NOTICE: This opinion is subject to
formal revision before publication in the United States Reports.
Readers are requested to notify the Reporter of Decisions, Supreme
Court of the United States, Washington, D. C. 20543,
pio@supremecourt.gov, of any typographical or other formal
errors.
SUPREME COURT OF THE UNITED STATES
_________________
No. 22–10
_________________
David Fox Dubin, PETITIONER
v. UNITED
STATES
on writ of certiorari to the united states
court of appeals for the fifth circuit
[June 8, 2023]
Justice Sotomayor delivered the opinion of the
Court.
There is no dispute that petitioner David Fox
Dubin overbilled Medicaid for psychological testing. The question
is whether, in defrauding Medicaid, he also committed
“[a]ggravated identity theft,” 18 U. S. C.
§1028A(a)(1), triggering a mandatory 2-year prison sentence.
The Fifth Circuit found that he did, based on a reading of the
statute that covers defendants who fraudulently inflate the price
of a service or good they actually provided. On that sweeping
reading, as long as a billing or payment method employs another
person’s name or other identifying information, that is
enough. A lawyer who rounds up her hours from 2.9 to 3 and bills
her client electronically has committed aggravated identity theft.
The same is true of a waiter who serves flank steak but charges for
filet mignon using an electronic payment method.
The text and context of the statute do not
support such a boundless interpretation. Instead, §1028A(a)(1)
is violated when the defendant’s misuse of another
person’s means of identification is at the crux of what makes
the underlying offense criminal, rather than merely an ancillary
feature of a billing method. Here, the crux of petitioner’s
overbilling was inflating the value of services actually provided,
while the patient’s means of identification was an ancillary
part of the Medicaid billing process.
I
David Dubin helped his father manage a
psychological services company. This company submitted a claim for
reimbursement to Medicaid for psychological testing by a licensed
psychologist. In fact, however, the claim overstated the
qualifications of the employee who actually performed the testing
and who was only a licensed psychological
associate. This
falsehood inflated the amount of reimbursement. Petitioner also
changed the date on which the examination occurred.[
1] Even with the inflation, the total
reimbursement was only $338. App. 49. Petitioner was accordingly
charged with healthcare fraud, a federal offense under 18
U. S. C. §1347. According to the Government,
however, petitioner’s conduct also constituted
“[a]ggravated identity theft” under
§1028A(a)(1).
Section 1028A(a)(1) applies when a defendant,
“during and in relation to any [predicate offense], knowingly
transfers, possesses, or uses, without lawful authority, a means of
identification of another person.” The predicate offenses
include, among many others, healthcare fraud. §1028A(c)(4).
Section 1028A(a)(1) carries a severe penalty: a mandatory minimum
sentence of two years in prison “in addition to the
punishment” for the predicate offense.
According to the Government, this is a clear
aggravated identity theft case. The Government argued at trial that
§1028A(a)(1) was automatically satisfied because
petitioner’s fraudulent billing included the patient’s
Medicaid reimbursement number (a “means of
identification”). The District Court was less sure.
“[T]his doesn’t seem to be an aggravated identity theft
case” the court explained, as “the whole crux of this
case is how [petitioner was] billing.” App. 37–38. This
overbilling was “criminal,” but it “wasn’t
aggravated identity theft.”
Id., at 38. Nevertheless,
the District Court denied petitioner’s post-trial challenge
to his aggravated identity theft conviction, explaining that
contrary Fifth Circuit precedent tied its hands. The court said
that it “hope[d]” it would “get reversed.”
Id., at 39.
On appeal, a Fifth Circuit panel affirmed. On
rehearing en banc, a fractured court affirmed again. Five judges
who agreed with the Government nonetheless acknowledged that under
the Government’s reading of §1028A(a)(1), “the
elements of [the] offense are not captured or even fairly described
by the words ‘identity theft.’ ” 27
F. 4th 1021, 1024 (2022) (Richman, C. J., concurring).
Eight dissenting judges agreed on this point.
