Professional Documents
Culture Documents
Montgomery V Etreppid # 228 - Oct 30 2006 Montgomery Declaration
Montgomery V Etreppid # 228 - Oct 30 2006 Montgomery Declaration
10
11
)
ETREPPID lECHNOLOGIES, INC., a California)
13 Corporation.
)
)
)
Plaintiff,
14
)
15
)
vs.
16
)
DENNIS MONTGOMERY, an individual,
)
17 MONTGOMERY FAMILY TRUST, a California )
Trust and DOES 1 TIIROUGH 20,
)
16
)
)
Defendants.
19
)
)
20
)
DENNIS MONTGOMERY, an individual; and
12
21
22
23
24
25
26
27
28
MONTGOMERYFAMILYTRUST,a
California Trust,
Plaintiffs,
vs.
eTREPPID lECHNOLOGIES, INC.,
aNevadaLLC; WARRENTREPP, an
individual; DEPARTMENT OF DEFENSE
of the UNITED STATES OF AMERICA
and DOES 1through10,
Defendants_
)
)
)
)
)
)
)
)
)
)
)
1
2
4
5
1.
I am over age 18 and a party to two civil lawsuits involving Warren Trepp and my
company eTreppid Technologies. I have personal knowledge of the facts stated herein, and if
8
9
10
BACKGROUND
2.
programs and the source codes for the programs in thousands of different and varied applications,
11
12
13
but mostly involving thousands of different programs for "data compression, 'pattern recognition;
anomaly detection and an "Object Detection System." 1 These include but are not limited to the
14
following:
15
a. Software programs applicable to medicine, mostly involving "anomaly detection"; and 'pattern
16
recognition' and mostly developed between 1981 and 1996. These are my copyrights and/or my
17
18
copyright derivatives.
b. An 'Object Detection Syatem' ('ODS") derived from my copyrights involving anomaly detection
19
20
and pattern recognition, but having far more universal appllcatlon and adaptability to many areas
21
other than medicine. mostly developed between 1994 and 1998. These programs constitute the
22
basis fofmy work on certain special military contracts. There are thousands of software developers
23
who have worked for decades attempting to develop an "ODS' comparable to mine; and I am
24
25
26
27
28
I use these tenms generically to define the broadest possible genus of software programs
relating to this area of software development - sort of like saying 'automobiles" as a category of 'four
wheel powered vehicles." But the different types of anomaly detection" and pattem recognition
programs are vastly greater than the types of automobiles currently in existence worldwide.
-1-
1 c. Data compression developed between 1996 and 1998- conveyed to eTreppid on co No.1"; and
2
3
adapted for use in casin~ surveillance between 1998 and 2002, pursuant to our business plan at
eTreppid.
16
17
18
19
20
21
from my "ODS" between 1994 and December 31, 2002, some of the source codes for which are
direct derivatives of my copyrights. and which, beginning in November, 2002. I began to adapt to
22 military applications on behalf of the Department of Defense, the Navy, the Air Force, and the
23
24
25
mostly utilized .in the war on terror between March 2003 and the
present.
The software prograr:ns and the source codes owned, possessed and used exclusively
26
by me on behalf of the foregoing Government agencies all derive from my exdusive copyrights
27
28
generally relating to "anomaly detection" and "pattern recognition," and more specifically relating to
-2-
1 the source codes used in my "ODS;" and derivatives thereof which enabled me~
2
.3
Presumably, the sealed Government declaration informs and educates this Court with respect to th.is
5
6
Over the 25 years I have been developing software programs, I have collected and
7 stored thousands of different computer files and programs on my computers and on many different
8 types of computer storage media. Some of this collection was stored at my storage facility and
9
10
some of that was taken and/or damaged by the FBI. I generally store some of the programs and
codes I have developed and/or am working on on the computera I am currently using. The
11
Government took my computers during it's raid on my home and storage facility on March 1 and
12
13
14
March 3, 2006; and the governmenfs retention of my computers and computer storage files from my
home and storage facility has caused me, and will continue to cause me, irreparable harm because
15 Its retention affects my livelihood and ability to work. Additionally, as a result of the Govemmenfs
16
17
18
unconstitutional raid, I do not have access to computer files which would enable me at this time to
provide a more detailed Chronology of events relating to the SAP I worked on and at issue in these
cases. However, since my departure from eTreppld, as recited below. I have been able to
19
20
reconstruct on new computers specific software programs that I previously used in the
21
22 . _ . I assume this work product or "output" from my software programs, together with my
23
24
25
26
27
28
5.
storage by Warren Trepp using his political Influence with James Gibbons, (Gibbons has admitted
making "phone calls" to Initiate criminal action against me on behalf of Trepp), Daniel Bogden and
-3- .
the local FBI, I have provided the outpur from my decoding programs, without compensation, to
our Government in order to stop terrorist attacks and save American lives. My source codes for this
decoding technology which derives from my "ODS" are what Trapp and several Government
5
6
6.
