:
I call the meeting to order.
Welcome to meeting number 39 of the House of Commons Special Committee on the Canada-People's Republic of China Relationship. Pursuant to the order of reference of May 16, 2022, the committee is meeting for its study of the Canada-People's Republic of China relations.
I would like you to pay special attention to the following.
We need to avoid audio feedback. I understand that we had another injury amongst our interpreters, so we need to be extra careful. Before we begin, I'd like to remind all members and other meeting participants in the room of the following important preventative measures.
To prevent disruptive and potentially harmful audio feedback incidents that can cause injuries, all in-person participants are reminded to keep their earpieces away from all microphones at all times. As indicated in the communiqué from the Speaker to all members on Monday, April 29—today—the following measures have been taken to prevent audio feedback incidents.
All earpieces have been replaced by a model that greatly reduces the probability of audio feedback. The new earpieces are black in colour, whereas the former earpieces were gray. Please use only the black approved earpiece. By default, all unused earpieces will be unplugged at the start of the meeting.
When you're not using your earpiece, please place it face down on the middle of the sticker, which you'll find on the table for this purpose, as indicated. Please consult the cards on the table for guidance to prevent audio feedback incidents.
The room layout has been adjusted to increase the distance between microphones and reduce the chance of feedback from ambient earpieces.
These measures are in place so that we can conduct our business without interruption and to protect the health and safety of all participants, including the interpreters.
I'd like to thank all of you for your co-operation.
Today's meeting is taking place in a hybrid format. Members are attending in person in the room and remotely using the Zoom application.
Please wait until I recognize you by name before speaking. For those participating by video conference, click on the microphone icon to activate your microphone, and please mute yourself when you're not speaking.
For interpretation for those on Zoom, you have the choice at the bottom of your screen of either the floor, English or French. For those in the room, you can use the earpiece and select the desired channel. As a reminder, all comments should be addressed through the chair.
For members in the room, if you wish to speak, please raise your hand. For members on Zoom, please use the “raise hand” function. The clerk and I will manage the speaking order as best we can, and we appreciate your patience and understanding in this regard.
Per the motion adopted on March 26, 2024, we are hearing testimony in relation to the matters revealed in the Winnipeg lab documents.
We have some substitutions today: Mr. Naqvi is in for , Mr. Angus for , Mr. Cooper for and MP Ellis for .
Mr. Kurek will be a new permanent member of this committee, I understand.
Now I'd like to welcome our witnesses for our first panel.
Nathalie G. Drouin is the deputy clerk of the Privy Council Office and national security and intelligence adviser to the , and she is accompanied by David Vigneault, director of the Canadian Security Intelligence Service.
Ms. Drouin, you have up to five minutes to deliver your opening remarks. We thank you for your patience while we got the voting business out of the way.
Thank you as well to the members of the committee for the opportunity to speak to you and answer some of your questions about the National Microbiology Laboratory in Winnipeg. With me this evening is David Vigneault, who is well known to the committee. He is the director of the Canadian Security Intelligence Service, or CSIS.
I was appointed deputy clerk of the Privy Council and national security and intelligence adviser to the Prime Minister on January 27. In my role, I coordinate the national security and intelligence organizations that perform critical analyses.
[English]
In August 2018, CSIS provided a briefing to officials of the national lab to help them better understand potential foreign interference or espionage, including how employees could be vulnerable to outside pressure.
Soon after, PHAC identified two employees at the national lab who might be at risk and flagged their concerns to CSIS. PHAC subsequently noticed certain irregularities in the two scientists' activities, which prompted PHAC to initiate an investigation that, in turn, uncovered additional reasons for concern.
As the two scientists' conduct became clearer through the investigation, PHAC took action, including seeking assistance from CSIS and referring matters to the RCMP for criminal investigation. Both employees were placed on leave and ultimately had their security clearances revoked, and in January 2021 their employment was terminated.
Important lessons were learned from this matter and security policies were improved accordingly. However, I think it is important to remember that PHAC was successful at detecting and removing a threat following awareness and vigilance and by executing a robust, thorough process supported by security partners.
[Translation]
Canada's National Microbiology Laboratory is world-renowned for its research excellence and the many contributions of its public health researchers.
The lab is a prime example of a rich culture of open and collaborative scientific research that Canada can be extremely proud of. It is precisely due to this reputation that, for some time now, Canada's security agencies have been warning about threats to Canada's scientific community.
[English]
The reasons for this are easy to understand. Innovation drives economic prosperity and technological advantage. Competition among states is focusing attention on the edges of science. New discoveries can be immensely beneficial or, unfortunately, can be used to do harm.
Canada produces world-class research in critical areas such as artificial intelligence, robotics, aerospace, quantum technology and the life sciences. Our innovations make us a target. The People's Republic of China is the most significant research security threat actor in Canada, given its targeting of academia, government and private sector institutions.
Just as with PRC's political interference and transnational repression activities, China uses a wide variety of methods to pursue advanced technologies.
As this committee is aware, China is not the only country of concern. For example, we saw strong indication that Russian hackers tried to steal COVID-19 vaccine research during the pandemic.
[Translation]
As has been mentioned by other witnesses, the Public Health Agency of Canada has learned many lessons from the situation at the national lab in Winnipeg, and security at the lab has been improved. As you know, I was also tasked by the to make recommendations related to the situation.
I've already started my review. In particular, I visited the laboratory on April 25. While there, I took the opportunity to ask questions of the researchers on site and learn directly from them. We discussed the sensitive nature of the work done at the lab and how security measures have been improved.
[English]
My goal is to identify the ways we can continue to strengthen our research security, but I will also be mindful of the need to avoid discouraging innovation or collaboration with onerous security requirements.
One thing is certain: Engagement between research organizations and security is critical for raising awareness and building resilience. For example, the new research security centre at Public Safety Canada is providing advice to institutions across the country on how to protect their research while pursuing their work responsibly in the modern geopolitical environment.
[Translation]
Canada's national security agencies are committed to protecting Canadian research.
We would now be pleased to answer any questions the committee may have.
:
I'd like to add a couple of things.
First of all, it's always easy to look at what happened in the past with a retrospective lens and then see how easy it was. That is my first caveat.
However, I agree with you that from the first signal.... To the credit of CSIS and the PHAC, they were the ones who identified the first signal. However, from the first signal to the moment when the two scientists were put on leave, yes, there is a timeline that needs to be looked at. However, it's not like things were not done. A fact-finding exercise was done—
:
Thank you very much, Chair.
I want to welcome the CSIS director back to this committee. I'm not sure how many times we're going to ask him to keep coming back. I think this is at least the third time.
Thank you for your patience. I know you're a very busy person.
I also want to welcome Madame Drouin and congratulate her on her new assignment as the security adviser at the Privy Council Office.
Thank you. I've always enjoyed working with you.
Madame Drouin, I'm going to start with you and ask this question: In your experience thus far—and I know you've been with PCO for some time—what role, if any, does the Privy Council Office play in protecting Canada's research and intelligence?
In your opening remarks, you talked about how the Public Health Agency of Canada acted in a fairly expedited manner when it learned about these two scientists and it took steps in order to ensure that the national microbiology lab and the work being done there were protected.
However, you also said there were important lessons learned. Can you articulate to us, in your view, what those important lessons were and what steps, in your opinion, the Privy Council Office and other government agencies are taking or have taken to implement those important lessons that you referred to?
First of all, let me repeat that when PHAC and the lab in particular received an awareness briefing from CSIS, they themselves identified employees who were at risk. They flagged those employees and found, unfortunately, other concerns. Those are things they have done.
In terms of the lessons learned, I think it was in a couple of areas where they thought that some improvements were required. First of all was on the management of their technology and making sure that, for example, they can trace who is accessing what and when, especially on the administrative documents—not necessarily the research documents, but things like, for example, patterns and things like that. They have strengthened their technology system to be able to trace who has access to what and when.
They also have enhanced their security and facility access to make sure, for example, that visitors cannot move within the lab without surveillance and without being escorted.
They have done a lot of employee communication and engagement. This is a very important component because in order to prevent other situations like that, awareness is key. Employees can be vulnerable and sometimes they don't realize that they are entering into a co-optee relationship, so awareness is very important.
Maybe as a parenthesis regarding that, I think that what the lab went through and the exercise that you're doing right now is completely unfortunate, but at the same time, it helps other scientists to realize that these things are real and that they need to care about security.
A number of things came to light through the work of this committee. One was that VFS Global, which is owned by a consortium that is partly controlled by Chinese interests, handled Chinese visa applications for Canada and continues to do so, as far as I understand. At the time, we were very surprised to see that no security checks had been done on the company. In fact, I'm surprised that the company is still handling the visas. In addition, of course, there were all the revelations around the microbiology lab in Winnipeg. That led us to request the documents we are discussing today.
When Mr. Vigneault appeared before the committee a few days ago, I referred to an article published in the Journal de Montréal in 2024. It indicated that, according to CSIS, the People's Republic of China had been conducting malicious activities in Canada since the early 2000s. When we interviewed the , he told us that in 2018, according to his analysis, Canada still believed that China could be a reliable, good-faith partner with whom we could co-operate on science.
CSIS told us that the People's Republic of China had been engaging in malicious activities since the early 2000s, particularly in terms of research and technology. How do you explain the discrepancy between the observations of CSIS and the rather wide-eyed attitude of the Government of Canada? Until 2018, it seems, the government considered the PRC to be a reliable and good-faith partner for scientific research.
:
Like Canada, none of our partners has completely cut ties with China when it comes to research. Researchers themselves would tell you that it is not healthy for innovation in Canada to completely cut ties with China in terms of research.
That doesn't mean we have to do it blindly and with just anybody, as we would, for example, with our Five Eyes partners. However, I don't think it would be to Canada's advantage to completely cut ties with China.
As you put it so well, we have to do it with our eyes open, knowing what techniques China uses in its business relationships, which CSIS has been telling us about for a number of years.
:
I was at the Department of Justice at the time, so I'll speak from that perspective.
The goal was not to avoid sending the documents to parliamentarians, but rather, it was to send them to the authorities who could handle that kind of information. As we can see today, the information in the documents was extremely sensitive. Until the corrective measures were taken by the lab, it was not in the interest of Canada's security to reveal the information again publicly. The goal was not to avoid sending the documents to parliamentarians, but it was to send them to the right forum, to the people who could handle them.
I understand that those discussions took place in the political rather than the administrative arena, but that was the issue.
:
Thank you so much to our witnesses.
Welcome, Madame Drouin. I've only dealt with you indirectly through our shared work of trying to get justice for the survivors of St. Anne's residential school. Maybe I would say that's partial work.
I will begin with our representative from CSIS.
My hair's turned grey since I came to Parliament. I remember questions being raised about intellectual property theft by China going back to my time when I was first elected and representing mining communities.
Does CSIS have a long list of research or concerns about intellectual property theft by the People's Republic of China?
:
Mr. Chair, thank you for the question.
We indeed have a fairly long list of concerns regarding the PRC's attempts to steal Canada's secrets—both government secrets and, more and more, what is being developed in our cutting-edge universities and research laboratories.
As I've testified in this forum recently, we know it is a stated goal of China's government to make the People's Liberation Army the most sophisticated, capable military by 2049. One of the ways they need to do that is by stealing intellectual property from anywhere they can in the world. Canada is indeed part of that.
We saw during COVID, as well, a very sophisticated effort on the part of the PRC and other countries to try to steal, in this case, our life science research, because it was in their interest to try to understand what we were doing. If they could steal and manufacture a vaccine to gain an advantage, they would absolutely do so.
That's why we have been saying publicly at CSIS, for years now, that what makes Canada prosperous today, as well as the source of our prosperity in future years, is at risk. We need to raise our defences to protect that.
I think the worst thing is doing an after-the-fact gotcha moment, when these things are very complex and when there are all manner of things happening at the same time. However, I remember the free trade debate when Stephen Harper and the Conservatives were pushing a full free trade agreement with China. We raised serious questions about their record and issues of intellectual property theft. That got signed in 2012. In 2014, the National Research Council was forced to shut down its servers—this is our top scientific research organization—because of hacking from China. We had to shut down Treasury Board servers at one point because of hacking from China. The Bank of Canada and even Parliament Hill were targeted by China.
I'm not going to ask you for specifics, but were red flags being raised with the government? We had just signed a trade agreement with this country, and all of our key scientific, government and financial portals were being targeted by hackers. Were there investigations, hypothetically, done? Were they state actors, hypothetically?
Can you give us a broader picture so we can know how we ended up in this situation with the Winnipeg lab?
:
Mr. Chair, I think it's fair to say that there were indeed a number of flags raised.
I was personally involved in response to the 2014 cyber-hack by the PRC against the NRC, and I can tell you that all the right authorities of concern in Canada and abroad were very aware of what was going on. I think it was around that period of time when people realized things were changing in the PRC under the leadership of Xi Jinping. I think we saw the beginning of a change to their approach and in terms of the aggressiveness with which they were pursuing their interests.
Those other hacks you mentioned, Mr. Angus, against the two other organizations of the federal government indeed resulted in a number of investigations flags. There's been a tremendous amount of work done by our colleagues at the Communications Security Establishment to prevent a number of these. The statistics are mind-boggling of the number of attempts against government institutions every day. More and more, what we see is that those entities, like PRC hacking groups, are going after not just government institutions but also the private sector and academia to acquire the kind of information and data they need to pursue their objectives.
Mr. Vigneault, I didn't expect to be talking about AI tonight, but you've raised it, and I think it's a relevant point.
When we think about prevention, what role does AI play? I know it's very difficult to speculate about the future, but this is an emerging area. What role could AI play in this regard in securing...? I'm not thinking in specifics here. I'm not talking about labs per se, but about overall security, whether in relation to labs or critical infrastructure. Does AI have a role to play? Is this something that security officials like you and counterparts are talking about and looking to? There's the negative side of AI that's widely discussed, but we should make it work for us wherever we can, I think.
:
Thank you, Mr. Chair, for the question.
Absolutely, we're trying to look at AI from two sides of the coin. We need to look at how we can harness artificial intelligence in our own practices. At CSIS we are using AI for different processes already. We're working with partners in Canada and around the world to try to harness artificial intelligence from a national security point of view and how it could be of benefit. We do that because we also understand, or try to understand to the best of our ability, the threat that comes from nefarious actors using AI.
We've talked about how artificial intelligence can easily be used right now by fairly unsophisticated actors to create deep fakes that are are credible enough to lead someone to believe that indeed an action was done or words were said by someone.
It is not just a problem for the future; it's a problem for today. The more we can work together on understanding and harnessing the power of AI while protecting ourselves would be great.
As was mentioned in Ms. Drouin's opening remarks, Canada is one of the most dynamic areas of the world for artificial intelligence. We have some of the best scientists and some of the most cutting edge research. We know that this is a target for a number of people, so we're working with the appropriate partners to try to secure that research and innovation.
:
Mr. Chair, to the question by Mr. Angus, I would say that we are seeing and detecting more cyber-attacks from the PRC, and also from many other countries and states, but from criminal organizations as well. We see the rise of ransomware that is sometimes purely criminal in nature. It's to be able to accumulate dollars fraudulently. Sometimes we see those ransomware groups working at the behest of states. We also see state-sponsored cyber-attacks against government entities for spying purposes.
