Protect your research - Northwest Territories

As a core part of its mandate, the Canadian Security Intelligence Service (CSIS) investigates and advises the Government of Canada on threats posed by espionage and foreign-influenced activities. As the world becomes more competitive, states are seeking every advantage. In order to fulfil their economic and security or military priorities, some foreign states engage in espionage. This foreign espionage has significant ramifications for Canada, including lost jobs, corporate and tax revenues, as well as diminished competitive and national advantages.

In 2019, the Northwest Territories (NWT) contributed approximately $4.4 billion to Canada’s GDP, primarily attributed to traditional economies of mining, quarrying, oil and gas, construction, and services. As the NWT seeks to realize its economic potential, it recognizes that research and development projects could also be important economic drivers. The NWT has an active and engaged research community that includes territorial bodies, community organizations, partnerships involving southern universities and national initiatives, and northern Canadian and circumpolar research networks.

Specific research organizations include Aurora College and the associated Western Arctic (WARC), North Slave (NSRC) and South Slave (SSRC) Research Centres, and The Institute for Circumpolar Health Research. Recent investment in the college and research centres by the Canadian Foundation for Innovation will ensure that the important research taking place in this community, including on the pressing issue of climate change, will continue. Researchers in the NWT are also conducting important research on geoscience, mineral and petroleum resources, agri-tech, biomass, and alternative energy. There are also other exciting areas of emerging research which could bolster NWT’s economy such as possible space-based research, as highlighted in the NWT government’s economic opportunities strategy. The NWT Manufacturing Innovation and Technology Contribution program will also serve to highlight innovative projects taking place in the territory.

CSIS has identified several of these promising sectors as, unfortunately, being of significant interest to hostile foreign actors. Sectors of the knowledge economy are particularly vulnerable to state-sponsored espionage and interference by hostile actors seeking to exploit the openness and collaborative environment that allow Canadian innovation to thrive. CSIS is committed to assisting its partners in protecting their foundational investments in economic infrastructure, sector development and capacity building to help position Northerners in the territories to take advantage of Canada’s innovation economy.

As difficult as it is to precisely measure, this damage to our collective prosperity is very real. As a result, it isimportant that Canadians are better-informed about the threat so that they can continue to innovate, collaborate, partner and prosper with a clear understanding of the risks and the knowledge they need to protect themselves. CSIS is engaging with stakeholders in targeted sectors to increase awareness of the current threat context in Canada and in your province. This information is provided to support those in industry, academia, government, and non-governmental organizations in taking the necessary actions to protect their information, the fruits of their research and intellectual property, and their investments. The government, business, and academic communities have a shared interest in increasing awareness of state-sponsored espionage targeting Canada to mitigate the potential negative impact on our economic growth and ability to innovate. We want to work with you to protect your organization’s assets, reputation and people.

Which sectors are targeted?

  • Technology
  • Biopharmaceuticals
  • Health
  • Transportation (Aerospace, Rail, Green Vehicles, Maritime Equipment, Supply Chain)
  • Academia
  • Energy
  • Manufacturing

What is targeted?

  • Advanced research and equipment in STEM fields
  • Intellectual property
  • Critical infrastructure assets
  • Personally identifiable information (e.g. financial or health information)
  • Government information
  • Communications capabilities

More specific examples could include: designs; test results; manufacturing or marketing plans; proprietaryformulas or processes; employee information; vendor and supply information; software; investment data; corporate strategies; access protocols; and patent or funding applications.

What methods are used?

  • Cyber Espionage
  • Human Espionage
  • Theft and Illicit Transfer of Technology & Know-How
  • Acquisition and Exploitation of Sensitive Canadian Data
  • Foreign Access and Control over Critical Infrastructure
  • Insider Threats
  • Hostile Foreign Investment
  • Reverse Engineering
  • Sabotage and Disruption
  • Exploitative Licensing Agreements
  • Elicitation

Please note this list is not exhaustive.

How can I protect myself?

  • Identify your most valuable information and protect it - don’t share unless essential
  • Enhance and regularly test or audit your cybersecurity policies and practices
  • Do your due diligence
  • Vet your vendors, funders, partners, employees and visitors
  • Promote a security-conscious culture
  • Take a risk-management approach
  • Employ strong physical security protocols
  • Ensure agreements, such as contracts or partnership agreements, are equitable and reciprocal, and that conflict resolution provisions are enforceable
  • Protect your assets
  • Beware of unknown solicitations
  • Contact authorities if you have concerns

What is hostile foreign investment?

While the vast majority of the foreign investment in Canada is carried out in an open and transparent manner, a number of State-Owned Enterprises (SOEs) and private firms with close ties to a foreign government and / or intelligence services can pursue corporate acquisition bids in Canada or other economic activities. Corporate acquisitions by these entities pose potential risks related to vulnerabilities in critical infrastructure, control over strategic sectors, espionage and foreign influenced activities, and illegal transfer of technology and expertise. The involvement of SOEs or state-linked enterprises in these investments may be covert or concealed.

What are insider threats?

Threat actors can use trusted insiders (employees, contractors, suppliers, partners, etc.) to gain access to your organization’s most valuable information. You can also hear these individuals referred to as “non-traditional collectors”. These insiders can also be coerced, manipulated, compelled or incentivized to provide information or access. Behaviours that could indicate a possible insider threat risk include: irregular hours; attempted computer intrusions; showing unusual interest in information outside the scope of the individual’s responsibilities; concealment of foreign affiliations or contacts; and unexplained absences or affluence. You know your organization best. Be alert to unusual or suspicious activities and behaviours.

What is cyber-espionage?

Threat actors can use cyber means such as phishing attacks or installation of malware to clandestinely obtain confidential information or steal intellectual property.

What is elicitation?

A threat actor may try to elicit information by using flattery, indicating interest, asking leading questions, claiming a mutual interest or feigning ignorance. These techniques may be employed in both professional and personal settings.

Contact us:

General inquiries: 613-993-9620
Reporting National Security Information: 1-800-267-7685