Last Updated:
Status:
Published
Review Number:
22-04
Last Updated:
Status:
Published
Review Number:
22-04
Date of Publishing:
This review is the third annual review of Canadian Security Intelligence Service (CSIS) threat reduction measures (TRMs) completed by the National Security Intelligence Review Agency (NSIRA).
The review had two main objectives. First, to provide an overview of TRMs in 2021, contextualizing the data as appropriate by comparison with data from preceding years and noting any trends or patterns that emerge. Second, to conduct a review of a selection of TRMs implemented in 2021.
NSIRA found that CSIS’s use of its TRM mandate in 2021 was broadly consistent with its use in preceding years. Overall, CSIS implemented El TRMs during the review period, covering a range of threats to the security of Canada (as defined by section 2 of the CSIS Act), including espionage/sabotage, foreign interference, and violence/terrorism. Of note, 2021 marks the first time since the inception of the regime that TRMs involving Ideologically Motivated Violent Extremism (IMVE) threats outnumbered those stemming from Religiously Motivated Violent Extremism (RMVE).
In terms of trends over time, NSIRA observed that the year 2018 was an inflection point for CSIS’s use of the TRM mandate. In that year, CSIS proposed nearly as many TRMs as were proposed in the preceding three years – the first three of the mandate – combined. In the following year, however, the number dropped slightly, before a more significant reduction in 2020. This downward trend plateaued during the review period, even rebounding gently. The number of proposed TRMs in 2021 went up as compared to the previous year, as did both approvals and implementations.
NSIRA selected three TRMs implemented in 2021 for review, assessing the measures for compliance with applicable law, ministerial direction, and policy. At the same time, NSIRA considered the implementation of each measure, including the alignment between what was proposed and what occurred and, relatedly, the role of legal risk assessments for guiding CSIS activity, as well as the documentation of outcomes.
For all the cases reviewed, NSIRA found that CSIS met its obligations under the law, specifically the Canadian Charter of Rights and Freedoms and sections 12.1 and 12.2 of the CSIS Act. In addition to general legal compliance, NSIRA found that CSIS sufficiently established a “rational link” between the proposed measure and the identified threat.
For one of the three cases reviewed, NSIRA found that CSIS did not meet its obligations under the 2015 Ministerial Direction for Operations and Accountability and the 2019 Ministerial Direction for Accountability issued by the Minister of Public Safety.
The TRM in question [**redacted**] NSIRA believes that the presence of these factors ought to have factored into the overall risk assessment of the measure. [**redacted**]. In addition, however, are the risks [**redacted**]. These risks are not, and in this instance were not, captured by CSIS’s reputational risk assessment.
Similarly, the legal risk assessment for this TRM did not comply with the ministerial direction that “legal risk is to be assessed in accordance with the Department of Justice risk criteria.” [**redacted**] Under CSIS’s “TRM Modernization” project, implemented in January 2021, [**redacted**]. NSIRA recommended that LRAs be conducted for TRMs [**redacted**] and, further, that CSIS consider and evaluate whether legal risk assessments under TRM Modernization comply with applicable ministerial direction. NSIRA may revisit this issue – and TRM Modernization as a whole – in a future review.
A comparative analysis of the two LRAs provided for the other TRMs under review underscored the practical utility of clear and specific legal direction for CSIS personnel. Clear direction allows investigators to be aware of, and understand, the legal parameters within which they can operate and, subsequently, allows after-action reporting to document how implementation stayed within said bounds.
With respect to documenting outcomes, NSIRA further noted issues with, and made recommendations for, when CSIS produces certain reports following implementation of a TRM. Specifically, NSIRA recommended specifying in policy when the Intended Outcome Report and Strategic Impact Report are required. While cognizant that overly burdensome documentation requirements can unduly inhibit CSIS activities, NSIRA nonetheless believes that the recommendations provided are prudent and reasonable. Relevant information, available in a timely manner, benefits CSIS operations.
NSIRA review is an important part of the TRM regime. The CSIS Act requires CSIS to notify NSIRA after it has implemented a TRM, while the NSIRA Act requires NSIRA to review, each calendar year, at least one aspect of CSIS’s performance in undertaking TRMs. The result is enhanced likelihood that CSIS will use the TRM mandate lawfully and responsibly. In this vein, it bears underscoring the general finding of compliance – with law, ministerial direction, and policy – at the core of this review, noted issues notwithstanding.
NSIRA employees directly and independently accessed the relevant CSIS database to review and verify information. Following an initial analysis, follow up Requests for Information (RFIs) targeted specific documents identified as missing or potentially relevant. NSIRA shared a preliminary draft of the report with CSIS to verify its factual accuracy. NSIRA has high confidence in the information it examined in the course of this review, and consequently in the findings and recommendations emerging therefrom.
Figure 1: Approved TRMs from 2015–2021
Figure 2: Proposed TRMs by Threat Type
Figure 3: Proposed TRMs within the 2c (violence) threat category, by year
Figure 4: Percentage distribution of TRMs targeting 2b (foreign interference) threats, 2015–2021
Figure 5: Proposed, Approved, Implemented totals for 2015–2021 TRMs
Table 1: All TRMs implemented in 2021
This review was conducted under the authority of subsection 8(2) of the National Security and Intelligence Review Agency Act (NSIRA Act).
This review is the third annual review of CSIS threat reduction measures (TRMs) completed by the National Security Intelligence Review Agency (NSIRA). NSIRA’s predecessor, the Security Intelligence Review Committee (SIRC), examined CSIS’s use of threat reduction measures between 2016 and 2019.
NSIRA review is an important part of the TRM regime.2 The CSIS Act requires CSIS to notify NSIRA after it has implemented a TRM, while the NSIRA Act requires NSIRA to review, each calendar year, at least one aspect of CSIS’s performance in undertaking TRMs. In this way, the significant power conferred by the creation of the TRM mandate in 2015 is countervailed by regular and rigorous independent review.
NSIRA’s 2020 Review examined a sample of TRMs to assess their compliance with law, policy, and ministerial direction. The review found that, in a limited number of cases, individuals were included in a TRM without a rational link between the individual and the identified threat. Relatedly, NSIRA cautioned that overly broad rational link criteria could affect a measure’s reasonableness and proportionality. The review also noted that more consideration was needed with respect to the possible existence of an agency relationship between CSIS and third parties receiving information from CSIS.
NSIRA’s 2021 Review focused on the latter dynamic, examining cases involving the disclosure of information from CSIS to external parties with their own levers of control and the extent to which CSIS appropriately identified, documented and considered any plausible adverse impacts such measures could have on individuals. The review made recommendations in these areas, including that CSIS “comply with its record-keeping policies related to documenting the outcomes of TRMs.
This recommendation was further to SIRC’s 2016 Review, which emphasized the importance of documenting TRM outcomes. SIRC commended CSIS for developing guidance with respect to outcome reporting, but urged continued refinement – suggesting, inter alia, “timeframes for reporting on all outcomes” – moving forward. CSIS agreed with the recommendation, and successive versions of CSIS’s governing policy for TRM have included greater specificity in this regard.
A benefit of yearly review is the ability to identify and assess such challenges over time. To this end, each previous NSIRA review, in addition to the particular objectives noted above, tracked and described the overall use of the TRM mandate in the relevant review period. The 2020 review established a dataset of all TRMs since the inception of the mandate in 2015, which in turn helped inform case selection for the 2021 review. Supplemented on an ongoing basis by information provided to NSIRA pursuant to subsection 12.1(3.5) of the CSIS Act, this dataset allows NSIRA to identify trends, patterns, and emerging issues of relevance with respect to CSIS’s use of threat reduction measures, including through the quantification of data. Data from a specific year/review period can be contextualized (e.g., was the mandate used more, less, or in a qualitatively different way as compared to previous years?) and topics for future review identified.
The present review builds on the above work in two ways. First, we compare the use of the TRM regime in the relevant review period to its use in previous years and identify overall trends and patterns since the inception of the regime. Second, we focus on outcomes by selecting cases of implemented (as opposed to simply proposed or approved) TRMs for review. This speaks not only to the challenges associated with the documentation of outcomes, but also the “rational link” requirement that undergirds a given TRM’s reasonableness and proportionality, and globally the alignment of what the measure did with the threat it was intended to reduce. All of these issues have been, to one extent or another, subject to comment, findings, and/or recommendations in previous reviews.
The review period covers 1 January 2021 to 31 December 2021. NSIRA also examined information from outside of this period in order to make a full assessment of relevant TRM activities.
The review had two main objectives:
With respect to this second objective, three TRMs were selected according to criteria designed to maximize the utility of NSIRA’s findings and recommendations to CSIS (see the discussion of case selection strategy in Annex C). These TRMs were subject to two lines of inquiry: a compliance review against applicable law, ministerial direction, and policy; and, a review of implementation, including the alignment between what was proposed and what occurred, the documentation of outcomes, and the crucial role of legal risk assessments for guiding CSIS activity.
NSIRA examined and considered all relevant legislation and documentation pertaining to the objectives of the review, including:
NSIRA employees directly accessed the relevant CSIS databases on 4 March 2022 to collect this information. Subsequent requests (RFIs) for additional documents identified by the review team were issued in March, April and May 2022.
The review also analyzed data compiled under previous TRM reviews as well as provided to NSIRA by CSIS pursuant to subsection 12.1(3.5) of the CSIS Act.
NSIRA has high confidence in the information it examined in the course of this review, and consequently in the findings and recommendations emerging therefrom.
As noted above, NSIRA employees directly and independently accessed the relevant CSIS database to review and verify information. NSIRA’s familiarity with the TRM regime meant that the review team was able to pre-identify relevant TRM documentation and then confirm its existence in CSIS holdings. Following an initial analysis, follow up RFIs targeted specific documents identified as missing or potentially relevant. In some instances, CSIS was able to produce the requested documents; in others, they confirmed that said documents did not exist. This process gave the review team confidence as to the completeness of the documentation necessary to satisfy the objectives of the review. That NSIRA personnel directly retrieved the majority of documents from CSIS databases similarly gives high confidence that the information is valid and accurate. Finally, NSIRA shared a preliminary draft of the report with CSIS to verify its factual accuracy.
The first objective of the review was to document and describe how CSIS used its TRM mandate in 2021, and to contextualize that use by comparison to previous years.
Finding 1: NSIRA finds that CSIS’s use of its TRM mandate in 2021 was broadly consistent with its use in preceding years.
In 2021, CSIS proposed [**redacted**] measures (i.e., TRMs designated [**redacted**] of which [**redacted**] were approved and [**redacted**] implemented. Of the [**redacted**] TRMs which were approved but not implemented in 2021, all remain valid, and implementation rates from previous years suggest that many are likely to be implemented in 2022 (see Figure I).
[**redacted figure**]
In addition, [**redacted**] TRMs that had been proposed in 2020 (designated [**redacted**] were 15(l)(d)(ii) ultimately implemented in 2021. Overall, therefore, CSIS implemented [**redacted**] TRMs a total of [**redacted**] times during the review period (for an overview, see Table 1 in Annex C).
Section 2, paragraphs (a) through (d) of the CSIS Act identifies four basic categories of threats to the security of Canada:
A range of threats were addressed by measures during the review period, including a rough balance between 2a (espionage/sabotage), 2b (foreign interference), and 2c (violence) threats. [**redacted**] 2d (subversion) threats, [**redacted**].
This distribution is in keeping with how CSIS used the mandate in previous years. Figure 2 plots the number of proposed TRMs by threat type since 2015.
[**redacted figure**]
Since 2015,2c (violence) threats have most frequently been the subject of TRMs [**redacted**] followed closely by 2b (foreign interference) threats.
While CSIS’s overall focus on 2c threats has been consistent over the years, the underlying composition of those threats (that is, the specific targets within that broader category) has evolved. From 2015-2017, for example, the overwhelming majority of TRMs aimed at reducing 2c threats involved targets associated with religious extremism (what would now be categorized as Religiously Motivated Violent Extremism, or “RMVE”). More recently, and beginning in 2018, there has been an increase in TRMs aimed at targets in the Ideologically Motivated Violent Extremism (IMVE) milieu. Figure 3 shows the number of TRMs in each of these categories year by year.
[**redacted figure**].
Of note, the present review period marks the first time since the inception of the regime that TRMs involving IMVE threats outnumber those stemming from RMVE. [**redacted**]. This shift in the threat environment is reflected in Figure 3, above, which shows [**redacted**] with respect to RMVE and IMVE overtime.
There are also trends worth noting with respect to 2b (foreign interference) threats, which have been subject to [**redacted**] TRMs since 2015. First, the number of TRMs targeting 2 b threats [**redacted**]. TRMs in this area aim at reducing threats to Canadian security from hostile state actors; such threats can include, among others, cyber attacks/operations, election interference, or the monitoring of dissidents in Canada. [**redacted**] throughout the course of the regime, [**redacted**] (see Figure 4).
[**redacted figure**].
Figure 5 shows overall trends, specifically use of the regime by TRM status – proposed, approved, and implemented – since 2015. The year 2018 was an inflection point. In that year, CSIS proposed nearly as many TRMs as were proposed in the preceding three years – the first three of the mandate – combined [**redacted**]. In the following year, however, the number dropped slightly [**redacted**] before a more significant reduction in 2020 [**redacted**]. The year 2020 was a low ebb across all three categories, with the lowest number of implementations [**redacted**] since the first year of the regime [**redacted**] This downward trend plateaued during the review period, even rebounding gently. The number of proposed TRMs in 2021 went up as compared to the previous year [**redacted**] as did both approvals [**redacted**] and implementations [**redacted**].
[**redacted figure**].
In the course of NSIRA’s 2020 TRM Review, CSIS explained [**redacted**]. The COVID-19 pandemic interrrupted some aspects of that work, such as site visits to regions to explain the program, [**redacted**]. The question of how actively CSIS uses the TRM regime – and whether efforts to bolster its use were or were not successful, or quire more attention – is reasonably deferred at present, given the unique circumstances related to COVID-19. Moving forward, however, NSIRA will be attuned to such considerations. Now over five years since the inception of the mandate, an assessment of CSIS’s use of TRM as a viable tool complementing the organization’s “culture of collection” may warrant explicit consideration.
In this way, NSIRA’s finding that CSIS’s use of TRMs in 2021 is broadly consistent with its use in preceding years is useful as a baseline, or data point, informing future assessments of the regime. Ultimately, each successive year of review will offer additional information and cumulative insight into how CSIS exercises its threat reduction mandate.
NSIRA’s second objective was to conduct a review of a selection of TRMs implemented during the review period. NSIRA assessed the TRMs for compliance with applicable law, ministerial direction, and policy. At the same time, NSIRA considered the implementation of each measure, including the alignment between what was proposed and what occurred and, relatedly, the role of legal risk assessments for guiding CSIS activity, as well as the documentation of outcomes. For a full discussion of NSIRA’s case selection strategy, see Annex C.
The selected cases are as follows:
[**redacted**] CSIS conducted a TRM [**redacted**].
The TRM involved [**redacted**].
The Department of Justice (hereafter, “Justice”) provided CSIS with a Legal Risk Assessment (LRA) of the proposed TRM [**redacted**].
[**redacted**].
Following these implementations, CSIS assessed that the immediate intended outcomes of the TRM [**redacted**].
The TRM’s Strategic impact Report, [**redacted**] ultimately concluded that the TRM’s [**redacted**].
[**redacted**] CSIS conducted a TRM [**redacted**].
The TRM [**redacted**].
Justice delivered an LRA of the proposed TRM to CSIS [**redacted**].
CSIS implemented the TRM [**redacted**].
Following the first implementation, CSIS assessed that the immediate intended outcome of the TRM had been “met”. [**redacted**].
[**redacted**] the TRM’s Strategic Impact Report, [**redacted**].
CSIS conducted a TRM [**redacted**].
The TRM involved [**redacted**].
Justice did not provide a formal LRA in this case. [**redacted**].
CSIS implemented the TRM [**redacted**].
CSIS assessed that [**redacted**].
Finding 2: For all the cases reviewed, NSIRA finds that CSIS met its obligations under the law, specifically the Canadian Charter of Rights and Freedoms and sections 12.1 and 12.2 of the CSIS Act.
As made explicit by subsection 12.1 (3.1) of the CSIS Act, the Charter “is part of the supreme law of Canada and all [TRMs] shall comply with it.” Measures that would limit a right or freedom protected by the Charter may only be undertaken if authorized by a warrant. However, the TRMs under consideration in this review were non-warranted measures. NSIRA’s assessment of Charter compliance considered whether any protected right or freedom was limited as a result of the measure. Examination of outcome reporting and other relevant documentation indicated that no such limitations occurred.
The key requirements of sections 12.1 and 12.2 of the CSIS Act include:
For the measures reviewed, each RFA explicitly addressed the requirements for RGB, reasonableness and proportionality, and consultations with other federal departments. In addition, the two LRAs (for Case 1 and Case 2, respectively) and one legal consultation (for Case 3) addressed [**redacted**]. Similarly, the LRAs for Case 1 and Case 2 determined that the proposed TRMs [**redacted**].
NSIRA broadly concurred with these assessments and conclusions. Further, but for Case 3 (see paragraph 79, below), there was no information in the relevant implementation reports or associated documentation that indicated that the actual implementation of the measures sufficiently deviated from the proposed implementation as to be of concern. Finally, NSIRA determined that none of the implemented measures involved any conduct prohibited by subsection 12.2(1) of the CSIS Act.
In addition to general legal compliance, NSIRA paid particular attention to the “rational link” test that helps CSIS establish the reasonableness and proportionality of a measure. As noted above, NSIRA’s 2020 TRM review cautioned against overly broad rational link criteria while also finding that the rational link had not been met in the selection of certain individuals for inclusion in a TRM. As such, the present review assessed whether a) the proposed rational link was logical and clear; and b) that it was met for each proposed implementation.
Finding 3: For all the cases reviewed, NSIRA finds that CSIS sufficiently established a “rational link” between the proposed measure and the identified threat.
However, NSIRA notes several legal and operational considerations that were not addressed as part of the design and analysis of the proposed TRMs but which may be relevant to the contemplation and evaluation of future, similar, measures.
For Case 1, [**redacted**].
While none of these [**redacted**] undermine NSIRA’s finding of legal compliance, they do underscore the possible challenges and risks associated with TRMs involving [**redacted**].
For Case 2, [**redacted**].
In the certification for the second implementation of the TRM, in which an assessment of, and statement regarding, reasonableness and proportionality is required, [**redacted**]. Again, while it is unlikely that such [**redacted**] had they been considered, would have rendered the second implementation unreasonable and/or disproportional in this case, the lack of consideration is potentially informative for other TRMs [**redacted**] and, even if minimal, may need to be addressed in certifications of the reasonableness and proportionality of each [**redacted**] implementation.
Finally, for the Case 3, [**redacted**] NSIRA’s 2021 TRM review dealt extensively with the question of CSIS’s relationship with third parties. Case 3 underscores several of NSIRA’s findings and recommendations from that review, in particular regarding the need to consider plausible adverse impacts of TRMs involving third parties and to document third party activity following implementation.
Compliance with ministerial direction
Finding 4: For Case 1 and Case 2, NSIRA finds that CSIS met its obligations under the 2015 Ministerial Direction for Operations and Accountability and the 2019 Ministerial Direction for Accountability issued by the Minister of Public Safety.
Finding 5: For Case 3, NSIRA finds that CSIS did not meet its obligations under the 2015 Ministerial Direction for Operations and Accountability and the 2019 Ministerial Direction for Accountability issued by the Minister of Public Safety.
Case 3 involved: [**redacted**]
A “fundamental principle” of the 2015 MD is that “the greater the risk associated with a particular activity, the higher the authority required for approval.” This principle was reflected in the section 12 targeting authority [**redacted**] which states [**redacted**]. [**redacted**] ultimately means the letter of the fundamental principle regarding the calibration of level of risk and level of approval is(i)(d) was met, NSIRA finds that the spirit of the principle was not honoured in this case. NSIRA believes that [**redacted**].
In response to a preliminary draft of the present report, CSIS noted to NSIRA that the presence the [**redacted**] see footnote 45 above – in the implementation of the TRM reflected CSIS’s recognition as to the sensitivities of this case. CSIS further argued that risks associated with [**redacted**]. NSIA agrees that part [**redacted**]. In addition, however, [**redacted**]. These risks are not, and in the instance of Case 3 were not, captured by CSIS’s reputational risk assessment. [**redacted**]
The 2019 MD addresses this risk assessment process. Annex A of the MD requires CSIS operational activities, including TRMs, to undergo a four-pillar assessment for legal, operational, reputational, and foreign policy risk. According to the MD, “Legal risk is to be assessed in accordance with the Department of Justice risk assessment criteria.” As noted in paragraph 57, above, no formal Legal Risk Assessment (LRA) was produced for Case 3. [**redacted**] (see the below textbox for a discussion of TRM Modernization [**redacted**]).
CSIS’s TRM Modernization Project
CSIS implemented the TRM Modernization Project on 19 January 2021, [**redacted**] The new process reduces the [**redacted**] aligns TRMs with other programs [**redacted**].
As per the new process outlined in the Department of Justice (DOJ) Legal Risk Management Framework (which supports Justice/CSIS engagement on TRM), Justice advice via an LRA would be sought only where [**redacted**] would be encountered by the TRM. (Prior to this, formal LRAs had been provided as part of every TRM proposal.)
[**redacted**]
Setting aside whether or not the TRM did or did not meet any of [**redacted**] (we return to this consideration below), NSIRA does not believe the legal advice fulfilled the requirements for legal risk assessments set out in the 2019 MD. [**redacted**]. However, CSIS’s Overall Risk Assessment (ORA), which evaluates all four pillars of risk identified by the 2019 MD, [**redacted**] an absence ** for an LRA was taken by CSIS to imply [**redacted**] which contributed to the ORA’s overall calculation that the TRM was low risk. Again, determining the legal risk level in this way [**redacted**] rather than a consideration of the actual legal risks themselves) does not comply with the ministerial direction that legal risk be assessed “in accordance with the Department of Justice risk criteria.”
The pre-identification of [**redacted**] if met, would require formal LRAs, is part of CSIS’s TRM Modernization Project, launched in 2021 (see textbox on TRM Modernization, above). An assessment of this new legal risk assessment model is beyond the scope of the present review, though may warrant attention in future years. In the present context, however, NSIRA questions the conclusion that Case 3 did not meet any of the identified [**redacted**] for consultation. Specifically, NSIRA believes the TRM may have met [**redacted**] and did meet [**redacted**].
[**redacted**] a formal consultation (LRA) must be produced for TRMs “where [**redacted**]. NSIRA believes that the cumulative effects [**redacted**] ought to have been explicitly considered as part of the TRM. This would have allowed CSIS to determine whether such risks were sufficient [**redacted**].
To be clear, it is not NSIRA’s position that the cumulative effects were unreasonable in this case, or constituted an abuse of process; rather, the risks that they were, or did, ought to have been considered more explicitly, which could then have [**redacted**] a formal LRA, as per the process established by TRM Modernization.
[**redacted**].
In addition to [**redacted**] under the current governance regime, NSIRA notes that the absence of a comprehensive legal assessment had potential consequences during the implementation of Case 3.
NSIRA observed that there was a discrepancy in terms of how CSIS described the measure proposal [**redacted**].
The RCMP raised the question of timing during consultations with CSIS about the TRM: [**redacted**].
[**redacted**]. More generally, NSIRA highlights the risks created by ambiguity in the implementation of a TRM, particularly absent clear consideration of possible risks as would occur in an LRA.
[**redacted**].
These considerations are illustrative. The fundamental point is that [**redacted**].
Recommendation 1: NSIRA recommends that formal Legal Risk Assessments (LRAs) be conducted for TRMs [**redacted**].
This recommendation reflects the explicit emphasis placed on these categories by the 2015 MD as well as elsewhere in CSIS policy. While NSIRA understands the desire to streamline the TRM process – reflected in the changes made to legal risk assessment under TRM Modernization – the risks associated with TRMs [**redacted**] rather than situational. A standing policy – [**redacted**] is therefore appropriate in these cases.
It was beyond the scope of the present review to consider the TRM Modernization model in its entirety. The above findings and associated recommendation, however, highlight potential discordance between the application of that model and the requirements of ministerial direction, particularly with respect to legal risk assessments in certain cases.
Recommendation 2: NSIRA recommends that CSIS consider and evaluate whether legal risk assessments under TRM Modernization comply with applicable ministerial direction.
Such an evaluation would allow CSIS to close potential compliance gaps and ensure that legal risk assessments – a mandatory component of every TRM – fulfill their intended function.
Legal Risk Assessments (LRAs)
[**redacted**]. These assessments ultimately bear on implementation – should CSIS deviate too widely from what they said they would do, the legal risk assessment they received may no longer fully apply, or additional risks may be created that were not considered.
Finding 6: With respect to Legal Risk Assessments (LRAs), NSIRA finds that greater specificity regarding legal risks, and direction as to how risks could be mitigated and/or avoided, resulted in more detailed outcome reporting vis-a-vis legal compliance.
This finding emerges from a comparative analysis of the [**redacted**] for Case 3; see Recommendation #1).
The fact patterns for Case 1 and Case 2 were very similar. Each TRM involved [**redacted**]. Nonetheless, NSIRA observed slight but relevant differences between the LRAs offered [**redacted**].
[**redacted**].
[**redacted**]. This reflects an understanding of the limits [**redacted**] and the care taken by investigators to stay within them.
[**redacted**].
[**redacted**].
[**redacted**]. For example, in the Implementation Report for [**redacted**]
Recommendation 3: NSIRA recommends that CSIS work with the Department of Justice to ensure that Legal Risk Assessments (LRAs) include clear and specific direction regarding possible legal risks and how they can be avoided/mitigated during implementation of the TRM.
