{"id":270113,"date":"2022-03-03T11:30:32","date_gmt":"2022-03-03T16:30:32","guid":{"rendered":"https:\/\/policyoptions.irpp.org\/issues\/cse-disrupting-international-cybercrime\/"},"modified":"2025-10-07T23:50:38","modified_gmt":"2025-10-08T03:50:38","slug":"cse-disrupting-international-cybercrime","status":"publish","type":"issues","link":"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/","title":{"rendered":"When and how is the CSE disrupting international cybercrime?"},"content":{"rendered":"<p>The federal government has unveiled a new \u201csword\u201d that may redefine how it combats cybercriminals. On Dec. 6, <a href=\"https:\/\/globalnews.ca\/news\/8429008\/canadian-spy-agency-targets-cybercrime\/\">Global News reported<\/a> that Canada&#8217;s secretive foreign signals intelligence agency, the <a href=\"https:\/\/www.cse-cst.gc.ca\/en\/mission\/foreign-intelligence\">Communications Security Establishment (CSE),<\/a> admitted using its cyber capabilities to &#8220;impose costs&#8221; on foreign cybercriminals.<\/p>\n<p>In doing so, the CSE has followed in the footsteps of its closest partners in <a href=\"https:\/\/www.canberratimes.com.au\/story\/7515911\/hunting-cyber-gangs-a-game-of-whack-a-mole-spy-boss-warns\/\">Australia<\/a>, the <a href=\"https:\/\/www.bbc.com\/news\/technology-59335332\">United Kingdom<\/a>, and the <a href=\"https:\/\/www.nytimes.com\/2021\/12\/05\/us\/politics\/us-military-ransomware-cyber-command.html\">United States<\/a>. Each has committed to deterring criminal behaviours and &#8220;imposing costs&#8221; as appropriate, including by disrupting the ability of criminals to communicate with one another, receive payments or launch malicious operations.<\/p>\n<p>However, it is not clear what processes the CSE uses when deciding to disrupt criminal activities, nor the extent to which Public Safety Canada is involved in these kinds of operations. This leaves it unclear when, and under what conditions, the CSE will assume a lead in disrupting international cybercrime. The effect is that Canadians lack appropriate degrees of transparency and accountability concerning the condition under which the federal government and the CSE plan to undertake extrajudicial crime-fighting activities.<\/p>\n<blockquote><p><a href=\"https:\/\/policyoptions.irpp.org\/fr\/magazines\/the-year-in-review-2\/a-cyber-foreign-policy-time-for-canada-to-get-one\/\">A cyber foreign policy: It\u2019s time for Canada to get one<\/a><\/p>\n<p><a href=\"https:\/\/policyoptions.irpp.org\/fr\/magazines\/the-year-in-review-2\/a-cyber-foreign-policy-time-for-canada-to-get-one\/\">Canadian businesses need better tools to combat cybercrime<\/a><\/p><\/blockquote>\n<p>The CSE has historically been tasked to collect foreign signals intelligence, cybersecurity and to assist other federal government agencies. It was empowered to conduct <a href=\"https:\/\/www.justsecurity.org\/70519\/a-deep-dive-into-canadas-overhaul-of-its-foreign-intelligence-and-cybersecurity-laws\/\">offensive and defensive cyber operations<\/a> following the passage of <a href=\"https:\/\/laws-lois.justice.gc.ca\/PDF\/2019_13.pdf\">Bill C-59<\/a>, <em>An Act Respecting National Security Matters, <\/em>in June 2019.<\/p>\n<p>Conducting active operations requires authorization from the minister of national defence and approval from the minister of foreign affairs (<a href=\"https:\/\/laws-lois.justice.gc.ca\/eng\/acts\/C-35.3\/page-1.html\"><em>Communications Security Establishment Act<\/em><\/a>, 30(2)). Defensive operations, which may be significantly similar in capability if not motivation, require authorization from the minister of national defence and consultation with the minister of foreign affairs (<em>CSE Act<\/em>, 29(2)).<\/p>\n<p>It&#8217;s helpful to remember that neither of these ministers is responsible for federal policing in Canada, nor do they oversee the <a href=\"https:\/\/www.canada.ca\/en\/security-intelligence-service.html\">Canadian Security Intelligence Service (CSIS),<\/a> which is responsible for investigating and reporting on activities that pose a threat to Canada. Put another way: the minister of public safety, whom most Canadians would presume is responsible for dealing with serious crime, isn\u2019t in the formal loop when it comes to turning the CSE\u2019s cyberpowers on criminals around the world.<\/p>\n<p>This has the result of muddying the waters of when, and on what grounds, the federal government decides that the CSE is responsible for dealing with criminal behaviours, and the extent to which the CSE has any actual (if not legally required) obligations to work with either the RCMP or CSIS in crafting its offensive or defensive cyber operations.<\/p>\n<p>So what can we make of the CSE\u2019s working to \u201cimpose costs\u201d on cybercriminals?