This type of prosecution is not uncommon. The
Government has, by its own admission, wielded §1028A(a)(1)
well beyond ordinary understandings of identity theft. One
prosecution targeted a defendant who “made a counterfeit
handgun permit” for another person, using that person’s
real name and at that person’s request.
United States
v.
Spears, 729 F.3d 753, 754 (CA7 2013) (en banc). Another
involved unlicensed doctors who violated the law by
“issu[ing] prescriptions that their [actual] patients would
then fill at . . . pharmacies.”
United
States v.
Berroa, 856 F.3d 141, 148, 155–156 (CA1
2017). There was also a prosecution involving an ambulance service
inflating its reimbursement rates by “mischaracteriz[ing] the
nature of the transports, saying that the patients had required
stretchers when they had not.”
United States v.
Michael, 882 F.3d 624, 628 (CA6 2018) (citing
United
States v.
Medlock, 792 F.3d 700, 705 (CA6 2015)). Yet
another prosecution involved a defendant who “provided
massage services to patients to treat their pain,” but
improperly billed this “as a Medicare-eligible physical
therapy service.”
United States v.
Hong, 938
F.3d 1040, 1051 (CA9 2019).
Many lower courts have responded to such
prosecutions with more restrained readings of the aggravated
identity theft statute.[
2] The
Fifth Circuit did not. To resolve the conflict in the courts below,
this Court granted certiorari, 598 U. S. ___ (2022), and now
vacates the judgment of the Fifth Circuit and remands.[
3]
II
A
This case turns on two of
§1028A(a)(1)’s elements. Of the various possible ways to
violate §1028A(a)(1), petitioner was convicted for
“us[ing]” a patient’s means of identification
“in relation to” healthcare fraud. The parties offer
competing readings of these two elements.
The Government reads the terms broadly and in
isolation. On the Government’s view, “[a] defendant
uses a means of identification ‘in relation to’ a
predicate offense if the use of that means of identification
‘facilitates or furthers’ the predicate offense in some
way.” Brief for United States 10 (quoting
Smith v.
United States,
508 U.S.
223, 232 (1993)). As to “uses,” the Government
seems just to mean “employ[s]” in any sense. Brief for
United States 5, 7, 10–11. Section 1028A(a)(1) would thus
apply automatically any time a name or other means of
identification happens to be part of the payment or billing method
used in the commission of a long list of predicate offenses. In
other words, virtually all of the time.
Petitioner, in response, offers a more targeted
reading. For petitioner, using a means of identification in
relation to a predicate offense requires “a genuine nexus to
the predicate offense.” Brief for Petitioner 15. On this
reading, the means of identification is at the crux of what makes
the predicate offense criminal, rather than merely an ancillary
feature of a payment method. When the underlying crime involves
fraud or deceit, as many of §1028A’s predicates do, this
entails using a means of identification specifically in a
fraudulent or deceitful manner.
To illustrate, petitioner borrows a heuristic
from the Sixth Circuit. See
Michael, 882 F. 3d, at 628.
The relevant language in §1028A(a)(1) “covers
misrepresenting
who received a certain service,” but
not “fraudulent claims regarding
how or
when a
service was performed.” Brief for Petitioner 15. In other
words, fraud going to identity, not misrepresentation about
services actually provided. Take an ambulance service that actually
transported patients but inflated the number of miles driven. The
crux of this fraud was “how” services were rendered;
the patients’ names were part of the billing process, but
ancillary to what made the conduct fraudulent. See
Michael,
882 F. 3d, at 628–629. In contrast, take the pharmacist
who swipes information from the pharmacy’s files and uses it
to open a bank account in a patient’s name. That
“misuse of th[e] means of identification” would be
“integral to” what made the conduct fraudulent, because
misrepresentation about who was involved was at the crux of the
fraud.
Id., at 629.
In deciding between the parties’ readings,
one limited and one near limitless, precedent and prudence require
a careful examination of §1028A(a)(1)’s text and
structure. While “uses” and “in relation
to” are, in isolation, indeterminate, the statutory context,
taken as a whole, points to a narrower reading.
