DocketNumber: 19-4273
Filed Date: 10/5/2021
Status: Precedential
Modified Date: 10/5/2021
RECOMMENDED FOR PUBLICATION Pursuant to Sixth Circuit I.O.P. 32.1(b) File Name: 21a0231p.06 UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT ┐ UNITED STATES OF AMERICA, │ Plaintiff-Appellee, │ > Nos. 19-4247/4273 │ v. │ │ BOGDAN NICOLESCU (19-4247); RADU MICLAUS │ (19-4273), │ Defendants-Appellants. │ │ ┘ Appeal from the United States District Court for the Northern District of Ohio at Cleveland. No. 1:16-cr-00224—Patricia A. Gaughan, District Judge. Argued: March 3, 2021 Decided and Filed: October 5, 2021 Before: WHITE, LARSEN, and NALBANDIAN, Circuit Judges. _________________ COUNSEL ARGUED: David L. Doughten, Cleveland, Ohio, for Appellant in 19-4247. Catherine Adinaro Shusky, OFFICE OF THE FEDERAL PUBLIC DEFENDER, Cleveland, Ohio, for Appellant in 19-4273. Laura McMullen Ford, UNITED STATES ATTORNEY’S OFFICE, Cleveland, Ohio, for Appellee. ON BRIEF: David L. Doughten, Cleveland, Ohio, for Appellant in 19-4247. Catherine Adinaro Shusky, OFFICE OF THE FEDERAL PUBLIC DEFENDER, Cleveland, Ohio, for Appellant in 19-4273. Laura McMullen Ford, UNITED STATES ATTORNEY’S OFFICE, Cleveland, Ohio, for Appellee. WHITE, J., announced the judgment and delivered the opinion of the court in which she joined in all but Section III.D., and LARSEN and NALBANDIAN, JJ., joined in full. WHITE, J. (pp. 28–29), delivered a separate opinion dissenting from Part III.D. of the court’s opinion. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 2 _________________ OPINION _________________ HELENE N. WHITE, Circuit Judge [Except as to Section III.D.]. For nine years, Defendants-Appellants Radu Miclaus and Bogdan Nicolescu ran a sophisticated, multimillion- dollar cyber-fraud ring out of Romania. They were extradited to the United States, and a federal jury in Ohio convicted them of wire fraud, conspiracy to commit wire fraud, conspiracy to commit computer fraud, aggravated identity theft, conspiracy to commit money laundering, and conspiracy to traffic in counterfeit service marks. The district court sentenced them to eighteen and twenty years’ imprisonment, respectively. On appeal, they raise several challenges to their convictions and sentences. We AFFIRM their convictions, VACATE their sentences, and REMAND for resentencing. I. Beginning around 2007, Nicolescu, Miclaus, and a handful of coconspirators began posting fake car auctions on eBay. Their group, dubbed “Bayrob” by the FBI (a combination of “eBay” and “robbery”), set up auctions that appeared to show vehicles for sale by US-based sellers. In reality, Bayrob had neither vehicles to sell nor a US address. Operating from in and around Bucharest, Romania, the group used various technologies to conceal its IP addresses, and employed US-based “money mules,” (falsely described to victims as “eBay Escrow Agents”) to collect payments from unsuspecting buyers. The money mules then wired the victims’ payments to various locations in Europe, where individuals associated with Bayrob collected the payments and brought them to Miclaus and Nicolescu in Romania. All told, the Bayrob group orchestrated the eBay fraud more than 1,000 times and reaped between $3.5 million and $4.5 million. At some point in 2014, Bayrob began employing a custom-made trojan horse virus to facilitate new money-making schemes. Nicolescu, a skilled computer programmer, created the virus, which he embedded in links in the group’s eBay auctions and in spam emails widely disseminated by Bayrob. Once a victim clicked the link and downloaded the virus onto the victim’s computer, it ran quietly in the background until the unsuspecting victim tried to visit Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 3 certain popular websites, including eBay, Facebook, PayPal, Gmail, Yahoo, and Walmart. At that point, instead of connecting to the real website, the virus discreetly redirected the victim’s computer to a look-a-likewebsite created by Bayrob, which collected the victim’s account credentials, identities, and credit-card information, and stored it all on Bayrob’s servers in Romania. Bayrob collected more than 70,000 account credentials this way, including 25,000 stolen credit-card numbers. Bayrob used the stolen credit cards to pay its own expenses, including costs for server space, VPNs, and registering domain names, and it sold some of the stolen credit cards on AlphaBay, a website on the dark web frequented by criminals, for prices ranging from $1–$35. Around the same time, Bayrob concocted a third money-making scheme. This time it harnessed the processing power of its network of 33,000 virus-infected computers to “mine” for cryptocurrency. Nicolescu’s trojan horse virus worked by commandeering an infected computer’s processor and forcing it to solve difficult mathematical equations that generate bitcoin, a process known as “cryptomining.” With their computers’ processing power tied up generating bitcoin for Bayrob, the victims’ computers slowed to a crawl. Bayrob exchanged the bitcoins generated by its cryptomining activities for cash, generating approximately $10,000–$20,000 per month in 2014, and $30,000–$40,000 per month in 2015 and 2016. The FBI caught on to Bayrob’s activities in 2015 and executed a search warrant on the cell phone of Tiberiu Danet, a Bayrob member, as he traveled through the Miami airport. Using information obtained from Tiberiu’s phone, the FBI and Romanian police executed a search warrant on Nicolescu’s, Miclaus’s, and Tiberiu’s residences in Romania. The searches turned up a trove of servers, hard drives, and other computing equipment used by the group. The FBI was not able to decrypt much of the information on Bayrob’s servers, but the cache of seized files the FBI was able to review included spreadsheets the group used to keep track of its victims and spreadsheets showing money Bayrob had moving through its money-mule network in the United States and Europe. In 2016, Nicolescu and Miclaus were indicted for conspiracy to commit wire fraud, twelve counts of wire fraud, conspiracy to commit computer fraud, conspiracy to traffic in Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 4 counterfeit service marks, five counts of aggravated identity theft, and conspiracy to commit money laundering. They were convicted on all counts after a two-and-a-half-week jury trial.1 At Defendants’ sentencing hearing, FBI agent Ryan MacFarlane testified that the eBay scheme generated between $3.5 million and $4.5 million in losses. The FBI calculated that figure by reviewing spreadsheets Bayrob used to keep track of its victims and cross-referencing the information in the spreadsheets with victim complaints filed with the FBI’s Internet Crime Complaint Center (ICCC). MacFarlane estimated that the true eBay loss figure was substantially higher than $3.5 to $4.5 million, since only 30–35% of victims filed complaints with the ICCC. According to MacFarlane, true losses may have been as high as $10 million to $30 million. At the conclusion of the sentencing hearing, the district court calculated Nicolescu’s and Miclaus’s Guidelines range for the conspiracy-to-commit-money-laundering grouping (Counts 1–15 and 21). The district court added eighteen levels to their Guidelines calculation under U.S.S.G. § 2B1.1(b)(1)(J) for causing a loss between $3.5 and $9.5 million, two levels under U.S.S.G. § 2B1.1(b)(4) for being in the business of receiving and selling stolen property, two levels under U.S.S.G. § 2B1.1(b)(11)(B)(i) for trafficking unauthorized access devices, four levels under U.S.S.G. § 2B1.1(b)(19)(A)(ii) for having been convicted of an offense under18 U.S.C. § 1030
(a)(5)(A), and four levels under U.S.S.G. § 3B1.1(a) for being an organizer or leader of criminal activity, as well as other enhancements not at issue in this appeal. The result was an adjusted offense level of forty-three, which at criminal history category I produced a Guidelines range of life imprisonment. Since a life sentence exceeded the statutory twenty-year maximum on any of the offenses in the grouping, the parties agreed to (and the district court applied) a five-level reduction for an applied total offense level of thirty-eight. After the five-level reduction, Nicolescu’s and Miclaus’s Guidelines range was 235 to 293 months. They were sentenced to 216 and 192 months’ imprisonment, respectively, on Counts 1 through 13 and 21, concurrent sentences of sixty months on Count 14 and 120 months on Count 15, and mandatory twenty-four month sentences on Counts 16 through 20, to run concurrently with each 1The jury acquitted Nicolescu and Miclaus on sentencing enhancements under18 U.S.C. § 3559
(g)(1) for false registration of domain names (pertaining to all counts). Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 5 other but consecutively to all the other sentences, for a total sentence of 240 (Nicolescu) and 216 (Miclaus) months’ imprisonment. This appeal followed. II. Nicolescu and Miclaus each appeal one substantive count of conviction and the application of multiple sentencing enhancements. We consider the challenges to their substantive convictions first. A. Nicolescu contends the district court erred in denying his motion for acquittal based on insufficiency of the evidence on Count 14, which charges conspiracy to violate18 U.S.C. § 1030
(a)(5)(A) and two other statutes. We review a district court’s denial of a motion for judgment of acquittal de novo. United States v. Howard,947 F.3d 936
, 947 (6th Cir. 2020). When reviewing the sufficiency of the evidence, we assess “whether, after viewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt.” Jackson v. Virginia,443 U.S. 307
