Unique within Canada's security and intelligence community, the Communications Security Establishment employs code-makers and code-breakers (
cryptanalysis) to provide the Government of Canada with
information technology security (IT Security) and foreign signals intelligence services. CSE also provides technical and operational assistance to the
Royal Canadian Mounted Police and federal law enforcement and security agencies, including the
Canada Border Services Agency and the
Canadian Air Transport Security Authority.
Foreign Signals Intelligence CSE works with its closest foreign intelligence allies, the US, UK, Australia and New Zealand to share the collection burden and the resulting intelligence yield. Canada is a substantial beneficiary and participant of the collaborative effort within the partnership to collect and report on foreign communications. These machines are now retired. Little information is available on the types of computers used by CSE since then. However, Cray in the US has produced a number of improved supercomputers since then. These include the Cray SX-6, early 2000s, the
Cray X1, 2003 (development funded in part by the NSA),
Cray XD1, 2004, Cray XT3,
Cray XT4, 2006, Cray XMt, 2006 and Cray CX1, 2008. It is possible that some of these models have been used by CSE and are in use today.
Cyber Operations CSE’s mandate authorizes it to conduct foreign
cyber operations that disrupt the capabilities of adversaries to help protect Canada and Canadians. Cyber operations conducted by CSE is broken down to defensive and active cyber operations, and must relate to
international affairs,
defence or
security. Defensive cyber operations authorizes CSE to defend Canadian systems against foreign cyber attacks. For instance, a cyber actor trying to steal information from a government
network could be thwarted by CSE by disabling the cyber actor's
server. In addition to government systems, the
Minister of National Defence can designate systems of importance such as:
energy grids,
telecom networks,
healthcare databases,
banking systems, elections infrastructure in order for CSE to be authorized to defend them. hostile
intelligence agencies, state-sponsored
hackers. For instance, CSE can disrupt an adversary's means of communication. While assisting, CSE operates under the requesting agency's legal authority and restrictions. This means that CSE can, in fact, target
Canadians and individuals in
Canada while operating under its assistance mandate, as long as the requesting agency has the legal authority to, such as a
court-issued warrant.
History Formerly known as
communications security (COMSEC), CSE's Information Technology Security branch grew out of a need to protect
sensitive information transmitted by various agencies of the government, especially the
Department of Foreign Affairs and International Trade (DFAIT),
Canada Border Services Agency (CBSA), DND, and the
Royal Canadian Mounted Police (RCMP). Officially created on 1 October 2018, CCCS consolidated the existing operational cyber-security units of several federal government organizations, including the Canadian Cyber Incident Response Centre of Public Safety Canada; the Security Operations Centre of Shared Services Canada; and the Information Technology Security branch of CSE.
Vulnerability Research Centre The
Vulnerability Research Centre (
VRC; ) is part of CSE’s Research Directorate. Its focus is to advance Canada’s interests through world-class strategic
vulnerability research. To do so, the VRC: • conducts security reviews against systems of importance to the Government of Canada • researches computer security vulnerabilities through
source code auditing,
software reverse engineering and dynamic analysis • provides advice and guidance on
vulnerability prevention and mitigation • researches and develops novel
vulnerability research techniques and tradecraft • collaborates with other Government of Canada departments, international partners and other CSE divisions to promote the exchange of expertise • performs recruitment, training and mentorship to help develop the next generation of vulnerability research practitioners within Canada Though officially founded in 2009, TIMC officially opened and formally named in September 2011. Led by Dr. Drew Vandeth, CSE researchers proposed and established the institute. The institute's first director was Dr. Hugh Williams with Dr. Drew Vandeth as the first Deputy Director.
Unclassified Academic & Open-Source Contributions Researchers Leland McInnes and John Healy at the Tutte Institute developed a technique called
Uniform Manifold Approximation and Projection (UMAP), originally designed to analyze
malware. The algorithm and software of UMAP has since been released by TIMC to the
open-source community, and is now being used to answer questions about
COVID-19. As of 2024-25, TIMC's
open-source contributions averaged over 2.5 million
downloads per month and have been adapted to
NVIDIA's RAPIDS and HypernetX == Facilities ==