Connie Fournier’s take on the ‘Warman vs. Free Dominion’ appeal hearing, part 2

With Connie’s permission, here is how she saw, heard and understood the hearings of the ‘Warman vs FD John Doe Appeal’, as transcribed from her notes and posted here, on Free Dominion.

Part 1 is here. This is part 2.

The next person up was Tamir Israel representing the Canadian Internet Policy and Public Interest Clinic (CIPPIC). He is a soft-spoken and intelligent young man and he, too, had a firm grasp on the issues at stake here.

He started by saying that the position of the CIPPIC was that anonymity should not be an absolute shield. (We agree with all of our intervenors in that regard, btw).

Tamir said that privacy, through the lens of anonymity, should be protected. He said that the online sphere has unique issues which force privacy issues to the forefront that weren’t visible before. He continued saying that the problem with the online sphere is that activities that used to take place in a more private setting are now occurring in a semi-private setting online. He said privacy is control over your personal information, and that there is a reasonable expectation of privacy.

Tamir went on to say that anonymity is important for allowing people to do things they once did in private, like having conversations with friends, political speech etc., in a semi-private sphere.

Tamir hit a huge bullseye when he said that, in criminal cases, a warrant is required in order to get personal information, and that the warrant was only issued if there was reason to believe the person was guilty. He also said that information about anonymous posters reveal much more than identity.

One of the judges quickly jumped on this and agreed that there was a parallel between discovery in civil matters and a search warrant in criminal cases.

Tamir said that the position of the CIPPIC was that an intermediary must be convinced that there is wrongdoing. He said it is inherent in the adoption of an alias that there is an expectation of privacy. (Another bullseye!!)

Tamir said that Terms of Service on a website were insufficient to use as evidence that there was no expectation of privacy because the adoption of an alias shows otherwise.

*  *  *

Next, Tamir talked a bit about the process that the CIPPIC would recommend as a test in these cases.

As far as procedural steps go, if the intermediary is a Party in the action, they should disclose the existence of the information on the John Does. The plaintiff should take steps to try to identify them on his own.

There could be a Counsel for the John Doe if they do not wish to come forward (this, I think, would come out of the balancing that was discussed before). If the standard was a prima facie case, the Court could rule out Does whose comments did not meet defamation standards.

Tamir noted that if a John Doe was outed for the purposes of a defamation suit, the case went to Court and the plaintiff lost, the damage would already be done to the John Doe. He suggested that three things should be considered:

– the strength of the claim
– the gravity of the defamation
– the breadth of the readership

He said that identity is not relevant to assessment of whether or not a comment is defamatory.

Tamir said that an intermediary should use readily available tools to notify the Does that they are being targeted with a lawsuit. Possible tools would be private messages or emails, and that a 20 day limit should be set for this notification.

Tamir stated clearly that the identification between a screen name and a real name is the link that the privacy refers to. It is the context in which they are being disclosed that makes the name private. He stressed that there is an expectation of privacy between a name and a username.

*  *  *

Tamir Israel was finished his submissions, and it was on to James Katz representing Richard Warman.

Katz seemed pretty relaxed and ready for his turn as we waited for the judges to return.

Katz started out by saying that he disagrees with the use of the BMG case and the Irwin Toy case as examples in this case because they applied to third parties (ie the people with the information were not being sued).

Immediately, a judge asked him about the case that Wendy made about the potential for abuse where a plaintiff would simply sue the information holder, too, to get around having the prove a prima facie case. Another judge asked why there should be a test in cases where the information comes from third parties, but not when the information holder is a party in the case. They asked him if he saw a distinction in principle that would justify the different standards.

Katz said that he didn’t see a distinction in principle.

At this point, Katz started talking about how what Warman was requesting was a different KIND of information. I, honestly, wasn’t really sure what he was trying to say, and I don’t really think the judges were either because they looked a bit puzzled.

One distinction that Katz was making was that an IP address, by itself, would not lead directly to the Does, and that a prima facie case would be required at the next level when they wanted subscriber information from the internet service providers.

A judge said, “Your argument turns on the Court being satisfied that individuals cannot be identified directly by this information.”

Katz replied that the “nature” of Free Dominion makes him believe that the emails wouldn’t identify them because they want to hide behind these identities and they would be “pretty good at covering their tracks”.

*  *  *

I forgot to mention that Katz started his statement by reading a list of names Warman was called by our members. “Thug, Nazi, brownshirt…”, and some that are too awful to even mention.

*  *  *

Katz cited a case called Caro Energy Limited. He said that an IP address is a tool that can be used by a third party to identify a computer. A judge jumped in to say that nobody was arguing that this information was relevant.

Another judge, again, brought up the point that email addresses could result in directly identifying Does. Katz said that Warman would prove a prima facie case for the third parties in regard to the IP addresses. He says that the rules for Simplified Procedure state that info that is not privileged should be produced and that Judge Kershman looked at privacy considerations when he made his ruling on the motion. Katz cited the Wilson case that said there was no expectation of privacy with an IP address. A judge said that, in the Wilson case, the Does consented to the release of their information and that our John Does chose to be anonymous.

At this point, Katz brought out the FD user agreement and read the part that states that if you break the law we won’t protect you and you are on your own. I guess because it hasn’t been proven that any of the Does have broken the law, this line of thought didn’t really go anywhere and it was dropped quite quickly.

A judge asked Katz if the motions judge erred in saying that relevance and privilege are all that is important in deciding if information should be disclosed.

Another judge quoted Kershman where he talks about Irwin Toy in his ruling. The judge asks Katz, “Isn’t that a rejection of the privacy issue?”

A different judge said that the Kershman ruling appears to be a conclusion of law, and that his decision regarding privacy did not seem to be related to specific evidence before him.

A judge remarks that Kershman appears to have based his decision on Wilson because it was more current.

When asked by a judge if he felt that Kershman had made an error in law, Katz said he didn’t think so.

Katz concluded his submissions by stating that Warman would be willing to attempt to meet a test if the judges rule that a test needs to be met. He said Warman is very serious about protecting his reputation.

