Federal Court Decisions

Decision Information

Decision Content

                      

 

Federal Court

 

 

 

 

 

 

 

 

Cour fédérale

Date: 20091005

Docket: CSIS-30-08

Citation:  2009 FC 1058

Ottawa, Ontario, October 5, 2009,

PRESENT:    THE HONOURABLE MR. JUSTICE MOSLEY

BETWEEN:

 

IN THE MATTER OF an application by

xxxxxxxxxxxx for a warrant pursuant to  

Sections 12 and 21 of the Canadian Security Intelligence

Service Act, R.S.C. 1985, c. C-23;

 

AND IN THE MATTER OF XXX XXXXXXXXX

 

 

AMENDED AND REDACTED PUBLIC REASONS FOR ORDER

MOSLEY J.

 

[1]               On November 27, 2008 the Court issued warrants pursuant to sections 12 and 21 of the Canadian Security Intelligence Service Act, R.S.C. 1985, c. C-23 ("the Act") with respect to the activities of two Canadian citizens whose activities, on reasonable grounds, were believed to constitute threats to the security of Canada. The warrants authorized the use of intrusive investigative techniques and information collection at locations within Canada for a term of one year.

 

[2]               On January 24, 2009, an application was filed on urgent grounds seeking the issuance of an additional warrant against the same two individuals in respect of newly identified threat-related activities. The application was supported by the affidavit evidence of the applicant, an officer of the Canadian Security Intelligence Service (“CSIS” or the “Service”), and that of an expert employed by the Communications Security Establishment (“CSE”). A hearing was conducted on Saturday, January 26, 2009 at which oral evidence was heard together with submissions presented on behalf of the applicant by counsel for the Attorney General of Canada. Written submissions and authorities were also filed with the Court.

 

[3]               This latter application differed from that dealt with in November 2008 in that it pertained to threat-related activities which, it was believed, the two individuals would engage in while traveling outside of Canada. In that respect, the application was similar to one heard and denied by Mr. Justice Edmond Blanchard in a decision rendered on October 22, 2007 (SCRS-10-07) and reported in an expurgated version in Re CSIS Act, 2008 FC 301. In that decision, Justice Blanchard held that the Court lacked jurisdiction under the Act to authorize intrusive investigative activities by CSIS employees outside of Canada.

 

[4]               In the present matter, the Court was asked to revisit the question of jurisdiction and to distinguish Justice Blanchard’s reasoning in the 2007 decision on the basis of:

 

 

a.       a more complete description of the facts relating to the activities necessary to permit the interception of the communications and the procedures to be used to obtain the information sought; and

b.      a different legal argument concerning how the method of interception is relevant to the jurisdiction of this Court.

 

[5]               After reading the material before the Court and hearing the evidence of the CSE witness and the submissions of counsel, I was satisfied that there were sufficient factual and legal grounds to distinguish the application from that before Mr. Justice Blanchard and issued the warrant for a term of three months. On April 6, 2009 I heard further submissions from counsel and on April 16, 2009 I extended the warrant for a further nine months. I deem it appropriate at this time to provide my reasons in writing for issuing the warrant based on the application before me.

 

Background:

 

[6]               The issues addressed by Justice Blanchard in the 2007 application had first been presented to Mr. Justice Simon Noël on an application filed in June, 2005 (CSIS-18-05). In those proceedings, Justice Noël had appointed Mr. Ronald Atkey, Q.C. to serve as amicus curiae. A preliminary issue arose as to whether the questions of law raised by the application could be dealt with in a public hearing. Upon receiving written and oral submissions on that issue, Justice Noël concluded that the application should be conducted in private. His comprehensive reasons for that decision have been made public: Re CSIS Act, 2008 FC 300. On August 23, 2006 a notice of discontinuance was filed in the matter by counsel for the Deputy Attorney General of Canada before a determination of the questions of law regarding the scope of the Court’s jurisdiction could be addressed.

 

[7]               The question of extraterritorial jurisdiction was then raised again in an application for warrants brought before Justice Blanchard in April, 2007. He was satisfied on the basis of the affidavit evidence that the prerequisites referred to in paragraphs 21(2)(a) and (b) of the Act had been established, that is that the facts relied on by the deponent to justify the belief on reasonable grounds that warrants were required to investigate threats to the security of Canada, that other investigative methods had been tried and failed, or were unlikely to succeed, and that important information regarding the threats would not otherwise be obtained. Accordingly, warrants were issued by Justice Blanchard at that time for execution within Canada.

 

[8]               At the time he issued the initial warrants in application SCRS-10-07, Justice Blanchard was not prepared to authorize investigative activities by the Service outside Canada, as requested, without further consideration. Accordingly, Mr. Atkey was again appointed to assist the Court as amicus curiae and Justice Blanchard received written and oral submissions from him and from counsel for the Deputy Attorney General of Canada. These submissions focused initially on two questions framed by the Court: whether CSIS has a mandate to undertake threat related investigations outside of Canada and second, whether the Federal Court has jurisdiction to issue warrants authorizing such investigations.

 

 

[9]               Additional questions were identified by Justice Blanchard following the release of the decision of the Supreme Court of Canada in R. v. Hape, 2007 SCC 26 respecting the application of the Canadian Charter of Rights and Freedoms, enacted as Schedule B to the Canada Act, 1982, (U.K.) 1982 c. 11, which came into force on April 17, 1982 ("the Charter") to investigations conducted abroad by Canadian authorities. Further submissions were received from the amicus and counsel on those questions.

 

[10]           In Hape, the Supreme Court affirmed the principles that legislation is presumed to conform to international law absent express statutory language to the contrary and that customary international law prohibited interference with the domestic affairs of other states. In that regard, paragraph 65 of the Hape decision is most instructive:

The Permanent Court of International Justice stated in the Lotus case, at pp. 18 to 19, that jurisdiction "cannot be exercised by a State outside its territory except by virtue of a permissive rule derived from international custom or from a convention". (…) According to the decision in the Lotus case, extraterritorial jurisdiction is governed by international law rather than being at the absolute discretion of individual states. While extraterritorial jurisdiction - prescriptive, enforcement or adjudicative - exists under international law, it is subject to strict limits under international law that are based on sovereign equality, non-intervention and the territoriality principle. According to the principle of non-intervention, states must refrain from exercising extraterritorial enforcement jurisdiction over matters in respect of which another state has, by virtue of territorial sovereignty, the authority to decide freely and autonomously (see the opinion of the International Court of Justice in the Military and Paramilitary Activities case, at p. 108). Consequently, it is a well-established principle that a state cannot act to enforce its laws within the territory of another state absent either the consent of the other state or, in exceptional cases, some other basis under international law. (...) This principle of consent is central to assertions of extraterritorial enforcement jurisdiction. [Emphasis added. Citations removed]

 

 

 

[11]           As described by Justice Blanchard at paragraphs 29-31 of his reasons, the Service took the position that the statutory scheme under the Act provides the necessary authority for the Court to issue a warrant having extraterritorial effect. They did not seek judicial authorization to violate foreign law but acknowledged that was the likely effect of the activities for which authorization was sought. The Amicus agreed with the Service that there is no territorial limitation on the activities of CSIS related to the collection, analysis and retention of information respecting threats to the security of Canada as set out in section 12 of the Act. Any application for a warrant under section 21 of the Act may extend to investigative activities of CSIS outside of Canada. However, in the submission of the Amicus, the Service could not execute a warrant obtained under section 21 and exercise its information gathering powers in another country unless it had obtained the permission of the country where the targets were located or was a party to a treaty or agreement covering the use of its powers in that country.

