bookmark_borderNext Year, Bad for You and Me?

I predict that next year will be bad for you and me, Because:

  • The first Felon President will take office on January 20, 2025 – chaos and ineptitude will quickly follow. Maybe we’ll rethink second class citizenship for (most) felons?
  • January 3 should be interesting in House, I predict Pastor Johnson will be given the gavel again.
  • On a random day in 2025, Bitcoin will crash after finally finding its last “Greater Fool”.
  • Bitcoin’s crash will also cause the AI stocks to crash, as everyone figures out it’s just crowdsourced vaporware.

Needless to say, I’m not optimistic for 2025… Happy New Year!

bookmark_borderOpen Letter to Josh Stroschein Ph.D

Hi Josh:

I’ve been trying to get answers from your team (you, Podhradsky or Miller) for the last three years about why you helped the government railroad me. Podhradsky told me to talk to Miller & Miller told me to “go away”. I’m not going away, nor will I ever “let this go” until I find out what happened.

Last year, while doing research, I came across the paper your team authored regarding the FBI’s NIT for a conference in 2016. Needless to say, it angered me. Sections 2.6 & 2.7 were particularly infuriating. While I am an “expert”, I’m not at your level, but I knew that the FBI was lying about how their NIT worked and that you were actively helping them lie about it. (That’s why I fired Joe Gross Jr. to fire your team in February of 2015.)

The “smoking gun” regarding your team’s participation in this travesty of justice, is this sentence in section 2.6 – where you declare: 

The DNS requests go over UDP and thus they can be spoofed. However, the cornhusker log indicates that DNS request was made via the proxy server and thus that data was not logged in this case. 

As you surely know, that – in regards to the flash player – was impossible.

The proxy server was TOR and the NIT attack relied on the flash player ignoring TOR (thus making direct connections to  cpimagegallery.com. Therefore, flash player’s UDP (DNS) & TCP (Socket) communications must bypass TOR. So the scenario your team omitted from your June 2015 report (where flash used TOR for UDP but didn’t for TCP) was such a HUGE RED FLAG – that FBI shenanigans were afoot – that experts such as yourselves must have withheld it on purpose. If you have a conscious, you should feel very guilty about that. Furthermore, in 2022, I had Nathan Zaugg (of Mindfire Technology) answer 3 questions that your team willfully refused to answer in your June 2015 report. Those 3 questions were:

1) Does Tinyboard have a visitors table?
2) Does Tinyboard issue session ids to clients?
3) Does Tinyboard track user activity in any way?

Nathan’s answer to all 3 questions was NO! That means that your team’s Figure I is perjury and that my conviction was totally fraudulent, without considering the NIT’s additional fraud (discussed above). As I told Miller, the statute of limitations has passed for your team’s perjury, and I cannot sue you for your lies. However, if you come clean about your team’s misdeeds (which my pending FOIA litigation may uncover anyway) I may be able to get exonerated.

So, if you have any decency, I would like you to answer the following 6 questions:

1) When and how did you become involved with NE case no. 8:13CR108?

2) Why did your team examine the wrong server for your first report (January of 2015)?

3) Why did you parrot the government’s lie that the NIT was just a flash application?

4) When and how did Attorney Joseph Howard keep you involved with my case (I desperately tried to fire your team because I knew you were lying)?

5) Why did you lie about Tinyboard Software in your June 2015 Report (Claiming the visitors table was legitimate & Tinyboard issued Session IDs to visitors)?

6) What did you communicate with Keith A. Becker about and when (Please provide dates so I can amend my FOIA litigation for these communications)?

Thank you for your time. I hope you’ll help me uncover your team’s part in railroading me…

– Kirk Cottom

bookmark_borderBell’s palsy update

So about two weeks ago I was diagnosed with Bell’s palsy. According to the literature, I should have been seeing some improvement this week if my situation was caused by inflammation only. Unfortunately, I’ve seen no improvement, thus my paralysis is probably caused by Ramsay Hunt Syndrome.

In sum, it means my recovery will likely be measured in months, not weeks.

April 30 Update: As of today, I’m at 75% recovered. After 3 weeks of no progress, my fourth week has shown daily improvement of about 25% a day, so I may be 100% by Friday.

May 13 Update: As of today, I’m at 90% recovered. I can now raise my left eyebrow and my lip control is almost back. I’m able to drink for a soda can again. Left lips and cheek are at 90%. So I think my recovery time will be about 8 weeks…

June 24 Update: As of today, I’m 95% recovered. My left side is a little weaker than my right side. I’m thinking it may stay that way. But I can eat and talk 100% normal now…

bookmark_borderI Got Bell’s Palsy

So, I was minding my own business this weekend when (on Friday) I developed an odd ear ache. It was a twitching sharp pain that would occur periodically. So, I chalked it up to another ache/pain of being a member of AARP.

But, when I woke up Sunday the left side of my face was basically paralyzed. So, I gave myself the stroke tests in a pamphlet I have because I’m a member of AARP and we need to know these things. I passed all the stroke tests, so I diagnosed myself with what the pamphlet called Bell’s Palsy. On Monday I went to an urgent care that will see you for a flat fee of $125. (Since I’m a struggling sole proprietorship making little (read “no”) money, I do not have any health care coverage, thus my reluctance to go to the emergency room; BUT, I don’t think I’d gone to emergency even if I did… IMO, that is really just a place for gun wounds, car accidents and heart attacks.)

The nurse practitioner chastised me for self diagnosing BUT concurred that I “presented” as text book Bell’s Palsy. He said that it might be have been caused by the virus that causes shingles (chickenpox) and that it attacked my cranial nerve seven. So he put me on an antiviral to combat the possible underlying cause (that cost $80) and a steroid to deal with the inflammation that was continuing to irritate nerve seven (that cost $17).

Now, I just have to wait and hope nerve seven returns to normal giving me the left side of my face back sometime in the next few weeks.

bookmark_borderDenied Again

So the Eighth Circuit denied my petition, again (Case No. 23-3131). This time I’ve complained to their overlord at the SCOTUS, asserting that their latest denial was a violation of Supreme Court precedent (like this case) and my due process rights.

I can’t see how the Court actually looked at my petition before they denied it. The government conceded the evidence used for my conviction was fraudulent per the new 2016 report (discussed here). Their only argument was that the 2016 report wasn’t “new”. The government took over 30 days to file their response to the petition and the Court took a few hours to deny it two days after the government filed it. The denial was so fast, I wasn’t able to file a response to the government’s nonsense about the newness of the 2016 report leading me to believe that my due process rights have been violated.

Like I said before, I was railroaded, all I need now is absolute proof, maybe it will show up in my FOIA request… I also sent a request to Joseph Howard to write a declaration stating that the first that he heard of the 2016 report was when I wrote him about it, this month. We’ll see if he complies… I suspect he won’t because he was/is apart of the conspiracy.

bookmark_borderKirk Cottom was Railroaded

I’m using that title to drive home my previous posts on the subject. I want it known, that in no uncertain terms, I was railroaded and the shills helped.

When you compare the shills 2015 report, to their 2016 report and add in the various facts about Tinyboard and Flash Player 10 or later, the only conclusion you can arrive at, is that “my” visit to TB2 on November 18, 2012 NEVER HAPPENED!

In other words, all evidence of that visit was either fabricated or falsified by the FBI. End of story, thank you for reading.

bookmark_borderNovember May Be Good

I’ve got a lot on my plate this month. My current habeas petition (Eighth Circuit Case No. 23-3131) should be “ripe” for decision after TODAY. The government’s argument against it this time is purely procedural. (They claim that the shill’s bombshell 2016 report isn’t “new” – I retort that it is when they concealed it from ‘me and my various attorneys’…)

The Government is supposed to have some answers regarding my FOIA lawsuit on November 9, 2023 and my adjudication as a “Tier 1” should hopefully occur at a hearing on the last day of the Month.