The Government has now held my computers and storage media for over six months
knowing I do not have possession of any "classified information and knowing that all of the source
codes used on the special Government contracts worked on by me at eTreppid Technologies are
owned by me. No other person within our Government or at eTreppid has ever had access to the
10
11
source codes used on the special Government contracts. Anyone who swears under oath to the
contrary Is lying and/or committing perjury. Obviously, if they did have access to this technology,
12
13
Trepp would have licensed and/or sold it to the Government for hundreds of millions of dollars. I
14
completely and zealously guarded the secrecy and confidentiality of my source codes used on the
15
special Government contracts at eTreppld, both from the Government, including- and from
16
eTreppid, as the exclusive owner and sole possessor. No person at eTreppid Is able, to my
17
18
knowledge, to create the source codes that I have created having multiple applications In the war on
terror and other military uses. Conclusive proof on this issue is established by the recent interception
19
20
21
bound for the US. I gave the appropriate authorities within the US Government accurate and
22
very specific intelligence regarding this terrorist plot, from my "decoding software" as I
23
have done in the past, weeks prior to the arrests by the London authorities - without
24
25
26
27
28
compensation.
7.
Neither Warren Trepp, nor eTreppid Technologies, nor any person working t.flere have
ever owned, possessed or processed "outpur from my source codes used in the special
Government contracts. Other eTreppid individuals, as wall as Government officials identified herein,
-4-
2
3
8.
In September. 2005, Trepp told me that the Government had appropriated One
Hundred Million Dollars for the "decoding technology", but he was demanding Five Hundred Million
5
6
"outpur on
two occasions - first In September, 2004, saying to stop temporarily until he made a deal with the
Government to sell a portion of the technology for Five Hundred Million dollars, which I refused.
Secondly, about a year later in September 2005, when my conflict with Trepp greatly intensified.
On the latter occasion, I told him it was a "hold-up. I refused on both National Security grounds
10
and over Trepp's failure to pay me licensing fees and to resolve our conflict over the split of the
11
12
13
14
proceeds derived from any sale. Trepp had previously acknowledged my ownership of the
technology in numerous conversations and promised "to work things out. In September-October,
2005, Trepp said that "our deal" would have to wait because he had other obligations and began to
15. threaten me as our conflict intensified. This ultimately resulted in my departure from eTreppid in
16
17
18
January, 2006. Since then I have given the highest levels of our Government vital national security
information free of charge while Trepp and his local Government cronies have raided my home and
storage and tried to get me indicted.
19
20
9.
21
Trepp's attempt to change my status for tax reasons in January 2003. Before that eTreppid even
22
23
employee only reflect what we both knew and what is now obvious to any impartial observer. I
24
owned the technology, it was not developed while I was at eTreppid, and I exclusively controlled It
25
He was attempting to steal what he refused to pay for, his modus operandi for his entire adult life, as
26
shown by his position as Head Trader for Michael Milken in the "junk bond" scam. \/Vhile at
27
28
eTreppid, I fulfilled all of the indicia of an independent contractor even after January, 2003. when
-5-
1 Trepp realized the value of the technology in the war on terror. No one controlled, instructed,
supervised, or directed my work in the slightest manner - not one aspect of my work was controlled
etc by anyone or anything. Not one part of the source codes I used on "Special Access Programs
6
7
("SAP/ was ever created at eTreppid or on eTreppid computers. All codes used on the special
military contracts were created by me at my home or elsewhere. None of the source codes used on
SAP were ever on the premises at eTreppid, nor were any of them ever contained in eTreppid
8 computers. Almost all of my work on the SAP was done by me in an area occupied by me alone.
9
Ally adaptation or changes to any of the source codes was done at my home.
10
11
10.
