United States v. Xavier Taylor , 818 F.3d 671 ( 2016 )


Menu:
  •                Case: 14-13288        Date Filed: 03/28/2016      Page: 1 of 21
    [PUBLISH]
    IN THE UNITED STATES COURT OF APPEALS
    FOR THE ELEVENTH CIRCUIT
    ________________________
    No. 14-13288
    ________________________
    D.C. Docket No. 0:14-cr-60009-JIC-1
    UNITED STATES OF AMERICA,
    Plaintiff-Appellee,
    versus
    XAVIER TAYLOR,
    Defendant-Appellant.
    ________________________
    Appeal from the United States District Court
    for the Southern District of Florida
    ________________________
    (March 28, 2016)
    Before WILSON, JULIE CARNES, and EBEL, ∗ Circuit Judges.
    ∗
    Honorable David M. Ebel, United States Circuit Judge for the Tenth Circuit, sitting by
    designation.
    Case: 14-13288       Date Filed: 03/28/2016       Page: 2 of 21
    WILSON, Circuit Judge:
    Defendant-appellant Xavier Taylor used stolen identity information to add
    himself as an authorized user to other individuals’ pre-existing credit card accounts
    and open new accounts in the names of stolen identities, causing banks to create
    new credit cards that included him as an authorized user. For this conduct, he was
    charged with and pleaded guilty to one count of trafficking in unauthorized access
    devices,1 in violation of 
    18 U.S.C. § 1029
    (a)(2), and one count of aggravated
    identity theft, in violation of 18 U.S.C. § 1028A(a)(1). At sentencing, the district
    court applied a two-level production enhancement pursuant to § 2B1.1 of the
    United States Sentencing Guidelines (the Guidelines) to the § 1029(a) conviction
    and sentenced Taylor to a total of sixty-one months’ imprisonment. This appeal
    followed, in which Taylor argues that interrelated provisions of the Guidelines
    preclude application of the production enhancement to his sentence.
    Specifically, Taylor contends that he does not qualify for the § 2B1.1
    production enhancement to his § 1029(a) conviction because a different provision
    of the Guidelines—§ 2B1.6—prohibits this enhancement for defendants who, like
    him, were also convicted under § 1028A. Taylor also avers that, even if the
    enhancement can apply in a § 1028A case, he did not “produce” unauthorized
    1
    An unauthorized access device is “any access device that is . . . obtained with intent to
    defraud.” 
    18 U.S.C. § 1029
    (e)(3); U.S.S.G. § 2B1.1 cmt. n.10(A). Unauthorized credit cards are
    unauthorized access devices. See United States v. Klopf, 
    423 F.3d 1228
    , 1239–40 (11th Cir.
    2005).
    2
    Case: 14-13288      Date Filed: 03/28/2016   Page: 3 of 21
    access devices given that an innocent third party (the banks, not Taylor or a
    criminal coconspirator) created the credit cards. We have not yet addressed these
    issues in a published opinion.
    After thorough consideration, we conclude that § 2B1.6 of the Guidelines
    does not prevent application of a § 2B1.1 production enhancement to a sentence
    imposed in conjunction with a § 1028A conviction when the underlying conduct at
    issue involves “production,” rather than conduct limited to “transfer, possession, or
    use.” We also hold that willfully causing an innocent third party to produce a
    fraudulent credit card qualifies as “production” under the Guidelines.
    Accordingly, we affirm the district court.
    I. Background
    Using stolen identities, Taylor contacted banks, gained access to credit card
    accounts, and added himself as an authorized user of the accounts. The banks
    issued new credit cards associated with those accounts. All of the credit cards the
    banks issued exhibited the account numbers of the people whose identities Taylor
    had stolen, and some of the credit cards were even issued in Taylor’s name. Upon
    receiving the credit cards, Taylor activated them by telephone and began making
    unauthorized purchases totaling several thousand dollars.
