Mr. Chair and members of the committee, I thank you for this opportunity to testify on Bill C-59, the national security framework legislation.
I'd like to begin with a look backwards. I had the privilege 16 years ago of testifying before a House committee on the original Anti-terrorism Act. I think it might have been, in fact, in this beautiful room. One of the lessons I drew from that experience was that Parliament, if given the chance, could have a significant impact on improving draft legislation and on enabling a strong, if inevitably contentious, public debate. Given the professed openness of the Minister of Public Safety to constructive suggestions, I am optimistic that a similar result will occur from deliberations on Bill C-59.
Bill C-59 represents a very ambitious and sweeping effort to modernize the Canadian national security framework. It should not be seen as just a form of tinkering with the previous government's Bill C-51. There are so many elements in Bill C-59, and as you will have appreciated from testimony by my colleagues, I, like them, am going to focus on only a few elements of this.
The ones I want to focus on are what I call the key forward-looking elements of Bill C-59. By “forward-looking” I mean the genuinely new elements in this legislation, which pose particular challenges for a committee like this in terms of trying to understand their precise potential impact and efficacy. Those three brand new elements, I think, are particularly visible in parts 1 to 3 of the legislation, so that's what I am going to concentrate on, but I'd be happy to take questions on other aspects of the bill.
Part 1 of the act creates a national security and intelligence review agency. I fully support this concept and its rationale, and it is exciting to me to see it embraced by the government. The challenge will be ensuring that the architecture can be made to work. To bring the legislation to light, it will be important to ensure that NSIRA, as I'll call it, has the right fiscal and logistic resources, a high-quality talent pool in its secretariat, excellent working relationships with the security and intelligence agencies, and a viable work plan. It will also be important to ensure that the bodies that are to be reviewed have the resources and proper approach to the enhanced scrutiny they will undergo.
NSIRA part 1 needs, in my view, a few fixes. One has to do with the mandate, in proposed section 8. I believe that the national security and intelligence activities of the RCMP should be specifically listed at proposed paragraph 8(1)(a). It is important to be clear in the legislation that NSIRA will take over some of the current review activities of the Civilian Review and Complaints Commission for the RCMP as it is doing for SIRC and for the Office of the CSE Commissioner. This should not be left simply to coordinating amendments buried in the back of the legislation.
The committee will also note that NSIRA enacts only a partial solution to the problem of dealing with national security complaints, at proposed section 16 and following. Its complaints remit is restricted to CSIS, CSE, and complaints regarding the RCMP that have a nexus in national security, and I would urge the committee to hear from the commissioner of the Civilian Review and Complaints Commission for the RCMP about how well they think the legislation enables the NSIRA complaints mandate when it comes to the RCMP.
Finally, there's an important issue of membership, as you've already heard, in NSIRA. This is at proposed section 4 of the bill. The procedures proposed are, disappointingly to me, an automatic carry-over from SIRC, but SIRC membership has had a sometimes deeply troubled history. Membership size and profile need, I think, to be rethought. In my view, the SIRC membership should be enlarged to allow for more diverse and expert representation and to reduce the burdens on members hearing complaints.
NSIRA membership should also reflect, in my view, a wider range of expertise in security and intelligence issues, including expertise in security threats, on intelligence practices, on international relations, on governance and decision-making, on civil liberties, on community impacts, and on privacy. Those are seven sets of expertise right there.
The ability of NSIRA to get up and running once legislation is passed will be vitally dependent on the continued strength, capacity, and forward planning of the Security Intelligence Review Committee, which will be NSIRA's core. It would be very unfortunate if anything occurred to weaken SIRC in the transition.
Part 2 of the bill is on the intelligence commissioner. Legislation to establish an intelligence commissioner to engage in proactive oversight of aspects of the work of CSE and CSIS is a novel concept that has no counterpart that I'm aware of among our Five Eyes partners. We are being truly innovative here. The concept that's been adopted, I believe, is a made-in-Canada solution to ensuring the legality and charter compliance of some of the most sensitive and important operations conducted by our main intelligence collection agencies, CSE and CSIS.
With regard to the function of the intelligence commissioner, I would like to offer two thoughts and one recommendation.
One thought is that it would be important that the system is and is seen to be a way of ultimately strengthening rather than diluting ministerial accountability, even while it gives some oversight powers to the intelligence commissioner. The second thought is that the ability of the minister to retain traditional powers of accountability while ceding some decision-making authority to the intelligence commissioner is linked in turn to the working of new reporting mechanisms proposed in part 1 of the act.
NSIRA will produce a much stronger stream of reporting to the minister on the activities of the key intelligence agencies, which, if that stream of reporting can be properly digested by the minister and his office, should ensure that the minister can issue authorizations that will pass muster with the intelligence commissioner. In this way part 1 and part 2 of Bill C-59 are intimately linked.
The recommendation I have to offer is that the intelligence commissioner function must not go dark. The Office of the CSE Commissioner, on which the function will partly be based, produced an annual report to the minister that was tabled in Parliament. This has been the practice since the commissioner's office was established in 1996. There is no such requirement at present for the intelligence commissioner. I believe the intelligence commissioner should be required to table an annual report that would review the commissioner's activities and findings.
Then there is part 3, the CSE act. I fully support the importance of creating separate, modernized legislation for CSE, distinct from the National Defence Act. CSE is one of Canada's most important, if not the most important, intelligence collection agency. It provides our principal contribution to the Five Eyes intelligence partnership. Getting the CSE act right is vital to Canada's interests and deserves close attention by the committee.
CSE received its first enabling legislation with the passage of the Anti-terrorism Act back in 2001. It is that legislation that is being modernized with Bill C-59. There were no changes to CSE legislation proposed in the previous Bill C-51.
The CSE act expands the current three-part mandate of CSE by adding two additional powers for what are called active cyber-operations and defensive cyber-operations. Let there be no mistaking that these are major new powers for CSE.
Both kinds of operations require ministerial authorization. Active cyber-operations engaging overseas targets require the consent of the Minister of Foreign Affairs. There have been some concerns raised in Parliament about the need for such consent. I think it is absolutely essential, given the volatile nature of such operations and their potential for blowback against Canadian international interests.
Active cyber-operations are what I call a digital form of covert operations, somewhat akin to classical Cold War covert operations designed to destabilize the capacities of a foreign adversary. In addition to blowback effects, they can also engage an escalatory spiral, as we saw, for example, in the aftermath of the cyber-operation known as Stuxnet, which targeted the Iranian centrifuge cascade that was central to their uranium enrichment program and nuclear weapons development. Active cyber-operations require high degrees of intelligence knowledge and technical skills, but they also require high degrees of political oversight and strong agency command and control.
It is also important to understand that many, if not all, of the operations that CSE might conduct in the future under its active cyber-operations mandate will be mounted within a Five Eyes context. I don’t think we’re going to be going it alone on these ones. This is all the more reason for there to be what has been called “a dual-key approach”. Neither active nor defensive cyber-operations require the consent of the intelligence commissioner, which is something the committee might want to look into, but such operations will be subject to review by the new national security and intelligence review agency.
The CSE act is a very complex piece of legislation. It might be a lawyer's dream, but it would be a layman's nightmare to read. It contains some very important provisions that are sprinkled throughout the bill with little connecting narrative thread. My recommendation with regard to part 3 is that there should be a values principle built into the legislation, perhaps at the proposed mandate section, to draw together some of these different component parts, and I will provide a brief on that.
I was going to add a brief set of remarks about what isn’t in the legislation, but I’m happy to address that in questions.
Thank you.