir. 2011); Kimbrew, 406 F.3d at 1152; McMinn,
103 F.3d at 219–21; United States v. Sutton, 77 F.3d 91, 94 (5th Cir. 1996); United States v.
Braslawsky, 913 F.2d 466, 468 (7th Cir. 1990) (coming to same conclusion about prior version
of the enhancement, § 2B1.2(b)(3)(A)). But see United States v. Collins, 104 F.3d 143, 144 (8th
Cir. 1997) (holding that a thief was “in the business” of receiving and selling stolen property
when he delivered goods he had stolen to an auction house and split the proceeds with the
auction house after the goods were sold).
4In 2001, the Sentencing Commission added Application Note 5 to § 2B1.1, which adopted a “totality of
the circumstances” test for determining whether a defendant’s fencing activities were frequent enough to consider
him “in the business of” receiving and selling stolen property. Vigil, 644 F.3d at 1120. Application Note 5 had the
effect of abrogating a different test this court had adopted in Warshawsky. Id. But the addition of Application Note
5 and the abrogation of the test adopted in Warshawsky does not affect our analysis here, since “both tests operate on
the predicate that the defendant is a fence.” United States v. Kimbrew, 406 F.3d 1149, 1154 (9th Cir. 2005).
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 17
Nonetheless, that holding does not end our inquiry here. In its brief, the government
contends that Nicolescu and Miclaus are eligible for the enhancement because they “received”
stolen credit cards from the computer virus Nicolescu created and Miclaus injected into his fake
eBay auction listings. Appellee’s Br. at 39–40. The government cites no authority in support of
its novel theory of receipt. We find the government’s theory to be linguistically untenable. The
virus was a tool created and employed by Nicolescu and Miclaus to steal victims’ credit-card
numbers. Tools and other inanimate objects do not commit larceny. People do. For that reason,
Defendants cannot “receive” stolen goods from their tools. Were we to adopt the government’s
reading, it would effectively collapse larceny and receipt of stolen goods—“distinct substantive
offense[s]” at common law—into the same offense. 76 C.J.S. Receiving Stolen Goods § 1
(2021); see also McMinn, 103 F.3d at 219. We decline to adopt such an anomalous
interpretation.
Moreover, our interpretation is consistent with the Application Note, which we are bound
to apply. See Stinson v. United States, 508 U.S. 36, 38 (1993); United States v. Paauwe, 968
F.3d 614, 618 (6th Cir. 2020). Application Note 5 to § 2B1.1 instructs courts to consider “[t]he
extent to which the defendant’s activities encouraged or facilitated other crimes” when deciding
whether to apply the enhancement. Fences induce others to commit property crimes by
providing them with a ready market for their stolen goods. See Warshawsky, 20 F.3d at 215;
Koehler, 24 F.3d at 871. Thieves who sell goods they stole typically do not. Here, the
government conceded at oral argument that there was no evidence that Bayrob sold goods stolen
by anyone outside of the group. Thus, there is no evidence that Nicolescu and Miclaus acted as
“fences.”
Alternatively, the government suggests that Nicolescu and Miclaus are subject to this
enhancement because the individuals within Bayrob responsible for stealing some of the credit
cards were not necessarily the same people who sold them on AlphaBay. Appellee’s Br. at 41
(“Nicolescu gave Valentin Danet access to Bayrob’s Alpha Bay account to sell the stolen credit
cards and provided the bitcoin payment wallets used for the sales.”); Appellee’s Br. at 45 (“[T]he
defendant[s] received some of the stolen data in part through phishing-initiated theft that was
developed by a co-conspirator.”); Oral Arg. at 28:50 (arguing that Nicolescu and Miclaus
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 18
received stolen cards from other Bayrob members who had personally stolen them). In other
words, the government’s argument is that an individual who “receives” stolen property from a
coconspirator and then sells it is operating as a fence. The government’s theory is untenable
where, as here, the object of the conspiracy was to steal the property. If two or more individuals
conspire to steal something, all members of the conspiracy are accountable for the theft. See
U.S.S.G. § 1B1.3(a)(1)(B) (outlining requirements to hold defendant liable for jointly undertaken
conduct in calculating advisory Guidelines sentencing range); United States v. Hamm, 952 F.3d
728, 744 (6th Cir. 2020) (discussing requirements for holding a defendant liable for the crimes of
a coconspirator under Pinkerton v. United States, 328 U.S. 640 (1946)); see also United States v.