    Agents from the United States Secret Service eventually obtained and
    executed a search warrant for Taylor’s home. The search revealed approximately
    3
    Case: 14-13288      Date Filed: 03/28/2016   Page: 4 of 21
    thirty-three credit cards linked to the accounts of Taylor’s victims. Taylor was
    arrested and charged with five counts of access device fraud. Subsequently, Taylor
    entered into a written plea agreement with the government. In exchange for
    favorable sentencing considerations, Taylor agreed to plead guilty to one count of
    trafficking in unauthorized access devices and one count of aggravated identity
    theft in satisfaction of all five counts.
    At sentencing, Taylor received several enhancements to his base offense
    level, one of which was a two-level enhancement for an offense involving the
    production of an unauthorized access device. See U.S.S.G. § 2B1.1(b)(11)(B)(i).
    Taylor objected to the imposition of this enhancement. Following a sentencing
    hearing, the district court overruled Taylor’s objection and, after considering the
    advisory sentencing range of thirty-seven to forty-six months, imposed a thirty-
    seven month sentence for the § 1029(a) conviction, followed by a consecutive
    mandatory twenty-four month sentence for the § 1028A(a)(1) conviction, for a
    total sixty-one month term of imprisonment.
    II. Standard of Review
    “We review a district court’s legal conclusions regarding the Sentencing
    Guidelines de novo, and its factual findings for clear error.” United States v. Cruz,
    
    713 F.3d 600
    , 605 (11th Cir. 2013). Questions of statutory or Guidelines
    4
    Case: 14-13288     Date Filed: 03/28/2016   Page: 5 of 21
    interpretation receive de novo review. See United States v. Krawczak, 
    331 F.3d 1302
    , 1305 (11th Cir. 2003).
    III. Discussion
    On appeal, Taylor contends that the district court erroneously applied the
    two-level enhancement pursuant to § 2B1.1(b)(11)(B)(i) for production of an
    unauthorized access device (the production enhancement). Our resolution of
    Taylor’s appeal requires us to answer two legal questions. First, does a
    defendant’s conviction for aggravated identity theft under 18 U.S.C. § 1028A
    preclude application of a production enhancement to the defendant’s sentence,
    irrespective of the conduct involved? Second, does causing an unauthorized access
    device to be produced by an innocent third party constitute “production” under the
    Guidelines? We find that the answer to the first question is no, while the answer to
    the second question is yes. We address each legal issue in turn and then apply our
    conclusions to Taylor’s conduct.
    A. Application of a Production Enhancement Despite a Conviction Under
    18 U.S.C. § 1028A
    As a threshold matter, we must determine whether a district court may apply
    a production enhancement under § 2B1.1(b)(11)(B)(i) of the Guidelines when, as
    here, the defendant has been convicted under both 
    18 U.S.C. § 1029
    (a) and
    § 1028A. By way of background, the advisory sentencing range for a § 1029(a)
    conviction is calculated pursuant to the Sentencing Guidelines. In contrast, the
    5
    Case: 14-13288       Date Filed: 03/28/2016       Page: 6 of 21
    Guidelines are not a factor in determining the sentence for a conviction under §
    1028A(a)(1) because conviction for this latter offense results in a mandatory,
    consecutive two-year term of imprisonment. See § 1028A(b). Yet, a conviction
    under § 1028A can nonetheless impact the calculation of the Guidelines for a
    § 1029(a) conviction because § 2B1.6 potentially precludes application of the
    § 2B1.1(b)(11) production enhancement for a § 1029(a) conviction when the
    defendant has also been convicted of § 1028A.
    In pertinent part, § 2B1.1(b)(11) of the Guidelines provides a two-level
    sentencing enhancement if the offense involved:
    (A) the possession or use of any (i) device-making
    equipment, or (ii) authentication feature;
    (B) the production or trafficking of any (i) unauthorized
    access device or counterfeit access device, or (ii)
    authentication feature. 2
    However, the text of § 2B1.6 of the Guidelines limits the application of sentencing
    enhancements to an offense in the context of 18 U.S.C. § 1028A convictions.
    Section 2B1.6 provides: “If the defendant was convicted of violating 18 U.S.C. §
    1028A, the guideline sentence is the term of imprisonment required by statute.”
