Date: 20060713
Docket: CSIS-18-05
Citation: 2008 FC 300
Ottawa, Ontario, this 13th day of July 2006
PRESENT: THE HONOURABLE MR. JUSTICE SIMON NOËL
IN THE MATTER OF an application by
[...] for warrants pursuant to
Sections 12
and 21 of the Canadian Security
Intelligence
Service Act, R.S.C. 1985, c. C‑23
AND IN THE MATTER OF [...]
REASONS FOR ORDER
AND ORDER
I. Introduction and Issues
[1] Pursuant to a Section 21
application of the Canadian Security Intelligence Service Act, R.S., 1985,
C. 23 (CSIS Act), the Canadian Security Intelligence Service (CSIS) is asking
the Court, for the first time since the enactment of the CSIS Act, to issue
warrants that [...]. The Deputy Attorney General of Canada (DAGC) is
representing the CSIS.
[2] In order to ensure that
this proceeding covers all of its potential implications, the Chief
Justice assigned himself and the
undersigned as Case Management Judges pursuant to Rule 383 of the Federal
Court Rules, SOR/98‑106 (the Rules).
[3] One of the main issues
that this application brings up is a question of law [...]. The CSIS accepted
after a hearing that an Amicus Curiae would be appointed by the Court
and such appointment was made in the person of the Hon. Ron G. Atkey, P.C.,
Q.C. The need for an Amicus Curiae became evident since the CSIS could
not objectively fully represent to the Court all the different points of views
that the question of law brings up. It was clearly in the interest of justice
that an Amicus Curiae should be appointed by the Court to deal with the
opposite point of view presented by the CSIS to support the Application for
warrants [...].
[4] A preliminary issue that
was brought up by the undersigned was whether or not the question of law
identified in the precedent paragraph could be dealt with separately from the
warrants application, in a public hearing, or whether such question must be
heard in camera. To put it differently, can this question of law be
debated in a public hearing without prejudicing national security concerns
considering the materials as filed before the Court? The mandate of the Amicus
Curiae was enlarged to include the presentation of submissions on this
preliminary issue.
[5] The Amicus Curiae argued that it would be
feasible but the CSIS is objecting.
[6] Since the Court has
brought up this preliminary issue as part of its case management duties
pursuant to Rules 3, 4, 385 of the Rules, Reasons for Order and Order will be
issued.
[7] At the core of the
present matter is the interpretation of section 27 of the CSIS Act. It reads
as follows:
27. An application under
section 21, 22 or 23 to a judge for a warrant or the renewal of a warrant shall be
heard in private in accordance with regulations made under section 28.
|
|
27. Une demande de mandat ou de renouvellement de mandat
faite à un juge en vertu de l'article 21, 22 ou 23 est
entendue à huis clos en conformité avec les règlements
d'application de l'article 28.
|
II. Submissions
A. The DAGC
[8] In short, the DAGC
argues that a proper reading of Section 27 of the CSIS Act requires that
warrant applications be heard in private and that no disclosure of the
existence, details or outcome of the application can be made.
[9] The DAGC submits that
the words “in private” inserted in Section 27 of
the CSIS Act are not qualified in any manner nor are they limited in time and
that where a statute provides for an in camera hearing, neither
the Court on its own volition, nor the parties on consent, can by‑pass
the mandatory requirements of such an in camera hearing (see Ruby v.
Canada (Solicitor General) [2002] 4 S.C.R. 3, at para. 58).
[10] In support of its
argument that Section 27 cannot be extended to express something other than “in private”, the DAGC draws the
attention of the Court to Sections 48 and 52 of the CSIS Act. Section 48
provides that investigations of complaints conducted by the Security
Intelligence Review Committee (SIRC) shall be conducted “in private”. Section 52 of the same
act provides for the issuance of reports to the Director, the Minister and the
complainant, which include recommendations. The DAGC also draws a parallel
with Subsections 78d) and 78h) of the Immigration and Refugee Protection
Act, S.C. 2001, c. 27 (IRPA). These provisions explicitly state that
hearings are to be held “in
private” but that a
summary of the information or the evidence must be provided to the foreign
national or permanent resident. Again, the DAGC submits that neither Section
27 of the CSIS Act nor any other sections included in part II does provide for
the release of any sensitive information. In essence, the DAGC argues that if
Parliament intended hearings to be held in public under section 27 of the CSIS
Act, it would have stated so explicitly in the provision.
[11] It is also the contention
of the DAGC that warrant applications issued pursuant to the Criminal Code,
R.S.C. 1985, c. C‑46 are conducted “in
private” and that
access to such applications and the ensuing orders, if granted, are not
available until the warrants have been executed (see Toronto Star Newspaper
Ltd. v. Ontario, [2005] 2 S.C.R. 188, at paras. 19 and 20 and Vancouver
Sun (Re), [2004] 2 S.C.R. 332 at paras. 33 to 38, 60 and 72). In the
DAGC's view, there are no reasons to depart from the wording of Section 27 and
from the above Supreme Court decision, subject to the particulars of a warrant
application under the CSIS Act.
[12] The
DAGC is also concerned with the consequences on CSIS' methods of investigation
if
the question of law was addressed
and debated in public. Section 21 applications involve threats to the security
of Canada and refer to methodologies utilized for obtaining information in a
covert fashion. The present application makes no exception and does refer in
detail to the methodologies to be used. In the past, the Federal Court has
always protected such sensitive information in accordance with long established
jurisprudence (see Henri v. Canada (Security Intelligence Review Committee),
140 N.R. 315, [1992) F.C.J. No. 100). It is the opinion of the DAGC that
the methodologies included in the present application are innovative approaches
to the collection of information, and that it must be protected by the Court.
