Language selection

Government of Canada / Gouvernement du Canada

Search


Accessibility Plan – Second Progress Report

Meta data information

National Security and Intelligence Review Agency, Accessibility Plan – Second Progress Report, December 2024

Titre en Anglais : National Security and Intelligence Review Agency, Accessibility Plan – Second Progress Report, December 2024

Title in French: Office de surveillance des activités en matière de sécurité nationale et de renseignement, Plan sur l’accessibilité – Deuxième rapport d’étape, Décembre 2024

Also available online: https://nsira-ossnr.gc.ca/publications/secretariat-operations/accessibility-plan-second-progress-report/
ISSN 2818-5927
Key title: Accessibility Plan – Second Progress Report (National Security and Intelligence Review Agency (Canada))
© His Majesty the King in Right of Canada, 2024

Date of Publishing:

From the Executive Director

In accordance with the Accessible Canada Act, I am pleased to publish the National Security and Intelligence Review Agency Secretariat (NSIRA Secretariat)’s second progress report for its Accessibility Plan 2022 – 2025. This progress report describes the work that has been done to implement activities over the course of 2024.

Our commitment to creating an inclusive environment is reflected in our ongoing work to remove barriers and respond proactively to feedback. This dedication is also embedded in our institutional Vision, Mission, and Values statement adopted in 2024, which underscores inclusiveness as a core value.  This year, we have made a number of improvements towards integrating accessibility as a core component of our operations.

Key changes include the incorporation of accessibility principles into the Rules of Procedure, explicitly providing for participants in investigations to request accommodations and receive procedural support through the Registrar. We also updated our branding to meet accessibility standards, including our website, promotional materials and recruitment resources.

Ensuring that the organization is accessible by design requires continued attention. In 2025 we will not only continue our efforts, but also prepare for a new accessibility plan. The goal is to complete what we started in 2022 and seek opportunities to build on our success. I look forward to continuing our progress together.

Charles Fugère

Executive Director, NSIRA Secretariat

General

The Executive Director of the NSIRA Secretariat, who is the deputy head and employer, leads the Secretariat that supports the Review Agency in the fulfillment of its mandate under the National Security and Intelligence Review Agency Act. The Secretariat is responsible for monitoring feedback to evaluate progress and establishing its future accessibility plans.

In compliance with the requirements of the Accessible Canada Act (“ACA”) and the Accessible Canada Regulations, this progress report is available on NSIRA’s website, which is used to communicate with the public.

To request a copy of this or our previous progress report, the accessibility plan, or a description of the feedback process in an alternate format or to provide feedback about our progress report(s), the accessibility plan and any barriers encountered in dealing with NSIRA, please contact the NSIRA Secretariat by mail, telephone, or email at:

National Security and Intelligence Review Agency Secretariat
P.O. Box 2430, Station “B”
Ottawa, Ontario, K1P 5W5

Telephone: 1-833-890-0293
Email: info@nsira-ossnr.gc.ca

Introduction

The National Security and Intelligence Review Agency published its Accessibility Plan 2022 – 2025 in December 2022 and its first progress report in December 2023. This second progress report describes the work that has been done to implement activities between January 1 and December 31, 2024.

The Accessibility Plan 2022 – 2025 set out three priority areas to improve accessibility:

  1. Increasing staff awareness about accessibility and the barriers that limit access for Canadians with disabilities.
  2. Ensuring Canadians have access to NSIRA’s publications and services.
  3. Continuing to advance a culture of respect and inclusion by integrating accessibility in all aspects of the organization’s work.

Through the efforts of the Senior Advisor, Wellness Initiatives, the NSIRA Secretariat can monitor progress, identify areas for improvement, and ensure overall coherence across the activities outlined in the accessibility plan.

Progress with respect to the priority areas and the accessibility plan is set out on the following pages. It is organized according to the seven key areas outlined in the ACA namely: employment; built environment; information and communication technologies (ICT); communication other than ICT; procurement of goods, services, and facilities; design and delivery of programs and services; and transportation.

The NSIRA Secretariat does not have ultimate control over certain fundamental aspects related to the built environment, technology or security and must, therefore, adjust its pace to align with the direction given by the responsible policy centres. Despite these constraints, the NSIRA Secretariat was able to make advances on several fronts.

Progress vis-à-vis accessibility plan

Employment

While developing the accessibility plan in 2022, the NSIRA Secretariat identified gaps with respect to employment. There was no written accommodation process for persons with disabilities employed in the NSIRA Secretariat. Furthermore, there was limited material available about accessibility requirements, resources, and information.

Status: On track

The NSIRA Secretariat was able to make advances in relation to many of the priorities with respect to employment in the last year. The Director, Human Resources Services, and the Senior Advisor, Wellness Initiatives, worked together on 14 specific cases in 2024, to ensure that employees received accommodations to enable them to participate fully in all aspects of their work experience. Additionally, progress was made in the following areas;

Training and Capacity Building on Accessibility

Human resources (HR) employees responsible for accessibility attended training on the Government of Canada Workplace Accessibility Passport (the Passport); a tool that helps federal public service employees with disabilities access the supports they need to excel at work. This training improved their foundational skills in accessibility, enabling them to offer higher-quality advice and guidance to managers and employees. To further promote accessible and inclusive communication, all HR staff completed “Accessible Documents” training, enhancing their ability to communicate effectively with candidates and employees regarding staffing and other HR matters. Additionally, a training video on “Making Documents Accessible” was added to the new mandatory training guides.

Resources and Support Initiatives

An Accessibility Resource Centre was launched and published on the NSIRA Secretariat’s intranet. This centre offers “How to” guides, training, and information on the Passport, accessible communications and technology, making key resources easily accessible to all staff. To promote the Passport, all newly hired employees were introduced to it during their onboarding and orientation sessions, ensuring awareness of this important accessibility tool. Managers and employees were regularly encouraged to make use of the Passport.

Accessibility in Recruitment and Staffing

The NSIRA Secretariat continued to take steps to ensure accessibility in its recruitment process. All recruitment and staffing materials, including communications with candidates at all hiring stages, included information about accommodations and accessibility. For example, interview invitations and written exam notices clearly stated that accommodations are available upon request. A centralized accommodation process, managed by the Senior Advisor, Wellness Initiatives, was developed to protect the candidates’ privacy consistent with the “need to know” principle for handling personal information. Additionally, a “Fact Sheet on Inclusive Recruitment” was provided to managers to support bias-free hiring. A feedback questionnaire was also developed and distributed to candidates requesting accommodations during the selection processes, helping the HR team to assess the effectiveness of these measures.

Promoting Accessibility Awareness

The NSIRA Secretariat promoted accessibility awareness among staff and managers. Accessibility-related training, tools and events were regularly shared with subject-matter experts and staff as appropriate. For example, a session on “Understanding Digital Accessibility and Disability Inclusion” was shared with information technology experts, while a session on accessible procurement was shared with procurement specialists. A “Quick Guide on Accessible Documents” was also developed and shared with managers, and tailored sessions were made available to entire teams. National AccessAbility Week was promoted for the second consecutive year, highlighted by an internal session entitled “Accommodations at NSIRA”.

Collaboration and Consultation

To ensure accessible internal digital training, the NSIRA Secretariat consulted Shared Services Canada (SSC)’s Accessibility, Accommodation, and Adaptive Computer Technology (AAACT) program for feedback on accessible tools. This step supported the ongoing development of a fully accessible digital training program within the Secretariat.

Representation Data and Self-ID Initiatives

As noted in its previous progress report, the NSIRA Secretariat launched a new Self-ID Questionnaire in 2023, which is completed by all new hired term and indeterminate employees. Data for 2024 indicated that 17.5% of the NSIRA Secretariat’s workforce identified as persons with disabilities. Additionally, the data revealed that 16% of newly hired employees self-identified as having a disability. The NSIRA Secretariat continues to make progress in increasing the overall representation of persons with disabilities within the organization in keeping with the Vision, Mission and Values statement adopted during the reporting period, and in particular the Value of Inclusiveness.

Built Environment

The accessibility plan identified barriers in the built environment including heavy doors without automatic door openers; airlocks between doors; tripping hazards; narrow corridors; lack of accessible signage; restrictions with respect to assistive devices and job aids; an emergency alert system that flashes lights but does not emit an audible alarm; lack of control over lighting or temperature within the office space; and an outdated building emergency evacuation plan. Some of the barriers were tied to physical security requirements of the Treasury Board Policy on Government Security and other policies that apply to the NSIRA Secretariat.

Status: Ongoing

The NSIRA Secretariat made some progress incorporating accessibility requirements in the built environment. An ongoing challenge is that the NSIRA Secretariat’s built environment is subject to standards established by Public Services and Procurement Canada (PSPC) and the Communications Security Establishment (CSE). The following provides additional detail about progress in respect of the built environment:

Accessibility in Construction and Design

The NSIRA Secretariat engaged with CSE to gather information on accessibility considerations for the construction of the NSIRA Secretariat’s new office, ensuring that accessibility was a key component of infrastructure planning and design.

Several adjustments were made to the new office location to enhance accessibility, despite the design being completed before the ACA came into force. These included ergonomic adjustments and adaptive equipment setup supported by the Senior Advisor, Wellness Initiatives, which was well-received by employees and will continue as an ongoing initiative.

Addressing Physical and Mobility Barriers

Heavy doors, identified as a barrier for persons with mobility challenges, were repaired to ensure the proper functioning of automatic door openers, significantly improving accessibility and ease of use.

Accessible Communication and Signage

As noted above, in some areas the NSIRA Secretariat does not operate on its own. Considerable work was undertaken to establish a process for ordering Braille signage before the Treasury Board of Canada Secretariat (TBS) advised that it would be providing guidance on the use of signage for the public service once Accessible Standards Canada finalizes its standards. It is anticipated that Accessible Standards Canada will finalize the standards on accessible signage and wayfinding sometime in 2025.

Enhanced Visual and Cognitive Accessibility

In response to barriers caused by the existing alarm lighting system for individuals with visual and cognitive impairments, the NSIRA Secretariat opted to replace continuous flashing lights with LED alternatives, providing a more inclusive and manageable alert system.

Supportive Security Processes for Assistive Devices

Recognizing the need to streamline security processes for assistive devices, the Security Team developed a list of pre-approved electronics, such as hearing aids and heart monitors, expediting their approval for workplace entry and enhancing employee support.

Information and Communication Technologies

The accessibility plan identified barriers with respect to information and communication technologies (ICT), notably that neither the intranet website, nor the internet website were fully accessible. Documents on both websites were not designed with accessibility in mind. Individuals bringing a complaint did not have the option to bring a complaint through any means other than by completing a templated form and persons with a hearing impairment had limited options for engaging with the Registrar.

Status: Ongoing

Much of the NSIRA Secretariat’s Information Management (IM) and Information Technology (IT) teams’ work in 2024 was focused on the launch of a new institutional electronic document and records management system. Despite operating with slightly reduced staff levels, progress was made in the following areas:

Document Accessibility and WCAG Compliance

The NSIRA Secretariat reviewed and modified previously published documents, including fillable forms, to ensure compliance with Web Content Accessibility Guidelines (WCAG) 2.1 standards. This served to enhance digital accessibility across all published materials.

IT Accessibility Partnerships and Interim Solutions

The NSIRA Secretariat leverages IT services provided by other government institutions, which operate under distinct service models managed through formal, non-binding agreements. While these service models present inherent challenges in adapting to specific accessibility needs due to their structure and limitations, the NSIRA Secretariat engaged both providers informally to address accessibility gaps. As a result, some interim accessibility solutions were successfully implemented (such as expediting equipment and technology requests for adaptive tools), while efforts continue to identify and implement further measures, reflecting a commitment to improving IT accessibility within the current constraints.

Accessibility Resource Centre

As previously mentioned, the NSIRA Secretariat launched an online Accessibility Resource Centre, creating a dedicated space for Accessible Technology. This centre provides employees with access to adaptive tools and programs available, promoting awareness and use of supportive technology to foster inclusivity in the workplace. 

Accessibility-Focused Training for IM and IT Teams

Training guides for IM and IT teams were reviewed and updated to include several accessibility-related courses. These additions, including sessions developed by Government of Canada programs specializing in digital accessibility (such as the AAACT program), reinforce the NSIRA Secretariat’s commitment to building digital accessibility expertise within its workforce.

Assessment of Digital Complaints Portal Feasibility

In the past year, a feasibility study was undertaken to evaluate the development of a web-based complaints portal aimed at digitizing the complaints process and enhancing accessibility. However, the study identified several significant constraints early on, including financial limitations, technical challenges associated with the organization’s current IT infrastructure, and privacy and security concerns. As a result, the initiative was postponed indefinitely. The NSIRA Secretariat remains committed to exploring alternative approaches to improve accessibility and enhance user experiences within the complaints process while addressing these challenges.

Communication other than ICT

The accessibility plan aimed to address several barriers with respect to communication for staff and members of the public, including the absence of a process to provide alternate formats and communication support upon request. Other barriers included technical or sector-specific language in public facing documents and reports, as well as the lack of guidance or established procedures for use of closed captioning, sign language interpretation or teletypewriters for persons with a hearing disability.

Status: Ongoing

The NSIRA Secretariat finalized its recruitment process to hire a Communications Writer/Editor and a Senior Communications Advisor in November 2024. Both employees are expected to be on board in early 2025. Their responsibilities will include implementing a communications strategy and continuing to implement the communications activities identified in the Accessibility Plan 2022-2025. In addition, progress was made in the following areas in 2024:

Accessible Review Reports

Review reports are a critical mechanism through which the Review Agency fulfills its mission to serve Canadians by independently reviewing national security or intelligence activities. Significant effort was undertaken to update the NSIRA Secretariat’s style guide and template for drafting review reports, to incorporate comprehensive accessibility guidelines and ensure all reports produced on behalf of the Review Agency meet high accessibility standards. These updates are expected to be available for internal consultation by the end of 2024, with final approval anticipated in 2025. In the interim, other internal review policies have been revised to reflect accessibility guidelines. These resources have been shared internally and are already in use.

Accessible Publication Formats and Online Presence

Reports published on behalf of the Review Agency by the NSIRA Secretariat in 2024 were made available in both HTML and PDF format, with alt text included for all graphics and images to improve accessibility. Alt text was also integrated into posts on X and LinkedIn, ensuring inclusive and accessible online engagement. Additionally, and as previously mentioned, the NSIRA Secretariat’s Webmaster worked to ensure all previously published materials, including publications and reports, met WCAG 2.1 compliance. To further accessibility, a statement was added to the Accessibility Notice on our public website, inviting users to contact us to report any barriers encountered while using our website or to request information in an alternative format.

Accessibility Guidelines for Events

Administrative staff received detailed guidelines for planning and hosting accessible events, both virtual and in-person. The guidelines emphasize making accessibility a default consideration and include a requirement for all event and meeting invitations to identify a dedicated Accessibility Contact for individuals to communicate specific needs, fostering a more inclusive experience.

Accessible Communications Support

The NSIRA Secretariat established processes to access accessible communications resources as needed. This includes, among other things, leveraging PSPC’s Translation Bureau for sign language interpretation and arranging for Braille printing, ensuring that both internal and external communications can be tailored to meet diverse accessibility needs.

Accessible Branding and Promotional Materials

Efforts to improve accessibility in branding have led to several changes, including a new color scheme for better readability and an updated standardized email signature that aligns with accessibility standards. Additionally, HR-related promotional materials used at job fairs – such as business cards, banners and other items – were redesigned to increase accessibility, demonstrating a commitment to engaging with a broad cross-section of individuals and recruiting a diverse workforce.

Procurement of Goods, Services and Facilities

Although no barriers were identified with respect to the procurement of goods, services and facilities, the accessibility plan nevertheless noted that improvements could be made to ensure “accessibility by design” in procurement practices.

Status: Ongoing

In July 2024, the NSIRA Secretariat’s Finance & Procurement team welcomed a new Procurement Team Leader, who introduced a structured approach with a dedicated focus on accessibility in procurement. Progress was made in the following areas:

Training and Capacity Building

Training resources were provided to cost centre managers to support the integration of accessibility considerations into procurement processes and practices. This training ensured that managers are equipped with the necessary knowledge to incorporate accessibility into all stages of procurement, promoting inclusivity in the acquisition of goods and services.

Enhanced Accessibility Training for Leadership

The procurement management team attended specialized training focused on accessibility in procurement. This training enhanced their understanding of accessible procurement requirements and strengthened their capacity to lead inclusive procurement practices within the NSIRA Secretariat.

Accessibility-Driven Procurement Practices

Accessibility remains a central focus in all ongoing procurement activities. Work began to review practices to ensure compliance with accessibility principles and incorporate standard accessibility requirements into procurement practices.

Design and Delivery of Programs and Services

An important part of the Review Agency’s mandate is to investigate complaints related to activities carried out by the Canadian Security Intelligence Service, the CSE, and the Royal Canadian Mounted Police (RCMP) if the complaint is closely related to national security, as well as complaints related to the denial or revocation of security clearances, and other matters under its purview. Ensuring that Canadians with disabilities can participate fully in these processes is integral to the investigations, however when the NSIRA Secretariat’s Accessibility Plan 2022 – 2025 was published, Rules of Procedure did not clarify accessibility options to accommodate the needs of persons with disabilities, while also complying with the necessary security requirements. 

Status: Ongoing

As the work began to address the barriers identified with respect to the Review Agency’s investigation mandate, it became clear that accessibility is contingent primarily on the built environment. The accessibility plan reported barriers such as heavy doors without automatic door openers. This included the hearing room where investigative proceedings are held. Tripping hazards and restrictions with respect to assistive devices were also noted, among other concerns. 

Similarly, progress around programs and services is inextricably linked to the barriers with respect to ICT. For the complaint investigation process, this included the internet website, which was not fully accessible, and lack of clarity for persons with a hearing impairment to engage with the Registrar. 

The new internet website includes a more user-friendly interface that meets WCAG standards. Complainants can more easily navigate to the information and forms they need to bring a complaint. The complaint forms themselves have been redesigned to be more accessible. Additionally, the following activities were underway in 2024: 

Commitment to Accessibility in NSIRA’s Rules of Procedure 

A new section was drafted for the Rules of Procedure to reflect a commitment to ensuring accessibility. This progress aligns with continuing efforts to incorporate accessibility requirements within the built environment, demonstrating a comprehensive approach to creating an inclusive and accessible operational framework. 

Case-by-Case Accessibility Arrangements 

Amendments to the Rules of Procedure now clarify that investigation participants may request and access alternate arrangements tailored to their specific accessibility needs. This flexible approach ensures that participants can fully engage in investigative proceedings with the necessary accommodations, enhancing inclusivity and equitable participation. 

Notification of Accessibility Needs 

The revised Rules of Procedure specify that the Registrar must be notified of any barriers encountered by, or accessibility requirements of, participants. This provision ensures that accessibility needs are proactively addressed, fostering a supportive environment for all individuals engaging with the Review Agency and in turn promoting access to justice. 

Procedural Assistance for Complainants 

The revised Rules of Procedure now clarify that individuals wishing to bring forward a complaint are entitled to procedural assistance from the Registrar if they encounter barriers. This includes support for individuals with cognitive disabilities who may require assistance in articulating their complaints or allegations, promoting access for a diverse range of disabilities. 

Transportation

The NSIRA Secretariat did not identify any barriers or develop an action plan with respect to this element.

Although specific actions were not identified, it is worth noting that the NSIRA Secretariat’s offices are in Ottawa, where employees and members of the public may use various modes of transportation to reach the work sites. Accessible transportation services are provided by OC Transpo in Ottawa and by the Société de Transport de l’Outaouais in Gatineau. Individuals who use their personal vehicles may park in designated spots available at nearby lots. Information is provided to new hires about designated parking spaces.

Consultations

The ACA requires consultations with persons with disabilities in preparing progress reports. The activities outlined in the accessibility plan for completion or launch in the second year aimed to improve accessibility for the workforce and in the workplace.

Thanks to the introduction of a Self-Identification Questionnaire, employees who identified as a person with a disability were specifically invited to provide insight. Additionally, all staff were offered an opportunity to share their feedback on the implementation of the Accessibility Plan, regardless of self-identification. Members of the Equity, Diversity & Inclusion Committee were also invited to share their perspectives on progress, barriers and potential solutions. This approach enabled the NSIRA Secretariat to gather diverse insights and first-hand experiences, fostering a better understanding of the steps taken and actions still needed to create a more inclusive and accessible organization.

Feedback

General feedback from employees

A key highlight from the feedback was the significant reduction of accessibility barriers for employees with cognitive needs through improvements in IM and IT – a meaningful step forward in fostering an inclusive and accessible work environment.

The feedback also underscored a need to update existing PowerPoint templates, which were based on an outdated website and not fully accessible. The issue has since been resolved, as detailed in the “Communication other than ICT” section of this report, with the NSIRA Secretariat’s branding now fully aligned with accessibility standards. Additionally, concerns were raised regarding the lack of adequate sound equipment in collaborative spaces used for large informal gatherings, which previously made it difficult for some to hear speakers. This barrier has been addressed through the purchase of a portable microphone and speaker combination, enhancing the accessibility of these spaces and ensuring inclusive participation in future gatherings.

Feedback from employees and external applicants about accommodations

Feedback on the accommodations process and its integration into the staffing process indicated that employees feel their accommodations are provided within a reasonable timeframe and that the solutions effectively meet their needs. Notably, no recommendations for improvement were suggested.

Feedback from the public

No feedback was received from members of the public about the accessibility plan during the year under review.

The NSIRA Secretariat will continue to welcome feedback in the coming year. The NSIRA Secretariat will continue to welcome feedback in the coming year.

Share this page
Date Modified:

Quarterly Report: For the quarter ended September 30, 2024

Date of Publishing:

Introduction

This quarterly report has been prepared by management as required by section 65.1 of the Financial Administration Act and in the form and manner prescribed by the Directive on Accounting Standards, GC 4400 Departmental Quarterly Financial Report. This quarterly financial report should be read in conjunction with the 2024–2025 Main Estimates.

This quarterly report has not been subject to an external audit or review.

Mandate

The National Security and Intelligence Review Agency (NSIRA) is an independent external review body that reports to Parliament. Established in July 2019, NSIRA is responsible for conducting reviews of the Government of Canada’s national security and intelligence activities to ensure that they are lawful, reasonable and necessary. NSIRA also hears public complaints regarding key national security agencies and their activities.

The NSIRA Secretariat supports the Agency in the delivery of its mandate. Independent scrutiny contributes to strengthening the accountability framework for national security and intelligence activities and to enhancing public confidence. Ministers and Canadians are informed whether national security and intelligence activities undertaken by Government of Canada institutions are lawful, reasonable, and necessary

A summary description NSIRA’s program activities can be found in Part II of the Main Estimates.  Information on NSIRA’s mandate can be found on its website.

Basis of presentation

This quarterly report has been prepared by management using an expenditure basis of accounting. The accompanying Statement of Authorities includes the agency’s spending authorities granted by Parliament and those used by the agency, consistent with the 2024–2025 Main Estimates. This quarterly report has been prepared using a special-purpose financial reporting framework (cash basis) designed to meet financial information needs with respect to the use of spending authorities.

The authority of Parliament is required before money can be spent by the government. Approvals are given in the form of annually approved limits through appropriation acts or through legislation in the form of statutory spending authorities for specific purposes.

The Department uses the full accrual method of accounting to prepare and present its annual departmental financial statements that are part of the departmental results reporting process. However, the spending authorities voted by Parliament remain on an expenditure basis.

Highlights of the fiscal quarter and fiscal year-to-date results

This section highlights the significant items that contributed to the net increase or decrease in authorities available for the year and actual expenditures for the quarter ended September 30, 2024.

NSIRA Secretariat spent approximately 45% of its authorities by the end of the second quarter, compared with 33% in the same quarter of 2023–2024 (see graph 1).

Graph 1: Comparison of total authorities and total net budgetary expenditures, Q2 2024–2025 and Q2 2023–2024 (in millions of dollars)

Graph 1: Comparison of total authorities and total net budgetary expenditures, Q2 2024–25 and Q2 2023–24 - Text version to follow
Comparison of total authorities and total net budgetary expenditures, Q2 2024–2025 and Q2 2023–2024 (in millions of dollars)
  2024-25 2023-24
Total Authorities $19.5 $24.3
Q2 Expenditures $5.3 $3.8
Year-to-Date Expenditures $8.8 $8.1

Significant changes to authorities

As of September 30, 2024, Parliament had approved $19.5 million in total authorities for use by NSIRA Secretariat for 2024–2025 compared with $24.3 million as of September 30, 2023, for a net decrease of $4.8 million or 19.8% (see graph 2).

Graph 2: Variance in authorities as of September 30, 2024 (in millions of dollars)

Graph 2: Variance in authorities as of September 30, 2024 - Text version to follow
Variance in authorities as of September 30, 2024 (in millions of dollars)
  Fiscal year 2023-24 total available for use for the year ended March 31, 2024 Fiscal year 2024-25 total available for use for the year ended March 31, 2025
Vote 1 – Operating 22.6 17.9
Statutory 1.7 1.6
Total budgetary authorities 24.3 19.5

*Details may not sum to totals due to rounding*

The decrease of $4.8 million in authorities is mostly explained by a reduction in capital funding for infrastructure projects due to the fact that they have reached completion in this fiscal year.

Significant changes to quarter expenditures

The second quarter expenditures totalled $5.3 million for an increase of $1.5 million when compared with $3.8 million spent during the same period in 2023–2024.  Table 1 presents budgetary expenditures by standard object.

Table 1: Departmental budgetary expenditures by Standard Object (unaudited)

Fiscal year 2024-2025 (in thousands of dollars)
Variances in expenditures by standard object (in thousands of dollars) Fiscal year 2024–25: expended during the quarter ended September 30, 2024 Fiscal year 2023–24: expended during the quarter ended September 30, 2023 Variance $ Variance %
Personnel 3,856 3,014 842 28%
Transportation and communications 77 62 15 24%
Information 7 4 3 75%
Professional and special services 1,320 504 816 162%
Rentals 17 25 (8) (32%)
Repair and maintenance 37 3 34 1133%
Utilities, materials, and supplies 12 50 (38) (76%)
Acquisition of machinery and equipment 8 4 4 100%
Other subsidies and payments (38) 118 (156) (132%)
Total gross budgetary expenditures 5,296 3,784 1,512 40%

Personnel

The increase of $842,000 reflects management’s decision to increase FTEs to enhance operational capacity in response to greater demand for output. It is also a result of an increase in average salary due to alignment with increases approved as part of collective bargaining.

Professional and special services

The increase of $816,000 is mainly explained by a change in the timing of the billing for maintenance and services in support of our classified IT network infrastructure.

Repair and maintenance

The increase of $34,000 is explained by some one-time office repairs in fiscal year 2024-2025.

Utilities, materials, and supplies

The decrease of $38,000 is explained by temporarily unreconciled acquisition card purchases in fiscal year 2023-2024.

Other subsidies and payments

The decrease of $156,000 is explained by an increase in the recovery of salary overpayments.

Significant changes to year-to-date expenditures

The year-to-date expenditures totalled $8.8 million for an increase of $0.7 million (8%) when compared with $8.1 million spent during the same period in 2023-2024. Table 2 presents budgetary expenditures by standard object.

Table 2: Departmental budgetary expenditures by Standard Object (unaudited) (continued)

Fiscal year 2024-2025 (in thousands of dollars)
Variances in expenditures by standard object (in thousands of dollars) Fiscal year 2024–25: year-to-date expenditures as of September 30, 2024 Fiscal year 2023–24: year-to-date expenditures as of September 30, 2023 Variance $ Variance %
Personnel 6,864 5,900 964 16%
Transportation and communications 135 192 (57) (30%)
Information 13 4 9 225%
Professional and special services 1,589 1,669 (80) (5%)
Rentals 42 73 (31) (42%)
Repair and maintenance 40 27 13 48%
Utilities, materials and supplies 40 57 (17) (30%)
Acquisition of machinery and equipment 20 52 (32) (62%)
Other subsidies and payments 41 122 (81) (66%)
Total gross budgetary expenditures 8,784 8,096 688 8%

Transportation and communications

The decrease of $57,000 is due to the timing of invoicing for the organization’s Network Services.

Information

The increase of $9,000 is due to the timing of invoicing for printing services.

Acquisition of machinery and equipment

The decrease of $32,000 is mainly explained by the one-time purchase of a specialized laptop in 2023-2024.

Other subsidies and payments

The decrease of $81,000 is mainly explained by higher leasehold improvement amortization expenses in 2023-2024.

Risks and uncertainties

There is a risk that the funding received to offset pay increases will be insufficient to cover the costs of such increases and the year-over-year cost of services provided by other government departments/agencies is increasing significantly. To mitigate, NSIRA Secretariat is forecasting both personnel and operating expenditures three fiscal years out and identifying critical functions.

NSIRA Secretariat is closely monitoring pay transactions to identify and address over and under payments in a timely manner. It continues to apply ongoing mitigating controls such as participating in PSPC’s Reconciliation Tool (RT) initiative.

Mitigation measures for the risks outlined above have been identified and are factored into NSIRA Secretariat’s approach and timelines for the execution of its mandated activities.

Significant changes in relation to operations, personnel and programs

Mr. Charles Fugère was appointed by the Governor-in-Council to be Executive Director of the NSIRA Secretariat, for a period of three years, on July 27, 2024.

Approved by senior officials:

Charles Fugère
Executive Director

Martyn Turcotte
Chief Financial Officer

Appendix

Statement of authorities (Unaudited)

(in thousands of dollars)

  Fiscal year 2024–25 Fiscal year 2023–24
  Total available for use for the year ending March 31, 2025 (note 1) Used during the quarter ended September 30, 2024 Year to date used at quarter-end Total available for use for the year ending March 31, 2024 (note 1) Used during the quarter ended September 30, 2023 Year to date used at quarter-end
Vote 1 – Net operating expenditures 17,857 4,895 7,983 22,564 3,345 7,218
Budgetary statutory authorities
Contributions to employee benefit plans 1,601 401 801 1,755 439 878
Total budgetary authorities (note 2) 19,458 5,296 8,784 24,319 3,784 8,096

Note 1: Includes only authorities available for use and granted by Parliament as at quarter-end.

Note 2: Details may not sum to totals due to rounding.

Departmental budgetary expenditures by standard object (unaudited)

(in thousands of dollars)

  Fiscal year 2024–25 Fiscal year 2023–24
  Planned expenditures for the year ending March 31, 2025 (note 1) Expended during the quarter ended September 30, 2024 Year-to-date used at quarter-end Planned expenditures for the year ending March 31, 2024 Expended during the quarter ended September 30, 2023 Year-to-date used at quarter-end
Expenditures
Personnel 13,205 3,856 6,864 13,303 3,014 5,900
Transportation and communications 685 77 135 650 62 192
Information 76 7 13 371 4 4
Professional and special services 4,624 1,320 1,589 4,906 504 1,669
Rentals 309 17 42 271 25 73
Repair and maintenance 436 37 40 4,580 3 27
Utilities, materials, and supplies 58 12 40 73 50 57
Acquisition of machinery and equipment 65 8 20 132 4 52
Other subsidies and payments 0 (38) 41 33 118 122
Total gross budgetary expenditures
(note 2)
19,458 5,296 8,784 24,319 3,784 8,096

Note 1: Includes only authorities available for use and granted by Parliament as at quarter-end.

Note 2: Details may not sum to totals due to rounding.

Share this page
Date Modified:

National Security and Intelligence Review Agency Annual Report 2023

Backgrounder

Ottawa, Ontario, November 6, 2024 – The National Security and Intelligence Review Agency’s (NSIRA) fifth annual report has been tabled in Parliament.

This report provides an overview and discussion of NSIRA’s review and investigation work throughout 2023, including its findings and recommendations. It highlights the significant outcomes achieved through strengthened partnerships and an unwavering commitment to all Canadians to provide accountability and transparency regarding the Government of Canada’s national security and intelligence activities.

The annual report also reflects on a major milestone: NSIRA’s five-year anniversary. The agency has matured since its inception in 2019, keeping pace with emerging threats, technological advancements, and evolving security and intelligence activities. In stride, NSIRA has built an enhanced capacity to address complex issues and conduct thorough and effective reviews and investigations with a team of dedicated professionals with diverse expertise.  

In 2023, in addition to its mandatory reviews, NSIRA continued executing discretionary reviews that were deemed relevant and appropriate. Of the ongoing reviews in 2023, NSIRA has since completed 12. In particular, NSIRA’s review on the Dissemination of Intelligence on People’s Republic of China Political Foreign Interference, 2018–2023 was a significant achievement. NSIRA evaluated the flow of intelligence within government from the collectors to consumers, including senior public servants and elected officials. This involved scrutinizing internal processes regarding how collected information was shared and escalated to relevant decision-makers. NSIRA determined it was in the public interest to report on this matter and produced its first special report under section 40 of the NSIRA Act, which was tabled in both houses of Parliament in May 2024.  

Review highlights in the report include the following:  

  • A review of the Communications Security Establishment’s (CSE) use of the polygraph for security screening, which examined the way CSE operated its polygraph program and the role of the Treasury Board of Canada Secretariat (TBS) in establishing the Standard on Security Screening that governs the use of the polygraph for security screening by the Government of Canada;  
  • A review of the Canadian Security Intelligence Service’s (CSIS) current application of its dataset regime, which enables CSIS to collect and retain datasets containing personal information that are not directly and immediately related to threats but likely to assist in national security investigations; 
  • A review of operational collaboration between CSE and CSIS, NSIRA’s first review to examine the effectiveness of the collaboration by assessing their respective mandates and associated prohibitions; 
  • Two mandated multi-departmental reviews: a review of directions issued with respect to the Avoiding Complicity in Mistreatment by Foreign Entities Act and a review of disclosures of information under the Security of Canada Information Disclosure Act; and 
  • Three reviews concerning human source programs: the RCMP’s Human Source Program, CBSA’s Confidential Human Source Program, and the Department of National Defence/Canadian Armed Forces’ Human Source Handling Program. 

NSIRA also closed 12 investigations in 2023. Last year, the agency saw an increase in complaints against CSIS under section 16 of the NSIRA Act, alleging process delays in immigration or citizenship security screening.  

This annual report demonstrates the value of expanded partnerships and how the organization leveraged its network of international oversight partners in 2023, including lessons learned and shared. NSIRA’s integration into the global community of national security and intelligence oversight has advanced the agency’s development and enhanced its capacity to carry out its mandate. 

Over the past five years, NSIRA has sought to demystify the often-opaque domain of national security and intelligence agencies and empower Canadians to participate in informed discussions about their security and rights. Recently, the agency codified its approach by formalizing its vision, mission, and values statements. 

Looking ahead, NSIRA is committed to continuing its vital work reporting on whether national security or intelligence activities are respectful of the rights and freedoms of all Canadians and enhancing public awareness and understanding of the critical issues at stake in national security and intelligence. 

Date of Publishing:

Message from the members

As members of the National Security and Intelligence Review Agency (NSIRA), we are pleased to present our 2023 Annual Report, marking the five-year milestone of our agency’s journey. This report encapsulates our activities of the past year and provides an opportunity for reflection on the progress and evolution of our agency since 2019.

As world events have unfolded, and the pace of security and intelligence activities has advanced, the presence of our agency has never been more important. Since NSIRA’s inception, our mandate has been to provide independent oversight and accountability of Canada’s national security and intelligence activities. Over the last five years, we have brought greater transparency on such activities to the Canadian public, and we are proud of the strides we have made in fulfilling this crucial role.

Our agency has matured and strengthened in many ways. We have built enhanced capacity to conduct thorough and effective reviews and investigations of our country’s diverse range of national security and intelligence activities. We have assembled a team of dedicated professionals with a wealth of expertise in numerous fields, enabling us to address complex issues and provide informed assessments and recommendations.

We have also fostered constructive relationships with our reviewees, partner agencies, parliamentary committees, and civil society organizations. These partnerships have been instrumental in facilitating our access to information, engagement in meaningful dialogue, and our ability to promote transparency and accountability.

Over the last five years, we have enhanced public awareness and understanding of the critical issues at stake in the realm of national security and intelligence. Through the publication of our reports, we have sought to demystify this often-opaque domain and empower Canadians to participate in informed discussions about their security and rights.

As we reflect on our achievements to date, we are mindful of the challenges that lie ahead. The landscape of national security and intelligence is constantly evolving as emerging threats and technological advancements present new challenges. As adaptive and agile responses are required by Canada’s security and intelligence agencies, NSIRA will continue to assess whether such responses are lawful, reasonable, and necessary.

Looking ahead, we are committed to continuing our vital work. We remain dedicated and vigilant in our role of ensuring that Canada’s national security and intelligence framework remains accountable, and reporting on whether national security or intelligence activities are respectful of the rights and freedoms of all Canadians.

We extend our gratitude to all Secretariat staff, past and present, whose dedication and support has contributed to NSIRA’s evolution over the past five years. Their efforts have been invaluable in shaping our agency and our work serving the Canadian public.

Marie Deschamps
Marie-Lucie Morin
Foluke Laosebikan
Jim Chu
Craig Forcese
Matthew Cassar
Colleen Swords

Executive summary

2023 marked a momentous year for the National Security and Intelligence Review Agency (NSIRA). Relentless efforts to mature the agency’s processes and professionalize its approaches allowed NSIRA to conduct its reviews and investigations to the highest standards. This report highlights the significant outcomes achieved through refined methodologies, strengthened partnerships, and an unwavering commitment to all Canadians to provide accountability and transparency of the national security and intelligence activities of the Government of Canada.

NSIRA’s first five years

NSIRA celebrated its fifth anniversary in July 2024 and has used this as an opportunity to reflect on its growth and development, as well as lessons learned. The agency has embraced its broad and unique mandate, completing reviews that span organizations and increasing its transparency in implementing its investigations mandate. NSIRA has prioritized the growth and development of its staff, enhanced review literacy across reviewed entities, and continued to maintain best practices and the highest standards in implementing its mandate.

Value of expanded partnerships

NSIRA has expanded and leveraged its network of oversight partners through its numerous engagements with international counterparts and participation in international forums in 2023. This has benefitted all parties through sharing best practices, lessons learned, expertise, and research. NSIRA’s integration into the international community of national security and intelligence oversight has advanced the agency’s development and enhanced its capacity to carry out its mandate.

Reviews

The following are highlights and key outcomes of the reviews NSIRA completed in 2023. (Ongoing reviews are not included.) Annex B lists all the findings and recommendations associated with reviews completed in 2023.

Canadian Security Intelligence Service

NSIRA completed the following reviews where Canadian Security Intelligence Service (CSIS) activities were solely at issue:

  • a review of CSIS’ Dataset Regime, which examined its implementation, including aspects of governance, information management, retention practices, and training; and
  • an annual review of CSIS’ activities, which informed, in part, NSIRA’s 2023 classified annual report to the Minister of Public Safety.

Communications Security Establishment

NSIRA completed the following reviews where Communications Security Establishment (CSE) activities were mostly at issue:

  • a review on CSE’s use of the polygraph for security screening, which examined the way CSE operated its polygraph program and the role of the Treasury Board of Canada Secretariat (TBS) in establishing the Standard on Security Screening that governs the use of the polygraph for security screening by the Government of Canada;
  • a review of CSE’s network-based solutions and related cybersecurity and information assurance activities, which was NSIRA’s first review of these activities, as well as its first review of Shared Services Canada (SSC); and
  • an annual review of CSE’s activities, which informed, in part, NSIRA’s 2023 classified annual report to the Minister of National Defence.

Canada Border Services Agency

NSIRA completed a review of the Canada Border Services Agency’s (CBSA’s) Confidential Human Source (CHS) program, which examined the legal and policy frameworks governing the program, with particular attention to the management and assessment of risk; the agency’s discharge of its duty of care to its sources; and the sufficiency of ministerial direction and accountability in relation to the program.

Department of National Defence and the Canadian Armed Forces

NSIRA completed a review of the Department of National Defence (DND) and Canadian Armed Forces’ (CAFs) Human Source Handling program, which examined whether DND/CAF conducts its human source-handling activities lawfully, ethically, and with appropriate accountability.

Multi-departmental reviews

NSIRA completed a review of the operational collaboration between CSE and CSIS, which was NSIRA’s first review to examine the effectiveness of the collaboration by assessing their respective mandates and associated prohibitions. This review also satisfied NSIRA’s annual requirement under section 8(2) of the National Security and Intelligence Review Agency Act (NSIRA Act) to review an aspect of CSIS’ threat reduction measures (TRMs).

NSIRA completed two mandated multi-departmental reviews in 2023:

  • a review of directions issued with respect to the Avoiding Complicity in Mistreatment by Foreign Entities Act; and
  • a review of disclosures of information under the Security of Canada Information Disclosure Act (SCIDA).

Complaint investigations

The NSIRA Secretariat – in consultation with NSIRA members – established service standards for complaint investigations and set the goal of completing 90 percent of cases within the service standards. This commitment supports NSIRA’s complaint investigations by ensuring timeliness. NSIRA also implemented an independent verification process for complaints against CSE. Additionally, the agency completed a study on the collection of race-based data and other demographic information.

NSIRA observed an increase of complaints against CSIS, pursuant to section 16 of the NSIRA Act, alleging process delays in immigration or citizenship security screening.

Introduction

Mandate

The National Security and Intelligence Review Agency (NSIRA) is an independent agency that reports to Parliament and has the authority to conduct an integrated review of Government of Canada national security and intelligence activities. This provides Canada with one of the most extensive systems for independent review of national security in the world. NSIRA has a dual mandate: to conduct reviews, and to carry out investigations, of complaints related to Canada’s national security or intelligence activities. In fulfilling its mandate, the agency is assisted by a Secretariat headed by an Executive Director.

Reviews

NSIRA’s review mandate is broad, as outlined in subsection 8(1) of the National Security and Intelligence Review Agency Act (NSIRA Act). This mandate includes reviewing the activities of the Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE), as well as those of any other federal department or agency that are related to national security or intelligence. The agency may also review any national security or intelligence matter that a Minister of the Crown refers to NSIRA.

Investigations

NSIRA is responsible for investigating complaints related to national security or intelligence. This is outlined in paragraph 8(1)(d) of the NSIRA Act, and involves investigating the following:

  • complaints about the activities of CSIS or CSE;
  • complaints referred to it by the Civilian Review and Complaints Commission (CRCC) about the conduct of the Royal Canadian Mounted Police (RCMP) insofar as they relate to national security;
  • complaints related to decisions to deny or revoke federal government security clearances;
  • matters referred to it under the Canadian Human Rights Act; and
  • ministerial reports under the Citizenship Act that recommend denying certain citizenship applications.

NSIRA’s first five years

A new era of security and intelligence accountability in Canada

The conversation on national security and intelligence issues is evolving in Canada. In recent years, armed conflicts, the COVID-19 pandemic, and activities of foreign and domestic security and intelligence agencies have all been featured in news headlines. Most recently, Parliament debated the role of Canada’s security and intelligence agencies in responding to the threat of foreign political interference. The importance of robust review and oversight has never been more clear or timely. As the conversation grows, Canadians will want more information about the functioning of their security and intelligence systems. NSIRA is the trusted eyes and ears of Canadians, providing transparency that did not previously exist.

NSIRA’s mandate is to review issues and conduct investigations of complaints related to Canada’s national security or intelligence activities. Prior to NSIRA, although some activities were subject to review, no single agency had the mandate and authority to review activities across the national security and intelligence landscape, and some departments lacked an independent review body.

The siloed framework limited NSIRA’s predecessor agencies, the Security and Intelligence Review Committee (SIRC) and the Office of the Communications Security Establishment Commissioner to reviews and investigations of complaints within their narrow mandates. For example, reviews did not trace the progression of an issue as it traversed government departments.

A unique mandate

NSIRA’s broad mandate is unique within the international community, providing a much greater understanding of how departments and agencies work and interact in the national security and intelligence space. For example, in 2023, NSIRA launched a review of the dissemination of intelligence on foreign interference, focusing on how intelligence progressed from departments charged with collecting intelligence through to its ultimate consumers. Such a review was not possible for NSIRA’s siloed predecessors.

NSIRA’s reviews have involved 19 departments and agencies to date. Its expanded mandate for investigating complaints encompasses those against CSIS, CSE and, upon referral, those from the CRCC concerning the RCMP and the Canadian Human Rights Commission (CHRC). NSIRA’s work gets to the heart of how national security and intelligence activities are conducted, allowing for precise and effective recommendations.

Building processes and excellence from the ground up

NSIRA has prioritized professionalizing how it conducts reviews by developing policies and processes to support the review process. These were created even as the agency was growing and delivering on its complex mandate, and through the COVID-19 pandemic.

NSIRA has also modernized its policies and processes for its investigations of complaints. The agency undertook significant reform of its investigative process and published new Rules of Procedure to replace the previous model, increasing procedural transparency for those involved in the complaints process. When the COVID-19 pandemic made in-person hearings impossible, NSIRA pivoted and introduced alternate solutions, such as conducting its investigative interviews over video conference, thereby retaining access for participants.

NSIRA has built a proactive disclosure practice to publish its reports on its website. It has also undertaken an effort to publish those prepared by SIRC, to the greatest extent possible. The goal is to make NSIRA’s reviews and its findings and recommendations available to the public as soon as possible. Proactive disclosure increases transparency and contributes to the dialogue on national security and intelligence in Canada.

Empowering professionals

The Secretariat is now staffed by almost 100 full-time employees. NSIRA’s greatest asset is its people, and the Secretariat continues to attract staff with a range of expertise in research, review, technology, and law. This breadth has resulted in a diversity of reviews and a professionalized investigative model for addressing complaints.

NSIRA has actively developed a unique culture and is innovative in how it manages its review process. Review teams are comprised of individuals with diverse skill sets that reflect the need for legal and technical expertise. Teams are responsible for executing reviews under the direction of NSIRA members, with the guidance and support of Secretariat management. The result is detailed, fearless reviews.

Similarly, NSIRA’s model for investigations of complaints is now designed for NSIRA members to be expertly supported by legal, registry, and research staff. This enhances members’ effectiveness in their adjudicative role conducting investigations.

The challenge of more effective review

NSIRA’s mission is to serve as the trusted eyes and ears of Canadians through independent, expert review and investigation of the Government of Canada’s national security and intelligence activities. To successfully implement its mission, NSIRA must select the right reviews and have access to the required information.

The NSIRA Act requires NSIRA to conduct certain annual reviews; it also gives the agency discretion to choose topics to review. This discretion is fundamental as NSIRA must be able to “follow the thread” to ensure that activities deserving scrutiny are independently reviewed. Specifically, NSIRA has developed a review planning and consideration matrix, consisting of formal criteria that help identify review topics in accordance with NSIRA’s core mandate and mission. The prioritization of reviews is informed by additional strategic factors, including assessments of the nature of the activity and the compliance risk its poses, the novelty of the activity and any technology it employs, as well as resourcing, ongoing reviews, and public interest.

Access to information is the lifeblood of review, and NSIRA continues to insist upon its access rights. Effective review requires timely and complete responses to NSIRA’s requests for information, open and candid briefings, and mutual respect. Despite the agency’s unfettered access under the NSIRA Act, navigating access issues has not been without its struggles. There has been a learning curve, for both reviewed entities and NSIRA, and increasing review literacy in the departments and agencies under NSIRA’s review mandate is an ongoing priority.

Successes of NSIRA’s mandate

NSIRA’s impact on the national security and intelligence community extends beyond that of the reviewed departments. Recently, the Federal Court released a decision on a CSIS warrant matter that used an NSIRA report to inform its background and analysis. The Court considered the issues identified by NSIRA to be important in relation to the sharing of information collected under certain warrants.

Additionally, Ministers accountable for the security and intelligence community’s activities have recognized the value of independent review and have referred matters to NSIRA. The first of such reviews stemmed from a Federal Court judgment. As a result, the Ministers of Public Safety and Justice referred the matter to NSIRA. NSIRA’s report made findings and recommendations on Justice’s provision of legal advice, CSIS and Justice’s management of the warrant acquisition process, and broader cultural and governance issues.

Since 2019, NSIRA has completed 39 reviews (13 statutory and 26 discretionary). Of these reviews, 21 involved more than one department. NSIRA has also issued 17 different compliance reports to responsible Ministers, as required under section 35 of the NSIRA Act, whenever the agency finds that an activity may not be in compliance with the law. Compliance issues range from a department missing a deadline prescribed in legislation to a potential Charter violation. NSIRA’s reports have included more than 200 recommendations, ranging from specific process changes to wide-ranging structural reform. NSIRA has also received more than 200 complaints, highlighting the importance of accessibility to an independent investigation process to address complaints concerning the activities of CSIS, CSE, and the RCMP.

Looking ahead

As NSIRA looks to its future, it will also turn attention inward to ensure NSIRA’s structure and governance is fit for purpose. The upcoming legislative review of the NSIRA Act provides the opportunity to make any required improvements.

NSIRA is immensely proud of its contributions to the scrutiny and transparency of Canada’s security and intelligence activities during its first five years. It has played a pivotal role in ensuring there is independent accountability for the organizations involved in Canada’s security and intelligence activities. As NSIRA looks ahead, it does so with enthusiasm and a renewed mission. NSIRA has recently codified its approach by formalizing its vision, mission, and values statements, and while the formal statements may be new, the underlying elements have provided the agency’s foundation from its beginning.

NSIRA’s Mission, Vision, and Values

Vision, Mission and Values Graphic

Value of expanded partnerships

Expanded international partnerships and cooperation

Under NSIRA’s predecessors, international partnerships were primarily established through the Five Eyes Intelligence Oversight and Review Council (FIORC), which continues to be a foundational alliance for NSIRA. In addition to reinforcing and building upon the relationships it inherited, NSIRA has cultivated new partnerships with foreign counterparts and actively participated in international forums. In 2023 alone, NSIRA engaged with the following organizations and attended the following events:

Organizations:

  • Australia’s Inspector-General of Intelligence and Security (IGIS Australia)
  • New Zealand’s Inspector-General of Intelligence and Security (IGIS New Zealand)
  • The United States of America’s Inspector General of the Intelligence Community (IC IG US)
  • The United Kingdom’s Investigatory Powers Commissioner’s Office (IPCO UK)
  • The United Nations’ Counter-Terrorism Executive Directorate (UNCTED)
  • The United States Privacy and Civil Liberties Oversight Board (PCLOB US)
  • The Norwegian Parliamentary Oversight Committee on Intelligence and Security Services (EOS Norway)
  • The Danish Intelligence Oversight Board (TET Denmark)
  • The Independent Oversight Authority for Intelligence Activities of Switzerland (OA-IA)
  • The German Parliamentary Oversight Panel (PKGr)
  • The Dutch Review Committee on the Intelligence and Security Services (CTIVD Netherlands)

Events and forums:

  • Five Eyes Intelligence Oversight and Review Council Conference
  • International Intelligence Oversight Forum
  • European Intelligence Oversight Conference

Lessons learned and lessons shared with international partners

Connecting with international counterparts and participating in multilateral discussions has enabled NSIRA to tap into a network of partners. Relevant information is shared regarding best practices, methodologies, recent developments, and common issues. Information sharing and cooperation in the traditionally esoteric and insulated field of national security oversight has broadened NSIRA’s outlook and informed its expectations with respect to the departments and agencies that it oversees.

NSIRA has found that many of the challenges it faces have been experienced, and in some cases overcome, by international partners. These include challenges that are operational in nature, such as tactics for acquiring and verifying information, and those that relate to NSIRA’s Secretariat, such as the recruitment, training, and retention of staff. Leveraging the lessons learned by our international counterparts has accelerated NSIRA’s own development and contributed to the agency’s growing reputation as an exemplar in the realm of national security and intelligence oversight.

While certainly a voracious consumer of best practices, NSIRA is an equally active contributor. The agency has reciprocally shared its own unique approaches, processes, and methods with the broader oversight community, which in some instances has led partner organizations to follow NSIRA’s lead and adopt its practices. Even where NSIRA has not been confronted with a specific issue firsthand, its perspective has been sought and acted upon by partners that recognize NSIRA’s wealth of experience and renown for innovation.

Continuous and repeated engagements with international partners have allowed for working- level relationships to take root, flourish, and bear fruit in the form of both regularly scheduled touch points and casual, ad hoc, file-specific exchanges. Lowering the institutional barriers has promoted the exchange of expertise, had a more direct impact on the substantive work of each institution, and produced more tangible outcomes, as described in the examples below.

Examples of value gained from engagements

Benefits to NSIRA

Through an extended assignment to NSIRA, a communications expert from IPCO UK conducted a wholistic assessment of the agency’s current communications posture and played a critical role in crafting an inaugural communications strategy. The implementation of this strategy has helped NSIRA reach and build connections with domestic stakeholders. NSIRA’s members and Secretariat staff are deeply grateful for the expert’s contributions during their time with the agency.

TET Denmark and EOS Norway were influential in the development and use of a new IT system review inspection, first used as part of NSIRA’s Review of the Lifecycle of CSIS’ Warranted Information. They also contributed to functional and performance benchmarking used by NSIRA in its methodologies, common practices, and assessment criteria.

NSIRA has consulted the American Inspector General to improve the responsiveness of reviewed departments and agencies to NSIRA’s recommendations. NSIRA has begun adopting best practices for ensuring there is follow-up on recommendations it has provided.

NSIRA’s contributions

At an event hosted by Global Affairs Canada (GAC) as part of Canada’s work in cooperation with the UNCTED, NSIRA gave a presentation to the UNCTED delegation to explain the role that independent review plays in assessing the legality of Canadian activities in the counter-terrorism realm. This showcased to international assessors how the Canadian model has built robust independent mechanisms for review of counter-terrorism operations that reaches both law enforcement and the intelligence service.

NSIRA’s review planning and consideration matrix was shared with New Zealand’s IGIS, TET Denmark, and several other international partners. Following their visit to NSIRA, TET Denmark has updated its IT standards to include quality assurance steps and added additional factors to its risk assessment framework.

Greater collaboration leads to greater accountability

Just as security and intelligence agencies regularly cooperate and share information with international partners, so too must the bodies that oversee them. Collaboration among NSIRA and its foreign counterparts has produced, and continues to yield, mutual benefits for all parties involved. As a result, NSIRA has become a more capable organization with greater visibility in the transnational security and intelligence community, ensuring effective and exhaustive accountability of Canada’s national security apparatus.

Domestically, within Canada’s review and oversight community, NSIRA brings a distinct and valued perspective, filling a previously unoccupied space in this important network. As such, the agency complements the activities of its peers. In 2023, NSIRA met with numerous Agents of Parliament, including the Auditor General of Canada, the Public Sector Integrity Commissioner, and the Privacy Commissioner. The multi-decade institutional experience and maturity of these agents and their respective offices has proven to be invaluably instructive for NSIRA, and the exchange of best practices has been extremely helpful, particularly in the development of the Secretariat’s communications capacity.

As provided for in the NSIRA Act, NSIRA engages with other oversight bodies to deconflict on issues of mutual interest. For example, in 2023, both NSIRA and the National Security and Intelligence Committee of Parliamentarians (NSICOP) launched reviews on the issue of political foreign interference. While maintaining its independence, NSIRA coordinated with NSICOP to avoid any unnecessary duplication of work in relation to each organization’s review.

Reviews

Overview

In addition to its annual reviews, NSIRA continued to execute discretionary reviews that it deemed relevant and appropriate to the authorities of its mandate. Of note was NSIRA’s review on the Dissemination of Intelligence on People’s Republic of China Political Foreign Interference, 2018–2023. NSIRA evaluated the flow of intelligence within government from the collectors to consumers, including senior public servants and elected officials. This involved scrutinizing internal processes regarding how collected information was shared and escalated to relevant decision-makers. NSIRA determined that it was in the public interest to report on this matter and produced its first special report under section 40 of the NSIRA Act. This report was tabled in both houses of Parliament in May 2024.

Table 1 captures all review work that was underway in 2023. This includes annually mandated reviews, discretionary reviews, and annual reviews of CSE and CSIS activities. High-level summaries of their content and outcomes are provided in subsequent sections for those reviews completed by the end of the calendar year; the full findings and recommendations can be found in Annex B. NSIRA makes the reviews available once they have been redacted for public release.

Table 1. NSIRA Review Activities During 2023
Review Department(s) Status
Annual Report to the Minister of National Defence on CSE activities for 2022 CSE Completed
Annual Report to the Minister of Public Safety on CSIS activities for 2022 CSIS Completed
Review of Government of Canada Institutions’ Disclosures of Information Under the Security of Canada Information Disclosure Act in 2022 PS, CSE, CSIS, GAC, RCMP, IRCC Completed
Review of CSE’s Network-based Solutions and Related Cybersecurity & Information Assurance Activities CSE and SSC Completed
Review of CSIS Dataset Regime CSIS Completed
Review of the Department of National Defence/Canadian Armed Forces’ Human Source Handling Program DND/CAF Completed
Review of Operational Collaboration Between the CSE and CSIS CSE and CSIS Completed
Review of the CBSA’s Confidential Human Source Program CBSA Completed
Review of Departmental Implementation of the Avoiding Complicity in Mistreatment by Foreign Entities Act for 2022 CBSA, CRA, CSE, CSIS, DFO, DND/CAF, FINTRAC, GAC, IRCC, PS, RCMP, TC Completed
CSE’s Use of the Polygraph for Security Screening CSE and TBS Completed
Review of the Dissemination of Intelligence on People’s Republic of China Political Foreign Interference, 2018–2023 CSIS, RCMP, GAC, CSE, PS, PCO Completed
Review of Public Safety Canada and CSIS’s Accountability Mechanisms CSIS, GAC, PS, DOJ Completed
Review of the Lifecycle of CSIS’ Warranted Information CSIS Completed
Review of the RCMP’s Human Source Program RCMP Completed
Review of Government of Canada Institutions’ Disclosures of Information Under the Security of Canada Information Disclosure Act in 2023 PS, CSE, CSIS, GAC, RCMP, CBSA, IRCC Ongoing
Review of CSE’s Vulnerabilities Equities Process CSE, CSIS, RCMP Ongoing
Review of CRA’s Review and Analysis Division (RAD) CRA Ongoing

Canadian Security Intelligence Service reviews

Overview

NSIRA has a mandate to review any Canadian Security Intelligence Service (CSIS) activity. The NSIRA Act requires the agency to submit an annual report on CSIS activities each year to the Minister of Public Safety and Emergency Preparedness. These reports are classified and include information related to CSIS’s compliance with the law and applicable ministerial directions, and the reasonableness and necessity of CSIS exercising its powers.

In 2023, NSIRA completed one dedicated review of CSIS and its annual review of CSIS activities, both summarized below. Furthermore, CSIS is involved in other NSIRA multi-departmental reviews, such as the agency’s review of the operational collaboration between CSE and CSIS, and the legally mandated annual reviews of the Security of Canada Information Disclosure Act (SCIDA) and the Avoiding Complicity in Mistreatment by Foreign Entities Act, the results of which are described in section 4.5, Multi-departmental reviews.

Review of CSIS Dataset Regime

In July 2019, the dataset regime came into force as part of the National Security Act 2017 (NSA 2017), creating sections 11.01–11.25 of the CSIS Act.The regime enables CSIS to collect and retain datasets containing personal information that are not directly and immediately related to threats, but likely to assist in national security investigations.

NSIRA examined the implementation of the regime, including aspects of governance, information management, retention practices, and training. The agency found compliance issues that permeated all aspects of the regime under review. Of concern, NSIRA found that CSIS’s current application of the dataset regime is inconsistent with the statutory framework. NSIRA also found multiple compliance issues with how CSIS has implemented the regime, including the retention of Canadian and foreign information without the requisite legally mandated authorizations and approvals.

The review concluded that CSIS has failed to adequately operationalize its dataset regime. CSIS did not seek to clarify legal ambiguities of the application of the regime before the Federal Court, despite having had the opportunity to do so. CSIS adopted multiple positions on its application and now risks limiting what is intended to be a collection and retention regime to a retention mechanism. Internally, CSIS has not provided sufficient resources and training to ensure compliance with the regime. Absent an internal commitment to adequately operationalize, resource, and support the implementation of a new legal regime, any such regime will fail no matter how fit for purpose it is believed to be.

Annual review of Canadian Security Intelligence Service activities

NSIRA completed its annual review of CSIS activities, which covers a range of activities contemplated and undertaken between January 1 and December 31, 2023. The review highlighted compliance-related challenges faced by CSIS, allowed NSIRA to continue monitoring ongoing trends, and identified emerging issues in CSIS’s exercise of its powers. Information obtained throughout the review, including that which CSIS is required to provide to NSIRA under the CSIS Act, was used in NSIRA’s Annual Report to the Minister of Public Safety on CSIS activities, as well as to inform ongoing NSIRA reviews and internal review planning for upcoming reviews.

Statistics and data

To achieve greater public accountability, NSIRA has requested that CSIS publish statistics and data about public interest and compliance-related aspects of its activities. NSIRA is of the opinion that the following statistics will provide the public with information related to the scope and breadth of CSIS operations, as well as display the evolution of activities from year to year.

Warrant applications

Section 21 of the CSIS Act authorizes CSIS to apply to a judge for a warrant if it believes, on reasonable grounds, that more intrusive powers are required to investigate a particular threat to the security of Canada. Warrants may be used by CSIS, for example, to intercept communications, enter a location, or obtain information, records, or documents. Each individual warrant application could include multiple individuals or request the use of multiple intrusive powers.

Table 2: Section 21 warrant applications made by the Canadian Security Intelligence Service, 2018–2023
Applications 2018 2019 2020 2021 2022* 2023
Total section 21 applications 24 24 15 31 28 30
Total approved warrants 24 23 15 31 28 30
New warrants 10 9 2 13 6 9
Replacements 11 12 8 14 14 10
Supplemental 3 2 5 4 8 11
Total denied warrants 0 1 0 0 0 0
*The applications submitted by CSIS to the Federal Court in 2022 resulted in the approval and issuance of 194 judicial authorities, including 164 warrants and 28 assistance orders issued pursuant to sections 12, 16, and 21 of the CSIS Act, as well as two judicial authorizations issued pursuant to section 11.13 of the Act. Each application is subject to a thorough production and vetting process that includes review by an independent Department of Justice counsel and challenge by a committee composed of executives of CSIS, PS, CSE, and the RCMP (as applicable) before seeking ministerial approval. A number of warrants issued during this period reflected the development of innovative new authorities and collection techniques, which required close collaboration between collectors, technology operators, policy analysts, and legal counsel.
Threat reduction measures

CSIS is authorized to seek a judicial warrant for a threat reduction measure (TRM) if it believes that certain intrusive measures, outlined in section 21 (1.1) of the CSIS Act, are required to reduce a threat. The CSIS Act is clear that when a proposed TRM would limit a right or freedom protected by the Canadian Charter of Rights and Freedoms or would otherwise be contrary to Canadian law, a judicial warrant authorizing the measure is required. To date, CSIS has sought no judicial authorizations to undertake warranted TRMs. TRMs approved in one year may be executed in future years. Operational reasons may also prevent an approved TRM from being executed.

Table 3: Total number of approved and executed threat reduction measures, 2015–2023
Threat reduction measures 2015 2016 2017 2018 2019 2020 2021 2022 2023
Approved 10 8 15 23 24 11 23 16 14
Executed 10 8 13 17 19 8 17 12 19
Warranted 0 0 0 0 0 0 0 0 0
Canadian Security Intelligence Service targets

CSIS is mandated to investigate threats to the security of Canada, including espionage; foreign- influenced activities; political, religious, or ideologically motivated violence; and subversion. Section 12 of the CSIS Act sets out criteria for permitting the Service to investigate an individual, group, or entity for matters related to these threats. Subjects of a CSIS investigation, whether they be individuals or groups, are called “targets.”

Table 4: Number of Canadian Security Intelligence Service targets, 2018–2023
Targets 2018 2019 2020 2021 2022 2023
Number of targets 430 467 360 352 340 323
Datasets

Data analytics is an investigative tool for CSIS, through which it seeks to make connections and identify trends that may not be visible using traditional methods of investigation. NSA 2017 gave CSIS new powers, including a legal framework for the Service to collect, retain, and use datasets. The framework authorizes CSIS to collect datasets (divided into publicly available, Canadian, and foreign datasets) that may have the ability to assist it in the performance of its duties and functions. It also establishes safeguards for the protection of Canadian rights and freedoms, including privacy rights. These protections include enhanced requirements for ministerial accountability. Depending on the type of dataset, CSIS must meet different requirements before it is able to use a dataset.

The CSIS Act also requires that NSIRA be kept apprised of certain dataset-related activities. Reports prepared following the handling of datasets are to be provided to NSIRA under certain conditions and within reasonable timeframes. While CSIS is not required to advise NSIRA of judicial authorizations or ministerial approvals for the collection of Canadian and foreign datasets, CSIS has been proactively keeping NSIRA apprised of these activities.

Table 5: Evaluation and retention of publicly available, Canadian, and foreign datasets by the Canadian Security Intelligence Service, 2019–2023
Type of dataset 2019 2020 2021 2022 2023
Publicly available datasets
Evaluated 9 6 4 4 2
Retained 9 6 2 4 2
Canadian datasets
Evaluated 0 0 2 0 1
Retained (approved by the Federal Court) 0 0 0 2 0
Denied by the Federal Court 0 0 0 0 0
Foreign datasets
Evaluated 10 0 0 1 2
Retained (approved by the Minister of Public Safety and Intelligence Commissioner) 0 1 1 1 3
Denied by the Minister 0 0 0 0 0
Denied by the Intelligence Commissioner 0 0 0 0 0
Justification Framework

CSIS’s Justification Framework establishes a limited justification for its employees, and persons acting at their direction, to carry out activities that would otherwise constitute offences under Canadian law. CSIS’s framework is modelled on those already in place for Canadian law enforcement. It provides needed clarity to CSIS, and to Canadians, about what CSIS may lawfully do in the course of its activities. The framework recognizes that it is in the public interest to ensure that CSIS employees can effectively carry out intelligence collection duties and functions, including by engaging in otherwise unlawful acts or omissions, in the public interest and in accordance with the rule of law. The types of otherwise unlawful acts and omissions that are authorized by the Justification Framework are determined by the Minister of Public Safety and approved by the Intelligence Commissioner. There remain limitations on what activities can be undertaken, and nothing in the framework permits the commission of an act or omission that would infringe on a right or freedom guaranteed by the Charter.

According to section 20.1 of the CSIS Act, employees must be designated by the Minister of Public Safety and Emergency Preparedness to be covered under the Justification Framework while committing or directing an otherwise unlawful act or omission. Designated employees are CSIS employees who require the Justification Framework as part of their duties and functions. Designated employees are justified in committing an act or omission themselves (commissions by employees) and they may direct another person to commit an act or omission (directions to commit) as a part of their duties and functions.

Table 6: Authorizations, commissions, and directions under CSIS’ Justification Framework, 2019–2023
2019 2020 2021 2022 2023
Authorizations 49 147 178 172 172
Commissions by employees 1 39 51 61 47
Directions to commit 15 84 116 131 116
Emergency designations 0 0 0 0 0
Compliance

CSIS’s operational compliance program unit leads and manages overall compliance within the Service. The objective of this unit is to promote a culture of compliance within CSIS by leading an approach for reporting and assessing potential non-compliance incidents that provides timely advice and guidance related to internal policies and procedures for employees. This program is the centre for processing all instances of potential non-compliance related to operational activities.

NSIRA will continue to monitor closely the instances of non-compliance that relate to Canadian law and the Charter, and work with CSIS to improve transparency around these activities.

Table 7: Total number of non-compliance incidents processed by CSIS, 2019–2023
Incidents 2019 2020 2021 2022 2023
Processed compliance incidents 53 99 85 59 79
Administrative 53 64 42 48
Operational 40a 19b 21 17 31
Canadian law N/A N/A 1 2 4
Charter N/A N/A 6 5 15
Warrant conditions N/A N/A 6 3 11
CSIS governance N/A N/A 8 15 27
a For 2021, each operational non-compliance incident was reported based on the highest non-compliance (i.e., if the incident were non-compliant with the Charter and CSIS governance, it would be counted only under the Charter category). For 2022 and 2023, each incident is counted in all of the areas in which it was non-compliant. As such, the sum of operational non-compliance in the various categories exceeds the total number of such incidents.
b The total number of incidents of non-compliance were not further broken down in 2019 and 2020. This number represents the number of incidents of non-compliance with requirements such as the CSIS Act, the Charter, warrant terms and conditions, or CSIS internal policies or procedures.

Communications Security Establishment reviews

Overview

NSIRA has the mandate to review any activity conducted by the Communications Security Establishment (CSE). NSIRA must submit an annual report to the Minister of National Defence on CSE activities, including information related to CSE’s compliance with the law and applicable ministerial directions, and NSIRA’s assessment of the reasonableness and necessity of CSE exercising its powers.

In 2023, NSIRA completed two dedicated reviews of CSE and commenced an annual review of CSE activities, summarized below. Furthermore, CSE is included in other NSIRA multi-departmental reviews, such as the review of the operational collaboration between CSE and CSIS and the legally mandated annual reviews of the Security of Canada Information Disclosure Act (SCIDA) and the Avoiding Complicity in Mistreatment by Foreign Entities Act (see section 4.5).

Review of CSE’s Use of the Polygraph for Security Screening

NSIRA’s review of CSE’s use of the polygraph for security screening found that the policies and procedures in place at CSE inadequately addressed privacy issues. In particular, CSE’s use of personal information collected during polygraph exams for staffing purposes may have exceeded the consent provided and may not have complied with section 7 of the Privacy Act.

NSIRA also found issues with the way in which CSE operated its polygraph program, including unnecessarily repetitive and aggressive questioning by examiners, insufficient quality control of exams, and retention issues related to audiovisual recordings. Additionally, the way in which CSE used the results of polygraph exams to inform security screening decision-making could cause uncertainty over the opportunity to challenge denials of security clearances pursuant to the NSIRA Act. CSE generally over-relied on the results of polygraph exams for deciding security screening cases. When taken as a whole, CSE’s use of the polygraph for security screening raised serious concerns related to the Charter.

NSIRA also explored the role of the Treasury Board of Canada Secretariat (TBS) in establishing the Standard on Security Screening (the Standard), which governs the use of the polygraph for security screening by the Government of Canada. NSIRA found that TBS did not adequately consider the privacy or Charter implications of the use of the polygraph. TBS also did not implement sufficient safeguards in the Standard to address these implications.

As a result, NSIRA recommended that CSE and TBS both urgently address the fundamental issues related to the legality, reasonableness, and necessity of the use of the polygraph for security screening. If these issues cannot be addressed, NSIRA recommended that TBS remove the polygraph from the Standard and CSE should cease using it for security screening.

Since the CSE Act came into force in 2019, CSE’s cybersecurity and information assurance (CSIA) activities have grown in extent and importance. CSE acquires and analyzes vast amounts of information to identify and prevent cybersecurity threats, a necessary activity that nonetheless engages important privacy interests, a balance NSIRA sought to understand.

This was NSIRA’s first review of CSE’s CSIA activities, along with its first review of Shared Services Canada (SSC). The two departments work together on CSIA activities, as SSC is the system owner for most Government of Canada networks.

NSIRA found that CSE operates a comprehensive and integrated ecosystem of cybersecurity systems, tools, and capabilities to protect against cyber threats, with a design that incorporates measures meant to protect the privacy of Canadians and persons in Canada.

NSIRA made findings and recommendations in two areas of concern:

  • CSE’s communications to the Minister of National Defence about its CSIA program did not fully reflect its activities in practice. NSIRA made recommendations to CSE to improve its transparency in this regard.
  • CSE acquired information from sources that, in limited cases, may engage Canadian privacy interests. While this information has clear cybersecurity value, it was not acquired within the scheme of ministerial authorizations, due in part to an incongruence between subsections of the CSE Act. NSIRA recommended various actions to address this acquisition.

NSIRA built foundational knowledge about CSE’s CSIA activities through this review, which will inform NSIRA’s future activities.

Annual review of Communications Security Establishment activities

NSIRA conducted the second annual review of CSE activities. The 2023 review aimed to identify compliance-related challenges, general trends, and emerging issues based on information CSE is required by law to provide to NSIRA, as well as supplementary information. Primarily resulting in NSIRA’s Annual Report to the Minister of National Defence on CSE activities, the review also identified areas for future reviews of CSE activities and bolstered NSIRA’s knowledge of CSE activities.

Statistics and data

To achieve greater accountability and transparency, NSIRA has requested statistics and data from CSE about public interest and compliance-related aspects of its activities. NSIRA is of the opinion that these statistics will provide the public with important information related to the scope and breadth of CSE operations, as well as display the evolution of activities from year to year.

Ministerial authorizations and ministerial orders

Ministerial authorizations are issued to CSE by the Minister of National Defence. The authorizations support specific foreign intelligence, cybersecurity activities, defensive cyber operations, or active cyber operations conducted by CSE pursuant to those aspects of its mandate. Authorizations are issued when these activities could otherwise contravene an Act of Parliament or interfere with a reasonable expectation of privacy of a Canadian or a person in Canada.

Table 8: Ministerial authorizations issued, 2019–2023
Type of ministerial authorization Enabling section of the CSE Act Issued in 2019 Issued in 2020 Issued in 2021 Issued in 2022 Issued in 2023
Foreign intelligence 26(1) 3 3 3 3 3
Cybersecurity (federal and non-federal) 27(1) and 27(2) 2 1 2 3 3
Defensive cyber operations 29(1) 1 1 1 1 1
Active cyber operations 30(1) 1 1 2 3 3

Ministerial orders are issued by the Minister for the purpose of (1) designating any electronic information, any information infrastructures, or any class of electronic information or information infrastructures as electronic information or information infrastructures of importance to the Government of Canada (section 21[1] of the CSE Act); or (2) designating recipients of information related to Canadians or persons in Canada – that is, Canadian-identifying information (sections 45 and 44[1] of the CSE Act).

Table 9: Ministerial orders in effect as of 2023
Name of ministerial order Enabling section of the CSE Act
Designating Recipients of Canadian Identifying Information Used, Analyzed or Retained Under a Foreign Intelligence Authorization 43
Designating Recipients of Information Relating to a Canadian or Person in Canada Acquired, Used or Analyzed Under the Cybersecurity and Information Assurance Aspects of the CSE Mandate 44
Designating Electronic Information and Information Infrastructures of Importance to the Government of Canada 21
Designating Electronic Information and Information Infrastructures of Ukraine as of Importance to the Government of Canada 21
Designating Electronic Information and Information Infrastructures of Latvia as of Importance to the Government of Canada 21
Foreign intelligence reporting

Under section 16 of the CSE Act, CSE is mandated to acquire information from or through the global information infrastructure. The CSE Act defines the global information infrastructure as including electromagnetic emissions; any equipment producing such emissions; communications systems; information technology systems and networks; and any data or technical information carried on, contained in, or relating to those emissions, that equipment, those systems, or those networks. CSE uses, analyzes, and disseminates the information for providing foreign intelligence in accordance with the Government of Canada’s intelligence priorities.

Table 10: Number of foreign intelligence reports issued, 2019–2023
CSE foreign intelligence reporting 2020 (#) 2021 (#) 2022 (#) 2023 (#)
Reports released Not available 3,050 3,185 3,184
Departments and agencies >25 28 26 28
Specific clients within departments and agencies >2,100 1,627 1,761 2,049
Information relating to a Canadian or a person in Canada

Information relating to a Canadian or a person in Canada (IRTC) is information about Canadians or persons in Canada that may be incidentally collected by CSE while conducting foreign intelligence or cybersecurity activities under the authority of a ministerial authorization. Incidental collection refers to information acquired that CSE was not deliberately seeking and where the activity that enabled its acquisition was not directed at a Canadian or a person in Canada. According to CSE policy, IRTC is defined as any information recognized as having reference to a Canadian or person in Canada, regardless of whether that information could be used to identify that Canadian or person in Canada.

CSE was asked to release statistics or data about the regularity with which IRTC is included in CSE’s end-product reporting. CSE responded that this information “remains classified and cannot be published.”

Canadian-identifying information

CSE is prohibited from directing its activities at Canadians or persons in Canada. However, its collection methodologies sometimes result in incidentally acquiring such information. When such incidentally collected information is used in CSE’s foreign intelligence reporting, any part that potentially identifies a Canadian or a person in Canada is suppressed to protect the privacy of the individual(s) in question. CSE may release unsuppressed Canadian-identifying information (CII) to designated recipients when the recipients have the legal authority and operational justification to receive it, and when it is essential to international affairs, defence, or security (including cyber security).

Table 11: Number of requests for disclosure of Canadian-identifying information, 2021–2023
Type of request 2021 (#) 2022 (#) 2023 (#)
Government of Canada requests 741 657 1,087
Five Eyes requests 90 62 142
Non-Five Eyes requests 0 0 0
Total 831 719 1,229

In 2023, of the 1,229 requests received, CSE reported having denied 281 requests. By the end of the calendar year, 40 were still being processed.

CSE was asked to release the number of instances where CII is suppressed in CSE foreign intelligence or cyber security reporting. It indicated that this information “remains classified and cannot be published.”

Privacy incidents and procedural errors

A privacy incident occurs when the privacy of a Canadian or a person in Canada is put at risk in a manner that runs counter to, or is not provided for, in CSE’s policies. CSE tracks such incidents through its Privacy Incidents File, and for privacy incidents that are attributable to a second-party partner or a domestic partner, through its Second-Party Privacy Incidents File.

Table 12: Number of privacy incidents recorded by CSE, 2021–2023

Table 12: Number of privacy incidents recorded by CSE, 2021–2023
Type of incident 2021 (#) 2022 (#) 2023 (#)
Privacy incidents 96 114 107
Second-party privacy incidents 33 23 37
Non-privacy compliance incidents Not available Not available 28

Table 13: Number of privacy incidents that occurred under the foreign intelligence aspect of CSE’s mandate and recorded in 2023

Table 13: Number of privacy incidents that occurred under the foreign intelligence aspect of CSE’s mandate and recorded in 2023
Type of incident 2023 (#)
Privacy incidents 70
Second-party privacy incidents 37
Non-privacy compliance incidents 16

Table 14: Number of privacy incidents that occurred under the cybersecurity and information assurance aspect of CSE’s mandate and recorded in 2023

Table 14: Number of privacy incidents that occurred under the cybersecurity and information assurance aspect of CSE’s mandate and recorded in 2023
Type of incident 2023 (#)
Privacy incidents 37
Non-privacy compliance incidents 12
Cyber security and information assurance

Under section 17 of the CSE Act, CSE is mandated to provide advice, guidance, and services to help protect electronic information and information infrastructures of federal institutions, as well as those of non-federal entities that are designated by the Minister of National Defence as being of importance to the Government of Canada.

The Canadian Centre for Cyber Security (Cyber Centre) is Canada’s unified authority on cybersecurity. The Cyber Centre, which is a part of CSE, provides expert guidance, services, and education while working in collaboration with stakeholders in the private and public sectors. The Cyber Centre handles incidents in government and designated institutions that include:

  • reconnaissance activity by sophisticated threat actors;
  • phishing incidents (email containing malware);
  • unauthorized access to corporate IT environments;
  • imminent ransomware attacks; and
  • zero-day exploits, which involve exploration of critical vulnerabilities in unpatched software.
Table 15: Number of cyber incident cases opened by CSE, 2022 and 2023
Type of cyber incident 2022 2023
Federal institutions 1,070 977
Critical infrastructure 1,575 1,756
International Not available 82
Total 2,645 2,815
Defensive and active cyber operations

Under section 18 of the CSE Act, CSE is mandated to conduct defensive cyber operations (DCO) to help protect electronic information and information infrastructures of federal institutions, as well as those of non-federal entities that are designated by the Minister as being of importance to the Government of Canada, from hostile cyber attacks.

Under section 19 of the CSE Act, CSE is mandated to conduct active cyber operations (ACO) against foreign individuals, states, organizations, or terrorist groups as they relate to international affairs, defence, or security.

CSE was asked to release the number of DCOs and ACOs approved, and the number carried out in 2023. CSE responded that this information “remains classified and cannot be published.”

Technical and operational assistance

As part of the assistance aspect of CSE’s mandate, CSE receives requests for assistance from Canadian law enforcement and security agencies, as well as from the Department of National Defence and the Canadian Forces (DND/CAF).

Table 16: Number of requests for assistance received and actioned by CSE, 2020–2023
Action 2020 2021 2022 2023
Approved 23 32 59 48
Not approved 1 3 0 0
Under review Not available Not available 0 2
Cancelled Not available Not available 1 0
Denied Not available Not available 2 1
Total received 24 35 62 53
Note: For 2020 and 2021, CSE was able to provide only the number of requests received and actioned. CSE advised, however, that it has since improved its internal tracking system for requests for assistance.

Other department reviews

Overview

In addition to the CSIS and CSE reviews above, NSIRA completed the following reviews of departments and agencies in 2023:

  • a review of the Canada Border Services Agency (CBSA);
  • a review of the Department of National Defence (DND) and the Canadian Armed Forces (CAF); and
  • NSIRA’s annual reviews of both the Security of Canada Information Disclosure Act and the Avoiding Complicity in Mistreatment by Foreign Entities Act, both of which involve a broader set of departments and agencies that make up the Canadian national security and intelligence community.

