There is a non-partisan federal case in which former FBI and DOJ officials have identified “indictable government crime” with a direct linkage to Jack Smith’s Mar-a-Lago prosecution.
The proof is in the government’s own records, as provided in a section below so you can verify the findings for yourself.
This proof implicates the actors listed below — and more — in intentional misconduct relating to what seven experts, four former FBI forensic examiners, have termed “evidentiary fraud.”
Many of these implicated actors were awarded by AG Merrick Garland for their very work in this case — after proof of the misconduct was filed by the defense — remain active, and have been involved in other major cases.
An investigation into these actors is an actionable path to weaponization indictments — backed by evidence that is already on the record.
| Agent / Official | Other Cases |
|---|---|
| David Loveall IIFBI Senior Computer Scientist | Jack Smith — Mar-a-Lago prosecution; Epstein death investigation — reviewed DVR controller logs at MCC |
| Michael LeverFBI Special Agent | Case agent on Robert C. Adams — MCC guard on duty the night of Epstein’s death |
| Unidentified FBI photograph technician | — |
| Maeghan ReesFBI | Douglas Mackey meme case |
| Brian BoothFBI Senior Forensic Examiner | — |
| Stephen FlatleyFBI Senior Forensic Examiner | Ghislaine Maxwell case |
| Moira Kim PenzaAUSA, EDNY | Summer Zervos v. Trump |
| Elliot McGinnisFBI Special Agent | One Taste case; case agent on Robert C. Adams — MCC guard on duty the night of Epstein’s death |
| Christopher MillsFBI | — |
| TFO Brett Hochron | — |
| SA Tracee Merge | — |
| Tanya HajjarAUSA, EDNY | — |
| Trenton SchmatzSSA, CART | — |
There are additional implicated personnel. These are based on findings you can confirm for yourself in the checklist below.
The case with the proof: United States v. Keith Raniere — a case in which the “sex offense” stigma around it is demonstrably false and manufactured, but people won’t look further or touch it because of that stigma — allowing demonstrably bad actors to remain in government. This is unacceptable in a system of blind justice.
Verify each point below — expand any item to see the proof:
On the verge of trial, a hard drive that had been in FBI custody for eleven months suddenly produced alleged nude photos of an underage subject — outside the warrant’s timeframe and charges, justified as “plain view because accidental,” later admitted on camera by the lead prosecutor to have been targeted, and forensically determined to have been planted.
| # | Fact | Proof click to enlarge ⤢ |
|---|---|---|
| 1 | The hard drive was seized at 8 Hale Drive. The warrant (Attachment B) was scoped to sex trafficking, forced labor, extortion, and racketeering. Child pornography is not on the list. | ![]() |
| 2 | February 21, 2019 — FBI claimed an “accidental discovery” on that drive: nude photos of a female, no sex act, dated to 2005. The 2005 date is the entire basis for charging the images as illegal — it would have made the subject 15. Produced child-exploitation charges and all 5 codefendants pleading guilty within a week, on the eve of trial. | ![]() |
| 3 | Former lead prosecutor Moira Penza admitted on HBO the discovery was not accidental. On The Vow (S2 E6) she called it “a matter of finding those” photos — the language of a targeted search. | |
| 4 | Seven experts (four former FBI) concluded under penalty of perjury that the photos had been planted and that timestamps on both the hard drive and the Canon memory card had been falsified to simulate the 2005 timeframe. | ![]() |

On September 19, 2018, an unidentified FBI photograph technician — who like all FBI personnel is trained that signing chain of custody is required — took possession of the camera’s memory card and did not sign the chain of custody. FBI Special Agent Michael Lever gave the device to them without having them sign it. This occurred before the memory card had been forensically preserved by the CART digital forensics lab, which is forbidden by FBI policy. The photograph technician then connected the unpreserved memory card to a computer without a forensic protective tool called a “write blocker” — which would have prevented any changes — and left it altered, as proven by the access date being overwritten to that date: 09/19/18.
Chain of custody records; Joint Forensic Report, Doc. 1253-1
A forensic image is a bit-for-bit copy of all data on a device, used to examine evidence without touching the original. Booth created a second forensic image from the physical memory card months after the first authorized imaging (by examiner Stephen Flatley). This is prohibited by FBI policy — a second extraction of the device. Booth documented that his CART supervisor Trenton Schmatz authorized the work, which both knew was prohibited. The prosecution told the court Booth did not image the devices, making this a secret forensic image. His report showed 37 additional photo files appearing in the same folders as Flatley’s report — and the seven experts concluded at least 28 were manipulated and at least 20 were planted by a computer onto the memory card.
| # | Fact | Proof click to enlarge ⤢ |
|---|---|---|
| 1 | Two forensic copies of the same memory card — made at different times — should contain exactly the same files. They didn’t. 37 additional photo files appeared in the second copy that were not in the first. The red entries in the diagram show files present only in the second copy. | ![]() |
Joint Forensic Report (PDF) · Flatley Report File Index · Booth Report File Index
| # | Fact | Proof click to enlarge ⤢ |
|---|---|---|
| 1 | Stephen Flatley was the FBI CART examiner who received and processed the Canon camera and its memory card — but only after the card had already been altered in earlier FBI custody. | ![]() |
| 2 | June 13, 2019 — AUSA Moira Penza told the court Flatley was “in Africa right now.” | ![]() |
| 3 | Same day — Brian Booth testified Flatley was “out on assignment in Ghana.” | ![]() |
| 4 | Ghana Immigration Service records show Flatley was not in Ghana in 2019, nor at any point after. Six entries, all in 2018. | ![]() |
| # | What the record shows | Source |
|---|---|---|
| 1 | The 8 Hale warrant — the only operative warrant for the camera — authorized search of files from 2015 onward only. | [Warrant screenshot placeholder] |
| 2 | FBI filtering protocol requires date-range filtering consistent with warrant scope. Files predating 2015 should have been excluded from review. | [Protocol reference placeholder] |
| 3 | A subset of files on the camera had their access dates overwritten to 2018 — six months after collection — as a result of FBI handling, making them appear to fall within the 2015+ warrant range. | [Date alteration evidence placeholder] |
| 4 | Circular justification: The only reason these pre-2015 files passed the warrant’s date filter is because the FBI’s own handling changed the dates. Flatley searched them anyway. | [Summary placeholder] |
In the Trump Mar-a-Lago case, Jack Smith told the court that Loveall has worked for the FBI in digital forensics since 2000, has conducted hundreds of examinations, is the recipient of the FBI Director’s Award and the Presidential Early Career Award for Scientists and Engineers. Jack Smith stated Loveall would “testify about how … hash values are generated … the purpose behind hash-matching, including explaining how these steps ensure that the data … was not damaged, modified, or altered.”
Here is what this same expert actually produced in the Raniere case. The following walks through his most important finding — step by step.
| # | Finding 2 — Step by Step | Proof click to enlarge ⤢ |
|---|---|---|
| 1 | The problem Loveall was responding to: the 37-file discrepancy between the two forensic copies (see point above). Two copies of the same device should be identical. They weren’t. | ![]() |
| 2 | Loveall’s response has three parts. First, he claims the discrepancy is due to “different settings” in the processing software — doesn’t say which settings, doesn’t demonstrate how any setting could create 37 new photo files, doesn’t test it. Second, he repeats the assertion. Third: “I have examined the disk images created of 1B15 and 1B15a and determined that they are identical.” | ![]() |
| 3 | That claim is incoherent on its face. 1B15 and 1B15a are FBI evidence item identifiers. 1B15 is the Canon camera. 1B15a is the CompactFlash memory card inside it. These are different physical devices. Saying they are “identical” is like saying a DVD player is identical to the DVD inside it. | ![]() |
| 4 | But set that aside. Even if he meant to compare the two forensic copies, “determined that they are identical” has no proof. In digital forensics, you prove identity using a hash value: a mathematical equation that converts all data on a device into one unique number. Change a single character and the number changes completely. It is the DNA test of digital evidence. At this trial, the government’s own examiner Brian Booth explained this to the jury: | ![]() |
| 5 | Booth named his algorithm: “Message Digest 5, called the MD5 verification.” If “anything gets changed on a hard drive … this whole function … would be different and we know something has been changed.” That is what proof looks like. | ![]() |
| 6 | What Loveall’s statement should have looked like: “I performed a SHA-256 hash comparison on forensic images at [path] and [path] and confirmed both returned hash value [value].” Algorithm. File paths. Hash output. The standard Loveall teaches at George Mason. The standard Jack Smith told the court Loveall would explain to a jury. He provided none of it. | |
| 7 | The question: Did FBI Senior Computer Scientist David Loveall — recipient of the Presidential Early Career Award for Scientists and Engineers, the FBI Director’s Award for Outstanding Technical Advancement, and the same expert Jack Smith selected to explain hash values to a jury in the prosecution of President Trump — not know that his report contained no proof? | |
Retired FBI ASAC Mark Daniel Bowling — nearly 20 years as a federal agent — walked through the Loveall report under penalty of perjury and concluded it was “structured to be intentionally deceptive.”
Read the full analyses:
Bowling’s takedown of the Loveall report (PDF)
Joint report by the seven experts — point-by-point debunking of Loveall (PDF)
FBI search photos show items appearing, disappearing, and being rearranged between photographs. Two books on sex trafficking were documented by agents but never photographed in their original location and never collected as evidence. A less relevant book, A History of Torture, was collected.
If sex trafficking books were genuinely found at a location described as a sex trafficking site, they would be the single most relevant physical evidence. Agents would have seized them.
FBI search photographs, 8 Hale Drive, March 27, 2018
| Judge | What They Did in This Case | Actions Against Trump |
|---|---|---|
| Nicholas G. GaraufisU.S. District Judge, EDNY | Accepted the untested Loveall report as true to deny an evidentiary hearing into evidence fabrication — without ever requiring Loveall to testify in the case or be cross-examined. Imposed a 120-year sentence. | Overturned President Trump on DACA |
| Maria Araújo KahnU.S. Court of Appeals, 2nd Circuit | Affirmed the denial of an evidentiary hearing — again without requiring Loveall to testify or be cross-examined. | Affirmed the $83.3 million E. Jean Carroll defamation verdict against President Trump |
| Pierre LevalU.S. Court of Appeals, 2nd Circuit | Same panel as Kahn. Affirmed denial of evidentiary hearing. | Resurrected the emoluments lawsuit against President Trump |
| Richard J. SullivanU.S. Court of Appeals, 2nd Circuit; Adjunct Professor, Columbia Law School | Same panel as Kahn. Affirmed denial of evidentiary hearing. | Authored Blanche v. Lau — immigration ruling against the Trump administration, now before the Supreme Court |
New York State Police confirmed IP address tracing of server hacking against Raniere’s company to mainstream media companies that have been extremely hostile to President Trump. Individuals who assisted the media companies were indicted by an Albany County grand jury, and one pleaded guilty, but the media outlets themselves were never pursued.
Because the hacking is directly linked to the EDNY evidence manufacturing documented above — the same individuals indicted for hacking the servers later assisted the EDNY prosecution — this remains prosecutable.
The reason no one has acted on this documented evidence manufacturing is the “sex cult” stigma. But it is manufactured. The child exploitation evidence — used to charge both the taking and possession of the images — was falsified and planted with DOJ involvement, as the seven experts concluded. And as for the “sex trafficking” that formed the entire “sex cult” narrative that made global headlines, this is what was presented at trial and charged:
Jay testified that the “assignment” was to “seduce Keith and have him take a naked picture.” She refused. That refusal is the entire basis for the “attempted” sex trafficking charge — a 40-year sentence.

