United States v. Gabriel Schaffer

CourtCourt of Appeals for the Sixth Circuit
DecidedNovember 12, 2009
Docket09-3053
StatusPublished

This text of United States v. Gabriel Schaffer (United States v. Gabriel Schaffer) is published on Counsel Stack Legal Research, covering Court of Appeals for the Sixth Circuit primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Gabriel Schaffer, (6th Cir. 2009).

Opinion

RECOMMENDED FOR FULL-TEXT PUBLICATION Pursuant to Sixth Circuit Rule 206 File Name: 09a0394p.06

UNITED STATES COURT OF APPEALS FOR THE SIXTH CIRCUIT _________________

X Plaintiff-Appellee, - UNITED STATES OF AMERICA, - - - No. 09-3053 v. , > - Defendant-Appellant. - GABRIEL SCHAFFER, - N Appeal from the United States District Court for the Northern District of Ohio at Cleveland. No. 08-00097-002—Patricia A. Gaughan, District Judge. Argued: July 29, 2009 Decided and Filed: November 12, 2009 Before: BATCHELDER, Chief Judge; DAUGHTREY, Circuit Judge; VAN * TATENHOVE, District Judge. _________________ COUNSEL ARGUED: Richard G. Lillie, LILLIE & HOLDERMAN, Cleveland, Ohio, for Appellant. Daniel R. Ranke, ASSISTANT UNITED STATES ATTORNEY, Cleveland, Ohio, for Appellee. ON BRIEF: Richard G. Lillie, Gretchen A. Holderman, LILLIE & HOLDERMAN, Cleveland, Ohio, for Appellant. Daniel R. Ranke, ASSISTANT UNITED STATES ATTORNEY, Cleveland, Ohio, for Appellee. _________________

OPINION _________________

VAN TATENHOVE, District Judge. A grand jury charged Gabriel Schaffer with conspiracy to commit computer fraud and to transport stolen property interstate. Upon Schaffer’s motion, the district court dismissed the count charging interstate

* The Honorable Gregory F. Van Tatenhove, United States District Judge for the Eastern District of Kentucky, sitting by designation.

1 No. 09-3053 United States v. Schaffer Page 2

transportation of stolen property but denied that motion in all other respects. Schaffer then entered a conditional guilty plea, admitting that he conspired to commit computer fraud. On appeal, Schaffer contends that the indictment should be dismissed due to the omission of essential elements, violation of the statute of limitations, pre-indictment delay, and entrapment as a matter of law. Because the district court correctly rejected each of these arguments, we AFFIRM.

I.

Gabriel Schaffer and his co-defendant Dana Arvidson fell victim to a government sting operation in which they conspired to obtain military secrets and laser missile technology from what they believed was a Department of Defense (“DOD”) contractor. The relevant events began on July 31, 2002, when an undercover FBI agent (“UC1”) met Arvidson at a hotel in Independence, Ohio, and advised him that he wanted to outsource wireless computer security services to a local Cleveland company. During that meeting, Arvidson indicated that he was the sole owner of SecureNet and had developed proprietary technology which allowed him to intercept wireless computer network traffic from a greater range. Arvidson stated that he had intercepted communications from approximately 500 wireless computer networks in Cleveland, including sensitive information and passwords for employee accounts. He further claimed that he could “spoof” MAC (media access control) addresses, obtain access to computer networks via a WAP (wireless application protocol), and “break” the encryption used to protect the privacy of communications on wireless computer networks.

On October 10, UC1 and Arvidson met in Cleveland. During this meeting, UC1 told Arvidson that he knew an individual in Chicago who was interested in locating someone with expertise in wireless computer networks to obtain information from a DOD contractor. Later that month, Arvidson advised UC1 that “we have developed some new technology that allows us to be more under the radar,” and explained that he could now intercept communications “passively” from a significant distance. Arvidson indicated that he was still interested in the “side project.” No. 09-3053 United States v. Schaffer Page 3

During the next meeting, on December 3, after Arvidson reiterated his interest in the “side project,” UC1 told Arvidson that the target was in Texas and UC1 wanted to “bring up a couple of things . . . to give you (Arvidson) a chance to back out.” UC1 then told Arvidson that the target information was “laser missile technology type stuff . . . anything you intercept out of the air . . . is probably going to be illegal . . . it’s gonna be a problem if we were to get caught.” Arvidson replied, “I’m looking at this as a security audit just like any other security audit . . . capturing data . . . I don’t really want to know a whole ton about what I’m capturing . . . I’ll be happy to do the job, just as we would any other job.” UC1 told Arvidson, “I know you developed a way that can’t be traced with this passive technique but if for some reason it did get traced, people can get in trouble. I just want you to know that.” Arvidson replied, “Absolutely, well that’s the risk premium . . . I’m with you 100 percent.”

