I'm trying to help you make a realization

policymic:

America’s first Muslim fraternity may change your idea of fraternities … and Muslims

When you think of fraternities, the first things that usually come to mind are house parties and keg stands, not kufis and prayer rugs. But the brothers of Alpha Lambda Mu — or Alif Laam Meem, as they are also known — are out to change people’s ideas of fraternities, as well as their perceptions of young American Muslims.

ALM, the first Muslim fraternity in the U.S., was founded last year by Ali Mahmoud, a junior at the University of Texas, Dallas. Since then, chapters have opened at Cornell University and University of California, San Diego, and there are plans to expand this fall at San Diego State and the University of Florida.

Read moreFollow policymic

(via rhydonmyhardon)

underunderstood:

nowyoukno:

Now You Know (Source)

This is an important event in history, especially Canadian and feminist history. So I’m going to tell you more about it.
1) The shooter had been rejected from Ecole Polytechnique prior to the shooting. He blamed this on these female students, claiming that they were feminists who ruined his life.
2) In the first classroom he entered, he demanded the men leave before shooting at the women. No man attempted to stop him as they left. Take that as you will. (Later on, several men did get injured trying to stop him in the hallways.)
3) In his suicide letter, he believed that feminists were attempting to be more powerful than men, and were trying to take men’s rights away.4) Feminists were actually blamed by some for the massacre. The line of logic was “if feminists didn’t make women’s rights an issue, Levine wouldn’t have wanted to kill feminists!” Victim blaming at its finest.
5) The mainstream news media often did not publicize the outrage from women’s groups, and often preferred those who took a calm approach. Ironic, that.
6) Despite him literally having a hit list of feminist icons in his final letter, several newscasters questioned whether or not the shooting was a sexist act, some even denying the idea outright.
8) Many memorials for the victims have been created, and rightly so; however, some prominent ones were erected in poor neighbourhoods where many Native women were killed every day in the same time period as the shooting (see: Marker of Change, Vancouver) (see: Missing Women, Vancouver). Basically, white feminism happened. 
The entire event was nothing short of a tragedy, and I recommend that everyone read up on it and the resulting aftermath. It’s… interesting to see how the media tried to turn it into a random act of psychopathy instead of what it was (we know better now, luckily). The reactions (memorials, etc) to the deaths of these 14 White, middle class women as compared to the deaths of 60+ Native, lower class women are also “interesting” to compare. (By interesting, I mean infuriating.)

underunderstood:

nowyoukno:

Now You Know (Source)

This is an important event in history, especially Canadian and feminist history. So I’m going to tell you more about it.

1) The shooter had been rejected from Ecole Polytechnique prior to the shooting. He blamed this on these female students, claiming that they were feminists who ruined his life.

2) In the first classroom he entered, he demanded the men leave before shooting at the women. No man attempted to stop him as they left. Take that as you will. (Later on, several men did get injured trying to stop him in the hallways.)

3) In his suicide letter, he believed that feminists were attempting to be more powerful than men, and were trying to take men’s rights away.
4) Feminists were actually blamed by some for the massacre. The line of logic was “if feminists didn’t make women’s rights an issue, Levine wouldn’t have wanted to kill feminists!” Victim blaming at its finest.

5) The mainstream news media often did not publicize the outrage from women’s groups, and often preferred those who took a calm approach. Ironic, that.

6) Despite him literally having a hit list of feminist icons in his final letter, several newscasters questioned whether or not the shooting was a sexist act, some even denying the idea outright.

8) Many memorials for the victims have been created, and rightly so; however, some prominent ones were erected in poor neighbourhoods where many Native women were killed every day in the same time period as the shooting (see: Marker of Change, Vancouver) (see: Missing Women, Vancouver). Basically, white feminism happened. 

The entire event was nothing short of a tragedy, and I recommend that everyone read up on it and the resulting aftermath. It’s… interesting to see how the media tried to turn it into a random act of psychopathy instead of what it was (we know better now, luckily). The reactions (memorials, etc) to the deaths of these 14 White, middle class women as compared to the deaths of 60+ Native, lower class women are also “interesting” to compare. (By interesting, I mean infuriating.)

(via nowyoukno)

laliberty:

The Complete Interactive Guide To How The NSA Spies On Everything You Do

With all the hoopla about missing airplanes, renewed wars of the cold variety, and rigged markets, it is easy to forget that America is now officially a totalitarian state of the Orwellian kind, where the population has - involuntarily - ceded all of its privacy in exchange for… something. Because it certainly isn’t security. So we are happy to provide a reminder of just this, especially since as BusinessWeek notes, it gets harder to keep track of all the bizarre ways the National Security Agency has cooked up to spy on people and governments. This may help.
Data in Motion
NSA’s spies divide targets into two broad categories: data in motion and data at rest. Information moving to and from mobile phones, computers, data centers, and satellites is often easier to grab, and the agency sucks up vast amounts worldwide. Yet common data such as e-mail is often protected with encryption once it leaves a device, making it harder—but not impossible—to crack.
Data at Rest
Retrieving information from hard drives, overseas data centers, or cell phones is more difficult, but it’s often more valuable because stored data is less likely to be encrypted, and spies can zero in on exactly what they want. NSA lawyers can compel U.S. companies to hand over some of it; agency hackers target the most coveted and fortified secrets inside computers of foreign governments.
Where the Data Goes
Much of the data the NSA compiles from all these efforts will be stored in its million-square-foot data center near Bluffdale, Utah. It can hold an estimated 12 exabytes of data. An exabyte is the equivalent of 1 billion gigabytes.
And some of the specific methods the NSA uses to spy on US citizens and the occasional offshore “terrorist”:
Call Recorder - The agency can intercept and store for up to a month 100 percent of a foreign country’s telephone calls, which can be sorted and played back.
Clone Phones - Foreign targets’ cell phones can be surreptitiously swapped for an identical model with built-in listening and data collection devices.
Fake Shops - Diplomats at the 2009 G-20 summit in London were tricked, with the NSA’s help, into using an Internet cafe that had been rigged to send data to British intelligence.
Travel Trackers - The NSA has several ways to follow the movements of intelligence targets as they get off planes, drive across borders, or move around a city, including an implant that directs a cell phone SIM card to send geolocation data via text message.
Special Delivery - Spies intercept computers that foreign targets buy online, fit them with devices that send data to the NSA, and box them back up for normal delivery.
X-Ray Vision - Radar waves beamed into a room can detect what is being typed on a keyboard or displayed on a computer screen.
Credit Cards - The agency tapped into the network of Visa and major banking systems to collect troves of transaction data.
Satellites - The NSA infiltrated German satellite communications used in remote locations such as drilling platforms—and by the country’s diplomats.
Gamer Spies - Agency employees join World of Warcraft and Second Life communities, hunting for criminal networks and recruiting informants. They’ve also infiltrated Microsoft’s Xbox Live network.
Cell Towers - Base stations mimicking cell towers siphon location data from targets’ phones. Agents can also intercept mobile calls with a shoe-box-size receiver.
Submarines - The agency can collect worldwide Internet traffic with a modified nuclear submarine that taps undersea fiber-optic cables—allowing spies to vacuum data from millions of users.
Secret Selfies - Malware planted in an iPhone can secretly activate its camera and microphone, turning it into a listening device. Malware for Windows mobile phones enables complete remote control of the handset.
Fake Rocks - Transmitters hidden inside rocks and other objects can receive information from NSA taps implanted in nearby computers even if they’re “air gapped” machines or networks that aren’t hooked up to the Internet—among the hardest of all digital targets.
The Stasi is spinning in its grave… with jealousy. The full interactive presentation can be found [here].

laliberty:

The Complete Interactive Guide To How The NSA Spies On Everything You Do

With all the hoopla about missing airplanes, renewed wars of the cold variety, and rigged markets, it is easy to forget that America is now officially a totalitarian state of the Orwellian kind, where the population has - involuntarily - ceded all of its privacy in exchange for… something. Because it certainly isn’t security. So we are happy to provide a reminder of just this, especially since as BusinessWeek notes, it gets harder to keep track of all the bizarre ways the National Security Agency has cooked up to spy on people and governments. This may help.

Data in Motion

NSA’s spies divide targets into two broad categories: data in motion and data at rest. Information moving to and from mobile phones, computers, data centers, and satellites is often easier to grab, and the agency sucks up vast amounts worldwide. Yet common data such as e-mail is often protected with encryption once it leaves a device, making it harder—but not impossible—to crack.

Data at Rest

Retrieving information from hard drives, overseas data centers, or cell phones is more difficult, but it’s often more valuable because stored data is less likely to be encrypted, and spies can zero in on exactly what they want. NSA lawyers can compel U.S. companies to hand over some of it; agency hackers target the most coveted and fortified secrets inside computers of foreign governments.

Where the Data Goes

Much of the data the NSA compiles from all these efforts will be stored in its million-square-foot data center near Bluffdale, Utah. It can hold an estimated 12 exabytes of data. An exabyte is the equivalent of 1 billion gigabytes.

And some of the specific methods the NSA uses to spy on US citizens and the occasional offshore “terrorist”:

  • Call Recorder - The agency can intercept and store for up to a month 100 percent of a foreign country’s telephone calls, which can be sorted and played back.
  • Clone Phones - Foreign targets’ cell phones can be surreptitiously swapped for an identical model with built-in listening and data collection devices.
  • Fake Shops - Diplomats at the 2009 G-20 summit in London were tricked, with the NSA’s help, into using an Internet cafe that had been rigged to send data to British intelligence.
  • Travel Trackers - The NSA has several ways to follow the movements of intelligence targets as they get off planes, drive across borders, or move around a city, including an implant that directs a cell phone SIM card to send geolocation data via text message.
  • Special Delivery - Spies intercept computers that foreign targets buy online, fit them with devices that send data to the NSA, and box them back up for normal delivery.
  • X-Ray Vision - Radar waves beamed into a room can detect what is being typed on a keyboard or displayed on a computer screen.
  • Credit Cards - The agency tapped into the network of Visa and major banking systems to collect troves of transaction data.
  • Satellites - The NSA infiltrated German satellite communications used in remote locations such as drilling platforms—and by the country’s diplomats.
  • Gamer Spies - Agency employees join World of Warcraft and Second Life communities, hunting for criminal networks and recruiting informants. They’ve also infiltrated Microsoft’s Xbox Live network.
  • Cell Towers - Base stations mimicking cell towers siphon location data from targets’ phones. Agents can also intercept mobile calls with a shoe-box-size receiver.
  • Submarines - The agency can collect worldwide Internet traffic with a modified nuclear submarine that taps undersea fiber-optic cables—allowing spies to vacuum data from millions of users.
  • Secret Selfies - Malware planted in an iPhone can secretly activate its camera and microphone, turning it into a listening device. Malware for Windows mobile phones enables complete remote control of the handset.
  • Fake Rocks - Transmitters hidden inside rocks and other objects can receive information from NSA taps implanted in nearby computers even if they’re “air gapped” machines or networks that aren’t hooked up to the Internet—among the hardest of all digital targets.

The Stasi is spinning in its grave… with jealousy. The full interactive presentation can be found [here].