    The Application Notes to § 2B1.6 explain that that legal provision prohibits
    enhancements of offense levels when the enhancement relates to the “transfer,
    2
    Opinions filed prior to 2011 refer to this section as § 2B1.1(b)(10); the section was
    redesignated as § 2B1.1(b)(11) in 2011 without substantive change. See U.S.S.G. app. C,
    amend. 749; Cruz, 713 F.3d at 602 n.1.
    6
    Case: 14-13288       Date Filed: 03/28/2016       Page: 7 of 21
    possession, or use” of a means of identification.3 See U.S.S.G. § 2B1.6 cmt. n.2.
    This limitation is particularly relevant to § 2B1.1 because “means of identification”
    may include access devices.4 See 
    18 U.S.C. § 1028
    (d)(7)(C), (D).
    Section 2B1.6 is designed to prevent a defendant from being doubly
    penalized for the same conduct. Under § 1028A, a defendant receives a mandatory
    consecutive two-year term of imprisonment if convicted of certain predicate crimes
    (like fraud) and if, during the commission of those predicate crimes, the defendant
    “knowingly transfers, possesses, or uses, without lawful authority, a means of
    identification of another person.” See 18 U.S.C. § 1028A(a)(1). Accordingly, a
    defendant convicted under § 1028A automatically receives an additional two-year
    increase to his or her sentence for transferring, possessing, or using a means of
    identification of another. Section 2B1.6 proscribes any enhancement of the offense
    level for a separate conviction for the underlying offense based on those acts.
    3
    The pertinent commentary provides, in full:
    Inapplicability of Chapter Two Enhancement.—If a sentence under
    this guideline is imposed in conjunction with a sentence for an
    underlying offense, do not apply any specific offense characteristic
    for the transfer, possession, or use of a means of identification
    when determining the sentence for the underlying offense. A
    sentence under this guideline accounts for this factor for the
    underlying offense of conviction, including any such enhancement
    that would apply based on conduct for which the defendant is
    accountable under 1B1.3 . . . .
    U.S.S.G. § 2B1.6 cmt. n.2. (emphasis added).
    4
    For this reason, we use “access device” and “means of identification” interchangeably.
    7
    Case: 14-13288     Date Filed: 03/28/2016    Page: 8 of 21
    In considering these provisions in a prior opinion, we held that § 2B1.6 does
    not bar all sentencing enhancements for defendants convicted under § 1028A
    because not all conduct under § 1028A involves merely transferring, possessing, or
    using a means of identification of another. Cruz, 713 F.3d at 606–07; accord
    United States v. Jenkins-Watts, 
    574 F.3d 950
    , 961–62 (8th Cir. 2009); United
    States v. Sharapka, 
    526 F.3d 58
    , 62 (1st Cir. 2008). Section 2B1.6’s limitation on
    sentencing enhancements exists solely as to the application of enhancements for
    the same conduct already “enhanced” under § 1028A itself: transfer, possession, or
    use of a means of identification of another. See Cruz, 713 F.3d at 606–07. Thus, if
    the defendant’s underlying conduct is limited to transfer, possession, or use of a
    means of identification of another, then the enhancement cannot apply; if the
    conduct is different than or in addition to such transfer, possession, or use, then the
    enhancement can apply.
    We have directly applied this principle to subsection (A) of § 2B1.1(b)(11),
    holding that use of device-making equipment is conduct different than the transfer,
    possession, or use of a means of identification covered under § 1028A. See id. at
    605–07. In contrast, when considering subsection (B) of § 2B1.1(b)(11), which is
    relevant here, we have held that “trafficking” an unauthorized access device is a
    form of conduct fully encompassed within transfer, possession, or use of a means
    of identification. See United States v. Charles, 
    757 F.3d 1222
    , 1226–27 (11th Cir.
