So, I’m filing this on Friday…
PRELIMINARY STATEMENT
Petitioner, Kirk Cottom (“Cottom”), previously petitioned this Court (Case No. 22-2050 & 23-3131) asserting that he was illegally prosecuted by DOJ Trial Attorney Keith A. Becker (“Becker”) from November 10, 2014 to now (as the DOJ’s disclosure obligations are “on-going”). When objectively analyzing the briefs & exhibits for Cottom’s previous petitions, there is a clear disconnect between the OBJECTIVE FACTS of the case and the FICTION the government keeps illegally promoting.
This petition will focus on reiterating – with newly discovered evidence obtained from FOIA litigation – that it is irrefutable that Cottom’s 23-3131 petition presented this Court with irrefutable and objective evidence that the prosecution of this case violated Cottom’s Constitutional rights per Napue v. Illinois, 360 U.S. 264 (1959), Brady v. Maryland, 373 U.S. 83 (1963) & United States v. Cronic, 466 U.S. 648 (1984); BUT, instead of GRANTING that petition – the Court apparently accepted the AUSA’s (TESSIE L.S. SMITH. #25828) knowingly false factual arguments against the merits of Cottom’s petition without skepticism.
This petition will present the Court with indisputably “newly discovered evidence” obtained during a FOIA lawsuit in the Western District of NY (Case No. 23-CV-6307) that confirms that Cottom’s Defense Counsel (Gross, Howard & Slawinski) and Cottom’s Defense Experts (Podhradsky, Miller & Stroschein) joined Becker’s conspiracy to conceal TB2’s totally fabricated logging system. In other words, the cumulative effect of the misconduct perpetrated by the government’s attorneys (Becker, Norris & Smith), with the assistance of Cottom’s counsel (Gross, Howard & Slawinski) and Cottom’s experts’ (Podhradsky, Miller & Stroschein) in 2015 requires VACATING Cottom’s conviction for egregious due process violations.
ISSUES PRESENTED
- Whether the newly obtained FOIA pages – produced only after litigation compelled their disclosure – constitute “newly discovered evidence” within the meaning of 28 U.S.C. §2255(h)(1) where the Department of Justice previously withheld them despite a clear duty to produce them when replying to Case Number 23-3131.
- Whether the newly discovered FOIA materials establish that Becker knowingly relied on falsified digital evidence (the FBI created “visitors” table) and concealed that falsification from Cottom in violation of Brady v. Maryland, 373 U.S. 83 (1963).
- Whether Becker’s knowing use—and failure to correct—fabricated evidence violated Napue v. Illinois, 360 U.S. 264 (1959), and thereby renders the conviction constitutionally invalid.
- Whether newly obtained evidence proving that Joseph Howard; 1) allowed improper communications between Becker and Podhradsky’s team regarding the concealment of falsified evidence, 2) failed to disclose those improper communications to the Court or Cottom, and 3) coerced Cottom into an uninformed plea – constitutes a constructive denial of counsel under United States v. Cronic, 466 U.S. 648 (1984), thereby presumptively violating the Sixth Amendment.
- Whether, viewed in light of the entire record, the newly discovered evidence and the proven collapse of the adversarial process establishes by clear and convincing evidence that no reasonable fact finder would have found Petitioner guilty, as required by §2255(h)(1).
INTRODUCTION
Thanks to Cottom’s FOIA litigation (2023 – 2026) – currently in the “summary judgment phase” – Cottom now has NEW evidence that his NE CJA counsel (Joseph Gross & Joseph Howard) and his NE CJA experts (Ashley Podhradsky, Matt Miller & Josh Stroschein) colluded with Becker to deliberately suppress case dispositive technical evidence (Brady/Napue material) that would have totally destroyed Becker’s case against Cottom et al (NE Case No. 8:13CR108).
Becker, with the help of all expert witnesses (prosecution & defense) illegally omitted (perjury by omission) case dispositive evidence from the pre-trial Daubert hearing – held on August 3, 2015; because, it would have proved that Becker’s technical narrative, regarding TB2’s native data, was criminally FALSE. Becker’s perjurious conspiracy began on November 10, 2014 (Exhibit D) – when he began to actively suppress that TB2’s log was FABRICATED and populated with knowingly FALSE information.
In other words, the Court must agree that fabricating evidence and presenting it as authentic to a Court is a case ending due process violation. New FOIA documents prove that Becker went a step further and created a textbook Cronic situation, when he persuaded Cottom’s defense team to help him conceal his due process / prosecutorial misconduct.
This petition will prove that egregious due process violations have occurred in this case. The newly discovered evidence proves that Becker orchestrated the complete breakdown of the adversarial process. Exhibit H proves collusion between Becker and Cottom’s defense team. Exhibits D, H, J, L, M & N also proves that Cottom’s CJA attorneys and experts played an active / permissive role in the complete breakdown of the adversarial process. Those intentional constitutional violations require the Court to VACATE Cottom’s conviction with prejudice.
APPELLATE HABEAS PROCEDURAL BACKGROUND
Case No: 22-2050
On May 19, 2022 Cottom filed a MOTION FOR PERMISSION TO FILE A PETITION FOR A SECOND OR SUCCESSIVE §2255. AUSA Michael P. Norris responded perjuriously, as he had access to (and should have reviewed) the new FOIA evidence included with this petition. Specifically, Norris lied when he stated “TB2 retained its functionality through discovery to include the ability to follow where his IP and browser navigated while on TB2”. Norris knew (or should have known) that TB2 had no such native functionality. Norris also lied many times in his Cottom Cannot Show Innocence section. For example, Norris said: “The government’s evidence comes from those logs, including apache logs which were addressed during the Daubert hearing.” This specific lie is proven by Exhibit G, where Becker states: “As we previously informed you via e-mail on June 16, 2015, Apache logs were not utilized to correlate website and NIT data” (emphasis added). Norris cannot claim that he didn’t have access to Exhibit G. Since that false statement was “objectively material”, the Court must rule that it was perjury. Norris also made a ridiculous claim about a REKONQ browser having navigated TB2. Norris should have known that a user agent string (in this case REKONQ) is not an identifier; because, it is trivial to spoof, is not unique, has no chain of custody and is not tamper proof. SO, it was legally indefensible for Norris to indicate to this Court that the REKONQ agent string provided any evidence in favor of upholding Cottom’s conviction. Worse, as will be discussed below, Norris was required to know that TB2’s visitors table was completely fabricated by an FBI contractor named Dr. Matt Edman (“Edman”) and thus was fraudulent. Therefore, it was Brady/Napue material and he was required to admit it was fraudulent.
Case No: 23-3131
On September 21, 2023 Cottom filed another MOTION FOR PERMISSION TO FILE A PETITION FOR A SECOND OR SUCCESSIVE §2255. This time the government dropped the completely incorrect factual arguments Norris proffered BUT kept the same headings (i.e evidence is not new and Cottom cannot show innocence).
While making those new factual arguments under the same headings, AUSA Tessie Smith (“Smith”) had access to (and was required to review) the FOIA obtained documents included with this petition. Therefore, she objectively committed perjury when she stated that the 2016 academic report (Exhibit E) was “mere impeachment evidence” against Cottom’s experts.
In sum, AUSA Smith knowingly mischaracterized the fundamental flaw of fabricating evidence against Cottom as “impeachment evidence”. AUSA Smith was required to know that there is a huge difference between impeachment evidence and fraudulent evidence. In other words, AUSA Smith made this knowingly false statement: “the expert’s 2016 report contradicts their 2015 report, but that just means that the experts were unreliable, not that the government’s evidence was invalid.”
ASUA Smith was legally required to read and understand Exhibits C – E, forcing her to admit that Tinyboard’s (TB2) logging system was a fraud. She was REQUIRED to admit that Exhibit C proved beyond a reasonable doubt that Tinyboard’s source code didn’t issue session ids to clients and didn’t have a visitors table. Therefore, the issue of TB2’s log was not interpretive or a typical matter of expert opinion; it concerned the objective, factual and binary (YES/NO) answers to three questions: Does Tinyboard issue session ids? NO. Does Tinyboard have a visitors table? NO. Does Tinyboard track visitor activity in any way? NO.
SUMMARY OF ARGUMENT
This habeas petition isn’t about expert opinion or expert mistakes. This is about the government (and all the experts) specifically making knowingly false statements about TB2’s log that egregiously violated Cottom’s constitutional right to a fair trial.
It is undeniable that under Napue v Illinois, the government may not knowingly use false testimony or allow it to go uncorrected. The false testimony committed by Becker and the experts about TB2’s log is material because that fake log was used to identify and attribute criminal activity on TB2 to Cottom. The exhibits prove, beyond an reasonable doubt, that Becker and the experts knew that Tinyboard (TB2) did not have a visitors table. Therefore, they chose to falsely declare that TB2 had a native visitors table and issued real session ids. That means that Becker and the experts committed perjury on August 3, 2015 (at the Daubert hearing).