Nicole testified she was blindfolded and tied to a table. Another person — a woman, not Raniere — performed oral sex on her. Raniere walked around the table. The “commercial benefit” element required for federal sex trafficking was the prosecutor’s argument that Allison Mack received a “thing of value” by making Raniere happy.



Vicente trial testimony

New York Times, October 17, 2017
Penza described this timeline in post-trial public statements. Conduct that local law enforcement deemed consensual was repackaged as federal sex trafficking within a day — by a prosecutor’s office 160 miles from where it occurred.
Penza post-trial statements
These are the charges that produced the label that prevents anyone from looking at the evidence manufacturing documented above and investigating the implicated actors.
After Raniere’s defense filed proof of FBI evidence fabrication, Biden’s Bureau of Prisons engaged in what Alan Ellis — author of the leading federal sentencing treatise, former president of the National Association of Criminal Defense Lawyers, 50+ years of federal practice — calls “the worst pattern of BOP retaliation” he has seen in his career.
The prosecution’s own letter to the court, admitting that BOP intercepted privileged legal mail:

From the sworn Declaration of Anthony Gallion, filed in Raniere v. Garland, No. 22-cv-00212 (D. Ariz.):



From Anthony Fly’s own sworn filing in Fly v. Carter, Case 21-1495, 7th Circuit:



Is it acceptable for our government — our system of justice — to allow bad actors to remain in place, working active cases, because the label attached to one case makes people afraid to look?
Every claim above is verifiable from the government’s own records.