B
In interpreting the scope of
“uses” and “in relation to,” the Court
begins with those terms themselves. Both terms have been singled
out by this Court as particularly sensitive to context, and they do
not, standing alone, conclusively resolve this case.
Start with “uses.” As the Court has
observed more than once, “the word ‘use’ poses
some interpretational difficulties because of the different
meanings attributable to it.”
Bailey v.
United
States,
516 U.S.
137, 143 (1995); see also
Leocal v.
Ashcroft,
543 U.S.
1, 9 (2004). The “ ‘ordinary or natural
meaning’ ” of
“ ‘use’ ” is “variously
defined as ‘[t]o convert to one’s service,’
‘to employ,’ ‘to avail oneself of,’ and
‘to carry out a purpose or action by means
of.’ ”
Bailey, 516 U. S., at 145.
“These various definitions of ‘use’ imply action
and implementation.”
Ibid. Beyond that general
concept, however, “ ‘use’ takes on different
meanings depending on context,” and because it “draws
meaning from its context, . . . we will look not only to
the word itself, but also to the statute and the [surrounding]
scheme, to determine the meaning Congress intended.”
Id., at 143; see also
Leocal, 543 U. S., at 9
(“Particularly when interpreting a statute that features as
elastic a word as ‘use,’ we construe language in its
context and in light of the terms surrounding it”).
For example, the federal arson statute only
applies to buildings “ ‘used in’ commerce or
commerce-affecting activity.”
Jones v.
United
States,
529 U.S.
848, 850–851 (2000). In that statutory context, the Court
distinguished between uses of a building as “the locus of any
commercial undertaking,” and noncovered
“passive,” “passing,” or ancillary uses of
a building “as collateral to obtain and secure a
mortgage” or to obtain an insurance policy.
Id., at
855–856. It is statutory context, therefore, that determines
what kind of active employment or conversion to one’s service
triggers §1028A(a)(1)’s harsh penalty.
“In relation to” is similarly
context sensitive. If “ ‘relate to’ were
taken to extend to the furthest stretch of its indeterminacy, then
for all practical purposes” there would be no limits, as
“ ‘[r]eally, universally, relations stop
nowhere.’ ”
New York State Conference of Blue
Cross & Blue Shield Plans v.
Travelers Ins. Co.,
514 U.S.
645, 655 (1995) (quoting H. James, Roderick Hudson xli (New
York ed., World’s Classics 1980)). This language thus cannot
be “considered in isolation,”
Maracich v.
Spears,
570 U.S.
48, 59 (2013), and the Court must “go beyond the
unhelpful text and the frustrating difficulty of defining [this]
key term” and look to statutory context.
Travelers,
514 U. S., at 656. That the phrase refers to a relationship or
nexus of some kind is clear. See
Smith, 508 U. S., at
238 (“ ‘[I]n relation to’ ”
requires “some purpose or effect” between two things).
Yet the kind of relationship required, its nature and strength,
will be informed by context.
The presence of two such context-dependent terms
renders §1028A(a)(1) doubly attuned to its surroundings. The
parties’ competing readings both fall within the range of
meanings of “uses” and “in relation to,”
taken alone. Resort to context is thus especially necessary
here.[
4]
C
Having found the key terms “use”
and “in relation to” indeterminate, the next step is to
look to their surrounding words. After all, “a
statute’s meaning does not always turn solely on the broadest
imaginable definitions of its component words.”
Epic
Systems Corp. v.
Lewis, 584 U. S. ___, ___ (2018)
(slip op., at 23) (internal quotation marks omitted). Instead,
“[l]inguistic and statutory context also matter.”
Ibid. Even in cases where “the literal language of the
statute is neutral” in isolation, reading “the whole
phrase” can point to a more targeted reading.
Marinello v.
