just sayin…

No Dictation

August 10, 2008

Election Fraud

Filed under: — webmaster @ 5:16 pm

This is video of an interview of Stephen Spoonamore, an IT expert who exposes the Diebold voting machine architecture as total junk. Also check out the article on Connell the GOP IT person running several Republican web sites, the Ohio election count of 2004, the senate and congressional network/firewall, and who is now working with McCain:
Connell, Rove and the GOP Boys, Positioned for McCain?

Stephen Spoonamore Interview #1 Archetecture Basics

Stephen Spoonamore Interview #2 Basic Hacking Possibilities

Stephen Spoonamore Interview #3 Memory Cards/ Chain of Custody and Hackability… Why do the cards take negative numbers?

Stephen Spoonamore Interview #4 Georgia Patch 2002… not clock function as Diebold said. Looks like a vote flipping function.

Stephen Spoonamore Interview #5 Not a partisan issue (he is Republican), this is a fascist issue… Hitler and Saddam had elections. “Back to paper”

Stephen Spoonamore Interview #6 Diebold lieing, all electronic systems can be hacked. No such thing as secure… random sampling of paper ballots only way. Cheaper and more secure.

Stephen Spoonamore Interview #7 Brilliantly designed IF you want to steal and elections. You can change things mid-stream, unheard of in secure systems. No one allowed to see code.

Stephen Spoonamore Interview #8 Worked on Republican campaigns, but not an issue of Democratic vs. Republican. Yes Republicans are doing the stealing right now, but not his kind of Republican. People do not want to believe, but the exit polls are right and the elections are wrong.

Here are some extra articles for background. Most of these are from 2006 because I got so disgusted, I stopped gathering them. VoteTrustUSA.org is a great site as is Lately with Spoonamore coming forward again ( here is the latest ), I am trying to get this blog up to speed on what was my main focus and reason for being political. Here is a reading list:

This is a great article to start with:

Miami Herald Article on a hack

Witness to the Hursti Hack

Explanation of Interpreted code

Share

Share to Facebook
Share to Google Buzz
Share to Google Plus
• • •
 

No Comments

No comments yet.

RSS feed for comments on this post.

Sorry, the comment form is closed at this time.