Skip to content

Woodhull Freedom Foundation Files Lawsuit Challenging FOSTA

  • Chad Cipiti

Today, lawyers representing Woodhull Freedom Foundation along with Human Rights Watch, The Internet Archive, and two individuals filed a federal lawsuit in the U.S. District Court for the District of Columbia challenging the constitutionality of the Allow States and Victims…

Read more

Centering Sexual Freedom on Human Rights Day

  • Chad Cipiti

Happy Human Rights Day! Today marks the adoption of the Universal Declaration of Human Rights , a document that identified the inalienable rights to which everyone is inherently entitled as a human being -- regardless of race, religion, sex, language,…

Read more

Unresolved Feelings Don’t Go Away

  • Chad Cipiti

Article by Dr. Michael B. Grossman, DM, MSN, RN, NEA-BC, CNML Stephen Covey, author of The 7 Habits of Highly Effective People (2013) said that: Unresolved feelings don’t go away, they just get buried and reemerge in other ways. On…

Read more

20 Things You Can Do to Resist Trump (and counting…)

  • Chad Cipiti

Since the election of President Donald Trump, Woodhull Freedom Foundation has been preparing for inevitable attacks of freedoms, persecutions of human beings and erosion of rights. We have compiled a list of 20 things (and counting...) that folks can do…

Read more

Time to play chess, not checkers, with Bannon/Trump

  • Chad Cipiti

After my 8th invitation in two days to Emergency Calls, I thought it wise to pause and reflect on how we avoid the Whack-A-Mole trap and focus our energies. In addition to the electoral strategies in 2018 and 2020 that…

Read more

We will not go back!!

  • Chad Cipiti

In the days immediately after the stunning defeat of freedom, equality and justice that accompanies the election of Donald J. Trump as the next President of the United States, the words of the quotation from Isoroku Yamamoto, commander-in-chief of the…

Read more

The War on Sex

  • Chad Cipiti

In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. This malicious program is named for the Trojan horse of Greek mythology....a hollow wooden statue of a horse used by enemies to sneak themselves into…

Read more
Back To Top
Search