:
Good morning, everyone.
I'm going to call the meeting to order.
[Translation]
Welcome to meeting number 104 of the House of Commons Standing Committee on Access to Information, Privacy and Ethics.
Pursuant to Standing Order 108(3)(h) and the motion adopted by the committee on Wednesday, December 6, 2023, the committee is resuming its study on the federal government's use of technological tools capable of extracting personal data from mobile devices and computers.
Today's meeting is taking place in a hybrid format, pursuant to the Standing Orders of the House. Members may participate in person, in the room, and remotely using the Zoom application.
[English]
I just want to remind everyone again, as I always do, to make sure to keep the earpieces away from the microphones so that we don't harm our interpreters or Mr. Light.
I'd now like to welcome our first witness for this hour. As an individual, we have Mr. Evan Light, an associate professor.
Mr. Light, I want to welcome you to the committee. You have five minutes to address the committee.
Go ahead, please.
:
Good morning, ladies and gentlemen.
My name is Evan Light, and I am an associate professor at York University's Glendon College.
[English]
I am an associate professor of communications.
I will give my opening remarks in English, but I welcome comments or questions in French, as well.
I am, as one of you mentioned on Tuesday, the source of the documents from which Radio-Canada has been doing the reporting since November 2023 on the use of tools capable of extracting personal data from mobile devices and computers.
The speed with which you've taken up the challenge of investigating the widespread use of mobile forensic devices throughout the federal government is, for me, quite impressive and demonstrates a deep respect for the fundamental human right to privacy. Privacy is not an abstract thing. It is a fundamental human right that is tied to other human rights. In Canada, it's been a human right since 1977. We're talking about something that's quite fundamental.
For me, that means it's a right that should not be violated unless we have a very good, well-documented reason to do so. I think the testimony that's been given to you by agencies so far hasn't necessarily shown that their use is what we could call “necessary and proportionate”, which is a term that has come up at various times during your recent meetings.
From 1977 forward, successive governments have failed to protect our fundamental right to privacy. This committee, at this moment, has a really great opportunity—not just an opportunity but an obligation—to step up and examine how government protects the fundamental right to privacy.
I've forwarded numerous documents to the committee. Some have been translated and some have not, so you don't have everything I'll be talking to you about today. I want to talk about these issues and get into some of the testimony from the agencies you've spoken with so far.
I first encountered these devices in 2020 when doing research for a course. A group in the United States documented their use throughout over 2,000 police forces in the United States. There's been further documentation by the Carnegie Endowment in the United States, documenting the use of these tools by various regimes throughout the world and how they're tightly integrated with spyware.
As a quick note on terminology, I don't see MFDs—mobile forensic devices—as being spyware. It's come up numerous times at this committee. However, they have essentially the same capabilities. They're sold by the same suppliers and they're used by the same entities. I don't think we need to get hung up on terminology. I think it's important that they are equally invasive and equally unregulated in their use—if not more widespread and more unregulated in their use.
My concern is not that these devices exist, but that their use is completely unregulated. Various agencies that have testified to you have said that they don't really know how they use them. They don't keep numbers. CBSA said they use them all the time, but they can't tell us how many times they use them. Shared Services Canada testified on Tuesday that they don't have any actual policies or procedures on how they use them. Scott Jones decides, as an individual, when their use is warranted.
As noted by witnesses to this committee, the devices are relevant. They've been renewed many times. I believe Mr. Mainville, from the Competition Bureau, mentioned on Tuesday that they've been using these devices since 1996, which was an amazing revelation to me. It shows that these things have been used regularly by government for decades. They have been and continue to be unregulated and without any oversight.
Throughout the committee meetings related to this study, members of the committee and witnesses have used the phrase “necessary and proportionate”, or portions of it. I think this phrase is really key to understanding the use of mobile forensic devices or any sort of surveillance technology by government. It's actually tied to a document that came out in 2014, which was developed by 16 civil society organizations around the world. It's been endorsed by about 600 organizations and around 300,000 individuals. It's called “Necessary and Proportionate: International Principles on the Application of Human Rights Law to Communications Surveillance”.
There are legal frameworks to work on. There are standards for understanding how to do surveillance while respecting human rights, which is something that I think Canada can learn from and maybe should.