12
I have not read the "sealed declaration filed by the OoD. Therefore, I obviously do not
13
know ifs contents. I have read John Negroponte's "public" declaration. I agree that the facts
14
Involved herein relating to specific military contracts - the "Special Access Programs, (the "SAP");
15
and that my software technology used to "process" data and create output" from that data in "SAP",
16
Involve vital national security concerns, the disclosure of which would cause "exceptionally grave
17
18
damage to the national security of the United States. I can only presume that the "sealed
declaration' relates to work I did on SAP, probably without referencing specific individuals that I
19
20
worked with f r o m - and without describing precisely what I did. I expect, given the
21
Government's failure to use certain Information that I processed which turned out to be accurate, but
22
on which the Government failed to act, resulting in multiple civilian and military casualties, that such
23
information is not in the sealed declaration. As to the information I provided which succeeded
24
25
alerted this Court to the exceptional and grave Importance of the use of my technology ir1'.the war on
26
27
28
terror.
11.
However, I vigorously dispute whether any of the applicable protocols for properly
. .
classifying either the data I received from the Government, the 'processing I performed, or the
Classification Authority" pursuant to "The National Security Industrial Program Operating Manual"
(The "Manualj while it was in my exclusive possession, custody and control at eTreppid. Much of
the work I did was simply too urgent and the outpur too vital to conform to any of the Manual
protocols, the eTreppld personnel! were too incompetent to implement the protocols, the cost was
10
12.
I dealt with did not trust anybody at eTreppid but me - at least that
For security reasons, and because I zealously protected the secrecy of my software
source codes from everyone, no other eTreppid employee had access to anything I was working on
11
12
13
14
that any
leak to anyone at eTreppid would cause serious damage to national security. In general, eTreppid
employees were too incompetent to be involved, including Sloan Venables and Patty Gray. Nor did
15 - o r other Government official have access to the software programs that I used to create the
16
17
18
19
"outpur on "SAP." They repeatedly tried to gain access to the source codes and failed; including
attempts to "reverse engineer" the "output but failed. In December, 2003, certain
talked about "Just taking it" after I had
as hereinafter described. But I informed them that the
20
21
22
Because of the statements about "just taking it," I informed Warren Trepp and
23
24
25
immediately flew to Reno and signed the "Agreemenr attached hereto as Exhibit 1, agreeing not to
attempt to seize the technology.
26
27
28
13.
some of whom flew directly to Reno to pick up the 'output", and personally watched me 'process
-7-
scrutinized me for
1 months and attempted to "look over my shoulder" In order to gain access to the programs I used
2
14.
Several of th
4
5
Trepp and that I should never allow him or anyone working for him to gain access to any .of the
source codes for the programs. They recommended that I insert intrusion devices in to the programs
In order to prevent anyone from gaining access to the programs. On several occasions. several-
8
9
10
told me that they did not trust the FBI, or the National.Security Agency, and/or Paul Haraldsen.
They knew that I had begun to trust Haraldsen (which proved to be a mistake) and warned me about
11
12
13
him. They told me that anyone with "close ties inside the Government" with Warren Trepp was
"suspect" because the technology was worth "hundreds of miilfons of dollars in the war on terror. Al
14 one point-removed the local FBI from eTreppld's building, and asked them not to return.
15
16
17
18
15.
AB to how the Government "classified" It's reports concerning my "output" after it left my
possession, I do not know. Presumably, given what I know about the "output" I gave, the
Government has internally classified this data without ever giving me copies of that "classified
infonnation. I do not have possession of any of those reports.
19
20
16
Mr. Negroponte never personally observed the processing' of data or the creation of
21
my "output." Presumably, he has received either the outpur I created on some form of electronic
22
storage media or reports concerning the same. I was told by numerous officials that the results from
23
24
25
17.
contracts required that I have a "Top Secret" Security Clearance with access to "Special ldformatlon
26
27
28
Compartmentalized." ("SIC").
The AoPlication of my "ODS" Technology to Spacial Access Programs
-8-
18.
1 developed a software program from my data streaming technology, not contained on "CD No. 1"
2
and obviously created when even eTreppid treated me as an independent contractor, for use on the
unmanned aerial vehicle, the "Predator." This program enabled the Predator to stream video at a
much lower band width than it then used. The work was done pursuant to Contract # 2095458
originating in a Top Secret area at Eglin Air Force Base. My contacts included Colonel Rhys
Macbeth, Thayne Wescoatt, Debora Moffitt, and Chris Crutchfield. I will need depositions of each
8 of these individuals and others, together with all of the documentation used on the project in order to
9
10
prove my ownership, possession, custody and control of the technology used, how it was used, how
it differed from then existing technology I had transferred to eTreppid "contained on CD No. 1"; and
11
12
13
14
15
16
17
how I adapted my software to the specific application used on Predator. The adaptation proce&8 is
proof of my ownership and exclusive possession. The foregoing individuals watched me as I
demonstrated the application of the technology in the Predator program.
