• Thanks for stopping by. Logging in to a registered account will remove all generic ads. Please reach out with any questions or concerns.

Canadian Foreign Interference (General)

Its a travesty to democracy that we'll be voting for members of parliament that may be guilty of foreign interference.
Only acceptable to Canadians. We re worried about burning sources because we wont be trusted by allies….while not being worried about the trustworthiness of our leaders and their influences and how that affects us to our allies.

Allies of course being apparently different depending on who you ask and what level of government they work for.
 
Only acceptable to Canadians. We re worried about burning sources because we wont be trusted by allies….while not being worried about the trustworthiness of our leaders and their influences and how that affects us to our allies.

Allies of course being apparently different depending on who you ask and what level of government they work for.
Is it acceptable to Canadians? And are we not worried about that? Because I think to a lot of us it’s not, and we are… Unfortunately we’re pretty much at the mercy of the elected legislature and the government of the day to do anything about it.
 
MacKay did a good job explaining the situation...

Indian high commissioner accuses Trudeau of destroying bilateral relationship, says 'mistrust' persists​


Canada’s most recent high commissioner to India, Cameron MacKay, said the federal government is acting on the issue, and that Canada has sought more information from India on 26 of those 27 extradition files.

“Let me be clear,” he told Kapelos, also in an interview on CTV’s Question Period, airing Sunday. “In the past, where India has shared sufficient information, we have successfully extradited people from Canada to face law.”

“It’s a diversion tactic to claim that Canada has been uncooperative in these law enforcement matters,” he also said. “I consider it to be simply not true.”https://army.ca/forums/javascript:;

 
If you ever want to get their material again? High. If we want to go it alone on national security and not have foreign allies feed us info on the plot du jour of the latest ISIS convert or foreign interference network, then by all means stomp on said allies’ dicks.

Leaks and compromises will inevitably happen. Dealing with them and investigating and prosecuting where possible is how trust is retained and rebuilt after they do. Respecting foreign use caveats is utterly implicit in sharing and exchanging intelligence, whether at the highest levels of national security, or the lowest level police to police sharing. Being on our own in the national security space would be… Pretty lonely.

I agree that it is a lonely old world out there.

And Adam Smith was right. Everyone acts out of self-interest.

Info on weapons of mass destruction in Iraq came from trusted sources.
 
It seems to be. People seem to care more about, and protest against, Jordan Peterson talking than they do our governments behavior.
People seem to care more about the odd things coming out of backbenchers' (or potential backbenchers') mouths. Enough of the media focuses attention on that, that I suppose it's understandable if people do so.
 
OK, finally got a bit of time to bash out a (edit: LONG) post here on the criminal investigation/prosecution side of this, and the challenges. I'll try to go into better depth than just waving my hands and saying "I2E". I'll talk a bit about why our courts struggle with using the material that exists.

First, to situate the conversation: As a definition of 'foreign interference' I'm going to go with a portion of the definition of "threats to the security of Canada" as written in the CSIS act. That definition is important because it establishes authority for CSIS to collect, as well as informing the policy on National Security investigations by RCMP and prosecutions by the Public Service Prosecution of Canada. So it's a useful and coherent definition. That definition is:

"(b) Foreign influenced activities within or relating to Canada that are detrimental to the interests of Canada and are clandestine or deceptive or involve a threat to any person,"

So:
  • Foreign influenced
  • In Canada OR outside but relating to Canada
  • Detrimental to our interests (this is very broad)
  • Clandestine or deceptive OR involve a threat to any person.

This captures the broad range of possibilities quite well.

