Since it’s become mandatory for ISPs to forward piracy notifications in Canada, hundreds of thousands of people have received letters over alleged copyright infringements. One of these accused pirates is an elderly woman, who’s threatened with $5,000 in potential damages for downloading a zombie game she’s never heard of.
[T]he Oklahoma Highway Patrol has a device that also allows them to seize money in your bank account or on prepaid cards.It’s called an ERAD, or Electronic Recovery and Access to Data machine, and state police began using 16 of them last month.Here’s how it works. If a trooper suspects you may have money tied to some type of crime, the highway patrol can scan any cards you have and seize the money.
Dr. Navindra Persaud has been fighting for four years to get access to thousands of pages of drug industry documents being held by Health Canada.
He finally received the material a few weeks ago, but now he’s being prevented from revealing what he has discovered.
That’s because Health Canada required him to sign a confidentiality agreement, and has threatened him with legal action if he breaks it.
The next scheduled Pwn2Own hacking competition has lost Hewlett-Packard as its longstanding sponsor amid legal concerns that the company could run afoul of recent changes to an international treaty that governs software exploits.
Dragos Ruiu, organizer of both Pwn2Own and the PacSec West security conference in Japan, said HP lawyers spent more than $1 million researching the recent changes to the so-called Wassenaar Arrangement. He said they ultimately concluded that the legal uncertainty and compliance hurdles were too high for them to move forward.
The following comment was written by Canadian filmmaker, Andrew Hunter, sent to party leaders asking them to come out against the 20-year copyright term extension in the Trans-Pacific Partnership (TPP) and stand for fair and balanced innovation policy. He emailed this comment as part of our TPP’s Copyright Trap campaign.
The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals.
The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia.
The top-secret document, obtained from NSA whistleblower Edward Snowden, was published Wednesday by CBC News in collaboration with The Intercept. The document outlines a series of tactics that the NSA and its counterparts in the Five Eyes were working on during workshops held in Australia and Canada between November 2011 and February 2012.
The main purpose of the workshops was to find new ways to exploit smartphone technology for surveillance. The agencies used the Internet spying system XKEYSCORE to identify smartphone traffic flowing across Internet cables and then to track down smartphone connections to app marketplace servers operated by Samsung and Google. (Google declined to comment for this story. Samsung said it would not be commenting “at this time.”)
As part of a pilot project codenamed IRRITANT HORN, the agencies were developing a method to hack and hijack phone users’ connections to app stores so that they would be able to send malicious “implants” to targeted devices. The implants could then be used to collect data from the phones without their users noticing.
Previous disclosures from the Snowden files have shown agencies in the Five Eyes alliance designed spyware for iPhones and Android smartphones, enabling them to infect targeted phones and grab emails, texts, web history, call records, videos, photos and other files stored on them. But methods used by the agencies to get the spyware onto phones in the first place have remained unclear.
The newly published document shows how the agencies wanted to “exploit” app store servers — using them to launch so-called “man-in-the-middle” attacks to infect phones with the implants. A man-in-the-middle attack is a technique in which hackers place themselves between computers as they are communicating with each other; it is a tactic sometimes used by criminal hackers to defraud people. In this instance, the method would have allowed the surveillance agencies to modify the content of data packets passing between targeted smartphones and the app servers while an app was being downloaded or updated, inserting spyware that would be covertly sent to the phones.
These CBP agents — like too many other law enforcement officers — had no idea how to react when their authority was challenged. They only saw one route to take: escalation.
Cooke knew the CBP agents needed something in the way of reasonable suspicion to continue to detain her. But they had nothing. The only thing offered in the way of explanation as they ordered her to return to her detained vehicle was that she appeared “nervous” during her prior interaction with the female CBP agent. This threadbare assertion of “reasonable suspicion” is law enforcement’s blank check — one it writes itself and cashes with impunity.
The CBP supervisor then stated he’d be bringing in a drug dog to search her vehicle — another violation of Cooke’s rights. The Supreme Court very recently ruled that law enforcement cannot unnecessarily prolong routine stops in order to perform additional searches unrelated to the stop’s objective.
If the purpose of CBP is to secure borders and regulate immigration, then this stop had very little to do with the agency’s objectives. Cooke is an American citizen and had not crossed a border. If the CBP’s objective is to do whatever it wants within x number of miles of the border, then it’s apparently free to perform suspicionless searches. In this case, the CBP was operating in drug enforcement mode, but even so, it still hadn’t offered anything more than Cooke’s alleged “nervousness” to justify the search and detainment. Additionally, the CBP’s decision to bring in a drug dog raised the bar for justification.
We learned recently from Paris that the Western world is deeply and passionately committed to free expression and ready to march and fight against attempts to suppress it. That’s a really good thing, since there are all sorts of severe suppression efforts underway in the West — perpetrated not by The Terrorists but by the Western politicians claiming to fight them.
One of the most alarming examples comes, not at all surprisingly, from the U.K. government, which is currently agitating for new counterterrorism powers, “including plans for extremism disruption orders designed to restrict those trying to radicalize young people.” Here are the powers which the British Freedom Fighters and Democracy Protectors are seeking:
They would include a ban on broadcasting and a requirement to submit to the police in advance any proposed publication on the web and social media or in print. The bill will also contain plans for banning orders for extremist organisations which seek to undermine democracy or use hate speech in public places, but it will fall short of banning on the grounds of provoking hatred.
It will also contain new powers to close premises including mosques where extremists seek to influence others. The powers of the Charity Commission to root out charities that misappropriate funds towards extremism and terrorism will also be strengthened.
In essence, advocating any ideas or working for any political outcomes regarded by British politicians as “extremist” will not only be a crime, but can be physically banned in advance. Basking in his election victory, Prime Minister David Cameron unleashed this Orwellian decree to explain why new Thought Police powers are needed: “For too long, we have been a passively tolerant society, saying to our citizens ‘as long as you obey the law, we will leave you alone.’” It’s not enough for British subjects merely to “obey the law”; they must refrain from believing in or expressing ideas which Her Majesty’s Government dislikes.