Vodpod videos no longer available.
GOP Cyber security expert Stephen Spoonamore is the person we have been waiting for, the inside expert who is now detailing how election fraud is done. Spoonamore is founder and former CEO of Cybrinth LLC, an information technology and security firm that serves Fortune 100 companies. This clip is part of a ten-part interview – go to You Tube to see it all – click here*, and the rest of the clips will be available on the right hand side.
Spoonamore, a Republican and McCain supporter, claims that Saxby Chambliss lost by five points to Max Cleland in Georgia in 2002, that Bush lost to Kerry in 2004, and that the machinery is in place to steal the current election. He details how it is done – in a separate case now working its way through the courts, King Lincoln v. OH Sec. of State, he describes how the electronic part of the Bush “victory” in Ohio in 2004 was done: Votes that were supposedly to be transmitted to the Secretary of State’s office were first routed through a computer based in Chattanooga, Tennessee. That computer happened to be owned by a company called SmarTech. That is coincidentally is the same company that hosted the domain for the Bush White House that allowed them to communicate outside official channels. That’s where the tallies were likely changed.
According to an affidavit filed by Spoonamore in the case, “computer placement, in the middle of the network, is a defined type of attack.”
Spoonamore also claims that the “religious Christianist far right” is behind much of this fraud. That would make sense – fundamentalists are so sure that they are right about everything that any means justifies their ends. That’s the danger of fundamentalism.
This is from Mark Crispin Miller, who has done a yeoman’s job in working the election fraud issue:
According to this piece from Black Box Voting, the election results in Illinois, Colorado and Kentucky will be routed to private servers–just as in Ohio in 2004. As Stephen Spoonamore has made clear, this is an extremely dangerous arrangement, whose only purpose would be to facilitate the theft of the election.
The primary reason that this story doesn’t get a full public airing, and that it is relegated to back burners and assigned to conspiratorial limbo, is that the Democratic Party won’t take the issue seriously. When McCain waltzes into the White House after a stunning upset on November 4th, when forecasted congressional gains don’t materialize, and when lightweight beauty pageant queen Sarah Palin becomes our Vice President, perhaps they will take note.
But I doubt it.
*Best quote from the interview: “Diebold machines are not poorly designed. They are brilliantly designed. They are designed to steal elections.”
religious Christianist far right
Oh no, you’re not reading Andrew Sullivan now, are you?
LikeLike
No – I should start?
LikeLike
This is a weird statement. A man-in-the-middle attack is when an attacker intercepts communications between two computers and relays and injects messages without the other two computers knowing. Intentionally routing messages through another computer isn’t any kind of defined attack.
Which doesn’t necessarily invalidate his point, in that they could have no reason to route through that other computer, but it’s an odd statement for him to make.
Also, the part in the video where he mentions negative vote totals. Yes programmers aspire to writing code that’s clean, secure, elegant, etc. Shockingly, that doesn’t always happen. Also shockingly, there’s some very bad code in the world that supports very important processes (I’ve worked on a lot of code involved in whether or not people are approved for credit – it’s not always pretty). Allowing a negative vote total could be as simple as someone not bothering to use an unsigned int and using a regular int. Not having seen the code he’s talking about I couldn’t say for sure, but it’s not really that cut and dry.
I am confused by you calling him a whistleblower. It doesn’t seem like he has any kind of insider evidence of fraud, just the same after the fact analysis that there’s always been. Identifying real vulnerabilities is not the same thing as showing fraud, even though they should be treated similarly.
LikeLike
Precisely – I’m not sure you caught his point on this – the Chattanooga computer was meant to serve as a backup in case the SofS computer overflowed or malfunctioned, but was instead was positioned between the lower level computers and the SofS and did exactly what you say – it injected messages without the other computers knowing.
Negative numbers on vote tallying machines is sloppy? Isn’t that kind of the point? We’ve got no oversight over these machines – malicious or sloppy code is beyond our control.
You’re right about whistleblower status, I guess. He’s a participant in a lawsuit, and has made his living in the field, working elections in many countries. He’s an insider regarding election integrity, and has stepped forward to warn us that our elections are not secure. Maybe he’s Cassandra.
LikeLike
The point I was making is somewhat picky, but it sounds like from his videos he was talking about a computer in Ohio routing it through the one in Tennessee intentionally, but for unknown reasons. Saying a computer routed data through another computer for an unknown reason is suspicious, but possibly benign. A man in the middle attack is a huge deal and an obvious problem. I’m suspicious that he’s trying to overstate his case.
Yes, but I think he made a statement to the effect that the only reason to allow negative totals is to steal an election. That was my issue. I think he’s overstating his case (again).
I’m not saying he’s not important, it was just calling him a whistleblower didn’t make sense to me.
LikeLike
I don’t think the Chattanooga computer was ‘intentionally’ put there – it was kind of a fail safe, not meant to be used at all, and only in an emergency, and yet all of the data for the state was routed through it without the knowledge of the people at the SofS office, save perhaps Ken Blackwell.
Maybe a poor choice of words. Cassandra is better.
LikeLike