Gilbert, 725 F. App’x 370, 373 (6th Cir. 2018) (discussing Pinkerton liability in the context of
aggravated identity theft). It would be strange, therefore, not to think of such conspirators as
participating in the theft, even if they do not do so physically or personally.
If an individual is responsible for stealing property, then he cannot fence the same
property. See Koehler, 24 F.3d at 871; Warshawsky, 20 F.3d at 214–15. Thus, even if other
members of Bayrob completed some of the credit-card thefts themselves and then passed those
cards on to Nicolescu or Miclaus to sell (or if defendants stole the cards and gave them to other
Bayrob members to sell), the “seller” did not receive stolen property within the meaning of
§ 2B1.1(b)(4). The seller conspired to steal. That made him a thief, not a fence. Cf. Kimbrew,
406 F.3d at 1150–54 (declining to apply fencing enhancement where defendant conspired to
obtain computers via fraud, which a coconspirator would then re-sell).
The government looks for contrary support in the Eighth Circuit’s decision in United
States v. Borders. See 829 F.3d at 568–69. In Borders, the Eighth Circuit found that it was not
clear error to apply § 2B1.1(b)(4) to a defendant who “often scouted and stole trucks” for another
defendant who gave him “shopping lists” of property to steal. Id. at 569. It also applied the
enhancement to the defendant who wrote the “shopping lists” and sold the property. Id. But
Borders’s § 2B1.1(b)(4) analysis did not grapple with the fact that both defendants were engaged
in a conspiracy to steal the property in question. As such, we do not find it instructive.
We conclude that the district court erred in applying a two-level enhancement under
§ 2B1.1(b)(4) for receiving and selling stolen property.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 19
C.
The district court applied a four-level leadership-role enhancement under U.S.S.G.
§ 3B1.1(a) to both Defendants’ Guidelines calculations. On appeal, Nicolescu, whose online
moniker was “Master Fraud 1,” R. 236, PID. 4383, contends that he was, in fact, not the master
of the frauds. He asserts that he “was not the leader in the money laundering” and was “equally
responsible as others, but had no more authority tha[n] at least two other members of Bayrob[.]”
Nicolescu Br. at 30–31. In his telling, only a two-level enhancement was warranted. Miclaus
argues that the leadership-role enhancement was not warranted because he “was not recruiting
members, writing code, maintaining the servers, or recruiting money mules” and “[h]is only roles
were to post fraudulent auctions on eBay and to, occasionally, accept money from Antonovici to
pass along to other members of the group.” Miclaus Br. at 39.
This court reviews “the district court’s legal conclusion that a person is an organizer or
leader under [§] 3B1.1 deferentially, and its factual findings for clear error.” United States v.
Sexton, 894 F.3d 787, 794 (6th Cir. 2018) (alteration in original) (internal quotation marks
omitted) (quoting United States v. House, 872 F.3d 748, 751 (6th Cir. 2017)). “Under the clear-
error standard, we abide by the court’s findings of fact unless the record leaves us with the
definite and firm conviction that a mistake has been committed.” Id. (quoting United States v.
Yancy, 725 F.3d 596, 598 (6th Cir. 2013)). The deferential review of the district court’s ultimate
legal conclusion is based on the recognition that the “trial judge is most familiar with the facts
and is best situated to determine whether someone is or is not a ‘leader’ of a conspiracy that the
jury found existed.” United States v. Washington, 715 F.3d 975, 983 (6th Cir. 2013).
Section 3B1.1(a) provides for a four-level increase “[i]f the defendant was an organizer
or leader of a criminal activity that involved five or more participants or was otherwise
extensive[.]” To decide whether a defendant was an “organizer or leader,” the Guidelines direct
courts to consider a number of factors, including
the exercise of decision making authority, the nature of participation in the
commission of the offense, the recruitment of accomplices, the claimed right to a
larger share of the fruits of the crime, the degree of participation in planning or
organizing the offense, the nature and scope of the illegal activity, and the degree
of control and authority exercised over others.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 20
§ 3B1.1 cmt. n.4. “The government bears the burden of proving that the enhancement applies by
a preponderance of the evidence.” United States v. Vandeberg, 201 F.3d 805, 811 (6th Cir.
2000). “A district court need not find each factor in order to warrant an enhancement.” United
States v. Castilla–Lugo, 699 F.3d 454, 460 (6th Cir. 2012).
Nicolescu. At the sentencing hearing, the district court explained that “[w]itnesses
testified that [Nicolescu] was the mastermind behind the entire operation” which “includes the
money laundering scheme.” R. 230, PID. 3275–76. The district court noted that Nicolescu was
“a constant member of the scheme,” and found that he was a leader in the conspiracy because he
“controlled the money mule network in the United States which was necessary to the success of
the money laundering scheme” and “provided directives to other members in the conspiracy.”
Id.
Ample evidence supported a finding that Nicolescu was the primary leader of the Bayrob
group and the orchestrator of its various schemes, including the money-laundering conspiracy.
Over the course of the two-and-a-half-week trial, the court heard how Nicolescu created the
computer virus, recruited the money mules, instructed the mules to divide the wire transfers into
increments below $3,000 to avoid detection, and kept 25% of the profits—the highest percentage
(along with two other members) in the Bayrob group. The district court did not err in applying a
four-level enhancement to Nicolescu’s Guidelines calculation under § 3B1.1(a).
Miclaus. The government argued that a four-level enhancement was warranted for
Miclaus because he was one of only two Bayrob members who had been with the group since its
inception, was responsible for hundreds of fraudulent auction postings on eBay, and was the
Bayrob member in charge of collecting money from Antonovici and the European money mules.
The district court summarily agreed, noting that “there can be more than one leader or organizer
of a criminal conspiracy[,]” and after recounting the § 3B1.1(a) factors, stating, “I do, in fact,
agree that Mr. Miclaus was, in fact, a leader or organizer, not the sole, but a leader or organizer.”
R. 230, PID. 3296.
Miclaus did not write code or set up physical or cyber infrastructure for the group, and he
received only 10% of the group’s profits—the smallest share of any of the Bayrob members.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 21
While these factors would seem to cut against a finding that Miclaus was a leader of the Bayrob
group, the § 3B1.1(a) enhancement was for the money-laundering conspiracy specifically, and
Miclaus had an outsized role in the group’s money-laundering activities: he was the group’s most
prolific poster on eBay—more than 947 fraudulent auctions—which generated the money that
was the raison d’etre of the money-laundering conspiracy, he recruited Antonovici to return to
the conspiracy after a multi-year absence, and he exercised control over Antonovici and the other
European money mules in his role as the Bayrob member responsible for collecting the profits
from the cryptomining scheme and the eBay fraud as they came in from the United States.
Miclaus and Nicolescu were also the only two constant members of the conspiracy, as other
members came and went over the years Bayrob operated. We must review the district court’s
decision to apply a leadership-role enhancement under § 3B1.1 deferentially, Sexton, 894 F.3d at
794, and on this record, we cannot conclude that the district court committed reversible error in
applying a four-level leadership-role enhancement to Miclaus’s Guidelines calculation.
D.
The district court imposed a two-level enhancement under U.S.S.G. § 2B1.1(b)(11)(B)(i),
which applies “[i]f the offense involved . . . the production or trafficking of any . . . unauthorized
access device.” Here, the district court concluded that Bayrob’s sale of stolen credit-card
numbers constituted trafficking in unauthorized access devices. See U.S.S.G § 2B1.1 cmt. n.10
(defining “unauthorized access device” as “any card . . . that can be used . . . to obtain money,
goods, services, or any other thing of value” that has been “stolen . . . with intent to defraud”).
Nicolescu and Miclaus don’t dispute that point. Instead, they say that Application Note 2 to
U.S.S.G. § 2B1.6 precludes the trafficking enhancement. That provision relates to their
aggravated identity theft convictions under 18 U.S.C. § 1028A.
The aggravated-identity-theft statute mandates a two-year sentence if, during the
commission of certain enumerated felonies, the defendant “knowingly transfers, possesses, or
uses, without lawful authority, a means of identification of another person[.]” 18 U.S.C.
§ 1028A(a)(1). A sentence under § 1028A must be served consecutively to any other sentence
imposed (except for another § 1028A sentence imposed at the same time). Id. § 1028A(b)(2),
(b)(4). For that reason, Application Note 2 to U.S.S.G. § 2B1.6 provides:
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 22
If a sentence [for aggravated identity theft] is imposed in conjunction with a
sentence for an underlying offense, do not apply any specific offense
characteristic for the transfer, possession, or use of a means of identification
when determining the sentence for the underlying offense. A sentence [for
aggravated identity theft] accounts for this factor for the underlying offense of
conviction, including any such enhancement that would apply based on conduct
for which the defendant is accountable under § 1B1.3 (Relevant Conduct).
U.S.S.G. § 2B1.6 cmt. n.2 (emphasis added). Because the mandatory two-year § 1028A
sentence already accounts for “the transfer, possession, or use of a means of identification”
during the commission of the predicate offense, Application Note 2 was added “to prevent a
defendant from being doubly penalized for the same conduct.” See United States v. Taylor,
818 F.3d 671, 675 (11th Cir. 2016). Nicolescu and Miclaus read Application Note 2 to say that
the mandatory § 1028A sentence already accounts for unauthorized-access-device trafficking.
Accordingly, they argue, the district court wrongly enhanced their total sentences twice for the
same conduct.
The district court reasoned that, despite the mandatory two-year sentence under § 1028A,
it could apply a two-level enhancement under § 2B1.1(b)(11)(B)(i) because “trafficking”
includes additional conduct not captured in “transfer, possession, or use.” R. 230, PID. 3268.
We have not yet opined on whether “transfer[ring] . . . a means of identification” as
contemplated in § 1028A and Application Note 2 to § 2B1.6 is synonymous with “trafficking
[an] unauthorized access device” as used in § 2B1.1(b)(11)(B)(i). If “transferring” and
“trafficking” are indeed synonymous, then an enhancement under § 2B1.1(b)(11)(B)(i) would
not be appropriate.5 But if the culpable conduct involved in “trafficking” is “different than or in
addition to” the “transfer, possession, or use,” then the enhancement can apply. See Taylor,
818 F.3d at 675. For example, in United States v. Lyles, we rejected a defendant’s argument that
Application Note 2 prevented a loss-based enhancement under U.S.S.G. § 2B1.1(b)(1). 506 F.
App’x 440, 446–47 (6th Cir. 2012). We explained that the loss-based enhancement “punishe[d]
5The phrase “means of identification” includes “unauthorized access devices.” See 18 U.S.C.
§§ 1028(d)(7)(D), 1029(e)(3); U.S.S.G §§ 2B1.1 cmt. n.10(A), 2B1.6 cmt. n.2. Therefore, these terms do not create
a meaningful distinction between the conduct covered in § 2B1.1(b)(11)(B)(i) and that covered in Application Note
2 to § 2B1.6.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 23
the defendant for inflicting a particular monetary harm rather than for transferring, possessing, or
using a means of identification.” Id. at 447.
