Christopher Rad v. Attorney General United States ( 2020 )


Menu:
  •                                       PRECEDENTIAL
    UNITED STATES COURT OF APPEALS
    FOR THE THIRD CIRCUIT
    ____________
    No. 19-1404
    ____________
    CHRISTOPHER RAD,
    Petitioner
    v.
    ATTORNEY GENERAL UNITED STATES OF AMERICA
    ____________
    On Petition for Review of a Decision of
    the Board of Immigration Appeals
    [Agency No. A034-985-319]
    Immigration Judge: John P. Ellington
    ____________
    Argued September 15, 2020
    Before: KRAUSE, RESTREPO, and BIBAS, Circuit Judges
    (Opinion Filed: December 21, 2020)
    Christopher Rad
    Pike County Correctional Facility
    175 Pike County Boulevard
    Lords Valley, PA 18428
    Pro Se Petitioner
    Jacob A. Bashyrov
    Craig A. Newell, Jr.[Argued]
    United States Department of Justice
    Office of Immigration Litigation
    P.O. Box 878
    Ben Franklin Station
    Washington, DC 20044
    Counsel for Respondent
    Ana Builes
    Hannah Mullen [Argued]
    Tyler Purinton
    Adam Walker
    Brian S. Wolfman, Esq.
    Georgetown University Law Center
    600 New Jersey Avenue, N.W., Suite 312
    Washington, DC 20001
    Bradley Girard
    Americans United for Separation of Church and State
    1310 L Street, N.W., Suite 200
    Washington, DC 20005
    Court-Appointed Amicus Curiae
    2
    ____________
    OPINION OF THE COURT
    ____________
    KRAUSE, Circuit Judge.
    Since its earliest days, the internet has provided a forum
    for users to share ideas, do business, and gather information in
    relative anonymity. Whether the CAN-SPAM Act’s rarely-
    invoked but potentially far-reaching criminal provisions alter
    that paradigm is the central question presented by this appeal.
    See 18 U.S.C. § 1037(a). In one view, the Act implements a
    sweeping anti-anonymity principle that compels individuals
    and businesses to disclose their identity in every commercial
    email they send and every domain name they register.
    Recognizing the troubling constitutional and practical
    consequences of this approach, we read the Act differently.
    Rather than penalizing everyday practices, the Act reflects and
    reinforces longstanding norms. So long as marketers refrain
    from making false statements in contexts where consumers
    have come to expect accuracy, their conduct comports with the
    norms embedded in the architecture of the internet—and with
    the Act. With this narrow, norms-based interpretation in mind,
    we conclude that Petitioner’s convictions for conspiring to
    violate the CAN-SPAM Act necessarily entail deceit, and
    therefore satisfy the first element of an aggravated felony under
    8 U.S.C. § 1101(a)(43)(M)(i).
    3
    The second element, that Petitioner’s crimes inflicted
    victim losses over $10,000, is a different story. In reviewing a
    removal order, we are bound by one of administrative law’s
    most fundamental principles: We judge the agency’s decision
    “solely by the grounds [it] invoked,” SEC v. Chenery Corp.,
    