And the Second Circuit should set my “briefing schedule” for my appeal to them about the ridiculously punitive continuation of my supervised release

Regardless, November 2023 is going to be a significant month for Kirk Cottom…

bookmark_borderHow the DOJ Railroads People

Jed S. Rakoff (a Senior Federal District Court Judge) wrote a book titled Why The Innocent Plead Quilty and The Guilty Go Free in 2021. It should be required reading for all Americans; but, it’s a must read if you want to understand how the DOJ (and its components) railroads Kirk Cottom, Jim Larkin and others.

At the beginning of chapter 2 he rejects the mythos: The criminal justice system in the United States today bears little relationship to what the founding fathers contemplated, what the media portray, or what the average American believes.

He then goes on to explain that our system has devolved into a system of unfair plea bargains. He notes that when the cases are not dismissed for other reasons, 97% of federal cases are resolved with plea agreements & those agreements determine the possible sentences. He explains that those plea bargains are unfair because they put the defendant at a distinct disadvantage because the prosecutor has all the cards and the defense has none. The prosecutor often has a complete police report, witness interview transcripts, grand jury testimony transcripts & forensic reports. This inherent knowledge advantage usually makes the prosecutor overconfident in his case.

Judge Rakoff notes that the defense attorney is often flying blind against an overconfident prosecutor when plea negotiations begin shortly after the defendant is arrested. This power imbalance is then further exacerbated by the mandatory minimums a lot of laws impose & the draconian sentencing guidelines enacted in 1984. This results in the prosecutor offering defense counsel an offer to plead to a lower offense than the prosecutor will charge if they reject the initial plea offer. Judge Rakoff – and anyone with a rational mind – rejects the Supreme Courts nonsense that this plea bargaining process is a “fair and voluntary contractual agreement between two relatively equal parties”. It’s a shakedown, where the prosecutor inflicts its will on the defendant. Judge Rakoff then notes that many people choose to plead guilty because they are guilty but he also notes, because of our terribly flawed system, too many innocent people plead guilty because they have no confidence that a corrupt system would (or could) exonerate them and choose to cut their losses.

This is how Kirk Cottom got railroaded into a conditional plea. As readers know, I’ve been trying to get the specifics for over two years now. The corrupt system likes to keep its secrets. I took a conditional plea because the only evidence against me was the NIT Report and I was sure it was 1) Falsified & 2) inadmissible at trial.

On page 30, Judge Rakoff finally gives me an explanation about how my plea agreement ended up so vague. …in situations in which the prosecutor and the defense counsel recognize that the guilty plea is somewhat artificial they will jointly arrive at written statement of guilt for the defendant to agree to that cleverly covers all the bases without providing much detail.

That explanation provides compelling evidence for why the shills and my attorneys refuse to answer any questions about their participation in Becker’s conspiracy. The Judge also notes that the DOJ knows that most of the “forensic sciences” are not science at all. And also points out the a lot of eyewitness testimony is garbage.

Finally, Judge Rakoff also explains how the falsified and fabricated TB2 NIT Report got “admitted”, Judges have an unconscious bias to allow the prosecutor to admit their crap evidence. Ultimately my case revolves around Becker’s conspiracy to hid the facts about the TB2 NIT Report.

bookmark_borderParallel Construction in my case

The overview of my “NIT” is this: The disclosed NIT source code consisted of gallery.php, gallery.swf & cornhusker.py. All of this code is parallel construction. And it’s “normal” for two sites and “fabricated” for my case (TB2). Both types of parallel construction are serious Brady Violations.

