:
I call this meeting to order.
We're here at meeting 48. We welcome here today the Communications Security Establishment, CSE, for the first part of our study on cybersecurity and cyberwarfare, pursuant to Standing Order 108(2).
I'm not going to be able to give us the full hour because we're starting 10 minutes late, so we're going to do 55 minutes in this round and 55 minutes in the next round with our next set of witnesses.
Joining us for the first hour, we have Sami Khoury, who is the head of Canadian centre for cybersecurity; and Alia Tayyeb, who is the deputy chief of signals intelligence at CSE.
I will open up the floor. You have seven minutes between the two of you to bring forward your opening remarks.
:
Thank you, Mr. Chair and members of the committee, for the invitation to appear today.
My name is Sami Khoury. My pronouns are he and him. I am the head of the Communications Security Establishment's Canadian centre for cybersecurity, known as the cyber centre.
I am joined today by my colleague, Alia Tayyeb. She is the deputy chief of CSE's signals intelligence branch.
[Translation]
I'm glad to appear before the committee to discuss cybersecurity and cyber operations.
[English]
As this is the first meeting of your study, I'd like to begin by providing an update on the current cyber-threat landscape and what CSE is doing to protect Canada and Canadians. I will largely focus on the cybersecurity aspect of our mandate, whereas my colleague, Ms. Tayyeb, will focus on the foreign intelligence piece of CSE's mandate, our support to partners, and our active and defensive cyber-operation capabilities.
Now, more than ever, we understand that cybersecurity is the foundation of Canada's future: for our digital economy, our personal safety and privacy, and our national prosperity and competitiveness. In October, the cyber centre released its third national cyber-threat assessment. This report outlines the current cyber-threat environment.
[Translation]
One of the key points in the report is that cybercrime remains the largest cyber-threat to Canadians and that critical infrastructure is the main target of cybercriminals and state-sponsored threat actors.
[English]
Ransomware, specifically, was prominent in the past two years, and it remains a persistent threat to Canadian organizations. The state-sponsored cyber-programs of China, Russia, Iran and North Korea continue to pose the greatest strategic cyber-threat to Canada. In the face of these threats, and as Canada's technical and operational authority on cybersecurity, CSE defends Government of Canada networks and the cyber centre leads the government's response to cyber-incidents. However, cybersecurity is not solely a federal government responsibility or concern, as cyber-threats continue to target and impact Canadian individuals and organizations.
[Translation]
CSE works with partners in the industry, including those outside government, sharing information about threats and best practices in cybersecurity. The Canadian Centre for Cyber Security regularly publishes guidance and expert advice for Canadians.
[English]
Moving forward, to continue to adapt to the evolving threat environment, bolster defences and help better protect Canada and Canadians, we hope to see the continued progress of Bill , an act respecting cybersecurity, in Parliament. This legislation would establish a regulatory framework to strengthen cybersecurity for services and systems that are vital to national security and public safety and give the government a new tool to respond to emerging cyber-threats.
We also look forward to continued work to support public safety in the renewal of Canada's national cybersecurity strategy. The renewed NCSS will articulate Canada's long-term strategy to protect our national security and economy, deter cyber-threat actors and promote norms-based behaviour in cyberspace.
[Translation]
For CSE, the renewal of the strategy provides an opportunity to review the situation and build on what the Canadian Centre for Cyber Security has achieved over the past five years. The creation of the centre was actually one of the main initiatives set out in the National Cyber Security Strategy, developed in 2018.
[English]
Finally, as we work to build relationships with Canadian industry and other levels of government, we are also focused on collaboration with our international partners, in the Five Eyes and beyond.
I will now hand it over to my colleague, Ms. Tayyeb, to speak to her area of responsibility.
As my colleague noted, I am the deputy chief of CSE, signals intelligence branch, and I'm also responsible for the foreign cyber-operations aspect of the CSE mandate. My pronouns are she and her.
As mentioned, the severity of cybercrime and cyber-incidents targeting Canadians and Canadian critical infrastructure, both public and private, is growing exponentially. Beyond cybercriminals, however, state and state-sponsored cyber-actors also pose a continuing threat to Canada. Through CSE's foreign intelligence mandate, we continue to provide intelligence on foreign cyber-threats, including the activities and intentions of state and non-state actors, which is used by government clients, including the cyber centre, to defend Canada.
Recognizing the evolving threat landscape, the CSE Act came into force in August 2019, which allowed CSE to expand its tool suite to conduct active and defensive cyber-operations, together referred to as foreign cyber-operations.
[Translation]
Since being granted these new powers, CSE has leveraged its cyber operations capability to hinder the efforts of foreign-based extremists seeking to recruit Canadians, to carry out online campaigns and to disseminate violent extremist content.
