Wiretap law backlash organised by Liberal staffer

Powered by SC Magazine
 

Minister backing interception bill hit with doxing campaign.

Canadian politician Victor Toews has been threatened with violence and had private details exposed by hackers for his support of a controversial lawful access bill in that country.

Toews had introduced the wide-ranging Bill C-30 which lets the Canadian Government ask ISPs for mandatory usage information about customers, and includes a gag order provision that stops service providers from informing customers about the surveillance.

The bill also allows the government to request information about emails and surfing habits on a voluntary basis. 

Toews became the subject of an information campaign known as Vikileaks in which a now disabled Twitter account disseminated personal information about the minister. 

Hacktivist collective Anonymous also leaked the name of his common law partner, said to be his mistress during his marriage, when he allegedly conceived a child with her.

The Vikileaks campaign was organised by Adam Carroll, a staffer for the opposition Liberal party. 

One of the most worrying aspects of the C-30 legislation for privacy advocates was the ability for the government to specify the nature of surveillance equipment used by an ISP, which theoretically gives it total visibility into the service provider's network.

The Bill has been sent to the Commons Public Safety and National Security Committee, before reaching its second reading.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Wiretap law backlash organised by Liberal staffer
 
 
 
Top Stories
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
Microsoft confirms Australian Azure launch
Available from next week.
 
NBN Co names first 140 FTTN sites
National trial extended.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  11%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 289

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  60%
 
No
  40%
TOTAL VOTES: 106

Vote