:
I call the meeting to order.
I'd like to welcome everybody to the defence committee this morning.
Colleagues, welcome back. Gentlemen, welcome.
Today we have Len Bastien, defence chief information officer and assistant deputy minister, information management, and Commodore Richard Feltham, director general, cyberspace, for our continuing discussion of Canada and NATO under the realm of cyber. Thank you very much for coming.
I'll give the floor to Mr. Bastien. You have up to 10 minutes for your initial remarks.
[Translation]
I am very pleased to be here with you this morning.
[English]
As assistant deputy minister for information management and defence chief information officer, I am responsible for ensuring that defence has a reliable, secure, and integrated defence information environment to support business and military operations. I am accountable to the deputy minister for administration and financial and human resources, and I am accountable to the chief of the defence staff for force development and readiness, including cyber.
The director general for cyber is embedded within my organization, and Commodore Feltham, who is with me today, will address you on this subject in more detail in a few minutes.
As you know, Canada's new defence policy represents a new vision: to be strong at home, secure in North America, and engaged in the world. As a G7 country and a founding member of NATO, Canada has a strong interest in global stability. To that end, we will pursue leadership roles and interoperability in our planning and capability development to ensure seamless co-operation with all our allies and partners, particularly NATO.
As DND's representative at the NATO consultation, command, and control board and the NATO agency supervisory board, I am here today to discuss Canada's involvement in NATO as it pertains to information management and information technology, IM/IT. I am supported by experts from across the Department of National Defence who participate in several multinational capability panels. Canada is a significant contributor to the programs that drive IM/IT policy and technical development activities overseen by the board.
Interoperability across the alliance depends in large measure on consistent application of, and compliance with, NATO IM/IT policies. There are three main compliance organizations.
The first is the North Atlantic Council, where Canada is represented by our ambassador to NATO. The council approves the consultation, command, and control policy compliance framework and mandates the NATO enterprise organizations to implement the policies and inform the council on waivers, policy changes, or new policy.
The second is NATO's consultation, command, and control board. It is the senior multinational policy body reporting to the North Atlantic Council and the defence planning committee on policy matters, including the interoperability of NATO networks and national systems. Its focus is on information sharing and interoperability, which includes cyber-defence, information assurance, joint intelligence, and surveillance and reconnaissance. Consultation, command, and control board strategy signals a commitment to deliver these capabilities and emphasizes the need for the modernization and interoperability of the force contributions of NATO nations and partners.
The third is the agency's supervisory board. It is the organizational governance body of the NATO communications and information agency and is responsive to the North Atlantic Council. The agency supervisory board ensures that the communications and information agency is set up to succeed by governing its resources and its performance. Canada has assumed the chairmanship of the board of this agency for the next two years.
The NATO communications and information agency was established in 2012 to provide NATO-wide IM/IT services, procurement, and support in areas such as command and control systems, tactical and strategic communications, and cyber-defence systems.
In April 2017, my group here in Ottawa hosted a three-day NATO industry conference where 750 experts from across NATO, nations, industry, and academia took a close-up look at NATO business opportunities and procurement specialists. It marked the first time this event was hosted in North America and it set records for its level of participation, all in an effort to give better exposure of Canadian-based industry to NATO business opportunities in our area.
In December 2017 the communications and information agency awarded the Canadian-based MDA, a business unit of Maxar Technologies, a $14.9-million contract to deliver NATO's project Triton, a maritime and control information systems project.
If I were to summarize Canada's focus in its role in IM/IT in NATO, I would prioritize information sharing and interoperability. Canada's new defence policy puts forward 111 initiatives, many of which detail positive steps to enhancing defence intelligence capabilities both at home and in the world. One of the initiatives, initiative 65, is our commitment to improve cryptographic capabilities, information operations capabilities, and cyber capabilities. We will focus on cybersecurity and situational awareness, cyber-threat identification and response, and the development of military-specific cyber and information operations.
At this time, I would like to turn over the floor for opening remarks to Commodore Richard Feltham, who will speak to cybersecurity and our contribution to NATO's cybersecurity efforts.
:
Good morning. Thank you for allowing me the opportunity to speak before this committee today. I am Commodore Richard Feltham, and I am the director general for cyberspace. In this role, I'm responsible for force development of military cyber capabilities that enable cyber operations, as well as strategic and operational command, control, communications, computing, and information.
Force development identifies the necessary changes to existing capability and articulates new capability requirements for the Canadian Armed Forces. For example, our current cyber force development efforts include scoping what requirements need to be fulfilled to successfully conduct cyber operations, designing the potential solutions to meet those requirements, and then helping to build and validate capability once a solution is chosen and implemented, respectively.
To date, Canada's international cyber-defence engagement has been focused on our Five Eyes partners and NATO's cyber-defence activities. The foundational work for a future concept of overall NATO cyber-defence is being developed by the allies now. As part of this, in 2016 the allies, including Canada, made a cyber-defence pledge to enhance their national cyber-defences as a matter of priority. The cyber-defence pledge reflects our international commitment, spelling out the priorities of developing strong individual cyber-defence through facilitating co-operation in the areas of education, training, exercises, and information exchange.
Further, we have taken an active role in numerous ongoing neighbour cyber-projects and policy bodies. While a final configuration of NATO cyber-defence has not yet been built, Canada has been taking an active role in its formulation to ensure not only its effectiveness but also our ability to contribute and function effectively in its eventual formation.
While the scale of Canada's commitment has not been large, we have selected areas of activity that fit well with our strengths and lead to mutual benefits both for NATO and for our own interests. In particular, one area of Canada's contribution is through the multinational cyber defence capability delivery, or MN CD2 for short. This is a smart defence project whereby allies have co-operated to develop, acquire, and maintain military capabilities to meet current security problems, in accordance with the NATO strategic concept.
Canada has been active since 2013 in contributing representatives and financial support. In addition to the value provided to NATO, our participation directly supports our own goals, furthering the direction and outputs we have pursued under the “Strong, Secure, Engaged” initiative 65, which was referred to earlier by Mr. Bastien.
Examples of mutually beneficial projects under this initiative include the cyber-information and cyber-incident coordination system and the malware information-sharing platform, which were developed for NATO cyber-defence. Both have proven valuable for Canada.
Other areas of Canada's contribution to NATO cyber-defence are through exercises in which Canada has engaged in NATO cyberwarfare exercises primarily as an observer. Thanks to our success in building our cyber-defence personnel, however, we'll be able to send participant teams this year.
In Exercise Locked Shields, for example, we will work with teams from two dozen nations to test our abilities to detect, defend against, and investigate cyber-attacks while exercising decision-making and command-and-control procedures. The Cyber Coalition exercise will see our team challenged not only with cyber-attacks through malware but also with social media and other hybrid challenges. This will test our operational and legal procedures, information exchange, and our work with industry and defence partners.
We have further combined cyber-defence experimentation with our targeting development, using the experience and facilities offered by the NATO cyber centre of excellence cyber range in Estonia. The upcoming NATO coalition warrior interoperability exercise, or CWIX for short, will directly benefit our command and control, as well as NATO interoperability.
Finally, Canada has been actively involved in the NATO cryptographic capability team and allied cryptographic task force since 2005. We have been able to provide leadership and expertise, as well as obtaining valuable insight that has guided our own cryptographic development efforts. We have been able to build communications and networks that address our own needs and are aligned with secure and reliable communication systems operated by our NATO allies in a cost- and time-effective way.
I will conclude by reiterating that Canada's defence policy outlines a new framework for how we will implement the vision of “strong at home, secure in North America, and engaged in the world”. We will continue to be a trusted partner to our allies as we work to develop our own cyber capabilities by anticipating, adapting, and acting.
:
Thank you for the question, Mr. Chair.
We do participate actively in NATO. Let me explain the constructs of how and where we participate.
You may have heard of the term “within the NATO construct”, and I'll define our contributions within that construct. There are also entities that contribute to NATO that are not within the NATO construct. For example, the NCI Agency I referred to is actually outside of the NATO construct. It was created in 2012 and was put outside the NATO construct deliberately so it could behave with a little bit more agility and more like an industry service provider. That came with hand-offs and exchanges around how our contribution gets calculated, because it is actually outside the NATO construct when it comes to looking at credits like flags to posts and our ability to work within the NATO construct.
Let me give you some numbers. Within the NATO construct, currently National Defence is contributing over 200 positions at a fill rate of about 96.6%. We are very active and very committed to filling our positions within the NATO construct.
Outside the NATO construct, our contributions are measured in approximately 120 to 130 positions that participate in activities in direct support of NATO operations or NATO support services, just by way of example.
Financially, the contributions are again spread across the different constructs of NATO. Let me see if I can give you some more detailed examples.
By way of example, in 2016 Canada's cost share of NATO was about 6.6% overall. In terms of funding for something like the agency, Canada was contributing about $20 million, and another $20 million was being contributed to the military budget. There were two contributions, in terms of the way you would add them up, but one would be inside the NATO construct and the other would be outside.
