:
I call this meeting to order.
[English]
Welcome to meeting number 36 of the House of Commons Standing Committee on Industry and Technology.
Pursuant to Standing Order 108(2) and the motion adopted by the committee on Monday, September 26, the committee is meeting to study fraudulent calls in Canada.
[Translation]
Today’s meeting is taking place in a hybrid format, pursuant to the House Order of Thursday, June 23, 2022. I am sorry to join you virtually today. I always prefer to be here in person, but that is not possible today.
However, we are fortunate to have several witnesses joining us in person in the first hour today, including representatives from the Royal Canadian Mounted Police: Superintendent Denis Beaudoin, director, Financial Crime; Sergeant Guy Paul Larocque, acting officer in charge, Canadian Anti-Fraud Centre; and Mr. Chris Lynam, director general, National Cybercrime Coordination.
In the second hour, we have Mr. Randall Baran-Chong, co-founder of Canadian SIM-swap Victims United; Mr. Kevin Cosgrove, digital safety educator and civilian advisor; and finally, Mr. John Mecher, retired RCMP fraud investigator. They will be testifying in their individual capacities.
Without further ado, I will turn the floor over to representatives of the Royal Canadian Mounted Police for five minutes.
Mr. Chair and members of the committee, it is my honour to join you today to discuss the prevalence of fraudulent calls and other scams in Canada, and the efforts undertaken by the RCMP since we last spoke to you on this topic in May 2020.
I'm Director General Chris Lynam. I'm responsible for the national cybercrime coordination unit—the NC3—and the Canadian anti-fraud centre (CAFC) at the RCMP. Joining me today are Sergeant Guy-Paul Larocque, acting officer in charge of the CAFC, and Superintendent Denis Beaudoin, director of financial crimes within federal policing criminal operations.
Before discussing fraudulent calls and other scams impacting Canadians, I would like to briefly outline the mandate of the CAFC and the NC3. First, the CAFC includes a long-standing partnership among the RCMP, Ontario Provincial Police and Competition Bureau Canada. The CAFC works closely with Canadian and international law enforcement partners to combat mass-marketing fraud and other types of fraud, including fraudulent calls.
In 2021, the CAFC aligned its operations with the NC3, another national police service at the RCMP focused on combatting cybercrime. Whereas the CAFC focuses on fraud and online scams, the NC3 focuses more on combatting technology-as-target cybercrime, such as ransomware, data breaches and other cyber-intrusions. The CAFC and the NC3 work closely, given the strong links between fraud and cybercrime, to provide highly coordinated services to the Canadian and international law enforcement communities.
Since our last committee appearance in 2020, the CAFC and the NC3 have seen a significant increase in fraudulent activity in Canada. In 2021, the CAFC received reports of $379 million in fraud losses from victims—a historic year in reported fraud losses and a 130% increase compared to the previous year. At the same time, the CAFC estimates that only 5% to 10% of victims actually report fraud to law enforcement.
Of the reported fraud losses among victims in 2021, more than 70% were cyber-enabled, meaning that the fraudulent activity was committed via the Internet or related digital platforms, such as email or social media. These trends and the convergence of cyber-enabled fraud with other cybercrime activity underscore the importance of collaboration between the CAFC and the NC3, and the need for Canadian law enforcement to continually adapt and keep pace.
Despite the rise in online scams, Canadians continue to be targeted by fraudulent calls at the same time.
[Translation]
In 2021, the CAFC received over 32,000 reports where the victim was contacted by phone by the fraudster. Fraudulent phone calls can include attempts from criminals claiming to be law enforcement, the Canada Revenue Agency, banks and other financial institutions, among other types of fraud.
[English]
Make no mistake. It is incredibly challenging to investigate and apprehend fraudsters and cybercriminals. Oftentimes, we are dealing with thousands of victims, multiple policing jurisdictions, and cybercrime infrastructure and digital evidence in foreign countries.
[Translation]
However, these challenges also acted as a catalyst for Canadian law enforcement. We adapted, accelerated our efforts to collaborate with like-minded partners, and took on more of a holistic approach to combatting fraud and cybercrime.