Also, in a very worrying trend, we see that some countries are engaging in cyber-attacks against our critical infrastructure. They are directing those attacks often to pre-position themselves to not necessarily stop or undertake any action but to be there, and when they decide to act on Canada or other countries, to force Canada to take a specific policy position. This is an area of concern. The PRC has been publicly called out for that in the recent past.
I would say that CSIS plays an important and unique role in what I call the "cyber-ecosystem". We're working very closely with our partners at the Canadian Centre for Cyber Security and CSE and with our partners at the RCMP, Public Safety Canada and Treasury Board.
What essentially you see, Mr. Angus, is that we need to bring this ecosystem of all the different players who have the tools and authorities to do something to really play well, because our security depends on it. The actors who are attacking Canada for criminal or national security purposes are getting better at it. We need to increase our own vigilance.
:
Thank you very much, Chair.
Thank you to the witnesses for being here, and to Mr. Vigneault for being here again.
I have a bit of a dilemma in my mind. You know, we've talked at this committee about how things were different before the incident at the national microbiology lab. We've also said that things have changed at the national microbiology lab. I guess my contention is that when I look at a report....
Mr. Vigneault, I'm sure you're familiar with the report called “China and the Age of Strategic Rivalry”. It was produced by CSIS in May 2018. It goes on to talk about a report by CSIS that concluded that China was engaging in “Targeted efforts to co-opt the New Zealand business, political and intellectual elite”.
My contention, then, is that things were really not different when this incident started, at least in August 2018, so why do we say that they weren't? Things were not great then. We knew that the PRC was out there looking for secrets from other countries like New Zealand. Why would we think Canada was any different?
:
Mr. Chair, I'll go back down memory lane here. I believe the report that Mr. Ellis is referring to is a document that was sponsored by CSIS but was produced by academics under Chatham House Rule. The conclusions about New Zealand were conclusions that were made public by CSIS through this academic report.
I remember those details, because, as you can imagine, New Zealand reacted to this report. However, I think it's fair to say that even back then, the academic community and the national security community in Canada and across a number of countries were indeed very worried about the PRC's activity. I believe I mentioned in this committee that one of the most significant moments of that change was when the PRC proactively, not even waiting for the final report of the international court on the jurisdiction of the sovereignty of the South China Sea, pre-emptively said that they would not respect the ruling. I think there were some moments, some of them public and some of them known through intelligence, when we started to see a shift. That shift is important, I think, to put it into perspective.
Madame Drouin said something that I think is very important. It is sometimes in our own national interest to collaborate with Chinese entities, but we need to do it with our eyes wide open and make sure that we protect our own base. I think this is why it's important; if it's good for Canada to collaborate because we can get something good out of it, we must do it, but we must do it while protecting the base.
I'll interrupt you there, Mr. Vigneault.
You know that things were not in great shape. Then we had information from the PHAC to CSIS to say that there might be threatening actors at the national microbiology lab, and it still took more than 10 months to secure the lab—more than two and a half years. Your contention, sir, has always been that they were Canadian citizens and that we had to give them the benefit of the doubt. However, as my colleague easily pointed out, we can get rid of a senior bank person here in Canada much more quickly. This is national security.
I guess the other question, then, is this: If things were great, then, with regard to security at the national microbiology lab, why have they had to change so radically now? Clearly, they were not. Clearly, the situation was not as rosy as you have tried to paint to the committee, sir.
To you both, thanks for attending today.
Mr. Vigneault, you've attended a couple of times.
I think I've canvassed all of the questions that I'm interested in canvassing with respect to Ms. Drouin specifically, but I am interested.... Paragraph 21 of the June 2020 security assessment stood out only because we've just lived through a pandemic. It says, “QIU...and other [Wuhan Institute of Virology] employees were approved by a Chinese evaluation committee to conduct a 'CAS High-end User Nurturing Project'”. That was “from June 2019 to May 2021”—ostensibly, the time period for that project. The project “planned to use reverse genetics in order to create synthetic virus strains. This was to assess cross-species infection and pathogenic risks of bat filoviruses for future vaccine development purposes, which suggests that gain-of-function (GOF) studies were possibly to take place.”
I don't want to go down a conspiracy rabbit hole here, but American agencies have said that a lab leak is low...limited evidence, all things considered, but that is the most plausible reality here. What should I make of this? When I read this, paragraph 21 certainly stands out in the context of having just lived through a pandemic. What should I make of it? What should parliamentarians make of it?
For the record, I will say that I did not write this paragraph. That's why we employ people at CSIS who are much more intelligent than I am to make sense of this information.
Seriously, Mr. Chair, what I think is important here is understanding that the cutting-edge research being done at the national microbiology lab, as mentioned by my colleague, is absolutely essential for Canada. The fact that we have scientists working on these issues is in our own national interest. The problem—and the committee has been very clear on this issue—is that there were two individuals who lied to their employer and engaged in activities that were against Canada's national interest.
I think this is where principles of the complexity of the world's national security and international collaboration in science will sometimes clash with each other. It is only by having a very sophisticated approach—and, I think, a better understanding of how these different relationships interact, depending on the issue—that these can be assessed and more weight be put on national security versus international scientific collaboration.
Perhaps the last thing I will say to Mr. Erskine-Smith, through you, Mr. Chair, is that Canada and CSIS have not concluded that the virus jumped out of a lab, as others have said. I think our intelligence community friends in the U.S. have a different perspective on this issue.
Mr. Chair, I really appreciate the invitation to meet with the committee this evening. I'm quite hopeful to share our perspective and to help the committee in their goal to advance the management of this interface between national security and scientific research.
I'm now based in the U.K., and even just as early as last week, the same issue was in the news. It's a discussion over this elevating expectation on national security, and how that sits alongside the challenges that a lot of scientific institutions face to put that into place based upon their own expertise and the processes that they would feel more comfortable with.
That particular example is with MI5 working across the board with all U.K. universities, trying to find that balance point between the values and practices that would be in place in universities and those expectations on national security. There's a lot of discussion on the balance and how you still pursue things like the values of research integrity, open science, fair access to education and, in the case of universities, income generation in the form of tuition that has been collected from international students.
For me, I think to achieve both, to have this interface between security and scientific innovation, it's essential that there be coordination between these authorities in working together. The scientists have the tools to recognize and then act when these threats are present while still working to keep world-class research occurring within their facilities.
Another U.K. example from 2021 is with the funders of the institute that I'm now at, UK Research and Innovation. They produce guidance called the "trusted research and innovation principles". That team holds an office and actively counsels U.K. research institutes on matters such as data security, protection of intellectual property and consideration of the different values of the nations that they might be working with.
Going back in time, I had the extreme honour from 2015 to 2020 of serving as the scientific director general of Canada's microbiology lab. That team is an exceptional team, one that has, in collaboration with their partners across this country and across the world, faced and tackled a lot of very challenging and complex public health issues. To have these roles, to work at this interface of public health challenges at the global level, the team at the NML has to demonstrate their expertise and allow different scientific disciplines such as infectious disease, but they also have to have a commitment to actively want to lead these particular responses.
It's not just the scientists at the NML; it's a very large team of hundreds of individuals. They're blessed with an engineering team that helps maintain the containment fields and makes sure, when they have mobile labs that go out into the field, that those are well-equipped teams. It's the engineers and it's administrative team as well. Again, I make sure that the resources and materials are available to those teams.
We had activities like working in the Ebola outbreak in west Africa, working on aspects like the chikungunya virus that appeared shortly after the end of the Ebola outbreak and then the COVID-19 response, where the NML worked hand in hand with the Canadian provincial public health laboratories, including Ontario's, to diagnose the first case within Canada. It takes a large degree of coordination amongst all those different disciplines within the building. This is a team that's very expert in consolidating around a particular position.
I know one thing that's really dear to the team at the NML is their placement as a category 4 lab within a downtown urban setting within Winnipeg. They've spent a lot of time to earn the respect and the pride of the city of Winnipeg, because that's part of the community they operate in. I know that, for the team, biosafety is one of their top values, and they have a profound understanding of the risks for both themselves as scientists who are working on these viruses and the risks for the community they're in.
Going towards 2018, to its credit, CSIS was increasing the awareness of these foreign interference risks. They've been working with frontline actors like us at the national microbiology lab to make sure that we had awareness of these different risks, because, certainly for us, the focus that we would have would be effective public health responses. It would have been things like biosafety and, much less so at that time, it would have been awareness of foreign interference risks. We were getting help from CSIS, and I can comfortably say that scientists probably still need help to manage those risks, so I'm appreciative of the committee's work in that regard.
Going back to the U.K., there's a lot of active work between lawmakers and policy-makers to find that balance of that coordination and collaboration between national security and scientific interests. It takes expertise and the practices from both of those fields—security and science—to find that balance and harmony, whereby you still have productive and inspired, yet safe, science.
I'm pleased to be here tonight. How can I help?
:
The basis of my concern wasn't the scientist within the NML. The basis of my concern was actually the recipient laboratory.
I had the privilege over the course of my five-year term at the NML to co-chair the global health security action group laboratory network. That was a G7-plus-Mexico network. All the directors of the different high-containment laboratories came together for it. For the most part, it was a network of trust and awareness that you needed to have people whom you could work with when issues and crises arose. It was so that you had someone at the other end of the phone whom you could talk to.
We met at least twice per year at these different institutes around the world. That was a major component of my own awareness of how other laboratories operated.
Obviously, this particular laboratory was not within that network, so I had very little awareness of the activities in that particular lab. That's why I put the question back to my team to make sure that they went through all of the processes and all of their due diligence to ensure a safe transfer.
I have a second set of questions. You raised the first red flag in August 2018, which culminated in an investigation and the walking out of the two scientists from the lab 10 months later, on July 5, 2019. Subsequent to that, there were two CSIS security assessments that were conducted and reports that were produced. There was one in April 2020 and another in June 2020, which was about 12 months later.
First, why did it take so long for the lab to be secured, with the two scientists being walked out of the lab, on July 5, 2019?
Second, why did it take an additional 12 months for these two CSIS and security assessments to be concluded? It seems like it takes an awful lot of time to get things done.
:
Mr. Chair, I don't recall the specific work that might have happened with China over the course of the Ebola virus work.
Certainly in general, internationally, there would be coordination and collaboration on this because, of course, for most countries this is, fortunately, not a virus that is native to their country, so it's something you have to work with other countries to obtain and work on.
I'm sorry. I'm not familiar with the specific project being discussed.
Yes, my apologies, as my cat wanted to join the meeting.
Thank you to our witness for being here today.
I'm happy to be here to ask a few questions on behalf of my colleague who's unable to be here today.
I apologize that I came in a little late. If you're repeating this, perhaps you can expand on it a little bit. What are your thoughts on the ways we could avoid the same problems from occurring again? What are some of the learnings that we could take from this that you might be able to share with us?
:
Mr. Chair, my own specific awareness of these programs is quite low. They're not something I have to deal with in my day-to-day job anymore.
Certainly, going back in time to my time at the national microbiology lab, I had periodic engagements with an individual CSIS agent from the Winnipeg office where we were mutually developing a little bit of awareness. He would show me things that would come across the wire that were of interest or concern to them and then would ask for my reflections in terms of what they might mean. It often meant actually talking about and educating a little bit on the science of what they were looking at. I should clarify that in those meetings we weren't talking about anything specific at the NML. It was just their own process of, again, generating awareness in myself and some of the security pieces.
To my recollection, things like education on the talent management programs didn't actually occur until that August 2018 meeting, so I've had limited exposure in terms of analysis of those. I apologize to the member.
On March 27, 2019, days before the transfer, you sent an email to Steve Guercio, the executive director of the Winnipeg lab, in which you stated, “I'd like you to be comfortable with this before it goes [out]”, that being the transfer of the Ebola virus and henipavirus.
Why did you send that email to Mr. Guercio? Did it have anything to do with the fact that, four days earlier, PHAC obtained a fact-finding report that raised serious concerns about the activities of Dr. Qiu, who was directing this transfer?
Of course, I will gladly call our witness by the proper name of Dr. Gilmour.
My apologies, Dr. Gilmour, for not saying "doctor" in my first round of questions.
Dr. Gilmour, I'm not sure, honestly, if my colleague had a chance to ask you this or not, but I do want to know why you left your role as the scientific director general at the Winnipeg lab. What was the reasoning behind that?
:
Mr. Chair, that is probably the most powerful question I've heard tonight.
I want to go back to Ms. Yip's question on whether I had any regrets. I think I answered maybe we needed more conversation with CSIS.
In terms of whether I was equipped or not, that's a challenge to answer, but certainly, going back in time, yes, there absolutely should have been more briefing, more planning and more conversation among me, CSIS and the departmental security officer, yes.
Thank you, Dr. Gilmour, for being here.
My colleague started talking a little bit about the time frame between the end of March 2019, when the infamous shipment happened, and then the administrative action that happened to doctors Qui and Cheng in July 2019. That's three months or so. As you said, there didn't appear, in your mind at least, that there was more information available, but you were having conversations about what to do with these individuals. Whom were the conversations with?
:
Mr. Chair, I'm sorry. I remember that the session on it was starkly different, because I transitioned from just having one-on-one briefings with an individual agent sporadically, over time. If I recall correctly, I think this was the first group session where there were multiple CSIS agents presenting a prepared presentation and describing some of the tactics and approaches used in the PRC—things like talent management programs and the undue consideration of intellectual property protection.
I recall, at the time, that some of the tactics they were describing were familiar. They were some of the same concerns we had, I think, very recently started to talk about within the NML management team, including affiliations with Chinese institutes, frequent travel to China and the number of visiting scientists and students who were coming from that particular country. That was a concern we were discussing within the management team, and there it was in front of me in a CSIS briefing.
There was no compunction to withhold that from them, so we had a conversation about it.
:
With great respect to my colleague, of course, I wonder what the rationale is for having another meeting. We've had, by my count, seven hours and 13 witnesses already by tonight, and not just on the government side. We even had an opposition member say they ran out of questions.
I'm not looking at you, Michael. You are an opposition member who never tires of asking questions, and you always ask very good ones.
I'll make the point, again, that I think we've run the course on the issue. I don't know if Mr. Bergeron or my colleague in the NDP has views on whether or not we need another meeting, but those are many hours and many witnesses. I'm not sure what would be gained, frankly, and most importantly, by having another meeting on Monday.
:
Look, I'm asking for one more meeting. Dick Fadden is the former director of CSIS. I think he could add valuable insight into the time frames that we have been investigating here—whether they were appropriate, whether they took too long, and what should be different.
He's coming willingly, as I understand it, as a witness to our committee. I think that is valuable testimony.
The other two or three or witnesses we've invited were actually involved in the transfer of the viruses and the applications for the transfers, and also the policies regarding restricted visitors to the lab.
It would be the final meeting. I waited three long years to get to this point. Just one more meeting, Mr. Chair, would be entirely appropriate, and then we could easily set some time aside—I don't think we need more than half an hour for drafting instructions—and then the study would be largely done.