Thursday, April 05, 2007

What to do about computergate?

Consider these brief words an addendum to the post below. Even though I'm far from the most technically savvy blogger on the web, I've tried to focus public attention on the GWB43/SmarTech conundrum, because the whole matter stinks of illegality.

A kind reader has suggested that I send my posts to Henry Waxman's office. Frankly, I think those people already have towers of reading to do each day. But they do take phone calls...

So let me pose a hypothetical question: Suppose I call that office. (I'm not saying I will; just suppose.) What questions should I ask, and which pieces of information should I convey?

4 comments:

Anonymous said...

Joseph,

go to http://oversight.house.gov if anyone has additional information on the emailgate story and click on "email correspondence" listed at the bottom of the webpage under "contact the committee".

I have just copied and pasted the entire post below "computergate-lets-play-dodgeball" with comments to this website for further congressional review.

So I have contacted Waxman's office for you!

Anonymous said...

No offense, but I would Follow-up on anons suggestion and post it to them myself, if I were you Joe.

Again, wild speculation, but I can't get it out of my bones, that somehow, in someway, Israeli's Company Amdocs/Cramer.uk is somehow tied to all this.

ViViDVeW said...

Henry Waxman's office should be aware that:

The “telephone book” server that Jeff Averbeck is referring to is ns1.cha.smartechcorp.net (64.203.96.130).

The email servers for the gwb43.com domain are
mailscan1.smartechcorp.net(64.203.97.101) – email gateway
mailscan2.smartechcorp.net(64.203.98.245) – email gateway
mail.smartechcorp.net(64.203.96.49) – location of email data itself

Mr. Averbeck statement that he hosts the “telephone book” server for the RNC but does not have access to email is highly questionable and is prima-facie false. All of the computers listed above have IP addresses and DNS domain names that belong to SMARTech. The IP addresses are all from the same IANA assignment block.

In addition there is good evidence to suggest that all the servers in question are located in the AirNet’s data center in Chattanooga. The internet “hop by hop path” for all servers goes to the same place.

In a phone conversation I suppose that’s about the gist of it without talking technical or getting into less than solid suppositions.

Anonymous said...

From a traceroute:

6 * 65.126.224.9 (65.126.224.9) 4.126 ms *
7 * bos-core-01.inet.qwest.net (205.171.28.13) 3.657 ms *
8 ewr-core-02.inet.qwest.net (205.171.8.26) 9.017 ms 9.620 ms 17.304 ms
9 atl-core-02.inet.qwest.net (67.14.14.14) 87.196 ms * 29.233 ms
10 * atl-edge-08.inet.qwest.net (205.171.21.78) 29.346 ms 29.573 ms
11 63.144.0.234 (63.144.0.234) 33.461 ms 33.657 ms 33.613 ms
12 cha-core-02-edge.smartechcorp.net (64.203.96.97) 34.477 ms 33.525 ms 34.395 ms
13 smtp.smartechcorp.net (64.203.96.49) 34.670 ms 34.465 ms 34.446 ms

Also 63.144.0.234 is a quest router.

I find it interesting that they are off of quest. As quest was the one provider that did not hand over records to the feds. Makes sense if they didn't want to be found out.