Judgments

Decision Information

Decision Content

TOP SECRET

CONF-3-17

2017 FC 1048

Docket: [***]

In the Matter of an Application by [***] for Warrants Pursuant to Sections 12 and 21 of the Canadian Security Intelligence Service Act, R.S.C., 1985, c. C-23

and

In the Matter of [***] Threat-Related Activities

and

Docket: [***]

In the Matter of an Application by [***] for Warrants Pursuant to Sections 12 and 21 of the Canadian Security Intelligence Service Act, R.S.C., 1985, c. C-23

and

In the Matter of Islamist Terrorism

Indexed as: X (Re)

Federal Court, Crampton C.J.—Ottawa, May 25, 26 and June 23; September 27, 2017.

Editor’s Note: Portions redacted by the Court are indicated by [***].

Security Intelligence — Applications concerning requests by Canadian Security Intelligence Service (CSIS) for warrants in relation to its investigation of activities suspected of constituting threats to security of Canada — CSIS requesting ability to obtain basic identifying information (BII) from communications services providers — CSIS seeking to add two additional authorizations to warrants previously issued by Court — At issue was whether Court can authorize CSIS to obtain BII in respect of: (1) communications accounts corresponding to telephone numbers or electronic identifiers that may in the future come to its attention in the course of its investigations; (2) communications accounts identified pursuant to its review of specifically defined information obtained in relation to certain individuals; (3) a communications account that corresponds to a telephone number or an electronic identifier where a “chief” within CSIS determines that the account was identified during its investigation, and that the BII would assist CSIS in its investigation. — Except in exceptional circumstances (not demonstrated herein), CSIS cannot be prospectively authorized to obtain BII in relation to communications accounts whose nexus with CSIS investigations not yet described, established — Persons responsible for authorizing use of intrusive powers required to consider impact of such intrusion on subject of search — Assessment having to be made of context of each particular situation, impact on individual — Balancing analysis having to be conducted between interests of state, specific individual whose privacy interests at issue — Appropriate balance with respect to first type of authorization sought (i.e. broad authorization) not met herein — CSIS not providing Court with any understanding of specific nexus between information sought, CSIS investigation — Court not having sufficient sense of nexus between identified threat-related activities, individual whose privacy rights would be encroached to be considered “reasonable” within meaning of Charter, s. 8 — Second group of requested amendments granted, although some conditions necessary to address certain issues — As to third issue raised herein, proposed authorizations impermissibly delegating to a “chief” within CSIS a function having to be performed by designated Federal Court judge — Only designated judge can make determination of whether grounds that must be established before specific individual’s privacy interests can be intruded upon met — Application in [***] dismissed; application in [***] dismissed in part.

These were applications concerning requests by the Canadian Security Intelligence Service (CSIS) for warrants in relation to its investigation of two separate groups of activities that may on reasonable grounds be suspected of constituting threats to the security of Canada.

The applications pertained to CSIS’s ability to obtain basic identifying information (BII) from communications services providers (CSPs). BII, consisting of the name and address of a subscriber, would be obtained in respect of communications accounts of individuals whose telephone number or other electronic identifiers may come to CSIS’s attention in the course of its investigations. In the absence of judicial pre-authorization, CSIS cannot obtain BII without contravening a person’s right to be secure against unreasonable search or seizure, pursuant to section 8 of the Canadian Charter of Rights and Freedoms. The Court advised CSIS in X (Re), 2016 FC 1105, [2017] 2 F.C.R. 396 (X (Re)) that broad authorizations of the type being sought in the present proceedings would no longer be granted until they were the subject of further exchanges between the Court and CSIS. Given the position taken by the Court in X (Re) with respect to broad authorizations to obtain access to subscriber data, CSIS’s application in [***] was separated into two phases. The first phase focused on warrant powers that CSIS sought in respect of individuals who are subjects of its investigation into the threat to the security of Canada. The Court issued the warrants that were sought at that time. The second phase concerned two additional authorizations that CSIS sought to add to three of the warrants that the Court issued in the initial phase. The first of those authorizations was very broad and would enable CSIS to obtain BII in respect of any communications account corresponding to any telephone number or electronic identifier that CSIS may identify during its investigation into Islamist terrorism, where a chief within CSIS determines that BII will assist CSIS to advance its investigation. The second type of authorization was narrower, and would enable CSIS to obtain BII in respect of communications accounts identified pursuant to its review of specifically defined information obtained in relation to named individuals.

At issue was whether the Court can authorize CSIS to obtain BII in respect of: (1) communications accounts corresponding to telephone numbers or electronic identifiers that may in the future come to its attention in the course of its investigations; (2) communications accounts identified pursuant to its review of specifically defined information obtained in relation to certain individuals; and (3) a communications account that corresponds to a telephone number or an electronic identifier where a “chief” within CSIS determines that the account was identified during its investigation, and that the BII would assist CSIS in its investigation.

Held, the application in [***] should be dismissed; the application in [***] should be dismissed in part.

The broad authorization that CSIS sought in the first type of proposed amendments to three of the warrants that were issued in the first phase could not be provided. Privacy interests are held by individuals and corporations. The words “the identity of the person, if known” in paragraph 21(2)(d) of the Canadian Security Intelligence Service Act (Act) reflects the practical reality that CSIS may not know, at the time it applies for a warrant, the identity of an ascertainable person whose communication is proposed to be intercepted, or who has possession of the information, record, document or other thing proposed to be obtained under the warrant, as contemplated by that provision. Except in exceptional circumstances that were not demonstrated to exist in this case, CSIS cannot be prospectively authorized to obtain BII in relation to communications accounts that may in the future come to its attention in the course of its investigations, where CSIS has not yet described and established their specific nexus with those investigations. This is because persons who are responsible for authorizing the use of intrusive powers are required to consider the impact of such intrusion on the specific “subject of the search”. In other words, an assessment must be made of the context of each “particular situation”, and its impact on “the individual”. A balancing analysis must be conducted between the interests of the state and the interests of the specific individual whose privacy interests are at issue. Where a “class of persons” whose privacy interests may be encroached upon can be described in a manner that enables the Court to clearly understand the nexus between those persons and the threat-related activities that are the focus of a CSIS investigation, the balancing analysis can comfortably be conducted in respect of those persons. This is contemplated by the references to “class of persons” in paragraphs 21(2)(e) and 21(4)(c) of the Act. The need to consider the interests of the specific individual or class of individuals whose privacy interests are engaged is reinforced by three additional requirements: (1) the requirement to assess the individual’s subjective expectation of privacy, (2) the requirement that CSIS’s powers to investigate activities that pose threats to the security of Canada must be “strictly controlled”, and (3) the requirement to consider “the totality of the circumstances”. The last requirement implies that the interests of the specific person(s) whose privacy interests are at stake must be taken into account. It is difficult to imagine how the totality of the circumstances would not involve an assessment of the privacy interests of the very individual whose interests would be engaged if CSIS were to obtain BII from a CSP. It is not necessary for warrants that authorize CSIS to obtain BII to associate the communications accounts in question with named individuals. CSIS may know sufficient information about the individual to provide the Court with reasonable grounds to believe that obtaining the BII of a particular communications accounts is required to advance its investigation. It will remain open to CSIS, when it does not have the telephone number or other identifier at the time of a warrant application for authorization to obtain BII, to describe the telephone number or identifier in a way that enables the Court to satisfy itself of the matters referred to in paragraphs 21(2)(a) and (b) of the Act. With respect to the reasonable grounds to believe referred to in paragraph 21(2)(a), it may suffice to provide the Court with an understanding of the nexus between CSIS’s investigation and the specific individual whose privacy interests would be intruded upon. For example, it may suffice to describe a telephone number in terms of a future communication by a subject of investigation. This would meet the requirements of both section 21 of the Act and section 8 of the Charter, and would strike an appropriate balance between the public interest in affording CSIS with a reasonable degree of flexibility to fulfill its statutory mandate, and the privacy interests of yet-to-be identified individuals whose BII would be obtained under a warrant.

It was apparent that the appropriate balance was not met with the first type of amendments, i.e. the broad authorization, that were proposed to three of the warrants. CSIS did not provide the Court with any understanding whatsoever of the specific nexus between (i) the as-yet-to be discovered telephone numbers and electronic identifiers in respect of which BII would be sought, and (ii) CSIS’s investigations. The loosely defined “nexus” was simply too broad and nebulous. The Court could not be satisfied that such BII information was required to enable CSIS to investigate the threat to the security of Canada posed by Islamist terrorism, as contemplated by paragraph 21(2)(a) of the Act. The language of the proposed warrant did not enable the Court to know with which of the identified groups a communications account would be associated. This did not permit the Court to have a sufficient sense of the nexus between the identified threat-related activities of Islamist terrorism and the individual whose privacy rights would be encroached upon to be considered “reasonable” within the meaning of section 8 of the Charter.

