OccupyforAccountability, 15 November 2012
Last month, we offered a million dollar reward for information leading to the arrest and conviction of anyone who rigged a federal election on November 6th. We urged computer experts to contact us with information about any election manipulation of the tabulation results.
We Received A Letter
On November 12th, we received a letter from “The Protectors,” apparently a group of white hat cyber sleuths, mentioning our reward and stating that two months ago, they began monitoring the “digital traffic of one Karl Rove, a disrespecter of the Rule of Law, knowing that he claimed to be Kingmaker while grifting vast wealth from barons who gladly handed him gold to anoint another King while looking the other way.”
“The Protectors” said that they had identified the digital structure of Rove’s operation and of ORCA, a Republican get out the vote software application. After finding open “doors” in the systems, they created a “password protected firewall” called “The Great Oz,” and installed it on servers that Rove planned to use on election night to re-route and change election results “from three states.”
The letter indicated that “ORCA Killer” was launched at 10am EST and “The Great Oz” at 8pm EST on November 6th. “The Protectors” watched as ORCA crashed and failed throughout Election Day. They watched as Rove’s computer techs tried 105 times to penetrate “The Great Oz” using different means and passwords.
Phi Beta Iota: Absent hard evidence this appears to have been a dirty tricks campaign against the Republican get out the vote software, not a protective efforts blocking actual manipulation of the election software in the three key states of Ohio, Virginia, and Florida. We do not condone “dirty tricks” against anyone; we do continue to suggest that honest government demands intelligence with integrity, and that includes open source software, open source hardware, and open standards. Cloud computing today is “unsafe at any speed” and America seems to have learned nothing for decades of bad practices with respect to information security.