SCC File No.: 35298 IN THE SUPREME COURT OF CANADA (ON APPEAL FROM THE COURT OF APPEAL FOR ONTARIO) BETWEEN: KEVIN FEARON APPELLANT (Appellant) -andHER MAJESTY THE QUEEN RESPONDENT (Respondent) FACTUM OF THE APPELLANT (KEVIN FEARON, APPELLANT) (Pursuant to Rule 42 of the Rules of the Supreme Court of Canada) SAM GOLDSTEIN 880 Broadview Avenue Toronto, ON M4K 2R1 SUPREME ADVOCACY LLP 340 Gilmour Street, Suite 100 Ottawa, ON K2P 0R3 Sam Goldstein Shelley Flam Tel.: (416) 927 1211 Fax: (416) 960 4671 Email: [email protected] Marie-France Major Thomas Slade Tel.: (613) 695-8855 Fax: (613) 695-8580 Email: [email protected] [email protected] Counsel for the Applicant, Kevin Fearon Ottawa Agent for Counsel for the Applicant, Kevin Fearon ATTORNEY GENERAL OF ONTARIO 720 Bay St. , 10th Flr. Toronto, Ontario M5G 2K1 BURKE ROBERTSON LLP 441 MacLaren Street, Suite 200 Ottawa, ON K2P 2H3 Randy Schwartz Tel.: (416) 326-4586 Fax: (416) 326-4656 Email: [email protected] Robert E. Houston, Q.C. Tel: (613) 236-9665 Fax: (613) 233-4195 Email: [email protected] Counsel for the Respondent, Her Majesty the Queen Ottawa Agent for the Counsel for the Respondent, Her Majesty the Queen TABLE OF CONTENTS PART I – OVERVIEW AND STATEMENT OF FACTS .........................................................1 THE EVIDENCE AT TRIAL....................................................................................................3 THE JUDICIAL HISTORY ......................................................................................................6 Trial Level ............................................................................................................................6 On Appeal ............................................................................................................................8 STATEMENT OF THE LAW .................................................................................................10 The Law on SITA ..............................................................................................................10 The State of the Law of SITA in Canada and its Extension to Cell-phones ......................11 PART II –STATEMENT OF ISSUES .......................................................................................16 PART III – STATEMENT OF ARGUMENT...........................................................................16 A. Should the traditional SITA framework as articulated in Caslake be extended to cell-phones? .............................................................................................................17 B. Should the traditional SITA framework be limited by a ‘cursory inspection’ in order to save a traditional SITA from offending Section 8 of the Charter? ................22 C. Did the SITA of Mr. Fearon’s cell-phone breach section 8 of the Charter? ................29 PART IV – SUBMISSION ON COSTS .....................................................................................31 PART V – ORDER REQUESTED.............................................................................................31 PART VI – TABLE OF AUTHORITIES ..................................................................................32 PART VII – STATUTORY PROVISIONS ...............................................................................33 “The task of adapting laws that were a product of the 1970s to a world of smartphones and social networks is a challenging and profoundly important one.” R v. TELUS Communications Co., 2013 SCC 16 found at paragraph. 53. PART I – OVERVIEW AND STATEMENT OF FACTS 1 1. In this appeal, the digital-age meets the law of search incident to arrest. The encounter raises a novel issue: does the traditional framework for a search incident to arrest require some updating in order to protect the unique privacy interests that are at stake in seizures and searches of cell-phones found on arrested persons? The traditional legal framework holds that a police officer can lawfully search, without warrant, any receptacles, such as a bag, purse, or briefcase, found on, or reasonably near an arrested person, within a reasonable duration of time after the arrest, as long as the officer has grounds to believe that the warrantless search may result in evidence of the crime for which the person is being arrested. The question before this Court is whether this framework is appropriate for cell-phone searches; in short, should the law of search incident to arrest treat a cell-phone as if it were a bag, purse, or briefcase? 2. In the appellant’s view, it should not because all cell-phones are sui generis. They differ in important ways from the receptacles governed by the traditional framework and cell-phone searches incident to arrest give rise to particular privacy concerns that are not sufficiently addressed by that framework. 3. Moreover, even an elaboration of the traditional framework that limit searches of cell phones incident to arrest to cursory inspections before then requiring a warrant assume that a police officer can take into account the privacy interests that might be compromised by the warrantless search of a cell-phone found on or near that person. This can only be assured if, as this Court has expressed, a search has pre-authorization. 4. In practical terms, the requirement of prior authorization means that if police intend to search a cell-phone found on or near a person they are permitted to seize it but then they must satisfy an authorizing justice that they have grounds to believe that they will discover the things 1 This Court granted leave to appeal in this case on the limited issue of the cell-phone search. 2 for which they are looking. The appellant allows for only one exception to this general rule and that is if there are exigent circumstances. In that circumstance, the police are permitted to seize and search a cell-phone incident to arrest. In this one circumstance, a post hoc justification before a trial judge is reasonable. 5. The traditional framework dates back to 1998, in R. v. Caslake 2, when this Court last looked at searches incident to arrest (SITA). Interestingly, back then it too was for the purpose of updating SITAs but at that time it was to update them in order to conform to the privacy interests as guaranteed by section 8 of the Charter. Previously, the law of SITA had been governed by the common law as articulated in this Court’s decision in Cloutier v. Langlois 3. In the ensuing 15 years since Caslake, courts have extended the framework in that decision to various receptacles found by the police on an arrested person such as bags, purses and briefcases. 6. However, the appellant argues that the Caslake framework for a SITA cannot be extended to cell-phones because the privacy interests in searches of cell-phones are markedly different from those at stake in searches of receptacles such bags, purses, and briefcases. This is for the identical reasons that this Court arrived at in R v. Vu 4 in differentiating the privacy interests involved in computer searches from the privacy interests involved in searches of “cupboards and filing cabinets”. 7. Cell-phone searches potentially give police access to vast amounts of information in digital form that a user may want to keep private and that the user cannot control, that they may not even be aware of, or may have chosen to discard which may not be, in any meaningful sense, located in the place of the search. 8. A ‘cursory inspection’ will always risk the problem of over-breadth. Digital information cannot be easily extracted from a cell-phone nor can it be easily seen. An officer must enter each various function of a phone or each different application to search for evidence. This is 2 [1998] 1 SCR 51 [Book of Authorities (“BA”) Tab 4] [1990] 1 SCR 158 [BA Tab 1] 4 R v. Vu, [2013] SCC 60 [BA Tab 22] 3 3 unlike a police officer momentarily opening a briefcase, peeking inside, and quickly snatching a notebook. 9. Moreover, cell-phones reduce the urgency to search without a warrant because digital information is not perishable and it cannot harm an officer. In other words, cell-phones minimize law enforcement reasons that otherwise save warrantless searches incident to arrest from offending section 8 of the Charter. 10. This Factum will turn now to the evidence before the trial judge in this case followed by the judicial history of this case. THE EVIDENCE AT TRIAL 11. The learned trial judge, Justice Oleskiw of the Ontario Court of Justice, made the following findings of fact regarding the search of Mr. Fearon’s cell-phone: 5 15 At 9:01 p.m., Sgt. Hicks and P.C. Ge were the first officers to arrive on scene near 3390 Keele to assist Reynolds. Sgt. Hicks was a road sergeant with the Community Response Unit at 31 Division. He monitored the radio call about the robbery occurrence and had already attended at two other locations to investigate the robbery prior to arriving at 3390 Keele. 16 Hicks also monitored the radio call from Reynolds indicating that Reynolds required back up because he was on his own on foot following two males matching the description of the robbery occurrence and that he had some information that they may be related to the call. 17 Hicks received information from Reynolds and then Hicks and Ge spoke with Mr. Fearon while Reynolds dealt with Mr. Chapman. Hicks advised Fearon that he was being investigated "because we have information that they may be related to the incident and we had other information that officers had just seized a vehicle a short distance away ... that was being secured that may have had evidence in it and that it was all in close proximity and we wanted to investigate to see if they had any involvement in that." 18 Hicks advised Fearon that he was being detained for armed robbery in the area and he had a conversation with Fearon about his whereabouts in the last part of the day. Other uniformed officers came on scene and the holdup officers also arrived. Detectives Nicol and Abdel-Malik had a conversation with Reynolds after which Reynolds advised Hicks that both males are arrestable. 5 R v. Fearon, [2010] O.J. No. 5745 [Appellant’s Record (“AR”) Tab 2]. 4 19 At 9:15 p.m. Hicks placed Fearon under arrest and read his rights to counsel. Officer Ge placed Fearon in handcuffs and escorted him to the police vehicle. Hicks then conducted a pat down search of Mr. Fearon "for the purposes of safety and for possible evidence". This search was conducted on the sidewalk. At this time Sgt. Hicks located a black and silver TELUS cell-phone, model LG285 in Mr. Fearon's right front pants pocket. 20 Once Hicks had the phone from the pocket and finished the search, he "had a look through the cell-phone, saw some things in that cell-phone, and seized it at that point in time as evidence in relation to the investigation". He could not recall specifics, but believed that he found some photos in the cell-phone at the time, including photos of males and a photo of a gun. 21 Hicks testified that the cell-phone was "on" when he flipped it open to look at the contents. He was looking to see if there was any evidence that might be on there, so he could take it under control for himself or to let somebody else know who may be doing the investigation that there are things on that phone that may be related to their ongoing investigation. 22 He explained that he manipulated the keypad to the extent that he entered into different modes to access text messages and photographs on the phone. There is no suggestion in the evidence that any of the information Sgt. Hicks accessed was protected by passwords or other encryption or security protection. 23 Sgt. Hick's examination of the phone occurred at the scene of the arrest, outside of the police van. Mr. Fearon was placed in the police van at 9:24 and they arrived at 31 Division at 9:29 p.m. Hicks believed there were calls coming in to the phone during transport. 24 Sgt. Hicks kept the cell-phone in his pocket during transport to 31 Division and he kept custody of it until approximately 10:48 p.m. At that time, he showed the contents to Abdel-Malik. Hicks had the phone open and the text message on the screen read: "We did it were the jewlery at nigga burrrrrrrrrrr". At this time, Abdel-Malik immediately wanted to know if the message had been sent to anyone because it would assist in the investigation. When he tried to look at the options, a screen came up asking if he would like to save this. Abdel-Malik hit "save" and concluded that the message had not been sent yet. By hitting "save", he intended to save the message in the memory of the phone so they would not lose it. Then, he did "some quick checks" to see if it had been sent to anybody else and then gave the phone back to Sgt. Hicks when it appeared that it was not going to give them an immediate lead. Abdel-Malik estimated that he inspected the cell-phone for approximately two minutes at this time. 25 Hicks, Abdel-Malik and Nicol inspected the contents of the cell-phone a few times throughout the night when other information led them to believe that there should be more relevant information in the phone. At 1:18 a.m., Adbel-Malik looked into the phone again after learning that there was third suspect who went by the name of "Swipes" and that his contact number should be in the cell-phone. Further, just before 2:50 a.m., officers were directed to check some of the phone 5 numbers called by Mr. Fearon to see if they led to possible associates including the then unidentified "Swipes". 26 According to Detective Nicol, all inspection of the cell-phone on July 26, 2010 was done at his direction or with his approval. He would have made Hicks aware that they were interested in the contents of the cell-phone and left AbdelMalik to inspect the contents of the cell-phone as he is more technically savvy. According to Nicol, he requested Hicks and Abdel-Malik to look through the cellphone to see if there was any contact information that could lead to the identity of the outstanding suspect or information leading to the outstanding firearm or jewelry. He stated that the cell phone might have text messages or last calls that would indicate persons they communicated with shortly after the robbery. Dtc. Nicol explained: … based on any text messages sent between them and a party assisting them in hiding or moving stolen property, that would be something I'd want to know right away so I could attempt to recover that evidence. If there was other messages indicating locations and where they went after the robbery that would be something I'd want to know because those are places I'd want to investigate to see if there was evidence being jewelry or firearms, clothing worn by the suspects, anything left behind at those addresses would be places that we'd have to attend. Also, based on my experience, people take photographs of things they steal, places that they go, targets of their offences. 27 Detective Nicol explained that he did not believe that he needed a warrant at the time of July 26 and 27 searches of the content of the cell-phone because: It's still an investigation where I'm looking for jewelry, I'm looking for outstanding suspects, I'm looking for the gun that's outstanding, and I have concerns that those items might go missing, destroyed and then I have the chance to recover those items, that I'm able to look through that phone and ensure that there's anything there to assist my investigation at the time, I can use that information ...... it's property that they can move very quickly, be sold very quickly, hidden any number of things that can happen to it and you have to act quickly in order to recover it. 28 The cell-phone was put away and submitted to the Technological Crime Forensics Lab for safekeeping on September 21, 2009. 29 On February 9, 2010, Detective Nicol obtained warrant to search and download the information from the cell-phone. The Information to obtain the warrant discloses the previous searches of cell-phone. Nicol testified that he applied for a warrant in February 2010 because, at some point after this investigation, he was told that there was a court decision that said that you now need a search warrant to download and search phones. Although they used to submit phones to the Technological Crime Unit for searches without a warrant, after learning of this court decision, he believed that he could not submit the phone to the Unit for downloading without a warrant. 6 30 A warrant was granted on February 9, 2010 to search the contents of the cell-phone, including, (a) call data; (b) SMS (text) data; (c) Email data; (d) Photographs; (e) Contact lists. It is common ground that the photographs and text message originally viewed by Sgt. Hicks are the same items obtained as a result of the search warrants and sought to be admitted. THE JUDICIAL HISTORY Trial level: 12. Trial counsel for Mr. Fearon argued that the two searches of Mr. Fearon’s cell-phone (the search at the scene of his arrest and the search back at the station) were not limited cursory inspections on the facts; or, in the alternative, in law, that the warrantless ‘cursory inspection’ was a breach of the defendant’s Section 8 Charter right. 6 Both of these arguments required the trial judge to accepting that Justice Trafford of the Ontario Superior Court’s obiter dicta in Polius 7 elaborating that a Caslake SITA included a limited ‘cursory inspection’ should be the state of the law in Ontario when it came to extending the traditional SITA framework to cellphones. Crown counsel argued that cell-phones had no higher expectation of privacy than any receptacle. The fundamental issue before the trial court was should the traditional framework for a SITA, as articulated in Caslake itself, be extended to a cell-phone. In other words, should a search of a cell-phone be treated any differently than any other search of a receptacle-like item? 13. In Fearon, her Honour determined the first warrantless search of the cell-phone conducted by Sgt. Hicks at the scene of Mr. Fearon’s arrest was properly within the traditional Caslake framework. Mindful of the shifting legal ground beneath her, she distinguished the case before her from Polius on the basis that Sergeant Hicks was justified in his belief that a search of Mr. Fearon’s cell-phone would contain evidence relevant to armed robbery for which Mr. Fearon was being arrested. This was unlike the arresting officer in Polius who did not have a reasonable basis to believe the cell-phone belonging to Mr. Polius contained evidence of his crime. I find that Sgt. Hicks was justified in his belief that the cell-phone may contain evidence relevant to the armed robbery for which Mr. Fearon was arrested. Sgt. Hicks had been investigating other aspects of the robbery since the radio call at 6:23p.m. Prior to arriving at 3390 Keele Street, he knew that Reynolds needed 6 It was argued that if the Court found that the SITA was unlawful for any reason then the search pursuant to the search warrant must also fail. 7 R. v. Polius, [2009] O.J. No. 3074 [BA Tab 18] 7 assistance with two suspects who matched the description of the robbery occurrence. By the time he received direction to arrest Mr. Fearon for armed robbery at 9:15 p.m. he also knew: (1) that more than one perpetrator committed the robbery; (2) approximately three hours elapsed since the robbery; and, (3) there was a gun or imitation gun involved in the robbery. In these circumstances, I find there was a reasonable prospect of securing evidence of the offence for which the accused was being arrested in searching the contents of the cell-phone. In particular, it was reasonable for Sgt. Hicks to believe that the arrestee, Mr. Fearon, may have had communication through the cell-phone before, during or after the robbery with other perpetrators of with third parties. His search of the phone at the arrest scene was brief and cursory. There is no suggestion that this was an expansive or abusive search. 8 14. Justice Oleskiw again distinguished Polius from the facts before her in analyzing the second search back at the police station, finding that the second search too was consistent with the law of search incident to arrest as articulated in Caslake alone 9: I also find that the further searches of the phone at the station over the night of July 26 and morning of July 27 were also properly incident to arrest. Although 1 1/2 hours had passed since the arrest, Abdel-Malik's saving of the text message at the station was clearly incidental to the arrest as preserving evidence. The further searches, looking for contact names and other information as the investigation developed over the night were also incident to arrest as the officers believed that those searches would assist in their investigation and the eventual prosecution of the arrestee. In particular, Nicol and Abdel- Malik had a reasonable basis to conclude that the contents of the cell-phone could have some evidentiary value. At the time further searches were ordered, Abdel-Malik and Nicol knew that the gun and the jewelry were outstanding. They also learned that a third person was involved and that the contact information for that person should be in Mr. Fearon's cell-phone. Information contained in the cell-phone was reasonably connected to the offence such that one would expect to find some evidence in its contents. The delay and distance from the arrest scene is not significant and does not undermine the close connection between the search and the arrest, particularly when it was, essentially, an extension of Sgt. Hick's search at the arrest scene: Caslake at para. 25; Nolet, 2010 SCC 24 at para. 50. 8 9 R. v. Fearon, [2010] O.J. No. 5745, at para. 43, 44 [AR Tab 2] R. v. Fearon, [2010] O.J. No. 5745, at para. 46 [AR Tab 2] 8 On Appeal: 15. When Justice Oleskiw rendered her decision in Fearon, she did not have the benefit of the analysis of Justice Sharpe of the Ontario Court of Appeal decision in Manley, 10 or the Ontario Superior Court of Justice decision in Liew by Justice Boswell. 11 Both decisions dealing with the SITA of a cell phone were available by the time the Fearon Appeal was argued. Justice Boswell released his s.8 ruling on the search of Mr. Liew’s phone after Justice Oleskiew’s decision, but before the hearing of this case before the Ontario Court of Appeal. Justice Boswell rejected the elaboration of Caslake regarding cell-phones, suggested by Justice Trafford in his obiter dicta in Polius, that permitted a ‘cursory inspection’ of a cell-phone as part of a SITA in favour of requiring a warrant to search a cell-phone absent exigent circumstances. 16. Counsel for the Appellant raised Liew in oral argument at the hearing of the appeal although the Court of Appeal in this case did not refer to it in its decision. 12 Counsel for the interveners (The Criminal Lawyers’ Association “CLA” and Canadian Civil Liberties Association “CCLA”) joined with the Appellant that a Caslake SITA could not be extended to a cell-phone because of the heightened expectation of privacy. Where the CLA and CCLA parted with the Appellant was on the issue of exigent circumstances. The position of the interveners was that a SITA of a cell-phone always required a warrant. Crown Counsels for the provincial and federal government argued that cell-phones had no heightened expectation of privacy and therefore the police should be able to simply search a cell-phone incident to arrest without resorting to a cursory inspection in order to seek a warrant. 17. Justice Armstrong, writing for the Ontario Court of Appeal in Fearon, agreed with the trial judge’s conclusion that both warrantless searchers of cell-phones incident to arrest were no different than a warrantless search of a receptacle. He did not interfere with the trail judge’s assessment that Mr. Fearon’s cell-phone did not attract heightened expectation of privacy 10 R. v. Manley, [2011] ONCA 128 [BA Tab 12]. (Police in possession of information accused had stolen cell-phones. Therefore SITA of cell phone to investigate if cell-phone seized when arrested belonged to accused (or was stolen property) was a lawful SITA.) 11 His Honour released his section 24(2) analysis on May 25, 2012, R. v. Liew, [2012] ONSC 290 [BA Tab 11]. 12 R v. Fearon, [2013] ONCA 106 [AR Tab 4] 9 because it did not have ‘mini-computer’-like capabilities and, he noted, the cell-phone was not password protected. 18. Armstrong J.A. was troubled, however, by the second search back at the police station. His own opinion was that the police ought to have ceased their examination of Mr. Fearon’s phone and obtained a search warrant given that the detective admitted there was no urgency to search the phone and it was not impracticable to seek judicial authorization. In addition, Armstrong, J.A. noted that a telewarrant under s. 487.1 of the Criminal Code was available. 13 However, in the end, Justice Armstrong did not interfere with the trial judge’s finding regarding the second search either. 