Thursday, July 21, 2011

Immigration Minister Jason Kenney confirmed Wednesday that as many as 1,800 new Canadians could be stripped of their citizenship because they were obtained fraudulently. : this will not go well for prime minister stephen harper in the end!

Immigration Minister Jason Kenney confirmed Wednesday that as many as 1,800 new Canadians could be stripped of their citizenship because they were obtained fraudulently.




“We are in the process of notifying them that we will be revoking their citizenship because Canadian citizenship is not for sale,” Kenney told the Economic Club of Canada.



Kenney said some of the individuals are believed to have used “unscrupulous” immigration consultants who submitted fraudulent applications on behalf of people who did not meet the qualifications for citizenship.



The 1,800 were identified following a three-year investigation by the RCMP, other police forces and Citizenship and Immigration Canada.



“By the way, we are not done with our investigation” Kenney said, noting that many of the accused live outside the country.



They can challenge the decision in Federal Court. If not, Cabinet will move to revoke their citizenship.



Citizenship revocation is relatively uncommon in Canada with only 63 people being stripped of their citizenship since 1977, Kenney said.



Most were for reasons related to residence fraud, criminality and false identity, or concealing their involvement in war crimes.



Speaking in Vancouver on Tuesday, Kenney said Ottawa is trying to discourage immigration fraud.



“For those who simply touch down and try to get a Canadian passport as a … passport of convenience, who don’t pay our taxes but who do consume our social benefits, I think that’s dishonourable,” he told reporters after delivering a speech to the Vancouver Board of Trade.



“There are many ways that we are combating immigration fraud and abuse of our generosity, whether it is from [bogus] asylum claimants, crooked immigration consultants, people smugglers [or] people who are abusing our citizenship program,” he said.



Kenney also announced that Canada will soon be introducing multi-year visas for low-risk visitors from around the world that will last 10 years.

Wednesday, July 20, 2011

Former chief justice of the Federal Court of Canada, Julius Isaac, died at the age of 82 in Regina on Saturday.

Former chief justice of the Federal Court of Canada, Julius Isaac, died at the age of 82 in Regina on Saturday.





Isaac was the country's first black chief justice and the first black person appointed to the Federal Court. He was head of the court for seven tumultuous years after being appointed by then-prime minister Brian Mulroney in 1991.





In an interview that year, Isaac said he considered himself a lawyer "first and foremost."





"It's no secret that I'm a black person. If having a great lawyer who is a black person assists minorities, that's a plus, an add-on. I don't have the sense the appointment is symbolic," he said at the time.





Born in Grenada, Isaac studied at the University of Toronto and spent 11 years in private practice before joining the federal government. He spent 17 years with the Justice Department before being appointed to the Supreme Court of Ontario in 1989.





While he was chief justice many of the judges were censured by the Canadian Judicial Council for behaviour — on and off the bench — that was deemed to be inappropriate.





Isaac himself was embroiled in scandal after it was revealed he met secretly with a government minister to try to speed up war-crimes prosecutions. The meeting with Ted Thomson, then-assistant deputy minister in charge of war crimes, took place while three Nazi war crimes cases were ongoing in the Federal Court.





Isaac was cleared, twice, of any wrongdoing even after the Supreme Court of Canada had originally called the meeting a serious affront to the appearance of judicial independence.





Isaac stepped down as head of the court in 1999 to become a part-time judge. He moved to Regina in 2006.

Tuesday, July 19, 2011

now the fun stuff : Ontario Progressive Conservative Leader Tim Hudak admits he “may have” signed a petition calling for the end to abortion funding in the past but promises not to reopen the debate if elected premier.

Ontario Progressive Conservative Leader Tim Hudak admits he “may have” signed a petition calling for the end to abortion funding in the past but promises not to reopen the debate if elected premier.




Hudak was responding to questions from the Star Monday regarding the Association for Reformed Political Action group listing him as someone who has “made it clear that he is pro-life and has signed petitions calling for abortion defunding and conscience legislation.”



Hudak said he will follow Prime Minister Stephen Harper’s lead and not revisit the abortion issue if he becomes premier Oct. 6.



The association has the post on its website, www.arpacanada.ca http://arpacanada.ca/index.php/issuesresearch/canadian-politics/577-ontarios-pc-leadership-race-where-do-the-candidates-stand END. The article addresses Conservative MPPs’ positions on certain issues in advance of the leadership vote in 2009. Hudak won the race on June 27, 2009.



“I may have signed a petition from my riding in that respect, but listen, let me be clear, we are not reopening this debate,” he said.



The Association for Reformed Political Action is a non-profit national organization that aims to make members of reformed churches more a part of public debate, said executive director Mark Penninga.



“The information we provided was all correct,” he said from Vancouver. “The email that made these points didn’t come from Hudak but someone in his campaign team.”



When the Star repeatedly asked Hudak if he is “pro-life” he refused to answer the question and walked away from the microphone.



Premier Dalton McGuinty has previously stated he supports a women’s right to choose. He was not available to comment Monday. But Finance Minister Dwight Duncan said Hudak’s refusal to answer the question speaks to his integrity.



“I think his integrity is an issue,” Duncan said.



“He does one thing then says another and tries to pretend he didn’t do it,” Duncan said, adding he is pro-choice. “I believe in the funding of it. But Mr. Hudak signs these things — I presume he reads them before he signs them — and I think that speaks to his integrity and to the kind of premier he would be.”



The New Democratic Party noted Monday it is the only party whose entire caucus has received a failing grade from the Campaign Life Coalition, a pro-life and pro-family movement.



Both Liberal and Conservative party members have tried to waffle on this issue, said NDP MPP Michael Prue (Beaches-East York).



“If he (Hudak) is a shade of grey, let him be a shade of grey. But don’t be telling one group that you want, and sign a petition, to defund abortion then tell everyone else you don’t want it to be an issue,” he said. “We in the NDP believe every woman has the right to choose.”



The Campaign Life Coalition says on its website that Hudak used to be “solidly pro-life” but has not responded to a questionnaire since 1995.



The website also notes Hudak, in 2009, chose to support an “openly lesbian candidate” in the St. Paul’s by-election. That candidate was Sue-Ann Levy, who lost to Liberal Eric Hoskins.

Monday, July 18, 2011

Conservative Party of Canada president John Walsh sent a letter July 1 that read, in part, that the Tories "appreciate the Chinese Communist Party" and would "look forward to the future relations between the two parties." : hmm so he is in love with the Chinese communists Party thats not going to go over well!!!.

OTTAWA - The political party that backed the creation of an Ottawa monument to victims of communism has also sent a congratulatory letter to the Communist Party of China (CPC) on its 90th anniversary.




Chinese media have reported that Conservative Party of Canada president John Walsh sent a letter July 1 that read, in part, that the Tories "appreciate the Chinese Communist Party" and would "look forward to the future relations between the two parties."



Human rights critics were not shy in their criticism.



Former MP David Kilgour described the letter as "naive with a capital 'N'."



Kilgour, who's no longer a member of any political party, added that the CPC has a nasty legacy that deserves criticism, not praise.



"It's everything that a democratic party in Canada or anywhere else in the world would want to keep at barge pole distance," he said.



Former diplomat and frequent critic of Chinese communists, Brian McAdam, slammed Walsh.



"Obviously the letter-writer, like many other persons in the government unfortunately, has very little knowledge about China," McAdam said. "It's been one of the most appalling regimes in human history."



Aside from religious persecutions, forced abortions and a sorry human rights record, tens of millions of people have been killed through famines and other Chinese communist policies.



McAdam suggests Chinese immigrants would probably be disappointed that the Conservatives had congratulated communist authorities.



"These people voted with their feet to leave China because they don't have any democracy and never will have any democracy in China," he said.



Neither Walsh nor other Tory officials responded to QMI Agency's requests for comment on the letter, but the Prime Minister's Office offered a brief statement.



"The promotion and protection of human rights is a big part of Canada's foreign policy and a priority in our dealings with China," wrote PMO press secretary Andrew MacDougall. "Canada takes every appropriate opportunity to express our concerns to the Chinese government and to urge China to implement and adhere to international standards of human rights."



Tribute to Liberty, a registered charity headed up by Canadians whose countries of ancestry were afflicted by communism, is now raising funds for an Ottawa memorial to the victims of communist crimes

Sunday, July 17, 2011

We're all human, you know? That's roughly the trick that the hackers most likely relied on when, earlier this year, they managed to steal over 24,000 files from a defense contractor. : Hackers Stole 24,000 Files From The Pentagon.

We're all human, you know? That's roughly the trick that the hackers most likely relied on when, earlier this year, they managed to steal over 24,000 files from a defense contractor.




The Pentagon won't say what files went astray, or the level of secrecy associated with the contents of the stolen data. But we can assume that at least some of it was highly secret--secret enough that Deputy Defense Secretary William J. Lynn III felt compelled to admit to the attack during a speech about the future of cyber policy yesterday. Lynn said it concerned some of the U.S.'s "most sensitive systems, including aircraft avionics, surveillance technologies" and more, before hinting that foreign powers were behind the attack and using it to declare cyberspace the next battleground.



