Integrating science and technology into security operations
The year 2010 was a demanding period for Canada’s security communities. After years of interagency planning and exercising for the...
Embedded observer: From lesson identified to lesson learned
If learning to adapt to circumstances is one of the most important lessons of warfare, then the Army Lessons Learned...
Inside the network: Refining a cyber security culture
Warfare has always been a case of technological “follow the leader” ever since sharp sticks replaced rocks. Military leaders in...
Recruiting the cyber warrior: The mission is motivation
Like it or not, Canadian governments, law enforcement agencies and armed forces are in the information technology security business. And...
Critical strategy: Infrastructure protection in the cyber domain
Know your enemy. It’s an old cliché, but with the array of teenage basement hackers, organized criminals, non-state terrorists and...
Cyber strategy: Defining roles in a federated model
In October, the federal government launched Canada’s Cyber Security Strategy, bringing together the prior work of federal departments and agencies...
Inside Industry
Searching outside the box The air force may still want the C-27J from Alenia to be Canada’s new fixed-wing search...
SitRep
Advancing health research A soldier or civilian wounded in Afghanistan has a 97 percent chance of surviving if he or...
Recipes for OMLTs
As the Canadian military mission in Afghanistan prepares to transition to a training mission, it is worth asking just what...
Mercenary stability ops – in Canada
Canadians might be surprised to learn of the use of contracted security forces to protect our Provincial Reconstruction Team in...