United States v. Stepanian

570 F.3d 51, 2009 U.S. App. LEXIS 14309, 2009 WL 1815420
CourtCourt of Appeals for the First Circuit
DecidedJune 26, 2009
Docket08-1053
StatusPublished
Cited by23 cases

This text of 570 F.3d 51 (United States v. Stepanian) is published on Counsel Stack Legal Research, covering Court of Appeals for the First Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Stepanian, 570 F.3d 51, 2009 U.S. App. LEXIS 14309, 2009 WL 1815420 (1st Cir. 2009).

Opinion

LIPEZ, Circuit Judge.

Appellant pled guilty to conspiracy to commit access device fraud and aggravated identity theft and now appeals his sentence of 72 months of imprisonment. Among other things, this appeal requires us to decide whether individuals who were reimbursed for financial losses are “vic *53 tims” within the meaning of the multiple victim enhancement set forth at section 2Bl.l(b)(2) of the United States Sentencing Guidelines. Concluding that such individuals are “victims” for this purpose, we reject appellant’s challenge to the imposition of a six-level guideline enhancement for crimes affecting more than 250 victims. We also reject his claims that the district court erred by giving the guideline sentence range “substantial weight” and by concluding that it was bound to impose a two-year consecutive sentence for the aggravated identify theft conviction.

I.

The facts are not disputed. Beginning in January 2007, appellant and three co-conspirators—Arman Ter-Esayan, Arutyun Shatarevyan, and Gevork Baltadjian—devised a plan to steal debit card numbers, personal'identification numbers (“PIN codes”), and credit card numbers from the customers of 24-hour Stop & Shop grocery stores in Rhode Island. To accomplish this, they surreptitiously replaced the credit and debit card payment terminals in Stop & Shop checkout aisles with altered terminals. The altered terminals were equipped with devices that recorded, or “skimmed,” debit card numbers, PIN codes, and credit card numbers whenever customers swiped their cards to make purchases.

After returning to a targeted store to retrieve a converted payment terminal and replacing it with the store’s original terminal, the co-conspirators possessed the private account information of every customer who had used the compromised terminal during the intervening period. The men were able to use the stolen information to make unauthorized transactions, including cash withdrawals from automatic teller machines (“ATMs”). Their unauthorized transactions totaled roughly $132,300.

The scheme was discovered in February 2007, when one bank’s internal investigation of unauthorized ATM withdrawals revealed that many affected account holders had recently used their cards at Stop & Shop stores in Coventry and Cranston, Rhode Island. 1 Stop & Shop security personnel soon located surveillance video showing Ter-Esayan, Baltadjian, and Shatarevyan entering the Cranston store in the early hours of the morning on February 1, 2007. While Baltadjian engaged the night clerk in conversation, Ter-Esayan and Shatarevyan approached the credit card terminal in a deserted checkout aisle. Shatarevyan quickly disconnected the original terminal from its cables and handed it to Ter-Esayan, who concealed it in his coat. Shatarevyan then removed a second terminal from his own coat and connected it to the cables. Stop & Shop surveillance personnel located similar footage of the three men switching terminals in the Coventry and Providence, Rhode Island stores. As revealed by the surveillance video, the process of substitution only took about twelve seconds.

On February 26, 2007, Stop & Shop employees at one of the targeted stores recognized appellant’s co-conspirators from the surveillance video and called the police. The responding officers arrested Ter-Esayan, Baltadjian, and Shatarevyan inside the store. They also arrested appellant, who was sitting behind the wheel of a vehicle parked immediately outside the store’s exit. Police later searched a nearby hotel room that had been rented in *54 appellant’s name, where they found materials used to alter the credit card terminals and a laptop containing the private account information of customers who had shopped at the Cranston and Coventry Stop & Shop stores.

On July 13, 2007, after waiving his right to indictment, appellant pled guilty to a two-count information charging: 1) conspiracy to violate 18 U.S.C. § 1029(a)(2) by trafficking in and using one or more unauthorized access devices with intent to defraud, in violation of 18 U.S.C. § 371 (Count I), and 2) knowing transfer, possession, or use of other persons’ means of identification in relation to the felony offenses of access device fraud, 18 U.S.C. § 1029(a)(2), (a)(3), and conspiracy to commit access device fraud, 18 U.S.C. §§ 371, 1029(b)(2), constituting aggravated identity theft in violation of 18 U.S.C. § 1028A(a)(l) (Count II).

The Office of Probation prepared a presentence report (“PSR”) that calculated appellant’s total offense level for Count I (access device fraud) at 23. This calculation included a base offense level of 6, a ten-level upward adjustment for crimes causing a financial loss of between $120,000 and $200,000, a six-level upward adjustment for crimes involving more than 250 victims, a two-level upward adjustment for use of sophisticated means to commit the crime, a two-level upward adjustment because the offense involved the production or trafficking of an unauthorized access device, and a three-level downward adjustment for acceptance of responsibility. The PSR placed appellant in Criminal History Category I, and the resulting guideline range was 46-57 months on Count I. The report also noted that Count II, aggravated identity theft, carried a mandatory consecutive sentence of two years. 18 U.S.C. § 1028A(b).

At sentencing, the defendant objected to the PSR’s calculation of the number of victims of the crime, arguing that individual account holders could not be counted as victims because they were reimbursed by their financial institutions. The district court disagreed:

[Tjhere has been loss experienced by all the victims in the case. The loss experienced by the individual victims may have been for a short period of time, might have been for a week or two weeks or for a day, whatever the case may be. There was reimbursement, no doubt, that occurred, but I don’t think the guidelines speak in terms of the length of time that a victim is deprived of their money or access to their money any more than in any other crime of fraud or that involves stealing, that the question of whether the person is a victim is determined by whether they’re deprived of their resources for an hour, a day, a month or a year.... It seems to me these people were victims because money was stolen from their accounts.

The district court adopted the PSR’s recommendation, sentencing appellant to 48 months of imprisonment on Count I and a mandatory two year consecutive term on Count II, for a total period of imprisonment of 72 months. This appeal followed.

II.

Appellant first challenges the district court’s calculation of the number of victims of his crime.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Kitts
27 F.4th 777 (First Circuit, 2022)
United States v. Pinkham
896 F.3d 133 (First Circuit, 2018)
United States v. Amin Rashid
654 F. App'x 54 (Third Circuit, 2016)
United States v. Lopez-Diaz
794 F.3d 106 (First Circuit, 2015)
United States v. Kevin Roberts
597 F. App'x 72 (Third Circuit, 2015)
United States v. Allen Smith
751 F.3d 107 (Third Circuit, 2014)
United States v. Okechukwo Otuya
720 F.3d 183 (Fourth Circuit, 2013)
United States v. Robert Loffredi
718 F.3d 991 (Seventh Circuit, 2013)
United States v. Savarese
686 F.3d 1 (First Circuit, 2012)
United States v. Latorey Earvin
682 F.3d 502 (Sixth Circuit, 2012)
Tyler v. Michaels Stores, Inc.
840 F. Supp. 2d 438 (D. Massachusetts, 2012)
United States v. Horacio Munar
419 F. App'x 600 (Sixth Circuit, 2011)
Elgin v. U.S. Department of the Treasury
641 F.3d 6 (First Circuit, 2011)
United States v. Panice
598 F.3d 426 (Seventh Circuit, 2010)
United States v. Damon
595 F.3d 395 (First Circuit, 2010)
United States v. Larios
593 F.3d 82 (First Circuit, 2010)
Bauer v. Colokathis (In Re Colokathis)
417 B.R. 150 (D. Massachusetts, 2009)
United States v. Ter-Esayan
570 F.3d 46 (First Circuit, 2009)

Cite This Page — Counsel Stack

Bluebook (online)
570 F.3d 51, 2009 U.S. App. LEXIS 14309, 2009 WL 1815420, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-stepanian-ca1-2009.