, 319 (1979). The jury convicted Nicolescu and Miclaus on Count 14, which alleged a conspiracy with three objects: (i) to intentionally access a computer without authorization, and thereby obtain information from a protected computer, and the offense was committed for purposes of commercial advantage and private financial gain, in violation of Title 18, United States Code, Section 1030(a)(2)(C); and (ii) to intentionally access a computer without authorization and by means of such conduct furthered the intended fraud and obtained something of value, specifically, money, in excess of 3 to 4 million dollars, in violation of Title 18, United States Code, Section 1030(a)(4); and (iii) to knowingly cause the transmission of a program, information, code, and command, and, as a result of such conduct, intentionally cause damage without authorization to a protected computer, and the offense caused damage affecting Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 6 ten or more protected computers in a one year period, in violation of Title 18, United States Code, Sections 1030(a)(5)(A) and (c)(4)(B). R. 1, PID. 24 (Indictment ¶ 89). On appeal, Nicolescu challenges the sufficiency of the evidence on only the third object of the conspiracy, § 1030(a)(5)(A) and (c)(4)(B). Since this court must assume the evidence on the two unchallenged objects was sufficient, his failure to challenge the sufficiency of the evidence on the other two charged objects is fatal to his claim. See Griffin v. United States,502 U.S. 46
, 56–57 (1991) (“[W]hen a jury returns a guilty verdict on an indictment charging several acts in the conjunctive . . . the verdict stands if the evidence is sufficient with respect to any one of the acts charged.” (alteration in original) (quoting Turner v. United States,396 U.S. 398
, 420 (1970))). Moreover, the jury heard testimony from multiple witnesses that Nicolescu’s computer virus caused its victims’ computers to run slowly because the virus was using their computers’ processing power to mine for bitcoin. Such testimony was enough for a reasonable juror to find that Nicolescu conspired to damage a protected computer, in violation of § 1030(a)(5)(A) and (c)(4)(B).2 B. Miclaus contends the district court erred in denying his motion for acquittal on Counts 16 through 20, which charged aggravated identity theft in violation of 18 U.S.C. § 1028A, because 2Nicolescu’s brief describes his challenge as one to the sufficiency of the evidence, see Nicolescu Br. at 43 (“The evidence is insufficient to establish that the appellant conspired to violate18 U.S.C. §1030
(a)(5)(A)”), but to the extent Nicolescu intended to argue—as some of his briefing seems to suggest—that “slowing” of a computer cannot constitute “damage” to a computer as a matter of law, seeid.
(“Here, Nicolescu challenges whether he caused damage as required by the statute.”), this challenge too fails.18 U.S.C. § 1030
(e)(8) defines “damage” as “any impairment to the integrity or availability of data, a program, a system, or information[.]” Applying the same statute in the civil context, we looked to the ordinary meaning of the terms “impairment,” “integrity,” and “availability” and defined “damage” for purposes of § 1030(a)(5)(A) as “a transmission that weakens a sound computer system—or, similarly, one that diminishes a plaintiff’s ability to use data or a system[.]” Pulte Homes, Inc. v. Laborers’ Int’l Union of N. Am.,648 F.3d 295
, 301 (6th Cir. 2011). Nicolescu’s virus, which caused infected computers to “run very slowly,” R. 233, PID. 3729, would constitute an “impairment to the integrity . . . of . . . [the] system.” See18 U.S.C. § 1030
(e)(8). In other words, the virus was a “transmission that . . . diminishe[d] a [victim’s] ability to use . . . a system.” Pulte Homes, Inc.,648 F.3d at 301
; see also United States v. Carlson, 209 F. App’x 181, 184–85 (3d Cir. 2006) (finding that criminal defendant intentionally caused “damage” to victim’s computer under § 1030(a)(5)(A) when he flooded victim inboxes with thousands of spam emails, “which would clog the address, result in delays, and at times require the purging of all e-mails, causing valuable business-related e-mails to be permanently lost”). Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 7 the government did not present evidence that Miclaus aided and abetted the “use” of each of the five aggravated-identity-theft victims’ credit cards. Miclaus Br. at 43–50. We review the district court’s denial of Miclaus’s motion for judgment of acquittal de novo, and again assess whether, viewing the evidence in the light most favorable to the prosecution, any rational juror could have found the essential elements proven beyond a reasonable doubt. Howard, 947 F.3d at 947. To sustain a conviction for aggravated identity theft, the government must prove the defendant “(1) knowingly used, without lawful authority, a means of identification of another person; and (2) used that means of identification during and in relation to an enumerated predicate felony.” United States v. Vance,956 F.3d 846
, 857 (6th Cir.), cert. denied,140 S. Ct. 2819
(2020). Here, the alleged predicate felonies were computer fraud under § 1030 and wire fraud under § 1343. The jury was instructed, pursuant to Sixth Circuit Pattern Jury Instruction 15.04, that “use” means “active employment of the means of identification during and in relation to the [predicate felony]. Active employment includes activity such as displaying or bartering. ‘Use’ also includes a person’s reference to a means of identification in his possession for the purpose of helping to commit the [predicate felony].” R. 242, PID. 5759–60. Miclaus does not argue that a credit-card number is not a “means of identification,” nor does he challenge our pattern jury instruction’s definition of “use,” so we assume the correctness of both here. At trial, the jury heard that the names, addresses, and credit-card numbers of the five victims identified in Counts 16 through 20 were found on one of Bayrob’s internal victim- tracking spreadsheets (Exhibit 1204 at trial). An FBI agent testified that the FBI spoke with four of the victims and the fifth victim’s wife and confirmed that the identity and credit-card information in Bayrob’s spreadsheet was accurate. Some of the victims testified at trial and confirmed the same. Valentin Dima, a Bayrob member who cooperated with the government, testified that Bayrob had a practice of testing the validity of each credit-card number before adding it to its victim-tracking spreadsheets by “creating e-mail addresses through Yahoo, and then . . . upgrad[ing] the account [to] Yahoo plus,” which required a valid credit card, to see if each stolen credit card was still valid. R. 240, PID. 5341–42. The spreadsheet contained a column with “0’s” and “1’s” for each card, with “1” indicating that the card was still valid and Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 8 could be used for purchases, and “0” indicating that the card did not work. The spreadsheet contained another column where Bayrob members noted operational purchases they made with the stolen cards, including for website hosting and VPNs. Miclaus contends the government failed to prove Bayrob “used” each victim’s credit-card number because not every victim testified that fraudulent purchases were made on their credit cards. Miclaus’s challenge fails because even if fraudulent purchases were not made on each card, Dima testified that his job was to test each credit card before adding it to the spreadsheet, and the jury could see that the spreadsheet contained “0’s” and “1’s” for each card. 3 A means of identification is “used” whenever it is “employ[ed]” or “convert[ed] to one’s service.” United States v. Michael,882 F.3d 624
, 626 (6th Cir. 2018) (quoting Webster’s New International Dictionary 2806 (2d ed. 1942)). Sending a stolen credit-card number to Yahoo as part of a sham email account upgrade transaction for the sole purpose of having Yahoo run that credit-card number and report back whether it is still valid for future operational purchases is an “active employment” of that stolen credit-card number. Indeed, situations where a defendant impersonates a victim—as Bayrob did when it purported to be each of the victims in transactions with Yahoo—were the “principal target” of § 1028A. Michael, 882 F.3d at 627. Accordingly, when viewed in the light most favorable to the government, the evidence was sufficient for a reasonable juror to find Miclaus guilty on Counts 16 through 20. C. Miclaus also challenges the substance of the district court’s aggravated-identity-theft jury instruction. He contends that it omitted an element: that Miclaus be found to have committed an enumerated felony. Miclaus did not object to the instruction at trial, so we review for plain error. United States v. Small,988 F.3d 241
, 254 (6th Cir. 2021). “In the context of challenges to jury 3Even if Dima did not specifically testify that he tested each of the five aggravated-identity-theft victims’ credit-card numbers, Dima’s testimony about his activities testing cards, coupled with the evidence that the spreadsheet contained either a “0” or a “1” for every card, is circumstantial evidence that the five aggravated-identity-theft victims’ credit-card numbers were tested. “Circumstantial evidence alone is sufficient to sustain a conviction and such evidence need not remove every reasonable hypothesis except that of guilt.” Howard, 947 F.3d at 947 (quoting United States v. Lowe,795 F.3d 519
, 522–23 (6th Cir. 2015)). Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 9 instructions, plain error requires a finding that, taken as a whole, the jury instructions were so clearly erroneous as to likely produce a grave miscarriage of justice.”Id.
(quoting United States v. Newsom,452 F.3d 593
, 605 (6th Cir. 2006)). As noted in the preceding section, to sustain a conviction for aggravated identity theft, the government must prove the defendant “(1) knowingly used, without lawful authority, a means of identification of another person; and (2) used that means of identification during and in relation to an enumerated predicate felony.” Vance, 956 F.3d at 857. Here, the indictment alleged the predicate felonies were “Computer Fraud” under § 1030, and “Wire Fraud” under18 U.S.C. § 1343
, which are predicate felonies under § 1028A. See § 1028A(c)(4) (predicate offenses include provisions in chapter 47, which includes § 1030 computer fraud); § 1028A(c)(5) (predicate offenses include provisions in chapter 63, which includes § 1343 wire fraud). Paragraph 123 of the indictment alleges: 123. From on or about February 25, 2013, through on or about July 1, 2015, in the Northern District of Ohio, Eastern Division, and elsewhere, Defendants BOGDAN NICOLESCU, TIBERIU DANET, and RADU MICLAUS, and others presently known and unknown to the Grand Jury, did knowingly use, without lawful authority, a means of identification of another person during and in relation to a felony violation enumerated in Title 18, United States Code, Section 1028A(c), to wit, the commission of Computer Fraud, a violation of Title 18, United States Code, Section 1030, and Wire Fraud, a violation of Title 18, United States Code, Section 1343, knowing that the means of identification belonged to another actual person, in violation of Title 18, United States Code, Sections 1028A(a)(l) and 2. R. 1, PID 34 (Indictment ¶ 123). At trial, the district court’s jury instruction on the aggravated- identity-theft count read: Counts 16 through 20 of the indictment charge Defendants Bogdan Nicolescu and Radu Miclaus with the crime of aggravated identity theft, Title 18 United States Code, Sections 1028A(a)(1) and 2. Count 16 through 20 of the indictment charge each Defendant with using a means of identification of another person during and in relation to a felony violation listed in the statute. For you to find each Defendant guilty of this crime, you must find that the Government has proved each and every one of the following elements beyond a reasonable doubt. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 10 First, that each Defendant committed the following violation charged in Count 16 through 20. The violation charged in Count 16 through 20 is a felony violation listed in the statute; Second, that each Defendant knowingly used a means of identification of another person without lawful authority; Third, that each Defendant knew the means of identification belonged to another person; Fourth, that the use was during and in relation to the crime charged in Counts 16 through 20; ... The term “during and in relation to” requires that the means of identification have some purpose or effect with respect to the crime charged in Counts 16 through 20. In other words, the means of identification must facilitate or further or have the potential of facilitating or furthering the crime charged in Counts 16 through 20, and its presence or involvement cannot be the result of accident or coincidence. R. 242, PID. 5758–61. Miclaus is correct that the district court’s aggravated-identity-theft jury instruction was erroneous. The instruction should have specified, when describing the first and fourth elements and defining the term “during and in relation to,” that the predicate felonies charged in Counts 16 through 20 were § 1343 wire fraud and § 1030 computer fraud. Instead, the instruction referred back to Counts 16 to 20 as a whole. Such an error does not automatically warrant reversal, however. See United States v. Kuehne,547 F.3d 667
, 682 (6th Cir. 2008) (failure to instruct jury on elements of predicate offense in18 U.S.C. § 924
(c)(1) conviction was harmless because “the jury was presented with uncontroverted evidence supporting the predicate drug offenses”). Indeed, in the context of this case, we find it highly unlikely that the district court’s error led any juror astray. To start, the jury had the indictment during its deliberations and the indictment clearly explains that the predicate offenses are § 1030 computer fraud and § 1343 wire fraud. The jury was instructed on the substantive elements of § 1030 computer fraud when it was instructed on Count 14, which charged conspiracy to commit computer fraud, and on the substantive elements of wire fraud when it was instructed on Counts 2 through 13, which charged wire fraud. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 11 It convicted Nicolescu and Miclaus on all twenty-one counts, including wire fraud and conspiracy to commit computer fraud. Further, the aggravated-identity-theft allegations were inextricably intertwined with the computer-fraud and wire-fraud allegations. Over the course of the two-week trial, the jury heard testimony from some of the aggravated-identity-theft victims that their computers became infected with a virus after visiting an eBay auction, and it heard from the FBI that the aggravated-identity-theft victims’ credit-card information was found in Bayrob’s internal spreadsheets. That created the strong inference that Nicolescu and Miclaus obtained the victims’ credit-card information via the virus, and the jury was presented with no alternative explanation for how the aggravated-identity-theft victims’ credit-card information ended up in Bayrob’s spreadsheets. The jury then heard that Bayrob tested the stolen credit cards in preparation for—and in some cases to actually make—operational purchases necessary to support its vast online operation. This all adds up to a strong circumstantial case for aggravated identity theft: Bayrob came into possession of the aggravated-identity-theft victims’ credit-card information using the fake eBay auctions and the virus, which violated § 1343 and § 1030, and they used the stolen credit-card information when they verified the cards and made operational purchases with them, in violation of § 1028A. Because the offenses were so intertwined, it is unlikely that any juror could have believed that Miclaus was guilty of aggravated identity theft without also believing he was guilty of computer and wire fraud. We therefore find it unlikely that the district court’s error “produce[d] a grave miscarriage of justice” here. Newsom,452 F.3d at 605
. Miclaus’s claim is without merit. III. Nicolescu and Miclaus also challenge multiple sentencing enhancements applied by the district court. We consider each in turn. A. The district court applied an eighteen-level Guidelines enhancement under U.S.S.G. § 2B1.1(b)(1)(J) for causing losses of more than $3.5 million and less than $9.5 million. Nicolescu contends that was error because the government’s evidence only established a Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 12 $1.1 million gain for Bayrob as a result of the eBay scheme and $100,000 in fraudulent purchases on victims’ credit cards. Nicolescu argues that though a loss calculation under § 2B1.1(b)(1)(J) may include intended losses in addition to proven losses, doing so in this case rendered the district court’s loss calculation unduly speculative, since the government did not provide wire transfer information for all $3.5 million in alleged losses and instead relied on a $500-per-stolen-credit-card multiplier found in the Guidelines commentary to reach the estimated loss figure. Nicolescu contends that the government should have been required to present evidence of the credit limit of each of the stolen credit cards. Under the Guidelines, if the loss attributable to a theft exceeds $3.5 million but is less than $9.5 million, the district court is instructed to increase the offense level by eighteen levels. § 2B1.1(b)(1)(J). Section 2B1.1’s application notes define the applicable loss amount as “the greater of actual loss or intended loss.” Id. § 2B1.1 cmt. n.3(A). “Actual loss” is “the reasonably foreseeable pecuniary harm that resulted from the offense.” Id. § 2B1.1 cmt. n.3(A)(i). “Intended loss” is “the pecuniary harm that the defendant purposely sought to inflict[,]” which may include losses “that would have been impossible or unlikely to occur[.]” Id. § 2B1.1 cmt. n.3(A)(ii). In calculating the loss amount, the district court “need only make a reasonable estimate of the loss,” and its determinations are “entitled to appropriate deference.” Id. § 2B1.1 cmt. n.3(C). If the loss amount cannot reasonably be determined, the district court may use “the gain that resulted from the offense as an alternative measure[.]” Id. § 2B1.1 cmt. n.3(B). As a threshold matter, the district court cited both Agent MacFarlane’s testimony regarding the eBay-auction scheme and the credit cards Bayrob sold on AlphaBay when addressing the $3.5 million loss figure, but the district court found that “Agent Mac[F]arlane’s testimony [about the losses attributable to the eBay scheme] alone satisfies the Government’s burden.” R. 230, PID. 3257. Therefore, even if this court’s recent decision in United States v. Riccardi renders invalid any loss calculation based on a $500-per-stolen-credit-card multiplier, we need not address the stolen credit cards Bayrob sold on AlphaBay if the losses from the eBay scheme —which do not rely on a multiplier—totaled more than $3.5 million. See989 F.3d 476
, 489 (6th Cir. 2021) (invalidating § 2B1.1 cmt. n.3(F)(i)’s $500-per-access-device multiplier). Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 13 We review the district court’s findings regarding the losses attributable to the eBay scheme under a deferential clear-error standard. Id. at 487. In arriving at the $3.5 million loss figure, the district court relied heavily on Agent MacFarlane’s testimony at the sentencing hearing that the eBay scheme generated losses between $3.5 million and $4.5 million. The FBI calculated that figure after reviewing victim information found in an unencrypted spreadsheet that Bayrob members used to track payments from their victims, and then cross-referencing that information with complaints in the FBI’s ICCC database and tallying the loss amounts from those complaints. The FBI was able to match the information found on Bayrob’s servers with particular victim complaints by looking at “specific indicators that were associated with the Bayrob Group, such as known e-mail accounts, known money mules, known fax numbers and other technical indicators that allowed [the FBI] to identify complaints that were related to the Bayrob Group[.]” R. 230, PID. 3201. According to MacFarlane, the $3.5 million figure is based only on “actual observed transactions” from ICCC “complaints that [the FBI was] able to identify” that were also “consistent with the behavior of the Bayrob eBay fraud operation.” Id. at 3201–03. The FBI discounted ICCC complaints that alleged loss amounts that “weren’t realistic.” Id. at 3202. And, according to MacFarlane, the $3.5 million figure is a “conservative estimate” because only 30–35% of the eBay victims the FBI identified on Bayrob’s servers also filed complaints with the ICCC. Id. at 3203–04. The FBI estimates that the actual losses from the eBay scheme may have been as high as $30 million. “In challenging the court’s loss calculation, [Nicolescu] must carry the heavy burden of persuading this Court that the evaluation of the loss was not only inaccurate, but was outside the realm of permissible computations.” United States v. Jackson,25 F.3d 327
, 330 (6th Cir. 1994). Nicolescu’s primary argument is that the district court should have used traceable gains: here the $1.1 million in wire transfers the FBI was able to trace through one of Bayrob’s money mules back to Europe, instead of the $3.5 million figure provided by the FBI, which was based on verified ICCC victim complaints, but was not always backed up by evidence of specific wire transfers showing how each victim’s money ended up in Bayrob’s possession. The FBI was not able to trace more victim wire transfers back to Bayrob because the FBI was not able to decrypt much of the information on Bayrob’s servers, and MacFarlane testified that Nicolescu and Miclaus declined to assist the FBI in identifying the other money mules the group used. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 14 Although more specificity about Bayrob’s illicit gains may have been preferable, “the district court need only make a reasonable estimate of the loss using a preponderance of the evidence standard.” United States v. Ellis,938 F.3d 757
, 760 (6th Cir. 2019) (quoting United States v. Wendlandt,714 F.3d 388
, 393 (6th Cir. 2013)). And the Guidelines commentary provides that the district court “shall use the gain that resulted from the offense as an alternative measure of loss only if there is a loss but it reasonably cannot be determined.” § 2B1.1 cmt. n.3(B) (emphasis added). Here, the district court based its $3.5 million loss calculation on (i) Agent MacFarlane’s detailed testimony about the FBI’s efforts to identify specific victim complaints attributable to Bayrob, including his assurances that the $3.5 million loss figure was based on “actual observed transactions,” (ii) the district court’s own review of Bayrob’s internal victim-tracking spreadsheets, and (iii) victim statements submitted to the district court. R. 230, PID. 3258. Given the practical difficulties the government and the district court faced in obtaining more precise detail about victim losses—some of which can be attributed to Defendants’ decision to encrypt the files on their servers and their refusal to provide the FBI with the decryption key—the district court’s reliance on victim statements and ICCC complaints was reasonable, and we cannot say on the record before us that the district court’s $3.5 million loss calculation was clearly erroneous. B. U.S.S.G. § 2B1.1(b)(4) provides for a two-level increase if “the offense involved receiving stolen property, and the defendant was a person in the business of receiving and selling stolen property[.]” At the sentencing hearing, the district court applied the two-level § 2B1.1(b)(4) enhancement because it found that Nicolescu and Miclaus “operated a long- standing and highly sophisticated scheme” whereby they “obtained vast amounts of credit card data, which [they] did, in fact, sell” on AlphaBay “even if [they were] not initially in the business of buying and selling property.” R. 230, PID. 3263–64. Nicolescu and Miclaus contend that was error because § 2B1.1(b)(4) was intended to apply to defendants who “fence” stolen goods for others, and Bayrob was not a fence: it only sold credit cards on the dark web that the group itself stole. Nicolescu Br. at 30; Miclaus Br. at 18. The government’s brief takes a broader view of the reach of the Guideline: the government Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 15 contends that § 2B1.1(b)(4) is not limited to fencing cases, and the language of § 2B1.1(b)(4) covers situations where defendants “receive” stolen goods from a computer virus and then sell them on the dark web. Appellee’s Br. at 44–45. Additionally, the government suggests that the enhancement can apply when a defendant “receives” stolen property from a coconspirator and then sells it—even when the object of the conspiracy was to steal the same property. “When reviewing the district court’s application of the Sentencing Guidelines, we review the district court’s factual findings for clear error and mixed questions of law and fact de novo.” United States v. Tolbert,668 F.3d 798
, 800 (6th Cir. 2012) (quoting United States v. May,568 F.3d 597
, 604 (6th Cir. 2009)). We review the district court’s interpretation of the Sentencing Guidelines de novo.Id.
By its terms, § 2B1.1(b)(4) applies “[i]f the offense involved receiving stolen property” and “the defendant” was “in the business of receiving and selling stolen property[.]” In determining whether a defendant is “in the business of” receiving and selling stolen property, Application Note 5 to § 2B1.1 instructs courts to consider “(A) [t]he regularity and sophistication of the defendant’s activities; (B) [t]he value and size of the inventory of stolen property maintained by the defendant; (C) [t]he extent to which the defendant’s activities encouraged or facilitated other crimes; [and] (D) [t]he defendant’s past activities involving stolen property.” § 2B1.1 cmt. n.5. We have not yet addressed whether § 2B1.1(b)(4) is limited in its application to defendants who sell goods that others have stolen, as opposed to defendants who sell goods they have stolen themselves, but in United States v. Warshawsky, we addressed a prior version of the same Guideline and explained that “[a] person ‘in the business of receiving and selling stolen property’ is a person once referred to less flatteringly as a ‘fence.’”20 F.3d 204
, 214 (6th Cir. 1994). A few months later, citing Warshawsky, we recognized that for purposes of the enhancement, there is a difference between “a person who receives stolen property” and a person “who sells property that he himself has stolen[,]” because the Sentencing Commission “decided that fences deserve longer sentences than mere thieves” because fencing facilitates and encourages other crimes while mere thievery does not. United States v. Koehler,24 F.3d 867
, Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 16 871 (6th Cir. 1994). Accordingly, we explained that only those who sell goods that others have stolen are subject to the “fencing” enhancement.Id.
