• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Evidence Suggests GOP Hacked, Stole 2004 Election

noah way

Android Enthusiast
Apr 20, 2010
496
141
Evidence Suggests GOP Hacked, Stole 2004 Election

Until now, the architectural maps and contracts from the Ohio 2004 election were never made public, which may indicate that the entire system was designed for fraud. In a previous sworn affidavit to the court, Spoonamore declared: "The SmarTech system was set up precisely as a King Pin computer used in criminal acts against banking or credit card processes and had the needed level of access to both county tabulators and Secretary of State computers to allow whoever was running SmarTech computers to decide the output of the county tabulators under its control."

Spoonamore also swore that "...the architecture further confirms how this election was stolen. The computer system and SmarTech had the correct placement, connectivity, and computer experts necessary to change the election in any manner desired by the controllers of the SmarTech computers."

SmarTech was part of three computer companies brought in to manage the elections process for Ohio Secretary of State Ken Blackwell, a Republican. The other two were Triad and GovTech Solutions. All three companies have extensive ties to the Republican party and Republican causes.

In fact, GovTech was run by Mike Connell, who was a fiercely religious conservative who got involved in politics to push a right-wing social agenda. He was Karl Rove's IT go-to guy, and was alleged to be the IT brains behind the series of stolen elections between 2000 and 2004.

Connell was outed as the one who stole the 2004 election by Spoonamore, who, despite being a conservative Republican himself, came forward to blow the whistle on the stolen election scandal. Connell gave a deposition on the matter, but stonewalled. After the deposition, and fearing perjury/obstruction charges for withholding information, Connell expressed an interest in testifying further as to the extent of the scandal.

"He made it known to the lawyers, he made it known to reporter Larisa Alexandrovna of Raw Story, that he wanted to talk. He was scared. He wanted to talk. And I say that he had pretty good reason to be scared," said Mark Crispin Miller, who wrote a book on the scandal.

Connell was so scared for his security that he asked for protection from the attorney general, then Attorney General Michael Mukasey. Connell told close friends that he was expecting to get thrown under the bus by the Rove team, because Connell had evidence linking the GOP operative to the scandal and the stolen election, including knowledge of where Rove's missing emails disappeared to.

Before he could testify, Connell died in a plane crash.


Mysterious Death of Mike Connell—Karl Rove’s Election Thief

Spoonamore, a conservative Republican who works for big banks, international governments, and the Secret Service as an expert in the detection of computer fraud, found evidence that Karl Rove, with the help of Mike Connell and his company GovTech Solutions, electronically stole the Ohio 2004 election for Bush.

Arnebeck presents evidence that Karl Rove threatened Connell, cautioning that if Connell didn’t “take the fall” for election fraud in Ohio, Connell would face prosecution for supposed lobby law violations. After this threat, Arnebeck sent letters to the Department of Justice, as well as messages to high-ranking members of the department, seeking protection for Connell and his family from attempts to intimidate. Despite Connell’s elite status as a top-rung Republican consultant for years, whose firm New Media Communications provided IT services for the Bush-Cheney 2004 campaign, the US Chamber of Commerce, the Republican National Committee, and many Republican candidates and campaigns, witness protection requests went unheeded.

The extreme vulnerability of electronic voting systems to systematic fraud has fallen out of public awareness because it did not become a major issue during the 2008 elections, but the problem has never been resolved or even seriously examined by any official body. Questions about alleged vote count irregularities in Ohio during the 2004 election remain the strongest indication of the potential for large-scale tampering with these systems. The lawsuit, which sought testimony from GOP information technology expert Michael Connell as to any personal knowledge he might have had of those irregularities, has represented the most determined effort to get at the truth beyond these allegations.

Michael Connell testified under subpoena in November 2008 but died the following month, when his single-engine plane crashed as he was attempting to land at an Ohio airport near his home. At the time of his death, the only mainstream news outlet to even mention Connell’s death and the controversies surrounding his involvement in electronic voting was a single CBS/AP story.
 
  • Like
Reactions: Gmash
The 14 Characteristics of Fascism

(How many can you count in the US?)

Powerful and Continuing Nationalism

Fascist regimes tend to make constant use of patriotic mottoes, slogans, symbols, songs, and other paraphernalia. Flags are seen everywhere, as are flag symbols on clothing and in public displays.

