Sunday, January 11, 2009

Largest Pro-Palestine Rally in Chicago History

On Friday the 9th of January, 2009, Chicago witnessed a 10,000 person strong rally and march against Israel's bombing and occupation of Palestine and the Gaza Strip. Highlights of the rally included Dick Reilly's speech in front of the Israeli consulate, where he spoke of those showing great courage- in Palestine, and those protesting the bombings around the world, and those showing great cowardice- the US house and Senate, including the entire Illinois delegation, which voted to support the bombings of Gaza. A representative of the Venezuelan consulate also spoke, and they condemned Israel's bombings and mentioned how Hugo Chavez, the President of Venezuela, had kicked out the Israeli ambassador as a protest against the bombings.

I tried to take more pictures and video, however my camera has been dropped a few to many times and simply will not work any more. I was lucky to get these four shots of the march leaving Daley plaza and heading towards the Israeli consulate.






1 comment:

  1. FYI on security:

    *** CELL-PHONE USERS ***
    If your cell phone has a microphone your phone's microphone can be used by the FBI to monitor conversations that are going on nearby the phone, even when it is off (does your alarm work even when the phone is off?). Taking out your battery when your not using your phone can solve that problem.

    For more information on law enforcement using cell phone microphones to tap nearby conversations:
    1) McCullagh, Declan; Anne Broache (December 1, 2006). "FBI taps cell phone mic as eavesdropping tool" CNet News. http://news.cnet.com/FBI-taps-cell-phone-mic-as-eavesdropping-tool/2100-1029_3-6140191.html. Retrieved on 2009-03-14.

    2) Odell, Mark (August 1, 2005). "Use of mobile helped police keep tabs on suspect" (in English). Financial Times. http://news.ft.com/cms/s/7166b8a2-02cb-11da-84e5-00000e2511c8.html. Retrieved on 2009-03-14.

    *** HIDING IP ADDRESS WITH TOR ***
    Tor will not protect your transmitted information unless it is encrypted by your computer and decrypted by the end user. Additionally, since May 14, 2007 all telecommunications carriers in the US were required by the Communications Assistance for Law Enforcement Act (CALEA) of 1994 to install hardware for law enforcement agencies to perform unlimited warrantless wiretapping of all civilian electronic communications, including real time monitoring of phone calls, email, and web traffic. Due to the possibilites enabled by CALEA compliance, unless your encryption method is impeccable (i.e. the random number generator is truly random) your internet activity will not be certainly secure from the eyes of the US Government even if you use Tor and encrypt your data as the Tor folks suggest.
    For more info, see:
    1) Kim Zetter's article in Wired on September 9, 2007;
    http://www.wired.com/politics/security/news/2007/09/embassy_hacks?currentPage=1

    2) The Tor project's wiki site FAQs: https://wiki.torproject.org/noreply/TheOnionRouter/TorFAQ

    ReplyDelete

Intense Debate Comments