It started with the Treasury Department notification of “a sophisticated hacking group backed by a foreign government stole information from the U.S. Treasury Department and a U.S. agency responsible for deciding policy around the internet & telecommunications.”
Within hours the origin of that massive data breach was identified by the federal Cybersecurity Infrastructure and Security Agency (CISA) as a significant risk to government databases and private sector businesses. The breach was attributed to computer intrusion through SolarWinds Orion:
WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) tonight issued Emergency Directive 21-01, in response to a known compromise involving SolarWinds Orion products that are currently being exploited by malicious actors. This Emergency Directive calls on all federal civilian agencies to review their networks for indicators of compromise and disconnect or power down SolarWinds Orion products immediately.
“The compromise of SolarWinds’ Orion Network Management Products poses unacceptable risks to the security of federal networks,” said CISA Acting Director Brandon Wales. “Tonight’s directive is intended to mitigate potential compromises within federal civilian networks, and we urge all our partners—in the public and private sectors—to assess their exposure to this compromise and to secure their networks against any exploitation.” (read more)
The Dept of Homeland Security (DHS) also dispatched a warning, and further reporting on the issue pointed out the intrusion itself took place in May of 2020 and the malware was constructed to disguise itself within the SolarWinds’ system.
A cyber security firm, FireEye, found the intrusion door, identified the source code and tracked it to SolarWinds. FireEye then notified law enforcement and federal agencies who then began reviewing the breach:
(Bloomberg) […] While the hack on FireEye was embarrassing for a cybersecurity firm, Carmakal argued that it may prove to be a crucial mistake for the hackers. “If this actor didn’t hit FireEye, there is a chance that this campaign could have gone on for much, much longer,” Carmakal said.
“One silver lining is that we learned so much about how this threat actor works and shared it with our law enforcement, intelligence community and security partners.” Carmakal said there is no evidence FireEye’s stolen hacking tools were used against U.S. government agencies.
“There will unfortunately be more victims that have to come forward in the coming weeks and months,” he said. While some have attributed the attack to a state-sponsored Russian group known as APT 29, or Cozy Bear, FireEye had not yet seen sufficient evidence to name the actor, he said. A Kremlin official denied that Russia had any involvement.
FireEye’s investigation revealed that the hack on itself was part of a global campaign by a highly sophisticated hacker that also targeted “government, consulting, technology, telecom and extractive entities in North America, Europe, Asia and the Middle East,” the company said in a blog post Sunday night. “We anticipate there are additional victims in other countries and verticals.” (more)
SolarWinds’ has a massive client list including all the sensitive government agencies and most of the top Fortune 500 companies. There have been reports that executives at SolarWinds are being reviewed for making stock transactions prior to public notification of the cyber hack.
https://twitter.com/TheSharpEdge1/status/1338613907053715458
All of that said, let’s stand back and take a look at the relationship between the Dominion vote counting issues, and the cyber intrusion into SolarWinds’ Orion.
A backdoor into SolarWinds’ is essentially a backdoor breach into the U.S. Cybersecurity and Infrastructure Security Agency (CISA). That same agency is in charge of operating all security networks connected to U.S. voting and election security systems, including the Dept. of Homeland Security. In essence, and as a matter of emphatic emphasis, the breach into SolarWinds’ is a breach into the U.S. election security network.
Considering the hack itself, meaning the implant of the malware itself, has identified no actual extraction, or quantification of extracted, data… Then why else would the malware be implanted – except to coordinate some other activity connected to the doorway?
Perhaps this is the apt metaphor….
If you were going to rob a bank (currency = votes), and the robbery was going to include the deployment of electronic lockpicking (Dominion tabulation machines), you would want to see what countermeasures the alarm company (CISA) would/could deploy to identify your effort and/or stop your success.
In that metaphor the hack of SolarWinds is the way into the alarm company.
Is that what this cyber-intrusion was all about?
The Department of Commerce confirmed a breach in one of its bureaus, and Reuters reported that the Department of Homeland Security and the Treasury Department were also attacked. […] the hackers took advanced steps to conceal their actions.
“Their level of operational security is truly exceptional,” he said, adding that the hackers would operate from servers based in the same city as an employee they were pretending to be in order to evade detection.
The hackers were able to breach U.S. government entites by first attacking the SolarWinds IT provider. By compromising the software used by government entities and corporations to monitor their network, hackers were able to gain a foothold into their network and dig deeper all while appearing as legitimate traffic. (link)
Again, notice how no “harm” has been identified. No exfiltration of data has been noted in any report…. ergo it was the bad actors inside the system that has been identified as the compromise and not necessarily any adverse outcome that has been quantified.
In essence, the bank (election) was presumably robbed and now the authorities have identified the open backdoor to the bank but nothing seemingly removed.
Was the hack itself simply a version of controlling the alarm company to conceal the operation within the Dominion network election activity?
There are trillions at stake.
Just a thought….
In my opinion this is the work of the CIA using the tools Edward Snowden told us would make people think it was other countries.
They knew exactly where to go to turn off the alarms.
https://finviz.com/quote.ashx?t=SWI
scroll all the way down and compare to what was on hannity’s radio show
massive sell-off since august
They’re all running for the hills for some reason…
Executive Order #13848 Imposing Certain Sanctions in the Event of Foreign Interference in a United States Election: Sec. 2. (a) All property and interests in property that are in the United States, that hereafter come within the United States, or that are or hereafter come within the possession or control of any United States person of the following persons are blocked and may not be transferred, paid, exported, withdrawn, or otherwise dealt in: any foreign person determined by the Secretary of the Treasury, in consultation with the Secretary of State, the Attorney General, and the Secretary of Homeland Security:
(i) to have directly or indirectly engaged in, sponsored, concealed, or otherwise been complicit in foreign interference in a United States election;
(ii) to have materially assisted, sponsored, or provided financial, material, or technological support for, or goods or services to or in support of, any activity described in subsection (a)(i) of this section or any person whose property and interests in property are blocked pursuant to this order; or
(iii) to be owned or controlled by, or to have acted or purported to act for or on behalf of, d
I understand NONE of this technical information … I have to boil it down to a “Keep It Simple” example … so … this thread reminds me of the 2019 “re-election” of our Louisiana RAT Governor.
Republican Sweep of all State Offices EXCEPT the Guv … his “victory” was held up for hours after the polls closed waiting on the counts from the 2 largest RAT precincts in New Orleans … and … about an hour after his announced victory – the State of Louisiana suffered a “massive cyber attack” that shut down ALL State Computers for more than a week … impossible to check for voter fraud if the computers are down.
