President Trump

Discussion in 'The Signs of the Times' started by garabandal, Oct 17, 2017.

  1. lynnfiat

    lynnfiat Fiat Voluntas Tua

    They have lost their faith and their minds!
     
  2. HeavenlyHosts

    HeavenlyHosts Powers

    Arroyo is very good in this interview
    He likes Trump
     
    Indy, Booklady, AED and 2 others like this.
  3. AED

    AED Powers

    Yes. It was a good interview. Taylor Marshall has a podcast with Fr Dave Nix primarily about A. Vigano and his letter to Trump. In it he gives wonderful examples from scripture of people God chooses in times of crisis to bring healing and victory who do not fit our ideas of "holy." Quite good.
     
  4. Was there any doubt that the "big guys" would maneuver to control the election? James O'Keefe strikes again!

    Hidden Cameras Show Facebook Contractors Bragging About Removing Pro-Trump Content From Platform

    James O’Keefe has an insider at Facebook, Zach McElroy, who says he’s prepared to testify that Cognizant contractors employed by Facebook are actively trying to sway the 2020 election through deletion of pro-Trump sentiment all over the platform. McElroy wrote an oped on Medium in advance of the video release.

    MORE:

    https://pjmedia.com/news-and-politi...oving-pro-trump-content-from-platform-n566828
     
    Booklady, Sam and AED like this.
  5. Te Deum and AED like this.
  6. Tanker

    Tanker Powers

    AED likes this.
  7. BREAKING: Newly Released Strzok Notes Implicate Obama and Biden DIRECTLY Ordering Sham Flynn Investigation

    The Justice Department released Peter Strzok notes from 1/4/2017 regarding the Flynn-Kislyak calls.

    Last month it was revealed 2020 Democrat presidential candidate Joe Biden was in a January 5, 2017 Oval Office meeting discussing General Flynn’s phone calls with Russian Ambassador Kislyak with Obama, Yates, Comey, Rice and Brennan.

    The Strzok notes show then-Vice President Joe Biden wanted to invoke the Logan Act against General Mike Flynn.

    Strzok also noted that Obama DIRECTLY ordered an investigation into Flynn, saying “Have the right people on the case.”

    Then-FBI Director James Comey said the calls between Flynn and Kislyak “appear legit” but they went ahead with the hit job against Flynn.

    “Strzok’s notes believed to be of January 4, 2017, reveal that former President Obama, James Comey, Sally Yates, Joe Biden and apparently Susan Rice discussed the transcripts of Flynn’s calls and how to proceed against him.”

    ..........

    Donald Trump Jr. said Biden and Obama tried subverting democracy/peaceful transition of power to destroy him and compromise the Trump admin.

    DEVELOPING….

    https://www.thegatewaypundit.com/20...n-directly-ordering-sham-flynn-investigation/
     
    AED, Booklady, Tanker and 1 other person like this.
  8. Booklady

    Booklady La Dolorosa

    Wow, AED, now that is a sign for sure.
     
    AED likes this.
  9. AED

    AED Powers

    This is getting very interesting.
     
  10. Booklady

    Booklady La Dolorosa

    And like everything else the Left progressives have done, this too will fail. Trump is too well known, and the Left loves to overplay their hubris. People will vote for Trump because people now like in 2016, are more afraid of the opposition, than of Trump.
     
    HeavenlyHosts and AED like this.
  11. ‘Not Going to Happen’ — Donald Trump Vows to Protect Statues of Jesus Christ from Leftist Mobs

    [​IMG]

    President Donald Trump on Wednesday at the White House vowed to protect statues of Jesus Christ and statues of the Founding Fathers in the United States from leftist mobs seeking their destruction.

    “They’re looking at Jesus Christ. They’re looking at George Washington. They’re looking Abraham Lincoln, Thomas Jefferson. Not going to happen,” Trump said. “Not going to happen as long as I’m here.”

    Activist Shaun King demanded Monday that some statues of Jesus and his mother Mary be torn down because they were “a form of white supremacy.”

    Trump spoke about statues and monuments during a joint press conference at the White House with Polish President Andrzej Duda.

    Duda also weighed in on the controversy, noting that the statue of Polish-US hero Tadeusz Kościuszko in Lafayette Square was vandalized by leftist mobs.

    “That was outrageous for a big number of Polish people,” Trump said.

    The president previewed an executive order that would streamline and consolidate existing laws to protect monuments at the end of the week. Trump cited the Veterans’ Memorial Preservation Act that already allows for up to ten years in prison for attacking a monument to America’s veterans.

    “Ten years is a long time to have fun one night,” he said.

    Trump again said that the violent mobs appeared clueless about why they wanted the statues destroyed.