*  *  *

After Katz finished his submissions, the judges gave our side the chance to respond.

Tamir Israel kicked it off by saying that PIPEDA rules say that IP addresses ARE identifiers and need to be protected as such. He used the example of a social insurance number. The number itself can’t lead you directly to a person, but, using that number, you can get all kinds of information about the person.

He reiterated that a prima facie case can be made without knowing the identity of the Doe. Issues such as malice would not been to be proven at this stage.

Tamir finished by arguing for a prima facie case to be the standard with a balancing of interests afterward.

Wendy then took to the podium again and talked about Section 8 rights. She said there had to be a consideration of the totality of the situation, and she pointed out that there was consent from the Does in Wilson, it didn’t really relate to our case. Wendy said that it is important to remember that a test must be applied to make sure privacy issues are considered. She said that a fair reading of the decision in our motion shows he felt the Simplified Procedure rules were absolute and that there was no affirmation of freedom of expression as a Charter Right. She continued, pointing out that, on BMG, Kershman simply said that the rules were different for third parties.

Finally, Wendy read from the Kershman ruling where he said that the plaintiff is an anti-hate speech advocate, and defendants whose “website is so controversial that it is blocked to employees of the Ontario Public Service.” Wendy said that Kershman is being disapproving of the speech on FD. She said that he is saying that this is controversial speech, so that is a reason to reject…REJECT the Charter issues. She finished up by saying that if Kershman did consider it, he was wrong in law.

Barbara chose to let Wendy’s powerful last words wrap up our case for us, so we were done.

At this point, the judges asked us to stick around for 15 minutes because they wanted to talk and then come back and maybe ask some questions.

*  *  *

After the recess, the judges came back and they had two questions. They wanted the parties to agree on costs, and it was agreed that the losing Party would pay $10,000 to the winner.

Then, they asked an interesting question.

The judges wanted to know, because there is a prima facie test when someone requests information from a third party, how you would prevent duplication if you added another test at the “lower level”. (For example, if they had to pass a test to get the IPs from us, then had to pass it again to get the subscriber information for those IPs from Bell).

Wendy said that it is wrong to assume that there would always be a second step. After the first step, the John Does could be identified though their emails. She said that if there was another application for information, if there is consistency in law, they could simply pull up the first motion and make a few changes and submit it again for the new information. The costs would be minimal. She also noted that ISPs don’t usually oppose motions for information if they meet the BMG test. In any case, Wendy said, the cost is small compared to the rights at stake.

Tamir got up to say, also, that the Court can incorporate the need for ISPs to disclose subscriber information into the first order so that the same order can be used at both levels.

With that, we were done!

This is it – in Connie’s own words!

While many of my observations were similar, there were several points I saw/heard/understood quite differently.  I apologize for how long it is taking me to write up my take on this, but, I am a slow thinker, slow writer and it is taking me forever to decipher my handwriting in the 48 pages of notes I took.  So, please, bear with me – my version of the event is coming ‘soon’!


Connie Fournier’s take on the ‘Warman vs. Free Dominion’ appeal hearing, part 1

With Connie’s permission, here is how she saw, heard and understood the hearings of the ‘Warman vs FD John Doe Appeal’, as transcribed from her notes and posted here, on Free Dominion.

I’m about to start transcribing the notes I made at the hearing today, and I’ll post them in chunks on this thread, so keep watching.

Keep in mind that I made no attempt to quote people verbatim because I can’t write that fast. I’ve recorded the gist of what everyone said, and added some of my own impressions.

*  *  *

I don’t know if there were FDers who tried to find us today and couldn’t locate the Court room. I know of one person who couldn’t find us, and everyone seemed to have difficulty. The issue was that our names weren’t on the docket, it only said “Divisional Court”. For those of you who tried to come and couldn’t find the room, I’m really sorry we missed you.

When we went into the Court room, there were a large assortment of lawyers at the front. It turned out that the majority of them were our intervenors, so we were happy to see this. The panel of three judges came in and asked the lawyers to identify themselves. In attendance were:

Wendy Matheson, representing the Canadian Civil Liberties Association
Madeline Biderman, Canadian Civil Liberties Association
Barbara Kulaszka, representing us
Tamir Israel, representing the Canadian Internet Policy and Public Interest Clinic
Stephanie Lewis, representing Richard Warman, and
James Katz, representing Warman

Also in attendance was David Fewer from the Canadian Internet Policy and Public Interest Clinic, but he didn’t make any submissions.

I will have to get back to you with the names of the panel of judges because I forgot to write them down.

The Court room was much larger than the one we were in for the motion hearing in Toronto last week, and there were lots of chairs for spectators. We had two friends join us, there was another young woman who sat on the far side and was, I believe, part of the Katz team, and one other young woman who sat in the very middle and didn’t talk to anyone. We were speculating that it might be Lucy Aubrack or Mary Dufford standing in for Richard Warman because he wasn’t there.

*  *  *

The first person to take the stand was our faithful lawyer, Barbara. I can’t imagine what it must be like for lawyers to stand up there and face down THREE judges!

The first point that Barbara made was that Free Dominion is a political message board where we talk about news from a conservative perspective. I was glad to hear this because I, like many people here, was annoyed by the way that the motion judge had characterized Free Dominion in the motion we were appealing.

She said that our appeal raises issues of what protections will be afforded to anonymous posters. Immediately, one of the judges jumped in and said, “You mean, what protections, if any.” Mark and I looked at each other and gulped. It was obvious this wasn’t going to be easy.

Barbara stressed that IP addresses and email addresses are capable of identifying John Does, and that they can reveal much more than their identities. She said that if you google an email address, you can often find it on many other sites. Some of those sites can contain postings that are of a very personal nature.

She went on to say that you can compile a total profile on someone using just their email address, and that profile can contain information about lifestyle choices, beliefs or health problems.

There was a bit of back and forth at this time because the panel of judges didn’t seem to be getting that information that could be obtained from an email address could also be obtained by tying a username to a real person. That was never really resolved satisfactorily because there were some misunderstanding in how the questions were being asked and answered. But, we knew from reading our intervenors’ factums (is that a word?) that they would be addressing this issue very shortly.

After Barbara made her brief preliminary statements, she deferred to the intervenors to address those privacy issues.

*  *  *

I got ahead of myself a bit there, and I forgot a bit of what Barbara said.

She talked about balancing the rights of the plaintiff and of the anonymous posters. One of the judges asked her if a publisher had published a book for an author who wrote under a pseudonym such as Mark Twain, would the publisher be required to reveal the name?

Barbara said that she believed he would, and that the online world is different because so much information can be obtained when a person has spent so much time online.

Another judge asked if we should use the emails ourselves to try to find the identities of the Does and turn the information over. Barbara said that there is nothing in the law that would oblige a defendent to go through multiple steps to find identities, that we are only to turn over existing documents.

As an aside, Barbara mentioned the issue with the server clock. It has been notoriously wrong at times and the dates on the posts in the database are not reliable. This really means that the IP addresses could be used and people could be misidentified, but the judges didn’t seem to understand her point…I guess it was a bit too technical. One judge just responded that he didn’t think that meant anything and that considering it would just be an open invitation to make sure people have a defective server clock.

Barbara mentioned that Richard Warman has been able to identify four of the John Does already. She said that, since he knows the identities, she felt that the appeal should be allowed on those four. The judges said that they didn’t want to allow the appeal on those four because it would set a precedent they might not intend to set, but that James Katz (Warman’s lawyer) could stay the motion with respect to those four people. That means that the email and IP information will not be turned over for the known John Does.

Barbara asked Katz if they knew who any of the other John Does were. Katz looked like he didn’t know what to say for a few moments, then one of the judges said, “You are working on it?” and he said, “Yes, we are working on it”.

Make of that what you will.

*  *  *

The next person on the stand was Wendy Matheson representing the CCLA. She was a very dynamic speaker, and she knew exactly what she was talking about. Wendy said that the position of the CCLA was that in NO CASE should the identities never be disclosed, but that it should not be automatic. Automatic disclosure of personal information on anonymous posters creates Charter Rights issues.

Wendy said that the basis on which the motion ruling was made was flawed in an important way. She said that people who are in possession of personal information should disclose that they have it, but state that they are objecting to the disclosure. Then, to order production, the Court must establish that there is a prima facie case against the anonymous posters. [This means that it has been demonstrated to a court that a case can be made that the anonymous posters actually defamed the plaintiff. It would mean that frivolous claims could be dealt with without ever having to disclose personal information of innocent posters].

Further, it is the position of the CCLA that the Party who is in possession of the information should take reasonable steps to inform the John Does that they are being sued so that they can choose to come forward and fight if they wish.

Wendy said that the CCLA was asking for a prima facie test to be applied in these cases, but, given the Charter Rights issues, the standard should really be even higher.

In describing what would be required to prove a prima facie case, Wendy suggested that it include an Affidavit from the plaintiff stating that the posts were made and that they were false and defamatory. When asked by the judge if she thought it was important that the Affidavit say that the posts were false, she said that it should.

She said that this would screen out people who are doing this for improper purposes.

*  *  *

There was a lot of discussion during this hearing about a case they called “Norwich”. The case law from that case requires that the plaintiff show a bona fide case before they get personal information about anonymous Does. A bona fide case simply means that the plaintiff has a genuine intention to sue them.

Wendy went on to say that there had been some discussion about the frailty of the information (the IPs might be wrong or might not exist), but that we needed to consider what the process should be if the information is right. She mentioned a case she called “Wagg”, where the ruling showed that obligations under civil procedure are subject to the Charter.

She came back to the Mark Twain analogy because that analogy was used in the Wagg decision, and the court concluded that anonymous speech is protected.

A judge said that you must decide if a post was made with a reasonable expectation of anonymity.

Wendy said that the Court must have the opportunity to balance the interests of the anonymous posters and the plaintiff in these cases.

Wagg indicated that Charter Rights are an issue. In the test for that case, it was asked:

Is it relevant?
Is it privileged?
Are Constitutional rights at stake?

Wendy continued, saying that freedom of expression is at the forefront of a defamation case. The Supreme Court of Canada has been talking a lot about this recently. Freedom of expression is one of the most fundamental rights we have, and that true freedom of expression must protect speech we don’t agree with, even offensive speech.

*  *  *

The next case that Wendy brought us was a York University case. This ruling stated that a user has the ability to roam the internet with anonimity. In this case, the test that was applied was a bona fide case. The internet is a revolutionary tool for free speech, and anonymity is a critical component of that free speech. Nobody is suggesting, however, that freedom of expression provides a blank cheque.

The point was made that the Wagg case was not in front of the motions judge who made the ruling we are appealing. It came after.

In the York University case, apparently disclosure was eventually ordered.

A judge asked if, in that case, it was decided because there was no reasonable expectation of anonymity.

Another judge remarked that, in our case, there is no consent from the John Does so anonymity is expected.

Another case was cited, I didn’t get the name, which dealt with a City Ordinance that stated that hand bills must have a name and address on them, or you could not hand them out.

Wendy talked about how anonymous pamphlets have played an important part in history. Historically, anonymous speech has allowed for speech that would not have been possible. One example is the Federalist Papers.

*  *  *

Wendy said that any defamation case requires a consideration of freedom of expression. She said that the Supreme Court of Canada has shown a trend in favour of freedom of expression. Beginning with the Casey Hill case where the Supreme Court said that privacy is grounded in man’s autonomy and that reputation protection must be balanced with protection of privacy and that they are equally important.

In 2008, the Supreme Court considered a case against a controversial radio host. They said that traditional tort regarding defamation needs modification to protect free speech, and that there has been a chilling effect from defamation.

In a case last year, the Supreme Court said that the balance is off between freedom of expression and reputation protection, and that reputation protection is currently given too much weight.

Wendy said that the mere allegation of defamation is not enough to defeat freedom of expression. Commencing a defamation suit does not take away the Court’s responsibility to proect freedom of expression.

She went on to say that privacy finds its way into Charter rights. She said it is a component of Section 7. There was a case called BMG which was about music sharing. The court found that a test was necessary before the anonymity of the anonymous Does could be broken, this case involved a request on a third party for information. [this becomes important later] In any case, Wendy said that a test was required in this case and that the ability of a defendant to share music is surely less important than the right to anonymous speech.

One judge asked, “When someone chooses to use a very public forum, doesn’t he waive his right to privacy?”

Wendy responded that privacy is tied to their identity, and that privacy is a Charter value, if not a Charter Right.

She went on to say that interests of privacy are increasing, not decreasing. The Court below [the Motion court] has given no consideration of privacy.

*  *  *

There was a bit of back and forth discussion of a scenario where an abused wife could be posting on a forum and it could be decided that it was unsafe to reveal her identity. Both Wendy and the judges worked at fleshing out the scenario.

Wendy said that society is being forced to conduct our lives online. It is unreasonable to say that if you want to protect your privacy you should have to stay off the internet. She said that the most reasonable test would be to require a prima facie case and a balancing of Charter issues. She said that protection of 2B Charter Rights is more powerful than defamation.

The Supreme Court of Canada has acknowledged the chilling effect of defamation claims.

Wendy said that is a well established line of authority for discovering identity in order to sue someone in a case she called Norwich. In this case, the plaintiffs sued Customs and Excise for information related to a trademark case. This case required a five part test and a principled approach. Cases that used the “Norwich rules” were not constitutional, but discovery was still not automatic.

A very powerful argument was made by Wendy that, if this motion ruling stands, it will make cases like BMG where plaintiffs have to prove a prima facie case in order to get information from a third party, moot. She said that proving a prima facie case will be avoided when a plaintiff simply adds the information holder to the statement of claim as a party.

For instance, if you wanted the information on someone and Sympatico held the information, you could just name Sympatico and they would have to turn it over without meeting the usual test.

Wendy said that it is a disappointment to have to consider protential unprincipled behaviour in making this decision.

She closed her remarks by reiterating that disclosure should not be automatic on the issuance of a Statment of Claim. She said it is insufficient in a lawsuit to simply name the information holder and get the information, there must be a process. A process which ignores Charter right and values, she stressed, should not be adopted.

The Norwich test has been adopted by the Federal Court of Appeals.

That was the end of the sumbissions for the CCLA.

*  *  *

To be continued…HERE

A day in law-law land

Yesterday, 8th of April, 2010, I spent the day at the Ontario Courthouse at 151 Elgin St, downtown Ottawa.

No – I am not in trouble.  At least, not more than the whole thing of ‘breathing’ implies.  Rather, I went to see how the appeal case of ‘Richard Warman vs Personal Privacy and Internet Anonymity’.

I will be writing that up shortly – and posting link to Connie Fournier’s write up of it.  But, I have about 48 pages of notes, so it’ll take me a while to write it up (most of that time will be spent in trying to decipher my handwriting).

This post is called  ‘A day in law-law land’ not because the case itself is not meritorious, nor because it was not argued well.  It was the ‘getting there’ that felt like being in one of those weird Kafkaesque dreams….much of it due to my unpreparedness, I’m sure, but also because I am so very unfamiliar with he mechanics of how a courthouse operates.

After packing my ‘little ones’ (OK – they are taller than I am) off to school, I headed downtown, to the heart of the City of Ottawa, to witness our legal future being made.  In my never-humble-opinion, this is a very important case because it is in the intersection of several really, really important issues which our society really needs to ‘figure out’ how to ‘deal with’:  privacy issues, freedom of the internet, freedom of speech.

You know, the biggies!

So I figured that I would have no problem figuring out where ‘the case’ was:  just follow the throngs of reporters and TV crews and all that!

Since the Courthouse is right next to the Ottawa City Hall, and since the Ottawa City Hall is -by far – the cheapest place in downtown Ottawa to park (it cost me just $12.00 for the whole day!), I parked there.  But, it meant that I entered the Courhouse through a door in the back, not the main entrance.  People stood all around, smiling so as not to look nervous – or just giving up and looking grim.

Lots of people were marching around in a self-assured way,  some pulling little suitcases on wheels.  You know, sort of like pilots and stewards/stewardesses do – but without the smiles.  Since we were nowhere near an airport, I figured that there had to be another purpose to this and resolved to devote some of my time to observing it further in the hope of figuring it out.  But not now – now I had to find the courtroom where this appeal case was being heard, in the hopes of getting there early enough to be able to squeeze in, get one of the last available seats in the courtroom…

No throngs of reporters in sight….

So, I started to walk around – I was bound to see them somewhere!

After wandering about for about 10 minutes, I still did not see any gaggles of reporters.  Nor any information booths – I’d been on the lookout for these for the last 7 minutes or so, too:   just in case.

Circling back to the main entrance, I began to suspect that the big desk with huge signs that people with disabilities ought to go talk to them there to get help might, perhaps, also double as an information desk.  So I approached it, hoping they would tell me where to go.

Taking a look at my walking cane, they started to want to help me with ‘accessibility’…  Now, OK, I was walking with a cane, but my issue was not ‘accessibility’, it was trying to find out where it was I wanted to ‘access’!

After claiming ignorance of any ‘Richard Warman vs. Personal Privacy and Internet Anonymity’ case, they offered me a list of the day’s schedule:  it listed times, court room numbers and the names of the judges who will be doing the judging in those rooms.  Not the names of the cases….

I did not know the names of the judges!

It was about then that I began to notice the beautiful architecture of the Courthouse – and just how much it looked like the descriptions of The Castle!

Any and all descriptions of the case I was looking for drew nothing more than blank stares…until one of the guys picked up on a clue:  did I say this was ‘an appeal’?  Yes?  Well, then I had to go down the hall to the right and sign in at kiosk #4.  That way!

All right – I guess it is a security measure.  Makes sense.

I followed the vague wave of the arm and, at the end of the hallway, there truly was a kiosk#4.  It was one side of a counter which sort of intruded into an area of cubicles:  I was on the ‘halway’ side of the counter.  On the ‘cubicle’ side, there was a lady searching through a bankers’ box of papers, another lady typing busily on her keyboard, a distracted looking person (also female, I think) dejectedly rushing around with a bunch of files clutched tightly to her chest…..