I’m of the opinion that the RATS test all their election cheats in Louisiana – home to Carville, Brazile, Edwin Edward’s, David Duke, ACORN & a direct Amtrak route from NO to Chicago (Mafia, Castro & Lee Harvey Oswald) … and … the COVID19 “hot spot” that set off the PLANdemic shutdown of the entire United States of America … because of Mardi Gras.
Carville was crowing about celebrating a Biden “victory” weeks before the election … What did he know (about the Dominion hammer & scorecard cheat)
and when did he it?
CISA declared this election the securest of all time.
Read the article. It has nothing to do with Kreb’s disinfo statement.
With respect, I did read the article. CISA was hacked and they supposedly control election security. How in the world could CISA declare the election the most secure in history.
“A backdoor into SolarWinds’ is essentially a backdoor breach into the U.S. Cybersecurity and Infrastructure Security Agency (CISA). That same agency is in charge of operating all security networks connected to U.S. voting and election security systems, including the Dept. of Homeland Security. In essence, and as a matter of emphatic emphasis, the breach into SolarWinds’ is a breach into the U.S. election security network.”
CISA along with what should have been the highest priority government agencies for strong protection were compromised, so I’d say, just off the top of my head, that from this point on any such bold statements from CISA claiming that ANYTHING was “the most secure in history” should be accompanied BY A LAUGH TRACK!
No?
Yes exactly the point.
IIRC Those in charge at the time have since been replaced and @EzraACohen has now been promoted.
Consider that maybe CISA was being watched by agents of … Pres Trump?
Too much of this & my head starts spinning!
Tulips. I do not understand your statement. Your brevity may be an issue. Can you expand please? It sure looks like it has something to do with Kreb’s disinfo statement.
Who specifically?
They lied.
It’s a good thing we have Chris Krebs on the Cybersecurity job… oh he got fired, by PT.
Just another swamp creature living off the federal government and being a political hack!
or maybe a traitor that needs a firing squad
Acting Director of the Cybersecurity and Infrastructure Security Agency (CISA Brandon Wales
a swamp creature. Probably still uses a Commodore 64 computer from his days at the Johns Hopkins School of Advanced International Studies
“Prior to joining the Department, Mr. Wales served as the principal national security advisor to United States Senator Jon Kyl and as a Senior Associate at a Washington-based foreign policy and national security think-tank. Mr. Wales received his Bachelor’s degree from George Washington University and his Master’s degree from The Johns Hopkins School of Advanced International Studies”
Hey now, don’t you be throwing shade on my Commodore 64. It can still play Wizball and Three Times a Lady.
the old Commodore 64 and the old TRS-80 are probably more secure than Bill Gates’ products or hardware made in the PRC. Use an old-school analog telephone interface for an old-school bulletin board. Archaic can be good. Kind of like the Navajo and Choctaw code-talkers in WWII.
Wow, I come here to learn and this article and comment section are full of information. I thought the election crap was the biggest story, whoa, guess I was wrong.
I hope and pray PDJT has this because my little pea brain is boggled. We are being attacked on fronts I didn’t even know existed. Time to wake up and prepare. I’m so happy to have this place to come to. Thanks SD.
Beans and bullets time.
180daysofkindergarten~~
If we know it President Trump surely knows it.
The boggling part, if you’re into that, is that it is all part of the same war. The Insane Left/Global Coup garbage attracts all the low-life. We’re just the lushest watering hole ever, and the predators are trying their luck.
Predators get killed quit eoften by those they attack. Trex didnt kill every Triceratops or Ankylosauorus. Same analogy applies here. We have weapons also. Its just a matter of how we apply them. Frankly, everything again smells like the Chicoms, the ones who have the most to gain by a JoeXi presidency. There is that Aussie lit of 2m Chicoms “members” in Western institutions, we already know Swallows Soros Well is implicated with a Chicom spy, and AOC has been pictured with the same spy. The other day Pompeo mentioned Georgia Tech being infiltrated by commies. A message might be delivered there.
Yesterday, I shared this via email with a friend at 6:41 AM, my time. twatter had already set up an EVENT for it.
“Something to keep an eye on.
CISA issues an emergency directive following government agency cyber breaches
4 hours ago
https://twitter.com/i/events/1338369073848041472
Check out all the downstream tweets. Look at all the editorial content in between tweets. They look and act and smell like a publisher. They glorify Krebs. Sure looks like he is directing the “team” from outside of the gubt too. SolarWinds software update 6 MONTHS AGO compromised the systems. Under HIS watch.”
My vibe meter is working on overdrive.
Their PLAN is public record:
EAC to host roundtable discussion on Election Night Reporting for the 2020 Election
“MEDIA ADVISORY
October 19, 2020
Silver Spring, MD – The U.S. Election Assistance Commission (EAC) will host a virtual roundtable discussion on Tuesday, October 20, 2020 from 1:30 p.m. – 2:30 p.m. ET. The roundtable discussion will focus on Election Night Results Reporting for the 2020 Presidential Election and how election officials and representatives from the media are preparing. EAC Commissioners will be joined by New Mexico Secretary of State Maggie Toulouse Oliver, Iowa Secretary of State Paul Pate, Vice President and Managing Editor of the Associated Press Brian Carovillano, and Stanford Law School Professor Nate Persily. Speakers will discuss misinformation and disinformation, unofficial results, managing expectations, ballots received after the election, and audits. Speakers will answer questions from the EAC Commissioners.
The meeting will be livestreamed on the EAC’s YouTube Channel and more information can be found on EAC’s event page.
The EAC works with state and local election officials and partners with federal agencies and other key stakeholders to support elections. We are committed to providing information and best practices to the elections community to ease the burden of addressing the issues that COVID-19 has presented to successfully administering elections.
As the EAC is charged with serving as a clearinghouse for election administration, Commissioners and staff are actively compiling and posting resources from voting system vendors, state and local election offices, and federal agencies addressing coronavirus challenges and contingency planning for the upcoming elections. Information on absentee and voting by mail, in-person voting, the 2020 CARES Act grant funds, manufacturer disinfecting guidance for election equipment, poll worker resources, and other COVID-19 resources can be found on the EAC’s website. A recording of Tuesday’s roundtable will be posted on the EAC’s website.
# # #
The U.S. Election Assistance Commission (EAC) was established by the Help America Vote Act of 2002 (HAVA). It is an independent, bipartisan commission charged with ensuring secure, accurate and accessible elections by developing guidance to meet HAVA requirements, adopting voluntary voting system guidelines, and serving as a national clearinghouse of information on election administration. EAC also accredits testing laboratories and certifies voting systems, as well as administers the use of HAVA funds. For more information, visit http://www.eac.gov.
That’s THIS EAC:
https://www.eac.gov/sites/default/files/partners/EI_ISAC_Reporting_Misinformation_Sheet102820.pdf
This is Part 2 of my post “Their PLAN is public record”.
(Currently stuck in moderation.)
CIS = Center for Internet Security
https://www.cisecurity.orghttps://www.cisecurity.org/ei-isac
Election Integrity Partnership at Stanford
https://www.eipartnership.net
“The Election Integrity Partnership is a coalition of research entities focused on supporting real-time information exchange between the research community, election officials, government agencies, civil society organizations, and social media platforms.
Our objective is to detect and mitigate the impact of attempts to prevent or deter people from voting or to delegitimize election results.”
How much do you want to bet that Persily is the master in charge of this little partnership. Note the book on the furniture behind him. It is free on the internet.
From CIS:
Multiple Vulnerabilities in SolarWinds Orion Could Allow for Arbitrary Code Execution
MS-ISAC ADVISORY NUMBER: 2020-166
DATE(S) ISSUED: 12/14/2020
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-solarwinds-orion-could-allow-for-arbitrary-code-execution_2020-166
The CIS link comes up “This site cannot be reached: – fyi
EAC’s Reporting Misinformation Sheet
https://www.eac.gov/sites/default/files/partners/EI_ISAC_Reporting_Misinformation_Sheet102820.pdf
The collaboration between all of these alphabet enterprises, both inside and outside of gubt.
System “glitches”.
Authoritative voting information on YouTube
By Leslie Miller, VP of Government Affairs & Public Policy, YouTube
Sep.24.2020
https://blog.youtube/news-and-events/authoritative-voting-information-on-youtube
World Economic Forum: Leslie Miller
https://www.weforum.org/people/leslie-miller
“Prior to joining Google, Miller spent time in the trenches of Democratic politics focused on grassroots organizing and political communications. She served on Barack Obama’s successful 2008 presidential campaign and began her career at NBC News.”
Thanks for all the context links, TwoLaine!
It’s breathtaking~
Quite a rap sheet!
We’re going to need more special prosecutors. ?
That list of companies across the bottom of that tweet is a good place to start if you’re looking for companies NOT to trust.
suspicious cats are singing this tune. Enjoy fellow suspicious cat treeless
https://thepeoplescube.com/peoples-karaoke/1-s-crush-t22111.html
LOL!! A somewhat different take on the pollution collusion 😀
https://www.breitbart.com/asia/2020/12/14/china-debuts-ambitious-environmental-plan-increases-co2-emissions-decade/
Bill Barr should be in prison, preferably in Gitmo, below sea level, and with wrist constraints…at least that way he cannot pleasure himself to death…
Well, the FBI is on this, so we will never know…
I AM locked and loaded…tears in my eyes…
seeing everything at 1000 meters…
Isn’t it a shame that the second we hear the FIB is investigating Solar Winds, the vast majority, including myself instantly think, oh they are here to “gather” and “control” the evidence.
it truly is a shame that the American people can no longer trust the FIB or DOJ.
What makes matters worse is the last 2 years the leadership of these agencies had the opportunity to clean this up dramatically while changing the image by arresting the perpetrators who committed so many crimes, such as Russia Collusion, lying to a FISA Court, withholding exculpatory evidence, leaking the CP FISA, framing a General, withholding evidence from multiple laptops and so much more but they chose not to.
AG Barr and Wray had the opportunity to change Americans perception of these agencies but failed miserably by doing virtually nothing for 2 years with regard to the rule of law and administering a one system of justice.
Now we have Solar Winds. How long until we hear evidence has gone missing?
Such a shame, same song different verse. A massive overhaul and clean out is way overdue IMO.
On the bright side. I thought Hannity actually did a good interview here and did not interrupt.
Hannity not interrupting??? Are you sure that the Pod People haven’t taken him over?
Two years ago, I don’t recall either you or I expecting the FBI/DOJ/CIA to be cleaned up. There were a lot of other Treepers ready for the emptying of those agencies two years ago
Bogey,
The evidence going missing is the perfect cover up for both the R’s and the D’s: the R’s can run with the narrative that the FBI / DOJ purposely lost it (pointing to the last four or so years) and the D’s will just say there really was not evidence and this is to cover that fact….they were just setting Solar Winds up.
The FBI is totally corrupt. This summer, we witnessed left-wing domestic terror groups (BLM, Antifa, etc.) destroy $2bil of property while Wray whined about the biggest threat to the country being right-wing terror groups. Which officers of the FBI said any different? No, we watched young FBI officers kneel to BLM, each one looking like they were hired directly from the social studies department at George Washington University. None looked like they had a spine. Bill Barr has talked a good game when he felt that he had to but DID nothing. Worse, it appears that he has been covering for the Deep State. Meanwhile, the election was handed to the Chinese. In other words, Barr played bagpipes while the Titanic sank. Where are the white hats? I fear that it is over for the rule of law.
Sadly, the rule of law in America died on July 5th, 2016
FBI is the Secret police of the communists known as the Democrat party. Never ever trust them. They are here to go after any opposition. Nothing to do with law enforcement.
unless they want to railroad someone, and get them imprisoned by the kangaroo court system ..
Your post perfectly represents my views.
Not only to tie up evidence but also to have the convenient, typical patsy to blame when hacking of the vote is revealed: Russia. Despite that the perps (if any) are NOT yet discovered, the media are running with Russia.
They want Putin out also. Putin and Soros despise each other, and even in his KGB days Putin never thought communism was ever going to be sucessfull. As one example, when Putin first came to power, he brought Steve Forbes there to implement Forbes 13% flat tax system. Forbes is the ultimate capitalist. I doubt hed work with Putin if he thought he was a commie. Forbes today for example will not work with any company that does busienss in China, hes turned down Sillicon Valley several times.
Oh they “did” something all right. They and Durham together BURIED evidence.
Carmakal said there is no evidence FireEye’s stolen hacking tools were used against U.S. government agencies.
“Considering the hack itself, meaning the implant of the malware itself, has identified no actual extraction, or quantification of extracted, data…”
But they did,
Yes, please stupid fools believe it when I tell you that the hack to hack the system to install the gateway wasn’t actually a hack, see no evidence because nothing was taken….
Look a squirrel!!!!
A narrative to “explain” vote count fraud when revealed: Russia did it!
Makes perfect sense. I spend buckets of money and time to break into the bank and then just walk out empty handed without anyone having seen me. Ya, sure, I buy that.
I am tired of these clowns insulting my intelligence every single time they get caught standing behind the sheep, with their pants around their ankles. Nope, nothing to see here. Not a thing.
No extraction?
Then, the obvious question is, what was put in?
Is this part of the crime or the coverup of the crime?
Yes and yes.
I agree with Sundance that this major and massive security breach into ALL levels of our federal government was for the primary purpose IMO to gain information and plant their cyber spying eyes into our systems to observe and assist in the upcoming Nov election fraud.
It supports IMO that EVERYTHING that has occurred to PT since 2016 beginning with Russia Collusion, Impeachment, Gen Flynn, COVID-19 and now Massive election fraud and DOD hacking has all been planned and orchestrated by foreign and American traitors to this country.
We are and have been under attack for years now. In my book if a Foreign power is found to be responsible for this hacking and this election fraud then we clearing have an ACT of WAR IMO.
This would now elevate EVERYTHING beyond some lefty DS Americans trying to dirty up PT’s presidency.
What we are now seeing is clear acts of TREASON by hundreds if not thousands of Americans in connection with a Foreign Power. IMO PT MUST use EO13848, Insurrection Act and some level of Marshal Law to round up these treasonous traitors.
My fear is that this was done not only to have eyes within our cyber command to see what we were watching but also to have eyes ready as the Nov election occurred.
The bad guys knew about PT 2018 EO meaning they knew he and cyber command would be watch very closely the 2020 election. So why not get a birds eye view of what the good guys were doing and watching by inserting your own set of eyes WITHIN their system?
Now my follow up question would be……… If these planted eyes were there within, did they also have the capability to destroy any evidence the good guys were capturing during Election night?
And finally, surely PT is asking so who within our cyber command team knew about the good guys election tracking plans? Was their a spy / traitor within Cyber Command who helped the bad guys?
IMO this is so far beyond the FIB or DOJ normal route. It demands to be handled at the military and military tribunal level.
So please Mr. President, use EO13848 and the Insurrection Act otherwise this goes down the typical DC bureaucracy, committee hearing path where nothing gets done and everybody gets off scott free.
The incredible forensic report on the MI Dominion machine alone should have instantly led to the seizure and analysis of their machines nationwide… but it didn’t. The fact that Dominion uses SolarWinds for security only increases the need for that, but you see NOTHING being done.
And you hear ZERO about it in the mainstream news, zero on Faux News (from last night’s lineup anyway), and very suspiciously, not even on the Bulgarian owned ZeroHedge where it should be an extremely popular topic and thread, but isn’t.
You’ve hit on the biggest point of incredulity for me.
Why weren’t the machines ALL INSTANTLY IMPOUNDED?
We had supposedly PUB Legislatures in most all of these states!
What in the heck happened!!
I’ll repeat what I said below about the incredibly BS claim that “this is the most secure election ever”:
Considering what I’ve seen so easily done with voting machines in YouTube videos (one by NBC in 2018!) combined with the Michigan Dominion voting machine forensic report which should have instantly resulted in all Dominion machines being seized nationwide for analysis – but hasn’t – what has happened with this election absolutely proves to me beyond ANY doubt whatsoever that a secure voting system IS NOT what they desire and, just as with the SpyGate “investigations,” they don’t want to look because they know what they’ll find.
Period. Case closed…
“but you see NOTHING being done.”
…and that’s EXACTLY how it should be. Why would the smartest President ever tip his hand and tell YOU or me for that matter.
He’s exhausting every opportunity for them to “do the right thing.” His quote. Have you seen it?
He’s got one of the best military spooks of all time leading this take down.
Enjoy the show. Keep the faith!
M??A??G??A
Sorry, after what has and hasn’t happened over the last four years related to SpyGate, ImpeachmentGate, etc., I’m all burned out on the “clever plan” thing…
“So please Mr. President, use EO13848 and the Insurrection Act otherwise this goes down the typical DC bureaucracy, committee hearing path where nothing gets done and everybody gets off scott free.”
yes
Yes
YES !
2 MILLION Chicoms spies world wide. we already know of 123 inside of Pfizer and likely many others in Big Pharma(the so-called “vaccine”?) We already know Swallows Soros well is implicated with the Chicom spy Fang Fang, and has at least one staffer who also is a Chciom spy. The numbers are likely to be in the THOUSANDS.
From the sound of it, the election now seems to be the least of our problems.
We always thought it was impossible to steal an election because we are 50 states with different counties and precincts in each state, running each state’s election results. But of course, it is simple. Have a common denominator, a hackable voting system in 30 important states and you have created “rigging central”. Thanks to Donald Trump and all the people fighting this fraud.
It has to be dragged into the sunlight and prosecuted.
We though it was impossible because we didn’t want to think about it. Times were too good. No one is out to take your guns. No one is out to take your liberty. No one is out to take your freedom. How many times were we chastised when we said “Hey wait a minute”? We were called conspiracy nuts, flakes, and derided.
Hard times create strong men.
Strong men create good times.
Good times create weak men.
Weak men create hard times.
I would like to believe that the commies, that have betrayed us, overplayed their hand on this one. But by the number of people wearing masks, alone, in their car, I am not so sure.
Things are amazingly silent on the explosive MI Dominion voting machine report and this SolarWinds topic over at ZeroHedge. Dominion uses SolarWinds. It lends credence to this:
March 9, 2020
Is Zero Hedge a Russian Trojan Horse?
The father of the founder of the conspiratorial site filed a criminal complaint against me in Bulgaria. Then things got weird.
https://newrepublic.com/article/156788/zero-hedge-russian-trojan-horse
The site owner is from Bulgaria:
https://www.whois.com/whois/zerohedge.com
Whatever Zero Hedge is, they often have interesting articles and analysis. I never read their investment articles and those often seem like click bait. But trashing them as being “conspiratorial” in this day and age is out of touch – we are living in real life conspiracies to overthrow our government. For the first time since they were ushered in, the black box machines have been exposed for what they have always been – rigged to control the elections.
They are suspicious, they are very Russia friendly and allow some real racist posts from commenters pretending to be conservative.
I don’t buy it. Something is up with that site.