In terms of CIS support, which was part of the agency in 2018, the budget allocation was about $48 million. Canada's portion of that amount in 2018 is approximately $3 million. The agency needed, across the partner nations, about the first amount, and Canada's contribution is anticipated to be about $3.1 million, by way of example.
:
Mr. Chair, I agree with that statement. With our allies, we have invested significantly in that part of the world.
I believe you were asking about what risks or threats we are worried about. Let me explain how we operate inside National Defence.
Cyber, although relatively new, is an established environment of military operations, like land, air, and sea, and as is done for land, air, and sea, the institution of National Defence prepares capabilities inside the department. I'm mandated to help prepare the cyber equities for eventual use in deployed operations.
That said, it's actually the commander of Joint Operations Command who utilizes those capabilities to operate and control his mission. I can't comment on how he's using those capabilities. I can tell you, however, that I am accountable and responsible to prepare them, to generate them, and to get them ready for his use, and we do a lot to make sure that the men and women of the Canadian Armed Forces deploy with the best possible chance of success. Our cyber equities being deployed are the best we can possibly produce for them.
:
Thank you very much, Mr. Chair, to you and to the witnesses for being here today.
I want to start with some questions on procurement. We have discussed many aspects of procurement in this committee, but I think there are two concerns that I would like to talk about here.
Have we put in place restrictions on who can bid on contracts in the area of information management, given our concerns about cybersecurity? I know that we've had previous concerns raised about bids that might be launched by state-owned companies from another jurisdiction, about those dangers, and also about the abilities of people to put Trojan horses, let's say, or other kinds of things into IT systems. Are there any restrictions currently in place? Are you planning restrictions on who can bid on information management systems, given the problems of cybersecurity?
:
The invitation to the board today was focused on NATO. However, in our introductory remarks, we did open the dialogue to—and frankly, our new defence policy is explicit in—talking about how important our partners are. We consider NORAD, the U.S. bilaterally, the Five Eyes, and NATO to all be very valuable partnerships and alliances.
We have significant investments in the Five Eyes realm. We participate actively in several governing bodies that include intelligence and defence forums, which I participate in personally. We take these relationships seriously. We've benefited from and contributed significantly to meeting with our colleagues in these other nations. Doing so allows us the opportunity not only to establish interoperability by default, as with all of our guiding principles, but also to benefit from each other's investments in certain areas, including cyber.
It's a tremendous forum for us to take advantage of, and I can assure you we participate in several levels, both on the military and on the civilian side, to make sure we keep those relationships healthy.
:
Thank you for the question, Mr. Chair. I'll start and then I'll ask my colleague, given his experience in the navy, to comment on what that might look and feel like.
As I said earlier, we prepare the cyber capabilities that deploy with our navy, army, and air force. That's our mandate. We make sure that they have the best possible chance of success by making sure they have the best technology we can afford and provide to them. However, once deployed, once they have left the shores of Canada, they come under the operational control of joint operational command.
Rich can maybe explain the look and feel of what it's like to be on board a ship and what kind of force protection would be in place, and perhaps comment on the cyber-readiness that we would deploy with.
Just to be a bit more specific, and coming back one step, whenever we send our troops into operational missions, there is a full analysis done on threat. That's been done forever, and the new threats emerging in the last 20 years have been the cyber threats.
Part of the mandate when the chief of the defence staff deploys people on a mission is that the joint operational command ensures that those deploying troops are prepared for whatever threat they may face. Cyber is one of those threats, so it's an education process, among others, that is based on that threat analysis.
Coming back to a ship deploying in a broader context, we come back to Mr. Bastien's earlier points that ships, like many other units, communicate as a necessity through networks, so we develop secure protocols and networks to communicate among the ships that are working together.
There is a twofold answer, then, to your question: from a personal security perspective, we prepare our deploying troops, whatever the threat analysis is, and from a capability perspective, the networks are designed to be secure so they can communicate and share intelligence among the units in any given group.
Thank you both for being here, gentlemen. Thank you for your service and your expertise.
Building on the question that my colleague, Mr. Fisher, just asked, I'd like to mention the following example. It's too interesting to ignore. I'd like to get your comments on it.
Nathan Russer is a 20-year-old college student who is interested in international security and the Middle East. He went onto Strava's Global Heatmap with a view to taking a look at Syria. What he found was an elaborate amount of data concerning U.S. service personnel and their recreational and athletic activities right out there in the open.
