Thank you, Mr. Chairman.
Good morning, ladies and gentlemen.
First of all, let me congratulate you all for making the decision to address the important problem of identity theft in Canada. Let me also thank you for inviting me here today. This provides me with the opportunity to bring this problem into perspective as it relates to other problems concerning Canadians.
Let me congratulate you also on your uncanny serendipity and your impeccable sense of timing, especially considering the events related to the Heartbleed vulnerability of the last few weeks. When I got the invitation to testify before this committee a few days after the events, I thought that these parliamentarians were really quick to react or they knew something about the bug that I didn't know.
As you know, the Heartbleed bug affected the web servers of the Canada Revenue Agency, and despite the diligent efforts of the IT professionals of government, which should be commended, this led to the unauthorized disclosure of at least 900 social insurance numbers of Canadian taxpayers.
This underlines the real risk about the way we are using IT infrastructure and what it represents in terms of risks for identity theft. Such events, and the media interest that they generate, are great opportunities for experts like me to bring the message. However, sometimes the media attention and the way the story develops can backfire, and it brings attention to the wrong things.
Heartbleed is not about the computer whiz kid who was arrested by the RCMP in London two weeks ago and is being accused of hacking the CRA servers. It's about a bug that affected two-thirds of the web servers on the planet. By the time this kid got to the CRA servers, thousands of other hackers had hacked tens of thousands, if not hundreds of thousands, of servers worldwide. Heartbleed is really about the pitiful state of our information infrastructure and how we have let it become that way.
What has that got to do with identity theft, you will ask? The social insurance numbers that were leaked could lead, with enough other personal information, to helping cybercriminals conduct identity theft, in activities like fraudulent banking transactions, a destruction of credit history, and unauthorized access to computer email accounts and social network accounts.
Other witnesses to this committee will certainly testify to various nefarious effects of identity theft to Canadians and to Canadian businesses. What I'm here to tell you today is that, maybe to your surprise, identity theft is not the problem. Identity theft is one problem among many, and is probably one of the least important ones at that. It's only the visible tip of the iceberg. It's a problem that your electors are probably calling your riding offices about because that's what they feel in their skin. However, it's not really the one that is looming highest regarding their welfare.
What is the problem, then, or rather what are those bigger problems that we should be worrying about as well? That's easy: cybercrime, cyber-espionage, cybersabotage, and their impending doom.
My colleagues Benoît Dupont and Susan Sproule will certainly talk to you about figures and the size of the problem of cybercrime, and identity theft in particular. But to give you a few examples at my level as an engineer, credible experts have estimated the cost of cybercrime worldwide at hundreds of billions of dollars a year. In Canada, Symantec estimated the cost of cybercrime in Canada, in 2013, at $3 billion alone. That's 60% of the budget of the City of Montreal, where I live, and it certainly could use that money.
Cybercriminals use infected computers in corporations, government offices, and in homes of unsuspecting consumers, to turn a profit by a variety of means. This can include Internet banking fraud, which is the most common, but also Internet publicity fraud, extortion, and also traditional forms of fraud and con artistry.
Cybercrime is alive and well. It's a growth industry, with international ramifications. It involves a complex network of criminal groups that work together. To give you an idea of the size of the problem from a technical point of view, some surveys published in the European Union are reporting that 30% to 35% of users are reporting that their machines were infected in the last year. We thought that this was un petit peu d'exagération européenne. We thought that these Europeans had a sense of exaggeration and colourful language.
To our surprise, when we did research at Polytechnique in 2012 where we conducted a clinical trial with 50 subjects and we monitored their computer activity for four months, we discovered that 5% of them got infected by dangerous malware and 20% of them got infected by some kind of harmful software, and that's despite the fact that they had an anti-virus installed.
Further analysis showed that if none of them had any anti-virus installed, 38% of them would have been infected. That's two out of five Canadians whose computers are potentially infected.
So maybe the Europeans were not exaggerating so much after all. But beyond its sheer economic impact, the problem with cybercrime is that it generates phenomenal profits. These cybercriminals have been investing that money in R and D, in research and development. They've been developing hacking tools and techniques that baffle us, the computer security experts in the computer security industry. They have more money than us. They have certainly more research budgets than I do at Polytechnique and it's probable that they have overall been investing more R and D in developing the tools than all of the computer security industry. So we're losing the war. We are in an arms race and from a technical point of view we're losing and we know that. We don't say it very often very publicly, but it is true.
Why should we care about cybercrime so much? Relatively few Canadians are affected. It's in the few per cent in terms of financial loss and most of the time the banks do pay. The problem is that the banks are starting not to pay. That's good for me because I get to go to court and testify and tell the judges that sometimes, yes, the banks should pay and that's good for me, but it's not good for Canadians because the tendency is about to revert. I've had more and more of those cases happening.
Also, cybercrime is not cancer. It's not unemployment. It's not global warming. It's not car accidents, so why should we care about it? Nobody dies of it.
The problem is that this technological advantage that the cybercriminals have been developing has been used for other things now. The first and most historically significant example politically was that of child pornographers. Child pornographers started using Internet technology and hacking tools in the 1990s and that prompted the development of specialized teams in law enforcement. We helped at Polytechnique by creating a program to train those policemen.
