Surveillance: America's Pastime by Jared Rodriguez / t r u t h o u t; Adapted: naixn, Jason Smith / feastoffun.com) (CC BY-NC-SA 2.0)

Surveillance: America's Pastime by Jared Rodriguez / t r u t h o u t; Adapted: naixn, Jason Smith / feastoffun.com) (CC BY-NC-SA 2.0)

Surveillance

Canada Facilitated NSA’s Effort To Weaken Encryption Standards

The NY Times reports that Canada played a notable role in assisting the NSA to weaken encryption standards. The Times reports: internal memos leaked by a former N.S.A. contractor, Edward Snowden, suggest that the N.S.A. generated one of the random number generators used in a 2006 N.I.S.T. standard – called […]

Read more ›

September 11, 2013 2 comments News

Time for Canadian Privacy Regulators to Take Action on Pervasive Surveillance

As the near-weekly revelations of pervasive surveillance activities generates both debate and mounting opposition in the United States and Europe, the Canadian reaction has remained somewhat muted. Following an initial flurry of coverage over the surveillance activities of Canadian intelligence agencies, the issue has largely disappeared despite evidence that Canadian data is regularly collected by foreign intelligence agencies, most notably the U.S. National Security Agency.

Interestingly, the battle over the potential entry of Verizon into Canada may have opened the door to greater public scrutiny of the privacy practices of all telecom carriers. The debate unexpectedly features a privacy and surveillance dimension, with the incumbents and their unions raising fears about the link between Verizon and U.S. surveillance.

Verizon may raise privacy concerns, but my weekly technology law column (Toronto Star version, homepage version) notes it is worth asking whether the Canadian carriers can provide assurances that Canadian phone and Internet activity is any less prone to surveillance. The major Canadian carriers have been very secretive about many of these issues. In fact, a recent University of Toronto report found that none issue transparency reports (Google, Twitter, and Microsoft do), inform users about data requests, state where data is routed and stored, or avoid U.S. routing.
 

Read more ›

August 27, 2013 16 comments Columns

Time for Canadian Privacy Regulators to Take Action on Pervasive Surveillance

Appeared in the Toronto Star on August 24, 2013 as Time for Canadian Privacy Regulators to Take Action on Pervasive Surveillance As the near-weekly revelations of pervasive surveillance activities generates both debate and mounting opposition in the United States and Europe, the Canadian reaction has remained somewhat muted. Following an […]

Read more ›

August 27, 2013 Comments are Disabled Columns Archive

CSEC Commissioner: Canadians May Have Been Illegally Targeted in Surveillance Activities

The Communications Security Establishment Commissioner released his annual report yesterday with findings that some Canadians may have been the subject of surveillance activities in violation of the law. The finding states: I had no concern with respect to the majority of the CSEC activities reviewed. However, a small number of […]

Read more ›

August 22, 2013 14 comments News

Does it Matter Where Your Data Lives?

Does it matter where your computer data such as email, digital photos, personal videos, and documents resides? The Canadian Chamber of Commerce apparently doesn’t think so. It recently joined forces with its U.S. counterpart to argue for new rules in the Trans Pacific Partnership – a proposed new trade agreement that includes Canada, the U.S., Japan, Australia and many other Asian and South American countries – that would create barriers to privacy protections designed to require that personal data be stored locally.

My weekly technology law column (Toronto Star version, homepage version) notes that for many years, the issue was largely irrelevant to most computer users since their data was typically kept on computer hard drives within their own homes or offices. While there was always a security risk associated with malware or hackers, using reasonable security precautions provided some protection and there was little risk of warrantless access to the data.

Read more ›

August 21, 2013 13 comments Columns