Image source Internet |
Kimmo Huosionmaa
In Finland is propounded the law, what denies example loading receipts of explosives from the net. Here is one very dangerous problem with this kind of acts. That kind of actions where some document uploading from the internet becomes a crime might become a weapon for censorship. And the ministers should understand that terrorism doesn't stop by making laws. Only Criminals doesn't care anything about lawbook and laws, and they continue their actions even those kind of laws will be made.
That's why that is so difficult to change weapon laws in the USA. The people who defend free carrying for weapons say, that criminals don't care about laws. And if some weapons will take away from people, there will become a situation, where criminals will get the freedom to shoot innocent people, who are not able to defend themselves because their guns are collected away.
https://www.mtv.fi/uutiset/rikos/artikkeli/terrorismin-itseopiskelusta-halutaan-tehda-rangaistavaa/6649700#gs.9VqnpAI
In the real world, there is possible to use terrorism as a wooden horse, what can hide the real threat for the democracy or anti-crime work. In real life, only free information guarantees that the government might get the real information about actions against the public security. And does that law consist pictures of toxic waste dumping and another kind of actions, because all water system might be poisoned by dioxide?
Or probably the aircraft security is more effective if those security guards don't know about risks of antimagnetic weapons? But when we are talking about dangerous material, there might be found some PDF's in the net with receipts how to make some explosives. There is one risk in that kind of material. Those PDF's might equipped with tracking applet, what uncovers that computer, where that material has been uploaded.
There is also a possibility to write those pages information down by using paper and pen, but those tracking devices will notice if somebody waists time too long with those pages, what might be so-called honeypots or "trap servers", what will track any computer across the web, if that system takes screenshots or the user stands too long in those pages. If somebody studies terrorist methodology under some other person supervision, that person must have the serious reason for that. But here we must say that if security personnel doesn't know methods, what criminals use, they can't prevent those attacks, and they can't find equipment what terrorists might use in those attacks.
Comments
Post a Comment