-
PRELIMINARY PRINT Volume 599 U. S. Part 1 Pages 110–139 OFFICIAL REPORTS OF THE SUPREME COURT June 8, 2023 Page Proof Pending Publication REBECCA A. WOMELDORF reporter of decisions NOTICE: This preliminary print is subject to formal revision before the bound volume is published. Users are requested to notify the Reporter of Decisions, Supreme Court of the United States, Washington, D.C. 20543, pio@supremecourt.gov, of any typographical or other formal errors. 110 OCTOBER TERM, 2022 Syllabus DUBIN v. UNITED STATES certiorari to the united states court of appeals for the fth circuit No. 22–10. Argued February 27, 2023—Decided June 8, 2023 Petitioner David Dubin was convicted of healthcare fraud under
18 U. S. C. § 1347after he overbilled Medicaid for psychological testing performed by the company he helped manage. The question is whether, in de- frauding Medicaid, he also committed “[a]ggravated identity theft” under § 1028A(a)(1). Section 1028A(a)(1) applies when a defendant, “during and in relation to any [predicate offense, such as healthcare fraud], knowingly transfers, possesses, or uses, without lawful authority, a means of identifcation of another person.” The Government argued below that § 1028A(a)(1) was automatically satisfed because Dubin's fraudulent Medicaid billing included the patient's Medicaid reimburse- ment number—a “means of identifcation.” Bound by Fifth Circuit precedent, the District Court allowed Dubin's conviction for aggravated identity theft to stand, even though, in the District Court's view, the Page Proof Pending Publication crux of the case was fraudulent billing, not identity theft. The Fifth Circuit sitting en banc affrmed in a fractured decision, with fve concur- ring judges acknowledging that under the Government's reading of § 1028A(a)(1), “the elements of [the] offense are not captured or even fairly described by the words ``identity theft.' ”
27 F. 4th 1021, 1024 (opinion of Richman, C. J.). Held: Under § 1028A(a)(1), a defendant “uses” another person's means of identifcation “in relation to” a predicate offense when the use is at the crux of what makes the conduct criminal. Pp. 116–132. (a) This case turns on the scope of two of § 1028A(a)(1)'s elements: Dubin was convicted under § 1028A(a)(1) for “us[ing]” a patient's means of identifcation “in relation to” healthcare fraud. On the Government's view, a defendant “uses” a means of identifcation “in relation to” a pred- icate offense if the defendant employs that means of identifcation to facilitate or further the predicate offense in some way. Section 1028A(a)(1) would thus apply automatically any time a name or other means of identifcation happens to be part of the payment or billing method used in the commission of a long list of predicate offenses. Dubin's more targeted reading requires that the use of a means of iden- tifcation have “a genuine nexus” to the predicate offense. When the underlying crime involves fraud or deceit, as many of § 1028A's predi- cates do, this entails using a means of identifcation specifcally in a fraudulent or deceitful manner, not as a mere ancillary feature of a pay- Cite as:
599 U. S. 110(2023) 111 Syllabus ment or billing method. A careful examination of § 1028A(a)(1)'s text and structure points to a narrower reading. Pp. 116–118. (b) The terms “uses” and “in relation to” have been singled out by this Court as being particularly sensitive to context. The “various defnitions of ``use' imply action and implementation.” Bailey v. United States,
516 U. S. 137, 145. Beyond that general concept, however, “ ``use' takes on different meanings depending on context.”
Id., at 143. This requires looking “not only to the word itself, but also to the statute and the [surrounding] scheme, to determine the meaning Congress in- tended.”
Ibid.“In relation to” is similarly context sensitive. If ex- tended to its furthest reach, “relate to” would be practically limitless. The phrase clearly refers to a relationship or nexus of some kind, but the nature and strength of this relationship or nexus will be informed by context. Because the presence of two such context-dependent terms renders § 1028A(a)(1) doubly attuned to its surroundings, resort to con- text is especially necessary. Pp. 118–119. (c) Section 1028A(a)(1)'s title and terms both point toward reading the provision to capture the ordinary understanding of identity theft, where misuse of a means of identifcation is at the crux of the criminal- ity. Pp. 120–127. (1) Section 1028A is a focused, standalone provision, and its title— Page Proof Pending Publication “Aggravated identity theft”—suggests that identity theft is at the core of § 1028A(a)(1). A statute's title has long been considered a “ ``too[l] available for the resolution of a doubt' about the meaning of a statute.” Almendarez-Tor res v. United States,
523 U. S. 224, 234. Section 1028A's title is especially valuable here because it does not summarize a list of “complicated and prolifc” provisions, Trainmen v. Baltimore & Ohio R. Co.,
331 U. S. 519, 528, and also “reinforces what the text's nouns and verbs independently suggest,” Yates v. United States,
574 U. S. 528, 552 (Alito, J., concurring in judgment). The Court has previously ob- served the contrast between § 1028A's targeted title and the broad title of neighboring provision § 1028: “ ``Fraud and related activity in connec- tion with identifcation documents, authentication features, and informa- tion.' ” Flores-Figueroa v. United States,
556 U. S. 646, 655. That “Congress separated the [identity] fraud crime from the [identity] theft crime in” § 1028A suggests that § 1028A is focused on identity theft spe- cifcally, rather than all fraud involving means of identifcation. Ibid. The Government urges the Court to ignore § 1028A's title, because the Government's reading of the provision bears little resemblance to ordinary understandings of “identity theft.” This broad reading would, in practice, place garden-variety overbilling at the core of § 1028A. In- stead, “identity theft” has a focused meaning: “[T]he fraudulent appro- priation and use of another person's identifying data or documents,” Webster's Unabridged Dictionary xi, or “[t]he unlawful taking and use 112 DUBIN v. UNITED STATES Syllabus of another person's identifying information for fraudulent purposes,” Black's Law Dictionary 894. This understanding of identity theft sup- ports a reading of “in relation to” where use of the means of identifca- tion is at the crux of the underlying crime. And under these defni- tions, identity theft occurs when a defendant “uses” the means of identifcation itself to defraud others. Further, the inclusion of “aggra- vated” in § 1028A's title suggests that Congress had in mind a particu- larly serious form of identity theft, not just all manner of everyday overbilling offenses. Pp. 120–124. (2) Section 1028A(a)(1)'s language points in the same direction as its title. In particular, Congress used a trio of verbs that refect an ordinary understanding of identity theft. Section 1028A(a)(1) applies when a defendant “knowingly transfers, possesses, or uses, without law- ful authority, a means of identifcation of another person,” “during and in relation to” any predicate offense. (Emphasis added.) The two verbs neighboring “uses”—“transfers” and “possesses”—are most naturally read in the context of § 1028A(a)(1) to connote not only theft, but ordi- nary understandings of identity theft in particular, i. e., they point to (1) theft of a (2) means of identifcation belonging to (3) another person. Because “transfer” and “possess” channel ordinary identity theft, the interpretative cannon noscitur a sociis (“ ``a word is known by the com- Page Proof Pending Publication pany it keeps,' ” McDonnell v. United States,
579 U. S. 550, 568–569) indicates that “uses” should be read in a similar manner. In addition, the Court “assume[s] that Congress used [three] terms because it in- tended each term to have a particular, nonsuperfuous meaning.” Bai- ley,
516 U. S., at 146. On a more targeted reading, § 1028A(a)(1)'s three verbs capture the complexity of identity theft, which intermingles as- pects of theft and fraud, misappropriation and deceitful use. While “transfer” and “possess” conjure up two steps of theft, “uses” supplies the deceitful use aspect. In contrast, if § 1028A(a)(1) is not read in this narrow manner, then the two other verbs risk leaving “uses” without “virtually any function.” Ibid. Pp. 124–127. (d) The list of § 1028A(a)(1)'s predicate offenses creates additional problems for the Government's broad reading. Section 1028A(a)(1)'s enhancement adds a severe 2-year mandatory prison sentence onto un- derlying offenses that do not impose any mandatory prison sentence at all. The Government's reading, however, does not meaningfully distin- guish between the aggravated identity theft crime that Congress sin- gled out for heightened punishment and other crimes. Instead, so long as the criteria for the broad predicate offenses are met, a defendant faces an automatic 2-year sentence for generic overbilling that happens to use names or other means of identifcation for routine billing and payment. A far more sensible conclusion from the statutory structure is that § 1028A(a)(1)'s enhancement targets situations where the means Cite as:
599 U. S. 110(2023) 113 Opinion of the Court of identifcation itself is at the crux of the underlying criminality, not just an ancillary billing feature. Pp. 127–129. (e) In contrast to the staggering breadth of the Government's reading of § 1028A, this Court has “ ``traditionally exercised restraint in assessing the reach of a federal criminal statute,' ” Marinello v. United States, 584 U. S. –––, –––, and prudently avoided reading incongruous breadth into opaque language in criminal statutes. See, e. g., Van Buren v. United States, 593 U. S. –––. The vast sweep of the Government's read- ing—under which everyday overbilling cases would account for the ma- jority of violations—“underscores the implausibility of the Govern- ment's interpretation.” Id., at –––. While the Government represents that prosecutors will act responsibly in charging defendants under its sweeping reading, this Court “cannot construe a criminal statute on the assumption that the Government will ``use it responsibly.' ” McDon- nell, 579 U. S., at 576. Pp. 129–131.
