butlincat's blog - a blog...a seeker of the truth, the whole truth, and nothing but the truth...

butlincat's blog...a seeker of the truth, the whole truth, and nothing but the truth...

This site is shadowbanned, as daily viewing figures prove since March 2018, when before then the figures were 10 times as much as they have been since. "Shadowbanning" is the act of blocking or partially blocking a user or their content from an online community - see more: What is SHADOWBANNING: Twitter: are you shadowbanned? - truther sites are targeted, eg: NewsGuard Launches War on Alternative Media - "Censorship is the tool of those who have the need to hide actualities from themselves and from others." - Charles Bukowski

“As long as justice is postponed we always stand on the verge of these darker nights of social disruption”...so said Martin Luther King Jr. in a speech on March 14, 1968, just three weeks before he was assassinated.

...hello + welcome!....FAIR USE NOTICE: This site may contain copyrighted (© ) material. Such material is made available to advance understanding of ecological, political, human rights, economic, democracy, scientific, moral, ethical, and social justice issues. This constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, this material is distributed for analysis, commentary, educational and intellectual purposes. In some cases comedy and parody have been recognized as fair use.

Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License..... For more information please visit:

http://www.law.cornell.edu/uscode/text/17/107

Targeted? victimised?...been dealt particularly "rough justice"? meet some who have, and still are! VICTIMS OF THE STATE https://butlincat.com/

This blog is for regular updates + info connected to the ILLUMINATI, 911, 7/7, recent UFO sightings, CHEMTRAILS, MORGELLONS [98% OF WORLDS POPULATION HAS MORGELLONS DISEASE, they claim - see #Morgellons & #SmartDust Infect Individuals to be Tracked via Satellite https://www.youtu.be/RvNDk2t8TGk], MIND CONTROL {MK ULTRA.MANNEQUIN etc.}, ELECTRONIC SURVEILLANCE, JOHN LEAR, ALEX COLLIER, PROJECT CAMELOT, PROJECT AVALON, MICHAEL TSARION, JORDAN MAXWELL, PRESTON NICHOLS, AL BIELEK, STEWART SWERDELOW, DUNCAN CAMERON, WILLIAM COOPER, PHIL SCHNEIDER, David Wilcock, FRITZ SPRINGMEIER, BILLY MEIER, MAX IGAN, STEW WEBB, "Democracy Now!", Henry Makow, Linda Moulton-Howe, Dan Burisch, Webster Tarpley, Brother Nathanael, Timothy Good, Miles Johnson, Jim Marrs, John Hutchison, Wikileaks, Julian Assange, Dr. John Hall, Edward Snowden, Vladimir Putin, John Lennon, Bob Zimmerman + many more who can only be described as heroes...

Wordpress: VICTIMS OF THE STATE https://butlincat.com/

Twitter: http://www.twitter.com/butlincat

facebook: https://www.facebook.com/#!/butlin.cat.9

"Do not be deceived, God is not mocked; for whatever a man sows, this he will also reap." Galatians 6:7

......Namaste.....John Graham - butlincat

Jai guru deva om जय गुरुदेव ॐ


Thursday, 6 December 2018

DOMESTIC SURVEILLANCE - DAYS OF MY LIFE...with spooks + "SNOOPERS CHARTER" + archive + Government spy programme will monitor every phone call, text and email

DOMESTIC SURVEILLANCE - DAYS OF MY LIFE...with spooks

Its comical. You get in a cab [as I did, on Sunday, to go to the station], and after a while, chatting to the driver, you find he knows more about you than you would've imagined. The chat goes to the subject of "corruption", after you've been asked where you're going and why? [typical probing] and one wonders who else has been "primed", with one's name being "flagged", as I've been made aware of so many times now, when visiting agencies, or wherever, around myself, that I have no choice but to use. Different locations - different flagging. They always deny it, of course, when asked "is my name flagged on your system - what does it say?" or whatever, but I know it's there simply by the body language or speech used from the person who's being asked - a very telling giveaway. Try harder spooks!! Get a real life! As if they haven't better things to do - my local plod etc. - what a joke! They began in 2010 by taking down the Hollie Greig posters I put up around me, then it progressed, till it became very obvious, and easy to spot, not much later. 

They prime people with info - people you are to come into contact with. Eg. the guy "Frank", from way back in 2011, the business owner, who came round from miles away who thought he was going to sell me a particularly worthless laptop I saw his advert for, online. What he said, mentioning America out of the blue [I had connections in America], and the way his voice and body language changed when he said it, let me know something was afoot. It was the only time he actually looked me in the eye when he said that, too. Its not common when one invites an invited person into one's abode that they don't look you in the eye until 10 minutes into the scene. I was thinking it was weird as it was happening - why couldn't the guy look at me? When his entire demeanour changed ,and he said, out of the blue "I have a [family member] in America..."  I knew he'd been primed and this was a fishing expedition. 

Shortly after that, the monitoring began in earnest - and at one point the Internet disruption I was paying for was so bad I was having to use an Internet cafe for 6 weeks until the director of a certain well known ISP company - who I'd complained to about this interference to my service [by spooks] - could sort out my broadband problems, which they finally did, after incredible hassle, and I was refunded for 3 months line rental because of the interference with service - caused by the very same people who primed the cab driver, etc. 2 days ago. This kind of cr-p happens all the time. They deny any flagging,  or monitoring, of course, and will go out of their way to deny it, as conversations I've had very recently or reply letters reveal after the subject had been broached. But we know, spooks - we know, and its not rocket science.
 I know I caught you on the hop on Sunday, when I caught that early train into London - but you soon caught up - I saw the 2 short [5'6"?] female officers peering at me from the corner, for a few seconds only, looking intent, talking, then disappearing back round the corner. You think I don't notice tiny things like that, or when you follow me around, or put silly females in my path who come up to me and ask me crazy questions, like "where's Asda?" - twice, when we're standing right outside the place [2014]? 


And what about when I turned that corner, just by the Aldi roundabout, and the female student-looking type, or trainee spook, was already looking at me square in the eyes as I turned the corner [that is so very odd!], and walked straight up to me, standing very close to me, asking where the nearest bank was as she needed money? Come on. That's so cheap a stunt. The bank was round another corner down a nearby road 250 yards away - but how come she had a smile of her face whilst looking at me - in the eyes - when I turned that corner? Can you imagine how bizarre that acting was? I believe you must've dropped her off by car immediately preceeding this event, to get her [and the rest] ahead of me, ready for the verbal. You probably had people watching the event too, close by, and this person [and all the rest at other events, or some of them anyway] are probably wired for sound so anything said can be used later as evidence. 