United States, 584 U. S. ___,
___–___ (2018) (slip op., at 4–5).
Such is the case here. Section
1028A(a)(1)’s title and terms both point to a narrower
reading, one centered around the ordinary understanding of identity
theft. This cuts against the Government’s broad reading,
which the Government admits bears little relationship to the common
understanding of identity theft. In contrast, a more targeted
reading accurately captures the ordinary understanding of identity
theft, where misuse of a means of identification is at the crux of
the criminality.
1
Start at the top, with the words Congress
chose for §1028A’s title: “Aggravated identity
theft.” 118Stat. 831. This Court has long considered that
“ ‘the title of a statute and the heading of a
section’ are ‘tools available for the resolution of a
doubt’ about the meaning of a statute.”
Almendarez-Torres v.
United States,
523 U.S.
224, 234 (1998) (quoting
Trainmen v.
Baltimore &
Ohio R. Co.,
331 U.S.
519, 528–529 (1947)). A title will not, of course,
“override the plain words” of a statute.
Fulton
v.
Philadelphia, 593 U. S. ___, ___ (2021) (slip op.,
at 9). Yet here, the key terms are so “elastic” that
they must be construed “in light of the terms surrounding
[them],”
Leocal, 543 U. S., at 9, and the title
Congress chose is among those terms. Even the Government
acknowledged that if the terms in §1028A(a)(1) are unclear,
“the title is a useful clue.” Tr. of Oral Arg. 80.
Two additional points bolster this approach.
First, the title here is not serving the unenviable role of pithily
summarizing a list of “complicated and prolific”
provisions.
Trainmen, 331 U. S., at 528. Section 1028A
is a focused, standalone provision. Second, a title is
“especially valuable [where] it reinforces what the
text’s nouns and verbs independently suggest.”
Yates v.
United States,
574 U.S.
528, 552 (2015) (Alito, J., concurring in judgment). As
explained below, §1028A(a)(1)’s text independently
suggests a focus on identity theft. See
infra, at
12–15.
Indeed, this Court has already once used
§1028A’s title and place in the statutory scheme to shed
light on its text. In
Flores-Figueroa v.
United
States,
556 U.S.
646 (2009), this Court pointed out that a neighboring
provision, §1028, carries the broad title
“ ‘Fraud and related activity in connection with
identification documents, authentication features, and
information.’ ”
Id., at 655. Section 1028A,
in contrast, is far more targeted, “us[ing] the words
‘identity
theft.’ ”
Ibid. That
“Congress separated the [identity] fraud crime from the
[identity] theft crime in” §1028A suggests that
§1028A is focused on identity theft specifically, rather than
all fraud involving means of identification.
Ibid.[
5]
Given that, it is abundantly clear why the
Government urges the Court to ignore the title. The
Government’s broad reading, covering any time another
person’s means of identification is employed in a way that
facilitates a crime, bears little resemblance to any ordinary
meaning of “identity theft.” Consider again an
unlicensed doctor who fills out a prescription actually requested
by a patient; no one would call that identity theft. Even judges
below who agreed with the Government’s reading of
§1028A(a)(1), and ultimately the Government itself,
acknowledged that its reading of §1028A(a)(1) does not fairly
capture the ordinary meaning of identity theft. Nor is the
difference just around the edges; the Government’s reading
would, in practice, place garden-variety overbilling at the core of
§1028A.
Instead, “identity theft” has a
focused meaning. One dictionary defines identity theft as
“the fraudulent appropriation and use of another
person’s identifying data or documents, as a credit
card.” Webster’s Unabridged Dictionary xi (2d ed. 2001)
(Webster’s). Another similarly offers “[t]he unlawful
taking and use of another person’s identifying information
for fraudulent purposes; specif[ically] a crime in which someone
steals personal information about and belonging to another, such as
a bank-account number or driver’s-license number, and uses
the information to deceive others.” Black’s Law
Dictionary 894 (11th ed. 2019) (Black’s) (defining
“identity theft”).[
6]
This supports a reading of “in relation
to” where use of the means of identification is at the crux
of the underlying criminality. These definitions refer to offenses
built around what the defendant does with the means of
identification in particular. In other words, the means of
identification specifically is a key mover in the criminality. This
central role played by the means of identification, which serves to
designate a specific person’s identity, explains why we say
that the “identity” itself has been stolen. See,
e.g.,
Spears, 729 F. 3d, at 756 (“identity
theft” occurs when someone’s “identity has been
stolen or misappropriated”). This helps explain why the
examples resulting from the Government’s theory do not sound
like identity theft. If a lawyer rounds up her hours from 2.9 to 3
and bills her client using his name, the name itself is not
specifically a source of fraud; it only plays an ancillary role in
the billing process. The same is true for the waiter who
substitutes one cut of meat for another; we might say the filet
mignon’s identity was stolen, perhaps, but not the
diner’s.
