• Thanks for stopping by. Logging in to a registered account will remove all generic ads. Please reach out with any questions or concerns.

Canadian Foreign Interference (General)

That also has most of corporate America in that pic.
Because all of us in North America love cheap stuff and China makes it cheap. IF China were to pay wages similar to what North American workers receive, we wouldn't be buying from China.
And don't get me started on their "justice" system.....
 
And then there is the Russians and harder interference.


One of the most dramatic Russian espionage cases in Britain has concluded with guilty verdicts. Three Bulgarian nationals associated with Wirecard fraud mastermind Jan Marsalek, who settled in Russia in 2020, have been found guilty of espionage. These convicted spies carried out a surveillance campaign against Bulgarian-born Bellingcat journalist Christo Grozev, who exposed grizzly details about Russia’s 2020 poisoning of opposition leader Alexey Navalny.

Despite the exodus of Kremlin-connected Russians from London and the stiffening of Britain’s National Security Act in 2023, the threat of Russian espionage looms large. In October 2024, MI5 chief Ken McCallum warned that Russian intelligence agencies were on a mission to create “sustained mayhem on British and European streets.” McCallum asserted that Russia’s Main Intelligence Directorate (GRU) had carried out arson attacks and sabotage operations in Britain as revenge for British support for Ukraine.

How does Russia carry out espionage on British soil? Through a wide variety of conventional and unexpected means. The most predictable stream of espionage runs through the scaled-down Russian Embassy in London. In May 2024, Britain expelled the Russian Embassy defence attache for being an undeclared military intelligence officer. Russian diplomatic properties Seacox Heath in Sussex and the Trade Defence Section in Highgate historically served as launchpads for Russian spying operations.

Another form of espionage results from the recruitment of disgruntled British government employees. In February 2023, Royal Air Force (RAF) veteran David Smith was jailed for thirteen years for passing on the names, phone numbers and addresses of his colleagues at the British Embassy in Berlin to a Russian general. A MI5 sting operation derailed Smith’s scheme but Russia’s recruitment efforts remain a clear-and-present danger.

Aside from these time-tested methods, Russia has experimented with a diverse array of new espionage tactics. The first is cyber-espionage. Russia has used spear-phishing to access information about British citizens and organisations. The FSB-linked Star Blizzard actor has targeted British politicians, NGOs and academics since 2019. It reels in unsuspecting targets with customised email outreaches and exports malware to carry out data harvesting on British nationals. FSB Centre 18, which oversees the Star Blizzard hacks, has stepped up its political interference campaign in Britain and leaked some secret political documents.

The second is to capitalise on the proliferation of private intelligence and security consultancy firms in Britain. In January, the Home Office warned private security professionals to avoid accepting work from Russia, China and Iran, and urged greater due diligence against unwittingly providing information to these hostile actors. The cluster of former British intelligence community personnel who work for these companies make them ripe targets for Russian spies.

The third is to recruit sympathetic foreign nationals. Marsalek preyed on Bulgarian national Orlin Roussev’s fascination with espionage and experience in signals intelligence to convince him to do Russia’s bidding. Roussev found a beautician, painter and decorator, and mixed martial arts fighter from the Bulgarian diaspora to assist in Marsalek’s Kremlin-directed surveillance efforts. Marsalek and Roussev developed schemes to sell US drones to Russia and China, and to target Ukrainian forces training at US facilities in Stuttgart.


What is the difference between UK law and Canadian law in these matters?
 
And then there is the Russians and harder interference.







What is the difference between UK law and Canadian law in these matters?
To put it quite simply the British and their Judicial system take these crimes far more seriously.
 
This could go a lot of places, Chinese super thread, COVID-9, etc., but figured here as best as any, particularly as Canada had Chinese Peoples Liberation Army bioscientists present inside the highest-security levels of a Western biology laboratory.

 
Brihard,

In your opinion, is there a relatively simple legislative solution to the Intelligence to Evidence problem in a Canadian context?

I'm sorry, I promised and intended to reply to this some time ago and it slipped.