A comparative assessment of [**redacted**] suggests to NSIRA that clarity and specificity regarding legal risks and how they can be mitigated/avoided serves to guide investigators during the implementation phase. The associated recommendation would allow investigators, whether new or experienced, to be aware of, and understand, the parameters within which they can operate without breaching the Charter or the law, as well as the delimitations of the line(s) that, if crossed, would constitute a breach (or create a significant risk thereof) according to Justice.
This may also improve both implementation and associated reporting. Providing clear guidelines would prompt CSIS investigators to specify in their implementation reports how they remained within the delimitations.
Recommendation 4: NSIRA recommends that Implementation Reports specify how the legal risks identified in the LRA were avoided/mitigated during implementation of the TRM.
The significant powers bestowed by the TRM mandate create potential risks to the rights and freedoms of the individuals subject to such measures, or others captured by their scope. Including specific reporting about how identified risks were mitigated or avoided in the implementation of a TRM would allow CSIS to demonstrate that it was legally compliant from start (what they proposed to do) to finish (what they did) in each case, thereby bolstering confidence that the regime is being used responsibly. (See also the discussion of TRM documentation beginning at paragraph 101, below.)
TRM governance includes requirements that specifically address relevant statutory obligations. For example, [**redacted**]. In this way, compliance with policy is crucial for ensuring compliance with the law.
Finding 7: For Case 2 and Case 3, NSIRA finds that CSIS did not meet its obligations with respect to one requirement of its Conduct of Operations, Section 12.1 Threat Reduction Measures, Version CSIS did not meet its internal policy requirements regarding the timelines to submit TRM implementation reports.
Specifically, NSIRA found that:
This non-compliance is minor in nature. However, it should be noted that delay in drafting and submitting implementation reports could conceivably impact their depth, rigour, and accuracy, particularly as the reports involve a detailed description of what occurred during implementation. If submitting implementation reports within five business days is chronically challenging for investigators, CSIS may wish to revisit the policy requirement and adjust it accordingly.
Documentation of outcomes
More generally, the documentation of implementation and outcomes is important, for at least two reasons. First, to ensure that ex ante compliance obtains ex post. The key consideration here is the alignment between what CSIS proposed to do and what they ultimately did. Second, so that CSIS can evaluate what worked and what did not, with an eye toward future TRMs. Were the goals articulated in the RFA achieved? Did the measure reduce the threat? Knowing the answers to these questions is crucial for determining both what to do next (with respect to a particular threat actor) and what to do in the future (vis-a-vis other, broadly comparable threat actors or circumstances).
Finding 8: For Case 3, NSIRA finds that the Intended Outcome Report was not completed in a timely manner.
At the time NSIRA initially collected information for this review [**redacted**] it did not find an Intended Outcome Report for Case 3 in the relevant CSIS database. In a follow-up request for information, dated [**redacted**] NSIRA sought to confirm whether or not an Intended Outcome report for this TRM had been produced. CSIS provided the report to NSIRA on [**redacted**] the completion date for the report was a day earlier, [**redacted**].
CSIS explained that the relevant regional desk was waiting to receive information from an external party, and therefore was not in a position to complete the Intended Outcome Report at an earlier date. Nonetheless, NSIRA notes that the Intended Outcome Report dated [**redacted**] provided relevant and valuable information, even as the information from the external party remained outstanding.
CSIS’s policy on when Intended Outcome (what CSIS formerly called “intermediate outcome”) Reports are required is unclear. Paragraph 6.5 of CSIS’s Conduct of Operations, Section 12.1 Threat Reduction Measures, Version 4 discusses the need for both Intended Outcome and Strategic Impact reports but only specifies when the latter is due (more on this below, see paragraph 109). As such, the above finding is not a compliance issue, but instead relates to the effective use of such reports for informing CSIS operations. Particularly insofar as CSIS contemplates additional TRMs – or additional implementations of the same TRM under a standing authority – against the same threat actor, having intended outcome reports in hand would likely be of use to operational units and approval authorities.
This was specifically true with respect to [**redacted**] for example. [**redacted**]. Particularly when such key decision points arise, information as to the outcome of a TRM is relevant and potentially useful.
As noted in the case description at paragraph 59 above, CSIS ultimately determined that, as of January 2022, [**redacted**]. That the Intended Outcome report was not completed until [**redacted**] suggests that this information was not available (or at least not documented) in a timely manner.
Recommendation 5: NSIRA recommends that CSIS specify in its Conduct of Operations, Section 12.1 Threat Reduction Measures when the Intended Outcome Report is required, as it does for the Strategic Impact Report.
This recommendation would mean that [**redacted**] reporting requirements would be subject to explicit timeframes, adding to those currently in place for Implementation Reports (within five business days) and Strategic Impact Reports (at one of two specified junctures). Determining when the Intended Outcome Report ought to be completed will require careful consideration. NSIRA’s recommendation does not include a specific timeframe, only that CSIS take the steps to determine what is practical and, in light of the considerations above, useful in this regard (e.g., provides relevant information in a timely manner, particularly with respect to key decision points such as renewals of authorities). While NSIRA acknowledges CSIS’s position that outstanding information may present challenges to an explicit timeframe, we also highlight the pertinent information that was ultimately included in the [**redacted**] Intended Outcome Report for Case 3. This example demonstrates the potential value of reporting information in hand as opposed to waiting until all information is received, with the recognition that updates can always be appended as new information becomes available.
The spirit of the recommendation is that more information, sooner, is beneficial for CSIS as it conducts TRMs. As the above analysis of Case 3 makes clear, knowing outcomes is important not only for tracking the success or failure of the TRM itself, but also for understanding how the TRM factors into the ongoing section 12 investigation within which it occurred. This includes the development of possible subsequent TRMs against the same threat actor. [**redacted**].
Current CSIS policy allows the Strategic Impact report to be completed at either:
In practice, because a TRM authority [**redacted**].
Finding 9: NSIRA finds that current policy for the completion of Strategic Impact Reports may inhibit the timely production of important information.
Of note, the above analysis with respect to the Intended Outcome Report for Case 3 is equally applicable to its Strategic Impact Report. The TRM authority for Case 3 [**redacted**].
For Case 1, CSIS completed the Strategic Impact Report [**redacted**] just before the expiry of the TRM authority [**redacted**].
Recommendation 6: NSIRA recommends that CSIS integrate in policy a requirement that the Strategic Impact Report be completed at the expiry of the TRM authority.
This recommendation urges CSIS to produce relevant information sooner rather than later. Given that strategic outcomes may influence or inform decision-making on further TRMs within active investigations, assessing outcomes prior to the closing of those investigations makes sense. If the strategic impact remains unclear at this earlier juncture (as may be the case for TRMs with short validity periods, e.g., 90 days), the relevant report can indicate this, and the issue can be revisited as necessary at the closing of the investigative authority. NSIRA notes that in the three cases under review, CSIS completed the Strategic Impact Report at the earlier of the two junctures (closing of the TRM authority); the above recommendation would simply codify this practice.
Overall, NSIRA found that CSIS’s use of its TRM mandate in 2021 was broadly consistent with its use in preceding years. With respect to the TRMs reviewed, NSIRA found that CSIS met its obligations under the law, specifically the Canadian Charter of Rights and Freedoms and sections 12.1 and 12.2 of the CSIS Act. For one of the measures, however, NSIRA found that CSIS did not meet its obligations under the 2015 Ministerial Direction for Operations and Accountability and the 2019 Ministerial Direction for Accountability issued by the Minister of Public Safety.
The review contextualized CSIS’s use of TRMs in 2021 against its historical use of the regime. Of note, the decrease that began after 2018 plateaued in 2021 — NSIRA even observed modest upticks in TRM proposals, approvals, and implementations in the present review period. Moving forward, and out of the COVID-19 pandemic, monitoring and analyzing these numbers will inform future review.
The targeted objective of this year’s review was to conduct a review of a selection of implemented TRMs. In so doing, NSIRA was mindful of observations, findings, and recommendations emerging from previous SIRC and NSIRA reviews, for example the requirement that the “rational link” (between selected subject and threat) be present in each case, and that the documentation of outcomes be clear and complete. The focus on implementation generally raised the question of alignment between what CSIS proposed to do and what ultimately occurred.
Within this line of inquiry, findings and recommendations emerged which underscore NSIRA’s belief that relevant information, available in a timely manner, benefits CSIS operations. While cognizant that overly burdensome documentation requirements can unduly inhibit CSIS activities, NSIRA nonetheless believes that the recommendations provided here are prudent and reasonable, less creating new requirements as much as sharpening and refining existing ones.
[**redacted**] analysis touched both directly and indirectly on the new — as of January 2021 — legal risk assessment model in place pursuant to CSIS’s “TRM Modernization”. While the review did not consider this model in toto, and could not therefore pass comment on its performance, NSIRA recommended closing the gap by [**redacted**] and further recommended that CSIS evaluate the new model against the requirements of ministerial direction, particularly those associated with legal risk assessments. Moving forward, a focused NSIRA review of TRM Modernization may take up these questions with an eye toward compliance more broadly, as well as possible additional recommendations addressing gaps, issues, or risks.
Relatedly, the present review emphasized the importance of the guidance and direction offered in LRAs, both for identifying and mitigating potential legal risks and, crucially, for ensuring that CSIS investigators stay within the bounds of legal compliance during actual implementation of the TRM. Clear advice allays ambiguity and uncertainty, minimizing the potential for inadvertent breaches as CSIS employees implement the measure, while making it easier for employees to document legal compliance in after-action reporting.
The result is enhanced likelihood that CSIS will use the TRM mandate lawfully and responsibly. In this vein, it bears underscoring the general finding of compliance — with law, ministerial direction, and policy — at the core of this review, noted issues notwithstanding.
Finding 1: NSIRA finds that CSIS’s use of its TRM mandate in 2021 was broadly consistent with its use in preceding years.
Finding 2: For all the cases reviewed, NSIRA finds that CSIS met its obligations under the law, specifically the Canadian Charter of Rights and Freedoms and sections 12.1 and 12.2 of the CSIS Act.
Finding 3: For all the cases reviewed, NSIRA finds that CSIS sufficiently established a “rational link” between the proposed measure and the identified threat.
Finding 4: For Case 1 and Case 2, NSIRA finds that CSIS met its obligations under the 2015 Ministerial Direction for Operations and Accountability and the 2019 Ministerial Direction for Accountability issued by the Minister of Public Safety.
Finding 5: For Case 3, NSIRA finds that CSIS did not meet its obligations under the 2015 Ministerial Direction for Operations and Accountability and the 2019 Ministerial Direction for Accountability issued by the Minister of Public Safety.
Finding 6: With respect to Legal Risk Assessments (LRAs), NSIRA finds that greater specificity regarding legal risks, and direction as to how said risks could be mitigated and/or avoided, resulted in more detailed outcome reporting vis-à-vis legal compliance.
Finding 7: For Case 2 and Case 3, NSIRA finds that CSIS did not meet its obligations with respect to one requirement of its Conduct of Operations, Section 12.1 Threat Reduction Measures, Version 4. CSIS did not meet its internal policy requirements regarding the timelines to submit TRM implementation reports.
Finding 8: For Case 3, NSIRA finds that the Intended Outcome Report was not completed in a timely manner.
Finding 9: NSIRA finds that current policy for the completion of Strategic Impact Reports may inhibit the timely production of important information.
Recommendation 1: NSIRA recommends that formal Legal Risk Assessments (LRAs) be [**redacted**] for TRMs.
Recommendation 2: NSIRA recommends that CSIS consider and evaluate whether legal risk assessments under TRM Modernization comply with applicable ministerial direction.
Recommendation 3: NSIRA recommends that CSIS work with the Department of Justice to ensure that Legal Risk Assessments (LRAs) include clear and specific direction regarding possible legal risks and how they can be avoided/mitigated during implementation of the TRM.
Recommendation 4: NSIRA recommends that Implementation Reports specify how the legal risks identified in the LRA were avoided/mitigated during implementation of the TRM.
Recommendation 5: NSIRA recommends that CSIS specify in its Conduct of Operations, Section 12.1 Threat Reduction Measures when the Intended Outcome Report is required, as it does for the Strategic Impact Report.
Recommendation 6: NSIRA recommends that CSIS integrate in policy a requirement that the Strategic Impact Report be completed at the expiry of the TRM authority.
In June 2015, Parliament enacted the Anti-terrorism Act, 2015, which authorized CSIS, in the new section 12.1 of the CSIS Act, to take measures to reduce threats to the security of Canada, within or outside Canada. The new measures represented an unprecedented departure from CSIS’s traditional intelligence collection role.
In July 2019, the National Security Act, 2017, introduced amendments to CSIS’s TRM mandate that sought to clarify and further define this power. In particular, the amendments stressed the importance of compliance with the Canadian Charter of Rights and Freedoms (Charter), provided an expanded list of prohibited conduct under the TRM regime, and introduced a requirement that CSIS notify NSIRA after undertaking a TRM.
The CSIS Act does not provide a precise definition of “measures to reduce the threat.” As such, CSIS has developed its own, defining a TRM as “[a]n operational measure undertaken by [CSIS], pursuant to section 12.1 of the CSIS Act, whose principal purpose is to reduce a threat to the security of Canada as defined in s. 2 of the CSIS Act.”
These measures are subject to specific stipulations. Section 12.1 of the CSIS Act states that CSIS may only undertake a TRM if there are reasonable grounds to believe (RGB) that the identified conduct is a threat to the security of Canada. TRMs must be reasonable and proportional in the circumstances, having regard to the nature of the threat, the nature of the measures, the reasonable availability of other means to reduce the threat, and the reasonably foreseeable effects on third parties, including on their right to privacy. CSIS must also consult with other federal departments, where appropriate, with respect to whether they may be in a position to reduce the threat. Finally, CSIS must seek a warrant from a judge where a proposed TRM would limit a right or freedom guaranteed by the Charter or would otherwise be contrary to Canadian law.
In addition to these statutory requirements, the 2015 Ministerial Direction for Operations and Accountability and the 2019 Ministerial Direction for Accountability require all TRMs to undergo a four-pillar risk assessment that examines the operational, reputational, foreign policy, and legal risks of proposed actions on a scale of low, medium or high. Moreover, they require that, when assessing the appropriate means of reducing a threat, CSIS consider the range of other possible national security tools available to the broader community, and consult with departments and agencies of the Government of Canada with mandates or authorities closely related to the proposed TRM. It is also important to note that both MDs operate concurrently: the 2015 MD section regarding Operations remains in effect, whilst the section concerning Accountability in the 2015 MD is superseded by the 2019 MD.
NSIRA’s population for case selection were the [**redacted**] TRMs — all those implemented in the calendar year 2021 — laid out in Table 1 [**redacted**].
[**redacted table**]
Of these 21 cases, three were TRMs first implemented in 2020, with subsequent implementations during the review period. [**redacted**]. As such, and given the desire to examine the full lifecycle of the TRM within the specified review period, NSIRA dropped [**redacted**].
[**redacted**].
[**redacted**] the prevalence and importance of measures aimed at reducing threats defined under subsection 2c of the CSIS Act. These threats include, but are not limited to, those stemming from RMVE and IMVE. As noted in paragraph 34 of the report, since 2015, 2c threats have been the most frequently subject to TRMs (as compared to other threats described by the Act), and will likely continue to be a focus in the years to come. As such, NSIRA judged that any findings and/or recommendations emerging from the review of TRMs aimed at 2c threats would be useful to CSIS going forward, as similar TRMs are contemplated, designed, proposed and implemented.
[**redacted**]. NSIRA reviewed documentation associated [**redacted**].
For these reasons, [**redacted**] was dropped from the sample, leaving three TRMs for review (n=3).
This report is NSIRA’s third annual review of the Canadian Security Intelligence Service’s (CSIS) Threat Reduction Measures (TRMs). The review covers CSIS’s TRM activities between January 1, 2021, to December 31, 2021. As mandated by the NSIRA Act, NSIRA is required to review at least one aspect of CSIS’s TRM performance each year. Before NSIRA was created in 2019, the Security Intelligence Review Committee (SIRC) reviewed CSIS’s TRM activities from 2016 to 2019.
In 2015, the Anti-Terrorism Act granted CSIS the authority to undertake TRMs. These are operational measures aimed at reducing threats to the security of Canada. TRMs may be taken in Canada or outside of Canada. TRMs are subject to limits outlined in the CSIS Act. The measures may limit a right or freedom guaranteed by the Canadian Charter of Rights and Freedoms (Charter) or may otherwise be contrary to Canadian law if authorized by a warrant issued by a Federal Court judge. TRM powers differ greatly from CSIS’s traditional mandate to collect and disseminate intelligence and, as such, the use of TRMs demands thorough and ongoing independent scrutiny.
NSIRA’s review of CSIS’s TRM activities in 2021 builds upon findings from earlier NSIRA and SIRC TRM reviews. These previous reviews identified concerns such as the inclusion of some individuals in TRMs without a rational link to the identified threat and CSIS’s need to improve record-keeping regarding TRM outcomes. In 2021, NSIRA observed that the use of TRM powers by CSIS followed similar trends to prior years. Notably, 2021 was the first year that TRMs involving Ideologically Motivated Violent Extremism threats outnumbered those aimed at addressing Religiously Motivated Violent Extremism.
NSIRA found that CSIS met its obligations under the CSIS Actand the Charter. However, NSIRA found that improvements were needed in CSIS’s reporting procedures and made recommendations for improving legal risk assessments conducted for TRMs. Additionally, in one case, NSIRA identified that CSIS had not met its obligations under the 2015 Ministerial Direction for Operations and Accountability and the 2019 Ministerial Direction for Accountability issued by the Minister of Public Safety.
The findings and recommendations in this report highlight the importance of NSIRA’s independent scrutiny of TRM activities.
Last Updated:
Status:
Submitted
Review Number:
22-13
Last Updated:
Status:
Submitted
Review Number:
21-06
Last Updated:
Status:
Cancelled
Review Number:
21-22
Having its origin in the recommendations of Commission of Inquiry into the Actions of Canadian Officials in Relation to Maher Arar, the Avoiding Complicity in Mistreatment by Foreign Entities Act (ACA) and the directions issued under its authority seek to avoid risks of Canadian complicity in torture or other forms of mistreatment. They do so by putting limits on Government of Canada information sharing with foreign entities such as states and non-governmental organizations.
The directions prohibit Government of Canada departments from disclosing information to – or requesting information from – foreign entities if doing so would result in a substantial risk of mistreatment of any individual by any foreign entity. The directions also limit how departments may use information that is likely to have been obtained through mistreatment. Collectively, the ACA regime codifies Canadian values and commitments under the Canadian Charter of Rights and Freedoms, the Criminal Code, and international law in respect of protecting rights and prohibiting torture and other cruel and inhumane treatment.
NSIRA is required to review, each calendar year, the implementation of all directions issued under the ACA. To date, such directions have been issued to the Deputy Heads of twelve departments and agencies. NSIRA’s annual review of ACA implementation ensures that the Government of Canada remains accountable for the information that it shares with foreign partners, and respects related Canadian values and commitments. While the ACA separately requires each department to report publicly and to their Minister on ACA implementation each year, NSIRA’s horizontal review mandate offers unique insights into the consistency of this implementation and corresponding decision-making government wide.
NSIRA’s ACA review for 2022 focused on how departments assess mistreatment risk in the context of their information sharing with foreign entities. NSIRA pursued this focus because departmental compliance with the directions depends on whether departments are accurately identifying which information exchanges may engage a substantial risk of mistreatment. If departments under-assess the level of risk involved in an exchange or over-assess the impact of mitigations to reduce this risk, they will not trigger the ACA’s embedded mechanisms for accountability and transparency. These mechanisms include referring certain high-risk cases to Deputy Heads as well as onward reporting to NSIRA.
NSIRA found major inconsistencies in how different Government of Canada departments assessed the mistreatment risk posed by different countries. Indeed, NSIRA even identified some instances where different departments concurrently assessed the same country as presenting low, medium, and high mistreatment risk. NSIRA also found that departments often attributed an unjustifiably high weight to proposed risk mitigations and, in some cases, incorrectly incorporated mitigations within their initial assessments of countries’ baseline risk.
Such methodological deficiencies, as well as a lack of checks and balances in the risk assessment process, may lead departments to systematically under-assess the risks involved in contemplated information exchanges. The net effect is that, when it does not adhere to the substance of the directions under the ACA, the Government of Canada risks exchanging information contrary to the directions’ prohibitions.
As part of a suite of recommendations designed to address this risk, NSIRA reaffirmed its 2019 recommendation for the Government of Canada to develop a unified set of risk assessments for ACA purposes. In every ACA review since 2019, NSIRA has maintained its position that human rights risks within a given country should be assessed consistently across government. Doing so would avoid the unnecessary drain on resources caused by each department independently assessing risk and eliminate opportunities for discrepant outcomes.
Date of Publishing:
Abbreviation | Full Form |
---|---|
ACA | Avoiding Complicity in Mistreatment by Foreign Entities Act |
CBSA | Canada Border Services Agency |
CRA | Canada Revenue Agency |
CSE | Communications Security Establishment |
CSIS | Canadian Security Intelligence Service |
DFO | Department of Fisheries and Oceans |
DND/CAF | Department of National Defence/Canadian Armed Forces |
FINTRAC | Financial Transactions and Reports Analysis Centre of Canada |
GAC | Global Affairs Canada |
GC | Government of Canada |
HRR | Human Rights Report |
IRCC | Immigration, Refugees and Citizenship Canada |
ISCG | Information Sharing Coordination Group |
MD | Ministerial Direction |
NSIRA | National Security and Intelligence Review Agency |
OiC | Order in Council |
PS | Public Safety Canada |
RCMP | Royal Canadian Mounted Police |
SRM | Substantial risk of mistreatment |
TC | Transport Canada |
Abréviation | Forme complète |
---|---|
AMC | Affaires mondiales Canada |
ARC | Agence du revenu du Canada |
ASFC | Agence des services frontaliers du Canada |
CANAFE | Centre d’analyse des opérations et déclarations financières du Canada |
CST | Centre de la sécurité des télécommunications |
OC | Décret en conseil |
GC | Gouvernement du Canada |
GCER | Groupe de coordination d’échange de renseignements |
GRC | Gendarmerie royale du Canada |
IM | Instructions du ministre |
IRCC | Immigration, Réfugiés et Citoyenneté Canada |
LECCMTIEE | Loi visant à éviter la complicité dans les cas de mauvais traitements infligés par des entités étrangères |
MON/FAC | Ministère de la Défense nationale/Forces armées canadiennes |
MPO | Ministère des Pêches et des Océans |
OSSNR | Office de surveillance des activités en matière de sécurité nationale et de renseignement |
RDP | Rapport sur les droits de la personne |
RSMT | Risque sérieux de mauvais traitements |
SCRS | Service canadien du renseignement de sécurité |
SP | Sécurité publique Canada |
TC | Transports Canada |
Term | Definition |
---|---|
2017 MDs | Ministerial Directions (MDs) issued to CBSA, CSIS, CSE, DND/CAF, GAC, and RCMP in 2017 regarding avoiding complicity in mistreatment by foreign entities. |
departments | Refers, in the context of this review, to those departments and agencies whose deputy heads have been issued written directions under the ACA. |
foreign entities | As defined in the 2017 MDs: “may include foreign governments, their departments, agencies and militaries, and may also refer to military coalitions, alliances, and international organizations.” |
mistreatment | As defined in section 2 of the ACA: “torture or other cruel, inhuman or degrading treatment or punishment, within the meaning of the Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, signed at New York on December 10, 1984 (mauvais traitements).” |
policy | Frameworks, policies, directives, standards, guidelines, and tools developed to, in the context of this review, govern departments’ implementation of the ACA. |
instruments | Developed to, in the context of this review, govern departments’ implementation of the ACA. |
residual risk | The level of risk that remains in a given context after mitigations are applied. |
substantial risk | As defined in the 2017 MDs: “A personal, present, and foreseeable risk of mistreatment. In order to be ‘substantial’, the risk must be real and must be based on something more than mere theory or speculation. In most cases, the test of a substantial risk of mistreatment will be satisfied when it is more likely than not that there will be mistreatment; however, in some cases, particularly where the risk is of severe harm, the ‘substantial risk’ standard may be satisfied at a lower level of probability.” |
untreated risk | The level of risk in a given context before any mitigations are applied. |
Terme | Définition |
---|---|
Entités | Terme employé dans les IM de 2017 pour désigner « les gouvernements étrangers, leurs ministères et organismes, et leurs forces militaires. Il peut aussi s’appliquer à des coalitions militaires, à des alliances et à des organisations internationales. » |
IM de 2017 | Instructions du ministre (IM) émises en 2017 à l’intention de l’ASFC, du SCRS, du CST, du MON/FAC, d’AMC et de la GRC visant à éviter la complicité dans les cas de mauvais traitements infligés par des entités étrangères. |
Instruments de politique | Cadres de travail, politiques, directives, normes, lignes directrices et outils conçus pour encadrer la mise en œuvre de la LECCMTIEE par divers ministères. |
Mauvais traitements | Terme défini à l’article 2 de la LECCMTIEE : « [t]orture ou autres peines ou traitements cruels, inhumains ou dégradants », selon la Convention contre la torture (1984). |
Risque non atténué | Terme désignant le niveau de risque qui existe avant l’application de mesures d’atténuation. |
Risque résiduel | Terme désignant le niveau de risque qui persiste après l’application de mesures d’atténuation. |
Risque sérieux | Terme employé dans les IM de 2017 pour désigner « un risque personnel, sérieux, présent et prévisible de mauvais traitements. Pour être “sérieux”, le risque doit être réel et reposer sur plus que des spéculations. Dans la plupart des cas, le critère sera satisfait lorsque le risque de mauvais traitements est plus probable qu’improbable. » |
This review assessed departments’ compliance with the Avoiding Complicity in Mistreatment by Foreign Entities Act (or Avoiding Complicity Act; ACA) and their implementation of the ACA’s associated directions during the 2022 calendar year. Within this context, the review pursued a thematic focus on departments’ conduct of risk assessments, including the ways in which their methodologies may lead to a systematic under-assessment of the level of risk involved in an information-sharing transaction.
