Back in May, I linked to the perverse tale of Byron Sonne, a Toronto hacker and security researcher who was caught up in the G20 dragnet, part of the overall campaign of illegal harassment, arrest and violence against protesters in the city.
Sonne's trial is underway now, and Denise Balkissoon is covering it in depth for OpenFile.ca. Balkissoon's coverage cuts through the legal complexities and tedium and gets right to the point, and is as good as courtroom reporting gets.
This week, the Crown conceded that Toronto Police used a ruse in order to get Byron Sonne to hand over his ID on June 15, 2010. Sonne—otherwise known as the G20 Hacker, or the Anarchist of Forest Hill—had been filming the $9.4 million security fence that went up before the international summit. A security guard called the police, and three officers stopped Sonne as he walked along Temperance St.
One asked for his identification. Sonne refused, stating that he knew it was his right not to identify himself unless he was being detained for a specific crime. So, bicycle officer Michael Wong told Sonne that he was being investigated for jaywalking under the Highway Traffic Act. “This was simply a ruse employed to obtain the Applicant’s identification,” reads the statement of fact submitted by the Crown Attorney. “It worked.”
In Sonne’s preliminary trial last winter, all three officers agreed that none of them had actually seen him cross the street illegally. On November 10, Superior Court Justice Nancy Spies decided this ruse meant Sonne was unlawfully detained, and that his rights were violated under the Canadian Charter of Rights and Freedoms. Next week, Judge Spies will decide if the Toronto Police also violated his rights when searching his home, seizing his possessions, or questioning him for 12 hours without access to a lawyer. Then begins his trial for possessing explosive materials and “counseling the indictable offense of mischief not committed.” I’ll explain that one to you when the trial gets started.
The ruse that violated Byron Sonne's rights
Help wanted: Operations Manager (personable, resourceful, and demonstrates outstanding attention to detail); Civil Liberties Legislative Counsel (advocacy, public speaking, blogging and other social media, media appearances and legislative and regulatory matters related to a variety of high technology public interest legal issues); 2017-19 Frank Stanton Fellowship (recent law school graduates or law students who will […]
M. David Weisman, a magistrate judge in Illinois’s Eastern Division, denied a federal warrant application that would have allowed law enforcement officers to force suspects to unlock their mobile devices with a fingerprint, ruling that the suspects’ Fourth Amendment (undue search and seizure) and Fifth Amendment (self-incrimination) rights protected them from being forced to unlock […]
Texas and Chile have remarkably similar flags (though Chile got theirs first, by a matter of decades) and Texas doesn’t have a Unicode-defined emoji for its flag (just a sprinkling of proprietary ones that do not cross platforms gracefully), so Texans have taken to using the Chilean flag emoji as a shorthand for the longhorn […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]