Ostatnio: nigdy

Darmowe galerie dla serwisów aukcyjnych

Oszustwa wyborcze w USA

"Nieważne kto głosuje, ważne kto liczy głosy !"

USA - Michael Connell's Convenient Plane Crash (I) - YouTube

Mystery death of Bush adviser

The 'Connell Anomaly' Pt.1

The Cybergate Deaths: Before Michael Connell, there was Raymond Lemme

Programmer Testifies About Rigging Elections With Vote Counting Machines

Clinton Eugene Curtis testified under oath, before the Ohio State legislature, that he wrote a program to rig elections. This program would flip the total vote from the real winner to the candidate who had been pre-selected to win by the electronic vote counting machines. For more information, visit;

Vote Fraud: How it is done https://www.youtube.com/redirect?q=http%3A%2F%2Ftargetfreedom.com%2Fcfr%2Fvote-fraud-how-it-is-done%2F&session_token=1EmYoozaNIi2-0YGY-GRFhVrqN18MTM2ODI3NDYzMkAxMzY4MTg4MjMy


1 Programmer Testifies About Rigging Elections With Vote Counting Machines

2 Video of RNC Teleprompter Showing Results of Scripted Voting Before Voting Finished

3 Actual Video of Ballots Being Stolen at Republican Convention in Oregon

4 Dudley Brown on 2012 RNC Change to Rules

5 RNC Sham 2012 Corruption Beyond Belief

6 Outrages While Polling the State Delegates at the RNC Convention 8-28-12

7 Ron Paul Delegate Assaulted by Shreveport Police at LAGOP State Convention - Broken Hip

8 LA GOP Ousted Rules Committee Chairman calls Security to Remove Opponents

9 Assaulted Ron Paul Chair Responds After Release From Hospital

Uncounted - The Tragic Story of Athan Gibbs Uploaded on Jul 7, 2008 http://www.UncountedTheMovie.com

Nashville businessman Athan Gibbs had a dream: Count every vote. Athan Gibbs had a standard: You should be able to verify your vote like you can verify how much money you have in the bank. Athan Gibbs had a question: Why, if you're an ATM manufacturer, would you make a machine that doesn't provide a paper trail and can't be audited? Athan Gibbs had an idea: Make a voting machine where the voter has an opportunity to verify that their vote has been received , recorded and counted. This is the story of Athan Gibbs' quintessential dream - and its tragic conclusion.

Clip from UNCOUNTED: The New Math of American Elections, a documentary by Emmy award-winning director David Earnhardt. UNCOUNTED shows how the election fraud that changed the outcome of the 2004 election led to even greater fraud in 2006 - and now looms as an unbridled threat to the 2008 election.

Megyn Kelly Informs Karl Rove Obama Won Reelection

Fox News In State of Shock When Obama Wins the Election

Jeśli poparcie dla Obamy będzie zbyt duże to zrobi się powtórkę z wyborów 2000 i 2004, kiedy to decydowały odpowiednio zaprogramowane i kontrolowane przez Republikanów maszyny do głosowania.


"As we document in the e-book WILL THE GOP STEAL AMERICA'S 2012 ELECTION (www.freepress.org) George W. Bush got a second term in 2004 thanks to the manipulation of the electronic vote count by Ohio's then-Secretary of State J. Kenneth Blackwell. Blackwell served as the co-chair of the state's committee to re-elect Bush/Cheney while simultaneously administering the election."

Obóz Obamy też ma udziały poprzez Sorosa w firmach posiadających maszyny do głosowania, ale nie ma przewagi.


Hacking Democracy - Official Website and DVD Video Page Audio Page

The documentary by Simon Ardizzone, Russell Michaels and Robert Carrillo Cohen first broadcast on HBO throughout November & December 2006, exposes the dangers of voting machines used during America's mid term and presidential elections. Electronic voting machines count approximately 90% of America's votes in county, state and federal elections. The technology is also increasingly being used across the world, including in Canada, the United Kingdom, Europe and Latin America. Filmed over three years this expos' follows the investigations of a team of citizen activists and hackers as they take on the electronic voting industry, targeting the Diebold corporation. "Hacking Democracy" uncovers incendiary evidence from the trash cans of Texas to the ballot boxes of Ohio, exposing secrecy, votes in the trash, hackable software and election officials rigging the presidential recount. Ultimately proving our votes can be stolen without a trace "Hacking Democracy" culminates in the famous 'Hursti Hack'; a duel between the Diebold voting machines and a computer hacker from Finland - with America's democracy at stake.