That's not even the biggest problem. What has become clear in the last few years is that the bigger threats lie in cyber-espionage and cybersabotage. We're just starting to find out right now how much foreign intelligence agencies and foreign economic interests have been rifling through our computers here, government computers, Canadian businesses, and Canadian citizens, for over a decade.
We in Canada were not the victim of the denial-of-service attacks that essentially obliterated from the Internet planet countries like Estonia and Georgia in 2007 and 2008, or the production of weapons-grade uranium was not halted by a computer virus in 2010 like Iran's was and that's a good thing because we don't make weapons-grade uranium in this country. Also, our oil companies, because we do have those, were not forced to replace 30,000 desktops overnight like Saudi Arabia's Aramco had to do in 2012 because of a patriotic vengeful hacking group from Iran.
We have not been the victim of these very huge metadata attacks, but there's no shortage of significant incidents and some of those are becoming public. It is possible and it has been said that the laptop of the CEO of Nortel was compromised by Chinese hackers since 2001. I will ask you now who is the second-biggest provider of networking equipment in the world, having replaced Nortel?
In a recent incident, the source code, which is the secret sauce that runs some of the components of a critical infrastructure, including the energy infrastructure.... The source code for that was stolen through a computer hacking attack at a Calgary-based company called Telvent, which is a provider of a lot of our critical infrastructure.
What keeps me up at night is not identity theft; it's this stuff. Imagine the ice storm of 1998 in southern Quebec and Ontario; I was there. Three million Canadians were without electricity for a week, and several hundred thousand of those were without electricity for up to a month in the middle of the winter. Imagine that this was not a freak of nature, that somebody did this from somewhere on a laptop with a click, and could do it again. This is real. It could happen. It's worse than identity theft. It's theft from the economy. It's national security theft. It's click, no economy; click, no national security; click, no governability. Imagine the loss of confidence of Canadians in our government.
You will say this is not the mandate of this committee, but I would say that it is definitely within the mandate of government. You certainly have colleagues, members of Parliament in other committees, such as the public safety and national security committee and the industry, science and technology committee, and I would encourage you to talk with them and work with them. The reason is very simple. Deep inside, at the end of the day, this is the same problem. The root causes of the problem of identity theft, cyber-espionage, cybersabotage, you name it, are all the same. It's the way we've been running our IT infrastructure and the way we've been looking the other way and enjoying all the gadgets.
What are these causes that we can try to start addressing?
The first one is that there have always been crooks and there always will be. Where there's a buck, there's always a thief, and the Internet is no exception. They've just moved to the Internet.
The second one is the way we've used computer and Internet technology was never meant or created for the purposes that we are using it. A case in point is the World Wide Web. The World Wide Web was invented by researchers in Switzerland to have an interactive way of sharing research data, and 30 years later it's running the worldwide economy. It wasn't meant for that. It wasn't built with the appropriate security mechanisms and accountability.
The technological solutions exist. They've been developed. They're all there. We know them. In engineering schools, we teach them, but the forces and incentives to put them to work never seem to be there. It's always the same thing. Apathy, ignorance, and vested interests that are not in the best interest of the public are preventing these things from being deployed, enhancing our lives.
The third one is the fact that the IT industry in historical terms is still relatively young and immature. Thirty years ago computers were relatively isolated. A few crazy people like me had personal computers. The fact that this was a deregulated, completely improvised industry was okay. This is akin to what the car industry was like at the turn of the 20th century. There weren’t that many cars on the roads. They were quite noisy, but they weren’t that fast.
But the post-war era came, the crazy twenties, and the cars became bigger and faster, and there were starting to be some car accidents. Then after World War II and the big boom, the baby boomers—this is where they came from—there was also the car boom. The cars became fast, and superhighways were built in Canada and the United States. Then the problem blew out of proportion. We're talking about tens of thousands of deaths a year. Something had to be done, and it was done.
Engineering standards were applied to the manufacturing and inspection of autos and parts. Professional engineers were the only ones allowed to design and certify critical components. Governments worldwide wrote and imposed mandatory safety standards on the industry. Highway codes were enacted, and drivers' licences and driver training became mandatory. Even the lawyers helped. They started suing people and industry for carelessness and neglect. Even the insurance companies chipped in. They imposed standards of their own. That's how seat belts became mandatory and safe. Eventually even the Criminal Code was amended. Impaired driving became a crime. You could go to jail. That wasn't the case before. Finally, even technology and law enforcement married up and came up with some law enforcement technologies, such as the breathalyzer and radar gun.
This is where we are right now in the computer industry by comparison. We are somewhere in the early 1950s. The “information superhighway” as it was called by Al Gore, the Internet, has been built and it is travelled by millions, by billions, every day. The cars are big now—the computers—and people use them for all kinds of things. They look fancy, and we all want the fastest and the coolest model. Our economy and our way of life depend on them. In fact, we are addicted to the freedom these computers provide us in the same way we are addicted to cars. The difference is that “computer accidents” don’t kill people...yet. Just wait, it will happen.
In conclusion, while addressing the root causes of the problem, we'll need to involve many different sectors of society including professional associations, educators, industry, civil servants and law enforcement. It is chiefly with you, as lawmakers and members of Parliament and government, that the responsibility to lead us away from this mess lies.
But you are not alone. We, who have created Pandora's box, saw others open it despite our warnings and would like nothing more than to help close it.
Thank you very much for your attention.