RoveCyberGate.com
UPDATE: 11/1/08: Late yesterday, a Federal Judge in Akron, Ohio ordered Mike Connell to submit to a deposition hours before the presidential election to talk about possible election manipulations.
The full story is here. Mr. Connell, it’s time to tell the truth and get with the new dynamic, the one called accountability. Yours is the first of many depositions to get to the bottom of this shameful chapter in American democracy. You have a unique opportunity to do the right thing now. The Bush family is not going to protect you or cover for you any longer.
UPDATE: 10/28/08: Attorneys filed a motion to compel testimony of Connell to interrogate him about his knowledge of the inter-workings of the GOP computer systems. See Memo here. They included an affidavit of Spoonamore stating that the Ohio 2004 election was manipulated by a inside Man in the Middle King Pin attack. See Affidavit here.
UPDATE: 10/23/08: VR Calls For DOJ Investigation Into Why Bush/Rove IT Expert Mike Connell Asked How to Destroy White House Emails
Reporter Rebecca Abrahams wrote this week at Huffington Post that on October 11, 2006, longtime Bush/Rove IT expert Michael Connell met with cyber security expert Stephen Spoonamore to learn how to destroy data on White House computer hard drives This was during the height of the United States Attorney scandal and during the tenure of Connell's former employee, David Almacy, as director of the White House Internet and E-Communications Director.
Abrahams quotes from Spoonamore's emails which reference notes taken at the time of the meeting. Connell was accompanied at the meeting by Randy Cole, the former President of Connell's company, GovTech Solutions, now running for Ohio Congressional seat 41. When Spoonamore realized that Connell and Cole were asking how to destroy White House data, he terminated the conversation and told them that what they were asking about was illegal.
Attorney General Michael Mukasey recently appointed prosecutor Nora Dannehy to investigate whether criminal charges should be brought against those involved in the US Attorney scandal. Today, in a press release, VR called for that investigation to include what role and knowledge Michael Connell and Randy Cole have regarding the destruction of White House computer data, and, as Abrahams suggests, whether Connell knows where the White House email backup is located.
UPDATE: 10/7/08: Velvet Revolution Calls On John McCain To Fire Michael Connell For Covering Up For Karl Rove In Federal Election Manipulation Lawsuit
Velvet Revolution today issued a press release calling for Republican candidate John McCain to fire computer expert Michael Connell from his campaign for covering up alleged election manipulations of Karl Rove and others. Mr. Connell, the GOP’s top computer expert, was subpoenaed based on a September 19th court order to testify under oath in an Ohio federal lawsuit looking into serious allegations that Mr. Rove has directed a strategy to illegally manipulate elections through the use of computer technology. Rather than cooperate in the investigation, Mr. Connell hired attorneys close to the Bush/Cheney Administration and refused to appear for the deposition arguing client (GOP) confidentiality. Those attorneys have said that they will do everything possible to keep Mr. Connell from testifying before the November general election. See press release pdf.
UPDATE: 10/3/08: VR Offers 100K Reward In RoveCyberGate Case
Today, VR offered a $100,000 reward for information from whistleblowers who have knowledge of election related criminal activity by Michael Connell, Randy Cole, Karl Rove and others. You can see the full ad here. The information must result in a conviction.
UPDATE: 10/1/08: VR Calls for Special Prosecutor to Investigate Connell and Rove
In light of Mike Connell’s stonewalling of the subpoena in this case, Velvet Revolution today called for Attorney General Mukasey to appoint a special prosecutor to investigate the conduct, actions and knowledge of Michael Connell and his confidential work for Karl Rove and George Bush vis a vis election manipulations and destruction of data. VR also called on Congress to hold hearings and place Mr. Connell under oath to testify about election rigging, destruction of White House emails, and spying on Congress. See PDF news release.
UPDATE: 9/30/08: Stay Lifted, Depositions Ordered, Connell Subpoenaed, Connell Stonewalls
Many new turns in this case the past few days. On September 22, the federal court lifted the stay in this case and ordered depositions to begin, starting with Bush IT Expert Michael Connell. (See Order in PDF) A few days later, Connell was subpoenaed and ordered to produce documents. He hired three high powered GOP-connected attorneys and filed a Motion to Quash (See Motion in PDF) and an affidavit stating that his information is confidential.(See Affidavit in PDF) His attorneys have refused to make him available for deposition and have indicated that they will not let him testify unless forced to by the court. Attorney Arnebeck intends to secure a court order to enforce the subpoena.
UPDATE 9/18/08: Ohio Attorneys File Papers To Take Deposition Of Bush IT Expert Michael Connell And Others-Includes Spoonamore Affidavit
Yesterday, Ohio attorney Cliff Arnebeck asked the federal court in Columbus to allow him to place Bush IT guru Michael Connell under oath to ask him about his 20 year work for the Bush family, including his work for Jeb Bush in Florida 2000 and for Ken Blackwell in Ohio 2004. “The public has a need and right to know, before the next presidential election, that the top Republican IT expert shares a concern about the vulnerability of electronic voting systems to fraudulent manipulation, and that this is not just “conspiracy theory,” Arnebeck wrote. Arnebeck also advised the court that he would seeking depositions from others, including Karl Rove. See Court filing.
Attached to the filing are two affidavits, one from cyber security expert Stephen Spoonamore and the other from analyst Richard Hayes Phillips. The Spoonamore affidavit asserts that the election computer setup used by Ken Blackwell in 2004 provided the means and opportunity for the manipulation of the election results. “ The vote tabulation and reporting system, as modified at the direction of Mr. Blackwell, allowed the introduction of a single computer in the middle of the pathway. This computer located at a company principally managing IT Systems for GOP campaign and political operations (Computer C) received all information from each county computer (Computer A) BEFORE it was sent onward to Computer B. This centralized collection of all incoming statewide tabulations would make it extremely easy for a single operator, or a preprogrammed single "force balancing computer" to change the results in any way desired by the team controlling Computer C. In this case GOP partisan operatives. Again, if this out of state system had ANY digital access to the Secretary of State’s system it would be cause for immediate investigation by any of my banking clients.” See Spoonamore Affidavit.
The Hayes affidavit asserts that after reviewing hundreds of thousands of documents, ballots and other election records, “it is my conclusion that there is so much evidence of ballot alteration, ballot substitution, ballot box stuffing, ballot destruction, vote switching, tabulator rigging, and old fashioned voter suppression, that the results of the 2004 presidential election, would have been reversed” had there been a real investigation. See Hayes Affidavit. He insists that the time is now to take depositions from those implicated in the theft of that election.
Tell Congress to investigate Karl Rove’s cyber strategy to illegally manipulate elections. Click here to send an email to your Congress Members demanding immediate public hearings on whistleblower allegations that Rove architected and directed illegal attacks on Democratic candidates through the improper use of corporate funds channeled through fake Web-based front organizations, the improper political use of the Justice Department to prosecute opposition candidates, and the use of Internet based IT networks to alter election results.
Monday, November 3, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment