Evidence of meeting #124 for Procedure and House Affairs in the 44th Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was ballots.

A recording is available from Parliament.

On the agenda

MPs speaking

Also speaking

Stéphane Perrault  Chief Electoral Officer, Office of the Chief Electoral Officer
Michel Juneau-Katsuya  Former Chief of the Asia-Pacific Desk, Canadian Security Intelligence Service, As an Individual
Wesley Wark  Senior Fellow, Centre for International Governance Innovation
Aaron Shull  Managing Director and General Counsel, Centre for International Governance Innovation
Luke de Pulford  Executive Director, Inter-Parliamentary Alliance on China

12:30 p.m.

Conservative

Garnett Genuis Conservative Sherwood Park—Fort Saskatchewan, AB

I understand that the FBI has this protocol around not wanting to inform us directly. They want to go through our national governments and respect sovereignty, but we live in a democracy where Parliament is supreme. If Parliament were to ask an allied intelligence agency like the FBI to inform members of Parliament directly of threats they identified, do you think that would be a reasonable safety valve so that members of Parliament, including members of the opposition, aren't beholden to decisions of the executive to constrain our ability to access information that's important to our safety?

12:30 p.m.

Executive Director, Inter-Parliamentary Alliance on China

Luke de Pulford

Honestly, Mr. Genuis, I think that's a bit above my pay grade in the realms of diplomacy.

Certainly the information that the FBI gave us was exceptionally useful, and we're very grateful to them for it.

The Chair Liberal Ben Carr

Thanks very much, Mr. Genuis.

Mr. Duguid, the floor is yours for six minutes.

Terry Duguid Liberal Winnipeg South, MB

Thank you, Mr. Chair.

I want to thank all of our witnesses for painting a stark and concerning picture of the cybersecurity threats that our nation and other nations face, and that threat is increasing.

One thing that concerned me most was that our private devices were being targeted. We do have protections for our parliamentary systems, our parliamentary emails and some of the resources we have access to as parliamentarians. I'm a politician and I'm a parliamentarian, and there's lots of interplay. Sometimes the area is grey between the political and the parliamentary, as you know.

I'm wondering how you learn about attacks on private devices and how we can better protect ourselves as parliamentarians. Is there a gold standard out there somewhere? Is there a nation we could emulate? Mr. Juneau-Katsuya mentioned that we may be in the latter half of the pile with respect to G7 countries. Is there a nation on earth with the best training and the best cybersecurity hygiene that we could emulate?

I'll open that up to any one of our speakers.

12:35 p.m.

Former Chief of the Asia-Pacific Desk, Canadian Security Intelligence Service, As an Individual

Michel Juneau-Katsuya

Yes, there is definitely more effort performed by our Five Eyes allies when it comes to warning, training and raising awareness. In security, the human factor is always the weakest link. Contrary to maybe the academic comfort that Mr. Wark has put into the technology, it's not enough. Just take an example, a very benign example. Just this week, it was reported in the newspaper that a city councillor in Gatineau went to Russia with his equipment without even thinking that he could be compromised or something like that. This is naive to borderline stupid. In that perspective, it is the human being that is the weak element, not the technology.

We have phenomenal technology. CSE does a fantastic job. It's also supported by the private sector like Bell Canada and other groups that co-operate to try to protect us, but at the end of the day, common sense needs to be injected as well. From that perspective, from an operational point of view, we need to be capable of warning more and training more—with continuous training, not only the training you get when you get sworn in and when you arrive as a new member of Parliament, and then we forget about you for the next five years. No, we need to constantly repeat this, particularly with staff. It was mentioned during the Hogue commission that 11 candidates and 13 staff members were on the payroll of the Chinese consulate in Toronto. You can see that not only members of Parliament will be targeted, but their staff as well.

Terry Duguid Liberal Winnipeg South, MB

Mr. Shull, you weren't able to speak earlier. I'll give you the chance now.

12:35 p.m.

Managing Director and General Counsel, Centre for International Governance Innovation

Aaron Shull

Thank you very much.

I'd just like to say that the fact that Mr. Genuis's personal email was compromised is horrible. It was because of his job as a parliamentarian, so I thought I'd offer some concrete advice to this committee that I hope will be helpful.

