Rechercher sur ce blogue

Aucun message portant le libellé Charte - Article 24. Afficher tous les messages
Aucun message portant le libellé Charte - Article 24. Afficher tous les messages

vendredi 27 février 2026

Le cadre juridique applicable à la perte de la preuve par la Poursuite et la discrétion de cette dernière de retirer des accusations

R. v. Burke, 2025 ONCA 619

Lien vers la décision


[10]      Disclosure/Lost Evidence: If the accused shows that relevant evidence has been lost, the Crown must show that loss was not due to unacceptable negligence, failing which a breach of the s. 7 Charter right to disclosure will be found. If the Crown shows that the loss was not due to unacceptable negligence, thereby rebutting this Charter claim, the accused must show actual prejudice to their fair-trial interests or that the loss was caused by an abuse of process to establish a Charter breach: R. v. La1997 CanLII 309 (SCC), [1997] 2 S.C.R. 680; R. v. Bero (2000), 2000 CanLII 16956 (ON CA), 151 C.C.C. (3d) 545 (Ont. C.A.); R. v. Sheng2010 ONCA 296, 254 C.C.C. (3d) 153; R. v. Hersi2019 ONCA 94, 373 C.C.C. (3d) 229, leave to appeal refused, [2021] S.C.C.A. No. 406. Police and Crown are not held to a standard of perfection on the unacceptable negligence issue; reasonableness is assessed contextually at the time of loss, including retention policies and the perceived utility of continued storage.

[11]      Prosecutorial discretion: Decisions to withdraw charges are reviewable only for abuse of process on a proper evidentiary foundation; courts do not “[look] behind the exercise of prosecutorial discretion” absent that foundation: Krieger v. Law Society of Alberta2002 SCC 65, [2002] 3 S.C.R. 372, at para. 46R. v. Anderson2014 SCC 41, [2014] 2 S.C.R. 167.

[12]      Section 24(1) remedy and stays: A stay is only imposed in the “clearest of cases” as a remedy of last resort: R. v. Babos2014 SCC 16, [2014] 1 S.C.R. 309; R. v. Brunelle2024 SCC 3, 488 D.L.R. (4th) 581, at paras. 112–13R. v. Regan2002 SCC 12, [2002] 1 S.C.R. 297; R. v. O’Connor1995 CanLII 51 (SCC), [1995] 4 S.C.R. 411, at para. 69. Where trial fairness and the integrity of the justice system are not materially impaired, alternative remedies suffice (e.g., limiting instructions, tailoring of similar-fact evidence use, weight and credibility adjustments, disassociation of the justice system from the impugned state conduct going forward), a stay is not warranted. If there is any uncertainty concerning the integrity branch, a stay is inappropriate if the balance of interests favours trial: Babos, at paras. 34-44.

[13]      Standard of Review: The trial judge enjoys broad remedial discretion: R. v. Nicholas2017 ONCA 646, 40 C.R. (7th) 83, at paras. 56–58. Appellate intervention is only warranted to correct legal errors, palpable and overriding factual errors, or a failure to exercise discretion judicially: Regan, at para. 117R. v. Bjelland2009 SCC 38, [2009] 2 S.C.R. 651, at para. 15R. v. Bellusci2012 SCC 44, [2012] 2 S.C.R. 509, at para. 17.

jeudi 12 février 2026

Principes régissant les mandats de perquisition et commentaires sur les fouilles d'ordinateurs

R. v Townsend, 2017 ONSC 3435



Warrants

[53]           Prior to examining computer searches, a brief discussion of warrants is of benefit.  The face of the warrant is the document that empowers police to search a particular location for particular evidence:  Re Times Square Book Store and the Queen1985 CanLII 170 (ON CA), 21 C.C.C. (3d) 503; R. v. Parent1989 CanLII 217 (YK CA), 47 C.C.C. (3d) 385; R. v. Ricciardi2017 ONSC 2788R. v. Merritt2017 ONSC 80.  The section of the warrant document known as the “Information to Obtain” provides an issuing justice the grounds to either grant or deny the police the right to search the location described on the face of the warrant for certain evidence.  However, the ITO is not part of the warrant that a searching officer is expected to examine.  Instead, the searching officer is only required to familiarize themselves with the face of the warrant in order to understand the parameters of the search.[4]  As a result of this interplay between the face of the warrant and the ITO, the face of the warrant is expected to satisfy what is known as the “fellow officer” test – that is, would a fellow officer be able to understand the items sought and the location to be searched as a result of reviewing the face of the warrant: R. v. Raferty2012 ONSC 703 at para 103.

