Evidence of meeting #31 for Procedure and House Affairs in the 41st Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was security.

A recording is available from Parliament.

On the agenda

MPs speaking

Also speaking

  • Toni Moffa  Deputy Chief, IT Security, Communications Security Establishment Canada
  • Robert Gordon  Special Advisor, Cyber Security, Canadian Cyber Incident Response Centre, Department of Public Safety and Emergency Preparedness
  • Commissioner James Malizia  Assistant Commissioner Protective Policing, Protective Policing Branch, Royal Canadian Mounted Police
  • Tony Pickett  Officer In Charge, Technological Crime Branch, Royal Canadian Mounted Police

11:30 a.m.

Deputy Chief, IT Security, Communications Security Establishment Canada

Toni Moffa

There are venues for cooperation more broadly.

11:30 a.m.

Conservative

Bob Zimmer Prince George—Peace River, BC

Thank you.

11:30 a.m.

Conservative

The Chair Joe Preston

Thank you, Mr. Zimmer.

Madame Latendresse, you're up for four minutes, please.

April 3rd, 2012 / 11:30 a.m.

NDP

Alexandrine Latendresse Louis-Saint-Laurent, QC

Thank you.

Thank you very much, Ms. Moffa, for your remarks.

Anonymous was just mentioned once again. Anonymous is not a closed group. Almost certainly, whoever posted the video on YouTube and threatened the minister probably has absolutely no connection to any hackers in the United States, Australia or anywhere else. People know that anyone can do these things using the name Anonymous, so I think it would be extremely difficult to say with any certainty that Anonymous is doing this, or that Anonymous has any such intentions. Anyone can use this label on their activities. I sometimes find it hard to determine where we are in all of this, because for now, as we heard earlier, we are talking about someone somewhere who posted a video online on YouTube.

Yes, some people who say they are from Anonymous did hack into the American federal systems, for example, but that is not what we are talking about right now.

When security breaches occur and hackers get into the American federal system, are you in contact with them to know what happened and how you can update your tools to prevent these kinds of threats? Do you have any contact with them in that regard?

11:30 a.m.

Deputy Chief, IT Security, Communications Security Establishment Canada

Toni Moffa

Who do you mean, exactly?

11:30 a.m.

NDP

Alexandrine Latendresse Louis-Saint-Laurent, QC

I mean the American equivalent of your agency, for example.

11:30 a.m.

Deputy Chief, IT Security, Communications Security Establishment Canada

Toni Moffa

Yes, yes.

11:30 a.m.

NDP

Alexandrine Latendresse Louis-Saint-Laurent, QC

When security breaches occur in the U.S., you can discuss how to improve the system with them.

11:30 a.m.

Deputy Chief, IT Security, Communications Security Establishment Canada

Toni Moffa

We share our experiences, so we can help one another in order to prevent or deal with problems when they do occur in our systems.

11:35 a.m.

NDP

Alexandrine Latendresse Louis-Saint-Laurent, QC

Some problems occurred recently, a few months ago, I think, or not too long ago. Do you know if this has been done since? Has there been any dialogue in order to make the systems more effective and more secure?

11:35 a.m.

Deputy Chief, IT Security, Communications Security Establishment Canada

Toni Moffa

I cannot comment on that, and I certainly cannot comment on other people's experiences. That is considered classified information.

11:35 a.m.

NDP

Alexandrine Latendresse Louis-Saint-Laurent, QC

Coming back to Anonymous, if I understand correctly what you are saying, nothing has been done so far by anyone who reports to you.

11:35 a.m.

Deputy Chief, IT Security, Communications Security Establishment Canada

Toni Moffa

That is correct.

11:35 a.m.

NDP

Alexandrine Latendresse Louis-Saint-Laurent, QC

So you are here primarily to tell us about what you could do if something were to happen in the future, for example, if a hacker tried to—

11:35 a.m.

Deputy Chief, IT Security, Communications Security Establishment Canada

Toni Moffa

We are learning about the methods they use in an effort to prevent their actions in the future.