Rumor has it that the cyber hacker group (hacktivist group), Anonymous, foiled Karl Rove’s efforts to steal the election from three key swing states: Florida, Ohio and Virginia.
You might recall that two weeks prior to the November 6th election, Anonymous posted a video warning Karl Rove not to rig the election, in which they told Rove that he was being watched and that if he attempted to rig the election, he would be stopped. That video went viral in just days.
The story begins with Velvet Revolution who offered a million dollar reward last month for information leading to the arrest and conviction of anyone who rigged a federal election on November 6th.
“Velvet Revolution US Inc. (Velvet Revolution) is a non partisan 501(c)4 organization founded for the purpose of providing a means for citizens and organizations to mobilize and create a clean, transparent and accountable government. Velvet Revolution focuses on election protection, media reform, and corporate and government accountability. It uses various means to shine sunlight on these issues, including working with whistle-blowers, social media, law enforcement officials, and members of Congress. Velvet Revolution was co-founded by Justice Through Music and The Brad Blog, and it is a 501(c)4 activist, education and lobbying organization.”
Velvet Revolution’s reward specifically targeted Karl Rove noting:
“There has been a great deal of nefarious activity in the run up to this election mostly by partisans on the Republican side of the aisle. Karl Rove is receiving a great deal of scrutiny for raising hundreds of millions from GOP billionaires to defeat President Obama.”
On November 12th, Velvet Revolution received a letter from “The Protectors,” a group thought to be comprised of members of Anonymous. The letter, according to Velvet Revolution “mentioned the reward and went on to note that they began monitoring the ‘digital traffic of one Karl Rove, a disrespecter of the Rule of Law, knowing that he claimed to be Kingmaker while grifting vast wealth from barons who gladly handed him gold to anoint another King while looking the other way.’”
Velvet Revolution went on to state that:
“The Protectors” said that they had identified the digital structure of Rove’s operation and of ORCA, a Republican get out the vote software application. After finding open “doors” in the systems, they created a “password protected firewall” called “The Great Oz,” and installed it on servers that Rove planned to use on election night to re-route and change election results “from three states.”
The letter indicated that “ORCA[1] Killer” was launched at 10am EST and “The Great Oz” at 8pm EST on November 6th. “The Protectors” watched as ORCA crashed and failed throughout Election Day. They watched as Rove’s computer techs tried 105 times to penetrate “The Great Oz” using different means and passwords.
Finally, they issued the following warning to Mr. Rove: don’t do it again or they would turn over the evidence to Wikileaks founder Julian Assange.
Here is the text of the letter itself:
Greetings to the good people of the Velvet Revolution 8 November 2012
Please we were to see that you put your faith in the hands of we protectors of democracy, and tempted too to claim your generous reward. But wealth does not drive us.
Two months prior to your offer, we chose to take a action against those who have subverted the will of the people in past elections, which resulted in terrible destruction across the globe. We began following the digital traffic of one Karl Rove, a disrespecter of the Rule Of Law, knowing that he claimed to be a Kingmaker while grifting vast wealth from barons who glady handed him gold to anoint another King while looking the other way.
After a rather short time, we identified the digital structure of Karl’s operation and even that of his ORCA. This was an easy task in that barn doors were left open and the wind swept us inside.
So what do we do with these doors? Do we lead them open and catch the thieves as they steal the prize? Or do we close them so they cannot steal the price?
Our decision-protect the citizens.
We coded and created, what we call, The Great Oz. A targeted password protected firewall that we tested and refined over the past weeks. We place this code on more than one of the digital tunnels and their destination’s that Karl’s not so smart worker bees planned to use on election night. We noticed that these tunnels were strategically placed to allow for tunnel rats[2] to race to the server sewers[3] from three different states. Ah yes, Karl tried o make it appear that there were more than three but we quickly saw the folly of his ploy.
We watched as Karl’s little boys and girls confidently ran their tests while Karl told his barons to smoke cigars.
