The Government's Use of Altered Evidence and False Testimony by FBI Personnel to Secure and Illegal Conviction, Aug 2022
Download original document:
Document text
Document text
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
Tully & Weiss Retired Attorneys at Law 713 Main Street, Martinez, CA 94553 FIAT JUSTIT IA RUA! CAELUM Phone: (925) 229-9700 * fax: (925) 231-7754 The Government’s Use of Altered Evidence and False Testimony by FBI Personnel to Secure an Illegal Conviction in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282 August 31, 2022 Exhibit A in support of Motion to Hold Appeal in Abeyance to address New Evidence of Substantive Due Process Violations at Trial in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. (Filed September 6, 2022.) The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. The Government’s Use of Altered Evidence and False Testimony by FBI Personnel to Secure an Illegal Conviction in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282 TABLE OF CONTENTS INTRODUCTION ....................................................................................................................... 4 I. Anomalies with the FBI Search and Evidence Handling ........................... 5 II. Anomalies with the Evidence Collection, Storage, and Analysis ....... 9 III. Anomalies on Hard Drive .................................................................................... 13 A. The Backup Itself .................................................................................................... 13 B. Folders and Subfolders ......................................................................................... 14 C. Files Within “Studies” Folder ....................................................................... 16 1. Metadata Regarding Daylight Savings Time Was Manually Altered to Appear As If It Was Automatically Done By A Computer . 17 2. Metadata On at Least One Photo Was Falsified to Cover Up That the Photo Had Been Altered................................................................................. 19 3. Creation Dates Impossibly Precede the Date the Photos Were Taken. The Creation Dates Also Impossibly Precede the Date of the Backup ........................................................................................................................... 21 IV. Anomalies on Camera Card................................................................................ 25 A. The Camera Card Was Altered on September 19, 2018, While in FBI Custody ............................................................................................................................. 26 B. The Camera Card Was Most Likely Altered Between April 11, 2019, and June 11, 2019, While in FBI Custody......................................................... 26 1. SFE Booth ’s Second Examination of the Camera Card on June 11, 2019, Was Conducted Under Highly Suspicious Circumstances . 27 2. Thirty-Seven New Files Appear to Have Been Added to the Camera Card Between April 11, 2019, and June 11, 2019, While It Was in FBI Custody .................................................................................................. 28 3. The Placement of The Thirty-Seven New Files Indicates That They Were Placed There Manually Rather Than as A Result of Someone Taking Photos ........................................................................................ 30 4. Photo Files IMG_0093, 94, 96, and 97 Are Bogus............................ 34 5. Telltale Missing Data from SFE Booth ’s June 11, 2019, Camera Card Report ................................................................................................................. 34 V. Anomalies in the Alignment Between the Camera Card and the Hard Drive ....................................................................................................................................... 35 Tully & Weiss Attorney at Law Page 2 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. A. The Thirty-One New Photo Files from SFE Booth ’s June 11, 2019, Forensic Examination that ‘Match’ Photos Files on the Hard Drive Do Not Actually Match ................................................................................... 35 B. No Remnants of the Alleged Contraband Photos Were Found on the Camera Card ........................................................................................................... 35 VI. Perjury by Brian SFE Booth, Senior Forensic Examiner for the FBI 36 A. SFE Booth Committed Perjury in Testifying that EXIF Data Was Difficult to Change ....................................................................................................... 36 B. SFE Booth Committed Perjury in Testifying that It Was Not Unusual to Received Evidence that is Unsealed with No Record of the Unsealing .......................................................................................................................... 37 C. SFE Booth Committed Perjury in Testifying that There Was No Need to Create a Chain-of-Custody Log Every Time an Evidence Item Is Opened .......................................................................................................................... 37 VII. Prosecutorial Anomalies .................................................................................. 38 Tully & Weiss Attorney at Law Page 3 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. INTRODUCTION During the jury trial in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282 1, government prosecutors charged Mr. Raniere, in part with racketeering acts of possession of child pornography and sexual exploitation of a child by using 22 nude photos found on a backup hard drive 2 of a female, identified at trial as “Camila.” 3 The government alleged that the photos were taken when Camila was fifteen. However, by only visually looking at the photos it was not self-evident that Camila was underage at the time the photos were taken, and Camila did not testify. Therefore, the government had to rely on digital evidence and argue two things: one, that the 22 photos were indeed taken at a time when Camila was under 18, and two, the photos were taken by Keith Raniere. I I I To show Camila was under the age of eighteen in the photos, the government used various metadata, primarily the Exchangeable Image File Format, hereafter “EXIF,” Creation dates of the 22 alleged contraband photos. EXIF Creation dates are ‘birthdays’ of digital photos, assigned to them by the digital camera when the photos are taken. 4 Other metadata can include File System dates, such as “Creation,” “Modified,” and “Accessed” dates, also assigned by the digital camera when the photos are taken. In trial, the government argued that the metadata for the 22 photos showed that they were taken in 2005, when Camila would have been 15 years old and, because metadata and EXIF data cannot be easily modified, Camila was underage in the photos. I METADATA ' I I EXIF Data l I l -- -System ----, File Data d□□□D I Creation Device/ Program Creation Modified I Accessed Figure A. Hierarchy of Metadata types. To tie the 22 photos on the backup hard drive to Mr. Raniere, the government could not use the hard drive alone. The hard drive was an external hard drive Citations to documents in the court record are cited herein as United States v. Raniere and or Raniere, supra, 18-cr-204-1 (NGG) (VMS). 2 Referred to as the “Western Digital ‘Hard’ Disc ‘Drive,’” or “WD HDD” at the trial. 3 See United States v. Raniere,18-cr-204-1 (NGG) (VMS) Dkt. 430 – Superseding Indictment. 4 Id. at Trial Transcript hereafter, “Trial Tr.” at 4817:18-4821: 22. 1 Tully & Weiss Attorney at Law Page 4 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. which supposedly held the backup data of three different computers. 5 Those computers, and the files transferred from them to the hard drive, could have belonged to, or have been used and accessed by several different people within the NXIVM community. Therefore, the government argued that: (1) Mr. Raniere used a particular Canon digital camera to take the photos; (2) when he took the photos, the camera stored those photos on its camera card 6; (3) Mr. Raniere then downloaded the 22 photos off the camera card onto a Dell computer; and (4) that computer was backed up to the hard drive. I However, after trial, three top digital forensic experts were hired to analyze evidence relevant to the digital photos. This digital evidence had not been analyzed before or during jury trial due to the government’s late disclosure of the evidence to Mr. Raniere’s defense team. All three experts, to their surprise and dismay, found a multitude of anomalies that evidenced that the alleged contraband photos were manufactured and planted. The digital evidence had clearly been manually altered to make the photos appear as if they were taken on the specific camera in 2005 before being automatically backed up to the hard drive in 2009. Further, the folders where the alleged contraband photos were located were created manually but made to look as if they were automatically created by a computer program in 2005. In fact, all the digital anomalies that the experts found on the backup hard drive and the camera card were designed to support the government’s narrative which it used to secure convictions for the racketeering acts of possessing child pornography and sexual exploitation of a minor. In the prosecution’s own words, these 22 photos were “the heart of our racketeering conspiracy.” 7 A summary of the experts’ findings follows. I I. Anomalies with the FBI Search and Evidence Handling Before addressing the technical anomalies that the experts used to prove that the hard drive and camera card were tampered with, it is important to understand the FBI’s highly suspicious pattern of activities surrounding these items. To begin, on March 27, 2018, when the FBI raided 8 Hale Drive, Halfmoon, New York, a residence Mr. Raniere sometimes used, FBI agents entered the home, completely bypassed the entrance, skipped the entirety of the downstairs area, went immediately upstairs, bypassed several more areas, and Raniere, supra,18-cr-204-1 (NGG) (VMS) Trial Tr. at 4928:3-7. Referred to as “CF” card, or the camera’s compact flash card. 7 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Status Conference Transcript (March 18, 2019), hereafter “Status Con. Tr.” at 19:8-16 [emphasis added]. 