bookmark_borderDread & Frustration

Ever heard the phrase “I’m sick of being sick and tired”? That describes most of my days. I’m so sick of the POS harassment officer being able to harass me. I’m sick of the shills (lawyers & experts) ignoring my questions, which makes it difficult to substantiate my railroading.

This is not a complicated case. A fraud occurred when the government, and my shill experts, made materially false statements regarding TB2, with the goal of coercing me into taking a conditional plea. All the perpetrators appear to silently acknowledge that this is what happened. This is the only reason that I can conjure to explain why they all ignore my very specific questions.

As I’ve explained in other posts, ALL of the evidence against me is fraudulent or insufficient. I now have an expert report that proves – beyond a reasonable doubt – the the sole evidence for the TB2 visit were fabricated and falsified computer logs. This means that the evidence for the initial (and only alleged) visit to TB2 was fraudulent.

That fraudulent evidence was then used to obtain an indictment with perjury about that fraudulent evidence. That fraudulent indictment was then used to obtain search and arrest warrants for my house and me. Those fraudulent warrants were then used to plant evidence and arrest me.

By the time I uncovered the conspiracy against me it was too late. On December 16, 2015 I tried to withdraw my coerced plea and was denied for undisclosed reasons.

bookmark_borderRailRoaded Part 2

First, To really understand my railroading you must read the 8th Circuit appeal decision regarding US vs. Defoggi (Case No. 15-1209).

The 8th Circuit – without comment – documents the lengths to which the government went to uncover, arrest and then convict a very bad man named Timothy DeFoggi and it reads like a spy novel.

In sum, Tim had several aliases he used to communicate with various individuals about legal and illegal topics. Tim had many legal contacts because he was the “acting” director of cyber security for the US Department of Health and Human Services. Tim also had many illegal contacts regarding his sexual interest in young boys. According to court documents in the Aaron McGrath case – On November 15, 2012 the FBI seized 3 servers (owned by McGrath) that they mysteriously found after allegedly getting a tip from a foreign government. These 3 servers hosted 3 illegal websites named PedoBook, PedoBoard & TB2 in Nebraska.

After seizing his servers the FBI ran them for about 3 weeks to try to determine their users. To this end, the FBI used a “Network Investigation Technique” (NIT) and obtained an invalid warrant in “good faith” to deploy it. (See playpen litigation if interested in the illegality of the NIT Warrant. This topic is more complicated than the playpen litigation because the DeFoggi operation was the NIT’s first use; BUT, none of the attorneys involved asked the question: “Can a Magistrate in Nebraska issue a warrant for NE and elsewhere?” In 2012 that answer was “NO.”, so none of the attorneys asking this question suggests conspiracy.)

Anyway, according to the 8th Circuit, Tim registered on McGrath’s Pedobook on March 2, 2012 with the username “fuckchrist” and the display name “ptasseater”. (Note those two highly identifiable names as you read on.) And this is where things get interesting. First, according to the 8th Circuit’s account, the dates don’t match up. They say he created his Pedobook account on March 2, 2012 but they recite that the FBI’s warrant affidavit states he created the account on or about April 18, 2012. They then say the FBI used Pedobook’s logs to document all the illegal activity conducted by “fuckchrist” on Pedobook. Next, they recite how the FBI connected Timothy to that username and it is, IMO, not technically credible.

Again, in sum, the NIT – allegedly installed on Pedobook – did not work against Tim. So there was no “direct” link from Tim to that site. The court accepted the dubious contention that the FBI connected Tim to these aliases without skepticism. I’m skeptical because the FBI’s claims are technically incredible. They claim that another person under investigation had provided them with information about a person who went by the name of “Jeff” on a site called boylover.net AND that this “Jeff” person used a variety of e-mail addresses including “ptasseater@hotmail.com”. The FBI then used the IP address associated with that hotmail account to get a wiretap on it. The court then recites that the FBI’s informant also provided them with a cell phone number for “Jeff” and told them he had personally met him. The informant then went “undercover” for the FBI and met with Jeff in person. During that meeting – under FBI surveillance – Jeff admitted that his real name was Tim, and that he worked in DC, and that he had a security clearance, and had a boyfriend. The FBI claims to have also had an undercover employee working on Pedobook who was talking with “fuckchrist” and he told him the times he’d be “online” and that his tor-mail account was fuckchrist@tormail.org.

So let’s break this down. According to court documents, on October 26, 2012 the FBI obtains a warrant to deploy malware against Aaron McGrath after a foreign country locates the actual IPs of the three TOR servers in Nebraska and tells the FBI. Again, according to court documents, this malware was serendipitously installed by undisclosed means. As a result of this operation, Aaron McGrath’s servers were seized on November, 15, 2012. The FBI then obtained “void ab intio” warrants in “good faith” to install malware on his three servers to identify their users. This operation was called “Operation Torpedo” and netted the government 15 suspects. However, as mentioned above, their malware – called the NIT – didn’t work against Defoggi’s computer, yet somehow he was arrested on April 9, 2013 with all the other suspects.

I described how my arrest went down in a previous post. Defoggi’s was quite different. According to the 8th Circuit, Tim’s arrest went down like this: they used a wiretap and waited for his IP to be on TOR (that’s all the wiretap could provide because of TOR’s encryption) at the time that “Jeff” told the FBI informant that he’d be online. They then burst into his house and forcibly pulled his laptop from his hands. Upon examination, it contained evidence linking him to those unfortunate aliases and other incriminating evidence.

Now, with all that background, we can discuss how this relates to my railroading. It is my position that the FBI breaks the law to enforce the law, which should be illegal but thanks to various SCOTUS decisions, is mostly legal. (See “pretextual” traffic stops) And when you break the law to enforce the law, – aka the end justifies the means law enforcement – you lose all credibility and morality. (For the most glaring example of this, see the Baltimore Police Department) And that’s how people get railroaded. Many people believe that our government is corrupt, but somehow those same people think that the DOJ is somehow exempt from that corruption, obviously they’re wrong.

The first sign of government corruption, is the refusal to answer questions. This has happened in my case numerous times. Several times in 2014 & 2015, I asked my attorneys “Can a Magistrate in Nebraska issue a warrant to search a computer in NY?” They all ignored the question. When I asked them after the 2016 Playpen rulings – that decided that the answer to my question was NO! – none of them replied. I asked my 3 shill experts [these] 6 questions and they all refused to answer; one said it wasn’t her fault, another said “don’t contact me again” and the other ignored me. I asked one lawyer, Mr. Howard, why he didn’t fire the shills and hire Dr. Mercuri – no reply. I asked another why he challenged the NIT – in a case he handled after mine – on the Magistrate issue and he said he wouldn’t answer my questions unless/until a court ordered him to do so.

The second sign of corruption is lying to avoid defeat. As explained in previous posts, my case was over in November of 2014 when I challenged the NIT based on two anomalies I found in the NIT report used to indict me. On page 2 of the report it shows two session ids that are different when they should be the same. It also shows that the referring page is the same as the current page. Both anomalies indicated fraud. Mr. Becker should have dropped all charges against me at this point, but because he’s corrupt he chose to lie when attempting to explain these two anomalies. When called on his lies, he doubled down instead of folding.

This kind of corruption is the most heinous in my opinion, not just because of what it’s done to me, but because it’s a flagrant abuse of power. If respected government agents lie to a court during a Criminal proceeding, it’s Kafkaesque. How do you fight government lies? Especially when the experts supposed to be on your side are lying in concert with the government. I understand that the technology at the center of this case is complex to “lay people” BUT it’s NOT complex for computer experts as skilled or higher skilled than I. And the things that both parties lied about in my case are so obviously lies, I cannot fathom how my case is still valid. (Something the 8th Circuit should rectify soon). The lies are so obvious to tech people that I can only explain them by conspiracy.