The second group of requested amendments to three of the warrants to enable CSIS to obtain BII in respect of communications accounts of third parties that may be identified pursuant to its review of the information of the identified individuals was granted. There was concern, however, of the potentially large number of third parties whose BII may be obtained by CSIS. Some conditions would be necessary to address these issues.

As to the third issue raised in the applications, the proposed authorizations would impermissibly delegate to a person holding the position of “chief” within CSIS a function that must be performed by a designated judge of the Court. Persons holding the position of “chief” within CSIS would, in essence, make the determination of whether the grounds that must be established before a specific individual’s privacy interests can be intruded upon, have been met. Only a designated judge can make such determinations. An authorization for CSIS to engage in what amounts to a search that is more than minimally invasive must be given by an entirely neutral and impartial arbiter who is capable of acting judicially in balancing the interests of the state against those of the individual. An individual holding the position of chief within CSIS is not capable of acting judicially in this regard. All of the foregoing was rendered even more troublesome by (i) the very broad definition of Islamist terrorism that CSIS has adopted, (ii) the fact that CSIS would indefinitely retain all of the BII that it seeks to obtain under the requested authorizations, and (iii) that there would be no limit on CSIS’s ability to share that information with foreign intelligence agencies.

STATUTES AND REGULATIONS CITED

Canadian Charter of Rights and Freedoms, being Part I of the Constitution Act, 1982, Schedule B, Canada Act 1982, 1982, c. 11 (U.K.) [R.S.C., 1985, Appendix II, No. 44], s. 8.

Canadian Security Intelligence Service Act, R.S.C., 1985, c. C-23, ss. 2 “threats to the security of Canada”, 12, 21.

Criminal Code, R.S.C., 1985, c. C-46.

CASES CITED

APPLIED:

R. v. Spencer, 2014 SCC 43, [2014] 2 S.C.R. 212; Hunter et al. v. Southam Inc, [1984] 2 S.C.R. 145, (1984), 55 A.R. 291.

CONSIDERED:

X (Re), 2016 FC 1105, [2017] 2 F.C.R. 396; Charkaoui v. Canada (Citizenship and Immigration), 2008 SCC 38, [2008] 2 S.C.R. 326; R. v. Chehil, 2013 SCC 49, [2013] 3 S.C.R. 220; R. v. Thompson, [1990] 2 S.C.R. 1111, (1990), 73 D.L.R. (4th) 596.

REFERRED TO:

R. v. Gomboc, 2010 SCC 55, [2010] 3 S.C.R. 211; Goodwin v. British Columbia (Superintendent of Motor Vehicles), 2015 SCC 46, [2015] 3 S.C.R. 250; Baron v. Canada, [1993] 1 S.C.R. 416, (1993), 99 D.L.R. (4th) 350; R. v. Rodgers, 2006 SCC 15, [2006] 1 S.C.R. 554; Atwal v. Canada, [1988] 1 F.C. 107, (1987), 28 Admin. L.R. 92 (C.A.); R. v. Poirier, 2016 ONCA 582 (CanLII), [2016] O.J. No. 3873 (QL); R. v. Noseworthy (1997), 33 O.R. (3d) 641, 116 C.C.C. (3d) 376 (C.A.); R. v. TELUS Communications Co., 2013 SCC 16, [2013] 2 S.C.R. 3; Canadian Security Intelligence Act (Re), [1998] 1 F.C. 420, (1997), 10 C.R. (5th) 273 (T.D.); Grabowski v. The Queen, [1985] 2 S.C.R. 434, (1985), 22 D.L.R. (4th) 725; R. v. Généreux, [1992] 1 S.C.R. 259, (1992), 88 D.L.R. (4th) 110.

AUTHORS CITED

Canada. Senate. Report of the Special Senate Committee on the Canadian Security Intelligence Service. Delicate Balance: A Security Intelligence Service in a Democratic Society. Ottawa: Minister of Supply and Services Canada, November 3, 1983.

APPLICATIONS concerning requests by the Canadian Security Intelligence Service for warrants in relation to its investigation of two separate groups of activities that may on reasonable grounds be suspected of constituting threats to the security of Canada. Application in [***] dismissed; application in [***] dismissed in part.

APPEARANCES

Karla Unger, Gordon Kirk and Nathalie Benoit for Department of Justice, National Security Litigation and Advisory Group.

Gordon Cameron and Owen Rees as amici curiae.

SOLICITORS OF RECORD

Deputy Attorney General of Canada for Department of Justice, National Security Litigation and Advisory Group.

The following are the public reasons for judgment and judgment rendered in English by

Crampton C.J.:

Table of Contents

Section

Paragraph

I.     Introduction

1–16

II.     Background

17–30

III.    The BII Authorizations Requested by CSIS

31–41

IV.   Issues

42–47

V.   Analysis

48–102

A.    Applicable legal principles

48–54

B.    Can the Court authorize CSIS to obtain BII in respect of communications accounts corresponding to telephone numbers or electronic identifiers that may in the future come to its attention in the course of its investigations, where CSIS has not described and established their specific nexus to those investigations?

55–78

(1)  General

55–69

(2)  The BII Warrant and the first type of proposed amendments to the warrants issued in [***]

70–78

C.   Can the Court authorize CSIS to obtain BII in respect of communications accounts identified pursuant to its review of specifically defined information obtained in relation to [***] named individuals and [***] additional individuals who have been identified by reference to [***]

79–87

D.   Can the Court authorize an employee of CSIS to obtain BII of a communications account that corresponds to a telephone number or an electronic identifier, where a “chief” within CSIS determines that the account was identified during its investigation, and that the BII would assist CSIS in its investigation?

88–102

VI.   Conclusion

103–111

APPENDIX I

 

I.          Introduction

[1]        These applications concern requests by the Canadian Security Intelligence Service (CSIS) for warrants in relation to its investigation of two separate groups of activities that I am satisfied may on reasonable grounds be suspected of constituting threats to the security of Canada. CSIS has defined the first group in terms of “Islamist terrorism”. Those activities are the focus of the application in Court file [***] The second group consists of certain activities engaged in by [***] Those activities are described in materials filed by CSIS in Court file [***]

[2]        The applications raise three issues pertaining to CSIS’s request to be able to obtain basic identifying information (BII) from communications services providers (CSPs). That information would be obtained in respect of communications accounts of individuals whose telephone number, [***] or other electronic identifiers may in the future come to CSIS’s attention in the course of its investigations of the activities described above. BII consists of the name and address of a subscriber to a communications account, [*** [The information relating to IP addresses in certain circumstances] ***]

[3]        The Attorney General concedes that in the absence of judicial pre-authorization, CSIS cannot obtain BII in respect of a person’s communications account without contravening that person’s right to be secure against unreasonable search or seizure, pursuant to section 8 of the Canadian Charter of Rights and Freedoms, being Part I of the Constitution Act, 1982, Schedule B, Canada Act 1982, 1982, c, 11 (U.K.) [R.S.C., 1985, Appendix II, No. 44] (the Charter).

[4]        Accordingly, the focus of these applications has been upon a broad BII authorization that CSIS is seeking in each of [***] and [***], a narrower BII authorization that it is seeking in [***] alone, and a delegation issue that exists with respect to the first of those two authorizations. More specifically, the three issues raised by these applications are as follows:

i.     Can the Court authorize CSIS to obtain BII in respect of communications accounts corresponding to telephone numbers or electronic identifiers that may in the future come to its attention in the course of its investigations, where CSIS has not described and established their specific nexus to those investigations? (This is a common issue in both applications.)

ii.    Can the Court authorize CSIS to obtain BII in respect of communications accounts identified pursuant to its review of specifically defined information obtained in relation to [***] named individuals and [***] additional individuals who have been identified by [***] (This issue arises only in [***]

iii.   Can the Court authorize an employee of CSIS to obtain BII in respect of a communications account that corresponds to a telephone number or an electronic identifier, where a “chief” within CSIS determines that the account was identified during its investigation, and that the BII would assist CSIS in its investigation? (This is a common issue in both applications.)

[5]        In my view, the Court cannot provide the first of the requested authorizations described above. It does not meet the basic requirements for authorizing intrusive activity by the state.