5 6 Tully & Weiss Attorney at Law Page 5 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. went straight to a study area where, from under a desk, they collected their first two evidentiary items: the Canon digital camera and its camera card. There were several other evidentiary items on top of as well as under the desk right next to the camera that were later seized, but these were not collected initially. The agents then went to a bookshelf on the other side of the same room, and, from the top of this bookshelf, where three hard drives resided sideby-side, they seized the specific backup hard drive in question here. 9 I The FBI then collected eleven more evidence items, some taken from rooms that had been previously skipped over, before returning to look under the same desk from where they had seized the camera. Only in the second search underneath the desk did they collect evidence item #14 - another external hard drive. At the end of the raid, agents returned to the bookshelf and collected the hard drive in question, which was later marked evidence item #2, as well as two other hard drives which were later marked as evidence items #36 and #37. Notably, evidence items #1 and #2, the camera card and hard drive, just so happen to be the only two pieces of digital evidence the government used to argue the child pornography and child exploitation RICO acts, based on an allegedly ‘accidental’ discovery of the 22 photos nearly eleven months later. Figure: B. 10 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Trial Tr. at 4297:2-4305:9; Government Trial Exhibit 502A, hereafter “GX 502A,” at GX 502A-32 & 33. 10 Raniere, supra, 18-cr-204-1 (NGG) (VMS) GX 502A-24. 9 Tully & Weiss Attorney at Law Page 6 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. Figure: C. 11 I Figure: D. 12 Id. at GX 502A-32. Raniere, supra, 18-cr-204-1 (NGG) (VMS) GX 502A-45; see also Trial Tr. at 4304:18-22 [according to the FBI, evidence was numbered and photographed based on the chronological order of when the evidence was found.] 11 12 Tully & Weiss Attorney at Law Page 7 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. Figure: E. 13 Figure: F drives. 13 14 14 Hard drive containing the 22 photos in the middle of two other hard Id. at GX 502A-24. Raniere, supra, 18-cr-204-1 (NGG) (VMS) GX 502A-24. Tully & Weiss Attorney at Law Page 8 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. II. Anomalies with Evidence Collection, Processing, and Analysis The FBI’s unusual pattern of evidence collection during the raid on March 27, 2018, belies that at least someone in their party knew these devices would contain alleged contraband photos. The facts surrounding this suspicious pattern of evidence collection stand in stark contrast to the case agent’s, FBI Special Agent hereafter “SA,” Michael Lever, claim of ‘accidental’ discovery of the 22 photos on February 21, 2019 – 10 months and 25 days after the hard drive was seized and labeled as “Evidence Item #2.” 15 As for the camera and its camera card, despite being the first items seized, SA Lever did not deliver them to the FBI’s forensics laboratory, hereafter “CART,” for analysis until February 22, 2019 – 332 days after the items were seized. 16 I I • n pril , , ever checke d the camera a nd it s camera card into v ide nce ontrol. his wa s done prope rly since, according to policy, evidence must be checke d into a sec ure l ocation, suc h as vide nce ont rol, w ithin da ys of it be ing seize d. • On July 10, 2018, SA Maegan Rees checked out the camera and camera card for “evidence review,” and returned it July 27, 2018. • On August 8, 2018, SA Lever delivered the hard drive and other evidence, excluding the camera and camera card, to the CART lab where it was received by Forensic Examiner Trainee Virginia Donnelly, hereafter “FET Donnelly.” 23 I • On September 19, 2018, SA Lever checked out the camera and camera card for “evidence review,” and returned it September 26, 2018. In total, SA’s Lever and Rees checked out the camera and camera card from evidence control for 24 days for “evidence review.” During this time, they had unrestricted access to these critical evidence items. However, FBI protocol strictly prohibits case agents from checking out and reviewing data on digital devices before the devices are processed by a forensic examiner in a CART forensic lab. 26 A CART forensic examiner will make a forensic image - an exact copy of a device in the identical state it was in when it was found at the scene and then will examine the forensic image and not the original device. This protocol preserves the integrity of digital evidence as it keeps the original evidence in a pristine state while still allowing testing on the forensic image. ■ Both FBI SA’s Rees and Lever violated this protocol when they individually checked out the camera and camera card from Evidence Control, for “evidence 15 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 594-2 at ¶ 8 & 11 – Affidavit of FBI Special Agent Michael Lever (Feb. 22, 2019) hereafter “Second Lever Aff.” (filed under seal); see also Dkt 618 at 2. 16 Id. at Defense Trial Exhibit 945 hereafter “DX 945,” – FBI Evidence Chain of Custody for Item 1; see also GX 502A-32 & 33; Trial Tr. at 4304:16-4305:9. 20 Id. at DX 945. 21 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. A at 15. 23 Raniere, supra, 18-cr-204-1 (NGG) (VMS) DX 961 at Bates 001-004. 26 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. C at 21. Tully & Weiss Attorney at Law Page 9 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. review” even though the CART lab had not yet forensically imaged the items. 27 Thus, they each individually checked out these items for purposes of reviewing them, when FBI protocol specifically prohibits any such review by either of them. Further, it is proven to a scientific certainty that, on September 19, 2018, when SA Lever had the camera and camera card checked out, an unknown person accessed and modified the contents of the camera card at least once. 28 I • On September 19, 2018, FET Donnelly forensically imaged the hard drive. 31 • On September 24, 2018, FET Donnelly processed the hard drive. 34 • On September 26, 2018, SA Lever checked the hard drive out of evidence and checked it into storage. • On October 3, 2018, FET Donnelly notified SA Lever that the hard drive was available through the secure network platform called, “Case Agent Investigative Review” hereafter “CAIR.” 35 Thus, while SA Lever was prohibited from directly analyzing the hard drive, 36 he could look through the forensic image by logging onto CAIR. I I I • I Nonetheless, on February 22, 2019, SA Lever was the last person to accept custody of the hard drive when he checked it out from Evidence Control. 37 There have been no logs which list what SA Lever did with the hard drive. Thus, his actions with it are unknown. It is also unknown who took custody of the hard drive when he was finished with it. I February 22, 2019, is also the date that SA Lever allegedly accidentally ‘discovered’ the 22 alleged contraband photos using the CAIR system. Thus, in addition to being an additional violation of FBI protocol, SA Lever’s physical possession of the hard drive on February 22, 2019, makes no operational sense - he was already accessing a forensic copy of the hard drive on CAIR, he had no need to possess the physical item. Id. Id. at Dkt 1169-1 at Ex. D at Bates 006-007 Finding 3; Bates 012 Appendix A; Bates 032 conclusion; Bates 034 Finding 4; Bates 035-036 Finding 3 & 4; Bates 0054 Finding 6. 31 Id. at DX 961 at Bates 011. 34 Id. at DX 961 at Bates 024 35 Id. at DX 961 at Bates 25. 36 FBI’s Digital Evidence Policy Guide 37 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Defense Trial Exhibit 960 here after “DX 960,” – FBI Evidence Chain of Custody for Item 2. 27 28 Tully & Weiss Attorney at Law Page 10 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. • On February 22, 2019, two hours after he checked out the hard drive, 40 SA Lever delivered the camera card to CART for the first time, turning it over to Senior Forensic Examiner hereafter “SFE,” Stephen Flatley.” 41 I • On April 11, 2019, SFE Brian Booth generated a forensic report for the hard drive based on FET Donnelly's processing. 42 On this same date, SFE Flatley generated a forensic report for the camera card based on his own processing of it. 43 I I Importantly, SFE Flatley’s report for the camera card when paired with SFE Booth’s report for the hard drive, only offered weak support for the government’s theory that Mr. Raniere took the 22 alleged contraband photos with the Canon camera then backed those photos up to the hard drive, as there were only four matching photo files between the two devices, 180, 181, 182, and 183. 44 I • I On June 7, 2019, SA Lever made an unauthorized 45 request for SFE Booth to reexamine the camera card under the suspect guise of SFE Flatley’s unavailability for trial. SFE Flatley’s unavailability arose from a suspicious and sudden reassignment to Ghana, Africa just six days before he would have otherwise been called to testify about the camera card. 46 Moreover, when SA Lever requested SFE Booth to reexamine the camera card, SFE Flatley had had possession of it in the CART lab since February 22, 2019. 47 However, instead of SFE Flatley giving the camera card directly to SFE Booth, who worked in the same CART lab, the items were transferred to SA Elliot McGinnis on June 7, 2019. SA McGinnis had the items in his custody for 3 days before he gave them to SA Christopher Mills, on June 10, 2019. SA Mills had the items in his custody from 10:02 I I Raniere, supra, 18-cr-204-1 (NGG) (VMS) DX 960 at 3 Id. at DX 945 at 3. 42 Raniere, supra, 18-cr-204-1 (NGG) (VMS) DX 961 at Bates 028. 43 Id. at GX 521A – Forensic Report of the Camera Card by SFE Stephen SFE Flatley (4/11/2019). 44 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 028, Appendix D, Introduction. 45 Id. at Dkt. 1169-1 at Ex. D at Bates 037 at Fn. 6 [“The FBI Digital Evidence Policy Guide, Section 3.3.11.2 states, “Unless approved by the AD, OTD as outlined below, examinations are not conducted on any evidence that has been previously subjected to the same type of technical examination (hereinafter referred to as a ‘re-examination.’)” One of the reasons for this policy is to “[e]nsure that the integrity of the evidence is maintained” (p. 37). A publicly released version of this document, which includes many other requirements for a reexamination, may be found at https://vault.fbi.gov/digital-evidence-policy-guide/digitalevidence-policy-guide-part-01-of-01/view ”]. 46 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Trial Tr. at 4987:1-16; see also DX 961 at Bates 029. 47 Id. at DX 945. 