Warshawsky and Koehler interpreted U.S.S.G. § 2B1.2, which was deleted and consolidated with § 2B1.1 in November 1993. United States v. Vigil,644 F.3d 1114
, 1119 (10th Cir. 2011). The 1993 amendment also added the first clause to the current iteration of the enhancement, which now requires that “the offense involved receiving stolen property[.]”Id.
But neither the addition of the first clause nor consolidation with § 2B1.1 provides us with reason to question what we said in Warshawsky and Koehler: the defendant must “receive” stolen goods before he can be “in the business of receiving and selling stolen property.” A defendant does not “receive” goods he himself stole. See United States v. McMinn,103 F.3d 216
, 219 (1st Cir. 1997) (“Under the common-law tradition, stealing property from another normally does not equate with ‘receiving’ property from its rightful owner.”); Baugh v. United States,540 F.2d 1245
, 1246 (4th Cir. 1976) (“[L]ogic . . . instructs us that there is an inherent inconsistency in treating a taking as a receipt.”). Accordingly, § 2B1.1(b)(4) is limited in its application to professional fences—it does not apply to thieves who merely sell goods they stole.4 Our sister circuits have almost unanimously reached the same conclusion. See, e.g., United States v. Borders,829 F.3d 558
, 568 (8th Cir. 2016); Vigil,644 F.3d at 1118
; United States v. Bradley,644 F.3d 1213
, 1287 (11th Cir. 2011); Kimbrew, 406 F.3d at 1152; McMinn,103 F.3d at
219–21; United States v. Sutton,77 F.3d 91
, 94 (5th Cir. 1996); United States v. Braslawsky,913 F.2d 466
, 468 (7th Cir. 1990) (coming to same conclusion about prior version of the enhancement, § 2B1.2(b)(3)(A)). But see United States v. Collins,104 F.3d 143
, 144 (8th Cir. 1997) (holding that a thief was “in the business” of receiving and selling stolen property when he delivered goods he had stolen to an auction house and split the proceeds with the auction house after the goods were sold). 4In 2001, the Sentencing Commission added Application Note 5 to § 2B1.1, which adopted a “totality of the circumstances” test for determining whether a defendant’s fencing activities were frequent enough to consider him “in the business of” receiving and selling stolen property. Vigil,644 F.3d at 1120
. Application Note 5 had the effect of abrogating a different test this court had adopted in Warshawsky.Id.
But the addition of Application Note 5 and the abrogation of the test adopted in Warshawsky does not affect our analysis here, since “both tests operate on the predicate that the defendant is a fence.” United States v. Kimbrew,406 F.3d 1149
, 1154 (9th Cir. 2005). Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 17 Nonetheless, that holding does not end our inquiry here. In its brief, the government contends that Nicolescu and Miclaus are eligible for the enhancement because they “received” stolen credit cards from the computer virus Nicolescu created and Miclaus injected into his fake eBay auction listings. Appellee’s Br. at 39–40. The government cites no authority in support of its novel theory of receipt. We find the government’s theory to be linguistically untenable. The virus was a tool created and employed by Nicolescu and Miclaus to steal victims’ credit-card numbers. Tools and other inanimate objects do not commit larceny. People do. For that reason, Defendants cannot “receive” stolen goods from their tools. Were we to adopt the government’s reading, it would effectively collapse larceny and receipt of stolen goods—“distinct substantive offense[s]” at common law—into the same offense. 76 C.J.S. Receiving Stolen Goods § 1 (2021); see also McMinn,103 F.3d at 219
. We decline to adopt such an anomalous interpretation. Moreover, our interpretation is consistent with the Application Note, which we are bound to apply. See Stinson v. United States,508 U.S. 36
, 38 (1993); United States v. Paauwe,968 F.3d 614
, 618 (6th Cir. 2020). Application Note 5 to § 2B1.1 instructs courts to consider “[t]he extent to which the defendant’s activities encouraged or facilitated other crimes” when deciding whether to apply the enhancement. Fences induce others to commit property crimes by providing them with a ready market for their stolen goods. See Warshawsky,20 F.3d at 215
; Koehler,24 F.3d at 871
. Thieves who sell goods they stole typically do not. Here, the government conceded at oral argument that there was no evidence that Bayrob sold goods stolen by anyone outside of the group. Thus, there is no evidence that Nicolescu and Miclaus acted as “fences.” Alternatively, the government suggests that Nicolescu and Miclaus are subject to this enhancement because the individuals within Bayrob responsible for stealing some of the credit cards were not necessarily the same people who sold them on AlphaBay. Appellee’s Br. at 41 (“Nicolescu gave Valentin Danet access to Bayrob’s Alpha Bay account to sell the stolen credit cards and provided the bitcoin payment wallets used for the sales.”); Appellee’s Br. at 45 (“[T]he defendant[s] received some of the stolen data in part through phishing-initiated theft that was developed by a co-conspirator.”); Oral Arg. at 28:50 (arguing that Nicolescu and Miclaus Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 18 received stolen cards from other Bayrob members who had personally stolen them). In other words, the government’s argument is that an individual who “receives” stolen property from a coconspirator and then sells it is operating as a fence. The government’s theory is untenable where, as here, the object of the conspiracy was to steal the property. If two or more individuals conspire to steal something, all members of the conspiracy are accountable for the theft. See U.S.S.G. § 1B1.3(a)(1)(B) (outlining requirements to hold defendant liable for jointly undertaken conduct in calculating advisory Guidelines sentencing range); United States v. Hamm,952 F.3d 728
, 744 (6th Cir. 2020) (discussing requirements for holding a defendant liable for the crimes of a coconspirator under Pinkerton v. United States,328 U.S. 640
(1946)); see also United States v. Gilbert, 725 F. App’x 370, 373 (6th Cir. 2018) (discussing Pinkerton liability in the context of aggravated identity theft). It would be strange, therefore, not to think of such conspirators as participating in the theft, even if they do not do so physically or personally. If an individual is responsible for stealing property, then he cannot fence the same property. See Koehler,24 F.3d at 871
; Warshawsky,20 F.3d at
214–15. Thus, even if other members of Bayrob completed some of the credit-card thefts themselves and then passed those cards on to Nicolescu or Miclaus to sell (or if defendants stole the cards and gave them to other Bayrob members to sell), the “seller” did not receive stolen property within the meaning of § 2B1.1(b)(4). The seller conspired to steal. That made him a thief, not a fence. Cf. Kimbrew,406 F.3d at
1150–54 (declining to apply fencing enhancement where defendant conspired to obtain computers via fraud, which a coconspirator would then re-sell). The government looks for contrary support in the Eighth Circuit’s decision in United States v. Borders. See 829 F.3d at 568–69. In Borders, the Eighth Circuit found that it was not clear error to apply § 2B1.1(b)(4) to a defendant who “often scouted and stole trucks” for another defendant who gave him “shopping lists” of property to steal. Id. at 569. It also applied the enhancement to the defendant who wrote the “shopping lists” and sold the property. Id. But Borders’s § 2B1.1(b)(4) analysis did not grapple with the fact that both defendants were engaged in a conspiracy to steal the property in question. As such, we do not find it instructive. We conclude that the district court erred in applying a two-level enhancement under § 2B1.1(b)(4) for receiving and selling stolen property. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 19 C. The district court applied a four-level leadership-role enhancement under U.S.S.G. § 3B1.1(a) to both Defendants’ Guidelines calculations. On appeal, Nicolescu, whose online moniker was “Master Fraud 1,” R. 236, PID. 4383, contends that he was, in fact, not the master of the frauds. He asserts that he “was not the leader in the money laundering” and was “equally responsible as others, but had no more authority tha[n] at least two other members of Bayrob[.]” Nicolescu Br. at 30–31. In his telling, only a two-level enhancement was warranted. Miclaus argues that the leadership-role enhancement was not warranted because he “was not recruiting members, writing code, maintaining the servers, or recruiting money mules” and “[h]is only roles were to post fraudulent auctions on eBay and to, occasionally, accept money from Antonovici to pass along to other members of the group.” Miclaus Br. at 39. This court reviews “the district court’s legal conclusion that a person is an organizer or leader under [§] 3B1.1 deferentially, and its factual findings for clear error.” United States v. Sexton,894 F.3d 787
, 794 (6th Cir. 2018) (alteration in original) (internal quotation marks omitted) (quoting United States v. House,872 F.3d 748
, 751 (6th Cir. 2017)). “Under the clear- error standard, we abide by the court’s findings of fact unless the record leaves us with the definite and firm conviction that a mistake has been committed.”Id.
