Thanks so much to the committee for the invitation.
I'm here as a representative of the Centre for Law and Democracy, which is an NGO based in Halifax that works to promote foundational rights for democracy. Our particular emphasis is on freedom of expression, so I'm planning on providing commentary from that perspective.
I'll say at the outset that I support the recommendations of Craig Forcese and Kent Roach regarding improving oversight of the system, as well as regarding sharing evidence. I also share the concerns of the Privacy Commissioner regarding the expanded scope of information sharing.
First, regarding the offence on advocating or promoting the commission of terrorism offences, it is well established under international law that there is an important difference between mere advocacy or promotion of something regardless of its harmfulness, and incitement to a harmful result. International human rights standards require a very close nexus between a statement and the risk of harm before the former may be legitimately prohibited. This standard ensures an appropriate balance between protecting free speech and protecting against harm.
An academic work, for example, may be said to advocate in favour of something by extolling its virtues and by setting out and weighing its relative benefits and drawbacks, and yet it would be rare for an academic work to actually incite others to harmful results.
The media, which have a professional obligation to report in a timely and comprehensive manner on acts of terrorism, could be deemed by some to be promoting terrorism offences by doing so. The use by Daesh of social media to promote itself simply by distributing videos and images has been widely commented on. This provision could potentially be applied to media reporting on their activities. Similarly, a very strongly worded poem may advocate for something, and yet it would be rare for it to create a genuine risk of harm.
There is clear authority under international law for the need to maintain, at least in relation to restrictions on freedom of expression, a clear distinction between expression which incites, and expression which merely advocates, promotes, or praises. I cite in particular article 20.2 of the International Covenant on Civil and Political Rights, which calls for the prohibition of advocacy of national, racial, or religious hatred, but only where it "constitutes incitement”.
Article III(c) of the Convention on the Prevention and Punishment of the Crime of Genocide uses similar language. I cite the 2015 Joint Declaration on Freedom of Expression and responses to conflict situations by the special mandates on freedom of expression from the United Nations, the Organization for Security and Co-operation in Europe, the Organization of American States, and the African Commission on Human and Peoples' Rights.
There are also problems with the recklessness standard in the offence, which should be of particular concern to the media. The media would presumably rarely, if ever, report on terrorism with the intention of promoting it, but they might be deemed to have been reckless as to this possible result. We recommend that this provision be deleted, as it is unnecessary in light of existing anti-terror provisions in the Criminal Code and overbroad in its impact on freedom of expression.
Sections 83.222 and 83.223, which provide for the seizure and suppression of “terrorist propaganda” are also problematic insofar as they apply a substantially similar definition of what constitutes terrorist propaganda. Although seizing material is not as serious an infringement as arresting its author, the potential overbreadth of the restriction is of concern either way. Moreover, the standard for acting—that of there being reasonable grounds to believe it's terrorist propaganda—is a troublingly low threshold to cross. For a media outlet, having its material seized or suppressed for seven days and the requirement of going to court to obtain its release could lead to significant operational challenges, with the concomitant possibility of a chilling effect around legitimate speech.
We also note that unlike the 83.221(1) offence, which incorporates the protection of a mens rea requirement, there are no conditions or protections against abuse of the reasonable grounds standard. Given that this is analogous to an urgent action or interim measure, it should be incumbent on the legislator to include protective measures. These might, for example, require a clear risk of imminent dissemination of the material to be shown, along with a similar risk of incitement to an actual terrorism offence. In other words, this sort of measure should at the very least be treated as exceptional, and appropriate protections against abuse should be built into it.
Regarding investigative technology in the digital world, it's a bit troubling that the green paper treats the Spencer decision as a problem to be solved or circumvented rather than a definitive statement by the country's highest court to the effect that there is a significant privacy interest in Canadians' metadata. We agree with the Spencer decision, but the bottom line is that it is the law of the land and should be respected.
What is far more troubling is that the green paper appears to be opening the door to far more intrusive and problematic policies, such as requirements for intermediaries to retain the technical ability to decrypt information sent by their users. This should be a huge red flag to any Canadian who cares about digital security.
For years, authorities in the United States and elsewhere have sought a solution whereby official access could be enabled without compromising security. The technical community has been and remains unanimous in their position that this is not possible. It is impossible to build a back door that only the good guys can walk through.
Even if it were possible to limit access to state requests that followed a proper procedure, it is worth noting that we live in a world where many governments do not share Canada's lofty ideals. What would be the impact on global human rights if the governments of China, Russia, Egypt, and Saudi Arabia demanded a similar deal? If such a solution were to be developed, it would be impossible to keep it out of the hands of the world's repressive governments. Strong encryption keeps everyone safe.
The other highly problematic new proposal that the green paper contains deals with data retention requirements. Data minimization, whereby organizations seek to limit materials stored to what is strictly necessary, is a cardinal principle of modern digital security. Overstorage is one of the main reasons that the Ashley Madison hack and last year's hack of the United States Office of Personnel Management were so catastrophic.
The green paper mentions data retention requirements in Australia. It does not mention that in the run-up to their adoption, Anonymous hacked the databases of one of the country's largest ISPs as a demonstration of why the requirement is a bad idea.
The green paper also fails to mention significant resistance at the national level to the data retention directive in Europe even before it was struck down, including having been rejected by courts in Germany, Romania, and the Czech Republic. Sweden, among others, also flatly refused to implement the directive.
Although the online world certainly presents novel challenges to law enforcement, it is worth noting that the tool kit available to police today is vastly more powerful than their investigative tool kit 20 or 30 years ago. The idea of developing a digital trail that can be tracked back for weeks or months is only a novel challenge because police never had the ability to do anything comparable in the past. If a suspect came on the police's radar in 1993, there was no way for them to go back to track their movements and communications from 1992.
From this perspective, painting the modern digital landscape as an environment where law enforcement is increasingly powerless does not comport with reality. With modern data processing, the centralization of communications due to the spread of the Internet, and the proliferating digital trail that it leaves, law enforcement investigative techniques are more powerful, effective, and efficient then ever before, even if they are not as powerful as someone in law enforcement would like them to be.