A quick serious of facts foundational to the problem:
  • In administrative law (immigration, matters, foreign investment reviews, etc), the standard of proof in court is generally balance of probabilities.
  • In criminal law, the standard of proof is the much higher 'beyond a reasonable doubt'.
  • In criminal matters, an accused has the right to have disclosed to them all material that is fruits of the investigation and that is not either privileged or clearly irrelevant.
  • In criminal matters, an accused has the right to know the case against them and what legal case has to be met in their defence.
  • In criminal matters, there is a 'trier of law', the judge, who decides how the law is interpreted and applied.
  • Separately, in criminal trials, there is a 'trier of fact' who hears and considers evidence and decides what they believe to be the true set of facts that will be relied on in applying the law. This can be either a judge or a jury.
  • In serious criminal matters, an accused has the right to a jury trial, and there is extremely little screening that can be done regarding the jury, nor can they be obliged to get security cleared.
  • Criminal matters are always prosecuted in provincial courts. Provincial courts are not equipped for classified information; they lack the facilities and security clearances.
  • Administrative matters in the federal realm generally go through federal court, and facilities and security cleared personnel exist.

So, to the matter at hand, the Intelligence to Evidence dilemma:

Those who have no life and spend time reading up on this stuff or listening to informed commentators may read or hear that 'intelligence is not evidence'. That's a truism that I disagree with; typically you see it espoused by the pure intelligence side. Intelligence is information that is collected, analyzed, corroborated where possible, and from which meaning is deduced or inferred to build a greater understanding of a bigger picture. It could be a body of disparate facts and data that paint a picture of a criminal network and their relationships and modus operandi. It can be information that sheds light on a foreign adversary's intentions. It can be information about the constitution, strength, dispositions, morale, and state of supply of a military force... It's information that gives us understanding, not because it is tested necessarily as proof of an assertion, but simply because when combined with what else is known, we understand something better than we did before. But it's fundamentally facts, data, measurements... Intelligence is just information given meaning.

Evidence is information that can be admitted in court, have its veracity tested (potentially through an adversarial process), and which, once either admitted or challenged and found reliable, constitute some amount of proof of something; in criminal law that's going to be an allegation of a specific offence. In administrative law, similarly it's going to be proof to some extent of a specific set of facts that one party or another contends to be true in court. Whether in a criminal matter, such as charging someone with a crime, or an administrative matter such as revoking someone's immigration status for misrepresentation, there's generally one or more legal tests to be met, generally very formulaic- if criteria a, b, c, d and e are all met, the crime is proven and there can be a finding of guilt. So evidence is also information given meaning, though potentially subject to more rigor.

Just because a piece of information or data is intelligence, does not mean it's inherently not also evidence. It could be. It can be evidence is it can be admitted to court and survive scrutiny and challenge.

Generally, for information to be admitted to court as evidence, it needs to be sourceable. Crown's gonna need to call a witness through which they will introduce the evidence, and who can answer questions about where it came from. For cops, we need to be prepared to speak to what gave us our reasonable belief, say, for a search warrant of a residence or office, or to order a third party to produce data or records. That can all be tested in open court. The accused gets to know and challenge almost all of this. The trier of fact - be it judge or jury - gets to hear it all. A verdict can only ultimately be rendered based on the evidence admitted into court. And they get to challenge that upstream - why were we doing surveillance on person A on a given date? How did we know we would likely find drugs and guns in the residence? There are some protections; confidential informants get their identities protected nearly without fail, and the exceptions aren't important here. Some sensitive techniques or equipment can be protected. The identity of a police undercover officer can be partly protected. But, generally, most of the info will be out there.

When we get into the space where threats to the security of Canada cross into criminality, then you're into that really awkward overlap between security intelligence such as CSIS (or foreign counterparts), and police/peace officers - usually but by no means always RCMP (could be CBSA, Corrections, sometimes other police that have sections focused on antiterrorism). If there is potentially valid information on threats to the security of Canada, then in some way shape or form it probably needs to be operationalized so the threat is stopped or mitigated. Unfortunately, whatever goes over to police is pretty much by default going to be relevant for disclosure purposes. That could ultimately mean that if CSIS were to disclose information to police about a confidential informant, or a wiretap, or their surveillance, and if police build on it, well then you have a strong potential for compromise of sources and methods when that comes out as evidence in open court. After all, it's not just the evidence Crown will use to build their case that could come out in open court, but also the evidence defence calls, and they can potentially call a lot if they want to try to discredit or rebut witnesses, if they want to undermine the grounds for obtaining search warrants, things like that. So if CSIS sends info to police, that information might end up substantially divulged to twelve random men and women comprising a jury.

