Jump to content

Aggravated Identity Theft (18 U.S.C. § 1028A): Difference between revisions

From Prisonpedia
Humanization pass: prose rewrite for readability
Automated improvements: Flagged critical incomplete sentence in Knowledge Requirement section (article ends mid-sentence); identified multiple colloquial/informal phrasings inconsistent with encyclopedic style; flagged absence of predicate offense enumeration (§ 1028A(c)) as most serious content gap; noted missing Dean v. United States (2017) sentencing discussion; added suggested citations for USSC statistics, legislative history, and circuit court applications; flagged E-E-A-T deficiencies...
 
Line 10: Line 10:
|related_offenses = [[Wire Fraud|Wire Fraud]], [[Bank Fraud|Bank Fraud]], [[False Statements|False Statements]]
|related_offenses = [[Wire Fraud|Wire Fraud]], [[Bank Fraud|Bank Fraud]], [[False Statements|False Statements]]
}}
}}
'''Aggravated identity theft''' is a serious federal crime codified at 18 U.S.C. § 1028A. It punishes anyone who uses another person's identification while committing certain enumerated federal felonies. Here's what makes it distinct: the judge has no choice in sentencing. A mandatory 2-year prison term kicks in, and it runs separately from whatever sentence the defendant gets for the underlying crime.
'''Aggravated identity theft''' is a serious federal crime codified at 18 U.S.C. § 1028A. It punishes anyone who uses another person's identification while committing certain enumerated federal felonies. The statute is notable in that the sentencing judge has no discretion: a mandatory 2-year prison term attaches, and it runs separately from whatever sentence the defendant receives for the underlying crime.<ref name="uscode-1028a">18 U.S.C. § 1028A.</ref>


Congress passed the Identity Theft Penalty Enhancement Act of 2004 because identity theft was exploding and fueling countless other crimes.<ref name="id-theft-act">Identity Theft Penalty Enhancement Act of 2004, Pub. L. 108-275.</ref> The new law reflected serious concern about criminals stacking stolen identities with fraud schemes to multiply their gains and their victims' harm. That mandatory consecutive approach transformed how federal sentencing works for these cases.<ref name="uscode-1028a">18 U.S.C. § 1028A.</ref>
Congress passed the Identity Theft Penalty Enhancement Act of 2004 because identity theft was growing rapidly and fueling countless other crimes.<ref name="id-theft-act">Identity Theft Penalty Enhancement Act of 2004, Pub. L. No. 108-275; ''see also'' H.R. Rep. No. 108-528 (2004) (discussing congressional intent and legislative history).</ref> The legislation reflected serious concern about criminals combining stolen identities with fraud schemes to amplify both their gains and the harm suffered by victims. That mandatory consecutive approach transformed how federal sentencing works for these cases, and the law has since become one of the most frequently charged statutes in white-collar prosecutions.<ref name="uscode-1028a" />


== Elements of the Offense ==
== Elements of the Offense ==


Prosecutors must prove all four of these elements beyond reasonable doubt:
Prosecutors must prove all four elements beyond a reasonable doubt. First, the defendant must have knowingly transferred, possessed, or used a means of identification belonging to another person. Second, that use must have occurred without lawful authority. Third, it must have taken place during and in relation to an enumerated felony offense. Fourth, the defendant must have known the identification belonged to an actual, living person rather than a fictitious one.<ref name="flores-figueroa">''Flores-Figueroa v. United States'', 556 U.S. 646 (2009).</ref>
 
# '''Means of Identification''': The defendant knowingly transferred, possessed, or used a means of identification belonging to another person
# '''Without Lawful Authority''': No legitimate right existed to use it
# '''During and In Relation To''': The use occurred during and in relation to an enumerated felony offense
# '''Knowledge''': The defendant knew the identification belonged to an actual person<ref name="flores-figueroa">Flores-Figueroa v. United States, 556 U.S. 646 (2009).</ref>


=== Means of Identification ===
=== Means of Identification ===


The statute casts a wide net. Under 18 U.S.C. § 1028(d)(7), "means of identification" includes:
The statute defines the term broadly. Under 18 U.S.C. § 1028(d)(7), a "means of identification" includes any name, Social Security number, date of birth, driver's license number, passport number, alien registration number, or government-issued identification number. The definition also reaches unique biometric data such as fingerprints, voice prints, and retina images, as well as unique electronic identification numbers or addresses, routing codes, and telecommunication identifying information or access devices. That breadth means prosecutors can charge the statute across a wide range of factual scenarios, from traditional document fraud to sophisticated digital identity crimes.
 
