Skip to main content
Start of content

ETHI Committee Meeting

Notices of Meeting include information about the subject matter to be examined by the committee and date, time and place of the meeting, as well as a list of any witnesses scheduled to appear. The Evidence is the edited and revised transcript of what is said before a committee. The Minutes of Proceedings are the official record of the business conducted by the committee at a sitting.

For an advanced search, use Publication Search tool.

If you have any questions or comments regarding the accessibility of this publication, please contact us at accessible@parl.gc.ca.

Previous day publication Next day publication
Skip to Document Navigation Skip to Document Content






House of Commons Emblem

Standing Committee on Access to Information, Privacy and Ethics


NUMBER 101 
l
1st SESSION 
l
44th PARLIAMENT 

EVIDENCE

Tuesday, February 6, 2024

[Recorded by Electronic Apparatus]

  (1100)  

[English]

    I'm going to call the meeting to order.

[Translation]

    Welcome to meeting number 101 of the House of Commons Standing Committee on Access to Information, Privacy and Ethics.
    Pursuant to Standing Order 108(3)(h) and the motion adopted by the committee on Wednesday, December 6, 2023, the committee is resuming today its study of the federal government's use of technological tools capable of extracting personal data from mobile devices and computers.
    Today's meeting is taking place in a hybrid format, pursuant to the Standing Orders. Members are attending in person in the room and remotely using the Zoom application.

[English]

    I just want to remind everyone—I know the witnesses are aware of this—that the earpieces are not to be close to the microphones because that does cause feedback for our interpreters and potential injury as well.
    I'd like to welcome our witnesses for the first hour this morning.
    From the Department of Natural Resources, we have Francis Brisson, assistant deputy minister and chief financial officer, and Pierre Pelletier, chief information officer. From the Department of National Defence, we have Dave Yarker, director general, cyber and command and control information systems operations, and Sophie Martel, acting chief information officer.
    We have five minutes for the opening statements.
    I assume, Mr. Yarker, that we're going to go with you, sir, or is it Ms. Martel?

[Translation]

    Go ahead, Ms. Martel.
    Mr. Chair and members of the committee, on behalf of the Department of National Defence and the Canadian Armed Forces, thank you for inviting us to the Standing Committee on Access to Information, Privacy and Ethics.
    My name is Sophie Martel, and I am the acting chief information officer. I am the functional authority responsible for the department's entire information and communication technology program. I ensure that National Defence and the Canadian Armed Forces have a reliable, secure and integrated digital environment that meets operational needs.
    My team delivers information and communication technology to support the core functions of defence, which are intelligence, surveillance, reconnaissance, communications, cyber-warfare, command, management and cybersecurity. The defence chief information officer is also responsible for the development and operational availability of the cyber-force within the Canadian Armed Forces cyber-command.

[English]

    I'm joined today by the director general of cyber and command and control information systems operations, Brigadier-General Yarker.
    Brigadier-General Yarker is responsible for the organization and execution of cyber operations and exercises within the Canadian Armed Forces, including the digital forensic function and the maintenance of key national command and control infrastructure.
    I would like to emphasize that the protection of personal information is a top priority, and the Department of National Defence is committed to doing everything possible to protect that information. However, there has to be a balance. There's only a limited expectation of privacy when using our IT systems and mobile devices because they are subject to monitoring for the purposes of system administration, maintenance and security, and to ensure policy compliance.
    Our monitoring is compliant with applicable government policies and standards.

[Translation]

    In conclusion, I wish to reiterate that the Department of National Defence and the Canadian Armed Forces will continue to deliver on their mandate while protecting personal information.

[English]

    My colleague and I would be pleased to address any questions you may have. As a matter of policy and to ensure operational security, we cannot disclose details on the use of specific equipment or on systems used operationally.
    Thank you.

  (1105)  

[Translation]

    Thank you, Ms. Martel. You did not use all your speaking time. It's good for the committee, which will be able to ask more questions.
    Mr. Brisson, you have the floor for five minutes for your opening remarks.
    Thank you for this opportunity to speak about Natural Resources Canada's use of technological tools to safeguard our technological and data assets and ensure the consistent evolution and growth of our scientific endeavours.
    I would like to recognize that I am speaking to you from the traditional unceded territory of the Algonquin Anishinaabe people. We recognize Indigenous peoples as the customary keepers and defenders of the Ottawa River watershed and its tributaries. We honour their long history of welcoming many nations to this beautiful territory and uphold and uplift the voice and values of our host nations.

[English]

     As noted, I am Francis Brisson, the chief financial officer and assistant deputy minister responsible for corporate management services at Natural Resources Canada. My primary responsibilities include corporate services, human resources, information technology and security. Our department's chief information officer and CIO, Pierre Pelletier, who is here with me today, is responsible for the management, implementation and usability of information and computer technology at NRCan.
    NRCan is both a science-based and a policy and economic organization. It is critical for NRCan to ensure its core functions remain resilient and responsive to internal and external threats. Threats affect not only our digital data but also our physical systems and devices. As the complexity of our digital environment grows, so does the risk of compromising our systems and assets. These risks include data breaches, intellectual property theft, service disruptions, financial setbacks and security threats.
    Protecting against and responding to risks requires regular and sustained effort. Our department, like others, has many different systems, policies and tools to manage and respond to risks. Addressing and responding to threats can require forensic software tools. NRCan purchased a licence for magnetic forensics to have this tool in our tool kit, but we have never used it.
    I would also underline that should the department have business requirements to use this software or similar software, NRCan will follow protocols and requirements for appropriate use and privacy impact assessments.

[Translation]

    Thank you for your attention. Pierre Pelletier and I are pleased to answer your questions about our work.
    Thank you, Mr. Brisson. You also took less time than anticipated. That's good. The committee members will have more time to ask their questions.
    We'll start our first round of questions.
    Mr. Kurek, you have the floor for six minutes.

[English]

    Thanks to our witnesses for joining us here today.
    Certainly I, as well as members of this committee and many Canadians, were concerned when the reports in the media came out that what would be, I think, accurately interpreted as quite invasive technology was being used. Certainly there was concern, which has led to the point we're at today, in light of some erosion of trust that has taken place in regard to governmental institutions over the last number of years in particular.
    I do have a couple of questions. I'm going to start on the privacy impact assessment side of things. I'll ask this to both departments.
    We heard from the commissioner last week that neither of your departments has submitted privacy impact assessments. Perhaps you could, in about 30 seconds—and I'll start with DND, and then go to NRCan—describe to me where that is at, whether or not you have submitted the privacy impact assessments, and whether or not you plan to?
    DND, I'll start with you.
    Thanks for the question.
    We have a number of privacy impact assessments on the go right now. From a CIO point of view, as we are responsible for the security of our network, we follow the FAA, the standards of Treasury Board and all the laws. Outside that, if there's a need for a PIA, we actually work on it. For example, at this point in time we're looking at Microsoft 365, because we're starting to record information and do transcripts, and we're starting to look at what this will imply from a PIA point of view.

  (1110)  

     If I'm interpreting that correctly, the process is ongoing, but you have not submitted to the Information Commissioner a PIA regarding observation of devices?
    Currently, a number of them in the department are ongoing.
    Okay.
    NRCan...?
    Good morning.
    From our perspective, like we said at the beginning in our opening remarks, we did purchase the tool. It was a tool we've purchased to have in our tool kit, and we have not used it from our perspective. One thing I wanted to reiterate and assure the committee of is that, should we plan on using the tool, that would be done only through a security mandate and clear protocols would be followed. Should we be using the tool, we will be doing a PIA from our perspective should that be the case.
    At this point, we haven't used it. Should it be used further to an approved mandate from our chief security officer, we'd look at doing a PIA as we moved forward.
    I appreciate that. I think one of the concerns we've heard is about a little bit of a disconnect. We had the commissioner last week talk about how he's happy to work with departments and agencies, yet had not received PIAs. Especially in light of hearing NRCan has procured software that would be capable of doing this, certainly, I would hope that the PIA process is ongoing and even could be done prior to the procurement of such software.
    When it comes to tools capable generally of extracting personal information—I'll start with NRCan—has your department used a tool like that in the past?
    From an NRCan perspective, we have tools and we have to monitor our system and so forth from that perspective. We ensure we are respectful and we support the policies around all of that. From our perspective, there are tools we are using to ensure we gather information, but it's done in the context of TBS policies and so forth.
    Has information ever been gathered from people who are outside of the organization? I'm not talking about employees, but from people outside of the NRCan organization. Has information ever been gathered using these sorts of tools by your department?
    The tool we've talked about, the forensic, has never been used, and should it be used, it would only be used internally. All the monitoring systems we have from our perspective in that space are used for internal purposes for within the organization and for administrative purposes in line with security requirements following a clear security mandate as we move forward.
    I'll ask the same question to DND, and could I get it in 30 seconds or so?
    Yes. In 30 seconds, we investigate networks, not people. In order to investigate networks, we do need to use tools to ensure the confidentiality, the integrity and the availability of data. That's following the FAA, the Treasury Board standard and the Privacy Act.
    Has it ever been used on anybody outside of DND or the Canadian Armed Forces?
    It's used to monitor our network, only our network.
    Thank you.
    I guess this is unsolicited advice, but especially in light of some of the media reports that have come out on this, I would hope there's a more proactive approach across departments and governments. The Information Commissioner wants to work with departments. Rebuilding some of that trust that's been lost is certainly something I would encourage all those who are...and I'll probably say it again: Let's work hard to make sure we can rebuild that trust that needs to be there with Canadians.
    Thank you.
    Thank you, Mr. Kurek.
    Everyone's making my job really easy today. That was right on time.
    Ms. Khalid, you have six minutes exactly, hopefully. Go ahead.
    Oh, oh! We all have wishful thinking, Chair.
    Thank you so much to our witnesses for being here today.
    What I'm hoping to do is to talk to each department individually, so my questions will be similar for both of you.
    First and foremost, to National Defence, what is the purpose of a privacy impact assessment to you?

