In November of 2005, two controversial bills died on the order paper in Canada. They were known as Bill C-60 and Bill C-74.
Note: This is an article I wrote that was published elsewhere first. It has been republished here for archival purposes
Bill C-60 was an act to reform Copyright laws. That particular bill stirred up a firestorm of criticism that echoes into the Canadian copyright debate to this day. If one were to ignore Bill C-60, the other bill that stirred up controversy was Bill C-74, known as the surveillance bill.
“Bill C-74, the Modernization of Investigative Techniques Act, would force communications providers to build surveillance back-doors into the hardware that routes our phone calls, Internet traffic, and more.” Phillipa Lawson explained in the interview with Slyck at the time, “At the same time as increasing surveillance capacity, it would allow law enforcement agencies to obtain certain identifying information about internet and phone subscribers (name, address, telephone number, email address, IP address) without a warrant. Canadians should be concerned because this would increase state surveillance capacity while removing a legal safeguard designed to protect us from unjustified surveillance.”
Despite the fall of the government (and thus, the bills dieing on the order paper) back then, an underground movement to stop the revival of the surveillance act was underway. One of the more famous videos was called Emily of the State. While the YouTube clip was merely a parody, the beginning statements turned out to have a few errors. The first error was that the surveillance act was not introduced by the Conservatives, but rather by the Liberal party as a private members bill. The second point was that, while expected, the government did not introduce the bill in the Fall of 2006, but instead, during the Spring of 2007. Despite the assumptions that turned out to be incorrect, it was true that Bell Sympatico announced that they plan to monitor internet activities. Michael Geist noted the announcement in a Law Bytes column.
Online Rights Canada also jumped on board to fight Bill C-74. When Slyck discussed the issue with Online Rights Canada, Ren Bucholz described Bill C-74. “Bill C-74 is a vitally important issue. It will likely be brought up in the next parliamentary session and we will address this issue. We will package the momentum we have gained and bring that package into parliament. We want MPs to be speaking in a way that (the issues) won’t get lost in the shuffle. One MP may get a dozen letters on these issues, but overall, parliament may get several thousand letters on these issues.”
In the midst of all this, CIPPIC (Canadian Internet Policy and Public Interest Clinic) posted a detailed analysis of what Lawful Access is.
Looking back to the recent announcement, the new face of the surveillance bill is under the name Bill C-416. The bill was introduced by Marlene Jennings and is also known as MITA (The Modernization of Investigative Techniques Act).
In the act, “Telecommunications service providers, in connection with the interception of a communication, shall, in accordance with any regulations, have the capability to do — and, when requested to do so by an authorized person or by that person’s authority […] provide the intercepted communication to the authorized person.”
Furthermore, “The operational requirements in respect of transmission apparatus are that the telecommunications service provider operating the apparatus have the capability, in accordance with any regulations, to do the following:
(a) enable the interception of communications generated by or transmitted through the apparatus to or from any temporary or permanent user of the provider’s telecommunications services;
(b) isolate the communication that is authorized to be intercepted from other information and provide the intercepted communication to authorized persons, including
(i) isolating the communications of the person whose communications are authorized to be intercepted from those of other persons, and
(ii) isolating the transmission data of the person whose communications are authorized to be intercepted from the rest of the person’s communications;
(c) provide information that permits the accurate correlation of all elements of intercepted communications; and
(d) enable simultaneous interceptions by authorized persons from multiple national security and law enforcement agencies of communications of multiple users, including enabling
(i) at least the minimum number of those interceptions, and
(ii) any greater number of those interceptions — up to the maximum number and within the time provided for in the regulations — for the period that an agency requests in accordance with any regulations.”
Some may remember Telus explaining to CRIA (Canadian Recording Industry Association) during the first case in Canada where CRIA attempted to sue alleged copyright infringers that it requires a certain amount of manpower and money to execute any search through logs that would incriminate a user who was accused of uploading copyrighted material. In essence, Telus said that it would only hand over any evidence if CRIA paid the costs of retrieving the data. It seems that MITA also covered this as well. The act says, “The Minister shall pay the telecommunications service provider an amount that the Minister considers reasonable towards the prescribed expenses that the Minister considers are necessary for the service provider to incur initially to comply with an order made.”
So where exactly does this information go? The act states, “Every telecommunications service provider shall, in accordance with the regulations, provide to a person designated […] on his or her written request, any information in the service provider’s possession or control respecting the name and address of any subscriber to any of the service provider’s telecommunications services and respecting any other identifiers associated with the subscriber. […] A designated person shall ensure that he or she makes a request under subsection (1) only in performing, as the case may be, a duty or function
(a) of the Canadian Security Intelligence Service under the Canadian Security Intelligence Service Act;
(b) of a police service, including any related to the enforcement of any laws of Canada, of a province or of a foreign jurisdiction; or
(c) of the Commissioner of Competition under the Competition Act.
[…]The Commissioner of the Royal Canadian Mounted Police, the Director of the Canadian Security Intelligence Service, the Commissioner of Competition and the chief or head of a police service constituted under the laws of a province may designate for the purposes of this section any employee of his or her agency, or a class of such employees, whose duties are related to protecting national security or to law enforcement.”
So in essence, the act clearly states that all the personal information collected from internet subscribers would be handed over to the RCMP (Royal Canadian Mounted Police).
The act also describes on when an “authorized person” can retrieve such information. “A police officer may request a telecommunications service provider to provide to […] the officer believes on reasonable grounds that the information requested is immediately necessary to prevent an unlawful act that would cause serious harm to any person or to property; and […] the information directly concerns either the person who would perform the act that is likely to cause the harm or is the victim, or intended victim, of the harm. […] The telecommunications service provider shall provide the information to the police officer as if the request were made by a designated person.”
So essentially, the worry is that warrantless surveillance, judging by the language of the act, based on suspicion on “reasonable grounds”, is enough to obtain subscriber information. In addition, the bill describes what information can be obtained: “A telecommunications service provider shall, on the request of a police officer or of an employee of the Royal Canadian Mounted Police or the Canadian Security Intelligence Service,
(a) provide the prescribed information relating to the service provider’s telecommunications facilities;
(b) indicate what telecommunications services the service provider offers to subscribers; and
(c) provide the name, address and telephone number of any telecommunications service providers from whom the service provider obtains or to whom the service provider provides telecommunications services, if the service provider has that information.”
Michael Geist also made note of this introduction.
Drew Wilson on Twitter: @icecube85 and Google+.