This understanding of identity theft also
supports a more targeted definition of “uses.” The word
“use” appears in these definitions with a specific
meaning: Identity theft encompasses when a defendant
“
uses the information to deceive others,”
Black’s 894 (emphasis added), and “the fraudulent
. . .
use” of a means of identification,
Webster’s xi (emphasis added). In other words, identity theft
is committed when a defendant uses the means of identification
itself to defraud or deceive. This tracks the Sixth Circuit’s
heuristic. When a means of identification is used deceptively, this
deception goes to “who” is involved, rather than just
“how” or “when” services were provided. Use
of the means of identification would therefore be at “the
locus of [the criminal] undertaking,” rather than merely
“passive,” “passing,” or ancillary
employment in a crime.
Jones, 529 U. S., at
855–856.
On top of that, §1028A’s title is not
just “identity theft,” but “Aggravated identity
theft.” Typically, “[a]n ‘aggravated’
offense is one ‘made worse or more serious by circumstances
such as violence, the presence of a deadly weapon, or the intent to
commit another crime.’ ”
Carachuri-Rosendo
v.
Holder,
560 U.S.
563, 574 (2010) (quoting Black’s Law Dictionary 75 (9th
ed. 2009)). This suggests that Congress had in mind a particularly
serious form of identity theft. Yet the Government’s reading
“would apply an ‘aggravated’ . . .
label” to all manner of everyday overbilling offenses.
Carachuri-Rosendo, 560 U. S., at 574. “Of course
. . . Congress, like ‘Humpty Dumpty,’ has the
power to give words unorthodox meanings.”
Id., at 575.
Yet where “the Government argues for a result that the
English language tells us not to expect, . . . we must be
very wary of the Government’s position.”
Ibid.
(internal quotation marks omitted).
The title suggests identity theft is at the core
of §1028A(a)(1). On the Government’s reading, however,
everyday overbilling would become the most common trigger for
§1028A(a)(1)’s severe penalty. This would turn the core
of “worse or more serious” identity theft into
something the ordinary user of the English language would not
consider identity theft at all.
2
The title is, by definition, just the
beginning. A title does not supplant the actual text of the
provision, as the Government observes. The problem for the
Government is that §1028A(a)(1)’s language points in the
same direction as its title. In particular, Congress used a trio of
verbs that reflect an ordinary understanding of identity theft.
While “uses” is indeterminate in
isolation, here it has company. Section 1028A(a)(1) applies when a
defendant “knowingly
transfers,
possesses, or
uses, without lawful authority, a means of identification of
another person,” “during and in relation to” any
predicate offense. (Emphasis added.) “Under the familiar
interpretive canon
noscitur a sociis, ‘a word is known
by the company it keeps.’ ”
McDonnell v.
United States, 579 U.S. 550, 568–569 (2016) (quoting
Jarecki v.
G. D. Searle & Co.,
367 U.S.
303, 307 (1961)). “[T]his canon is often wisely applied
where a word is capable of many meanings in order to avoid the
giving of unintended breadth to the Acts of Congress.”
McDonnell, 579 U. S., at 569 (internal quotation marks
omitted).