Various RCMP programs continue to play key roles in several international operations against cybercrime and fraud. However, we also recognize that fraud, in all its forms, is a pervasive and enduring challenge, and we cannot simply arrest our way out of this problem. Our response to fraud requires broader efforts.
[English]
For example, in some cases, and where possible, we work closely with domestic and international partners to assist with the recovery of victim funds attributable to fraud. In 2021 the CAFC assisted in 36 instances of freezing or recovering funds, totalling approximately $3.4 million.
Another key aspect to combatting fraud and cybercrime is prevention, outreach and awareness-building. It is a happy coincidence that I am here and able to speak to you in October, cybersecurity awareness month. A key theme to our prevention activities this month includes awareness and prevention material about phishing techniques used by fraudsters. Our prevention efforts are ongoing throughout the year, with another notable month in March focused on fraud prevention. Last year for fraud prevention month we focused on outreach and awareness against impersonation scams.
In conclusion, our efforts over the past few years have been significant—insufficient but significant—and we remain committed to finding new ways to protect Canadians and reduce victimization associated with fraud and cybercrime.
I would like to thank the committee for the opportunity to speak with you today. We welcome any questions.
:
I'll answer that, although not necessarily about new frameworks. I can talk about some of the measures that exist now.
As Superintendent Beaudoin mentioned, there's both the domestic piece and then the international co-operation piece. That's a big piece of what the mandate of the CAFC and NC3 is about. It's about working with law enforcement partners domestically and then linking those efforts, where possible, to international efforts. That could be bilaterally with other countries and also multilaterally.
A good example in the cybercrime space is that we work quite a bit with the European Cybercrime Centre. They have a specific group, the joint cybercrime action task force, of 18 member states of Europol plus some third parties—Canada, the U.S. and Australia. Out of the Europol headquarters, they are in contact daily, trying to work these international investigations together.
That is a great example of how collaboration at the multilateral level can lead to further investigations and, if not to arresting or prosecuting cybercriminals and fraudsters, to going after their infrastructure. There have been quite a few successes on that front.
:
We don't collect that in terms of the units represented here. I know that Statistics Canada releases regular crime stats on the prevalence of fraud and cybercrime. In some cases, that trend is increasing in the cyber-enabled. That has increased year to year.
One of the additional aspects is that we don't just focus on the arrests, charges or convictions. We try to take a holistic approach to reducing victimization. In some cases, that could be recovery efforts to help people freeze or recover their money, as I mentioned.
Other efforts are to work with different service providers, so if we come across infrastructure, web domains or websites that we think are being used by fraudsters, we reach out to those service providers to say that we think fraudsters are using this. They can then take action to take those offline and what have you.
We also focus a lot, as I mentioned, on the prevention side. We really focus on a holistic approach to tackling and reducing that level of victimization.
:
Sure. Actually, I might address one of your questions. I wouldn't want to leave the committee with the impression that police aren't heavily focused on investigating fraudsters and cybercriminals. The mandate of the CAFC and the NC3 is very much about enabling law enforcement agencies in Canada to do those investigations, and the federal policing part of the RCMP as well. There are many investigations under way. I wanted to point out that we don't just do that; we have other activities.
In terms of information sharing with the CRTC and other entities, we operate under what our authorities are in terms of sharing. There is some information we can share with the CRTC and vice versa. Almost any agency would say it can improve information sharing across the board and that would make things better, but there are many opportunities where we share now.
When it comes to private sector entities, like telecommunications companies and financial institutions, we have to be governed by how police operate. If we need information from the police, we often have to get a production order or other type of measure.
There are many opportunities or times when a bank will come to us as a victim and say, “We think we've been victimized,” or, “Some of our clients have been victimized.” There is regular communication, and we have talked about some of the outreach we do when we come across stuff that we think is impacting their clients.
Generally, yes, there is always scope for improved information sharing.
:
Thank you, Mr. Chair, and thank you to the witnesses. I know Mr. Lemire will be back soon. I always enjoy his interventions as well.