(quoting United States v. Yancy,725 F.3d 596
, 598 (6th Cir. 2013)). The deferential review of the district court’s ultimate legal conclusion is based on the recognition that the “trial judge is most familiar with the facts and is best situated to determine whether someone is or is not a ‘leader’ of a conspiracy that the jury found existed.” United States v. Washington,715 F.3d 975
, 983 (6th Cir. 2013). Section 3B1.1(a) provides for a four-level increase “[i]f the defendant was an organizer or leader of a criminal activity that involved five or more participants or was otherwise extensive[.]” To decide whether a defendant was an “organizer or leader,” the Guidelines direct courts to consider a number of factors, including the exercise of decision making authority, the nature of participation in the commission of the offense, the recruitment of accomplices, the claimed right to a larger share of the fruits of the crime, the degree of participation in planning or organizing the offense, the nature and scope of the illegal activity, and the degree of control and authority exercised over others. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 20 § 3B1.1 cmt. n.4. “The government bears the burden of proving that the enhancement applies by a preponderance of the evidence.” United States v. Vandeberg,201 F.3d 805
, 811 (6th Cir. 2000). “A district court need not find each factor in order to warrant an enhancement.” United States v. Castilla–Lugo,699 F.3d 454
, 460 (6th Cir. 2012). Nicolescu. At the sentencing hearing, the district court explained that “[w]itnesses testified that [Nicolescu] was the mastermind behind the entire operation” which “includes the money laundering scheme.” R. 230, PID. 3275–76. The district court noted that Nicolescu was “a constant member of the scheme,” and found that he was a leader in the conspiracy because he “controlled the money mule network in the United States which was necessary to the success of the money laundering scheme” and “provided directives to other members in the conspiracy.”Id.
Ample evidence supported a finding that Nicolescu was the primary leader of the Bayrob group and the orchestrator of its various schemes, including the money-laundering conspiracy. Over the course of the two-and-a-half-week trial, the court heard how Nicolescu created the computer virus, recruited the money mules, instructed the mules to divide the wire transfers into increments below $3,000 to avoid detection, and kept 25% of the profits—the highest percentage (along with two other members) in the Bayrob group. The district court did not err in applying a four-level enhancement to Nicolescu’s Guidelines calculation under § 3B1.1(a). Miclaus. The government argued that a four-level enhancement was warranted for Miclaus because he was one of only two Bayrob members who had been with the group since its inception, was responsible for hundreds of fraudulent auction postings on eBay, and was the Bayrob member in charge of collecting money from Antonovici and the European money mules. The district court summarily agreed, noting that “there can be more than one leader or organizer of a criminal conspiracy[,]” and after recounting the § 3B1.1(a) factors, stating, “I do, in fact, agree that Mr. Miclaus was, in fact, a leader or organizer, not the sole, but a leader or organizer.” R. 230, PID. 3296. Miclaus did not write code or set up physical or cyber infrastructure for the group, and he received only 10% of the group’s profits—the smallest share of any of the Bayrob members. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 21 While these factors would seem to cut against a finding that Miclaus was a leader of the Bayrob group, the § 3B1.1(a) enhancement was for the money-laundering conspiracy specifically, and Miclaus had an outsized role in the group’s money-laundering activities: he was the group’s most prolific poster on eBay—more than 947 fraudulent auctions—which generated the money that was the raison d’etre of the money-laundering conspiracy, he recruited Antonovici to return to the conspiracy after a multi-year absence, and he exercised control over Antonovici and the other European money mules in his role as the Bayrob member responsible for collecting the profits from the cryptomining scheme and the eBay fraud as they came in from the United States. Miclaus and Nicolescu were also the only two constant members of the conspiracy, as other members came and went over the years Bayrob operated. We must review the district court’s decision to apply a leadership-role enhancement under § 3B1.1 deferentially, Sexton, 894 F.3d at 794, and on this record, we cannot conclude that the district court committed reversible error in applying a four-level leadership-role enhancement to Miclaus’s Guidelines calculation. D. The district court imposed a two-level enhancement under U.S.S.G. § 2B1.1(b)(11)(B)(i), which applies “[i]f the offense involved . . . the production or trafficking of any . . . unauthorized access device.” Here, the district court concluded that Bayrob’s sale of stolen credit-card numbers constituted trafficking in unauthorized access devices. See U.S.S.G § 2B1.1 cmt. n.10 (defining “unauthorized access device” as “any card . . . that can be used . . . to obtain money, goods, services, or any other thing of value” that has been “stolen . . . with intent to defraud”). Nicolescu and Miclaus don’t dispute that point. Instead, they say that Application Note 2 to U.S.S.G. § 2B1.6 precludes the trafficking enhancement. That provision relates to their aggravated identity theft convictions under 18 U.S.C. § 1028A. The aggravated-identity-theft statute mandates a two-year sentence if, during the commission of certain enumerated felonies, the defendant “knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person[.]” 18 U.S.C. § 1028A(a)(1). A sentence under § 1028A must be served consecutively to any other sentence imposed (except for another § 1028A sentence imposed at the same time). Id. § 1028A(b)(2), (b)(4). For that reason, Application Note 2 to U.S.S.G. § 2B1.6 provides: Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 22 If a sentence [for aggravated identity theft] is imposed in conjunction with a sentence for an underlying offense, do not apply any specific offense characteristic for the transfer, possession, or use of a means of identification when determining the sentence for the underlying offense. A sentence [for aggravated identity theft] accounts for this factor for the underlying offense of conviction, including any such enhancement that would apply based on conduct for which the defendant is accountable under § 1B1.3 (Relevant Conduct). U.S.S.G. § 2B1.6 cmt. n.2 (emphasis added). Because the mandatory two-year § 1028A sentence already accounts for “the transfer, possession, or use of a means of identification” during the commission of the predicate offense, Application Note 2 was added “to prevent a defendant from being doubly penalized for the same conduct.” See United States v. Taylor,818 F.3d 671
, 675 (11th Cir. 2016). Nicolescu and Miclaus read Application Note 2 to say that the mandatory § 1028A sentence already accounts for unauthorized-access-device trafficking. Accordingly, they argue, the district court wrongly enhanced their total sentences twice for the same conduct. The district court reasoned that, despite the mandatory two-year sentence under § 1028A, it could apply a two-level enhancement under § 2B1.1(b)(11)(B)(i) because “trafficking” includes additional conduct not captured in “transfer, possession, or use.” R. 230, PID. 3268. We have not yet opined on whether “transfer[ring] . . . a means of identification” as contemplated in § 1028A and Application Note 2 to § 2B1.6 is synonymous with “trafficking [an] unauthorized access device” as used in § 2B1.1(b)(11)(B)(i). If “transferring” and “trafficking” are indeed synonymous, then an enhancement under § 2B1.1(b)(11)(B)(i) would not be appropriate.5 But if the culpable conduct involved in “trafficking” is “different than or in addition to” the “transfer, possession, or use,” then the enhancement can apply. See Taylor, 818 F.3d at 675. For example, in United States v. Lyles, we rejected a defendant’s argument that Application Note 2 prevented a loss-based enhancement under U.S.S.G. § 2B1.1(b)(1). 506 F. App’x 440, 446–47 (6th Cir. 2012). We explained that the loss-based enhancement “punishe[d] 5The phrase “means of identification” includes “unauthorized access devices.” See18 U.S.C. §§ 1028
(d)(7)(D), 1029(e)(3); U.S.S.G §§ 2B1.1 cmt. n.10(A), 2B1.6 cmt. n.2. Therefore, these terms do not create a meaningful distinction between the conduct covered in § 2B1.1(b)(11)(B)(i) and that covered in Application Note 2 to § 2B1.6. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 23 the defendant for inflicting a particular monetary harm rather than for transferring, possessing, or using a means of identification.” Id. at 447. Neither § 2B1.1(b)(11), § 2B1.6, nor the relevant commentary defines “traffic” or “transfer.”6 When the Guidelines “do[] not define a term, we generally give the term its ordinary meaning.” Riccardi, 989 F.3d at 486 (citation omitted). The ordinary meaning of “traffic” carries a commercial aspect, which the word “transfer” does not. Compare “Traffic,” Oxford English Dictionary, oed.com (“To engage in trade or commerce, esp[ecially] between one country, region, or community and another; to buy and sell, or barter, goods or commodities; to trade.”), and “Traffic,” Am. Heritage Coll. Dict. (3d ed. 1993) (“The commercial exchange of goods; trade.”), with “Transfer,” Oxford English Dictionary, oed.com (“To convey or take from one place, person, etc. to another; to transmit, transport; to give or hand over from one to another.”), and “Transfer,” Am. Heritage Coll. Dict. (3d ed. 1993) (“To convey or cause to pass from one place, person, or thing to another.”). As Nicolescu’s counsel conceded at oral argument, trafficking is transfer plus something else, such as marketing or sale. So, although all “trafficking” involves “transfer,” the converse is not true. Here, in addition to “transferring” stolen credit-card numbers to others on the internet, Bayrob also marketed them on AlphaBay and accepted payment in return for their sale. The commercial aspect of “trafficking” is not captured by the § 1028A conviction, and the best reading of the Guidelines suggests that “trafficking” unauthorized access devices should bear additional consequences that mere transfer does not. By contrast, a Guideline provision adjacent to § 2B1.1(b)(11)(B) illustrates the type of enhancement that § 2B1.6 does prevent. That provision is § 2B1.1(b)(11)(C). It imposes a two- level enhancement for “(i) the unauthorized transfer or use of any means of identification 6Our dissenting colleague points out that one statute defines “traffic” to mean “transfer, or otherwise dispose of, to another, or obtain control of with intent to transfer or dispose of.”18 U.S.C. § 1029
(e)(5) (emphasis added). But another nearby statute defines “traffic” to include a commercial component: “[T]he term ‘traffic’ means . . . (A) to transport, transfer, or otherwise dispose of, to another, as consideration for anything of value; or (B) to make or obtain control of with intent to so transport, transfer, or otherwise dispose of.”Id.
