{"id":2934,"date":"2017-09-12T10:46:22","date_gmt":"2017-09-12T10:46:22","guid":{"rendered":"https:\/\/ccla.org\/?p=2934"},"modified":"2021-06-13T10:51:16","modified_gmt":"2021-06-13T10:51:16","slug":"understanding-csis-disruption-powers-in-bill-c-59","status":"publish","type":"post","link":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/","title":{"rendered":"Understanding CSIS Disruption Powers in Bill C-59"},"content":{"rendered":"[vc_row type=\u00a0\u00bbin_container\u00a0\u00bb full_screen_row_position=\u00a0\u00bbmiddle\u00a0\u00bb column_margin=\u00a0\u00bbdefault\u00a0\u00bb column_direction=\u00a0\u00bbdefault\u00a0\u00bb column_direction_tablet=\u00a0\u00bbdefault\u00a0\u00bb column_direction_phone=\u00a0\u00bbdefault\u00a0\u00bb scene_position=\u00a0\u00bbcenter\u00a0\u00bb text_color=\u00a0\u00bbdark\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb row_border_radius=\u00a0\u00bbnone\u00a0\u00bb row_border_radius_applies=\u00a0\u00bbbg\u00a0\u00bb overlay_strength=\u00a0\u00bb0.3&Prime; gradient_direction=\u00a0\u00bbleft_to_right\u00a0\u00bb shape_divider_position=\u00a0\u00bbbottom\u00a0\u00bb bg_image_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_column column_padding=\u00a0\u00bbno-extra-padding\u00a0\u00bb column_padding_tablet=\u00a0\u00bbinherit\u00a0\u00bb column_padding_phone=\u00a0\u00bbinherit\u00a0\u00bb column_padding_position=\u00a0\u00bball\u00a0\u00bb column_element_spacing=\u00a0\u00bbdefault\u00a0\u00bb background_color_opacity=\u00a0\u00bb1&Prime; background_hover_color_opacity=\u00a0\u00bb1&Prime; column_shadow=\u00a0\u00bbnone\u00a0\u00bb column_border_radius=\u00a0\u00bbnone\u00a0\u00bb column_link_target=\u00a0\u00bb_self\u00a0\u00bb gradient_direction=\u00a0\u00bbleft_to_right\u00a0\u00bb overlay_strength=\u00a0\u00bb0.3&Prime; width=\u00a0\u00bb1\/1&Prime; tablet_width_inherit=\u00a0\u00bbdefault\u00a0\u00bb tablet_text_alignment=\u00a0\u00bbdefault\u00a0\u00bb phone_text_alignment=\u00a0\u00bbdefault\u00a0\u00bb bg_image_animation=\u00a0\u00bbnone\u00a0\u00bb border_type=\u00a0\u00bbsimple\u00a0\u00bb column_border_width=\u00a0\u00bbnone\u00a0\u00bb column_border_style=\u00a0\u00bbsolid\u00a0\u00bb][nectar_global_section id=\u00a0\u00bb1355&Prime;][\/vc_column][\/vc_row][vc_row type=\u00a0\u00bbfull_width_background\u00a0\u00bb full_screen_row_position=\u00a0\u00bbmiddle\u00a0\u00bb column_margin=\u00a0\u00bbdefault\u00a0\u00bb column_direction=\u00a0\u00bbdefault\u00a0\u00bb column_direction_tablet=\u00a0\u00bbdefault\u00a0\u00bb column_direction_phone=\u00a0\u00bbdefault\u00a0\u00bb scene_position=\u00a0\u00bbcenter\u00a0\u00bb top_padding=\u00a0\u00bb4%\u00a0\u00bb constrain_group_1=\u00a0\u00bbyes\u00a0\u00bb bottom_padding=\u00a0\u00bb4%\u00a0\u00bb text_color=\u00a0\u00bbdark\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb row_border_radius=\u00a0\u00bbnone\u00a0\u00bb row_border_radius_applies=\u00a0\u00bbbg\u00a0\u00bb class=\u00a0\u00bbpost-links\u00a0\u00bb overlay_strength=\u00a0\u00bb0.3&Prime; gradient_direction=\u00a0\u00bbleft_to_right\u00a0\u00bb shape_divider_position=\u00a0\u00bbbottom\u00a0\u00bb bg_image_animation=\u00a0\u00bbnone\u00a0\u00bb shape_type=\u00a0\u00bb\u00a0\u00bb][vc_column column_padding=\u00a0\u00bbno-extra-padding\u00a0\u00bb column_padding_tablet=\u00a0\u00bbinherit\u00a0\u00bb column_padding_phone=\u00a0\u00bbinherit\u00a0\u00bb column_padding_position=\u00a0\u00bball\u00a0\u00bb column_element_spacing=\u00a0\u00bbdefault\u00a0\u00bb background_color_opacity=\u00a0\u00bb1&Prime; background_hover_color_opacity=\u00a0\u00bb1&Prime; column_shadow=\u00a0\u00bbnone\u00a0\u00bb column_border_radius=\u00a0\u00bbnone\u00a0\u00bb column_link_target=\u00a0\u00bb_self\u00a0\u00bb gradient_direction=\u00a0\u00bbleft_to_right\u00a0\u00bb overlay_strength=\u00a0\u00bb0.3&Prime; width=\u00a0\u00bb1\/1&Prime; tablet_width_inherit=\u00a0\u00bbdefault\u00a0\u00bb tablet_text_alignment=\u00a0\u00bbdefault\u00a0\u00bb phone_text_alignment=\u00a0\u00bbdefault\u00a0\u00bb