27 F. 4th 1021, vacated and remanded. Sotomayor, J., delivered the opinion of the Court, in which Roberts, C. J., and Thomas, Alito, Kagan, Kavanaugh, Barrett, and Jackson, JJ., joined. Gorsuch, J., fled an opinion concurring in the judgment, post, p. 133. Page Proof Pending Publication Jeffrey L. Fisher argued the cause for petitioner. With him on the briefs were Pamela S. Karlan, Easha Anand, Anton Metlitsky, Bruce Pettig, Jason Zarrow, and Michael C. Gross. Vivek Suri argued the cause for the United States. With him on the brief were Solicitor General Prelogar, Assistant Attorney General Polite, Deputy Solicitor General Feigin, and Kevin J. Barber.* Justice Sotomayor delivered the opinion of the Court. There is no dispute that petitioner David Fox Dubin over- billed Medicaid for psychological testing. The question is whether, in defrauding Medicaid, he also committed “[a]ggra- vated identity theft,” 18 U. S. C. § 1028A(a)(1), triggering a *Briefs of amici curiae urging reversal were fled for the National Asso- ciation of Criminal Defense Lawyers by Henry W. Asbill, Jill Winter, and Barbara E. Bergman; for the National Association of Federal Defenders by Andrew L. Adler, Judith H. Mizner, Davina T. Chen, and Shelley Fite; and for Joel S. Johnson by Mr. Johnson, pro se. 114 DUBIN v. UNITED STATES Opinion of the Court mandatory 2-year prison sentence. The Fifth Circuit found that he did, based on a reading of the statute that covers defendants who fraudulently infate the price of a service or good they actually provided. On that sweeping reading, as long as a billing or payment method employs another per- son's name or other identifying information, that is enough. A lawyer who rounds up her hours from 2.9 to 3 and bills her client electronically has committed aggravated identity theft. The same is true of a waiter who serves fank steak but charges for flet mignon using an electronic payment method. The text and context of the statute do not support such a boundless interpretation. Instead, § 1028A(a)(1) is violated when the defendant's misuse of another person's means of identifcation is at the crux of what makes the underlying offense criminal, rather than merely an ancillary feature of a billing method. Here, the crux of petitioner's overbilling was infating the value of services actually provided, while Page Proof Pending Publication the patient's means of identifcation was an ancillary part of the Medicaid billing process. I David Dubin helped his father manage a psychological services company. This company submitted a claim for re- imbursement to Medicaid for psychological testing by a li- censed psychologist. In fact, however, the claim overstated the qualifcations of the employee who actually performed the testing and who was only a licensed psychological associ- ate. This falsehood infated the amount of reimbursement. Petitioner also changed the date on which the examination occurred.1 Even with the infation, the total reimbursement was only $338. App. 49. Petitioner was accordingly charged with healthcare fraud, a federal offense under 18 1 The parties dispute whether changing the date affected the availability of Medicaid reimbursement. The Court does not reach that question, as the outcome of this case would be the same either way. Cite as:
599 U. S. 110(2023) 115 Opinion of the Court U. S. C. § 1347. According to the Government, however, petitioner's conduct also constituted “[a]ggravated identity theft” under § 1028A(a)(1). Section 1028A(a)(1) applies when a defendant, “during and in relation to any [predicate offense], knowingly transfers, possesses, or uses, without lawful authority, a means of iden- tifcation of another person.” The predicate offenses in- clude, among many others, healthcare fraud. § 1028A(c)(4). Section 1028A(a)(1) carries a severe penalty: a mandatory minimum sentence of two years in prison “in addition to the punishment” for the predicate offense. According to the Government, this is a clear aggravated identity theft case. The Government argued at trial that § 1028A(a)(1) was automatically satisfed because petitioner's fraudulent billing included the patient's Medicaid reimburse- ment number (a “means of identifcation”). The District Court was less sure. “[T]his doesn't seem to be an aggra- Page Proof Pending Publication vated identity theft case,” the court explained, as “the whole crux of this case is how [petitioner was] billing.” App. 37– 38. This overbilling was “criminal,” but it “wasn't aggra- vated identity theft.” Id., at 38. Nevertheless, the District Court denied petitioner's post-trial challenge to his aggra- vated identity theft conviction, explaining that contrary Fifth Circuit precedent tied its hands. The court said that it “hope[d]” it would “get reversed.” Id., at 39. On appeal, a Fifth Circuit panel affrmed. On rehearing en banc, a fractured court affrmed again. Five judges who agreed with the Government nonetheless acknowledged that under the Government's reading of § 1028A(a)(1), “the ele- ments of [the] offense are not captured or even fairly de- scribed by the words ``identity theft.' ”
27 F. 4th 1021, 1024 (2022) (Richman, C. J., concurring). Eight dissenting judges agreed on this point. This type of prosecution is not uncommon. The Govern- ment has, by its own admission, wielded § 1028A(a)(1) well beyond ordinary understandings of identity theft. One 116 DUBIN v. UNITED STATES Opinion of the Court prosecution targeted a defendant who “made a counterfeit handgun permit” for another person, using that person's real name and at that person's request. United States v. Spears,
729 F. 3d 753, 754 (CA7 2013) (en banc). Another involved unlicensed doctors who violated the law by “issu[ing] pre- scriptions that their [actual] patients would then fll at . . . pharmacies.” United States v. Berroa,
856 F. 3d 141, 148, 155–156 (CA1 2017). There was also a prosecution involving an ambulance service infating its reimbursement rates by “mischaracteriz[ing] the nature of the transports, saying that the patients had required stretchers when they had not.” United States v. Michael,
882 F. 3d 624, 628 (CA6 2018) (cit- ing United States v. Medlock,
792 F. 3d 700, 705 (CA6 2015)). Yet another prosecution involved a defendant who “provided massage services to patients to treat their pain,” but improp- erly billed this “as a Medicare-eligible physical therapy serv- ice.” United States v. Hong,
938 F. 3d 1040, 1051 (CA9 2019). Page Proof Pending Publication Many lower courts have responded to such prosecutions with more restrained readings of the aggravated identity theft statute.2 The Fifth Circuit did not. To resolve the confict in the courts below, this Court granted certiorari, 598 U. S. ––– (2022), and now vacates the judgment of the Fifth Circuit and remands.3 II A This case turns on two of § 1028A(a)(1)'s elements. Of the various possible ways to violate § 1028A(a)(1), petitioner was convicted for “us[ing]” a patient's means of identifcation “in 2 See Berroa, 856 F. 3d, at 148, 155–157; Michael,
882 F. 3d, at 628; Spears,