[13] Finally, it is submitted
that the Court is seized with a warrant application pursuant to Section 21 of
the CSIS Act, not a Motion for a Declaratory Judgment. The DAGC argues that a
Motion for Declaratory Judgment would not be appropriate to address the
question of law, and that to proceed with the said warrant application as if it
were a Motion for Declaratory Judgment would be to do indirectly that which
cannot be done directly.
[14] The DAGC notes that this
Court in the past issued Reasons for Judgment (see files 84‑01, 84‑04,
Tab 8 and 9 of DAGC's Submissions), which were helpful to establish
guidelines. It is submitted that the same can be done with the present
warrants application.
B. The Amicus
Curiae
[15] It
is admitted by the Amicus Curiae that some information must not become
public and must
remain confidential such as: the
target of the proposed warrant, the means of interception (the methodologies),
the places where the warrant would be executed, etc. However, the Amicus
Curiae argues that the jurisdictional issue should and could be debated in
public.
[16] In
order to protect the confidential information, the Amicus Curiae submits that
the Court
could rely on the CSIS “legend” entitled “CSIS National Security
Claims” (NSC) which
establishes
the standard within the Government
of Canada for determining what constitutes information that if
it were disclosed to the public
would be “injurious to
International Relations, National Defence or
National Security”. Information that is
subject to NSC is defined as follows (see Written
Submission of Ronald G. Atkey as Amicus
Curiae, at para. 7)
1) Identify or tend to identify Service
interest in individuals, groups or issues, including the existence or
absence of past or present files or investigations, the intensity of
investigations, or the degree or lack of success of investigations.
2) Identify or tend to identify human
sources of information for the Service or content of information provided by
a human source.
3) Identify or tend to identify investigative
techniques and methods of operation utilized by the Service.
4) Identify or tend to identify Service
employees or internal procedures and administrative methodologies of the
Service, such as names and file numbers etc.
5) Identify or tend to identify relationships
that the Service maintains with other police and security and intelligence
agencies in Canada and elsewhere and would disclose information received in
confidence from such sources.
6) Reveal or tend to reveal information
concerning the telecommunications system utilized by the Service.
7) Jeopardize or tend to jeopardize
essential international relations [emphasis in original].
By using such
definition, the information contained in the application could be reviewed and
such information could be excluded.
[17] After having noted that
Section 27 of the CSIS Act refers to Regulations made under Section 28 and that
such Regulations are non‑existent, it is submitted by the Amicus Curiae
that the code for Judicial Control found in sections 21‑28 is
incomplete and that Section 27 must be tempered by rights and remedies
prescribed by the Federal Courts Act (the Federal Courts Act) and the
Rules.
[18] The Amicus Curiae presented
two remedies provided for in the Federal Courts Act under which it would be
possible to protect NSC information while at the same time hearing
jurisdictional issues in public. It is specifically suggested that a Motion
for Declaratory Judgment, pursuant to Sections 17 or 18 of the Federal Courts
Act, would be appropriate avenues. In his submissions, the Amicus Curiae then
explained how such procedures would be conducted, who would bring the action,
which decision would be reviewed and what issues would be addressed. For the
purposes of the present interim decision, it is not necessary to discuss in
detail such matters. What is important to keep in mind is that the Amicus
Curiae considers that there are proper avenues to consider in order to
establish a public forum to address the issue of whether or not the CSIS Act
gives the jurisdiction to the Federal Court to grant warrants [...] without
divulging information that would prejudice International Relations, National
Defense or National Security.
[19] Furthermore,
in its argument, the Amicus Curiae informs that Section 27 of the CSIS
Act is
subject to the application of
Section 2b) of the Canadian Charter of Rights and Freedoms (The Charter)
and that there is a principle of open access to the Courts which has to be respected
in order to foster confidence and ensure accountability (see Vancouver Sun
(Re), above, at paragraphs 24-26).
[20] In sum, it is the opinion
of the Amicus Curiae that the issue of the interpretation of the
CSIS Act should and could be dealt with publicly. In the Amicus Curiae's opinion,
the Federal Court Act and the Rules provide for appropriate remedies, and the “CSIS National Security
Claims” categories
would be useful for the Court to exclude, on a piece‑by‑piece
basis, any information that could be injurious to International Relations,
National Defense or National Security.
[21] In a subsidiary argument,
the Amicus Curiae submits that at least the submissions of Counsel for
both parties should be made public provided that such submissions do not
include any National Security Claims information, the whole pursuant to Rule 4
(“Matters not provided
for”) and Rule 109(3)
(“Directions” or “Intervention”).
III. Analysis
[22] Below I will first
address the scheme of judicial control under Part II of the CSIS Act. Then I
will turn to the interpretation of Section 27 and to the specifics of the
present matter.
A. The Nature of a Warrant
Application and the Judicial Control Regime under the CSIS Act
(1) History
and Aims of the Judicial Control Regime under the CSIS Act
[23] Prior
to the enactment of the CSIS Act, warrants were issued by the Solicitor General
under
the authority of Section 16 of the Official
Secrets Act, R.S.C. 1970, c. O‑3). Section 16 was added by an
amendment to the Act in 1973.
[24] The
idea that there should be judicial involvement in the warrant issuance
procedures goes
back to the early 1980's when the
Commission of Inquiry concerning certain activities of the Royal Canadian
Mounted Police (The Commission) published its report (see Canada, Commission of
Inquiry Concerning Certain Activities of the Royal Canadian Mounted Police,
Second Report ‑ Vol. 1 : Freedom and Security under the Law, Ottawa,
August 1981, pp. 592 to 594, paras. 179, 180, 181):
179. Our recommendations would make the
security intelligence agency's use of four extraordinary powers conditional on
obtaining a warrant from a Federal Court Judge. These four powers are the
interception of communications by electronic surveillance, searches of private
premises or property in circumstances in which a search warrant for criminal
investigation would not be available, the examination of mail, and access to
personal information other than `biographical information' held by the federal
government. We refer to these powers as `extraordinary' because they involve
acts which would be violations of law if carried out by ordinary citizens, and
because, unlike special police powers, they may be exercised in circumstances
where there is no evidence that a particular crime has been committed or is
about to be committed. Two other techniques, which are not extraordinary in
this sense, namely surveillance of private premises by hidden optical devices
or cameras and the use of dial digit recorders, should also be subject to this system
of control by judicial warrants.
180. Under our recommendations for
controlling the level of investigation, the security intelligence agency could
not initiate a request for a warrant to use any of these techniques to gather
intelligence about a specific individual or group until a ‘full’ investigation
of that individual or group has been approved. It will be recalled that a
decision to carry out a full investigation must be approved by the Solicitor
General on a proposal which is supported by the Director General and has been
carefully reviewed by a Committee which includes senior officers of the
security agency as well as a lawyer from the Department of Justice and a senior
official of the Solicitor General's Department. At the time the Solicitor
General's approval of a full investigation is sought, the security agency might
request his approval of an application to a judge for a warrant for a
particular technique. It might conceivably at that time request his approval
for applications for warrants for more than one technique, but in this case it
would be extremely important for the security agency and the Solicitor General
to give careful consideration to the necessity of using each technique. Every
effort should be made to use only that method which is best calculated to
enable the agency to complete an investigation with a minimum intrusion of
privacy. We do not think that the various techniques requiring a judicial
warrant can be scaled in terms of their inherent intrusiveness. Indeed, in some
circumstances, the use of an undercover informant, which does not require a
judicial warrant, may be regarded as a more intrusive and less effective means
of obtaining information than one of the techniques which does.
181. In considering an application
for a warrant to use two or more methods, the Federal Court Judge would have
to consider the strength of the case which is made for the necessity of using
each technique. He should also be informed when considering any application
whether warrants have been issued for the use of other techniques in relation
to the same subject of investigation and if they have what results they have
produced. It is essential that the judge be in a position to consider
whether, given what has been obtained or what can reasonably be expected to be
obtained from other techniques, and given the statutory direction to minimize
intrusions on privacy, the necessity of using a particular technique has
been demonstrated [my emphasis].
The Commission felt that the involvement of the Federal Court in warrant
procedures was necessary in order to ensure that the legal criteria established
in the legislation were duly respected (see Canada, Commission of Inquiry
Concerning Certain Activities of the Royal Canadian Mounted Police, Second
Report ‑ Vol. 2: Freedom and Security under the Law, Ottawa,
August 1981, p. 882, para. 5):
Par. 5. [. .. J Because of the secret nature of these
techniques and the absence of any provision requiring notification of persons
subject to them, we felt that judicial authorization is the best way to
ensure that the requirements of the law are met in each case [My emphasis].
[25] In
1983, a special committee of the Senate (The Senate Committee) examined the
subject matter of Bill C‑157
(the predecessor to Bill C‑9, An Act to establish the Canadian
Security Intelligence Service, to enact An Act Respecting enforcement in
relation to certain security and related offenses and to amend certain Acts in
consequence thereof or in relation thereto, 2d Sess., 32d Parliament, 1984 ‑
which became the CSIS Act in 1984 ‑ see Canadian Security Intelligence
Service Act, S.C. 1984, c. 21) and agreed with the Commission that warrants
to be granted would give CSIS significant powers and that the Federal Court was
the proper forum to have the warrant process reviewed and decided (see Canada,
Senate of Canada, Report of the Special Committee of the Senate on the Canadian
Security Intelligence Service, A Delicate Balance: A Security
Intelligence Service in a Democratic Society, November 1983, pp. 20 to 23,
paras. 56 to 67).
[26] There
are similarities between the objectives of a warrant application and the ones
associated with a warrant
application presented pursuant to the Criminal Code. Having said that, it is
important to emphasize that their respective aims are totally different. The
Senate Committee did
make that distinction when
reviewing Bill C‑157 (see Canada, Senate of Canada, Report of the Special
Committee of the Senate on the Canadian Security Intelligence Service, above, paras.
13, 14, 15):
13. Once it is accepted that a
distinct security intelligence capacity is required, cognizance must be taken
of the fundamental differences between a system established for enforcement of
the law, and a system established for the protection of security. There are
similarities between such systems, and a distinct area of overlap in which the
interests of a police force in certain crimes against the state, or against
particular individuals, are identical to the interests of a security
intelligence agency.
14. But the differences are
considerable. Law enforcement is essentially reactive. While there is an
element of information‑gathering and prevention in law enforcement, on
the whole it takes place after the commission of a distinct criminal offence.
The protection of security relies less on reaction to events; it seeks advance
warning of security threats, and is not necessarily concerned with breaches of
the law. Considerable publicity accompanies and is an essential part of the
enforcement of the law. Security intelligence work requires secrecy. Law
enforcement is “result‑oriented”, emphasizing apprehension and adjudication, and the players in the
system ‑ police, prosecutors, defense counsel, and the judiciary ‑
operate with a high degree of autonomy. Security intelligence is, in contrast,
“information‑oriented”. Participants have a much less clearly defined role,
and direction and control within a hierarchical structure are vital. Finally,
law enforcement is a virtually “closed” system with finite limits ‑ commission,
detection, apprehension, adjudication. Security intelligence operations are
much more open‑ended. The emphasis is on investigation, analysis, and
the formulation of intelligence.
15. The differences between law
enforcement and the protection of security have profound implications for
several aspects of a security intelligence regime. They can have effect on
many questions of policy, such as how much power or freedom of action a person
employed in a security agency should have; or obversely, how much protection a
person who is the object of investigation can have in light of the differences
between operational means and investigative ends. An investigation related to
security can have severe consequences on a person's life. Thus the question of
control and accountability becomes important, because there is no impartial
adjudication by a third party of the appropriateness of an investigation.
