1 We use the term “ATI” to encompass both ATI and FOI law. ATI places the issue of access up front, which reflects the negotiated and contingent nature of the process. One of the flaws with the Canadian federal access to information regime is that government agencies can only be brought under its authority by adding them to Schedule I of the Act. This must be done either at the time that an agency's own enabling legislation is created or amended, or in an omnibus fashion, as occurred following the passage of the Federal Accountability Act (2006). There is no presumption of inclusion, which means that some government agencies and crown corporations “fly under the radar” of the Act.
2 Marx, Gary, “Notes on the Discovery, Collection, and Assessment of Hidden and Dirty Data,” in Studies in the Sociology of Social Problems, ed. Schneider, J. and Kitsuse, J. (Norwood, NJ: Ablex, 1984).
3 See Walby, Kevin and Monaghan, Jeff, “Policing Proliferation: on the Militarization of Police and Atomic Energy Canada Limited's Nuclear Response Forces,” Canadian Journal of Criminology and Criminal Justice 52 (2010): 117–45; Larsen, Mike and Piché, Justin, “Exceptional State, Pragmatic Bureaucracy, and Indefinite Detention: The Case of the Kingston Immigration Holding Centre,” Canadian Journal of Law and Society 24 (2009): 203–29; Piché, Justin and Walby, Kevin, “Problematizing Carcerai Tours,” British Journal of Criminology 50 (2010): 570–81.
4 Marx, , “Notes on the Discovery,” 79.
5 Piché and Walby, “Probleniatizing Carcerai Tours.”
6 A memorandum of understanding (MOU) establishes the terms and cditions of a partnership between two government organizations, and establishes standing orders and parameters that govern that relationship. An MOU can also detail what operations and resources will be shared. For a discussion of a governing MOU, see Larsen and Piché, “Exceptional States.”
8 See Roberts, Alasdair, Blacked Out: Government Secrecy in the Information Age, (Cambridge: Cambridge University Press, 2006); Badgley, K., Dixon, M., and Dozois, P., “In Search of the Chill: Access to Information and Record-Keeping in the Government of Canada,” Archivaria 55 (2003): 1–19; Gilbert, J., “Access Denied: the Access to Information Act and its Effect on Public Records Creators,” Archivaria 49 (2009): 84–123.
9 Kinsman, G. and Gentile, P., The Canadian War on Queers: National Security as Sexual Regulation (Vancouver: UBC Press, 2010); Roberts, A., “Administrative Discretion and the Access to Information Act: An ‘Internal Law’ on Open Government?” Canadian Public Administration 45 (2002): 175–94; Birkinshaw, P., “Proposals for Freedom of Information in the United Kingdom,” Government Information Quarterly 16:2 (1999).
10 See Larsen, M. and Walby, K., eds., Brokering Access: Power, Politics and Freedom of Information Process in Canada (Vancouver: UBC Press, 2012); de Lint, Willem, “Keeping Open Windows: Police as Access Brokers,” British Journal of Criminology 43 (2003): 379–97.
11 Abrams, P., “Notes on the Difficulty of Studying the State,” Journal of Historical Sociology 1 (1998), 61. Like Abrams, we want to avoid conflating the “state” and “government.”
12 Conventional archives are also dynamic and evolving projects, but the texts that exist in these spaces are not subject to the same potential for revision and activation that characterizes texts in the live archive. See Library and Archives Canada, Modernization within LAC: Evolving Approaches to Canada's Documentary Heritage (Ottawa: Library and Archives Canada, 2010), http://www.collectionscanada.gc.ca/modernization/012004-900-e.html.
13 Smith, D., Writing the Social: Critique, Theory and Investigations (Toronto: University of Toronto Press, 1999); Smith, D., Institutional Ethnography: A Sociology for People (Lanham, MD: AltaMira, 2005); Walby, Kevin, “Institutional Ethnography and Surveillance Studies: An Outline for Inquiry,” Surveillance and Society 3 (2005): 158–72. Our use of “texts” is informed by the literature on institutional ethnography. Texts can be understood as active, translocal, replicable, and implicated in processes of generalization and social organization.
14 Sometimes researchers can gather texts concerning third parties and businesses who have relations to government agencies, although this is difficult as one commonly invoked section of the Access to Information Act for redaction and exemption is s. 20 concerning third parties. Other sections commonly invoked by ATI coordinators for redaction and exemption are s. 16 concerning ongoing investigations, and s. 19 concerning personal information. ATI coordinators can use s. 19 to exempt whole portions of documents instead of simply redacting the specific personal information on each page, leaving the researcher to guess exactly what types of documents and correspondence exist.
15 See Smith, Writing the Social. That the text is “activated” requires a reader to interpret the text and put it to use in particular ways that reflect their practical consciousness but also the institutional conditions in which they are at work. See Smith, D., Texts, Facts, and Femininity: Exploring the Relations of Ruling (New York: Routledge, 1990).
16 We cannot expect to be able to sit down and have a candid and on-the-record chat with agents from the Canadian Security Intelligence Service or the intelligence branches of the Royal Canadian Mounted Police, much less the senior bureaucrats or communications managers at these agencies.
