The GOP's cyber election hit squad
by Steven Rosenfeld and Bob Fitrakis
April 22, 2007
Did the most powerful Republicans in America have the computer capacity, software skills and electronic infrastructure in place on Election Night 2004 to tamper with the Ohio results to ensure George W. Bush's re-election?
The answer appears to be yes. There is more than ample documentation to show that on Election Night 2004, Ohio's "official" Secretary of State website – which gave the world the presidential election results – was redirected from an Ohio government server to a group of servers that contain scores of Republican web sites, including the secret White House e-mail accounts that have emerged in the scandal surrounding Attorney General Alberto Gonzales’s firing of eight federal prosecutors.
Recent revelations have documented that the Republican National Committee (RNC) ran a secret White House e-mail system for Karl Rove and dozens of White House staffers. This high-tech system used to count and report the 2004 presidential vote– from server-hosting contracts, to software-writing services, to remote-access capability, to the actual server usage logs themselves – must be added to the growing congressional investigations.
Numerous tech-savvy bloggers, starting with the online investigative consortium epluribusmedia.org and their November 2006 article cross-posted by contributor luaptifer to Dailykos, and Joseph Cannon's blog at Cannonfire.blogspot.com, outed the RNC tech network. That web-hosting firm is SMARTech Corp. of Chattanooga, TN, operating out of the basement in the old Pioneer Bank building. The firm hosts scores of Republican websites, including georgewbush.com, gop.com and rnc.org.
_snip--
http://www.freepress.org/departments/display/19/2007/2553Bob Fitrakis is a political science professor and attorney in the King Lincoln Bronzeville civil rights lawsuit against Ken Blackwell. Fitrakis, Rosenfeld and Harvey Wasserman are authors of "What Happened in Ohio? A documentary record of theft and fraud in the 2004 election," (New Press, 2006).
KEY LINKS: To trace the site-hosting history of election.sos.state.oh.us, go to:
http://toolbar.netcraft.com/site_report?url=http://election.sos.state.oh.us(You will note on Nov. 3, 2004, the Ohio Secretary of State's website was moved from a Columbus-based company, OARnet, to SMARTECH CORPORATION.)
Ken Blackwell Outsources Ohio Election Results to GOP Internet Operatives, Again
http://scoop.epluribusmedia.org/story/2006/11/7/115314/922http://www.dailykos.com/story/2006/11/7/144314/082 Who is Michael L. Connell? Part II: Behind the firewall
http://scoop.epluribusmedia.org/story/2007/4/2/6328/14926 The White House, vote theft, and the email trail
http://cannonfire.blogspot.com/2007/03/ gwb43-white-house-vote-theft-and-email.html
Cedarville University A Major Player in Ohio's Election Tallying Efforts
http://www.cedarville.edu/departments/ marketing/publicrelations/newsarticle.cfm? ID=2132271177
"What Happened in Ohio: A Documentary Record of Theft and Fraud in the 2004 Election," by Robert Fitrakis, Steven Rosenfeld, Harvey Wasserman.
http://www.thenewpress.com/index.php?option=com_title&task =view_title&metaproductid=1597
Rove-ing emails: what else could go missing? by Todd Johnston
http://scoop.epluribusmedia.org/story/2007/4/22/ 33926/1773
http://scoop.epluribusmedia.org/story/2006/11/9/61233/1283This shows a screen capture of the TN server 64.203.98.137 which in 2004 was where election.sos.state.oh.us was hosted from, and in 2006 it was still getting live data from Ohio, even though election.sos.state.oh.us was hosted on OARnet servers in Ohio.