Nation/World

How a federal spy case turned into a child pornography prosecution

RIVERSIDE, Calif. -- FBI agents entered Keith Gartenlaub's home in Southern California while he and his wife were visiting her relatives in Shanghai. Agents wearing gloves went through boxes, snapped pictures of documents and made copies of three computer hard drives before leaving as quietly as they had entered.

The bureau suspected that Gartenlaub was a spy for China.

The FBI had obtained a secret search warrant to enter the house, citing national security grounds. The agents were searching for evidence that Gartenlaub, an information technology manager at Boeing, had leaked computer information about the defense contractor's C-17 military transport plane to people acting on behalf of China.

But since the search in January 2014, no spy or hacking charges have been brought against him.

Instead, seven months later, he was charged with the possession and receipt of child pornography. He has denied the charges, but was convicted in December.

Gartenlaub's case highlights how exceptional powers given to the government in recent years to gather information about suspected terrorist or espionage threats without some of the traditional safeguards for a defendant's rights are now being used in more routine criminal cases.

Over the past 15 years or so, the wall between intelligence gatherers and criminal prosecutors has fallen, making it easier to share information, especially to fight terrorism. And under the Foreign Intelligence Surveillance Act (FISA), defendants are generally unable to effectively challenge the warrants that authorized the search or surveillance because they are not permitted to see them or the underlying application on national security grounds.

ADVERTISEMENT

Gartenlaub's attorneys are troubled that what began as an espionage case - one that resulted two weeks ago in a guilty plea by a Chinese businessman with no connection to their client - morphed into a child pornography prosecution.

In Gartenlaub's case, the government made sealed filings, so neither the defense nor the public were able to see them. Based on the secret filings, the judge held that the government had shown probable cause that the house to be searched belonged to "an agent of a foreign power" or a spy.

"There has, over the last decade-plus, been an erosion of the formerly bright line between foreign intelligence surveillance and investigation for criminal prosecution," said Jennifer Daskal, a former official in the Justice Department's national security division who now teaches law at American University.

In criminal cases, by contrast, a defendant and his attorneys are generally entitled to see an affidavit for a warrant and challenge the grounds for its issuance before a judge. Gartenlaub wants to see the warrant in his case so he can challenge it as based on false information, and therefore invalid.

"The government is increasingly using national security tools to investigate domestic criminal cases, bypassing key constitutional protections," said Patrick Toomey, a staff lawyer with the American Civil Liberties Union. "This problem is only compounded in the digital age, where the FBI is collecting vast amounts of our data for intelligence purposes but then goes sifting through all that information in unrelated criminal investigations."

In a case in Philadelphia last year, for instance, the government used a FISA order to obtain evidence on a Temple University professor that they apparently suspected was sharing technology with China, but they indicted him on wire fraud charges before eventually dropping the case. In 2011, the government used a FISA order to gather information about a Chinese businessman suspected of stealing patented corn seeds from Iowa farm fields. He later was indicted on charges of theft of trade secrets. He pleaded guilty to one count of conspiracy to steal trade secrets earlier this year.

Federal prosecutors in Gartenlaub's case insist that they followed the law.

"The issue of the FISA warrant was the subject of extensive pretrial briefing and an order from the judge finding that the orders were lawfully issued and did not violate the defendant's due process rights," said Thom Mrozek, a spokesman for the U.S. attorney's office in Los Angeles.

The judge specifically found that "the information obtained pursuant to FISA was lawfully acquired" and did not violate the defendant's Fourth Amendment rights, he said. The court also found that "there is no indication of any false statements having been included in the FISA materials."

Mrozek said that the fact that the child pornography case began as a national security investigation does not lessen its severity.

"When law enforcement lawfully obtains evidence of a serious crime, in this case a crime against children, we will pursue further investigation of that crime," he said.