[English]
We have also used these authorities to disrupt the activities of cybercriminals planning ransomware attacks.
Recognizing the importance of investing in cyber-resilience and bolstering Canada's capability, budget 2022 provided Canada's first stand-alone investment in its cyber-operations capability, earmarking $273.7 million over five years and $96.5 million ongoing annually for CSE to build its foreign cyber-operations capabilities and conduct a specific range of cyber-operations focused on countering cybercriminals and protecting Canadian critical infrastructure from cyber-attacks.
[Translation]
Further to CSE's role of providing assistance, CSE has also used its capabilities to support the Canadian Armed Forces in carrying out its mandate.
Our allies, international partners and adversaries all invest heavily in their capabilities, working to build broad-based cyber operations capacity. It goes without saying that CSE monitors cyberspace closely to ensure a responsive approach in protecting Canada and defending its interests.
[English]
As the cyber-threat landscape in Canada continues to evolve, CSE is dedicated to advancing cybersecurity and increasing the confidence of Canadians in the systems they rely on daily.
With that, I thank you for the opportunity to appear before you today, and I look forward to answering any questions you may have.
Thank you to our witnesses for being here.
I think the work that CSE does is really important, and most Canadians probably don't even realize the quality of our services here and the technology. I appreciate the opportunity to hear a little more and share with Canadians a little more about some of the work you do.
Some of the issues that are very topical, of course, in the media are private sector ransomware attacks. Where I'm from, outside of the GTA, SickKids hospital was in the news for sure, and we had a lot of reporting on that. Could you maybe speak to the process or what role CSE can play when there's a private sector non-governmental ransomware attack and how you try to work with clients, or the mandate or non-mandate you have in dealing with private sector attacks?
:
Thank you for the question. I'm happy to speak about that.
Regarding ransomware, when we issued our third national cyber-threat assessment, we continued to highlight the threat that ransomware poses to Canadians and Canadian organizations. It's a serious threat, as we can see in the health care sector, in critical infrastructure, in businesses and so on.
There are a number of ways that we work with the private sector to mitigate or to address the threat of ransomware. We constantly publish alerts and cyber-flashes to draw attention to what may be new vectors of ransomware or new techniques that cybercriminals are using in ransomware.
Every time we have an opportunity to speak to a business community, we speak about the threat of ransomware. Sometimes we get tips if our partners have seen precursors of ransomware being deployed in Canada, and we will tip the organization and tell them that they might want to look here because we have information to indicate that there might be a precursor to ransomware.
Unfortunately, sometimes we either hear through the media that there was ransomware, that a certain organization has fallen victim—
:
Thank you for the question.
We have a number of programs or regular engagements with various critical infrastructure sectors, including municipalities. We hold regular calls with them. I personally get invited to speak at their annual events or at their conferences to share with them the latest threats that we are aware of, that we are seeing or that are affecting them.
We do have an outreach program with our partnership team, which is constantly out there talking to municipalities, to critical infrastructure operators, to the health care sectors and so on, to try, as much as possible, to make them aware of the services of the cyber centre.
Thank you to the witnesses for being here today.
I wanted to pick up where Ms. Normandin was in terms of discussing those contracts. They are certainly on a lot of our minds as of late.
Mr. Khoury, in terms of that information, those recommendations that you make to a lot of those departments, government departments, critical infrastructure and those contractors who are handling specific information, delicate information, private information and sensitive data on behalf of government, how do you provide them with those best practices? How do you monitor how they follow that in each department?
You said that they have to do it themselves, but do you play a role at all in that provision and monitoring?
:
Quite literally, it's in your name. You're the centre. You're supposed to be bringing a lot of this information together. My concern is that, for some of these contractors, if you were to see patterns, it would be more helpful, I would assume, but in terms of those companies who may be repeat violators of those best practices in terms of cybersecurity for those departments, would you be able to see those patterns?
Also, we have seen in the United States, for example, that a company like Deloitte has actually been seen to release very sensitive information. In 2017, in that massive data breach, for the Department of Defense, Department of Homeland Security, the State Department and the National Institutes of Health, they leaked passwords, IP addresses and sensitive information.
When you see that happening internationally and then those same companies are being used here in Canada across the board within our own government, do you provide any of that feedback or any of those warnings? Do you recommend not using those companies that have had these problems? Do you monitor that? Do you track that? Do you provide those recommendations?
:
Maybe I could take that one from the beginning. It's a great question. It's something that we talk about a lot at CSE and the centre for cybersecurity.
We're lucky, in a way. Statistics-wise, we do have a great deal of interest in our organization. We have an interesting mission. A lot of people are interested in this topic. With our cyber centre taking a more public profile, we have certainly developed greater inroads into the public in terms of awareness and that has translated into a great deal of interest in working here.