Reading ZeroHedge/Tyler Durden since it came out – they publish investing information not available elsewhere: interviews that otherwise are behind a paywall, Hedge fund letters otherwise not available, independent investment research report that otherwise are behind a paywall. They have clickbait stories and stories that are ads the latter are tagged as ads. I avoid them. They are way more right wing than left wing so I don’t see what the problem is. .
Oh, and they have been banned by Twitter, so must be OK.
I know. I go there daily. BUT MY POINT is that they are NOT covering what I described in my original post, something that is absolutely right up their alley, and I find that highly suspicious since they are based in Bulgaria and the SolarWinds hack is suspected as coming from that bloc.
I joined ZH to read more articles. A day after my credit card was hacked. Amex luckily but is was more than a simple hack. Separate Emails with false documentation that I had web chatted the order. The order number with shipping information from Dell. Then confirmation it was shipped. Again with a Apple order of the same magnitude this morning. First my privacy now my vote ! I am moving quickly from cold anger
FBI involved in raid. Give me a break.
Exactly!
The FBI exists to cover-up crimes from their inner circle, the globalists all around the world.
FBI is trash. They are the mafia. They are the ones doing damage.
They are repulsive, disgraceful. Never ever trust them.
FBI kneeling to BLM. Then there was the time in Columbia with prostitutes.
Nowhere in our US Constitution does it state that this evil, corrupt agency should exist.
And there is this:
https://www.trevorloudon.com/2020/12/sexual-misconduct-shakes-fbis-senior-ranks/
Note that this is just being reported December 12, 2020
“The November 3rd election was the most secure in American history,” the group added.
So says CISA. Are we to believe they are this stupid? Or in on the corruption? Rhetorical question as the answer is self evident.
I think it is more than clear, much more, that whenever our own government proclaims anything as anything, it is 100% the exact opposite.
Examples:
And on and on. It is remarkable really. But a good and trusty rule of thumb is definitely that whatever our government says, the precise, and I mean precise, opposite is the truth.
You can also add that whatever the lefty/communists are accusing us of doing, that is what they are doing.
Flynn was advising Trump that Putin and Russia were not our enemy . China was. Thats why the Obama admin fired him, hes was getting too loud about the yellow pearl scum , and just how badly they were affecting our free enterprise system.
Isn’t that the question we are always left with regardless of the Dem or RINO involved?
Considering what I’ve seen so easily done with voting machines in YouTube videos (one by NBC in 2018!) combined with the Michigan Dominion voting machine forensic report which should have instantly resulted in all Dominion machines being seized nationwide for analysis – but hasn’t – that is absolutely, positively obvious in your face BS!
To me, what has happened with this election absolutely proves to me beyond ANY doubt whatsoever that a secure voting system IS NOT what they desire and, just as with the SpyGate “investigations,” they don’t want to look because they know what they’ll find.
Period. Case closed…
“Many of those customers found themselves ensnared in the attack because suspected Russian hackers inserted a vulnerability into a popular SolarWinds’ software product, designed to give users a bird’s eye view of the varied web of applications that keep their operations humming.”
https://archive.is/msf1W#selection-3501.0-3501.278
Not buying it. I remember some information, that I think Sundance wrote about a few months ago; the gist of it was, CCP hackers were actually mimicking Russian hackers. A white hat hacker was able to crack the hackers. Real tin foil hat stuff but from what I remember was credible.
Anyone else remember this?
Since the raid took place in the Austin, TX headquarters of SolarWinds…and given it’s ties to the highly contested election counts – doesn’t this raid provide the necessary “STANDING” which the US Supreme Court found lacking in the Texas case?
Note: Standing wasn’t lacking in the Texas case.
I understand all but Alito and Thomas said standing was lacking.
Security expert claims Chinese surveillance may have affected tens of thousands of Americans
https://archive.is/aMYau#selection-1383.0-1383.92
Me thinks…”Our” guys did it. Brennan and his gang.
5 eyes?
Change votes, continuing the coup with international help as usual. Same ol’
3,2, 1…Russia Russia Russia.
Eisenhower fired thousands from federal jobs for disloyalty. In ’55 he said he’d use nuclear weapons on Chinese Communists. He shipped out 1 million illegals. In 2012 future two-term US president Donald Trump publically referenced Ike’s policy. There are many more comparisons.
Turn the clock back & go from there.
“The SolarWinds Orion Data Breach into Federal and Civilian Organizations Highlights a Silent Agenda by Foreign Actors”
–Foreign actors, or the CIA? Some people are making the case that the CIA from its inception was a tool of British Bankers, a hell spawn grown out of OSS operations in China. Check out thenewamerican.com video “Battle between the CIA and the DOD?”
great story, this sh1t just keeps getting better and better. I m looking at time lines 5 states send 2 batches of electors to the EC , 45 days from the election is this Friday, Barr s Closed (out) 12/23/2020, EO s from VSGPDJT send most government workers home Christmas Eve except military and most curious to me is the EO regarding who s in charge of the DoD in case Mr Miller goes missing or gets hurt. Might be the greatest Christmas present EVER a government of the USA of the people for the people and by the people
Having a 38+yr career managing major tech initiatives within Investment Banking I’m astounded when I hear the US govt has been breached. We live in a time when data security is #1 priority for ANY firm holding consumer data – the Federal Govt is not exempted. The US can manage to contract defense suppliers building our most secret weaponry yet our Treasury and FCC was hacked? Perhaps we need to reassess where our budget money is being spent and re-appropriate to sound infrastructure after all we already know foreign entities want to take us down. Sorry I don’t see any excuse for lax security.
Both of these say the same thing. Note that the first is greatly exacerbated by the total lack of profit incentive for any government agency to drive competence and efficiency and, if they fail as they did in spades with 9/11, it’s always because they didn’t have a large enough budget for more people and stuff:
Price’s Law – “The square root of the number of people in an organization do 50% of the work. As an organization grows, incompetence grows exponentially and competence grows linearly.” – Derek John de Solla Price, physicist and information scientist, credited as the father of scientometrics
“Everything government touches turns to cr*p” – Richard Starkey (aka Ringo Starr)
Remember the human angle. When the system isn”t working, it’s working.
What’s more disturbing than any ‘foriegn actors’ is the fact that this agency was unable to prevent the intrusion.
With all the resources at their disposal, action like this should never happen.
What makes you think the agency wanted to prevent the intrusion? What makes you think the agency didn’t hold the door wide open and let them in?
I read an interesting theory that doesn’t seem that far-fetched. What if this were white hats?
SolarWinds is primarily a network monitoring tool. Monitoring devices, collecting system logs, and depending on plug-ins, tracking every packet on the network from start to finish. Someone has been watching traffic across businesses and governments. The 2018 EO has some pretty specific instructions and punishments, almost as if the admin knew what they wanted to look for.
Think that military intelligence cyber team could be the white hats that have been watching everything this entire time? Maybe that’s why Sidney Powell and her team and then, ergo, President Trump are so confident. Remember Sidney discussing traffic routes and that they KNEW where data was moving to/from? They tracked it to Frankfurt and Spain – Solarwinds would have been a great tool to have access to to follow that information.
Maybe the “discovery” was the white hat team shining a light to see how the vermin reacted?
Given Sundance’s theory above, and the power authorized with the emergency powers from the EO, I’m thinking this is plausible.
Unsure of the legality, unless the EO covered that.
If so, this could be very interesting.
It could also be criminal activity – but the coincidences are not negligible with the narratives coming from Sidney Powell’s team.
We have our own internal cybercrime tool through military intelligence and the CyberCommand community. But maybe…
I’m not sure where Sidney gets her information. It’s apparent the President distanced himself from her because she’s wayyy out there now. I don’t believe there are any white hats in government. Institutional interests prohibit it.
There are no emergency powers in the Executive Order everyone keeps citing. There is no need to “invoke” the order. The order has been in effect since September 2018. That would include the mid-term elections. We’ve heard nothing about any report on foreign interference in those elections. Ratcliffe said in his interview with Catherine Herridge (about the 2020 report) it would be coming out “sometime in January.”
It’s the President and the American people vs. China, Europe, Iran, the deep state, and both parties.
What if this were white hats?
That would explain why the FBI acted. FBI goes after good guys only.
They are the Democrats secret police.
It is critical that people understand what Sundance said in his earlier thread about the Government Hack.
Start with the simple question again…..
Who robs a bank and doesn’t take anything and why?
The answer is they wanted and needed spying eyes within our Cyber Command so they could learn what offensive & defensive measures the good guys were going to take with regard to the Nov election. After all we warned them with the Sept 2018 EO that we would be on guard.
So knowing that the bad guys needed a way to get our playbook, thus the spider or spying eyes from within mission.
The traitors needed three huge answers or intelligence……….
How much did we know about the voting machines capability to alter votes before Nov 3?
What were the good guys plans to try and track/document Election Voting Interference?
And finally post election what did they know and were they aware of the vote manipulation execution to help them with their getaway plans and prepare any spin narrative.
IMO, this high level hacking of cyber command / DOD was to gain inside surveillance so they had to seed a spider or some form of spying eyes far enough in advance to see if we the good guys would discovered it while also learning of PT’s EO13848 surveillance/ tracking plans for the 2020 election.
I believe the foreign power gave the American traitors the opportunity first to try and take down PT via Russia Collusion and Impeachment but once those attempts failed they went all in with the Election Steal Plan.
This DOD surveillance mission was ALWAYS part of the overall Election fraud plan.
I also believe burying Gen Flynn was also ALWAYS part of this Election fraud plan to keep him so buried because if he was free his mission as he stated was to AUDIT all levels of our Intelligence. In essence Flynn’s knowledge, experience and threat of an massive audit may have blocked their plans to infiltrate cyber command and our agencies come May 2020 via this spy/hack mission.
IMO the key to taking down these treasonous perpetrators IS NOT by using our civilian pieces such as FIB, DOJ and Congress. That is an absolute WASTE of time.
IMO PT MUST use EO13848 and the Insurrection Act and possibly some form of Marshal Law to immediately post the Ratcliffe report, to begin to round up the hundreds if not thousands of traitors who participated and are complicit in this treasonous act against our election, our country and the American people.
IMO IF this is documented as being driven by a Foreign Power then it is an ACT OF WAR and PT must bypass the FIB and DOJ and go directly to the military and military tribunals using EO 13848 and the Insurrection Act.
It is time to act Mr. President!
I love this site, it is a refuge for my conservatism.
!!!!!!! But with that said nothing is going to happen !!!!!!!
Dark days ahead, but i will be here every day.
Soaking in the conservative God like love here.
Not sure if I can do anything. But i do have a suggestion that I believe would work to bring the government down to it’s knees without a shot fired.
I propose a general workers strike for 1 month.
Its not that painful either our life’s do not stop and we can play with the kids and grand-kids all day.
fishing, hiking, walks in the park, trips to beach/mountains/rivers/oceans ETC.
It’s all in our hands now.
Suspicious cat doesn’t do it for me anymore, am now angry cat.
I love this. Thanks for posting.
When noses wrinkle and ears flatten, beware the kraken !
We are reminded, just because they say it often (and it opposes all rational thought), does not make it true.
We are back to Obama Days with false statements made by governmental agencies and providers and the absolute desire by media to repeat it often.
Conceptual observations and questions:
Is it time to abandon “the internet” for an alternative that is: reliable, safe, and America-first nationalist?
Gee…I would miss it, though really necessary for the time being…for me and mine.
I’m sure we are all left with the suspicious cat discomfort about ALL previous elections. They really went all out on this one, over-playing their hand, which made it obvious they (Nazi democrats) tampered with it. We are now left with the sickening thought that every city/state under their control has sold out to the globalist/China agenda. We HAVE already been compromised from within, in govt and in academia and in corporate America. China is waiting for the signal to activate troops to invade. The Nazi democrats are like locusts, marching in lock step, while the foolish Republicans play the blame game as the presidency burns to the ground. Get rid of all of them.
Frank Sinatra knew:
‘SolarWinds came blowin’ in…
From across the sea.’
Hmmm…
source: https://wikileaks.org/ciav7p1/cms/page_16384653.html
https://thedonald.win/p/11R4bu3FRe/solarwinds-can-be-found-on-wikil/c/
Soooo, we allow the importation, education, and hiring of tens of thousands of ChiComs into our R&D, IT, and scientific laboratories in the USA instead of growing our own (the autists at 4chan could outperform these dolts operated by PRC). We give these ChiComs cushy six and seven figure jobs and kiss their butts and fawn over how “smart” they are==much smarter than the American mutts who invented all of this stuff, yeah.
Why are we not striking the root? Get RID of Chinese Communists from our STEM labs and jobs. Augean stables, I know, but I bet there’s a river up to the job.
I’ll be posting more info, mostly technical, in this thread to help gain a better more complete explanation of the “breach”
first this:
https://www.itwire.com/security/researchers-underline-care-taken-to-craft-solarwinds-trojan-campaign.html
this quote is worth noting: “The last time malware of this kind was described, it was the Stuxnet malware, built by Israeli and American NSA actors, to destroy Iran’s nuclear reactors in Natanz.”
this from source, fireeye:
https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
note: this overview SHOWS that the com and control facility was capable. The detection of it, even shows the hash for that specific plugin. so again, there has never been any malware with a command and control capability that was not used. Establishing that data was ex filtrated is of course the last thing a company like fireeye would want to admit. So again, my theory stands. They will claim no money was hauled out of the bank based on a dubious “confidence assessment: but withholding actual forensic work that shows either way! (notes: data that is moved will show meta dynamics….why have there been no mention about forensic examination of data? even the tools they are recommending to their clients do not even mention how to perform exfil detection tools!??? suspicious cat is now doing tiny finger to mouth meme!)
The trojanized update file is a standard Windows Installer Patch file that includes compressed resources associated with the update, including the trojanized SolarWinds.Orion.Core.BusinessLayer.dll component. Once the update is installed, the malicious DLL will be loaded by the legitimate SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe (depending on system configuration). After a dormant period of up to two weeks, the malware will attempt to resolve a subdomain of avsvmcloud[.]com. The DNS response will return a CNAME record that points to a Command and Control (C2) domain. The C2 traffic to the malicious domains is designed to mimic normal SolarWinds API communications. The list of known malicious infrastructure is available on FireEye’s GitHub page.
cobalt is nextgen plugin from the parent stuxnet breed of malware.
Fireeye admits this C2 component was active.
again this tears away at the narrative that no money left the bank. It’s implausible and blatantly technically fraudulent to suggest one of the most powerful tools of exfil is located on thousands of compromised orion gateways, yet come to the conclusion that the crown jewels are still nicely secure…what a laugh. Folks this is bad PR. It only sells to dummies who don’t know or don’t care to know how even the basic of hacking actually operates. it also tosses a gentle sofball to the media so they can easily bat it over the fence. “russia again, but hey, we caught it just the nick of time…”
are any of you buying into any of this?
here is quick 101 on cobalt…stir some coffee…make that a Mimikatz coffee.calling all cyber forensic SCIENTISTS to evaluate the claims pushed out so far.
Binney? steve gibson?
others?
https://www.cobaltstrike.com/help-beacon
…forgot the link.
https://www.domaintools.com/resources/blog/unraveling-network-infrastructure-linked-to-the-solarwinds-hack
quote:
We as network defenders are thus presented with an exceptionally difficult attack to detect, defeat, and recover from—OR ARE WE? (my emphasis in ALLCAPS)
As documented in this posting, there are a NUMBER of network observables that are critical to attacker success for C2 purposes as part of SUNBURST operations. While certainly not without its own difficulties, Network Security Monitoring (NSM) and DNS analysis can identify new, unusual, or outright suspicious network communication patterns.
Monitoring is even more powerful when tracking external communications is combined with internal system awareness to quickly disposition what hosts are communicating to outside entities. In the case of the SolarWinds Orion software, identifying traffic from this service or its hosting device to new, unusual domains—even if using communication patterns similar to Orion telemetry—can rapidly identify connections that are abnormal and worth further scrutiny.
notes: monitoring external traffic is a well established practice for ANY security provider since 1995! (earlier?).
the fact that a c2 plug exists in the orion product improvement software and that it calls to a domain of dubious questionable NON AUTHORIZED capability, proves that the C2 threat not only existed but suggests that data WAS exfiled! More to then point, how does a company such as fireeye explain that the so called supply chain vector, which has been identified as the single greatest risk in cyber since 2016 was not being monitored for irregular traffic…
where was the external outward facing gateway?
suspicious cat is now jaw air gapped!
https://savebreach.com/solarwinds-credentials-exposure-led-to-us-government-fireye-breach/
now were are getting more truths
a. the compromise was probably well before march 2000..likely as early as spring 2019!
b. the entire notion narrative of nation state, russia, cozy bear apt29 becomes even more unreliable as attribution…weak FTP credentials in github….password = solarwinds123…lol…
to quote: “Nation-State adversary or, a simple Github Leak?Exposing password in public GitHub repositories is a very common security lapse among organizations but can be prevented quite easily with secure practices. We have identified thousands of credentials belonging to companies and responsibly reported such cases. This happened in the case of SolarWinds too, Vinoth found their FTP server credentials which allowed read as well as write access to SolarWinds’ FTP server. This critical vulnerability could have allowed them to upload malicious files and binaries to the SolarWinds Downloads FTP server, which made the SolarWinds Orion software available to its clients for download.
Vinoth confirmed that the FTP credentials SolarWinds leaked had write access by uploading a test file to the vulnerable FTP server – downloads.solarwinds.com which apparently h”osts very important files, and if tampered with, the results can be disastrous, which was likely the reason of the US Government breach that happened recently.
“One silver lining is that we learned so much about how this threat actor works and shared it with our law enforcement, intelligence community and security partners.” Carmakal said there is no evidence FireEye’s stolen hacking tools were used against U.S. government agencies.”
strike “against”, insert “by”……
Don’t forget The Serbian Connection. General Betrayus is in on the fixx: https://www.frontpagemag.com/fpm/2020/12/serbian-connection-joseph-hippolito/
Nygard didn’t kill himself.
update: the password to the FTP externally facing orion update module was solarswinds123.
I posted a thread below from an independent bug hunter who exposed and reported this ridiculously stupid security “mistake” directly to fireeye back in 2019. The credentialed password access is super user (principle)..meaning a simple password spray technique gets the password resolved..and once gained (matter of seconds using simple rainbow tables) you have READ AND WRITE permissions to the update engine! (fireeye refers to this as the experience improvement plugin…but what it really is ? RDP SSL (secure remote) for monitoring and manually updating patches to the most highly prized core of the orion fireeye security product.
solarwinds123…
yeah, no one would ever guess it.
the dude cracked it within minutes just guessing.
what’s worse? this ftp module was published in open source at github…and the module had zero timeout policies written ….so you could spray the damned thing until you hit gold.
sheesh….this is what major corporations are using for securing the most valuable assets? treasury? d oh freaking d?
I’m past suspicious cat.
