Professional Documents
Culture Documents
Canada's Legal Framework For Intelligence
Canada's Legal Framework For Intelligence
To cite this article: Stéphane Lefebvre (2010) Canada's Legal Framework for Intelligence,
International Journal of Intelligence and CounterIntelligence, 23:2, 247-295, DOI:
10.1080/08850600903347137
Taylor & Francis makes every effort to ensure the accuracy of all the information (the
“Content”) contained in the publications on our platform. However, Taylor & Francis,
our agents, and our licensors make no representations or warranties whatsoever as to
the accuracy, completeness, or suitability for any purpose of the Content. Any opinions
and views expressed in this publication are the opinions and views of the authors,
and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content
should not be relied upon and should be independently verified with primary sources
of information. Taylor and Francis shall not be liable for any losses, actions, claims,
proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or
howsoever caused arising directly or indirectly in connection with, in relation to or arising
out of the use of the Content.
This article may be used for research, teaching, and private study purposes. Any
substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing,
systematic supply, or distribution in any form to anyone is expressly forbidden. Terms &
Conditions of access and use can be found at http://www.tandfonline.com/page/terms-
and-conditions
International Journal of Intelligence and CounterIntelligence, 23: 247–295, 2010
Copyright # Taylor & Francis Group, LLC
ISSN: 0885-0607 print=1521-0561 online
DOI: 10.1080/08850600903347137
STÉPHANE LEFEBVRE
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
The Government of Canada has the responsibility to provide for the safety
and security of its citizens and permanent residents, and its Parliament the
legislative authority to make ‘‘Laws for the Peace, Order, and good
Government of Canada.’’1 In fulfilling their duties in the interest of the
greater collectivity, the Government and Parliament may affect the rights
of the individual citizen. This is why the rule of law, 2 enshrined in
common law and the Canadian Charter of Rights and Freedoms impose
restraints on the executive and legislative powers of the state. While
‘‘everyone has the right to life, liberty and security of the person,’’
everyone also has the right ‘‘not to be deprived thereof except in
accordance with the principles of fundamental justice.’’ 3 The intrusive
nature of intelligence gathering is such that a democratic state founded
upon principles that recognize the rule of law must impose adequate
restraint on the intelligence activities of its government. As Canada’s
Supreme Court has recognized, ‘‘the restraints imposed on government
from prying into the lives of the citizen go to the essence of a democratic
state.’’ Privacy, therefore, ‘‘is at the heart of liberty in a modern state.’’
But claims to privacy, although vaguely defined, must ‘‘be balanced
against other societal needs, and in particular law enforcement, and that is
what s.84 is intended to achieve.’’5
In matters of national security, Canadian courts have usually shown
deference to the executive branch because, as Supreme Court Justice Ian
Binnie publicl y noted, security age nci es ‘‘have more e xper tise ,
information and resources on such matters than the courts.’’ 6 In the
post–11 September 2001 (9=11) context, deference to the executive in the
fight against terrorism initially appeared to predominate, especially with
the rapid adoption of a major piece of legislation, the omnibus
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
effort to protect everyone’s right to life, liberty, and security of the person.
I also pay close attention to the legal mechanisms in place to protect
intelligence from unauthorized disclosure.
The Minister shall coordinate the activities of the entities for which the
Minister is responsible, including the Royal Canadian Mounted Police,
the Canadian Security Intelligence Service, the Canada Border Services
Agency, the Canadian Firearms Centre, the Correctional Service of
Canada, and the National Parole Board, and establish strategic
priorities for those entities relating to public safety and emergency
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
preparedness.
before they are submitted for approval by the Minister, and then to the
Federal Court accompanied by an affidavit.25
Section 13 authorizes the CSIS to provide security assessments to
departments of the government, and, with the approval of the Minister of
Public Safety, to provinces, and with the approval of the same minister
and after consultation with the Minister of Foreign Affairs, to foreign
states. A security assessment consists, as per Section 2, of an ‘‘appraisal of
the loyalty to Canada and, so far as it relates thereto, the reliability of an
individual.’’ As of this writing, the CSIS provides security assessments for
all federal employees requiring a security clearance (which grants the
bearer access to confidential, secret and top secret information on a need
to know basis),26 with the exception of the RCMP. Security screenings are
also conducted for landed immigrant status, refugee, and Canadian
citizenship applicants (under Sections 14 and 15), the government
employees of the provinces of Alberta and New Brunswick, as well as on
behalf of foreign governments on individuals who have resided in Canada.
In addition, the CSIS, at the request of Transport Canada, Parliament,
nuclear facilities, and other government departments, provides security
assessments for site-access programs approved by the Treasury Board
Secretariat.27 In performing their functions, screening officers are guided
by the CSIS’s ‘‘Security Screening Investigators Guidebook,’’ which
contains the criteria that must be taken into consideration during their
investigation. These include:
. the existence of ‘‘any family or close continuing relationships with persons who
reside in countries of security concern’’;
. the ‘‘extent of homeland links: family, friends, homeland political and cultural
involvement, financial, property or business interests and use of non-Canadian
passports’’; and
. the presence of risky character traits (such as greed, habitual use of intoxicants to
excess, illicit or abnormal sexual behavior, secrecy about sexual orientation),
stressful personal problems, noticeable changes in established work patterns,
deliberate misrepresentation, ‘‘expectations to be exceedingly well-off in a short
time,’’ and ‘‘expectations well beyond ability.’’28
The CSIS’s security assessments are advisory in nature; they are not
decisions that must be implemented by the receiving departments.
