Evidence of meeting #49 for National Defence in the 44th Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was information.

A recording is available from Parliament.

On the agenda

MPs speaking

Also speaking

Clerk of the Committee  Mr. Andrew Wilson
Thomas Keenan  Professor, University of Calgary, As an Individual
Alexander Rudolph  PhD Candidate, Carleton University, As an Individual
Kristen Csenkey  Ph.D. Candidate, Balsillie School of International Affairs, Wilfrid Laurier University, As an Individual
Alexis Rapin  Research Fellow, Raoul-Dandurand Chair in Strategic and Diplomatic Studies, Université du Québec à Montréal

9:10 a.m.

Liberal

Darren Fisher Liberal Dartmouth—Cole Harbour, NS

Yes, sir.

9:10 a.m.

Prof. Thomas Keenan

Wonderful. Yes, first of all, I wanted to discuss something that I call the “ransomware from hell”. It's a scenario that I made and that I think needs to be aired here.

Let's say you're a hospital administrator. You get an email and it says, “One of your employees just clicked on that phishing email from a Saudi prince and now we're inside your system, but we are not going to hold your data for ransom or erase it.” They say they have a much better idea: that they've traversed your network and they know that you have 75 Picker X-ray units, four Siemens MRIs and 2,000 BD infusion pumps. They're all there and they all have vulnerabilities.

There are zero-day vulnerabilities in many technologies that the manufacturers don't know about.

They say they're for sale on the dark web. They say they bought them on the dark web and they need to get their money back, so you have to pay them $10 million in Bitcoin by tomorrow, and, if you don't, they're not going to encrypt your data—that's so old school—they're just going to kill a patient every day.

I did look up an article from Israel on “Seven Ways to Kill a Patient with a Picker X-Ray Unit”: from hitting them physically with it to giving them too much radiation.

The reality is that I took this to a bunch of hospital administrators in the U.S., and they said that either they would pay the ransom—and I said, “Okay, great, then they'll be back for $20 million tomorrow”—or they'd ignore it. I said, “Well, then, you'll be on the front page of the New York Times under 'Hospital Kills Grandma by Refusing to Pay Ransom'.”

They also said they'd try to air gap it. This is where we get technical. They'd say that they will separate all the different hospital systems so that they can't do this. My medical colleagues says that's nonsense because that Picker X-ray unit has to talk to the doctor, the lab computer and the intraoperative MRI. My point is that it's a tightly connected network.

The answer is—and I've taken this to everybody I know who's smart—that there is no answer.

9:15 a.m.

Liberal

The Chair Liberal John McKay

Thank you, Mr. Fisher.

There is no answer.

Mr. Garon, welcome to the committee. You have six minutes of speaking time.

February 10th, 2023 / 9:15 a.m.

Bloc

Jean-Denis Garon Bloc Mirabel, QC

Thank you, Mr. Chair.

Thank you for being with us, Mr. Rudolph.

I have a question for you.

It has recently come to light that the federal government is doing substantial business with private firms. McKinsey has been mentioned a lot, and there are others. Departments with extremely sensitive activities do business with these firms, including the Department of National Defence and the Department of Immigration and Citizenship. We have learned that some of these firms, including McKinsey, had dealt extensively with companies controlled by the Chinese regime.

Do you think we should pay particular attention to this issue and that we should be very careful about the firms we do business with in Canada? Is it completely normal for the Department of National Defence to enter into very large contracts with firms that deal with the Chinese government?

9:15 a.m.

PhD Candidate, Carleton University, As an Individual

Alexander Rudolph

I would agree that it is a major risk, particularly with.... I don't recall the name of the communications company that was recently suspended because of ties to Chinese firms.

I'd say that is a constant, ongoing problem, as we have seen evidence that China will actively taint supply chains to try to implant surveillance capabilities. The most recent one, I believe, was almost a full fleet of cars in the U.K. that were found to be bugged through this manner.

At the same time, with certain other firms.... I want to parse the different risks between, let's say, large consulting firms and those at the end of the supply chain as two completely different risks. In cyber-defence and cybersecurity, McKinsey and these large consulting firms are, really, the big names in the business that will be doing much of this business. There really is no getting around them.

When you are taking into account the massive inflation and the massive competition to get these skilled individuals, you can't necessarily compete with them.

9:15 a.m.

Bloc

Jean-Denis Garon Bloc Mirabel, QC

If you will allow me, Mr. Rudolph, I will continue.

There is the Group of Five, among others. Since you say that some of these firms are unavoidable, don't you think it would be better for Canada or the federal government to have a much more effective selection and transparency regime? That way, when Quebeckers and Canadians see the federal government doing business with these organizations, they will at least have an idea of the information that has been disseminated or the information to which these organizations have had access. We know that China has extensive means for espionage, cyberwarfare, and so on, and that these firms are also doing business with China.