Diebold Attacks "Hacking Democracy"

Two days before HBO's premier broadcast of "Hacking Democracy", Diebold issued an outraged letter to the channel's Chairman, demanding that HBO "pull the documentary" from the schedule. While Diebold had not even seen "Hacking Democracy" their error filled letter also contained this extraordinary statement about the film: "Harri Hursti is shown attacking a Diebold machine in Florida. But his attack proved later to be a complete sham."

Download the complete letter from Diebold President, David Byrd. The quote is on page 2

The 'Hursti Hack' forms the climax of the film and proved for the first time that votes stored on Diebold's memory cards can be changed undetectably. In fact our ground breaking hack was scientifically proven to be completely true. California's Secretary of State commissioned a special report by scientists at UC Berkeley to investigate the Hursti Hack.

Page 2 of their report states: "Harri Hursti's attack does work. Mr. Hursti's attack on the AV-OS is definitely real. He was indeed able to change the election results by doing nothing more than modifying the contents of a memory card. He needed no passwords, no cryptographic keys, and no access to any other part of the voting system, including the GEMS election management server."

Download the report from the University of California, Berkeley

Watch the 'Hursti Hack' on the DVD and decide for yourself who is telling the truth and who is a sham.

The two Ohio election staff who feature in "Hacking Democracy" were sentenced on March 13th 2007 for rigging the 2004 presidential recount. Incriminating footage from the documentary was used in their court case as evidence.

Criminal Investigation into Board of Elections (Fox 8 News)

A special prosecutor launched an investigation into the Cuyahoga Board of Elections finding that staff had rigged the 2004 presidential election recount, so that it would not match the original election night count, conducted on the vote counting computers. Watch the video on YouTube..

Watch the free new 20 minute elections film "Protecting Democracy" (by Hacking Democracy creators Simon Ardizzone & Russell Michaels) which reveals the secret "MANUAL ENTRY SCREEN" on the Diebold/Premier voting system that allows vote totals to be easily switched. The film also includes:

Sarasota citizens' battle for better audits in the Florida Supreme Court, including an attorney for the state arguing that election problems should be kept secret.

Florida Secretary of State Kurt Browning explaining why Florida has chosen to have "post-certification" audits and why elections should not be "disruptive."

The Volusia County Canvassing Board voting to disobey Florida law.

Election reform candidate Susan Pynchon, who is running for Volusia County Supervisor of Elections, sparring over citizens' rights with her political opponent, incumbent Ann McFall.

The film is in 2 parts: Click here for Part 1 Click here for Part 2

Black Box Voting - America's Elections Watchdog Group

Black Box Voting Book: Chapter 01 Chapter 02 Chapter 03 Chapter 04 Chapter 05 Chapter 06 Chapter 07 Chapter 08 Chapter 09 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 d - Appendix Footnotes Index

Press Kit

1. Latest elections problems (more below)

2. Four crucial steps in elections - (more below)

3. Can the machines be hacked? - (more below))

4. Absentee and mail-in voting: Is it better or worse? (more below)

5. Voting rights and vote suppression - (more below)

6. What protects your personal information in the election system? - (more below)

7. Solutions - (more below)

8. Top Ten Strangest Election Problems - (more below)

~ Story Angle 3 ~ CAN THE MACHINES BE HACKED? Yes.

- On Aug. 8, 2004, Black Box Voting founder Bev Harris taught former presidential candidate Howard Dean how to hack the "mother ship" that tallies all incoming votes from precincts.

- Computer programmer Jeremiah Akin has demonstrated how to hack the Sequoia "WinEds" election management system to flip Spanish language votes to the wrong candidate.