[6]        Before the Court may authorize CSIS to obtain BII or to exercise other intrusive search powers, the Court must have an understanding of the nexus between CSIS’s investigation and the specific persons or class of persons whose privacy rights would be engaged. Only then can the Court assess whether the specific privacy interests of those persons must give way to the interests of the state in obtaining the information in question. In addition, CSIS must satisfy the requirements for obtaining a warrant set forth in subsections 21(2) and (3) of the Canadian Security Intelligence Service Act, R.S.C., 1985, c. C-23 (the Act), in respect of such person or class of persons.

[7]        The Court has not been provided with that required understanding of the nexus described above in respect of the broad BII authorization that CSIS is seeking in both [***] and [***] Indeed, the Court has not been provided with any sense whatsoever as to how the individual or class of individuals whose privacy interests would be intruded upon would be linked to its investigations.

[8]        With respect to the second, narrower, BII authorization that CSIS has requested in [***] alone, I am satisfied that the required nexus has been described and established by CSIS. This is because that authorization is confined to telephone numbers or electronic identifiers that CSIS may identify in the course of reviewing information that specifically relates to [***] identified individuals who are subjects of investigation. [***] of those individuals have been identified by name, while the remaining [***] have been identified by reference to [***]

[9]        The information that relates to those individuals includes BII [***] information will reveal the [***] identifiers [***]

[10]      I am satisfied that there are reasonable grounds to believe that anyone with whom those [***] individuals has been in contact may be able to provide information that will assist CSIS to advance its investigation into the threat-related activities [***] that it has identified. For this reason, I am satisfied that there are reasonable grounds to believe that CSIS requires the BII relating to the communications accounts that correspond to the telephone numbers and electronic identifiers of those third parties, to advance its investigation. Without being able to obtain that BII, [***]

[11]      Although the Court has not been provided with the names of [***] of those individuals, the Court has been provided with sufficient information regarding [***] to be able to conduct the assessment required by section 8 of the Charter. That assessment is whether the specific privacy interests of those individuals must give way to the interests of the state in obtaining the BII that CSIS requires to advance its investigation into the identified threat-related activities [***]

[12]      At the time it issues a warrant authorizing the exercise of powers that would intrude upon the privacy interests of one or more individuals or classes of persons, the Court does not need to know the specific names of those individuals or persons within the class. However, the Court needs to have a sufficient understanding of the nexus between CSIS’s investigation and the specific persons or class of persons whose privacy interests would be intruded upon. The Court has been provided with that understanding in respect of the [***] individuals [***] have been described to the Court, as well as in respect of the third parties who CSIS may discover have been in contact with those individuals, or with the [***] other individuals who have been identified by name.

[13]      Where the Court is not able to conduct, in advance, the assessment required by section 8 of the Charter in respect of the specific individuals or class of individuals whose privacy interests would be engaged by CSIS’s access to their BII, CSIS will need to return to the Court each time it identifies additional telephone numbers or electronic identifiers in respect of which it wishes to obtain BII from a CSP. At that time, CSIS will have to establish a sufficient nexus between the telephone number or other identifier in question and its investigations to satisfy the Court that there are reasonable grounds to believe that CSIS requires the BII of the corresponding communications account to advance those investigations.

[14]      The third issue raised in these proceedings is whether the Court can authorize any employee of CSIS to obtain BII in respect of a communications account, where an individual holding the position of chief within CSIS makes certain determinations. In my view, the Court cannot do so, because this would amount to the delegation of functions that must be exercised by the Court itself. Although the Court may delegate to CSIS certain types of decisions with respect to the execution of its warrants, it cannot delegate the determination of which specific communications accounts will be the subject of requests to CSPs for BII. To the extent that this determination requires an assessment of whether the privacy interests of the persons in question must give way to the interests of CSIS in obtaining the BII in question, this is a function that must be performed by the Court.

[15]      I recognize that the conclusions I have reached in respect of the first and third issues discussed above may well impose a potentially significant additional burden on CSIS. I also recognize that this may give rise to additional costs and delays associated with obtaining BII authorizations in relation to telephone numbers or electronic identifiers that may come to CSIS’s attention during the course of its investigations into Islamist terrorism and the threat-related activities [***] Given the adverse implications that the potential delays, in particular, may have for CSIS’s ability to investigate threat-related activities, the Court will remain open to considering alternate approaches that are Charter compliant.

[16]      These reasons for judgment are being issued contemporaneously with my reasons for judgment in [***] which concerns CSIS’s use of cellular-site simulator (CSS) technology to capture the identifying characteristics of an individual’s mobile device(s) without a warrant [***]

II.          Background

[17]      This Court has been authorizing CSIS to obtain subscriber and similar information from CSPs in respect of accounts corresponding to telephone numbers and electronic identifiers for many years. In most cases, such authorizations have been provided in respect of the [***] identifiers of known individuals who are subjects of investigation, or of third parties with whom such individuals may communicate. However, in some cases the Court has also authorized CSIS to obtain such information in respect of communications accounts of known, but still unidentified, individuals. For example, such authorizations have been provided in respect of individuals [***] The same is true with respect to the [***] identifiers of third parties with whom such known, but as yet unidentified, individuals have communicated, or may in the future communicate. Given that the [***] identifiers in question are not yet known at the time of the warrant application, they cannot be specified in the warrant.

[18]      The types of authorizations described above have always been provided in warrants that have focused primarily upon named subjects of investigation, also known as “targets”, and their involvement in particular threat-related activities. In some of those warrants, the Court also granted authorizations to obtain BII in relation to the communication accounts associated with [***] identifiers that CSIS identified during its investigation of the threat to the security of Canada in question, even where there was no direct link between such [***] identifiers and the target(s) identified in the warrants. There was simply the indirect link that existed by virtue of the fact that the [***] identifier would be identified in the future course of CSIS’s investigation of the same threat to the security of Canada with which the named targets were also connected.

[19]      However, beginning in 2013, some of my colleagues and I started to express concerns about granting the latter type of authorizations. After CSIS failed to avail itself of opportunities to address our concerns, we began to narrow the scope of the powers that we authorized. However, given that we did so in the context of individual applications for warrants, which sometimes had to be dealt with on an urgent basis, this gave rise to some inconsistencies in the language of the authorizations in question.

[20]      As a result of the foregoing, Justice Noël advised CSIS in X (Re), 2016 FC 1105, [2017] 2 F.C.R. 396 (X (Re)), at paragraph 230, that broad authorizations of the type being sought in the present proceedings, as well as authorizations to obtain [***] would no longer be granted by the Court until they were the subject of further exchanges between the Court and CSIS. Soon afterwards, in [***] I requested that CSIS endeavour to establish the legal basis for this Court to authorize such powers, in a separate proceeding. I explained that if CSIS could establish that legal basis, the powers in question could be authorized in a single application that would be made each year. Among other things, I considered that such an approach would avoid having to deal with CSIS’s requests for such broad authorizations in the context of multiple different applications made over the course of a year, that are otherwise focused on named subjects of investigation. I made the foregoing request after declining to issue such an authorization.

[21]      The application in [***] is CSIS’s response to my request and to Justice Noël’s decision. CSIS requested that I hear that application.

[22]      Given the position taken by Justice Noël in X (Re) with respect to broad authorizations to obtain access to subscriber data, CSIS’s application in [***] was separated into two phases. The first phase focused on warrant powers that CSIS sought in respect of individuals who are subjects of its investigation into the threat to the security of Canada posed by [***] That phase of the proceeding took place in February of this year, and was based on affidavit evidence provided by Mr. [***] After being satisfied that [***] is engaged in activities that may on reasonable grounds be suspected of constituting threats to the security of Canada, Justice Noël issued the warrants that were sought at that time.

[23]      At Justice Noël’s suggestion, the second phase of [***] took place before me, and concerned two additional authorizations that CSIS is seeking to add to three of the warrants that Justice Noël issued in the initial phase of that proceeding. The first of those authorizations is essentially the same as the sole, and very broad, authorization being sought in [***] (the BII Warrant). The second is much more focused, and would enable CSIS to obtain the BII corresponding to the communications accounts of third parties whose telephone number or electronic identifier has been linked to one or more of [***] named individuals, or to [***] unnamed individuals [***] At CSIS’s suggestion, the evidentiary hearings and oral submissions in this second phase of [***] as well as in [***] were held separately, but concurrently, on [***] and [***] of this year.

[24]      To preserve the status quo with respect to the BII-type power that is being sought in [***] in relation to the threat to the security of Canada posed by Islamist terrorism, I granted an interim order on [***] which provided CSIS with that authorization for 60 days, to permit me to complete this decision.[1]

[25]      In view of the nature of the legal issues raised in this application, the Court retained Mr. Gordon Cameron and Mr. Owen Rees to act as amici curiae.

