:
I call this meeting to order.
I'd like to welcome everyone to the 33rd meeting of the Standing Committee on Access to Information, Privacy and Ethics. Pursuant to Standing Order 108(3)(h) and the motion adopted by the committee on Tuesday, July 26, 2022, the committee is meeting to study device investigation tools used by the Royal Canadian Mounted Police.
Today's meeting is taking place in a hybrid format, pursuant to the House order of Thursday, June 23, 2022.
Today we have three witnesses on this panel. We're pleased to have Ronald Deibert, professor of political science and director of the Citizen Lab, Munk School of Global Affairs and Public Policy, University of Toronto. We have Brenda McPhail, director of the privacy, technology and surveillance program at the Canadian Civil Liberties Association. We are also expecting Michel Juneau-Katsuya, researcher on national security and intelligence. My understanding is that we are in the midst of navigating some technical issues with this witness, so we will proceed with opening statements from the other two. We certainly hope to have our third witness here in time for him to deliver his opening statement.
With that, I will ask for Professor Deibert to begin.
You have the floor for up to five minutes.
:
Thank you, Mr. Chairman.
I am Ron Deibert, professor of political science and the founder and director of the Citizen Lab at the University of Toronto's Munk School of Global Affairs and Public Policy.
Since 2001, the Citizen Lab has researched information security issues, and one of the principal areas of our research has been the mercenary spyware industry, in which private actors sell hacking services to governments. We are widely recognized as one of the world's leading authorities on this topic.
My staff and I have testified or provided briefings numerous times to the U.S. White House, the Department of State, Congress, the European Parliament and other governments on this topic. I'm very pleased to be speaking about it for the first time before a Canadian House of Commons committee.
Today, I want to highlight several themes that arise from this research.
First, the mercenary spyware industry is very poorly regulated and is proliferating quickly. The industry lacks public accountability and transparency. It thrives in the shadows of the clandestine world and is spreading fast without proper controls.
Second, we have documented extensive harms and abuses in just about every jurisdiction in which spyware is deployed. Governments routinely use spyware to hack civil society, political opposition, journalists, lawyers, activists, family members and other innocent victims—both domestically and abroad—including victims living here in Canada.
Third, the mercenary spyware industry is not only a threat to civil society and human rights; it is also a threat to national security. We've observed heads of state and senior government officials who have had their phones hacked with spyware. Not long ago, we notified U.K. authorities about a device we observed being hacked at 10 Downing Street, the residence of the Prime Minister. In short, our 10-plus years of research show that the spyware industry is one of the most serious threats to civil society, human rights and democracy today.
The recent revelation about the RCMP using spyware raises serious concerns.
First, spyware is not like a traditional wiretap; it is more like a wiretap on steroids. Advanced spyware is to surveillance as nuclear technology is to weapons; it represents a quantum leap forward in sophistication and power. The latest versions provide silent and unfettered access to a target's entire pattern of life. Despite these nuclear-level capabilities, it is remarkable that there has been zero public debate in Canada prior to the RCMP's recent revelation.
Second, the threshold for use, oversight, transparency and public accountability must be much higher than for a traditional wiretap. This is especially critical because the RCMP and other security agencies in Canada have a well-documented history of abuses and discriminatory practices.
Third, we need transparency with respect to where Canadian agencies are procuring this technology. Yesterday, the would not acknowledge to this committee from which vendor or vendors the Canadian government purchased spyware. There is absolutely no reason why that should not be disclosed, and there are plenty of good reasons that it should. Our procurement should be transparent and include rules for vendors so that we do not purchase from—and help enrich—firms that sell to governments abroad that threaten Canada's values and security.
Fourth, there are serious public safety concerns around the very existence of this technology. Mercenary spyware is founded on the discovery of software flaws that the software vendors themselves are unaware of or have not patched. The very use of this technology fuels a market that exploits collective insecurity on all of our devices. Canada's overall process, such as it is, to weigh the equities around these trade-offs is poor and opaque.
Fifth, the RCMP's quiet revelation sets a very bad example for the rest of the world. The Canadian government purports to protect human rights and stand for rule of law and democracy around the world. In adopting this technology without public debate and proper limits, we're essentially signalling to the world that we do not really care about these principles.
I will close my remarks with seven specific recommendations.
First, hold public hearings on the threats of the mercenary spyware industry, especially since Canadians have been victims.
Second, if Canadian agencies are going to use spyware, public consultation should be held, and the government should develop a legal framework that is compliant with the charter and international human rights law.
Third, Canada should develop strong export controls for the Canadian surveillance industry. Currently, there are none.
Fourth, Canada should penalize spyware firms that are known to facilitate human rights abuses abroad modelled after those in the United States.
Fifth, Canada should issue clear and forceful statements at the highest levels, for example, from the Prime Minister, Minister of Public Safety and Minister of Foreign Affairs, that we take this threat seriously.
Sixth—
:
Thank you for inviting the Canadian Civil Liberties Association to appear before you today. I'm grateful to the committee for commencing this study of the RCMP's use of on-device investigative technology, because it's an issue of national concern that is also a symptom of a larger problem of inadequate oversight and accountability when police acquire and use advanced surveillance technology.
The revelations about ODIT are just the latest in a series of similar media-led reveals regarding invasive techniques, from social media monitoring to cell site simulators to the illegal Clearview AI facial recognition. This isn't a one-off problem; it's a pattern pointing to a crisis of accountability.
Operational secrecy is a legitimate need in specific investigations. Secrecy around policies that apply to categories of dangerous surveillance technologies is not legitimate in a democracy. We must not allow law enforcement bodies to conflate one with the other to avoid accountability.
Why are these technologies dangerous from a civil society perspective? This committee is aware of the basic risks to privacy rights, so I'll focus on three other reasons.
First, our government agencies are encouraging an industry known for prioritizing profits over human rights and feeding the worst impulses of authoritarian governments. I work with a network of global civil liberties organizations where many of my colleagues see Canada as a role model on issues of law enforcement and due process. This kind of revelation diminishes our international reputation, not just at the level of governments but also on the ground.
Second, using these tools encourages law enforcement, as Professor Deibert noted, to exploit vulnerabilities in the technologies we all depend on, rather than to help get them fixed. We've known for some time that the CSE has duelling accountabilities in relation to their active cyber mandate and their responsibility to protect our cyber infrastructure. Now we know that the RCMP has a similar conflict. This is making us all a bit less safe daily in the name of public safety.
Finally, there's a question of due process. Your witnesses yesterday noted that an agreement detailing the ways the technology has to be protected is a condition of its use. What impact does that agreement have on court disclosures? Are cases ever not taken forward because to do so would reveal details of the technology? In other words, how does operational secrecy compromise the pursuit of justice?
Those are some of the problems. What are the potential solutions?
First of all, I do believe we need a moratorium. This study is just the beginning of an important public conversation we need to have in Canada. If it's true that this technology is a last-resort option, there can't be that much of a risk to public safety to pause its use briefly—certainly not when weighed against the privacy and due process rights at stake as well as the social and diplomatic impacts of the Canadian government condoning the sale and use of spyware.
Then we need to get back to basics, and the basic question isn't “How do we make sure the RCMP or any other body uses these tools lawfully?” Rather, it must be, “Is the use of such tools necessary, proportionate and in keeping with Canadian values?”
It probably won't surprise you that I think it is not. I think we should include, like Europe and the United States have done, the potential for a ban on state purchase of this kind of spyware technology in those conversations we need to have, but if it is democratically debated and determined that it is fit for a narrow purpose, the second question we then need to turn to is how to make the concept of lawful use more meaningful by updating our laws to appropriately govern the decisions to purchase and use these technologies, and to provide transparency and accountability sufficient to engender public trust.
For those laws to be good enough, we need stringent and effectively enforced import and export controls and limits. We need a system where decisions about using controversial potentially rights-infringing technologies can no longer happen behind the scenes. For that, we need not just mandatory privacy impact assessments but should also consider the creation of a truly independent advisory body working with appropriate transparency specifically to evaluate and set national standards for the procurement and use of surveillance technologies, as they have done in New York State.
We would also need public reporting obligations on the use of ODITs. The “Annual Report on the Use of Electronic Surveillance”, which has been repeatedly mentioned as an accountability measure, is insufficient. The tools used for this surveillance matter. That's why we're having this conversation. Yet that report simply gives statistics for any audio or visual surveillance. This leads to a final point.
Only one warrant application of the 331 in that report was refused between 2016 and 2020. That suggests that we need a public interest amicus present at those applications to provide a counterpoint to police positions. There are more problems and more solutions, but my five minutes is up, so I look forward to your questions.
Although I can't see him on the screen, let me ask, do we have witness Michel Juneau-Katsuya?
No? Are we in touch with him, though?
We're in contact with him. Okay.
Well, we may not get an opening statement from witness Juneau-Katsuya.
We will have to begin our questions.
Mr. Bezan, I would ask you to lead us off.
:
Certainly. Thank you for that question.
In 2018 we observed that Saudi Arabia was undertaking espionage. We could observe, based on our network monitoring, that there was a hacked device in Quebec. We ultimately discovered that the person whose device was hacked was a Canadian permanent resident named Omar Abdulaziz, who was a very close friend and confidant of Jamal Khashoggi. We published our report on October 1, 2018. The very next day, unfortunately, Jamal Khashoggi was apprehended and brutally executed at the Saudi consulate in Turkey.
We have also documented extensively other Canadian refugees and immigrants who have had their phones either targeted or hacked by foreign governments abroad as part of a growing number of cases that we call “digital transnational repression”.
The long and short of it here is that Canadians are definitely not immune to this worldwide risk that is growing in leaps and bounds, which is precisely why I think we need to be entering into this very serious conversation with a much more comprehensive approach than we have been to date.
[Translation]
Please accept my apologies for the technical delay.
Thank you, Mr. Chair and members of the committee, for inviting me and for giving me the opportunity to speak with you about an important issue, one that opens the door to many others.
Allow me to begin by summarizing my thinking, which is based on my over 40 years of experience serving this country and working in the private sector. This also ties in with my research and my work in the national security field.
When it comes to the use of one or more technologies that make it possible to intercept conversations or obtain information protected under the Privacy Act, I would say your examination revolves around four key things: relevance, lawfulness, legitimacy and accountability.
Right off the bat, I want to underscore the importance of protecting privacy as defined in Canadian laws and the charter. Privacy protection is one of the cornerstones of a healthy democracy, and without it, there can be no democracy.
That said, my remarks will focus on three points, which I will come back to.
First, the idea that the end justifies the means is not an acceptable argument when conducting criminal or national security investigations.
Second, partisan games have no place in this debate. It is the fruits of your collective efforts that will help to better protect democracy and Canadians.
Third, this committee has been tasked with a tremendous moral and ethical responsibility. By that, I mean building the necessary tools into the legal framework—the tools the men and women entrusted with our protection need to protect us adequately while respecting the underpinnings of our legal system.
[English]
My first point is that one major trap for anybody responsible for collective safety is to believe that the end justifies the means. It is the most dangerous deception that law enforcement officers are facing in the maze of bureaucracy and court systems. Eager to accomplish their work of protecting us and wanting to stop criminals and terrorists ready to harm us, some officers might be tempted to go around the law.
Our own Canadian history teaches us the mistakes of the sixties and seventies, when the RCMP was put in charge of stopping communist agents or separatist zealots. In the name of protecting us, RCMP officers broke the law, believing they were doing the right thing. They were misled and wrong.
I have listened and paid attention to the testimony given to you in the last days. I did not see or hear history repeating itself. I saw officers, under the pressure of not jeopardizing operational or tactical capabilities, who were answering your questions, I believe, to the best of their ability and as much as possible. Thanks to your important work, it is evident that we can enhance the approval process by improving consultation with the Privacy Commissioner, the reporting and evaluation mechanisms and the law itself.
In addition, I was pleased to hear that the court system has kept in place the checks and balances. That is good news and gives us hope that we are on a good track to improve our democratic system and accountability process.
