1
10
2
-
https://d1y502jg6fpugt.cloudfront.net/28811/archive/files/86ea674706dd3dacfcdfea4b0ae42e2b.pdf?Expires=1712793600&Signature=sYSnIXWePT7cx2kymQBeRe6okdep87OOTe2fcuSBGv3846TM6OIPRu8OOETGNTwQ3Ag0hu9Htz0Wpi6zmlbTFooZ28jYzpS-FJW-9qoN-dKwQXSygBqzozvgrorGzgmKjkhvurduzZlGw9KR1FoaoDZ%7ErKexWlAflE%7EF9z3eUmGpZlFPfzVzxI9xpfxX1QGNMmq9y7LIc74009a7SO5tKmLt-Tr%7EeQM0NjgXmTuh%7ElMwM8Mc7%7EutsJHm8J-DBFcm72smS7W5Nfp2ffSXSad-Ppmcphbx48KCEIH%7E0HspQbGTgP3nIUH1ZpTXqkPCTaOZEPSH9Bk4AFFZiOT-s19xCg__&Key-Pair-Id=K6UGZS9ZTDSZM
45f74eeb6b195186d8aca0a87238b93e
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Security Intelligence Review Committee Reports
Subject
The topic of the resource
SIRC
Description
An account of the resource
Reports issued by the Security Intelligence Review Committee (SIRC), CSIS's review body
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
CSIS Use of Disruption to Counter National Security Threats (SIRC Study 2009-05)
Subject
The topic of the resource
SIRC study
Description
An account of the resource
A SIRC assessment of the scope CSIS's powers to disrupt under its s.12 security intelligence mandate. This study predates the inclusion of an express CSIS threat reduction power through bill C-51 (2015).
Source
A related resource from which the described resource is derived
ATIP
Date
A point or period of time associated with an event in the lifecycle of the resource
2010
CSIS
Disruption
Operations
SIRC
Threat reduction
-
https://d1y502jg6fpugt.cloudfront.net/28811/archive/files/e6670dc252a4907cdc670dc7b19a34d4.pdf?Expires=1712793600&Signature=d2xYG2DN5jHUuNK%7ECwHEGqBIJpJIv6vBpOCx8r02uHoHC5VTgqKqD83wm1A2T3A7gvLJaQyk9CdNiN%7EnDIvEQBtnCZI7AqmGF5ob01FLEClkoCvXH8Q29cG7PN9EKssdWTwCjm5fdCEx8yLASY-CvJKCmV32D2UMg2xgnJxOs60TvXsfOGnToMnoTHsYhaMcT1MzioB33geD06QwwFft7t0j%7Eqddho5bSj7VLnc8T%7EeNWTSrpIML9gqnYrAeYjp4lqx287vr85dsbWaRKQK6PHPcZeaQGlsLR9xj-awXyomKegig0Q%7EDxbn5NGLJE00CiboWmwZcQPMsg4QDMjXTHQ__&Key-Pair-Id=K6UGZS9ZTDSZM
d99557d3d72bdccb080529db08ad2918
PDF Text
Text
TS.
Annex 2
THE CANADIAN SECURITY INTELLIGENCE SERVICE
(herein referred to as CSIS)
2.1. 1be purpose of this agreement is to establish the circumstances and the process by which
eSIS will:
Page I of8
�TS/,
2.2. While the agreement serves to ensure a common undmtanding by both CSIS and CSE
on the process for conswtation and for requesting and executing assistance, additional
requirements or caveats may be included in I:tlC; fofiwtJ request submitted.
' 0 1/
VC
ISIO "'88",
~cc >'vS 0", 0
S(}"'VI80
"'Ss ro rlyo ",~SIS IJ""
",,,,, ,I (~"':~'I (
'
ItvI:O'l:"-'lc;- 0",'1 rN
e,
3. DEFINITIONS
3.1. In this MOU, the terms listed below, in
are defined as follows:
siil~~t
't1!~8Ja:~ accoidin-£v'fu)h,f cOntext,
'
(S "'r,'O"" 0
"'"" Vo
-'lCr tvo
-'I ('A OIJ o/S 'II{. ,?"IJ",
0'1
CSIS Threat Reduction Activity (fRA), also rererr.;;J'iiI"'!i,i.I~~~~~ction
measures, refers to an operational measure undertaken by cSi§lr..w by:<qSt:~t)~~1
pursuant to its assistance mandate, where the principal purpose is to reduc'e~~at to the
~S
security of Canada, as defined in s.2 of the CSIS Act.
Gil has the same meaning as defined in the NDA and includes electromagnetic
emissions, communications systems, information technology systems and networks, and
any data or technical information carried on, contained in or relating to those emissions,
systems, or networks. Exam"'p'les include, but are not limited to, the Internet,
"'10 'Ioc
vISI0 •.oS8~
f/
SIJ "'VISo
"''''~
~c
'VS
~Oe
c~ Ol:~ YC
Ss ro Iy", '" SiS IJ
"':;;'1 (",
ItvI'"O~;-'lC~~O'l
(-'I
rly
Notification rerers to'iiY",pd&s~$i~ch CSI~<ib;lfjd>~. CSE or its intended use of
s.12.1 threat reduction me~~s:&trf~at,.t~1~nse frOm CSE is required.
(,,,,,,, 0",
'I",,,,,' IJ", 0
CODsuItatioD refe~ to the pro~scgyt~~6n~~~;..y~~t~5r w!th CSE on its use of
s.12.1 threat reduction measures In the GWfo mlnlIP~yerse Impacts on CSE
. A formal response from CSE is require'd9t:'s~
Cyber Security InvestigatioDs refers to the investigations conducted by the CSIS
into the threats, motives and identity of foreign state actors which pose a threat to
the security of Canada through the GIl.
Page 2 of8
�TSIJ
12.1 (1) If there are reasonable grounds to believe that a particular
activity constitutes a threat to the security of Canada, the Service may
take measures, within or outside C.m~O rc<iuce the threat;
ISIOIy ~SSf!
(2) The measures sball be reaso,'1able arid pro~rtioi..¥i't the
circumstances, having regard ~~~ ofdie ~t'<I\lC'~\l!1'. of
the measures and the reason.1\I.. ~Vail.hdity of othei"~ iQ fi:'lroceh .
~o Y
o,,'" S
'>',.q, -4c rt£
the threat; and,
"'lyf! IOC~ el'ls
'Oly r ~Iv
IS f!r 101y 0 IOIy Lt
~C'r 0 0 1'1
(3) The Service sban not take measures tO~~ce·'!. ~]'br~ 0
security of Canada if those measures will conWv.~~ a rij/i!~~1V, e (-'II
4/
freedom guaranteed by the Canadian CharIer of RigfiISl.qnfiu" I < 1O,v?1
Freedoms or will be contrary to other Canadian law, unless the -<lCessS
Service is authorized to take them by a warrant issued under section
21.1.
(4) For greater certainty, nothing in subsection (I) confers on the
Service any law enforcement power.
Pursuant to s.21.1 Of ~tycW'f~c.l; II!< Director ofCSIS or a designated employee may,
with the approval of the M~81 ~!>IJf Safety and Emergency Preparedness, apply .
for and obtain wlll'iiop~ to ena\)I<;~IS>!9~ a threat to the security of Canada.
;UI'II
Sf!.o~
°11y" .o"/k UIyOf!
Pursuant to subscf6~J '1~'l,flhsgJS j'ap~s ~ l '\ith the approval of the
Minister of Public Safel'9'a;;[Iflm"9,!~Iy~IIc;flS,~ into an arrangement or
otherwise cooperate with
a.~~of4¥/~ovemment Canada.
';'y
.
'111y"O:;f! lfl "f!lys",~ Of! I
Iif
.
.
.
..
Pursuant to subsectIOn 19(2) of the t'SJ~Xc~l~td.~lose Informat.on obtained In
the performance of its duties for the purpO of ~rfOifu!bg
~'
the Act, including advising the Government ofCanad8~~s
its duties and functions under
4.2. CSE
Page 3 of8
�TSIISIIICEO
•
provide intelligence through its signals intelligence program, in response to
broad Government of Canada and agency-specific intelligence priorities.
Under Ministerial direction. CSE is required to protect signals intelligence
(SIGINT) capabilities ~ t\ll; interests of Canada's cryptologic allies.
'?ov, 'Y0 c£o •
S'Oll, .s')t:.
"lC "So 08
5. ENGAGEMENT WIT,fI CSE C£oss:' r,.,; CSIS
/
S"u" 'S€ '"
u",
"£0. l"l"
IV"lC O£o"
5.1. Not!f"lClJIio"
"so", '?or. 1£0 I1c
"4-f.qr, Y"lCr r,.,£o
"'lOiS £oCho "11 €",
'0","l(' "l"'0
a) CSIS will notify CSE of its" . t2~b~~"",ion meas=s 'tilidertaken within Canada
which have the potential to di~tl~~~~~!'y~ CSE's mandated activities
itt"'lrl {O, S :CIvt:A (~(.Ol
Such notification
will occur via CSIS Headquarters to CSEq ''!HGINT.f liCYand Review (SPR) group and
f
both parties agree to document such discussions to respective files.
"1"
°,"'''0""
b) Where such notification is provided, eSIS will also advise CSE on circumstances when
infonnation relating to the 5.12.1 threat reduction measure may be disclosed and/or
should be disclosed by CSE
along with any related caveats or
handlinJ, instructions.
""ov "OC€
Co".~ss€O
"£0
CC€,s 0" r 8 y Cs
5.2.
.'):;~SfS·~ll co& liJt 'l" ifft. ""d. 12.1 threat reduction measures when any of the trigger.;
~
"€,,~ ~.fjll@io.n are ii\eI>~~AP' .!i\d%I ).
i
u"''''€ r€C/c"S
r,O", r"l",
b) As pari. Fe~\l;/Q!l~imi!)gA'roc~,C~IS"'hall, where possible, engage with relevant
counte~~CSIf\8di#.~ 1!!~ nature of the threat·related activity and proposed
s. J2.1 threat rea'
Uc;¥6\{D\~Ufe~lwelbas the intended goal. Where both CSIS and CSE
have strategic interci'theli'tJng fotifi~naturc of the threat·rc]ated activity (c.g. cyber
-.<.jC I,)
C€S
Page 4 of8
�TS/I
security investigations), these discussions may also consider the strategic value of the
proposed measure and whether alternatives may be more suitable. These discussions also
provide an opportunity for CSE to provide a ~8~i~ assessment on any foreseeable
adverse impacts to CSE
l "/SIO::l:SS~
~C "S
De
IY
c~ O" r Yc
c) Further to these discussions and in adv~btj;;SIS see'lsnl!Ji(e~~val on the
proposed measure, the
. I>~,,}~ ~~IY (€' .
"-'''O'l;I''1C y~:IY r will
send a formal request for consultatIon to eS~JiPRl'~p,l~t'll a1S\VoolJ~n>an (
infonnation sharing restrictions relevant to CSE " ~~ifa\ial8g~ent or-4c;1 'D 0./Y
As eSE acts as the representative, in e~Sf.l D/S 1Y;lYrl.t~
"0">t./~r (OIS,ICtv€, (~(O
(.<1 tvs" Do
lotv I.tIY ~I~", I
d) Where CSE identifies significant concerns related to a consultation trigge1-1isted1n
Appendix I, all relevant eSIS and eSE stakeholders, including eSIS
"s
and CSE SPR. will be engaged to discuss the concerns and to accommodate the issues if
possible. Where there is disagreement that remains unresolved, the matter will be
referred for a mOTe senior level discussion.
e) In a timely manner, SPR will either advise eSIS of any issues that could compromise
eqtfi'6'c.~~'movide suggestions for alternative ways forward (as
applicable) or indicate that..th~~ ..PBjections associated with the proposed measure;
nO
"
cc~ O~~ Yc
Su ~v'Ss
Ss ro Iy~ I> SiS 1.1
I> IY ( ,,;:" *'
"
ltv" IYlv~ tvD~
5.3. R.q_l$for ASrtitgll ~~~'!f'jl.d TR.(,~ C}'''lcIT rly~
"-'tv€, r~C~ CIYS
r,0tv r ~""
( 8 ~ 10"'_~1! '
~('> D"
a) eSI~ may reque~ eSE's asJn~ t~~-t~tlo the ~urity.ofe~da. Where
poSSIble, eSls WIll engage CSB'P£lor4~~~lffijig,!lrequest for assIStance ID order to
facIlitate the development of the reqrr"",,-;:,(A"IaIE4~~UonaJ plannlDg,
'l7Q:: ~ "Su~ e'-..Ir V!
.,
., (
~tvr
b) Specifically, both eSIS and eSE will engage in disci.l' iOJ, either secretarially or in
person, to identify possible measure(s) for use against particular threat activities and to
discuss related technica1 capabilities, requirements and any other relevant considerations.
c) If eSIS anticipates that the execution of the measure will require a warrant, these
discussions will also serve as an opportunity to identify what authorities may be required.
T6'51!P~!!le preparation ofeSIS's affidavit, eSE must also provide eSIS with relevant
technisrX~fS)~ting to how the measure will be executed and whether the
IYS
CC~s 0" rIy8.t,,:~ticipated,
SI.t VISS
S rO " I>R IS u
I(j)IT %e;Jf~~tion&c4iffla"L~<I!t!I~serve to inform the development of. request for
'
'~~~0)'.liic.llp'e
iI1~rlO ~ CrA IyI.WiIl forward to eSE in accordance with the
p~~~~~bliS\l~ /iSIS ~~l¥.o'OIY
~ (/01.1 D ~S IY IYru
e) In order to W~ Pt~din~cGs~ce to eSIS, CSE is required to meet its obligations
as outlined in Minf~ ai~1i~~or CSE policy, including that eSE:
(~CC~;S
Page 5 or8
�TSI/:
• receive a request in writing;
•
•
be satisfied that eSIS has the lawful authority to conduct the activity requested;
and,
P'?o\:s
'?Oc
be assured that any infonnation provided i"~?~e of said assistance has
been lawfully obtained by eSls. '?oCC(S 0/0, 8 y Cs
Su VIS(
S rO /-fo- 10 IS U
'
.
I",,,, .!lJrA . 'liD"
1) Where es IS reqUIres eSE' s asSIstanceA,;''!.l A 10"..(If.! thrciir"ill~Qn !!"e~, eSls
"'i'$""1IJ!; "
will submit a fonnal request for assistance 'h''I¥r.!tjll'If1.<7~1\s ~ n:q
~o"~tance
will provide sufficient infonn8tion to enable CSE tb&:ee v~t~thct1awful ~tho'fiiiyJexists
(including the warrant if applicable), and will a1soAnO~ 'y~&tqj~that eSE must
confonn to in providing the operational or technical 8SSi~c",y ~nt'bcl..~€" -4
rIO;~' 'U" (~I" 01
.,
., (
''''r
81 While respecting the obligations of eSE's Ministerial direction that cryptofogie.s:S
capabilities and the interests of Canada's cryptoiogic allies are protected, CSE will
provide the Service as much infonnation as possible regarding the means by which CSE
will undertake the technical or operational assistance to enable eSIS to verify that CSE
activities conronn to its legal and administrative requirements.
b) As part of the request .!9,r ~tance, eSls will include:
'?OVIS OC(S '
•
•
•
•
•
a statement of the appli~rClI(:~}'iIit!¥e authority, including relevant information
from a w~t'bb~ned p~t to~2 r.'\/of the CSIS Act;
any caveats Pf~~,j~cti(j'~~~S'%execution of the s.12.1 threat
n:ductionmeas
~ '?O~ ( SCII
~f.4rl Y"1cr r/-f(
the period of time in'Whi!:$ttIie~i<must~.~~(i.e. validity period of the
approval); ,
"1 ( : 0u O~S 'J:~rU( "'.
,'i'
. . .
reponlDg requirements (e.g~f;~l'?n"1be/~ was undertaken. mdlcabon as
to whether the immediate outcom~lg»tile~e1i)~ ~4;;'
any other requirements, as applicable.
I. "'1CC ;S
c
i)
Upon receipt of the request for assistance, CSE will review and process the request and
will provide a response to eSls in a timely manner. Where CSE agrees to provide
assistance, eSE agrees to abide by the requirements outlined in the request for assistance.
In instances where CSE determines that it is unable to provide assistance, eSE agrees to
pr,o~ide~ SIS a written response outlining the rationale for its decision.
OVIS OC~S
j) Both ~~,~~~tify the other of any changes in the circumstances relating to tbe
S '?<e'l'Siution ~f~ s!~\,~) reduction measure (e.g. operational feasibility or technical
,o~~oq~~ l as s66~J#Ssi,~~~C@)is,will allow an assesSInent of any implications,
JiI~llJ9w~~~~r CST~ ,~~.taddlhonat 8uthonzatlon, either mternal1y or from
the p'iiA.::;SGout€ €
0",
"1"'0
....,,'~r. ~" 0 '" V<"1Cr 'O,?
"1
0u "s ''?~
k) Where th~1i~L~fll~~~'\vpul? require eSE to undertake activ.ities that fall outside
the scope oftb~T~tJ8if/res~est:{9~8SSJstance, eSE wIll cease all assistance actiVities
untit such time as a ne~ reqUe5t(pt1ls:gstance is submitted by eSIS.
(S
Page 6of8
�TSII
6. EFFECT, AMENDMENT, RENEWAL AND TERMINATION
"lie ,"''10c
6.1. This agreement:
ISIO/I/~S£
~cc :s 0" By
It(
•
•
•
•
, Ss
J.~
C
will enter into force once both part.les.~~lsiiP,lCd; '0/11 ,'1: /:)Ft/[ U"'O
•
/:J _: ( "
...£-.
;j,{J
'I/!:'r. _ A
D
may be amended at any lime upon mutUal consent.of,the parties", rrecJ5il'b~
exchange ofletter.!;
uu",,,,;/'<cr:C'Ii's
r,o", Cr-'1",;
.
"b
~ . 0'1.<r." Ive'.vWn receipt 0p",
-'1r "
be tennmated at any time yel"ther 0 fthe '~. ":"'"\. c .
may
o
'T
written notification; and
~ (II\I!:'~ Dt: 1?t:l\Is;:t: D~
will be reviewed and renewed on every two years frO{{j'~;:I!tOc orsiimatufe" O
t
''01\1
\J7J~""~i[ii.'-
I
l-'1c IvrS
c<s
Tbe Terms of this Aunel. b.ve been .greed upon by botb pnties.
Page 70f8
�TSI/SIIICEO
3. When the proposed s.12.1 threat reduction measure seeks to
"'IT "'ITO
0"115' Cos
10",
15'00
'
4, When the proposel1s.l2,1~d"a,;'l'l&\'measure involves any Government of Canada
S'-,"'t::'VI
' :W.,. I-t~ '-\::;I,~ . ,
systems or networ~"Of.uwse of Impo~ce,~-me..Govemment of Canada,
"'of/. '4 '" ~IT (
'''Of/. v4C~"rIT ~
,
>I14 rlo "'cr", "0
'
S0"'''''fiOrr/ SCf/.
0(15' rIO 15' ollj
'v", "'0
In certain circwnstances where
€"'/Q 'IV D12S v12-9~
C.,.. ~f?
CSIS and CSE bave pre-existing ';~~IBl!~~~
1 ISJ1?S to eonsult with each other in real
,
In th esc CITCwnstanceS, the Imp I"leat 1l1-,, ~~ l nJ v~ (A' II_~be reqUIT to su b't
'
'
'ed
brne.
opq81lo I~,. ~ V ,lVt
ml
fannal consultation notices in writing via DOO S~ and'SPRrpr. ti e undertaking a s.] 2.1 threat
n
c
reduction measure; however the operational areas will be requi~ to track these consultations for
review purposes.
Page 8of8
�
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Memoranda of Understanding
Subject
The topic of the resource
Memoranda of Understanding (MOUs) between agencies.
Dublin Core
The Dublin Core metadata element set is common to all Omeka records, including items, files, and collections. For more information see, http://dublincore.org/documents/dces/.
Title
A name given to the resource
Memorandum of Understanding between Communications Security Establishment (CSE) and the Canadian Security Intelligence Service (CSIS) Regarding threat reduction activities under s.12.1 of the CSIS Act (June 2016)
Subject
The topic of the resource
MOUs
Description
An account of the resource
MOU establishing circumstances by which CSIS will notify CSE of its threat reduction (disruption) activities, consult with CSE and request CSE assistance.
Source
A related resource from which the described resource is derived
ATIP request, obtained by Alex Boutilier
Date
A point or period of time associated with an event in the lifecycle of the resource
June 2016
CSE
CSIS
Disruption
information-sharing
MOU
Threat reduction
Threat reduction activities