[54]           In RicciardiDi Luca J. reviewed the guiding principles dealing with search warrants, searches pursuant thereto, and judicial review thereof. At paragraphs 12 to 17, Di Luca J. reviewed the law regarding the issuing of search warrants. At paragraphs 18 to 20, he then reviewed the law as it applies to the role of the reviewing judge:

                                    On a review, the role of reviewing judge is not substitute his or her view for that of the issuing justice. Rather, the role is to assess whether, on the basis of the material before the issuing justice as amplified and excised on review, the authorizing or issuing justice could have issued the warrant; see R. v. Sadikov, supra, at paras. 83-89, R. v. Ebanks, 2009 ONCA 851R. v. Lao, 2013 ONCS 285 and R. v. Morelli, supra, at para. 40-41. As Watt J.A. explains in R. v. Mahmood, 2011 ONCA 693 at para 99:

      A reviewing judge does not substitute his or her view for that of the justice who issues the warrant. Rather, the reviewing judge considers the record before the issuing justice, but amplified by evidence adduced on the hearing to correct minor technical errors in drafting the ITO, to determine whether there remains sufficient credible and reliable evidence to permit the justice to issue the warrant.

                        The review is conducted based on the whole of the ITO using a common sense approach to all the circumstances. The review is not an exercise in picking apart the drafting of the ITO looking for minor imperfections, misstatements or omissions. While the police are required to draft an ITO as precisely and clearly as possible, they are not expected to spell things out as clearly as counsel. They are also not required to include every detail, no matter how minute, of the police investigation. The question is ultimately whether the core substance of the ITO could support issuance of the warrant; see R. v. Morelli at para 167, R.v. Lubell and the Queen (1973), 1983 CanLII 3587 (ON SC)6 C.C.C. (3d) 296 (Ont. H.C.) at p. 190, Re Chapman and the Queen (1983), 6 C.C.C. (3d) 296 (Ont. H.C.) at p. 297, R. v. Ngyuen, supra, at para. 58, R v. Araujo (2000. 2000 SCC 65 (CanLII)149 C.C.C. (3d) 449 (S.C.C.) and R.v. Persaud, 2016 ONSC 6815 at para. 64.

                        The excision exercise requires that any unlawfully obtained evidence be removed from consideration in assessing the sufficiency of grounds in an ITO, see R. v. Grant (1993), 1993 CanLII 68 (SCC)84 C.C.C. (3d) 173 (S.C.C.)R. v. Plant (1993), 1993 CanLII 70 (SCC)84 C.C.C. (3d) 203 (SCC) and R. v. Wiley 91993), 1993 CanLII 69 (SCC)84 C.C.C. (3d) 161 (SCC). While the continued validity of the automatic exclusion approach has been criticized, it remains the law; see R. v. Jasser, 2014 ONSC 6052 at paras. 26-34.

Computer Searches and Warrants

[55]           Special interests are at play when the Courts examine the searches of computers.  Computers carry immense vaults of personal and biographical information.  The search of this information is, by definition, highly invasive.  As Fish J. stated in R. v. Morelli2010 SCC 8[2010] 1 S.C.R. 253, at para 105:

As I mentioned at the outset, it is difficult to imagine a more intrusive invasion of privacy than the search of one's home and personal computer. Computers often contain our most intimate correspondence. They contain the details of our financial, medical, and personal situations. They even reveal our specific interests, likes, and propensities, recording in the browsing history and cache files the information we seek out and read, watch, or listen to on the Internet.

