
Canadians urged to ‘avoid all travel' to Israel amid air, missile strikes with Iran
Israeli security forces inspect the site of homes destroyed by a missile fired from Iran, in Rishon Lezion, Israel, on Saturday, June 14, 2025. (AP Photo/Ohad Zwigenberg)
The federal government is urging Canadians to 'avoid all travel' to Israel as the country exchanges missile and air strikes with Iran.
The Canadian government says it issued the warning because of Israel's 'ongoing hostilities' with Iran.
Meanwhile, Canada's foreign affairs minister has asked Canadians in the Middle East in need of emergency assistance to contact the Department of Global Affairs.
Anita Anand's social media post this morning comes after she condemned Iran's attack on Israel and called for restraint from both countries.
Israel's defense minister warned Saturday that 'Tehran will burn' if Iran continues firing missiles.
The two countries traded blows after Israel launched a blistering surprise attack Friday on Iranian nuclear and military sites, killing several top generals.
With files from The Associated Press
This report by The Canadian Press was first published June 14, 2025.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


CBC
24 minutes ago
- CBC
Israel and Iran trade strikes for 3rd day as nuclear talks are called off
Social Sharing Israel unleashed airstrikes across Iran for a third day on Sunday and threatened even greater force as some Iranian missiles evaded Israeli air defenses to strike buildings in the heart of the country. Planned talks on Iran's nuclear program, which could provide an off-ramp, were cancelled. The region braced for a protracted conflict after Israel's surprise bombardment of Iran's nuclear and military sites on Friday killed several top generals and nuclear scientists, and neither side showed any sign of backing down. Iran said Israel struck two oil refineries, raising the prospect of a broader assault on Iran's heavily sanctioned energy industry that could affect global markets. The Israeli military, in a social media post, warned Iranians to evacuate arms factories, signaling what could be a further widening of the campaign. Around noon local time, explosions were heard again in the Iranian capital, Tehran. U.S. President Donald Trump has expressed full support for Israel's actions while warning Iran that it can only avoid further destruction by agreeing to a new nuclear deal. Iranian Foreign Minister Abbas Araghchi said Sunday that if the Israeli strikes on Iran stop, then "our responses will also stop." He said the United States "is a partner in these attacks and must take responsibility." Could the U.S. get involved in the Iran-Israel conflict? | Hanomansing Tonight 1 day ago Duration 17:09 Explosions in Tehran New explosions echoed across Tehran and were reported elsewhere in the country early Sunday, but there was no update to a death toll released the day before by Iran's U.N. ambassador, who said 78 people had been killed and more than 320 wounded. In Israel, at least 10 people were killed in Iranian strikes overnight and into Sunday, according to Israel's Magen David Adom rescue service, bringing the country's total death toll to 13. The country's main international airport and airspace remained closed for a third day. Israeli strikes targeted Iran's Defense Ministry early Sunday after hitting air defenses, military bases and sites associated with its nuclear program. The killing of several top generals and nuclear scientists in targeted strikes indicated that Israeli intelligence has penetrated Iran at the highest levels. Death toll mounts in Israel In Israel, at least six people, including a 10-year-old and a 9-year-old, were killed when a missile hit an apartment building in Bat Yam, near Tel Aviv. Daniel Hadad, a local police commander, said 180 people were wounded and seven are still missing. An Associated Press reporter saw streets lined with damaged and destroyed buildings, bombed out cars and shards of glass. Responders used a drone at points to look for survivors. Some people could be seen leaving the area with suitcases. WATCH | Daniel Byman discusses the latest: CBC's Marianne Dimain speaks to Daniel Byman on the latest in the conflict between Israel and Iran 19 hours ago Duration 4:34 Another four people, including a 13-year-old, were killed and 24 wounded when a missile struck a building in the Arab town of Tamra in northern Israel. A strike on the central city of Rehovot wounded 42. The Weizmann Institute of Science, an important centre for research in Rehovot, said "there were a number of hits to buildings on the campus." It said no one was harmed. Israel has sophisticated multi-tiered air defences that are able to detect and intercept missiles fired at populated areas or key infrastructure, but