 

[12]           After a review of the Act and the principles of international law discussed by the Supreme Court in Hape, Justice Blanchard concluded that he was unable to construe the applicable provisions of the statute as providing the Court with the jurisdictional basis to issue a warrant for execution abroad.

 

[13]           Applying the modern principle of statutory interpretation adopted by the Supreme Court of Canada in Rizzo & Rizzo Shoes Ltd., [1998] 1 S.C.R. 27 at 41, Justice Blanchard found that the investigative powers sought in the application before him were not expressly authorized by the

 

statute. Among the factors Justice Blanchard considered, at paragraph 39 of his reasons, was the absence of any express territorial limitation in sections 12 and 21 of the Act. While this, he noted, might allow for an inference to be drawn in respect to a mandate for CSIS to conduct certain activities extraterritorially, that inference was not sufficiently obvious to provide a basis to conclude that the Service had a clear mandate to conduct the activities sought to be authorized in the warrant in countries other than Canada and that the Court has jurisdiction to authorize such activities.

 

[14]           In light of his conclusion that he was unable to attribute a plain, or sufficiently clear, meaning to the provisions to permit extraterritorial application, Justice Blanchard then considered additional factors to assist in interpreting the intent of the legislation. In the result, he concluded that the evidence was insufficient to permit an inference to be drawn that Parliament intended the Service to be provided with a mandate to conduct investigative activities in the nature of those contemplated in the warrant then sought to be authorized.

 

[15]           Justice Blanchard then proceeded to consider principles of international law. He found that the investigative activities for which authorization was sought would be likely to violate the laws of the jurisdictions where the warrant was to be executed. Absent the consent of the foreign states concerned to the application of Canadian law within their borders, the proposed investigative activities would breach their territorial sovereignty and violate customary international law.

 

[16]           Justice Blanchard considered whether the Criminal Code of Canada, R.S., 1985, c. C-46 (the "Criminal Code") and the Charter applied to the activities of CSIS agents conducting threat-

 

related investigations outside of Canada. This portion of his reasons was not strictly necessary to his decision as Justice Blanchard had determined the jurisdictional issue on the basis of statutory interpretation and international law principles.

 

[17]           The Service’s main contention in the application before Justice Blanchard was that the warrant sought was required to ensure that Canadian agents engaged in executing the warrant abroad do so in conformity with Canadian law since the impugned investigative activities may, absent the warrant, breach the Charter and contravene the Criminal Code. Section 26 of the CSIS Act provides that Part VI of the Criminal Code does not apply in relation to any interception of a communication under the authority of a warrant issued under section 21 of the Act. Absent this protection, Part VI would apply to the interception of any “private communication” as defined by section 183 of the Criminal Code that is any private communication where either the originator or the recipient was in Canada.

 

[18]           Justice Blanchard found that the principles set out in Hape with respect to investigative jurisdiction in the context of criminal matters applied equally to the collection of information in the intelligence context. He concluded that the Charter could not be applied to the activities of intelligence officers collecting information abroad absent the consent of the foreign state concerned.

 

[19]           I note that Madam Justice Anne MacTavish considered the application of the Charter in the distinct context of Canada's participation in the multinational military operation currently underway in Afghanistan in the case of Amnesty International Canada v. Canada (Canadian Forces), 2008 FC 336, aff’d 2008 FCA 401. Applying the Hape principles, and in the absence of consent by the government of Afghanistan to the operation of Canadian law in their territory, Justice MacTavish held that the Charter did not apply to non-Canadian individuals detained by the Canadian forces in that country and transferred to the Afghan authorities. Justice MacTavish observed, however, at paragraph 344 of her reasons that Canadian military personnel could face criminal prosecution under Canadian law for their actions in Afghanistan.

 

[20]           In the present matter, I was satisfied that a warrant was justified and that there were exigent circumstances with respect to the nature of the threat which required that it be issued on an urgent basis. When I dealt with the application on January 26, 2009 I considered whether it would be appropriate to appoint amicus curiae, as had been done by Justices Noël and Blanchard, to assist the Court with the jurisdictional question. Given the urgency of the situation laid before me and the facts and legal argument presented on behalf of the applicant, I determined that it would be inappropriate to delay the issuance of the warrant. Moreover, the question of whether extraterritorial warrant execution could be authorized had been thoroughly canvassed in the proceedings before Justice Blanchard.

 

Legislative Framework:

 

[21]           The relevant legislation is set out in Annex “A” to these reasons. In summary, section 12 of the Act outlines the Service’s mandate and provides that it shall collect, by investigation or otherwise, and analyse and retain information and intelligence respecting activities that may on reasonable grounds be suspected of constituting threats to the security of Canada. The service is required to advise and report to the government in respect of such activities.

 

[22]           A judge acting under section 21 of the Act has the jurisdiction to authorize CSIS to intercept communications and to obtain information and to carry out the activities necessary to achieve those purposes. Prerequisites are that CSIS is investigating a “threat to the security of Canada”; that there are reasonable grounds to believe that a warrant is required; and that without the warrant, information of importance will not be obtained. 

 

[23]           “Threats to the security of Canada” are defined at section 2 as including “activities within or relating to Canada directed toward or in support of the threat”. [Emphasis added]

 

[24]           Under paragraph 21(2) (f) of the Act, an application for a warrant must also include a general description of the place where the warrant is proposed to be executed, if a general description of that place can be given.

 

[25]           The Act defines “intercept” in section 2 as having the same meaning given that term in section 183 of the Criminal Code, which includes to “listen to, record or acquire a communication or acquire the substance, meaning or purport thereof”. As set out in section 26 of the Act, Part VI of the Criminal Code does not otherwise apply to interceptions made pursuant to a warrant issued under the Act.

 

 

 

Issue:

 

[26]           In essence, the argument put forward by the applicant is that this Court has jurisdiction under section 21 of the Act to issue warrants to ensure judicial control over activities by government officials in Canada in relation to an investigation that will extend beyond Canadian borders. The applicant concedes that the acts for which authorization is sought may violate the Criminal Code or the constitutional rights of individuals if not judicially approved.

 

[27]           The issue to be determined is whether the Court has jurisdiction to authorize acts by CSIS in this country which entail listening to communications and collecting information obtained from abroad.

