Evidence of meeting #119 for Procedure and House Affairs in the 44th Parliament, 1st Session. (The original version is on Parliament’s site, as are the minutes.) The winning word was information.

A video is available from Parliament.

On the agenda

MPs speaking

Also speaking

Caroline Xavier  Chief, Communications Security Establishment
Rajiv Gupta  Associate Head, Canadian Centre for Cyber Security, Communications Security Establishment

11:45 a.m.

Liberal

Sherry Romanado Liberal Longueuil—Charles-LeMoyne, QC

Thank you very much, Mr. Chair. Through you, I'd like to thank the witnesses for being here today.

We received the chronology of events that you provided us. Thank you very much for that.

Based on the chronology and your testimony today, it appears that the communication between the cyber centre and the House of Commons IT was pretty much almost a one-way dialogue. I'm seeing repeated indications that the House of Commons IT did not provide you with feedback or did not provide the cyber centre with follow-up, despite requests.

Can you confirm that was in fact the case between January 22, when you started to see this activity, and the time that the FBI provided the report?

Is that correct?

11:45 a.m.

Chief, Communications Security Establishment

Caroline Xavier

I will ask Rajiv to answer that question.

11:45 a.m.

Associate Head, Canadian Centre for Cyber Security, Communications Security Establishment

Rajiv Gupta

Thank you very much.

From our understanding.... You can see the chronology; the timeline is laid out.

We were reaching out for information. We don't know what happened on the other side in terms of how long it takes to get that information. As I said, it's a collaboration. We've worked well with the HOC in the past and have tons of respect for their folk.

I think that when we did get together to meet, information was shared. There was that sharing of information. You can see on the timeline when that occurred.

11:45 a.m.

Chief, Communications Security Establishment

Caroline Xavier

I would add that it's not abnormal in any cyber-incident that we deal with, especially with critical information or a private sector company, that the information is perceived as one way, because they are managing their issue. They're living it. It's not abnormal for them to take the time they need to eventually get back to us or possibly not tell us. This is how that sometimes happens.

11:45 a.m.

Associate Head, Canadian Centre for Cyber Security, Communications Security Establishment

Rajiv Gupta

One item I'd like to add is that this was a very sophisticated threat actor on HOC networks. We found the very early stages. The tracking links are the first stage. The next stage would be a dropper. The next stage would be actual exploitation software, which would have been very serious.

We would like to reinforce that the steps taken between HOC and ourselves prevented a compromise of HOC networks by this sophisticated threat actor.

June 6th, 2024 / 11:50 a.m.

Liberal

Sherry Romanado Liberal Longueuil—Charles-LeMoyne, QC

You're mentioning the HOC network. We understand that in the case of MP Genuis, his personal email was actually also targeted. We understand from House of Commons IT that they're not monitoring, obviously, the personal emails of members of Parliament.

I'm assuming CSE has the ability to see, regardless of whether it's HOC email addresses or if it's a personal address—you don't have to divulge how you do what you do publicly—but there seems to be a gap somewhere, because members of Parliament obviously have personal email addresses to do partisan activities and personal activities. In this case, there seems to have been a gap between who was flagging to the MP that their personal email was receiving spam mail.

With the rest of my time, I'd like to turn it over to MP Collins. I know he has some questions as well.

Thank you.

11:50 a.m.

Liberal

Chad Collins Liberal Hamilton East—Stoney Creek, ON

Thank you, and thanks to the witnesses for their attendance today.

You talked about a team approach. Mr. Gupta talked about the decade-long relationship that you have, working with partners. You mentioned the word “partner” several times in your opening. It's a team environment. Someone mentioned, in one of the responses to the questions, a memorandum of understanding.

Why was that put in place? Does it address any of the questions and issues that have been raised in today's meeting or last meeting?

11:50 a.m.

Chief, Communications Security Establishment

Caroline Xavier

When we're going to be doing work with an entity that is in Canada in particular, or any entity with whom data may be exchanged that we may need to collect to be able to do some analysis to identify the threat in a better way and better understand the origins, a memorandum of understanding or an instrument of some sort is often put in place to really clearly outline how and why the information will be shared.

This is linked back to the fact that our mandate works really hard to protect the privacy of Canadians and not infringe on those rights. In particular, especially as an organization may take on some of the services we offer—host-based sensors, network-based sensors and cloud-based sensors—depending on the services that an organization takes on, that is the other reason an MOU would be put in place. It's the exchange of information that is happening or possible support to a monitoring element, so that we can continue to educate, learn from it, and clearly outline how the data is being managed.

11:50 a.m.

Liberal

The Chair Liberal Ben Carr

Mr. Collins, unfortunately that's the time, but I do have you for five minutes at the very end of this round.

Ms. Gaudreau, you have the floor for two and a half minutes.

11:50 a.m.

Bloc

Marie-Hélène Gaudreau Bloc Laurentides—Labelle, QC

Thank you, Mr. Chair.

Ms. Xavier, I have three questions to ask you and I think I have enough time.

Earlier, I was reassured when I asked if services were sufficient, specifically in terms of human resources. I went back and found out that on October 11, 2023, not so long ago, the CBC said that the Communications Security Establishment was in crisis. It’s not against anyone. We’re trying to be constructive. Has the situation changed so completely that you can now tell me you’re able to adjust if the House administration or even the legislation change?

11:50 a.m.

Chief, Communications Security Establishment

Caroline Xavier

Thank you for the question.

I’m not sure which CBC article you’re referring to. However, I can tell you that, during an interview with Ms. Bureau, if memory serves, we talked about the resources and skills the Communications Security Establishment needs and is looking for.

In that interview, I said that the Canadian Centre for Cyber Security and the Communications Security Establishment were not the only ones looking for those skills. In fact, those skills are very sought after throughout Canada and the world, because everything is becoming digital.

I think it’s worth mentioning that there is immense interest in the Communications Security Establishment. That is why we feel very capable in distributing our resources, based on the budget allocated to us.

11:50 a.m.

Bloc

Marie-Hélène Gaudreau Bloc Laurentides—Labelle, QC

That leads me to ask: How is it that we are here today with my colleague, Mr. Genuis? Information was divulged, but we were expecting individuals, including Mr. Genuis, to be up to date. We’re doing it today. What did we miss? What do we have to fix? That’s essential.

You have 30 seconds left answer my questions.

11:55 a.m.

Chief, Communications Security Establishment

Caroline Xavier

Thank you.

As I said, as an organization, we like to keep learning and do things better. During your study, you will develop some recommendations. From there, we may be able to do better. The Communications Security Establishment does not set policy. In fact, we are given actions to execute, and we do our best to do so.

11:55 a.m.

Bloc

Marie-Hélène Gaudreau Bloc Laurentides—Labelle, QC

Thank you.

Mr. Chair, I would still like to ask the Communications Security Establishment to provide us with specific information for the benefit of the report, because you obviously know what you’re talking about.

11:55 a.m.

Liberal

The Chair Liberal Ben Carr

Thank you, Ms. Gaudreau. I also thank you for acting as chair by reminding the witness of how much time you had left.

Ms. Mathyssen, you have two and a half minutes.

11:55 a.m.

NDP

Lindsay Mathyssen NDP London—Fanshawe, ON

Thank you.

I'll just go back to this conversation that was had about information seemingly going one way from CSE to the House of Commons. You said this is normal. You will inform an institution, but you said that you don't expect a return on that information, or you allow them to deal with what's happened. Did I hear that correctly?

11:55 a.m.

Chief, Communications Security Establishment

Caroline Xavier

Yes. As mentioned, a cyber-incident is usually a moment of crisis for an organization. As a result, our job is to be there as a support. Sometimes we're the ones contacting an organization to say to them that we are seeing something that is of concern. Sometimes they have identified the cyber-incident, and we call them and ask if there is anything we can do to help. Sometimes we do have that regular, ongoing, two-way communication.

However, sometimes a company might choose to have an external service provider provide them the support, so then we're just more in monitoring and wait and see....

It's not automatic that an organization will come to us or continue to want to engage with us. It's not because they're not wanting to. Sometimes, especially when dealing with cybercrime, we're dealing with ransomware. We don't encourage the payment of ransomware, and sometimes that's another reason a company might not want to deal with us, as a government entity. They're afraid that it could mean something.

Although we are not all law enforcement—we're not a regulator—we work hard to build trusting relationships, and I feel that we do that on a daily basis. However, I don't want to mislead anybody to think that means that we know all the elements of cyber-incidents that happen in the private sector, for example, or with critical infrastructure.

11:55 a.m.

NDP

Lindsay Mathyssen NDP London—Fanshawe, ON

I understand, and I don't expect there has to be a freedom there in terms of choice, but doesn't that put potential critical infrastructure at further risk, if there isn't a follow-up on your part?

11:55 a.m.

Chief, Communications Security Establishment

Caroline Xavier

We actually do continue to follow up with the entities. We continue to call them or work with them, and I don't want to leave anybody with the impression that there aren't relationships that exist. On the contrary, we have very great relationships with critical infrastructure, especially the energy sector, the telcos and the banks, where we meet with them regularly to talk about threats and to learn from each other about the threats they're facing. There are great relationships and governance bodies that exist to be able to work through understanding.

Having said that, though, we will continue to support and offer our support, but we can't force them. This is where, as I said in my opening remarks, Bill C-26 is really important in the four critical infrastructure sectors that have been identified as part of that bill, because they're really important to Canadians in the critical infrastructure space.

11:55 a.m.

Liberal

The Chair Liberal Ben Carr

Thank you very much, Ms. Mathyssen.

Mr. Genuis, we'll go to you for five minutes.

11:55 a.m.

Conservative

Garnett Genuis Conservative Sherwood Park—Fort Saskatchewan, AB

Thank you, Chair.

Witnesses, did you impose any caveats on the information you shared with the House of Commons?

11:55 a.m.

Associate Head, Canadian Centre for Cyber Security, Communications Security Establishment

Rajiv Gupta

Typically on our reports there is a caveat that will say that you can't share this further without the explicit authority of CSE. That would probably be the caveat. I'd have to look at the reports.

11:55 a.m.

Conservative

Garnett Genuis Conservative Sherwood Park—Fort Saskatchewan, AB

Okay.

If the reports contained a caveat saying that the information can't be further shared without CSE's permission, then how in the world would they have shared that information with parliamentarians without CSE's permission?

11:55 a.m.

Associate Head, Canadian Centre for Cyber Security, Communications Security Establishment

Rajiv Gupta

All of the information belongs to them. If it's their information, that belongs to them under whatever authority: the FAA, for example, for the rest of the departments.

Noon

Conservative

Garnett Genuis Conservative Sherwood Park—Fort Saskatchewan, AB

Yes, that's why I asked you about caveats, though.