Law, Privacy and Surveillance in Canada in the Post-Snowden Era

Law, Privacy and Surveillance in Canada in the Post-Snowden Era

Author: Michael Geist

Publisher: University of Ottawa Press

Published: 2015-05-28

Total Pages: 381

ISBN-13: 0776621823

DOWNLOAD EBOOK

Years of surveillance-related leaks from US whistleblower Edward Snowden have fuelled an international debate on privacy, spying, and Internet surveillance. Much of the focus has centered on the role of the US National Security Agency, yet there is an important Canadian side to the story. The Communications Security Establishment, the Canadian counterpart to the NSA, has played an active role in surveillance activities both at home and abroad, raising a host of challenging legal and policy questions. With contributions by leading experts in the field, Law, Privacy and Surveillance in Canada in the Post-Snowden Era is the right book at the right time: From the effectiveness of accountability and oversight programs to the legal issues raised by metadata collection to the privacy challenges surrounding new technologies, this book explores current issues torn from the headlines with a uniquely Canadian perspective.


Top Secret Canada

Top Secret Canada

Author: Stephanie Carvin

Publisher: University of Toronto Press

Published: 2021-03-01

Total Pages: 408

ISBN-13: 1487536666

DOWNLOAD EBOOK

National security in the interest of preserving the well-being of a country is arguably the first and most important responsibility of any democratic government. Motivated by some of the pressing questions and concerns of citizens, Top Secret Canada is the first book to offer a comprehensive study of the Canadian intelligence community, its different parts, and how it functions as a whole. In taking up this important task, contributors aim to identify the key players, explain their mandates and functions, and assess their interactions. Top Secret Canada features essays by the country’s foremost experts on law, foreign policy, intelligence, and national security, and will become the go-to resource for those seeking to understand Canada’s intelligence community and the challenges it faces now and in the future.


Spyworld

Spyworld

Author: Mike Frost

Publisher:

Published: 1994

Total Pages: 298

ISBN-13:

DOWNLOAD EBOOK

"For twenty years Canada has been spying on other nations. Outside public scrutiny or Parliamentary review and frequently acting at the behest of U.S. and U.K. intelligence agencies. Canada has been spying electronically from its embassies in capitals as far-flung as Moscow, New Delhi, Bucharest, Rabat and Caracas. It has then shared the results with its allies. There is every reason to believe Canada is still doing "embassy collection" today. Techniques developed during the "Cold War" have been honed for political and economic espionage in the nineties." "The agency responsible is the top-secret Communications Security Establishment (CSE) of whose existence most Canadians are unaware. CSE has also used sophisticated equipment, much of it provided by the U.S., to listen in on Canadian and on American citizens, raising vital questions about civil liberties and the invasion of privacy. It has intercepted communications from the Soviet embassy in Ottawa; from British cabinet ministers; from the governments of France and Quebec; from suspected Sikh terrorists in India; and from the Kremlin. Its record is impressive: if it wants to, it can intercept almost any phone, fax or radiowave transmission." "How do we know all this? Because one man, Mike Frost, a communications officer at CSE for nineteen years, has decided that in the post-"Cold War" era it is time for the Canadian public to be told what its government has been doing and for a public debate to ensue." "As he tells the story of his career, he paints a remarkable picture of the Security Establishments of Canada, the U.S. and the U.K. The Americans in particular are revealed as possessing high-tech wizardry that they use for political and economic spying - including, according to Frost, highly controversial spying on the Canadian government. Much of Canada's spying from 1972 to 1990 was undertaken for the Americans. Frost and his immediate boss were at the centre of the "embassy-collection" scheme, which was code-named "Project Pilgrim". The story of how "Pilgrim" grew by trial and error into a highly successful operation is full of drama, comedy, triumphs and frustrations." "Frost is proud of the achievements, but the questionable aspects of CSE's activities have led him to go public on both CSE's successes and its excesses. While scrupulously careful about not jeopardizing national security or endangering the lives of agents in the field, he nonetheless reveals an institution whose powers are potentially so great that they need to be subject to Parliamentary control and public scrutiny. Spyworld will undoubtedly spur debate and controversy."--BOOK JACKET.Title Summary field provided by Blackwell North America, Inc. All Rights Reserved


Computers at Risk

Computers at Risk

Author: National Research Council

Publisher: National Academies Press

Published: 1990-02-01

Total Pages: 320

ISBN-13: 0309043883

DOWNLOAD EBOOK

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.


Protocols for Authentication and Key Establishment

Protocols for Authentication and Key Establishment

Author: Colin Boyd

Publisher: Springer Science & Business Media

Published: 2013-03-09

Total Pages: 343

ISBN-13: 3662095270

DOWNLOAD EBOOK

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly. This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature. As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.


Big Data Surveillance and Security Intelligence

Big Data Surveillance and Security Intelligence

Author: David Lyon

Publisher: UBC Press

Published: 2020-12-01

Total Pages: 303

ISBN-13: 0774864206

DOWNLOAD EBOOK

Intelligence gathering is in a state of flux. Enabled by massive computing power, new modes of communications analysis now touch the lives of citizens around the globe – not just those considered suspicious or threatening. Big Data Surveillance and Security Intelligence reveals the profound shift to “big data” practices that security agencies have made in recent years, as the increasing volume of information from social media and other open sources challenges traditional intelligence gathering. Working together, the Five Eyes intelligence partners – Australia, Canada, New Zealand, the United Kingdom, and the United States – are using new methods of data analysis to identify and pre-empt risks to national security. But at what cost to civil liberties, human rights, and privacy protection? In this astute collection, leading academics, civil society experts, and regulators debate the pressing questions raised by security intelligence and surveillance in Canada in the age of big data.


Cyber Conflict

Cyber Conflict

Author: Daniel Ventre

Publisher: John Wiley & Sons

Published: 2013-02-07

Total Pages: 264

ISBN-13: 1118562747

DOWNLOAD EBOOK

Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power. Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cyber defense and information warfare. It aims to analyze the processes of information warfare and cyber warfare through historical, operational and strategic perspectives of cyber attack. It is original in its delivery because of its multidisciplinary approach within an international framework, with studies dedicated to different states – Canada, Cuba, France, Greece, Italy, Japan, Singapore, Slovenia and South Africa – describing the state’s application of information warfare principles both in terms of global development and “local” usage and examples. Contents 1. Canada’s Cyber Security Policy: a Tortuous Path Toward a Cyber Security Strategy, Hugo Loiseau and Lina Lemay. 2. Cuba: Towards an Active Cyber-defense, Daniel Ventre. 3. French Perspectives on Cyber-conflict, Daniel Ventre. 4. Digital Sparta: Information Operations and Cyber-warfare in Greece, Joseph Fitsanakis. 5. Moving Toward an Italian Cyber Defense and Security Strategy, Stefania Ducci. 6. Cyberspace in Japan’s New Defense Strategy, Daniel Ventre. 7. Singapore’s Encounter with Information Warfare: Filtering Electronic Globalization and Military Enhancements, Alan Chong. 8. A Slovenian Perspective on Cyber Warfare, Gorazd Praprotnik, Iztok Podbregar, Igor Bernik and Bojan Ticar. 9. A South African Perspective on Information Warfare and Cyber Warfare, Brett van Niekerk and Manoj Maharaj. 10. Conclusion, Daniel Ventre


Glossary of Key Information Security Terms

Glossary of Key Information Security Terms

Author: Richard Kissel

Publisher: DIANE Publishing

Published: 2011-05

Total Pages: 211

ISBN-13: 1437980090

DOWNLOAD EBOOK

This glossary provides a central resource of definitions most commonly used in Nat. Institute of Standards and Technology (NIST) information security publications and in the Committee for National Security Systems (CNSS) information assurance publications. Each entry in the glossary points to one or more source NIST publications, and/or CNSSI-4009, and/or supplemental sources where appropriate. This is a print on demand edition of an important, hard-to-find publication.


Inside Canadian Intelligence

Inside Canadian Intelligence

Author:

Publisher: Dundurn

Published: 2011-05-30

Total Pages: 323

ISBN-13: 1554888913

DOWNLOAD EBOOK

Since 9/11, Canada has been on the front lines of a New World Order that few understand. And in today's world, secret intelligence is not just the first line of defence -- it may be the only one. Dwight Hamilton takes you inside the covert and dangerous world of espionage and international terrorism.