Canada Border Services Agency

Review of the CBSA’s Confidential Human Source Program

This review examined the legal and policy frameworks governing CBSA’s Confidential Human Source (CHS) program. The review had three areas of focus: the management and assessment of risk; CBSA’s discharge of its duty of care to its sources; and the sufficiency of ministerial direction and accountability in relation to the program. Together, these areas support CBSA’s ability to conduct its human source-handling activities lawfully, ethically, and with appropriate accountability.

The review reflects that, as an investigative tool used in support of CBSA’s mandate, the CHS Program rests on an adequate legal framework. However, the review found a number of gaps in the framework governing the program and was especially attentive to how CBSA manages the particular risks associated with the use of human sources without status in Canada. The review contains a number of findings that relate to CBSA’s risk management practices.

In two instances, NSRIA’s review concluded that CBSA’s activities may not be in compliance with the law. In the first, the review concluded through a detailed case study that CBSA may have twice breached the law of informer privilege by improperly disclosing information that might identify the human source. In this and another instance, NSIRA found that CBSA failed to inform the Minister of Public Safety of a human source activity that may have impacted the safety of an individual, as required by the Ministerial Direction on Surveillance and Confidential Human Sources. This constitutes non-compliance with subsection 12(2) of the CBSA Act.

NSIRA made six recommendations in this review. Collectively, they are meant to enhance the governance of the human source program to ensure CBSA is attentive to the welfare of its human sources across the full spectrum of activities. They also reflect NSIRA’s ongoing attention to the principle of ministerial accountability. Overall, NSIRA’s findings and recommendations reflect the level of maturity of CBSA’s program; although it has been operating for almost 40 years, the introduction of the policy suite specific to human sources is a relatively recent innovation. The review also reflects CBSA’s recent efforts to improve its program.

Department of National Defence and the Canadian Armed Forces

Review of DND/CAF’s Human Source Handling Program

This review examined whether DND/CAF conducts its human source-handling activities lawfully, ethically, and with appropriate accountability.

NSIRA found that DND/CAF’s policy framework allows human source-handling activities that may not be in compliance with the law. These risks arise particularly in relation to sources associated with terrorist groups. NSIRA recommended that Parliament enact a justification framework that would authorize DND/CAF and its sources to commit otherwise unlawful acts outside Canada, where reasonable for the collection of defence intelligence.

NSIRA found that DND/CAF’s risk assessment frameworks do not provide commanders with the accurate, consistent, and objective information they need to evaluate the risks of engaging with particular sources. NSIRA recommended that these frameworks be revised to ensure that all applicable risk factors are considered.

NSIRA found gaps in DND/CAF’s discharge of its duty of care to sources. Safeguarding processes were not always appropriately engaged; the complaints process was underdeveloped; and the risk posed to agents was, at times, insufficiently assessed. Measures to address these issues should be clearly operationalized in governance documents.

NSIRA found that the Minister of National Defence is not sufficiently informed on human source-handling operations to fulfill their ministerial accountabilities. The Minister should be aware of the legal, policy, and governance issues that may affect human source-handling operations.

NSIRA also found that further ministerial direction is required to support the governance of DND/CAF’s human source handling program. NSIRA recommended that the Minister issue ministerial direction to DND/CAF that will guide the lawful and ethical conduct of source-handling operations.

Multi-departmental reviews

Review of Operational Collaboration between CSE and CSIS

CSE and CSIS are two core pillars of Canadian intelligence collection, which means that effective collaboration between the departments is critical to national security. However, a tension exists between CSIS’s mandate, which authorizes collection and sharing of information about Canadians, and CSE’s core prohibition against directing its activities at Canadians. This is the first review that was able to access information from both departments and consider that tension.

NSIRA examined a sample of CSE and CSIS collaborative operational activities and information sharing, as well as collaboration between CSIS and CSE further to CSIS’s threat reduction measure (TRM) mandate. This satisfied NSIRA’s annual requirement under section 8(2) of the NSIRA Act to review an aspect of CSIS’s TRMs.

With respect to operational collaboration, including under CSIS’s TRM mandate, NSIRA found a lack of information sharing and proactive planning, as well as a failure on CSE’s part to properly account for and mitigate the risk of targeting Canadians when working with CSIS. NSIRA recommended some procedural changes to improve information flow, consultation, transparency, and accountability.

Concerning information sharing, NSIRA found that existing processes between the departments lacked guidance and accountability, and created risks of CSE targeting Canadians that were actualized in some instances. NSIRA recommended both departments establish policies, procedures, and analyst training. Additionally, NSIRA recommended that CSIS cease making requests to CSE pertaining to Canadians and consider the Canadian information it shares with CSE. NSIRA also recommended that CSE reconsider how it collects, retains, and reports Canadian information in certain scenarios and only use foreign lead information from CSIS reporting.

In this review, NSIRA found two cases of non-compliance with the law. Both involved CSE directing its activities at Canadians under its foreign intelligence mandate.

Review of federal institutions’ disclosures of information under the Security of Canada Information Disclosure Act in 2022

This review provided an overview of the use of the Security of Canada Information Disclosure Act (SCIDA) in 2022. In doing so, it documented the volume and nature of information disclosures made under the SCIDA, assesses compliance with the Act, and highlights patterns in its use across Government of Canada institutions and over time.

In 2022, four disclosing institutions made a total of 173 disclosures to five recipient institutions. NSIRA found that institutions complied with the SCIDA’s requirements for disclosure and record keeping in relation to the majority of these disclosures. Observed instances of non-compliance that were related to subsection 9(3), regarding the timeliness of records copied to NSIRA; subsection 5.1(1), regarding the timeliness of destruction or return of personal information; and subsection 5(2), regarding the provision of a statement on accuracy and reliability. These instances did not point to any systemic failures in Government of Canada institutions’ implementation of the Act.

NSIRA also made findings in relation to practices that, although compliant with the SCIDA, left room for improvement. NSIRA’s corresponding recommendations were designed to increase standardization across the Government of Canada in a manner that is consistent with the institutions’ demonstrated best practices and the Act’s guiding principles.

Overall, NSIRA observed improvements in reviewee performance compared to findings from prior years’ reports and over the course of the review. These improvements include corrective actions taken by reviewees in response to NSIRA’s requests for information in support of this review.

Review of departmental implementation of the Avoiding Complicity in Mistreatment by Foreign Entities Act for 2022

This review assessed departments’ compliance with the Avoiding Complicity in Mistreatment by Foreign Entities Act (ACA) and their implementation of the ACA’s associated directions during the 2022 calendar year. Within this context, the review pursued a thematic focus on departments’ conduct of risk assessments, including the ways in which their methodologies may lead to a systematic under-assessment of the level of risk involved in an information-sharing transaction.

NSIRA’s findings and recommendations in this report reflect both developments and stagnations in departments’ implementation of the directions over time. NSIRA observed efforts to collaborate interdepartmentally and standardize certain practices across the Government of Canada. While these efforts reflect an improvement over past approaches, they fall short of the consistent framework for foreign information sharing government-wide envisioned by the Act. Additionally, NSIRA observed a number of practices that may lead departments to systematically under-assess the risks involved in contemplated information exchanges. Such under-assessments may in turn lead to information being exchanged, in contravention of the directions’ prohibitions.

NSIRA made five recommendations in this review. Collectively, they would ensure that all departments’ ACA frameworks reflect a degree of standardization commensurate with the spirit of the Act and its associated directions; and that these frameworks are designed to support compliance with the directions.

Complaint investigations

Overview

NSIRA is mandated to investigate national security-related public complaints. NSIRA complaint investigations are conducted with consistency, fairness, and timeliness. The agency’s public complaint mandate plays a critical role in ensuring that Canada’s national security and intelligence organizations are accountable to the Canadian public.

In 2022, NSIRA had committed to establishing service standards for the investigation of complaints, with the goal of completing 90 percent of investigations within its new service standards. These service standards were implemented and have been in effect since April 1, 2023, and set internal time limits for certain investigative steps for each type of complaint, under normal circumstances. NSIRA is pleased to report that for the period of April 1 to December 31, 2023, 100 percent of the service standards have been met across all investigation files subject to these service standards.

While remaining mindful of the interests of the complainant and the security imperatives of the organization, NSIRA established an independent verification process with CSE for new complaints filed under section 17 of the NSIRA Act. More specifically, after receiving a complaint, NSIRA must evaluate whether it is within NSIRA’s jurisdiction to investigate, based on conditions stated in the NSIRA Act. For complaints against CSE, just as with complaints against CSIS and the RCMP, NSIRA must be satisfied that the complaint against the respondent organization refers to an activity carried out by the organization and is not trivial, frivolous, or vexatious. This new independent verification process assists NSIRA in ascertaining its jurisdiction to investigate complaints filed against CSE.

NSIRA has developed a new internal tracking tool to ensure effective case management of complaint files.

NSIRA previously reported that it would improve its website to promote accessibility to the investigation of complaints. During the overhaul of its public-facing website in the fall of 2023, NSIRA amended its complaint forms to ensure that they meet WCAG 2.0 accessibility criteria and conformity requirements.

In 2023, NSIRA completed the last phase of a study jointly commissioned with the Civilian Review and Complaints Commission (CRCC) regarding the collection of race-based data and other demographic information. The study assessed the viability of the collection of identity-based and demographic data as part of the Government of Canada’s ongoing anti-racism initiatives.

In the course of this study, interviews were conducted with community members familiar with NSIRA, the CRCC, and the agencies they review. The study ultimately found that the collection of raced-based data was feasible.

The study also included recommendations in relation to the collection of race-based data as follows:

  • collection of race data from complainants and how to collect such data;
  • collection of other biographical data from complainants;
  • collection of race data about the staff police and intelligence organizations;
  • analysis of the collected data;
  • provision of the collected data to interested stakeholders, the general public, or both;
  • development of an advanced data analysis plan.

NSIRA welcomes the insights provided by the joint study and will closely review the recommendations to determine how they might be implemented by NSIRA. The collection of race-based and other demographic data in the national security and intelligence space is an entirely novel area. The study’s literature review highlighted that this type of race-based and other demographic data collection has never been done before in the national security and intelligence space in Canada, or by any of Canada’s international partners. NSIRA and the CRCC will continue to collaborate on this important initiative by determining potential implementation strategies.

Ongoing initiatives

In 2023, NSIRA began revising its Rules of Procedure to refine the procedures governing its complaints investigations. This revision will continue in 2024 with the support of the Secretariat in ensuring that the agency’s obligations provided for in its Accessibility Plan are met.

Part of the revisions to NSIRA’s procedures in 2024 will be to review the privacy statement included in its complaint forms to ensure greater transparency about how the information submitted to NSIRA by complainants will be used in NSIRA’s investigations.

Investigation summaries

Final reports issued

Investigation concerning allegations against CSIS (NSIRA File 07-403-45)

The complainant alleged that CSIS agents interacted with them on multiple occasions and claimed that those interactions amounted to illegal arrests and detentions; that the agents illegally intimidated them by claiming that they would deport them to Guantanamo Bay; and that the Service erroneously applied the Privacy Act in refusing to provide documents the complainant claims they were coerced into signing under duress during one of the above-noted interactions.

Upon reviewing all of the evidence presented by the parties and available information, NSIRA observed that the complainant never had any interactions with CSIS. NSIRA found that none of their allegations could be substantiated.

Allegations against CSIS for travel difficulties, harassment, and discrimination (NSIRA File 07-403-23)

The complainant alleged that, following an overseas trip, they experienced difficulties travelling internationally, which they believed were attributable to CSIS and CSIS’ sharing of information with the governments of foreign countries. The complainant claimed that CSIS had placed them on a “blacklist” as a member of the Islamic State of Iraq and Syria. They further alleged that CSIS harassed them and discriminated against them on the basis of race, ethnic origin, and religion.

At the time of the complainant’s trip, certain countries were regularly being used by extremist travellers from North America and Europe as intermediate destinations to access Islamic State of Iraq and the Levant-controlled territory.

The complainant’s family was interviewed by CSIS to gain information about the complainant, their beliefs, and possible intentions. The complainant considered this interaction to have been an inappropriate and wrongful interrogation of members of their family.

Upon review of all of the evidence, NSIRA found the activities of CSIS in this matter to have been lawful and reasonable. While investigative steps were conducted by CSIS, there was no evidence suggesting that CSIS placed the complainant on a blacklist or that information pertaining to the complainant was shared improperly. Similarly, the allegation that CSIS was responsible for the complainant’s travel difficulties was found to be unsubstantiated. The source of the complainant’s travel difficulties may lie outside of Canadian authorities, and thus beyond the scope of NSIRA’s jurisdiction.

NSIRA concluded that CSIS conducted an interview with the complainant’s parent at their home and with other family members present, during which their parent participated voluntarily and expressed their willingness to be of further assistance if required. The basis for conducting this interview was found to be reasonable and NSIRA did not find any evidence of inappropriateness, intimidation, wrongdoing, or harassment.

NSIRA did not find an evidentiary basis to support the allegations of harassment and of discrimination on the basis of racial, ethnic origins, or religion by CSIS against the complainant.

The complainant’s allegations were found to be unsupported.

Allegations against CSIS regarding criminal activity conducted by a CSIS Agent (NSIRA File 07-403-39)

The complainant alleged that a CSIS agent invaded their house and stated that they were an intelligence officer in operation. According to the complainant, the CSIS agent physically assaulted them, video recorded the complainant while the complainant was undressed, and threatened to kill them. The complainant further alleged that the Service is trying to silence them.

Upon a review of all of the evidence, it became clear that the complainant’s own conduct brought them to the attention of CSIS. They first communicated with CSIS and raised complaints regarding an individual. These allegations were received and considered by CSIS, which acted on the complaints to determine whether the individual named by the complainant was affiliated with CSIS. Based on a review of the documents submitted by CSIS, NSIRA determined that the individual alleged by the complainant to be a CSIS Agent was not a CSIS employee or otherwise involved with CSIS.

NSIRA further found that as part of the Service’s activities conducted in relation to the complainant, CSIS collected limited information on the complainant. NSIRA concluded that the collection of the complainant’s personal information was justified by CSIS’ mandate.

NSIRA concluded that the CSIS’ activities in relation to the complainant after they came to their attention were lawful and reasonable in the circumstances.

Allegations against CSIS regarding a citizenship security screening interview (NSIRA File 07-403-65)

The complainant had applied for Canadian citizenship and was subsequently required to attend an interview with CSIS. The complainant attended this interview with their lawyer. The complainant alleged that the CSIS officers who conducted the interview:

  • denied them and their lawyer the right to record and take notes of the interview;
  • violated past SIRC recommendations by not recording the interview themselves;
  • interacted with the complainant’s lawyer in an intimidating manner, and did not allow the lawyer to interject or to interrupt;
  • did not provide an adequate translation service; and
  • lacked cultural sensitivity during the interview, used inappropriate interview tactics, chose discussion points that created unnecessary tension, and behaved improperly.

Upon considering all of the evidence, NSIRA found that the CSIS officers erred in denying the complainant and their counsel the opportunity to take notes that they could take from the premises. CSIS acknowledged that this practice was no longer in place. NSIRA recommended that CSIS adjust its governing policy to make clear that the interviewee and their representative may take and retain notes from interviews.

NSIRA commented that since 2000, numerous SIRC reports and decisions have recommended that CSIS record immigration security screening interviews. However, CSIS did not consistently record such interviews at the time of the complainant’s interview. CSIS indicated that efforts to require recording of all immigration interviews in its written procedures was in progress. NSIRA recommended that CSIS proactively record interviews in immigration and citizenship matters, and that CSIS retain this recording at least until a decision is made by Immigration, Refugees and Citizenship Canada (IRCC) on CSIS’ advice. In the event that CSIS provides a negative conclusion, the recording should be kept until the immigration status is determined and for the period of any appeal of that determination.

Given that the complainant was unable to retain notes from the interview and that no recording of the interview existed, NSIRA was unable to make findings on most of the improper statements that the CSIS interviewer was alleged to have made. However, one statement in particular, which was an English idiom that the CSIS officer acknowledged using, was found to be unnecessary and counterproductive, as it risked compounding tension in the interview and may not have had a reasonable, literal translation in the language spoken by the complainant.

CSIS indicated and NSIRA agreed that counsel to an interviewee has a role in, but not control of, the interview process. An interview subject’s lawyer is not limited to passive silence, but also must not act in a manner that impairs the Service’s ability to perform its mandate. To this end, it is not open to counsel to lead witnesses or have an intrusive role in questioning. NSIRA noted, however, that it is proper for counsel to raise concerns about interpretation or to suggest clarifying questions. These concerns are to be posed during a pause or in some other pre-organized manner that does not disrupt the questioning. NSIRA recommended, therefore, that CSIS articulate within its own operating procedure the role of counsel (or other third parties) in the manner elaborated above, and that it communicates these expectations in advance to those attending an interview.

Finally, to remedy these errors, NSIRA recommended that CSIS convene a second interview attended by different officers and a different interpreter. Given the irregularities in the first interview and the resulting concern that it may contain inaccuracies, NSIRA further recommended that in completing its assessment and in providing advice to the IRCC, CSIS avoid giving weight to the results of the first interview.

Allegations against the RCMP for failure to return seized items (NSIRA File 07-407-08)

The complainant filed a complaint against the RCMP alleging that it failed to return property that was seized from their office, resulting from an RCMP investigation into a terrorist plot. The complainant further alleged that the RCMP damaged his property.

Upon considering the facts and timeline of the RCMP’s investigation that resulted in the seizure of the complainant’s property, NSIRA found that the property was properly detained, pursuant to the provisions of the Criminal Code and in accordance with RCMP policy.

NSIRA further found that there was no evidence that would permit to conclude that the complainant’s property was damaged by the RCMP during and after the seizure.

The complainant’s allegations were found to be unsupported.

Allegation that the RCMP failed to investigate threats against the Complainant and their family made by a foreign government (NSIRA File 07-407-04)

The complainant came to Canada as a refugee fleeing violent persecution. As a result of litigation against their former employer, who was linked to the government of a foreign state, the complainant alleged that they had been the victim of death threats from their former employer and government officials of the country from which they had fled. The complainant believed these threats to be credible, as they were often accompanied by contemporaneous details, such as the complainant’s clothing during a particular outing and the location they attended. The complainant believed that representatives of the aforementioned government employed at the country’s embassy in Canada were assisting in the surveillance of the complainant and their family, including their children while at school.

The complainant alleged that the RCMP failed to conduct a complete investigation into incidents involving threats, including death threats, made against the complainant and their family, and that these decisions by the RCMP were improperly influenced by foreign individuals.

The evidence provided by the RCMP demonstrated that it took the necessary steps to review the information submitted by the complainant, but determined that there were insufficient grounds for the RCMP to continue their investigation of the foreign influence aspects of the threats. However, the local police force was the police of jurisdiction for investigating the criminal harassment, threats, and safety concerns related to the complainant. The RCMP advised this police force that information collected by the RCMP would be turned over to them, and asked to be notified should the local police force identify someone in Canada working on behalf of a foreign government to threaten or intimidate the complainant. NSIRA found the RCMP’s initial investigation to be reasonably thorough and their ultimate decision to be a justifiable exercise of police discretion.

Furthermore, there was no evidence before NSIRA to support the complainant’s allegation that the RCMP’s decision to discontinue their investigation was improperly influenced by foreign individuals.

The complainant’s allegations were found to be unsupported.

Allegations against the RCMP in relation to the treatment of family members as part of a tactical operation (NSIRA File 07-407-05)

The RCMP arrested the complainant at his home on terrorism-related charges. In the course of the operation, the complainant’s family members were handcuffed. It was the complainant’s position that this was improper and that the RCMP officers did not utilize their cultural sensitivity training.

NSIRA found that:

  • The officers securing the complainant’s residence and whose conduct gave rise to this complaint were members of other police forces and not RCMP members.
  • Given the police had, at the time, reasonable grounds to believe that the premises might have contained unsecured and dangerous weapons, the initial detention of the complainant’s family members by using handcuffs was not arbitrary. However, as soon as the officers had control of the scene, the use of handcuffs was no longer appropriate. It followed that the family members were arbitrarily detained within the meaning of section 9 of the Charter.
  • Considering the cultural sensitivity briefing that was provided by the RCMP to the investigators taking part in the operation did address the essential consideration, there was no act or omission by the RCMP that raised the risk of culturally insensitive conduct.

NSIRA determined that, although the RCMP assumed a general supervisory role over the execution of the operation, they depended on the professionalism of the other police forces in planning and executing a dynamic search. Given that the conduct of the other police officers who participated in the search could not be attributed to the RCMP, no findings or recommendations were made for the RCMP in keeping with NSIRA’s jurisdiction.

Other Outcomes

Allegations against CSIS’s role in delaying security assessment regarding immigration or citizenship applications (NSIRA Files 07-403-81, 07-403-87, 07-403-100)

The complainants filed complaints against CSIS, alleging that the Service caused a significant delay in submitting the security assessment for their immigration or citizenship applications. During the investigations, NSIRA inquired about whether CSIS could provide updates with respect to their involvement in the respective processes. The Service provided letters to NSIRA that could be shared with the complainants advising them that CSIS had completed its assessment in the security screening process. As the complainants’ main allegations were in relation to the delay in the security screening, the matters were informally resolved in accordance with Rule 10.10 of NSIRA’s Rules of Procedure and the files were closed.

Allegations against the CSE regarding the discrimination of an employment applicant (NSIRA File 07-406-07)

The complainant filed a section 17 complaint regarding their employment application with CSE. More specifically, upon completing a student term contract with CSE and receiving a verbal offer for a further contract, CSE decided not to renew the complainant’s employment. The complainant alleged that this decision from CSE was based on their ethnicity. Despite the Chief of CSE having received a letter of complaint from the complainant, CSE notified NSIRA that its notification letter constituted their first notice of the complaint and requested that the matter be placed in abeyance (on hold). After completing an internal investigation of the complainant’s allegations (independent of NSIRA’s complaints process), CSE and the complainant began discussions toward a settlement. The parties ultimately reached a settlement and notified NSIRA accordingly. The complaint was informally resolved pursuant to Rule 10 of NSIRA’s Rules of Procedure prior to NSIRA rendering a decision on its jurisdiction to investigate this matter.

Allegations against the RCMP for failure to investigate a complaint (NSIRA File 07-407-10)

This complaint was referred to NSIRA by the Civilian Review and Complaints Commission (CRCC) for the RCMP, pursuant to subsection 45.53(4.1) of the RCMP Act. The complaint alleged that the RCMP failed to investigate individuals allegedly participating in a militia group. NSIRA tried to establish contact with the complainant several times to proceed with its investigation. NSIRA found that reasonable attempts had been made to communicate with the complainant and that the agency had exhausted all options. Accordingly, NSIRA issued reasons that the complaint had been abandoned, as per NSIRA’s Rules of Procedure. The complaint investigation file was closed.

Statistics on complaints investigations

Investigations progressed at significant levels in 2023 (see Annex C). NSIRA concluded several investigations and issued seven final reports. Additionally, four files were informally resolved in accordance with Rule 10 of NSIRA’s Rules of Procedure.

In 2023, NSIRA observed an increase of complaints against CSIS, pursuant to section 16 of the NSIRA Act, alleging process delays in immigration or citizenship security screening. Of note, under sections 14 and 15 of the CSIS Act, CSIS provides security advice to IRCC and CBSA to guide determinations with respect to whether citizenship or immigration applicants are threats to the security of Canada. While CSIS is committed to performing its security screening mandate in a timely manner, there is no standard for time allotted. In the 2023 calendar year, out of the six complaints over which NSIRA assumed jurisdiction under section 16 of the NSIRA Act, five pertained to allegations of delays that complainants attributed to CSIS’s security screening activities.

Conclusion

The comprehensive reviews and investigations NSIRA conducted in 2023 underscore the agency’s dedication to transparency and accountability. This work has provided constructive recommendations to enhance the operational practices and policy frameworks of Canada’s important national security and intelligence actors.

NSIRA recognizes the persistent and evolving nature of security threats, which necessitates adaptive and proactive approaches by Canada’s security and intelligence agencies. NSIRA is likewise committed to continually refining its methodologies, embracing technological advancements, and strengthening its analytical capabilities to keep pace in a rapidly changing world. NSIRA will continue to engage with domestic and international security and intelligence review partners to improve its practices and foster better public understanding of its work and the value it provides.

NSIRA is driven by its role as the trusted eyes and ears of Canadians within the otherwise closed domain of national security and intelligence, providing the critical function of enhancing transparency and accountability. NSIRA’s vision, mission, and values reflect this commitment and will guide NSIRA’s work at it looks to the future.

Annexes

Annex A: Abbreviations

Abbreviations and Full Names
Abbreviation Full Name
ACA Avoiding Complicity in Mistreatment by Foreign Entities Act
ACO active cyber operations
CAF Canadian Armed Forces
CBSA Canada Border Services Agency
CHRC Canadian Human Rights Commission
CHS Confidential Human Source (program)
CII Canadian-identifying information
CRA Canada Revenue Agency
CRCC Civilian Review and Complaints Commission for the RCMP
CSE Communications Security Establishment
CSIA Cybersecurity and information assurance
CSIS Canadian Security Intelligence Service
CTIVD Netherlands Dutch Review Committee on the Intelligence and Security
Cyber Centre Canadian Centre for Cyber Security
DCO defensive cyber operations
DFO Department of Fisheries and Oceans
DND Department of National Defence
EOS Norway Norwegian Parliamentary Oversight Committee on Intelligence and Security Services
FINTRAC Financial Transactions and Reports Analysis Centre of Canada
FIORC Five Eyes Intelligence Oversight and Review Committee
GAC Global Affairs Canada
GC Government of Canada
HUMINT Human Intelligence
IC IG US United States of America’s Inspector General of the Intelligence Community
IGIS Australia Australia’s Inspector-General of Intelligence and Security
IGIS New Zealand New Zealand’s Inspector-General of Intelligence and Security
IPCO UK United Kingdom’s Investigatory Powers Commissioner’s Office
IRCC Immigration, Refugees and Citizenship Canada
IRTC information relating to a Canadian or a person in Canada
IT information technology
MD Ministerial Direction
NBS network-based solutions
NDA National Defence Act
NSICOP National Security and Intelligence Committee of Parliamentarians
NSIRA National Security and Intelligence Review Agency
OA-IA Independent Oversight Authority for Intelligence Activities of Switzerland
PCLOB US United States Privacy and Civil Liberties Oversight Board
PCO Privy Council Office
PKGr German Parliamentary Oversight Panel
PS Public Safety Canada
RAD Review and Analysis Division
RCMP Royal Canadian Mounted Police
REP reasonable expectation of privacy
SCIDA Security of Canada Information Disclosure Act
SIRC Security and Intelligence Review Committee
SSC Shared Services Canada
TBS Treasury Board of Canada Secretariat
TC Transport Canada
TET Denmark Danish Intelligence Oversight Board
the Standard Standard on Security Screening
TRM threat reduction measure
UNCTED United Nations’ Counter-Terrorism Executive Directorate
Abréviations et Noms Complets
Abréviation Nom Complet
AMC Affaires mondiales Canada
ARC Agence du revenu du Canada
ARVP Attente raisonnable en matière de droit à la vie privée
ASFC Agence des services frontaliers du Canada
AS-Rens Autorité de surveillance indépendante des activités de renseignement
BCP Bureau du Conseil Privé
CANAFE Centre d’analyse des opérations et déclarations financières du Canada
CCC Centre canadien pour la cybersécurité
CCDP Commission canadienne des droits de la personne
CCETP Commission civile d’examen et de traitement des plaintes relatives à la Gendarmerie royale du Canada
COA Cyberopérations actives
COD Cyberopérations défensives
CPSNR Comité des parlementaires sur la sécurité nationale et le renseignement
CSAI Cybersécurité et assurance de l’information
CSARS Comité de surveillance des activités de renseignement de sécurité
CSERGC Conseil de surveillance et d’examen du renseignement du Groupe des cinq
CST Centre de la sécurité des télécommunications
CTIVD Pays-Bas Commission néerlandaise de contrôle des services de renseignement et de sécurité
DECT Direction exécutive du Comité contre le terrorisme des Nations Unies
DRA Division de la recherche et de l’analyse
EOS Norvège Commission parlementaire norvégienne de contrôle des services de renseignement et de sécurité
FAC Forces armées canadiennes
GRC Gendarmerie royale du Canada
HUMINT Renseignement humain
IC IG É.-U. Inspecteur général de la communauté du renseignement des États-Unis d’Amérique
IGIS Australie Inspecteur général du renseignement et de la sécurité de l’Australie
IGIS Nouvelle-Zélande Inspecteur général du renseignement et de la sécurité de la Nouvelle-Zélande
INC Information nominative sur un Canadien
IPCO R.-U. Bureau du commissaire aux pouvoirs d’enquête du Royaume-Uni
IRCC Immigration, Réfugiés et Citoyenneté Canada
IRCPC Information qui se rapporte à des Canadiens ou à des personnes au Canada
la Norme Norme sur le filtrage de sécurité
LCISC Loi sur la communication d’information ayant trait à la sécurité du Canada
LCMTIEE Loi visant à éviter la complicité dans les cas de mauvais traitements infligés par des entités étrangères
MND Ministère de la Défense nationale
MPO Ministère des Pêches et des Océans
MRM Mesure de réduction de la menace
OSSNR Office de surveillance des activités en matière de sécurité nationale et de renseignement
PCLOB É.-U. Conseil de surveillance de la vie privée et des libertés civiles des États-Unis
PKGr Comité de surveillance parlementaire de l’Allemagne
SCRS Service canadien du renseignement de sécurité
SCT Secrétariat du Conseil du Trésor du Canada
SHC (Programme) des sources humaines confidentielles
SP Sécurité publique Canada
SPC Services partagés Canada
SR Solutions réseau
TC Transports Canada
TET Danemark Conseil danois de surveillance des services de renseignement
TI Technologie de l’information

Annex B: Review findings and recommendations

This Annex lists the full findings and recommendations of NSIRA’s reviews that were completed in 2023. In certain instances, original language has been redacted and replaced with summary language designated by [*summary*]. Once redacted, full reviews and available government responses to recommendations are published on NSIRA’s website.

Canadian Security Intelligence Service review

Review of CSIS Dataset Regime

NSIRA’s findings

NSIRA found that CSIS’s current application of the dataset regime is inconsistent with the statutory framework.

NSIRA found that CSIS’s current approach to dataset information collection under section 12 risks the creation of a parallel collection mechanism, one that weakens section 12’s statutory thresholds and at the same time lacks the external oversight regime intended to protect personal information under the dataset regime.

NSIRA found that CSIS failed to fully apprise the Court on their interpretation and application of the dataset regime. CSIS should have sought clarification from the Court as to its views on the precise conduct permissible prior to invocating the dataset regime.

NSIRA found that when conducting queries in exigent circumstances, CSIS retained information that did not meet the section 12 strictly necessary threshold.

NSIRA found that the lack of explicit time limits in section 11.17 of the dataset provisions governing foreign datasets has resulted in datasets being retained for multiple years pending a decision by the Minister or Minister’s designate (the CSIS Director).

NSIRA found that CSIS runs the risk of collecting information that is publicly available but for which there may be a reasonable expectation of privacy.

NSIRA found that CSIS’s policies governing the collection and retention of Canadian and foreign datasets do not align with its current interpretation of the dataset regime.

NSIRA found that CSIS does not have a policy governing the handling of transitory information. In addition, the existing Interim Direction [***] does not provide employees with sufficient instruction, which may result in CSIS retaining information that would otherwise be subject to the dataset regime.

NSIRA found that CSIS information management practices are responsible for multiple compliance incidents and currently create duplicates of datasets within CSIS’s systems.

NSIRA found that, as of August 2023, CSIS did not comply with the dataset provisions in the CSIS Act because it retained Canadian information extracted from foreign datasets, and foreign information amounting to a dataset.

NSIRA found that CSIS did not comply with the dataset provisions in the CSIS Act because it retained Canadian information and referenced it as recently as 2022. This information should have been destroyed upon coming into force of the NSA 2017, in July 2019.

NSIRA found that CSIS has not exhaustively scanned all of its systems to identify information that is subject to the dataset regime so that it may be processed in a compliant manner.

NSIRA found that the training required to become a designated employee to evaluate, query, and exploit section 11.01 datasets offers clear information on the collection and retention requirements.

NSIRA found that CSIS operational personnel, including those predominantly dealing with bulk information collection, have not received adequate training allowing them to identify when collected information may fall within the dataset regime.

NSIRA found that CSIS has not prioritized resourcing the technical unit responsible for the evaluation, querying, and exploitation of Canadian and foreign datasets.

NSIRA found that CSIS has not devoted sufficient resources to improving the current technical systems or developing new ones that are equipped to support bulk data use.

NSIRA found that CSIS collected information in relation to activities that could not on reasonable grounds be suspected to have constituted a threat to the security of Canada and the collection, analysis, and retention of which was not strictly necessary.

NSIRA’s Recommendations
Details
Recommendation 1: NSIRA recommends that in the next judicial authorization application for a Canadian dataset CSIS put its current position on the application of the dataset regime before the Court, including any use of the information prior to the decision to retain under the dataset regime.
Recommendation 2: NSIRA recommends that CSIS immediately destroy any record containing names retained pursuant to the exigent circumstances queries, as they do not meet the strictly necessary threshold.
Recommendation 3: NSIRA recommends that Parliament legislates a time limitation for the authorization of a foreign dataset by the Minister or Minister’s designate.
Recommendation 4: NSIRA recommends that CSIS meaningfully analyze and document any possible reasonable expectation of privacy when evaluating publicly available datasets.
Recommendation 5: NSIRA recommends that CSIS develop:
  • Guidelines regarding the implementation of section 6 of the Interim Direction on [**redacted**] that also include consideration of how the Direction’s retention rule is to be reconciled with the 90 day evaluation period in the dataset regime; and
  • A policy governing the handling of transitory information.
Recommendation 6: NSIRA recommends that CSIS cease to create duplicates of the information reported in the operational system.
Recommendation 7: NSIRA recommends that CSIS immediately destroy Canadian and foreign dataset information that is not strictly necessary to retain. This information no longer falls within the legal 90 day evaluation period and retaining it pursuant to the dataset regime is no longer a possibility.
Recommendation 8: NSIRA recommends that CSIS conduct an exhaustive scan of its operational and corporate repositories to identify and destroy any non-compliant information.
Recommendation 9: NSIRA recommends that CSIS develop and deliver scenario-based workshops to train operational personnel on CSIS’s current application of the dataset regime so that they can engage subject matter experts as necessary.
Recommendation 10: NSIRA recommends that CSIS prioritize resourcing the technical unit responsible for the evaluation, querying, and exploitation of Canadian and foreign datasets.
Recommendation 11: NSIRA recommends that CSIS prioritize the improvement of current technical systems or development of new systems, equipped to support compliant bulk data use.
Recommendation 12: NSIRA recommends that CSIS immediately destroy the case study dataset it collected pursuant to section 12, as it does not meet the statutory thresholds. This information no longer falls within the legal 90 day evaluation period and retaining it pursuant to the dataset regime is no longer a possibility.
Recommendation 13: NSIRA recommends that CSIS share the full unredacted copy of this report with the Federal Court.

Communications Security Establishment reviews

Review of CSE’s Use of the Polygraph in Security Screening

NSIRA’s findings

NSIRA found that CSE’s governance of the use of the polygraph for security screening inadequately addresses privacy issues.

NSIRA found that CSE did not conduct a Privacy Impact Assessment related to its use of the polygraph for security screening.

NSIRA found that CSE may not have considered whether all information collected during the polygraph is directly related or necessary to the assessment of loyalty to Canada or criminality, as required by the Privacy Act and the Directive on Privacy Practices.

NSIRA found that polygraph examiners applied an ad hoc approach as they assessed medical information collected during the polygraph.

NSIRA found that CSE may not have complied with section 7 of the Privacy Act by using information collected during polygraph exams for suitability and hiring decisions without the consent of the subject.

NSIRA found that CSE provides subjects with information that overstates the reliability and validity of the polygraph prior to obtaining consent.

NSIRA found that, in some instances, the way in which CSE conducted polygraph exams risked prompting subjects to fabricate information in an effort to clear themselves when faced with an unfavourable polygraph assessment.

NSIRA found instances where CSE’s quality control practices for polygraph exams were not always consistent with CSE policy.

NSIRA found that approximately 20% of security files from the sample reviewed were missing audiovisual recordings of polygraph exams.

NSIRA found that in all cases, when initial polygraph exam results indicated deception or were inconclusive, CSE’s practice was to conduct multiple polygraph exams rather than a resolution of doubt process as provided for under the Standard.

NSIRA found that the polygraph had an inordinate importance in security screening decision-making at CSE and other less-intrusive security screening activities were under-used or not used at all.

NSIRA found that the polygraph was de facto determinative in security screening decisions at CSE.

NSIRA found that CSE’s security screening decision-making may not comply with record-keeping requirements of the Standard on Security Screening.

NSIRA found that CSE’s use of the polygraph in security screening decisions makes more uncertain the opportunity to challenge denials of security clearances pursuant to the NSIRA Act and the Standard.

NSIRA found that TBS did not adequately consider privacy or Charter implications when it included the polygraph as a security screening activity under the Standard on Security Screening.

NSIRA found that the Standard on Security Screening insufficiently addresses Charter and privacy implications related to the use of the polygraph.

NSIRA found that the Government of Canada’s current use of the polygraph for security screening in the manner described in this review may raise serious concerns in relation to the Canadian Charter of Rights and Freedoms.

NSIRA’s Recommendations
Details
Recommendation 1: NSIRA recommends that the Treasury Board of Canada urgently remedy the issues identified by this review related to the legality, reasonableness and necessity of the use of the polygraph for security screening in Canada, or remove it from the Standard on Security Screening.
Recommendation 2: NSIRA recommends that CSE urgently remedy the issues identified by this review, including Charter and Privacy Act compliance, or cease conducting polygraph exams for security screening.
NSIRA’s findings

NSIRA found that CSE operates a comprehensive and integrated ecosystem of cybersecurity systems, tools, and capabilities to protect against cyber threats, with a design that incorporates measures meant to protect the privacy of Canadians and persons in Canada.

NSIRA found that CSE treated all network-based solutions (NBS) information as information related to a Canadian or a person in Canada (IRTC), and applied measures intended to protect privacy to all NBS-acquired information.

NSIRA found that information acquired through NBS will, by its nature, always include information related to a Canadian or person in Canada (IRTC) and is certain to include some information for which there is a reasonable expectation of privacy (REP) of a Canadian or person in Canada. This was not transparently communicated in corresponding applications to the Minister.

NSIRA found that, due to a lack of clarity in its relationship with SSC, CSE did not obtain consent from system owners for its cybersecurity and information assurance activities in the way described to the Minister.

NSIRA found that SSC was not fully aware of its responsibilities as a system owner, as described in CSE’s applications to the Minister.

NSIRA found that, despite the existence of a Memorandum of Understanding between CSE and SSC, there was a lack of clarity between the organizations on the implementation of agreed-upon commitments about NBS activities on networks operated by SSC.

NSIRA found that CSE did not explain to the Minister why consent to CSE’s cybersecurity activities could not reasonably be obtained from users of Government of Canada systems.

NSIRA found that CSE’s narrow application of subsection 22(4) of the CSE Act introduces legal and accountability risks and resulted in CSE acquiring information that may interfere with a reasonable expectation of privacy of a Canadian or person in Canada. This information was from a source acquired outside of the scheme of Ministerial authorizations.

NSIRA found that an incongruence between subsections 27(1) and 22(4) of the CSE Act prevents CSE from acquiring certain information from [*specific type of*] sources such as [*specific information source*], where this information interferes with the reasonable expectation of privacy of a Canadian or person in Canada. Some of this information would enhance CSE’s ability to fulfill its cybersecurity and information assurance mandate.