 

The Applicant’s Case:

 

[28]           In the application before me authorization is sought for two types of activities: the interception of communications; and the seizure of information xxxxxxxxxxxxxxxxxxxxxxxxxx. If granted, CSIS proposes to enlist the assistance of the CSE under paragraph 24(b) of the Act. Paragraph 24(b) provides that a warrant issued under section 21 may authorize any other person to assist a person acting in accordance with the warrant. With that assistance, CSIS proposes to intercept the following types of communications:

a.       communications carried over xxxx xxxxxxxxxx xxxx xxx xx xxxxxxxxxxx xx x xxxxxxx   

b.      communications that xxxxx xx xxxx xxxxxx xxxxxxx xxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxx xxxxxx xxxxxxx xxx xxxxxxxxxxxx xxx xxxxxxx xxxxxx

c.       communications that xx xxxxxxxxxxxxxxx  xx xxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxx

xxx    xxxxxxxx

 

[29]           In addition to these communications, authorization is sought to obtain information xxxx

Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

 

[30]           The applicant submits that the acts necessary to permit the interception of communications and to obtain information xxxx xxxxxxxx xxxxxxx, with the technical assistance of CSE, will take place entirely in Canada. The communications will be heard, or the information obtained xxxx xxxxxxxxx will be read, only in Canada.

 

[31]           CSE’s mandate is set out in the National Defence Act, R.S.C. 1985, c. N-5, as amended by the Anti-terrorism Act, S.C. 2001, c. 41. Under paragraph 273.64(1)(a) of this statute, the agency is authorized to acquire and use information from the global information infrastructure (i.e., communications systems, information technology systems and networks) for the purpose of providing foreign intelligence to the government of Canada. CSE is prohibited under paragraph 273.64(2)(a) from directing these activities at Canadian citizens and permanent residents wherever located (“Canadian persons”) or at any person in Canada regardless of nationality.

 

[32]           The limitation respecting Canadians persons or persons in Canada does not apply to technical and operational assistance which CSE may provide to federal law-enforcement and security agencies in the performance of their lawful duties pursuant to paragraph 273.64(1)(c) of the National Defence Act. Subsection 273.64(3) of this statute provides that such assistance activities are subject to any limitations imposed by law on the federal agencies in the performance of their duties.

 

[33]           In the context of the present application, therefore, CSE may only assist CSIS to intercept communications and obtain information if CSIS has a judicially authorized warrant issued under section 21 of the Act.

 

[34]           The evidence received from a CSE witness on January 26, 2009 described the agency's interception capabilities xxx xxx xxxxx xx xxxxx xxxxxxxxxx xxxxxxxx xxxxxxxxxx xxxxxxxxxx xxxxx xxxx xxxxxxxx xxxxxxxxxxxxxx x xxxx…. The evidence was that the proposed interceptions of communications would be controlled from within Canada xxxxxxxx xxxxx xxxxx

Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.

 

[35]           Telecommunications that can be intercepted or obtained by CSE from within Canada xxx xxxxxxxxx xx xxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.

Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.

 

[36]           xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx every activity that affects the ability to intercept will take place in Canada. In those circumstances, counsel for the Deputy Attorney General submits, no issue of this Court’s jurisdiction to issue the warrant arises.

 

[37]           xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx        xxxxx        xxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxx xxxxxxxxxxxxxxxx xxx xxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx                             xxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxs. The applicant’s position is that xxxxxxxx communications would be intercepted, within the meaning of the statute, solely where they would be listened to, that is within Canada.

 

 

[38]           xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxx xxxxxxxxxxxxxxxxxxxxx             xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx. Information found xxxxxxxx

xxxxxxxxxxxxx would only be “seized” where it would be first read, in Canada.

 

 

[39]           Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxx

 

[40]           The applicant submits that the matter of where a warrant is to be executed depends on where the telecommunications will be intercepted and the information obtained. What is sought from the Court in this instance, it is submitted, is not a warrant that authorizes activities abroad but one which authorizes investigative activities to be conducted in Canada which will allow for communications to be listened to and information obtained from Canada.  

 

[41]           xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

 

Analysis:

 

Interception of Communications:

 

[42]           In considering this application, in addition to the evidence and submissions received, I had the benefit of being able to review Justice Blanchard's decision in its expurgated and non-expurgated forms and the content of the application that was before him. At paragraphs 14 through 16 of his reasons for decision, Justice Blanchard describes the nature of the warrant powers sought. Authorization was requested to intercept telecommunications, to obtain information or records relating to the targets xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxx

 

 

 

[43]           The 2007 warrant application before Justice Blanchard sought authority to install, maintain or remove anything required xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxx. It is clear from the warrant application itself and from Justice Blanchard's reasons that this was intended to include the authority to xxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxx xxxxxxxx in the foreign jurisdictions in order to install the means by which the communications, information and records xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx.

 

[44]           The draft of the warrant submitted for approval before me differed from that which was before Justice Blanchard in several significant respects. xxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx. The proposed authority to intercept at any place outside Canada where the telecommunication could be intercepted was removed. The authorities to install, maintain or remove anything required to intercept or obtain information and to obtain access to, search for, examine and record the information were limited to “from Canada”.

 

[45]           In my view, all of the activities for which authorization of the interception of telecommunications is sought would come within the broad meaning of the term “intercept” as defined in the Act by reference to the Criminal Code definition. The Service seeks to listen to, record or acquire communications between the places of their origination and the places of

 

destination. Such activities constitute an “intercept” as interpreted by jurisprudence in relation to the Criminal Code definition: R. v. McQueen, (1975), 25 C.C.C. (2d) 262 (Alta. C.A.); R. v. Giles, 2007 BCSC 1147.

 

[46]           The request to authorize the interception of communications xxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx presented little difficulty in my view as the warrant would be executed xxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx within Canada. There is no geographical limitation in the CSIS Act that restricts the interception of communications to those which either originate or are intended to be received in Canada such as there is under Part VI of the Criminal Code. Absent such a geographical requirement, there would seem to be no statutory impediment to the interception of such communications under the CSIS Act and indeed, such warrants have been previously issued by this Court. Again, I would note that Part VI of the Criminal Code does not apply to any interception under the CSIS Act nor in relation to any communication so intercepted.

 

[47]           The interception of communications which are being transmitted xxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxx would also appear to present little difficulty from a jurisdictional perspective so long as the signals are intercepted from within Canada. xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxx

 

[48]           Of greater concern are the proposed powers to intercept and xxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxx seize information that may have an extraterritorial impact. [underlined words added for clarity in the redacted version].

 

[49]           xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx. This gives rise to a concern about where the communication is intercepted within the meaning of the statute. If the location of the intercept must be construed as occurring abroad, the Court, applying the principles set out in Justice Blanchard’s decision, would have no jurisdiction to issue a warrant authorizing such activities.

 

[50]           In the context of Part VI Criminal Code authorizations, the place of land-line interceptions, and accordingly the jurisdiction to authorize these interceptions, is usually considered to be synonymous with the place where the subject phone is located even if the actual intercept takes place at a phone company switching station some distance away. With the advent of mobile phone technology, that has proven to be problematic in light of the constant switching of the communication between transmission cells as the phone is moved from location to location.

