Technology, Thoughts & Trinkets

Touring the digital through type

  • Home
  • Academic CV
  • SIGINT Summaries
    • CSE Covernames
    • GCHQ Covernames
    • GCSB Codenames
  • Resources
    • IMSI Catchers in Canada Resources
    • Canadian Electronic Surveillance Reports
    • CATSMI Project
    • Academic (Drafts)
    • Public Advocacy
    • Other Summaries
  • Blog Archives
  • About
    • About
    • Privacy Policy
  • Contact
  • RSS Feed
  • Home
  • Academic CV
  • SIGINT Summaries
    • CSE Covernames
    • GCHQ Covernames
    • GCSB Codenames
  • Resources
    • IMSI Catchers in Canada Resources
    • Canadian Electronic Surveillance Reports
    • CATSMI Project
    • Academic (Drafts)
    • Public Advocacy
    • Other Summaries
  • Blog Archives
  • About
    • About
    • Privacy Policy
  • Contact
  • RSS Feed

Archives

  • 2007
  • 2008
  • 2009
  • 2010
  • 2011
  • 2012
  • 2013
  • 2014
  • 2015
  • 2016
  • 2017
  • 2018
  • 2019
  • 2020
  • 2021
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

July 2007 ( View complete archive page )

  • Review of "National Identities and Communications Technologies" by Mark Poster
  • Genealogy and the 'Net
  • Review of "In the national interest" by Allen Buchanan
  • Review of "Making Technology Democratic" by Richard E. Scolve
  • Review of "A cosmopolitan perspective on the global economic order" by Thoman Pogge
  • Copyfraud, the Corporation, and College Publishing
  • "Blogging Democracy: The contribution of political blogs to democracy" by Gareth Lewis
  • "Principles of cosmopolitan order" by David Held
  • The First Post - Embarking on a New Voyage

August 2007 ( View complete archive page )

  • Education, Social Networks, and Privacy
  • Education, Web 2.0, and Privacy
  • Wikis and Education
  • Brief Thoughts on Blogging and Education
  • Webcams and Teleconferencing in Education
  • Email and Calendaring
  • Web 2.0 and Education
  • One Laptop Per Child and Long-term Possibilities for Education
  • Online Data Storage and Privacy
  • Search and Privacy
  • Unscheduled Broadcast
  • Open Source and Open Office XML
  • Web 2.0, Facebook, Government, and Business
  • Fear, Uncertainty, Doubt and Google Corporation
  • Public and Private Digital Space

September 2007 ( View complete archive page )

  • Administrative Note
  • Who the Hell is Digital Privacy About?!?
  • Global Privacy and the Particular Body Politic
  • Doubleclick + Adblock = I'm a Moral Monster?
  • Reading, Reviewing, and Recording
  • So...You Want to Redefine 'Privacy', eh?
  • New Update Schedule
  • Teaching Portfolio - Save Everything?
  • Social Networking - Why We Need to Educate Youth
  • Techno-magnates and the Third World

October 2007 ( View complete archive page )

  • Away For a Bit
  • Shield the Sources, Shield the Telecoms
  • The Birthing of a Conference
  • Bombs, bombs, and the children
  • Read History. Be Fearless.
  • Piracy, Privacy, and Big Brother

November 2007 ( View complete archive page )

  • Fact, Character, and Family Narrative
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

February 2008 ( View complete archive page )

  • Who Decides 'Analogue' Citizenships?
  • When Does Legal Publicity Punish Citizens?
  • Three-Strike Copyright
  • Techno-Trinkets: Firefox Bookmarks, Flash Books, and Redundent Data Storage
  • OpenID and You
  • Shaping your Identity

March 2008 ( View complete archive page )

  • A Not-Good Relationship
  • Obama Race Speech
  • Privacy: A Quick Lit Review
  • Mobiles and Your Identity
  • Transparent Commons
  • Who Are You?

