Canada’s
 electronic spy agency says it is taking the “unprecedented step” of 
releasing one of its own cyber defence tools to the public, in a bid to 
help companies and organizations better defend their computers and 
networks against malicious threats.
The 
Communications Security Establishment
 (CSE) rarely goes into detail about its activities — both offensive and
 defensive — and much of what is known about the agency’s activities 
have come from leaked documents obtained by U.S. National Security 
Agency whistleblower Edward Snowden and 
published in recent years.
But
 as of late, CSE has acknowledged it needs to do a better job of 
explaining to Canadians exactly what it does. Today, it is pulling back 
the curtain on an open-source malware analysis tool called Assemblyline 
that CSE says is used to protect the Canadian government’s sprawling 
infrastructure each day.
“It’s a tool that helps our analysts know
 what to look at, because it’s overwhelming for the number of people we 
have to be able to protect things,” Scott Jones, who heads the agency’s 
IT security efforts, said in an interview with CBC News.
‘Super secret spy’ reputation
On the one hand, 
open sourcing Assemblyline’s code
 is a savvy act of public relations, and Jones readily admits the agency
 is trying to shed its “super secret spy agency” reputation in the 
interest of greater transparency.
But on the other, the agency is 
acknowledging that, given the widening range of digital threats 
affecting Canadians and Canadian businesses, it believes it has a more 
public role to play in cyber defence than it has in the past.
“This is something new for CSE,” he says. It’s a fact not lost on longtime agency observers.
“They’re pushing the envelope in a way they haven’t quite before,” said Bill Robinson, 
an independent researcher
 who has studied CSE’s activities for more than two decades, and 
recently joined the University of Toronto’s Citizen Lab as a fellow. 
“It’s a big a change, a sea change for them in that way.”
The step
 may be unprecedented for CSE, but not for its partners in the Five Eyes
 — an intelligence-sharing alliance involving Australia, Canada, New 
Zealand, the United Kingdom and the United States.
Both the 
NSA and the 
U.K.’s Government Communications Headquarters (GCHQ) have maintained 
active projects on the code sharing repository GitHub in recent years.
‘A gift’ for companies
Assemblyline
 is described by CSE as akin to a conveyor belt: files go in, and a 
handful of small helper applications automatically comb through each one
 in search of malicious clues. On the way out, every file is given a 
score, which lets analysts sort old, familiar threats from the new and 
novel attacks that typically require a closer, more manual approach to 
analysis.
“There’s only so many ways you can hide malware within a
 Word document,” said John O’Brien, who leads the development of the 
tool, which first started in 2010. “So by looking for the hallmark of 
that type of an attack, that can give us an indication that there’s 
something in here that’s just off.”
Cybersecurity researcher 
Olivier Bilodeau
 says although there is overlap between Assemblyline and existing tools,
 CSE’s contribution is that it has cobbled together many of the tools 
that malware researchers already use into one platform, like a Swiss 
Army Knife for malware analysis that anyone can modify and improve. And 
it has demonstrated that Assemblyline can scale to handle networks as 
large as the government’s.
Bilodeau — who leads cybersecurity research at the Montreal security company 
GoSecure, and has developed 
a malware research toolbox of his own
 — says those attributes could make it easier for large organizations 
such as banks to do more of the kind of specialized work that his 
company does.
“They usually spend a lot of time fighting the 
malware, but not a lot of time investing in malware fighting 
infrastructure,” he said. “So this is definitely a gift for them.”
Spying on spies
The
 possibility that CSE’s own tool could be used to detect spy software of
 its own design, or that of its partners, is not lost upon the agency.
“Whatever
 it detects, whether it be cybercrime or [nation] states, or anybody 
else that are doing things — well that’s a good thing, because it’s made
 the community smarter in terms of defence,” said Jones.
Nor does 
he believe that releasing Assemblyline to the public will make it easier
 for adversaries to harm the government, or understand how CSE hunts for
 threats — quite the opposite, in fact.
“We believe that the benefits far outweigh any risks and that we can still use this to be ahead of the threat that’s out there.”