The two neighboring verbs here,
“transfers” and “possesses,” are most
naturally read in the context of §1028A(a)(1) to connote
theft. While it is not necessary to determine the precise metes and
bounds of these two verbs, their role in the provision points to
this targeted reading. Section 1028A(a)(1) covers unlawful
possession or transfer of a means of identification belonging to
“another person.” Generally, to unlawfully
“possess” something belonging to another person
suggests it has been stolen. And to unlawfully
“transfer” something belonging to another person
similarly connotes misappropriating it and passing it along. In
Flores-Figueroa, this Court drew a similarly intuitive link
between a defendant taking a means of identification he knows
belongs to another person and
“ ‘theft.’ ” 556 U. S., at
655. The Government, at argument, agreed: these two verbs
“refer to circumstances in which the information is
stolen.” Tr. of Oral Arg. 90.[
7]
“Transfer” and “possess”
not only connote theft, but identity theft in particular. The verbs
point to (1) theft of a (2) means of identification belonging to
(3) another person. That tracks ordinary understandings of identity
theft: “a crime in which someone [1] steals [2] personal
information about and [3] belonging to another.”
Black’s 894. Similarly, “the [1] fraudulent
appropriation and use of [3] another person’s [2] identifying
data or documents.” Webster’s xi. If this parallel were
not enough, §1028A(a)(1)’s title indicates that the type
of theft its verbs connote is identity theft specifically.
Because “transfer” and
“possess” channel ordinary identity theft,
noscitur
a sociis indicates that “uses” should be read in a
similar manner to its companions. See
McDonnell, 579
U. S., at 568–569. “Uses” is quite amenable
to such a reading, and not just because of its indeterminacy. As
explained above, “using” another person’s means
of identification to deceive or defraud is a common feature of
identity theft. See Webster’s xi (“the fraudulent
. . . use” of a means of identification
(emphasis added)); Black’s 894 (when a defendant
“
uses the information to deceive others”
(emphasis added)).
Congress thus employed a trio of verbs that
capture various aspects of “classic identity theft.”
Flores-Figueroa, 556 U. S.
, at 656. There is
“the defendant [who] has gone through someone else’s
trash to find discarded credit card and bank statements,”
ibid., and thus has taken possession unlawfully. There is
the bank employee who passes along customer information to an
accomplice, and thus transfers it unlawfully. Then there is use
involving fraud or deceit about identity: “a defendant [who]
has used another person’s identification information to get
access to that person’s bank account.”
Ibid.
Another canon of construction offers a further
point in favor of this narrow interpretation. The Court
“assume[s] that Congress used [three] terms because it
intended each term to a have a particular, nonsuperfluous
meaning.”
Bailey, 516 U. S., at 146. Reading
§1028A(a)(1)’s operative verbs as tracking aspects of
classic identity theft, each verb has an independent role to play.
As the definitions reveal, identity theft covers both when
“someone
steals personal information about and
belonging to another . . . and
uses the
information to deceive others,” Black’s 894 (emphasis
added), and “fraudulent
appropriation and
use,” Webster’s xi (emphasis added). Identity
theft thus intermingles aspects of theft and fraud,
misappropriation and deceitful use. Section 1028A(a)(1)’s
three verbs capture this complexity. While “transfer”
and “possess” conjure up two steps of theft,
“uses” supplies the deceitful use aspect.
In contrast, if §1028A(a)(1)’s verbs
do not track identity theft and if the means of identification need
only facilitate the predicate offense, the other two verbs threaten
to leave “uses” without “virtually any
function.”
Bailey, 516 U. S., at 146. Return to a
definition of “in relation to” that just means
“ ‘facilitates or furthers’ the predicate
offense in some way.” Brief for United States 10. In
virtually all cases where a defendant employs a means of
identification to facilitate a crime, the defendant will also
possess or transfer the means of identification in a way that
facilitates the crime. For example, petitioner’s possession
of the patient’s means of identification facilitated the
fraud, as did petitioner’s transfer of the patient’s
means of identification to Medicaid. It is hard to imagine when
“uses” would not similarly be covered by, at least, one
of the two other verbs. This risk of superfluity suggests giving
§1028A(a)(1) a more precise reading.