According to the Government Security Policy, which is administered by the
Treasury Board Secretariat, the decision to grant a security clearance is
the responsibility of the Departmental Security Officer (DSO) on behalf of
the deputy head (deputy minister-level official). A security clearance can be
denied, suspended, or revoked only by a deputy head.29 A person denied a
security clearance on the basis of a CSIS security assessment can complain
to the CSIS’s review body, the Security Intelligence Review Committee
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
Therefore, in the opinion of the Court, Section 12 of the CSIS Act, and a
contextual analysis of the case law on the disclosure and retention of
evidence, impose on the CSIS an obligation to retain information, including
operational notes, ‘‘when conducting an investigation that targets an
individual or group.’’ The Court further noted that these notes, ‘‘which
include drafts, diagrams, recordings and photographs, must serve a practical
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
As part of the judicial control over the use of intrusive measures by the
CSIS, the Federal Court must approve or reject warrant applications
prepared by the Service and approved by the Minister of Public Safety.
Between 1993 and 2003, the CSIS submitted 2,544 warrant applications to
the Federal Court pursuant to Section 21 of the Act; all but eighteen were
approved by Federal Court, for a success rate of 99.3 percent. These
warrants can be granted only after ‘‘other investigative procedures have
been tried and have failed’’ and ‘‘the urgency of the matter is such that it
would be impractical to carry out the investigation using only other
investigative procedures.’’36 Once granted, a warrant allows the CSIS to:
intercept any communication or obtain any information, record,
document or thing and, for that purpose,
The CSIS has attributed its high success rate to strong internal vetting and
approval procedures, including ministerial sign off, and rejected the notion
appear ‘‘to fall within the definition of ‘threats to the security of Canada’
under the CSIS Act.’’ While the SIRC agreed that the CSIS had acted in
compliance with Ministerial Direction and internal operational policies, it
concluded that collecting information on entities not posing a threat to
the security of Canada was of concern and lacking in authority.
However, the review conducted by the SIRC was not as complete as it
should ordinarily have been because it could not get access to SIRs,
which are considered Cabinet confidences, and which the SIRC is
p r e c l u d e d t o s e e , p u r s u a n t t o S u b s e c t i o n 3 9 ( 3 ) o f t h e A c t. 4 4
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
(i) On what basis or foundation does the Court then issue a warrant
which admittedly would not be enforceable outside Canada and
which would likely involve the authorization of illegal activity in
the host state? More specifically, what would be the purpose of
seeking such a warrant?
(ii) Further, if such Parliamentary intent can be established and pursuant
to section 21 of the Act, it can be construed to provide the Court
authority to issue such extraterritorial warrants, should the Court
While the language of the legislative text may allow for an inference to be
drawn in respect to a mandate for the Service to conduct certain activities
extraterritorially, that inference is not sufficiently obvious to provide a
basis to conclude that the Service has a clear mandate to conduct the
activities sought to be authorized in the warrant in countries other
than Canada, and that the Court has jurisdiction to authorize such
activities. In my view, such a construction cannot be taken or implied
from the applicable provisions of the Act, read together.47
The Federal Court further stated that no legislative history would suggest
that Parliament intended for extraterritorial reach, especially with respect for
a role by the Federal Court in authorizing extraterritorial warrants. The
execution of such a warrant would therefore be ‘‘inconsistent with and
likely to breach the binding customary principles of territorial sovereign
equality and non-intervention, by the comity of nations.’’48 As decisions
on warrant applications cannot be appealed, a CSIS spokesperson later
c o n f i r m e d t h a t t h e S e r v i c e ha d d r o p p e d i t s a t t e m p t t o g e t t h e
extraterritorial warrants.49
Among the other powers granted to the CSIS in the Act, its Director is
entitled to appoint and discipl ine all employees of the Se rvice
(Subsections 8(1) and 8(2)), and to determine their terms and conditions of
employment, as well as to establish disciplinary and grievance procedures.
However, if a breach of discipline involves noncompliance with legislation
or policy or an unlawful act in the performance of an employee’s duties, it
must, pursuant to Section 20, be reported to the Minister of Public Safety
and the action investigated. While CSIS intelligence officers are not
(1) (a) to acquire and use information from the global information
infrastructure for the purpose of providing foreign intelligence,60
in accordance with Government of Canada intelligence priorities;
(b) to provide advice, guidance, and services to help ensure the
protection of electronic information and of information
infrastructures of importance to the Government of Canada; and
(c) to provide technical and operational assistance to federal law
enforcement and security agencies in the performance of their
lawful duties.
(2) Activities carried out under paragraphs (1)(a) and (b)
(a) shall not be directed at Canadians or any person in Canada; and
(b) shall be subject to measures to protect the privacy of Canadians in
the use and retention of intercepted information.
immigration law, the security certificate process has been a major source of
contention, repeatedly involving the Federal Court, and lately the Supreme
Court of Canada. Between 1991, when they came into law, and November
2006, twenty-nine security certificates were issued, the majority in relation
to terrorism, and the remaining few in relation to espionage. 76 In a
security certificate, the Ministers of Public Safety and of Citizenship and
Immigration certify that reasonable grounds exist to believe, based on an
SIR prepared for them by the CSIS, that, pursuant to Section 34(1) of the
Act, a permanent resident or a foreign national is inadmissible on security
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
grounds. Specifically:
. Mohammad Zeki Mahjoub came to Canada in 1995, and was detained in 2000 on
the basis of a security certificate which was found reasonable by the Federal Court
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
. Adil Charkaoui was detained in May 2003 on the basis of a security certificate
linking him to al-Qaeda. In June 2003, Charkaoui challenged the
constitutionality of the procedure established under the Act for determining
whether a security certificate is reasonable and filed several other motions. In
February 2005, at his fourth detention hearing, he was granted bail under strict
conditions. The Federal Court noted that while Charkaoui was a national
security threat, he was no longer an imminent danger to Canadians. 8 7
In September 2008, the Supreme Court refused to hear Charkaoui’s appeal to
stop the deportation proceedings against him.88
Anti-Terrorism Act replaced the Official Secrets Act with the Security of
Information Act, whose primary purpose is to permanently bind to secrecy
designated government officials from ever revealing special operational
information, which is defined under Subsection 8(1)(a) as:
(a) the identity of a person, agency, group, body or entity that was or is intended to
be, has been approached to be, or has offered or agreed to be, a confidential
source of information, intelligence or assistance to the Government of Canada;
(b) the nature or content of plans of the Government of Canada for military
operations in respect of a potential, imminent or present armed conflict;
(c) the means that the Government of Canada used, uses or intends to use, or is
capable of using, to covertly collect or obtain, or to decipher, assess, analyze,
process, handle, report, communicate or otherwise deal with information or
intelligence, including any vulnerabilities or limitations of those means;
(d) whether a place, person, agency, group, body or entity was, is or is intended to
be the object of a covert investigation, or a covert collection of information or
intelligence, by the Government of Canada;
(e) the identity of any person who is, has been or is intended to be covertly engaged
in an information- or intelligence-collection activity or program of the
Government of Canada that is covert in nature;
(f) the means that the Government of Canada used, uses or intends to use, or is
capable of using, to protect or exploit any information or intelligence referred
to in any of paragraphs (a) to (e), including, but not limited to, encryption
and cryptographic systems, and any vulnerabilities or limitations of those
means; or
(g) information or intelligence similar in nature to information or intelligence
referred to in any of paragraphs (a) to (f) that is in relation to, or received
from, a foreign entity or terrorist group.
For those intelligence officers and other designated officials to whom the
Act applies, the virtual certainty is that they never will be in a position to
publish memoirs on their experiences, unless all operational information of
the types described are expurged. 102 The Act also acts as a deterrent for
offenses relating to communications with foreign entities and terrorist
groups (up to imprisonment for life if it involves special operation
the action forward after her home was searched by the RCMP as part of
its investigation into a leak of confidential information on Maher Arar
that O’Neill had used in one of her newspaper articles. She argued, inter
alia, that Subsections 4(1)(a),103 4(3),104 and 4(4)(b)105 of the Act violated
her rights under Sections 7 and 2(b) of the Canadian Charter of Rights and
Freedoms. The court agreed. Section 4 of the Act was ruled
unconstitutional and in violation of Section 7 of the Charter (‘‘Everyone
has the right to life, liberty and security of the person and the right not to
be deprived thereof except in accordance with the principles of
fundamental justice’’) because it was overbroad, vague, and partly without
any fault requirement. Section 4 was also ruled not to be in compliance
with Section 2(b) of the Charter (‘‘freedom of thought, belief, opinion and
expression, inc luding freedom of the press and other media of
communication’’) and that Section 1 of the Charter (which ‘‘guarantees the
rights and freedoms set out in it subject only to such reasonable limits
prescribed by law as can be demonstrably justified in a free and
democratic society’’) was not applicable.106 Interestingly, a year before that
section was declared unconstitutional, the Justice Department had been
looking at numerous options for strengthening the Act by making it even
more constraining on public servants, contractors, and recipients of
information unauthorized for disclosure.107
Under Subsections 38.01(1), (2), (3), and (4), for example, every participant
or an official, in connection with a proceeding, must notify in writing the
Attorney General if required to disclose such information, or believe that
such information will be disclosed either in the course of the proceeding or
at a later date. Exceptions, however, do apply in light of other statutory
requirements (i.e., the CSIS Act, Privacy Act, Immigration and Refugee
Protection Act, etc.). Within ten days of receiving a notice, the Attorney
General must notify the originator of his or her decision with respect to
the disclosure of the information. If the Attorney General does not provide
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
injury would result ‘‘because of his access to special information and expertise
[and of his] protective role vis-à-vis the security and safety of the public.’’109
Limits to disclosure of information to affected individuals because of ‘‘the
importance of national security and the need for confidentiality in such
matters have been repeatedly recognized by the Supreme Court,110 notably
in 1992 [Chiarelli v. Canada (M.E.I.) 1 S.C.R. 711], 2002 [Ruby v.Canada
(Solicitor General) 4 S.C.R. 3] and 2007 [Charkaoui v. Canada (Citizenship
and Immigration) SCC 9]. This recognition includes the fact that ‘‘Canada
is a net importer of information essential to our security, defence, and
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
The Attorney General agreed with the plaintiffs that these provisions
contradict the open court principle, a value enshrined, and recognized as
such by the Supreme Court, in Section 2b) of the Canadian Charter of
Rights and Freedom (freedom of thought, belief, opinion, and expression,
including freedom of the press and other media of communication). The
Federal Court agreed, for the reason the Supreme Court enunciated in
Ruby v. Canada (Solicitor General) [2002] 4 S.C.R., ‘‘that the mandatory
requirement to exclude the public from portions of the review hearing
when there existed no risk that national security information or foreign
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
C. Administrative Review
In situations where a security incident is reported or discovered, a review into
the incident may be ordered. The DSO of the Department or agency where
the incident occurred would normally be charged to undertake the review.
Section 10.15 of the Government Security Policy stipulates that each
Intelligence Service.
(d) Incidents and threats affecting the availability of critical assets and services to
the Office of Critical Infrastructure Protection and Emergency Preparedness.
(e) Incidents which can be considered as a ‘‘hazardous occurrence’’ or involve
employee injury to the health and safety committee and to Health and Safety
Officers appointed under the Canada Labour Code.
