1. Control a large percentage of the US media.

https://theintercept.com/2020/03/09/it-was-democrats-and-their-media-allies-who-impugned-bidens-cognitive-fitness-yet-now-feign-outrage/

2. Side with a large percentage of the deep state. https://theintercept.com/2017/01/11/the-deep-state-goes-to-war-with-president-elect-using-unverified-claims-as-dems-cheer/

https://theintercept.com/2019/01/03/veteran-nbcmsnbc-journalist-blasts-the-network-for-being-captive-to-the-national-security-state-and-reflexively-pro-war-to-stop-trump/

https://www.youtube.com/watch?v=4Py25LPuv-c

3. Regularly have deep state on legacy media channels. https://theintercept.com/2020/05/21/the-cias-murderous-practices-disinformation-campaigns-and-interference-in-other-countries-still-shapes-the-world-order-and-u-s-politics/

4. Vilify and silence alternative media.

https://www.nytimes.com/interactive/2019/06/08/technology/youtube-radical.html

https://theintercept.com/2020/10/15/facebook-and-twitter-cross-a-line-far-more-dangerous-than-what-they-censor/

4.1 Cheer on big tech censorship of alternative media.

https://www.cnn.com/2021/01/06/tech/twitter-lock-trump-account/index.html

https://www.nbcnews.com/tech/social-media/facebook-youtube-twitter-remove-video-trump-amid-chaos-capitol-n1253157

5. Demonize the opposing side for turning to alternative media.

6. Steal an election.

https://conspiracies.win/p/11RO2pZdcD/x/c/4DrwVaYVVUA

7. Deny theft.

8. Invite other side to cause havoc.

9. Hasten calls for registry of opposing side.

9.1 Hasten calls for censorship.

9.2 Hasten calls for increased surveillance.

10. Install puppet candidate.

49
66

https://www.nytimes.com/2020/12/16/opinion/fireeye-solarwinds-russia-hack.html

Last week, the cybersecurity firm FireEye said it had been hacked and that its clients, which include the United States government, had been placed at risk. This week, we learned that SolarWinds, a publicly traded company that provides software to tens of thousands of government and corporate customers, was also hacked.

The magnitude of this ongoing attack is hard to overstate. The Russians have had access to a considerable number of important and sensitive networks for six to nine months. The actual and perceived control of so many important networks could easily be used to undermine public and consumer trust in data, written communications and services. In the networks that the Russians control, they have the power to destroy or alter data, and impersonate legitimate people. Domestic and geopolitical tensions could escalate quite easily if they use their access for malign influence and misinformation — both hallmarks of Russian behavior.

The National Defense Authorization Act, which each year provides the Defense Department and other agencies the authority to perform its work, is caught up in partisan wrangling. Among other important provisions, the act would authorize the Department of Homeland Security to perform network hunting in federal networks.

While all indicators point to the Russian government, the United States, and ideally its allies, must publicly and formally attribute responsibility for these hacks. If it is Russia, President Trump must make it clear to Vladimir Putin that these actions are unacceptable. The U.S. military and intelligence community must be placed on increased alert; all elements of national power must be placed on the table.

President Trump must get past his grievances about the election and govern for the remainder of his term. This moment requires unity, purpose and discipline. An intrusion so brazen and of this size and scope cannot be tolerated by any sovereign nation.