An admission from Canada’s national police force that it routinely uses powerful spyware to surveil citizens has prompted concern from experts, who warn the country is “asleep at the wheel” when it comes to regulating and reining in use of the technology.
During a parliamentary session in late June, the Royal Canadian Mounted Police submitted a document outlining how a special investigative team covertly infiltrates the mobile devices of Canadians. The tools, which have been used on at least 10 investigations between 2018 and 2020, give the police access to text messages, email, photos, videos, audio files, calendar entries and financial records. The software can also remotely turn on the camera and microphone of a suspect’s phone or laptop.
The RCMP, which has long evaded questions over whether it uses spyware to track Canadians, provided the information about its “on-device investigative tools” in response to a question from a Conservative lawmaker about how the federal government collects data on its citizens.
Ron Deibert, a political-science professor at the University of Toronto and head of Citizen Lab, said the spyware, which gives police an “extraordinary window into every aspect of someone’s personal life” is akin to “nuclear-level technology” — but has little government oversight.
“There’s a culture of secrecy that pervades the intelligence and law enforcement community in this country,” he said
[ Pegasus misuse highlights the need for regulation of digital spying tools ]
Mr Deibert, one the world’s leading experts on the surveillance techniques used by authoritarian regimes, said he and others have long suspected police and government agencies in Canada were using the technology. But absent from the disclosure was any indication of who the government is purchasing the software from.
“That’s my biggest unanswered question,” he said. “Because we know there are some companies that are horrible when it comes to due diligence and routinely sell to governments that use it for grotesque human rights violations.”
Last year, a collaborative investigation between 17 media organisations, including the Washington Post, the Guardian, and Le Monde, called the Pegasus Project, revealed that spyware licensed by the Israeli firm NSO Group had been used to hack smartphones belonging to journalists, lawyers and human rights activists.
In 2021 the commerce department in the United States announced it had placed mercenary spyware companies like NSO on the country’s Entity List, in effect blacklisting them for their “malicious cyber activities” amid growing concern from US officials that the software posed a grave risk to national security.
[ Surveillance tools like Pegasus should not be for sale ]
In contrast, Canadian authorities have shown little appetite to take similar action, said Deibert, who has briefed senior Canadian officials within successive governments.
“Developing export controls and putting more transparency and accountability around procurement practice is a no-brainer,” he said.
The RCMP says it only uses the tools when less intrusive means have failed. In the document, the police force claims it needs to use spyware because new technologies, like end-to-end encryption, make it “exponentially more difficult for the RCMP to conduct court-authorised electronic surveillance”.
But privacy advocates disagree.
“The creation of the metaphor of ‘police investigations going dark’ because of advances in technology is the public relations coup of the 21st century,” said Brenda McPhail, director of the privacy technology and surveillance programme for the Canadian Civil Liberties Association. “The case has not been made to the public for the use of this powerful spyware, particularly given the profoundly dangerous uses of this technology around the world.”
Ms McPhail points to previous instances in which the RCMP has been evasive and misleading about the technology it uses for surveillance, including a recent controversy over mobile device identifiers, known as IMSI catchers or stingrays. In September 2017, Canada’s privacy commissioner found the police agency had broken the law six times when it used the technology.
“The policy has been, we’re going to do what we can and in secret. If it comes out, then we’ll see what we can do to mitigate the harm,” said Ms McPhail.
[ Karlin Lillington: Pegasus Project exposes menace of surveillance ]
In the parliamentary document, the RCMP says it didn’t consult the federal privacy commissioner before using the technology — but said it nonetheless needs the approval of a judge when monitoring Canadians.
The latest revelations about police surveillance power once again highlight the need for a debate over the “crisis of accountability” in law enforcement, said Ms McPhail.
“We need to be having a conversation about what kinds of surveillance technologies — invasive tools being used without any evidence of due process or due consideration of the rights and freedoms of people — are acceptable in a democracy and under what conditions. And we need to determine what sort of safeguards there need to be as well.”
Plans to modernise the Canadian Privacy Act in the coming months give lawmakers a window of opportunity to adopt the right legislative framework to ensure police have access to tools they need for investigative work, said Ms McPhail, and not broad powers “shrouded by secrecy” and without public accountability.
“The devices we hold in our hands are generally designed to extract as much personal information from us as they possibly can,” said Mr Deibert. But a documented history of police abusing surveillance tools in the country meant that the recent admissions of the use of mercenary spyware should be enough to trigger an investigation into whether there is proper oversight to prevent abuse, he said.
“Private companies and banks presumably know a lot about your preferences, but only the government can take away your freedom and put you in jail. Only the government can end your life in some jurisdictions,” he said. “That’s why there should be a higher threshold for public accountability and transparency when these tools are used by state agencies.” — Guardian