    332 U.S. 194
    , 196 (1947). The Board of Immigration Appeals’
    initial removal order overlooked crucial differences between
    sentencing hearings and immigration proceedings, so we
    remanded. But the revised order rests on the same flawed
    understanding of the loss element as its predecessor, and we
    therefore cannot approve the agency’s analysis. Even as we
    reject the Board’s rationale, however, we hold that intended
    losses, not just actual ones, may meet the loss requirement for
    Petitioner’s     conspiracy    offenses,     see     8    U.S.C.
    § 1101(a)(43)(U). Because the Board never addressed this
    possibility, we are compelled to provide yet another
    opportunity for it to examine the loss element.
    I.     Factual and Procedural Background
    A.     The CAN-SPAM Act
    To provide context for this appeal, we offer a brief
    introduction to the CAN-SPAM Act. The Act’s purpose is to
    address the harms caused by “unsolicited commercial . . .
    [e]mail,” otherwise known as spam. 15 U.S.C. § 7701(a)(2).
    To that end, the Act empowers consumers to sue marketers
    who relay misleading messages or refuse to honor opt-out
    requests.
    Id. § 7703 et
    seq. It also enables prosecutors to bring
    criminal charges against spammers who embrace especially
    4
    abusive tactics. See 18 U.S.C. § 1037(a). Two of those tactics
    are the subject of this appeal.
    The first involves falsifying an email’s header
    information. By definition, a header records a message’s
    “source, destination, and routing.” 15 U.S.C. § 7702(8). In
    most cases, a sender’s computer populates the header with
    accurate information about the message’s origin. See Dan
    Boneh, The Difficulties of Tracing Spam Email 2-3, FTC (Sept.
    9, 2004), https://perma.cc/7NG3-M4MV. In some cases,
    however, spammers manipulate headers to report false
    information.
    Id. This tactic, called
    “spoofing,” confuses spam
    filters, misleads recipients, and impedes investigators.
    Id. at 4, 11.
    The Act therefore prohibits it. See 18 U.S.C. § 1037(a)(3).
    The second tactic consists of registering a domain name
    using a false identity. As a general matter, a domain name
    describes an “alphanumeric designation which is registered
    with . . . [a] registration authority as part of an electronic
    address on the [i]nternet.” 15 U.S.C. § 7702(4). To prevent
    multiple users from claiming the same domain, the Internet
    Corporation for Assigned Names and Numbers (ICANN)
    administers a registration system. What ICANN Does and
    Doesn’t       Do,        ICANN        (June       22,     2012),
    https://www.icann.org/en/system/files/files/what-icann-does-
    22jun12-en.pdf. Under ICANN’s rules, a registrant cannot
    reserve a domain without publicly disclosing their contact
    information.     FAQ: Domain Name Registrant Contact
    Information,        ICANN           (Feb.        25,      2012),
    https://www.icann.org/resources/pages/faqs-f0-2012-02-25-
    5
    en. This requirement makes it easier for law enforcement
    agencies to investigate fraud, hacking, and other criminal
    activities conducted over the internet. See Jon Leibowitz,
    Prepared Statement of the Federal Trade Commission Before
    ICANN 4 (June 2006), https://perma.cc/98UG-9L9N. Not
    surprisingly, spammers sometimes flout ICANN’s rules—and
    avoid the scrutiny those rules facilitate—by registering domain
    names using false contact information. This tactic, too,
    violates the Act. See 18 U.S.C. § 1037(a)(4).
    B.     Rad’s Trial and Sentencing
    Though the CAN-SPAM Act came into force almost
    two decades ago, its criminal provisions have given rise to only
    a handful of prosecutions, one of which underlies this case. In
    2012, a grand jury approved a nine-count superseding
    indictment against Petitioner Christopher Rad. According to
    the indictment, Rad and several co-conspirators acquired
    shares of penny stocks, “pumped” the prices of those stocks by
    bombarding investors with misleading spam emails, and then
    “dumped” their shares on the market at a profit. A.R. 75–76.
    Of relevance here, Count I charged Rad with conspiring to
    commit false header spamming, see § 1037(a)(3), false domain
    name spamming, see § 1037(a)(4), and securities fraud, see 15
    U.S.C. §§ 78j and 78ff.1 At trial, a jury convicted Rad of the
    1
    The remaining counts, which charge both substantive
    and inchoate violations of the CAN-SPAM Act, played no part
    in the Board’s removal decision, and are therefore irrelevant to
    this appeal.
    6
    first two conspiracies, but failed to reach a verdict as to the
    third.
    In preparation for sentencing, the Probation Office
    circulated a Presentence Investigation Report (“PSR”)
    recommending that the District Court raise Rad’s offense level
    to reflect the losses his crimes inflicted on investors. See
    U.S.S.G. § 2B1.1(b)(1). The PSR began by estimating that
    Rad realized about $2.9 million in “illicit gains” over the
    course of the conspiracy. A.R. 42. It then acknowledged that,
    because “countless victims” purchased stocks “based on the
    spamming scheme,” the losses stemming from Rad’s conduct
    could not “reasonabl[y] be determined.”
    Id. at 46.
    It
    nonetheless advised the Court to treat Rad’s gains as a proxy
    for victim losses and to lengthen his sentence accordingly. Id.;
    see U.S.S.G. § 2B1.1, cmt. n.3(B) (“The court shall use the
    gain that resulted from the offense as an alternative measure of
    loss . . . if there is a loss but it reasonably cannot be
    determined.”). For his part, Rad questioned whether his crimes
    caused any losses and emphasized the absence of evidence
    “that any single person lost anything” as a result of the
    conspiracy. A.R. 67.
    At sentencing, the District Court ordered Rad to serve a
    total of seventy-one months in prison, including thirty-five
    months attributable to Count I. Because neither party
    introduced a transcript of the sentencing hearing, the
    administrative record is silent as to how the Court analyzed and
    7
    resolved the victim loss issue.2 We upheld the District Court’s
    judgment on appeal.
    C.     Removal Proceedings
    Not long after the District Court sentenced Rad, the
    Department of Homeland Security (“DHS”) initiated removal
    proceedings. Under the Immigration and Naturalization Act
    (“INA”), DHS retains authority to remove noncitizens who
    commit “aggravated felonies.” 8 U.S.C. § 1227(a)(2)(A)(iii).
    That category includes any crime that (1) “involves fraud or
    deceit” (2) “in which the loss to the victim or victims exceeds
    $10,000.”
    Id. § 1101(a)(43)(M)(i). In
    proceedings before an Immigration Judge (“IJ”),
    DHS characterized Rad’s CAN-SPAM Act convictions as
    felonies involving deceit and the requisite level of victim
    losses. The IJ agreed and the Board affirmed.
    2
    Despite the possible relevance of the transcript of
    Rad’s sentencing hearing, we cannot take judicial notice of
    materials outside the administrative record. See Berishaj v.
    Ashcroft, 
    378 F.3d 314
    , 330 (3d Cir. 2004) (“[C]ourts
    reviewing the determination of an administrative agency must
    approve or reject the agency’s action purely on the basis of . . .
    the record compiled before[] the agency itself.”); cf. Nbaye v.
    Att’y Gen., 
    665 F.3d 57
    , 59–60 (3d Cir. 2011) (remanding to
    permit the Board to consider extra-record information in the
    first instance).
    8
    When Rad filed his first petition for review before this
    Court, DHS urged us to remand to permit the Board to “further
    consider[]” whether Rad’s offenses constitute aggravated
    felonies. A.R. 318. In explaining why remand was warranted,
    DHS collected controlling precedents that the Board had failed
    to address in its initial order. We therefore sent the case back
    to the Board.
    On remand, the agency proceeded to retread the ground
    it covered in its initial analysis of the loss element. Rather than
    reviewing evidence from Rad’s sentencing hearing, the Board
    depended on an inference drawn from the criminal judgment.
    Because “a 35-month sentence was ultimately imposed for
    [Count I],” the agency reasoned, “the sentencing judge [must
    have] added at least 6 levels based on victim loss—a
    determination that would have required the court to assess the
    loss at greater than $40,000.”             A.R. 5; see U.S.S.G.
    § 2B1.1(b)(1)(D). So, while the Board conceded that “the
    precise quantum of victim loss is not readily ascertainable,” it
    nevertheless presumed “the amount of loss . . . exceeded
    $10,000.” A.R. 5. Having classified Rad’s crimes as
    aggravated felonies, the agency ordered him removed from the
    United States.
    9
    We now consider Rad’s second, timely-filed petition for
    review.3
    II.    Jurisdiction and Standard of Review
    The Board exercised jurisdiction under 8 C.F.R.
    § 1003.1(b)(3). We retain jurisdiction to consider “whether
    [Rad]’s conviction qualifies as an aggravated felony because it
    is a ‘purely legal question, and one that governs our own
    jurisdiction.’” Fan Wang v. Att’y Gen., 
    898 F.3d 341
    , 343 (3d
    Cir. 2018). Our review of that question is plenary. See Singh
    v. Att’y Gen., 
    677 F.3d 503
    , 508 (3d Cir. 2012).
    III.   Analysis
    To demonstrate that Rad’s crimes count as aggravated
    felonies, DHS bears the burden of establishing two elements.
    See Kiareldeen v. Ashcroft, 
    273 F.3d 542
    , 553–54 (3d Cir.
    2001). The first is that violations of 18 U.S.C. §§ 1037(a)(3)
    and (a)(4) categorically involve “fraud or deceit.” 8 U.S.C.
    § 1101(43)(M)(i). In analyzing this requirement, “we focus on
    the crime’s statutory elements ‘rather than . . . the specific facts
    3
    Because Rad brought this appeal pro se, we asked
    Georgetown University Law Center’s Appellate Courts
    Immersion Clinic to serve as amicus. We express our gratitude
    to the Clinic for accepting this matter pro bono, and we
    commend the Clinic for its superb briefing and argument in this
    complex case. Lawyers who act pro bono fulfill the highest
    service that members of the bar can offer to indigent parties
    and to the legal profession.
    10
    underlying the crime.’” 
    Singh, 677 F.3d at 508
    (alteration in
    original) (quoting Kawashima v. Holder, 
    565 U.S. 478
    , 483
    (2012)). The second element, whether Rad caused over
    $10,000 in losses, 8 U.S.C. § 1101(43)(M)(i), is a different
    story. That requirement hinges on “the specific way in which
    [Rad] committed the crime[s],” and we therefore review the
    indictment, judgment, presentence investigation report, and
    any other “sentencing-related material” that sheds light on
    Rad’s conduct. Nijhawan v. Holder, 
    557 U.S. 29
    , 34, 42
    (2009). As we shall see, DHS has met its burden as to the first
    element, but we must remand for the Board to revisit the
    second.
    A.     The Fraud or Deceit Element
    The central question presented here is whether 18
    U.S.C. §§ 1037(a)(3) and (a)(4) categorically “involve[] fraud
    or deceit.”4 8 U.S.C. § 1101(43)(M)(i). In answering this
    question, we begin by defining deceit; we proceed to survey
    the scope of the CAN-SPAM Act; and we conclude by asking
    whether the least-culpable conduct covered by the Act entails
    deceit. Because the parties focus on deceit, we do the same.
    4
    Although prosecutors charged Rad with conspiracy to
    commit securities fraud, the jury failed to reach a verdict as to
    that charge. DHS therefore concedes that the conspiracy to
    commit securities fraud charge does not justify Rad’s removal.
    11
    1.      How the INA Defines Deceit
    Our initial task is to stake out the boundaries of the
    INA’s deceit provision. On this front, at least, we need not
    write on a blank slate. We long ago recognized that the INA
    uses “deceit” in its commonly accepted legal sense—namely,
    “the act of intentionally giving a false impression.” Valansi v.
    Ashcroft, 
    278 F.3d 203
    , 209 (3d Cir. 2002) (citing Black’s Law
    Dictionary 413 (7th ed. 1999)). In the intervening years, at
    least one of our sister circuits has endorsed this definition; none
    have disputed it; and the IJ and DHS invoked it in this case.
    See James v. Gonzales, 
    464 F.3d 505
    , 508 & n.14 (5th Cir.
    2006); Patel v. Mukasey, 
    526 F.3d 800
    , 802–03 (5th Cir. 2008).
    A similar understanding of deceit emerges from one of
    the Supreme Court’s removal cases, Kawashima v. Holder, 
    565 U.S. 478
    (2012). There, the Court equated “deceit” with “‘the
    act or practice of deceiving (as by falsification, concealment,
    or cheating).’”
    Id. at 484
    (quoting Webster’s Third New
    International Dictionary 584 (1993)). At its core, this
    definition turns on the gerund “deceiving,” a word that means
    “caus[ing] to believe the false.” Deceive, Merriam-Webster
    Unabridged, https://www.unabridged.merriam-webster.com/
    unabridged/deceiving (last visited Oct. 15, 2020). That leaves
    little, if any, practical difference between Valansi’s and
    Kawashima’s definitions. Here, for example, §§ 1037(a)(3)
    and (a)(4) necessarily entail deceit, no matter which
    formulation applies. To see why, we must abandon the
    familiar domain of the INA and venture into the terra incognita
    of the CAN-SPAM Act.
    12
    2.     What the CAN-SPAM Act Prohibits
    The categorical approach presupposes that we
    understand the least-culpable conduct covered by a criminal
    statute. Yet no controlling cases analyze §§ 1037(a)(3) and
    (a)(4), and few courts at any level have done so. For their part,
    the parties paint drastically different pictures of the Act. While
    DHS depicts the false-header and domain-name spamming
    provisions as proscribing a specific set of abuses, Amicus
    portrays those provisions as announcing that all senders of
    commercial email must comply with a sweeping anti-
    anonymity principle. We conclude, however, that far from
    upending pre-existing norms, the Act reflects and reinforces
    them. To show how it does so, we look first to the Act’s text.
    We then explain why the doctrine of constitutional avoidance
    supports our narrow reading of the Act. And finally, we
    identify where Amicus’s more expansive construction goes
    astray.
    a)      Statutory text
    Our inquiry begins—and, as it turns out, largely ends—
    with the terms of the Act itself. In relevant part, 18 U.S.C.
    § 1037(a) specifies that:
    Whoever, in or affecting interstate or foreign
    commerce, knowingly
    ...
    13
    (3) materially falsifies header information in
    multiple commercial electronic mail messages
    and intentionally initiates the transmission of
    such messages, [or]
    (4) registers, using information that materially
    falsifies the identity of the actual registrant, for
    five or more electronic mail accounts or online
    user accounts or two or more domain names, and
    intentionally initiates the transmission of
    multiple commercial electronic mail messages
    from any combination of such accounts . . .
    or conspires to do so, shall be punished . . . .
    (emphasis added).
    In advancing a far-reaching interpretation of the Act,
    Amicus downplays these provisions, and instead highlights
    Congress’s subsequent definition of the word “materially”:
    For purposes of paragraphs (3) and (4) of
    subsection (a), header information or registration
    information is materially falsified if it is altered
    or concealed in a manner that would impair the
    ability of a recipient of the message, an Internet
    access service processing the message on behalf
    of a recipient, a person alleging a violation of this
    section, or a law enforcement agency to identify,
    locate, or respond to a person who initiated the
    14
    electronic mail message or to investigate the
    alleged violation.
    Id. § 1037(d)(2) (emphasis
    added). As Amicus would have it,
    this language transforms a statute designed to target specific
    abuses into one that compels marketers to divulge their
    “identi[ty]” and “locat[ion]” in every email they send and
    every domain name they register.
    Id. For example, Amicus
    posits that a small business that uses a private
    (“Anonymous@Generic.com”),                                 vague
    (“Jane@Sportsfan.com”)                 or             whimsical
    (“Bigfoot@Podiatry.com”) email address has “concealed” its
    “identi[ty]” in a way that risks prosecution.
    Id. And, likewise, Amicus
    predicts that the thousands of individuals who pay
    proxies to register domain names on their behalf have similarly
    “impair[ed]” recipients’ ability to “identify” or “locate” them.
    Id. All of this
    commonplace conduct falls within the scope of
    §§ 1037(a)(3) and (a)(4), Amicus warns, whenever the sender
    conveys a sufficient quantity of commercial emails.5
    5
    The Act applies to defendants who send “multiple”
    emails, which it defines as “more than 100 electronic mail
    messages during a 24-hour period, more than 1,000 electronic
    mail messages during a 30-day period, or more than 10,000
    electronic mail messages during a 1-year period.” 18 U.S.C.
    § 1037(d)(3). This element does little to shield everyday
    conduct from prosecution, given that businesses—from stores
    announcing a new location to local politicians soliciting
    donations—often have occasion to send more than a hundred
    emails in a day.
    15
    But we normally refuse to construe statutes as
    “criminaliz[ing] a broad range of day-to-day activity,” and the
    CAN-SPAM Act is no exception. United States v. Kozminski,
    
