Anonymous ID: f96767 Sept. 16, 2020, 10:58 p.m. No.10678470   🗄️.is 🔗kun

>>10677825 pb

 

A King County Superior Court judge ruled that 4 of 6 charges filed to recall Seattle Councilmember Kshama Sawant can move forward.

Officer injured, 1 arrested after multiple fires set during Seattle protest

king5.com

 

Judge Jim Rogers ruled that 4 of 6 charges filed in the recall petition were sufficient enough to proceed.

The petition accuses Sawant of violating her role as a council member during the height of Seattle protests. Recall organizers allege a series of violations, including that Sawant used her passkey to City Hall, allowing protesters into the building, and that she appeared at a protest outside Mayor Jenny Durkan's Seattle home.

Rogers made the ruling during a virtual hearing on Wednesday with the city prosecutor and Sawant's defense attorney.

Organizers would still need to collect 10,000 signatures from Sawant's District 3 constituents in order to get the recall on the ballot.

A group of Sawant supporters held a virtual rally before the court ruling. They say the recall effort is an attack against Seattle's working class.

A Seattle man claimed he was fired for launching a recall effort against Sawant.

 

https://www.king5.com/article/news/local/protests/police-officer-injured-1-arrested-multiple-fires-set-seattle-protest/281-870b6eb6-e291-4ca5-bb50-f373b0a240b7

 

"Recall organizers allege a series of violations, including that Sawant used her passkey to City Hall, allowing protesters into the building…"

 

Tailgating

Tailgating, also known as piggybacking, is a type of social engineering attack that’s a little different from the others because it’s almost exclusively physical in its attack vector.

This type of attack involves an attacker asking for access to a restricted area of an organization’s physical or digital space. A common scenario we see in tailgating is an attacker asking an employee to “hold the door” to a restricted area because they forgot their access or identity card, or even merely asking an employee to borrow their machine.

This attack may be quite useful in large organizations where employees aren’t likely to know all of their co-workers. They’re often easily tricked into yielding access.

https://securitytrails.com/blog/social-engineering-attacks