Do you think we have to take a step towards transparency so that Quebeckers and Canadians are less worried, whether these fears are rational or not?

9:15 a.m.

PhD Candidate, Carleton University, As an Individual

Alexander Rudolph

I will completely agree that there is a need for more transparency, I'd say, across the board on Canadian cyber-defence policy. Most of my research is from looking at audits and looking at departmental results, and then I'm surprised that people are surprised by what I know about the Canadian Armed Forces.

As much as I know broad themes, there are still a lot of gaps in my knowledge. That's simply because the Canadian Armed Forces doesn't want to tell you and because they are prevented from doing so. It's very much a policy problem.

I really want to stress that there is a difference between the transparency and putting more demands on the Big Five or these firms, because there are already quite a few demands.

9:15 a.m.

Bloc

Jean-Denis Garon Bloc Mirabel, QC

You said something interesting. You mentioned that the lack of transparency, particularly within the Department of National Defence, is so endemic that it can prevent Canadian researchers from doing research on the subject.

Is that what you said to me?

9:15 a.m.

PhD Candidate, Carleton University, As an Individual

Alexander Rudolph

I would agree. It's endemic to the system.

Recently the National Security and Intelligence Review Agency found out that there were 180 independent databases in the Canadian Armed Forces, meaning that you need personnel management, not information management, in order to access much of this data.

9:20 a.m.

Bloc

Jean-Denis Garon Bloc Mirabel, QC

In closing, I have a question for Professor Keenan.

We know that social media plays a very big role in surveillance and artificial intelligence. A lot of Canadians and Quebeckers give their information, which feeds the algorithms. They give their information without knowing what they are dealing with. There is obviously a surveillance capitalism, and we know that these images, these photos that feed the algorithms are part of the problem.

Is the Government of Canada doing enough to support Canadians in protecting their information? What tools are available to the Government of Canada to improve the protection of our digital identity? We know that once you lose it, it's very hard to get it back.

9:20 a.m.

Liberal

The Chair Liberal John McKay

Unfortunately, Mr. Garon has left you 20 seconds to answer that good question, so be very brief, please.

9:20 a.m.

Prof. Thomas Keenan

Thank you so much for mentioning Shoshana Zuboff's idea on surveillance capitalism. My son is actually a cybersecurity researcher and worked with her on that book.

There is no question that we give up too much information on social media. There is a wonderful video on The Onion, a satire site, in which Mark Zuckerberg is honoured as CIA agent of the year because he got people to give up so much information about themselves—where they're going to go, what events they will attend. If you want to arrest them, you just have to look at their schedule.

Absolutely, we need a greater awareness. There's a reality there that people love sharing information. It's not necessarily a good thing. At the very least, everyone needs to look at who gets access to their information. Is it you, your friends, the friends of your friends or the whole world?

9:20 a.m.

Liberal

The Chair Liberal John McKay

Thank you, Mr. Garon.

Mr. Boulerice, welcome to the committee. You have six minutes, please.

9:20 a.m.

NDP

Alexandre Boulerice NDP Rosemont—La Petite-Patrie, QC

Thank you very much, Mr. Chair.

It is a pleasure to be with you this morning.

Mr. Keenan, I really liked your reminder that artificial intelligence systems can be fed by preconceptions and biases that designers can install in the learning system. You also talked about the ability to poison the database by changing the conversation.

Am I wrong in saying that you could use artificial intelligence to create fake accounts on social media that will change the conversation and then contaminate other artificial intelligence systems, which were using that database in their learning? So it would be a war of artificial intelligence that would come and spoil other artificial intelligence systems. This is starting to get a bit complicated.

9:20 a.m.

Prof. Thomas Keenan

I want to mention that I have a wonderful graduate student, Anika Kale, who has been studying intelligence curricula around the world, particularly from the point of view of gender. She finds that there is almost no awareness of gender in there.

You are absolutely right. One source can pollute another source, and there's really no control on that. The best thing to know about this is that AI generally doesn't explain itself. It gives you an answer. My big objection to ChatCPT is that it makes that answer look very authoritative when it's making it up out of nowhere. I got it to write a poem once, and it put a disclaimer at the bottom that I thought was very interesting. It said that this was a creative work and it didn't really have any facts in it.

You are absolutely right. One data source can poison another data source. I have no doubt that intelligence agencies around the world are busy trying to poison our wells of open-source data right now.

9:20 a.m.

NDP

Alexandre Boulerice NDP Rosemont—La Petite-Patrie, QC

Does the malicious use of artificial intelligence, especially on social media, represent a potential danger to the quality of our democratic life and encourage the rise of extremism and populism?

9:20 a.m.

Prof. Thomas Keenan

There's no question that we've seen this in U.S. presidential campaigns and other campaigns. Bots are created for the explicit purpose of getting people riled up. Sometimes they'll do both sides; they'll do the left and the right. The reason is that they want to sow discord in the United States. You can probably think of what countries are doing this.

I want to mention technology—because it was mentioned before—and where the risks are. The American military tried an e-voting project where soldiers who were posted overseas could actually e-vote. I was asked to comment on the security of the system. It was great. You had to do a video selfie of yourself, and you really proved who you were. However, some of those soldiers had cellphones that were made by Huawei, Xiaomi, Meizu. Here you had the end point, the cellphone, that could be vulnerable. It's the weakest link theory. That could be the way in which the e-voting system might have been corrupted.

9:25 a.m.

NDP

Alexandre Boulerice NDP Rosemont—La Petite-Patrie, QC

This is very interesting. Thank you very much, Mr. Keenan.

Mr. Rudolph, my question is about cyberattacks on infrastructure.

In the 1970s I was very small, but I remember that tourists could not take pictures of power plants or dams, because it was considered critical infrastructure and we did not want the information to spread.

Of course, in 2023, we are no longer there. Today, when we talk about a cyberattack on Canada's critical infrastructure, what exactly are we talking about?

9:25 a.m.

PhD Candidate, Carleton University, As an Individual

Alexander Rudolph

I want to first take your example of being unable to take pictures as a security issue. We're now dealing with the greater proliferation of open-source intelligence. We're able to use just Google Maps to conduct that same exact intelligence and analysis that 20 years ago was illegal. Using this kind of open-source intelligence can also feed into operations on critical infrastructure. It is often the individuals, the people, who are the draw or the vulnerability in a system.

Any organization will have professionals to watch this and work on cybersecurity. You look for any weak link in a system. It can be any small thing. If they can gain entry, they will attempt to lock it down and use it for whatever means they have. If it is a state, they'll just lie in wait for a conflict to happen to then initiate it. If it is a criminal, usually it will involve locking down the system, preventing its use, such as the Colonial pipeline attack, and demanding money. If they don't get that ransom, they'll publish that data online, no matter how secret or sensitive that data is.

9:25 a.m.

Liberal

The Chair Liberal John McKay

Thank you, Mr. Boulerice.

Colleagues, we have a little more than 15 minutes, and we have 25 minutes' worth of questions in the second round. The math doesn't work, so I'm going to have to take a minute off of everybody's line of questioning, starting with Ms. Kramp-Neuman.

9:25 a.m.

Conservative

Shelby Kramp-Neuman Conservative Hastings—Lennox and Addington, ON

Thank you.

Dr. Keenan and Alex Rudolph, thank you for your testimony today.

Mr. Rudolph, your comments with regard to being in no way prepared to face cyberwarfare are extremely concerning.

I'm going to start by referencing an article from 2021 from the Canadian Global Affairs Institute where you highlighted the importance and necessity for the CAF to create and operate an effective cybersecurity force. You indicated that, if the CAF cannot fulfill its cybersecurity needs, it may need to rely on the CSE.

In April of that same year, the CAF released the report titled “Evaluation of the Cyber Forces”, in which they highlighted several concerns with regard to the CAF and retention and recruitment.

What sorts of problems would this cause, particularly having civilians taking on roles that would otherwise be filled by armed forces members?

9:25 a.m.

PhD Candidate, Carleton University, As an Individual

Alexander Rudolph

As the CSE official confirmed on Tuesday, CSE is able to support and help the CAF on cybersecurity and cyber-defence issues. When doing so, they take on Canadian Armed Forces mandates. That would mean if the CSE were required to be called upon in a conflict, particularly a war, CSE civilians who are assisting the Canadian Armed Forces would be considered combatants in a war.

You have to contend with and understand to what degree this extends to the rest of the organization at that point.

9:30 a.m.

Conservative

Shelby Kramp-Neuman Conservative Hastings—Lennox and Addington, ON

Mr. Rudolph, how is the CAF's current reconstitution order affecting the development of its cyber-forces?

9:30 a.m.

PhD Candidate, Carleton University, As an Individual

Alexander Rudolph

I can't comment too much on that, as the information I have is limited.

I will say that a big reason for the difficulty in retaining those with the skills in the CAF is that they simply don't have the infrastructure and means to actually do the work. There are a lot of bureaucratic walls and slow procurement. They are joining the forces to do this work, but they don't necessarily don't want to be sent out to just set up radios.

9:30 a.m.

Conservative

Shelby Kramp-Neuman Conservative Hastings—Lennox and Addington, ON

Thank you.

Going back to the original article that I spoke of, you commented that recent information “indicates that the CSE and the DND/CAF are in the [same] planning stages towards a similar type of organization, but public information remains limited on a timeline for its creation.”

Could you speak to the lack of information on the initiative and also how it raises serious implications for the CSE's civilian employees? Could you elaborate a little bit on that?