Communications Security Establishment

From Vero - Wikipedia
Revision as of 19:02, 15 November 2025 by imported>Chris the speller (Governance and oversight: replaced: Prime Minister → prime minister)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Template:Short description Template:Distinguish Template:Infobox government agency

The Communications Security Establishment (CSE; Template:Langx, CST) is Canada's national cryptologic intelligence and security agency. It is responsible for foreign signals intelligence, conducting cyber operations, cyber security and information assurance, and providing technical and operational assistance to the military, federal law enforcement, and other security agencies.<ref>Template:Cite web</ref><ref>Template:Cite web</ref>

CSE is a standalone agency under the National Defence portfolio. The current head of CSE, the Chief, is Caroline Xavier, who assumed the office on 31 August 2022. The Chief is accountable to the Minister of National Defence. The National Defence Minister is in turn accountable to the Cabinet and Parliament.<ref>Template:Cite web</ref><ref>Template:Cite news</ref>

History

CSE originates from Canada's joint military and civilian code-breaking and intelligence efforts during the Second World War.<ref name=":0">Template:Cite web</ref>

Template:AnchorExamination Unit

The Examination Unit (XU) was established in June 1941, as a branch of the National Research Council.<ref name=":1">Template:Cite web</ref>

In March 1942, XU moved to Laurier House in Sandy Hill, Ottawa.<ref name=":9">Template:Cite web</ref> This location was chosen because they felt it would draw no suspicion from adversaries.<ref name=":10" /> In September, the Department of External Affairs established its Special Intelligence Section at XU with the purpose of reviewing decoded SIGINT with other collateral information to produce intelligence summaries.<ref name=":9" />

The original mandate of the Examination Unit during World War II was to intercept the communications of Vichy France and Nazi Germany. Its mandate later expanded to include interception and decryption of Imperial Japanese communications after Japan entered the war. The unit was estimated to have had 50 staff members at any one time. In total 77 people worked there.<ref name=":10">Template:Cite book</ref>

In September 1945, U.S. President Harry Truman declared it would be vital to carry out such operations in peacetime, and Canadian authorities came to the same conclusion in December later that year.<ref name=":1" /><ref name="CSECref">Template:Cite web</ref>

On 13 April 1946, a secret Order in Council allowed for postwar continuation of wartime cryptologic efforts and thus the Communications Branch of the National Research Council of Canada (CBNRC) was founded. This agency would be the predecessor to today's Communications Security Establishment (CSE).<ref name=":1" /><ref name=":9" /><ref name="CSECref" />

Communications Branch of the National Research Council

The Communications Branch of the National Research Council (CBNRC) was the first peace-time cryptologic agency and was kept secret for much of its beginning.<ref name=":0" /> The CBNRC was established through a secret Order in Council signed on 13 April 1946, combining the civilian Examination Unit (XU) and the military Joint Discrimination Unit (JDU) and was located at LaSalle Academy.<ref name=":1" />

With Edward Drake as its first director, the agency worked with intercepted foreign electronic communications, collected largely from the Royal Canadian Signal Corps (RCCS) station at Rockcliffe Airport in Ottawa. CSE also worked with Canadian Forces Station Leitrim (CFS Leitrim; formerly 1 Special Wireless Station till 1949, and Ottawa Wireless Station till 1966), Canada's oldest operational signal intelligence (SIGINT) collection station, established by the RCCS in 1941 and located just south of Ottawa. In 1946, the station's complement was 75 personnel (compared to its around 2,000 employees in 2013–2014).<ref>Template:Cite web</ref> This unit successfully decrypted, translated, and analyzed these foreign signals, and turned that raw information into useful intelligence reports during the course of the war.