(f) Incidents that have an impact on government operations or that could require
revisions to operational standards or technical documentation, to the
Treasury Board of Canada Secretariat.117
C. Privacy Act
The purpose of the Privacy Act is twofold: to protect the privacy
of individuals, and to provide individuals with a right of access to
personal information about themselves held by the government. Section 4
explicitly forbids government institutions from collecting personal
information unless ‘‘it relates directly to an operating program or activity
of the institution.’’ Pursuant to Section 5, and to the extent possible,
personal information should be collected from the individuals themselves,
the Intelligence Community was heavily involved. Under the Inquiries Act,
a commissioner can compel someone to testify or produce documents, but
the Attorney General reserves the right to claim national security
confidentiality to prevent the disclosure of information into the public
domain. If national security confidentiality is claimed, the commissioner
can then hold hearings in camera.
2004 pursuant to the Inquiries Act and mandated ‘‘to investigate and
report on the actions of Canadian officials in relation to Maher Arar
(Factual Inquiry) as well as to recommend an arm’s-length review
mechanism for the activities of the RCMP with respect to national security
(Policy Review).’’128
The Commission issued its report in two parts, Part I and Part II. In Part I,
the Commissioner, the Honourable Dennis R. O’Connor, Associate Chief
Justice of Ontario, found that the sharing of intelligence (that was shown
to be inaccurate) by the RCMP, some of which had been obtained from
the CSIS for investigative purposes, was not done in accordance with its
own policies (that the information intended for sharing be assessed with
respect to its relevance, reliability, and that it be properly caveated), and
that it was very likely U.S. authorities had relied on RCMP intelligence in
deciding to deport Maher Arar to Syria, where he was tortured. In Part II,
the Policy Review, the Commissioner concluded that the RCMP’s national
security activities were not subject to adequate accountability and review
mechanisms. He recommended a new review mechanism for the RCMP
(the Independent Complaints and National Security Review Agency)
following the model of the SIRC, but which would also have extensive
investigative powers similar to those found in the Inquiries Act, and
jurisdiction over all of the RCMP’s activities. With respect to the national
security activities of departments and agencies not subject to any
independent review mechanism—namely, the Canada Border Services
Agency, Transport Canada, Citizenship and Immigration Canada, the
Financial Transactions and Reports Analysis Centre of Canada, and
Foreign Affairs and International Trade Canada—the Commissioner
recommended that their activities be reviewed by the SIRC, with the
exception of the Canada Border Services Agency, whose activities would
fall under the purview of the RCMP’s new review mechanism. In addition,
he recommended that all review agencies be linked, which would facilitate
the review of integrated operational activities.129
the circumstances surrounding the bombing of Air India Flight 182,’’ and
to make findings and recommendations with respect to the following,
namely, in so far as it concerns intelligence matters:
play. This allowed for a faster, and less complicated and expensive
inquiry. With respect to his terms of reference, the Commissioner
concluded that, in the case of Abou-Elmaati, a dual Canadian–Egyptian
citizen, the actions of Canadian officials—namely, the sharing of
information, the sending of questions by the CSIS, and the lack of
consular support—likely contributed to his detention in Syria and Egypt,
where he was mistreated. With respect to Almalki, a dual Canadian–
Syrian citizen, the Commissioner concluded that the actions of Canadian
officials did not directly result in his detention in Syria, where he was
mistreated, but he could not say whether his detention was the indirect
result of the actions of Canadian officials. As for Almalki’s mistreatment,
the commissioner assessed that it was an indirect result of two actions of
Canadian officials—namely, the sharing of information with U.S.
agencies by the RCMP, and the sending by the RCMP of questions to
Syria to be answered by Almalki. In the case of Nureddin, a dual
Canadian–Iraqi citizen, the Commissioner found that his detention in
Syria, where he was mistreated, was not the direct result of actions by
Canadian officials, but that their actions, including the sharing of
information with foreign agencies, likely contributed to his detention as
well as his mistreatment.131
The legal framework for intelligence in Canada was not much in anyone’s
mind prior to 9=11, with the exception of the review mechanisms for the
CSIS.138 As national security law has become more pervasive in its effect
on individual rights, more attention is being paid to it by scholars. In 2008,
Craig Forcese of the University of Ottawa published Canada’s only national
security law textbook.139 Developing further expertise in this area of law will
be necessary if Canada’s Intelligence Community is to remain legally resilient
and effective despite the tensions between ensuring both collective security
and individual rights.
REFERENCES
1
Section 91 of the Constitution Act, 1867.
2
As Donald F. Kettl noted, ‘‘the rule of law creates the foundation for
administrative accountability. Since government in action so often is the
action of administrators, the rule of law provides the mechanism for
constraining how administrators exercise their power. It tells them what they
can do and what will happen to them if they step beyond their boundaries.’’
2006, p. 9.
6
As reported by the Communications Security Establishment Commissioner in
his Annual Report 2004–2005 (Ottawa: Minister of Public Works and
Government Services Canada, 2005), p. 16.
7
Canada’s Security Response: Accommodation or Divergence? Presentation to the
Standing Committee on Justice, Human Rights, Public Safety, and Emergency
Preparedness (Ottawa: EKOS Research Associates, 14 December 2004), p. 9.
8
For a brief discussion, see Emmett Macfarlane, ‘‘Terms of Entitlement: Is There
a Distinctly Canadian ‘Rights Talk?,’’’ Canadian Journal of Political Science,
Vol. 41, No. 2, June 2008, pp. 314–315, 319.
9
Reg Whitaker, ‘‘Before September 11—Some History Lessons,’’ in Terrorism,
Law, and Democracy: How Is Canada Changing Following September 11?,
David Daubney, Wade Weisman, Daniel Jutras, Errol P. Mendes, and Patrick
A. Molinari, eds. (Montreal: Les Éditions Thémis, 2002), p. 48.
10
Section 16 of the then Official Secrets Act.
11
Commission of Inquiry into the Actions of Canadian Officials in Relation to
Maher Arar, A New Review Mechanism for the RCMP’s National Security
Activities (Ottawa: Public Works and Government Services Canada, 2006),
pp. 30–31.
