Maher Arar, a Canadian who was rendered to Syria for years of brutal torture on the basis of bad information from Canada's intelligence agencies, writes in Prism about the revelation that Canadian public safety minister Vic Toews has given Canadian intelligence agencies and police the green light to use information derived from torture in their work. Arar cites examples of rendition and torture based on the "Hollywood fantasy that underlines the 'ticking bomb' scenario that minister Toews was apparently contemplating when he wrote this directive."
What makes this direction even more alarming is that the fat annual budgets devoted to enhancing national security have not been balanced by a similar increase in oversight. In fact, the government chose to ignore the most important recommendation of Justice O’Connor which is to establish a credible oversight agency that has the required powers to monitor and investigate the activities of the RCMP and those of other agencies involved in the gathering and dissemination of national security information. Unlike the powerless Commission for Public Complaints Against the RCMP (CPC) or the Security Intelligence Review Committee (SIRC) this agency would also be granted subpoena power to compel all agencies to produce the required documents.
Coming back to the directive one can only cite two examples here which I believe are sufficient to illustrate the hollowness of the argument presented in the directive. The first relates to the invasion of Iraq which we now know was based on false intelligence (see this video) that was extracted from Ibn al-Shaykh al-Libi while he was being tortured in Egypt. Al-Libi was later found dead inside his prison cell. Some human rights activists believe the Gaddafi regime liquidated him three years after he was rendered to Libya by the CIA.
Torture Directive 2.0
(Image: Rothenburg Germany Torture Museum, a Creative Commons Attribution (2.0) image from nanpalmero's photostream)
Vtech is a ubiquitous Hong Kong-based electronic toy company whose kiddy tablets and other devices are designed to work with its cloud service, which requires parents to set up accounts for their kids. 4.8 million of those accounts just breached, leaking a huge amount of potentially compromising information, from kids’ birthdays and home addresses to […]
Yesterday, Dell was advising customers not to try to uninstall the bogus root certificate it had snuck onto their Windows machine, which would allow attackers to undetectably impersonate their work intranets, bank sites, or Google mail. Today, they apologized and offered an uninstaller — even as we’ve learned that at least one SCADA controller was […]
Last February, Lenovo shocked its security-conscious customers by pre-installing its own, self-signed root certificates on the machines it sold. These certificates, provided by a spyware advertising company called Superfish, made it possible for attackers create “secure” connections to undetectable fake versions of banking sites, corporate intranets, webmail providers, etc.
The Micro Drone 2.0+ is truly in a league of its own, offering a new perspective on aerial photography, and a world of technological capabilities that make flying ridiculously fun. Simply throw it in the air at any angle and its self-correcting algorithm will stabilize for smooth sailing in no time. You’ll stay entertained with […]
Celebrate Cyber Monday with some brain food. Save on any eLearning deal in the Boing Boing Store today using coupon code: CYBERMONDAY25. Below are a couple of our favorite eLearning offers: eduCBA Tech Training Bundle: Lifetime Subscription:Welcome to your personal online classroom, where you can finally study at your own pace, on your own time (and […]
This minimalist multi-tool will see to it that instead of rocking a tool belt, you’ll carry just one. It’s shaped slightly like a key and weighs less than an ounce, so it plays nice with your keychain. The strong surgical-grade stainless steel blade will last, and is handy for everyday tasks like opening boxes and […]