  (1115)  

     The purpose of the privacy impact assessment is to make sure that we protect the information of citizens.
    Do you think it is necessary for a privacy impact assessment to be conducted within your department to ensure the trust that democracy depends on to function?
    I think privacy of information is absolutely key. We absolutely need to make sure that the confidentiality, integrity and availability of the data are protected. That's why we're also protecting our network to protect the information and to make sure that the information is used the way it needs to be used.
    Why are we reading reports that you have not conducted a privacy impact assessment?
    In the department, we have a number of privacy impact assessments ongoing right now. We are currently, in the CIO group more specifically, working on one with Microsoft 365. We do have a few ongoing right now.
    Are you in touch with our Privacy Commissioner to help you through that process?
    We have a team in National Defence that is in touch.
    What are some of the challenges that you and your department are dealing with to ensure that a PIA is conducted effectively?
    I'm not in a position to speak to that. I'm the CIO, so I'm not in a position to speak to the relationship between that organization and National Defence. Others are in a position to speak to that.
    Are you surveilling Canadians?
    We're not surveilling Canadians.
    As I said, we're here to support Canadians. We're here to keep them safe. We're monitoring networks. We're not monitoring people.
    If you needed to surveil a Canadian, is there a legal process through which you would do that?
    It's not our mandate at all, but if another department or organization needed our help there, that would have to be done through specific processes.
    Dave, do you want to add a bit more on that?
     We would not be called upon to surveil Canadians. That's not within our mandate or remit.
    Thank you very much for that.
    I'm moving on to NRCan with the same questions.
    What is the purpose of privacy impact assessments to you?
    From our perspective, similar to our colleagues in DND, privacy impact assessments are about protecting the information and ensuring that, from our perspective, the information we have is gathered the right way, we're using it the right way, we're protecting the integrity of the information and, as discussed previously, we're reinforcing trust across government and departments.
    How high does privacy rank within your department in terms of priorities as you conduct your operations?
    It's definitely extremely important from our perspective.
    Being new in the role—as Pierre is as well—it is something that's extremely important to us. We want to continue to monitor progress in that space as we move along.
    Why haven't you conducted a privacy impact assessment?
    From our perspective, the tool has never been used. If we were to use it, we have PIAs ready to go and available should that be the case.
    We would be using this only further to our security mandate and by ensuring we follow the right protocols, which we have in place. Should this tool be necessary to investigate, then we would do a privacy assessment prior to using the tool.
    Have you been in contact with the Privacy Commissioner on this privacy impact assessment challenge?
    We have not on this one, per se. We have a team within the department that's responsible for this.
    I can reassure you that we have been in constant communication and discussion with them. Pierre and I, being new to the department, want to continue the great work that's being done in that space. We will continue to ensure that we're lining things up from that perspective.

  (1120)  

    Are you surveilling Canadians?
    No.
    What are the challenges your department faces in dealing with privacy when it comes to ensuring privacy for Canadians while also fulfilling your roles?
     Maybe I can pass it to Pierre.
    From a challenge perspective, it would potentially be how heavy the bureaucracy would be if, let's say, the Privacy Commissioner would require a specific, full-fledged PIA for an investigation. Departments are expected to have some degree of control within what's called the personal information bank. Within a workplace environment, you're expected to have some data that is shared with your employer. Most of the investigations would fall within what's accepted within a personal information bank. If anything goes beyond that mandate and scope, that's where a PIA would be required. A PIA should be very specific, and usually departments are well within the security protocol to work and support these operations.
    Thank you.
    Having a good understanding of what that entails as we evolve the policy will support this guidance.
    Thank you, Mr. Pelletier.

[Translation]

    Mr. Villemure, you have the floor for six minutes.
    Thank you, Mr. Chair.
    I want to thank all the witnesses for being here. I'll ask both departments the same questions, starting with National Defence.
    Ms. Martel, has your department purchased tools to collect data from mobile devices or computers?
    As I said earlier, we purchased tools to protect our networks.
    Our mandate is to protect and secure the confidentiality, integrity and availability of data on our networks. We purchased tools to investigate networks, not people.
    What are these tools?
    I would like Mr. Yarker to answer this question.
    We have a number of tools of this nature, but I won't go into them all today. As we said earlier, we have operational concerns related to security and our tools.
    In short, what were the tools purchased for?
    We purchased them to investigate the networks and for the networks.
    There are people on the networks.
    Yes. We agree that collecting information on the network means collecting data packets and personal information. That said, there are strict procedures for handling this information. People have received the necessary training and security clearance. They follow these strict procedures.
    The privacy impact assessment wasn't done in this case, right?
    As part of the work to protect our networks, we comply with the Privacy Act, the Financial Administration Act and all relevant Treasury Board standards.
    We're also looking at the need for a privacy impact assessment. We started this type of assessment in the case of Microsoft 365.
    Do you agree with the Privacy Commissioner of Canada that some departments and agencies, including yours, are violating certain administrative provisions of the Privacy Act?
    We currently use these tools in compliance with the Financial Administration Act, the Privacy Act and all Treasury Board standards.
    Do you think that following the letter of the law is enough to generate trust?
    We can ensure that people trust us. Our role is to protect the networks in order to protect Canadians.
    You said something earlier that surprised me. When it comes to privacy, expectations are lower.
    Sorry, could you repeat that?
    You spoke about the expectation of privacy, which is lower in the case of a government device, for example, than…
    I probably meant that, to use a government device and have a network account, employees must fill out a questionnaire. They know that they will be monitored for network security reasons.
    Okay. Thank you.
    I would now like to turn to you, Mr. Brisson, from the Department of Natural Resources.
    As you said earlier, your department purchased tools but didn't use them. Why did you purchase the tools and why didn't you use them?

  (1125)  

    Thank you for the question.
    Our department uses various tools, mechanisms and protocols. I must say that we don't always need to use these tools to conduct investigations. The department's internal investigations concern the actions of public servants, for example.
    The various tools include our computer investigation tool, which is available as needed. This tool can help us speed up searches and gather information, for example. However, we haven't needed to use it for queries. That said, it's part of our toolbox.
     You're ready.
    If we were to use it, we would have the security protocol and the mandate to do so.
    However, before using the tool, we would make sure to carry out a privacy impact assessment.
    What level of authority is required to purchase this type of tool? Is it authorized by you, as deputy minister, or by someone lower or higher in the hierarchy?
    To my knowledge, at the time, the tool was authorized by the chief information officer, Mr. Pelletier's current position, after a discussion with the department's head of security.
    So there are certain requirements.
    Yes, absolutely. We follow the protocols in place before proceeding. We purchased the tool through Shared Services Canada, after discussions, in keeping with the protocols and based on the information that we had.
    What are you looking for? Employee misconduct?
    The monitoring system makes sure that everything is in place. These tools are used if we have a security mandate to look at a case a bit more closely.
    What are you looking for?
    It involves determining whether someone is disclosing information that falls within the definition set out in our security mandate. We would then collect the information necessary to meet these needs.
    Ultimately, it's about identifying misconduct.
    Yes, that's certainly possible. There may be different reasons.
    Thank you.

[English]

    Thank you, Monsieur Villemure and Monsieur Brisson.
    Mr. Green, you have six minutes. Go ahead, please.
     Thank you very much.
    I begin my comments with Mr. Yarker. Would you agree that the spirit of this conversation is about trust?
    Yes. Certainly from our perspective, the tools and questions that we use and the processes that we wrap around them are deliberately intended to increase the trust in our network and to ensure that it's not compromised.
    I think it's safe to say.... Maybe I'll put this question another way. Those who are enrolled in the military, by virtue of their enrolment in the military, aren't exactly citizens. I wouldn't necessarily compare your members to members of the Department of Agriculture, for instance. Is that correct?
    Okay. I certainly understand your point. Thank you for the question.
    What I would say is that all members of the department retain their right to appropriate privacy, and we certainly consider those in all of our operations.
    You did make a statement earlier, though, about it not being within your mandate to surveil Canadians.
    That's correct.
    In your role, are you a military intelligence officer?
    I am not. My role is as a cyber-operations officer, focused here largely on cyber-defensive operations.
    Have you ever had any dealings with Canadian joint operations command?
    Yes, I do work with Canadian joint operations command regularly.