§ 1028(d)(12) (emphasis added). In any event, the relevant Guidelines and Application Notes define many other terms using definitions contained in18 U.S.C. §§ 1028
and 1029. But the Sentencing Commission has not chosen to do so with respect to the word “traffic.” Therefore, these statutes are not binding, and we instead look to the ordinary meaning of the disputed terms. See Riccardi, 989 F.3d at 486. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 24 unlawfully to produce or obtain any other means of identification, or (ii) the possession of 5 or more means of identification that unlawfully were produced from, or obtained by the use of, another means of identification.” U.S.S.G. § 2B1.1(b)(11)(C) (emphasis added). Both § 2B1.1(b)(11)(C) and § 2B1.6 use the terms “transfer,” “possession,” and “use.” Section 2B1.1(b)(11)(B) does not; it uses “trafficking.” Courts “usually ‘presume differences in language like this convey differences in meaning.’” Wis. Central Ltd. v. United States,138 S. Ct. 2067
, 2071 (2019) (quoting Henson v. Santander Consumer USA Inc.,137 S. Ct. 1178
, 1723 (2017)); see DePierre v. United States,564 U.S. 70
, 83 (2011) (“[T]he usual rule [is] that ‘when the legislature uses certain language in one part of the statute and different language in another, the court assumes different meanings were intended.’” (quoting Sosa v. Alvarez-Machain,542 U.S. 692
, 711 n.9 (2004))); cf. United States v. Howse,478 F.3d 729
, 733 (6th Cir. 2007) (finding that identical language in two Guidelines provisions carried the same meaning in each). Because nothing in the Guidelines or commentary suggests that this presumption should not hold, Application Note 2 bars enhancements under § 2B1.1(b)(11)(C) but not “trafficking” enhancements under § 2B1.1(b)(11)(B). Additionally, treating “trafficking” and “transferring” as equivalent in this context, might render superfluous parts of a related statute,18 U.S.C. § 1028
. “A statute should be construed so that effect is given to all its provisions, so that no part will be inoperative or superfluous, void or insignificant.” Hibbs v. Winn,542 U.S. 88
, 101 (2004) (citation omitted). Section 1028 makes it a crime to “knowingly traffic[] in . . . authentication features for use in false identification documents, document-making implements, or means of identification.”18 U.S.C. § 1028
(a)(8). But it also, separately, makes it a crime to “knowingly . . . transfer[] . . . a document-making implement or authentication feature . . . [to create] a false identification document.”Id.
§ 1028(a)(5). If “transferring” and “trafficking” are the same, these provisions would be redundant. We acknowledge that our holding charts a new course among our sister circuits, which have held that the trafficking enhancement cannot apply to a defendant convicted of aggravated identity theft. The First Circuit offered the earliest decision on point, reasoning that because the “trafficking of a means of identification involve[s] a transfer,” it would violate Application Note Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 25 2 of § 2B1.6 to impose a trafficking enhancement in these circumstances. United States v. Jones,551 F.3d 19
, 25 (1st Cir. 2008) (emphasis added). Other circuits have followed the First Circuit’s reasoning. See United States v. Charles,757 F.3d 1222
, 1226 (11th Cir. 2014); United States v. Doss,741 F.3d 763
, 768 (7th Cir. 2013); United States v. Lyons,556 F.3d 703
, 708 (8th Cir. 2009) (“Given that the plain meaning of trafficking involves a transfer, the enhancement in § 2B1.1(b)(10)(B)(i) for trafficking of an unauthorized access device is one such specific offense characteristic that cannot be applied.” (emphasis added)). But these circuits apply a different rule entirely to another component of the disputed Guideline. In addition to covering the “trafficking” of an unauthorized access device, § 2B1.1(b)(11)(B) also applies to the “production” of such a device. “Production” would seem to “involve” the “possession” (and potentially also the “use” or “transfer”) of an unauthorized access device. Yet, no circuit has held that § 2B1.6 or Application Note 2 can prevent a “production” enhancement. See Taylor, 818 F.3d at 676 (upholding an enhancement under § 2B1.1(b)(11)(B)(i) for “production of an unauthorized access device/means of identification [because ‘production’] is separate and distinguishable from the mere transfer, possession, or use of such device”); United States v. Jones,792 F.3d 831
, 835 (7th Cir. 2015) (same); United States v. Jenkins-Watts,574 F.3d 950
, 962 (8th Cir. 2009) (same). And, in an unpublished opinion, so have we. United States v. Wiley, 407 F. App’x 938, 942–43 (6th Cir. 2011). Examining these “production” cases, the proper rule becomes clear: “[I]f the defendant’s underlying conduct is limited to transfer, possession, or use of a means of identification of another, then the enhancement cannot apply; if the conduct is different than or in addition to such transfer, possession, or use, then the enhancement can apply.”7 Taylor, 818
F.3d at 675. As discussed above, the ordinary meaning of “trafficking” is not “limited to transfer, possession, or 7Our dissenting colleague counters that the “production” cases are different because to “produce” is defined in18 U.S.C. § 1029
(e)(4) as to “design, alter, authenticate, duplicate, or assemble.” We again question the reliance of a definition outside of § 1028a, see supra note 7; but we acknowledge that the Application Notes to § 2B1.1 define “production” similarly, to “include[] manufacture, design, alteration, authentication, duplication, or assembly,” § 2B1.1 cmt. n.10. Under this definition, a person engaged in “production” will in most instances also possess or use an unauthorized access device. But that just confirms the point we make here—that the enhancement under § 2B1.1(b)(11)(B) applies when a person does something different than, or in addition to, the transfer, possession, or use of an unauthorized access device. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 26 use.” It involves marketing or sales activity beyond mere “transfer”—it is transfer plus something more. Bayrob’s marketing and sales of stolen credit cards constituted trafficking in unauthorized access devices. Accordingly, the district court did not err in adding a two-level enhancement under § 2B1.1(b)(11)(B)(i). E. The district court applied a four-level enhancement under U.S.S.G. § 2B1.1(b)(19)(A)(ii), which applies when a defendant is convicted of an offense under § 1030(a)(5)(A). Miclaus and Nicolescu were convicted on Count 14, which alleged a § 1030(a)(5)(A) violation as one of the objects of a conspiracy under18 U.S.C. § 371
, but they were convicted of the § 371 conspiracy—not a substantive offense under § 1030(a)(5)(A). The government concedes error, and we agree.8 The district court erred in applying a four-level enhancement under § 2B1.1(b)(19)(A)(ii) because Nicolescu and Miclaus were not convicted of an offense under § 1030(a)(5)(A). IV. The district court determined that after all the sentencing enhancements were applied, Nicolescu and Miclaus had an adjusted offense level of forty-three. The parties then agreed to subtract an additional five levels, down to an offense level of thirty-eight, which yielded a Guidelines range of 235 to 293 months’ imprisonment. The district court’s errors in imposing a two-level enhancement under § 2B1.1(b)(4) for receiving and selling stolen property, and a four-level enhancement under § 2B1.1(b)(19)(A)(ii) for being convicted of an offense under § 1030(a)(5)(A) resulted in six levels being erroneously added to Nicolescu’s and Miclaus’s offense level. At thirty-seven, the correct level, their category I criminal history yields a Guidelines range of 210 to 262 months’ imprisonment. Though the district court sentenced Nicolescu and Miclaus below the incorrectly calculated 8Only Miclaus objected to this enhancement, but the government agreed to forego an abandonment argument with respect to Nicolescu. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 27 range on Counts 1 through 13 and 21, and their sentences for those counts fall within (Nicolescu) and below (Miclaus) the correctly calculated range, we cannot conclude that the errors were harmless.9 “[B]ecause the Guidelines range is the starting point for the district court’s analysis[,]” and absent some indication that the district court would have imposed the same sentence regardless of the error, it is for the district court to “decide whether, starting from the correct Guidelines range, a downward variance remains appropriate.” United States v. Montgomery,998 F.3d 693
, 700 (6th Cir. 2021). Accordingly, we remand so that Nicolescu and Miclaus can be resentenced under a correctly calculated Guidelines range. V. For the reasons set forth above, we AFFIRM Nicolescu’s and Miclaus’s convictions, VACATE their sentences, and REMAND for resentencing. 9Miclaus failed to object to the § 2B1.1(b)(4) enhancement below, so our review with respect to Miclaus is for plain error. But even under plain-error review, Miclaus is entitled to resentencing under a correctly calculated Guidelines range because the error was clear, it affected his substantial rights, and it affected the fairness of the proceedings below. See Rosales-Mireles v. United States,138 S. Ct. 1897
, 1907–08, 1911 (2018); Molina-Martinez v. United States,136 S. Ct. 1338
, 1343 (2016). Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 28 _________________ DISSENT _________________ HELENE N. WHITE, Circuit Judge, concurring in part and dissenting in part. I would not affirm the imposition of the two-level enhancement under U.S.S.G. § 2B1.1(b)(11)(B)(i) for “trafficking” in unauthorized access devices. The district court applied the two-level enhancement to the grouping that included the wire-fraud convictions because the relevant conduct included Bayrob’s sale of stolen credit-card information on AlphaBay, and the district court found that this conduct constituted “trafficking” in unauthorized access devices for purposes of § 2B1.1(b)(11)(B)(i). I do not quarrel with that aspect of the analysis. The problem with applying an enhancement under § 2B1.1(b)(11)(B)(i) for “trafficking” in this case is that Defendants were also convicted of § 1028A aggravated identity theft, and another provision of the Guidelines, Application Note 2 to U.S.S.G. § 2B1.6, precludes any enhancement to the underlying offense (here, wire fraud) “for the transfer, possession, or use” of a means of identification (the stolen credit-card information) when a defendant is already subject to a mandatory two-year consecutive sentence under § 1028A for the “transfer, possession, or use” of a means of identification. The application note recognizes that allowing both would impermissibly punish the defendant twice for the same conduct. United States v. Taylor,818 F.3d 671
, 675 (11th Cir. 2016). “Trafficking” a stolen credit-card number necessarily involves transferring it. Neither § 2B1.1(b)(11)(B)(i) nor § 2B1.6 define “trafficking.” But18 U.S.C. § 1029
(the very next provision of the United States Code after § 1028A) which prohibits “traffic[king] in . . . unauthorized access devices,” defines “traffic” to mean “transfer, or otherwise dispose of, to another, or obtain control of with intent to transfer or dispose of[.]” § 1029(e)(5) (emphasis added). Thus, in enhancing Defendants’ sentences for “trafficking” stolen credit-card numbers, the district court also impermissibly punished them a second time for the inextricable element of “transferring” them, which is expressly prohibited by Application Note 2 of § 2B1.6. Nos. 19-4247/4273 United States v. Nicolescu, et al. Page 29 That is why every court of appeals to consider the issue has held that the § 2B1.1(b)(11)(B)(i) “trafficking” enhancement cannot be imposed in these circumstances. See United States v. Lyons,556 F.3d 703
, 708 (8th Cir. 2009) (“Given that the plain meaning of trafficking involves a transfer, the enhancement in § 2B1.1(b)([11])(B)(i) for trafficking of an unauthorized access device is one such specific offense characteristic that cannot be applied” because of Application Note 2 to § 2B1.6); United States v. Jones,551 F.3d 19
, 25 (1st Cir. 2008) (holding that § 2B1.1(b)(11)(B)(i) enhancement was precluded by Application Note 2 to § 2B1.6 because under “the plain meaning of the words, [the defendant’s] trafficking of a means of identification involved a transfer (though the reverse is not necessarily true)”); United States v. Charles,757 F.3d 1222
, 1226–27 (11th Cir. 2014) (same); United States v. Doss,741 F.3d 763
, 766–68 (7th Cir. 2013) (same). Lastly, the majority’s invocation of cases permitting an enhancement under the “production” prong of § 2B1.1(b)(11)(B) is unavailing. The majority reasons that “‘[p]roduction’ would seem to ‘involve’ the ‘possession’ (and potentially also the ‘use’ or ‘transfer’) of an unauthorized access device,” and so if we recognize production as a distinct action supporting the enhancement, we should likewise permit an enhancement for trafficking when “the [punished] conduct is different than or in addition to such transfer, possession, or use.” Maj. Op. at 31. However, unlike trafficking, production is statutorily defined as different in kind from “transfer, possession, or use.” While18 U.S.C. § 1029
’s definition of “traffic” includes the word “transfer,” its definition of “produce” does not similarly include any aspect of the § 1028A “transfer, possession, or use” language, defining it instead to include “design, alter, authenticate, duplicate, or assemble.” § 1029(e)(4)-(5). Accordingly, I dissent from the affirmance of the application of the § 2B1.1(b)(11)(B)(i) enhancement.
United States v. Rodney Robert Kimbrew, A.K.A. Carlton ... , 406 F.3d 1149 ( 2005 )
United States v. Sutton , 77 F.3d 91 ( 1996 )
Pinkerton v. United States , 66 S. Ct. 1180 ( 1946 )
United States v. Jesse James Vandeberg , 201 F.3d 805 ( 2000 )
DePierre v. United States , 131 S. Ct. 2225 ( 2011 )
Molina-Martinez v. United States , 136 S. Ct. 1338 ( 2016 )
United States v. Kelvin Mondale Newsom , 452 F.3d 593 ( 2006 )
United States v. Bradley , 644 F.3d 1213 ( 2011 )
United States v. Michael Koehler , 24 F.3d 867 ( 1994 )
United States v. Kuehne , 547 F.3d 667 ( 2008 )
United States v. Leroy Warshawsky (93-1345) Ira Warshawsky (... , 20 F.3d 204 ( 1994 )
Jackson v. Virginia , 99 S. Ct. 2781 ( 1979 )
Sosa v. Alvarez-Machain , 124 S. Ct. 2739 ( 2004 )
Turner v. United States , 90 S. Ct. 642 ( 1970 )
United States v. May , 568 F.3d 597 ( 2009 )
United States v. Vigil , 644 F.3d 1114 ( 2011 )
Johnny Baugh v. United States , 540 F.2d 1245 ( 1976 )
United States v. Terry A. Collins , 104 F.3d 143 ( 1997 )
United States v. James R. Jackson , 25 F.3d 327 ( 1994 )