Madam Speaker, I want to thank my colleague very much.
The saga began on March 5, 2009, in the Standing Committee on Public Safety and National Security when the executive director of the Security Intelligence Review Committee, Ms. Pollack, appeared as a witness. I asked her if CSIS uses, has used, or will use, information obtained by torture and if so, is it reliable? I will read to you what she said in response. It is quite something.
As for the first question, related to information obtained through torture, there is a decision that has been rendered by a member of this committee in the context of a complaint that was made, in which it was determined that at times, yes, CSIS does use information that was obtained through torture and that their overriding focus in doing so.... Obviously they do so in the context of investigating threats to the security of Canada. Is this information reliable? Naturally her response was “no”.
I will be told, of course, that that was the answer given by Ms. Pollack of the Security Intelligence Review Committee. But what does CSIS have to say about this? The same day, March 5, we were also joined by a CSIS representative, Mr. O'Brien, operations and legislation advisor for CSIS. I asked him the very same question. Mr. O'Brien is a very honest person, for he told the truth. After skating around the issue for a bit, he finally replied as follows:
Frankly, I'm tempted to say that there are four words that can provide a simple answer, and those four words are either—and this is the skating around—“yes, but” or “no, but”, and the “yes, but” is, do we use information that comes from torture? And the answer is that we only do so if lives are at stake.
So they do use this kind of information.
So a public safety minister and the head of CSIS at the time appeared before the committee and told us to our face that Canada does not use this kind of information. They said so to our face. But what have we learned since? On September 13, 2010, a briefing note intended for Mr. Fadden specified that even though such information could not be used in a court of law to prosecute someone who poses an imminent threat, the government—the Conservative government—must make use of the information to attempt to disrupt that threat before it materializes. That is the reality at CSIS.