bookmark_borderExhibit H

So, I want to break down the main evidence for my newly filed petition, EXHIBIT H, posted below (and in another post). It consists of 4 pages, two of which are mostly blacked out. I got this document from the government AFTER I filed my FOIA lawsuit (still in “Summary Judgement” phase as I write this).

After not hearing from Joe Gross (my NE attorney) for over a month (late November 2014 until January 2015), he emails me in early January 2015 that; 1) he’s hired experts to examine the NIT without my advice or consent & 2) they are on their way to the FBI Omaha office as he wrote that email to me. My knowledge of the NIT at this time was that something was wrong with it; because, my session ids were different when they should be the same and the browser reported that the previous page is the current page. Both anomalies were HUGE red flags.

For clarity, remember that I was arrested on April 9, 2013 based solely on the evidence in the table on my about page. I immediately determined that table had two HUGE red flags, strongly indicating that the evidence was fraudulent. Joe Gross ignored that FACT for about a year as he pursued a dismissal based on the government’s Rule 41(f) violation. That litigation lasted until October 2014 – when the NE court denied the Rule 41(f) dismissal motion.

So, on October 8, 2014 Gross informed Becker (the POS prosecutor) that he intended on challenging the NIT via a motion called Daubert. As a preliminary matter, Becker had inserted into the discovery process a “declaration” that the “NIT” was a flash application on September 4, 2014. I rejected that assertion immediately, based on solid technical grounds. Becker tried to reiterate his nonsense on November 10, 2014 – I forcefully rejected it and Becker embarked on egregious prosecutorial misconduct.

Basically, I told Gross that Becker was lying about the NIT and Gross made it clear the Daubert challenge would continue. From November 10, 2014 until January 2015, Becker convinced Gross (proven by FOIA docs) that the NIT was just a flash application. Becker also introduced irrelevant accusations that they had found contraband on my Linux computer. I knew that accusation was also false, but Becker convinced Gross that it might be true and Gross began to deliberately sabotage my defense strategy.

So, in January of 2015 Becker had a HUGE problem, if a defense expert exposed the fraudulent logging system his team inserted into TB2 (the website I was accused of visiting) all of his Operation Torpedo prosecutions could be dismissed (not just mine). Becker (I suspect) somehow got Gross to hire Podhradsky’s team, who I call the “Shills”. In the middle of January, the Shills produced a report that focussed on the Flash Application and how it worked on Pedoboard (NOT TB2). It’s important to understand that the logging system on Pedoboard was legitimate and native and the logging system on TB2 was totally fake / fraudulent.

After I get their ridiculously biased report, I’m furious that they (Gross & the Shills) have deliberately sabotaged my case ending strategy by accepting Beckers Flash App nonsense. So, I – with the help of Gross – petition the Court to have Gross and the Shills removed from my team. The Court grants the motion and assigns Joe Howard BUT things get MORE corrupt, not less.

Howard was appointed in February 2015, so at that time Becker doesn’t know if his Shills will remain on the case. So Becker flies to Buffalo to get a second indictment against me. This was done for the improper purpose of getting me to end the Daubert challenge to the NIT. I refused, BUT Howard also refused to fire the Shills and hire Mercuri. So on May 18, 2015 the Shills write this:

Hi Jeffrey,
I wanted to touch base about our investigation outcome for the Cottom case. Long story short, my team and I found that the NIT was repeatable and Cottom had further questions he wanted flushed out as part of the investigation. Specifically they are attached. Mr. Cottom wasn’t happy with our analysis however the judge wanted my team to continue on for this case . . . .

As you can see, the Shills improperly shared my confidential opinion and their preliminary findings with Becker’s team. That was highly inappropriate act of sabotage, but was nothing compared to what they did in June of 2015.

Remember that the shills have already determined how the Flash Application worked in January, so their June task was to determine the authenticity of the logging systems. (There were two, one on TB2 and one on the server the flash app connected to). As I have proven, the logging system on TB2 was FAKE. That means that the legitimacy of the other logging system didn’t matter at that point because both must be legitimate for the system’s veracity to survive.

So, in this context, you can understand that it was imperative (from Becker’s perspective) for the shills to ignore that TB2’s log was FAKE. Keep that in mind when you read the 4 FOIA pages below. (Read them from Page 4 to 1). On pages 3-4, you’ll see that the lead Shill “Ashley” is writing “Jeffery” again (redacted for some illegitimate reason) on June 8, 2015. She thanks Jeffery for hosting her team on Friday June 5, 2015 and has a few questions for the FBI. This email is highly improper because at this time, there are no proper adversarial questions for the Shills to be asking the FBI. Remember, they already know how the flash app works, they are just analyzing the logging systems. This work is technically complex (analyzing php and python code) but easy for them. They had all the code and the technical skill to “decode” and test it, thus there were no proper adversarial questions to ask the FBI at that time, so we can strongly suspect collusion.

Then, the email chain gets worse on page 2. You can see it is from Becker, to Howard and Podhradsky. The smoking gun sentence is “Also, can Dr. Podhradsky let us know what information her team found/did not find on the data her team reviewed” Worse, on page 1 there is confirmation of illegal collusion where the Shills (Specifically Matt Miller) answered the FBI questions (the blacked out parts on page 2 below Becker’s questions on that page) and ends with Becker satisfied that they accomplished their illegal task of legitimizing TB2’s fraudulent table.

Colluison

bookmark_borderScorched Earth I Go

PRELIMINARY STATEMENT

Petitioner, Kirk Cottom (“Cottom”), previously petitioned this Court (Case No. 22-2050 & 23-3131) asserting that he was illegally prosecuted by DOJ Trial Attorney Keith A. Becker (“Becker”) from November 10, 2014 to now (as the DOJ’s disclosure obligations are “on-going”). When objectively analyzing the briefs & exhibits for Cottom’s previous petitions, there is a clear disconnect between the OBJECTIVE FACTS of the case and the FICTION the government keeps illegally promoting.