I'll be quick. I'm almost at my five minutes. I'll finish with a quick note on some of the recent testimony.
Shared Services Canada and various other organizations have said they only use mobile forensic devices in isolated labs, which gives the impression that they're really cut off from the world. Based on the capabilities of the devices they own, this is patently false. In the contracts that I forwarded to this committee, various entities, including CBSA, CRA, ECCC, the RCMP and TSB all have what's called UFED Cloud, which is a software package from Cellebrite that essentially lets someone access any cloud applications that are on somebody's phone. It's advertised as a way to get around warrants.
In addition, as my last comment, various agencies have ruggedized versions of these devices. “Ruggedized” means they're able to go into the field and be dropped and thrown around. They would not be buying ruggedized devices if they were to be used only in isolated clinical labs.
I welcome any questions.
:
Thank you very much, Mr. Chair.
Thank you, Mr. Light, for coming here and for the information and the workup that has led to this investigation.
I would just note—I guess this is a request because it's tough sometimes to get to the meat of the matter within the time frame of questions—that you did mention that there are some recommendations on how a government can ensure that rights are respected while investigations take place. I would ask if you could, with your expertise, send to the committee specific recommendations—generally, a recommendation could be a couple of sentences—and if you could distill that to a point where the committee could say, “Okay, here's something that we could recommend to the government.”
I would also just note, for your information, Mr. Light, that I've filed what's called an Order Paper question asking for some more details on this over the extent of the entire government. I know that 13 departments were highlighted. Shared Services Canada indicated that there may be more than 13, so I have asked this question, and I am hopeful that the government will be forthcoming with that information. I think it has 45 days to reply to that, so that's probably in about a month and a half.
You talked about the right to privacy and that it's been acknowledged as a human right in Canada since the 1970s. One thing that I've found very interesting and that has led to a host of concerns is the differentiation that you have of these very powerful forensic tools for use for administrative purposes within the context of a department to look at an employee's device in administrative investigations or something to that effect versus a court order for investigative purposes for someone who is not an employee of the department and didn't sign a terms and conditions contract but rather is the subject of an investigation or a periphery witness to an investigation.
Could I ask you to expand a bit on what the difference is and how one reconciles the difference between the use of these very powerful tools for administrative purposes within, say, a department or agency versus for investigations where they would be used on Canadians, whether with judicial authorization or the various other forms for which we've been told they could be used?
:
Yes, absolutely, but I'm going to switch to English for the sake of efficiency.
[English]
Cellebrite and other companies, for instance—Magnet Forensics does this as well—have the ability to extract what are called “tokens”. When you have apps on a phone that connect to the cloud, you have tokens that essentially log you in. They serve as your unique identity to connect to a cloud service.
In fact, Cellebrite just updated its UFED Cloud, which is being used by at least five or six agencies, so that it can access Lyft and Uber logs. It can access DJI drone flight logs. It can access banking. It can access your Google history, your GPS history.
In the past, you would have needed a warrant for each individual action to access each individual connection to a corporation, and maybe those corporations would have been served with warrants and would have had to provide the information. Instead, now, with a device or an image of a device, this information can be accessed without a warrant.
Good morning, Professor.
I want to focus not on the device itself and the software attached to it—which is the focus of this committee hearing—but rather on the broader issue of privacy. You spoke in general terms about this being a fundamental human right. It has been a fundamental right in Canada since 1977.
I'd like to get your expert opinion, sir, on the disastrous ArriveCAN app, which has just been revealed to be an abuse of taxpayer dollars of over $60 million.
Think back, if you can, to the time when the ArriveCAN app was heavily promoted by this government. It was the way to go in terms of dealing with COVID and trying to protect Canadians, etc. There's a portion in the preamble when you sign up for the ArriveCAN app that I'd like your opinion on. The title is “How your information is used and disclosed”. It says:
Personal information may be disclosed to contractors working for the Public Health Agency of Canada and Service Canada as well as to the following entities: other government institutions, as well as provincial, territorial, municipal governments or international health organizations as well as their institutions for these purposes.
Personal information may also be used for program evaluation. In other limited and specific circumstances, personal information may be used and/or disclosed without consent in accordance with section 7 and subsection 8(2) of the Privacy Act.