19. Justice Armstrong addressed the issue of whether a traditional Caslake SITA authority, with respect to cell-phones searches incident to arrest, should be limited to a cursory inspection before requiring a warrant. He too acknowledged that cell-phones potentially had heightened privacy interests because of the quantity of information that resided on them. Therefore, Justice Armstrong did not reject the need to limit a traditional SITA to a cursory inspection pending a warrant to search further. He acknowledged that his brother Sharpe J.A. in Manley had declined to apply Polius. In Manley the Appeal Court in Ontario also had been asked to look at the issue of cell-phone SITA’s. Justice Armstrong noted that his brother Sharpe J.A. was not persuaded Justice Trafford was incorrect. However, Justice Armstrong also acknowledged that Justice Sharpe did not adopt Polius either. Therefore. Justice Armstrong concluded that Manley did not change the law in Ontario. The law in Ontario remained that no warrant was required to search a cell phone incident to arrest. Nonetheless, even if Polius were the law in Ontario, Justice Armstrong found that the two searches of Mr. Fearon’s phone were ‘cursory’ in nature. 20. In summary, the Court of Appeal for Ontario upheld the traditional SITA framework despite acknowledging that digital technology and information were changing the world of privacy expectations. 13 Ibid, found at paragraphs 58 [AR Tab 4]. 10 21. This Factum will discuss next the factors underlying the justification of a search incident to arrest in Canadian law. STATEMENT OF THE LAW The Law on SITA 22. On the night of November 3rd, 1983, Officer Langlois conducted a pat-down frisk of Messier Cloutier after lawfully arresting him for an illegal right-hand turn in the City of Montreal. Mr. Cloutier later had the Officer charged with assault. Officer Langlois’s defence was that the frisk search did not constitute the offence of assault because it was authorized by the common law and it was performed in a reasonable manner. Having weighed the competing interests of the State and the Individual, this Court considered the SITA to be of minimal interference with Mr. Cloutier’s liberty and to be necessary in order for the criminal justice system to function properly. In Cloutier, this Court held: [This Court held the “frisk” search to be a] relatively non-intrusive procedure: outside clothing is patted down to determine whether there is anything on the person of the force is applied. The duration of the search is only a few seconds” 14 (Emphasis added.) The ultimate purpose of criminal proceedings is to convict those found guilty beyond a reasonable doubt. … First, the process of arrest must be capable of ensuring that those arrested will come before the court. … In light of this consideration, a search of the accused for weapons or other dangerous articles is necessary as an elementary precaution to preclude the possibility of their use against the police, the nearby public or the accused himself … Further, the process of arrest must ensure that evidence found on the accused, and in his immediate surroundings is preserved. The effectiveness of the system depends in part on the ability of peace officers to collect evidence that can be used in establishing the guilt of a suspect beyond a reasonable doubt.” 15 (Emphasis added.) 23. This Court revisited SITA, eleven years later, in the context of requiring the Crown to comply with s.8 of the Charter in Caslake. 16 This Court confirmed that, although a SITA is a warrantless search and therefore contrary to the principles set out in Hunter v. Southam, 17 a 14 Cloutier, supra, at 186 [BA Tab 1]. Cloutier, supra, at 182 [BA Tab 1] 16 Caslake, supra [BA Tab 4]. 17 Hunter v. Southam, [1984] 2 S.C.R. 145 [BA Tab 2] 15 11 SITA nevertheless may be constitutional because of the underlying policy objectives: 1) the necessity to search in order to seize immediately identifiable objects for the purposes of evidence and 2) officer safety. It is these underlying law enforcement objectives that compete with the privacy interest enshrined in s.8 of the Charter and that, but for these policy objectives, a warrantless search would infringe section 8 of the Charter. 18 Therefore, the framework in Caslake strikes a fine balance between protecting privacy and the needs of law enforcement. 24. It cannot be stressed more that a SITA is a prima facie breach of a person’s privacy. The burden of proof for justifying a warrantless search falls on the Crown. It is tolerated at common law, however, and considered reasonable by Charter standards, only where the SITA is of minimal intrusion, when it is connected to the reason for the arrest, and when the SITA has an underlying law enforcement objective. It is these limitations that save it from offending the Charter. As Chief Justice Lamer in Southam wrote: In my view, all of the limits on search incident to arrest are derived from the justification for the common law power itself: searches which derive their legal authority from the fact of arrest must truly be incident to arrest in question. The authority for the search does not arise a result of reduced expectations of privacy or the arrested individual. Rather, it arises of a need for the law enforcement authorities to gain control of things or information which outweigh the individual’s interest in privacy. 19 This Factum will now turn to the state of the law in Canada regarding the extension of searches incident to arrest to cell-phones. The State of the Law of SITA in Canada and its Extension to Cell-phones: 25. Over the years, courts gradually have extended the traditional Caslake to receptacles found on or near a person such as a bag 20, purse 21, or briefcase. 22 At the same time that courts have extended Caslake, courts have also upheld s.8 privacy interests by acknowledging that the 18 Hunter v. Southam, supra, at paragraph 33 [BA Tab 2]. Southam, supra, paragraph 17 [BA Tab 2]. 20 R. v. Miller, [2003] O.J. No. 3544 (OCJ) [BA Tab 14] 21 R v. Marten, [2004] B.C.J. No. 2300 [BA Tab 13]. 22 R. v. Mohamad, [2004] O.J. No. 279 [BA Tab 15]. 19 12 SITA authority is not unlimited; that a SITA must be minimally intrusive; 23 that a SITA must truly be a lawful arrest; 24 and, that Courts must factor in the timing of the search and the scope of the surrounding area searched. Each of these factors has been taken into account in concluding whether the Crown can justify a warrantless search 25. 26. This Court has also limited the authority to conduct a warrantless search incident to arrest by narrowly defining law enforcement objectives. In R v. Stillman 26, this Court declined to expand a SITA to permit police to take dental impressions or bodily samples (i.e. hair, blood, saliva or urine) from a person in custody. In doing so, this Court noted at paragraph 49 that “Bodily impressions and samples are usually in no danger of disappearing.” In the absence of the law enforcement objectives, here, evidence preservation, the privacy interest increases the burden to justify the warrantless search on the Crown. 27. Therefore, section 8 rights have always restrained a SITA. The new issue courts are struggling with is the heightened privacy interests in digital technology and digital information. 28. The first notable case to extend the traditional SITA framework to cell phones is R.v. Giles 27 from the British Columbia Superior Court. This case simply extended a SITA to cellphones treating them no differently than any other receptacle such as a purse, bag, or briefcase. The court in Giles opined that if the police can “Seize It” then they can “Search It.” 29. What has received the bulk of judicial consideration to date, and particularly in Ontario, is the Polius “Cursory Inspection” elaboration of Caslake. In this case Mr. Polius’ Blackberry was seized pursuant to SITA for a murder for hire offence. The police officer’s reason for 23 This Court found in R. v. Golden, [2001] S.C.J. No. 81 that strip searches while in the field, by an officer of the opposite sex, absent reasonable grounds of officer safety or exigent circumstances, is unreasonable [BA Tab 6]. 24 R. v. Belnavis, (1996) 107 C.C.C. (3d) 195 (OCA) at 213 found that an arrest for outstanding traffic fines did not justify the search of a trunk of a vehicle [BA Tab 3]. 25 This Court found in Caslake itself that the 6-hour delay in searching the car was not presumptively unreasonable but that a delay can cause a court to draw a negative inference if a proper explanation cannot be provided (in Caslake, the detachment was in a rural part of Manitoba and understaffed). 26 R v. Stillman, [1997] S.C.J. No. 34 [BA Tab 20] 27 R.v. Giles, 2007 BCSC 1147 (CanLII) [BA Tab 5] 13 searching the phone (identification) was not related to that charge. Therefore, Justice Trafford dismissed the issue on the basis that the cell-phone was not lawfully seized -but not before he added that cell-phones do have a heightened expectation of privacy because of the nature of the digital information that resides on a cell-phone. As his Honour explained at paragraph 52 of the decision 28: In my view, a person has, objectively viewed, a reasonable expectation of privacy in the contents of his/her cell phone. … The information in a cell phone, computer or other electronic device may relate to aspects of life that are deeply personal. It may include: * * * * * * * * * * Contacts, including names, addresses, phone numbers, e-mail ad-dresses and other personal information; Internet Explorer, including the history of accessing websites; Calendars; Photographs and videos; Text Messages; Voice Mail Messages; E-mail Messages; Missed Calls; Call Logs; and Call Identification. 53 Many such devices are secured by passwords or PINs. Some such devices also have the capacity to recover deleted information. 54 In "Applying Section 8 in the Digital World: Seizures and Searches", prepared for The 7th Annual Six-Minute Criminal Defence Lawyer, Law Society of Upper Canada, June 2007, Alan D. Gold described the privacy implicated in the seizure and search of a computer, as follows at 3-1 to 3-2: ... (a) computer is a multi-faceted instrumentality without precedent in our society ... it can store immense amounts of information ... it is very likely to store highly private and significant information (about a person) ... their life style, their medical information, their banking information, their social relationships and interests ... a computer is a fastidious record keeper ... (of) an enormous amount of information about what has been stored, what has been deleted, what has been communicated, what internet browsing has taken place, and generally, what activities have taken place or by means of the computer ... 56 Similarly, in R. v. Plant (1994), 84 C.C.C. (3d) 203 (S.C.C.) Sopinka J. said at 213: 28 Polius, supra, at paras. 52, 53, 54, 56 [BA Tab 18] 14 In fostering the underlying values of dignity, integrity and autonomy, it is fitting that s. 8 of the Charter should seek to protect a biographical core of personal information which individuals in a free and democratic society would wish to maintain and control from dissemination to the state. This would include information which tends to reveal intimate details of the lifestyle and personal choices of the individual. 29. Clearly his Honour is of the opinion that the traditional SITA framework of Caslake needed to be limited because there is something fundamentally different about the information residing in cell-phones from the information residing in a receptacle such as a bag, purse or briefcase. Justice Trafford concluded, in passing, that a search of a cell-phone incident to arrest could be saved from offending Section 8 only if an officer was permitted to seize a cell-phone, were then permitted to a cursory inspection in order to objectively ground the officer’s subjective belief that the phone might contain evidence related to an arrest; and then if such a belief were established, then the officer would be required to seek a warrant to continue with a search. 30. In contradistinction to Giles “Seize It – Search It” and Polius “Cursory Inspection”, Justice Boswell’s decision in Liew from the Superior Court of Ontario provides that if an officer has “No Warrant” to search a cell-phone seized on an arrested person there can be “No Search” of that cell-phone unless there are exigent circumstances. His Honour reasoned that digital technology both heightens the expectation of privacy and at the same time minimizes the law enforcement objectives (evidence preservation and officer safety) tipping the balance in Caslake toward requiring a warrant for a cell-phone SITA incident in order not to offend the Charter. 31. Justice Boswell, in Liew, addressed Justice Trafford’s ‘cursory inspection’ elaboration of the traditional SITA framework in Polius. Justice Boswell characterized limiting a SITA to a ‘cursory inspection’ as impractical and unnecessary. Justice Boswell’s decision in Liew, “No Warrant – No Search” in this regard, however has been given no significant judicial consideration. 15 32. In summary, in Ontario, the Court of Appeal, in Manley and Fearon has approved of the Polius “Cursory Inspection” limitation of the traditional SITA framework but the Appeal Court has not adopted it. The law in Ontario, therefore, is consistent with Giles “Seize It – Search It” 33. The Nova Scotia Court of Appeal recently entered the fray with its decision in Hiscoe. 29 Justice Oland, of that Province’s Appeal Court, upheld the trial court’s decision in that case. The Court of Appeal reasoned that the officer’s search of a Blackberry, at the scene of the defendant’s arrest, was consistent with Polius “Cursory Inspection” concept of the traditional SITA framework. Unfortunately, neither the Crown nor the Defence raised Liew “No Warrant – No Search” on Appeal and accordingly, Justice Oland specifically wrote that the Nova Scotia Appeal Court would not consider Liew. 34. Therefore, in Canada there is only one jurisdiction (British Columbia in Giles) that still unreservedly endorses Caslake with respect to a cell-phone SITA. In Ontario, although Caslake remains the status quo, there has been appellate recognition of the heightened expectation of privacy in cell-phones: first in Polius, second in Manley, and lastly in the appeal of this case in Fearon. 35. In extending a Caslake SITA from receptacles to cell-phones, what the above cases, but for Giles, have in common, is that they all compare cell-phones to computers in order to gauge the level of privacy expectation. The comparison is made based on what this Court had to say in R. v. Morelli 30 about the privacy interests at stake in a search of a computer. In these cell-phone cases, therefore, whether to extend the Caslake SITA is a question of whether the cell-phone has ‘mini-computer’ functionality. 36. In addition, and perhaps even more importantly, all cell-phones, like computers, contain biographical core information. 29 30 R. v. Hiscoe, [2013] NSCA 48 [BA Tab 9]. R. v. Morelli, [2010] 1 S.C.R. 253 [BA Tab 16]. 16 37. In reviewing the case law, it is apparent that courts throughout the country are struggling to cast off the thinking that digital technology has the same physical properties as bags, purses or briefcases. As will be discussed later in this Factum, courts further muddy the privacy issue by equating a digital password to an actual lock on a briefcase. 38. Just as this Court, in Vu, found that computers are not receptacles, the appellant argues that neither are cell-phones. In Vu the court applied its reasoning on the facts of the case which involved a search of a ‘smart’-phone and found that Mr. Vu’s cell-phone had a heightened expectation of privacy. Mr. Fearon had a ‘dumb’-phone. What is before this Court is whether the reasoning in Vu regarding the need for a warrant to search a ‘smart’-phone also means that a warrant is required for a ‘smart’-phone SITA; and, if so, whether the reasoning in Vu extends to a ‘dumb’-phones? PART II - STATEMENT OF ISSUES 39. The issues raised in this Appeal are: 1. Should the traditional SITA framework as articulated in Caslake be extended to cellphones? 2. If the answer to the first question is in the negative, then can a ‘cursory inspection’ limitation to the traditional legal framework of a SITA save it from offending Section 8 of the Charter? 3. If the answer to second question is in the negative, then this Court must consider whether the cell-phone evidence is admissible pursuant to section 24(2) of the Charter. PART III – STATEMENT OF ARGUMENT 40. The Appellant answers the above questions by arguing that: 17 1. The traditional SITA framework cannot be extended to cell-phones because cellphones, like computers, are sui generis. 2. A cursory inspection cannot save a warrantless search of a cell-phone because a cursory inspection is impractical, unnecessary, and contrary to the purposive approach to protecting Charter rights. It also fails to appreciate that digital information reduces the importance law enforcement objectives. 3. The cell-phone evidence is not admissible pursuant to s. 24(2) of the Charter because of the extreme infringement on privacy. A. Should the traditional SITA framework as articulated in Caslake be extended to cellphones? 41. The answer to the above question depends on whether this Court accepts that cell-phones, like computers, attract a heightened expectation of privacy. If cell-phones do attract a heightened expectation of privacy, then the Crown can no longer justify a warrantless search because the balance between privacy and law enforcement tips in favour of requiring a warrant in order to comply with s.8 of the Charter. 42. The only case that extends a Caslake SITA to cell-phones is the early British Columbia Supreme Court decision in Giles. This case is archaic in its thinking because it did not attribute a heightened expectation of privacy to a BlackBerry. In the Court’s opinion, the search was comparable to “looking inside a logbook, diary, or notebook found in the same circumstances.” The British Columbia Supreme Court found that neither the capacity for information to be stored on the device, nor the password or double encryption of the device’s network, which that Court accepted, indicated the Blackberry had higher expectation of privacy. The learned B.C. Judge concluded that the warrantless search did not contravene section 8’s privacy protection. 31 43. Giles was decided in 2007 and therefore, the British Columbia Supreme Court did not have the benefit of this Court’s comments on the effects of digital technology and digital information on privacy in such seminal cases as Morelli, R. v. Telus Communication 32, and Vu. If 31 32 Giles, supra, at para. 63 [BA Tab 5]. R. v. Telus Communication [2013] S.C.J. No. 1 [BA Tab 21]. 18 it had, surely the Appeal Court of British Columbia would have reasoned differently in the face of Justice Fish’s meticulous description of the psychological state of a person having his home computer searched by the police and his characterization of the information residing in a computer as highly private: [3] First, police officers enter your home, take possession of your computer, and carry it off for examination in a place unknown and inaccessible to you. There, without supervision or constraint, they scour the entire contents of your hard drive: your emails sent and received; accompanying attachments; your personal notes and correspondence; your meetings and appointments; your medical and financial records; and all other saved documents that you have downloaded, copied, scanned, or created. The police scrutinize as well the electronic roadmap of your cybernetic peregrinations, where you have been and what you appear to have seen on the Internet — generally by design, but sometimes by accident. … [105]… Computers often contain our most intimate correspondence. They contain the details of our financial, medical, and personal situations. They even reveal our specific interests, likes, and propensities, recording in the browsing history and cache files the information we seek out and read, watch, or listen to on the Internet. [106] It is therefore difficult to conceive a s.8 breach with a greater impact on the Charter-protected privacy interests of the accused than occurred in this case. 33 44. In Vu, this Court agreed that “historically cellular phones were far more restricted than computers in terms of the amount of information that they could store, present day phones have capacities that are, for our purposes, equivalent to those of a computer.” This Court concluded that because the trial judge found that Mr. Vu’s phone had a “memory capacity akin to a computer” then this Court would include ‘computer’ to refer to ‘cell-phones.’ This Court, in Vu, listed four reasons for treating computers as sui generis: 34 • Computers store vast amounts of information which reveal our biographical core lives; • Computers are ‘fastidious record keepers’ laying down a digital trail of bred crumbs of where a user has visited. • Computers, as a ‘fastidious record keeper’ mean that deleted files can always be undeleted; and, 33 34 R. v. Morelli, supra, at paras. 3, 105, 106 [BA Tab 16]. Vu, supra, at paragraphs 40 to 44 [BA Tab 22]. 19 • Computers are not stand-alone devices but are connected to other computers; therefore, a search of a computer at one location may result in the search of second or third computer in another location far away. 45. The same above points are true for all cell-phones. Focusing on what rung a cell-phone is on the technological evolutionary ladder - ‘smart’ versus ‘dumb’- misses the important point that it is the nature of the information that is key not necessarily how much information a cell-phone can contain, how fast it can process information, or how many functions/applications it has on it, or whether it is a stand-alone device or connected to he World Wide Web. 35 As long as the nature of the information reveals something about the biographical core of who we are, then that information attracts Section 8 protection. As Justice Sopinka in Plant, as he then was, stated 36: [I]n fostering the underlying values of dignity, integrity and autonomy, it is fitting that s.8 of the Charter should seek to protect a biographical core of personal information which individuals in a free and democratic society would wish to maintain and conform from dissemination to the state. This would include information which tends to reveal intimate details of the lifestyle and personal choices of the individual … 37 (Emphasis added.) 46. Information that reveals something about core biographical history may include: contact history, call duration, or GPS co-ordinates that enable cell towers to triangulate past locations. Even the most basic of phones contain this information. Moreover, even if functional capacity remains a factor in determining the privacy interest in a cell-phone, then this Factum points out that even the most basic of cell-phones, for example Mr. Fearon’s Samsung flip-phone, has more computer power in it than in the computers that ran the Apollo 11 mission. 38 35 In the alternative, if this Court only chooses to attribute higher privacy value to phones with ‘mini’computer functional capacity, then, it is argued that phones such as Blackberries, Iphones, and Androids, including Tablets, have the same level of privacy interest as does a computer. This Court no doubt appreciates that the line between these aforementioned ‘smart’-phones and what traditionally society referred to as home-computers and laptops is quickly blurring. 36 R. v. Plant (1994), 84 C.C.C. (3d) 203 (S.C.C.), at p. 293 [BA Tab 17]. 37 See: Hiscoe, supra, at para. 72 [BA Tab 9]. 38 Burke, Brian, “The Apollo 11 mission’s computers were less powerful than today’s mobile computers” Computer Weekly.Com http://www.computerweekly.com/blogs/editors-blog/2009/07/the-apollo-11missions-compute.html [BA Tab 24]. Indeed, in 1989 Motorola launched the first cellular phone that could fit in a person’s pocket. It weighed 12 ounces and measured 9 inches unfolded. It retailed for between $2,500 and $3,500. Source: Rise of the Mobile Phone, National Post, April 5, 2013 [BA Tab 37]. Furthermore, cell-phones with cameras were not widely introduced until the 2000s. Source WWW.Wikipedia.org/wiki/Camera_phone . In comparison to the cell-phones available previously, Mr. 20 47. Furthermore, even the dumbest of “dumb”-phones has text messaging ability. Indeed, this Court in Telus required that a Part IV warrant be issued (rather than a general warrant) to retrieve text messages because of the similarities this ubiquitous feature has with private communications: For many Canadians, text messaging has become an increasingly popular form of communication. Despite technological differences, text messaging bears several hallmarks of traditional voice communication: it is intended to be conversational, transmission is generally instantaneous, and there is an expectation of privacy in the communication. … Text messaging is, in essence, an electronic conversation. The only practical difference between text messaging and the traditional voice communications is the transmission process. This distinction should not take text messages outside the protection of private communications to which they are entitled in Part VI. Technical differences inherent in new technology should not determine the scope of protection afforded to private communications. … In my view, text messages are private communications and, even if they are stored on a service provider's computer, their prospective production requires authorization under Part VI of the Code. 39 48. Another trait of a cell-phone as a “fastidious record keeper’ is the fact that digital files can always be recovered in even the dumbest of ‘dumb’-phones. As this Court quoted the oftcited American scholar O.S. Kerr at paragraph 43 of Vu 40: [M]arking a file as “deleted” normally does not actually delete the file; operating systems do not “zero out” the zeros and ones associated with that file when it is marked for deletion. Rather, most operating systems merely go to the Master File Table and mark that particular file’s clusters available for future use by other files. If the operating system does not reuse that cluster for another file by the time the computer is analyzed the file marked for deletion will remain undisturbed. Even if another file is assigned to that cluster, a tremendous amount of data often can be recovered from the hard drive’s slack space,” space within a cluster left temporarily unused. It can be accessed by an analyst just like any other file. [p. 542] 49. Furthermore, even the most basic cell-phone is not a stand-alone device even if the cell phone is without Internet capability. The fact is that text messages or phone calls may continue Fearon’s ‘dumb’-phone is a ‘mensa’-phone. 39 Telus, supra, at para. 1 [BA Tab 21]. 40 Vu, supra, at para. 43 [BA Tab 22]. 21 to be received after a cell-phone has been seized. Indeed, Srgt. Hicks believed that Mr. Fearon’s phone continued to receive in-bound calls on the way to the police station. 41 50. Lastly, the fact that all cell-phones are “fastidious record keepers” serves to highlight two important points: 1) when impugned information is being recorded and thereby captured in a cell-phone, the law enforcement objectives articulated in Caslake and Cloutier -evidence preservation and officer safety- actually decrease in importance because of the very nature of digital information. Therefore it is harder to justify why the officer did not obtain a warrant; and, 2) it is doubly harder to justify the lack of a warrant when that decrease in importance of law enforcement objectives now has to compete with the increased expectation of privacy in a cellphone. 51. Therefore, regardless of whether the search of a cell-phone is pursuant to the traditional Caslake framework or it is pursuant to the Polius “Cursory Inspection”, it becomes much harder for the Crown to justify a warrantless search incident to arrest of any cell-phone because even a ‘dumb’-phone is smart enough to keep a record of its contents and preserve evidence. 52. In a different context, for example, as noted in this Factum, in Stillman, the decreased importance of the law enforcement objectives led this Court to find that a the warrantless extraction of DNA samples could not be justified pursuant to a SITA. 53. The requirement for a warrant, absent exigent circumstances, should not be seen as a burden. As Justice Oland of the Nova Scotia Court of Appeal wrote in Hiscoe 42: My response to the Crown's arguments rests on the foundational principles in regard to s. 8 of the Charter. Quite simply, an individual is entitled to Charter protection against unjustified state intrusions upon his or her right to privacy. Warrantless searches are prima facie unreasonable and contrary to s. 8. While searches incident to arrest are an exception, their use is subject to limitations. Given the purpose of s. 8, namely protection against state intrusion upon the right to privacy, it is critical that as much as possible unjustified searches be precluded from occurring in the first place. Allowing such infringements to the right to 41 Found at paragraph 23 of the Statement of the Evidence in Part II of this Factum. Justice Oland in Hiscoe also noted this phenomenon at paragraph 75 [BA Tab 9]. 42 Hiscoe, supra, at para. 69 [BA Tab 9]. 22 privacy to proceed and determining afterward whether or not they were proper is most unsatisfactory. After all, the privacy of the individual cannot be fully restored. Furthermore, the Crown's case and judicial resources may be adversely impacted. As the trial judge in Hiscoe also pointed out 43: [92] Requiring a warrant does not in way (sic) restrict the police in fulfilling their obligation to collect and gather evidence against the accused to prove his guilt. It simply requires them to satisfy an independent and impartial arbitrator that their desire to examine a device that contains potentially very private and personal information is justified albeit to a greater degree than would be required if they were searching incident to arrest. But that is what Justice Dickson found would be an effective way to protect privacy and prevent unreasonable interference with it, which is the purpose of s.8 of the Charter. 54. Absent exigent circumstances, a police officer can always obtain a warrant by forming the grounds to believe that a cell-phone contains evidence relating to an offence for which a person is being arrested, such as a belief formed from the circumstances themselves surrounding the arrest of the person. For example, the officer formed his grounds to search Mr. Fearon’s phone based on the circumstances of the arrest. B. Should the traditional SITA framework be limited by a ‘cursory inspection’ in order to save a traditional SITA from offending Section 8 of the Charter? 54. Justice Trafford of Polius explained what in his view a SITA enabled an officer to do 44: 41 In my view, the power to SITA includes a power to conduct a cursory inspection of an item to determine whether there is a reasonable basis to believe it may be evidence of the crime for which the arrest was made. However, any examination of an item beyond cursory examination of it is not within the scope of the power to SITA. Using other words, the evidentiary value of the item must be reasonably apparent on its face, in the context of all of the information known by the arresting officer. Where the purpose of a SITA is to find evidence of the crime, the standard governing the manner and scope of the search is a "... reasonable prospect of securing evidence ...". See R. v. Caslake, supra, at para. 21. The police "... must be in a position to assess the circumstances of the case so as to determine whether a search meets the underlying objectives ..." of the SITA. See Cloutier v. Langlois, supra, at paras. 60-62. (Emphasis added.) 43 44 R. v. Hiscoe, 2011 NSPC 84 (CanLii), at para. 92 [BA Tab 8]. Polius, supra, at para. 41 [BA Tab 18]. 23 55. In other words, therefore, a SITA gives an officer the authority to conduct a cursory inspection for the purpose of deciding whether there is a reasonable basis to believe that there is evidence of the crime for which the arrest was made. 56. Regarding a SITA of a cell-phone, an officer may not be able to determine the evidentiary value of a cell-phone on its face even in the context of all the information known by the arresting officer. A cursory inspection is an inspection on the face of the item –a plain viewto determine whether there is a reasonable basis to believe there is evidence to be secured; and, if so, then the officer must seek a warrant to search the cell-phone further. 57. Cognizant that at least ‘smart’-phones have a heightened expectation of privacy, his Honour stated in Polius 45: It is the range of privacy interests that may be implicated by the information on the cell phone that leads me to conclude the values underlying s. 8 of the Charter are best cared for by limiting the power to SITA and to seize a cell phone to a power to seize it, where there is a reasonable basis to believe it may contain evidence of the crime, for the purpose of preserving its evidentiary value, pending a search of its content under a search warrant. (Emphasis added.) 58. There are at least five problems with a “Cursory Inspection.” First, if cell-phones have a heightened expectation of privacy then the police should seek a warrant. A warrantless search is a breach of an individual’s s.8 right. The burden should be on the Crown to justify the police action and not on the defendant to show why s.8 rights ought to be protected. 59. Second, the underlying s.8 values of the Charter are not best cared for by limiting a SITA to a ‘cursory inspection.’ The Charter values of heightened privacy interest in cell-phones are best cared for, regarding a SITA of a cell phone, by requiring the police to explain to seek priorjudicial authorization rather than post-judicial approval. 60. Justice Trafford’s elaboration that a SITA includes an ability to cursory inspect a cell- phone means a person’s Charter protection is left entirely in the hands of a police officer because it would be up to the officer to determine when to stop searching the cell-phone. Only if the 45 Polius, supra, at para. 57 [BA Tab 18]. 24 person is charged, does the search reach a presiding judge to determine whether the officer went too far in ‘cursorily’ inspecting the cell-phone after the breach may already have occurred. This post hoc analysis is contrary to the purposive approach to protecting privacy that this Court articulated in Hunter v. Southam. 46 Dickson J., as he then was, discussed how to give effect to the purposive value of the Charter’s section 8 protection. He was of the view that after-the-fact judicial scrutiny had to take place if privacy is valued 47: Such a post facto analysis would, however, be seriously at odds with the purpose of s. 8. That purpose is, as I have said, to protect individuals from unjustified state intrusions upon their privacy. That purpose requires a means of preventing unjustified searches before they happen, not simply of determining, after the fact, whether they ought to have occurred in the first place. This, in my view, can only be accomplished by a system of prior authorization, not one of subsequent validation. A requirement of prior authorization, usually in the form of a valid warrant, has been a consistent prerequisite for a valid search and seizure both at common law and under most statutes. Such a requirement puts the onus on the state to demonstrate the superiority of its interest to that of the individual. As such it accords with the apparent intention of the Charter to prefer, where feasible, the right of the individual to be free from state interference to the interests of the state in advancing its purposes through such interference. I recognize that it may not be reasonable in every instance to insist on prior authorization in order to validate governmental intrusions upon individuals’ expectations of privacy. Nevertheless, where it is feasible to obtain prior authorization, I would hold that such authorization is a precondition for a valid search and seizure.” (Emphasis added.) 61. In Vu, this Court recommitted to the fact that prior-authorizations are the cornerstone of the law of search and seizure. This Court, in Vu, stated that 48: [t]he purpose of the prior authorization process is thus to balance the privacy interest of the individual against the interest of the state in investigating criminal activity before the state intrusion occurs. 62. A farmer would not rely on a fox to report on the security of his chickens. Yet, this is what this Court is asked to do. Leaving it to the police to determine the permissible extent of a 46 Hunter v. Southam, supra [BA Tab 2]. Hunter v. Southam, supra, at paras. 27-29 [BA Tab 2]. 48 Vu, supra, at para. 46 [BA Tab 22]. 47 25 search opens a SITA to abuse. Consider that many arrests never lead to charges. For example, more than 1,100 people were arrested at the G20 Summit in Toronto in 2010. A SITA right to cursory inspection would have allowed the police to rummage through the devices of each of those 1,100 persons regardless of whether charges had been sworn. 49 63. Indeed, this Court must take judicial cognizance of the social-political context in which a cursory inspection would likely take place. There is already a problem in the City of Toronto with City police ‘carding’ individuals, usually young black men. The practice is controversial. Trafford J.’s elaboration that a SITA includes a power to cursory inspect a cell phone would give the police one more power to harass an already marginalized segment of society. 64. Third, Justice Trafford’s elaboration that the right to SITA includes a right to cursorily inspect is arguably unnecessary. [T]he reasonable prospect standard is a low threshold. In my view, based on the nature and circumstances of a given offence, it should be possible for the police to form the reasonable belief in the prospect that a phone will contain evidence of an offence without having to view its contents. An encroachment on privacy cannot be used to justify itself. Indeed a system permitting after-the-fact justification “runs the risk of countenancing an unlimited number of unjustified encroachments. 