FlawCheck Citator
Check how courts have cited this case. Use our free citator for the most current treatment.
No. 10799692
United States Court of Appeals for the Ninth Circuit

United States v. Motley

No. 10799692 · Decided February 24, 2026
No. 10799692 · Ninth Circuit · 2026 · FlawFinder last updated this page Apr. 2, 2026
Case Details
Court
United States Court of Appeals for the Ninth Circuit
Decided
February 24, 2026
Citation
No. 10799692
Disposition
See opinion text.
Full Opinion
FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, No. 23-3971 D.C. No. Plaintiff - Appellee, 2:17-cr-00774- FMO-1 v. TAMARA YVONNE MOTLEY, AKA Tamara Ogembe, AKA Tamara OPINION Motley-Ogembe, Defendant - Appellant. Appeal from the United States District Court for the Central District of California Stanley Blumenfeld, Jr., District Judge, Presiding Argued and Submitted September 17, 2025 Pasadena, California Filed February 24, 2026 Before: Richard R. Clifton, Jay S. Bybee, and Kenneth K. Lee, Circuit Judges. Opinion by Judge Bybee 2 USA V. MOTLEY SUMMARY* Criminal Law The panel vacated a portion of Tamara Motley’s sentence and remanded for resentencing in a case in which a jury convicted Motley of defrauding Medicare by submitting millions of dollars in false and fraudulent claims for durable medical equipment and related services. Motley’s underlying healthcare fraud was not in dispute. The sole question was whether Motley also committed aggravated identity theft under 18 U.S.C. § 1028A(a)(1) because the companies Motley used to submit the false claims were enrolled in Medicare under her relatives’ names, not her own. Aggravated identity theft carries a mandatory, consecutive two-year prison term if “during and in relation to” a predicate offense, a defendant “uses, without lawful authority, a means of identification of another person.” On the eve of trial, the Supreme Court decided Dubin v. United States, 599 U.S. 110 (2023). Dubin significantly narrowed § 1028A(a)(1) by holding that a “defendant’s misuse of another person’s means of identification” must be “at the crux of what makes the underlying offense criminal, rather than merely an ancillary feature of a billing method.” The panel held that Motley’s § 1028A(a)(1) conviction cannot stand because the government failed to advance a theory at trial that the use of her relatives’ names * This summary constitutes no part of the opinion of the court. It has been prepared by court staff for the convenience of the reader. USA V. MOTLEY 3 was “critical to the success” of the scheme and that the use itself was fraudulent or deceitful. COUNSEL Kristen A. Williams (argued), Assistant United States Attorney, Chief, Major Frauds Section; Julian L. Andre, David H. Chao, Assistant United States Attorneys; Lindsey G. Dotson, Assistant United States Attorney, Chief, Criminal Division; Joseph T. McNally, Acting United States Attorney; Office of the United States Attorney, United States Department of Justice, Los Angeles, California; for Plaintiff- Appellee. Ellis M. Johnston III (argued), Clarke Johnston Thorp & Rice PC, San Diego, California, for Defendant-Appellant. 4 USA V. MOTLEY OPINION BYBEE, Circuit Judge: Appellant Tamara Motley was convicted after a jury trial for defrauding Medicare by submitting millions of dollars in false and fraudulent claims for durable medical equipment and related services. Motley’s underlying healthcare fraud is not in dispute. The sole question is whether Motley also committed aggravated identity theft under 18 U.S.C. § 1028A(a)(1) because the companies Motley used to submit the false claims were enrolled in Medicare under her relatives’ names, not her own. Aggravated identity theft carries a mandatory, consecutive two-year prison term if “during and in relation to” a predicate offense, a defendant “uses, without lawful authority, a means of identification of another person.” 18 U.S.C. § 1028A(a)(1). On the eve of trial, the Supreme Court decided Dubin v. United States, 599 U.S. 110 (2023). Dubin significantly narrowed § 1028A(a)(1) by holding that a “defendant’s misuse of another person’s means of identification” must be “at the crux of what makes the underlying offense criminal, rather than merely an ancillary feature of a billing method.” Id. at 114. We hold that Motley’s § 1028A(a)(1) conviction cannot stand because the government failed to advance a theory at trial that the use of her relatives’ names was “critical to the success” of the scheme and that the use itself was fraudulent or deceitful. United States v. Parviz, 131 F.4th 966, 972 (9th Cir. 2025). We vacate that portion of her sentence and remand to the district court for resentencing. USA V. MOTLEY 5 I. BACKGROUND A. Factual Background Tamara Motley operated Action Medical Equipment and Supply, Inc. (Action) and Kaja Medical Equipment & Supply, Inc. (Kaja), two durable medical equipment (DME) companies enrolled as Medicare providers. Action was incorporated in the name of her mother, Beverly Muntz, while Kaja was incorporated in the name of her nephew, Bryant Brown. Neither played an active role in the management of the companies, nor was either implicated in the fraudulent scheme we describe below. Medicare permits DME supply companies, physicians, and other healthcare providers to seek reimbursement for covered services provided to eligible beneficiaries, typically individuals aged 65 or older or those with disabilities. To receive reimbursement, a DME supplier must enroll in Medicare and certify that it will comply with all rules and regulations, including not submitting false or fraudulent claims. Once enrolled, Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT) agreements allow suppliers to submit claims electronically and to receive payment directly to their business bank account. Electronic claims include, among other things, the beneficiary’s name and identifier, the billed item or service, the date of service, and the supplier’s identifying numbers. With the help of co-defendants Cynthia Marquez, the office manager, and Juan Murillo, a repair technician, Motley orchestrated a scheme to exploit the reimbursement system. The gist of the scheme was simple: Use patient information to submit claims for DME and related services for patients who did not need those items and services and often did not even receive them. 6 USA V. MOTLEY The scheme worked as follows. Motley recruited and paid illegal kickbacks to marketers who brought in patients. Using lists of eligible Medicare beneficiaries, marketers solicited patients, referred them to Action and Kaja, and collected their patient information. Many of these beneficiaries were elderly or non-English speakers. The marketers transported beneficiaries not to their regular physicians, but to complicit physicians who, after cursory examinations, would write prescriptions for medically unnecessary DME, including power wheelchairs and orthotics. At times, the physicians prescribed DME without even examining the beneficiaries; at other times, they simply wrote and signed blank prescriptions to be filled in later by Motley and others. The schemers would then deliver the medically unnecessary DME, whose value was often falsely inflated on delivery tickets and claims, to beneficiaries’ homes, where it would collect dust. If no DME was delivered, delivery tickets were created out of whole cloth. Motley and others, acting at her direction, would pick up these prescriptions from the physicians or marketers and, along with fake delivery tickets they generated, create documentation supporting the medical necessity and billing of the DME. Motley then directed Action and Kaja employees to bill Medicare for the medically unnecessary or wholly unprovided DME, and to “max out” the amount Medicare would cover. When Medicare switched from lump-sum reimbursements for power wheelchairs to a less lucrative monthly rental model in 2011, Motley adjusted her scheme. She transitioned to billing for unnecessary repair and replacement services. Drawing on the ready-made patient base, Action and Kaja employees cold-called prior recipients of wheelchairs, offered free maintenance or equipment, and USA V. MOTLEY 7 persuaded beneficiaries to undergo unnecessary repairs or replacements for their power wheelchairs. To the extent that any services were provided, Action and Kaja technicians made only brief house calls, typically doing little or no work beyond replacing a battery. During the house calls, it was evident that many beneficiaries did not use the wheelchairs or kept them outside their homes or in the garage. Even so, the beneficiaries would sign documents—often in English, despite speaking only Spanish—falsely stating that additional repair and replacement services had been performed. Using this documentation and beneficiary information, the schemers fabricated documentation to make it appear as if the services had been requested, were necessary, and had been performed. The cash poured in. In total, Action and Kaja submitted more than $24 million in Medicare claims between November 2006 and November 2016. Medicare paid about $13.1 million. To cash out, Motley wrote checks from the Action and Kaja bank accounts, payable to Marquez, Murillo, and others, with false memo lines purporting to cover legitimate business expenses. B. Indictment For this scheme, the government charged Motley, Marquez, and Murillo with one count of conspiracy to launder monetary instruments, 18 U.S.C. § 1956, and twenty counts of healthcare fraud, id. § 1347. The healthcare fraud counts corresponded to distinct fraudulent claims submitted by Action between February 2013 and July 2014 or by Kaja between March 2014 and May 2016. Motley and Marquez were also charged with two counts of aggravated identity theft, id. § 1028A, based on the use of the names of Beverly Muntz and Bryant Brown—the owners of Action and Kaja, 8 USA V. MOTLEY respectively—“during and in relation to” the healthcare fraud. Both co-defendants pled guilty before Motley’s trial; Marquez’s plea deal excluded the aggravated identity theft charge.1 Motley’s first trial ended in a mistrial;2 the second trial, at issue on appeal, began on June 20, 2023. C. Trial During a five-day trial, the government called twenty- eight witnesses, including investigators, former Action and Kaja employees, Medicare patients and their physicians, and members of the Medicare Compliance Team. The government also introduced documentary evidence, including Action’s and Kaja’s Medicare enrollment applications, EFT agreements, incorporation documents, claims records, financial records, and patient files. Extensive former employee testimony established that Motley was the effective manager and CEO at Action and Kaja, responsible for spearheading the fraud scheme. Four Medicare patients, one patient’s relative, and five physicians testified that the DME provided was not medically necessary, and that any repairs or replacement parts provided years later were likewise unnecessary. For example, one beneficiary testified that after receiving a power wheelchair he never used and did not need, two repairmen arrived 1 Marquez pleaded guilty to a two-count superseding indictment, which charged her with two counts of false statements affecting health care programs in violation of 18 U.S.C. § 1035(a)(2). Murillo pleaded guilty to conspiracy to launder monetary instruments in violation of 18 U.S.C. § 1956(h). 2 A jury trial was held from February 7 to February 16, 2023. Due to a dangerous and uncooperative juror, a hung jury resulted, and the district court declared a mistrial. USA V. MOTLEY 9 unannounced, and he signed several forms he did not understand. The evidence of the underlying fraud scheme and Motley’s central role in it is not disputed on appeal. At trial, the government sought to support the § 1028A(a)(1) charge through Motley’s use of the names of Muntz, her mother, and Brown, her nephew. A Medicare expert testified that to obtain a Medicare provider number and submit claims, the named owners must agree to comply with Medicare rules and regulations. The named owners—here, Muntz and Brown—certified, among other things, that they would “not submit claims for payment to Medicare knowing they were false or fraudulent or with deliberate ignorance or reckless disregard of their truth or falsity.” The expert further explained that Medicare operates largely on an “honor system” and relies on provider numbers to match claims with registered providers. Although Motley effectively managed Action and Kaja, and Muntz and Brown had minimal involvement, the Medicare enrollment paperwork listed only Muntz and Brown as having any official ownership or managerial roles in the companies. Neither enrollment application identified Motley, nor did she appear in any supplemental applications updating ownership and managerial information. Documentary evidence established that Muntz incorporated Action in April 2006, and Brown incorporated Kaja in March 2011. Both Muntz and Brown had signed EFT authorization agreements, directing Medicare’s reimbursements to business bank accounts, both of which listed Motley as an authorized signatory. Finally, powers of attorney showed that Muntz and Brown had granted Motley full authority to run the companies. 10 USA V. MOTLEY In short, the government’s trial evidence supporting the aggravated identity theft count rested on the fact that although Action and Kaja were legally owned, incorporated by, and enrolled in Medicare through Muntz and Brown, Motley effectively ran the companies. The government also emphasized that both powers of attorney and Medicare enrollment agreements require lawful use. There was no evidence before the jury, however, that Motley lacked permission or authorization from Muntz or Brown to submit claims or operate the companies; no evidence that Motley, rather than Muntz or Brown, was responsible for enrollment; no evidence as to why the companies were enrolled under her relatives’ names; and no evidence that Motley could not have enrolled in her own name or needed their names to submit claims. D. Jury Verdict and Sentence The jury convicted Motley on all counts. The district court sentenced Motley to 180 months in custody, including 24 consecutive months, the statutory minimum, on the aggravated identity theft counts. The court also ordered Motley to pay restitution of $13,097,237.10 to Medicare and $10,185.70 to Medi-Cal. Motley timely appealed her convictions on the aggravated identity theft counts only. II. DISCUSSION Motley submits that the government presented insufficient evidence to show that the use of her relatives’ names was at the “crux” of the underlying healthcare fraud. We agree. A. Standard of Review The parties dispute the standard of review for this appeal. A Rule 29 sufficiency-of-the-evidence claim is typically USA V. MOTLEY 11 reviewed de novo. United States v. Grovo, 826 F.3d 1207, 1213 (9th Cir. 2016); United States v. Sullivan, 522 F.3d 967, 974 (9th Cir. 2008) (per curiam). But a Rule 29 motion that is not made or not properly preserved is reviewed for plain error. United States v. Pelisamen, 641 F.3d 399, 409 & n.6 (9th Cir. 2011). Generally, a Rule 29 motion made at the close of the government’s evidence must be renewed if the defense presents additional evidence, or else plain-error review applies. Id. at 409 n.6. But we have also applied de novo review where the defendant moves for acquittal at the close of the government’s evidence and does not renew the motion after presenting additional evidence. United States v. Stewart, 420 F.3d 1007, 1012, 1014 (9th Cir. 2005); United States v. Carranza, 289 F.3d 634, 641 (9th Cir. 2002). In United States v. Esquivel-Ortega, 484 F.3d 1221 (9th Cir. 2007), we established a futility exception to the renewal requirement. There, after moving for judgment of acquittal at the close of the government’s case, the defendant introduced minimal additional evidence, including a voice exemplar and an audio tape, which were played for the jury. Id. at 1224. The defense did not then renew the motion at the close of all evidence; even so, we applied de novo review because: “Given the nature of the evidence, and the fact that the court had denied Esquivel’s motion for acquittal only a few moments earlier, requiring Esquivel to renew his motion at that point would have been ‘an empty ritual.’” Id. at 1225 (citation omitted). Here, after the government rested its case on the final day of trial, defense counsel moved for a judgment of acquittal and confirmed that the record reflected the Rule 29 motion. Defense counsel then presented a final witness related to handwriting analysis. Defense counsel did not renew its motion for judgment of acquittal after its last witness. A 12 USA V. MOTLEY renewed motion would have been the better practice, eliminating any question whether the motion was preserved. Nonetheless, as in Esquivel-Ortega, we think Motley did enough to preserve her objection. After making the Rule 29 motion, the defense’s additional evidence was minor and almost certainly would not have altered the district court’s assessment of the sufficiency of the evidence. Because “it would have been futile for” Motley “to renew h[er] motion following” the final testimony, we review de novo. Id. “In any event, the distinction is largely academic, given that, whether review is de novo or for plain error, we must give great deference to the jury verdict and ‘must affirm if any rational trier of fact could have found the evidence sufficient.’” Pelisamen, 641 F.3d 409 n.6 (citation omitted). In this context, plain error review is only “theoretically more stringent than the standard for a preserved claim.” United States v. Flyer, 633 F.3d 911, 917 (9th Cir. 2011) (internal quotation marks omitted). Review of a sufficiency-of-the-evidence challenge requires us “to determine whether ‘after viewing the evidence in the light most favorable to the prosecution, any rational trier of fact could have found the essential elements of the crime beyond a reasonable doubt.’” United States v. Nevils, 598 F.3d 1158, 1163–64 (9th Cir. 2010) (en banc) (quoting Jackson v. Virginia, 443 U.S. 307, 319 (1979)). To the extent any questions of statutory interpretation are disguised as sufficiency-of-the-evidence arguments, we review them de novo. United States v. Hong, 938 F.3d 1040, 1050 (9th Cir. 2019); United States v. Osuna-Alvarez, 788 F.3d 1183, 1185 (9th Cir. 2015) (per curiam). USA V. MOTLEY 13 B. Section 1028A(a)(1) and Dubin’s Crux Test The aggravated identity theft statute provides that “[w]hoever, during and in relation to” certain enumerated felonies, “knowingly transfers, possesses, or uses, without lawful authority, a means of identification of another person shall, in addition to the punishment provided for such felony, be sentenced to a term of imprisonment of 2 years.” 18 U.S.C. § 1028A(a)(1). Healthcare fraud—for which Motley was convicted—is a qualifying predicate felony. See id. § 1028A(c)(4). The only element of the § 1028A(a)(1) offense challenged on appeal is whether, in light of Dubin, Motley “use[d]” her relatives’ names (a means of identification) “during and in relation to” her healthcare fraud. The Supreme Court in Dubin established a new operative test for § 1028A(a)(1). 599 U.S. at 114. Recognizing that § 1028A(a)(1)’s broad statutory language could sweep in “virtually all cases where a defendant employs a means of identification to facilitate a crime,” the Supreme Court sought to cabin such expansive readings. Id. at 127. The defendant, David Dubin, submitted falsely elevated claims for reimbursement to Medicaid by overstating the qualifications of an employee who performed psychological testing on patients. Id. at 114. The government charged Dubin not only with healthcare fraud, 18 U.S.C. § 1347, but also with aggravated identity theft, § 1028A(a)(1), because the fraudulent bills included patients’ names and Medicaid reimbursement numbers. Id. at 114–15. The issue before the Court was whether Dubin “used” his patients’ means of identification “during and in relation to” his healthcare fraud. Id. at 116–17. 14 USA V. MOTLEY 1. Dubin’s Statutory and Contextual Analysis Dubin started with the statute’s text. Recognizing the elasticity of the terms “use” and “in relation to,” the Court noted that “[r]esort to context” would be “especially necessary” to determine their proper scope. Id. at 119. The Court first looked to the statute’s title: “Aggravated identity theft.” Id. at 120. The title, the Court observed, was not only “far more targeted” than neighboring statutes but was also set apart from the “identity fraud” statute. Id. at 121. From these contextual clues, the Court concluded that § 1028A must be “focused on identity theft specifically, rather than all fraud involving means of identification.” Id. The ordinary understanding of “identity theft,” not “garden- variety overbilling,” lies “at the core of § 1028A.” Id. at 122. The Court then applied the interpretative canon noscitur a sociis to § 1028A(a)(1)’s trio of operative verbs— “transfers,” “possesses,” and “uses.” See id. at 126. “Because ‘transfer’ and ‘possess’ channel ordinary identity theft . . . ‘uses’ should be read in a similar manner . . . .” Id. Drawing from dictionaries, the Court observed that “identity theft covers both when ‘someone steals personal information about and belonging to another . . . and uses the information to deceive others.’” Id. (second emphasis added) (quoting Identity theft, Black’s Law Dictionary 894 (11th ed. 2019)). The three verbs “capture various aspects of ‘classic identity theft.’” Id. (citation omitted). “Possess” and “transfer” connote theft, while “use” captures a different aspect of classic identity theft: that “involving fraud or deceit about identity.” Id. Finally, the Court sought guidance from § 1028A(a)(1)’s list of predicate offenses. Id. at 127–29. Some predicate crimes lack any statutory minimum, whereas § 1028A(a)(1) USA V. MOTLEY 15 carries a particularly harsh two-year minimum. Id. at 127. The government’s “boundless reading” risked “collaps[ing] the enhancement into the enhanced.” Id. at 128. Because almost any healthcare fraud involves some form of using another’s name, the Court cautioned against sweeping all these into § 1028A(a)(1) “independent of whether the name itself had anything to do with the fraudulent aspect of the offense.” Id. Instead, § 1028A(a)(1) “targets situations where the means of identification itself plays a key role— one that warrants a 2-year mandatory minimum.” Id. at 129 (emphasis added). Based on its contextual and statutory analysis, the Court concluded that to “use” another person’s means of identification “during and in relation to” a predicate offense under § 1028A(a)(1), a “defendant’s misuse of another person’s means of identification” must be “at the crux of what makes the underlying offense criminal, rather than merely an ancillary feature of a billing method.” Id. at 114. Dubin failed to meet this bar through