40 41 Tully & Weiss Attorney at Law Page 11 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. a.m., and then gave them to SFE Booth at 4:55 p.m. 48 On June 11, 2019, during the last week of trial, SFE Booth, without getting proper authorization, created a second forensic image, then generated a second forensic report which incredibly showed 37 new files which were not present in SFE Flatley’s previous report. 49 This new report, in contrast to SFE Flatley’s report, now offered strong support for the government’s theory as there were now 31 matching photo files between the two devices. 50 I 48 49 50 Id. Id. at Dkt. 1169-1 at Ex. D at Bates 029, Appendix D. Id. Tully & Weiss Attorney at Law Page 12 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. . nomal ies on a rd riv e The hard drive that contained the 22 photos of alleged child pornography was an external hard drive that had backed up files from three computers. While the government presented the folder containing the 22 photos in trial as part of a normal backup performed from a computer allegedly belonging to Mr. Raniere, the computer was never located. Additionally, forensic examination by experts with extensive law enforcement backgrounds, former FBI Special Agent Dr. J. Richard Kiper, Ph.D. 60 and Steven Abrams, who worked extensively with law enforcement including the United States Secret Service, 61 revealed that the files, folders, and metadata were manufactured and/or altered and manually planted on the hard drive. Thus, the ‘child pornography’ was manufactured and Mr. Raniere was framed. I A. I The Backup Itself The hard drive appeared as if someone had used it to back up files from three different computers. 62 Two of the backups were typical, but the third was aberrant. The alleged contraband photos were located in the third, aberrant backup. I The two ‘typical’ backups contained folders commonly used in computer backups such as “My Documents,” “Desktop,” and “Favorites.” While the aberrant backup did contain folders called, “My DVD’s,” “My Music,” “My Pictures,” “Studies,” and “Symantec,” these folders were practically empty. “My DVD’s” contained no DVD’s, “My Pictures” contained one, sample picture, and “Symantec” contained only traces of a text file. The only two folders with significant content were “Studies,” which contained 167 nude photos including the 22 alleged contraband photos and one photo of a tree, and “My Music,” which contained 150 or so music files. The aberrant backup also occurred in a suspicious two steps. In the first step, only the “Studies” folder containing the 22 alleged contraband pictures was backed up. In the second step, performed approximately 90 minutes later, the other folders “My DVDs,” “My Music,” “My Pictures,” “Studies,” “NeroVision,” and “Symantec” were backed up. 68 Since the folders in this second step were practically empty, it does not make logical sense for anyone to back them up. I Thus, the data here is more consistent with someone planting the “Studies” folder on the hard drive in such a way to make it look like a backup and then, Id. at Dkt. 1169-1 at Ex. D, E, F; see also Ex. D1. [Dr. J. Richard Kiper, Ph.D., served as an FBI Special Agent for 20 years, from 1999 to 2019, with more than half of that career in cybersecurity and digital forensics]. 61 Id. at Ex. E at Bates 001. 62 Id. at Dkt. 1169-1 at Ex. D at Bates 010, Finding 7; see also Trial Tr. at 4928:3-7. 68 Dkt. 1169-1 at Ex. D at Bates 010-011, Finding 7. 60 Tully & Weiss Attorney at Law Page 13 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. 90 minutes later, adding the other empty folders and the music files to make the ‘backup’ appear more legitimate. B. Folders and Subfolders Within the “Studies” folder were subfolders. The subfolders were named in a YEAR-MM-DD-HHMM-SS format purporting to show the time that the subfolder was created. For instance, “2005-11-02-0422-20,” would represent November 2, 2005, at 4:22:20 am. 70 These folders appear to be computergenerated as users do not typically name folders after exact times down to the second. 71 I I These particular subfolders will be referred to as “DateTime” folders. The DateTime folder names roughly match the metadata (e.g. the EXIF Creation dates) of the photo files stored within. In other words, these DateTime subfolders present as if the photos they contain were taken in 2005 and that, shortly after being taken, someone downloaded the photo files to the computer using a program that automatically generated these DateTime folders. However, like all folders on a computer, the names of these DateTime folders are easily modifiable. Nonetheless, the government relied upon these DateTime folder names together with metadata of the photo files’ within them, which is also easily modifiable, to date the photos to 2005 in arguing its case at trial. 72 I However, anomalies with the DateTime folders show that, while they appear to be the result of automation via computer software, it is scientifically provable that some, if not all, of these folders are rather the result of manual manipulation. 73 Firstly, these subfolders could not have been generated by the Canon camera. That particular Canon camera generates folders named “CANON100” to store the first 100 photos, “CANON200” to store the second 100 photos, “CANON300” to store the third set of 100 photos, and so on. Therefore, any subfolders that were created to contain photos from the Canon camera that do not follow this naming convention were either created through other computer software or manually, not by the camera. 74 I ■ Secondly, in evaluating between computer automation or manual manipulation, there are two anomalies present in these DateTime folders that prove manual manipulation. The first anomaly is that two subfolders, “200510-19-0727-57” and “2005-10-19-0727-59,” appear to have been created two seconds apart, at 7:27:57 am and 7:27:59 am, respectively, on October 19, 2005. DateTime folder 2005-10-19-0727-57 contained photo files 90-98. 70 71 72 73 74 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Trial Tr. at 4873:19 – 4874:4. Id. at Dkt. 1169-1 at Ex. D at Bates 008, Finding 6. Id. at Trial Tr. at 5371:16-24. Id. at Dkt. 1169-1 at Ex. D at Bates 008-009, Finding 6. Id. Tully & Weiss Attorney at Law Page 14 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. DateTime folder 2005-10-19-0727-59 contained photo files 79-89. However, for these times to be authentically created, this would require a user selecting one batch of photo files from the camera, 90-98, choosing an option through a software program to download them to a computer, waiting for them to fully download, and then selecting the second batch of photo files from the camera, 79-89, choosing the option through the software program to download them to a computer, and waiting for them to fully download – all within two seconds. That is implausibly fast. [Maybe use JD’s video example here. He will have to do affidavit to establish foundation for the demonstrative evidence.] More plausibly, someone named the folders manually but did not take reality into account. 75 I Thirdly, an anomaly was discovered in what is called a “Thumbs.db” file. In earlier versions of Windows, a Thumbs.db file was automatically generated for each folder and contained previews of each file in that folder. If a person opened a folder and clicked on “icon view” to look at the thumbnail images of the files in that folder, the Thumbs.db file was what allowed this to happen. 76 I As one would expect, there was a “Thumbs.db” file in each of the two subfolders, “2005-10-19-0727-57” and “2005-10-19-0727-59.” However, the Thumbs.db file in both 2005-10-19-0727-57 and 2005-10-19-0727-59 each contained previews of photo files 79 all the way through 98. This means that all the photos, photo files 79-89 and photo files 90-98, used to reside in a single, originating folder. This means that the entire set of photo files were first downloaded to a computer in one folder before someone manually separated the ranges and put them into the two separate subfolders. If the sets were downloaded to separate folders originally as their names indicate, each Thumbs.db file would only contain thumbnails for their specific set, 90-98 or 79-89, respectively. This further contradicts the “automatic” insinuation of the folder names. 77 I Thus, it is proven to a scientific certainty that subfolders 2005-10-19-0727-57 and 2005-10-19-0727-59 were manually manipulated with the intention of appearing to be automated backups, in exact alignment with the government’s narrative. This does not mean that the other subfolders were not manipulated, it only means that evidence of tampering in the other subfolders was not yet discovered given the minimal discovery that the Defense has received to date. While these two DateTime subfolders, 57 and 59, were not alleged to contain any contraband photos, they exist on the same hard drive where the alleged contraband photos were ‘accidentally’ discovered by SA Lever and they helped to support the same narrative that the government used to argue the illegal nature of alleged contraband photos. 75 76 77 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 008-009, Finding 6. Id. Id. Tully & Weiss Attorney at Law Page 15 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. C. Files Within the “Studies” Folder Within the “Studies” folder, photo files’ metadata was manually altered to comport with the government’s narrative that the alleged contraband photographs were taken in 2005. To understand the tampering done to these files, it is important to understand what an “EXIF Creation” date is and what “File System Creation,” “Modified,” and “Accessed” dates are. It is also important to remember that all EXIF and File System data can be easily changed by even an unsophisticated user on a computer. l METADATA l l-------i ODD□□ EXIF ~ Data Creation Device/ Program I File System Data Creation Modified Accessed Figure A. Hierarchy of Metadata types. An EXIF Creation date is the date set on a photo by the camera when taken. 78 This date will not change without manual alteration of the data. Even a modification of the image will not change this initial EXIF Creation date. In contrast, a File System, hereafter “FS” Creation date is automatically updated each time the file is saved to a new device. 