no password
JoinedPosts by no password
-
4
The Watch Tower Bible and Tract Society of Britain, the Jehovah’s W. charity, increased its voluntary income by 69 per cent in real terms.
by no password inhttp://www.thirdsector.co.uk/growth-fundraised-income-top-100-charities-lowest-six-years/fundraising/article/1428396.
growth of fundraised income at top 100 charities 'lowest in six years'.
23 march 2017 by rebecca cooney , be the first to comment.
-
4
The Watch Tower Bible and Tract Society of Britain, the Jehovah’s W. charity, increased its voluntary income by 69 per cent in real terms.
by no password inhttp://www.thirdsector.co.uk/growth-fundraised-income-top-100-charities-lowest-six-years/fundraising/article/1428396.
growth of fundraised income at top 100 charities 'lowest in six years'.
23 march 2017 by rebecca cooney , be the first to comment.
-
no password
Growth of fundraised income at top 100 charities 'lowest in six years'
23 March 2017 by Rebecca Cooney , Be the First to CommentA report from Charity Financials says income for the 100 largest fundraising charities grew to £9.1bn in 2015/16, a rise of 2.3 per cent on the previous yearFundraised income not growing so fastThe growth rate of fundraised income at the top 100 UK fundraising charities has fallen to its lowest in six years, according to the data provider Charity Financials.The income for the 100 largest fundraising charities grew to £9.1bn in their financial year for 2015/16, an increase on the previous year of 2.3 per cent, says the report, Top 100 Fundraising Charities Spotlight.But the growth rate is less than half that of the 5.4 per cent rate revealed last year. This, the report says, indicates that "the harsh climate for fundraising is taking a toll" and there is little to suggest this might change in the immediate future.The evidence "is of constraint and challenge, however, rather than a cliff-edge", the report says. "Charities that continue to build on the existing strengths of their fundraising and supporter/member bases, and to innovate and highlight issues which resonate with the public, are likely to see a good public response."Thursday headlines
- Growth of fundraised income at top 100 charities 'lowest in six years'
- HMRC grants exemption for charities on restitution interest
- Report says half of charities do not have digital strategies
- Door-to-door collection firms 'must be clear they are commercial'
- Report outlines 10 key challenges facing charities
- Kurdish charity provided loan twice the size of its reported income, says regulator
Cancer Research UK maintained its top spot in the list, which it has held for the past six years, with a fundraised income of £433.1m in 2015/16, 63 per cent higher than the British Heart Foundation, which came in second with a fundraised income of £265.1.The figure raised by CRUK was more than double that of the third-largest charity, Macmillan Cancer Support, which brought in £215.5m.The top seven charities, which also included Oxfam, the RNLI, Sightsavers and the British Red Cross, all maintained the same positions as last year, even though the fundraised income for some actually fell during the year.The figures in the report, which was written by Cathy Pharoah, co-director of the Centre for Charitable Giving and Philanthropy at Cass Business School, are based on the charities’ most recently available annual reports at the time of writing.Religious charities were among those that showed the strongest growth in fundraised income. The Watch Tower Bible and Tract Society of Britain, the Jehovah’s Witness charity, increased its voluntary income, including cash and donations, by 69 per cent in real terms. The voluntary income of the Church of Jesus Christ of Latter-day Saints United Kingdom & Ireland went up by 67 per cent after it received a large grant from its parent company in the US.In total, the largest 100 fundraising charities brought in 14 per cent of the sector’s annual income, the report says.Overall, it says, charities with fundraised incomes of more than £30m a year were likely to have much stronger growth than those with incomes below that level. Charities in the top two quartiles of the list had a median average growth of 3.1 and 3.2 per cent respectively; the two bottom quartiles had median growth of 2 and 1.4 per cent respectively.The report says: "Last year’s report questioned how far the strong growth seen in 2014/15 could be maintained or surpassed in the near future, noting the ‘storm clouds on the horizon’."This year’s results indicate that pressures in the funding environment have indeed affected charity growth."Income growth at charities was similar to World Bank estimates of UK growth of 2.2 per cent in 2015, the report says."This year’s results indicate that if charities continue to build on the existing strengths of their fundraising and supporter/member bases, and to innovate, the public is likely to respond," it says."For many charities the future challenge in the medium-term is to maintain their position, but if charities can manage to develop new fundraising techniques or messages which particularly resonate with the public, there is still potential to grow." -
Ziamani’s parents had thrown him out of their home after he chose Islam over their faith, the Jehovah’s Witnesses
by no password inhttp://indianexpress.com/article/explained/londonstani-jihad-bloodsoaked-crisis-of-british-multiculturalism-4582751/.