Since it is so open‑ended and confidential in nature, security
intelligence work requires a close and thorough system of control, direction
and review, in which political responsibility plays a large part. Such close
direction is incompatible with our traditional notions of law enforcement [my
emphasis].
[27] In Henrie v. Canada (Security Intelligence
Review Committee), [1989] 2 F.C. 229, at
paras. 26‑28, Justice Addy of the Federal Court recognized that the
distinction of these two types of investigation had to be taken in
consideration when assessing national security issues:
¶26 In considering whether the release of any
particular information might prove injurious to
national security and in estimating the possible
extent of any such injury, one must bear in mind that the fundamental
purpose of and indeed the raison d’être of a national security intelligence investigation is quite
different and distinct from one pertaining to criminal law enforcement where
there generally exists a completed offence providing a framework within the
perimeters of which investigations must take place and can readily be confined. Their purpose is the obtaining of legally admissible
evidence for criminal prosecutions. Security investigations on the other hand
are carried out in order to gather information and intelligence and are generally
directed towards predicting future events by identifying patterns in both past
and present events.
¶27 There are few limits upon the kinds of
security information, often obtained on a long‑term
basis, which may prove useful in identifying a threat.
The latter might relate to any field of our national activities and it might be
an immediate one or deliberately planned for some time in the relatively
distant future. An item of information, which by itself might appear to be
rather innocuous, will often, when considered with other information, prove
extremely useful and even vital in identifying a threat. The very nature and
source of the information more often than not renders it completely
inadmissible as evidence in any court of law. Some of the information comes
from exchanges of intelligence information between friendly countries of the
western world and the [page242] source or method by which it is obtained is
seldom revealed by the informing country.
¶28 Criminal investigations are generally
carried out on a comparatively short‑term basis while
security investigations are carried on systematically
over a period of years, as long as there is a reasonable suspicion of the
existence of activities which would constitute a threat to the security of the
nation [my emphasis).
[28] Warrants
granted under the CSIS Act are extraordinary, intrusive, related to open‑ended
investigations,
information‑oriented with an emphasis on investigation, analysis and the
formulation of intelligence. The persons of interest in such procedures can be
related to countries of interest for Canada for the role they play as
representatives, or they can be persons of interest because of their activities
in relation to threats to the security of Canada as defined in Section 2 of the
CSIS Act. As a consequence, there is a wide spectrum of potential targets.
Because of the nature, invasiveness and sensitivity of the activities of CSIS,
its modes of operations must be subject to a complete, closed system of control
by the judiciary.
[29] In short, the “Judicial
Control” regime
adopted in 1984 (Sections 21 to 28 ‑ Part II of the
CSIS Act) is aimed at both ensuring the lawfulness of the operations of
the CSIS and the secrecy of the information that is disclosed to the Court in
seeking and obtaining warrants. Below I explain these provisions of the CSIS
Act.
(2) The Regime of Judicial Control under the
CSIS Act
[30] The Director of CSIS or an employee designated for
this purpose first presents, with the
approval of the Minister of Public Safety and Emergency Preparedness, an
application for the
issuance of the
warrant under subsection 21(1) of the CSIS Act
21.
(1) Where the Director or any employee designated by the Minister for the
purpose believes, on reasonable grounds, that a warrant under this section is
required to enable the Service to investigate a threat to the security of
Canada or to perform its duties and functions under section 16, the Director
or employee may, after having obtained the approval of the Minister, make an
application in accordance with subsection (2) to a judge for a warrant under
this section.
|
21. (1) Le
directeur ou un employé désigné à cette fin par le ministre peut, après avoir
obtenu l'approbation du ministre, demander à un juge de décerner un mandat en
conformité avec le présent article s'il a des motifs raisonnables de croire
que le mandat est nécessaire pour permettre au Service de faire enquête sur
des menaces envers la sécurité du Canada ou d'exercer les fonctions qui lui
sont conférées en vertu de l'article 16.
|
[31] As per section paragraph
21(2)(a), the CSIS is required to explain, in a written application, its
reasons for believing that the warrant is necessary to investigate threats to
the security of Canada (Sections 2 and 12 of the CSIS Act) or to collect
information concerning foreign states and persons (Section 16 of the CSIS
Act). An affidavit must be filed in support of the application, as per
Subsection 21(2). The affidavit must include the following:
‑ the
facts relied on to justify the belief, on reasonable ground, that the issuance
of warrants is required;
‑ the facts that other investigative
techniques were not successful or would not be successful, that there is some
urgency justifying not using conventional techniques and that without such
warrants valuable information will be missed;
‑ the types of information being sought
and the ones to be obtained by entering premises, removing information or
otherwise;
- the
identity of the persons or the groups of persons to be targeted by the warrant;
- a
description of the places when the warrants would be executed where possible;
- the
period of time of the existence of the warrants (60 days for investigations
related to paragraph (d) of the definition of the expression “threat to the security of
Canada” in section 2
[activities led to the overthrow or destruction of Canada's system of
government]) but no more than a year in all other cases;
- details
about any previous applications related to the same individuals or groups.
[32] As
per Subsection 21(4) and Section 23, warrants must specify the following:
- the
types of communication authorized to be intercepted, the type of information,
records, documents or things authorized to be obtained;
- the
identity of the person, if known, whose communication is to be intercepted or
possesses the information, record, document or thing to be obtained;
- the
identity of the person or classes of persons targeted by the warrant;
- the
place(s) (with description if possible) to be accessed and searched and the
possibility of removing any thing installed pursuant to a warrant;
- the
duration of the warrant;
- any
other terms and conditions that the judge may consider.
[33] Renewal
of warrants is possible under Section 22 of the CSIS Act. The effect of the
warrant is to give the necessary
authority to whom it may concern to act in accordance with the said warrants,
notwithstanding another law (see Sections 25, 26, 27 of the CSIS Act).
[34] Section
27 provides that applications for warrant “shall
be heard in private” (“huis clos” in
French). “Private”
is defined as “confidential;
secret” in Brian A.
Garner, Black’s
Law Dictionary, 8th ed. (St-Paul: Thomson West,
2004), s.v. “private” In Hubert Reid, Dictionnaire de droit québécois et canadien,
(Montréal, Wilson & Lafleur, 1994), s.v. “huis clos”, the
expression “huis clos” is described as being “une exception au principe de la publicité des débats, qui consiste à
interdire au public l’accès à la salle d’audience”. Again, the main aims of the privacy of applications for a
warrant are to preserve the secrecy of sensitive information in general and to
ensure the execution of warrant. The interested person(s) (targets) must not
be present or aware of the warrant application; otherwise, its purpose would
become academic. The public should not have access to the information because
it is related to national security and because of the effectiveness of the CSIS
depends on the secrecy of its methods and operations. Finally, third party
information is often transmitted under the caveat that it would not be
released. If warrants were debated in public, sensitive information would
likely be released advertently or inadvertently. It would prevent the CSIS
from being informed about threats to Canada’s
security, would render useless the investigation, would be dangerous to human
sources involved and could endanger Canada’s
relationship with allied countries.
[35] In
sum, designated judges' role pursuant to Part II of the CSIS Act is to exercise
a judicial
scrutiny on the lawfulness,
necessity and reasonableness of the techniques of investigations of CSIS,
keeping in mind that the privacy requirement of warrant applications is
justified given the national security concerns at stake.
B. Substantive Considerations
(1) National
Security and Fundamental Rights
[36] Warrant
applications for national security purposes and intelligence gathering are
topics that
our Courts have not specifically
dealt with. In deciding whether it is possible or not to deal in public with
jurisdictional issues in relation to such applications, the Court has to
consider both fundamental rights and national security concerns.
[37] In
Toronto Star Newspaper Ltd. v. Ontario, [2005] 2 S.C.R. 188, at paras. 1
to 3, Justice
Fish made the following statement:
¶
1 In any constitutional climate, the administration of justice thrives
on exposure to light ‑and withers under a cloud of secrecy.
¶ 2 That lesson of history is enshrined in the
Canadian Charter of Rights and Freedoms.
Section
2(b) of the Charter guarantees, in more comprehensive terms, freedom of
communication and freedom of expression. These fundamental and closely related
freedoms both depend for their vitality on public access to information of
public interest. What goes on in the courts ought therefore to be, and
manifestly is, of central concern to Canadians.
¶ 3 The freedoms I have mentioned, though
fundamental, are by no means absolute. [...]
[38] The
present matter clearly brings up that basic freedoms protected by the Canadian
Charter
of Rights and Freedoms sometime
have to be assessed in light of other values. Decisions made in a vacuum can
sometime give way to detrimental situations even though they were made at first
sight to protect our basic freedoms.
[39] Access to our Courts is
fundamental to our democratic system. It allows public scrutiny of the
judicial process, as well as media access to information of public interest.
In that sense, freedom of expression is inextricably linked to the open courts
principle. Transparency in the administration of justice fosters trust in the
judicial system. It also protects the integrity of the judicial system in
making sure that the rule of law prevails and helps to maintain the independence
and impartiality of the Courts (see Vancouver Sun (Re), above, at paras.
23 to 26, by Chief Justice McLachlin for the majority). To deny public access
to the Courts must be strongly justified in accordance with the situation at
play and the valued principles at stake.
[40] National
security has always been a subject of concern to our Courts when dealing with
our
basic fundamental rights. Under
certain circumstances, it is necessary to balance national security with
fundamental rights. This was emphasized in Application under s. 83.23 of
the Criminal Code (Re), [2004] 2 S.C.R. 248. At paras. 5 to 7, Justices
Iacobucci and Arbour wrote:
¶ 5 The
challenge for democracies in the battle against terrorism is not whether to
respond, but rather how to do so. This is because Canadians value the
importance of human life and liberty, and the protection of society through
respect for the rule of law. Indeed, a democracy cannot exist without the rule
of law . So, while Cicero long ago wrote "inter arma silent leges" (the laws are silent in battle) (Pro Milone 14), we,
like others, must strongly disagree [...].
¶
6 Although terrorism necessarily changes the context in which the rule
of law must operate, it does not call for the abdication of law. Yet, at the
same time, while respect for the rule of law must be maintained in the response
to terrorism, the Constitution is not a suicide pact, to paraphrase Jackson J.:
Terminiello v. Chicago, 337 U.S. 1 (1949), at p. 37 (in dissent).
¶( 7 Consequently, the challenge for a
democratic state’s answer to terrorism calls for a balancing of what is
required for an effective response to terrorism in a way that appropriately
recognizes the fundamental values of the rule of law. In a democracy, not every response is available to
meet the challenge of terrorism. At first blush, this may appear to be a
disadvantage, but in reality, it is not. A response to terrorism within the
rule of law preserves and enhances the cherished liberties that are essential
to democracy. As eloquently put by President Aharon Barak of the Israeli
Supreme Court [my emphasis):
This
is the fate of democracy, as not all means are acceptable to it, and not all
methods employed by its enemies are open to it. Sometimes, a democracy must
fight with one hand tied behind its back. Nonetheless, it has the upper hand.
Preserving the rule of law and recognition of individual liberties constitute
an important component of its understanding of security. At the end of the
day, they strengthen its spirit and strength and allow it to overcome its
difficulties.
