JordonCooper Rotating Header Image

More than a coincidence

Still no sign of the real Pierre Poutine

This story by Stephen Maher and Glen McGregor is unbelievable.  While Elections Canada says the evidence is inconclusive, the investigation has narrowed down the people involved as for some reason they drove across Guelph and used a random unlocked wifi spot address to access the Conservative database.  The wifi connection was the same that was used to access RackNine’ servers. 

Other records obtained by Elections Canada show that five members of the Burke campaign team used that same IP address in the final weeks of the campaign to access CIMS, the Conservative Party’s central database of voter information.

Campaign manager Ken Morgan, deputy campaign manager Andrew Prescott and volunteers John White, Trent Blanchette and Christopher Crawford all logged onto CIMS from the Rogers IP, according to the document. Through the Conservative Party’s lawyer, Arthur Hamilton, Crawford told investigators that he had always accessed CIMS from the Burke campaign office.

It seems unlikely anyone in the Burke campaign headquarters, which was located northeast of Guelph’s downtown, could have connected to a Wi-Fi signal on the opposite side of the city.

But in court documents, Mathews offers no possible explanation for how or why five campaign workers all signed on from the same IP address used by Poutine — and over a Wi-Fi signal nowhere close to their office.

Indeed, Mathews suggests that the subscriber information behind IP address looks to be a dead lead, calling it “so far inconclusive.”

Instead, his latest request for court orders focuses on the relationship between the IP address and log-ins to RackNine, the Edmonton-based call company used to transmit the robocalls.

RackNine’s owner, Matt Meier, has found the robocalls were sent using his servers by a customer known to the firm as “Client 93”, who logged on with the Rogers IP. Elections Canada has already tied this account to a disposable Virgin Mobile cellphone registered by the suspect using the bogus name Pierre Poutine.

Prescott, a RackNine subscriber known as “Client 45”, used the company to send out legitimate robocalls about campaign events. Records produced by the company show that Prescott and Poutine accessed the company’s servers from the same IP address, sometimes within a few minutes.

Can anyone give me a reason why the campaign manager and deputy campaign manager, and three volunteers  would be accessing a restricted Conservative Party database from a random open wifi port across town from the campaign office and then you add on the little fact that it was the same IP address used to access the Racknine account.

Comments are closed.