[26]      Given that BII authorizations similar to those being requested in these applications may be sought in future proceedings before other designated judges of this Court, I considered it appropriate to convene the designated judges of the Court to join me on the bench, so that they would have the benefit of the evidence provided by the affiants, including on cross-examination by the amici. I also considered it to be important that they have the benefit of responses provided by the affiants to questions that any of them, or I, might pose. This should assist each of the designated judges of the Court in any future applications that may involve a request for a BII or similar authorization, and could reduce the need for similar evidence in those applications.

[27]      Notwithstanding the involvement of other designated judges of this Court in this proceeding, I assured CSIS and representatives of the Attorney General at the outset of the initial hearing on these applications that my judicial independence would not thereby be compromised in any way. I, and I alone, have decided the issues that have been raised in these applications.

[28]      Like several of my designated colleagues before me in previous applications dating back several years, I am satisfied that there are reasonable grounds to believe that activities that CSIS has defined as “Islamist terrorism” constitute a threat to the security of Canada, and that the same is true with respect to the threat-related activities engaged in by [***] that CSIS has identified.

[29]      Accordingly, the balance of these reasons for judgment will focus on the three issues that are identified at paragraph 4 above.

[30]      In passing, and for completeness, I will add that CSIS informed the Court earlier this year that it did not intend to seek or address in either [***] or [***] the [***] that was referred to in X (Re), above. The Court understands that CSIS may return to the Court to make separate submissions in respect of that power at a future date, and that CSIS will not in the meantime be seeking any authorizations to use that power in respect of [***] communications accounts that correspond to telephone numbers or electronic identifiers that have no direct nexus with identified subjects of investigation.

III.         The BII Authorizations Requested by CSIS

[31]      The warrant that CSIS has requested the Court to issue in [***] consists of a single authorization. It is as follows:

I authorize the Director and any employee of the service acting under his authority to obtain BII relating to any account with a CSP where a Chief determines that

a)    the account was identified during the investigation of Islamist terrorism and

b)    the identity of the subscriber to the account will assist in the investigation of Islamist terrorism.

[32]      “BII” is defined in the warrant to mean:

i.     The name of a subscriber to an account;

ii.    The subscriber’s address;

[***[The information relating to IP addresses in certain circumstances]***]

[33]      In essence, this authorization would enable CSIS to obtain BII in respect of any communications account corresponding to any telephone number or electronic identifier that CSIS may identify during its investigation into Islamist terrorism, where a chief within CSIS determines that BII will assist CSIS to advance its investigation.

[34]      The Attorney General analogizes this authorization to a power to obtain “telephone book” information, which traditionally has been required to identify individuals. The Attorney General, the affiant in [***] and the affiant in [***] each maintained that this was the sole purpose of the BII authorization being requested. In this regard, they emphasized that the BII authorization is not used to track online activity. The Attorney General added that if CSIS wanted to exercise such a power or indeed any other intrusive powers in respect of a person, it would have to return to the Court to seek specific authorizations to do so.

[35]      The BII Warrant that has been requested in [***] also provides that if, in executing the warrant, CSIS provides [***] CSIS shall also provide [***] Islamist terrorism. This requirement has been included as a safeguard to help ensure that BII is provided in respect of the correct account, [***]

[36]      For the purposes of the BII Warrant, “Islamist terrorism” is defined to mean “activities in paragraph (c) of the definition of ‘threats to the security of Canada’ found in section 2 of the Act [***] including activities of the [***]

[37]      Both Mr. [***] and Mr. [***] testified that an authorization to obtain BII is crucial to CSIS’s ability to investigate the threats to the security of Canada posed by the activities [***] and Islamist terrorism. This is because this may be the only manner in which CSIS can identify a person who is behind a phone number [***[or an electronic identifier]***] In addition, the ability to identify individuals and assess the nature of their relationship to Islamist terrorism or to the threat-related activities [***] is a fundamental building block of an investigation. This is particularly so given that many people associated with the threats in question interact exclusively or primarily by electronic means, and may never meet in person. According to Mr. [***] “identification is [***] part of the job”, and [***] He emphasized that, without being able to identify someone, CSIS would not be able to fulfill its mandate.

[38]      According to Mr. [***] the 2014-2016 Intelligence Priorities for CSIS from the Minister of Public Safety [***]

[39]      The BII authorizations that CSIS is seeking in the amendments that it has requested be made to three of the warrants were issued in the first phase of [***] are of two types. The first type would provide essentially the same broad power that is being sought in [***] That is to say, it would provide essentially the same authorization as is being requested in the BII Warrant, albeit in respect of communications accounts that are identified during CSIS’s investigation of the threat-related activities [***] that it has described.

[40]      The second type of authorization that CSIS is seeking to add to three of the warrants that have been issued in [***] is much narrower. In brief, it would authorize CSIS to obtain BII in respect of communications accounts identified pursuant to its review of specifically defined information obtained in relation to [***] named individuals and [***] additional individuals who [***]

[41]      It bears underscoring that no individuals are named in the BII Warrant being sought in [***] or in the first group of amendments that CSIS is seeking to add to three of the warrants that have been issued in [***] In the words of Mr. [***] “the warrant itself is not [***] it’s against Islamist terrorism”. Likewise, the amendments sought to three of the warrants issued in [***] are directed towards the threat-related activities [***].

IV.        Issues

[42]      As explained at paragraph 4 above, the applications in [***] and [***] raise the following three issues:

i.     Can the Court authorize CSIS to obtain BII in respect of communications accounts corresponding to telephone numbers or electronic identifiers that may in the future come to its attention in the course of its investigations, where CSIS has not described and established their specific nexus to those investigations?

ii.    Can the Court authorize CSIS to obtain BII in respect of communications accounts identified pursuant to its review of specifically defined information obtained in relation to [***] named individuals and [***] additional individuals who have been identified [***]

iii.   Can the Court authorize an employee of CSIS to obtain BII in respect of a communications account that corresponds to a telephone number or an electronic identifier, where a “chief” within CSIS determines that the account was identified during its investigation, and that the BII would assist CSIS in its investigation?

[43]      In both [***] and [***] the Attorney General raised an additional issue, namely, the threshold issue of whether a warrant is required to obtain BII from a CSP. However, in each proceeding, the Attorney General conceded that a warrant is required to obtain BII from a CSP, because it may engage privacy rights that are protected by section 8 of the Charter. This is because “[***] information can be revealed to [CSIS] when BII is obtained from CSPs”. Indeed, this was demonstrated by a number of examples included in the Attorney General’s written submissions.

[44]      The amici agreed. They maintained that, in view of the fact that CSIS may well be able to use BII [***] to link previously anonymous [***] activity to a named individual, such activity by CSIS would normally require a warrant. I agree.

[45]      Given the Attorney General’s acknowledgement that a warrant is required to access BII from a CSP, it is unnecessary to address this issue in detail. I will simply note that the linking of previously anonymous [***] activity to an individual’s identity “engages a high level of informational privacy” (R. v. Spencer, 2014 SCC 43, [2014] 2 S.C.R. 212 (Spencer), at paragraph 51). As such, obtaining the information to make such a link, [***] would constitute a “search” that is more invasive than the minimally intrusive warrantless searches that are authorized by section 12 of the Act.

[46]      The same is true with respect to telephone numbers, which can assist CSIS to obtain valuable personal information about a person. This was corroborated by one of the examples provided by Mr. [***] in his affidavit.

[47]      I will simply add that the Attorney General’s position that a warrant is required to obtain BII is consistent with the position that she took in [***] where she stated on multiple occasions that a warrant would be required to obtain subscriber information pertaining to any identifiers [***]

V.        Analysis

A.   Applicable legal principles

[48]      Section 8 of the Charter provides that “[e]veryone has the right to be secure against unreasonable search or seizure.”

[49]      It follows that section 8 of the Charter does not afford protection against all searches, only against unreasonable ones (R. v. Gomboc, 2010 SCC 55, [2010] 3 S.C.R. 211, at paragraph 20).

[50]      In assessing whether a search is “unreasonable”, courts must adopt “a purposive approach … that emphasizes the protection of privacy as a prerequisite to individual security, self-fulfilment and autonomy as well as to the maintenance of a thriving democratic society” (Spencer, above, at paragraph 15).

[51]      Broadly speaking, a determination of whether a search is unreasonable requires a balancing assessment of “whether in a particular situation the public’s interest in being left alone by government must give way to the government’s interest in intruding on the individual’s privacy in order to advance its goals” (Hunter et al. v. Southam Inc., [1984] 2 S.C.R. 145 (Hunter), at pages 159–160).