Now, this is law empowering our security intelligence collection. It does NOT create crimes. In fact, until August 2024, most things that could constitute foreign interference were not crimes. The erstwhile Security of Information Act mostly concerned espionage- very relevant, but only overlapping this issue, not comprehensive. It did have one offense for "Foreign-influenced or Terrorist-influenced Threats or Violence", but it was restrictive and needed pretty clear threats or violence to be met. It has never been charged or prosecuted, and most of the things we see in the news fall short of that- although, potentially, some of the Khalistani-related oppression-via-threats alleged to have been committed by India could hit the elements, if proven. My wild guess is that the murder and extortion charges that have been prosecuted were much easier and cleaner to prosecute as straight murder or extortion, with no value added form testing an unproven offence that would involve, uh... 'complicated' evidence.

This just changed. Old SOIA is no more. In August it was amended to the 'Foreign Interference and Security of Information Act', FISOIA. It still has all the old familiar SOIA offences - STFU for life, don't talk about classified national security secrets, etc etc. But it added a number of new crimes for Intimidation, threats, or violence outside Canada; committing any other indictable offence for a foreign entity; engaging in 'surreptitious or deceptive conduct... for purposes prejudicial to the state...'' (there's that CSIS act definition sneaking in), and, written very broadly, 'political interference for a foreign entity' with a TON of ways to tick that box. All of these new offences have to be done at the direction of, in association with, or for the benefit of a "foreign entity". I've simplified and summarized a lot, but the new offences can be found in Ss. 20.1 to 20.4 of FISOIA. Foreign Interference and Security of Information Act

So the good news is a lot of stuff is now illegal that wasn't. Particularly, I actually find the 'commit indictable offence for a foreign entity' to be EXTREMELY broad. Basically if you do any other serious crime at the of, for the benefit of, or in association with a foreign entity, you've committed a separate and distinct offence. I let this bounce around my brain a bit. Extortion for a foreign power? New distinct offence on top of the extortion itself.

Oh, and these new crimes? All carry up to life in prison, and all specifically say that sentences are to be served consecutively to any other sentence. So if you eat a Foreign Interference charge and are convicted, that adds years on top of anything else you would be serving for the other stuff you did. In practice, and I mention this to keep @FJAG happy, probably in such cases we would see underlying offences treated as 'lesser included' and stayed per Kienapple, with the sentencing for the FISOIA charge bumped upwards accordingly. But anyway- get convicted for foreign interference offences, you're walking in the door knowing you face life.

These offences cannot apply retroactively. Anything done before August 19th, 2024 does not fall under the new offences. Going forward, now that the crimes exist, prosecuting them will be the challenge. This pulls us right back into questions of I2E.

I see some people say "Intelligence is not evidence". I don't like this sweeping generalization. I usually see it uttered by or attributed to people working in the intelligence world who are used to a blanket approach of 'this material shall not cross into criminal matters'. They take that to mean it can not cross into criminal matters. Or they'll say that the nature of how the information came in means it cannot be sufficiently probative to be regarded as evidence.

I don't agree. To the second point first: National security intelligence is pulling in information. So too is criminal evidence. Setting aside the question of admissibility for now, the quality of the information is more about how credible, compelling, and corroborated it is, not automatically determined by where it came from. CSIS works a lot of confidential informants who may be of dubious value and questionable integrity... But that equally describes police confidential informants. The people who can give actionable source info on drug gangs are often not the most upstanding or honest people. Similarly, and this is me going way out there now into hypotheticals, but if a domestic or foreign intelligence agency has communications intercepts... Well, police do that too. It's called a wiretap. What's different here is the legal framework and the methods.

Information is not valueless to law enforcement and prosecutions just because it is called 'intelligence'. Police also collect 'intelligence', albeit usually not with the degree of sensitivity and classification of, say, security intelligence human sources. Police intelligence can and does come with similar use caveats. I have written affidavits to get judicial orders where part of the process was requesting permission from a police organization to use their intelligence material, and to modify their caveat.

So- Security intelligence is not inherently not evidence in the sense that it's useless info. Au contraire, if it were authorized for use it could be quite compelling indeed. Intelligence info and witness testimony from the RCAF and CFINTCOM was used in a case int he early 2000s for some loser who took a Canadian Army officer hostage and used him as a human shield in Yugo. Approaches were found and actually a whole new structure developed to use that info.

