Your phone sits on the coffee table, looking innocent enough. But if Ontario police have their way, that device could become their eyes and ears into your most private moments—without you ever knowing. Through “on-device investigative tools” that make traditional wiretaps look quaint, law enforcement can now capture everything: your screenshots, keystrokes, encrypted messages, even remotely activate your camera and microphone. Project Fairfield, the Windsor auto-theft investigation that netted 23 arrests and recovered $9 million in stolen vehicles, has become ground zero for a brewing fight over just how secret these digital intrusions should remain.
What Police Can See Now
These aren’t your grandfather’s wiretaps—they’re full-spectrum device takeovers.
ODITs give investigators god-mode access to smartphones and computers. Unlike traditional surveillance that intercepts messages in transit, this spyware lives on your device, capturing everything from call logs and photos to real-time typing and live audio. The tools can crack end-to-end encrypted conversations that were supposed to be bulletproof. One former intelligence officer told Parliament a single operation easily costs half a million dollars—suggesting police reserve this nuclear option for major cases.
The Secrecy Wars
Prosecutors would rather drop cases than reveal how the sausage gets made.
Crown attorneys and police are “fighting tooth and nail” to keep everything about ODITs classified: which companies make them, how they work, even basic safeguards that exist. In Brampton’s Project Vegas drug investigation, federal prosecutors have refused to release over 140 documents about the spyware, citing public interest protections under Canada’s Evidence Act. The secrecy runs so deep that authorities pre-agreed to abandon prosecutions rather than reveal vendor identities—a fact they didn’t tell the judge who authorized the surveillance.
Legal Loopholes and Constitutional Concerns
Canada’s surveillance laws are stuck in the 1970s while police deploy 2024 spyware.
Defence lawyers Kim Schofield and Miranda Brar argue police failed to provide “fully informed judicial oversight,” hiding crucial technical details from authorizing judges. The bigger problem? Canada’s interception laws were written for traditional wiretaps, not tools that can ransack entire digital lives. Part VI of the Criminal Code doesn’t distinguish between listening to phone calls and installing commercial spyware. Once a judge approves surveillance, police have carte blanche on methods.
Privacy Watchdogs Sound Alarms
Even oversight bodies are flying blind on what police actually purchased.
“If police want to make the case that use of spyware is justified, they need to do this in a transparent manner,” warns Tamir Israel from the Canadian Civil Liberties Association. Ontario’s Information and Privacy Commissioner is “closely monitoring” the technology, emphasizing that “it is critical that police adopt and apply an appropriate transparency and accountability framework.” Yet Citizen Lab research suggests multiple Ontario forces are building spyware capabilities, potentially through vendors like Israel’s Paragon Solutions.
The stakes couldn’t be higher. Similar commercial spyware has surveilled journalists, activists, and political opponents worldwide. If courts can’t access basic information about these tools—their reliability, security risks, or vendor track records—then democratic oversight becomes impossible. Your digital privacy might depend on whether Canadian judges decide transparency matters more than prosecutorial convenience.




