 

 

 

[51]           In R. v. Taylor, [1997] B.C.J. No. 346, the British Columbia Court of Appeal reversed a trial judge’s decision that a cellular communication had been unlawfully intercepted at a solicitor’s office, contrary to the terms of the authorization. The Court of Appeal held that, properly construed, the interception had taken place not at the solicitor’s office but at the distribution centre for cellular calls where the calls had been acquired and recorded. The Court adopted the reasoning of the Quebec Court of Appeal in R. v. Taillefer and Duguay (1995), 100 C.C.C. (3d) 1 to the effect that the place where a call originates (or is received) should not be confused with the location authorized for its interception. The Supreme Court of Canada affirmed the decision in Taylor without providing additional reasons: [1998] 1 S.C.R. 26. 

 

[52]           In the present context, the interceptions for which authorization is granted will take place at the locations within Canada where the calls will be acquired, listened to and recorded.

 

[53]           While there appears to be no Canadian jurisprudence directly on point, counsel for the Deputy Attorney General of Canada has directed my attention to a number of American decisions in which it has been held by US Courts of Appeal that a judge has the jurisdiction to authorize the interception of communications where the first location at which the communication will be listened to is within the judge’s territorial jurisdiction: U.S. v. Denman, 100 F 3d 399 (5th Cir., 1996); U.S . v. Rodriguez, 968 F 2d 130 (2d Cir. 1992); U.S. v. Luong, 471 F 3d 1107 (9th Cir., 2006); U.S. v. Ramirez, 112 F 3d 849 (7th Cir. 1997) U.S. v. Jackson, 471 F 3d 910 (7th Cir., 2000); U.S. v. Tavarez, 40 F 3d 1136 (10th Cir. 1994); People v. Perez, 848 N.Y.S. 2d 525 (N.Y. Supreme Ct.) contra, Castillo v. Texas 810 S.W. 2d 180 (Texas Ct. Crim. App. 1990).

 

[54]           The U.S. Congress regulates electronic surveillance under Title III of the Omnibus Crime Control and Safe Streets Act, 18 U.S.C. 2510. Under that statute “intercept” is defined very similarly to the definition in Part VI of the Criminal Code of Canada. It means the “aural or other acquisition of the contents of any wire, electronic or oral telecommunications through the use of any electronic, mechanical or other device”. Under the U.S. federal legislation, intercepts may only be authorized within the territorial jurisdiction of the Court in which the judge is sitting (18 U.S.C. 2518 (3)). U.S. states have adopted similar jurisdictional requirements.

 

[55]           U.S. Circuit Courts of Appeal that have considered the matter have interpreted “interception” as used in Title III to include both the place where the telephones which are the subject of judicial warrants are located and the place where the communications are first heard by law enforcement officers/officials.

 

[56]           xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxx the interception must also be considered to occur at the place where the xxxxxxxx contents are first heard. In Denman, above, the Court found that the interception occurs in both the location where the signal is acquired and that in which it is first listened to and judges in both locations have jurisdiction.

 

 

[57]           The Texas Court of Criminal Appeal reached a different conclusion in Castillo. In that case, the majority of the Court of Criminal Appeal was concerned about the risk of “judge shopping” if a broader interpretation were to be recognized. They found that the state legislature had deliberately and expressly enacted a “territorial restriction” which limited the jurisdiction to authorize interception to the particular district in which the listening device was located. In Perez, the Supreme Court of New York considered that the risk of forum shopping was not a significant concern and followed the federal authorities.

 

[58]           The reasoning in xxxxxxxxxxxx the xxxx U.S. Circuit Courts of Appeal decisions is persuasive. The interception of private communications under Canadian law requires more than just the technical acquisition of the signal bearing the communication. There must be a listening to or other form of acquisition of the substantive content of the communication. The fact that a telecommunication may be xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx does not preclude the issuance of an authorization to intercept the communication within Canada.

 

[59]           In authorizing CSIS, with the technical assistance of CSE, to collect information xxxx xxxxxxxxxxxxxxxxxxxxxxxxx intercepted in Canada, I am not authorizing CSE to overstep its legislative mandate under the National Defence Actxxxxxxxxxxxxxxxxxxxx CSE will not be directing its activities at Canadian citizens to acquire information for its purposes but assisting CSIS.   The question before me is whether the Court may authorize CSIS to listen to and record the

 

communications at a location within Canada xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx. Having considered the matter, I am satisfied that the Court has the jurisdiction to issue such a warrant.

 

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx:

 

[60]           The applicant submits that,  xxxxxxxxxxxxxxxxxxxxxxxxxxxx, the jurisdictional requirements for the issuance of a warrant under section 21 are satisfied where the authorization sought is to obtain information from within Canada. I agree.  However, the question of whether the Court may authorize the Service to xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx involves additional considerations.

 

[61]           Section 21 of the Act empowers a designated judge to authorize CSIS to intercept any communication or obtain any information, record, document or thing. xxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

 

[62]           xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

 

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

 

[63]           xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx   xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

 

[64]           xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx xxxxxxxxxxx A seizure, within Canada, of information in which the holder has a reasonable expectation of privacy invokes section 8 of the Charter. In the present case, there are ample grounds for interfering with the privacy interests of the individuals concerned and no issue arises as to whether the collection of the information would breach their Charter rights to protection against unreasonable search and seizure.  The question is whether the Court may authorize such action in Canada knowing that the collection of such information in a foreign country may violate that state’s territorial sovereignty.

 

 

 

[65]           In CSIS (Re), above at paragraph 54, Justice Blanchard held that “no other basis under international law" had been put before him to warrant displacing the principles of sovereign equality, non-intervention and territoriality. CSIS had argued that customary international practice as it relates to intelligence gathering operations in a foreign state constituted an exception to principles of territorial sovereignty. I would observe again that the application before Justice Blanchard contemplated intrusive activities in foreign jurisdictions xxxxxxxxxxxxxxxxxxxx that are not being sought in the present application.  Subsequent to the decision of Mr. Justice Blanchard, the Federal Court of Appeal has observed that information may notionally reside in more than one place: see eBay Canada Limited et al v. Minister of National Revenue, 2008 FCA 348.

 

[66]           I am satisfied that there are sufficient factual and legal grounds to distinguish this application from that which was before Justice Blanchard. What has been proposed in the present warrant does not, in my view, constitute the enforcement of Canada’s laws abroad but rather the exercise of jurisdiction here relating to the protection of Canada’s security.

 

[67]           The question of whether international comity precludes the use of investigative measures having an extraterritorial effect arises most frequently in criminal matters. This is the area in which most disputes have arisen as it goes to the core of the jurisdictional competence implied in state sovereignty: John H. Currie, Public International Law (Toronto, Irwin Law 2008) at p. 332 et seq. Criminal investigation was the context in which the Supreme Court made the statement in paragraph 65 of Hape, quoted above,  that “… a state cannot act to enforce its laws within the territory of another state absent either the consent of the other state or, in exceptional cases, some other basis under international law.”  

 

[68]           An example of international comity in criminal matters can be found in the development of the Convention on Cybercrime,, C.E.T.S. 185  opened for signature by the Council of Europe on 23 November 2001 and brought into force on July 1, 2004. Canada participated in the development of the Convention and has signed but not as yet ratified the instrument.

 

[69]           The Convention responds to new forms of criminal conduct which arose with the growth of the Internet. Police agencies found they were frustrated by their inability to investigate foreign-based attacks on domestic computer systems. In some cases, the police resorted to cross-border computer searches to obtain evidence to support a domestic prosecution or a request for extradition. Such actions are perceived to violate the territorial sovereignty of the country where the data is located, absent consent: see Stephan Wilskie, International Jurisdiction in Cyberspace: Which States may Regulate the Internet? 50 Fed Commun L J 117.   

 

[70]           The object of the Convention is to promote effective means for dealing with cybercrime. It provides for the criminalization of certain offences relating to computers, procedural powers to investigate and prosecute such crimes, expedited preservation and disclosure of stored computer data, and mutual legal assistance. Trans-border access to stored computer data is permitted with consent or where the data is publicly available (Article 32).

 

 

 

[71]           Canada has yet to ratify the Convention in part because the legislation required for the domestic implementation of the data preservation and disclosure measures has not been enacted due to concerns expressed about their potential impact on privacy interests: see for example http://www.cippic.ca/projects-cases-lawful-access/.   

 

[72]           It is clear from the Explanatory Report adopted with the Convention (available on-line at http://conventions.coe.int/Treaty/en/Reports/Html/185.htm) that the multilateral agreement is not intended to affect measures taken by the subscribing parties to protect their national security (paras. 38 and 58). However, the Convention does not provide a means by which information may be collected abroad for national security purposes. Its focus is on the criminal misuse of computer systems.

 

[73]           As the facts of the present application disclose, individuals who pose a threat to the security of Canada may move easily and rapidly from one country to another and maintain lines of communication with others of like mind. Information which may be crucial to prevent or disrupt the threats may be unavailable to the security agencies of this country if they lack the means to follow those lines of communication.

 

[74]           The norms of territorial sovereignty do not preclude the collection of information by one nation in the territory of another country, in contrast to the exercise of its enforcement jurisdiction. As Professor Jack Goldsmith argues in The Internet and the Legitimacy of Remote Cross-Border Searches, 2001 U. Chi. Legal F. 103, technological innovation has simply made it easier to do this without physically crossing borders.

 

[75]           Canada has given CSE a mandate to collect foreign intelligence including information from communications and information technology systems and networks abroad. It is restricted as a matter of legislative policy from directing its activities against Canadians or at any person within Canada, but it is not constrained from providing assistance to security and law enforcement agencies acting under lawful authority such as a judicial warrant. CSIS is authorized to collect threat-related information about Canadian persons and others and, as discussed above, is not subject to a territorial limitation.

 

[76]           Where the statutory prerequisites of a warrant are met, including prior judicial review, reasonable grounds and particularization of the targets, the collection of the information by CSIS with CSE assistance, as proposed, falls within the legislative scheme approved by Parliament and does not offend the Charter.

 

[77]           In concluding, I would note that American courts have held that the collection of intelligence respecting the communications of U.S. citizens who are travelling abroad falls outside the protection afforded by the U.S. Constitution’s Fourth Amendment warrant requirement: In re Sealed Case, (2002) 310 F.3d 717 (FISC); In Re Directives [Redacted Text] Pursuant to Section 105B of the Foreign Intelligence Surveillance Act; August 22, 2008, released in redacted form on January 16, 2009 (FISCR). Given the concern for the interests of Canadian persons evidenced by

 

Parliament, it is preferable that such activities be authorized with prior judicial scrutiny as in this case.

“Richard G. Mosley”

Judge


 

 

ANNEX "A"

 

 

Canadian Security Intelligence

Service Act

Loi sur le service canadien du renseignement de sécurité

Definitions

 

2. In this Act,

 

 

“intercept”

« intercepter »

 

“intercept” has the same meaning as in section 183 of the Criminal Code;

 

“threats to the security of Canada”

« menaces envers la sécurité du Canada »

 

“threats to the security of Canada” means

 

(a) espionage or sabotage that is against

Canada or is detrimental to the interests of

Canada or activities directed toward or in

support of such espionage or sabotage,

 

(b) foreign influenced activities within or relating to Canada that are detrimental to the interests of Canada and are clandestine or deceptive or involve a threat to any person,

 

(c) activities within or relating to Canada directed toward or in support of the threat or use of acts of serious violence against persons or property for the purpose of achieving a political, religious or ideological objective within Canada or a foreign state, and

 

(d) activities directed toward undermining

 

 

 

by covert unlawful acts, or directed toward or intended ultimately to lead to the destruction or overthrow by violence of, the constitutionally established system of government in Canada,

 

but does not include lawful advocacy, protest or dissent, unless carried on in conjunction with any of the activities referred to in paragraphs (a) to (d).

Définitions

 

2. Les définitions qui suivent s’appliquent à la présente loi.

 

« intercepter »

“intercept”


« intercepter » S’entend au sens de l’article 183 du Code criminel.

« menaces envers la sécurité du Canada »

“threats to the security of Canada”

 

« menaces envers la sécurité du Canada » Constituent des menaces envers la sécurité du Canada les activités suivantes :

 

a) l’espionnage ou le sabotage visant le

Canada ou préjudiciables à ses intérêts, ainsi que les activités tendant à favoriser ce genre d’espionnage ou de sabotage;

 

b) les activités influencées par l’étranger qui touchent le Canada ou s’y déroulent et sont préjudiciables à ses intérêts, et qui sont d’une nature clandestine ou trompeuse ou comportent des menaces envers quiconque;

 

c) les activités qui touchent le Canada ou s’y déroulent et visent à favoriser l’usage de la violence grave ou de menaces de violence contre des personnes ou des biens dans le but d’atteindre un objectif politique, religieux ou idéologique au Canada ou dans un État étranger;

 

 

d) les activités qui, par des actions cachées et illicites, visent à saper le régime de gouvernement constitutionnellement établi au Canada ou dont le but immédiat ou ultime est sa destruction ou son renversement, par la violence.

 

La présente définition ne vise toutefois pas les activités licites de défense d’une cause, de protestation ou de manifestation d’un désaccord qui n’ont aucun lien avec les activités mentionnées aux alinéas a) à d).

 

Collection, analysis and retention

 

12. The Service shall collect, by investigation or otherwise, to the extent that it is strictly necessary, and analyse and retain information and intelligence respecting activities that may on reasonable grounds be suspected of constituting threats to the security of Canada and, in relation thereto, shall report to and advise the Government of Canada.

Informations et renseignements

 

12. Le Service recueille, au moyen d’enquêtes ou autrement, dans la mesure strictement nécessaire, et analyse et conserve les informations et renseignements sur les activités dont il existe des motifs raisonnables de soupçonner qu’elles constituent des menaces envers la sécurité du Canada; il en fait rapport au gouvernement du Canada et le conseille à cet égard.

 

Application for warrant

 

21. (1) Where the Director or any employee designated by the Minister for the purpose believes, on reasonable grounds, that a warrant under this section is required to enable the Service to investigate a threat to the security of Canada or to perform its duties and functions under section 16, the Director or employee may, after having obtained the approval of the Minister, make an application in accordance with subsection (2) to a judge for a warrant under this section.

 

 

 

 

 

 

Matters to be specified in application for warrant


(2) An application to a judge under subsection (1) shall be made in writing and be accompanied by an affidavit of the applicant deposing to the following matters, namely,

 

(a) the facts relied on to justify the belief, on reasonable grounds, that a warrant under this section is required to enable the Service to investigate a threat to the security of Canada or to perform its duties and functions under section 16;

 

(b) that other investigative procedures have

been tried and have failed or why it appears that they are unlikely to succeed, that the urgency of the matter is such that it would be impractical to carry out the investigation using only other investigative procedures or that without a warrant under this section it is likely that information of importance with respect to the threat to the security of Canada or the performance of the duties and functions under section 16 referred to in paragraph (a) would not be obtained;

 

(c) the type of communication proposed to

be intercepted, the type of information, records, documents or things proposed to be obtained and the powers referred to in paragraphs (3)(a) to (c) proposed to be exercised for that purpose;

 

(d) the identity of the person, if known,

whose communication is proposed to be intercepted or who has possession of the information, record, document or thing proposed to be obtained;

 

 

 

 

 

(e) the persons or classes of persons to

whom the warrant is proposed to be directed;

 

(f) a general description of the place where the warrant is proposed to be executed, if a general description of that place can be given;

 

(g) the period, not exceeding sixty days or one year, as the case may be, for which the warrant is requested to be in force that is applicable by virtue of subsection (5); and

 

(h) any previous application made in relation to a person identified in the affidavit pursuant to paragraph (d), the date on which the application was made, the name of the judge to whom each application was made and the decision of the judge thereon.

 

Issuance of warrant


(3) Notwithstanding any other law but subject to the Statistics Act, where the judge to whom an application under subsection (1) is made is satisfied of the matters referred to in paragraphs (2)(a) and (b) set out in the affidavit accompanying the application, the judge may issue a warrant authorizing the persons to whom it is directed to intercept any communication or obtain any information, record, document or thing and, for that purpose,

 

(a) to enter any place or open or obtain access to any thing;

 

(b) to search for, remove or return, or examine, take extracts from or make copies of or record in any other manner the

 

 

 

 

 

information, record, document or thing; or

 

 

(c) to install, maintain or remove any thing.

 

 

 

 

 

Matters to be specified in warrant

 

(4) There shall be specified in a warrant issued under subsection (3)

 

(a) the type of communication authorized to be intercepted, the type of information, records, documents or things authorized to be obtained and the powers referred to in paragraphs (3)(a) to (c) authorized to be exercised for that purpose;

 

(b) the identity of the person, if known, whose communication is to be intercepted or who has possession of the information, record, document or thing to be obtained;

 

(c) the persons or classes of persons to whom the warrant is directed;

 

(d) a general description of the place where the warrant may be executed, if a general description of that place can be given;

 

(e) the period for which the warrant is in force; and

 

(f) such terms and conditions as the judge considers advisable in the public interest.

 

Maximum duration of warrant

 

(5) A warrant shall not be issued under subsection (3) for a period exceeding

 

 

 

(a) sixty days where the warrant is issued to enable the Service to investigate a threat to the security of Canada within the meaning of paragraph (d) of the definition of that expression in section 2; or

 

(b) one year in any other case.

Demande de mandat

 

21. (1) Le directeur ou un employé désigné

à cette fin par le ministre peut, après avoir obtenu l’approbation du ministre, demander à un juge de décerner un mandat en conformité avec le présent article s’il a des motifs raisonnables de croire que le mandat est nécessaire pour permettre au Service de faire enquête sur des menaces envers la sécurité du Canada ou d’exercer les fonctions qui lui sont conférées en vertu de l’article 16.

 

 

 

 

 

 

 

Contenu de la demande

 

 

(2) La demande visée au paragraphe (1) est

présentée par écrit et accompagnée de l’affidavit du demandeur portant sur les points suivants :

 

a) les faits sur lesquels le demandeur s’appuie pour avoir des motifs raisonnables de croire que le mandat est nécessaire aux fins visées au paragraphe (1);

 

b) le fait que d’autres méthodes d’enquête ont été essayées en vain, ou la raison pour laquelle elles semblent avoir peu de chances de succès, le fait que l’urgence de l’affaire est telle qu’il serait très difficile de mener l’enquête sans mandat ou le fait que, sans mandat, il est probable que des informations importantes concernant les menaces ou les fonctions visées au paragraphe (1) ne pourraient être acquises;

 

c) les catégories de communications dont l’interception, les catégories d’informations, de documents ou d’objets dont l’acquisition, ou les pouvoirs visés aux alinéas (3)a) à c) dont l’exercice, sont à autoriser;

 

d) l’identité de la personne, si elle est connue, dont les communications sont à intercepter ou qui est en possession des informations, documents ou objets à acquérir;

 

e) les personnes ou catégories de personnes destinataires du mandat demandé;

 

f) si possible, une description générale du lieu où le mandat demandé est à exécuter;

 

 

 

 

 

g) la durée de validité applicable en vertu du paragraphe (5), de soixante jours ou d’un an au maximum, selon le cas, demandée pour le mandat;

 

h) la mention des demandes antérieures touchant des personnes visées à l’alinéa d), la date de chacune de ces demandes, le nom du juge à qui elles ont été présentées et la décision de celui-ci dans chaque cas.

 

 

 

 

 

 

 

 

 

 

 

Délivrance du mandat

 

(3) Par dérogation à toute autre règle de

droit mais sous réserve de la Loi sur la statistique, le juge à qui est présentée la demande visée au paragraphe (1) peut décerner le mandat s’il est convaincu de l’existence des faits mentionnés aux alinéas (2)a) et b) et dans l’affidavit qui accompagne la demande; le mandat autorise ses destinataires à intercepter des communications ou à acquérir des informations, documents ou objets. À cette fin, il peut autoriser aussi, de leur part :

 

a) l’accès à un lieu ou un objet ou l’ouverture d’un objet;

 

b) la recherche, l’enlèvement ou la remise en place de tout document ou objet, leur

 

 

 

 

 

examen, le prélèvement des informations qui s’y trouvent, ainsi que leur enregistrement et l’établissement de copies ou d’extraits par tout procédé;

 

c) l’installation, l’entretien et l’enlèvement d’objets.