    8
    Case: 14-13288         Date Filed: 03/28/2016        Page: 9 of 21
    2014). Specifically, we found that “trafficking” such a device covered the same
    conduct as “transferring” the device. See 
    id. at 1227
    . Therefore, per § 2B1.6, we
    held that a § 2B1.1(b)(11)(B)(i) enhancement premised on trafficking could not be
    applied. See id.; accord United States v. Doss, 
    741 F.3d 763
    , 767–68 (7th Cir.
    2013). We also noted in a footnote that § 2B1.6 may not preclude an enhancement
    based on the “production” of an unauthorized access device, but we “express[ed]
    no opinion about ‘production’ and remand[ed] with directions that the district court
    rule on the ‘production’ issue [in the first instance] and give reasons why.” See
    Charles, 757 F.3d at 1227 & n.3.
    Therefore, we have read the language in § 2B1.1(b)(11)(B) as providing two
    separate bases for an enhanced sentence—(1) production or (2) trafficking—and
    we have held that § 2B1.6 precludes enhancement in § 1028A cases for conduct
    premised on § 2B1.1(b)(11)(B)’s trafficking prong.5 See id. at 1227. Today, with
    the benefit of briefing and oral argument, we reach the issue of whether an
    5
    There is no binding precedent in this circuit pertaining to whether “production” is
    conduct different than the conduct encompassed by § 1028A. While we have affirmed
    § 2B1.1(b)(11)(B) production enhancements in two published opinions where the defendants
    were convicted under, inter alia, § 1028A, we did so without addressing the limiting language in
    § 2B1.6. See United States v. Baldwin, 
    774 F.3d 711
    , 728, 730 n.1 (11th Cir. 2014) (declining to
    consider the § 2B1.6 argument because the defendant “failed to present th[e] argument to the
    district court or raise it in his opening brief”), cert. denied, 
    135 S. Ct. 1882
     (2015); United States
    v. Barrington, 
    648 F.3d 1178
    , 1203 (11th Cir. 2011) (making no reference to § 2B1.6).
    Additionally, the various unpublished opinions the parties cite have no precedential value.
    Moore v. Barnhart, 
    405 F.3d 1208
    , 1211 n.3 (11th Cir. 2005) (per curiam) (citing 11th Cir. R.
    36–2).
    9
    Case: 14-13288   Date Filed: 03/28/2016    Page: 10 of 21
    enhancement for conduct premised on the production prong may apply in § 1028A
    cases.
    As indicated above, § 2B1.6 permits an offense-level enhancement when a
    defendant’s criminal activity involved conduct that is separate from or in addition
    to the simple transfer, possession, or use of the means of identification at issue.
    See id.; cf. Cruz, 713 F.3d at 607. Based on our following analysis of the text,
    structure, and purpose of the relevant Guidelines provisions, we conclude that the
    production of an unauthorized access device/means of identification is separate and
    distinguishable from the mere transfer, possession, or use of such device. Thus, we
    hold that imposition of the two-level enhancement pursuant to § 2B1.1(b)(11)(B)(i)
    is not prohibited in § 1028A cases, so long as the enhancement is premised on the
    defendant’s “production” of an unauthorized access device and the party seeking
    the enhancement sufficiently shows that the defendant engaged in such conduct.
    See United States v. Askew, 
    193 F.3d 1181
    , 1183 (11th Cir. 1999) (“The
    [g]overnment bears the burden of establishing by a preponderance of the evidence
    the facts necessary to support a sentencing enhancement.”); see also United States
    v. Salem, 
    587 F.3d 868
    , 870–71 (8th Cir. 2009) (per curiam) (requiring evidence of
    manufacture or production—more than mere use—to support the production
    enhancement).
    10
    Case: 14-13288     Date Filed: 03/28/2016   Page: 11 of 21
    We begin our analysis with the text. The Guidelines define “production” as
    “includ[ing] manufacture, design, alteration, authentication, duplication, or
    assembly.” U.S.S.G. § 2B1.1 cmt. n.10(A). This definition plainly covers conduct
    different from or in addition to mere “transfer, possession, or use.” When a
    defendant manufactures, designs, alters, authenticates, duplicates, or assembles a
    device, he is doing something to the device. In contrast, transfer, possession, and
    use only require a defendant to do something with a device. For example, a
    defendant who manufactures counterfeit checks engages in categorically different
    conduct than a defendant who simply makes purchases with counterfeit checks,
    because the first defendant takes action that affects the checks themselves (creating
    them), whereas the second defendant simply uses the checks. Given this
    distinction, the § 2B1.1 production enhancement is not limited by § 2B1.6 in the
    context of § 1028A cases.
