Local view for "http://purl.org/linkedpolitics/eu/plenary/2002-09-24-Speech-2-106"

PredicateValue (sorted: default)
rdf:type
dcterms:Date
dcterms:Is Part Of
dcterms:Language
lpv:document identification number
"en.20020924.7.2-106"2
lpv:hasSubsequent
lpv:speaker
lpv:spokenAs
lpv:translated text
". Authoritarian governments have always been characterised by the notion that they can best survive criticism on their policy by restricting their citizens in their freedom of information exchange, opinion, organisation and travel. The fear of terror attacks that has grown since last year has prompted a revival of plans to reinforce the army, police and secret services and to restrict civil liberties. For a while, this fear makes these controversial plans more acceptable to a large proportion of the population than they would be at other times. The public have since discovered the drawbacks of such a development. In the Netherlands, a campaign among computer users against the requirement that electronic mail be stored, requested by the Council, gained 2500 supporters within the space of two days last week. Quite apart from this breach of the mail's confidentiality, which has been in existence for more than a century, there have been attempts to deprive radical opposition movements of all prospects and cause them to resort to violence, upon which they can be declared illegal. Political organisations in exile, based in Europe, are stripped of their right of residence and are cut off from the movement of payments. Fortunately, this Parliament too is starting to realise that fear of terror should not be a reason for abolishing the democratic and tolerant character of our society. I reject the proposal, but endorse the proposals to better protect personal data, inform Parliament and place reports in the public domain."@en1

Named graphs describing this resource:

1http://purl.org/linkedpolitics/rdf/English.ttl.gz
2http://purl.org/linkedpolitics/rdf/Events_and_structure.ttl.gz
3http://purl.org/linkedpolitics/rdf/spokenAs.ttl.gz

The resource appears as object in 2 triples

Context graph