Judgments

Decision Information

Decision Content

Citation:

Harkat (Re), 2009 FC 204, [2009] 4 F.C.R. 370

DES-5-08

In the Matter of a certificate signed pursuant to subsection 77(1) of the Immigration and Refugee Protection Act, S.C. 2001, c. 27 (the Act);

In the Matter of the referral of that certificate to the Federal Court of Canada pursuant to subsection 77(1), sections 78 and 80 of the Act;

And in the Matter of Mohamed Harkat

Indexed as: Harkat (Re) (F.C.)

Federal Court, Noël J.—Ottawa, September 10, 11, 12, 15, 16, 17, 18 and 19; December 22, 2008.

Citizenship and Immigration — Exclusion and Removal — Inadmissible Persons — Security Certificate — Request to identify, produce for cross-examination covert human intelligence source(s) who provided information to Canadian Security Intelligence Service in relation to intelligence investigation into Mohamed Harkat’s activities (subject of security certificate) — Police informer privilege, innocence-at-stake exception not applicable in security certificate proceedings — However, analogous privilege may apply — Exception to that privilege limited to closed portion of security certificate proceeding where establishing need to know identity of source(s) to prevent flagrant denial of procedural fairness — Application of exception not established herein — Until proof of joint, informed waiver provided, Court must protect asserted privilege.

Security Intelligence — Civilian intelligence agency recruiting covert human intelligence source(s) who provided information in relation to intelligence investigation into Mohamed Harkat’s activities (subject of security certificate) — Police informer privilege, innocence-at-stake exception not applicable since source(s) not recruited by police, security certificate proceeding not criminal proceeding — But public policy justifications for analogous common-law privilege applying to relationship between covert human intelligence sources, Canadian Security Intelligence Service — Exception limited to closed portion of proceeding where special advocate establishing “need to know” identity of covert human intelligence source — Covert human intelligence source privilege, exception designed to balance rights of individuals, collective — Given approach taken in present case, special advocates not establishing procedural fairness denied by exception not applied.

Constitutional Law — Charter of Rights — Life, Liberty and Security — Public policy justifications for common law privilege analogous to police informer privilege — Privilege necessary to protect identities of covert human intelligence source(s) recruited by Canadian Security Intelligence Service during investigation into activities of person inadmissible to Canada on grounds of national security — Given nature of consequences to subject of security certificate, Charter, s. 7 justifying exception to privilege — That exception limited to closed portion of proceedings where special advocate establishing “need to know” identity of covert human intelligence source to prevent flagrant denial of justice which would bring administration of justice into disrepute — “Need to know” not established herein.

Criminal Justice — Evidence — Police informer privilege, innocence-at-stake exception reviewed — Not applicable to security certificate proceedings — Covert intelligence source(s) recruited by civilian intelligence agency, not police — Security certificate proceeding not criminal proceeding.

This was a request by the special advocates to have human source(s) identified and made available for cross-examination in the context of a security certificate proceeding. Mohamed Harkat was named in a certificate as a person inadmissible to Canada on grounds of national security under the Immigration and Refugee Protection Act (IRPA). The ministers’ evidence in support of the reasonableness of the certificate and the danger associated with Mr. Harkat included information provided by human source(s) to the Canadian Security Intelligence Service (CSIS) in relation to the investigation into Mr. Harkat’s activities. The special advocates appointed to represent Mr. Harkat’s interests wanted to cross-examine the covert human intelligence source(s) in order to test their credibility and possibly corroborate future explanations offered by Mr. Harkat in relation to his motives for coming to Canada. They proposed to conduct their cross-examination during a closed hearing. They also requested an opportunity to interview the human source(s) prior to any evidence being given during a closed hearing.

The issues were whether police informer privilege applied to security certificate proceedings and, if so, whether the “innocence-at-stake” exception established in criminal proceedings applied.

Held, the request should be denied.

The police informer privilege is designed to protect the confidential police informer and, in doing so, encourage others to come forward with essential information which will aid in the protection of the public at large. Once the privilege is properly invoked, the Court is obligated to protect the police informer’s identity. Even where the Crown does not invoke the privilege, the Court is under a duty to apply it. The only exception to this rule of law is where a person’s innocence is at stake.  This exception is only applicable in a criminal proceeding and is based on the principle that the “right of an individual accused to establish his or her innocence by raising a reasonable doubt as to guilt is paramount.” Police informer privilege is absolute in a civil context.

The covert human intelligence source(s) at issue were recruited by a civilian intelligence agency. They were not “police” informers. Moreover, a security certificate proceeding is not a criminal proceeding. Therefore, the common law privilege protecting police informers and the innocence-at-stake exception to that privilege did not apply.

However, the courts have recognized that the public policy justifications for extending an analogous privilege to informants in the prison system or in a child protection context may be sufficient to override the public interest that information which might assist a judicial tribunal to ascertain facts relevant to an issue upon which it is required to adjudicate should be withheld from that tribunal. Such policy justifications apply with equal or greater force to the relationship between covert human intelligence sources and CSIS. 

Wigmore identified four requisite fundamental conditions in Evidence in Trials at Common Law for a common law privilege. Those conditions were met herein. Covert human intelligence sources are vital to the functioning of intelligence agencies and to the national security of Canada. They are essential national security assets. To fulfill their role, sources must remain anonymous and fully protected. Upon recruitment, CSIS gives a source a guarantee of confidentiality.  Given the nature of the tasks performed by covert human intelligence sources, confidentiality is required to protect them from reprisals or ostracization from their community. The evidence established that the recruitment of human sources would be harmed if the guarantees of confidentiality were not upheld by the courts and that identifying a source to a special advocate or requiring a source to testify in a closed proceeding, even anonymously, will almost certainly end CSIS’s relationship with that source.

A person named in a security certificate is in jeopardy of losing his status in Canada and being deported, and is subject to detention until such time as he leaves Canada or is released by Court order.  Such a person is entitled to an elevated level of procedural fairness such that, where ordinarily an informer privilege analogous to the “police informer privilege” would be absolute, the engagement of section 7 of the Charter may justify an exception to the privilege.  This exception will only be applicable in the closed portion of the proceeding where a special advocate has established that he or she has a “need to know” the identity of a covert human intelligence source to prevent a flagrant denial of procedural fairness which would bring the administration of justice into disrepute. This exception is based on the “need-to-know” rule which is a fundamental principle of the intelligence world. This exception is consistent with the intent of Parliament set out in subsection 18(2) of the CSIS Act, which provides for limited disclosure of information concerning human sources and covert operatives. The covert human intelligence source privilege and its necessarily limited exception is designed to balance the rights of individuals with those of the collective.