(H.C.
5100/94, Public Committee Against Torture in Israel v. Israel, 53(4)
P.D. 817, at p. 845, cited in Barak, supra, at p. 148.)
[41] In Henrie
v. Canada (Security Intelligence Review Committee), above, at para. 18,
Justice
Addy expressed
a concern in balancing the principle of public access to the courts with the
competing
interest of the State in protecting national security:
¶
18 [...] Public interest in the administration of justice requires complete
openness of the judicial process. That principle must be jealousy guarded and
rigorously applied, especially where evidence which appears to be relevant to a
judicial determination is at stake. That cardinal rule not only safeguards the
rights of litigants generally but, more importantly, it is fundamental to the
public interest in the preservation of our free and democratic society. There
are, however, very limited and well‑defined occasions where that
principle of complete openness must play a secondary role and where, with
regard to the admission of evidence, the public interest in not disclosing the
evidence may outweigh the public interest in disclosure. This frequently
occurs where national security is involved for the simple reason that the very
existence of our free and democratic society as well as the continued
protection of the rights of litigants ultimately depend on the security and
continued existence of our nation and of its institutions and laws.
This reasoning
was adopted by the Federal Court of Appeal in Moumdjian v. Canada (Security
Intelligence
Review Committee), [ 1997] F.C.J. No. 1574, at para. 6.
[42] In
my view, it is necessary to keep in mind this necessary balance between
national security and fundamental rights to interpret Section 27 of the CSIS.
(2) Interpretation
of Section 27 of the CSIS Act
(a) The
Warrant Application Itself
[43] In the present matter, I
have no doubt that the wording of Section 27 of the CSIS Act is very
important. This imperative wording indicates the clear intention of Parliament
that the hearing of the application for warrants “[
...] be heard in private [...]”.
Furthermore, the fact that the Governor in Council has not made Regulations in
accordance with Section 28 of the CSIS Act, in relation to the forms of
warrants, establishing procedures and security requirements for hearings does
not in any way change the intent of the legislator.
[44] I agree, as emphasized by
the DAGC, that it is not possible for a judge to allow a public hearing on the
warrant application itself. The analogy proposed by the DAGC with the Supreme
Court case Ruby v. Canada (Solicitor General), above, is, in my view,
correct. In this case, Justice Arbour, on behalf of the Court, commented on
provisions of the Privacy Act, R.S.C., c. P‑21 that provides for a
mandatory in camera and ex parte proceedings when an individual
questions the decision of refusing access to personal exemption on grounds of
national security or the maintenance of foreign confidence. Subsection 51(2) x)
and 51(3) of the Privacy Act read as follows:
51. (2) An application
referred to in subsection (1) or an
appeal brought in respect of
such application shall
(a) be heard in camera; and
(b) on the request of the head of the government
institution concerned, be heard and determined in the
National Capital Region
described in the schedule to the National Capital Act.
[...]
(3)
During the hearing of an application referred to in subsection (1) or an
appeal brought in respect of such application, the head of the government
institution concerned shall, on the request of the head of the institution,
be given the opportunity to make representations ex parte.
|
51. (2) Les recours visés au paragraphe (1) font, en
premier ressort ou
en appel, l'objet d'une audition
à huis clos; celle‑ci a lieu dans la région de la capitale nationale définie
à l'annexe de la Loi sur la capitale nationale si le responsable de l'institution
fédérale concernée le demande.
[...]
(3) Le
responsable de l'institution fédérale concernée a, au cours des auditions en
première instance ou en appel et sur demande, le droit de présenter des arguments
en l'absence d'une autre partie.
|
The wording is
different from the one included in Section 27 of the CSIS Act but it basically
expresses the same restrictions insofar as presence of the interested persons
and access to the public are concerned.
[45] Justice
Arbour mentioned, at paras. 57‑58 that it is not possible for the judge
to depart from
the wording of
these provisions and to allow a public hearing on the warrant application,
except on
constitutional
issues:
¶ 57 In our
case, counsel for the Solicitor General informed the Court during oral argument
that the hearing in this case before MacKay J. with respect to the merits of
the exemptions claimed, was heard in camera. On the other hand, the hearings
before Simpson J. on the constitutional questions were conducted in public.
Counsel for the Solicitor General further represented to the Court that the Department
of Justice has interpreted s. 51 narrowly, limiting the in camera requirement
only to those portions of a hearing that concern the merits of the exemptions
claimed under s. 19(1) (a) or (b) or s. 21 but allowing the Crown to
consent to “collateral”
issues (i.e., constitutional or procedural issues) being heard in open court.
¶ 58 Aside from the constitutional issue, the
Solicitor General's interpretation of s. 51(2) (a) is not one that the statute
can reasonably bear. Section 51(2)(a) mandates that the hearing of an
application under s. 41 and an appeal therefrom relating to personal
information that a government institution has refused to disclose by reason of
s. 19(1)(a) or (b) or s. 21 be heard in camera. Contrary to the
apparent practice referred to by the Solicitor General, the statute does not
limit the in camera requirement to only those parts of a hearing that
involve the merits of an exemption. It is not open to the parties, even on
consent, to bypass the mandatory in camera requirements of s. 51. Nor
is open to a judge to conduct a hearing in open court in direct contradiction
to the requirements of the statute regardless of the proposal put forth by the
parties. Unless the mandatory requirement is found to be unconstitutional
and the section is “read down” as
a constitutional [page35] remedy, it cannot otherwise be interpreted to bypass
its mandatory nature [my emphasis].
Therefore, it
is my view that I have no discretion to authorize a public hearing on the
warrant application itself under Section 27 of the CSIS Act. This, however,
should be qualified with respect to “collateral” issues.
