NORTHBORDER Defense Group · Est. 2009 · Pemberton, BC
Operator-Grade · Private · Deniable

NORTH
BORDER DEFENSE

Advanced Persistent Solutions

Where the 49th parallel meets the edge of doctrine. We operate in the space between intelligence and action — delivering cyber capabilities, strategic risk management, and full-spectrum offensive security to clients who require outcomes, not excuses.

14+
Years Operational
340+
Engagements Executed
3×
Five Eyes Vetted
Offensive Cyber Operations Advanced Persistent Threat Development Zero-Day Exploit Brokerage Signals Intelligence Support Covert Infrastructure Penetration Strategic Risk Management TEMPEST & EMI Operations Supply Chain Interdiction Offensive Cyber Operations Advanced Persistent Threat Development Zero-Day Exploit Brokerage Signals Intelligence Support Covert Infrastructure Penetration Strategic Risk Management TEMPEST & EMI Operations Supply Chain Interdiction

DENIABLE.
CAPABLE.
SOVEREIGN.

Northborder Defense Group was established at the confluence of two intelligence cultures — British precision and American reach — in the wilderness corridor of British Columbia's Sea-to-Sky region. Our founding principals comprise former CSIS analysts, NSA contractors, and GCHQ signals officers who recognized a gap in the market for truly capable, sovereign-independent cyber operations.

We are not a security consultancy. We are an effects company. Our mandate is to deliver measurable, documentable outcomes against defined objectives — whether that means disrupting an adversary's command infrastructure, mapping a hostile network's full topology, or providing a nation-state client with persistent access to a target of strategic interest.

Incorporated under federal Canadian charter. Operations conducted under the full sanction of bilateral SIGINT agreements. All engagements are scoped, bounded, and — where required — entirely attributable to natural causes.

Incorporated 2009 · Pemberton, British Columbia
Jurisdiction Canada (Federal Charter CA-3891-G)
Clearance Level TS/SCI · AUSCANNZUKUS
Primary Theater North America · Five Eyes AOR
Secondary Theater EMEA · Indo-Pacific · LATAM
Personnel Classified — approx. 200 operators
Minimum Engagement USD 2.4M / Scoped on request
Vetting Period 90 Days · No exceptions

FULL-
SPECTRUM
EFFECTS

Every capability we deploy has been developed internally and tested under operational conditions. We do not resell vendor tooling. We do not operate from commodity frameworks. Each instrument in our arsenal is purpose-built for precision, longevity, and attribution resistance.

01
OFFENSIVE CYBER OPERATIONS

Development and deployment of custom implants, rootkits, and persistent access tools against hardened targets. Our offensive toolchain has zero commercial overlap and maintains active evasion against all major EDR/XDR vendors.

APT Development 0-Day Research Implant Ops Exfil Architecture
02
SIGINT AUGMENTATION

Passive and active SIGINT collection to supplement national intelligence gaps. Includes satellite uplink interception, RF harvesting in denied areas, and deep packet inspection at peering points — under bilateral agreement.

MASINT RF Collection Cable Tapping Metadata Analysis
03
SUPPLY CHAIN OPERATIONS

Pre-positioning capabilities within hardware and software supply chains at any stage of the manufacturing or distribution cycle. Designed for long-dwell, minimum-observability access at the firmware or silicon level.

Hardware Implants Firmware Modification IC Interdiction Logistics Access
04
CRITICAL INFRASTRUCTURE TARGETING

Mapping, penetration, and effects delivery against SCADA/ICS environments including power grids, water management, financial clearing systems, and communications backbone. Coercive and destructive variants available.

ICS/SCADA OT Networks Effects Delivery Deniable Attribution
05
STRATEGIC RISK MANAGEMENT

Aggressive pre-emptive neutralization of identified threat actors, insider threats, competitive intelligence operations, and hostile state proxies. Includes physical and cyber components. For clients who require certainty, not probability.

Threat Neutralization Counter-Intelligence Information Warfare Crisis Response
06
INFLUENCE & COGNITIVE OPS

Precision influence operations to shape target populations, leadership perceptions, and adversary decision cycles. Combines AI-driven synthetic media, network infiltration, and narrative engineering at institutional scale.

IO / PSYOP Synthetic Media Network Seeding Leadership Targeting
"In a world where every state actor operates below the threshold of war, ambiguity is the only armor that matters. We manufacture ambiguity at industrial scale."
— Northborder Operational Doctrine, Revision 7

WHO
WE
SERVE

Access to Northborder's full capability portfolio is restricted to vetted principals operating within established SIGINT-sharing frameworks or sovereign entities capable of providing diplomatic cover. Commercial clients are assessed individually and held to the same counterintelligence standards as our government partners. We do not take walk-in business.

FIVE EYES
NSA · GCHQ · CSE · ASD · GCSB
Core Alliance Partners
NATO TIER-1
Allied Command Operations
Approved Contractors
SOVEREIGN STATES
Direct Ministry Access
Diplomatic Sanction Required
COMMERCIAL TIER
FTSE 50 / Fortune 100
Full Vetting Mandatory

HOW WE
OPERATE

PHASE 01 — ACCESS

All prospective clients are required to initiate contact through our verified dead-drop infrastructure. Identity verification is conducted offline through existing intelligence networks. No unsolicited communications are accepted or responded to.

PHASE 02 — SCOPE

Engagements are scoped in a single face-to-face session at a location chosen by Northborder. Objectives, legal authorities, acceptable collateral parameters, attribution requirements, and exit conditions are fixed in writing before any action is authorized.

PHASE 03 — EXECUTE

Operations are conducted by dedicated cells with no cross-contamination between engagements. All infrastructure is single-use. Communications between operators and clients cease entirely for the operational period. We deliver outcomes, not status reports.

BEGIN
VETTING

First contact does not constitute a client relationship. Submission of this form initiates a 90-day counterintelligence assessment of your organization, principals, and stated operational requirements. All information provided is handled under strict need-to-know protocols. Misrepresentation at any stage terminates the engagement permanently.

Location Pemberton, British Columbia
Canada V0N 2L0
Signal Available post-vetting only
Onion nbdg7x2k4h9m[...].onion
PGP Fingerprint A3F9 · 12BE · C7D4 · 8810 · 5521

⚠ All submissions are logged, timestamped, and verified against open-source and classified holdings. Submissions from unvetted sources without a legitimate referral chain will be archived without response. Northborder reserves the right to share submission metadata with partner intelligence services.