729 F. 3d, at 754; Hong, 938 F. 3d, at 1051. 3 The Government argued below that because petitioner did not properly raise certain challenges to his § 1028A conviction, he cannot obtain relief without meeting the higher bar for plain-error review. The Fifth Circuit below did not decide that question, which this Court leaves for remand. Cite as:
599 U. S. 110(2023) 117 Opinion of the Court relation to” healthcare fraud. The parties offer competing readings of these two elements. The Government reads the terms broadly and in isolation. On the Government's view, “[a] defendant uses a means of identifcation ``in relation to' a predicate offense if the use of that means of identifcation ``facilitates or furthers' the predi- cate offense in some way.” Brief for United States 10 (quot- ing Smith v. United States,
508 U. S. 223, 232 (1993)). As to “uses,” the Government seems just to mean “employ[s]” in any sense. Brief for United States 5, 7, 10–11. Section 1028A(a)(1) would thus apply automatically any time a name or other means of identifcation happens to be part of the payment or billing method used in the commission of a long list of predicate offenses. In other words, virtually all of the time. Petitioner, in response, offers a more targeted reading. For petitioner, using a means of identifcation in relation to a Page Proof Pending Publication predicate offense requires “a genuine nexus to the predicate offense.” Brief for Petitioner 15. On this reading, the means of identifcation is at the crux of what makes the pred- icate offense criminal, rather than merely an ancillary fea- ture of a payment method. When the underlying crime in- volves fraud or deceit, as many of § 1028A's predicates do, this entails using a means of identifcation specifcally in a fraudulent or deceitful manner. To illustrate, petitioner borrows a heuristic from the Sixth Circuit. See Michael,
882 F. 3d, at 628. The relevant lan- guage in § 1028A(a)(1) “covers misrepresenting who received a certain service,” but not “fraudulent claims regarding how or when a service was performed.” Brief for Petitioner 15. In other words, fraud going to identity, not misrepresenta- tion about services actually provided. Take an ambulance service that actually transported patients but infated the number of miles driven. The crux of this fraud was “how” services were rendered; the patients' names were part of the billing process, but ancillary to what made the conduct fraud- 118 DUBIN v. UNITED STATES Opinion of the Court ulent. See Michael, 882 F. 3d, at 628–629. In contrast, take the pharmacist who swipes information from the phar- macy's fles and uses it to open a bank account in a patient's name. That “misuse of th[e] means of identifcation” would be “integral to” what made the conduct fraudulent, because misrepresentation about who was involved was at the crux of the fraud. Id., at 629. In deciding between the parties' readings, one limited and one near limitless, precedent and prudence require a careful examination of § 1028A(a)(1)'s text and structure. While “uses” and “in relation to” are, in isolation, indeterminate, the statutory context, taken as a whole, points to a nar- rower reading. B In interpreting the scope of “uses” and “in relation to,” the Court begins with those terms themselves. Both terms have been singled out by this Court as particularly sensitive Page Proof Pending Publication to context, and they do not, standing alone, conclusively re- solve this case. Start with “uses.” As the Court has observed more than once, “the word ``use' poses some interpretational diffculties because of the different meanings attributable to it.” Bai- ley v. United States,
516 U. S. 137, 143 (1995); see also Leocal v. Ashcroft,
543 U. S. 1, 9 (2004). The “ ``ordinary or natural' meaning” of “ ``use' ” is “variously defned as ``[t]o convert to one's service,' ``to employ,' ``to avail oneself of,' and ``to carry out a purpose or action by means of.' ” Bailey,
516 U. S., at 145. “These various defnitions of ``use' imply action and implementation.”
Ibid.Beyond that general concept, however, “ ``use' takes on different meanings depending on context,” and because it “draws meaning from its context, . . . we will look not only to the word itself, but also to the statute and the [surrounding] scheme, to determine the meaning Congress intended.”
Id., at 143; see also Leocal,
543 U. S., at 9(“Particularly when interpreting a statute that features as elastic a word as ``use,' we construe language in its context and in light of the terms surrounding it”). Cite as:
599 U. S. 110(2023) 119 Opinion of the Court For example, the federal arson statute only applies to buildings “ ``used in' commerce or commerce-affecting activ- ity.” Jones v. United States,
529 U. S. 848, 850–851 (2000). In that statutory context, the Court distinguished between uses of a building as “the locus of any commercial undertak- ing,” and noncovered “passive,” “passing,” or ancillary uses of a building “as collateral to obtain and secure a mortgage” or to obtain an insurance policy.
Id.,at 855–856. It is statutory context, therefore, that determines what kind of active employment or conversion to one's service triggers § 1028A(a)(1)'s harsh penalty. “In relation to” is similarly context sensitive. If “ ``relate to' were taken to extend to the furthest stretch of its indeter- minacy, then for all practical purposes” there would be no limits, as “ ``[r]eally, universally, relations stop nowhere.' ” New York State Conference of Blue Cross & Blue Shield Plans v. Travelers Ins. Co.,
514 U. S. 645, 655 (1995) (quoting H. James, Roderick Hudson xli (New York ed., World's Clas- Page Proof Pending Publication sics 1980)). This language thus cannot be “considered in iso- lation,” Maracich v. Spears,
570 U. S. 48, 59 (2013), and the Court must “go beyond the unhelpful text and the frustrat- ing diffculty of defning [this] key term” and look to statu- tory context. Travelers,
514 U. S., at 656. That the phrase refers to a relationship or nexus of some kind is clear. See Smith,
508 U. S., at 238(“ ``[I]n relation to' ” requires “some purpose or effect” between two things). Yet the kind of re- lationship required, its nature and strength, will be informed by context. The presence of two such context-dependent terms ren- ders § 1028A(a)(1) doubly attuned to its surroundings. The parties' competing readings both fall within the range of meanings of “uses” and “in relation to,” taken alone. Resort to context is thus especially necessary here.4 4 The Government tries to head off any contextual analysis at the pass, urging that “uses” and “during and in relation to” in § 1028A(a)(1) must be read identically to Smith and other of this Court's cases interpreting
18 U. S. C. § 924(c)(1)(A). That provision applies to “any person who, dur- 120 DUBIN v. UNITED STATES Opinion of the Court C Having found the key terms “use” and “in relation to” in- determinate, the next step is to look to their surrounding words. After all, “a statute's meaning does not always turn solely on the broadest imaginable defnitions of its compo- nent words.” Epic Systems Corp. v. Lewis, 584 U. S. –––, ––– (2018) (internal quotation marks omitted). Instead, “[l]inguistic and statutory context also matter.”
Ibid.Even in cases where “the literal language of the statute is neutral” in isolation, reading “the whole phrase” can point to a more targeted reading. Marinello v. United States, 584 U. S. –––, ––– – ––– (2018). Such is the case here. Section 1028A(a)(1)'s title and terms both point to a narrower reading, one centered around the ordinary understanding of identity theft. This cuts against the Government's broad reading, which the Govern- ment admits bears little relationship to the common under- Page Proof Pending Publication standing of identity theft. In contrast, a more targeted reading accurately captures the ordinary understanding of identity theft, where misuse of a means of identifcation is at the crux of the criminality. 1 Start at the top, with the words Congress chose for § 1028A's title: “Aggravated identity theft.”
118 Stat. 831. This Court has long considered that “ ``the title of a stat- ing and in relation to any crime of violence or drug traffcking crime . . . uses or carries a frearm.” One need look no further than this Court's § 924(c) case law to see why this argument fails. The teaching of those cases is that because “use” “draws meaning from its context, . . . we will look not only to the word itself, but also to the statute and the [broader] scheme.” Bailey v. United States,
516 U. S. 137, 143 (1995). Section 1028A(a)(1) differs greatly from § 924(c), from the thing that is “used,” to the title, to the nature of the predicate offenses to which the enhancement relates. Words can wound, but names and numbers are not guns. If any- thing, the ubiquity of names and their vast range of “uses” makes the verb especially indeterminate in this context. For that same reason, the Court's decision today does not alter its § 924(c) case law. Cite as:
599 U. S. 110(2023) 121 Opinion of the Court ute and the heading of a section' are ``tools available for the resolution of a doubt' about the meaning of a statute.” Almendarez-Torres v. United States,
523 U. S. 224, 234 (1998) (quoting Trainmen v. Baltimore & Ohio R. Co.,
331 U. S. 519, 528–529 (1947)). A title will not, of course, “override the plain words” of a statute. Fulton v. Philadelphia, 593 U. S. –––, ––– (2021). Yet here, the key terms are so “elastic” that they must be construed “in light of the terms surrounding [them],” Leocal,
543 U. S., at 9, and the title Congress chose is among those terms. Even the Government acknowledged that if the terms in § 1028A(a)(1) are unclear, “the title is a useful clue.” Tr. of Oral Arg. 80. Two additional points bolster this approach. First, the title here is not serving the unenviable role of pithily summa- rizing a list of “complicated and prolifc” provisions. Train- men,
331 U. S., at 528. Section 1028A is a focused, stand- alone provision. Second, a title is “especially valuable [where] it reinforces what the text's nouns and verbs inde- Page Proof Pending Publication pendently suggest.” Yates v. United States,
574 U. S. 528, 552 (2015) (Alito, J., concurring in judgment). As explained below, § 1028A(a)(1)'s text independently suggests a focus on identity theft. See infra, at 124–127. Indeed, this Court has already once used § 1028A's title and place in the statutory scheme to shed light on its text. In Flores-Figueroa v. United States,
556 U. S. 646(2009), this Court pointed out that a neighboring provision, § 1028, carries the broad title “ ``Fraud and related activity in connec- tion with identifcation documents, authentication features, and information.' ” Id., at 655. Section 1028A, in contrast, is far more targeted, “us[ing] the words ``identity theft.' ” Ibid. That “Congress separated the [identity] fraud crime from the [identity] theft crime in” § 1028A suggests that § 1028A is focused on identity theft specifcally, rather than all fraud involving means of identifcation. Ibid.5 5 Flores-Figueroa held that under § 1028A(a)(1) a defendant must know “that the ``means of identifcation' he or she unlawfully transferred, pos- sessed, or used, in fact, belonged to ``another person.' ”
556 U. S., at 647. 122 DUBIN v. UNITED STATES Opinion of the Court Given that, it is abundantly clear why the Government urges the Court to ignore the title. The Government's broad reading, covering any time another person's means of identifcation is employed in a way that facilitates a crime, bears little resemblance to any ordinary meaning of “identity theft.” Consider again an unlicensed doctor who flls out a prescription actually requested by a patient; no one would call that identity theft. Even judges below who agreed with the Government's reading of § 1028A(a)(1), and ultimately the Government itself, acknowledged that its reading of § 1028A(a)(1) does not fairly capture the ordinary meaning of identity theft. Nor is the difference just around the edges; the Government's reading would, in practice, place garden- variety overbilling at the core of § 1028A. Instead, “identity theft” has a focused meaning. One dictionary defnes identity theft as “the fraudulent appropri- ation and use of another person's identifying data or docu- ments, as a credit card.” Webster's Unabridged Dictionary Page Proof Pending Publication xi (2d ed. 2001) (Webster's). Another similarly offers “[t]he unlawful taking and use of another person's identifying infor- mation for fraudulent purposes; specif[ically] a crime in which someone steals personal information about and belong- ing to another, such as a bank-account number or driver's- license number, and uses the information to deceive others.” Black's Law Dictionary 894 (11th ed. 2019) (Black's) (defning “identity theft”).6 This supports a reading of “in relation to” where use of the means of identifcation is at the crux of the underlying criminality. These defnitions refer to offenses built around what the defendant does with the means of identifcation in particular. In other words, the means of identifcation spe- The Court not only looked to § 1028A(a)(1)'s theft-focused title and role in the statutory structure, but also drew on an understanding that the provi- sion covers “classic identity theft.” Id., at 655–656. 6 “Steal[ing]” can, of course, include situations where something was ini- tially lawfully acquired. See Black's 1710 (defning “steal”). Cite as:
599 U. S. 110(2023) 123 Opinion of the Court cifcally is a key mover in the criminality. This central role played by the means of identifcation, which serves to desig- nate a specifc person's identity, explains why we say that the “identity” itself has been stolen. See, e. g., Spears,
729 F. 3d, at 756(“identity theft” occurs when someone's “iden- tity has been stolen or misappropriated”). This helps ex- plain why the examples resulting from the Government's theory do not sound like identity theft. If a lawyer rounds up her hours from 2.9 to 3 and bills her client using his name, the name itself is not specifcally a source of fraud; it only plays an ancillary role in the billing process. The same is true for the waiter who substitutes one cut of meat for an- other; we might say the flet mignon's identity was stolen, perhaps, but not the diner's. This understanding of identity theft also supports a more targeted defnition of “uses.” The word “use” appears in these defnitions with a specifc meaning: Identity theft en- Page Proof Pending Publication compasses when a defendant “uses the information to de- ceive others,” Black's 894 (emphasis added), and “the fraudu- lent . . . use” of a means of identifcation, Webster's xi (emphasis added). In other words, identity theft is com- mitted when a defendant uses the means of identifcation it- self to defraud or deceive. This tracks the Sixth Circuit's heuristic. When a means of identifcation is used decep- tively, this deception goes to “who” is involved, rather than just “how” or “when” services were provided. Use of the means of identifcation would therefore be at “the locus of [the criminal] undertaking,” rather than merely “passive,” “passing,” or ancillary employment in a crime. Jones, 529 U. S., at 855–856. On top of that, § 1028A's title is not just “identity theft,” but “Aggravated identity theft.” Typically, “[a]n ``aggra- vated' offense is one ``made worse or more serious by circum- stances such as violence, the presence of a deadly weapon, or the intent to commit another crime.' ” Carachuri- Rosendo v. Holder,
560 U. S. 563, 574 (2010) (quoting Black's 124 DUBIN v. UNITED STATES Opinion of the Court Law Dictionary 75 (9th ed. 2009)). This suggests that Con- gress had in mind a particularly serious form of identity theft. Yet the Government's reading “would apply an ``ag- gravated' . . . label” to all manner of everyday overbilling offenses. Carachuri-Rosendo,
560 U. S., at 574. “Of course . . . Congress, like ``Humpty Dumpty,' has the power to give words unorthodox meanings.”
Id., at 575. Yet where “the Government argues for a result that the English language tells us not to expect, . . . we must be very wary of the Government's position.”
