Naval officer Fred Keating "absurdly unlucky" if he did not plant toilet camera, said the court



[ad_1]

Commodore Alfred Harold Keating was the "guy" who put a hidden camera in the bathroom of the New Zealand embassy in Washington DC, otherwise it was a "horrible coincidence," Crown said.

Keating, who is also known as Fred Keating, denies having hidden a camera in the area of ​​unisex bathrooms and attempting to make intimate recordings of a person on July 27, 2017.

Keating, who is being tried in Auckland District Court, was the assistant chief of the Navy at the Defense Headquarters in Wellington before being placed as an embassy defense attaché.

Crown prosecutor Henry Steele closed the Crown case against Keating on Wednesday, telling the jury that they can be sure, no doubt, that it was Keating who planted the camera.

Steele summed up the case to the jury saying that Keating had been an "absurdly unlucky" victim of a series of remarkable and unfortunate events or, as the Crown suggests, Keating planted the camera in the bathroom.

Throughout the trial, the jury was informed that Keating's computer was, at some point, connected to a security device for BrickHouse cameras.

The security camera BrickHouse, which Fred Keating allegedly tried to make private recordings in the embassy bathroom.

CATRIN OWEN / STUFF

The security camera BrickHouse, which Fred Keating allegedly tried to make private recordings in the embassy bathroom.

On July 24 and 25, 2017 – two days before the camera was found – the user "fredk" visited the site, downloaded the configuration tool and researched the positions and modes of exchange for the camera.

Later, on July 27, at 9:03 a man matching Keating's description was seen walking into the bathroom at 9:03 am shortly before the camera was set at 9:04 am, Steele said.

The various records of theft cards that day also corresponded to Keating's movements.

The jury also played a series of videos captured on the device.

The first video showed a blue gloved hand mounting the camera, which had a clear view of the toilet. Steele states that it is Keating's hand positioning the camera.

The second video showed a person, who the Crown claims is Keating, using the bathroom moments after placing the camera inside a radiator.

In this second video, the man appears to be wearing a white short-sleeved shirt, black pants and a black Fitbit, consistent with what he was wearing on July 27.

Steele said Keating settled to be the first "victim", or filmed using the bathroom for "plausible denial."

"He wants to establish himself as the first victim, maybe it's all part of the excitement, maybe he just wanted to use the bathroom?" Steele said.

The camera captured some images before falling and then captured four pairs of feet before being found by driver Jerry Navarro.

On the night of July 27, BrickHouse software was uninstalled from Keating's computer.

"Again, a horrible coincidence if he is not responsible … that night after the discovery of the camera, he will uninstall the installed software he installed just a few days before, and then he is on leave," Steele said.

Fred Keating denies having placed a hidden camera in the embassy bathroom.

DELWYN DICKEY / STUFF

Fred Keating denies having placed a hidden camera in the embassy bathroom.

Steele said the forensic analysis of the computer-made Keating tests were done using the camera and "link files".

"The morning of July 27, he's back," Steele said.

"Would not it be a horrible coincidence if these target files were not created by the bathroom camera?" Steele said.

"You can be sure that the target video files that the link files correlate were created by the same camera … if you're sure of that, there's not much to think about."

For the past eight days, the court heard several witnesses and officials at the embassy, ​​including two men who discovered the camera in the bathroom.

Navarro first found the camera, not knowing what it was and left it in the bathroom.

Stephen Warren then discovered the camera and was immediately concerned about his presence, he took it to safety head and began the investigation.

Fred Keating standing in front of the New Zealand embassy in Washington DC at a defense reception in September 2017.

SUPPLIED / FACEBOOK

Fred Keating standing in front of the New Zealand embassy in Washington DC at a defense reception in September 2017.

When Keating's house was searched by police, a few months passed and Keating learned of the investigation after being informed by police in September.

Steele said this was an "active opportunity" to eliminate any evidence before his house was searched.

Evidence was also given to the court that Keating downloaded the software to "clean" the contents of his computer and he was executed at least eight times before being seized.

"This is a coincidence or something else … he knows he's of interest to them [the police]"

Finally, Steele said the forensic evidence was "extremely strong," with DNA found on the SD card, 10,000 million times more likely to be Keating's than anyone else's.

However, there was no evidence to explain how the Keating DNA was found on the SD card.

"His DNA is on the SD card because it's his camera and it's the one he put in the bathroom," Steele said.

Defense lawyer Ron Mansfield will summarize on Wednesday.

Keating denies the charges against him and did not give evidence at the trial.

[ad_2]

Source link