79 For example, there is an initial FS Creation date when the picture arrives to the camera card. The EXIF Creation date and the first FS Creation date will be almost identical. However, when a photo file is sent to another device, downloaded to a computer, or backed up to a hard drive, the FS Creation date get updated, whereas the EXIF Creation date will not change. However, the FS Creation date will not change if a photo is merely moved from one folder to another, on the same device. The File System Modified date is the date that marks the last time the photo was edited. 80 The initial FS Modified date will be almost identical to the EXIF Creation date as well. The FS Modified date will not change unless the photograph is modified in some way, such as applying a filter or cropping it. I 78 79 80 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D. at Bates 007 Finding 4. Id. Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D. at Bates 007 Finding 4. Tully & Weiss Attorney at Law Page 16 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. The FS Modified date will not automatically change upon transfer to a new device. 81 Thus, even if a photo file is moved from a camera card to a computer, and then to a backup hard drive, if the photo file is not modified from the original picture taken, the FS Modified date will not change. The only exceptions to this are 1.) if the device that the photo file is saved on has a different time zone than a receiving device, or 2.) if the receiving device has a daylight savings setting that is turned on, then the FS Modified date might change on the receiving device to reflect the new time zone or be adjusted by one hour for daylight savings. I The File System Access date is the date that marks the last day the photo file was opened. The photo file need not be modified in any way to have the FS Access date change. Imagine a puppy born to a school for dogs that trains them to be service animals. When the puppy is born, it would get a birth certificate from the veterinarian and the school would create a document noting the puppy’s official acceptance into the school. The birth certificate would be the EXIF Creation date and the acceptance into the school would be the FS Creation date. The dates and times would be very close, if not identical. If the puppy was sent to a different school, that school would create a new document noting the puppy’s official acceptance, but this would not affect the puppy’s birthdate on its birth certificate. As the puppy is put through different training modules, the school would keep track of the courses the puppy has completed to mark the change in its behavior. Each record of the puppy graduating from a module would be an FS Modified date. Lastly, the school would want one of their staff to periodically see and touch the puppy to give it personal attention such as a play day. This would be the FS Accessed date. The birth certificate (EXIF Creation date) of the puppy would always stay the same, unless someone tampered with it. However, if the puppy was ever sent to a different school, for every new school the puppy was sent to, it would receive a new acceptance certificate (FS Creation date). For every training module it completed at any school, it would receive a new training certificate (FS Modified date). Every time after birth that the puppy was seen and given personal attention such as a play day, that would be logged as well (FS Accessed date). 1. Metadata Regarding Daylight Savings Time Was Manually Altered to Appear as If It Was Automatically Done by A Computer To understand how the metadata shows tampering, one must keep in mind that, while an EXIF Creation date does not change when a file is copied to another computer, an FS Creation date does. The FS Modified also does not automatically change when a file is copied to another computer, but it may be 81 Id. Tully & Weiss Attorney at Law Page 17 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. interpreted differently when the file is copied, depending on the new computer’s time zone settings. 82 ■ Daylight Savings Time in 2005 occurred on Sunday, October 30, at 2:00 a.m. 83 Photo files 43 to 126 in the “Studies” folder have metadata that insinuate that they were taken before the daylight savings change, between October 16, 2005, and October 29, 2005. However, photo files 127 to 149 have metadata insinuating they were taken after the daylight savings change on October 30, 2005 after 2:00 a.m. 84 I I The photos allegedly taken before the daylight savings change, photo files 43 to 126, had FS Modified dates one hour behind those of the EXIF Creation dates. 85 This could naturally occur on a computer if the computer was set to compensate for daylight savings time. Imagine a puppy born to a school in Arizona, a state which does not observe daylight savings, that is transferred to a school in California, a state which does observe daylight savings. The a school in California would not change the veterinarian’s birth certificate for the puppy, but it may adjust the time of the puppy’s Arizona training certificates by one hour to conform to California’s observance of daylight savings. I However, for photo files 127 to 137, purportedly taken after the October 30, 2005 daylight savings time switch, their FS Modified dates were two hours behind the time listed in the EXIF Creation dates. 86 Then, on the same day, for photo files 138 to 149, their FS Modified dates matched their EXIF Creation dates. 87 Notably, photo files 127 to 137 belonged to a single folder and were the only photos on the hard drive with this two-hour difference between their EXIF Creation dates and their FS Modified dates. Nothing outside of human intervention could account for these changes. 88 This would be akin to the puppy school in California receiving a litter of puppies from Arizona when California was observing daylight savings and adjusting the time of the puppies’ Arizona training certificates by two hours for the first half of the litter and then by zero hours for the second half. While humans may make these mistakes, computers cannot. I I I Id. Clock Changes in New York, New York, USA 2005 (Accessed on August 28, 2022) found at https://www.timeanddate.com/time/change/usa/new-york?year=2005 84 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Appendix B, at Bates 015 019. 85 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 007 Finding 4. 86 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 007 Finding 4. 87 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 007 Finding 4. 88 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 007 Finding 4. 82 83 Tully & Weiss Attorney at Law Page 18 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. Further, here, neither the Canon camera nor the camera card are able to store a time zone. 89 Therefore, it is not possible that a computer receiving these photo files would automatically adjust the FS Modified dates for the time zone. It is unlikely but not impossible that the computer could automatically adjust the FS Modified date by one hour for daylight savings, 90 akin to the puppy school in California routinely adjusting the time of a puppy’s initial acceptance that it received from any outside school by one hour, just to be sure that, if there was a daylight savings adjustment, that adjustment would guaranteed. This is possible, but highly unlikely. I I Regardless, what is ironclad is that the two-hour difference could not have come from an automatic adjustment by a computer since Daylight Savings Time only adjusts by one hour. Also, the inconsistency between photo files 127 to 137 being adjusted (two hours) and photo files 138 to 149 not being adjusted at all (zero hours) is a scientific impossibility; either the computer is set to adjust for daylight savings for photo files with EXIF Creation dates after October 30, 2005, at 2:00 a.m. or it is not. Because all photo files in 127 to 149 present as being taken after the daylight savings change, either they all should have been adjusted, or none should have been adjusted. Since computers cannot have made these mistakes, manual intervention is the only explanation here. Thus, it can be concluded that the dates of the photos in the “Studies” folder were manually manipulated as human tampering is the most plausible explanation for these otherwise inexplicable anomalies. 2. Metadata On at Least One Photo Was Falsified to Cover Up That the Photo Had Been Altered Adobe Photoshop Elements is a popular consumer photo-editing program. It is a sister product to Adobe Photoshop, a more well-known professional photoediting program. Like all such photo-editing programs, if someone used Adobe Photoshop Elements to edit a photo file, the program would leave a mark in the photo file’s EXIF data. Specifically, the photo file’s EXIF CreatorTool value would get set to “Adobe Photoshop Elements.” This lets someone looking at the EXIF data know what program was used to modify the photo file. Kiper Ex. D, Finding 5, bates 7-8. The alleged contraband photos on the hard drive are photo files 150 to 163 and 184 to 191. 92 Photo file 175 appears in the middle of these two ranges. Like the I Canon EOS 20D Digital Camera Manual at 34 (setting the date and time), found at http://gdlp01.c-wss.com/gds/9/0900000259/01/EOS20DIM-EN.pdf 90 The Windows Club – Adjusting For Daylight Savings Time Automatically, found at https://www.thewindowsclub.com/enable-or-disable-adjust-for-daylight-savingtime#:~:text=automatically%20toggle%20button.,Windows%2010,saving%20time%20automatically%20toggle%20button 92 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Trial Tr. at 4875:24 - 4879:4. 89 Tully & Weiss Attorney at Law Page 19 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. other photo files on the hard drive, photo file 175 contains in its EXIF data the model and serial number of the Canon camera. However, its EXIF CreatorTool value is set to “Adobe Photoshop Elements 3.0,” evidencing that Adobe Photoshop was used to open and modify the photo file’s data. 93 The “Adobe Photoshop Elements 3.0” CreatorTool value is not present in the EXIF data of any of the other photo files in the “Studies” folder. 94 I I The “Adobe Photoshop Elements 3.0” CreatorTool value could not have been put on photo file 175 by the Canon camera. Adobe Photoshop is a computer program that only runs on a computer, not a camera. Therefore, the “Adobe Photoshop Elements 3.0” CreatorTool value had to put inside the EXIF data of photo file 175 by a person running the Adobe Photoshop Elements program on a computer and editing that photo file. Though it cannot be discerned just how, we do have definitive proof that that someone did indeed tamper with at least photo file 175 because its metadata was manually altered to cover up that the file had been changed. The proof of this is shown by comparing the two alleged counterparts for photo file 175 on the camera card, where it purportedly originated, versus its copy on the hard drive, where it was purportedly backed up. On the camera card, the FS Modified date for photo file 175 is November 10, 2005, at 8:25:04 p.m. On the hard drive, the FS Modified date for photo file 175 is November 10, 2005, at 8:25:04 p.m. Thus, they appear to be identical. However, we know that photo file 175 on the hard drive was modified on a computer at some point using Adobe Photoshop Elements because its CreatorTool value was set to “Adobe Photoshop Elements 3.0” whereas the photo file on the camera card was not. Kiper Ex. D, Finding 5, bates 7-8. Therefore, because photo file 175 on the hard drive was modified on a computer at some point using Adobe Photoshop Elements, the FS Modified date for photo file 175 on the hard drive should be different than its alleged counterpart on the camera card, which did not have its CreatorTool value set to “Adobe Photoshop Elements 3.0.” 95 However, inexplicably, their FS Modified dates are the identical, down to the exact second. Thus, we can say to a scientific certainty that someone manually altered photo file 175’s FS Modified date on the hard drive to make it appear as if the photo had not been modified, when in fact it had. Further, the fact that only one file on the hard drive, photo file 175, contains the EXIF CreatorTool value set at “Photoshop Adobe Elements 3.0” is likely due to an oversight on the part of the person altering the EXIF data. It is likely that other photos in the “Studies” folder had also been altered using Adobe Photoshop Elements but the EXIF data regarding the CreatorTool was manually changed to set the value at zero to cover up the I 93 94 95 Id. at Dkt. 1169-1 at Ex. D at Bates 007-008, Finding 5. Id. Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 007-008, Finding 5. Tully & Weiss Attorney at Law Page 20 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. alterations and the tamperer(s) merely made the mistake of leaving the EXIF CreatorTool value for photo file 175 set at “Photoshop Adobe Elements 3.0.” 96 I Canon Camera Camera card 1 Unknown Dell Hard drive Dimension Computer l [I] [I] Photo 175 (camera card) Photo 175 (hard drive) Both have the identical Modified dates FS Modified Date: 11/10/2005 8:25:04 p.m. FS Modified Date: 11/10/2005 8:25:04 p.m. However, Photo file 175 on the hard drive was modified by Adobe Photoshop Elements on a computer EXIF CreatorTool value: (none) EXIF CreatorTool value: Photoshop Adobe Elements 3.0 Because Photo file 175 on the hard drive was modified by Adobe Photoshop Elements on a computer, the FS Modified Date should have been after 11/10/2005, the purported date the photo was taken. FS Modified Date: 11/10/2005 8:25:04 p.m. FS Modified Date: 11/10/2005 8:25:04 p.m. Photo file 175 from both the Camera card and the hard drive purport to match identically Bogus Figure G: Photo file 175 was altered on a computer but someone tried to cover that alteration up. 3. 96 File System Creation Dates Impossibly Precede Both the Date the Photos Were Allegedly Taken and the Date the Photos Were Allegedly Backed Up. Id. Tully & Weiss Attorney at Law Page 21 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. When a file is copied to another device, the FS Creation date for the file automatically updates upon transfer, marking when the file was copied to the new device. When a folder containing files is copied to another device, the FS Creation date for the folder, and all of the files within it, are automatically updated, marking when the folder, and all of the files within it, were copied to the new device. Further, FS Creation dates are updated to the current clock time of the computer receiving the files; if one copied photo files with FS Creation dates of January 1, 2019, from one computer to another on January 1, 2022, the moved photo files would receive a new FS Creation date of January 1, 2022, updated from January 1, 2019. FS Creation dates are also updated when files are backed up from a computer to a backup hard drive. However, because a backup hard drive does not have its own clock like a computer does, the FS Creation dates for the backed-up files would adopt whatever time the computer’s clock was set to at the time of the backup. For instance, if one set the clock back on their computer from January 1, 2022, to January 1, 2019, nothing would happen to the files on the computer. However, if one then backed up files to a hard drive, because the hard drive does not have a clock of its own, the files would adopt their FS Creation dates from the transferring computer at the time of the backup. Thus, in this example, the files backed up to the backup hard drive would have FS Creation dates of January 1, 2019. However, while FS Creation dates automatically change every time a photo is copied to another device, be it another computer or backup hard drive, neither the EXIF Creation date nor the FS Modified date automatically change. The EXIF Creation date will not change unless it is manually altered. The FS Modified date will not change unless the photo is edited, the data is manually altered, or it is automatically adjusted based on a time zone setting. Thus, on a computer, FS Creation dates should be the same as or come after the EXIF Creation and FS Modified dates. In an automatic computer backup, FS Creation dates should always come after the EXIF Creation and FS Modified dates, since the backed-up files will get updated FS Creation dates, while the EXIF Creation and FS Modified dates will not. Kiper finding 7, Bates 10-11. Tully & Weiss Attorney at Law Page 22 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. FS Creation Date January 1, 2022 EXIF Creation & FS Modified Date January 1, 2022 FS Creation Date February 1, 2022 EXIF Creation & FS Modified Date January 1, 2022 FS Creation Date March 1, 2022 EXIF Creation & FS Modified Date January 1, 2022 Photo taken January 1, 2022 [I] Same photo moved to computer February 1, 2022 [I] Same photo backed up to hard drive on March 1, 2022 [I] Figure H: Interplay between copying photo files and FS Creation, EXIF Creation, and FS Modified Dates. Here, the particular folder alleged to be the source of the contraband photos, is named “BKP.DellDimension8300-20090330,” and, according to its file listing came from the third, aberrant backup. The later part of the folder’s name, “20090330,” implies that it resulted from an automatic backup that occurred on March 30, 2009. 97 Further, the backup folder also had an FS Creation date of March 30, 2009. 98 These two data points strongly corroborate the government’s theory of the contraband photos being taken in 2005 and backed up to the backup hard drive in 2009. I owever, if one goe s bey ond this surface leve l of exam ination, and l ooks at reat ion date s, one finds that all the photo file s in this entire back up folde r have reation dates of uly , . Further, within the “Studies” subfolder of this backup, the EXIF Creation dates and the FS Modified dates for all photo files fall within a range from October 17, 2005, to December 30, 2005. 104 This implies that the photos were taken between those two dates. However, all the FS Creation dates for these same files are July 26, 2003. 105 Of course, this is impossible because one cannot ■ ■ Id.; See also Id. at Trial Tr. at 4792:20-21. Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 010, Finding 7. 102 Raniere, supra, 18-cr-204-1 (NGG) (VMS) GX 505A. 104 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Appendix B, Bates 015217. 105 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Appendix B, Bates 015217. 97 98 Tully & Weiss Attorney at Law Page 23 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. back up a photo file two years before one has taken the photo. Moreover, the Canon camera in question was not manufactured until 2004. 106 ■ Since time travel is impossible, the most plausible explanation for these anomalies is tampering. The data here evidences that the tamperer(s), in an effort to be authentic, rolled their computer’s clock back to 2003, perhaps thinking, ‘Since I want the photos to look like they were taken in 2005, I’d better have my computer look like it was from 2003.’ Then, the tamper(s) manually copied the photo files from their computer to the backup hard drive, unbeknownst to them giving all the files FS Creation dates of July 26, 2003. Next, on the hard drive, the tamper(s) manually changed the folder’s name to “20090330,” and its FS Creation date to March 30, 2009. However, the tamperer(s) either forgot to change, or were unaware of the need to change, the individual photo files’ FS Creation dates from 2003 to 2009, thus leaving smoking gun evidence of tampering. Moreover, the backup folder also has an FS Accessed date, or “Last Accessed” date, of July 28, 2003, evidencing that this was not a one-time fluke occurrence but rather the tamperer(s) kept their computer clock rolled back while they perpetrated the tampering over a period of days. 107 ■ DP Preview, Canon EOS 20D and preview (August 19, 2004) found at https://www.dpreview.com/articles/1172584268/canon-eos20d 107 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 010, Finding 7. 106 Tully & Weiss Attorney at Law Page 24 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. IV. Anomalies on Camera Card While the camera card was never alleged to contain any contraband images after it was seized by the FBI, the government used it in trial to link Mr. Raniere to the 22 alleged contraband photos found on the hard drive. The government’s evidence related that, since 31 of the non-contraband photo files from the camera card found in the Canon camera also appeared on the hard drive, in the range before and after the contraband photos, the contraband photos must also have come from the same camera, which had been linked to Mr. Raniere. The alleged link between the specific Canon camera and Mr. Raniere were two disparate descriptions from two witnesses who had seen Mr. Raniere with cameras in the past. These descriptions were, “Like a normal camera, like a camera with a flash. Not like a phone camera, like a – like a photographer’s camera,” and “There was a big camera. It was a big professional camera.” 