"In an Electronic Police State, every surveillance camera recording, every e-mail you send, every Internet site you surf, every post you make, every check you write, every credit card swipe, every cell phone ping… are all criminal evidence, and they are held in searchable databases, for a long, long time," the report said.Access the full report here.
"Whoever holds this evidence can make you look very, very bad whenever they care enough to do so. You can be prosecuted whenever they feel like it – the evidence is already in their database," the report continued. "Perhaps you trust that your ruler will only use his evidence archives to hurt bad people. Will you also trust his successor? Do you also trust all of his subordinates, every government worker and every policeman?
"If some leader behaves badly, will you really stand up to oppose him or her? Would you still do it if he had all the e-mails you sent when you were depressed? Or if she has records of every porn site you've ever surfed? Or if he knows every phone call you've ever made? Or if she knows everyone you've ever sent money to?" the report asks.
"This system hasn't yet reached its full shape, but all of the basics are in place and it is not far from complete in some places," the report said."
In related news:
"Rep. Peter King, R-N.Y., has sponsored H.R. 2159, the Denying Firearms and Explosives to Dangerous Terrorists Act of 2009, which permits the attorney general to deny transfer of a firearm to any "known or suspected dangerous terrorist." The bill requires only that the potential firearm transferee is "appropriately suspected" of preparing for a terrorist act and that the attorney general "has a reasonable belief" that the gun might be used in connection with terrorism. . . .
Pratt further warned WND of the potential overlap of H.R. 2159 and a recent DHS memo that warned against potential violence from "right-wing extremists," such as those concerned about illegal immigration, increasing federal power, restrictions on firearms, abortion and the loss of U.S. sovereignty."
Doesn't take much to connect the dots and see how the government could use its surveillance databases to document how someone could be a "dangerous terrorist" under this statute for purposes of abrogating their Second Amendment rights.
No comments:
Post a Comment