State v. Mullen

Annotate this Case
Download PDF
FILED: September 28, 2011 IN THE COURT OF APPEALS OF THE STATE OF OREGON STATE OF OREGON, Plaintiff-Respondent, v. WILLIAM JERMAINE MULLEN, Defendant-Appellant. Multnomah County Circuit Court 070633153, 070733627 A139246 (Control) A139248 Jean Kerr Maurer, Judge. Argued and submitted on January 20, 2011. Jesse Wm. Barton argued the cause and filed the brief for appellant. Susan G. Howe, Senior Assistant Attorney General, argued the cause for respondent. With her on the brief were John R. Kroger, Attorney General, and Jerome Lidz, Solicitor General. Before Sercombe, Presiding Judge, and Brewer, Chief Judge, and Carson, Senior Judge. SERCOMBE, P. J. Affirmed. 1 SERCOMBE, P. J. 2 In these consolidated cases, defendant appeals judgments of conviction for, 3 among other things, several counts of identity theft, ORS 165.800(1). On appeal, 4 defendant raises two contentions. First, defendant contends that the trial court failed to 5 merge three of his identity theft convictions that were predicated on his possession of the 6 personal identifications of three different persons. Defendant argues that those persons 7 were not separate "victims" of identity theft within the meaning of ORS 161.067(2)1 and 8 that his convictions should therefore merge. Second, defendant contends that the trial 9 court erred in denying his motion for judgment of acquittal on various other counts of 10 identity theft related to his possession and use of forged checks. We reject defendant's 11 second contention without discussion. As to his first contention, we conclude that the 12 trial court did not err in refusing to merge defendant's identity theft convictions. 13 Accordingly, we affirm. 14 Defendant was arrested after he attempted to purchase a $300 gift card from 15 a restaurant using a bad check. The check was drawn on a defunct account that had been 16 opened by defendant in the name of "ILL, Inc." The account had been closed by the bank 17 shortly after it was opened, but defendant had continued to pass "ILL, Inc." checks to 18 restaurants and other entities. Although defendant was the only person authorized to 1 ORS 161.067(2) provides, in part: "When the same conduct or criminal episode, though violating only one statutory provision involves two or more victims, there are as many separately punishable offenses as there are victims." 1 1 write checks on the account, the checks were signed in someone else's name. 2 In addition, at the time he was arrested, defendant possessed multiple 3 documents and handwritten notes that contained personal information about other people. 4 Specifically, defendant had department store invoices containing the names, addresses, 5 telephone numbers, and credit card or debit card information of three individuals, Burton, 6 Spencer, and Martinelli. Defendant had also apparently copied Burton's and Spencer's 7 information in handwritten notes. 8 9 Defendant was charged by two separate indictments with, among other things, multiple counts of identity theft. The cases were consolidated for trial, and 10 defendant was ultimately convicted of several crimes, including six counts of identity 11 theft--three counts related to defendant's passing of bad checks and three counts related to 12 defendant's possession of the personal identification of Burton, Spencer, and Martinelli. 13 Before sentencing, defendant filed a motion seeking merger of the latter three 14 convictions2 on the grounds that they arose from the same criminal episode, violated only 15 one statutory provision, and did not involve multiple victims within the meaning of ORS 16 161.067(2). Although the court agreed that the possession of multiple pieces of personal 17 identification was "part of a continuous and uninterrupted course of conduct," it 18 concluded that Burton, Spencer, and Martinelli were "separate victims" justifying 19 multiple convictions for identity theft. Consequently, it denied defendant's motion. 2 Defendant also argued that one other count of identity theft should merge, but he has abandoned that argument on appeal. 2 1 As noted, ORS 161.067(2) allows separate convictions of a common crime 2 committed against "two or more victims" during the "same conduct or criminal episode." 3 Defendant's conduct of possessing the personal identifications of three other persons with 4 intent to deceive or defraud violated the identity theft statute, ORS 165.800(1). The issue 5 on appeal is whether, under ORS 161.067(2), there are three victims of that conduct 6 supporting three separate convictions of identity theft. Defendant argues that the victim 7 of identity theft is not the person whose identification is misappropriated but, rather, the 8 person who a defendant intends to deceive or defraud by use of the identification. Thus, 9 in defendant's view, his possession of multiple pieces of personal identification did not 10 victimize multiple people and therefore his identity theft convictions should merge. The 11 state responds that the identity theft statute protects "a wide range of victims harmed by 12 the use of [a] stolen identity," including both the person whose identification is 13 misappropriated and third parties who may be deceived or defrauded by use of the 14 identification. Consequently, the state asserts that defendant's possession of the personal 15 identification of Burton, Spencer, and Martinelli were separately punishable offenses. 