From a force protection perspective, how much work needs to be done inside the Canadian Forces and our allies, including NATO, to make sure that we really think seamlessly with respect to our civilian activities, our military service, in regard to connectivity and the ability of anybody who wants to do us harm to find that kind of data in a very simple fashion?
:
That's a fascinating example that we all read about recently and that the U.S. is reacting to.
I would come back to our current defence security posture inside our institution. We have distinct and explicit policy around any electronic or digital devices in certain areas where we operate our business. For example, there are rooms and floors in our buildings where no digital devices are allowed, including the athletic monitoring devices you referred to. We provide lockboxes for them to be checked in, and they can be picked up after the activity. We are enforcing compliance with those policies every day. We operate with that limited tolerance when it comes to taking any kind of risk in that area.
I really can't speak to other nations or NATO on how compliant they are toward similar policies, but I can tell you we take that very seriously inside National Defence and our institutions. I would offer to you that the commander of Joint Operations Command, or CJOC, would give you the same answer about deployed environments.
:
I would like to come back to Mr. Bastien's earlier point, from a Canadian Armed Forces perspective, about what we are doing for a cyber workforce way ahead. The policy was very clear that we shall stand up a cyber operator trade. As Mr. Bastien also mentioned, it's very exciting. The trade was stood up this summer, and we have our first members of that trade. The follow-on efforts will try to bring the reserve forces into that trade. They have also stood up a trade in the reserves to make sure that we get all the talent we can within that domain. That's moving ahead.
The next challenge is always going to be where we get the people and how we keep them. How do we attract, recruit, and retain them into that domain? That's an ongoing challenge that we're putting a great deal of energy into. To be quite frank, we are using different levels of thinking outside our standard ways of recruiting within the Canadian Armed Forces, because this is really a specialized group that we're paying close attention to.
I will come back to your specific question. As the available talent pool is so small, when contractors work for us, they are security-cleared and vetted to the appropriate level to do the work that we need done by them. From a security perspective, I'm not concerned about that. I need manpower who are qualified and willing to work within that domain. Contractors are a source, as are reserves and the regular force. I'm working with academia and industry on the broader concepts.
:
That is an accurate statement that IM/IT at National Defence is delivered through service providers that are in a federated governance construct. Let me explain what that is essentially.
As the chief information officer, I'm the functional authority for all IM/IT in the department. I don't necessarily have to own it to authoritatively control it. The army, navy, air force, and chief military personnel provide IT services on wings, bases, and garrisons across the country. They do so, however, under a policy construct that my group authoritatively controls.
Although we're not centrally owned, we are centrally operated, so to speak. We are centrally governed and regionally delivered. We do a lot of centralized governance in order to make sure that our investments are prudent and of value to Canadians.
The concept of cyber introduces a reality that we all have to work in collaboration. My stakeholders, my partners, and service delivery across the department have been directed by the chief of the defence staff to line up behind Commodore Feltham and his team to make sure we provide the cyber service delivery and service assurance needed to run the business of defence. The reality is that our operations in defence are very good as is. At this time, there is no direction for me to centralize or take ownership of all IM/IT equities inside the department. In fact, we're finding that strong governance and authoritative control are providing the outcomes and outputs that we need.
:
Let me explain our technical environment in terms that are a little bit more simple than the engineering terms that my team might try to get me to use.
Essentially, as Commodore Feltham says, we want to communicate with our allies. It's an essential part of working in coalition. Whether we're communicating at a top secret level, a secret level, or designated protected B level, our networks are set up in a way that they can interoperate. However, as I said earlier, gates and firewalls are left in place to segment, in the case of an incident, the different allies from those networks. Although we haven't had any major incidents of the kind you describe, the ability for us to protect our equities nationally is always built into the design and engineering of those networks.
We meet often as allies, as Five Eyes, or as NATO to discuss that interoperability and that engineering and that design function to that end.
:
Again, Mr. Chair, thank you for that question.
As was said earlier, the cyber environment is without borders. It's not quite as easy to put your hands around a terrestrial or geographical distinction of where the lines are. What you described is a concern for the government, I would offer. At National Defence, we are part of “cyber Team Canada”, if you will, and we are but one member. The Team Canada approach to cyber is led by Public Safety. Although we participate on committee with them to build a better cyber policy for the government and for Canadians, the answers you're looking for would be better brought forward by the lead department for the cyber hygiene of Canada.