108 Despite the Canon camera’s availability to the government, no witness was ever asked to identify it, nor shown the camera to confirm whether it was the item they were describing. ■ 168 photos (including 22 contraband) found on “Studies” folder 31 photos from camera card that ‘match’ other (non-contraband) photos found on hard drive before and after contraband range Camera card Camera linked to Mr. Raniere through testimony Canon Camera Figure J: Government’s trial narrative linking Raniere to contraband photos. However, experts have found extensive evidence of tampering on the camera card and uncovered circumstances which strongly evidence that such tampering occurred while the camera card was in FBI custody. 109 Thus, the corroborative evidence from the camera card used by the government to link the Canon camera, and thus Mr. Raniere, to the alleged contraband photos resulted from tampering, therefore it was not competent evidence, and therefore the convictions that resulted therefrom should be vacated. ■ Trial Tr. at 1536: 25 – 1537: 1; 2569; 2568: 24-25. Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt 1169-1 at Ex. D at Bates 006-007 Finding 3; Bates 012 Appendix A; Bates 032 conclusion; Bates 034 Finding 4; Bates 035-036 Finding 3 & 4; Bates 0054 Finding 6. 108 109 Tully & Weiss Attorney at Law Page 25 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. A. The Camera Card Was Altered on September 19, 2018, While in FBI Custody On September 19, 2018, FET Donnelly created a forensic copy of the hard drive. 110 However, also on September 19, 2018, before the camera card had been processed by the CART lab, the case agent for this case, SA Lever, checked the camera card out of Evidence Control for “review.” This is in direct violation of FBI policy which prohibits any examination of electronic evidence before it has been processed by the CART lab. 111 Thus, SA Lever checked out an evidence item that neither he, nor any other agent, was authorized to view or inspect at the time. Kiper Ex. D, finding 3, Bates 35. ■ ■ Also, on this same day, September 19, 2018, the camera card was improperly accessed without a write-blocker and was irrevocably altered. 112 A writeblocker is a device that allows one to access digital evidence without writing to it, as writing to a piece of digital evidence destroys its integrity. 113 ■ ■ Thus, because the camera card was accessed without a write-blocker, its FS Accessed dates (last accessed dates) were overwritten. Consequently, it is impossible to tell whether other alterations were made at that time or previously. Additionally, the FBI has never disclosed records of who accessed and altered the camera card on this date. Ex D. findings 3 &4, Bates 35. The fact that an unknown and unauthorized person accessed the camera card in an unauthorized manner which destroyed the integrity of the item on the same day that Donnelly made a forensic copy of the hard drive in an authorized manner shows a level of coordination among FBI personnel regarding the hard drive and the camera card both on and off the record. This is damning since the alleged contraband photos had not been discovered yet, so the hard drive and camera card would not have been highly relevant to any criminality as alleged in the search warrant. [CITE to SEARCH WARRANT.] B. The Camera Card Was Most Likely Altered Between April 11, 2019, and June 11, 2019, While in FBI Custody On April 11, 2019, SFE Stephen and SFE Flatley conducted a forensic examination of the camera card. 114 SFE Flatley, using the forensic examining software “AccessData Forensic Toolkit,” version 6.3.1.26, found 42 photos on ■ Id. at DX 961 at Bates 011; Bates 024 Id. at DX 945; See also Dkt. 1169-1 at Ex. C at 21. 112 Id. at Ex. D at Bates 006-007 Finding 3; Bates 012 Appendix A; Bates 032 conclusion; Bates 034 Finding 4; Bates 035-036 Finding 3 & 4; Bates 0054 Finding 6; see also Trial Tr. at 4966:24 - 4973:9. 113 Id. at Trial Tr. at 4781:5-19. 110 111 Raniere, supra, 18-cr-204-1 (NGG) (VMS) at GX 521A – Forensic Report of Camera Card completed by SFE Flatley on April 11, 2019. 114 Tully & Weiss Attorney at Law Page 26 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. the camera card. 115 However, his forensic examination found only four photos on the camera card (photo files 180-183) which ‘matched’ counterpart photos on the hard drive (photo files 180-183). 116 While four matching photos on a camera card from a camera linked to Mr. Raniere could have established a link between Mr. Raniere and the contraband photos on the hard drive, it was weak in terms of proving a direct connection beyond a reasonable doubt in front of a jury. ■ However, two months later, on June 11, 2019, SFE Booth conducted a second forensic examination of the camera card. 117 He used the same software, AccessData Forensic Toolkit, and the same version of the software, version 6.3.1.26, that Flatley had used in his April 11, 2019, forensic examination. However, SFE Booth ’s June 11, 2019, report incredibly found 37 new photos, of which 31 ‘matched’ photos on the hard drive. 118 ■ ■ 1. SFE Booth’s Second Examination of the Camera Card on June 11, 2019, Was Conducted Under Highly Suspicious Circumstances A second forensic examination is very unusual and is strictly prohibited by FBI policy barring obtaining specific authorization from the executive management of the FBI Operational Technology Division. 119 Nonetheless, on June 7, 2019, during the last few days of trial, SA Lever, against FBI policy, 120 requested SFE Booth to complete a new examination of and report on the camera card. 121 ■ ■ ■ SA Lever requested this reexamination purportedly because SFE Flatley was going to be overseas and therefore unavailable to testify about his work on the April 11, 2019 camera card report. 124 However, according to the FBI’s chain of custody log, 125 SFE Flatley turned over custody of the camera card to SA McGinnis on June 7, 2019, the same day SA Lever requested the second examination, thus SFE Flatley was not yet overseas. Moreover, since trial began on May 7, 2019, SFE Flatley had been available to testify at any time during the previous four weeks of trial. There was no legitimate need to reexamine the camera card and create a second report. The most plausible reason to do so is that new files and alterations had been made to the camera ■ ■ Id. Id.; See also Id. at Dkt. 1169-1 at Ex. D at Bates 028-029 Appendix D, Figure 1 & 2. 117 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Trial Tr. at 4903:1-7; DX 961 at Bates 029-030; see also GX 521A – Replacement Forensic Report of Camera Card completed by SFE Booth on June 11, 2019, hereafter “GX 521A Replacement.” 118 Id. at Dkt. 1169-1 Ex. D at Bates 028-32. 119 Id. at Bates 037 Fn. 6. 120 Id. at Ex. D at Bates 037 Fn. 6. 121 Raniere, supra, 18-cr-204-1 (NGG) (VMS) DX 961 at Bates 029. 124 Raniere, supra, 18-cr-204-1 (NGG) (VMS) DX 961 at Bates 029. 125 Id. at DX 945. 115 116 Tully & Weiss Attorney at Law Page 27 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. card and needed to appear on the camera card’s forensic inventory prior to SFE Booth testifying. The FBI’s forensic lab, CART, has a policy for reexaminations that require approval from the executive management of the FBI Operational Technology Division. 126 However, SFE Booth did not obtain such approval. Instead, he only obtained approval from his acting supervisor, Supervising Special Agent, hereafter “SSA,” Trenton Schmatz. SSA Schmatz did not have authorization to grant this approval, but he did so anyway. 128 ■ ■ On June 10, 2019, the day before the reexamination, according to SFE Booth’s testimony, SA Mills delivered the camera card to SFE Booth in an unsealed bag. 129 This was more than fourteen months after the search team had collected it and on the fourth to last day of a trial that spanned 43 days. There is no record of who unsealed this evidence nor at what point it was unsealed. On June 11, 2019, the day before he took the stand at the tail end of trial, SFE Booth reexamined the camera card and completed a new report for the device. 130 SFE Booth’s examination notes 131 end abruptly after he created the forensic copy of the camera card. Normally, details, such as the options a forensic examiner chose while processing the data with the forensic software as well as the final disposition of the original or derivative evidence would complete a normal CART forensic report. Strangely, these details were left out of SFE Booth ’s evidence notes. 132 ■ ■ ■ ■ 2. Photo Files 93, 94, 96, and 97 Are Bogus Four of the photographs that appeared for the first time on SFE Booth’s June 11, 2019, report, photo files 93, 94, 96, and 97, appear on the surface to have matching counterpart photo files on the hard drive. This was used by the government at trial to support their theory that the alleged contraband photos on the hard drive were taken by the camera. 133 However, all three forensic experts hired by the defense after trial discovered a major blunder by the tamperer(s) regarding these four files; despite photo files 93, 94, 96 and 97 having identical filenames and identical metadata on both the camera ■ Id. at Dkt. 1169-1 at Ex. D at Bates 037 Fn. 6. Id. at Bates 037 Fn. 6. [SSA Trenton Schmatz is a supervisory special agent based on his title, he had insufficient authorization to grant the approval for reexamination of the camera card]. 129 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Trial Tr. at 4889:14-18. 130 Id. at GX 521A Replacement; See also Id. at Trial Tr. at 4826: 6-17. 131 Id. at DX 961 at Bates 030. 132 Raniere, supra, 18-cr-204-1 (NGG) (VMS) DX 961 at Bates 030. 133 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Trial Tr. at 4857:2 -11 [linking the camera card with the camera]]; 4858:2:20 [where the camera card report is described]; 4901:21 – 4902:3 [where SFE Booth describes what the camera card is and its relationship to the camera; and 4911:9-15 [where SFE Booth describes how many photos were on the camera card]. 126 128 Tully & Weiss Attorney at Law Page 28 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. card and hard drive, on the camera card, the thumbnails for these photos files are all of a blonde woman, whereas on the hard drive, the thumbnails for photo files 93, 94, 96, and 97 are all of a completely different woman - a brunette. 134 On a normal backup, the camera card’s photo files, to include their thumbnails, would have counterparts on the hard drive that are identical matches. Computers do not make such errors; thus, this anomaly can only be due to manual tampering. ■ Further, the thumbnails of photo files 93, 94, 96, and 97 from SFE Booth’s June 11, 2019, camera card report are identical to the thumbnails of photo files 180, 181, 182, and 183 on this same camera card. Kiper, Ex. D, finding 1, Bates 4. Not only are they visually the same, but their MD5 Hash, or digital “fingerprints,” are identical. Kiper, Ex. D, Bates 23, Appendix C, Table 1. Of note, photo files 180, 181, 182, and 183 were the only four files in common between the hard drive and the camera card according to the original April 11, 2019, camera card report and the original April 11, 2019, hard drive report. Kiper, Appendix C, Bates 22. The fact that photo files 93, 94, 96, and 97 are exact copies of photo files 180, 181, 182, and 183, informs us how the tamperer(s) likely created the bogus photo files 93, 94, 96, and 97 - as well as all 37 new photo files from the June 11, 2019, report. Because the hard drive had already been checked into evidence, forensically copied, examined in CART, and loaded into the Case Agent Investigative Review system, hereafter the “CAIR system,” the tamperer(s) would not have had direct access to the hard drive and thus could not copy files directly from the hard drive to paste into the camera card. Thus, the safest way to reverse-engineer ‘matches’ between the hard drive and the camera card would be to replicate the four proven matches - photo files 180-183. Thus, on a computer, the tamperer(s) copied the four photo files 180, 181, 182, and 183, and pasted them. They then renamed the pasted copies to 93, 94, 96, and 97, respectively. They then altered the metadata of the copies to match the metadata of photo files 93, 94, 96, and 97 as found on the April 11, 2019, hard drive report, to make the photo files on both devices appear to match. Kiper, Ex. D, Finding 1, Bates 4. - Such anomalies can only reasonably be explained by manual tampering. Since the camera card was in the custody of the FBI during the time of the appearance of these anomalies, members of the FBI are the only reasonable suspects. 3. Thirty-Seven New Files Appear to Have Been Added to the Camera Card Between April 11, 2019, and June 11, 2019, While It Was in FBI Custody SFE Booth used the identical software and identical version of the software for his June 11, 2019, camera card report that SFE Flatley used for his April, 11, 134 Id. at Dkt. 1169-1 at Ex. D at Bates 003, Finding 1. Tully & Weiss Attorney at Law Page 29 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. 2019, camera card report. However, SFE Booth’s report had an additional 37 new photos than did Flatley’s. 135 Accordingly, with these new 37 photos, the government now had a total of 31 photos from the camera card that ‘matched’ photos on the hard drive, significantly more than the four matches that SFE Flatley had originally found. Kiper, finding 2, bullet point 2, Bates 5 AND (together with) Kiper, Appendix B, Bates 15-21. ■ Damningly, while the 42 photo files originally found by SFE Flatley were all viewable, none of the new 37 photo files from SFE Booth ’s June 11, 2019, forensic examination were viewable. 136 More damning, none of the MD5 hashes (digital fingerprints) for the new files on the camera card report match their namesakes on the hard drive report. Mismatched MD5 hashes means they are not the same files. Kiper, Bates 5. Again here we see that, despite having identical filenames and identical metadata on both the camera card and hard drive, which are easily to change, the new 31 matching photo files in Booth’s camera card report do not truly match their counterpart photo files on the hard drive report. Kiper, Bates 6. ■ The pattern of tampering and attempted cover up is obvious here. Due to the coordination required between the hard drive, which was in the FBI’s custody, and the camera card, which was in the FBI’s custody, the FBI must have been complicit. 4. The Arrangement of the Thirty-Seven New Files on the Camera Card Indicates That They Were Placed There Manually Rather Than as a Result of Someone Taking Photos Before SFE Booth’s June 11, 2019, camera card report, there were only four photo files in common between the camera card and backup hard drive (180183). Kiper, Ex. D. Bates 28. Eight of the newly appearing photo files (172-179) are located immediately before these common photo files. Next is a range of alleged contraband photos (184-191). Then, eight more of the newly appearing files (193-200) follow right after the alleged contraband range. The ‘neat symmetry’ of sixteen of the newly appearing photo files appearing before and after the alleged contraband photos fit the government’s narrative precisely. Such newly appearing ‘neat symmetry’ in precisely the locations the government would need for its narrative is mathematically improbable and thus is more likely the result of tampering rather than coincidence. Id. at Dkt. 1169-1 at Ex. D at Bates 028-32. Id. at Bates 005, Finding 2; Bates 028-29, Appendix D; Ex. E at Bates 003-02, Finding 1; Ex. F at Bates 004-005. 135 136 Tully & Weiss Attorney at Law Page 30 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. Photo File # 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 8 newly appearing photo files The only photos files initially in common between the camera card and the backup hard drive 2nd range of alleged contraband 193 8 more newly appearing photo files 194 195 196 197 198 199 200 Figure K: Showing the ‘neat symmetry’ of sixteen of the photo files which newly appeared on Booth’s June 11, 2019 Camera Card Report. There is yet another example of this ‘neat symmetry’ on Booth’s June 11, 2019, Camera Card Report which evidences intentional placement rather than random photo taking behavior. Notably, on the hard drive, under the “Studies” folder, there are three ranges of photos each with its own subfolder 139: ■ • • • 139 Photo files 79-89 of “MsK” (Kathy) Photo files 90-98 of “Df” (Daniela) Photo files 99-108 of “Mnp” (Marianna and Pam) Raniere, supra, 18-cr-204-1 (NGG) (VMS) at GX 505. Tully & Weiss Attorney at Law Page 31 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. Yet suspiciously, only photo files 81 to 100 are among the files to newly appear on Booth’s June 11, 2019 camera card report. (Figure L, below.) Photo files 79 and 80 from the Kathy range and photo files 101 to 108 from the Marianna and Pam range are missing. It is extremely unlikely that a normal camera user would have taken photos, saved them all to a hard drive and then go back to the camera and delete segments of photo ranges in this manner. For instance, a normal camera user would not take eleven photos of Kathy, photo files 79-89, back up all eleven to a hard drive, and then go back to the camera to delete only photos 79 and 80. Likewise with the range of Marianna and Pam, a normal camera user would not take exactly ten photos, photo files 99-108, back up all ten, and then go back to the camera and delete only the last eight photos, 101-108. In contrast, with the range of Daniela, no photo is deleted. This behavior is inexplicable and would not be reasonable camera user behavior. However, it is reasonable that someone who wanted a stronger relationship between the camera card and the hard drive picked a nice, round number of twenty files, photo files 81-100, and manufactured them so that they may appear on Booth’s June 11, 2019, camera card report to line up with significant ranges of photos files present on the April 11, 2018, hard drive report. 143 ■ 143 Id. at Bates 35, Finding 3. Tully & Weiss Attorney at Law Page 32 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. April 11, 2019 April 11, 2019 June 11, 2019 Hard Drive Camera Card Camera Card 79 80 81 81 82 82 83 83 84 84 85 85 86 86 87 87 88 88 89 89 Daniela 90 90 91 91 92 92 93 93 94 94 95 95 96 96 97 97 98 98 Marianna & 99 99 Pam 100 100 101 102 103 104 105 106 107 108 Figure L: Showing the ‘neat symmetry’ of exactly twenty photo files newly appearing on Booth’s June 11, 2019, Camera Card Report. Subject Kathy Tully & Weiss Attorney at Law Page 33 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. . elltale issing ata from ooth ’s une , , amera ard e port The camera card file listing from SFE Booth’s June 11, 2019, report shows a sequence of recovered photos and remnants of photos, allegedly the source of the photos on the hard drive. However, there are large gaps of missing photo files on the camera card, compared to the complete sequence on the hard drive. 146 ■ April 11, 2019 Hard Drive Report MISSING MISSING 43-80 81-100 101-149 150-163 [alleged contraband] 164-165, 168-169 June 11, 2019 Camera Card Report 21-41 42 MISSING 81-100 MISSING 172-179 sans 173 180-183 184-191 [alleged contraband] 194, 197-199 172-179 180-183 MISSING 203-223 MISSING 193-200 MISSING 224-243, sans 226, 232, and 240 Figure: K Comparison of June 11, 2019, Camera Card report and April 11, 2019, Hard Drive report. 147 • Note that where the above chart states, “MISSING,” in the June 11, 2019, Camera Card Report, there was no data, not even remnants of deleted data, able to be recovered. This means that either the photo files were never there to begin with, they were forensically deleted “wiped,” or they were deleted by the user and overwritten by the camera taking subsequent photos. Of these options, a camera user forensically wiping the camera card only in these particular swaths is not consistent with normal use of a camera, where the user might review and choose to occasionally delete unwanted photographs as desired. Moreover, it would not make logical sense for a camera user to take out the camera card from the camera, use a computer to forensically wipe some of the files, which requires specialized software, and then leave everything 146 D. 147 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 028-029, Appendix Illustration of Appendix D found at Id. Tully & Weiss Attorney at Law Page 34 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. else. Further, the camera card here was not close to being full; thus, any subsequent photos could not have completely written over remnants of deleted photo files. [CITE.] 1111 While there is an argument that Mr. Raniere could have wiped swaths of photo files from the camera card to remove the contraband photos, the deleted swaths also include other photos that were not contraband. Additionally, this theory of Mr. Raniere forensically deleting random swaths of data from the camera card to cover up his crime loses ground if one considers the government narrative at trial that Mr. Raniere created contraband photos in 2005 on a camera, then, in 2009, backed them up to a hard drive that multiple other people had access to, and simply just left them there from 