Ibid.(internal quotation marks omitted). The title suggests identity thef t is at the core of § 1028A(a)(1). On the Government's reading, however, ev- eryday overbilling would become the most common trigger for § 1028A(a)(1)'s severe penalty. This would turn the core of “worse or more serious” identity theft into something the ordinary user of the English language would not consider identity theft at all. Page Proof Pending Publication 2 The title is, by defnition, just the beginning. A title does not supplant the actual text of the provision, as the Govern- ment observes. The problem for the Government is that § 1028A(a)(1)'s language points in the same direction as its title. In particular, Congress used a trio of verbs that re- fect an ordinary understanding of identity theft. While “uses” is indeterminate in isolation, here it has com- pany. Section 1028A(a)(1) applies when a defendant “know- ingly transfers, possesses, or uses, without lawful authority, a means of identifcation of another person,” “during and in relation to” any predicate offense. (Emphasis added.) “Under the familiar interpretive canon noscitur a sociis, ``a word is known by the company it keeps.' ” McDonnell v. United States,
579 U. S. 550, 568–569 (2016) (quoting Jarecki v. G. D. Searle & Co.,
367 U. S. 303, 307 (1961)). “[T]his canon is often wisely applied where a word is capable of many meanings in order to avoid the giving of unintended Cite as:
599 U. S. 110(2023) 125 Opinion of the Court breadth to the Acts of Congress.” McDonnell, 579 U. S., at 569 (internal quotation marks omitted). The two neighboring verbs here, “transfers” and “pos- sesses, ” are most naturally read in the context of § 1028A(a)(1) to connote theft. While it is not necessary to determine the precise metes and bounds of these two verbs, their role in the provision points to this targeted reading. Section 1028A(a)(1) covers unlawful possession or transfer of a means of identifcation belonging to “another person.” Generally, to unlawfully “possess” something belonging to another person suggests it has been stolen. And to unlaw- fully “transfer” something belonging to another person simi- larly connotes misappropriating it and passing it along. In Flores-Figueroa, this Court drew a similarly intuitive link between a defendant taking a means of identifcation he knows belongs to another person and “ ``theft.' ”
556 U. S., at 655. The Government, at argument, agreed: these two Page Proof Pending Publication verbs “refer to circumstances in which the information is sto- len.” Tr. of Oral Arg. 90.7 “Transfer” and “possess” not only connote theft, but iden- tity theft in particular. The verbs point to (1) theft of a (2) means of identifcation belonging to (3) another person. That tracks ordinary understandings of identity theft: “a crime in which someone [1] steals [2] personal information about and [3] belonging to another.” Black's 894. Simi- larly, “the [1] fraudulent appropriation and use of [3] another person's [2] identifying data or documents.” Webster's xi. If this parallel were not enough, § 1028A(a)(1)'s title indicates 7 Those who fnd legislative history helpful will fnd yet further support. “[P]ossesses” refers to “someone who has wrongly acquired another's means of identifcation, but has not yet put it to use or transferred it elsewhere.” H. R. Rep. No. 108–528, p. 10 (2004). “[T]ransfers” is when the defendant “transferred it to another person or location where it can be put to use.” Ibid. And “uses” is when “a defendant . . . obtained someone else's means of identifcation and actually put that means of iden- tifcation to use.” Ibid. 126 DUBIN v. UNITED STATES Opinion of the Court that the type of theft its verbs connote is identity theft specifcally. Because “transfer” and “possess” channel ordinary iden- tity theft, noscitur a sociis indicates that “uses” should be read in a similar manner to its companions. See McDonnell, 579 U. S., at 568–569. “Uses” is quite amenable to such a reading, and not just because of its indeterminacy. As ex- plained above, “using” another person's means of identifca- tion to deceive or defraud is a common feature of identity theft. See Webster's xi (“the fraudulent . . . use” of a means of identifcation (emphasis added)); Black's 894 (when a de- fendant “uses the information to deceive others” (emphasis added)). Congress thus employed a trio of verbs that capture vari- ous aspects of “classic identity theft.” Flores-Figueroa,
556 U. S., at 656. There is “the defendant [who] has gone through someone else's trash to fnd discarded credit card Page Proof Pending Publication and bank statements,” ibid., and thus has taken possession unlawfully. There is the bank employee who passes along customer information to an accomplice, and thus transfers it unlawfully. Then there is use involving fraud or deceit about identity: “a defendant [who] has used another person's identifcation information to get access to that person's bank account.”
Ibid.Another canon of construction offers a further point in favor of this narrow interpretation. The Court “assume[s] that Congress used [three] terms because it intended each term to have a particular, nonsuperfuous meaning.” Bai- ley,
516 U. S., at 146. Reading § 1028A(a)(1)'s operative verbs as tracking aspects of classic identity theft, each verb has an independent role to play. As the defnitions reveal, identity theft covers both when “someone steals personal in- formation about and belonging to another . . . and uses the information to deceive others,” Black's 894 (emphasis added), and “fraudulent appropriation and use,” Webster's xi (em- phasis added). Identity theft thus intermingles aspects of Cite as:
599 U. S. 110(2023) 127 Opinion of the Court theft and fraud, misappropriation and deceitful use. Section 1028A(a)(1)'s three verbs capture this complexity. While “transfer” and “possess” conjure up two steps of theft, “uses” supplies the deceitful use aspect. In contrast, if § 1028A(a)(1)'s verbs do not track identity theft and if the means of identifcation need only facilitate the predicate offense, the other two verbs threaten to leave “uses” without “virtually any function.” Bailey,
516 U. S., at 146. Return to a defnition of “in relation to” that just means “ ``facilitates or furthers' the predicate offense in some way.” Brief for United States 10. In virtually all cases where a defendant employs a means of identifcation to facili- tate a crime, the defendant will also possess or transfer the means of identifcation in a way that facilitates the crime. For example, petitioner's possession of the patient's means of identifcation facilitated the fraud, as did petitioner's transfer of the patient's means of identifcation to Medicaid. It is hard to imagine when “uses” would not similarly be Page Proof Pending Publication covered by, at least, one of the two other verbs. This risk of superfuity suggests giving § 1028A(a)(1) a more precise reading. In sum, § 1028A(a)(1)'s title and text are mutually reinforc- ing. Both point toward requiring the means of identifcation to be at the crux of the criminality. D Section 1028A's list of predicate offenses points to yet an- other stumbling block for the Government's broad reading. Section 1028A(a)(1) is an enhancement, and a severe one at that. It adds a 2-year mandatory prison sentence onto un- derlying offenses that do not impose a mandatory prison sen- tence of any kind. See, e. g.,
18 U. S. C. § 1035(“[f]alse state- ments relating to health care matters,” setting no minimum sentence). This prevents sentencing judges from consider- ing the severity of the offense, even if the amount of money involved was quite small or there are other mitigating fac- 128 DUBIN v. UNITED STATES Opinion of the Court tors. Interpretation of § 1028A(a)(1) should thus refect the “distinction between” the aggravated identity theft crimes that “Congress sought to distinguish for heightened punish- ment and other crimes.” Leocal,
543 U. S., at 11. Far from distinguishing, the Government's reading col- lapses the enhancement into the enhanced. Here, the Gov- ernment claims that because petitioner's overbilling was facilitated by the patient's Medicaid reimbursement number, § 1028A(a)(1) automatically applies. Patient names or other identifers will, of course, be involved in the great majority of healthcare billing, whether Medicare for massages, Hong, 938 F. 3d, at 1051, or for ambulance stretcher services, Med- lock,
