00:00:00.000You're tuned in to the Andrew Lawton Show.
00:00:08.260Andrew, good to talk to you again. Thanks for coming on today.
00:00:11.460Thanks for having me back. It's great to be here.
00:00:14.140Yeah, it's good to talk to you again. I enjoyed our last chat, which was that higher level discussion and some specifics as well about your experience in CSIS.
00:00:23.680And I wanted to actually use that experience as a jumping off point for this story, because obviously I've been covering on this show the Chinese interference stuff for several months now it's been.
00:00:35.060And I think the political side of it and the global geopolitical side of it has been well covered.
00:00:39.900But we haven't actually talked about the I think the fundamental question here of what is in these reports, these documents that have now been leaked to the Globe and Mail and to Global News.
00:00:51.420And just to put some context around how people should be interpreting what they're reading about these things.
00:00:57.340So let me just ask you, generally speaking, as someone who devoted your life for a time to service in CSIS, how did you feel when you learned that there was a leak?
00:01:09.040Yeah, I wasn't too happy about it. You know, I've been very defensive about the organization.
00:01:14.920I'm not happy with the leaks. You know, I don't think that's a whistleblower. I think they're leakers.
00:01:19.400I, you know, we take explain that difference because I know there's been so I think a whistleblower and I'm not a lawyer, so don't quote me on the legal definitions, but where there is a blowing the whistle on legal activities or wrongdoing or where I think there are some there's some protections around releasing otherwise sensitive information where it's in this very specific circumstances.
00:01:43.400circumstances, whereas in this case, I think it was just a situation where the person took sensitive classified documents and kind of dumped them on the public.
00:01:51.400And I don't think they exposed certainly no wrongdoing of the organization.
00:01:55.400You know, these were reports that were sent out and through appropriate channels.
00:01:59.400And this this person felt like they wanted more people to read them, which, you know, is not in our independent.
00:02:05.400We're not allowed to make those decisions independently on the collection side. Right.
00:02:09.400Like CSIS has its role, which is to collect, analyze and advise government on threats to national security.
00:02:14.400And then the deciders decide. Right. We might not always be happy with what they decide, but that's the way it kind of works out.
00:02:22.400So, you know, when I see somebody kind of breaching on the, you know, the advising part because they don't feel like the deciders made the right decision.
00:02:29.400I said, well, that's not, you know, that's not our job. That's not on people's.
00:02:35.400And that's why I felt I said not not very comfortable because there are repercussions ramifications, right?
00:02:41.400And we are out there when I was out there.
00:02:43.400We're talking about last time as an intelligence officer knocking on doors and asking people to give me confidential secret, you know, information that I can then, you know, put in reports and investigate national security.
00:02:53.400I'm promising confidentiality. I'm saying the things you tell me and all will be protected and take that oath.
00:02:59.400And when we work with our partners and Five Eyes community, we give them the same promise of protection and maintaining the integrity of the information.
00:03:05.400So when it gets out, it's a really bad look.
00:03:08.400Now, in this case, I think it's our own information that we've compromised.
00:03:11.400So I don't know if our partners will be upset with us, but it's, you know, this is sensitive stuff.
00:03:17.400These are things and I'm not sure the specific sources of them, but it really does get into sources and methods.
00:03:22.400And maybe people can make some observations about how this information was collected.
00:03:26.400And so those people were investigating can better protect themselves from our investigative measures, right?
00:03:31.400Which is, you know, what we don't want to happen.
00:03:34.400So I mean, it's a long answer, but I don't like it.
00:03:38.400I know many of my former colleagues don't like it.
00:03:41.400I'm sure the organization doesn't like it.
00:03:43.400And whatever we think about the value of the information we have, you know, a lot of people say, well, this is this is good that we know about these things.
00:03:50.400It's important. Remember, there's a cost to that as well.
00:03:53.400There's a risk when our information gets out like this.
00:03:58.400Now, I would just point out here, you're a former conservative candidate provincially in 2018.
00:04:04.400So I don't know how you identify politically now, but you're not a partisan liberal.
00:04:09.400This isn't coming from a place of supporting the liberals, which is I think we're a lot of the defensive of your position on that has come from the last couple of months.
00:04:16.400You know what? It's really been interesting.
00:04:18.400So I put out a tweet on tweet on tweet a lot.
00:04:20.400I don't love social media, but that's probably good.
00:04:24.400So I may be a bad candidate, but I put a tweet about how I did not appreciate the leaks.
00:04:30.400I did not like the whistleblowers, you know, column there in the Globe and Mail saying, you know, this is why I did it.
00:04:36.400The person who called himself a whistleblower, I just said he was a leaker.
00:04:39.400This is why I did it and all these things.
00:04:41.400So, you know, I wrote what I think was a harsh but fair kind of a Twitter thread, and it was retweeted by liberal and liberal supporters and partisans.