First, allocate a parliamentary budget for personal cybersecurity protection. I'll tell you how I protect myself. I'll bet you that I'm probably better positioned than everyone in this room, and I'm just some guy. I'm not in the public eye and I'm not being targeted the same way you are. I use an encrypted multi-hop VPN for my data. I use biometric and cryptographically locked password managers. Each of my passwords is over 20 characters long and reads like gobbledygook. If you tried to brute-force my passwords, you'd have to really, really want to. I use the most sophisticated malware protection on the commercial market. I use a hardware multi-factor authentication for my most sensitive accounts. If you wanted to hack me, it would require a state-level actor who really wanted to get in. Then, for my most sensitive stuff, you'd have to get the keys out of my pocket.

For all of that we're talking hundreds of dollars, not thousands of dollars. Let's allocate some budget for that. Let's make sure that members of Parliament can be part of their own defence. If they're going after your personal accounts, it's not because of your personality; it's because of your day job.

Terry Duguid Liberal Winnipeg South, MB

Does anyone else want to comment?

I mean, to my mind, we should all have a cybersecurity audit to point out the weak points and how we can shore them up.

12:40 p.m.

Former Chief of the Asia-Pacific Desk, Canadian Security Intelligence Service, As an Individual

Michel Juneau-Katsuya

I'll give a quick statistic. A few years ago, I participated in research that was done by Telus. They interviewed 600 Canadian companies to try to find out where the weak link was within companies. They found that the greatest number of security breaches was done by the executive.

The Chair Liberal Ben Carr

Thank you, Mr. Duguid.

Mr. Shull, you can have my phone for an hour at the end of the meeting.

Voices

Oh, oh!

The Chair Liberal Ben Carr

Ms. Gaudreau, you have the floor.

Marie-Hélène Gaudreau Bloc Laurentides—Labelle, QC

Mr. Chair, will I get three more minutes? I'm just kidding.

I've tried to sum up this very important topic.

Mr. Juneau‑Katsuya, I'd like you to tell us about the consequences of our lax approach. What will happen to us in Quebec and Canada?

I'd also like you to tell us about existing role models. We talked about the presidential election in Taiwan. Who are our role models?

What do you recommend, other than password management?

12:40 p.m.

Former Chief of the Asia-Pacific Desk, Canadian Security Intelligence Service, As an Individual

Michel Juneau-Katsuya

There are several models, but they're not all infallible. I repeat that, at present, there is certainly a lack of collaboration between parliamentarians and intelligence agencies.

For a very long time, the Canadian Security Intelligence Service, or CSIS, and the Communications Security Establishment, or CSE, weren't even allowed to inform anyone except the prime minister or the Minister of Public Safety. Bill C‑70 looks set to change all that. It remains to be seen how this will play out in practice.

One thing is certain: prevention is needed. Equipment can't do everything, and it can't stop everything. We need to develop a new business culture. I'm not talking about spyware or James Bond, but a business culture. We need to acquire new reflexes, because we're still very vulnerable. If we create a breach, we're literally letting everyone into the house.

The TikTok app has been cited as an example. Why is TikTok problematic? If someone blindly signs the terms and conditions and gives access to his or her phone, contact list, camera and microphone, which can be activated remotely, it becomes nothing less than clandestine wiretapping equipment.

Let's say I'm a teenager going to CEGEP or school. I'm not necessarily the target of cyber-attacks, but my contact list may contain information about my uncle, who works for the Department of National Defence, my mother, who works for the government, or my sister, who works for a very important strategic company. So we've just given a foreign power, like China, access to all this information.

Marie-Hélène Gaudreau Bloc Laurentides—Labelle, QC

People listening to us may be thinking that it's no big deal that we have access to their contact list.

If the government doesn't act, what will the consequences be for citizens, for individuals? I want to know, so that we can react.

12:40 p.m.

Former Chief of the Asia-Pacific Desk, Canadian Security Intelligence Service, As an Individual

Michel Juneau-Katsuya

The consequences are that we are losing our strategic position on the international stage. We're losing the confidence of our allies, who are now looking at us and saying that Canada isn't serious. From this perspective, there's a whole section of our population that is poorly protected, that is vulnerable and that will be used.

According to experts, Canada has literally millions of zombie computers. These are computers that hackers have managed to get into, which are used to bounce from one computer to another. We lose track of them.

We're very ill-informed at the moment. In my statement, I said that Canada was lagging behind the G7 countries. We're not investing enough in the fight against cyber-attacks, and we're not doing enough to raise awareness among the population, particularly parliamentarians, who are the primary target.

As the effectiveness of foreign interference has been reduced on the ground, in the years to come, many more covert means will be used. Computer attacks are a case in point.

Marie-Hélène Gaudreau Bloc Laurentides—Labelle, QC

Mr. Wark, earlier, Mr. Juneau-Katsuya said that cyber-attack was a weapon of choice. I have young adults at home. They tell me it's okay for people to know about their lives.

Do you agree that cyber-attack is now a weapon of choice? Why do we need to guard against it?

12:45 p.m.

Senior Fellow, Centre for International Governance Innovation

Dr. Wesley Wark

Thank you for the question. I will say this cyber-weapon is a very formidable one, and it has downed various vectors, as the professionals often refer to it. How did it become so formidable? I think there are really two answers to that.

One is a general answer. It's the nature of the digital lives that we all lead, which creates great openings and vulnerabilities, particularly for sophisticated foreign state actors to try to gain access to our data for all kinds of manipulative purposes.

The other answer is that it's a very significant threat. The other way in which cyber has become so significant is that it has created an entirely new kind of tool for foreign states to conduct espionage operations against adversaries or countries of interest. The foreign espionage aspect of cyber capabilities is one that I think we perhaps do not pay enough attention to in the context of all the discussions we've had about foreign interference.

Thank you.

Marie-Hélène Gaudreau Bloc Laurentides—Labelle, QC

What you're saying is that when you use something that's free, you're a product. I think people need to be made aware of this.

I'll have two and a half minutes of speaking time later, because I haven't finished with the other two witnesses.

Thank you.

The Chair Liberal Ben Carr

Thank you, Ms. Gaudreau.

You're right on time, as always.

Ms. Mathyssen, the floor is yours for six minutes.

Lindsay Mathyssen NDP London—Fanshawe, ON

Thank you so much.

Thank you to the witnesses for appearing today.

I certainly want to say how seriously we absolutely need to take this. You've made this very clear. I know we all take it seriously.

What I took from past conversations with our own security personnel and people in charge of this is that they were saying they didn't inform at the same rate. Eventually, they did, but they didn't inform because this was something that was stopped. It didn't get through the net. The idea was that there are so many attacks that if they were to let us know about all of them, that's all they would do.

What are your comments on that, per se? Do we have to change that mentality? Do we just say, let us know about all of them?

Could you comment on that a bit?

12:45 p.m.

Former Chief of the Asia-Pacific Desk, Canadian Security Intelligence Service, As an Individual

Michel Juneau-Katsuya

What will be targeted are the people of strategic importance. Parliamentarians are definitely people of strategic importance. Critical infrastructure is definitely of strategic importance.

There is a very easy technical term that everybody knows, called a “ping”. Every day they try. They ping. They knock at the door and see if the door is open. They try the handle. We don't necessarily need to know that because, yes, indeed, there are hundreds of thousands, if not millions, of attacks every day. From that perspective, we cannot....

When somebody is particularly targeted repeatedly because of what they do in their work, what they promote, what they challenge or what they denounce—like transnational oppression and things like that—they should be warned. They should receive better attention. They should also be receiving training to a certain extent, like I said, to develop a new business culture and a new way of being aware, because awareness is the only true defence that we have. The technical can only do so much.

12:45 p.m.

Managing Director and General Counsel, Centre for International Governance Innovation

Aaron Shull

Did you want me to come in on this?

Lindsay Mathyssen NDP London—Fanshawe, ON

Sure.

12:50 p.m.

Managing Director and General Counsel, Centre for International Governance Innovation

Aaron Shull

In preparation for this, I went through all of the other witnesses' testimony. If I were to offer advice to remedy what I saw in the previous evidence, I'd offer you three pieces of advice.

The first is, get your information-sharing house in order. It was one of those kinds of things where everyone didn't really know who was sharing what with whom, when, and why. There was a recognition that this was a problem. As my colleague Mr. Wark has indicated, the MOU has been updated. If you haven't seen that, I would encourage you to take a hard look at that and just make sure that it's tight. Also, treat this like a dress rehearsal. This is going to happen again and again. Just make sure you know who's on first with respect to the sharing of information, what happens and what that threshold is.

The second, as I had already indicated, is to have some personal money to protect yourselves. While the evidence indicated that the threat was stopped, we don't know—I'm sorry, Mr. Genuis—about your personal account, because that wouldn't have fallen within the IT department of Parliament.

The third is training, but not just cyber training. It's general awareness so that you can be your own best partner in your defence.