I'm glad you finished with the last question. Why is this here at the industry committee? This is the frustrating part for me, having been here for a number of years. This is a regulated industry where we allow criminal activity to basically course its way through. That's the telco sector. None of this would take place, impacting our citizens, without the fact that we have spectrum auctions, we allow access to our infrastructure, and we regulate through the CRTC. All those different aspects provide a vehicle for this activity to take place. I really appreciate the efforts that have taken place, not only here at committee but also over the last number of years to make a difference.
What I'm worried about, and what I'm interested to hear further on in the conversation, is that this is very similar to white-collar crime. It seems to escape the grasp of Parliament Hill here in many respects. We go after the workers and we go after the street criminals, but I'm wondering whether or not there are sufficient laws in place.
I'll give a quick example. We saw Rogers recently drop the 911 access from citizens. We saw from the telco industry, from testimony here, that the telcos were not even working together properly to help each other out to protect 911. I'm wondering whether we should be taking the gloves off with our telcos in some respects to get more power or more improvements in order for the RCMP and other law enforcement to get better co-operation.
I'd like your comments on that, please.
There is no doubt that seniors are a population that fraudsters always seem to target. They are often seen as easy prey.
If I look at our statistical data, the losses associated with seniors—in our case, it's those aged 60 and over—represent about 30% of the losses that are reported to us on an annual basis. That's quite significant.
At the Canadian Anti-Fraud Centre, we have a program in place that provides support for seniors. When detected by our analysts upon receipt of complaints, more vulnerable or at‑risk individuals are redirected to the CAFC's Senior Support Unit.
This is a fairly unique and fairly special program in that we have volunteer seniors who come in to help us do this part of the work. These people are often retired and come from industry, either from telecommunications, banking or other sectors. Retired teachers also support us. These people follow up calls with the elderly. In addition, they also help us make presentations to target groups, often to seniors' groups.
Our program is primarily focused in Ontario. We are currently aiming to expand this program from east to west to ensure a greater presence in Canada. Ontario is the province with the largest victim pool as it is the most populous. In that regard, our efforts are well directed there.
We are making other efforts to try to minimize the impact of fraud, whether through our social media awareness campaigns or the many media responses we receive.
For example, in the last year, just at the anti-fraud centre, we have received almost 400 media requests. The media community is very helpful in getting our message out and trying to reach as many vulnerable people as possible.
The most important thing, and often the most difficult, is to encourage victims to recognize that they are victims of fraud and to report their case to the authorities. Reporting fraud remains a key element. Our goal is to understand the schemes that target Canadians so that we can adjust our messages accordingly.
:
In terms of outreach, we have proactive presentations that are done in person, to the extent that they can be done. Of course, as Mr. Lynam explained, COVID slowed down our efforts, but we still found ways to be able to reach out. We had virtual presentations when we could not be there in person. Our senior volunteers have now started to do in-person engagement.
Just last week or the week before, one of my communications officers gave a presentation to newcomers. It was great to be able to familiarize them with all of the fraudulent threats that can be out there and to help them navigate through them.
I recognize that prevention will continue to be key. We'll never do enough prevention. There's always more that we can do, and it's always going to remain a challenge to be able to reach as many people as possible.
One thing that we've reproduced at the centre is using the hashtag #Tell2. Basically, if I tell two people about a fraud story or a fraud threat and then they tell it to two others, it will amplify the messaging.
You mentioned senior victims of fraud, who can be more vulnerable and difficult to reach. That's why we ask their families to be able to help us reach out and have those conversations with them.
Prevention is everything in many respects. In fact, we have Mr. Mecher coming up. He's a former RCMP fraud investigator. He's been working on the Western Union file. He did an amazing job and will be testifying here.
We actually sent an email out to members of Parliament to try to get that out there. It was taken up by about 10 other members of Parliament. We sent that out twice. It's always hard to get it raised as a priority.
In 2018, the public safety minister then, Ralph Goodale, convened a summit here in Ottawa on guns, drugs, smuggling and so forth. I'd like your honest opinion on whether a summit is a good idea or a bad idea. Are we at the point where we need a summit on fraud or something like that to bring in the provincial, municipal, federal and other legislators to have something more robust for public relations?
I don't want to have meetings for the sake of meetings, by any means. I have enough of those. What I did like about the summit that Mr. Goodale put on is that it bound a lot of people who hadn't worked together in the past. Formal stuff and informal stuff took place later.
Given your time and the commitment, is a summit on fraud and cybersecurity something that would be worthwhile for the country at this point?
You're not insulting me if you just say no.
:
Good afternoon. My name is Randall Baran-Chong, co-founder of Canadian SIM-swap Victims United.
I'd like to thank the committee for inviting me to reappear because, the last time I was here, the lockdown was announced that afternoon, so I hope not to be the harbinger of another pandemic.
To refresh your memories, number portability, which was introduced in 2007, was designed to enable customers to switch carriers easily while retaining their phone number, but it's something that has been exploited by fraudsters to transfer ownership of a phone number to themselves, often by manipulating the customer service representative of a telco.
Once in possession of your phone number, they take advantage of SMS and text-based authentication methods and click “forgot my password” to take access and control of the victim's accounts. If you think about it, that can be everything from your email to banking to cloud storage to crypto-wallets. Within our organization of over 20 victim advocates, we have people who have lost possession of all their data, had hundreds of thousands of dollars stolen, and, in my case, had a livelihood threatened with extortion.
What has happened since that last fortuitous meeting? As part of its November 2020 report, this committee—with a few different faces now—had two key recommendations, which I am paraphrasing. One was that a hearing be held and, in the absence of that, legislation.
The minister responded by saying that we entrust the CRTC and the wireless network portability council, which is composed of the telcos themselves, to handle it and do its job of self-enforcement, and that legislation is unnecessary, as unauthorized porting is covered as a crime.
I can speak for almost all victims in our group that our issue is not with criminal enforcement of this issue or with the perpetrators themselves; it's a real matter of distrust of the telcos and their regulator. To do something probably never done in this chamber before, I'm going to quote rapper Ice-T. Our attitude is more, “Don't hate the player, hate the game”.
What I mean by that is we know that criminals will always look for vulnerabilities to exploit, but it's the system, the telcos, that we entrust to protect our personal information that do the math of what it costs to prevent these frauds versus the near-zero cost of punishment they bear in the event of failure, and the regulator that exists to protect the public has failed us. In fact, both of them have been thus far dismissive, unsympathetic and ignorant of victims.
Since our last meeting, the following has been revealed: It's more prevalent than most people thought.
Ms. Gray alluded to this. An access to information request filed by a Globe Telecom reporter—who ended up being a victim of SIM-swap fraud, ironically—revealed 24,627 cases, to be exact, of unauthorized ports over the 10-month period of August 2019 to May 2020. That represented 1% of all ports.
Compare that to credit card fraud, where only 0.17% of transactions are fraudulent. At a peak, 2.5% of all ports were fraudulent. Its magnitude can be massive. Two Canadians, one in Montreal and one in Hamilton, have been charged with stealing between $40 million and $50 million in cryptocurrency and other credit card fraud in Canada and the United States.
Meanwhile, other victims in our groups are attempting to recoup millions in stolen funds due to telco customer service representatives surrendering personal information to fraudsters, enabling execution of the unauthorized port.
Finally, telcos have self-enforced in the meantime, and unsuccessfully in the beginning. After a number of failed attempts to address the problem, they introduced text notifications around the summer of 2020. This continues to fail. We know this because of victims who emerged afterward. There is a group of 14 that we are aware of who were attempting to recoup several million dollars back in 2021. Telcos have failed to prevent the exploitation of their representatives and they apply the practice inconsistently.
The fact remains this: Our digital identities and our phone numbers are only growing in criticality. Your SIM is the new SIN number—that is, until SMS-based two-factor authentication is replaced wholesale.
The second point is that the safety of our digital identity is as strong as the weakest link and, in this case, telco customer service representatives, CSRs, are the weakest link in the line of defence of our phone numbers.
Investigations have revealed phone conversations and chat logs of CSRs being socially engineered into providing information to fraudsters. This speaks to a lack of training, misaligned incentives to prioritize customer throughput over customer protection and a lack of punitive measures for the telcos themselves in the event of failure.
Finally, it remains that progress and practices around unauthorized porting remain opaque. The fact that we were unable to produce numbers and that they can only be produced through access to information requests speaks to that. There is no proactive disclosure of data on incidences or effectiveness of practices.
We need to have a hearing to get a more thorough understanding of the situation and response situation and allow for victims to be heard. Second, we need to codify rules that create consistency and durability in practices, including transparency in metrics. Third, we need to introduce enforcement for non-compliance, as I suggested back in 2020 when Australia introduced fines of up to 250,000 Australian dollars for non-compliance.
These three recommendations are all supported by over 12,500 Canadians who signed an OpenMedia petition to that effect.
Let's not wait another pandemic for things to happen on this. I welcome your questions, and a way to a cure.
Thank you.
:
Good afternoon, everyone.
I'd like to thank the committee members for offering me this opportunity to speak today.
My name is Kevin Cosgrove. I'm a network technician, educator and digital safety advocate in Windsor-Essex County in Ontario. I've been working in the IT field for almost three decades, but I've shifted to working more with actual people, through contacts, throughout our community. I've been working with law enforcement on digital fraud and educating the public in that area.
I teach classes each semester with seniors specifically. As we know, seniors are a major target for online, digital and phone fraud. In the stats I receive way down at my end of things, almost 25% of the victims of fraud are seniors. Each year we spend time with local police and educate seniors on how to avoid fraud.
I know this committee has certainly focused on things at the higher levels—dealing with the telcos and other things at international levels—but I'm the guy down in the trenches having the little old lady coming to me, telling me she got scammed, needing that type of help, and asking who she should call.
My biggest frustration in working at a local level and being an educator specifically focused on these matters is that the information is already available and out there. The RCMP, especially, has a phenomenal amount of information. When I speak to people in my classes, however, no one's heard of it. It's not that the RCMP is not doing a good job or is not doing any outreach, but when I speak to people, they're unaware.
As the committee is aware, the RCMP has a fabulous publication known as The Little Black Book of Scams. It's a wonderful publication, and they've had it for quite a few years. After doing this for almost 20 years, I only know one person who saw a physical copy of it. That's definitely an issue with some of the programs we have; some of the education and outreach we're getting from the RCMP isn't necessarily getting down to every level.
Of course, there's also sometimes a disconnect when the RCMP is not the leading authority in a jurisdiction and relies more on local police to deal with that. They're doing their own jobs. Basically, each little area we're running into is trying to reinvent the wheel instead of having a unified response to some of this stuff.
A big focus I have, when I'm teaching seniors and putting stuff out in the community, is making it accessible. When I got into doing this almost 20 years ago, I noticed that the focus on details, definitions and such things is unwieldy for the average person picking up a pamphlet and trying to understand it. I'm not disparaging some of the information out there, but an 84-year-old woman does not care what the differences are among phishing, smishing, spear phishing or whale phishing. They don't care about those types of details. They need information to keep themselves safe without reading a PSA, a public service announcement pamphlet that goes in the wrong direction for educating the public.
I'm definitely ready for any questions you may have. I think I had a few questions for the RCMP when I was sitting back there. However, that's not my place.
Thank you very much for the opportunity.
There was some mention earlier about STIR/SHAKEN and what kind of progress has been made there. Even though I'm a civilian, I speak with criminal intelligence analysts at the CAFC and the financial crimes unit in Windsor. According to them, the types of calls that are specifically targeted by STIR/SHAKEN have diminished. People are no longer reporting receiving calls that say “Canada Revenue” on their phone. They may see that exact same phone call show up as a long-distance number, but in terms of a spoof call being displayed as law enforcement or Canada Revenue, that has definitely decreased, according to the information I've been given.
:
Greetings. Thank you very much, Mr. Chair and honourable members of the committee.
My name is John Mecher—that rhymes with teacher—and I was with the RCMP for over 32 years. During that time, I spent approximately 10 years investigating fraud, mostly in the greater Toronto area. I've investigated various frauds, including the infamous CRA scam. After I retired in 2019, I continued my work in a volunteer capacity to create fraud awareness.
Although I'm open to discussing many aspects of fraud, including organizational and governmental missed opportunities, I've chosen to focus on a foundational component of fraud prevention. Specifically, I will speak to the difference between “fraud awareness” and what I call “meaningful fraud awareness”.
First, it's always good to reiterate the losses, which continue to escalate year after year and are currently at an all-time high. As per the Canadian Anti-Fraud Centre, last year those losses rang in at over $383 million. Worse yet, that amount, as per the Canadian Anti-Fraud Centre, only represents 5% of the actual losses.
What we're looking at in Canada is that fraud has become a multi-billion-dollar enterprise for fraudsters all around the world. Those same fraudsters tend to prey on people I describe as traditional fraud victims, such as seniors, newcomers, refugees and the intellectually challenged. Although I can offer several egregious examples of fraudsters targeting members of those communities, I must remind everyone that just about anyone, given the right set of circumstances, can fall for a scam.
It's also necessary to remember that the victim impact often goes beyond simply a financial hit. In some cases, the victim's life savings are wiped out, and that's often never recovered. Sadly, victims also face layers of emotional impacts, ranging from embarrassment to depression, and in extreme cases, unfortunately, many victims end up taking their own lives.
Specific to phone fraud, even though these scams have been around for decades, we have yet to implement measures that have been able to reduce their ease of access to our phone systems. Statistics from the Canadian Anti-Fraud Centre reinforce that point, as the phone has been and continues to be the preferred method of solicitation for fraud.
Furthermore, with a view to the CRA scam that arrived in Canada in 2014, along with subsequent variants, I remain unconvinced that there is any sense of urgency in creating a barrier to the exploitation of our phone systems. To that end, we also need to be aware that we can't rely on enforcement—albeit necessary—or the courts as a meaningful deterrent for fraudsters. Unfortunately, we're not left with many options to protect our fraud-vulnerable communities.
All that said, fraud awareness is the solution, and that needs to be employed. However, it needs to be employed in a meaningful, relentless and focused manner, but that is something that does not always happen. If the status quo approach to fraud awareness worked, we would not be seeing losses growing on a yearly basis. At the same time, although many people in Canada do great work on this front, we need to do much more, and we need to do it now.
Although fraud awareness can involve websites and social media, if potential victims are unaware of those platforms, it's pointless to believe that a series of tweets or online posts can create meaningful fraud awareness. From my perspective, the golden rule of meaningful fraud awareness must be driven by our ability to get the message to those who need to hear it the most. In failing to do that, we will continue to see further victimization.
Lastly, I'm willing to work with any parliamentarian in a non-partisan manner, just as I did with on the Western Union file, which was a once-in-a-lifetime opportunity for victims of fraud to recoup losses.
Thank you.
:
On my level, and just from the education side of things, I do look into the CAFC and the RCMP and the resources that they have, and the resources are excellent. I sometimes rewrite things for my own classes or I just use their own materials. There's no need to reinvent the wheel with some of this stuff. In just talking to people, many of them don't know it's there.
I can't speak at all to why there's not enough information given out, or a split in jurisdictions where local law enforcement or the RCMP are not taking a local interest. I'm not sure of the exact reason. The material is there. On your side, and the committee's side, of course, you have an interest in the actual statistics and the numbers. The average person is not interested in accessing that information.
In terms of fraud prevention, awareness, and everything else, I teach a special program with our local university. It's for people 55 and older. I've been doing it every semester for eight years now, and there's always a class that signs up. I also do talks with our regular police. The interest is definitely there. There's no question about that. I have people coming to me, and not just me, trying to chase people down and put pamphlets into their hands, but the information is already available. People can look this stuff up online. They can get pamphlets. They can visit their local police. There's an unlimited number of ways people can be educated to prevent this stuff, but somehow there's a disconnect. That's why I've been focusing my own work, even working with MP Brian Masse, on trying to educate the public specifically.
It's been going well. I'm hoping that after a few years there will be a big hole in a map where reporting and fraud happens. That might be a little optimistic, but getting the information, as far as I'm concerned, does not require SHAKEN/STIRRED. It does not require enforcement. It doesn't require U.S. law enforcement co-operation. If every person whom I've reached so far knows what a scam is, whether it's through SMS, text, online, or a phone call, they can identify the fraud in the first place. None of the other approaches is effective.