NSIRA’s findings and recommendations in this report reflect both developments and stagnations in departments’ implementation of the directions over time. Of note, NSIRA observed efforts in 2022 to collaborate interdepartmentally, and standardize certain practices across the Government of Canada. While these efforts reflect an improvement over past approaches, they fall short of the directions’ envisioned consistent framework for foreign information sharing government-wide. Additionally, NSIRA observed a number of practices that may lead departments to systematically under-assess the risks involved in contemplated information exchanges. Such under-assessments may, in turn, lead to information being exchanged in contravention of the directions’ prohibitions.
NSIRA made five recommendations in this review. Collectively, they would ensure that all departments’ ACA frameworks reflect a degree of standardization commensurate with the spirit of the ACA and its associated directions; and that these frameworks are designed to support compliance with the directions.
This review was conducted pursuant to paragraph 8(1 )(b), paragraph 8(2.1 )(c), and subsection 8(2.2) of the National Security and Intelligence Review Agency Act (NSIRA Act).
This review assessed departments’ compliance with the Avoiding Complicity in Mistreatment by Foreign Entities Act (or Avoiding Complicity Act; ACA) and their implementation of the ACA’s associated directions during the 2022 calendar year. Within this context, the review pursued a thematic focus on departments’ conduct of risk assessments, including the ways in which their methodologies may lead to a systematic under-assessment of the level of risk involved in an information-sharing transaction.
The review included all departments that have been issued directions under the ACA: Canada Border Services Agency (CBSA); Canada Revenue Agency (CRA); Communications Security Establishment (CSE); Canadian Security Intelligence Service (CSIS); Department of Fisheries and Oceans (DFO); Department of National Defence and Canadian Armed Forces (DND/CAF); Financial Transactions and Reports Analysis Centre of Canada (FINTRAC); Global Affairs Canada (GAC); Immigration, Refugees and Citizenship Canada (IRCC); Public Safety Canada (PS); Royal Canadian Mounted Police (RCMP); and Transport Canada (TC).
The review also considered DND/CAF’s implementation of Ministerial Direction (MD) it received in 2022 regarding avoiding complicity in mistreatment by foreign entities.
NSIRA conducted a document review of departments’ ACA policy instruments, and departments’ associated written explanations, provided in response to requests for information. NSIRA also conducted a comparative analysis of a targeted sample of departmental risk assessments pertaining to 19 countries, and to the foreign entities within those countries for which such assessments existed. NSIRA assessed compliance with reporting requirements based on primary records made public or submitted to NSIRA in accordance with the ACA and its directions.
CBSA, CRA, DFO, DND/CAF, FINTRAC, IRCC, PS, RCMP, and TC met NSIRA’s expectations for responsiveness during this review. CSE, CSIS, and GAC only partially met NSIRA’s expectations, as CSE did not consistently respond to NSIRA’s requests for information in a format that met the review’s requirements; and CSIS and GAC did not consistently respond to NSIRA’s requests in a timely manner
NSIRA was able to verify information for this review in a manner that met expectations.
NSIRA wishes to thank PS for its assistance in coordinating the factual accuracy consultations for this review.
The ACA and the directions issued pursuant to it seek to prevent the Government of Canada (GC) from disclosing information to—or requesting information from—a foreign entity that would result in substantial risk of mistreatment (SRM) of an individual, and to set limitations on the use of information that is likely to have been obtained through mistreatment. The objective of the directions is to demonstrate the Government’s commitment to make Canada’s information sharing regime more transparent, consistent, and accountable; and to enhance oversight on a government-wide basis.
In 2019, directions were issued pursuant to the ACA, by Order in Council (OiC), to the deputy heads of twelve departments and agencies. For CBSA, CSE, CSIS, DND/CAF, GAC, and RCMP, the OiC directions replaced MDs that had been issued in 2017. In adding CRA, DFO, FINTRAC, IRCC, PS, and TC as recipients, the OiC directions broadened the application of measures to prevent mistreatment.
NSIRA has previously reviewed departments’ implementation of the 2017 MDs and, as required under the NSIRA Act, implementation of the OiC directions in every year since the ACA’s coming into force. This is NSIRA’s fourth such annual review.
Finding 1. NSIRA found that all departments, with the exception of DFO in respect of subsection 7(1), complied with the reporting requirements set out in the ACA.
Subsection 7(1) of the ACA requires deputy heads to submit, before March 1 of each year, a report to their Minister in respect of the directions’ implementation during the previous calendar year. DFO submitted its report to the Minister of Fisheries, Oceans, and the Canadian Coast Guard on April 12, 2023, which was 42 days following the legislated deadline.
Sections 5 through 8 of the ACA set out additional reporting requirements with which all deputy heads and Ministers complied.
Finding 2. NSIRA found that all departments had frameworks to govern their implementation of the ACA and its associated directions by the end of 2022.
NSIRA’s ACA review for 2021 found that all departments, with the exception of CBSA and PS, had fully implemented ACA governance frameworks. Both CBSA and PS implemented such frameworks in the course of this year’s review. Their policies came into effect on September 1, 2022 and January 1, 2022, respectively.
Finding 3. NSIRA found that most departments demonstrated continual refinements of their ACA frameworks based on self-identified gaps, NSIRA recommendations, and community-wide coordination efforts.
In 2022, most departments focused their refinement efforts on codifying existing practices in formal policy instruments, and developing more fine-grained procedures and guidance to support their implementation. Degrees of refinement varied across departments, generally in line with the maturity of their respective frameworks. Of note amongst these efforts:
In 2022, CSE, DND/CAF, and GAC each undertook internal reviews of aspects of their ACA implementation frameworks. Where formal reviews were not undertaken, observed refinements reflected topics raised in prior NSIRA reviews and informal interdepartmental benchmarking conducted in forums like the PS-chaired Information Sharing Coordination Group (ISCG), which includes all departments subject to the directions as members.
Finding 4. NSIRA found that TC’s ACA governance framework did not include policies and procedures for:
The directions require that cases be referred to deputy heads under specified conditions (elaborated in paragraph 34, below). Departments may determine the mechanism and thresholds for such referrals according to their operational requirements. In practice, the governance frameworks of all departments but TC use pre-determined escalation ladders—beginning with operational staff and concluding with referral to the deputy head—to triage ACA cases.
Although TC’s responses to information requests from NSIRA described an escalation ladder culminating with the Deputy Minister of Transport, its policy instruments do not include any policies or procedures for escalating ACA cases beyond operational staff.
TC’s corporate policy for ACA implementation states that TC must “develop and maintain policies and procedures for assessing the risks posed by foreign entities.” NSIRA’s ACA review for 2019 critiqued the lack of detail in TC’s policy, citing concerns with the department’s framework for deciding whether a disclosure would result in SRM and its lack of a framework for determining whether an identified SRM could be mitigated. TC has stated that these gaps have not yet been addressed, given interdepartmental efforts to implement program enhancements to reduce the risk of mistreatment related to the exchange of information.
All ACA frameworks require a mechanism for case escalation to the deputy head, and a sufficiently-robust risk assessment process to identify when an information exchange may involve SRM, even when such exchanges are infrequent.
Recommendation 1. NSIRA recommends that TC update its ACA governance framework to include policies and procedures for:
Finding 5. NSIRA found that all departments, with the exception of DFO, GAC, PS, and TC, used country and/or entity risk assessments to inform their assessments of substantial risk of mistreatment and corresponding case escalation.
In order to implement the directions, departments must understand the risks of sharing information with particular foreign entities, including country-level human rights conditions. To this end, most departments use formalized country and/or entity risk assessments as a baseline for assessing case-specific risks and for considering case-specific mitigations.
In some departments, levels of baseline country or entity risk correlate directly with particular levels of approval within their ACA escalation ladders, such that increasingly-senior levels of officials are expected to oversee any mitigations considered or applied in risky contexts. In other departments, escalation is tied to case-specific mistreatment risk assessments that incorporate mitigations, such that escalation is based on residual risks. In these departments, cases of satisfactorily- mitigated substantial risk do not always trigger departmental thresholds for more senior oversight. CSIS’s escalation framework is unique in that the required level of approval depends on both the risk of the transaction itself and the status of the Service’s information-sharing arrangement with the foreign entity.
DFO, GAC, PS, and TC’s risk assessment processes do not involve a baseline assessment of untreated country or entity risk. At DFO, PS, and TC, this is because relevant information exchanges are seen to be so infrequent that case-specific assessments may be conducted when required. GAC, conversely, compiles relevant baseline information in a set of descriptive Human Rights Reports (HRRs), which convey relevant country context—including specifics related to torture and mistreatment—but do not assign a corresponding risk rating or assessment; GAC assesses risk in relation to particular information exchanges, as they arise.
In 2022, CBSA, CSE, CSIS, DND/CAF, FINTRAC, and RCMP each used country and/or entity assessments that they had developed internally to inform their assessments of mistreatment risk. They relied on similar sources of information to conduct these assessments, including GAC’s HRRs (although these did not exist for every country with which departments exchanged information).
In 2022, CRA and IRCC used the country risk ratings assigned by CSIS and RCMP, respectively, as their baseline indicator of a transaction’s potential risk. In both cases, CRA and IRCC received only the overall level of risk assigned to each country, and not any supporting assessment details. Both CRA and IRCC have identified their lack of in-house baseline assessments as gaps in their ACA risk assessment frameworks and are taking steps to develop the required methodologies.
While residual risks in case-specific risk assessments are expected to reflect the particularities of individual information exchanges, these must be considered in relation to the broader human rights environment in which the exchange will be made. Some departments’ case-specific risk assessment methodologies explicitly integrate the corresponding baseline country or entity risk rating. At CBSA, CSE, and DND/CAF, these ratings are matrixed with particularities of the information being considered for exchange. At GAC and RCMP, the ratings are matrixed with personal characteristics of the individual(s) who may be subject to mistreatment.
Finding 6. NSIRA found that departments’ country risk assessments were inconsistent with one another.
In its 2017 MD review, NSIRA recommended that departments develop a unified framework for assessing mistreatment risks at the country level. In each ACA review since, NSIRA has maintained its position that human rights risks within a given country should be assessed consistently across the GC.
In 2022, NSIRA observed widespread discrepancies across departments’ baseline country risk assessments, despite their reliance on similar sources of information. Within the sample of risk assessments reviewed, there were only two countries for which all departments assigned the same risk rating. For some countries, discrepancies were so drastic that different GC departments simultaneously assessed the human rights risk as low, medium, and high. Annex A presents a comparison of risk ratings assigned by each assessing department for each country within the sample.
Three main factors contributed to these discrepancies. First, risk ratings were often tied to dated assessments that failed to account for more recent developments within a country. Second, departments used different indicators of mistreatment in their methodologies. Third, departments weighted the impact of these indicators differently. For example, whereas CSIS weighted each indicator equally, in service of an overall human rights picture, CSE attributed a higher weight for indicators more likely to impact the mistreatment of an individual. DND/CAF was the only department to include an automatic trigger for a high risk rating, irrespective of other moderating considerations, when systemic mistreatment was observed within a country.
To identify differences in risk ratings and to understand the reasons for them, DND/CAF convened a working-level “human rights summit” in late 2022, with participation by CSE, CSIS, and GAC. While the summit was considered a success by all participants, identifying and understanding discrepancies falls short of NSIRA’s recommended unified set of assessments. Although participants regularly signalled that they would consider new information within their own internal assessment frameworks, they rarely committed to changes that would align their risk ratings.
In response to recommendations made in NSIRA’s ACA review for 2019, GC institutions stated their position that a standardized approach was unfeasible, given the “diverse operational activities and mandates” of the twelve implicated departments. NSIRA does not agree that the activities or mandates of the assessing GC departments are relevant considerations in the determination of baseline country or entity risks.
Finding 7. NSIRA found that the simultaneous conduct of independent human rights risk assessments in different departments reflected a substantial duplication of effort across the GC, and created the opportunity for discrepant outcomes.
Departments’ conduct of independent human rights risk assessments leads to an unnecessary drain on resources. This duplication of efforts also creates the opportunity for discrepant assessments, which are replicated across the GC when siloed risk ratings are borrowed by departments that do not internally assess risk. Where discrepancies reflect an under-assessment of baseline risk, departments may undertake information exchanges that contravene the directions’ prohibitions.
Within the sample of countries for which NSIRA requested departments’ risk assessments, departments did not frequently engage with the same foreign entities. While the present report does not, therefore, comment on the alignment of entity assessments across departments in 2022, NSIRA emphasizes the importance of aligning assessments in cases where multiple departments do deal with the same foreign entity. Departments may apply mitigations that are unique to their bilateral partnerships with the entity in question, but—for the same reasons elaborated above vis-a-vis country risk—this should always be done in relation to a baseline risk that is assessed consistently across the GC.
Recommendation 2. NSIRA recommends that the Government of Canada designate a body responsible for developing:
Finding 8. NSIRA found, for the fourth consecutive year, that no departments escalated cases to their deputy heads for determination or decision.
Subsections 1(2) and 2(2) of the directions require, respectively, that information disclosures and requests be referred to deputy heads for determination in cases where departmental officials are unable to determine whether an associated SRM can be mitigated. Paragraph 3(1 )(c) requires deputy—or, exceptionally, senior official—authorization to use information that is likely to have been obtained through mistreatment in any way that would deprive someone of their rights or freedoms.
When cases are escalated under these provisions, subsection 4(1) of the directions imposes reporting requirements for deputy heads. Since no cases were escalated in 2022, departments did not engage these requirements.
The lack of referrals under subsections 1(2) and 2(2) is conspicuous, given that cases had been escalated to deputy heads under the 2017 MDs. The lack of authorizations under paragraph 3(1)(c) is inconspicuous, given the rarity of factual circumstances that would warrant such authorization.
Finding 9. NSIRA found that some high-risk sharing activities were stopped prior to escalation for consideration of possible mitigations.
The lack of referrals to deputies under subsections 1(2) and 2(2) should not be construed as implying that departments failed to identify any cases meeting the threshold of “substantial,” or that all cases of mitigated SRM were approved before they could be escalated for deputy-level consideration.
CRA, CSIS, DND/CAF, GAC, IRGC, and RCMP each reported to NSIRA that they had contemplated transactions involving SRM in 2022—but not all of these contemplated transactions resulted in an information exchange. In some cases, the transaction was stopped before it could be escalated for more senior consideration of potential mitigations. Table 1 summarizes the outcomes of decisions taken in relation to each contemplated transaction involving SRM in 2022.
Department | Total # Considered | # approved | # denied / not approved | # ongoing as of 2022-12-31 |
---|---|---|---|---|
CRA | [**redacted**] | [**redacted**] | [**redacted**] | [**redacted**] |
CSIS | [**redacted**] | [**redacted**] | [**redacted**] | [**redacted**] |
DND/CAF | [**redacted**] | [**redacted**] | [**redacted**] | [**redacted**] |
GAC | [**redacted**] | [**redacted**] | [**redacted**] | [**redacted**] |
IRCC | [**redacted**] | [**redacted**] | [**redacted**] | [**redacted**] |
RCMP | [**redacted**] | [**redacted**] | [**redacted**] | [**redacted**] |
All departments: | [**redacted**] | [**redacted**] | [**redacted**] | [**redacted**] |
While the vast majority of substantial risk transactions contemplated in 2022 were approved, [**redacted**] were denied or otherwise not completed. For GAC and IRCC, the transactions that did not move forward reflect a substantial proportion of all substantial risk cases subject to formal consideration (64% and 33%, respectively).
Departmental frameworks often include features that reflect a fundamental risk aversion that would result in fewer cases being escalated to deputies. CSE, for instance, allows a transaction to be denied at the initial stages of consideration when it is abundantly clear that there is SRM that cannot be mitigated below the level of substantial. Other departments, like DND/CAF, PS, and RCMP, explicitly incorporate strategic considerations, such as the operational rationale for pursuing the exchange or the importance of the bilateral relationship, when deciding whether to escalate or deny a case. If the operational rationale is lacking, the corresponding cases will fall out of (or never enter into) the ACA escalation ladder, in a manner consistent with the directions’ spirit.
Finding 10. NSIRA found that certain departments’ ACA governance frameworks and risk assessment methodologies included features that may systematically under-assess the level of risk involved in a transaction. These features include:
When the level of risk is under-assessed, cases involving substantial risk may be approved at lower levels in departments’ escalation ladders without the intended levels of corresponding oversight, or may never be escalated in the first place. In these contexts, there is an increased likelihood that information may be disclosed or requested in contravention of the directions’ prohibitions.
Mid-2021, all ISCG members agreed to adopt the definition for “substantial risk’’ that was provided in the 2017 MDs:
“a personal, present and foreseeable risk of mistreatment In order to be “substantial”, the risk must be real and must be based on something more than mere theory or speculation. In most cases, the test of a substantial risk of mistreatment will be satisfied when it is more likely than not that there will be mistreatment; however, in some cases, particularly where the risk is of severe harm, the “substantial risk” standard may be satisfied at a lower level of probability.”
The same definition was also codified in DND/CAF’s 2022 MD.
The agreed-upon definition is reflected in the policy documents of CSE, DFO, FINTRAC, GAG, PS, and ROMP, as well as (with some added precisions) CSIS and DND/CAF. Despite their agreement to adopt the same definition, however, CBSA, ORA, IRGC, and TO have not consistently updated their internal policy instruments to reflect the definition in its entirety.
Even where the definition has been formally integrated within broader policies, the threshold of probability for “substantial” has not been consistently applied. Risk assessment tools often failed to incorporate the language of “more likely than not” (and the greater-than-50% threshold it entails), or to clarify how to apply a lower level of probability when there is risk of severe harm. [**redacted**]
Lack of clear direction within policy suites increases the likelihood that departments may apply a threshold for SRM that is incommensurate with the circumstances.
Applying the SRM threshold requires clarity, as well, on what constitutes “mistreatment.” Although a definition for “mistreatment” is provided in the ACA, departments did not always agree on appropriate indicators thereof. At the 2022 “human rights summit,” for instance, it was noted that [**redacted**] whereas DND/CAF included it as an indicator of “due process.” When the definition of mistreatment is too narrowly scoped, SRM may be under-assessed.
Recommendation 3. NSIRA recommends that departments apply the “substantial risk” threshold in a manner consistent with the definition adopted government-wide; and that departments whose broader policy frameworks do not yet reflect this definition (CBSA, CRA, IRCC, and TC) make the attendant updates.
The directions allow departments to apply mitigations, such as caveats or assurances, to lower the level of a transaction’s risk below “substantial.” Departments that use entity assessments as their starting point for assessing SRM often incorporate such mitigations into their baseline assessment of risk, such that risk ratings reflect a lowered, residual risk of mistreatment instead of an untreated SRM for which subsequent mitigations may be considered.
Within the sample of risk assessments reviewed, CSIS and DND/CAF tended to assess entity risk as lower than the corresponding country risk. NSIRA did not find that their entity risk assessments sufficiently accounted for systemic risks of mistreatment observed in the entity’s country-level operating environment. For CSIS, this dynamic was particularly evident in [**redacted**].
The impact of incorporating mitigations into baseline assessments of risk is accentuated when departments overestimate the effect of mitigations, or base their entity assessments on inappropriate considerations.
The weight attributed to caveats and assurances, as baseline mitigations, was often artificially high. Prior NSIRA reviews have observed gaps in departments’ ability to verify whether a country or entity has actually complied with caveats or assurances. NSIRA did not observe evidence, in 2022, that departments had taken steps to improve their confidence in entities’ compliance with caveats or assurances, nor that they had moderated the expected effect of such mitigations when assigning entity risk levels.
Additionally, NSIRA observed assessments where entity risk may have been influenced by inappropriate considerations, such as the strength of a department’s bilateral relationship with the entity in question, or an absence of derogatory information particular to that entity. For example, FINTRAC’s SRM assessment form specifically prompts users to evaluate the strength of FINTRAC’s bilateral relations with its foreign counterpart. In addition, some departments’ assessments appeared to discount risks reported in open sources in situations where confirmatory intelligence was unavailable.
NSIRA maintains the position elaborated in its ACA review for 2020 that all bilateral exchanges should be assessed through the lens of country risk, given that even so- called “trusted partners” are embedded in the information-sharing hierarchies and human rights contexts of their respective countries. Understanding the human rights risks within a country is a precursor for developing sound entity or case specific risk assessments.
Recommendation 4. NSIRA recommends that departmental assessments of substantial risk of mistreatment be grounded in countries’ human rights records; and that subsequent entity-level considerations be based on validated, current, and consistent respect for caveats and assurances, rather than the absence of derogatory information particular to that entity or other bilateral considerations.
Including checks and balances in the risk assessment process minimizes the likelihood of generating an under-assessment of risk. Checks and balances are present where decisions on case escalation are separated from decisions on whether a case meets the threshold for SRM.
In 2022, many departments achieved this separation by building robust case triage practices into their case escalation frameworks. For instance, CRA, IRCC and RCMP initially escalate cases based on an externally-assigned or pre-determined country or entity risk rating, irrespective of the level of risk attributed to the specific transaction.
Similarly, CBSA and DND/CAF initially escalate cases based on case-specific assessments that matrix a baseline, externally-assigned, risk rating with features of the information being considered for exchange.
DFO’s framework achieves the same effect, despite not relying on a baseline risk rating, by escalating individual cases based on the presence of any potential risk of mistreatment. This threshold is feasible at DFO, given its low frequency of foreign information exchange; departments with higher volumes of information exchange may feasibly achieve a similar effect by escalating cases, at the outset, based on a threshold lower than “substantial.”
Other frameworks achieve a similar separation by ensuring that decisions on substantial risk are decided by officials outside the chain of command of operational personnel involved in the exchange. The ROMP, for instance, prohibits a member of its ACA senior management advisory committee from chairing the discussion of a case recommended from their own business line. To enhance this separation of powers, NSIRA recommended in its ACA review for 2021 that recommendations flowing from this committee be referred to an Assistant Commissioner who is not accountable for the branch from which the case originates. Such practices are consistent with NSIRA’s 2017 MD review recommendation that, in cases where the risk of mistreatment approaches the threshold of “substantial,” decisions should be made independently of operational personnel directly invested in the outcome.
CSE’s ACA policy instruments convey a layering of checks and balances: every instance of foreign information exchange that could lead to the identification of an individual is subject to a mistreatment risk assessment; these assessments are conducted by dedicated information-sharing teams, independently from operational personnel; determinations on the nature of mistreatment risk assessment required (annual, in low risk contexts; case-by-case, in all others) are made on the basis of pre-determined country risk ratings; subsequent case escalation reflects an upward triage based on gradations of mistreatment risk; and this escalation occurs exclusively within CSE’s Authorities, Compliance, and Transparency sector, as opposed to an operational branch.
CSIS’s policy instruments do not convey the same degree of checks and balances [**redacted**].
Recommendation 5. NSIRA recommends that all ACA governance frameworks incorporate layered checks and balances in the risk assessment and escalation of cases that may involve substantial risk of mistreatment.
In this fourth annual review of the ACA directions’ implementation, NSIRA made findings related to compliance with the ACA’s reporting requirements; the alignment of departments’ governance frameworks with the direction’s provisions for information sharing; and departmental practices for identifying cases that may involve SRM.
NSIRA’s findings and recommendations in this report reflect both developments and stagnations in departments’ implementation of the directions over time. Of note, NSIRA observed efforts in 2022 to collaborate interdepartmentally, and standardize certain practices across the GC. While these efforts reflect an improvement over past approaches, they fall short of the directions’ envisioned consistent framework for foreign information sharing government-wide. Additionally, NSIRA observed a number of practices that may lead departments to systematically under-assess the risks involved in contemplated information exchanges. Such under-assessments may, in turn, lead to information being exchanged in contravention of the directions’ prohibitions.
NSIRA made five recommendations in this review. Collectively, they would ensure that all departments’ ACA frameworks reflect a degree of standardization commensurate with the spirit of the ACA and its associated directions; and that these frameworks are designed to support compliance with the directions.
Table 2 presents the risk ratings for each country within the sample (n=19), as assigned by each department that relied on its own internally-developed country risk assessments in 2022.
