:
Good morning, colleagues. It's good to see everybody.
[Translation]
I trust you had a pleasant Monday.
[English]
We are gathered for meeting number 120 of the Standing Committee on Procedure and House Affairs.
We are continuing, colleagues, as you know, our study on the question of privilege related to cyber-attacks targeting members of Parliament.
We will follow the same format today as we did last week, which is that the first hour will be in public and the second hour will be in camera. We'll have to take a couple of minutes to turn over once we hit the end of that hour.
Joining us today as our witnesses from the Canadian Security Intelligence Service are David Vigneault, director; Peter Madou, assistant director, requirements; and Bo Basler, director general and coordinator, foreign interference.
Mr. Vigneault, you and your colleagues will have up to 10 minutes for opening statements, and following that we will go into our line of questioning.
Welcome to our committee.
Thank you for being here, Mr. Vigneault. The floor is yours.
The issues of cybersecurity, their nexus to national security, and attempts by adversaries to interfere in Canada, are becoming ever more complex. These issues require the full attention of the Government of Canada and all Canadians.
Increasingly, threats to the security of Canada take the form of cyber-threats. Malicious cyber-activity targeting Canada is growing in scale, complexity and sophistication, with cyber-threat actors seeking to advance their economic, political, security and ideological interests to the detriment of Canada and its allies. In short, the digital ecosystem has transformed the nature and conduct of warfare, espionage, diplomacy and trade.
[English]
Cyber-threat actors include those affiliated with foreign states, including military and intelligence services, as well as non-state actors.
CSIS actively investigates a variety of cyber-actors, including those from or associated with China, Russia, Iran and India. Regardless of who is directing their activities, cyber-threat actors employ a range of technologies and techniques to exploit weaknesses in information systems, target individuals to gain unauthorized access to systems and networks, or leverage infrastructure in Canada to achieve their broader strategic and geopolitical goals to the detriment of Canada.
CSIS is mandated to collect intelligence on threats to the security of Canada, to advise the government on those threats and, when appropriate, take measures to reduce them. This includes threats that emanate from the cyber-domain.
More specifically, when CSIS identifies national cybersecurity threats, it uses a variety of investigative techniques, including human sources, warranted collection and other methods to determine the scope, motivation, target and source of the threat.
[Translation]
The Canadian Security Intelligence Service, CSIS, engages broadly with industry, academia, governments, and indigenous groups to help strengthen Canadians' alertness and resilience to a growing cyber-threat environment. For example, since 2021 alone, over 70 briefings have been provided to parliamentarians on foreign interference and espionage, in which security awareness, including cyber-hygiene, was a key discussion point.
Additionally, CSIS routinely provides intelligence assessments to our government partners, allowing them to make informed policy and operational decisions. CSIS also shares these assessments and investigative leads with our trusted foreign partners in order to assist them in ensuring the integrity of the global information infrastructure upon which Canadian security relies.
[English]
However, I would like you to know that CSIS is part of a community of agencies and departments seeking to protect Canada from cyber-threats. While CSIS plays a vital role in the team, it works closely with other key players such as the cybersecurity experts at the Communications Security Establishment, the cyber centre, Public Safety Canada and the RCMP, just to name a few. Together we work to safeguard Canada and its assets, information and national security from an array of cyber-threats.
Regarding the committee's specific study, our colleagues and cybersecurity experts at the CSE and CCCS, with CSIS, produced a chronology of events detailing the interactions between our organizations and the House of Commons.
I will note that CSIS learned of any issues with the House of Commons IT system from CSE in January 2021. Following this, our agency directly briefed the House of Commons IT staff with CSE. From there, we worked with CSE and the House of Commons from January through April 2021 to investigate this activity.
This work outlined that IPAC members were targeted, but importantly, it found no instance of compromise on the system, nor any follow-on activity.
CSIS broadly disseminated intelligence products to clients across the Government of Canada detailing APT31's email tracking attempts on IPAC members in Canada. CSIS's work with the House of Commons predates the FBI reporting that was shared with both CSIS and CSE on any information that was released to the public by the U.S. in 2024.
When this incident was uncovered in early 2021, CSIS followed the protocols that were in place at the time. CSIS worked directly with CSE and the House of Commons to better understand the incident and its impact. Our investigation, alongside CSE's work, helped to inform the House of Commons on the specific technical measures that could be taken to mitigate the incident.
[Translation]
In 2023, the issued a ministerial directive to CSIS, which outlined and clarified CSIS’s role and responsibilities in relation to the investigation, notification and reduction of threats to parliamentarians. The directive outlines that, wherever possible within the law, CSIS must ensure that parliamentarians are informed of threats to the security of Canada directed at them.
This is uncharted territory for CSIS, and is providing an opportunity for reflection, learning and improvement. What is different today under this directive is that it compels us to have the conversation with our partners on how best to ensure that parliamentarians are informed on the potential threats they face. It may not be CSIS, for example, when we are not the lead department responsible for the issue at hand, but because the ministerial directive was issued to CSIS, we will lead the discussion on the process.
[English]
Mr. Chair, I think I will skip the recap of the chronology because of time. I will speak quickly to some legislative authorities.