[52]      Given that the underlying purpose of section 8 is to protect individuals from unjustified state intrusions upon their privacy, prior authorization of those intrusions is presumptively required. Such authorization must be given by an entirely neutral and impartial arbiter who is capable of acting judicially in balancing the interests of the state against those of the individual (Spencer, above, at paragraph 68; Goodwin v. British Columbia (Superintendent of Motor Vehicles), 2015 SCC 46, [2015] 3 S.C.R. 250 (Goodwin), at paragraph 56; Hunter, above, at pages 160–162).

[53]      In addition, the neutral arbiter must be satisfied that the person seeking the authorization has reasonable grounds, established under oath, to believe that the relevant statutory or other conditions to be met before the search power may be exercised, have in fact been met (Hunter, above, at pages 166–168).

[54]      In deciding whether to issue a warrant, the neutral arbiter must have sufficient flexibility to consider all of the circumstances that may be relevant to the exercise of discretion to issue the warrant, and to impose any conditions that may be considered necessary (Baron v. Canada, [1993] 1 S.C.R. 416 (Baron), at paragraphs 437, 439 and 440).

B.   Can the Court authorize CSIS to obtain BII in respect of communications accounts corresponding to telephone numbers or electronic identifiers that may in the future come to its attention in the course of its investigations, where CSIS has not described and established their specific nexus to those investigations?

(1)   General

[55]      In her written and oral submissions, the Attorney General characterized this issue as being whether the Act authorizes a judge of this Court to issue warrants against “threat-related activities”.

[56]      In support of her position that the Act is sufficiently flexible to allow for the issuance of warrants in respect of activities, the Attorney General notes that section 12 of the Act empowers CSIS to investigate activities, and that the definition of “threats to the security of Canada” that is set forth in section 2 of the Act also refers to activities, without any reference to the persons who would be conducting those activities. The Attorney General further notes that paragraph 21(2)(d) requires a warrant application to be accompanied by an affidavit that addresses various issues, including “the identity of the person, if known, whose communication is proposed to be intercepted or who has possession of the information, record, document or thing proposed to be obtained” (emphasis added).

[57]      The Attorney General submits that it may be inferred from all of the foregoing that warrants issued pursuant to section 21 of the Act can be obtained to investigate identified threat-related activities. She maintains that this is so even where the warrant does not name any individuals or describe the specific nexus between CSIS’s investigation and the individuals whose privacy interests would be intruded upon.

[58]      I disagree. With respect, that position confuses the activities that CSIS is authorized to investigate under section 12 of the Act, with the privacy interests that might be engaged by a warrant issued under section 21 in connection with an investigation. Privacy interests are not held by activities or threats, such as those posed by [***] or “Islamist terrorism”, or in respect of an event that might be the focus of an investigation, such as the Vancouver Olympics or the G7 meeting that took place in Toronto.

[59]      Privacy interests are held by individuals and corporations, whether they be subjects of investigation, persons whose connection to an investigation may remain to be ascertained, or persons who might, on reasonable grounds, be believed to have information that is likely to assist an investigation. In my view, the words “the identity of the person, if known” (emphasis added) in paragraph 21(2)(d) simply reflects the practical reality that CSIS may not know, at the time it applies for a warrant, the identity of an ascertainable person whose communication is proposed to be intercepted, or who has possession of the information, record, document or other thing proposed to be obtained under the warrant, as contemplated by that provision.

[60]      Accordingly, the more relevant question that arises in these proceedings is whether CSIS can be prospectively authorized to obtain BII in relation to communications accounts that may in the future come to its attention in the course of its investigations, where CSIS has not yet described and established their specific nexus with those investigations. In my view, the answer is “no, except in exceptional circumstances that have not been demonstrated to exist in this case”.

[61]      This is because persons who are responsible for authorizing the use of intrusive powers are required to consider the impact of such intrusion on the specific “subject of the search” (Hunter, above, at page 157; Spencer, above, at paragraph 36 (emphasis added)). In other words, an assessment must be made of the context of each “particular situation”, and its impact on “the individual.” As the amici underscored, the balancing analysis to be conducted is between the interests of the state and the interests of the specific individual whose privacy interests are at issue (Hunter, above, at pages 159–160, 161–162 and 167; Baron, above, at pages 435–436 and 437; R. v. Rodgers, 2006 SCC 15, [2006] 1 S.C.R. 554, at paragraph 27 (emphasis added)).

[62]      Where a “class of persons” whose privacy interests may be encroached upon can be described in a manner that enables the Court to clearly understand the nexus between those persons and the threat-related activities that are the focus of a CSIS investigation, the balancing analysis described above can comfortably be conducted in respect of those persons. In my view, this is contemplated by the references to “class of persons” in paragraphs 21(2)(e) and 21(4)(c) of the Act.

[63]      The need to consider the interests of the specific individual or class of individuals whose privacy interests are engaged is reinforced by three additional requirements that have been established by jurisprudence under section 8 of the Charter. The first is the requirement to assess the individual’s subjective expectation of privacy, when considering whether there is a reasonable expectation of privacy (Spencer, above, at paragraph 18). The second is the requirement that CSIS’s powers to investigate activities that pose threats to the security of Canada must be “strictly controlled” (Charkaoui v. Canada, 2008 SCC 38, [2008] 2 S.C.R. 326, at paragraph 22, quoting the Report of the Special Senate Committee on the Canadian Security Intelligence Service, Delicate Balance: A Security Intelligence Service in a Democratic Society, November 3, 1983, at paragraph 25; see also Baron, above, at pages 436–437). The third is the requirement to consider “the totality of the circumstances” (Spencer, above, at paragraph 18). In my view, this implies that the interests of the specific person(s) whose privacy interests are at stake must be taken into account. It is difficult to imagine how the totality of the circumstances would not involve an assessment of the privacy interests of the very individual(s) whose interests would be engaged if CSIS were to obtain BII from a CSP.

[64]      Notwithstanding the foregoing, it is not necessary for warrants that authorize CSIS to obtain BII to associate the communications accounts in question with named individuals. It is often precisely because CSIS does not know the name associated with a telephone number, [***[or electronic identifier]***] etc. that it needs to be able to obtain BII in respect of the corresponding communications account from a CSP.

[65]      Even though CSIS may not know an individual’s name, it may know sufficient information about the individual [***] to provide the Court with reasonable grounds to believe that obtaining the BII of a particular communications accounts is required to advance its investigation, as contemplated by paragraph 21(2)(a) of the Act. This may be because the individual behind a telephone number or electronic identifier appears to be engaged in activities that pose a threat to the security of Canada, or because he or she appears to be in a position to provide information that will assist CSIS to advance its investigation into those activities. I accept Mr. [***] testimony that obtaining BII, and thereby learning who is behind [***] identifiers [***] can assist CSIS to advance an investigation.

[66]      In such situations, it will suffice if CSIS can provide sufficient evidence about a telephone number or one of the types of other identifiers mentioned above to establish reasonable grounds to believe that CSIS requires the BII of the account corresponding to that number or identifier, to advance its investigation. In my experience, those grounds can often be established by providing the Court with a brief description of the context in which CSIS obtained the telephone number or other identifier in respect of which BII is sought. It is that specific context that can provide the Court with the nexus between the unidentified individual whose privacy rights will be engaged by the BII power, and CSIS’s investigation.

[67]      Where CSIS is not in possession of the telephone number or other identifier at the time of a warrant application for authorization to obtain BII information, it will remain open to CSIS to describe the telephone number or identifier in a way that enables the Court to satisfy itself of the matters referred to in paragraphs 21(2)(a) and (b) of the Act. With respect to the reasonable grounds to believe referred to in paragraph 21(2)(a), it may suffice to provide the Court with an understanding of the nexus between CSIS’s investigation and the specific individual(s) whose privacy interests would be intruded upon. For example, it may suffice to describe a telephone number in terms of a future communication by a subject of investigation. If there were reasonable grounds to believe that the subject of investigation may be engaged in activities that pose a threat to the security of Canada, there would be reasonable grounds to believe that the BII associated with the telephone numbers at each end of a future call placed or received by that individual is required to assist CSIS to advance its investigation of the threat-related activities of that person. Stated differently, this information would provide the Court with the reasonable basis contemplated by section 8 of the Charter on which to authorize CSIS to obtain the BII pertaining to the accounts of both the subject of investigation, and the yet-to-be identified third parties with whom he or she may communicate.