This petition will focus on reiterating – with newly discovered evidence obtained from FOIA litigation – that it is irrefutable that Cottom’s 23-3131 petition presented this Court with irrefutable and objective evidence that the prosecution of this case violated Cottom’s Constitutional rights per Napue v. Illinois, 360 U.S. 264 (1959), Brady v. Maryland, 373 U.S. 83 (1963) & United States v. Cronic, 466 U.S. 648 (1984); BUT, instead of GRANTING that petition – the Court apparently accepted the AUSA’s (TESSIE L.S. SMITH. #25828) knowingly false factual arguments against the merits of Cottom’s petition without skepticism. 

This petition will present the Court with indisputably “newly discovered evidence” obtained during a FOIA lawsuit in the Western District of NY (Case No. 23-CV-6307) that confirms that Cottom’s Defense Counsel (Gross, Howard & Slawinski) and Cottom’s Defense Experts (Podhradsky, Miller & Stroschein) joined Becker’s conspiracy to conceal TB2’s totally fabricated logging system. In other words, the cumulative effect of the misconduct perpetrated by the government’s attorneys (Becker, Norris & Smith), with the assistance of Cottom’s counsel (Gross, Howard & Slawinski) and Cottom’s experts’ (Podhradsky, Miller & Stroschein) in 2015 requires VACATING Cottom’s conviction for egregious due process violations.

ISSUES PRESENTED

  • Whether the newly obtained FOIA pages – produced only after litigation compelled their disclosure – constitute “newly discovered evidence” within the meaning of 28 U.S.C. §2255(h)(1) where the Department of Justice previously withheld them despite a clear duty to produce them when replying to Case Number 23-3131.
  • Whether the newly discovered FOIA materials establish that Becker knowingly relied on falsified digital evidence (the FBI created “visitors” table) and concealed that falsification from Cottom in violation of Brady v. Maryland, 373 U.S. 83 (1963).
  • Whether Becker’s knowing use—and failure to correct—fabricated evidence violated Napue v. Illinois, 360 U.S. 264 (1959), and thereby renders the conviction constitutionally invalid.
  • Whether newly obtained evidence proving that Joseph Howard; 1) allowed improper communications between Becker and Podhradsky’s team regarding the concealment of falsified evidence, 2) failed to disclose those improper communications to the Court or Cottom, and 3) coerced Cottom into an uninformed plea – constitutes a constructive denial of counsel under United States v. Cronic, 466 U.S. 648 (1984), thereby presumptively violating the Sixth Amendment.
  • Whether, viewed in light of the entire record, the newly discovered evidence and the proven collapse of the adversarial process establishes by clear and convincing evidence that no reasonable fact finder would have found Petitioner guilty, as required by §2255(h)(1).

INTRODUCTION

Thanks to Cottom’s FOIA litigation (2023 – 2026) – currently in the “summary judgment phase” – Cottom now has NEW evidence that his NE CJA counsel (Joseph Gross & Joseph Howard) and his NE CJA experts (Ashley Podhradsky, Matt Miller & Josh Stroschein) colluded with Becker to deliberately suppress case dispositive technical evidence (Brady/Napue material) that would have totally destroyed Becker’s case against Cottom et al (NE Case No. 8:13CR108). 

Becker, with the help of all expert witnesses (prosecution & defense) illegally omitted (perjury by omission) case dispositive evidence from the pre-trial Daubert hearing – held on August 3, 2015; because, it would have proved that Becker’s technical narrative, regarding TB2’s native data, was criminally FALSE. Becker’s perjurious conspiracy began on November 10, 2014 (Exhibit D) – when he began to actively suppress that TB2’s log was FABRICATED  and populated with knowingly FALSE information.

In other words, the Court must agree that fabricating evidence and presenting it as authentic to a Court is a case ending due process violation. New FOIA documents prove that Becker went a step further and created a textbook Cronic situation, when he persuaded Cottom’s defense team to help him conceal his due process / prosecutorial misconduct. 

This petition will prove that egregious due process violations have occurred in this case. The newly discovered evidence proves that Becker orchestrated the complete breakdown of the adversarial process. Exhibit H proves collusion between Becker and Cottom’s defense team. Exhibits D, H, J, L, M & N also proves that Cottom’s CJA attorneys and experts played an active / permissive role in the complete breakdown of the adversarial process. Those intentional constitutional violations require the Court to VACATE Cottom’s conviction with prejudice. 

APPELLATE HABEAS PROCEDURAL BACKGROUND

Case No: 22-2050

On May 19, 2022 Cottom filed a MOTION FOR PERMISSION TO FILE A PETITION FOR A SECOND OR SUCCESSIVE §2255. AUSA Michael P. Norris responded perjuriously, as he had access to (and should have reviewed) the new FOIA evidence included with this petition. Specifically, Norris lied when he stated “TB2 retained its functionality through discovery to include the ability to follow where his IP and browser navigated while on TB2”. Norris knew (or should have known) that TB2 had no such native functionality. Norris also lied many times in his Cottom Cannot Show Innocence section. For example, Norris said: “The government’s evidence comes from those logs, including apache logs which were addressed during the Daubert hearing.” This specific lie is proven by Exhibit G, where Becker states: “As we previously informed you via e-mail on June 16, 2015, Apache logs were not utilized to correlate website and NIT data” (emphasis added). Norris cannot claim that he didn’t have access to Exhibit G. Since that false statement was “objectively material”, the Court must rule that it was perjury. Norris also made a ridiculous claim about a REKONQ browser having navigated TB2. Norris should have known that a user agent string (in this case REKONQ) is not an identifier; because, it is trivial to spoof, is not unique, has no chain of custody and is not tamper proof. SO, it was legally indefensible for Norris to indicate to this Court that the REKONQ agent string provided any evidence in favor of upholding Cottom’s conviction. Worse, as will be discussed below, Norris was required to know that TB2’s visitors table was completely fabricated by an FBI contractor named Dr. Matt Edman (“Edman”) and thus was fraudulent. Therefore, it was Brady/Napue material and he was required to admit it was fraudulent.