[Translation]
The second point I mentioned concerns me more, given the troubling way I have seen certain members of the committee behaving. To ask questions, even tough ones, is a committee member's job and responsibility. Committee members should, however, abide by an overriding principle: their duty is to protect and promote the country's interests, not partisan interests or political agendas. The place to ask questions about technical, tactical or strategic capabilities is in camera.
[English]
We shall not forget that the hearings of this committee are public. Some of the bad guys, being criminals or foreign agents, are listening and taking notes. Asking questions while pushing to get, for example, the country of origin of a technology that must remain secret is to serve on a silver platter to the bad guys the means to counter tactical capabilities. To continue making fake allegations of mass surveillance when there is no evidence of it is misleading and dividing our society. Thirty-nine cases and 41 devices spread over more than five years is not mass surveillance.
[Translation]
As I mentioned at the outset, I have been watching and analyzing threats against society and Canadians for over 42 years. I was among those who served in the RCMP and dedicated themselves to protecting this country and its citizens. I have experienced the frustration and success that come with conducting an investigation and trying to stop criminals, spies and terrorists from doing us harm, both individually and collectively. I cannot adequately put into words just how an investigator feels when a bad guy gets off because of a flaw in our democratic or legal system.
Yesterday, Philippe Dufresne spoke to you about—
:
Thank you, Mr. Deibert.
Yesterday, we heard about warrants and the fact that a judge had to approve and authorize the use of these investigative tools, under part VI of the Criminal Code. It's a good oversight mechanism, it would seem.
I'm not sure whether you agree with me that a situation can be lawful and unethical at the same time. As has been pointed out, the legislation is some 20 years old, and technology moves at a breakneck pace.
Even with legal safeguards in place, can the use of these investigative tools become unethical?
:
Very little is known about this industry; it operates in the shadows by definition. It's similar to the trade in weapons technology or private intelligence. These firms, generally speaking, don't like to publicly disclose what they're doing or who their clients are, which makes public accountability and transparency very difficult. We at the Citizen Lab, along with several other organizations, have spent well over 10, close to 15, years investigating this industry using a variety of technical methods and forensic methods.
What we've found is that there's almost no international regulation around this industry; they're selling to any government client. Most of the governments, unfortunately, in the world are authoritarian or illiberal, and naturally, they're using this technology not in the ways we're hoping for it to be used here. They're using it to go after political opposition, civil society, journalists, activists and others. They're making millions of dollars doing so, and they obfuscate their corporate infrastructure from investigators like us.
This is a very serious global human rights and national security issue. All you need to do is look at the reactions at the most senior levels of the United States government. The Biden White House, the Department of Justice, the Department of State and the U.S. Department of Commerce have all come out and said effectively exactly what I'm saying to you right now. We are really asleep at the wheel on the threats raised by the global mercenary spyware industry, and we need to urgently correct that.
:
Thank you for that question.
I think Professor Deibert has referred to this, but I'll elaborate.
We had yesterday an RCMP witness say, to paraphrase, that they don't actually think about doing a privacy impact assessment just because they're using a new technology. They consider whether the technology permits a new kind of invasion.
This sounds kind of logical until you break it down because that formulation of the nature of the search ignores the reality of an ODIT, which allows all the invasions all at once on a device that we— not they—own.
Did they do wiretaps before? Of course. Did those wiretaps allow access to the contents of every form of communication written and oral, professional and private, retrospectively and prospectively, including data that's not actually on the device itself but in the cloud? Of course not. Is it the same level of invasion? No. Did police install covert cameras in homes and places of business with warrants in the past? Of course. Did a single camera have the ability to move with an investigative subject from work to home, from bedroom to bathroom, 24 hours a day? Of course not. Is it the same level of invasion? No.
An ODIT can do more. It can record live audio. It can track locations. It collects device identifiers. It tracks Internet searches. It follows application use.
Should a PIA have been required? Of course. Even that, as Professor Deibert says, is not enough when we're talking about the enormity of the invasion.
:
Thank you very much, Mr. Chair.
It's good to be back on this committee. The last time I was on the Standing Committee on Access to Information, Privacy and Ethics was for the Cambridge Analytica and Facebook study, and I found that we did some very good cross-partisan work on that issue.
This is, of course, an issue that concerns me very deeply. I'd like to direct my first question to Professor Deibert. As you know—and I think we're both on the World Movement for Democracy steering committee—I've long been an admirer of much of the work that Citizen Lab has been doing globally, both on disinformation and on cyber harassment of human rights activists. I think you've raised some very concerning points with regard to how authoritarian regimes are using these kinds of tools.
In terms of what this committee is looking at specifically, I know that some of the things you mentioned, particularly when you're talking about the digital transnational repression and other things, might more suitably be discussed at the foreign affairs committee or even the Subcommittee on International Human Rights, on which I sit. I think there would be significant interest in looking at that, including things like export controls.
My question for you is more specific. I think you'll agree that when the RCMP are using these tools in a very narrow scope—I think you mentioned things like “proportionate” and “necessary”—with judicial oversight and warrants, that's a very different thing than how regimes like China or Iran are using this kind of technology. Setting aside issues like the vendors and the export controls, you mentioned something that I think was interesting. You talked about having thresholds. Could elaborate a little bit about what those kinds of thresholds to prevent abuse of these kinds of powers would look like?
:
I think overall it's reassuring that we heard testimony from the RCMP yesterday and from the that the instances of the use of this type of technology were undertaken with judicial authorization. However, as I said before, I think just because we hear from the RCMP that there was judicial authorization, it shouldn't be seen as some kind of magic wand that makes everything else magically disappear: “Nothing to see here. Go about your business.”
First of all, we know that there is a well-documented history of abuse within law enforcement in this country. There is a documented history of discriminatory practices. I also have concerns about the nature of the technology itself and whether, with all due respect to judges who I have confidence in, they truly understand the scope and scale and sophistication and power of the type of invasive technology we're talking about that Ms. McPhail just really accurately described.
I also think there are equities issues that need to be discussed here. My team and I routinely forensically analyze victims of spyware. In several instances, we've actually recovered copies of the spyware and made responsible disclosures to the vendors, unlike what the government agencies do. These disclosures have resulted in security patches affecting several billions of people worldwide. If the government is going to withhold that information from the vendors and put all of our safety at risk, there needs to be a proper process around that. That process typically is called the “vulnerabilities equities process”. Right now, as I said in my testimony, our process around that in this country is weak. It's opaque. Frankly, it's nowhere near the level of where it should be for a mature liberal democracy.
Those are some of the concerns I have that go well beyond whether the RCMP simply told us that these instances were authorized by a judge.
:
I thank you very, very much.
I want to bring to your attention the fact that, unfortunately, our society, particularly our democracy, is under siege. We're facing an enormous threat. Probably since the 1600s and 1700s, when the initial concept of democracy started to appear, we've never been under threat the way we are currently. The far right, the alternative right, is taking place. There's populist discourse. People are using demagoguery to try to convince people and bring insecurity.
From that perspective, I totally support the idea of bringing more control, more accountability and more transparency. What I seek is a balance, a balance that does not prevent the capability of also catching the bad guys. Unfortunately, all the nice discourses, theories and philosophical debates—they don't care about this.
This echos a recommendation that I made during the recent study on facial recognition technologies. It is that to counter this persistent pattern of police acquiring and using sophisticated and potentially controversial surveillance technologies without public disclosure, we should follow the lead of places like New York State and New Zealand in putting together an independent advisory panel that would include relevant stakeholders from the legal community, from government, from police and national security, from civil society and of course our regulatory bodies who are relevant, like the Privacy Commissioner.
It can act as a national standard setting body, an advisory body, to take a proactive look at the kinds of technologies that our police forces want to use to modernize their investigative techniques and look at them across a range of considerations, including ethical considerations, legal considerations and considerations around Canadian norms and values. It can then make standard setting, gold standard, recommendations for police organizations, not just nationally but provincially and territorially—because of course policing is also a provincial and territorial matter—so that we would have consistency and the public could be assured that rights were being respected while police had the tools they need to do their difficult jobs.
:
Thank you very much, Chair.
Professor Deibert, one of my staff actually attended a number of your lectures as a professor at U of T, and he had some really good things to say about your role and expertise in this area. I really appreciate your being here today. Thank you very much. It's a personal connection.
I know members have been asking questions that you don't really have the purview to answer because you don't have the direct information. A lot of what we're discussing in this panel is, really, hypotheticals and what-ifs, with more of a policy perspective as opposed to a “what happened” or evidence-based perspective.
I'll start with Professor Deibert, if that's okay, and ask a question about disinformation.
We talk about the institutions that govern us and public trust. How does the concept that the RCMP and police institutions are monitoring and surveilling Canadians...? What kind of impact does that have? To date, we've heard from the RCMP and heard from the Privacy Commissioner with respect to exactly how many investigations have been conducted that have used ODIT surveillance. How does that impact public perception of the RCMP and our governing institutions in general, as we've seen the climate of disinformation and conspiracy theories being peddled in recent events? Professor Deibert, do you have any comments on that?
:
I think there are a number of ways to proceed with legal reform across a range of different laws that would provide an improved baseline of accountability and transparency.
Previous witnesses yesterday talked about making privacy impact assessments mandatory, and I do support that recommendation as a baseline requirement. Also mentioned was the idea, which I support, of including the existence of privacy as a fundamental human right in both our public and private sector privacy laws. That changes the nature of the balancing act that's necessary when we're deciding whether businesses or governments are allowed to engage in invasive privacy practices. It puts the right at the centre, in a place where it should be in those balancing equations.
It's also worth looking at part VI of the Criminal Code, which, to the best of my knowledge, had its last very significant amendments slightly more than 20 years ago. It could be that experienced defence counsel in particular would be of great use to this committee in recommending alterations to that, based on their experience with these kinds of contemporary technologies as their use emerges in criminal cases.
Finally, as one more concrete thing, the United States has created an entity list of banned spyware vendors. Canada should absolutely consider doing the same thing, which would provide some public assurance that our tax dollars are not going to support these dangerous and mercenary companies.
:
I think we have mechanisms making us capable—sometimes in camera—of receiving and asking difficult questions. The House of Commons has established a permanent committee now on security and intelligence, which is capable of going across the board in every department to follow the traces of certain cases. That is extremely important.
The challenge that we have is that the sitting members are elected—just like members of this committee—and at every election there are new members who come in with a new team, a new group that doesn't necessarily have the experience, the knowledge or the network to be capable of digging in as much as they should.
Should we have more committees like the SIRC, the security and intelligence committee, which went from watchdog to lapdog over time? They're not really doing as much work as they should be sometimes to observe, criticize and bring solutions to some of the problems.
That's the problem: Sometimes the political systems interfere with the work of the committee and the independence.
You mentioned in one of your earlier comments that you enjoy the non-partisan element of the committee and the work that has been done. That's what should be sought as much as possible because, at the end of the day, we should be working for this nation, not for our partisan interests.
That's a perfect segue, Chair. With the last couple of minutes of my time, I would like to move a motion. The reason is that I think we have had a bit too much innuendo and too many accusations about mass surveillance at this committee, and even outlandish comparisons of the RCMP with the German Stasi. As a committee, we should come together and show support for the important work the RCMP does while ensuring their accountability under the Charter of Rights and Freedoms.
I will read my motion and we will circulate it to members of the committee in both languages as well. The motion reads:
That the committee affirm that it is satisfied that the RCMP is not using Pegasus or NSO Group technology; that the use of ODITs is reserved for only the most serious cases; that the approval of a request to use ODITs comes with strict terms and conditions, and must be ultimately approved by a superior court judge; that the use of these tools without judicial authorization would be a criminal offence; and that the committee supports the RCMP in their mandate to protect Canadians from terrorism, human and drug trafficking, money laundering, and murder, while ensuring accountability.
I'm repeating myself here a bit. The final line reads:
that the committee supports the RCMP in their mandate to protect Canadians from terrorism, human and drug trafficking, money laundering and murder, while ensuring accountability.
I apologize that in my copy I have it repeated, but we'll send the proper copy to all members of committee. I look forward to any questions my colleagues might have.