Censorship Industrial Complex
“Minority Report”: The Sequel. A warning to the Canadian Church

From the Frontier Centre for Pubic Policy
In the 2002 futuristic movie, “Minority Report,” viewers are introduced to a ground-breaking technology that allows law enforcement to preview a crime before it is committed. Then this determination becomes the basis for the arrest and the sentencing of the “pre-crime” perpetrator.
In a case of life imitating art, on February 26, the Canadian government tabled legislation containing provisions that are eerily like the plot imagined in Tom Cruise’s blockbuster.
The proposed legislation should be of great concern to churches and pastors who may face unprecedented legal exposure if it is passed.
Bill C-63, the Online Harms Act, seeks to “promote online safety.” The Act endeavours, in part, to protect children from online sexual exploitation and requires the mandatory reporting of online child pornography by internet providers. So far, so good.
But the proverbial devil is lurking in the details of the provisions pertaining to online hate speech, which are simply breathtaking.
The Act represents what many consider to be the most dangerous assault on free speech this country has ever seen, prompting Canadian novelist, Margaret Atwood, to refer to the proposed legislation as “Orwellian.”
This bill would not only have a glacial effect on free speech, but it would also trigger an open season on religious organizations that do not align with mainstream dogma.
Here are some of the reasons behind this apocalyptic assessment of this piece of legislation.
The bill defines hate speech as speech that “is likely to foment detestation or vilification of an individual or group of individuals on the basis of a prohibited ground of discrimination.”
This definition is so vague, ambiguous, and far reaching that it could apply to any opinion that diverges from the government-sanctioned media narrative.
The responsibility of judging complaints would be lodged with the Human Rights Commission. This fact alone is deeply worrisome, as the threshold for deciding guilt is much lower in the Human Rights Tribunal than in a criminal court, where a person must be found guilty beyond a reasonable doubt.
Plaintiffs could file their complaints anonymously without incurring any legal costs. Defendants, on the other hand, would be bound to retain legal counsel at considerable expense to them.
Should they win their case, the plaintiffs stand to be awarded up to $20,000. The defendants could be imposed an additional fine of up to $50,000. Should a legal violation be considered to have been motivated by hate, the defendants could also face life imprisonment!
The incontrovertible proof that Bill C-63 is not about protecting children but strangling free speech resides in what is now ironically referred to as the “Minority Report” provision.
As unhinged as it sounds, the legislation states that if a member of the public has grounds to believe that someone is likely to engage in hateful speech, that person can appeal to a provincial judge who may then subject the defendant to house arrest and other restrictions.
Human nature being what it is, there is no telling the number of people who will be incentivized to file complaints knowing they have much to gain and nothing to lose.
Conservative churches would become instant targets in the tsunami of human rights violation initiatives that the proposed legislation would trigger.
In response, churches may decide to play it safe by restricting their services to in-person participation or by self-censuring.
While either choice would no doubt be welcome by a government that wants to silence those who hold “unacceptable views,” to quote Prime Minister Justin Trudeau, such restrictions would no doubt prove to be detrimental to the churches and the common good.
The proposed legislation is not about protecting children. It’s about unleashing the mob against those who would oppose an agenda that is already proving to be an existential threat to liberal society.
Bill C-63 is currently at the nexus of the fight to preserve our most fundamental freedoms, Canadian democracy, and the well-being of future generations.
Churches have a window of opportunity to voice their opposition to this appalling piece of legislation.
What can be done?
First, be informed. Videos posted by the Canadian Constitution Foundation are a great place to start.
Second, promote congregational awareness. Church leaders can no longer pretend that such issues are beyond the scope of their pulpit. To denounce injustice is indeed part and parcel of the church’s prophetic mandate.
Third, church members should contact their member of parliament to express their opposition to Bill C-63.
Canadian churches have historically chosen to remain on the far edges of the culture war currently raging in the Western world. But if Bill C-63 receives royal assent, these same churches may soon unwittingly find themselves in the middle of the very battlefield they so vigorously sought to avoid.
