63 Documents the Government Doesn't Want You to Read - Jesse Ventura [28]
The Computer C “man in the middle” that Spoonamore is talking about was the property of a Chattanooga company called SMARTech. They were the subcontractor of GovTech Solutions, Mike Connell’s company, for purposes of hosting a “mirror site” on election night. This ensured that the Ohio election results could be observed and changed, using remote access through high-speed Internet.
If this were the private sector and something got diverted to an intermediary in Chattanooga that was clearly illegal, there would be an investigation for sure. Why does this situation get a pass? Again, I call for handwritten ballots!
The contract I mentioned that follows is somewhat complicated, but it’s back-up for what Spoonamore was talking about. Eventually Connell would most likely have talked about all this. Except that on December 19, 2008, Connell’s private single-engine plane crashed on the way back to his home in Akron. The man who could’ve blown the whistle on the biggest election fraud in American history was dead. I guess, as always, we’re supposed to attribute that to bad timing. Let me quote Colonel Fletcher Prouty again: “Nothing just happens, everything is planned.” If you’re interested in all the details, take a look at my previous book, American Conspiracies.
40
EMBASSY CABLES
Hillary Clinton’s Call for Diplomats to Spy on the UN
Who knew? Under Hillary Clinton, our State Department has been asking American diplomats around the world and at the UN to provide detailed technical information, including passwords and personal encryption keys, for communications networks used by UN officials. And we’re trying to take down WikiLeaks and throw Julian Assange in the clinker for life? The hypocrisy, once again, boggles the mind.
41
PROTECTING CYBERSPACE
An Internet “Kill Switch”?
A bill—“Protecting Cyberspace as a National Asset Act of 2010”—was introduced in the Senate last June by Joe Lieberman. Note particularly the part under section 4: “Authorizes the President to issue a declaration of a national cyber emergency to covered critical infrastructure.” Would this give Obama, or any future president, the right to basically pull a “kill switch” on the Internet? Could, say, a huge leak of classified documents serve as a justification?
Because the bill is so long and convoluted, I only include part of it. Here also is a summary of the bill, written by the Congressional Research Service, a well-respected nonpartisan arm of the Library of Congress.
42
MORE CYBERSECURITY
Homeland Security’s Cybersecurity Agreement with the Pentagon
Then last October, Homeland Security (DHS) and the Defense Department reached an agreement “regarding cybersecurity” whereby they’re planning to synchronize their efforts. “We are building a new framework between our Departments to enhance operational coordination and joint program planning,” DHS Secretary Janet Napolitano and DoD Secretary Robert Gates said in a joint statement. And in December, the United Nations was asked to consider global standards for policing the Internet, specifically in reaction to things like WikiLeaks. Now the Commerce Department is looking to create an Internet ID, under the label of National Strategy for Trusted Identities in Cyberspace
Maybe this is all somehow to the good, but it makes me a bit queasy. Honestly I see Homeland Security as our United States Gestapo, our federal police. It’s this simple, people: Government can’t allow anything to exist that it does not control. One time as governor I asked my staff to think about something on their lunch break: “Come back and tell me one thing in your life that the government doesn’t regulate or control.” Well, they couldn’t come up with anything. One person said, “Sleep.” You know how I responded? Not true—there’s a warning label on your mattress. Even what you lay down on has some stamp of government control.