    487 U.S. 931
    , 949 (1988). Rather than penalizing everyday
    practices, the Act implements pre-existing norms. Cf. Orin S.
    Kerr, Norms of Computer Trespass, 116 COLUM. L. REV. 1143,
    1146 (2016) (contending that computer trespass statutes should
    be interpreted in light of prevailing norms). Since the
    internet’s earliest days, the protocol that permits computers to
    exchange emails has mandated that a message’s header include
    a field that reflects its sender’s address. See David Dickinson,
    Note, An Architecture for Spam Regulation, 57 FED. COMM.
    L.J. 129, 132 (2004). And, for almost as long, ICANN has
    required registrants to divulge their own contact information,
    or that of a proxy, when claiming a domain name. FAQ:
    Domain Name Registrant Contact Information, ICANN (Feb.
    25, 2012), https://www.icann.org/resources/pages/faqs-f0-
    2012-02-25-en.
    These accountability mechanisms do not dictate that
    senders reveal who they are or where they are located in every
    message, and neither does the Act. Instead, senders need only
    provide recipients with a reliable way of contacting them,
    whether by replying to a particular account or by
    communicating through a proxy. So long as individuals and
    businesses refrain from inserting false contact information in
    contexts where internet users have come to expect accuracy,
    their conduct comports with prevailing norms—and with the
    Act.
    16
    Start with the prohibition on false header spamming.
    What makes Amicus’s construction of § 1037(a)(3) so
    sweeping is that it requires an email address’s semantic content
    to match the sender’s reality. If a commercial message arrives
    from “Jane@sportsfan.com,” for example, then Amicus reads
    the Act as mandating that the sender be named Jane and enjoy
    sports. In practice, of course, internet users routinely create
    email addresses that imperfectly or inaccurately reflect their
    true identities. By the same token, businesses often have
    occasion to promote their services with addresses that pay
    homage to fictional mascots (“Bulldog@Almamater.edu”),
    celebrity endorsers (“Famous_Athlete@Nike.com”), or long-
    gone founders (“Benjamin_Franklin@Printingpress.com”).
    Nothing      in   § 1037(a)(3)     criminalizes      these
    commonplace practices.        By its terms, that subsection
    prescribes penalties only for individuals who “falsify,” 18
    U.S.C. § 1037(a)(3), the “source, destination, and routing
    information attached to an electronic mail message,” 15 U.S.C.
    § 7702(8). In other words, the information displayed in an
    email’s header must match the address from which the message
    was actually sent—but not necessarily the sender’s true
    identity. When a business owner conveys communications
    from “Jane@Sportsfan.com,” for example, her emails’ headers
    will report that address, foreclosing the application of
    § 1037(a)(3) no matter what her name is or whether she follows
    sports. When a spammer manipulates her messages’ headers
    so that they seem to originate from an account that does not
    exist or that she does not control, by contrast, she violates the
    Act. In this way, § 1037(a)(3) promotes the CAN-SPAM Act’s
    17
    stated purpose of enabling consumers “to decline to receive
    additional commercial electronic mail from the same source,”
    15 U.S.C. § 7701(b)(3), without mandating that marketers
    disclose their identity and location in every message.
    The same is true of the prohibition on domain-name
    spamming. Under Amicus’s wide-ranging interpretation of
    § 1037(a)(4), anyone who employs a proxy service to register
    a domain name risks federal prosecution. But while using a
    proxy may sound complex or even criminal, it involves two
    simple, innocuous steps. First, an individual pays a private
    registration firm to claim a domain name on his behalf. See
    Information for Privacy and Proxy Service Providers, ICANN
    (Aug.           31,        2017),        available         at:
    https://www.icann.org/resources/pages/pp-services-2017-08-
    31-en. Second, the firm registers that domain with ICANN,
    entering its own contact information, rather than that of the
    individual who will use the domain. See
    id. If the Act
    outlawed this popular practice, many thousands of individuals
    might face criminal penalties.
    Although the Ninth Circuit has hypothesized that proxy
    registration “for the purpose of concealing the actual
    registrant’s identity would constitute ‘material falsification,’”
    we respectfully disagree. United States v. Kilbride, 
    584 F.3d 1240
    , 1259 (9th Cir. 2009). True, many domain-name owners
    undoubtedly embrace proxy registration because it protects
    their privacy. But the Act makes it illegal to “falsif[y] the
    identity of the actual registrant,” § 1037(a)(4) (emphasis
    added), and nowhere suggests that the registrant must serve as
    18
    the day-to-day owner of a domain. And, given that ICANN’s
    rules expressly permit proxies to enter their own contact
    information when claiming a domain name on someone else’s
    behalf, we struggle to see how proxy registration reflects
    “material falsifi[cation].” § 1037(a)(4); see also Dressler v.
    Busch Entm’t Corp., 
    143 F.3d 778
    , 781 (3d Cir. 1998)
    (defining “falsify” as “to engage in misrepresentation or
    distortion”).
    Instead, § 1037(a)(4) zeroes in on “registrant[s]”—
    whether day-to-day domain users or their proxies—who claim
    a domain using contact information that is not their own.6 This
    prohibition reflects ICANN’s longstanding rules, which
    mandate that a registrant disclose its contact information when
    signing up for a domain name. FAQ: Domain Name Registrant
    Contact      Information,    ICANN        (Feb.     25,   2012),
    https://www.icann.org/resources/pages/faqs-f0-2012-02-25-
    en. Like its sister provision, § 1037(a)(4) therefore ensures
    that recipients retain some way to communicate with the
    senders of commercial emails, either by replying directly or by
    contacting a proxy, without compelling senders to share who
    they are and where they are from with everyone they contact.
    6
    Although courts and commentators typically describe
    § 1037(a)(4) as the domain-name spamming provision, that
    provision also makes it illegal to register email addresses using
    false information. Neither the parties nor Amicus identify any
    reason to treat registration of domain names and email
    addresses differently.
    19
    b)     Constitutional avoidance
    A contrary construction of §§ 1037(a)(3) and (a)(4)
    would raise serious constitutional concerns. Though “the
    overbreadth doctrine does not apply to commercial speech,”
    Vill. of Hoffman Estates v. Flipside, Hoffman Estates, Inc., 
    455 U.S. 489
    , 497 (1982), restrictions on an author’s ability to
    “remain anonymous” nonetheless implicate “the freedom of
    speech protected by the First Amendment,” McIntyre v. Ohio
    Elections Comm’n, 
    514 U.S. 334
    , 342 (1995). In the context
    of political speech, for example, the Supreme Court has long
    recognized that anonymity advances the First Amendment’s
    core values: It enables “[p]ersecuted groups . . . to criticize
    oppressive practices,” empowers “writer[s] who may be
    personally unpopular to ensure that readers will not prejudge
    [their] message[s],” and encourages dissidents to voice their
    “conscience without fear of retaliation.” 
    McIntyre, 514 U.S. at 342
    –43 (first alteration in original) (quoting Talley v.
    California, 
    362 U.S. 60
    , 64–65 (1960)).
    Whether and to what extent the First Amendment
    shields speakers who share commercial messages
    anonymously remains unsettled, but we see no need to wade
    into that quagmire today. Cf. Sorrell v. IMS Health Inc., 
    564 U.S. 552
    , 567 (2011) (recognizing that “a great deal of vital
    expression” results “from an economic motive”).
    Understanding the Act narrowly, as limited to false assertions
    in contexts where recipients expect accuracy, dispels the
    constitutional concerns that would otherwise accompany
    Amicus’s approach. See 44 Liquormart, Inc. v. Rhode Island,
    20
    
    517 U.S. 484
    , 496 (1996) (observing that the First Amendment
    protects “the dissemination of truthful and nonmisleading
    commercial messages” (emphasis added)).
    c)     Amicus’s arguments
    Notwithstanding its excellent advocacy, Amicus offers
    an interpretation of the interaction between the Act’s
    substantive provisions, §§ 1037(a)(3) and (a)(4), and its
    definitions
    , id. § 1037(d), with
    which we ultimately cannot
    agree. Boiled down to their essence, (a)(3) and (a)(4) prohibit
    commercial emailers from “materially falsif[ying]” header or
    domain name information.
    Id. But Amicus urges
    that the
    definition elaborated at § 1037(d)(2) does not just explain what
    the word “materially” means; instead, it replaces the
    “materially falsified” term altogether. Should that reading
    prevail, §§ 1037(a)(3) and (a)(4) would make it a crime to
    share commercial emails with header or registration
    information that “conceal” the “identi[ty]” or “locat[ion]” of
    the sender.
    Id. § 1037(d)(2). That
    would cast a pall over proxy
    registration, anonymous emails, and the other commonplace
    conduct discussed above.
    We conclude that this capacious interpretation is
    incompatible with the Act’s text and structure. Most
    important, understanding § 1037(d)(2) as modifying the
    “materially falsifies” term would render the verb “falsifies”
    superfluous, a disfavored and here unnecessary outcome. See
    Corley v. United States, 
    556 U.S. 303
    , 314 (2009). It would be
    equally difficult to square with § 1037(d)’s structure. That
    21
    subsection defines specific terms, set off in a distinct typeface,
    including “loss,” (d)(1), “multiple,” (d)(3), and “materially,”
    (d)(2). By so designating the term “materially,” and not the
    term “materially falsifies,” Congress sent a strong signal that
    (d)(2)’s definition modifies that word alone.
    Should any doubt remain, a comparison between
    § 1037(d)(2) and its civil counterpart confirms our conclusion.
    In 15 U.S.C. § 7704(a)(1), Congress authorized civil suits
    against senders who dispatch “materially false” or “materially
    misleading” emails. The drafters went on to articulate a series
    of definitions, including the following:
    [T]he term “materially”, when used with respect
    to false or misleading header information,
    includes the alteration or concealment of header
    information in a manner that would impair the
    ability of an Internet access service processing
    the message on behalf of a recipient, a person
    alleging a violation of this section, or a law
    enforcement agency to identify, locate, or
    respond to a person who initiated the electronic
    mail message or to investigate the alleged
    violation, or the ability of a recipient of the
    message to respond to a person who initiated the
    electronic message.
    Id. § 7704(a)(6). If
    this language seems familiar, that is
    because it tracks § 1037(d)(2) almost word for word. Indeed,
    the only meaningful difference is that § 7704(a)(6) leaves no
    22
    doubt that it modifies the word “materially,” not the term
    “materially false.” We see little reason to distinguish
    § 1037(d)(2) and § 7704(a)(6), and good reason to read them
    in parallel, given that Congress is unlikely to have intended to
    enact a criminal provision that sweeps more broadly than its
    civil analogue. See United States v. McKie, 
    112 F.3d 626
    , 632
    (3d Cir. 1997) (recognizing that our normal practice is to
    “interpret criminal statutes strictly”).
    The bottom line is that we decline Amicus’s invitation
    to construe §§ 1037(a)(3) and (a)(4) as requiring that
    commercial emailers adhere to an anti-anonymity principle.
    Instead, we embrace a narrow, norms-based reading that
    reflects the Act’s text. Having traced the boundaries of the
    Act’s criminal provisions, and having found this unfamiliar
    territory to be smaller and less dangerous than it may first
    appear, we are now equipped to answer the categorical
    question at the heart of this appeal.
    3.     Why §§ 1037(a)(3) and (a)(4) Involve
    Deceit
    With a definition of deceit in mind, and a map of the
    CAN-SPAM Act in view, all that remains is to decide whether
    the prohibitions on false header and domain name spamming
    “necessarily entail” deceit.7 
    Kawashima, 565 U.S. at 484
    . In
    7
    That Rad was convicted of conspiring to violate
    §§ 1037(a)(3) and (a)(4), rather than substantive violations of
    those provisions, does not alter our analysis of this element.
    Because “[c]onspiracy to commit an aggravated felony is itself
    23
    applying the categorical approach, we “presume that [Rad’s]
    conviction ‘rested upon [nothing] more than the least of th[e]
    acts’ criminalized, and then determine whether even those acts
    are encompassed by the generic federal offense.” Moncrieffe
    v. Holder, 
    569 U.S. 184
    , 190–91 (2013) (quoting Johnson v.
    United States, 
    559 U.S. 133
    , 137 (2010)) (second and third
    alteration in original). As it happens, our adoption of a norms-
    based reading of the Act requires that we resolve this issue in
    DHS’s favor.
    To see why, a brief review of the Supreme Court’s
    decision in Kawashima is essential. That case centered on 26
    U.S.C. § 7206(1), a provision that makes it illegal to insert
    false statements in a tax return. To prove a violation of
    § 7206(1), the government must establish “that the document
    in question was false as to a material matter, that the defendant
    did not believe the document to be true and correct as to every
    material matter, and that he acted willfully with the specific
    intent to violate the law.” 
    Kawashima, 565 U.S. at 483
    .
    Because a defendant cannot be convicted without “knowingly
    and willfully submitt[ing] a tax return that [i]s false as to a
    material matter,” the Court held that § 7206(1) embodies
    deceit.
    Id. at 484
    .
    an aggravated felony,” we “proceed as though [the non-
    citizen] had been convicted of the substantive offense . . .
    though in fact he [was convicted of] conspiracy to commit that
    offense.” Tran v. Gonzales, 
    414 F.3d 464
    , 468 n.3 (3d Cir.
    2005) (citing 8 U.S.C. § 1101(a)(43)(U)).
    24
    The same logic extends to §§ 1037(a)(3) and (a)(4). In
    Kawashima, the relevant offense concerned the entry of false
    information in a tax return, a document that ordinarily contains
    truthful statements. Here, likewise, the Act targets senders
    who falsify email headers and domain name registration
    entries, both contexts where consumers expect accuracy.
    When it comes to § 1037(a)(3), for example, recipients
    presume that header information reflects a sender’s email
    address. Any deviation from that norm risks giving readers “a
    false impression” as to a message’s origin. 
    Valansi, 278 F.3d at 209
    (internal quotation marks omitted); see also 
    Kawashima, 565 U.S. at 484
    (classifying “falsification” as a form of
    “deceit”). And when it comes to § 1037(a)(4), ICANN’s
    longstanding rules mandate accurate disclosure of a
    registrant’s contact information.      In that context, too,
    falsification tends to cause recipients, investigators, and
    internet service providers “to believe what is false.” 
    Valansi, 278 F.3d at 211
    . We therefore conclude that, like the provision
    at issue in Kawashima, §§ 1037(a)(3) and (a)(4) necessarily
    entail deceit.
    Neither of Amicus’s counterarguments convinces us
    otherwise. Its main contention is that many types of conduct
    contravene the CAN-SPAM Act without implicating deceit.
    What unites Amicus’s examples is that they assume that any
    mismatch between a commercial emailer’s address and his true
    identity triggers liability under § 1037(a)(3). But, as we
    explained already, no matter whether a message comes from a
    25
    private, vague, or whimsical address, the sender remains safe
    from prosecution unless he manipulates the email’s header.8
    This point is best illustrated by Kilbride, a CAN-SPAM
    Act prosecution that Amicus argues did not feature fraud or
    deceit. The Kilbride defendants altered their emails’ headers
    by “tak[ing] the user name of the person receiving the email
    and put[ting] it in the user name space of the return path.”
    United States v. Kilbride, 
    507 F. Supp. 2d 1051
    , 1062 (D. Ariz.
    2007). For example, if the defendants sent an email “using the
    domain name ‘shouldertricks.com’ and [if] the email was
    8
    A related issue—albeit one that neither the parties nor
    Amicus explore—is whether providing ICANN with contact
    information that many observers will recognize as false
    qualifies as deceit. In theory, for instance, a domain registrant
    could list her mailing address as Mars, Atlantis, or El Dorado.
    These examples may well involve material falsification within
    the meaning of the CAN-SPAM Act, given that the use of a
    false address makes it more difficult for investigators to locate
    the sender. See 18 U.S.C. § 1037(d)(2). But even these
    hypotheticals entail deceit. While listing one’s home address
    as Mars may come across as obviously untrue to an average
    adult, it will still “giv[e] a false impression” to children and the
    credulous. 
    Valansi, 278 F.3d at 209
    . And Kawashima
    implicitly rejected a parallel hypothetical: A conceivable way
    of falsifying a tax return would be to include an imaginary
    number or a figure with an impossible number of digits; yet
    this possibility failed to prevent the Supreme Court from
    classifying § 7206(1) as a crime that categorically entails
    deceit. See 
    Kawashima, 565 U.S. at 483
    –84. We follow the
    same approach here.
    26
    received by an individual with the email address of
    ‘trresa@aol.com,’ [the] program would . . . show a return path
    for the email of ‘trresa@shouldertricks.com.’”
    Id. Amicus makes much
    of Kilbride because, as DHS admits, “[n]o
    reasonable recipient would have been misled into thinking he
    sent himself [emails].” Dep’t’s Supp. Br. at 25. But recipients
    (or, as is more likely, law enforcement investigators) may well
    have been misled into thinking the messages originated from
    the account displayed in the headers. That constitutes deceit.
    Amicus’s fallback argument draws on the CAN-SPAM
    Act’s larger structure.       In the subsection immediately
    preceding §§ 1037(a)(3) and (a)(4), Congress made it a crime
    “to relay or retransmit” commercial emails “with the intent to
    deceive or mislead recipients . . . as to the origin of such
    messages.” 18 U.S.C. § 1037(a)(2). According to Amicus, the
    drafters’ use of the verb “deceive” in an adjacent provision
    establishes that the “materially falsifies” element cannot be
    coextensive with deceit. See Russello v. United States, 
    464 U.S. 16
    , 23 (1983). We agree that the juxtaposition of
    §§ 1037(a)(3) and (a)(4), on one hand, and (a)(2), on the other,
    reveals that “falsifi[cation]” and “decei[t]” are not identical.
    That provides little help to Rad, however, because the Act
    reflects that §§ 1037(a)(3) and (a)(4) focus more narrowly than
    (a)(2), not more broadly. Unlike their sister provision, the
    prohibitions on header and domain name spamming include
    the limiting adverb “materially.” §§ 1037(a)(3), (a)(4). They
    also hinge on “falsification,”
    id., and therefore exclude
    other
    ways of deceiving others, such as “concealment or cheating,”
    