NSIRA’s Recommendations
Details
Recommendation 1: NSIRA recommends that CSE clearly explain, in its applications to the Minister, that:
  • Network-based solutions acquire information relating to a Canadian or a person in Canada (IRTC), including information that interferes with the reasonable expectation of privacy (REP) of Canadians or persons in Canada; and,
  • CSE subsequently uses, analyses, and retains this information for use in cybersecurity and information assurance activities.
Recommendation 2: NSIRA recommends that CSE renew its Memorandum of Understanding with SSC to ensure CSE and SSC meet their respective commitments, including any that CSE makes to the Minister regarding SSC’s role in informing system owners about the NBS program.
Recommendation 3: NSIRA recommends that CSE update Memoranda of Understanding with all of its cybersecurity partners, to ensure these partners have consented to CSE cybersecurity activities, and to ensure these arrangements reflect, and conform to, contemporary governance authorities. CSE should continue these updates, as a standard practice, as authorities evolve.
Recommendation 4: NSIRA recommends that CSE explain to the Minister how consent to CSE’s cybersecurity activities is obtained from users of Government of Canada systems, or otherwise explain why this consent could not reasonably be obtained.
Recommendation 5: NSIRA recommends that CSE reconsider whether limits on the acquisition by CSE of information from the global internet infrastructure (as per subsection 22(4) of the CSE Act) apply to information [*specific source of information*] sources.
  • This should include an assessment of whether section 8 of the Charter of Rights and Freedoms may be engaged, as well as cases where [*specific source of information*] sources may contain information that interferes with the reasonable expectation of privacy of a Canadian or person in Canada.
Recommendation 6: NSIRA recommends that, in order to continue these acquisition activities that are necessary for cybersecurity and information assurance (CSIA) purposes, CSE assess its current sources of CSIA information—that are acquired outside of an Authorization—for interference with the reasonable expectation of privacy of a Canadian or person in Canada.
  • This assessment should be repeated as required to ensure such information is not acquired without a valid Ministerial authorization.
Recommendation 7: NSIRA recommends that section 27 of the CSE Act be amended to permit the Minister to authorize CSE to acquire information that is necessary for CSE’s cybersecurity and information assurance aspect (but which may contain information that interferes with the reasonable expectation of privacy of a Canadian or person in Canada, or contravene an Act of Parliament), from sources other than federal information infrastructures and systems of importance to the Government of Canada.

Canada Border Services Agency review 

Review of the CBSA’s Confidential Human Source Program 

NSIRA’s findings

NSIRA found that CBSA policy does not require any documented approval or a documented assessment of the risks of using a CHS outside of the registration process. 

NSIRA found that there was incomplete documentation in the preregistration period such that the CHS Program is impeded from monitoring the full spectrum of CHS Program activities. 

NSIRA found that CBSA’s policies and practices around obtaining informed consent are insufficient to ensure that it is obtained systematically, and before individuals incur the risks of providing information in confidence to CBSA.

NSIRA found that measures to mitigate risks to CHSs are often not present or implemented. 

NSIRA found that CBSA may have breached the law of informer privilege in two instances. 

NSIRA found that Inland Enforcement Officers collected information and promised confidentiality, but did so without training under the applicable policy to support a proper understanding of the consequences of extending confidentiality. 

NSIRA found that CBSA’s approach to risk management in their new policy suite does not fully align with principles in the MD. 

NSIRA found that the information CBSA will provide to the Minister as required by Ministerial Direction is not sufficient to convey the size and scope of the Confidential Human Source Program. 

NSIRA found that in two cases the CBSA did not comply with subsection 12(2) of the CBSA Act in that it failed to follow the MD’s requirement to inform the Minister when there was a Confidential Human Source activity that “may have significant adverse impact such as impacting the safety of an individual”.

NSIRA’s Recommendations
Details
Recommendation 1: NSIRA recommends that CBSA amends its policy to require a documented risk assessment and formal approval for using a CHS in the preregistration period.
Recommendation 2: NSIRA recommends that CBSA require that the interview checklist be administered no later than when the promise of confidentiality is extended.
Recommendation 3: NSIRA recommends that CBSA provide guidance as to how obtaining informed consent should be tailored to the individual circumstances of the CHS.
Recommendation 4: NSIRA recommends that CBSA put in place specific guidance on how to mitigate the full range of risks to CHSs and ensure that those mitigation measures are implemented.
Recommendation 5: NSIRA recommends CBSA expand its definition of active Confidential Human Source so that reporting to the Minister covers the breadth of the CHS program.
Recommendation 6: NSIRA recommends that CBSA immediately notify the Minister of the two cases identified in this review where safety of an individual is at issue.

Department of National Defence and the Canadian Armed Forces Review 

Review of DND/CAF’s Human Source Handling Program 

NSIRA’s findings 

NSIRA found that DND/CAF’s policy framework allows human source handling activities that may not be in compliance with the law. 

NSIRA found that DND/CAF policy is insufficiently specific with respect to recognizing and avoiding mistreatment risks created by human source handling activities. 

NSIRA found that DND/CAF’s risk assessment framework for human source handling operations is inadequate. The current assessments of risk do not provide adequate or reliable information to decision-makers because they: 

  • are overly subjective; 
  • do not present mitigated and unmitigated risks clearly; 
  • conflate risks; and 
  • narrowly focus the considerations of certain risks at the expense of others. 

NSIRA found gaps in the discharge of DND/CAF’s duty of care from engagement of the human source to disengagement. These gaps include: 

  • a safeguard process that is not appropriately engaged for certain sources; 
  • an underdeveloped complaints process for sources; and 
  • insufficient assessments of the risk posed to Agents. 

NSIRA found that the Minister of National Defence is not adequately informed in order to fulfill ministerial accountabilities for human source handling operations. 

NSIRA found that further ministerial direction is required to support the governance of DND/CAF’s human source handling program.

NSIRA’s Recommendations
Details
Recommendation 1: NSIRA recommends that Parliament enact a justification framework to authorize DND/CAF and its sources to commit acts or omissions outside Canada that would otherwise be unlawful, where reasonable for the collection of defence intelligence.
Recommendation 2: NSIRA recommends that DND/CAF develop policy governance to properly equip Field HUMINT teams to conduct their human source handling activities in compliance with the law. At minimum, this should include:
  • Increased attention to determine whether individuals are involved in terrorist activity;
  • Governance controls to increase accountability and enable responsiveness;
  • A change in policy to only accept information with plausible lawful provenance;
  • The development of training to support CAF members on how to handle human sources while mitigating legal risk; and
  • A review of operations with respect to their compliance with Canada’s foreign legal obligations.
Recommendation 3: NSIRA recommends that DND/CAF adopt an approach for assessing whether its exchanges with human sources create a substantial risk of mistreatment that is specific to human source handling, comprehensive with respect to its obligations in international human rights law and international humanitarian law, and formalized in policy and procedure.
Recommendation 4: NSIRA recommends that DND/CAF develop a risk assessment framework specific to human source handling, with appropriate doctrinal guidance for the assessment of human sources that includes consideration of all relevant risk factors.
  • All DND/CAF members implicated in the risk assessment process (including field HUMINT team members, commanders, intelligence staff, and legal and policy advisors) should be appropriately trained on the new risk assessment framework and guidance to ensure consistency across teams and deployments.
Recommendation 5: NSIRA recommends that DND/CAF adopt, in consultation with other departments as necessary, additional measures aimed at ensuring the welfare and protection of their human sources. These measures should be clearly operationalized in governance documents (directives, orders, procedures, etc.) and should address, at minimum, the issues identified in Finding #3.
Recommendation 6: NSIRA recommends that DND/CAF, in consultation with the Minister of National Defence, improve the content of biannual reports to the Minister to include, at minimum, the legal, policy and governance issues that may impact human source handling operations.
Recommendation 7: NSIRA recommends that, with respect to human source handling operations, DND/CAF create official written records of notifications and briefings to the Minister of National Defence, as well as records of decision to improve mutual accountability.
Recommendation 8: NSIRA recommends that the Minister of National Defence issue ministerial direction on human source handling to DND/CAF that includes, at minimum:
  • Fundamental principles guiding the lawful and ethical conduct of source handling operations;
  • The types of risk that should be assessed and when these risks should be consulted at the ministerial level;
  • Expectations regarding the management of human sources; and
  • Direction regarding the content and frequency of reporting.

Multi-departmental reviews

Review of Operational Collaboration between CSE and CSIS

NSIRA’s findings

NSIRA found that CSE does not routinely share its operational plans and associated risk assessments with CSIS when operating under CSIS authorities. This may leave CSIS unable to fully assess CSE’s activities for compliance. 

NSIRA found that close collaboration at the working level created the right conditions for CSIS to monitor CSE’s assistance activities for compliance with warrant conditions. 

NSIRA found that CSIS failed to submit an updated request for assistance to CSE in a timely manner when it sought new warrant powers. 

NSIRA found that CSE and CSIS did not engage in any joint investigation, assessment, or tracking of a compliance incident. 

NSIRA found that CSE and CSIS failed to implement an effective operational framework for their collection activity. This contributed to two instances of non-compliance with the Federal Court’s direction. 

NSIRA found that CSE and CSIS identified an effective opportunity to collaborate under their respective mandates and carried out an operation that proved beneficial for both Canada and its allies. 

NSIRA found that, while CSIS’s operational framework was sufficient, CSE’s operational framework did not assess legal and policy risk specific to the operation. 

NSIRA found that CSE and CSIS did not draft joint terms of engagement, a joint operational plan, or engage in joint risk assessments. 

NSIRA found that CSE’s foreignness assessment did not account for the increased risk of targeting Canadians when working with CSIS. 

NSIRA found that both CSE and CSIS lack policies, procedures, and accountability mechanisms to govern CSIS lead information messages and associated requests and actions. 

NSIRA found that CSIS’s use of lead information messages to share information and make requests about Canadians creates a high risk of potential for non-compliance for CSE. 

NSIRA found that CSE’s application of incidental collection provisions may not be appropriate in situations where CSE knows there is a Canadian nexus to a CSIS foreign intelligence lead, and where it knows it is likely to collect Canadian information in pursuing the lead. 

NSIRA found that CSE did not comply with section 22(1) of the CSE Act when it [*reviewed the contents*] of a Canadian’s device obtained through a CSIS lead information message. 

NSIRA found that CSE did not comply with either section 22(1) of the CSE Act or section 273.64(2)(a) of the National Defence Act (NDA) when it used [*a number of*] complete exceptional reports for foreign intelligence purposes. 

NSIRA found that CSE does not consistently utilize its protected entity tool to prevent targeting Canadian identifiers it receives from CSIS. 

NSIRA found that while CSIS performs an initial consultation, it does not routinely pursue further engagement with CSE during Threat Reduction Measure activities that could overlap with CSE activities. 

NSIRA found that CSE did not notify CSIS in a timely manner of a compliance incident in its Active Cyber Operation, which was connected to a CSIS Threat Reduction Measure. 

NSIRA found that CSE failed to cooperate effectively with CSIS, leading to a missed opportunity to advance Canadian intelligence objectives via domestic collaboration.

NSIRA’s Recommendations
Details
Recommendation 1: NSIRA recommends that CSE share its operational plans and associated risk assessments with CSIS prior to operating under CSIS authorities.
Recommendation 2: NSIRA recommends that when CSIS engages CSE for assistance with the execution of warranted powers, a CSIS employee be involved to ensure compliance in CSE’s collection activities until the request for assistance has terminated.
Recommendation 3: NSIRA recommends that CSIS develop a process to ensure that necessary requests for assistance are submitted to CSE in a timely manner subsequent to obtaining warrant powers.
Recommendation 4: NSIRA recommends when working under a request for assistance CSIS and CSE develop a framework for joint investigation of potential compliance incidents.
Recommendation 5: NSIRA recommends that CSIS ensure roles and responsibilities are clearly agreed to prior to allowing partners to execute warrant powers. Where appropriate, these agreements should be shared with the Federal Court.
Recommendation 6: NSIRA recommends that CSIS ensure it is directly involved in all substantive communications with any partner actively executing its warrant powers.
Recommendation 7: NSIRA recommends that CSIS share paragraphs 32 through 41 of this review, along with associated recommendations, with the Federal Court.
Recommendation 8: NSIRA recommends that when CSE engages in joint operations with CSIS it should perform risk assessments for each operational activity. These should specifically consider the risk of targeting Canadians and implement proactive measures to mitigate this risk.
Recommendation 9: NSIRA recommends that when participating in joint operations, CSE and CSIS either jointly develop or share written terms of engagement, operational plans, and risk assessments.
Recommendation 10: NSIRA recommends that CSE perform foreignness assessments that account for the increased risk of targeting Canadians when working with CSIS.
Recommendation 11: NSIRA recommends CSIS cease making requests for action and/or further information to CSE in relation to Canadians or people in Canada via CSIS lead information messages.
Recommendation 12: NSIRA recommends that CSIS develop policies, procedures, and analyst training to standardize the disclosure of CSIS lead information messages to CSE.
Recommendation 13: NSIRA recommends that CSE develop policies, procedures, and analyst training to standardize the use of CSIS lead information messages.
Recommendation 14: NSIRA recommends that CSE develop a regime for collecting, retaining, and reporting to CSIS Canadian information it uncovers further to legitimate foreign intelligence activities where it has advance knowledge of the Canadian information.
Recommendation 15: NSIRA recommends that CSE update its policies to prohibit the analysis of information relating to a Canadian or person in Canada for the purposes of identifying foreign intelligence.
Recommendation 16: NSIRA recommends that if CSIS decides to disclose exceptional reporting to CSE, it should extract the relevant foreign intelligence for disclosure as opposed to sending the entire report.
Recommendation 17: NSIRA recommends that CSE cease using complete exceptional reports from CSIS under its foreign intelligence mandate.
Recommendation 18: NSIRA recommends that CSE introduce a requirement to always apply the protected entity tool to all Canadian identifiers.
Recommendation 19: NSIRA recommends that CSIS pursue routine engagement with CSE during the implementation of its Threat Reduction Measures when the potential for operational overlap exists.
Recommendation 20: NSIRA recommends that CSE share details of potential compliance incidents with CSIS when an overlap may exist with a CSIS Threat Reduction Measure.

Review of Federal Institutions’ Disclosures of Information under the Security of Canada Information Disclosure Act in 2022

NSIRA’s findings

NSIRA found that CSE, CSIS, GAC, and IRCC regularly use the SCIDA in a manner that warrants information sharing arrangements, as encouraged by subsection 4(c) of the SCIDA. 

NSIRA found that CBSA, DND/CAF, and IRCC were non-compliant with subsection 9(3) of the SCIDA, as they failed to provide all records created under subsections 9(1) or 9(2) to NSIRA within the legislated timeframe. 

NSIRA found improved compliance outcomes in instances where departments prepared record overview spreadsheets under subsections 9(1) and 9(2) of the SCIDA that displayed the following characteristics: 

  • a row for each disclosure made or received; 
  • columns explicitly tied to each individual paragraph under section 9; and 
  • additional columns to capture relevant administrative details, such as whether the disclosure was requested or proactive; the date of the request (if applicable); and any applicable file reference numbers. 

NSIRA found that all GC institutions complied with their obligation to prepare and keep records that set out the information prescribed under subsections 9(1) and 9(2) of the SCIDA. 

NSIRA found that more than half of the descriptions provided by CBSA and IRCC under paragraph 9(1)(e) of the SCIDA did not explicitly address their satisfaction that the disclosure was authorized under paragraph 5(1)(b), the proportionality test. 

NSIRA found, within the sample of disclosures reviewed, that disclosing institutions demonstrated they had satisfied themselves of both the contribution and proportionality tests, in compliance with subsection 5(1) of the SCIDA. 

NSIRA found that GAC satisfied itself under the SCIDA’s paragraph 5(1)(a) contribution test based on an incorrect understanding of the recipient’s national security mandate in two cases. 

NSIRA found, within the sample of disclosures reviewed, that CBSA and GAC (in one and two disclosures, respectively) were non-compliant with the SCIDA’s subsection 5(2) requirement to provide a statement regarding accuracy and reliability. 

NSIRA found, in relation to the remaining disclosures within the sample, that GAC, IRCC, and RCMP included their statements regarding accuracy and reliability within the disclosures themselves, whereas CBSA provided its statements in the disclosures’ cover letters. 

NSIRA found that DND/CAF destroyed information under the SCIDA subsection 5.1(1), but they were non-compliant with the requirement to do so “as soon as feasible after receiving it.”  

NSIRA found delays between when a disclosure was authorized for sending and when it was received by the individual designated by the head of the recipient institution to receive it in at least 20% (n=34) of disclosures.

NSIRA’s Recommendations
Details
Recommendation 1: NSIRA recommends that information sharing arrangements be used to govern regular SCIDA disclosures between GAC and CSIS; IRCC and CSIS; as well as IRCC and CSE.
Recommendation 2: NSIRA recommends that all GC institutions prepare record overviews to clearly address the requirements of subsections 9(1) and 9(2) of the SCIDA; and provide them to NSIRA along with a copy of the disclosure itself and, where relevant, a copy of the request.
Recommendation 3: NSIRA recommends that disclosing institutions explicitly address the requirements of both paragraphs 5(1)(a) and 5(1)(b) in the records that they prepare under paragraph 9(1)(e) of the SCIDA.
Recommendation 4: NSIRA recommends that GC institutions contemplating the use of proactive disclosures under the SCIDA communicate with the recipient institution, ahead of making the disclosure, to inform their assessments under subsection 5(1).
Recommendation 5: NSIRA recommends that all disclosing institutions include statements regarding accuracy and reliability within the same document as the disclosed information.
Recommendation 6: NSIRA recommends that GC institutions review their administrative processes for sending and receiving disclosures under the SCIDA, and correct practices that cause delays.

Review of departmental implementation of the Avoiding Complicity in Mistreatment by Foreign Entities Act for 2022 

NSIRA’s findings

NSIRA found that all departments, with the exception of DFO in respect of subsection 7(1), complied with the reporting requirements set out in the ACA. 

NSIRA found that all departments had frameworks to govern their implementation of the ACA and its associated directions by the end of 2022. 

NSIRA found that most departments demonstrated continual refinements of their ACA frameworks based on self-identified gaps, NSIRA recommendations, and community-wide coordination efforts.

NSIRA found that TC’s ACA governance framework did not include policies and procedures for: 

  1. escalating cases to the deputy head; or 
  2. assessing the risks of information sharing with foreign entities. 

NSIRA found that all departments, with the exception of DFO, GAC, PS, and TC, used country and/or entity risk assessments to inform their assessments of substantial risk of mistreatment and corresponding case escalation. 

NSIRA found that departments’ country risk assessments were inconsistent with one another. 

NSIRA found that the simultaneous conduct of independent human rights risk assessments in different departments reflected a substantial duplication of effort across the GC, and created the opportunity for discrepant outcomes. 

NSIRA found, for the fourth consecutive year, that no departments escalated cases to their deputy heads for determination or decision. 

NSIRA found that some high-risk sharing activities were stopped prior to escalation for consideration of possible mitigations. 

NSIRA found that certain departments’ ACA governance frameworks and risk assessment methodologies included features that may systematically under-assess the level of risk involved in a transaction. These features include: 

  • discrepant applications of the threshold for substantial risk of mistreatment; 
  • incorporating mitigations into baseline assessments of risk, while overestimating their effects; and 
  • a lack of checks and balances in the risk assessment process.
NSIRA’s Recommendations
Details
Recommendation 1: NSIRA recommends that TC update its ACA governance framework to include policies and procedures for:
  • Escalating cases to the deputy head; and
  • Assessing the risks of information sharing with foreign entities.
Recommendation 2: NSIRA recommends that the Government of Canada designate a body responsible for developing:
  • A unified set of assessments of the human rights situations in foreign countries including a standard “risk of mistreatment” classification level for each country; and
  • To the extent that multiple departments deal with the same foreign entities in a given country, standardized assessments of the risk of mistreatment of sharing information with foreign entities.
Recommendation 3: NSIRA recommends that departments apply the “substantial risk” threshold in a manner consistent with the definition adopted government-wide; and that departments whose broader policy frameworks do not yet reflect this definition (CBSA, CRA, IRCC, and TC) make the attendant updates.
Recommendation 4: NSIRA recommends that departmental assessments of substantial risk of mistreatment be grounded in countries’ human rights records; and that subsequent entity-level considerations be based on validated, current, and consistent respect for caveats and assurances, rather than the absence of derogatory information particular to that entity or other bilateral considerations.
Recommendation 5: NSIRA recommends that all ACA governance frameworks incorporate layered checks and balances in the risk assessment and escalation of cases that may involve substantial risk of mistreatment.

Annex C: Statistics on complaints investigations

January 1–December 31, 2023
INTAKE INQUIRIES 135
New complaints filed 26
National Security and Intelligence Review Agency Act (NSIRA Act), section 16, Canadian Security and Intelligence Service (CSIS) complaints 18
NSIRA Act, section 17, Communications Security Establishment (CSE) complaints 5
NSIRA Act, section 18, security clearances 3
NSIRA Act, section 19, Royal Canadian Mounted Police (RCMP) referred complaints 0
NSIRA Act, section 19, Citizenship Act 0
NSIRA Act, section 45, Canadian Human Rights Commission (CHRC) referrals 0
Accepted jurisdiction to investigate 8
  Accepted Declined
NSIRA Act, section 16, CSIS complaints 6 17
NSIRA Act, section 17, CSE complaints 1 4
NSIRA Act, section 18, security clearances 0 1
NSIRA Act, section 19, RCMP referred complaints 1 0
Total 8 22
Active investigations as of December 31, 2023 17
NSIRA Act, section 16, CSIS complaints 8
NSIRA Act, section 17, CSE complaints 1
NSIRA Act, section 18, security clearances 4
NSIRA Act, section 19, RCMP referred complaints 3
NSIRA Act, section 19, continuation of investigation (RCMP referred complaint)a 1
Informal resolution in progress as of December 31, 2023 1
NSIRA Act, section 16 (CSIS complaints) 0
NSIRA Act, section 17 (CSE complaints) 0
NSIRA Act, section 18 (security clearances) 1
NSIRA Act, section 19 (RCMP referred complaints) 0
Total investigations closed 12
  Abandoned Final Report Resolved Informally Withdrawn
NSIRA Act, section 16, CSIS complaints 0 4 3 0
NSIRA Act, section 17, CSE complaints 0 0 1 0
NSIRA Act, section 18, security clearances 0 0 0 0
NSIRA Act, section 19, RCMP referred complaints 1 3 0 0
NSIRA Act, section 45, CHRC referrals 0 0 0 0
Total 1 7 4 0
a First final report was issued in 2022. The continuation is a remaining issue.
Share this page
Date Modified:

Annual Report on the Privacy Act 2023-24

Date of Publishing:

Introduction

The Privacy Act (PA) gives individuals the right of access to information about themselves that is under the control of a government institution, subject to certain specific and limited exemptions and exclusions. The PA also protects the privacy of individuals by giving them substantial control over the collection, use and disclosure of their personal information, and by preventing others from having access to that information. 

Section 72 of the PA requires the head of each government institution to prepare an annual report on the administration of the PA within the institution that is to be tabled in both Houses of Parliament. 

This report to Parliament, which is prepared and tabled pursuant to section 72 of the PA, describes the activities of the National Security and Intelligence Review Agency Secretariat in administering the PA during the period of April 1, 2023 to March 31, 2024 (the reporting period).  

If you require more information or wish to make a request under the PA or the Access to Information Act, please direct your inquiries to the following:

Access to Information and Privacy Office 
National Security and Intelligence Review Agency Secretariat 
P.O. Box 2430, Station “D” 
Ottawa, Ontario, K1P 5W5  
Email: ATIP@nsira-ossnr.gc.ca

Who We Are

Established in July 2019, the National Security and Intelligence Review Agency (NSIRA) is an independent agency that reports to Parliament and conducts investigations and reviews of the federal government’s national security and intelligence activities.  

The NSIRA Secretariat (the Secretariat) assists NSIRA in fulfilling its mandate. The Secretariat headed by an Executive Director, is designated as the government institution for the purposes of administering the PA and the Access to Information Act.

Mandate

The Secretariat supports NSIRA in its dual mandate to conduct reviews and investigations in relation to Canada’s national security or intelligence activities.

Reviews

NSIRA’s review mandate is broad, as outlined in subsection 8(1) of the National Security and Intelligence Review Agency Act (NSIRA Act). This mandate includes reviewing the activities of both the Canadian Security Intelligence Service (CSIS) and the Communications Security Establishment (CSE), as well as the national security or intelligence-related activities of any other federal department or agency. This includes, but is not limited to, the national security or intelligence activities of the Royal Canadian Mounted Police (RCMP), the Canada Border Services Agency (CBSA), the Department of National Defence (DND) and Canadian Armed Forces (CAF), Global Affairs Canada (GAC), and the Department of Justice. Further, NSIRA may review any national security or intelligence matter that a Minister of the Crown refers to NSIRA.  

NSIRA’s reviews assess whether Canada’s national security and intelligence activities comply with relevant laws, policies, and ministerial directions, as well as whether they are reasonable and necessary. In conducting its reviews, NSIRA can make any findings or recommendations it considers appropriate.

Investigations

NSIRA is also responsible for investigating national security or intelligence-related complaints from members of the public. As outlined in paragraph 8(1)(d) of the NSIRA Act, NSIRA has the mandate to investigate complaints about:  

  • any activity of CSIS or of CSE;
  • decisions to deny or revoke certain federal government security clearances; 
  • any complaint referred under subsection 45.53(4.1) or 45.67(2.1) of the Royal Canadian Mounted Police Act
  • reports made under section 19 of the Citizenship Act; and 
  • matters referred under section 45 of the Canadian Human Rights Act.

Access to Information and Privacy Office – Organizational Structure

The Secretariat’s ATIP Office is accountable for the development and implementation of effective policies, guidelines, systems, and procedures to ensure that the Secretariat meets its responsibilities under the PA and the Access to Information Act.  

For the reporting period, the Secretariat’s ATIP Office consisted of: 

  • 1 full-time Access to Information Consultant;  
  • 1 part-time Privacy Consultant;  
  • 1 full-time ATIP Coordinator, who managed the Secretariat’s ATIP Office, and fulfilled the normal duties as Manager of Administrative Services for the Secretariat and NSIRA Members; and 
  • the Secretariat’s Senior Counsel, Internal Services as well as Senior General Counsel supported the ATIP office when required. 

The Secretariat’s ATIP Office is responsible for the following: 

  • monitoring compliance with ATIP legislation and relevant procedures and policies; 
  • processing requests under both the PA and the Access to Information Act;  
  • developing and maintaining policies, procedures, and guidelines to ensure that the Secretariat respects the PA and the Access to Information Act;  
  • maintaining Personal Information Banks and conducting privacy impact assessments; 
  • preparing annual reports to Parliament and other statutory reports, as well as other material that might be required by central agencies; and 
  • representing the Secretariat in dealings with the Treasury Board of Canada Secretariat (TBS), the information and privacy commissioners, and other government departments and agencies in matters pertaining to the PA and the Access to Information Act.  

During the reporting period, the Secretariat was a party to a service agreement under section 73.1 of the PA in which the Secretariat received administrative support from the Privy Council Office related to the tabling of the annual report in Parliament. The Secretariat was also a party to a service agreement under section 71.1 of the PA in which the Secretariat received ATIP Online services from TBS.  

To assist the Secretariat’s ATIP Office in meeting its overall legislative obligations, the Secretariat relied on a collaborative internal group of subject matter experts from all divisions.

Delegation Order

As the Head of the Secretariat, the Executive Director is responsible for the administration of the PA within the institution. Pursuant to section 73 of the PA, the Executive Director has delegated the ATIP Manager and ATIP Officer,  as well as individuals acting in these positions, to perform certain and specific powers, duties, and functions for the administration of the PA. These positions have limited delegation of authority under the PA and the Access to Information Act, in accordance with the delegation of authority instrument approved by the Executive Director in August 2022. The Delegation Order can be found in Appendix A (page 9).

Performance 2023-2024

Performance in Processing Privacy Requests

In addition to 5 requests that were outstanding from the previous reporting periods, the Secretariat’s ATIP Office received 22 formal requests during the current reporting period, bringing the total number of formal request to 27. Of these, the Secretariat’s ATIP Office closed 25 requests and processed approximately 4843 pages during the reporting period. 2 requests were carried over to the following reporting period.

Statistical Reports for 2023-2024

The Secretariat’s 2023-2024 Statistical Report on the PA and Supplemental ATIP Statistical Report for 2023-2024 were both previously validated by TBS.

Extensions and Completion Time of Closed Requests

During the reporting period, the Secretariat’s ATIP Office invoked extensions while processing 2 formal requests: 1 extension was completed within of 16 to 30 days, and 1 request was taken to seek an internal consultation. Both did not require extensions to consult with third parties. 

Of the requests completed during the reporting period: 

  • 1 request, or 4% of the requests completed, was disclosed in its entirety. This request was completed within 16 to 30 days; 
  • 1 request, or 4% of the requests completed, was disclosed in part. This request was completed within 121  to 180  days; 
  • 16 requests, or 64% of the requests completed, resulted in no records. 1 request was completed within 0 to 15 days, 6 requests were completed within 16 to 30 days, 6 requests were completed within 31 to 60 days, and 3 requests were completed within 61 to 120 days; 
  • 1 request, or 4% of the requests completed, was abandoned and completed; and 
  • 6 requests, or 24% of the requests completed, were neither confirmed nor denied. 

The Secretariat’s responses to many requests required an intensive review of complex records, including extensive internal and external consultations. During the reporting period, the Secretariat’s on-time response rate decreased to 56% from 58.3% in the 2022-2023 reporting period due to a significant increase in the number of pages processed for formal requests.

Consultations 

During the reporting period, no privacy consultations were received. 

Complaints and Investigations 

Subsection 29(1) of the PA describes how the Office of the Privacy Commissioner (OPC) receives and investigates complaints from individuals regarding the processing of requests under the PA. During the reporting period, the Secretariat’s ATIP Office received 16 complaints, 2 of which were related to Access requests. 

In addition, 1 privacy breach-related investigation initiated by the Privacy Commissioner in Fiscal Year 2020-2021 continued during the reporting period and remained active on March 31, 2024.

Training and Awareness

The Secretariat took a customized approach to training subject matter experts on their legislative requirements, roles, and responsibilities. The Secretariat’s ATIP Office encouraged employees to take the ATIP training courses offered by the Canada School of Public Service (CSPS). New employees were required to complete an online training session entitled Fundamentals of Access to Information and Privacy within six months of joining the Secretariat and in January 2024, an internal ATIP training session was held. 

To ensure in-depth training is taken by employees of the NSIRA Secretariat who have functional or delegated responsibility for the administration of the PA and Privacy Regulations, the Senior Counsel, Internal Services participated in the 2023 Canadian Privacy Symposium offered by the International Association of Privacy Professionals. In addition, the ATIP Manager attended the 2023 Canadian Access and Privacy Association Conference as well as the 26th Annual Vancouver International Privacy & Security Summit.

Policies, Guidelines, and Procedures 

During the reporting period, the Secretariat implemented several initiatives to assist the Secretariat’s ATIP Office to operate more efficiently. For example, the Secretariat revised its Privacy Breach Plan and Procures Manual, revised its Privacy Protocol Template, and established a Privacy Risk Register. 

Initiatives and Projects to Improve Privacy 

During the reporting period, the Secretariat’s Information Technology division continued to develop an ATIP software tool for the Secretariat’s classified and unclassified systems.  

Summary of Key Issues and Actions Taken on Complaints 

The Secretariat meaningfully engaged with the OPC on all 16 active investigations during the reporting period and disclosed additional records in 1 of the 2 Access related complaints.   

Material Privacy Breaches 

During the reporting period, no material privacy breaches occurred.  

Privacy Impact Assessments 

During the reporting period, the Secretariat completed a Privacy Impact Assessment (PIA) of its investigations-related activities, which was shared with TBS and the OPC. In addition, the Secretariat made further revisions to its PIA on the creation of NSIRA in response to feedback received from TBS and continued to engage with TBS on PIB registration.  

Public Interest Disclosures 

During the reporting period, no public interest disclosures occurred. 

Monitoring Compliance 

Legislative deadlines for access requests were strictly monitored by using several Microsoft Lists trackers. The ATIP Manager organized ad hoc meetings to discuss request-related activities (such as whether internal consultations were necessary), determine deadlines, and ensure that all division members were informed of the status of requests. At bi-weekly team meetings with the Senior General Counsel and Senior Counsel, Internal Services, the ATIP Manager raised and discussed compliance with legislative and policy obligations. The Executive Director was also briefed on all ATIP compliance issues.  

For contracts issued during the reporting period, the Secretariat included a Standard Procurement Clause on the Handling of Personal Information or a Supplemental General Condition on Personal Information from Public Services and Procurement Canada’s Standard Acquisition Clauses and Conditions Manual.

Appendices

Appendix A: Delegation Order

Access to Information Act Designation Order

The Executive Director of the National Security and Intelligence Review Agency, pursuant to section 95 of the Access to Information Act, hereby designates the persons holding the positions or acting in these positions, set out in the schedule hereto to exercise the powers and perform the duties and functions of the Executive Director of the National Security and Intelligence Review Agency as the head of a government institution under the section of the Access to Information Act set out in the schedule opposite each position.

Privacy Act Designation Order

The Executive Director of the National Security and Intelligence Review Agency, pursuant to section 73 of the Privacy Act*, hereby designates the persons holding the positions or acting in these positions, set out in the schedule hereto to exercise the powers and perform the duties and functions of the Executive Director of the National Security and Intelligence Review Agency as the head of a government institution under the section of the Privacy Act set out in the schedule opposite each position.

Appendix B: 2023–2024 Statistical Report on the Privacy Act

Name of institution: National Security and Intelligence Review Agency

Reporting period: 2022-04-01 – 2023-03-31

Section 1: Request Under the Access to Information Act

1.1 Number of Requests
  Number of Requests
Received during reporting period 22
Outstanding from previous reporting period 5
Outstanding from more than one reporting period 0
Total 27
Closed during reporting period 25
Carried over to next reporting period 2
Carried over within legislated timeline 2
Carried over beyond legislated timeline 0
1.2 Channels of requests
Source Number of Requests
Online 22
E-mail 0
Mail 0
In person 0
Phone 0
Fax 0
Total 22

Section 2: Informal requests

2.1 Number of informal requests
  Number of Requests
Received during reporting period 1
Outstanding from previous reporting periods 0
Outstanding from more than one reporting period 0
Total 1
Closed during reporting period 0
Carried over to next reporting period 1
2.2 Channels of informal requests
Source Number of Requests
Online 0
E-Mail 1
Mail 0
In person 0
Phone 0
Fax 0
Total 1
2.3 Completion time of informal requests
Completion Time
1 to 15 days 16 to 30 Days 31 to 60 Days 61 to 120 Days 121 to 180 Days 181 to 365 Days More than 365 Days Total
0 0 0 0 0 0 0 0
2.4 Pages released informally
Less Than 100 Pages Processed 101-500 Pages Processed 501-1000 Pages Processed 1001-5000 Pages Processed More Than 5000 Pages Processed
Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed
0 0 0 0 0 0 0 0 0 0

Section 3: Requests Closed During the Reporting Period

3.1 Disposition and completion time
Disposition of Requests Completion Time
1 to 15 Days 16 to 30 Days 31 to 60 Days 61 to 120 Days 121 to 180 Days 181 to 365 Days More Than 365 Days Total
All disclosed 0 1 0 0 0 0 0 1
Disclosed in part 0 0 0 0 1 0 0 1
All exempted 0 0 0 0 0 0 0 0
All excluded 0 0 0 0 0 0 0 0
No records exist 1 6 6 3 0 0 0 16
Request abandoned 1 0 0 0 0 0 0 1
Neither confirmed nor denied 0 4 1 0 1 0 0 6
Total 2 11 7 3 2 0 0 25
3.2 Exemptions
Section Numbers of Requests
18(2) 0
19(1)(a) 0
19(1)(b) 0
19(1)(c) 0
19(1)(d) 0
19(1)(e) 0
19(1)(f) 0
20 0
21 0
22(1)(a)(i) 0
22(1)(a)(ii) 0
22(1)(a)(iii) 0
22(1)(b) 0
22(1)(c) 0
22(2) 0
22.1 0
22.2 0
22.3 0
22.4 0
23(a) 0
23(b) 0
24(a) 0
24(b) 0
25 0
26 1
27 1
27.1 0
28 0
3.3 Exclusions
Section Numbers of Requests
69(1)(a) 0
69(1)(b) 0
69.1 0
70(1) 0
70(1)(a) 0
70(1(b) 0
70(1)(c) 0
70(1)(d) 0
70(1)(e) 0
70(1)(f) 0
70.1 0
3.4 Format of information released
Paper Electronic Other
E-record Data set Video Audio
0 2 0 0 0 0
3.5 Complexity
3.5.1 Relevant pages processed and disclosed for paper and e-record formats
Number of Pages Processed Number of Pages Disclosed Number of Requests
4843 4843 9
3.5.2 Relevant pages processed per request disposition for paper and e-record formats by size of requests
Disposition Less Than 100 Pages Processed 101-500 Pages Processed 501-1000 Pages Processed 1001-5000 Pages Processed More Than 5000 Pages Processed
Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed
All disclosed 1 0 0 0 0 0 0 0 0 0
Disclosed in part 0 0 0 0 0 0 1 4843 0 0
All exempted 0 0 0 0 0 0 0 0 0 0
All excluded 0 0 0 0 0 0 0 0 0 0
Request abandoned 1 0 0 0 0 0 0 0 0 0
Neither confirmed nor denied 6 0 0 0 0 0 0 0 0 0
Total 8 0 0 0 0 0 1 4843 0 0
3.5.3 Relevant minutes processed and disclosed for audio formats
Number of Minutes Processed Number of Minutes Disclosed Number of Requests
0 0 0
3.5.4 Relevant minutes processed per request disposition for audio formats by size of requests
Disposition Less Than 60 Minutes Processed 60 – 120 Minutes Processed More than 120 Minutes Processed
Number of Requests Minutes Processed Number of Requests Minutes Processed Number of Requests Minutes Processed
All disclosed 0 0 0 0 0 0
Disclosed in part 0 0 0 0 0 0
All exempted 0 0 0 0 0 0
All excluded 0 0 0 0 0 0
Request abandoned 0 0 0 0 0 0
Neither confirmed nor denied 0 0 0 0 0 0
Declined to act with the approval of the Information Commissioner 0 0 0 0 0 0
Total 0 0 0 0 0 0
3.5.5 Relevant minutes processed and disclosed for video formats
Number of Minutes Processed Number of Minutes Disclosed Number of Requests
0 0 0
3.5.6 Relevant minutes processed per request disposition for video formats by size of requests
Disposition Less Than 60 Minutes Processed 60 – 120 Minutes Processed More than 120 Minutes Processed
Number of Requests Minutes Processed Number of Requests Minutes Processed Number of Requests Minutes Processed
All disclosed 0 0 0 0 0 0
Disclosed in part 0 0 0 0 0 0
All exempted 0 0 0 0 0 0
All excluded 0 0 0 0 0 0
Request abandoned 0 0 0 0 0 0
Neither confirmed nor denied 0 0 0 0 0 0
Total 0 0 0 0 0 0
3.5.7 Other complexities
Disposition Consultation Required Assessment of Fees Legal Advice Sought Other Total
All disclosed 0 0 0 0 0
Disclosed in part 0 1 0 0 1
All exempted 0 0 0 0 0
All excluded 0 0 0 0 0
Request abandoned 0 0 0 0 0
Neither confirmed nor denied 0 0 0 0 0
Total 0 1 0 0 1
3.6 Closed requests
3.6.1 Requests closed within legislated timelines
  Requests closed within legislated timelines
Number of requests closed within legislated timelines 14
Percentage of requests closed within legislated timelines (%) 56
3.7 Deemed refusals
3.7.1 Reasons for not meeting legislated timelines
Number of Requests Closed Past the Legislated Timelines Principal Reason
Interference with Operations/Workload External Consultation Internal Consultation Other
11 10 0 1 0
3.7.2 Requests closed beyond legislated timelines (including any extension taken)
Number of Days Past Legislated Timelines Number of Requests Past Legislated Timeline Where No Extension Was Taken Number of Requests Past Legislated Timeline Where an Extension Was Taken Total
1 to 15 Days 4 0 4
16 to 30 Days 2 0 2
31 to 60 Days 2 0 2
61 to 120 Days 1 1 2
121 to 180 Days 0 1 1
181 to 365 Days 0 0 0
More than 365 Days 0 0 0
Total 9 2 11
3.8 Requests for translation
Translation Requests Accepted Refused Total
English to French 0 0 0
French to English 0 0 0
Total 0 0 0

Section 4: Disclosures Under Subsections 8(2) and 8(5)

Paragraph 8(2)(e) Paragraph 8(2)(m) Subsection 8(5) Total
0 0 0 0

Section 5: Requests for Correction of Personal Information and Notations

Disposition for Correction Requests Received Number
Notations attached 0
Requests for correction accepted 0
Total 0

Section 6: Extensions

6.1 Reasons for extensions and disposition of requests
Number of requests where an extension was taken 15(a)(i) Interference with operations 9(1)(b) Consultation 9(1)(b) Consultation
Further review required to determine exemptions Large volume of pages Large volume of requests Documents are difficult to obtain Cabinet Confidence Section (Section 70) External Internal
2 0 1 0 0 0 0 1 0
6.2 Length of extensions
Length of Extensions 15(a)(i) Interference with operations 9(1)(b) Consultation 9(1)(b) Consultation
Further review required to determine exemptions Large volume of pages Large volume of requests Documents are difficult to obtain Cabinet Confidence Section (Section 70) External Internal
1 to 15 days 0 0 0 0 0 0 0 0
16 to 30 days 0 1 0 0 0 0 1 0
31 days or greater               0
Total 0 1 0 0 0 0 1 0

Section 7: Consultations Received From Other Institutions and Organizations

7.1 Consultations received from other Government of Canada institutions and other organizations
Consultations Other Government of Canada Institutions Number of Pages to Review Other Organizations Number of Pages to Review
Received during reporting period 0 0 0 0
Outstanding from the previous reporting period 0 0 0 0
Total 0 0 0 0
Closed during the reporting period 0 0 0 0
Carried over within regotiated timelines 0 0 0 0
Carried over beyond negotiated timelines 0 0 0 0
7.2 Recommendations and completion time for consultations received from other Government of Canada institutions
Recommendation Number of Days Required to Complete Consultation Requests
1 to 15 Days 16 to 30 Days 31 to 60 Days 61 to 120 Days 121 to 180 Days 181 to 365 Days More Than 365 Days Total
Disclose entirely 0 0 0 0 0 0 0 0
Disclose in part 0 0 0 0 0 0 0 0
Exempt entirely 0 0 0 0 0 0 0 0
Exclude entirely 0 0 0 0 0 0 0 0
Consult other institution 0 0 0 0 0 0 0 0
Other 0 0 0 0 0 0 0 0
Total 0 0 0 0 0 0 0 0
7.3 Recommendations and completion time for consultations received from other organizations outside the Government of Canada
Recommendation Number of Days Required to Complete Consultation Requests
1 to 15 Days 16 to 30 Days 31 to 60 Days 61 to 120 Days 121 to 180 Days 181 to 365 Days More Than 365 Days Total
Disclose entirely 0 0 0 0 0 0 0 0
Disclose in part 0 0 0 0 0 0 0 0
Exempt entirely 0 0 0 0 0 0 0 0
Exclude entirely 0 0 0 0 0 0 0 0
Consult other institution 0 0 0 0 0 0 0 0
Other 0 0 0 0 0 0 0 0
Total 0 0 0 0 0 0 0 0

Section 8: Completion Time of Consultations on Cabinet Confidences

8.1 Requests with Legal Services
Number of Days Fewer Than 100 Pages Processed 101-500 Pages Processed 501-1000 Pages Processed 1001-5000 Pages Processed More Than 5000 Pages Processed
Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed
1 to 15 0 0 0 0 0 0 0 0 0 0
16 to 30 0 0 0 0 0 0 0 0 0 0
31 to 60 0 0 0 0 0 0 0 0 0 0
61 to 120 0 0 0 0 0 0 0 0 0 0
121 to 180 0 0 0 0 0 0 0 0 0 0
181 to 365 0 0 0 0 0 0 0 0 0 0
More than 365 0 0 0 0 0 0 0 0 0 0
Total 0 0 0 0 0 0 0 0 0 0
8.2 Requests with Privy Council Office
Number of Days Fewer Than 100 Pages Processed 101-500 Pages Processed 501-1000 Pages Processed 1001-5000 Pages Processed More Than 5000 Pages Processed
Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed Number of Requests Pages Disclosed
1 to 15 0 0 0 0 0 0 0 0 0 0
16 to 30 0 0 0 0 0 0 0 0 0 0
31 to 60 0 0 0 0 0 0 0 0 0 0
61 to 120 0 0 0 0 0 0 0 0 0 0
121 to 180 0 0 0 0 0 0 0 0 0 0
181 to 365 0 0 0 0 0 0 0 0 0 0
More than 365 0 0 0 0 0 0 0 0 0 0
Total 0 0 0 0 0 0 0 0 0 0

Section 9: Complaints and Investigations Notices Received

Section 31 Section 33 Section 35 Court action Total
3 10 3 0 16

Section 10: Privacy Impact Assessments (PIAs) and Personal Information Banks (PIBS)

10.1 Privacy Impact Assessments
Number of PIA(s) completed Number of PIAs modified
1 1
10.2 Institution-specific and Central Personal Information Banks
Personal Information Banks Active Created Terminated Modified
Institution-specific 0 0 0 0
Central 0 0 0 0
Total 0 0 0 0

Section 11: Privacy Breaches

11.1 Material Privacy Breaches reported
Number of material privacy breaches reported to TBS Number of material privacy breaches reported to OPC
0 0
11.2 Non-Material Privacy Breaches
Number of non-material privacy breaches
0
12.1 Allocated Costs
Expenditures Amount
Salaries $100,000
Overtime $0
Goods and Services $15,475
Professional services contracts $15,475
Other $0
Total $115,475
12.2 Human Resources
Resources Person Years Dedicated to Access to Information Activities
Full-time employees 1.000
Part-time and casual employees 0.000
Regional Staff 0.000
Consultants and agency personnel 0.300
Students 0.500
Total 1.800

Note: Enter values to three decimal places.