[56]           Typically, the right to search a location also provides the police with the right to search the receptacles within that location.  Unsurprisingly, given the heightened importance associated with the search of computers, the Supreme Court of Canada in Vu held that computers are different than other receptacles.  The Court stated at paras 40 to 45:

It is difficult to imagine a more intrusive invasion of privacy than the search of a personal or home computer: Morelli, at para. 105; R. v. Cole2012 SCC 53[2012] 3 S.C.R. 34, at para. 3. Computers are "a multi-faceted instrumentality without precedent in our society": A. D. Gold, "Applying Section 8 in the Digital World: Seizures and Searches", prepared for the 7th Annual Six-Minute Criminal Defence Lawyer (June 9, 2007), at para. 3 (emphasis added). Consider some of the distinctions between computers and other receptacles.

First, computers store immense amounts of information, some of which, in the case of personal computers, will touch the "biographical core of personal information" referred to by this Court in R. v. Plant1993 CanLII 70 (SCC)[1993] 3 S.C.R. 281, at p. 293. The scale and variety of this material makes comparison with traditional storage receptacles unrealistic. We are told that, as of April 2009, the highest capacity commercial hard drives were capable of storing two terabytes of data. A single terabyte can hold roughly 1,000,000 books of 500 pages each, 1,000 hours of video, or 250,000 four-minute songs. Even an 80-gigabyte desktop drive can store the equivalent of 40 million pages of text: L. R. Robinton, "Courting Chaos: Conflicting Guidance from Courts Highlights the Need for Clearer Rules to Govern the Search and Seizure of Digital Evidence" (2010), 12 Yale J.L. & Tech. 311 at pp. 321-22. In light of this massive storage capacity, the Ontario Court of Appeal was surely right to find that there is a significant distinction between the search of a computer and the search of a briefcase found in the same location. As the court put it, a computer "can be a repository for an almost unlimited universe of information": R. v. Mohamad (2004), 2004 CanLII 9378 (ON CA)69 O.R. (3d) 481, at para. 43.

Second, as the appellant and the intervener the Criminal Lawyers' Association (Ontario) point out, computers contain information that is automatically generated, often unbeknownst to the user. A computer is, as A.D. Gold put it, a "fastidious record keeper" (para. 6). Word-processing programs will often automatically generate temporary files that permit analysts to reconstruct the development of a file and access information about who created and worked on it. Similarly, most browsers used to surf the Internet are programmed to automatically retain information about the websites the user has visited in recent weeks and the search terms that were employed to access those websites. Ordinarily, this information can help a user retrace his or her cybernetic steps. In the context of a criminal investigation, however, it can also enable investigators to access intimate details about a user's interests, habits, and identity, drawing on a record that the user created unwittingly: O. S. Kerr, "Searches and Seizures in a Digital World" (2005), 119 Harv. L. Rev. 531, at pp. 542-43. This kind of information has no analogue in the physical world in which other types of receptacles are found.

Third, and related to this second point, a computer retains files and data even after users think that they have destroyed them.

                        

Computers thus compromise the ability of users to control the information that is available about them in two ways: they create information without the users' knowledge and they retain information that users have tried to erase. These features make computers fundamentally different from the receptacles that search and seizure law has had to respond to in the past.

Fourth, limiting the location of a search to "a building, receptacle or place" (s. 487(1) of the Code) is not a meaningful limitation with respect to computer searches. As I have discussed earlier, search warrants authorize the search for and seizure of things in a "building, receptacle or place" and "permit the search of receptacles such as a filing cabinets, within that place…. The physical presence of the receptacle upon the premises permits the search": Fontana and Keeshan, at p. 1181 (italics in original; underling added). Ordinarily, then, police will not have access to items that are not physically present in the building, receptacle or place for which a search has been authorized. While documents accessible in a filing cabinet are always at the same location as the filing cabinet, the same is not true of information that can be accessed through a computer. The intervener the Canadian Civil Liberties Association notes that, when connected to the Internet, computers serve as portals to an almost infinite amount of information that is shared between different users and is stored almost anywhere in the world. Similarly, a computer that is connected to a network will allow police to access information on other devices. Thus, a search of a computer connected to the Internet or a network gives access to information and documents that are not in any meaningful sense at the location for which the search is authorized.

These numerous and striking differences between computers and traditional "receptacles" call for distinctive treatment under s. 8 of the Charter. The animating assumption of the traditional rule -- that if the search of a place is justified, so is the search of receptacles found within it -- simply cannot apply with respect to computer searches.

[57]           The Supreme Court of Canada then considered whether or not a properly authorized warrant to search required search parameters. In holding that search parameters were not constitutionally required, the Court stated at paras 53 and 54 of Vu:

The intervener the British Columbia Civil Liberties Association (“B.C.C.L.A.”) submits that, in addition to a requirement that searches of computers be specifically authorized by a warrant, this Court should also find that these warrants must, as a rule, set out detailed conditions, sometimes called "ex ante conditions" or "search protocols", under which the search may be carried out. According to the B.C.C.L.A., search protocols are necessary because they allow authorizing justices to limit the way in which police carry out their searches, protecting certain areas of a computer from the eyes of the investigators. The Crown and intervening Attorneys General oppose this sort of requirement, arguing that it is contrary to principle and impractical. While I am not convinced that these sorts of special directions should be rejected as a matter of principle, my view is that they are not, as a general rule, constitutionally required and that they would not have been required in this case.

While I propose, in effect, to treat computers in some respects as if they were a separate place of search necessitating distinct prior authorization, I am not convinced that s. 8 of the Charter requires, in addition, that the manner of searching a computer must always be spelled out in advance. That would be a considerable extension of the prior authorization requirement and one that in my view will not, in every case, be necessary to properly strike the balance between privacy and effective law enforcement….

[58]           However, the Court did indicate at paras 61 and 62 that parameters may be preferable in certain situations:

By now it should be clear that my finding that a search protocol was not constitutionally required in this case does not mean that once police had the warrant in hand, they had a licence to scour the devices indiscriminately. They were bound, in their search, to adhere to the rule that the manner of the search must be reasonable. Thus, if, in the course of their search, the officers realized that there was in fact no reason to search a particular program or file on the device, the law of search and seizure would require them not to do so.

Although I do not find that a search protocol was required on the particular facts of this case, authorizing justices must assure themselves that the warrants they issue fulfil the objectives of prior authorization as established in Hunter. They also have the discretion to impose conditions to ensure that they do. If, for example, an authorizing justice were faced with confidential intellectual property or potentially privileged information, he or she might find it necessary and practical to impose limits on the manner in which a computer could be searched. In some cases, authorizing justices may find it practical to impose conditions when police first request authorization to search. In others, they might prefer a two-stage approach where they would first issue a warrant authorizing the seizure of a computer and then have police return for an additional authorization to search the seized device. This second authorization might include directions concerning the manner of search. Moreover, I would not foreclose the possibility that our developing understanding of computer searches and changes in technology may make it appropriate to impose search protocols in a broader range of cases in the future. Without expressing any firm opinion on these points, it is conceivable that proceeding in this way may be appropriate in some circumstances.

[59]           The Ontario Court of Appeal had considered the “license to scour” a computer described in Vu, in R. v. Jones, 2011 ONCA 632, 107 O.R. (3d) 241.  In Jones, the police seized a computer and searched pursuant to a broadly worded warrant.  In searching the computer, the police analyst discovered child pornography.  The police relied upon the initial warrant to conduct a further search.  The Crown argued on appeal that a computer was an indivisible item and that once police had authority to search the computer, the police could search the entire computer. 

[60]           Blair J.A., writing for the Court, rejected this argument and stated at paragraph 50: 

The police have available to them the necessary software, technology and expertise to enable them to tailor their searches in a fashion that will generate the information they seek, if it exists, while at the same time minimizing the intrusion on the computer user's privacy rights in other information stored on the computer. Sergeant Rumnyak testified that the EnCase software used in this case permits the police to view all data and all files contained on the computer but that the police do not normally look at all files in the course of an investigation; they focus on those they think will generate the evidence they are looking for. That is as it should be.

Les conditions requises pour autoriser l'émission d'un mandat et la norme de révision par le juge réviseur

R. v. MacDonald, 2012 ONCA 244

Lien vers la décision


[6]               The justice issuing the warrant must have reasonable grounds to believe that an offence has been committed.  The standard is one of reasonable probability.  The material in support of the warrant must raise a reasonable probability of discovering evidence of a crime.  See R. v. Debot1989 CanLII 13 (SCC), [1989] 2 S.C.R. 1140.