<\/p>\n<p>First, the CSE\u2019s imposition of costs on cybercriminals is extra-judicial in nature. These powers are not necessarily used following a formal investigation by the RCMP and conviction of an offender in a court of law. Instead, the CSE\u2019s crime-fighting activities can occur after being condoned by at least a pair of ministers and their staff, and on the basis that they do not believe that the reduction in criminal behaviours could be reasonably achieved by other means (<em>CSE Act<\/em>, 34(3)). Neither the courts nor Public Safety Canada are necessarily involved in the decision.<\/p>\n<p>Second, even in the debates surrounding the new powers that the CSE is now using, there was little time spent on how the CSE would target criminal infrastructure. Members of Parliament and the public were not involved in a meaningful discussion about when the CSE would become a de facto cybersheriff, let alone the CSE taking it upon itself to punish criminals abroad. That\u2019s not good because it means that MPs cannot really see themselves as having created or passed a law that has led to the CSE&#8217;s recent crime-fighting activities, with the broader effect of calling into question the legitimacy (if not the lawfulness) of the CSE\u2019s activities.<\/p>\n<p>Third, the opacity surrounding the CSE&#8217;s activities leaves it unclear whether the federal government will be deploying its new \u201csword\u201d with any frequency, or if a set of triggers must be met before unsheathing it. Will the CSE choose to step in when it thinks that criminals are endangering the public, or when the RCMP passes on a particular case or investigation, or under some other set of conditions entirely? What is the actual role, if any, of the minister of public safety in these international activities? While there may be formal and top-secret protocols that dictate these interactions, Canadians deserve to understand how their government is operating.<\/p>\n<p><a href=\"https:\/\/cyber.gc.ca\/en\/guidance\/cyber-threat-bulletin-ransomware-threat-2021\">Ransomware<\/a> and <a href=\"https:\/\/www150.statcan.gc.ca\/t1\/tbl1\/en\/tv.action?pid=3510000101\">other cybercrimes<\/a> are serious and pressing issues that threaten residents of Canada on a daily basis. But Canadians deserve a government that is committed to addressing crimes through a transparent and legitimate process, and which includes the formalized involvement of the minister of public safety.<\/p>\n<p>Government can&#8217;t just ignore due process when it\u2019s inconvenient. As a democracy that prides itself on a high rule of law, Canada cannot slip toward a world where expediency wins over the correct process. Instead, the government must work toward strengthening transparency and accountability associated with government processes. Doing anything less will risk legitimizing the worst extra-judicial actions of authoritarian countries while simultaneously impeding Canada\u2019s own ability to advocate for core democratic norms and principles domestically and abroad.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The federal government has unveiled a new \u201csword\u201d that may redefine how it combats cybercriminals. On Dec. 6, Global News reported that Canada&#8217;s secretive foreign signals intelligence agency, the Communications Security Establishment (CSE), admitted using its cyber capabilities to &#8220;impose costs&#8221; on foreign cybercriminals. In doing so, the CSE has followed in the footsteps of [&hellip;]<\/p>\n","protected":false},"featured_media":280356,"template":"","meta":{"_acf_changed":false,"content-type":"","ep_exclude_from_search":false,"apple_news_api_created_at":"2025-10-08T03:50:41Z","apple_news_api_id":"85a0dfd7-7fc0-40a1-b91f-9536193b99b4","apple_news_api_modified_at":"2025-10-08T03:50:41Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/AhaDf13_AQKG5H5U2GTuZtA","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false},"categories":[9399,9372,9403],"tags":[],"article-status":[],"irpp-category":[4250,4385],"section":[],"irpp-tag":[],"class_list":["post-270113","issues","type-issues","status-publish","has-post-thumbnail","hentry","category-democratie","category-recent-stories-fr","category-securite-nationale","irpp-category-democratie","irpp-category-securite-nationale"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>When and how is the CSE disrupting international cybercrime?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When and how is the CSE disrupting international cybercrime?\" \/>\n<meta property=\"og:description\" content=\"The federal government has unveiled a new \u201csword\u201d that may redefine how it combats cybercriminals. On Dec. 6, Global News reported that Canada&#8217;s secretive foreign signals intelligence agency, the Communications Security Establishment (CSE), admitted using its cyber capabilities to &#8220;impose costs&#8221; on foreign cybercriminals. In doing so, the CSE has followed in the footsteps of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"Policy Options\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/IRPP.org\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-08T03:50:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-When-and-how-is-the-CSE-disrupting-international-cybercrime.