Logo Copyright © 2007 NCCG - All Rights Reserved
Return to Main Page

RESOURCES

Disclaimer

Introduction

Symphony of Truth

In a Nutshell

Topical Guide

5-144000

5 Commissions

10 Commandments

333 NCCG Number

144,000, The

A

Action Stations

Agency, Free

Alcohol

Angels

Anointing

Apostles

Apostolic Interviews

Apostolic Epistles

Archive, Complete

Articles & Sermons

Atheism

Atonement

B

Banners

Baptism, Water

Baptism, Fire

Becoming a Christian

Bible Codes

Bible Courses

Bible & Creed

C

Calendar of Festivals

Celibacy

Charismata & Tongues

Chavurat Bekorot

Christian Paganism

Chrism, Confirmation

Christmas

Church, Fellowship

Contact us

Constitution

Copyright

Covenants & Vows

Critics

Culture

Cults

D

Deliverance

Demons

Desperation

Diaries

Discipleship

Dreams

E

Ephraimite Page, The

Essene Christianity

Existentialism

F

Faith

Family, The

Feminism

FAQ

Festivals of Yahweh

Festivals Calendar

Freedom

G

Gay Christians

Gnosticism

Godhead, The

H

Heaven

Heresy

Healing

Health

Hebrew Roots

Hell

Hinduism

History

Holiness

Holy Echad Marriage

Holy Order, The

Home Education

Homosexuality

Human Nature

Humour

Hymnody

I

Intro to NCCG.ORG

Islam

J

Jewish Page, The

Judaism, Messianic

Judaism, Talmudic

K

KJV-Only Cult

L

Links

Love

M

Marriage & Romance

Membership

Miracles

Messianic Judaism

Mormonism

Music

Mysticism

N

NCCG Life

NCCG Origins

NCCG Organisation

NCCG, Spirit of

NCCG Theology

NDE's

Nefilim

New Age & Occult

NCMHL

NCMM

New Covenant Torah

Norwegian Website

O

Occult Book, The

Occult Page, The

Olive Branch

Orphanages

P

Paganism, Christian

Pentecost

Poetry

Politics

Prayer

Pre-existence

Priesthood

Prophecy

Q

Questions

R

Rapture

Reincarnation

Resurrection

Revelation

RDP Page

S

Sabbath

Salvation

Satanic Ritual Abuse

Satanism

Science

Sermons & Articles

Sermons Misc

Sermonettes

Sex

Smoking

Sonship

Stewardship

Suffering

Swedish Website

T

Talmudic Judaism

Testimonies

Tithing

Tongues & Charismata

Torah

Trinity

True Church, The

TV

U

UFO's

United Order, The

V

Visions

W

Wicca & the Occult

Women

World News

Y

Yah'shua (Jesus)

Yahweh

Z

Zion


    UK Government plans to extend powers to spy on personal computers

    Posted by Lev/Christopher on January 20, 2009 at 2:23am
    in Current Affairs

    Police could routinely hack into personal computers without the need for a warrant under new plans from the European Union.

    By Duncan Gardham, Security Correspondent
    Last Updated: 6:26PM GMT 04 Jan 2009
    The technique, known as "remote searching" involves bugging computers in homes and offices in order to monitor website use and email traffic.

    The Home Office is backing proposals by the EU council of ministers to extend electronic surveillance on private property.

    It would allow other European nations to request surveillance by British police.

    The proposals have raised concerns among civil liberties groups and Shami Chakrabati, director of Liberty, said: "These are very intrusive powers, as intrusive as someone busting down your door and coming into your home.

    "The public will want this to be controlled by new legislation and judicial authorisation. Without those safeguards it's a devastating blow to any notion of personal privacy."

    Dominic Grieve, the shadow home secretary, said the proposals may benefit law enforcement but added: "The exercise of such intrusive powers raises serious privacy issues. The government must explain how they would work in practice and what safeguards will be in place to prevent abuse."

    Terrorists, paedophiles and organised criminal gangs have been exploiting the internet in recent years as a way of avoiding traditional phone taps used by investigators.

    Britain already allows remote searching under the Computer Misuse Act 1990 and police have carried out a small number of operations among the 194 clandestine searches conducted last year.

    The police can use a number of techniques which include sending a computer virus through an email which infects the computer if opened.

    They can also use a surveillance vehicle or neighbouring property to hack into a wireless internet connection.

    The most intrusive technique involves breaking into a property to fit a device to a computer which logs key strokes on the keyboard and transmits the results back to a listening station.

    The Association of Chief Police Officers said remote surveillance was regulated by the Regulation of Investigatory Powers Act (Ripa).

    A spokesman said: "To be a valid authorisation the officer giving it must believe that when it is given, it is necessary to prevent or detect serious crime and the action is proportionate to what it seeks to achieve."

    MI5 and GCHQ monitor the internet through a network of "black boxes" attached to servers but they are looking at ways of expanding the system and want to be able to link up more government databases to catch criminals.

    A Home Office spokesman said there was no timescale for the introduction of the latest plans but added: "The UK has agreed to a strategic approach towards tackling cyber crime on the same basis as all member states.

    "We fully support work to develop an understanding of the scale and impact of electronic crime across the EU and will work with member states to develop the detail of the proposal."

    http://www.telegraph.co.uk/news/newstopics/politics/lawandorder/410...


    Purchase the WHOLE Website by clicking here

    Return to Main Index Page of NCCG.ORG


    This page was created on 5 May 2010
    Updated on 5 May 2010

    Copyright © 1987-2010 NCCG - All Rights Reserved