OHIO BLOCKBUSTER!

Here’s a hot new piece by Steve Rosenfeld and Bob Fitrakis, reporting
some amazing news. First of all, it turns out that the same computer
network that hosted the secret WH email in the latest Gonzo scandal
also hosted Ohio’s official websites for presidential vote-counting and
election results.
And that’s not all.
It turns out that, on Election Night 2004, the “live” returns on Ken Blackwell’s
website were frozen for 90 minutes after Kerry had been deemed the winner in
Ohio’s biggest cities. Only then did the (apparent) totals from Ohio’s GOP-majority
counties come in, pushing Bush over the top (apparently). As Fitrakis and Rosenfeld
show, those totals were largely based on fraudulent numbers.
Bush/Cheney were not elected. Spread the word–and let’s start talking,
at long last, about impeachment, which is now the only legal and the only
honorable course.
MCM


Mon Apr 23 2007

The GOP’s cyber election hit squad

by Steven Rosenfeld and Bob Fitrakis
April 22, 2007

Did the most powerful Republicans in America have the computer capacity, software skills and electronic infrastructure in place on Election Night 2004 to tamper with the Ohio results to ensure George W. Bush’s re-election?

The answer appears to be yes. There is more than ample documentation to show that on Election Night 2004, Ohio’s “official” Secretary of State website – which gave the world the presidential election results – was redirected from an Ohio government server to a group of servers that contain scores of Republican web sites, including the secret White House e-mail accounts that have emerged in the scandal surrounding Attorney General Alberto Gonzales’s firing of eight federal prosecutors.

Recent revelations have documented that the Republican National Committee (RNC) ran a secret White House e-mail system for Karl Rove and dozens of White House staffers. This high-tech system used to count and report the 2004 presidential vote- from server-hosting contracts, to software-writing services, to remote-access capability, to the actual server usage logs themselves – must be added to the growing congressional investigations.

Read more.

Leave a Reply

Your email address will not be published. Required fields are marked *