So, thanks to a PACER alternative, I now know Keith A. Becker (“Becker”) is absolutely guilty of prosecutorial misconduct in my case. In other words, I can now prove, with his closing argument from another case, that Becker knew he was lying in my case.
It’s important to understand exactly what misconduct occurred. First misconduct was obtaining a fraudulent search warrant for TB2 that was also void ad initio. (Void on its face because the magistrate wasn’t allowed to issue it on November 18, 2012.) This search warrant was fraudulently obtained because it based it’s “probable cause” on evidence Becker knew, or should have known didn’t exist. (As I explained in this post)
Second act of Becker misconduct concerns his use of that fraudulently obtained data to fraudulently obtain an indictment in Nebraska as explained in this post.
Third act of misconduct concerns his denial of malfeasance. As I explained extensively in this post, Becker knew he was caught in November of 2014 but instead of folding he doubled down.
Now, I’m trying to pin down the details of the conspiracy. As I noted in this post, the shills refuse to answer questions. None of the lawyers will answer my questions and the FBI is stonewalling.
I found this tidbit on the pacer alternative:
The judge has instructed you. It’s knowingly accessing with intent to view a computer disk of other material. What do we mean in this context? We mean [the] web server. That server was located here in Omaha. That sever had on it all the [contraband] images that were available on [the] website. That’s [what constitutes] the computer disk or other material.
And that the defendant knew that it contained [contraband]. Well, how do you know that? Well, you’ve seen the records of the defendant’s conduct. You’ve seen the screen shots of the site and what it looked like to its users and members. And you’ve seen what the defendant saw each day that he went and accessed these particular materials.
Now, again on the access with intent count [sic], ladies and gentlemen, you’ve got a guide. And your guide to these counts is [sic] Exhibits 5A through D and 6A though D…
5A through D are portions of that board data, the logs, that exist for the defendant’s conduct for November 18th until December 8th [2012]…
We’ve got a portion of Exhibit 5A broken up on the screen here. On the top part, we see the date and time. We’ve heard a lot about UTC, Universal Coordinated Time [sic]. It means the user took an action and that’s the time that the website recorded it…
We see the session identifier. Now remember the testimony of Special Agent Gordon, Special Agent Smith. A session ID is an individual, unique identifier for on particular session on the board.
What’s a session? Log-on to log off. One session, one unique series of characters just like you see on the screen.
Becker closing arguments 8:13CR105 Docket # 236 Pages 133 & 134
And I found this in my filing cabinet:
B. “Modified Tinyboard Application that Ran TB2” … 6. “TB2 servers apache access logs.” As we previously informed you via e-mail, Apache logs were not utilized to correlate website and NIT Data.”
Becker message to Howard on July 20, 2015
And I have this Becker quote from my withdrawal hearing:
And so the government was in control of the website TB2 and that means there are logs of activity from that website. That’s one batch of evidence. And some of the government’s evidence comes from those logs, including Apache logs which Special Agent Smith testified about at our last hearing. Then there is also information that is generated and collected via use of the NIT, and that’s a separate batch of information.
Becker statement on 12-16-2015
Now, combine those three quotes and compare them to the fact that Tinyboard doesn’t have any logs and you have a very easy perjury conviction. Now I’m trying to get exhibits 5A through 5D from the court and trying to get the shills to answer my questions (trying to hire a lawyer to ask them those questions on their stationary.
I’ll keep y’all informed…