* Name
* Social Security number
* Date of birth
* Driver's license number
* Passport number
* Alien registration number
* Government-issued identification number
* Unique biometric data: fingerprints, voice prints, retina images
* Unique electronic identification numbers or addresses, including routing codes
* Telecommunication identifying information or access devices


=== Knowledge Requirement ===
=== Knowledge Requirement ===


This element matters. In ''Flores-Figueroa v. United States'' (2009), the Supreme Court clarified that prosecutors must show the defendant knew the identity belonged to a real, actual person. Imagine someone creates a fake Social Security number by accident and it happens to match someone real. That's not aggravated identity theft if the defendant genuinely didn't know any real person held that number.<ref name="flores-figueroa" /> Circumstantial proof counts though. If you pulled data from an identity theft database, that suggests knowledge of real victims.
This element matters more than it might first appear. In ''Flores-Figueroa v. United States'' (2009), the Supreme Court held that prosecutors must prove the defendant knew the identity belonged to a real, actual person.<ref name="flores-figueroa" /> The Court rejected the government's argument that knowledge of the victim's real identity was unnecessary. For example, if a defendant created a fictitious Social Security number and it happened by chance to match a number assigned to a real person, that would not constitute aggravated identity theft if the defendant genuinely had no knowledge a real person held that number. Still, circumstantial evidence is enough. Evidence that a defendant purchased data from an identity theft marketplace, for instance, strongly supports the inference that the defendant knew real victims existed behind the numbers. Courts applying ''Flores-Figueroa'' since 2009 have consistently held that the knowledge requirement can be satisfied through circumstantial proof, and acquittals on this ground remain uncommon.<ref name="spears">''United States v. Spears'', 729 F.3d 753 (7th Cir. 2013) (applying ''Flores-Figueroa'' knowledge standard and affirming conviction based on circumstantial evidence of knowledge).</ref>


=== Enumerated Predicate Offenses ===
=== Enumerated Predicate Offenses ===


Aggravated identity theft only applies to a specific list of federal crimes. The identity theft must occur "during and in relation to" one of these offenses:
Aggravated identity theft only applies when the identity theft occurs "during and in relation to" a specific list of federal crimes set out in 18 U.S.C. § 1028A(c). The predicate offenses span several categories. Fraud and related crimes include mail fraud (18 U.S.C. § 1341), wire fraud (18 U.S.C. § 1343), bank fraud (18 U.S.C. § 1344), healthcare fraud (18 U.S.C. § 1347), access device fraud (18 U.S.C. § 1029), and computer fraud (18 U.S.C. § 1030). Immigration offenses covered include illegal reentry (8 U.S.C. § 1326) and document fraud (18 U.S.C. § 1546). Social Security fraud under 42 U.S.C. § 408 also qualifies. Additional predicates include theft of public money (18 U.S.C. § 641), false statements (18 U.S.C. § 1001), passport fraud (18 U.S.C. § 1542), and nationality fraud (18 U.S.C. § 1015).<ref name="uscode-1028a" /> The "during and in relation to" requirement is not merely technical. Courts have held that the identity theft must be genuinely connected to the predicate crime, not merely incidental or tangentially related.<ref name="flores-figueroa" />
 
'''Fraud and Related Crimes:'''
* Mail fraud (18 U.S.C. § 1341)
* Wire fraud (18 U.S.C. § 1343)
* Bank fraud (18 U.S.C. § 1344)
* Healthcare fraud (18 U.S.C. § 1347)
* Access device fraud (18 U.S.C. § 1029)
* Computer fraud (18 U.S.C. § 1030)
 
'''Immigration Offenses:'''
* Illegal reentry (8 U.S.C. § 1326)
* Document fraud (18 U.S.C. § 1546)
* Social Security fraud (42 U.S.C. § 408)
 
'''Other Offenses:'''
* Theft of public money (18 U.S.C. § 641)
* False statements (18 U.S.C. § 1001)
* Passport fraud (18 U.S.C. § 1542)
* Nationality fraud (18 U.S.C. § 1015)<ref name="uscode-1028a" />


== Statutory Penalties ==
== Statutory Penalties ==
Line 76: Line 41:
|}
|}


The law is strict here. These aren't guidelines. They're requirements with real teeth:
The penalties under § 1028A are genuine mandatory minimums with no judicial escape valve. The 2-year or 5-year sentence runs consecutively, meaning it follows any other sentence rather than running at the same time. Probation is not an option. Each identity stolen can become a separate count, and those counts can stack. A defendant charged with using five stolen identities during a wire fraud scheme faces at minimum 10 years of mandatory time on the identity theft counts alone, before any sentence for the underlying fraud.<ref name="uscode-1028a" />
 
=== Terrorism Enhancement ===


* That 2-year or 5-year sentence runs consecutively, meaning after any other sentence, not during it
Section 1028A(b) provides a separate, enhanced penalty for aggravated identity theft committed in connection with terrorism offenses. Where the predicate felony is a federal crime of terrorism as defined in 18 U.S.C. § 2332b(g)(5), the mandatory consecutive term rises from 2 years to 5 years. The terrorism enhancement has been charged in a smaller subset of cases but carries severe consequences given its fully mandatory nature and the likelihood that the underlying terrorism-related conviction will itself carry a substantial sentence.<ref name="uscode-1028a" />
* No concurrent service. No reduction for good behavior calculation purposes that might apply elsewhere.
* Probation isn't an option. Prison time is mandatory.
* Each identity stolen can become a separate count, stacking sentences.<ref name="uscode-1028a" />