12
Such was the case, for example, of the creation of Canada’s voluntary Interview
Program, now a component of the Department of Foreign Affairs and
International Trade, approved through an order-in-council in April 1953. See
Kurt F. Jensen, ‘‘Canada’s Foreign Intelligence Interview Program,
1953–1990,’’ paper presented at the 2002 CASIS International Conference on
‘‘The New Intelligence Order: Knowledge for Security and International
Relations,’’ Ottawa, 27 September 2002.
13
‘‘The Privy Council Office (PCO) reports directly to the Prime Minister
and is headed by the Clerk of the Privy Council and Secretary to the Cabinet.
It is both the Cabinet secretariat and the Prime Minister’s source of public
service advice across the entire spectrum of policy questions and operational
issues facing the Government.’’ The Role and Structure of the Privy Council
Office, revised edition (Ottawa: Her Majesty the Queen in Right of Canada,
2008), p. 1.
14
In 2005, it was referred to as the ‘‘requirements committee’’ by the then–Chief of
the Communications Security Establishment. See the testimony of Keith Coulter
before the Subcommittee on Public Safety and National Security of the Standing
Committee on Justice, Human Rights, Public Safety and Emergency
Preparedness, House of Commons, 38th Parliament, 1st Session, Evidence,
4 May 2005.
15
Communications Security Establishment Commissioner, Annual Report
2003–2004 (Ottawa: Minister of Public Works and Government Services
Canada, 2004), p. 3.
16
Securing an Open Society: Canada’s National Security Policy (Ottawa: Privy
Council Office, April 2004), p. 9.
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
17
Subsection 127.1 (1)(a) states: ‘‘The Governor in Council may appoint persons
to the following positions and fix their remuneration: (a) deputy minister,
associate deputy minister and positions of equivalent ranks.’’
18
The Role and Structure of the Privy Council Office, p. 2.
19
There have been few Cabinet committees with a focus on national security and
intelligence in Canada’s history, a clear reflection of the neglect of security and
intelligence among successive governing political classes. See Reg Whitaker,
‘‘9=11 and the Canadian Security and Intelligence Community,’’ paper
presented at the 2002 CASIS International Conference on ‘‘The New
Intelligence Order: Knowledge for Security and International Relations’’
(Ottawa: 26 September 2002), pp. 2–3. On the lack of an intelligence culture
in Canada, see Stéphane Lefebvre, ‘‘Cultura de la Inteligencia en Canadá:
Una Evaluación [Canada’s Intelligence Culture: An Assessment],’’ in
Democratización de la Función de Inteligencia: El Nexo de la Cultura
Nacional y la Inteligencia Estratégica, Russell G. Swenson and Susana
C. Lemozy, eds. (Washington, D.C.: National Defense Intelligence College
Press, 2009), pp. 365–386.
20
Cabinet Committee Mandates and Membership (Ottawa: Office of the Prime
Minister, 30 October 2008), accessed at http://www.pm.gc.ca/grfx/docs/
Cab_committee-comite.pdf
21
The Role and Structure of the Privy Council Office, pp. 9–10.
22
Ibid., p. 10.
23
Proceedings of the Standing Senate Committee on National Security and
Defence, Issue 17—Evidence—Meeting of 18 June 2007, accessed at http://
www.parl.gc.ca/39/1/parlbus/commbus/senate/Com-e/defe-e/17evb-
e.htm?Language=E&Parl=39&Ses=1&comm_id=76
24
Details on these requirements have appeared in the Annual Reports of the
Security Intelligence Review Committee (SIRC). See SIRC’s Web page at
http://www.sirc-csars.gc.ca
25
CSIS Director Jim Judd, ‘‘Control, Accountability, and Review: The CSIS
Experience,’’ a submission to the O’Connor Commission of Inquiry, 21
February 2005; Colin Freeze, ‘‘Heard of CSIS, CIA, RCMP? Time to Meet
TARC,’’ The Globe and Mail (Toronto), 24 June 2004.
26
According to the Government Security Policy: ‘‘The Government of Canada
must ensure that individuals with access to government information and assets
are reliable and trustworthy. For national security, it must also ensure the
individual’s loyalty to Canada in order to protect itself from foreign
intelligence gathering and terrorism. Special care must be taken to ensure the
continued reliability and loyalty of individuals, and prevent malicious activity
and unauthorized disclosure of classified and protected information by a
disaffected individual in a position of trust.’’ Government Security Policy
(Ottawa: Treasury Board Secretariat, 1 February 2002), accessed at http://
www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=12322§ion=text#sec10.9
27
The Treasury Board is a Cabinet committee of the Queen’s Privy Council of
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
40
Ibid., p. 14.
41
Three CSIS intelligence officers and an official from the Department of Foreign
Affairs Foreign Intelligence Division interviewed Khadr from 13 to 16 February
2003 and again in September 2003. A Foreign Affairs official returned in March
2004. Each of these interviews was conducted for intelligence garthering
purposes. Omar Khadr and the Attorney General of Canada, Public Reason for
Order and Order, 2008 FC 807, 25 June 2008, pp. 25–26.
42
Ed Morgan, ‘‘Let CSIS into Guantanamo,’’ National Post (Toronto), 11 August
2005.
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
43
‘‘It is not a crime to be listed. However, one of the consequences of being
listed is that the entity’s property can be the subject of seizure=restraint
and=or forfeiture. In addition, institutions such as banks, brokerages, etc.
are subject to reporting requirements with respect to an entity’s property
and must not allow those entities to access the property nor may these
institutions deal or otherwise dispose of the property.’’ Web page of the
Department of Public Safety at http://www.publicsafety.gc.ca/prg/ns/le/
index-eng.aspx
44
Security Intelligence Review Committee, SIRC Annual Report 2004–2005: An
Operational Review of the Canadian Security Intelligence Service (Ottawa:
Public Works and Government Services Canada, September 2005), pp. 4–10.
