Forecasting adversarial intent: Unravelling the human dimension
How well can you know your adversary? Can you forecast their intentions? Shape your actions to influence theirs? In 1987,...
2025: Are we prepared for cyber warfare?
In 2007, the highly digital economy of Estonia was almost overwhelmed by days of sustained cyber assaults. In 2008, cyber...
Redefining the network operations warrior
For many of us, cyber warfare is about technology – coordinated systems attacking the computer networks of critical infrastructure, finance,...
Assessing the information tsunami
Canada’s intelligence community has traditionally maintained a low profile in the government decision-making process. And, as professor Wesley Wark has...
Arctic bridge
As Russia prepares to issue a new Northern Policy Concept later this year, Vanguard asked the Russian Embassy to share...
Integrated picture, integrated response
When the National Security Policy was released in 2004, it set in motion a series of initiatives to improve maritime...
Arctic sovereignty under siege: The Prince Patrick Island Incident of 2040
Examination of the future environment is an important practice for institutions that wish to ensure they have the mechanisms and...
SitRep
Inadequate intelligence oversight Though the mandates of organizations such as the Canadian Security Intelligence Service (CSIS) and the Communications Security...
A cut above: Forestry’s niche elements
Most readers know the Battle of the Bulge. Few may know that Canadians were involved in Hitler’s Ardennes offensive. Canadians...