🐮 Lolcow Todd Daugherty / N9OGL / Fox Smith / Doc Dot - Domestic terrorist, ham radio sperg, self-described hikikomori, confirmed pedophile

  • Thread starter Thread starter AJ 447
  • Start date Start date
  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
Everything is a general warrant to you because you can’t read.
Prove me wrong, show me how this:

TO BE SEIZED:
Any and all computers, as defined in 720 ILCS 5/16D-2; any and all magnetic or optical media, including but not limited to hard disk drives, floppy disks, compact discs, DVDs, USB devices, and any and all passwords or other computer security devices, and any and all information and data stored in the form of magnetic or electronic coding on computer media or on media capable of being read by a computer or with the aid of computer equipment, any and all computer software, any and all evidence, data or information pertaining to the possession including but not limited to: any and all evidence of dominion and control over the computer, specifically, but not limited to, a computer possessing MAC address "EC:4F:82:29:B4:03" or IP address "72.9.123.215"; peer to peer file trading software; any and all information pertaining to dates and times of access to the computer; any and all information pertaining to internet searches pertaining to posts regarding threats of violence directed towards schools or public officials; records and other items which evidence ownership or use of computer equipment found in the above residence; including but not limited to sales receipts, bills for internet access and handwritten notes, records evidencing occupancy or ownership of the premises described above including but not limited to utility and telephone bills, mail envelopes or address correspondence. This search warrant shall include authority to analyze and search any magnetic or optical media seized for relevant evidence as outlined in this search warrant, and the property described herein, when found, shall be inventoried and a return of all instruments, articles or things seized shall be made without unnecessary delay.

is not a general warrant.
 
Prove me wrong, show me how this:

TO BE SEIZED:
Any and all computers, as defined in 720 ILCS 5/16D-2; any and all magnetic or optical media, including but not limited to hard disk drives, floppy disks, compact discs, DVDs, USB devices, and any and all passwords or other computer security devices, and any and all information and data stored in the form of magnetic or electronic coding on computer media or on media capable of being read by a computer or with the aid of computer equipment, any and all computer software, any and all evidence, data or information pertaining to the possession including but not limited to: any and all evidence of dominion and control over the computer, specifically, but not limited to, a computer possessing MAC address "EC:4F:82:29:B4:03" or IP address "72.9.123.215"; peer to peer file trading software; any and all information pertaining to dates and times of access to the computer; any and all information pertaining to internet searches pertaining to posts regarding threats of violence directed towards schools or public officials; records and other items which evidence ownership or use of computer equipment found in the above residence; including but not limited to sales receipts, bills for internet access and handwritten notes, records evidencing occupancy or ownership of the premises described above including but not limited to utility and telephone bills, mail envelopes or address correspondence. This search warrant shall include authority to analyze and search any magnetic or optical media seized for relevant evidence as outlined in this search warrant, and the property described herein, when found, shall be inventoried and a return of all instruments, articles or things seized shall be made without unnecessary delay.

is not a general warrant.
Sit down. Grown-ups are talking.

Moron.
 
Again, for the nth plus 1 time

Going back to #1389, Tell us, what did the judge write in the sentence before his signature? Word for word please.



That's one of the reasons why she doesn't communicate or return his emails until hours before the next hearing.

Toad is too chicken shit to fire his public defender and tell the judge how PLAIN AND SIMPLE it is to dismiss the case.
I have examined the foregoing Complaint for Search Warrant and hereby order that a Search Warrant be issued.

It doesn't mean he read it...it's warrant was from a template.
 
Your IP address “wasn’t” on the threat because you have a dynamic IP, it came from the same range assigned to you by your ISP which is enough to prove it was you.
The person who made the threat was using a TOR program, both my ISP and the site the threat was posted on stated my IP was not on that threat. In the warrant they are seizing all computers and all files.
 
Prove he didn’t read it. Moron.

Please, he is having a meltdown because his schizophrenia is acting up really bad today.

And again Toad, if it is so PLAIN AND SIMPLE, why aren't you going before the judge yourself to show him how PLAIN AND SIMPLE it is?????

A really bad flair up today, eh Toadie??? What set you off again??

Schizo N9OGL said:
The person who made the threat was using a TOR program, both my ISP and the site the threat was posted on stated my IP was not on that threat. In the warrant they are seizing all computers and all files.

Which could have been you. Not a general warrant. They can seize cellphones with a search warrant and a cellphone is a computer. They have to seize these things in order to search them for evidence in a controlled environment. They found child porn on your computers while searching for evidence involving the threat, and once discovered stop searching and got the second federal warrant.
 
The person who made the threat was using a TOR program, both my ISP and the site the threat was posted on stated my IP was not on that threat. In the warrant they are seizing all computers and all files.
Just because you used TOR doesn’t mean you weren’t sitting on a compromised end node Toad. You’re not the sharpest knife in the drawer are you?
 
Your IP address “wasn’t” on the threat because you have a dynamic IP, it came from the same range assigned to you by your ISP which is enough to prove it was you.

His IP also reported that Toad uses a 3rd party DNS resolver so they were unable to provide proof of his url search history.

I suggest you read some court cases. start with one: https://casetext.com/case/united-states-v-winn-15

FYI I NEVER USE TOR OR VPN....ONLY PUSSIES DO!

I suggest you go tell the judge all of this, ranting and raving here does nothing but make you look even more mentally ill.

But you are too chicken shit to tell the judge how PLAIN AND SIMPLE it should be to dismiss the case.

Anyhow, keep flooding Toadie, I got some more work to do on the yard.
 
The police received a report that a threat was posted on a site under my name, and the police view was that was a threat, that was your name, therefore you did it.
 
The police received a report that a threat was posted on a site under my name, and the police view was that was a threat, that was your name, therefore you did it.
And in order to prove or disprove that they would need....?
 
Back
Top Bottom