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@irpp\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/\",\"url\":\"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/\",\"name\":\"When and how is the CSE disrupting international cybercrime?\",\"isPartOf\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-When-and-how-is-the-CSE-disrupting-international-cybercrime.jpg\",\"datePublished\":\"2022-03-03T16:30:32+00:00\",\"dateModified\":\"2025-10-08T03:50:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/#primaryimage\",\"url\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-When-and-how-is-the-CSE-disrupting-international-cybercrime.jpg\",\"contentUrl\":\"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-When-and-how-is-the-CSE-disrupting-international-cybercrime.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Illustration of a man in silhouette looking at depictions of digital networks.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/policyoptions.irpp.org\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When and how is the CSE disrupting international cybercrime?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/policyoptions.irpp.org\/fr\/#website\",\"url\":\"https:\/\/policyoptions.irpp.org\/fr\/\",\"name\":\"Policy Options\",\"description\":\"Institute for Research on Public Policy\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/policyoptions.irpp.org\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When and how is the CSE disrupting international cybercrime?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/","og_locale":"fr_FR","og_type":"article","og_title":"When and how is the CSE disrupting international cybercrime?","og_description":"The federal government has unveiled a new \u201csword\u201d that may redefine how it combats cybercriminals. On Dec. 6, Global News reported that Canada&#8217;s secretive foreign signals intelligence agency, the Communications Security Establishment (CSE), admitted using its cyber capabilities to &#8220;impose costs&#8221; on foreign cybercriminals. In doing so, the CSE has followed in the footsteps of [&hellip;]","og_url":"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/","og_site_name":"Policy Options","article_publisher":"https:\/\/www.facebook.com\/IRPP.org","article_modified_time":"2025-10-08T03:50:38+00:00","og_image":[{"url":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-When-and-how-is-the-CSE-disrupting-international-cybercrime.jpg","width":800,"height":450,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@irpp","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/","url":"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/","name":"When and how is the CSE disrupting international cybercrime?","isPartOf":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-When-and-how-is-the-CSE-disrupting-international-cybercrime.jpg","datePublished":"2022-03-03T16:30:32+00:00","dateModified":"2025-10-08T03:50:38+00:00","breadcrumb":{"@id":"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/#primaryimage","url":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-When-and-how-is-the-CSE-disrupting-international-cybercrime.jpg","contentUrl":"https:\/\/policyoptions.irpp.org\/wp-content\/uploads\/2025\/08\/Wordpress-When-and-how-is-the-CSE-disrupting-international-cybercrime.jpg","width":1920,"height":1080,"caption":"Illustration of a man in silhouette looking at depictions of digital networks."},{"@type":"BreadcrumbList","@id":"https:\/\/policyoptions.irpp.org\/fr\/2022\/03\/cse-disrupting-international-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/policyoptions.irpp.org\/fr\/"},{"@type":"ListItem","position":2,"name":"When and how is the CSE disrupting international cybercrime?"}]},{"@type":"WebSite","@id":"https:\/\/policyoptions.irpp.org\/fr\/#website","url":"https:\/\/policyoptions.irpp.org\/fr\/","name":"Policy Options","description":"Institute for Research on Public Policy","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/policyoptions.irpp.org\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/issues\/270113","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/issues"}],"about":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/types\/issues"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/media\/280356"}],"wp:attachment":[{"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/media?parent=270113"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/categories?post=270113"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/tags?post=270113"},{"taxonomy":"article-status","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/article-status?post=270113"},{"taxonomy":"irpp-category","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/irpp-category?post=270113"},{"taxonomy":"section","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/section?post=270113"},{"taxonomy":"irpp-tag","embeddable":true,"href":"https:\/\/policyoptions.irpp.org\/fr\/wp-json\/wp\/v2\/irpp-tag?post=270113"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}