USA v. Reginald Steele Nelson, No. 15-11276 (11th Cir. 2018)

Annotate this Case
Download PDF
Case: 15-11276 Date Filed: 02/16/2018 Page: 1 of 11 [DO NOT PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT ________________________ No. 15-11276 Non-Argument Calendar ________________________ D.C. Docket No. 1:14-cr-20641-KMW-1 UNITED STATES OF AMERICA, Plaintiff-Appellee, versus REGINALD STEELE NELSON, Defendant-Appellant. ________________________ Appeal from the United States District Court for the Southern District of Florida ________________________ (February 16, 2018) Before WILSON, WILLIAM PRYOR, and MARTIN, Circuit Judges. PER CURIAM: Reginald Steele Nelson appeals his below-guidelines sentence of 96 months of imprisonment following his pleas of guilty to six crimes connected to his use of Case: 15-11276 Date Filed: 02/16/2018 Page: 2 of 11 stolen identification information to file fraudulent claims for federal disability benefits, unemployment benefits, tax refunds, and food assistance benefits. The district court enhanced Nelson’s base offense level by 16 levels based on an actual loss of $236,371.45 and an intended loss of $895,000 attributable to his possession of social security numbers and dates of birth of about 1,790 persons. See United States Sentencing Guidelines Manual § 2B1.1(b)(1)(I) & cmt. n.3(F) (Nov. 2014). Nelson argues that none of the 1,790 compromised identifiers qualify as “access devices,” see 18 U.S.C. § 1029(e)(1), and he also argues, for the first time, that his sentence is procedurally unreasonable because the district court impermissibly considered his refusal to cooperate. We conclude, based on our recent ruling in United States v. Wright, 862 F.3d 1265, 1275 (11th 2017), “that a social security number qualifies as an ‘access device’” and that Nelson was subject to an enhancement for a loss amount of $500 for each compromised social security number. But we cannot say that the district court made a reasonable estimate of the amount of loss because it failed to identify the number of compromised social security numbers and to address whether the dates of birth qualified as access devices. We also conclude that the district court did not consider Nelson’s alleged failure to cooperate in selecting his sentence. We vacate Nelson’s sentence and remand for the district court to determine how many of the compromised 2 Case: 15-11276 Date Filed: 02/16/2018 Page: 3 of 11 identifiers count as access devices, to compute the amount of loss, and to resentence Nelson. I. BACKGROUND Nelson pleaded guilty to one count of using with intent to defraud one or more debit cards to obtain $1,000 or more, 18 U.S.C. § 1029(a)(2) (Count 1); one count of using 15 or more stolen social security numbers, id. § 1029(a)(3) (Count 2); one count of possessing a credit card skimming device, id. § 1029(a)(4) (Count 3); and three counts of aggravated identity theft, id. § 1028A(a)(1) (Counts 4-6). The Department of Labor detected the fraud after discovering that numerous unemployment compensation claims had been submitted electronically from Nelson’s internet protocol address. Nelson had accessed unemployment compensation websites thousands of times and used the names, dates of birth, and other identifying information of real persons to file 90 fraudulent claims with the State of Florida and 9 fraudulent claims with the State of New York. Investigators obtained video surveillance recordings and still photographs that showed Nelson withdrawing cash from automatic teller machines using credit and debit cards containing unemployment benefits. When investigators arrested Nelson, he had in his pocket a list of “approximately 40 distinct pieces of [personal identification information].” Inside Nelson’s residence, investigators discovered 85 debit and credit cards that were 3 Case: 15-11276 Date Filed: 02/16/2018 Page: 4 of 11 embossed with the names of real persons or were encoded with direct deposit numbers that accessed government benefits. Investigators also discovered “at least 1,800 distinct pieces of [personal identification information], including handwritten names, social security numbers, dates of birth, addresses, phone numbers, ‘secret questions’ and answers, insurance policy numbers, and tax returns” recorded “in notebooks and printouts from officers, schools, and hospitals” along with “handwritten notes giving additional information about” the viability of the stolen information. Investigators determined that Nelson had defrauded a “total of 1,920 individuals”; he had caused “approximately 48 . . . individuals [to be] . . . temporarily deprived of their actual SSA benefits”; and he had exploited the identities of at least 473 real persons. Nelson’s presentence investigation report held him responsible for an actual loss of $236,371.45, which was attributable to the 130 persons whose benefits he had downloaded to 85 debit and credit cards, and an intended loss of $895,000, which represented one access device for each of the remaining 1,790 victims multiplied by $500, see U.S.S.G. § 2B1.1 cmt. n.3(F). Nelson’s report grouped Counts 1-3 and assigned him a total offense level of 28, which included a 16-level enhancement for a loss amount of $1,131,371.45, id. § 2B1.1(b)(1)(I). Based on Nelson’s criminal history of I, the presentence report provided an advisory 4 Case: 15-11276 Date Filed: 02/16/2018 Page: 5 of 11 guideline range of 78 to 97 months for Counts 1-3 and a sentence of 24 months for each of his three convictions for aggravated identity theft. Nelson objected to the intended loss of $895,000 on the ground it overrepresented the number of access devices, and in the alternative, he requested a downward variance to reflect the “actual loss” he caused of $236,371.45. Nelson conceded that he “was in possession of dates of birth and social security numbers of approximately 1,790 persons,” but he argued that those identifiers constituted “means of identification” instead of “access devices.” He also argued that the 85 debit and credit cards were the only items that qualified as access devices, which would reduce his enhancement from 16 levels to 12 levels, id. § 2B1.1(b)(1)(G), and result in a total offense level of 24. The government responded that Nelson’s use of social security numbers, names, and dates of birth to obtain money qualified as unauthorized access devices and that each of the 1,790 compromised identifiers should be multiplied by $500 to calculate his intended loss amount. At the request of the district court, the parties filed supplemental sentencing memoranda addressing whether to use $500 or $100 as the multiplier to compute Nelson’s loss amount. The government argued that the guidelines and caselaw supported assessing $500 per access device, and Nelson agreed. But Nelson replied that he was entitled to a downward variance. 5 Case: 15-11276 Date Filed: 02/16/2018 Page: 6 of 11 The district court overruled Nelson’s objection to the amount of loss and, based on the parties’ agreement that the guidelines supported an assessment of $500 for each access device, it adopted the loss amount and advisory sentencing range provided in the presentence report. The district court stated that $500 multiplier “actually might be too small a number” given the effects of identity theft, and it considered the seriousness of Nelson’s crimes and “the importance of deterrence” because Nelson had reoffended after evading prosecution in 2009 for access device fraud. “Taking all that into account,” the district court granted “a modest [downward] variance” because Nelson was “pursuing his education [at a community college], he [had] a [drug rehabilitation] sponsor[,]” and “he [had] been by all accounts a good father.” The district court “attributed a $100 value” to each of the 1,790 compromised identifiers, which reduced Nelson’s enhancement from 16 to 14 levels and resulted in a sentencing range of 63 to 78 months. The district court sentenced Nelson to three concurrent terms of 72 months for Counts 1-3 and to 24 months for each of his three aggravated identity theft offenses, with those 24month terms running concurrently with each other but consecutively to his 72month sentence. II. STANDARDS OF REVIEW We review de novo the interpretation of the Sentencing Guidelines. United States v. Dabbs, 134 F.3d 1071, 1079 (11th Cir. 1998). “[T]he determination of 6 Case: 15-11276 Date Filed: 02/16/2018 Page: 7 of 11 monetary loss [is reviewed] under the clearly erroneous standard.” Id. at 1081. When a defendant fails to object at sentencing to the consideration of an impermissible factor, we review for plain error. United States v. Vandergrift, 754 F.3d 1303, 1309 (11th Cir.2014). III. DISCUSSION We divide our discussion in two parts. First, we address the calculation of Nelson’s loss amount. Second, we address whether the district court considered Nelson’s lack of cooperation when imposing his sentence. A. The District Court Must Make Further Findings of Fact About the Amount of Loss. Nelson argues that the 1,790 compromised identifiers were incorrectly classified as access devices, which resulted in the enhancement of his sentence based on an inflated amount of loss. The government responds that all the stolen identifiers qualified as access devices. Due to the failure of the parties and the district court to address whether dates of birth qualify as access devices or to quantify the amount of loss attributable to the two categories of identifiers, we must vacate Nelson’s sentence and remand for resentencing. We affirm the determination that the social security numbers Nelson possessed qualify as access devices. We held recently in Wright “that a social security number qualifies as an ‘access device’ under the definition in 18 U.S.C. § 1029(e)(1).” 862 F.3d at 1275. Wright forecloses Nelson’s challenge to the 7 Case: 15-11276 Date Filed: 02/16/2018 Page: 8 of 11 enhancement of his sentence for a loss amount attributable to compromised social security numbers. Nelson admitted that he possessed authentic social security numbers that qualified as access devices. Although the social security numbers that Nelson possessed qualify as access devices, we cannot say whether the district court made a reasonable estimate of the amount of loss. “[A] court need only make a reasonable estimate of the loss, given the available information,” id. at 1276 (quoting United States v. Moran, 778 F.3d 942, 973 (11th Cir. 2015)), ”[h]owever, there must be at least some evidence on which to base a reasonable estimate of how many [identifiers] fell within the definition of an ‘access device,’” id. Nelson argues that he possessed “1,790 pieces of [personal identification information],” and in his sentencing memorandum, he identified the compromised identifiers as “dates of birth and social security numbers.” Nelson faces an enhancement for a loss of $500 for each compromised social security number, id. at 1275–76, but the record contains no evidence of how many social security numbers he possessed. Neither the presentence investigation report, the parties, nor the district court quantified the social security numbers or dates of birth or quantified the loss attributable to each of those two categories of identifiers. When Nelson and the government focused their dispute on whether social security numbers qualified as access devices, the district court failed to differentiate between the compromised identifiers or to 8 Case: 15-11276 Date Filed: 02/16/2018 Page: 9 of 11 address whether the dates of birth qualified as access devices. The district court must determine whether the dates of birth qualify as access devices and how many access devices Nelson possessed. “Accordingly, we must remand this case to the district court to address again, and make fact findings about, the loss amount.” Id. at 1276. The issue whether dates of birth can qualify as access devices is one of first impression in our circuit, but our precedent provides the district court some guidance. As we observed in Wright, access devices include objects and identification information that can be used in connection with an access device to obtain anything of value or that can be used to initiate a transfer of funds. Id. at 1274. Congress defined “access device” as follows: the term “access device” means any card, plate, code, account number, electronic serial number, mobile identification number, personal identification number, or other telecommunications service, equipment, or instrument identifier, or other means of account access that can be used, alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds (other than a transfer originated solely by paper instrument). 18 U.S.C. § 1029(e)(1). Congress used “broader statutory language in an effort to anticipate future criminal activities and thereby provide greater protection to all participants in the payment device system, including those that honor payment devices and consumers.” Dabbs, 134 F.3d at 1081 (quoting S. Rep. No. 98-368, at 9 Case: 15-11276 Date Filed: 02/16/2018 Page: 10 of 11 5, reprinted in 1984 U.S.C.C.A.N. 3647, 3651) (ellipses and brackets omitted). That policy has led us to “broadly construe the statutory language of section 1029 to include the innovative means that parties use to gain unauthorized information to engage in fraudulent activities.” Id. We have concluded that section 1029(e)(1) prohibits the fraudulent use of usernames and passwords, United States v. Barrington, 648 F.3d 1178, 1202 (11th Cir. 2011), routing and bank account numbers, United States v. Williams, 790 F.3d 1240, 1250 (11th Cir. 2015), merchant account numbers, Dabbs, 134 F.3d at 1080–81, and social security numbers, Wright, 862 F.3d at 1275. On remand, the district court must determine Nelson’s loss amount and his appropriate sentencing range under the Sentencing Guidelines. The amount of “loss is the greater of actual loss or intended loss.” U.S.S.G. § 2B1.1 cmt. n.3(A). “Intended loss (I) means the pecuniary harm that the defendant purposely sought to inflict; and (II) includes intended pecuniary harm that would have been impossible or unlikely to occur.” Id. § 2B1.1 cmt. n.3(A)(ii). And a special rule that applies to access devices instructs that the “loss includes any unauthorized charges made with the counterfeit . . . or unauthorized access device and shall be not less than $500 per access device.” Id. § 2B1.1 cmt. n.3(F)(i). The district court must determine how many social security numbers Nelson possessed and the amount of loss attributable to those access devices. The district court also must determine whether 10 Case: 15-11276 Date Filed: 02/16/2018 Page: 11 of 11 the dates of birth Nelson possessed qualify as access devices. Because the parties neglected to make any substantive arguments about the classification of the compromised dates of birth or the quantity of the two categories of identifiers, they may submit additional evidence on those issues. See Wright, 862 F.3d at 1276. B. The District Court Did Not Consider Nelson’s Failure to Cooperate. Nelson argues that the district court plainly erred by basing his sentence on his failure to cooperate with the government, but the district court did not consider Nelson’s lack of cooperation as a factor in selecting his sentence. The district court took into account the seriousness and effects of Nelson’s crimes and the need to deter him from committing similar future crimes, and then decided to vary downward and impose a sentence below Nelson’s advisory guideline range based on his personal circumstances. See 18 U.S.C. § 3553(a). IV. CONCLUSION We VACATE Nelson’s sentence and REMAND for resentencing. 11

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.