What about the tiny very very young female with the small brown and white terrier dog, whilst waiting at the busstop that's now been moved, that I used nearly every day? Did you think I missed that one? Of course I didn't.  And, at the busstop, whilst waiting for the bus - who was the old guy on his mobile phone, 20 yards away, looking away from me all the time I was noticing him, leaning on the gate post. 


They also use nondescript very ordinary looking people - including teenage girls to pensioners, both male and female who are recruited to pop along to surveille and watch whoever is deemed a target - I know because ive been witnessing this for months and have been accosted by many of them - particularly young females and older tarty types - possibly prostitutes or ex-prostitutes [often employed by police or connected]. 

It would take literally all night to list every event since those posters were taken down in 2010, 2 weeks after they were put up, by that very busstop, a week after I gave a couple  of the posters to a person who lives in Highgate, London, around the time I met Kevin Annett + co. too, at the same location. 
When you hassled me over 2 days beginning at the anti-pope march, and I complained to the IPCC about it, and 6 months later, the verdict back from the IPCC was "no case to answer" - noone from your side could recall what the heck I was complaining about, even though I'd given you the officer's numbers + names, etc etc.? Oh, and funny how that cab driver on Sunday, around 07.15BST, during the station trip mentioned an IPCC complaint he'd had disregarded. What an odd coincidence!! or is it "ham acting"? 


September 2010 was obviously the trigger for numerous particularly amateur events that continue to this very day. What about the old doxy who confronted me on the coach journey en route to see a Musa in HMP in 2012 - who, to my irritation - came an sat next to me after a few minutes into the journey, drivelling on about how she'd been wronged by whoever in business and she also thought she was pretty sure she knew a paedo who was a wrong'un? Did you think I'd fall for all her predictable bs? Luckily, I was able to escape off the coach at Hammersmith where I always used to alight to get the tube, but anyone could stake a fortune on me getting a tail by the time I'd reached Caledonian Rd. - the tube stop for either HMP the M's were in. 

Who was the guy plain-clothes that time that jumped my exit through the ticket barrier at Cale. Rd. - creeping close right behind me as i went through the ticket barrier device, unnoticed until we'd gone through the thing - so he could get off the station without using his ticket - not that he even had one in the 1st place because he was a spook on duty tailing me. White guy, black well-worn leather jacket, dark jean-type trousers, black medium length hair - centre parting, slightly unshaven, dark t-shirt. He gave it away by staring malevolently at me, off and on, in the lift one has to get in at Caledonian Rd. tube before the ticket barriers  + the street exit. He leant against the wall on the left in the lift, clocking me off and on as the lift awaited moving and then went up, whilst I looked forward towards the lift exit 2 yards away, by the other lift wall to the right.  Was I being provoked, the same as they did when with Annett in Oxford street, on the march, the day after the pope's Lambeth visit in 2010, the officer literally pushing me backwards away from the other 5 this character was with, after the helicoptor must've got me with face recognition when in the middle of scores of people waiting to begin the march by Selfridge's? Then, after being separated from Annett + co, after being held by the side of the road as the march began for about 6 minutes, you allowed me back into it, and I caught up with Annett, only to have another officer never further than a few yards way from me for the entire march, ahead of me to my right, who kept turning back to look directly at me, often. You surely have all recorded - all this connected to the IPCC complaint they couldn't remember anything about, made a fortnight later. 

It would take literally all night to list every event that's been noticed.  The common factor in all this is my local agency [with others they've told], who I reported the Hollie Greig case to, in 2010 [ignored, emails to the then chief constable were blocked also], and also a "missing person" was reported to them in 2012 [ignored also
].

But what is happening to CERTAIN OTHERS especially is gross, and much, much worse. You act "under the law" - and that will never work, and is very illegal. Gangstalking, when connected to government, is a public scandal. How come genuine citizens are punished when reporting serious crimes committed by government employees, and the government employees are left alone to continue the serious crime, and the persons reporting the crime's lives are made hell - even imprisoned? What I've noticed is ridiculously negligible compared to many good citizens targeted simply because of what they know, and do about what they know.
 
When people join enforcement agencies I well believe they have the honesty and integrity needed, and are to be applauded for that. But, along the way, some fall, and turn into pure monsters. This has, and is happening right now - to a lot of people. Where did it go so wrong for these people to make them change into monsters? Where? And what do they hope to achieve by it all? Is it all down to simply having a bigger bank balance? 
  Its pathetic.

Update:  and that's without the phone hacking going back years [landline and mobile, [and audio recorded also], some callers or recipients of calls made refusing to believe me at first, until, in calls after, what I had been telling them about blossomed in front of our very ears - that changed their minds, And the computer being hacked constantly also, which varies according to whose doing it - one can usually distinguish by what's being done.

See more, added 31/07/17 [clipped message]:

This is extremely sad reading - compounded with the knowledge that the local council and connected parties are allegedly responsible for doing nothing to avert the horrific stalking described, let alone being behind it all. I am in a similar position, stalking-wise, to this which is described, with, imo, exactly the same parties running the entire show. 
​My "crime"? Reporting on what certain whistleblowers are saying...​


The general public do not realise certain agendas which are now in place, and what is going on, courtesy of these government departments. They are not aware of how seemingly ordinary and general members of the public - locals - are used to surveille [and harass] one, who report to their fellow stalkers when one has gone out, where wider surveillance takes over. These Watchers can even be in place at the place one is going to if one has, for example, used a public bus to get to wherever one happens to be going to, or be at the place one is going to if one has ordered a cab, or bought train or coach tickets to somewhere. It is not hard to tell who these stalkers are, often by their incessant and quizzical stares, for no reason. Often I arrive home to find a neighbour waiting to greet me - an elderly, almost senile next door neighbour who I have no contact with at all, yet who regales me with a "hello!" when I am about to go into my block. Obviously someone has tipped him off - mobile phone messaged him or whatever - that I will be arriving home in 15 minutes or whatever, and his job is simply to be seen and be there as I arrive home, to reinforce the outrageous fact that surveillance is being enacted. If I've ordered a cab for the following day, this neighbour will be there as the cab arrives, no matter what time or how early it may be, as he was at 7am last Sunday when he stood watching me get into a pre-ordered cab - what was he doing waiting by my abode at 7am on a Sunday morning in the remote, secluded close that I live in? Other neighbours I have no contact with often try and engage me in conversation whilst out - mysteriously appearing away from my home when I am awaiting a bus home, at random locations, or even when I'm in a "Subway" sandwich bar - they waltz in shouting "hello!" as I'm sitting there - its uncanny, and all approaches are avoided like the plague. One next door neighbour is a class A drug abuser, so who knows what's going on with her approaches and why she should suddenly appear, targeting myself when I am out, walking right up to me and attempting to engage in conversation as if we're old friends and she's known me for years. For weeks her friends would knock on my door asking for her [she lives in the block next door] - each one apologising for disturbing me after realising they had, deliberately, the wrong address. Who can be behind all of these weird happenings? 

​ There have been scores of similar such events since 2010, after I became a supporter in the Hollie Greig case - not counting my phones being tapped, my computers hacked [I have video evidence and recordings to prove everything] to much more.​ [see more: DOMESTIC SURVEILLANCE - DAYS OF MY LIFE...with spooks 
https://butlincat.blogspot.co.uk/2016/06/domestic-surveillance-days-of-my.html ].
 Surely there's only one party who can get something like this together - the local police.  I've complained to many agencies about what's been going on for years now, in one form or other, but the common factor with this case described in Wales is that noone actually does anything when this harassment is reported to them, and there must surely be many other similar stalkings taking place nationwide, but with it being a relatively new phenomenon, little is understood, or spoken or written about, and even if one does try and relate what one is experiencing, or hits this nerve too hard, one is branded as delusional - their ace card, and the attempts are made to lock one away in a mental unit, as has happened many times to some we know. Why aren't these characters stalking the 23000 known extremists on the terrorist watch list - some of whom have gone on and murdered innocent passers-by? It is known the surveilla
​n
 ce on these potential murderers is woefully lacking, yet I can be surveilled daily, as the author of the post above is - without any hindrance at all. How can this be justified - or is reporting on government crimes more important than these extremists intentions to murder innocents? Seems so!...jg

If You Have a Smart Phone, Anyone Can Now Track Your Every Move

 
Government spy programme will monitor every phone call, text and email... and details will be kept for up to a year 

By Pamela Owen 


Details about text messages, phone calls, emails and every website visited by members of the public will be kept on record in a bid to combat terrorism.
The Government will order broadband providers, landline and mobile phone companies to save the information for up to a year under a new security scheme.
What is said in the texts, emails or phone calls will not be kept but information on the senders, recipients and their geographical whereabouts will be saved.
Direct messages to users of social networking sites like Facebook and Twitter will also be saved and so will information exchanged between players in online video games.
The information will be stored by individual companies rather than the government.
The news has sparked huge concerns about the risk of hacking and fears that the sensitive information could be used to send spam emails and texts.
Nick Pickles, director of privacy and civil liberties campaign group Big Brother Watch, said: 'Britain is already one of the most spied on countries off-line and this is a shameful attempt to watch everything we do online in the same way. 
'The vast quantities of data that would be collected would arguably make it harder for the security services to find threats before a crime is committed, and involve a wholesale invasion of all our privacy online that is hugely disproportionate and wholly unnecessary. 

'The data would be a honey pot for hackers and foreign governments, not to mention at huge risk of abuse by those responsible for maintaining the databases.It would be the end of privacy online.

'The Home Secretary may have changed but it seems the Home Office’s desire to spy on every citizen’s web use and phone calls remains the same as it was under Labour.

'At a time when the internet is empowering people across the world to embrace democracy, it is shameful for one of the world’s oldest democracies to be pursuing the kind same kind of monitoring that has a stranglehold on civil society in China and Iran.'

It is believed the Home Office started talks with communication companies a few months ago and could officially be announced in May.
The plans have been drawn up by home security service MI5, MI6 which operates abroad, and the GCHQ, the governments communication headquarters which looks after the country's Signal Intelligence.
Security services would then be able to request information on people they have under surveillance and could piece together their movements with information provided.
Details of email correspondence and every website visited will also be kept 
Details of email correspondence and every website visited will also be kept
Mobile phone records are able to show within yards where a call was made from and emails will be tracked using a computer's IP address.
Security services are said to be concerned about the ability of terrorists to avoid tracking through modern technology and are believed to have lobbied Home Secretary Theresa May to introduce the scheme.
According to The Sunday Times ministers are planning to include the spy initiative called the Communications Capabilities Development Programme in the Queen's speech in May.
Jim Killock, executive director of the Open Rights Group, said: 'This would be a systematic effort to spy on all of our digital communications.
'No state in history has been able to gather the level of information proposed,' he said to The Sunday Times.
 
THE SMARTPHONE APPS THAT SPY ON YOUR CHILDREN

Smartphone apps are being used by the companies that sell them to store information about your children.

The apps can gather information of their whereabouts, who they are talking to and even store photographs.
Small print in the information provided before it is downloaded gives permission for the information to be accessed.
The Sunday Times examined 200 apps available and out of those 170 provided the right to access some information stored on the phone.
Developers have said they need the information in order to ensure the products work properly but some of the data accessed has little relevance.
Last week it was discovered the app for Twitter had been secretly accessing mobile phone address books.
Director of Big Brother Watch, Nick Pickles, told The Sunday Times: 'How many parents knew that a simple mobile phone game would give someone the ability to access their child's location, see what their camera lens is looking at or see the phone number of who is calling their child?'
Mr Pickles added it was proof of how weak regulation was.
source: http://www.dailymail.co.uk/news/article-2103314/Government-spy-programme-monitor-phone-text-email.html#ixzz2oWJshw00


 ----------------------------------------------------------    

Christopher Mims April 20, 2012
 
Navizon I.T.S. makes it easy to pinpoint Wi-Fi devices anywhere its listening nodes are installed. 
Location services company Navizon has a new system, called Navizon I.T.S., that could allow tracking of visitors in malls, museums, offices, factories, secured areas and just about any other indoor space. It could be used to examine patterns of foot traffic in retail spaces, assure that a museum is empty of visitors at closing time, or even to pinpoint the location of any individual registered with the system. But let’s set all that aside for a minute while we freak out about the privacy implications.
Most of us leave Wi-Fi on by default, in part because our phones chastise us when we don’t. (Triangulation by Wi-Fi hotspots is important for making location services more accurate.) But you probably didn’t realize that, using proprietary new “nodes” from Navizon, any device with an active Wi-Fi radio can be seen by a system like Navizon’s.
To demonstrate the technology, here’s Navizon CEO and founder Cyril Houri hunting for one of his colleagues at a trade show using a kind of first person shooter-esque radar.
 
 
And here’s a website set up by Navizon to anonymously log the devices of pedestrians who walk by its offices in Miami Beach, FL.
Real-time data (and webcam) from Navizon’s listening station at its offices
Finally, here’s a promo video that lays out the workings of the technology fairly succinctly, starting at 1:40.
 
 
It’s important to note that the technology is inherently (somewhat) anonymous. Navizon’s system can determine where you are, but not necessarily who you are, since all it sees is a Wi-Fi radio.
However, because each device has a unique signature, Navizon’s system does know whether you’ve been in a place before. This could be used for security – is someone showing up in the same place over and over again, possibly casing the joint? – or by a retailer who wants to track repeat customers.
In addition, Navizon also has the ability to assign real identifying information to a device, but it’s a process that could hardly occur without your knowledge. Here’s Houri again, demonstrating the capability.
 
This might be useful in, for example, a hospital that wants to know where a given medical staffer is at any given moment.
Navizon I.T.S. isn’t just useful for the owner of the system – using custom floor layouts or the indoor portions of Google Maps, it can help people precisely locate themselves within buildings, much like the Bluetooth beacon system proposed for use in concert with Broadcom’s new GPS chip.

Navizon’s technology is also reminiscent of the location data provided to retailers and marketers by Skyhook’s Spotrank system, which has a different set of pros and cons: That data is available for every point on the planet, but it only includes devices running Skyhook software.
The rollout of this technology means there are now at least three ways that users can track their locations indoors, where GPS is generally useless – bluetooth beacon, Spotrank (and proprietary vendor) databases of Wi-Fi hotspots, and Navizon’s I.T.S. nodes. It also marks the second way (that I know of) for you to be tracked via the location of your phone, whether you want to be or not. (The first requires access to your cell phone carrier, and is used for example to locate your position when you make a 911 call.)
It shouldn’t be surprising that carrying around a little RF transmitter in your pocket makes you visible to all sorts of tracking technology. Maybe it’s simply the (inevitable) commercialization of this fact that is somehow unnerving.

http://www.technologyreview.com/view/427687/if-you-have-a-smart-phone-anyone-can-now-track-your-every-move/

--------------------------------------------------------

How to Disable Facebook Places Location Tracking

If this feature creeps you out a little bit, you're not alone.

By 

"Have you ever bothered to click on the "Places" map on your Facebook timeline? It kind of creeped me out the first time I tried it. It almost felt like Facebook was stalking me.
Hovering my mouse pointer over any of the red dots on the Facebook Places map revealed pictures I had been tagged in at each location, status posts I had made from different places, etc. I had never really thought that Facebook was aggregating all of this geotag data together, and frankly, I'm not crazy about them doing this for me. Depending on your privacy settings, your friends and others may also be able to see this information.
If you don't like Facebook presenting your location information in a scrapbook-for-stalkers format, you can turn it off (sort of). Let's take a look at a few things you can do to remove your location data from the Facebook Places map.

Step 1 - Remove Geotags From Your Pictures Before You Upload Them to Facebook
To ensure that future pictures posted to Facebook and other social media sites don't reveal your location information, you should make sure that the geotag information is never recorded in the first place. Most of the time this is done by turning off the location services setting on your smartphone's camera application so that the geotag information doesn't get recorded in the picture's EXIF metadata. There are also apps that will help you strip our the geolocation information of pictures you've already taken. You might want to try deGeo (iPhone) or Photo Privacy Editor (Android) to remove the geotag info from your photos before uploading them to social media sites.

Step 2 - Disable Location Services for Facebook on Your Mobile Phone / Device
When you first installed Facebook on your mobile phone, it probably asked for permission to use your phone's location services so that it could provide you with the ability to "check-in" at different locations and tag photos with location information. If you don't want Facebook knowing where you are posting something from, then you should revoke this permission in your phone's location services settings area.

Step 3 - Enable the Facebook Tag Review Feature
Facebook recently made an attempt to go from a super-granular privacy settings structure to an ultra-simple one. It now appears that you cannot selectively prevent people from tagging you at a location, however, you can turn on the tag review feature which allows you to review anything you've been tagged in, whether it's a picture or a location check-in. You can decide whether tags get posted before they are posted, but only if you have the tag review feature enabled.

To Enable the Facebook Tag Review Feature:
1. Log into Facebook and select the settings padlock icon next to the "Home" button at the top right corner of the page.
2. Click the "See More Settings" link from the bottom of the "Privacy Shortcuts" menu.
3. Click the "Timeline and Tagging" link on the left side of the screen.
4. In the "How can I manage tags people add and tagging suggestions?" section of the "Timeline and Tagging Settings menu, click the "Edit" link next to "Review tags people add to your own posts before the tags appear on Facebook?"
5. Click the "Disabled" button and change its setting to "Enabled".
6. Click the "Close" link.
After this setting is enabled, any post that you are tagged in, whether it's a photo, location check-in, etc, will have to gain your digital stamp of approval before it's posted to your timeline. This will effectively prevent anyone from posting your location without your express permission.
Step 4 - Limit Who Can See Your "Stuff" on Facebook
Also located in the newly revamped Facebook privacy settings area is a "Who can see my stuff" option. This is where you can limit the visibility of future posts (such as ones with geotags in them). You may choose "Friends", "Only Me", "Custom", or "Public". I advise against choosing "Public" unless you want the whole world knowing where you are and where you've been.

This option applies to all future posts. Individual posts can be changed as they are created or after they are made, in case you want to make something more public or private later on. You can also use the "Limit Past Posts" option to change all of your old posts that might have been "Public" or "Friends of Friends" to "Friends Only".

It's a good idea to check your Facebook privacy settings about once a month as they seem to make sweeping changes on a regular basis that could affect the settings you have in place. Check out our Facebook Privacy and Security section of our site for more guidance.

Andy O'Donnell
Andy O'Donnell
About.com Internet / Network Security
http://netsecurity.about.com/od/security101/a/How-To-Disable-Facebook-Places-Location-Tracking.htm
--------------------------------------------------------------------------

 "SNOOPERS CHARTER" + archive 

“SNOOPERS CHARTER RULED UNLAWFUL” + #spycops [“Undercover Policing” abuse] + GCHQ SPYING, SNOWDEN, MASS SURVEILLANCE + more 05 Feb. 2018


SNOWDEN and mass surveillance, IAN HISLOP, GCHQ

10 Dec. 2016 originally


SPYING ON US 12mar15 

THE SNOOPERS CHARTER with GCHQ EXPERT + HOW GCHQ HAVE BEEN BREAKING THE LAW FOR 16 YEARS


UPDATE FEB. 2018: 


UK mass digital surveillance regime ruled unlawful
Judges say snooper’s charter lacks adequate safeguards around accessing personal data

 Home affairs editor

A man on his mobile phone walks past a CCTV sign


 Appeal court judges have ruled the government’s mass digital surveillance regime unlawfulin a case brought by the Labour deputy leader, Tom Watson.
Liberty, the human rights campaign group which represented Watson in the case, said the ruling meant significant parts of the Investigatory Powers Act 2016 – known as the snooper’s charter – are effectively unlawful and must be urgently changed.

The court of appeal ruling on Tuesday said the powers in the Data Retention and Investigatory Powers Act 2014, which paved the way for the snooper’s charter legislation, did not restrict the accessing of confidential personal phone and web browsing records to investigations of serious crime, and allowed police and other public bodies to authorise their own access without adequate oversight.The government defended its use of communications data to fight serious and organised crime and said that the judgment related to out of date legislation. Minister Ben Wallace said that it would not affect the way law enforcement would tackle crime.

The three judges said Dripa was “inconsistent with EU law” because of this lack of safeguards, including the absence of “prior review by a court or independent administrative authority”.
Responding to the ruling, Watson said: “This legislation was flawed from the start. It was rushed through parliament just before recess without proper parliamentary scrutiny.

The government must now bring forward changes to the Investigatory Powers Act to ensure that hundreds of thousands of people, many of whom are innocent victims or witnesses to crime, are protected by a system of independent approval for access to communications data. I’m proud to have played my part in safeguarding citizens’ fundamental rights.”
Martha Spurrier, the director of Liberty, said: “Yet again a UK court has ruled the government’s extreme mass surveillance regime unlawful. This judgement tells ministers in crystal clear terms that they are breaching the public’s human rights.”

She said no politician was above the law. “When will the government stop bartering with judges and start drawing up a surveillance law that upholds our democratic freedoms?”

The Home Office announced a series of safeguards in November in anticipation of the ruling. They include removing the power of self-authorisation for senior police officers and requiring approval for requests for confidential communications data to be granted by the new investigatory powers commissioner. Watson and other campaigners said the safeguards were “half-baked” and did not go far enough.

The judges, headed by Sir Geoffrey Vos, declined to rule on the Home Office claim that the more rigorous “Watson safeguards” were not necessary for the use of bulk communications data for wider national security purposes.
The judges said the appeal court did not need to rule on this point because it had already been referred to the European court of justice in a case which is due to be heard in February.


Watson launched his legal challenge in 2014 in partnership with David Davis, who withdrew when he entered the government as Brexit secretary in 2016. The European court of justice ruled in December 2016 that the “general and indiscriminate retention” of confidential personal communications data was unlawful without safeguards, including independent judicial authorisation.
Security minister Ben Wallace responded to the ruling saying: “Communications data is used in the vast majority of serious and organised crime prosecutions and has been used in every major security service counter-terrorism investigation over the last decade. It is often the only way to identify paedophiles involved in online child abuse as it can be used to find where and when these horrendous crimes have taken place.”
He said the judgment related to legislation which was no longer in force and did not change the way in which law enforcement agencies could detect and disrupt crimes.

We had already announced that we would be amending the Investigatory Powers Act to address the two areas in which the court of appeal has found against the previous data retention regime. We welcome the fact that the court of appeal ruling does not undermine the regime and we will continue to defend these vital powers, which Parliament agreed were necessary in 2016, in ongoing litigation,” he said.
sourcehttps://www.theguardian.com/uk-news/2018/jan/30/uk-mass-digital-surveillance-regime-ruled-unlawful-appeal-ruling-snoopers-charter
………………………………………………………………………………………………………………………………….
Now anyone can be hacked by government –  going back a year “in police investigations”…yeah right. Bang goes the right of privacy – ECHR Article 8: Article 8 – Right to respect for private and family life
1. Everyone has the right to respect for his private and family life, his home and his correspondence.
2. There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others. [https://en.wikipedia.org/wiki/Article_8_of_the_European_Convention_on_Human_Rights]
.

Britain has passed the ‘most extreme surveillance law ever passed in a democracy’

The law forces UK internet providers to store browsing histories — including domains visited — for one year, in case of police investigations.
It’s 2016 going on 1984.
The UK has just passed a massive expansion in surveillance powers, which critics have called “terrifying” and “dangerous”.
The new law, dubbed the “snoopers’ charter”, was introduced by then-home secretary Theresa May in 2012, and took two attempts to get passed into law following breakdowns in the previous coalition government.
Four years and a general election later — May is now prime minister — the bill was finalized and passed on Wednesday by both parliamentary houses.
But civil liberties groups have long criticized the bill, with some arguing that the law will let the UK government “document everything we do online”.
It’s no wonder, because it basically does.

The law will force internet providers to record every internet customer’s top-level web history in real-time for up to a year, which can be accessed by numerous government departments; force companies to decrypt data on demand — though the government has never been that clear on exactly how it forces foreign firms to do that that; and even disclose any new security features in products before they launch.
Not only that, the law also gives the intelligence agencies the power to hack into computers and devices of citizens (known as equipment interference), although some protected professions — such as journalists and medical staff — are layered with marginally better protections.
In other words, it’s the “most extreme surveillance law ever passed in a democracy,” according to Jim Killock, director of the Open Rights Group.
The bill was opposed by representatives of the United Nations, all major UK and many leading global privacy and rights groups, and a host of Silicon Valley tech companies alike. Even the parliamentary committee tasked with scrutinizing the bill called some of its provisions “vague”.
UK government "complicit" in NSA's PRISM spy program

Britain allegedly bypassed international intelligence-sharing treaties. Read More
And that doesn’t even account for the three-quarters of people who think privacy, which this law almost entirely erodes, is a human right.
There are some safeguards, however, such as a “double lock” system so that the secretary of state and an independent judicial commissioner must agree on a decision to carry out search warrants (though one member of the House of Lords disputed that claim).
A new investigatory powers commissioner will also oversee the use of the powers.
Despite the uproar, the government’s opposition failed to scrutinize any significant amendments and abstained from the final vote. Killock said recently that the opposition Labour party spent its time “simply failing to hold the government to account”.
But the government has downplayed much of the controversy surrounding the bill. The government has consistently argued that the bill isn’t drastically new, but instead reworks the old and outdated Regulation of Investigatory Powers Act (RIPA). This was brought into law in 2000, to “legitimize” new powers that were conducted or ruled on in secret, like collecting data in bulk and hacking into networks, which was revealed during the Edward Snowden affair.
Much of those activities were only possible thanks to litigation by one advocacy group, Privacy International, which helped push these secret practices into the public domain while forcing the government to scramble to explain why these practices were legal.
The law will be ratified by royal assent in the coming weeks.
.

ZDNET INVESTIGATIONS

  1. Voices
  2. The Snooper’s Charter passed into law this week – say goodbye to your privacy

The fact that you’re on this website is – potentially – state knowledge. Service providers must now store details of everything you do online for 12 months – and make it accessible to dozens of public authorities


This week a law was passed that silently rips privacy from the modern world. It’s called the Investigatory Powers Act.
Under the guise of counter-terrorism, the British state has achieved totalitarian-style surveillance powers – the most intrusive system of any democracy in history. It now has the ability to indiscriminately hack, intercept, record, and monitor the communications and internet use of the entire population.
The hundreds of chilling mass surveillance programmes revealed by Edward Snowden in 2013 were – we assumed – the result of a failure of the democratic process. Snowden’s bravery finally gave Parliament and the public the opportunity to scrutinise this industrial-scale spying and bring the state back into check.