    Our conclusion finds further support in the structure of the Guidelines
    provisions at issue. We presume that the “inclusion or exclusion of language [in
    the Guidelines] is intentional and purposeful,” United States v. Perez, 
    366 F.3d 1178
    , 1182 (11th Cir. 2004); Cruz, 713 F.3d at 607, and that “the Sentencing
    Commission intended to apply separate guideline sections cumulatively, unless
    specifically directed otherwise,” United States v. Matos-Rodriguez, 
    188 F.3d 1300
    ,
    1310 (11th Cir. 1999) (emphasis omitted). Here, we presume that the inclusion of
    11
    Case: 14-13288    Date Filed: 03/28/2016   Page: 12 of 21
    the word “production” in § 2B1.1(b)(11)(B)(i) was intentional and that its
    exclusion in Application Note 2 of § 2B1.6 was also intentional. It follows, then,
    that the Sentencing Commission did not intend for the commentary to § 2B1.6 to
    limit the application of the two-level enhancement in subsection (B) of
    § 2B1.1(b)(11) with regard to relevant conduct involving the production of an
    unauthorized access device. And, because no language in § 2B1.6 “specifically
    direct[s]” the disqualification of § 2B1.1(b)(11)(B)(i)’s two-level enhancement for
    the production of unauthorized access devices when a defendant has been charged
    under § 1028A, we may apply these separate Guidelines sections cumulatively.
    See Matos-Rodriguez, 
    188 F.3d at 1310
    .
    Finally, it makes sense that the Sentencing Commission would include a
    sentencing enhancement for producing, rather than simply transferring, a
    fraudulent access device: the conduct entailed in production may be more
    problematic than mere transference. By producing unauthorized devices, a
    defendant furthers the criminal scheme and creates more opportunities for the
    prohibited conduct to continue. That specific conduct enhances the criminal act
    more so than simply stealing a credit card and misusing it (or using an expired,
    revoked, or canceled device): it causes the proliferation of unauthorized devices.
    Moreover, such conduct may be harder to detect. For instance, if a credit card is
    simply stolen, a victim may cancel the card when he or she realizes that card is
    12
    Case: 14-13288       Date Filed: 03/28/2016      Page: 13 of 21
    missing. But if the defendant instead creates a new card and begins using it, the
    victim may not notice the fraud until discovering the unauthorized charges on his
    or her account. Nevertheless, under Taylor’s preferred reading of the Guidelines,
    sentencing courts would not be permitted to differentiate between those who use or
    transfer unauthorized devices and those who create the means for that subsequent
    criminal activity. That is to say, a defendant who produced a fraudulent card
    would be subject to the same sentence as another defendant who, for instance,
    simply purchased the card from the first defendant. By including an enhancement
    for production, the Sentencing Commission clearly did not intend that result.
    Instead, a defendant who creates the means for not only himself, but also others, to
    engage in criminal activity should not enjoy the same punishment as the individual
    who simply uses an already-existing item to engage in criminal activity. 6
    Accordingly, the plain language of the Guidelines, the structure of the
    relevant Guidelines provisions, and the purposes underlying those provisions
    support our conclusion today. Therefore, we hold that the district courts may apply
    the § 2B1.1(b)(11)(B)(i) enhancement to a defendant’s sentence—even when that
    defendant has also been convicted of violating § 1028A—if the government
    6
    Contrary to Taylor’s assertions, this interpretation of the term “production” does not
    mandate the production enhancement any time a defendant commits the underlying offense.
    “Unauthorized access device” is defined as “any access device that is lost, stolen, expired,
    revoked, canceled, or obtained with intent to defraud.” 
