Evidence of meeting #146 for Public Safety and National Security in the 42nd Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was cybersecurity.

A recording is available from Parliament.

On the agenda

MPs speaking

Also speaking

Satyamoorthy Kabilan  Vice-President, Policy, Public Policy Forum
Christian Leuprecht  Professor, Department of Political Science, Royal Military College of Canada, As an Individual
Ruby Sahota  Brampton North, Lib.
Scott Jones  Head, Canadian Centre for Cyber Security, Communications Security Establishment
Eric Belzile  Director General, Incident Management and Threat Mitigation, Canadian Centre for Cyber Security, Communications Security Establishment
Jim Eglinski  Yellowhead, CPC

4:15 p.m.

Professor, Department of Political Science, Royal Military College of Canada, As an Individual

Dr. Christian Leuprecht

There are four different strategies that countries can take with regard to data.

Maybe I will make a separate submission to explain, because it might take up too much time.

4:15 p.m.

Brampton North, Lib.

January 30th, 2019 / 4:15 p.m.

Professor, Department of Political Science, Royal Military College of Canada, As an Individual

Dr. Christian Leuprecht

There are only four strategies that countries can pursue. I think that, given the disproportionate advantage Canada has with the number of data farms that Canada already houses—we're in a cold climate and we have lots of relatively cheap electricity, so lots of private players are already putting their data farms here in Canada—we actually have the ability to do this in a way that other countries might have much greater difficulty doing. It means that not only are those data then subject to Canadian law, but we are also able to impose requirements on industry that industry can then verify by virtue of those data continuing to be located in Canada rather than being farmed out throughout the world.

4:15 p.m.

Brampton North, Lib.

Ruby Sahota

So you're saying we definitely have the capacity to do that.

4:15 p.m.

Professor, Department of Political Science, Royal Military College of Canada, As an Individual

Dr. Christian Leuprecht

We have the capacity to do that; it's just a question of.... That's why I say that some regulation and tax incentives and whatnot can help in that regard.

4:15 p.m.

Brampton North, Lib.

Ruby Sahota

I've read some comments about our investment in AI and Canada becoming an AI superpower. This government has definitely taken a few measures in terms of investing more money. Minister Bains has made several announcements in the last several months when it comes to supporting AI technology and different companies. Can you elaborate a little bit on the previous comments you made?

4:15 p.m.

Professor, Department of Political Science, Royal Military College of Canada, As an Individual

Dr. Christian Leuprecht

AI is not this sort of fantastic, magical hat we pull a rabbit out of and whatnot. I mean, AI is just math. It's just fancy, sophisticated math and its applications. While the government has invested significantly in various applications of that, the irony is that the government has not made an investment in the cybersecurity side of those applications.

We're generating lots of highly qualified personnel—“HQP”, as we call them in academia—but we have a massive disconnect between the cybersecurity side of generating the people who are in demand and our ability to have programs that will generate those in universities. We're doing lots of great, fun research, but it's not directed at generating cybersecurity talent.

I would bring up Australia again. They have nine different centres now that deal with cybersecurity. In Canada we really have none. We run our Smart Cybersecurity Network, SERENE-RISC, which we stood up with a colleague at the University of Montreal, but that's about it. I think we need to do a lot more. We can buy all the technology we want and we can make all the investments we want, but if our adversaries are simply going to steal all of our R and D investments, at billions of dollars a year, what's the point of putting money into R and D? And why, as a foreign company, would you invest in R and D in Canada, or in our AI investments, if you knew that we couldn't keep secure the intellectual property generated?

4:20 p.m.

Brampton North, Lib.

Ruby Sahota

Okay.

We had a witness just at the last meeting. Public Safety is working on creating a cybersecurity centre and also, within Defence, Minister Sajjan launched, last October I believe, the Canadian Centre for Cyber Security. I was wondering if I could get some of your views on that, Mr. Kabilan. I believe that's something you said you have also taken much interest in.

4:20 p.m.

Vice-President, Policy, Public Policy Forum

Dr. Satyamoorthy Kabilan

Certainly. The cybersecurity centre I believe you're alluding to is what's going to be spun out of CSE eventually, and I think you have Scott Jones coming in after this to talk about it. When I've discussed this with the government, I've talked about the analogy with what the U.K. has done with the National Cyber Security Centre. I see, certainly from the submissions and from the various discussions that have been had around this new centre in Canada, that it's trying to mirror a lot of what the National Cyber Security Centre does in the U.K.

Just to give you some context, I mentioned earlier that education and information are two big key elements when it comes to cybersecurity. That's what the NCSC in the U.K. does very, very well. It helps to bridge that disconnect between the public and the private sector in terms of getting information across, but it also does it in a way that's accessible to anyone. It gives advice to you personally; it gives advice to small and medium enterprises, and it goes all the way to the high end. My understanding is that this new centre in Canada is going to mirror some of that functionality. If it can, particularly in that education and information sharing piece, then it will be an incredibly valuable tool in terms of helping us build our capacity and our resilience to cybersecurity threats.

However, the challenge is with what Dr. Leuprecht brought up just now, which is the idea of skills. In the U.K., the NCSC actually runs competitions as well. It gets, for example, young women to come and code, and that actually helps to bridge the gender gap. What I haven't seen clearly is some of these elements to address the questions that Dr. Leuprecht brought up about not only sharing information but also using that as a platform to build the required skills to continue to support the development of cybersecurity in Canada. It will be interesting to see how that develops.

4:20 p.m.

Brampton North, Lib.

Ruby Sahota

Do I have any more time?

4:20 p.m.

Liberal

The Chair Liberal John McKay

You have one minute.

4:20 p.m.

Brampton North, Lib.

Ruby Sahota

In terms of skills development, we heard this in the last meeting as well, and for some of these jobs, government prefers to hire trained Canadians because of the security that's required. How do we go about doing this with our academic partners in order to create more centres, like those Australia has, and follow in the footsteps of the U.K., which you speak highly of as well? How do we establish that without government doing it all?

4:20 p.m.

Liberal

The Chair Liberal John McKay

Be very brief, please.

4:20 p.m.

Vice-President, Policy, Public Policy Forum

Dr. Satyamoorthy Kabilan

There are a couple of different challenges there, but I think the first issue is—and I think Dr. Leuprecht would be able to answer this more fully as well—making sure there's a chain that works all the way from education to the job at the end. We actually have some very good examples here in Canada, in fact one here in Ottawa, which is Algonquin College. They actually produce some great cybersecurity graduates. They have a program, and a big chunk of them get hired by CGI directly.

4:20 p.m.

Liberal

The Chair Liberal John McKay

Thank you.

4:20 p.m.

Vice-President, Policy, Public Policy Forum

Dr. Satyamoorthy Kabilan

We're actually producing the skills and getting them hired. It's about getting that pipeline aligned.

4:20 p.m.

Liberal

The Chair Liberal John McKay

Thank you, Ms. Sahota.

Mr. Paul-Hus, you have the final five minutes.

4:20 p.m.

Conservative

Pierre Paul-Hus Conservative Charlesbourg—Haute-Saint-Charles, QC

Thank you, Mr. Chair.

Mr. Leuprecht, you spoke at length about Huawei and the risks that it presents to the security of Canada, due to several factors. The document you tabled contains several recommendations that are important for the committee. It mentions the Huawei Cyber Security Evaluation Centre.

Is this a group of enterprises? What exactly is that evaluation centre? Who is a part of it?

4:20 p.m.

Professor, Department of Political Science, Royal Military College of Canada, As an Individual

Dr. Christian Leuprecht

The centre is a collaborative effort between the United Kingdom Government Communications Headquarters, or GCHQ, and Huawei. Its purpose is to strengthen links with Huawei and give the GCHQ the opportunity to verify the security of that enterprise's equipment. Despite that collaboration effort, a public report, which I can send to the committee, still came to the conclusion that Huawei products are suspect.

4:20 p.m.

Conservative

Pierre Paul-Hus Conservative Charlesbourg—Haute-Saint-Charles, QC

So after having worked with that company, that was the final conclusion.

There is a debate in Canada at this time as to whether we should continue to do business with Huawei. According to certain interest groups, it is very important for Canada to adopt 5G technology because it is superior technology, but in your opening statement you said that that technology presents a risk to national security.

We are not experts, but we hear a lot about this. You are a professor at the Royal Military College of Canada, and other experts throughout the world agree with you. Could you explain to us in simple terms why we need to get rid of Huawei technology?

4:25 p.m.

Professor, Department of Political Science, Royal Military College of Canada, As an Individual

Dr. Christian Leuprecht

In the interest of clarity, I will answer in English.

I think there are a couple of key risks. One is the pyramidal structures of the switches within the Internet. The higher up you are in that pyramid, the more traffic you can extract from the Internet. Currently, our adversaries have to try to get very high up in the Internet to extract as much traffic as they can. In the absence of that, they will reroute traffic. If the technology is embedded throughout the entire Internet, you don't have to make an effort to get at those switches anymore. You can just extract the entire traffic from the infrastructure as is.

The other problem is that even though we might test the technology,

—and this technology seems entirely safe to us—but we have to be able to update it. That is the problem.

There's always the ability for the manufacturer or an adversarial government to reach into that technology and, in the update process, install vulnerabilities in the technology. As for anything in life, it's an insurance policy that we take out.

Look at the November release by the joint congressional commission for the common defence, co-chaired by Ambassador Edelman. In its report, which you can download from the United States Institute of Peace, the commission concludes that if the U.S. today got into a war with Russia, China, or both, the U.S. would likely lose. Why? Because the war would start with a massive attack on the vulnerabilities within the critical infrastructure of, let's say broadly, the national grid; I don't mean just electricity. As a result, it would create such vulnerability, chaos and instabilities within the country that the U.S. would not have an opportunity to respond. It sure was a wake-up call in the United States. Countries such as China reserve the privilege of a first strike when it comes to cyberspace. This is part of the Chinese doctrine.

How much vulnerability and risk are we willing to expose ourselves to as a country? If we find ourselves in that situation, then it's a little late to go back.

4:25 p.m.

Conservative

Pierre Paul-Hus Conservative Charlesbourg—Haute-Saint-Charles, QC

Thank you.

4:25 p.m.

Liberal

The Chair Liberal John McKay

Thank you.

I hate to bring this to an end. This has been absolutely fascinating. I'm sure we could go on for a while.

On that last question, let me ask one brief question. Is it beyond the realm of possibility that a cyber-attack could trigger an article 5 NATO response?

4:25 p.m.

Vice-President, Policy, Public Policy Forum

Dr. Satyamoorthy Kabilan

It has been hotly debated whether or not it could. The EU had a session on this in 2017. The answer was, “We don't know.”

4:25 p.m.

Liberal

The Chair Liberal John McKay

That's comforting.

With that, I think I'm going to have to bring it to an end. I regret having to bring it to an end.

We're going to suspend and then re-empanel.

Again, on behalf of the committee, thank you both.