16 For the reasons that follow, we agree with the state that a person whose identity is 17 misappropriated is a "victim" for purposes of identity theft. 18 In determining whether defendant's conduct involved "two or more victims" 19 under ORS 161.067(2), we look to the substantive statute that defines the crime. State v. 20 Glaspey, 337 Or 558, 563, 100 P3d 730 (2004) (explaining that the term "victims," as 21 used in ORS 161.067(2), describes "the category of persons who are victims within the 3 1 meaning of the specific substantive statute defining the relevant offense"). Thus, we 2 must examine who qualifies as a victim within the meaning of the identity theft statute, 3 ORS 165.800. In construing that statute, we examine the text of the statute in context, 4 along with any relevant legislative history, to discern the legislature's intent. State v. 5 Gaines, 346 Or 160, 171-72, 206 P3d 1042 (2009). ORS 165.800 provides, in part: 6 7 8 9 "(1) A person commits the crime of identity theft if the person, with the intent to deceive or to defraud, obtains, possesses, transfers, creates, utters or converts to the person's own use the personal identification of another person. 10 "* * * * * 11 "(4) As used in this section: 12 13 "(a) 'Another person' means a real person, whether living or deceased, or an imaginary person. 14 15 16 "(b) 'Personal identification' includes, but is not limited to, any written document or electronic data that does, or purports to, provide information concerning: 17 "(A) A person's name, address or telephone number; 18 "* * * * * 19 20 "(H) The identifying number of a person's depository account * * * or a credit card account; 21 "(I) A person's signature or a copy of a person's signature[.]" 22 Nothing in ORS 165.800 expressly addresses whether a person who has his 23 or her personal identification misappropriated is a "victim" of identity theft. The statute 24 refers to that person as "another person," which is defined to include both a real or 25 "imaginary" person. ORS 165.800(4)(a). Defendant argues that "[a]n imaginary person 4 1 may not be injured by an act of a defendant, and thus may not be a victim. Ipso facto the 2 person (real or imaginary) whose identity is misappropriated is not the victim of the 3 offense of identity theft." In defendant's view, the statute is instead "directed at fraud and 4 deceit, so the intended victim of identity theft is the person the defendant intends to 5 deceive or defraud." 6 The state responds that people whose identities are misappropriated often 7 suffer substantial economic harm and that we can therefore infer that ORS 165.800 was 8 enacted to protect not only "parties being deceived or defrauded," but also "the persons, if 9 real, whose identification information is stolen." Moreover, the state contends, prior to 10 the enactment of the identity theft statute, "[p]re-existing laws already protect[ed] a 11 deceived party in cases of identity theft," whereas a person whose identity was stolen did 12 not enjoy similar protection under other statutes. Thus, according to the state, the identity 13 theft statute was enacted to supplement existing laws by protecting against precisely that 14 type of harm. 15 The text of the statue references only two persons: the person who 16 commits identity theft and "another person" whose identification is obtained, possessed, 17 transferred, created, uttered, or converted by the person committing the crime. The use of 18 the term "another person" does no more than distinguish the perpetrator of the crime from 19 the person whose identity is misappropriated. It does not, as defendant suggests, indicate 20 that the person is merely a secondary or collateral subject of the statute. See, e.g., State v. 21 Hamilton, 348 Or 371, 378-79, 233 P3d 432 (2010) (concluding that "another person" 5 1 who the defendant threatened with physical force was a victim for purposes of the 2 robbery statute); State v. Sumerlin, 139 Or App 579, 586-87, 913 P2d 340 (1996) 3 (concluding that "another person" put at risk of injury by the defendant was a victim for 4 purposes of the reckless endangerment statute). Nor do we agree that real people who 5 have their identities misappropriated cannot be victims under the statute merely because 6 "another person" may, in some instances, be an imaginary person. 