Canadian’s reliance on the internet and the amount of personal data stored there creates data privacy concerns that the government ought to remedy.
The NAOC’s Cyber Security and Emerging Threats Program features an in-depth analysis of latest trends, developments, and threats in international security. New security concerns are always on the horizon and our program seeks to examine these domains including global warming, natural resources, drones, urban conflicts, and cyberspace.
The program’s mandate is to keep Canadians informed on these rapidly developing and increasingly pivotal realms that are integral to all aspects of security.
Although quantum computing offers exciting new ways to predict, compute, and simulate data, their potential ability to decipher passwords make them an emerging threat to the security of individuals and states; the international ‘arms’ race for quantum technology raises questions about how to educate the public about these inventions and regulate them.
In this article, Jordan McEwen highlights the growth of right-wing extremist violence by looking at the Freedom Convoy Protest earlier this year.
Recent multilateral efforts bring international law into cyberspace.
Digital Divide French philosopher Montesquieu noted that only democratic societies require the “whole power” of education, considering despotic regimes depend on propaganda instead of education. Many years later, in 2016, the CRTC (Canadian Radio-television and Telecommunications Commission) dilatorily recognized internet access as a basic Canadian right, a catalyst for innovation, and a crucial element of Read More…
Russia’s invasion of Ukraine has produced and accelerated significant geopolitical shifts that increase the chances of a future military conflict between NATO and non-NATO countries in an international system that was not suffering from a shortage of tensions. Events in Europe continue to unfold very quickly. So far, though, the international response to Russia’s war Read More…
Canada & BGP Hijacking For over a decade (2010, 2018, 2019, 2020), China has quietly shown a pattern of hijacking global data flows by redirecting them through servers located in China, sometimes for minutes, other times for much longer, where the data could be copied onto Chinese Communist Party (CCP) networks and decrypted at leisure. One of the Read More…
The digital front of modern warfare and Great Power conflict increasingly occupies the minds of American and Chinese leaders. In this article, Touraj Riazi looks at the infrastructure that undergirds the digital world and how vital it is to the Chinese and American quest for “Network Hegemony.”
What is Zero Trust in cybersecurity, and what are the reasons for the Biden administration’s push towards a Zero Trust architecture? In this article, Bryan Roh explains some of the reasons why the Zero Trust security model is gaining momentum in both the public and private sectors.
Signs of democratic backsliding in former communist countries in Europe have raised concern within the continent and beyond. In this second article of a three-part series on democratic backsliding, Tea Vasha explores how the justice system reform and other policy implementations in Hungary have contributed to undemocratic shifts.