Case No: 23-3131

On September 21, 2023 Cottom filed another MOTION FOR PERMISSION TO FILE A PETITION FOR A SECOND OR SUCCESSIVE §2255. This time the government dropped the completely incorrect factual arguments Norris proffered BUT kept the same headings (i.e evidence is not new and Cottom cannot show innocence).

While making those new factual arguments under the same headings, AUSA Tessie Smith (“Smith”) had access to (and was required to review) the FOIA obtained documents included with this petition. Therefore, she objectively committed perjury when she stated that the 2016 academic report (Exhibit E) was “mere impeachment evidence” against Cottom’s experts. 

In sum, AUSA Smith knowingly mischaracterized the fundamental flaw of fabricating evidence against Cottom as “impeachment evidence”. AUSA Smith was required to know that there is a huge difference between impeachment evidence and fraudulent evidence. In other words, AUSA Smith made this knowingly false statement: “the expert’s 2016 report contradicts their 2015 report, but that just means that the experts were unreliable, not that the government’s evidence was invalid.”

ASUA Smith was legally required to read and understand Exhibits C – E, forcing her to admit that Tinyboard’s (TB2) logging system was a fraud. She was REQUIRED to admit that Exhibit C proved beyond a reasonable doubt that Tinyboard’s source code didn’t issue session ids to clients and didn’t have a visitors table. Therefore, the issue of TB2’s log was not interpretive or a typical matter of expert opinion; it concerned the objective, factual and binary (YES/NO) answers to three questions: Does Tinyboard issue session ids? NO. Does Tinyboard have a visitors table? NO. Does Tinyboard track visitor activity in any way? NO

SUMMARY OF ARGUMENT

This habeas petition isn’t about expert opinion or expert mistakes. This is about the government (and all the experts) specifically making knowingly false statements about TB2’s log that egregiously violated Cottom’s constitutional right to a fair trial.

It is undeniable that under Napue v Illinois, the government may not knowingly use false testimony or allow it to go uncorrected. The false testimony committed by Becker and the experts about TB2’s log is material because that fake log was used to identify and attribute criminal activity on TB2 to Cottom. The exhibits prove, beyond an reasonable doubt, that Becker and the experts knew that Tinyboard (TB2) did not have a visitors table. Therefore, they chose to falsely declare that TB2 had a native visitors table and issued real session ids. That means that Becker and the experts committed perjury on August 3, 2015 (at the Daubert hearing).

It is indisputable that the government’s habeas attorneys (MICHAEL P. NORRIS (Case No. 22-2050) & TESSIE L.S. SMITH (Case No. 23-3131) had clear and unequivocal obligations under Brady v. Maryland, Giglio v. United States, Napue v. Illinois and DOJ policy to admit that TB2’s log was FAKE, even though Becker corruptly (See Exhibits H – J) got Cottom’s defense counsel to narrow the Daubert motion’s “scope” to the FALSE premise that the NIT was just a Flash Application on TB2 (See Exhibit A ¶ 19-31).

ARGUMENT

A.TB2’s fake session ids were made to resemble Pedoboard’s to deceive laypersons

Exhibit C (previously submitted as an Exhibit in Cottom’s 22-2050 & 23-3131 petitions) still proves beyond a reasonable doubt that Tinyboard (the software that ran TB2) didn’t natively issue session ids to visitors, didn’t have a visitors table and didn’t log visitor activity in any way. That means that Becker (and ALL subsequent AUSAs) allowed the FACT that Edman inserted a “visitors” table into Tinyboard’s MySQL database to go (illegally) “uncorrected”. In other words, Becker and the AUSAs have perjuriously allowed Edman’s visitors table to be presented as a native TB2 log to the Court(s) – Brady/Giglio/Napue forbids that.

Specifically, Edman’s fabricated visitors table had the following columns that contained falsified evidence: “session_id” , “request_uri” & the “request_headers” referer. Those columns contain false evidence/data because Edman coded a php script (gallery.php) to populate two of those columns (session_id & request_uri) with totally FABRICATED information. The fake information Edman programmatically inserts into the request_uri column causes the actual referring page to be DELETED and replaced with a FALSE entry (i.e evidence tampering). 

Worse, Edman coded gallery.php to generate FAKE session_ids that deliberately looked like PHPBB’s (Pedoboard’s software). He achieved that deception by generating a random 32 character hex string. Edman also loaded gallery.php with a query string that falsified the data in the request_uri column. Those two intentional forgeries forensically invalidated the entire visitors table and made any testimony concerning the veracity of those columns perjury.

Therefore, Edman’s fabrications constitute deliberate evidence forgery. The Court must not allow the government’s responding AUSA to ignore this FACT again. This WAS NOT a “misleading interpretation” or similar “harmless” error. Edman’s TB2 log was an intentional creation of false digital evidence to fabricate evidence of criminal activity.

In sum, Edman didn’t code those fake session_ids to look like real PHPBB session ids by accident. Edman did it to make sure that TB2’s session_ids looked similar to Pedoboard’s session_ids. Edman did that to create the illusion that the sessions_ids on both websites were evidentiary equivalents, that could be used to link website activity to the IP addresses revealed by the identical Flash applications. Thus, the fake session ids on TB2 prove that Edman crafted that illusion on purpose. That means his deception was achieved via “technical sophistication” – with the specific intent to deceive the Court, the Grand Jury and the TB2 defendants about the veracity of TB2’s log.

The government’s ongoing and deliberate concealment of Becker’s FAKE visitors table requires VACATING Cottom’s conviction; because, their knowing concealment of falsified records (by itself) is a case dispositive offense. However, it gets much worse. The misconduct uncovered by the newly discovered e-mails (Exhibits H, J & M) will shock the conscious of this Court.

B. Joe Gross (“Gross”) & Joe Howard (“Howard”) were egregiously disloyal to Cottom

Exhibit J (pp. 7-8) provides newly discovered evidence that – on October 8, 2014 – Gross was loyally advocating for Cottom when he wrote: “Keith, I am preparing a motion under Daubert to challenge the admissibility of the technology supporting the NIT and do not want to make unnecessary work for either of us. Here, I am talking about formal discovery requests … Please provide or produce the following information…”. As explained above, this discovery request – if Becker responded truthfully – would have ended the case against Cottom, so Becker lied (See Exhibit D). 

Exhibit J also proves that (after October 8th) Becker embarked on a persuasion campaign to convince a technologically ignorant Gross intothinking (wrongly) that the NIT on TB2 was just a Flash application (Debunked by Mercuri – See Exhibit N). Becker also introduced a red herring argument to distract Gross from the TB2 fraud. Becker’s distraction consisted of claiming that they had found contraband on Cottom’s Linux computer. However, Becker knew (in 2014) that the NIT on TB2 wasn’t just a Flash application and that they hadn’t found any contraband on Cottom’s Linux computer that could be attributed to him. (Note: Becker deceptively uses the NIT as an alias for the Flash Application (gallery.swf) repeatedly. See Exhibit A ¶ 28-30)

The newly obtained emails prove that Becker had lied so much after October 8, 2014 until December 31, 2014 that Gross now “trusts” Becker to help him “understand the evidence” that the government had against Cottom. That unethical betrayal had grown so egregiously inappropriate over those two months that Gross felt it was OK to write this ridiculously disloyal message about Cottom to Becker on December 9, 2014; “Keith, Thanks for the email yesterday. I was out of the office … Otherwise, I’d have expressed appreciation yesterday. I spoke with Dan Meinke this afternoon and he’s located a few but not all of the images. He explained that what he has found is not in thumbnail format so I continue to build a stronger basis of facts hopefully to direct and control my client. Really appreciate your help (emphasis added – Exhibit J p. 1).”

The Court must agree that the images Becker erroneously claimed to have been on Cottom’s device were an irrelevant distraction. Becker inserted it into the discovery process to distract Gross from the case dispositive problem of TB2’s log (visitors table) being FAKE. Furthermore, there was substantial circumstantial evidence that the cache files (that must be carved to be viewed) were planted by the FBI’s triage tech on April 9, 2013 (AUSA Norris admitted that SA Couch’s warrant execution was improper in his 22-2050 reply brief, but argued that it didn’t warrant suppression). Cottom had also asked the government (through Gross) for the triage X-Ways log file (that Cottom knows should have been generated by default on April 9, 2013). Gross told Cottom that Norris said it didn’t exist. But Norris had persuaded Gross not to challenge it; because, they were only going to use the NIT evidence (at that time undefined) at trial. That turned out to be another lie, as Becker used this knowingly dubious evidence to obtain a second indictment in the WDNY in April of 2015. Cottom believes that the Court should make an adverse inference about the WDNY indictment within this context. It should see it as Becker’s corrupt – and pathetic – attempt to coerce Cottom into dropping his Daubert challenge to the NIT on TB2. 

Regardless, Exhibit I proves that Gross joined Becker’s team after Exhibit J’s email chain. To that unconstitutional end, Gross secretly hired (without the advice or consent of Cottom) Podhradsky’s team to examine the NIT based on Becker’s lies about it just being a Flash Application.

It is clear why Gross didn’t inform Cottom that he had hired Podhradsky’s team to “reverse engineer” the NIT until they were on their way to the FBI facility in Omaha in January of 2015; because, he knew that Cottom vehemently opposed reverse engineering the NIT (aka Flash Application). Gross refused to understand why (See Exhibit N); because, Becker had convinced an ignorant Gross into thinking that the NIT was “just” a Flash Application. However, Cottom (and Mercuri) knew Becker’s assertion was objectively false (See Exhibit A ¶ 19-21).

When Cottom got their first report, he immediately noticed that it was for the wrong server (Pedoboard) and parroted Becker’s nonsense about the NIT just being a Flash application. Bottom line, Cottom was furious with “his” CJA team (See Exhibit I). They had deliberately & corruptly accepted Becker’s nonsense about the NIT just being a Flash Application despite direct and indisputable evidence to the contrary. That was a MAJOR ACT OF SABOTAGE; because, accepting that FALSE premise allowed them to completely ignore the fraudulent log on TB2 for their first report (January 2015). After realizing their intentional sabotage of Cottom’s case dispositive defense strategy, he requested that Gross be removed as his CJA so that Podhradsky’s corrupt team could be fired with him.

Howard was appointed as Cottom’s new CJA in February of 2015. Cottom ordered him to fire Podhradsky’s team for examining the wrong sever on purpose and parroting Becker’s Flash Application nonsense. Howard ignores Cottom’s requests from February to April 2015. Since Becker didn’t know if Podhradsky’s corrupt team would remain on the case, he fraudulently obtained a backup indictment. After Becker obtained the WDNY backup indictment, he immediately contacts Howard (instead of WDNY counsel Steven Slawinski) requesting to transfer it to NE and begin plea negotiations. Cottom refuses both requests and tells Howard that Becker got the WDNY indictment because he’s afraid Podhradsky corrupt team will be fired. Cottom again orders him to fire her team and hire Dr. Mercuri’s team – who agreed to work for less money and had more criminal experience (See Exhibit N). Howard refuses and tells Cottom that he’ll have to use Podhradsky’s team to examine TB2. Newly obtained emails prove that Howard then knowingly facilitated the complete breakdown of the adversarial process (See Exhibit H) in direct violation of Cottom’s constitutional rights.  

