Court Filing Reveals How 2004 Ohio Presidential Election was Hacked

Bob Fitrakis
freepress.org
July 27, 2011

A new filing in the King Lincoln Bronzeville v. Blackwell case includes a copy of the Ohio Secretary of State election production system configuration that was in use in Ohio’s 2004 presidential election when there was a sudden and unexpected shift in votes for George W. Bush.

The filing also includes the revealing deposition of the late Michael Connell. Connell served as the IT guru for the Bush family and Karl Rove. Connell ran the private IT firm GovTech that created the controversial system that transferred Ohio’s vote count late on election night 2004 to a partisan Republican server site in Chattanooga, Tennessee owned by SmarTech. That is when the vote shift happened, not predicted by the exit polls, that led to Bush’s unexpected victory. Connell died a month and a half after giving this deposition in a suspicious small plane crash.

Additionally, the filing contains the contract signed between then-Ohio Secretary of State J. Kenneth Blackwell and Connell’s company, GovTech Solutions. Also included that contract a graphic architectural map of the Secretary of State’s election night server layout system.

Court Filing Reveals How 2004 Ohio Presidential Election was Hacked ClevExlArchMapOH04 Court Filing Reveals How 2004 Ohio Presidential Election was Hacked SmartechRoutingOH04

Cliff Arnebeck, lead attorney in the King Lincoln case, exchanged emails with IT security expert Stephen Spoonamore. Arnebeck asked Spoonamore whether or not SmarTech had the capability to “input data” and thus alter the results of Ohio’s 2004 election. Spoonamore responded: “Yes. They would have had data input capacities. The system might have been set up to log which source generated the data but probably did not.”

Spoonamore explained that “they [SmarTech] have full access and could change things when and if they want.”

Arnebeck specifically asked “Could this be done using whatever bypass techniques Connell developed for the web hosting function.” Spoonamore replied “Yes.”

Spoonamore concluded from the architectural maps of the Ohio 2004 election reporting system that, “SmarTech was a man in the middle. In my opinion they were not designed as a mirror, they were designed specifically to be a man in the middle.”

A “man in the middle” is a deliberate computer hacking setup, which allows a third party to sit in between computer transmissions and illegally alter the data. A mirror site, by contrast, is designed as a backup site in case the main computer configuration fails.

Spoonamore claims that he confronted then-Secretary of State Blackwell at a secretary of state IT conference in Boston where he was giving a seminar in data security. “Blackwell freaked and refused to speak to me when I confronted him about it long before I met you,” he wrote to Arnebeck.

Read the email correspondence here [pdf]

On December 14, 2007, then-Secretary of State Jennifer Brunner, who replaced Blackwell, released her evaluation and validation of election-related equipment, standards and testing (Everest study) which found that touchscreen voting machines were vulnerable to hacking with relative ease.

Until now, the architectural maps and contracts from the Ohio 2004 election were never made public, which may indicate that the entire system was designed for fraud. In a previous sworn affidavit to the court, Spoonamore declared: “The SmarTech system was set up precisely as a King Pin computer used in criminal acts against banking or credit card processes and had the needed level of access to both county tabulators and Secretary of State computers to allow whoever was running SmarTech computers to decide the output of the county tabulators under its control.”

Spoonamore also swore that “…the architecture further confirms how this election was stolen. The computer system and SmarTech had the correct placement, connectivity, and computer experts necessary to change the election in any manner desired by the controllers of the SmarTech computers.”

Project Censored named the outsourcing of Ohio’s 2004 election votes to SmarTech in Chattanooga, Tennessee to a company owned by Republican partisans as one of the most censored stories in the world.

In the Connell deposition, plaintiffs’ attorneys questioned Connell regarding gwb43, a website that was live on election night operating out of the White House and tied directly into SmarTech’s server stacks in Chattanooga, Tennessee which contained Ohio’s 2004 presidential election results.