It is indisputable that the government’s habeas attorneys (MICHAEL P. NORRIS (Case No. 22-2050) & TESSIE L.S. SMITH (Case No. 23-3131) had clear and unequivocal obligations under Brady v. Maryland, Giglio v. United States, Napue v. Illinois and DOJ policy to admit that TB2’s log was FAKE, even though Becker corruptly (See Exhibits H – J) got Cottom’s defense counsel to narrow the Daubert motion’s “scope” to the FALSE premise that the NIT was just a Flash Application on TB2 (See Exhibit A ¶ 19-31).
ARGUMENT
A.TB2’s fake session ids were made to resemble Pedoboard’s to deceive laypersons
Exhibit C (previously submitted as an Exhibit in Cottom’s 22-2050 & 23-3131 petitions) still proves beyond a reasonable doubt that Tinyboard (the software that ran TB2) didn’t natively issue session ids to visitors, didn’t have a visitors table and didn’t log visitor activity in any way. That means that Becker (and ALL subsequent AUSAs) allowed the FACT that Edman inserted a “visitors” table into Tinyboard’s MySQL database to go (illegally) “uncorrected”. In other words, Becker and the AUSAs have perjuriously allowed Edman’s visitors table to be presented as a native TB2 log to the Court(s) – Brady/Giglio/Napue forbids that.
Specifically, Edman’s fabricated visitors table had the following columns that contained falsified evidence: “session_id” , “request_uri” & the “request_headers” referer. Those columns contain false evidence/data because Edman coded a php script (gallery.php) to populate two of those columns (session_id & request_uri) with totally FABRICATED information. The fake information Edman programmatically inserts into the request_uri column causes the actual referring page to be DELETED and replaced with a FALSE entry (i.e evidence tampering).
Worse, Edman coded gallery.php to generate FAKE session_ids that deliberately looked like PHPBB’s (Pedoboard’s software). He achieved that deception by generating a random 32 character hex string. Edman also loaded gallery.php with a query string that falsified the data in the request_uri column. Those two intentional forgeries forensically invalidated the entire visitors table and made any testimony concerning the veracity of those columns perjury.
Therefore, Edman’s fabrications constitute deliberate evidence forgery. The Court must not allow the government’s responding AUSA to ignore this FACT again. This WAS NOT a “misleading interpretation” or similar “harmless” error. Edman’s TB2 log was an intentional creation of false digital evidence to fabricate evidence of criminal activity.
In sum, Edman didn’t code those fake session_ids to look like real PHPBB session ids by accident. Edman did it to make sure that TB2’s session_ids looked similar to Pedoboard’s session_ids. Edman did that to create the illusion that the sessions_ids on both websites were evidentiary equivalents, that could be used to link website activity to the IP addresses revealed by the identical Flash applications. Thus, the fake session ids on TB2 prove that Edman crafted that illusion on purpose. That means his deception was achieved via “technical sophistication” – with the specific intent to deceive the Court, the Grand Jury and the TB2 defendants about the veracity of TB2’s log.
The government’s ongoing and deliberate concealment of Becker’s FAKE visitors table requires VACATING Cottom’s conviction; because, their knowing concealment of falsified records (by itself) is a case dispositive offense. However, it gets much worse. The misconduct uncovered by the newly discovered e-mails (Exhibits H, J & M) will shock the conscious of this Court.
B. Joe Gross (“Gross”) & Joe Howard (“Howard”) were egregiously disloyal to Cottom
Exhibit J (pp. 7-8) provides newly discovered evidence that – on October 8, 2014 – Gross was loyally advocating for Cottom when he wrote: “Keith, I am preparing a motion under Daubert to challenge the admissibility of the technology supporting the NIT and do not want to make unnecessary work for either of us. Here, I am talking about formal discovery requests … Please provide or produce the following information…”. As explained above, this discovery request – if Becker responded truthfully – would have ended the case against Cottom, so Becker lied (See Exhibit D).