The first lie is absurd on its face – well technically absurd -; they claimed that “the NIT was a flash application”. Simple logic proves this incorrect, as at a minimum, three parts would be required for the NIT to identify the actual IP address of a TOR user. This lie was needed to further the government’s false narrative and hide the fact that, in the case of TB2, the government lied to the grand jury about the admissibility and veracity of the NIT evidence. In other words, the NIT, in the case of TB2 didn’t provide any evidence of a crime and any testimony claiming that it did was perjury.

The next lie was more subtile. The government claimed that TB2 issued session ids to clients & tracked visitor activity in logs. Both claims were blatant lies BUT they were supported by my experts. Because of their misconduct I now refer to them as government shills (“shills”). As the “new” expert report now before the 8th Circuit proves; TB2’s software (Tinyboard) doesn’t issue session ids to clients or track their activity in any way.

The third lie was their most credible upon first glance but falls apart upon close inspection. They claimed to have found “suspected” images on two devices out of the seventeen they stole from me on April 9, 2013. First problem with this claim is that both devices are the operating system drives for the computers in question. The next problem is that MOST of the SUSPECTED images are in locations inaccessible to humans without special software. In other words, you cannot see them without forensic software AND the ability to carve them out of unallocated space. The remaining images were discussed in a previous post, i.e. planted by the FBI forensic tech while at my house on April 9, 2013. (Note these additional “images” are ALL thumbnails in a hidden directory created by the linux operating system in Adama’s somehow unencrypted home directory. According to the FBI ALL the thumbnails have meta data that indicate the images they represent were are on a truecrypt volume that the FBI did not find.) Therefore the suspected images are not credible, considering the FBI didn’t describe a single image. The only government agent to describe an image regarded my stolen PS3, which had a picture of Yoona on it. They described her as an asian female of 16 or 17 years old. That, of course was perjury. Yoona in the picture in question was 23 years old. That claim alone proves they have no idea what they’re talking about when it comes to the actual ages of women in images.

bookmark_borderRODRIGUEZ v. UNITED STATES

We are approaching lawlessness on the part of the courts in a way that has not been seen before. First the Fifth Circuit defied the Supreme Court on abortion issues, now here comes the Eighth Circuit blatantly ignoring the Supreme Court’s RODRIGUEZ v. UNITED STATES decision. As techdirt explains, this is such a clear violation of precedent the SCOTUS should reverse instantly; BUT, techdirt failed to notice that RODRIGUES was decided 6-3 in 2015, thus if the court was similarly constituted as it was in 2015 this decision would have been met with a “bitchslap” from the SCOTUS. Unfortunately, 3 of the 6 are gone – Ginsburg, Scalia, Breyer – with Roberts, Sotomayor & Kagan remaining. That means for this ruling to be reversed one of the 3 Trump appointees – Gorsuch, Kavanaugh or Barrett – would have to join Roberts, Sotomayor, Kagan & Jackson. (Jackson will replace Breyer next term and supports the RODRIGUEZ decision).

BUT first Felipe Noriega, (United States v. Felipe Noriega, Jr., No. 21-1421 (8th Cir. 2022)) will have to seek SCOTUS review & they’ll have to grant it. This will be a case to watch, as it’s fundamental to curtailing our current “police state” where the “ends justify the means”.

bookmark_borderExoneration Frustrations

What’s frustrating is how many lies were told and how hard it is to address them as a convict. When you accuse the government of fabricating, falsifying and planting evidence, in this case planting hidden files in an encrypted directory that is now somehow unencrypted, everyone rolls their eyes… even though it’s the only explanation.

Fraudulent Indictment

On March 20, 2013, the government obtained a John Doe indictment against Kirk Cottom for visiting a site named TB2 on the TOR network. My petition soon to be before the Eighth Circuit, proves – beyond a reasonable doubt – that the indictment was procured with perjury about fabricated and falsified computer logs.

Planting Evidence

On April 9, 2013, when the FBI showed up at my house, they violated the knock and announce rule. That rule states that they must knock on your door and wait for an answer. When the “target” opens the door they must announce why they’re at your house. In this case, the FBI was required to announce they were at my house to execute a search warrant. Instead, in clear violation of this rule, they knocked and talked. This is the constitutional rule that when the FBI doesn’t have a search warrant they can knock on your door and try to talk you into allowing them to search. So I assumed they were on a knock and talk fishing expedition and talked to them; BUT, when they asked for permission to search, I asked them to leave.

That’s when they revealed that they had a search warrant. I told them they were required to tell me that at my door. They shrugged and told me to take it up with the judge. They then searched my linux computer’s 500GB Operating system drive. After about an hour of finding nothing, they opened my Windows Laptop and found my picture associated with an account named Adama on the Lock Screen. I thought “if these clowns come back in a few minutes claiming to have found something in the Adama account on the linux box I’ll know the fix is in…”

Sure enough, a few minutes later they claim to have found images in Adama’s home directory. I exclaim “bullshit!” For two reasons: 1) The Adama account on the linux box was NEVER used. AND 2) The home directories for all three accounts Kirk, Simon and Adama were encrypted, so it would be impossible to find any files in any of the home directories.

About a year later, I get the forensic report from the FBI and it states that Kirk & Simon are encrypted BUT Adama isn’t. The FBI tech notes that the Adama account is locked by the operating system. I tell my lawyer this is because the FBI over-wrote Adama’s encrypted home directory, when the FBI tech booted the image of the tampered with linux system, it noticed the now unencrypted Adama account and locked it. My lawyer ignored me and no-one besides the FBI tech ever examined the drive.

bookmark_borderStandard Online Legal Declarations

The information provided from and through this site is provided “AS-IS”, “AS AVAILABLE”, and all warranties, express or implied, are disclaimed (including but not limited to the disclaimer of any implied warranties of merchantability and fitness for a particular purpose.) The information may contain errors, problems or other limitations. Our sole and entire maximum liability for any inaccurate information, for any reason, and users sole and exclusive remedy for any cause whatsoever, shall be limited to the amount paid by the customer for the information received (if any). We are not liable for any indirect, special, incidental, or consequential damages (including damages for loss of business, loss of profits, litigation, or the like), whether based on breach of contract, breach of warranty, tort (including negligence), product damage.

The limitations of damages set forth above are fundamental elements of the basis of the bargain between US and YOU. We would not provide this site and information without such limitations. No representations, warranties, or guarantees whatsoever, are made as to the accuracy, adequacy, reliability, currentness, completeness, suitability or applicability of the information for a particular situation.

All responsibility and liability for any damages caused by viruses or malware contained within the electronic files of this site are disclaimed.

bookmark_borderThat’s Suspicious

So on March 27, 2022 I sent a message to the lead shill in my case, Dr. Podhradsky. I asked her these six questions:

  1. When and how did attorney Joseph Gross Jr. involve you with my case?
  2. Why did you examine the wrong server for your first report in January of 2015?
  3. Why did you parrot the government’s lie that the NIT was just a flash application?
  4. When and how did attorney Joseph Howard involve you with my case?
  5. Why did you lie about Tinyboard software in your June [2015] report?
  6. Did you communicate about this case with Keith A Becker?

Last week I received her reply. It said words to the effect of “It’s not my fault, contact Dr. Miller” and she gave me his possible contact info. I e-mailed the info@company.com address to see if they could put me in contact with Dr. Miller. Much to my surprise, I got a reply that same day from his company e-mail account. I sent him a pdf of the letter I sent Dr. Podhradsky with some elaboration in the e-mail. He responded:

If you have time, you could give me a phone call and maybe I can clear up some of the points in here that may be confusing.