C.Howard & Podhradsky’s Team Ensured that No Adversarial Testing Occurred

Exhibit Hshows a criminally improper email chain between Podhradsky’s team and Becker’s team in June of 2015. For Context, on Friday June 5th Podhradsky’s team was hosted by FBI Special Agent Jeffrey Tarpinian to examine TB2’s server. The improper email chain began on Monday June 8th. It was mostly blacked out, so it isn’t included in Exhibit H; it read:

From: Podhradsky, Ashley [(b)(6) (b)(7)(C)]@dsu.edu 

Sent: Monday, June 08, 2015

To: Joseph Howard; [(b)(6) (b)(7)(C) (b)(7)(E) per FBI] (OM) (FBI) 

Subject: Fwd: 060515 USA v Cottom et al

Hi [(b)(6) (b)(7)(C) (b)(7)(E) per FBI]

Thanks for hosting us on Friday. As we work though our work and write the report a few questions have come up. Are you able to respond to them below?

Thanks Ashley

A few questions for the FBI.

[A full page of black out follows – redacted 7E per FBI]

This email was criminally improper because they couldn’t have had any legitimate adversarial questions for the FBI AFTER they examined TB2’s server. In other words, they were not discussing permissible things like logistics or scheduling AFTER they examined the server. To be blunt, the only thing to discuss was TB2’s FAKE logging system.

The next email in this criminal chain occurred at 11:16AM EDT on June 9th. It’s From: Becker and To: Howard with Podhradsky CC’d. As anyone can see, everything about this message is constitutionally improper. The next message From: Podhradsky To: Becker occurs at 12:26PM and includes references to missing correspondence where Matt (a member of Podhradsky’s team) has improperly answered FBI questions. Direct evidence of this improper communication comes from Podhradsky clearly writing: “Below are responses to the questions posed by the FBI team…” (emphasis added).  This criminal chain ends around 9PM with Becker declaring “Thanks for the clarifications…  Let us know if you have any issues with that.”

To understand how egregiously criminal this email chain was, you have to understand the context. These emails occurred AFTER Podhradsky’s team examined TB2’s server, WHILE they were writing their report about it. There were no adversarial questions Podhradsky’s team and the FBI team could have been asking each other at this time. While it may seem complex to laypersons, the analysis at this time was straightforward. They had already determined how the Flash Application worked in January of 2015, so the only question at this time was the legitimacy of the logging system. As explained above, TB2’s log (visitors table) was FAKE. Therefore, this email chain confirms Becker’s conspiracy to hide that FACT from the Court. Specifically, Cottom dares the responding AUSA to argue otherwise, as this is an objective FACT, not argument. This email chain is the “smoking gun” for a textbook Cronic violation. It was perjury when they presented TB2’s log in their June 2015 “Court Report”; AND, it was scientific misconduct when they presented Figure 12 in Exhibit E, knowing the log was fake.

D. Keith Becker, Michael Norris & Tessie Smith knowingly violated Brady/Giglio/Napue

  All of the government attorneys involved in Cottom’s §2255 litigation had a constitutional, ethical and professional obligation to proactively admit that Edman fabricated the logging system on TB2. 

Failure to admit that, especially after Cottom specifically flagged the fraudulent nature of TB2’s log in ALL his §2255 petitions, constitutes Brady/Giglio/Napue violations so severe that it requires the Court to VACATE Cottom’s conviction with prejudice; because, all the government’s attorneys have engaged in willful misconduct to preserve the illegally obtained conviction of Cottom. This Court must rule that AUSAs Michael Norris & Tessie Smith willfully engaged in conduct involving dishonesty, fraud, deceit and misrepresentation in their respective briefs to this Court. As this Court knows, a prosecutor has a heightened duty of candor to the Court. This petition presents this Court with irrefutable evidence that Becker and both habeas AUSAs egregiously violated their duty of candor while also criminally ignoring their constitutional obligations.

As the Court can see in Exhibit G, Becker wrote the following (facts in []):

As we previously advised you via e-mail on May 26, 2015, you appear to misunderstand some of the data on the NIT report that was provided in discovery. The NIT report merely contains a summary of information collected from the TB2 server [fake visitors table] and data provided by the NIT [Flash Application] to the collection server [destroyed], which was compiled after TB2 was taken offline, for purposes of discovery in this case. We have provided or made available the source of the data in that report.

Therefore, the Court must rule that Becker knowingly violated Brady/Giglio/Napue by not admitting that TB2 didn’t have any native data to collect. In other words, Becker was required to admit that TB2’s log data was created / fabricated by Edman.

CONCLUSION / REQUESTED RELIEF

  1. Cottom requests sanctions against the government if they oppose this petition

Tessie L.S. Smith violated ABA Model Rule 3.3, 3.8, 8.4 when she submitted the “UNITED STATES’ RESPONSE TO PETITIONER’S MOTION FOR PERMISSION TO FILE A SUCCESSIVE PETITION” on October 25, 2023 (Case No. 23-3131). Specifically, she knew or should have known that this paragraph was perjurious:

Cottom’s claim that the experts’ academic publication proves that the experts “lied” and colluded with the government by “deliberately omit[ing] or concealing] case dispositive information” is without merit. The minute differences between the experts’ court report and their academic publication cannot establish that no reasonable fact finder would have found Cottom guilty. Indeed, the academic report substantiates and supports the reliability and validity of the FBI’s NIT and forensic evidence which formed the basis of Cottom’s conviction. To the extent that this publication would have conflicted with the testimony of any trial witnesses, it would be a matter of credibility for the jury to decide, not the complete exoneration Cottom alleges it to be. In summary, the May 2016 publication offered by Cottom does not go directly to the disproving the elements required for his conviction but merely to the weight and credibility of the evidence that would have been presented at trial regarding the NIT.

The Court must agree that AUSA Smith had access to and thus was required to know and understand the contents of Exhibits B – K submitted with this petition. Under ABA rules, Smith was not allowed to deliberately avoid facts in the DOJ’s possession that totally obliterated her factual arguments. (Again, just to reiterate, it is an objective FACT that TB2’s log was FAKE.)

Specifically, Smith was required to know that Becker had colluded with Cottom’s counsel and experts as proven by Exhibit H – newly obtained from FOIA litigation. This is especially true since she was able to view the un-redacted copy of that exhibit. Exhibit H’s dialog is not ambiguous or open to interpretation. When combined with the FACTS in Exhibits C & E, it provides direct proof of an illegal collaboration between Cottom’s experts and Becker to conceal Brady , Giglio & Napue exculpatory evidence. 

As explained above in Section C, TB2’s log is not an expert opinion / interpretation issue about the NIT code on Pedoboard and TB2. It’s Becker (the government) deliberately lying about a material piece of evidence (TB2’s log) and procuring the help of Podhradsky’s team to keep that case dispositive lie concealed. 

Therefore,Becker made material and knowingly false statements and omissions in HIS July 20, 2015 memo [Exhibit G] that Smith was required to read and understand within the context of Exhibits C & E. AUSA Smith was also required to know that the Court Report was dated June 5, 2015 but wasn’t finished until June 17, 2015; because, (as Exhibit H proves) Becker illegally helped them write the Court report. Becker dishonestly wrote in Exhibit G: 

“Rather, the publicly-available code was configured to work properly on the pertinent websites and to return the specific information permitted in the search warrant authorizing the deployment of the NIT. Your speculation as to whether additional features or functionality existed or that there may be further information to contradict your experts’ findings amounts to a fishing expedition and does not entitle you to any further information. We are aware of our obligations with respect to Brady and Giglio as to these questions.” (See Exhibit G) 

When Becker wrote that, he knew that he had persuaded Podhradsky’s team to confirm TB2’s fake logging system.  In other words, he wrote that memo knowing that the only thing linking Cottom’s IP address to TB2 were Edman’s FAKE session_ids and his FAKE “visitors” table that Edman populated with mostly fraudulent information. So while being aware of his obligations, Cottom has proven with this petition that Becker criminally ignored them.

Therefore, if the government responds to this petition with anything other than words to the effect of “In light of the new evidence and in the interest of justice, the government does not oppose VACATING Cottom’s convictions”; Cottom requests the sanction of a “judicial finding of prosecutorial misconduct” and a referral of the responding AUSA to the Office of Professional Responsibility.

  1. Cottom requests granting this petition

Per the arguments stated above, Cottom respectfully requests that the Court grant this PETITION and order the District Court to VACATE Cottom’s conviction with prejudice.

bookmark_borderSummary Judgement Filed

So, I filed my Cross-Motion for Summary Judgement as it’s called. I mailed it yesterday and USPS says that it was delivered today @ 11:17AM. So now the government has until April 17, 2026 to respond to my cross-motion.

In other news, Howard (my Nebraska CJA) still hasn’t provided a single page from my case file and the Nebraska Council for Discipline hasn’t indicated what they’re doing. The complaint that I sent to Iowa’s Attorney Disciplinary Board was “declined”. They told me to complain to the Nebraska Board (I told them that I had complained to them and they didn’t do anything, so I sent a complaint to them… <huge sigh>)

Anyway, as I mentioned before I’m trying to get in touch with my §2255 attorney (Megan Lutz-Priefert). Her former employer Bressman, Hoffman, Jacobs & Quandt refused to help me in any way. I sent them a letter (via certified mail after they basically ignored my other correspondence) and I got this bizarre reply:

Dear Mr. Cottom, Thank you for reaching out to our office. Currently, we are unable to offer representation. Regarding Ms. Lutz-Priefert’s email correspondence, those were maintained directly between Ms. Lutz-priefert and you, and therefore we are unable to release them. Additionally, locating and recovering the specific email at this point would not be feasible.

I thought their response was peculiar since I didn’t ask them to represent me or for emails between myself and Megan. I asked for specific emails between Howard and myself on July 30, 2015. Specifically, I wanted to know if Howard had included, the morning emails where I told him to prepare for trail with the file he gave Megan in 2018.

Bottom line, there is definitely a conspiracy going on… ChatGPT finds everyone’s behavior to be in violation of ABA rules and general legal ethics. This shit is CRAZY!

bookmark_borderSummary Judgement Time

It’s time for summary judgment. On Tuesday (2-24-2026) I got the government’s Motion for Summary Judgement, claiming that they have met their obligations under FOIA law to respond to my requests. It consists of a large amount of paper that cost them $10 to mail to me, instead of providing a link to an attachment (making it harder for me to review).

I’ve spent the past two days reading it and have determined that it is legally insufficient. Thus, I now need to submit my Cross-motion for Summary Judgement. The crux of their argument takes the form of 3 declarations (provided under penalty of perjury) claiming that the searched for and provided all the information that they were required to, under the law. I will argue the opposite.

Two declarations were authored by an FBI employee named Amie Napier and the other was authored by a DOJ employeee named Korrine Super (seriously?). Amie’s first declaration is 42 pages of boilerplate nonsense, but her second declaration is 16 pages of interesting prose, as it contradicts the first.

In sum, Amie’s first declaration asserts that the NIT Reports that I asked for “were not found” and that all the redactions that they authorized for the DOJ to put on the 297 released pages were carefully analyzed and are totally justified (the redactions in the released documents say Exemption 7E per FBI). Thus, her first declaration is total bullshit. Her second declaration, included as the last exhibit of her first declaration, is a Glomar response for the NIT Reports. I LOL’d at that because it’s an obvious contradiction, either you cannot find the documents (asserting they don’t exists) or you can state “we can neither confirm nor deny” their existence. It doesn’t take a legal expert to determine that her second declaration was inserted because I have one of the documents I requested! Therefore, it’s a “bad faith” hedge allowing them to argue that the “NIT Reports” are a matter of national security when I point out that inconvenient FACT to the Court. LOL In other words, they’re going fight to the death to keep my from seeing those other NIT Reports….

Korrine’s declaration is a boilerplate document that is legally insufficient to win summary judgement with, IMO. Korrine provides the Court with 37 pages of generic definitions for the 118 page Vaughn Index. Her Index is insufficient for the same reason as her main declaration, it consists of 2000+ copy & paste unspecific boilerplate justifications that were outlawed in 2016. In paragraph 103, she actually asserts a forbidden augment. “It is foreseeable that disclosure of such information could allow…” “Could allow” is conclusory and was outlawed in 2016… SMDH.

In sum, I expected Korrine’s disingenuous declaration (as it’s standard “bad faith” DOJ operating procedure – see the Epstein files…). BUT, I was shocked by Amie’s willingness to commit perjury when she knew (or shouldn’t have known) I HAVE A NIT REPORT!

Anyway, I’m composing my motion now. I’ll let you know when I submit it sometime next month. As I gotta proof read and research it carefully. I want the court to completely un-redact two “bombshell” documents released to me so that my next motion to VACATE my conviction is a “slam dunk”.

Wish me luck.

bookmark_borderSo I Caught them

Since my FOIA litigation started, they have been claiming that they couldn’t find the NIT Reports I’ve requested. As I indicated in a previous report, I challenged that lie in a reply to their request for more time.

The government’s response made me LOL, they actually argued that it was OK to lie because it wasn’t material to the motion to extend the deadline. IOW, it was just procedural – LMAO. But who knows, maybe the Court will buy it. (Like most Americans, I have little trust in any of our institutions.) But, the argument is so absurd on its face the Court would have to get creative to buy it as AUSAs have a duty of candor to the Court. That means they’re not allowed to lie to the Court about anything, EVER! As AUSAs are (wrongly IMO) given a presumption of regularity.

Nothing else to report about the FOIA case at this time, as I wait for the Court to rule on their extension motion and my counter motion to sanction them for lying about the NIT Reports. You’ll know more when I do…

In other news, Howard still hasn’t provided a single page from my case file. So, I sent a letter to Ryan’s law firm (they represented me for my first Habeas petition back in 2018). I’m trying to get them to answer some questions about the file Howard gave to them. Specifically asking about pages I got from FOIA and from the WDNY public defenders office to see if they’re in the file he gave Megan. If they’re not there, then I know (beyond a reasonable doubt) that Howard was/is corrupt.

Out of desperation, I sent a bar complaint to IOWA’s Bar (Howard is licensed there too) to see if they’ll do anything about his noncompliance. Wish I knew how damaging those emails were when I sent them in July of 2015 (but I that time I had no idea Howard was working with Becker to railroad me). In other words, I got played…

Well, the Court got creative <smdh>

Here, Plaintiff presents no evidence to affirm his assertion that Defendant lied in stating that the FBI could not locate documents responsive to his FOIA request. Plaintiff provides no substantiating proof that his attached exhibit was generated by the FBI in connection with “Operation Torpedo” or that it served as the basis for his criminal indictment in 2013 and is responsive to his FOIA request. (Dkt. 48 at 1). Plaintiff also does not argue that Defendant’s statements were made to harass him or delay these proceedings. See Liebowitz v. Bandshell Artist Mgmt., 6 F.4th 267, 286n.22 (2d Cir. 2021) (“A] showing of bad faith by clear and convincing evidence is a prerequisite to imposing sanctions under both § 1927 and the district court’s inherent authority[.]’). Thus, the Court declines to award Plaintiff sanctions pursuant to § 1927 or its inherent authority.

Regarding his remaining requests, Plaintiff provides no legal basis for the Court to order production of NIT Reports, operational methodology, or internal communications related to such NIT Reports. (See Dkt. 48 at 3). Plaintiff has presented no concrete evidence that defense counsel’s statements are untrue. Absent such evidence, the Court is entitled to rely on representations made by defense counsel that the FBI failed to identify records responsive to Plaintiff’s FOIA request. See Greer v. Carlson, 1:20-CV-05484-LTS-SDA, 2020 WL 7028922, at *3 (S.D.N.Y. Nov. 29, 2020)

BUT, the Court also ruled that the government must file their Motion for Summary Judgement by 2-20-2026 – so I should get a nice Birthday Present… Apparently, I’ll need to supply supporting documents for my exhibits because the Court will just believe anything the AUSA says. IMO, Our institutions are hopelessly corrupt!

bookmark_borderThe Cookie Jar Analogy

As I note on my updated About Me page (link above) – I ask you to imagine that you were accused of stealing a cookie from a jar, but the only evidence was created by the police. That’s what happened to me and my FOIA litigation is proving it…

Here’s how it went down (according to newly discovered emails)

  1. The FBI seized two secret websites on the Internet (like hidden corners)
  2. Website 1 had real logs that tracked who visited – like a guestbook
  3. Website 2 was just a simple image board with no guestbook
  4. Instead of just watching Website 2, the FBI created a fake guestbook and populated it with falsified data
  5. Keith A. Becker then used the real guestbook from website 1 and the fake guestbook from website 2, to indict real people.
  6. I, Kirk Cottom, noticed – immediately – that the guestbook for Website 2 was fraudulent.
  7. Joe Gross, my first CJA hired experts behind my back that lied and said “Website 2 had a native guestbook, just like Website 1”
  8. I, Kirk Cottom, said “they’re lying” and convinced the judge to remove Joe Gross, so I could fire the corrupt experts.
  9. Becker then flew to my state to indict me again for the same crimes, a pathetic attempt to coerce me to drop my challenge to his fraudulent Website 2 evidence.
  10. Joe Howard refused to fire the corrupt experts and thus joined the team to railroad me (FOIA emails confirm this) for visiting Website 2
  11. After lying to the Court in 2015, the experts publish another report in 2016 exposing some of the lies they told in 2015. Basically saying “Yeah, the system on Website 2 was fake and anyone could trick it”.

That’s what happened in simple terms… still waiting for the Vaughn Index.

bookmark_borderFOIA Litigation Update

So on Monday I got a response to my letter to the Clerk of the Court. It noted that the Judge (likely upon seeing my letter to the Clerk) ordered the government to file their motion for summary Judgement on January 8, 2025…

Of Course on Tuesday I receive a NOTICE OF MOTION from the government requesting an extension to February 27, 2026. I, of course, filed a MOTION IN OPPOSITION. I also noticed for the first time (legally – I always saw it was written, but didn’t fully comprehend its significance until now) that the AUSA invokes 28 U.S.C §1746 for his DECLARATION(s). I did some research and determine that his paragraphs #5 & 6 are knowingly incorrect.

I know these “declarations” are “knowingly” incorrect; because, #5 states “By Letter dated December 22, 2022, the FBI determined that we were unable to identify records subject to the [FOIA] that are responsive to your request.” Then in #6 he asserts that the FBI’s letter ends the dispute over the requested NIT Reports. His assertion is knowingly incorrect because; A) a simple “letter” isn’t a sworn affidavit and thus is not sufficient to prove that an adequate search was performed and B) I have a NIT Report (Mine), so I can prove that at least one exists and was printed from a DOJ S: drive.

ChatGPT explains this S: drive succinctly:
1. It is an agency record system
Documents stored there are almost certainly “agency records” under FOIA.
2. It can trigger search obligations
If emails indicate responsive records were stored on the S: drive, a reasonable FOIA search may need to include:
+ The relevant S: drive directories
+ Not just email or individual H: drives
3. It can undercut “no records” or limited-search claims
Especially if:
+ Custodians refer to the S: drive as the primary storage location
+ Records were moved there from email
+ Multiple custodians had access
4. It may preserve older or “orphaned” files
S: drives often retain documents long after individual users leave or clean up their inboxes.

Since all the above applies, I filed a motion to challenge the AUSA’s assertion today. I’ll let you know what the Court says when I know.

bookmark_borderAnalogy and Update

Perhaps an analogy will help people understand how ridiculous the case against me was.

Imagine that the FBI searches two houses next to each other. House A has a security system with cameras that put timestamps on the video. House B has no security system or cameras, but during the search of House B, the FBI installs a security system with cameras and then fabricates video with timestamps mimicking House A’s using artificial intelligence.

A Prosecutor then uses the fake video from House B to indict a masked John Doe in the video with robbing House B. Prosecutor claims masked John Doe is a specific individual who lives in the neighborhood. The accused asks his experts to examine House B’s security system and video. Experts produce a report that says House A’s security system and cameras work fine. Accused tells his attorney “But I’m accused of robbing House B, how is House A relevant?” Attorney responds “Experts say security system and cameras are reliable — case closed —you should take a plea deal”.

bookmark_borderSO then this happened

I filed a complaint with the “bar” in Nebraska against Joseph Howard because he ignored several of my requests for my file since August 2025. Lets break this down:

  • My Guilty Plea was based on fundamentally false evidence; because, the conviction rested entirely on a fabricated MySQL table that was created and populated by an FBI contractor. That means that the core evidence was not merely flawed, it was entirely manufactured.
  • Dr. Podhradsky’s team knew that this database table was nonexistent in the website’s online code base repository, yet their June 2015 report claims that this database table was part of that website’s code base. That’s perjury.
  • That means that my plea wasn’t just “uninformed” – it was induced by evidence that never really existed. That rules out that their perjury was caused by incompetence and proves that they lied on purpose to help the prosecution hide the fatal defect in their case against me.
  • Defense counsel (Jospeh Howard) actively helped them (Podhradsky’s team) obscure the truth before and after my conviction. (FOIA documents prove that Howard allowed Podhradsky’s team to collude with Becker.)

Thus we shouldn’t be surprised that Howard is actively obstructing my efforts to get answers to my questions. A few weeks after my complaint was filed, Howard sent me this letter:

Dear Mr. Cottom:

I write in response to your recent correspondence requesting materials from your case file. I will send you all documents from my files that I still have and that I am legally permitted to provide.

With respect to discovery produced by the government in the criminal matter, any items that constitute government discovery will need to be obtained from the government.

Please be advised that emails from over six years ago may no longer be available; our routine retention practices may not have preserved email beyond that period.

I will review my archived and legacy files and will transmit to you what I am legally allowed to share.

Good luck with your ongoing matters.

bookmark_borderWhy no-one is talking

So my FOIA has produced some gems that confirm Keith A. Becker knew the case against me was over on November 10, 2014 when he lied to a direct question in relation to the NIT. In response to our question (why are the session ids different) Keith lied because the truth is they were fabricated by LE code, then place in a LE database. What they told the court was only true for the other websites. They said they added a flash file to the website that downloaded with each page. As I explained before TB2 fake visitors table is inadmissible at trial. I’ll let ChatGPT explain why:

conspiracy