6 November, 2012 10am EST -ORCA Killer 8pm EST-The Great Oz
We watched as Karl’s speared ORCA whale was beached, rotting with a strong stench across his American playground, unable to be resuscitated. We watched as Karl’s weak corrupters tried to penetrate The Great Oz. These children of his were at a loss-how many times and how many passwords did they try-exactly 105.
[1]ORCA is a reference to Karl Rove’s GOTV ubercomputer, which could actually be a vote tabulation manipulation software based system.
[2] A remote access tool (a RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. It is possible to remotely install a piece of software on a computer with the intention of taking control of that computer without the legitimate operator becoming aware of it. This connection type can normally only be made if the remote computer operator has the I.P address of the computer required to be controlled. Most “firewall” software usually “blocks” this type of invasive software. However, experienced computer software programmers have developed sophisticated programs to “bypass” typical firewall software. SOURCE
[3] A server sewer refers to a hack used on a “Secure Shell.” SSH is a method of securely communicating with another computer. The “secure” part of the name means that all data sent via an SSH connection is encrypted. This means if a third party tries to intercept the information being transferred, it would appear scrambled and unreadable. The “shell” part of the name means SSH is based on a Unix shell, which is a program that interprets commands entered by a user. SOURCE
If this story is true (and at this point there is no way to verify it) it could explain Rove’s meltdown on Fox News wherein he seemed to refuse to accept that Mitt Romney could lose Ohio. [As seen in the video below.]
Cu Bu Black Belt
Favorite Fighter(s) : AXE MURDERER Posts : 3648 Join date : 2009-07-15 Location : Norman oklahoma
Subject: Re: Interesting read about Rove and Anon Mon Nov 19, 2012 4:44 pm
world wide thing right now in benghazi,spain,China and U.S. and other places of protests I have seen those guy fawkes masks.
KingsOwn19 Administrator
Favorite Fighter(s) : Lyoto Machida, BJ Penn, Anderson Silva,Dan Henderson, Emelianenko Fedor, Josh Barnett Posts : 12421 Join date : 2009-07-16 Location : Northern California
Subject: Re: Interesting read about Rove and Anon Mon Nov 19, 2012 7:37 pm
Yeah, i'm sure a bunch of internet hackers who live to cause shit were so on top of protecting the integrity of the election. If anything, this makes me concerned about the results we did get.
GDPofDRC Administrator
Favorite Fighter(s) : Shogun, Fedor, Wand, Saku, Hendo, BJ, Bas, Cain, Mike Vallely Posts : 21274 Join date : 2009-08-04 Age : 105 Location : Fresyes, CA
Subject: Re: Interesting read about Rove and Anon Mon Nov 19, 2012 9:04 pm
So is that a vote of confidence is Carl Rove's integrity?
KingsOwn19 Administrator
Favorite Fighter(s) : Lyoto Machida, BJ Penn, Anderson Silva,Dan Henderson, Emelianenko Fedor, Josh Barnett Posts : 12421 Join date : 2009-07-16 Location : Northern California
Subject: Re: Interesting read about Rove and Anon Mon Nov 19, 2012 9:29 pm
Not exactly, just a vote of no confidence in Anon giving a shit about the integrity of the election..especially if they have an agenda of their own. I hope these guys were full of shit because i would hate to know they can impact elections. This is why i think voting should be in no way involved with the internet.
I don't think Rove attempted to rig the election though. I think he was just in denial on election night and he felt that Ohio was projected for Obama without key counties being counted yet. He certainly wasnt the only commentator on Fox News who held on to the very last breath. I'm not gonna sit here and say Dick Morris and a few others attempted to rig the election because they had the same confidence as Rove and didnt yield when states were projected.
Let's just say i would think these guys who live to fuck shit up, would certainly be more likely to rig shit if they had the power. They claim to have the power to stop fraud so i assume they feel they have the power to commit fraud.
and what did hackers wear on their faces before V for Vendetta was released?