bookmark_borderWhy no-one is talking

So my FOIA has produced some gems that confirm Keith A. Becker knew the case against me was over on November 10, 2014 when he lied to a direct question in relation to the NIT. In response to our question (why are the session ids different) Keith lied because the truth is they were fabricated by LE code, then place in a LE database. What they told the court was only true for the other websites. They said they added a flash file to the website that downloaded with each page. As I explained before TB2 fake visitors table is inadmissible at trial. I’ll let ChatGPT explain why:

conspiracy

bookmark_borderTime is up

DECLARATION OF Kirk J Cottom to Nebraska Counsel For Discipline

I, Kirk J Cottom, being of sound mind and over the age of 18, declare the following under penalty of perjury pursuant to 28 U.S.C. § 1746: 

RE: Joseph L. Howard of 1403 Farnam Street, Suite 232 Omaha, Nebraska 68102:

I. Overview

This declaration summarizes the extensive and layered constitutional violations, misconduct, and structural defects that occurred during my prosecution and post-conviction process, including the use of fabricated digital evidence, expert misconduct, prosecutorial collusion, ineffective assistance of multiple court-appointed attorneys, and the obstruction of my right to access my own case materials that contains evidence of all these violations.

II. Fabricated Evidence Introduced by the Prosecution

1. The central piece of evidence against me was a MySQL database table allegedly showing visitor traffic and session data related to an illegal website the government seized on November 15, 2012.

2. This “visitors” table was claimed to be a part of Tinyboard’s system (a PHP Website Program) — one of three servers involved in the case used. In 2013, the government claimed the table had logged user visits with PHP session IDs and in 2015 Podhradsky, Miller and Stroschein concurred in their reports.

3. Upon receiving this table in late 2013 discovery, I immediately noticed two technical defects:

  • The session_id values changed with every page load, which is inconsistent with PHP’s session_start() behavior.
  • The referer and request_uri fields were identical for each entry, a pattern inconsistent with normal web traffic and indicative of fabricated entries.

4. These anomalies strongly indicated that the data was a forgery — In other words, it was clear the data in the visitors table did not occur from any normal website functions.

III. Podhradsky, Miller and Stroschein’s Fraudulent Role

5. Podhradsky, Miller and Stroschein were retained by Attorney Joseph Gross to examine Tinyboard’s server, where the alleged MySQL table was stored.

6. Podhradsky, Miller and Stroschein inspected Pedoboard’s Server instead — a server that never contained the table in question.

7. In their January 2015 report, Podhradsky, Miller and Stroschein:

  • Claimed the session logic used was standard,
  • Did not find any anomalies (because the server they examined had no “visitors” table),
  • But inadvertently showed that that session IDs would not behave the way shown in the prosecution’s fabricated table (i.e Code showed the use of session_start).

8. When I confronted them with this error, Podhradsky, Miller and Stroschein admitted they had examined the wrong server.

9. Despite this, Joseph Gross used the report for the incorrect server to dismiss my objections and declined to challenge the authenticity of the visitors table, which at this point was being actively hidden by the government & Podhradsky, Miller and Stroschein.

10. Upon this disagreement Mr. Gross agreed to file a motion to remove both himself and Podhradsky, Miller and Stroschein, citing a total breakdown of communication.

IV. Joseph Howard’s Appointment and Continued Obstruction

11. The court granted the motion and appointed Joseph Howard.

12. I requested that Mr. Howard:

  • Terminate Ph.D Podhradsky, Mr. Miller and Mr. Stroschein
  • Hire Ph.D Rebecca Mercuri, who was less expensive
  • Properly examine Tinyboard’s Server.

13. Joseph Howard refused all requests, insisting on reusing Podhradsky, Miller and Stroschein, even though:

  • They had been discredited,
  • They had examined the wrong server (Pedoboard running on PHPBB),
  • They had already – likely – collaborated with the prosecution because the servers were clearly labeled, making their choice to avoid Tinyboard inexplicable.

14. Podhradsky, Miller and Stroschein then wrote their June 2015 report, now addressing Tinyboard, but:

  • Presented the fabricated MySQL table as legitimate,
  • Ignored publicly available website source code that contained no session logic and no visitors table schema for Tinyboard (the software that ran TB2),
  • Repeatedly misrepresented technical facts, like claiming actual PHP session id was used when they knew it was not.

V. Ex Parte Collusion Between Keith A. Becker and Podhradsky, Miller and Stroschein

15. Through 2025 FOIA litigation, I obtained heavily redacted emails showing that:

  • Podhradsky, Miller and Stroschein and the prosecutor were communicating directly while they were preparing their second report (that was full of lies that only benefitted the government),
  • The prosecutor was influencing the contents of what was supposed to be a defense expert report,
  • Joseph Howard was cc’d on these emails, but did not object or disclose the extent of the collusion to me or the court.