‘londonstani’ jihad: bloodsoaked crisis of british multiculturalism.
the long-running story of the english jihad, however, also suggests another narrative that needs careful examination.
-
no password
‘Londonstani’ jihad: Bloodsoaked crisis of British multiculturalism
The long-running story of the English jihad, however, also suggests another narrative that needs careful examination
46SHARESWritten by Praveen Swami | Published:March 24, 2017 1:07 amA victim of Wednesday’s terror attack in London receives assistance from a woman on Westminster Bridge. Reuters“I will wage war against the british government on this soil,” Brusthom Ziamani, who grew up in south London, wrote to his parents in the summer of 2014. “the british government will have a taste ov there own medicine they will be humiliated this is ISIB Islamic States of Ireland and Britain.”Ziamani’s parents, migrants of Caribbean origin, had thrown him out of their home after he chose Islam over their faith, a neo-fundamentalist Christian denomination called the Jehovah’s Witnesses, who believe Armageddon to be imminent.Later that year, having failed a government-sponsored programme meant to rid him of his fascination with jihadism, Ziamani appeared at an ex-girlfriend’s home, armed with a hammer and knife, declaring his intent to stage a terrorist attack.“I was going to behead a soldier and hold his head in the air so my friend could take a photograph,” he told police as he was arrested.Wednesday’s terrorist attack in London will without doubt reinforce the urban myths surrounding so-called “lone wolf” terrorism. In this pop narrative, fanatic jihadists embedded unseen in our societies, await orders from Raqqa, the ‘capital’ of the Islamic State, or an Afghan cave to launch terror.The long-running story of the English jihad, however, also suggests another narrative that needs careful examination: of often-shambolic enterprises carried out by disturbed individuals living on the margins of society, finding in jihadism a language for psychopathic impulses.“Londonstan”, French intelligence officers derisively called the city that was the true cradle of the global jihad that sprang up in the 1990s. From his pulpit at the Four Feathers Club in central London, the Jordanian Umar Mahmoud, better known as Abu Qatada, preached to “shoebomber” Richard Reid, who attempted to blow up a transatlantic flight from Paris to Miami in 2001, and to the Frenchman Zacarias Moussaoui, one of the 9/11 conspirators.Mustafa Kamel Mustafa, also known as Abu Hamza al-Masri — the Egyptian-born Bosnian jihad veteran, Brighton-trained civil engineer, one-time nightclub bouncer, and Imam of London’s Finsbury Park mosque — sent volunteers to Yemen.London Attack: 5 Killed, Dozens Injured In Shootout Outside British ParliamentSyrian-origin Omar Bakri Mohammad set up al-Muhajiroun, or The Exiles — the Salafi jihadist organisation that was implicated, expert Jytte Klausen has shown, in 19 of 56 jihadist plots linked to the UK between 1998 and 2010. The bombing of the Indian Army’s XV Corps headquarters in Srinagar in December 2000, the attack on a Tel Aviv bar in April 2003, the 9/11 anniversary plot of 2010 — all involved elements of al-Muhajiroun based in the UK.It was in London that Dhiren Barot, son of an affluent Gujarati Hindu family, underwent the extraordinary transformation into a Kashmir jihadist and then an al-Qaeda bomb-plot operative, and London School of Economics student Syed Omar Sheikh turned into a Jaish-e-Muhammad killer.From soon after 9/11, these jihadi networks began turning their gaze homewards. Muhammad Sidique Khan and Shehzad Tanweer, two of the four British men who carried out the July 2005 London bombings, had travelled to a Pakistani jihad camp in 2003. But it’s hard to discern any real pattern to the radicalisation. Barot enjoyed every privilege British citizenship and parental wealth could procure.Khan and Tanweer were impeccably middle class. However, Richard Reid, like the Nigerian-origin Michael Adebolajo, who hacked to death off-duty soldier Lee Rigby in a London street in May 2013, appears to have been a social misfit.Indeed, even the idea that the English terrorist is a product of the well-documented economic and educational backwardness of its Bangladeshi and Pakistani communities isn’t true in all cases. Roshonara Choudhry, who stabbed Member of Parliament Stephen Timms in 2010 to protest the UK’s wars in Afghanistan and Iraq, was born in London to Shohid, a tailor, and British-born Nometha.She was the eldest of five children, and lived out her Bangladeshi-origin parents’ immigrant dreams: having secured A-levels at Newham Sixth Form College, she was in the final year of a degree in English at King’s College, London.The UK’s efforts to stamp out violent Islamism through expensively-funded counter-radicalisation programmes notwithstanding, some 800 of its nationals are now thought to be fighting with the Islamic State, while another 600 are reported to have been prevented from travelling to the theatres of war. There have been a steady string of plots at home, too, inspired by distant causes: Erol Incedal and Mounir Rarmoul-Bouhadjar, who sought to make bombs in 2013; King’s College, London student Suhaid Majeed, Tarik Hassane and Nathan Cuffy, who secured handguns hoping to shoot police officers; and Nadir Syed and his friends, who hoped to behead soldiers with kitchen knives.In many of these cases, though, there has been no evidence of serious ideological or military training — or even of the kinds of rigour that would show a seriousness of purpose. The idiom is often gangland: in one 2016 case, a 14-year-old in Blackburn threatened to behead his schoolteachers.For a fuller answer, we must examine the UK’s troubled politics of identity. In the late 1970s, as conflicts over race exploded in rioting and vigilante clashes, the British state manufactured its policy of official multiculturalism. The strategy was simple: the political system outsourced its engagement with ethnic minorities to a new contractor-class. In cities, the state ceded authority to so-called community leaders — often individuals linked to extremist Muslim groups like the Jama’at-e-Islami. The new generation of Islamists who rose in the 1990s in turn rebelled against these brokers by rejecting the secular-democratic order — often, ironically, with support from the Left.Theoretical physicist Lawrence Krauss, a former adviser to President Barack Obama, was appalled to find himself facing a gender-segregated audience at London’s University College. He attacked the UK’s deference to “vocal and aggressive” Islamic reactionaries who were seeking to impose their values on society.The English jihadists’ notion of “we” and “them” stems from the intellectual secession that was engendered by state multiculturalism. Instead of a rich cultural landscape, official multiculturalism created a homogenised Muslim identity. Thus, Choudhry defended her attempt to kill Timms by pointing to his support of the Iraq war — a land she had never visited. “We must stand up for each other,” she said. “We must fight them,” said Adebolajo — “I apologise that women have had to witness this today, but in our land our women have to see the same.”His parents’ homeland, Nigeria, is ironically beset by hideous violence by jihadists. British scholar Kenan Malik wrote in a thoughtful essay in 2011 that young British Muslims found themselves “detached from both the religious traditions of their parents, which they often reject, and the wider secular society that insists on viewing them simply as Muslims. A few are drawn inevitably to extremist Islamist groups where they discover a sense of identity and of belonging”. The collapse of the Left, Malik has noted, generated a vacuum, leaving no secular platform to address the crisis. “This”, wrote Salman Rushdie, “is the question of our time: how does a fractured community of multiple cultures decide what values it must share in order to cohere”? For Indians, these are familiar questions with no easy answers. -
9
A CHUCK BERRY MEMORY (Chuck Berry – Dead at 90)
by TerryWalstrom ina chuck berry memory.
it was the first day of june in 1987 and the hard rock cafe in dallas had set aside the afternoon to celebrate and honor the pioneer of rock n’ roll, chuck berry.how did they propose commemorating the legendary inventor of the ‘duck walk’?.
a stained glass window was to be unveiled by the man himself.. .
-
no password
He was Lucky - only 3 years, now days one could get life.
(a) Transportation With Intent To Engage in Criminal Sexual Activity. - A person who knowingly transports an individual who has not attained the age of 18 years in interstate or foreign commerce, or in any commonwealth, territory or possession of the United States, with intent that the individual engage in prostitution, or in any sexual activity for which any person can be charged with a criminal offense, shall be fined under this title and imprisoned not less than 10 years or for life. -
9
A CHUCK BERRY MEMORY (Chuck Berry – Dead at 90)
by TerryWalstrom ina chuck berry memory.
it was the first day of june in 1987 and the hard rock cafe in dallas had set aside the afternoon to celebrate and honor the pioneer of rock n’ roll, chuck berry.how did they propose commemorating the legendary inventor of the ‘duck walk’?.
a stained glass window was to be unveiled by the man himself.. .
-
no password
'though he’s considered a legend of rock n roll, he was certainly no saint in his private life.'
____________________________________________________________________________
'But he didn’t seem to think he’d exploited her.“She was anything but innocent,” he later remarked.'-----------------------------------------------------------------------------'No sooner had Chuck become a star than he ran into more trouble. In 1959 he met a 14-year-old Apache prostitute in Texas called Janice Escalanti. He brought her back to St Louis to work in a nightclub he’d recently invested in.When he fired her, she went to the police and, in 1962, Chuck was sentenced to three years in prison for the breaking a law which banned “transporting a minor across state lines for immoral purposes.”'Inside the murky world of Chuck Berry, from rock 'n' roll hits to prison stints
-
4
Did 'BIG BRO' knock off Michael Hastings ?
by Sol Reform innaw, that only happens in russia.. michael hastings sent email about fbi probe hours before deaththe huffington post | by melissa jeltsenposted: 06/22/2013 6:02 pm edt | updated: 06/22/2013 11:36 pm edt2,7686211281502get media alerts:sign upfollow:michael hastings, michael hastings buzzfeed, michael hastings death, michael hastings email,michael hastings fbi, media newshours before dying in a fiery car crash, award-winning journalist michael hastings sent an email to his colleagues, warning that federal authorities were interviewing his friends and that he needed to go "off the rada[r]" for a bit.. .
the email was sent around 1 p.m. on monday, june 17. at 4:20 a.m. the following morning, hastings died when his mercedes, traveling at high speeds, smashed into a tree and caught on fire.
he was 33.hastings sent the email to staff at buzzfeed, where he was employed, but also blind-copied a friend, staff sgt.
-
no password
WikiLeaks says it has the CIA’s hacking secrets. Here's what you need to know.
Embed SharePlay Video2:15WikiLeaks says it has a trove on the CIA’s hacking secrets. Washington Post national security reporter Greg Miller explains what these documents reveal. (Dalton Bennett, Greg Miller/The Washington Post)A vast portion of the CIA’s computer hacking arsenal appeared to have been exposed Tuesday by the anti-secrecy organization WikiLeaks, which posted thousands of files revealing secret cyber-tools used by the agency to convert cellphones, televisions and other ordinary devices into implements of espionage.
The trove appeared to lay bare the design and capabilities of some of the U.S. intelligence community’s most closely guarded cyberweapons, a breach that is likely to cause immediate damage to the CIA’s efforts to gather intelligence overseas and place new strain on the U.S. government’s relationship with Silicon Valley giants including Apple and Google.
WikiLeaks, which claimed to have gotten the files from a current or former CIA contractor, touted the trove as comparable in scale and significance to the collection of National Security Agency documents exposed by former U.S. intelligence contractor Edward Snowden.
Checkpoint newsletter
Military, defense and security at home and abroad.
But while the Snowden files revealed massive surveillance programs that gathered data on millions of Americans, the CIA documents posted so far by WikiLeaks appear mainly to unmask hacking methods that many experts already assumed the agency had developed.
U.S. intelligence officials and experts said details contained in the newly released documents suggest that they are legitimate, although that could not be independently verified, raising new worries about the U.S. government’s ability to safeguard its secrets in an era of cascading leaks of classified data.
Wikileaks posts alleged trove of CIA hacking tools
Embed SharePlay Video1:29Anti-secrecy group Wikileaks on Tuesday said it had obtained a top-secret trove of hacking tools used by the CIA to break into phones, communication apps and other electronic devices, and published confidential documents on those programs. (Reuters)The files mention pieces of malware with names like “Assassin” and “Medusa” that seem drawn from a spy film, describing tools that the CIA uses to steal data from iPhones, seize control of Microsoft-powered computers or even make Internet-connected Samsung television sets secretly function as microphones.
