In Dubin v. United States, 599 U.S. --- (2023), the vacated the judgment of the Fifth Circuit and significantly narrowed the scope of 1028A.
This is a must read for anyone practicing in federal court. Here are some highlights:
Section 1028A(a)(1)’s title and terms both point to a narrower reading, one centered around the ordinary understanding of identity theft. This cuts against the Government’s broad reading, which the Government admits bears little relationship to the common understanding of identity theft. In contrast, a more targeted reading accurately captures the ordinary understanding of identity theft, where misuse of a means of identification is at the crux of the criminality.Start at the top, with the words Congress chose for §1028A’s title: “Aggravated identity theft.” 118 Stat. 831. This Court has long considered that “‘the title of a statute and the heading of a section’ are ‘tools available for the resolution of a doubt’ about the meaning of a statute.”[U]se of the means of identification is at the crux of the underlying criminality. These definitions refer to offenses built around what the defendant does with the means of identification in particular. In other words, the means of identification specifically is a key mover in the criminality. This central role played by the means of identification, which serves to designate a specific person’s identity, explains why we say that the “identity” itself has been stolen.[I]dentity theft is committed when a defendant uses the means of identification itself to defraud or deceive. This tracks the Sixth Circuit’s heuristic. When a means of identification is used deceptively, this deception goes to “who” is involved, rather than just “how” or “when” services were provided. Use of the means of identification would therefore be at “the locus of [the criminal] undertaking,” rather than merely “passive,” “passing,” or ancillary employment in a crime.Generally, to unlawfully “possess” something belonging to another person suggests it has been stolen. And to unlawfully “transfer” something belonging to another person similarly connotes misappropriating it and passing it along.“Transfer” and “possess” not only connote theft, but identity theft in particular. The verbs point to (1) theft of a (2) means of identification belonging to (3) another person. That tracks ordinary understandings of identity theft: “a crime in which someone [1] steals [2] personal information about and [3] belonging to another.” Black’s 894. Similarly, “the [1] fraudulent appropriation and use of [3] another person’s [2] identifying data or documents.”In sum, §1028A(a)(1)’s title and text are mutually reinforcing. Both point toward requiring the means of identification to be at the crux of the criminality.A far more sensible conclusion from the statutory structure is that §1028A(a)(1)’s enhancement is not indiscriminate, but targets situations where the means of identification itself plays a key role—one that warrants a 2-year mandatory minimum. This points once more to a targeted reading, where the means of identification is at the crux of the underlying criminality, not an ancillary feature of billing.Finally, the Government makes a familiar plea: There is no reason to mistrust its sweeping reading, because prosecutors will act responsibly. To this, the Court gives a justas-familiar response: We “cannot construe a criminal statute on the assumption that the Government will ‘use it responsibly.’” “[T]o rely upon prosecutorial discretion to narrow the otherwise wide-ranging scope of a criminal statute’s highly abstract general statutory language places great power in the hands of the prosecutor.”Taken together, from text to context, from content to common sense, §1028A(a)(1) is not amenable to the Government’s attempt to push the statutory envelope. A defendant “uses” another person’s means of identification “in relation to” a predicate offense when this use is at the crux of what makes the conduct criminal. To be clear, being at the crux of the criminality requires more than a causal relationship, such as “‘facilitation’” of the offense or being a but-for cause of its “success.” Instead, with fraud or deceit crimes like the one in this case, the means of identification specifically must be used in a manner that is fraudulent or deceptive. Such fraud or deceit going to identity can often be succinctly summarized as going to “who” is involved.