Skip to main content

Computer crime specialist welcomes internet controls

The Guelph Police officer whose job it is to track down criminals on the internet welcomes the call for increased police powers.Det. Const. Bruce Hunter of the Guelph Police technological crimes section said anything that helps in the fight against internet crime, and in particular child pornography, is a plus.His comments came the day after the Conservative government introduced two bills aimed at giving police increased access to private internet communications.

"It's been a long time coming. There's been discussion in the past on amending these laws," Hunter said yesterday."It's been on the horizon for awhile."He said it's important for the laws to keep up with the technology that criminals are using on the internet."As technology marches on, it's becoming more and more advanced. The ability to hide in cyberspace or on your own computers is out there," Hunter said.


"It's becoming increasingly difficult for us to conduct thorough investigations when they hide things in a virtual world."Hunter said police investigating cases of internet child exploitation have had certain powers to gain internet service provider address information for some time.These proposed new laws would enhance that."There's things in place now, for child pornography offenses, that we are able to use right now.

This just kind of entrenches it," Hunter said.What the new laws would do is make it easier and quicker to investigate all internet crimes, including threats."In the United States they only need a subpoena. In Canada we need a search warrant in a lot of cases, and that takes a lot longer," he said.

Hunter said "it's also a tracking tool" for child pornography. "If you had two people exchanging child pornography images, you could get their ISP (internet service provider) information and log where it came from."The proposed new legislation would:enable police to access information on an internet subscriber, such as name, street address and email address, without having to get a search warrant.

force internet service providers to freeze data on their hard drives to prevent subscribers under investigation from deleting potentially important evidence.require telecommunications companies to invest in technology that allows for the interception of Internet communications.
allow police to remotely activate tracking devices already embedded in cellphones and certain cars, to help with investigations. allow police to obtain data about where internet communications are coming from and going to. make it a crime to arrange with a second person over the internet the sexual exploitation of a child.

Opponents of the proposed changes have complained that they could be an infringement on privacy and personal freedoms.

Comments

Popular posts from this blog

கவர்ச்சிக் கன்னிகளின் அந்தரங்கம்

 

இடுப்பழகை கண்டு மயங்கி மார்பழகில் விழுந்தெழும்பியவரின் நிலை

  இடுப்பழகை கண்டு மயங்கி மார்பழகில் விழுந்தெழும்பியவரின் நிலை கவலைக்கிடம்

Strong passwords: How to create and use them (2)

Password strategies to avoid Some common methods used to create passwords are easy to guess by criminals. To avoid weak, easy-to-guess passwords: • Avoid sequences or repeated characters. "12345678," "222222," "abcdefg," or adjacent letters on your keyboard do not help make secure passwords. • Avoid using only look-alike substitutions of numbers or symbols. Criminals and other malicious users who know enough to try and crack your password will not be fooled by common look-alike replacements, such as to replace an 'i' with a '1' or an 'a' with '@' as in "M1cr0$0ft" or "P@ssw0rd". But these substitutions can be effective when combined with other measures, such as length, misspellings, or variations in case, to improve the strength of your password. • Avoid your login name. Any part of your name, birthday, social security number, or similar information for your loved ones constitutes a bad password choice. T