We hire a variety of people from different technical fields; it's not all one type of profession. We have engineers, mathematicians, cybersecurity experts, etc. We also have a wide variety of jobs available.
Having said that, as Sami indicated earlier, it is a competitive space, so we do need to innovate and we do need to make sure that we're keeping up with our competitors in this space. That's why some of the initiatives we have taken on are in terms of making CSE an excellent place to work and all the initiatives it takes to become a top employer in Canada, such as providing an environment for people to be innovative and, also, fostering an inclusive environment, where you can continually bring in new people to the sector who might not have considered it before, particularly women or individuals from different ethnic origins—
:
Thanks for the question. I'll take a first stab at it and maybe turn to my colleague Alia for a follow-up.
Before the invasion of Ukraine started, we had been communicating to our partners the threat of Russian cyber-activities. Russia is a formidable cyber-actor, and we have been communicating as much as possible for people to take the threat seriously.
From a Ukrainian perspective, they've been the victim of Russian cyber-aggression since 2015 and 2016, when it affected the power grid. Over the years, Ukraine has been building resilience. With the help of the west tipping them off, they have fended off a number of cyber-attacks that Russia unleashed on Ukraine in the early days of the war.
We have learned a lot from these cyber-attacks that Russia has unleashed on Ukraine. We have quickly turned around and published or issued cyber-flashes, so that, in case there is any spillover effect in North America, or at least in Canada, we are prepared to share as much as possible with critical infrastructure and businesses about what some of these indicators are.
:
Thank you for this question.
We have called out those four nation-states in our third national cyber-threat assessment. They have a variety of motivations to go against Canada by targeting Canadian individuals, by compromising some technology through worldwide campaigns, by targeting Canada's economic value or by pursuing financial gains.
For example, we know that Iran is using cybercriminal tools to avoid attribution. This is one of their techniques. China is going after research, technical data, business intellectual property and military capabilities. North Korea is very much interested in enhancing its economic value by stealing credentials and then stealing funds.
They each have a motivation to conduct those activities or to at least go after a certain aspect of Canadian society to further their own interests.
Ms. Tayyeb, you mentioned in your opening statement the expanded powers that you have. A lot of folks were, of course, concerned about that expansion and the fact that your department can collect information on Canadians for research purposes, and then there's no requirement to release that information. It's there forever.
Of course, a lot of human rights and civil rights organizations were concerned about the use of that data and about it being used against folks when they're exercising their rights. There were also other concerns in terms of the oversight of that and the accountability of that, and how you're monitored continuously now that these laws have been in effect for several years.
Could you comment on that?
:
Thanks very much for that.
Allow me the opportunity to just clarify a point, if I misspoke earlier. To be clear, CSE is not permitted in any way, shape or form to target Canadians or any individuals in Canada. That's a basic prohibition. That extends to our foreign intelligence mandate and our cyber-operations mandate.
What I believe I was referring to was that, in that space, the interest would be on the foreign actor. If the foreign actor is targeting Canadians, we'd be interested in what that foreign actor is doing that would be harmful to Canada. That's a very specific prohibition.
In terms of review, absolutely we are reviewed. We have two review bodies, the NSIRA, the National Security and Intelligence Review Agency, and the NSICOP. We also have an intelligence commissioner who approves our ministerial authorizations to ensure that they're in keeping, on the foreign intelligence side, with our charter obligations, and to maintain and ensure the privacy of Canadians should any information on Canadians be collected incidentally.
We have both oversight and consistent review in all aspects of our mandate.
:
Thank you for the question.
The threat has not materialized in a direct way, but the threat has materialized through some spillover effects.
In the case that my colleague Alia brought up, Russia went after satellite communication against Viasat. As a result, for some western entities that were also users of that service, their communication got disrupted. Russia's intention was to disrupt Ukrainian communication, but the spillover effect was bigger than Ukraine. We've seen those kinds of threats materialize.
We've also seen those state-aligned hacktivist groups that have aligned themselves with Russia going after western governments, most notably through DDoS attacks in Germany and other places as a way of registering a message.
We work extremely closely with the Canadian Armed Forces in terms of intelligence provision. We share with them all intelligence that we collect, whether it relates to threats to their armed forces' deployments abroad or internal threats to Canada that would affect the Department of National Defence, as we have a very close working relationship there.
In terms of other forms of co-operation, I spoke about foreign cyber-operations and how we work very closely with them on that mandate.
I would add that, under our act, we also have an assistance mandate. It is explicit that we can provide assistance to the Canadian Armed Forces and in so doing, we'll be operating under their mandate. However, we can use our technical skills, abilities and capabilities to assist them in their operations if they were to make such a request.
Thank you.
:
Thank you for the question.
We work extensively with the private sector and the public sector. We have a number of engagement fora through which we are briefing them regularly. For example, with the health care sector, we have a forum with them every two weeks to brief them on the latest threats. There are often over 500 people on a call.
We have more intimate collaboration, for example, with the banks, the electricity sector or the natural gas providers. We tailor our engagements to communities that share similar infrastructure, similar technologies or similar capabilities, but we are talking to almost all 10 critical infrastructure centres in Canada.
:
Thank you very much, Chair.
Thank you very much to the committee for having me. I'm honoured to appear before you today to discuss the critical issue of cybersecurity and the capabilities of foreign actors.
To effectively address the issue, I believe the government should take a multipronged approach. Now, I understand the urgency of the issue, so rather than discuss the current state of cybersecurity—we already heard from the previous two witnesses about the various threats we face as a country—let me begin at the end and offer a few thoughts about what I think you can actually do about it.
I've had the benefit of reviewing the comments of my colleague, Wesley Wark, so I will focus on a different set of prescriptions, although I will say that I agree with what he's going to offer.
First, I think the government should incentivize companies to adopt the latest security measures, such as the “CyberSecure” standard established by ISED and CSE for small and medium organizations. The standard provides a high level of protection, but its adoption—this is the problem—has been limited.
Implementing a tax credit system as an incentive to help increase the overall level of cybersecurity in the country and reduce the risk of cyber-attacks on businesses would be a way forward. These attacks result in significant financial loss, damage to reputation and disruption of operations. If we were to advance this, we could attract investment and increase productivity and profitability. The standards are already there, but too few companies are doing them. There's that old saying that you cannot herd cats but you can pick where you put the food out, so incentivize those businesses through a tax credit.
Second, the government should establish a clear and concise legal framework for dealing with cyber-attacks that includes guidelines for attribution, response and liability, but the governance structure should be nimble and responsive to the fast-changing environment. The regulations should be expert-driven, focusing on sound policy and not good politics. The Governor in Council should be able to approve standards, codes of practice and certification programs to act as an integrated compliance mechanism.
Third, the government should establish an annual multistakeholder platform for collaboration and engagement on cybersecurity issues. This platform should include participants from all levels of government, private sector, indigenous communities, academia, not-for-profits, law enforcement and industry leaders. In my view, cybersecurity is a whole-of-society concern for Canada. Everyone, including think tanks, needs to do more to address this issue.
As a consequence, my organization, CIGI, plans to host the first Waterloo security dialogue in June to bring together various stakeholders and focus on discussions and simulations to better understand the impact of cyber-incidents, response and recovery measures, and the roles and responsibilities of different parties.
Let's talk about the threats. As previous speakers have mentioned, there are active persistent threats, or APTs, in coordinated and highly targeted cyber-attacks often carried out by state actors who aim to steal sensitive information or disrupt critical infrastructure over a long period of time.
You have ransomware, which we've talked about already as well. That's malicious software that encrypts the victim's files and demands payment for a decryption key. There's also now something called double extortion, where they threaten to release very sensitive information. Not only is your information locked up, but they threaten to release sensitive things to either embarrass you or push you to payment.
Then we have supply chain attacks. Supply chain attacks occur when an attacker actually compromises the software or hardware of the supplier to deliver malicious code to its customers. Probably the best known of these in recent memory is the 2020 SolarWinds incident, where that popular IT management software was used to compromise thousands of organizations.
We also have election interference and foreign actors using cyber means to hack into voter databases, spread disinformation and manipulate social media, all with the view to influence public opinion.
We also then have critical infrastructure attacks. This was already talked about in terms of the Ukrainian power grid. This is a great example of a critical infrastructure attack having a real-world effect where, in 2015, 225,000 people were without electricity.
The full capabilities of states will certainly vary, but here's my view: In light of current geopolitical trends, I believe the safest operating assumption for Canada is that we will be existing in a grey zone for the foreseeable future.
As for what I mean by “grey zone”, I'm actually going to adopt the definition from Canada's defence policy, which I thought was the best definition I'd seen.
Here, it says:
State and non-state actors are increasingly pursuing their agendas using hybrid methods in the “grey zone” that exists just below the threshold of armed conflict. Hybrid methods involve the coordinated application of diplomatic, informational, cyber, military and economic instruments to achieve strategic or operational objectives. They often rely on the deliberate spread of misinformation to sow confusion and discord in the international community, create ambiguity and maintain deniability.
In conclusion, my own view is that this is a whole-of-society concern for Canada. It's not just about government. It's actually about governance.
I believe it's our collective duty to better prepare the country for an existence in this grey zone.
Thank you, Mr. Chair.
Chair and members of the committee, I'm grateful for this invitation to appear and give testimony.