April 2008 ( View complete archive page )

  • Lollipop Ladies and Ubiquitous Surveillance
  • Boost Up Your Net With ISP Injections
  • Social Networking: The Consumption?
  • The Digital Workshop and Analogue Drill Presses
  • Repairing iWeb
  • Honda GPS Warns Drivers of High Crime Zones
  • The Making of a Media Center
  • Identification, Identity Systems, and the REAL ID Act
  • The Book Industry Needs to Change! Why (most) authors and publishers need not fear online piracy

May 2008 ( View complete archive page )

  • The Sweet Smell of Redmond...
  • See Me TV
  • Counterfeit and Security
  • It Just Works (Sometimes)!
  • Common-law = Snooplaw

June 2008 ( View complete archive page )

  • I See Your DPI and Raise You a SSL
  • Why Lessig is Right (At Least When it Comes to Autobots)
  • Resetting Windows Vista Media Center
  • Transparency and *My* Click-Stream
  • DPI, Employees, and Proper Inspection
  • The Coming of Ubiquitous Bandwidth?

July 2008 ( View complete archive page )

  • Public Databases and Massive Aggregation of Data
  • Mac Preview: Towards Breaching Bill C-61 (Copyright in Canada)

August 2008 ( View complete archive page )

  • Three Strikes and Goodbye World
  • Do RFID security worries still need a reality check?
  • Privacy worry over location data - Solution is from Facebook?
  • Pro-privacy initiatives are getting out of hand - Or Are They?

October 2008 ( View complete archive page )

  • Fixing Apple Mail

November 2008 ( View complete archive page )

  • Comment: Media Attention to Blackberries In Mumbai
  • Technology Fix: Pocket Mac and Blackberry Devices
  • Comment: Apple, encryption, and being uber-lame
  • Advertising: Targeting Your Ecosystem
  • Thoughts - Study reminds us why we're always fixing our parents' PCs
  • Update - Bill 85 (Photo Card Act)
  • Study: Stolen Web Content Sees More Traffic Than The Original
  • Interview - Enhanced Drivers Licenses on CFUV
  • Short Thought Concerning Enhanced Drivers Licenses
  • Comment - Major ISPs To Deploy P4P Within Months
  • Article - Driving Your Liberties Away: Biometrics and 'Enhanced' Drivers Licenses
  • Site Overhaul
  • Abandoning Your Privacy, One Radio Wave, One Smile, at a Time
  • Bell Mobility and Solo Mobile make mobile Internet access safer

December 2008 ( View complete archive page )

  • Review: Everything is Miscellaneous
  • Review: Protectors of Privacy
  • Thoughts: Why do I focus on digital privacy issues?
  • Thoughts: Deep Packet Inspection and Copyright Protection
  • Review: The Privacy Advocates
  • Review: Remix - Making Art and Commerce Thrive in the Hybrid Economy
  • Comment: To RFID or not to RFID, that is the question
  • Comment: Virgin Takes Aim At BitTorrent
  • EDL Update: Canada backpedals on sharing personal database with U.S.
  • EDL Update: Privacy Impact Assessment Released!
  • Internet: Drowning in the Bits of UDP
  • Update: Geolocation and Mobiles
  • Privacy: Available on Facebook for a cost (kinda)
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

January 2009 ( View complete archive page )

  • Summary: CRTC PN 2008-19; Requests for Public Disclosure Filings
  • Thoughts: Deep Packet Inspection Analogies
  • Comment: Canadian ISPs and Internet Traffic Management
  • Summary: CRTC PN 2008-19; ISP Traffic Managment in Canada
  • Trinkets: Acer Aspire One Review
  • Review: Privacy On The Line
  • Technology - Questions of Digitizing Identity
  • Thoughts - Building Platforms for the Future
  • Update: Mobiles and Your Identity
  • Technology: CBC's Search Engine and Traffic Shaping
  • Thoughts: P2P and Complicity in Filesharing
  • Review: Access Denied
  • Thoughts: Ownership of Public Clouds

February 2009 ( View complete archive page )

  • Announcement: Working Paper on DPI Now Available
  • Thoughts: Irish Newest Victims in the Copyright Wars
  • DPI Deployed for Mobile Advertising
  • Update: Repatriation of EDL Database
  • Draft: Public Comments for CRTC PN 2008-19
  • Update: Geolocation and Yahoo!'s Fire Eagle
  • Update: Associating Canadian ISPs with Anonymized Data Traffic Submissions
  • Update: CRTC PN 2008-19 ISP Filing Summary Document
  • Update: 'More Secure' (non-EDL) Drivers Licenses Coming to BC Soon!
  • Funny: Cisco and Valentines
  • Update: CRTC PN 2008-19 Filings
  • Update: Network Management, Packet Inspection, and Stimulus Dollars?
  • Site Updates
  • Comment: Google Latitude
  • Update: Ontario EDL Suppliers Named
  • BC Privacy Commissioner Would Resign Over Longterm Surveillance
  • Update: Bell Users' Average Bandwidth Use
  • Reflections: Day Zero of 'Life in a Digital Fishbowl'
  • Review: Canadian Copyright - A Citizen's Guide
  • Update: Manitoba and EDLs

March 2009 ( View complete archive page )

  • The Role of Digital Surveillance in Stopping the Past's Rebirth
  • Demonstration: Another Awesome Mashup + Constituent Part
  • Three-Strikes to Banish Europeans and Americans from the 'net?
  • Note: EDLs in New Brunswick and Nova Scotia?
  • Ontario Information and Privacy Commissioner, and DRM
  • Update: More on Quebec EDLs
  • Update: EDLs in Saskatchewan and Quebec
  • Demonstration: Why Mashups are Awesome
  • Update: EDLs in Saskatchewan
  • Update: EDLs and Real ID
  • Thoughts: Google and 'Interest Based' Advertising
  • Conference Presentation: The Ontological Crisis of Melacholia

April 2009 ( View complete archive page )

  • EDL 'Oopsies' Around Canada
  • Thoughts: P2P, PET+, and Privacy Literature
  • Facial Blurring = Securing Individual Privacy?
  • Update: EDLs Live in BC
  • Draft: Code-Bodies and Algorithmic Voyeurism
  • Facebook Fights Search Engines Over Copyright
  • Analysis: ipoque, DPI, and bandwidth management
  • Analysis: ipoque, DPI, and copyright
  • Office of the Privacy Commissioner of Canada Reveals their Deep Packet Inspection Website
  • Analysis: ipoque, DPI, and encryption
  • Update: EDLs in New Brunswick

May 2009 ( View complete archive page )

  • DPI and Canadians' Reasonable Expectations of Privacy
  • Byte-Based Billing and Smart Pipes
  • Holistic and Pragmatic Approaches to Privacy Theorization
  • UK Government Responds to Phorm Petition
  • Administrative Note: Away for a While
  • Canadian Privacy Advocates and Their Privacy Commissioners
  • Deep Packet Inspection and the Confluence of Privacy Regimes
  • Draft - Who Gives a 'Tweet' About Privacy?
  • Twitter and Privacy in Social Context
  • Twitter and Statutory Notions of Privacy
  • Follow-up: Newspapers and Business Models
  • Newspapers: Effects of Closing their Content Ecosystem?
  • EU: Judicial Review Central to Telecom Disconnects
  • Privacy, Dignity, Copyright and Twitter
  • Privacy Advocates and Deep Packet Inspection: Vendors, ISPs, and Third-Parties
  • Deep Packet Inspection: The Good, the Bad, and the Ugly

June 2009 ( View complete archive page )

  • Solved: Apple Time Capsule Not Found in Airport Utility
  • Draft: What's Driving Deep Packet Inspection in Canada?
  • Universities Struggle to Cope with Anti-Piracy Requirements
  • Iran, Traffic Analysis, and Deep Packet Inspection
  • Canadian Telecom Summit and DPI
  • CFP 2009 Panel on DPI
  • Now Showing: EDL Security Theatre

July 2009 ( View complete archive page )

  • Deep Packet Inspection: What Innovation Will ISPs Encourage?
  • Deep Packet Inspection and the Discourses of Censorship and Regulation
  • Economics of Authenticity on Twitter
  • Facebook Got Off Easy: Third-Parties and Data Collection
  • Background to North American Politics of Deep Packet Inspection
  • Solved: Apple SATA II 1.7 Firmware Problems
  • Administrative Note: Changes Implemented
  • Deep Packet Inspection and Law Enforcement

August 2009 ( View complete archive page )

  • The Geek, Restraining Orders, and Theories of Privacy
  • Context, Privacy, and (Attempted) Blogger Anonymity
  • Continuums of Social Media?
  • Beyond Fear and Deep Packet Inspection
  • Talking About Deep Packet Inspection Tomorrow
  • Review: The Long Tail (Revised and Updated)

September 2009 ( View complete archive page )

  • Some Data on the Skype iPhone Application
  • Analysis: ipoque, DPI, and Network Neutrality
  • The Business of Infringing Content

October 2009 ( View complete archive page )

  • Copyright and the Blank Media Levy

November 2009 ( View complete archive page )

  • Tracing the Network, Tracing the NSA
  • Privacy Norms in the Bio-Digital World
  • Rendering CCTV (Somewhat) More Transparent
  • Google Dashboard - Does It Need Another Name?
  • Thinking About a 'Privacy Commons'

December 2009 ( View complete archive page )

  • Some Blogroll Love
  • Will Copyright Kill eHealth?
  • Facial Recognition and Enhanced Drivers Licenses
  • Aggregating Information About CView
  • Update to Virgin Media and Copyright DPI
  • Virgin Media to Monitor Copyright Infringement
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

January 2010 ( View complete archive page )

  • Data Privacy Day and Anonymity
  • Crown, Copyright, and the CRTC
  • Dispelling FUD: Iran and ISP Surveillance

February 2010 ( View complete archive page )

  • Applecare and the Time Capsule
  • Digital Crises and Internet Identity Cards
  • APIs, End-Users, and the Privacy Commons
  • New RSS feed, 'Worth Reading'

March 2010 ( View complete archive page )

  • Draft - Deep Packet Inspection: Privacy, Mash-ups, and Dignities
  • Why Mash-up Matters
  • Deep Packet Inspection and Mobile Discrimination
  • IPv6 and the Future of Privacy

April 2010 ( View complete archive page )

  • Twitter, Mobile Browsers, and Metadata Privacy
  • Deep Packet Inspection Canada
  • Choosing Winners with Deep Packet Inspection
  • Thoughts on COUNTER: Counterfeiting and Piracy Research Conference

May 2010 ( View complete archive page )

  • Integrating Posterous
  • DoubleClick, Cookies, and Personal Information
  • Review: Delete - The Virtue of Forgetting in the Digital Age
  • Journal Publication: Moving Across the Internet
  • Privacy Issues Strike Street View (Again)

June 2010 ( View complete archive page )

  • Packet Headers and Privacy
  • Apple and Locational Data Sharing
  • The Consumable Mobile Experience
  • UK Copyright: Businesses > Citizens?
  • Forrester Needs to Rethink on Privacy
  • Cisco Brings Targeted Ads Home

July 2010 ( View complete archive page )

  • Update: Feeva, Advertising, and Privacy
  • Ole, Intellectual Property, and Taxing Canadian ISPs
  • Traffic Management on Mobile Gets Regulated
  • On a Social Networking Bill of Rights
  • Review: Apple iPad
  • Kinder DRM Still Undermines Digital Abundance

August 2010 ( View complete archive page )

  • Solved: Bluetooth Devices Not Connecting to OSX
  • Call for Cyber-Surveillance Annotated Bibliographies
  • Cyber-Surveillance in Everyday Life
  • Analyzing the Verizon-Google Net Neutrality Framework

September 2010 ( View complete archive page )

  • Forthcoming Talk at Social Media Club Vancouver
  • Forthcoming Talk at Social Media Camp Victoria
  • Data Retention, Protection, and Privacy

October 2010 ( View complete archive page )

  • Recording of 'Traffic Analysis, Privacy, and Social Media'
  • References for 'Putting the Meaningful into Meaningful Consent'
  • Do You Know Who Your iPhone's Been Calling?
  • References for Traffic Analysis, Privacy, and Social Media

November 2010 ( View complete archive page )

  • Decrypting Blackberry Security, Decentralizing the Future
  • Lesson Drawing from the Telegraph

December 2010 ( View complete archive page )

  • Distinguishing Between Mobile Congestions
  • Publication - Digital Inflections: Post-Literacy and the Age of Imagination
  • iPhone Promiscuity
  • Rogers, Network Failures, and Third-Party Oversight
  • Review: Internet Architecture and Innovation
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

January 2011 ( View complete archive page )

  • Deep Packet Inspection and Consumer Transparency
  • Is Iran Now Actually Using Deep Packet Inspection?
  • Agenda Denial and UK Privacy Advocacy
  • Administrative Note: Website Refresh
  • Controversial Changes to Public Domain Works
  • Review of Telecommunications Policy in Transition
  • Review of Wired Shut: Copyright and the Shape of Digital Culture

February 2011 ( View complete archive page )

  • Review: Surveillance or Security?

March 2011 ( View complete archive page )

  • Security, Hierarchy, and Networked Governance
  • Technology and Politics in Tunisia and Iran: Deep Packet Surveillance
  • Call for Assistance: A Broadband Analysis Tool

April 2011 ( View complete archive page )

  • Review: Network Nation - Inventing American Telecommunications
  • Released: Literature Review of Deep Packet Inspection

May 2011 ( View complete archive page )

  • Publications in OpenMedia's 'Casting an Open Net'

June 2011 ( View complete archive page )

  • Publication: Is Your ISP Snooping On You?
  • Vancouver's Human Flesh Search Engine
  • ISPs, Advocates, and Framing at the 2011 Telecom Summit

July 2011 ( View complete archive page )

  • Creeping Towards a State of Surveillance
  • Review of The Googlization of Everything
  • Google Analytics, Privacy, and Legalese
  • Review of The Offensive Internet: Speech, Privacy, and Reputation

August 2011 ( View complete archive page )

  • Online Voting and Hostile Deployment Environments
  • Review: Islands of Privacy
  • Weebly, Analytics, and Privacy Violations (Updated II)
  • Letter to Stephen Harper on Lawful Access Legislation
  • ISP Audits in Canada

September 2011 ( View complete archive page )

  • Towards Progressive Internet Policy in Canada

October 2011 ( View complete archive page )

  • Mobile Security and the Economics of Ignorance

November 2011 ( View complete archive page )

  • The Anatomy of Lawful Access Phone Records
  • Lawful Access, Its Potentials, and Its Lack of Necessity

December 2011 ( View complete archive page )

  • Respecting User Privacy in Wordpress
  • Recommended Books from 2011 Readings
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

January 2012 ( View complete archive page )

  • Publication: (Un)Lawful Access, Its Potentials, and its Lack of Necessity
  • (Un)Lawful Access: Vancouver Premiere & Panel Discussion
  • Transparent Practices Don’t Stop Prejudicial Surveillance

February 2012 ( View complete archive page )

  • The Issues Surrounding Subscriber Information in Bill C-30
  • Is Your ISP Snooping On You?
  • Announcement: Lawful Access Report Now Available
  • Canadian Sovereignty Online – one year later
  • (Un)Lawful Access Forum in Ottawa
  • Amici Curiae on IMSI Catchers

March 2012 ( View complete archive page )

  • The Danger Online Voting Poses to Democratic Legitimacy
  • Unpacking the Potential Costs of Bill C-30
  • (Un)Lawful Access Panel at University of Victoria
  • BCCLA Releases Electronic Devices at the Border Handbook

April 2012 ( View complete archive page )

  • The Danger of Fetishizing BlackBerry Messenger Security

May 2012 ( View complete archive page )

  • UVic, Google, and Trust Deficits
  • Canadian Social Media Surveillance: Today and Tomorrow

September 2012 ( View complete archive page )

  • Understanding the Lawful Access Decryption Requirement
  • (Draft) ANPR: Code and Rhetorics of Compliance
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

January 2013 ( View complete archive page )

  • Biometrics and the BC Services Card
  • Another Step Closer to Reining in ALPR in BC
  • Forgetting, Non-Forgetting and Quasi-Forgetting in Social Networking
  • How To Get Your Personal Information From Social Networks
  • The BC Services Card and Confused Public Outreach
  • Checking the Numbers Behind BC CareCard Fraud
  • Brief: Social Networking and Canadian Privacy Law
  • Review: In the Plex

February 2013 ( View complete archive page )

  • Enforcing Canadian Privacy Laws Against American Social Networking Companies
  • Lawful Access is Dead; Long Live Lawful Intercept!
  • (Draft) Deep Packet Inspection and Its Predecessors
  • Graph Search and 'Risky' Communicative Domains
  • Smart Chip, Simple Illusions: NFC and the BC Services Card

March 2013 ( View complete archive page )

  • Administrative Note

April 2013 ( View complete archive page )

  • BC Services Card Report Released

July 2013 ( View complete archive page )

  • AT&T's Anti-Infringement Patent
  • How to Dispel the Confusion Around iMessage Security

November 2013 ( View complete archive page )

  • A National ID Card By Stealth? The BC Services Card - Privacy Risks, Opportunities & Alternatives
  • The Politics of Deep Packet Inspection: What Drives Surveillance by Internet Service Providers?

December 2013 ( View complete archive page )

  • The Oddities of CBC's Snowden Redactions
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

January 2014 ( View complete archive page )

  • More Voices Call for Transparency in Canadian Telecommunications
  • Towards Transparency in Canadian Telecommunications

March 2014 ( View complete archive page )

  • Accountability and Government Surveillance
  • Practical Steps Towards Telecommunications Transparency
  • The Murky State of Canadian Telecommunications Surveillance

May 2014 ( View complete archive page )

  • Responding the the Crisis in Canadian Telecommunications

June 2014 ( View complete archive page )

  • A Crisis of Accountability -- The Canadian Situation
  • Canadian Cyberbullying Legislation Threatens to Further Legitimize Malware Sales

September 2014 ( View complete archive page )

  • It's Time for BlackBerry to Come Clean

November 2014 ( View complete archive page )

  • Review of Desk.PM's Publishing App (v. 1.0)
  • CSIS's New Powers Demand New Accountability Mechanisms
  • Advancing Encryption for the Masses
  • Microsoft’s OneDrive Storage Expands NSA Surveillance

December 2014 ( View complete archive page )

  • The Canadian SIGINT Summaries
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

January 2015 ( View complete archive page )

  • New Additions to the Canadian SIGINT Summaries
  • Draft: Do Transparency Reports Matter for Public Policy?

February 2015 ( View complete archive page )

  • Six New Additions to the SIGINT Summaries

March 2015 ( View complete archive page )

  • Five New Additions to the SIGINT Summaries

June 2015 ( View complete archive page )

  • ‘Defending the Core’ of the Network: Canadian vs. American Approaches
  • The Governance of Telecommunications Surveillance
  • New Update to the SIGINT Summaries

July 2015 ( View complete archive page )

  • Industry Canada Transparency Report Guidelines Intensely Problematic
  • Canadian Police Requests for Telecommunications Data
  • Does Mexico's Transparency Report Promote Accountability?

August 2015 ( View complete archive page )

  • Half-Baked: The Opportunity To Secure Cookie-Based Identifiers From Passive Surveillance
  • Canada's Quiet History Of Weakening Communications Encryption
  • Canadian Transparency Publications

October 2015 ( View complete archive page )

  • Stuck on the Agenda: Drawing Lessons from the Stagnation of "Lawful Access" Legislation in Canada
  • Beyond Privacy: Articulating the Broader Harms of Pervasive Mass Surveillance

November 2015 ( View complete archive page )

  • More Surveillance Powers Won't Prevent Intelligence Failures
  • Regarding Vidéotron's Practices Related to its Mobile Wireless Unlimited Music Service
  • Beyond ATIP: New Methods for Researching State Surveillance Practices
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

February 2016 ( View complete archive page )

  • The Limits of Tower Dump Privacy Protections in Canada
  • Why We Need to Reevaluate How We Share Intelligence Data With Allies

March 2016 ( View complete archive page )

  • Every Step You Fake: A Comparative Analysis of Fitness Tracker Privacy and Security
  • Public Submission on IMSI Catchers

September 2016 ( View complete archive page )

  • IMSI Catcher Report Calls for Transparency, Proportionality, and Minimization Policies

October 2016 ( View complete archive page )

  • Canada’s National Security Consultation: Digital Anonymity & Subscriber Identification Revisited… Yet Again

November 2016 ( View complete archive page )

  • Pleading the Case: How the RCMP Fails to Justify Calls for New Investigatory Powers
  • Dissecting CSIS’ Statement Concerning Indefinite Metadata Retention
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

April 2017 ( View complete archive page )

  • Computer network operations and ‘rule-with-law’ in Australia
  • Curated Canadian IMSI Catcher Resources

June 2017 ( View complete archive page )

  • Update to the SIGINT Summaries
  • The (In)effectiveness of Voluntarily Produced Transparency Reports
  • Transparency in Surveillance: Role of various intermediaries in facilitating state surveillance transparency

August 2017 ( View complete archive page )

  • Update to the SIGINT Summaries

October 2017 ( View complete archive page )

  • In Support of Chelsea Manning Entering Canada
  • Update to the SIGINT Summaries
  • Horizontal Accountability and Signals Intelligence: Lesson Drawing from Annual Electronic Surveillance Reports

December 2017 ( View complete archive page )

  • Citizen Lab and CIPPIC Release Analysis of the Communications Security Establishment Act
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

February 2018 ( View complete archive page )

  • New Report Shines Light On Limitations of Canadians' Data Access Rights

March 2018 ( View complete archive page )

  • SIGINT Summaries Update: Covernames for CSE, GCHQ, and GCSB

May 2018 ( View complete archive page )

  • Shining a Light on the Encryption Debate: A Canadian Field Guide

July 2018 ( View complete archive page )

  • Government Surveillance Accountability: The Failures of Contemporary Interception Reports

November 2018 ( View complete archive page )

  • Accountability and the Canadian Government’s Reporting of Computer Vulnerabilities and Exploits
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

March 2019 ( View complete archive page )

  • Practical Steps To Advance Cybersecurity in Canada’s Financial Sector

June 2019 ( View complete archive page )

  • A Predator in Your Pocket : A Multidisciplinary Assessment of the Stalkerware Application Industry

August 2019 ( View complete archive page )

  • Canada’s New and Irresponsible Encryption Policy: How the Government of Canada’s New Policy Threatens Charter Rights, Cybersecurity, Economic Growth, and Foreign Policy
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

May 2020 ( View complete archive page )

  • We Chat, They Watch: How International Users Unwittingly Build up WeChat’s Chinese Censorship Apparatus

June 2020 ( View complete archive page )

  • The Information Security Cultures of Journalism

December 2020 ( View complete archive page )

  • Huawei & 5G: Clarifying the Canadian Equities and Charting a Strategic Path Forward
  • Jan
  • Feb
  • Mar
  • Apr
  • May
  • Jun
  • Jul
  • Aug
  • Sep
  • Oct
  • Nov
  • Dec

March 2021 ( View complete archive page )

  • Building Trust in Chinese Infrastructure Vendors and Communications Intermediaries

April 2021 ( View complete archive page )

  • Review: Top Secret Canada-Understanding the Canadian Intelligence and National Security Community
  • On The Non-Consensual Sharing of Intimate Images of Men

Search

Canadian SIGINT Summaries

The Canadian SIGINT Summaries includes downloadable copies, along with summary, publication, and original source information, of leaked CSE documents.

Selected Publications

  • Molnar, Adam; Parsons, Christopher; Zoauve, Erik. (2017). “Computer network operations and ‘rule-with-law’ in Australia,” Internet Policy Review6(1).
  • Parsons, Christopher; Israel, Tamir. (2016). “Gone Opaque? An Analysis of Hypothetical IMSI Catcher Overuse in Canada,” Citizen Lab – Telecom Transparency Project // CIPPIC.
  • Parsons, Christopher. (2015). “Beyond Privacy: Articulating the Broader Harms of Pervasive Mass Surveillance,” Media and Communication 3(3).
  • Parsons, Christopher. (2015). “Stuck on the Agenda: Drawing lessons from the stagnation of ‘lawful access’ legislation in Canada,” Michael Geist (ed.), Law, Privacy and Surveillance in Canada in the Post-Snowden Era (Ottawa University Press).
  • Parsons, Christopher. (2015). “The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians,” Telecom Transparency Project.
  • Parsons, Christopher. (2015). “Beyond the ATIP: New methods for interrogating state surveillance,” in Jamie Brownlee and Kevin Walby (Eds.), Access to Information and Social Justice (Arbeiter Ring Publishing).
  • Parsons, Christopher; and Molnar, Adam. (2014). “Watching Below: Dimensions of Surveillance-by-UAVs in Canada” for the Surveillance Studies Centre and British Columbia Civil Liberties Association.
  • Bennett, Colin; Parsons, Christopher; Molnar, Adam. (2014). “Forgetting and the right to be forgotten” in Serge Gutwirth et al. (Eds.), Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges.
  • Bennett, Colin, and Parsons, Christopher. (2013). “Privacy and Surveillance: The Multi-Disciplinary Literature on the Capture, Use, and Disclosure of Personal information in Cyberspace” in W. Dutton (Ed.), Oxford Handbook of Internet Studies.
  • McPhail, Brenda; Parsons, Christopher; Ferenbok, Joseph; Smith, Karen; and Clement, Andrew. (2013). “Identifying Canadians at the Border: ePassports and the 9/11 legacy,” in Canadian Journal of Law and Society 27(3).
  • Parsons, Christopher; Savirimuthu, Joseph; Wipond, Rob; McArthur, Kevin. (2012). “ANPR: Code and Rhetorics of Compliance,” in European Journal of Law and Technology 3(3).

© 2021 Technology, Thoughts & Trinkets

Theme by Anders Noren — Up ↑