Appendix C: Supplemental Statistical Report on the Access to Information Act and Privacy Act

Section 1: Open Requests and Complaints Under the Access to Information Act

1.1 Enter the number of open requests that are outstanding from previous reporting periods.
  Number of weeks
Able to receive requests by mail 52
Able to receive requests by email 52
Able to receive requests through the digital request service 52
1.2 Enter the number of open complaints with the Information Commissioner of Canada that are outstanding from previous reporting periods.
Fiscal Year Open Complaints Were Received by Institution Number of Open Complaints
Received in 2023-24 0
Received in 2022-23 0
Received in 2021-22 0
Received in 2020-21 0
Received in 2019-21 0
Received in 2018-19 0
Received in 2017-18 0
Received in 2016-17 0
Received in 2015-26 0
Received in 2014-15 or earlier 0

Section 2: Open Requests and Complaints Under the Privacy Act

2.1 Enter the number of open requests that are outstanding from previous reporting periods.
Fiscal Year Open Complaints Were Received by Institution Open Requests that are Within Legislated Timelines as of March 31, 2024 Open Requests that are Beyond Legislated Timelines as of March 31, 2024 Total
Received in 2023-24 2 0 2
Received in 2022-23 0 0 0
Received in 2021-22 0 0 0
Received in 2020-21 0 0 0
Received in 2019-21 0 0 0
Received in 2018-19 0 0 0
Received in 2017-18 0 0 0
Received in 2016-17 0 0 0
Received in 2015-26 0 0 0
Received in 2014-15 or earlier 0 0 0
Total 2 0 2
2.2 Enter the number of open complaints with the Privacy Commissioner of Canada that are outstanding from previous reporting periods.
Fiscal Year Open Complaints Were Received by Institution Number of Open Complaints
Received in 2023-24 0
Received in 2022-23 7
Received in 2021-22 0
Received in 2020-21 0
Received in 2019-21 0
Received in 2018-19 0
Received in 2017-18 0
Received in 2016-17 0
Received in 2015-26 0
Received in 2014-15 or earlier 0
Total 7

Section 3: Social Insurance Number

Has your institution begun a new collection or a new consistent use of the SIN in 2023-24 No

Section 4: Universal Access under the Privacy Act

How many requests were received from foreign nationals outside of Canada in 2023-24 0
Share this page
Date Modified:

Departmental Results Report: 2023-24

Meta data information

Cat. Number: PS106-8E-PDF
ISSN: 2563-5174

© His Majesty the King in Right of Canada, 2024

Date of Publishing:

From the Executive Director

I am pleased to present the National Security and Intelligence Review Agency (NSIRA) Secretariat’s Departmental Results Report for fiscal year 2023-24. This year, the Secretariat has effectively met its goals by supporting NSIRA in delivering comprehensive, impactful reviews and ensuring the integrity of complaint investigations. We have built upon our previous successes, significantly enhancing our capacity and expertise across all areas.

In 2023-24, the NSIRA Secretariat supported numerous national security and intelligence reviews, producing a range of high-quality expert reports, including ministerial reports, compliance reports, annual reports destined for tabling in Parliament, and NSIRA’s first special report.  The reviews covered various Government of Canada organizations and were shared with key government leaders.

Our outreach and collaboration initiatives have bolstered NSIRA’s relationships with domestic review bodies, agents of Parliament, and international counterparts. The Secretariat played a pivotal role in hosting an international annual conference of NSIRA’s key partners, fostering the exchange of knowledge and best practices. This year, we also established connections with European partners and participated in key international oversight and review activities.

In terms of complaint investigations, the NSIRA Secretariat has continued to support the agency in the refinement of investigation processes, prioritizing timeliness, efficiency, and transparency. We have stabilized investigative procedures to ensure fair and timely conduct. With the normalization of our work environment post-pandemic, our efficiency increased, resulting in numerous formal investigations and informal resolutions. The implementation of service standards for investigative processes has been highly successful. Additionally, in cooperation with a domestic partner, we completed a study on the collection of race-based and demographic data, supporting anti-racism initiatives.

I extend my deepest gratitude to all NSIRA Secretariat employees for their unwavering dedication and commitment to our mission. Their efforts have ensured that our work reflects the highest standards and continues to ensure that Government of Canada security and intelligence activities are subject to expert scrutiny and independent assessment for legal compliance, reasonableness and necessity.

John Davies
Executive Director
National Security and Intelligence Review Agency

Results at a glance

A departmental results report provides an account of actual accomplishments against plans, priorities and expected results set out in the associated Departmental Plan.

Key priorities

NSIRA Secretariat’s top priorities for 2023-24 were as follows:

  • Mandatory reviews related to the Canadian Security Intelligence Service (CSIS), the Communications Security Establishment (CSE), the Security of Canada Information Disclosure Act and Governor in Council directions under the Avoiding Complicity in Mistreatment by Foreign Entities Act.
  • Completing the Review of the dissemination of intelligence on People’s Republic of China political foreign interference, 2018-2023, which was submitted to the Prime Minister as NSIRA’s first ever special report, and subsequently tabled in Parliament.
  • Meeting the newly implemented NSIRA Service Standards for the timely investigations of complaints.
  • Successfully hosting, in Ottawa, the annual conference of the Five Eyes Intelligence Oversight and Review Council.
  • Keeping the NSIRA Secretariat facility expansion project on track for successful completion and timely relocation of employees to the new workspace.

Highlights

In 2023-24, total actual spending (including internal services) for NSIRA Secretariat was $14,962,179 and total actual human resources spending was $11,861,196. For complete information on NSIRA Secretariat’s total spending and human resources, read the Spending and human resources section of the full report.

The following provides a summary of the department’s achievements in 2023-24 according to its approved Departmental Results Framework. A Departmental Results Framework consists of a department’s core responsibilities, the results it plans to achieve and the performance indicators that measure progress toward these results.

Core responsibility 1: National Security and Intelligence Reviews and Complaints Investigations

Actual spending: $7,307,710

Actual human resources: 51

Departmental results achieved

Ministers and Canadians are informed whether national security and intelligence activities undertaken by Government of Canada institutions are lawful, reasonable and necessary

NSIRA Secretariat staff supported NSIRA in the completion of 11 national security and intelligence reviews over the course of the 2023-24 fiscal year. A total of 13 Government of Canada organizations were subject to review and eight Ministers, plus the Prime Minister, went on to receive one or more of the NSIRA reports that were approved by members in the 2023-24 fiscal year.

Results achieved  

  • 10 section 34 ministerial reports
  • 12 section 35 compliance reports
  • 1 section 39 report on disclosures under the Security of Canada Information Disclosure Act
  • NSIRA’s first ever section 40 special report to the Prime Minister, which was tabled in Parliament

Two departments were subject to NSIRA review for the first time: TBS and SSC.

National security related complaints are independently investigated in a timely manner

In 2023-24, the NSIRA Secretariat advanced its investigative processes, focusing on timeliness, efficiency, and transparency. The number of investigations remained high, with a notable rise in complaints about CSIS delays in security assessments for immigration.

The Secretariat enhanced its investigative fairness and efficiency by implementing new procedures and practices. With the easing of COVID-19 restrictions, NSIRA’s efficiency improved, completing six formal investigations and resolving seven complaints informally.

New service standards were introduced on April 1, 2023, setting internal time limits for investigative steps. NSIRA achieved a 100% success rate in meeting these standards.

Additionally, NSIRA and the CRCC concluded a study on collecting race-based and demographic data to support anti-racism initiatives. This collaboration will continue into 2024-25.

More information about National Security and Intelligence Reviews and Complaints Investigations can be found in the Results – what we achieved section of the full departmental results report.

Results: what we achieved

Core responsibilities and internal services

Core responsibility 1: National Security and Intelligence Reviews and Complaints

In this section

  • Description
  • Progress on results
  • Key risks
  • Resources required to achieve results
  • Related government-wide priorities
  • Program inventory

Description

NSIRA reviews Government of Canada national security and intelligence activities to assess whether they are lawful, reasonable, and necessary. The Agency also investigates complaints from members of the public on the activities of the Canadian Security Intelligence Service (CSIS), the Communications Security Establishment (CSE), the Royal Canadian Mounted Police (RCMP), as well as certain other national security-related complaints, independently and in a timely manner.

The NSIRA Secretariat supports the Agency in the delivery of its mandate. Independent scrutiny contributes to strengthening the accountability framework for national security and intelligence activities and to enhancing public confidence. Ministers and Canadians are informed whether national security and intelligence activities undertaken by Government of Canada institutions are lawful, reasonable, and necessary.

Progress on results

This section presents details on how the department performed to achieve results and meet targets for National Security and Intelligence Reviews and Complaints. Details are presented by departmental result.

Table 1: Targets and results for National Security and Intelligence Reviews and Complaints

Table 1 provides a summary of the target and actual results for each indicator associated with the results under National Security and Intelligence Reviews and Complaints.

Ministers and Canadians are informed whether national security and intelligence activities undertaken by Government of Canada institutions are lawful, reasonable and necessary
Departmental results Target Date to achieve target Actual Results
All mandatory reviews are completed on an annual basis 100% completion of mandatory reviews 2021–22 2021–22: 100%
2022–23: 100%
2023–24: 100%
Reviews of national security or intelligence activities of at least five departments or agencies are conducted each year At least one national security or intelligence activity is reviewed in at least five departments or agencies annually 2021–22 2021–22: 100%
2022–23: 100%
2023–24: 100%
All high priority national security or intelligence activities, as approved by members, are reviewed over a three-year period 100% completion over three years; at least 33% completed each year 2021–22 2021–22: 33%
2022–23: 33%
2023–24: 33%
Departmental results Target Date to achieve target Actual Results
Percentage of investigations completed within NSIRA Secretariat service standards. 90% 2022–23 2021–22: N/A
2022–23: N/A
2023–24: 100%
Note: The NSIRA Secretariat was created on July 12, 2019. Actual results for 2020–21 are not available because the new Departmental Results Framework in the changeover from the Security Intelligence Review Committee to the NSIRA Secretariat was being developed. This new framework is for measuring and reporting on results achieved starting in 2021–22.

Additional information on the detailed results and performance information for the NSIRA Secretariat’s program inventory is available on GC InfoBase.

Details on results

The following section describes the results for National Security and Intelligence Reviews and Complaints Investigations in 2023–24 compared with the planned results set out in NSIRA Secretariat’s departmental plan for the year.

Ministers and Canadians are informed whether national security and intelligence activities undertaken by Government of Canada institutions are lawful, reasonable and necessary

NSIRA Secretariat staff supported NSIRA in the completion of 11 national security and intelligence reviews over the course of the 2023-24 fiscal year. A total of 13 Government of Canada organizations were subject to review and eight Ministers, plus the Prime Minister, went on to receive one or more of the NSIRA reports that were approved by members in the 2023-24 fiscal year.

  • 10 section 34 ministerial reports
  • 12 section 35 compliance reports
  • 1 section 39 report on disclosures under the Security of Canada Information Disclosure Act
  • NSIRA’s first ever section 40 special report to the Prime Minister, which was tabled in Parliament

Of the 11 reviews completed this year, three reviews included multiple Government of Canada organizations by design.  These three multi-organization reviews were:

  • The annual review of disclosures under the Security of Canada Information Disclosure Act (SCIDA)
  • The annual review of the implementation of directions issued under the Avoiding Complicity in Mistreatment by Foreign Entities Act (ACA)
  • Review of the dissemination of intelligence on People’s Republic of China political foreign interference, 2018-2024

All Departments/agencies covered in these multi-organizational reviews were:  Canada Border Services Agency (CBSA), Canada Revenue Agency (CRA), Communications Security Establishment (CSE), Canadian Security Intelligence Service (CSIS), Department of Fisheries and Oceans (DFO), Department of National Defence and Canadian Armed Forces (DND/CAF), Financial Transactions and Reports Analysis Centre of Canada (FINTRAC), Global Affairs Canada (GAC), Immigration, Refugees and Citizenship Canada (IRCC), Privy Council Office (PCO), Public Safety Canada (PS), Royal Canadian Mounted Police (RCMP), and Transport Canada (TC).

Of the 11 reviews completed this year, four reviews focused on a topic that involved one Government of Canada organization:

  • CSIS – two reviews
  • CBSA – one review
  • DND/CAF – one review

Of the 11 reviews completed reviews this year, four reviews focused on topics that spanned across two Government of Canada organizations:

  • CSE and CSIS – one review
  • CSE and Treasury Board Secretariat (TBS) – one review
  • CSE and Shared Services Canada (SSC) – one review
  • CSIS and PS – one review

Two departments were subject to NSIRA review for the first time: TBS and SSC.

During the reporting period, the Secretariat continued to refine its processes and methodology to assist the NSIRA review mandate, with the goal of promoting high-quality, impactful reviews. This maturation included the implementation of developed tracking and data collection with a view to using business intelligence to support data-informed decision-making and to optimize review operations.  NSIRA Secretariat staff promoted transparency and accountability by working with CBSA, CRA, CSE, CSIS, DFO, DND/CAF, FINTRAC, GAC, IRCC, PS, RCMP and TC to redact and proactively publish 7 reports on the NSIRA website.

National security related complaints are independently investigated in a timely manner

In 2023-24, the NSIRA Secretariat saw the continued maturation of the processes underpinning the fulfillment of its investigation mandate. The conduct of the investigative process has increased its emphasis on timeliness and efficiency, as well as transparency in order to enhance the relevance of the process for complainants.

The level of investigative activities remained high and included an increase in complaints against CSIS with respect to delays in security assessments related to immigration applications. 

During the past year, NSIRA Secretariat stabilized its investigative processes for complaints as a result of the implementation of procedures and practices that ensured that the conduct of investigations is fair, timely and transparent. With the normalization of the NSIRA Secretariat’s work environment as a result of the dissipation of the constraints related to the COVID-19 pandemic, NSIRA investigations have seen an increase in efficiency. NSIRA completed six formal investigations and issued final reports in those cases, and concluded seven complaint matters by way of informal resolutions.

As of April 1, 2023, the NSIRA Secretariat implemented service standards related to the investigation of complaints. The service standards set internal time limits for important investigative steps for each type of complaint, under normal circumstances. The service standards specify the circumstances under which those time limits do not apply. The development of the service standards includes tracking and data collection on whether the NSIRA Secretariat is meeting its own service standards in the investigation of complaints. In 2023-24, it reached a success rate of 100% in meeting them.

Finally, the NSIRA Secretariat completed the last phase of a study on the collection of race-based data and other demographic information jointly commissioned with the CRCC. The study undertook work to assess the viability of the collection of identity-based and demographic data as part of the Government of Canada’s ongoing anti-racism initiatives. Improved, more precise and more consistent tracking, collection and measurement of data is necessary to support anti-racism efforts in government. NSIRA continued its collaboration with the CRCC in determining an implementation strategy and this work will continue in 2024-25.

Outreach and collaboration

Engagement and collaboration with current and new partners as well as public outreach were a big part of the support provided to NSIRA by Secretariat staff this year. Secretariat staff engaged in regular interactions with their counterparts in domestic review bodies such as the Secretariat of the National Security and Intelligence Committee of Parliamentarians and the Civilian Review and Complaints Commission to coordinate activities in a way to avoid of duplication in review efforts. Secretariat staff also established new collaborative relationships with counterparts at the various Agents of Parliament. In Fall 2023, the Secretariat supported NSIRA in hosting the Five Eyes Intelligence Oversight and Review Council (FIORC) annual conference in Ottawa. The 3-day event brought together review representatives from Canada, the United States, Australia, New Zealand, and the United Kingdom. The event was hosted in partnership with the Office of the Intelligence Commissioner. Secretariat staff further engaged in regular working level interactions with FIORC partners for the exchange of best practices and for the development of training in a variety of areas. As a result of Secretariat engagement efforts, NSIRA was able to establish important new connections with European partners and participated in the European Intelligence Oversight Conference. NSIRA also secured observer status participation in the Intelligence Oversight Working Group which gathers European oversight and review bodies. Secretariat staff also supported NSIRA in the production of the NSIRA Public Annual Report; the main public report informing Canadians about NSIRA’s work. In addition, Secretariat staff implemented timelier regular publication of unclassified versions of NSIRA reports throughout the year to engage the Canadian public regularly about NSIRA’s work.

Key risks

Effective review requires timely and complete responses to NSIRA’s requests for information, open and candid briefings, and mutual respect. Despite NSIRA’s expansive access rights under the NSIRA Act, Secretariat staff continued to note some instances where Government of Canada organizations did not prioritize the work of review or were not fully responsive to access requests. Compounding these challenges were outdated information management systems and practices within many reviewed organizations, which slowed down responsiveness. While work remains to be done on this front, Secretariat staff have shown excellent resilience and persistance in pushing Government of Canada organizations that are subject to NSIRA review to meet NSIRA’s expectations of responsiveness as an independent review body.

With respect to the Secretariat’s service standards, one risk to the achievement of the planned results for this core responsibility is the procedural unpredictability of NSIRA’s investigations due to the quasi-judicial nature of the process and the institutional independence of NSIRA members in the conduct of their investigations. Procedural unpredictability may result in some investigations becoming more protracted than others depending on the complexity of the complaint that NSIRA must address. In order to mitigate such a risk, the Secretariat’s service standards for the key steps in the process require that all necessary information, including documentary and oral evidence, be before NSIRA for the steps in question to be completed. With the variances in the length of time required for this totality of information to be before NSIRA, the Secretariat’s risk of a service standard lapsing is mitigated.

Resources required to achieve results

Table 2: Snapshot of resources required for National Security and Intelligence Reviews and Complaints Investigations

Table 2 provides a summary of the planned and actual spending and full-time equivalents (FTEs) required to achieve results.

Resource Planned Actual
Spending $10,807,324 $7,307,710
Full-time equivalents 69 51

Complete financial and human resources information for the NSRIA Secretariat’s program inventory is available on GC InfoBase.

Gender-based analysis plus

In the fiscal year 2023-2024, the NSIRA Secretariat has continued to advance the Human Rights, Accessibility, Employment Equity, Diversity, and Inclusion (EEDI) Action Plan initiated on April 1, 2022. This includes incorporating a GBA+ lens into the design and implementation of policies and programs.

The Secretariat has continued to align its policies, programs, and practices with human rights, accessibility, and EE principles. The NSIRA Secretariat completed the final phase of a study on the collection of race-based and other demographic data, conducted in collaboration with the CRCC. This study evaluated the feasibility of collecting identity-based and demographic information to support the Government of Canada’s ongoing anti-racism initiatives. Enhanced, accurate, and consistent tracking, collection, and measurement of this data are essential for advancing anti-racism efforts within the government. NSIRA continued to work with the CRCC to develop an implementation strategy, with plans to further this initiative in 2024-25.

This year saw the publication of our Accessibility Plan – First Progress Report, which focused on increasing awareness and improving accessibility within the workforce and workplace. Through internal capacity building and new service agreements, NSIRA aims to address previously lagging areas and integrate accessibility sustainably across all operations.

In spring 2023, the Public Service Employee Survey (PSES) 2022 results were released to all staff, providing an opportunity to reflect on NSIRA employees’ views on the organization’s strengths and challenges regarding diversity and inclusion.

Additionally, the NSIRA Secretariat has initiated the development of a pay equity plan to ensure equitable compensation for all employees in compliance with the Pay Equity Act. These efforts reflect NSIRA’s ongoing commitment to fostering a more inclusive and equitable environment.

United Nations 2030 Agenda for Sustainable Development and the Sustainable Development Goals

More information on NSRIA Secretariat’s contributions to Canada’s Federal Implementation Plan on the 2030 Agenda and the Federal Sustainable Development Strategy can be found in our Departmental Sustainable Development Strategy.

Internal services

In this section

  • Description
  • Progress on results
  • Resources required to achieve results
  • Contracts awarded to Indigenous business

Description

Internal services are the services that are provided within a department so that it can meet its corporate obligations and deliver its programs. There are 8 categories of internal services:

  • management and oversight services
  • human resources management services
  • financial management services
  • information management services
  • information technology services
  • real property management services
  • materiel management services
  • acquisition management services

Progress on results

This section presents details on how the department performed to achieve results and meet targets for internal services.

During the reporting period, the NSIRA Secretariat continued to take steps to ensure resources were deployed in the most effective and efficient manner possible and its operations and administrative structures, tools and processes continued to focus on supporting the delivery of its priorities. Several tools to improve the ability for budget managers to plan and forecast were deployed and implemented in the forecasting cycle.

The Secretariat recognizes the need to be an inclusive, healthy, and flexible employer. Over the past year, we have encouraged flexible working arrangements, such as teleworking, to achieve work–life balance and meet performance expectations.

With the collaboration from PSPC, RCMP and CSE, the NSIRA Secretariat has completed a two-year construction project and has expanded its footprint with the addition of approx. 50 workstations with an occupancy target date of August 2024. The facilities team will continue the work associated with the Accessibility Canada Act management action plan, specifically the built environment.

The NSIRA Secretariat has explored various tools to assist with the material management program and will seek to implement the solution in the coming fiscal years once the tools and resources are in place.

The implementation of GCdocs within our organization is progressing significantly, reflecting our commitment to improving our information management. We have recently completed the configuration of the Protected B GCdocs environment, aligned with the updated organizational file plan. Additionally, we have initiated the document migration plan, marking a key milestone in our transition toward more efficient, secure, and compliant document handling. This advancement supports our goal of enhancing productivity, ensuring regulatory compliance, and improving collaboration across our organization.

Resources required to achieve results

Table 3: Resources required to achieve results for internal services this year

Table 3 provides a summary of the planned and actual spending and full-time equivalents (FTEs) required to achieve results.

Resource Planned Actual
Spending $12,201,901 $7,654,469
Full-time equivalents 31 24

The complete financial and human resources information for the NSIRA Secretariat’s program inventory is available on GC InfoBase.

Contracts awarded to Indigenous businesses

Government of Canada departments are to meet a target of awarding at least 5% of the total value of contracts to Indigenous businesses each year. This commitment is to be fully implemented by the end of 2024–25.

NSIRA Secretariat is a Phase 3 department and is aiming to achieve the minimum 5% target by the end of 2024–25. For the year 2023-24, the actual percentage was 1% which includes commodities from Economic Object Code 1172 – Offices and Stationary Supplies and Economic Code 0630 Repairs and Maintenance Office buildings.

Some of the measures the NSIRA secretariat is taking to achieve the 5% minimum target include the implementation of a strategy to create more opportunities for Indigenous businesses, implementing tools such as an addition to our internal checklist that requires that indigenous procurement options are considered and the possibility of initiating discussion around potential set asides or areas of focus for indigenous procurement.

The Secretariat continues to explore various ways to improve our implementation strategy to create more opportunities for Indigenous businesses by including a periodic review of results against target and potential system adjustments to allow for more accurate and efficient tracking.

Spending and human resources 

In this section

  • Spending
  • Funding
  • Financial statement highlights
  • Human resources

Spending

This section presents an overview of the department’s actual and planned expenditures from 2021–22 to 2026–27.

Budgetary performance summary

Table 4 Actual three-year spending on core responsibilities and internal services (dollars)

Table 4 presents how much money NSIRA Secretariat spent over the past three years to carry out its core responsibilities and for internal services.

Core responsibilities and internal services 2023–24 Main Estimates 2023–24 total authorities available for use Actual spending over three years (authorities used)
National Security and Intelligence Reviews and Complaints Investigations $10,807,324 $11,622,473 • 2021–22: $7,394,642
• 2022–23: $7,756,271
• 2023–24: $9,110,398
Internal services $12,201,901 $12,568,128 • 2021–22: $9,895,112
• 2022–23: $10,532,876
• 2023–24: $10,535,328
Total $23,009,225 $24,115,856
Analysis of the past three years of spending

More financial information from previous years is available on the Finances section of GC Infobase.

Table 5 Planned three-year spending on core responsibilities and internal services (dollars)

Table 5 presents how much money NSIRA Secretariat’s plans to spend over the next three years to carry out its core responsibilities and for internal services.

Core responsibilities and internal services 2024–25 planned spending 2025–26 planned spending 2026–27 planned spending
National Security and Intelligence Reviews and Complaints Investigations $10,852,987 $10,852,051 $10,852,051
Internal services $7,722,123 $7,758,034 $7,758,034
Total $18,575,110 $18,610,085 $18,610,085
Analysis of the next three years of spending

Spending over the next three years is anticipated to remain constant as the facilities fit-up and expansion is completed and the organization is nearing a steady state. No additional special projects are planned that would impact overall spending.

More detailed financial information from previous years is available on the Finances section of GC Infobase.

Funding

This section provides an overview of the department’s voted and statutory funding for its core responsibilities and for internal services. For further information on funding authorities, consult the Government of Canada budgets and expenditures.

Graph 1: Approved funding (statutory and voted) over a six-year period

Graph 1 summarizes the department’s approved voted and statutory funding from 2021-22 to 2026-27.

Bar graph that summarizes the department’s approved voted and statutory funding from 2021-22 to 2026-27
2021-22 2022-23 2023-24 2024-25 2025-26 2026-27
Statutory 1,176,321 1,300,166 1,755,229 1,764,845 1,766,593 1,766,593
Voted 16,113,433 16,988,980 21,253,996 16,810,265 16,843,492 16,843,492
Total 17,289,754 18,289,147 23,009,225 18,575,110 18,610,085 18,610,085
Analysis of statutory and voted funding over a six-year period

Funding over the next six years is anticipated to remain constant as the facilities fit-up and expansion is completed and the organization is nearing a steady state. No additional special projects are planned or anticipated that would necessitate additional funding.

For further information on NSIRA Secretariat’s departmental voted and statutory expenditures, consult the Public Accounts of Canada.

Financial statement highlights

NSIRA Secretariat’s complete financial statements (unaudited) for the year ended March 31, 2024, are available online.

Table 6 Condensed Statement of Operations (unaudited) for the year ended March 31, 2024 (dollars)

Table 6 summarizes the expenses and revenues for 2023–24 which net to the cost of operations before government funding and transfers.

Financial information 2023–24 actual results 2023–24 planned results Difference (actual results minus planned)
Total expenses $18,223 $23,009 -$4,786
Total revenues $0 $0 $0
Net cost of operations before government funding and transfers $18,223 $23,009 -$4,786

The 2023–24 planned results information is provided in NSIRA Secretariat’s Future-Oriented Statement of Operations and Notes 2023–24.

Table 7 summarizes actual expenses and revenues which net to the cost of operations before government funding and transfers.

Financial information 2023–24 actual results 2022–23 actual results Difference (2023-24 minus 2022-23)
Total expenses $18,223 $19,586 -$1,363
Total revenues $0 $0 $0
Net cost of operations before government funding and transfers $18,223 $19,586 -$1,363

Table 8 Condensed Statement of Financial Position (unaudited) as of March 31, 2024 (dollars) 

Table 8 provides a brief snapshot of the department’s liabilities (what it owes) and assets (what the department owns), which helps to indicate its ability to carry out programs and services.

Financial information Actual fiscal year (2023–24) Previous fiscal year (2022–23) Difference (2023–24 minus 2022–23)
Total net liabilities $2,374 $2,050 $324
Total net financial assets $1,779 $1,578 $201
Departmental net debt $595 $472 $123
Total non-financial assets $7,391 $2,240 $5,151
Departmental net financial position $6,796 $1,768 $5,028

Human resources

This section presents an overview of the department’s actual and planned human resources from 2021–22 to 2026–27. 

Table 9: Actual human resources for core responsibilities and internal services

Table 9 shows a summary of human resources, in full-time equivalents (FTEs), for NSIRA Secretariat’s core responsibilities and for its internal services for the previous three fiscal years.

Core responsibilities and internal services 2021–22 actual FTEs 2022–23 actual FTEs 2023–24 actual FTEs
National Security and Intelligence Reviews and Complaints Investigations 52 53 51
Internal services 22 25 24
Total 74 78 75
Analysis of human resources over the last three years

The increase in FTEs from 74 in 2021–22 to 78 in 2022–23 is primarily a result of the staffing of vacant positions. There have been no significant differences in the past two years. NSIRA Secretariat human resources is expected to remain constant. Minor fluctuations reflect normal staff turnover.

Table 10: Human resources planning summary for core responsibilities and internal services

Table 10 shows information on human resources, in full-time equivalents (FTEs), for each of NSIRA Secretariat’s core responsibilities and for its internal services planned for the next three years. Human resources for the current fiscal year are forecasted based on year to date. 

Core responsibilities and internal services 2024–25 planned FTEs 2025–26 planned FTEs 2026–27 planned FTEs
National Security and Intelligence Reviews and Complaints Investigations 69 69 69
Internal services 31 31 31
Total 100 100 100
Analysis of human resources for the next three years

FTE count to remain constant across the board.

Corporate information

Departmental profile

Appropriate minister(s): The Right Honourable Justin Trudeau, Prime Minister of Canada

Institutional head: Charles Fugère, Executive Director

Ministerial portfolio: Privy Council Office

Enabling instrument(s): National Security and Intelligence Review Agency Act

Year of incorporation / commencement: 2019

Departmental contact information

Mailing address:

National Security and Intelligence Review Agency Secretariat
P.O. Box 2430, Station B
Ottawa, Ontario
K1P 5W5

Email: info@nsira-ossnr.gc.ca

Website(s): https://nsira-ossnr.gc.ca/

Federal tax expenditures

The tax system can be used to achieve public policy objectives through the application of special measures such as low tax rates, exemptions, deductions, deferrals and credits. The Department of Finance Canada publishes cost estimates and projections for these measures each year in the Report on Federal Tax Expenditures. This report also provides detailed background information on tax expenditures, including descriptions, objectives, historical information and references to related federal spending programs as well as evaluations and GBA Plus of tax expenditures.

Definitions

appropriation (crédit)

Any authority of Parliament to pay money out of the Consolidated Revenue Fund.

budgetary expenditures (dépenses budgétaires)

Operating and capital expenditures; transfer payments to other levels of government, departments or individuals; and payments to Crown corporations.

core responsibility (responsabilité essentielle)

An enduring function or role performed by a department. The intentions of the department with respect to a core responsibility are reflected in one or more related departmental results that the department seeks to contribute to or influence.

Departmental Plan (plan ministériel)

A report on the plans and expected performance of an appropriated department over a 3year period. Departmental Plans are usually tabled in Parliament each spring.

departmental priority (priorité)

A plan or project that a department has chosen to focus and report on during the planning period. Priorities represent the things that are most important or what must be done first to support the achievement of the desired departmental results.

departmental result (résultat ministériel)

A consequence or outcome that a department seeks to achieve. A departmental result is often outside departments’ immediate control, but it should be influenced by program-level outcomes.

departmental result indicator (indicateur de résultat ministériel)

A quantitative measure of progress on a departmental result.

departmental results framework (cadre ministériel des résultats)

A framework that connects the department’s core responsibilities to its departmental results and departmental result indicators.

Departmental Results Report (rapport sur les résultats ministériels)

A report on a department’s actual accomplishments against the plans, priorities and expected results set out in the corresponding Departmental Plan.

Full-time equivalent (équivalent temps plein)

A measure of the extent to which an employee represents a full person-year charge against a departmental budget. For a particular position, the full-time equivalent figure is the ratio of number of hours the person actually works divided by the standard number of hours set out in the person’s collective agreement.

gender-based analysis plus (GBA Plus) (analyse comparative entre les sexes plus [ACS Plus])

An analytical tool used to assess support the development of responsive and inclusive how different groups of women, men and gender-diverse people experience policies, programs and policies, programs, and other initiatives. GBA Plus is a process for understanding who is impacted by the issue or opportunity being addressed by the initiative; identifying how the initiative could be tailored to meet diverse needs of the people most impacted; and anticipating and mitigating any barriers to accessing or benefitting from the initiative. GBA Plus is an intersectional analysis that goes beyond biological (sex) and socio-cultural (gender) differences to consider other factors, such as age, disability, education, ethnicity, economic status, geography (including rurality), language, race, religion, and sexual orientation.

government-wide priorities (priorités pangouvernementales)

For the purpose of the 2022–23 Departmental Results Report, government-wide priorities are the high-level themes outlining the government’s agenda in the November 23, 2021, Speech from the Throne: building a healthier today and tomorrow; growing a more resilient economy; bolder climate action; fight harder for safer communities; standing up for diversity and inclusion; moving faster on the path to reconciliation; and fighting for a secure, just and equitable world.

horizontal initiative (initiative horizontale)

An initiative where two or more federal departments are given funding to pursue a shared outcome, often linked to a government priority.

nonbudgetary expenditures (dépenses non budgétaires)

Net outlays and receipts related to loans, investments and advances, which change the composition of the financial assets of the Government of Canada.

performance (rendement)

What a department did with its resources to achieve its results, how well those results compare to what the department intended to achieve, and how well lessons learned have been identified.

performance indicator (indicateur de rendement)

A qualitative or quantitative means of measuring an output or outcome, with the intention of gauging the performance of an department, program, policy or initiative respecting expected results.

plan (plan)

The articulation of strategic choices, which provides information on how a department intends to achieve its priorities and associated results. Generally, a plan will explain the logic behind the strategies chosen and tend to focus on actions that lead to the expected result.

planned spending (dépenses prévues)

For Departmental Plans and Departmental Results Reports, planned spending refers to those amounts presented in Main Estimates.

A department is expected to be aware of the authorities that it has sought and received. The determination of planned spending is a departmental responsibility, and departments must be able to defend the expenditure and accrual numbers presented in their Departmental Plans and Departmental Results Reports.

program (programme)

Individual or groups of services, activities or combinations thereof that are managed together within the department and focus on a specific set of outputs, outcomes or service levels.

program inventory (répertoire des programmes)

Identifies all the department’s programs and describes how resources are organized to contribute to the department’s core responsibilities and results.

result (résultat)

A consequence attributed, in part, to an department, policy, program or initiative. Results are not within the control of a single department, policy, program or initiative; instead they are within the area of the department’s influence.

Indigenous business (entreprise autochtones)

For the purpose of the Directive on the Management of Procurement Appendix E: Mandatory Procedures for Contracts Awarded to Indigenous Businesses and the Government of Canada’s commitment that a mandatory minimum target of 5% of the total value of contracts is awarded to Indigenous businesses, a department that meets the definition and requirements as defined by the Indigenous Business Directory

statutory expenditures (dépenses législatives)

Expenditures that Parliament has approved through legislation other than appropriation acts. The legislation sets out the purpose of the expenditures and the terms and conditions under which they may be made.

target (cible)

A measurable performance or success level that a department, program or initiative plans to achieve within a specified time period. Targets can be either quantitative or qualitative.

voted expenditures (dépenses votées)

Expenditures that Parliament approves annually through an appropriation act. The vote wording becomes the governing conditions under which these expenditures may be made.

Share this page
Date Modified:

Quarterly Report: For the quarter ended June 30, 2024

Date of Publishing:

Introduction

This quarterly report has been prepared by management as required by section 65.1 of the Financial Administration Act and in the form and manner prescribed by the Directive on Accounting Standards, GC 4400 Departmental Quarterly Financial Report. This quarterly financial report should be read in conjunction with the 2024–2025 Main Estimates.

This quarterly report has not been subject to an external audit or review.

Mandate

The National Security and Intelligence Review Agency (NSIRA) is an independent external review body that reports to Parliament. Established in July 2019, NSIRA is responsible for conducting reviews of the Government of Canada’s national security and intelligence activities to ensure that they are lawful, reasonable and necessary. NSIRA also hears public complaints regarding key national security agencies and their activities.

The NSIRA Secretariat supports the Agency in the delivery of its mandate. Independent scrutiny contributes to strengthening the accountability framework for national security and intelligence activities and to enhancing public confidence. Ministers and Canadians are informed whether national security and intelligence activities undertaken by Government of Canada institutions are lawful, reasonable, and necessary

A summary description NSIRA’s program activities can be found in Part II of the Main Estimates.  Information on NSIRA’s mandate can be found on its website.

Basis of presentation

This quarterly report has been prepared by management using an expenditure basis of accounting. The accompanying Statement of Authorities includes the agency’s spending authorities granted by Parliament and those used by the agency, consistent with the 2024–2025 Main Estimates. This quarterly report has been prepared using a special-purpose financial reporting framework (cash basis) designed to meet financial information needs with respect to the use of spending authorities.

The authority of Parliament is required before money can be spent by the government. Approvals are given in the form of annually approved limits through appropriation acts or through legislation in the form of statutory spending authorities for specific purposes.

Highlights of the fiscal quarter and fiscal year-to-date results

This section highlights the significant items that contributed to the net increase or decrease in authorities available for the year and actual expenditures for the quarter ended June 30, 2024.

NSIRA Secretariat spent approximately 19% of its authorities by the end of the first quarter, compared with 19% in the same quarter of 2023–2024 (see graph 1).

Graph 1: Comparison of total authorities and total net budgetary expenditures, Q1 2024–25 and Q1 2023–24

Graph 1: Comparison of total authorities and total net budgetary expenditures, Q1 2024–25 and Q1 2023–24 - Text version to follow
Comparison of total authorities and total net budgetary expenditures, Q1 2024–25 and Q1 2023–24
  2024-25 2023-24
Total Authorities $18.4 $23.0
Q1 Expenditures $3.5 $4.3

Significant changes to authorities

As of June 30, 2024, Parliament had approved $18.4 million in total authorities for use by NSIRA Secretariat for 2024–2025 compared with $23.0 million as of June 30, 2023, for a net decrease of $4.6 million or 20.0% (see graph 2).

Graph 2: Variance in authorities as at June 30, 2024

Graph 2: Variance in authorities as at June 30, 2024 - Text version to follow
Variance in authorities as at June 30, 2024 (in millions)
  Fiscal year 2023-24 total available for use for the year ended March 31, 2024 Fiscal year 2024-25 total available for use for the year ended March 31, 2025
Vote 1 – Operating 21.3 16.8.3
Statutory 1.8 1.6
Total budgetary authorities 23.0 18.4

*Details may not sum to totals due to rounding*

The decrease of $4.6 million in authorities is mostly explained by a reduction in capital funding for infrastructure projects.

Significant changes to quarter expenditures

The first quarter expenditures totalled $3.5 million for a decrease of $0.8 million when compared with $4.3 million spent during the same period in 2023–2024.  Table 1 presents budgetary expenditures by standard object.

Table 1

Variances in expenditures by standard object (in thousands of dollars) Fiscal year 2024–25: expended during the quarter ended June 30, 2024 Fiscal year 2023–24: expended during the quarter ended June 30, 2023 Variance $ Variance %
Personnel 3,008 2,886 122 4%
Transportation and communications 58 130 (72) (55%)
Information 6 0 6 100%
Professional and special services 269 1,165 (896) (77%)
Rentals 25 48 (23) (48%)
Repair and maintenance 3 24 (21) (88%)
Utilities, materials, and supplies 28 7 21 300%
Acquisition of machinery and equipment 12 48 (36) (75%)
Other subsidies and payments 79 4 75 1875%
Total gross budgetary expenditures 3,488 4,312 (824) (19%)

Transportation and communications

The decrease of $72,000 is explained by a change in the timing of invoicing for the internet connection.

Professional and special services

The decrease of $896,000 is mainly explained by a change in the timing of the billing for maintenance and services in support of our classified IT network infrastructure.

Rentals

The decrease of $23,000 is explained by a decrease in cost for the rent for temporary office space.

Repair and maintenance

The decrease of $21,000 is explained by a one-time maintenance contract purchased in fiscal year 2023-2024.

Utilities, materials, and supplies

The increase of $21,000 is explained by unreconciled acquisition card purchases.

Acquisition of machinery and equipment

The decrease of $36,000 is explained by a one-time purchase of a specialized laptop along with a wall mounted charging station and warranty in 2023-2024.

Other subsidies and payments

The increase of $75,000 is explained by an increase in salary overpayments.

Risks and uncertainties

There is a risk that the funding received to offset pay increases anticipated over the coming year will be insufficient to cover the costs of such increases and the year-over-year cost of services provided by other government departments/agencies is increasing significantly.

NSIRA Secretariat is closely monitoring pay transactions to identify and address over and under payments in a timely manner and continues to apply ongoing mitigating controls.

Mitigation measures for the risks outlined above have been identified and are factored into NSIRA Secretariat’s approach and timelines for the execution of its mandated activities.

Significant changes in relation to operations, personnel and programs

Mr. Charles Fugère was appointed by the Governor-in-Council to be Executive Director of the NSIRA Secretariat on an interim basis on June 3, 2024.

Mr. Marc-André Cloutier, NSIRA Secretariat’s Director General, Corporate Services and CFO since 2023, retired in Q4 of 2023-2024. He has been replaced by Mr. Martyn Turcotte.

Approved by senior officials:

Charles Fugère
Executive Director

Amanda Wark
A/Chief Financial Officer

Appendix

Statement of authorities (Unaudited)

(in thousands of dollars)

  Fiscal year 2024–25 Fiscal year 2023–24
  Total available for use for the year ending March 31, 2025 (note 1) Used during the quarter ended June 30, 2024 Year to date used at quarter-end Total available for use for the year ending March 31, 2024 (note 1) Used during the quarter ended June 30, 2023 Year to date used at quarter-end
Vote 1 – Net operating expenditures 16,810 3,088 3,088 21,254 3,873 3,873
Budgetary statutory authorities
Contributions to employee benefit plans 1,601 400 400 1,755 439 439
Total budgetary authorities (note 2) 18,411 3,488 3,488 23,009 4,312 4,312

Note 1: Includes only authorities available for use and granted by Parliament as at quarter-end.

Note 2: Details may not sum to totals due to rounding.

Departmental budgetary expenditures by standard object (unaudited)

(in thousands of dollars)

  Fiscal year 2024–25 Fiscal year 2023–24
  Planned expenditures for the year ending March 31, 2025 (note 1) Expended during the quarter ended June 30, 2024 Year to date used at quarter-end Planned expenditures for the year ending March 31, 2024 Expended during the quarter ended June 30, 2023 Year to date used at quarter-end
Expenditures
Personnel 13,205 3,088 3,088 13,303 2,886 2,886
Transportation and communications 685 58 58 650 130 130
Information 76 6 6 372 0 0
Professional and special services 3,577 269 269 3,596 1,165 1,165
Rentals 309 25 25 271 48 48
Repair and maintenance 436 3 3 4,580 24 24
Utilities, materials, and supplies 58 28 28 73 7 7
Acquisition of machinery and equipment 65 12 12 132 48 48
Other subsidies and payments 0 79 79 33 4 4
Total gross budgetary expenditures
(note 2)
18,411 3,488 3,488 23,009 4,312 4,312

Note 1: Includes only authorities available for use and granted by Parliament as at quarter-end.

Note 2: Details may not sum to totals due to rounding.

Share this page
Date Modified:

Financial Statements: NSIRA 2022–23

Date of Publishing:

Statement of Management Responsibility Including Internal Control over Financial Reporting

Responsibility for the integrity and objectivity of the accompanying financial statements for the year ended March 31, 2023, and all information contained in these financial statements rests with the management of the National Security and Intelligence Review Agency (NSIRA) Secretariat. These financial statements have been prepared by management using the Government of Canada’s accounting policies, which are based on Canadian public sector accounting standards.

Management is responsible for the integrity and objectivity of the information in these financial statements. Some of the information in the financial statements is based on management’s best estimates and judgment and gives due consideration to materiality. To fulfill its accounting and reporting responsibilities, management maintains a set of accounts that provides a centralized record of the NSIRA Secretariat’s financial transactions. Financial information submitted in the preparation of the Public Accounts of Canada, and included in the NSIRA Secretariat’s Departmental Results Report, is consistent with these financial statements.

Management is also responsible for maintaining an effective system of internal control over financial reporting (ICFR) designed to provide reasonable assurance that financial information is reliable, that assets are safeguarded and that transactions are properly authorized and recorded in accordance with the Financial Administration Act and other applicable legislation, regulations, authorities, and policies.

Management seeks to ensure the objectivity and integrity of data in its financial statements through careful selection, training and development of qualified staff; through organizational arrangements that provide appropriate divisions of responsibility; through communication programs aimed at ensuring that regulations, policies, standards, and managerial authorities are understood throughout the NSIRA Secretariat and through conducting an annual risk-based assessment of the effectiveness of the system of ICFR.

The system of ICFR is designed to mitigate risks to a reasonable level based on an ongoing process to identify key risks, to assess effectiveness of associated key controls, and to make any necessary adjustments.

The financial statements of the National Security and Intelligence Agency Secretariat have not been audited.

John Davies
Executive Director

Marc-André Cloutier
Chief Financial Officer

Ottawa, Canada
September 12, 2023

Statement of Financial Position (Unaudited)

As of March 31 (in thousands of dollars)

  2023 2022
Liabilities
Accounts payable and accrued liabilities (Note 4) 1,433 1,220
Vacation pay and compensatory leave 632 556
Employee future benefits (Note 5b) 229 228
Total liabilities 2,294 2,004
Financial assets
Due from Consolidated Revenue Fund 1,000 692
Accounts receivable and advances (Note 6) 518 637
Total net financial assets 1,518 1,329
Departmental net debt 776 675
Non-financial assets
Prepaid expenses 6 70
Tangible capital assets (Note 7) 4,824 4,734
Total non-financial assets 4,830 4,804
Departmental net financial position 4,054 4,129
Contractual obligations (Note 8)    

The accompanying notes form an integral part of these financial statements.

John Davies
Executive Director

Marc-André Cloutier
Chief Financial Officer

Ottawa, Canada
September 12, 2023

Statement of Operations and Departmental Net Financial Position (Unaudited)

For the Year Ended March 31 (in thousands of dollars)

  2023
Planned Results
2023 Actual 2022 Actual
Expenses
National Security and Intelligence Reviews and Complaints Investigations (Note 9) 10,757 8,359 8,360
Internal Services 17,494 11,227 7,805
Total expenses 28,251 19,586 16,165
Net cost from continuing operations 28,251 19,586 16,165
Net cost of operations before government funding and transfers 28,251 19,586 16,165
Government funding and transfers
Net cash provided by Government of Canada   17,929 17,553
Change in due from Consolidated Revenue Fund   308 (254)
Services provided without charge by other government departments (Note 10a)   1,265 1,242
Transfer of overpayments   9 (15)
Net cost of operations after government funding and transfers 75 (2,361)
Departmental net financial position – Beginning of year 4,129 1,768
Departmental net financial position – End of year 4,054 4,129

Segmented information (Note 11)

The accompanying notes form an integral part of these financial statements.

Statement of Change in Departmental Net Debt (Unaudited)

For the Year Ended March 31 (in thousands of dollars)

  2023 2022
Net cost of operations after government funding and transfers 75 (2,361)
Change due to tangible capital assets
Acquisition of tangible capital assets 755 3,114
Amortization of tangible capital assets (664) (528)
Total change due to tangible capital assets 91 2,586
Change due to prepaid expenses (65) (22)
Net increase (decrease) in departmental net debt 101 203
Departmental net debt – Beginning of year 675 472
Departmental net debt – End of year 776 675

The accompanying notes form an integral part of these financial statements.

Statement of Cash Flows (Unaudited)

For the Year Ended March 31 (in thousands of dollars)

  2023 2022
Operating activities
Net cost of operations before government funding and transfers 19,586 16,165
Non-cash items:
Amortization of tangible capital assets (664) (528)
Services provided without charge by other government departments (Note 9a) (1,265) (1,242)
Transfer of overpayments (9) (15)
Variations in Statement of Financial Position:
Increase (decrease) in accounts receivable and advances (119) 5
Increase (decrease) in prepaid expenses (65) (22)
Decrease (increase) in accounts payable and accrued liabilities (213) 299
Decrease (increase) in vacation pay and compensatory leave (76) (341)
Decrease (increase) in future employee benefits (1) 88
Cash used in operating activities 17,174 14,439
Capital investing activities
Acquisitions of tangible capital assets (Note 7) 755 3,114
Cash used in capital investing activities 755 3,114
Net cash provided by Government of Canada 17,929 17,553

Notes to the Financial Statements (Unaudited)

1. Authority and objectives

The agency was established, effective July 12, 2019 under the National Security and Intelligence Review Agency Act (NSIRA Act).

The agency is a division of the federal public administration as set out in column 1 of Schedule I.1 of the Financial Administration Act and reports to Parliament through the Prime Minister.

The mandate of the agency is to review all Government of Canada national security and intelligence activities to ensure that they are lawful, reasonable and necessary.  The agency also investigates public complaints regarding key national security agencies and activities.

To achieve its strategic outcome and deliver results for Canadians, NSIRA articulates its plans and priorities based on the core responsibility and program inventory included below:

National Security and Intelligence Reviews and Complaints Investigations

The National Security and Intelligence Review Agency reviews Government of Canada national security and intelligence activities to assess whether they are lawful, reasonable and necessary. It investigates complaints from members of the public regarding activities of CSIS, CSE or the national security activities of the RCMP, as well as certain other national security-related complaints.  This independent scrutiny contributes to the strengthening of the framework of accountability for national security and intelligence activities undertaken by Government of Canada institutions and supports public confidence in this regard.

Internal Services

Internal support services are groups of related activities and resources that are administered to support the needs of programs and other corporate obligations of an organization. These groups are: Management and Oversight Services; Communications Services; Legal Services; Human Resources Management Services; Financial Management Services; Information Management Services; Information Technology Services; Real Property Services; Materiel Services; Acquisition Services; and Other Administrative Services. Internal Services include only those activities and resources that apply across an organization and not to those provided specifically to a program.

2. Summary of significant accounting policies

These financial statements are prepared using NSIRA’s accounting policies stated below, which are based on Canadian public sector accounting standards. The presentation and results using the stated accounting policies do not result in any significant differences from Canadian public sector accounting standards.

Significant accounting policies are as follows:

(a) Parliamentary authorities

NSIRA is financed by the Government of Canada through Parliamentary authorities. Financial reporting of authorities provided to NSIRA do not parallel financial reporting according to generally accepted accounting principles since authorities are primarily based on cash flow requirements. Consequently, items recognized in the Statement of Operations and Departmental Net Financial Position and in the Statement of Financial Position are not necessarily the same as those provided through authorities from Parliament. Note 3 provides a reconciliation between the bases of reporting. The planned results amounts in the ”Expenses” and ”Revenues” sections of the Statement of Operations and Departmental Net Financial Position are the amounts reported in the Future-Oriented Statement of Operations included in the 2022-2023 Departmental Plan. The planned results amounts in the “Government funding and transfers” section of the Statement of Operations and Departmental Net Financial Position and in the Statement of Change in Departmental Net Debt were prepared for internal management purposes and have not been previously published.

(b) Net cash provided by Government of Canada

NSIRA operates within the Consolidated Revenue Fund (CRF), which is administered by the Receiver General for Canada. All cash received by NSIRA is deposited to the CRF, and all cash disbursements made by NSIRA are paid from the CRF. The net cash provided by Government is the difference between all cash receipts and all cash disbursements, including transactions between departments of the Government.

(c) Amounts due from or to the CRF

Amounts due from or to the CRF are the result of timing differences at year-end between when a transaction affects authorities and when it is processed through the CRF. Amounts due from the CRF represent the net amount of cash that NSIRA is entitled to draw from the CRF without further authorities to discharge its liabilities.

(d) Expenses

  • Vacation pay and compensatory leave are accrued as the benefits are earned by employees under their respective terms of employment.
  • Services provided without charge by other government departments for accommodation, employer contributions to the health and dental insurance plans and workers’ compensation are recorded as operating expenses at their carrying value.

(e) Employee future benefits

  • Pension benefits: Eligible employees participate in the Public Service Pension Plan, a pension plan administered by the Government. NSIRA’s contributions to the Plan are charged to expenses in the year incurred and represent the total departmental obligation to the Plan. NSIRA’s responsibility with regard to the Plan is limited to its contributions. Actuarial surpluses or deficiencies are recognized in the financial statements of the Government of Canada, as the Plan’s sponsor.
  • Severance benefits: The accumulation of severance benefits for voluntary departures ceased for applicable employee groups. The remaining obligation for employees who did not withdraw benefits is calculated using information derived from the results of the actuarially determined liability for employee severance benefits for the Government as a whole.

(f) Non-financial assets

All tangible capital assets having an initial cost of $10,000 or more are recorded at their acquisition cost. Tangible capital assets do not include immovable assets located on reserves as defined in the Indian Act, works of art, museum collection and Crown land to which no acquisition cost is attributable; and intangible assets.

Inventories are valued at cost and are comprised of spare parts and supplies held for future program delivery and are not primarily intended for resale. Inventories that no longer have service potential are valued at the lower of cost or net realizable value.

(g) Measurement uncertainty

The preparation of these financial statements requires management to make estimates and assumptions that affect the reported and disclosed amounts of assets, liabilities, revenues and expenses reported in the financial statements and accompanying notes at March 31. The estimates are based on facts and circumstances, historical experience, general economic conditions and reflect the Government’s best estimate of the related amount at the end of the reporting period. The most significant items where estimates are used are contingent liabilities, the liability for employee future benefits and the useful life of tangible capital assets. Actual results could significantly differ from those estimated. Management’s estimates are reviewed periodically and, as adjustments become necessary, they are recorded in the financial statements in the year they become known.

Related party transactions, other than inter-entity transactions, are recorded at the exchange amount.

Inter-entity transactions are transactions between commonly controlled entities. Inter-entity transactions, other than restructuring transactions, are recorded on a gross basis and are measured at the carrying amount, except for the following:

  • Services provided on a recovery basis are recognized as revenues and expenses on a gross basis and measured at the exchange amount.
  • Certain services received on a without charge basis are recorded for departmental financial statement purposes at the carrying amount.

3. Parliamentary authorities

NSIRA receives most of its funding through annual Parliamentary authorities. Items recognized in the Statement of Operations and Departmental Net Financial Position and the Statement of Financial Position in one year may be funded through Parliamentary authorities in prior, current or future years. Accordingly, NSIRA has different net results of operations for the year on a government funding basis than on an accrual accounting basis. The differences are reconciled in the following tables:

(a) Reconciliation of net cost of operations to current year authorities used

(in thousands of dollars)

  2023 2022
Net cost of operations before government funding and transfers 19,586 16,165
Adjustments for items affecting net cost of operations but not affecting authorities:
Amortization of tangible capital assets (664) (528)
Services provided without charge by other government departments (1,265) (1,242)
Increase / (decrease) in vacation pay and compensatory leave (76) (341)
Increase / (decrease) in employee future benefits (1) 88
Refund of prior years’ expenditures 6 41
Total items affecting net cost of operations but not affecting authorities (2,000) (1,982)
Adjustments for items not affecting net cost of operations but affecting authorities
Acquisition of tangible capital assets 755 3,114
Increase / (decrease) in prepaid expenses (65) (22)
Accounts receivable and advances 13 15
Total items not affecting net cost of operations but affecting authorities 703 3,107
Current year authorities used 18,289 17,290

(b) Authorities provided and used

(in thousands of dollars)

  2023 2022
Authorities provided:
Vote 1 – Operating expenditures 28,074 30,851
Statutory amounts 1,300 1,176
Less:
Lapsed: Operating (11,085) (14,737)
Current year authorities used 18,289 17,290

4. Accounts payable and accrued liabilities

The following table presents details of NSIRA’s accounts payable and accrued liabilities.

(in thousands of dollars)

  2023 2022
Accounts payable – Other government departments and agencies 425 436
Accounts payable – External parties 1,008 784
Total accounts payable 1,433 1,220
Total accounts payable and accrued liabilities 1,433 1,220

5. Employee future benefits

(a) Pension benefits

NSIRA’s employees participate in the Public Service Pension Plan (the ”Plan”), which is sponsored and administered by the Government of Canada. Pension benefits accrue up to a maximum period of 35 years at a rate of two percent per year of pensionable service, times the average of the best five consecutive years of earnings. The benefits are integrated with Canada/Québec Pension Plan benefits and they are indexed to inflation.

Both the employees and the Agency contribute to the cost of the Plan. Due to the amendment of the Public Service Superannuation Act following the implementation of provisions related to Economic Action Plan 2012, employee contributors have been divided into two groups – Group 1 related to existing plan members as of December 31, 2012 and Group 2 relates to members joining the Plan as of January 1, 2013. Each group has a distinct contribution rate.

The 2022-23 expense amounts to $1,178,731 ($1,072,922 in 2021-22). For Group 1 members, the expense represents approximately 1.02 times (1.01 times in 2021-22) the employee contributions and, for Group 2 members, approximately 1.00 times (1.00 times in 2021-22) the employee contributions.

NSIRA’s responsibility with regard to the Plan is limited to its contributions. Actuarial surpluses or deficiencies are recognized in the Consolidated Financial Statements of the Government of Canada, as the Plan’s sponsor.

(b) Severance benefits

Severance benefits provided to NSIRA’s employees were previously based on an employee’s eligibility, years of service and salary at termination of employment. However, since 2011 the accumulation of severance benefits for voluntary departures progressively ceased for substantially all employees. Employees subject to these changes were given the option to be paid the full or partial value of benefits earned to date or collect the full or remaining value of benefits upon departure from the public service. By March 31, 2018, substantially all settlements for immediate cash out were completed. Severance benefits are unfunded and, consequently, the outstanding obligation will be paid from future authorities.

The changes in the obligations during the year were as follows:

(in thousands of dollars)

  2023 2022
Accrued benefit obligation – Beginning of year 228 316
Expense for the year 1 (7)
Benefits paid during the year (81)
Accrued benefit obligation – End of year 229 228

6. Accounts receivable and advances

The following table presents details of NSIRA’s accounts receivable and advances balances:

  2023 2022
Receivables – Other government departments and agencies 454 546
Receivables – External parties 40 60
Employee advances 24 31
Net accounts receivable 518 637

7. Tangible capital assets

Amortization of tangible capital assets is done on a straight-line basis over the estimated useful life of the asset as follows:

Asset Class Amortization Period
Informatics hardware 3 to 10 years
Other equipment 3 to 30 years
Leasehold improvements Over the useful life of the improvement or the lease term, whichever is shorter
Assets under construction once in service, in accordance with asset type

(in thousands of dollars)

  Cost Accumulated Amortization Net Book Value
(1) Adjustments include assets under construction that were transferred to the other categories upon completion of the assets.
Capital Asset Class Opening Balance Acquisitions Adjustments (1) Disposal and Write- Offs Closing Balance Opening Balance Amortization Adjustments (1) Disposals and Write- Offs Closing Balance 2022 2021
Restated (Note 11)
Informatics hardware 335 335 267 40 307 28 68
Other equipment 1,124 1,124 422 121 543 581 703
Leasehold improvements 1,005 1,005 335 503 838 167 670
Assets under construction 3,293 755 4,048 4,048 3,293
Total 5,757 755 6,512 1,024 664 1,688 4,824 4,734

8. Contractual obligations

The nature of the NSIRA’s activities may result in some large multi-year contracts and obligations whereby NSRIA will be obligated to make future payments in order to carry out its programs or when the services/goods are received. Significant contractual obligations that can be reasonably estimated are summarized as follows:

  2024 2025 2026 2027 2028 2029 and subsequent Total
Acquisition of goods and services 4,725 45 45 45 45 4,905
Total 4,725 45 45 45 45 4,905

NSIRA is related as a result of common ownership to all government departments, agencies, and Crown corporations. Related parties also include individuals who are members of key management personnel or close family members of those individuals, and entities controlled by, or under shared control of, a member of key management personnel or a close family member of that individual.

NSIRA enters into transactions with these entities in the normal course of business and on normal trade terms.

During the year, NSIRA received common services which were obtained without charge for other government departments as disclosed below.

(a) Common services provided without charge by other government departments

During the year, the NSIRA received services without charge from certain common service organizations, related to accommodation and the employer’s contribution to the health and dental insurance plans. These services provided without charge have been recorded at the carrying value in NSIRA’s Statement of Operations and Departmental Net Financial Position as follows:

(in thousands of dollars)

  2023 2022
Accommodation 500 486
Employer’s contribution to the health and dental insurance plans 765 756
Total 1,265 1,242

The Government has centralized some of its administrative activities for efficiency, cost-effectiveness purposes and economic delivery of programs to the public. As a result, the Government uses central agencies and common service organizations so that one department performs services for all other departments and agencies without charge. The costs of these services, such as the payroll and cheque issuance services provided by Public Services and Procurement Canada and audit services provided by the Office of the Auditor General are not included in the Department’s Statement of Operations and Departmental Net Financial Position.

(b) Other transactions with other government departments and agencies

  2023 2022
Expenses 7,324 6,844

10. Segmented information

Presentation by segment is based on the Department’s core responsibility. The presentation by segment is based on the same accounting policies as described in the Summary of significant accounting policies in Note 2. The following table presents the expenses incurred and revenues generated for the main core responsibilities, by major object of expense and by major type of revenue. The segment results for the period are as follows:

  National Security and Intelligence Reviews and Complaints Investigations Internal Services 2023 2022
Expenses
Salaries and employee benefits 7,817 3,200 11,017 10,282
Professional and special services 250 3,422 3,672 3,470
Accommodation 519 519 505
Transportation and communications 226 138 364 213
Information 4 13 17 69
Acquisition of machinery and equipment 47 47 354
Repair and maintenance 3,643 3,643 3,091
Amortization of tangible capital assets 664 664 528
Rental 215 215 130
Utilities, materials and supplies 2 37 39 30
Other 60 (671) (611) (2,507)
Total expenses 8,359 11,227 19,586 16,165
Net cost from continuing operations 8,359 11,227 19,586 16,165

Annex to the Statement of Management Responsibility Including Internal Control over Financial Reporting for Fiscal Year 2021-22 (unaudited)

1. Introduction

This document provides summary information on measures taken by the National Security Intelligence Review Agency (NSIRA) to maintain an effective system of internal control over financial reporting (ICFR) including information on internal control management, assessment results and related action plans.

Detailed information on NSIRA authority, mandate, and programs can be found in our Departmental Plan for the 2022 to 2023 fiscal year and our Departmental Results Report for the 2022 to 2023 fiscal year.

2. Departmental system of internal control over financial reporting

In support of an effective system of internal control, NSIRA conducted self-assessments of key control areas that were identified to be assessed in the 2022 to 2023 fiscal year. A summary of the assessment results and action plan is provided in subsection B.2. 

NSIRA completed the assessment of key control areas as indicated in the following table. A summary of the results, action plans, and additional details are also provided.

2.1  Service Arrangements relevant to financial statements

NSIRA relies on other organizations for the processing of certain transactions that are recorded in its financial statements, and relies on these service providers to ensure an adequate system of ICFR is maintained over services provided to NSIRA.

Common Arrangements:
  • Public Services and Procurement Canada, which administers the payment of salaries and the procurement of goods and services, and provides accommodation services
  • Shared Services Canada, which provides IT infrastructure services
  • Treasury Board of Canada Secretariat, which provides information on public service insurance and centrally administers payment of the employer’s share of contributions toward statutory employee benefit plans

Readers of this annex may refer to the annexes of the above-noted departments for a greater understanding of the systems of internal control over financial reporting related to these specific services.

Specific Arrangements:
  • Prior to fiscal 2021-22, in accordance to a Memorandum of Understanding (MOU) between the two organizations, NSIRA relied on the Privy Council Office (PCO) for the performance of financial services, including relevant control measures.  Effective, April 1, 2021, NSIRA entered into a new MOU with PCO, which reflected a shift whereby NSIRA would work towards financial services self-sufficiency, by fiscal 2022-23 (including a transition period over fiscal 2021-22).
  • Treasury Board of Canada Secretariat provides the agency with a SAP financial system platform to capture and report all financial transactions and a PeopleSoft human resources system platform to manage pay and leave transactions

2.2  Assessment results for the 2022 to 2023 fiscal year

NSIRA completed the assessment of key control areas as indicated in the following table. A summary of the results, action plans, and additional details are also provided.

Key Control Areas Remediation required Summary results and action plan
Delegation Yes Internal controls are functioning as intended, no action plan required.
Transfer Payments N/A Not applicable

With respect to the key control areas of the delegation of spending and financial authorities, controls related to spending and financial authorities were functioning well and form an adequate basis for the department’s system of internal control.

3. Departmental action plan

Assessment Plan

NSIRA will assess the performance of its system of internal control by focusing on key control areas over    a cycle of years as shown in the following table.

Key Control Areas 2022-23 2023-24 2024-25 2025-2026 2026-2027
Delegation No No No No No
Transfer Payments Yes No No No No
Contracting No Yes No No No
Year-end Payables No Yes No No No
Receivables No Yes

No

No No
Pay Administration No No Yes No No
Travel No No Yes No No
Financial Management Governance No No Yes No No
Hospitality No No No Yes No
Fleet Management No No No Yes No
Accountable Advances No No No Yes No
Acquisition cards No No No No Yes
Leave No No No No Yes
Special Financial Authorities No No No No Yes
Share this page
Date Modified:

CSE’s Governance of Active and Defensive Cyber Operations

Date of Publishing:

Executive Summary

The CSE Act provided CSE with the authority to conduct Active and Defensive Cyber Operations (ACO/DCO). As defined by the Act, a DCO stops or impedes foreign cyber threats from Canadian federal government networks or systems deemed by the Minister of National Defence (MND) as important to Canada. On the other hand, ACOs intend to limit an adversary’s ability to affect Canada’s international relations, defence, or security. ACO/DCOs are authorized by Ministerial Authorizations (MA) and, due to the potential impact on Canadian foreign policy, require the Minister of Foreign Affairs (MFA) to either consent or be consulted on ACO and DCO MAs respectively.

In this review, NSIRA set out to assess the governance framework that guides the conduct of ACO-DCOs, and to assess if CSE appropriately considered its legal obligations and the foreign policy impacts of operations. NSIRA analyzed policies and procedures, governance and operational documentation, and correspondence within and between CSE and GAC. The review began with the earliest available materials pertaining to ACO/DCOs and ended concurrently with the validity period of the first ACO/DCO Ministerial Authorizations.

NSIRA incorporated GAC into this review given its key role in the ACO/DCO governance structure arising from the legislated requirement for the role of the MFA in relation to the MAs. As a result, NSIRA was able to gain an understanding of the governance and accountability structures in place for these activities by obtaining unique perspectives from the two departments on their respective roles and responsibilities.

The novelty of these powers required CSE to develop new mechanisms and processes while also considering new legal authorities and boundaries. NSIRA found that considerable work has been conducted in building the ACO/DCO governance structure by both CSE and GAC. In this context, NSIRA has found that some aspects of the governance of can be improved by making them more transparent and clear.

Specifically, NSIRA found that CSE can improve the level of detail provided to all parties involved in the decision-making and governance of ACO/DCOs, within documents such as the MAs authorizing these activities and the operational plans that are in place to govern their execution. Additionally, NSIRA found that CSE and GAC have not sufficiently considered several gaps identified in this review, and recommended improvements relating to:

  • The need to engage other departments to ensure an operation’s alignment with broader Government of Canada priorities,
  • The lack of a threshold demarcating an ACO and a pre-emptive DCO,
  • The need to assess each operation’s compliance with international law, and
  • The need for bilateral communication of newly acquired information that is relevant to the risk level of an operation.

The gaps observed by NSIRA are those that, if left unaddressed, could carry risks. For instance, the broad and generalized nature of the classes of activities, techniques, and targets [**redacted**] ACO/DCOs can capture unintended [**redacted**] activities and targets. Additionally, given the difference in the required engagement of GAC in ACOs and DCOs, misclassifying what is truly an ACO as a pre-emptive DCO could result in a heightened risk to Canada’s international relations through the insufficient engagement of GAC.

While this review focused on the governance structures at play in relation to ACO/DCOs, of even greater importance is how these structures are implemented, and followed, in practice. We have made several observations about the information contained within the governance documents developed to date, and will subsequently assess how they are put into practice as part of our forthcoming review of ACO/DCOs.

The information provided by CSE has not been independently verified by NSIRA. Work is underway to establish effective policies and best practices for the independent verification of various kinds of information, in keeping with NSIRA’s commitment to a ‘trust but verify’ approach.

Authorities

This review was conducted pursuant to paragraphs 8(1)(a) and 8(1)(b) of the National Security and Intelligence Review Agency (NSIRA) Act.

Introduction

Review background and methodology

With the coming into force of the CSE Act on August 1, 2019, CSE received the authority to independently conduct Active and Defensive Cyber Operations (“Active and Defensive Cyber Operations,” or ACO/DCOs henceforth) for the first time. While initial briefings on the subject in late fall of 2019 conveyed to NSIRA [**relates to CSE operations**] CSE later explained that [**redacted**].In this context, NSIRA will be assessing ACO/DCOs in a staged approach. The objective of this review is to better understand CSE’s development of a governance structure for ACO/DCOs. NSIRA will follow up with a subsequent review of the operations. This subsequent review is underway, with completion expected in 2022.

This review pertained to the structures put in place by CSE to govern the conduct of ACO/DCOs. Governance in this context can pertain to the establishment of processes to guide and manage planning, inter-departmental engagement, compliance, training, monitoring, and other overarching issues that affect the conduct of ACO/DCOs. NSIRA recognizes that these structures may be revised over time based on lessons learned from operations. Canada’s allies, who have had similar powers to conduct cyber operations for many years, [**relates to foreign partners’ capabilities**]. In this context, as its objectives, NSIRA sought out to determine if, in developing a governance structure for ACO/DCOs at this early stage, CSE appropriately considered and defined its legal obligations, and the foreign policy and operational components of ACO/DCOs.

As part of this governance review, NSIRA assessed policies, procedures, governance and operational planning documents, risk assessments, and correspondence between CSE and GAC (whose key role in this process is described below). NSIRA reviewed the earliest available materials relating to the development of the ACO/DCO governance structure, with the review period ending concurrent with the validity period of the first ACO/DCO Ministerial Authorizations on August 24, 2020. As such, the findings and recommendations made throughout this report pertain to the governance structure as it was presented during the period of review.

What are Active and Defensive Cyber Operations?

As defined in the CSE Act, Defensive Cyber Operations (DCOs) are those that stop or impede foreign cyber threats before they reach Canadian federal government systems or networks and systems designated by the Minister of National Defence (MND) as being of importance to Canada, such as Canada’s critical infrastructures and registered political parties. Active Cyber Operations (ACOs), on the other hand, allow the government to use CSE’s online capabilities to undertake a range of activities in cyberspace that limit an adversary’s ability to negatively impact Canada’s international relations, defence, or security, without their knowledge or consent. ACOs can include, for example, activities that disable communications devices used by a foreign terrorist network to communicate or plan attacks. The impacts of ACO/DCOs, [**relates to CSE operations**] of an ACO/DCO.

To conduct ACO/DCOs, CSE relies on its existing access to the global information infrastructure (GII), foreign intelligence expertise, and domestic and international partnerships to obtain relevant intelligence to support the informed development of ACO/DCOs. Activities conducted under CSE’s foreign intelligence and cybersecurity mandates allow CSE to gather information related to the intent, plans, and activities of actors seeking to disrupt or harm Canadian interests. According to CSE, the preliminary gathering of intelligence, capability development, [**redacted**] comprises the majority of the work necessary to conduct an ACO/DCO whereas the resulting activity in cyberspace is considered to be [**redacted**] of the task.

Legal foundation for conducting cyber operations

The CSE Act provides the legal authority for CSE to conduct ACO/DCOs, and these aspects of the mandate are described in the Act as per Figure 1. The ministerial authorization regime in the CSE Act provides CSE with the authority to conduct the activities or classes of activities listed in section 31 of the CSE Act in furtherance of the ACO/DCO aspects.

Defensive Cyber Operations (DCOs)

  • Section 18 of the CSE Act
  • The defensive cyber operations aspect of the Establishment’s mandate is to carry out activities on or through the global information infrastructure to help protect
    • (a) federal institutions’ electronic information and information infrastructures; and
    • (b) electronic information and information infrastructures designated … as being of importance to the Government of Canada.

Active Cyber Operations (ACOs)

  • Section 19 of the CSE Act
  • The active cyber operations aspect of the Establishment’s mandate is to carry out activities on or through the global information infrastructure to degrade, disrupt, influence, respond to, or interfere with the capabilities, intentions, or activities of a foreign individual, state, organization, or terrorist group as they relate to international affairs defence or security.

Importantly, the Act limits ACO/DCOs in that they cannot be directed at Canadians or any person in Canada and cannot infringe on the Charter of Rights and Freedoms; nor can they be directed at any portion of the GII within Canada.

ACO/DCOs must be conducted under a Ministerial Authorization (MA) issued by the MND under subsection 29(1) (DCO) or under subsection 30(1) (ACO) of the CSE Act.  ACO/DCO MAs permit CSE to conduct ACO/DCO activities despite any other Act of Parliament or of any foreign state. In order to issue an MA, the MND must conclude that there are reasonable grounds to believe that any activity is reasonable and proportionate, and must also conclude that the objective of the cyber operation could not reasonably be achieved by other means. In addition, the MND must consult with the Minister of Foreign Affairs (MFA) in order to issue DCO MAs, and must obtain the MFA’s consent in order to issue ACO MAs. Any authorized ACO/DCO activities cannot cause, intentionally or by criminal negligence, death or bodily harm to an individual; or willfully attempt in any manner to obstruct, pervert, or defeat the course of justice or democracy. Importantly, unlike the MAs issued under the foreign intelligence, and cybersecurity and information assurance aspects of CSE’s mandate, ACO and DCO MAs are not subject to approval by the Intelligence Commissioner.

In addition to the ACO/DCO aspects of its mandate, CSE may also conduct ACO/DCO activities through technical and operational assistance to other Government of Canada (GC) departments. CSE may assist federal law enforcement and security agencies (LESAs) for purposes such as preventing criminal activity, reducing threats to the security of Canada, and supporting GC- authorized military missions. When providing assistance, CSE operates entirely within the legal authorities and associated limitations of the department requesting the assistance. Similarly, persons acting on CSE’s behalf also benefit from the same exemptions, protections and immunities as persons acting on behalf of the requesting LESAs. These assistance activities will be reviewed in subsequent NSIRA reviews.

In addition to the CSE Act, international law forms part of the legal framework in which ACO/DCO activities are conducted. Customary international law is binding on CSE’s activities, as Canadian law automatically adopts customary international law through the common law, unless there is conflicting legislation.

NSIRA notes that international law in cyberspace is a developing area. There is limited general state practice, or opinio juris (i.e, state belief that such practice amounts to a legal obligation), or treaty law, which elaborates on how international law applies in the cyber context. Moreover, while Canada has publically articulated that international law applies in cyberspace, it has not articulated a position on how it believes international law applies in cyberspace. At the same time, Canada has committed to building a common understanding between states of agreed voluntary non-binding norms of responsible state behaviour in cyberspace. NSIRA will closely monitor this emerging area of international law, including State practice in relation to CSE’s ACO/DCO activities – particularly in assessing CSE and GAC’s consideration of applicable international law as part of our subsequent review of ACO/DCOs.

Policy framework guiding cyber operations

Development of GAC-CSE framework for consultation

Conducting ACO/DCOs may elevate risks to Canada’s foreign policy and international relations. While CSE’s foreign intelligence mandate seeks only to collect information, ACO/DCOs [**redacted**]. As GAC is the department responsible for Canada’s international affairs and foreign policy, the MFA has a legislated role to play in consenting to MND’s issuance of an ACO Ministerial Authorization.

As directed by the MFA, CSE and GAC worked together to develop a framework for collaboration on matters related to ACO/DCOs. CSE and GAC began to engage on these matters before the coming into force of the CSE Act to proactively address the consultation and consent requirements embedded in the Act. Together, CSE and GAC have developed various interdepartmental bodies related to ACO/DCOs to facilitate consultation at different levels, including working groups at the levels of Director General and Assistant Deputy Minister.

CSE Governance Structure

CSE’s Mission Policy Suite (MPS) details the authorities in place to guide ACO/DCOs, prohibited activities when conducting ACO/DCOs and guidance in interpreting these prohibitions, as well as the governance framework to oversee the development and conduct of ACO/DCOs – known as the Joint Planning and Authorities Framework (JPAF). The general structure of this governance framework and process is intended to be used for all ACO/DCOs, irrespective of their risk-level. However, depending on the risk level of the operations, the framework sets out the specific approval levels.

During the period of review, the JPAF comprised several components required to plan, approve, and conduct cyber operations. The primary planning instrument for ACO/DCOs was [**relates to CSE operations**] that detailed the [**redacted**] identified [**redacted**] and highlighted risks and mitigations. [**redacted**] is used to determine and enumerate a range of risks associated with any new activity. In this period, CSE developed [**redacted**] NSIRA also received these documents [**redacted**] that fell slightly outside the review period, but provided relevant insight into the governance structure at the operation level.

Two primary internal working groups exist to evaluate and approve CSE’s internal plans for ACO/DCOs. The Cyber Operations Group (COG) is a Director-level approval body composed of key stakeholders and is chaired by the Director of the operational area that has initiated or sponsored a cyber operations request. The role of the COG is to review the operational plan and assess any associated risks and benefits. The COG may approve a [**redacted**] or may defer approval to the CMG as appropriate. The Cyber Management Group (CMG) is a Director General (DG) level approval body that is formed [**redacted**] has been reviewed and recommended by the COG.

