Good morning, ladies and gentlemen.
My name is Evan Light, and I am an associate professor at York University's Glendon College.
I am an associate professor of communications.
I will give my opening remarks in English, but I welcome comments or questions in French, as well.
I am, as one of you mentioned on Tuesday, the source of the documents from which Radio-Canada has been doing the reporting since November 2023 on the use of tools capable of extracting personal data from mobile devices and computers.
The speed with which you've taken up the challenge of investigating the widespread use of mobile forensic devices throughout the federal government is, for me, quite impressive and demonstrates a deep respect for the fundamental human right to privacy. Privacy is not an abstract thing. It is a fundamental human right that is tied to other human rights. In Canada, it's been a human right since 1977. We're talking about something that's quite fundamental.
For me, that means it's a right that should not be violated unless we have a very good, well-documented reason to do so. I think the testimony that's been given to you by agencies so far hasn't necessarily shown that their use is what we could call “necessary and proportionate”, which is a term that has come up at various times during your recent meetings.
From 1977 forward, successive governments have failed to protect our fundamental right to privacy. This committee, at this moment, has a really great opportunity—not just an opportunity but an obligation—to step up and examine how government protects the fundamental right to privacy.
I've forwarded numerous documents to the committee. Some have been translated and some have not, so you don't have everything I'll be talking to you about today. I want to talk about these issues and get into some of the testimony from the agencies you've spoken with so far.
I first encountered these devices in 2020 when doing research for a course. A group in the United States documented their use throughout over 2,000 police forces in the United States. There's been further documentation by the Carnegie Endowment in the United States, documenting the use of these tools by various regimes throughout the world and how they're tightly integrated with spyware.
As a quick note on terminology, I don't see MFDs—mobile forensic devices—as being spyware. It's come up numerous times at this committee. However, they have essentially the same capabilities. They're sold by the same suppliers and they're used by the same entities. I don't think we need to get hung up on terminology. I think it's important that they are equally invasive and equally unregulated in their use—if not more widespread and more unregulated in their use.
My concern is not that these devices exist, but that their use is completely unregulated. Various agencies that have testified to you have said that they don't really know how they use them. They don't keep numbers. CBSA said they use them all the time, but they can't tell us how many times they use them. Shared Services Canada testified on Tuesday that they don't have any actual policies or procedures on how they use them. Scott Jones decides, as an individual, when their use is warranted.
As noted by witnesses to this committee, the devices are relevant. They've been renewed many times. I believe Mr. Mainville, from the Competition Bureau, mentioned on Tuesday that they've been using these devices since 1996, which was an amazing revelation to me. It shows that these things have been used regularly by government for decades. They have been and continue to be unregulated and without any oversight.
Throughout the committee meetings related to this study, members of the committee and witnesses have used the phrase “necessary and proportionate”, or portions of it. I think this phrase is really key to understanding the use of mobile forensic devices or any sort of surveillance technology by government. It's actually tied to a document that came out in 2014, which was developed by 16 civil society organizations around the world. It's been endorsed by about 600 organizations and around 300,000 individuals. It's called “Necessary and Proportionate: International Principles on the Application of Human Rights Law to Communications Surveillance”.
There are legal frameworks to work on. There are standards for understanding how to do surveillance while respecting human rights, which is something that I think Canada can learn from and maybe should.
I'll be quick. I'm almost at my five minutes. I'll finish with a quick note on some of the recent testimony.
Shared Services Canada and various other organizations have said they only use mobile forensic devices in isolated labs, which gives the impression that they're really cut off from the world. Based on the capabilities of the devices they own, this is patently false. In the contracts that I forwarded to this committee, various entities, including CBSA, CRA, ECCC, the RCMP and TSB all have what's called UFED Cloud, which is a software package from Cellebrite that essentially lets someone access any cloud applications that are on somebody's phone. It's advertised as a way to get around warrants.
In addition, as my last comment, various agencies have ruggedized versions of these devices. “Ruggedized” means they're able to go into the field and be dropped and thrown around. They would not be buying ruggedized devices if they were to be used only in isolated clinical labs.
I welcome any questions.