Now, there's a legal mechanism under the Canada Evidence Act for the government to assert national security privilege over material that would otherwise be evidence. I've talked about it in other posts so I won't repeat it now, but essentially after a process through federal court, the courts will settle on what are going to be the black boxes drawn on documents; what testimony is out of play. In some cases, the trial court may be provided with a summary of some classified information that's essentially sanitized. In a criminal trial, before the judge and jury, if one side gets to rely on it, so does the other. Crown cannot offer evidence that defence doesn't get to hear.

When that sanitized material comes down from federal court to the trial court, the defence can make a pre-trial application based on the redactions being prejudicial to trial fairness. The trial court judge needs to then consider how to keep the trial fair. The judge might determine that the trial can still proceed fairly; they might allow certain witnesses to testify under partial anonymity. They might entirely dismiss certain charges because the defence would need to rely on information they aren't permitted to use; this happened a couple years ago in the Cameron Ortis case.

Pretty much all of this stems from our government needing to protect highly sensitive information from public disclosure through the open court process. What could be done?

Well, constitutionally all criminal matters are in provincial court. We don't have federal criminal courts like the US, nor can we. Conceivably, government could legislate a section of the criminal code to deal with trials for designated national security offences. The government could try to assert a Section 1 Charter limitation to the Section 11(f) right to a jury, and legislate a system of judge-only criminal trials for certain offences, and public exclusions from the court room (there is already certain limited ability to exclude the public; this also happened in portions of the Ortis trial). This could also allow for security cleared judges and court staff, and court rooms within which certain material could be used and accessed. Conceivably parliament could also legislate, in such a court, in-camera presentation of evidence that the accused is not privy to but that their security cleared defence counsel are. Maybe this could allow more fulsome CSIS information to be heard in court; this would potentially let that information be used more directly by police investigators instead of a police investigative team having to basically being pointed in the direction of a person with a vague nature of a threat and told "good luck!"

National security intelligence from non-police sources being disclosed in criminal matters is very, very rare and very limited, for the reasons I describe above. It's used more in immigration matters (kicked out of the country for being a national security threat), or Investment Canada Act reviews of foreign investments in Canada (e.g., if this company buys our company, country X gets access to sensitive intellectual property). Even at that though we don't really know the full scope of where it gets used in legal processes because it's only if there's a court record generated that we end up able to learn about it.

So, the government could try to push legislation through that would be inherently limiting on certain legal rights, but argue that it's defensible under the reasonable limitations Charter clause- but you don't know if it worked til it's tested in a real case and survives a Charter challenge. Or they could use the Notwithstanding clause, but that's generally a terrible approach for criminal law. Somehow, the nut that must be cracked is the reliance of criminal prosecutions on information that gets disclosed in open court including potentially to twelve random members of the public. If some sort of different trial process for sensitive national security prosecutions could be devised, then conceivably there would be more protections in place for, say, CSIS or CSE providing information to be admitted as evidence that someone is playing on Canadian soil for another team. Failing that, it will remain left to police to be able to investigate their way to the same conclusions themselves, but probably without access to whatever it is that initially put a problem on the radar. CSIS can work human sources who know their info will never get revealed in open court. CSE can do all the wild shit CSE can do. The threat detection in the national security space simply casts a vastly wider net than police generally can for legal or practical reasons. Anything that could feed more of that information in to police investigations in a way that it could be admissible in court and tested for veracity would be a help. But if it doesn't protect sources and methods, it's useless.
 
I'm sorry, I promised and intended to reply to this some time ago and it slipped.