    Kawashima, 565 U.S. at 484
    . So, while the Act’s structure
    27
    suggests that §§ 1037(a)(3) and (a)(4) may not criminalize all
    deceitful conduct, it confirms that the only conduct those
    provisions prohibit involves deceit.
    In the end, our narrow, norms-based reading of
    §§ 1037(a)(3) and (a)(4) turns out to be decisive.9 Because the
    Act targets false statements made in contexts where internet
    users expect accuracy, even the least culpable violations entail
    deceit. We thus affirm the Board’s judgment that Rad’s
    offenses fulfill 8 U.S.C. § 1101(a)(43)(M)(i)’s fraud or deceit
    requirement. That does not end our inquiry, however, because
    DHS also bears the burden of showing that Rad’s crimes reflect
    over $10,000 in victim losses. To that subject, we now turn.
    9
    We acknowledge that our reading diverges from the
    Board’s. But the Board’s interpretation, which construes the
    Act’s interstate commerce element as including a mens rea
    requirement, conflicts with well-settled interpretative
    principles. See Torres v. Lynch, 
    136 S. Ct. 1619
    , 1631 (2016)
    (“[C]ourts have routinely held that a criminal defendant need
    not know of a federal crime’s interstate commerce connection
    to be found guilty.”). And, “[a]lthough we give Chevron
    deference to the [Board]’s interpretation of the aggravated
    felony provisions of the INA if we determine that the statute is
    ambiguous,” the Board “is not entitled to Chevron deference
    as to whether a particular federal criminal offense is an
    aggravated felony.” Bobb v. Att’y Gen., 
    458 F.3d 213
    , 217 n.4
    (3d Cir. 2006).
    28
    B.     The Victim Loss Element
    The final question we confront is whether Rad’s crimes
    inflicted victim losses that exceed the statutory threshold.
    Unlike the categorical approach applied above, our evaluation
    of this element depends on “the specific way in which an
    offender committed the crime” and we therefore retain
    authority to consider any “sentencing-related material[]” that
    sheds light on Rad’s conduct. Fan 
    Wang, 898 F.3d at 349
    –50
    (quoting 
    Nijhawan, 557 U.S. at 42
    ). In reviewing the Board’s
    analysis of that material, we are bound by one of administrative
    law’s most fundamental principles: We must judge an
    agency’s decision “solely [on] the grounds [it] invoked.” Dia
    v. Ashcroft, 
    353 F.3d 228
    , 241 (3d Cir. 2003) (quoting SEC v.
    Chenery Corp., 
    332 U.S. 194
    , 196 (1947)).10 Because the
    challenged order overlooks crucial differences between
    sentencing hearings and immigration proceedings, we cannot
    adopt the Board’s reasoning. Below, we catalog the problems
    with its analysis, and then explain our decision to give DHS
    one last chance to make its case.
    1.     Where the Challenged Order Errs
    To understand why remand is required, one need look
    no further than the Board’s order. Rather than examining
    evidence from Rad’s sentencing hearing, the agency fixated on
    10
    “Where, as here, the B[oard] issues a written decision
    on the merits, we review its decision, not that of the IJ.”
    Moreno v. Att’y Gen., 
    887 F.3d 160
    , 163 (3d Cir. 2018)
    (internal quotation marks omitted).
    29
    the outcome of that proceeding. Working backwards from the
    thirty-five month sentence the District Court imposed for
    Count I, the Board surmised that the Court must have “added
    at least 6 levels based on victim loss—a determination that
    would have required the court to assess the loss at greater than
    $40,000.” A.R. 5. Otherwise, the Board reasoned, it would
    have been “mathematically impossible” for the Court to
    sentence Rad to as many months in prison as it did.
    Id. Having inferred that
    the District Court found Rad responsible for over
    $10,000 in losses under the Sentencing Guidelines, the Board
    presumed it could do the same under the INA. What underlies
    this result is the premise that loss determinations follow the
    same rules no matter whether they occur in the course of an
    immigration proceeding or a sentencing hearing.
    But that premise is fundamentally flawed. Rather than
    codifying similar standards for calculating losses, the
    Guidelines and INA prescribe frameworks that differ in almost
    every respect: They require that losses be connected to
    different types of conduct, elaborate different tests for deciding
    when an offender’s gains serve as a proxy for victims’ losses,
    and hold the government to different burdens of proof. See
    
