Great choice!!!
Homan really has a great command of the problem.
Really impressed with his interviews on FNC.
Homan will be great, but has two ideas specifically he has recently been touting:
- Interior enforcement & deporting the illegals who have lost their asylum cases & have been ordered to leave
- put immigration judges at the border & work the cases during their 20 days in custody. Adjudicate the cases before they have to be released rather than release them & adding to the backlog of 1 million people.
Mini AOC @miniAOCofficial
Congratulations to the Class of 2019.
You worked very hard to earn your diplomas and degrees.
Now tear them in half.
You keep half and give the other half to someone who just didnt feel like working hard to graduate.
Welcome to the wonderful world of Socialism. 🤓
#MALA
https://www.tabletmag.com/jewish-news-and-politics/256333/fisas-license-to-hop
“McCarthys point here means that the surveillance authorized by the FISA warrant wasnt limited to the personal communications of Carter Page; it only began there. To understand the conspiratorial enterprise, investigators and analysts have to follow up on all the entities Carter Page is in contact with.
And they dont stop there. A conspiratorial enterprise is bound to involve communications beyond Carter Pages first circle of direct contact, so investigators need to look at the next circle as well. They may need to look further, depending on the communications patterns they find in the first two circles radiating from their named target. But under current rules, its the first two that government investigators can routinely gain access to in order to uncover the full scope of a conspiratorial enterprise, without needing to apply for further warrants.”
“This convention is referred to as the two-hop rule, and, like many provisions of surveillance law, has come in for criticism by civil libertarians. The original FISA was passed in 1978, before the internet age. After 9/11, information technology enabled surveillance operators under the Patriot Act, which complemented and in some ways overlapped FISA surveillance, to inaugurate a three-hop rule exploiting computer-networked communications to look well beyond the first-order contacts of a central subject (under Patriot Act surveillance, a terror suspect). This was done via presidential order and came as an unwelcome surprise to the public when the practice was revealed, and initially dubbed warrantless wiretapping, in 2005.”