[68]      For the same reason, it may suffice for CSIS to describe a BII authorization that it may wish to seek, by reference to a [***[landline or electronic account]***] account that CSIS may in the future discover has been used by a subject of investigation. The same would apply with respect to [***[landline or electronic account]***] accounts that CSIS may in the future discover are used by individuals [***] Of course, CSIS would have to establish at the time it seeks the BII authorization in question that there are reasonable grounds to believe that persons [***] may have been associated with the threat-related activities in question.

[69]      In my view, the foregoing examples would meet the requirements of both section 21 of the Act and section 8 of the Charter. They strike an appropriate balance between the public interest in affording CSIS with a reasonable degree of flexibility to fulfill its statutory mandate, and the privacy interests of yet-to-be identified individuals whose BII would be obtained under a warrant. Among other things, those examples help to respond to the practical difficulty associated with threat-related activities in respect of future events (Atwal v. Canada, [1988] 1 F.C. 107 (C.A.), at page 127).

(2)   The BII Warrant and the first type of proposed amendments to the warrants issued in [***]

[70]      With the foregoing in mind, it should be readily apparent that the appropriate balance is not met with the BII Warrant that CSIS has sought in [***] or with the first type of amendments that have been proposed to three of the warrants that were issued in [***]

[71]      This is because the requested authorizations would permit CSIS to obtain BII in respect of any communications accounts that CSIS may identify over the course of very broadly defined investigations into threats to the security of Canada posed by Islamist terrorism and certain activities of [***] where CSIS simply determines that BII will assist it in its investigation. Among other things, CSIS has not provided the Court with any understanding whatsoever of the specific nexus between (i) the as-yet-to be discovered telephone numbers and electronic identifiers in respect of which BII would be sought, and (ii) CSIS’s investigations. The loosely defined “nexus” is simply too broad and nebulous (R. v. Chehil, 2013 SCC 49, [2013] 3 S.C.R. 220, at paragraphs 36 and 51). And it does not provide sufficient information for the Court to be satisfied that such BII information is required to enable CSIS to investigate the threat to the security of Canada posed by Islamist terrorism, as contemplated by paragraph 21(2)(a) of the Act.

[72]      As I have noted earlier, CSIS has described the threat to the security of Canada in [***] in terms of “activities in paragraph (c) of the definition of ‘threats to the security of Canada’ found in section 2 of the Act that are [***]

[73]      The language of the proposed BII Warrant does not enable the Court to know with which of the [***] identified [***] groups a communications account would be associated. Indeed, it does not even enable the Court to know the [***] to which the telephone number or identifier would pertain. In my view, this does not permit the Court to have a sufficient sense of the nexus between the identified threat-related activities of Islamist terrorism and the individual whose privacy rights would be encroached upon to be considered “reasonable” within the meaning of section 8 of the Charter.

[74]      This problem, which is fatal in and of itself, is exacerbated by the fact that one of the clauses in the BII Warrant that I initially assumed would limit, at least to some extent, the scope of the warrant, will not in fact have that effect. Specifically, I had assumed that the words “where a Chief determines that […] the identity of the subscriber to the account will assist in the investigation of Islamist terrorism”, would place some important limit on the scope of the warrant. However, Mr. [***] testified that obtaining BII will always assist CSIS’s investigation, even if it merely confirms that the individual who is identified through the BII is of no value to the investigation. Mr. [***] explained that even just eliminating a person from further consideration will invariably assist an investigation. The logical extension of that argument is that obtaining the BII corresponding to any and all accounts that are merely identified in the course of an investigation will always assist in that investigation.

[75]      I will pause here to observe that one of the consequences of a determination that the BII of any account will assist in CSIS’s investigation is that CSIS would retain collected information indefinitely. Another consequence is that such information may well be shared with a foreign intelligence agency.

[76]      The same problems exist with the first of the two types of BII authorizations that CSIS requested be added to three of the warrants that were issued in the first phase of [***] I recognize that the threat-related activities in [***] are more narrowly defined than they are in [***] as they are confined to activities of [***] that fall within paragraphs (a) and (b) of the definition of “threats to the security of Canada” set forth in section 2 of the Act. Nevertheless, to the extent that the language of the first group of authorizations sought in the requested warrant amendments in [***] is virtually identical to the language of the BII Warrant being sought in [***] it suffers from the same fatal flaw of overbreadth. This is because the Court has no understanding whatsoever of the specific nexus between the as-yet-to be discovered telephone numbers or electronic identifiers, and CSIS’s investigation.

[77]      In passing, I will pause to recognize that in exceptional circumstances, CSIS may require BII or similar information in a shorter timeframe than may be needed to obtain a warrant or an amendment to an existing warrant. One such circumstance was the focus of an [***] Warrant that was sought and granted in [***] There, Justice Noël recognized that CSIS needed to be able to investigate threat-related [***] Accordingly, he authorized CSIS to obtain subscriber information [***] during its investigation of the threat to the security of Canada in question, where a regional director general or his designated had reasonable grounds to believe that such information might assist in that investigation. [***] However, CSIS was then subject to a condition that required it to bring a further application to the Court, without delay, to execute the warranted powers in respect of any [***] all as defined in the warrant.

[78]      In my view, no exceptional situation of this nature, or any other nature, has been identified in these proceedings.

C.   Can the Court authorize CSIS to obtain BII in respect of communications accounts identified pursuant to its review of specifically defined information obtained in relation to [***] individuals and [***] additional individuals who have been identified [***]

[79]      This issue is raised solely in respect of the second type of BII authorization that CSIS has requested be added to three of the warrants in [***] This authorization would enable CSIS to obtain BII in respect of communications accounts identified pursuant to its review of specifically defined information obtained in relation to [***] named individuals and [***] additional individuals who have been identified [***]

[80]      In my view, this authorization does not suffer from the defects described in the preceding section above. It is perhaps for that reason that it was not the subject of significant submissions by the Attorney General or the amici in these applications. Accordingly, I will only deal with this type of authorization briefly.

[81]      In contrast to the first type of authorization sought in [***] and to the BII Warrant sought in [***] the Court has been provided with the information that it requires to grant the authorization. That is to say, it has been provided with sufficient information to have reasonable grounds to believe that the BII of the specific individuals whose privacy rights would be encroached upon is required to assist CSIS to advance its investigation into [***] threat-related activities.

[82]      Specifically, paragraph 10(a) of the [***] would authorize the Director of CSIS and any employee of CSIS acting under his authority to obtain BII in respect of any third party account with a CSP that CSIS may identify during its review of:

i. [***[the identified individuals]***];

ii.    [***]

iii.   [***]

iv.    [***]

[83]      CSIS seeks to include essentially the same authorization in paragraph 2(a) of the [***] and in paragraph 5(a) of the [***]

[84]      The information described at paragraph 82 above all relates directly to [***] individuals who are subjects of investigation. There are reasonable grounds to believe that those individuals may be engaged in activities that constitute threats to the security of Canada. Based on those facts, I am satisfied that CSIS has established reasonable grounds to believe that BII in respect of telephone numbers or electronic identifiers that it may identify, after reviewing the information described at paragraph 82 above, is required to enable CSIS to advance its investigation into the threat-related activities [***]

[85]      I will simply add in passing that I am satisfied that the other preconditions to obtaining a warrant, as set forth in paragraph 21(2)(b) of the Act, have been met.

[86]      In summary, I will grant the second group of requested amendments to three of the warrants that were previously issued by Justice Noël in [***] to enable CSIS to obtain BII in respect of communications accounts of third parties that may be identified pursuant to its review of the information of the identified individuals that is described at paragraph 82 above.

[87]      Nevertheless, I have a concern regarding the potentially large number of third parties whose BII may be obtained by CSIS, as a result of the execution of this BII authorization in respect of the [***] individuals who are targets [***] Those [***] respectively. Given the nature of [***] it is reasonably foreseeable that a potentially large number of members of the public who communicate with those individuals for entirely legitimate purposes will come within the scope of the BII authorization. And once subject to that authorization, their BII may be obtained by CSIS and retained indefinitely. Accordingly, it will be necessary to develop some conditions to address these issues.

D.   Can the Court authorize an employee of CSIS to obtain BII of a communications account that corresponds to a telephone number or an electronic identifier, where a “chief” within CSIS determines that the account was identified during its investigation, and that the BII would assist CSIS in its investigation?

[88]      The Attorney General submits that a judge of this Court has the required discretion to allow a designated employee within CSIS to determine whether prescribed circumstances have been met for CSIS to request and obtain BII from a CSP. In this regard, the Attorney General maintains that discretion may rest with those responsible for the execution of a warrant, because such discretion will frequently be necessary. For example, she notes that general warrants issued under the Criminal Code, R.S.C., 1985, c. C-46, often allow police a degree of discretion that is reasonably necessary to carry out a search (R. v. Poirier, 2016 ONCA 582 (CanLII), at paragraphs 34 and 49), to search things that are not identified in the warrant (R. v. Noseworthy (1997), 33 O.R. (3d) 641 (C.A.)), or to search during a timeframe that is not specified in the warrant (R. v. TELUS Communications Co., 2013 SCC 16, [2013] 2 S.C.R. 3, at paragraph 69).

[89]      The Attorney General asserts that the discretion being sought is appropriate because of several safeguards that have been put in place to ensure that there is only a minimal impact on any privacy rights that may be engaged as a result of CSIS obtaining access to BII, and to ensure compliance with what the Court will be authorizing. Those safeguards are as follows:

i.      Before making a request for BII from a CSP, CSIS will first try to confirm the identity of the subscriber in question by other means.

ii.     Each request for BII from a CSP [***]

iii.    Before a chief may approve a request for BII, he must be satisfied that the circumstances specified in the warrant exist, namely that (i) the telephone number or [***[electronic identifier]***] was identified in the course of the investigation in question, and (ii) obtaining the identity of the subscriber will assist in that investigation.

iv.    The BII authorization provides that, when CSIS [***]

v.     […]

vi.    CSIS will be required to destroy any information provided by a CSP that does not fall within the strict definition of BII.

[90]      The amici acknowledge that agents of the state such as CSIS may be accorded a certain degree of discretion with respect to the manner in which a warrant is executed, including the discretion to do what is reasonably necessary to execute the warranted powers, and some temporal flexibility. However, they maintain that the BII Warrant and the first type of proposed amendments to the warrants that were issued in [***] go far beyond the discretion that may be granted to CSIS with respect to the execution of the proposed warranted powers.

[91]      I agree. In my view, those proposed authorizations would impermissibly delegate to a person holding the position of “chief” within CSIS a function that must be performed by a designated judge of this Court (Canadian Security Intelligence Service Act (Re), [1998] 1 F.C. 420 (T.D.) , at paragraph 17). That function is the determination of which specific communications accounts will be the subject of requests to CSPs for BII. In the exercise of that function, persons holding the position of “chief” within CSIS would, in essence, make the determination of whether the grounds that must be established before a specific individual’s privacy interests can be intruded upon, have been met.

[92]      Only a designated judge can make such determinations in respect of the exercise of powers by CSIS that are more than minimally intrusive in nature. In conceding that a warrant is required to obtain the proposed authorizations, the Attorney General has also effectively conceded that those authorizations would be more than minimally intrusive in nature.

[93]      An authorization for CSIS to engage in what amounts to a search that is more than minimally invasive in nature must be given by an entirely neutral and impartial arbiter who is capable of acting judicially in balancing the interests of the state against those of the individual whose privacy rights would be encroached upon (Spencer, above, at paragraph 68; Goodwin, above, at paragraph 56; Hunter, above, at pages 160–162; R. v. Thompson, [1990] 2 S.C.R. 1111, at page 1134; Grabowski v. The Queen, [1985] 2 S.C.R. 434, at pages 445–446).

[94]      An individual holding the position of chief within CSIS is not capable of acting judicially in this regard, because such individuals cannot neutrally and impartially conduct that balancing exercise. As employees of CSIS, they are not neutral or independent in the sense required by the jurisprudence. In other words, the nature of their investigative functions “ill-accords with the neutrality and detachment necessary to assess whether the evidence reveals that the point has been reached where the interests of the individual must constitutionally give way to those of the state” (Hunter, above, at page 164; R. v. Généreux, [1992] 1 S.C.R. 259, at pages 311–312).

[95]      This is borne out by the testimony provided by Mr. [***] regarding the likely incentives of an individual holding the position of chief within CSIS. For example, at one point during the hearing, Mr. [***] stated:

I think the Chief’s incentive is the same as everybody else’s incentive. It’s to determine whether or not there is a threat activity going on, to determine whether or not there is a threat to national security, and if so, to be in a position to investigate it and thereby be able to inform the government.

[96]      In response to further questioning from the Court on this point, he stated:

To me the calculus on this one is very easy. The risk of not pursuing means I have a potential threat that I know nothing about, and I’m not willing to live with that.

[97]      Elsewhere, he observed:

… I am not sure that the risk that the Chief would be assessing would be the risk of doing it but perhaps the risk of not doing it.

If we had a situation where there is a piece of information that is missing from the puzzle and I believe as the Chief, if I am signing this, that to get that piece of information will advance my investigation and allow me to have a better overview of the situation, then the risk of not doing that is I can’t do my job. I can’t provide that value added advice to the Government of Canada. I can’t tell them what the threat is.

[98]      In my view, it is readily apparent from the foregoing passages of Mr. [***] testimony that a chief within CSIS would have a bias towards authorizing the obtaining of BII from a CSP any time that he thought that this would advance CSIS’s investigation. And as discussed at paragraph 74 above, Mr. [***] also testified that obtaining BII would always advance CSIS’s investigation, even where it simply assists CSIS to determine that the individual behind a telephone number or electronic identifier is not involved in threat-related activities, and therefore cannot provide information that will assist CSIS to advance its investigation.

[99]      In summary, this Court cannot authorize an employee within CSIS to obtain BII corresponding to a telephone or an electronic identifier, where a “chief” within CSIS determines that the account was identified during its investigation, and that the BII would assist CSIS in its investigation. Determinations as to which specific communications accounts may be the subject of requests to CSPs for BII must be made by a designated judge of this Court. Allowing such determinations to be made by a chief within CSIS would constitute an impermissible delegation of the Court’s responsibility to determine whether the grounds to be met before an individual’s privacy interests can be intruded upon, have been met. Moreover, chiefs within CSIS would not have the required degree of neutrality and impartiality to perform this important function.

[100]   In my view, all of the foregoing is rendered even more troublesome by (i) the very broad definition of Islamist terrorism that CSIS has adopted, (ii) the fact that CSIS would indefinitely retain all of the BII that it seeks to obtain under the requested authorizations, and (iii) the fact that there would be no limit whatsoever on CSIS’s ability to share that information with foreign intelligence agencies.

[101]   The defects identified above do not exist with respect to the second type of authorization that CSIS has sought in [***] This is because the Court is able to perform, in advance, the required balancing assessment in respect of the privacy rights of the ascertainable, but yet-to-be identified third parties behind those telephone numbers and electronic identifiers, and the interests of the state. As in Thompson, above, those yet-to-be identified third parties can be ascertained and circumscribed by reference to their communications with known subjects of investigation who have been identified in the warrant (Thompson, above, at pages 1134–1135).

[102]   In brief, once the Court is satisfied that there are reasonable grounds to believe that the identified individuals are engaged in activities that may pose a threat to the security of Canada, it has a specific basis upon which to be satisfied on that basis alone that there are reasonable grounds to believe that third parties, with whom the Identified Individuals are communicating, may have information that will assist CSIS to advance its investigation, and that, therefore, CSIS requires the BII in question in order to advance its investigation.

VI.        Conclusion

[103]   For the reasons set forth in Parts V.B and D above, the Court cannot provide the broad authorization that CSIS has sought in the BII Warrant and in the first type of proposed amendments to three of the warrants that were issued in the first phase of [***]

[104]   This is so for two principal reasons. First, CSIS has not established and described the specific and required nexus between (i) the future telephone numbers and electronic identifiers that it may identify, and in respect of which it would like to be authorized prospectively to obtain BII, and (ii) its investigations into Islamist terrorism, or the threat-related activities [***] respectively. The loosely defined “nexus” that CSIS has described is simply too broad and nebulous. Moreover, CSIS has not provided sufficient information for the Court to be satisfied that BII is required to enable it to investigate the threats to the security of Canada posed by Islamist terrorism and [***] as contemplated by paragraph 21(2)(a) of the Act.

[105]   Second, that proposed authorization would impermissibly delegate to a person holding the position of “chief” within CSIS a function that must be performed by a designated judge of this Court. That function is the determination of whether the grounds that must be established before a specific individual’s privacy interests can be intruded upon, have been met. Quite apart from the fact that this is a function that must be performed by a designated judge of this Court, a chief within CSIS is not capable of making the required determination in a neutral and unbiased manner, as required by section 8 of the Charter.

