Evidence of meeting #28 for Procedure and House Affairs in the 41st Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was security.

A recording is available from Parliament.

On the agenda

MPs speaking

Also speaking

12:15 p.m.

Conservative

The Chair Joe Preston

No, you do not.

12:15 p.m.

Conservative

Bob Zimmer Prince George—Peace River, BC

Thanks.

12:20 p.m.

Conservative

The Chair Joe Preston

Thank you.

Mr. Kerr.

12:20 p.m.

Conservative

Greg Kerr West Nova, NS

Thank you, Mr. Chair.

Thank you very much for being here. There's quite a learning curve this morning.

A lot has been covered, and your explanations are very good. Obviously we are left with questions as well as directions. Beyond what you've said, are there other things the committee should be doing as we wrap up our study?

When I hear about the things that can happen, I am wondering if it would be to our advantage to bring in some of those representatives of the private sector who develop these marvellous machines and technology so we could have a conversation with them about the kinds of things that do take place or could take place. They're outside the security issue, but they do develop the expertise that goes into it. Would that be something we should consider?

12:20 p.m.

Clerk of the House of Commons

Audrey O'Brien

If I may say, Mr. Chairman, to you and to Mr. Kerr, it's up to the committee to decide where it wants to take this investigation, in terms of a learning experience as much as anything else.

Certainly one of the things Louis was pointing out is that we make it our business to have contacts with the various authorities and with private industry so that we are constantly apprised of the developments in technology as well as the flip side of that, which is the developments of the evildoers. Even as a certain type of anti-virus solution is worked out, there are hackers who will try to circumvent that, and so forth. I don't know whether you would find those discussions helpful.

Certainly I can assure you that since we're plugged into various networks, we're privy to the best practices and latest information about things that are going on, which we can use to inform our own security posture and provide better security for members and the House of Commons.

12:20 p.m.

Conservative

Greg Kerr West Nova, NS

I appreciate that, but your answer didn't quite get to where I had hoped. Our job is to represent the public in the various parts of the country we come from. Obviously this is important to the public, as is what is going on beyond our security system and beyond our scope. That's why I was wondering if you'd suggest that it would be a good idea to hear from the security people, perhaps those who deal with the police and so on, as well as from the industry experts who develop it, or whether that would add to the scope of what we're looking at.

I know you've answered. I'm just wondering if that seemed like an appropriate thing for us to look at before we finished our study?

12:20 p.m.

Clerk of the House of Commons

Audrey O'Brien

As I said, I think that is up to you to decide. As far as I'm personally concerned, you have the two House of Commons experts here that you need.

As for what exists out there in terms of authorities, you might find it helpful to pursue things in camera about specific situations you have lived through and so on. I'm not quite sure where the committee is taking its study.

12:20 p.m.

Conservative

Greg Kerr West Nova, NS

Neither are we.

Thank you.

12:20 p.m.

Clerk of the House of Commons

Audrey O'Brien

Thanks, Mr. Kerr.

12:20 p.m.

Conservative

The Chair Joe Preston

Thank you, Mr. Kerr.

Mr. Comartin, go ahead, please.

12:20 p.m.

NDP

Joe Comartin Windsor—Tecumseh, ON

Thank you, Mr. Chair.

Mr. Bard, I'm looking right now at the e-mails that were sent to Mr. Toews from Anonymous. There's a web address on them. I'm asking about the specific case. If I came to you as a member of Parliament and asked you to trace this back to a source and then back through that to the actual source, would you be able to do that, and would you provide that as a service to members of Parliament?

12:20 p.m.

Chief Information Officer, House of Commons

Louis Bard

With regard to any request from members about e-mails they receive, if they were received on the mail system of the House of Commons, we maintain logs of e-mails and logs of Internet access. All of these logs are maintained for a certain length of time, and we are able to do some investigations.

For example, with regard to all of these videos on YouTube you referred to, there's no doubt that we've done due diligence to scan the computer environments, and I can affirm that none of those videos was posted from any computer from the House of Commons. That's very clear.

That's the extent of it. If it crosses the boundaries of the House and is outside, I don't have access to those tools.

12:25 p.m.

NDP

Joe Comartin Windsor—Tecumseh, ON

Do we have a protocol in the House with CSE to ask them to do that?

Let me just say that I know from the experience I've had with the Department of Public Safety, and the work we've done in particular with child pornography sites and tracing them back to source, that at least some of this technology is available. CSE is quite frankly one of the better agencies in the world in terms of being able to do this. So do we have a protocol with them such that if you're not able to trace it back, we can ask them to trace it back?

12:25 p.m.

Chief Information Officer, House of Commons

Louis Bard

I can perhaps answer the first part of this question.

CSE does not have really any authority on Parliament Hill. However, it will cooperate, upon request, to help me manage my environment. If it's beyond monitoring or beyond managing the precinct, if it crosses the line and may be something criminal, that's beyond my boundaries, and I refer to Kevin on those matters.

12:25 p.m.

NDP

Joe Comartin Windsor—Tecumseh, ON

Mr. Vickers, do we have a protocol with CSE in a situation where we at least suspect it's a criminal event and we want to try to trace it?