A quick serious of facts foundational to the problem:
  • In administrative law (immigration, matters, foreign investment reviews, etc), the standard of proof in court is generally balance of probabilities.
  • In criminal law, the standard of proof is the much higher 'beyond a reasonable doubt'.
  • In criminal matters, an accused has the right to have disclosed to them all material that is fruits of the investigation and that is not either privileged or clearly irrelevant.
  • In criminal matters, an accused has the right to know the case against them and what legal case has to be met in their defence.
  • In criminal matters, there is a 'trier of law', the judge, who decides how the law is interpreted and applied.
  • Separately, in criminal trials, there is a 'trier of fact' who hears and considers evidence and decides what they believe to be the true set of facts that will be relied on in applying the law. This can be either a judge or a jury.
  • In serious criminal matters, an accused has the right to a jury trial, and there is extremely little screening that can be done regarding the jury, nor can they be obliged to get security cleared.
  • Criminal matters are always prosecuted in provincial courts. Provincial courts are not equipped for classified information; they lack the facilities and security clearances.
  • Administrative matters in the federal realm generally go through federal court, and facilities and security cleared personnel exist.

So, to the matter at hand, the Intelligence to Evidence dilemma:

Those who have no life and spend time reading up on this stuff or listening to informed commentators may read or hear that 'intelligence is not evidence'. That's a truism that I disagree with; typically you see it espoused by the pure intelligence side. Intelligence is information that is collected, analyzed, corroborated where possible, and from which meaning is deduced or inferred to build a greater understanding of a bigger picture. It could be a body of disparate facts and data that paint a picture of a criminal network and their relationships and modus operandi. It can be information that sheds light on a foreign adversary's intentions. It can be information about the constitution, strength, dispositions, morale, and state of supply of a military force... It's information that gives us understanding, not because it is tested necessarily as proof of an assertion, but simply because when combined with what else is known, we understand something better than we did before. But it's fundamentally facts, data, measurements... Intelligence is just information given meaning.

Evidence is information that can be admitted in court, have its veracity tested (potentially through an adversarial process), and which, once either admitted or challenged and found reliable, constitute some amount of proof of something; in criminal law that's going to be an allegation of a specific offence. In administrative law, similarly it's going to be proof to some extent of a specific set of facts that one party or another contends to be true in court. Whether in a criminal matter, such as charging someone with a crime, or an administrative matter such as revoking someone's immigration status for misrepresentation, there's generally one or more legal tests to be met, generally very formulaic- if criteria a, b, c, d and e are all met, the crime is proven and there can be a finding of guilt. So evidence is also information given meaning, though potentially subject to more rigor.

Just because a piece of information or data is intelligence, does not mean it's inherently not also evidence. It could be. It can be evidence is it can be admitted to court and survive scrutiny and challenge.

Generally, for information to be admitted to court as evidence, it needs to be sourceable. Crown's gonna need to call a witness through which they will introduce the evidence, and who can answer questions about where it came from. For cops, we need to be prepared to speak to what gave us our reasonable belief, say, for a search warrant of a residence or office, or to order a third party to produce data or records. That can all be tested in open court. The accused gets to know and challenge almost all of this. The trier of fact - be it judge or jury - gets to hear it all. A verdict can only ultimately be rendered based on the evidence admitted into court. And they get to challenge that upstream - why were we doing surveillance on person A on a given date? How did we know we would likely find drugs and guns in the residence? There are some protections; confidential informants get their identities protected nearly without fail, and the exceptions aren't important here. Some sensitive techniques or equipment can be protected. The identity of a police undercover officer can be partly protected. But, generally, most of the info will be out there.

When we get into the space where threats to the security of Canada cross into criminality, then you're into that really awkward overlap between security intelligence such as CSIS (or foreign counterparts), and police/peace officers - usually but by no means always RCMP (could be CBSA, Corrections, sometimes other police that have sections focused on antiterrorism). If there is potentially valid information on threats to the security of Canada, then in some way shape or form it probably needs to be operationalized so the threat is stopped or mitigated. Unfortunately, whatever goes over to police is pretty much by default going to be relevant for disclosure purposes. That could ultimately mean that if CSIS were to disclose information to police about a confidential informant, or a wiretap, or their surveillance, and if police build on it, well then you have a strong potential for compromise of sources and methods when that comes out as evidence in open court. After all, it's not just the evidence Crown will use to build their case that could come out in open court, but also the evidence defence calls, and they can potentially call a lot if they want to try to discredit or rebut witnesses, if they want to undermine the grounds for obtaining search warrants, things like that. So if CSIS sends info to police, that information might end up substantially divulged to twelve random men and women comprising a jury.