Parliament may abrogate common law privileges by legislation.  However it must do so explicitly. The IRPA does not abrogate the operation of common law privileges. The ministers’ obligation to disclose information is set out in subsection 77(2) and expanded by the Supreme Court of Canada in Charkaoui v. Canada (Citizenship and Immigration), [2008] 2 S.C.R. 326.  Nothing in that case indicates that the Supreme Court intended to abrogate the application of common law privileges in the context of a security certificate proceeding. 

The closed nature of the proceedings may limit the harm where a designated judge finds it necessary to apply the need-to-know exception to the covert human intelligence source privilege in the context of a security certificate proceeding.  However, the private closed nature of the hearing merely minimizes the impact of the disclosure order on an individual human source; it does not abrogate the privilege or eliminate the policy basis on which it is founded. The Court will always have the power to order that information be provided to it to determine whether that information is relevant or privileged.

The need-to-know exception cannot be used as an instrument of corroboration. In the context of security certificate proceedings, the need-to-know exception may only apply if it is the only way to establish that the proceeding will otherwise result in a flagrant denial of procedural justice which would bring the administration of justice into disrepute. It is not to be used as a part of an arsenal of litigation strategy. There are other ways in which a special advocate may test the credibility and reliability of the information provided by a human source which do not require that the source be identified and produced. A CSIS witness testified and was cross-examined by the special advocates about the value, reliability and usefulness of information provided by the human sources. The witness also gave evidence as to the motivation of the source(s), handling issues, monetary payments and the personal history of the source(s) as a covert human intelligence source. The ministers filed an exhibit outlining the background of the human source(s), the source(s)’s motivation, meetings with the source(s)’s handlers, targeting of the source(s) and source handling issues.  The exhibit also evaluated the value of the information received from the source(s) by highlighting instances of corroboration with other sources of information including other human sources, technical sources and information provided by foreign intelligence agencies. This approach met the requirements of fundamental justice and was consistent with the judicial duties of the designated judge. Therefore, the special advocates did not establish that the production of a human source(s) as a witness was necessary to avoid a flagrant denial of procedural fairness. 

Covert human intelligence source privilege cannot be renounced unilaterally either by the human source or by the Crown. Any renunciation must be a joint decision based on a full understanding of the consequences. Until such time as proof of a joint and informed waiver is provided to it, the Court has an obligation to protect the asserted privilege subject only to the exception as outlined above. Great care must be taken to balance competing interests.

statutes and regulations cited

Access to Information Act, R.S.C., 1985, c. A-1, s. 36 (as am. by S.C. 2006, c. 9, s. 153).

Canadian Charter of Rights and Freedoms, being Part I of the Constitution Act, 1982, Schedule B, Canada Act 1982, 1982, c. 11 (U.K.) [R.S.C., 1985, Appendix II, No. 44], s. 7.

Canadian Security Intelligence Service Act, R.S.C., 1985, c. C-23, ss. 18(1),(2), 39.

Executive Order 12356, 3 C.F.R. 66 (1982).

Immigration and Refugee Protection Act, S.C. 2001, c. 27, ss. 34(1)(c),(d),(f), 77 (as am. by S.C. 2008, c. 3, s. 4), 83(1)(c) (as am. idem), 85.2 (as enacted idem), 85.4(1) (as enacted idem), 112.

Privacy Act, R.S.C., 1985, c. P-21, s. 34 (as am. by R.S.C., 1985 (1st Supp.), c. 27, s. 187, Sch. V, Item 6(1)).

Regulation of Investigatory Powers Act 2000 (U.K.), 2000, c. 23, s. 29(5).

Security of Information Act, R.S.C., 1985, c. O-5, s. 1 (as am. by S.C. 2001, c. 41, s. 25).

cases cited

considered:

Charkaoui v. Canada (Citizenship and Immigration), 2008 SCC 38, [2008] 2 S.C.R. 326, 294 D.L.R. (4th) 478, 58 C.R. (6th) 45; R. v. Leipert, [1997] 1 S.C.R. 281, (1997), 143 D.L.R. (4th) 38, [1997] 3 W.W.R. 457; Solicitor General of Canada et al. v. Royal Commission of Inquiry (Health Records in Ontario), [1981] 2 S.C.R. 494, (1981), 128 D.L.R. (3d) 193, 62 C.C.C. (2d) 193; Bisaillon v. Keable, [1983] 2 S.C.R. 60, (1983), 2 D.L.R. (4th) 193, 4 Admin. L.R. 205; Marks v. Beyfus (1890), 25 Q.B.D. 494 (C.A.); R. v. Scott, [1990] 3 S.C.R. 979, (1990), 61 C.C.C. (3d) 300, 2 C.R. (4th) 153; D. v. National Society for the Prevention of Cruelty to Children, [1977] UKHL 1; Charkaoui v. Canada (Citizenship and Immigration), 2007 SCC 9, [2007] 1 S.C.R. 350, 276 D.L.R. (4th) 594, 54 Admin. L.R. (4th) 1; Suresh v. Canada (Minister of Citizenship and Immigration), 2002 SCC 1, [2002] 1 S.C.R. 3, 208 D.L.R. (4th) 1, 37 Admin. L.R. (3d) 152; R. c. Treu, [1979] J.Q. No. 202 (C.A.) (QL); R. v. Stinchcombe, [1995] 1 S.C.R. 754, (1995), 162 A.R. 269, 96 C.C.C. (3d) 318; Harkat (Re), 2005 FC 393, 261 F.T.R. 52, 45 Imm. L.R. (3d) 65.

referred to:

Canada (Privacy Commissioner) v. Blood Tribe Department of Health, 2008 SCC 44, [2008] 2 S.C.R. 574, 294 D.L.R. (4th) 385, 74 Admin. L.R. (4th) 38; Named Person v. Vancouver Sun, 2007 SCC 43, [2007] 3 S.C.R. 253, 285 D.L.R. (4th) 193, [2008] 1 W.W.R. 223; Rice v. National Parole Board (1985), 16 Admin. L.R. 157 (F.C.T.D.); Reg. v. Lewes Justices, Ex parte Secretary of State for Home Department, [1973] A.C. 388 (H.L.); Canada (Attorney General) v. Ribic, 2003 FCA 246, [2005] 1 F.C.R. 33, 185 C.C.C. (3d) 129, 320 N.R. 275; R. v. Ribic, 2008 ONCA 790, 238 C.C.C. (3d) 225, 63 C.R. (6th) 70, 181 C.R.R. (2d) 262; EM (Lebanon) v. Secretary of State for the Home Department, [2008] UKHL 64; Mamatkulov and Askarov v. Turkey (2005), 41 EHRR 494; R. v. Chaplin, [1995] 1 S.C.R. 727, (1995), 162 A.R. 272, 27 Alta. L.R. (3d) 1; Almrei (Re), 2008 FC 1216, [2009] 3 F.C.R. 497, 180 C.R.R. (2d) 338, 331 F.T.R. 301.

authors cited

Canada. Internal Inquiry into the Actions of Canadian Officials in Relation to Abdullah Almalki, Ahmad Abou-Elmaati and Muayyed Nureddin, (Honourable Frank Iacobucci, Q.C. Commissioner), Ottawa: Public Works and Government Services, 2008, online: <http://epe.lac-bac.gc.ca/100/206/301/pco-bcp/commissions/internal_inquiry/2010-03-09/www.iacobucciinquiry.ca/pdfs/documents/final-report-copy-fr.pdf>.

Canada. Royal Commission of Inquiry Concerning Certain Activities of the Royal Canadian Mounted Police (McDonald Commission). Report. (3 vols.), Ottawa: Supply and Services Canada, 1981.

Canada. Royal Commission of Inquiry Concerning Certain Activities of the Royal Canadian Mounted Police (McDonald Commission). Second Report: Freedom and Security under the Law, Vol. 1, Ottawa: Supply and Services Canada, 1981.

New Zealand. Security in the Government Sector.  Department of the Prime Minister and Cabinet, 2002, online: <http://www.security.govt.nz/sigs/sigs.pdf>.

Sopinka, J. et al. The Law of Evidence in Canada, 2nd ed., Toronto: Butterworths, 1999.

Supreme Court of Canada. Remarks of the Right Honourable Beverley McLachlin, P.C. Chief Justice of Canada, Symons Lecture—2008, online: <http://www.scc-csc.gc. ca>.

Wigmore, John Henry. Evidence in Trials at Common Law, McNaughton Revision, Vol. 8, Boston: Little, Brown & Co., 1961.

REQUEST by the special advocates to have human source(s) identified and made available for cross-examination in the context of a security certificate proceeding. Request denied.

appearances

M. W. Dale, David W. Tyndale and A. Seguin for applicant.

Paul D. Copeland and Paul J. J. Cavalluzzo as special advocates.

solicitors of record

Deputy Attorney General of Canada for applicant.

Copeland, Duncan, Toronto, and Cavalluzzo, Hayes, Shilton, McIntyre and Cornish, LLP, Toronto, as special advocates.

The following are the expurgated* public reasons for judgment and judgment rendered in English by

[1] Noël J.: On February 22, 2008, a certificate naming Mohamed Harkat as a person inadmissible to Canada on grounds of national security was referred to the Federal Court pursuant to section 77 [as am. by S.C. 2008, c. 3, s. 4] of the Immigration and Refugee Protection Act, S.C. 2001, c. 27 (IRPA or Act).

[2] The Chief Justice designated me to hear this proceeding on May 6, 2008. Orders establishing a schedule for the determination of the reasonableness of the certificate and appointing two special advocates to represent the interests of Mr. Harkat during the closed hearings1 were issued on June 4, 2008.

[3] To date, the Court has heard the submissions of the ministers and the special advocates on the extent of disclosure required by Charkaoui v. Canada (Citizenship and Immigration), 2008 SCC 38, [2008] 2 S.C.R. 326 (Charkaoui No. 2) and, on September 24, 2008, ordered that the ministers comply with their obligation to disclose. The Court has not yet received full disclosure in compliance with Charkaoui No. 2.

[4] Two weeks of closed hearings were held in September 2008 and public hearings were conducted in October and November 2008. During these hearings, the ministers presented their evidence in support of the reasonableness of the certificate and the danger associated with Mr. Harkat. The Court has also heard evidence and oral submissions in December 2008 in relation to Mr. Harkat’s request to review the conditions of his release.

[5] The evidence currently before this Court discloses that […] human source(s) provided information to the Service [Canadian Security Intelligence Service] in relation to the intelligence investigation into Mr. Harkat’s activities. No determination of the reliability or weight to be given to this information has been made. Nothing in these reasons should be interpreted as giving any probative value to any of the reports originating from human sources.

[6] In September 2008, during a closed hearing, the special advocates sought an order of this Court compelling the ministers to produce for cross-examination covert human intelligence source(s) who provided information about Mr. Harkat to the Canadian Security Intelligence Service. They propose to conduct their cross-examination during a closed hearing before this Court.

[7] They are also requesting that they be granted an opportunity to interview the human source(s) prior to any evidence being given during a closed hearing.

[8] The special advocates wish to test the credibility of the human source(s) and possibly corroborate future explanations which may be testified to by Mr. Harkat in relation to his motives for coming to Canada in the mid-1990s. They provide no further justification to the Court beyond this general objective.

[9] The ministers note that this is the first time that a request has been made for human source(s) to testify in the context of a security certificate proceeding. It is their position that the police informer privilege is applicable to these proceedings and that no “innocence-at-stake” exception exists in the context of a non-criminal proceeding pursuant to the IRPA. The closed nature of the proceeding does not, according to the ministers, render inoperative legal privileges. Such privileges are applicable in the absence of clear statutory language suspending them; see, for example, Canada (Privacy Commissioner) v. Blood Tribe Department of Health, 2008 SCC 44, [2008] 2 S.C.R. 574 (Blood Tribe), at paragraph 11.

[10] The special advocates acknowledge that the police informer privilege would ordinarily be applicable to covert human intelligence sources recruited by the Service in public proceedings. However, they assert that the privilege has no application to the closed portion of these proceedings.

[11] Should the Court find that the police informer privilege applies to the closed portion of these proceedings, the special advocates argue that they have established that the information they seek to compel falls within the “innocence-at-stake” exception as set out in the criminal jurisprudence.

[12] The ministers take the position that the police informer privilege is applicable to human sources of the Service and is absolute in the context of this certificate proceeding.

The scope of the confidential police informer privilege

[13] In a leading case on the informer privilege, R. v. Leipert, [1997] 1 S.C.R. 281 (Leipert), the Supreme Court stated that [at paragraph 9] “informer privilege is an ancient and hallowed protection which plays a vital role in law enforcement.” The receipt of information about criminal activity from confidential police informants is of “fundamental importance to the workings of a criminal justice system” (Leipert, at paragraph 10). However, it is clear that a police informant is at “risk of retribution from those involved in crime” (Leipert [at paragraph 9]). Thus, the police informer privilege plays a two-fold role: to protect the confidential police informer and, in doing so, encourage others to come forward with essential information which will aid in the protection of the public at large.