16. These heavily redacted emails confirm that their second expert report — the only one submitted to the court on my behalf — was in fact jointly crafted by the prosecution and the experts, with the silent approval from defense counsel.

VI. Post-Conviction Discovery of Fraud and Obstruction

17. After release from prison, I hired Mindfire Technology to independently examine Tinyboard’s software.

18. Mindfire Technology confirmed in a detailed report that:

  • No “visitors” table existed in Tinyboard’s Database Schema,
  • The website had no code to issue PHP session IDs or log visitor’s activities in any way,
  • Concluded that the visitors table was not a part of Tinyboard’s code base.

19. I attempted to share this report with Podhradsky, Miller and Stroschein and asked them to explain how they missed this case dispositive fact.

20. Podhradsky, Miller and Stroschein refused to engage, and Miller cc’d Joseph Howard in on his email rejecting my request to explain.

21. This further confirms that Podhradsky, Miller and Stroschein never worked for the defense — only for the prosecution — and that Joseph Howard continued to shield them even post-conviction, after conclusive evidence of the fabricated “visitors” table emerged.

VII. Joseph Howard’s Continued Stonewalling and Denial of Case File Production

22. On September 23, 2025 the request for my case file arrived by certified mail at Joseph Howard’s front desk. I requested my complete case file, including all communications and work product.

23. As of Noon on October 14, 2025 – Joseph Howard has refused to respond and has not provided the file — a violation of ethical duties and my constitutional right to access the record for post-conviction litigation – I currently have a FOIA case in progress that is producing bombshell after bombshell.

24. Joseph Howard also refused to answer basic questions such as:

  • Why he refused to fire Podhradsky, Miller and Stroschein,
  • Why he didn’t act on the anomalies identified by William Laubenheimer,
  • Why he and Steven Slawinski went against my orders to prepare for trial and instead negotiated a plea deal behind my back then coerced me into taking in the evening of July 30, 2015,
  • Why he allowed the prosecution and expert to coordinate behind my back.

VIII. Summary of Violations

Based on the above, the following constitutional violations and structural defects occurred:

1. Structural Sixth Amendment error under United States v. Cronic:

  • I had no adversarial testing of the prosecution’s key evidence (visitors table).
  • My “defense expert” co-authored a report with Keith A. Becker (sometimes quoting him directly while answering my questions in their second report).
  • My attorney allowed it, did not object, and blocked me from replacing the experts, knowing that’s why I had Joseph Gross removed.

2. Ineffective assistance of counsel (Strickland v. Washington):

  • All attorneys failed to investigate, challenge fabricated evidence, or act on exculpatory facts.
  • They obstructed my post-conviction efforts by failing to release exculpatory facts in my file to other attorneys working on my §2255 motion.

3. Denial of expert assistance (Ake v. Oklahoma):

  • I was never allowed to acquire an independent expert, even though several were available.
  • Joseph Howard forced me to rely on experts that were clearly working with the prosecution.

4. Due process violations:

  • Government used fabricated evidence (Mooney v. Holohan).
  • Knowingly false expert testimony (Napue v. Illinois).
  • Suppression of impeachment evidence (Giglio v. United States).
  • Denial of access to courts (Lewis v. Casey), by withholding my file.

5. Actual innocence:

  • Mindfire Technology’s forensic report proves the “visitors” table was placed there by the government and a subsequent report (made for an academic conference) by Podhradsky, Miller and Stroschein contains the actual code and proves everything stated above. The Visitors table was fabricated and populated with false data generated by a government coded php script.
  • The website’s code shows that Tinyboard never issued sessions or tracked visitors.
  • The prosecution’s central evidence (used to obtain TB2 indictments) was entirely fabricated.

IX. Conclusion

This case did not involve a fair trial, an honest expert, or an adversarial defense. I was convicted based on knowingly fabricated digital evidence, court-appointed experts who worked for the prosecution, and attorneys who blocked my ability to expose the truth even after the evidence of my innocence was clear.

I respectfully request the Counsel for Discipline to investigate these claims and order Joseph Howard to provide Kirk Cottom with his entire case file including all e-mails sent and received in this matter from January 2015 to October 2025.

____________________________

Kirk J Cottom

bookmark_borderIndisputable Evidence of Parallel Construction

As explained almost two years ago, Parallel Construction was used to prosecute me. “My experts” made numerous false claims about the NIT, which I’ve discussed many times before, but here are some new lies I’ve recently discovered thanks to recent documents I’ve received from the public defender’s office.