officials acknowledge it is imperfect. Urgent calls to de-escalate World leaders made urgent calls to de-escalate. The attack on nuclear sites set a "dangerous precedent," China's foreign minister said. The region is already on edge as Israel seeks to annihilate Hamas, an Iranian ally, in the Gaza Strip, where the war is still raging after Hamas's Oct. 7, 2023, attack. Prime Minister Benjamin Netanyahu brushed off such calls, saying Israel's strikes so far are "nothing compared to what they will feel under the sway of our forces in the coming days." Israel, the sole undeclared nuclear-armed state in the Middle East — said it launched the attack to prevent Iran from developing a nuclear weapon. The two countries have been regional adversaries for decades. Iran has always said its nuclear program was peaceful, and the U.S. and others have assessed it has not pursued a weapon since 2003. But it has enriched ever larger stockpiles of uranium to near weapons-grade levels in recent years and was believed to have been able to develop multiple weapons within months if it chose to do so. WATCH | Iran's retaliatory strikes: Iran retaliatory strikes kill at least 3 after Israeli attacks on nuclear program 19 hours ago Duration 10:34 Iran launched retaliatory missile strikes on Israel into Saturday morning, killing at least three people and wounding dozens, after a series of blistering Israeli attacks on the heart of Iran's nuclear program and its armed forces. Iran's UN ambassador said 78 people were killed and more than 320 wounded in the attacks by Israel. The U.N.'s atomic watchdog censured Iran last week for not complying with its obligations. Araghchi, Iran's top diplomat, said Israel had targeted an oil refinery near Tehran and another in the country's Bushehr province on the Persian Gulf. He said Iran had also targeted "economic" sites in Israel, without elaborating. Araghchi was speaking to diplomats in his first public appearance since the initial Israeli strikes. Semiofficial Iranian news agencies reported that an Israeli drone strike had caused a "strong explosion" at an Iranian natural-gas processing plant. Israel's military did not immediately comment. The extent of damage at the South Pars natural gas field was not immediately clear. Such sites have air defence systems around them, which Israel has been targeting. An oil refinery was also damaged in the northern Israeli city of Haifa, according to the firm operating it. Bazan Group said pipelines and transmission lines between facilities were damaged, forcing some downstream facilities to be shut down. It said no one was wounded. Iran calls nuclear talks 'unjustifiable' The Arab Gulf country of Oman, which has been mediating indirect talks between the U.S. and Iran over Tehran's nuclear program, said a sixth round planned for Sunday would not take place. "We remain committed to talks and hope the Iranians will come to the table soon," a senior U.S. official said on condition of anonymity to discuss the sensitive talks. Araghchi, Iran's foreign minister, said Saturday that the nuclear talks were "unjustifiable" after Israel's strikes, which he said were the "result of the direct support by Washington." In a post on his Truth Social account early Sunday, Trump reiterated that the U.S. was not involved in the attacks on Iran and warned that any retaliation directed against it would bring an American response "at levels never seen before." "However, we can easily get a deal done between Iran and Israel, and end this bloody conflict!!!" he wrote. 'More than a few weeks' to repair nuclear facilities In Iran, satellite photos analyzed by AP show extensive damage at Iran's main nuclear enrichment facility in Natanz. The images shot Saturday by Planet Labs PBC show multiple buildings damaged or destroyed. The structures hit include buildings identified by experts as supplying power to the facility. U.N. nuclear chief Rafael Grossi told the Security Council that the above-ground section of the Natanz facility was destroyed. The main centrifuge facility underground did not appear to have been hit, but the loss of power could have damaged infrastructure there, he said. Israel also struck a nuclear research facility in Isfahan. The International Atomic Energy Agency said four "critical buildings" were damaged, including its uranium conversion facility. It said there was no sign of increased radiation at Natanz or Isfahan. An Israeli military official, speaking on condition of anonymity in line with official procedures, said that according to the army's initial assessment "it will take much more than a few weeks" for Iran to repair the damage to the Natanz and Isfahan nuclear sites. The official said the army had "concrete intelligence that production in Isfahan was for military purposes."