Pierre Gilbert is Associate Professor Emeritus at Canadian Mennonite University.
Business
Apple removes security feature in UK after gov’t demands access to user data worldwide

From LifeSiteNews
The decision was otherwise roundly condemned on X as “horrific,” “horrendous,” the hallmark of a “dictatorship,” and even “the biggest breach of privacy Western civilization has ever seen.”

Apple Store on New York’s Fifth Avenue.
Apple pulled its highest-level security feature in the U.K. after the government ordered the company to give it access to user data.
The U.K. government demanded “blanket access” to all user accounts around the world rather than to specific ones, a move unprecedented in major democracies, according to The Washington Post.
The security tool at issue in the U.K. is Advanced Data Protection (ADP), which provides end-to-end encryption so that only owners of particular data – and reportedly not even Apple – can access it.
“Apple can no longer offer Advanced Data Protection (ADP) in the United Kingdom to new users and current UK users will eventually need to disable this security feature,” an Apple spokesman said.
According to Apple, the removal of ADP will not affect iCloud data types that are end-to-end encrypted by default such as iMessage and FaceTime.
The nine iCloud categories that will reportedly no longer have ADP protection are iCloud Backup, iCloud Drive, Photos, Notes, Reminders, Safari Bookmarks, Siri Shortcuts, Voice Memos, Wallet Passes, and Freeform.
These types of data will be covered only by standard data protection, the default setting for accounts.
Journalist and Twitter Files whistleblower Michael Schellenberger slammed the U.K.-initiated move as “totalitarian.”
The decision was otherwise roundly condemned on X as “horrific,” “horrendous,” the hallmark of a “dictatorship,” and even “the biggest breach of privacy Western civilization has ever seen.”
Elon Musk declared Friday that such a privacy breach “would have happened in America” if President Donald Trump had not been elected.
Jake Moore, global cybersecurity adviser at ESET, commented that the move marks “a huge step backwards in the protection of privacy online.”
“Creating a backdoor for ethical reasons means it will inevitably only be a matter of time before threat actors also find a way in,” Moore said.
Britain reportedly made the privacy invasion demand under the authority of the Investigatory Powers Act of 2016.
Censorship Industrial Complex
Bipartisan US Coalition Finally Tells Europe, and the FBI, to Shove It

FLICKER OF HOPE? Left, Senator Ron Wyden. Middle, Director of National Intelligence Tulsi Gabbard. Right, Rep. Andy Biggs
Racket News By Matt Taibbi
While J.D. Vance was speaking in Munich, the U.K. was demanding encrypted data from Apple. For the first time in nine years, America may fight back
Last Friday, while leaders around the Western world were up in arms about J.D. Vance’s confrontational address to the Munich Security Council, the Washington Post published a good old-fashioned piece of journalism. From “U.K. orders Apple to let it spy on users’ encrypted accounts”:
Security officials in the United Kingdom have demanded that Apple create a back door allowing them to retrieve all the content any Apple user worldwide has uploaded to the cloud, people familiar with the matter told The Washington Post.…
[The] Home Secretary has served Apple with… a technical capability notice, ordering it to provide access under the sweeping U.K. Investigatory Powers Act of 2016, which authorizes law enforcement to compel assistance from companies… The law, known by critics as the Snoopers’ Charter, makes it a criminal offense to reveal that the government has even made such a demand.
This rare example of genuine bipartisan cooperation is fascinating for several reasons. Oregon’s Ron Wyden teamed up with Arizona Republican Congressman Andy Biggs to ask new Director of National Intelligence Tulsi Gabbard for help in beating back the British. While other Democrats like Michael Bennet and Mark Warner were smearing Gabbard as a Russian proxy in confirmation hearings, Wyden performed an homage to old-school liberalism and asked a few constructive questions, including a request that Gabbard recommit to her stance against government snatching of encrypted data. Weeks later, the issue is back on the table, for real.
The original UK demand is apparently nearly a year old, and Apple has reportedly been resisting internally. But this show of political opposition is new. There has been no real pushback on foreign demands for data (encrypted or otherwise) for almost nine years, for an obvious reason. Europe, the FBI, and the rest of the American national security apparatus have until now mostly presented a unified front on this issue. In the Trump era especially, there has not been much political room to take a stand like the one Wyden, Biggs, and perhaps Gabbard will be making.
The encryption saga goes back at least ten years. On December 2, 2015, two men opened fire at the Inland Center in San Bernardino, killing 14 and injuring 22. About two months later, word got out that the FBI was trying to force Apple to undo its encryption safeguards, ostensibly to unlock the iPhone of accused San Bernardino shooter Syed Rizwan Farook. The FBI’s legal battle was led by its General Counsel Jim Baker, who later went to work at Twitter.
One flank of FBI strategy involved overhauling Rule 41 of the Rules of Criminal Procedure. The FBI’s idea was that if it received a legal search warrant, it should be granted power to use hacking techniques, if the target is “concealed through technological means.” The Department of Justice by way of the Supreme Court a decade ago issued this recommendation to Congress, which under a law called the Rules Enabling Act would go into force automatically if legislation was not passed to stop it. In 2016, Wyden joined up with Republican congressman Ted Poe to oppose the change, via a bill called the Stopping Mass Hacking Act.
Two factors conspired to kill the effort. First, the FBI had already won its confrontation with Apple, obtaining an order requiring the firm (which said it had no way to break encryption) to write software allowing the Bureau to use “brute force” methods to crack the suspect’s password. While Apple was contesting, the FBI busted the iPhone anyway by hiring a “publicity-shy” Australian firm called Azimuth, which hacked the phone a few months after the attack. The Post, citing another set of “people familiar with the matter,” outed the company’s name years later, in 2021.
The broader issue of whether government should be allowed to use such authority in all cases was at stake with the “Stopping Mass Hacking” bill. It was a problem for the members that the FBI called its own shot in the San Bernardino case, but the fatal blow came on November 29, 2016, when the UK passed the bill invoked last week, called the Investigatory Powers Act. This legal cheat code gave agencies like Britain’s GHCQ power to use hacking techniques (called “equipment interference”) and to employ “bulk” searches using “general” warrants. Instead of concrete individuals, the UK can target a location or a group of people who “share a common purpose”:
The law was and is broad in a darkly humorous way. It mandates that companies turn over even encrypted data for any of three reasons: to protect national security, to protect the “economic well-being of the UK,” and for the “prevention or detection of serious crime.”
Once the Act passed, American opposition turtled. How to make a stand against FBI hacking when the Bureau’s close partners in England could now make such requests legally and without restriction? The Wyden-Poe gambits were wiped out, and just two days after the IPA went into effect, changes to Rule 41 in America did as well. These granted American authorities wide latitude to break into anything they wanted, provided they had a warrant. As one Senate aide told me this week, “That was a game-over moment.”
Once the British got their shiny new tool, they weren’t shy about using it. The Twitter Files were full of loony “IPA” dramas that underscored just how terrifying these laws can be. In one bizarre episode in August of 2021, Twitter was asked to turn over data on soccer fans to a collection of alphabet soup agencies, including the Home Office and the “Football Policing Unit.” The Football Police informed Twitter that “in the UK… using the ‘N word’ is a criminal offence — not a freedom of speech issue.”
Twitter executives scrambled to explain to football’s cyber-bobbies that many of their suspects were black themselves, and tweets like “RAHEEM STERLING IS DAT NIGGA” were not, in fact, “hateful conduct.” (The idea that British police needed American executives to interpret sports slang is a horror movie in itself.) Accounts like @Itsknockzz and @Wavyboomin never knew how close they came to arrest:
![]() |
N**** PLEASE: British police invoked the Investigatory Powers Act to get user information about nonwhite football fans
British overuse was obvious, but Twitter elected not to complain. They also kept quiet when American authorities began pushing for the same power. Though the Apple standoff aroused controversy, 50% of Americans still supported the FBI’s original stance against encryption, which seemed to embolden the Bureau. Senior officials began asking for the same virtually unlimited authority their friends in the UK (and soon after, Australia) were asserting. Donald Trump’s Attorney General, William Barr, seethed about encryption in a keynote speech at an International Cybersecurity Conference on July 23rd, 2019. The Justice Department was tiring of negotiations with tech companies on the issue, Barr said:
While we remain open to a cooperative approach, the time to achieve that may be limited. Key countries, including important allies, have been moving toward legislative and regulatory solutions. I think it is prudent to anticipate that a major incident may well occur at any time that will galvanize public opinion on these issues.
