Indisputable Evidence of Parallel Construction

As explained almost two years ago, Parallel Construction was used to prosecute me. “My experts” made numerous false claims about the NIT, which I’ve discussed many times before, but here are some new lies I’ve recently discovered thanks to recent documents I’ve received from the public defender’s office.

Ashley’s 2016 report (while much more accurate than her perjurious 2015 report) contains new deliberate lies. The one I’d like to discuss now is in Section 2.6 of her 2016 report, where she lies: “… the cornhusker log indicates that [the] DNS request was made via the proxy server and that data was not logged in this case.” Also remember that they refused to answer the simple question about the huge time gaps. My experts were PH.d holders or candidates at the time these reports were written and are today considered to be experts in their field, so the idea that they didn’t know that statement was a lie is preposterous, Because:

Flash could not make any connections (DNS or TCP/IP) through the proxy server! (In this case TOR). Worse, the time gaps are too long. How they claim the NIT worked “in my case” was that gallery.php was loaded in a hidden iframe located on a TB2’s html pages (in my case index.html and 1481.html). As I explained previously, that scheme intentionally scrubs the actual referring page from the fabricated “Visitors” table. Anyway, while gallery.php is making those bogus entries into the visitors table, it is also sending the browser javascript to load gallery.swf (the Flash App). The browser then loads Flash Player to execute gallery.swf. Flash Player ignores the browsers proxy settings and instead uses the OS networking stack (in my case Ubuntu 12.04LTS). Default DNS timeout settings were 10 seconds for each server or 20 seconds total, so that means the 39 & 63 seconds delays were impossible!

Even worse, the FBI forensic report for my Ubuntu machines clearly states that Adama’s home was unencrypted and its account was locked in the shadows file, while the other two accounts had encrypted home and unlocked shadow file entries. What does that mean? My Ubuntu Machine was Hacked or Tampered with… as the only way to lock an account is to be root (or have sudo) and type in a command in a terminal to lock the account.

That’s why no defense expert actually examined the machine, it would have been obvious that someone (FBI?) had tampered with the machine.