SlideShare a Scribd company logo
1 of 2
Download to read offline
Hackers attack Canada government website: minister
Hackers attack Canada government website: minister
The Canadian
government's websites including those of Parliament, Industry Canada and Public Works were hit by
a cyberattack
The Canadian government's public website for applying for social services and downloading official
forms was briefly shut down Wednesday in a cyberattack, a senior minister said.
Several other government websites including those of Parliament, Industry Canada and Public
Works also appeared to be down.
"Confirmed today that the Govt of Canada GC servers have been cyberattacked," Treasury Board
President Tony Clement said in a Twitter message.
Cooking Videos
The hacker collective Anonymous took responsibility for the breach in an online video, saying it was
done in protest of a controversial anti-terror law that dramatically expands the powers and reach of
Canada's spy agency.
Bill C-51, said the group of hackers, violates Canadians' civil rights, and targets "minority groups
and dissidents."
"Do we trade our privacy for security?" asked an electronically masked voice in the video.
The bill was enacted in response to the first terror attacks on Canadian soil last October, when a
gunman killed a ceremonial guard and stormed parliament, and a soldier was run over in rural
Quebec.
However it has been widely decried as overreaching and an unprecedented assault on civil rights.
It criminalizes the promotion of terrorism, makes it easier for police to arrest and detain individuals
without charge and expands the Canadian Security Intelligence Service's (CSIS) mandate from
intelligence-collection to actively thwarting terror plots and spying outside Canada.
Meat Recipes
Explore further:For US allies, paradigm shift in intelligence collection
30 shares feedback to editors
(C) 2015 AFP
http://www.didigames.com/cooking.htm

More Related Content

Viewers also liked

Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...Antonio Sanz Alcober
 
Sex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadminSex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadminAntonio Sanz Alcober
 
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.Antonio Sanz Alcober
 
2014 BioIT World - Trends from the trenches - Annual presentation
2014 BioIT World - Trends from the trenches - Annual presentation2014 BioIT World - Trends from the trenches - Annual presentation
2014 BioIT World - Trends from the trenches - Annual presentationChris Dagdigian
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminAntonio Sanz Alcober
 
Software Defined Networking
Software Defined NetworkingSoftware Defined Networking
Software Defined NetworkingVMUG IT
 
Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Antonio Sanz Alcober
 
System Administration DCU
System Administration DCUSystem Administration DCU
System Administration DCUKhalid Rehan
 
How jQuery event works
How jQuery event worksHow jQuery event works
How jQuery event worksJae Sung Park
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageImperva
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01guest446b00
 
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorismeCours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorismeFranck Franchin
 

Viewers also liked (20)

Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
 
Zen y el arte de pescar APT
Zen y el arte de pescar APTZen y el arte de pescar APT
Zen y el arte de pescar APT
 
Cómo comprar seguro en internet
Cómo comprar seguro en internetCómo comprar seguro en internet
Cómo comprar seguro en internet
 
Sex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadminSex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadmin
 
CFEngine 3
CFEngine 3CFEngine 3
CFEngine 3
 
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
 
Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?
 
2014 BioIT World - Trends from the trenches - Annual presentation
2014 BioIT World - Trends from the trenches - Annual presentation2014 BioIT World - Trends from the trenches - Annual presentation
2014 BioIT World - Trends from the trenches - Annual presentation
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadmin
 
DSA sales pitch presentation
DSA sales pitch presentationDSA sales pitch presentation
DSA sales pitch presentation
 
Software Defined Networking
Software Defined NetworkingSoftware Defined Networking
Software Defined Networking
 
Foss Presentation
Foss PresentationFoss Presentation
Foss Presentation
 
Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?
 
System Administration DCU
System Administration DCUSystem Administration DCU
System Administration DCU
 
How jQuery event works
How jQuery event worksHow jQuery event works
How jQuery event works
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01Meeting The Cyber Insurgency Threats From Neighbouring Countires01
Meeting The Cyber Insurgency Threats From Neighbouring Countires01
 
Practical Cyber Defense
Practical Cyber DefensePractical Cyber Defense
Practical Cyber Defense
 
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorismeCours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
 

Similar to Hackers attack Canada government website: minister

RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB CybersecurityAndy Kim
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...wookyluvr
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Cyber Law and Business Report Year in Review: 2012
Cyber Law and Business Report Year in Review: 2012Cyber Law and Business Report Year in Review: 2012
Cyber Law and Business Report Year in Review: 2012Internet Law Center
 
This is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdfThis is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdfdeepakarora871
 

Similar to Hackers attack Canada government website: minister (6)

RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB Cybersecurity
 
Cyber war
Cyber warCyber war
Cyber war
 
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
Presentation on Cybersecurity presented by Katie Rapp for Information Policy ...
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber Law and Business Report Year in Review: 2012
Cyber Law and Business Report Year in Review: 2012Cyber Law and Business Report Year in Review: 2012
Cyber Law and Business Report Year in Review: 2012
 
This is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdfThis is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdf
 

Hackers attack Canada government website: minister

  • 1. Hackers attack Canada government website: minister Hackers attack Canada government website: minister The Canadian government's websites including those of Parliament, Industry Canada and Public Works were hit by a cyberattack The Canadian government's public website for applying for social services and downloading official forms was briefly shut down Wednesday in a cyberattack, a senior minister said. Several other government websites including those of Parliament, Industry Canada and Public Works also appeared to be down. "Confirmed today that the Govt of Canada GC servers have been cyberattacked," Treasury Board President Tony Clement said in a Twitter message. Cooking Videos The hacker collective Anonymous took responsibility for the breach in an online video, saying it was done in protest of a controversial anti-terror law that dramatically expands the powers and reach of Canada's spy agency. Bill C-51, said the group of hackers, violates Canadians' civil rights, and targets "minority groups and dissidents." "Do we trade our privacy for security?" asked an electronically masked voice in the video. The bill was enacted in response to the first terror attacks on Canadian soil last October, when a gunman killed a ceremonial guard and stormed parliament, and a soldier was run over in rural Quebec.
  • 2. However it has been widely decried as overreaching and an unprecedented assault on civil rights. It criminalizes the promotion of terrorism, makes it easier for police to arrest and detain individuals without charge and expands the Canadian Security Intelligence Service's (CSIS) mandate from intelligence-collection to actively thwarting terror plots and spying outside Canada. Meat Recipes Explore further:For US allies, paradigm shift in intelligence collection 30 shares feedback to editors (C) 2015 AFP http://www.didigames.com/cooking.htm