Moving on

When I joined Industry Canada in 2009, Canada’s Anti-spam Legislation was just Bill C-27, working its way through Parliament the first time, before being stopped by prorogation.

I have been very lucky to work with a great team at Industry Canada, and I’m proud of the work we did on CASL, as well as other files I contributed to.

But after five years in federal government, I am preparing for a move. After all, now that CASL is in force, it’s a natural time to go.

So I am very excited to be joining TekSavvy next week. I will be the lawyer responsible for regulated agreements and carrier relations. It’s a big change from what I’ve been doing here at Industry Canada, but I’m looking forward to the change: to learning and growing into my new role.

Police can search your cell phone when they arrest you

The Supreme Court just released their decision in R. v. Fearon, about whether police can search a person’s cell phone when they arrest the person. The Court found (in a 4-3 decision) that, in general, police can do such a search, as long as they follow certain conditions:

http://scc-csc.lexum.com/scc-csc/scc-csc/en/item/14502/index.do

Four conditions must be met in order for the search of a cell phone or similar device incidental to arrest to comply with section 8 of the Charter:

  • First, the arrest must be lawful.
  • Second, the search must be truly incidental to the arrest. This requirement should be strictly applied to permit searches that must be done promptly upon arrest in order to effectively serve the law enforcement purposes.  In this context, those purposes are protecting the police, the accused or the public; preserving evidence; and, if the investigation will be stymied or significantly hampered absent the ability to promptly conduct the search, discovering evidence.
  • Third, the nature and the extent of the search must be tailored to its purpose.  In practice, this will mean that only recently sent or drafted emails, texts, photos and the call log will, generally, be available, although other searches may, in some circumstances, be justified.
  • Finally, the police must take detailed notes of what they have examined on the device and how they examined it.  The notes should generally include the applications searched, the extent of the search, the time of the search, its purpose and its duration.  The record‑keeping requirement is important to the effectiveness of after‑the‑fact judicial review.  It will also help police officers to focus on whether what they are doing in relation to the phone falls squarely within the parameters of a lawful search incident to arrest.

Beyond that, in this particular case, it seems to get a little complicated. They find that the police did not meet all of these conditions – there was no evidence about precisely what was searched and why — so there was a breach of the defendant’s s. 8 rights. However, as a remedy of that breach, the Court found that the reasons to include the evidence (despite the breach) outweighed the reasons to exclude it. An example of the Court’s reasoning on this point (emphasis added):

[94] Of course, the police cannot choose the least onerous path whenever there is a gray area in the law. In general, faced with real uncertainty, the police should err on the side of caution by choosing a course of action that is more respectful of the accused’s potential privacy rights.  But here, if the police faced a gray area, it was a very light shade of gray, and they had good reason to believe, as they did, that what they were doing was perfectly legal.

The decision was 4-3. The dissenting justices basically made a privacy argument:

 [T]he weighty privacy interest that an arrested person has in a personal digital device will outweigh the state interest in performing a warrantless search incident to arrest, except in exigent circumstances…. Here, the searches of F’s phone were not justified and unreasonably infringed his privacy, in violation of s. 8  of the Charter . The facts of this case fall far below either standard for exigency…. The evidence which was unconstitutionally obtained should be excluded.

Robertson screw patent bound with Robertson screws

When Canadian inventor Peter Robertson filed his 1909 Canadian patent for the now ubiquitous Robertson screw (patent 116463), he bound the patent application using his new screws. You can see them in the scans in the Canadian Intellectual Property Office’s database:

Canadian Patent Document 116463. Claims page. Image 1 of 1

That’s dedication to a new invention.

Robertson was also granted a patent by the US patent office, but their scans are cleaner and don’t show the binding.

Deep Sea Fauna… with Googly Eyes

Deep Sea Fauna… with Googly Eyes

It seems silly, but… well, it is. A tumblr of photos of deep sea creatures improved with googly eyes? Yes please.

When bisons are bullies – Boing Boing

Buffalo buffalo Buffalo buffalo buffalo buffalo Buffalo buffalo’ is a grammatically correct sentence in American English

via When bisons are bullies – Boing Boing.

 

In 2013, Mayor Bloomberg asked designers to reimagine the city’s decrepit pay phones as internet-flinging, ad-spitting future machines. The winners were simply design concepts, never truly destined for reality. Now, the city is moving forward with the plan to retrofit its pay phones, after all.

NYC Will Turn 7,000 Old Payphones Into a Huge, Free Wi-Fi Network

In 2013, Mayor …

On managing emotions vis a vis Canada’s Anti-spam Legislation

“Take a few minutes to bang your desk, raise your fists in the air, shout out some curse words, and any other action that you should probably do with your office door closed,” the guide states. “You don’t want to be harboring this rage going forward since you want to be focused on what you have to do, not being mad that you have to do it.”

via New anti-spam law ‘a big deal’ for small businesses – The Globe and Mail.

 

First teach kids to be creative

Some rights reserved by BiblioArchives / LibraryArchives, licensed under the Creative Commons by-nc-nd 2.0 licence.

The US copyright industry is apparently drafting elementary school curriculum to teach kids that copying is wrong. But, as Jane Park points out,

This message is way too simple. In this digital age, the most important thing we should be teaching kids is to be creative and take full advantage of all the web has to offer. Copyright, asking permission, open licensing, and all the other legal nuances, should be seen as secondary (and even complementary) to this purpose. We should be starting with the things kids can do versus what they can’t do.

via Open curriculum alternatives to MPAA’s new anti-piracy campaign for kids – Creative Commons.

Feel safe knowing websites only store hashes of your passwords? You’re not.

As Ars Technica writes, even if you use complex passwords and a hacked website only stores password hashes (not actual passwords), passwords are terrifyingly easy to figure out from hashes. As this article says, “with the hashes exposed, users should presume their passwords are already known to the attackers.”

To protect yourself, you need to use third party authentication like openid and two-factor authentication whenever they are available, as well as a password manager to generate and keep track of very long random passwords.

Otherwise, it looks like you should assume your password will get hacked.

Read the story here: Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331” | Ars Technica.

Follow

Get every new post delivered to your Inbox.

Join 1,909 other followers

%d bloggers like this: