Thank you, Madam Chair.
Again, through you to our witnesses, I'm going to make a couple of comments first, and then I'll get to my question.
One of the frustrating pieces of this study.... I was a member of NSICOP and had that security clearance, so I do understand how difficult it is to receive that clearance. I understand the quality of that information. I understand the sensitivity of it and all of the protections that go along with it. I highly recommend that, if other members have the opportunity from their party to be part of NSICOP, you absolutely do it, because you learn a lot. It's done in a way that is sensitive and secure and in a way that protects our national interests.
There's always this debate around what should be shared publicly so Canadians can know and prepare themselves but also the risks of sharing that information, because then our adversaries also get that information. Sometimes it's not the specific details; it's operational information. It's frustrating. I'm sure you'd love to answer these questions and give all these details, but in doing so, in providing that to Canadians, you're also providing that to China or Russia or other foreign state actors. Even I sit here frustrated sometimes.
What's also a little frustrating is the nature of these conversations. Because they are so sensitive, they become a political opportunity for some to hold up documents that are redacted. How salacious. What a public prop that can be. There's also an opportunity to call in witnesses and ask them to tell what they heard in a meeting, knowing that it was a classified meeting and that those details can't be shared. How salacious and how political it is to look for this smoking gun instead of talking about.... I give credit to all my colleagues across the floor, too, for trying hone in on some recommendations for how to improve the system in Canada.
I don't think anybody has said that everything here is perfect and there are no improvements to be made. Of course not. It's going to be evergreened because the nature of threats is constantly changing.
I also want to point out some of the areas we're criticizing. How well does SITE work? How well does the critical election incident public protocol work? Is NSICOP the right place to look at this stuff?
I remind this committee that none of those things existed prior to 2015—none of them. Security threats and foreign influence didn't just begin in 2015, but there have been things put in place to make that better, to give parliamentarians more opportunities to access this information and to allow Canadians to see more. Seeing the CSIS director's public comments, CSIS has come a long way. If you follow any of these things—and I did for a long time—and read those speeches, they have come a long way in sharing information. Can they go further? Yes, I think so, but how do we have that conversation?
I've used a lot of time, but I want to ask about the details of that balance of sharing that information versus the very real risks. That can include things like how we collect information. What we don't know could be useful to adversaries.
Ms. Henderson, because I called out CSIS for clearly making a distinction, what is your thought process on that balance of risk versus communicating with Canadians?