2009 to 2018 a period of nine years - for the FBI to later find. There is no need to contort logic to find an explanation for these missing swaths of data; the pattern here is entirely consistent with a tamperer looking at photo files on the hard drive and manufacturing ‘matches’ on the camera card. Because the tamperer(s) were merely adding manufactured ‘shells’ of photo files in certain swaths to the camera card to link the camera card to the hard drive, there would be nothing, not even remnants of deleted photos files, in the “Missing” sequences. Here, because the 37 new files were not viewable and had incomplete data, given the evidence we have now, these files are likely ‘shell’ files thus strongly supporting the tampering theory. . o emna nts of the llege d ontraband hotos e re ound on the ame ra ard The alleged contraband photos, photo files 150-163 and 184-191, appear in neither the April nor the June forensic reports the government produced of the camera card. However, if the government’s narrative of the contraband photos originating on the Canon camera and then being backed up to the hard drive was true, then at least some remnants of these photos would be found on the camera card. 150 However, no such remnants were found. Thus, the government’s narrative must be false. ■ 150 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 029, Observations. Tully & Weiss Attorney at Law Page 35 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. V. Perjury by Brian SFE Booth, FBI Senior Forensic Examiner During his testimony on the third-to-last and second-to-last day of evidence during jury trial, SFE Booth testified falsely while under oath on the stand. Further, in all three areas where SFE Booth committed perjury, he specifically covered up the tampering and thus enabled the government’s false narrative. A. SFE Booth Committed Perjury in Testifying that EXIF Data Was Difficult to Change SFE Booth testified while under oath that metadata, such as EXIF data and “creation dates,” was difficult to change and, in fact, was designed to be difficult to change. 151 This testimony regarding the reliability of the 2005 dates helped the government’s narrative that the 22 photos of Camila were contraband. 152 However, in actuality, EXIF data is quite easy to change, and anyone can do so on a home computer with no special software needed. Moreover, simply performing an internet search for “change EXIF data on photo” yields a multitude of free tools appearing in the search results that can all easily change EXIF data. 153 In fact, changing Metadata such as EXIF data and creation dates, is as easy as changing words or sentences in a Microsoft Word document. SFE Booth, as a senior forensic examiner for the FBI, had to have known this, but chose to lie about it on the stand. ■ ■ ■ Additionally, as of late August 2022, new evidence has surfaced that also corroborates that the government used false testimony in this case. In 2016, three years before this trial, SFE Flatley, who was a material witness in this case before being abruptly reassigned to Ghana, Africa at the last moment, testified as a qualified expert in United States v. Hirst 15-cr-643 (PKC) (S.D.N.Y. Apr. 18, 2022) that the FBI does not rely on metadata alone in determining a document's date because metadata can be “manipulated.” 154 Flatley’s testimony in Hirst is the exact opposite of the testimony that the government solicited from SFE Booth in this case. It is no wonder that SFE Flatley was assigned to Ghana a mere two days before he was set to testify. It is no wonder that someone in the government, or a group, wanted to, and needed to, substitute SFE Booth’s testimony for SFE’s Flatley’s testimony. As the government itself said, “the child pornography is also at the heart of our racketeering conspiracy.” Without the racketeering charges, the government would have faced substantial venue, jurisdiction, and statute of limitations issues. ■ Id. at Trial Tr. at 4818:24-4820:20, 4830:3-11, 4977:11-14. Id. at Trial Tr. at 5371:16-24; 5571:13-5572:3 153 Id. at Ex. D at Bates 042-046, Modifying Photograph EXIF Data. 154 United States v. Hirst, 15-cr-643 (PKC) Dkt. 316 – Trial Transcript (September 20, 2016) hereafter “Galanis Trial Tr.,” at 939:15-18; 941:6-12 [emphasis added]; see also Exhibit B attached herein. 151 152 Tully & Weiss Attorney at Law Page 36 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. B. SFE Booth Committed Perjury in Testifying that It Was Not Unusual to Receive Evidence that is Unsealed with No Record of the Unsealing SFE Booth also testified that it was not unusual in the FBI to receive opened or unsealed evidence items where there was no record of who unsealed the evidence. 155 However, in actuality, all physical evidence admitted into court must have a chain of custody proving that it was unaltered. As part of this process, evidence must be sealed. 156 This is a basic rule of evidence. In fact, most people who watch courtroom dramas on television know that evidence must be sealed and have a clear chain-of-custody. ■ ■ SFE Booth’s camera card report is materially different from Flatley’s prior camera card report such that 37 new, and defective, files appeared on Booth’s report which coincidentally bolstered the prosecution’s case regarding the alleged contraband photos. Thus, it would have been imperative to have sealed evidence with a documented, clear chain-of-custody to prove that no wrongdoing happened to the camera card. Of course, we do not have that here and, not coincidentally, we have a small mountain of evidence that the camera card was tampered with. C. SFE Booth Committed Perjury in Testifying that There Was No Need to Create a Chain-of-Custody Log Every Time an Evidence Item Is Opened Relatedly, SFE Booth testified that there was no need to create a chain-ofcustody log every time an evidence item is opened. 157 However, in actuality, all physical evidence to be admitted into court must have a chain of custody proving that it was unaltered. Therefore, anytime a bag of sealed evidence is opened, there needs to be a log recording the opening of the evidence item. 158 Thus, his testimony was not truthful. As a senior forensic examiner for the FBI, SFE Booth must have known this basic rule of evidence as he is well aware of how evidence is logged and categorized as it makes its way through collection and analysis. ■ ■ 155 156 157 158 Raniere, supra, 18-CR-204 (NGG) Trial Tr. at 4886:15-4887:23. Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 1169-1 at Ex. D at Bates 033-035, Finding 1 Id. at Trial Tr. at 4887:21-4888:4. Id. at 18-CR-204 (NGG) Dkt. 1169-1 at Ex. D at Bates 035, Finding 5. Tully & Weiss Attorney at Law Page 37 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. VI. Prosecutorial Anomalies As early as September 13, 2018, one of the lead prosecutors in this case, AUSA Penza had been referencing additional charges, specifically tied to discussion of discovery around the 60 devices found at the two residences during execution of the search warrant on March 27, 2018. 159 On January 9, 2019, AUSA Penza, told the Court, “[T]he government continues to expect a superseding indictment in this case… [T]here are a number of factors that are weighing into the timing considerations for a superseding indictment.” 160 However, as previously noted, the FBI did not allegedly discover the contraband photos until February 21, 2019. 162 This would not happen until 44 days after her January 9, 2019 statement to the court and a whopping 162 days after her September 13, 2018 statement to the court. ■ ■ ■ On March 13, 2019, when the government did file its second superseding indictment, the only new additions were the allegations regarding possession of child pornography and sexual exploitation of a minor. Since the only difference between the first superseding indictment and the second superseding indictment was new charges based on the alleged contraband photos, this raises the standard question of, ‘What did Ms. Penza know and when did she know it?’ AUSA Penza’s impossibly precognitive statements to the court months before the alleged contraband photos were found, should be considered disturbing, especially in light of the irrefutable and expert-validated proof of government tampering presented in this document. Raniere, supra, 18-cr-204-1 (NGG) (VMS) Scheduling Conference Transcript (September 13, 2018), at 13: 24 -14: 8. 160 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Motion Hearing Transcript (January 9, 2019) hereafter “Mot Tr., (1/9/18)” at 4:4-25. 162 Raniere, supra, 18-cr-204-1 (NGG) (VMS) Dkt. 594-2 – Second Lever Aff at ¶ 8 & 11 (filed under seal); See also Dkt 618 at 2. 159 Tully & Weiss Attorney at Law Page 38 of 39 The Government’s use of altered evidence and false testimony by the FBI in United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282. CONCLUSION Fundamental fairness and every Accused’s right to a fair and just trial is the cornerstone of our criminal justice system. As this document establishes, Mr. Raniere was denied these fundamental rights in the jury trial of United States v. Raniere (E.D.N.Y. 2019) 384 F. Supp. 3d 282 when the government presented false and manipulated evidence. The Court must move on this immediately and grant a stay of the appeal so that this injustice may be addressed and remedied at the earliest possible time. It is not a statutory time limit that should motivate the Court to address this post-haste, but rather the need to prevent further injustice. Not only is there a manifest injustice each second that Mr. Raniere continues to spend behind bars based on false and manipulated evidence, but the bad actors within government who perpetrated this planting, manufacturing, and tampering of evidence, continue to work on and be involved with new cases. Whether they are engaging in this same criminal conduct on other cases or not, when the tampering in this case is finally acknowledged in Court and Mr. Raniere is vindicated of these heinous charges, the actions of any governmental actors subsequently proven to be involved, will need to be questioned and re-examined in all other cases in which they were allowed to work. Delaying the District Court’s review and response to the governmental tampering here, which the evidence shows to a scientific certainty, will only allow this harm to continue and will negatively impact many other Accused individuals, as well as many other cases which, in turn, will negatively impact the functioning of the court system. Tully & Weiss Attorney at Law Page 39 of 39