792 F. 3d, at 706. Patient names will be on prescrip- tions, Berroa, 856 F. 3d, at 148, 155–156, and patients com- mitting fraud on their own behalf will often have to include the names of others on their forms, such as doctors or em- ployers. Under the Government's own reading, such cases are “automatically identity theft,” Tr. of Oral Arg. 82, inde- Page Proof Pending Publication pendent of whether the name itself had anything to do with the fraudulent aspect of the offense. Nor are these implications confned to healthcare. Sec- tion 1028A(a)(1)'s predicates include a vast array of offenses, including wire fraud and mail fraud. § 1028A(c)(5). The Government's boundless reading of “uses” and “in relation to” would cover facilitating mail fraud by using another per- son's name to address a letter to them.8 Even beyond that, 8 To avoid this, the Government has advanced a medley of shifting and inconsistent readings of “without lawful authority,” another element of § 1028A(a)(1). Sometimes the Government has claimed that a defendant would not violate § 1028A(a)(1) if they had permission to use a means of identifcation to commit a crime. See Brief for United States 32 (“every- one is presumed to have permission to use other people's names” in certain ways to facilitate crimes, such as addressing a letter); id., at 31–32 (a defendant can have “lawful authority” to use a co-conspirator's name to commit bank fraud). Other times the Government has argued that no one ever has permission to commit a crime. App. 32 (a person “can't give someone [else] permission” to use their name to facilitate a crime); Tr. of Cite as:
599 U. S. 110(2023) 129 Opinion of the Court names or other means of identifcation are used routinely for billing and payment, whether payment apps, credit and debit cards, a bill sent by mail, or an invoice sent electronically. So long as the criteria for the broad predicate offenses are met, the Government's reading creates an automatic 2-year sentence for generic overbilling that happens to use ubiqui- tous payment methods. A far more sensible conclusion from the statutory struc- ture is that § 1028A(a)(1)'s enhancement is not indiscrimi- nate, but targets situations where the means of identifcation itself plays a key role—one that warrants a 2-year manda- tory minimum. This points once more to a targeted reading, where the means of identifcation is at the crux of the under- lying criminality, not an ancillary feature of billing. E If more were needed, a fnal clue comes from the stagger- Page Proof Pending Publication ing breadth of the Government's reading. This Court has “ ``traditionally exercised restraint in assessing the reach of a federal criminal statute.' ” Marinello, 584 U. S., at ––– (quoting United States v. Aguilar,
515 U. S. 593, 600 (1995)); see also Arthur Andersen LLP v. United States,
544 U. S. 696, 703–704 (2005); McBoyle v. United States,
283 U. S. 25, 27 (1931). This restraint arises “both out of deference to the prerogatives of Congress and out of concern that a fair warning should be given to the world in language that the common world will understan[d] of what the law intends to do if a certain line is passed.” Marinello, 584 U. S., at ––– (internal quotation marks omitted). After all, “[c]rimes are supposed to be defned by the legislature, not by clever Oral Arg. 91–92 (doctor would violate § 1028A(a)(1) even if patient granted permission to use his name in the fraud). The Court need not, and does not, reach the proper interpretation of “without lawful authority.” Suffce it to say, these attempts to rein in § 1028A(a)(1) through another element of the statute show that the Government itself understands the problems that arise from its sweeping reading of “uses” and “in relation to.” 130 DUBIN v. UNITED STATES Opinion of the Court prosecutors riffng on equivocal language.” Spears,
729 F. 3d, at 758. Time and again, this Court has prudently avoided reading incongruous breadth into opaque language in criminal stat- utes. In Van Buren v. United States, 593 U. S. ––– (2021), the “far-reaching consequences” of the Government's reading “underscore[d] the implausibility of the Government's inter- pretation.”
Id.,at –––. In Marinello, the Court rejected the Government's reading of a statute about obstructing ad- ministration of the Tax Code that would have swept in the “person who pays a babysitter $41 per week in cash without withholding taxes,” as well as someone who “leaves a large cash tip in a restaurant, fails to keep donation receipts from every charity to which he or she contributes, or fails to pro- vide every record to an accountant.” 584 U. S., at –––. Nor was all such conduct innocent, as the statute required an individual to act “ ``corruptly.' ”
Id.,at –––. Even still, “[h]ad Congress intended” to sweep so far, “it would have Page Proof Pending Publication spoken with more clarity than it did.”
Id.,at –––. In Yates, the Court held that the Government's “unrestrained” reading would have turned a provision focused on “records” and “documents” into “an all-encompassing ban on the spolia- tion of evidence” that would “sweep within its reach physical objects of every kind,” including a fsh. 574 U. S., at 536, 540 (plurality opinion). Had Congress set out to do so, “one would have expected a clearer indication of that intent.” Id., at 540. So too here. The Government's reading would sweep in the hour-infating lawyer, the steak-switching waiter, the building contractor who tacks an extra $10 onto the price of the paint he purchased. So long as they used various com- mon billing methods, they would all be subject to a manda- tory two years in federal prison. To say that such a result is implausible would be an understatement.9 Because ev- 9 Even the Government had trouble stomaching some of these results, offering inconsistent accounts of certain examples. The Government claimed, for example, that if “an applicant for a bank loan . . . slightly Cite as:
599 U. S. 110(2023) 131 Opinion of the Court eryday overbilling cases would account for the majority of violations in practice, the Government's reading places at the core of the statute its most improbable applications. Finally, the Government makes a familiar plea: There is no reason to mistrust its sweeping reading, because prosecu- tors will act responsibly. To this, the Court gives a just-as- familiar response: We “cannot construe a criminal statute on the assumption that the Government will ``use it responsi- bly.' ” McDonnell, 579 U. S., at 576 (quoting United States v. Stevens,
559 U. S. 460, 480 (2010)). “[T]o rely upon prose- cutorial discretion to narrow the otherwise wide-ranging scope of a criminal statute's highly abstract general statu- tory language places great power in the hands of the prose- cutor.” Marinello, 584 U. S., at –––. This concern is par- ticularly salient here. If § 1028A(a)(1) applies virtually automatically to a swath of predicate offenses, the prosecutor can hold the threat of charging an additional 2-year manda- tory prison sentence over the head of any defendant who is Page Proof Pending Publication considering going to trial. III All the points above are different wells drawing from the same source. The Court need not decide whether any of these points, standing alone, would be dispositive. Taken together, from text to context, from content to common sense, § 1028A(a)(1) is not amenable to the Government's at- tempt to push the statutory envelope. A defendant “uses” another person's means of identifcation “in relation to” a predicate offense when this use is at the crux of what makes the conduct criminal. To be clear, being at the crux of the criminality requires more than a causal relationship, such as “ ``facilitation' ” of the offense or being a but-for cause of its “success.” Post, at 135, 137–138 (Gorsuch, J., concurring in judgment). Instead, with fraud or deceit crimes like the infates his salary while correctly identifying the co-signer,” “the inclusion of the co-signer's name is not ``in relation to' the fraud.” Brief for United States 31–32 (some internal quotation marks omitted). This cannot be squared with the Government's own “facilitates” standard. 132 DUBIN v. UNITED STATES Opinion of the Court one in this case, the means of identifcation specifcally must be used in a manner that is fraudulent or deceptive. Such fraud or deceit going to identity can often be succinctly sum- marized as going to “who” is involved.10 Here, petitioner's use of the patient's name was not at the crux of what made the underlying overbilling fraudulent. The crux of the healthcare fraud was a misrepresentation about the qualifcations of petitioner's employee. The pa- tient's name was an ancillary feature of the billing method employed. The Sixth Circuit's more colloquial formulation is a helpful guide, though like any rule of thumb it will have its limits. Here, however, it neatly captures the thrust of the analysis, as petitioner's fraud was in misrepresenting how and when services were provided to a patient, not who received the services. * * * Because petitioner did not use the patient's means of iden- tifcation in relation to a predicate offense within the mean- Page Proof Pending Publication ing of § 1028A(a)(1), the judgment of the Court of Appeals is vacated, and the case is remanded for further proceedings consistent with this opinion. It is so ordered. 10 Adrift in a blizzard of its own hypotheticals, the concurrence believes that it is too diffcult to discern when a means of identifcation is at the crux of the underlying criminality. Post, at 136. The concurrence's be- wilderment is not, fortunately, the standard for striking down an Act of Congress as unconstitutionally vague. There will be close cases, cer- tainly, but that is commonplace in criminal law. Equally commonplace are requirements that something play a specifc role in an offense, whether that role is articulated as a “nexus,” Marinello v. United States, 584 U. S. –––, ––– (2018), a “locus,” Jones v. United States,