bg_image_animation=\u00a0\u00bbnone\u00a0\u00bb border_type=\u00a0\u00bbsimple\u00a0\u00bb column_border_width=\u00a0\u00bbnone\u00a0\u00bb column_border_style=\u00a0\u00bbsolid\u00a0\u00bb][divider line_type=\u00a0\u00bbNo Line\u00a0\u00bb custom_height=\u00a0\u00bb30&Prime;][vc_column_text]\n<div class=\"entry-meta\">\n<p><strong><span class=\"posted-on\"><time class=\"entry-date published\" datetime=\"2017-09-12T16:17:36-04:00\">September 12, 2017<\/time><\/span><\/strong><\/p>\n<\/div>\n<div class=\"shapely-content \">\n<p>CSIS was created in response to the McDonald Commission, which undertook a lengthy investigation into Canadian security scandals that took place in the 1970s (you may recall the infamous\u00a0<a href=\"https:\/\/news.vice.com\/story\/story-of-how-canadian-police-committed-arson-to-stop-a-black-panther-meeting\" target=\"_blank\" rel=\"noopener\">barn burning incident<\/a>). Following the Commission\u2019s\u00a0<a href=\"http:\/\/epe.lac-bac.gc.ca\/100\/200\/301\/pco-bcp\/commissions-ef\/mcdonald1979-81-eng\/mcdonald1979-81-eng.htm\" target=\"_blank\" rel=\"noopener\">recommendations<\/a>, Canada separated the agencies responsible for intelligence collection activities from those responsible for law enforcement, collection of evidence and prevention of crimes. This division of responsibilities recognized that the two goals sometimes conflict, and that doing both puts a lot of power and strong incentives for abuse in the hands of one potentially fallible agency.<\/p>\n<p>In 2015 this line was blurred again when CSIS was given a new set of \u201cthreat disruption powers\u201d under Bill C-51, allowing them to not just collect intelligence, but act on it, suddenly allowing CSIS agents, for example, to interrupt a money transfer, or plant a forged document. The only limits placed on CSIS: they were forbidden to kill; to obstruct or pervert the course of justice; or to violate a person\u2019s sexual integrity. C-51 also allowed CSIS to apply to court for a\u00a0<a href=\"https:\/\/dev.ccla.org\/natsecglossary\/\" target=\"_blank\" rel=\"noopener\">warrant<\/a>\u00a0allowing them to violate\u00a0<i>Charter<\/i>\u00a0rights. CCLA identified these\u00a0<i>Charter<\/i>-violation warrants as a major problem in our C-51 challenge\u2014during a normal warrant process, the job of a judge is to make sure government actions uphold, not violate, the\u00a0<i>Charter<\/i>.<\/p>\n<p>Disappointingly, C-59 doesn\u2019t get rid of these new powers, but it does provide some clarity as to what CSIS can\u2019t do on its own initiative as well as to what it can do with a judicial authorization. CSIS is now expressly prohibited from engaging in torture (which they were already prohibited from doing under international law), detaining anyone, and endangering an individual\u2019s safety by causing the loss or serious destruction of property.<\/p>\n<p>In addition, CSIS is prohibited from undertaking any action on its own initiative that would impose a limit on a right protected by the\u00a0<i>Charter<\/i>.\u00a0While these are reasonable prohibitions, they leave a great deal of scope for CSIS to act in rights-infringing ways. Can CSIS impersonate a journalist to gain credibility with a target? Can they fake an online profile to undermine an individual\u2019s reputation? Probably, as such things are not clearly prohibited by any exceptions in C-59, nor would they clearly be considered a\u00a0<i>Charter<\/i>\u00a0violation. CSIS can do even\u00a0<i>more<\/i>\u00a0if they convince a judge that a particular activity is reasonable, proportionate,\u00a0<i>Charter<\/i>-consistent and required to reduce a security threat. Bill C-51 left the list of possible activities that could be undertaken with judicial approval open to the imagination of the CSIS agents seeking to carry them out. Bill C-59, by contrast, attempts to limit this open-endedness by providing a specific list of threat disruption measures, but the new list remains quite broad and could even include problematic activities such as the disruption of a foreign election. \u00a0These warrant requests from CSIS all happen in secret, with no adversarial process, and no public scrutiny.<\/p>\n<p>When these powers were introduced in Bill C-51, there was never a meaningful public justification from the government about why they were necessary. C-59 provides an important opportunity for the public to discuss whether we think our intelligence agency actually needs these powers, and for the government to explain why they think disruption powers are necessary and proportionate.<\/p>\n<p><strong><a href=\"https:\/\/dev.ccla.org\/?p=27988\">VISIT OUR BILL C-59: GET IT RIGHT! CAMPAIGN HOME PAGE<\/a><\/strong><\/p>\n<p><strong><a class=\"fasc-button fasc-size-large fasc-type-flat fasc-rounded-medium\" href=\"https:\/\/dev.ccla.org\/?page_id=37\" target=\"_blank\" rel=\"noopener\">Support CCLA\u2019s C-59: Get It Right! Campaign<\/a>\u00a0<\/strong><\/p>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=\u00a0\u00bbin_container\u00a0\u00bb full_screen_row_position=\u00a0\u00bbmiddle\u00a0\u00bb column_margin=\u00a0\u00bbdefault\u00a0\u00bb column_direction=\u00a0\u00bbdefault\u00a0\u00bb column_direction_tablet=\u00a0\u00bbdefault\u00a0\u00bb column_direction_phone=\u00a0\u00bbdefault\u00a0\u00bb scene_position=\u00a0\u00bbcenter\u00a0\u00bb text_color=\u00a0\u00bbdark\u00a0\u00bb text_align=\u00a0\u00bbleft\u00a0\u00bb row_border_radius=\u00a0\u00bbnone\u00a0\u00bb row_border_radius_applies=\u00a0\u00bbbg\u00a0\u00bb overlay_strength=\u00a0\u00bb0.3&Prime; gradient_direction=\u00a0\u00bbleft_to_right\u00a0\u00bb shape_divider_position=\u00a0\u00bbbottom\u00a0\u00bb bg_image_animation=\u00a0\u00bbnone\u00a0\u00bb][vc_column column_padding=\u00a0\u00bbno-extra-padding\u00a0\u00bb column_padding_tablet=\u00a0\u00bbinherit\u00a0\u00bb column_padding_phone=\u00a0\u00bbinherit\u00a0\u00bb column_padding_position=\u00a0\u00bball\u00a0\u00bb column_element_spacing=\u00a0\u00bbdefault\u00a0\u00bb background_color_opacity=\u00a0\u00bb1&Prime; background_hover_color_opacity=\u00a0\u00bb1&Prime; column_shadow=\u00a0\u00bbnone\u00a0\u00bb column_border_radius=\u00a0\u00bbnone\u00a0\u00bb column_link_target=\u00a0\u00bb_self\u00a0\u00bb gradient_direction=\u00a0\u00bbleft_to_right\u00a0\u00bb overlay_strength=\u00a0\u00bb0.3&Prime; width=\u00a0\u00bb1\/1&Prime; tablet_width_inherit=\u00a0\u00bbdefault\u00a0\u00bb tablet_text_alignment=\u00a0\u00bbdefault\u00a0\u00bb phone_text_alignment=\u00a0\u00bbdefault\u00a0\u00bb bg_image_animation=\u00a0\u00bbnone\u00a0\u00bb border_type=\u00a0\u00bbsimple\u00a0\u00bb column_border_width=\u00a0\u00bbnone\u00a0\u00bb column_border_style=\u00a0\u00bbsolid\u00a0\u00bb][nectar_global_section id=\u00a0\u00bb1461&Prime;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>CSIS was created in response to the McDonald Commission, which undertook a lengthy investigation into Canadian security scandals that took place in the 1970s (you may recall the infamous barn burning incident). Following the Commission\u2019s recommendations, Canada separated the agencies responsible for intelligence collection activities from those responsible for law enforcement, collection of evidence and prevention of crimes. <\/p>\n","protected":false},"author":4,"featured_media":2935,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-2934","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorized"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding CSIS Disruption Powers in Bill C-59 - CCLA<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding CSIS Disruption Powers in Bill C-59 - CCLA\" \/>\n<meta property=\"og:description\" content=\"CSIS was created in response to the McDonald Commission, which undertook a lengthy investigation into Canadian security scandals that took place in the 1970s (you may recall the infamous barn burning incident). Following the Commission\u2019s recommendations, Canada separated the agencies responsible for intelligence collection activities from those responsible for law enforcement, collection of evidence and prevention of crimes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/\" \/>\n<meta property=\"og:site_name\" content=\"CCLA\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-12T10:46:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-13T10:51:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/06\/fist.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"884\" \/>\n\t<meta property=\"og:image:height\" content=\"368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"CCLA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"CCLA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/\"},\"author\":{\"name\":\"CCLA\",\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/fr\\\/#\\\/schema\\\/person\\\/e48728d4a52926205e807fd8c52bf3b0\"},\"headline\":\"Understanding CSIS Disruption Powers in Bill C-59\",\"datePublished\":\"2017-09-12T10:46:22+00:00\",\"dateModified\":\"2021-06-13T10:51:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/\"},\"wordCount\":1012,\"image\":{\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dev.ccla.org\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/fist.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/\",\"url\":\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/\",\"name\":\"Understanding CSIS Disruption Powers in Bill C-59 - CCLA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/dev.ccla.org\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/fist.jpg\",\"datePublished\":\"2017-09-12T10:46:22+00:00\",\"dateModified\":\"2021-06-13T10:51:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/fr\\\/#\\\/schema\\\/person\\\/e48728d4a52926205e807fd8c52bf3b0\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/#primaryimage\",\"url\":\"https:\\\/\\\/dev.ccla.org\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/fist.jpg\",\"contentUrl\":\"https:\\\/\\\/dev.ccla.org\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/fist.jpg\",\"width\":884,\"height\":368},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/uncategorized\\\/understanding-csis-disruption-powers-in-bill-c-59\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dev.ccla.org\\\/fr\\\/accueil\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AFFAIRES MAJEURES ET RAPPORTS\",\"item\":\"https:\\\/\\\/dev.ccla.org\\\/fr\\\/category\\\/affaires-majeures-et-rapports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"COVID-19\",\"item\":\"https:\\\/\\\/dev.ccla.org\\\/fr\\\/category\\\/affaires-majeures-et-rapports\\\/covid-19\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Understanding CSIS Disruption Powers in Bill C-59\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/dev.ccla.org\\\/fr\\\/\",\"name\":\"CCLA\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dev.ccla.org\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dev.ccla.org\\\/fr\\\/#\\\/schema\\\/person\\\/e48728d4a52926205e807fd8c52bf3b0\",\"name\":\"CCLA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/03b13921772ba279da547407d7a85f0b4a10bdf8cc9a026f2ac4e10643eee315?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/03b13921772ba279da547407d7a85f0b4a10bdf8cc9a026f2ac4e10643eee315?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/03b13921772ba279da547407d7a85f0b4a10bdf8cc9a026f2ac4e10643eee315?s=96&d=blank&r=g\",\"caption\":\"CCLA\"},\"url\":\"https:\\\/\\\/dev.ccla.org\\\/fr\\\/author\\\/ccla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding CSIS Disruption Powers in Bill C-59 - CCLA","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_CA","og_type":"article","og_title":"Understanding CSIS Disruption Powers in Bill C-59 - CCLA","og_description":"CSIS was created in response to the McDonald Commission, which undertook a lengthy investigation into Canadian security scandals that took place in the 1970s (you may recall the infamous barn burning incident). Following the Commission\u2019s recommendations, Canada separated the agencies responsible for intelligence collection activities from those responsible for law enforcement, collection