CBC
an hour ago
- CBC
N.S. Pride groups applaud federal funding to improve event safety, security
Pride groups in Nova Scotia are applauding recently announced federal funding that organizations can use to help cover safety and security costs for festivals and events. Rechie Valdez, minister of women and gender equality, announced about $1.5 million toward a community safety fund. The initiative has been in place since 2023 and is administered by Fierté Canada Pride, a national organization representing 2SLGBTQ+ Pride groups in Canada. Pictou County Pride's director of community engagement said the funding shows the federal government understands that hate toward 2SLGBTQ+ people is rising. "For many of us we are noticing a lot more safety considerations within the community, especially for trans and gender-diverse folk," said Lucy White. This year, there have been a number of incidents of vandalism in Nova Scotia targeting 2SLGBTQ+ businesses and people. Police-reported hate crimes targeting sexual orientation in Atlantic Canada have also been on the rise. Small events and festivals are eligible for up to $10,000 from the fund. Groups with an event budget under $2 million can apply for up to $50,000 dollars, while the largest events can receive up to $250,000. The money can be used to cover the cost of things like insurance and working with a security company to develop an emergency response plan. "A lot of the times we talk about rising hate, but we don't talk about the actual financial costs that [Pride groups] are subject to ... to keep their community safe," said Marc Basque, community safety co-ordinator with Fierté Canada Pride. He said a group doesn't have to be a formally registered organization to apply for the funding. Fiona Kerr, the executive director of Halifax Pride, said the fund will be a big help with rising costs. "We don't really introduce new safety measures, but the ones that we currently do pay for seem to go up exponentially every single year," said Kerr. Kerr is glad to see the federal government taking the matter seriously. She said Halifax Pride has increased security capacity in recent years, with that being the main thing the money will help with. Kerr added that it will help pay for increased first-aid presence at events. "The weather, the heat is not getting any better," said Kerr. "That's been a large concern for us on our parade weekend." Pictou County Pride is not a large enough organization to need help from the fund, said White. But, she said, it could be helpful down the line if the group grows. White added that the fund's existence is "really positive."


CBC
an hour ago
- CBC
Canada's cybersecurity head offers rare insight into Nova Scotia Power breach
The head of Canada's cyber-defence agency is offering some insight just weeks after a ransomware attack against Nova Scotia Power. The utility's computer systems were breached by ransomware hackers on March 19, but Nova Scotia Power did not discover it until April 25. The company disclosed the cybersecurity incident three days after that. About 280,000 customers — more than half of the utility's customers in the province — were informed by letter that their personal information may have been compromised in the attack. The data included names, addresses, phone numbers, birth dates, driver's licences, social insurance numbers and banking information. On Thursday, the Nova Scotia Energy Board granted approval to Nova Scotia Power to move forward with a $1.8-million project to improve cybersecurity. The attack and its aftermath have sparked many questions about the security of the company's IT systems. Rajiv Gupta, head of the Canadian Centre for Cyber Security, spoke to CBC News in a rare interview about how these types of incidents unfold and what people and organizations like Nova Scotia Power can do to protect themselves. This interview has been edited for length and clarity: Can you explain a bit about your agency and what it does? The Canadian Centre for Cyber Security is really Canada's cyber defence agency. So, we provide advice, guidance and services to critical infrastructure systems of importance to Canada. Work primarily with the federal government is where we had started, but have really grown into critical infrastructure. And our goal is to raise cyber resilience across Canada. We fall under CSE, which is the Communications Security Establishment, and CSE has a mandate for foreign intelligence, which goes back 80 years in terms of WWII. We report to the minister of national defence. What do you make of the recent attack against Nova Scotia Power, which did ultimately affect about 280,000 customers? We don't comment specifically on specific incidents, but as a cyber centre … any critical infrastructure providers that have incidents can report their incidents to the cyber centre. So last year we saw about 1,500 incidents. We see a lot of these, and that's what's really important and kind of sad to understand as well, that this is happening so often in terms of cyber-criminal organizations comprising critical infrastructure organizations in Canada. Their motivation is money. They would compromise the network. So basically getting their software inside the network, but then stealing all the sensitive information from the organization and … then going ahead and encrypting systems and locking people out of their system. So we used to call that double extortion. So that way the criminal organization could threaten to release sensitive information, unless a ransom was paid, or also basically not give back access to systems unless a ransom was paid. So that was what we're seeing and it was incredibly impactful to system operators within Canada. In this case, Nova Scotia Power did not pay the ransom that was asked of them. Is that common practice? What we always do is we provide advice and guidance to organizations and we say, "it's a business decision," because we're not the ones operating their business, and we don't know their exact context, say if it's a threat to life or something else. But we always say, 'Hey there's a lot of downside to paying the ransom.' First of all, you're funding these criminal organizations. So, the more ransom is paid, the more we're going to proliferate this sort of behaviour. At the same point in time, you're paying this ransom to criminals. What's that contract worth in the end anyway? Is there really any guarantee that they're either not going to share the confidential information, or they're actually going to give you the keys to decrypt your systems and get your access back? The proceeds of this can go to criminal or even terrorist type causes as well, so, worrisome in that sense. Are you able to say whether Nova Scotia Power had actually contacted your agency [following the breach]? The one thing that I will say is that they did reach out to us. We always recommend that organizations that are victimized reach out to the cyber centre. We've seen many of these in the past and we have advice and guidance to share. And not only can we help the organization in their recovery, and in terms of paying the ransom, ransom might help you unlock your systems, but there's still always recovery costs that are part of this as well, regardless of whether you work with the criminal organization or not. But in this case, they did reach out to us. And the other thing we always encourage is … we hope that they share information about the compromise as well. Because we can take that and share that with other critical infrastructure organizations in Canada. Did they share with you the extent of the breach? We wouldn't go into any details in that sense, but they did notify us of the breach. Is there any sense of who might have been the perpetrator in this attack from your perspective? Nova Scotia Power says it has a sense of who it is. I wouldn't comment on that. There's various groups and they often change shapes and forms as they get disrupted. Unfortunately it's an ever-evolving group of cyber criminals that are out there that seem to be performing these behaviours. And we have an assessment out in terms of a cyber criminal activity in Canada as well that kind of points to the groups that we've seen as active. About 140,000 [social insurance numbers] were included in the stolen data. How serious is this, when that type of personal information is accessed? I couldn't speak to the seriousness of that type of information, but what I will say is that this is exactly what cyber criminals go after. And depending on the type of information, it'll fetch a different price on the dark web. Organizations will collect personal information, whether it's SIN numbers, or credit card numbers, or health card numbers, other sorts of confidential information. Typically that information gets resold on the dark web for other criminals that are going to actually monetize that for other purposes. It's kind of a not very positive circle that exists on the dark web. The way this actually works in terms of what we call "cybercrime as a service" is that it's a whole ecosystem of criminal entities that actually work together. And because it's typically run out of operations that are beyond the legal borders — often in Russian speaking countries where law enforcement won't necessarily prosecute — it's very difficult to disrupt these organizations. And even when law enforcement is able to disrupt them, it's fairly easy for them to kind of reconstitute themselves. What are some of the risks when this personal information is shared on the deep web or dark web? Once that information is out there, that often just spurs the next cycle of fraud. Whether it's spear phishing emails that are using that information, whether it's leveraging information about an organization or their clients to actually further compromise them. That's why it's really important to take note for everyone to be mindful of the things they can do to protect themselves. Be extra vigilant of understanding what's being mailed to you and double checking those links and making sure it's coming from an authenticated source and whatnot. Being mindful of content, making sure you have strong authentication in terms of how you're actually accessing applications as well. What would be your advice to Nova Scotia Power? Really for all of these organizations, do your due diligence. Understand what your really critical elements are of your organization that would be your worst-case scenario. And then once you know what your worst-case scenario is, then you can defend that. Build the plan according to our ransomware playbook, have the backups in place, and have the strong measures in place. The utility [Nova Scotia Power] applied for funding about a month before the ransomware attack. They cited the Canadian Centre for Cyber Security's most recent threat assessment, pointing out that power grids are so interconnected that they can be really vulnerable to these types of attacks. What would be the warning signs of an attack like this? One of the things that we've been very mindful of … as the world gets more hostile, we're worried about impacts to critical infrastructure like electrical guide grids, pipelines, these sorts of things. A lot of them are controlled by systems that were never meant to be connected to the Internet. Nowadays, as people are looking to optimize efficiency, and connect to cloud services and connect sensors to networks, they're becoming more exposed to threat actors from around the world. Normally your electrical grid would only be threatened by people that are actually in the country and nearby, but as soon as you connect it to the Internet, you're pretty much opening a lot of this up to people from anywhere. We are not a regulator. The cyber centre itself provides advice, guidance and services, but we have no authority over any of these entities. We work voluntarily to provide the best practices.