Members of the committee, I think you all understand that the CSIS mandate is guided by legislation that is nearly 40 years old. In the face of rapid technological change and an increasingly complex cyber-ecosystem, gaps in CSIS authorities that limit its ability to detect, investigate and respond to foreign interference, including by sharing information, have become more pronounced.
Bill , which currently sits before the House, proposes a set of focused amendments that will improve CSIS's operational response to foreign interference.
Among these amendments is a proposal to enable information sharing outside the federal government to build resiliency to national security threats, including foreign interference. This will help to build resilience before the threats materialize and will directly enable parliamentarians to make decisions that are more informed.
More broadly, Bill will ensure CSIS investigations are nimble and responsive, resulting in better collection of intelligence and advice, including for parliamentarians.
The last thing I would say, Mr. Chair, is that in reflecting on this situation in preparation for this appearance, I think my analysis with my colleagues is that everybody did the work they were supposed to do. However, the outcome for parliamentarians is not, I think everybody will agree now, in hindsight, what was desired.
I welcome the work of this committee. I welcome the work that CSIS can do to make sure that in the future we learn from this, and that the outcome for parliamentarians and for Canadians is a different one.
[Translation]
Thank you.
:
Mr. Chair, as I mentioned in my opening remarks, the House is indeed currently studying a bill to modernize certain aspects of the Canadian Security Intelligence Service Act, Bill .
It's interesting to look at things with a bit of hindsight. The act came into force in 1984, in the middle of the Cold War, following a commission of inquiry whose role was to review certain activities of the organization that had been responsible for national security at the time. To me, it looked like a rather defensive bill. Its purpose was to prevent certain lapses from recurring.
In my humble opinion, the circumstances that existed in 1984 no longer apply in 2024. The world has changed. Canada's image has changed and the threats we are facing have changed, not only in terms of complexity and the number of stakeholders responsible, but also the impact they have on the everyday lives of Canadians and Quebeckers.
The sharing of information amendments proposed in Bill , which is currently being studied by Parliament, are absolutely essential. Their purpose is to simplify part of our data system, and the way we obtain orders from the Federal Court, while maintaining judicial authorizations. I'm sure that these changes will have a very direct impact on Canadians.
As Minister LeBlanc said, it was a first step, and other efforts would be required in future to modernize the Canadian Security Intelligence Service Act. Once again, when the time comes to protect Canadians against threats, it's important to know that the methods used by those who contrive them can change very quickly. We therefore have to make sure that we're not lagging behind these changes.
:
Mr. Chair, I would say that in this case our assessment was that it was investigative journalism as opposed to a leak in this specific story.
I will obviously not be speaking to the specifics of our investigative techniques or investigative interests, but I think what is very clear is that we have said publicly in our annual reports, in speeches, in appearances in front of this committee and other committees of the House and the Senate that CSIS has been concerned with foreign interference for very many years. It's part of our act. We have been investigating this, but what we have seen over the last number of years is an increased aggressiveness by a number of countries.
The speed and complexity at which the threat of foreign interference is coming at Canadians, yes, at the democratic processes, elections, but also at Canadians from different diaspora groups who are being interfered with in their democratic rights by foreign nations, this is something that is of grave concern to CSIS. This is why we have been speaking about this both publicly and privately to government. I think Canadians, through the work of this committee and other committees and the NSICOP and NSIRA and the commission of inquiry, are now getting a better sense of what is required.
Maybe the last thing I would say is that one of the best tools to address foreign interference is what we're doing right now. We're talking about it in public. Of course, I will not be able to share classified information, but by having more public discussion about these issues in different places with different people, we will increase resilience against these actors. It's not going to be CSIS or the RCMP or someone else catching people doing it all the time. We hope that we're good at what we do, but it's going to be Canadians in their day-to-day activities who will raise the flag and say, “There's something happening here. Maybe I should be talking about it.”
:
That's what I was getting at. It's interesting. You made that comment at another committee, and this came up in a CTV exchange on June 9, just a couple of days ago.
The interviewer said—they were talking about the —“just because your leader is briefed on this intelligence does not mean that he can't act,” which is what you've just said here. The interviewer went on to say, “In fact, it means he could act on that information. You had thought last week when we did an interview then”—the interview was with —“that would not be the case.”
then went on to say, “I think they're not correct”—referring to you—“in saying that. Here's why: What the is asking to do is to essentially tie his hands behind his back. Here's why. The Prime Minister is asking Mr. Poilievre to go through the Treasury Board Secretariat's policy on government security. That's the same process that other individuals, for example, on NSICOP, have gone through. That process would require Mr. Poilievre to sign an undertaking and to swear an oath of secrecy not to divulge this information to anyone else and, therefore, not be able to tell anybody else to act on this information to hold individuals accountable.”
The host of the show then said, “Respectfully though, am I supposed to believe you over the director of CSIS?”
Michael Chong replied, “Yes, you are.”
I'm not going to ask you to comment on that, because I know you're not going to want to weigh in on this, but you have made it very clear today that if you do receive information, even if it is classified information, you can use that information to make decisions, even if you're not allowed to reveal that information.