    18 U.S.C. § 1029
    (e)(3); U.S.S.G.
    § 2B1.1 cmt. n.10(A). A defendant may use a lost, stolen, expired, revoked, or canceled device
    and be subject to liability under § 1028A without necessarily “producing” the device and being
    subjected to the production enhancement.
    13
    Case: 14-13288       Date Filed: 03/28/2016       Page: 14 of 21
    demonstrates, by a preponderance of the evidence, that the defendant’s relevant
    conduct included the “production” of an unauthorized access device.
    B. Conduct Constituting “Production” under § 2B1.1(b)(11)(B)(i)
    Having determined that a sentence may be subject to the two-level
    production enhancement in § 2B1.1(b)(11)(B) even when the defendant was also
    convicted under § 1028A, we turn now to whether a defendant “produces” an
    unauthorized access device when he causes an innocent third party to physically
    create or otherwise generate that device. Taylor avers that such conduct is not
    “production” within the meaning of the Guidelines because “production” requires
    first-hand creation.
    While our court has concluded that a defendant can be subjected to a
    sentencing enhancement based on the actions of a co-conspirator, 7 we have never
    squarely held whether a defendant is liable for “producing” a device when neither
    the defendant nor a co-conspirator directly manufactured the item. Consequently,
    the second legal issue in this case is whether “production” encompasses a situation
    in which the defendant caused an innocent third party to create the fraudulent
    device at the defendant’s behest. Taylor argues that this conduct should not
    7
    A sentencing enhancement may apply even when premised on a co-conspirator’s
    actions because a defendant is responsible for the reasonably foreseeable acts of his co-
    conspirators. See, e.g., Cruz, 713 F.3d at 607–08 (defendant liable for device-making equipment
    when co-conspirator possessed and used the equipment); see also U.S.S.G. § 1B1.3(a)(1)(B)(iii)
    (a defendant’s “relevant conduct” includes “reasonably foreseeable” acts of others in furtherance
    of a jointly undertaken criminal activity).
    14
    Case: 14-13288        Date Filed: 03/28/2016   Page: 15 of 21
    constitute “production” because it simply involves “procuring” the device (here, a
    credit card) after it was produced by an innocent third party (a bank). According to
    Taylor, only a defendant who creates cards personally or through criminal
    associates deserves an enhancement for production of an unauthorized access
    device. However, we hold that “production” for purposes of the §
    2B1.1(b)(11)(B)(i) enhancement includes a situation in which a defendant willfully
    causes or induces an innocent third party to produce an unauthorized access device.
    The Guidelines’ plain language, our precedents, and guidance from our sister
    circuits direct this conclusion.
    The Guidelines provide for a broad interpretation of “production” under
    § 2B1.1(b)(11)(B)(i). We interpret the Guidelines using “its plain language and,
    absent ambiguity, no additional inquiry is necessary.” Cruz, 713 F.3d at 607
    (internal quotation marks omitted). As discussed above, the Guidelines define
    “production” as “includ[ing] manufacture, design, alteration, authentication,
    duplication, or assembly.” U.S.S.G. § 2B1.1 cmt. n.10(A). This far-reaching
    definition clearly encompasses a wide range of behaviors. In addition, under the
    Guidelines, specific offense enhancements may be determined by “all acts and
    omissions committed, aided, abetted, counseled, commanded, induced, procured,
    15
    Case: 14-13288       Date Filed: 03/28/2016      Page: 16 of 21
    or willfully caused by the defendant.” Id. § 1B1.3(a)(1)(A).8 Reading these
    provisions together, “production” plainly includes conduct where an individual
    either commits or willfully causes the “manufacture, design, alteration,
    authentication, duplication, or assembly” of an unauthorized access device.
    This interpretation of “production” is consistent with the broad
    interpretations adopted by this court and other circuits. We have held that
    “production” applies to a defendant’s “capture, storage, and transmittal” of
    preexisting passwords and user names because “production” includes
    “‘duplication’ or ‘assembly’ of preexisting items.” See Barrington, 
    648 F.3d at 1203
     (affirming production enhancement where defendants “view[ed] or
    record[ed] . . . personal identification data” (internal quotation marks omitted)).