- Computerized election management systems assign a number to each candidate. By editing the file to flip the candidate number, Bev Harris has demonstrated that the Diebold GEMS central tabulator can swap votes between candidates. Harris has also demonstrated this manipulation targeting only the absentee votes.

- According to the Diebold sales literature provided to the state of Georgia, "no human" can alter the audit log. Black Box Voting engaged the services of Baxter the Chimpanzee, a former TV chimp in Europe. Baxter was taught to alter the audit log in less than an hour. Here is a videotape: Chimp Video

- Central tabulators that use Microsoft-based programs can usually be hacked using a trojan horse-like script. This is simply a set of text commands typed into "notepad" or other devices; at the right time, the program can alter the votes undetectably. This was demonstrated using a real voting system in Leon County, Florida by Black Box Voting with Dr. Herbert Thompson.

- The electronic ballot boxes, now stored on removable credit-card-sized disks called memory cards, can be stuffed and hacked as well. This was demonstrated in another Black Box Voting project, by computer expert Harri Hursti – again using real voting systems in Leon County Florida.

- On the Diebold TSx touch-screens, the whole kit and kaboodle can be replaced with malicious substitute software. This was discovered in an autopsy of the system conducted in Emery County, Utah. In a Black Box Voting project, researcher Harri Hursti and an expert from another company, Security Innovation, learned that simply by knowing the name of the file, a programmer can replace the file using any of a variety of mechanisms – memory cards, wrieless devices, or a cable attached to the motherboard.

The foundation of the system itself can be altered, leaving a contaminated system that cannot be cleaned, giving total control to the hacker. This was also learned in Emery County, Utah.

- Various voting machines contain wireless capabilities, potentially enabling remote access. The Diebold TSx machine has a slot to fit an SD wireless card on the motherboard. Photo of wireless SD slot.

- The Diebold TS-R6 contains an iRda port.

- Many of the voting machines can be opened up with a simple Phillips-head screwdriver, and inside, there are ports to hook up to a laptop and rewrite anything you want.

12. Mysterious Death of Mike Connell—Karl Rove’s Election Thief

maxim micheal connell


The Raw Story, September 29, 2008 Title: “Republican IT consultant subpoenaed in case alleging tampering with 2004 election”

Authors: Larisa Alexandrovna and Muriel Kane

The Brad Blog, December 22, 2008 Title: “OH Election Fraud Attorney Reacts to the Death of Mike Connell“

Author: Brad Friedman

Democracy Now! December 22, 2008 Title: “Republican IT Specialist Dies in Plane Crash”

Interviewee: Mark Crispin Miller

Student Researchers: Ashleigh Hvinden, Christine Wilson and Alan Grady

Community Evaluator: Mary Ann Walker Sonoma State University

Karl Rove’s chief IT consultant, Mike Connell—who was facing subpoena in connection with 2004 Presidential election fraud in Ohio—mysteriously died in a private plane crash in 2008. Connell was allegedly the central figure in a longstanding plot to electronically flip votes to Republicans.

In July 2008, Connell was named as a key witness in the case known as King Lincoln Bronzeville Neighborhood Association v. Blackwell, which was filed against Ohio Secretary of State Kenneth J. Blackwell on August 31, 2006 by Columbus attorneys Clifford Arnebeck and Robert Fitrakis. It initially charged Blackwell with racially discriminatory practices—including the selective purging of voters from the election rolls and the unequal allocation of voting machines to various districts—and asked for measures to be taken to prevent similar problems during the November 2006 election.

On October 9, 2006, an amended complaint added charges of various forms of ballot rigging as also having the effect of “depriving the plaintiffs of their voting rights, including the right to have their votes successfully cast without intimidation, dilution, cancellation or reversal by voting machine or ballot tampering.” A motion to dismiss the case as moot was filed following the November 2006 election, but it was instead stayed to allow for settlement discussions.

The case took on fresh momentum in July 2008 when Arnebeck announced that he was filing to “lift the stay in the case and proceed with targeted discovery in order to help protect the integrity of the 2008 election.” The new filing was inspired in part by the coming forward as a whistleblower of GOP IT security expert Stephen Spoonamore, who said he was prepared to testify to the plausibility of electronic vote-rigging having been carried out in 2004. The stay was lifted September 19, 2008 and Connell was served a subpoena on September 22.

Spoonamore, a conservative Republican who works for big banks, international governments, and the Secret Service as an expert in the detection of computer fraud, found evidence that Karl Rove, with the help of Mike Connell and his company GovTech Solutions, electronically stole the Ohio 2004 election for Bush.

Spoonamore testified that the “vote tabulation system [which Connell designed] allowed the introduction of an additional single computer between computer A and computer B.” This is called a “man in the middle” attack. According to Spoonamore, “This centralized collection of all incoming statewide tabulations would make it easy for a single operator, or a preprogrammed ‘force balancing computer’ to change the results in any way desired by the team controlling the Computer C.” Spoonamore further testified that the only purpose for such man in the middle architecture is to commit crime.

Despite Connell’s efforts to quash his subpoena to testify, he was ordered to appear for a two-hour, closed-door deposition on November 3, 2008, just eighteen hours before the 2008 national election. Though Connell had expressed willingness to testify, he was reticent after receiving threats from Rove.

Arnebeck presents evidence that Karl Rove threatened Connell, cautioning that if Connell didn’t “take the fall” for election fraud in Ohio, Connell would face prosecution for supposed lobby law violations. After this threat, Arnebeck sent letters to the Department of Justice, as well as messages to high-ranking members of the department, seeking protection for Connell and his family from attempts to intimidate. Despite Connell’s elite status as a top-rung Republican consultant for years, whose firm New Media Communications provided IT services for the Bush-Cheney 2004 campaign, the US Chamber of Commerce, the Republican National Committee, and many Republican candidates and campaigns, witness protection requests went unheeded.

Election fraud analyst and author Mark Crispin Miller notes that the timing and circumstances of Connell’s death—between deposition and trial—are too suspicious and convenient for Rove and the Bush administration, not to merit a thorough investigation. Arnebeck and Fitrakis intended to both further depose and call Connell to testify as key witness in the federal conspiracy case. Connell was also to be questioned about his key role in the disappearance of thousands of White House-RNC email transactions. These emails are believed likely to have shed light on the White House role in the political firings of US Attorneys, as well as decisions to prosecute former Alabama Democratic Governor Don Siegelman. Attorneys in the case said that Connell’s testimony would likely lead to the subpoenaing and under-oath questioning of Karl Rove.

Connell was an experienced pilot. His plane had been recently serviced. He had been in the nation’s capital on still-unknown business before his single engine plane crashed December 22, 2008 on the way home, just three miles short of the runway in Akron, Ohio. The cause of the crash remains unknown.

Timing of Connell’s deposition may have saved the 2008 presidential elections from electronic theft. However, Bev Harris at Black Box Voting notes that man in the middle systems are still in place in Illinois, Colorado, Kentucky, and likely across the nation.1

Citation: Bev Harris, “Man in the Middle Attacks to Subvert the Vote,” Black Box Voting, November 2008.

Update by Larisa Alexandrovna

The extreme vulnerability of electronic voting systems to systematic fraud has fallen out of public awareness because it did not become a major issue during the 2008 elections, but the problem has never been resolved or even seriously examined by any official body. Questions about alleged vote count irregularities in Ohio during the 2004 election remain the strongest indication of the potential for large-scale tampering with these systems. The lawsuit, which sought testimony from GOP information technology expert Michael Connell as to any personal knowledge he might have had of those irregularities, has represented the most determined effort to get at the truth beyond these allegations.

Michael Connell testified under subpoena in November 2008 but died the following month, when his single-engine plane crashed as he was attempting to land at an Ohio airport near his home. At the time of his death, the only mainstream news outlet to even mention Connell’s death and the controversies surrounding his involvement in electronic voting was a single CBS/AP story.

However, there appears to have been no direct response in the mainstream press to the articles on Connell published by Raw Story. In fact, a deafening silence on his alleged relationship with the Bush White House has prevailed, even after his sudden and tragic death in December of 2008.

