logo
Does the name on the ballot really matter?

Does the name on the ballot really matter?

CBC10-04-2025

Alex Marland, a Nova Scotia-based political scientist, says research shows voters tend to focus more on policies, the party and the party leader during a federal election. But there are some cases where a local candidate could make the difference.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Saudi Arabia executes a journalist after 7 years behind bars. Activists say it was over his tweets
Saudi Arabia executes a journalist after 7 years behind bars. Activists say it was over his tweets

Winnipeg Free Press

time30 minutes ago

  • Winnipeg Free Press

Saudi Arabia executes a journalist after 7 years behind bars. Activists say it was over his tweets

DUBAI, United Arab Emirates (AP) — A prominent Saudi journalist who was arrested in 2018 and convicted on terrorism and treason charges has been executed, the kingdom said. Activist groups maintain that the charges against him were trumped up. Turki Al-Jasser was put to death on Saturday, according to the official Saudi Press Agency, after the death penalty was upheld by the nation's top court. Authorities had raided Al-Jasser's home in 2018, arresting him and seizing his computer and phones. It was not clear where his trial took place or how long it lasted. According to the New York-based Committee to Protect Journalists, Saudi authorities maintained that Al-Jasser was behind a social media account on X, formerly Twitter, that levied corruption allegations against Saudi royals. Al-Jasser was also said to have posted several controversial tweets about militants and militant groups. CPJ's program director Carlos Martínez de la Serna condemned the execution and said the lack of accountability in the wake of the killing of Washington Post columnist Jamal Khashoggi at the Saudi Consulate in Istanbul in 2018 allows for continued persecution of journalists in the kingdom. 'The international community's failure to deliver justice for Jamal Khashoggi did not just betray one journalist,' he said, adding it had 'emboldened de facto ruler Crown Prince Mohammed bin Salman to continue his persecution of the press.' A Saudi assassination team killed Khashoggi at the consulate in Istanbul. The U.S. intelligence community concluded that the Saudi crown prince ordered the operation but the kingdom insists the prince was not involved in the killing. Al-Jasser ran a personal blog from 2013 to 2015 and was well-known for his articles on the Arab Spring movements that shook the Middle East in 2011, women's rights and corruption. Saudi Arabia has drawn criticism from human rights groups for its numbers and also methods of capital punishment, including beheadings and mass executions. In 2024, executions in Saudi Arabia rose to 330, according to activists and human rights groups, as the kingdom continues to tightly clamp down on dissent. Last month, a British Bank of America analyst was sentenced to a decade in prison in Saudi Arabia, apparently over a since-deleted social media post, according to his lawyer. And in 2021, a dual Saudi American national, Saad Almadi, was sentenced to more than 19 years in prison on terrorism-related charges stemming from tweets he had posted while living in the United States. He was released in 2023 but has been banned from leaving the kingdom.

N.S. Pride groups applaud federal funding to improve event safety, security
N.S. Pride groups applaud federal funding to improve event safety, security