00:04:49.400I'm sure some bots, and I kind of joked by the way they find out that I ran for the PCs.
00:04:54.400You know, there's a lot of things with I hate Doug Ford and the hashtags, and I was like, I ran, you know.
00:04:59.400So in my opinion, this is a nonpartisan issue.
00:05:27.400But but let's take the position you've put forward and advance it a bit, because I agree that whistleblower protections generally are when someone is exposing legal wrongdoing and generally within their own organization.
00:05:38.400And in this case, I think actually ceases comes off quite well in the leak, and it's the government that comes off not particularly well.
00:05:44.400But assuming we take it every take it all at face value, and we'll get into that in a couple of moments.
00:05:49.400We have allegations that China was interfering, that CSIS knew about it, that they had some very specific examples of politicians and candidates that were either involved or were the passive beneficiaries of this support.
00:06:03.400CSIS takes this to the government, and it looks like the government did not take this seriously.
00:06:08.400I think that's what the reports that we've seen have shown.
00:06:12.400Because because there's a part of what you're saying that it sounds like it's just to say, oh, well, the government had that call and maybe another government will take it differently.
00:06:21.400Well, you're saying on behalf of the leaker, the people who are so you're I'm trying to understand what your position is on what should have happened in this case.
00:06:30.400If anything, if someone was very frustrated that this was getting handed to the government and they weren't taking it seriously.
00:06:37.400Well, look, it kind of goes to our previous point there. I ran for office. You want to be a decision maker, you go and become a decision maker.
00:06:43.400You want to go work for a political party, you think that things are not happening and you want to see happen.
00:06:48.400You volunteer, you get involved, you be a public person, you advocate for your positions.
00:06:52.400You know, they you don't have to necessarily put your name on the ballot, but you can go be a staffer and try to go to a ministry or some area that you're passionate about and knowledgeable about and say these are the policy positions that I think that we should take.
00:07:04.400I think that, you know, more than anything, is probably my frustration, because if this person and I don't know who this person is or whether they work for CSIS or not, I think it's a lot of people, I guess, is what we're seeing, too.
00:07:16.400But they were a very public senior person that had access to this information and they resigned their post and said, the reason why I'm resigning is because I don't think we're taking this issue seriously.
00:07:26.400There are a lot of public reports that they can point to that would demonstrate that.
00:07:30.400And we have what INSERA, I always get the acronyms wrong, so apologies for that.
00:07:34.400But INSERA and ENSICOP, we've been doing, CSIS has been putting out reports on foreign interference for years.
00:07:41.400The CSIS has been reviewed and the recommendations have come from parliamentary committees or ENSICOP that is nonpartisan, that's chaired by a Liberal MP.
00:07:53.400And they're saying their recommendations, things that we should be doing.
00:07:56.400Those recommendations haven't been adhered to.
00:07:58.400So there's plenty of public information that suggests that this is a problem that should be actioned without just kind of dumping this sensitive reporting on it into the public.
00:08:12.400And I think that so, yeah, I that was one of my points to the to the person to say, hey, look, come on out.
00:08:18.400Like, let's talk about if you want to talk about it and not in a threatening way, but like I think that would almost do better.
00:08:23.400I was in a meeting and I don't think we did a good job with this and we should do better.
00:08:28.400For me, that's a more convincing argument, to be honest, than letting this play out this way.
00:08:35.400Yeah. And I mean, to be honest, my view on this and you may have some people that whether you call them a leaker or whistleblower, they think they're smarter than the system and they think they can leak it and keep their identity guarded and never be outed.
00:08:46.400But you would have to assume that someone doing this, knowing what they're doing, would be doing it with the full expectation that they're going to be identified and they're going to be punished in some way, whatever that is.
00:08:58.400And and in that way, it almost looks more favorably upon you if you do just come out and name yourself before someone else names you.
00:09:05.400Yeah. Yeah. And I don't want to, you know, harp too much on the one person and I don't know the situation and who that person is. Right.
00:09:12.400But this is coming from somebody who wrote a book. I mean, I wrote a memoir about about working for CSIS.
00:09:19.400And you better believe that I was concerned about my, you know, considered and was concerned about my Security Information Act obligations.
00:09:26.400And, you know, I they say you're only kind of guilty when the judge finds you, finds you guilty.
00:09:32.400But I had my name and my face in the book. And so I was ready to say this is why I said it.
00:09:37.400This is what I think it's not in violation. I I didn't do names of former colleagues or any operational, you know, information that give things away.
00:09:45.400But I I acknowledge people might be mad at me. You know, I acknowledge that the the CSIS was not going to be happy about the book being written.
00:09:54.400So, yeah, it's not a great feeling. I'm sure the person has got all all sorts of stuff going on inside of them about what they feel they need to do, what they feel they want the public to hear and what their obligations are.
