So, what is this exactly?

Click on the graphic to find out (expanded version).. 

Here’s the article by Larisa Alexandrovna and Muriel Kane (Raw Story):

Documents reveal how Ohio routed 2004 voting data through company that hosted external Bush Administration email accounts:

Newly obtained computer schematics provide further detail of how electronic voting data was routed during the 2004 election from Ohio’s Secretary of State’s office through a partisan Tennessee web hosting company.

A network security expert with high-level US government clearances, who is also a former McCain delegate, says the documents – server schematics which trace the architecture created for Ohio’s then-Republican Secretary of State and state election chief Kenneth Blackwell – raise troubling questions about the security of electronic voting and the integrity of the 2004 presidential election results. 

The flow chart shows how voting information was transferred from Ohio to SmarTech Inc., a Chattanooga Tennessee IT company known for its close association with the Republican Party, before the 2004 election results were displayed online.

Information technology expert Stephen Spoonamore believes this architecture could have made possible a KingPin or “Man in the Middle” (MIM) attack — a well-defined criminal methodology in which a computer is inserted into the network of a bank or credit card processor to intercept and modify transactions before they reach a central computer. 

Keep reading..

Is this what happened in Ohio in 2004? Is this system still in place for 2008? Larisa Alexandrovna says YES. I listened to Alexandrovna on Thom Hartmann this morning, and apparently something is happening on this story that will be reported on today. I’ll add an update when it is posted.

The implications of this story are explosive.

To read watch important video interviews with expert Stephen Spoonamore, go here.

add to del.icio.us : Add to Blinkslist : add to furl : add to ma.gnolia : Stumble It! : add to simpy : seed the vine : : : TailRank : post to facebook

17 thoughts on “So, what is this exactly?

  1. This is the same company that handled all those missing emails from the White House and George W. Bush.. This finally has the potential to be a HUGE smoking gun.

  2. Walt, she talked more about this on the radio interview.:

    “Information technology expert Stephen Spoonamore believes this architecture could have made possible a KingPin or “Man in the Middle” (MIM) attack — a well-defined criminal methodology in which a computer is inserted into the network of a bank or credit card processor to intercept and modify transactions before they reach a central computer. ”

    She was talking about the time stamps, and it was convincing. There is some hearing where this is being looked at or testified to today. I didn’t hear where or why..

  3. This may be the story of the election if Ohio goes closely for McCain. I don’t think McCain can win the overall, but the thought of someone sitting there watching the returns, waiting to see if putting the fix in for McCain will turn the election, and only doing so if it turned out to be the deciding state like 2004, is chilling. How many other states could be rigged like this?

  4. The time stamp she referred to happened at some point in the evening when the numbers suddenly started turning for Bush. Spoonamore said it is very likely there was that middle ‘person’ that was flipping the numbers before sending the info to that last point.

  5. And so finelly in our 11th hour of returning our country to the people we may see how they plan to stop it like they did in the past….Jeebos…I’m getting another head ache…Blessings

  6. I didn’t realize until this last week that a president can be impeached AFTER he leaves the WH and his term has ended.

    I don’t believe it will happen, but if anyone EVER deserved it, it is George W. Bush and Dick Darth Cheney.

  7. I didn’t know that either Lady Muse but I wonder if the special provision’s in the patriot act that say none of this administration can be held accountable for crime’s after they leave office would make that null and void……Blessings

  8. Where are they going to go after they leave office? Where CAN they go? They’ve created their OWN prisons of their own making. Everyone in the entire world knows of all the things they’ve done.

  9. The key to any legal action against the president hinges on preventing pardons from protecting those whom would be needed to be compelled to testify against him. You can’t offer amnesty to someone with no fear of their own prosecution.
    The one redeeming thing Nancy Pelosi could do is be sitting on a means to prevent those pardons until after the elections. There, now you know my secret Christmas wish!

  10. muse, Kissinger continues to haunt the corridors of power and show up on TV every now and again to bloviate about this and that. In several Latin American countries he’d be staying at the Big House for the rest of his natural… Chimpy wants to be Baseball Commissioner next, or a spaceman, or maybe a firefighter.

  11. Tomorrow is going to be very interesting.

    1. Will the Diebold Zone and the Palast/Kennedy suppression gap win?
    2. If they do, what are you going to do about it?

  12. Dear Terry, I would give my answer to your question if it were not for an old thought I have had on the past….Never tell the enemy or your oponent what you plan t do in advance…..Blessings

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s