I can tell you that there is a cyber policy being worked on. We are a member of the committee that is trying to get the cyber policy forward, so I have an awareness, but I'm not an authoritative voice on the objectives and outcomes of that policy.
Rich, it's good to see you after 36 years, of course.
I'd like to carry on with my colleague's questioning, because I do think that once upon a time a military was mostly there to keep our sovereignty safe through protection from invasion of actual defined borders. Now, with the changing nature of warfare, there's no question that we have grey zones. Cyberwarfare is actually almost cheaper and faster and is incredibly effective.
Also, they're not going after military networks, because those in the military have done a very good job. As a result, the conversation to have today is certainly not around how great NATO is in terms of managing its own infrastructure or how great Canada is at managing its own command and control infrastructure, because we've been doing it for many years and we are particularly good.
I think our vulnerability is around the theft of critical information such as that of the National Research Council, which was hacked, and our financial data, which was hacked through Equifax, an American company. It's around our iCloud, Our Cloud, and our Google Docs, where all the information that we have as a nation is not Canadian. Look at our email infrastructure: our ability to have sovereign communications with our population is not actually within Canada.
I recognize that NATO is looking at that domestic capability as being within the responsibility of a nation; however, I would argue that our vulnerabilities domestically, at home, infringe not only on our sovereignty and our security but on the sovereignty and security of our allies as well. How are we communicating our domestic security and infrastructure as that pertains to the alliance's strengths? Any alliance is only as strong as its weakest link, and at the moment I would argue that our civilian infrastructure around information warfare is actually far weaker than our military one and therefore can affect the alliance.
Can you please speak to how we measure that and to what we're doing to mitigate that weakness, not only for ourselves but for the alliance?
:
I need to address several areas of your statement just to hopefully provide some clarity and some context for what I will ask Rich to deal with, which is the concept of measuring our strength and reporting it into the alliance as one forum that we work with.
When you look at the Government of Canada and our IM/IT fabric and you look at the cyber for that, you see that National Defence has a mandate in the National Defence Act that clearly states we are to defend Defence, and we can do that with our abilities and current constructs.
When it comes to deployed operations, we take direction from the government. The government has to ask us whether it's land, sea, air, or cyber or space. We react to a request from the government, whether it's domestic or abroad, and that becomes a mission. It becomes an operation, and it's guided by, as I said earlier, the commander of Joint Operations Command. I would offer that the mandate to protect the government and the equities of the government's data is actually a mandate that is provided to the Canadian Communications Security Establishment, and they work closely with Shared Services Canada to do that. They help us manage the parts of our network that are involved in the government back office, so to speak, with Shared Services, but we are still authoritatively in control of defending Defence.
I just wanted you to understand that National Defence really doesn't have a mandate to protect the government or defend the government unless the government asks us to, and they have. In issues like the National Research Council or other exploits that the government had been managing, at times National Defence was asked to come in as a domestic operation and provide services to the government in that area. I just wanted to explain the command and control—
:
Thank you, Mr. Chair, and I want to thank our witnesses for being here and for their testimony.
I want to follow up on what Leona was just questioning on. I think all of us look at cyber-defence maybe a little bit differently from the way it's been implemented. I look at National Defence, I look at our Canadian Armed Forces, and if a foreign nation flies a fighter jet near our airspace, we scramble our jets to intercept and escort them out. If a submarine popped up in the Gulf of St. Lawrence, our navy would be there immediately to defend our sovereignty. If little green men landed on Vancouver Island, I know that National Defence would ensure that our troops were on the ground to counter that, yet you're saying that if a foreign entity attacks our cyber infrastructure, if it's civilian-based—whether it's our banking systems, our subway systems, or our power grid—we're going to sit back and let Public Safety be the lead rather than have National Defence defend our sovereignty.
Is that policy, or is that legislation?
:
Those are excellent examples.
At this stage of our cyber interoperability evolution, as Rich mentioned earlier, to our awareness there is no hot wash, so to speak, among the nations, among the allies, that would provide those lessons learned in the current construct.
We do share at the most senior levels, in the most classified environments around intelligence—top secret, for example—more open and easier communication. It's simply a smaller environment to have to manage. The broad environments of the nations of NATO and their cyber-exploits that occur, frankly, regularly, we do not necessarily manage or monitor.
I want to take the conversation in a bit of a different direction here. I think we're running into a phenomenon here of cyberwarfare not really fitting under the normal protocols of war and the rules of warfare. It operates at the edges of those. International protocols prohibit targeting civilian targets, and those kinds of principles we're used to. I know that neither of you represents CSE, but the legislation that's before Parliament in Bill proposes to allow active use of cyber-attacks in sabotage. It's a concern for me that we, as Canadians, are stepping into an area of international conflict that's not well regulated internationally.
My question, I guess, would be directed largely to Mr. Feltham. What's your relationship with CSE in terms of their, I would say, requests for moving into active cyber-attacks?
The second part of the question is this: do you feel that you are already authorized in DND to use active cyber-attacks against both foreign states and individuals for CSE? Are you already authorized to do those things? What's your relationship with CSE on those aspects?
:
I will open and then ask my colleague to follow up.
The relationship with CSE is not that complex, actually. They were a part of our department not so very long ago. When their act was originally created, they were mandated in their act to support other government security agencies with their capabilities, let's say. I can expand on their capabilities; that gets us into a different conversation. I can tell you that those capabilities would be very valuable to us in cyber. I don't think the government wants National Defence to create the equivalent capabilities inside of its institution, so we've been directed to work with CSE so that we come together as a team. We would deploy and operate in cyber as a team, because they have the capabilities.
However, when their act was created, National Defence was not named as an agency they could support, ironically. They were us, so there was no need to put defence in that legislation. I think some of the amendments happening in that bill will help remediate the legislative policy layer, if you will, to allow us to work together more actively. That's one part of your question. I really wanted to explain that we will move forward in cyber as a team as soon as we're able to.
To the other part of your question, as of the current day, in terms of day zero capabilities in cyber, we have limited cyber capabilities in the active cyberspace today that we could, without CSE, engage and use to support mission. I wouldn't want to give you the impression that we could provide extensive cyber capabilities that would be of concern to Canadians, but the ability for us to jam a radio, block a telephone, take an Internet site down, or block a service provider are things we are evolving quickly in order to support mission.
:
Thank you, Mr. Chair, for the opportunity to speak on this question.
As was mentioned earlier, the policy to conduct active cyber operations for the Canadian Armed Forces just came out in their recent defence policy. We're working with our international and government partners to develop this capability.
You asked the question, Mr. Chair, on how we ensure that the cyber operations active offensive as a component of active cyber adheres to the law of armed conflict. I can tell you that, just as in any military operation, kinetic or in cyberspace, we only conduct operations in the Canadian Armed Forces based on the government's mandate and in accordance with the law of armed conflict. This is what regulates us day in and day out, and there are no exceptions to that.
In terms of ongoing operations within the cyber realm, this is not my field, and I can't comment on that in any great detail, but I can assure you that from our perspective—and I've developed this capability with our partners—we stick to the mandates. We go on government missions and we operate within the law of armed conflict.
:
Thank you for the question.
[English]
The threat vector vulnerabilities that we monitor change every day. Every day there are new vulnerabilities that are brought to bear, whether through industry or other governments, and those vulnerabilities are assessed.
A vulnerability is not a threat until it becomes exploited, so we are constantly reacting to what I would call “vulnerabilities”. With that, the same would exist for industry, for Canadians, and for NATO when those vulnerabilities come to our awareness. We work usually as a government, as a collection of government agencies, to bring the right get-well-plan and to shore up those vulnerabilities through patching and the evolution of technology to avoid the moment in time when a vulnerability becomes an exploit.
The way it works is that the good guys are out there trying to learn about vulnerabilities and protect themselves from the exploits. The bad guys are out there trying to figure out how to use a vulnerability to exploit, so it's a race. Our ability to stay in front of that comes back to our security posture and our compliancy with our own standards, whether within government or within National Defence. I would offer that NATO's agency responsible for their cyber would have the same perspective, as they're constantly reacting to the potential vulnerabilities that have come to our attention that we need to react to.
I hope it explains the environment a little bit to know that it's not a single event that happens. It's typically a series of vulnerabilities that have been exploited that you hear about in the news. Our ability to stay in front of those vulnerabilities and stay protected comes back to our ability to interoperate with our allies, to work closely with industry, even academia, as well as with our colleagues in the government. We're constantly reacting to new vulnerabilities.
I have a general question that loops back to your exchange with my colleague Ms. Alleslev. You mentioned to her several tiers of information that were communicated under top secret and secret clearance. It's a policy decision whether this committee should have elevated levels of security clearance to get a full view of the material that's in front of it.
I'm wondering if you could tell the committee, from your perspective and specific to the area of cybersecurity and its rapidly evolving dynamics, what this committee would see if there were an elevated classification in security. In other words, how much more of a fine-grained conversation could we have?