So, if the security intelligence isn't 'not evidence' because of what it inherently is or how is it sourced, why is it 'not evidence'? Well, because the government of Canada says so- usually to protect how it was sourced. And that's not wrong.

When evidence is tendered in court, the accused is able to challenge it. If I write a wiretap warrant, and it results in us listening to criminals' conversatiosn and we get evidence, eventually we need to disclose the existence of that wiretap, AND we need to disclose my (likely very lengthy and detailed) affidavit asking the court for permission to do that. That affidavit will spell out a lot of the investigation. There are some things we can redact, but they're gonna get most of it. That's our 'sources and methods' at risk. Now, we can write confidential appendices to include, say, human source info- the courts will protect source info, so if we write well and are selective in what info we include, the accused shouldn't be able to piece together who the informant(s) is/are. But they do get to try. Further, if the defense counsel argues that there are significant weaknesses in my affidavit, I as the affiant may have to take the stand as a police witness, be questioned, and testify as to my grounds for belief. That can get sketchy, and can be used by skilled defense counsel to try to paint police into a box where if they go any farther, the identity of a source might get compromised. If any investigator states that they 'believe' something, and act on it in the investigation, they need to be ready to defend the basis for their belief. 'Well, CSIS told me..." counts for very little if CSIS is not next on the stand to defend it.

In criminal prosecutions in Canada, Crown has a duty to disclose all evidence that could possibly be relevant to the case. That's an extremely broad disclosure obligation. Contrast that with the U.S., where prosecutors have to disclose the evidence they rely on, as well as anything that 'exculpatory or impeaching', and material to guilt or innocence. It's still a lot, but it leaves out a ton of information that isn't relied on by prosecutors, and isn't material to the defense, or the degree of culpability or possible punishment. This means that a lot of material can be collected and considered, but ultimately not disclosed because it doesn't get used, and it doesn't let the guy off the hook. So, in Canada, were intelligence information to enter a criminal investigation and prosecution, it would by default be disclosable (hold on, I'll get to it), whereas in the US there are easier way around that.

Now, jsut because something is presume disclosable, doesn't mean the accused will definitely get it. The Canada Evidence Act allows for privilege to be asserted to protect certain public interests (S. 37 CEA, often sensitive investigative techniques or other ongoing investigations), for national security or international relations (S. 38), or Cabinet confidence (S. 39). I'll focus on S. 38 - national security and international relations. And I'll do this by contrasting Canada and the US.

Let's imagine a national security offense. Say, unauthorized disclosure of security intelligence, or one of the new Foreign Interference offences. And let's suppose that in this investigation, there is classified intelligence involved - maybe as the actual information that was leaked, or maybe coming form a domestic or international intelligence partner to say "Hey, Buttcrackistan is running a foreign interference network in Canada; this diplomat is running seven agents, and this foreign intelligence officer is in Canada under the radar to pressure the diaspora to vote for certain candidates in leadership elections and the general election". Let's say that's some rock solid security intelligence whose sources and methods MUST NOT be burned, and that some of it is foreign and not authorized to be disclosed in court.

In Canada, this would be investigated by RCMP and prosecuted by the Public Prosecution Service of Canada. In the US, by FBI and DOJ. Pretty analogous.

In Canada, though, the prosecution of crimes is always in Provincial courts. Serious offences will be in the Superior Court of Justice of a province. in the US, they have Federal criminal courts that can prosecute federal crimes - remember. Canada has a single system of criminal law, in the US they have at least 51. The feds, and each state.