In sum, §1028A(a)(1)’s title and text
are mutually reinforcing. Both point toward requiring the means of
identification to be at the crux of the criminality.
D
Section 1028A’s list of predicate
offenses points to yet another stumbling block for the
Government’s broad reading. Section 1028A(a)(1) is an
enhancement, and a severe one at that. It adds a 2-year mandatory
prison sentence onto underlying offenses that do not impose a
mandatory prison sentence of any kind. See,
e.g., 18
U. S. C. §1035 (“[f]alse statements relating
to health care matters,” setting no minimum sentence). This
prevents sentencing judges from considering the severity of the
offense, even if the amount of money involved was quite small or
there are other mitigating factors. Interpretation of
§1028A(a)(1) should thus reflect the “distinction
between” the aggravated identity theft crimes that
“Congress sought to distinguish for heightened punishment and
other crimes.”
Leocal, 543 U. S., at 11.
Far from distinguishing, the Government’s
reading collapses the enhancement into the enhanced. Here, the
Government claims that because petitioner’s overbilling was
facilitated by the patient’s Medicaid reimbursement number,
§1028A(a)(1) automatically applies. Patient names or other
identifiers will, of course, be involved in the great majority of
healthcare billing, whether Medicare for massages,
Hong, 938
F. 3d, at 1051, or for ambulance stretcher services,
Medlock, 792 F. 3d, at 706. Patient names will be on
prescriptions,
Berroa, 856 F. 3d, at 148,
155–156, and patients committing fraud on their own behalf
will often have to include the names of others on their forms, such
as doctors or employers. Under the Government’s own reading,
such cases are “automatically identity theft,” Tr. of
Oral Arg. 82, independent of whether the name itself had anything
to do with the fraudulent aspect of the offense.
Nor are these implications confined to
healthcare. Section 1028A(a)(1)’s predicates include a vast
array of offenses, including wire fraud and mail fraud.
§1028A(c)(5). The Government’s boundless reading of
“uses” and “in relation to” would cover
facilitating mail fraud by using another person’s name to
address a letter to them.[
8]
Even beyond that, names or other means of identification are used
routinely for billing and payment, whether payment apps, credit and
debit cards, a bill sent by mail, or an invoice sent
electronically. So long as the criteria for the broad predicate
offenses are met, the Government’s reading creates an
automatic 2-year sentence for generic overbilling that happens to
use ubiquitous payment methods.
A far more sensible conclusion from the
statutory structure is that §1028A(a)(1)’s enhancement
is not indiscriminate, but targets situations where the means of
identification itself plays a key role—one that warrants a
2-year mandatory minimum. This points once more to a targeted
reading, where the means of identification is at the crux of the
underlying criminality, not an ancillary feature of billing.
E
If more were needed, a final clue comes from
the staggering breadth of the Government’s reading. This
Court has “ ‘traditionally exercised restraint in
assessing the reach of a federal criminal
statute.’ ”
Marinello, 584 U. S., at
___ (slip op., at 9) (quoting
United States v.
Aguilar,
515 U.S.
593, 600 (1995)); see also
Arthur Andersen LLP v.
United States,
544 U.S.
696, 703–704 (2005);
McBoyle v.
United
States,
283 U.S.
25,
27
(1931). This restraint arises “both out of deference to the
prerogatives of Congress and out of concern that a fair warning
should be given to the world in language that the common world will
understan[d] of what the law intends to do if a certain line is
passed.”
Marinello, 584 U. S., at ___ (slip op.,
at 4) (internal quotation marks omitted). After all,
“[c]rimes are supposed to be defined by the legislature, not
by clever prosecutors riffing on equivocal language.”
Spears, 729 F. 3d, at 758.
Time and again, this Court has prudently avoided
reading incongruous breadth into opaque language in criminal
statutes. In
Van Buren v.
United States, 593
U. S. ___ (2021), the “far-reaching consequences”
of the Government’s reading “underscore[d] the
implausibility of the Government’s interpretation.”