(b) “Collateral” Issues
[46] In
my view, issues that are “collateral” to a warrant application,
such as jurisdictional issues,
could be heard
in open courts in some circumstances. It is to be noted that there are no
regulations made under Section 28 of the CSIS Act to provide guidance to the
Court in deciding what should remain confidential.
[47] In this context, I
believe that each case turns on its facts keeping in mind the clear wording of
Section 27 of the CSIS Act and the necessary balance between national security
and fundamental rights. In some circumstances, to debate a jurisdictional,
procedural or constitutional question in public can be injurious to national
security or prevent the proper execution of a warrant. It is also possible to
imagine cases where the public hearing would be allowed on some of the issues
of law, while others would remain confidential. Below I assess the specific of
the present matter to determine whether it would be possible to allow a public
hearing on the jurisdictional issue.
[48] The following portion of
the Henrie v. Canada, above, is also instructive as to the nature of
information the disclosure of which
would be injurious to national security. At para. 29, Justice
Addy wrote, at para. 29:
¶
29 When considering the issue of the relative merits of the public
interest in non‑disclosure as opposed to the public interest in disclosure,
it is evident that the considerations and circumstances to be taken into
account which might militate against the proper control or suppression of
threats to national security are considerably more numerous and much more
complex than the considerations which involve a national interest other than
those mentioned in section 36.2 of the Canada Evidence Act. In criminal
matters, the proper functioning of the investigative efficiency of the
administration of justice only requires that, wherever the situation demands
it, the identity of certain human sources of information remain concealed. By
contrast, in security matters, there is a requirement to not only protect the
identity of human sources of information but to recognize that the following
types of information might require to be protected with due regard of course to
the administration of justice and more particularly to the openness of its
proceedings: information pertaining to the identity of targets of the
surveillance whether they be individuals or groups, the technical means and
sources of surveillance, the methods of operation of the service, the identity
of certain members of the service itself, the telecommunications and cypher
systems and, at times, the very fact that a surveillance is being or is not
being carried out. This means for instance that evidence, which of itself
might not be of any particular use in actually identifying the threat, might
nevertheless require to be protected if the mere divulging of the fact that
CSIS is in possession of it would alert the targeted organization to the fact
that it is in fact subject to electronic surveillance or to a wiretap or to a
leak from some human source within the organization.
[49] At para. 30, he went on to say the following about releasing
information (which in itself is
neutral) and on the understanding that an informed person could have:
¶ 30 It is of some importance to realize than an
“informed reader”,
that is, a person who is both [page243] knowledgeable regarding security
matters and is a member of or associated with a group which constitutes a
threat or a potential threat to the security of Canada, will be quite familiar
with the minute details of its organization and of the ramifications of its
operations regarding which our security service might well be relatively
uninformed. As a result, such an informed reader may at times by fitting a
piece of apparently innocuous information into the general picture which
he has before him, be in a position to arrive at some damaging deductions regarding
the investigation of a particular threat or of many other threats to
national security. He might, for instance, be in a position to
determine one or more of the following: (1) the duration, scope intensity and
degree of success or of lack of success of an investigation; (2) the
investigative techniques of the service; (3) the typographic and teleprinter
systems employed by CSIS; (4) internal security procedures; (5) the nature and
content of other classified documents; (6) the identities of service personnel
or of other persons involved in an investigation [my emphasis].
This portion of
Justice Addy's decision was cited numerous times by this Court: it is often
described as the “mosaic
effect” (see Zundel
(Re), 2005 FC 195, at para. 109). In numerous cases, the Federal Court
cited these two paragraphs a reference for deciding whether releasing
information would be detrimental to national security (see, for example, Alemu
v. Canada (Minister of Citizenship and Immigration), 2004 FC 997, at para. 14;
Harkat (Re), 2003 FCT 285,; at para. 20).
(3) Assessment of the Facts before the Court
[50] In
the matter at hand, the Amicus Curiae submits that it is possible to
address, in public, the issue of whether or not the CSIS Act grants the Federal
Court jurisdiction to issue warrants which [...]. The question before the
Court is therefore whether it is possible to address this issue without
breaching the intent of Parliament.
[51] The
facts and the documents before the Court led me to the conclusion that it is
not possible to debate in public of the jurisdictional issue.
[52] First,
the fact of raising the question in public, in itself, would reveal [...], it
would be injurious to national security and to the operations of the CSIS to reveal
it.
[53] [...]
CSIS operates abroad through the work of intelligence officers. Indeed, Mr.
Jack Hooper, Deputy Director (Operations) of the CSIS stated before a Senate
Committee that Canada is active abroad (see Canada, Senate of Canada, Standing
Committee on National Security and Defence, May 29, 2006):
[...]
Senator Campbell: [...] Is the CSIS overseas role focused entirely on the collection of
intelligence about threats to the security of Canada? How are Canada's foreign
intelligence requirements being addressed?
Mr. Hooper:
The law actually does not permit us to collect foreign intelligence outside
Canada ‑ “foreign”
intelligence being intelligence around the intentions and capabilities of
foreign states and persons. Typically, when people talk about foreign
intelligence, at least under our legal model, they are talking about political,
economic and military intelligence. In response to your first question,
senator, everything we do abroad is directed at collecting security
intelligence.
In terms of how we do that, we are moving from one
model to another. The service has historically, and the RCMP security service
before it, posted what we call security liaison officers in many countries.
The primary function of these officers was to conduct liaison with other
trusted intelligence organizations and law enforcement agencies.
Afghanistan is a circumstance that has reoriented our
thinking about what we need to be doing abroad. It taught us the lesson that
much of the information on domestic threats has to be obtained outside the
country.
We do that through a variety of means. We do it
through foreign collection officers, visiting case officers and the use of
assets whom we task and direct to collect intelligence abroad. There are a
number of means, not the least of which is our interaction with allied
intelligence services in an international arena.
Senator Campbell: How many people would you have working overseas gathering information?
These would be your liaison officers, I take it.
Mr. Hooper: We have something less than 50 intelligence officers
abroad.
Senator Campbell: Since the number of terrorist groups and individuals has stayed
relatively constant, have we expanded our capabilities since 1998? While I
recognize it has remained static, I think the threat has continued to
increase. Have you been able to increase your overseas staff since 1998?
Mr. Hooper:
Not to the extent that we would like. We received funding in two envelopes
over the last two years to augment our foreign collection program, and a lot of
that money was earmarked for sending people abroad.
Over the past number of years we have borrowed from
domestic collection programs and the people doing that work to send them abroad
to do foreign collection. We have invested the money that government accorded
us at the front end, in various kinds of infrastructure support, because we can
spend that money immediately. It takes a little longer to recruit and train a
person who can then go abroad or who can backfill for someone already operating
internationally.
[...]
It is public
that CSIS is present overseas [...].
[54] Another consideration led me to the conclusion that
it is not possible to address the
jurisdictional issue in public: the issues of law and of fact are intertwined.
In some circumstances,
questions of facts and questions of law are so inextricably linked that
it is not possible to address the
issue of law in a vacuum. This was noted by the Supreme Court of Canada,
in the context of
terrorism, in Application under s. 83.23 of the Criminal Code (Re), above,
at paras. 30‑31:
¶ 30 To begin with, although specific provisions
of the Act are directly before us, there are other sections that may be
implicated on which we do not wish to pronounce absent a factual foundation.
As well, we intend to decide only what is necessary to resolve the specific
dispute in issue. We hope otherwise, but there will likely be other cases to
arise for further elucidation, and we prefer to await that development.
¶ 31 In addition context in the law is of
vital importance and that is certainly the case with respect to
terrorism What we say in these reasons is influenced by the adjudicative facts
we have before us Although constitutional opinion on
legislative facts is a different exercise, again, we wish to emphasize how
important it is to examine the particular factual setting of each case prior to
determining the legally required result [my
emphasis].
[55] As the DAGC submits, addressing the question of law
in public could have the
effect of
informing of methodologies utilized for obtaining information in a covert
fashion. An application for warrants has been filed which has to be dealt with
pursuant to the CSIS Act with all its specifications. Another avenue to deal
with the question of law was not chosen by CSIS. This Court has to deal with
the warrant application as it is filed. Questions of fact and the questions of
law are inextricably linked in the application: it would be impossible, in this
context, to debate in public of the issues of law without unveiling sensitive
information, which would be damaging to national security.
[56] A public debate on the issue of law would be likely
to reveal CSIS’
methodologies.
The question of law in itself does not contain such information. However, the
application as it is filed cannot be separated in questions of facts and
questions of law. In the present circumstances, I do not think that the
question of law can be fully dealt with in a vacuum. The question of law would
raise several underlying questions, such as:
- How will that be done?
- How will warrant be executed [...]?
- Who will execute the warrant?
- Who will be involved?
- What types of warrants are being sought?
- Who is targeted?
For obvious
reasons, answers to these questions cannot be given. The DAGC and the Amicus
Curiae would have to argue on these questions. Their submissions could
divulge to the public some methodologies of the CSIS and certain activities [...].
This is likely to restrain counsel for the DAGC to inform the designated judge
about information that is relevant to the questions of law to be decided. In
contrast, if the debate is conducted in camera, the judge will
have all the relevant information before him and the debate is more likely to
be comprehensive.
C. Conclusion
[57] Having
noted that the question of law does trigger the automatic consideration of the
facts related to the application for warrants and having identified some of the
possible consequences of discussing the question of law, I have to come to the
conclusion that the jurisdictional issue as presented can not be dealt with in
public. If a motion for declaratory judgment on the jurisdictional issue only
(without factual evidence) would have been presented, then it would have been
possible to seriously consider hearing it publicly. Such was not the decision
taken by the CSIS.
[58] Finally,
I understand that the wording used in Section 27 of the CSIS Act can be
interpreted as being limitative to hearings to be held in private. In
contrast, one can argue that Section 27 wording, although very clear as to the
privacy of the hearing on the warrant application itself, mentions neither that
the decision, nor the documents filed with the Court, are also “private”. I leave for the Trial
Judge to decide this issue, after having given the parties the opportunity to
address it.
Having said
that, I will be asking the Counsel by directive, whether or not the present
decision or some parts of it can be made public.
[59] Pending
further decision, the Reasons for Order and Order are to be kept “in private”.
THEREFORE,
THIS COURT ISSUES THE FOLLOWING ORDER:
- The Section 21 Application shall be heard “in private”.
“Simon
Noël”
_____________________________
Judge
FEDERAL COURT
SOLICITORS OF RECORD
DOCKET: CSIS-18-05
STYLE OF CAUSE: IN THE MATTER OF an application by
[...]
for warrants pursuant to Sections 12
and
21 of the Canadian Security Intelligence
Service
Act, R.S.C. 1985, c. C-23
PLACE OF
HEARING: Ottawa,
Ontario
DATE OF
HEARING: June
30, 2005, December 20, 2005, January 11, 2006, March 10, 2006, March
31, 2006, May 10, 2006, May 12, 2006
REASONS FOR ORDER
AND ORDER: The Honourable Mr. Justice Simon Noël
DATED: July
13, 2006
APPEARANCES:
Mr. John
O’Halloran
Mr. Robert F.
Batt
|
For the Applicant
|
Mr. Ronald G.
Atkey, P.C., Q.C.
|
Amicus Curiae
|
SOLICITORS
OF RECORD:
Mr. John H.
Sims, Q.C.
Deputy
Attorney General of Canada
Ottawa, Ontario
|
For the Applicant
|
|
|