CSE then develops the [**relates to CSE operations**] is reviewed internally to ensure it aligns [**redacted**] and is later approved at the Director level, although CSE has indicated it could be subject to delegation to a Manager.

Findings and Recommendations

Clarity of Ministerial Authorizations

NSIRA set out to assess whether the requirements of the CSE Act in relation to ACO/DCOs are appropriately reflected in the MND’s MAs authorizing ACO/DCO activities, and that CSE appropriately consulted or received the consent of the MFA, as required by the Act.

NSIRA reviewed two MAs related to ACOs and DCOs, respectively, which were valid from [**redacted**]. Notably, both MAs only approved [**redacted**] ACO/DCOs. Additionally, NSIRA reviewed documentation supporting the MAs, including the Chief’s Applications to the MND and the associated confirmation letters from the MFA, as well as working- level documents and correspondence provided by both CSE and Global Affairs Canada (GAC).

The MAs examined by NSIRA outlined the new authorities found in the CSE Act, and set conditions on how ACO/DCOs are to be conducted, including the prohibitions that are found in the Act. Additionally, the MAs required that ACO/DCO activities align with Canada’s foreign policy priorities and respond to Canada’s national security, foreign, and defence policy priorities as articulated by the GC.

Supporting cyber operations with information collected under previous authorizations

CSE received its authority to conduct ACO/DCOs during a time when CSE’s collection of foreign signals intelligence (SIGINT) was authorized by MAs issued under the National Defence Act (NDA). [**redacted**]. CSE confirmed to NSIRA that the ACO/DCOs [**redacted**] relied solely on information collected under CSE Act MAs. CSE explained that [**redacted**] NSIRA will confirm this as part of our subsequent review of specific ACO/DCOs.

CSE’s consultation with the Minister of Foreign Affairs

CSE provided GAC with the full application packages for the ACO/DCO MAs in place during the review period. Further, GAC and CSE officials engaged at various levels prior to the coming into force of the CSE Act, and during the development of the MAs – particularly in assessing the classes of activities authorized within them. In response to CSE’s MA application package, the MFA provided letters acknowledging her consultation and consent on the DCO and ACO MAs respectively. NSIRA welcomes this early and rigorous engagement on the part of both departments, given the intersection of their respective mandates in the context of ACO/DCOs.

Both letters from the MFA note the utility of ACO/DCOs [**redacted**] for the GC, articulating the importance of approaching this capability with caution in the initial stages. Notably, the MFA highlights the “carefully defined” classes of activities defined in the ACO MA as assurance that the activities authorized under the MA presented [**redacted**]. Finally, the MFA directed her officials to work with CSE to establish a framework for collaboration on [**redacted**] This direction from the MFA aligns with GAC’s view of the importance of ensuring CSE’s activities would be coherent with Canada’s foreign policy, and that either the MA or another mechanism should provide for that.

Scope and breadth of the Ministerial Authorizations

[**relates to CSE operational policy**] ACO MA issued under section 31 of the CSE Act authorized classes of activities such as:

  • [**redacted**] interfering with a target’s [**redacted**] or elements of the global information infrastructure (GII);
  • [**redacted**]
  • [**redacted**]
  • disrupting a cyber threat actor’s ability to use certain infrastructure.

[**redacted**] DCO MA authorized the same activities, except for the last class of activities, [**relates to CSE operations**].

Both of the ACO/DCO MAs required CSE to conduct ACO/DCOs [**in a certain way**]. According to the ACO MA, it is these conditions, if met, that would make ACO/DCOs conducted under these MAs [**redacted**]. While GAC assesses While GAC assesses foreign policy risks at a more operational level, the MAs developed in the review period only required these two conditions to be met when conducting ACOs or DCOs. Further, the specifics of how to meet these broad conditions are left to CSE’s discretion, and the MA only requires CSE to self-report this. NSIRA further notes that these conditions do not include foreign policy variables, [**redacted**]. To confirm [**redacted**] foreign policy risk associated with an operation, NSIRA believes it is important that the MAs stipulate the calculation of foreign policy risk factors.

[**redacted**] stating that:

[**redacted**]

CSE appears to have responded to [**relates to CSE operations**]. This may also impact the Minisiter’s ability to assess any authorized activities as stipulated in the CSE Act, which requires sufficient precision in an MA application for the Minister to satisfy these requirements.

The classes of ACO/DCO activities, some of which are detailed in paragraph 27, are highly generalized. For instance, nearly any activity conducted in cyberspace can be feasibly classed as [**redacted**] interfering with elements of the global information infrastructure.” [**relates to CSE operations**]

Indeed, early discussions between CSE and GAC highlighted that the activity of [**redacted**] and content “raises difficult questions,” though NSIRA notes that such an activity is nevertheless authorized in the final ACO MA in the activity class of [**redacted**]. In short, the authorization for a class of activities [**redacted**] was incorporated into an even broader class of activities, without any evident [**redacted**] previously associated with it. This type of categorization does not sufficiently communicate information to the Minister to appreciate [**redacted**] activities that could be carried out under the MA.

By contrast, the techniques and associated examples outlined in the Applications are the only means through which it is clarified what types of activities could be taken as part of an ACO/DCO. These examples provide the basis for the MND to assess the classes of activities requested in the MA. Early correspondence between CSE and GAC saw the classes of activities described and analyzed in tandem with the techniques that would enable them. For instance, it was noted that [**relates to CSE operations**] which NSIRA found more informative with respect to what specific actions were captured within the class of activities. NSIRA further notes that even these techniques and examples are described in the Applications as a non-exhaustive list, potentially enabling CSE to conduct activities that are not clearly outlined in the Applications.

Similarly, the target of ACO/DCO activities is typically identified as ‘foreign actor,’ which could encompass a wide range of [**redacted**] In the early stages of MA development, CSE and GAC had discussed [**relates to CSE operations**] within the MAs, and GAC specified that the intent of [**redacted**] was to focus on [**redacted**] given the [**redacted**]. GAC also noted that the ACO MA “would [more] clearly define [**redacted**] to some extent. Neither of these considerations were reflected in the final [**redacted**] MAs, which CSE explained “are not limited to activities [**redacted**] meaning that [**redacted**]. NSIRA believes that the MAs should carefully define targets of ACO/DCO activities [**redacted**]. ACO/DCOs to specific target sets [**redacted**] to ensure that the activities permitted by the MA are reflective of its [**redacted**].

NSIRA notes that only the MAs, and not the associated Applications, authorize CSE to conduct its activities. As such, the exclusion of this information from the MAs means that only the broad classes of activities, as described in the MAs, guide the actions that CSE can take in conducting an ACO/DCO, and not the techniques and examples in the Applications that help justify the standard on which the risk of the activities is based. NSIRA does not believe that the classes of activities as described within the MAs sufficiently limit CSE’s activities [**relates to CSE operations**]. Even though, as explained by GAC, interdepartmental consultative processes between the two departments may serve as a mechanism to limit CSE’s activities, these processes were not explicitly recorded in the MAs authorizing them. NSIRA believes more precise ACO/DCO MAs will minimize the potential for any misunderstanding regarding the specific activities authorized.

The approach of specifying broad classes of activities is in line with CSE’s general practice of obtaining broad approvals from senior levels such as the Minister, with more specific internal controls guiding the operations to be conducted within the scope of the approved activity. According to GAC, it tends to rely on more specific approvals based on the [**redacted**] for which approval is sought. CSE offered that its approach allows CSE to obtain approval for activities in such a way that “enables flexibility to maximize opportunities, but with enough caveats to ensure risks are appropriately mitigated.”

While NSIRA acknowledges that MAs should be reasonably nimble to enable CSE to conduct [**redacted**]. ACO/DCOs should the need arise, it is important that CSE does not conduct activities that were not envisioned or authorized by either the MND or MFA in the issuance of the applicable MAs. NSIRA believes that in the context of [**redacted**] ACO/DCOs, CSE can adopt a more transparent approach that would make clearer the classes of activities it requests the Minister to authorize. This is especially important given the early stage of CSE’s use of these new authorities. By authorizing more precise classes of activities, associated techniques, and intended target sets ACO/DCOs would be less likely to [**redacted**] of the MAs.

CSE has stated that, “being clear about objectives is critical for demonstrating reasonableness and proportionality.” NSIRA shares this view, and believes that the classes of activities and the objectives described in the MAs and their associated Applications should be more explicit for the MND to be able to conclude on reasonableness and proportionality of ACO/DCOs – particularly given that the MAs assessed as part of this review were not specific to an operation. As part of the Authorization, the Minister also requires CSE to provide a quarterly retroactive report on the activities conducted. Moreover, to issue an authorization, the MND must be satisfied that the activities are reasonable and proportionate, and that there are reasonable grounds to believe that the objective of the cyber operation could not reasonably be achieved by other means. This requirement further points toward a need for the MND to appreciate, with a certain degree of specificity, the types of activities and objectives that will be carried out under the authorization.

In both of the MAs reviewed, the Minister concluded that the requirements set out within s. 34(4) of the CSE Act are met. Further, the MAs set out the objectives to be met in the conduct of ACO/DCOs. However, the rationale offered that the objectives could not be reasonably achieved by other means within the ACO MA is quite broad and focuses on general mitigation strategies for cyber threat activities. The paucity of detail provided to the Minister under the current framework could make it challenging for the MND to meet this legislative requirement. In relation to the thresholds of s. 34(4) of the CSE Act, CSE has indicated that “the application for the Authorization, must set out the facts that explain how each of the activities described in the Authorization are part of a larger set of individual activities or part of a class of activities that achieves an objectives that could not reasonably be achieved by other means.” In our subsequent review of ACO/DCOs, NSIRA will assess whether specific ACO/DCOs aligned with the objectives of the MA, and CSE’s determination that they could not have reasonably been achieved by other means.

Finding no. 1: The Active and Defensive Cyber Operations Ministerial Authorization Applications do not provide sufficient detail for the Minister(s) to appreciate the scope of the classes of activities being requested in the authorization. Similarly, the Ministerial Authorization does not sufficiently delineate precise classes of activities, associated techniques, and intended target sets to be employed in the conduct of operations.

Finding no. 2: The assessment of the foreign policy risks required by two conditions within the Active and Defensive Cyber Operations Ministerial Authorizations relies too much on technical attribution risks rather than characteristics that reflect Government of Canada’s foreign policy.

Recommendation no. 1: CSE should more precisely define the classes of activities, associated techniques, and intended target sets to be undertaken for Active and Defensive Cyber Operations as well as their underlying rationale and objectives, both in its Applications and associated Ministerial Authorizations for these activities.

Recommendation no. 2: GAC should include a mechanism to assess all relevant foreign policy risk parameters of Active and Defensive Cyber Operations within the associated Ministerial Authorizations.

[**redacted**] approach to MA application development

During the review period, CSE only developed MA applications for what it considered [**redacted**]. ACO/DCOs, which were first prioritized for development [**related to CSE operations**]. As CSE’s capacity to conduct ACO/DCOs matures and it begins to [**redacted**]. NSIRA has observed CSE and GAC exploring the idea of [**redacted**] ACOs, which, if pursued, would [**redacted**] based on GAC’s methodology.

While the MAs obtained to date, which are not specific to an operation, allow CSE to act in [**redacted**]. NSIRA believes their generalized nature is not transferable to [**potential MAs of a different nature**]. For instance, [**description of an NSIRA concern about the Minister’s ability to filly assess certain factors about cyber operations in a certain context**]. In the context of the development of the 2019-20 ACO MA Application, GAC noted, “other purposes would require other MAs. They will not be completely general; they will be specific to a context.

Further, under the current legislative scheme, the MA Applications are a key mechanism through which the MFA has an opportunity to assess ACO/DCO activities. Because of the [**redacted**] ACO/DCOs to Canada’s foreign policy and international relations, NSIRA believes the MFA should be more directly involved in their development and execution at the Ministerial level, in addition to the working level engagement that takes place between CSE and GAC. Both Ministers can more effectively take accountability for such operations through individual MAs that provide specific details relating to the operation, its rationale, and the activities, tools, and techniques that will enable it. As such, when CSE [**redacted**] ACOs, NSIRA encourages CSE to develop MA Applications that are specific to these operations, and ensure these documents contain all the pertinent operational details that would allow each Minister to fully assess the implications and risks of each cyber operation and take accountability for it.

Strategic direction for cyber operations

Section 19 of the CSE Act directs CSE’s authority to conduct ACOs in relation to international affairs, defence, or security, all areas that could implicate the responsibility of other departments. Additionally the MAs reviewed by NSIRA require that ACOs “align with Canada’s foreign policy and respond to national security, foreign, and defence policy priorities as articulated by the Government of Canada.” The setting of these priorities involve a wide range of GC departments, including the Privy Council Office (PCO), the Department of National Defence (DND), and Public Safety Canada (PS) – which are responsible for coordination and oversight of different parts of priority setting in this context. Throughout this governance review, it emerged that CSE confirms compliance with these requirements with a statement that the MA meets broader GC priorities with no elaboration of how these priorities are met.

Interdepartmental GC processes are not new in the context of coordinating national security activities and operations. As one example, when the MFA requires foreign intelligence collection within Canada, he or she submits a request to the Minister of Public Safety for this collection to be facilitated by the Canadian Security Intelligence Service (CSIS) in accordance with section 16 of the CSIS Act. A Committee consisting [**redacted**] subsequently considers this type of request. The Committee considers issues at the Assistant Deputy Minister level, [**relates to GC decision making processes**]. Similarly, ensuring an ACO’s alignment with broader priorities and that it could not reasonably be achieved by other means can also be confirmed through an interdepartmental process. In other words, interdepartmental consultations are a means to assess the objectives of ACOs, their alignment with broader GC priorities, as well as whether there are other means by which to achieve the set objectives, as required by the CSE Act.

The setting of broader GC priorities and objectives for ACOs emerged as a key component of the governance structure for this new power in early discussions between CSE and GAC. During the period of review, CSE developed ACOs with GAC participating in some aspects of the planning process. GAC encouraged the MFA to request the development of a governance mechanism to mitigate the risk that “CSE could decide, on their own, to engage [**redacted**] noting that [**redacted**].

Early internal GAC assessments contrast this with CSE’s foreign intelligence mandate, which responds to Cabinet-approved intelligence priorities, and captured the essence of this discrepancy in stating:

[**quotation from GAC that reflects discussion related to strategic objectives and priorities of cyber operations**]

In another instance, GAC described the setting of such priorities as an “important issue that has not yet been agreed to with CSE,” and explained its view at the time, that a body with a mandate relevant to the cyber operation should decide if it is the appropriate tool to achieve a particular objective. GAC explained that its officials eventually agreed to move forward without pursuing this matter as long as a governance mechanism was established with CSE.

In this context, s. 34(4) of the CSE Act requires that the objectives of the cyber operation could not be reasonably attained by other means, and that cyber operations respond to priorities in various subject areas. Given these requirements, NSIRA notes that GC departments, other than just CSE and GAC, may be able to provide meaningful insight regarding other options or ongoing activities that could achieve the same objectives.

Furthermore, GAC highlighted the fact that Cabinet sets the Standing Intelligence Requirements (SIRs) that limit and more narrowly direct CSE’s foreign intelligence collection activities. When asked about this issue, CSE responded that “these discussions led both GAC and CSE to agree to begin with a [**redacted**] Ministerial Authorization supported by the CSE-GAC ACO/DCO consultation structure and governance framework.”

In NSIRA’s view, the CSE Act and the ACO MA directly relate ACOs to broader GC objectives and priorities that directly implicate the mandates of departments such as DND, PCO, CSIS, and PS, in addition to those of CSE and GAC. It is not sufficient for CSE to state that an MA and its associated activities align with these priorities without elaboration or consultation of any other parties, given that Canada’s national security and defence policy priorities are under the remit or coordination of DND, PCO, and PS. These departments would be best positioned to comment on, and confirm, a specific ACO’s alignment with Canada’s goals in order to mitigate the potential risks associated with these operations and contribute to overall accountability of these operations.

[**relates to GC national security matters**] As such, the governance process merits the inclusion of – or at the very least consultation with – other departments whose mandates are to oversee Canada’s broader strategic objectives. This could ensure that Canada’s broader interests and any potential risks have been sufficiently considered and reflected in the development of ACOs.

Finding no. 3: The current governance framework does not include a mechanism to confirm an Active Cyber Operation’s (ACO) alignment with broader Government of Canada (GC) strategic priorities as required by the CSE Act and the Ministerial Authorization. While these objectives and priorities that are outside CSE and GAC’s remit alone, the two departments govern ACOs without input from the broader GC community involved in managing Canada’s overarching objectives.

Recommendation no. 3: CSE and GAC should establish a framework to consult key stakeholders, such as the National Security and Intelligence Advisor to the Prime Minister and other federal departments whose mandates intersect with proposed Active Cyber Operations to ensure that they align with broader Government of Canada strategic priorities and that the requirements of the CSE Act are satisfied.

Threshold for conducting pre-emptive DCOs

CSE differentiates between DCOs initiated in response to a cyber threat, and DCOs issued pre-emptively to prevent a cyber threat from manifesting. Further, CSE and GAC have discussed the nature of these operations, including that they exist on a spectrum ranging from operations which are responsive, to those which can be proactive in nature. Notably, in the case of DCOs, [**relates to CSE operations**].

CSE has explained that the initiation of a DCO “requires evidence of a threat that represents a source of harm to a federal institution or designated electronic information or information infrastructure.” In CSE’s view, this threat does not need to compromise the infrastructure before a DCO be initiated so long as evidence establishes a connection between the two.

At the same time, CSE has not yet developed a means to distinguish between this type of DCO and an ACO, given that discussions between GAC and CSE noted that a DCO could resemble an ACO when it is conducted proactively. Unlike ACOs, which require the consent of the MFA and result in a comprehensive engagement of GAC throughout the planning process, DCOs only require consultation with the MFA. Without a clear threshold for a proactive DCO, the potential exists for insufficient involvement of GAC in an operation that could resemble (or constitute) an ACO, [**redacted**].

In our subsequent review, we will pay close attention to the nature of any pre-emptive DCOs planned and/or conducted to ensure that they do not constitute an ACO.

Finding no. 4: CSE and GAC have not established a threshold to determine how to identify and differentiate between a pre-emptive Defensive Cyber Operation and an Active Cyber Operation, which can lead to the insufficient involvement of GAC if the operation is misclassified as defensive.

Recommendation no. 4: CSE and GAC should develop a threshold that discerns between an Active Cyber Operation and a pre-emptive Defensive Cyber Operation, and this threshold should be described to the Minister of National Defence within the applicable Ministerial Authorizations.

Collection of information as part of a cyber operation

Under s. 34(4) of the CSE Act, the MND only issues an authorization if he or she concludes that no information will be acquired under the authorization except in accordance with an authorization issued under ss. 26(1) or 27(1) or (2) or 40(1). The ACO/DCO MAs issued under the period of review reflect this restriction. The ACO/DCO MAs and corresponding applications only mention that existing foreign intelligence MAs will be used to acquire information to support ACO/DCO activities. It further articulates that no information will be acquired in the conduct of ACO/DCO activities which are authorized under the ACO MA.

However, the MAs and the supporting applications do not describe the full extent of information collection activities resulting from ACO/DCOs. According to CSE policy, CSE is still permitted to collect information [**redacted**] so long as this activity is covered under another existing MA. CSE explained that ACO/DCO MAs cannot be relied on to facilitate intelligence collection, however [**relates to CSE operations**]. For example, [**redacted**] using the applicable Foreign Intelligence (FI) authority to [**redacted**] in accordance with GC intelligence priorities.

Although the CSE Act permits CSE to acquire information pursuant to collection MAs, NSIRA believes that CSE’s policy to allow collection activities under different MAs during the conduct of cyber operations is not accurately expressed within the ACO/DCO MAs. Instead, the collection of information is listed under prohibited conduct within the ACO MA, giving the impression that collection cannot occur under any circumstances. As a result, NSIRA notes that the way in which the ACO MA is written does not provide full transparency of CSE’s own internal policies.

CSE explained that [**redacted**] during an ACO/DCO. Further, NSIRA learned from a CSE subject-matter expert (SME) that a specific [**redacted**] which outlines the precise activities to be undertaken as part of the operation, guides each ACO/DCO. [**relates to CSE operations**].

Given CSE’s policy of allowing collection and cyber operations to occur simultaneously [**redacted**]NSIRA will closely review the roles and responsibilities [**redacted**] involved in ACO/DCOs, as well as the technical aspects of using CSE’s systems in support of ACO/DCOs, in our subsequent review of specific operations conducted by CSE to date.

Finding no. 5: CSE’s internal policies regarding the collection of information in the conduct of cyber operations are not accurately described within the Active and Defensive Cyber Operations Ministerial Authorizations.

Recommendation no. 5: In its applications to the Minister of National Defence, CSE should accurately describe the potential for collection activities to occur under separate authorizations while engaging in Active and Defensive Cyber Operations.

Internal CSE Governance

NSIRA set out to assess whether CSE’s internal governance process sufficiently incorporates all the necessary considerations in the planning and execution of the operations and, whether those implicated in the conduct of ACO/DCOs (i.e. GAC and [**redacted**]) are adequately informed of the parameters and limitations pertaining to cyber operations.

During the period of review, CSE operationalized its requirements in the CSE Act and MAs through various internal planning and governance mechanisms. These ranged from strategic, high-level planning documents and mechanisms to the individual operational [**documents/mechanisms**] of each ACO/DCO.

Governance of operations

As described earlier, CSE uses various planning and governance documentation in the approval process for individual ACO/DCOs, including the [**redacted**] CSE first develops the [**redacted**] an ACO/DCO. Following this, CSE creates a [**redacted**] which outlines the risks to be considered in conducting the ACO/DCO. Additionally, the [**redacted**] and the [**redacted**] both generally include fields relating to the prohibitions set out within the CSE Act. Once a specific target is chosen, the [**redacted**] serves as the final governance document, prior to the [**redacted**] of an ACO/DCO.

Similar to the ACO/DCO MAs, as an initial operational plan, the [**redacted**] generally preapproves a set of activities and a generalized [**redacted**] which are then further refined and developed as part of the [**redacted**] process. In NSIRA’s view, [**relates to CSE operations**].

Specifically, the [**relates to CSE operations**] and other operational details that, in NSIRA’s view, surpass simply [**redacted**] and contain key components of operational planning. [**redacted**] details the specific [**redacted**]. Nonetheless, despite the [**redacted**] the [**redacted**] it may have a lower approval threshold than that of the [**redacted**].

Overall, NSIRA welcomes that CSE has developed procedures and documented its operational planning associated with ACO/DCO activities, in accordance with its requirements in the MPS. Nonetheless, the numerous governance documents that comprise the governance of ACO/DCOs exist to serve different audiences and purposes, and result in pertinent information dispersed across them, rather than being available in a unified structure for all implicated stakeholders and decision- makers to assess. NSIRA believes the many separate components of governance may be redundant and result in unnecessary ambiguity within the same operational plans that are meant to guide ACO/DCOs. Thus, NSIRA will assess the efficacy of this governance structure as it is applied to operations as part of our subsequent review.

Finding no. 6: The [**redacted**] process, which occurs after planning documents have been approved, contains information that is pertinent to CSE’s broader operational plans. The at [**redacted**] times contained pertinent information absent from these other documents, even though it is approved at a lower level of management.

Recommendation no. 6: CSE should include all pertinent information, including targeting and contextual information, within all operational plans in place for a cyber operation, and in materials it presents to GAC.

Training on the new framework for cyber operations

Both the ACO and DCO Ministerial Authorizations authorize the following classes of persons to conduct ACO/DCO activities: [**relates to CSE’s operational policy**]. The MAs further require that these “persons or classes of persons must operationally support CSE and Government of Canada intelligence requirements, and demonstrate an understanding of the relevant legal and policy requirements.”

Further demonstrating a commitment to the training and education of its operational staff of the new legal and policy requirements, CSE has stated—with respect to a specific operation—that:

The operational activities undertaken [**redacted**] who receive extensive and continuous training on their function and duties as well as the policy considerations and compliance requirements for their specific role. Additionally, [**redacted**] are trained and accountable for the activities they are carrying out, including all relevant compliance reporting requirements. [**redacted**] performing activities [**redacted**] are also provided, in advance, all related operational materials to ensure the operational conditions outlined within are understood and adhered to.

Finally, CSE explained to NSIRA that “prior to the new Act being approved, CSE provided virtual and in-person briefings on the new authorities to all of CSE’s workforce. More tailored briefings were available for operational teams.” These included presentations and question-and-answer sessions with the Deputy Chief, Policy and Communications and other briefing sessions created by CSE’s policy teams. However, NSIRA notes these types of training sessions, while educational at a high level, are not operation-specific and do not test employees understanding of their new legislative operating environment.

Based on the above requirements and assurances, NSIRA expected to find that CSE employees supporting ACO/DCOs were provided with sufficient and effective training to thoroughly understand their responsibilities in light of CSE’s new legal authorities and constraints, and to apply this knowledge in the delivery of ACO/DCOs.

In this context, CSE conducted a tabletop exercise with a view to introduce [**certain employees**] to the MA design process at an early stage, to enlist their involvement in the drafting of MAs, and to test the functional viability of the MA framework, among other objectives. Throughout the exercise, [**the above mentioned employee**] barred from seeking advice from policy and legal representatives for management to be able to observe results as they may naturally occur. NSIRA notes a key observation from the exercise:

[**redacted**] expressed unease with the need to rely on multiple MAs to support evolving mission objectives. Policy guidance and training will be needed to [**redacted**] to know what authority they are operating under as they proceed with an operation across missions and across MAs. This guidance and training must also account for the fact that information collected under different MAs could be subject to different data management requirements.

CSE stated that [**certain employees**] obtain knowledge of the legal authorities, requirements, and prohibitions of an ACO or DCO through planning meetings and knowledge of the operational documents. In an interview with a CSE SME [**redacted**] NSIRA learned that the training offered on CSE’s new legal authorities, requirements, and prohibitions [**redacted**]. The SME said that if they had any questions about the governance, they would [**relates to CSE operations**].

It is unclear to NSIRA whether there exists a requirement for [**redacted**] to thoroughly understand the parameters delineated for an ACO/DCO within the [**redacted**]. For instance, when asked about their comfort level of operating under different MAs [**redacted**] contained in the [**redacted**] CSE explained that [**redacted**] are developed from the [**redacted**], but as described [**redacted**]. NSIRA is concerned that if [**certain employees**] are focused primarily on the [**certain document/mechanism**] they may not have an adequate understanding of the broader parameters and restrictions associated with an operation.

The MAs authorizing ACO/DCOs impose a condition on CSE’s employees involved in the execution of ACO/DCOs to demonstrate an understanding of the legal and policy requirements under which they operate. The MAs and operational planning documents contain valuable information about the parameters of the broader authority to conduct ACO/DCOs and specific operations. As such, NSIRA believes it is imperative that employees working on any aspect of delivering an ACO/DCO receive thorough training sessions to familiarize them with the requirements and limitations of their respective operations set out in the [**redacted**] and [**redacted**]. Finally, [**certain employees**] could be tested on their understanding of the MAs and their constraints on specific operations.

Finding no. 7: CSE has provided its employees with high-level learning opportunities to learn about its new authorities to conduct Active and Defensive Cyber Operations (ACO/DCOs). However, employees working directly on ACO/DCOs may not have the requisite understanding of the specifics of CSE’s new legal authorities and parameters surrounding their use.

Recommendation no. 7: CSE should provide a structured training program to its employees involved in the execution of Active and Defensive Cyber Operations (ACO/DCOs), to ensure that they have the requisite knowledge of CSE’s legal authorities, requirements, and prohibitions, as required by the associated Ministerial Authorizations.

Framework for CSE’s Engagement with GAC

Given the legislative requirement for the MFA to provide consent or to be consulted in relation to ACO/DCOs, NSIRA set out to assess whether CSE developed a framework for effective consultation and engagement of GAC officials in the intersection of their respective mandates.

GAC’s assessment of foreign policy risks

In GAC and CSE’s engagement during the development of the consultation framework, they developed a mechanism by which GAC is to consent or be consulted on an operation, and to provide its assessment of the operation’s foreign policy risk. In response to a consultation request by CSE, GAC is responsible for providing, within five business days, a Foreign Policy Risk Assessment (FPRA) that confirms whether [**redacted**]. Notably, the FPRA does not constitute an approval of an operation, only a consultation. In order to inform the development of the FRPA, CSE prepares a tailored [**document/mechanism**] for GAC which summarizes aspects of the operation. In our subsequent review, NSIRA will analyse whether the timeline provided to GAC for specific operations enabled it to meaningfully assess the associated foreign policy risks.

For GAC, several factors affect whether or not an ACO/DCO [**redacted**] These factors include whether an ACO/DCO aligns with GAC’s position on international norms in cyberspace and the furtherance of Canada’s national interests, [**relates to GC national security matters**] This is reflected in the TORs for the CSE-GAC WG, which require GAC to assess:

  • [**redacted**]
  • Compliance with international law and cyber norms;
  • Foreign Policy coherence, including whether the operation is in line with foreign policy, national security and defence priorities (i.e., beyond the [Standing Intelligence Requirements]); and
  • [**redacted**]

In the context of the above assessment requirements, GAC explained to NSIRA that it conducts a less detailed assessment of the foreign policy risk of specific operations, through the FPRA, on the basis that it has conducted a more detailed assessment of the classes of activities authorized in the MA.106 This assessment approach is reflected in [**redacted**] FPRAs received by NSIRA, which concluded that the operations fall within [**redacted**] but did not elaborate on the factors listed above. Given that the FPRA provides assurance of [**redacted**] of specific operations and is required under the ACO MA, NSIRA will closely review these assessments as part our subsequent review of operations.

Compliance with international law and cyber norms

[**redacted**]

Parliament may authorize violations of international law, but must do so expressly. An example of this is following the decision in X (Re), 2014 FCA 249, Parliament amended the CSIS Act through the adoption of Bill C-44 in 2015. The new provisions made it explicitly clear that CSIS could perform its duties and functions within or outside of Canada and that, pursuant to the newly adopted provisions of the CSIS Act, a judge may authorize activities outside Canada to enable the Service to investigate a threat to the security of Canada “without regard to any other law.” As per the language of the CSE Act, ACO/DCO MAs may only authorize CSE to carry out ACO/DCO activities “despite any other Act of Parliament or of any foreign state.” As outlined by case law, this language may not be sufficiently clear to allow the Minister to authorize violations of customary international law.

[**redacted**] the MAs reviewed by NSIRA stated that the activities “will conform to Canada’s obligations under international law” and each MA required that CSE’s “activities will not contravene Canada’s obligations under international law.” This would indicate that all activities conducted under this MA would be compliant with international law. However, the governance documents developed by CSE and GAC, such as the CSE-GAC consultation framework, do not set out parameters for assessing ACO/DCO activities for compliance with Canada’s obligations under international law, nor is it made clear against which specific international legal obligations ACO/DCO activities are to be assessed. NSIRA will closely monitor how CSE and GAC consider compliance with international law in relation to ACO/DCO activities in the subsequent review.

In NSIRA’s engagement with GAC, GAC highlighted its interdepartmental and international consultations dating back to 2016 on the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Tallinn Manual 2.0), which informed part of its development of the MAs [**redacted**]. GAC has created a Draft Desk book resulting from these consultations, which identifies Canada’s preliminary assessment of key rules of international law in cyberspace as described within the Tallinn Manual 2.0. NSIRA notes that while this analysis is a draft and does not represent Canada’s final position, it “has served as a starting point for further legal consideration.” NSIRA received no further documents that outline Canada’s understanding of how international law applies to ACO/DCO activities.

Further, documentation provided by both GAC and CSE recognizes a need to assess each potential ACO/DCO for lawfulness. GAC wrote that an analysis of the terms “acknowledged to be harmful” or “posing a threat to international peace and security” should be conducted within the context of each ACO/DCO. [**redacted**]

GAC explained that it assessed each activity within the authorized classes for compliance with international law at the MA development stage, and that consequently, a less detailed assessment of compliance with international law took place at the FPRA stage for each operation. GAC explained that the Draft Desk book and the Tallinn Manual 2.0 were consulted for these activities. From [**redacted**] FPRAs reviewed by NSIRA to date, it is not clear how the Draft Desk book or the analysis of the 2015 UN GGE voluntary norms has informed the assessment of each operation’s level of risk, or GAC’s conclusions that the ACO/DCOs complied with international law. Rather, GAC indicates that activities are compliant with international law, without an explanation of the basis behind these conclusions.

NSIRA notes that international law in cyberspace is a developing area, and recognizes that Canada and other States are continuing to develop and refine their legal analysis in this field. ACO/DCO activities conducted without a thorough and documented assessment of an operation’s compliance with international law would create significant legal risks for Canada if an operation violates international law. Ultimately, a better documented analysis of Canada’s legal obligations when conducting ACO/DCOs is necessary in order for GAC and CSE to assess an operation’s compliance with international law. NSIRA will further examine the lawfulness of ACO/DCO activities in our subsequent review.

Finding no. 8: CSE and GAC have not sufficiently developed a clear and objective framework with which to assess Canada’s obligations under international law in relation to Active and Defensive Cyber Operations.

Recommendation no. 8: CSE and GAC should provide an assessment of the international legal regime applicable to the conduct of Active and Defensive Cyber Operations. Additionally, CSE should require that GAC conduct and document a thorough legal assessment of each operation’s compliance with international law.

Bilateral communication of relevant information

Both GAC and CSE have implemented methodologies that require them to calculate risks based on certain factors. However, these types of risks are not absolute, and depend on a wide range of factors that can change over time or with the emergence of new information. In the case of GAC, those factors center around [**redacted**].

At present, CSE and GAC’s approach to accounting for any change in risks relies on GAC informing CSE if any change to Canada’s foreign policy should arise. However, based on GAC’s methodology above, the foreign policy risk of an operation may also rise if new information is uncovered about [**redacted**] or in relation to the potential impacts of the operation beyond a [**redacted**] For CSE’s part, it appears to primarily focus on changes to operational risks [**that are uncovered at a certain time or in a certain manner**]. This one-way mechanism does not account for other factors [**redacted**].

In this context, CSE has explained that an ACO/DCO is [**redacted**] and that as result, [**redacted**]. CSE further explained that DX and that subsequent activities may be adjusted as required using information obtained from the previous one. [**redacted**].

In this context, NSIRA observed operations that were planned to take place over a period of time, including a DCO where CSE would undertake [**related to CSE operations**]. Another ACO would see CSE [**redacted**]. In describing this operation to GAC, CSE wrote that activities would take place over a period of time [**redacted**].

[**related to CSE operations**] benefit from [**redacted**] of the ADO/DCOs [**redacted**]. NSIRA believes that a two-way notification mechanism triggering a re-assessment of the risks associated with an ACO/DCO should be established between CSE and GAC, whether those risks are uncovered prior to or during the course of an operation.

Finally, CSE’s internal governance process brings in GAC through [**a certain document/mechanism**]. In this context, GAC has highlighted objectives, [**redacted**] of an operation as information that CSE should provide for the purposes of assessing foreign policy risks. NSIRA has observed that the [**redacted**]. NSIRA notes that these details serve as important context to which GAC should have access as part of its assessment, particularly as GAC includes in its conclusions that the activities complied with [**redacted**].

Finding no. 9: CSE expects GAC to provide notification of any changes to foreign policy risks, but has not sufficiently considered the need to communicate other risks that may arise during an operation to GAC. Further, information critical to GAC’s assessment of foreign policy risks has also been excluded in materials CSE uses to engage GAC on an operation. As such, within the current consultation framework, CSE may not sufficiently communicate relevant information to GAC in support of its foreign policy assessment, and to manage ongoing changes in the risk associated with a cyber operation.

Recommendation no. 9: CSE and GAC should communicate to one another all relevant information and any new developments relevant to assessing risks associated with a cyber operation, both in the planning phases and during its execution.

Conclusion

This was NSIRA’s first review of CSE’s new powers to conduct ACO/DCOs, and it has illustrated CSE and GAC’s development of a governance structure for conducting these operations. CSE has now had the power to conduct these operations since 2019, though this review demonstrated that both departments begun conceptualizing a governance regime prior to the coming into force of the CSE Act. NSIRA is satisfied that CSE has, to date, developed a comprehensive governance structure, and commends its regular engagement with GAC to develop a consultation framework that sets out the roles and responsibilities of both departments.

However, at the broader governance level, CSE can improve the transparency and clarity around the planning of ACO/DCOs, particularly at this early stage, by setting out clearer parameters within the associated MAs for the classes of activities and target sets that could comprise ACO/DCOs. NSIRA further believes the continued development of cyber operations should benefit from consultation with other government departments responsible for Canada’s strategic priorities and objectives in the areas of national security and defence. Finally, CSE and GAC should develop a threshold and a definition for what constitutes a pre-emptive DCO, so as to ensure the appropriate involvement of GAC in an operation.

At the operational level, CSE and GAC should ensure that each operation’s compliance with international law is assessed and documented. On CSE’s part, it should ensure that information critical to assessing the risks of an operation be streamlined and included within all governance documents, and made available to all those involved in the development and approval of ACO/DCOs – including GAC. Finally, CSE should ensure that its operational staff are well-versed in the specifics of their new legislative framework and its applicability to specific operations.

While this review focused on the governance structures at play in relation to ACO/DCOs, of even greater importance is how these structures are implemented, and followed, in practice. We have made several observations about the information contained within the governance documents developed to date, and will subsequently assess how they are put into practice as part of our forthcoming review of ACO/DCOs.

Annex A: ACO/DCO Typologies

Figure 1: Different types of cyber operations. Source: CSE briefing materials

[**redacted figure**]

Figure 2: Difference between ACOs and DCOs. Source: CSE briefing material.

Figure 2: Difference between ACOs and DCOs. Source: CSE briefing material.
DEFENSIVE CYBER OPERATIONS ACTIVE CYBER OPERATIONS
Authorized Activites
  • Gaining acess to a portion of the global information infrastructure
  • Installing, maintaining, copying, distributing, searching, modifying, disruption, deleting or intercepting anything on or through the global information infrastructure
  • Doing anything that is reasonably necessary to maintain the covert nature of the activity
  • Carrying out any other activity that is reasobably in the circumstances and reasonably necessary in the aid of any other activity, or class of activities, authorized by the Ministerial Authorization
Ministerial Approval MND approval with MFA consultation MND approval with the consent or request of MFA
Intent To take action online to protect electronic information and infrastructures of importance to the government of Canada To degrade, disrupt, influence, respond to or interfere with capabilities of foreign individual, state, organization
Context Initiated in response to a cyber threat, or proactively to prevent a cyber threat Initiated in accordance with Ministerial direction as it relates to international affairs defence or security.
Threat Actor/Target Set Conducted against threats linked to Government systems and systems of importance, irrespective of the actor
**Once confirmed not against a Canadian, person in Canada, or on GII in Canada
Conducted against specific targets in acordance with the Ministerial Authorization
**Once confirmed not against a Canadian, person in Canada, or on GII in Canada
Outcome Conducted with a view to stop or prevent cyber threats in a manner that is reasonable and proportionate to the intrusion or threat Conducted to the extent directed by the Ministerial Authorization and that is reasonable and proportionate

Annex B: ACO/DCOs (2019-2020)

[**redacted**]

Annex C: CSE-GAC Framework

Interdepartmental Group CSE-GAC Senior Management Team (SMT) DG CSE-GAC ACO/DCO Working Group ADM-Level
Co-Chairs SMT Co-Chairs: CSE DG, [**redacted**], GAC, DG Intelligence Bureau Co-Chairs: CSE, DG [**redacted**] GAC,DG Intelligence Bureau. It iscomposed of some of the same DG-Level participants as the SMT as well as their working-level supports. Co-Chairs: CSE, Deputy Chief, SIGINT GAC, ADM (Political Director) International Security
Roles and Responsibilities

Exchanges information on the departments’ respective plans and priorities, as well as areas of collaboration.
Under the auspices of the SMT, this entity was established with a mandate to collaborate specifically on ACO/DCO matters.
Implementation of the governance framework associated with current and planned [**redacted**]. Coordinates information sharing related to the operational planning and execution of ACO/DCOs, as well as their associated risks and adherence to Canada’s foreign policy Collaborates on the renewal, evolution, and development of current and future MAs
Resolves any issues under the purview of the WG that cannot reach resolution at the DG-level.

Annex D: Findings and Recommendations

Findings

Finding no. 1: The Active and Defensive Cyber Operations Ministerial Authorization Applications do not provide sufficient detail for the Minister(s) to appreciate the scope of the classes of activities being requested in the authorization. Similarly, the Ministerial Authorization does not sufficiently delineate precise classes of activities, associated techniques, and intended target sets to be employed in the conduct of operations.

Finding no. 2: The assessment of the foreign policy risks required by two conditions within the Active and Defensive Cyber Operations Ministerial Authorizations relies too much on technical attribution risks rather than characteristics that reflect Government of Canada’s foreign policy.

Finding no. 3: The current governance framework does not include a mechanism to confirm an Active Cyber Operation’s (ACO) alignment with broader Government of Canada (GC) strategic priorities as required by the CSE Act and the Ministerial Authorization. While these objectives and priorities that are outside CSE and GAC’s remit alone, the two departments govern ACOs without input from the broader GC community involved in managing Canada’s overarching objectives.

Finding no. 4: CSE and GAC have not established a threshold to determine how to identify and differentiate between a pre-emptive Defensive Cyber Operation and an Active Cyber Operation, which can lead to the insufficient involvement of GAC if the operation is misclassified as defensive.

Finding no. 5: CSE’s internal policies regarding the collection of information in the conduct of cyber operations are not accurately described within the Active and Defensive Cyber Operations Ministerial Authorizations.

Finding no. 6: The [**redacted**] process, which occurs after planning documents have been approved, contains information that is pertinent to CSE’s broader operational plans. The [**redacted**] at times contained pertinent information absent from these other documents, even though it is approved at a lower level of management.

Finding no. 7: CSE has provided its employees with high-level learning opportunities to learn about its new authorities to conduct Active and Defensive Cyber Operations (ACO/DCOs). However, employees working directly on ACO/DCOs may not have the requisite understanding of the specifics of CSE’s new legal authorities and parameters surrounding their use.

Finding no. 8: CSE and GAC have not sufficiently developed a clear and objective framework with which to assess Canada’s obligations under international law in relation to Active and Defensive Cyber Operations.

Finding no. 9: CSE expects GAC to provide notification of any changes to foreign policy risks, but has not sufficiently considered the need to communicate other risks that may arise during an operation to GAC. Further, information critical to GAC’s assessment of foreign policy risks has also been excluded in materials CSE uses to engage GAC on an operation. As such, within the current consultation framework, CSE may not sufficiently communicate relevant information to GAC in support of its foreign policy assessment, and to manage ongoing changes in the risk associated with a cyber operation.

Recommendations

Recommendation no. 1: CSE should more precisely define the classes of activities, associated techniques, and intended target sets to be undertaken for Active and Defensive Cyber Operations as well as their underlying rationale and objectives, both in its Applications and associated Ministerial Authorizations for these activities.

Recommendation no. 2: GAC should include a mechanism to assess all relevant foreign policy risk parameters of Active and Defensive Cyber Operations within the associated Ministerial Authorizations.

Recommendation no. 3: CSE and GAC should establish a framework to consult key stakeholders, such as the National Security and Intelligence Advisor to the Prime Minister and other federal departments whose mandates intersect with proposed Active Cyber Operations, to ensure that they align with broader Government of Canada strategic priorities and that the requirements of the CSE Act are satisfied.

Recommendation no. 4: CSE and GAC should develop a threshold that discerns between an Active Cyber Operation and a pre-emptive Defensive Cyber Operation, and this threshold should be described to the Minister of National Defence within the applicable Ministerial Authorizations.

Recommendation no. 5: In its applications to the Minister of National Defence, CSE should accurately describe the potential for collection activities to occur under separate authorizations while engaging in Active and Defensive Cyber Operations.

Recommendation no. 6: CSE should include all pertinent information, including targeting and contextual information, within all operational plans in place for a cyber operation, and in materials it presents to GAC.

Recommendation no. 7: CSE should provide a structured training program to its employees involved in the execution of Active and Defensive Cyber Operations (ACO/DCOs), to ensure that they have the requisite knowledge of CSE’s legal authorities, requirements, and prohibitions, as required by the associated Ministerial Authorizations.

Recommendation no. 8: CSE and GAC should provide an assessment of the international legal regime applicable to the conduct of Active and Defensive Cyber Operations. Additionally, CSE should require that GAC conduct and document a thorough legal assessment of each operation’s compliance with international law.

Recommendation no. 9: CSE and GAC should communicate to one another all relevant information and any new developments relevant to assessing risks associated with a cyber operation, both in the planning phases and during its execution.

Share this page
Date Modified:

CSE’s Governance of Active and Defensive Cyber Operations – Government Responses

Date of Publishing:

Executive Summary

This was NSIRA’s first review of CSE’s governance of Active and Defensive Cyber Operations (ACO/DCOs). The review assessed the governance framework that guides the conduct of ACO/DCOs and whether CSE appropriately considers its legal obligations and the foreign policy impacts of operations.

CSE’s authority to conduct ACO/DCOs was introduced in 2019 through the Communications Security Establishment Act. These powers did not exist prior to the introduction of that legislation and are important new capabilities for the Government of Canada. The current global environment is clarifying the relevance of these capabilities and authorities for Canada. 

 In keeping with its commitment to lawfulness, CSE has worked diligently and methodically to operationalize these new authorities. As CSE continues to develop this capability, it is proceeding cautiously to ensure all activities are carried out in accordance with the CSE Act, and in line with Canada’s international obligations, in particular those highlighted in Canada’s recently published statement on the application of International Law in cyberspace.

CSE acknowledges the crucial role that review bodies play in the national security and intelligence community and CSE welcomes reviews by and recommendations from these review bodies. NSIRA’s recommendations from its review of CSE’s ACO/DCO governance framework will help guide the development of CSE’s capabilities so that CSE can continue to ensure lawfulness as well as effectiveness, efficiency and responsiveness.

As a crucial partner in the ACO/DCO governance framework, NSIRA engaged GAC in this review and made recommendations in relation to both GAC and CSE. CSE and GAC are pleased to provide the following response to NSIRA’s recommendations.


Recommendation no.1:

CSE should more precisely define the classes of activities, associated techniques, and intended target sets to be undertaken for Active and Defensive Cyber Operations as well as their underlying rationale and objectives, both in its Applications and associated Ministerial Authorizations for these activities.

CSE’s response:

CSE agrees with this recommendation.

While CSE agrees with this recommendation, CSE notes that the Minister is always provided with a sufficient amount of information and detail necessary to assess the application and grant an authorization.

CSE agrees that, where operationally appropriate, combining the information contained in briefings and presentations into the written application and authorisation will provide a more comprehensive written record. CSE has begun refining the information included in Active Cyber Operations (ACO) and Defensive Cyber Operations (DCO) applications and authorisations.


Recommendation no.2:

GAC should include a mechanism to assess all relevant foreign policy risk parameters of Active and Defensive Cyber Operations within the associated Ministerial Authorizations.

GAC’s response:

GAC agrees with this recommendation.

GAC already includes a consideration of a wide variety of factors in its Foreign Policy Risk Assessment, as identifiable in the Foreign Policy Risk Assessment template.

CSE has also in the past provided separate operational/technical risk assessments in its mission plans. This has included additional information about the targets and their activities on the GII, the technologies they use, or the complex technical systems CSE develops and deploys to conduct these operations.


Recommendation no.3:

CSE and GAC should establish a framework to consult key stakeholders, such as the National Security and Intelligence Advisor to the Prime Minister and other federal departments whose mandates intersect with proposed Active Cyber Operations to ensure that they align with broader Government of Canada strategic priorities and that the requirements of the CSE Act are satisfied.

Joint CSE and GAC response:

In principle, CSE and GAC agree with this recommendation.

All relevant Government of Canada stakeholders whose mandates may intersect with a planned ACO are consulted. We agree with the importance of ensuring alignment with broad Government of Canada strategic priorities and believe there are a number of avenues already in place through which updates can be shared and consultations can be undertaken with the broader security and intelligence community as and when needed. Examples of this include the Assistant Deputy Minister (ADM) and Deputy Minister (DM) level security and intelligence committee infrastructure (e.g. ADM National Security Operations Committee, DM Operations Committee) and the geographic-specific committee infrastructure. Additionally, there is a community-wide intelligence priority process that provides a framework and guidance for intelligence-related activities such as cyber operations.

We appreciate that as the types of ACOs considered and undertaken broaden, the current model for consulting government departments and agencies may need to evolve. CSE and GAC will work together to evolve an appropriate consultation framework over time as needed.


Recommendation no.4:

CSE and GAC should develop a threshold that discerns between an Active Cyber Operation and a pre-emptive Defensive Cyber Operation, and this threshold should be described to the Minister of National Defence within the applicable Ministerial Authorizations.

Joint CSE and GAC response:

CSE and GAC disagree with this recommendation.

CSE and GAC cannot agree with this recommendation as it refers to an activity (pre-emptive Defensive Cyber Operation) that is not provided for in the Communications Security Establishment Act (CSE Act) and that CSE does not conduct.

Under the DCO aspect of CSE’s mandate in section 18 of the CSE Act, CSE is authorized to carry out activities on or through the global information infrastructure to help protect federal institutions’ electronic information and information infrastructures and electronic information and information infrastructures designated under the CSE Act as being of importance to the Government of Canada (relevant infrastructure). The threat does not need to have compromised the information or infrastructure before a DCO is initiated, but it must present a credible threat to the designated information infrastructure(s). (U) In circumstances where CSE is aware a cyber threat exists but this threat has not manifested as a threat to the designated infrastructure(s), CSE can consider conducting an ACO. CSE can only conduct an ACO if it can satisfy the Minister that any intended activities would degrade, disrupt, influence, respond to or interfere with the capabilities, intentions or activities of a foreign individual, state or organisation or terrorist group as they relate to international affairs, defence or security.

If NSIRA believes that CSE and GAC need to more clearly define the threshold between an ACO and a DCO, then CSE and GAC also disagree with this recommendation on the basis that the CSE Act clearly sets out the conditions that CSE must satisfy before undertaking cyber security activities, DCOs or ACOs. There is no need for any other threshold to be created.


Recommendation no. 5:

In its applications to the Minister of National Defence, CSE should accurately describe the potential for collection activities to occur under separate authorizations while engaging in Active and Defensive Cyber Operations.

CSE’s response:

CSE agrees with this recommendation.

CSE already accurately describes the potential for collection activities, and the authority for such activities, in its applications to the Minister of National Defence.  CSE has taken steps to ensure that applications for and authorizations of ACOs and DCOs clearly reference the authorizations under which any acquisition of information required to achieve the intended outcome of the ACO or DCO is conducted.

Importantly, CSE is not permitted to acquire information under an ACO or DCO authorization. The acquisition of the information relied on to conduct ACO and DCO activities is authorised under CSE’s foreign intelligence authorization, cybersecurity authorization or an emergency authorization. The use of this information in support of ACO and DCO purposes is outlined in CSE’s foreign intelligence and cybersecurity authorizations. These authorizations are reviewed by the Intelligence Commissioner who assesses the reasonableness and proportionality of the acquisition and use of information for ACO and DCO purposes.


Recommendation no. 6:

CSE should include all pertinent information, including targeting and contextual information, within all operational plans in place for a cyber operation, and in materials it presents to GAC.

CSE’s response:

CSE disagrees with this recommendation.

GAC requires sufficient and pertinent information upon which to base its analysis related to foreign risk and international law. CSE has worked with GAC to share the appropriate level of operational detail that GAC has requested to conduct their work.  This need is reflected in the CSE-GAC Governance Framework whereby GAC is provided with an operation-specific Mission Plan to inform its Foreign Policy Risk Assessment. GAC is satisfied with the information provided by CSE. When GAC has required additional information to conduct its Foreign Policy Risk Assessment or international law assessment, CSE has provided the supplemental information requested.


Recommendation no. 7:

CSE should provide a structured training program to its employees involved in the execution of Active and Defensive Cyber Operations (ACO/DCOs), to ensure that they have the requisite knowledge of CSE’s legal authorities, requirements, and prohibitions, as required by the associated Ministerial Authorizations.

CSE’s response:

CSE agrees with this recommendation.

To supplement the existing mandatory annual training and testing that covers CSE’s legal authorities, requirements and prohibitions, CSE will consider developing a tailored training program for employees involved in the planning and execution of ACOs and DCOs.


Recommendation no. 8:

CSE and GAC should provide an assessment of the international legal regime applicable to the conduct of Active and Defensive Cyber Operations. Additionally, CSE should require that GAC conduct and document a thorough legal assessment of each operation’s compliance with international law.

Joint CSE and GAC response:

CSE and GAC partially agree with this recommendation.

In the time since this review concluded, GAC and CSE have continued to develop the process for assessing the international legal implications of cyber operations, with GAC’s Legal Bureau documenting a thorough legal assessment of each operation’s compliance with international law.

Procedurally, CSE submits a Mission Plan to GAC requesting a Foreign Policy Risk Assessment. Once received, GAC’s Legal Bureau leads a consultation process with Department of Justice (DOJ) counsel from both CSE’s and GAC’s Department of Legal Services (DLS), and in some cases, with DOJ counsel from the Constitutional, Administrative and International Law Section (CAILS), to discuss the international law implications of the planned operation as described in the Mission Plan. (U) These discussions are summarised in a written legal assessment recorded in the Foreign Policy Risk Assessment and are grounded in the international law analysis the GAC Legal Bureau has been developing over many years, including in the Government of Canada’s comments on the draft chapter of Tallinn Manual 2.0 in 2016, the development of the Draft Desk Book coordinated by GAC’s Legal Bureau and produced in August 2019, and the extensive legal analysis done in advance of the original ACO and DCO MAs.

GAC notes that it would be unusual to produce a comprehensive legal assessment of applicable law with respect to a range of potential or hypothetical operations that might be conducted by Canada, its allies and its adversaries in any field, cyber or otherwise. Rather it is GAC’s practice, like that of States generally, to produce legal assessments in relation to specific proposed activities or operations or court cases or other potential disputes.

GAC has consolidated its international legal analysis into a public statement on international law applicable to cyberspace. This public statement was developed and completed through extensive interdepartmental consultations among legal and policy experts, as well as an analysis of other national statements and leading publications and processes, including Tallinn Manual 2.0, the Swiss-led Expert Dialogue on International Law and Cyber, the Dutch-led Hague process, the Swiss-led Informal Consultations on International Humanitarian Law and Cyber Operations, the Oxford Process, and the US Cyber Command annual Legal Conference. Canada has joined like-minded and other nations in producing a public statement, in part to advance ongoing multilateral processes at the United Nations and elsewhere, to further develop common understandings and a broader consensus on how international law applies in cyberspace.


Recommendation no. 9:

CSE and GAC should communicate to one another all relevant information and any new developments relevant to assessing risks associated with a cyber operation, both in the planning phases and during its execution.

Joint CSE and GAC response:

CSE and GAC agree with this recommendation.

In the time since this review concluded, CSE and GAC have increased the frequency of working-level exchanges. Under the GAC-CSE Foreign Cyber Operations Governance Framework, GAC and CSE will bolster the existing points of contact and develop standard operating procedures for CSE and GAC to mutually provide any new information or developments relevant to a cyber operation.

Share this page
Date Modified:

Departmental Plan: 2024-2025

Plans at a glance

A departmental plan describes a department’s priorities, plans and associated costs for the upcoming three fiscal years.

  • Vision, mission, raison d’etre and operating context
  • Minister’s mandate letter

Key priorities

In 2024–25, the NSIRA Secretariat’s top priorities are to

  • support NSIRA Members in undertaking professional, independent reviews of Canada’s national security and intelligence activities;
  • support NSIRA Members in conducting independent investigations of national security and intelligence public complaints;
  • provide transparency about our work; and
  • continue to strengthen our domestic and international partnerships.

Refocusing Government Spending

In Budget 2023, the government committed to reducing spending by $14.1 billion over the next five years, starting in 2023–24, and by $4.1 billion annually after that.

While not officially part of the government spending reduction exercise, the NSIRA Secretariat will respect the spirit of this exercise by

  • critically considering the need for contractors, and
  • identifying work that can be done in-house or deferred, if required.

NSIRA remains committed to managing spending with prudence and probity and that resources are used effectively, and efficiently to achieve organizational objectives. 

Highlights

A Departmental Results Framework consists of an organization’s core responsibilities, the results it plans to achieve, and the performance indicators that measure progress toward these results.

National security and intelligence reviews and complaints investigations

Departmental results:

NSIRA reviews Government of Canada national security and intelligence activities to assess whether they are lawful, reasonable, and necessary. The Agency also investigates complaints from members of the public on the activities of the Canadian Security Intelligence Service (CSIS), the Communications Security Establishment (CSE), the Royal Canadian Mounted Police (RCMP), as well as certain other national security-related complaints, independently and in a timely manner.

The NSIRA Secretariat supports the Agency in the delivery of its mandate. Independent scrutiny contributes to strengthening the accountability framework for national security and intelligence activities and to enhancing public confidence. Ministers and Canadians are informed whether national security and intelligence activities undertaken by Government of Canada institutions are lawful, reasonable, and necessary.

See GC InfoBase for the full framework and program inventory.

Planned spending: $10,852,987

Planned human resources: 69

Support to national security and intelligence reviews and complaints investigations: The NSIRA Secretariat will support the Agency as it ensures institutions’ accountability and enhances public confidence. This will involve conducting transparent and timely investigations into complaints related to national security or intelligence activities and the denial of security clearances.

Throughout 2024–25, the NSIRA Secretariat will support and conduct the Agency’s current reviews and initiate new reviews as per its Forward Review Plan. It will also conduct the Agency’s mandated annual reviews under the National Security and Intelligence Review Agency Act and annual reviews of CSIS and CSE activities.

For more information on the NSIRA Secretariat’s plans, see the “Plans to deliver” section of this plan.

More information about National security and intelligence reviews and complaints investigations can be found in the full departmental plan.

Date of Publishing:

From the Executive Director

This Departmental Plan describes the priorities and goals for the National Security and Intelligence Review Agency (NSIRA) Secretariat in 2024–25. Our work is fundamentally anchored by our role in supporting the Agency’s mandate to undertake independent, expert review and investigation of the Government of Canada’s national security and intelligence activities.

Since the Agency’s inception in 2019, the NSIRA Secretariat has worked to establish a professional workforce and the supporting infrastructure, processes, and policies needed to carry out its mandate. Our approaches have matured as we have taken time for deep internal reflection and to consult with our domestic and international partners. Combined with the growing willingness of the national security community to genuinely accept and adjust to our mandate, we are now well positioned to leverage what we have learned and confidently advance our work as a world-recognized review body. In so doing, we will continue to work towards NSIRA’s vision of an accountable, transparent, and effective national security and intelligence community that upholds the rule of law.

In 2024–25, the Secretariat will continue to improve the quality of our working environment to attract and retain an exceptional workforce. We recognize that prioritizing the physical and mental well-being of our employees, and continuing to advance diversity and inclusion, are important aspects of becoming an employer of choice. We have taken steps to implement meaningful action in the coming year. NSIRA is well positioned to take on new and exciting challenges in the year ahead. I would like to thank both Secretariat staff and NSIRA Members, whose ongoing professionalism and dedication to our important work continues to be the force behind our past and future success.

John Davies
Executive Director
National Security and Intelligence Review Agency Secretariat

Plans to deliver on core responsibilities and internal services

Core responsibilities and internal services:

  • National security and intelligence reviews and complaints investigations
  • Internal services

National security and intelligence reviews and complaints investigations

Description

NSIRA reviews Government of Canada national security and intelligence activities to assess whether they are lawful, reasonable, and necessary. The Agency investigates complaints from members of the public regarding activities of CSIS, CSE, and the national security activities of the RCMP, as well as certain other national security-related complaints.

The NSIRA Secretariat supports the Agency in the delivery of this mandate. The resulting independent scrutiny contributes to the strengthening of the framework of accountability for national security and intelligence activities undertaken by Government of Canada institutions and enhancing public confidence.

Quality of life impacts

NSIRA’s core responsibility relates most closely to the indicator ‘confidence in institutions’, within the ‘democracy and institutions’ sub domain and under the overarching domain of ‘good governance’.

Results and targets

The following tables show, for each departmental result related to national security and intelligence reviews and complaints investigations, the indicators, the results from the three most recently reported fiscal years, the targets and target dates approved in 2024–25.

Table 1: Indicators, results and targets for departmental result “Ministers and Canadians are informed whether national security and intelligence activities undertaken by Government of Canada institutions are lawful, reasonable, and necessary”

Indicator 2020–21 result 2021–22 result 2022–23 result Target Date to achieve
All mandatory reviews are completed on an annual basis N/A 100% 100% 100% completion of mandatory reviews  December 2022
Reviews of national security or intelligence activities of at least five departments or agencies are conducted each year N/A 100% 100% At least one national security or intelligence activity is reviewed in at least five departments or agencies annually December 2022
All Member-approved high priority national security or intelligence activities are reviewed over a three- year period N/A 33% 33% 100% completion over three years; at least 33% completed each year December 2022

Table 2: Indicators, results, and targets for departmental result “National security-related complaints are independently investigated in a timely manner”

Indicator 2020–21 result 2021–22 result 2022–23 result Target Date to achieve
Note: NSIRA was created on July 12, 2019. Actual results for 2020–21 are not available because the new Departmental Results Framework was being developed during the transition of the Security Intelligence Review Committee into the establishment of NSIRA. The new framework is for measuring and reporting on results achieved starting in 2021–22; in 2022–23, NSIRA finalized service standards on the time required to complete its investigations (effective April 1, 2023). The results will be included in the next Departmental Results Report.
Percentage of investigations completed within NSIRA service standards N/A N/A N/A 90% – 100% March 2024

The financial, human resources and performance information for NSIRA’s program inventory is available on GC InfoBase.

Plans to achieve results

Support to NSIRA reviews

The NSIRA Secretariat will continue to support the Agency’s current, ongoing reviews and new reviews from the Forward Review Plan throughout 2024–25. This will include supporting the annual reviews of CSIS and CSE activities, to provide responsible Ministers and the Canadian public with an assessment of these institutions’ activities, including their lawfulness, reasonableness, and necessity.

In 2024–25, the NSIRA Secretariat will continue to be informed and guided by the knowledge acquired through reviews of departments and agencies (reviewees) to date. As it becomes increasingly familiar with reviewees’ organizational structures, networks, policies, and activities, and able to apply such information to subsequent reviews, it will leverage this knowledge to ensure these institutions’ national security and intelligence activities are reviewed from a strongly informed position of independence. The NSIRA Secretariat will also continue to support reviews focused on crosscutting, horizontal issues that span multiple reviewees, with a goal of fully leveraging NSIRA’s authority in this regard.

In addition to conducting its mandated annual reviews in 2024-25, the NSIRA Secretariat will lead the development of a new review plan that is timely, topical, and responsive. The Forward Review Plan involves evaluating proposals for new reviews against an established matrix of criteria. The criteria represent the considerations or aspects that NSIRA deems to be the most important and relevant to the issues and topics it addresses through its discretionary reviews. The outcome will be a prioritized list of new reviews that will be undertaken once the existing reviews are completed. In this way, the NSIRA Secretariat will continue to support NSIRA Members in executing their responsibilities and exercising their authority under the NSIRA Act.

Support to NSIRA complaints investigations

In 2024–25, the NSIRA Secretariat will support the Agency in ensuring institutions’ accountability and enhancing public confidence by conducting transparent and timely investigations into complaints related to national security and the denial of security clearances. NSIRA’s independent investigation of complaints plays a critical role in maintaining public access to justice.

In the coming year, the NSIRA Secretariat will apply its rules of procedure, which were first implemented in 2021, to promote accessibility, timeliness, and efficiency in the Agency’s investigation of complaints. This includes an informal resolution process that has proven successful in resolving complaints that do not need to proceed e to formal investigation process.

The NSIRA Secretariat will further implement the Agency’s new service standards for the investigation of complaints, which were created in 2022–23 and effective as of April 1, 2023.

Transparency

The NSIRA Secretariat will continue to proactively publish unclassified versions of all Agency review reports. It will engage reviewees in a timelier manner on release approvals and aim to publish redacted reports on the NSIRA website shortly after these reports are provided to reviewees and their respective Ministers, leveraging processes developed during the previous year.

Partnerships

Participation

In 2024–25, the NSIRA Secretariat will build on its ongoing partnership efforts from the previous year. It will continue its participation in the Five Eyes Intelligence Oversight and Review Council, which brings together review agency representatives from Canada, the United States, Australia, New Zealand, and the United Kingdom.

Engagement

The NSIRA Secretariat will also continue to support multilateral and bilateral engagement with other like-minded European and international partners. Such participation and engagement will include ongoing working-level visits and exchanges. This work will support NSIRA’s interest in benefiting from, and contributing to, the sharing of best practices with the broader review and oversight community. The NSIRA Secretariat will also continue to build on recent efforts to foster collaborative relationships with other domestic review bodies and civil society groups.

Key risks

The NSIRA Secretariat has made progress on accessing the information required to conduct reviews; however, there continues to be risks associated with reviewees’ ability to respond to, and prioritize, information requests, hindering NSIRA’s ability to deliver its review plan in a timely way. The NSIRA Secretariat will continue to mitigate this risk by providing clear communication related to information requests, tracking their timely completion within communicated timelines, and escalating issues when appropriate.

Snapshot of planned resources in 2024–25
  • Planned spending: $18,575,110
  • Planned full-time resources: 100

In 2024–25, the NSIRA Secretariat will continue to implement its three-year action plan on human rights, accessibility, employment equity, diversity, and inclusion. It first put this plan into effect during fiscal year 2022–23, following a maturity assessment of its policies, programs, and practices, and the Call to Action from the Clerk of the Privy Council. It includes, among many components, incorporating a gender-based analysis plus lens into the design and implementation of the NSIRA Secretariat’s policies and programs.

Employee self-identification data, which was first collected by the NSIRA Secretariat in 2023–2024 (further to the establishment of a special program under the Canadian Human Rights Act), will continue to inform the NSIRA Secretariat’s activities in the year ahead and better position it to:

  • prevent, eliminate, or reduce disadvantages and barriers that are experienced by any group of individuals based on, or related to, prohibited grounds of discrimination;
  • identify gaps in representation, to implement recruitment and retention measures aimed at not only achieving but retaining a diverse workforce and maintaining an inclusive work environment;
  • leverage the value of diverse peoples and perspectives in its work; and
  • identify meaningful opportunities for employee engagement in keeping with its overall commitment to human rights, accessibility, employment equity, diversity, and inclusion.

NSIRA’s Forward Looking Review Plan continues to be informed by considerations related to anti-racism, equity, and inclusion. These considerations apply to the process of selecting reviews to be undertaken, as well as to the analysis that takes place during individual reviews. NSIRA reviews routinely take into account the potential for national security or intelligence activities to result in disparate outcomes for various communities, and will continue to do so in the year ahead.

In 2024–25, in the context of complaint investigations, the NSIRA Secretariat will continue to support the Agency as it works with the Civilian Review and Complaints Commission (CRCC) to develop strategies for the collection, analysis, and use of identity-based data. Following the completion of a joint study, it will focus on assessing how some recommendations can be implemented for the collection, analysis, and use of identity-based data in relation to the NSIRA and CRCC mandates.

The NSIRA Secretariat will also continue to implement its Accessibility Plan, which outlines the steps that will be taken to increase accessibility within the organization and for all Canadians over the next two years. In addition, its Diversity, Inclusion, and Employment Equity Advisory Committee will continue to work with management and staff to build a more equitable, diverse, and inclusive workplace and workforce. This will include organizing discussions and learning events with all staff and providing advice on policy and program design.

In the year ahead, the NSIRA Secretariat will also develop and implement a pay equity plan, as required by the Pay Equity Act. Closing any identified gender pay gap is essential to advancing gender equality and fostering a workplace driven by inclusivity and fairness.

Program inventory

National security and intelligence reviews and complaints investigations are supported by the following program in the program inventory:

  • National security and intelligence activity reviews and complaints investigations.

Supporting information on planned expenditures, human resources, and results related to NSIRA’s program inventory is available on GC Infobase.

Internal services

Description

Internal services are the services that are provided within a department so that it can meet its corporate obligations and deliver its programs. There are 10 categories of internal services:

  • management and oversight services
  • communications services
  • human resources management services
  • financial management services
  • information management services
  • information technology services
  • real property management services
  • materiel management services
  • acquisition management services

Plans to achieve results

In 2024–25, the NSIRA Secretariat will continue to take steps to ensure resources are deployed in the most effective and efficient manner possible, and its operations and administrative structures, tools, and processes continue to focus on supporting the delivery of its priorities.

The NSIRA Secretariat recognizes the need to be an inclusive, healthy, and flexible employer. Over the coming year, it will continue to encourage flexible working arrangements, such as teleworking, to achieve work–life balance and meet performance expectations.

In the coming year, the NSIRA Secretariat’s office footprint, with modern and flexible workstations in the classified and non-classified realm, is expected to be completed. The project has been pushed back to a summer 2024 delivery date due to its complexity, supply chain challenges, and compliance requirements.

The NSIRA Secretariat also continues to implement security controls and keeps its Security Plan and Business Impact Analysis evergreen, to ensure resiliency over time. In addition, based on the NSIRA Secretariat’s Information Management plans and strategies developed last fiscal year, it has identified the tools and resources required to execute the plans and strategies over the coming years.

Snapshot of planned resources in 2024-25
  • Planned spending: $7,722,123
  • Planned full-time resources: 31
Planning for contracts awarded to Indigenous businesses

The NSIRA Secretariat is among the final wave of departments and agencies that are to achieve the mandatory minimum target of contract awards to Indigenous businesses by 2024–25. Efforts are already well underway in support of the Government of Canada’s commitment which requires that an annual, mandatory minimum target of five percent of the total value of contracts be awarded to Indigenous businesses.

In 2021-22, the NSIRA Secretariat exceeded its plan to reach two percent of total contract values awarded to Indigenous business, and achieved three percent, as shown in Table 3. Measures undertaken by the NSIRA Secretariat to facilitate the achievement of the mandatory minimum target by 2024–25 include a commitment to process an increasing minimum number of contracts in each of the following three fiscal years, as set-asides under the Procurement Strategy for Indigenous Business.

Table 3: Progress toward target for contracts with Indigenous businesses

5% reporting field description 2021–22 actual % achieved 2022–23 actual % achieved 2023–24 planned % target 2024–25 planned % target
Total percentage of contracts with Indigenous businesses 3% 3% 3% 5%

Planned spending and human resources

This section provides an overview of NSIRA’s planned spending and human resources for the next three fiscal years and compares planned spending for 2024–25 with actual spending from previous years.

Spending

Table 4: Actual spending summary for core responsibilities and internal services ($ dollars)

The following table shows information on spending for each of NSIRA’s core responsibilities and for its internal services for the previous three fiscal years. Amounts for the current fiscal year are forecasted based on spending to date.

Core responsibilities and Internal Services 2020–21 actual expenditures 2021–22 actual expenditures 2022–23 forecast spending
National Security and Intelligence Reviews and Complaints Investigations 7,394,642 7,756,271 9,516,920
Subtotal 7,394,642 7,756,271 9,516,920
Internal Services 9,895,112 10,532,876 10,799,513
Total 17,289,754 18,289,147 20,316,433

Table 5: Budgetary planning summary for core responsibilities and internal services (dollars)

The following table shows information on spending for each of NSIRA’s core responsibilities and for its internal services for the upcoming three fiscal years.

Core responsibilities and Internal Services 2024–25 budgetary spending (as indicated in Main Estimates) 2024–25 planned spending 2025–26 planned spending 2026–27 planned spending
National Security and Intelligence Reviews and Complaints Investigations 10,852,987 10,852,987 10,852,051 10,852,051
Subtotal 10,852,987 10,852,987 10,852,051 10,852,051
Internal Services 7,722,123 7,722,123 7,758,034 7,758,034
Total 18,575,110 18,575,110 18,610,085 18,610,085

Funding

Figure 1: Departmental spending 2021–22 to 2026–27

The following graph presents planned spending (voted and statutory expenditures) over time.

Departmental spending trend graph
  2021–22 2022–23 2023–24 2024–25 2025–26 2026–27
Statutory 1,176,321 1,300,166 1,513,580 1,764,845 1,766,593 1,766,593
Voted 16,113,433 16,988,981 18,802,853 16,810,265 16,843,492 16,843,492
Total 17,289,754 18,289,147 20,316,433 18,575,110 18,610,085 18,610,085

Peak spending was reached in 2023–24 with the inclusion of the majority of construction project expenditures. The NSIRA Secretariat will move to steadier state of spending in 2024–25.

Estimates by vote

Information on NSIRA’s organizational appropriations is available in the 2024–25 Main Estimates.

Future-oriented condensed statement of operations

The future-oriented condensed statement of operations provides an overview of NSIRA’s operations for 2023–24 to 2024–25.

The forecast and planned amounts in this statement of operations were prepared on an accrual basis. The forecast and planned amounts presented in other sections of the Departmental Plan were prepared on an expenditure basis. Amounts may therefore differ.

A more detailed future-oriented statement of operations and associated notes, including a reconciliation of the net cost of operations with the requested authorities, are available at NSIRA’s website.

Table 6: Future-oriented condensed statement of operations for the year ending March 31, 2025 (dollars)

Financial information 2023–24 Forecast results 2024–25 Planned results Difference (2024–25 planned results minus 2023–24 Forecast results)
Total expenses 18,786,869 20,400,691 1,613,823
Total revenues 0 0 0
Net cost of operations before government funding and transfers 18,786,869 20,400,691 1,613,823

Human resources

Table 7: Actual human resources for core responsibilities and internal services

The following table shows a summary of human resources, in full-time equivalents (FTEs), for NSIRA’s core responsibilities and for its internal services for the previous three fiscal years. Human resources for the current fiscal year are forecasted based on year to date. 

Core responsibilities and Internal Services 2021–22 actual full time equivalents 2022–23 actual full time equivalents 2023–24 forecast full time equivalents
National Security and Intelligence Reviews and Complaints Investigations 52 53 69
Subtotal 52 53 69
Internal Services 22 25 31
Total 74 78 100

Given the NSIRA secretariat continues to be a growing organization, the increase of 4 FTEs is reasonable year over year. The organization plans to continue to grow towards 100 FTEs through various recruitment and retention programs.

Table 8: Human resources planning summary for core responsibilities and internal services

The following table shows information on human resources, in full-time equivalents (FTEs), for each of NSIRA’s core responsibilities and for its internal services planned for 2024–25 and future years.

Core responsibilities and Internal Services 2024–25 planned full time equivalents 2025–26 planned full time equivalents 2026–27 planned full time equivalents
National Security and Intelligence Reviews and Complaints Investigations 69 69 69
Subtotal 69 69 69
Internal Services 31 31 31
Total 100 100 100

With a tight labour market and the requirement for a significant portion of employees to work primarily from secure office space, recruitment continues to prove challenging. New recruitment and retention programs will help the NSIRA secretariat in its ongoing efforts to be fully staffed.

Corporate Information

Organizational profile

Appropriate minister: The Right Honourable Justin Trudeau, Prime Minister of Canada
Institutional head: John Davies, Executive Director
Ministerial portfolio: Privy Council Office
Enabling instrument: National Security and Intelligence Review Agency Act
Year of incorporation / commencement: 2019

Organizational contact information

National Security and Intelligence Review Agency
P.O. Box 2430, Station “D” Ottawa, Ontario
K1P 5W5

Telephone: The phone number is temporarily disabled
Fax: The fax number is temporarily disabled.
Emailinfo@nsira-ossnr.gc.ca
Websitewww.nsira-ossnr.gc.ca

Supplementary information tables

Information on NSIRA’s departmental sustainable development strategy can be found on NSIRA’s website

Federal tax expenditures

NSIRA’s Departmental Plan does not include information on tax expenditures.

Tax expenditures are the responsibility of the Minister of Finance. The Department of Finance Canada publishes cost estimates and projections for government wide tax expenditures each year in the Report on Federal Tax Expenditures.

This report provides detailed information on tax expenditures, including objectives, historical background and references to related federal spending programs, as well as evaluations, research papers and gender-based analysis plus.

Appendix: definitions

appropriation (crédit)

Any authority of Parliament to pay money out of the Consolidated Revenue Fund.

budgetary expenditures (dépenses budgétaires)

Operating and capital expenditures; transfer payments to other levels of government, organizations or individuals; and payments to Crown corporations.

core responsibility (responsabilité essentielle)

An enduring function or role performed by a department. The intentions of the department with respect to a core responsibility are reflected in one or more related departmental results that the department seeks to contribute to or influence.

Departmental Plan (plan ministériel)

A report on the plans and expected performance of an appropriated department over a 3‑year period. Departmental Plans are usually tabled in Parliament each spring.

departmental priority (priorité)

A plan or project that a department has chosen to focus and report on during the planning period. Priorities represent the things that are most important or what must be done first to support the achievement of the desired departmental results.

departmental result (résultat ministériel)

A consequence or outcome that a department seeks to achieve. A departmental result is often outside departments’ immediate control, but it should be influenced by program-level outcomes.

departmental result indicator (indicateur de résultat ministériel)

A quantitative measure of progress on a departmental result.

departmental results framework (cadre ministériel des résultats)

A framework that connects the department’s core responsibilities to its departmental results and departmental result indicators.

Departmental Results Report (rapport sur les résultats ministériels)

A report on a department’s actual accomplishments against the plans, priorities and expected results set out in the corresponding Departmental Plan.

experimentation (expérimentation)

The conducting of activities that seek to first explore, then test and compare the effects and impacts of policies and interventions in order to inform evidence-based decision-making, and improve outcomes for Canadians, by learning what works, for whom and in what circumstances. Experimentation is related to, but distinct from innovation (the trying of new things), because it involves a rigorous comparison of results. For example, using a new website to communicate with Canadians can be an innovation; systematically testing the new website against existing outreach tools or an old website to see which one leads to more engagement, is experimentation.

full‑time equivalent (équivalent temps plein)

A measure of the extent to which an employee represents a full person‑year charge against a departmental budget. For a particular position, the full‑time equivalent figure is the ratio of number of hours the person actually works divided by the standard number of hours set out in the person’s collective agreement.

gender-based analysis plus (GBA Plus) (analyse comparative entre les sexes plus [ACS Plus])

An analytical process used to assess how diverse groups of women, men and gender-diverse people experience policies, programs and services based on multiple factors including race ethnicity, religion, age, and mental or physical disability.

government-wide priorities (priorités pangouvernementales)

For the purpose of the 2020–21 Departmental Results Report, those high-level themes outlining the government’s agenda in the 2019 Speech from the Throne, namely: Fighting climate change; Strengthening the Middle Class; Walking the road of reconciliation; Keeping Canadians safe and healthy; and Positioning Canada for success in an uncertain world.

horizontal initiative (initiative horizontale)

An initiative where two or more federal organizations are given funding to pursue a shared outcome, often linked to a government priority.

non‑budgetary expenditures (dépenses non budgétaires)

Net outlays and receipts related to loans, investments and advances, which change the composition of the financial assets of the Government of Canada.

performance (rendement)

What an organization did with its resources to achieve its results, how well those results compare to what the organization intended to achieve, and how well lessons learned have been identified.

performance indicator (indicateur de rendement)

A qualitative or quantitative means of measuring an output or outcome, with the intention of gauging the performance of an organization, program, policy or initiative respecting expected results.

performance reporting (production de rapports sur le rendement)

The process of communicating evidence‑based performance information. Performance reporting supports decision making, accountability and transparency.

plan (plan)

The articulation of strategic choices, which provides information on how an organization intends to achieve its priorities and associated results. Generally, a plan will explain the logic behind the strategies chosen and tend to focus on actions that lead to the expected result.

planned spending (dépenses prévues)

For Departmental Plans and Departmental Results Reports, planned spending refers to those amounts presented in Main Estimates.

A department is expected to be aware of the authorities that it has sought and received. The determination of planned spending is a departmental responsibility, and departments must be able to defend the expenditure and accrual numbers presented in their Departmental Plans and Departmental Results Reports.

program (programme)

Individual or groups of services, activities or combinations thereof that are managed together within the department and focus on a specific set of outputs, outcomes or service levels.

program inventory (répertoire des programmes)

Identifies all the department’s programs and describes how resources are organized to contribute to the department’s core responsibilities and results.

result (résultat)

A consequence attributed, in part, to an organization, policy, program or initiative. Results are not within the control of a single organization, policy, program or initiative; instead they are within the area of the organization’s influence.

statutory expenditures (dépenses législatives)

Expenditures that Parliament has approved through legislation other than appropriation acts. The legislation sets out the purpose of the expenditures and the terms and conditions under which they may be made.

target (cible)

A measurable performance or success level that an organization, program or initiative plans to achieve within a specified time period. Targets can be either quantitative or qualitative.

voted expenditures (dépenses votées)

Expenditures that Parliament approves annually through an appropriation act. The vote wording becomes the governing conditions under which these expenditures may be made.

Share this page
Date Modified: