Pubic Figure Author | Entrepreneur | Journalist | Published Photographer | Podcaster | Producer | Mu... View More
About Me
Covid-19 and Coronavirus
Politics and Elections
Outreach/Activism
Covid-19 and Coronavirus
Politics and Elections
Save Our Children
United States Constitution
Outreach/Activism
Religion
Qanon
Artist, Band or Public Figure
5
Likes
Photography
Prominent Appellate Attorney Convicted of Tax Evasion and Mortgage Fraud
GREENBELT, Md. — A federal jury has convicted Thomas C. Goldstein, a nationally known appellate attorney who argued more than 40 cases before the United States Supreme Court and co-founded the legal w
Like (1)
Loading...
Zuni Pueblo Member Pleads Guilty to Triple Homicide in July 4 Fatal Crash
ALBUQUERQUE, N.M. — A 42-year-old enrolled member of the Zuni Pueblo has pleaded guilty in federal court to three counts of second-degree murder stemming from a July 4, 2025 vehicle crash that left th
Be the first person to like this.
EU Lawmakers Push Age 16 Social Media Access Restriction in Digital Fairness Act Framework
Threat Summary Category: Digital Governance & Youth Online Safety RegulationFeatures: Age-gating proposal, parental consent requirement, AI manipulation safeguards, targeted advertising restrictionsDe
Be the first person to like this.
FBI and Navajo Nation Police Seek Critical Leads in Death of 8-Year-Old Maleeka “Mollie” Boone
A quiet stretch of road inside the Coalmine Navajo Housing Authority community has become the center of a joint federal and tribal investigation after eight-year-old Maleeka “Mollie” Boone was found d
Be the first person to like this.
TRJ Cybersecurity — Google Disrupts China-Linked Espionage Campaign Targeting Global Telecom and Government Networks
Threat Summary Category: State-Linked Cyber EspionageFeatures: Cloud-based command-and-control concealment, telecom network targeting, long-term persistence operationsDelivery Method: Web server compr
Be the first person to like this.
TRJ Cybersecurity — SWITCH EV Platform Vulnerabilities Expose Global Charging Infrastructure to Impersonation and Session Hijack Risk
Threat Summary Category: Industrial Control System VulnerabilitiesFeatures: Charging station impersonation, session hijacking, backend data manipulation, denial-of-service exposureDelivery Method: Net
Be the first person to like this.














