Canada’s federal police force, the Royal Canadian Mounted Police (RCMP), has admitted it utilizes spyware that enables the microphones and cameras on devices to spy on targets it wishes to investigate.
The information became public, not through Canadian media, but instead through a June 29 article by U.S.-based Politico.
The outlet states that the RCMP “outlined the techniques” its Covert Access and Intercept Team (CAIT) employs in a document provided to the House of Commons during the week of June 27 in response to a question from an unnamed Conservative Party MP on how the agency gathers data from Canadians.
MORE ON THE RCMP
- RCMP Commish Berated Subordinates Who Refused to Push Trudeau Gun Control Narrative After Nova Scotia Massacre
- RCMP Logged Journalists, Twitter Users Who Shared Musical Ride WhatsApp Leak Scandal
- RCMP Spent $235,000 on Buffets at Five Star Hotel During Freedom Convoy Crackdown
- Canadian Federal Police Sabotage Heavy Equipment Stored on Private Land During Coutts Freedom Convoy
Politico described the CAIT as a unit that exists “to intercept communication that can’t be obtained using traditional wiretaps” by using what was defined in the documents as “on-device investigative tools.”
Success
You are now signed up for our newsletter
Success
Check your email to complete sign up
The documents further defined the tools as spyware “installed on a targeted computing device that enables the collection of electronic evidence.”
And further elaborated that the spyware collectes “audio recordings of private communications and other sounds within range” and “photographic images of persons, places and activities viewable by the camera(s) built into” the “targeted device,” Politico stated
The outlet also paraphrased the documents as representing that the tools are only used during “serious criminal and national security investigations” and always under the auspices of a judge.
University of Toronto Citizen Lab research associate Christopher Parsons told Politico that the revelations are, “The cleanest, most straightforward explanation of what they’re capable of doing that I’m aware of.”
“This is a kind of capability that they have done everything possible to keep incredibly quiet,” he also stated.
Politico stated that the RCMP justified the necessity of the tools in the documents because, “Decentralization, combined with the widespread use of end-to-end encrypted voice and text-based messaging services, make it exponentially more difficult for the RCMP to conduct court-authorized electronic surveillance.”
The documents further represented that, “RCMP’s CAIT tools and techniques are not used to conduct mass surveillance…The use of ODITs [spyware] is always targeted and time-limited.”
The use of data intercepts may not be as localized as the RCMP’s statements would have the public believe, however.
Dennis Young, an ex-RCMP officer and independent investigator, published in 2019, based a 2017 disclosure from former RCMP Commissioner Bob Paulson to former Minister of Public Safety Ralph Goodale, a set of statistics that showed between 2012 and 2016 alone that there had been more than 28,000 days worth of audio and visual intercept authorizations given and renewed.
The 28,001 days of surveillance were generated from 356 applications, of which 353 were approved.
The most common types of offenses in relation to surveillance listed in the document were mixed between narcotics, possession of stolen property, money laundering, terrorism, and conspiracy.