  (1130)  

    How closely?
     Very closely.
    Would you have worked with them at the time when they were surveilling Black Lives Matter, back in 2021?
    No, I have no knowledge of that.
    Again, when I talk about trust and the importance for Canadians watching to know the differences in who's mandated to do what, I find it quite shocking, quite frankly, that the Canadian military had a file on BLM, that they said they were surveilling local context for operations in Canada and that in the file they had deemed them hostile foreign actors.
    As somebody who has been to many of those rallies and involved in that work, I can't help but think that maybe, at some point, I was surveilled in that way. If you're familiar with their operations, what technology would they have used to track the movements of a protest organization or protests across the country?
    I'm afraid that's beyond my remit. I don't know the answer to your question.
    Is there AI technology that's used, to your knowledge, to surveil online social media activity, or is that done manually through the joint operations command?
    I'm afraid I don't know the answer to that question.
    Is there any context in which your department—and Ms. Martel, feel free to jump in on this—would use open-source information collection for social media usages by the members of the Department of National Defence?
     Certainly, I would say that, within the context of cyber-defence, we would not do that. Again, when it comes to cyber-defence and the kinds of tools we're talking about here today, those tools and the use of them are focused on ensuring that we're secure.
    The question is outside of your scope. I'll take that.
    As I mentioned when you came in, part of our work is being at the end of the line of questioning and picking up on things that were said. I'm just making sure that it kind of aligns with my past experiences. I'm still kind of startled by the military's use in that application. If you want to report that back to your superiors to know that's still a question I have here at the privacy and ethics committee, I would love to have an answer to that.
    In this work, I know that we've tried to create a distinction between an on-device information collection tool, spyware, versus this kind of forensic use. Are there also on-device applications that you use in the Department of National Defence?
    Some of these tools will look at individual and point devices. That's sort of the purpose of the tool. However, if I understand the thrust of your question, these are things that we use to investigate security incidents. We don't use them for other purposes.
    Okay, so there's no ongoing monitoring that would happen.
    No. We definitely, across the network security infrastructure, have monitoring tools that monitor for malicious activity and the like.
    I'll get more specific.
    Are you familiar with the technology called Pegasus?
    I am, yes.
    Is there anything like Pegasus—not the brand name but the application of it?
    Within cybersecurity and cyber-defence, we do not use those kinds of technologies, I believe, in the sense that you're asking.
    Would you have knowledge of its being used in the Department of National Defence?
    I don't have any knowledge of its being used in the Department of National Defence.
    That's fair enough. Thank you very much.
    Heading down to both of you folks, we're making the distinction again between—and I think it's an important distinction to make—something that's used for forensic, which needs the actual physical device in hand as part of an investigation versus what is deemed to be spyware. I used the reference to Pegasus, but these are things that would be surreptitiously collecting data in real time all the time.
    To your knowledge, do you ever use those types of applications within the application of federal devices?
    We don't.
    What's the rationale then, just one more time for the sake of this committee, for the purchase of this type of forensic device?
    It's to be effective in the event that there's a security issue.
    How often do these security issues come up? Do you have a report in your departmental reporting back that we had 36 of these incidents?
    It's not something I have readily available. For security reasons and our ability as an organization to withstand any potential threat, I would not disclose this readily in a public forum. We do have internal data about this, yes.

  (1135)  

    Okay. At a future date, if we went in camera, is that something we could discuss without the media and the public present?
    That's correct.
    Okay. Thank you very much.
    Thank you, Mr. Green and Mr. Pelletier.
    That concludes our first round of questioning.
    We're going to go to five, five, two and half, and two and half, starting with Mr. Brock.
    Go ahead, sir.
     Thank you, Chair.
    Thank you, witnesses, for your attendance today.
    I want to start by looking at first principles. This study essentially arose after a report by the CBC late last fall on how the Government of Canada and various departments—two of which are before the committee today—had used software and hardware to spy not only on the federal public service but on Canadians.
    We found out about this particular incident probably years after the fact, and the information was obtained through an ATIP request by a professor at York University, an expert in privacy, who had some concerns about the ability of government officials to spy on employees and Canadians. He received information regarding the contracts—there were two contracts with the departments—he was reviewing. Radio-Canada received these contracts, and Radio-Canada reached out to both the departments for an explanation regarding their use of this spyware.
    I wanted to lay the ground rules out, because I think doing so is important for the first question I will pose, which will be for National Resources. There appears to be a little bit of a disconnect, and I want you to help explain this particular issue. Radio-Canada reached out to your department. I don't know who it was in particular, but your department confirmed that you had the software, you had the hardware, but you had not provided the PIAs in relation to that. That's one issue.
    Then I saw in a report by the CBC following the appearance of the Privacy Commissioner—this was in a report dated February 2—that National Resources Canada told the commissioner, after his appearance I would imagine, that it had bought the data extraction tools but never used them.
    Why then would you tell Radio-Canada you did this, but you've never used PIAs, and then conversely tell the commissioner that you had the tools but never used them? Do you see a bit of a disconnect there?
    Thanks for the question. Hopefully I have understood it.
    From our perspective, I'll state the facts as I know them, and hopefully that will address your understanding.
    We purchased the tool and we have it, and from my understanding we've had it since 2018. The tool has been available to us but has never been used. We don't have anyone in the department right now who can use it, and if we were to feel that, based on a security situation we would need to use a tool like this, based on a clear mandate, then from there we would automatically turn around and fill in a PIA to ensure that we were doing things the right way.
    From our perspective, we've never used it, and if we were to use it, given the need from a security perspective, we would automatically do a PIA.
    Over the years your department has probably had instances of employee misconduct. Would that be fair to say?
    I cannot speak for—
    Can either of you speak to that issue?
    I think it's fair to say so, yes.
    In the course of those investigations, did you ever use software and hardware similar to the ones we're talking about today?
    It's possible, but you wouldn't necessarily need to have the tools. The tools help enhance our ability, but it could be done manually.

  (1140)  

    When you used other tools, did you file a PIA?
    We did not to my knowledge, but within the framework on privacy impact assessment, departments have the ability to work within what is called personal information banks. Those contain predetermined types of information that we as a department would want to access from our employees. It is my understanding that, when we work within that set of information, we are within our mandate.
     Do you understand that there's a directive by the Treasury Board—
    That's correct.
    —that PIAs need to be adopted across the board?
    On the programs, that's correct.
    Yes, you are aware of that.
     NRCan has that.
    Thank you, and I'm out of time.
    Thank you, Chair.
    Thank you, Mr. Brock.
    We have Mr. Bains for five minutes.
    Go ahead, please.
    Thank you, Mr. Chair.
    Thank you to our guests for joining us today. You all have very important roles to play.
    My first question is for the Department of Natural Resources. Do you believe the data, assets and lab systems that NRCan operates are protected and secure?
    Yes. From our perspective, this is our mandate, and we do what we can to monitor and ensure that they are protected.
    What do you do to make sure that they're protected? How do you monitor and protect that?
    I can turn it to Pierre.
    We work with our service provider. We work closely with Shared Services Canada to make sure that the network is monitored and protected. Similarly, we work with our central agencies to support it from a cybersecurity threat perspective, and we maintain this equipment. We keep it up to date. We provide guidance on utilization of the network. We keep and maintain our systems and patch them for security. We also internally train personnel to make sure they're following the proper security guidance.
    You mentioned NRCan is adapting to an increased focus on security. Can you elaborate on some of the threats facing Canada?
    There are many threats. A lot of what NRCan works on has commercial value, so there's an external threat, for sure. That's always the case.
    Is that to our natural resources in general?
    There are many areas of business, such as energy, where NRCan is interesting for foreign entity or domestic reasons. It is always the nature of the business. The interesting challenge within NRCan is the open nature of the science culture. It's definitely a challenge for us to maintain the proper balance of sharing information with key stakeholders and protecting important assets.
    You mentioned domestic. Can you share what the domestic threat is?
    From a commercial perspective, there's an interest in some of the technology, the breakthroughs or the scientific information that would have potential—
    Do you mean intellectual property, things like that?
    That's correct.
     What circumstances occurred that warranted the procurement of this offer?
    It was mostly from a readiness perspective. As an IT organization, I think it's perfectly normal for us to keep up to date and stay current with the technological advances. The technology is always advancing and evolving. The threat vectors are also advancing and people get more sophisticated, so I think it's properly normal for an organization to make sure that it maintains a certain degree of technology savviness.
    How often are you reviewing? Is this just constant?
    That's correct.
     Are government employees made aware of when the forensic tools are used during investigations? I think that question may have been asked slightly differently.
    IT security would be engaged via a well-established protocol, so our chief security officer would initiate a mandate on investigation. That's where IT gets engaged. From my perspective as a CIO, my mandate focuses on providing tools and equipment to help support a security investigation. Absolutely, there is an established protocol, and specifically to—

  (1145)  

    Can you give an example maybe?
    Absolutely. If we were to investigate a physical device, this would be done, first of all, within a personnel security engagement. At this stage, they would absolutely do a review of the impact on security, and they would engage the scope of the actual investigation. IT would get engaged. This is done in a secure environment where access is logged and managed. The information provided by IT is returned to the chief security officer organization, and that's where it's treated internally.
     How much time do I have?
    You have 15 seconds.
    Okay. Thank you very much for your time.
    Thank you, Mr. Bains.
    Thank you, Mr. Pelletier.

[Translation]

     Mr. Villemure, you have the floor for two and a half minutes.
    Thank you, Mr. Chair.
    Ms. Martel, Mr. Pelletier said earlier that there were other ways to achieve the same results. Is that also true for you?
    You mean other ways to achieve what, exactly?
    I'm talking about other ways to achieve the same results.
    Can you provide a bit more information?
    Are there other less invasive ways to achieve the same results?
    Right now, we're using the tools needed to keep our networks secure. Most of these tools are as non‑invasive as possible.
    Can you elaborate on this?
    Mr. Yarker can provide a further explanation.

[English]

    We would move to more invasive tools only if something about the nature of the investigation forced us to do that. Yes, we always turn to the least invasive tools possible.

[Translation]

    Okay. Thank you.
    Mr. Pelletier, my colleague asked you earlier whether employees know that they're being investigated with these tools. I imagine that, when people start working for you, they fill in all sorts of forms that authorize certain things. However, is that the same as clicking “I accept” when you visit a website but don't read the terms of use?
    The government is no different from any other organization. When you use government networks, you have certain obligations as an employee to ensure that your use of the equipment complies with government policies. Clearly, a forensic analysis in particular can't be carried out without the knowledge of the people involved. Under no circumstances could we carry out a forensic analysis without first informing the people involved.
    Like you, I think that makes sense, but are employees regularly reminded about security?
    Absolutely. A reminder pops up automatically every time someone connects to the virtual private network. The department regularly reminds employees of their obligations. In fact, we’re in the middle of cybersecurity month. Our department is therefore taking steps to make employees aware of this reality.
    So, if you ended up using that particular tool, people wouldn’t be able to say they had forgotten or didn’t know it could be used. In other words, they were informed.
    If we were to use that particular tool, it would be with a great deal of transparency with the organization and the employee involved.
    Very well. Thank you very much.
    Thank you, Mr. Villemure.

[English]

    Mr. Green, you have two and a half minutes.
    Thank you.
    I'm going to go back to my friend, Mr. Yarker. I want to have, in fairness, the opportunity for the public to get a sense of what risk Canada is under in terms of cybersecurity and cyber-threats.
    In a succinct way, can you express the importance of the work that you do in terms of protecting our country from foreign attacks and possible disruptions, including very serious military breaches?
    Certainly. Thank you for the question.
    We know very well that cyberspace is not a friendly space. Cyberspace is a place where we face numerous threats from various directions—both nation-states and criminal actors. We take those threats very seriously.
    Within the Department of National Defence, we have a robust cybersecurity program. On top of that, we have cyber-forces capable of defending our networks when and where necessary.
    In some way, it's like a fourth dimension to the typical, traditional military operations. It's a complete new world with technologies that surpass most people's imaginations.
    Is that fair to say?

  (1150)  

    Yes. Thank you for the question.
    I would say that we certainly treat it as another domain. We have air, land, sea and space. Cyber is one of those.
    Do you feel adequately prepared for what's out there?
    Cyberspace, as I've mentioned, is a bit of a nasty place. It's also a place where we are learning, and there's an awful lot to continue to do.
    Although, yes, we have well-trained, well-prepared forces, it's also a space where there is always more work left to do.
    I thank both you and Ms. Martel for your service to the country.
    I'm going to go over to you fellows at the end of the table around the privacy impact assessment, recognizing that you haven't had to use it. What I'm trying to get out of this study, in terms of the real legislative value of it, is what the process, the systems and the steps it takes are.
    You said that you bought the tech and you're prepared to use it if you need it. You said that you would do a PIA if you needed to use the tech. Why not do it in advance?
     Definitely. From our perspective, as I discussed before, Pierre and I are new in the role, and this is definitely something we want to continue exploring and looking into further.
    Do you have the ability, the decision-making capability, to go from this meeting and just start a PIA, or is that something you have to...?
    No. From our perspective, we definitely can.
    Is that something you will commit to doing after leaving this committee?
    From our perspective, I have no problem doing this because we are proactively looking at what we can do in that space. I feel comfortable doing so given that we have the—
    I will take that as a commitment. I appreciate it.
    Thank you, Mr. Green and Mr. Brisson.
    We have time for four and four. We are going to go to Mr. Barrett. That will take us to near the top, and then we will switch over to our next panel.
    Go ahead, Mr. Barrett.
    Let's clarify here. There was the article that was referenced by my colleague before from the CBC. The story was from November 29, 2023. The article was “Tools capable of extracting personal data from phones being used by 13 federal departments, documents show”. Those departments listed include your departments.
    General and Ms. Martel, does your department have that capability—yes or no?
    Yes. We have the—
    Okay. You have the capability.
    You said that you don't monitor individuals. You only monitor networks.
    That's correct.
    The tools capable of extracting personal data from phones, how is that monitoring a network and not monitoring an individual?
    I'm going to let Dave answer that one.
    If you take a look at a typical cyber-defence incident, which is really what we're talking about here, the kinds of tools we're talking about are the tools that you would need to figure out how and why a device like a cellphone had been compromised.
    Okay.
    I think our point is that the angle we come at it from is the compromise of the device and the network.
    Right. In your investigation, one of your investigative tools is to access an individual's phone. You would use this software as a tool, and part of your process would be to access an individual's phone.
    Give a quick yes or no. I have limited time.
    Only National Defence devices are used, but obviously, those devices are used by individuals.
    Okay. I don't think that was clear in your initial responses.
    Do members have a right to privacy?
    Absolutely. Yes.
    Have you used this capability on members' phones?
    Their personal phones...? No.
    On phones assigned to members...?
    Yes.
    Are members allowed to log into personal cloud-based accounts on issued phones?
    They are not supposed to, but some do.
    Yes.
    Is it a violation of their terms of employment to do that?
    The government—
    The general said yes, and you said no, so there's obviously a disagreement even at the table. I would expect that if you surveyed members they might have differing ideas if we're not even sure at this level.
    I'm going to explain myself.
    As I said earlier, when we get an account on the network, to reach the account you need to sign to say that you will only use that device to do government work.
    Sure.
    Now, will people—
    To do government work on these phones people use messaging applications. Those messaging applications are usually the same application they use on their personal device, which would give you access to the personal information on their device.
    Did you get a PIA before you first used this technology?

  (1155)  

    Before we first used.... What we are doing with a PIA is making sure that we follow the FAA and the Treasury Board standards.
    Did you complete the process prior to first using it?
    We completed the process that needed to be completed based on government policies and standards to do our business, which is network security.
    You don't believe that you need to do a PIA before using it.
    No, what I'm saying is—
    The question is very clear, Madam.
    Did you or did you not complete a PIA before first using this tool? You did, or you didn't.
    I'm not sure to be honest with you.
    We did not.
    Okay. My question is why you think that you don't need to do it, but I'm out of time.
    Your members are Canadian citizens. Canadians by your agreement have a right to privacy, and your failure to undertake a PIA is a failure to safeguard and respect the privacy of your members.
    I'm sorry that I don't have more time to continue.
    Thank you, Mr. Barrett.
    Mr. Kelloway, you have four minutes. Go ahead, please.
     Thank you, Mr. Chair.
    My questions are for National Defence.
    During the course of your testimony, you indicated that DND's usage of digital forensic tools complies with government policies and standards, and they are only used on an internal basis. Then, upon being issued an official departmental device, are DND employees clearly advised that their devices are subject to forensic digital tools?
    Yes, they absolutely are. We also send a reminder every time someone logs into the system so they're made aware of this. Yes, they are.
    Thank you for that.
    Considering that National Defence officials deal with matters of the utmost national security on their official devices, do you consider it an essential security measure that DND employees are subject to digital monitoring when using their official devices?
    I would say, from a security perspective, that we monitor the network, as I mentioned, for security threats, compromises and the like. We are absolutely aware that some senior leadership are more likely to be targeted by threat actors.
    Thank you for that. I appreciate it.
    To either of you, do you know of any other national defence or national security entity within our country, or for that matter any allied nation, that ensures total privacy for employees who handle national security information?
    We ensure total security of privacy of employees using our system. I mentioned that part of the reason we're doing network security is to ensure the confidentiality, integrity and availability of the data. We're working with our allies to make sure that the standards that we follow here are also standards that are followed in other countries.
    Thank you for that.
    Mr. Chair, how much time do I have left?
    You have a minute and 45 seconds, but I'm going to give you an extra half-minute because Mr. Barrett took an extra half-minute.
    That's very kind of you. I appreciate it.
    I'm going to pivot to Natural Resources, if I can.
    I'm hearing today that your digital tools were procured through Shared Services Canada and that they've never been used. I'm wondering at what point in time the department determined that a requirement existed to procure these services through Shared Services Canada.
    If I may, from our perspective, as suggested earlier and to reinforce that point, from what we understand, the department decided to purchase this to ensure that we had the tools necessary should we need them at a certain point in time. From our perspective, that's what we've done.
    Since then, on a yearly basis, we renew our licence in case it's needed. As I suggested before, should we ever decide to use it in line with a security requirement, we'd ensure that we looked at doing a PIA. However, as committed earlier, this is also something that we'll look at doing as we move forward, even if it's not being used.
    I have one last question, if I have the time.
    During the course of your testimony, Mr. Brisson, you indicated that Natural Resources uses forensic digital tools in order to mitigate threats. Are these threats solely with respect to the department's own internal systems, or does this include threats relating to Canada's natural resources?

  (1200)  

    That's a really good question. I would argue that it's mostly related to the data that are transiting within NRCan's business—the science and the research associated with it. For natural resources, it's outside of my ability to answer. I do not know.
    Thank you, Mr. Chair.
    Thank you, Mr. Kelloway.

[Translation]

    On behalf of the committee, I want to thank the witnesses from our first panel: Mr. Yarker, Ms. Martel, Mr. Brisson and Mr. Pelletier.
    We will suspend the meeting for a few minutes to set up the next witness panel.

  (1200)  


  (1205)  

[English]

     Welcome back, everyone.
    We're going to start our second panel.
    As a reminder to all our witnesses, please be mindful of the earpieces. Keep them away from the microphones when you're speaking to protect our interpreters from any hearing damage.

[Translation]

    I would like to welcome the witnesses appearing during the second hour of our meeting today.

