Absolutely personal data

The general electronic file and its analysis as a contemporary dangerous phenomenon

Written by: Dimitris Kakavelakis

With the excuse of anti-terrorism and protection. So that today humanity is controlled by the CIA -mainly- by the KA-GGE-MPE, the Indranges Service and all the other secret services that trade or fight through the Internet Google - Facebook, Yahoo, Amazon, etc. With Big Data, which means “Generalization of the electronic functioning of the world”.

internet spy

ALL SUBJECTS IN THE FILE ELECTRONIC COMPONENT

Now all of us - all and everything - are locked in algorithms, with a dictatorship of them , which are SOLD, as a partial and generalized speculative exploitation, as the professor of the University of Strasbourg and corresponding member of the Academy of Athens Nikitas Aliprantis states in his important text. To reveal the modern storm of the electronic file endangers individual freedoms, which includes the critical protection of private life... Which, of course, mainly in our country had been abolished since the time of the Metaxas dictatorship in combination with the torture of dissidents in that regime. For there to be after the civil war a more general dossier that was finally abolished after the post-colonialism of 1974. But now the global Internet dossier has abolished all traditional dossiers, with the official American state, through the NSA, denying the private sphere and removes the privacy of communication with prying box and tracking. As happened with the European Union, with the legislation of which all residents of the euro area are monitored (even through "smart" electronic phones), potentially considered as suspects. America and all European governments are considered "suspicious" as it was revealed in 2013 for their monitoring by the American intelligence service (p. 58) in the 32 text of Professor N. Aliprantis in his book "Critical Bequests of the 20th Century in Societies of today".

THE INVOLVED, EXPRESSED AND VARIOUS GREEK ANTI-FRAUDERS IN THE METAXIC DICTATOR

Επανειλημμένα έχω γράψει εναντίον όλων των μεγάλων μυστικών υπηρεσιών για την παρακολούθηση των πολιτών, όλων των επιπέδων για να τους ν, να τους εκβιάζουν, για να γνωρίζουν -κυρίως για τους πολιτικούς, τους οικονομικούς, τους κοινωνικούς, αγωνιστικούς φορείς όλο το φάσμα των δραστηριοτήτων τους. Εμείς, σαν χώρα ζήσαμε επανειλημμένως τις κατά περιόδους μυστικές υπηρεσίες μας, ιδιαίτερα από την περίοδο της δικτατορίας Μεταξά με τον μηχανισμό μυστικών υπηρεσιών (υπό τον τότε προκαλούντα φόβο και τρόμο των Ελλήνων πολιτών) του Μανιαδάκη. Ο οποίος από τότε συνδύαζε τις μυστικές υπηρεσίες, με φανερούς και μυστικούς βασανισμούς των Ελλήνων πολιτών, οι οποίοι εθεωρούντο ύποπτοι (αλλά και ανύποπτοι) κατά του φασιστικού καθεστώτος της 4ης Αυγούστου… Για να χρησιμοποιήσει μεθόδους βασανισμών, όπως η δοκιμασία του καθίσματος βασανιζομένων σε κολόνες πάγου κ.λπ. Ετσι, μπορεί να πει κανείς ότι απάνθρωπες και εφιαλτικές κατατυραννεύσεις υπόπτων και αθώων πολιτών -κυρίως ως πρόληψη κατά της τρομοκρατίας, μπορούμε να πούμε ότι οι κολόνες πάγου και άλλα βασανιστήρια του Μανιαδάκη αποτέλεσαν ένα είδος ομοιότητας τόσο με το Γκουαντάναμο της Αμερικής, αλλά όσο και με όλα τα κέντρα των μυστικών υπηρεσιών των μεγάλων, κυρίως κρατών που κυρίευσαν βουνά φακέλων για παρακολούθηση αντιφρονούντων και για εγκλεισμούς τους σε απομονωμένες περιοχές ή κέντρα βασανισμών όπως ήταν στον καιρό της χούντας των Συνταγματαρχών του ΕΑΤ – ΕΣΑΤ μέσα στο κέντρο της Αθήνας. Ή όπως προηγούμενα γινότανε μετά τον εμφύλιο στα υπόγεια της Ασφάλειας Αθηνών, στην οδό Μαυρομματαίων. Εκεί που αργότερα εγκαταστάθηκε στους ορόφους του ανακαινισθέντος αυτού μεγάρου το Πολιτισμού που στεγάζεται ακόμα εκεί.

