The more I read into his case the more I start to think he was framed by a Texas prosecutor (Terri moore) trying to become the state da and a politician as well as overzealous feds and cops:
Here is the info from a computer expert how the us government fuked him and how those lied in that very documentary:
alphr.com/features/74690/operation-ore-exposed/2/those americans lied and commited crimes themselves like perjury it seems just to get him or get terri moore a notch on her prosecutor hat and a way in toward running for politics.
"The clues to the flaws in the evidence were there for those with the eyes to see. Look again at the image on p152, exhibit 'SAN/1'. It is a slightly blurred photograph (not a screen grab) of a Windows 98 machine running Internet Explorer. Look at the right-hand side. There is a slider bar, showing that what is being seen is less than one-third of the full page. The top and most of the contents are missing. The image has been cropped, concealing most of the page.
Look again, this time at the web address space below the toolbar. The front page address for Landslide was landslide.com. This is not it. Whatever is there in the blur, it is too long to be the Landslide front page address. When I saw this image a year ago, I knew something was very wrong with the evidence.
Unknown to the Texas detectives, there is another place where you can get at the Internet's historical truths. The Internet Archive, also known as the Wayback Machine (archive.org), is a not-for-profit foundation based in San Francisco. The Archive's computers have been crawling the Web since 1996, building a huge, searchable historical archive. The Archive, I found, had recorded what the Landslide website really looked like in 1999.
From the Archive, I retrieved a series of front pages from Landslide's beginnings in 1996 through to April 1999, just before the police investigation began. There were no 'child ****' buttons nor any place where one could be. I also found the real page that had, one occasion only, displayed the notorious banner. Located at
avs.landslide.com/avs/index.html, it was an internal page for Landslide's adult AVS service. At the very bottom of the page were two advertising spaces, controlled by a third-party banner swap service. Whatever banners appeared there were not - could not - have been part of Landslide or Keyz."
NCS passed the US computer files to a specialist computer forensic company called CELT, with instructions to rebuild the Landslide and Keyz web pages. At CELT, expert Dr Sam Type found more contradictions to the American evidence. Nelson and Mead had both sworn statements that Keyz websites could be reached from the Landslide homepage. 'Absolutely no way,' reported Dr Type. After rebuilding the Texas website, she dismissed the idea that Keyz was a service devoted to child ****.
In a further report in November last year, Dr Type confirmed that the 'Click here' child **** advertisement was never seen on the Landslide front page. It was 'actually the AVS front page', she wrote. The 'child ****' banner ad, she found, wasn't on any of Landslide's computers; it had come from elsewhere.
Key witness
This February, a British court required Mead's attendance for an Operation Ore case. He gave evidence by means of a satellite video link from Texas to the Crown Court in Derby. On oath, Mead stated that he and Nelson had only ever seen the 'Click Here Child **** button' appear once, at the very start of their investigation. He accepted that the photograph only showed part of the page. 'The child **** link was at the bottom,' he said.
He was asked: 'In June 1999, it is likely that the 'Click here for child ****' was not on the Landslide's homepage?'
'Correct,' he replied."