7 "Where the statute defining a crime does not expressly identify the person 8 who qualifies as a 'victim,' the court examines the statute to identify the gravamen of the 9 crime and determine the class of persons whom the legislature intended to directly protect 10 by way of the criminal proscription." State v. Moncada, 241 Or App 202, 212, 250 P3d 11 31 (2011). The conduct criminalized by ORS 165.800 is obtaining, possessing, 12 transferring, creating, uttering, or converting the identity of another person. However, 13 those acts by themselves may be innocuous. What makes that conduct harmful is that the 14 information is obtained or used with the "intent to deceive or to defraud." In other words, 15 the harm that the statute targets is the potential misuse of personal identification for 16 deceptive or fraudulent purposes. See State v. Porter, 198 Or App 274, 278, 108 P3d 107 17 (2005) (noting, in a different context, that "ORS 165.800 creates a crime that targets 18 deception or fraud"). Deception, in the context of identity theft, "denotes an attempt to 19 obtain some benefit to which the deceiver is not lawfully entitled." Id. at 280. Fraud, as 20 used in this context, includes misrepresentations intended to cause injury to another's 21 legal rights or interests. See State v. Alvarez-Amador, 235 Or App 402, 406-07, 232 P3d 6 1 989 (2010) (discussing meaning of "defraud" under ORS 165.800). 2 The statute does not require a completed act of deception or fraud to 3 commit the crime; rather, it requires only that one of the listed acts (involving the 4 appropriation or use of another's identification) be done with a general "intent to deceive 5 or to defraud." (Emphasis added.) Consequently, the crime can be committed without 6 any person being actually deceived or defrauded. And, even where there is a third party 7 defrauded or deceived, they may suffer no real economic harm. 8 Nonetheless, we need not determine which parties actually suffer economic 9 harm that results from a completed act of deception or fraud under various scenarios of 10 identity theft because we conclude that the victims of identity theft include persons who 11 suffer a risk of loss from the exposure of their identification to misuse. In all cases of 12 identity theft, the "[ ]other person" is disadvantaged because their personal identification 13 could be used by another person for deceptive or fraudulent ends. It is immaterial 14 whether that risk is realized or whether economic or reputational injury actually occurs. 15 As noted, the text of the statute does not require a completed act of deception or fraud. 16 That reflects the legislature's determination that the risk of loss is itself a harm that occurs 17 when one's identification is possessed by someone with an intent to deceive or defraud. 18 We conclude that the legislature intended to protect against that harm--and to protect the 19 true holders of the identification, who are harmed by the risk of loss--in the enactment of 20 ORS 165.800(1).3 3 In the context of this case, we need not decide if there are other victims under the 7 1 We find some support for that conclusion in the legislative history of the 2 statute. At the time of the enactment of ORS 165.800, preexisting laws already protected 3 a deceived party in cases of identity theft. See, e.g., ORS 165.007 - 165.032 (forgery); 4 ORS 165.055 (fraudulent use of a credit card); ORS 164.015 - 164.140 (theft). The 5 statute was adopted to expand the protection of the law to other persons. The staff 6 measure summary of the bill explained: 7 8 9 10 11 12 13 14 15 16 17 18 "The proponents of the bill assert that current law does not adequately address situations referenced above, and cite as an example a person fraudulently in possession of multiple pieces of identification from multiple persons, where there is reported several unauthorized transactions on those various pieces of identification. The offender may escape prosecution under current law, because it cannot be proven that the person stole, rather than found, the identification (Theft); that the person was the one who actually used the identification (Theft and Forgery); or that the identification was actually forged (Criminal Possession of a Forged Instrument), because the document may be a real document, not a forged one, but nevertheless, the offender is improperly in possession of another person's identification." 19 Staff Measure Summary, House Committee on Judiciary - Criminal Law, HB 3057A, 20 May 12, 1999. See DLCD v. Crook County, 242 Or App 580, 587, 256 P3d 178, adh'd to 21 as modified on recons, 244 Or App 572, ___ P3d ___ (2011) (staff measure summaries 22 properly considered in discerning legislative intent). Indeed, the summary of the measure 23 indicates that the statute was "targeted at situations where a person adopts or appropriates 24 the identity of another person." Staff Measure Summary, House Committee on Judiciary 25 - Criminal Law, HB 3057A, May 12, 1999. That legislative history suggests that the 26 identity theft statute is concerned with the misappropriation of persons' identities for the identity theft statute. 8 1 purpose of financial or pecuniary gain and that a person who is subjected to the risk of 2 loss as a result of that misappropriation is a victim of the crime. 3 In light of the foregoing, we conclude that Burton, Spencer, and Martinelli 4 were separate victims of identity theft within the meaning of ORS 165.800. Accordingly, 5 the trial court did not err in refusing to merge defendant's convictions. 6 Affirmed. 9

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.