Theft, Embezzlement, Receipt of Stolen Property, Property Destruction, and Offenses Involving Fraud or Deceit - Basic Economic Offenses
§2B1.1 | GUIDELINES MANUAL | November 1, 2005 |
§ 1029(e)(9).
"Device-making equipment" (i) has the meaning given that term in 18 U.S.C. § 1029(e)(6); and (ii) includes (I) any hardware or software that has been configured as described in 18 U.S.C. § 1029(a)(9); and (II) a scanning receiver referred to in 18 U.S.C. § 1029(a)(8). "Scanning receiver" has the meaning given that term in 18 U.S.C. § 1029(e)(8).
"Means of identification" has the meaning given that term in 18 U.S.C. § 1028(d)(7), except that such means of identification shall be of an actual (i.e., not fictitious) individual, other than the defendant or a person for whose conduct the defendant is accountable under §1B1.3 (Relevant Conduct).
"Produce" includes manufacture, design, alter, authenticate, duplicate, or assemble. "Production" includes manufacture, design, alteration, authentication, duplication, or assembly.
"Unauthorized access device" has the meaning given that term in 18 U.S.C. § 1029(e)(3).
(B) Authentication Features and Identification Documents.—Offenses involving authentication features, identification documents, false identification documents, and means of identification, in violation of 18 U.S.C. § 1028, also are covered by this guideline. If the primary purpose of the offense, under 18 U.S.C. § 1028, was to violate, or assist another to violate, the law pertaining to naturalization, citizenship, or legal resident status, apply §2L2.1 (Trafficking in a Document Relating to Naturalization) or §2L2.2 (Fraudulently Acquiring Documents Relating to Naturalization), as appropriate, rather than this guideline.
(C) Application of Subsection (b)(10)(C)(i).—
(i) In General.—Subsection (b)(10)(C)(i) applies in a case in which a means of identification of an individual other than the defendant (or a person for whose conduct the defendant is accountable under §1B1.3 (Relevant Conduct)) is used without that individual’s authorization unlawfully to produce or obtain another means of identification.
(ii) Examples.—Examples of conduct to which subsection (b)(10)(C)(i) applies are as follows:
(I) A defendant obtains an individual’s name and social security number from a source (e.g., from a piece of mail taken from the individual’s mailbox) and obtains a bank loan in that individual’s name. In this example, the account number of the bank loan is the other means of identification that has been obtained unlawfully.
(II) A defendant obtains an individual’s name and address from a source (e.g., from a driver’s license in a stolen wallet) and applies for, obtains, and subsequently uses a credit card in that individual’s name. In this example, the credit card is the other means of identification that has been obtained unlawfully.
– 86 –