Does anyone know how this even works? Is the technology for this already in place?

    •  MajesticFlame   ( @MajesticFlame@lemmy.one ) 
      link
      fedilink
      English
      arrow-up
      31
      ·
      2 years ago

      Sure, the issue is that, with no transparency, cops will use it if they are courios what they friends are doing. This is already known to happen in the US, where cops used it to stalk their SOs or even in extreme cases women they were starting to date.

      If they already have the technology in their hands, there is no way to stop them.

        •  MajesticFlame   ( @MajesticFlame@lemmy.one ) 
          link
          fedilink
          English
          arrow-up
          10
          ·
          2 years ago

          They should also need it in the US. The issue is, that if the tool is in the hands of the cops, there is no way to check who they spied on (and therefore if they had warrant).

          At least if it was executed by a comercial entity, they can check the warrants and be liable if they do it without one. But that is very likely not how it will be implemented. The cops will get the tools to do with as they please.

          As an example, one state in the US (forgot which one) put in a law that requires the police to submit every data search warrant into a public database so that they could be audited by the public. After they compared the contents of the database to number of requests in companies transparency reports, it turned out there were over 5 times as many requests in the state then what was reported in the database, despite reporting being required by law.

    • Those caveats are just to get the laws passes.

      Online piracy already carries punishment up to 3 years. All it takes them is make a law that technically holds 5 years but gets pardoned in practice.

      Labeling someone a terrorist can be as simple as “collective undertaking with the aim of seriously disturbing public order through intimidation” aka protesting…