CBNRC finally began domestic COMSEC efforts on 1 January 1947.<ref name=":9" /> During the Cold War, the CBNRC was primarily responsible for providing SIGINT data to the Department of National Defence regarding the military operations of the Soviet Union.<ref name="Monitor89">Template:Cite journal</ref>

In February 1950, R. S. McLaren was appointed the first CBNRC Senior Liaison Officer (CBSLO) to Washington, D.C. In March 1962: CBNRC installed its first IBM supercomputer, costing CA$372k. In December 1964, CBNRC began collaboration on "Canadian ALVIS" (CID 610), the first and only Canadian cipher machine to be mass-produced based on the British ALVIS (BID 610).<ref name=":9" />

CBNRC and the information it gathered and shared was kept secret for 34 years until 9 January 1974, when CBC Television aired a documentary titled The Fifth Estate: The Espionage Establishment.<ref name=":2">"The Espionage Establishment of 1974 Template:Webarchive," produced by William MacAdam, researched by James R. Dubro. 1974 January 9. via CBC Archives.</ref> This was the first time that the organization had ever been mentioned in public.<ref name=":1" /> This resulted in an outcry in the House of Common and an admission by the Canadian government that the organization existed.<ref name=":3">Template:Cite web</ref>

Communications Security Establishment

In 1975, the CBNRC was transferred to the Department of National Defence (DND) by an Order in Council, and became the Communications Security Establishment.<ref name=":0" /> CSE was now publicly known, and had diversified since the Cold War becoming the primary SIGINT resource in Canada.

In 1988, CSE created the Canadian System Security Centre to establish a Canadian computer security standard among other goals.<ref name="MerkowBreithaupt2014">Template:Cite book</ref> This led to the publication of the Canadian Trusted Computer Product Evaluation Criteria.<ref name="MerkowBreithaupt2014" />

Following the September 11 attacks in 2001, Canada's Anti-terrorism Act (ATA) was ratified, receiving royal assent on 18 December 2001. It amended the National Defence Act to formally acknowledge and mandate the activities of CSE. It also made amendments to the Canadian Security Intelligence Service Act, the Criminal Code, and the Official Secrets Act (later the Security of Information Act).<ref name=":1" />

In early 2008, in line with the Federal Identity Program (FIP) of the Government of Canada, which requires all federal agencies to have the word Canada in their name,<ref>Template:Cite web</ref> CSE adopted the applied title Communications Security Establishment Canada (CSEC; Template:Langx, CSTC). Since mid-2014, the organization has used its legal name (Communications Security Establishment) and initials (CSE) on its website and in public statements.

In November 2011, CSE was made an independent agency.<ref name=":1" />

In June 2019, the Communications Security Establishment Act was passed as part of an omnibus national security bill called the National Security Act 2017. Coming into force two months later, in August, the act set out the mandate and powers of CSE.<ref name=":4">Template:Cite news</ref> As part of the omnibus bill, oversight of CSE activities was assumed by the newly created National Security and Intelligence Review Agency (NSIRA).<ref name=":5" />

In August 2021, CSE foreign signals intelligence assisted Global Affairs Canada and the Canadian Armed Forces with the operation to airlift Canadians out of Kabul after the Taliban retook Afghanistan.<ref>Template:Cite web</ref>

On October 11, 2023, CSE Chief Caroline Xavier said in an interview with CBC News that CSE offices in various cities may be opened to alleviate staffing shortages.<ref>Template:Cite web</ref>

Activities

Unique within Canada's security and intelligence community, the Communications Security Establishment employs code-makers and code-breakers (cryptanalysis) to provide the Government of Canada with information technology security (IT Security) and foreign signals intelligence services. CSE also provides technical and operational assistance to the Royal Canadian Mounted Police and federal law enforcement and security agencies, including the Canada Border Services Agency and the Canadian Air Transport Security Authority.

Foreign Signals Intelligence

CSE works with its closest foreign intelligence allies, the US, UK, Australia and New Zealand to share the collection burden and the resulting intelligence yield. Canada is a substantial beneficiary and participant of the collaborative effort within the partnership to collect and report on foreign communications.<ref name="Monitor89" />

During the Cold War, CSE's primary client for signals intelligence was National Defence, and its focus was the military operations of the then Soviet Union. Since the end of the Cold War, Government of Canada requirements have evolved to include a wide variety of political, defence, and security issues of interest to a much broader range of client departments.

While these continue to be key intelligence priorities for Government of Canada decision-makers, increasing focus on protecting the safety of Canadians is prompting greater interest in intelligence on transnational issues, including terrorism.

Code breaking equipment

File:NSA Canada relationship.pdfCSE code breaking capabilities degraded substantially in the 1960s and 1970s but were upgraded with the acquisition of a Cray X-MP/11 (modified) supercomputer delivered to the Sir Leonard Tilley building in March 1985 and the hiring of code breaking analysts. It was, at the time, the most powerful computer in Canada. In the early 1990s, the Establishment purchased a Floating Point Systems FPS 522-EA supercomputer at a cost of $1,620,371. This machine was upgraded to a Cray S-MP superserver after Cray acquired Floating Point Systems in December 1991 and used the Folklore Operating System supplied by the NSA in the US.<ref>Template:Cite web</ref> These machines are now retired.

Little information is available on the types of computers used by CSE since then. However, Cray in the US has produced a number of improved supercomputers since then. These include the Cray SX-6, early 2000s, the Cray X1, 2003 (development funded in part by the NSA), Cray XD1, 2004, Cray XT3, Cray XT4, 2006, Cray XMt, 2006 and Cray CX1, 2008. It is possible that some of these models have been used by CSE and are in use today.Template:Clear

Cyber Operations

CSE’s mandate authorizes it to conduct foreign cyber operations that disrupt the capabilities of adversaries to help protect Canada and Canadians. Cyber operations conducted by CSE is broken down to defensive and active cyber operations, and must relate to international affairs, defence or security.<ref name=":13">Template:Cite web</ref>

Defensive cyber operations authorizes CSE to defend Canadian systems against foreign cyber attacks. For instance, a cyber actor trying to steal information from a government network could be thwarted by CSE by disabling the cyber actor's server. In addition to government systems, the Minister of National Defence can designate systems of importance such as: energy grids, telecom networks, healthcare databases, banking systems, elections infrastructure in order for CSE to be authorized to defend them.<ref name=":13" />

Active cyber operations authorizes CSE to take pre-emptive action against threats to Canada such as: terrorist groups, cyber criminals, transnational criminals,<ref name=":15">Template:Cite web</ref> hostile intelligence agencies, state-sponsored hackers. For instance, CSE can disrupt an adversary's means of communication.<ref name=":13" />

Assistance to Federal Partners

CSE's mandate authorizes it to provide technical and operational assistance to federal partners including the military, law enforcement and other intelligence agencies. The type of assistance itself can include: the collection and processing of communications, technical solutions, linguistic support, and conducting operations.<ref name=":14">Template:Cite web</ref>

While assisting, CSE operates under the requesting agency's legal authority and restrictions. This means that CSE can, in fact, target Canadians and individuals in Canada while operating under its assistance mandate, as long as the requesting agency has the legal authority to, such as a court-issued warrant.<ref name=":14" />

Canadian Centre for Cyber Security

Template:Infobox government agency

The Canadian Centre for Cyber Security (CCCS or Cyber Centre; Template:Langx) is the Government of Canada authority responsible for monitoring threats, protecting national critical infrastructure against cyber incidents, and coordinating the national response to any incidents related to cyber security.

As a unit under the Communications Security Establishment (CSE), the agency is Canada's computer emergency response team (CSIRT) and the Canadian government's computer Incident response team (CIRT).<ref name=":1" />

Officially created on 1 October 2018, CCCS consolidated the existing operational cyber-security units of several federal government organizations, including Public Safety Canada's Canadian Cyber Incident Response Centre, Shared Services Canada's Security Operations Centre, and CSE's Information Technology Security branch.<ref name=":02">Template:Cite web</ref><ref name=":12">Template:Cite web</ref>

History

Formerly known as communications security (COMSEC), CSE's Information Technology Security branch grew out of a need to protect sensitive information transmitted by various agencies of the government, especially the Department of Foreign Affairs and International Trade (DFAIT), Canada Border Services Agency (CBSA), DND, and the Royal Canadian Mounted Police (RCMP).<ref name="CCfCSBackgrounder" />

The Cyber Centre was developed in response to CSE's consultations with Canadians in 2016 which identified various issues pertaining to cyber security in relation to the federal government, including accountability, departmental coordination, and leadership. In February 2018, the federal budget allocated funds for CSE, in collaboration with Public Safety Canada and Shared Services Canada, to launch the Cyber Centre.<ref>Template:Cite web</ref>

Officially created on 1 October 2018, CCCS consolidated the existing operational cyber-security units of several federal government organizations, including the Canadian Cyber Incident Response Centre of Public Safety Canada; the Security Operations Centre of Shared Services Canada; and the Information Technology Security branch of CSE.<ref name=":02" /><ref name=":12" />

Prior to opening, in June 2018, Minister Ralph Goodale appointed Scott Jones the head of the new Centre.<ref name="PressRelease2018-06-12" /><ref name="CCfCSBackgrounder" />

In 2024-25, CSE reportedly used the Cyber Centre's automated defence systems to defend against a total of 2.3 trillion malicious actions. This averages to around 6.3 billion a day.<ref>Template:Cite web</ref>

Vulnerability Research Centre

Template:Infobox government agency

The Vulnerability Research Centre (VRC; Template:Langx) is part of CSE’s Research Directorate. Its focus is to advance Canada’s interests through world-class strategic vulnerability research.<ref name="Canada">Template:Cite web</ref> To do so, the VRC:

  • conducts security reviews against systems of importance to the Government of Canada
  • researches computer security vulnerabilities through source code auditing, software reverse engineering and dynamic analysis
  • provides advice and guidance on vulnerability prevention and mitigation
  • researches and develops novel vulnerability research techniques and tradecraft
  • collaborates with other Government of Canada departments, international partners and other CSE divisions to promote the exchange of expertise
  • performs recruitment, training and mentorship to help develop the next generation of vulnerability research practitioners within Canada<ref name="Canada"/>

The VRC augments its capabilities by partnering with universities, such as the following publicly revealed so far: the University of Toronto, Ontario Tech University, and Concordia University.<ref name=":15" />

Tutte Institute for Mathematics and Computing

Template:Infobox government agency

The Tutte Institute for Mathematics and Computing (TIMC) is a research institute programme of the Government of Canada responsible for conducting both classified and unclassified research in the areas of cryptology and knowledge discovery to support the Canadian Cryptologic Program and its Five-Eyes international partners.<ref name=":16">Template:Cite web</ref><ref name=":11">Template:Cite web</ref>

Though officially founded in 2009, TIMC officially opened and formally named in September 2011.<ref name=":11" /><ref name="Lux" /> Named after cryptanalyst and mathematician William T. Tutte, TIMC is based within CSE's Edward Drake Building in Ottawa.<ref name=":11" />

Sponsored and funded by the Communications Security Establishment, the institute is partnered with Institute for Defence Analysis: CCR Princeton, CCR La Jolla, CCS Bowie; the Heilbronn Institute for Mathematical Research, Carleton University, and the University of Calgary and is working to create partnerships with other research institutes, government agencies and universities.<ref>Template:Cite web</ref> Led by Dr. Drew Vandeth, CSE researchers proposed and established the institute. The institute's first director was Dr. Hugh Williams with Dr. Drew Vandeth as the first Deputy Director.

Unclassified Academic & Open-Source Contributions

Researchers Leland McInnes and John Healy at the Tutte Institute developed a technique called Uniform Manifold Approximation and Projection (UMAP), originally designed to analyze malware. The algorithm and software of UMAP has since been released by TIMC to the open-source community, and is now being used to answer questions about COVID-19.<ref>Template:Cite web</ref>

As of 2024-25, TIMC's open-source contributions averaged over 2.5 million downloads per month<ref name=":15" /> and have been adapted to NVIDIA's RAPIDS and HypernetX<ref name=":16" />

Facilities

CSE occupies two buildings in Ottawa, the Edward Drake Building and the Cyber Centre's office at 1625 Vanier Parkway. Formerly occupying the Sir Leonard Tilley Building.

Template:Multiple image

With the rapid expansion in the number of CSE personnel since the 9/11 attack in the US, CSE has built new facilities. A new CA$1.2 billion<ref>Template:Cite web</ref> facility, encompassing Template:Convert, has been built in the eastern part of Ottawa, immediately west of the headquarters building for the Canadian Security Intelligence Service. Construction began in early 2011 and was completed in 2015.<ref>Defence Industry Daily, DID » Logistics & Support » Bases & Infrastructure » Canada's CSE SIGINT Agency Building New Facilities, 10 jun 2009</ref>

On 26 February 2015, CSE officially inaugurated their headquarters at the new Edward Drake Building, named for Lt. Colonel Edward Drake, a pioneer of the Canadian signals intelligence.<ref name=":0" /><ref name=":9" />

1625 Vanier Parkway, Headquarters of the Canadian Centre for Cyber Security

With the launch of the Canadian Centre for Cyber Security in 2018, CSE found it necessary to expand into a second location.<ref name="cse-cst.gc.ca">Template:Cite web</ref>

Employees are equipped with laptops and smart phones, and work most often at an unclassified level. 1625 Vanier Parkway is also the home of the Learning Hub, which runs cyber security and communications security training for Government of Canada employees.<ref name="cse-cst.gc.ca"/>

The Sir Leonard Tilley Building, former headquarters of CSE

CSE formerly occupied the Tilley Building, located at 719 Heron Road starting in June 1961, before moving to the Edward Drake Building.<ref name=":9" />

It was designed by architect Jean-Serge Le Fort. The floor space covers 23,832 square metres and the land area covers 4.527 hectares.

This building was named in honour of Samuel Leonard Tilley, federal Finance Minister in 1873–1878. Template:Clear

Insignia

File:Cse badge.png
Badge of CSE
File:Former CSE Information Technology Security logo.jpg
Former logo of the IT Security program (the triangle represented threats, while the arc symbolized protection)

Template:Main

CSE uses generic identifiers imposed by the Federal Identity Program. However, CSE is one of several federal departments and agencies (primarily those having law enforcement, security or regulatory functions) that have been granted a badge by the Canadian Heraldic Authority. The badge was granted in 1994, while CSE's pennant was first raised in 1996 to mark the organization's 50th anniversary.

From the 1990s to the mid 2000s, CSE's Information Technology Security program used a logo to identify its products and publications. The triangle represented threats, while the arc symbolized protection.<ref>According to information provided to attendees of the 12th Annual Information Technology Security Symposium, June 2000.</ref>

Governance and mandate

Legislation

In addition to those mentioned below, CSE is bound by all other Canadian laws, including the Criminal Code, the Canadian Charter of Rights and Freedoms, the Privacy Act, Security of Information Act, and the Avoiding Complicity in Mistreatment by Foreign Entities Act.<ref name=":4" />

In December 2001, the Canadian government passed omnibus bill C-36 into law as the Anti-Terrorism Act. The Act amended portions of the National Defence Act and officially recognized CSE's mandate.

The Anti-Terrorism Act also strengthened CSE's capacity to engage in the war on terrorism by providing needed authorities to fulfill its mandate.

In the 2007 Proceedings of the Canadian Senate Standing Committee on National Security and Defence, then-CSE Chief John Adams indicated that CSE is collecting communications data when he suggested that the legislation was not perfect in regard to interception of information relating to the "envelope."<ref>Issue 15 - Evidence Template:Webarchive Proceedings of the Standing Senate Committee on National Security and Defence April 30, 2007</ref>

Template:Infobox legislation

Communications Security Establishment Act

In June 2019, the Communications Security Establishment Act (CSE Act) was passed, as part of the National Security Act 2017. The Actcame into force two months after passing.<ref name=":4" />

The CSE Act requires that CSE activities do not target Canadians anywhere in the world, or any person in Canada, "unless there are reasons to believe that there is an imminent danger of death or serious bodily harm. The Act also requires protect the privacy of Canadians and persons in Canada. As such, CSE is forbidden, by law, to intercept domestic communications. When intercepting communications between a domestic and foreign source, the domestic communications are destroyed or otherwise ignored. (After the September 11 attacks on the United States in 2001, however, CSE's powers expanded to allow the interception of foreign communications that begin or end in Canada, as long as the other party is outside the border and ministerial authorization is issued specifically for this case and purpose.)<ref>Template:Cite web</ref>

Governance and oversight

The Minister of National Defence guides and authorizes the activities of CSE using ministerial directives, ministerial authorizations, and ministerial orders, all of which are based on the "government’s intelligence priorities as set out by Cabinet through discussion and consultations with the security and intelligence community." The Defence Minister cannot authorize any activities that are not included in the CSE mandate or grant CSE any powers that do not exist in Canadian law.<ref name=":4" />

Ministerial directives are how the Minister of National Defence instructs the Chief of CSE.<ref name=":4" />

CSE operates under a system of independent oversight:<ref name=":6">Template:Cite web</ref>

  • National Security and Intelligence Review Agency (NSIRA) – NSIRA is fully independent of government and of CSE. Its committee members are appointed by the sitting prime minister in consultation with Parliamentary leaders, and handle complaints against all Canadian national security agencies.
  • Intelligence Commissioner – the Intelligence Commissioner is independent of CSE and has oversight of all national security and intelligence gathering activities of the Government of Canada, including CSE.<ref name=":7" /> The Commissioner issues an annual report to the Prime Minister, who must table it in Parliament after removing confidential and classified information. The Commissioner is entitled to receive all reports that are compiled by NSIRA.<ref>Template:Cite news</ref>
  • National Security and Intelligence Committee of Parliamentarians (NSICOP) – NSICOP is a committee of Parliamentarians that have the security clearances to review and report on any aspect of CSE's activities.<ref name=":6" />

CSE activities are also subject to several external oversight and review bodies.<ref name=":6" />

As with any other federal department or agency of Canada, the activities of CSE are also subject to review by various federal bodies, including:<ref name=":6" />

Heads of CSE

Heads of CSE<ref name=":9" />
Name Appointed Notes
Examination Unit
Herbert Yardley 1941 June 10
Oliver Strachey 1942 January
F.A. (Tony) Kendrick 1942 July
Gilbert de B. Robinson (acting) 1945 April until July 1945
Edward Drake 1945 August 1
Communications Branch of the National Research Council
Edward Drake 1946 September 1 died in office
Kevin O’Neill 1971 February
Communications Security Establishment
Peter Hunt 1980 July
Stewart Woolner 1989 July
Ian Glen 1999 July
Keith Coulter 2001 August
John Adams 2005 July
John Forster 2012 January 30
Greta Bossenmaier 2015 February 9
Shelly Bruce 2018 June 27
Caroline Xavier 2022 August 31

Communications Security Establishment Commissioner

Oversight over CSE was formerly provided by the Office of the Communications Security Establishment Commissioner (OCSEC; Template:Langx, BCCST), which was created on 19 June 1996 to review CSE's activities for compliance with the applicable legislation, accept and investigate complaints regarding the lawfulness of the agency's activities, and to perform special duties under the 'Public Interest Defence' clause of the Security of Information Act.<ref>Template:Cite web</ref> The Commissioner provided an annual public report on his activities and findings to Parliament, through the Minister of National Defence.<ref>Template:Cite web</ref>

Between 1996 and 2019, there were six Commissioners:<ref name=":9" />

As part of an omnibus national security bill (the National Security Act 2017) passed by Parliament in 2019, the OCSEC was abolished and its responsibilities divided between two newly created entities: employees of the OCSEC were transferred to the Office of the Intelligence Commissioner; and the review functions of the former OCSEC were assumed by the National Security and Intelligence Review Agency (NSIRA).<ref name=":5">Template:Cite web</ref><ref name=":7" />

The previous Commissioner of CSE, Jean-Pierre Plouffe, was appointed to the role of Intelligence Commissioner on 18 July 2019.<ref name=":5" /><ref name=":7">Template:Cite web</ref>

