Notices of Meeting include information about the subject matter to be examined by the committee and date, time and place of the meeting, as well as a list of any witnesses scheduled to appear. The Evidence is the edited and revised transcript of what is said before a committee. The Minutes of Proceedings are the official record of the business conducted by the committee at a sitting.
Welcome to meeting number 36 of the House of Commons Special Committee on the Canada–People’s Republic of China Relationship. Pursuant to the order of reference of May 16, 2022, the committee is meeting for its study of the Canada–People’s Republic of China relationship.
As a substitute member today, we have Mr. Cooper subbing for Ms. Lantsman. I'm sure the shoes are killing you.
We also have MP Ellis substituting for MP Seeback and MP Naqvi for MP Oliphant, and Mr. Desjarlais is in for Ms. McPherson.
It's good to have you joining us.
Today's meeting is taking place in a hybrid format. Members are attending in person in the room and remotely using the Zoom application.
Please wait until I recognize you by name before speaking. For those participating by video conference, click on the microphone icon to activate your mic and please mute yourself while you're not speaking.
For interpretation, those on Zoom have the choice at the bottom of the screen of floor, English or French. Those in the room can use the earpiece and select the desired channel.
I'll remind you that all comments should be addressed through the chair. For members in the room, if you wish to speak, please raise your hand. For members on Zoom, please use the “raise hand” function. The clerk and I will manage the speaking order as best we can. We appreciate your patience and understanding in this regard.
Per the motion adopted on March 26, 2024, we're hearing testimony in relation to the matters revealed in the Winnipeg lab documents.
I'd now like to welcome the Honourable Mark Holland, Minister of Health, and, from the Department of Health, Nadine Huggins, assistant deputy minister and chief security officer, corporate services branch.
From the Public Health Agency of Canada, we have Heather Jeffrey, president. By video conference, we also have Dr. Guillaume Poliquin, vice-president of the national microbiology laboratory.
We see everybody present.
Minister, you may commence with a five-minute opening statement.
It's wonderful to be here. I appreciate the committee giving me the opportunity to answer questions and to make some brief opening remarks.
Let me start by saying the action of the two former employees at the national microbiology laboratory are reprehensible and deeply disturbing. The two Canadian citizens, two eminent scientists who were well known throughout North America for their contributions in the field of therapeutics, vaccines and virology, lied. They misrepresented themselves. These were employees who were hired in 2003 and 2006, respectively, and who made great contributions outside of this. Appropriately, the Public Health Agency identified them. They were fired, and they are now the subject of an investigation.
The second thing I'd like to do at the onset is recognize the extraordinary world-class work done by the national microbiology laboratory. Its surveillance work in the area of infectious disease, in emergency outbreak preparedness and response, in training and in research and development helps keep Canadians safe. We're extraordinarily lucky to have some of the greatest scientists in the world working in that facility. Their work is absolutely critical to the continually evolving health environment we're in, which necessitates international co-operation.
I will also recognize that in the past five or six years, not only have we had a global pandemic, but the threat environment we live in is different. Countries such as China are implicating themselves in our domestic processes in a way that would have been unimaginable just five years ago. As such, we have to respond, and we are. I'm happy to talk about some of those responses.
I think it's important for context to talk about how we got here today.
I was a member of the public safety and national security committee. I was its vice-chair. We had an opportunity, going back, in 2006, 2007, 2008 and 2011 to say to the government of the day, the Conservative government, that the recommendations of Justice Iacobucci and Justice O'Connor were essential. One of the main recommendations in both of those processes was to have a committee of parliamentarians that had the opportunity to look at all documents.
It's important to note in this particular case with the employees who were hired in 2003 and 2006 that the only thing that would be different today if there weren't a Liberal government is we wouldn't be having this meeting and you wouldn't see the documents. The Conservative government of the day refused to allow parliamentary oversight.
In 2021, when this matter was before the House of Commons, there was a battle in Parliament, a disagreement about how these documents should be looked at. At the time, the offer was made for NSICOP to be given an opportunity to look at this so parliamentarians of every political party would have the opportunity to look at the documents in their totality without redactions. After the 2021 election, the comment was made to me when I was the House leader that the opposition parties had a concern that this would mean if they disagreed with redactions, they would have no challenge function to those redactions. Appropriately, they asked for the ability to challenge redactions.
At that point in time, as House leader, I worked with other parties—initially it was just the New Democratic Party, but eventually, many months later, the Conservatives and the Bloc also joined us—to have an ad hoc process of independent arbiters who were able to look at the documents, and where there was disagreement on redactions, they could make a decision about what should or shouldn't be released. That committee and the independent panel of arbiters appropriately were asked to err on the side of public disclosure and to make sure the maximum public view into the documents would be made available. That's precisely what occurred.
We're not just talking here about national security in these redactions. The Public Health Agency also obviously has to consider confidential employee information. Quite rightly in this case, the normal protections around confidentiality of employee information were waived, given the serious security breach these two Canadian citizens engaged in. That's why we're here today.
With that, Mr. Chair, I'm pleased to take questions from the committee.
(1840)
I appreciate the opportunity to appear before you today, and I'll turn it back over to you.
Thank you, Minister, and thank you to the officials who are here.
Minister, three weeks ago when you appeared before the health committee and were asked about the massive national security breach at the Winnipeg lab, you stated that PHAC at all material times acted in the “highest order” and that with respect to accountability, no one at PHAC will be fired. Do you stand by that?
Well, in the first order, these two employees were fired. They were held to account for their actions and for the lies they told. However, I believe, as I stated then, that the Public Health Agency acted appropriately throughout the process in responding to those lies and the misinformation.
I want to ask you some questions about decisions that PHAC made surrounding this massive national security failure. Canadians themselves can judge whether PHAC acted in the highest order, as you stated three weeks ago before the health committee.
First, why in October 2018 did PHAC enter into a material transfer agreement with the Wuhan Institute of Virology to transfer, from the Winnipeg lab, Ebola and Henipah, two of the most deadly pathogens? Why did that happen?
In 2018, we were working collaboratively with China on developing therapies and interventions with respect to Ebola. It is a serious global pathogen, and the efforts at that point in time were to collaborate with China in a partnership—
Minister, I asked you a question and I'm going to build on it.
October 2018 is significant. This material transfer agreement was initiated by none other than Dr. Qiu, one of the two scientists.
In October 2018, at the time that material transfer agreement was entered into, PHAC was already aware that Dr. Qiu was named on a Chinese patent that was highly suspicious and had been flagged to CSIS by the head of the Winnipeg lab as a potential national security threat. Why in the world, with that knowledge, would PHAC transfer deadly, dangerous pathogens to Wuhan at the request of a scientist that PHAC knew at the time was a potential national security risk?
As you know, it was in the fall of 2018 that this matter was first flagged as a concern, and we have due process. The transfer you're talking about was done with the full knowledge and the full co-operation of the Public Health Agency in the interest of advancing the protection of our species against the infectious disease Ebola. At that point in time, because Ebola doesn't know boundaries, the effort was to work collaboratively with China and other countries. It is deeply disturbing, obviously—
Chair, I have a point of order. This is the third time now that Mr. Cooper has interrupted the minister, who is here as a witness.
He's answering in good faith, and I think Mr. Cooper is asking questions that he's perfectly entitled to ask. However, I would ask, Mr. Chair, that the usual, the typical and the collegial back-and-forth that we expect here at committee be allowed to take place rather than interruptions, because I'm trying to get a sense of the answers as well, and interruptions get in the way.
Minister, you are right that it was in the fall of 2018 that red flags were first raised about these two scientists. A preliminary investigation wasn't undertaken until December 2018. That's months after the first red flags were raised, and in the interim, a material transfer agreement was signed with Wuhan at the request of one of the scientists who was deemed to be a potential national security threat.
Why did it take so long to launch a preliminary investigation? Three or four months is a long time.
In this instance, the nature of that patent and the reason the patent hadn't been disclosed were being investigated, and there is due process.