But, in an environment of devastatingly poor political opposition, the Government has actually extended state spying powers beyond those exposed by Snowden – setting a “world-leading” precedent.
The fact that you’re on this website is – potentially – state knowledge. Service providers must now store details of everything you do online for 12 months – and make it accessible to dozens of public authorities.
What does your web history look like? Does it reveal your political interests? Social networks? Religious ideas? Medical concerns? Sexual interests? Pattern of life?

What might the last year of your internet use reveal?
Government agencies have even won powers to hack millions of computers, phones and tablets en masse, leaving them vulnerable to further criminal attacks.

You might think that you have nothing to hide, and therefore nothing to fear. In that case, you may as well post your email and social media login details in the comments below.

But I don’t think we do feel that blasé about our privacy – we cherish our civil liberties. Everyone has a stake in guarding our democracy, protecting minorities from suspicionless surveillance, defending protest rights, freedom of the press, and enjoying the freedom to explore and express oneself online. These freedoms allow our thoughts, opinions and personalities to flourish and develop – they are the very core of democracy.   
Has any country in history given itself such extensive surveillance powers and remained a rights-respecting democracy? We need not look too far back – or overseas to see the risks of unbridled surveillance. In recent years, the British state has spied on law-abiding environmental activists, democratically elected politicians, victims of torture and police brutality, and hundreds of journalists.
In fact, as the Bill finally passed on Wednesday evening, I was training a group of British and American journalists in how to protect themselves from state surveillance – not just from Russia or Syria, but from their own countries.
When Edward Snowden courageously blew the whistle on mass surveillance he warned that, armed with such tools, a new leader might “say that ‘because of the crisis, because of the dangers we face in the world, some new and unpredicted threat, we need more authority, we need more power.’ And there will be nothing the people can do at that point to oppose it”.

The US finds itself with a President-elect who has committed to monitoring all mosques, banning all Muslims, investigating Black Lives Matter activists and deporting two to three million people. And with the ushering into law of the UK-US free trade in mass surveillance, MPs may have a lot to answer for.
Liberty and its members fought tooth and nail against this new law from its inception to the moment it was passed. That fight is not yet over. Our message to Government: see you in court.

Silkie Carlo is the policy officer at Liberty


The United Nations has passed a non-binding resolution condemning the disruption of Internet access as a human rights violation.
Russia and China were among countries opposing the resolution, which reaffirms the stance of the UN Human Rights Council that “the same rights people have offline must also be protected online.”
Saudi Arabia joined the two nations in their objections. But in addition to authoritarian regimes, democracies such as India and South Africa also disagreed and called for the deletion of the following passage:
Condemns unequivocally measures to intentionally prevent or disrupt access to or dissemination of information online in violation of international human rights law and calls on all States to refrain from and cease such measures.”
While not legally enforceable, a resolution such as this can help put pressure on governments and add weight to the arguments of digital rights groups.
Digital rights site Access Now’s Global Policy and Legal Counsel representative, Peter Micek, enlarged on this.
This unanimous statement by the world’s highest human rights body should give governments pause before they order blocking, throttling, and other barriers to information.”
Such throttling was witnessed in Turkey following the June 2016 attack on Istanbul’s Ataturk Airport, when social media sites were suppressed.
Access Now says at least 15 Internet shutdowns took place worldwide in 2015. So far in 2016, at least 20 shutdowns are known to have been put into place.

A major row between the political parties is brewing over demands by David Cameron and the intelligence services for even more surveillance powers in the wake of the terrorist atrocities in Paris last week.

David Cameron has promised new legislation so that terrorists no longer have “safe spaces” to communicate.

Pointing out that in the old days, intelligence agencies  were able to open letters and eavesdrop on phone calls, the PM asked in a speech yesterday: “In our country, do we want to allow a means of communication between people which […] we cannot read?”

But today deputy PM Nick Clegg said such a response would be disproportionate and would “cross a line”.

The issue centres on the fact that technology is changing so fast that the laws on which security officials rely to give them access to communications are becoming obsolete almost as soon as they are written.

Here the Bureau explains why new legislation passed last summer is said to be already inadequate to keep Britons safe, what the government could do next and why the public debate must take account of GCHQ’s most realistic option – hacking.

What are the problems?

The Data Retention and Investigatory Powers Act (DRIPA) was only passed last summer, having been fast-tracked through Parliament.

The new law extended the reach of the Regulation of Investigatory Powers Act (RIPA) which gives authorities interception powers.

Under DRIPA telecoms companies can also be required to keep billing data – information on who contacts whom, when and for how long on mobile networks but not the content of these messages – for up to 12 months and allow security officials to access it on production of a warrant.

This “meta-data” held by the companies is helpful in identifying associates of known terrorists or criminals. Law enforcement and security officials can use evidence of contact between parties to justify directly surveilling individuals and accessing the content of their communications.

But the law is already said to be becoming obsolete.

There are three main reasons for this:

1) People aren’t calling each other over mobile networks as often as they used to

Terrorists and serious criminals, like the general public, are using the internet to communicate instead, speaking to each other via social media sites, instant messaging services – including those provided by online games – and chat rooms.

Billing data doesn’t capture these exchanges.

2) Encryption

Intelligence agencies are increasingly finding that even when they have located the particular messages they want, the content is encrypted.

3) The data isn’t collected by UK telcos

Companies operating fixed line and mobile infrastructure such as BT and Vodafone may simply transport data to and from another company – such as Facebook or Twitter – to the customer with little or no data retained about the communication.

4) Some of the communications the spies want access to are held by service providers that are not based in the UK

Under DRIPA, interception warrants issued by UK authorities can be applied to overseas firms. As Liberty pointed out, the UK’s Home Secretary could serve Gmail with a warrant in California, requiring it to intercept all communications between subscribers in two specified countries or all communications leaving or entering the UK.

However many legal experts have questioned the validity of this extra-territorial effect, not least because the legislation could require companies to breach their own nation’s laws in complying with a UK warrant – a warrant whose existence they could not reveal without breaking UK law.

A recent Telegraph report quoted an anonymous security official complaining that these companies would not assist GCHQ enquires by passing on evidence about serious criminals unless there was an imminent threat of harm.

What can be done about it?

1) Get heavy with the tech companies

Media reports have suggested Whatsapp, Snapcat and Apple’s iMessage, which offer an encrypted instant messaging services could be banned from the UK.