CBC

time2 hours ago

  • CBC

N.S. Pride groups applaud federal funding to improve event safety, security

Pride groups in Nova Scotia are applauding recently announced federal funding that organizations can use to help cover safety and security costs for festivals and events. Rechie Valdez, minister of women and gender equality, announced about $1.5 million toward a community safety fund. The initiative has been in place since 2023 and is administered by Fierté Canada Pride, a national organization representing 2SLGBTQ+ Pride groups in Canada. Pictou County Pride's director of community engagement said the funding shows the federal government understands that hate toward 2SLGBTQ+ people is rising. "For many of us we are noticing a lot more safety considerations within the community, especially for trans and gender-diverse folk," said Lucy White. This year, there have been a number of incidents of vandalism in Nova Scotia targeting 2SLGBTQ+ businesses and people. Police-reported hate crimes targeting sexual orientation in Atlantic Canada have also been on the rise. Small events and festivals are eligible for up to $10,000 from the fund. Groups with an event budget under $2 million can apply for up to $50,000 dollars, while the largest events can receive up to $250,000. The money can be used to cover the cost of things like insurance and working with a security company to develop an emergency response plan. "A lot of the times we talk about rising hate, but we don't talk about the actual financial costs that [Pride groups] are subject to ... to keep their community safe," said Marc Basque, community safety co-ordinator with Fierté Canada Pride. He said a group doesn't have to be a formally registered organization to apply for the funding. Fiona Kerr, the executive director of Halifax Pride, said the fund will be a big help with rising costs. "We don't really introduce new safety measures, but the ones that we currently do pay for seem to go up exponentially every single year," said Kerr. Kerr is glad to see the federal government taking the matter seriously. She said Halifax Pride has increased security capacity in recent years, with that being the main thing the money will help with. Kerr added that it will help pay for increased first-aid presence at events. "The weather, the heat is not getting any better," said Kerr. "That's been a large concern for us on our parade weekend." Pictou County Pride is not a large enough organization to need help from the fund, said White. But, she said, it could be helpful down the line if the group grows. White added that the fund's existence is "really positive."

Canada's cybersecurity head offers rare insight into Nova Scotia Power breach
Canada's cybersecurity head offers rare insight into Nova Scotia Power breach

CBC

time2 hours ago

  • CBC

Canada's cybersecurity head offers rare insight into Nova Scotia Power breach

The head of Canada's cyber-defence agency is offering some insight just weeks after a ransomware attack against Nova Scotia Power. The utility's computer systems were breached by ransomware hackers on March 19, but Nova Scotia Power did not discover it until April 25. The company disclosed the cybersecurity incident three days after that. About 280,000 customers — more than half of the utility's customers in the province — were informed by letter that their personal information may have been compromised in the attack. The data included names, addresses, phone numbers, birth dates, driver's licences, social insurance numbers and banking information. On Thursday, the Nova Scotia Energy Board granted approval to Nova Scotia Power to move forward with a $1.8-million project to improve cybersecurity. The attack and its aftermath have sparked many questions about the security of the company's IT systems. Rajiv Gupta, head of the Canadian Centre for Cyber Security, spoke to CBC News in a rare interview about how these types of incidents unfold and what people and organizations like Nova Scotia Power can do to protect themselves. This interview has been edited for length and clarity: Can you explain a bit about your agency and what it does? The Canadian Centre for Cyber Security is really Canada's cyber defence agency. So, we provide advice, guidance and services to critical infrastructure systems of importance to Canada. Work primarily with the federal government is where we had started, but have really grown into critical infrastructure. And our goal is to raise cyber resilience across Canada. We fall under CSE, which is the Communications Security Establishment, and CSE has a mandate for foreign intelligence, which goes back 80 years in terms of WWII. We report to the minister of national defence. What do you make of the recent attack against Nova Scotia Power, which did ultimately affect about 280,000 customers? We don't comment specifically on specific incidents, but as a cyber centre … any critical infrastructure providers that have incidents can report their incidents to the cyber centre. So last year we saw about 1,500 incidents. We see a lot of these, and that's what's really important and kind of sad to understand as well, that this is happening so often in terms of cyber-criminal organizations comprising critical infrastructure organizations in Canada. Their motivation is money. They would compromise the network. So basically getting their software inside the network, but then stealing all the sensitive information from the organization and … then going ahead and encrypting systems and locking people out of their system. So we used to call that double extortion. So that way the criminal organization could threaten to release sensitive information, unless a ransom was paid, or also basically not give back access to systems unless a ransom was paid. So that was what we're seeing and it was incredibly impactful to system operators within Canada. In this case, Nova Scotia Power did not pay the ransom that was asked of them. Is that common practice? What we always do is we provide advice and guidance to organizations and we say, "it's a business decision," because we're not the ones operating their business, and we don't know their exact context, say if it's a threat to life or something else. But we always say, 'Hey there's a lot of downside to paying the ransom.' First of all, you're funding these criminal organizations. So, the more ransom is paid, the more we're going to proliferate this sort of behaviour. At the same point in time, you're paying this ransom to criminals. What's that contract worth in the end anyway? Is there really any guarantee that they're either not going to share the confidential information, or they're actually going to give you the keys to decrypt your systems and get your access back? The proceeds of this can go to criminal or even terrorist type causes as well, so, worrisome in that sense. Are you able to say whether Nova Scotia Power had actually contacted your agency [following the breach]? The one thing that I will say is that they did reach out to us. We always recommend that organizations that are victimized reach out to the cyber centre. We've seen many of these in the past and we have advice and guidance to share. And not only can we help the organization in their recovery, and in terms of paying the ransom, ransom might help you unlock your systems, but there's still always recovery costs that are part of this as well, regardless of whether you work with the criminal organization or not. But in this case, they did reach out to us. And the other thing we always encourage is … we hope that they share information about the compromise as well. Because we can take that and share that with other critical infrastructure organizations in Canada. Did they share with you the extent of the breach? We wouldn't go into any details in that sense, but they did notify us of the breach. Is there any sense of who might have been the perpetrator in this attack from your perspective? Nova Scotia Power says it has a sense of who it is. I wouldn't comment on that. There's various groups and they often change shapes and forms as they get disrupted. Unfortunately it's an ever-evolving group of cyber criminals that are out there that seem to be performing these behaviours. And we have an assessment out in terms of a cyber criminal activity in Canada as well that kind of points to the groups that we've seen as active. About 140,000 [social insurance numbers] were included in the stolen data. How serious is this, when that type of personal information is accessed? I couldn't speak to the seriousness of that type of information, but what I will say is that this is exactly what cyber criminals go after. And depending on the type of information, it'll fetch a different price on the dark web. Organizations will collect personal information, whether it's SIN numbers, or credit card numbers, or health card numbers, other sorts of confidential information. Typically that information gets resold on the dark web for other criminals that are going to actually monetize that for other purposes. It's kind of a not very positive circle that exists on the dark web. The way this actually works in terms of what we call "cybercrime as a service" is that it's a whole ecosystem of criminal entities that actually work together. And because it's typically run out of operations that are beyond the legal borders — often in Russian speaking countries where law enforcement won't necessarily prosecute — it's very difficult to disrupt these organizations. And even when law enforcement is able to disrupt them, it's fairly easy for them to kind of reconstitute themselves. What are some of the risks when this personal information is shared on the deep web or dark web? Once that information is out there, that often just spurs the next cycle of fraud. Whether it's spear phishing emails that are using that information, whether it's leveraging information about an organization or their clients to actually further compromise them. That's why it's really important to take note for everyone to be mindful of the things they can do to protect themselves. Be extra vigilant of understanding what's being mailed to you and double checking those links and making sure it's coming from an authenticated source and whatnot. Being mindful of content, making sure you have strong authentication in terms of how you're actually accessing applications as well. What would be your advice to Nova Scotia Power? Really for all of these organizations, do your due diligence. Understand what your really critical elements are of your organization that would be your worst-case scenario. And then once you know what your worst-case scenario is, then you can defend that. Build the plan according to our ransomware playbook, have the backups in place, and have the strong measures in place. The utility [Nova Scotia Power] applied for funding about a month before the ransomware attack. They cited the Canadian Centre for Cyber Security's most recent threat assessment, pointing out that power grids are so interconnected that they can be really vulnerable to these types of attacks. What would be the warning signs of an attack like this? One of the things that we've been very mindful of … as the world gets more hostile, we're worried about impacts to critical infrastructure like electrical guide grids, pipelines, these sorts of things. A lot of them are controlled by systems that were never meant to be connected to the Internet. Nowadays, as people are looking to optimize efficiency, and connect to cloud services and connect sensors to networks, they're becoming more exposed to threat actors from around the world. Normally your electrical grid would only be threatened by people that are actually in the country and nearby, but as soon as you connect it to the Internet, you're pretty much opening a lot of this up to people from anywhere. We are not a regulator. The cyber centre itself provides advice, guidance and services, but we have no authority over any of these entities. We work voluntarily to provide the best practices.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store