Id., at ___ (slip op., at 17). In
Marinello, the
Court rejected the Government’s reading of a statute about
obstructing administration of the Tax Code that would have swept in
the “person who pays a babysitter $41 per week in cash
without withholding taxes,” as well as someone who
“leaves a large cash tip in a restaurant, fails to keep
donation receipts from every charity to which he or she
contributes, or fails to provide every record to an
accountant.” 584 U. S., at ___ (slip op., at 7). Nor was
all such conduct innocent, as the statute required an individual to
act “ ‘corruptly.’ ”
Id.,
at ___ (slip op., at 8). Even still, “[h]ad Congress
intended” to sweep so far, “it would have spoken with
more clarity than it did.”
Id., at ___ (slip op., at
7). In
Yates, the Court held that the Government’s
“unrestrained” reading would have turned a provision
focused on “records” and “documents” into
“an all-encompassing ban on the spoliation of evidence”
that would “sweep within its reach physical objects of every
kind,” including a fish. 574 U. S., at 536, 540
(plurality opinion). Had Congress set out to do so, “one
would have expected a clearer indication of that intent.”
Ibid.
So too here. The Government’s reading
would sweep in the hour-inflating lawyer, the steak-switching
waiter, the building contractor who tacks an extra $10 onto the
price of the paint he purchased. So long as they used various
common billing methods, they would all be subject to a mandatory
two years in federal prison. To say that such a result is
implausible would be an understatement.[
9] Because everyday overbilling cases would account for
the majority of violations in practice, the Government’s
reading places at the core of the statute its most improbable
applications.
Finally, the Government makes a familiar plea:
There is no reason to mistrust its sweeping reading, because
prosecutors will act responsibly. To this, the Court gives a
just-as-familiar response: We “cannot construe a criminal
statute on the assumption that the Government will ‘use it
responsibly.’ ”
McDonnell, 579 U. S.,
at 576 (quoting
United States v.
Stevens,
559 U.S.
460, 480 (2010)). “[T]o rely upon prosecutorial
discretion to narrow the otherwise wide-ranging scope of a criminal
statute’s highly abstract general statutory language places
great power in the hands of the prosecutor.”
Marinello, 584 U. S., at ___ (slip op., at 9). This
concern is particularly salient here. If §1028A(a)(1) applies
virtually automatically to a swath of predicate offenses, the
prosecutor can hold the threat of charging an additional 2-year
mandatory prison sentence over the head of any defendant who is
considering going to trial.
III
All the points above are different wells
drawing from the same source. The Court need not decide whether any
of these points, standing alone, would be dispositive. Taken
together, from text to context, from content to common sense,
§1028A(a)(1) is not amenable to the Government’s attempt
to push the statutory envelope. A defendant “uses”
another person’s means of identification “in relation
to” a predicate offense when this use is at the crux of what
makes the conduct criminal. To be clear, being at the crux of the
criminality requires more than a causal relationship, such as
“ ‘facilitation’ ” of the offense
or being a but-for cause of its “success.”
Post,
at 3, 5–6 (Gorsuch, J., concurring in judgment). Instead,
with fraud or deceit crimes like the one in this case, the means of
identification specifically must be used in a manner that is
fraudulent or deceptive. Such fraud or deceit going to identity can
often be succinctly summarized as going to “who” is
involved.[
10]
Here, petitioner’s use of the
patient’s name was not at the crux of what made the
underlying overbilling fraudulent. The crux of the healthcare fraud
was a misrepresentation about the qualifications of
petitioner’s employee. The patient’s name was an
ancillary feature of the billing method employed. The Sixth
Circuit’s more colloquial formulation is a helpful guide,
though like any rule of thumb it will have its limits. Here,
however, it neatly captures the thrust of the analysis, as
petitioner’s fraud was in misrepresenting
how and
when services were provided to a patient, not
who
received the services.
* * *
Because petitioner did not use the
patient’s means of identification in relation to a predicate
offense within the meaning of §1028A(a)(1), the judgment of
the Court of Appeals is vacated, and the case is remanded for
further proceedings consistent with this opinion.
It is so ordered.