Notorious former Arizona sheriff Joe Arpaio loses bid to win back seat | The Guardian

Known for launching immigration crackdowns, the former sheriff lost the Republican primary to his former aide Jerry SheridanJoe Arpaio, the former Arizona sheriff notorious for his abusive policing and hardline anti-immigration tactics, has lost his bid to win back the post he held for 24 years.An early Donald Trump supporter and proponent of the racist theory that Barack Obama was not born in the US, Arpaio lost the Republican primary for Maricopa county sheriff to a former aide, Jerry Sheridan. Sheridan will face off against Democrat Paul Penzone in the November elections. Continue reading…

Known for launching immigration crackdowns, the former sheriff lost the Republican primary to his former aide Jerry Sheridan

Joe Arpaio, the former Arizona sheriff notorious for his abusive policing and hardline anti-immigration tactics, has lost his bid to win back the post he held for 24 years.

An early Donald Trump supporter and proponent of the racist theory that Barack Obama was not born in the US, Arpaio lost the Republican primary for Maricopa county sheriff to a former aide, Jerry Sheridan. Sheridan will face off against Democrat Paul Penzone in the November elections.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more