Maher Arar, a Canadian who was rendered to Syria for years of brutal torture on the basis of bad information from Canada's intelligence agencies, writes in Prism about the revelation that Canadian public safety minister Vic Toews has given Canadian intelligence agencies and police the green light to use information derived from torture in their work. Arar cites examples of rendition and torture based on the "Hollywood fantasy that underlines the 'ticking bomb' scenario that minister Toews was apparently contemplating when he wrote this directive."
What makes this direction even more alarming is that the fat annual budgets devoted to enhancing national security have not been balanced by a similar increase in oversight. In fact, the government chose to ignore the most important recommendation of Justice O’Connor which is to establish a credible oversight agency that has the required powers to monitor and investigate the activities of the RCMP and those of other agencies involved in the gathering and dissemination of national security information. Unlike the powerless Commission for Public Complaints Against the RCMP (CPC) or the Security Intelligence Review Committee (SIRC) this agency would also be granted subpoena power to compel all agencies to produce the required documents.
Coming back to the directive one can only cite two examples here which I believe are sufficient to illustrate the hollowness of the argument presented in the directive. The first relates to the invasion of Iraq which we now know was based on false intelligence (see this video) that was extracted from Ibn al-Shaykh al-Libi while he was being tortured in Egypt. Al-Libi was later found dead inside his prison cell. Some human rights activists believe the Gaddafi regime liquidated him three years after he was rendered to Libya by the CIA.
Torture Directive 2.0
(Image: Rothenburg Germany Torture Museum, a Creative Commons Attribution (2.0) image from nanpalmero's photostream)
A little over a year ago, Bloomberg stunned the world with a report that claimed that Chinese intelligence services had figured out how to put undetectable, rice-grain-sized hardware implants into servers headed for the biggest US cloud and enterprise companies, and that when some of the victims discovered this fact, they quietly ripped out whole […]
How can a single, ill-conceived law wreak havoc in so many ways? It prevents you from making remix videos. It blocks computer security research. It keeps those with print disabilities from reading ebooks. It makes it illegal to repair people's cars. It makes it harder to compete with tech companies by designing interoperable products. It's even been used […]
Early versions of the free/open Unix variant BSD came with password files that included hashed passwords for such Unix luminaries as Dennis Ritchie, Stephen R. Bourne, Eric Schmidt, Brian W. Kernighan and Stuart Feldman.
There are a lot of different language apps out there because nobody learns anything the same exact way – especially not something as complex as a new language. For some people, the best way is to dive in and start talking, but that’s easier said than done if you’re not around those natives you aspire […]
There’s movie merch and then there are artifacts – one-of-a-kind items for the true fans only. These 11 items definitely fall into the latter category. We’ve unearthed movie art, props and other fan touchstones from the major nerd franchises of the last 50 years. Gaze upon these Star Wars and Marvel collectibles and don’t worry. […]
No matter what kind of office you work at, there’s probably an Excel expert in it. And no wonder: Businesses are still discovering uses for one of Microsoft’s flagship software suites beyond just bare-bones spreadsheets. Make October the month you become invaluable at work by taking one of these boot camps in Excel and its […]