CBSA | CSE | CSIS | DND/CAF | FINTRAC | RCMP | |
---|---|---|---|---|---|---|
Country 1 | No Assessment | Mixed (Medium risk) |
Low (Low risk) |
High (High risk) |
Moderate (Medium risk) |
No Assessment |
Country 2 | No Assessment | Poor (High risk) |
Low (Low risk) |
Medium (Medium risk) |
No Assessment | Medium (Medium risk) |
Country 3 | High (High risk) |
Poor (High risk) |
High (High risk) |
High (High risk) |
High (High risk) |
High (High risk) |
Country 4 | No Assessment | Poor (High risk) |
Low (Low risk) |
Medium (Medium risk) |
No Assessment | No Assessment |
Country 5 | No Assessment | Poor (High risk) |
High (High risk) |
High (High risk) |
Moderate (Medium risk) |
Medium (Medium risk) |
Country 6 | No Assessment | Poor (High risk) |
High (High risk) |
High (High risk) |
No Assessment | High (High risk) |
Country 7 | No Assessment | Poor (High risk) |
High (High risk) |
High (High risk) |
Moderate (Medium risk) |
Medium (Medium risk) |
Country 8 | No Assessment | Poor (High risk) |
High (High risk) |
Medium (Medium risk) |
No Assessment | Medium (Medium risk) |
Country 9 *No GAC HRR available | Low (Low risk) |
Mixed (Medium risk) |
Low (Low risk) |
Low (Low risk) |
Low (Low risk) |
Low (Low risk) |
Country 10 | High (High risk) |
Poor (High risk) |
Medium (Medium risk) |
Medium (Medium risk) |
Moderate (Medium risk) |
Medium (Medium risk) |
Country 11 | No Assessment | Poor (High risk) |
High (High risk) |
High (High risk) |
No Assessment | Medium (Medium risk) |
Country 12 | High (High risk) |
Mixed (Medium risk) |
High (High risk) |
Medium (Medium risk) |
High (High risk) |
Medium (Medium risk) |
Country 13 | No Assessment | Poor (High risk) |
High (High risk) |
High (High risk) |
Moderate (Medium risk) |
High (High risk) |
Country 14 | No Assessment | Poor (High risk) |
High (High risk) |
High (High risk) |
High (High risk) |
Medium (Medium risk) |
Country 15 | Medium (Medium risk) |
Mixed/Poor (High risk) |
Low (Low risk) |
High (High risk) |
Moderate (Medium risk) |
No Assessment |
Country 16 | No Assessment | Mixed (Medium risk) |
Low (Low risk) |
High (High risk) |
Moderate (Medium risk) |
Medium (Medium risk) |
Country 17 | No Assessment | Mixed (Medium risk) |
Low (Low risk) |
Medium (Medium risk) |
Moderate (Medium risk) |
Medium (Medium risk) |
Country 18 | No Assessment | Poor (High risk) |
High (High risk) |
High (High risk) |
Moderate (Medium risk) |
High (High risk) |
Country 19 | High (High risk) |
Poor (High risk) |
Medium (Medium risk) |
High (High risk) |
Moderate (Medium risk) |
Medium (Medium risk) – Under Review |
NSIRA made the following findings and recommendations in this review:
Finding 1. NSIRA found that all departments, with the exception of DFO in respect of subsection 7(1), complied with the reporting requirements set out in the ACA.
Finding 2. NSIRA found that all departments had frameworks to govern their implementation of the ACA and its associated directions by the end of 2022.
Finding 3. NSIRA found that most departments demonstrated continual refinements of their ACA frameworks based on self-identified gaps, NSIRA recommendations, and community-wide coordination efforts.
Finding 4. NSIRA found that TC’s ACA governance framework did not include policies and procedures for:
Recommendation 1. NSIRA recommends that TC update its ACA governance framework to include policies and procedures for:
Finding 5. NSIRA found that all departments, with the exception of DFO, GAC, PS, and TC, used country and/or entity risk assessments to inform their assessments of substantial risk of mistreatment and corresponding case escalation.
Finding 6. NSIRA found that departments’ country risk assessments were inconsistent with one another.
Finding 7. NSIRA found that the simultaneous conduct of independent human rights risk assessments in different departments reflected a substantial duplication of effort across the GC, and created the opportunity for discrepant outcomes.
Recommendation 2. NSIRA recommends that the Government of Canada designate a body responsible for developing:
Finding 8. NSIRA found, for the fourth consecutive year, that no departments escalated cases to their deputy heads for determination or decision.
Finding 9. NSIRA found that some high-risk sharing activities were stopped prior to escalation for consideration of possible mitigations.
Finding 10. NSIRA found that certain departments’ ACA governance frameworks and risk assessment methodologies included features that may systematically underassess the level of risk involved in a transaction. These features include:
Recommendation 3. NSIRA recommends that departments apply the “substantial risk” threshold in a manner consistent with the definition adopted government-wide; and that departments whose broader policy frameworks do not yet reflect this definition (CBSA, CRA, IRGC, and TC) make the attendant updates.
Recommendation 4. NSIRA recommends that departmental assessments of substantial risk of mistreatment be grounded in countries’ human rights records; and that subsequent entity-level considerations be based on validated, current, and consistent respect for caveats and assurances, rather than the absence of derogatory information particular to that entity or other bilateral considerations.
Recommendation 5. NSIRA recommends that all ACA governance frameworks incorporate layered checks and balances in the risk assessment and escalation of cases that may involve substantial risk of mistreatment.
Ottawa, Ontario, November 6, 2024 – The National Security and Intelligence Review Agency’s (NSIRA) fifth annual report has been tabled in Parliament.
This report provides an overview and discussion of NSIRA’s review and investigation work throughout 2023, including its findings and recommendations. It highlights the significant outcomes achieved through strengthened partnerships and an unwavering commitment to all Canadians to provide accountability and transparency regarding the Government of Canada’s national security and intelligence activities.
The annual report also reflects on a major milestone: NSIRA’s five-year anniversary. The agency has matured since its inception in 2019, keeping pace with emerging threats, technological advancements, and evolving security and intelligence activities. In stride, NSIRA has built an enhanced capacity to address complex issues and conduct thorough and effective reviews and investigations with a team of dedicated professionals with diverse expertise.
In 2023, in addition to its mandatory reviews, NSIRA continued executing discretionary reviews that were deemed relevant and appropriate. Of the ongoing reviews in 2023, NSIRA has since completed 12. In particular, NSIRA’s review on the Dissemination of Intelligence on People’s Republic of China Political Foreign Interference, 2018–2023 was a significant achievement. NSIRA evaluated the flow of intelligence within government from the collectors to consumers, including senior public servants and elected officials. This involved scrutinizing internal processes regarding how collected information was shared and escalated to relevant decision-makers. NSIRA determined it was in the public interest to report on this matter and produced its first special report under section 40 of the NSIRA Act, which was tabled in both houses of Parliament in May 2024.
Review highlights in the report include the following:
NSIRA also closed 12 investigations in 2023. Last year, the agency saw an increase in complaints against CSIS under section 16 of the NSIRA Act, alleging process delays in immigration or citizenship security screening.
This annual report demonstrates the value of expanded partnerships and how the organization leveraged its network of international oversight partners in 2023, including lessons learned and shared. NSIRA’s integration into the global community of national security and intelligence oversight has advanced the agency’s development and enhanced its capacity to carry out its mandate.
Over the past five years, NSIRA has sought to demystify the often-opaque domain of national security and intelligence agencies and empower Canadians to participate in informed discussions about their security and rights. Recently, the agency codified its approach by formalizing its vision, mission, and values statements.
Looking ahead, NSIRA is committed to continuing its vital work reporting on whether national security or intelligence activities are respectful of the rights and freedoms of all Canadians and enhancing public awareness and understanding of the critical issues at stake in national security and intelligence.
Date of Publishing:
As members of the National Security and Intelligence Review Agency (NSIRA), we are pleased to present our 2023 Annual Report, marking the five-year milestone of our agency’s journey. This report encapsulates our activities of the past year and provides an opportunity for reflection on the progress and evolution of our agency since 2019.
As world events have unfolded, and the pace of security and intelligence activities has advanced, the presence of our agency has never been more important. Since NSIRA’s inception, our mandate has been to provide independent oversight and accountability of Canada’s national security and intelligence activities. Over the last five years, we have brought greater transparency on such activities to the Canadian public, and we are proud of the strides we have made in fulfilling this crucial role.
Our agency has matured and strengthened in many ways. We have built enhanced capacity to conduct thorough and effective reviews and investigations of our country’s diverse range of national security and intelligence activities. We have assembled a team of dedicated professionals with a wealth of expertise in numerous fields, enabling us to address complex issues and provide informed assessments and recommendations.
We have also fostered constructive relationships with our reviewees, partner agencies, parliamentary committees, and civil society organizations. These partnerships have been instrumental in facilitating our access to information, engagement in meaningful dialogue, and our ability to promote transparency and accountability.
Over the last five years, we have enhanced public awareness and understanding of the critical issues at stake in the realm of national security and intelligence. Through the publication of our reports, we have sought to demystify this often-opaque domain and empower Canadians to participate in informed discussions about their security and rights.
As we reflect on our achievements to date, we are mindful of the challenges that lie ahead. The landscape of national security and intelligence is constantly evolving as emerging threats and technological advancements present new challenges. As adaptive and agile responses are required by Canada’s security and intelligence agencies, NSIRA will continue to assess whether such responses are lawful, reasonable, and necessary.
Looking ahead, we are committed to continuing our vital work. We remain dedicated and vigilant in our role of ensuring that Canada’s national security and intelligence framework remains accountable, and reporting on whether national security or intelligence activities are respectful of the rights and freedoms of all Canadians.
We extend our gratitude to all Secretariat staff, past and present, whose dedication and support has contributed to NSIRA’s evolution over the past five years. Their efforts have been invaluable in shaping our agency and our work serving the Canadian public.
Marie Deschamps
Marie-Lucie Morin
Foluke Laosebikan
Jim Chu
Craig Forcese
Matthew Cassar
Colleen Swords
2023 marked a momentous year for the National Security and Intelligence Review Agency (NSIRA). Relentless efforts to mature the agency’s processes and professionalize its approaches allowed NSIRA to conduct its reviews and investigations to the highest standards. This report highlights the significant outcomes achieved through refined methodologies, strengthened partnerships, and an unwavering commitment to all Canadians to provide accountability and transparency of the national security and intelligence activities of the Government of Canada.
NSIRA celebrated its fifth anniversary in July 2024 and has used this as an opportunity to reflect on its growth and development, as well as lessons learned. The agency has embraced its broad and unique mandate, completing reviews that span organizations and increasing its transparency in implementing its investigations mandate. NSIRA has prioritized the growth and development of its staff, enhanced review literacy across reviewed entities, and continued to maintain best practices and the highest standards in implementing its mandate.
NSIRA has expanded and leveraged its network of oversight partners through its numerous engagements with international counterparts and participation in international forums in 2023. This has benefitted all parties through sharing best practices, lessons learned, expertise, and research. NSIRA’s integration into the international community of national security and intelligence oversight has advanced the agency’s development and enhanced its capacity to carry out its mandate.
The following are highlights and key outcomes of the reviews NSIRA completed in 2023. (Ongoing reviews are not included.) Annex B lists all the findings and recommendations associated with reviews completed in 2023.
NSIRA completed the following reviews where Canadian Security Intelligence Service (CSIS) activities were solely at issue:
NSIRA completed the following reviews where Communications Security Establishment (CSE) activities were mostly at issue:
NSIRA completed a review of the Canada Border Services Agency’s (CBSA’s) Confidential Human Source (CHS) program, which examined the legal and policy frameworks governing the program, with particular attention to the management and assessment of risk; the agency’s discharge of its duty of care to its sources; and the sufficiency of ministerial direction and accountability in relation to the program.
NSIRA completed a review of the Department of National Defence (DND) and Canadian Armed Forces’ (CAFs) Human Source Handling program, which examined whether DND/CAF conducts its human source-handling activities lawfully, ethically, and with appropriate accountability.
NSIRA completed a review of the operational collaboration between CSE and CSIS, which was NSIRA’s first review to examine the effectiveness of the collaboration by assessing their respective mandates and associated prohibitions. This review also satisfied NSIRA’s annual requirement under section 8(2) of the National Security and Intelligence Review Agency Act (NSIRA Act) to review an aspect of CSIS’ threat reduction measures (TRMs).
NSIRA completed two mandated multi-departmental reviews in 2023:
The NSIRA Secretariat – in consultation with NSIRA members – established service standards for complaint investigations and set the goal of completing 90 percent of cases within the service standards. This commitment supports NSIRA’s complaint investigations by ensuring timeliness. NSIRA also implemented an independent verification process for complaints against CSE. Additionally, the agency completed a study on the collection of race-based data and other demographic information.
NSIRA observed an increase of complaints against CSIS, pursuant to section 16 of the NSIRA Act, alleging process delays in immigration or citizenship security screening.
The National Security and Intelligence Review Agency (NSIRA) is an independent agency that reports to Parliament and has the authority to conduct an integrated review of Government of Canada national security and intelligence activities. This provides Canada with one of the most extensive systems for independent review of national security in the world. NSIRA has a dual mandate: to conduct reviews, and to carry out investigations, of complaints related to Canada’s national security or intelligence activities. In fulfilling its mandate, the agency is assisted by a Secretariat headed by an Executive Director.
NSIRA’s review mandate is broad, as outlined in subsection 8(1) of the National Security and Intelligence Review Agency Act (NSIRA Act). This mandate includes reviewing the activities of the Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE), as well as those of any other federal department or agency that are related to national security or intelligence. The agency may also review any national security or intelligence matter that a Minister of the Crown refers to NSIRA.
NSIRA is responsible for investigating complaints related to national security or intelligence. This is outlined in paragraph 8(1)(d) of the NSIRA Act, and involves investigating the following:
The conversation on national security and intelligence issues is evolving in Canada. In recent years, armed conflicts, the COVID-19 pandemic, and activities of foreign and domestic security and intelligence agencies have all been featured in news headlines. Most recently, Parliament debated the role of Canada’s security and intelligence agencies in responding to the threat of foreign political interference. The importance of robust review and oversight has never been more clear or timely. As the conversation grows, Canadians will want more information about the functioning of their security and intelligence systems. NSIRA is the trusted eyes and ears of Canadians, providing transparency that did not previously exist.
NSIRA’s mandate is to review issues and conduct investigations of complaints related to Canada’s national security or intelligence activities. Prior to NSIRA, although some activities were subject to review, no single agency had the mandate and authority to review activities across the national security and intelligence landscape, and some departments lacked an independent review body.
The siloed framework limited NSIRA’s predecessor agencies, the Security and Intelligence Review Committee (SIRC) and the Office of the Communications Security Establishment Commissioner to reviews and investigations of complaints within their narrow mandates. For example, reviews did not trace the progression of an issue as it traversed government departments.
NSIRA’s broad mandate is unique within the international community, providing a much greater understanding of how departments and agencies work and interact in the national security and intelligence space. For example, in 2023, NSIRA launched a review of the dissemination of intelligence on foreign interference, focusing on how intelligence progressed from departments charged with collecting intelligence through to its ultimate consumers. Such a review was not possible for NSIRA’s siloed predecessors.
NSIRA’s reviews have involved 19 departments and agencies to date. Its expanded mandate for investigating complaints encompasses those against CSIS, CSE and, upon referral, those from the CRCC concerning the RCMP and the Canadian Human Rights Commission (CHRC). NSIRA’s work gets to the heart of how national security and intelligence activities are conducted, allowing for precise and effective recommendations.
NSIRA has prioritized professionalizing how it conducts reviews by developing policies and processes to support the review process. These were created even as the agency was growing and delivering on its complex mandate, and through the COVID-19 pandemic.
NSIRA has also modernized its policies and processes for its investigations of complaints. The agency undertook significant reform of its investigative process and published new Rules of Procedure to replace the previous model, increasing procedural transparency for those involved in the complaints process. When the COVID-19 pandemic made in-person hearings impossible, NSIRA pivoted and introduced alternate solutions, such as conducting its investigative interviews over video conference, thereby retaining access for participants.
NSIRA has built a proactive disclosure practice to publish its reports on its website. It has also undertaken an effort to publish those prepared by SIRC, to the greatest extent possible. The goal is to make NSIRA’s reviews and its findings and recommendations available to the public as soon as possible. Proactive disclosure increases transparency and contributes to the dialogue on national security and intelligence in Canada.
The Secretariat is now staffed by almost 100 full-time employees. NSIRA’s greatest asset is its people, and the Secretariat continues to attract staff with a range of expertise in research, review, technology, and law. This breadth has resulted in a diversity of reviews and a professionalized investigative model for addressing complaints.
NSIRA has actively developed a unique culture and is innovative in how it manages its review process. Review teams are comprised of individuals with diverse skill sets that reflect the need for legal and technical expertise. Teams are responsible for executing reviews under the direction of NSIRA members, with the guidance and support of Secretariat management. The result is detailed, fearless reviews.
Similarly, NSIRA’s model for investigations of complaints is now designed for NSIRA members to be expertly supported by legal, registry, and research staff. This enhances members’ effectiveness in their adjudicative role conducting investigations.
NSIRA’s mission is to serve as the trusted eyes and ears of Canadians through independent, expert review and investigation of the Government of Canada’s national security and intelligence activities. To successfully implement its mission, NSIRA must select the right reviews and have access to the required information.
The NSIRA Act requires NSIRA to conduct certain annual reviews; it also gives the agency discretion to choose topics to review. This discretion is fundamental as NSIRA must be able to “follow the thread” to ensure that activities deserving scrutiny are independently reviewed. Specifically, NSIRA has developed a review planning and consideration matrix, consisting of formal criteria that help identify review topics in accordance with NSIRA’s core mandate and mission. The prioritization of reviews is informed by additional strategic factors, including assessments of the nature of the activity and the compliance risk its poses, the novelty of the activity and any technology it employs, as well as resourcing, ongoing reviews, and public interest.
Access to information is the lifeblood of review, and NSIRA continues to insist upon its access rights. Effective review requires timely and complete responses to NSIRA’s requests for information, open and candid briefings, and mutual respect. Despite the agency’s unfettered access under the NSIRA Act, navigating access issues has not been without its struggles. There has been a learning curve, for both reviewed entities and NSIRA, and increasing review literacy in the departments and agencies under NSIRA’s review mandate is an ongoing priority.
NSIRA’s impact on the national security and intelligence community extends beyond that of the reviewed departments. Recently, the Federal Court released a decision on a CSIS warrant matter that used an NSIRA report to inform its background and analysis. The Court considered the issues identified by NSIRA to be important in relation to the sharing of information collected under certain warrants.
Additionally, Ministers accountable for the security and intelligence community’s activities have recognized the value of independent review and have referred matters to NSIRA. The first of such reviews stemmed from a Federal Court judgment. As a result, the Ministers of Public Safety and Justice referred the matter to NSIRA. NSIRA’s report made findings and recommendations on Justice’s provision of legal advice, CSIS and Justice’s management of the warrant acquisition process, and broader cultural and governance issues.
Since 2019, NSIRA has completed 39 reviews (13 statutory and 26 discretionary). Of these reviews, 21 involved more than one department. NSIRA has also issued 17 different compliance reports to responsible Ministers, as required under section 35 of the NSIRA Act, whenever the agency finds that an activity may not be in compliance with the law. Compliance issues range from a department missing a deadline prescribed in legislation to a potential Charter violation. NSIRA’s reports have included more than 200 recommendations, ranging from specific process changes to wide-ranging structural reform. NSIRA has also received more than 200 complaints, highlighting the importance of accessibility to an independent investigation process to address complaints concerning the activities of CSIS, CSE, and the RCMP.
As NSIRA looks to its future, it will also turn attention inward to ensure NSIRA’s structure and governance is fit for purpose. The upcoming legislative review of the NSIRA Act provides the opportunity to make any required improvements.
NSIRA is immensely proud of its contributions to the scrutiny and transparency of Canada’s security and intelligence activities during its first five years. It has played a pivotal role in ensuring there is independent accountability for the organizations involved in Canada’s security and intelligence activities. As NSIRA looks ahead, it does so with enthusiasm and a renewed mission. NSIRA has recently codified its approach by formalizing its vision, mission, and values statements, and while the formal statements may be new, the underlying elements have provided the agency’s foundation from its beginning.
Under NSIRA’s predecessors, international partnerships were primarily established through the Five Eyes Intelligence Oversight and Review Council (FIORC), which continues to be a foundational alliance for NSIRA. In addition to reinforcing and building upon the relationships it inherited, NSIRA has cultivated new partnerships with foreign counterparts and actively participated in international forums. In 2023 alone, NSIRA engaged with the following organizations and attended the following events:
Connecting with international counterparts and participating in multilateral discussions has enabled NSIRA to tap into a network of partners. Relevant information is shared regarding best practices, methodologies, recent developments, and common issues. Information sharing and cooperation in the traditionally esoteric and insulated field of national security oversight has broadened NSIRA’s outlook and informed its expectations with respect to the departments and agencies that it oversees.
NSIRA has found that many of the challenges it faces have been experienced, and in some cases overcome, by international partners. These include challenges that are operational in nature, such as tactics for acquiring and verifying information, and those that relate to NSIRA’s Secretariat, such as the recruitment, training, and retention of staff. Leveraging the lessons learned by our international counterparts has accelerated NSIRA’s own development and contributed to the agency’s growing reputation as an exemplar in the realm of national security and intelligence oversight.
While certainly a voracious consumer of best practices, NSIRA is an equally active contributor. The agency has reciprocally shared its own unique approaches, processes, and methods with the broader oversight community, which in some instances has led partner organizations to follow NSIRA’s lead and adopt its practices. Even where NSIRA has not been confronted with a specific issue firsthand, its perspective has been sought and acted upon by partners that recognize NSIRA’s wealth of experience and renown for innovation.
Continuous and repeated engagements with international partners have allowed for working- level relationships to take root, flourish, and bear fruit in the form of both regularly scheduled touch points and casual, ad hoc, file-specific exchanges. Lowering the institutional barriers has promoted the exchange of expertise, had a more direct impact on the substantive work of each institution, and produced more tangible outcomes, as described in the examples below.
Through an extended assignment to NSIRA, a communications expert from IPCO UK conducted a wholistic assessment of the agency’s current communications posture and played a critical role in crafting an inaugural communications strategy. The implementation of this strategy has helped NSIRA reach and build connections with domestic stakeholders. NSIRA’s members and Secretariat staff are deeply grateful for the expert’s contributions during their time with the agency.
TET Denmark and EOS Norway were influential in the development and use of a new IT system review inspection, first used as part of NSIRA’s Review of the Lifecycle of CSIS’ Warranted Information. They also contributed to functional and performance benchmarking used by NSIRA in its methodologies, common practices, and assessment criteria.
NSIRA has consulted the American Inspector General to improve the responsiveness of reviewed departments and agencies to NSIRA’s recommendations. NSIRA has begun adopting best practices for ensuring there is follow-up on recommendations it has provided.
At an event hosted by Global Affairs Canada (GAC) as part of Canada’s work in cooperation with the UNCTED, NSIRA gave a presentation to the UNCTED delegation to explain the role that independent review plays in assessing the legality of Canadian activities in the counter-terrorism realm. This showcased to international assessors how the Canadian model has built robust independent mechanisms for review of counter-terrorism operations that reaches both law enforcement and the intelligence service.
NSIRA’s review planning and consideration matrix was shared with New Zealand’s IGIS, TET Denmark, and several other international partners. Following their visit to NSIRA, TET Denmark has updated its IT standards to include quality assurance steps and added additional factors to its risk assessment framework.
Just as security and intelligence agencies regularly cooperate and share information with international partners, so too must the bodies that oversee them. Collaboration among NSIRA and its foreign counterparts has produced, and continues to yield, mutual benefits for all parties involved. As a result, NSIRA has become a more capable organization with greater visibility in the transnational security and intelligence community, ensuring effective and exhaustive accountability of Canada’s national security apparatus.
Domestically, within Canada’s review and oversight community, NSIRA brings a distinct and valued perspective, filling a previously unoccupied space in this important network. As such, the agency complements the activities of its peers. In 2023, NSIRA met with numerous Agents of Parliament, including the Auditor General of Canada, the Public Sector Integrity Commissioner, and the Privacy Commissioner. The multi-decade institutional experience and maturity of these agents and their respective offices has proven to be invaluably instructive for NSIRA, and the exchange of best practices has been extremely helpful, particularly in the development of the Secretariat’s communications capacity.
As provided for in the NSIRA Act, NSIRA engages with other oversight bodies to deconflict on issues of mutual interest. For example, in 2023, both NSIRA and the National Security and Intelligence Committee of Parliamentarians (NSICOP) launched reviews on the issue of political foreign interference. While maintaining its independence, NSIRA coordinated with NSICOP to avoid any unnecessary duplication of work in relation to each organization’s review.
In addition to its annual reviews, NSIRA continued to execute discretionary reviews that it deemed relevant and appropriate to the authorities of its mandate. Of note was NSIRA’s review on the Dissemination of Intelligence on People’s Republic of China Political Foreign Interference, 2018–2023. NSIRA evaluated the flow of intelligence within government from the collectors to consumers, including senior public servants and elected officials. This involved scrutinizing internal processes regarding how collected information was shared and escalated to relevant decision-makers. NSIRA determined that it was in the public interest to report on this matter and produced its first special report under section 40 of the NSIRA Act. This report was tabled in both houses of Parliament in May 2024.
Table 1 captures all review work that was underway in 2023. This includes annually mandated reviews, discretionary reviews, and annual reviews of CSE and CSIS activities. High-level summaries of their content and outcomes are provided in subsequent sections for those reviews completed by the end of the calendar year; the full findings and recommendations can be found in Annex B. NSIRA makes the reviews available once they have been redacted for public release.
