The COVID-19 pandemic’s disruption to government operations was part of the reason parliamentarians were not informed about being targets of a Chinese cyberattack in 2021, an intelligence chief said.
“It was the COVID period. There were a lot of restrictions in terms of the number of people in the office. This was before we came up with a vaccine. So our intelligence services were working out of hand throughout the pandemic. I think this is a factor that added to the confusion in terms of who should play what role,” said David Vigneault, director of the Canadian Security Intelligence Service (CSIS).
Addressing this concern, Mr. Vigneault told the committee that CSIS received intelligence on cyber threat activity from the Communications Security Establishment (CSE) back in January 2021, and that the two agencies subsequently briefed the House of Commons information technology staff.
“CSIS’s work with the House of Commons predates the FBI reporting that was shared with both CSIS and CSE on any information that was released to the public by the [United States] in 2024,” he said.
However, Mr. Vigneault acknowledged that ultimately “what was desired” wasn’t achieved, as parliamentarians weren’t informed.
“We took it for granted that once we worked with the House of Commons, the authorities in the House of Commons administration would discuss matters with MPs. It seems this approach was deficient for a number of reasons.”
Mr. Vigneault also said that CSIS had broadly disseminated intelligence to various government departments, agencies, and other organizations, detailing APT31’s email tracking attempts on IPAC members in Canada.
‘We Will Learn From This’
Mr. Cooper was referring to a CSIS-produced chronology of events. He highlighted that on Aug. 25, 2023, CSIS issued a second classified intelligence assessment to what the agency described as “relevant Government of Canada clients.”“Why were the parliamentarians not informed pursuant to the ministerial direction?” Mr. Cooper asked.
In response, Mr. Vigneault said the cyber ecosystem involves different actors with various responsibilities, leading to parallel efforts. CSIS is still adapting to the ministerial directive on informing parliamentarians, he said, adding that he believed at the time that the necessary information had been shared with the House of Commons to mitigate the threat.
“Clearly, for the people who were targeted by APT31, the outcome was not the one that people would have expected,” Mr. Vigneault said. “My undertaking to this committee is that, with my colleagues, we will learn from this and make sure ... that we are achieving different outcomes in the future.”