the inclusion of a patient’s name on a Medicare reimbursement claim because that use “was not at the crux of what made the underlying overbilling fraudulent.” Id. at 132. Instead, “[t]he crux of the healthcare fraud was a misrepresentation about the qualifications of petitioner’s employee” and “[t]he patient’s name was an ancillary feature of the billing method employed.” Id. Two requirements animate Dubin’s crux test. First, Dubin equates the statutory term “use” with “misuse.” Id. at 114. This captures the Court’s repeated requirement that the “use” itself be “fraudulent” or “deceitful.” See, e.g., id. at 123, 126, 132. “When the underlying crime involves fraud or deceit,” the Court specified, the means of identification must be used “specifically in a fraudulent or deceitful 16 USA V. MOTLEY manner.” Id. at 117 (summarizing the petitioner’s “more targeted reading”). The Court likewise maintained that “identity theft is committed when a defendant uses the means of identification itself to defraud or deceive.” Id. at 123 (emphasis added). Read together, the Court’s warning against collapsing § 1028A(a)(1)’s enhancement into the predicate offense and its insistence that the use itself be fraudulent or deceitful make clear that the fraudulent or deceitful aspect of the identity use must be distinct from— and not duplicative of—the fraud in the underlying healthcare crime. The use of identifiers, in other words, must stand on its own as fraudulent or deceitful; it cannot be so considered simply because it is part of a broader fraudulent scheme. Otherwise, the enhancement would fail to meaningfully distinguish the aggravated-identity-theft charge. Second, for this misuse to be “at the crux of the criminality,” the means of identification specifically must be a “key mover” that carries out the fraud. Id. at 123. In causal terms, there must be “more than a causal relationship, such as ‘facilitation’ of the offense or being a but-for cause of its ‘success.’” Id. at 131 (citation omitted). Although the Court did not explicitly state how strong of a causal nexus is required for § 1028A(a)(1) liability to attach, we have acknowledged that the misuse of identity must be “critical to the success” of the underlying fraud. Parviz, 131 F.4th at 972. 2. Caselaw Pre-Dubin Before Dubin, our caselaw interpreting § 1028A(a)(1) pulled in two directions; Dubin disapproved of one in favor of the other. We first addressed the term “use” in § 1028A(a)(1) in United States v. Hong, 938 F.3d 1040 (9th USA V. MOTLEY 17 Cir. 2019). There, the defendant falsely claimed his massage treatments as Medicare-eligible physical therapy. Id. at 1043. We adopted the First and Sixth Circuit’s “narrow[] constru[ction]” of “use” in United States v. Berroa, 856 F.3d 141 (1st Cir. 2017) and United States v. Medlock, 792 F.3d 700 (6th Cir. 2015). Hong, 938 F.3d at 1050. In Berroa, the First Circuit held that physicians with fraudulent licenses who filled prescriptions had not “used” the patients’ identities under § 1028A(a)(1) because they had not “attempt[ed] to pass themselves off as the patients.” Berroa, 856 F.3d at 156. In Medlock, the Sixth Circuit established a similar rule. An ambulance service mischaracterized the medical necessity of stretchers on Medicare claims to obtain reimbursement. 792 F.3d at 703–04. The Sixth Circuit reversed the § 1028A(a)(1) convictions, finding that the defendants had not “use[d]” the names and Medicare identification numbers of beneficiaries by including them on the fraudulent claims. Id. at 708, 712. The defendants did not “attempt to pass themselves off as anyone other than themselves” and had only “misrepresented how and why the beneficiaries were transported.” Id. at 707. Hong drew from the First Circuit’s legislative-history analysis showing that identity theft always “involved the defendant’s use of personal information to pass him or herself off as another person, or the transfer of such information to a third party for use in a similar manner.” 938 F.3d at 1051 (quoting Berroa, 856 F.3d at 156). We then adopted the First Circuit’s rule that “use” under § 1028A(a)(1) “require[s] that the defendant attempt to pass him or herself off as another person or purport to take some other action on another person’s behalf.” Hong, 938 F.3d at 1051 (quoting Berroa, 856 F.3d at 156). Applying that rule to the facts in Hong, we held that because “[n]either Hong 18 USA V. MOTLEY nor the physical therapists ‘attempt[ed] to pass themselves off as the patients,’” “Hong did not ‘use’ the patients’ identities within the meaning of the aggravated identity theft statute.” 938 F.3d at 1051 (quoting Berroa, 856 F.3d at 156); see also id. at 1051 n.8 (noting that our sister circuits have affirmed § 1028A(a)(1) convictions of defendants that “purport[ed] to take some other action on another person’s behalf through impersonation or forgery” (alteration in original) (quotation marks and citations omitted)). Later that term, we applied Hong’s newly articulated standard in United States v. Gagarin, 950 F.3d 596 (9th Cir. 2020). The defendant had “purported to take action on behalf of her cousin” by forging her cousin’s signature to open a fraudulent life insurance policy as part of a scheme to collect advances. Id. at 603. We upheld the § 1028A(a)(1) conviction and distinguished the facts from Hong: By submitting the insurance application in her cousin’s name, the defendant had “‘attempt[ed] to pass [herself] off’ as her cousin through forgery and impersonation.” Id. at 604 (alteration in original) (quoting Hong, 938 F.3d at 1051). The defendant’s use of the signature “obscure[ed] her own role in the fraudulent application” and “was thus central to the fraud.” Id. Finally, in yet a third case that term, we confronted facts between Hong and Gagarin; the middle path we carved broadened Hong’s targeted rule. United States v. Harris, 983 F.3d 1125 (9th Cir. 2020). In Harris, the defendant submitted fraudulent claims to TRICARE. Id. at 1126. The defendant signed the claims in her own name but listed a speech pathologist as the provider even though no services were performed, and the pathologist had not authorized her to do so. Id. We found that neither Hong nor Gagarin “directly control[led] the outcome here”; instead, we USA V. MOTLEY 19 concluded that the defendant’s actions fell within the ambit of § 1028A(a)(1) even though she “did not try to pass herself off as [the speech pathologist] through forgery or impersonation.” Id. at 1127. To reach beyond Hong’s rule, we reasoned that “the statutory text does not suggest that ‘use’ ‘refers only to assuming an identity or passing oneself off as a particular person.’” Id. at 1128 (quoting United States v. Michael, 882 F.3d 624, 627 (6th Cir. 2018)). Instead, “[t]he salient point is whether the defendant used the means of identification to further or facilitate the health care fraud.” Id. (quoting Michael, 882 F.3d at 628) (internal quotation marks omitted). The broadened standard that Harris adopted—that to “use” means to “further or facilitate the health care fraud”— was the government’s position that the Supreme Court rejected in Dubin. See Dubin, 599 U.S. at 117, 131 (noting the government’s position as “use of [a] means of identification [that] ‘facilitates or furthers’ the predicate offense in some way” and holding that “being at the crux of the criminality requires more than . . . ‘facilitation’ of the offense”); see also id. at 118 (characterizing the government’s reading as “near limitless” and announcing “a narrower reading”). Thus, Dubin requires us to abandon the more sweeping standard we relied on in Harris. At the same time that Dubin rejected the broad furthering-or-facilitating standard, it approved of “more restrained readings” and cited our decision in Hong as one example. See id. at 116 & n.2. Thus, Hong’s original rule— that “use” entails purporting “to pass [oneself] off as another person” or “tak[ing] some other action on another person’s behalf through impersonation or forgery”—still stands. Hong, 938 F.3d at 1051 & n.8 (quotation marks and citation omitted). We will therefore rely on Hong rather than Harris. 