Exhibit J also proves that (after October 8th) Becker embarked on a persuasion campaign to convince a technologically ignorant Gross intothinking (wrongly) that the NIT on TB2 was just a Flash application (Debunked by Mercuri – See Exhibit N). Becker also introduced a red herring argument to distract Gross from the TB2 fraud. Becker’s distraction consisted of claiming that they had found contraband on Cottom’s Linux computer. However, Becker knew (in 2014) that the NIT on TB2 wasn’t just a Flash application and that they hadn’t found any contraband on Cottom’s Linux computer that could be attributed to him. (Note: Becker deceptively uses the NIT as an alias for the Flash Application (gallery.swf) repeatedly. See Exhibit A ¶ 28-30)
The newly obtained emails prove that Becker had lied so much after October 8, 2014 until December 31, 2014 that Gross now “trusts” Becker to help him “understand the evidence” that the government had against Cottom. That unethical betrayal had grown so egregiously inappropriate over those two months that Gross felt it was OK to write this ridiculously disloyal message about Cottom to Becker on December 9, 2014; “Keith, Thanks for the email yesterday. I was out of the office … Otherwise, I’d have expressed appreciation yesterday. I spoke with Dan Meinke this afternoon and he’s located a few but not all of the images. He explained that what he has found is not in thumbnail format so I continue to build a stronger basis of facts hopefully to direct and control my client. Really appreciate your help (emphasis added – Exhibit J p. 1).”
The Court must agree that the images Becker erroneously claimed to have been on Cottom’s device were an irrelevant distraction. Becker inserted it into the discovery process to distract Gross from the case dispositive problem of TB2’s log (visitors table) being FAKE. Furthermore, there was substantial circumstantial evidence that the cache files (that must be carved to be viewed) were planted by the FBI’s triage tech on April 9, 2013 (AUSA Norris admitted that SA Couch’s warrant execution was improper in his 22-2050 reply brief, but argued that it didn’t warrant suppression). Cottom had also asked the government (through Gross) for the triage X-Ways log file (that Cottom knows should have been generated by default on April 9, 2013). Gross told Cottom that Norris said it didn’t exist. But Norris had persuaded Gross not to challenge it; because, they were only going to use the NIT evidence (at that time undefined) at trial. That turned out to be another lie, as Becker used this knowingly dubious evidence to obtain a second indictment in the WDNY in April of 2015. Cottom believes that the Court should make an adverse inference about the WDNY indictment within this context. It should see it as Becker’s corrupt – and pathetic – attempt to coerce Cottom into dropping his Daubert challenge to the NIT on TB2.
Regardless, Exhibit I proves that Gross joined Becker’s team after Exhibit J’s email chain. To that unconstitutional end, Gross secretly hired (without the advice or consent of Cottom) Podhradsky’s team to examine the NIT based on Becker’s lies about it just being a Flash Application.
It is clear why Gross didn’t inform Cottom that he had hired Podhradsky’s team to “reverse engineer” the NIT until they were on their way to the FBI facility in Omaha in January of 2015; because, he knew that Cottom vehemently opposed reverse engineering the NIT (aka Flash Application). Gross refused to understand why (See Exhibit N); because, Becker had convinced an ignorant Gross into thinking that the NIT was “just” a Flash Application. However, Cottom (and Mercuri) knew Becker’s assertion was objectively false (See Exhibit A ¶ 19-21).
When Cottom got their first report, he immediately noticed that it was for the wrong server (Pedoboard) and parroted Becker’s nonsense about the NIT just being a Flash application. Bottom line, Cottom was furious with “his” CJA team (See Exhibit I). They had deliberately & corruptly accepted Becker’s nonsense about the NIT just being a Flash Application despite direct and indisputable evidence to the contrary. That was a MAJOR ACT OF SABOTAGE; because, accepting that FALSE premise allowed them to completely ignore the fraudulent log on TB2 for their first report (January 2015). After realizing their intentional sabotage of Cottom’s case dispositive defense strategy, he requested that Gross be removed as his CJA so that Podhradsky’s corrupt team could be fired with him.
Howard was appointed as Cottom’s new CJA in February of 2015. Cottom ordered him to fire Podhradsky’s team for examining the wrong sever on purpose and parroting Becker’s Flash Application nonsense. Howard ignores Cottom’s requests from February to April 2015. Since Becker didn’t know if Podhradsky’s corrupt team would remain on the case, he fraudulently obtained a backup indictment. After Becker obtained the WDNY backup indictment, he immediately contacts Howard (instead of WDNY counsel Steven Slawinski) requesting to transfer it to NE and begin plea negotiations. Cottom refuses both requests and tells Howard that Becker got the WDNY indictment because he’s afraid Podhradsky corrupt team will be fired. Cottom again orders him to fire her team and hire Dr. Mercuri’s team – who agreed to work for less money and had more criminal experience (See Exhibit N). Howard refuses and tells Cottom that he’ll have to use Podhradsky’s team to examine TB2. Newly obtained emails prove that Howard then knowingly facilitated the complete breakdown of the adversarial process (See Exhibit H) in direct violation of Cottom’s constitutional rights.
C.Howard & Podhradsky’s Team Ensured that No Adversarial Testing Occurred
Exhibit Hshows a criminally improper email chain between Podhradsky’s team and Becker’s team in June of 2015. For Context, on Friday June 5th Podhradsky’s team was hosted by FBI Special Agent Jeffrey Tarpinian to examine TB2’s server. The improper email chain began on Monday June 8th. It was mostly blacked out, so it isn’t included in Exhibit H; it read:
From: Podhradsky, Ashley [(b)(6) (b)(7)(C)]@dsu.edu
Sent: Monday, June 08, 2015
To: Joseph Howard; [(b)(6) (b)(7)(C) (b)(7)(E) per FBI] (OM) (FBI)
Subject: Fwd: 060515 USA v Cottom et al
Hi [(b)(6) (b)(7)(C) (b)(7)(E) per FBI]
Thanks for hosting us on Friday. As we work though our work and write the report a few questions have come up. Are you able to respond to them below?
Thanks Ashley
A few questions for the FBI.
[A full page of black out follows – redacted 7E per FBI]
This email was criminally improper because they couldn’t have had any legitimate adversarial questions for the FBI AFTER they examined TB2’s server. In other words, they were not discussing permissible things like logistics or scheduling AFTER they examined the server. To be blunt, the only thing to discuss was TB2’s FAKE logging system.
The next email in this criminal chain occurred at 11:16AM EDT on June 9th. It’s From: Becker and To: Howard with Podhradsky CC’d. As anyone can see, everything about this message is constitutionally improper. The next message From: Podhradsky To: Becker occurs at 12:26PM and includes references to missing correspondence where Matt (a member of Podhradsky’s team) has improperly answered FBI questions. Direct evidence of this improper communication comes from Podhradsky clearly writing: “Below are responses to the questions posed by the FBI team…” (emphasis added). This criminal chain ends around 9PM with Becker declaring “Thanks for the clarifications… Let us know if you have any issues with that.”
To understand how egregiously criminal this email chain was, you have to understand the context. These emails occurred AFTER Podhradsky’s team examined TB2’s server, WHILE they were writing their report about it. There were no adversarial questions Podhradsky’s team and the FBI team could have been asking each other at this time. While it may seem complex to laypersons, the analysis at this time was straightforward. They had already determined how the Flash Application worked in January of 2015, so the only question at this time was the legitimacy of the logging system. As explained above, TB2’s log (visitors table) was FAKE. Therefore, this email chain confirms Becker’s conspiracy to hide that FACT from the Court. Specifically, Cottom dares the responding AUSA to argue otherwise, as this is an objective FACT, not argument. This email chain is the “smoking gun” for a textbook Cronic violation. It was perjury when they presented TB2’s log in their June 2015 “Court Report”; AND, it was scientific misconduct when they presented Figure 12 in Exhibit E, knowing the log was fake.
D. Keith Becker, Michael Norris & Tessie Smith knowingly violated Brady/Giglio/Napue
All of the government attorneys involved in Cottom’s §2255 litigation had a constitutional, ethical and professional obligation to proactively admit that Edman fabricated the logging system on TB2.
Failure to admit that, especially after Cottom specifically flagged the fraudulent nature of TB2’s log in ALL his §2255 petitions, constitutes Brady/Giglio/Napue violations so severe that it requires the Court to VACATE Cottom’s conviction with prejudice; because, all the government’s attorneys have engaged in willful misconduct to preserve the illegally obtained conviction of Cottom. This Court must rule that AUSAs Michael Norris & Tessie Smith willfully engaged in conduct involving dishonesty, fraud, deceit and misrepresentation in their respective briefs to this Court. As this Court knows, a prosecutor has a heightened duty of candor to the Court. This petition presents this Court with irrefutable evidence that Becker and both habeas AUSAs egregiously violated their duty of candor while also criminally ignoring their constitutional obligations.
As the Court can see in Exhibit G, Becker wrote the following (facts in []):
As we previously advised you via e-mail on May 26, 2015, you appear to misunderstand some of the data on the NIT report that was provided in discovery. The NIT report merely contains a summary of information collected from the TB2 server [fake visitors table] and data provided by the NIT [Flash Application] to the collection server [destroyed], which was compiled after TB2 was taken offline, for purposes of discovery in this case. We have provided or made available the source of the data in that report.
Therefore, the Court must rule that Becker knowingly violated Brady/Giglio/Napue by not admitting that TB2 didn’t have any native data to collect. In other words, Becker was required to admit that TB2’s log data was created / fabricated by Edman.
CONCLUSION / REQUESTED RELIEF
- Cottom requests sanctions against the government if they oppose this petition
Tessie L.S. Smith violated ABA Model Rule 3.3, 3.8, 8.4 when she submitted the “UNITED STATES’ RESPONSE TO PETITIONER’S MOTION FOR PERMISSION TO FILE A SUCCESSIVE PETITION” on October 25, 2023 (Case No. 23-3131). Specifically, she knew or should have known that this paragraph was perjurious:
Cottom’s claim that the experts’ academic publication proves that the experts “lied” and colluded with the government by “deliberately omit[ing] or concealing] case dispositive information” is without merit. The minute differences between the experts’ court report and their academic publication cannot establish that no reasonable fact finder would have found Cottom guilty. Indeed, the academic report substantiates and supports the reliability and validity of the FBI’s NIT and forensic evidence which formed the basis of Cottom’s conviction. To the extent that this publication would have conflicted with the testimony of any trial witnesses, it would be a matter of credibility for the jury to decide, not the complete exoneration Cottom alleges it to be. In summary, the May 2016 publication offered by Cottom does not go directly to the disproving the elements required for his conviction but merely to the weight and credibility of the evidence that would have been presented at trial regarding the NIT.
The Court must agree that AUSA Smith had access to and thus was required to know and understand the contents of Exhibits B – K submitted with this petition. Under ABA rules, Smith was not allowed to deliberately avoid facts in the DOJ’s possession that totally obliterated her factual arguments. (Again, just to reiterate, it is an objective FACT that TB2’s log was FAKE.)
Specifically, Smith was required to know that Becker had colluded with Cottom’s counsel and experts as proven by Exhibit H – newly obtained from FOIA litigation. This is especially true since she was able to view the un-redacted copy of that exhibit. Exhibit H’s dialog is not ambiguous or open to interpretation. When combined with the FACTS in Exhibits C & E, it provides direct proof of an illegal collaboration between Cottom’s experts and Becker to conceal Brady , Giglio & Napue exculpatory evidence.
As explained above in Section C, TB2’s log is not an expert opinion / interpretation issue about the NIT code on Pedoboard and TB2. It’s Becker (the government) deliberately lying about a material piece of evidence (TB2’s log) and procuring the help of Podhradsky’s team to keep that case dispositive lie concealed.
Therefore,Becker made material and knowingly false statements and omissions in HIS July 20, 2015 memo [Exhibit G] that Smith was required to read and understand within the context of Exhibits C & E. AUSA Smith was also required to know that the Court Report was dated June 5, 2015 but wasn’t finished until June 17, 2015; because, (as Exhibit H proves) Becker illegally helped them write the Court report. Becker dishonestly wrote in Exhibit G:
“Rather, the publicly-available code was configured to work properly on the pertinent websites and to return the specific information permitted in the search warrant authorizing the deployment of the NIT. Your speculation as to whether additional features or functionality existed or that there may be further information to contradict your experts’ findings amounts to a fishing expedition and does not entitle you to any further information. We are aware of our obligations with respect to Brady and Giglio as to these questions.” (See Exhibit G)
When Becker wrote that, he knew that he had persuaded Podhradsky’s team to confirm TB2’s fake logging system. In other words, he wrote that memo knowing that the only thing linking Cottom’s IP address to TB2 were Edman’s FAKE session_ids and his FAKE “visitors” table that Edman populated with mostly fraudulent information. So while being aware of his obligations, Cottom has proven with this petition that Becker criminally ignored them.
Therefore, if the government responds to this petition with anything other than words to the effect of “In light of the new evidence and in the interest of justice, the government does not oppose VACATING Cottom’s convictions”; Cottom requests the sanction of a “judicial finding of prosecutorial misconduct” and a referral of the responding AUSA to the Office of Professional Responsibility.
- Cottom requests granting this petition
Per the arguments stated above, Cottom respectfully requests that the Court grant this PETITION and order the District Court to VACATE Cottom’s conviction with prejudice.