I am now dead cat bounced against the skull.
tiger, I’ve said enough today about the white hats monitoring solar wind systems in the government since May. Just my humble opinion what do you think about it? Sorry this is my talk-to-text
considering the unparalleled usage of solarwinds across all major industries, cutting edge tech, and crown jewel agencies up to and including DOD, I think it would be very easy to assume there was additional monitoring of the networks in question. They are all national security level high value assets. As far as white hats doing it…hmmm…Here is where usage of proper words is critically important. This is true for cyber, as it is also true for any major league player who has a role in defending the bank.
you have to hire bank robbers to know what to look for, and how to design banks that are secure. One can generally refer to these actors as “grey hats”…
solarwinds has a label for these grey hats: red teams.
this type of elite team designs offensive capabilities, so they can perform proper defense and detection..but also KNOW attribution is more than just “confidence reports”…In addition they can know how to scale proportional responses and repurpose the same offending tools against perpetrators.
What I understand about the DOD role in this, is that they have THE ELITE red teams that partner with a section out of homeland. Homeland has the authority. This IS NOT THE SAME GROUP AS CISA. CISA is for lack of better definition an advisory agency. They have few experts and fast movers attached directly. CISA is more or less the public facing press corp for the highly secretive work accomplished by several teams who are DOD centric that partner with Homeland. (there IS a difference in this group than those used by cybercom, arranged so, to conform with certain domestic legal limits on surveillance and law enforcement of which by constitutional law, cybercom has none…at least none that “should” be used domestically. However, having said that, there is somewhat of a blur in my opinion about even that. For certain ANY ACTORS who are attacking national security high value assets that are important to US interests are definitely a military scope item. This is where the executive, POTUS, has enormous unrestricted authority to direct DOD and even cybercom assets to monitor even domestic traffic and provide at a minimum defensive capability.
My understanding (most of which is limited to the reality I no longer have access to MCS level contacts and the daily work they perform), is that President Trump established special authorities with his EO back in 2018. This provided the DNI with the responsibility to monitor, collect, analyze, respond, and to report events and actions directly to HIM! Prior, this was a step wise awkward inefficient and fiasco rich process that involved selling the recommendations to the house intelligence committee members FIRST or at least in parallel to the president. This President, having learned the political problems and corrupt nature of the members of the establishment both within congress and also within the former IC agencies who were charged with this same level of work, re-aligned the reporting and authority driven missions to the DNI, where he has more direct and immediate constitutional control.
It is my understanding (again, see my caveats on limitations when I make these statement), that on 18 Dec 2020, DNI (ratcliffe) will be providing a class brief to the president about a variety of national security events. I will presume one of the immediate topics to governs the discussion and taskings that follow with be this:
the breach of crown jewels from fireye * I will explain this further below…it’s important
the monitoring of dominion voting systems and what was gleaned about the irregularities of proxy traffic noted from those servers
the compromise of those outfits mentioned generally above is not making the news, because of the significance of the breach. In reality, all of these special programs and tools must be assumed to have been compromisd and pwned by adversaries who are likely right now bartering who and for how much they will spend to own them.
when I say this was the worst kind of breach, is no exxageration.
it’s not just about dominion. it’s literally about everything.
this was predicted. Centralizing infrastructire protection (as with the standardization of 28 states who used the same dominion servers for instance) is a very bad idea. And to make a point, the reason why I DO NOT and NEVER WILL use a password manager. All it takes is for the password manager to get hacked (and they have been, multiple times) and all your permissions are poof…skinned.
anyway…probably more information than what you were looking for.
I think it is very important that sundance continue tracking this event….there is much to learn and understand.
and for those that think…not me…this was just a problem for someone else. WRONG!!
this is about companies AND COMPUTERS that you are most likely using to make a living with. For example…the details of this hybridized trojan shows the features is designed to navigate LATERALLY withing a network for domain joined machines. Take a step back and understand that domain joined networks are just about any kind of infrastructure on the planet, used from telecom, to ag, to business, small and large, schools, energy companies..you name it. And it doesn’t only have to be microsoft products either. With just a bit of editing, this can be made to operate with ease across the KING of computer networking servers that hosts them all: Unix based servers, switches and gateways. It’s a very big problem. All of those machines have some kind of update and patching capability. This breach and the loss of real serious high level cyber warfare offensive tools …now in the hands of adversaries and other anarchists is a major blow to the US capability. It also presents a very real clear and present immediate threat that these same tools (as with stuxnet) will be used. Watch for it.
we ain’t seen nothing yet.
I think the President will respond with a force order that will be unprecedented. The question we will all have to consider: is this war? and against whom shall we make it?
Elections run by proprietary insecure code with a history of crashes
Dominion Software uses the UNSECURED STRCPY () function within their source code. Just like the California Report says an insider or skilled villain could hack it.
https://votingsystems.cdn.sos.ca.gov/vendors/dominion/ds52-sc.pdf
https://doc.castsoftware.com/display/SBX/Never+use+strcpy%28%29+function
https://www.mccabe.com/pdf/Appnote-ControlFlowSecurityAnalysis-BannedFunctions.pdf
Our elections shouldn’t be using “outside vendor unverified proprietary source code “ Our elections should not run by proprietary algorithms from anonymous programmers
That is so cute when people pretend that we still have the rule of law.
That was deleted with the historic pen and phone.
Solving this attempted take over of our country by Obama and his minions can only be accomplished by voting all the old guard out. To do that we apparently have to take everything having to do with elections OFFLINE. Nothing can be ONLINE. They can use ballot readers (OFFLINE) and put the count on a USB drive like the paper with the count that use to be used. We will not have a minute to minute update of the vote count across the nation as before but it was wrong anyway. The news media can wait for the results like we use to. Until the public demands this, we will slowly turn into a mirror of Venezuela.
So here is a thought — The Left blames President Trump for everything. He let hundreds of thousands of American’s die. He made them lose their jobs. He made the hurricane hit in the South and it rain in the North and a drought in the where ever … having a bad hair day — Blame Orange Man Bad —
and yet — NO ONE IS BLAMING PRESIDENT TRUMP FOR THE SOLARWINDS SECURITY BREACH … why????? Think about that! No one is blaming him that this is Trump’s America where bad players are getting into our government. I think that is the number one question everyone needs to ask right now.
The intrusion took place in May 2020. FireEye discovered it had been hacked this month. It doesn’t say that POTUS Trump didn’t know about it earlier. We just assume that because they said they notified authorities after their discovery that it was news to those authorities. What if Trump found out way ahead of time and has been slowly tracking them. Remember he said , “We caught them all.”