Now, there's a legal mechanism under the Canada Evidence Act for the government to assert national security privilege over material that would otherwise be evidence. I've talked about it in other posts so I won't repeat it now, but essentially after a process through federal court, the courts will settle on what are going to be the black boxes drawn on documents; what testimony is out of play. In some cases, the trial court may be provided with a summary of some classified information that's essentially sanitized. In a criminal trial, before the judge and jury, if one side gets to rely on it, so does the other. Crown cannot offer evidence that defence doesn't get to hear.

When that sanitized material comes down from federal court to the trial court, the defence can make a pre-trial application based on the redactions being prejudicial to trial fairness. The trial court judge needs to then consider how to keep the trial fair. The judge might determine that the trial can still proceed fairly; they might allow certain witnesses to testify under partial anonymity. They might entirely dismiss certain charges because the defence would need to rely on information they aren't permitted to use; this happened a couple years ago in the Cameron Ortis case.

Pretty much all of this stems from our government needing to protect highly sensitive information from public disclosure through the open court process. What could be done?

Well, constitutionally all criminal matters are in provincial court. We don't have federal criminal courts like the US, nor can we. Conceivably, government could legislate a section of the criminal code to deal with trials for designated national security offences. The government could try to assert a Section 1 Charter limitation to the Section 11(f) right to a jury, and legislate a system of judge-only criminal trials for certain offences, and public exclusions from the court room (there is already certain limited ability to exclude the public; this also happened in portions of the Ortis trial). This could also allow for security cleared judges and court staff, and court rooms within which certain material could be used and accessed. Conceivably parliament could also legislate, in such a court, in-camera presentation of evidence that the accused is not privy to but that their security cleared defence counsel are. Maybe this could allow more fulsome CSIS information to be heard in court; this would potentially let that information be used more directly by police investigators instead of a police investigative team having to basically being pointed in the direction of a person with a vague nature of a threat and told "good luck!"

National security intelligence from non-police sources being disclosed in criminal matters is very, very rare and very limited, for the reasons I describe above. It's used more in immigration matters (kicked out of the country for being a national security threat), or Investment Canada Act reviews of foreign investments in Canada (e.g., if this company buys our company, country X gets access to sensitive intellectual property). Even at that though we don't really know the full scope of where it gets used in legal processes because it's only if there's a court record generated that we end up able to learn about it.

So, the government could try to push legislation through that would be inherently limiting on certain legal rights, but argue that it's defensible under the reasonable limitations Charter clause- but you don't know if it worked til it's tested in a real case and survives a Charter challenge. Or they could use the Notwithstanding clause, but that's generally a terrible approach for criminal law. Somehow, the nut that must be cracked is the reliance of criminal prosecutions on information that gets disclosed in open court including potentially to twelve random members of the public. If some sort of different trial process for sensitive national security prosecutions could be devised, then conceivably there would be more protections in place for, say, CSIS or CSE providing information to be admitted as evidence that someone is playing on Canadian soil for another team. Failing that, it will remain left to police to be able to investigate their way to the same conclusions themselves, but probably without access to whatever it is that initially put a problem on the radar. CSIS can work human sources who know their info will never get revealed in open court. CSE can do all the wild shit CSE can do. The threat detection in the national security space simply casts a vastly wider net than police generally can for legal or practical reasons. Anything that could feed more of that information in to police investigations in a way that it could be admissible in court and tested for veracity would be a help. But if it doesn't protect sources and methods, it's useless.
Outstanding!
 
Further to @brihard

Asher, along with Canadian law enforcement experts such as former RCMP intelligence analyst Scott McGregor, believes a rarely discussed Canadian legal barrier—Stinchcombe—must be overcome. They argue Canada could unlock powerful new authorities if it begins treating cartel-connected Chinese money laundering networks as accessories to terrorism.

The rule, derived from the 1991 Supreme Court case R. v. Stinchcombe, requires Canadian law enforcement to disclose nearly all investigative material to the defense. While intended to ensure a fair trial, critics say it severely hampers complex RCMP investigations, especially those relying on wiretaps or sensitive intelligence, and risks blowing the cover of international partners and covert operations.

Asher didn’t mince words: “Every case I worked in Canada… the Stinchcombe thing ended up [inhibiting investigations]—we were targeting phone numbers tied to Canadian money launderers who were Chinese. And they got told after 90 days that we were going after them. Then they just changed numbers and changed their OPSEC. It’s a farce.”

He sees the recent terrorism designation of Mexican cartels as a legal pivot point: “That whole Stinchcombe thing should be thrown out the door because we can now use counter-terrorism authorities.”


Essentially we are giving ammunition to Trump re drug trafficking.

Asher, who contends that the “command” for Western Hemisphere money laundering of synthetic narcotics—including fentanyl, methamphetamine, and ecstasy sourced from Chinese precursors—is “largely run by Chinese triads in Canada,” also argues that this interconnected transnational network presents profound risks to Canadian financial institutions.

Speaking bluntly about the nexus between Chinese Triads and Mexican cartels operating in Canada, Asher said: “Of course, they’re in bed with each other. This is why Tse Chi Lop lived in Toronto… These cartels are now designated as terrorist organizations. That changes everything—how we prosecute them, and what tools we can use.”



Asher believes that if Canadian law enforcement engages more directly with U.S. authorities, the financiers and money launderers tied to Chinese triads in Canada can be directly linked to fentanyl-trafficking Mexican cartels. If Canadian banks are shown to be facilitating these funds, even passively, they may be subject to U.S. regulations—including terrorism finance sanctions.

The implications for Canadian institutions are profound. “If any of these financial institutions are picking up a dollar for the cartels at this stage and we can prove it, then they’re engaged in terrorism financing.”

Asher also pointed to marijuana trafficking from Canada into the United States—not as a separate criminal enterprise, but as part of the same transnational fentanyl networks. He said Chinese Triads, with ties to the Chinese Communist Party, sit atop this narcotics pyramid and are exploiting Canada’s legal marijuana system.

“The illegal pot—marijuana from Canada that comes into the New York State tri-state area and into the Pacific Northwest states of the United States is huge. And now we’re seeing the integration of fentanyl into marijuana in some cases.”

The flow of narcotics south and criminal proceeds north continues largely unabated, Asher warned, with superlabs in British Columbia and other areas of Canada producing meth, ecstasy, and fentanyl.

On Canada’s enforcement efforts and the outcomes of official inquiries into Chinese criminal and influence networks, Asher was scathing: “What have you done to follow up on [the Cullen Commission]? Nothing. And then you had this Hogue inquiry about Chinese influence in politics. What have you done about that? It looks to me like practically nothing.”

He called on Canada to show resolve on investigations that impact the United States: “Frankly, one of the first things you still need to do is: why is TD Bank Canada not being charged? And do we have charges against some of the executives, whether they’ve been publicly named or not?”

His core message is that Canada must shake off legal and political inertia:
 
Further to @brihard




Essentially we are giving ammunition to Trump re drug trafficking.

Ugh. Lots of issues there.

I’m not sure what Asher’s or McGregor’s background in criminal intelligence was, but it’s clear they received minimal
professional development in disclosure requirements. The laying of terrorism or other national security charges doesn’t change Stinchcombe obligations whatsoever. Terrorism or other national security prosecutions still require disclosure of all relevant material. The mechanisms to protect sensitive information are those I previously described under section 38 of the Canada Evidence Act. Stinchcombe is a Supreme Court decision; we don’t get to simply throw it out.

The terrorism designation is overblown in significance. We have a statute called the Proceeds of Crome (Money Laundering) and Terrorist Financing Act. It’s the statute that empowers FINTRAC. Thing is, there are already plenty of offences and authorities pertaining to organized crime and money laundering terrorist financing is basically just a different branch of the same powers, but anyone laundering money for cartels or other organized crime groups is already subject to most of the same powers and sanctions, and banks already have reporting obligations. While I expect there’s probably a modest trickle of additional reporting, there’s no game-changer in Canadian criminal law by designating cartels as terrorist groups.

Want to really work this? Train and hire a bunch of forensic accountants, and rebuild a professional stream within RCMP federal policing to work the shit out of financial crime.

But nobody wants to talk about spending money hiring bodies, or sending cops to school for accounting degrees and AML certifications.
 
Ugh. Lots of issues there.