What went down? We spoke to Nick Percoco, digital security expert and SVP at Trustwave's SpiderLabs, and familiar with exactly this sort of cyberattack, to get some insight.



How The Hack May Have Begun: Email Scams



The fact that the 24,000 stolen files came from a defense contractor is significant, Percoco notes. It's likely easier to get this sort of data from a contractor than launching an all-out attack on Pentagon servers themselves, because companies are full of people--people who are used to doing business in our digitally connected world. And even though an employee of a defense contractor is probably way more switched on to digital security than you or I, it's still not impossible to cheat someone with access to secret files into placing malware on their work laptop.



All it would take for a dedicated hacker is some basic research. If you wanted to steal data like this, you could start by targeting a particular employee via email--"We've seen this happen to defense contractors," Percoco notes. "Using technology like Google, and LinkedIn and other social networks" hackers could find out who best to target. Say they pick a particular EVP, and work out their email address is "JohnSmith@defencecontractorX.com." Then they work out who their colleagues or bosses may be all the way up to CEO level.



Then it's as simple as going to a source of hacking code using your underworld contacts (or using some of your own) and getting access to a "zero day exploit"--a new loophole in a computer or software system's security that hasn't been publicly discovered yet, and hence is still open for hacking use.



This is where the hack escalates. "In this case, they'd been looking for a zero-day exploit in, say, the Adobe PDF reader. And then they'd take a nice creative pen out and draft up a document that looks like it should be something important," Percoco said. After this, the hacker would set up something like a disposable Gmail account and make the screen name the same as one of the target's peers or the CEO of the company. Then they'd "craft up an email that says 'Here's an important document, some new announcement we're working on. Please review it and be ready for a call at 10 a.m. today.'" The trick is to send this to the target at around 7:30 a.m. local time, because the "best time to send those types of things is right before someone's had their coffee."



Typically the sleep-addled victim would trust the email as it's supposedly from a colleague, then launch the embedded PDF (or other faked document). Usually it causes the newly launched program--Adobe Reader in this example--to crash. But as it crashed, it would actually be installing malicious code on the machine. The virus is injected.



How The Attack Began: Website Sting



A similar attack is possible using a faked-up website that looks like it's actually related to the target company--one of those odd-looking, badly maintained websites that kinda looks official that we've all surfed to at some point and been confused by.



Some of these are actually storage pens for targeted malicious code, carefully honed to appear high on Google searches with SEO tricks. And when, say, a marketing official from the target company Googles to find out how their brand is being referenced around the web, they may stumble across one of these fake sites and trigger the release of malware onto their machine.



What Happened Next: Access Is King



Once the malicious code has been installed on the machine, the "sky's the limit," particularly via the email exploit. A well-coded virus code can evade detection and hide on the computer, doing various wicked things.



Often the "sole purpose of the executable is to go and find files on the person's computer and archive those in a zip file or RAR file, and then attempt to extract them from the system," Percoco said, based on his experience. The code could try lots of different routes, using FTP or HTTP or other protocols to get those files off the system. It's something he's seen in "many environments" and, worryingly, they're often "highly successful in getting those files." The code is typically designed to work on Windows machines, with almost no such exploits targeted at Macs--but Percoco agrees that this is at least partly due to the assumption by a hacker that a business user will be using a PC, not a Mac.



The success would be based on the fact no one's seen this particular kind of attack before (a zero-day exploit payoff) and it would easily circumvent any protective anti-virus software installed on the machine--because the protection doesn't know to look out for this type of virus. The only real way to avoid this sort of attack for the target to "avoid clicking on documents," which is clearly unlikely in the case of a business computer user.



A smarter hacker would select a network administrator at the target company, because they're human, too. Their machine likely has even more interesting files that have data on network security, what kind of code is let in and let out of company firewalls, and so on.



Getting access to this sort of data (via the same email hack as described above) could let a persistent hacker penetrate a company's network and install a backdoor onto it--totally circumventing security because then "the attacker doesn't have to come in from the outside, they have code running on that system that will basically open up a connection back to the attacker"--not something network security is expecting. Then you can gain access to passwords and credentials to worm your way in further, eventually finding whatever sensitive data you're looking for.



The result could be a grim violation of company security. "We've seen those for a number of years, in all sorts of companies including government-type companies as well," Percoco says.



Who Did This?



It's easy to see how a hacker could gain access to a machine and even a company network, and how easy it can be to transfer stolen files from infected computers to the hacker. But who is the hacker? The Deputy Secretary of Defense was careful to link it to "foreign" attackers--and considering this year's hacking news, we're instantly imagining China is to blame.



Percoco says his company does hundreds of investigations every year on attacks like these, and it's "very, very difficult to trace an attack to a specific person and specific political motivation." That's unless it's a hacktivist attack, when a group like Anonymous posts the data online and admits it was to blame--and even then "you don't know where these people are actually located."



A hacker could take his laptop down to a coffee shop, buy a cup of joe and "get on their free Wi-Fi system. And now they go and start looking around the world to find a computer that has a security weakness." Once they find it, they can use the hacked computer for a targeting scenario like the one described above, where they send a tainted email. Anyone tracing the code back after the attack was detected may find it sourced on a corporate computer in, say, China. And then they're stuck--because no one's "going to let the U.S. government come in and do a forensic investigation on some business located in China."



Furthermore, it's rare that even this first Net address is where the attack is coming from--"they're always jumping through one or many systems" Percoco says, which could be in numerous nations and thus completely confound any attempts to track them. Which means the attacker actually could be located anywhere.



The Cold Cyberwar?



Suddenly, there's a much more sinister angle to the Pentagon hack. Forget "The Chinese Way of Hacking." More like "Even More Malicious Hackers Looking Like They're Using The Chinese Way Of Hacking."

Saturday, July 16, 2011

Airline broke languages act, court says : Among several complaints to the Federal Court of Canada, Michel Thibodeau described how when he asked a unilingual anglophone flight attendant in French for a 7-Up, she gave him a Sprite. Thibodeau characterized the incident and others as "malicious, oppressive and reprehensible," conduct by Air Canada employees that only aggravated the violation of the couple's linguistic rights.

Air Canada has been ordered to pay an Ottawa French-language rights crusader and his wife $12,000 and formally apologize for failing to offer them services in French.

Among several complaints to the Federal Court of Canada, Michel Thibodeau described how when he asked a unilingual anglophone flight attendant in French for a 7-Up, she gave him a Sprite.
Thibodeau characterized the incident and others as "malicious, oppressive and reprehensible," conduct by Air Canada employees that only aggravated the violation of the couple's linguistic rights.
The court Wednesday agreed in part, and ruled the airline breached the Official Languages Act on four occasions in 2009 involving Thibodeau and his wife, Lynda, of Orléans.
"The applicants' language rights are clearly very important to them and the violation of their rights caused them a moral prejudice, pain and suffering and loss of enjoyment of their vacation," Justice Marie-Josée Bédard wrote in her judgment.
"It is also my opinion that awarding damages in this case will serve the purpose of emphasizing the importance of the rights at issue and will have a deterrent effect."
It is Michel Thibodeau's second successful legal action against the airline and its subsidiaries. In 2000, he was refused service in French when he tried to order a 7-Up from a unilingual English flight attendant on an Air Ontario flight from Montreal to Ottawa.
Thibodeau filed suit in Federal Court for $525,000 in damages. The court upheld his complaint, ordered the airline to make a formal apology and pay him $5,375.95. Thibodeau was later honoured by the French-language rights group, Imperatif français.
In 2007, he filed a complaint against the City of Ottawa, accusing it of not providing sufficient bilingual services on its buses.
In the latest case, the Thibodeaus initially complained of eight instances in 2009 in which they did not receive services in French at airports in Atlanta, Toronto and Ottawa and aboard three related Air Canada Jazz flights between Canada and the United States.
The Official Languages Act requires Air Canada to communicate and provide services in both official languages in the National Capital Region and elsewhere in Canada, "where there is significant demand for those services in the minority language and where it is warranted by the nature of the office or facility."
In an affidavit filed with court, Michel Thibodeau, who represented the couple, criticized the attitude of a flight attendant on the flight from Charlotte to Toronto on May 12, 2009.
"When I boarded the plane at 11: 00 a.m., I said hello to the flight attendant. She replied in English. I asked her whether she spoke French, and she said 'no' in English. She said that there was no service in French. So, no active offer of services in French, and no service in French on that flight.
"At 10 past 11, the flight attendant came by, and she stopped to tell me that she was not obliged to speak French, that she and several other unilingual English flight attendants had been hired in the '90s and that service in French was not mandatory.
"With a sarcastic smile, she asked Lynda and me whether we were from Quebec. We replied that we lived in Ontario, in Ottawa. I asked her name as I was going to file a complaint about the lack of service in French ...
"At 11: 46 a.m., the flight attendant came by and asked my wife and me, 'Anything to drink folks?' Lynda said, "Rien merci" [No, thank you]. I told her "Je vais prendre un 7-Up s.v.p." [I would like a 7-Up, please]. She served me a Sprite."
For its part, Air Canada admitted to the court it is not always able to provide all services in French as required by the Act, but that breaches are occasional and do not reveal a systemic problem, as alleged by the Thibodeaus.
"Air Canada emphasizes that things are evolving within the organization; it has made commitments and it makes considerable efforts to hire bilingual staff and to develop the language skills of its employees and those of Jazz, that service in French has improved over the years and that its complaints track record has improved substantially," Justice Bédard wrote.
Still, the airline, according the reasons for the judgment, admitted four breaches in the new Thibodeau case:
No services in French on board ? ? flight AC8627 flying the Toronto-Atlanta route on Jan. 23, 2009: Air Canada acknowledges there was no bilingual flight attendant on this flight, although it was a flight on which there was significant demand for services in French.
No translation of an announce-? ? ment made in English by the pilot concerning the arrival time and weather on flight AC8622 flying the Atlanta-Toronto route on Feb. 1, 2009: Air Canada acknowledges that the announcement should have been translated by the flight attendant (who was bilingual) because it was a flight on which there was significant demand for services in French.
No services in French on board ? ? flight AC7923 flying the Charlotte-Toronto route on May 12, 2009. Air Canada acknowledges that there was no bilingual flight attendant on this flight and that it was a flight on which there was significant demand for services in French.
Announcement made in English ? ? only to passengers concerning baggage collection at the Toronto airport on May 12, 2009: Air Canada admits that this announcement should have been made in English and French because the Toronto airport is an airport where there is significant demand for services in French.
Air Canada, however, denied the Thibodeaus' complaint that it was responsible for an announcement to passengers made in English only regarding a change of baggage carousal at the Ottawa airport on Feb. 1, 2009.
The airline denied it was its responsibility to make those announcements and told the court it was the airport authority's responsibility since the airlines did not have access to the transmission.
The court ruled Air Canada breached its duty to provide French services four times and awarded the each of the Thibodeaus $6,000 in damages, or $1,500 for each breach, (plus $6,982.19 in costs). The couple had sought $5,000 for each infraction, for a total of $25,000.
The court dismissed the Thibodeaus' claim for $500,000 in exemplary and punitive damages based on allegations of "the systemic nature of Air Canada's breaches and on the arrogant attitude of Air Canada employees."
Justice Bédard did, however, find that a "systemic problem" complying with linguistic requirements exists at Air Canada.
She ordered the airline to introduce, within six months, "a proper monitoring system and procedures to quickly identify, document and quantify potential violations of its language duties," under the languages act and a language requirement contained in the act under which the former Crown corporation was privatized in 1988.
The airline Wednesday said it was reviewing the judgment and had no comment.


Read more: http://www.ottawacitizen.com/business/Airline+broke+languages+court+says/5099435/story.html#ixzz1S3qY7IhC

Friday, July 15, 2011

Guergis violated the parliamentary code of ethics when she wrote a recommendation for a constituent whose business was linked to her husband may be the final nail in the coffin of the Guergis political empire.

The report finding former Conservative MP Helena Guergis violated the parliamentary code of ethics when she wrote a recommendation for a constituent whose business was linked to her husband may be the final nail in the coffin of the Guergis political empire.




And as political empires go, the Guergis one in Ontario's Simcoe Country was impressive.



Helena Guergis' grandfather, who immigrated to Canada after being subjected to life in a refugee camp on the border of Iraq and Turkey during the First World War, was elected reeve of Essa Township in the 1970s.



Subsequent generations followed in "Grandpa George's" footsteps and chose politics as a way to serve their communities.



At one point, there were four Guergis family members serving as elected officials in the Simcoe region.



Helena Guergis' sister, Christine Brayford, was a councillor in Alliston, while her cousin, Tony Guergis, was mayor of Springwater and his brother, David, was mayor of Essa. Helena Guergis, of course, was an elected Member of Parliament.



In civic elections last fall, Brayford was defeated in her run at the deputy mayor's chair in Alliston.



Both Tony Guergis and David Guergis were ousted from their jobs partly because of controversy surrounding support for the waste dump known as Site 41.



Tony Guergis was also criticized for his stance to dissolve the Nottawasaga Conservation Authority.



"Voters rejected the Guergis family in a big way because they had come to symbolize behind-closed-doors politicking," Kate Harries, a board member of the grassroots community group AWARE Simcoe, told the Toronto Star.



Helena Guergis' high-profile controversies - being booted out of the Conservative caucus because of perceived improprieties and Thursday's report from the ethics commissioner, likely put an end to her once promising political career.



She lost her bid to win her riding again as an independent in the May 2 election.



The Guergis family was once dubbed the Kennedy's of Simcoe County. After almost four decades, this dynasty appears to have come to an end.