ECHELON

Template:Global surveillance Template:Main Under the 1948 UKUSA agreement, CSE's intelligence is shared with the U.S. National Security Agency (NSA), the British Government Communications Headquarters (GCHQ), the Australian Signals Directorate (ASD), and New Zealand's Government Communications Security Bureau (GCSB).<ref name=":0" /><ref name=":8" />

Along with these services from the United States, the UK, New Zealand, and Australia, CSE is believed to form the ECHELON system. Its capabilities are suspected to include the ability to monitor a large proportion of the world's transmitted civilian telephone, fax and data traffic. The intercepted data, or "dictionaries" are "reported linked together through a high-powered array of computers known as 'Platform'."<ref name=":8">Rudner, Martin. (2007). "Canada's Communications Security Establishment, Signals Intelligence and Counter-Terrorism". Intelligence and National Security: 22(4) pp. 473–490</ref>

Controversies

CBNRC and the information it gathered and shared was kept secret for 34 years until 9 January 1974, when the CBC Television documentary show, The Fifth Estate, aired an episode focused on the organization, with research by James Dubro.<ref name=":2" /> This was the first time that the organization had ever been mentioned in public.<ref name=":1" /> This resulted in an outcry in the House of Commons and an admission by the Canadian government that the organization existed.<ref name=":3" />

A former employee of the organization, Mike Frost, claimed in a 1994 book, Spyworld, that the agency eavesdropped on Margaret Trudeau to find out if she smoked marijuana and that CSE had monitored two of former British prime minister Margaret Thatcher's dissenting cabinet ministers in London on behalf of the UK's secret service.<ref>Morris, Nomi (1996). "Inside Canada's most secret agency." Maclean's: 109(36) pp. 32–35</ref>

In 1996, it was suggested that CSE had monitored all communications between National Defence Headquarters and Somalia, and were withholding information from the Somalia Inquiry into the killing of two unarmed Somalis by Canadian soldiers.<ref name="desb">Desbarats, Peter. "Somalia cover-up: A commissioner's journal", 1997</ref>

In 2006, CTV Montreal's program On Your Side conducted a three-part documentary on CSE naming it "Canada's most secretive spy agency" and that "this ultra-secret agency has now become very powerful," conducting surveillance by monitoring phone calls, e-mails, chat groups, radio, microwave, and satellite.<ref>Template:Cite web</ref>

In 2007, former Ontario lieutenant-governor, James Bartleman, testified at the Air India Inquiry on May 3 that he saw a CSE communications intercept warning of the June 22, 1985 bombing of Air India Flight 182 before it occurred. Two former CSE employees have since testified that no CSE report was ever produced.<ref>Template:Cite news</ref>

In 2013, a coalition of civil liberties associations launched a campaign directed against the government's perceived lack of transparency on issues related to the agency, demanding more information on its purported domestic surveillance activities.<ref>Template:Cite web</ref>

Further criticism has arisen surrounding the construction costs of the agency's new headquarters in Ottawa. The project is slated to cost over CA$1.1 billion, making it the most expensive government building in Canadian history.<ref>Template:Cite news</ref>

In 2014, a leaked, top-secret presentation entitled “IP Profiling Analytics & Mission Impacts” summarized experiments tracking the cellphones of travellers passing through Toronto Pearson International Airport.<ref>Template:Cite news</ref> Critics argued that the experiment was invasive and indiscriminate, while CSE countered that it was consistent with all relevant laws and mandates.

In 2016, CSE Commissioner found that one of the agency's metadata activities did not comply with the law. Specifically, CSE had failed to properly minimize certain Canadian identity information before sending it to foreign governments, contravening parts of the National Defence Act and the Privacy Act.<ref>Template:Cite web</ref>

Media portrayal

In The Good Wife episode "Landing," both the NSA and CSE are shown monitoring personal phone calls and hacking private cell phones' recording devices in order to listen in on personal conversations. One plaintiff describes CSE as "the Canadian version of the NSA."

See also

References

Template:Reflist

Template:Commons category

Template:Navboxes Template:Coord

Template:Authority control

pt:CSE