[English]

     From the Canada Border Services Agency, we have Mr. Aaron McCrorie, who is the vice-president, intelligence and enforcement. From Correctional Services Canada, we have France Gratton, assistant commissioner, correctional operations and programs, as well as Tony Matson, assistant commissioner and chief financial officer, corporate services.
    From the Royal Canadian Mounted Police, I want to welcome Mr. Bryan Larkin, who is our deputy commissioner, specialized policing services, and Nicolas Gagné, superintendent, Royal Canadian Mounted Police.
    We're going to start with opening statements of five minutes.
    Mr. McCrorie, I understand that you are going first. You have five minutes. Please start.
    Thank you.
    As stated, I am Aaron McCrorie. I am the vice-president for intelligence and enforcement at the CBSA. It's a pleasure to be here today.
    Beyond the CBSA's role of processing people and goods at the physical border, the CBSA is responsible for enforcing Canada's border legislation, including the Customs Act and the Immigration and Refugee Protection Act.
    This responsibility includes conducting criminal investigations into alleged offences under border legislation. It is within this investigative purview that the CBSA uses digital forensics hardware and software in order to unlock and decrypt seized digital devices and subsequently search for evidence of offences. I like to think of it as using a locksmith to open a locked box that has evidence within it.
    Devices examined by the CBSA's digital forensics teams have been seized pursuant to specific court orders such as search warrants or judicial authorizations issued to CBSA investigators. The data extracted from seized digital devices is processed only within the CBSA's own digital forensic laboratories and is provided only to those having lawful authority to access that data.
    We are currently governing our use of this using the privacy information bank, which outlines clearly the types of information that we are gathering and the uses that we put it to.
    We are also in the process of working with our internal partners on a privacy impact assessment. We started that work in 2020. Unfortunately, it was delayed for a number of reasons. We are continuing that work and will be engaging with the Office of the Privacy Commissioner to finalize that privacy impact assessment.
    I'd also like to clarify that spyware is typically defined as software installed in a device for the purposes of covertly intercepting, monitoring and/or gathering a user's activities or data. I want to assure the committee and the Canadian public that digital forensic tools utilized by the CBSA's investigators are not spyware. We use digital forensics hardware and software to unlock and decrypt seized digital devices as an important tool in our efforts to enforce border-related legislation and to protect Canadians.
    I want to assure the committee members again that only properly trained investigators acting with judicial authorization use this technology.
    Thank you for the opportunity to appear before you. I will be happy to answer any questions you may have.

  (1210)  

    Thank you, Mr. McCrorie.
    Next, we'll go to Ms. Gratton.
    Please go ahead for up to five minutes.

[Translation]

    Mr. Chair and members of the committee, thank you for the opportunity to appear before you today as part of your study.
    My name is France Gratton, and I am the assistant commissioner for correctional operations and programs with the Correctional Service of Canada. With me today is Tony Matson, assistant commissioner for corporate services and chief financial officer.
    Protecting the safety and security of our institutions and our communities while promoting the safe rehabilitation of offenders remains our biggest priority.
    By its very nature, managing offenders poses various challenges, including the ongoing threats posed by the introduction and circulation of contraband. Contraband is defined as any item that could jeopardize the security of the institution or the safety of persons when that item is possessed without prior authorization.

[English]

    As per our legislative authority, contraband such as electronic devices will be seized. In response to the risk posed by the presence of contraband cellular phones and illicit drugs, CSC must leverage technologies to aid in detection and in intelligence development.
    In this context, CSC secured tools to extract digital information for intelligence purposes. We do not use these tools to conduct investigations on devices that are owned by staff, visitors or volunteers. Access to these tools is limited and controlled. The tools are used only on stand-alone computers that are not connected to any corporate network. Strict safeguards are in place to limit access to any extracted data.
    In the past, CSC has undertaken the privacy impact assessment checklist on CSC's digital forensic activities. As the use of enhanced tools to combat criminal activity has expanded over the past few years, CSC has committed to renewing the initial assessment and to completing an updated checklist.
    We remain committed to upholding our privacy obligations with established and appropriate safeguards in place.
    Thank you. I welcome any questions that you may have.

[Translation]

    Thank you for your opening remarks, Ms. Gratton.

[English]

     Mr. Larkin, you're next for up to five minutes. Go ahead, sir.

[Translation]

[English]

    Good afternoon, Mr. Chair and honourable members of the committee.
    I'm pleased to be joined by Superintendent Nicolas Gagné, who's the director of the RCMP's technical investigative services operational directorate.
    We're also very grateful for the opportunity to speak to you today about the RCMP's use of tools that extract and analyze information from digital devices that are essential to modern-day policing.
    First, I would like to acknowledge and confirm that the RCMP does use some of the digital forensic tools that were cited in the December 2023 CBC article, including both Cellebrite and Graykey, which is now also known as Magnet Forensics.
    The media reports suggesting that these digital forensic tools are considered spyware are inaccurate, though, and I will clarify that through your questions.
    These tools are used on digital devices that are lawfully seized through criminal investigations. They obtain and analyze data on a device that is in possession of the RCMP. We use judicial authorization, search warrants and general warrants required from the courts, specifying how, what devices and the time frame during which we can collect the information from these devices by trained and skilled investigators. These tools are not used in any way for surveillance and/or mass surveillance.
    For criminal investigations, the RCMP only uses these tools to extract and recover data in support of its mandated activities under the following circumstances: prior judicial authorization from our Canadian courts and within the prescribed limits of the search warrant; voluntary consent from the device owner, such as a witness to a crime and/or the victim of the crime; and/or under exigent circumstances when it's not possible to obtain a warrant, as defined under the legislation of the Criminal Code of Canada.
    For administrative investigations, the RCMP does have legislation and policies that govern our use. The lawful ability to request assistance from our digital forensics program does exist within our organization. The collection of evidence through these tools is based on necessity and proportionality to the allegations of the internal conduct investigation. We would only perform an examination on RCMP-owned devices, and any personal device would require a judicial warrant.
    While these tools can allow full access to all the information on the device, only that which is specified in the warrant or relevant to the administrative investigation is provided to the investigators.
    Despite the privacy protections in place, the RCMP recognizes the inherent privacy issues related to these tools and the need for transparency and accountability. In January 2021, we provided a technical briefing to the Office of the Privacy Commissioner on digital forensic tools, and a privacy assessment is currently under way and is expected to be completed by mid-2024.
    Again, thank you for the opportunity to be here. We look forward to your questions.

  (1215)  

    Thank you, Deputy Commissioner Larkin.
    We're going to start with our first six-minute round.
    Mr. Brock, you have six minutes. Go ahead, please.
    Thank you, Chair.
    Thank you to the witnesses for your attendance today. I'm going to start by making some opening remarks.
    This story broke as a result of an ATIP from a York University professor, an expert in privacy. The data was turned over to Radio-Canada. Radio-Canada reached out to your respective departments asking if you're using the software, confirming that you're using the software, and if you had first conducted privacy impact assessments. According to their written responses, as per Radio-Canada, none did.
    My first question is for the CBSA.
    When did you purchase the software, sir, from Shared Services Canada?
    The first procurement of Graykey was in March 2019. The first purchase of Cellebrite premium units was in March 2021.
    How many times have you used this particular software in question?
    I couldn't tell you exactly how many times we've used the software. What I can tell you is that, for example, in 2023, we had 119 criminal investigations during the course of which we seized 712 devices. When we say, “712 devices”, that will include, for example, the memory card or the SIM card that's in the cellphone, so a cellphone could count as three devices.
    Will you table with this committee a number as to how many times you used this specific software from the date of purchase?
    We'll do our very best. I can't assure you that we can count every single instance, but we can certainly give you stats.
    We're talking hundreds.
     I'd say yes.
    In 2021, we seized—
    We're talking about hundreds of investigations using this software and not once did your department seek out a privacy impact assessment. Is that correct?
    We do have the PIB, which is the privacy.... I apologize—the acronym is slipping my memory.
    Is it the PIA?
    It's a PIB.
    We post online what types of information we are gathering, under what circumstances we're gathering it and how we're using it.
    We've started our internal process to do a program-level PIA because we want to do it at the program level, not at the device level.
    You understand, sir, that the PIA is not optional.
    Agreed.
    It's a directive by the Treasury Board.
    Agreed.
    When the commissioner testified last week, the commissioner reached out to your department and specifically asked you when you were going to start conducting PIAs. Your response was that you're looking into it, or you were about to start it.
    What was your actual response? Are you still looking into the use of this mandated process, or have you actually started as a result of this controversy?

  (1220)  