    Similarly, the First Circuit gave broad effect to conduct qualifying as
    “production” when it found the production enhancement could be applied in the
    case of a defendant who, recognizing that air bubbles in the laminate of a
    fraudulent driver’s license could undermine its appearance as legitimate, either
    popped the bubbles herself or instructed her co-conspirator to do so. See United
    States v. Jones, 
    551 F.3d 19
    , 25–26 (1st Cir. 2008). The court held that this
    8
    The crimes set forth in 18 U.S.C. §§ 1028A and 1029(a)(2) are specific intent offenses.
    Section 1028A requires that the defendant have “knowingly transfer[red], possesse[d], or use[d],
    without lawful authority, a means of identification of another person. See 18 U.S.C. §
    1028A(a)(1) (emphasis added). Section 1029(a)(2) requires the government to prove the
    defendant “knowingly and with intent to defraud traffic[ked] or use[d] one or more unauthorized
    access devices during any one-year period, and by such conduct obtain[ed] anything of value
    aggregating $1,000 or more during that period.” 
    18 U.S.C. § 1029
    (a)(2) (emphasis added).
    16
    Case: 14-13288       Date Filed: 03/28/2016      Page: 17 of 21
    conduct was the type of behavior the Guidelines attempt to capture in the
    production enhancement because, although the physical act of popping air bubbles
    might seem minor, this small act of alteration “transformed the flawed driver’s
    license into a usable counterfeit access device.” 
    Id. at 26
    . An even more
    persuasive example comes from the Seventh Circuit, where the court held that the
    production enhancement could be applied to a defendant discovered with credit
    and debit cards imprinted with the names of the defendant and his co-conspirators.
    See United States v. Hinds, 
    770 F.3d 658
    , 663–64 (7th Cir. 2014). The court
    explained that “the [embossed] names on the cards speak for themselves. This is
    not a crime where [the defendant] used the stolen credit cards of John or Jane Doe.
    His crime . . . involved cards designed specifically for him to use; they had his
    name on them and were linked to various active accounts.” 
    Id.
     The court decided
    this sufficiently demonstrated that the defendant, “his co-conspirators, or someone
    acting on their behalf, must have designed or created these counterfeit cards in
    preparation for their crimes.” 9 See 
    id. at 663
    . Based on this undisputed evidence,
    the court held that the production enhancement was justified. See 
    id. at 664
    .
    9
    Taylor avers that the phrase “in preparation for their crimes” means that the Seventh
    Circuit based its conclusion on an understanding that someone within the conspiracy created the
    cards. Even if we were to accept this arguable reading of the language in Hinds, the plain
    language of the Guidelines states that a defendant’s sentence may be enhanced by all actions
    willfully caused or induced by the defendant. See U.S.S.G. § 1B1.3(a)(1)(A). Hinds did not
    address this important language, and Taylor has presented no reason why it does not control.
    17
    Case: 14-13288     Date Filed: 03/28/2016   Page: 18 of 21
    In sum, the definition of “production” is broadly written in the Guidelines
    and, for that reason, has been broadly construed. And the Guidelines provision for
    determining specific offense enhancements makes clear that a defendant is
    responsible for all actions he willfully causes or induces. Consequently, we hold
    that the production enhancement is applicable to conduct involving third-party
    production—whether physically performed by a criminal co-conspirator or by an
    innocent party—that has been willfully induced by the defendant.
    C. Whether the District Court Erred in Applying the Production
    Enhancement Based on Taylor’s Relevant Conduct
    The evidence submitted by the government in this case shows that Taylor
    induced and willfully caused the production of unauthorized access devices when
    he contacted banks using stolen identities, added himself as an authorized user to
    the accounts associated with those identities, and directed the banks to issue new
    credit cards. Put simply, Taylor caused the bank to physically produce credit cards
    bearing his name. Thus, while the credit cards were not Taylor-made, they were
    certainly tailor-made for his offense.