== Federal Sentencing Guidelines ==
== Federal Sentencing Guidelines ==


USSG §2B1.6 addresses these cases. There's nothing complicated here because the statute leaves nothing to the judge. The guideline simply says: impose the 2-year mandatory consecutive sentence required by law. No enhancements. No adjustments. The law wrote the sentence in stone.
USSG §2B1.6 addresses aggravated identity theft cases. The guideline is unusually brief because the statute leaves nothing to the judge's discretion. It directs courts to impose the mandatory consecutive sentence required by law, with no offense level calculation, no enhancements, and no downward adjustments. Application Note 2 to §2B1.6 clarifies that no Chapter Three adjustments apply to a § 1028A count.<ref name="ussg-2b1.6">United States Sentencing Commission, USSG §2B1.6, Application Note 2 (2024).</ref>


=== Relationship to Underlying Offense ===
=== Relationship to Underlying Offense ===


Here's how it works in practice. The underlying predicate offense gets sentenced under its own guideline. That comes first. Then the aggravated identity theft sentence tacks on. Let's work through an example:
The underlying predicate offense is sentenced under its own guideline first. The aggravated identity theft sentence then attaches consecutively. To illustrate: a defendant convicted of wire fraud with a guideline range of 24 to 30 months who also faces an aggravated identity theft count might receive 27 months for the fraud. The court then adds 24 mandatory consecutive months for the identity theft. Total sentence: 51 months, with no judicial authority to reduce the 24-month add-on.<ref name="ussg-2b1.6" />


Say someone's convicted of wire fraud with a guideline range of 24 to 30 months. They're also convicted of aggravated identity theft. The judge might sentence them to 27 months for wire fraud. Then they add 24 consecutive months for the identity theft. Total: 51 months minimum.<ref name="ussg-2b1.6">United States Sentencing Commission, USSG §2B1.6 (2024).</ref>
An important development came from the Supreme Court's 2017 decision in ''Dean v. United States'', 581 U.S. 341 (2017). The Court held that sentencing judges may consider the mandatory consecutive § 1028A term when crafting the sentence for the predicate offense. In practice, this means a judge who believes 51 total months is too harsh can sentence the defendant to, say, 20 months on the wire fraud count rather than 27, knowing that the mandatory 24 months will attach regardless. The predicate sentence itself remains subject to guidelines discretion; only the identity theft add-on is truly fixed.<ref name="dean">''Dean v. United States'', 581 U.S. 341 (2017).</ref>


=== Multiple Counts ===
=== Multiple Counts ===


Courts face questions about stacking when multiple identity theft counts exist:
When multiple identity theft counts are charged, courts must decide whether each mandatory 2-year term runs consecutively to the others or whether some run concurrently. Where victims differ or the offenses occurred on different occasions, courts typically impose consecutive terms. Where the same victim appears across closely related conduct on a single occasion, concurrent treatment of the identity theft counts may be appropriate. Judges retain some discretion in structuring how multiple § 1028A counts relate to each other, though each individual term must still be consecutive to the predicate sentence.<ref name="ussg-2b1.6" />
 
* Same victim, same occasion: may run concurrently with each other
* Different victims or different occasions: typically run consecutively
* Judges retain discretion on whether counts beyond the first run together or separately<ref name="ussg-2b1.6" />


== Common Scenarios ==
== Common Scenarios ==
Line 105: Line 65:
=== Financial Fraud ===
=== Financial Fraud ===


Thieves steal Social Security numbers, names, and birth dates then:
Financial fraud represents the most common context for § 1028A charges. Defendants steal Social Security numbers, names, and birth dates and then use that information to open credit card accounts, apply for loans, file false tax returns claiming refunds, or drain existing bank accounts. Because each use of a distinct identity can be charged as a separate count, defendants in large-scale financial fraud cases often face many identity theft counts stacked on top of their fraud convictions.
 
* Open credit card accounts in victims' names
* Apply for loans and get cash
* File false tax returns claiming refunds
* Drain existing bank accounts


=== Government Benefits Fraud ===
=== Government Benefits Fraud ===


Stolen identities become tools for obtaining:
Stolen identities are frequently used to obtain government benefits. Unemployment compensation, Social Security payments, Medicare and Medicaid funds, and various federal relief programs have all been targeted. During the COVID-19 pandemic, § 1028A became a standard charge in prosecutions involving fraudulent applications for Paycheck Protection Program loans and enhanced unemployment benefits, as defendants routinely submitted applications bearing other people's personal information.<ref name="ussc-stats">United States Sentencing Commission, 2023 Annual Report and Sourcebook of Federal Sentencing Statistics.</ref>
 
* Unemployment benefits
* Social Security checks
* Medicare or Medicaid funds
* PPP loans and COVID relief money


=== Immigration-Related Identity Theft ===
=== Immigration-Related Identity Theft ===


Foreign nationals use another person's documents to:
Foreign nationals who use another person's documents to work without authorization, obtain state identification, or reenter the country after deportation are frequently charged under § 1028A alongside the relevant immigration offenses. This category forms a substantial portion of overall § 1028A prosecutions, particularly in jurisdictions with high volumes of immigration cases.
 