The transfer of the vote count to SmarTech in Chattanooga, Tennessee remains a mystery. This would have only happened if there was a complete failure of the Ohio computer election system. Connell swore under oath that, “To the best of my knowledge, it was not a fail-over case scenario – or it was not a failover situation.”

Bob Magnan, a state IT specialist for the secretary of state during the 2004 election, agreed that there was no failover scenario. Magnan said he was unexpectedly sent home at 9 p.m. on election night and private contractors ran the system for Blackwell.

The architectural maps, contracts, and Spoonamore emails, along with the history of Connell’s partisan activities, shed new light on how easy it was to hack the 2004 Ohio presidential election.

Sponsored Link: The man who predicted the collapse of GM, Fannie Mae, and Freddie Mac has just issued his latest research. Please take a minute to make sure you prepared for the next potential big U.S. financial crisis
Advertisements

About HSkipRob
Author, Real Estate and Business Consultant. PowerNetRealty.com, Inc.; Enles Solutions; Author: The Achilles Heel; The IRS Notice Federal Tax Lien, Inventor; Robinson Vertical Axis Wind and Water turbines. Blog Admin/Owner - BetweenTheHeadLines.net, an Online News Forum. Blog Admin/Owner - Repairing the Scales of Justice; a voluntary association of jurists

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Karl Dickey's Blog

politics, cigars, general aviation, business, finance and personal development

Palm Beach Free Press

your freedom-focused news source

Real Currencies

Supporting People and the Commonwealth and resisting the Money Power by defeating Usury

Iraq Currency Watch

This blog is dedicated to the Iraqi Dinar

JONATHAN TURLEY

Res ipsa loquitur ("The thing itself speaks")

ZeroGov

An online Journal by Bill Buppert devoted to the total abolition of slavery and the State.

Watts Up With That?

The world's most viewed site on global warming and climate change

WINTERY KNIGHT

...integrating Christian faith and knowledge in the public square

Adask's law

The Profit of Injustice

Radical Agenda

Common Sense Extremism

Real Science

"Science is the belief in the ignorance of the experts" - Richard Feynman

Laser Hacker Alternative Energy

Alternative projects, inventions, experiments and DIY projects

Christopher Cantwell

Radical Agenda

Bruce Krasting

My Take on Financial Events

PowerNetRealty

At Your Service

MIND CONTROL TECHNOLOGY

In conjunction with Renee Pittman Books, the Mind Control Technology Blog takes an in depth look into historic, research, covert ongoing testing, and development programs combined with today's use of highly advanced beamed psycho-physical, psychological electronic mind invasive technology. The technology uses extremely low electromagnetic frequency radio waves, microwaves, infrared, etc., designed EXPERTLY for covert, mass and social population control, and undetectable manipulation and influence. Little known to the public, these advancements have been used for DECADES and focused on individuals, groups, communities and large populations. Today a global system has officially unfolded through legalization which legitimized nonconsensual human experimentation for military and law enforcement agencies for research activity testing post 9/11. The reality is that this program has become a deadly subjugation program and effort, which opened the door for massive, inhumane, VICIOUS violations of Constitution, Civil and basic Human Rights. ============================================================================================================ AUTHOR'S NOTE: Due to the nature of the subject matter, these blogs must rely on open literature evidence and substantiating links for confirmation by others. It is a must. One person making these claims is simply not enough. Today there are thousands. Also, these Blogs are written under covert, beamed torture duress, by those accessing them and inserting errors. This is by the mobilized effort around the activist and author as an ongoing hope that the information held within will not be publicized, revealed as credible, and to leave a negative impression of illiteracy. Efforts continue to ensure corrected content and updates.

Memory Hole

Reflections on Media and Politics | © Memory Hole Blog / James F. Tracy 2012-2016

Exposing Faux Capitalism

to the dismay of the Federal Reserve and other faux capitalists

%d bloggers like this: