Author Archives: Tim Horon

About Tim Horon

Tim Horon is a 3L student.

Acting Out of Order: The Need for Real Time Oversight of CSIS Judicial Warrants

By: Navreet Bal, Tim Horon, Tiana Knight, Ryan Shudra, and Jessie Sunner 

PDF Version: Acting Out of Order: The Need for Real Time Oversight of CSIS Judicial Warrants

Provisions Commented On: Sections 12 to 12.2 of the Canadian Security Intelligence Service Act, RSC 1985, c C-23

Editor’s Note: This is the second in a series of three posts on Reviewing Canada’s National Security Framework.

A recent Federal Court ruling, which has been referred to in the media as the “Metadata Case”, has renewed questions about the secrecy of judicial warrants granted to the Canadian Security Intelligence Service (CSIS) as well as CSIS’s duty of candour to the Court (see In the Matter of an Application by [REDACTED] for Warrants Pursuant to Sections 12 and 21 of the Canadian Security Intelligence Act, RSC 1985, c C-23 and In the Presence of the Attorney General and Amici and In the Matter of [REDACTED] Threat-Related Activities,(2016) FC 1105). This post will discuss the specific difference between review and oversight in Canadian national security law, provide an overview of recent Federal Court decisions related to CSIS judicial warrants, and look to future options related to CSIS judicial warrants.

In this post, we suggest that a robust system of real-time operational oversight is needed throughout Canada’s national security agencies, including CSIS, in order to improve the coordination and effectiveness of these agencies and to ensure the protection of citizens’ civil liberties. Particularly, we will be focusing on the oversight needed in the CSIS judicial warrant architecture. We propose the return of the Office of the Inspector General – which was eliminated in 2012 – that would act as an active, expert, and full-time oversight body over CSIS and handle real time oversight of judicial warrants. We also suggest the introduction of a special advocate regime within the judicial warrant process to act for the targets of CSIS warrants. Continue reading