20 USA V. MOTLEY 3. Caselaw Post-Dubin We have interpreted and applied Dubin’s test in two published decisions. First, in United States v. Ovsepian, 113 F.4th 1193 (9th Cir. 2024), we applied Dubin’s “crux” test to a “possession” theory § 1028A charge. Id. at 1208. The defendant engaged in a “prescription mill” conspiracy that generated thousands of prescriptions for expensive anti- psychotic medications. Id. at 1197. With the help of complicit doctors and pharmacists writing and filling scripts, conspirators billed Medi-Cal and Medicare for fraudulent prescriptions before diverting the drugs to the black market for resale to the pharmacies. Id. at 1197–98. The government’s narrow argument on appeal was that § 1028A(a)(1) liability attached because the defendant had retained and possessed a patient’s file onsite at the clinic “so that they would appear to be compliant with the rules” in case of an audit. Id. at 1207. We held that although possessing the patient’s means of identification might have facilitated the scheme by giving the medical clinic an “air of legitimacy” sufficient to pass an audit, under Dubin’s “crux” test, “merely facilitating a predicate offense is not enough.” Id. at 1207–08; see also id. at 1208 (observing that retaining a “patient file to protect against a possible audit did not play a ‘key’ or ‘integral’ role in the conspiracy to commit healthcare fraud”). We then addressed a § 1028A(a)(1) “use” theory in Parviz, 131 F.4th 966. The defendant was convicted of passport fraud and aggravated identity theft after she submitted a fraudulent passport application on behalf of her minor daughter, over whom she had no parental rights. Id. at 968–70. To circumvent the requirement that her daughter appear in person for the application, the defendant submitted a false letter with a forged signature from a nurse practitioner USA V. MOTLEY 21 describing the need for a medical exemption. Id. at 968. We upheld the conviction on appeal, finding that the defendant’s actions constituted an “impersonating use” of the identifying information and “involved fraud as to ‘who’ was making the false representations in the letter.” Id. at 972. We also held that a rational juror could find that the use of the nurse’s name, registered nursing number, and signature on the letter “was central to the fraudulent letter’s objective of establishing a medical excuse,” which was in turn “critical to the success of the fraudulent passport application.” Id. at 971–72. Thus, the misuse of the nurse practitioner’s identity lay at the crux because the defendant could not otherwise have presented a successful medical exemption, which was necessary for her fraudulent scheme. *** The throughline that emerges is that when the predicate offense involves fraud or deceit, Dubin requires that the manner through which the underlying offense is carried out also involve the “fraudulent or deceitful” use of another’s means of identification. Dubin held that the “fraudulent or deceitful” use of another’s identification must be in addition to, and not duplicative of, the fraud or deception of the underlying crime; the use of another’s identity cannot just form part of (or be used in) the scheme, as this is inevitable in almost all healthcare fraud. Instead, a “fraudulent or deceitful” use requires the means of identification itself to be used as the vehicle of misrepresentation in the predicate offense. After all, Dubin directed courts to focus on “offenses built around what the defendant does with the means of identification in particular.” 599 U.S. at 122. We will observe here that it is easy to conflate the fraud and deception in the underlying scheme with the fraudulent 22 USA V. MOTLEY and deceitful misuse of another’s identity. So a counterfactual may help us separate the strands of ordinary fraud from a fraudulent use of another’s identity: If, after removing the underlying predicate criminal behavior from the equation, the use of the means of identification is still considered fraudulent or deceitful, then the use stands on its own as a fraudulent or deceitful use. If, however, the use of the means of identification, considered apart from the predicate offense, is no longer fraudulent or deceptive, then the use falls outside the ambit of § 1028A(a)(1) because any fraud or deceit was merely residual to the fraud and deceit inherent in the predicate crime. Let’s consider how this mode of analysis worked in Dubin and our pre- and post-Dubin cases. In Dubin, without the predicate criminal conduct of inflating Medicare claims by misrepresenting the psychologist’s qualifications, there is nothing wrong with using real patients’ identifiers on claims; the overall scheme is Medicare fraud, but there has been no fraudulent use of the patients’ names. Similarly, in Ovsepian, absent the fraudulent prescription mill, keeping a patient’s records in an onsite file in case of an audit is not fraudulent or deceitful. The same is true in Hong: without the fraud of the predicate healthcare offense— misrepresenting massages as medically necessary physical therapy—the inclusion of a patient’s identifiers on Medicare claims is not fraudulent or deceitful. In Dubin, Ovsepian, and Hong, the Supreme Court and we reversed the aggravated identity theft enhancement. By contrast, in Parviz, apart from the criminal act of applying for a fraudulent passport, forging a medical professional’s signature on a false letter is still a fraudulent and deceptive use of another’s identity. Likewise, in Gagarin, even apart from the criminal scheme to receive bonuses on fraudulent USA V. MOTLEY 23 life insurance policies, the defendant pretended to be her cousin by forging her signature and submitting a life insurance policy application in her name, which constitutes a separate form of fraud. In both of these cases, we affirmed the aggravated identity theft enhancement. In short, the predicate offense must be accomplished through the deployment of a fraudulent or deceptive use of means of identification—most often by impersonating or passing oneself off as someone else. And the fraudulent aspect of using the means of identification must stand on its own, separate from the fraud of the underlying crime. We turn to whether the government presented sufficient evidence here. C. The Government’s Theories At trial, the government presented several theories as to how Motley’s use of her relatives’ names was at the crux of the underlying healthcare fraud. We address each in turn. 1. Enablement Theory The government’s first theory is that Motley’s use of her relatives’ names was at the crux because it enabled her to bill Medicare and receive payments. According to the government, Medicare “trusted” in the representations from Muntz and Brown “about who owned and controlled the companies and in the certifications those individuals purportedly made.” To support this theory, the government presented testimony from a Medicare expert that the owner of a medical supply company must be listed on its enrollment application. The enrollment applications request information about anyone with ownership or management 24 USA V. MOTLEY interests in the company and require an authorized official to certify compliance with Medicare regulations. The government then introduced Action’s and Kaja’s Medicare enrollment applications. Action’s application, dated July 10, 2006, listed Muntz as the owner and authorized official. Kaja’s application, dated November 7, 2012, listed Brown as the owner, CEO, and authorized official. Muntz and Brown also signed the applications, indicating their intent to ensure that the provider complies with “all applicable statutes, regulations, and program instructions.” 42 C.F.R. § 424.510(d)(3). Neither application identified Motley. But this evidence, even viewed in the light most favorable to the prosecution, fails to establish § 1028A(a)(1) liability under Dubin. First, the government did not present evidence that this omission somehow enabled the fraud. Nothing was offered at trial to suggest that Motley was ineligible to register as a provider. To be sure, the claims were approved because they came from providers enrolled in Medicare, but the government failed to show that Muntz’s and Brown’s specific identities had any bearing on the scheme, much less that they were used in a fraudulent or deceitful manner. In other words, Motley could have signed the enrollment forms herself and still “successfully” completed the fraud scheme. No evidence showed that Muntz’s and Brown’s names on the enrollment applications played any role in convincing Medicare to accept the fraudulent claims. In fact, the electronic claims in evidence include only the provider numbers linked to Action and Kaja, not the names of Muntz or Brown. The government offered no evidence at trial that Motley would have been unable to obtain a provider number USA V. MOTLEY 25 on her own or that Medicare would have rejected the claims if the companies had been enrolled under Motley’s name. 3 Parviz is an illustrative comparison. 131 F.4th 966. As Parviz was not a medical professional, she could not have written the fraudulent medical excuse without using someone else’s means of identification. Id. at 972 (noting that Parviz “attach[ed] his name and medical position to the particular false assertions that were critical to the success of the fraudulent passport application”). A government employee testified that he approved the passport application specifically because he believed the note was written by a licensed medical professional on the letterhead of a legitimate medical facility. Id. at 971. In stark contrast, the jury in this case heard nothing suggesting that Motley needed to operate through companies incorporated and enrolled in someone else’s name to carry out the fraud. Furthermore, in Parviz, the government showed that the particular identity used—a licensed medical professional with no relation to the child—was both a key mover and critical to the crime’s success. Here, by contrast, no government witness testified that Motley’s claims were accepted because of the enroller’s identity—specifically, that it was Muntz’s and Brown’s names and not Motley’s on the forms that opened the door for the claims’ approval. And because the jury was not presented with any evidence about how Medicare would have reacted had Motley’s name been 3 In its answering brief on appeal, the government contends that Motley may have been ineligible to enroll the companies as Medicare providers herself due to her criminal record. But these past convictions were not presented at trial, and it is unclear whether they would have barred Motley from applying herself. On appeal, we cannot affirm a criminal conviction on the basis of a theory not presented to the jury. Chiarella v. United States, 445 U.S. 222, 236 (1980). 26 USA V. MOTLEY on the enrollment documents instead, the government did not show that the use of Muntz’s and Brown’s names was “critical to the success.” Id. at 972. The Medicare expert added that providers must submit supplemental enrollment applications whenever there is new “information about who owns or controls or manages the business.” Given Motley’s managerial role in the companies, it may have violated Medicare regulations to omit her, but this does not establish a fraudulent or deceitful “use” under Dubin. The government presented no evidence that the omission was purposeful or fraudulent or that it played a critical role in the fraud. Thus, even with the omission, Motley could have run Action and Kaja in an honest fashion; any misdirection in who ran Action and Kaja was not integral to the fraudulent scheme she perpetrated on Medicare. Further, even if we thought the omission was relevant, as the original enrollers and authorized officials, it was Muntz and Brown—not Motley—who were responsible for updating the enrollment applications. See 42 C.F.R. § 424.510(d)(3)(ii) (“[T]he only acceptable signature on the enrollment application to report updates or changes to the enrollment information is that of the authorized official currently on file with Medicare.”). 2. Concealment Theory The government’s next theory at trial was that the use of her relatives’ names was at the crux of the fraud by allowing Motley to conceal her involvement. In closing argument to the jury, the prosecutor stated: “[Motley] hid behind her relatives on the Medicare enrollment documentation from the very start. She tried to put them out front as the responsible parties, the ones that Medicare would come looking for if it had any question about what was going or USA V. MOTLEY 27 any problems with what was going on at Action and Kaja . . . .” But this theory fails on multiple fronts. There was no evidence before the jury that Motley’s use of her relatives’ names concealed her role or that she intended it to. First, it was no secret that Motley controlled the companies. Multiple government witnesses, including investigators, testified that Motley would hold herself out as the “manager in charge” or the “owner.” At trial, Special Agent Rochelle Wong testified that she had never interviewed Muntz and had no intention to do so, as it was apparent who was in charge. The jury saw a business agreement between Kaja and Motley, as well as organizational charts listing Motley as holding various officer positions. In short, if Motley sought to conceal her ties to the companies, she failed, and she did not do so by using her relatives’ names. The strongest trial evidence for the concealment theory was a former employee’s testimony that during a 2015 audit of Kaja, co-schemer Marquez instructed her to characterize both Motley and her as “consultants.” But even viewing this evidence in the light most favorable to the prosecution, it merely reveals that Marquez—not Motley—wanted to minimize their roles. More importantly, because the employee was not instructed to shift blame to Muntz and Brown, any attempted concealment was unrelated to the use of their names. Therefore, no rational juror could find that the fact that Motley ran Action and Kaja was at the crux of the fraud. The government also contended that Motley’s use of her relatives’ names concealed that the same person controlled both companies. But this theory also fails. First, it is unclear how or why hiding the two companies’ joint operation had 28 USA V. MOTLEY anything to do with enabling the ongoing fraud. Second, trial evidence shows that this joint ownership was no secret. At trial, Agent Wong testified that she knew that “some of . . . the employees were shared between Action and Kaja.” Even if the government showed that the use concealed Motley’s role from the government, the concealment theory fails for a more fundamental reason: Motley’s use of Muntz’s and Brown’s names was not itself deceptive toward Medicare. The government’s trial evidence—Action’s and Kaja’s enrollment applications and incorporation documents—do not support the claim that Motley’s use was “in a manner that is fraudulent or deceptive.” Dubin, 599 U.S. at 132. First, although the Medicare enrollment applications and supplemental enrollment forms listed only Muntz and Brown, the articles of incorporation showed that Action and Kaja were incorporated by, and legally owned by, Muntz and Brown, not by Motley. As the legal owners, Muntz and Brown—not Motley—were required to be listed on the enrollment applications. See 42 C.F.R. § 424.510(d)(3)(ii). And given that ownership, it is not unusual that they certified compliance with Medicare’s rules. It is also not unusual—and certainly not illegal—that Motley ran a company owned by a relative. Second, the government introduced only the enrollment applications; it offered no evidence that Motley personally submitted or signed them on behalf of Muntz or Brown. Without evidence that Motley, rather than Muntz and Brown, incorporated the companies or enrolled them in Medicare, Motley’s “use” cannot be premised on the enrollment paperwork and extends, at most, to the submission of fraudulent claims through the companies. But Muntz’s and Brown’s names do not even appear on the USA V. MOTLEY 29 fraudulent claims; only Action’s and Kaja’s provider numbers do. Third, the fact that Motley submitted claims on behalf of the companies, when viewed in isolation, was not deceptive. Medicare does not require the person who enrolls the provider to be the person who submits electronic claims. The jury saw the Medicare EDI enrollment agreements signed by Brown and Muntz stating that the provider “will be responsible for all Medicare claims submitted . . . by itself, its employees, or its agents.” (emphasis added). As an employee of Action and Kaja, Motley was authorized to submit claims on behalf of the companies, even if her name was not on the enrollment application. Because it was perfectly lawful, ordinary, and expected that she, as an employee, submit claims for the companies, Motley did not “purport[] to take some . . . action on another person’s behalf through impersonation or forgery.” Hong, 938 F.3d at 1051 & n.8 (citation and quotation marks omitted). Thus, Motley’s use of her relatives’ names in conjunction with the submission of claims did not stand on its own as fraudulent or deceptive toward Medicare. The claims themselves were, of course, fraudulent or deceptive, but the fraud had nothing to do with Brown’s and Muntz’s names. The government also failed to show that Motley’s use of her relatives’ identities was fraudulent or deceptive toward Muntz and Brown. No evidence was presented that Motley had stolen or taken them without permission, or that she was “concealing” the use of her relatives’ identities from them. In fact, the trial evidence suggested that Muntz and Brown knew that Motley was operating the companies in their names: Both had executed powers of attorney authorizing Motley to act on their behalf. Indeed, the government’s theory at trial was that the fraudulent or deceitful aspect of 30 USA V. MOTLEY Motley’s use derived from a use within an unlawful scheme, not that it was unauthorized by Muntz or Brown. The prosecutor stated to the jury that the powers of attorney “permit[] defendant to participate in any legal business of any sort. But, . . . this business was anything but legal.” Motley certainly used Muntz’s and Brown’s companies to facilitate illegal Medicare fraud, but she did not steal their identities or use them without permission. As explained above, mere use of another’s identity within an unlawful scheme—without more—is not a use “in a manner that is fraudulent or deceptive” under Dubin. 599 U.S. at 132. By failing to show that the use “involv[ed] fraud or deceit about identity,” id. at 126, independent of the underlying scheme, the government’s theory “collapses the enhancement into the enhanced,” id. at 128. The government’s theory in this case would permit a nearly “limitless” reading of § 1028A, which is precisely the reading the Supreme Court rejected in Dubin. See id. at 118. And even if Muntz and Brown were unaware of Motley’s criminal use of their companies, their grievance would be that she betrayed their trust and their companies, not that she stole their identities. The Supreme Court cautioned that the two-year mandatory sentence is meant for a “particularly serious form of identity theft” and that § 1028A(a)(1) should not be read in a manner that turns the “core” of this serious identity theft offense “into something the ordinary user of the English language would not consider identity theft at all.” Id. at 124. On these facts, a reasonable person may find it unseemly that Motley mismanaged her relatives’ companies, but they would not label Motley’s conduct as “identity theft.” This is especially true considering Muntz and Brown had executed powers of attorney to Motley. The government’s theory to the contrary would turn nearly every USA V. MOTLEY 31 employee who commits fraud in the course of their employment into an aggravated identity thief. The Supreme Court plainly rejected “such a boundless interpretation.” Id. at 114. 3. Audit Theory Finally, the government’s “audit” theory fares no better. As the government sees it, Medicare conducts regular unannounced visits to the facilities of enrolled providers, and having Action and Kaja enrolled in another’s name permitted Motley to pass these inspections and continue the fraud. At closing, the prosecutor contended that the use of Muntz’s and Brown’s names played “a central role in passing inspections that let the defendant’s companies keep billing and getting paid.” But this theory is unsupported by the evidence and foreclosed by the law. On this record, no rational juror could find that Motley fraudulently or deceptively used her relatives’ names to pass inspections. At trial, the compliance officers testified to receiving and reviewing documents, personnel charts, and training materials during visits. When compliance officers or other investigators visited Action and Kaja, Motley conducted the exit interviews, signed the compliance forms, and provided the records. During these visits, Motley was perfectly honest regarding the absenteeism of owners Muntz and Brown. For example, on one occasion, she told a compliance officer that although she was the manager in charge, her nephew was the owner but “travels and does not come into the business during the week.” There was no evidence that this ownership structure allowed, or even facilitated, Action and Kaja to pass inspections. To the contrary, the record suggests that 32 USA V. MOTLEY Motley’s transparency about the idiosyncratic bipartite ownership–control structure and the titular owners’ minimal involvement and absence during inspections only raised suspicions, contributing to Kaja’s failing score in 2016. Motley indeed deceived compliance officers into giving passing scores in 2010 and 2012, but this had nothing to do with the use of Muntz’s and Brown’s names. Instead, the record suggests the fraud went undetected for as long as it did due to the elaborate ghost apparatus, including a compliant procedures and policies manual; patient and personnel files; delivery logs maintained and provided to compliance officers; and even employees pretending to be patients on follow-up phone calls to compliance officers. Even if a rational juror could find that Motley’s use of her relatives’ names helped pass inspections, that theory is foreclosed by the law. In Ovsepian, we rejected a nearly identical legal argument from the government. There, the defendant maintained a copy of a patient’s identifying information without authorization in a “patient file onsite so that they would appear to be compliant with the rules in the event [the company] was audited.” 