In wake of terrorist attacks, Canadian government seeks to increase police and spy agency powers

See here and here.

I don’t think this is necessary; as I said after the attacks, I think security on Parliament Hill, and other government sites, should be ramped up, certainly – and if you’re going to have guards at the War Memorial, arm them so they can do their job properly.

But also, I think we should let those who want to leave go; keeping them here only increases the odds that they’ll carry out attacks here, rather than simply joining IS over there.

Moreover, free societies should allow people the freedom to leave, if they wish to do so.

The police don’t need more powers; they need re-focusing, away from ordinary Canadians.

By all means, keep better tabs on those who are potential risks.

But stop being tyrannical towards ordinary citizens.

Increased police powers can only mean more police tyranny.

Devices being remotely wiped in police custody


All the data on some of the tablets and phones seized as evidence is being wiped out, remotely, while they are in police custody, the BBC has learned.

Cambridgeshire, Derbyshire, Nottingham and Durham police all told BBC News handsets had been remotely “wiped”.

And Dorset police said this had happened to six of the seized devices it had in custody, within one year.

The technology used was designed to allow owners to remove sensitive data from their phones if they are stolen.

“If a device has a signal, in theory it is possible to wipe it remotely,” said Ken Munro, a digital forensics expert with Pen Test Partners.

A spokeswoman for Dorset police told the BBC: “There were six incidents, but we don’t know how people wiped them.

“We have cases where phones get seized, and they are not necessarily taken from an arrested person – but we don’t know the details of these cases as there is not a reason to keep records of this,” she added.

A spokeswoman for Derbyshire police confirmed that the force had had one incident of a device being remotely wiped while in police custody.

“We can’t share many details about it, but the case concerned romance fraud, and a phone involved with the investigation was remotely wiped,” she said.

“It did not impact upon the investigation, and we went on to secure a conviction,” she added.

Meanwhile Cleveland police told the BBC that it too had had a case of a phone that had been wiped but it was not clear “whether it was wiped prior to coming into police hands”.

Asked whether the police felt that the issue had damaged their investigation, the spokeswoman said: “We don’t know because we don’t know what was on the phone.”

Other police forces affected by the issue include:

  • Cambridgeshire – one incident between August 2013 and August 2014
  • Durham – one incident during the same period
  • Nottingham – one incident

Mr Munro, who analyses hundreds of laptops, tablets, phones and other devices for corporate clients, said: “When we seize a device for digital forensics, we put it immediately into a radio-frequency shielded bag, which prevents any signals from getting through.

“If we can’t get to the scene within an hour, we tell the client to pop it in a microwave oven.

“The microwave is reasonably effective as a shield against mobile or tablet signals – just don’t turn it on.”

SecureDrives, which develops hard drives for the military, is releasing one next year that can be physically destroyed just by sending a text message.

The hard drive -which will cost more than £1,000 – is also immune to the radio-frequency blocking bags.

“The hard drive is constantly looking for GSM [Global System for Mobile Communications] signals, if it is starved of them it it would destroy itself. It would see such a bag as a threat,” said James Little, head of sales at SecureDrives.

Fake Cell Towers Allow the NSA and Police to Keep Track of You

oogenhand, you’ll be interested in this:

The Internet is abuzz with reports of mysterious devices sprinkled across America—many of them on military bases—that connect to your phone by mimicking cell phone towers and sucking up your data. There is little public information about these devices, but they are the new favorite toy of government agencies of all stripes; everyone from the National Security Agency to local police forces are using them.

These fake towers, known as “interceptors,” were discovered in July by users of the CryptoPhone500, one of the ultra-secure cell phones released after Edward Snowden’s leaks about NSA snooping. The phone is essentially a Samsung Galaxy S3 customized with high-level encryption that costs around $3,500. While driving around the country, CryptoPhone users plotted on a map every time they connected to a nameless tower (standard towers run by wireless service providers like Verizon usually have names) and received an alert that the device had turned off their phone’s encryption (allowing their messages to be read).