☮★★☮ Just a democratic-socialist in the heartland of America.CHECK OUT MY TUMBLR(BLOG)HERE "Life is beautiful. Let the future generations cleanse it of all evil, oppression, and violence, and enjoy it to the full."
Moderator's Warning: Threads merged
Tactics is subordinated to strategy, strategy is subordinated to politics, and politics is subordinated to economy
There are few wars between good and evil; most are between one good and another good
For as long as history goes on, the past will continue to accumulate. History isn't just records of the past. Our present civilization is the result of our past
I can't imagine why any sensible-rational person would trust government with anything but the bare essentials!
Has anyone ever before seen what appears to be something everyday going so bad under any other president?
What - A - Mess!
When a crime is ignored ~ it becomes flagrant;
When a crime is rewarded ~ it becomes epidemic:
No Amnesty No Exception
Chemists Have Solutions .
When you figure out those States giving out free ID's.....you might want Hillary to know. So she doesn't look like a bigger corrupt fool than she already does.
The Ole girl would be that worthless, deceiving, and lying Hag, known as Hillary Clinton.
Oh you haven't heard BO's CIA man out and saying that Hillary server was breached. Most already know her private server was hacked. The Romanian Hacker even used her as a bait.
Any Government with more sophistication knows all Hillary had on there. Just think what would be done to her if this was the 1800's!
I'm not very familiar with "hacking." How can it be determined who is doing the hacking when it theoretically could be anyone on the planet? Do they leave some kind of "signature" or something? I know that businesses have been hacked, but I assume that would be for financial reasons - credit card info, etc. What interest would anyone have in some low level person working in a government office, as an example? What information might be useful to the hacker? This is surreal!