State v Bradley Cooper 5-3-11

Status
Not open for further replies.
"Justice rooted in passion is not justice, it is vengence"

wow
 
I agree. I don't think it was a good move for the defense to put that visual back in front of the jury.

It's actually a very good idea. The Google search is the only strong piece of evidence that the prosecution has. The defense needs to talk about it now in order to preempt the prosecution's closing statement which will no doubt highlight it. Kurtz needs to make sure that the jury is well aware of the doubts about it before the prosecution starts.
 
I thought Kurtz did a great job! I loved the Thomas Jefferson reference.
 
If the Jury gets the case today there will be a verdict before 5
 
Kurtz has proven NOTHING. NOT ONE THING.

All he's proven is that he whines and spouts hot air. Oh yes, he did prove people are GULLIBLE. Well, there's that.

Uh, many could say the EXACT same sentiment about the other Howard. He has proven NOTHING. NOT ONE THING.
 
Kurtz has proven NOTHING. NOT ONE THING.

All he's proven is that he whines and spouts hot air. Oh yes, he did prove people are GULLIBLE. Well, there's that.

Change Kurtz to "The State" and I would agree with you.
 
Here's the rest - whew!

-----------------------------------------------------------------------------------

We know BC worked VM in ireland, had several different VMsystems, PG testified to this.
Computer based evidence, lets talk...its the only way the State can argue a link between BC and NC death. Computer was outside his custody at 5:20 7/15 remained on for 27 hours on WEp protected wireless network
692 files modified from 5:20 period until computer shut off 27 hours later
despite allegations of tampering FBI did nothing to elimiinate possibility of tampering
they claimed to evaluate altered filed, could not explain how certain files altered
ALL email folders and temop internet folder altered'
All temop index filed altered
altered files are not files which would be altered through auto-updates, you have heard testimony how easy that is
you also heard that if there was a cookie associated w/search that they would be abloe to take that info and ask Google who did it, when was it done, what computer produced search...all details couldbe prvided. you heard from Cahp also done w/other Google cookies.
reason for no google cookie that matched search is that google cookie cannot be forged, no way to do it whereby if sent back to google with subpeona could get info, they ignored cisco routers, you heard cisco keeps a great deal of records no info about their router logs being checked for google search in their cache.
You heard Sa Johnson testify that one cause of invalid timestamps (one column) is dropping a file onto a computer. Reason it can trigger that is the way that timestamp is generated. that timestamp is invalid on every one of the map files.
In addition to the not looking for cookie, indications time had been changed onmachine after machine was out of his custody
BC password for user account was changed and not present in SAm reigstry and not included in report for that computer at all
Chap said irrelevent for report, while at the same time he put exactly that info in NC computer report
Admin password also altered, Chap initial report said 'change to admin PW or invalid login are signs of tamper but not found"...well it was found on machine and Chap admitted when confrinted
3 successive attempts to log into admin account after in CPD custody
If you know where it is you intend to drop a body you dont search on a google map to find a spot.
What happens when you browse google maps, a successive series of maps shopwing a b-line, each time map refreshes each block has to refresh, each page was in internet history, but to get all the way to that point no benefit for that type of search.

only reason to go directly to that spot is to put that image on a system, inconsistent with anything logical someone would do...when we look beyond image itself, and look to timestamps, you all had oporunity to look at FBi version of MFT, you are able to look at invalid timestamps, you are no w able to see them graphically represented in blue comparision valid timestamps vs invalid (chart) 7/10, 7/11, 7/15 staggering amout of invalid timestamps, but over lifetime of machine grand tally 2% invalid July 10-12 80% timestamp fields invalid from entry indicates tampering.
narrow further to files related to google search 100% invalid timestamps
Likelihood of that type of statistic by chance is next to zero.
When we move and evaluate next question - FBI did fresh install of vista and claimed 3,000 invalid timestamps, what they did not say is that they did not come from entry modified...only 3, they argued equvalency but nothing equiv about it.
Cursor files, they start with open and closed hand .cur vs .bmp an anomoly difficult to explain, impossible to explain time of creation is same as time of access for all of the times. invalid entry-modified timestamp (all map files) but important you saw US-NC-Cary requires use of cursor, SA J testimony prior to seeing this was he expected cursor to be in use as a file until last touch = time and date as last access.
If using cirsor to navigate there is some period of time elapsing.
Only reason they would all be identical would beif somebody was sloppy (in tampering).
BC internet history from the morngin of 7/12: museums for kids, activities - in theory 'establishing a digital alibi", people who establish digital ablibis do not delete evidence and leave a facet of it.

Idea of search dog that doesn't track after 14 hours.
Sony vio email on computer which would indicate BC had an extra computer unaccounted for, in fact email was a fwd of email sent be new egg to someone else - but implication BC had Sony computer
Idea BC was looking for jobs in Canada...company he looked at was GR company- was llooking for means to contact GR not a job search
idea that Air canada indicates he was looking to flee, when his parents are flying in is a distortion
Idea of dirt on car door handle there on 16th not 12th no misconduct
Floormat exists that dismukes identifies as from BC BMW, but later say it belongs to BMW X5, and JA had already stated to police floormat was there prior to 12th - unrelated to any evidence in this case.
There are a litany of these items.
the idea that BC cellphone required a 32 digit password being drilled in , though understood by FBI, Cisco it was regular PW but after security level required this passcode.
Suggestion phone wiped by BC, but no reset on phone...Det Y char lifetime calls as 31 min, when it was clearly 31 hours
these are items that are difficult to reconcile.
Argument that BC deleted items off his phone after explanation re: deprovisioning Cisco, is misleading
Accusations, clear sources of info tainted themselves, if a well is poisoned you don;t drink any of the water.
CPD had agenda to show town safe, not a random act, nothgin to do with a van or a sex assault...instead they focused immediately on BC what hey believed outcome needed to be for their purposes.
Easier for them to let gossip become reality.
Spoon fed spouse
Willing to send an innocent man to rot in a jail for the rest of his life vs face truth about own shoddy work
T jeffereson (quote re: jury/vote) understood all too well, when you have opportunity for your peers to make judgement possibility to check power of govt.
Vengeance enjoys courage and confidence of convictions - cheap vs justice which honors a victim, vengeance in that victims name is shamefule.
Your verdict of NG will accomplish 3 things:
must follow rules designed for you to convict guilty and guilty alone
reopen investigation and find real culprit
allow BC to regain his life
They would have you act on emotion vs. logic & reason
the justice they claim ti seek = mob torch
We ask for you to find justice for NC and BC and find BC NG.
 
wral WRAL NEWS in NC
Kurtz: Cary police had an agenda: wanted to show town was safe, that they were doing their job, wasn't random act of violence.
 
Well, I am still not impressed. Wasn't that great an argument, IMO.
 
I agree. I don't think it was a good move for the defense to put that visual back in front of the jury.

I think it was very smart. The prosecution is going to....so put it up and discuss why you can't believe the evidence before the prosecution does.
 
I don't think Kurtz did a very good job. He was very confusing with the files and computer stuff.. he did not really keep it that simple. Who knows, only time will tell huh!

Who is there for her friends today? DD, HP and her sister and parents? Gosh that courthouse is full!
 
Thanks. I did not know that.
It is actually HK using the firms name. Back in July/Au 08 he would sign on, never post. I believe he found out he didn't have to sign on to read WS. Now it is a mystery when and if he is monitoring WS. IDK if he is or not
 
Here's the rest - whew!

-----------------------------------------------------------------------------------

We know BC worked VM in ireland, had several different VMsystems, PG testified to this.
Computer based evidence, lets talk...its the only way the State can argue a link between BC and NC death. Computer was outside his custody at 5:20 7/15 remained on for 27 hours on WEp protected wireless network
692 files modified from 5:20 period until computer shut off 27 hours later
despite allegations of tampering FBI did nothing to elimiinate possibility of tampering
they claimed to evaluate altered filed, could not explain how certain files altered
ALL email folders and temop internet folder altered'
All temop index filed altered
altered files are not files which would be altered through auto-updates, you have heard testimony how easy that is
you also heard that if there was a cookie associated w/search that they would be abloe to take that info and ask Google who did it, when was it done, what computer produced search...all details couldbe prvided. you heard from Cahp also done w/other Google cookies.
reason for no google cookie that matched search is that google cookie cannot be forged, no way to do it whereby if sent back to google with subpeona could get info, they ignored cisco routers, you heard cisco keeps a great deal of records no info about their router logs being checked for google search in their cache.
You heard Sa Johnson testify that one cause of invalid timestamps (one column) is dropping a file onto a computer. Reason it can trigger that is the way that timestamp is generated. that timestamp is invalid on every one of the map files.
In addition to the not looking for cookie, indications time had been changed onmachine after machine was out of his custody
BC password for user account was changed and not present in SAm reigstry and not included in report for that computer at all
Chap said irrelevent for report, while at the same time he put exactly that info in NC computer report
Admin password also altered, Chap initial report said 'change to admin PW or invalid login are signs of tamper but not found"...well it was found on machine and Chap admitted when confrinted
3 successive attempts to log into admin account after in CPD custody
If you know where it is you intend to drop a body you dont search on a google map to find a spot.
What happens when you browse google maps, a successive series of maps shopwing a b-line, each time map refreshes each block has to refresh, each page was in internet history, but to get all the way to that point no benefit for that type of search.

only reason to go directly to that spot is to put that image on a system, inconsistent with anything logical someone would do...when we look beyond image itself, and look to timestamps, you all had oporunity to look at FBi version of MFT, you are able to look at invalid timestamps, you are no w able to see them graphically represented in blue comparision valid timestamps vs invalid (chart) 7/10, 7/11, 7/15 staggering amout of invalid timestamps, but over lifetime of machine grand tally 2% invalid July 10-12 80% timestamp fields invalid from entry indicates tampering.
narrow further to files related to google search 100% invalid timestamps
Likelihood of that type of statistic by chance is next to zero.
When we move and evaluate next question - FBI did fresh install of vista and claimed 3,000 invalid timestamps, what they did not say is that they did not come from entry modified...only 3, they argued equvalency but nothing equiv about it.
Cursor files, they start with open and closed hand .cur vs .bmp an anomoly difficult to explain, impossible to explain time of creation is same as time of access for all of the times. invalid entry-modified timestamp (all map files) but important you saw US-NC-Cary requires use of cursor, SA J testimony prior to seeing this was he expected cursor to be in use as a file until last touch = time and date as last access.
If using cirsor to navigate there is some period of time elapsing.
Only reason they would all be identical would beif somebody was sloppy (in tampering).
BC internet history from the morngin of 7/12: museums for kids, activities - in theory 'establishing a digital alibi", people who establish digital ablibis do not delete evidence and leave a facet of it.

Idea of search dog that doesn't track after 14 hours.
Sony vio email on computer which would indicate BC had an extra computer unaccounted for, in fact email was a fwd of email sent be new egg to someone else - but implication BC had Sony computer
Idea BC was looking for jobs in Canada...company he looked at was GR company- was llooking for means to contact GR not a job search
idea that Air canada indicates he was looking to flee, when his parents are flying in is a distortion
Idea of dirt on car door handle there on 16th not 12th no misconduct
Floormat exists that dismukes identifies as from BC BMW, but later say it belongs to BMW X5, and JA had already stated to police floormat was there prior to 12th - unrelated to any evidence in this case.
There are a litany of these items.
the idea that BC cellphone required a 32 digit password being drilled in , though understood by FBI, Cisco it was regular PW but after security level required this passcode.
Suggestion phone wiped by BC, but no reset on phone...Det Y char lifetime calls as 31 min, when it was clearly 31 hours
these are items that are difficult to reconcile.
Argument that BC deleted items off his phone after explanation re: deprovisioning Cisco, is misleading
Accusations, clear sources of info tainted themselves, if a well is poisoned you don;t drink any of the water.
CPD had agenda to show town safe, not a random act, nothgin to do with a van or a sex assault...instead they focused immediately on BC what hey believed outcome needed to be for their purposes.
Easier for them to let gossip become reality.
Spoon fed spouse
Willing to send an innocent man to rot in a jail for the rest of his life vs face truth about own shoddy work
T jeffereson (quote re: jury/vote) understood all too well, when you have opportunity for your peers to make judgement possibility to check power of govt.
Vengeance enjoys courage and confidence of convictions - cheap vs justice which honors a victim, vengeance in that victims name is shamefule.
Your verdict of NG will accomplish 3 things:
must follow rules designed for you to convict guilty and guilty alone
reopen investigation and find real culprit
allow BC to regain his life
They would have you act on emotion vs. logic & reason
the justice they claim ti seek = mob torch
We ask for you to find justice for NC and BC and find BC NG.

Great Job!! :seeya:
 
Why would Cary PD *want* to prove the town was safe?

Safe town = less police needed! Smaller budget needed! Job loss!

big scary random van driving murderers take more resources to solve.

It's not like there haven't been tons of people who moved into Cary. Were they worried people would pack up and leave?

Pfffftttt.
 
wral WRAL NEWS in NC
Kurtz: Police and prosecutors are willing to send an innocent man to rot in a dungeon for the rest of his life. #coopertrial
 
Sure, but do you think that is the impression left with the jury? We have people in the courtroom that say more than a few members of the jury seemed put off by the FB testimony.

Honestly? I think that what the jury was left with is the image found on Brad's computer of that map zooming in on the spot where Nancy's body was found. Kurtz lost most when he started in on the technical stuff. I find it hard to believe that anyone really thinks someone planted that file on Brad's comptuer.
 
Status
Not open for further replies.

Members online

Online statistics

Members online
133
Guests online
3,436
Total visitors
3,569

Forum statistics

Threads
592,566
Messages
17,971,079
Members
228,815
Latest member
Sumner
Back
Top