Thank you very much, Chair, and thank you, committee members. I'm both honoured and humbled to be with you today. I really do appreciate it.
In advance of this, I watched all of the other witnesses' testimony. I think my best advice to this committee is that if we focus too much only on emergency management and preparedness, we miss an opportunity for strategic foresight and planning. That's really where I'm going to try to steer my comments.
An emergency exists, and we're responding by definition, but we need to get to a point where we have a strategic plan in this country that's supported by all parties. The reality is that no matter who forms a government, the threats that any leader faces will be the same across the board. In other words, this has to be a non-partisan effort if we want to get it right in the truest sense.
The second bit of advice I would offer is that while we're talking about Russia in the context of this committee, obviously these threats don't come from just Russia. We all know that. I would simply pause and say that what we consider here has much broader application.
We're going to talk about critical infrastructure. I'm going to read one quote from a U.S. official, who aptly put it that “This is pretty mind blowing...going to work every day behind sealed doors, essentially trying to figure out if it was possible to cripple an entire nation's infrastructure without ever firing a shot or dropping a bomb.” The answer is, yes, it is. This should give all Canadians pause. That's the context in which we're having this conversation.
I want to be of the most assistance I can to this committee, so I will do two things. First, I will offer an assessment of the specific threats enumerated in the standing order, but I'll break it out in terms of what I think you can change and what I think you can't change. It only makes sense to focus on the things you actually can change.
Then I will offer a recommendation that I think, if acted upon, will mitigate against either an overly narrow approach to national security or ex post reactionism. It's the Wayne Gretzky thing. Wayne Gretzky was the greatest hockey player of all time because he skated where the puck was going to be, not to where it was. I just feel like oftentimes we're goaltending right now. We need to get past that. We need a strategic framework that we can lean into the world.
On specific threats, first, the study asked us to look at critical infrastructure, both physical and cyber. I would urge you to focus on cyber. There are two reasons for that. Number one, most critical infrastructure is cyber-enabled anyway. Number two, if we're addressing a Russian kinetic strike on Canadian critical infrastructure, we're in NATO article 5 territory at that point. You can't really change that.
Let's focus on cyber. There are countless examples. All of the other witnesses have talked about that. I won't go through the examples. Let me just draw two broad trends that I see. What makes these weapons so dangerous is that they're deployed in secret, they're developed in secret and they're doctored in secret. What that means is that we might bump into each other's red lines by accident. That creates a tremendously dangerous operating environment.
The study also asked us to look at the prevalence and impact of Russian misinformation. I think it's important that we draw the distinction between “misinformation” and “disinformation”. Disinformation was actually omitted from the standing order, and I think that was maybe just by accident, because really what we're talking about is Russian disinformation.
What can the committee practically do? Focus on amplification. That's the sweet spot for our work. As 39% of all Internet traffic is from bad bots, that is where you can focus to make a difference. Automated traffic makes up 64% of all Internet traffic—64% is bots. Let me just pause there for a second. With 39% of all Internet traffic from bad bots, here are two practical things we can do.
Go after the money. People don't wake up in the morning with a sense of civic duty to run a Russian bot farm. They want to get paid. The sanctions that are in place against Russia I think are proof of concept. Let's lean into that.
The second thing we can do is look at the technical architecture of the Internet. There are ways, with something called the “domain name” system, to make sure that the large bot farms don't resolve. Point them into the ocean or into outer space. We have to lean on the architecture of the Internet to lower the amount of traffic.
We can also work with international partners to come up with a definition of what bad bots are, and then work with the technical architecture of the Internet and those providers to limit the flow.
The study also asked us to look at espionage, sabotage and weapons of mass destruction. Well, on the question of WMD, this is an area you likely can't change. If Russia uses WMD, all bets are off. You're probably into NATO article 5 territory there.
On espionage and sabotage, this is already happening, but again, this is principally cyber-enabled. There's a dynamic interplay between economic security and prosperity and actual national security here. We just need to think about a way that we can harden Canadian companies. I have some thoughts on that, if you want to get into it in the question and answer period, in terms of how we can practically help our companies in this operating environment.
What we really need overall is a new national security strategy that is a truly non-partisan effort.