Jewboo
6th June 2013, 06:04 AM
http://www.secretsofthefed.com/wp-content/uploads/2013/02/Proyect-Indect-01.jpg
Electronic Police State
Seventeen key factors for judging the development of an electronic police state have been suggested:
Daily Documents: Requirement of state-issued identity documents and registration.
Border Issues: Inspections at borders, searching computers, demanding decryption of data.
Financial Tracking: State’s ability to search and record all financial transactions: Checks, credit card use, wires, etc.
Gag Orders: Criminal penalties if you tell someone the state is searching their records.
Anti-Crypto Laws: Outlawing or restricting cryptography and/or privacy enhancing technologies (anonymity networks).
Constitutional Protection: A lack of constitutional protections for the individual, or the overriding of such protections.
Data Storage Ability: The ability of the state to store the data they gather.
Data Search Ability: The ability to search the data they gather.
ISP Data Retention: States forcing Internet Service Providers to save detailed records of all their customers’ Internet usage.
Telephone Data Retention: States forcing telephone companies to record and save records of all their customers’ telephone usage.
Cell Phone Records: States forcing cellular telephone companies to record and save records of all their customers’ usage.
Medical records: States demanding records from all medical service providers and retaining the same
Enforcement Ability: The state’s ability to use overwhelming force (exemplified by SWAT (https://en.wikipedia.org/wiki/SWAT) Teams) to seize anyone they want, whenever they want.
Habeas Corpus: Lack of habeas corpus (https://en.wikipedia.org/wiki/Habeas_corpus) – the right not to be held in jail without prompt due process. Or, the overriding of such protections.
Police-Intel Barrier: The lack of a barrier between police organizations and intelligence organizations. Or, the overriding of such barriers.
Covert Hacking: State operatives removing – or adding! – digital evidence to/from private computers covertly. Covert hacking can make anyone appear as any kind of criminal desired. One example of covert hacking software is Magic Lantern (https://en.wikipedia.org/wiki/Magic_Lantern_%28software%29)
Loose Warrants: Warrants issued without careful examination of police statements and other justifications by a truly independent judge.
https://en.wikipedia.org/wiki/Electronic_police_state
https://en.wikipedia.org/wiki/Mass_surveillance#European_Union
Electronic Police State
Seventeen key factors for judging the development of an electronic police state have been suggested:
Daily Documents: Requirement of state-issued identity documents and registration.
Border Issues: Inspections at borders, searching computers, demanding decryption of data.
Financial Tracking: State’s ability to search and record all financial transactions: Checks, credit card use, wires, etc.
Gag Orders: Criminal penalties if you tell someone the state is searching their records.
Anti-Crypto Laws: Outlawing or restricting cryptography and/or privacy enhancing technologies (anonymity networks).
Constitutional Protection: A lack of constitutional protections for the individual, or the overriding of such protections.
Data Storage Ability: The ability of the state to store the data they gather.
Data Search Ability: The ability to search the data they gather.
ISP Data Retention: States forcing Internet Service Providers to save detailed records of all their customers’ Internet usage.
Telephone Data Retention: States forcing telephone companies to record and save records of all their customers’ telephone usage.
Cell Phone Records: States forcing cellular telephone companies to record and save records of all their customers’ usage.
Medical records: States demanding records from all medical service providers and retaining the same
Enforcement Ability: The state’s ability to use overwhelming force (exemplified by SWAT (https://en.wikipedia.org/wiki/SWAT) Teams) to seize anyone they want, whenever they want.
Habeas Corpus: Lack of habeas corpus (https://en.wikipedia.org/wiki/Habeas_corpus) – the right not to be held in jail without prompt due process. Or, the overriding of such protections.
Police-Intel Barrier: The lack of a barrier between police organizations and intelligence organizations. Or, the overriding of such barriers.
Covert Hacking: State operatives removing – or adding! – digital evidence to/from private computers covertly. Covert hacking can make anyone appear as any kind of criminal desired. One example of covert hacking software is Magic Lantern (https://en.wikipedia.org/wiki/Magic_Lantern_%28software%29)
Loose Warrants: Warrants issued without careful examination of police statements and other justifications by a truly independent judge.
https://en.wikipedia.org/wiki/Electronic_police_state
https://en.wikipedia.org/wiki/Mass_surveillance#European_Union