The case of King Lincoln Bronzeville Neighborhood Association v. Blackwell is still ongoing.

Additional information on the King Lincoln case can be obtained here:


An organization that has taken a pro-active role in making public both the case of King Lincoln and the various articles on it is Velvet Revolution. See http://velvetrevolution.us/.

Update by Brad Friedman

Little of note has changed since the death of Mike Connell as this book goes to press. The National Transportation Safety Board (NTSB) is still investigating, but is likely not to release a final report until mid to late 2010. They released a preliminary report, however, indicating decreasing visibility at the Akron airport, with visibility still at 2.5 miles at the time of the crash and temperatures just above freezing. According to the NTSB report, and confirmed via transcripts and tapes received via FOIA requests, Connell radioed to ask “whether there were any reports of icing, to which air traffic control [ATC] responded that there were no reports.”

The tapes and transcripts indicate that something suddenly happened up there, as his last words to ATC, recorded on tape, were a declaration of emergency followed quickly by “Oh, fuck,” before he was not heard from again.

Curiously, for a man as well connected to the very top echelons of the Republican Party as Connell was, no GOP officials, or George W. Bush, or John McCain, or Karl Rove, to my knowledge, ever issued a public statement upon his tragic death.

For the time being, the Ohio voting rights case has been stalled since Connell’s death. Cliff Arnebeck continues to investigate how he plans to move forward, and is considering broader subpoenas in hopes of taking depositions from, among others, Karl Rove, as he widens the scope of his conspiracy case.

The Corbett Report – Crashes of Convenience: Michael Connell - The Mysterious Death of Bush's Cyber-Guru - 12160

Ohio TV station wonders was Mike Connell airplane crash an accident or murder

In late 2008, the GOP’s theft of the 2004 presidential election via vote machine rigging in Ohio was on the verge of being exposed. An insider had been identified and deposed, and he was ready to be sworn in as a star witness in a major trial…but on December 19, 2008, the small Piper airplane he was piloting crashed on approach to the Akron-Canton Regional Airport. Join us today on The Corbett Report as we start connecting the pieces of the Michael Connell puzzle.

Time Reference: 00:01 Support The Corbett Report – Buy The DVDs

Time Reference: 01:03 Subscribe to The International Forecaster

Time Reference: 02:15 Footage of Michael Connell crash

Time Reference: 04:03 NTSB factual report of Connell crash

Time Reference: 05:34 19 Action News reports on the Connell crash

Time Reference: 08:50 Republican IT Guru Dies In Plane Crash

Time Reference: 15:36 FREE FOR ALL!: The High-Tech HighJack of Ohio

Time Reference: 24:59 BUSTING the ‘Man-in-the-Middle’ of Ohio Vote Rigging

Time Reference: 36:05 Sisters of GOP IT Guru Mike Connell ‘Very Suspicous’ About His Death

Time Reference: 38:29 Rove Threatened GOP IT Guru If He Does Not ‘Take the Fall’ for Election Fraud in Ohio, Says Attorney

Time Reference: 40:59 Peter B. Collins interviews Attorney Cliff Arnebeck

Time Reference: 49:02 NTSB Probable Cause ruling in Connell crash

Time Reference: 54:16 Democratic Underground discussion of Connell crash

Time Reference: 54:44 The Mysterious Death of Bush’s Cyber Guru

Time Reference: 54:35 “Mike Connell & Karl Rove” by TheSingingNewsNetwork

Mike Connell - Karl Rove

The BRAD BLOG : Mike Connell

The Mysterious Death of Bush’s Cyber-Guru, Michael Connell

For those with limited bandwidth, CLICK HERE to download a smaller, lower file size version of this episode.

For those interested in audio quality, CLICK HERE for the highest-quality version of this episode (WARNING: very large download).

rove bush

The Mysterious Death of Bush's Cyber-Guru - Michael Connell

Michael Connell Anomaly

Are We About to See Another Stolen Presidential Election?



Why Your Vote Won't Matter

REPORT: From Poll Taxes To Voter ID Laws: A Short History of Conservative Voter Suppression | ThinkProgress

Election Fraud and Tyranny: Part 1

How To Take Back A Stolen Election

BBC News | NEWSNIGHT | Greg Palast on the Florida Elections - 16/2/01

How American Elections Became a Criminal Enterprise

Florida GOP Takes Voter Suppression to a Brazen New Extreme

How Jeb Bush Stole the 2000 Election for His Brother

BuzzFlash Interviews Greg Palast, Author of "Best Democracy Money Can Buy," Exposes the Continued Suppression of Florida's Black Vote in Election 2002

Lies of Bush - 2000 Election Fraud


Computer Programmer Reveals Scheme to Steal 2000 Vote By Christopher Bollyn

TITUSVILLE, Florida—While the mainstream media has focused on a sensational murder trial in California and the political crisis that followed the flawed elections in Ukraine, it has ignored a huge domestic story about the computer programmer who has come forward and explained how he had written computer code to steal elections in Florida.

An affidavit signed by the programmer, Clinton Curtis, in Prince George’s County, Md., on Dec. 6, 2004, names the individuals involved in a computer vote fraud scheme that he worked with in “the early fall of 2000” as “lead programmer” for a company called Yang Enterprises, Inc. (YEI), based in Oviedo, Fla.

The 4-page Curtis document contains 15 points that he swears are both true and correct.

“I declare under penalty of perjury,” Curtis signed on the affidavit, “that the above is true and correct.”

By the fall of 2000 Curtis had worked as a programmer for two years with YEI, a listed “small, minority, woman-owned business” that does extensive business with NASA and Florida. The CEO of YEI is a Chinese immigrant named Mrs. Li Woan Yang.

On its web site, YEI says it has 250 employees working at its Oviedo headquarters, the Kennedy Space Center, Cape Canaveral Air Force Station, Patrick Air Force Base and Tallahassee, Fla.

According to published company documents, the contact person for YEI is Mike Cohen, Yang’s “executive secretary.” Cohen, named by Curtis as being one of the three key persons at YEI involved in creating the program in 2000, has not answered telephone calls.

Beside Cohen, two other employees of YEI met with Curtis “in late September or October of 2000” to determine if he could write a program to steal votes on computer voting systems. They were Mrs. Yang and Tom Feeney, “corporate counsel and lobbyist” for Yang Enterprises. At the time, Feeney, a Republican, was also a member of the Florida legislature.

A month later, Feeney became speaker of Florida’s House. Feeney was instrumental in the controversial 2002 reapportionment and redistricting in Florida that became known as “the speaker’s fix.” Feeney had been Jeb Bush’s running mate in Bush’s 1994 attempt to win the Florida governor’s mansion.

As a result of population growth, in 2002, Florida obtained two more seats in the U.S. House of Representatives, and one of them, the 24th district, went to Tom Feeney of Oviedo.

Curtis served as “technology adviser” to Feeney at YEI. After consulting Curtis, “Feeney would advise YEI on how best to procure the contracts for these projects.”

Regarding a fall meeting in 2000 when Feeney asked about developing a program to steal votes, Curtis wrote:

Mr. Feeney said that he wanted to know if YEI could develop a prototype of a voting program that could alter the vote tabulation in an election and be undetectable. He was very specific in the design and specification required for this program.

He detailed in his own words, that: “(a) the program needed to be touch-screen capable, (b) the user should be able to trigger the program without any additional equipment, (c) the programming to accomplish this remain hidden even if the source code was inspected.”

After further discussion, Mrs. Yang told Mr. Feeney that we would attempt to build a prototype for this program so he [Feeney] could see it, test it, and show it to others.

Curtis said he believed that Feeney was interested in creating this program “to be able to detect and prevent” vote fraud—not to commit it.

As directed by his employer and Feeney, Curtis created the vote fraud software prototype. He delivered the program “to Mr. Hai Lin Nee, the quality control person at YEI,” according to his affidavit.

Curtis explained to Feeney and Yang how they could detect fraudulent source code so it could be prevented. Mrs. Yang responded, “You don’t understand, in order to get the contract we have to hide the manipulation in the source code. This program is needed to control the vote in south Florida.”

