Here’s a lengthy post asking: #WhatDoWeNow & I posit, #ArrestEmAll ! Let’s start w/ @dotjenna (now deleted)! She id’s as ‘radio host’ & flew on private jet to storm the capitol!

Below @mikegalsworthy captured her Twitter posts
1/?
@texasgop @tedcruz @KenPaxtonTX #txlege

Now, @dotjenna says CLEARLY on her LIVE (stream?) - ‘We’re gonna be breaking those windows...because we have to!’

She is informing her audience on what needs to be done to the US Capitol!

What is captured next is alarming & deadly?
2/?
@texasgop @tedcruz @KenPaxtonTX #txlege
A Twitter post shows @dotjenna in front of a US Capitol BROKEN window with a caption that includes: ‘news doesn’t stop lying about us we’re going to come after their studios next’

A threat delivered from an illegal entry of Capitol

3/?
@texasgop @tedcruz @KenPaxtonTX #txlege
@dotjenna next screen grab shows her still in front of broken Capitol window & posts: ‘We just stormed the Capital (sic) It was one of the best days of my life’

So she’s celebrating her illegal entry of the grounds! CELEBRATING!

4/?
@texasgop @tedcruz @KenPaxtonTX #txlege
So the last screen grab is a @dotjenna statement where she clearly states ‘ I do not condone the violence’ BUT NO WHERE does she apologize for her actions or statements e.g. ‘be breaking those windows because we have to’

WHAT?

5/?
@texasgop @tedcruz @KenPaxtonTX #txlege
So, now she’s attempting to rewrite the narrative...exactly what many in the @GOP are doing when they condoned Trump?

So question for #LawAndOrder folks like @KenPaxtonTX , should folks like @dotjenna be arrested or referred to FBI?

6/?
@texasgop @tedcruz @KenPaxtonTX #txlege
I say #ArrestEmAll ... Why? These #Trumpers understood the code words spoken before Jan 6 & that day!

If they passed the barriers set up, they conducted illegal entry!

The US Capitol was defiled & US enemies are celebrating!
7/?
@texasgop @tedcruz @KenPaxtonTX #txlege
Let’s ask the audience of this post:

Should ALL the people that passed the barriers set up to protect the US Capitol be arrested & charged if identified?

What say you? @dallasnews @HoustonChron @ExpressNews @statesman @callerdotcom

8/8
@texasgop @tedcruz @KenPaxtonTX #txlege
@threadreaderapp unroll

More from Legal

These people weren't murdered. They were legally executed after convictions for horrendous crimes, being sentenced to the death penalty, and going through countless appeals.


You can oppose the death penalty as a punishment without pretending that the people executed were victims or that carrying out those executions is comparable to murder.

As an example: Daniel Lee was a white supremacist who murdered a family (including an 8-year-old girl) by suffocating them with bags and then dumping their bodies in a swamp.

That's whose name @CoriBush wants you to remember.

Wesley Purkey admitted to kidnapping, raping, and then murdering a 16-year-old girl named Jennifer Long. He then dismembered her body. He also beat an 80-year-old woman to death.

Maybe we should learn the names of his victims instead, @CoriBush?

Dustin Honken was a meth dealer that murdered 5 people, including 2 girls under the age of 11, because their dad was set to testify against him on drug charges. He was specifically sentenced to death for killing the 2 kids.
1/

In light of this serious cyber attack and this being the second in a row that I've heard in the past few weeks, I'd like to take this moment to talk about the cyber attack known as #phishing so that others do not fall prey to it and stay safe online.

Thread starts:


2/

Phishing is usually a means of contacting you by impersonation to gather data, oversimplifying it. This can happen in several ways:
1. URL similarities: Usually when people visit a webpage, most people never check the URL (Uniform Resource Locator). For example, a fake URL of


3/

https://t.co/x0brAMyKgF would be https://t.co/HrdE9hklv1. Seem the same, right? No. I've replaced one single character of "L" in @Google with "I". Therefore, your entire data would be redirected to the server that is hosting GOOGIE, instead of GOOGLE. This is commonly

4/

hackers perform cyber attacks. However this is only one of many.
Many people might forward you genuine links with small "add-ons" which enter your system like a Trojan Horse. A beautiful meme of keyboard cat on the outside but a vicious data-mining link on the inside.
Plus


5/

There's also other means of doing this. And you might think "But dude, who's stupid enough to fall for it?"
LOTS of UNINFORMED people are.
2020 was a record breaking year for phishing websites and attacks as per @techradar. It's not just through

You May Also Like