Evidence of meeting #55 for National Defence in the 44th Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was cybersecurity.

A recording is available from Parliament.

On the agenda

MPs speaking

Also speaking

Tadej Nared  Chairman of the Board, Slovenian Certified Ethical Hackers Foundation, As an Individual
John de Boer  Senior Director, Government Affairs and Public Policy, Canada, BlackBerry
Tim McSorley  National Coordinator, International Civil Liberties Monitoring Group

8:45 a.m.

Liberal

The Chair Liberal John McKay

I call the meeting to order. I see a quorum and it's 8:45. We'll commence with our first three witnesses on our ongoing cyber study.

Present in the room are BlackBerry representative John de Boer and, from the International Civil Liberties Monitoring Group, Tim McSorley. Online we have Mr. Nared, chairman of the board, Slovenian Certified Ethical Hackers.

Welcome, everyone.

I will call on Mr. Nared first, for five minutes, and then we'll move to the other two witnesses. As I indicated to the witnesses who are here, we are expecting guests around 10:15. I don't know whether we'll have an hour or more than an hour. We'll get started and see how this plays through.

With that, Mr. Nared, you have five minutes. Go ahead, please.

8:45 a.m.

Tadej Nared Chairman of the Board, Slovenian Certified Ethical Hackers Foundation, As an Individual

Thank you, Mr. Chair and members of the committee.

Good morning. Let me add that I am honoured to be able to speak before you.

I serve my second term as chair of the board of Slovenian Ethical Hackers Foundation occasionally. I also collaborate with various parliamentarians and committees of NATO countries on diverse topics, from the safety of electronic elections to critical infrastructure and so forth. I also serve as virtual chief information security officer for a Swiss fintech company and as chief information officer to a U.S.-based, women-owned, Ukrainian-owned defence and cyber-defence company, where I try my utmost to empower these remarkable ladies who are heavily engaged in defending their country via cyber means and otherwise. Pertaining to that, if Mr. Chair would permit, I would take a few minute for introductory remarks.

Let me start by saying that usually I'm very diligent before each such engagement as today's hearing, preparing meticulously the topics I would like to present, but ever since I got acquainted with the truly brave and relentless women who are, in the most part, responsible for setting up one of the most formidable cyber armies in the world without outside help or funding and while under rocket attacks, I have kind of changed my perspective on what's important, and I fully embrace the new reality.

I believe it's one thing to discuss cyberwarfare from the comfort of your home or office while playing virtual cyber-games such as NATO's Locked Shields, and quite another when, as we had an example of, one of our core team members couldn't get online because a rocket landed in his apartment, cutting Internet cables, but luckily not exploding.

It's one thing to have a good night's rest and quite another to sleep two to three hours a day, being awakened by air raid sirens and still continuing highly demanding intellectual work and repeating that day after day for over a year because time is of the essence and your countrymen are dying.

I believe it is of the utmost importance to point that out, because I'm quite familiar with various cyberwarfare scenarios, but none of them take into account the aforementioned reality of working under such stressful conditions, where the only time you get to rest is when there is no electricity or Internet connectivity.

Having said that, we were recently present at a closed conference in D.C. on the topic of emerging technologies. The audience was mostly composed of military and intelligence agencies from Five Eyes. They asked us how we are able to accomplish all that we have showcased, and my answer was quite simple: These ladies don't sleep. That's how you accomplish what they have done, and, truth be told, it's them empowering me and not vice versa.

Also let me say that I regret that this hearing cannot be conducted in camera, as I believe is the term, because I wanted to share some of the accomplishments of the conducted cyber-efforts that surprised both the military and intelligence agencies that were present. I also have critical information pertaining to the security of all NATO countries that was acquired by cyber means, and I am quite certain that western agencies don't have that information available, so I would appreciate it if we could afterwards establish some secure communication channel with your present committee, which my colleagues and I trust, not only because Canada was doing and helping Ukraine while others were just talking, but also because we know from other experiences that members of the committee are trustworthy.

Now, as far as real-world experience goes, I would like to suggest to you starting points for discussions that we see as an example of the most important Ukrainian cyberwarfare efforts. Crowd-sourced intelligence is being utilized very efficiently, both in terms of ISR—intelligence, surveillance, reconnaissance—especially with the Delta system, which I'm sure the members of the committee are familiar with.

Next is crowdsourced operations. Ukraine has effectively engaged the so-called “IT Army” of over 100,000 IT specialists in conducting mostly information war campaigns. Additionally, it has a core team of 1,400 highly sophisticated hackers who are not connected to any military or intel branch, but are still coordinating operations with both. It has proven itself to be a remarkable asset.

Lastly, I would like to draw attention to the recent public exposure of the Vulkan files, which are already known to western intelligence agencies. This incident, in essence, reinforces the warnings I've been expressing for years, including during my previous engagement with the committee on the subject of threat analysis for the Canadian Armed Forces—

8:50 a.m.

Liberal

The Chair Liberal John McKay

Mr. Nared, unfortunately, I have to interrupt you, because the five minutes have passed. You bring a level of reality to this conversation that has maybe been missing up until now.

I thank you. Certainly, there will be an opportunity to respond directly to other members.

8:50 a.m.

Chairman of the Board, Slovenian Certified Ethical Hackers Foundation, As an Individual

Tadej Nared

Thank you very much.

8:50 a.m.

Liberal

The Chair Liberal John McKay

Thank you.

With that, I'm going to call on Mr. de Boer, and then Mr. McSorley.

You have five minutes, sir.

8:50 a.m.

Dr. John de Boer Senior Director, Government Affairs and Public Policy, Canada, BlackBerry

Thank you, Mr. Chair.

On behalf of BlackBerry, I'm delighted to speak with committee members today.

For over 35 years, BlackBerry has invented and built trusted security solutions to help keep people, governments and communities safe and secure. Today, we are a global leader in cybersecurity software and services. We protect more than 500 million systems worldwide. Our customers include all G7 governments, NATO, 45 of the Fortune 100 companies and nine of the top 10 banks, just to name a few.

Given that every aspect of our lives is intertwined with the cyberspace, we must act proactively to decrease our cyber-risks in Canada. This can be done by adopting technologies and approaches that have proven to prevent cyber-attacks.

Required, however, is a fundamental shift in our approach from the current reactive model to a proactive stance, and from a focus on incident response to a prevention-first approach to cybersecurity. At an operational level, that means, first, ensuring that we are equipped with the most advanced AI-driven cybersecurity solutions that can prevent malware before it executes. Second, that means clarity in roles when it comes to cyber-preparedness and response. Third, it means enhancing public-private collaboration to boost our collective cyber-defence.

When it comes to technology, the majority of today's cybersecurity solutions operate on the model of knowns. These are known malware, known attack techniques and known attackers. These knowns are based on a collection of malware samples and indicators of compromise. Once these knowns are gathered, they are triaged, examined and published into cloud repositories, and only after that are systems updated, tested and tuned to defend against these known threats.

This reactive model forces us to deal with the after-effects of a cyber-attack. We need to shift our focus from this incident response to incident prevention.

At BlackBerry, we know this can be done, because in the last 90 days, we stopped more than 1.5 million malware-based cyber-attacks, including more than 200,000 new malware samples, before they had a chance to execute. We did this by leveraging advanced AI and machine learning to continuously uncover and prevent attacks, including ones that had never been seen before. Without prevention-first, advanced AI-driven cyber-solutions like these, Canada is constantly in reactive mode.

Proactive defence also requires clear role definition and a unity of effort. Today, cyber-responsibilities in the federal government are distributed across at least 12 departments and agencies. Multiple ministers have cyber-responsibilities, yet it is unclear who leads and who is responsible for ensuring coherence and a unity of effort.

When cybersecurity doesn't have a dedicated person pushing and fighting for the issue, it sits in the middle of everyone's priority list.

Australia and the U.S. tackled this issue head-on by appointing a cyber minister. In the case of the U.S., it was a presidentially nominated and congressionally confirmed national cyber director. Canada should consider establishing a cabinet or other senior position responsible for ensuring government-wide coherence and action on cybersecurity.

Finally, improving public-private collaboration on cybersecurity should be a priority. Companies like BlackBerry have unique insights and expertise to defend against adversaries, while federal agencies have the means and authorities to act. We should foster proactive collaboration between government and the private sector at the operational level. This would help close gaps in our situation awareness, foster incident response playbooks that are aligned and help create a culture of proactive collaboration at scale.

BlackBerry stands ready to work with the committee to strengthen Canada's cyber-resilience. I thank you for this opportunity today.

8:55 a.m.

Liberal

The Chair Liberal John McKay

Thank you, Mr. de Boer.

Mr. McSorley, you have five minutes, please.

8:55 a.m.

Tim McSorley National Coordinator, International Civil Liberties Monitoring Group

Thank you very much, Chair, for the opportunity to speak to the committee today.

The International Civil Liberties Monitoring Group is a Canadian coalition that serves as a watchdog around national security, anti-terrorism and civil liberties in Canada. We have long-standing experience examining Canadian work regarding surveillance and cyber-activities, including the work of the Communications Security Establishment.

We agree that it is vital that Canada take steps to modernize cybersecurity laws to protect the private information of Canadians and the information infrastructure on which we rely. It is also clear that as cyber-attacks increase in activity and sophistication, Canada must take steps to defend itself; however, these actions must not come at the cost of accountability and transparency of government activities, including those of the CSE.

In our work, we have seen how overly broad powers and extensive secrecy result in the violation of the rights of Canadians and people in Canada. This can have real-world impacts, including when the information of Canadians and people in Canada is shared internationally with the Five Eyes as well as with other foreign agencies. When this information is in the hands of foreign jurisdictions, Canada loses control over how the information may be used, including in ways that can result in rights violations, abuse and even torture.

We also disagree with the premise that the private information of non-Canadians outside of Canada is simply fair game for mass collection and retention. This approach reinforces ongoing global systems of mass surveillance and associated rights violations.

This was revealed in detail by Edward Snowden, and while it did lead to promises of reform within Canada, it is unclear to what degree the CSE's activities have truly changed. While many of these concerns are related to the CSE's signals intelligence work, they also apply to CSE's cybersecurity and cyberwarfare activities. For example, while the CSE may have two distinct areas within its mandate, signals intelligence and cybersecurity and information assurance, they do not exist in a silo.

Recently, the BC Civil Liberties Association published material obtained from disclosure in their lawsuit against the federal government regarding the CSE's operations. These documents revealed, for example, that under an agreement with the former department of foreign affairs, information that CSE collected during its provision of cybersecurity support to the department, including the private communications of Canadians, could be shared with its Five Eyes counterparts. While this agreement dates to 2012, this concern persists under the CSE Act adopted in 2019.

Specifically, the National Security and Intelligence Review Agency, or NSIRA, noted in its 2021 annual report that the CSE Act explicitly allows for this kind of information sharing between the CSE's various mandates, including cybersecurity and foreign intelligence. NSIRA raised concerns that this sharing must be narrow and case by case and that the CSE should obtain legal advice on compliance with the Privacy Act. The CSE disagreed.

Why is this important? Bill C-26, currently being studied by Parliament, would formalize the CSE's role in ensuring the protection of cyber-infrastructure and would see the CSE obtain information about the security of critical infrastructure.

This means that a lot more information will flow to the CSE, including potentially private information relating to Canadians. Without adequate safeguards in place, both in the CSE Act and Bill C-26, information collected by the CSE, including information relating to Canadians, could be used in unexpected ways and shared with unaccountable foreign partners.

For more on this, I'd like to direct the committee to an open letter that we co-signed with several other civil society groups regarding a recent report from Citizen Lab entitled “Cyber Security Will Not Thrive in Darkness”. I can send those along to the committee afterwards.

The CSE also has a troubling history of obfuscating the nature of its work and violating its mandate. For example, the CSE tracked the Wi-Fi connections of Canadians at major airports, despite not being allowed to conduct surveillance within Canada. It collected massive amounts of Internet traffic through 200 Internet backbone sites worldwide. Despite prohibition, it regularly collects Canadians' information. It received it from foreign partners, and it violated Canadian law for five years by failing to minimize Canadian information shared with Five Eyes partners.

The CSE also resists fully complying with review and oversight. For example, the CSE refuses to grant NSIRA full access to records that the agency needs to carry out its review function. Instead, the CSE requires NSIRA to submit a request, and CSE staff provide what they say are relevant documents. This approach, NSIRA wrote in its latest annual report, “undercuts NSIRA's authority to decide whether information relates to its reviews and contributes to significant delays in the provision of information to NSIRA.”

The intelligence commissioner has also raised concerns that CSE authorizations for both foreign intelligence and cybersecurity have not included information crucial to the approval process, particularly regarding the outcomes of previous authorized activities or explanations of specific activities based on facts.

Finally, NSIRA has also raised concerns that the CSE is not providing adequate information on the impact of active or defensive cyber-operations nor appropriately delineating between the two kinds of activities, despite each requiring a different approval process.

I do have some recommendations, very short ones, but I will save those for the question period.

Thank you very much.

9 a.m.

Liberal

The Chair Liberal John McKay

If, in fact, you don't get them in during the question period, you can certainly submit them through the clerk.

With that, we'll go to our six-minute rounds, and we'll start with Mr. Kelly.

9 a.m.

Conservative

Pat Kelly Conservative Calgary Rocky Ridge, AB

Thank you.

I'm going to start with Mr. de Boer, but I might ask all three witnesses to comment on my question.

I want to talk about the threat that I would think of as corporate espionage or the vulnerabilities within the private sector to cybersecurity. There was an article recently that talked about how hackers can manipulate the temperature of a barn and wipe out livestock populations, or that the food supply chain in Canada was particularly vulnerable to cyber-attack. That goes well beyond damage to a private corporation; it goes right to food security and things like that.

I will start with you and have each witness comment on the vulnerabilities within the private sector that affect national security.

9 a.m.

Senior Director, Government Affairs and Public Policy, Canada, BlackBerry

Dr. John de Boer

Thank you, Mr. Chair. It's an excellent organization.

The focus of cybersecurity up until now has been largely on what we call enterprise IT systems. One of the largest gaps that has emerged is in operational technology. These are typically systems that control, for instance, an electricity grid, gas-powered turbines, industrial control systems in pipelines, etc. A lot of these systems are now coming online. What we witnessed in the U.S., for instance, related to the Colonial Pipeline attack, or even in Florida's Oldsmar water system, is that these systems were not designed to be connected to the Internet, including farm equipment etc., and people are now trying to enable optimization through connection to the Internet.

We noted, for instance, in the manufacturing sector over the past year that the number of attacks has risen by 2,000%. The three sectors most targeted over the past year by cyber-criminals have been health care, financing and manufacturing, but manufacturing is rising the most quickly. Why? Our assessment is that because of the supply chain vulnerabilities that we're seeing and because of the intrinsic link between economic security and national security and the fact, as I mentioned earlier, that everything is intertwined, those are becoming increasing attack vectors.

9:05 a.m.

Conservative

Pat Kelly Conservative Calgary Rocky Ridge, AB

If you don't mind, I'll ask the other witnesses to comment as well. Maybe I'll have time for other questions.

Go ahead.

9:05 a.m.

Liberal

The Chair Liberal John McKay

Mr. Nared, would you comment?

9:05 a.m.

Chairman of the Board, Slovenian Certified Ethical Hackers Foundation, As an Individual

Tadej Nared

Cybercrime, which is the term we usually use to describe both industrial espionage and ordinary crime activities, is in fact the third-largest economy in the world. By 2025, the damage resulting from cybercrime is going to amount to $15 trillion. It grows by an amount of $1,500 billion a year. It is a huge problem. Efforts conducted in this matter are not on par with the damage that is occurring and growing.

Taking into account what the previous witness was talking about, attacks on critical infrastructure especially, which are forbidden by the Geneva Conventions because they attack civilian infrastructure, are growing daily. We have to take nation-state actors into account, especially Russia.

This was what I was trying to bring into force before the Vulkan files. Before, we were just speculating on their capabilities, but now we are certain, and we have confirmation that they are collecting data all over the world. They are compromising systems, power plants, hydroelectric power plants, electricity grids and civilian infrastructure from hospitals to everything else. They are collecting that, scanning systematically and collecting vulnerabilities in one huge, giant database and preparing, in a way, for a black swan scenario.

What I'm really concerned about is that western countries, NATO countries, are not protecting their infrastructure in the manner that they should be. It is a huge problem, and it should be addressed promptly.

9:05 a.m.

National Coordinator, International Civil Liberties Monitoring Group

Tim McSorley

Just very briefly, it's clear that there's a role for the federal government in supporting private companies in increasing their cybersecurity and protecting national security. We think that one thing that's key to this is that there's trust and transparency around that process so that private companies can trust what the government is going to be doing when they provide that support. The public needs that trust and understanding around what those services are. We think that needs to be a central component of legislation like Bill C-26.

9:05 a.m.

Conservative

Pat Kelly Conservative Calgary Rocky Ridge, AB

Okay, thank you.

If I can just have a quick moment, I want to ask something quite specific resulting from Mr. Nared's testimony.

9:05 a.m.

Liberal

The Chair Liberal John McKay

So do I, but you're bang on six minutes. If I do, the trouble is that the whole thing just goes south on me if I let one run away. I'm sorry, Pat,

9:05 a.m.

Conservative

Pat Kelly Conservative Calgary Rocky Ridge, AB

Well, maybe in somebody else's time, you can quantify that multi-trillion-dollar number.

9:05 a.m.

Liberal

The Chair Liberal John McKay

It is a shocking number. I picked up on it as well.

Mr. May, you have six minutes.

9:05 a.m.

Liberal

Bryan May Liberal Cambridge, ON

Thank you, Mr. Chair.

Mr. de Boer, you noted in a 2021 post for the Canadian Chamber of Commerce that:

The OECD reports that Canada is one of the few countries where technology R & D investment, is “stagnant,” investing only 1.5 percent of GDP and declining—while Canada's competitors are investing billions to improve their cybersecurity capabilities.

In your opinion, sir, what are some of the factors that contribute to that under-investment in R and D by the Canadian private sector?

9:10 a.m.

Senior Director, Government Affairs and Public Policy, Canada, BlackBerry

Dr. John de Boer

That was in 2021, but the data remains the same today. We are laggers when it comes to R and D investment. While we welcome, for instance, the renewal and revision of the SR & ED announced very recently, enterprises benefit much more from developing R and D outside of Canada, particularly multinational corporations, because there are much more collaborative support systems in place, whether with university-based research or elsewhere.

BlackBerry has made a commitment to invest in Canada. We invest about 24% of our annual revenue in R and D, working very closely with Canadian universities, etc., but not all companies are incentivized to do so.

There really needs to be a concerted partnership between government and the private sector, not all across the board, but betting in particular niche areas where Canada has a comparative advantage. Our post here was that cybersecurity is one of the areas where Canada has a comparative advantage. We rank fourth in the world in the number of cybersecurity companies, but we're not keeping up the pace with Israel, the U.K. or the U.S., which is far ahead of us.

9:10 a.m.

Liberal

Bryan May Liberal Cambridge, ON

Can you elaborate a little bit more and provide some recommendations on how we can take steps to ensure that IP grown in Canada, often with the help of direct or indirect public funding, stays in Canada?

9:10 a.m.

Senior Director, Government Affairs and Public Policy, Canada, BlackBerry

Dr. John de Boer

I think one of the key things here is commercialization.

There's a lot of what we call lower TRL—technology readiness level—or very initial-stage R & D that takes place in Canada, but then, after it passes this initial stage, it goes through something called the valley of death, which means that it's very difficult to productize this R & D here in Canada.

There are very few programs, for instance, that support Canadian companies to help launch initial products to test them and get them to market, while in the United States, for example—of course, U.S. government procurement budgets are much larger—their procurement process is much more agile. They have systems in place to help companies get through that valley of death to help commercialize their products.

One of the suggestions that we put forward with the Canadian Chamber of Commerce was to establish a Canadian commercialization fund that would help Canadian companies move towards that productization.

The Canada innovation corporation, which was announced in the 2022 budget, may be a start, but we have yet to have very much detail about that. We're hopeful that the whole commercialization question there, which will help commercialized products here in Canada keep IP in Canada, would be a key aspect to that question.

9:10 a.m.

Liberal

Bryan May Liberal Cambridge, ON

We've heard a number of times that there are concerns that electronic components manufactured by state-affiliated corporations in countries like China pose a cybersecurity risk in Canada. Should we be concerned about the cybersecurity risk posed by offshore manufacturing of IT equipment?

9:10 a.m.

Senior Director, Government Affairs and Public Policy, Canada, BlackBerry

Dr. John de Boer

BlackBerry, because it created devices, was very focused on ensuring that all of the components in those devices, including software, were what they said they were. We even developed software that helped us identify the provenance of each component.

This is a huge concern in the U.S. You have executive order 14028, which is about the nation's cybersecurity. It mandates what they call a software bill of materials that would basically produce an ingredients list of all software contained in every device. Right now, if you ask people what software is in their system or in their device, very few people know about it.

Part of the problem is also open-source software. This is free software available on the Internet that is used widely, but there are high security vulnerabilities there.

I think one thing that Canada should consider that many other countries in the EU and the U.S. are considering is making sure that there's a commitment to secure-by-design principles. You can't bolt on security afterwards.