wocinsolidarity:

sinidentidades:

Meet Arabic Hip-Hop’s First Lady: Shadia Mansour

Longtime journalist and hip-hop historian Davey D has a great series going in which he highlights 500 female emcees, and he recently featured the British-born Palestinian emcee Shadia Mansour.

Since launching a rap career around 2003, Mansour has gained fans in the Middle East, Europe and the United States with politically charged songs that take aim at the occupation of Palestine. She often performs in a traditional Palestinian thawb and, according to Hip-Hop and Politics, considers herself to be part of a “musical intifada.”

Mansour has collaborated with other well-known Palestinian hip-hop groups including DAM and has also worked with rapper M-1 of dead prez, who’s featured on her track “Al Kufiya Arabiya” (The Kufiya is Arab). From Hip-Hop and Politics: 

The song was written when Mansour discovered an American made blue-and-white colored Arab scarf with Stars of David on it. Mansour introduced her song on stage in New York: “You can take my falafel and hummus, but don’t fucking touch my keffiyeh”.

!

thepeoplesrecord:

How the NSA plans to infect “millions” of computers with malwareMarch 13, 2014
Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.
The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.
The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.
In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.
The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”
In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.
Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.
“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”
Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be “out of control.”
“That would definitely not be proportionate,” Hypponen says. “It couldn’t possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance.”
The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. “As the president made clear on 17 January,” the agency said in a statement, “signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.”
Full article

thepeoplesrecord:

How the NSA plans to infect “millions” of computers with malware
March 13, 2014

Top-secret documents reveal that the National Security Agency is dramatically expanding its ability to covertly hack into computers on a mass scale by using automated systems that reduce the level of human oversight in the process.

The classified files – provided previously by NSA whistleblower Edward Snowden – contain new details about groundbreaking surveillance technology the agency has developed to infect potentially millions of computers worldwide with malware “implants.” The clandestine initiative enables the NSA to break into targeted computers and to siphon out data from foreign Internet and phone networks.

The covert infrastructure that supports the hacking efforts operates from the agency’s headquarters in Fort Meade, Maryland, and from eavesdropping bases in the United Kingdom and Japan. GCHQ, the British intelligence agency, appears to have played an integral role in helping to develop the implants tactic.

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.”

In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.” The system manages the applications and functions of the implants and “decides” what tools they need to best extract data from infected machines.

Mikko Hypponen, an expert in malware who serves as chief research officer at the Finnish security firm F-Secure, calls the revelations “disturbing.” The NSA’s surveillance techniques, he warns, could inadvertently be undermining the security of the Internet.

“When they deploy malware on systems,” Hypponen says, “they potentially create new vulnerabilities in these systems, making them more vulnerable for attacks by third parties.”

Hypponen believes that governments could arguably justify using malware in a small number of targeted cases against adversaries. But millions of malware implants being deployed by the NSA as part of an automated process, he says, would be “out of control.”

“That would definitely not be proportionate,” Hypponen says. “It couldn’t possibly be targeted and named. It sounds like wholesale infection and wholesale surveillance.”

The NSA declined to answer questions about its deployment of implants, pointing to a new presidential policy directive announced by President Obama. “As the president made clear on 17 January,” the agency said in a statement, “signals intelligence shall be collected exclusively where there is a foreign intelligence or counterintelligence purpose to support national and departmental missions, and not for any other purposes.”

Full article

On April 4, 2012 the FBI held a daylong “strategy meeting” with TransCanada Corporation, the company building the controversial Keystone XL pipeline, according to documents obtained by Earth Island Journal through a Freedom of Information Act request. The meeting, which took place in the agency’s Oklahoma City Field Office, came just three weeks after President Barack Obama visited the state vowing to cut through bureaucratic red tape and approve the southern portion of the pipeline. In a speech at a TransCanada pipe yard in Cushing, Oklahoma on March 22 Obama said: “Today, we’re making this new pipeline from Cushing to the Gulf a priority. So the southern leg of it we’re making a priority, and we’re going to go ahead and get that done.” The same day the White House issued an executive order expediting the permit and review process for energy infrastructure projects.

(Source: resistkxl)

aljazeeraamerica:

Hundreds of immigration detainees on hunger strike in Washington state

U.S. Immigration and Customs Enforcement (ICE) has confirmed that at least 550 detainees at the Northwest Detention Center in Washington state have launched a hunger strike.
The detainees, who have been refusing to eat since Friday, are demanding better food, safer working conditions and for President Barack Obama to sign an executive order ending deportations, according to Maru Mora Villalpando, founder of Latino Advocacy.
The hunger strikers, Villalpando said, are part of a growing, nationwide campaign against the U.S. immigration policy. Villalpando put the number of hunger strikers at 1,200, more than twice what ICE reported to Al Jazeera.

Read more
(Photo: Joe Barrentine/The News Tribune/AP Photo)

aljazeeraamerica:

Hundreds of immigration detainees on hunger strike in Washington state

U.S. Immigration and Customs Enforcement (ICE) has confirmed that at least 550 detainees at the Northwest Detention Center in Washington state have launched a hunger strike.

The detainees, who have been refusing to eat since Friday, are demanding better food, safer working conditions and for President Barack Obama to sign an executive order ending deportations, according to Maru Mora Villalpando, founder of Latino Advocacy.

