Search

(2016,
issue 3)
BY TIM LYNCH [field_writer2]

The Royal Canadian Military Institute (RCMI) recently sponsored a conference entitled "Are We Prepared?" April, 2016.

(2016,
issue 3)
BY NICOLA DAVIES [field_writer2]

Are innovations making cities safer as they get smarter? At a recent conference entitled Smart Cities: Shaping the Future, held in the United Kingdom, experts from all over the world shared their stories of how technology is being applied in their cities to create a safer environment.

(2016,
issue 1)
BY GREG RICHARDS, MBA, Ph.D, FCMC [field_writer2]

Some readers might remember the 2002 film Minority Report in which an Orwellian future police force would arrest would-be criminals before they committed their crimes.

(2016,
[field_writer2]

After the body of Inuit artist Annie Pootoogook was found in the Ottawa River, Sgt Chris Hrnchiar of the OPS forensic identification unit made some online remarks that now have him under internal investigation. Still on the job, Hrnchiar could face loss of pay, demotion, suspension or dismissal.

(2016,
[field_writer2]

In October 1986, 15 year old Kerrie Ann Brown of Thompson. Manitoba  was raped and murdered after she left a party. Now, the RCMP is using Twitter to recreate her day in words she might have used, to revive old memories and create new leads.

(2015,
[field_writer2]

(July 2009) This article presents insight to the realistic possibilities of mass Internet surveillance by refuting the common argument is that there is too much traffic to be able to "listen" to all chatter.

(2014,
issue 3)
[field_writer2] BY GREG KUMPARAK

The people who read our site are a pretty savvy lot. You know not to accept checks from distant princes. You can spot a phisher from a mile away. But here’s one that might be new for you: scammers are now trying to exploit your “missed call” screen.


They only let the call ring once before it automatically hangs up.

(2013,
issue 3)
BY JAMES COX [field_writer2]

The formidable array of speakers  included; Stephen Rigby, the National Security Advisor to the Prime Minister; Richard Fadden, the Deputy Minister of National Defence; and Major-General Christian Rousseau, the Chief of Defence Intelligence, and Commander of Canadian Forces Intelligence Command. In addition, panels of eminent practitioners and trainers from the intelligence community provided other expert views.

Interview: Dr Michael Kempa
(2013,
issue 3)
BY CLIVE ADDY [field_writer2]

Dr Michael Kempa is an Associate Professor of Criminology at the University of Ottawa, and a freelance journalist who enjoys diving into the messy reality of the politics and economics of policing and security. Editor Clive Addy talks to him about the current situation of rising costs without the benefit of rising budgets.

(2013,
issue 3)
BY DAVE McMAHON [field_writer2]
Surveillance, Censorship, Intolerance and Violence

Implications for privacy at the Sochi Olympics
Athletes train their entire lives to compete in their sport at the Olympics. But in Sochi, our athletes, their coaches, sports organization representatives, spectators and dignitaries may find themselves competing in a different sort of games… that have already begun (without an opening ceremony).

Editor's Corner
(2013,
issue 2)
BY CLIVE ADDY [field_writer2]

With the minds of the media focussed for the time being on options of the major powers to respond to the use of chemical warfare agents by authorities of the Assad regime in Syria against civilians, where several Middle East terror organizations on both sides are battling for power at the expense of 2 million civilian dead and refugees, it is indeed timely that we offer you some knowledgeable reflections in this issue on anti-terrorism.

(2013,
issue 2)
[field_writer2] BY GABRIEL WEIMANN

Wolves never hunt alone

(2013,
issue 2)
[field_writer2] BY LEAH WEST SHERRIFF

Though it may be cliché to comment on the way wireless technology has changed the modern world, today, mobile devices allow us to express ourselves through social media in real time, help us navigate our daily lives, enable us to bank, trade, buy and sell on the move, and allow us to carry the internet’s unlimited information resources in our back pocket.

(2012,
issue 4)
BY EDWARD R. MYERS [field_writer2]
A Compilation of FrontLine Articles

In the murky world of criminal behaviour and clandestine side deals, there lurks a menace to economic fairness and good government – and this is especially evident in the debate on how to deal with the illicit trade in smokes. Public safety and national security are important social issues that are negatively affected by the prevalence of illicit trade in tobacco in Canada (and the world). The complexity of the contraband tobacco issue has provided much fodder for FrontLine Security’s detailed exposé on the topic over the past year.

(2010,
issue 3)
[field_writer2] By FrontLine Staff

Concerns surrounding children and teens sending sexual messages, nude photos and videos via text messaging is on the rise, yet the vast majority of kids are unaware of the short-term costs and the long-term ramifications associated with their actions. Since adolescents are less inhibited by technology, it’s important they are aware of the risks and know how to deal with situations these new technologies present.

(2010,
issue 2)
[field_writer2] BY STEPHEN I LANDMAN

‘Within three to five years, Al-Qaeda will be utilizing the Internet and mobile phones to centralize their fundraising.’ This sobering assessment from Richard Barrett of the United Nations is a stark reminder of the threat posed by terrorist use of developing technologies – the virtualization of terrorism.

(2010,
issue 1)
[field_writer2] BY HAL NEWMAN

After the earthquake struck Haiti, my colleague, Andrew Fielden, and I worked with our partners at Igloo Software to put a wisdom-sharing community online. We called it The Crisis Kitchen because we believed the best way to share ideas, opinions and pragmatic pearls of wisdom is in a warm and inviting kitchen – real or metaphysical. Thus, I’ve spent the past couple of weeks working as a sous-chef in The Crisis Kitchen.

(2009,
issue 2)
[field_writer2] BY JENNIFER GIROUX

The 21st century has kicked off with a bang and opened the gates to an interconnected world where domestic and international borders are increasingly blurred. The last decade has witnessed the rise of transnational security threats posed by violent non-state actors, pandemics, climate change, ballooning economies, strains placed upon strategic, non-renewable energy resources, and significant technological advancements.

(2009,
issue 1)
BY DAVID GEWIRTZ [field_writer2]

When it comes to social networking, it’s not what you know, or even who you know – it’s who knows you. And that’s pretty much where the trouble starts.

Dr. Ed Amoroso
(2008,
issue 4)
BY CLIVE ADDY [field_writer2]

Dr. Ed Amoroso, AT&T’s Chief Security Officer, with over 20 years in this field, was in Ottawa recently, speaking at a Cyber Security Conference by the ­Conference Board of Canada on Proactive Defence of Critical Systems and Information.

(2008,
issue 1)
BY THOMAS QUIGGIN [field_writer2]

The Network Centric War and Terrorism

(2007,
issue 3)
BY THOMAS QUIGGIN [field_writer2]

Despite the last six years of pressure, Al Qaeda and its inspired followers are still capable of taking the initiative in operations. Recent events in Pakistan, especially in the North West Frontier Province, demonstrate that Al Qaeda is rebuilding its core capabilities. Its highly successful propaganda and recruiting media machine, “As-Sahab,” also continues to function with a high degree of effectiveness.