45
Reason for Order and Order dans l’affaire d’une demande de mandats faite par
[. . .] en vertu des articles 12 et 21 de la Loi sur le Service canadien du
renseignement de sécurité, L.R.C. (1985), chap. C-23, Docket SCRS 10-07
(Ottawa: Federal Court of Canada, 22 October 2007), p. 3.
46
The judge quotes Professor Driedger, Sullivan and Driedger on the Construction
of Statutes, 4th edition (Markham: Butterworths, 2002), pp. 1, 10 with respect to
the key principle: ‘‘words of an Act are to be read in their entire context, in their
grammatical and ordinary sense harmoniously with the scheme of the Act, the
object of the Act and the intention of Parliament.’’ Ibid., p. 14. Another
principle is: ‘‘a court will strive to avoid construction of domestic law
pursuant to which the state would be in violation of its international
obligations, unless the wording of the statute clearly compelled that result.’’
Ibid., p. 19.
47
Ibid., p. 16.
48
Ibid., p. 21.
49
Colin Freeze, ‘‘Judge Denies CSIS Bid to Track Terror Suspects,’’ The Globe and
Mail (Toronto), 16 February 2008. See also, Colin Freeze, ‘‘Monitoring
Canadian Suspects Abroad: Spying Laws Outdated, Expert Argues,’’ The
Globe and Mail (Toronto), 20 February 2008.
50
Physical surveillance generally does not require judicial authorization. See
Cody v. R [2007] QCCA 1276 para. 26 and 2009 FC 33, 15 January 2009,
para. 151.
51
See http://www.publicsafety.gc.ca/abt/wwa/igcsis/igcsis-en.asp
52
See http://www.sirc-csars.gc.ca/index-eng.html
53
The 2007 certificate submitted to the Minister of Public Safety by the IG read as
follow: ‘‘In respect of all the reports and information that I, and my Office, have
obtained and reviewed and of all the discussions held, and subject to the
concerns raised below, I am as satisfied as I can be with the Director’s Annual
Report to you on the Service’s operational activities for the period 2006–2007.
In that respect, it is my opinion that the Service has not acted beyond the
framework of its statutory authority, has not contravened any Ministerial
Directions, and has not exercised its powers unreasonably or unnecessarily.’’
See http://www.publicsafety.gc.ca/abt/wwa/igcsis/cert2007-eng.aspx
54
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
CSIS Director Jim Judd, ‘‘Control, Accountability and Review: The CSIS
Experience,’’ a submission to the O’Connor Commission of Inquiry, 21
February 2005.
55
A good sample of SIRC’s findings over the years is contained in Accountability
of Security Intelligence in Canada: A Background Paper to the Commission’s
Consultation Paper (Ottawa: Commission of Inquiry into the Actions of
Canadian Officials in Relation to Maher Arar, 10 December 2004), pp. 21–31.
56
Communication from Professor Stuart Farson of Simon Fraser University.
57
The name was changed from Communications Security Establishment (CSE) to
Communications Security Establishment Canada (CSEC) on 27 September
2007, in accordance with the government’s Federal Identity Program,
pursuant to subsection 7(1)(a) of the Financial Administration Act, which
authorizes the Treasury Board to act on matters relating to general
administrative policy in the public service of Canada. See http://www.tbs-
sct.gc.ca/fip-pcim/index-eng.asp
58
What constitutes a private communication is defined in section 183 of the
Criminal Code: ‘‘[. . .] any oral communication, or any telecommunication, that
is made by an originator who is in Canada or is intended by the originator to
be received by a person who is in Canada, and that is made under
circumstances in which it is reasonable for the originator to expect that it will
not be intercepted by any person other than the person intended by the
originator to receive it [. . .].’’
59
Testimony of Keith Coulter, Chief of CSE, before the Subcommittee on Public
Safety and National Security of the Standing Committee on Justice, Human
Rights, Public Safety and Emergency Preparedness, House of Commons, 38th
Parliament, 1st Session, Evidence, 4 May 2005.
60
In the Act, foreign intelligence is defined as: ‘‘information or intelligence about
the capabilities, intentions or activities of a foreign individual, state,
organization or terrorist group, as they relate to international affairs, defence
or security.’’
61
The RCMP is the CSE’s primary client in this regard. Communications Security
Establishment Commissioner, Annual Report 2004–2005 (Ottawa: Minister of
Public Works and Government Services Canada, 2005), p. 6.
62
Pursuant to section 273.65, part I, of the Act, a ministerial authorization must
meet four conditions: ‘‘(a) the interception will be directed at foreign entities
located outside Canada; (b) the information to be obtained could not
65
‘‘Binding recommendations would usurp the prerogative of both the Minister [of
National Defence], who has overall responsibility for CSE, and the Chief of
CSE, who is responsible [. . .] for the management and control of the
organization.’’ Communications Security Establishment Commissioner, Annual
Report 2004–2005, p. 10. Numbers are from Communications Security
Establishment Commissioner, Annual Report 2005–2006 (Ottawa: Minister of
Public Works and Government Services Canada, 2006), p. 12.
66
Pursuant to subsection 15.(5)(b)(ii) of the Security of Information Act, these
concerns would be from a person who has not received a response from the
deputy head of the Deputy Attorney General of Canada within a reasonable
time with respect ‘‘to an alleged offence that has been, is being or is about to
be committed by a member of [CSE] [. . .].
67
Communications Security Establishment Commissioner, Annual Report
2006–2007 (Ottawa: Minister of Public Works and Government Services
Canada, 2007), p. 6.