Dr. Matt Miller

I responded that I didn’t think a phone conversation would be productive and would he please answer my 6 questions. (and perhaps two more). He responded:

Dear Kirk Cottom,
Post conviction appellate concerns are typically handled by counsel and I will refer you to counsel who saw you this far in the process. I have included Joe Howard on this email so he is aware of your attempt to contact me, and I appreciate that you will not contact me again, unless through counsel. Any further and continued efforts will be met by legal action. Thank you.

Dr. Matt Miller

Maybe it’s just me, but I find this response suspicious…

bookmark_borderNY Law About Employment and Convictions

An employer in NY state who employs 10 or more employees may not refuse to hire an applicant based on a prior conviction unless hiring the applicant would pose an unreasonable risk to property, or to public safety, or the conviction bears a direct relationship to the job. The law defines a direct relationship strictly to mean that the nature of the criminal conduct underlying the conviction has a direct bearing on the applicant’s fitness or ability to perform one or more of the duties and responsibilities that are directly related to the job.

An employer that considers an applicant’s prior conviction must look at these eight factors:

  1. NY State’s public policy to encourage the hiring of those who have been
    convicted of crimes.
  2. The duties and responsibilities that are necessarily related to the job.
  3. Whether the conviction has a bearing on the applicant’s ability to perform
    those duties and responsibilities.
  4. How much time has passed since the conviction.
  5. How old the applicant was at the time of the offense.
  6. The seriousness of the offense.
  7. Any information the applicant provides about his or her rehabilitation, and
  8. The employer’s legitimate interest in protecting property and the safety and
    welfare of individuals and the public.

An employer, who decides not to hire someone based on a criminal conviction must, upon applicant’s request, provide a written statement of the reasons for the decision. That statement must be provided within 30 days of the request.

bookmark_borderDOJ Corruption

So I’m an avid reader of Techdirt.com and they are no fan of the DOJ, like me. And I found these gems to bolster my corruption theory.

Justin Shafer, was persecuted by the DOJ from 2016 to 2018. As you can read in the article, the coerced him to plead guilty to a misdemeanor so they could save face for persecuting him.

Techdirt has also extensively documented the shenanigans of the FBI, in their pursuit of incompetence.

If you have any doubts about there incompetence, just read these pages and remove them.

bookmark_borderFalse Narrative

This Table:

Figure I

Does Not Support the Government’s Narrative:

On November 18, 2012, a user with IP address 69.207.147.71 accessed “Website A” and was presented with different sections to choose from and access further, including, but not limited to the following: “pre-teen boys”, “teen-aged boys”, “teen-aged girls”, “babies/toddlers”, and “fetishes”. The user with IP address 69.207.147.71 selected the section “PT girls”. After selecting the “PT girls” section, the user with IP address 69.207.147.71 was presented with the webpage with the title “/girls/pt girls” at the top of the page. Several board image threads were displayed on that page including thumbnail images from various threads. One of the threads, thread “1481”, had the subject title “finger bum girl” and displayed three thumbnail images from that particular thread. The images displayed included images with the file names dsc03248, dsc03286 and dsc03287. The images ending in 286 and 287 are close up pictures of a prepubescent vagina being digitally penetrated. The thread could be accessed by either clicking on the link to the thread with the subject “finger bum girl” or by clicking on one of the three images displayed. The user with IP address 69.207.147.71 then selected the 1481 thread with the identified subject, “finger bum girl”, and accessed a webpage that contained all the images available on that thread, consisting of over thirty pictures of a young girl, with many of them containing images depicting sexually explicit conduct. All the pictures would have appeared once the user clicked the 1481 thread with the identified subject, “finger bum girl”, or clicked on one of the three displayed thumbnail images.

Therefore, the conviction is invalid and is why I’m still litigating the matter today.