The hunger strikers, Villalpando said, are part of a growing, nationwide campaign against the U.S. immigration policy. Villalpando put the number of hunger strikers at 1,200, more than twice what ICE reported to Al Jazeera.

Read more

(Photo: Joe Barrentine/The News Tribune/AP Photo)

(via aboriginalnewswire)

thecouscousqueen:

thepeoplesrecord:

euo:

Free Palestine

i want to cry.

(via poc-creators)

medievalpoc:

gehayi submitted to medievalpoc:

So I found this list of books that were banned from Tucson, Arizona schools when, in 2010, Arizona used a state law “to shut down the controversial classes that conservative legislators accused of politicizing Latino students.” The law…

fuckyeahmarxismleninism:

New York City: U.S. Out of Venezuela & Ukraine! Protest U.S.-funded attacks
Thursday, February 27 - 5pm to 6:30pm
Times Square, 43 St. & 7 Ave., Manhattan
What do we hear? No money for unemployment insurance? The minimum wage can’t be raised? Health care, education must be cut. Bull!!When the imperialist strategists want money, they get it. Billions of dollars have been made available for U.S.-backed crimes of sabotage, destabilization and aggressive intervention, including funds for the most reactionary fascist elements in Venezuela, pro-Nazis in the Ukraine, and for forces linked to al-Qaida in Syria.Say NO to ALL of Wall Street’s Wars!No U.S. money to sabotage other countries!Initiated by International Action Center http://www.IACenter.org/and Fight Imperialism Stand Together http://www.FightImperialism.org/

fuckyeahmarxismleninism:

New York City: U.S. Out of Venezuela & Ukraine! Protest U.S.-funded attacks

Thursday, February 27 - 5pm to 6:30pm

Times Square, 43 St. & 7 Ave., Manhattan

What do we hear? No money for unemployment insurance? The minimum wage can’t be raised? Health care, education must be cut. Bull!!

When the imperialist strategists want money, they get it. Billions of dollars have been made available for U.S.-backed crimes of sabotage, destabilization and aggressive intervention, including funds for the most reactionary fascist elements in Venezuela, pro-Nazis in the Ukraine, and for forces linked to al-Qaida in Syria.

Say NO to ALL of Wall Street’s Wars!
No U.S. money to sabotage other countries!

Initiated by International Action Center 
http://www.IACenter.org/
and Fight Imperialism Stand Together 
http://www.FightImperialism.org/

(via aboriginalnewswire)

eastafriqueen:

Protests by Eritrean and Sudanese refugees at the Holot Prison:

Eritrean and Sudanese Refugees held a 2 day Protest on from 2/17-2/18 at the Holot “Open” Prison in Southern Israel.

The Holot Detention Center is one of several detention centers Israel has opened specifically to imprison Asylum Seekers referred to as “Infiltrators” by The State of Israel. Most if not all of those imprisoned are Eritrean or Sudanese.

The 4th photo in this photoset shows some of those who are currently being held in Holot joining in the protests from behind the prison gates. Protestors spent the night on the grounds outside the prison to be ready for day 2 of the protests. 

The protestors are demanding that Holot and other prisons like it be shut down, those being held and all Asylum Seekers have their applications processed and that their human rights be observed and respected.

Photos from: activestills.org and 972mag.com.

(via aboriginalnewswire)

"When the Chicago Police Department sent one of its commanders to Robert McDaniel’s home last summer, the 22-year-old high school dropout was surprised. Though he lived in a neighborhood well-known for bloodshed on its streets, he hadn’t committed a crime or interacted with a police officer recently. And he didn’t have a violent criminal record, nor any gun violations. In August, he incredulously told theChicago Tribune, “I haven’t done nothing that the next kid growing up hadn’t done.” Yet, there stood the female police commander at his front door with a stern message: if you commit any crimes, there will be major consequences. We’re watching you. What McDaniel didn’t know was that he had been placed on the city’s “heat list” — an index of the roughly 400 people in the city of Chicago supposedly most likely to be involved in violent crime. Inspired by a Yale sociologist’s studies and compiled using an algorithm created by an engineer at the Illinois Institute of Technology, the heat list is just one example of the experiments the CPD is conducting as it attempts to push policing into the 21st century."

We Might Be Able To Predict the Future Using Social Media. But Should We? - On The Media (via aboriginalnewswire)

(via aboriginalnewswire)

gradientlair:

deliciousdannydevito:

burn these statistics into your mind. never forget who it is experiencing the brunt of the prison system’s violence

This is REALLY important. Also, look at this chart carefully. All of these people are marginalized yet notice the role of race here though. So when people seek to remove RACE from conceptions of intersectionality, of course purposely ignoring its epistemological origins, ask them WHY. 

gradientlair:

deliciousdannydevito:

burn these statistics into your mind. never forget who it is experiencing the brunt of the prison system’s violence

This is REALLY important. Also, look at this chart carefully. All of these people are marginalized yet notice the role of race here though. So when people seek to remove RACE from conceptions of intersectionality, of course purposely ignoring its epistemological origins, ask them WHY. 

(Source: primadollly, via projectqueer)