Anonymous ID: f026d7 Oct. 31, 2020, 6:22 p.m. No.11382895   🗄️.is 🔗kun   >>2908

Obviously this guy didn't get the memo about 'Hunter's Laptops' and 'Ashley's diary written from Drug Rehab.'

 

Christians, Conscience, and the Looming 2020 Election

 

"There is the question of character. I have had to struggle with this question through about a half-century of political engagement. In the case of Donald Trump, the reality is that he is sadly deficient in many of the most crucial issues of character and moral virtue. He has bragged about many of his vices, written books promoting them, and given full vent to some of the baser instincts of the body politic. He appears to be driven by a narcissistic impulse that overrides nearly every opportunity to demonstrate moral virtues in public. He has been married to three women and has bragged about infidelity. He is divisive, arrogant, vitriolic, and sometimes cruel."

Anonymous ID: f026d7 Oct. 31, 2020, 6:43 p.m. No.11383179   🗄️.is 🔗kun   >>3193 >>3204 >>3345

A federal judge in Texas scheduled an emergency hearing for Monday on whether Houston officials unlawfully allowed drive-through voting and should toss more than 100,000 votes in the Democratic-leaning area.

 

https://www.reuters.com/article/us-usa-election-texas-idUSKBN27G0W9?taid=5f9e0e6f231a27000133b69a&utm_campaign=trueAnthem:+Trending+Content&utm_medium=trueAnthem&utm_source=twitter

Anonymous ID: f026d7 Oct. 31, 2020, 6:54 p.m. No.11383355   🗄️.is 🔗kun

Ever hear of this?

 

S.2105 - Cybersecurity Act of 2012

 

Cybersecurity Act of 2012 - Directs the Secretary of Homeland Security (DHS), in consultation with owners and operators of critical infrastructure, the Critical Infrastructure Partnership Advisory Council, and other federal agencies and private sector entities, to: (1) to conduct a top-level assessment of cybersecurity risks to determine which sectors face the greatest immediate risk, and beginning with the sectors identified as having the highest priority, conduct, on a sector-by-sector basis, cyber risk assessments of the critical infrastructure; (2) establish a procedure for the designation of critical infrastructure; (3) identify or develop risk-based cybersecurity performance requirements; and (4) implement cyber response and restoration plans. Sets forth requirements for securing critical infrastructure, including notification of cyber risks and threats and reporting of significant cyber incidents affecting critical infrastructure.

 

Needs a diggin' - IBOR incoming

 

https://www.congress.gov/bill/112th-congress/senate-bill/2105