of evidence and prevention of crimes.","og_url":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/","og_site_name":"CCLA","article_published_time":"2017-09-12T10:46:22+00:00","article_modified_time":"2021-06-13T10:51:16+00:00","og_image":[{"width":884,"height":368,"url":"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/06\/fist.jpg","type":"image\/jpeg"}],"author":"CCLA","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"CCLA","Estimation du temps de lecture":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/#article","isPartOf":{"@id":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/"},"author":{"name":"CCLA","@id":"https:\/\/dev.ccla.org\/fr\/#\/schema\/person\/e48728d4a52926205e807fd8c52bf3b0"},"headline":"Understanding CSIS Disruption Powers in Bill C-59","datePublished":"2017-09-12T10:46:22+00:00","dateModified":"2021-06-13T10:51:16+00:00","mainEntityOfPage":{"@id":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/"},"wordCount":1012,"image":{"@id":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/06\/fist.jpg","articleSection":["Uncategorized"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/","url":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/","name":"Understanding CSIS Disruption Powers in Bill C-59 - CCLA","isPartOf":{"@id":"https:\/\/dev.ccla.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/#primaryimage"},"image":{"@id":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/06\/fist.jpg","datePublished":"2017-09-12T10:46:22+00:00","dateModified":"2021-06-13T10:51:16+00:00","author":{"@id":"https:\/\/dev.ccla.org\/fr\/#\/schema\/person\/e48728d4a52926205e807fd8c52bf3b0"},"breadcrumb":{"@id":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/#primaryimage","url":"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/06\/fist.jpg","contentUrl":"https:\/\/dev.ccla.org\/wp-content\/uploads\/2021\/06\/fist.jpg","width":884,"height":368},{"@type":"BreadcrumbList","@id":"https:\/\/dev.ccla.org\/uncategorized\/understanding-csis-disruption-powers-in-bill-c-59\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.ccla.org\/fr\/accueil\/"},{"@type":"ListItem","position":2,"name":"AFFAIRES MAJEURES ET RAPPORTS","item":"https:\/\/dev.ccla.org\/fr\/category\/affaires-majeures-et-rapports\/"},{"@type":"ListItem","position":3,"name":"COVID-19","item":"https:\/\/dev.ccla.org\/fr\/category\/affaires-majeures-et-rapports\/covid-19\/"},{"@type":"ListItem","position":4,"name":"Understanding CSIS Disruption Powers in Bill C-59"}]},{"@type":"WebSite","@id":"https:\/\/dev.ccla.org\/fr\/#website","url":"https:\/\/dev.ccla.org\/fr\/","name":"CCLA","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.ccla.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/dev.ccla.org\/fr\/#\/schema\/person\/e48728d4a52926205e807fd8c52bf3b0","name":"CCLA","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/03b13921772ba279da547407d7a85f0b4a10bdf8cc9a026f2ac4e10643eee315?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/03b13921772ba279da547407d7a85f0b4a10bdf8cc9a026f2ac4e10643eee315?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/03b13921772ba279da547407d7a85f0b4a10bdf8cc9a026f2ac4e10643eee315?s=96&d=blank&r=g","caption":"CCLA"},"url":"https:\/\/dev.ccla.org\/fr\/author\/ccla\/"}]}},"_links":{"self":[{"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/posts\/2934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/comments?post=2934"}],"version-history":[{"count":1,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/posts\/2934\/revisions"}],"predecessor-version":[{"id":2936,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/posts\/2934\/revisions\/2936"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/media\/2935"}],"wp:attachment":[{"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/media?parent=2934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/categories?post=2934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.ccla.org\/fr\/wp-json\/wp\/v2\/tags?post=2934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}