Vic Toews, the Canadian Public Safety minister who introduced a sweeping domestic spy bill (a bill whose name keeps changing and is likely to end up being called the "Utterly necessary and minimally invasive bill to catch terrorists who are, at this very moment, trying to murder your children, yes you, Bill of 2012") tells the CBC that he was surprised to learn that his bill lets any police officer request your personal information from ISPs
In an interview airing Saturday on CBC Radio's The House, Toews said his understanding of the bill is that police can only request information from the ISPs where they are conducting "a specific criminal investigation."
But Section 17 of the 'Protecting Children from Internet Predators Act' outlines "exceptional circumstances" under which "any police officer" can ask an ISP to turn over personal client information.
"I'd certainly like to see an explanation of that," Toews told host Evan Solomon after a week of public backlash against Bill C-30, which would require internet service providers to turn over client information without a warrant.
"This is the first time that I'm hearing this somehow extends ordinary police emergency powers [to telecommunications]. In my opinion, it doesn't. And it shouldn't."
Toews surprised by content of online surveillance bill
Help wanted: Operations Manager (personable, resourceful, and demonstrates outstanding attention to detail); Civil Liberties Legislative Counsel (advocacy, public speaking, blogging and other social media, media appearances and legislative and regulatory matters related to a variety of high technology public interest legal issues); 2017-19 Frank Stanton Fellowship (recent law school graduates or law students who will […]
M. David Weisman, a magistrate judge in Illinois’s Eastern Division, denied a federal warrant application that would have allowed law enforcement officers to force suspects to unlock their mobile devices with a fingerprint, ruling that the suspects’ Fourth Amendment (undue search and seizure) and Fifth Amendment (self-incrimination) rights protected them from being forced to unlock […]
Texas and Chile have remarkably similar flags (though Chile got theirs first, by a matter of decades) and Texas doesn’t have a Unicode-defined emoji for its flag (just a sprinkling of proprietary ones that do not cross platforms gracefully), so Texans have taken to using the Chilean flag emoji as a shorthand for the longhorn […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]