[14] The privilege is a “rule of public policy that is not a matter of discretion” (Solicitor General of Canada et al. v. Royal Commission of Inquiry (Health Records in Ontario), [1981] 2 S.C.R. 494 (Health Records) [at page 527]). See also Bisaillon v. Keable, [1983] 2 S.C.R. 60 (Bisaillon), at page 93; and Marks v. Beyfus (1890), 25 Q.B.D. 494 (C.A.), at page 498. Once it is properly invoked, the Court is obligated to protect the police informer’s identity. Indeed, even where the Crown does not invoke the privilege, the Court is under a duty to apply it (Bisaillon, at page 98). The only exception to this rule of law is where a person’s innocence is at stake. In Marks v. Beyfus, Lord Esher M.R., clearly set out the “innocence-at-stake” exception [at page 498]:

I do not say it is a rule which can never be departed from; if upon the trial of a prisoner the judge should be of the opinion that the disclosure of the name of the informant is necessary or right in order to shew the prisoner’s innocence, then one public policy is in conflict with another public policy, and that which says that an innocent man is not to be condemned when his innocence can be proved is the policy that must prevail.

[15] The innocence-at-stake exception to the informer privilege is only applicable in a criminal proceeding and is based on the principle that the “right of an individual accused to establish his or her innocence by raising a reasonable doubt as to guilt [is] paramount” (R. v. Scott, [1990] 3 S.C.R. 979 (Scott), at pages 995–996).

[16] The courts have given precision to the “innocence-at-stake” exception. Where the police informer is a material witness to the crime or acts as an agent provocateur the privilege will be set aside (Scott, at page 996; see also Named Person v. Vancouver Sun, 2007 SCC 43, [2007] 3 S.C.R. 253 (Named Person), at paragraph 29). In Scott, the Supreme Court also noted that “[a] third exception may exist where the accused seeks to establish that the search was not undertaken on reasonable grounds and therefore contravened the provisions of s. 8 of the Charter” (Scott, at page 996).

[17] Police informer privilege is absolute in a civil context, even where the identity of the informant is sought in the context of a public inquiry into police wrongdoing (see Health Records, at page 539; Named Person, at paragraph 27; and Scott, at pages 395–396).

Does the police informer privilege apply in these proceedings?

[18] In the cases relied on by the special advocates and by the ministers, the confidential informant whose identity was at issue was a police informer. The covert human intelligence source(s) at issue in this motion for production are recruited by a civilian intelligence agency; they are not “police” informers providing information to police in the course of their duties. Moreover, a certificate proceeding is not a criminal proceeding. Covert human intelligence sources are individuals who have been promised confidentiality in return for their assistance in gathering information relating to the national security concerns of Canada. Thus the common law privilege protecting police informers and the innocence-at-stake exception to that privilege are not applicable per se to the covert human intelligence sources recruited by the Service.

[19] However, a form of police informer privilege has been extended, by way of analogy in the incremental tradition of the common law, to statements made by informants to the National Parole Board (Rice v. National Parole Board (1985), 16 Amin. L.R. 157 (F.C.T.D.)), as well as statements made by confidential informants to child welfare authorities (D. v. National Society for the Prevention of Cruelty to Children, [1977] UKHL 1 (D. v. N.S.P.C.C.)) and gambling regulators in England (Reg. v. Lewes Justices, Ex parte Secretary of State for Home Department, [1973] A.C. 388 (H.L.)). The courts have recognized that the public policy justifications for extending an analogous privilege to informants in the prison system or in the child protection context may be sufficient to override “the public interest that information which might assist a judicial tribunal to ascertain facts relevant to an issue upon which it is required to adjudicate should be withheld from that tribunal” (D. v. N.S.P.C.C., per Lord Diplock [at page 3]).

[20] In Evidence in Trials at Common Law [by John Henry Wigmore, McNaughton Revision, Vol. 8, Boston: Little, Brown & Co., 1961, at page 527], the author sets out the four fundamental conditions which must be met before a common law privilege is extended or recognized:

(1) The communications must originate in a confidence that they will not be disclosed.

(2) This element of confidentiality must be essential to the full and satisfactory maintenance of the relation between the parties.

(3) The relation must be one which in the opinion of the community ought to be sedulously fostered.

(4) The injury that would inure to the relation by the disclosure of the communications must be greater than the benefit thereby gained for the correct disposal of the litigation.

[21] Similarly, in The Law of Evidence in Canada (by J. Sopinka et al., 2nd ed. Toronto: Butterworths, 1999, at page 883), the authors note:

Where the court is asked to extend the rule beyond the traditional parameters, a careful inquiry into the public policy aspects is required. Society’s need to foster the informal relationship must be clearly evidenced.

[22] The policy justifications underlying the existence of the privilege in the law enforcement context and, the extension of the privilege to parole board and child protection matters, apply with equal or greater force to the relationship between covert human intelligence sources and the Service (Rice, above, at paragraphs 16–17 and D. v. N.S.P.C.C., above, at page 4).

[23] As noted in Health Records, above, the Supreme Court perceived an even “stronger” police informer privilege in national security matters than in criminal investigations (notably, in this case, the informants were police informers who provided information to the police in the course of their investigation). Justice Martland, writing for a majority of the Court, observed at page 537:

The foundation for the existence of [the informer rule], which evolved in respect of the field of criminal investigation, is even stronger in relation to the function of the police in protecting national security. A large number of the instances in which, in the present case, it was sought to obtain from the police the names of their informants concerned police investigation into potential violence against officers of the state, including heads of state. These investigations were admittedly proper police functions. The rule of law which protects against the disclosure of informants in the police investigation of crime has ever greater justification in relation to the protection of national security against violence and terrorism.[2]

[24] Covert human intelligence sources are vital to the functioning of intelligence agencies and to the national security of Canada.3 They are not limited to passive intelligence gathering as technical methods are, but rather are able to actively solicit and obtain information that would otherwise be inaccessible. They do so often at great risk to themselves and to their families. Fundamentally, information provided by covert human intelligence sources allows intelligence agencies to make more accurate and timely assessments of threats to the security of Canada. As such, they are essential national security assets.4

[25] The Commission of Inquiry Concerning Certain Activities of the Royal Mounted Canadian Police (the McDonald Commission), observed at page 536 of Volume 1 of its Second Report: Freedom and Security under the Law (Ottawa: Supply and Services Canada, 1981) that:

58. The use of human sources and undercover members, collectively referred to by us as “undercover operatives”, is the most established method of collecting information about threats to security. Despite the technological revolution which has provided a variety of technical alternatives as a means of penetrating secretive organizations, the undercover operative is likely to remain an extremely important source of information to a security intelligence agency.

59. An undercover operative can be a much more penetrating means of collecting information than any technical device. A technical source … is essentially a passive instrument which can record only what is said or done at one particular place. In contrast, undercover operatives—human spies—have frequently penetrated the innermost circles of groups, probed the intentions of their leading members….

[26] To fulfill their role, sources must remain anonymous and fully protected; at no time can they be identified explicitly or implicitly by the agencies. To this end, upon recruitment, the Service gives a source a guarantee of confidentiality […]. Access to information about covert human intelligence sources is severely restricted and compartmentalized in an area that is separate from other Service information.5

[27] Confidentiality ensures the safety of covert human intelligence sources who often place themselves in harms way to fulfill the investigatory objectives of the Service. Given the nature of the tasks performed by covert human intelligence sources, confidentiality is required to protect them from reprisals or ostracization from their community.6

[28] If the Service is unable to protect the identity of its sources or is required to produce them in the context of a court proceeding (even one that is closed to the public), the number of individuals willing to come forward with information would be reduced. Indeed, there is evidence before this Court that the recruitment of human sources would be harmed if the guarantees of confidentiality given by the Service were not upheld by this Court.7 I accept this evidence.

[29] Finally, it is important to note that, unlike police or criminal investigations, intelligence investigations do not end with the filing of criminal charges or the commencement of court proceedings. Intelligence investigations can be of a short-term nature, but they may also extend over longer periods of time—even decades. Investigations can be suspended, just as they can be reactivated. How an intelligence investigation unfolds hinges on many factors, including the purpose of the investigation and the persistence of threats associated with the subjects of investigation. […] Evidence before the Court establishes that identifying a source to a special advocate or requiring a source to testify in a closed proceeding, even anonymously, will almost certainly end the Service’s relationship with that source.8

[30] Parliament itself has spoken on the importance of protecting human sources and covert operatives. Subsection 18(1) of the Canadian Security Intelligence Service Act, R.S.C., 1985, c. C-23 (CSIS Act), provides:

18. (1) Subject to subsection (2), no person shall disclose any information that the person obtained or to which the person had access in the course of the performance by that person of duties and functions under this Act or the participation by that person in the administration or enforcement of this Act and from which the identity of

(a) any other person who is or was a confidential source of information or assistance to the Service, or

(b) any person who is or was an employee engaged in covert operational activities of the Service can be inferred.

[31] I conclude, on the evidence before me, that the relationship between the Service and a covert human intelligence source meets the four conditions enumerated by Wigmore in his treatise and should therefore be protected. Covert human intelligence sources are given absolute promises that their identity will be protected. These assurances not only foster long-term, effective relationships with the sources themselves, but increase, exponentially, the chances for success of future intelligence investigations. Confidentiality guarantees are essential to the Service’s ability to fulfill its legislative mandate to protect the national security of Canada while protecting the source from retribution. It also encourages others to come forward with essential information that would not otherwise be available to the Service. The relationship between the Service and the source as well as the identity of the source is protected by a covert human intelligence source privilege.

Is there an exception to the immunity provided by a covert human intelligence source privilege?

[32] In the Charkaoui decisions (Charkaoui v. Canada (Citizenship and Immigration), 2007 SCC 9, [2007] 1 S.C.R. 350 (Charkaoui No. 1) and Charkaoui No. 2, above) the Supreme Court has found that the seriousness of the potential impact on the liberty and security interests of the named person engages section 7 of the Canadian Charter of Rights and Freedoms [being Part I of the Constitution Act, 1982, Schedule B, Canada Act 1982, 1982, c. 11 (U.K.) [R.S.C., 1985, Appendix II, No. 44]] (Charter) and the right to procedural fairness set out therein. Accordingly, this Court must consider whether, in the circumstance of this proceeding, the principles of procedural fairness set out in section 7 mandate an exception, however limited and constrained, to the covert human intelligence source privilege.

[33] Procedural fairness is to be determined in the context of this proceeding, which is a determination of the reasonableness of a certificate referred to the Federal Court pursuant to subsection 77(2) of the IRPA. A finding of reasonableness would constitute conclusive proof that Mr. Harkat is inadmissible to Canada on the grounds of national security, pursuant to one or more of paragraphs 34(1)(c), (d) and (f) of the IRPA, and would have the effect of a removal order. That removal order could be subject to a further proceeding in which the Minister would be asked to assess the risk that the named person would be subjected to torture or other mistreatment if he was returned to his country of origin or some other country (see procedures for pre-removal risk assessment at section 112 of the IRPA).

[34] The person named in a certificate is in jeopardy of losing his status in Canada and being deported, and is subject to detention until such time as they leave Canada or are released by order of this Court. The Supreme Court noted that, given the exception set out by it in Suresh v. Canada (Minister of Citizenship and Immigration), 2002 SCC 1, [2002] 1 S.C.R. 3, there is a possibility that the circumstances may be exceptional enough to warrant the deportation of the person named in a certificate to a country in which the security of that person is in question. Recently, in the 2008 Symons Lecture [Remarks of the Right Honourable Beverly McLachlin, P.C. Chief Justice of Canada], Chief Justice McLachlin noted that the Supreme Court has not yet considered what might constitute “exceptional circumstances”, but continued to say that these would “necessarily be very rare” (page 29, Symons Lecture notes).

[35] In light of both Charkaoui decisions of the Supreme Court, a person named in a security certificate is entitled to an elevated level of procedural fairness such that, where ordinarily an informer privilege analogous to the “police informer privilege” would be absolute, the engagement of section 7 [of the Charter] may justify an exception to the privilege. I find that this exception will only be applicable in the closed portion of the proceeding where a special advocate has established that he or she has a “need to know” the identity of a covert human intelligence source to prevent a flagrant denial of procedural fairness which would bring the administration of justice into disrepute.

[36] This exception is based on the “need-to-know” rule which is a fundamental principle of the intelligence world. It is reflected in both domestic and international legislation and policies. Fundamentally, classified information is protected by compartmentalization; the integrity of which is maintained by the “need-to-know” principle.9 Only those with a direct operational requirement are given access to classified information—even those cleared to the highest level. The following paragraphs provide a brief, and limited, overview of some of the instances in which the “need-to-know” principle has been recognized, referred to, and relied on.

[37] On February 1, 2002, the Treasury Board Secretariat issued a “Government Security Policy” which is designed to “protect employees, preserve the confidentiality, integrity, availability and value of assets”. Paragraph 10.8 deals with “access limitations” and sets out the need-to-know principle: “Departments must limit access to classified and protected information and other assets to those individuals who have a need to know the information”.

[38] In R. c. Treu, [1979] J.Q. No. 202 (QL), the Quebec Court of Appeal noted that a security system is based on two principles: “l’idée d’accessibilité en faveur seulement des personnes habilitées ([access should only be granted to] cleared persons) et ayant besoin de les connaître ([on a] need to know [basis])” (at paragraph 57). References to these principles have also been made by the Federal Court of Appeal in Canada (Attorney General) v. Ribic, 2003 FCA 246, [2005] 1 F.C.R. 33, at paragraph 6, and by the Ontario Court of Appeal in R. v. Ribic, 2008 ONCA 790, 238 C.C.C. (3d) 225.

[39] A similar principle is found in the United Kingdom Regulation of Investigatory Powers Act 2000 [(U.K.) 2000, c. 23], at paragraph 29(5)(e), which requires:

29 (5) …

(e)  that records maintained by the relevant investigating authority that disclose the identity of the source will not be available to persons except to the extent that there is a need for access to them to be made available to those persons.

[40] Part 4 of Executive Order 12356 [3 C.F.R. 66 (1982)] sets out the classification and access policies of the executive branch of the United States of America as follows:

Sec. 4.1 General Restrictions on Access.

(a) A person is eligible for access to classified information provided that a determination of trustworthiness has been made by agency heads or designated officials and provided that such access is essential to the accomplishment of lawful and authorized Government purposes. [Emphasis added.]

[41] In New Zealand, the government’s security policy is set out in a publication entitled Security in the Government Sector which was published by the Department of the Prime Minister and Cabinet in 2002. The authors of the New Zealand publication acknowledge, in the preface, that some of the manual content is “based on or drawn from similar overseas publications—in particular, Australia’s ‘Commonwealth Protective Security Manual’, and the United Kingdom’s ‘Manual of Protective Security’.” Access is restricted to both of these manuals. Chapter 4 of the Manual is entitled “Control of Classified Material”. This chapter sets out the need-to-know principle as follows:

4. Fundamental to all aspects of security is that the only people who receive classified information are those who need it to complete the business in hand. Thus, employees receive access to classified information:

•    only because they “need to know” it to complete their duties

•    not because it would be convenient for them to know

•    not by virtue of their status, position, rank or level of authorized access.

5. Adherence to the “need to know” principle helps protect the employees as well as the information.

6. The “need to know” principle applies both within an organisation and when dealing with people outside it.

[42] The very manner in which the Service handles human sources provides an illustration of the “need-to-know” principle in play.

[43] Evidence heard in closed hearings establishes that […] files concerning human sources are handled by a separate division within the Service which is contained in a highly protected area within an already secure environment.10 […] This assists the Service in fulfilling its duty to protect the human source and allows the Service to control and assure the quality of the information provided to them by that source. The greater the pool of persons given access to the identity of a human source, the more difficult it becomes to prevent inadvertent disclosures and to investigate security breaches.11 Widening the number of people with access to the identity of a human source puts both the personal safety of the source and the national security of Canada into jeopardy.

[44] Those who work in the Human Source Directorate are required to meet certain security standards greater than those imposed on most other Service employees. […]

[45] […] Communications about human sources, more so than other classified information, are on a need-to-know basis only.12 Documents referring to sources […] must be classified […]. Indeed, there is evidence before the Court that even the Director of the division would not normally have access to the identities of the human sources except where he has an operational need to know that information.13

[46] A “need to know” this closely protected information, given the concerns of individual safety and operational control, will only be established where evidence is adduced demonstrating that the identity of the covert human intelligence source must be disclosed to prevent a flagrant breach of procedural justice which would bring the administration of justice into disrepute. In defining when such a threshold will be met, I refer to the words of the European Court of Human Rights which characterized the use of the term “flagrant” as denoting “a breach so fundamental as to amount to a nullification, or destruction of the very essence” of the right to procedural fairness. (See EM (Lebanon) v. Secretary of State for the Home Department [[2008] UKHL 64], citing Mamatkulov and Askarov v. Turkey (2005), 41 EHRR 494, at pages 537–539). Such a need to know may arise where, in the Judge’s opinion, there is no other way to test the reliability of critical information provided by a covert human intelligence source except by way of cross-examination.

[47] This exception to the covert human intelligence source privilege is also consistent with the intent of Parliament set out in subsection 18(2) of the CSIS Act, which provides for limited disclosure of information concerning human sources and covert operatives.

[48] The covert human intelligence source privilege, and its necessarily limited exception, is designed to balance the rights of individuals with those of the collective. A similar concern was expressed by Justice Iacobucci, regarding the need: “to do everything possible to protect our country” and the need to do so “with genuine respect for the fundamental rights and freedoms of Canadian citizens.” (Internal Inquiry into the Actions of Canadian Officials in Relation to Abdullah Almalki, Ahmed Abou-Elmaati and Muayyed Nureddin (Ottawa: Public Works and Government Services Canada, 2008), at page 5.)

Impact of the closed nature of the proceeding and the special advocate

[49] The special advocates take the position that they are entitled to access any information, related to the investigation of Mr. Harkat, held by the Service because of their top-secret clearance and because they have been appointed as special advocates in this file, as well as the fact that they are persons permanently bound to secrecy under the Security of Information Act [R.S.C., 1985, c. O-5, s. 1 (as am. by S.C. 2001, c. 41, s. 25)]. The special advocates maintain that their right to access information includes the opportunity to cross-examine covert human intelligence sources and implicitly, if not explicitly, know the identity of these sources.

[50] The ministers take the opposite position and assert that nothing in the IRPA abrogates the operation of common law privileges. I agree.

 [51] Parliament may abrogate common law privileges by legislation; however, it must do so explicitly (see Blood Tribe, at paragraph 11).14 Section 39 of the CSIS Act provides an example of the clear language required to abrogate common law privileges:

39. (1) Subject to this Act, the Review Committee may determine the procedure to be followed in the performance of any of its duties or functions.

(2) Notwithstanding any other Act of Parliament or any privilege under the law of evidence, but subject to subsection (3), the Review Committee is entitled:

(a) to have access to any information under the control of the service or of the Inspector General that relates to the performance of the duties and functions of the Committee and to receive from the Inspector General, Director and employees such information, reports and explanations as the Committee deems necessary for the performance of its duties and functions; and

(b) during any investigation referred to in paragraph 38(c), to have access to any information under the control of the deputy head concerned that is relevant to the investigation.

(3) No information described in subsection (2) other than a confidence of the Queen’s Privy Council for Canada in respect of which subsection 39(1) of the Canada Evidence Act applies may be withheld from the Committee on any grounds. [Emphasis added.]

[52] There is no analogous provision in the IRPA. If Parliament had intended the special advocates to have access to all information, including information over which the government claims solicitor-client or other privilege, it would have explicitly stated so in the legislation. The limited powers given to special advocates in section 85.2 [as enacted by S.C. 2008, c. 3, s. 4] of the IRPA do not, without this Court’s authorization, permit them to call witnesses or require the production of a witness or document particularly where to do so would pierce a common law privilege.

[53] The ministers’ obligation to disclose information is set out in subsection 77(2) of the IRPA and was expanded by the decision of the Supreme Court in Charkaoui No. 2. The Act requires the ministers to “file with the Court the information and other evidence on which the certificate is based” (subsection 77(2) of the IRPA). Once filed, the judge must determine whether the information provided by the Minister meets the disclosure requirements in Charkaoui No. 2 which requires that all operational notes and information relating to Mr. Harkat be provided to the Court. This information will be made available to the special advocates at a time set by direction of the Court (subsection 85.4(1) [as enacted idem] of the IRPA). The Service’s obligation to disclose information does not extend to purely administrative files unless such information is shown to be necessary for the Court to meet its obligation to verify the accuracy and reliability of the allegations in relation to the reasonableness of the certificate. In such a case the Court has the power to order the information to be provided to the Court for review (see Blood Tribe, at paragraphs 23, 31, 33–34; see also R. v. Chaplin [[1995] 1 S.C.R. 727], at paragraph 25). Where the information is determined to be relevant and not excluded by privilege a direction will be issued requiring the information to be filed and granting the special advocates access to the information.

[54] Nothing in Charkaoui No. 2 indicates that the Supreme Court intended to abrogate the application of common law privileges in the context of a security certificate proceeding. The limits on disclosure were recognized by the Supreme Court in R. v. Stinchcombe, [1995] 1 S.C.R. 754, a criminal proceeding, when it stated that information to be provided to an accused is subject to the common law of privilege (see paragraphs 16 and 22; see also Chaplin, above, at paragraph 21).

[55] The closed nature of the proceedings may limit the harm where a designated judge finds it necessary to apply the need-to-know exception to the covert human intelligence source privilege in the context of a security certificate proceeding. However, the private closed nature of the hearing merely minimizes the impact of the disclosure order on an individual human source; it does not abrogate the privilege or eliminate the policy basis on which it is founded.

[56] The special advocates also assert that they are entitled to obtain copies of any information provided by the ministers to the Court. This cannot be the case.

[57] Special advocates are not in the same position as the Court. They are participants in the closed hearings solely for the purpose set out in the IRPA namely, to represent the best interests of the person named in the certificate. The Court will always have the power to order that information be provided to it to determine whether that information is relevant or privileged. That is the role of the independent and impartial arbiter. Where the information is relevant and not otherwise excluded by statute or common law privilege, the Court will order the information to be filed and provided to the special advocates. The provisions of the IRPA and the reasons of the Supreme Court in the Charkaoui decisions do not remove this overarching superintending role of the judge.

Have the special advocates established that they have a “need to know” this information to prevent a flagrant denial of procedural justice such that an exception to the covert human intelligence source privilege rule should be applicable?

[58] Special advocates play a unique but limited role in a certificate proceeding. While their communications with the named person are deemed to be covered by solicitor-client privilege, there is no solicitor-client relationship between the special advocate and the named person. The primary role of the special advocate is to protect the interests of the named person where evidence is heard in his or her absence. This is accomplished in two steps: by maximizing the disclosure to be made to the named person and counsel and by testing the reliability and credibility of evidence in the closed portion of the proceedings by cross-examining witnesses produced by the Ministers. Any further action proposed to be taken by the special advocates must be authorized by the judge who is charged with ensuring that the proceeding move forward as expeditiously, informally and fairly as possible (IRPA provisions, paragraph 85.2(c), and Almrei (Re), 2008 FC 1216, [2009] 3 F.C.R. 497, at paragraphs 57–59).

[59] Subsection 83(1) of the IRPA puts the ultimate responsibility for the safeguarding of the sensitive information on the shoulders of the designated judge. This obligation must inform any consideration of whether the special advocates have a need to know the identity of the covert human intelligence source(s).

[60] The special advocates assert that the human source(s) (see paragraph 8 above, for summary of argument) […]. This argument is not supported by evidence. No additional information or evidence is offered to justify the special advocates’ request.

[61] The “need-to-know” exception cannot be used as an instrument of corroboration. In the context of security certificate proceedings, the need-to-know exception may only apply if it is the only way to establish that the proceeding will otherwise result in a flagrant denial of procedural justice which would bring the administration of justice into disrepute. It is not to be used as a part of an arsenal of litigation strategy.

[62] The special advocates also seek to cross-examine human sources in order to test the credibility and the reliability of the information.

[63] There are other ways in which a special advocate may test the credibility and reliability of the information provided by a human source which do not require that the source be identified and produced as a witness by the ministers.

[64] In her decision on the reasonableness of the first certificate issued naming Mr. Harkat as a person inadmissible to Canada under the IRPA, Justice Dawson [Harkat (Re), 2005 FC 393, 261 F.T.R. 52] outlines the principles relevant to the assessment of confidential information in paragraphs 93–94. She observed:

In testing evidence which cannot be disclosed for security reasons, the designated judge must adopt a principled approach to the exercise. To that end the presence or absence of corroboration, consistency of the evidence, and whether it is hearsay, are among factors to consider. To test the reliability of the evidence the judge may probe into the credibility and reliability of the source of the information. This may be done by the designated judge putting questions directly to affiants and possibly to other persons. In addition the judge may question counsel representing the Service on their submissions.

While not in any way commenting upon the source or sources of information of confidential information before the Court in this case, I believe that, generally, if any confidential information is provided by a human source, some relevant inquiries and areas for examination by the Court of one or more witnesses under oath may include matters such as the following: the origin and the length of the relationship between the Service and the human source; whether the source was paid for information; what is known about the source’s motive for providing information; whether the source has provided information about other persons, and, if so, particulars of that; the extent to which information provided by the source has been, or is, corroborated by other evidence or information; the citizenship/immigration status of the source and whether that status has changed throughout the course of the source’s relationship with the Service (to the extent that such status touches upon the source’s security within Canada and their vulnerability to duress); whether the source has been subject to any form of pressure to provide information, and if so, why and by whom; whether the source has a criminal record or any outstanding criminal charges in Canada or elsewhere; the nature of any relationship between the source and the subject of the investigation; whether there is any known or inferred motive for the source to provide false information or otherwise mislead the investigation in any way. This list is not exhaustive….

[65] Consistent with the approach of Justice Dawson, in this proceeding a Service witness testified and was cross-examined by the special advocates about the value, reliability and usefulness of information provided by the human source(s). The witness also gave evidence as to the motivation of the source(s), handling issues, monetary payments made to the source(s), as well as the personal history and the history of the source(s) as a covert human intelligence source.

[66] The ministers also filed an Exhibit A with the Court which was provided to the special advocates.15 Exhibit A is consistent with the testimony of the Service witness. In the Exhibit, the Service addresses the background of the human source(s), the source(s)’s motivation, meetings with the source(s)’s handlers, targeting of the source(s), source handling issues. The Exhibit also evaluates the value of the information received from the source(s) by highlighting instances of corroboration with other sources of information obtained through various investigation techniques. These techniques might include other human sources, technical sources such as intercepts, and information provided by foreign intelligence agencies.16

[67] It has been the experience of this Court that the approach set out by Justice Dawson, in combination with an examination of the Exhibit provided by the ministers in relation to the source’s credibility, is consistent with the judicial duties of the designated judge and meets the requirements of fundamental justice.

[68] Special advocates raised a further issue concerning the reliability of information from the source(s) and sought further evidence from the Service […]. The Service witness provided detailed evidence on this point. […]

[69] Given the nature of the information provided by the Service, the cross-examination of the special advocates, the primary role of the special advocates, and the other motions for further production, I conclude that, at this time, the special advocates have not established that the production of a human source(s) as a witness in these proceedings is necessary to avoid a flagrant denial of procedural fairness.

[70] Indeed, it is only in exceptional circumstances that this Court will order the disclosure of the identity of covert human intelligence source to a special advocate and even more exceptional would be a requirement that the Service produce the source for examination during the closed portion of a certificate proceeding. Even documents supporting warrant applications pursuant to the CSIS Act, which are heard in the absence of and without notice to the public, do not refer to names of sources […]. To facilitate the judicial decision-making process, the Service prepares a document that permits an assessment of the human source’s reliability and pertinence which is similar if not identical to Exhibit A in this proceeding. […] once the warrant application has been disposed of, it is returned to the Service so that it can be kept in a secure place to be made available upon request by a designated judge.

[71] The identity of a human source will only be confirmed or provided to the Court during a warrant application where the designated judge determines that there is a judicial need to know. The situations in which such a “need to know” will arise are rare […].

The impact of renunciation on the privilege

[72] […] The special advocates also assert that they are aware of the identity of the human source(s) […].

[73] In Bisaillon, the Supreme Court stated (at pages 94–95):

The question then arose whether the informer can himself waive the exclusionary rule which protects him, as for example by revealing his identity. In his treatise Evidence in Trials at Common Law, vol. 8, revised by John T. McNaughton, 1961, at p. 766, Wigmore states: “If the identity of the informer is admitted […], then there is no reason for pretended concealment of his identity”. If that is so, it is not an exception to the rule but a situation where, as Wigmore points out, the reason for the rule no longer exists, as other police informers, knowing that the disclosure was made by the informer himself or with his consent, would no longer feel threatened. Even then, I am far from being convinced that a peace officer could be asked to provide confirmation, as that would mean weakening a rule which should remain firm.

[74] Analogous to police informer privilege, I find that covert human intelligence source privilege cannot be renounced unilaterally either by the human source or by the Crown. Any renunciation must be a joint decision based on a full understanding of the consequences. Until such time as proof of a joint and informed waiver is provided to it, the Court has an obligation to protect the asserted privilege subject only to the exception set out above. Indeed, the Supreme Court has found that the privilege in the context of a police informer is “a legal rule of public order by which the judge is bound.” (Bisaillon, at page 93. The Court also stated: “if no one raises it [the privilege] the Court must apply it of its own motion.”)

[75] For all of these reasons, I come to the conclusion that the request of the special advocates that the covert human intelligence source(s) be identified and made available to them for cross-examination must be denied.

[76] There are issues which, on occasion, transcend the proceeding in which they arise. Issues that impact not only on similar proceedings but potentially on the intelligence system as a whole. The issue before me is one such question which will reverberate throughout our intelligence network—nationally and internationally. Great care must be taken by the Court in balancing the competing issues that have been reviewed in these reasons.

JUDGMENT

THIS COURT ORDERS AND ADJUDGES that:

The request to interview and cross-examine covert human intelligence source(s) is denied.

1 The term “closed hearing” refers to hearings held pursuant to s. 83(1)(c) [of the IRPA] [as am. by S.C. 2008, c. 3, s. 4] which permits a designated judge to hear evidence in the absence of the public and of the permanent resident or foreign national and their counsel.

2 This decision was issued in 1981, the same year as the tabling of the McDonald Commission Report [Royal Commission of Inquiry Concerning Certain Activities of the Royal Canadian Mounted Police.  Report (3 vols.) Ottawa: Supply and Services Canada, 1981] which recommended the creation of a civilian intelligence agency.

3 The top secret testimony of […] p. 1354, lines 10–17. See also the top secret testimony of […], given during a closed, ex parte session of the Federal Court in the matter of Mohamed Harkat held September 10–19, 2008, at p. 60, line 19 ff.

4 […], p.1036, lines 5–9.

5 […], p. 1356, line 5 ff, and p. 1352, lines 16–19 ff.

6 […], p. 1362, line 20 to p. 1363, line 13.

7 […], p. 1388, line 15 ff, and […], p. 77, lines 16–25.

8 […], p. 1388, line 22 to p. 1390, line 1.

9 […], p. 1353, line 24 to p. 1354, line 24.

10 […], p. 1356, line 5.

11 […], p. 1382 ff.

12 […], p. 1357, lines 12–17.

13 […], p. 1356, lines 13–24.

14 Other instances in which Parliament has explicitly abrogated common law privileges are rare; examples may arguably be found in s. 36 [as am. by S.C. 2006, c. 9, s. 153] of the Access to Information Act, R.S.C., 1985, c. A-1 and s. 34 [as am. by R.S.C., 1985 (1st Supp.), c. 27, s. 187, Sch. V, Item 6(1)] of the Privacy Act, R.S.C., 1985, c. P-21.

15 For an explanation of Exhibit A, please see […] at p. 1367.

16 Exhibit A is the product of the probing questions asked by the Court in other national security proceedings. It has developed over time and under judicial supervision to meet the concerns of the judges of the Court in assessing human source information.

 You are being directed to the most recent version of the statute which may not be the version considered at the time of the judgment.