Back to news

June 13, 2019 | Local, Security, Other Defence

Canada should think again about having the ability to use offensive cyber weapons: Expert

Canada's electronic spy agency will soon get new authority to launch cyber attacks if the government approves legislation that is in the final stages of being debated. There's a good chance it will be proclaimed before the October federal election.

But a discussion paper issued Wednesday by the Canadian Global Affairs Institute says Canadians need to debate the pros and cons of using this new power.

“This direction not only opens up new possibilities for Canadian defence, it could also represent significant new risks,” says the report. “Without good answers to the difficult questions this new direction could raise, the country could be headed down a very precarious path.”

Among the possible problems: Cyber retaliation. Another: While Canada might try to target a cyber attack, the impact might be bigger than expected — in fact, it might boomerang and smack us back.

Third is the lack of international agreement on the use of cyber weapons (although this is a double-edged sword: Without an agreement there are no formal limits on what any country is forbidden from doing in cyberspace).

“To move forward at this point to implement or even formally endorse a strategy of cyber attack would be risky and premature,” concludes the report's author, computer science professor Ken Barker, who also heads the University of Calgary's Institute for Security, Privacy and Information Assurance. “There are challenging technical controls that must be put in place as well as a critical international discussion on how cyber weaponry fits within the rules of war.”

Barker's paper is in response to the 2017 strategy setting out Defence Department goals, where the possibility of Canada having a cyber attack capability first raised. It wasn't written with Bill C-59 in mind — now in its final stage before Parliament — which actually gives Canada's electronic spy agency, the Communications Security Establishment (CSE), the power to use what's called “active” as well as defensive cyber operations.

In an interview Tuesday, Barker said “in the desire to push this thing they need to have more carefully thought about the questions I raise in this paper.”

“Maybe it's late, but at least it's available.”

He dismisses the argument that by announcing it has an offensive cyber capability Canada will cause other countries to think twice about attacking us with cyber weapons. “They would attempt to find out what Canada is doing to create cyber attack capabilities,” he argued.

“One of the risks once we do endorse this,” he added, “is we open ourselves up to other countries to using Canada as a launching pad for cyber attacks to cover up their involvement, and [then] say ‘That was done by Canada.'”

Nation states are already active in cyberspace. Ottawa has blamed China for the 2014 hack of the National Research Council, Washington suspects China was behind the massive hack of employee files at the Office of Personnel Management, and there is strong evidence that Russia mounted a sophisticated social media attack against the U.S. during the 2016 federal election.

According to the Australian Strategic Policy Institute, The U.S. the U.K. and Australia say they have used offensive cyber operations against the Islamic State. The U.S.-based Council on Foreign Relations notes that Germany increased its offensive cyber capability after a 2016 attack on the country's legislature blamed on Russia. Last year the New York Times reported the U.S. Cyber Command has been empowered to be more offensive. Meanwhile in April the CSE warned it's “very likely” there will be some form of foreign cyber interference during the run-up to October's federal election here,

The most commonly-cited interference in a country were two cyber attacks that knocked out electrical power in Ukraine — in December 2015 and again in December 2016 — largely believed to have been launched from Russia.

All this is why some experts say Canada has to have an offensive cyber capability to at least keep up. In January, Ray Boisvert, former assistant director of the Canadian Security Intelligence Service (CSIS), told a parliamentary committee that “the best defence always begins with a good offense ... “When more than five dozen countries are rumoured to be developing active cyber capabilities, in my view that means we must develop capabilities to respond and in some cases that includes outside our borders.”

Background

In 2017 the Trudeau government announced a new defence strategy that included the promise of “conducting active cyber operations against potential adversaries in the context of government-authorized military missions.”

The same year the government introduced Bill C-59, which in part would give the CSE, which is responsible for securing government networks, the ability to take action online to defend Canadian networks and proactively stop cyber threats before they reach systems here. This would be done as part of new legislation governing the CSE called the Communications Security Act.

That act would give CSE the ability to conduct defensive and “active” cyber operations. Active operations are defined as anything that could “degrade, disrupt, influence, respond to or interfere with the capabilities, intentions or activities of a foreign individual, state, organization or terrorist group as they relate to international affairs, defence or security.”

Both defensive and active cyber operations can't be used against any portion of the global information infrastructure within this country. And they have to be approved by the Minister of Defence.

C-59 has been passed by the House of Commons and slightly amended by the Senate. It was scheduled back in the House last night to debate the Senate amendments.

Despite all the cyber incidents blamed on nation states, Barker is reluctant to say we're in an era of low-level cyber war right now. Many incidents can be characterized as cyber espionage and not trying cause harm to another state, he argues.

https://www.itworldcanada.com/article/canada-should-think-again-about-having-the-ability-to-use-offensive-cyber-weapons-expert/418912

On the same subject

  • Royal Canadian Navy ships to return from Indo-Pacific deployment

    December 17, 2023 | Local, Naval

    Royal Canadian Navy ships to return from Indo-Pacific deployment

    Media are invited to attend the homecoming ceremony of His Majesty’s Canadian Ships (HMC Ships) Vancouver and Ottawa, and Motor Vessel (MV) Asterix, as the ships return to Esquimalt, B.C. on December 18, 2023, after 126 days away from home while deployed to the Indo-Pacific region.

  • A new life for the CT-155 Hawk - Skies Mag

    May 28, 2024 | Local, Aerospace

    A new life for the CT-155 Hawk - Skies Mag

    Formerly the RCAF’s fighter lead-in advanced jet trainer, the Hawk is finding new life as a maintenance trainer for aircraft technicians in training.

  • Sandbox CUAS Detect, Defeat Challenge is Now Live! | Le défi CUAS Détecter et Vaincre 2.0 d’Environnement protégé est maintenant en ligne!

    February 1, 2022 | Local, Aerospace, Security

    Sandbox CUAS Detect, Defeat Challenge is Now Live! | Le défi CUAS Détecter et Vaincre 2.0 d’Environnement protégé est maintenant en ligne!

    Sandbox CUAS Detect, Defeat Challenge is Now Live! It's time to start looking to the skies! After hosting a Sandbox in 2019 on Countering Unmanned Aerial Systems (CUAS), IDEaS is inviting innovators to bring their ‘A' game and demonstrate how their solution can detect and/or defeat our team of drones. IDEaS is looking for next-level CUAS prototypes that can solve the Sandbox challenge and be integrated into the broader military command and control system. Innovators invited to participate will receive: Up to 5 days of free personal full-time use of our fully equipped CUAS test range including targets. On-site one-on-one continual interaction with Canadian Armed Forces (CAF) and RCMP end-users, and science experts. Opportunity to iteratively test, demonstrate, and improve your technology. Ability to customize and adjust your test plan with the CAF on the fly to optimize your range time. Exposure of your innovation to multiple Canadian & international defence and security trusted partners. Visit the CUAS 2022 Challenge page for all the details you need in order to apply. All application must be submitted prior to 2 PM EST on April 13, 2022. Eric Fournier sits down with Armasuisse Insights to talk all things innovation. Learn what the DG of IDEaS has to say about governmental defence innovation, it's ecosystem, as well as new and exciting opportunities made available to Canadian Innovators through the IDEaS program. Read the full interview here: Looking abroad – Innovation at the Canadian Department of National Defence (admin.ch) Le défi CUAS Détecter et Vaincre 2.0 d'Environnement protégé est maintenant en ligne! Il est temps de se tourner vers le ciel! Après avoir tenu un Environnement protégé en 2019 portant sur la lutte contre les systèmes aériens sans pilote (CUAS), IDEeS invite les innovateurs à présenter leurs meilleures solutions afin de détecter et/ou vaincre notre équipe de drones. IDEeS recherche des prototypes CUAS de niveau supérieur capables de résoudre le défi de l'Environnement protégé et de s'intégrer dans le système militaire plus large de commandement et de contrôle. Les innovateurs invités à participer recevront : Jusqu'à cinq jours d'utilisation personnelle gratuite à temps plein de notre champ de tir pour CUAS entièrement équipée, y compris les cibles. Interaction continue et individuelle sur site avec nos utilisateurs militaires des FAC et nos experts scientifiques. Testez, démontrez et améliorez votre technologie de manière itérative. Personnalisez et ajustez votre plan d'essai avec les FAC sur le champ pour optimiser votre temps d'autonomie. Exhibez votre innovation devant de multiples partenaires canadiens et internationaux en matière de défense et de sécurité. Visitez la page du défi CUAS 2022 pour tous les détails dont vous avez besoin afin de postuler. Toutes les candidatures doivent être soumises avant 14 heures HNE le 13 avril 2022. Eric Fournier partage sa vision de l'innovation avec Armasuisse Insights. Découvrez ce que le DG d'IDEeS a à dire sur l'innovation en matière de défense gouvernementale, sur son écosystème ainsi que sur les nouvelles possibilités intéressantes offertes aux innovateurs canadiens par le biais du programme IDEeS. Lisez l'entrevue complète ici : Regard sur l'étranger – Innovation au ministère de la Défense nationale canadien (admin.ch)

All news