Ashley’s 2016 report (while much more accurate than her perjurious 2015 report) contains new deliberate lies. The one I’d like to discuss now is in Section 2.6 of her 2016 report, where she lies: “… the cornhusker log indicates that [the] DNS request was made via the proxy server and that data was not logged in this case.” Also remember that they refused to answer the simple question about the huge time gaps. My experts were PH.d holders or candidates at the time these reports were written and are today considered to be experts in their field, so the idea that they didn’t know that statement was a lie is preposterous, Because:

Flash could not make any connections (DNS or TCP/IP) through the proxy server! (In this case TOR). Worse, the time gaps are too long. How they claim the NIT worked “in my case” was that gallery.php was loaded in a hidden iframe located on a TB2’s html pages (in my case index.html and 1481.html). As I explained previously, that scheme intentionally scrubs the actual referring page from the fabricated “Visitors” table. Anyway, while gallery.php is making those bogus entries into the visitors table, it is also sending the browser javascript to load gallery.swf (the Flash App). The browser then loads Flash Player to execute gallery.swf. Flash Player ignores the browsers proxy settings and instead uses the OS networking stack (in my case Ubuntu 12.04LTS). Default DNS timeout settings were 10 seconds for each server or 20 seconds total, so that means the 39 & 63 seconds delays were impossible!

Even worse, the FBI forensic report for my Ubuntu machines clearly states that Adama’s home was unencrypted and its account was locked in the shadows file, while the other two accounts had encrypted home and unlocked shadow file entries. What does that mean? My Ubuntu Machine was Hacked or Tampered with… as the only way to lock an account is to be root (or have sudo) and type in a command in a terminal to lock the account.

That’s why no defense expert actually examined the machine, it would have been obvious that someone (FBI?) had tampered with the machine.

bookmark_borderI need more…

So I got this in the mail yesterday from Jeff Ciccone AFPD:

I am in receipt of your most recent letter dated September 16, 2025, inquiring about records relating to your prior federal case. Specifically, you asked whether I redacted code from an e-mail or if that code was already redacted. You also asked me to confirm that other e-mails were deleted by your prior attorney. I can tel you that I did not redact code or delete any emails. My previous letter to you contained all of the documents in the Federal Public Defender’s Office’s file that were responsive to your original request.

There are missing e-mails, the most crucial ones are from July 30, 2015 to December 2015. I mean it’s clear several emails are missing from the chain I posted. I think the times are messed up because the two lawyers were in different time zones. Steven’s in EST, and Joe is an hour behind him in CST. So I think the first email on the pages was actually received at the time indicated EST, but Joe sent it at 2:53pm. That’s the only way it makes sense for him to meet with the Judge and be back at 4pm CST, 5pm EST…

So the first e-mail in this chain is actually the last e-mail on the two pages. Joe sent it to Steven @ 2:08pm CST (which was 3:08 EST). Steven then replied to that message @ 2:11pm CST and then the last message in this chain occurred at 2:53 CST.

So, the subject of the first message (confirmed by the absence of RE:) is “Petition to Plead Guilty”. As I pointed out yesterday, Joe didn’t have permission to negotiate any plea deal and he alludes to this fact in the contents of this first missive. Joe also attached a pdf of the petition, that Steven deleted (see bottom of missive). Note that Joe is replying to an unasked question by begining with: I have not yet received the Plea Agreement. I suppose any time now, but in our district we must also file a Petition to Enter a Plea of Guilty. This trend of answering unasked questions will continue in this chain…

At 2:11 CST (or after having the petition for 3 minutes) Steven replies “It looks good … I’ll conference you in when he gets here”. My recollection of the events of that day contradict this narrative as I remember Steven e-mailed me around 4pm EST asking if I’d come to his office to discuss the case at 5pm EST, so he couldn’t have anticipated my 5pm arrival at 3:11pm EST… The last e-mail in this chain occurs 42 minutes later and we are clearly missing some communications between Steven & Joe; because, Joe answers an unasked question from Steven, “I have heard nothing…” and then asks Steven a question and he deleted his reply or answered Joe by phone…

One thing I noticed – during this ordeal – is that when lawyers are doing something illegal or unethical, they always do it verbally, either in person or on the phone…

bookmark_borderI Knew it… Two

I knew everything about the case against me was fraudulent; But, when your experts are conspiring with the prosecution, there is simply no way for you not to get railroaded. Note how I complained to Steven below about what I suspected happened (and now in 2025 know for a fact occurred):

June-26-2015

It you look on page 8 of the shills 2016 report you’ll see that the scenario above is mentioned for the first time in Section 2.7 # 2. They lied again when they claimed to have found no evidence that, that occurred. This is a lie because Figures 3, 4 & 5 (in their 2016 report) clearly shows the FBI code is intentionally scrubbing the actual referring page… The only reason to scrub the referring page is to hide its actual identity and the only reason to do that is to hide the fact that the FBI was literally “iframing” people for visiting TB2.