    As I noted in my opening remarks, we started the process to do a privacy impact assessment for the entire criminal investigations program in 2022. We're following our internal processes in doing so.
    As a result of that, we are now moving forward with the PIA, which we'll work with the Privacy Commissioner on.
    We have an auto theft crisis in this country. It's reaching alarming rates—so much so that the government is conducting a summit, which I believe is happening this Thursday.
    The CBSA is in charge of protecting our borders. Is that correct?
    Amongst others...yes.
    Justin Trudeau's and this government's mismanagement of our federal ports has turned them into parking lots for stolen cars that then disappear overseas. For instance, the port of Montreal—where the majority of stolen cars leave Canada—only has five CBSA agents to inspect the massive volume of containers that leave each year, according to Le Journal de Montréal. They also have one X-ray scanner that constantly breaks down. The federal ports in Vancouver, Prince Rupert and Halifax tell a similar story.
    According to Peel detective Mark Haywood, the CBSA checks “less than one per cent” of all containers leaving the country. We're talking thousands of containers leaving every week. Why?
    With all the money the government is providing the CBSA, why are you contributing to this crisis—
    I have a point of order, Chair.
    What is the relevance to this study?
    Thank you for the point of order. I think I've mentioned before, Ms. Damoff, that I generally give a lot of latitude to members of Parliament. I expect that Mr. Brock will come back to where we're at.
    Perhaps we'll find out. He has a minute and 31 seconds left.
     Mr. Brock, go ahead, please. You have the floor.
     His title is “intelligence and enforcement”. This question I'm posing to him is squarely within his ability to answer.
    With the hundreds of millions of dollars that the government is transferring to the CBSA to assist you in doing your work to enforce and to inspect, why has the department been so derelict in its responsibilities to inspect these containers? This clearly sends a message to the criminal underworld and the organized crime units that Canada is a haven for this type of activity.
    We have law enforcement right here who I'm sure are very frustrated with your lack of attention to this issue. Please explain to law enforcement why we only have five agents.
    What I'd suggest is that, in fact, we are a key partner working with law enforcement across the country.
    Over the last year, we participated in 14 different joint operations with local police in the Toronto area, for example. We're working very closely with police in Ontario and Quebec to take a risk-based approach to examining containers.
    I think you can understand that it's completely impossible to search every single container entering or leaving a port—
    Why?
    The sheer volume and numbers of the thousands of those containers—
    Ask for resources.
    What we are doing is that we are taking a risk-based approach using intelligence that we get from our partners in law enforcement—
    We're telegraphing to the world that we're not inspecting the containers leaving and we're not inspecting the containers arriving. That's why we have a fentanyl crisis. We have the illicit, deadly drugs coming from Asia that are not being inspected at the ports in Vancouver.
    I have a point of order, Chair.
    Mr. Brock, the six minutes are up.
    Thank you, sir.
    Thank you.
    Go ahead on your point of order, Ms. Khalid.
    I just wanted to bring up that, unless auto theft is being conducted by surveillance devices, I don't see how that's relevant, Chair.
     I appreciate that. Thank you.
    Go ahead, Ms. Damoff.
    Thank you, Chair.
    Thank you to all of the witnesses for being here.
    I'm just going to start with a rhetorical question. I'm wondering if Mr. Brock is suggesting that this software be used to combat auto theft. I didn't hear that work its way into his question.
    Trade would come to a halt if we inspected every single shipping container that left Canada. Is that not correct?
    If we inspected every single shipping container coming into the country and leaving the country, trade would come to a halt.
    Thank you.
    Moving on to what our study is actually about, I have just a quick question.
    Chair, I have a point of order.
    We had two Liberal members interrupt Mr. Brock because of his line of questioning. Then Ms. Damoff continued on the exact same line of questioning.
    This isn't a question, Chair, about the Standing Orders or relevance. It's about looking to disrupt a member who rightfully has the floor, who is within his time and who is asking questions and giving an opportunity to respond.
    We've seen this before. If we want the meetings to descend into pure chaos, that invitation can be accepted, but now that we've seen that there are games being played, I think that the disruptions from Liberal members need to end.

  (1225)  

    Thank you, Mr. Barrett.
    Again, we've been on this committee together long enough, all of us, to know that I generally give a lot of latitude to members to utilize their time in the manner in which they choose. We have subject matter experts in front of us. Yes, we are dealing with a subject. My expectation is that we are going to get back to where we need to go with that subject.
    I don't like, frankly, these constant interruptions and points of order just because we don't like what somebody's saying or what a line of questioning is. That goes for all sides.
    Ms. Damoff, you have five minutes and 22 seconds left. Please continue with your line of questioning.
    You have the floor. Go ahead, please.
    Thank you.
    I need just very quick answers from all three of you. Maybe we'll start with the RCMP and work this way.
    Is this software used on your employees' phones?
    We do not use the software on employees' phones. We do have the ability to use it because our phones are deployed operationally. Each member signs a consent around user use, etc. However, we don't actively monitor them. It would be through a specific allegation relating to a code of conduct or a criminal investigation.
    As I alluded to, if it's a criminal investigation, we will always seek judicial authority. If it's an internal code, then potentially the investigator will consult with digital forensics and make an assessment as to whether it's required or not.
    Thank you.
    Thank you for the question.
    No. We use these tools only in the pursuit of criminal investigations related to our border mandate, always with the use of a judicial authorization.
    Thank you.
    The answer is no. We don't use the software on employees' cellphones. We use it only on seized, contraband cellular phones that would have been introduced into our institution illegally.
    Thank you. My next question is for CBSA.
    You talked about seized devices. If I'm going through security coming into Canada and I'm taken off to secondary screening and you seize my phone, is that an instance where you would use this software?
    No.
    There are two different situations at play there. When you're crossing the border, there are regulatory requirements in place that allow us to do a search. If there's a search of a cellphone, that is done manually with the co-operation of the person in front of us.
    The use of this technology in my particular organization is part of criminal investigations that, more often than not, are taking place inland and are related to things like firearms smuggling or violations of the IRPA. That's related to, for example, violations of the Immigration Act and counselling people to misrepresent themselves in order to get new immigration documents.
    When it's seized and reviewed manually, is this software not used?
    No.
    Okay. Thank you for that.
    I think the RCMP might be best-placed to speak to this.
    Can you explain the process you need to go through in order to get information from a cellphone? It's a criminal investigation. What is the process that you need to go through in order to use this software or anything else to access a phone?
    The digital forensic examiner would first get a copy of the warrant—the judicial authorization—to see what is the scope. They would determine which tool to use, depending on capability. Those capabilities vary depending on the make, model and operating system. They would retrieve—as much as possible—an image of the device. Sometimes it's not possible. Sometimes it's not possible at all to retrieve anything. Once the information is retrieved, the digital forensic examiner would then narrow it down to the width and scope of the warrant.
    That is the report that would be provided to the investigator.
     There have been implications that this software is being used to access Canadians' phones. I think I'm hearing from all of you that the case is that, if this software is used for the general public.... We heard previously that there are employees who are subject to its use on their phones. None of you are in that situation, but I think, more broadly, Canadians can feel confident that you're not accessing their cellphones without following the proper judicial process.

  (1230)  

    That's correct. These tools are targeted to a specific device. For example, in 2023, we examined 6,452 devices—that could be a smart phone, tablet or computer—across the country, but those are with judicial authorization so there's actually a tangible piece of evidence that we have. As I alluded to, a witness or a victim of crime may share their consent because they want to provide evidentiary documentary.
    Given the complexity of this, I would like to extend to the committee an opportunity. If you would like a technical briefing, Superintendent Nicolas Gagné and his team, at your convenience with the clerk, would be pleased to welcome you into an RCMP facility and we would take you through how we extract digital evidence with judicial authorization so you could understand the complexity, the skill set, the training and the work we do.
    Thank you.
    Actually, having been part of an RCMP technical briefing on another issue, I would love to take you up on that. I would encourage the chair to perhaps follow up on the committee's taking advantage of the offer we've just been given.
    Thank you, Ms. Damoff.
    Just to advise the committee, if there is a desire, we would need a travel request on behalf of the committee to do that, which would be sent to the Liaison Committee. I believe the deadline for that is February 16. That's something for the committee to consider.

[Translation]

    Mr. Villemure, you have the floor for six minutes.
    Thank you very much, Mr. Chair.
    I will address all three organizations and ask them to answer me one after the other.
    During the investigation by Radio-Canada, you said you had not conducted any privacy impact assessments. Did I understand correctly?
    Let’s start with you, Mr. Larkin.

[English]

    That is correct.
    We're in the process of completing it. We met with the Privacy Commissioner in 2021. However, we expect our privacy impact assessment to be complete by 2024. We do not have one for digital forensic tools. We do have one for ODITs, which is actually posted on our website.

[Translation]

    Thank you.
    Mr. McCrorie, I’m listening.

[English]

    We use the personal information bank for now to demonstrate what information we're gathering and how we're using it, and we're in the process of doing a PIA, which we aim to have done.... It will probably be a little longer than for the RCMP, but we're aiming to have it done in co-operation with the OPC.

[Translation]

    So it’s ongoing, but it’s not finished.

[English]

    Exactly.

[Translation]

    Ms. Gratton, over to you.
    Once the software was purchased in 2010, we conducted a series of checks to determine if a privacy impact assessment was required. Based on the program we were setting up, the tool we were using and the way the information was going to be managed, it was not considered necessary.
    I see. Is that the answer you gave Radio-Canada during its investigation?
    Yes, we responded by saying that we had followed the list of checks in line with a privacy impact assessment.
    Mr. McCrorie, did you say the same thing to Radio-Canada as part of its investigation, meaning that you were following the process, or did you say no?

[English]

    What we did was we outlined the process that we were going through. Very similar to our colleagues in the Correctional Service, we worked with our internal colleagues to assess the need. What we determined was that, rather than doing a PIA for each individual device, what we need to do is do a PIA for the program as a whole, so it's not only how we use those individual devices but how they are being used in the context of the program.

[Translation]

    Did you respond to Radio-Canada in the course of its investigation?
    I’m sorry, but I have to confirm the exact words we used to respond to Radio-Canada.
    Very well.
    Mr. Larkin, I’m listening.
    I would say the same thing. I’m not sure what we said to Radio-Canada, but we will check.
    Very well.
    Ms. Gratton, you talked earlier about proportionality when using this tool. Could you tell us more?
    I said we use the tool on seized devices. We’ve seen a marked increase in the number of incidents involving drones, as well as a significant increase in the number of cellphones seized in facilities.
    Accordingly, to collect security intelligence, we use these systems to extract data and prevent other incidents. As for proportional use of this tool, it is indeed necessary to fight contraband and prevent security incidents.

  (1235)  

    Would you say it’s easier to get information with the help of that tool even if, in the end, it requires authorizations that are just as hard to get?
    No, it’s not easier. The information we get this way is compiled with security intelligence we already have. It helps us move the needle in our efforts to prevent contraband materials from getting into our facilities.
    Thank you.
    Mr. McCrorie, I have the same question for you: do you use this tool because it’s easier? Is the information you get this way more reliable, even if it involves a privacy impact assessment and other processes?

