Sunday, March 25, 2007

The great GWB43 update

To read a revised and expanded version of my piece on the "secret" White House communication system designed to do an end run around history, go here. The newest news: An email written from the White House to Jack Abramoff confirms that administration personnel deliberately used private email servers to avoid legal problems:
...she said is better not to put this stuff in writing in their email system because it might actually limit what they can do to help us, especially since there could be lawsuits, etc.
Did the Abramoff investigators know about this alternative communication system? I think not. If that fact were known, and if those secret emails to Casino Jack came to light, might someone in the WH be looking at jail time? Perhaps.

This should be a huge story, folks...

10 comments:

Anonymous said...

joe, so glad to see you're spreading these facts around.

what really is beginning to concern the dickens out of me is the fact that this exposes crimes, the outside emails violate the law, and the abramoff email you cited shows the intention to circumvent the law.

all that being said (as if no other crimes had been committed by these hoodlums), is this not enough evidence to file a criminal complaint? and shouldn't this be done, like, now, quickly, before they destroy all their archives?

as am aside, durbin today on MTP noted the concern about the US attys who were NOT fired; in other words, the 'good bushies.' also glad to see that factoid being picked up.

the momentum cannot be relaxed; thanks again for keeping on this.

Anonymous said...

Joseph,

This is perhaps one of the greatest stories you have uncovered--I have sent your post on friday to several email lists.

I this gets picked up besides just a few blogs and that others start working on getting more information. I pray that Fitzpatrick and whatever is left of our legal system can subpoena RNC and smartechcorp to get ahold of all the emails since the beginning of 2004 and that they don't simply "disappear" all those emails that have been generated over the past few years. My guess is that they'll probably nuke those email servers from 2004/2005/2006.

It is interesting to do some Whois lookups on both gwb43.com and rnchq.org that owns/administers gwb43.com .

Looks like email for RNCHQ.ORG (that stands for Repub Nat Comm HQ and the website is: http://www.rnchq.org/) is handled through the gwb43.com mail servers because the rnchq.org domain doesn't have any MX (that's mail record info) DNS information listed so one can't use an email address that ends in @rnchq.org because that domain isn't setup to handle email, but if you do a lookup on the DNS of gwb43.com, sure enough it lists two MX records and the mail servers listed are both with smarttech:
mailscan2.smartechcorp.net and mailscan1.smartechcorp.net.

I have copied and pasted the current WHOIS info for both gwb43.com and rnchq.org domains and also the DNS record info both--scroll down, I've lost the formatting but it is there in case these folks decide to make their information private for whois lookups.

http://www.networksolutions.com/whois/results.jsp?domain=gwb43.com

Registrant:

Republican National Committee
310 First Street SE
Washington, DC 20003
US

Domain Name: GWB43.COM

Administrative Contact , Technical Contact :
Republican National Committee
dns@RNCHQ.ORG
310 First Street SE
Washington, DC 20003
US

Here is the complete DNS info listed for gwb43.com:

Domain Type Class TTL Answer gwb43.com. SOA IN 2560 Primary DNS server: ns1.cha.smartechcorp.net.
Responsible Name: hostmaster@gwb43.com.
Serial: 1174654577
Refresh: 16384 (4h 33m 4s)
Retry: 2048 (34m 8s)
Expire: 1048576 (1w 5d 3h 16m 16s)
Minimum/NegTTL: 2560 (42m 40s)
gwb43.com. NS IN 259200 ns1.cha.smartechcorp.net. gwb43.com. NS IN 259200 a.ns.trespassers-w.net. gwb43.com. MX IN 86400 mailscan2.smartechcorp.net. [Preference = 10] gwb43.com. MX IN 86400 mailscan1.smartechcorp.net. [Preference = 10]

The registrant info for rnchq.org is:
http://www.networksolutions.com/whois/results.jsp?domain=RNCHQ.ORG

Registrant:
Republican National Committee
310 First Street SE
Washington, DC 20003
US

Domain Name: RNCHQ.ORG

Administrative Contact :
dns@RNCHQ.ORG
310 First Street SE
Washington, DC 20003
US
Phone: 202-863-8670
Fax: 123 123 1234

Technical Contact :
knolan@RNCHQ.ORG
310 1ST ST SE
WASHINGTON, DC 20003-1885
US
Phone: 202-863-8651
Fax: 202-863-8851

Record expires on 03-Jul-2014
Record created on 17-Sep-2002
Database last updated on 02-May-2005

Domain servers in listed order: Manage DNS
NS1.CHA.SMARTECHCORP.NET A.NS.TRESPASSERS-W.NET

IP Address: 64.203.98.129 (ARIN & RIPE IP search)
IP Location: US(UNITED STATES)-TENNESSEE-CHATTANOOGA
Record Type: Domain Name
Server Type: IIS 6
Web Site Status: Active
DMOZ no listings
Y! Directory: see listings
Web Site Title: GOP.com | Republican National Committee :: Home
Secure: No
E-commerce: No
Traffic Ranking: Not available
Data as of: 19-Oct-2006

there is no DNS info listed other than the nameservers listed here:

Domain Type Class TTL Answer RNCHQ.ORG. NS IN 172800 NS1.CHA.SMARTECHCORP.NET. RNCHQ.ORG. NS IN 172800 A.NS.TRESPASSERS-W.NET.

Looks like Smartechcorp.net has its own internal mailservers separate from gwb43.com, and note the IP address ranges it lists in its DNS info:

Domain Type Class TTL Answer smartechcorp.net. SOA IN 2560 Primary DNS server: ns1.cha.smartechcorp.net.
Responsible Name: hostmaster@smartechcorp.net.
Serial: 1174654577
Refresh: 16384 (4h 33m 4s)
Retry: 2048 (34m 8s)
Expire: 1048576 (1w 5d 3h 16m 16s)
Minimum/NegTTL: 2560 (42m 40s)
smartechcorp.net. NS IN 259200 ns1.cha.smartechcorp.net. smartechcorp.net. NS IN 259200 a.ns.trespassers-w.net. smartechcorp.net. MX IN 86400 mx1.smartechcorp.net. [Preference = 10] smartechcorp.net. MX IN 86400 mx2.smartechcorp.net. [Preference = 10] smartechcorp.net. TXT IN 3600 "v=spf1 ip4:64.203.97.98 ip4:64.203.98.242 mx a:mail1.smartechcorp.net a:mail2.smartechcorp.net ~all" smartechcorp.net. A IN 86400 64.203.96.249

It is still a shame you have condemned, resorted to name calling and written off your loyal readers who have the boldness to question how the WTC towers could collapse from jet fuel fires. But before you delete this last sentence, check out this incredibly interesting 9 minute youtube video about how the 9/11 cover story was sold to the public on the morning of 9/11:

http://www.youtube.com/watch?v=3U_GISl3aAA

joseph, no worries, this doesn't mention the dreaded "CD", but it does examine how certain stories via mainstream media Fox News and other outlets on TV that morning.

very interesting perspective. only 9 minutes. OK? peace?

Anonymous said...

WoW. This server is the keystone of the whole criminal operation.
Don't forget that Blackwell had "override" access to the tabulators from the computers in his office. I'll bet he and Rove were on the phone during that critical hiatus when the vote changed.
Joe--great story and thank you!

Anonymous said...

Some other gwb43 names deserve checking too.

According to whois.net, the Bushites registered gwb43.net and gwb43.org as well as gwb43.com.

The following info is from
Demon net tools:

======================
GWB43.NET
======================
NAMESERVERS
a.ns.trespassers-w.net.
ns1.cha.smartechcorp.net.

SOA RECORDS
ns1.cha.smartechcorp.net. hostmaster.gwb43.net (
1174654577

EMAIL
10 virusscan1.rnchq.org.
20 virusscan2.rnchq.org.
======================

======================
GWB43.ORG
======================
NAMESERVERS
a.ns.trespassers-w.net.
ns1.cha.smartechcorp.net.

SOA RECORDS
ns1.cha.smartechcorp.net. hostmaster.gwb43.org (
1174654580

EMAIL
20 virusscan2.rnchq.org.
10 virusscan1.rnchq.org.

========================

Whereas mail to the .com goes to smartechcorp.net, mail to the .org and .net goes directly to rnchq.org.

There is also the case of GWB43.US. Admin, billing, and technical contacts are listed as BlueHost.Com, of Orem, Utah. According to one source, it redirects to whitehouse.gov, but I could not verify this.

Since 2001, .us has been administered by Neustar, a government contractor involved with White House information systems, speculated to be an NSA front company.

Neustar got the contract to run the address database that is vital to the flow of content in the worldwide GSM phone network. See this Washington Post article.

Of course, the fact that they run .us may mean zilch with regard to what goes down with gwb43.us!! After all, there are hundreds of thousands of .us domains, and Neustar also run .biz

Someone asked in 2006 whether the company had anything to do with the voting machines. (See above DU link, comment 46). I don't know the answer.

Neustar VP H. Michael Warren, former FBI wiretapper (head of their CALEA implementation section), doubtless does, though.

b

Anonymous said...

Gonzo must go. Imagine being disabled, cooperating with the idea of working as a disabled American, and doing so for eleven years. At no time was the court ordered disabled status rescinded or revoked. I told all my employers about my condition, and finally did leave one " hanging" when I got sick again at that eleven year mark.
That's when I found out I was misdiagnosed as a matter of record, for thirty years no less.

And when I needed help after eleven years of working as a disabled American citizen, I did not get any help at the Social Security offices, only disability discrimination. I applied in 2002 and my case is not closed yet.
Of course the OIG said there was no discrimination. Just another part of the UNjustice being served in the department of UNjustice.

Gonzo has affected every single program people. Why else would the USA not honor it's own court orders??????

Anonymous said...

Anon 9.36, I wonder how long rnchq.org has been without its own mailservers? Mailservers at rnchq.org are listed in the details for both gwb43.net and gwb43.org.

I did tracerts on virusscan1.rnchq.org (216.142.110.70) and virusscan2.rnchq.org (216.142.110.81). Both eventually timed out, but not before bringing up a company called Broadwing Communications, with its HQ in Austin, Texas.

b

Anonymous said...

sofla said...

Very good. The WH taping system redux, in a way! Now who is the Butterfield, and who is the Fred Thompson in this case?

Anonymous said...

To B:

THANKS for doing the search on the gwb43.net and gwb43.org domains.

very strange regarding rnchq.org!

THE DNS INFORMATION FOR RNCHQ.ORG DOES NOT LIST THE RNCHQ.ORG MAILSERVERS FOR GWB43.NET OR GWB43.ORG THAT YOU FOUND:

10 virusscan1.rnchq.org.
20 virusscan2.rnchq.org

SOMEONE HAS TAKEN DOWN THOSE MAILSERVERS!

Going back to the RNCHQ.ORG mystery of why no MX records are listed, I used a DNS lookup utility last night. When I did a DNS search for ALL records (which includes the MX records), all I could find listed for rnchq.org was the two nameservers already listed on the network solutions "whois" lookup. No mail server info was listed. Looks like someone has changed the DNS information for the MX mail server records (deleted it) but this information hasn't fully propagated because this morning....

However, this morning if I do a separate search for MX records (that is mail server info) for rnchq.org, then I do pull up the same MX records as listed for gwb43.com . So I am including the MX complete search for the rnchq.org using the DNS search tools:

Searching for rnchq.org MX record at h.root-servers.net [128.63.2.53]: Got referral to tld5.ultradns.info. (zone: org.) [took 41 ms]
Searching for rnchq.org MX record at tld5.ultradns.info. [192.100.59.11]: Got referral to NS1.CHA.SMARTECHCORP.NET. (zone: RNCHQ.ORG.) [took 40 ms]
Searching for rnchq.org MX record at NS1.CHA.SMARTECHCORP.NET. [64.203.96.130]: Reports mailscan2.smartechcorp.net. [took 33 ms]

Response:

Domain Type Class TTL Answer rnchq.org. MX IN 86400 mailscan2.smartechcorp.net. [Preference = 10] rnchq.org. MX IN 86400 mailscan1.smartechcorp.net. [Preference = 10] rnchq.org. NS IN 259200 ns1.cha.smartechcorp.net. rnchq.org. NS IN 259200 a.ns.trespassers-w.net.

furthermore, when I pulled up the www.rnchq.org website, they reference www.gop.com so listed below is the complete set of DNS records for the domain gop.com found by the DNS search tools.

NOTE THAT GOP.COM USES THE SAME MAILSERVERS AS GWB43.COM !!!

HERE ARE THE COMPLETE DNS RECORDS FOR THE DOMAIN GOP.COM :

How I am searching:
Searching for gop.com ALL record at e.root-servers.net [192.203.230.10]: Got referral to I.GTLD-SERVERS.NET. (zone: com.) [took 47 ms]
Searching for gop.com ALL record at I.GTLD-SERVERS.NET. [192.43.172.30]: Got referral to ns1.cha.smartechcorp.net. (zone: gop.com.) [took 144 ms]
Searching for gop.com ALL record at ns1.cha.smartechcorp.net. [64.203.96.130]: Reports ns1.cha.smartechcorp.net. [took 33 ms]

Response:


Domain Type Class TTL Answer gop.com. SOA IN 2560 Primary DNS server: ns1.cha.smartechcorp.net.
Responsible Name: hostmaster@gop.com.
Serial: 1174654577
Refresh: 16384 (4h 33m 4s)
Retry: 2048 (34m 8s)
Expire: 1048576 (1w 5d 3h 16m 16s)
Minimum/NegTTL: 2560 (42m 40s)
gop.com. NS IN 259200 ns1.cha.smartechcorp.net. gop.com. NS IN 259200 a.ns.trespassers-w.net. gop.com. MX IN 86400 mailscan1.smartechcorp.net. [Preference = 10] gop.com. MX IN 86400 mailscan2.smartechcorp.net. [Preference = 10] gop.com. TXT IN 3600 "v=spf1 ip4:64.203.98.31 ip4:64.203.98.32 ip4:64.203.98.33 ip4:64.203.98.54 ip4:64.203.98.55 ip4:64.203.98.56 a:mailer3.gop.com " "a:mailer2.gop.com a:mailer1.gop.com a:sm1.republicanvictoryteam.org a:sm2.republicanvictoryteam.org a:sm3.republicanvictoryteam" ".org ~all" gop.com. A IN 300 64.203.98.129

the problem here is most likely mail records are being deleted by removing the mail servers completely from the DNS information so unless a subpeona is issued to cease and desist destruction of email records, this is all water under the bridge.

Great research 'b' !

Anonymous said...

GREAT NEWS, FOLKS!!

waxman has ordered the RNC to keep all emails and email records, following the filing with his offices by CREW of this questionable matter.

i had wondered in a comment somewhere if it were possible for just anyone to file a criminal complaint, given we had the law broken and the evidence to prove it, for the express purpose of preserving those emails.

is there not a way to recover any or most that are destroyed? and how do we know they'll comply?

of course, any destructions are as much as an admission of guilt.

and to remind everyone why this issue, and not iraq or gitmo or abramoff or any others, will be the one the dems can get fired up about:
there are no lobbyists or over monies at stake. plus, it's a matter of governance that even the republicans can relate to. at least the ones who retain some semblance of conscience.

Anonymous said...

go to http://oversight.house.gov if anyone has additional information on this breaking story. I have just copied and pasted the entire post with comments to this website for further congressional review.

FYI