communications security establishment

79
Communications Security Establishment: What do we know? What do we need to know?

Upload: others

Post on 20-Feb-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Communications Security Establishment

Communications Security Establishment:

What do we know? What do we need to know?

Page 2: Communications Security Establishment

• CSE is Canada’s national cryptologic agency

• Two programs: – Signals Intelligence (SIGINT)

– Information Technology Security (ITSEC)

Page 3: Communications Security Establishment

CSE mandate

Section 273.64(1) of National Defence Act

• Mandate A: Acquire foreign intelligence from the global information infrastructure

• Mandate B: Protect electronic information and information infrastructures of importance to Government of Canada

• Mandate C: Assist federal law enforcement and security agencies

Page 4: Communications Security Establishment

Programs vs mandates

• Signals Intelligence (SIGINT)

– Mandates A, B, C

– 72% of 2016-17 budget

• Information Technology Security (ITSEC)

– Mandate B

– 28% of 2016-17 budget

Page 5: Communications Security Establishment

Origins of CSE

Page 6: Communications Security Establishment

Allied cooperation during WWII

• US and UK agreed to coordinate SIGINT activities, share intelligence output

• Canada also a participant

• Joint allocation of intercept, processing work

• Laid foundations for post-war cooperation

Second JAC Conference March 1944

Page 7: Communications Security Establishment

Allied cooperation

Second Joint Allied COMINT Conference, March 1944

Page 8: Communications Security Establishment

BRUSA (UKUSA) Agreement

• BRUSA Agreement signed by US and UK on 5 March 1946

• Renamed UKUSA Agreement

• Canada, Australia, New Zealand considered partners

• Basis for intelligence-sharing partnership now known as the “Five Eyes”

Page 9: Communications Security Establishment

Post-war Canadian SIGINT

• Communications Branch of the National Research Council (CBNRC)

• Established 1 September 1946

• Renamed CSE 1 April 1975

• Intercept stations run by military, now Canadian Forces Information Operations Group

Edward M Drake Director, CBNRC 1946-1971

Page 10: Communications Security Establishment

Cold War

Page 11: Communications Security Establishment

Post-Cold War interlude

Page 12: Communications Security Establishment

9/11

Page 13: Communications Security Establishment

CSE in the early 21st century

• Post 9/11

– Counter-terrorism becomes top priority

– Support to Military Operations (e.g. Afghanistan) increases in importance

• Advent of the Internet

– Exponential increase in comms and other data

– Predominantly commercial comms links

– “Data at rest” becomes accessible

Page 14: Communications Security Establishment
Page 15: Communications Security Establishment
Page 16: Communications Security Establishment

Intercept sites: 2016

Page 17: Communications Security Establishment

Cyber collection

Page 18: Communications Security Establishment

“Special source” operations

Page 19: Communications Security Establishment

Master the Internet

“Our vision is security through information superiority. We want to master the Internet. That is a challenge that no one institution — be it ours or the National Security Agency, NSA, for that matter — can manage on their own…. That is what we mean by working together. If we are to master that Internet, we will have to do it together; and we are focusing on that.” – John Adams, 30 April 2007

Page 20: Communications Security Establishment

The Ties That Bind

“According to [CSE], the Five-Eyes alliance is more valuable now than at any other time in history, given the increasingly complex technological challenges faced by the partners.” — Office of the CSE Commissioner, 17 July 2013

Page 21: Communications Security Establishment

President-elect Donald J. Trump

Page 22: Communications Security Establishment

Target traffic found worldwide

Page 23: Communications Security Establishment

Does CSE monitor Canadians?

Page 24: Communications Security Establishment

Does CSE monitor Canadians?

• No, it’s against the law

Page 25: Communications Security Establishment

Does CSE monitor Canadians?

• No, it’s against the law

• Yes, but only in limited, legal ways

Page 26: Communications Security Establishment

Does CSE monitor Canadians?

• No, it’s against the law

• Yes, but only in limited, legal ways

• We don’t know

Page 27: Communications Security Establishment

Does CSE monitor Canadians?

• “CSE is prohibited by law from directing its activities at Canadians anywhere in the world or any person in Canada”

– Prohibition written into National Defence Act

Page 28: Communications Security Establishment

Does CSE monitor Canadians?

• Rule applies only to activities “directed at” Canadians or persons in Canada

• Does not apply to “incidental” collection

• Does not apply to Mandate C

• Does not apply to Second Parties

Page 29: Communications Security Establishment

Does CSE monitor Canadians?

• Rule applies only to activities “directed at” Canadians or persons in Canada – Unselected, bulk collection OK

• Does not apply to “incidental” collection – OK if directed at non-Canadian end – Likewise for information about Canadians

• Does not apply to Mandate C – OK if done on CSIS, RCMP, or other LESA authority

• Does not apply to Second Parties – Permitted to receive allied intercepts

Page 30: Communications Security Establishment

Does CSE monitor Canadians?

• Full meaning of “directed at” unknown

• How much non-warrant Mandate C activity?

• How extensive is Five Eyes sharing/access to databases?

• Does CSE obey the law?

Page 31: Communications Security Establishment

Meaning of “directed at” unknown

• Federal Court rejected broadened CSIS definition of “directed at” in 2012

• CSE Office of Counter Terrorism subsequently “suspended” some activities

Page 32: Communications Security Establishment

Non-warrant Mandate C

• CSE has access to vast amounts of metadata through its own and allied collection

– Including very large amount of Canadian metadata

• Does CSE provide this data to and/or process it for CSIS or other agencies?

• If so, is this done without warrants?

Page 33: Communications Security Establishment

Five Eyes assistance

• NSA can search foreign traffic entering US

– Includes 64% of Canadian domestic IP traffic

• CSE cannot ask NSA to target specific Canadians (unless LESA warrant)

– But can provide “guidance” on topics

• CSE permitted to receive traffic intercepted

• Limits on searching NSA databases unknown

• How much Canadian data is shared/ accessed?

Page 34: Communications Security Establishment

Does CSE obey the law?

Page 35: Communications Security Establishment

Does CSE obey the law?

• Yes, with one notable exception

Page 36: Communications Security Establishment

Does CSE obey the law?

• Yes, with one notable exception

• It’s complicated

Page 37: Communications Security Establishment

Does CSE obey the law?

• Yes, with one notable exception

• It’s complicated

• Not even CSE knows ¯\_(ツ)_/¯

Page 38: Communications Security Establishment

Does CSE obey the law?

• Yes, with one notable exception

• It’s complicated

• Not even CSE knows ¯\_(ツ)_/¯

• Why the hell wouldn’t it?

Page 39: Communications Security Establishment

Does CSE obey the law?

• Office of CSE Commissioner (OCSEC) was established in 1996 to review CSE’s compliance with the law

• OCSEC has always reported no evidence of non-compliance – with one exception

– In 2015, OCSEC concluded CSE violated law by failing to “minimize” shared metadata

– Unintentional, but absence of due diligence

Page 40: Communications Security Establishment

Does CSE obey the law?

OCSEC assessment is more like the flowchart on the right than the one on the left See http://luxexumbra.blogspot.ca/2015/03/does-cse-comply-with-law.html

Page 41: Communications Security Establishment

Does CSE obey the law?

• Many cases where OCSEC has found insufficient records, or violation was unintentional, or CSE/DOJ maintains activity was legal, or government promised to amend the law, or activity was halted and OCSEC has chosen not to declare non-compliance

– Mostly minor cases – not systematic

– Still waiting on long list of amendments

Page 42: Communications Security Establishment

Does CSE obey the law?

• Legality of monitoring regime depends on the meaning of Charter rights and other provisions of the law

• In many cases, these questions have not been addressed by the courts

• CSE has (secret) DOJ interpretations of the law, but no one can say if the courts would agree with them

• BCCLA and CCLA challenges currently underway

Page 43: Communications Security Establishment

Does CSE obey the law?

• Why wouldn’t it?

– The government writes the laws, and if there is something it wants to do, it usually manages to make it legal

– “Lawful access” amendments coming?

Page 44: Communications Security Establishment

Does CSE obey the law?

• Greater concern, in my opinion, is what’s being done, or could be done, entirely within the law

– How much is being done now?

• What protections against future activities?

– Pervasiveness of Internet continues to grow

– Storage and processing technology improving

– LESAs will always push for greater access

– Policy protections can change at any time

– Bigger problem than just Cdn govt surveillance

Page 45: Communications Security Establishment

How can we protect Canadians?

Page 46: Communications Security Establishment

How can we protect Canadians?

• Rely on “sunny ways”?

Page 47: Communications Security Establishment

How can we protect Canadians?

• Improve oversight/review – Create Committee of Parliamentarians

– Fix watchdog agencies

– Augment privacy mandate

• Reform legal regime – Clarify rules, catch up with technology

– Broaden judicial role

– Keep under regular review

• Ask somebody other than me

Page 48: Communications Security Establishment

How can we protect Canadians?

• Improve oversight/review – Create Committee of Parliamentarians

– Fix watchdog agencies

– Augment privacy mandate

• Reform legal regime – Clarify rules, catch up with technology

– Broaden judicial role

– Keep under regular review

• Restore/improve transparency

Page 49: Communications Security Establishment

How can we protect Canadians?

• Improve oversight/review – Create Committee of Parliamentarians

– Fix watchdog agencies

– Augment privacy mandate

• Reform legal regime – Clarify rules, catch up with technology

– Broaden judicial role

– Keep under regular review

• Increase transparency

Page 50: Communications Security Establishment

Increase transparency

"I have directed CSE to find new opportunities to communicate with the public more openly about their activities, while still protecting sensitive information as appropriate."

— Defence Minister Harjit Sajjan,

28 January 2016

Page 51: Communications Security Establishment

Increase transparency

Page 52: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 53: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 54: Communications Security Establishment
Page 55: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 56: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 57: Communications Security Establishment
Page 58: Communications Security Establishment
Page 59: Communications Security Establishment
Page 60: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 61: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 62: Communications Security Establishment
Page 63: Communications Security Establishment
Page 64: Communications Security Establishment
Page 65: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 66: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 67: Communications Security Establishment
Page 68: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 69: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 70: Communications Security Establishment
Page 71: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 72: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 73: Communications Security Establishment
Page 74: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 75: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 76: Communications Security Establishment
Page 77: Communications Security Establishment

NSA much more transparent

• “In 2015, NSA disseminated 4,290 FAA Section 702 intelligence reports that included U.S. person information. Of those 4,290 reports, the U.S. person information was masked in 3,168 reports and unmasked in 1,122 reports.”

• “In 2015, NSA released 654 U.S. person identities in response to [identity] requests.”

Page 78: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards

Page 79: Communications Security Establishment

Increase transparency

• Parliamentary testimony

• Proactive disclosure

• Access to Information responses

• Public Annual Report

• Estimates, Part III

• Staff numbers

• OCSEC Annual Report

• Meet or exceed US reporting standards