529 U. S. 848, 855–856 (2000), or “proximate cause,” Robers v. United States,
572 U. S. 639, 645 (2014). Such requirements are not always simple to apply. Yet resolving hard cases is part of the judicial job description. Hastily resorting to vagueness doctrine, in contrast, would hobble legislatures' ability to draw nuanced lines to address a complex world. Such an approach would also leave victims of actual aggravated identity theft, a serious offense, without the added protection of § 1028A(a)(1). Cite as:
599 U. S. 110(2023) 133 Gorsuch, J., concurring in judgment Justice Gorsuch, concurring in the judgment. Whoever among you is not an “aggravated identity thief,” let him cast the frst stone. The United States came to this Court with a view of 18 U. S. C. § 1028A(a)(1) that would affx that unfortunate label on almost every adult American. Every bill splitter who has overcharged a friend using a mobile-payment service like Venmo. Every contractor who has rounded up his billed time by even a few minutes. Every college hopeful who has overstated his involvement in the high school glee club. All of those individuals, the United States says, engage in conduct that can invite a man- datory 2-year stint in federal prison. The Court today rightly rejects that unserious position. But in so holding, I worry the Court has stumbled upon a more fundamental problem with § 1028A(a)(1). That provision is not much bet- ter than a Rorschach test. Depending on how you squint your eyes, you can stretch (or shrink) its meaning to convict Page Proof Pending Publication (or exonerate) just about anyone. Doubtless, creative prose- cutors and receptive judges can do the same. Truly, the statute fails to provide even rudimentary notice of what it does and does not criminalize. We have a term for laws like that. We call them vague. And “[i]n our constitutional order, a vague law is no law at all.” United States v. Davis, 588 U. S. –––, ––– (2019). The “[a]ggravated identity theft” statute stipulates that “[w]hoever, during and in relation to any felony violation” listed in a later subsection, “knowingly transfers, possesses, or uses, without lawful authority, a means of identifcation of another person shall, in addition to the punishment provided for such felony, be sentenced to a term of imprisonment of 2 years.” § 1028A(a)(1). Today, the Court sets out to deter- mine what conduct that law reaches. It is, as the Court ac- knowledges, no easy task. Both the term “us[e]” and the phrase “in relation to” can support a multitude of possible meanings. Ante, at 118–119. They of course “ ``imply action and implementation.' ” Ante, at 118 (quoting Bailey v. 134 DUBIN v. UNITED STATES Gorsuch, J., concurring in judgment United States,
516 U. S. 137, 145 (1995)). Beyond that “gen- eral concept,” however, we must fend for ourselves based only on limited contextual clues. Ante, at 118–119. The United States offers up a rapacious interpretation that would require only “the use of th[e] means of identifca- tion [to] ``facilitat[e] or furthe[r]' the predicate offense in some way.” Brief for United States 10 (emphasis added). Ad- mittedly, this reading “fall[s] within the range” of plausible meanings the statute could support. Ante, at 119. But so too do other readings—ones that require a more demanding “nexus” between the “means of identifcation” and the under- lying misconduct. Ante, at 119–120. For many of the rea- sons the Court gives (and more besides), I agree that we must adhere to those more restrained offerings. The United States' maximalist approach has simplicity on its side, yes; an everybody-is-guilty standard is no challenge to ad- minister. But the Constitution prohibits the Judiciary from Page Proof Pending Publication resolving reasonable doubts about a criminal statute's mean- ing by rounding up to the most punitive interpretation its text and context can tolerate. See Wooden v. United States, 595 U. S. –––, ––– – ––– (2022) (Gorsuch, J., concurring in judgment). That insight alone means Mr. Dubin's § 1028A(a)(1) conviction cannot stand. Unfortunately, our opinion cannot end there. Having told lower courts how not to read the statute, we owe them some guidance as to how they should read it. That is where the real challenge begins. Drawing on contextual clues and rules of statutory interpretation, the Court concludes that a violation of § 1028A(a)(1) occurs whenever the “use of the means of identifcation is at the crux of the underlying crimi- nality.” Ante, at 122 (emphasis added). “In other words, the means of identifcation specifcally” must be in some way “a key mover in the criminality.” Ante, at 122–123 (empha- sis added). Put still another way, the “means of identifca- tion” must play the (or maybe a) “central role” in the com- mission of the offense. Ante, at 123 (emphasis added). Cite as:
599 U. S. 110(2023) 135 Gorsuch, J., concurring in judgment Setting aside some defnite-article inconsistency, those for- mulations all sound sensible enough. On closer review, how- ever, they present intractable interpretive challenges of their own. When, exactly, is a “means of identifcation” “at the crux,” “a key mover,” or a “central role” player in an offense? No doubt, the answer “turns on causation, or at least causation often helps to answer the question.” United States v. Michael,
882 F. 3d 624, 628 (CA6 2018). The Court agrees but stresses that “a causal relationship” of any kind will not suffce. Ante, at 131. At the same time, however, it studiously avoids indicating whether the appropriate standard is proximate cause or something else entirely novel.
Ibid.All of which gives rise to further questions. In vir- tually every fraud, a “means of identifcation” plays some critical role in the fraud's success—good luck committing a mail or wire fraud, for instance, without relying heavily on the name of the victim and likely the names of other third Page Proof Pending Publication parties. Just how much “causation” must a prosecutor es- tablish to sustain a § 1028A(a)(1) conviction? For that mat- ter, how does one even determine the extent to which a “means of identifcation” “caused” an offense, as compared to the many other necessary inputs? The Court supplies no frm answer. Instead, it leans on various illustrations that only highlight the diffculties inher- ent in this exercise. Take, for instance, the Court's assur- ance that a “waiter who serves fank steak but charges for flet mignon using an electronic payment method” has not committed aggravated identity theft. Ante, at 114, 123. Why not, exactly? In one sense, the “means of identifca- tion” (the credit card) lies “at the crux” of the fraud. The restaurant uses it to charge the customer for a product it never supplied. Maybe that feels less distasteful than a sce- nario in which an overseas hacker steals an individual's credit card information and deploys it to order luxury goods on Amazon. But the Constitution's promise of due process means that criminal statutes must provide rules “knowable 136 DUBIN v. UNITED STATES Gorsuch, J., concurring in judgment in advance,” not intuitions discoverable only after a prosecu- tor has issued an indictment and a judge offers an opinion. Percoco v. United States,
598 U. S. 319, 337 (2023) (Gorsuch, J., concurring in judgment). Not yet convinced? Consider some tweaks to the Court's hypothetical. Suppose that, instead of misrepresenting the cut of its steaks, a restaurant charged a customer for an ap- petizer he ordered that never arrived. What about an appe- tizer he never ordered? An additional entrée? Three? Three plus a $5,000 bottle of Moët? How about a Boeing 737? Now suppose the restaurant ran the customer's credit card for the same steak twice. What if it waited an hour to do so? A day? A year? What if the waiter gave the credit card information to a different employee at the same restaurant to run the charge? A different employee at a different restaurant? What if the restaurant sold the cus- tomer's credit card information on the dark web, and another Page Proof Pending Publication restaurant ran the card for flet mignon? On the Court's telling, the “crux” of the fraud in some of these examples lies merely in “how and when services were provided,” while in others the “crux” involves “who received the services.” Ante, at 132. But how to tell which is which? The Court's “crux” test seemingly offers no sure way through this “blizzard of . . . hypotheticals.” Ibid., n. 10. Nor is that because I have cherry-picked “hard cases.”