After standing at the counter for about 4 minutes, another person – this one young, male and smiling – appeared from the bowels of the cubicles and actually acknowledged that I was standing there.  After he finished his conversation with someone invisible from my vantage point, he came over to see what I wanted.

He was very nice.  Why would I think I needed to sign in?  He obviously thought me only partly ‘there’, if I thought I needed to sign in….  But, at least he did know that there was some sort of an appeal being heard that day.  He consulted his paperwork and directed me to courtroom #37.  He was really rather nice.

Now I regretted that when I wandered around earlier, I was only looking at ‘people’ and looking for crowds instead of paying attention to the numbers of the courtrooms I was passing by.  I had no idea where #37 was!  So, I wandered about some more….

Finally, I gave up and went back to the ‘information desk’.  They already suspected my ‘disability’ was not limited to the cane bt that I probably also had ‘diminished capability’ – explaining to me that courtroom #37 was on the third floor…

Makes sense – of course!

Now my forehead was hurting, too.

The Courthouse is really beautiful.  Built in the ‘open-middle-to-to-give-an-air-of-grandeur’ style.  Lots of skylights light up the spacious halls.  Very pretty.

The elevators are all glass – the back side exposed to the brightly lit, multi-story open area.  To access them, one has to sneak into the dark narrow hallway behind the information desk.  So I did – and was on my way to courtroom #37!

Disappointment!

I must have bumbled around so long, everyone must already be in the courtroom and these 3-4 people left out front must mean there are no seats left!

But, no – the courtroom is locked, nobody inside.

The people in front have never heard of Richard Warman.

My heart dropped.

Leave me a simple task, like showing up at the Courthouse to see the wheels of justice in motion – and I can’t even do that!

There were a lot of people in the room next to courtroom #37 – so I explored.  It was the ‘jury-duty-call-up’ room.

As I was preparing to leave, I noticed that two of the people who rode up in the elevator with me (and whom I saw walking purposefully towards some goal during a few different points in my adventure – one was even pulling one of them little suitcase thingies on wheels) were walking towards a small group of people…. Hey!  One of these people is Mark Fournier!  And there’s Connie!

YES!

I FOUND IT!!!

I asked Mark and Connie to pose for a photo.

Did you know taking pictures in the courthouse is forbidden?

My day in law-law land was off to a great start!

Genetic Modification: What defines you as ‘human’?

This is a discussion we really, really ought to have had long before we developed the technology to do this.

It is not a good situation when ‘public debate’ – for whatever reasons, be it cultural, religious or just because it is easier to control an ignorant population – does not keep up with our technological abilities.

This all comes down to the whole ‘knowledge’ versus ‘wisdom’ thing…

What prompted this?

We have long been served plant-foods which contain artificially spliced in genes from other plants – or, possibly, animals.  And, we are not permitted to know (legally) what is what.  Now, we are about to be presented with meat which contains the genes of several animals…. (H/T: BCF)

We may know what we are doing – technologically.  But, do we understand what we are doing, both morally and legally?

* * *

We can no longer even agree on what defines ‘male’ versus ‘female’.

Really – do think about it.

It used to be easy:  the external presentation was sufficient.  And, any hermaphrodites were either so successful at passing themselves as one or the other sex that the question was really mute.  Even that really, really weird case in some isolated pacific islands where ‘every generation’,  some ‘clearly female children’ would, during puberty, develop into males.  To the islanders, it was clear:  while the child ‘appeared’ female, it was ‘a female’.  When the external presentation changed and the child began to look like a man, the (now) youth became ‘a male’!

But, now….

It is no longer so simple!

At first, it looked like our scientific knowledge actually simplified things:  females have two X chromosomes while males have one X chromosome and one Y chromosome.  Simple, right?

Except that….

Back in the late 1980’s, we learned that there are many men who have the required XY combination – plus another X chromosome!  Sometimes, as many as 5 or more ‘scrunched’ looking X chromosomes were found!  (Not important here, but they also found that the men with the extra ‘scrunched’ X chromosomes had a propensity for becoming very, very violent criminals.)

The question then becomes:  is a person with two X chromosomes legally female?

Or, is the presence of a Y chromosome that which defines a person as ‘male’?

We never really had that public debate….when we learned that one’s self-perception as ‘male’ or ‘female’ is set by specific hormones affecting our brain development while we are still fetuses!  If a particular chemical gets released during a very specific point of our fetal development, we will think of our selves as ‘male’.  If it does not get released – or gets released late, or in too small amounts, we self-perceive as ‘female’, regardless of our genetic makeup or our sexual orientation!

Then we learned how to perform ‘sex change’  operations….

…which opened a whole new debate!

If a person is born female – double X chromosomes – and undergoes a sex-change operation, that person is now legally male:  regardless of ‘genetic makeup’.  So, we are back to ‘external presentation’ as being the key defining element.

Except for the case of Caster Semenya

(Aside:  this case would be mute if we did not practice strict sexual apartheid in sports – another issue we should really, really take a look at … but that is not the focus of this post.)

What I am trying to point out is that where  ‘male’ and ‘female’ used to be defined easily (more or less), using ‘common sense’, the scientific advances we have led to technology which muddles the debate, to the point where different countries around the world have irreconcilably different legal definitions of ‘maleness’ and ‘femaleness’!

* * *

Still, this is a minor debate compared to the ‘what defines ‘humanness” debate!

In my never-humble-opinion, this debate is more charged with religious pitfalls than just about anything else!  After, all, the whole ‘abortion’ debate is only a sub-section of this greater debate of  ‘where’ we draw the legal – as well as moral, as it is wrong to legislate morality, so the two ought not necessarily be the same – line of what defines who/what is or is not human!

(This is NOT meant to be an ‘abortion debate’ –  please, don’t turn it into one!  I only mentioned it because I wanted to underlie both  just how important and charged this debate is ….and how bizarre it is that we are NOT having this ‘greater’ public debate!)

For many years, I had a neighbour whose daughter was born missing a pair of chromosomes.  Still, she was completely human!  Disabled, yes.  But, she WAS a human being!

Yet, because she was missing two whole chromosomes, she was genetically more different from ‘average human’ than most primates are….and we certainly don’t consider THEM human!  ALL primates are used as ‘live meat’ – without any regard to anything else – in all the vaccination-producing and other ‘medical’ labs in the world!

So, what defines YOU as ‘human’?

Just how much genetic damage and/or mutation do you have to suffer before you and your children  are no longer defined as ‘human’?  Legally or morally?

We share 98% of our DNA with chimpanzees – yet, legally, they are ‘live meat’.

And people missing  way more than 2% of human DNA, like my ex-neighbour,  are still ‘human’!

This is a really, really important public debate we ought to be having now!  OK – we should have been having it long ago….  Still, delaying it now is dangerous to the very core of our society!

Why?

Because now that we have the technical ability to swap genes between species, we are putting our ability into practice without having defined how we will ‘consider’ the ‘results’!

We can take genetic material from one species, splice it into another – and have the ‘spliced’ genes passed on to the next generation!

And,  we have not had the public discussion about this.  About what makes one species unique – and how that uniqueness is or is not affected by splicing in genes from another species!

Yes, this has been going on for a long time.  Animal genes were spliced into plant genes, genes from one animal are being spliced into another – we have the technical ability!  Yet, we have not really – really – had the public debate about it…

Oh, sure – we have talked about ‘Franken foods’!  About plants which have been genetically modified in one way or another.  Still, much of the  public debate has been stifled – and, perhaps more ominously, there is actual legislation that forbids produce labels which would identify whether the food one is about to purchase has – or has not – been genetically modified!

WHY?

“To prevent  prejudice against genetically modified foods!’ – we are told…

No – I don’t mean to get into weird conspiracy theories here.  I think the answer is very simple:  money.  If a genetic manipulation is financially beneficial to the ‘genetic manipulator’, that ‘genetic manipulator’ will consider investing in ‘product-favourable legislation’ to be no less important a component of their investment in ‘bringing the product to market’ as  ‘scientific research’  how to do it actually is.  That is not a ‘conspiracy theory’ – that is simply ‘good business sense’.

Again – the mechanics of this are not the point of this post.  Let’s just accept the current state of things as they are now – not as they ‘ought to be’ – and get to the greater issue.

Just how MUCH genetic material from one species does a living organism have to contain (or be missing) before it is legally considered (or no longer considered) a member of a particular species?

We do now have mice which have had ‘human breast cancer’ genes spliced in – and pass them on to their offspring.  That means that human genes (OK – ‘broken’ human genes, but human genes none-the-less) are present in sentient beings which do not enjoy any of the rights and freedoms of fully-human beings.  Just how MUCH of our ‘human’ DNA should a creature contain before it is ‘human’?

Legally?

Morally?

What about my neighbour, born missing a few chromosomes?  If a child is born with ‘sufficiently large’ genetic disorder, will it no longer have the legal protections of other humans?

* * *

OK – let’s consider the story I linked: ‘ pork’ which contains mouse genes is now being proposed for sale, without any labels informing the customers that they are buying (presumably for consumption) meat which contains both pig and mouse genes.  We also know there are ‘genetically designed’  mice out there, which contain human genes…

And fish are about to enter our food markets which contain ‘beef-genes’…tip of the proverbial iceberg!

How long before we are being served ‘animal meat’ which contains ‘some’ human genetic material?

How MUCH human genetic material does a meat have to contain before it is considered ‘cannibalism’ to consume it?

Will it be illegal for us to even know we are consuming ‘flesh’ which contains ‘some’ human DNA?

What I am trying to say is….before we physically blur the lines between species – something our technology today permits us to do with impunity – we ought to remember that we, humans, are just a species ourselves!

Any ‘genetic pollution’ we permit, any ‘genetic-line-smudging’ we allow, will, necessarily, set a precedent for all ‘species-specific’ blurring of lines – even the lines of the human species.

I do NOT pretend to have any of the answers.  I freely admit I am deeply conflicted on the issue….

Really – we ought to talk about this!

“Would I sell this information?” Part 1

Facebook.

Myspace.

Buzz.

Twitter.

Linked-in.

Flicker.

Photo-tagging.

Online bookmarks.

Online calendars.

Online contact  databases.

….a ‘billion’ other applications where you enter private information about yourself, your family, your friends, your likes, dislikes and preferences, and on and on and on…

We participate in these things because they are fun.

They make it easier to connect (on a professional or personal level) with other people.

And, they make it easier to keep track of the information we find useful.

Of course, doing this ‘online’ protects us from loosing our data should our own system go down.  And, we can log-in from anywhere in the world!

What could be better?

As much as these are useful tools, before we pump our information into them, we ought to ask ourselves one simple question:  “Would I sell this information?”

If the answer is ‘yes’ – no problem.

But, if the answer is ‘no’ – don’t put that info anywhere where it is accessible through the web!

Because, whether you like it or not, this information you enter into online sites about yourself – and all your associates:  family, friends, business – becomes public.

Even if you select ‘private’ settings, not displaying all of this information to anyone viewing these sites, the information is fully visible and accessible to anyone working on the ‘back end’ of the site.  This includes the people who run and administer the site as well as the contractors and independents who develop applications for that site!

And, have no illusions:  these people make most of their livelihood through datamining . Some use the results of their datamining simply to help them ‘tailor’ applications to ‘your liking’ – but, they do retain the original information for possible future use.  Others are less scrupulous…

Of course, any system is only as strong as its weakest link!

Do you know the people who work for these companies?  What kinds of security clearance these people have – if any?  What kind of assurances you have that your private information is not being sold (not necessarily by the companies, but, perhaps, by greedy 3rd party employees)?

In other words, even if you don’t sell the information yourself, somebody can.

And if they can – they will.

Because in today’s world, information is the most potent currency.