[English]

     I don't think it's a question of more.... If you have a device that's locked with a password, we need the technology to open up that device. That's why, in another era, we would have had a locksmith open a box that would have had receipts in it, for example. Now, when we're dealing with firearms smuggling, we'll have electronic receipts on a cellphone or on a computer. Our only way to access that information is to unlock the device and then translate information on that device into a format that can be used in a court of law.
    It's not a question of its being easier. It's the technology we need to use to keep up with the technology that criminals are using.

[Translation]

    I see.
    Mr. Gagné, I think you have an answer for this question.
    Mr. Chair, I share Mr. McCrorie’s point of view. Technological tools help to get the evidence needed during investigations. It’s not a matter of it being easier, it’s a matter of getting as much access as possible to evidence.
    Do you use those tools to get around the password that locks the phone or to get the information on the phone?
    It depends on several factors, like the brand, the model or the types of phone locking mechanisms. Getting around the password is just one of many things the tool allows us to do.
    That’s perfect.
    Ms. Gratton, at this committee, we’re trying to assess different situations in order to propose legislative improvements that would lead to better public policy.
    Protecting privacy is a subject that’s been on everyone’s mind for some time. People are worried. In the various testimonies we've heard at committee, people have told us that when they click “I accept” online, they don’t always know what they’re accepting. They know they want to get the software, for example, but we are realizing that education on privacy isn’t adequate.
    Another of the committee’s mandates is to maintain public trust in institutions like the Royal Canadian Mounted Police, the Canada Border Services Agency and the Correctional Service of Canada.
    Some articles in the media, such as those published by the CBC/Radio-Canada, can sow doubt in the public’s mind. As soon as the article in question was published, people turned to me to ask what was going on. They were worried. Do you think you can reinforce the public’s trust through this morning’s testimony on how you use technological tools?
    Mr. Villemure, your witness will have to answer very quickly, because your time is up.
    When it comes to trust, it’s important to emphasize that these technological tools help us make our facilities safer. Since they’re used on contraband cellphones, it means they’re used for very specific purposes. The information extracted from cellphones is used only for intelligence purposes. In that way, I think we can show that the tools we are talking about are not used outside of the mandate.
    Very well, thank you very much.

[English]

    Thank you.
    Mr. Green, you have six minutes. Go ahead, please.
    Thank you.
    I was sharing with my colleague that I am finding it difficult to imagine that, out of the hundred-plus organizations that I just requested send us back information, we're going to see a huge deviation in the answers that we're receiving.
    I think we've established—feel free to correct me if I'm wrong—that the use of this technology is an investigative use, whether it's through law enforcement agencies or through staff in terms of federal employees. I am to understand that most of you have this within the legal framework.
    Have any of your agencies used it with your employees?
    We've used it on one occasion for an internal matter that was on consent, actually. We used digital forensic tools. It was a consent matter.
    Okay.
    Mr. McCrorie.
    We haven't, to my knowledge.
    Ms. Gratton.
    No, we haven't used it on employees.
    Forgive me. I'm not impugning anybody, but drones are one way that contraband comes in. It's sometimes suggested that staff are, on rare occasions, involved in bringing in contraband.
    Have you ever had an occasion to investigate or use this technology with any of the corrections staff?

  (1240)  

     No. There would be occasions when we would investigate staff. We would not use specific legal software. It would have to be specifically within an investigation.
    Is it safe to say that all of your staff are issued federally issued devices?
    A large portion of them are, yes. That would be correct.
    In your case, none of them are ever monitored in this way.
    The mandate of my organization is outward-facing. We do criminal investigations involving violations of border-related legislation.
    That's fair.
    Notwithstanding the car thefts, I think we've established the facts, which are that this panel, which I think would have the greatest rationale for and likelihood of using this technology for investigative purposes, has provided very straightforward answers to what this is and what this isn't. I accept that.
    We have all these other groups—and I'm just saying this for the purpose of the committee, not as part of the line of questioning. We have at least three or four of these meetings at two hours apiece.
    We have at least six.
    I'm going to put on the table right now and say that I'm struggling to find where the conclusion of this will be in terms of the value and the diminishing return on value of the questions.
    I'll share with the committee that I am considering a way in which we might be able to digitally communicate with people and share with them a list of agreed-upon questions for response, because I'm not sure how another three days, six hours, eight hours or 10 hours of this is going to go. I know there are lots of people with live motions. I would also state that I'm at a point now in this committee where I'm hoping to steer it back onto our legislative schedule and away from whatever happens to have been in yesterday's headlines, to do the important work of the committee and to hopefully start to address the gaps in legislation.
    I just don't know what's left here, so I'm actually done with the rest of my line of questioning.
     I thank you all for being here. I don't think there's anything more that needs to be said in terms of the scope of your work. I appreciate you for it. I would say I look forward to seeing you back here again, but that's not always the case.
    With that, I'll hand my time back over to the committee.
    Thank you, Mr. Green. In the two minutes that you would have had left, I'd like to explain where we are right now for the benefit of the committee.
    We do have another panel that's scheduled to come in on Thursday. I don't think the notice of meeting has been published at this point, but it will be by later today. Based on the list we had in the motion, the panels will consist of at least three or four of those departments.
    The clerk has gathered all of the contact information regarding the motion that was passed the other day about the privacy impact assessments. We haven't done anything with that because we just received the complete list during the meeting. That takes us up to next week, when we're expected to continue with more panels based on the motion. That takes us up to the 27th, when we're going to have the RCMP commissioner and the staff sergeant come in and speak about the SNC-Lavalin motion that was passed as well.
    That's where we are right now in terms of the meetings of the committee, Mr. Green.
    Go ahead, sir.
    The one group I'm most keenly interested in hearing from is the unions. I want to hear from the representatives, because if there's no real complaint there from the representatives of the actual federal employees, it becomes very difficult for me to pursue something that may or may not be a privacy issue. I would think that those collective agreements would have stipulated most explicitly where there would be a contravention of their privacy rights.
    If it could be possible, Mr. Chair, to prioritize the invitations to our union representatives to come before this committee, for me, that would determine whether this is something I would see fit to continue to pursue.
    This is a very dynamic meeting. We just received confirmation about Jennifer Carr, who was on the list, from the Professional Institute of the Public Service. She's confirmed for February 15. We may be able to advance. We've had one other confirmation from one of the unions, Mr. Green. We could adapt the meeting schedule to reflect what you said, but have the president of the Professional Institute of the Public Service, Ms. Carr.
    We're still in our rounds, but I'm going to open it up for Mr. Barrett for some comments. I will open it up to Ms. Khalid or others if they have other comments as well.
    Go ahead, Mr. Barrett.

  (1245)  

     I'm generally aligned with the thought that we not just have a Groundhog Day of meetings, but I do think the question of ministerial accountability is important. These PIAs are not optional, so if we're going to set a work plan to wrap this up before six meetings and Mr. Green wants to prioritize hearing from the workers' representatives, if that box is being checked, then I would say we should prioritize hearing from the people who are accountable for not having gotten the PIAs.
    We should prioritize which ministers we want to hear from. I think there was a discussion about having the procurement minister or the Treasury Board minister come before committee, so we should get those on the books. Then Mr. Kurek suggested that, if we had questions for the remaining departments, perhaps we should collect those questions from all parties, set a deadline, submit them to the departments with a deadline for response and then move on.
    Okay. I appreciate those comments, Mr. Barrett.
    As chair I am guided by the clerk and the analysts in following the motion that was adopted by the committee. If there is a desire to take in some of the suggestions that have been proposed during this discussion, then I will need direction from the committee on just what to do in that regard.
    Ms. Khalid, Mr. Villemure has ceded to you. Go ahead, please, Ms. Khalid.
    I'm just going to ask the witnesses for their patience on this, because we may resume the line of questioning. We don't have much time left.
    Ms. Khalid, go ahead.
    Thanks very much, Chair.
    I really think the issue that's been highlighted is important. I'm quite intrigued by some of the testimony we've heard thus far. I really agree with Mr. Green that we need to hear from unions and the public service.
    I'll put that on my campaign poster.
    I really think that, instead of ending it at this time, we should abbreviate it and see if there is something that we as a committee can recommend to ensure that privacy and privacy impact assessments have the value within our departments that they should.
    At this time, I am in favour of abbreviating the study with more of a focus on unions and the public service, as Mr. Green has suggested, and going from there.
    I appreciate the comments. I will tell you that the President of the Treasury Board has been invited. We're waiting for a date for that.
    What I'm hearing are two sides. There is what Mr. Green has suggested, and then there is what Mr. Barrett has suggested. Mr. Green wants to hear from those who are impacted. Mr. Barrett wants to hear from those who are in charge. Perhaps the clerk and the analysts and I can collectively find a way to get to that point over the course of the next couple of meetings. The challenge we have is that we do have the meeting ready to go on Thursday, and it will involve departments as per the motion. We can continue on with that. We may abbreviate the number of meetings down from six to maybe five at this point, because this is the second one that we've had on this.
    Mr. Green, I saw your hand. Go ahead, please.
    We can negotiate in public with the Treasury Board president and the staff who are watching to say that, if they can be available to this committee sooner rather than later, then we can wrap it up. Otherwise, we're going to be in a scenario of having all departments come before the committee. Let's hopefully get that as a bit of an incentive for the president to come before the committee.

