Canada’s ‘super secret spy agency’ is releasing a malware-fighting tool to the public

‘This is something new for CSE,’ says the agency, which is trying to shed its old reputation.

The secretive headquarters of the Communications Security Establishment (CSE) is at a complex in Ottawa.

The secretive headquarters of the Communications Security Establishment (CSE) is at a complex in Ottawa. (Sean Kilpatrick/Canadian Press)

Canada’s electronic spy agency says it is taking the “unprecedented step” of releasing one of its own cyber defense tools to the public, in a bid to help companies and organizations better defend their computers and networks against malicious threats.

The Communications Security Establishment (CSE) rarely goes into detail about its activities — both offensive and defensive — and much of what is known about the agency’s activities have come from leaked documents obtained by U.S. National Security Agency whistleblower Edward Snowden and published in recent years.

But as of late, CSE has acknowledged it needs to do a better job of explaining to Canadians exactly what it does. Today, it is pulling back the curtain on an open-source malware analysis tool called Assemblyline that CSE says is used to protect the Canadian government’s sprawling infrastructure each day.

“It’s a tool that helps our analysts know what to look at, because it’s overwhelming for the number of people we have to be able to protect things,” Scott Jones, who heads the agency’s IT security efforts, said in an interview with CBC News.

‘Super secret spy’ reputation

On the one hand, open sourcing Assemblyline’s code is a savvy act of public relations, and Jones readily admits the agency is trying to shed its “super secret spy agency” reputation in the interest of greater transparency.

But on the other, the agency is acknowledging that, given the widening range of digital threats affecting Canadians and Canadian businesses, it believes it has a more public role to play in cyber defence than it has in the past.

“This is something new for CSE,” he says. It’s a fact not lost on longtime agency observers.

“They’re pushing the envelope in a way they haven’t quite before,” said Bill Robinson, an independent researcher who has studied CSE’s activities for more than two decades, and recently joined the University of Toronto’s Citizen Lab as a fellow. “It’s a big a change, a sea change for them in that way.”

The step may be unprecedented for CSE, but not for its partners in the Five Eyes — an intelligence-sharing alliance involving Australia, Canada, New Zealand, the United Kingdom and the United States.

Both the NSA and the U.K.’s Government Communications Headquarters (GCHQ) have maintained active projects on the code sharing repository GitHub in recent years.

‘A gift’ for companies

Assemblyline is described by CSE as akin to a conveyor belt: files go in, and a handful of small helper applications automatically comb through each one in search of malicious clues. On the way out, every file is given a score, which lets analysts sort old, familiar threats from the new and novel attacks that typically require a closer, more manual approach to analysis.

“There’s only so many ways you can hide malware within a Word document,” said John O’Brien, who leads the development of the tool, which first started in 2010. “So by looking for the hallmark of that type of an attack, that can give us an indication that there’s something in here that’s just off.”

Cybersecurity researcher Olivier Bilodeau says although there is overlap between Assemblyline and existing tools, CSE’s contribution is that it has cobbled together many of the tools that malware researchers already use into one platform, like a Swiss Army Knife for malware analysis that anyone can modify and improve. And it has demonstrated that Assemblyline can scale to handle networks as large as the government’s. 

Bilodeau — who leads cybersecurity research at the Montreal security company GoSecure, and has developed a malware research toolbox of his own — says those attributes could make it easier for large organizations such as banks to do more of the kind of specialized work that his company does.

“They usually spend a lot of time fighting the malware, but not a lot of time investing in malware fighting infrastructure,” he said. “So this is definitely a gift for them.”

Spying on spies

The possibility that CSE’s own tool could be used to detect spy software of its own design, or that of its partners, is not lost upon the agency.

“Whatever it detects, whether it be cybercrime or [nation] states, or anybody else that are doing things — well that’s a good thing, because it’s made the community smarter in terms of defense,” said Jones.

Nor does he believe that releasing Assemblyline to the public will make it easier for adversaries to harm the government, or understand how CSE hunts for threats — quite the opposite, in fact.

“We believe that the benefits far outweigh any risks and that we can still use this to be ahead of the threat that’s out there.”




Save pagePDF pageEmail pagePrint page

Leave a Reply

Your email address will not be published. Required fields are marked *