* Work without authorization
* Get driver's licenses or state IDs
* Reenter the country after deportation


=== Tax Refund Fraud ===
=== Tax Refund Fraud ===


This scheme is simple but effective. Criminals file fake tax returns using stolen Social Security numbers, getting refunds before the real taxpayers even know what happened.
Tax refund fraud is a straightforward but damaging scheme. Criminals file fraudulent tax returns using stolen Social Security numbers, collecting refunds before the real taxpayer has even filed. Organized rings have filed thousands of false returns in a single season, using information obtained from data breaches, healthcare providers, or employer records. The scheme is especially attractive because the IRS typically issues refunds quickly, making recovery difficult.


== Notable Cases ==
== Notable Cases and Recent Enforcement ==


=== PPP and COVID Relief Fraud ===
=== PPP and COVID Relief Fraud ===


The COVID-19 pandemic opened a massive door for these crimes. Thousands faced charges:
The COVID-19 pandemic created a significant wave of § 1028A prosecutions. Federal prosecutors charged thousands of defendants with using stolen identities on fraudulent Paycheck Protection Program applications, pandemic unemployment claims, and other federal relief programs. The combination of large dollar amounts, easily traceable electronic submissions, and readily available victim identity data made these cases straightforward for investigators. Defendants in multi-count PPP fraud indictments frequently faced 10 or more years of mandatory identity theft time stacked on top of their fraud sentences.<ref name="ussc-stats" />
 
* Stolen identities on fraudulent PPP applications
* Unemployment claims filed under other people's names
* Multiple relief payments taken using one person's stolen information


=== Data Breach Cases ===
=== Data Breach Cases ===


Major breaches created opportunities that criminals quickly exploited:
Major data breaches have consistently created downstream § 1028A prosecutions. Defendants who purchase stolen data on dark web markets and then use it to commit fraud qualify for the mandatory enhancement. Hackers who breach corporate systems and monetize the stolen data also face exposure. Federal prosecutors have charged entire networks devoted to converting breach data into fraudulent financial accounts, with each participant potentially facing separate counts for each identity used.
 
* Defendants buying stolen data on dark web markets then using it
* Hackers monetizing data after exploiting systems
* Specialized networks devoted to turning stolen data into cash


=== Tax Fraud Rings ===
=== Tax Fraud Rings ===


Organized groups operated differently. They'd:
Organized tax fraud operations represent some of the largest § 1028A prosecutions by victim count. These groups steal identities from hospitals, employers, and tax preparation firms, then file thousands of fraudulent returns and collect refunds deposited to prepaid debit cards. Ringleaders in such cases have faced mandatory identity theft sentences running into decades when courts imposed consecutive terms across hundreds of counts.
 
* Steal identities from hospitals, workplaces, and other institutions
* File thousands of fraudulent returns
* Collect refunds deposited on prepaid cards


== Statistics ==
== Statistics ==


Government data tells an interesting story:
The U.S. Sentencing Commission publishes annual data on § 1028A prosecutions. Between roughly 2,000 and 3,000 federal cases annually have involved aggravated identity theft charges in recent years, though the COVID-19 relief fraud wave significantly elevated those numbers through 2021 and 2022.<ref name="ussc-stats" /> The offense is nearly always charged alongside wire fraud, bank fraud, or access device fraud rather than as a standalone charge. The mandatory consecutive requirement produces a measurable effect on total sentences: defendants convicted of § 1028A receive substantially longer sentences than those convicted of comparable underlying offenses alone. Immigration-related cases involving stolen work authorization documents represent a major category within the overall caseload.<ref name="ussc-stats" />
 
* Between 2,000 and 3,000 federal cases annually involve aggravated identity theft charges
* It's nearly always charged with wire fraud, bank fraud, or access device fraud
* The mandatory consecutive requirement dramatically increases total sentences
* Immigration cases involving stolen documents form a major category
* COVID-19 relief fraud exploded the number of these prosecutions significantly<ref name="ussc-stats">United States Sentencing Commission, 2023 Annual Report and Sourcebook of Federal Sentencing Statistics.</ref>


== Defenses ==
== Defenses ==
Line 173: Line 101:
=== No Knowledge of Real Person ===
=== No Knowledge of Real Person ===


''Flores-Figueroa'' created an opening here. The government must prove you knew an actual person owned that identity. If you genuinely believed you'd invented or found a fake number, conviction fails. That said, circumstantial evidence works against defendants. Getting information from identity theft databases suggests you knew real victims existed.
''Flores-Figueroa'' created a meaningful defense. The government must prove the defendant knew an actual person owned the identity at issue. A defendant who genuinely believed they were using a fabricated or invented number, and had no reason to think it corresponded to a real person, can contest this element. That said, circumstantial evidence works against defendants in most real-world cases. Purchasing data from an identity theft marketplace, receiving files labeled with victim names and addresses, or participating in a scheme targeting real account holders all support the inference of knowledge.<ref name="flores-figueroa" />


=== No Use "During and In Relation To" ===
=== No "During and In Relation To" Nexus ===


The identity theft must genuinely occur as part of the predicate crime. If it happened separately or was only incidental to something else, this element crumbles. The connection matters.
The identity theft must genuinely occur as part of the predicate crime, not merely alongside it. If the use of a stolen identity was incidental to, or entirely separate from, the enumerated felony, this element may not be satisfied. Courts have examined the nexus requirement carefully, and defendants have successfully argued in some cases that the identity use was not sufficiently tied to the predicate offense to trigger the statute.<ref name="uscode-1028a" />


=== No Predicate Felony ===
=== No Predicate Felony ===


Without conviction of an enumerated offense, aggravated identity theft doesn't apply. If you're acquitted of the underlying crime or those charges never appear in the indictment, the identity theft count falls apart too.
Without a conviction for an enumerated offense, § 1028A does not apply. Acquittal on the underlying predicate charge, or a charging decision that omits any enumerated felony, leaves the identity theft count without a legal foundation. This dynamic makes the choice of predicate charges at indictment a significant strategic decision for prosecutors and defense counsel alike.