50 In other words, an officer does not need actually to peek at a cell-phone in order to satisfy himself that the cell-phone might contain evidence as an officer might do in the examples Justice Trafford in Polius 51. All of his examples are self-evident. For example, Justice Oleskiw found that the circumstances of the case justified the officer’s belief that Mr. Fearon’s cell-phone contained evidence of the crime Mr. Fearon was being arrested of and not from the officer’s cursory inspection of the phone. 52 65. A fourth problem is that Justice Trafford’s concept of a ‘cursory inspection’ is a legal chimera. The use of modifiers such as the words ‘cursory’ or ‘limited’ give little direction to 49 Toronto Police Services, “After Action Review” (June 2011), p. 46 [BA Tab 40]. Liew, supra, at para. 137 [BA Tab 11]. 51 Polius, supra, at paras. 42-45 [BA Tab 18.] 52 R v. Fearon, [2013] ONCA 106, at para. 43 [AR Tab 4]. 50 26 police officers. By any other name, a SITA remains an open-ended power to search all the stored data in any cell-phone found in the possession of an arrested person, since it is not clear when a cursory inspection becomes an unreasonable search: i.e., what are the limitations to a cursory inspection? Should the police be limited in looking at text messages? How many? What about photographs? How many? What about the record of recent calls, contact names, saved past calendar appointments or future scheduled events, websites visited or twitter feeds, or even voice mails? Indeed, during the trial before Justice Boswell in Liew he asked the above questions. What he found was that “five experienced counsel and highly competent counsel” struggled to provide him with a definition of what a cursory inspection meant. 66. Fifth, the concept of a cursory inspection works within the assumption those cell-phones are physically no different than any other physical receptacle such as a bag, purses or briefcase. Indeed, perhaps a better paradigm to think about computers and cell-phones is to recognize that both are digital technologies on which resides digital information. In this regard in Vu this Court rejected comparing the search of digital technology, a computer, to the search of an actual filing cabinet, in part, because of the networking capabilities of a computer did not make it a standalone object. The same has been argued of all cell-phones. 67. There is another reason why the comparison from computer to filing cabinet is not appropriate. A physical search of a computer/cell-phone conjures the image, for example, of a police officer rummaging through each drawer of a filing cabinet. This image is misleading. As one American author has put it: The government in Carey suggested that a computer is like a file cabinet –a form of container. In order to search a file cabinet, it is necessary to open each file drawer, regardless of labels, in order to discover the contents. The court rejected this metaphor: [B]ecause this case involves images stored in a computer, the file cabinet analogy may be inadequate. “Since electronic storage is likely to contain a greater quantity and variety of information than any previous storage method, computers make tempting targets in searches for incriminating information.” Relying on analogies to closed containers or file cabinets may lead courts to “oversimplifying a complex area of Fourth Amendment doctrines and ignore the realities of massive modern computer storage. 53 53 “Doctrinal Collapse: Smart Phones Cause Courts to Reconsider Fourth Amendment Searches of 27 68. The physical analogy oversimplifies our concept of a cursory inspection because a cell- phone does not offer a plain view like a briefcase into which an officer can take a ‘quick peek’ inside to look for a bag of marijuana or an actual notebook. Respectfully, Justice Trafford is incorrect when he states that “a cell phone is the functional equivalent of a locked briefcase 54.” It is this failure to fully appreciate the suis generis characteristic of digital technology and digital information that leads the learned jurist to thinking that a cursory inspection –the functional and practical equivalent to a plain view doctrine of a quick peek inside a receptacle- can save a SITA from offending Section 8 of the Charter. The underlying assumption of a cursory search is that evidence is easily identifiable on a ‘plain view’ basis. Evidence that “falls into view of an officer who has the right to be in the position he is in to have the view he has had” 55 can be seized. However, in order to “open” a cell-phone, a police officer must activate it and then ‘open’ each function or application. As a result of how this is accomplished on a cell-phone, a police officer might search through the full contents of a phone before finding possible evidence related to the arrest. In the meantime, that officer may well have looked through the arrested person’s entire voice emails, text messages, photo album, other digital files from the past, or the officer might retain the phone for a period of time and wait to see what information the phone receives. 56 69. An analogy can be made to R v. Law 57 in which an officer removed documents from an opened safe that had been abandoned in a field by thieves. The discussion turned on whether the police conduct was reasonable. This Court rejected the Crown’s justification that the search was justified on the basis that the retrieved documents were in plain view 58: [27] The respondent attempts to rely on the plain view doctrine, arguing that evidence that comes within the view of a “lawfully positioned” officer may be admissible if it is discovered inadvertently … In this case I agree with McKee Prov. Ct. J. that the incriminating evidence was neither immediately obvious to Corporal Desroches nor discovered inadvertently. On the contrary, it came to Elctronic Devices” by Joshua A. Engle, page 250, 41 U. Mem. L. Rev. 233 2010-2011 [BA Tab 30]. 54 Polius, supra, at para, 47 [BA Tab 18]. 55 Fontana in the Law of Search and Seizure in Canada (3d) at page 602, found in R v. Spindloe, [2001] S.J. No. 266 at paragraph 25 [BA Tab 19]. 56 In Hiscoe that court acknowledged that the cell-phone in question continued to receive in-coming calls that were part of the ‘data-dump’ and that, therefore, contributed to the problem of the Charter infringing over-breadth of the search. 57 R v. Law, [2002] SCR 227 [BA Tab 10]. 58 Law, supra, at para. 27 [BA Tab 10]. 28 light only after he examined, translated and photocopied several documents. Corporal Desroches admitted there was nothing facially wrong with the documents. He testified they contained a series of numbers and Chinese characters, and that he lacked both accounting expertise and proficiency in Chinese. Not having detected anything incriminating through the unaided use of his senses, Corporal Desroches cannot rely on the plain view doctrine either to establish reasonable and probable grounds to search, or to avoid the requirement of reasonable and probable grounds entirely … (Emphasis added.) 70. Similarly, a SITA, ordinarily ‘lawfully positions’ an officer, but there is nothing ‘immediately obvious’ to see in a cell-phone unless the officer activates the digital device and looks through its various applications and functions -in which case the evidence is not found ‘inadvertently’ by the analysis in Law. 71. This Appeal will set the law for SITAs of cell-phones for the future. Its outcome will directly affect up to 25,543,872 Canadians. 59 That is the exact number of cell-phone users in Canada as of 2011. By the time of the hearing of this Appeal that number will no doubt be higher. Yet, ironically, Mr. Fearon’s phone is increasingly in disuse. An Ipsos Reid 2013 poll indicates that 47 per cent of Canadians use a ‘smart’-phone. 60 It should come as no surprise that the ‘smart’-phones discussed in this Factum are fast being replaced by new and more powerful digital technologies such as tablets that function as ‘mensa’-cell-phones in addition to being portable personal computers. 72. This Court stated in Telus that “[t]he task of adapting laws that were a product of the 1970s to the world of smartphones and social networking is a challenging and profoundly important one 61.” Given that the “world of smartphones and social networking” is changing by the day, this Court is asked to require police officers to seek a warrant to search incident to arrest a cell phone so that the law of today will continue to be relevant for the future. 59 Or 73 per cent of the population according to “Residential Telephone Survey” Statistics Canada 2011 [BA Tab 39] 60 Barbour, Mary Ann, Press Release: “Close to Half of Canadian Now Own a Smartphone”, http://www.ipsos-na.com/news-polls/pressrelease.aspx?id=6005 [BA Tab 23] 61 Telus, supra, at para. 53 [BA Tab 21]. 29 C. Did the SITA of Mr. Fearon’s cell-phone breach section 8 of the Charter? 73. Section 24(2) of the Charter requires that evidence obtained in a manner that infringes the rights of an accused under the Charter be excluded from the trial if it is established that “having regard to all the circumstances, the admission of it in the proceedings would bring the administration of justice into disrepute”. The burden is on the party seeking exclusion to persuade the court that this is the case. In R. v. Grant the Court established that 62: [w]hen faced with an application for exclusion under s. 24(2), a court must assess and balance the effect of admitting the evidence on society’s confidence in the justice system having regard to: (1) the seriousness of the Charter-infringing state conduct (admission may send the message the justice system condones serious state misconduct), (2) the impact of the breach on Charter-protected interests of the accused (admission may send the message that individual rights count for little), and (3) society’s interest in the adjudication of the case on its merits.” 74. Mr. Fearon’s cell-phone was searched three times. The first search took place at the scene of the arrest. The second search took place throughout the night at the police station, and the third search took place a year later by way of warrant. 75. First, if this Court finds that the trial judge characterized the conduct as “not conduct on the serious end of the scale” and that the officers acted in “good faith” given the lack of binding authority on the issue of SITAs of cell-phones, then the breach is not on the serious end of the spectrum; notwithstanding that cell-phones have a heightened expectation of privacy. 76. In addition, there was nothing preventing the officer from obtaining a warrant at that time. Indeed, the Detective admitted, regarding the search back at the station, that there was no urgency to search the phone at the station. 77. Second, in the alternative, if this Court concludes that a SITA is limited to a ‘cursory inspection,’ it is submitted Srgt. Hicks’ search of the cell-phone at the scene of the arrest went beyond a cursory inspection. At trial her Honour found that he searched through the cell-phone 62 R. v. Grant, 2009 SCC 32, at para. 71[BA Tab 7]. 30 first in order to determine whether to seize the phone. According to Polius, a SITA gives an officer the power to seize an item and then to cursorily inspect it for any evidence. In this case, the officer did the reverse. He had not formed the grounds to search the phone until he had already searched it. 78. Moreover, the second search back at the station also went beyond a cursory inspection of the phone. Detective Abdel-Malik spent at least four minutes looking through the cell-phone before passing it over to another officer for that officer to search the phone. Both of these searches must be considered egregious in light of the privacy interests at stake. 79. The s. 24(2) inquiry also requires the Court to consider society’s interest in the adjudication of the case on its merits. The question here is whether the truth-seeking function of the criminal trial process would be better served by admission of the evidence, or by its exclusion. The factors to be considered are the reliability of the evidence, the importance of the evidence to the Crown’s case, and the seriousness of the offence, although both of these considerations have the potential to cut both ways. 80. The trial judge found the text message and photographs retrieved from Mr. Fearon’s phone to be cogent. Nevertheless, in balancing the societal interests in having trials determined on their merits against whether the administration of justice would be brought into disrepute, the balance must favour exclusion. 81. There was significant negative public clamour resulting from the widespread publicity of this case. There were numerous newspaper editorials across the country that expressed the opinion that cell-phones should have a heightened expectation of privacy 63. This same sentiment 63 See for example: Canada – New Media Trend Watch Long Haul Usage Patterns “Mobile Devices” [BA Tab 25]; Canadian Wireless Telecommunications Association, "Wireless phone subscribers in Canada 2011" [BA Tab 26]; Editorial, “ Court wrong to allow police to look into cellphone without warrant,” The Globe and Mail, A14, February 24th, 2013 [BA Tab 27]; Editorial, “Police can search through your cellphone without a warrant” The Gazette, February 21st, 2013 [BA Tab 28]; Editorial, “Police cellphone searches threaten privacy:” Toronto Star, February 25, 2013 [BA Tab 29]; Jones, Allison, “OK for police to search cellphone on arrest if no password: court” The Vancouver Sun article on February 21, 2013 [BA Tab 31]; Jones, Allison, “Phones Can Be Searched If No Password Lock: Ontario Court”, The Huffington Post, posted February 20th, 2013 [BA Tab 32]; “Mobile cellular subscriptions 31 was expressed by the dozens of readers commenting on websites across Canada. On the basis of this informal poll, the criminal trial process would be better served by exclusion. PART IV – SUBMISSION ON COSTS 82. Not applicable. PART V - ORDER REQUESTED 83. The Appellant respectfully requests that this Honourable Court allow the appeal and rule that the search incident to arrest of the cell-phone was an infringement of Section 8 of the Charter and to find that the cell-phone evidence is not admissible. ALL OF WHICH IS RESPECTFULLY SUBMITTED THIS DAY OF NOVEMBER, 2013 ____________________ Sam Goldstein Shelley Flam Counsel for the Appellant (per 100)” World Bank Data 1998 [BA Tab 33]; Reproduction of reader comments posted on-line to the Globe and Mail website in relation to editorial of February 25th, 2013 [BA Tab 34]; Reproduction of reader comments posted on-line to the Toronto Star website in relation to editorial of February 25th, 2013 [BA Tab 35]; Richwood, Lee, “Smartphone users face legal requirement for password protection” Calgary Herald, March 19th 2013 [BA Tab 36]; Shaw, Gillian, “Tablets fastest growing tech gadget In Canada” appearing on-line in the Vancouver Sun, January 17th, 2012 [BA Tab 38] 32 PART VI – TABLE OF AUTHORITIES PARA. Cases 1. Cloutier v. Langlois, [1990] 1 SCR 158 ..................................................................5, 22, 50 2. Hunter v. Southam, [1984] 2 S.C.R. 145 ...............................................................23, 24, 60 3. R. v. Belnavis, (1996) 107 C.C.C. (3d) 195 (OCA) ...........................................................25 4. R. v. Caslake, [1998] 1 SCR 51 ................................................... 5, 6, 12-16, 19, 23, 25, 29 30, 34, 35, 39, 42, 50, 51 5. R. v. Giles, 2007 BCSC 1147 (CanLII) .........................................28, 30, 32, 34, 35, 42, 43 6. R. v. Golden, [2001] S.C.J. No. 81.....................................................................................25 7. R. v. Grant, 2009 SCC 32 ..................................................................................................73 8. R. v. Hiscoe, 2011 NSPC 84 (CanLii) ...............................................................................53 9. R. v. Hiscoe, 2013 NSCA 48............................................................................33, 45, 53, 68 10. R. v. Law, [2002] SCR 227 ..........................................................................................69, 70 11. R. v. Liew, 2012 ONSC 1826 ...............................................................15, 16, 30, 31, 33, 60 12. R. v. Manley, [2011] ONCA 128 .....................................................................15, 19, 32, 34 13. R v. Marten, [2004] B.C.J. No. 2300 .................................................................................25 14. R. v. Miller, [2003] O.J. No. 3544 (OCJ)...........................................................................25 15. R. v. Mohamad, [2004] O.J. No. 279 .................................................................................25 16. R. v. Morelli, [2010] 1 S.C.R. 253 ...............................................................................35, 43 17. R. v. Plant (1994), 84 C.C.C. (3d) 203 (S.C.C.) ...............................................................45 18. R. v. Polius, [2009] O.J. No. 3074 ................................ 12-15, 19, 29-34, 51, 53, 57, 64, 66 19. R. v. Spindloe, [2001] S.J. No. 266 ....................................................................................68 20. R. v. Stillman, [1997] S.C.J. No. 34 ...................................................................................26 21. R. v. TELUS Communications Co., 2013 SCC 16 .................................................43, 47, 72 22. R. v. Vu, [2013] SCC 60...................................................................6, 38, 43, 44, 48, 61, 66 Books and Articles 23. Barbour, Mary Ann, Press Release: “Close to Half of Canadian Now Own a Smartphone”, Ipsos, posted Thursday February 21, 2013 http://www.ipsosna.com/news-polls/pressrelease.aspx?id=6005..................................................................71 24. Burke, Brian, “The Apollo 11 mission’s computers were less powerful than today’s mobile computers”, Computer Weekly.Com, posted July 15, 2009 http://www.computerweekly.com/blogs/editors-blog/2009/07/the-apollo-11missions-compute.html. ....................................................................................................46 33 25. Canada – New Media Trend Watch Long Haul Usage Patterns “Mobile Devices” ..........81 26. Canadian Wireless Telecommunications Association, "Wireless phone subscribers in Canada 2011" ................................................................................................................81 27. Editorial, “Court wrong to allow police to look into cellphone without warrant” The Globe and Mail, A14, February 14th, 2013 .................................................................81 28. Editorial, “Police can search through your cellphone without a warrant” The Gazette, February 21st, 2013. .............................................................................................81 29. Editorial, “Police cellphone searches threaten privacy:” Toronto Star, February 25, 2013..............................................................................................................................81 30. Engel, Joshua A., “Doctrinal Collapse: Smart Phones Cause Courts to Reconsider Fourth Amendment Searches of Electronic Devices”, HeirOnline – University of Memphis Law Review, Vol. 41, 2010-2010 ......................................................................67 31. Jones, Allison, “OK for police to search cellphone on arrest if no password: court” The Vancouver Sun article on February 21, 2013 ...................................................81 32. Jones, Allison, “Phones Can Be Searched If No Password Lock: Ontario Court”, The Huffington Post, posted February 20th, 2013 .............................................................81 33. “Mobile cellular subscriptions (per 100)” World Bank Data 1998. ..................................81 34. Reproduction of reader comments posted on-line to the Globe and Mail website in relation to editorial of February 25th, 2013. .......................................................................81 35. Reproduction of reader comments posted on-line to the Toronto Star website in relation to editorial of February 25th, 2013 ........................................................................81 36. Richwood, Lee, “Smartphone users face legal requirement for password protection” Calgary Herald, March 19th 2013...................................................................81 37. Rise of the Mobile Phone, National Post, April 5, 2013....................................................46 38. Shaw, Gillian, “Tablets fastest growing tech gadget In Canada” appearing on-line in the Vancouver Sun, January 17th, 2012 ..........................................................................81 39. Statistics Canada, “Residential Telephone Service Survey”, previous release, December 2010, last modified, January 9, 2013 ................................................................71 40. Toronto Police Services, “After Action Review” (June 2011) ..........................................62 PART VII – STATUTORY PROVISIONS Charter of Rights and Freedoms, ss. 8, 24(2) Criminal Code of Canada, R.S.C. 1985, c. C-46, s. 487.1 34 Charter of Rights and Freedoms, ss. 8, 24(2) 8. Everyone has the right to be secure against unreasonable search or seizure. 24 (2) Where, in proceedings under subsection (1), a court concludes that evidence was obtained in a manner that infringed or denied any rights or freedoms guaranteed by this Charter, the evidence shall be excluded if it is established that, having regard to all the circumstances, the admission of it in the proceedings would bring the administration of justice into disrepute. 8. Chacun a droit à la protection contre les fouilles, les perquisitions ou les saisies abusives. 24 (2) Lorsque, dans une instance visée au paragraphe (1), le tribunal a conclu que des éléments de preuve ont été obtenus dans des conditions qui portent atteinte aux droits ou libertés garantis par la présente charte, ces éléments de preuve sont écartés s’il est établi, eu égard aux circonstances, que leur utilisation est susceptible de déconsidérer l’administration de la justice. 35 Criminal Code of Canada, R.S.C. 1985, c. C-46, s. 487.1 487.1 (1) Where a peace officer believes that an indictable offence has been committed and that it would be impracticable to appear personally before a justice to make application for a warrant in accordance with section 256 or 487, the peace officer may submit an information on oath by telephone or other means of telecommunication to a justice designated for the purpose by the chief judge of the provincial court having jurisdiction in the matter. (2) An information submitted by telephone or other means of telecommunication, other than a means of telecommunication that produces a writing, shall be on oath and shall be recorded verbatim by the justice, who shall, as soon as practicable, cause to be filed, with the clerk of the court for the territorial division in which the warrant is intended for execution, the record or a transcription of it, certified by the justice as to time, date and contents. (2.1) The justice who receives an information submitted by a means of telecommunication that produces a writing shall, as soon as practicable, cause to be filed, with the clerk of the court for the territorial division in which the warrant is intended for execution, the information certified by the justice as to time and date of receipt. (3) For the purposes of subsection (2), an oath may be administered by telephone or other means of telecommunication. (3.1) A peace officer who uses a means of telecommunication referred to in subsection (2.1) may, instead of swearing an oath, make a statement in writing stating that all matters contained in the information are true to his or her knowledge and belief and such a statement is deemed to be a statement made under oath. (4) An information submitted by telephone or other means of telecommunication shall include (a) a statement of the circumstances that make it impracticable for the peace officer to appear personally before a justice; (b) a statement of the indictable offence alleged, the place or premises to be searched and the items alleged to be liable to seizure; (c) a statement of the peace officer’s grounds for believing that items liable to seizure in respect of the offence alleged will be found in the place or premises to be searched; and (d) a statement as to any prior application for a warrant under this section or any other search warrant, in respect of the same matter, of which the peace officer has knowledge. (5) A justice referred to in subsection (1) who is satisfied that an information submitted by telephone or other means of telecommunication 36 (a) is in respect of an indictable offence and conforms to the requirements of subsection (4), (b) discloses reasonable grounds for dispensing with an information presented personally and in writing, and (c) discloses reasonable grounds, in accordance with subsection 256(1) or paragraph 487(1)(a), (b) or (c), as the case may be, for the issuance of a warrant in respect of an indictable offence, may issue a warrant to a peace officer conferring the same authority respecting search and seizure as may be conferred by a warrant issued by a justice before whom the peace officer appears personally pursuant to subsection 256(1) or 487(1), as the case may be, and may require that the warrant be executed within such time period as the justice may order. (6) Where a justice issues a warrant by telephone or other means of telecommunication, other than a means of telecommunication that produces a writing, (a) the justice shall complete and sign the warrant in Form 5.1, noting on its face the time, date and place of issuance; (b) the peace officer, on the direction of the justice, shall complete, in duplicate, a facsimile of the warrant in Form 5.1, noting on its face the name of the issuing justice and the time, date and place of issuance; and (c) the justice shall, as soon as practicable after the warrant has been issued, cause the warrant to be filed with the clerk of the court for the territorial division in which the warrant is intended for execution. (6.1) Where a justice issues a warrant by a means of telecommunication that produces a writing, (a) the justice shall complete and sign the warrant in Form 5.1, noting on its face the time, date and place of issuance; (b) the justice shall transmit the warrant by the means of telecommunication to the peace officer who submitted the information and the copy of the warrant received by the peace officer is deemed to be a facsimile within the meaning of paragraph (6)(b); (c) the peace officer shall procure another facsimile of the warrant; and (d) the justice shall, as soon as practicable after the warrant has been issued, cause the warrant to be filed with the clerk of the court for the territorial division in which the warrant is intended for execution. 37 (7) A peace officer who executes a warrant issued by telephone or other means of telecommunication, other than a warrant issued pursuant to subsection 256(1), shall, before entering the place or premises to be searched or as soon as practicable thereafter, give a facsimile of the warrant to any person present and ostensibly in control of the place or premises. (8) A peace officer who, in any unoccupied place or premises, executes a warrant issued by telephone or other means of telecommunication, other than a warrant issued pursuant to subsection 256(1), shall, on entering the place or premises or as soon as practicable thereafter, cause a facsimile of the warrant to be suitably affixed in a prominent place within the place or premises. (9) A peace officer to whom a warrant is issued by telephone or other means of telecommunication shall file a written report with the clerk of the court for the territorial division in which the warrant was intended for execution as soon as practicable but within a period not exceeding seven days after the warrant has been executed, which report shall include (a) a statement of the time and date the warrant was executed or, if the warrant was not executed, a statement of the reasons why it was not executed; (b) a statement of the things, if any, that were seized pursuant to the warrant and the location where they are being held; and (c) a statement of the things, if any, that were seized in addition to the things mentioned in the warrant and the location where they are being held, together with a statement of the peace officer’s grounds for believing that those additional things had been obtained by, or used in, the commission of an offence. (10) The clerk of the court shall, as soon as practicable, cause the report, together with the information and the warrant to which it pertains, to be brought before a justice to be dealt with, in respect of the things seized referred to in the report, in the same manner as if the things were seized pursuant to a warrant issued, on an information presented personally by a peace officer, by that justice or another justice for the same territorial division. (11) In any proceeding in which it is material for a court to be satisfied that a search or seizure was authorized by a warrant issued by telephone or other means of telecommunication, the absence of the information or warrant, signed by the justice and carrying on its face a notation of the time, date and place of issuance, is, in the absence of evidence to the contrary, proof that the search or seizure was not authorized by a warrant issued by telephone or other means of telecommunication. (12) A duplicate or a facsimile of an information or a warrant has the same probative force as the original for the purposes of subsection (11). 38 Code Criminel, L.R.C., c. C-46, s. 487.1 487.1 (1) L’agent de la paix qui croit qu’un acte criminel a été commis et considère qu’il serait peu commode de se présenter en personne devant un juge de paix pour y demander un mandat de perquisition en conformité avec l’article 256 ou 487 peut faire, à un juge de paix désigné par le juge en chef de la cour provinciale qui a compétence, une dénonciation sous serment par téléphone ou à l’aide d’un autre moyen de télécommunication. (2) La dénonciation présentée par téléphone ou à l’aide d’un autre moyen de communication qui ne peut rendre la communication sous forme écrite est faite sous serment et consignée mot à mot dans un procès-verbal ou enregistrée mécaniquement par le juge de paix qui, dans les plus brefs délais, fait déposer auprès du greffier du tribunal de la circonscription territoriale où le mandat doit être exécuté le procès-verbal ou une transcription de l’enregistrement de la dénonciation; le juge de paix en certifie le contenu, la date et l’heure. (2.1) Le juge de paix qui reçoit la dénonciation présentée par un moyen de télécommunication qui rend la communication sous forme écrite la fait déposer dans les plus brefs délais auprès du greffier du tribunal de la circonscription territoriale où le mandat doit être exécuté et il certifie la date et l’heure de sa réception. (3) Pour l’application du paragraphe (2), un serment peut être prêté par téléphone ou à l’aide d’un autre moyen de télécommunication. (3.1) L’agent de la paix qui présente une dénonciation de la façon prévue au paragraphe (2.1) peut, au lieu de prêter serment, choisir de faire une déclaration par écrit selon laquelle il croit vrais, au meilleur de sa connaissance, les renseignements contenus dans la dénonciation. Sa déclaration est réputée être faite sous serment. (4) Une dénonciation faite par téléphone ou à l’aide d’un autre moyen de télécommunication comporte les éléments suivants : a) un énoncé des circonstances qui rendent peu commode pour l’agent de la paix de se présenter en personne devant le juge de paix; b) un énoncé de l’acte criminel présumé, des lieux qui doivent faire l’objet de la perquisition et des objets que l’on prétend pouvoir y saisir; c) un énoncé des motifs sur lesquels l’agent de la paix se fonde pour croire que des objets saisissables liés à l’infraction présumée se trouveront dans les lieux à perquisitionner; d) un énoncé des autres demandes de mandat en vertu du présent article ou de tout autre mandat de perquisition qui ont été faites à l’égard de la même affaire et dont l’agent de la paix a connaissance. 39 (5) Le juge de paix visé au paragraphe (1) peut décerner à un agent de la paix un mandat lui accordant les mêmes pouvoirs en matière de perquisition et de saisie que lui accorderait un mandat décerné en vertu du paragraphe 256(1) ou 487(1) à la condition d’être convaincu que la dénonciation faite par téléphone ou à l’aide d’un autre moyen de télécommunication remplit les conditions suivantes : a) elle vise un acte criminel et rencontre les exigences du paragraphe (4); b) elle démontre l’existence de motifs raisonnables pour exempter l’agent de la paix de se présenter en personne et de soumettre sa dénonciation par écrit; c) elle démontre l’existence de motifs raisonnables pour décerner un mandat de perquisition à l’égard d’un acte criminel en conformité avec le paragraphe 256(1) ou les alinéas 487(1)a), b) ou c), selon le cas. Il peut exiger que le mandat soit exécuté dans le délai qu’il fixe. (6) Dans le cas d’un mandat décerné par téléphone ou à l’aide d’un autre moyen de télécommunication qui ne peut rendre la communication sous forme écrite : a) le juge de paix remplit et signe le mandat suivant la formule 5.1; il y indique l’endroit où le mandat est décerné, la date et l’heure; b) l’agent de la paix, sur l’ordre du juge de paix, complète en double exemplaire un fac-similé du mandat selon la formule 5.1; il y indique le nom du juge de paix qui décerne le mandat, le lieu où le mandat est décerné, la date et l’heure; c) le juge de paix, dans les plus brefs délais possible après avoir décerné un mandat, fait déposer le mandat auprès du greffier du tribunal de la circonscription territoriale où le mandat doit être exécuté. (6.1) Dans le cas d’un mandat décerné à l’aide d’un moyen de télécommunication qui rend la communication sous forme écrite : a) le juge de paix remplit et signe le mandat suivant la formule 5.1; il y indique la date, l’heure et l’endroit de sa délivrance; b) il transmet le mandat à l’agent de la paix qui a présenté la dénonciation; la copie que reçoit l’agent de la paix est réputée être un fac-similé au sens de l’alinéa (6)b); c) l’agent de la paix produit un autre fac-similé du mandat; d) le juge de paix, dans les plus brefs délais possible après avoir décerné un mandat, fait déposer celui-ci auprès du greffier du tribunal de la circonscription territoriale où le mandat doit être exécuté. 40 (7) L’agent de la paix qui exécute un mandat de perquisition décerné par téléphone ou à l’aide d’un autre moyen de télécommunication, à l’exception d’un mandat décerné en vertu du paragraphe 256(1), doit, avant de pénétrer dans les lieux à perquisitionner ou dans les plus brefs délais possible par la suite, remettre un fac-similé du mandat à toute personne présente et apparemment responsable des lieux. (8) L’agent de la paix qui exécute dans des lieux inoccupés un mandat de perquisition décerné par téléphone ou à l’aide d’un autre moyen de télécommunication, à l’exception d’un mandat décerné en vertu du paragraphe 256(1), doit, dès qu’il y pénètre ou dans les plus brefs délais possible par la suite, afficher un fac-similé du mandat dans un endroit bien en vue dans le lieu en question. (9) L’agent de la paix à qui un mandat de perquisition a été décerné par téléphone ou à l’aide d’un autre moyen de télécommunication prépare un rapport dans les plus brefs délais possible mais au plus tard dans les sept jours suivant l’exécution du mandat; il dépose son rapport dans le même délai auprès du greffier du tribunal de la circonscription territoriale où le mandat devait être exécuté; le rapport comporte les éléments suivants : a) une indication de la date et de l’heure de son exécution ou, si le mandat n’a pas été exécuté, une explication des raisons pour lesquelles il ne l’a pas été; b) une mention, s’il y a lieu, des choses qui ont été saisies en vertu du mandat et une indication de l’endroit où elles sont gardées; c) une mention, s’il y a lieu, des choses qui ont été saisies mais qui n’étaient pas mentionnées dans le mandat et une indication de l’endroit où elles sont gardées; dans ce cas, l’agent de la paix donne les motifs sur lesquels il se fondait pour croire que ces objets supplémentaires avaient été obtenus par la perpétration d’une infraction ou utilisés dans le cadre de celle-ci. (10) Le greffier du tribunal visé au paragraphe (9) fait remettre dans les plus brefs délais à un juge de paix le rapport, la dénonciation et le mandat qui s’y rattache pour qu’il en soit disposé comme s’il s’agissait d’un mandat décerné par ce juge de paix ou un autre juge de paix de la même circonscription territoriale. (11) Dans des procédures où il importe au tribunal d’être convaincu qu’une perquisition ou une saisie a été autorisée par un mandat décerné par téléphone ou à l’aide d’un autre moyen de télécommunication, l’absence du mandat original ou de la dénonciation signée par le juge de paix et comportant une mention des date, heure et endroit de sa délivrance est, en l’absence de toute preuve contraire, une preuve que la perquisition ou la saisie n’ont pas été correctement autorisées. (12) Les copies ou fac-similés du mandat ou de la dénonciation ont, pour l’application du paragraphe (11), la même force probante que l’original.
© Copyright 2026 Paperzz