MINISTRY OF CULTURE IN THE PART OF SECURITY - VASANISM In order that the place of martyrdom - torture with ... culture, can be "exalted", a constant manifestation of the importance of an essential concept and act that must characterize the humanitarian (and not bless the anti-human) culture. But nowadays a profane civilization of rotten savagery is predominantly dominant. Which, with their crimes, serve salvation, police, military and sub-state, both secretly and with torture.

THE COLLECTION OF THE DISCOVERIES FOR CIA CL.

Like the ones revealed a few days ago by Congress about the inhumane torture activities carried out by the terrible US intelligence service of the SIA, revelations that have been cohesive, essentially for the SIA. as well as for all the secret and intelligent services of all the powerful and sovereign states yesterday and today, as well as the secret services of the small states as well as ours as was the older CPS and the present EPPYM. With the difference that all these smaller secret services are co-operating and dependent on the secret services of the great states that all together today are collaborating or opposed to monitoring citizens in their countries and globally.

THE GREAT ELECTRONIC SUCCESS IS MONITORED ...

Today, however, secret service surveillance as torture continues to be carried out is facilitated through the global web of the Internet so that no citizen connected to mobile and immobile electronic, digital and satellite communications can escape the control and their dependency. Professor Nikitas Aliprantis gives us an analysis of this whole reality of electronic monitoring in the third part of his book. With the title of the book: critical legacies of the 20th century in today's societies. In this book - which we will present in our next article, the third chapter is entitled: "General file: Sociological analysis of a dangerous phenomenon" from this also important text we quote selective passages such as:

SKILLS OF THE ELECTRONIC DEFINITION OF OUR LIFE

August 5, 2013 the French newspaper Liberatium detailed the facts that people's lives are permanently "spyed upon" electronically by "smart" mobiles connected to the Internet. From loyalty cards, to social networks, even public transport cards. In other words, with new technologies we all live in supervised freedom with our implicit and almost always unconscious consent, as an irrefutable presumption. These technological means transform the smallest movements into "personal data". The recent "prism" scandal revealed how social networks and web giants were feeding information to US spy agencies. And the first question is: why do INTERNET users consent to this continuous monitoring.

WHO DISMISSES MOBILE?

Of course it is possible to refuse to have a mobile phone (I do not have until when it will be possible?) Or be on facebook (I am not again, which means a forced resignation). With the ability to use electronic means - without being supervised - exists but has many limitations. However, the writer Nikitas Aliprantis, who is a professor at the University of Strasbourg, Professor of the Democritus University of Thrace, and a corresponding member of the Academy of Athens, then follows this extremely interesting text analyzing four points of the abolition of the privacy of people on a global scale in the following subtitles:

ADVANCED FILE AND PASSION FILE

A) Inseparable folders in a triple sense: a) With the indiscriminate file with a reference to something that is not distinguishable, b) The lack of (necessary) discrimination, that is, the fact that it concerns everyone, c) The most alarming - , which may have many considerations, especially illegal. To be archived based on the indiscriminate file, a data without at least the conscious consent of the person concerned. While the identification of persons is used by the public authorities for security purposes in the second IDA, then everyone is indiscriminately made suspect by Professor Aliprantis. In order to emphasize this, it is extremely dangerous, since it involves an electronic file and people who are not implicated in any illegal activity. However, it is also written that the third notion of an indiscriminate data archiving file can be used for illegal purposes that offend the privacy of individuals, but even speculative exploitation.

BIG DATA REMAINS THE LAST DAMAGE OF PRIVATE LIFE?

Further the author in the second part of his text develops the topic titled: Generalized Profitable Media Data Collection of “” of data, which works through the so-called Big Data which means the generalization of the electronic functioning of the world. With the big question being: Will Big Data remove the last barrier to privacy? Certainly yes. An answer made even more certain by the revelation made by the European Council on October 24-25, 2013, when it decided to postpone the adoption of rules for the protection of the personal data of European citizens. And this, shortly after the disclosure of the electronic surveillance of European governments by the American intelligence service. For professor N. Aliprantis to emphasize that: "This postponement is, as is understandable, a huge gift to the giants of the internet (Google, Facebook, Yahoo and Amazon)". The third last part of this important text of N. Alipranti's book is entitled: "The electronic file and the dangers of freedoms". To refer to IDs, biometric measurements and their forms, biometric passport etc. all of which were overcome with the modern general electronic file of the electronic surveillance of the citizens of Greece, Europe, and the world. In order to arrive at the dth part to analyze the physical resistance of the citizens against the violation of n. their lives. But all this facilitates, with the justification of anti-terrorist protection, the continuation of incarcerations, disappearances, beheadings as they are continued today by modern electronic totalitarianism!

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).