It looks like tens of millions of Canadians who were forced by the Trudeau government to sign up for the ArriveCAN app had their personal information wildly—
:
It's not negotiable. It's not debatable.
I think the preamble you read is really fascinating because to me it speaks to—if you remember—Bill , which was a Harper government law that created a brand new level of data sharing between government agencies.
The preamble sort of lays out how that happens. It shows you how this information flows between agencies and how it has become quite a normal thing to do. That dates back a very long time. It's not a new thing. It has probably been going on since before the Harper years, but I think it's something that maybe was informal and now has become quite formalized.
It does scare me. As somebody who used ArriveCAN when it came out because I found it easier—I wasn't provided with paper on a plane to fill out—I think that our technologies at airports and borders are quite invasive. They're also quite invasive everywhere in the world. I've been to airports in Europe where I couldn't get a connection without having my face and my hands scanned.
I think our levels of invasion are not necessarily at that high level here, but yes, I think it's problematic.
:
I'm not saying that people don't use it for private reasons, but there is an expectation that your employer, whether you work for the government or whether you work for an investment bank, is giving you a tool to help you with your job, not to allow you to do something out of work.
I want to share with you some of the testimony we got previously from Shared Services Canada. The witness said, “while the initial media coverage referenced spyware, I want to assure you that under no circumstances is this an accurate description of the tools used by SSC.”
They also said:
Investigations happen only when there's a credible allegation of employee wrongdoing and to ensure the security of government networks upon which Canadians depend. Impacted employees are always made aware of the conduct of these investigations, and procedural fairness is ensured.
We heard similar testimony from CBSA, where there's only a warrant. It's not when they take your phone during a secondary screening. It's only when they have a warrant.
Then the RCMP said, “The media reports suggesting that these digital forensic tools are considered spyware are inaccurate...and I will clarify”. He said, “These tools are used on digital devices that are lawfully seized through criminal investigations.”
I guess my question is this: Do you think these people are telling the truth when they come to committee to say these things?
:
Good afternoon, and thank you for the opportunity to appear before the committee today.
My name's Nathan Prier. I'm the president of the Canadian Association of Professional Employees, where I represent over 25,000 public sector workers in the economics and social sciences services and translation groups, as well as employees of the Library of Parliament, the Office of the Parliamentary Budget Officer, and civilian members of the RCMP.
We're shocked and dismayed to learn that spyware has been used in multiple federal departments, on federal devices used by public sector workers, without following the government's own policies. The use of this spyware was uncovered, as we just heard, through an access to information request submitted by Dr. Light, and public sector workers learned of the potential breach of their rights from the press instead of through mandated privacy assessments or any sort of proactive disclosure by the employer.
This kind of secretive behaviour damages the trust between public sector workers and their employer. Dr. Light described the use of this spyware as “overkill” and “ridiculous, but also dangerous”, and we just heard some examples of why he feels that way. In our estimation, the use of such software is pretty heavy-handed and is a breach of our members' trust.
The government's directive on privacy impact assessment is in place to ensure that any data collection is done through the least intrusive methods possible, and the government's own Privacy Commissioner has indicated that assessments are warranted whenever privacy-infringing tools are used, even when there is judicial authorization in place that some measure be used. The 13 departments in question here didn't perform privacy impact assessments before using this spyware, despite their own policies requiring such an assessment to be done, and for us that's completely unacceptable.
[Translation]
Federal public sector workers should enjoy the same rights to privacy and due process as all other Canadians. Their employer should treat them in a way that builds trust, so that they can deliver quality service to Canadians. In order to rebuild this trust and ensure that government workers maintain their rights to privacy and due process, we call on the federal government to make a plan to update and consistently follow its digital policy framework.
[English]
CAPE, my union, is here to present three specific requests.
First, we're calling on the government to stop the use of spyware on federal devices outside of its own established rules, and to use the least invasive measures necessary. All public sector workers deserve due process during investigations.
Second, we want to know when the government plans to conduct privacy impact assessments at all affected departments and to publicly release the results of these assessments to help public workers rebuild trust in their employer after these breaches. Spyware use represents an erosion of privacy rights that no public worker should accept on its face.
Finally, we call on the government to conduct a thorough review of all its digital policies to ensure that the existing policy framework is adequately robust to protect employees' digital rights, including their right to reasonable privacy, their right to be informed about any digital surveillance tools being used in the workplace and their right to disconnect from work at the end of the day.
CAPE members deliver sound policy advice for the government, and they can only do their best work when the employer demonstrates willingness to be open, transparent and respectful of the public sector.
Thank you for the invitation to speak with you today.
My name is Jennifer Carr, and I'm the proud president of the Professional Institute of the Public Service of Canada. We represent 75,000 federal public servants and some in the provincial sphere as well. We also represent IT workers.
I want to start today by making our position very clear. Employees' privacy rights must be protected. Government employees, our members, are Canadian citizens just like you and me. We all have the right to know when our information is being accessed, what information is being gathered, how it's going to be used, who has it and who will have access to it, and how it's being stored and protected. I hope we can all agree that, as one of the largest employers, the federal government should set the example for all other employers and be held to the highest standard.
Sadly, as you have heard, it appears that many government departments and agencies have not done so. They have failed to abide by the government's own policies and rules. They've apparently disregarded the Treasury Board directive requiring that privacy impact assessments be carried out before using these kinds of tools.
We're talking about federal departments and agencies potentially using these tools to obtain access to text messages, emails, photos and travel history, to access cloud-based data and reveal Internet search histories, deleted content and social media activities, and possibly to recover encrypted or password-protected information.
Think about all the information that you have right now on your phone, your tablets, your watch or your computer: health data, financial information, deleted messages from friends and family, or cloud-based information like your family photos stored on Dropbox, Google or OneDrive. The idea that using an employer-supplied phone or computer means that you are giving up all your rights to privacy is absurd.
We are deeply concerned to learn that some employers, like Fisheries and Oceans Canada, claimed that the use of these tools was justified because the data belongs to the department.
Your employer may own the device, but that does not mean they own your personal data on it. The Privacy Commissioner and legal experts have been crystal clear on this. The commissioner also made it clear that, even when there is a legal authorization, it doesn't mean that the departments are exempt from doing the privacy impact assessment. These assessments are critical to identifying potential privacy risks and figuring out how those risks can be mitigated and/or eliminated.
The Privacy Commissioner should make it clear that his office must be consulted before these tools are used, and not learn about it in the media stories after the fact.
We also need transparency around how often assessments are required to be done and what should trigger one if we need to do a new one. Technology is evolving at a rate faster than we've ever seen before. This means that our privacy laws, regulations and practices need to evolve just as fast.
Moreover, government departments and agencies should be required to consult the Privacy Commissioner prior to adopting any new privacy rules, especially when they pertain to the use of intrusive software tools. Failing this, MPs should amend the Privacy Act to make this a requirement under the law.
The employees we represent are also concerned about the testimony you have heard by some of their departments. Health Canada first said that they had purchased but never used these tools, before admitting that they had used them, but wouldn't say for what. Defence officials testified that it was unclear whether the privacy impact assessments were completed or not. RCMP officials told you that they were using the tools, but would only do the impact assessment later this year.
As the union representing tens of thousands of federal employees, these mixed messages heighten our concerns about electronic surveillance in our workplaces.
In closing, I want to thank you, committee members, for launching this study. Our members appreciate your decision to look into this issue. We urge you to make strong and clear recommendations on how government employees' personal data should be better protected. These recommendations should include the following.
Government departments and agencies should be required by law to conduct privacy impact assessments before using any of these tools, regardless of whether legal authorizations exist, as the Privacy Commissioner recommended, and less intrusive methods should be used to gather information, as required by the privacy impact assessment directive.
When departments and agencies fail to abide by Treasury Board directives, there should be clear repercussions and actions to ensure that they have further compliance.
The second is that clearer guidelines be provided around what new or modified programs will require new privacy assessments and that current ones be updated. Technology is moving at a fast pace, and our practices need to reflect that reality.
Finally, the government must acknowledge that the use of an employee's device does not give it ownership of people’s personal data on it. As the tools that this study has been asked to investigate become more powerful and invasive, privacy protections must be improved to keep pace.