Ibid.Scenarios like these—and variations of them—illus- trate the sorts of problems that invariably arise in even simple § 1028A(a)(1) cases involving bogus restaurant bills. Other contexts can present still greater complications and still deeper uncertainties. The problem we face, then, is not that § 1028A(a)(1) presents some hard cases at its edges; the problem is this statute has no easy cases. Really, you could spend a whole day cooking up scenarios—ranging from the mundane to the fanciful—that collapse even your most basic intuitions about what § 1028A(a)(1) does and does not crimi- nalize. Try making up some of your own and running them Cite as:
599 U. S. 110(2023) 137 Gorsuch, J., concurring in judgment by a friend or family member. You may be surprised at how sharply instincts diverge. For the less adventurous, consider just the facts of the case now before us. On one framing, it seems outrageous to convict Mr. Dubin of aggravated identity theft. After all, the patient did (at one point) receive psychological testing. So you might say, as the Court does, that Mr. Dubin lied only about the qualifcations of the individual who provided those services and the date on which they occurred. See ante, at 119, 132. But on another framing, the patient's identity was “a key mover,” perhaps even “at the crux,” of the fraud. Mr. Dubin could not have successfully billed the insurance provider without accurately offering up some specifc pa- tient's name and information. Nor, as the United States notes, could Mr. Dubin have simply drawn a random name from a hat. Rather, his fraud depended on purloining the specifc identity of a “Texas Medicaid enrollee who had at Page Proof Pending Publication least three hours of psychological-testing reimbursement left in his or her account.” Brief for United States 13. Along the way, Mr. Dubin's fraud directly harmed the patient by depriving him of his annual eligibility for otherwise- compensable psychological services. From the patient's perspective, Mr. Dubin's use of his “means of identifcation” could hardly feel “ancillary.” Ante, at 114. As an abstract exercise, debating fact patterns like these may seem good fun. But there is nothing entertaining about a 2-year mandatory federal prison sentence. Criminal statutes are not games to be played in the car on a cross- country road trip. To satisfy the constitutional minimum of due process, they must at least provide “ordinary people” with “fair notice of the conduct [they] punis[h].” Johnson v. United States,
576 U. S. 591, 595 (2015). And, respectfully, I do not see how § 1028A(a)(1) can clear that threshold. Under the Court's “crux” test, no boundary separates con- duct that gives rise to liability from conduct that does not. And it appears I share this concern with the very lower 138 DUBIN v. UNITED STATES Gorsuch, J., concurring in judgment court judges who will have to apply this standard prospec- tively. As even many of the Fifth Circuit dissenters below warned, the sort of “facilitation standard” the Court today adopts, “with its incidental/integral dividing line,” is un- workable because it “lacks clear lines and a limiting princi- ple.”
27 F. 4th 1021, 1042 (2022) (en banc) (Costa, J., dissent- ing). In the end, it is hard not to worry that the Court's “crux” test will simply become a fg leaf for judges' and ju- rors' own subjective moral judgments about whether (as the Court itself puts it) the defendant's crime is “one that war- rants a 2-year mandatory minimum.” Ante, at 129. I do not question that the Court today has done the best it might to make sense of this statute. It's just that it faces an impossible task. In the past when this Court has grap- pled with similar statutory language, it has done so in con- texts where the relevant terms could carry only a few possi- ble (and comparatively fxed) meanings. For example, when Page Proof Pending Publication it comes to the “us[e]” of a frearm “in relation” to a crime of violence,
18 U. S. C. § 924(c)(1)(A), the presence of a gun could be a but-for cause of (or a necessary ingredient of) the offense—used, for example, as compensation in an exchange for illicit drugs. Smith v. United States,
508 U. S. 223, 237– 238 (1993). Or the gun could be “ ``used as a weapon' ” by being discharged or brandished.
Id., at 243(Scalia, J., dis- senting). Because both those interpretations are relatively bounded and understandable, this Court could use principles of statutory interpretation to choose between them. The same holds true for many of the other statutes the Court (mistakenly) frets I would call into doubt. See ante, at 132, n. 10. The same cannot be said for § 1028A(a)(1), though. There are an uncountable number of ways in which an individual could “us[e]” the “means of identifcation” of another to com- mit fraud. That list covers everything from including a vic- tim's name in the subject line of a fraudulent email; to misrepresenting information on a loan form involving a Cite as:
599 U. S. 110(2023) 139 Gorsuch, J., concurring in judgment co-signer; to putting on a wig and walking into a bank with a fake
ID.And no obvious neutral rule exists to separate those “uses” that violate § 1028A(a)(1) from others that do not. In this way, § 1028A(a)(1) is not just an “ambiguous” statute—“one that does defne prohibited conduct with some precision, but [that] is subject to two or more different inter- pretations.” J. Decker, Addressing Vagueness, Ambiguity, and Other Uncertainty in American Criminal Laws, 80 Den- ver U. L. Rev. 241, 261 (2002) (emphasis added). Instead, it is a vague statute—one that “does not satisfactorily defne the proscribed conduct” at all. Id., at 260–261. I do not write this opinion as wishcasting. Perhaps, by applying the Court's “crux” test, lower courts will achieve a consistency that has, to date, eluded them. Or perhaps they will, prompted by today's decision, locate a previously unseen path through this statutory quagmire. But I would not hold my breath. Section 1028A(a)(1) simply does too little to specify which individuals deserve the inglorious title of “ag- Page Proof Pending Publication gravated identity thief.” That is a problem Congress alone can fx. Until it does, I fear the issues that have long plagued lower courts will persist. And I will not be sur- prised if someday, maybe someday soon, they fnd their way back here. Reporter’s Note The attached opinion has been revised to refect the usual publication and citation style of the United States Reports. The revised pagination makes available the offcial United States Reports citation in advance of publication. The syllabus has been prepared by the Reporter of Decisions for the convenience of the reader and constitutes no part of the opinion of Page Proof Pending Publication the Court. A list of counsel who argued or fled briefs in this case, and who were members of the bar of this Court at the time this case was argued, has been inserted following the syllabus. Other revisions may include adjustments to formatting, captions, citation form, and any errant punctuation. The following additional edits were made: p. 112, line 20 from bottom, “term to a have” is changed to “term to have” p. 126, line 9 from bottom, “term to a have” is changed to “term to have”
Document Info
Docket Number: 22-10
Judges: Sonia Sotomayor
Filed Date: 6/8/2023
Precedential Status: Precedential
Modified Date: 8/22/2024