:
Welcome to meeting number 37 of the House of Commons Standing Committee on Public Safety and National Security.
We will start by acknowledging that we are meeting on the traditional unceded territory of the Algonquin people.
Today's meeting is taking place in a hybrid format, pursuant to the House order of November 25, 2021. Members are attending in person in the room and remotely using the Zoom application.
Pursuant to Standing Order 108(2) and the motions adopted by the committee on Thursday, March 3, 2022, the committee is resuming its study on the assessment of Canada's security posture in relation to Russia.
With us this morning we have, from the Department of National Defence, General Wayne Eyre, chief of the defence staff, Canadian Armed Forces; Vice-Admiral Auchterlonie, commander of the Canadian Joint Operations Command; and Major-General Michael Wright, commander, Canadian Forces Intelligence Command and chief of defence intelligence. From the Communications Security Establishment, we have Ms. Caroline Xavier, chief; and Mr. Sami Khoury, head of the Canadian centre for cybersecurity.
Thank you all for joining us today. We look forward to your remarks.
General Eyre, I welcome you to make your opening statement for five minutes, give or take. We won't be too hard on you.
:
Mr. Chair, thank you for this opportunity to discuss our geopolitical security environment, specifically the threat Russia poses to Canada.
I am happy to be here with Vice-Admiral Auchterlonie, who is the operational commander of our international and domestic operations, as well as Major-General Wright, who commands our intelligence enterprise. I'm also very happy to be here with my colleagues from CSC, Caroline Xavier and Sami Khoury, as you introduced.
We once again find ourselves in a chaotic and dangerous world where those with power, namely, Russia and China, are determined to remake the world order to suit their own ends and where the rights and freedoms of smaller, less powerful states are discarded. We are also witnessing violations of the sanctity of territorial sovereignty and of responsible dialogue about the use of nuclear weapons.
Russia and China do not differentiate between peace and war.
[Translation]
In seeking to achieve their national objectives they will use all elements of national power, often acting just below the threshold of large-scale, violent conflict—but, as we have seen in Ukraine, they are all too willing to cross that threshold.
Their aim is not just regime survival, but regime expansion.
[English]
In this context, they consider themselves to be at war with the west.
Their greatest threat comes not from external adversaries but from their own populations, so they strive to destroy the social cohesion of liberal democracies and the credibility of our own institutions to ensure that our model of government is seen as a failure.
We are seeing an example of this information war in real time, where the Ukrainians are winning the battle between truth and lies in the west, but the Russian narrative dominates in many other parts of the world.
Will we have an international order based on rules or one based on might? This contest of which order will prevail will certainly define the rest of our time in uniform and, indeed, the rest of our lives.
[Translation]
Many of our allies and partners are clear-eyed about the threat to our future.
We must be, too.
The stakes are high.
We must not allow authoritarian powers to change the world order to suit their purposes.
[English]
We must be strong. We must work with our partners and allies in a united front, and in doing so, deter miscalculation, adventurism and great power war.
Regarding our own national security, the distance and geographic isolation that Canada has enjoyed for so long is no longer a viable defensive strategy. Canada and the United States agreed in 2021 to invest in a long-needed modernization of NORAD, but Russia has also made significant investments, including in long-range aviation and the capability of the cruise missiles that its planes carry.
Russia also has the capability to threaten Canada via other domains, by sea but also in the cyber and space domains, where it is capable of threatening our networks, critical infrastructure, communications and economy.
[Translation]
Finally, there is the nuclear threat, repeated in a not so thinly veiled manner numerous times recently.
Right now, we do not believe that Russia plans to use strategic nuclear weapons against Canada. However, given the unfolding crisis in Ukraine and the potential for escalation, we must remain vigilant.
[English]
The Russian threat is very clear. Fortunately, so are the actions that we must take to meet that threat. As we prepare for the possibility of open conflict in traditional domains, we must also develop our capacity for confrontation in the cyber, space and cognitive domains.
We must integrate our capabilities across all domains. We must develop an integrated approach to national security that combines military responses with diplomatic, economic and information actions at the local, regional, national and multinational levels.
[Translation]
We must maintain an intellectual advantage, generating diverse policy options and ideas via an ongoing dialogue among allies, agencies, industries, academia and governments. This will be critical to sustaining our strategic edge.
[English]
We must not be naive about the threats in the world. Adversaries view compromise as weakness to be exploited. They only respect and respond to strength.
The rules-based international order, which has underpinned world stability and indeed our national prosperity for generations, is faltering. It needs to be defended. The gravity of these times should be apparent to all.
Thank you. We look forward to your questions.
:
Hello and
bonjour. Thank you, Mr. Chair and members of the committee, for the invitation to appear today to discuss Canada's security posture in relation to Russia.
My name is Caroline Xavier. My pronouns are she, her and elle. I am the new chief of the Communications Security Establishment, known as CSE.
I am joined today by Sami Khoury, head of CSE's Canadian Centre for Cyber Security, which you have heard referred to as the cyber centre.
I'm pleased to join you. I too would just like to take a moment to acknowledge the land from which I'm joining you today, which is the traditional unceded territory of the Algonquin Anishinabe nation.
[Translation]
Today, I'd like to provide the committee with a brief update on CSE's role in Canada's cyber security posture as it relates to Russia, and some of the recent work that CSE has done to protect Canadians from related threats.
[English]
CSE, reporting to the , is one of Canada's key security and intelligence agencies. The Communications Security Establishment Act, or the CSE Act, sets out five aspects of our mandate: cybersecurity and information assurance, foreign intelligence, defensive cyber operations, active cyber operations, and technical and operation assistance. As part of this mandate, CSE is the country's lead technical authority for cybersecurity.
[Translation]
The Canadian Centre for Cyber Security, more commonly referred to as the Cyber Centre, is a branch within CSE and a single point of expertise on technical and operational cyber security matters.
[English]
I will now provide a brief breakdown of the key findings regarding the current cyber-threat landscape particularly as it relates to Russia. I should note that CSE has issued four bulletins about Russian-backed activities this year focused on threats to cybersecurity and on disinformation.
[Translation]
To set the stage, I'd like to highlight some of the current cyber threat challenges Canada faces. We identified these in our national cyber threat assessment, which I would encourage you to read if you'd like to have a better understanding of the current threat landscape.
[English]
In that assessment, we highlighted that cybercrime is the most prevalent and most pervasive threat to Canadians and Canadian businesses. Cybercriminals trying to probe Canadian systems have been found in Russia, China and Iran, among others. These actors use various techniques, such as ransomware, theft of personal data and online fraud. Critical infrastructure operators and large enterprises are some of the most lucrative targets.
While cybercrime is the most likely threat to impact the average Canadian, the state-sponsored cyber programs of China, North Korea, Iran and Russia pose the greatest strategic threat to Canada. Foreign cyber-threat activities, including Russian-backed actors, are attempting to target Canadian critical infrastructure operators as well as their operational and information technology.
[Translation]
Russia has significant cyber abilities and a demonstrated history of using them irresponsibly. This has included the SolarWinds cyber compromise, disruptions of COVID‑19 vaccine development, threats to Georgia's democratic process and the NotPetya malware.
[English]
Besides Russian-backed challenges to Canadian cybersecurity, as I have noted, Russian disinformation campaigns also threaten Canada and Canadians. In July of this year, CSE noted that it had continued to observe numerous Russian-backed online disinformation campaigns aimed at supporting Russia's brutal and unjustifiable invasion of Ukraine.
[Translation]
Now that I've gone over some of the key trends and threats, I'd like to provide an overview of how CSE's mandate helps us address these challenges.
CSE has unique technical and operational capabilities, which allow us to respond to the various types of threats Canada faces, such as the threat of hostile state actors.
[English]
CSE's foreign signals intelligence program provides sophisticated capabilities that allow us to access, process, decrypt and report on current and emerging cyber-threats. We then use this information to brief and disseminate to government.
[Translation]
The foreign intelligence CSE collects allows us to pass that information to not only critical infrastructure owners and operators in Canada, but also to our allied and NATO partners, as well as Ukraine.
[English]
Having this information ahead of any materialized threat allows them to proactively protect and defend their systems. The CSE Act further enables us to provide technical and operational assistance to federal law enforcement, security and defence partners, including the Department of National Defence, our Canadian Armed Forces, the RCMP and the Canadian Security Intelligence Service, or CSIS. This means that CSE is authorized to assist the CAF in support of government-authorized military missions, such as Operation Unifier. This includes intelligence sharing and cybersecurity.
[Translation]
One of CSE's main roles is to inform the government of the activities of foreign entities which threaten Canada or its allies. This may include foreign-based cyber threats, espionage, terrorism and even disinformation campaigns.
[English]
For example, since the Russian invasion of Ukraine began, we have observed numerous Russian-backed disinformation campaigns online that are designed to discredit and spread disinformation about NATO allies, as well as false narratives about Canada's involvement in the Russia-Ukraine conflict.
[Translation]
For example, controlled media outlets were directed to include doctored images of Canadian forces members on the front line and false claims about Canadian forces committing war crimes.
[English]
We shared this information on Twitter as part of the Government of Canada's efforts to help inform Canadians on how to help stop the spread of and protect themselves from disinformation.
We will continue to work closely with our Five Eyes partners, as well as harness all of our expertise to confidently ensure Canada's resiliency against threats in terms of cybersecurity or disinformation.
[Translation]
Although Russian cyber threat disinformation actors are becoming increasingly more sophisticated, I can assure you that we are working tirelessly to raise Canada's cyber security bar and protect all Canadians from these emerging threats.
[English]
We have the necessary expertise in place to monitor, detect and investigate potential threats. We are developing further capabilities and capacities to take active measures to protect, deter and defend against them.
[Translation]
We also continue to publish advice and guidance for Canadians and Canadian businesses to improve their cyber security practices.
[English]
We will continue to collaborate closely with our Five Eyes and NATO allies to protect the critical infrastructure, economies and democratic systems of our country.
With that, I will be pleased to have the opportunity to answer any questions you might have.
[Translation]
Thank you.
Thank you very much to the witnesses for being here. It is an honour to have them here.
General Eyre, it is an honour to meet you in person. Thank you for everything you and your colleagues are doing to keep Canadians safe. I have a number of questions for you.
I've been reviewing some of the media that you've been doing in recent months. I'm quite concerned by some of the things you've been sharing with Canadians on the state of our military and our military preparedness.
In May 2022, you mentioned, “Given the deteriorating world situation, we need the defence industry to go onto a wartime footing and increase their production lines.” You went on to say, “We're facing a security situation in the world that is as dangerous, or more dangerous, than the end of the Cold War.” You also said, “Canada is not nearly as secure as it once was.”
Our understanding throughout the study we've been having is that since the conclusion of the Cold War, our infrastructure and defence capabilities that went along with our NORAD infrastructure have been neglected, as has our Canadian military, perhaps.
Can you comment on that, given the context of what you're saying about how we may be in a more dangerous situation than during the Cold War?
I thank the witnesses for being with us today. I appreciate it.
My first question is for Ms. Xavier.
Ms. Xavier, I have read a Journal de Montréal article published in May 2022. In it, there are a number of figures on the Communications Security Establishment. According to the article, since the Russian invasion, the number of cyber-attacks has jumped 16% worldwide. In 2021, ransomware attacks shot up 151% over 2020, also worldwide. Canada alone experienced 235 known attacks.
For the benefit of committee members, could you explain why all this information is not known?
You said that this was the tip of the iceberg, but not all attacks are reported. Why aren't they all reported? Should we be doing more to encourage organizations under attack to report it?
As I understand it, there's nothing binding at this time. However, it could certainly be useful for any organization that might be a victim of an attack.
What do you think?
:
Thank you for the question.
Of course, we'd like Canada to be immune from cyber-threats. Our agency's goal is to try to ensure that all organizations and all Canadians are aware that they need to be mindful of how they manage their data.
As you mentioned, we're seeing an increase in ransomware attacks. That's why we're working very closely with industry, various levels of government and Canadians. We're looking to educate them and raise awareness.
We're also working closely with organizations that report having been victims of cyber-attacks. However, as you said, many organizations don't report it. Nevertheless, we continue to discuss it openly with industry.
We do a lot of outreach and awareness sessions to let people know that we're there to provide the support they need. We also put out a lot of advisories to explain the risks so that they can protect themselves and prevent possible attacks.
We're concerned about this, obviously. But Canada isn't the only country suffering from the fact that many organizations don't want to disclose the attacks they are experiencing. We discuss this with all our allies around the world, and we continue to tell organizations that it's important to contact us. We know how to be discreet, and how to work with them to help them find the solution to their problem.
:
Thank you very much, Mr. Chair.
Thank you, witnesses, for being here. I know how valuable your time is, and our committee sincerely appreciates your being here today.
General Eyre, I'd like to start with you.
One thing we have been witnessing with Ukraine is what is possible when you have a determined fighting force combined with western training and western equipment. I think we've all been quite astonished at the capabilities of the Ukrainian military.
At the same time, I think we've also had the opportunity to learn more about Russian military capabilities, their fighting doctrine, the morale of their troops, etc. We know from public news sources that they have suffered some serious setbacks in the last month.
I know Canada and all of its NATO allies are paying attention to this conflict. In general terms, what have we learned about Russian military capability from this conflict, and how is NATO doctrine evolving from that assessment?
:
Mr. Chair, I thank the member for the question.
I'll say a few things and then give Vice-Admiral Auchterlonie, who monitors this on a daily basis, the chance to make a few comments.
I will say that the will to win that we see within the Ukrainian forces is probably the key determinant of their success.
We were very happy to see Ukrainian forces embracing what we call mission command—empowerment at the lowest levels to be able to go off and improvise, take advantage of the local situation and create success. We're not seeing that on the Russian side. They have very much the old Soviet mentality of a top-down, centrally driven command style. That is one of the big observations.
We've seen failures on the Russian side—failures at the strategic level to connect ends, ways and means. Their political ends have not matched their military ways and means. We've seen a disconnect there in that they've constantly had to readjust what those ends are going to be. Even now we're doubtful whether their maximalist ends are achievable.
We've seen challenges as well throughout their force, whether on the training side or in the ability to integrate combined arms—that's artillery, engineers and air force all working together. It's just not there. Their logistical challenges are pretty significant.
What we as a force have learned and reinforced is just how powerful empowering a highly motivated force and giving them the authorities and the resources to act on the ground can be.
I am very proud of the training our forces have done since 2015 and of how they have been able to impart that leadership style at the lowest level. That training continues today with Operation Unifier.
With that I'll turn to Vice-Admiral Auchterlonie.
Thank you, Chief.
As the chief noted, we've been conducting Operation Unifier since 2015, training our Ukrainian armed forces partners along with our allies—U.S., U.K., Lithuania and other countries—to ensure that they had that capability and the training to maximize their capability in the field.
I really echo their comments. The Ukrainian armed forces have been exceptionally impressive, and they're determined in their will to fight for their country. That's been quite impressive.
You talked about lessons learned, which are quite key. Obviously we're learning from this conflict. We learned from the Ukrainians in 2015. With respect to the Donbass, we took a lot of the lessons from 2015 and modified our tactics and procedures within NATO and within Canada and our allies, and we're learning today against the Russian forces.
What I would caution is that we're learning; the Russians are learning and the Chinese learning. This is something for the committee. The fact is that we're not the only ones learning from this event.
What you have seen is that cohesion in the west has happened, and that has been phenomenal, and the cohesion in NATO has been great. I think our adversaries around the globe are seeing that, and they will react to it. So as it's going on, we're going to learn. We're a learning institution. The other organizations are also going to learn from this.
:
Thank you, Mr. Chair, for the question.
As was mentioned, we can't speak to the specifics, but what we can say is that when we become aware of what a cybercriminal's traits look like or what their profile is and that's something we are able to declassify, we definitely want to share that with industry.
That was witnessed in the bulletin we put out in January in particular. We went out and told private industry what Russia might be capable of in the critical infrastructure space just to provide a warning in general about what one should be concerned about, because we know they can operate in a sophisticated manner.
For industry, in relation to hostile states in general and not just Russia in particular, when we understand a profile, such as the one we've been watching for Russia, we give them the necessary advice so they can patch their systems to prevent them from being vulnerable and to really monitor them. That's the other piece that's really important—always keeping an eye on whether things are going as they are supposed to be going.
We offer information sessions, as well as bulletins with advice, on a regular basis. As soon as we are able to provide information that is transparent to the public, we do so.
That goes to the question asked previously about how we really work hard at trying to find ways in which we can declassify the information and make it more public so people are made aware of what the Russians are possibly capable of doing.
Unfortunately, that's about the extent of what I can say.