Professional Documents
Culture Documents
Introduction
CSIS does not have law enforcement powers, therefore, all law enforcement functions
are the responsibility of police authorities. The splitting of functions, combined with
comprehensive legislated review mechanisms, ensures that CSIS remains under the
close control of the federal government. In its early years, much of the Service’s
energy and resources were devoted to countering the spying activities of foreign
governments. Time has passed however, and as the world has changed, so has CSIS.
In response to the rise of terrorism worldwide and with the demise of the Cold War,
CSIS has made public safety its first priority. This is reflected in the high proportion
of resources devoted to counter-terrorism. CSIS has also assigned more of its counter-
intelligence resources to investigate the activities of foreign governments that decide
to conduct economic espionage in Canada so as to gain an economic advantage or try
to acquire technology in Canada that could be used for developing weapons of mass
destruction. Along with these operational changes, CSIS has matured into an
organization with a flexible, dynamic structure and, most importantly, an ingrained
understanding of its responsibilities and obligations to Canadians. The Service’s main
purpose is to investigate and report on threats to the security of Canada. This occurs
within a framework of accountability to government, as well as respect for the law
and the protection of human rights. Nowadays, it also means being more open and
transparent to the people it serves. There are some limits on what the Service can
discuss; that is the nature of its work, but CSIS is anything but a secret organization.
2
3
The main objective of this study is to examine about Canadian Secret Intelligence
Service.
Among the activities included in the CSIS mandate are the investigation of:
Threat or acts of serious violence may constitute attempts at compelling the Canadian
government to respond in a certain way. Acts of serious violence cause grave bodily
harm or death to persons, or serious damage to or the destruction of public or private
property, and are contrary to Canadian law or would be if committed in Canada.
Hostage-taking, bomb threats and assassination attempts are examples of acts of
serious violence that endanger the lives of Canadians. Such actions have been used in
an attempt to force particular political responses and change in this country.
Exponents and supporters of political, religious or ideological violence may try to use
Canada as a haven or a base from which to plan or facilitate violence in other
countries. Such actions compromise the safety of people living in Canada and the
capacity of the Canadian government to conduct its domestic and external affairs
[ CITATION CSI19 \l 1033 ].
These include activities that are detrimental to Canadian national interests and that are
directed, controlled or financed by a foreign state or its agents, such as interference
with ethnic communities in Canada. CSIS is also responsible for conducting security
4
assessments for all federal government departments and agencies (upon request), with
the exception of the Royal Canadian Mounted Police, as well as for immigration,
citizenship and refugee applicants upon referral from Citizenship and Immigration
Canada. CSIS can assist in the collection of foreign intelligence within Canada at the
request of the Minister of Foreign Affairs or the Minister of National Defence.
3.4 Subversion
4. Intelligence Cycle
The CSIS Act gives CSIS the mandate to investigate activities suspected of
constituting threats to the security of Canada, including espionage, terrorism, violent
extremism, foreign influenced activities and subversion of government through
violence. Through this mandate, CSIS receives direction from the Government of
Canada on the intelligence requirements:
4.2 Planning
The Government and Ministerial Direction on Intelligence Priorities, the CSIS Act
and the needs of domestic partners are all taken into consideration when developing
the annual collection strategy. Responding to this direction, CSIS establishes internal
direction and annual collection plans to meet the intelligence needs of Canadian
government departments and agencies.
5
6
4.3 Collection
CSIS uses a variety of methods to collect information on threat actors whose activities
are suspected of constituting a threat to national security. This information is collected
from various sources, including:
Any intrusive measure, or those affecting the privacy of Canadians, requires obtaining
a warrant authorised by the Federal Court.
4.4 Analysis
CSIS analysts use their knowledge of regional, national and global trends to assess the
quality of all types of information collected. The information is analysed in order to
produce useful intelligence for clients and consumers. CSIS analysts examine the
information provided by other Canadian government departments and agencies,
foreign intelligence agencies, intelligence collected through investigations, as well as
open sources. The analysis process results in intelligence reports and threat
assessments.
routinely gathers requirements from the Government of Canada to help shape and
drive collection and production efforts.