Review | Department(s) | Status |
---|---|---|
Annual Report to the Minister of National Defence on CSE activities for 2022 | CSE | Completed |
Annual Report to the Minister of Public Safety on CSIS activities for 2022 | CSIS | Completed |
Review of Government of Canada Institutions’ Disclosures of Information Under the Security of Canada Information Disclosure Act in 2022 | PS, CSE, CSIS, GAC, RCMP, IRCC | Completed |
Review of CSE’s Network-based Solutions and Related Cybersecurity & Information Assurance Activities | CSE and SSC | Completed |
Review of CSIS Dataset Regime | CSIS | Completed |
Review of the Department of National Defence/Canadian Armed Forces’ Human Source Handling Program | DND/CAF | Completed |
Review of Operational Collaboration Between the CSE and CSIS | CSE and CSIS | Completed |
Review of the CBSA’s Confidential Human Source Program | CBSA | Completed |
Review of Departmental Implementation of the Avoiding Complicity in Mistreatment by Foreign Entities Act for 2022 | CBSA, CRA, CSE, CSIS, DFO, DND/CAF, FINTRAC, GAC, IRCC, PS, RCMP, TC | Completed |
CSE’s Use of the Polygraph for Security Screening | CSE and TBS | Completed |
Review of the Dissemination of Intelligence on People’s Republic of China Political Foreign Interference, 2018–2023 | CSIS, RCMP, GAC, CSE, PS, PCO | Completed |
Review of Public Safety Canada and CSIS’s Accountability Mechanisms | CSIS, GAC, PS, DOJ | Completed |
Review of the Lifecycle of CSIS’ Warranted Information | CSIS | Completed |
Review of the RCMP’s Human Source Program | RCMP | Completed |
Review of Government of Canada Institutions’ Disclosures of Information Under the Security of Canada Information Disclosure Act in 2023 | PS, CSE, CSIS, GAC, RCMP, CBSA, IRCC | Ongoing |
Review of CSE’s Vulnerabilities Equities Process | CSE, CSIS, RCMP | Ongoing |
Review of CRA’s Review and Analysis Division (RAD) | CRA | Ongoing |
NSIRA has a mandate to review any Canadian Security Intelligence Service (CSIS) activity. The NSIRA Act requires the agency to submit an annual report on CSIS activities each year to the Minister of Public Safety and Emergency Preparedness. These reports are classified and include information related to CSIS’s compliance with the law and applicable ministerial directions, and the reasonableness and necessity of CSIS exercising its powers.
In 2023, NSIRA completed one dedicated review of CSIS and its annual review of CSIS activities, both summarized below. Furthermore, CSIS is involved in other NSIRA multi-departmental reviews, such as the agency’s review of the operational collaboration between CSE and CSIS, and the legally mandated annual reviews of the Security of Canada Information Disclosure Act (SCIDA) and the Avoiding Complicity in Mistreatment by Foreign Entities Act, the results of which are described in section 4.5, Multi-departmental reviews.
In July 2019, the dataset regime came into force as part of the National Security Act 2017 (NSA 2017), creating sections 11.01–11.25 of the CSIS Act.The regime enables CSIS to collect and retain datasets containing personal information that are not directly and immediately related to threats, but likely to assist in national security investigations.
NSIRA examined the implementation of the regime, including aspects of governance, information management, retention practices, and training. The agency found compliance issues that permeated all aspects of the regime under review. Of concern, NSIRA found that CSIS’s current application of the dataset regime is inconsistent with the statutory framework. NSIRA also found multiple compliance issues with how CSIS has implemented the regime, including the retention of Canadian and foreign information without the requisite legally mandated authorizations and approvals.
The review concluded that CSIS has failed to adequately operationalize its dataset regime. CSIS did not seek to clarify legal ambiguities of the application of the regime before the Federal Court, despite having had the opportunity to do so. CSIS adopted multiple positions on its application and now risks limiting what is intended to be a collection and retention regime to a retention mechanism. Internally, CSIS has not provided sufficient resources and training to ensure compliance with the regime. Absent an internal commitment to adequately operationalize, resource, and support the implementation of a new legal regime, any such regime will fail no matter how fit for purpose it is believed to be.
NSIRA completed its annual review of CSIS activities, which covers a range of activities contemplated and undertaken between January 1 and December 31, 2023. The review highlighted compliance-related challenges faced by CSIS, allowed NSIRA to continue monitoring ongoing trends, and identified emerging issues in CSIS’s exercise of its powers. Information obtained throughout the review, including that which CSIS is required to provide to NSIRA under the CSIS Act, was used in NSIRA’s Annual Report to the Minister of Public Safety on CSIS activities, as well as to inform ongoing NSIRA reviews and internal review planning for upcoming reviews.
To achieve greater public accountability, NSIRA has requested that CSIS publish statistics and data about public interest and compliance-related aspects of its activities. NSIRA is of the opinion that the following statistics will provide the public with information related to the scope and breadth of CSIS operations, as well as display the evolution of activities from year to year.
Section 21 of the CSIS Act authorizes CSIS to apply to a judge for a warrant if it believes, on reasonable grounds, that more intrusive powers are required to investigate a particular threat to the security of Canada. Warrants may be used by CSIS, for example, to intercept communications, enter a location, or obtain information, records, or documents. Each individual warrant application could include multiple individuals or request the use of multiple intrusive powers.
Applications | 2018 | 2019 | 2020 | 2021 | 2022* | 2023 |
---|---|---|---|---|---|---|
Total section 21 applications | 24 | 24 | 15 | 31 | 28 | 30 |
Total approved warrants | 24 | 23 | 15 | 31 | 28 | 30 |
New warrants | 10 | 9 | 2 | 13 | 6 | 9 |
Replacements | 11 | 12 | 8 | 14 | 14 | 10 |
Supplemental | 3 | 2 | 5 | 4 | 8 | 11 |
Total denied warrants | 0 | 1 | 0 | 0 | 0 | 0 |
*The applications submitted by CSIS to the Federal Court in 2022 resulted in the approval and issuance of 194 judicial authorities, including 164 warrants and 28 assistance orders issued pursuant to sections 12, 16, and 21 of the CSIS Act, as well as two judicial authorizations issued pursuant to section 11.13 of the Act. Each application is subject to a thorough production and vetting process that includes review by an independent Department of Justice counsel and challenge by a committee composed of executives of CSIS, PS, CSE, and the RCMP (as applicable) before seeking ministerial approval. A number of warrants issued during this period reflected the development of innovative new authorities and collection techniques, which required close collaboration between collectors, technology operators, policy analysts, and legal counsel. |
CSIS is authorized to seek a judicial warrant for a threat reduction measure (TRM) if it believes that certain intrusive measures, outlined in section 21 (1.1) of the CSIS Act, are required to reduce a threat. The CSIS Act is clear that when a proposed TRM would limit a right or freedom protected by the Canadian Charter of Rights and Freedoms or would otherwise be contrary to Canadian law, a judicial warrant authorizing the measure is required. To date, CSIS has sought no judicial authorizations to undertake warranted TRMs. TRMs approved in one year may be executed in future years. Operational reasons may also prevent an approved TRM from being executed.
Threat reduction measures | 2015 | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 | 2022 | 2023 |
---|---|---|---|---|---|---|---|---|---|
Approved | 10 | 8 | 15 | 23 | 24 | 11 | 23 | 16 | 14 |
Executed | 10 | 8 | 13 | 17 | 19 | 8 | 17 | 12 | 19 |
Warranted | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
CSIS is mandated to investigate threats to the security of Canada, including espionage; foreign- influenced activities; political, religious, or ideologically motivated violence; and subversion. Section 12 of the CSIS Act sets out criteria for permitting the Service to investigate an individual, group, or entity for matters related to these threats. Subjects of a CSIS investigation, whether they be individuals or groups, are called “targets.”
Targets | 2018 | 2019 | 2020 | 2021 | 2022 | 2023 |
---|---|---|---|---|---|---|
Number of targets | 430 | 467 | 360 | 352 | 340 | 323 |
Data analytics is an investigative tool for CSIS, through which it seeks to make connections and identify trends that may not be visible using traditional methods of investigation. NSA 2017 gave CSIS new powers, including a legal framework for the Service to collect, retain, and use datasets. The framework authorizes CSIS to collect datasets (divided into publicly available, Canadian, and foreign datasets) that may have the ability to assist it in the performance of its duties and functions. It also establishes safeguards for the protection of Canadian rights and freedoms, including privacy rights. These protections include enhanced requirements for ministerial accountability. Depending on the type of dataset, CSIS must meet different requirements before it is able to use a dataset.
The CSIS Act also requires that NSIRA be kept apprised of certain dataset-related activities. Reports prepared following the handling of datasets are to be provided to NSIRA under certain conditions and within reasonable timeframes. While CSIS is not required to advise NSIRA of judicial authorizations or ministerial approvals for the collection of Canadian and foreign datasets, CSIS has been proactively keeping NSIRA apprised of these activities.
Type of dataset | 2019 | 2020 | 2021 | 2022 | 2023 |
---|---|---|---|---|---|
Publicly available datasets | |||||
Evaluated | 9 | 6 | 4 | 4 | 2 |
Retained | 9 | 6 | 2 | 4 | 2 |
Canadian datasets | |||||
Evaluated | 0 | 0 | 2 | 0 | 1 |
Retained (approved by the Federal Court) | 0 | 0 | 0 | 2 | 0 |
Denied by the Federal Court | 0 | 0 | 0 | 0 | 0 |
Foreign datasets | |||||
Evaluated | 10 | 0 | 0 | 1 | 2 |
Retained (approved by the Minister of Public Safety and Intelligence Commissioner) | 0 | 1 | 1 | 1 | 3 |
Denied by the Minister | 0 | 0 | 0 | 0 | 0 |
Denied by the Intelligence Commissioner | 0 | 0 | 0 | 0 | 0 |
CSIS’s Justification Framework establishes a limited justification for its employees, and persons acting at their direction, to carry out activities that would otherwise constitute offences under Canadian law. CSIS’s framework is modelled on those already in place for Canadian law enforcement. It provides needed clarity to CSIS, and to Canadians, about what CSIS may lawfully do in the course of its activities. The framework recognizes that it is in the public interest to ensure that CSIS employees can effectively carry out intelligence collection duties and functions, including by engaging in otherwise unlawful acts or omissions, in the public interest and in accordance with the rule of law. The types of otherwise unlawful acts and omissions that are authorized by the Justification Framework are determined by the Minister of Public Safety and approved by the Intelligence Commissioner. There remain limitations on what activities can be undertaken, and nothing in the framework permits the commission of an act or omission that would infringe on a right or freedom guaranteed by the Charter.
According to section 20.1 of the CSIS Act, employees must be designated by the Minister of Public Safety and Emergency Preparedness to be covered under the Justification Framework while committing or directing an otherwise unlawful act or omission. Designated employees are CSIS employees who require the Justification Framework as part of their duties and functions. Designated employees are justified in committing an act or omission themselves (commissions by employees) and they may direct another person to commit an act or omission (directions to commit) as a part of their duties and functions.
2019 | 2020 | 2021 | 2022 | 2023 | |
---|---|---|---|---|---|
Authorizations | 49 | 147 | 178 | 172 | 172 |
Commissions by employees | 1 | 39 | 51 | 61 | 47 |
Directions to commit | 15 | 84 | 116 | 131 | 116 |
Emergency designations | 0 | 0 | 0 | 0 | 0 |
CSIS’s operational compliance program unit leads and manages overall compliance within the Service. The objective of this unit is to promote a culture of compliance within CSIS by leading an approach for reporting and assessing potential non-compliance incidents that provides timely advice and guidance related to internal policies and procedures for employees. This program is the centre for processing all instances of potential non-compliance related to operational activities.
NSIRA will continue to monitor closely the instances of non-compliance that relate to Canadian law and the Charter, and work with CSIS to improve transparency around these activities.
Incidents | 2019 | 2020 | 2021 | 2022 | 2023 |
---|---|---|---|---|---|
Processed compliance incidents | 53 | 99 | 85 | 59 | 79 |
Administrative | 53 | 64 | 42 | 48 | |
Operational | 40a | 19b | 21 | 17 | 31 |
Canadian law | N/A | N/A | 1 | 2 | 4 |
Charter | N/A | N/A | 6 | 5 | 15 |
Warrant conditions | N/A | N/A | 6 | 3 | 11 |
CSIS governance | N/A | N/A | 8 | 15 | 27 |
a For 2021, each operational non-compliance incident was reported based on the highest non-compliance (i.e., if the incident were non-compliant with the Charter and CSIS governance, it would be counted only under the Charter category). For 2022 and 2023, each incident is counted in all of the areas in which it was non-compliant. As such, the sum of operational non-compliance in the various categories exceeds the total number of such incidents. | |||||
b The total number of incidents of non-compliance were not further broken down in 2019 and 2020. This number represents the number of incidents of non-compliance with requirements such as the CSIS Act, the Charter, warrant terms and conditions, or CSIS internal policies or procedures. |
NSIRA has the mandate to review any activity conducted by the Communications Security Establishment (CSE). NSIRA must submit an annual report to the Minister of National Defence on CSE activities, including information related to CSE’s compliance with the law and applicable ministerial directions, and NSIRA’s assessment of the reasonableness and necessity of CSE exercising its powers.
In 2023, NSIRA completed two dedicated reviews of CSE and commenced an annual review of CSE activities, summarized below. Furthermore, CSE is included in other NSIRA multi-departmental reviews, such as the review of the operational collaboration between CSE and CSIS and the legally mandated annual reviews of the Security of Canada Information Disclosure Act (SCIDA) and the Avoiding Complicity in Mistreatment by Foreign Entities Act (see section 4.5).
NSIRA’s review of CSE’s use of the polygraph for security screening found that the policies and procedures in place at CSE inadequately addressed privacy issues. In particular, CSE’s use of personal information collected during polygraph exams for staffing purposes may have exceeded the consent provided and may not have complied with section 7 of the Privacy Act.
NSIRA also found issues with the way in which CSE operated its polygraph program, including unnecessarily repetitive and aggressive questioning by examiners, insufficient quality control of exams, and retention issues related to audiovisual recordings. Additionally, the way in which CSE used the results of polygraph exams to inform security screening decision-making could cause uncertainty over the opportunity to challenge denials of security clearances pursuant to the NSIRA Act. CSE generally over-relied on the results of polygraph exams for deciding security screening cases. When taken as a whole, CSE’s use of the polygraph for security screening raised serious concerns related to the Charter.
NSIRA also explored the role of the Treasury Board of Canada Secretariat (TBS) in establishing the Standard on Security Screening (the Standard), which governs the use of the polygraph for security screening by the Government of Canada. NSIRA found that TBS did not adequately consider the privacy or Charter implications of the use of the polygraph. TBS also did not implement sufficient safeguards in the Standard to address these implications.
As a result, NSIRA recommended that CSE and TBS both urgently address the fundamental issues related to the legality, reasonableness, and necessity of the use of the polygraph for security screening. If these issues cannot be addressed, NSIRA recommended that TBS remove the polygraph from the Standard and CSE should cease using it for security screening.
Since the CSE Act came into force in 2019, CSE’s cybersecurity and information assurance (CSIA) activities have grown in extent and importance. CSE acquires and analyzes vast amounts of information to identify and prevent cybersecurity threats, a necessary activity that nonetheless engages important privacy interests, a balance NSIRA sought to understand.
This was NSIRA’s first review of CSE’s CSIA activities, along with its first review of Shared Services Canada (SSC). The two departments work together on CSIA activities, as SSC is the system owner for most Government of Canada networks.
NSIRA found that CSE operates a comprehensive and integrated ecosystem of cybersecurity systems, tools, and capabilities to protect against cyber threats, with a design that incorporates measures meant to protect the privacy of Canadians and persons in Canada.
NSIRA made findings and recommendations in two areas of concern:
NSIRA built foundational knowledge about CSE’s CSIA activities through this review, which will inform NSIRA’s future activities.
NSIRA conducted the second annual review of CSE activities. The 2023 review aimed to identify compliance-related challenges, general trends, and emerging issues based on information CSE is required by law to provide to NSIRA, as well as supplementary information. Primarily resulting in NSIRA’s Annual Report to the Minister of National Defence on CSE activities, the review also identified areas for future reviews of CSE activities and bolstered NSIRA’s knowledge of CSE activities.
To achieve greater accountability and transparency, NSIRA has requested statistics and data from CSE about public interest and compliance-related aspects of its activities. NSIRA is of the opinion that these statistics will provide the public with important information related to the scope and breadth of CSE operations, as well as display the evolution of activities from year to year.
Ministerial authorizations are issued to CSE by the Minister of National Defence. The authorizations support specific foreign intelligence, cybersecurity activities, defensive cyber operations, or active cyber operations conducted by CSE pursuant to those aspects of its mandate. Authorizations are issued when these activities could otherwise contravene an Act of Parliament or interfere with a reasonable expectation of privacy of a Canadian or a person in Canada.
Type of ministerial authorization | Enabling section of the CSE Act | Issued in 2019 | Issued in 2020 | Issued in 2021 | Issued in 2022 | Issued in 2023 |
---|---|---|---|---|---|---|
Foreign intelligence | 26(1) | 3 | 3 | 3 | 3 | 3 |
Cybersecurity (federal and non-federal) | 27(1) and 27(2) | 2 | 1 | 2 | 3 | 3 |
Defensive cyber operations | 29(1) | 1 | 1 | 1 | 1 | 1 |
Active cyber operations | 30(1) | 1 | 1 | 2 | 3 | 3 |
Ministerial orders are issued by the Minister for the purpose of (1) designating any electronic information, any information infrastructures, or any class of electronic information or information infrastructures as electronic information or information infrastructures of importance to the Government of Canada (section 21[1] of the CSE Act); or (2) designating recipients of information related to Canadians or persons in Canada – that is, Canadian-identifying information (sections 45 and 44[1] of the CSE Act).
Name of ministerial order | Enabling section of the CSE Act |
---|---|
Designating Recipients of Canadian Identifying Information Used, Analyzed or Retained Under a Foreign Intelligence Authorization | 43 |
Designating Recipients of Information Relating to a Canadian or Person in Canada Acquired, Used or Analyzed Under the Cybersecurity and Information Assurance Aspects of the CSE Mandate | 44 |
Designating Electronic Information and Information Infrastructures of Importance to the Government of Canada | 21 |
Designating Electronic Information and Information Infrastructures of Ukraine as of Importance to the Government of Canada | 21 |
Designating Electronic Information and Information Infrastructures of Latvia as of Importance to the Government of Canada | 21 |
Under section 16 of the CSE Act, CSE is mandated to acquire information from or through the global information infrastructure. The CSE Act defines the global information infrastructure as including electromagnetic emissions; any equipment producing such emissions; communications systems; information technology systems and networks; and any data or technical information carried on, contained in, or relating to those emissions, that equipment, those systems, or those networks. CSE uses, analyzes, and disseminates the information for providing foreign intelligence in accordance with the Government of Canada’s intelligence priorities.
CSE foreign intelligence reporting | 2020 (#) | 2021 (#) | 2022 (#) | 2023 (#) |
---|---|---|---|---|
Reports released | Not available | 3,050 | 3,185 | 3,184 |
Departments and agencies | >25 | 28 | 26 | 28 |
Specific clients within departments and agencies | >2,100 | 1,627 | 1,761 | 2,049 |
Information relating to a Canadian or a person in Canada (IRTC) is information about Canadians or persons in Canada that may be incidentally collected by CSE while conducting foreign intelligence or cybersecurity activities under the authority of a ministerial authorization. Incidental collection refers to information acquired that CSE was not deliberately seeking and where the activity that enabled its acquisition was not directed at a Canadian or a person in Canada. According to CSE policy, IRTC is defined as any information recognized as having reference to a Canadian or person in Canada, regardless of whether that information could be used to identify that Canadian or person in Canada.
CSE was asked to release statistics or data about the regularity with which IRTC is included in CSE’s end-product reporting. CSE responded that this information “remains classified and cannot be published.”
CSE is prohibited from directing its activities at Canadians or persons in Canada. However, its collection methodologies sometimes result in incidentally acquiring such information. When such incidentally collected information is used in CSE’s foreign intelligence reporting, any part that potentially identifies a Canadian or a person in Canada is suppressed to protect the privacy of the individual(s) in question. CSE may release unsuppressed Canadian-identifying information (CII) to designated recipients when the recipients have the legal authority and operational justification to receive it, and when it is essential to international affairs, defence, or security (including cyber security).
Type of request | 2021 (#) | 2022 (#) | 2023 (#) |
---|---|---|---|
Government of Canada requests | 741 | 657 | 1,087 |
Five Eyes requests | 90 | 62 | 142 |
Non-Five Eyes requests | 0 | 0 | 0 |
Total | 831 | 719 | 1,229 |
In 2023, of the 1,229 requests received, CSE reported having denied 281 requests. By the end of the calendar year, 40 were still being processed.
CSE was asked to release the number of instances where CII is suppressed in CSE foreign intelligence or cyber security reporting. It indicated that this information “remains classified and cannot be published.”
A privacy incident occurs when the privacy of a Canadian or a person in Canada is put at risk in a manner that runs counter to, or is not provided for, in CSE’s policies. CSE tracks such incidents through its Privacy Incidents File, and for privacy incidents that are attributable to a second-party partner or a domestic partner, through its Second-Party Privacy Incidents File.
Type of incident | 2021 (#) | 2022 (#) | 2023 (#) |
---|---|---|---|
Privacy incidents | 96 | 114 | 107 |
Second-party privacy incidents | 33 | 23 | 37 |
Non-privacy compliance incidents | Not available | Not available | 28 |
Type of incident | 2023 (#) |
---|---|
Privacy incidents | 70 |
Second-party privacy incidents | 37 |
Non-privacy compliance incidents | 16 |
Type of incident | 2023 (#) |
---|---|
Privacy incidents | 37 |
Non-privacy compliance incidents | 12 |
Under section 17 of the CSE Act, CSE is mandated to provide advice, guidance, and services to help protect electronic information and information infrastructures of federal institutions, as well as those of non-federal entities that are designated by the Minister of National Defence as being of importance to the Government of Canada.
The Canadian Centre for Cyber Security (Cyber Centre) is Canada’s unified authority on cybersecurity. The Cyber Centre, which is a part of CSE, provides expert guidance, services, and education while working in collaboration with stakeholders in the private and public sectors. The Cyber Centre handles incidents in government and designated institutions that include:
Type of cyber incident | 2022 | 2023 |
---|---|---|
Federal institutions | 1,070 | 977 |
Critical infrastructure | 1,575 | 1,756 |
International | Not available | 82 |
Total | 2,645 | 2,815 |
Under section 18 of the CSE Act, CSE is mandated to conduct defensive cyber operations (DCO) to help protect electronic information and information infrastructures of federal institutions, as well as those of non-federal entities that are designated by the Minister as being of importance to the Government of Canada, from hostile cyber attacks.
Under section 19 of the CSE Act, CSE is mandated to conduct active cyber operations (ACO) against foreign individuals, states, organizations, or terrorist groups as they relate to international affairs, defence, or security.
CSE was asked to release the number of DCOs and ACOs approved, and the number carried out in 2023. CSE responded that this information “remains classified and cannot be published.”
As part of the assistance aspect of CSE’s mandate, CSE receives requests for assistance from Canadian law enforcement and security agencies, as well as from the Department of National Defence and the Canadian Forces (DND/CAF).
Action | 2020 | 2021 | 2022 | 2023 |
---|---|---|---|---|
Approved | 23 | 32 | 59 | 48 |
Not approved | 1 | 3 | 0 | 0 |
Under review | Not available | Not available | 0 | 2 |
Cancelled | Not available | Not available | 1 | 0 |
Denied | Not available | Not available | 2 | 1 |
Total received | 24 | 35 | 62 | 53 |
Note: For 2020 and 2021, CSE was able to provide only the number of requests received and actioned. CSE advised, however, that it has since improved its internal tracking system for requests for assistance. |
In addition to the CSIS and CSE reviews above, NSIRA completed the following reviews of departments and agencies in 2023:
This review examined the legal and policy frameworks governing CBSA’s Confidential Human Source (CHS) program. The review had three areas of focus: the management and assessment of risk; CBSA’s discharge of its duty of care to its sources; and the sufficiency of ministerial direction and accountability in relation to the program. Together, these areas support CBSA’s ability to conduct its human source-handling activities lawfully, ethically, and with appropriate accountability.
The review reflects that, as an investigative tool used in support of CBSA’s mandate, the CHS Program rests on an adequate legal framework. However, the review found a number of gaps in the framework governing the program and was especially attentive to how CBSA manages the particular risks associated with the use of human sources without status in Canada. The review contains a number of findings that relate to CBSA’s risk management practices.
In two instances, NSRIA’s review concluded that CBSA’s activities may not be in compliance with the law. In the first, the review concluded through a detailed case study that CBSA may have twice breached the law of informer privilege by improperly disclosing information that might identify the human source. In this and another instance, NSIRA found that CBSA failed to inform the Minister of Public Safety of a human source activity that may have impacted the safety of an individual, as required by the Ministerial Direction on Surveillance and Confidential Human Sources. This constitutes non-compliance with subsection 12(2) of the CBSA Act.
NSIRA made six recommendations in this review. Collectively, they are meant to enhance the governance of the human source program to ensure CBSA is attentive to the welfare of its human sources across the full spectrum of activities. They also reflect NSIRA’s ongoing attention to the principle of ministerial accountability. Overall, NSIRA’s findings and recommendations reflect the level of maturity of CBSA’s program; although it has been operating for almost 40 years, the introduction of the policy suite specific to human sources is a relatively recent innovation. The review also reflects CBSA’s recent efforts to improve its program.
This review examined whether DND/CAF conducts its human source-handling activities lawfully, ethically, and with appropriate accountability.
NSIRA found that DND/CAF’s policy framework allows human source-handling activities that may not be in compliance with the law. These risks arise particularly in relation to sources associated with terrorist groups. NSIRA recommended that Parliament enact a justification framework that would authorize DND/CAF and its sources to commit otherwise unlawful acts outside Canada, where reasonable for the collection of defence intelligence.
NSIRA found that DND/CAF’s risk assessment frameworks do not provide commanders with the accurate, consistent, and objective information they need to evaluate the risks of engaging with particular sources. NSIRA recommended that these frameworks be revised to ensure that all applicable risk factors are considered.
NSIRA found gaps in DND/CAF’s discharge of its duty of care to sources. Safeguarding processes were not always appropriately engaged; the complaints process was underdeveloped; and the risk posed to agents was, at times, insufficiently assessed. Measures to address these issues should be clearly operationalized in governance documents.
NSIRA found that the Minister of National Defence is not sufficiently informed on human source-handling operations to fulfill their ministerial accountabilities. The Minister should be aware of the legal, policy, and governance issues that may affect human source-handling operations.
NSIRA also found that further ministerial direction is required to support the governance of DND/CAF’s human source handling program. NSIRA recommended that the Minister issue ministerial direction to DND/CAF that will guide the lawful and ethical conduct of source-handling operations.
CSE and CSIS are two core pillars of Canadian intelligence collection, which means that effective collaboration between the departments is critical to national security. However, a tension exists between CSIS’s mandate, which authorizes collection and sharing of information about Canadians, and CSE’s core prohibition against directing its activities at Canadians. This is the first review that was able to access information from both departments and consider that tension.
NSIRA examined a sample of CSE and CSIS collaborative operational activities and information sharing, as well as collaboration between CSIS and CSE further to CSIS’s threat reduction measure (TRM) mandate. This satisfied NSIRA’s annual requirement under section 8(2) of the NSIRA Act to review an aspect of CSIS’s TRMs.
With respect to operational collaboration, including under CSIS’s TRM mandate, NSIRA found a lack of information sharing and proactive planning, as well as a failure on CSE’s part to properly account for and mitigate the risk of targeting Canadians when working with CSIS. NSIRA recommended some procedural changes to improve information flow, consultation, transparency, and accountability.
Concerning information sharing, NSIRA found that existing processes between the departments lacked guidance and accountability, and created risks of CSE targeting Canadians that were actualized in some instances. NSIRA recommended both departments establish policies, procedures, and analyst training. Additionally, NSIRA recommended that CSIS cease making requests to CSE pertaining to Canadians and consider the Canadian information it shares with CSE. NSIRA also recommended that CSE reconsider how it collects, retains, and reports Canadian information in certain scenarios and only use foreign lead information from CSIS reporting.
In this review, NSIRA found two cases of non-compliance with the law. Both involved CSE directing its activities at Canadians under its foreign intelligence mandate.
This review provided an overview of the use of the Security of Canada Information Disclosure Act (SCIDA) in 2022. In doing so, it documented the volume and nature of information disclosures made under the SCIDA, assesses compliance with the Act, and highlights patterns in its use across Government of Canada institutions and over time.
In 2022, four disclosing institutions made a total of 173 disclosures to five recipient institutions. NSIRA found that institutions complied with the SCIDA’s requirements for disclosure and record keeping in relation to the majority of these disclosures. Observed instances of non-compliance that were related to subsection 9(3), regarding the timeliness of records copied to NSIRA; subsection 5.1(1), regarding the timeliness of destruction or return of personal information; and subsection 5(2), regarding the provision of a statement on accuracy and reliability. These instances did not point to any systemic failures in Government of Canada institutions’ implementation of the Act.
NSIRA also made findings in relation to practices that, although compliant with the SCIDA, left room for improvement. NSIRA’s corresponding recommendations were designed to increase standardization across the Government of Canada in a manner that is consistent with the institutions’ demonstrated best practices and the Act’s guiding principles.
Overall, NSIRA observed improvements in reviewee performance compared to findings from prior years’ reports and over the course of the review. These improvements include corrective actions taken by reviewees in response to NSIRA’s requests for information in support of this review.
This review assessed departments’ compliance with the Avoiding Complicity in Mistreatment by Foreign Entities Act (ACA) and their implementation of the ACA’s associated directions during the 2022 calendar year. Within this context, the review pursued a thematic focus on departments’ conduct of risk assessments, including the ways in which their methodologies may lead to a systematic under-assessment of the level of risk involved in an information-sharing transaction.
NSIRA’s findings and recommendations in this report reflect both developments and stagnations in departments’ implementation of the directions over time. NSIRA observed efforts to collaborate interdepartmentally and standardize certain practices across the Government of Canada. While these efforts reflect an improvement over past approaches, they fall short of the consistent framework for foreign information sharing government-wide envisioned by the Act. Additionally, NSIRA observed a number of practices that may lead departments to systematically under-assess the risks involved in contemplated information exchanges. Such under-assessments may in turn lead to information being exchanged, in contravention of the directions’ prohibitions.
NSIRA made five recommendations in this review. Collectively, they would ensure that all departments’ ACA frameworks reflect a degree of standardization commensurate with the spirit of the Act and its associated directions; and that these frameworks are designed to support compliance with the directions.
NSIRA is mandated to investigate national security-related public complaints. NSIRA complaint investigations are conducted with consistency, fairness, and timeliness. The agency’s public complaint mandate plays a critical role in ensuring that Canada’s national security and intelligence organizations are accountable to the Canadian public.
In 2022, NSIRA had committed to establishing service standards for the investigation of complaints, with the goal of completing 90 percent of investigations within its new service standards. These service standards were implemented and have been in effect since April 1, 2023, and set internal time limits for certain investigative steps for each type of complaint, under normal circumstances. NSIRA is pleased to report that for the period of April 1 to December 31, 2023, 100 percent of the service standards have been met across all investigation files subject to these service standards.
While remaining mindful of the interests of the complainant and the security imperatives of the organization, NSIRA established an independent verification process with CSE for new complaints filed under section 17 of the NSIRA Act. More specifically, after receiving a complaint, NSIRA must evaluate whether it is within NSIRA’s jurisdiction to investigate, based on conditions stated in the NSIRA Act. For complaints against CSE, just as with complaints against CSIS and the RCMP, NSIRA must be satisfied that the complaint against the respondent organization refers to an activity carried out by the organization and is not trivial, frivolous, or vexatious. This new independent verification process assists NSIRA in ascertaining its jurisdiction to investigate complaints filed against CSE.
NSIRA has developed a new internal tracking tool to ensure effective case management of complaint files.
NSIRA previously reported that it would improve its website to promote accessibility to the investigation of complaints. During the overhaul of its public-facing website in the fall of 2023, NSIRA amended its complaint forms to ensure that they meet WCAG 2.0 accessibility criteria and conformity requirements.
In 2023, NSIRA completed the last phase of a study jointly commissioned with the Civilian Review and Complaints Commission (CRCC) regarding the collection of race-based data and other demographic information. The study assessed the viability of the collection of identity-based and demographic data as part of the Government of Canada’s ongoing anti-racism initiatives.
In the course of this study, interviews were conducted with community members familiar with NSIRA, the CRCC, and the agencies they review. The study ultimately found that the collection of raced-based data was feasible.
The study also included recommendations in relation to the collection of race-based data as follows:
NSIRA welcomes the insights provided by the joint study and will closely review the recommendations to determine how they might be implemented by NSIRA. The collection of race-based and other demographic data in the national security and intelligence space is an entirely novel area. The study’s literature review highlighted that this type of race-based and other demographic data collection has never been done before in the national security and intelligence space in Canada, or by any of Canada’s international partners. NSIRA and the CRCC will continue to collaborate on this important initiative by determining potential implementation strategies.
In 2023, NSIRA began revising its Rules of Procedure to refine the procedures governing its complaints investigations. This revision will continue in 2024 with the support of the Secretariat in ensuring that the agency’s obligations provided for in its Accessibility Plan are met.
Part of the revisions to NSIRA’s procedures in 2024 will be to review the privacy statement included in its complaint forms to ensure greater transparency about how the information submitted to NSIRA by complainants will be used in NSIRA’s investigations.
The complainant alleged that CSIS agents interacted with them on multiple occasions and claimed that those interactions amounted to illegal arrests and detentions; that the agents illegally intimidated them by claiming that they would deport them to Guantanamo Bay; and that the Service erroneously applied the Privacy Act in refusing to provide documents the complainant claims they were coerced into signing under duress during one of the above-noted interactions.
Upon reviewing all of the evidence presented by the parties and available information, NSIRA observed that the complainant never had any interactions with CSIS. NSIRA found that none of their allegations could be substantiated.
The complainant alleged that, following an overseas trip, they experienced difficulties travelling internationally, which they believed were attributable to CSIS and CSIS’ sharing of information with the governments of foreign countries. The complainant claimed that CSIS had placed them on a “blacklist” as a member of the Islamic State of Iraq and Syria. They further alleged that CSIS harassed them and discriminated against them on the basis of race, ethnic origin, and religion.
At the time of the complainant’s trip, certain countries were regularly being used by extremist travellers from North America and Europe as intermediate destinations to access Islamic State of Iraq and the Levant-controlled territory.
The complainant’s family was interviewed by CSIS to gain information about the complainant, their beliefs, and possible intentions. The complainant considered this interaction to have been an inappropriate and wrongful interrogation of members of their family.
Upon review of all of the evidence, NSIRA found the activities of CSIS in this matter to have been lawful and reasonable. While investigative steps were conducted by CSIS, there was no evidence suggesting that CSIS placed the complainant on a blacklist or that information pertaining to the complainant was shared improperly. Similarly, the allegation that CSIS was responsible for the complainant’s travel difficulties was found to be unsubstantiated. The source of the complainant’s travel difficulties may lie outside of Canadian authorities, and thus beyond the scope of NSIRA’s jurisdiction.
NSIRA concluded that CSIS conducted an interview with the complainant’s parent at their home and with other family members present, during which their parent participated voluntarily and expressed their willingness to be of further assistance if required. The basis for conducting this interview was found to be reasonable and NSIRA did not find any evidence of inappropriateness, intimidation, wrongdoing, or harassment.
NSIRA did not find an evidentiary basis to support the allegations of harassment and of discrimination on the basis of racial, ethnic origins, or religion by CSIS against the complainant.
The complainant’s allegations were found to be unsupported.
The complainant alleged that a CSIS agent invaded their house and stated that they were an intelligence officer in operation. According to the complainant, the CSIS agent physically assaulted them, video recorded the complainant while the complainant was undressed, and threatened to kill them. The complainant further alleged that the Service is trying to silence them.
Upon a review of all of the evidence, it became clear that the complainant’s own conduct brought them to the attention of CSIS. They first communicated with CSIS and raised complaints regarding an individual. These allegations were received and considered by CSIS, which acted on the complaints to determine whether the individual named by the complainant was affiliated with CSIS. Based on a review of the documents submitted by CSIS, NSIRA determined that the individual alleged by the complainant to be a CSIS Agent was not a CSIS employee or otherwise involved with CSIS.
NSIRA further found that as part of the Service’s activities conducted in relation to the complainant, CSIS collected limited information on the complainant. NSIRA concluded that the collection of the complainant’s personal information was justified by CSIS’ mandate.
NSIRA concluded that the CSIS’ activities in relation to the complainant after they came to their attention were lawful and reasonable in the circumstances.
The complainant had applied for Canadian citizenship and was subsequently required to attend an interview with CSIS. The complainant attended this interview with their lawyer. The complainant alleged that the CSIS officers who conducted the interview:
Upon considering all of the evidence, NSIRA found that the CSIS officers erred in denying the complainant and their counsel the opportunity to take notes that they could take from the premises. CSIS acknowledged that this practice was no longer in place. NSIRA recommended that CSIS adjust its governing policy to make clear that the interviewee and their representative may take and retain notes from interviews.
NSIRA commented that since 2000, numerous SIRC reports and decisions have recommended that CSIS record immigration security screening interviews. However, CSIS did not consistently record such interviews at the time of the complainant’s interview. CSIS indicated that efforts to require recording of all immigration interviews in its written procedures was in progress. NSIRA recommended that CSIS proactively record interviews in immigration and citizenship matters, and that CSIS retain this recording at least until a decision is made by Immigration, Refugees and Citizenship Canada (IRCC) on CSIS’ advice. In the event that CSIS provides a negative conclusion, the recording should be kept until the immigration status is determined and for the period of any appeal of that determination.
Given that the complainant was unable to retain notes from the interview and that no recording of the interview existed, NSIRA was unable to make findings on most of the improper statements that the CSIS interviewer was alleged to have made. However, one statement in particular, which was an English idiom that the CSIS officer acknowledged using, was found to be unnecessary and counterproductive, as it risked compounding tension in the interview and may not have had a reasonable, literal translation in the language spoken by the complainant.
CSIS indicated and NSIRA agreed that counsel to an interviewee has a role in, but not control of, the interview process. An interview subject’s lawyer is not limited to passive silence, but also must not act in a manner that impairs the Service’s ability to perform its mandate. To this end, it is not open to counsel to lead witnesses or have an intrusive role in questioning. NSIRA noted, however, that it is proper for counsel to raise concerns about interpretation or to suggest clarifying questions. These concerns are to be posed during a pause or in some other pre-organized manner that does not disrupt the questioning. NSIRA recommended, therefore, that CSIS articulate within its own operating procedure the role of counsel (or other third parties) in the manner elaborated above, and that it communicates these expectations in advance to those attending an interview.
Finally, to remedy these errors, NSIRA recommended that CSIS convene a second interview attended by different officers and a different interpreter. Given the irregularities in the first interview and the resulting concern that it may contain inaccuracies, NSIRA further recommended that in completing its assessment and in providing advice to the IRCC, CSIS avoid giving weight to the results of the first interview.
The complainant filed a complaint against the RCMP alleging that it failed to return property that was seized from their office, resulting from an RCMP investigation into a terrorist plot. The complainant further alleged that the RCMP damaged his property.
Upon considering the facts and timeline of the RCMP’s investigation that resulted in the seizure of the complainant’s property, NSIRA found that the property was properly detained, pursuant to the provisions of the Criminal Code and in accordance with RCMP policy.
NSIRA further found that there was no evidence that would permit to conclude that the complainant’s property was damaged by the RCMP during and after the seizure.
The complainant’s allegations were found to be unsupported.
The complainant came to Canada as a refugee fleeing violent persecution. As a result of litigation against their former employer, who was linked to the government of a foreign state, the complainant alleged that they had been the victim of death threats from their former employer and government officials of the country from which they had fled. The complainant believed these threats to be credible, as they were often accompanied by contemporaneous details, such as the complainant’s clothing during a particular outing and the location they attended. The complainant believed that representatives of the aforementioned government employed at the country’s embassy in Canada were assisting in the surveillance of the complainant and their family, including their children while at school.
The complainant alleged that the RCMP failed to conduct a complete investigation into incidents involving threats, including death threats, made against the complainant and their family, and that these decisions by the RCMP were improperly influenced by foreign individuals.
The evidence provided by the RCMP demonstrated that it took the necessary steps to review the information submitted by the complainant, but determined that there were insufficient grounds for the RCMP to continue their investigation of the foreign influence aspects of the threats. However, the local police force was the police of jurisdiction for investigating the criminal harassment, threats, and safety concerns related to the complainant. The RCMP advised this police force that information collected by the RCMP would be turned over to them, and asked to be notified should the local police force identify someone in Canada working on behalf of a foreign government to threaten or intimidate the complainant. NSIRA found the RCMP’s initial investigation to be reasonably thorough and their ultimate decision to be a justifiable exercise of police discretion.
Furthermore, there was no evidence before NSIRA to support the complainant’s allegation that the RCMP’s decision to discontinue their investigation was improperly influenced by foreign individuals.
The complainant’s allegations were found to be unsupported.
The RCMP arrested the complainant at his home on terrorism-related charges. In the course of the operation, the complainant’s family members were handcuffed. It was the complainant’s position that this was improper and that the RCMP officers did not utilize their cultural sensitivity training.
NSIRA found that:
NSIRA determined that, although the RCMP assumed a general supervisory role over the execution of the operation, they depended on the professionalism of the other police forces in planning and executing a dynamic search. Given that the conduct of the other police officers who participated in the search could not be attributed to the RCMP, no findings or recommendations were made for the RCMP in keeping with NSIRA’s jurisdiction.
The complainants filed complaints against CSIS, alleging that the Service caused a significant delay in submitting the security assessment for their immigration or citizenship applications. During the investigations, NSIRA inquired about whether CSIS could provide updates with respect to their involvement in the respective processes. The Service provided letters to NSIRA that could be shared with the complainants advising them that CSIS had completed its assessment in the security screening process. As the complainants’ main allegations were in relation to the delay in the security screening, the matters were informally resolved in accordance with Rule 10.10 of NSIRA’s Rules of Procedure and the files were closed.
The complainant filed a section 17 complaint regarding their employment application with CSE. More specifically, upon completing a student term contract with CSE and receiving a verbal offer for a further contract, CSE decided not to renew the complainant’s employment. The complainant alleged that this decision from CSE was based on their ethnicity. Despite the Chief of CSE having received a letter of complaint from the complainant, CSE notified NSIRA that its notification letter constituted their first notice of the complaint and requested that the matter be placed in abeyance (on hold). After completing an internal investigation of the complainant’s allegations (independent of NSIRA’s complaints process), CSE and the complainant began discussions toward a settlement. The parties ultimately reached a settlement and notified NSIRA accordingly. The complaint was informally resolved pursuant to Rule 10 of NSIRA’s Rules of Procedure prior to NSIRA rendering a decision on its jurisdiction to investigate this matter.
This complaint was referred to NSIRA by the Civilian Review and Complaints Commission (CRCC) for the RCMP, pursuant to subsection 45.53(4.1) of the RCMP Act. The complaint alleged that the RCMP failed to investigate individuals allegedly participating in a militia group. NSIRA tried to establish contact with the complainant several times to proceed with its investigation. NSIRA found that reasonable attempts had been made to communicate with the complainant and that the agency had exhausted all options. Accordingly, NSIRA issued reasons that the complaint had been abandoned, as per NSIRA’s Rules of Procedure. The complaint investigation file was closed.
Investigations progressed at significant levels in 2023 (see Annex C). NSIRA concluded several investigations and issued seven final reports. Additionally, four files were informally resolved in accordance with Rule 10 of NSIRA’s Rules of Procedure.
In 2023, NSIRA observed an increase of complaints against CSIS, pursuant to section 16 of the NSIRA Act, alleging process delays in immigration or citizenship security screening. Of note, under sections 14 and 15 of the CSIS Act, CSIS provides security advice to IRCC and CBSA to guide determinations with respect to whether citizenship or immigration applicants are threats to the security of Canada. While CSIS is committed to performing its security screening mandate in a timely manner, there is no standard for time allotted. In the 2023 calendar year, out of the six complaints over which NSIRA assumed jurisdiction under section 16 of the NSIRA Act, five pertained to allegations of delays that complainants attributed to CSIS’s security screening activities.
The comprehensive reviews and investigations NSIRA conducted in 2023 underscore the agency’s dedication to transparency and accountability. This work has provided constructive recommendations to enhance the operational practices and policy frameworks of Canada’s important national security and intelligence actors.
NSIRA recognizes the persistent and evolving nature of security threats, which necessitates adaptive and proactive approaches by Canada’s security and intelligence agencies. NSIRA is likewise committed to continually refining its methodologies, embracing technological advancements, and strengthening its analytical capabilities to keep pace in a rapidly changing world. NSIRA will continue to engage with domestic and international security and intelligence review partners to improve its practices and foster better public understanding of its work and the value it provides.
NSIRA is driven by its role as the trusted eyes and ears of Canadians within the otherwise closed domain of national security and intelligence, providing the critical function of enhancing transparency and accountability. NSIRA’s vision, mission, and values reflect this commitment and will guide NSIRA’s work at it looks to the future.
Abbreviation | Full Name |
---|---|
ACA | Avoiding Complicity in Mistreatment by Foreign Entities Act |
ACO | active cyber operations |
CAF | Canadian Armed Forces |
CBSA | Canada Border Services Agency |
CHRC | Canadian Human Rights Commission |
CHS | Confidential Human Source (program) |
CII | Canadian-identifying information |
CRA | Canada Revenue Agency |
CRCC | Civilian Review and Complaints Commission for the RCMP |
CSE | Communications Security Establishment |
CSIA | Cybersecurity and information assurance |
CSIS | Canadian Security Intelligence Service |
CTIVD Netherlands | Dutch Review Committee on the Intelligence and Security |
Cyber Centre | Canadian Centre for Cyber Security |
DCO | defensive cyber operations |
DFO | Department of Fisheries and Oceans |
DND | Department of National Defence |
EOS Norway | Norwegian Parliamentary Oversight Committee on Intelligence and Security Services |
FINTRAC | Financial Transactions and Reports Analysis Centre of Canada |
FIORC | Five Eyes Intelligence Oversight and Review Committee |
GAC | Global Affairs Canada |
GC | Government of Canada |
HUMINT | Human Intelligence |
IC IG US | United States of America’s Inspector General of the Intelligence Community |
IGIS Australia | Australia’s Inspector-General of Intelligence and Security |
IGIS New Zealand | New Zealand’s Inspector-General of Intelligence and Security |
IPCO UK | United Kingdom’s Investigatory Powers Commissioner’s Office |
IRCC | Immigration, Refugees and Citizenship Canada |
IRTC | information relating to a Canadian or a person in Canada |
IT | information technology |
MD | Ministerial Direction |
NBS | network-based solutions |
NDA | National Defence Act |
NSICOP | National Security and Intelligence Committee of Parliamentarians |
NSIRA | National Security and Intelligence Review Agency |
OA-IA | Independent Oversight Authority for Intelligence Activities of Switzerland |
PCLOB US | United States Privacy and Civil Liberties Oversight Board |
PCO | Privy Council Office |
PKGr | German Parliamentary Oversight Panel |
PS | Public Safety Canada |
RAD | Review and Analysis Division |
RCMP | Royal Canadian Mounted Police |
REP | reasonable expectation of privacy |
SCIDA | Security of Canada Information Disclosure Act |
SIRC | Security and Intelligence Review Committee |
SSC | Shared Services Canada |
TBS | Treasury Board of Canada Secretariat |
TC | Transport Canada |
TET Denmark | Danish Intelligence Oversight Board |
the Standard | Standard on Security Screening |
TRM | threat reduction measure |
UNCTED | United Nations’ Counter-Terrorism Executive Directorate |
Abréviation | Nom Complet |
---|---|
AMC | Affaires mondiales Canada |
ARC | Agence du revenu du Canada |
ARVP | Attente raisonnable en matière de droit à la vie privée |
ASFC | Agence des services frontaliers du Canada |
AS-Rens | Autorité de surveillance indépendante des activités de renseignement |
BCP | Bureau du Conseil Privé |
CANAFE | Centre d’analyse des opérations et déclarations financières du Canada |
CCC | Centre canadien pour la cybersécurité |
CCDP | Commission canadienne des droits de la personne |
CCETP | Commission civile d’examen et de traitement des plaintes relatives à la Gendarmerie royale du Canada |
COA | Cyberopérations actives |
COD | Cyberopérations défensives |
CPSNR | Comité des parlementaires sur la sécurité nationale et le renseignement |
CSAI | Cybersécurité et assurance de l’information |
CSARS | Comité de surveillance des activités de renseignement de sécurité |
CSERGC | Conseil de surveillance et d’examen du renseignement du Groupe des cinq |
CST | Centre de la sécurité des télécommunications |
CTIVD Pays-Bas | Commission néerlandaise de contrôle des services de renseignement et de sécurité |
DECT | Direction exécutive du Comité contre le terrorisme des Nations Unies |
DRA | Division de la recherche et de l’analyse |
EOS Norvège | Commission parlementaire norvégienne de contrôle des services de renseignement et de sécurité |
FAC | Forces armées canadiennes |
GRC | Gendarmerie royale du Canada |
HUMINT | Renseignement humain |
IC IG É.-U. | Inspecteur général de la communauté du renseignement des États-Unis d’Amérique |
IGIS Australie | Inspecteur général du renseignement et de la sécurité de l’Australie |
IGIS Nouvelle-Zélande | Inspecteur général du renseignement et de la sécurité de la Nouvelle-Zélande |
INC | Information nominative sur un Canadien |
IPCO R.-U. | Bureau du commissaire aux pouvoirs d’enquête du Royaume-Uni |
IRCC | Immigration, Réfugiés et Citoyenneté Canada |
IRCPC | Information qui se rapporte à des Canadiens ou à des personnes au Canada |
la Norme | Norme sur le filtrage de sécurité |
LCISC | Loi sur la communication d’information ayant trait à la sécurité du Canada |
LCMTIEE | Loi visant à éviter la complicité dans les cas de mauvais traitements infligés par des entités étrangères |
MND | Ministère de la Défense nationale |
MPO | Ministère des Pêches et des Océans |
MRM | Mesure de réduction de la menace |
OSSNR | Office de surveillance des activités en matière de sécurité nationale et de renseignement |
PCLOB É.-U. | Conseil de surveillance de la vie privée et des libertés civiles des États-Unis |
PKGr | Comité de surveillance parlementaire de l’Allemagne |
SCRS | Service canadien du renseignement de sécurité |
SCT | Secrétariat du Conseil du Trésor du Canada |
SHC | (Programme) des sources humaines confidentielles |
SP | Sécurité publique Canada |
SPC | Services partagés Canada |
SR | Solutions réseau |
TC | Transports Canada |
TET Danemark | Conseil danois de surveillance des services de renseignement |
TI | Technologie de l’information |
This Annex lists the full findings and recommendations of NSIRA’s reviews that were completed in 2023. In certain instances, original language has been redacted and replaced with summary language designated by [*summary*]. Once redacted, full reviews and available government responses to recommendations are published on NSIRA’s website.
NSIRA found that CSIS’s current application of the dataset regime is inconsistent with the statutory framework.
NSIRA found that CSIS’s current approach to dataset information collection under section 12 risks the creation of a parallel collection mechanism, one that weakens section 12’s statutory thresholds and at the same time lacks the external oversight regime intended to protect personal information under the dataset regime.
NSIRA found that CSIS failed to fully apprise the Court on their interpretation and application of the dataset regime. CSIS should have sought clarification from the Court as to its views on the precise conduct permissible prior to invocating the dataset regime.
NSIRA found that when conducting queries in exigent circumstances, CSIS retained information that did not meet the section 12 strictly necessary threshold.