    Singh, 677 F.3d at 511
    (describing the Guidelines and INA as
    “apples and oranges”). We outline these distinctions below,
    and, in doing so, lay bare three defects in the Board’s
    reasoning.
    30
    a)     Whether Losses Must be Tied to
    Convicted Conduct
    One way that loss determinations under the Guidelines
    and the INA diverge is that they train on different kinds of
    conduct. For sentencing purposes, a district court may review
    losses resulting from any “relevant conduct,” which “need not
    be admitted, charged in the indictment, or proven to a jury.”
    Alaka v. Att’y Gen., 
    456 F.3d 88
    , 108 (3d Cir. 2006); see
    U.S.S.G. § 1b1.3(a); United States v. Payano, 
    930 F.3d 186
    ,
    198 (3d Cir. 2019) (“[A] sentencing court possesses great
    discretion in the conduct it may consider . . . even if the
    conduct was not proven at trial[.]”). For immigration purposes,
    however, the agency must “focus narrowly on the loss amounts
    that are particularly tethered to convicted counts.”11 
    Alaka, 456 F.3d at 107
    ; see Knutsen v. Gonzales, 
    429 F.3d 733
    , 736–
    37 (7th Cir. 2005) (explaining that the “plain language” of the
    INA “forecloses inclusion of losses stemming from
    unconvicted offenses”). And even then, in contrast to the
    Guidelines, see 
    Singh, 677 F.3d at 511
    –12, the amounts must
    reflect actual and not merely intended losses, at least in the case
    11
    To be clear, while the Board cannot consider losses
    stemming from unconvicted conduct when analyzing
    § 1101(a)(43)(M)(i), our decision today does not prevent the
    agency from reviewing that conduct when deciding whether to
    grant discretionary relief, such as cancellation of removal, see
    id. § 1229b(b)(1). See
    In re C-V-T-, 22 I. & N. Dec. 7, 11–12
    (BIA 1998) (empowering IJs to account for the “nature,
    recency, and seriousness” of a noncitizen’s crimes when
    determining whether to afford discretionary relief).
    31
    of substantive offenses, see Section III.B.2 infra (addressing
    conspiracy and attempt offenses). To visualize the relationship
    between these standards, imagine two concentric circles: The
    INA, the inner circle, covers actual losses tied to the convicted
    conduct itself, while the Guidelines, the outer circle,
    encompasses both actual and intended losses from convicted
    conduct and all other related conduct.
    This case illustrates that distinction. At its core, the
    Board’s loss analysis centers on the allegations that Rad
    conspired to “pump” the price of penny stocks by misleading
    investors and then “dump” his shares of those stocks at a profit.
    A.R. 4–5. But most of the indictment’s counts feature CAN-
    SPAM Act charges, and only one, the conspiracy-to-commit-
    securities-fraud count, alleges that Rad duped investors into
    buying stocks that later declined in value. And, although the
    Board presumed Rad was guilty of securities fraud, the verdict
    form reveals that the jury declined to convict Rad of that
    charge. Thus, the agency’s loss analysis rests on the mistaken
    assumption that the District Court found Rad guilty of
    securities fraud, and that victim losses are attributable to him
    on that basis.
    That error would make little difference if the Guidelines
    governed. In that scenario, the Board could easily characterize
    the unconvicted aspects of the pump-and-dump scheme as
    “related” to Rad’s CAN-SPAM Act convictions. Id.; see
    U.S.S.G. § 1B1.3(a) (defining as related conduct “all acts and
    omissions . . . by the defendant . . . that occurred during the
    commission of the defense of conviction”). Under the INA,
    32
    however, the agency can only consider losses stemming from
    the pump-and-dump scheme if that scheme embodies the
    “specific way” Rad committed the CAN-SPAM Act
    conspiracy counts, 
    Nijhawan, 557 U.S. at 34
    , or if a “direct
    link” ties the conduct underlying those counts to investors’
    losses, Fan 
    Wang, 898 F.3d at 351
    . It could be the case, for
    example, that Rad’s use of false headers and domain names
    enabled him to reach more investors or earn greater trust from
    the investors he did reach, prompting them to purchase stocks
    that ultimately declined in value. Whatever the connection
    between Rad’s CAN-SPAM Act offenses and investor losses,
    however, the challenged order omits any discussion of it.
    Whether any victim losses are “particularly tethered” to Rad’s
    convictions is thus an issue we must leave for the BIA to
    resolve in the first instance. 
    Alaka, 456 F.3d at 107
    .
    b)     How an Offender’s Gains Affect
    the Loss Calculation
    Another difference between sentencing hearings and
    immigration proceedings is the role an offender’s gains play in
    the loss determination. The Guidelines make clear that when
    “there is a loss but it reasonably cannot be determined,” a
    district court may increase the offense level based on “the gain
    that resulted from the offense.” U.S.S.G. § 2B1.1, cmt. n.3(b).
    The relevant INA section, by contrast, trains on “loss to the
    victim or victims,” 8 U.S.C. § 1101(a)(43)(M)(i), and makes
    33
    no provision for the agency to treat gains and losses as
    interchangeable.12
    This is not to say that the Board may never use an
    offender’s gains to support the loss element. In many cases, a
    defendant’s earnings will provide powerful circumstantial
    evidence of victim loss.13 In a fraud case, for instance, DHS
    may be able to show the statutory threshold is satisfied by using
    the defendant’s commission percentage to estimate the volume
    of fraudulent sales. As this example attests, DHS can establish
    the loss element without specifically identifying a victim or
    12
    The Board’s decision does not purport to interpret the
    INA’s loss element, and, in any event, we refuse to afford
    Chevron deference to unpublished Board decisions. See Mahn
    v. Att’y Gen., 
    767 F.3d 170
    , 173 (3d Cir. 2014) (“We join our
    sister circuits in concluding that unpublished, single-member
    B[oard] decisions are not entitled to Chevron deference.”).
    13
    In this respect, the INA resembles a previous version
    of the Guidelines, which did not authorize courts to treat gains
    as a substitute for losses. See United States v. Hoffecker, 
    530 F.3d 137
    , 197 (3d Cir. 2008) (“The court need only make a
    reasonable estimate of the loss, given the available
    information.”) (quoting U.S.S.G. § 2F1.1, cmt. 8 (1997), a
    now-deleted subsection). Under that version of the Guidelines,
    the question was whether “some logical relationship [links] the
    victim’s loss and the defendant’s gain so that the latter can
    reasonably serve as a surrogate for the former.” United States
    v. Dickler, 
    64 F.3d 818
    , 826 (3d Cir. 1995). We read the INA
    as requiring the agency to answer a similar question whenever
    it uses an offender’s gains as a proxy for victim losses.
    34
    victims; all the statutory text requires is that victims exist, and
    that they have collectively lost over $10,000. See 8 U.S.C.
    § 1101(a)(43)(M)(i).
    What is fatal to the challenged order is not that the
    agency used gains to estimate losses, but that it simply equated
    them, without evaluating how, if at all, Rad’s earnings relate to
    investor harms. And, contrary to DHS’s suggestion, the
    District Court’s sentencing decision cannot fill the gap left by
    the agency’s missing analysis. Considering that the Guidelines
    leave open the possibility that the District Court elevated Rad’s
    offense level without calculating the losses attributable to his
    conduct, and that the Probation Office urged that approach, we
    have no assurance that the Court found Rad’s crimes to have
    caused over $10,000 in losses. Ultimately, then, the Board’s
    failure to substantiate any relationship between Rad’s profits
    and investors’ injuries supplies a second ground on which to
    disapprove the challenged order.
    c)     Which Burden of Proof Governs
    A third distinction between the Guidelines and the INA
    is that they articulate different burdens of proof. While a
    preponderance-of-the-evidence standard applies at sentencing,
    see United States v. Fisher, 
    502 F.3d 293
    , 305 (3d Cir. 2007),
    a clear-and-convincing evidence standard governs removal
    proceedings, see 
    Kiareldeen, 273 F.3d at 553
    . Given that the
    District Court analyzed the loss issue under a different and less
    demanding burden of proof, the agency would have needed to
    perform an independent review of the evidence to confirm that
    35
    Rad’s crimes inflicted harm. See 
    Nijhawan, 557 U.S. at 42
    (directing the Board to “assess findings made at sentencing
    ‘with an eye . . . to the burden of proof of employed’”) (quoting
    In re Babaisakov, 24 I. & N. Dec. 306, 319 (2007)). Neither
    the Board nor the IJ did so. That provides us with yet another
    reason to reject the agency’s loss analysis.
    To sum up, whether a victim loss question implicates
    the Guidelines or the INA has sweeping consequences. It
    determines whether losses must be tethered to convicted
    conduct, dictates the role the offender’s gains play in the loss
    calculation, and decides the relevant burden of proof. Yet the
    challenged order glosses over these differences and instead
    treats the Guidelines and the INA as coextensive. This error
    infects almost every aspect of the agency’s analysis, from the
    conduct it examined to the standard it applied. Because we are
    bound to review what the Board did, not what it might have
    done, we have no choice but to vacate the challenged order.
    See 
    Dia, 353 F.3d at 241
    .
    2.     Why Remand Is Warranted
    All that remains is to decide whether to give the Board
    what would be a third chance to evaluate this element. When
    an agency has “had two opportunities to address the legal and
    factual issues” in a case, we normally refuse to “give it a third
    bite at th[e] apple.” Yusupov v. Att’y Gen., 
    650 F.3d 968
    , 993
    (3d Cir. 2011) (quoting Zhu v. Gonzales, 
    493 F.3d 588
    , 602
    (5th Cir. 2007)). That is especially true where, as here, the
    Board failed to meaningfully revise its reasoning after the first
    36
    remand. Though DHS’s motion to remand highlighted
    controlling cases that the initial order overlooked, including an
    opinion that emphasizes the disjunction between the INA and
    the Guidelines, see 
    Singh, 677 F.3d at 511
    , the agency persisted
    in ignoring those authorities. Should this troubling trend
    continue, we will have no choice but to eschew remand and
    instead direct the Board to reject DHS’s request to remove Rad.
    See, e.g., 
    Yusupov, 650 F.3d at 993
    .
    In this case, however, we find ourselves compelled to
    give the Board one last opportunity to review the victim loss
    element. The Supreme Court announced in Florida Power &
    Light Co. v. Lorion that “if [an] agency has not considered all
    relevant factors . . . the proper course, except in rare
    circumstances, is to remand to the agency for additional
    investigation or explanation.” 
    470 U.S. 729
    , 744 (1985).
    Thus, we remand at this point not to permit the Board to retread
    the evidence and arguments it has twice encountered, but to
    allow it to examine an avenue for attributing victim losses that
    it never considered. See Kang v. Att’y Gen., 
    611 F.3d 157
    , 168
    (3d Cir. 2010) (explaining that we decline to remand only when
    “application of the correct legal principles to the record could
    lead . . . to [a single] conclusion” (emphasis omitted)).
    More specifically, Rad’s offenses may reflect intended,
    rather than actual, losses. As discussed above, the jury
    convicted Rad of conspiracy to violate §§ 1037(a)(3) and
    (a)(4), not substantive violations of those provisions. That
    matters because Rad’s crimes implicate 8 U.S.C.
    § 1101(a)(43)(U), which establishes that “an attempt or
    37
    conspiracy to commit” an offense under § 1101(a)(43)(M)
    counts as an aggravated felony. In the past, we have
    acknowledged that a question exists as to whether “intended
    loss” may “satisf[y] the loss requirement for attempts or
    conspiracies to commit a deceit offense under subparagraph
    (U),” but we have not had occasion to resolve the issue. 
    Singh, 677 F.3d at 511
    n.7.
    Today, we join the Second Circuit, Ninth Circuit, and
    Board in recognizing that a conspiracy or attempt to commit
    fraud or deceit involving over $10,000 in intended losses
    qualifies as an aggravated felony.14 See Li v. Ashcroft, 
    389 F.3d 892
    , 896 n.8 (9th Cir. 2004), overruled on other grounds
    by Nijhawan, 
    557 U.S. 29
    ; Ljutica v. Holder, 
    588 F.3d 119
    ,
    125–26 (2d Cir. 2009); In re S-I-K-, 24 I. & N. Dec. 324, 327
    (BIA 2007). This makes sense both as a textual matter and as
    a practical one. Read together, subsections M and U define an
    “offense” as conduct that “involves fraud or deceit in which the
    loss to the victim . . . exceeds $10,000,” and go on to clarify
    that “an attempt or conspiracy to commit” that “offense”
    constitutes    an      aggravated    felony.        8    U.S.C.
    14
    The Ninth Circuit also suggested that “potential” loss
    may satisfy 8 U.S.C. § 1101(a)(43)(U). 
    Li, 389 F.3d at 896
    n.8. Under our precedent, however, a conspiracy must feature
    “an intent to achieve a common illegal goal.” United States v.
    John-Baptiste, 
    747 F.3d 186
    , 204–05 (3d Cir. 2014) (emphasis
    added). Thus, a noncitizen cannot “conspir[e] to commit” an
    offense under § 1101(a)(43)(M)(i) unless he intends to commit
    a crime that would, if completed, result in over $10,000 in
    losses. § 1101(a)(43)(U).
    38
    §§ 1101(a)(43)(M)(i), (U). It follows that a conspiracy to
    inflict losses satisfies subsection U, even if it never produces
    harm. And, because many conspiracies involve no actual
    losses at all, a contrary conclusion would dramatically limit the
    scope of subsection U as applied to subsection M—a result
    Congress is unlikely to have intended. See United States v.
    Watkins, 
    339 F.3d 167
    , 178 (3d Cir. 2003) (“A conspiracy
    charge does not require proof of success in committing the
    offense[.]”).
    On remand, the Board must decide whether, in
    conspiring to violate §§ 1037(a)(3) and (a)(4), Rad intended to
    cause over $10,000 in investor losses. Perhaps Rad agreed to
    use false headers and domain names to evade spam filters,
    reach a larger audience, and induce more investors to purchase
    stocks he expected to plummet in value. Perhaps Rad meant
    for the false headers and domain names to confuse investors,
    prompting them to launch costly investigations. See, e.g., Tian
    v. Holder, 
    576 F.3d 890
    , 896 (8th Cir. 2009) (finding that
    expenses a victim incurred in investigating computer crimes
    satisfied the INA’s $10,000 loss requirement). Or perhaps not.
    We express no opinion as to the ultimate outcome and leave it
    to the agency to explore these and other possibilities on
    remand.
    IV.    Conclusion
    For the foregoing reasons, we grant the petition for
    review, vacate the Board’s removal order, and remand for
    39
    further consideration of whether Rad’s CAN-SPAM Act
    convictions reflect over $10,000 in intended losses.
    40
    