19.
Pointer. Predator. USAF. Februarv. 2003. Between November 2002 and March,
2003, as a result of my work on the above Predator project, I discussed my object detection system
{"ODS') with and/or interacted with numerous Air Force officers, consultants agents and officials,
18
19
20
including but not limited to Major Paul Hastert, Capt Robert Lyons, Col. Rhys Macbeth, Peter
Wiedemann, Col. Felder, Matt Belmonte, David Whigham and others in connection with testing to
21
detect and/or track objects while streaming compressed unmanned aerial vehicle "Pointer" video for
22
Predator. Warren Trepp also advised these and other officials that I had developed an
23
could fulfill their tests. Between November, 2002 and January-February, 2003, Trepp explicitly
24
25
oos which
requested me to use my "ODS," which obviously was then completely developed, {when even Trepp
treated me as an independent contractor) to prove to the Air Force that I could detect and track
26
27
28
objects inside streaming video. He agreed that if I passed the tests, he would "make a deal" with me
either to purchase or license my "ODS" technology. The tests were 90% successful. I adapted my
-9-
oos system to use compressed streaming video on an unmanned aerial vehicle 'Pointer" to the
1 ground and then to a central location while detecting and tracking objects on the ground. The
2
3
validation tests were conducted in February, 2003 at Eglin Ai.r Force Base. The dates. results, and
testing procedures, together with all of the related documentation and involvement of Government
4
5
officials all prove my exclusive ownership and possession of the technology. I will require the
depositions of at lea.st ten of the Government officials involved, including Col. High of "Big Safari'
together with all of the documentation and test results in order to prove my ownership, custody,
8 possession and control of the 'ODS'. It has a value In excess of Five Hundred Million Dollars. If this
9
10
case is to proceed, I will provide the specific names of all individuals involved in this project,
generally named "USAF UAV Battlelab, Contracts: F08651-03-P- 0182 and 0129. These contracts
11
12
13
extended from March 26, 2003 until September 30, 2005, when my conflict with Trepp erupted.
20.
14
September, 2003, my oos had attracted the Interest o~and USSOCOM in connection with
15
using Predator to detect and track specific al Qaeda operatives "In the field", including al Zarquawl,
16
and specific objects related to him such as cars and vans, with "live video feeds encoded and
17
18
19
20
21
scanning for objects and people in real time." My object tracking was placed on a specific number
of "DV laptops" used by SOCOM and
these operatives in connection with the use and application of my technology. Special servers were
installed in the "POC" Predator Operation Command at Nellis Air Force Base and at Fort Bragg to
22 "look for", detect and track specific objects, which were, in fact, positively identified. I worked with
23
24
25
many people in "special groups" in~ at Nellis, at Fort Bragg, at Eglin etc in connection with
my object tracking system. I will require all of the documentation, and depositions of at least twenty
individuals associated with this project, Including General Brown, Scott Allen, Mark Race, Michael
26
27
28
Holland, Jerry Dvorak, Kenneth Johns, Snake, Larice Lombardo, Sue Griffin, Merv Leavitt. Eric
Barnes and Robert Dailey . The contracts, USZA2a.;03-P-3294 and H92222-04-0006/D0-0001 to
-10-
October 28, 2003, I broke the enciyption. Soon after I broke the encryption,
8
9
10
as described below.
a.
broke the encryption, I gave this output" t o - - That "output" consisted of
11
with the
12
13
associated date of November 8, 2003. On that date, hours before a suicide attack, the US State
14
Department, using my data, issued an urgent warning about an Imminent attack. A suicide bomber
15
driving a truck detonated a bomb outside the Complex killing and wounding over one hundred
16
17
18
19
20
21
22
23
24
25
enough or that the Saudi's had failed to act. But I have always questioned why the State
Department made. an urgent public warning just hours before the attack when~knew at least
26
27
28
ownership, custody, possession and preservation of the secrecy of my software. Over the next
several months, I undertook the arduous and time consuming task of extracting data f r o m -
-11-
I decoded
1
_mostly concentrated on
by severa
I was told
that the "outpur I gave them prevented several terrorjst attacks in the US.
I know what
8 documents and electronic media exist in order to prove that my technology decoded the targets well
9
10
in advance of the bombings. I do not know why the attacks were not prevented. The pressure on me
to 'process" was extreme. I was openly watched day and night by
11
c. The World T
12
13
2003,
14
and decoded a specific target coordinate in New York. I later learned t h a t - consisted of
17
18
. I did so
15
16
told me to
Warren Trepp- told me that--was concerned that if any leak occurred, I would be
19
20
subpoened by the 9/11 Commission. He warned me never to trust Trepp, never to give him or his
21
employees access to any of my technology or the 'output", and to protect my technology from him
22
23
vital to national security that I could never copyright or patent it, and t h a t - was considering
24
"just taking it". At that time, around Christmas, 2003, I placed "intrusion devices Into my software
25
programs to protect them from both the Government and Trepp. Around the same time,. the FBI
26
27
28
brought in "blade servers" to accelerate the "processing' time. But the FBI got into a conflict with the
over "control" of the entire operation and~forced the FBI to leave the building. I did
-12-
1
2
6 d.
7 - - I started taking data directly from
8
9
10
including Paul Haraldsen (who I believed at that time was some sort of liason between-and
11
12
13
NSA) about
and I explained in
detail what I believed was the technique used, and a specific technique that would make the
17
18
matching the exact technique that was discussed four months earlier. I discussed these
matters in detail with Haraldsen.
19
20
22.
Paul Haraldsen and the Air Force Take Over The Christmas Eve Bombing.
21
Between June 2004 and December, 2004, Paul Haraldsen emerged as my primary contact.
22
Haraldsen repeatedly infonned me that it was very difficult to know "who to trusr, that he worked
23
directly for the 'highest level" of our Government, that he worked with General Bath, and to trust him
24
25
alone. He told me that there was a conflict "on the inside" and that the Air Force would be taking
over the project at the end of 2004. After June, 2004, Haraldsen told me that I should give him all of
26
27
28
my "output", which I did on a weekly basis. On December 14, 2004, I provided "output" to Haraldsen
and Paul Allen from USSOCOM with target coordinates and the date of December 24th, 2004 -13
Christmas Eve - for a specific location In the middle of one of our mllitary bases in Mosul, Iraq.
1 then picked up repeated patterns for that location, so on December 20, 2004, I called my contact
directly in Iraq and warned him of an impending attack at that location. I repeatedly stressed to
Haraldsen that I thought an attack was imminent. On December 24, 2004, a suicide bomber
4
5
detonated a device on the base killing over 20 people. Around that time, Haraldsen told me that all
future funding would come from the Air Force and that a "buy our would be coordinated by him and
other Air Force officials, including General Bath. At one time, he mentioned that One Hundred
Million Dollars had already been approved and that he and Bath "were working with Trepp". Later, in
mid 2005, I informed him that I did not trust Trepp, that the technology was mine, that the
10
Government needed to deal with me, not Trepp, and that I wanted to participate in any discussions.
11
12
13
14
Haraldsen said he would take it up with the right people inside the Air Force.
23.
Force contracted with an independent consulting contractor who verified that there was, in fact,
15
16
17
18
19
20
24.
The "Eaqla Vision" Contract. James Gibbons. and "LLH & Associates". In early
2005, James Gibbons, working with GeneralBath procured a military contract, the only contract
21
referenced in eTreppid's "Trade Searer law suit against me, but merely one of many contracts I
22
worked on with my technology. The project was named "Eagle Vision and involved the
23
compression of digital satellite streams. LLH & Associates was the primary contractor on this
24
25
contract, which sub-contracted the work to eTreppid. I believe the contract was a "Secret" contract.
In order to prove my exclusive ownership of the technology involved in Eagle Vision and differentiate
26
27
28
it from any of the technology on co No. 1," I will require the depositions of all individuals involved in
this project, together with all of the docurnentatlon. I believe that Trepp probably identified this sole
-14-
1 contract because during this time frame Trepp was actively using other eTreppid employees to
2
attempt to gain access to my codes through reverse engineering and our conflict was rapidly
.3
intensifying. The national security concerns expressed in the Negroponte declaration apply to "Eagle
5
6
Vision."
25.
Carter from the Naval Research Center. He provide me several high altitude satellite photographs of
the ocean and asked if I could detect any anomalies with my "ODS". The area covered
10
approximately 100 square miles of ocean. I detected two objects in the photographs and reported
them to Carter and to Paul Salvatori who reported them to other Navy officials. Carter and Salvatori
11
12
13
told me that this was the first time software technology had detected a "submarine under water".
They then told me that the Navy would set up a series of tests and that the most difficult test would
14
be in September, 2005. Between September and October, 2005, I U$ed my technology to perform
15
the tests. I was told that the tests were remarkably accurate and that the Navy intended to
16
purchase the technology as soon as possible. In October, 2005, Paul Haraldsen informed nie that
17
he wa$ negotiating with Trepp and understood that Trepp and I were in some type of conflict. He
18
assured me that my Interests would be protected and acknowledged that the technology was mine.
19
20
Haraldsen said One Hundred Million Dollars had already been approved for the technology. In
21
September through December, 2005, Trepp began to pressure me for the source codes for my
22
ans. which, of course, I had always protected from everyone. When I refused to give Trepp the
23
codes, he began to threaten me with using his "political influence" with Gibbons to "bury me"; and
24
25
use his connections" to the Bonnano family, as hereinafter described. A detailed description of my
conflict with Trepp is contained in my answers to Trepp's interrogatories, attached to my opposition
26
27
28
to
-15-
technology used with~ the Air force,:lhe Navy and USSOCOM, and the preservation of the
1
secrecy of the technology from Trepp, the Government and all eTreppid employees, and in order to
defend against Trepp's spurious Trade Secret claims requiring preservation of the secrecy of the
"trade secrer, by me alone, I will have to discover all of the relevant documents, and depose all of
the involved individuals f r o m - the Air Force, USSOCOM, and the Navy relating to the use
and application of my technology as recited above. These include but are not limited to: Paul
Haraldsen,
list given to me by
relating to the London, Madrid and the Iraq bombings, James Gibbons, Ronald Bath, individuals
10
inside the Air Force involved .with Bath and Gibbons and all others inside the Government who tried
11
12
13
14
15
to steal my technology at the behest of Trepp, Bath, Haraldsen and Gibbons. I will require the
regular briefings given to the President in order to determine how my technology was described
and characterized, how it was used and applied, and to calculate all my damages resulting from the
failure of the Government to pay me royalties knowing it belonged to me.
16
17
The DoJ's Use of the "Big Safari" Contract to Permit Discovery is a Ruse.
27.
The DoJ and Ms. Wells in their motion for a protective order, refer to their agreement to
18
19
20
allow discovery in connection with the "Big Safari contract. This is just a ruse. That contract and the
discovery they plainly intend to allow relates to the purchase of air conditioners for the "blade
21
servers brought in by the FBI. That contract has no national security implications and none relating
22
to the ownership and possession of my technology. Referencing it as an example of how and why
23
24
25
26
27
28
Each and every relevant and material fact in Agent West's affidavit filed in Court to
obtain a search warrant to raid my home and storage are materlally false either by intentional
deletion, omission. mis-statement, or outright fabrication. The local Reno FBI raided my home on
-16-
security_ This was just a bold-faced fabrication to justify the theft of the technology I have described
herein. Paul Haraldsen knew that the so-called "palm trees" tapes - the pretext for the raid - were
neither "classified" or "taken by me. The FBI, Haraldsen, and Trepp all knew that I had only
5
6
mysteriously and questionably brought in, including Michael Milken), the data compression
technology "contained on CD No. 1". Yet West deleted this phrase from his affidavit, then omitted
the very next paragraph reciting that none of my other technologies were conveyed. Then he
explicitly deleted the phrase in eTreppid's "Operating Agreement" proving that I was not subject to a
10
non-compete agreement and stated in his affidavit that I was. Then he swore under oath that I was
11
12
13
an "employee" from 2000 to November, 2001 when I "assigned" the patents he lists - a complete
falsehood; and he recites that Venables had access to my source codes when Venables had
14
admitted under oath three weeks before that he didn't. Now, the Government is asserting the state
15
secrets privilege in the civil cases after admitting in the criminal matter that no "classified
16
infonnation" was "stored" at eTreppid" and thus, I was not in possession of any. Yet, in these civil
17
cases it ls representing to the Court that "Information" involved In these cases involves an
18
"exceptionally grave danger to the national security of the United States." I do not believe that the
19
20
upper levels of our Government, including John Negroponte, have been fully advised of the
21
machinations and illegal conduct of Gibbons, Trepp and the local FBI, or of the issues involved in
22
these matters, and that the local Nevada Government authorities aided my home because of the
23
political influence of Trapp. Perhaps, this explains the apparent discrepancy between the
24
25
Negroponte "public declaration" and the DoJ's motion for a protective order. I raise these search
matter issues herein as an explanation for the discrepancy. I have potential claims arising out of the
26
27
28
Agent West falsely led the Court issuing the search warrants to believe that there was a
-17-
competition" with eTreppid, knowingly deleting the explicit phrase stating that there was no non-
compete agreement. Again, this conduct was material and intentional to steal my technology.
30.
I have never received any form of notice whatsoever from any Governmental agency
that my "Top Secret SIC" security clearance has been suspended or revoked. My security clearance
can only be revoked by the appropriate Governmental agency. Yet, Agent West falsely stated in his
search affidavit that my clearance had been suspended and that eTreppid possessed a clearance to
store "classified information. These compounded falsehoods were manufactured by Trepp, Patty
9
10
Gray, Sloan Venables and West in order to raid my home on the false allegation that I "unlawfully
retained classified information". After being challenged with my Rule 41 {g) Motion, as stated above,
11
12
13
the Government then admitted that there was no "classified information" taken by me or in the
possession of eTreppid. In the event these cases proceed, I will continue to make decisions and
14
15
16
17
31.
I view the search warrant lies and illegal conduct by my Government to be a result of
the local politlcal "connections between Trepp, James Gibbons, Daniel Bogden, and Ronald Bath,
18
but I do not know how far this corruption rises inside our Government. I have reason to believe that
19
20
certain high level Government officials, including, the President, Vice-President, Mr. Negroponte and
21
others have not been influenced by the political power of Trepp; but I also have reason to believe
22
that some Air Force officials have been influenced by Ronald Bath, and that they have influenced
23
24
25
32.
his large political contributions. I have attended functions, a cruise, dinners, etc with Trepp and
26
27
28
James Gibbons. I have observed Trepp, once heavily intoxicated on a cruise, give Gibbons very
large amounts of casino chips and cash. I have heard them discuss "funneling" money in $10,000
-18-
effect that given Trepp's questionable background and the "source' of his donations, the less people
33.
Trepp is also a long tenn close associate of the Bonanno Family of the New Jersey
mob family bearing that name - dating back to at least Trepp's Drexel days when Trepp and Michael
6 Milken, who went to prison in connection with his "junk bond" scams, "invested" money for the
7
Bonannos. Trepp threatened me with the Bonannos and I have fears for my life because of that
association. The Bonanno's have close ties to Jack Abramoff, the Republican fund raiser, as does
Warren Trepp.
10
34.
I have participated in numerous meetings with Air Force General Ronald Bath, Trepp's
11
12
13
"consultant' and Trepp. Gibbons and Bath, both Air Force and Nevada Air National Guard pilots are
the basis forTrepp's political Influence in Nevada and within the Air Force. In November,
200~,
in
14
one of my many fights with Trepp over licensing my technology used in the special Government
15
contracts, Trepp threatened to " bury me" with his political influence over Bath and Gibbons_ I
16
believe the FBI/Air Force raid on my home and property was the result of that influence to steal my
17
technology for Trepp. Gibbons has admitted that he initiated the criminal investigation against me.
18
Claims I Intend to Bring Not Yet Flied
19
20
21
35_
The fact that Trepp and Gibbons Improperly influenced the FBI to raid my home and that
they have continued to conduct "surveillance' on me, including what I believe to be illegal physical
22 and electronic surveillance, including eavesdropping and wiretapping, leads me to believe that they
23
have used their secret surveillance program on AT&T customers to intercept my phone records. I
24
have been an AT&T customer. If this litigation is to proceed, I will intervene in the case of Hepting v
25
AT&Tas a Plaintiff against AT&T and the Government. I will also bring claims similar to those
26
27
28
brought in the AT&T case in this Court. In that action, I understand that the Government intervened
and sought to dismiss the case based on the state secrets privilege_
-19-
3
4
I also intend to bring claims under the "Federal Tort Claims Acr; and I intend to file
claims against various state and federal officers and employees in connection with the matters set
forth herein.
37.
At this point, given the unconstitutional raid on my home, which had a severely
damaging effect on my wife of 32 years and three children, I do not trust the State of Nevada, I do
5
6
not trust the US Government or any of it's branches, agencies, divisions or departments. I am certain
that Gibbons, Bath, Haraldsen and others have used their political influence to corrupt the system;
but I am hopeful that the Judges hearing this matter will follow the law and apply the law to the facts
10
11
I declare under penalty of perjury under the laws of the United States and the State of Nevada
that the foregoing is true and correct. Signed this 30th day of October, 2006 In Seattle, Washington ..
12
13
14
Dennis Montgomery
15
16
17
18
19
20
21
22
23
24
25
26
27
28
-20-
38.
p.1
I al10 Intend to bring clairmi under the "Federal Tort Clalml Act"; lllld I intend ID fife
1 daiml against varlou1 elate and W8r1ll offieen and employees In connection wlUt the mattera 101
2 for1h herein.
37.
Al ttila point, giWn the uneonalllulional raid on my home, which had a severely
4
5
dr!lllQin; efrect on my wlfa of 32 years and three children. I do not llUSt the State of Nevada, I do
not lnll lhe US Govemment or arry of Ifs biM ICl188, agencies, divisions or deparirlwntl. I am celtllln
'
7 that Gibbons, Bait!, Harald&an and Olhel'I haw used their political infl1111nce 1o corrupr die 'Ytlllm;
8 bul I am hopaful 1P1at the Judges i-rlng lhill matter will follow the law and. apply fie law Co the fad*
10
i declare under penalty gf perjury under h Jawa of the Unil8d Statat and lhl State at Nevada
11
12
13
14
Hi
18
17
18
19
20
21
22
:l3
24
25
211
27
28
.20.
!B/ 10
3'!lllld
: .;
'
.....
.;
):
Towhomitmaycoiicern,
;; ::-
~. ~,; ,'.::: ~ :.
>.. ,~i::';'.~~}~5:''..:r:
For about four months ;,'Treppid Technologies, U.C (the "C~~pany"jha8 bi:eu pz:rivi&iii~;,,
assistanee and info=ation (including that related to the Compatty's techno!Ogy, know-how;
business and processes) pursuiint to an agreement w i t h - (the. "Gov~t"). AB part o(, '
the consideration for providing such auistailce arid infomiation, the Government. agreed that 1: '
eTieppid Technologies' identity a:s a contractor and source of the assistance and information a&.'.
well as the information supplied by the Company would be kept confidctilll, would ~y.be
disclosed to individtials within the govemmcnt on a need to know basis oiily, and would ilot_bc
revealed to the public under "the Freedom of Information Act or o~. The pmpose of. tlllg . ,.
letter a~t is ~confinn in writing the understanding between,~ pariie-; _,.;: ::'.;_:, , , ...... ::.{i:::,~
. "
..
r'!'.
~-..:{ ~~--'
eTreppid Technologies, U..C'
:
By;...
Wattcn
Trepp,
CEO
: ,_
.
. '' .,.
.,
'
' .
;,
..'. ..'.'~;,.....' ~;_._.,:. '':-.
i'z;.
'
1.} '... .
. :
. .
...
..
_;.::. ~~i. .
.'
. . ;I '.
I
.I
..)
..
1::.
'~
:;:":;
'
.-,..: .:
~- .\ .
"
By:
'
...
... . '
"bringing digital
to life"
'.
US Government .
'
.J
>:. -~ ~t!" .
. .. -~ .~-- .. ~ ,';,-..- ..:.~
: ' ~.:.
:
I
'i
;'
: .. . .
negotiate
' .
'i
It is our current intent to' continue to work with the Government with I6g8rd to tbiS matter; This'.";_ .
will .c~_that the U.S. Govemment agrees not 1to ll1llkc any arlempt_tO 'tihlliitC:ralif use ..oi '"'. .
otherwise take. teclwqlogy, intellectual property cir other property or assets oWned by \:T~d .. ,,
: 'Techi16logies. ,In'.'~tioii. the. Government agrees that it will
J.i1-~ goo(_faith':'ari;.
~
.
-''"'
.
.
'
.. '
.: agreement that sets 'forth futu:tc services (including technology and irttellectllal property) to be"
provided by the Company and the comPensation to be paid for such future servic~s as wen as ,.
. si:rviees already rendered.
~.
i .. ~ '. ,... . .
:'!