Rove’s IT Guru Warned of Sabotage Before Fatal Plane Crash; Was Set to Testify

Truthout

Mike Connell (Photo: Cleveland Plain Dealer)

by Amy Goodman, Democracy Now!

Mike Connell, the chief IT consultant to Karl Rove, reportedly asked for protective custody from the government before he died.
Amy Goodman: A top Republican internet strategist who was set to testify in a case alleging election tampering in 2004 in Ohio has died in a plane crash. Mike Connell was the chief IT consultant to Karl Rove and created websites for the Bush and McCain electoral campaigns. He also set up the official Ohio state election website reporting the 2004 presidential election returns.

Connell was reportedly an experienced pilot. He died instantly Friday night when his private plane crashed in a residential neighborhood near Akron, Ohio.

Michael Connell was deposed one day before the election this year by attorneys Cliff Arnebeck and Bob Fitrakis about his actions during the 2004 vote count and his access to Karl Rove’s e-mail files and how they went missing. Read this entire article and interview…

Amy Goodman goes on to interview Mark Crispin Miller in this article. There was a news report on this ‘accident’ a few days ago on Raw Story, including a video report from  19ActionNews from Columbus, OH. It is funny how quickly any questions surrounding the ‘accident’ quickly were referred to as “conspiracy”..

Larisa Alexandrovna of at-largely, who is an investigative journalist, has done a series of articles on this subject since the crash beginning with “One of my sources died in a plane crash last night…”:

I don’t usually reveal sources, but I think this is incredibly important. Michael Connell died in a plane crash last night. He was a key witness in the Ohio election fraud case that I have been reporting on. More importantly, however, he had information that he was ready to share.

You see, Mike Connell set-up the alternate email and communications system for the White House. He was responsible for creating the system that hosted the infamous GWB43.com accounts that Karl Rove and others used. When asked by Congress to provide these emails, the White House said that they were destroyed. But in reality, what Connell is alleged to have done is move these files to other servers after having allegedly scrubbed the files from all “known” Karl Rove accounts.

In addition, I have reason to believe that the alternate accounts were used to communicate with US Attorneys involved in political prosecutions, like that of Don Siegelman. This is what I have been working on to prove for over a year. In fact, it was through following the Siegelman-Rove trail that I found evidence leading to Connell. That is how I became aware of him. Mike was getting ready to talk. He was frightened.. More..

Here are more of Alexandrovna’s follow-up posts: Here, here, here, and here. I hope this gets looked at carefully, thoroughly, and independently.

Continue reading

Amy Goodman interviews Mark Crispin Miller

The Raw Story

Democracy Now’s Amy Goodman talked to Mark Crispin Miller about a Republican contractor who has been required to testify about his connection to possible fraud concerning the 2004 presidential election. Crispin Miller points to reporting by RAW STORY to help explain the details of why this Republican contractor, Mike Connell, could be so important.

The full transcript of Mark Crispin Miller’s interview is available here.

This testimony that Mark Crispin Miller refers to is connected to this previous post from earlier today.

Vodpod videos no longer available.

add to del.icio.us : Add to Blinkslist : add to furl : add to ma.gnolia : Stumble It! : add to simpy : seed the vine : : : TailRank : post to facebook

So, what is this exactly?

Click on the graphic to find out (expanded version).. 

Here’s the article by Larisa Alexandrovna and Muriel Kane (Raw Story):

Documents reveal how Ohio routed 2004 voting data through company that hosted external Bush Administration email accounts:

Newly obtained computer schematics provide further detail of how electronic voting data was routed during the 2004 election from Ohio’s Secretary of State’s office through a partisan Tennessee web hosting company.

A network security expert with high-level US government clearances, who is also a former McCain delegate, says the documents – server schematics which trace the architecture created for Ohio’s then-Republican Secretary of State and state election chief Kenneth Blackwell – raise troubling questions about the security of electronic voting and the integrity of the 2004 presidential election results. 

The flow chart shows how voting information was transferred from Ohio to SmarTech Inc., a Chattanooga Tennessee IT company known for its close association with the Republican Party, before the 2004 election results were displayed online.

Information technology expert Stephen Spoonamore believes this architecture could have made possible a KingPin or “Man in the Middle” (MIM) attack — a well-defined criminal methodology in which a computer is inserted into the network of a bank or credit card processor to intercept and modify transactions before they reach a central computer. 

Keep reading..

Is this what happened in Ohio in 2004? Is this system still in place for 2008? Larisa Alexandrovna says YES. I listened to Alexandrovna on Thom Hartmann this morning, and apparently something is happening on this story that will be reported on today. I’ll add an update when it is posted.

The implications of this story are explosive.

To read watch important video interviews with expert Stephen Spoonamore, go here.

add to del.icio.us : Add to Blinkslist : add to furl : add to ma.gnolia : Stumble It! : add to simpy : seed the vine : : : TailRank : post to facebook

Stephen Spoonamore 2008 Interview – “Paper ballots please..”

add to del.icio.us : Add to Blinkslist : add to furl : add to ma.gnolia : Stumble It! : add to simpy : seed the vine : : : TailRank : post to facebook

Mark Crispin Miller

Here, in this shattering new interview, Stephen Spoonamore goes into harrowing detail about the Bush regime’s election fraud, past, present and–if we don’t spread the word right now–to come. Since he’s the only whistle-blower out there who knows the perps themselves, and how they operate, we have to send this new piece far and wide.

Here Spoon tells us that McBush’s team–i.e., Karl Rove and his henchpersons– have their plan in place to steal this next election: by 51.2% of the popular vote, and three electoral votes.

He also talks about the major role played by the Christianist far right in the electronic rigging of the vote.

And he defines our electronic voting system as a major threat to US national security, calling for it to be junked ASAP, in favor of hand-counted paper ballots.

Since Spoon is a Republican and erstwhile McCain supporter, as well as a noted specialist in nosing out computer fraud, his testimony is essential–not only for its expertise, but, no less, for the impact that his views will surely have on those Republicans who have been loath to see what Bush & Co. has done to our election system.

That whole story’s just about to break. In fact, tomorrow there will be a number of articles appearing, on a recent breakthrough in the lawsuit that Spoon’s testimony has enabled, and on other aspects of that all-important case.

Spoonamore says that the GOP wanted e-voting to steal elections but now foreign governments will be hacking and the winner will be determined by the best hackers. He says that if the GOP wins the hacking competition, McCain will win 51.2 percent with three electoral votes over Obama, and it will be a stolen election.

Spoon also makes a crucial point about the people who have been implicated in much of the election theft: “They are religious extremists.” He names those who know about stolen elections, and he insists that the only way to protect this election is with paper ballots, hand-counted. 

Cyber Security expert Stephen Spoonamore discusses electronic voting vulnerabilities, and says the 2008 election WILL be stolen, in this ten part series:

Part 1 – “It’s a network people.”

Part 2 – “Electronic voting machines are a national security threat.”

Continue reading