68
Prior to the Anti-Terrorism Act, the Commissioner submitted annual reports to
the Minister on his activities and findings pursuant to paragraph (g) of the Order
in Council appointing him to the position.
69
Communications Security Establishment Commissioner, Annual Report
2003–2004 (Ottawa: Minister of Public Works and Government Services
Canada, 2004), p. 10.
70
Communications Security Establishment Commissioner, Annual Report
2005–2006 (Ottawa: Minister of Public Works and Government Services
Canada, 2006), p. 11.
71
Isabelle Moses, ‘‘CDI: Building a 21st Century Defence Intellience Capability,’’
The Maple Leaf, Vol. 10, No. 5, 14 February 2007, p. 16.
72
Office of the Auditor General of Canada, Report of the Auditor General of
Canada to the House of Commons. Chapter 10: Other Audit Observations
(Ottawa: Minister of Public Works and Government Services Canada,
November 2003), p. 35.
73
These DAO Ds are: 8002-0, Counter-Intelligence; 8002-1, National
Counter-Intelligence Program; 8002-2, Canadian Forces National
Counter-Intelligence Unit; and 8002-3, Security Intelligence Liaison Program.
They are available on the Internet at http://www.admfincs.forces.gc.ca/dao-
doa/8000/index-eng.asp
74
CFSOC Web page is at: http://www.img-ggi.forces.gc.ca/org/cfi-goi/cfsoc-
cosfc-eng.asp As the CFSOC Web page appears outdated, the new 2005
Direction’s reference was found at http://bib.cfc.dnd.ca/ipac20/ipac.
jsp?session=12OB4A1013509.38549&profile=cfc&uri=full%3D3100001~!37497
~!0&booklistformat=#focus
75
See ‘‘Canada Sets Up New Military Spy Unit,’’ CBC News, 26 May 2008,
accessed at http://www.cbc.ca/news/; ‘‘Intelligence Soldiers in Afghanistan
Since Start of Mission: Commander,’’ CBC News, 26 May 2008, accessed at
http://www.cbc.ca/news/; and Omar El Akkad, ‘‘Proposed Army Spy Unit
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
86
Jim Bronskill, ‘‘Harkat Loses Bid to Quash Security Certificate, Faces
Deportation,’’ Canadian Press, 22 March 2005.
87
Tu Thanh Ha, ‘‘Terror Suspect Held for 21 Months Granted Bail,’’ The Globe
and Mail (Toronto), 18 February 2005.
88
Jan Ravensbergen, ‘‘High Court Won’t Block Deportation,’’ The Gazette
(Montreal), 19 September 2008.
89
Adil Charkaoui=Hassan Almrei and Mohammed Harkat v. The Minister of
Citizenship and Immigration and The Minister of Public Safety and Emergency
Preparedness 2007 SCC 9.
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
90
Specifically, under IRPA’s subsection 85.1(1), ‘‘A special advocate’s role is to
protect the interests of the permanent resident or foreign national in a
proceeding under any of sections 78 and 82 to 82.2 when information or other
evidence is heard in the absence of the public and of the permanent resident
or foreign national and their counsel.’’
91
The Act to amend the Immigration and Refugee Protection Act (certificate and
special advocate) and to make a consequential amendment to another Act, S.C.
2008, c. 3, received Royal Assent on 14 February 2008, and came into force
on 22 February 2008.
92
‘‘Security Certificates,’’ at http://www.publicsafety.gc.ca/prg/ns/seccert-eng.aspx
93
Colin Freeze, ‘‘National Security: Eavesdropping and Attorney–Client
Privilege,’’ The Globe and Mail (Toronto), 19 December 2008.
94
Canadian Press, ‘‘Six People Charged by Police after Sit-In at Lobby of CSIS
Office in Toronto,’’ 20 October 2004.
95
Barbara Jackman, ‘‘Immigration and Terrorism,’’ p. 246.
96
Charkaoui’s legal counsel said she would contest the special advocate
mechanism because, in her view, it still is not in compliance with the
Canadian Charter of Rights and Freedom. Tu Thanh Ha, ‘‘Bill C-3: Updated
Security Certificates to Face Legal Challenge,’’ The Globe and Mail (Toronto),
29 February 2008. The constitutional motion, however, was filed by Hassan
Almrei’s lawyer. In November 2008, the Federal Court ruled that that it was
too soon to decide on the constitutionality of special advocate mechanism as
there was yet no factual basis upon which to decide the motion. Colin Perkel,
‘‘Terrorism Suspects: Judge Upholds Security Legislation,’’ The Globe and
Mail (Toronto), 4 November 2008.
97
CSIS and the RCMP are part of the Passenger Protect Advisory Group, which
has the mandate ‘‘to assess information on a case-by-case basis and make
recommendations to the Minister concerning the designation of individuals or
the removal of the designation as specified persons under section 4.81 (1)(b) of
the Aeronautics Act. Transport Canada leads the Advisory Group, which is
advised by the Department of Justice.’’ See http://www.tc.gc.ca/vigilance/
sep/passenger_protect/menu.htm
98
See the Canada Gazette Part I, Vol. 140, No. 43, on 28 October 2006.
99
Michael Friscolanti and Martin Patriquin, ‘‘Caught in the No-Fly Web,’’
Maclean’s, Vol. 121, Issue 37, 22 September 2008; Michael Friscolanti, Martin
Patriquin, and Dominique Jarry-Shore, ‘‘Why Can’t This Man Fly?,’’ Maclean’s,
Vol. 121, Issue 38, 29 September 2008.
100
See Stewart Bell, ‘‘Olympics Likely Terrorist Target: CSIS,’’ The National Post
(Toronto), 11 December 2008. On ITAC, visit http://www.itac-ciem.gc.ca/
101
The Mike Frost revelations were published as Spyworld: Inside the Canadian and
American Intelligence Establishments (Toronto: Doubleday Canada Limited,
1994). On Shorten’s revelations, see Clyde H. Farnsworth, ‘‘Canadian Agency
Is Accused of Spying on Citizens and Allies,’’ The New York Times, 28
December 1995.