=== Lawful Authority ===
=== Lawful Authority ===


You might argue you had permission. Maybe the owner gave you permission. Maybe you held official authority. These are fact questions for the jury.
A defendant may argue they possessed lawful authority to use the identification in question. This defense typically arises in professional or employment contexts where the defendant claims permission from the owner or authorization from an employer. It is a fact question for the jury and succeeds in narrow circumstances.


== Impact on Plea Negotiations ==
== Impact on Plea Negotiations ==


That mandatory 2-year add-on changes how cases settle dramatically:
The mandatory 2-year add-on reshapes plea negotiations substantially. Prosecutors use the threat of multiple stacked identity theft counts to encourage cooperation and guilty pleas to reduced charge packages. Dismissal of identity theft counts in exchange for a guilty plea to the predicate offense represents one of the most common forms of negotiated resolution in these cases. A defendant facing five identity theft counts faces 10 mandatory years on those counts alone before any sentence for the underlying fraud. That certainty shifts the calculus. Many defendants accept deals that carry longer predicate sentences in exchange for elimination of the guaranteed stacking.<ref name="uscode-1028a" />
 
* Prosecutors leverage it heavily. Dismissing identity theft counts suddenly looks good to defendants.
* The guaranteed additional time creates real pressure.
* Someone facing five identity theft counts faces ten additional years minimum.
* Certainty shifts thinking. Many defendants accept deals to avoid the guaranteed stacking.<ref name="uscode-1028a" />
 
== Related Offenses ==
 
=== Identity Theft (18 U.S.C. § 1028) ===
 
This is the parent statute. It covers identity theft without the mandatory minimum requirement. Sentences range from 5 to 30 years depending on which subsection applies.
 
=== Access Device Fraud (18 U.S.C. § 1029) ===
 
Credit cards, account numbers, and electronic access devices all fit here. Usually charged alongside identity theft counts.
 
=== Computer Fraud (18 U.S.C. § 1030) ===
 
Unauthorized computer access often supplies the stolen identity data. These charges frequently appear together.
 
== See also ==
 
* [[Wire Fraud|Wire Fraud]]
* [[Bank Fraud|Bank Fraud]]
* [[Mail Fraud|Mail Fraud]]
* [[False Statements|False Statements]]
* [[Federal Sentencing Guidelines and Offense Enhancements|Federal Sentencing Guidelines and Offense Enhancements]]
 
== Frequently Asked Questions ==
{{FAQSection/Start}}
{{FAQ|question=What is aggravated identity theft?|answer=Aggravated identity theft under 18 U.S.C. § 1028A means using someone else's identification to commit certain federal crimes. It comes with a mandatory 2-year prison sentence that runs consecutive to, or after, any sentence for the underlying crime, with no possibility of probation.}}
{{FAQ|question=What is the sentence for aggravated identity theft?|answer=Aggravated identity theft carries a mandatory 2-year prison sentence (5 years if terrorism-related). This sentence must run consecutive to any other sentence. You're looking at exactly 2 years added to your total time, and judges can't reduce it or suspend it.}}
{{FAQ|question=Can a judge reduce the 2-year sentence?|answer=No. The 2-year sentence is truly mandatory. Judges can't shorten it. It must run consecutive to other sentences and can't be served as probation. This represents one of the few genuinely mandatory minimum sentences in federal law where judges have zero discretion.}}
{{FAQ|question=What crimes can trigger aggravated identity theft?|answer=Aggravated identity theft applies when identity theft occurs "during and in relation to" certain enumerated felonies. Wire fraud, mail fraud, bank fraud, healthcare fraud, immigration document fraud, tax fraud, and access device fraud all qualify, among others.}}
{{FAQ|question=Do I have to know the identity belongs to a real person?|answer=Yes. Flores-Figueroa v. United States (2009) established that prosecutors must prove you knew the identity belonged to an actual person. Using a made-up identity that happens to match a real person's information doesn't count if you didn't know it was real.}}
{{FAQ|question=Can I be charged with multiple counts of aggravated identity theft?|answer=Yes. Each identity stolen can be a separate count, potentially adding 2 years for each one. Courts have some discretion on whether multiple counts run together or separately after the first count.}}
{{FAQSection/End}}
 
== References ==
 
<references />
 
{{Federal Offenses}}
 
[[Category:Federal Offenses]]
[[Category:White Collar Crime]]
 