We urge all MPs to come together to ensure that the government maintains the highest standards when it comes to employees’ privacy. Let’s make our government a shining example as an employer across the country when it comes to protecting privacy in the workplace.
Thank you.
Thank you to our witnesses for being here.
Now, I want to pre-empt what seems to have been the argument from the government on a number of cases. First—and it addresses this specifically, so I want to give you a chance to answer this—the government has said, “Oh, don't worry. It's not spyware.” It's troubling because these are incredibly powerful tools that have access to that personal information.
I'll direct that question to Mr. Prier. However, I'll ask my second one as well, which will be for Ms. Carr. It's surrounding the fact that it's a government device and, therefore, you basically have no rights. That's a paraphrase of even the questions that we heard from a parliamentary secretary in the last hour, and I think you were here for that. So, I'd like to ask for your opinion on that and whether you could provide some context as to why you referred to it as those things in your opening statement. Then I have a couple more questions that I'd like to get to.
We'll start with Mr. Prier.
:
I would say that whether or not we call it spyware, by definition—we could argue over the definition—it is technology that is infringing on our members' privacy rights. I think that's the basic line that was crossed here.
The proactive disclosure of the use of this technology, even though the Treasury Board directives state that this should have happened, did not happen. We learned about it after the fact.
I'll just speak to the issue of whether the fact that it's a government device means that it's able to suspend all members' privacy rights as such. The federal government is one of the biggest employers in this country. It needs to be setting a high bar and a high example for how we expect all employers to behave toward all Canadian citizens and their privacy rights as such. We feel that, in this case and in many other cases, it seems that we're slowly learning that basic policy wasn't followed.
The Privacy Commissioner was very clear that when new tools are developed that pose privacy risks, as we've seen here, this merits a privacy impact assessment and proactive disclosure. I think there are very easy ways to communicate proactive disclosure of these technologies in plain language that will make workers in a workplace, our members, federal public servants, much more able to not just abide by basic standards of what is to be shared on a government device but be aware of their privacy rights and the potential violations of them, so that this discussion can happen before these technologies are installed.
Thank you to our witnesses for joining us today. Thank you for sharing your recommendations. Part of our work as a committee is to make recommendations. Thank you for sharing those off the top, from both organizations.
We did hear from the Privacy Commissioner about the use of the term “spyware” specifically. This is a quote from the testimony the Privacy Commissioner gave us. He said, “Initial reports referred to them as covert surveillance or spyware. Since then, it has been clarified that the tools are digital forensic tools, which are distinct from spyware.” He also said, “Digital forensics tools are distinct from spyware in that spyware is typically installed remotely on a person's device without their knowledge.”
We've heard that these devices are used within regulations, a warrant, and the knowledge of employees. We've heard from several agencies when we asked them about.... I think I specifically asked if you can remotely access people's information with these tools and they say, no, you have to get a warrant and physically obtain the device, connect to it, and then you can extract the information that we've been talking about.
Do you have any thoughts on that, Ms. Carr?
Again, when we have departments that can decide what to do on their own without any kind of oversight, if we're not watching, then they're not doing.
When it comes to the privacy assessment, I did hear, “Well, they said we did one way back.” I would say that we need to update things, so that when new versions come out and new technology comes out, we start to use them. I equated it to saying that we're still subscribing to Napster when everybody is now on Spotify or Apple Music.
We can't have an assessment that has been done on really old technology.
Thank you to the witnesses for their attendance.
Earlier this week, the Auditor General, as you know, released a bombshell report exposing incompetence and corruption within the CBSA. I think the most glaring problem with this report is how the government, despite its promise in 2015 to reduce the use of external consultants and rely upon the professional public service.... We know that, over the years, it has increased the size of the public service by close to 40%.
How do you feel, as union leaders, and how does your membership feel, knowing that GC Strategies—a two-person firm working out of their basement with no IT experience—was simply connecting government with IT professionals? How do you feel about that egregious abuse of the expertise that your membership holds?
:
This was an egregious violation of procurement policies and an egregious violation of...a lot of different ways in which contracting out has bloated what people generally read as the public sector. Public servants actually do not make up the entirety of the public sector. A huge amount of that is shady relationships and contractors—which are sometimes needed, of course.
I'm speaking here as a policy analyst and as the president of a union that represents a lot of policy analysts. Even in that specialized world of policy development, contracting out is normal. There are databases we don't have access to. There are fields of information that we just can't have access to, but this whole element of not being able to build the institutional memory to be able to carry out our tasks in a regular way is a consistent problem.
When people talk about the bloat of the public sector, for our members it's these vast webs of contractor relationships that could probably be done far more cheaply, more effectively and in the spirit of building institutional memory and capacity in-house.
We do not believe that the public sector is overly bloated. We don't agree that the public sector requires a lot of trimming over the next five to 10 years. We do need this contractor relationship and this vast web of contractors to be severely reined in, however, because we feel that our members are qualified to do the type of work we do best, with the correct levels of oversight, which are very stringent levels of oversight.
:
I would just like to add this briefly. We're here today to talk about privacy. The minute we start adding layers of contracting out, all of a sudden we have infinite points for data breaches. We saw it with BGRS moving. Recently there was another one; I can't remember the name right now.
We see these things start to happen. All of a sudden, when we start contracting more and more, we open ourselves to more and more points of failure and more and more points of breach. That needs to be thought about in a holistic way, how we can maximize security, because that's Canadians' personal data, public sector workers' personal data and data that is important to our government from security perspectives.
This is essential stuff. It's stuff that public sector workers are trained on. They know how to do it and how to get it right. When we contract that out, we start losing control. That's something we need to be thinking about as well.
Mr. Larry Brock: Thank you very much, all of you.
It's great to be here with you as chair and with all my honourable colleagues. It's been two or three years since I've sat on the ethics committee. I sat here for a period of time. I always find this committee to be very important in many ways. It undertakes a lot of serious studies, I would say.
I welcome the panel members here today.
First off, I want to say to the panel members, to all your members and to all the employees of the federal public service, thank you for everything you do, not only for what the members of the Library of Parliament do to help us MPs out, but also for what you do for literally millions and millions of Canadians every day in delivering services and benefits to them.
I would also like to say that we have hired folks in the federal public service over the last several years. We have rebuilt it after the devastating cuts, as I would characterize them, from the prior administration, from the Harper government. They literally cut to the bone. We know what it was like to be a federal public servant under a Conservative administration, do we not?
First off, the member for Brantford—Brant recently said here at committee that if people are public servants, there are no privacy issues.
I'll ask you, Jennifer, and you, Nathan, do you believe public servants are entitled to privacy?
With respect to privacy, I have the pleasure and honour of sitting on the industry committee. With Bill , there's an aspect of privacy in that, with PIPEDA and the relevant sections and so forth. Privacy is a huge thing these days, which is an understatement—I'm using very common language, if I can say that—in terms of striking a balance. Like many of our representatives, I worked in the private sector before I had the distinct pleasure of serving the residents I currently serve. When you are provided a device from your employer to utilize, it is their device. You need to use it with judiciousness and diligence. There's a balance there. I've always seen that a balance needs to be struck.
Within that, within the government operations, there have to be guardrails within the departments, and they need to follow the PIAs, the privacy impact assessments. I literally learned this in the last couple of hours. I sit on two other committees, so it's been a busy week. With the PIAs, there is an agreement that when investigations need to happen, they should happen, and the devices and the contents of those devices need to be looked at.
Also, taking a step back, if I'm working for Nathan's organization and I enter into an agreement with the federal government, there is consent that you will use this device but you will use it responsibly. I'm putting that out there, because there needs to be that balance. If processes were not followed properly, you would need to correct those internal processes and the governance, of course.
Do you not agree that consent is important and that balance is important, but the notion that there has to be responsibility on the end-user is important as well?
That concludes our panel for today.
I want to thank all of you for being here in front of committee on this important study. I also want you to relay a message on behalf of the committee to your members to tell them how much we appreciate the work they do on behalf of Canadians.
Without any further business, that concludes today's meeting.
I want to wish everyone a good week in their constituencies.
We're going to be back here on the 27th with the RCMP commissioner in relation to SNC-Lavalin.
Thank you to the clerk, the analysts and the technicians for all their help in putting this meeting together.
The meeting is adjourned.