Anti-gun activist’s daughter picks up the torch | Ap | #cybersecurity | #cyberattack | #cybersecurity | #infosecurity | #hacker



BALTIMORE (AP) — It was on Mother’s Day weekend this year that Baltimore native Ericka Johnson picked up her late mother’s torch of community activism.

Johnson, who goes by Miss Ericka J, had organized a Mother’s Day “White Out” Cease Fire Peace Walk and helped award three moms with home makeovers that weekend. The peace walk event is unrelated to Baltimore Ceasefire, which is a different anti-violence organization.


This page requires Javascript.

Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

kAm“x H2?E E@ <66A >J >@E96C’D =6824J 2=:G6[” y@9?D@? D2:5] “x H@C<65 2=@?8D:56 96C] }@H E92E r~’xs 😀 😕 2 A=246 E92E 😀 5@23=6[ 2?5 x’G6 <:?5 @7 8@EE6? E9C@F89 >J 8C:67] xE’D 366? C62==J A=28F:?8 >J 962CE E@ 8C23 E96 E@C49 FA 2?5 <66A :E 8@:?8]”k^Am

kAmw6C >@E96C H2D !2DE@C $2?5C2 q6== “$2?5J” y@9?D@?[ 2 36=@G65 >6>36C @7 E96 y@9?D w@A<:?D w@DA:E2= A2DE@C2= DE277 H9@ 3642>6 2? 2?E:\8F? 24E:G:DE 27E6C 96C 3C@E96C[ w:==2C5 “!6E6J” y24<D@?[ H2D <:==65 😕 a___]k^Am

kAm$2?5J y@9?D@? @C82?:K65 E96 @C:8:?2= |@E96C’D s2J H66<6?5 A6246 H2=< 😕 a_`f 367@C6 5J:?8 F?6IA64E65=J @7 42C5:24 2CC6DE 2 >@?E9 =2E6C[ 2E 286 ea] w6C :?:E:2E:G6D E@ >2<6 q2=E:>@C6 2 >@C6 A62467F= A=246 E@ =:G6[ DA64:7:42==J 7@C >@E96CD[ 925 366? =67E F?5@?6 F?E:= =2DE >@?E9]k^Am

kAmp3@FE EH@ 5@K6? A6@A=6[ :?4=F5:?8 A2C6?ED @7 49:=5C6? <:==65 5FC:?8 G:@=6?E 4C:>6D[ !@=:46 r@>>:DD:@?6C |:4926= w2CC:D@?[ |2J@C qC2?5@? $4@EE 2?5 >6>36CD @7 |@E96CD @7 |FC56C65 $@?D 2?5 s2F89E6CD D9@H65 FA E@ E96 6G6?E 😕 q2=E:>@C6]k^Am

kAmtD4@CE65 3J q2=E:>@C6 A@=:46[ E96 8C@FA >2C4965 E9C@F89 E96 DEC66ED 492?E:?8 “r62D67:C6” 2?5 “&?:E65 H6 DE2?5[ 5:G:565 H6 72==” 56DA:E6 E96 C2:? 2?5 H:?5 E92E 52J] y@9?D@? 2=D@ @C82?:K65 2 =F?496@? 2?5 7@CF> 2E y@9?D w@A<:?D &?:G6CD:EJ 27E6C E96 H2=< E@ E2=< 23@FE 8F? G:@=6?46]k^Am

kAmy@9?D@?’D A6246 H2=< 2?5 7@CF> 2C6?’E E96 @?=J :?:E:2E:G6D 😕 q2=E:>@C6] $4@EE E9:D J62C A=65865 S`_ >:==:@? 😕 7656C2= r~’xs\C6=:67 7F?5D E@ 4F=E:G2E6 H92E 9:D 25>:?:DEC2E:@? 42==D 2 “4@>>F?:EJ G:@=6?46 :?E6CG6?E:@? 64@DJDE6>]” %9:D 92AA6?65 27E6C 2? :?E6C?2= C6G:6H 7@F?5 E92E q2=E:>@C6’D $276 $EC66ED 2?E:\G:@=6?46 :?:E:2E:G6 =24<65 @G6CD:89E]k^Am

kAms2A9?6 p=DE@?[ 4@\7@F?56C @7 |@E96CD @7 |FC56C65 $@?D 2?5 s2F89E6CD[ 92D 366? G@42= 23@FE 8F? G:@=6?46 27E6C 96C aa\J62C\@=5 D@?[ %2C:B p=DE@?[ H2D <:==65 😕 w2C7@C5 r@F?EJ 😕 a__g] w6 H2D D9@E E@ 562E9 2E 2 A2CEJ 😕 y@AA2] %96 42D6 C6>2:?D F?D@=G65]k^Am

kAm“x H2?E A6@A=6 E@ F?56CDE2?5 E92E WE96 G:4E:>DX 2C6?’E ;FDE ?F>36CD] %96J 2C6 9F>2? 36:?8D[ 2?5 E96J 925 2 C:89E E@ 36 96C6 2D H6==[” p=DE@? D2:5]k^Am

kAmw2G:?8 2 C2A D966E[ A2CE:4F=2C=J 😕 q2=E:>@C6 H96C6 4C:>6 2?5 5CF8D CF? C2>A2?E[ 5@6D?’E ;FDE:7J E96:C <:==:?8[ D96 D2:5] “%92E’D ?@E 2 C62D@? E@ 36 >FC56C65]”k^Am

