Just thinking about how once the Kremlin’s oligarchs pillaged their nation’s resources - dividing it all up for themselves (“privatizing”), they stole everyone’s pensions.
The evidence of this is what Magnitsky found, btw, and why he was murdered. This spurred us - when we were a democracy… /1
February 2, 2025 at 11:55 AM
Just thinking about how once the Kremlin’s oligarchs pillaged their nation’s resources - dividing it all up for themselves (“privatizing”), they stole everyone’s pensions.
The evidence of this is what Magnitsky found, btw, and why he was murdered. This spurred us - when we were a democracy… /1
Chicago lies within the 100-mile "border zone" in which CBP carries powers that it doesn't in other parts of the country. Beyond these imminent raids, CBP often targets public transit to question people about immigration status. This ACLU guide discusses your rights in that situation and others:
Chicago lies within the 100-mile "border zone" in which CBP carries powers that it doesn't in other parts of the country. Beyond these imminent raids, CBP often targets public transit to question people about immigration status. This ACLU guide discusses your rights in that situation and others:
rather than shared directly from the source. This is essentially an email watermark—adding a space here, making a typo there, and similar subtle changes to track leaks. Stay vigilant.
February 3, 2025 at 8:24 PM
rather than shared directly from the source. This is essentially an email watermark—adding a space here, making a typo there, and similar subtle changes to track leaks. Stay vigilant.
Reminder: Musk’s staffers are using space characters to identify information leakers. Before sharing any information, please use a checker to detect and remove these. Avoid directly leaking images; instead, request that the information be rewritten and the image recreated
February 3, 2025 at 8:24 PM
Reminder: Musk’s staffers are using space characters to identify information leakers. Before sharing any information, please use a checker to detect and remove these. Avoid directly leaking images; instead, request that the information be rewritten and the image recreated