The Cyber Attack on US Government Agencies. (Solar Winds)

Mocking Bird media is repeating the old "Russia, Russia, Russia. It’s bullsht! It was China. That being said, this is a bigger story than media is reporting. Then again, not sure if this story is a “plant” for the purpose to diverge the public from focusing on the election. Lou Dobbs is having none of it however as he pretty much eviscerates Government entities for their shear ineptness in addressing a larger problem here. That being said, a lot is going on behind the scenes that makes this story rather complex when viewing this 1000 feet above flyover country. Stay tuned.

The link to the story in a more detailed context.

The SolarWinds Orion Data Breach into Federal and Civilian Organizations Highlights a Silent Agenda by Foreign Actors

It started with the Treasury Department notification of “a sophisticated hacking group backed by a foreign government stole information from the U.S. Treasury Department and a U.S. agency responsible for deciding policy around the internet & telecommunications.”

Within hours the origin of that massive data breach was identified by the federal Cybersecurity Infrastructure and Security Agency (CISA) as a significant risk to government databases and private sector businesses. The breach was attributed to computer intrusion through SolarWinds Orion :

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) tonight issued Emergency Directive 21-01, in response to a known compromise involving SolarWinds Orion products that are currently being exploited by malicious actors. This Emergency Directive calls on all federal civilian agencies to review their networks for indicators of compromise and disconnect or power down SolarWinds Orion products immediately.

“The compromise of SolarWinds’ Orion Network Management Products poses unacceptable risks to the security of federal networks,” said CISA Acting Director Brandon Wales. “Tonight’s directive is intended to mitigate potential compromises within federal civilian networks, and we urge all our partners—in the public and private sectors—to assess their exposure to this compromise and to secure their networks against any exploitation.”