We have all heard about people who kept ‘tweeting’ their location – so thieves knew they were not home and could break in without impunity.  Well – if you have a GPS in each of your vehicles which is monitored by a 3rd party (for your safety, of course), are their employees not able to also see when you away from home?  Are you certain not one of their employees is on the payroll of organized crime?

Of course, that is just a mundane tip of an anything-but-mundane ice berg!

What about information about the people you do business with – or ones you socialize with?  Would you sell those lists?  Would you sell the list of all the people you are related to – and how?

Because if you publish them – and, yes, putting them anywhere ‘web-accessible’ is equivalent to publishing them – somebody will!

So – what sparked this reaction?

The other day, I got yet another invitation to yet another ‘networking site’.  It was from a person I highly respect, whom I have had professional dealings with for years and whom I have also enjoyed socializing with.  And, yes, he is likely to be one of the backers of this particular networking site.

Once I accepted the invitation, the site offered to migrate my ‘contacts’ into my profile – and it offered all the ‘major’ email services as options I could ‘click’ to have ‘contacts’ migrated from into this one central place I could easily access from ‘anywhere’ by just logging in.  OK – I admit it – I may have accepted the invitation to join, but, I was not about to hand over all my address books!

Despite not having migrated a single one of my contacts onto the site, just by the virtue 0f my name and email address, it ‘suggested’ potential ‘people’ I ought to ‘link with’ as I might know them – and asked if it ought to categorize them as ‘business’, ‘friends’ or ‘family’.  Lo and behold – there were very many people on this ‘would you like to link up with/you may know’ list whom I have worked with, some of them years ago….

Now, aside from my name and email, all other info I entered into the site was made up (yeah – so sue me!).  Thus, my name and email were the only two pieces of info this site had to work with.

Still, it could accurately re-create a large portion of my professional contacts, going years back in time!

Take a moment to ponder this.

What a powerful tool this is!

As to who is wielding it, to what purposes – and with what security – I cannot tell…

So, I repeat:  if you are not comfortable selling a piece of information about yourself – don’t make it web-accessible!

AlpineKat: Black Hole Rap

Here is AlpineKat with her newest video, Black Hole Rap:

Some people wonder why should we do ‘research for the point of research’:  can the cost be justified?

In my never-humble-opinion, yes!

My hubby phrased it well:  if you only do research on how to improve candles, you will develop the best candles ever….but you’ll never invent the light-bulb!

P.S. to ‘Winning back our liberty: the ‘commercial’ threat’

In this post, I quoted John Perry Barlow, who warned us that the greatest threat to our freedom of speech in the future will come from corporations ‘protecting’ their IP, and individual’s freedoms ‘be damned’.  And, I do think he is correct.

Because we have seen ‘states/governments’ strip its citizens of rights and freedoms, we are ‘sensitive’ to the threats to our liberties which come from that direction.  OK, not ‘sensitive enough’ as a society… What I mean is, those within our society who are looking out for our rights and freedoms in order to preserve our liberties are used to watching the state/government and firmly regard it as the biggest threat.

And, that threat is very, very real – and, we discuss it a lot, oppose the encroachment on our rights – as we should!

But, the very people who are vigilant of the state/government creeping oppression seem deaf and blind when it comes to corporations using ‘commercial laws’ to forward their interests at the cost our liberties….

There were two things I should have included, but did not.

The first is Michael Geist‘s movie, ‘Why Copyright? Canadian Voices on Copyright Law’, in which this law professor explains the real-life implications of the draconian ‘digital copyright’ laws these days…

The second is this little news story which Dvorak Uncensored highlighted while I was working on my original post:

Vice President Joe Biden holds a roundtable discussion today with “all stakeholders” on enforcing copyright in a changing digital world. Invited—MPAA, RIAA, movie studios, music labels, publishers, the FBI, the Secret Service, and Homeland Security. Not invited—everyone else.

“We were extremely disappointed to learn of the White House meeting to be held later today on the issue of intellectual property and ‘piracy,” said PK’s Gigi Sohn. “It is unclear why three cabinet officers, several subcabinet officers, the directors of the Federal Bureau of Investigation and the U.S. Secret Service are needed to tend to the worries of the big media companies, particularly the motion picture industry which is completing a year in which it will set box-office records.

It is difficult to explain just how serious this situation is becoming without sounding like a ‘conspiracy nut’.

Now, don’t get me wrong – I LOVE conspiracy theories! They are truly FUN!   I just don’t buy into them – not as ‘description of reality’…at least, not most of them.

But, we do need to educate ourselves about ALL the treats to our liberties.

…this is just the tip of the iceberg…

Add to FacebookAdd to DiggAdd to Del.icio.usAdd to StumbleuponAdd to RedditAdd to BlinklistAdd to TwitterAdd to TechnoratiAdd to Yahoo BuzzAdd to Newsvine

Winning back our liberty: the ‘commercial’ threat

Commercial encroachment on the freedoms and liberties of Canadians is a very real and immediate threat to us all.  Yet, this is hardly ever seriously discussed among the ‘core’ of conservative and pro-freedom thinkers.

Why?

It seems that the ‘government’ types and ‘corporate’ types of freedom fighters (in our current, non-violent use of the expression) do not talk much – even regard each other with a significant degree of suspicion.  This could, perhaps be because they usually come from such very different backgrounds and usually do not share common educational base or many leisure-time interests.  Even their language is so different, they don’t ‘get’ each others’ message.

That is a pity, because each side is only getting a part of the picture….  and, what was that thing about ‘divide and conquer’?

John Perry Barlow, the co-founder of Electronic Frontier (and a former lyricist for ‘The Grateful Dead’) has very perceptively analyzed the corporate threats to freedom of speech in his 1994(!) article, The Economy of Ideas.

“Notions of property, value, ownership, and the nature of wealth itself are changing more fundamentally than at any time since the Sumerians first poked cuneiform into wet clay and called it stored grain. Only a very few people are aware of the enormity of this shift, and fewer of them are lawyers or public officials.”

Barlow explains how, traditionally, people protected their ‘ideas’ through physical control over the means of expressing these ideas:  a book is a tangible object which can physically be controlled, an inventor ‘owned’ the ‘idea’ in the form to holding the right to produce objects which made ‘use’ of this idea in the very particular product she/he invented, and so on.  The ‘idea’ itself, once expressed, was ‘in the public realm’ and everyone had access to ‘learn it’:  that generates progress.

This has all changed:  now, ideas can spread without a physical vessel one could control, it is now ‘the ideas themselves’ which are the valuable bit.  Barlow makes the case that corporate interests will, if allowed, protect their investment in their ‘ideas’ and that could involve significant curbing of our freedom of expression.

He wrote this in 1994 – and what he warned of is already coming true.

‘Protection of their intellectual properties’ has permitted, for example, the entertainment industry to successfully lobby governments to legalize really, really invasive ‘digital locks’ on their ‘products’.

Here is just one such example, where the corporate world is permitted to treat its customers as criminals by default, and curb their individual rights in the name of protecting their product:

Far from being simply a mechanism to prevent copying, these ‘digital locks’ often include ‘executable code’ which, without the computer owner’s knowledge or permission, install themselves very, very deeply into the computer (at times, removing the ‘lock’ may damage the computer on which it had been installed), search all the files on the hard drive and report all this information, via an internet connection the ‘lock’ itself initiates, back to the company that put the lock on.

This, ostensibly, is to make sure that there are no other ‘stolen files’ on the computer. In reality, it permits that corporation full access to every program, every bit of data, every file, every picture on your computer – and the laws that permit the corporations to install this on your computer without your knowledge do not, even a little bit, address what this corporation may or may not do with all the stuff it found on your computer. That is, frankly, quite frightening!

But that is just the tip of the iceberg – in just one industry!

Please, don’t call ‘Godwin’s law’ one me now, but, I will mention ‘THE OLYMPICS’!

Everyone just shrugged their shoulders and blamed ‘The Chinese Government’ for the zeal with which the names of any business which did not pay protection money was not ‘an Olympic Sponsor’ were covered up:  from sticky tape over faucet brand marks to sheets covering the name of a nearby hotel.  The media treated it as some sort of a ‘cute Chinese thing’. But, it was not a ‘Chinese thing’, nor was it ‘cute’!

It was an IOC (International Olympic Committee) thing.  The IOC claims that without this draconian censorship, it could not make money.

SO!?!?!?!?!?!

Why should anyone’s desire to make money outweigh people’s rights and freedoms?

But, that was China – it could never happen here!

Well, actually…

The Vancouver 2010 Olympics are an example in how corporate interests strip people of liberty!

The IOC has demanded that Vancouver create a ‘buffer zone’ around the Olympic Venues where all speech, signage, logos, symbols and any other means of communication be strictly controlled.  And, since it’s ‘The Olympics’, the various levels of government complied.

They passed a series of bylaws which not only made it illegal to display the brand-name of a ‘non-sponsor’, but also where any sentiment which was not ‘celebrating the Olympics’ was forbidden from being expressed!  Public and private property!

Oh, and driving on some public roads would also be illegal for mere ‘citizens’ (similar ones are planned for the 2012 Olympics:  that makes it a pattern, not a ‘cute Chinese thing’)….and if you happen to own an aerial sight-seeing company – well, you’ll be forbidden from earning a living, because it ‘needs to be controlled’ during the Olympics, too.

If, for example, you were to put up curtains which were made of a fabric that said ‘Olympics Suck’ in your window, you could have ‘officials’ enter your property and remove the offensive curtains, without a warrant and without your permission:  then, you could be charged a financial fine ($10,000 per day) or tossed in jail or both!

This is Canada?

Under pressure, the Vancouver city council has attempted to soften the harshest bits of these oppressive laws:  at least, the bits that look the most oppressive.  But, I don’t know how much of an improvement the latest version of is….  Now, they have pretty much handed the right to decide what forms of expression will and will not be censored to ‘The Olympic Sponsors’ – the corporations propping up this oppressive organization!

If this is not an ‘Olympic Sponsorship Scandal’, I don’t know what you could possibly call it.

Some people say that it’s not that big a deal – that it’s only a temporary limit…  They miss the point:  nobody must ever have the right to put a limit on the freedom of speech, the most basic of our rights without which none of the others are possible.  If someone can put a ‘temporary limit’ on it, then someone else can put another ‘temporary limit’, and another, and another…and before we realize it, the ‘limit’ will be a permanent one….

Yes, these are just two ‘highly visible’ instances….but, there are too many to document is a simple blog.

John Perry Barlow maintained that the biggest threat to freedom of speech in the future will be from ‘corporate censorship’.

I think he is right.

Add to FacebookAdd to DiggAdd to Del.icio.usAdd to StumbleuponAdd to RedditAdd to BlinklistAdd to TwitterAdd to TechnoratiAdd to Yahoo BuzzAdd to Newsvine

Send a Christmas card to Minister Clement

Today, this came via email:

As you probably know, Big Internet Service Providers (Bell, Rogers, Shaw, etc.) are trying to take control of how we use the Internet. BUT Industry Minister Tony Clement can put a stop to this. So let’s send him a Christmas card asking him to give Canadians the gift of the Open Internet this holiday season!

Sign the card through Twitter.

Sign the card through Facebook.

Sign it on our site.

Tell Minister Clement to be our Open Internet Santa!

Thousands of people have already told Minister Clement to stop Big Telecom from taking control of our Internet use. Considering we’ve successfully pushed the CRTC to develop open Internet guidelines and convinced the two major political parties to support Net Neutrality, we can win this if we send the minister enough letters. If you haven’t already done so, please take a few seconds to send Tony Clement a letter.

If you’ve already taken action, tell all your friends.

Share on Facebook.

Stay in the loop at SaveOurNet.ca and be sure to check out videos of our Open Internet Town Hall Events.

Thank you.

The SaveOurNet.ca team

Paul Graham: essays

My son told me I had to read this guy’s essays – they were brilliant!

I have barely ‘scratched the surface’  – but I do agree with him.  His ‘news’ feed is also interesting.

Enjoy!