That comparison deserves to be drawn and it raises some very important questions.
I have seen so many people (including folks on #lawtwitter) comparing what happened at the Capitol yesterday with the violence and property damage that happened in some cities during protests last summer.
Let me explain what is wrong with that analogy . . . . .
That comparison deserves to be drawn and it raises some very important questions.
Very different reaction then. But kudos to those who\u2019ve consistently condemned riots. I hope, if nothing else, today\u2019s violence means we are all on the same page now. https://t.co/JhWadB80So
— Andy Grewal (@AndyGrewal) January 7, 2021
This is a pretty basic social and legal concept.
The people at BLM protests were trying to get changes made to policing practices.
The people at the Capitol were trying to stop Congress from certifying an election.
There is also a huge difference in how those actions came about--specifically the role that public officials played in the turmoil and protests that led to the storming of the Capitol.
They have been leading the charge to challenge the result.
They have been engaging in rhetoric that talks about violence and unrest.
They fanned these flames.
He told them to march to the Capitol, and he repeated it multiple times.
Did they give the protestors a fist pump like Josh Hawley did, as he was heading in to try and overturn the election using frivolous legal arguments?
More from Legal
Anatomy of National Socialist Party Propaganda: Twitter sent out this tweet on January 8th.
That morning, Twitter CEO Jack Dorsey was recorded in a Project Veritas sting video admitting to purging accounts of Trump supporters and promising it was going to get much bigger.
1/13 https://t.co/5FLHwjeufE
That morning, Twitter CEO Jack Dorsey was recorded in a Project Veritas sting video admitting to purging accounts of Trump supporters and promising it was going to get much bigger.
1/13 https://t.co/5FLHwjeufE

To clear up confusion about fluctuations in follower counts:
— Twitter Support (@TwitterSupport) January 9, 2021
In order to prevent spam, we regularly challenge accounts to confirm details like email and phone number. Until that info is confirmed, these accounts aren\u2019t included in follower counts. https://t.co/8BYcBCmxxA
1/
In light of this serious cyber attack and this being the second in a row that I've heard in the past few weeks, I'd like to take this moment to talk about the cyber attack known as #phishing so that others do not fall prey to it and stay safe online.
Thread starts:
2/
Phishing is usually a means of contacting you by impersonation to gather data, oversimplifying it. This can happen in several ways:
1. URL similarities: Usually when people visit a webpage, most people never check the URL (Uniform Resource Locator). For example, a fake URL of
3/
https://t.co/x0brAMyKgF would be https://t.co/HrdE9hklv1. Seem the same, right? No. I've replaced one single character of "L" in @Google with "I". Therefore, your entire data would be redirected to the server that is hosting GOOGIE, instead of GOOGLE. This is commonly
4/
hackers perform cyber attacks. However this is only one of many.
Many people might forward you genuine links with small "add-ons" which enter your system like a Trojan Horse. A beautiful meme of keyboard cat on the outside but a vicious data-mining link on the inside.
Plus
5/
There's also other means of doing this. And you might think "But dude, who's stupid enough to fall for it?"
LOTS of UNINFORMED people are.
2020 was a record breaking year for phishing websites and attacks as per @techradar. It's not just through
In light of this serious cyber attack and this being the second in a row that I've heard in the past few weeks, I'd like to take this moment to talk about the cyber attack known as #phishing so that others do not fall prey to it and stay safe online.
Thread starts:

2/
Phishing is usually a means of contacting you by impersonation to gather data, oversimplifying it. This can happen in several ways:
1. URL similarities: Usually when people visit a webpage, most people never check the URL (Uniform Resource Locator). For example, a fake URL of

3/
https://t.co/x0brAMyKgF would be https://t.co/HrdE9hklv1. Seem the same, right? No. I've replaced one single character of "L" in @Google with "I". Therefore, your entire data would be redirected to the server that is hosting GOOGIE, instead of GOOGLE. This is commonly
4/
hackers perform cyber attacks. However this is only one of many.
Many people might forward you genuine links with small "add-ons" which enter your system like a Trojan Horse. A beautiful meme of keyboard cat on the outside but a vicious data-mining link on the inside.
Plus

5/
There's also other means of doing this. And you might think "But dude, who's stupid enough to fall for it?"
LOTS of UNINFORMED people are.
2020 was a record breaking year for phishing websites and attacks as per @techradar. It's not just through