CSIS is mandated to investigate these threats and in certain cases, take measures to
reduce them. In doing so, CSIS is charged with providing advice to the Government
of Canada regarding the threat landscape, identifying Canadian connections to
international groups and identifying potentially violent religiously, politically or
ideologically motivated individuals or cells.
5.1.1 Global
Both Daesh and al-Qaida affiliate Jamaat Nusrat al-Islam Wal Muslimin (JNIM) have
conducted frequent and complex attacks in Mali, Niger and Burkina Faso and
8
5.1.2 Domestic
Recent acts of serious violence in the West have been typically characterized by low-
resource, high-impact events. While previously seen as the hallmark of religiously
motivated violent extremist groups such as al-Qaida or Daesh, these strategies are
being employed across the violent extremist spectrum. Examples include repeated use
of firearms, vehicles and knives in attacks throughout Europe and North America.
Despite the decrease in sophistication, the impact and lethality of attacks remain high,
as perpetrators often strike soft targets.
“right-wing” and “left-wing” is not only subjective, but inaccurate in describing the
complexity of motivations of IMVE attacks in Canada and abroad.
On January 13, 2020, an individual pleaded guilty to two counts of attempted murder
and one count of breach of probation. The individual stabbed a woman multiple times
and injured her baby on June 3, 2019. He self-identified as an Incel (involuntarily
celibate) and took some inspiration from the 2018 Toronto van attack in which 10
people were killed and 16 wounded.
Anti-authority violence is defined as the opposition to, or rejection of, the authority of
the State which leads to anti-Government and violence against law enforcement. The
2014 Moncton shooting is an example of antiauthority violence.
As a core part of its mandate, CSIS investigates and advises the Government of
Canada on threats posed by espionage and foreign-influenced activities. These
activities are almost always conducted to further the interests of a foreign state, using
both state and non-state entities. Espionage and foreign-influenced activities are
directed at Canadian entities both inside and outside of Canada, and directly threaten
Canada’s national security and strategic interests. These threats continue to persist
and, in some areas, are increasing. Canada’s advanced and competitive economy, as
well as its close economic and strategic partnership with the United States, makes it
an ongoing target of hostile foreign state activities. Canada’s status as a founding
member of the North Atlantic Treaty Organization (NATO) and its participation in a
number of multilateral and bilateral defence and trade agreements has made it an
attractive target for espionage and foreign interference. Canadian interests can be
damaged by espionage activities through the loss of sensitive and or proprietary
information or leading-edge technologies, and through the unauthorized disclosure of
classified and sensitive government information. A number of foreign states continue
their attempts to covertly gather political, economic and military information in
Canada. Multiple foreign states also target non-government organizations in Canada
including academic institutions, other levels of government, the private sector and
civil society to achieve these goals.
Foreign governments also continue to use their state resources and their relationships
with private entities to attempt foreign interference activities in Canada. These
activities are carried out in a clandestine or deceptive manner and can target
communities or democratic processes across multiple levels throughout the country.
Foreign powers have attempted to covertly monitor and intimidate Canadian
communities in order to fulfil their own strategic and economic objectives. In many
cases, clandestine influence operations are meant to support foreign political agendas
a cause linked to a conflict abroad or to deceptively influence Government of Canada
policies, officials or democratic processes.
Cyber threat actors conduct malicious activities in order to advance their geopolitical
and ideological interests. They seek to compromise both government and private
sector computer systems by using new technologies such as Artificial Intelligence and
Cloud technologies or by exploiting security vulnerabilities or users of computer
systems. Such activities are collectively referred to as “Computer Network
Operations”, or CNOs. State-sponsored entities and terrorists alike are using CNOs
directed against Canadians and Canadian interests, both domestically and abroad.
Canada remains both a target for malicious cyber activities, and a platform from
which hostile actors conduct CNOs against entities in other countries.
State-sponsored cyber threat-actors use CNOs for a wide variety of purposes. These
include theft of intellectual property or trade secrets, disruption of critical
infrastructure and vital services, interference with elections, or conducting
disinformation campaigns. In addition, non-state actors such as terrorist groups also
conduct CNOs in order to further their ideological objectives such as recruitment and
distribution of propaganda.
6. Accountability
CSIS is one of the most open and accountable security organizations in the world.
This is achieved through a system of control and review mechanisms and processes,
prescribed by the CSIS Act, that include the following:
The Minister is responsible to Parliament for CSIS as a whole and for its general
direction. The Minister issues policy guidelines concerning operational procedures, is
informed of security operations and problems and approves cooperative agreements
and relationships with foreign agencies.
The Deputy Minister provides advice to the Minister on general direction to CSIS,
and monitors how CSIS implements this direction.
The Director of CSIS is accountable to the Minister for the management and control
of CSIS. The Director submits periodic reports on CSIS activities to the Minister, and
chairs internal committees that are aimed at enhancing the organization's management
13
and accountability. Two of these committees are directly responsible for, and have
authority over, CSIS' use of investigative techniques.
The power to authorize intrusive investigation techniques rests solely with the Federal
Court of Canada. Before such an authorization can be made, CSIS must provide solid
justification for the proposed use of these techniques in an affidavit, which is
reviewed by a senior CSIS committee chaired by the Director and comprised of
representatives from the Department of Justice, and Public Safety Canada. If the
committee endorses the intrusive technique, the affidavit is submitted to the Minister
of Public Safety Canada for approval. If the Minister gives approval, the affidavit is
then submitted to the Federal Court, which must issue a warrant before CSIS can
proceed with the intrusive investigative technique [ CITATION Col13 \l 1033 ].
CSIS provides information to Parliament and the public through the Minister's Annual
Statement on National Security and the CSIS Public Report. These documents provide
Canadians with an assessment of the current security intelligence environment and
detail the government's efforts to ensure national security. More specifically, the CSIS
Public Report is aimed at increasing awareness of CSIS' functions and the processes it
employs, and dispelling some of the myths surrounding security intelligence work.
CSIS had been limited to domestic operation, however it has co-operated with various
nation's secret service for the analysis of data. For the foreign operation Canada has
dedicated Foreign Intelligence Service known as Canadian Foreign Intelligence
Agency is established.
CSIS are held accountable by SIRC as per the CSIS act. It has created an environment
where report against the CSIS could be investigated by the SIRC and the investigation
report prepared by CSIS are accessible to SIRC.
CSIS screens number of migrants in the Canada and their activities. It has helped to
analyze their activities to ensure that they are not threat to the society.
CSIS also uses the technology with the co-operation of other security forces to
analyze the threat.
8. Conclusion
CSIS is a domestic intelligence agency of the Canada, which has been operating to
protect the country from various internal threat. It has identified terrorism as a major
threat to peace in the country. Further it has worked to analyze the activities of
various immigrant that enter the country through screening. CSIS influence in the
cyber intelligence has a huge impact on the modern-day security.
9. Recommendation
9.1 CSIS looks over the domestic intelligence, while CFIA works in the foreign
country. Such division of work and arena has ensure that there is no duplication of the
responsibilities. Nepal should also expand its intelligence in a similar manner.
Development of NID for domestic affairs and another intelligence for the
International affairs.
15
9.2 As, the use of cyber and internet has been huge in the present day, the
government should also empower the intelligence service in the cyber security as
well.
9.3 There is a well co-ordination between the various intelligence of the country
and outside country with CSIS. Such relation helps in retrieving the valuable
information. Hence, intelligence service of Nepal also develop a similar relationship
with various intelligence of the various country.
16
REFERENCES
Colin, F. (2013, November 25). CSIS not being forthcoming with court, federal judge
says. Retrieved from The Globe and Mail:
https://www.theglobeandmail.com/news/national/csis-not-being-forthcoming-
with-court-federal-judge-says/article15599674/
Hippner, C. (2009). A Study into the size of the world's intelligence industry.
Pennsylvania: Mercyhurst College.