Document Info

Docket Number: 19-1404

Filed Date: 12/21/2020

Precedential Status: Precedential

Modified Date: 12/21/2020

Authorities (39)

United States v. Kilbride , 507 F. Supp. 2d 1051 ( 2007 )

Ljutica v. Holder , 588 F.3d 119 ( 2009 )

Son Duc Tran v. Alberto Gonzales, Attorney General of the ... , 414 F.3d 464 ( 2005 )

Saidou Dia v. John Ashcroft, Attorney General of the United ... , 353 F.3d 228 ( 2003 )

Kang v. Attorney General of US , 611 F.3d 157 ( 2010 )

Yusupov v. Attorney General of United States , 650 F.3d 968 ( 2011 )

olga-dressler-v-busch-entertainment-corporation-dba-sesame-place-sesame , 143 F.3d 778 ( 1998 )

Lek Berishaj v. John Ashcroft, Attorney General of the ... , 378 F.3d 314 ( 2004 )

Alvin Bobb v. Attorney General of the United States , 458 F.3d 213 ( 2006 )

United States v. Tammy Watkins Anissa Peoples , 339 F.3d 167 ( 2003 )

United States of America Government of the Virgin Islands v.... , 112 F.3d 626 ( 1997 )

United States v. Hoffecker , 530 F.3d 137 ( 2008 )

Singh v. Attorney General of the United States , 677 F.3d 503 ( 2012 )

hany-mahmoud-kiareldeen-v-john-ashcroft-attorney-general-immigration-and , 273 F.3d 542 ( 2001 )

Zhu v. Gonzales , 493 F.3d 588 ( 2007 )

Oyenike Alaka v. Attorney General of the United States ... , 456 F.3d 88 ( 2006 )

Elanith Valansi v. John Ashcroft, Attorney General of the ... , 278 F.3d 203 ( 2002 )

James v. Gonzales , 464 F.3d 505 ( 2006 )

United States v. Sidney J. Dickler, Richard R. Petrucci. ... , 64 F.3d 818 ( 1995 )

Patel v. Mukasey , 526 F.3d 800 ( 2008 )

View All Authorities »