Rumor has it that the cyber hacker group (hacktivist group), Anonymous, foiled Karl Rove’s efforts to steal the election from three key swing states: Florida, Ohio and Virginia.
You might recall that two weeks prior to the November 6th election, Anonymous posted a video warning Karl Rove not to rig the election, in which they told Rove that he was being watched and that if he attempted to rig the election, he would be stopped. That video went viral in just days.
The story begins with Velvet Revolution who offered a million dollar reward last month for information leading to the arrest and conviction of anyone who rigged a federal election on November 6th.
“Velvet Revolution US Inc. (Velvet Revolution) is a non partisan 501(c)4 organization founded for the purpose of providing a means for citizens and organizations to mobilize and create a clean, transparent and accountable government. Velvet Revolution focuses on election protection, media reform, and corporate and government accountability. It uses various means to shine sunlight on these issues, including working with whistle-blowers, social media, law enforcement officials, and members of Congress. Velvet Revolution was co-founded by Justice Through Music and The Brad Blog, and it is a 501(c)4 activist, education and lobbying organization.”
Velvet Revolution’s reward specifically targeted Karl Rove noting:
“There has been a great deal of nefarious activity in the run up to this election mostly by partisans on the Republican side of the aisle. Karl Rove is receiving a great deal of scrutiny for raising hundreds of millions from GOP billionaires to defeat President Obama.”
On November 12th, Velvet Revolution received a letter from “The Protectors,” a group thought to be comprised of members of Anonymous. The letter, according to Velvet Revolution “mentioned the reward and went on to note that they began monitoring the ‘digital traffic of one Karl Rove, a disrespecter of the Rule of Law, knowing that he claimed to be Kingmaker while grifting vast wealth from barons who gladly handed him gold to anoint another King while looking the other way.’”
Velvet Revolution went on to state that:
“The Protectors” said that they had identified the digital structure of Rove’s operation and of ORCA, a Republican get out the vote software application. After finding open “doors” in the systems, they created a “password protected firewall” called “The Great Oz,” and installed it on servers that Rove planned to use on election night to re-route and change election results “from three states.”
The letter indicated that “ORCA Killer” was launched at 10am EST and “The Great Oz” at 8pm EST on November 6th. “The Protectors” watched as ORCA crashed and failed throughout Election Day. They watched as Rove’s computer techs tried 105 times to penetrate “The Great Oz” using different means and passwords.
Finally, they issued the following warning to Mr. Rove: don’t do it again or they would turn over the evidence to Wikileaks founder Julian Assange.
Here is the text of the letter itself:
Greetings to the good people of the Velvet Revolution 8 November 2012
Please we were to see that you put your faith in the hands of we protectors of democracy, and tempted too to claim your generous reward. But wealth does not drive us.
Two months prior to your offer, we chose to take a action against those who have subverted the will of the people in past elections, which resulted in terrible destruction across the globe. We began following the digital traffic of one Karl Rove, a disrespecter of the Rule Of Law, knowing that he claimed to be a Kingmaker while grifting vast wealth from barons who glady handed him gold to anoint another King while looking the other way.
After a rather short time, we identified the digital structure of Karl’s operation and even that of his ORCA. This was an easy task in that barn doors were left open and the wind swept us inside.
So what do we do with these doors? Do we lead them open and catch the thieves as they steal the prize? Or do we close them so they cannot steal the price?
Our decision-protect the citizens.
We coded and created, what we call, The Great Oz. A targeted password protected firewall that we tested and refined over the past weeks. We place this code on more than one of the digital tunnels and their destination’s that Karl’s not so smart worker bees planned to use on election night. We noticed that these tunnels were strategically placed to allow for tunnel rats to race to the server sewers from three different states. Ah yes, Karl tried o make it appear that there were more than three but we quickly saw the folly of his ploy.
We watched as Karl’s little boys and girls confidently ran their tests while Karl told his barons to smoke cigars.
6 November, 2012 10am EST -ORCA Killer 8pm EST-The Great Oz
We watched as Karl’s speared ORCA whale was beached, rotting with a strong stench across his American playground, unable to be resuscitated. We watched as Karl’s weak corrupters tried to penetrate The Great Oz. These children of his were at a loss-how many times and how many passwords did they try-exactly 105.
ORCA is a reference to Karl Rove’s GOTV ubercomputer, which could actually be a vote tabulation manipulation software based system.
 A remote access tool (a RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. It is possible to remotely install a piece of software on a computer with the intention of taking control of that computer without the legitimate operator becoming aware of it. This connection type can normally only be made if the remote computer operator has the I.P address of the computer required to be controlled. Most “firewall” software usually “blocks” this type of invasive software. However, experienced computer software programmers have developed sophisticated programs to “bypass” typical firewall software. SOURCE
 A server sewer refers to a hack used on a “Secure Shell.” SSH is a method of securely communicating with another computer. The “secure” part of the name means that all data sent via an SSH connection is encrypted. This means if a third party tries to intercept the information being transferred, it would appear scrambled and unreadable. The “shell” part of the name means SSH is based on a Unix shell, which is a program that interprets commands entered by a user. SOURCE
If this story is true (and at this point there is no way to verify it) it could explain Rove’s meltdown on Fox News wherein he seemed to refuse to accept that Mitt Romney could lose Ohio. [As seen in the video below.]