 

 

Contenu du mandat

 

(4) Le mandat décerné en vertu du paragraphe (3) porte les indications suivantes :

 

a) les catégories de communications dont l’interception, les catégories d’informations, de documents ou d’objets dont l’acquisition, ou les pouvoirs visés aux alinéas (3)a) à c) dont l’exercice, sont autorisés;

 

b) l’identité de la personne, si elle est connue, dont les communications sont à intercepter ou qui est en possession des informations, documents ou objets à acquérir;

 

c) les personnes ou catégories de personnes destinataires du mandat;

 

d) si possible, une description générale du lieu où le mandat peut être exécuté;

 

e) la durée de validité du mandat;

 

f) les conditions que le juge estime indiquées dans l’intérêt public.

 

 

Durée maximale

 

(5) Il ne peut être décerné de mandat en vertu du paragraphe (3) que pour une période maximale :

 

 

a) de soixante jours, lorsque le mandat est décerné pour permettre au Service de faire

enquête sur des menaces envers la sécurité

du Canada au sens de l’alinéa d) de la définition de telles menaces contenue à l’article 2;

 

b) d’un an, dans tout autre cas.

 

Warrant to have effect notwithstanding other laws

 

24. Notwithstanding any other law, a warrant issued under section 21 or 23

 

(a) authorizes every person or person included in a class of persons to whom the warrant is directed,

 

(i) in the case of a warrant issued under section 21, to exercise the powers specified in the warrant for the purpose of intercepting communications of the type specified therein or obtaining information, records, documents or things of the type specified therein, or

 

(ii) in the case of a warrant issued under section 23, to execute the warrant; and

 

(b) authorizes any other person to assist a person who that other person believes on reasonable grounds is acting in accordance with such a warrant.

 

Primauté des mandats

 

 

24. Par dérogation à toute autre règle de

droit, le mandat décerné en vertu des articles 21 ou 23 :

 

a) autorise ses destinataires, en tant que tels ou au titre de leur appartenance à une catégorie donnée :

 

(i) dans le cas d’un mandat décerné en vertu de l’article 21, à employer les moyens qui y sont indiqués pour effectuer l’interception ou l’acquisition qui y est indiquée,

 

(ii) dans le cas d’un mandat décerné en vertu de l’article 23, à exécuter le mandat;

 

b) autorise quiconque à prêter assistance à une personne qu’il a des motifs raisonnables de croire habilitée par le mandat.

 

 

 

 

Criminal Code of Canada

Code criminel du Canada

 

Definitions

 

183. In this Part,

 

 

“intercept”

« intercepter »

 

“intercept” includes listen to, record or acquire a communication or acquire the substance, meaning or purport thereof;

 

 

 

“private communication”

« communication privée »

 

“private communication” means any oral communication, or any telecommunication, that is made by an originator who is in Canada or is intended by the originator to be received by a person who is in Canada and that is made under circumstances in which it is reasonable for the originator to expect that it will not be intercepted by any person other than the person intended by the originator to receive it, and includes any radio-based telephone communication that is treated electronically or otherwise for the purpose of preventing intelligible reception by any person other than the person intended by the originator to receive it;

Définitions

 

183. Les définitions qui suivent s’appliquent à la présente partie.

 

« intercepter »

“intercept”

 

« intercepter »S’entend notamment du fait d’écouter, d’enregistrer ou de prendre volontairement connaissance d’une communication ou de sa substance, son sens ou son objet.

 

« communication privée »

“private communication”

 

« communication privée » Communication orale ou télécommunication dont l’auteur se trouve au Canada, ou destinée par celui ci à une personne qui s’y trouve, et qui est faite dans des circonstances telles que son auteur peut raisonnablement s’attendre à ce qu’elle ne soit pas interceptée par un tiers. La présente définition vise également la communication radiotéléphonique traitée électroniquement ou autrement en vue d’empêcher sa réception en clair par une personne autre que celle à laquelle son auteur la destine.

 

 

 

 

 

 

 

 

 

 

 

 

National Defence Act

Loi sur la défense nationale

 

Mandate

 

273.64 (1) The mandate of the Communications Security Establishment is

 

(a) to acquire and use information from the

global information infrastructure for the purpose of providing foreign intelligence, in accordance with Government of Canada intelligence priorities;

 

(b) to provide advice, guidance and services to help ensure the protection of electronic information and of information infrastructures of importance to the Government of Canada; and

 

(c) to provide technical and operational assistance to federal law enforcement and security agencies in the performance of their lawful duties.

 

 

 

 

Protection of Canadians

 

(2) Activities carried out under paragraphs (1)(a) and (b)

 

(a) shall not be directed at Canadians or any person in Canada; and

 

(b) shall be subject to measures to protect the privacy of Canadians in the use and retention of intercepted information.

 

 

 

 

 

 

 

 

Limitations imposed by law

 

(3) Activities carried out under paragraph

(1)(c) are subject to any limitations imposed by law on federal law enforcement and security agencies in the performance of their duties.

Mandat

 

273.64 (1) Le mandat du Centre de la sécurité des télécommunications est le suivant :

 

a) acquérir et utiliser l’information provenant de l’infrastructure mondiale d’information dans le but de fournir des renseignements étrangers, en conformité avec les priorités du gouvernement du Canada en matière de renseignement;

 

b) fournir des avis, des conseils et des services pour aider à protéger les renseignements électroniques et les infrastructures d’information importantes pour le gouvernement du Canada;

 

c) fournir une assistance technique et opérationnelle aux organismes fédéraux chargés de l’application de la loi et de la sécurité, dans l’exercice des fonctions que la loi leur confère.

 

Protection des Canadiens

 

(2) Les activités mentionnées aux alinéas (1)a) ou b) :

 

a) ne peuvent viser des Canadiens ou toute personne au Canada;

 

b) doivent être soumises à des mesures de protection de la vie privée des Canadiens lors de l’utilisation et de la conservation des renseignements interceptés.

 

 

 

 

 

 

 

Limites

 

(3) Les activités mentionnées à l’alinéa (1)c) sont assujetties aux limites que la loi impose à l’exercice des fonctions des organismes fédéraux en question.

 

 

 

Convention on Cybercrime

 

Convention sur la cybercriminalité

Preamble

 

The member States of the Council of Europe and the other States signatory hereto,

 

Considering that the aim of the Council of Europe is to achieve a greater unity between its members;

 

Recognising the value of fostering co operation with the other States parties to this Convention;

 

Convinced of the need to pursue, as a matter of priority, a common criminal policy aimed at the protection of society against cybercrime, inter alia, by adopting appropriate legislation and fostering international co-operation;

 

 

Conscious of the profound changes brought about by the digitalisation, convergence and continuing globalisation of computer networks;

 

Concerned by the risk that computer networks and electronic information may also be used for committing criminal offences and that evidence relating to such offences may be stored and transferred by these networks;

 

 

 

Recognising the need for co-operation between States and private industry in combating cybercrime and the need to protect legitimate interests in the use and development of information technologies;

 

 

 

Believing that an effective fight against cybercrime requires increased, rapid and well-functioning international co-operation in criminal matters;

 

(…)

 

Chapter II – Measures to be taken at the national level

 

Section 1 – Substantive criminal law

 

Title 1 – Offences against the confidentiality, integrity

and availability of computer data and systems

 

Article 2 – Illegal access

 

Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the access to the whole or any part of a computer system without right. A Party may require that the offence be committed by infringing security measures, with the intent of obtaining computer data or other dishonest intent, or in relation to a computer system that is connected to another computer system.

 

 

 

 

 

 

 

Article 3 – Illegal interception

 

Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the interception without right, made by technical means, of non-public transmissions of computer data to, from or within a computer system, including electromagnetic emissions from a computer system carrying such computer data. A Party may require that the offence be committed with dishonest intent, or in relation to a computer system that is connected to another computer system.

 

 

 

 

Article 4 – Data interference

 

 

1    Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law, when committed intentionally, the damaging, deletion, deterioration, alteration or suppression of computer data without right.

 

2    A Party may reserve the right to require that the conduct described in paragraph 1 result in serious harm.

 

 

Article 5 – System interference

 

 

Each Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its

 

 

 

 

domestic law, when committed intentionally, the serious hindering without right of the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data.

 

 

Article 32 – Trans-border access to stored computer data with consent or where publicly available

 

A Party may, without the authorisation of another Party:

 

a    access publicly available (open source) stored computer data, regardless of where the data is located geographically; or

 

 

b    access or receive, through a computer system in its territory, stored computer data located in another Party, if the Party obtains the lawful and voluntary consent of the person who has the lawful authority to disclose the data to the Party through that computer system.

Préambule

 

Les Etats membres du Conseil de l'Europe et les autres Etats signataires,

 

 

Considérant que le but du Conseil de l'Europe est de réaliser une union plus étroite entre ses membres;

 

Reconnaissant l'intérêt d'intensifier la coopération avec les autres Etats parties à la Convention;

 

Convaincus de la nécessité de mener, en priorité, une politique pénale commune destinée à protéger la société de la criminalité dans le cyberespace, notamment par l'adoption d'une législation appropriée et par l'amélioration de la coopération internationale;

 

Conscients des profonds changements engendrés par la numérisation, la convergence et la mondialisation permanente des réseaux informatiques;

 

Préoccupés par le risque que les réseaux informatiques et l'information électronique soient utilisés également pour commettre des infractions pénales et que les preuves de ces infractions soient stockées et transmises par le biais de ces réseaux;

 

 

Reconnaissant la nécessité d’une coopération entre les Etats et l’industrie privée dans la lutte contre la cybercriminalité, et le besoin de protéger les intérêts légitimes dans l’utilisation et le développement des technologies de l’information;

 

Estimant qu'une lutte bien menée contre la cybercriminalité requiert une coopération internationale en matière pénale accrue, rapide et efficace;

 

(…)

 

Chapitre II – Mesures à prendre au niveau national

 

Section 1 – Droit pénal matériel

 

Titre 1 – Infractions contre la confidentialité, l'intégrité et la disponibilité des données et systèmes informatiques

 

 

Article 2 – Accès illégal

 

Chaque Partie adopte les mesures législatives et autres qui se révèlent nécessaires pour ériger en infraction pénale, conformément à son droit interne, l’accès intentionnel et sans droit à tout ou partie d'un système informatique. Une Partie peut exiger que l’infraction soit commise en violation des mesures de sécurité, dans l’intention d’obtenir des données informatiques ou dans une autre intention délictueuse, ou soit en relation avec un système informatique connecté à un autre système informatique.

 

 

 

 

 

 

Article 3 – Interception illégale

 

Chaque Partie adopte les mesures législatives et autres qui se révèlent nécessaires pour ériger en infraction pénale, conformément à son droit interne, l’interception intentionnelle et sans droit, effectuée par des moyens techniques, de données informatiques, lors de transmissions non publiques, à destination, en provenance ou à l’intérieur d’un système informatique, y compris les émissions électromagnétiques provenant d'un système informatique transportant de telles données informatiques. Une Partie peut exiger que l’infraction soit commise dans une intention délictueuse ou soit en relation avec un système informatique connecté à un autre système informatique.

 

Article 4 – Atteinte à l’intégrité des données

 

1    Chaque Partie adopte les mesures législatives et autres qui se révèlent nécessaires pour ériger en infraction pénale, conformément à son droit interne, le fait, intentionnel et sans droit, d’endommager, d’effacer, de détériorer, d’altérer ou de supprimer des données informatiques.

 

2    Une Partie peut se réserver le droit d'exiger que le comportement décrit au paragraphe 1 entraîne des dommages sérieux.

 

Article 5 – Atteinte à l’intégrité du système

 

Chaque Partie adopte les mesures législatives et autres qui se révèlent nécessaires pour ériger en infraction pénale,

 

 

 

 

conformément à son droit interne, l'entrave grave, intentionnelle et sans droit, au fonctionnement d'un système informatique, par l’introduction, la transmission, l’endommagement, l’effacement, la détérioration, l’altération ou la suppression de données informatiques.

 

Article 32 – Accès transfrontière à des données stockées, avec consentement ou lorsqu’elles sont accessibles au public

 

Une Partie peut, sans l'autorisation d'une autre Partie :

 

a    accéder à des données informatiques stockées accessibles au public (source ouverte), quelle que soit la localisation géographique de ces données; ou

 

b    accéder à, ou recevoir au moyen d’un système informatique situé sur son territoire, des données informatiques stockées situées dans un autre Etat, si la Partie obtient le consentement légal et volontaire de la personne légalement autorisée à lui divulguer ces données au moyen de ce système informatique.

 

 

Omnibus Crime Control and Safe Streets Act

 

“Omnibus Crime Control and Safe Streets Act”

 

2510. Definitions

 

(…)

 

(4) 'intercept' means the aural acquisition of the contents of any wire or oral communication through the use of any electronic, mechanical, or other device.

 


FEDERAL COURT

SOLICITORS OF RECORD

 

DOCKET:

CSIS-30-08

 

STYLE OF CAUSE:

IN THE MATTER OF an application by

[                   ] for a warrant pursuant to Sections 12 and 21 of the Canadian Security Intelligence Service Act, R.S.C. 1985, c. C-23;

 

AND IN THE MATTER OF [                                ]

 

PLACE OF CLOSED

HEARING:                                      Ottawa, Ontario

 

DATES OF CLOSED

HEARING:

                                                            January 24, 2009,

April 6, 2009

 

AMENDED AND REDACTED

PUBLIC REASONS FOR ORDER:

                                                            MOSLEY, J.

DATED:

                                                            oCTOBER 5, 2009

APPEARANCES:

Mr. Robert Frater

Ms. Isabelle Chartier

Mr. Andrew Cameron

 

For The Applicant

DEPUTY ATTORNEY GENERAL OF CANADA

 

Mr. Gordon Cameron

AMICUS CURIAE

 

SOLICITORS OF RECORD:

William F. Pentney

Deputy Attorney General of Canada

Ottawa, Ontario

 

For The Applicant

 

 

Blakes Law Firm

Ottawa, Ontario

AMICUS CURIAE

 

 

 You are being directed to the most recent version of the statute which may not be the version considered at the time of the judgment.