[106]   However, for the reasons set forth in Part V.C above, the Court is able to authorize the second group of amendments that CSIS has proposed be made to the warrants that were granted in [***] This is because CSIS has established reasonable grounds to believe that BII information in respect of telephone numbers or electronic identifiers that it may identify after reviewing the information described at paragraph 82 above, is required to enable CSIS to advance its investigation. That information all relates directly to [***] Identified Individuals who are subjects of investigation.

[107]   Given the conclusion that I have reached with respect to the BII Warrant and the first group of amendments that CSIS has proposed in [***] it will be necessary for CSIS to seek an authorization from the Court each time it identifies additional telephone numbers or electronic identifiers in respect of which it wishes to obtain BII from a CSP. At that time, CSIS will have to establish a sufficient nexus between the telephone number or other identifier in question and its investigation to satisfy the Court that there are reasonable grounds to believe that CSIS requires the BII of the corresponding communications account to advance its investigation.

[108]   This is subject to the proviso that CSIS need not return to the Court when it has already obtained an advance authorization to obtain the BII of communications accounts corresponding to the telephone numbers or electronic identifiers of ascertainable, but yet-to-be identified individuals, such as those described in paragraphs 65–69 and 101–102 above.

[109]   I recognize that the conclusion I have reached will likely impose an additional burden on CSIS. I also recognize that this may give rise to additional costs and delays associated with obtaining BII authorizations in relation to telephone numbers or electronic identifiers that may come to CSIS’s attention during the course of its investigations into Islamist terrorism and the threat-related activities [***] and which are not linked with a target that is the subject of a warrant. Given the adverse implications that the potential delays, in particular, may have for CSIS’s ability to investigate threat-related activities, the Court will remain open to considering alternate approaches that are Charter compliant.

[110]   In this regard, I note that CSIS already has an internal process in place that requires those who wish to seek warrant powers to explain why they require BII in respect of a telephone number or an electronic identifier that has been identified in the course of an investigation. Those explanations are provided in [***] forms, a number of examples of which were provided to the Court in the course of these applications. In my view, many of the examples of [***] forms provided to the Court contain sufficient information to provide the Court with reasonable grounds to believe that the BII in question was required to enable CSIS to investigate the threat-related activities of Islamist terrorism and [***]

[111]   I find it difficult to understand why it would require substantial time and effort to provide the Court with essentially the same information that has already been prepared by CSIS internally. If such information were simply provided by way of a supplementary affidavit, together with a proposed amendment to an existing warrant, the time and effort that would be required on CSIS’s part may not be unduly onerous at all.

JUDGMENT in [***]

THIS COURT’S JUDGMENT is that this application is dismissed.

JUDGMENT in [***]

THIS COURT’S JUDGMENT is that this application is dismissed in part.

Specifically:

1.    For the reasons provided in Parts V.B. and D. of the attached judgment and reasons, the following amendments that the Attorney General has sought to three of the warrants that were issued by Justice Noël during the first phase of this application will be not be granted:

i.     [***] new paragraph 10(b);

ii.    [***] new paragraph 5(b);

iii.   [***] new paragraph 2(b));

2.    For the reasons provided in Part V.C. of the attached judgment and reasons, the other amendments that the Attorney General has sought to the aforementioned warrants will be granted.

The present judgment and reasons shall, within seven days of receipt, be reviewed jointly by the amici curiae and the Attorney General with a view to making a joint recommendation to the Court regarding redactions to the version of the judgment and reasons that will be made public. The Attorney General and the amici must be guided by the open court principle in their consultation and determination. Any contentious issues shall be drawn to my attention or to the attention of another designated judge, if I am unable to exercise my judicial function.

APPENDIX I

Canadian Security Intelligence Service Act, R.S.C., 1985, c. C-23

Definitions

2 In this Act,

threats to the security of Canada means

(a) espionage or sabotage that is against Canada or is detrimental to the interests of Canada or activities directed toward or in support of such espionage or sabotage,

(b) foreign influenced activities within or relating to Canada that are detrimental to the interests of Canada and are clandestine or deceptive or involve a threat to any person,

(c) activities within or relating to Canada directed toward or in support of the threat or use of acts of serious violence against persons or property for the purpose of achieving a political, religious or ideological objective within Canada or a foreign state, and

(d) activities directed toward undermining by covert unlawful acts, or directed toward or intended ultimately to lead to the destruction or overthrow by violence of, the constitutionally established system of government in Canada,

but does not include lawful advocacy, protest or dissent, unless carried on in conjunction with any of the activities referred to in paragraphs (a) to (d). (menaces envers la sécurité du Canada)

Duties and Functions of Service

Collection, analysis and retention

12 (1) The Service shall collect, by investigation or otherwise, to the extent that it is strictly necessary, and analyse and retain information and intelligence respecting activities that may on reasonable grounds be suspected of constituting threats to the security of Canada and, in relation thereto, shall report to and advise the Government of Canada.

No territorial limit

(2) For greater certainty, the Service may perform its duties and functions under subsection (1) within or outside Canada.

Judicial Control 

Application for warrant

21 (1) If the Director or any employee designated by the Minister for the purpose believes, on reasonable grounds, that a warrant under this section is required to enable the Service to investigate, within or outside Canada, a threat to the security of Canada or to perform its duties and functions under section 16, the Director or employee may, after having obtained the Minister’s approval, make an application in accordance with subsection (2) to a judge for a warrant under this section.

Matters to be specified in application for warrant

(2) An application to a judge under subsection (1) shall be made in writing and be accompanied by an affidavit of the applicant deposing to the following matters, namely,

(a) the facts relied on to justify the belief, on reasonable grounds, that a warrant under this section is required to enable the Service to investigate a threat to the security of Canada or to perform its duties and functions under section 16;

(b) that other investigative procedures have been tried and have failed or why it appears that they are unlikely to succeed, that the urgency of the matter is such that it would be impractical to carry out the investigation using only other investigative procedures or that without a warrant under this section it is likely that information of importance with respect to the threat to the security of Canada or the performance of the duties and functions under section 16 referred to in paragraph (a) would not be obtained;

(c) the type of communication proposed to be intercepted, the type of information, records, documents or things proposed to be obtained and the powers referred to in paragraphs (3)(a) to (c) proposed to be exercised for that purpose;

(d) the identity of the person, if known, whose communication is proposed to be intercepted or who has possession of the information, record, document or thing proposed to be obtained;

(e) the persons or classes of persons to whom the warrant is proposed to be directed;

(f) a general description of the place where the warrant is proposed to be executed, if a general description of that place can be given;

(g) the period, not exceeding sixty days or one year, as the case may be, for which the warrant is requested to be in force that is applicable by virtue of subsection (5); and

(h) any previous application made under subsection (1) in relation to a person who is identified in the affidavit in accordance with paragraph (d), the date on which each such application was made, the name of the judge to whom it was made and the judge’s decision on it.

Issuance of warrant

(3) Notwithstanding any other law but subject to the Statistics Act, where the judge to whom an application under subsection (1) is made is satisfied of the matters referred to in paragraphs (2)(a) and (b) set out in the affidavit accompanying the application, the judge may issue a warrant authorizing the persons to whom it is directed to intercept any communication or obtain any information, record, document or thing and, for that purpose,

(a) to enter any place or open or obtain access to any thing;

(b) to search for, remove or return, or examine, take extracts from or make copies of or record in any other manner the information, record, document or thing; or

(c) to install, maintain or remove any thing.

Activities outside Canada

(3.1) Without regard to any other law, including that of any foreign state, a judge may, in a warrant issued under subsection (3), authorize activities outside Canada to enable the Service to investigate a threat to the security of Canada.

Matters to be specified in warrant

(4) There shall be specified in a warrant issued under subsection (3)

(a) the type of communication authorized to be intercepted, the type of information, records, documents or things authorized to be obtained and the powers referred to in paragraphs (3)(a) to (c) authorized to be exercised for that purpose;

(b) the identity of the person, if known, whose communication is to be intercepted or who has possession of the information, record, document or thing to be obtained;

(c) the persons or classes of persons to whom the warrant is directed;

(d) a general description of the place where the warrant may be executed, if a general description of that place can be given;

(e) the period for which the warrant is in force; and

(f) such terms and conditions as the judge considers advisable in the public interest.

Maximum duration of warrant

(5) A warrant shall not be issued under subsection (3) for a period exceeding

(a) sixty days where the warrant is issued to enable the Service to investigate a threat to the security of Canada within the meaning of paragraph (d) of the definition of that expression in section 2; or

(b) one year in any other case.



[1]  The last warrant that contained the BII authorization in respect of CSIS’s investigation into [***]

 You are being directed to the most recent version of the statute which may not be the version considered at the time of the judgment.