The terms of reference of your study touch on many facets of the cyber-threat, but I will focus on just one here in the five minutes I have for this opening statement, and that's the Russian invasion of Ukraine, which has provided important real-world insights into the ways in which cyber-weapons can and will be used in wartime in conjunction with more conventional military attacks.
This alignment was first exemplified in the Viasat hack of satellite-based Ukrainian communications on the opening morning of the Russian invasion. You've heard previous speakers from CSE mention that attack.
What do we know of events since February 24, 2022? Let me take you to two open-source studies. I've provided links to these studies to the clerk of the committee.
In June 2022, CSE's Canadian centre for cybersecurity produced a threat bulletin that catalogued significant Russian cyber-activity in conjunction with military attacks on Ukraine for the period from February 2022 through to May 2022.
Among the key judgments in that CSE bulletin were that the scope and severity of Russian cyber-operations were more sophisticated and widespread than had been reported in open sources and that, beyond the Ukraine theatre itself, Russian cyber-threat actors were engaged in widespread cyber-espionage campaigns against NATO countries and looking to develop further cyber-capabilities against such targets, including Canada.
In January 2023, the Ukrainian cybersecurity agency released a report—translated, fortunately, into English—using a methodology very similar to that employed by CSE, which documented the scale of Russian cyber-attacks and their alignment with conventional bombardments from February through to November 2022.
A key finding in the Ukrainian report concerns the ways in which Russian cyber-attacks have targeted energy infrastructure in Ukraine as part of a ramped-up Russian effort to destroy Ukrainian sources of civil power supply and undermine morale. According to the Ukrainian security service—SBU—report, Russia carried out on average more than 10 cyber-attacks on Ukrainian critical energy infrastructure per day in November of 2022.
Ukraine's cybersecurity leadership wants the world to recognize the reality of cyberwarfare as they have experienced it. They urge a common approach to cyber-aggression, the use of sanctions to undermine the cyber-capabilities of an aggressor, the need for enhanced sharing of information about cyber-threats and a clear designation of cyber-attacks on civilian critical infrastructure as a war crime, along with a determination to pursue accountability for such crimes.
How should Canada respond to this set of appeals? I would suggest the following.
First, ensure that CSE is able to provide the maximum possible aid to Ukraine in terms of signals intelligence and cybersecurity support.
Second, the Government of Canada should continue to provide financial support to ensure the resilience of Ukraine's cyber-systems.
Thirdly, along with our allies, we should be using targeted sanctions to undermine Russian state and proxy cyber-capabilities. I think we should also continue to document and publicly call out Russian cyber-aggression against Ukraine and NATO. I would urge us to take a lead role in supporting Ukraine's call to designate cyber-attacks on critical infrastructure as a war crime in international law and assist Ukraine to pursue accountability.
Finally, we should ensure that we maintain a robust capacity to monitor and learn from the use of Russian cyber-weapons against Ukraine. This should include research support for Canadian academic and NGO studies and engagement with expertise in the private sector.
We have learned three things from the Russian cyberwar against Ukraine. First, civilians are prime targets. Second, cyber-weapons are not precision munitions, and third, that cyber-aggression knows no rules or bounds.
Worse still is what might be waiting in the wings: the looming possibility of another—I'm going to refer to this operation in Russian—NotPetya malware attack, with global ramifications. NotPetya was a Russian GRU—that is the military intelligence agency—hacker operation launched in June 2017 against Ukraine. It morphed out of control, as many of these malware attacks will do, crippling global container shipping. It was described by one Homeland Security adviser to the President of the United States as “the equivalent of using nuclear bomb to achieve a small tactical victory”.
The cyber-nuke outcome is one we must strive to avoid, just as we strive to avoid escalation to nuclear war over Ukraine.
Mr. Chair, I'll conclude by saying that I hope this doesn't sound too much like Dr. Strangelove.
Thank you.
Through you, Chair, I didn't quite catch it. I think the question is about defensive capabilities or armed forces capabilities. I think there would be.... I'd certainly agree.
The conventional view would probably be.... We shall see what the government decides in its upcoming defence review update, but I think the view will be that the armed forces need a lot of new equipment to be able to engage effectively in any future conflict, including along with allies in support of our own sovereignty. There is a great deal we have to do in that area.
I think we all recognize that the Canadian Armed Forces lacks a range of things, from sufficient manpower through to key military capabilities. Many of these have been called to attention.
I must say, as a private citizen, the fact that we were only able to supply four Leopard 2 tanks to Ukraine struck me as a terrible symbol of the ways in which our military has been allowed to be degraded over the years.
Thank you.
:
Thank you for that question.
I'll go in a slightly different direction. I'm not sure that I entirely agree. I would make a distinction between, perhaps, our military capabilities and the way that they have declined, and our intelligence capabilities, particularly on the signals intelligence side and our contribution to the Five Eyes.
I think that Canada, through the CSE, is regarded as a key actor in the Five Eyes, and it is regarded with respect. I am told by Five Eyes counterparts that we are regarded as being one of the leading countries in terms of our ability to provide cybersecurity for federal data infrastructure and communications. We're regarded, in that regard, with respect.
I think the challenge for Canada is keeping up in the face of a wide range of threats.
We are regarded as a key player in the Five Eyes. There are always things that the Five Eyes would like us to do more of. There has been consistent pressure for decades, for example, for Canada to create a foreign intelligence service and a humint agency, which we've already resisted. On the signals intelligence and cybersecurity side, I think we're a strong player.
:
There is traditional cybersecurity, which is usually unauthorized access to systems and data. What you're talking about—and I really liked the question—goes a bit deeper, to societal resilience. We're talking about people and people's views of the world.
When we think about disinformation, misinformation or malinformation, the point is that people are persuadable. There are sophisticated influence campaigns that are taking place all the time to try to change our discourse, to sow societal division and to pull people in different directions, when we need to be uniting. The point here is that many of those capabilities are commercial and off-the-shelf. The highest profile example was the 2016 election in the United States, when the Russians got involved.
The point here is that the system didn't malfunction. It functioned as it was built. What we have is social intermediation with platforms sitting at the middle of our social discourse, and their incentive is profit. Their incentive is eyeballs. That's what we've built for ourselves.
It's a bigger conversation than just the cybersecurity stuff, but it's a great question.
:
I would say we have a long way to go in deciding what we want to do about critical infrastructure. Let's put it that way.
We're waiting for a critical infrastructure strategy, which has been under study by the federal government. You will have seen a reference to Bill , which refers to critical infrastructure. We have a list of critical infrastructure that dates back to 2009. In other words, it hasn't been updated since that time, which is the last time we had a critical infrastructure strategy.
The starting point is going to have to be to decide what we mean by “critical infrastructure”. Once we've done that—that will be an important but not an easy step—then we can think about regulating the terms under which critical infrastructure functions and what we expect of them in terms of, particularly, cybersecurity strategies.
There's some of that under way, obviously informally. Some aspects of critical infrastructure have done a terrific job in terms of ensuring they have very high levels of cybersecurity. The major banks are probably a key example of that. Across the board, the system is very diverse.
:
Thank you for the question.
First of all, we're coming up with a more sophisticated understanding of what's going on in the information space. It's important to understand that we make distinctions among three different categories of information out there that may be troubling to us.
One is misinformation, which is defined by CSE, among others, as information that is false but not deliberately disseminated as being false. In other words, someone believes it even though it's untrue. There's, of course, a great deal of that and a lot of it circulating on social media channels. We saw its impact, for example, in the “freedom convoy” events in Ottawa and across the country last year.
Another form is disinformation, which is defined as information, often deliberately put out by foreign state adversaries, that is deliberately deceptive and untrue and designed, for various reasons, to undermine the state of a society. There are certain actors out there, including Russia and China, that are particularly good at disinformation. Russia has taken a lead, and we've seen a lot of that in the Ukraine war.
Then there's a third category, which I think really deserves a lot of attention, that CSE and its American counterpart have defined as malinformation. This is the grey area between disinformation and misinformation—the manipulation of information that's partly true and partly false to achieve certain objectives.
We're coming up with a more sophisticated understanding of how these different aspects of false information circulate and have an impact, but we're only at the beginning of a study of this. Frankly it's very difficult to know what to do about it other than trying to block foreign state actor activity.
:
I think it's an interesting question.
I think the key alliance network in which Canada participates and where we're able to do significant work is the Five Eyes partnership. Many of the Five Eyes members, or at least some of them, are also members of NATO—Canada, the U.S., the U.K.—so it spills over into NATO. The Five Eyes is the key partnership for enhancing cybersecurity. A lot of work is going on there, I think, behind the scenes.
Very quickly, I would like to draw the committee's attention to one of the problems we have in Canada. CSE has a certain mandate. You see it in their cyber-threat assessment, which CSE officials have mentioned. They want to talk about strategic threats to Canada—that is, foreign state active threats—because that's in their mandate. There's a whole other world of threats to Canada and Canadians, including through cybercrime, which is not CSE's issue. It is the issue of the RCMP.
This is just a plea to the committee that, if you have the time in this study or in the future, we really need to have a look at how the RCMP is able to deal with this vast world of cybercrime and its impacts.
:
It's a very interesting question. It's hard to answer precisely for anybody who has an outsider status—like me—and who has not taken part in Five Eyes' meetings or communications.
My understanding is that Canada has been a member of the Five Eyes and was key to the expansion of the Five Eyes system. Our membership goes back to 1949, so we've been a part of this grouping for a very long time.
Our principal investment in the Five Eyes has always been in the signals intelligence and cybersecurity fields. We've expanded beyond those over the years as the Five Eyes expanded. I think there is a greater contribution that Canada could make to the Five Eyes in a variety of fields. That raises the perennial issue, for example, of a foreign intelligence service and what additional information it might provide to Canada.
There's also a role that other Five Eyes' partners look to Canada to play that we're able to play on occasion, but probably not to the strength that we should, which is in the assessment of global security threats. The threat assessment piece is an important piece with the Five Eyes, and Five Eyes partners like to get multiple perspectives on complex, developing global threat issues. We have some capabilities in that regard, but I think we could invest a lot more in the analytical side of the intelligence business, which often gets a lot less attention than the collecting side—the signals intelligence or the agent on the ground side.
:
Thank you for the question.
We should probably be worried most about adversaries who are deliberating conducting disinformation campaigns and interfering in democratic practices. A lot of our attention has been paid, since 2016, on the possibility of election interference, because that's so fundamental to democratic practice. There's a lot of attention, as well, to the ways in which foreign state adversaries can use cyber-tools to try to impact diaspora communities in Canada and among our allies.
I think there are three effective things that we can do in that regard.
One—probably the most important thing—is to monitor and call them out publicly. Call them out as a form of deterrence for foreign state actors trying to use those tools, but also call them out to make sure that the Canadian public understands what's going on. We do that on occasion. We're doing it more often than we've done in the past. There are always sensitivities about calling out things because they can have diplomatic repercussions, so it can be complicated, but I think calling out is an important thing.
Public education is a critical part of the piece, but I will also say that trust in Canadians and trust in the ability of Canadians to make some common-sense decisions, ultimately, about what is clearly false and what is information that's being circulated on behalf of a foreign state is an important but, perhaps, underemphasized part of the equation. This may be the optimist in me, but I continue to have some faith in public sense.
I always like the example of what the French government did in response to its concerns about election interference in the national election in 2016. They created a special office in the president's office that was designed to introduce satirical commentary about clumsy Russian disinformation campaigns and to make fun of them. I think that's a great tactic.
:
Thank you for the question.
The fact that CIGI, which is at the heart of Canada's cyber-universe in terms of research, occasionally seems to have some difficulty connecting is actually a running joke between Aaron and me, but anyway....
Voices: Oh, oh!
Dr. Wesley Wark: I would say that I think one of the things that Aaron and I have discussed and focused some attention on—I offer this as a partial answer—is that the universe of social media communications is increasingly being affected by automated bots. These are simply machines out there that amplify, according to certain algorithms, certain kinds of messages, and they can be used for disinformation purposes by foreign state actors. We saw this with Russia in the 2016 election campaign against the United States. They can be used by social media companies to boost ratings.
I think the conclusion we've come to—without having the tools and necessarily suggesting how you do this—is that we have to tackle the automated bots issue in some form or another, to reduce their impact and the scale of the use that is made of them.
:
Thank you for the question.
I would say this is something that successive privacy commissioners have been particularly keen on pursuing—and not just federal ones but provincial ones, including the previous Ontario privacy commissioner—to try to build a better model for consent that doesn't require us, as Mr. Shull suggested, to read through hundreds of pages of abstruse technical language, which none of us do.
We clearly need a better model for consent, and we clearly need better restrictions on efforts to use consent on the part of social media companies. I think there is a real role for the Government of Canada to play in that regard in terms of setting guidelines, as challenging as that might be, because the giant social media platforms will not like it, but it's something that I think we have to tackle.
:
I'm sorry that Aaron can't take that question. I'll try to answer for both of us to the best of my ability.
I think the suggestion that Mr. Shull made about tax incentives is certainly one way forward. Regulation, at least of what we might determine to be critical data infrastructure and communications, is another. Bill may have an interesting impact in that regard, depending on what Parliament does with it. It's certainly worthy of study.
I think the conclusion that we've come to, which CSE has also spoken to, is that, while there are pretty high levels of cybersecurity capabilities, awareness and implementation on the part of the major private sector actors in Canada, including the financial sector and other aspects of critical infrastructure, the real problem is with small and medium-sized enterprises. They have neither the resources nor, perhaps, even the understanding of the degree to which they are vulnerable to cyber-attacks
I think the small and medium enterprises are the area of focus, as well as figuring out ways to help them up their game in cybersecurity in ways that are affordable and understandable to them. That is the challenge.
:
Mr. Chair, I'd answer that question by saying it would be interesting to hear from CFINTCOM, in particular, on that, because that's the organization within DND that is most affected by developments.