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
102
Wesley K. Wark, ‘‘Canada’s Access to Information Act and the Canadian
Security and Intelligence Community,’’ paper presented at the workshop on
‘‘Democratic and Parliamentary Oversight of Intelligence Services,’’ Geneva,
3–5 October 2002.
103
(1) Every person is guilty of an offence under this Act who, having in his possession
or control any secret official code word, password, sketch, plan, model, article,
note, document or information that relates to or is used in a prohibited place or
anything in a prohibited place, or that has been made or obtained in
contravention of this Act, or that has been entrusted in confidence to him by
any person holding office under Her Majesty, or that he has obtained or to
which he has had access while subject to the Code of Service Discipline within
the meaning of the National Defence Act or owing to his position as a person
who holds or has held office under Her Majesty, or as a person who holds or
has held a contract made on behalf of Her Majesty, or a contract the
performance of which in whole or in part is carried out in a prohibited place, or
as a person who is or has been employed under a person who holds or has held
such an office or contract, (a) communicates the code word, password, sketch,
plan, model, article, note, document or information to any person, other than a
person to whom he is authorized to communicate with, or a person to whom it
is in the interest of the State his duty to communicate it.
104
(3) Every person who receives any secret official code word, password, sketch,
plan, model, article, note, document or information, knowing, or having
reasonable ground to believe, at the time he receives it, that the code word,
password, sketch, plan, model, article, note, document or information is
communicated to him in contravention of this Act, is guilty of an offence
under this Act, unless he proves that the communication to him of the code
word, password, sketch, plan, model, article, note, document or information
was contrary to his desire.
105
(4) Every person is guilty of an offence under this Act who (b) allows any other
person to have possession of any official document issued for his use alone, or
communicates any secret official code word or password so issued, or, without
lawful authority or excuse, has in his possession any official document or
secret official code word or password issued for the use of a person other than
himself, or on obtaining possession of any official document by finding or
otherwise, neglects or fails to restore it to the person or authority by whom or
for whose use it was issued, or to a police constable.
106
See O’Neill v. Canada (Attorney General), 2006 CanLII 35004 (Ontario Superior
Court of Justice), 18 December 2006 at http://www.canlii.org/on/cas/onsc/
2006/2006onsc16405.html
107
Chris Cobb, ‘‘Liberals Aim to Broaden Secrecy Law,’’ The Ottawa Citizen,
8 September 2005.
108
Toronto Star Newspapers Limited and Kassim Mohamed v. Her Majesty the
Queen in Right of Canada 2007 FC 128, p. 21.
109
Omar Khadr and the Attorney General of Canada, Public Reason for Order and
Order, 2008 FC 807, 25 June 2008, p. 19.
Downloaded by [Texas A & M International University] at 07:20 08 October 2014
110
Ibid., p. 20.
111
Ibid.
112
Canada (Minister of Justice et al.) v. Khadr, 2008 SCC 28.
113
2008 FC 807.
114
2007 FC 128, p. 21.
115
In subsection 2(1) of the Security of Information Act, a foreign entity means: ‘‘(a)
a foreign power, (b) a group or association of foreign powers, or of one or more
foreign powers and one or more terrorist groups, or (c) a person acting at the
direction of, for the benefit of or in association with a foreign power or a
group or association referred to in paragraph (b). Security of Information Act
(R.S., 1985, c. O-5).
116
Canada (Attorney General) v. Canada (Commission of Inquiry into the Actions of
Canadian Officials in Relation to Maher Arar–O’Connor Commission) 2007 FC
766, quoted in 2008 FC 807, p. 21.
117
Government Security Policy, available at http://www.tbs-sct.gc.ca/pol/doc-
eng.aspx?id=12322
118
NATO classified information must be handled by all member-states in
accordance with the NATO Security Policy, document C-M(2002)49, and the
NATO Security Committee Directive on the Security of Infornation, document
AC=35-D(2002)-REV2, both available at http://www.freedominfo.org/
119
See Final Report on the Administrative Review into the Security Incident Reported
by Maxime Bernier—Classified Documents Left at a Private Residence (Ottawa:
Department of Foreign Affairs, 16 July 2008).
120
Office of the Auditor General of Canada, Report of the Auditor General of
Canada to the House of Commons. Chapter 27: ‘‘The Canadian Intelligence
Community—Control and Accountability’’ (Ottawa: November 1996).
121
Office of the Auditor General of Canada, Report of the Auditor General of
Canada to the House of Commons. Chapter 10: ‘‘Other Audit Observations’’
(Ottawa: Minister of Public Works and Government Services Canada,
November 2003), pp. 33–40.
122
Office of the Auditor General of Canada, Report of the Auditor General of
Canada to the House of Commons. Chapter 3: ‘‘National Security in Canada—
The 2001 Anti-Terrorism Initiative’’ (Ottawa: Minister of Public Works and
Government Services Canada, March 2004), p. 1.
123
See the testimony of Keith Coulter, Chief of CSE, before the Subcommittee on
Public Safety and National Security, 4 May 2005.
124
Accountability of Security Intelligence in Canada: A Background Paper to the
Commission’s Consultation Paper (Ottawa: Commission of Inquiry into the
Actions of Canadian Officials in Relation to Maher Arar, 10 December 2004),
p. 47.
125
Wesley K. Wark, ‘‘Canada’s Access to Information Act and the Canadian
Security and Intelligence Community.’’
126
These titles were either released to the author or to the National Post under the
Downloaded by [Texas A & M International University] at 07:20 08 October 2014