    “I think many of the people that are knocking down these statues don’t even have any idea what the statue is, what it means, who it is,” Trump said.

    https://www.breitbart.com/politics/...ct-statues-of-jesus-christ-from-leftist-mobs/


     
    Sam, Catherine L, Julia and 4 others like this.
  12. Don_D

    Don_D ¡Viva Cristo Rey!

    Watch this video and pay careful attention to the name of the company and especially the end where the interviewer tells about the employee who was arrested for sending military secrets back to the communist Chinese. This was 20 years ago, right about the time my state went from a independent voting state to become solidly blue.

     
    djmoforegon likes this.
  13. Don_D

    Don_D ¡Viva Cristo Rey!

    https://www.judiciary.senate.gov/pr...oof-encryption-that-shields-criminal-activity

    WASHINGTON – Senate Judiciary Committee Chairman Lindsey Graham (R-South Carolina) and U.S. Senators Tom Cotton (R-Arkansas) and Marsha Blackburn (R-Tennessee) today introduced the Lawful Access to Encrypted Data Act, a bill to bolster national security interests and better protect communities across the country by ending the use of “warrant-proof” encrypted technology by terrorists and other bad actors to conceal illicit behavior.

    “Terrorists and criminals routinely use technology, whether smartphones, apps, or other means, to coordinate and communicate their daily activities. In recent history, we have experienced numerous terrorism cases and serious criminal activity where vital information could not be accessed, even after a court order was issued. Unfortunately, tech companies have refused to honor these court orders and assist law enforcement in their investigations. My position is clear: After law enforcement obtains the necessary court authorizations, they should be able to retrieve information to assist in their investigations. Our legislation respects and protects the privacy rights of law-abiding Americans. It also puts the terrorists and criminals on notice that they will no longer be able to hide behind technology to cover their tracks,” said Graham.

    “Tech companies’ increasing reliance on encryption has turned their platforms into a new, lawless playground of criminal activity. Criminals from child predators to terrorists are taking full advantage. This bill will ensure law enforcement can access encrypted material with a warrant based on probable cause and help put an end to the Wild West of crime on the Internet,” said Cotton.

    “User privacy and public safety can and should work in tandem. What we have learned is that in the absence of a lawful warrant application process, terrorists, drug traffickers and child predators will exploit encrypted communications to run their operations,” said Blackburn.

    The Lawful Access to Encrypted Data Act is a balanced solution that keeps in mind the constitutional rights afforded to all Americans, while providing law enforcement the tools needed to protect the public from everyday violent crime and threats to our national security. The bill would require service providers and device manufacturers to provide assistance to law enforcement when access to encrypted devices or data is necessary – but only after a court issues a warrant, based on probable cause that a crime has occurred, authorizing law enforcement to search and seize the data.

    Background:

    The debate over encryption and lawful access has raged on, unresolved, for years. The Lawful Access to Encrypted Data Act would bring an end to warrant-proof encryption in devices, platforms, and systems.
    Encryption is vital to securing user communications, data storage, and financial transactions. Yet increasingly, technology providers are deliberately designing their products and services so that only the user, and not law enforcement, has access to content – even when criminal activity is clearly taking place. This type of “warrant-proof” encryption adds little to the security of the communications of the ordinary user, but it is a serious benefit for those who use the internet for illicit purposes.
    Bad actors exploit warrant-proof encryption to shield dangerous and illegal activity —including terrorism, child sexual abuse, and international drug trafficking — from authorities. Many service providers and device manufacturers continue refusing to cooperate with law enforcement to help recover encrypted data, even when presented with a lawful warrant supported by probable cause. Without that cooperation, law enforcement is left with few choices: attempt to hack into the encrypted data – at the expense of months, if not years, of lost investigative time plus the millions of dollars in funds needed to execute a hack – or abandon investigations altogether. As a result, our national security is at risk, and countless serious crimes committed in communities around the United States go unsolved.
    Unfortunately, there are many examples that underscore the need to reform the current system.
    In December 2019, a member of the Royal Saudi Air Force carried out a terrorist attack at the Pensacola Naval Air Station in Pensacola, Florida, killing three service members and wounding eight. Attorney General Barr and FBI Director Wray recently announced that new evidence shows the terrorist was radicalized by al Qaeda. The FBI uncovered this evidence only after hacking into the phone to recover encrypted data. The terrorist had shot the phone in an attempt to destroy it. The FBI said they “effectively received no help from Apple” and the effort took over four months, costing “large sums of taxpayer dollars.” Remarks, Department of Justice
    During a money laundering investigation involving the Sinaloa Cartel, numerous lawful access issues arose because of the cartel’s use of an end-to-end encrypted app. The targets of the investigation made phone calls and sent messages using WhatsApp to coordinate drug deals and cash drops. The warrant-proof encrypted messages allowed the criminals to conceal their communications and prevent investigators from intercepting entire conversations, even with a court-authorized wiretap order. The inability to access content from WhatsApp prevented law enforcement from identifying suspects and producing seizures of drugs and money.
    In May 2015, there was a terrorist attack Garland, Texas. ISIS later claimed responsibility. Investigators discovered that one of the terrorists in Texas exchanged more than 100 messages with a terrorist overseas using an end-to-end encrypted app. To date, the FBI is still unable to determine the content of these messages.
    Ryan Lin, a computer scientist with extensive knowledge of encryption and hacking, was accused of cyberstalking, threatening and harassing of a number of victims over several years. Lin used various methods to hide his virtual identity, including VPNs, encrypted devices and encrypted overseas email accounts. During an investigation of Lin, he admitted to collecting a large amount of child sexual abuse material (CSAM) – including a dozen images of prepubescent CSAM he sent, unsolicited, to others – but had taken steps to encrypt the illegal material. Law enforcement conducted a costly and risky operation to seize Lin’s phone while he was using it to increase the likelihood of capturing unencrypted messages. Although agents were successful in obtaining Lin’s phone and material located on the phone, almost every device agents seized from Lin’s home was encrypted. Agents never recovered Lin’s CSAM collection on the seized encrypted devices. This limited law enforcement’s ability to identify victims, notify those victims, and present a fuller, more accurate portrayal of Lin’s conduct at sentencing.
    In 2016, FBI agents identified an IP address sharing image and video files of child pornography using the peer-to-peer program FrostWire. After receiving documents pursuant to legal process requests, the FBI identified a target associated with the IP address. In August 2017, FBI obtained a warrant to seize a desktop computer. The target used BitLocker, a full-volume encryption feature included with Microsoft Windows, to encrypt the desktop. Agents were unable to locate evidence of CSAM on the computer and were forced to close the case. The target of the investigation had regular access to children through his employment as a school bus driver.
    In December 2019, the Senate Judiciary Committee held a hearing titled, “Encryption and Lawful Access: Evaluating Benefits and Risks to Public Safety and Privacy.”
    Highlights of the Lawful Access to Encrypted Data Act:

    Enables law enforcement to obtain lawful access to encrypted data.
    Once a warrant is obtained, the bill would require device manufacturers and service providers to assist law enforcement with accessing encrypted data if assistance would aid in the execution of the warrant.
    In addition, it allows the Attorney General to issue directives to service providers and device manufacturers to report on their ability to comply with court orders, including timelines for implementation.
    The Attorney General is prohibited from issuing a directive with specific technical steps for implementing the required capabilities.
    Anyone issued a directive may appeal in federal court to change or set aside the directive.
    The Government would be responsible for compensating the recipient of a directive for reasonable costs incurred in complying with the directive.
    Incentivizes technical innovation.
    Directs the Attorney General to create a prize competition to award participants who create a lawful access solution in an encrypted environment, while maximizing privacy and security.
    Promotes technical and lawful access training and provides real-time assistance.
    Funds a grant program within the Justice Department’s National Domestic Communications Assistance Center (NDCAC) to increase digital evidence training for law enforcement and creates a call center for advice and assistance during investigations.
     
    Booklady and AED like this.
  14. padraig

    padraig Powers

  15. Booklady

    Booklady La Dolorosa

    I'm so glad I'm not a Facebook member.
     
    Mary's child, padraig, Tanker and 2 others like this.
  16. AED

    AED Powers

    Me too.
     
    Booklady and Mary's child like this.
  17. padraig

    padraig Powers

    I find it good for promoting the Gospel message. That's mostly all I do.:) It's good not to take it all too seriously.
     
  18. Irishguy2

    Irishguy2 Guest

    After watching the videos of Trump and Biden, I came to a conclusion that that both of them are suffering from dementia. Trump is probably worse than Biden in terms of dementia. Both of them should resign from their nominated party cos it doesn't do any good to America re dementia. Trump went from better to worse in 4 years from 2016 to 2020.
     
  19. HA! Trump's a genius and "chosen one".....but, yes, Biden is a prop/robot to be controlled by the "big guys"/globalists who can't really understand what he's actually doing from day to day. Seems the Dims have to put up either a non-citizen, the head of a crime family and/or mentally disturbed person.....pretty much the definition of most Dims these days.
     
  20. Tanker

    Tanker Powers

    LOL!!! :D

    At least Trump can put together a coherent sentence. Trump does not have dementia. Biden might not have dementia either. He might just be over run with demons. Like Nancy Pelosi :)

    So if Trump resigns Pence is president. They won't want that because he has the same agenda as Trump. So if Pence is out of the way we get Pelosi.......who is over run with demons. No thank you. There is a chain of command. You don't just get to resign.

    I will be voting for Trump in 2020. He is the only one running on the Republican ticket. I can't vote for a Demonrat. They believe in murder.
     
    Clare A, Booklady, Sam and 3 others like this.

Share This Page