Refine by MP, party, committee, province, or result type.

Results 1-15 of 43
Sort by relevance | Sorted by date: newest first / oldest first

Procedure and House Affairs committee  Thank you, Mr. Chairman. I am happy to be given the opportunity to appear before the committee today. My name is Toni Moffa and I am the assistant deputy minister or deputy chief of the information technology security program at Communications Security Establishment Canada, or C

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  What we generally know about Anonymous is available from open sources mostly. Certainly what we're interested in, when we look at groups or individuals such as these, are the techniques they use and some of the technical techniques they could use to conduct IT security breaches

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  Unfortunately, the best advice I can provide only relates to IT security: how they may be breached and how we can prevent those. As to other issues surrounding this situation, I'm not very qualified to respond to that.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  The threat that you're referring to, I assume, is referring to—

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  —the posting of the videos. From our perspective, it's not an IT security breach that we would deal with.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  It would be best dealt with by an investigative body or agency that would do that type of investigation and leverage their partnerships.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  Our international partnerships are most closely aligned with those who conduct similar activities to our own, so those are not investigative bodies.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  In relation to this specific situation, or more generally?

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  For the purposes of protecting federal systems, yes, we look at those connections to the Internet and activities going on there for any signals of threat activity that may cause harm to our federal networks.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  From our technical expertise perspective, a publicly available tool was used to post some information, in this case a video, to the Internet. So from information available to us, that is not an IT security breach in our minds, right? It's not a technical threat.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  I'm aware there's an investigation ongoing, but it would be inappropriate for me to comment on that.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  Part of our mandate is to offer assistance to other federal departments, should they request it, in the pursuit of their own mandate. So there is an opportunity for them to use our technical expertise, upon request.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  I see, yes. What we look at are threats that are not publicly known. Commercial technologies do a really good job of taking care of publicly known malicious activity, occurring through malicious software. So your anti-virus software, your firewalls, have good methods and techniqu

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  From this video, from an IT security perspective, I don't see any.

April 3rd, 2012Committee meeting

Toni Moffa

Procedure and House Affairs committee  An IT security breach....

April 3rd, 2012Committee meeting

Toni Moffa