Maher Arar, a Canadian who was rendered to Syria for years of brutal torture on the basis of bad information from Canada's intelligence agencies, writes in Prism about the revelation that Canadian public safety minister Vic Toews has given Canadian intelligence agencies and police the green light to use information derived from torture in their work. Arar cites examples of rendition and torture based on the "Hollywood fantasy that underlines the 'ticking bomb' scenario that minister Toews was apparently contemplating when he wrote this directive."
What makes this direction even more alarming is that the fat annual budgets devoted to enhancing national security have not been balanced by a similar increase in oversight. In fact, the government chose to ignore the most important recommendation of Justice O’Connor which is to establish a credible oversight agency that has the required powers to monitor and investigate the activities of the RCMP and those of other agencies involved in the gathering and dissemination of national security information. Unlike the powerless Commission for Public Complaints Against the RCMP (CPC) or the Security Intelligence Review Committee (SIRC) this agency would also be granted subpoena power to compel all agencies to produce the required documents.
Coming back to the directive one can only cite two examples here which I believe are sufficient to illustrate the hollowness of the argument presented in the directive. The first relates to the invasion of Iraq which we now know was based on false intelligence (see this video) that was extracted from Ibn al-Shaykh al-Libi while he was being tortured in Egypt. Al-Libi was later found dead inside his prison cell. Some human rights activists believe the Gaddafi regime liquidated him three years after he was rendered to Libya by the CIA.
Torture Directive 2.0
(Image: Rothenburg Germany Torture Museum, a Creative Commons Attribution (2.0) image from nanpalmero's photostream)
In 2012, Google rolled out Certificate Transparency, a clever system to spot corrupt “Certificate Authorities,” the entities who hand out the cryptographic certificates that secure the web. If Certificate Authorities fail to do their jobs, they put the entire electronic realm in danger — bad certificates could allow anything from eavesdropping on financial transactions to […]
Troy Hunt, proprietor of the essential Have I Been Pwned (previously) sets out the hard lessons learned through years of cataloging the human costs of breaches from companies that overcollected their customers’ data; undersecured it; and then failed to warn their customers that they were at risk.
A security researcher has published a vulnerability and proof-of-concept exploits in Google’s Internet of Things security cameras, marketed as Nest Dropcam, Nest Dropcam Pro, Nest Cam Outdoor and Nest Cam Indoor; these vulnerabilities were disclosed to Google last fall, but Google/Nest have not patched them despite the gravity of the vulnerability and the long months […]
You know the drill. You go to the dentist and they ask you how often you floss. You lie through your teeth and say, “every day!” (Bonus points if you have some cilantro or chives stuck in your gums from lunch). You don’t want to keep up the charade any longer, but rubbing that tiny strand […]
The Raspberry Pi Foundation has done outstanding work packing a fully capable desktop computer into a package the size of a deck cards—especially one that only costs $35. But if you already have a working laptop, why should you care? Oh, how much you have to learn. Besides operating well as a compact digital media hub, […]
Custom coffee vessels are the perfect piece of office flair, but it’s just a matter of time before your VOTE FOR PEDRO mug will start to lose its relevant wit. Why not have a new one every day, with whatever silly nonsense you want sticking off the sides? You can save big on your novelty […]