NSIRA found that the lack of explicit time limits in section 11.17 of the dataset provisions governing foreign datasets has resulted in datasets being retained for multiple years pending a decision by the Minister or Minister’s designate (the CSIS Director).
NSIRA found that CSIS runs the risk of collecting information that is publicly available but for which there may be a reasonable expectation of privacy.
NSIRA found that CSIS’s policies governing the collection and retention of Canadian and foreign datasets do not align with its current interpretation of the dataset regime.
NSIRA found that CSIS does not have a policy governing the handling of transitory information. In addition, the existing Interim Direction [***] does not provide employees with sufficient instruction, which may result in CSIS retaining information that would otherwise be subject to the dataset regime.
NSIRA found that CSIS information management practices are responsible for multiple compliance incidents and currently create duplicates of datasets within CSIS’s systems.
NSIRA found that, as of August 2023, CSIS did not comply with the dataset provisions in the CSIS Act because it retained Canadian information extracted from foreign datasets, and foreign information amounting to a dataset.
NSIRA found that CSIS did not comply with the dataset provisions in the CSIS Act because it retained Canadian information and referenced it as recently as 2022. This information should have been destroyed upon coming into force of the NSA 2017, in July 2019.
NSIRA found that CSIS has not exhaustively scanned all of its systems to identify information that is subject to the dataset regime so that it may be processed in a compliant manner.
NSIRA found that the training required to become a designated employee to evaluate, query, and exploit section 11.01 datasets offers clear information on the collection and retention requirements.
NSIRA found that CSIS operational personnel, including those predominantly dealing with bulk information collection, have not received adequate training allowing them to identify when collected information may fall within the dataset regime.
NSIRA found that CSIS has not prioritized resourcing the technical unit responsible for the evaluation, querying, and exploitation of Canadian and foreign datasets.
NSIRA found that CSIS has not devoted sufficient resources to improving the current technical systems or developing new ones that are equipped to support bulk data use.
NSIRA found that CSIS collected information in relation to activities that could not on reasonable grounds be suspected to have constituted a threat to the security of Canada and the collection, analysis, and retention of which was not strictly necessary.
Details |
---|
Recommendation 1: NSIRA recommends that in the next judicial authorization application for a Canadian dataset CSIS put its current position on the application of the dataset regime before the Court, including any use of the information prior to the decision to retain under the dataset regime. |
Recommendation 2: NSIRA recommends that CSIS immediately destroy any record containing names retained pursuant to the exigent circumstances queries, as they do not meet the strictly necessary threshold. |
Recommendation 3: NSIRA recommends that Parliament legislates a time limitation for the authorization of a foreign dataset by the Minister or Minister’s designate. |
Recommendation 4: NSIRA recommends that CSIS meaningfully analyze and document any possible reasonable expectation of privacy when evaluating publicly available datasets. |
Recommendation 5: NSIRA recommends that CSIS develop:
|
Recommendation 6: NSIRA recommends that CSIS cease to create duplicates of the information reported in the operational system. |
Recommendation 7: NSIRA recommends that CSIS immediately destroy Canadian and foreign dataset information that is not strictly necessary to retain. This information no longer falls within the legal 90 day evaluation period and retaining it pursuant to the dataset regime is no longer a possibility. |
Recommendation 8: NSIRA recommends that CSIS conduct an exhaustive scan of its operational and corporate repositories to identify and destroy any non-compliant information. |
Recommendation 9: NSIRA recommends that CSIS develop and deliver scenario-based workshops to train operational personnel on CSIS’s current application of the dataset regime so that they can engage subject matter experts as necessary. |
Recommendation 10: NSIRA recommends that CSIS prioritize resourcing the technical unit responsible for the evaluation, querying, and exploitation of Canadian and foreign datasets. |
Recommendation 11: NSIRA recommends that CSIS prioritize the improvement of current technical systems or development of new systems, equipped to support compliant bulk data use. |
Recommendation 12: NSIRA recommends that CSIS immediately destroy the case study dataset it collected pursuant to section 12, as it does not meet the statutory thresholds. This information no longer falls within the legal 90 day evaluation period and retaining it pursuant to the dataset regime is no longer a possibility. |
Recommendation 13: NSIRA recommends that CSIS share the full unredacted copy of this report with the Federal Court. |
NSIRA found that CSE’s governance of the use of the polygraph for security screening inadequately addresses privacy issues.
NSIRA found that CSE did not conduct a Privacy Impact Assessment related to its use of the polygraph for security screening.
NSIRA found that CSE may not have considered whether all information collected during the polygraph is directly related or necessary to the assessment of loyalty to Canada or criminality, as required by the Privacy Act and the Directive on Privacy Practices.
NSIRA found that polygraph examiners applied an ad hoc approach as they assessed medical information collected during the polygraph.
NSIRA found that CSE may not have complied with section 7 of the Privacy Act by using information collected during polygraph exams for suitability and hiring decisions without the consent of the subject.
NSIRA found that CSE provides subjects with information that overstates the reliability and validity of the polygraph prior to obtaining consent.
NSIRA found that, in some instances, the way in which CSE conducted polygraph exams risked prompting subjects to fabricate information in an effort to clear themselves when faced with an unfavourable polygraph assessment.
NSIRA found instances where CSE’s quality control practices for polygraph exams were not always consistent with CSE policy.
NSIRA found that approximately 20% of security files from the sample reviewed were missing audiovisual recordings of polygraph exams.
NSIRA found that in all cases, when initial polygraph exam results indicated deception or were inconclusive, CSE’s practice was to conduct multiple polygraph exams rather than a resolution of doubt process as provided for under the Standard.
NSIRA found that the polygraph had an inordinate importance in security screening decision-making at CSE and other less-intrusive security screening activities were under-used or not used at all.
NSIRA found that the polygraph was de facto determinative in security screening decisions at CSE.
NSIRA found that CSE’s security screening decision-making may not comply with record-keeping requirements of the Standard on Security Screening.
NSIRA found that CSE’s use of the polygraph in security screening decisions makes more uncertain the opportunity to challenge denials of security clearances pursuant to the NSIRA Act and the Standard.
NSIRA found that TBS did not adequately consider privacy or Charter implications when it included the polygraph as a security screening activity under the Standard on Security Screening.
NSIRA found that the Standard on Security Screening insufficiently addresses Charter and privacy implications related to the use of the polygraph.
NSIRA found that the Government of Canada’s current use of the polygraph for security screening in the manner described in this review may raise serious concerns in relation to the Canadian Charter of Rights and Freedoms.
Details |
---|
Recommendation 1: NSIRA recommends that the Treasury Board of Canada urgently remedy the issues identified by this review related to the legality, reasonableness and necessity of the use of the polygraph for security screening in Canada, or remove it from the Standard on Security Screening. |
Recommendation 2: NSIRA recommends that CSE urgently remedy the issues identified by this review, including Charter and Privacy Act compliance, or cease conducting polygraph exams for security screening. |
NSIRA found that CSE operates a comprehensive and integrated ecosystem of cybersecurity systems, tools, and capabilities to protect against cyber threats, with a design that incorporates measures meant to protect the privacy of Canadians and persons in Canada.
NSIRA found that CSE treated all network-based solutions (NBS) information as information related to a Canadian or a person in Canada (IRTC), and applied measures intended to protect privacy to all NBS-acquired information.
NSIRA found that information acquired through NBS will, by its nature, always include information related to a Canadian or person in Canada (IRTC) and is certain to include some information for which there is a reasonable expectation of privacy (REP) of a Canadian or person in Canada. This was not transparently communicated in corresponding applications to the Minister.
NSIRA found that, due to a lack of clarity in its relationship with SSC, CSE did not obtain consent from system owners for its cybersecurity and information assurance activities in the way described to the Minister.
NSIRA found that SSC was not fully aware of its responsibilities as a system owner, as described in CSE’s applications to the Minister.
NSIRA found that, despite the existence of a Memorandum of Understanding between CSE and SSC, there was a lack of clarity between the organizations on the implementation of agreed-upon commitments about NBS activities on networks operated by SSC.
NSIRA found that CSE did not explain to the Minister why consent to CSE’s cybersecurity activities could not reasonably be obtained from users of Government of Canada systems.
NSIRA found that CSE’s narrow application of subsection 22(4) of the CSE Act introduces legal and accountability risks and resulted in CSE acquiring information that may interfere with a reasonable expectation of privacy of a Canadian or person in Canada. This information was from a source acquired outside of the scheme of Ministerial authorizations.
NSIRA found that an incongruence between subsections 27(1) and 22(4) of the CSE Act prevents CSE from acquiring certain information from [*specific type of*] sources such as [*specific information source*], where this information interferes with the reasonable expectation of privacy of a Canadian or person in Canada. Some of this information would enhance CSE’s ability to fulfill its cybersecurity and information assurance mandate.
Details |
---|
Recommendation 1: NSIRA recommends that CSE clearly explain, in its applications to the Minister, that:
|
Recommendation 2: NSIRA recommends that CSE renew its Memorandum of Understanding with SSC to ensure CSE and SSC meet their respective commitments, including any that CSE makes to the Minister regarding SSC’s role in informing system owners about the NBS program. |
Recommendation 3: NSIRA recommends that CSE update Memoranda of Understanding with all of its cybersecurity partners, to ensure these partners have consented to CSE cybersecurity activities, and to ensure these arrangements reflect, and conform to, contemporary governance authorities. CSE should continue these updates, as a standard practice, as authorities evolve. |
Recommendation 4: NSIRA recommends that CSE explain to the Minister how consent to CSE’s cybersecurity activities is obtained from users of Government of Canada systems, or otherwise explain why this consent could not reasonably be obtained. |
Recommendation 5: NSIRA recommends that CSE reconsider whether limits on the acquisition by CSE of information from the global internet infrastructure (as per subsection 22(4) of the CSE Act) apply to information [*specific source of information*] sources.
|
Recommendation 6: NSIRA recommends that, in order to continue these acquisition activities that are necessary for cybersecurity and information assurance (CSIA) purposes, CSE assess its current sources of CSIA information—that are acquired outside of an Authorization—for interference with the reasonable expectation of privacy of a Canadian or person in Canada.
|
Recommendation 7: NSIRA recommends that section 27 of the CSE Act be amended to permit the Minister to authorize CSE to acquire information that is necessary for CSE’s cybersecurity and information assurance aspect (but which may contain information that interferes with the reasonable expectation of privacy of a Canadian or person in Canada, or contravene an Act of Parliament), from sources other than federal information infrastructures and systems of importance to the Government of Canada. |
NSIRA found that CBSA policy does not require any documented approval or a documented assessment of the risks of using a CHS outside of the registration process.
NSIRA found that there was incomplete documentation in the preregistration period such that the CHS Program is impeded from monitoring the full spectrum of CHS Program activities.
NSIRA found that CBSA’s policies and practices around obtaining informed consent are insufficient to ensure that it is obtained systematically, and before individuals incur the risks of providing information in confidence to CBSA.
NSIRA found that measures to mitigate risks to CHSs are often not present or implemented.
NSIRA found that CBSA may have breached the law of informer privilege in two instances.
NSIRA found that Inland Enforcement Officers collected information and promised confidentiality, but did so without training under the applicable policy to support a proper understanding of the consequences of extending confidentiality.
NSIRA found that CBSA’s approach to risk management in their new policy suite does not fully align with principles in the MD.
NSIRA found that the information CBSA will provide to the Minister as required by Ministerial Direction is not sufficient to convey the size and scope of the Confidential Human Source Program.
NSIRA found that in two cases the CBSA did not comply with subsection 12(2) of the CBSA Act in that it failed to follow the MD’s requirement to inform the Minister when there was a Confidential Human Source activity that “may have significant adverse impact such as impacting the safety of an individual”.
Details |
---|
Recommendation 1: NSIRA recommends that CBSA amends its policy to require a documented risk assessment and formal approval for using a CHS in the preregistration period. |
Recommendation 2: NSIRA recommends that CBSA require that the interview checklist be administered no later than when the promise of confidentiality is extended. |
Recommendation 3: NSIRA recommends that CBSA provide guidance as to how obtaining informed consent should be tailored to the individual circumstances of the CHS. |
Recommendation 4: NSIRA recommends that CBSA put in place specific guidance on how to mitigate the full range of risks to CHSs and ensure that those mitigation measures are implemented. |
Recommendation 5: NSIRA recommends CBSA expand its definition of active Confidential Human Source so that reporting to the Minister covers the breadth of the CHS program. |
Recommendation 6: NSIRA recommends that CBSA immediately notify the Minister of the two cases identified in this review where safety of an individual is at issue. |
NSIRA found that DND/CAF’s policy framework allows human source handling activities that may not be in compliance with the law.
NSIRA found that DND/CAF policy is insufficiently specific with respect to recognizing and avoiding mistreatment risks created by human source handling activities.
NSIRA found that DND/CAF’s risk assessment framework for human source handling operations is inadequate. The current assessments of risk do not provide adequate or reliable information to decision-makers because they:
NSIRA found gaps in the discharge of DND/CAF’s duty of care from engagement of the human source to disengagement. These gaps include:
NSIRA found that the Minister of National Defence is not adequately informed in order to fulfill ministerial accountabilities for human source handling operations.
NSIRA found that further ministerial direction is required to support the governance of DND/CAF’s human source handling program.
Details |
---|
Recommendation 1: NSIRA recommends that Parliament enact a justification framework to authorize DND/CAF and its sources to commit acts or omissions outside Canada that would otherwise be unlawful, where reasonable for the collection of defence intelligence. |
Recommendation 2: NSIRA recommends that DND/CAF develop policy governance to properly equip Field HUMINT teams to conduct their human source handling activities in compliance with the law. At minimum, this should include:
|
Recommendation 3: NSIRA recommends that DND/CAF adopt an approach for assessing whether its exchanges with human sources create a substantial risk of mistreatment that is specific to human source handling, comprehensive with respect to its obligations in international human rights law and international humanitarian law, and formalized in policy and procedure. |
Recommendation 4: NSIRA recommends that DND/CAF develop a risk assessment framework specific to human source handling, with appropriate doctrinal guidance for the assessment of human sources that includes consideration of all relevant risk factors.
|
Recommendation 5: NSIRA recommends that DND/CAF adopt, in consultation with other departments as necessary, additional measures aimed at ensuring the welfare and protection of their human sources. These measures should be clearly operationalized in governance documents (directives, orders, procedures, etc.) and should address, at minimum, the issues identified in Finding #3. |
Recommendation 6: NSIRA recommends that DND/CAF, in consultation with the Minister of National Defence, improve the content of biannual reports to the Minister to include, at minimum, the legal, policy and governance issues that may impact human source handling operations. |
Recommendation 7: NSIRA recommends that, with respect to human source handling operations, DND/CAF create official written records of notifications and briefings to the Minister of National Defence, as well as records of decision to improve mutual accountability. |
Recommendation 8: NSIRA recommends that the Minister of National Defence issue ministerial direction on human source handling to DND/CAF that includes, at minimum:
|
NSIRA found that CSE does not routinely share its operational plans and associated risk assessments with CSIS when operating under CSIS authorities. This may leave CSIS unable to fully assess CSE’s activities for compliance.
NSIRA found that close collaboration at the working level created the right conditions for CSIS to monitor CSE’s assistance activities for compliance with warrant conditions.
NSIRA found that CSIS failed to submit an updated request for assistance to CSE in a timely manner when it sought new warrant powers.
NSIRA found that CSE and CSIS did not engage in any joint investigation, assessment, or tracking of a compliance incident.
NSIRA found that CSE and CSIS failed to implement an effective operational framework for their collection activity. This contributed to two instances of non-compliance with the Federal Court’s direction.
NSIRA found that CSE and CSIS identified an effective opportunity to collaborate under their respective mandates and carried out an operation that proved beneficial for both Canada and its allies.
NSIRA found that, while CSIS’s operational framework was sufficient, CSE’s operational framework did not assess legal and policy risk specific to the operation.
NSIRA found that CSE and CSIS did not draft joint terms of engagement, a joint operational plan, or engage in joint risk assessments.
NSIRA found that CSE’s foreignness assessment did not account for the increased risk of targeting Canadians when working with CSIS.
NSIRA found that both CSE and CSIS lack policies, procedures, and accountability mechanisms to govern CSIS lead information messages and associated requests and actions.
NSIRA found that CSIS’s use of lead information messages to share information and make requests about Canadians creates a high risk of potential for non-compliance for CSE.
NSIRA found that CSE’s application of incidental collection provisions may not be appropriate in situations where CSE knows there is a Canadian nexus to a CSIS foreign intelligence lead, and where it knows it is likely to collect Canadian information in pursuing the lead.
NSIRA found that CSE did not comply with section 22(1) of the CSE Act when it [*reviewed the contents*] of a Canadian’s device obtained through a CSIS lead information message.
NSIRA found that CSE did not comply with either section 22(1) of the CSE Act or section 273.64(2)(a) of the National Defence Act (NDA) when it used [*a number of*] complete exceptional reports for foreign intelligence purposes.
NSIRA found that CSE does not consistently utilize its protected entity tool to prevent targeting Canadian identifiers it receives from CSIS.
NSIRA found that while CSIS performs an initial consultation, it does not routinely pursue further engagement with CSE during Threat Reduction Measure activities that could overlap with CSE activities.
NSIRA found that CSE did not notify CSIS in a timely manner of a compliance incident in its Active Cyber Operation, which was connected to a CSIS Threat Reduction Measure.
NSIRA found that CSE failed to cooperate effectively with CSIS, leading to a missed opportunity to advance Canadian intelligence objectives via domestic collaboration.
Details |
---|
Recommendation 1: NSIRA recommends that CSE share its operational plans and associated risk assessments with CSIS prior to operating under CSIS authorities. |
Recommendation 2: NSIRA recommends that when CSIS engages CSE for assistance with the execution of warranted powers, a CSIS employee be involved to ensure compliance in CSE’s collection activities until the request for assistance has terminated. |
Recommendation 3: NSIRA recommends that CSIS develop a process to ensure that necessary requests for assistance are submitted to CSE in a timely manner subsequent to obtaining warrant powers. |
Recommendation 4: NSIRA recommends when working under a request for assistance CSIS and CSE develop a framework for joint investigation of potential compliance incidents. |
Recommendation 5: NSIRA recommends that CSIS ensure roles and responsibilities are clearly agreed to prior to allowing partners to execute warrant powers. Where appropriate, these agreements should be shared with the Federal Court. |
Recommendation 6: NSIRA recommends that CSIS ensure it is directly involved in all substantive communications with any partner actively executing its warrant powers. |
Recommendation 7: NSIRA recommends that CSIS share paragraphs 32 through 41 of this review, along with associated recommendations, with the Federal Court. |
Recommendation 8: NSIRA recommends that when CSE engages in joint operations with CSIS it should perform risk assessments for each operational activity. These should specifically consider the risk of targeting Canadians and implement proactive measures to mitigate this risk. |
Recommendation 9: NSIRA recommends that when participating in joint operations, CSE and CSIS either jointly develop or share written terms of engagement, operational plans, and risk assessments. |
Recommendation 10: NSIRA recommends that CSE perform foreignness assessments that account for the increased risk of targeting Canadians when working with CSIS. |
Recommendation 11: NSIRA recommends CSIS cease making requests for action and/or further information to CSE in relation to Canadians or people in Canada via CSIS lead information messages. |
Recommendation 12: NSIRA recommends that CSIS develop policies, procedures, and analyst training to standardize the disclosure of CSIS lead information messages to CSE. |
Recommendation 13: NSIRA recommends that CSE develop policies, procedures, and analyst training to standardize the use of CSIS lead information messages. |
Recommendation 14: NSIRA recommends that CSE develop a regime for collecting, retaining, and reporting to CSIS Canadian information it uncovers further to legitimate foreign intelligence activities where it has advance knowledge of the Canadian information. |
Recommendation 15: NSIRA recommends that CSE update its policies to prohibit the analysis of information relating to a Canadian or person in Canada for the purposes of identifying foreign intelligence. |
Recommendation 16: NSIRA recommends that if CSIS decides to disclose exceptional reporting to CSE, it should extract the relevant foreign intelligence for disclosure as opposed to sending the entire report. |
Recommendation 17: NSIRA recommends that CSE cease using complete exceptional reports from CSIS under its foreign intelligence mandate. |
Recommendation 18: NSIRA recommends that CSE introduce a requirement to always apply the protected entity tool to all Canadian identifiers. |
Recommendation 19: NSIRA recommends that CSIS pursue routine engagement with CSE during the implementation of its Threat Reduction Measures when the potential for operational overlap exists. |
Recommendation 20: NSIRA recommends that CSE share details of potential compliance incidents with CSIS when an overlap may exist with a CSIS Threat Reduction Measure. |
NSIRA found that CSE, CSIS, GAC, and IRCC regularly use the SCIDA in a manner that warrants information sharing arrangements, as encouraged by subsection 4(c) of the SCIDA.
NSIRA found that CBSA, DND/CAF, and IRCC were non-compliant with subsection 9(3) of the SCIDA, as they failed to provide all records created under subsections 9(1) or 9(2) to NSIRA within the legislated timeframe.
NSIRA found improved compliance outcomes in instances where departments prepared record overview spreadsheets under subsections 9(1) and 9(2) of the SCIDA that displayed the following characteristics:
NSIRA found that all GC institutions complied with their obligation to prepare and keep records that set out the information prescribed under subsections 9(1) and 9(2) of the SCIDA.
NSIRA found that more than half of the descriptions provided by CBSA and IRCC under paragraph 9(1)(e) of the SCIDA did not explicitly address their satisfaction that the disclosure was authorized under paragraph 5(1)(b), the proportionality test.
NSIRA found, within the sample of disclosures reviewed, that disclosing institutions demonstrated they had satisfied themselves of both the contribution and proportionality tests, in compliance with subsection 5(1) of the SCIDA.
NSIRA found that GAC satisfied itself under the SCIDA’s paragraph 5(1)(a) contribution test based on an incorrect understanding of the recipient’s national security mandate in two cases.
NSIRA found, within the sample of disclosures reviewed, that CBSA and GAC (in one and two disclosures, respectively) were non-compliant with the SCIDA’s subsection 5(2) requirement to provide a statement regarding accuracy and reliability.
NSIRA found, in relation to the remaining disclosures within the sample, that GAC, IRCC, and RCMP included their statements regarding accuracy and reliability within the disclosures themselves, whereas CBSA provided its statements in the disclosures’ cover letters.
NSIRA found that DND/CAF destroyed information under the SCIDA subsection 5.1(1), but they were non-compliant with the requirement to do so “as soon as feasible after receiving it.”
NSIRA found delays between when a disclosure was authorized for sending and when it was received by the individual designated by the head of the recipient institution to receive it in at least 20% (n=34) of disclosures.
Details |
---|
Recommendation 1: NSIRA recommends that information sharing arrangements be used to govern regular SCIDA disclosures between GAC and CSIS; IRCC and CSIS; as well as IRCC and CSE. |
Recommendation 2: NSIRA recommends that all GC institutions prepare record overviews to clearly address the requirements of subsections 9(1) and 9(2) of the SCIDA; and provide them to NSIRA along with a copy of the disclosure itself and, where relevant, a copy of the request. |
Recommendation 3: NSIRA recommends that disclosing institutions explicitly address the requirements of both paragraphs 5(1)(a) and 5(1)(b) in the records that they prepare under paragraph 9(1)(e) of the SCIDA. |
Recommendation 4: NSIRA recommends that GC institutions contemplating the use of proactive disclosures under the SCIDA communicate with the recipient institution, ahead of making the disclosure, to inform their assessments under subsection 5(1). |
Recommendation 5: NSIRA recommends that all disclosing institutions include statements regarding accuracy and reliability within the same document as the disclosed information. |
Recommendation 6: NSIRA recommends that GC institutions review their administrative processes for sending and receiving disclosures under the SCIDA, and correct practices that cause delays. |
NSIRA found that all departments, with the exception of DFO in respect of subsection 7(1), complied with the reporting requirements set out in the ACA.
NSIRA found that all departments had frameworks to govern their implementation of the ACA and its associated directions by the end of 2022.
NSIRA found that most departments demonstrated continual refinements of their ACA frameworks based on self-identified gaps, NSIRA recommendations, and community-wide coordination efforts.
NSIRA found that TC’s ACA governance framework did not include policies and procedures for:
NSIRA found that all departments, with the exception of DFO, GAC, PS, and TC, used country and/or entity risk assessments to inform their assessments of substantial risk of mistreatment and corresponding case escalation.
NSIRA found that departments’ country risk assessments were inconsistent with one another.
NSIRA found that the simultaneous conduct of independent human rights risk assessments in different departments reflected a substantial duplication of effort across the GC, and created the opportunity for discrepant outcomes.
NSIRA found, for the fourth consecutive year, that no departments escalated cases to their deputy heads for determination or decision.
NSIRA found that some high-risk sharing activities were stopped prior to escalation for consideration of possible mitigations.
NSIRA found that certain departments’ ACA governance frameworks and risk assessment methodologies included features that may systematically under-assess the level of risk involved in a transaction. These features include:
Details |
---|
Recommendation 1: NSIRA recommends that TC update its ACA governance framework to include policies and procedures for:
|
Recommendation 2: NSIRA recommends that the Government of Canada designate a body responsible for developing:
|
Recommendation 3: NSIRA recommends that departments apply the “substantial risk” threshold in a manner consistent with the definition adopted government-wide; and that departments whose broader policy frameworks do not yet reflect this definition (CBSA, CRA, IRCC, and TC) make the attendant updates. |
Recommendation 4: NSIRA recommends that departmental assessments of substantial risk of mistreatment be grounded in countries’ human rights records; and that subsequent entity-level considerations be based on validated, current, and consistent respect for caveats and assurances, rather than the absence of derogatory information particular to that entity or other bilateral considerations. |
Recommendation 5: NSIRA recommends that all ACA governance frameworks incorporate layered checks and balances in the risk assessment and escalation of cases that may involve substantial risk of mistreatment. |
INTAKE INQUIRIES | 135 | |||||
---|---|---|---|---|---|---|
New complaints filed | 26 | |||||
National Security and Intelligence Review Agency Act (NSIRA Act), section 16, Canadian Security and Intelligence Service (CSIS) complaints | 18 | |||||
NSIRA Act, section 17, Communications Security Establishment (CSE) complaints | 5 | |||||
NSIRA Act, section 18, security clearances | 3 | |||||
NSIRA Act, section 19, Royal Canadian Mounted Police (RCMP) referred complaints | 0 | |||||
NSIRA Act, section 19, Citizenship Act | 0 | |||||
NSIRA Act, section 45, Canadian Human Rights Commission (CHRC) referrals | 0 | |||||
Accepted jurisdiction to investigate | 8 | |||||
Accepted | Declined | |||||
NSIRA Act, section 16, CSIS complaints | 6 | 17 | ||||
NSIRA Act, section 17, CSE complaints | 1 | 4 | ||||
NSIRA Act, section 18, security clearances | 0 | 1 | ||||
NSIRA Act, section 19, RCMP referred complaints | 1 | 0 | ||||
Total | 8 | 22 | ||||
Active investigations as of December 31, 2023 | 17 | |||||
NSIRA Act, section 16, CSIS complaints | 8 | |||||
NSIRA Act, section 17, CSE complaints | 1 | |||||
NSIRA Act, section 18, security clearances | 4 | |||||
NSIRA Act, section 19, RCMP referred complaints | 3 | |||||
NSIRA Act, section 19, continuation of investigation (RCMP referred complaint)a | 1 | |||||
Informal resolution in progress as of December 31, 2023 | 1 | |||||
NSIRA Act, section 16 (CSIS complaints) | 0 | |||||
NSIRA Act, section 17 (CSE complaints) | 0 | |||||
NSIRA Act, section 18 (security clearances) | 1 | |||||
NSIRA Act, section 19 (RCMP referred complaints) | 0 | |||||
Total investigations closed | 12 | |||||
Abandoned | Final Report | Resolved Informally | Withdrawn | |||
NSIRA Act, section 16, CSIS complaints | 0 | 4 | 3 | 0 | ||
NSIRA Act, section 17, CSE complaints | 0 | 0 | 1 | 0 | ||
NSIRA Act, section 18, security clearances | 0 | 0 | 0 | 0 | ||
NSIRA Act, section 19, RCMP referred complaints | 1 | 3 | 0 | 0 | ||
NSIRA Act, section 45, CHRC referrals | 0 | 0 | 0 | 0 | ||
Total | 1 | 7 | 4 | 0 | ||
a First final report was issued in 2022. The continuation is a remaining issue. |
Date of Publishing:
The Privacy Act (PA) gives individuals the right of access to information about themselves that is under the control of a government institution, subject to certain specific and limited exemptions and exclusions. The PA also protects the privacy of individuals by giving them substantial control over the collection, use and disclosure of their personal information, and by preventing others from having access to that information.
Section 72 of the PA requires the head of each government institution to prepare an annual report on the administration of the PA within the institution that is to be tabled in both Houses of Parliament.
This report to Parliament, which is prepared and tabled pursuant to section 72 of the PA, describes the activities of the National Security and Intelligence Review Agency Secretariat in administering the PA during the period of April 1, 2023 to March 31, 2024 (the reporting period).
If you require more information or wish to make a request under the PA or the Access to Information Act, please direct your inquiries to the following:
Access to Information and Privacy Office
National Security and Intelligence Review Agency Secretariat
P.O. Box 2430, Station “D”
Ottawa, Ontario, K1P 5W5
Email: ATIP@nsira-ossnr.gc.ca
Established in July 2019, the National Security and Intelligence Review Agency (NSIRA) is an independent agency that reports to Parliament and conducts investigations and reviews of the federal government’s national security and intelligence activities.
The NSIRA Secretariat (the Secretariat) assists NSIRA in fulfilling its mandate. The Secretariat headed by an Executive Director, is designated as the government institution for the purposes of administering the PA and the Access to Information Act.
The Secretariat supports NSIRA in its dual mandate to conduct reviews and investigations in relation to Canada’s national security or intelligence activities.
NSIRA’s review mandate is broad, as outlined in subsection 8(1) of the National Security and Intelligence Review Agency Act (NSIRA Act). This mandate includes reviewing the activities of both the Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE), as well as the national security or intelligence-related activities of any other federal department or agency. This includes, but is not limited to, the national security or intelligence activities of the Royal Canadian Mounted Police (RCMP), the Canada Border Services Agency (CBSA), the Department of National Defence (DND) and Canadian Armed Forces (CAF), Global Affairs Canada (GAC), and the Department of Justice. Further, NSIRA may review any national security or intelligence matter that a Minister of the Crown refers to NSIRA.
NSIRA’s reviews assess whether Canada’s national security and intelligence activities comply with relevant laws, policies, and ministerial directions, as well as whether they are reasonable and necessary. In conducting its reviews, NSIRA can make any findings or recommendations it considers appropriate.
NSIRA is also responsible for investigating national security or intelligence-related complaints from members of the public. As outlined in paragraph 8(1)(d) of the NSIRA Act, NSIRA has the mandate to investigate complaints about:
The Secretariat’s ATIP Office is accountable for the development and implementation of effective policies, guidelines, systems, and procedures to ensure that the Secretariat meets its responsibilities under the PA and the Access to Information Act.
For the reporting period, the Secretariat’s ATIP Office consisted of:
The Secretariat’s ATIP Office is responsible for the following:
During the reporting period, the Secretariat was a party to a service agreement under section 73.1 of the PA in which the Secretariat received administrative support from the Privy Council Office related to the tabling of the annual report in Parliament. The Secretariat was also a party to a service agreement under section 71.1 of the PA in which the Secretariat received ATIP Online services from TBS.
To assist the Secretariat’s ATIP Office in meeting its overall legislative obligations, the Secretariat relied on a collaborative internal group of subject matter experts from all divisions.
As the Head of the Secretariat, the Executive Director is responsible for the administration of the PA within the institution. Pursuant to section 73 of the PA, the Executive Director has delegated the ATIP Manager and ATIP Officer, as well as individuals acting in these positions, to perform certain and specific powers, duties, and functions for the administration of the PA. These positions have limited delegation of authority under the PA and the Access to Information Act, in accordance with the delegation of authority instrument approved by the Executive Director in August 2022. The Delegation Order can be found in Appendix A (page 9).
In addition to 5 requests that were outstanding from the previous reporting periods, the Secretariat’s ATIP Office received 22 formal requests during the current reporting period, bringing the total number of formal request to 27. Of these, the Secretariat’s ATIP Office closed 25 requests and processed approximately 4843 pages during the reporting period. 2 requests were carried over to the following reporting period.
The Secretariat’s 2023-2024 Statistical Report on the PA and Supplemental ATIP Statistical Report for 2023-2024 were both previously validated by TBS.
During the reporting period, the Secretariat’s ATIP Office invoked extensions while processing 2 formal requests: 1 extension was completed within of 16 to 30 days, and 1 request was taken to seek an internal consultation. Both did not require extensions to consult with third parties.
Of the requests completed during the reporting period:
The Secretariat’s responses to many requests required an intensive review of complex records, including extensive internal and external consultations. During the reporting period, the Secretariat’s on-time response rate decreased to 56% from 58.3% in the 2022-2023 reporting period due to a significant increase in the number of pages processed for formal requests.
During the reporting period, no privacy consultations were received.
Subsection 29(1) of the PA describes how the Office of the Privacy Commissioner (OPC) receives and investigates complaints from individuals regarding the processing of requests under the PA. During the reporting period, the Secretariat’s ATIP Office received 16 complaints, 2 of which were related to Access requests.
In addition, 1 privacy breach-related investigation initiated by the Privacy Commissioner in Fiscal Year 2020-2021 continued during the reporting period and remained active on March 31, 2024.
The Secretariat took a customized approach to training subject matter experts on their legislative requirements, roles, and responsibilities. The Secretariat’s ATIP Office encouraged employees to take the ATIP training courses offered by the Canada School of Public Service (CSPS). New employees were required to complete an online training session entitled Fundamentals of Access to Information and Privacy within six months of joining the Secretariat and in January 2024, an internal ATIP training session was held.
To ensure in-depth training is taken by employees of the NSIRA Secretariat who have functional or delegated responsibility for the administration of the PA and Privacy Regulations, the Senior Counsel, Internal Services participated in the 2023 Canadian Privacy Symposium offered by the International Association of Privacy Professionals. In addition, the ATIP Manager attended the 2023 Canadian Access and Privacy Association Conference as well as the 26th Annual Vancouver International Privacy & Security Summit.
During the reporting period, the Secretariat implemented several initiatives to assist the Secretariat’s ATIP Office to operate more efficiently. For example, the Secretariat revised its Privacy Breach Plan and Procures Manual, revised its Privacy Protocol Template, and established a Privacy Risk Register.
During the reporting period, the Secretariat’s Information Technology division continued to develop an ATIP software tool for the Secretariat’s classified and unclassified systems.
The Secretariat meaningfully engaged with the OPC on all 16 active investigations during the reporting period and disclosed additional records in 1 of the 2 Access related complaints.
During the reporting period, no material privacy breaches occurred.
During the reporting period, the Secretariat completed a Privacy Impact Assessment (PIA) of its investigations-related activities, which was shared with TBS and the OPC. In addition, the Secretariat made further revisions to its PIA on the creation of NSIRA in response to feedback received from TBS and continued to engage with TBS on PIB registration.
During the reporting period, no public interest disclosures occurred.
Legislative deadlines for access requests were strictly monitored by using several Microsoft Lists trackers. The ATIP Manager organized ad hoc meetings to discuss request-related activities (such as whether internal consultations were necessary), determine deadlines, and ensure that all division members were informed of the status of requests. At bi-weekly team meetings with the Senior General Counsel and Senior Counsel, Internal Services, the ATIP Manager raised and discussed compliance with legislative and policy obligations. The Executive Director was also briefed on all ATIP compliance issues.
For contracts issued during the reporting period, the Secretariat included a Standard Procurement Clause on the Handling of Personal Information or a Supplemental General Condition on Personal Information from Public Services and Procurement Canada’s Standard Acquisition Clauses and Conditions Manual.
The Executive Director of the National Security and Intelligence Review Agency, pursuant to section 95 of the Access to Information Act, hereby designates the persons holding the positions or acting in these positions, set out in the schedule hereto to exercise the powers and perform the duties and functions of the Executive Director of the National Security and Intelligence Review Agency as the head of a government institution under the section of the Access to Information Act set out in the schedule opposite each position.
The Executive Director of the National Security and Intelligence Review Agency, pursuant to section 73 of the Privacy Act*, hereby designates the persons holding the positions or acting in these positions, set out in the schedule hereto to exercise the powers and perform the duties and functions of the Executive Director of the National Security and Intelligence Review Agency as the head of a government institution under the section of the Privacy Act set out in the schedule opposite each position.
Name of institution: National Security and Intelligence Review Agency
Reporting period: 2022-04-01 – 2023-03-31
Number of Requests | |
---|---|
Received during reporting period | 22 |
Outstanding from previous reporting period | 5 |
Outstanding from more than one reporting period | 0 |
Total | 27 |
Closed during reporting period | 25 |
Carried over to next reporting period | 2 |
Carried over within legislated timeline | 2 |
Carried over beyond legislated timeline | 0 |
Source | Number of Requests |
---|---|
Online | 22 |
0 | |
0 | |
In person | 0 |
Phone | 0 |
Fax | 0 |
Total | 22 |
Number of Requests | |
---|---|
Received during reporting period | 1 |
Outstanding from previous reporting periods | 0 |
Outstanding from more than one reporting period | 0 |
Total | 1 |
Closed during reporting period | 0 |
Carried over to next reporting period | 1 |
Source | Number of Requests |
---|---|
Online | 0 |
1 | |
0 | |
In person | 0 |
Phone | 0 |
Fax | 0 |
Total | 1 |
Completion Time | |||||||
---|---|---|---|---|---|---|---|
1 to 15 days | 16 to 30 Days | 31 to 60 Days | 61 to 120 Days | 121 to 180 Days | 181 to 365 Days | More than 365 Days | Total |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Less Than 100 Pages Processed | 101-500 Pages Processed | 501-1000 Pages Processed | 1001-5000 Pages Processed | More Than 5000 Pages Processed | |||||
---|---|---|---|---|---|---|---|---|---|
Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed |
0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Disposition of Requests | Completion Time | |||||||
---|---|---|---|---|---|---|---|---|
1 to 15 Days | 16 to 30 Days | 31 to 60 Days | 61 to 120 Days | 121 to 180 Days | 181 to 365 Days | More Than 365 Days | Total | |
All disclosed | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 1 |
Disclosed in part | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 1 |
All exempted | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
All excluded | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
No records exist | 1 | 6 | 6 | 3 | 0 | 0 | 0 | 16 |
Request abandoned | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 1 |
Neither confirmed nor denied | 0 | 4 | 1 | 0 | 1 | 0 | 0 | 6 |
Total | 2 | 11 | 7 | 3 | 2 | 0 | 0 | 25 |
Section | Numbers of Requests |
---|---|
18(2) | 0 |
19(1)(a) | 0 |
19(1)(b) | 0 |
19(1)(c) | 0 |
19(1)(d) | 0 |
19(1)(e) | 0 |
19(1)(f) | 0 |
20 | 0 |
21 | 0 |
22(1)(a)(i) | 0 |
22(1)(a)(ii) | 0 |
22(1)(a)(iii) | 0 |
22(1)(b) | 0 |
22(1)(c) | 0 |
22(2) | 0 |
22.1 | 0 |
22.2 | 0 |
22.3 | 0 |
22.4 | 0 |
23(a) | 0 |
23(b) | 0 |
24(a) | 0 |
24(b) | 0 |
25 | 0 |
26 | 1 |
27 | 1 |
27.1 | 0 |
28 | 0 |
Section | Numbers of Requests |
---|---|
69(1)(a) | 0 |
69(1)(b) | 0 |
69.1 | 0 |
70(1) | 0 |
70(1)(a) | 0 |
70(1(b) | 0 |
70(1)(c) | 0 |
70(1)(d) | 0 |
70(1)(e) | 0 |
70(1)(f) | 0 |
70.1 | 0 |
Paper | Electronic | Other | |||
---|---|---|---|---|---|
E-record | Data set | Video | Audio | ||
0 | 2 | 0 | 0 | 0 | 0 |
Number of Pages Processed | Number of Pages Disclosed | Number of Requests |
---|---|---|
4843 | 4843 | 9 |
Disposition | Less Than 100 Pages Processed | 101-500 Pages Processed | 501-1000 Pages Processed | 1001-5000 Pages Processed | More Than 5000 Pages Processed | |||||
---|---|---|---|---|---|---|---|---|---|---|
Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | |
All disclosed | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Disclosed in part | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 4843 | 0 | 0 |
All exempted | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
All excluded | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Request abandoned | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Neither confirmed nor denied | 6 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Total | 8 | 0 | 0 | 0 | 0 | 0 | 1 | 4843 | 0 | 0 |
Number of Minutes Processed | Number of Minutes Disclosed | Number of Requests |
---|---|---|
0 | 0 | 0 |
Disposition | Less Than 60 Minutes Processed | 60 – 120 Minutes Processed | More than 120 Minutes Processed | |||
---|---|---|---|---|---|---|
Number of Requests | Minutes Processed | Number of Requests | Minutes Processed | Number of Requests | Minutes Processed | |
All disclosed | 0 | 0 | 0 | 0 | 0 | 0 |
Disclosed in part | 0 | 0 | 0 | 0 | 0 | 0 |
All exempted | 0 | 0 | 0 | 0 | 0 | 0 |
All excluded | 0 | 0 | 0 | 0 | 0 | 0 |
Request abandoned | 0 | 0 | 0 | 0 | 0 | 0 |
Neither confirmed nor denied | 0 | 0 | 0 | 0 | 0 | 0 |
Declined to act with the approval of the Information Commissioner | 0 | 0 | 0 | 0 | 0 | 0 |
Total | 0 | 0 | 0 | 0 | 0 | 0 |
Number of Minutes Processed | Number of Minutes Disclosed | Number of Requests |
---|---|---|
0 | 0 | 0 |
Disposition | Less Than 60 Minutes Processed | 60 – 120 Minutes Processed | More than 120 Minutes Processed | |||
---|---|---|---|---|---|---|
Number of Requests | Minutes Processed | Number of Requests | Minutes Processed | Number of Requests | Minutes Processed | |
All disclosed | 0 | 0 | 0 | 0 | 0 | 0 |
Disclosed in part | 0 | 0 | 0 | 0 | 0 | 0 |
All exempted | 0 | 0 | 0 | 0 | 0 | 0 |
All excluded | 0 | 0 | 0 | 0 | 0 | 0 |
Request abandoned | 0 | 0 | 0 | 0 | 0 | 0 |
Neither confirmed nor denied | 0 | 0 | 0 | 0 | 0 | 0 |
Total | 0 | 0 | 0 | 0 | 0 | 0 |
Disposition | Consultation Required | Assessment of Fees | Legal Advice Sought | Other | Total |
---|---|---|---|---|---|
All disclosed | 0 | 0 | 0 | 0 | 0 |
Disclosed in part | 0 | 1 | 0 | 0 | 1 |
All exempted | 0 | 0 | 0 | 0 | 0 |
All excluded | 0 | 0 | 0 | 0 | 0 |
Request abandoned | 0 | 0 | 0 | 0 | 0 |
Neither confirmed nor denied | 0 | 0 | 0 | 0 | 0 |
Total | 0 | 1 | 0 | 0 | 1 |
Requests closed within legislated timelines | |
---|---|
Number of requests closed within legislated timelines | 14 |
Percentage of requests closed within legislated timelines (%) | 56 |
Number of Requests Closed Past the Legislated Timelines | Principal Reason | |||
---|---|---|---|---|
Interference with Operations/Workload | External Consultation | Internal Consultation | Other | |
11 | 10 | 0 | 1 | 0 |
Number of Days Past Legislated Timelines | Number of Requests Past Legislated Timeline Where No Extension Was Taken | Number of Requests Past Legislated Timeline Where an Extension Was Taken | Total |
---|---|---|---|
1 to 15 Days | 4 | 0 | 4 |
16 to 30 Days | 2 | 0 | 2 |
31 to 60 Days | 2 | 0 | 2 |
61 to 120 Days | 1 | 1 | 2 |
121 to 180 Days | 0 | 1 | 1 |
181 to 365 Days | 0 | 0 | 0 |
More than 365 Days | 0 | 0 | 0 |
Total | 9 | 2 | 11 |
Translation Requests | Accepted | Refused | Total |
---|---|---|---|
English to French | 0 | 0 | 0 |
French to English | 0 | 0 | 0 |
Total | 0 | 0 | 0 |
Paragraph 8(2)(e) | Paragraph 8(2)(m) | Subsection 8(5) | Total |
---|---|---|---|
0 | 0 | 0 | 0 |
Disposition for Correction Requests Received | Number |
---|---|
Notations attached | 0 |
Requests for correction accepted | 0 |
Total | 0 |
Number of requests where an extension was taken | 15(a)(i) Interference with operations | 9(1)(b) Consultation | 9(1)(b) Consultation | |||||
---|---|---|---|---|---|---|---|---|
Further review required to determine exemptions | Large volume of pages | Large volume of requests | Documents are difficult to obtain | Cabinet Confidence Section (Section 70) | External | Internal | ||
2 | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 |
Length of Extensions | 15(a)(i) Interference with operations | 9(1)(b) Consultation | 9(1)(b) Consultation | |||||
---|---|---|---|---|---|---|---|---|
Further review required to determine exemptions | Large volume of pages | Large volume of requests | Documents are difficult to obtain | Cabinet Confidence Section (Section 70) | External | Internal | ||
1 to 15 days | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
16 to 30 days | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 |
31 days or greater | 0 | |||||||
Total | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 |
Consultations | Other Government of Canada Institutions | Number of Pages to Review | Other Organizations | Number of Pages to Review |
---|---|---|---|---|
Received during reporting period | 0 | 0 | 0 | 0 |
Outstanding from the previous reporting period | 0 | 0 | 0 | 0 |
Total | 0 | 0 | 0 | 0 |
Closed during the reporting period | 0 | 0 | 0 | 0 |
Carried over within regotiated timelines | 0 | 0 | 0 | 0 |
Carried over beyond negotiated timelines | 0 | 0 | 0 | 0 |
Recommendation | Number of Days Required to Complete Consultation Requests | |||||||
---|---|---|---|---|---|---|---|---|
1 to 15 Days | 16 to 30 Days | 31 to 60 Days | 61 to 120 Days | 121 to 180 Days | 181 to 365 Days | More Than 365 Days | Total | |
Disclose entirely | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Disclose in part | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Exempt entirely | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Exclude entirely | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Consult other institution | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Other | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Total | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Recommendation | Number of Days Required to Complete Consultation Requests | |||||||
---|---|---|---|---|---|---|---|---|
1 to 15 Days | 16 to 30 Days | 31 to 60 Days | 61 to 120 Days | 121 to 180 Days | 181 to 365 Days | More Than 365 Days | Total | |
Disclose entirely | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Disclose in part | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Exempt entirely | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Exclude entirely | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Consult other institution | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Other | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Total | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Number of Days | Fewer Than 100 Pages Processed | 101-500 Pages Processed | 501-1000 Pages Processed | 1001-5000 Pages Processed | More Than 5000 Pages Processed | |||||
---|---|---|---|---|---|---|---|---|---|---|
Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | |
1 to 15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
16 to 30 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
31 to 60 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
61 to 120 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
121 to 180 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
181 to 365 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
More than 365 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Total | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Number of Days | Fewer Than 100 Pages Processed | 101-500 Pages Processed | 501-1000 Pages Processed | 1001-5000 Pages Processed | More Than 5000 Pages Processed | |||||
---|---|---|---|---|---|---|---|---|---|---|
Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | Number of Requests | Pages Disclosed | |
1 to 15 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
16 to 30 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
31 to 60 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
61 to 120 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
121 to 180 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
181 to 365 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
More than 365 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Total | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Section 31 | Section 33 | Section 35 | Court action | Total |
---|---|---|---|---|
3 | 10 | 3 | 0 | 16 |
Number of PIA(s) completed | Number of PIAs modified |
---|---|
1 | 1 |
Personal Information Banks | Active | Created | Terminated | Modified |
---|---|---|---|---|
Institution-specific | 0 | 0 | 0 | 0 |
Central | 0 | 0 | 0 | 0 |
Total | 0 | 0 | 0 | 0 |
Number of material privacy breaches reported to TBS | Number of material privacy breaches reported to OPC |
---|---|
0 | 0 |
Number of non-material privacy breaches |
---|
0 |
Expenditures | Amount |
---|---|
Salaries | $100,000 |
Overtime | $0 |
Goods and Services | $15,475 |
Professional services contracts | $15,475 |
Other | $0 |
Total | $115,475 |
Resources | Person Years Dedicated to Access to Information Activities |
---|---|
Full-time employees | 1.000 |
Part-time and casual employees | 0.000 |
Regional Staff | 0.000 |
Consultants and agency personnel | 0.300 |
Students | 0.500 |
Total | 1.800 |
Note: Enter values to three decimal places.
Number of weeks | |
---|---|
Able to receive requests by mail | 52 |
Able to receive requests by email | 52 |
Able to receive requests through the digital request service | 52 |
Fiscal Year Open Complaints Were Received by Institution | Number of Open Complaints |
---|---|
Received in 2023-24 | 0 |
Received in 2022-23 | 0 |
Received in 2021-22 | 0 |
Received in 2020-21 | 0 |
Received in 2019-21 | 0 |
Received in 2018-19 | 0 |
Received in 2017-18 | 0 |
Received in 2016-17 | 0 |
Received in 2015-26 | 0 |
Received in 2014-15 or earlier | 0 |
Fiscal Year Open Complaints Were Received by Institution | Open Requests that are Within Legislated Timelines as of March 31, 2024 | Open Requests that are Beyond Legislated Timelines as of March 31, 2024 | Total |
---|---|---|---|
Received in 2023-24 | 2 | 0 | 2 |
Received in 2022-23 | 0 | 0 | 0 |
Received in 2021-22 | 0 | 0 | 0 |
Received in 2020-21 | 0 | 0 | 0 |
Received in 2019-21 | 0 | 0 | 0 |
Received in 2018-19 | 0 | 0 | 0 |
Received in 2017-18 | 0 | 0 | 0 |
Received in 2016-17 | 0 | 0 | 0 |
Received in 2015-26 | 0 | 0 | 0 |
Received in 2014-15 or earlier | 0 | 0 | 0 |
Total | 2 | 0 | 2 |
Fiscal Year Open Complaints Were Received by Institution | Number of Open Complaints |
---|---|
Received in 2023-24 | 0 |
Received in 2022-23 | 7 |
Received in 2021-22 | 0 |
Received in 2020-21 | 0 |
Received in 2019-21 | 0 |
Received in 2018-19 | 0 |
Received in 2017-18 | 0 |
Received in 2016-17 | 0 |
Received in 2015-26 | 0 |
Received in 2014-15 or earlier | 0 |
Total | 7 |
Has your institution begun a new collection or a new consistent use of the SIN in 2023-24 | No |
How many requests were received from foreign nationals outside of Canada in 2023-24 | 0 |