I appreciate that this is a public meeting, but were we to be in a meeting that would allow an elevated security clearance for this body, how would our understanding improve?
:
Some of the answer to that question will fall back into my own personal opinion, so I'll avoid that. However, I would offer to you in all sincerity today that I felt quite comfortable with the information I shared with you, in that a change in classification would not have significantly changed my testimony. I think you're getting a good perspective from today's interview. I hope you are.
Typically classification is more about timing than it is about the content of the information. We use classification to protect national interests—national security and national safety—and we do it because the information at any given time would be incredibly valuable or risky should it fall into the wrong hands. However, given time, that same information is no longer a threat and therefore should no longer be classified.
I think there's a tremendous amount of information available in an unclassified discussion about lessons learned and about our reaction to certain situations that will give you a very good perspective on how we operate day to day. When we start talking about active operations and about things we're going to do tomorrow, that level of classification is there for a reason. It is to protect equities that are important to Canadians, and that's where you may be running into a challenge.
In my realm, in today's discussion we didn't go there, so I'm hoping you're getting rich content that will help advise you in your decisions that are forthcoming.
:
Thanks very much, Mr. Chair.
I really appreciate the testimony we've had on cyber defence today, and I am reassured that we're doing our best in cyber-defence, but your testimony today identified that the legislation in Bill is really going to bring CSE in line with the authority to do active cyber that DND already sees itself as having.
In the legislation, section 31 says essentially that active cyber, after being authorized, can be carried out despite any act of Parliament or any act of a foreign state. This is a very broad grant of authority.
I'm wondering whether you consider that DND is already authorized to conduct active cyber-activities without regard to any act of Parliament or the act of any other state.
:
Let me clarify the perception of our relationship with the Canadian Communications Security Establishment that I would like to leave you with.
We have abilities in technology that we have needed to operate in the past. They are of great value to us, but somewhat limited. Before we would invest to grow that arsenal, if you will, of cyber ordnance, we recognize that a lot of that capability exists inside CSE. Getting access to it and giving them the legislative mandate to come to our side and use those capabilities as part of the military construct is the gap. That's the incremental difference that we're looking for, and it's a very small part of that bill.
As for what the rest of the bill addresses and the changes, they are very relevant to the Canadian Communications Security Establishment and, I would offer, are not in my jurisdiction to comment on.
Rich, is there any part of that question you would like to...?
:
Yes. Mr. Chair, I would just add one point.
Like many other government partners, we will work with the Communications Security Establishment to increase the capabilities of the Canadian Armed Forces, but I want to be perfectly clear. Any military operation that the Canadian Armed Forces engages in, whether in traditional military structures of naval, air forces, army, or in cyber, are government-mandated military operations conducted in accord with the law of armed conflict and the rules of engagement specifically authorized by the chief of the defence staff through the Government of Canada.
The answer to your question is that we would not operate cyber any differently from any other kinetic military structures outside of the government mandate. What CSE would do within their mandate is beyond my scope to comment on, sir.
I know that one person wants to have a couple of minutes to ask a question, but given the time I have left and a couple of housekeeping items that I have to take care of, I can't really go there unless everybody else agrees. I don't have time to give a couple of minutes to everybody.
Did you have anything else, Mr. Garrison, that you wanted to add?
Mr. Bezan? No?
I'd like to give Ms. Alleslev just a couple of minutes to finish off, and then we'll move to our motions.
Go ahead, Ms. Alleslev, for a couple of minutes.
:
No, so I should thank you for that, Mr. Chair.
Voices: Oh, oh!
The Chair: It's a circular argument.
Mr. Len Bastien: It is.
We come here to have a valuable exchange of dialogue so that we can engage with you and help you do the very valuable work that you do to help the department situate itself inside the government, so with that, I thank you.
I wouldn't want to leave you with the perspective that a classified conversation would yield different answers to the questions I received today. Indeed, if you had asked different questions, there would have been different answers, absolutely.
Thank you very much for your testimony. I had the great opportunity to visit MDA about two weeks ago and to visit their installation. I know that the Triton project is actually a new maritime command and control solution for both fixed and deployable systems, so we look forward to receiving that briefing.
We talked a little bit about the assets that we are deploying for NATO, specifically support. You mentioned 120 to 130 positions in direct support of NATO. I know that with “Strong, Secure, Engaged”, we're talking about a 3,500-person increase in military personnel.
Maybe you're not the person to answer this, but in terms of how many of those folks are going to be allocated towards cybersecurity and with respect to operability with our NATO allies, what kind of training programs are we developing for cyber for our men and women in uniform? Are we working with NATO to create those training programs, based on that incredibly fast-moving technology?
:
Indeed, we will come back with as much information as is available to us with respect to the MDA project. They're probably quite excited about it and have more details than we would, on the periphery, watching that happen.
With respect to what we would refer to in our terms as force development for cyber and co-operation and collaboration with NATO, as Commodore Feltham indicated in his remarks, NATO has invested significantly in a centre of excellence—a cyber range, if you will.
Imagine a technical environment where you can test cyber ordnances, your reaction to an attack, and so on. These are very valuable entities that we, as a partner of NATO, will be able to exploit and take advantage of. We look forward to that.
With respect to the commitments of our policy, the policy as delivered by the government directs investments by the department over a 20-year period. Those funding and personnel commitments have not exactly dropped into our laps this year, so we are busy looking at the design of the implementation of this policy and what it's going to look and feel like over the 20 years of its term.
It's a little early for me to comment on how much of the resources committed in the policy will land in NATO. Suffice it to say that the policy also explicitly tells us that we will continue to invest in and support our relationships with our allies, including NATO, Five Eyes, NORAD, and the others.
Unfortunately, I can't give you an quantitative answer other than an explicit direction from government in the policy for us to continue investing in that area. Then, as we implement the policy in the coming years, it will become clearer to us how and where to make those investments.
As Rich said earlier, there's always more demand than there is supply in a give-and-take relationship with any entity. We want to be very smart about where we put our resources so that we get the most return on investment for us and for Canadians, ultimately.
As I mentioned earlier, the human resource demand in this occupation is extreme and very difficult. We don't take it lightly. I would say I spend the vast majority of my time trying to understand innovative ways to come to that answer.
The first tranche of operatives we put into cyber-occupation, as an example, we took from a proven commodity. They were people who were doing that work within our operation centre, and we moved them into the operator trade. We've developed internal training programs. We have standards to develop and train our operators. We got those standards in collaboration with our allies. We worked together to have standardized training that we can exchange with our other broader allies.
Also we recognize that within the civilian sector, there's a robust and rich opportunity to recruit young Canadians from colleges around our country, and we are working with a number of colleges to accredit their programs and to bring those people into our programs as fully fledged cyber-operators.
I would not want to leave you with the impression that this is another military occupation that we will handle like every other, because it's not. It demands a different view, a different focus, and an adaptive approach over time.
The answer I give you today is that I hope that it will adapt and evolve over time to meet the demands of that occupation. For example, in the coming weeks we're going to have an entire ideation session on how we can best use the reserve force within a cyber-occupation. We're looking at every and all means, and not just within our own structure. We are trying to leverage both industry and academia to bring ideas to us and to leverage those as well. I don't think we have all the answers—I know we don't—but we're working with all allies internationally and nationally to get the best advice within that structure.
To build upon what Mr. Fisher asked earlier about one of our frigates being deployed to NATO's Operation Reassurance as part of the maritime task force, we know that U.S. warships have been attacked through electronic warfare by the Russians. We talked earlier about how our troops in the enhanced forward presence in Latvia have undergone hybrid warfare attacks with some misinformation and slanderous media stories coming from the Kremlin-controlled news agencies Sputnik and RT.
Explain to me the difference between how we would provide cybersecurity to our troops stationed in Latvia or on one of our frigates in a NATO Operation Reassurance measure versus what we do in Operation Unifier with our troops in Ukraine. From a cybersecurity standpoint, do DND and the Canadian Armed Forces provide close personnel support in, say, Yavoriv, versus what they do with the guys who are outside of Riga, as done through Joint Operations Command of NATO?
:
Again that's a very good question, in the sense of getting a perspective of what it would look and feel like to deploy as military personnel from a digital perspective.
As Rich said earlier, when we get ready to deploy our forces into these areas of the world, a threat assessment is done and a reaction to that assessment to mitigate those risks is established before we deploy. In the digital and cyber world, for this conversation, we provide the capabilities for those men and women in uniform to operate, to do the job that they need to do to succeed in operations. We give them capabilities that are secure and compliant. We do our best to stay ahead of the bad guys when it comes to exploits and vulnerabilities and we are constantly readjusting our position.
In some ways it will be the same approach when we deploy our men and women when it comes to cyber and digital capabilities, but it will always be adjusted to the threat of the environment they are going into.
To that end, I will offer Commodore Feltham, as an operator himself, the opportunity to elaborate on my statement.