17 Foucault, Michel, The Archaeology of Knowledge (New York: Pantheon, 1972), 130.
18 For example, the December 2008 table outlining “ATIP Roles and Responsibilities” within Public Safety Canada—obtained through ATI request no. A-2009-00142—notes that an ATIP analyst “[w]herever possible, negotiates changes to the scope of requests directly with the requester in order to minimize the amount of search fees imposed on the requester” and “[negotiates directly with [the] applicant in order to minimize the impact of processing the records (i.e., drafts, ministerial correspondence and records documenting minimal changes to a document.” These negotiation duties, even when undertaken with pragmatic intentions, have the potential to alter the outcome of the brokering process.
19 Roberts, Blacked Out. On this note, the Harper Conservatives have a general contempt for public transparency. They cancelled the scrum after the question period. They cut funding to critical arm's-length agencies such as the Law Commission of Canada. And many users of ATI such as journalists speculate that the Prime Minister's Office has recently played a more active role in making decisions about ATI requests at the federal level.
20 ATI software suites subtly alter the form of records. Most records begin as digital files (word processing, spreadsheet, and so on) that can be searched and manipulated. After processing through AccessPro Case Management, they become image-based PDF files that are “flattened” and unsearchable—a source of much frustration for ATI researchers. In addition, AccessPro does not “black out” text in accordance with the classical image of the redacted document; instead, it shows redacted text as white space that is indistinguishable from the document background. This can make it unclear where and whether a given record has been redacted.
21 Amber lighting refers to the tagging of a request/requester as politically contentious. Red filing refers to requests that are stonewalled by the minister or by the Prime Minister's Office, who receive a weekly inventory of tagged requests.
22 Huey, Laura, “Subverting Surveillance Systems: Access to Information Mechanisms as Tools of Counter-Surveillance,” in Surveillance: Power, Problems and Politics, ed. Hier, S. and Greenberg, J. (Vancouver: UBC Press, 2009).
23 Paul Kelly discusses his work as an employee under the Mike Harris government in Ontario. His superiors would encourage employees not to keep any records. Kelly also discusses a few systematic methods of obstructing requests, such as the way cabinet briefing notes are covered under “Advice to Minister” or “closed meeting” clauses under various ATI legislations. Orders were also given to destroy information. Twice, Kelly was advised to destroy all documents concerning Ipperwash and the murder of Dudley George by the Ontario Provincial Police. See Kelly, Paul, “Information Is Power,” Open Government: a Journal of Freedom of Information 2, 1 (2006).
24 Records obtained through CSIS ATI request 117–2010–15 document the exchanges between CSIS employees and employees of the Office of the Information Commissioner of Canada (OIC) that took place during the preparation of the 2008–2009 OIC Report Card for CSIS. The OIC notes that, although the pre-coding of records facilitates easy document retrieval, “CSIS's strong information management structure is not reflected in [ATI] compliance level.” CSIS received a “deemed refusal rate” of 20.9% and an overall “D” grade in the public report card. Interestingly, the OIC revised its position in the public version of the report to read “CSIS has a strong information management structure.” See OIC 2010, http://www.oic-ci.gc.ca/eng/rp-pr_spe-rep_rap-spe_rep-car_fic-ren_2008-2009_25.aspx.
26 “NOTIFICATION PROCEDURES" (Public Safety Canada, 2009), obtained through ATI request no. A-2009-00142.
27 Larsen and Piché, “Exceptional State.”
28 Hoogenboom, B. The Governance of Policine and Security; Ironies, Myths and Paradoxes (Basingstoke, UK: Palgrave Macmillan, 2010).
30 Complex requests that follow a textual trail between agencies are also subject to an additional layer of brokering that arises from concern for the maintenance of relationships between organizations and levels of government. Complex requests also suffer from the absence of the sort of institutional memory and information management framework that gives structure to the texts that are produced and circulate within a given agency. And ATI offices in some agencies simply suffer from a lack of support and resources.
31 Walby, Kevin and Monaghan, Jeff, “Private Eyes and Public Order: Policing and Surveillance in the Suppression of Animal Rights Activists in Canada,” Social Movement Studies 10 (2011): 21–37; Monaghan, Jeff and Walby, Kevin, “Making Up ‘Terror Identities’: Security Intelligence and Canada's Integrated Threat Assessment Centre,” Policing and Society 21 (2011).
32 See Burawoy, M., “For Public Sociology,” American Sociological Review 70 (2005): 4–28.
33 Many of the journalists and researchers that make up Canada's relatively small ATI community have created Web sites and other resources to share both tips on ATI requests and the actual records that they have obtained.
34 See Snell, R. and Sebina, P., “Information Flows: The Real Art of Information Management and Freedom of Information,” Archives and Management 35 (2007): 54–81; Roy, J., “Security, Sovereignty and Continental Interoperability: Canada's Elusive Balance,” Social Science Computer Review 23 (2005): 463–79; Gentile, P., “Resisted Access? National Security, the Access to Information Act, and Queer(ing) Archives,” Archivaria 68 (2009): 141–58; Kirtley, J., “Transparency and Accountability in a Time of Terror: the Bush Administration's Assault on Freedom of Information,” Communication Law and Policy 11 (2006): 479–509.