Here's where this becomes a problem. In Canada, we do have a system for the government to assert that S. 38 CEA National Security privilege, and to suppress information from seeing the light of day in court. This was developed for the aforementioned Yugoslavia / hostage taking prosecution of a gent named Ribic, a Serbo-Canadian who went home to fight for Serbia and ended up back in Canadian custody after his hostage taking. The way this works is essentially thus:

1. The Attorney General or a delegate asserts, based on notice from someone in the criminal prosecution (usually Department of Justice non-prosecution counsel, but could conceivably be the prosecutor or even investigating police) that information could be disclosed which would be potentially injurious.

2. An application is made to Federal Court to have the matter considered in camera by a federal court judge, to determine if in fact the potential for injury exists. The federal court judge will consider the relevance of the material, the potential injury, and whether the public interest favours disclosure. The Department of Justice (as opposed to Prosecutors) will propose the actual redactions, based on consultation with the actual agencies that 'own' the material, or who are Canada's counterpart to the applicable foreign agency that does. So, say for example, CSIS would say 'here are the black boxes we want' and DOJ would say 'OK' and argue that to federal court. The defense does not get to see the material when fighting this, however they can have a security cleared lawyer appointed by the court as an Amicus who will hear the proposed arguments of both sides, will see the material, and will advise the judge to help decide. The federal court judge can order full or partial disclosure, or completely uphold the AG's proposed redactions. If the AG disagrees, the AG can by fiat overrule the court with regards to the admissibility of the info. A rare executive veto over the judiciary.

3. Once this is determined, the resulting final vetted version of the disclosure is given to defense. Maybe that's pages entirely covered in a big black box, maybe it's heavily or lightly redacted. But the defense never gets to see under the black. So too, the trial court judge never gets to see under the black. This is important: The judge presiding over the criminal trial will never get to know the actual contents that are redacted, and so is unable to make their own assessment of the impact in full knowledge of both the information content, and the larger impact on the trial.

4. The defense then will probably make an application saying that the lack of access to classified information renders the trial unfair. The trial court judge - again, not knowing what the material actually is - has to take their best stab at what's reasonable and fair. This can mean some charges completely dismissed, or it can mean certain crown evidence is excluded, or what have you. But, I think it's fair to say, the court will lean toward erring on the side of protecting the right to presumption of innocence.

The U.S., by contrast, will prosecute such matters in federal trial courts, and they will essentially import into the individual court and case a system to security clear court staff and counsel, brief, handle, safeguard, and argue classified materials. The judge does get to see the contents, while ultimately filling a similar role of deciding what will and what will not be disclosed. The judge can make similar determinations about trial fairness, can toss charges, order certain evidence suppresses, etc. But it's a decision that is made much more knowingly, and therefore, I would content, much more precisely and surgically. It's also happening within the same court as part of the pre-trial process, so it's not bouncing between (and causing delays in) various levels of court as it would here.

So- Canada has a more cumbersome process for taking such information into criminal proceedings. It's a process that leaves the trial judge ignorant about the actual precise content in question, and having to make a decision on trial fairness by making their best guess, with only the written decision of the federal court to rely upon (although this can include classified portions that the trial judge will see but the public won't).

Canada also uses this far less frequently. There have only ever been I think three prosecutions under SOIA, only one of which went to trial and ultimately to a jury verdict last year. I'm sure there was at least a bit of this as well in some terrorism cases, though those tend to be built on conventional non-classified police evidence, potentially after a national security agency says, with minimal to no detail, 'Uh- this guy's a problem, you better take a look'.

National security evidence considerations would inform every single stage of the investigation from early on all the way to the final trial. You need investigators and prosecutors who can wrap their heads around this and not crash into the problems that can arise. In Canada there are likely only a handful of prosecutors and police investigators who have worked most or all of the lifecycle of these sorts of files and who understand how to handle this stuff, because it's simply very rare. Why try to bring this evidence in if you can just run a clean murder or extortion trial? But this lack of experience will be a friction on future investigations; sort of the 'every roto is roto 0' that's familiar to anyone in CAF. If you don't rep something out enough you don't really build up institutional knowledge. And of course even after doing something once, doesn't mean someone's career keeps them in situ to be there running the file when the issue comes up again. Maybe they're on to higher management, or a different field office.

