 |
Privacy Commissioners' commentary on C-30 (Lawful Access)
The Windsor Star 06/11/2012 - In his opinion piece, police Chief Jim Chu repeats the now much-discredited analogy that subscriber data is equivalent to what is found in a phone book. We disagree. This information, which includes e-mail addresses and Internet protocol (IP) addresses, is not publicly available and can be used to reveal the web-related activities of law-abiding citizens. As Privacy Commissioners, we understand that the police may need new tools to investigate crime as technology advances. However, law enforcement officials have failed to provide persuasive factual evidence that current law has impeded police investigation of serious crimes, like those involving individuals who exploit children.
Read more
Bill C-30 must be amended to respect privacy rights
|
 |
 |
Oversight of security agencies
Changes to RCMP Act get little study in Commons
The Star 02/11/2012 - A bill that would make  the first major changes to the RCMP Act in 25 years will soon be back for a final vote in the Commons after only a few hours' committee study despite warnings it is flawed. Bill C-42 was tabled on the second last day of the spring sitting of Parliament and has been whipped through the Commons standing committee on public safety this fall at a gallop. The Conservative-dominated committee held just six hearings on the massive bill since Oct. 3, and approved the clause-by-clause study in short order Wednesday.
Read more
|
 |
 |
Drones
Mali, and the next war
Open Democracy 01/11/2012 - The growing prospect of western-b acked military intervention to reverse the spread of Islamism in west Africa is good news for an evolving al-Qaida movement. The risk of a new war against Islamists, centred on the west African state of Mali, is rising rapidly as United States and French diplomats seek support for action from other states in the region. The move reflects a much wider concern over the rise of groups seen as embracing the al-Qaida vision, even if their focus is on their own countries rather than the "far enemy": the United States and its western allies.
Code Pink, the Taliban and Malala Yousafzai
Open Democracy 13/10/2012 - You'd think that a US-UK peace delegation (Code Pink, Veterans for Peace, Reprieve) planning to go to the tribal areas might have asked for briefings from the  Women's Action Forum, Shirkat Gah, or any number of other Pakistani movement organizations. Instead their guide was Imran Khan, a cricket hero turned politician who organized a much-publicized motor procession to Waziristan to protest drone attacks. The members of the peace delegation do not seem to have been troubled by Khan's views or his dubious associations. Read moreA response - The politics of alliances: feminist peace action, drones and Code PinkA chat with counter-terrorism Chief John Brennan'OK, fine. Shoot him.' Four words that heralded a decade of secret US drone killings
Common Dreams 03/11/2012 - The Central Intelligence Agency (CIA) usually gets all the cred  it for the first US drone targeted killing beyond the conventional battlefield. But it was the military which gave the final go-ahead to kill on November 3, 2002. Lt General Michael DeLong was at Centcom headquarters in Tampa, Florida when news came in that the CIA had found its target. The deputy commander made his way down to the UAV Room, showing live video feeds from a CIA Predator high above Marib province in Yemen. The armed drone was tracking an SUV on the move. The six terrorist suspects inside were unaware that a decision had already been made to kill them. Read moreThe Malalas you don't seeAnti-US sentiment flourishes in PakistanOctober 2012 drone update: US covert actions in Pakistan, Yemen and Somalia
|
 |
 |
US elections and the war on terror
Mark Danner on the politics of fear
The New York Review of Books 22/11/2012 - More than a decade after the attacks of September 11, one might have thought a great democracy in choosing its leader could have found time at least to consider this ongoing and seemingly endless war: to debate, for example, whether the drone strikes, deeply unpopular as they are among Muslims, might be creating as many terrorists as they are killing; or to ask whether Americans truly believe that their president should have "the unreviewable power to kill anyone, anywhere, at any time" - including their fellow citizens - "based on secret criteria and secret information discussed in a secret process" with no judicial oversight whatever; or even to inquire of their leaders, actual or prospective, how many thousands will need to be killed in this manner before the war on terror could finally be declared at an end - if in fact it ever can be. Behind the targeted killings, does the Obama administration have a strategy that will bring this war to some conclusion?
Read more
|
 |
 |
 |
Anti-terror laws
|
 |
Biometrics
|
 |
Border security
|
 |
Charities and terrorism
|
 |
Criminalization of dissent
|
 |
Guantanamo
|
 |
National security
|
 |
Privacy
|
 |
Rule of law
|
 |
Surveillance and technology
|
 |
Terrorism
|
 |
War on terror
|
|
|
|
About us
The ICLMG is a national coalition of forty Canadian civil society organizations that was established in the aftermath of the September, 2001 terrorist attacks in the United States. You will find in this News Digest news articles, events, calls to action and much more regarding national security, anti-terrorism, civil liberties and other issues related to the mandate and concerns of ICLMG and its member organizations.
|
|
News from ICLMG
Bill C-42: Warren Allmand's speech before the SECU
|
 |
Take action
Security Certificate: An end in sight for Mahjoub?
Mr. Mahjoub's long struggle for justice and freedom is once again entering a critical phase. Much will take place over the next few months and the Justice for Mahjoub Network is calling for support actions across the country. Please read and forward and let us know how you can support.
|
|
Call for proposals
OPC Contributions Program
Be a leader in advancing privacy knowledge in Canada! The Office of the Privacy Commissioner is now accepting applications for its annual privacy research and knowledge translation funding program.
Read more
|
|
|