    Taylor’s relevant conduct is captured by the broad language of the
    “production” definition and the plain meaning of “induced” and “willfully caused”
    in the Guidelines. See U.S.S.G. § 2B1.1 cmt. n.10(A); id. § 1B1.3(a)(1)(A). The
    evidence shows that after Taylor was added to an account, the bank would produce
    a new credit card, bearing Taylor’s name and the account number, and send it to
    18
    Case: 14-13288        Date Filed: 03/28/2016        Page: 19 of 21
    him. Taylor obtained these newly produced credit cards without the consent of the
    true account holders and with intent to defraud, making the credit cards
    “unauthorized access devices.” See 
    18 U.S.C. § 1029
    (a)(2), (e)(3); U.S.S.G. §
    2B1.1 cmt. n.10(A).
    Accordingly, as in Jones, where the defendant’s bubble-popping alteration
    of a driver’s license created a usable counterfeit access device, Taylor’s actions—
    getting a bank to add his name to an account and manufacture a new card
    embossed with his name—created a usable unauthorized access device. 10 See
    Jones, 
    551 F.3d at
    25–26; U.S.S.G. § 2B1.1 cmt. n.10(A); cf. Salem, 
    587 F.3d at
    870–71 (determining production enhancement was improper where “there was no
    evidence presented at sentencing about how [the defendant] procured the
    fraudulent bar code labels used in his scheme, or who produced or manufactured
    them”). Indeed, Taylor’s conduct exceeded simply using a means of identification
    (a stolen identity) to get access to another means of identification/unauthorized
    access devices (a credit card)—he had the bank add him to the account and create a
    new credit card with his name on it.11 See Hinds, 770 F.3d at 663–64. Taylor
    10
    For this reason, Taylor’s argument that “production” does not encompass innocent
    third-party production in the ordinary course of that party’s business practices fails. The fact that
    banks are ordinarily engaged in credit card production is not the same as the banks ordinarily
    being involved in (or, rather, induced to commit) fraudulent credit card production.
    11
    We pass no judgment on whether this conduct could have qualified for an enhancement
    under the production prong of § 2B1.1(b)(11)(C)(i) instead. See United States v. Auguste, 
    392 F.3d 1266
    , 1267–68 (11th Cir. 2004). The government neither raised this issue in the district
    court nor addressed it on appeal. See Access Now, Inc. v. Sw. Airlines Co., 
    385 F.3d 1324
    , 1330
    19
    Case: 14-13288       Date Filed: 03/28/2016      Page: 20 of 21
    “willfully caused” or “induced” the production of the unauthorized access devices
    by impersonating legitimate account holders and requesting that the banks create
    and issue new credit cards to him. See U.S.S.G. § 1B1.3(a)(1)(A).
    Consequently, because Taylor induced and willfully caused banks to
    produce new credit cards, the district court did not err in applying the
    § 2B1.1(b)(11)(B)(i) enhancement for “production” of an unauthorized access
    device.
    IV. Conclusion
    We conclude that the § 2B1.1(b)(11)(B) production enhancement applies to
    the Guidelines’ calculation for Taylor’s § 1029(a)(2) sentence, even though Taylor
    was also sentenced under § 1028A, because his relevant conduct included actions
    sufficiently distinct from the mere transfer, possession, or use of an unauthorized
    access device/means of identification. That is to say, Taylor also produced
    unauthorized access devices. We reach the conclusion that he engaged in
    “production” because willfully causing an innocent third party to produce the
    devices meets the meaning of “production” under the Guidelines. Therefore, the
    two-level enhancement to Taylor’s offense level pursuant to § 2B1.1(b)(11)(B)(i)
    (11th Cir. 2004); Iraola & CIA, S.A. v. Kimberly-Clark Corp., 
    325 F.3d 1274
    , 1284–85 (11th
    Cir. 2003).
    20
    Case: 14-13288   Date Filed: 03/28/2016   Page: 21 of 21
    for production of an unauthorized access device is warranted. We affirm the
    district court.
    AFFIRMED.
    21