What we've seen recently—it was highlighted in the defence “Strong, Secure, Engaged” strategy in 2017, and perhaps will be reinforced in the update, whenever that appears—is that the Canadian Armed Forces decided it needed a much enhanced capacity to engage in cybersecurity and have cyber-capabilities for its own offensive and defensive operations. It has been attempting to build up an independent, stand-alone capability in that regard under its own mandate. CSE has been able to assist it.
It's not so much that there are gaps between CSE and CFINTCOM, as I would understand it. It's more the question of how well the Canadian Armed Forces and, particularly, CFINTCOM have been able to build that cadre of cyberwarriors that they need.
:
Thank you very much, Mr. Chair.
Thank you to our witnesses for being here today.
We've heard a fair bit today about critical infrastructure. Ms. O'Connell asked about it in the last panel, and I think Ms. Kramp-Neuman talked about it as well. I'm wondering particularly how certain sectors could be a target for state-sponsored cyber-attacks as a means to attack Canada without the use of conventional military means.
I am interested in thoughts from both of you, but perhaps one we'll get in writing and one we'll get from Mr. Wark. I am interested in the sectors that you see as being under the greatest threat. I think about the Rogers outage and I think about how that impacted people all across Canada. I think about natural disasters like Fiona. It outlined our reliance on power, telecoms, gas and ATMs. The fact is that the Internet was once a luxury, and now it seems to be a necessity. You can't do a thing when something like this happens.
I am interested in your thoughts, Dr. Wark, on which sectors you see as being under the greatest threat.
:
Thank you for the question.
I'm going to surprise you, perhaps, by saying that there is one sector that we have not typically considered being part of critical infrastructure but that we need to consider in the future, and that's space. Increasingly, we're going to rely on space-based platforms for critical infrastructure, communications, monitoring of climate change impacts and a whole range of things.
My hope is certainly that in the forthcoming critical infrastructure strategy the government is working on, they will include space as a new sector. I would say that is probably the most vulnerable area, because it is so new and because it is changing and developing so rapidly. There's a Canadian role to play there. Space is a big one.
The other thing I would say is that signals intelligence agencies, CSE and Five Eyes and other ones, have said that what we're facing are probing attacks at the moment by foreign state adversaries who are trying to figure out how our critical infrastructure systems work and where the vulnerabilities are. Will we actually see attacks on those systems, short of war? That's very hard to know. Probably, the answer is that it's not likely because it has such an escalatory impact, but there are certain aspects of it, in particular in terms of democratic practices and election infrastructure, for example, that can be vulnerable.
I would say that space and those critical infrastructure systems that feed our democratic needs around elections in particular are two key issues.
:
That's a fascinating question.
I think the thing that the Ukraine war reminds us of is that at the moment a lot of it looks like the First World War. There's always that element of brute force, of machine on machine, man on man and woman on woman in combat these days, which we mustn't forget.
I think the expectation going into the outset of the Ukraine war was that the Russians would be more sophisticated actors in terms of both conventional military capabilities and cyber-capabilities. They haven't proven to be either—fortunately. That's not to say that they're not trying to learn and do better, and obviously the outcome of their war in Ukraine is very much up for grabs at this stage.
We have an inclination to over-invest in fears of the future of warfare and technological change and so on, but it's important to look at that.
:
Thank you, Mr. Chair. By the way, your French was excellent earlier.
Given my fellow member's wonderful idea, I'd like Mr. Shull to get back to the committee in writing with the answers to three questions.
First, can a cyber-attack be considered a war crime?
Second, what type of response might we expect if a NATO country were the target of a major cyber-attack? Would it be considered an attack against NATO? Would NATO be at war?
This third one is pretty broad. Mr. Wark, earlier you mentioned certain recommendations you would like to see in the report.
Mr. Shull, are there recommendations you would like the committee to include in its report?
Mr. Wark, this one is for you. It ties in with my last question about disinformation, which I consider to be extremely dangerous. It's all over the place right now. I used to be a school principal, so young people and education come to mind. Schools need to work on prevention to help young people distinguish between real information and fake information.
Prevention aside, how much of the responsibility falls on the media and how much rests with us, as elected officials?
I would say that the media plays a huge role. Of course, the media as an institution has changed before our very eyes in the last couple of decades. There's the mainstream media, and there's everything else that's out there. I would say that the mainstream media has a strongly embedded code of practice and ethics to try to ensure that they are reporting, as they see it, truthfully and holding themselves to account. That is not, of course, the case for actors in social media, who have no such code of conduct.
At the end of the day, I think it really depends on the ability of ordinary Canadian citizens to decide where they want to get their sources of information from and, hopefully, it's not purely in an echo chamber kind of fashion, where they just get their sources of information from places that confirm pre-existing beliefs. My hope is that many Canadians ultimately will be able to do that.