The defense unsuccessfully argued that Gartenlaub could not be linked to identical copies of child pornography videos found on four hard drives in his house. Two of the hard drives had been in a computer that was kept at a beach house where numerous people had access to it, Gartenlaub said.

"They claim I'm a spy and a pervert, and I'm neither one," Gartenlaub said in an interview from his home in Riverside County, which he may not leave without permission.

Jeff Fischbach, a forensic technologist for the defense, said there's no evidence that the child pornography was ever seen by anyone who used the computer, much less Gartenlaub.

The government's own forensic expert, Bruce W. Pixley, said he could not find any evidence of the material being downloaded onto any of the computers, the defense noted. That means it had to have been copied onto the computer - but by whom is unknown.

Prosecutors are seeking a 10-year prison term for Gartenlaub, who has asked Judge Christina A. Snyder of the U.S. District Court for the Central District of California to overturn the verdict or order a new trial. A hearing is scheduled for later this month.

Gartenlaub, 47, was fired in August 2014 and has been unemployed since. His attorney said his defense was hampered by an inability to obtain basic information about how the evidence was obtained and on what specific grounds the warrant was issued.

ADVERTISEMENT

"We've always cherished the right to confront and cross-examine our accusers and examine the evidence that's used as the basis for a search of our homes," said Mark J. Werksman, Gartenlaub's attorney. "And to be told, 'We went in. We had good reasons. We're not going to tell you why. Trust us,' is alarming. Especially when the case becomes a run-of-the-mill criminal case."

In February 2013, the FBI emailed Gartenlaub that they were investigating a data breach and wanted to talk to him. Over two days at Boeing's facility in Long Beach, Calif., and a third day at the Huntington Beach facility, they interviewed Gartenlaub about the C-17 program; his team of engineers was also questioned. Two agents showed him a copy of an intercepted email. The communication described information on the C-17 that was apparently being sought by the Chinese.

Gartenlaub told them he had no idea who wrote it or why.

The next time he heard about the C-17 was more than a year later, in June 2014, when he saw the news about the arrest of the Chinese businessman, Su Bin. When he reviewed Su's arrest warrant, he realized that the email excerpt he had been shown 16 months earlier had been sent by Su.

Still, Gartenlaub had no sense that he was a target. "Why would I think I would be under suspicion?" he said.

The only thing he could think was that his wife, who was born in China and became a U.S. citizen and was a member of an Orange County Chinese business association, somehow made the FBI suspicious.

In the affidavit for the warrant for the couple's emails, separate from the national security warrant, agent Wesley Harris stated that Gartenlaub was currently the "nationwide Unix military administrator for Boeing," suggesting that that position would allow him to log into C-17 data, Gartenlaub said.

According to two Boeing colleagues, there is no such job at the company. And Gartenlaub was, in any case, an IT manager. Moreover, they said, the breached files were accessible through operational servers in the field, such as at Air Force bases. These were not servers that Gartenlaub or his team of engineers who supported the plane's designers had access to, they said.

ADVERTISEMENT

Then on a Monday in late August, two FBI agents came to speak to Gartenlaub at Boeing's Huntington Beach facility. They showed him pictures of himself and his wife with some of her acquaintances whom Gartenlaub couldn't remember.

Two days later, the agents returned. This time they handcuffed him.

During his initial appearance in a federal courthouse in Santa Ana, Calif., the prosecutors indicated a willingness to reduce or drop the child pornography charges if he would tell them about the C-17, his then-attorney said.

"They said what they really wanted was information about the C-17 Chinese hacking situation, recalled Sara Naheedy, who was his attorney at the time.

All along, Werksman said, the government suspected Gartenlaub was working with Su Bin. "They triangulated Keith as the guy at Boeing who would have been Su Bin's inside source," he said.

That suspicion is "ridiculous," Gartenlaub said.

"I've been a good Boeing employee for years. Just because I married somebody from China doesn't mean I'm going to betray my country," he said. "If they think I'm a spy, then charge me with it."

ADVERTISEMENT