I’m not sure what Asher’s or McGregor’s background in criminal intelligence was, but it’s clear they received minimal
professional development in disclosure requirements. The laying of terrorism or other national security charges doesn’t change Stinchcombe obligations whatsoever. Terrorism or other national security prosecutions still require disclosure of all relevant material. The mechanisms to protect sensitive information are those I previously described under section 38 of the Canada Evidence Act. Stinchcombe is a Supreme Court decision; we don’t get to simply throw it out.

The terrorism designation is overblown in significance. We have a statute called the Proceeds of Crome (Money Laundering) and Terrorist Financing Act. It’s the statute that empowers FINTRAC. Thing is, there are already plenty of offences and authorities pertaining to organized crime and money laundering terrorist financing is basically just a different branch of the same powers, but anyone laundering money for cartels or other organized crime groups is already subject to most of the same powers and sanctions, and banks already have reporting obligations. While I expect there’s probably a modest trickle of additional reporting, there’s no game-changer in Canadian criminal law by designating cartels as terrorist groups.

Want to really work this? Train and hire a bunch of forensic accountants, and rebuild a professional stream within RCMP federal policing to work the shit out of financial crime.

But nobody wants to talk about spending money hiring bodies, or sending cops to school for accounting degrees and AML certifications.

The question, I think, is not so much if Canada does or does not follow suit on terrorist financing as what happens if the US decides to deregister/delegitimize Canadian Banks in the US.

I'll assume there would be pain in America. I am not sure that that is considered a deterrent these days.

PS

Stinchcombe is a Supreme Court decision; we don’t get to simply throw it out.

Notwithstanding and all...... Parliament does. If it so chooses.
 
The question, I think, is not so much if Canada does or does not follow suit on terrorist financing as what happens if the US decides to deregister/delegitimize Canadian Banks in the US.

I'll assume there would be pain in America. I am not sure that that is considered a deterrent these days.

PS



Notwithstanding and all...... Parliament does.
No, the ultimate economic execution is a Treasury Department OFAC listing that cuts an institution off from transacting using the U.S. dollar.

Canada didn’t even need to list any entities ourselves; banks will bend over backwards to avoid these consequences and will play ball with U.S. designations and sanctions.
 
Further to @brihard




Essentially we are giving ammunition to Trump re drug trafficking.
I’m sure Asher is a smart guy and knows what he’s talking about, but it’s increasingly being made clear to me that he doesn’t have as much influence in this Trump Administration as we’re being led to believe. If he was, we would be hearing this non-stop and in great detail from Washington. As it is now, they are giving us a different reason everyday for why they’re coming after us, and at no time has the White House given a detailed briefing on our organized crime problem. The most detail they’ve ever given was “fentanyl is flooding across the border” with nothing to back this up.
 
Notwithstanding and all...... Parliament does. If it so chooses.
The 'notwithstanding clause' is an attachment to new legislation. It can't wave away existing law and its related rulings. Unless the government wrote an entire field of new law related to search, seizure, substantive law (offences), procedural law and on and on, the Clause would be of little value.
 
The 'notwithstanding clause' is an attachment to new legislation. It can't wave away existing law and its related rulings. Unless the government wrote an entire field of new law related to search, seizure, substantive law (offences), procedural law and on and on, the Clause would be of little value.
Right. You can’t simply introduce the notwithstanding clause as a motion in court. You have to draft new law that uses it, and you have to renew it every five years. Which would mean a bunch of prosecutions would start with complete uncertainty about whether the rule set will completely change in the course of things.

As I suggested a couple days ago, the best bet might be legislative reform of prosecutions for certain national security offences in order to invoke judicial processes that allow for better protected use of evidence for which a privilege claim is made under s. 38 of the Canada Evidence Act. If crafter to be limited in scope and application, and to be minimally impairing of rights with a proportionate balance, it could be doable as a s.1 ‘reasonable limitation’ of the Charter. Parliament and Department of Justice would really have to have their shit together though.
 
Parliament and Department of Justice would really have to have their shit together though.
That's the hard part; the DoJ drafters are really good, but also extremely short handed with a lot of unreasonable demands from MPs. My wife used to work adjacent to that section and their workload is nuts.

Interestingly, they tend to draft the legislation in French, because it's more precise, then translate it into English (and compare the two for discrepancies), so it's a very bilingual section.
 
Back
Top