God knows what he meant about a “major incident” that “may well occur at any time,” but Barr was referring to the Investigatory Powers Act and imitator bills that by 2019 were being drafted by most U.S. intelligence partners.
Even without a central “incident,” European officials have been pursuing the dream of full “transparency” into user data ever since, often with support from American politicians and pundits. It was not long ago that Taylor Lorenz was writing outrage porn in the New York Times about the “unconstrained” and “unfettered conversations” on the Clubhouse App. As Lorenz noted, Clubhouse simply by being hard to track aroused the hostility of German authorities, who wrote to remind the firm about European citizens’ “right to erasure” and “transparent information”:
Providers offering services to European users must respect their rights to transparent information, the right of access, the right to erasure and the right to object.
Eventually, the EU tried to submarine end-to-end encryption through dystopian bills like “Chat Control,” which would have required platforms to actively scan user activity for prohibited behavior. This concept was widely criticized even in Europe, and in the States, which was mostly still in the grip of “freedom causes Trump” mania, TechCrunch called it “Hella Scary.”
Chat Control just barely stalled out in October, thanks to the Dutch, but Europe’s feelings about encryption were still more than made clear with this past summer’s arrest of Telegram founder Pavel Durov. That event was largely cheered in the U.S. press, where Durov was accused of actively “hiding illegal behavior,” and turning his platform into a “misinformation hot spot” used by “far right groups,” “neo-Nazis,” and “Proud Boys and QAnon conspiracy theorists.” The consensus was Durov himself was helping sink the concept of encryption.
“If we assume this becomes a fight about encryption, it is kind of bad to have a defendant who looks irresponsible,” was how Stanford Cyber Policy Analyst Daphne Keller described Durov to the New York Times after his arrest.
The Durov arrest may have marked the moment of peak influence for the cyber-spook movement. Though the Investigatory Powers Act was a major political surveillance tool, it was far from the only important law of its type, or the most powerful. The IPA was in fact just one of a long list of acronyms mostly unfamiliar to American news consumers, from France’s LCEN to Germany’s NetzDG to the EU’s TERREG as well as its Code of Practice on Disinformation and Code of Conduct on Countering Illegal Hate Speech Online, among many others. American authorities usually followed the pattern in the case of encryption and the IPA, doing informally what European counterparts were able to effect openly and with the force of law.
Now however it looks like efforts by government officials to completely wipe out encryption have failed, and events have taken a new turn. “Wild,” is how the Senate aide characterized the Wyden-Biggs letter, resuming another bipartisan fight put on hold nine years ago. “I’d forgotten what this looks like.”
Subscribe to Racket News.
For the full experience, become a paying subscriber.
-
Indigenous17 hours ago
Trudeau gov’t to halt funds for ‘unmarked graves’ search after millions spent, no bodies found
-
Censorship Industrial Complex2 days ago
Bipartisan US Coalition Finally Tells Europe, and the FBI, to Shove It
-
Health2 days ago
Trump HHS officially declares only two sexes: ‘Back to science and common sense’
-
Business1 day ago
Federal Heritage Minister recommends nearly doubling CBC funding and reducing accountability
-
Business2 days ago
Government debt burden increasing across Canada
-
Business1 day ago
Argentina’s Javier Milei gives Elon Musk chainsaw
-
Business16 hours ago
Apple removes security feature in UK after gov’t demands access to user data worldwide
-
International1 day ago
Jihadis behead 70 Christians in DR Congo church