ADVERTISINGThe release of so many sensitive files appeared to catch the CIA, the White House and other government entities off-guard. A CIA spokesman would say only that “we do not comment on the authenticity of purported intelligence documents.”
In a statement, WikiLeaks indicated that the initial stockpile it put online was part of a broader collection of nearly 9,000 files that would be posted over time describing code developed in secret by the CIA to steal data from a range of targets. WikiLeaks said it redacted lists of CIA surveillance targets, though it said they included targets and machines in Latin America, Europe and the United States.
The release was described as a huge loss to the CIA by security experts and former U.S. intelligence officials. “It looks like really the backbone of their network exploitation kit,” said a former hacker who worked for the National Security Agency and, like others, spoke on the condition of anonymity, citing the sensitivity of the subject.
The breach could undermine the CIA’s ability to carry out key parts of its mission, from targeting the Islamic State and other terrorist networks to penetrating the computer defenses of sophisticated cyber-adversaries including Russia, China and Iran, former officials and tech specialists said.
“Any exposure of these tools is going to cause grave if not irreparable damage to the ability of our intelligence agencies to conduct our mission,” a former senior U.S. intelligence official said.
If legitimate, the release represents the latest major breach of sensitive U.S. government data to be put on global display in humiliating fashion by WikiLeaks, which came to prominence in 2010 with the exposure of thousands of classified U.S. diplomatic cables and military files. WikiLeaks founder Julian Assange has engaged in an escalating feud with the United States while taking refuge at the Ecuadoran Embassy in London from Swedish sexual assault allegations.
WikiLeaks’ latest assault on U.S. secrets may pose an early, potentially awkward security issue for President Trump, who has repeatedly praised WikiLeaks and disparaged the CIA.
Trump declared “I love WikiLeaks” last October during a campaign rally when he read from a trove of stolen emails about his Democratic opponent, Hillary Clinton, that had been posted to the organization's website.
White House press secretary Sean Spicer declined to comment when asked about the CIA breach during a news briefing Tuesday.
[Why the CIA is using your TVs, smartphones and cars for spying]
WikiLeaks indicated that it obtained the files from a current or former CIA contractor, saying that “the archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.”
But the counterintelligence investigation underway at the CIA is also likely to search for clues to whether Russia had any role in the theft of the agency’s digital arsenal. U.S. intelligence officials allege that WikiLeaks has ties to Russian intelligence services. The website posted thousands of emails stolen from Democratic Party computer networks during the 2016 presidential campaign, files that U.S. intelligence agencies concluded were obtained and turned over to WikiLeaks as part of a cyber-campaign orchestrated by the Kremlin.
Experts and former intelligence officials said the latest files appear to be authentic in part because they refer to code names and capabilities known to have been developed by the CIA’s cyber-branch.
“At first glance,” the data release “is probably legitimate or contains a lot of legitimate stuff, which means somebody managed to extract a lot of data from a classified CIA system and is willing to let the world know that,” said Nicholas Weaver, a computer security researcher at the University of California at Berkeley.
Faking a large quantity of data is difficult but not impossible, he noted. Weaver said he knows of one case of WikiLeaks deliberately neglecting to include a document in a data release and one case of WikiLeaks deliberately mislabeling stolen data, “but no cases yet of deliberately fraudulent information.”
[WikiLeaks releases thousands of documents about Clinton and internal deliberations]
WikiLeaks said the trove comprised tools — including malware, viruses, trojans and weaponized “zero day” exploits — developed by a CIA entity known as the Engineering Development Group, part of a sprawling cyber-directorate created in recent years as the agency shifted resources and attention to online espionage.
WikiLeaks labeled the trove “Vault 7” and said that it contains several hundred million lines of code, many of which are designed to exploit vulnerabilities in everyday consumer devices.
In a statement, WikiLeaks said the files enable the agency to bypass popular encryption-enabled applications — including WhatsApp, Signal and Telegram — used by millions of people to safeguard their communications.
But experts said that rather than defeating the encryption of those applications, the CIA’s methods rely on exploiting vulnerabilities in the devices on which they are installed, a method referred to as “hacking the endpoint.”
[Why understanding cyberspace is key to defending against digital attacks]
WikiLeaks said that the files were created between 2013 and 2016 and that it would publish only a portion of the archive — redacting some sensitive samples of code — “until a consensus emerges on the technical and political nature of the CIA’s program.”
The organization did not clarify what achieving such a consensus would entail, but for now it appeared to be withholding fully formed pieces of ready-made code that could be used by other intelligence services or even novice hackers.
Still, the data release alarmed cybersecurity experts, who said the files contain snippets of code that could enable adversaries to replicate CIA capabilities or identify and root out CIA “implants” currently in place.
“This is explosive,” said Jake Williams, founder of Rendition InfoSec, a cybersecurity firm. The material highlights specific anti-virus products that can be defeated, going further than a release of NSA hacking tools last year, he said. The CIA hackers, according to WikiLeaks, even “discussed what the NSA’s . . . hackers did wrong and how the CIA’s malware makers could avoid similar exposure.”
Hackers who worked at the NSA’s Tailored Access Operations unit said the CIA’s library of tools looked comparable. The implants — software that enables hackers to remotely control a compromised device — are “very, very complex” and “at least on par with the NSA,” said one former TAO hacker.
Beyond hacking weapons, the files also purportedly reveal information about the organization of the CIA’s cyber-directorate and indicate that the agency uses the U.S. Consulate in Frankfurt, Germany, as a hacking hub for operations in Europe, the Middle East and Africa.
Though primarily thought of as an agency that recruits spies, the CIA has taken on a larger role in electronic espionage over the past decade. In 2015 the agency created the Directorate of Digital Innovation, a division that puts cyber-work on equal footing with long-standing directorates devoted to conventional spying and analysis.
The CIA’s focus is more narrow and targeted than that of the NSA, which is responsible for sweeping up electronic communications on a large scale around the globe. By contrast, CIA efforts mainly focus on “close in” operations in which the agency at times relies on individuals carrying thumb drives or other devices to implant code on computer systems not connected to the Internet.
One of the most intriguing tools described in the files, called “Weeping Angel,” can apparently be used to put certain television sets into a fake “off” mode while activating a microphone that enables the CIA to capture any conversations in the surrounding space.
Ashkan Soltani and Julie Tate contributed to this report.
-
4
Did 'BIG BRO' knock off Michael Hastings ?
by Sol Reform innaw, that only happens in russia.. michael hastings sent email about fbi probe hours before deaththe huffington post | by melissa jeltsenposted: 06/22/2013 6:02 pm edt | updated: 06/22/2013 11:36 pm edt2,7686211281502get media alerts:sign upfollow:michael hastings, michael hastings buzzfeed, michael hastings death, michael hastings email,michael hastings fbi, media newshours before dying in a fiery car crash, award-winning journalist michael hastings sent an email to his colleagues, warning that federal authorities were interviewing his friends and that he needed to go "off the rada[r]" for a bit.. .
the email was sent around 1 p.m. on monday, june 17. at 4:20 a.m. the following morning, hastings died when his mercedes, traveling at high speeds, smashed into a tree and caught on fire.
he was 33.hastings sent the email to staff at buzzfeed, where he was employed, but also blind-copied a friend, staff sgt.
-
no password
http://redstatewatcher.com/article.asp?id=66523
Look what happened to the last reporter who wrote about Obama/CIA spying on people
Michael Hastings, a reporter for Buzzfeed died in a single car accident in the middle of the night shortly after publishing "Why Democrats Love to Spy on Americans." His next piece was going to be an expose on the Obama administration. This is now spreading as Americans are learning from Wikileaks Vault7 about newly discovered evidence of CIA car method of car jacking.Posted Tuesday, March 07, 2017
-
26
Vigil held for Burney man who died after being set on fire
by no password invigil help for burney man who died after being set on fire.
community members shared their memories of wicks, a member of the jehovah's witness hall in burney.
many of them remember him from his post at the shell station, where he worked along with his wife.
-
no password
Forensic tests conducted by the California Department of Justice revealed on Dec. 30 that Veneagas' DNA was found on the inside wrist cuffs of the rain suit, as well as on the bicycle and a ski mask that deputies recovered, according to the sheriff's report.According to the report, a detective interviewed Venegas on Dec. 23. He said he heard about the homicide through Facebook but refused to provide a DNA sample and eventually left the interview.Venegas, 39, of Burney, was arrested by the Shasta County Sheriff's Office and charged with first-degree, premeditated murder with torture of Wicks.his preliminary hearing was set for March 28.Venegas, who was arrested Jan. 19 at his Telecaster Lane home in west Redding, remains in Shasta County Jail in lieu of $5 million bail. -
7
ACTION ALERT: PA Survivors of child sex abuse, we need you to call PA Attorney General’s Office 1-888-538-8541
by awareness inlast april, the pa attorney general’s office established a toll-free phone number for survivors of child sex abuse (who were pa residents, or were abused by someone in pa) to call if they wanted to file a report of being sexually abused or molested as a child under 18 no matter how long ago the abuse happened or no matter who committed the abuse.. .
the ag’s office is asking victims from all the places/institutions and all the alleged criminals that have literally gotten away with soul murder.
hopefully, the ag’s office will be able to take further steps to expose the criminals and the criminal institutions that aided and abetted the perps.. .
-
no password
A Report of the ??? Statewide Investigating Grand Jury coming soon ?______________________________________________________________In other news:Statement by Mary Ellen Kruger, Chair of the SNAP Board
UNITED STATESBarbara Blaine, the founder and president of SNAP, the Survivors Network of those Abused by Priests, has stepped down from the organization effective February 3, 2017. We are grateful for her 29 years of leadership. Her contribution to the survivors movement is unsurpassed. Her tenacity and fortitude helped expose abuse globally during the past three decades. We will carry on her vision of SNAP as we grow in new ways to better meet the needs of survivors coming forward today and in the future. We wish Barbara the best.Barbara Dorris, SNAP’s Outreach Director, has become the Managing Director. In this new position, Barbara will work closely with the SNAP board of directors to continue to engage our volunteer leadership nationwide to help more survivors of sexual abuse and assault, and to stop the cycle of abuse and the cover up, no matter where the abuse occurred.Barbara Dorris can be contacted at (314) 503-0003 or [email protected].
Survivors Network of Those Abused by Priests -
2
New owner of 'JW ' 124 Columbia Heights in Brooklyn, New York, Vincent Viola, has withdrawn his name from consideration for Army secretary.
by no password inhttp://bigstory.ap.org/article/dff5863268a846bb9c8efea1523f249b/trumps-nominee-army-secretary-withdraws-his-name.
' cited his inability to successfully navigate the confirmation process and defense department rules concerning family businesses.'.
trump's nominee for army secretary withdraws his name.
-
no password
' cited his inability to successfully navigate the confirmation process and Defense Department rules concerning family businesses.'Trump's nominee for Army secretary withdraws his name
By JULIE PACEFeb. 4, 2017 1:19 AM ESTWASHINGTON (AP) — President Donald Trump's nominee for Army secretary, businessman Vincent Viola, has withdrawn his name from consideration for the post.Defense Secretary Jim Mattis was disappointed but understood and respected Viola's decision, a Pentagon statement said. Mattis will recommend to Trump another candidate soon, the statement said.A Trump administration official confirmed Friday night that Viola had withdrawn. The official spoke on condition of anonymity because the official wasn't authorized to speak publicly.The Military Times reported that Viola said in a statement he was "deeply honored" to be nominated but cited his inability to successfully navigate the confirmation process and Defense Department rules concerning family businesses.Viola was the founder of several businesses, including the electronic trading firm Virtu Financial. He also owns the National Hockey League's Florida Panthers and is a past chairman of the New York Mercantile Exchange.A 1977 West Point graduate, Viola trained as an Airborne Ranger infantry officer and served in the 101st Airborne Division. In 2003, he founded and helped fund the Combating Terrorism Center at West Point.'https://www.jw.org/en/news/releases/by-region/united-states/witnesses-sell-property-124-columbia-heights/