Companies that offer encrypted email services could also be banned or required to hand over their encryption “keys”, either to the security services or to network operators.

Operators could then be required by law to decrypt the data.

As Privacy International points out, proposals to outlaw encrypted communications “not only threaten the very rights they’re said to be designed to protect, but begin from a fundamentally flawed premise – that such measures are even possible.”

It added: “The UK simply can not command foreign manufacturers and providers of services such as Whatsapp to modify their services to accommodate the desires of British spies.”

Any attempted move in this direction would antagonise some very powerful opponents – Google, for example, which recently proposed that websites that do not encrypt their traffic be marked as “insecure” by default.

The company is a major advocate for “end-to-end encryption“, which encrypts data leaving a user’s browser until it is decrypted by the recipient. The tech giant has previously publicly announced support for anti-surveillance campaigners.

In 2010 the Indian government threatened to ban Blackberry for refusing to allow the country’s security officials access to its messages. The dispute ran for several years before ending in a compromise, with the company agreeing to allow more limited access – to meta-data – than had originally been requested.

A battle between the UK and Google or Apple would be a different matter altogether.

2) Revival of the “Snoopers’ Charter”

The Conservatives are pushing for a revival of the Communications Data draft Bill, known as the “Snoopers’ Charter”, which was abandoned in 2013 after opposition from the Liberal Democrats.

This would have required all internet service providers to retain, for 12 months, in a common format data on their customers’ communications via the internet as well as via the mobile networks.

Data stored would include visits to websites and social media activities.

These databases could then be searched by a Government data-mining device called a “request filter”.

As well as major concerns about the threat to privacy this would entail, it is questionable whether the national security benefits would justify the expense of building and maintaining the data storage centers necessary to retain this huge amount of information, particularly if the encryption problem has not been solved.

Companies that have no commercial imperative to collect the information would have to be compensated if they were compelled to do so. The bill could run into hundreds of millions of pounds given the volume and complexity of data involved.

3) Hack!

The third prong in the intelligence agencies’ communications surveillance trident is its ability to break encryption by hacking.

GCHQ’s capabilities in this and any other regard are never discussed officially as a matter of policy.

But without understanding this capability – and how, if at all, it is constrained by the law – it is difficult to know just how hampered the security services are.

Documents leaked in 2013 by National Security Agency (NSA)  whistleblower Edward Snowden revealed that US and UK intelligence agencies have been pouring their efforts into cracking encryption codes for many years.

A Guardian report that year quoted a 2010 NSA presentation as stating that “for the past decade, NSA has led an aggressive, multipronged effort to break widely used internet encryption technologies.”

A more recent report in German newspaper Der Spiegel based on a set of Snowden files dated 2012 showed that the NSA considered monitoring Facebook chat “a minor task”. On the other hand a protocol called Off-the-Record (OTR) for encrypting instant messaging seemed to be causing the NSA major problems.

Facebook has improved its security since 2012 but it’s likely that intelligence agencies’ hacking powers have improved in tandem.

GCHQ hacking may also explain why the government wants companies to store data that is currently unreadable due to encryption.

As yet another Snowden file says: “Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”

Once an encrypted system has been hacked into, intelligence agencies can re-examine stored data to find information that was previously hidden – a powerful motive for retaining data.

The Snowden documents also revealed that NSA and its “Five Eyes” partners including the UK had adopted covert measures to ensure control over setting of international encryption standards, the use of supercomputers to break encryption with “brute force”.

Through covert partnerships with internet service providers and tech companies, the agencies had also inserted secret vulnerabilities known as backdoors into commercial encryption software.

“These design changes make the systems in question exploitable … to the consumer and other adversaries, however, the systems’ security remains intact,” one document says.

Since this was made public, the companies concerned may have become less willing to enter into these collaborations.


Related story: Thatcher and Blair Cabinet Secretary: Intelligence committee has “helped” public by confirming GCHQ’s internet tap “Tempora” powers

source: https://www.thebureauinvestigates.com/stories/2015-01-13/a-guide-to-state-surveillance-the-snoopers-charter-and-government-hacking

Sunday, 6 August 2017

UNDERCOVER COPS: An inquiry just revealed how far the British state will go in its secret war on citizens + OVER 1000 POLICE HAVE CRIMINAL RECORDS

August 5th, 2017  UK

An inquiry just revealed how far the British state will go in its secret war on citizens [VIDEO]


The cover names of three police officers who spied on political activists have just been revealed by an inquiry into undercover policing. The three officers infiltrated high-profile campaigns at a time of great public anger.

Inquiry documents and secret intelligence reports reveal just how far the state went to undermine opposition to injustices. And understanding the response to that overreach is crucial to understanding what’s happening now.

A time of wars and strikes

The three undercover officers (UCOs) were assigned with the Special Demonstration Squad (SDS) and were operational from 1968 to 1976. They (cover names) are Rick Gibson [pdf] (deceased), Douglas Edwards [pdf] and John Graham [pdf]. An outline of their undercover activities is given in each document. The three infiltrated a number of political campaigns and organisations, including [pdf] Troops Out Movement, Vietnam Solidarity Campaign and anarchist groups. 

At the time, Britain was engaged in military operations in Northern Ireland that saw 13 civilians killed by British troops on ‘Bloody Sunday’. Britain’s ‘dirty war’ in the country reportedly left many more dead. Britain was also actively supporting the US in its war on Vietnam. But the authorities had not appreciated the level of discontent this would cause. And on 17 March 1968 a mass rally at Trafalgar Square saw 8000 of the protesters break off to head for the US embassy at Grosvenor Square. The ensuing battle was a key moment, with 300 protesters arrested:



But the police learned lessons from Grosvenor Square. And ahead of a follow-up demo in October of that year, a Special Branch document provided a list of around 50 ‘leaders’. While another report revealed anticipated numbers of activists; and properties that could be targeted. Such intelligence would undoubtedly be useful to UCOs.

Beyond protest

But the state feared far more than mere protests and another Special Branch document warned of revolution:
Useful for Inquiry: Special Branch files
This assessment was not far off the truth. For the militancy on the streets was followed by another form of resistance.
The Angry Brigade appeared from nowhere, but carried out highly targeted attacks on government and police properties:



Journalist Martin Bright summed up the political climate the AB existed in:

It is difficult now to imagine the intensity of the times. Edward Heath was locked into a lengthy dispute with workers who occupied the Clydeside shipyards in Glasgow, which would eventually end with a humiliating climb down for the government. Internment was introduced in Northern Ireland and the Bloody Sunday massacre of civil-rights marchers in January 1972 happened while the Angry Brigade suspects were awaiting trial. One document found in the raids across London that weekend brought the three causes together in a mini-manifesto: ‘Put the boot in – Bogside, Clydeside – Support the Angry side’.
The Angry Brigade was operational for 12 months from August 1970.