<html>
 
</html>


{{MetaDescription|Comprehensive guide to federal aggravated identity theft charges under 18 U.S.C. § 1028A. Learn about mandatory minimums, sentencing, and notable cases.}}
== Civil and Administrative Consequences ==


{{#seo:
Beyond the criminal sentence, a § 1028A conviction carries significant collateral consequences. Non-citizen defendants face mandatory deportation under 8 U.S.C. § 1227 following conviction for aggravated felonies, and aggravated identity theft qualifies. Professional licenses in law, medicine, finance, and other regulated fields are typically revoked or suspended following federal felony convictions. Restitution obligations under 18 U.S.C. § 3663A are mandatory in cases involving identifiable victims, requiring defendants to compensate victims for financial losses flowing from the offense. The FTC, listed among the agencies with enforcement interest in identity theft cases, operates primarily on the civil side through consumer protection proceedings, data broker regulation, and the Consumer Sentinel Network, which aggregates identity theft complaints and shares data with law enforcement partners.<ref
|title=Aggravated Identity Theft - Prisonpedia
|title_mode=replace
|description=Learn about Aggravated Identity Theft on Prisonpedia, the encyclopedia of the federal prison system.
|type=article
|site_name=Prisonpedia
|locale=en_US
}}

Latest revision as of 02:11, 27 April 2026

Aggravated Identity Theft
Statute:18 U.S.C. § 1028A
U.S. Code:Title 18, Chapter 47
Max Prison:2 years mandatory consecutive (5 years for terrorism)
Max Fine:$250,000
Guidelines:USSG §2B1.6
Base Level:N/A (mandatory consecutive)
Agencies:FBI, USSS, FTC, SSA-OIG
Related:Wire Fraud, Bank Fraud, False Statements

Aggravated identity theft is a serious federal crime codified at 18 U.S.C. § 1028A. It punishes anyone who uses another person's identification while committing certain enumerated federal felonies. The statute is notable in that the sentencing judge has no discretion: a mandatory 2-year prison term attaches, and it runs separately from whatever sentence the defendant receives for the underlying crime.[1]

Congress passed the Identity Theft Penalty Enhancement Act of 2004 because identity theft was growing rapidly and fueling countless other crimes.[2] The legislation reflected serious concern about criminals combining stolen identities with fraud schemes to amplify both their gains and the harm suffered by victims. That mandatory consecutive approach transformed how federal sentencing works for these cases, and the law has since become one of the most frequently charged statutes in white-collar prosecutions.[1]

Elements of the Offense

Prosecutors must prove all four elements beyond a reasonable doubt. First, the defendant must have knowingly transferred, possessed, or used a means of identification belonging to another person. Second, that use must have occurred without lawful authority. Third, it must have taken place during and in relation to an enumerated felony offense. Fourth, the defendant must have known the identification belonged to an actual, living person rather than a fictitious one.[3]

Means of Identification

The statute defines the term broadly. Under 18 U.S.C. § 1028(d)(7), a "means of identification" includes any name, Social Security number, date of birth, driver's license number, passport number, alien registration number, or government-issued identification number. The definition also reaches unique biometric data such as fingerprints, voice prints, and retina images, as well as unique electronic identification numbers or addresses, routing codes, and telecommunication identifying information or access devices. That breadth means prosecutors can charge the statute across a wide range of factual scenarios, from traditional document fraud to sophisticated digital identity crimes.

Knowledge Requirement

This element matters more than it might first appear. In Flores-Figueroa v. United States (2009), the Supreme Court held that prosecutors must prove the defendant knew the identity belonged to a real, actual person.[3] The Court rejected the government's argument that knowledge of the victim's real identity was unnecessary. For example, if a defendant created a fictitious Social Security number and it happened by chance to match a number assigned to a real person, that would not constitute aggravated identity theft if the defendant genuinely had no knowledge a real person held that number. Still, circumstantial evidence is enough. Evidence that a defendant purchased data from an identity theft marketplace, for instance, strongly supports the inference that the defendant knew real victims existed behind the numbers. Courts applying Flores-Figueroa since 2009 have consistently held that the knowledge requirement can be satisfied through circumstantial proof, and acquittals on this ground remain uncommon.[4]

Enumerated Predicate Offenses

Aggravated identity theft only applies when the identity theft occurs "during and in relation to" a specific list of federal crimes set out in 18 U.S.C. § 1028A(c). The predicate offenses span several categories. Fraud and related crimes include mail fraud (18 U.S.C. § 1341), wire fraud (18 U.S.C. § 1343), bank fraud (18 U.S.C. § 1344), healthcare fraud (18 U.S.C. § 1347), access device fraud (18 U.S.C. § 1029), and computer fraud (18 U.S.C. § 1030). Immigration offenses covered include illegal reentry (8 U.S.C. § 1326) and document fraud (18 U.S.C. § 1546). Social Security fraud under 42 U.S.C. § 408 also qualifies. Additional predicates include theft of public money (18 U.S.C. § 641), false statements (18 U.S.C. § 1001), passport fraud (18 U.S.C. § 1542), and nationality fraud (18 U.S.C. § 1015).[1] The "during and in relation to" requirement is not merely technical. Courts have held that the identity theft must be genuinely connected to the predicate crime, not merely incidental or tangentially related.[3]

Statutory Penalties

Category Mandatory Minimum Maximum Fine Consecutive Requirement
Standard aggravated identity theft 2 years $250,000 Must run consecutive
Terrorism-related identity theft 5 years $250,000 Must run consecutive

The penalties under § 1028A are genuine mandatory minimums with no judicial escape valve. The 2-year or 5-year sentence runs consecutively, meaning it follows any other sentence rather than running at the same time. Probation is not an option. Each identity stolen can become a separate count, and those counts can stack. A defendant charged with using five stolen identities during a wire fraud scheme faces at minimum 10 years of mandatory time on the identity theft counts alone, before any sentence for the underlying fraud.[1]

Terrorism Enhancement

Section 1028A(b) provides a separate, enhanced penalty for aggravated identity theft committed in connection with terrorism offenses. Where the predicate felony is a federal crime of terrorism as defined in 18 U.S.C. § 2332b(g)(5), the mandatory consecutive term rises from 2 years to 5 years. The terrorism enhancement has been charged in a smaller subset of cases but carries severe consequences given its fully mandatory nature and the likelihood that the underlying terrorism-related conviction will itself carry a substantial sentence.[1]

Federal Sentencing Guidelines

USSG §2B1.6 addresses aggravated identity theft cases. The guideline is unusually brief because the statute leaves nothing to the judge's discretion. It directs courts to impose the mandatory consecutive sentence required by law, with no offense level calculation, no enhancements, and no downward adjustments. Application Note 2 to §2B1.6 clarifies that no Chapter Three adjustments apply to a § 1028A count.[5]

Relationship to Underlying Offense

The underlying predicate offense is sentenced under its own guideline first. The aggravated identity theft sentence then attaches consecutively. To illustrate: a defendant convicted of wire fraud with a guideline range of 24 to 30 months who also faces an aggravated identity theft count might receive 27 months for the fraud. The court then adds 24 mandatory consecutive months for the identity theft. Total sentence: 51 months, with no judicial authority to reduce the 24-month add-on.[5]

An important development came from the Supreme Court's 2017 decision in Dean v. United States, 581 U.S. 341 (2017). The Court held that sentencing judges may consider the mandatory consecutive § 1028A term when crafting the sentence for the predicate offense. In practice, this means a judge who believes 51 total months is too harsh can sentence the defendant to, say, 20 months on the wire fraud count rather than 27, knowing that the mandatory 24 months will attach regardless. The predicate sentence itself remains subject to guidelines discretion; only the identity theft add-on is truly fixed.[6]

Multiple Counts

When multiple identity theft counts are charged, courts must decide whether each mandatory 2-year term runs consecutively to the others or whether some run concurrently. Where victims differ or the offenses occurred on different occasions, courts typically impose consecutive terms. Where the same victim appears across closely related conduct on a single occasion, concurrent treatment of the identity theft counts may be appropriate. Judges retain some discretion in structuring how multiple § 1028A counts relate to each other, though each individual term must still be consecutive to the predicate sentence.[5]

Common Scenarios

Financial Fraud

Financial fraud represents the most common context for § 1028A charges. Defendants steal Social Security numbers, names, and birth dates and then use that information to open credit card accounts, apply for loans, file false tax returns claiming refunds, or drain existing bank accounts. Because each use of a distinct identity can be charged as a separate count, defendants in large-scale financial fraud cases often face many identity theft counts stacked on top of their fraud convictions.

Government Benefits Fraud

Stolen identities are frequently used to obtain government benefits. Unemployment compensation, Social Security payments, Medicare and Medicaid funds, and various federal relief programs have all been targeted. During the COVID-19 pandemic, § 1028A became a standard charge in prosecutions involving fraudulent applications for Paycheck Protection Program loans and enhanced unemployment benefits, as defendants routinely submitted applications bearing other people's personal information.[7]

Foreign nationals who use another person's documents to work without authorization, obtain state identification, or reenter the country after deportation are frequently charged under § 1028A alongside the relevant immigration offenses. This category forms a substantial portion of overall § 1028A prosecutions, particularly in jurisdictions with high volumes of immigration cases.

Tax Refund Fraud

Tax refund fraud is a straightforward but damaging scheme. Criminals file fraudulent tax returns using stolen Social Security numbers, collecting refunds before the real taxpayer has even filed. Organized rings have filed thousands of false returns in a single season, using information obtained from data breaches, healthcare providers, or employer records. The scheme is especially attractive because the IRS typically issues refunds quickly, making recovery difficult.

Notable Cases and Recent Enforcement

PPP and COVID Relief Fraud

The COVID-19 pandemic created a significant wave of § 1028A prosecutions. Federal prosecutors charged thousands of defendants with using stolen identities on fraudulent Paycheck Protection Program applications, pandemic unemployment claims, and other federal relief programs. The combination of large dollar amounts, easily traceable electronic submissions, and readily available victim identity data made these cases straightforward for investigators. Defendants in multi-count PPP fraud indictments frequently faced 10 or more years of mandatory identity theft time stacked on top of their fraud sentences.[7]

Data Breach Cases

Major data breaches have consistently created downstream § 1028A prosecutions. Defendants who purchase stolen data on dark web markets and then use it to commit fraud qualify for the mandatory enhancement. Hackers who breach corporate systems and monetize the stolen data also face exposure. Federal prosecutors have charged entire networks devoted to converting breach data into fraudulent financial accounts, with each participant potentially facing separate counts for each identity used.

Tax Fraud Rings

Organized tax fraud operations represent some of the largest § 1028A prosecutions by victim count. These groups steal identities from hospitals, employers, and tax preparation firms, then file thousands of fraudulent returns and collect refunds deposited to prepaid debit cards. Ringleaders in such cases have faced mandatory identity theft sentences running into decades when courts imposed consecutive terms across hundreds of counts.

Statistics

The U.S. Sentencing Commission publishes annual data on § 1028A prosecutions. Between roughly 2,000 and 3,000 federal cases annually have involved aggravated identity theft charges in recent years, though the COVID-19 relief fraud wave significantly elevated those numbers through 2021 and 2022.[7] The offense is nearly always charged alongside wire fraud, bank fraud, or access device fraud rather than as a standalone charge. The mandatory consecutive requirement produces a measurable effect on total sentences: defendants convicted of § 1028A receive substantially longer sentences than those convicted of comparable underlying offenses alone. Immigration-related cases involving stolen work authorization documents represent a major category within the overall caseload.[7]

Defenses

No Knowledge of Real Person

Flores-Figueroa created a meaningful defense. The government must prove the defendant knew an actual person owned the identity at issue. A defendant who genuinely believed they were using a fabricated or invented number, and had no reason to think it corresponded to a real person, can contest this element. That said, circumstantial evidence works against defendants in most real-world cases. Purchasing data from an identity theft marketplace, receiving files labeled with victim names and addresses, or participating in a scheme targeting real account holders all support the inference of knowledge.[3]

No "During and In Relation To" Nexus

The identity theft must genuinely occur as part of the predicate crime, not merely alongside it. If the use of a stolen identity was incidental to, or entirely separate from, the enumerated felony, this element may not be satisfied. Courts have examined the nexus requirement carefully, and defendants have successfully argued in some cases that the identity use was not sufficiently tied to the predicate offense to trigger the statute.[1]

No Predicate Felony

Without a conviction for an enumerated offense, § 1028A does not apply. Acquittal on the underlying predicate charge, or a charging decision that omits any enumerated felony, leaves the identity theft count without a legal foundation. This dynamic makes the choice of predicate charges at indictment a significant strategic decision for prosecutors and defense counsel alike.

Lawful Authority

A defendant may argue they possessed lawful authority to use the identification in question. This defense typically arises in professional or employment contexts where the defendant claims permission from the owner or authorization from an employer. It is a fact question for the jury and succeeds in narrow circumstances.

Impact on Plea Negotiations

The mandatory 2-year add-on reshapes plea negotiations substantially. Prosecutors use the threat of multiple stacked identity theft counts to encourage cooperation and guilty pleas to reduced charge packages. Dismissal of identity theft counts in exchange for a guilty plea to the predicate offense represents one of the most common forms of negotiated resolution in these cases. A defendant facing five identity theft counts faces 10 mandatory years on those counts alone before any sentence for the underlying fraud. That certainty shifts the calculus. Many defendants accept deals that carry longer predicate sentences in exchange for elimination of the guaranteed stacking.[1]

Civil and Administrative Consequences

Beyond the criminal sentence, a § 1028A conviction carries significant collateral consequences. Non-citizen defendants face mandatory deportation under 8 U.S.C. § 1227 following conviction for aggravated felonies, and aggravated identity theft qualifies. Professional licenses in law, medicine, finance, and other regulated fields are typically revoked or suspended following federal felony convictions. Restitution obligations under 18 U.S.C. § 3663A are mandatory in cases involving identifiable victims, requiring defendants to compensate victims for financial losses flowing from the offense. The FTC, listed among the agencies with enforcement interest in identity theft cases, operates primarily on the civil side through consumer protection proceedings, data broker regulation, and the Consumer Sentinel Network, which aggregates identity theft complaints and shares data with law enforcement partners.<ref

  1. 1.0 1.1 1.2 1.3 1.4 1.5 1.6 18 U.S.C. § 1028A.
  2. Identity Theft Penalty Enhancement Act of 2004, Pub. L. No. 108-275; see also H.R. Rep. No. 108-528 (2004) (discussing congressional intent and legislative history).
  3. 3.0 3.1 3.2 3.3 Flores-Figueroa v. United States, 556 U.S. 646 (2009).
  4. United States v. Spears, 729 F.3d 753 (7th Cir. 2013) (applying Flores-Figueroa knowledge standard and affirming conviction based on circumstantial evidence of knowledge).
  5. 5.0 5.1 5.2 United States Sentencing Commission, USSG §2B1.6, Application Note 2 (2024).
  6. Dean v. United States, 581 U.S. 341 (2017).
  7. 7.0 7.1 7.2 7.3 United States Sentencing Commission, 2023 Annual Report and Sourcebook of Federal Sentencing Statistics.