City officials confirm police requested data 4 times since March
By Jacques Marcoux, CBC News, June 7, 2017
Winnipeg Transit has handed over the private travel history of bus riders to law enforcement without requiring a warrant, CBC News has learned.
City officials confirmed that on four occasions since March of 2017, Winnipeg police have requested the data generated through the use of Peggo cards for a specific passenger to assist with an investigation. Read the rest of this entry
Leaks suggest spies can bypass encryption of messaging apps such as WhatsApp, Signal and Telegram
The Associated Press, March 7, 2017
WikiLeaks on Tuesday published thousands of documents purportedly taken from the Central Intelligence Agency’s Center for Cyber Intelligence, a dramatic release that appears to provide an eye-opening look at the intimate details of America’s cyberespionage toolkit. Read the rest of this entry
Rogers, TekSavvy and others say the government hasn’t justified why it needs expanded digital powers
By Matthew Braga, CBC News, Dec 20, 2016
Rogers, TekSavvy, and a consortium of Canadian information technology companies are pushing back against proposed changes to Canada’s national security legislation. Read the rest of this entry
Global sites for sharing movies, photos, music targeted in mass anti-terror surveillance
By Amber Hildebrandt, Michael Pereira and Dave Seglins, CBC News, Jan 27, 2015
Canada’s electronic spy agency sifts through millions of videos and documents downloaded online every day by people around the world, as part of a sweeping bid to find extremist plots and suspects, CBC News has learned.
Details of the Communications Security Establishment project dubbed “Levitation” are revealed in a document obtained by U.S. whistleblower Edward Snowden and recently released to CBC News. Read the rest of this entry
This article addresses the police use of new technologies to monitor and track the movements of people using cell phones or smart phones. It highlights the vulnerabilities of such phones, especially for those that may be subject to surveillance (such as warriors). Although the article does not go into other techniques, it is well known that such devices can also be turned into active listening devices even when turned off (by police or intelligence agencies secretly downloading “spyware” onto your phone, for example). Read the rest of this entry