“I was shocked that they were actually trying to steal the election and told her that neither I nor anyone else could produce any such program,” Curtis wrote. “She stated that she would hand in what I had produced to Feeney and left the room with the software.”

Curtis said he attended subsequent meetings between Feeney and Yang prior to the 2000 election.

“It became clear to me,” Curtis wrote, “that Mr. Feeney was well aware that by artificially reducing the margin of victory of the opposition party in areas where they were the strongest, the overall outcome would then favor his candidate.”

According to Curtis, Feeney “bragged” that he had implemented “exclusion lists” to reduce the “black vote.” Feeney also said, “proper placement of police patrols could further reduce the black vote by as much as 25 percent,” he wrote. “Shortly thereafter, I resigned from YEI, and took another job at the Florida Department of Transportation (FDOT).”

From computerized vote fraud, the Curtis affidavit goes on to describe “illegal activities of YEI” with the FDOT, “involving over-billing and defrauding of the state of Florida.” Curtis reported the information to the FDOT inspector general’s (IG) office and was eventually fired.

The IG, Raymond Lemme, pursued the allegations made by Curtis regarding YEI. Lemme and Curtis continued to meet after Curtis had been fired from the FDOT.

“In June of 2003, he [Lemme] told me that he had tracked the corruption ‘all the way to the top,’ ” Curtis wrote. On July 1, 2003, Lemme was found dead in a Valdosta, Ga., hotel room the victim of an apparent suicide. His arm had been slashed.

The Curtis affidavit also says that YEI has engaged in espionage through its work at the various NASA and Air Force facilities it contracts with. “I saw Mrs. Yang send a great deal of internal information to her brother in China,” Curtis wrote, “who, she had informed me, had been deported for spying. . . .

“Hai Lin Nee was subsequently arrested by federal officials in Orlando, Fla., on or about March 17, 2004,” according to the affidavit, “on charges that included sending radar guidance system chips for Hellfire antitank missiles to a company in communist China.”


As a response to the Curtis affidavit, YEI posted the following statement on its web site: “Recently there have been several accusations against this corporation by Clinton Eugene Curtis. All of the allegations are 100 percent FALSE!! An official statement will be forthcoming. Thank you for your concern, and God bless America.”

On Dec. 14, Michael A. O’Quinn, a lawyer representing YEI, issued a statement that the allegations found in the Curtis affidavit are “categorically untrue.” The statement also says, “Mr. Nee has never been an employee of YEI.”

Calls to O’Quinn went unanswered.

Feeney serves on the House Science Committee, which oversees the activities of NASA. Six days after Curtis signed his affidavit, NASA Administrator Sean O’Keefe handed in his resignation. O’Keefe said he is quitting NASA for a better paying job at Louisiana State University.

Numerous calls to NASA regarding the O’Keefe resignation and the allegations found in the Curtis affidavit have so far gone unanswered.

Diebold Memos Disclose Florida 2000 E-Voting Fraud

Filozofia dominacji

Upadek USA, nowy wielobiegunowy świat

Amerykański Sen (American Dream)

Oszustwa wyborcze w USA

Izrael kieruje "cadillakiem z zasiłków" Ameryki

Izrael przyłapany na przygotowywaniu wojny światowej

Były dowódca CIA: Izrael i Saudowie zagrażają USA

Globalna oligarchia faszystowskich monopolistów

Wszystkie wojny są wojnami bankierów

Frederic Howe "Wyznania Monopolisty"

Czterej jeźdźcy Apokalipsy

Przeklęty pieniądz. Frédéric Bastiat

Economic Hitmen

Doktryna szoku


Kartel FED

Corporate Europe Observatory | Exposing the power of corporate lobbying in the EU


Światowa gra o energię

Ekonomia NATO jako rozwiązanie kryzysu USA

Obama, wojna finansowa i eliminacja DSK

Noam Chomsky o globalizacji


Korzystanie z serwisu oznacza akceptację Regulaminu. Prywatność. Copyright – 1999-2018 INTERIA.PL, wszystkie prawa zastrzeżone.