Normal parallel construction consists of creating criminal cases against defendants that are based on illegal surveillance. They then conceal that original source with parallel construction that allows the prosecution to conceal the original illegal source of the evidence against the defendant, and pretend that they found the suspect through legal investigation techniques. Fabricated parallel construction consists of concealing the original illegal source of the evidence with a totally fabricated parallel source.

Parallel Construction is a serious problem in the United States because as Mark Rumold, a staff attorney at the EFF, put it: “It does a disservice to our criminal justice system when the government hides the techniques of investigations from the public and criminal defendants. Oftentimes, the reason they do this is because the technique is of questionable legality or might raise questions in the public’s mind about why they were doing it. While it’s common for them to do this, I don’t think it benefits anyone.” Because “we cannot have a world where a government is allowed to use black box of technology” to prosecute criminal defendants.

The parallel construction in my case was ridiculously egregious. It likely emanated from an XSS attack on a “is Tor working site”. So here is what probably happened on November 18, 2012 @ 8:12 and 8:15PM; for unknown reasons, Becker’s minions attacked my Rekonq browser with an XSS attack on the “is Tor working” website I visited. (It was a website that inspected your browser’s configuration and then made various recommendations) It told me to turn off javascript and turn off the cache. (Note: they may have also installed a Remote Access Trojan (RAT) at this time.)

Anyway, the XSS attack loaded those two pages in the IP Activity table in a hidden iframe (located on the “is Tor working” site). That hidden iframe then loaded another hidden iframe that loaded “gallery.php”. Galley.php (located on TB2) then populated the IP Activity table with falsified data, BUT it needed Javascript to load the flash app, so that stopped working when I turned Javascript off.

The reason they had to plant evidence on April 9, 2013 was because; 1) they knew that the cache was off (Rekonq reports that it’s off in its headers) and 2) they couldn’t arrest me without finding “something”. They weren’t able to finding anything during their first hour of triage because all the home directories were encrypted. So, after that first hour, they looked at my laptop’s lock screen and saw my picture next to the user named Adama. They then planted the evidence in Adama’s home directory on my linux computer, overwriting its encrypted folder.

This FBI misconduct was exposed by their own Tech when he made an image of the linux drive and booted it. The OS then locked Adama’s account in the shadow file because it detected an error with its home directory (its encryption link was missing). Had any defense expert examined that drive they would have found that it didn’t have any other files to indicate it had ever been used by a human because the triage agent just “dumped” the thumbnail files in it and nothing else. That’s why (I suspect) none of my experts actually examined the drive, and that’s why the FBI refuses to share any information about their X-ways logs of their triage on April 9, 2013. (X-ways has extensive logging capability, since it’s not uncommon for defendants to claim the FBI planted evidence they are required by DOJ policy to turn this logging on. I suspect they didn’t turn it on, because planting evidence is career ending and illegal so why would the triage agent make a log of his crime?)

There are many more technical problems, but the final one I’d like to address here is the implausibility of the NIT on TB2. Becker’s narrative and the provided “parallel construction” code, indicates that the flash app (downloaded to my computer) must have executed in less than 3 seconds (flash terminates after 3 seconds). Yet as you can see from comparing Figure I to Figure H, it took the 8:12PM flash 39 seconds to execute and the 8:15PM execution took 63 seconds. Those are ridiculously long execution times, when my experts (the shills) report that their flash ”testing” executions times were in milliseconds. Of course, the information that could clear up this anomaly was destroyed. Here is how the parallel construction code must have worked:

  • When my browser loaded those two html files at the designated times, gallery.php (running from a hidden iframe embedded in those html files) generated those two random “session ids”, populated a row of Figure I with falsified data & loaded gallery.swf (the flash app) in less than a second.
  • Gallery.swf made a DNS query for ridiculously-long-cipher-code.cpimagegallery.com in a fraction of a second
  • Cornhusker.py (allegedly running on the destroyed server) took forever to answer gallery.swf’s DNS query. It’s unclear how long flash will wait for a DNS response, so this is the only step where this time gap could occur because flash will only wait 3 seconds for the server (cornhusker.py) to give it permission to communicate. This presents another problem because this step isn’t necessary, if you know the IP of the server you just put that on. In other words, this is inefficient coding for an allegedly two week sting operation. The next two steps are also redundant because cornhusker records this DNS request along with the “session id” and the IP it came from, in a “clients” table. Flash just sends the same information again. Anyway, the clients table would answer the question about the long delay, but they destroyed it because it probably proves malfeasance.
  • At most, 36 and 60 seconds later cornhusker.py provides gallery.php an IP address to communicate with and it sends a request to that IP for permission to communicate. (Cornhusker has 3 seconds to respond or flash terminates).
  • For the first session id, flash communicates 39 seconds later and for the second id it communicates 63 seconds later. However, every expert knows that the second DNS query taking longer than the first is HUGE red flag – indicating the whole sting was based on fabricated parallel construction.

bookmark_borderA Simple Analogy

  • Parking Lot = Tinyboard
  • Parking Garage = PHPBB
  • Cars = Browsers
  • Ticket IDs = Session IDs
  • Ticket Booths & Cameras = Computer Logs

OK, so when the cars enter Tinyboard’s parking lot or PHPBB’s garage, they’re issued a Ticket that has a unique ID number. This ticket also has location technology such that the ticket records its location when it stops moving. Camera’s take a picture of the cars license plates so the the booth can pull information about the cars entering the lots from the DMV and enter it into its logs.

So, for example, when someone driving a Ford Mustang enters Tinyboard’s parking lot, it gets a ticket with ID 100 and it proceeds to park in parking spot 2. So the ticket begins it’s log (ID 100 in Parking Spot 2). A similar circumstance happens in PHPBB’s garage, someone driving a Chevy Camaro is issued a ticket with ID 1000 and in proceeds to park on level 2 parking spot 10, so the ticket begins its log (ID 1000, on level 2 in parking spot 10)

This brings us to Mr. Becker’s second act of misconduct. Our Camaro driver decides he doesn’t like spot 10, and movs to spot 20. PHPBB’s ticket makes another log entry (ID 1000, Level 2, Spot 20). Our Mustang driver also moves from spot 2 to spot 12. BUT, Tinyboard’s ticketing system does something odd, it changes its ticket ID when it makes another log entry (ID 200, Spot 12).

So, imagine it was illegal to park in these places at the time the above parking occurred. When the cars leave, the ticket booths record all the information on the cards and ties them to the data linked to their plates. Now as explained above, PHPBB’s ticket booths are actually keeping business records and Tinyboard’s booths are not, they are collecting information solely to prosecute illegal parkers. So the ticket booth logs look like this:

Lot NameTicket IDTime InFloorSpotCar TypeTime Out
PHPBB100012:01:30210Camaro
PHPBB100012:03:20220Camaro
PHPBB100013:00:10
TINYBOARD10012:01:3012Mustang
TINYBOARD20012:03:20112Mustang
TINYBOARD30013:00:10

Now, if you happen to know how these ticketing system logs are supposed to look, you see a glaring anomaly with Tinyboard’s logs. The Ticket is changing its ID with every move, when it shouldn’t. PHPBB’s log looks legitimate, it says the Camaro got a ticket and parked in spot 10, then moved to spot 20, then left the garage about an hour later. Tinyboard’s log says the Mustang parked in spot 2, then left without registering, then returned and parked in spot 12, then again left without registering, then returned and left immediately. As anyone can see, that log is nonsensical.

Now, when you bring it to the parking lot’s prosecutors attention, he fails spectacularly at explaining the anomaly and you request all parts of the system to investigate. You find out that: 1) Tinyboard’s lot doesn’t have a ticket system and 2) the prosecutor installed the system solely for prosecution and 3) the prosecutor has destroyed the ticket booth and camera log computer!