  (1250)  

    Here's what I would like to do then.
     Mr. Green, if possible, we can continue for the next few minutes with our witnesses. I'm going to suggest that we continue with the next meeting with the departments. We will have a committee business meeting, at which I can update the committee on where we are with the witnesses. We've taken about 10 or 15 minutes on this, which I think is unfair to the witnesses who presented themselves today.
    I think we have clear direction from the committee on where we want to go with this. I would ask now that we continue with our witnesses. We'll go ahead with Thursday's meeting and then have a subcommittee meeting at that point. I'll make time for that if that's okay. Then I can update you on where the President of the Treasury Board is and where some of the other witnesses that were suggested here in this discussion are. Is that fair? Are we agreed? Okay.
    We have Mr. Green's round completed.
    I think I have Mr. Kurek next for five minutes.
     Go ahead.
    We're going to have very shortened rounds here. We do have a little bit of extra time because of the suspension, but we'll have five, five, two and a half, two and a half, and then we'll conclude.
    Go ahead, Mr. Kurek.
     Thanks very much.
    I appreciate the witnesses.
    I will just give some unsolicited advice. Let's be proactive on PIAs. The commissioner came before the committee and said that he wants to work with you and that he will be as responsive as he possibly can, so let's make sure—instead of our finding out from the media and going through this rigamarole—that departments, agencies and the like are proactive. I think that will save you all a lot of these tough questions.
    We had different witnesses in the first hour of this meeting who talked a lot about the potential use of this technology when it comes to employees. I know there are ECCC, NRCan and a whole host of others. You're talking about this in terms of law enforcement and its application, but I just want to, if I may, find out where you are in terms of the people who work for your departments—those within law enforcement administration. I do not mean the program specifically, because you have answered on that very clearly, but I'd like to hear from you about whether there are tools, techniques and methods through which you would observe employees and other individuals who work for you in terms of the data that could be on their devices.
    Let's start with the RCMP. I'm hoping for very brief responses, because I have some other questions.
    Thank you for the question.
    In short, no, we do not use any technology to monitor and/or manage or supervise our employees. We do have a user agreement for all of the devices we deploy. We do have a policy that governs the use of those devices.
    Naturally, within our organization sometimes members are subject to allegations regarding code of conduct and/or criminal obligations, and we may need to launch an internal investigation, part of which may be to look at using digital forensic tools. As I alluded to, we've used them on one occasion with consent.
    I apologize, but I'm really short on time.
    Mr. McCrorie, go ahead.
    Again, professional standards investigations take place outside of my particular organization, so it's hard for me to comment on their techniques and what they do.
     I would ask you to bring that up to whoever within the CBSA is responsible for that and to ask them to provide that answer in writing to this committee. That would be very helpful.
    Ms. Gratton, go ahead.
    I would say the same thing. We don't use any tools to observe or monitor our staff. That's like the same situation—
    Again I would ask that you bring that up the chain and make sure to get those answers to the committee.
    Mr. McCrorie, I am curious, because there has been talk about investigations. Over the course of COVID there were conversations around ArriveCAN and a whole host of instances surrounding that and about people who crossed the border during the pandemic when there were restrictions. Were these sorts of investigations ever initiated because of COVID-related enforcement?
    What we're doing is enforcing criminal elements of border-related legislation, for example, with respect to individuals who have been counselling others on how to fraudulently obtain immigration documents, a student visa or a work visa, or individuals who have been involved in the smuggling of firearms or parts. There was a case that went to court last year, in April 2023, and the individual got roughly 12 years for manufacturing ghost guns and for smuggling the parts in. Those were the instances in which we used those tools to get the evidence, as did our colleagues in the RCMP, to successfully prosecute those who had broken the criminal laws.
    It's very clearly limited to breaches of the Criminal Code, so for somebody who—

  (1255)  

    It was border-related legislation, so they were booked, for example, under our own Customs Act.
    Okay. You're telling me—and feel free to clarify—that when it came to any COVID-related enforcement, this technology would not have been used.
    I'm not aware of any instance and I can't think of an instance in which we would use it in the context of COVID. Again, the only instances in which we would use it would be with prior judicial authorization.
    I appreciate that.
    Ms. Gratton, I have just a few seconds left here. There are, for example, safe injection sites in our prisons, but it's kind of “don't ask, don't tell” when an inmate goes to a safe injection site to use contraband. Quite often they have had to get that from somewhere. I'm just trying to square this circle here about enforcement and whatnot when it comes to the dynamics in a prison, where there's alleged criminal activity but it's “look the other way” when it comes to certain aspects of that.
    Could you comment briefly on how I square that?
     Boy, does it ever have to be brief.

[Translation]

    Ms. Gratton, I’m sorry, but you will have to answer quickly.

[English]

    Just quickly on overdose prevention sites, it's not a question of not looking at it. It's a harm reduction program, and it's really to enforce support and help inmates who are struggling with substance use. The distinction is that, when we are dealing with trafficking, then we go with the enforcement. That's where we get into taking measures and discipline to prevent the trafficking and the contraband. It's two different approaches.
    Thank you, Ms. Gratton.
    Thank you, Mr. Kurek.
    Mr. Housefather, you're next. You can have unlimited time—
    Voices: Oh, oh!
    The Chair: —since you're a new guest to the committee.
    Thank you, Mr. Chair. That was very flattering.
    In order to save time, I just want to clean up on some issues. I'm going to ask my questions of the RCMP, and I'm going to ask the other departments to affirm if the answers the RCMP give me are the same as they would also have.
    The first thing is the confusion among spyware, malware and data extraction technology. Spyware and malware are bad things that people put on your phone to continuously extract data and use it for nefarious purposes.
     For the RCMP, can we assume that we don't use spyware or malware whatsoever and that we simply use data extraction tools?

[Translation]

    No, not at all.

[English]

    Is it the same?

[Translation]

    Same thing for us.

[English]

    It's the same also. That would mean that, when you extract data, you've taken the device, you've extracted the data and you do not leave anything on the phone or the tool that you extracted the data from. Is that correct? You would give it back without leaving any type of software on it to continue to extract.
     That's correct.
    Is it the same?
    I'd say it varies by the circumstances. Remember that this is evidence in a criminal procedure, so we will hold that as part of our evidence and for part of it we use the tools to extract and translate the data into a format that can be used in judicial—
    No, I understand, but you're not giving someone back the phone with a tool on it to continue to extract their data without their knowledge.
    No.
    Is the same true, Ms. Gratton?
    We are not giving back the phones because they are contraband, so we keep them.
    I understand.
    Would it be true, in the case of the RCMP, that you are using technology to extract data that is consistent with RCMP-type organizations in the United States, in the U.K. and in other similar types of countries?
    I would say so, yes.
    Would you say that the policies that you use are consistent as well, noting the difference in our criminal law?
    I would say they're somewhat similar, yes.
    Thank you.
    Would you say that as well for the CBSA?
    To the best of my knowledge, yes, and I would say it's also very similar to how our colleagues use it.

[Translation]

    Is it the same thing for the Correctional Service of Canada?

[English]

    I would say there are some differences depending on the jurisdiction, but it can be similar, yes.
    Perfect.
    I would now want to just establish that these devices that you have cannot be used remotely. In order to use the data extraction technology, you actually need to have the device in hand. Is that right? You cannot surreptitiously take data off a device that is not in your possession and the user have no knowledge that you're doing that. Would that be correct?
    For the technology in question here, the Cellebrites or the Magnet Forensics of this world, yes. We need the device in our hands to extract the data.
    A Canadian sitting in Winnipeg can be sure that the RCMP is not, never having had possession of their device, extracting data from it.
    Using these tools, that's correct, yes.

  (1300)  

    We won't get into what other tools you may have at this point, because that would be another study.
    CBSA...?
    Yes, we use the technology in our digital forensics labs, secure facilities. It's in our physical possession, again, obtained through a search warrant.

[Translation]

    Perfect.
    Is it the same thing for you, Ms. Gratton?

[English]

    It's exactly the same, yes.
    I have one last question.
    You mentioned the one time only that you used this on an employee. My understanding, then, is that, if you're ever using it on an employee, it's a result of potential criminal activities by that employee. It's not because they're breaking HR protocols of the RCMP that don't get into criminal law, other than in that one instance. Is that correct?
    This one was actually not a criminal investigation. It was an internal matter. It was a departmental security investigation, and the member actually consented. They came forward and consented to use the device on their tool.
    They did so in order to clear themselves, I presume. They felt that the information there would clear them.
    What I'm asking, then, is that, just like any other potential criminal activity that exists, I would assume, if the criminal activity exists with an employee of the RCMP, then it would fall under the warrant provisions and the other provisions that you use with anybody else. You wouldn't be dealing with the employee for employee matters, except, as you mentioned, through consent to do that.
    For a criminal investigation, we would seek judicial authorization, although there are authorities under the RCMP Act that would allow us to actually use the technology, use the actual tools, but we would use that on a case-by-case basis. Superintendent Gagné's team looks at a threshold and a framework, and there's consultation with our professional responsibility office and the investigators doing that code of conduct investigation.
     It's done knowingly. Employees are already signing on to policies that are well in their possession. They know this.
    That is correct.
     Is it the same thing?
    Yes.
    Thank you very much, Mr. Chair.
    Thank you, Mr. Housefather.
    That concludes our panel for the second hour.
    Monsieur Gagné, Mr. Larkin, Mr. McCrorie, Madame Gratton and Mr. Matson, thank you so much for appearing before the committee today.
    For the sake of the committee, we have scheduled Environment and Climate Change, Fisheries and Oceans, the CRTC and the Canada Revenue Agency for Thursday. We're taking the advice of the committee. We're trying to get who we need to get before this committee sooner rather than later in order to continue this study.
    I want to thank the clerk, the analysts and the technicians for today's meeting.
    The meeting is adjourned.
Publication Explorer
Publication Explorer
ParlVU