:
I guess it's because it's equally personal, since I'm a victim myself. Since then, I have been able to hear the recording from the police of the customer service representative who impersonated a Rogers employee, called the Rogers store, and essentially got my information. It was surrendered very easily. The scammer essentially impersonated this employee and was able to provide a customer number and all the other stuff. I think it speaks to a broader problem within the telcos and the ability to socially engineer and exploit these folks.
I think part of the problem is that if you think of an incentive, I can tell you an outcome. The problem is that these customer service reps—and I have sympathy for them—are not very highly paid and they are not very highly trained. A lot of their metrics are based upon how many customers they can get through during their shifts. What's the satisfaction of that? Their incentives are more to.... If someone wants to try to port their number, let them do it. They don't want to put up resistance. They don't want to challenge whether this is the right person or things like that. If the incentives continue to essentially enable them to focus more on throughput, business outcomes and things like that, versus protecting customers' privacy and information, then I think this problem will persist.
The second thing in terms of awareness is that there is, of course, the broader awareness of good hygiene. Let's move away from SMS-based 2FA. This is something that the Federal Communications Commission in the United States has been promoting, as they consider SMS-based 2FA and SIM swapping a national security threat, but there's also the corporate awareness. For example, when Rogers introduced its text notification form in its first failed attempt at 2FA, customers thought the text notifications were frauds. They thought they were spam as well, but it's because of Rogers' practices being so obscure and their not sharing these practices that customers weren't aware that this was trying to protect them.
There are many different opportunities, and a lot of them emanate from the telcos themselves.
:
Yes, I was. I have communicated with them over the years, even just in doing my local programs and education. They have reached out to me.
As far as further support or being able to take basic information that we've had available and working more hand in hand goes, no, it's not really something that I've had experience of, whether that's because we're down in Windsor and just off in the corner, or because we have our local police to deal with it. That part I can't speak to.
There are times in doing the things that I do—working with our local police or doing education and working with our university—when I definitely do feel like I'm operating a grassroots program that shouldn't be grassroots after 10 years. More support, regardless of the direction, would definitely be a benefit.
I have looked at their own materials. I certainly have nothing to disparage about that. It is good and sufficient material. It's very elaborate, but whether or not it's getting to everybody is the question we're probably looking to answer here today.
When our group saw the recommendations from this report, we were actually quite appreciative, because I think they essentially reflected what we had asked for in terms of supporting a hearing. The response, I believe, from the ministry about the hearing was that they didn't feel it was appropriate to have a hearing because they didn't want to solicit views from the public on how to protect themselves—which I thought was somewhat silly, because where the telcos have gotten to now is based on a recommendation we made back in 2020. However, because they have dragged their heels or have not listened to us, more victims have accumulated in that time.
The second thing is that they don't understand that a hearing is not just to, let's say, solicit recommendations or things like that. Many of these victims do not feel heard. You may recall that you asked me back in 2020 how Rogers had responded to my fraud case. They offered me $100. Their customer service representative gave away my information, which took away all of my data. The scammer threatened to destroy my life, to destroy my career, unless I paid $25,000. That's what they asked from me, and Rogers wanted to give me $100 for that. That was the apology.
Other folks who have lost hundreds of thousands of dollars are taking them to court instead. They're not co-operating. It takes these criminal investigations to reveal the kind of decay that's within the practices of the telco. That's why we continue to believe there needs to be a hearing to give that transparency in terms of the numbers. What are the practices? What are the ways and different patterns in how victimization occurs?
The third thing is that we want to codify it. The FCC also believes there is no consistency and durability in these practices. They can choose to not do this or just to say that it was a slip-up. The fourth thing is that we need that enforcement there, which we believe the Australian example shows is critical to ensuring there is compliance and things like that.
Those are the three or four things we stick to, and I believe the committee was a part of this the last time.
Some of the frustrations I had when I was in the RCMP have actually carried over, and I'm not surprised. One of the things is a passion project I have to try to create awareness. I've never had any high sense that I myself would be able to have a big impact. It's a term that Kevin used several times, “grassroots”, but I kept pushing, pushing, pushing, and most recently came our experience with the Western Union matter. The Federal Trade Commission of the United States was the genesis behind that. They basically forced Western Union to hand over in excess of half a billion dollars through a deferred prosecution process, and those funds went to victims of fraud related to Western Union around the world, which is an amazing gift for victims of fraud.
However, the big problem was with getting that information to victims in Canada. The U.S. Federal Trade Commission kept repeating that message, but it did not resonate in Canada.
In March, I start repeating their message the best I could on my limited social media platform, and then, having no luck, I finally got frustrated and actually wrote the commissioner of the RCMP, both on June 1 and June 7, with a view that at that point the end date for the Western Union offer was at the end of June. It was going to die at the end of June. Unfortunately, my plea went nowhere.
I explained who I was, the experience I had with victims, my engagement with fraud and so on, but there was no response until close, I believe, to the end of June, at which point it was almost moot. At that point they basically posted it on the Canadian Anti-Fraud Centre website. The perverse thing at that time was that it was posted, I think, on June 26, and at that point it was believed that the offer was going to expire for intake at the end of June. It was pointless doing that, because any victim would need at least a week or more to get all their documentation together.
However, two days later the Federal Trade Commission announced that there was going to be an extension to the end of August. The only meaningful access I've had to advance this cause came when I engaged Mr. Masse, and then he pushed it forward. He has a much larger platform than I'll ever have, so I'm very appreciative of that.
What it speaks to, and I try to be as respectful as I can when I say this, is that at the highest level, the RCMP does not appreciate fraud or appreciate the impact fraud has on its victims. That is a current frustration I have now, and it was also a frustration I had when I was actually a member of the RCMP investigating fraud.
:
That's in the case of a stolen phone. There's a bit of balance here, right? The CRTC wants to allow you to easily port your number. There is actually a rule that they have to execute it within two and a half hours. My bigger recommendation, which doesn't have to apply to just a stolen phone, is that when you have text notification that your number has been requested to be ported, you have to proactively consent by texting back “yes”—that yes, you are trying to execute that port.
Take what happened to me, for example. If I'd gotten that text message at 11 o'clock on a Tuesday, would I have executed a port? Absolutely not. That would never have gone through, and I wouldn't be in front of you today, but that process did not exist at the time.
Afterwards, the telcos introduced a text and didn't require the proactive notification. This was the problem, because people thought it was fraudulent text, ignored it, and executed the port anyway. It wasn't until much later that they did.... According to the Rogers website right now, they say that they have introduced this practice that I introduced back in 2020 before this committee. They're saying that it applies now, but again, there are inconsistent practices and things like that.
This proactive notification should help prevent a significant number of these scams.
:
Thanks very much to the witnesses. Thank you, Chair.
I'd like to bring us back to the topic of data in the era of great interest in protecting public privacy.
I'll get us there in this way. About six months ago I visited the cyber centre of excellence in Vancouver. It's embedded in Mastercard. It's a centre that this government invested about $50 million in. They're devising techniques and algorithms that will help to identify fraud during transactions.
I learned things. For example, in cases of ported or cloned phones, Mastercard can tell, if I normally type holding my phone this way, that someone's pretending to be me because they're holding it another way. They know if I hold it this way, flat instead of up, and how hard I'm pushing on the keys, or whether I'm using two thumbs or one finger. Some of the techniques that are emerging to figure out if the right person is on the other end of that phone are incredible. That's the bank and credit card perspective.
Then there are the vendors. The vendors are also party to fraud. They're creating profiles on all of us—what time we shop, what we buy and all of those kinds of things.
There are really three parties. There are consumers, banks and vendors involved in many of these things, and everybody has data. There's all this data being generated.
Perhaps I'll begin with Mr. Mecher.
In your experience, are there adequate feedback mechanisms or data sharing between the RCMP, CRTC, banks and vendors? Are we doing a good job there? Is there required reporting? Is it required to have fraudulent transactions reported to the RCMP? Is it voluntary by the banks?
Can you say anything on the discussion of data sharing in the era of the protection of personal privacy?