Resistance spreads

It’s known that the SDS used around 100 covert identities to infiltrate organisations and provide intelligence between 1968 and 2008. Possible targets of covert policing would have included industrial disputes, such as the Grunwick dispute, the Shewsbury pickets campaign and the 1972, 1974 and 1984/5 miners’ strikes.
But all this was just the tip of the iceberg. According to whistleblower Annie Machon, MI5 considered many public figures of the day worthy of surveillance, including John Lennon, Jeremy Corbyn, Mark Thomas, Tony Blair and Harold Wilson.

Back to the future

The SDS was not just a child of the 60s and 70s, its work and that of other undercover policing units continued over subsequent decades. And Her Majesty’s Inspectorate of Constabulary subsequently revealed that a massive 3,466 undercover operations took place in England and Wales between 2009 and 2013 alone.

The Undercover Policing Inquiry was set up in 2015 to examine some of the practices deployed by these units[is he serious?...ed....he's trying to be!...Ned.].  But it’s taken two years for a small number of cover names of UCOs to be released. The inquiry will reveal more in due course, though as The Canary reported many undercover policing files have gone ‘missing’. [well, there's a surprise...NOT!..ed.].

Citizen activists are demanding real names should be released too. Because many UCOs formed sexual relationships as part of their cover. Indeed, former UCO Andy Coles (his real name) was exposed earlier this year – not by the inquiry, but by independent researchers. And now he is under pressure to resign as councillor with Peterborough City Council. The inquiry has agreed the then young woman he’s alleged to have exploited will be a ‘core participant’ in its investigation.
Regardless of the difference in technologies used, there are clear parallels between the political policing of earlier decades and of today. Moreover, public anger about the same injustices is no less palpable.

Get involved!

– Check out Undercover Research Group and Campaign Against Police Surveillance.
Featured image via screengrab.

source: https://www.thecanary.co/2017/08/05/inquiry-just-revealed-far-british-state-go-secret-war-citizens-videos/



UNDERCOVER COPS: The Women Activists Who Fell In Love With Police Spies And Are Still Waiting For Justice


‘I suddenly realised after he had gone that I had no way of tracing him.’

What Police Spies Out of Lives want at the end of the inquiry


The cover names of the officers involved in undercover policing from 1968 onwards to be released.


------------------------------------------------------------------------------

................................................................................................


Nearly 1,000 serving police officers and PCSOs have a criminal record

More than 900 serving police officers and community support officers have a criminal record, official figures show.

Nearly 1,000 police officers across the country have a criminal conviction
Nearly 1,000 police officers across the country have a criminal conviction Photo: ALAMY
9:57AM GMT 02 Jan 2012

Forces across England and Wales employ policemen and women with convictions including burglary, causing death by careless driving, robbery, supplying drugs, domestic violence, forgery and perverting the course of justice. 
Those with criminal records include senior officers, among them two detective chief inspectors and one chief inspector working for the Metropolitan Police. 
At least 944 currently serving officers and police community support officers (PCSOs) have a conviction, according to figures released by 33 of the 43 forces in England and Wales in response to Freedom of Information requests. 
Many forces could not provide details of criminal records dating from before their staff joined the police,meaning the true figure will be significantly higher
The Metropolitan Police, Britain's largest force, came top with 356 officers and 41 PCSOs with convictions.

Related Articles

Crime an hour in police stations 

02 Jan 2011

Last year worst on record for church metal thefts 

01 Jan 2012

Police trialling lie detector tests 

31 Dec 2011

It was followed by Kent Police (49), Devon and Cornwall Police (44), Essex Police (42), South Yorkshire Police (35), Hampshire Police (31) and West Midlands Police (27), although not all the figures are directly comparable. 

The criminal records include: 
Devon and Cornwall Police - a Pc convicted of burglary as a teenager. 

Essex Police - one inspector convicted of dangerous driving; another inspector convicted of possessing and supplying cannabis; a detective constable convicted of robbery; a Pc convicted of data protection breaches for viewing intelligence records relating to friends [and how many cops have done this? I know for a fact conversations have taken place between my GP and police re: my being prescribed painkillers / etc....]relatives or other people living in the local area, and aspecial constable convicted of stealing a set of car number plates, putting them on another vehicle and obtaining petrol without paying. 

Hertfordshire Police - a sergeant convicted of dangerous driving. 

Kent Police - a Pc convicted of perverting the course of justice in 1998. 

Merseyside Police - five officers convicted of assault and one convicted of causing death by careless driving.

Norfolk Police - a Pc convicted of causing death by careless driving. 

North Wales Police - an officer convicted of forgery. 

Staffordshire Police - an inspector convicted of assault causing actual bodily harm and a Pc convicted of keeping a dangerous dog. 

Surrey Police - a detective constable convicted of obstructing police officers; a Pc convicted of wounding; a Pc convicted of drink driving in 1988 and resisting arrest a decade later, and a Pc convicted of animal suffering in 2006
Most of the convictions are for traffic offences such as speeding and drink-driving, but the records also include a South 

Yorkshire Police officer convicted of fishing without a licence.[lololol...ed.] 

Home Office guidelines issued in 2003 say police officers should have ''proven integrity'' because they are vulnerable to pressure from criminals to reveal information. 

The guidance says forces should reject potential recruits with convictions for serious offences - including causing actual bodily harm, burglary, dangerous driving and supplying drugs - unless there are ''exceptionally compelling circumstances''. 


Related:

ROGER PEARCE aka THORLEY  #spycops

https://butlincat.blogspot.co.uk/2018/01/roger-pearce-aka-thorley-spycops.html

Related:

  • UNDERCOVER POLICING ATROCITIES:

ANDY COLES – #sackandycoles #spycops + JANET ALDER + UNDERCOVER COPS: “The Women Activists Who Fell In Love With Police Spies And Are Still Waiting For Justice” VIDEO

BUTLINCAT’S BLOG: The SNOOPER’S CHARTER bill is being rushed …

15 May 2016 – The SNOOPER’S CHARTER bill is being rushed through parliament that will make mass surveillance and bulk storage of our personal data …
FAIR USE NOTICE: This item may contain copyrighted (© ) material. Such material is made available to advance understanding of ecological, political, human rights, economic, democracy, scientific, moral, ethical, and social justice issues. This constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, this material is distributed for analysis, commentary, educational and intellectual purposes. In some cases comedy and parody have been recognized as fair use.
Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. For more information please visit:
http://www.law.cornell.edu/uscode/text/17/107
NB: DISCLAIMER: Everything posted on this site conforms to the meaning of the word “alleged” as defined under UK and US Laws and Statutes.