Disdain for the Recognition of Human Rights


Because of fear of enemies and the need for security, the people in fascist regimes are persuaded that human rights can be ignored in certain cases because of "need." The people tend to look the other way or even approve of torture, summary executions, assassinations, long incarcerations of prisoners, etc.

Identification of Enemies/Scapegoats as a Unifying Cause

The people are rallied into a unifying patriotic frenzy over the need to eliminate a perceived common threat or foe: racial , ethnic or religious minorities; liberals; communists; socialists, terrorists, etc.

Supremacy of the Military

Even when there are widespread domestic problems, the military is given a disproportionate amount of government funding, and the domestic agenda is neglected. Soldiers and military service are glamorized.

Rampant Sexism


The governments of fascist nations tend to be almost exclusively male-dominated. Under fascist regimes, traditional gender roles are made more rigid. Opposition to abortion is high, as is homophobia and anti-gay legislation and national policy.

Controlled Mass Media

Sometimes the media is directly controlled by the government, but in other cases, the media is indirectly controlled by government regulation, or sympathetic media spokespeople and executives. Censorship, especially in war time, is very common.

Obsession with National Security

Fear is used as a motivational tool by the government over the masses.

Religion and Government are Intertwined

Governments in fascist nations tend to use the most common religion in the nation as a tool to manipulate public opinion. Religious rhetoric and terminology is common from government leaders, even when the major tenets of the religion are diametrically opposed to the government's policies or actions.

Corporate Power is Protected

The industrial and business aristocracy of a fascist nation often are the ones who put the government leaders into power, creating a mutually beneficial business/government relationship and power elite.

Labor Power is Suppressed

Because the organizing power of labor is the only real threat to a fascist government, labor unions are either eliminated entirely, or are severely suppressed .

Disdain for Intellectuals and the Arts

Fascist nations tend to promote and tolerate open hostility to higher education, and academia. It is not uncommon for professors and other academics to be censored or even arrested. Free expression in the arts is openly attacked, and governments often refuse to fund the arts.

Obsession with Crime and Punishment

Under fascist regimes, the police are given almost limitless power to enforce laws. The people are often willing to overlook police abuses and even forego civil liberties in the name of patriotism. There is often a national police force with virtually unlimited power in fascist nations.

Rampant Cronyism and Corruption

Fascist regimes almost always are governed by groups of friends and associates who appoint each other to government positions and use governmental power and authority to protect their friends from accountability. It is not uncommon in fascist regimes for national resources and even treasures to be appropriated or even outright stolen by government leaders.

Fraudulent Elections

Sometimes elections in fascist nations are a complete sham. Other times elections are manipulated by smear campaigns against or even assassination of opposition candidates, use of legislation to control voting numbers or political district boundaries, and manipulation of the media. Fascist nations also typically use their judiciaries to manipulate or control elections.
 
Upvote 0
It looks like AZ has the same issue

"P 40. Pima County uses a computer system called “GEMS” sold by the Diebold Company. Precinct cast ballots are counted at the precinct by an optical scan device that tallies and records the votes on each ballot cast by “reading” whether marks have been made at particular places on the ballots such as oval “bubbles” being filled in by black markers. The precinct cast ballots may not be thereafter counted. The vote tally for each precinct is downloaded from the “memory card” that is contained in each precinct optical scanner device into GEMS, the central count computer program.

P 41. Unfortunately, the “memory cards” that record precinct votes can be programmed by a “cropscanner™” device to produce false results. The Pima County election division owns a “cropscanner” device, and Pima County’s computer operator is highly skilled in the use of that “hack tool” by his own admission in trial testimony in Democratic Party of Pima County v. Pima County Board of Supervisors, Pima County Cause No. C20072073. During court testimony in that “database” lawsuit, Pima County election computer operator Bryan Crane testified that he practiced using Pima County’s “cropscanner” to alter vote counting instructions in precinct memory cards. In Crane’s opinion, “any person with computer knowledge wouldn’t have a problem with it.” C.I. 66 (p. 10 and Exhibit B)."

SEEKING JUSTICE - AUDITAZ: Appellant’s Opening Brief to Arizona State Court Of Appeals Div 2. Seeking Prospective Relief to Protect the Purity of Future Election Results?
 
Upvote 0

BEST TECH IN 2023

We've been tracking upcoming products and ranking the best tech since 2007. Thanks for trusting our opinion: we get rewarded through affiliate links that earn us a commission and we invite you to learn more about us.

Smartphones