[7]               Where the application for the warrant is based largely on information coming from a confidential informant, the court must make three inquires:

                    Was the information predicting the crime compelling?

                    Was the source of the information credible?

                    Was the information corroborated by the police before conducting the search?

These are not watertight inquiries.  It is the “totality of the circumstances” that must meet the reasonable probability standard.  See Debotsupra

[8]               So, for example, where, as in this case, the police rely on information coming from an anonymous source, the second inquiry is problematic.  The court has no way to assess the credibility or reliability of the source.  Thus, the quality of the information (the first inquiry) and the amount of corroboration (the third inquiry) must compensate for the inability to assess the credibility of the source.  A higher level of verification is required.  See R. v. Hosie1996 CanLII 450 (ON CA), [1996] O.J. No. 2175 (C.A.) at para. 15.

(2)              Standard of Review

[9]               A judge reviewing the authorization of the issuance of a warrant has a limited mandate.  That mandate was set out by Sopinka J. in R. v. Garofoli1990 CanLII 52 (SCC), [1990] 2 S.C.R. 1421 at 1452:

The reviewing judge does not substitute his or her view for that of the authorizing judge.  If based on the record which was before the authorizing judge as amplified on review, the reviewing judge concludes that the authorizing judge could have granted the authorization, then he or she should not interfere.

[10]         Here, the record before the authorizing judge was neither amplified nor excised on review.  Thus, the question for the reviewing judge was whether the authorizing judge could have issued the warrant. 

[11]         On appeal of the reviewing judge’s decision, the usual principles of appellate deference apply.  This court should not interfere unless the reviewing judge erred in law or made an unreasonable finding of facts.  See R. v. Ebanks2009 ONCA 851 (CanLII), [2009] O.J. No. 5168 (C.A.). 

lundi 9 février 2026

Résumé du droit applicable sur le privilège de l'informateur, incluant lorsque l'informateur se propose de devenir un agent civil

R. c. Giroux, 2021 QCCS 527

Lien vers la décision


[32]         Il est bien établi qu'un informateur peut devenir un agent de l'État. Ce changement de statut entraîne de sérieuses conséquences juridiques. D'une manière générale, la jurisprudence qualifie ce changement d'étape importante pour l'informateur[2]. Naturellement, un aspect crucial du nouveau statut est la perte du privilège quasi-absolu dont bénéficiait l'informateur.

 

[33]         Ainsi, une fois devenu un agent de l'État[3], l'informateur ne voit plus son identité protégée. Il est à noter que le privilège de l'informateur continue toutefois de s'appliquer relativement à d'autres affaires non reliées, bien que la dualité de statuts soit quelque peu périlleuse.

 

[34]         Déterminer si un acteur est un informateur ou un agent de l'État n'est pas toujours aisé. Voici comment les auteurs de The Law of Privilege in Canada posent la question:

 

Whether, in particular circumstances, a person is an agent or an informant is sometimes difficult to decide. Agents and informants may both be material witnesses to crime. The identity of agents must be disclosed in order that they can be called as witnesses to testify, yet informer's identity is protected in order that they cannot be called to testify. One of the factors determining whether a person is an agent is whether he or she is working at the behest and on behalf of the police in the field. If someone is working on behalf of the police in the field, he or she is likely a police agent who is not covered by privilege. In contrast, if persons are not acting on behalf of the police yet provide information to the police, they are likely to be treated as informants who are afforded privilege protection[4].

 

[35]         La question de savoir si un acteur est sujet au privilège ou s'il est un agent de l'État se soulève généralement en lien avec une problématique de divulgation, notamment mais non exclusivement lorsque, par exemple, l'informateur commet des crimes[5]. En l'espèce cependant, c'est un autre aspect qui est en jeu.

 

[36]         En effet et selon les prétentions de la défense, l'État ne peut se retrancher derrière le privilège mais, simultanément, téléguider un agent au sein d'une enquête criminelle. C'est que dans le cas de l'agent, le rôle de l'État  et de son agent  doivent être adéquatement encadrés afin de préserver l'intégrité de l'enquête mais surtout celle de l'administration de la justice. Dans ce contexte, une entente entre l'État et l'agent sera signée et, le cas échéant, une autorisation de commettre certaines infractions pourra être mise en œuvre dans le cadre du régime prévu par le Parlement aux articles 25.1 et s.

 

[37]         En résumé, l'État ne peut implicitement faire endosser à l'informateur le rôle d'agent pour faire l'économie des obligations et limites inhérentes à ce dernier statut.

 

[38]         C'est cette question qui était, entre autres, devant la Cour d'appel du Québec dans l'arrêt Brind'Amour et al[6].

 

[39]         Cette affaire réunissait nombre de dossiers et autant de jugements d'instance. La question centrale était l'appel d'ordonnances d'arrêt des procédures pour abus de procédure en lien avec la conduite de l'État lors des diverses enquêtes correspondantes. Un aspect important de l'arrêt porte sur la manière dont la police a manipulé la Commission nationale des libérations conditionnelles et les conditions que celle-ci avait imposées à un certain Pierre Tremblay, recruté à des fins d'infiltration.

 

[40]         Cependant, l'aspect pertinent à la présente rubrique porte sur le véritable statut de Pierre Tremblay. Le ministère public considérait qu'il n'était qu'un informateur avant la signature d'une entente avec les policiers. À ce sujet, la juge de première instance avait noté que Tremblay avait reçu des informations stratégiques de la part des policiers et qu'il trafiquait séparément pour son compte, au su et au vu de la police. Elle avait souligné que les policiers l'avaient erronément qualifié d'informateur alors que, dans les faits, il était bel et bien un agent de l'État actif sur le terrain. Elle avait aussi observé que Tremblay avait reçu une mise en garde à l'effet qu'il n'était protégé par aucune immunité relativement aux crimes qu'il commettait.

 

[41]         Discutant de cet aspect, le juge Doyon écrit ce qui suit:

 

La distinction a de l’importance, puisque, souligne la juge Morin, selon la documentation de la GRC, le policier qui agit comme agent couvreur ou agent contrôleur de l’agent civil d’infiltration doit faire en sorte que ce dernier ne commette pas d’actes criminels et ne rencontre pas les personnes visées par l’enquête en dehors du cadre de l’opération. Bref, si Pierre Tremblay est un informateur qui œuvre dans le milieu criminel, on peut comprendre que la GRC ne veuille pas divulguer ses activités criminelles pour ne pas mettre sa vie en danger ni mettre fin à sa collaboration, d’autant qu’il jouit du privilège de l’informateur. Par contre, s’il est agent civil d’infiltration, il est mandaté par la GRC et est sous son contrôle; il doit limiter sa participation à ce qui est nécessaire aux fins de l’enquête, généralement à la suite de scénarios établis par les policiers. On voit bien la conséquence : la GRC ne pourrait sciemment laisser un agent civil d’infiltration commettre des crimes, comme le trafic de drogues, à ses propres fins et en dehors de l’enquête policière, comme elle l’a fait en l’espèce[7] [Les soulignés sont ajoutés].

 

[42]         La Cour d'appel rappelle également la distinction entre un informateur et un agent de l'État. Il importe de reproduire ici encore l'extrait cité par le juge Doyon:

 

In general terms, the distinction between an informer and an agent is that an informer merely furnishes information to the police and an agent acts on the direction of the police and goes "into the field" to participate in the illegal transaction in some way. [...][8].

 

[43]         Appliquant ce qui précède au cas de Pierre Tremblay, la Cour d'appel fait les observations suivantes:

 

           La police voulait savoir si Tremblay était en mesure d'aider la police à s'attaquer à des projets d'importation;

 

           La police était au courant des activités criminelles de Pierre Tremblay puisqu'il était, notamment, impliqué dans un trafic de cocaïne déjà visé par une enquête;

 

           Il avait avisé les policiers de rencontres avec des personnes criminalisées et était sous filature lors de ces rencontres;

 

           Tremblay avait plusieurs contrôleurs;

 

           Lors d'une rencontre, l'enquêteur avait demandé à Tremblay de reporter un rendez-vous pour mettre en place une équipe de filature;

 

           À une autre occasion, Tremblay a rencontré une personne à la demande de l'enquêteur;

 

           Tremblay a reçu comme instruction de cacher certains faits à son agente de libération conditionnelle.

 

[44]         Confirmant la conclusion de première instance, le juge Doyon écrit:

 

Devant un tel constat, on ne peut aucunement remettre en question la détermination factuelle selon laquelle Pierre Tremblay était un agent civil d'infiltration bien avant la signature de l'entente le 2 septembre 2005. Peut-être ne l'a-t-il pas été dès le 31 décembre 2004, mais cela n'a pas d'importance. En effet, au-delà des mots, ce qui importe c'est que, durant une bonne partie de l'année 2005, la GRC exerçait un contrôle sur les activités de M. Tremblay, tout en sachant qu'il commettait des actes criminels et des bris de conditions en dehors de l'enquête et tout en le laissant néanmoins agir de la sorte. [...][9] [Les soulignés sont ajoutés].

 

[45]         Les auteurs de The Law of Privilege in Canada donnent divers exemples de cette situation.

 

[46]         Un exemple classique est celui de l'informateur qui approche l'accusé et s'enquiert d'une source d'approvisionnement en cocaïne. L'informateur présente ensuite l'accusé à un agent de la police[10]. On a conclu que le privilège était inapplicable parce que l'informateur était plutôt un agent.

 

[47]         Un autre exemple est celui d'un enquêteur privé engagé par la défense et ayant assisté la police dans l'obtention d'une déclaration d'un témoin. Ce qui était déterminant était le fait qu'il avait ainsi assisté la police dans son enquête et avait donc endossé le rôle d'un participant actif à l'enquête policière[11]. Dans cette affaire, la Cour avait écrit:        « Webb was not merely a citizen who quietly provided the police with information about criminal activity with the expectation of confidentiality. Instead he became an active participant in the criminal investigation and as such is not a source or a confidential informant[12] ».

 

[48]         La situation devient cependant moins claire lorsque l'informateur se propose de devenir un agent. À nouveau, voici ce que les auteurs précédents notent à ce sujet:

 

Informers may be more than passive observers of information who pass on information to the police. Informers sometimes volunteer to actively pursue police objectives by following leads or goals discussed with their police handlers. When this occurs, it is more problematic whether the informer has abandoned the role of informer for the role of agent. Whether an informant has become an agent frequently turns on the question of whether the informant has acted at the “direction" of the police"[13] [Les soulignés sont ajoutés].

 

[49]         Enfin, dans une autre décision répertoriée par ces auteurs, un juge d'instance a proposé certains facteurs permettant de distinguer l'informateur de l'agent:

 

Subsequently, the parties have adduced no further evidence that would suggest that the source was anything other than a confidential informant. For example: (1) there is no evidence that the source went "into the field" and conducted any investigative activities at the direction of the police, or participated in the alleged illegal activities of the accused at the suggestion of the police; (2) there is no evidence that the source was directed by the police to attend any particular location, speak to any specific individual, or conduct himself in any particular fashion; (3) there is no evidence that the source expected that, if charges were commenced against the accused, his identity might be disclosed and he might be expected to testify; and (4) there is no evidence of any type of agreement between the police and the source that would support the notion that the source took the "big step" of becoming a police agent in this case. In other words, none of the recognized indicia of police agency are evident in the record of these proceedings. In short, there is simply no evidence that the source was acting as an agent of the police, rather than as a confidential informant[14].

 

[50]         En conséquence et au vu de ce résumé des principes juridiques, la défense doit donc démontrer que l'informateur en l'espèce était, d'une manière ou d'une autre, sous le contrôle de la police avant qu'il ne devienne officiellement un agent civil. L'abus pourrait alors résider dans le fait pour la police de se soustraire aux contraintes se rapportant au statut d'agent civil au profit du simple statut d'informateur, dans le contexte où, bien entendu, cet informateur commettrait par ailleurs des infractions criminelles à la connaissance de la police.

Le dédommagement à la victime doit toujours être envisagé lors de la détermination de la peine

Comment apprécier l'horodatage d'une preuve vidéo

R. v. Hernandez-Viera, 2025 ONCA 626 Lien vers la décision [ 5 ]           In his first ground of appeal Mr. Hernandez-Viera argues that the...