Anonymous
does not use names. There is a
strong cultural bias within the group against using a name in public. This is especially true if the name is cool,
or so trying to be cool it's corny.
See "The Protectors." Anonymous has a special internal insult for
people who do use names in public. The
insult is homophobic and will not be repeated here.
There is
no evidence that Karl Rove or anyone else attempted to steal the election in
Ohio using the same methods as in 2004.
One would be a fool to try to commit a crime in exactly the manner that
as 8 years ago. This is certainly true
when that method is caught. There are a
variety of methods to interfere with an election electronically. The sad truth is that the whole system of
elections has no security worth respecting and can be attacked at any level.
These security flaws (or really, wholesale absence of security) have been
documented by every academic panel to examine the equipment. The "Protectors"
could not even come up with an original narrative to base their false claims
on.
The
technical claims made in the letter are impossible. If Rove was really stealing the election
utilizing operatives in Chattanooga again, why did Smartech's backup servers in
suburban Atlanta not take over? I mapped
Smartech's network in September. It is
clear to me that the "Protectors" did not.
There is
no such thing as a tunnel on the internet.
A very computer illiterate congressman once referred to the internet as
a "series of tubes". That's about as close a thing to tunnels as
the internet has.
A
"password protected firewall" can not lock someone out of a server that
they are standing next to. The
technician would simply reboot and reinstall the operating system from a
CD. What about their backups? Full hostile takeovers of server farms only
happen on corny
TV shows.
The
Secretary of State's website did not go down at 8pm. It did go down briefly at 11:30 or so. We had Volunteers watching the vote count at
that website and at 40 counties throughout Ohio, watching for vote flipping in
real time. If the website had failed, I
personally would have noticed in real time.
Hackers
name their programs after things that appear in current pop culture. Hackers are generally young people or people
who know and play video games with young people. They name cool programs after cool things
from video games in the early 21st century not early 20th century.
When Anonymous attacked Visa in late 2010, they used a program called the LOIC
(Low Orbital Ion Cannon) a shout out to the popular video game Command and
Conquer. Any hacker that gave a shout
out to a movie with flying monkeys from 1939 would get told to become An Hero.
Claiming
that they will expose Rove to Wikileaks if he does it again is laughable.
Why not just expose him now and be done with it? Bringing Karl Rove down would save Julian
Assange, as Rove
is an advisor to the Swedish prosecutor that is so determined to lock him up. Anonymous took on major banking institutions
to defend Wikileaks. Why is maximum
effort not an option for "The Protectors"
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).