Neither § 2B1.1(b)(11), § 2B1.6, nor the relevant commentary defines “traffic” or
“transfer.”6 When the Guidelines “do[] not define a term, we generally give the term its ordinary
meaning.” Riccardi, 989 F.3d at 486 (citation omitted). The ordinary meaning of “traffic”
carries a commercial aspect, which the word “transfer” does not. Compare “Traffic,” Oxford
English Dictionary, oed.com (“To engage in trade or commerce, esp[ecially] between one
country, region, or community and another; to buy and sell, or barter, goods or commodities; to
trade.”), and “Traffic,” Am. Heritage Coll. Dict. (3d ed. 1993) (“The commercial exchange of
goods; trade.”), with “Transfer,” Oxford English Dictionary, oed.com (“To convey or take from
one place, person, etc. to another; to transmit, transport; to give or hand over from one to
another.”), and “Transfer,” Am. Heritage Coll. Dict. (3d ed. 1993) (“To convey or cause to pass
from one place, person, or thing to another.”). As Nicolescu’s counsel conceded at oral
argument, trafficking is transfer plus something else, such as marketing or sale. So, although all
“trafficking” involves “transfer,” the converse is not true. Here, in addition to “transferring”
stolen credit-card numbers to others on the internet, Bayrob also marketed them on AlphaBay
and accepted payment in return for their sale. The commercial aspect of “trafficking” is not
captured by the § 1028A conviction, and the best reading of the Guidelines suggests that
“trafficking” unauthorized access devices should bear additional consequences that mere transfer
does not.
By contrast, a Guideline provision adjacent to § 2B1.1(b)(11)(B) illustrates the type of
enhancement that § 2B1.6 does prevent. That provision is § 2B1.1(b)(11)(C). It imposes a two-
level enhancement for “(i) the unauthorized transfer or use of any means of identification
6Our dissenting colleague points out that one statute defines “traffic” to mean “transfer, or otherwise
dispose of, to another, or obtain control of with intent to transfer or dispose of.” 18 U.S.C. § 1029(e)(5) (emphasis
added). But another nearby statute defines “traffic” to include a commercial component: “[T]he term ‘traffic’
means . . . (A) to transport, transfer, or otherwise dispose of, to another, as consideration for anything of value; or
(B) to make or obtain control of with intent to so transport, transfer, or otherwise dispose of.” Id. § 1028(d)(12)
(emphasis added). In any event, the relevant Guidelines and Application Notes define many other terms using
definitions contained in 18 U.S.C. §§ 1028 and 1029. But the Sentencing Commission has not chosen to do so with
respect to the word “traffic.” Therefore, these statutes are not binding, and we instead look to the ordinary meaning
of the disputed terms. See Riccardi, 989 F.3d at 486.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 24
unlawfully to produce or obtain any other means of identification, or (ii) the possession of 5 or
more means of identification that unlawfully were produced from, or obtained by the use of,
another means of identification.” U.S.S.G. § 2B1.1(b)(11)(C) (emphasis added). Both
§ 2B1.1(b)(11)(C) and § 2B1.6 use the terms “transfer,” “possession,” and “use.” Section
2B1.1(b)(11)(B) does not; it uses “trafficking.” Courts “usually ‘presume differences in
language like this convey differences in meaning.’” Wis. Central Ltd. v. United States,
138 S. Ct. 2067, 2071 (2019) (quoting Henson v. Santander Consumer USA Inc., 137 S. Ct.
1178, 1723 (2017)); see DePierre v. United States, 564 U.S. 70, 83 (2011) (“[T]he usual rule [is]
that ‘when the legislature uses certain language in one part of the statute and different
language in another, the court assumes different meanings were intended.’” (quoting Sosa v.
Alvarez-Machain, 542 U.S. 692, 711 n.9 (2004))); cf. United States v. Howse, 478 F.3d 729, 733
(6th Cir. 2007) (finding that identical language in two Guidelines provisions carried the same
meaning in each). Because nothing in the Guidelines or commentary suggests that this
presumption should not hold, Application Note 2 bars enhancements under § 2B1.1(b)(11)(C)
but not “trafficking” enhancements under § 2B1.1(b)(11)(B).
Additionally, treating “trafficking” and “transferring” as equivalent in this context, might
render superfluous parts of a related statute, 18 U.S.C. § 1028. “A statute should be construed so
that effect is given to all its provisions, so that no part will be inoperative or superfluous, void or
insignificant.” Hibbs v. Winn, 542 U.S. 88, 101 (2004) (citation omitted). Section 1028 makes it
a crime to “knowingly traffic[] in . . . authentication features for use in false identification
documents, document-making implements, or means of identification.” 18 U.S.C. § 1028(a)(8).
But it also, separately, makes it a crime to “knowingly . . . transfer[] . . . a document-making
implement or authentication feature . . . [to create] a false identification document.” Id.
§ 1028(a)(5). If “transferring” and “trafficking” are the same, these provisions would be
redundant.
We acknowledge that our holding charts a new course among our sister circuits, which
have held that the trafficking enhancement cannot apply to a defendant convicted of aggravated
identity theft. The First Circuit offered the earliest decision on point, reasoning that because the
“trafficking of a means of identification involve[s] a transfer,” it would violate Application Note
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 25
2 of § 2B1.6 to impose a trafficking enhancement in these circumstances. United States v. Jones,
551 F.3d 19, 25 (1st Cir. 2008) (emphasis added). Other circuits have followed the First
Circuit’s reasoning. See United States v. Charles, 757 F.3d 1222, 1226 (11th Cir. 2014); United
States v. Doss, 741 F.3d 763, 768 (7th Cir. 2013); United States v. Lyons, 556 F.3d 703, 708 (8th
Cir. 2009) (“Given that the plain meaning of trafficking involves a transfer, the enhancement in
§ 2B1.1(b)(10)(B)(i) for trafficking of an unauthorized access device is one such specific offense
characteristic that cannot be applied.” (emphasis added)).
But these circuits apply a different rule entirely to another component of the disputed
Guideline. In addition to covering the “trafficking” of an unauthorized access device,
§ 2B1.1(b)(11)(B) also applies to the “production” of such a device. “Production” would seem
to “involve” the “possession” (and potentially also the “use” or “transfer”) of an unauthorized
access device. Yet, no circuit has held that § 2B1.6 or Application Note 2 can prevent a
“production” enhancement. See Taylor, 818 F.3d at 676 (upholding an enhancement under
§ 2B1.1(b)(11)(B)(i) for “production of an unauthorized access device/means of identification
[because ‘production’] is separate and distinguishable from the mere transfer, possession, or use
of such device”); United States v. Jones, 792 F.3d 831, 835 (7th Cir. 2015) (same); United States
v. Jenkins-Watts, 574 F.3d 950, 962 (8th Cir. 2009) (same). And, in an unpublished opinion, so
have we. United States v. Wiley, 407 F. App’x 938, 942–43 (6th Cir. 2011).
Examining these “production” cases, the proper rule becomes clear: “[I]f the defendant’s
underlying conduct is limited to transfer, possession, or use of a means of identification of
another, then the enhancement cannot apply; if the conduct is different than or in addition to such
transfer, possession, or use, then the enhancement can apply.”7 Taylor, 818 F.3d at 675. As
discussed above, the ordinary meaning of “trafficking” is not “limited to transfer, possession, or
7Our dissenting colleague counters that the “production” cases are different because to “produce” is
defined in 18 U.S.C. § 1029(e)(4) as to “design, alter, authenticate, duplicate, or assemble.” We again question the
reliance of a definition outside of § 1028a, see supra note 7; but we acknowledge that the Application Notes to
§ 2B1.1 define “production” similarly, to “include[] manufacture, design, alteration, authentication, duplication, or
assembly,” § 2B1.1 cmt. n.10. Under this definition, a person engaged in “production” will in most instances also
possess or use an unauthorized access device. But that just confirms the point we make here—that the enhancement
under § 2B1.1(b)(11)(B) applies when a person does something different than, or in addition to, the transfer,
possession, or use of an unauthorized access device.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 26
use.” It involves marketing or sales activity beyond mere “transfer”—it is transfer plus
something more.
Bayrob’s marketing and sales of stolen credit cards constituted trafficking in
unauthorized access devices. Accordingly, the district court did not err in adding a two-level
enhancement under § 2B1.1(b)(11)(B)(i).
E.
The district court applied a four-level enhancement under U.S.S.G. § 2B1.1(b)(19)(A)(ii),
which applies when a defendant is convicted of an offense under § 1030(a)(5)(A). Miclaus and
Nicolescu were convicted on Count 14, which alleged a § 1030(a)(5)(A) violation as one of the
objects of a conspiracy under 18 U.S.C. § 371, but they were convicted of the § 371
conspiracy—not a substantive offense under § 1030(a)(5)(A). The government concedes error,
and we agree.8 The district court erred in applying a four-level enhancement under
§ 2B1.1(b)(19)(A)(ii) because Nicolescu and Miclaus were not convicted of an offense under
§ 1030(a)(5)(A).
IV.
The district court determined that after all the sentencing enhancements were applied,
Nicolescu and Miclaus had an adjusted offense level of forty-three. The parties then agreed to
subtract an additional five levels, down to an offense level of thirty-eight, which yielded a
Guidelines range of 235 to 293 months’ imprisonment.
The district court’s errors in imposing a two-level enhancement under § 2B1.1(b)(4) for
receiving and selling stolen property, and a four-level enhancement under § 2B1.1(b)(19)(A)(ii)
for being convicted of an offense under § 1030(a)(5)(A) resulted in six levels being erroneously
added to Nicolescu’s and Miclaus’s offense level. At thirty-seven, the correct level, their
category I criminal history yields a Guidelines range of 210 to 262 months’ imprisonment.
Though the district court sentenced Nicolescu and Miclaus below the incorrectly calculated
8Only Miclaus objected to this enhancement, but the government agreed to forego an abandonment
argument with respect to Nicolescu.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 27
range on Counts 1 through 13 and 21, and their sentences for those counts fall within (Nicolescu)
and below (Miclaus) the correctly calculated range, we cannot conclude that the errors were
harmless.9 “[B]ecause the Guidelines range is the starting point for the district court’s
analysis[,]” and absent some indication that the district court would have imposed the same
sentence regardless of the error, it is for the district court to “decide whether, starting from the
correct Guidelines range, a downward variance remains appropriate.” United States v.
Montgomery, 998 F.3d 693, 700 (6th Cir. 2021). Accordingly, we remand so that Nicolescu and
Miclaus can be resentenced under a correctly calculated Guidelines range.
V.
For the reasons set forth above, we AFFIRM Nicolescu’s and Miclaus’s convictions,
VACATE their sentences, and REMAND for resentencing.
9Miclaus failed to object to the § 2B1.1(b)(4) enhancement below, so our review with respect to Miclaus is
for plain error. But even under plain-error review, Miclaus is entitled to resentencing under a correctly calculated
Guidelines range because the error was clear, it affected his substantial rights, and it affected the fairness of the
proceedings below. See Rosales-Mireles v. United States, 138 S. Ct. 1897, 1907–08, 1911 (2018); Molina-Martinez
v. United States, 136 S. Ct. 1338, 1343 (2016).
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 28
_________________
DISSENT
_________________
HELENE N. WHITE, Circuit Judge, concurring in part and dissenting in part.
I would not affirm the imposition of the two-level enhancement under U.S.S.G.
§ 2B1.1(b)(11)(B)(i) for “trafficking” in unauthorized access devices.
The district court applied the two-level enhancement to the grouping that included the
wire-fraud convictions because the relevant conduct included Bayrob’s sale of stolen credit-card
information on AlphaBay, and the district court found that this conduct constituted “trafficking”
in unauthorized access devices for purposes of § 2B1.1(b)(11)(B)(i). I do not quarrel with that
aspect of the analysis. The problem with applying an enhancement under § 2B1.1(b)(11)(B)(i)
for “trafficking” in this case is that Defendants were also convicted of § 1028A aggravated
identity theft, and another provision of the Guidelines, Application Note 2 to U.S.S.G. § 2B1.6,
precludes any enhancement to the underlying offense (here, wire fraud) “for the transfer,
possession, or use” of a means of identification (the stolen credit-card information) when a
defendant is already subject to a mandatory two-year consecutive sentence under § 1028A for the
“transfer, possession, or use” of a means of identification. The application note recognizes that
allowing both would impermissibly punish the defendant twice for the same conduct. United
States v. Taylor, 818 F.3d 671, 675 (11th Cir. 2016).
“Trafficking” a stolen credit-card number necessarily involves transferring it. Neither
§ 2B1.1(b)(11)(B)(i) nor § 2B1.6 define “trafficking.” But 18 U.S.C. § 1029 (the very next
provision of the United States Code after § 1028A) which prohibits “traffic[king] in . . .
unauthorized access devices,” defines “traffic” to mean “transfer, or otherwise dispose of, to
another, or obtain control of with intent to transfer or dispose of[.]” § 1029(e)(5) (emphasis
added). Thus, in enhancing Defendants’ sentences for “trafficking” stolen credit-card numbers,
the district court also impermissibly punished them a second time for the inextricable element of
“transferring” them, which is expressly prohibited by Application Note 2 of § 2B1.6.
Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 29
That is why every court of appeals to consider the issue has held that the
§ 2B1.1(b)(11)(B)(i) “trafficking” enhancement cannot be imposed in these circumstances. See
United States v. Lyons, 556 F.3d 703, 708 (8th Cir. 2009) (“Given that the plain meaning of
trafficking involves a transfer, the enhancement in § 2B1.1(b)([11])(B)(i) for trafficking of an
unauthorized access device is one such specific offense characteristic that cannot be applied”
because of Application Note 2 to § 2B1.6); United States v. Jones, 551 F.3d 19, 25 (1st Cir.
2008) (holding that § 2B1.1(b)(11)(B)(i) enhancement was precluded by Application Note 2 to
§ 2B1.6 because under “the plain meaning of the words, [the defendant’s] trafficking of a means
of identification involved a transfer (though the reverse is not necessarily true)”); United States
v. Charles, 757 F.3d 1222, 1226–27 (11th Cir. 2014) (same); United States v. Doss, 741 F.3d
763, 766–68 (7th Cir. 2013) (same).
Lastly, the majority’s invocation of cases permitting an enhancement under the
“production” prong of § 2B1.1(b)(11)(B) is unavailing. The majority reasons that
“‘[p]roduction’ would seem to ‘involve’ the ‘possession’ (and potentially also the ‘use’ or
‘transfer’) of an unauthorized access device,” and so if we recognize production as a distinct
action supporting the enhancement, we should likewise permit an enhancement for trafficking
when “the [punished] conduct is different than or in addition to such transfer, possession, or
use.” Maj. Op. at 31. However, unlike trafficking, production is statutorily defined as different
in kind from “transfer, possession, or use.” While 18 U.S.C. § 1029’s definition of “traffic”
includes the word “transfer,” its definition of “produce” does not similarly include any aspect of
the § 1028A “transfer, possession, or use” language, defining it instead to include “design, alter,
authenticate, duplicate, or assemble.” § 1029(e)(4)-(5).
Accordingly, I dissent from the affirmance of the application of the § 2B1.1(b)(11)(B)(i)
enhancement.