So, in the shell of a really huge nut, these are a lot of the practical considerations and, at times, barriers to bringing security intelligence into a prosecution. As a rule of thumb, investigators will seek clean, usable information... But in some crimes that simply may not exist. Police may not be able to replicate a signals intelligence intercept that tells us another government is screwing with our democracy. They may not be able to prove classified information was leaked without actually tendering the leaked information in court - Canada has never yet cracked that nut in the security intelligence space, though it's barely had any chances to.

I do not believe that our new FISOIA offences are impotent. I do believe they'll be challenging to investigate and prove without relying on information that comes form intelligence agencies and which they aren't cool with having disclosed in court. That pushes some of this back into the policy realm to decide if we will change how we view the sanctity of security intelligence... But that is best done super carefully, because those wells can and will dry up fast if we draw from them too liberally. And we have no authority at all to waive the privileges asserted by international partners. They can't stop us from doing it with material we already have, but fuck with it and watch how quickly Five eyes becomes Four Eyes- very much to Canada's detriment.

This long overdue post of dubious quality brought to you by my kid sleeping in and two cups of coffee.
Great summary! If I may offer one point of further clarification for the readers, you mention the distinction between us and the US is them having both federal and state-level courts, then make reference to the Federal Court of Canada. To be clear, the inherent jurisdiction in all criminal prosecutions rests with the provinces unless a law specifically says otherwise. The Federal Court describes itself as a trial court, but only in specific circumstances, and the reviews of national security matters is one of them.
 
It seems to be. People seem to care more about, and protest against, Jordan Peterson talking than they do our governments behavior.
What are the available COAs for Joe Public though? @brihard gave a really good explanation why “release the names” isn’t really a good idea, and the other options are likely opaque to the general public. Maybe a bunch of people will decide to want to retire before an election is called, but is that because they think they’ll lose, or that they’re being told to quietly leave the party due to potential foreign interference?

I am very concerned about foreign interference in any party, at any level. So, I can contact my MP and MPP, and say….what exactly? I can’t offer any good recommendations.
 
What are the available COAs for Joe Public though? @brihard gave a really good explanation why “release the names” isn’t really a good idea, and the other options are likely opaque to the general public. Maybe a bunch of people will decide to want to retire before an election is called, but is that because they think they’ll lose, or that they’re being told to quietly leave the party due to potential foreign interference?

I am very concerned about foreign interference in any party, at any level. So, I can contact my MP and MPP, and say….what exactly? I can’t offer any good recommendations.

As @brihard said later in response to my comment - consequences.

Every action has consequences, a down side. There are no guilt free options out there. Does that mean that no action should be taken? Is paralysis an acceptable outcome?

You get dirty when cleaning out the stables, but we need them cleaned.

I think that maintaining, or restoring perhaps, faith in our institutions demands some action.
 
I agree that it is a lonely old world out there.

And Adam Smith was right. Everyone acts out of self-interest.

Info on weapons of mass destruction in Iraq came from trusted sources.
Not to beat a dead horse, but as I was part of TF McCall ( the SOTF for WMD work in Iraq) , we did recover a number of items, and a slew of yellow cake uranium (which was shipped to Canada for disposal). There were a lot of white hazmat suited UN personnel who catalogued everything at BIAP before it got shipped out. We also watched a lot of chemical weapons cross the border into Syria (to be later used by Assad).
 
What are the available COAs for Joe Public though? @brihard gave a really good explanation why “release the names” isn’t really a good idea, and the other options are likely opaque to the general public.
That was a great post by Brihard. It sounds like our system to deal with this really sucks. We need to stop doing the Canadian thing of kicking the can down the road. Like Kirkhill wisely pointed out you get dirty cleaning out stables.

Joe Public can shut down the parliament, or Ottawa, until an election is called. Maybe ask truckers for help ;)


Releasing the names might cause a bunch of problems for Ottawa and the courts. Good. Canadian citizens deserve to know if their democratic representatives are corrupt or even just compromised.
 
That was a great post by Brihard. It sounds like our system to deal with this really sucks. We need to stop doing the Canadian thing of kicking the can down the road. Like Kirkhill wisely pointed out you get dirty cleaning out stables.

Joe Public can shut down the parliament, or Ottawa, until an election is called. Maybe ask truckers for help ;)


Releasing the names might cause a bunch of problems for Ottawa and the courts. Good. Canadian citizens deserve to know if their democratic representatives are corrupt or even just compromised.
I can assure you that in general, “kicking the can” isn’t a Canadian-only policy.
 
Releasing the names might cause a bunch of problems for Ottawa and the courts. Good. Canadian citizens deserve to know if their democratic representatives are corrupt or even just compromised.
Not just the Courts and not just Canada. As was alluded to before, maybe not strongly enough, releasing the names publicly could also cause sensitive sources and methods to be compromised. Some of those "sources" are people who have provided help to us, either directly or through our allies. Having them "disappear" in their home country as a consequence of political gaming back home is not something I want our Parliamentarians engaged in.
 
I am very concerned about foreign interference in any party, at any level. So, I can contact my MP and MPP, and say….what exactly? I can’t offer any good recommendations.
Me too. I sent my MP a note saying I would like to see him get his security clearance, so he can take full briefings…
 
Not just the Courts and not just Canada. As was alluded to before, maybe not strongly enough, releasing the names publicly could also cause sensitive sources and methods to be compromised. Some of those "sources" are people who have provided help to us, either directly or through our allies. Having them "disappear" in their home country as a consequence of political gaming back home is not something I want our Parliamentarians engaged in.
Which is all true…most likely, however a Canadian shrug and an “oh well, what can you do?” doesn’t cut it, especially as Canadians prepare for the Federal vote.

At the very least, I expect the government to direct a ‘sensitivity analysis’ to determine the risk to intelligence sources that a range of disclosure options might/would incur and determine where the acceptable risk level is/would be, so that Canadian’s don’t end up voting for an MP who could be anything from a compromised candidate to a full-on colluding foreign agent.
 
I can assure you that in general, “kicking the can” isn’t a Canadian-only policy.
Of course. But we're really good at it and it seems to be an enshrined accepted political behavior.

Some of those "sources" are people who have provided help to us, either directly or through our allies. Having them "disappear" in their home country as a consequence of political gaming back home is not something I want our Parliamentarians engaged in.

They knew the risk but it's still shitty to risk their safety. We could always drop them a few million and set them up with a condo in Toronto.

Or, when we release names and someone demands to know how we got them we rip a page out of the LPC play book and say sorry parliamentary privilege and all that. Then throw them some money.

Edit: I'm ranting here and don't have anything worth while to add, sorry. Its just super disappointing the state we allowed our country to become. There always seems to be a reason not to hold people accountable and we just move on.
 
Last edited:
They knew the risk but it's still shitty to risk their safety. We could always drop them a few million and set them up with a condo in Toronto.

Or, when we release names and someone demands to know how we got them we rip a page out of the LPC play book and say sorry parliamentary privilege and all that. Then throw them some money.

Edit: I'm ranting here and don't have anything worth while to add, sorry. Its just super disappointing the state we allowed our country to become. There always seems to be a reason not to hold people accountable and we just move on.
I think you're missing the point. So, we release the name of Joey Smallmouth, CPC MP for Bass River. His PRC handlers go "hey, woah... how'd they figure that one out?" They go digging and find we turned one of theirs, even unwittingly. All the Parliamentary privilege in the world won't save that PRC national from Makarov round to the back of the head.
 
Back
Top