00:10:07.400But, yeah, I think that maybe would have been if they really wanted that conversation, you've got to kind of have it.
00:10:16.400You've got to lead it. You've got to be in front of it, because what's happened with with things are coming left and right and showing up in newspaper articles one day and the next article the next day, it kind of gets away.
00:10:26.400You know, it can get a little muddled. I assume there's not, you know, one centralized database of CSIS documents and information and reports that any of the, you know, three thousand some odd employees at CSIS can go and peruse at their leisure.
00:10:39.580Things are, I assume, quite siloed and segmented. So let's talk about just the logistics of how many people would likely have access to information of this nature on a particular file.
00:10:51.260And I'm assuming it would vary. But when you're getting into this level of specificity, are we talking about five people, 50 people, 500 people?
00:11:02.000Well, you know, I don't know the exact numbers or could I probably say, but I'll say this, that, you know, these the classified or sensitive documents that were leaked, those were distributed to a large number of people.
00:11:19.140I think there were across the five eyes. So the number of other intelligence services to, I think, PCO, PMO, like there's a there's a big list once the once kind of those get out of your organization.
00:11:30.780And I don't know how many people are on that mailing list, but it's not you know, it's not one. Right. It's it seemed like they were a few.
00:11:37.220And when you start getting into specific reports that were sent out, yeah, you can probably drill down who's in the receiving list of a report, who is on the inside of a case file, working specific investigations.
00:11:49.980Absolutely. That stuff is pretty tightly controlled. I think if you work with or for the service and you can be pretty confident that they do a good job of protecting it.
00:12:03.060And to your earlier question about will this get out, the more information the people reveal about what they know, the easier it's going to be to narrow down, you know, who had access to all of that information.
00:12:16.340I think that's also what you're getting kind of getting down to. They are they are tightly controlled. Not everyone gets access to everything.
00:12:23.700There's this you need to know principle you hear. You may be familiar with it, but even if you have the highest levels of national security, even if you're cleared to to whatever the highest clearances, if you don't need to know that information, then you should not be provided that information.
00:12:38.420You know, you don't get read in on every file. I can't walk down the hall at CSIS and say, hey, what do you, you know, what are you working on?
00:12:48.860What's going on? You know, what's, you know, what's going on over there, right? You're generally restricted to what you have specific access to.
00:12:56.180Now, certain areas would have, you know, that can be broad. You know, when I was, when I was working there and I was in a support desk, that can mean a lot of different files in a very kind of shallow level, a lot of different investigations or someone working one investigation, but with a tight team will have all the information on, you know, very, very small investigation.
00:13:16.260So, yeah, it's interesting to see as these can come out, I make assessments about, okay, like how close was this person to the reporting versus, or the collection of the information versus the reporting, which would be on, was this distributed to a decision maker?
00:13:32.720And therefore, you know, they're getting selective intelligence and saying, why am I the only one who got this and more people need to hear? Or is it somebody who is, you know, collecting this information, passing it up and feel like it's not going anywhere? I think those are, you know, those are different things.
00:13:47.960I saw a Twitter thread from, from someone recently, and I can't recall who it was. And I think they probably had some connection to the intelligence world that said intelligence reports are not to be taken as, you know, 100% ironclad fact. They're, they're meant to be reports that are then taken along with other various inputs. We saw that during the Public Order Emergency Commission, where CSIS had this report and the government ultimately found something else. So I'm just curious if you should could shine some light on that. I mean, these documents, and I don't know the formal title of,
00:14:17.960of them, and there are probably several, what is the proper way to receive those? Are they, are they, is there a margin of error on these things? Or is it as certain as it comes, or as certain as CSIS is, when these things are put in paper?
00:14:31.540Yeah, I mean, the nature of intelligence, it's dynamic, it's evolving, you can have, you're building a picture, and you're trying to provide information and assessment of that information, you're processing information into, you know, tell in this case, intelligence assessments to say, this is,
00:14:47.960you know, what we think is, is happening, this is the picture, but yeah, it's, you know, getting it right or wrong, or just making, making informed links, and then later on information comes up that challenges that hypothesis, or changes it a little bit, or put some context and nuance onto reports. So, you know, in a case,
00:15:07.960in a case like this, or in the fact that this is a threat like this, that CSIS is a core part of CSIS's mandate, that's, you know, foreign influenced activities, that is kind of a nuanced threat,
00:15:21.040you will see reporting that comes out that is just trying to provide people a picture of what's going on that they can make decisions based on, right? And that's why it is great, right? It is, you make the best decisions you can, you make risk informed decisions,
00:15:37.820threat informed decisions. And I think that's one of the concerns you have is, well, did this person who is, who is access to information, they have access to everything?
00:15:47.800Or are they selectively getting access to it? Do they know what risk mitigation is put in place? So, you know, what decisions were made with that, with that information?
00:15:57.260We don't, that is, we don't know, that's not always provided what, what kind of is happening behind the scenes, we kind of see, okay, well, they, they, they got this, and they did that, but we don't know everything they got, we don't know everything they did, right?
00:16:11.260And that's, I think one of the challenges of getting selective leaks of, of, of documents is, it's, yeah, it's not going to provide the whole picture. I'm not saying the information passed along is wrong.
00:16:21.480I'm not saying that the documents given weren't like, at the time, accurate pictures of what we knew then or about the specific threat then. But it's, it's hard to say, like, this is the smoking gun, right? It's, that doesn't always the case in this type, these types of investigations.
00:16:37.040Yeah, and I, it's funny, because I, I know that some of my audience right now is, like, seething, because we've been going hard on this story based on these reports for the last, not at you, just probably at me more than anything, because they, you know, they know I've been talking about this, and it's one of these things, as a journalist, I'm inclined towards more information, and the more the better, and then we can decide from it.
00:16:55.220And, and I, I realize there is a, I mean, perhaps it's a philosophical point more than it's a legal point about what the limit is. At what point does it become justifiable to do this?
00:17:04.940And, and I think, you know, there is one sort of takeaway of if you feel it's worth staking your life and your career, and the legal punishments on, then, okay, let the cards fall where they may.
00:17:15.920Well, and I want to say this to folks, too, because, you know, I get asked a lot about the leaks, the documents, those types of things. And I feel like I want to present that, that context, which is these have, you know, threats and risks, and let's add nuance to it.
00:17:30.920But I dedicated 10 years of my life to investigating threats to national security, and many of my colleagues have as well. And this is one of them, right? So I do not want to discount the risk, I do not, and the threat, I do not want to come across in any way that's saying that, you know, there's nothing to see here, and nobody, no, that is absolutely not the case, right?
00:17:52.700The CSIS has been putting in their public reports, there have been recommendations coming out of government bodies that this is a threat, this is a concern, this is something we should do more about.
00:18:01.320And there are legitimate questions to be asked 100% about what did the government know, and what did they do? And was that appropriate, right? And if they did, you know, and then there's the nuance, which is, well, look, if they didn't do more, is that because they benefited, right?
00:18:19.480And I think everyone wants to get, and those are absolutely 100% fair questions that we should be asking, which people are calling for public inquiry, or more sunlight and more transparency, and I agree.
00:18:31.860So, you know, I don't want to discount that and be used to say, well, you know, the leaker is not a whistleblower, and therefore, you know, this is a big brouhaha about nothing. Absolutely not. You know, we have an intelligence service that's been working on this, we've been sending reports up, and it is a real threat, and we should do more 100%.
00:18:49.800So yeah, I, you know, I get the blowback, I get the frustration, I'm, I always feel like because I'm from the intelligence community, I need to say, look, guys, you know, don't put my former colleagues at risk by dumping, you know, sensitive intel out.
00:19:03.100But my goodness, we, you know, there's plenty of public information that says this is a problem that we should be doing more about. This has sparked a conversation about that. And yeah, I'm not saying there's no public benefit. I'm just saying I wish we didn't get here because of leaks.
00:19:19.800Yeah, and I agree process is important. I mean, it's the old thing about, you know, if police search someone without a warrant, and they find something there, but they weren't allowed to have searched in the first place, there's a remedy available to that person. So I know it's not a perfectly analogous situation, but you can't just take this Machiavellian approach to these things, which I think we can agree on in principle, if not necessarily in the specific case here.
00:19:42.280You might like this link, you might not like the next one. And if we're going to rely on individual people who feel empowered to do it, I don't think that's a great system.
00:19:50.360Yeah, so whatever we feel about this, but once again, foreign interference, that's a core CSIS mandate threat since 1984, that our Security Intelligence Service been asked to investigate and advise government on, and they've been doing that.
00:20:07.000And now we've got to figure out, say, what do we do? What we not do? Why? And what should we do going forward? Now that we are having this conversation, because that will, you know, that will require further action.
00:20:18.980And look, as a political candidate, I have some insight in how nominations work, and those are messy things.
00:20:27.560That's no easy solutions, how to tidy those things up with the political process. But clearly, clearly, you know, I think there are steps that we can and should take.
00:20:36.620All right, well, the fantastic book written by this gentleman, Andrew Kirsch, is I Was Never Here, My True Canadian Spy Story of Coffees, Codenames, and Covert Operations.
00:20:45.820You can, in the age of terrorism, you can get that on Amazon and Indigo, and I would encourage you to read it.
00:20:51.380It was a lot of fun, and you can also check my interview with Andrew from several months ago to get a little bit more information about that.
00:20:57.760Andrew, thank you so much for your time and candour, sir.