The next day, Arvidson called UC1 and asked him numerous questions about the location of the target computer system. UC1 gave Arvidson some specifics regarding the company’s location and advised that an employee of the target company logged onto the network every night through a wireless access point using his user ID and password. He further explained that there was no guarantee the employee would actually upload files. Arvidson advised UC1 that his first step would be to “go in and decrypt it” and that if he would be “actively infiltrating with the person’s password, that changes my risk level.” Arvidson stated that if “I do it passively the risk level is, I mean it’s high but it’s relatively low, if I actually go in and compromise something, I’m still willing to do it but my price is going to be higher.” About a month later, Arvidson sent UC1 an email with a list of technical questions about the DOD contractor’s computer network.

On February 12, 2003, UC1 and another undercover FBI agent (“UC2”) met with Arvidson and Schaffer at a Cleveland hotel. UC2 made it clear that his client was interested in “stealing military secrets and laser missile technology” from a “DOD contractor in El Paso, TX.” During this meeting, Schaffer used a notebook computer to demonstrate how their equipment could intercept wireless computer network traffic. Arvidson and Schaffer then detailed how they could similarly intercept wireless No. 09-3053 United States v. Schaffer Page 4

computer network traffic from the DOD contractor, including an employee’s login user ID and password. They further explained that after intercepting this information, they would log into the DOD contractor’s computer network using the intercepted user ID and password, imitate that employee’s physical computer system so they could not be traced, locate the target information, and download it to their computer.

Arvidson told UC2 that they wanted “25” up front for both him and Schaffer, and “50” after completion of the theft. UC2 indicated that he would need a sample of the stolen information to show his client in Chicago. If his client was happy with the stolen information, UC2 would travel to Cleveland and pay the total fee in exchange for all the stolen data. In the event they were unable to acquire the target information in El Paso, UC2 said that he would pay them an hourly rate of $150 per hour for their time. UC2 would also pay for their airfare to and lodging in El Paso. Arvidson and Schaffer agreed.

The trip to El Paso was planned for the last week of February. UC2 told Arvidson and Schaffer that he would mail the plane tickets to Arvidson. Arvidson provided UC2 with a business card that depicted an address for his other Cleveland business, then Schaffer wrote “Gabe Schaffer” on the back of Arvidson’s business card.

During a telephone call with Arvidson on February 18, UC1 clarified that Arvidson’s fee for the theft, if successful, would be $100,000. One week later, UC2, Arvidson, and Schaffer met in an El Paso, Texas, hotel room which had line-of-sight access to the purported DOD contractor’s office.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Falcone
311 U.S. 205 (Supreme Court, 1940)
Grunewald v. United States
353 U.S. 391 (Supreme Court, 1957)
United States v. Knox
396 U.S. 77 (Supreme Court, 1969)
United States v. Marion
404 U.S. 307 (Supreme Court, 1971)
United States v. Lovasco
431 U.S. 783 (Supreme Court, 1977)
United States v. Gouveia
467 U.S. 180 (Supreme Court, 1984)
United States v. Loud Hawk
474 U.S. 302 (Supreme Court, 1986)
Mathews v. United States
485 U.S. 58 (Supreme Court, 1988)
Doggett v. United States
505 U.S. 647 (Supreme Court, 1992)
United States v. James Hart
640 F.2d 856 (Sixth Circuit, 1981)
United States v. Arthur Brown and Erma Brown
667 F.2d 566 (Sixth Circuit, 1982)
United States v. Gordon Pennell
737 F.2d 521 (Sixth Circuit, 1984)
United States v. Gerald Dean Greene
737 F.2d 572 (Sixth Circuit, 1984)
Anthony Hayle v. United States
815 F.2d 879 (Second Circuit, 1987)
United States v. M.K. Fadel
844 F.2d 1425 (Tenth Circuit, 1988)
United States v. Michael J. Fitzpatrick
892 F.2d 162 (First Circuit, 1989)
United States v. Lawrence G. Declue
899 F.2d 1465 (Sixth Circuit, 1990)
United States v. Ralph Hubert Barger
931 F.2d 359 (Sixth Circuit, 1991)

Cite This Page — Counsel Stack

Bluebook (online)
United States v. Gabriel Schaffer, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-gabriel-schaffer-ca6-2009.