It is indeed sad for the world that we are no longer able to co-operate closely with countries with respect to deadly pathogens that represent a clear and present threat to the human race. The fact that there are countries engaging in activities that would endanger not only our country but all human beings is profoundly disturbing.
Minister, the preliminary fact-finding report was issued on March 23, 2019. It identified that the two scientists had engaged in multiple security and intellectual property breaches, that they had engaged in unauthorized transfers, including to Wuhan, and that they had engaged in unauthorized research collaboration with the Beijing regime, including the People's Liberation Army.
What did PHAC do next? PHAC then transferred Ebola and Henipah to Wuhan.
You're making a connection between two completely separate things.
In the first order, the transferring and working with China at that point in time to try to protect our species from Ebola was something we were doing earnestly, with the belief that China shared our desire to protect human beings from a deadly pathogen.
In the second order, when you're talking about the individuals—the scientists who were fired—you have to remember that these individuals were hired in 2003 and 2006. They are published throughout North America. They are eminent scientists. They are Canadian citizens—
—it took another three and a half months—until July 5, 2019—before the two scientists were finally marched out of the Winnipeg lab, scientists who in March had been identified as working with the People's Liberation Army.
This is Canada's highest security lab. Is that really an instance of PHAC acting in the highest order, as you said?
Due process is incredibly important. These individuals worked with the Public Health Agency. One was hired in 2003 and one was hired in 2006. They were published and renowned across North America for their work in vaccines, virology and therapy. They were seen as leaders in helping to save lives.
If you are making an accusation against somebody, these people's careers can be, rightly, destroyed. Before you destroy somebody's career, they are entitled to due process. Due process is important in this country.
I want to pick up the conversation where Mr. Cooper left it because I think he's throwing out quite a few dates and perhaps muddling the facts.
Canada, I'm assuming, has had a long-term relationship in working with China and other countries when it comes to finding a cure for deadly pathogens, as you put it, and other matters. Can you walk us through the kinds of relationships, arrangements and agreements that Canada, through the Public Health Agency of Canada, goes through and develops with other countries like China?
The collaborations we engage in internationally are critically important to protecting our population and to protecting human beings all across the world. As I mentioned, pathogens don't know international boundaries, and they certainly aren't interested in politics, so the ability to share best practices, science and the latest evidence of what actions we can take, be they in therapies or vaccines, is critically important. Where new information arises, we want those partnerships.
I think it's deeply tragic, frankly, that the relationship with China deteriorated such that we can't collaborate on these issues any longer. It is unfathomable that a country would place its interests as a nation ahead of the interests of the health of our species.
That's what we encountered here. We're at a very different place now than we were five years ago, and that's deeply tragic. However, that is separate and apart—and I think we have to be very careful because there is an attempt to conflate these things—from the actions of Canadian citizens who lied. They were in their jobs and completely misrepresented themselves to the Public Health Agency. That's reprehensible.
They were rightly fired. They're rightly subject to investigation. It is certainly a very serious matter, but we have to be careful, I think, in the characterization of that to not conflate things.
Obviously, what happened in 2018 and 2019 with these two particular scientists is that they essentially lied to their employer, the national microbiology laboratory.
Can you walk us through what steps have been taken by the national microbiology laboratory to ensure that safety and security are enhanced and that nothing like what happened in 2018 and 2019 can happen again?
Look, anytime somebody misrepresents themself and engages in behaviour of this nature, you learn. Certainly, the threat environment for Canada has changed over the last five years. There have been very critical actions, and I can go into more detail. I know we don't have a lot of time.
With respect to physical security, facility access, employee communication, engagement technology, partnership and research affiliations, and governance oversight, it's a process of continual improvement. When it comes to national safety, unfortunately we don't always—or even most often, in fact—share the same values as some of our adversaries. They're willing to go places and do things that are unimaginable to us. I think it would have been unimaginable that a country like China was potentially willing, in this instance, to use pathogens that threaten humanity in order to advance their geopolitical agenda. That's no longer unimaginable, so it changes how you respond.
Looking at how employees communicate.... Even incredibly eminent, well-published scientists who are Canadian citizens recognize that we have to dig more and ask more questions. In the past, that would have been deeply insulting to scientists. Now, in light of this, scientists understand that they can't be taken at their word and that we have to question other relationships they have and probe into their lives in a way that would have seemed entirely inappropriate and crazy before.
That's the advantage of hindsight when somebody does something unthinkable. It changes your framing and disposition. Then we as a society have to accept something that's more invasive. That's certainly true for scientists today.
Perhaps in a minute I can ask the officials to outline what kind of process both the Public Health Agency of Canada and the national microbiology laboratory went through to enhance their safety and security protocols after 2018 and 2019.
In addition to enhanced physical security and access control measures, all policies at the national microbiology laboratory and the agency were revised. These are secret-level facilities requiring clearances under the Human Pathogens and Toxins Act. There is continual training and review of our guard services, as well as our personnel. We have strengthened protocols for deliveries in shipping and receiving, including mandatory controls around documentation and verification of infectious materials. There are requirements for material transfer agreements and collaborative research agreements, and enforcement of their use.
Comprehensive threat and risk assessments for the physical and IT environments have been undertaken to ensure that all of our security measures are complete and up to date. In addition, we have updated our policy on affiliations and collaborations with academic, research and health care organizations, and we have a new student hiring policy with additional controls.
These are designed to respond to the threat environment we face.
Listening to your answers to Mr. Cooper's questions, I found it very naive when you said that, at the time, you still believed that the Chinese authorities considered deadly viruses like Ebola to be at par with how important you consider protecting humanity to be.
I find these comments all the more naive given that, in an article posted on the Radio-Canada website on February 29, you said that China's influence on the Canadian scientific community “was not as widely known as it is today”.
However, in an article published in Le Journal de Montréal on January 29, 2024, we learned that the Canadian Security Intelligence Service, or CSIS, released a report in 2010 explaining China's growing economic power, its growing confidence and its aggressive new agent recruitment policy, which suggest that it has the will and resources to enhance its intelligence activities more and more.
In short, for over 20 years, CSIS has been alerting government authorities to the fact that the People's Republic of China is being much more aggressive and is intensifying its intelligence activities, particularly in terms of technological research and biomedical advances.
Therefore, why claim that China's influence was not as widely known as it is today?
First, I must say that the issue of public safety is extremely complex, because it has many dimensions. In the case of a virus that threatens the population in general, we first expect the government to do everything it can to protect the public, including cooperating to find solutions. We expect that if a solution exists elsewhere in the world, the government will take action. First of all, we try to work with all scientific communities around the world to find a solution. This is really important, because if a tragic event were to occur, other types of questions would be asked. People would ask the government what it's done to protect the public and whether it has sought a solution. So it's important to cooperate as much as possible.
However, the world has changed a great deal over the past five years. Five years ago, we certainly had a problem with China. That was absolutely the case. However, for me, it's terrible to think that a country could play with a virus for geopolitical reasons. To me, that's something else. As Minister of Health, I have a lot of objectives on my mind at the same time, because many threats are still present. I'm very concerned about that.
So we have to cooperate with all countries as much as possible. It's therefore extremely unfortunate that we can now no longer work with a country as big as China. China has a lot of incredible scientists; they have enormous potential to find solutions for their country, for our country and for people in general. It's very sad that our interaction with a country like that is coming to an end. That has major implications, not only for Canada, but for the world.
It must be recognized that it's a laudable objective to want to work with all countries to prevent the spread of viruses that can be catastrophic for humanity. However, given that CSIS has been warning the Canadian government for over 20 years that the People's Republic of China's scientific espionage is a problem. Don't you think we were a bit reckless to continue sharing our secrets or scientific information with scientists who were then passing it on to the Chinese authorities?
You're right, when we share information, there is a risk that a country could use it to gain an economic advantage. However, that carries far less risk than threats to our public safety and national security. Five years ago, China or scientists in China might have used the information for an economic advantage. However, the consequences of that are not really serious compared to using a virus as a weapon or as a threat to the global population, which is a completely different ball game. As I already explained, I find it extremely unfortunate that it's now impossible to cooperate with a billion people on viruses.
I want to thank the minister for being present for a very important piece of work. It concerns something that I think most Canadians are concerned about—the safety and security of not only our country but also our information. In an age of digital technology, when both companies and countries are participating in the exchange of information and the withholding of information, it could be, to put it in terms of bad actors, a battlefield. In this particular instance, I think Canadians are concerned that should we find ourselves in an “informational battlefield”, we would be disadvantaged by the reality of the knowledge being seen in this very troubling case.
Minister, I think you alluded to the fact that it's important for there to be accountability. The two individuals who did this are no longer there, of course, but what isn't known is how co-operative other officials could have been, or other persons or personnel. What information have you or your ministry reviewed, maybe in coordination with CSIS, on the safety and security of other persons in PHAC, particularly in its work on information, science and technology?
I hope everybody gets an opportunity to visit the national microbiology laboratory and meet the scientists there, who are on the front lines of looking at potential nightmare scenarios. COVID was bad, but it could have been much worse. In so many instances, we were very lucky as a population that we didn't have a pathogen with a much higher mortality rate.
That remains a risk for our population at any given time. We charge the Public Health Agency and the national microbiology laboratory with finding solutions to nightmare scenarios and co-operating with and listening to scientists and engage wherever possible, because if God forbid anything ever happens, people will ask, “What did you do to find an answer?”
As I said, when you take one billion people off the planet and can no longer co-operate with hundreds of thousands of scientists who themselves are leading in the area of virology and finding solutions, that is a terribly tragic day for humanity. When I look at it, and I would encourage you to look at it too, the threats that the Public Health Agency is trying to navigate.... Think about this. These were employees engaged in—
Just to go back to the question, have you reviewed or have you met with CSIS to review the existing personnel in the agency to see whether the security clearances are in fact appropriate?
In terms of the security reviews of employees, I would turn to the officials on that—to Madam Jeffrey, if I could. That would be on her side of the fence.
In the first instance, this situation came to light in these cases as a result of a security awareness briefing provided by the Canadian Security Intelligence Service in regard to the threats against Canadian research and the potential vulnerability of Canadian scientists to pressure. That awareness-raising continues in regular meetings with our security services and ongoing reviews. I would note that the RCMP investigation into these cases remains ongoing, as they have said publicly.
Those contacts have been regularized and are constant and ongoing, as is appropriate given the nature of the ongoing evolving risk situation.
To get to the crux of the issue, I think it's important that PHAC and other agencies within the government have security processes for really important information like this. It is a bit concerning to know that CSIS was the only agency that identified this information vulnerability prior to PHAC. I believe that Canadians expect, in an agency that has an immense amount of information on individuals, particularly personal information, that there be some kind of security oversight internal to the ministry.
I think this could have been largely prevented by way of the recent changes that you've discussed publicly, Minister. Those changes could have been made much sooner, I believe, which could have reduced some of the risk that's present to this case.
In one quick answer, if you could do this whole thing again, would you have released the documents sooner?
No, because the process by which we released the documents was incredibly important.
Maybe I can rest on this moment for a second. National security is not the only issue present here. There's also consideration for protecting employee privacy, and if you're going to waive that.... The people who serve in the public service have that right—as in any job, by the way. I was head of Heart and Stroke. We let people go. Sometimes it was painful, because they would have a story of why they were let go that was completely inaccurate, but I wasn't allowed to comment. The reason I'm not allowed to comment is that employee confidentiality is extremely important. To waive that is a big deal. When we waive it, I think we have to think through these issues.
What I liked about this process was that a weakness was identified in NSICOP—challenging redactions. We were able to create a process in the ad hoc committee that allowed those, through an independent arbiter, to be released with maximum transparency while protecting the partnerships we have with our Five Eyes partners to make sure that employee information and national security are protected.
I think the fact that we were so cautious in dealing with this issue and that we worked through a way of ensuring both transparency and public interest and making sure that we still maintained our commitments to protect our processes—
Can you tell us why Dr. Matthew Gilmour suddenly resigned eight weeks into a global pandemic in May 2020 and why Tina Namiesniowski, the president of the Public Health Agency of Canada, suddenly resigned on a Friday afternoon in September 2020?
I would say that for both of them, it's not really appropriate for us to comment. I think they both reflected that they resigned for personal reasons not associated with this issue.
Perhaps I can respond. I think one of the challenges—and I got into it earlier—is that anytime we're talking about information with respect to an employee—
With respect, you are wrong on that. The Privacy Act exempts parliamentary committees and other judicial proceedings from the terms of the Privacy Act. That's stated in the opening clauses of that act, which is an act of Parliament. We are exempt from the provisions of the Privacy Act and we're asking questions in respect of employees of the Government of Canada. We went through that in the previous Parliament on this very committee, actually, when we were asking for these documents.
If you don't know the reasons why they resigned, that's fine. I'm just asking the questions. I take it that you don't—
This case is the only one that I'm aware of where our scientists were participating in this program, and I'd refer you to our security services for information. This was an undeclared collaboration—
That's right; you're correct. The Government of Canada stumbled upon it.
Has there been a review or a proactive request on the part of management within the Government of Canada to ensure that all government scientists are complying with the policies of the government in declaring their participation in the thousand talents program?
Yes, and I think it's deeply unfortunate. Again, these are Canadian citizens. They were long-time employees and well-published, eminent scientists, known well throughout North America, who lied to the Public Health Agency. That changed things materially, so at that point in time, you had to ask questions and dig into people's backgrounds in a way that would have been seen as invasive and inappropriate before.
Just to clarify, there is no collaboration presently going on between the national microbiology laboratory in Winnipeg and entities and individuals in the People's Republic of China?
I would say, just further to the other point, that there's a requirement, and there always has been a requirement, to declare any affiliations or outside work. That's one of the reasons these people were fired. They lied about that.
I have a question about non-Canadian citizens. The documents that we received revealed that non-Canadian citizens, specifically PRC nationals, were given access to the lab.
My first question is, who in the Health Canada or in the Public Health Agency of Canada is responsible for granting security clearances at the NML in Winnipeg?
The security screening process begins with reliability status checks that are conducted by the security department of the agency. They are then referred to the RCMP and the Canadian Security Intelligence Service for secret clearances.
CSIS doesn't grant clearance. CSIS, the RCMP and others provide advice. There is an individual within either Health Canada or PHAC who grants the clearance. Who is that individual?
Access for those students was through a research affiliate program with the University of Manitoba. Those students did not have clearances under the Human Pathogens and Toxins Act and therefore were not involved in level 3 or level 4 lab work, or in any of the restricted pathogens and toxins.
It wasn't just students. A senior technician at the Wuhan Institute of Virology—a PRC national—was also granted access to the NML. That was also contained in the documents. They were identified as “individual number 2” in the documents.
Again, it was somebody in the department. It was not the two scientists in question because they're not granting security clearance for their own lab. Somebody else in the department granted them security clearances.
Why are they not being held responsible for that gross negligence in protecting our security?
People have approached me with a number of concerns regarding the security research guidelines and the new named research organizations lists. Some Chinese Canadian scientists feel uneasy or targeted or that their careers could be limited due to having a Chinese name. They're worried about being under a cloud of suspicion.
How do you balance the national interests of security with the concerns of some in the Chinese community?
Thank you very much for that question. I think it's an important one.
It's important to distinguish the action of an individual from making collective statements. In this instance, these were two Canadian citizens who engaged in reprehensible actions that are reflective of them and only them. I think we have to be very careful, when we're talking about scientists or any individual, not to ascribe anything to anyone other than the people who were responsible for taking those actions.
In this geopolitical environment, with tensions being where they are with China, it's very difficult to separate out the actions of the Government of China from those of the citizens of Canada who happen to have Chinese ancestry or, for that matter, people living within China. There are unbelievable numbers of wonderful Chinese scientists doing incredible work for the betterment of humanity in China now. We cannot allow the actions of the Chinese government to colour our view and create the kinds of distortions that you're talking about. We have to root that out.
I would suggest that we need to step back and consider very carefully how we address these issues. I always think of first principles. The first principle, as everybody in this room agrees, is that protecting our nation from foreign interference is our top priority. We have to protect this country. Beyond that, we have to protect democracy.
We would secondarily agree that any attack on the scientific community or on the domestic affairs of this country is an attack upon all of us. Every member of Parliament is equally affected by that.
Thirdly, the actors engaging in this are separate and apart from any community. They are either a government actor or individuals making these decisions. We have to not view them in the context of a community.
We have to think very carefully because we've seen, historically, that when broad characterizations are made and we are not careful with the brush we paint with, we hurt a lot of very innocent people. I think we have to be very careful about that.
I'd say that this is one of the reasons it's very important that any allegations or indices are tested through investigation by the appropriate security agencies and that evidence is collected through all of the means and tools at their disposal. In this instance, we had individuals who misrepresented themselves. Those who have not done so have nothing to fear from this process, and we need the talents of all of our scientists in Canada.
Maybe I could add to that. This is one of the really dangerous things here, because what we don't want to have happen is for the national microbiology laboratory or anybody who's working in the area of virology, vaccines or therapies to start being afraid of collaborating. It is the lifeblood of scientific discovery. The threats we face from the potential of new pathogens are extraordinary. We need to, wherever possible, work with folks.
As to the part of the questions, looking back five years, about why we were collaborating and why we were working like that, it's because these people are earnestly trying to find solutions that save human beings. It is so sad that now these lines are having to be drawn and that we're losing international partners.
We can't allow further barriers to come to innocent Canadians, people who have done nothing wrong and who are leaders in their field. We can't have suspicion cast upon them, have people not collaborating with them and have their research not being listened to. In our fear of one thing, we can't create a shadow that does incredible damage in another area. We have to hold that in our minds as we debate these issues.
I want to go back to what I was saying a few minutes ago. Despite the indications, we didn't seem to draw the conclusions we should have drawn over the past 20 years. In addition, it seems that the objective and tangible facts were not properly assessed.
For example, in the case of Xiangguo Qiu, the Government of Canada listed the research organizations with which she was affiliated. However, that list didn't include the Wuhan Institute of Virology and didn't mention that it applied to be part of the People's Republic of China's thousand talents plan.
How is it that this crucial information was not included with the list of organizations Ms. Qiu was associated with?
In a highly secure lab like the National Microbiology Laboratory in Winnipeg, when you make up the list of organizations a scientist is associated with, is it simply based on voluntary reporting or is there some sort of security screening?
From what you're telling me, Mr. Minister, I understand that we rely on the person's word and that we don't call on our intelligence service to verify that.
At the outset, especially in the case of an individual who is really well known, who has worked for the Government of Canada for a long time, it's their responsibility as a Canadian citizen to reaffirm their commitment, among other things. However, for new employees, the Royal Canadian Mounted Police and CSIS check personal data, security clearance, relationships and that sort of thing. That's done as well.
However, in that environment, and particularly at that time, it was possible to lie and create the conditions to spread misinformation. That's how things were. We're now working very hard to make sure we batten down all the hatches.
Minister, I want to turn now to a question of opinion that is likely to form a question of policy in your mind as a minister. I think many Canadians want to understand what you think about particular issues as they relate to decisions of today. How important is security, communication and audit and evaluation work for your department?
It was and is essential. I think every time a nefarious actor behaves in an unthinkable way, you learn. That certainly happened here. The behaviour of these two individuals created process improvements to ensure that similar actions couldn't be undertaken in a contemporary context.
It's essential, but your department plan as of February 29, 2024, indicates that you'll be cutting these three areas. As it relates to the Winnipeg incident, I think it's quite irresponsible to be making financial cuts in this area.
Can you describe why your department has tabled plans to make significant cuts to these three programs?
We're not making any reductions to our security expenditures except for those related to the oversized nature of our pandemic response. Of course, our departmental estimates are coming down off that peak, but we in fact are making new investments in cybersecurity, IT restructuring and our security.
It was for every aspect, because you can imagine that the number of employees we had was vastly larger. For example, if you have to run security checks for a much larger workforce, there will be increased costs. If you have a smaller workforce, you'll have less need for security. Any reductions in security have nothing to do with a reduction in security; they have to do with a scaling back of the workforce, moving into a postpandemic period.
We're above prepandemic levels, 2019 levels, and we're making continued investments to go beyond that, some of which I look forward to talking about in the coming days. We're above where we were prior to the pandemic.
I think the investments have been appropriate, and they continue. There are, across the spectrum of health, unbelievable needs. Every moment you take from one area, you have to give to another, and there's a limit to what you can do fiscally.
I would say the increased investments we've made in security and in the protection of our facilities are extremely important, and we will continue to make the investments needed to—
Thank you very much, Chair, and thank you, Minister.
Back in 2017, Minister, the United States raised questions about the Chinese Ministry of Defence's Academy of Military Medical Sciences and its Institute of Microbiology and Epidemiology, saying that they were a risk of potential biological weapon capabilities. Doesn't that fly in the face of you saying that we had a great relationship with China then?
I don't recall saying we had a great relationship. I said there were at that point in time emergent concerns around the way in which China was engaging internationally. There were some early warning signals that things were beginning to turn in a bad way. However, the management of risk—particularly when we're talking about deadly pathogens, trying to find answers and thinking that you would try to use information around therapies and vaccines for some sort of geopolitical military purpose—was a different dimension at that moment in time.
What I'm saying is that international collaboration at that moment in time was with respect to Ebola and any number of other pathogens happening on the international stage. China represents a billion people. It has an enormous wealth of knowledge and information—
Even though we have scientists sending a potentially weaponized virus to a power that's going to make biological weapons, clearly you think that's okay.
At the Wuhan Institute of Virology, they didn't have Ebola until the scientists at the national microbiology lab sent it to them. They did not have it.
I think this committee was going so well. Some very thoughtful back-and-forth took place among members from all parties, and all of a sudden I'm seeing a behaviour that I saw from Mr. Ellis at the HESA committee, which is highly inappropriate. I think it's undervaluing the work this committee is doing on this very important topic.
Pose a question, wait for the answer and get the answer. You may not like the answer, but at least give an opportunity to have a respectful discussion between the member and the speaker. I just—
Thank you for interrupting. Mr. Ellis just made my point by interrupting another member on a point of order.
Did you come here with a certain attitude, or are you here to make sure there is respectful conversation happening, as was being done by other members from your own party and other members of the committee?
Dr. Ellis, if I could, please.... Again, this is just for the interest of our interpreters. When we talk over each other, it makes things very difficult for them, so I would ask, out of respect for them, that we keep things orderly.
Chair, are we going to have this guy answer the question? Once he does, he doesn't need to keep talking. He answered the question. I'm quite satisfied with that.
Chair, I echo what Mr. Naqvi said. The meeting was going well. These are important issues and no one's denying that, but if we're going to be serious about getting answers that allow for a genuine approach, one that prevents errors like this from happening in the future, then let's at least allow a civil dialogue to take place. That's all we're asking for.
We're going to have a number of meetings on this very issue, it looks like. I don't know whether Mr. Ellis is here as a permanent replacement or he's here temporarily, but I would just ask for the member to act as an adult. I don't know how else I can put it.
Considering what we have learned so far, which is next to nothing, what prompted the SDG of the NML to ID Dr. Qiu and Dr. Cheng as potential security risks as far back as 2018?
As Madam Jeffrey indicated, there was a process with an update from CSIS on the potential for employees to be approached in an attempt to get information from them, and reviews were undertaken. As part of the review that came out of that process in the fall of 2018, it was found that a patent had been—
Excuse me, Minister, but that's not true because the patent issue, as we already established, came in October. This was in August 2018. The SDG said to CSIS there was a problem with two scientists. They named Qiu and Cheng. Why?
Everybody, in the interest of time, shall we get back to work and introduce our second panel?
I would now like to welcome David Vigneault, director of the Canadian Security Intelligence Service, and the following officials: Adam Fisher, director general, litigation and disclosure, and Leonard Stern, deputy director general, security screening.
Mr. Vigneault, you have five minutes for some opening remarks.
Mr. Chair and members of the committee, it is an honour to join you this evening and to have the opportunity to contribute to your discussion on the matters revealed in the Winnipeg National Microbiology Laboratory documents and, more broadly, on the importance of protecting Canada's research from foreign interference.
My goal today is to provide some clarity on CSIS's role in protecting our research, through its screening mandate, intelligence collection and advice, and stakeholder engagement. I also welcome the opportunity to provide clarity on CSIS's disclosure processes, and how we are working to maximize transparency while protecting sensitive information.
[English]
As this committee is well aware, Canada's research sector is often targeted by foreign threat actors seeking to advance their interests at our expense. This can take many forms, from covertly influencing research agendas or peer review processes to engaging in funding arrangements whereby details about the source of funds can be obscured or misrepresented. Through deceptive partnerships and collaborations, vital research and novel intellectual property are stolen. The PRC is by far the greatest perpetrator of these activities.
Needless to say, as state actors become more sophisticated, these threats become harder to identify and counter. It is therefore imperative that Canadians work together. This effort begins with informed and transparent discussions among and within all levels and branches of government, as well as with communities, academia and businesses.
As a committed partner in this effort, CSIS continues to investigate, provide advice to the government and, when appropriate, take measures to reduce threats. This work includes close collaboration with other government departments. For example, CSIS leverages its unique tools and access to provide to requesting departments thorough security assessments on individuals who require access to classified Government of Canada information or sensitive sites. This is one of the tools used to protect Canada's research infrastructure against insider threats.
[Translation]
Other tools include stakeholder engagement, which, through education and knowledge dissemination, builds resilience against foreign interference, and thus ensures that government investments do not inadvertently advance the research of hostile states in sensitive areas.
While, as an intelligence service, CSIS needs to be able to protect its own intelligence in order to fulfil its mandate, CSIS has also actively been taking measures to increase transparency with Canadians through increased public engagement with communities and institutions on national security issues. CSIS has briefed more than 200 organizations and 1,000 individuals across Canada who are now well informed about possible threats, which has provided them with the tools to protect themselves, their research, and their employees.
CSIS also exercises transparency through regular proactive and responsive disclosures of information. In the case of the Winnipeg lab documents, CSIS worked collaboratively with the panel of arbiters to maximize transparency through sanitization, including by summarizing certain redactions to provide unclassified information. This resulted in the publication of a greater amount of national security information than previously released. The panel recognized that the release of the remaining redactions could be detrimental to Canada's national security.
[English]
What is considered injurious to national security is not static; rather, it evolves over time. With the passage of time, these assessments may change. This is why CSIS dedicates subject matter experts to review documents line by line, irrespective of their initial classification, to maximize transparency to Parliament and Canadians.
(1945)
The PRC has been bold in its attempts to threaten Canada's security, prosperity and research through strategic espionage and foreign interference. To counter these threats, CSIS is continuously implementing lessons in how it responds to the constantly evolving threat environment. This includes increasing transparency with Canadians through an increased openness and willingness to release as much information as possible through processes such as this one.
Finally, I will note that in order to protect the safety and security of Canadians, I cannot publicly comment on operational matters and requirements. Nonetheless, I welcome this opportunity for frank and transparent discussions to the extent that's possible, and will be happy to answer your questions.
Specifically related to the national microbiology lab, is it true that in August 2018, CSIS provided a briefing to national microbiology lab security officials?
Absolutely. As part of its effort to make sure there's increased resilience against threats posed by a number of foreign actors, CSIS engaged in proactive discussions with the Public Health Agency, including the national microbiology lab, about threats and indicators of insider threats. That was a very important and very useful discussion in 2018.
Mr. Vigneault, I'm not sure how much you may or may not want to comment on this, but is it not true that the SDG of the national microbiology lab brought the names of two Chinese scientists forward to CSIS at that time?
I'm not entirely sure, Mr. Vigneault, if you're aware of the timelines, but I'll ask you this anyway.
That would then lead us all to believe that there were concerns about Dr. Qiu and Dr. Cheng before the discovery of the two patents in the PRC registered under Dr. Qiu's name. Is that true, sir?
My understanding is that some initial concerns were brought forward by PHAC and the NML to CSIS. As a result, we started further investigations. It's as a result of those investigations that we discovered the information about the patent.
Is there any more information about the nature of the exact concerns that officials brought to CSIS back in August 2018 with respect to Dr. Qiu and Dr. Cheng?
I will absolutely endeavour to see what we can do. Of course, there will be limitations over what has already been disclosed through the process. If there is more information we can share, we will do so.
Mr. Vigneault, given that I realize there are security concerns around this, we asked the minister previously about other ongoing security assessments or investigations of the thousand talents program or like programs. I understand that there's a new name for that program potentially. It's for any scientists working at any government labs in Canada. Is there currently an investigation going on with respect to that?
As I mentioned in my initial comments, there are limits to what I can disclose publicly.
If it's helpful, I can tell the member that the thousand talents program is something we're keenly aware of and quite concerned with. The different ways the PRC—or, for that matter, other countries—could try to use this type of program are something that CSIS investigates fairly thoroughly, and we work with our international partners to better understand those dynamics.
Unfortunately, I'm not at liberty to discuss more specific details.
One of the things we know—the minister talked a lot about this—is that due process is more important than national security. Obviously your lens is a little different than that of the minister. Do you share those comments?
I did not have the opportunity to listen to all of the minister's previous comments, but what I can tell you is that as an intelligence service working in a democratic environment governed by the rule of law, we are, of course, keenly focused, as per our mandate, on investigating all threats to national security. We try to do that very thoroughly.
We are also mindful that Canadians are entitled to due process and different procedures. In the case of a security screening assessment, our role is very clear. We investigate and we provide advice to the requesting department, which is the owner of the decision at the end of the process.
Sir, I might suggest things were a bit different. Things had evolved to the point that early in 2019, this scientist's computer was mirrored, in my understanding from the information we have in the briefing, yet the institution, the national microbiology lab, the scientist worked for allowed a very deadly pathogen—probably two pathogens, Ebola and Henipah virus—to be transferred to an existing level 4 lab in the PRC, the Wuhan Institute of Virology.
Sir, in your assessment of threat and security, does that make any sense?
I think the specific dynamic of when, how and under what authority those samples were transferred has been looked at by this committee, and I would argue that the members of this committee have more specific knowledge than CSIS on that very aspect.
What I can tell you is that it is an area of great concern for CSIS when we see that directly or indirectly, covertly or not, the PRC is in any way able to potentially increase their threat activity against Canada and against other western nations and their neighbours. That's the prism through which we look at these issues at CSIS.
Mr. Vigneault, to what extent can we say that every democracy is dealing with these kinds of issues in some shape or form, with implications for national security when we look at issues of research and research collaboration?
I will use a very specific example to illustrate that point. My colleagues and I, the heads of the Five Eyes intelligence services, took the unprecedented avenue of meeting together in public for the first time in our history in October of last year at Stanford University in the context of talking about innovation and the need to secure innovation for the well-being, prosperity and security of our countries in the future. We had a common assessment, the heads of Five Eyes, that specifically the work of the PRC against all of us, against essentially any organization that has information or know-how that the PRC is interested in, puts us at risk because there is an institutional approach through the thousand talents programs, through covert espionage activities and through open arrangements and investments to try to get information.
What is done in an overt way is not the problem. In the case of the PRC, there is a very specific set of conditions that apply, and the Chinese Communist Party has been very clear that their goal is to have, for example, the most advanced and modern military by 2049. In order to do so, the President of China, Xi Jinping, who is also the general secretary of the Communist Party, chairs a committee of military-civil fusion. In all of the information, know-how and data they acquire, there is an institutional approach to try to leverage it and turn it into a military advantage.
From that point of view, Mr. Fragiskatos, you're right to say that it's not just Canada under threat, but any other country that has something the PRC is interested in acquiring.
What would you say is the message to post-secondary institutions? I represent London, Ontario—or help to represent London, Ontario—in the House of Commons. Western University is in London. We have universities throughout the country that look at medical research and research in general, and collaboration is key to that research in so many different cases.
What message is being relayed either through the Five Eyes or generally? What would you say here to universities that look at situations like this and wonder about security implications for research?
This is one of the areas where we have to be very careful in how we engage in these discussions. Canada is a prosperous country because we have excellent know-how, universities and research. This is the basis for our prosperity. We have to be careful not to stifle that innovation, because we will not be where we need to be in 10, 15 or 20 years. That innovation needs to be protected. However, the world has changed, and the number of actors have also changed in the process. The way they are engaging in these activities has evolved to the point where some of these activities are indeed threats to our country.
One of the most important ways to specifically work with universities is to engage in open dialogue and share information with them. We have published unclassified documents that get at the core of this issue.
In the past year, we have engaged directly with universities. We visited 13 universities across the country. We work with the research universities in the country and with Universities Canada to share our information. We meet with academia, student bodies and academic administrators to essentially share with them what we know and the concerns we may have, and to work in collaboration to accomplish two objectives: great innovation in our universities and protecting our national security at the same time. Both need to be achieved.
Beyond universities, you said there were around 200 organizations that CSIS has briefed. What kinds of organizations are we looking at here? What is the nature of those briefings? I ask that question because I wonder if there are particular sectors you're worried about that are more susceptible to threats.
Indeed there are a number of specific sectors we're more concerned with, such as quantum technology, biopharma and aviation. We're looking at anything related to cyber. Our agriculture is an area of concern, because we're developing very innovative approaches in our country.
We're meeting with universities, as I mentioned. We're also meeting with industry associations. We're publishing unclassified documents and trying to make them as available as possible.
If it's of interest, I can say that we're also working.... We have been talking about foreign interference. Elements of the approach by the PRC are espionage and foreign interference. They are often two elements of the same strategy. We've been engaging very significantly with the diaspora in the country to make sure we are seen by the diaspora as part of the solution. We share our information, listen to their concerns and better interact with them regarding what would be relevant.
The work of this committee is also very important, because it's increasing the knowledge and know-how we have that we can share through you. It's through these different efforts that we'll increase the resilience of Canada and Canadians.
Good evening, gentlemen. Thank you for being here.
A few moments ago, I reported on an article published in the Journal de Montréal on January 29, 2024, in which we learned that, as early as 2010, you were warning the government of an increasingly aggressive attitude on the part of China, particularly regarding intelligence activities. What we've found is that the government has been slow to pick up the message, so much so that the minister was telling us a few moments ago that, until very recently, employees were essentially relied upon to self-declare in order to get a clear idea of the “pedigree” of the links they had with other institutions.
I don't mean to put you on the spot, but do you feel that the government should have put in place background check mechanisms sooner for people working in a high-level, tier 4 lab like Winnipeg?
Mr. Bergeron, your question is very interesting and touches on several important points. One of these matters to consider is China's evolution in recent years, especially since Xi Jinping came to power, the degree of aggression and disrespect for international law...
For example, China has refused to abide by the International Court of Arbitration's 2016 ruling on the South China Sea. Yet the ruling was very clear and unequivocal. This is one of the triggers. Since 2013, when Xi Jinping came to power, various examples like this one demonstrate an important trajectory for China.
At the same time, Chinese legislation and several programs have evolved. For example, the Thousand Talents Program has become much more institutionalized. In some ways, China is very open, but since 2017 and 2018, laws have been put in place to force people, companies and all Chinese people everywhere to collaborate with intelligence services.
I'd also like to mention the evolution and growth of the United Front Work Department. Its approach is to influence and control the Chinese diaspora and influence other countries in order to further Chinese interests.
The United Front Work Department, the Thousand Talents Program and the evolving threat posed by China are all elements that need to be taken into account. In fact, that's what our intelligence services, analysts and experts on China are doing. We need to take the information we have in 2024 and put it in the context of 2010. We have to take into account what we knew at that time, what was known and what measures could have been taken.
Finally, I'd like to add that, in working with my colleagues around the world on issues of Chinese spying and interference, I've been able to see that these behaviours have evolved everywhere over the past few years.
When you testified before the committee in March 2021, you were talking about the relationship between your institution and universities. You mentioned that the Canadian Security Intelligence Service maintained “a close dialogue” with universities and that you wished “to be able to engage in dialogues” that were even more extensive.
In March 2024, the CBC reported that the University of Saskatchewan would ultimately host Canada's first level 4 non-governmental laboratory.
Given your institution's limitations on information sharing, how do you plan to collaborate with such a high-level laboratory outside the Canadian government?
Mr. Bergeron mentioned the limitations of the Canadian Security Intelligence Service Act with regard to information sharing. The Minister of Public Safety, Mr. LeBlanc, has reported on consultations that have taken place in Canada and his willingness to table amendments to the act. We hope this will happen, as this is one of the existing gaps in our system.
With regard to the laboratory in Saskatchewan, I won't go into all the details, but I can say that we have had discussions, for a long time, with the organization in question to enable the exchange of information and to raise awareness properly.
While coping with the limits imposed by the law, we have been able to start a dialogue, and we hope that this dialogue will go even further.
I want to thank the witnesses for being present today, and of course for your immense work in keeping Canadians safe and all the work your staff does to ensure that our work to make them safer continues. That's why we're all here today.
The question I want to ask is similar to what Mr. Fragiskatos mentioned about the sectors that are under threat. Coming from Alberta, I know this has been a conversation we've had for a long time, particularly with the development of our oil sands.
In Alberta, as you may know, in 2012 and even previous to that, there was an economic policy by the Conservative Party to find ways to sell off assets, particularly our access to oil sands projects. CNRL, Canadian Natural Resources, was unfortunately sold to Nexen.... Sorry, Nexen was sold to companies controlled by China, and today that's the same.
How much of a threat is the People's Republic of China to our oil sands and to the production and development of research for petroleum products?
The question is interesting because you're looking at two things. One is the control and ownership of a fixed asset. You also talked about the development of know-how and innovation. I would make a distinction between something you can control, which is the asset.... You cannot, in the middle of the night, come in covertly and take it over. Knowing and understanding the intent not just of the PRC but of other countries means having the right legislation to make sure that you're able to protect it through the Investment Canada Act, among other things.
A very important question as well is the development of the know-how and innovation. When you look at carbon capture, there are very innovative things happening in Alberta and other parts of the country. We know that if it's of interest to the PRC or some other countries, there will be an effort, either overtly, sometimes through direct engagement, or through other means, including covert espionage, to acquire this know-how and information. We have to be very mindful of that.
At CSIS, we try to look at very specific activities, but we also zoom out and try to understand the cumulative impact of some of these issues and see what the consequence is for Canada's national security not only now but also in the future. This is the advice we try to provide to the government.
Just to frame that at the time these policies were in existence, I would assume they existed in 2012 when China took over Alberta's oil companies. Is that correct?
As I mentioned, what we've seen is that, while some of these conditions already existed, from 2012 to 2024 there's been a very significant evolution and there have been a couple of pivotal moments. One of them has been the ascension to power of Xi Jinping, but a number of other steps have been taken, including the publication of very specific strategies, like “Made in China 2025” and their five-year goals, strategies that are sometimes very overt. They say where they want to be and want to dominate this and that sector.
I think in the evolution we've seen since 2013, some of these elements were there. Some of these dynamics were there in 2012, but we've seen a dramatic acceleration.
I see that. I hope you can see my curiosity and the very problematic connection that comes to mind when I think of the control of Alberta's oil asset, petroleum, which is an immense resource we have here in Canada, particularly in Alberta. I see your concern of the potentials, especially if we're looking at the PRC's mandate to have the strongest, most technologically advanced military by 2049, as I believe you said. Those two things in my mind present a credible risk. If they have control over physical resource assets like petroleum, an incredibly important asset for war and the military, they would also have access to the information that supplies it.
Do you believe the ownership of these companies should be challenged, especially now in light of what we're seeing with very aggressive modes of information and hostile actions?
That's a question I honestly would have to reflect upon. In the last number of years, the specific ownership of those resources has not been as much at the top of our agenda.
I will reflect on this, Mr. Desjarlais, and may bring back something more intelligent to share with you.
I would appreciate that and look forward to hearing from you. Maybe you can supply that in writing at a certain time to this committee, when it's appropriate for you to review that information and supply an opinion or response.
I understand I have 30 seconds, but I want to ask a question that I asked the minister about impacts of this study and other studies related to the Winnipeg lab. It's on our relationship with our partners across the globe, particularly the Five Eyes and NATO. Did that serious breach of information present a credible risk to our partners, and did they present that risk to you as a question or recommend ways to reduce that risk?
As I mentioned, we are working extremely closely with not just our Five Eyes partners, but a number of other extremely sophisticated intelligence services around the world. CSIS has over 300 relationships around the world with intelligence services, and this is one of the very significant issues we're talking about.
Each country has challenges when it comes to the penetration of institutions and espionage activities. That is one of the reasons we share so much together at the classified level. It is to collectively be more resilient and learn from each other. You can be sure that in a case like this, the lessons we learn as an intelligence service are shared with our partners to make sure, again, that we raise the bar and make it harder for hostile actors to threaten our well-being.
CSIS has assessed that foreign interference from the PRC is a serious threat to Canada. I want to quote what CSIS has assessed: “Foreign interference is a complex national security threat. It poses a significant threat to the integrity of our political systems, democratic processes, social cohesion, academic freedom, economic prosperity and challenges Canadians’ rights and freedoms.”
You mentioned earlier in your testimony that espionage is not exactly the same thing as foreign interference, but it's very closely related. How do you assess the PRC's espionage activities in Canada in terms of threat?
Because of the organized systematic approach and capabilities of the PRC, we assess that the PRC is the most significant espionage threat against our country.
Mr. Chong will know that the dynamic is somewhat similar to foreign interference in the sense that you have a continuum of activities. The intent is very clear. One of them, for example, is to have the most sophisticated modern military in 2049, and, through the five-year programs, to dominate certain aspects of the economy in the future. The means can vary from the overt to the very much covert, and in the dynamic we see in foreign interference, we see the same thing. We see legitimate means of engaging in our economy that are absolutely appropriate. I've talked to different companies that are essentially telling us they know, when they get into some deals, that they will lose intellectual property.
It's very sophisticated, up to and including very covert espionage.
You mentioned earlier in your testimony that CSIS is concerned with the thousand talents program. How do you assess the thousand talents program with respect to government scientists? In other words, do you think it is appropriate for Government of Canada scientists to participate in the thousand talents program or any of the 200 or so other recruitment programs of the People's Republic of China?
I will reiterate what I said earlier in the sense that in these types of cases, we do an assessment of the generic nature of those talent programs. That's one thing. Then at the request of the agency, we do the screening of very specific individuals and provide that assessment, that advice, to the host agency for them to make determinations.
The reason I reiterate this point, Mr. Chong, is that there might be some circumstances in which it is totally transparent and it is an activity that would benefit Canada and, in this case, China. There might be some cases like that, so I would not want to be categorical and say one hundred per cent no—
We know that Dr. Qiu clandestinely and corruptly co-operated and collaborated with the government and the military of the People's Republic of China. She also received payment for travel within the People's Republic of China from both of those entities and did not declare it with the Government of Canada.
One of the entities she clandestinely collaborated with was the Wuhan Institute of Virology. The Wuhan Institute of Virology is not on the list of named research organizations of the Government of Canada, so it is technically possible for a government entity to collaborate with that organization.
Do you assess that to be an acceptable security risk, particularly in light of the fact that according to publicly sourced reports, Dr. Qiu is working at the Wuhan Institute of Virology—or working with scientists there—as we presently speak?
I would say that having entities listed by the government as problematic is a very welcome approach. It speaks to Mr. Fragiskatos' question earlier about how we work with people. Giving them more information about what might be appropriate or not is very important. In this case, listing these organizations and telling them why there might be a problem help people make their own decisions. We at CSIS have provided advice to ISED and Public Safety, which came up with that list.
In the specific case of the Wuhan institute, again, there might be legitimate reasons why, for the benefit of Canada, it would be appropriate to work with them. I think it would be useful in this case, if there were to be any such arrangement, to ask specifically what kind of due diligence has been done on these—
As the director of CSIS, you are one of the people in this country who thinks about national security more than most. When you reflect on the timeline here, there have been accusations of delay and inappropriate due diligence.
As of August, a lab employee identifies two colleagues who might be targeted by the PRC. In September 2018, PHAC, through some due diligence, becomes aware of a patent filed by Dr. Qiu. Later that year, in December 2018, a security consultant is engaging in fact-finding and ultimately reports to PHAC in March 2019. The RCMP escorts the individuals out of the lab in July 2019.
When you reflect on that timeline, do you think PHAC acted with appropriate due diligence?
I think this chronology is very instructive because now, with what we know in 2024, it's easy to look back at the events of the day and try, with the knowledge we have....
I was talking earlier today to my colleagues who are responsible for the screening branch, looking at those dates and so on. My experts were telling me that as far as cases go, this one was very quick to come to fruition.
I know there were some questions about due diligence and due process, but one thing that is important is how to start to mitigate the threat significantly. These individuals were walked out and not given access to their information in the lab itself. This is one way to mitigate the threat while the rest of the investigation takes place.
I will reiterate, Mr. Erskine-Smith, that my expert colleagues have told me that they thought it was a fairly expeditious process.
In your view, from a security vantage point, what more could PHAC have done? These individuals we're talking about are employees from the early 2000s. This is not an infiltration operation. This is an operation where they were ultimately co-opted down the road of their careers, which strikes me as a more challenging thing to screen, all things considered.
I wonder what your view is as the director of CSIS. What more could and should PHAC have done in the circumstances to mitigate the risks that ultimately were realized?
The way I'll try to answer this question is to say that of course, as Mr. Erskine-Smith mentioned, we look at the issues through a national security prism. We make an effort to share our knowledge, our expertise and our concerns with our colleagues to make sure that one of the filters through which they look at issues within their organization is a national security aspect. Increasing the security culture of these organizations is one thing we're very keen to do.
It is more of a generic comment, as opposed to a specific one, looking back at times.... Anytime we can work more closely with organizations to increase what I would refer to as a connective tissue between national security and their business, it makes Canada and these organizations more resilient.
I was amazed by this, actually. I read the April 2020 security assessment, the first security assessment, and it's pretty thin. There was an interview, and Dr. Qiu lies straight up to your officials. Then mere months later, on June 30, there is a second security assessment, and it's incredible what your agency was able to glean and document in a mere matter of months, especially with a level 4 lab. That close relationship between CSIS and a level 4 lab is essential, is it not?
As I mentioned, the evolution of the threat activity of the PRC and other countries against Canada has been such that we had to change our approach at CSIS. We have to collect, very covertly, intelligence and secrets, which the government—Parliament, essentially—through the CSIS Act, is asking us to do. At the same time, we need to increase our transparency, because the ecosystem in Canada has changed because of those threat actors.
When you look, Mr. Erskine-Smith, at the dynamic in the lab at the time and the dynamic with the organization, I think what you see is the realization of that threat, but also a number of people who started turning to security issues much more significantly. Again, I commend the work of this committee, because I think through this work, more Canadians will be thinking about these issues. This is only way to more transparency, which will increase our resiliency. I would say that—
First, if CSIS gets wind of the fact that a top researcher in Canada is part of the Thousand Talents Program, does it intervene?
Secondly, the Laboratories Canada strategy, adopted in 2018, which includes state-of-the-art work environments protected against cybersecurity threats, will extend over a 25‑year period. Do you think we need to act faster?
I don't know the details of the strategy, which is spread over a 25‑year period. However, I do know that government strategies of this nature are implemented over several years. However, we always try to manage the most important threats as quickly as possible.
Absolutely, yes. If our security screening work or our intelligence gathering work tells us that any individual in Canada is involved in a program being run by China or another country, we will intervene.
We've learned that, among the charges levelled against the two researchers, one was the fact that people were allowed to work unescorted inside the laboratories.
How could such a thing happen? In your opinion, is this the kind of practice that can still go on, or has it been tightened up since then?
As far as I know, we've learned from our mistakes.
Our colleagues at the Public Health Agency of Canada have been very rigorous in implementing these lessons to plug some of the safety loopholes that existed. To the best of my knowledge, these practices no longer exist.
On the other hand, the very nature of espionage and counter-espionage work means that the more useful and effective our tactics and techniques for understanding and gathering intelligence become, the more our adversary changes techniques to make our task even more difficult. So it really is a game of cat and mouse. We can't sleep soundly thinking it's all settled. That's why I always talk about partnership and dialogue between national security experts, like those at CSIS, and the organizations, because the situation, techniques and methods of espionage are evolving.
I now want to turn to what I believe to be an overarching concern related to China, which is the potential of China organizing global allies toward their own ends. I know the mandate of this committee is more narrowly specific to China, but my concern is largely how China could be leveraging its state supporters to meet the ends that you described at the very outset of our meeting today.
The greatest potential and greatest risk that I perceive from your comments in today's meeting is the plan towards a larger military, which from the New Democrat perspective is bad for peace. Of course, when you have larger and larger militaries continuing to gather, it makes an inevitable situation likely. I think it's a major concern for not just Canadians but the globe writ large.
How concerning is China's relationship with other state actors toward what could potentially be a really serious collision course with NATO and our allies?
One of the significant by-products, if you will, of Russia's invasion of Ukraine has been a rapprochement between the People's Republic of China and Russia. We're talking about two dictatorships. We're talking about two authoritarian systems that collaborate because they see an interest in doing so for each one of them. The dynamic of an increased military collaboration between the PRC and Russia is of concern. We see also a rapprochement with North Korea. When you start to look at the security dynamics in that part of the world, you start to see a number of indicators going in the wrong direction.
For Canada specifically, we see that the PRC has invented a new concept and declared themselves a near-Arctic state. That did not exist before, but now it exists, at least in their nomenclature. It's for the specific purpose of trying to increase their capabilities for operating in the north, including in the Canadian Arctic. They see economic potential with climate change and the opening of sea routes in the north, but there's also a military component to this. From a Canadian point of view, we are concerned about, specifically using this example, what is a potential direct impact on Canada's security now and in the future.
Also, as you mentioned, Mr. Desjarlais, there's the question of the global instability that is created by military arrangements, the sharing of military know-how and the sharing of equipment in that part of the world. This is of significant concern now but also in the future.
The Government of Canada outsources to and contracts with a lot of outside individuals and companies. ArriveCAN has obviously been in the news recently, but one thing that surprised me in reading the documents we received was that a private company did some parts of the investigation.
Why is a private company, in this case Presidia Security Consulting, doing security investigations for the Government of Canada? What is your view of that? Secondly, what is the relationship between CSIS and this private company in respect of these investigations?
I think it's an interesting point in the sense that some organizations may have more in-house capabilities to do some of these sophisticated investigations.
In this case, Mr. Chong, I don't know if you've had the chance to ask PHAC a question on why they did that. In my experience, one of the issues is that people do not have enough expertise in some specific areas. I'm speaking in a general manner. I don't know. There is no relationship between CSIS and such an organization for the simple purpose that there is nothing we can share with them. We would not be sharing our techniques and methods and our information with them.
I would say again, at a general level, that there might be scenarios in which it could be useful. Some private companies have a lot of very good expertise in niche areas of investigations, so that might be useful, but that of course needs to be complemented, especially if you're talking about government assets and government information, with a government investigation. This is where CSIS would have to come into play. Of course, in the context of potential criminality, our colleagues at the RCMP need to be engaged.
In other words, the department and the agency are responsible for carrying out the investigation with their own resources, and if they don't have them, they contract a private company to do that. I would have thought that if there was a security concern within PHAC, they would have contacted Government of Canada authorities such as CSIS or the RCMP to conduct the investigation rather than hiring a private contractor to do the work and gather the information.
Our mandate at CSIS is fairly clear in this circumstance. We would investigate the national security threat and do the security screening aspect, but everything between those arcs, the administrative portion, we would not be equipped to do. It would not be appropriate.
I want to reiterate that I was making a general comment when I said that—
CSIS does intelligence assessments, so if an individual wants to get clearance to go into the Winnipeg lab, CSIS will do the assessment on that individual and provide advice to the department or agency. Within the machinery of the Government of Canada, who is normally responsible for granting that security clearance? Is it the deputy minister or head of the agency, such as the president of PHAC? Who is it normally, and can those authorities be delegated?
My last question concerns a report. There's basically one level 4 lab in Canada and it's in Winnipeg. There are two parts to it, the animal side and the human side, one side run by CFIA and the other run by PHAC. It was reported last month that the University of Saskatchewan is interested in setting up a level 4 lab. Do we have the state capacity in Canada to have another level 4 lab, particularly at a non-governmental institution, in light of the massive security breaches we saw at the government's lab in Winnipeg?
I'll be very transparent with the member: This is not an issue we at CSIS have looked at.
I have not personally looked at the capacity the way you referred to it, Mr. Chong.
In answering Mr. Bergeron's question, I mentioned we have already connected and engaged with the Saskatchewan entity that is looking to establish that lab. Again, if there's one thing that will come out of the work of this committee, I think it's that everybody will be even more aware of, concerned with and, I would expect, diligent in the setting up and security aspect of any such lab.
Thank you for being here, Director Vigneault, Mr. Stern and Mr. Fisher.
Director, you spoke about the processes in 2018 and 2019, and it's your testimony that, looking back, you felt the matter was dealt with in a fairly expeditious manner.
I want to ask you a forward-looking question. Having seen this process and the changing climate around safety and security as it relates to the PRC, what do you think needs to happen to improve processes around a level 4 lab and other government apparatuses that may deal with foreign countries?
I think what we realized is that the dynamics in our countries have been changing for some time. There are a number of threat actors, unfortunately, who are after what we have. They want what we have here: our know-how, expertise and intellectual property.
As I mentioned before, there are a number of different elements.
One, you need to talk about these issues. It cannot just be in the confines of CSIS where these issues are of concern. It should be part of a societal discussion. Unfortunately, there are threats to our national security and we need to talk about these. That's one aspect.
The second aspect is to make sure you create the right connective tissue, to use the expression I used before, between different organizations. People need to know each other a bit. People need to have confidence. If I have a concern, where do I go and how do I engage in these discussions?
We definitely do not have all the answers at CSIS; we do not know everything. I would like to think we know a few things, but at the same time, what we need, not just with many other federal government entities but also with provincial, municipal and academic institutions and research laboratories, is to have areas where people will talk to each other. In the last number of years, I have seen an increase in the number of organized venues, formal and informal, for information exchange.
The last thing I would say, as we say in French, is this:
[Translation]
I'm going to preach for my parish.
[English]
It's important to make sure you know that the organizations dedicated to protecting national security have adequate capacity to do that, including through legislation.
My last question for you encapsulates the general themes you just spoke about that should be kept in mind moving forward.
Are there specific recommendations on improvements to rules and processes that you can provide, as CSIS, to this committee in writing that can help us in our report writing given what we saw? How can we improve things moving forward?
I welcome the opportunity. I will work with my colleagues and endeavour to provide some of our thoughts and potentially even bold advice to the committee.
I was told today that the only Wednesday slot available is 7:30 p.m. to 9:30 p.m.
Could we quickly canvass members of the committee on whether they want to meet on Friday afternoon or Wednesday evening? I'm agnostic. I realize it's quite a late Wednesday slot. I thought it was earlier in the day.
We will see about the wishes of the committee, even though Wednesday evening would be a horrible imposition on your chair. I don't want to play the big victim here, but we will leave that to your conscience, sir.