113 F.4th at 1207. We held that even though keeping the patient’s file “could have, and perhaps did, allow the conspiracy to continue undetected,” it was not “at the ‘crux’ of the conspiracy to commit healthcare fraud.” Id. at 1207–08. We found that possessing the file “onsite may have lent” “the air of legitimacy” and helped “to survive an audit,” but it was ancillary to the healthcare fraud conspiracy because it “merely facilitated its commission.” Id. at 1208. Motley’s case is even weaker because there is no evidence that identifying Brown and Muntz on the enrollment forms helped the companies pass inspections. USA V. MOTLEY 33 D. The Trial Record Fails to Establish that Motley’s Use Was at the Crux. On this record, no rational juror could find that Motley’s use of Muntz’s and Brown’s names was “at the crux” of the healthcare fraud. Viewed in the light most favorable to the prosecution, the evidence presented at trial was insufficient to allow any rational juror to find, beyond a reasonable doubt, that Motley’s use of her relatives’ names was the “specifically . . . fraudulent or deceitful manner” through which the scheme was carried out, such that it went to “the crux” of the healthcare fraud. Dubin, 599 U.S. at 117. The crux of the underlying healthcare fraud was billing for medically unnecessary DME and for repairs that never took place. The fact that the companies were incorporated and enrolled in Medicare under names other than that of the defendant was “merely an ancillary feature of a billing method.” Id. at 114. The government failed to present a theory at trial showing that Motley “use[d] the means of identification itself to defraud or deceive,” id. at 123 (emphasis added), and did so “in a manner that is fraudulent or deceptive,” id. at 132. Although the government showed that Motley’s use occurred within an unlawful and fraudulent scheme, it did not show that the use itself was fraudulent or deceptive, either toward the identity holders or toward Medicare. Motley did not steal or use the means of identification without permission, nor did the use induce Medicare to pay claims it otherwise would have denied, nor did it shift apparent responsibility from Motley to Muntz and Brown. This is further illustrated by the fact that when considered in isolation, there is nothing deceptive or fraudulent about Motley’s use of Muntz’s and Brown’s 34 USA V. MOTLEY names. Without the scheme submitting fraudulent claims for unprovided or unnecessary services, Motley’s claims submissions on behalf of Action and Kaja were perfectly lawful. Medicare does not require the individual who enrolls the supplier to be the same person who submits electronic claims. Action and Kaja were enrolled in Medicare, and, as a lawful employee of those companies, Motley was authorized to submit claims on their behalf, even if her name was not on the enrollment forms. Thus, in vacuo, Motley’s use of her relatives’ names was not fraudulent or deceptive. The government also failed to show that the appearance of Muntz’s and Brown’s names on the enrollment and supplemental applications was “a key mover,” id. at 123, or “critical to the success” of the fraud, Parviz, 131 F.4th at 972. The Supreme Court in Dubin wanted “[t]o be clear” that “being at the crux of the criminality requires more than a causal relationship, such as . . . being a but-for cause of its ‘success.’” 599 U.S. at 131 (emphasis added). Here, the government has failed to demonstrate that Motley would have been unable to successfully submit claims and complete the fraud without using her relatives’ names. Motley could have signed the paperwork herself; the companies could have been incorporated in Motley’s name; the applications could have listed Motley. Thus, the government did not show that, absent the use of the relatives’ names on the Medicare enrollment and supplemental applications, the scheme’s intended outcome would have changed. To further illustrate the lack of a viable claim linking Motley’s use of her relatives’ names to the crux of what made the underlying scheme criminal, consider Motley’s underlying offense. The healthcare fraud for which Motley was convicted criminalizes, in relevant part, “obtain[ing], by USA V. MOTLEY 35 means of false or fraudulent pretenses, representations, or promises, . . . money or property . . . of[] any health care benefit program.” 18 U.S.C. § 1347(a)(2). As charged in the indictment and as presented at trial, the healthcare fraud involved obtaining payments from Medicare, a healthcare benefit program, by falsely billing for DME and services that were not medically necessary and for power wheelchair repairs and supplies that were not provided. The deceit thus lay in misrepresenting the medical necessity of, or the performance of, services and supplies on Action’s and Kaja’s claims. The use of her relatives’ names on the Medicare enrollment applications may have facilitated the fraud, but it was too attenuated from the falsification to be “at the crux.” The crux of her crime was falsifying the services and supplies. Put differently, the fraud was a lie about what services were performed, not about who received or provided them. See Dubin, 599 U.S. at 131–32 (endorsing a Sixth Circuit heuristic that asks whether the fraud or deceit about identity “go[es] to ‘who’ is involved” rather than “misrepresenting how and when services were provided” (first emphasis added)). Thus, on this record, no rational juror could find that the use of Muntz’s and Brown’s names on the Medicare enrollment applications was at the crux of the fraudulent claims’ objective of obtaining payments from Medicare for services and DME that were either not provided or medically unnecessary. III. CONCLUSION Although we do not lightly set aside a jury’s verdict, the record here leaves us with no choice. No evidence showed that Motley’s use of her relatives’ names was “critical to the success” of the scheme and that the use itself was fraudulent 36 USA V. MOTLEY or deceitful—only that the names were part of a broader scheme to defraud, for which Motley will serve her time. Because the government failed to show that Motley’s use of her mother’s and nephew’s names was “specifically in a fraudulent or deceitful manner” and “at the crux” of the criminality of the underlying fraudulent billing, we vacate her § 1028A(a)(1) sentence and remand to the district court for further proceedings consistent with this opinion. SENTENCE VACATED AND REMANDED.
Plain English Summary
FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, No.
Key Points
Frequently Asked Questions
FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT UNITED STATES OF AMERICA, No.
FlawCheck shows no negative treatment for United States v. Motley in the current circuit citation data.
This case was decided on February 24, 2026.
Use the citation No. 10799692 and verify it against the official reporter before filing.
Why Attorneys Choose FlawFinder

Why Attorneys Choose FlawFinder

Side-by-side with Westlaw and LexisNexis

Feature FlawFinder Westlaw LexisNexis
Monthly price$19 – $99$133 – $646$153 – $399
ContractNone1–3 year min1–6 year min
Hidden fees$0, alwaysUp to $469/search$25/mo + per-doc
FlawCheck citatorIncludedKeyCite ($$$)Shepard's ($$$)
Plain-English summaryIncludedNoNo
CancelOne clickTermination feesAccount friction
Related Cases

Full legal research for $19/month

All 50 states · Federal regulations · Case law · Police SOPs · AI analysis included · No contract

Continue Researching →