kAmp?5 E96 4C@H5 E2<:?8 E@ E96 DEC66ED 5FC:?8 E96 H2=< 96=AD 9F>2?:K6D E9@D6 :?G@=G65[ D2:5 p=ED@?[ H9@ 96=A65 $2?5J y@9?D@? @C82?:K6 E96 7:CDE A6246 H2=< 😕 a_`f]k^Am

kAmtC:4<2 y@9?D@?’D H@C< 5:5?’E DE@A E96C6] $96 @G6CD2H 2 3CF?49 2E E96 $282>@C6 !6?5CJ q2=E:>@C6 9@E6= E96 ?6IE 52J E@ 2H2C5 9@>6 >2<6@G6CD E@ E9C66 >@E96CD H9@ =@DE 49:=5C6? E@ G:@=6?E 4C:>6D] %96 >2<6@G6CD 2C6 AC@G:565 3J E96 4@>A2?J y@9?D@? H@C<D 7@C[ !2C<6C x?E6C:@CD $E28:?8 U2>Aj x?E6C:@C #656D:8?[ H9:49 962C5 23@FE 96C 677@CED 2?5 H2?E65 E@ 96=A]k^Am

kAm%96 E9C66 >@E96CD 6>3C2465 6249 @E96C 2?5 4C:65[ y@9?D@? D2:5]k^Am

kAmp?86=2 #@JDE6C[ @?6 @7 E96 >@E96CD H9@ H:== C646:G6 2 9@>6 >2<6@G6C 😕 E96 4@>:?8 >@?E9D[ D2:5 D96’D E92?<7F= 7@C E96 DFAA@CE]k^Am

kAm“x E9:?< E96 H@C< E92E D96’D 5@:?8 😀 2>2K:?8] x E9:?< 6DA64:2==J :7 :E’D E@ <66A 96C >@E96C’D =6824J 2=:G6[” #@JDE6C D2:5] “(6 ?665 :E 3642FD6 E96 4C:>6 C2E6 😀 ?@E 86EE:?8 2?J 36EE6C] %96 ?F>36C @7 A2C6?ED H9@ 2C6 8C:6G:?8 @? E9:D ;@FC?6J 😀 DE625:=J 8C@H:?8 2?5 8C@H:?8]”k^Am

kAm#@JDE6C =@DE 96C ab\J62C\@=5 D@? 😕 pF8FDE a_`h E@ 8F? G:@=6?46 2?5 D2:5 D96 92D 366? @? 2 “=@?8[ =@?6=J C@25” 8C:6G:?8 9:D 562E9]k^Am

kAm“x E9:?< E92E H6 ?665 E@ 3C:?8 2H2C6?6DD 2?J 2?5 6G6CJ H2J E92E H6 42?[” D96 D2:5] “*@F 4@F=5 72== G:4E:> E@ E96D6 DEC66ED 2E 2?J 8:G6? >@>6?E]”k^Am

kAmy@9?D@? D2:5 :E’D C6H2C5:?8 E@ >2<6 >@>D =:<6 #@JDE6C 92AAJ 2?5 E92E <66AD 96C >@E:G2E65 E@ 4@?E:?F6 96C >@E96C’D =6824J]k^Am

kAm“(6 42?’E 3C:?8 E96:C 49:=5C6? 324<[” D96 D2:5[ “3FE x’> 8@:?8 E@ DFAA@CE E96> 😕 E96:C 8C:67 H92E6G6C H6 42? 36 E@ E96>]”k^Am

kAm~?6 @7 y@9?D@?’D ?6IE AC@;64ED 😀 “p %9@FD2?5 |@>D @7 |FC56C65 $@?D 2?5 s2F89E6CD |2C49” E9:D DF>>6C] $96’D A2CE?6C:?8 H:E9 |@E96CD @7 |FC56C65 $@?D 2?5 s2F89E6CD E@ @C82?:K6 E9:D 6G6?E 2?5 92D 366? >66E:?8 H:E9 =@42= =6256CD 😕 2? 677@CE E@ 82C?6C DFAA@CE]k^Am

kAmxE’D E96 D2>6 4@?46AE 2D E96 |@E96C’D s2J H66<6?5 A6246 H2=<] y@9?D@? 9@A6D E92E :7 A6@A=6 A9JD:42==J D66 E96 E9@FD2?5D @7 >@E96CD H9@ 92G6 DF776C65 EC2865J 2?5 8C:67 😕 q2=E:>@C6 E92E E9:D H@F=5 492?86 D@>6 962CED]k^Am

kAm“x H@F=5 9@A6 W>J >@E96CX H@F=5 36 AC@F5 3642FD6 x <?6H 96C 962CE[ 2?5 D96 <?6H >J 962CE[” y@9?D@? D2:5] “x <?@H D96 H@F=5 36 AC@F5 E92E x’> AFEE:?8 E9:D >F49 677@CE] v@ 3:886C[ 8@ 92C5 @C 8@ 9@>6]”k^Am



Original Source link

Leave a Reply

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


Ads

NATIONAL CYBER SECURITY RADIO

Ads

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW