item: #1 of 251 id: jicw-1055 author: CASIS-Vancouver title: Identitarianism and its Link to Identity Evropa date: 2021-12-27 words: 1863 flesch: 47 summary: NEXT STEPS • Counter-movements have already sprung up and will oppose IE and the identitarian movement. PURPOSE STATEMENT Identity Evropa (IE) and the Identitarian movement represent a growing white supremacist movement in North America. keywords: conflict; identitarian; intelligence; movement cache: jicw-1055.pdf plain text: jicw-1055.txt item: #2 of 251 id: jicw-1056 author: CASIS-Vancouver title: Violence in Hong Kong: Criminal, Political or the Work of a VTSM? date: 2021-12-27 words: 2123 flesch: 39 summary: Hong Kong police to launch raids on white-clad thugs, including members of 14K and Wo Shing Wo triad gangs, who unleashed terror on protesters and bystanders in Yuen Long. Hong Kong police criticized over failure to stop attacks on protesters. keywords: hong; https://www.cbc.ca/news/world/hong-kong-subway-train-attack-1.5219915; kong; police; protesters; triad cache: jicw-1056.pdf plain text: jicw-1056.txt item: #3 of 251 id: jicw-1057 author: CASIS-Vancouver title: The Anti-Women Movement: Incels, Misogyny and the Threat to the West Coast date: 2021-12-27 words: 3428 flesch: 48 summary: The legitimacy of Dr. Farrell and Peterson’s views raises the issue of recognised academic perspectives being weaponized by members of incel groups or those who are on the periphery and are vulnerable to radicalisation. Recommendation 2: Conduct Dark Web surveillance to better understand the scope of the incel presence, as well as to potentially monitor any communications made by incel groups active on the Dark Web, which may provide some possible warning signs of an upcoming attack. keywords: conflict; incel; intelligence; movement; vancouver; violence; warfare; women cache: jicw-1057.pdf plain text: jicw-1057.txt item: #4 of 251 id: jicw-1058 author: CASIS-Vancouver title: Weaponized Misinformation A.K.A. #FakeNews date: 2021-12-27 words: 1860 flesch: 37 summary: Developing a comprehensive database to track and understand potential threat actors and their use of fake news can potentially provide actionable intel, thereby exposing and publicly challenging fake news items. Fake news has been used to negatively influence the reputation of government officials and to incite violence between ethnic groups. keywords: http://creativecommons.org/licenses/by-nc-nd/4.0/; media; misinformation; news; warfare cache: jicw-1058.pdf plain text: jicw-1058.txt item: #5 of 251 id: jicw-1059 author: CASIS-Vancouver title: Right-Wing Extremism Elements in the Canadian Armed Forces date: 2021-12-27 words: 2083 flesch: 42 summary: The possible presence of RWE in CAF has the potential to be a serious national security threat, due to the potential for CAF members using their combat experience and weapons training to carry out violent attacks against Canadians, acting as part of a Violent Transnational Social Movement (VTSM). For example, CAF members operating Fireforce Ventures were originally found to not be violating the CAF code of conduct. keywords: caf; conflict; intelligence; members; rwe cache: jicw-1059.pdf plain text: jicw-1059.txt item: #6 of 251 id: jicw-1060 author: Meyers, Sarah title: Is There a Gap in Canada’s Hate Crime Laws? The Identification of Soft Violence as a Tool for Current Right-Wing Extremist date: 2021-12-27 words: 5279 flesch: 49 summary: In order to properly distinguish any potential gaps in the law, this paper first provides a short history Sarah Meyers 2 The Journal of Intelligence, Conflict, and Warfare Volume 2, Issue 2 of hate crime law, followed by its strengths and weaknesses in the Canadian context. One aspect that has not changed is the presence of hate crime in the locations where RWE actors or sentiments are prevalent. keywords: canada; crime; hate; hate crime; kelshall; meyers; rwe; violence; warfare cache: jicw-1060.pdf plain text: jicw-1060.txt item: #7 of 251 id: jicw-1061 author: Patel, Asmaa title: Fifth-Generation Warfare and the Definitions of Peace date: 2021-12-27 words: 5220 flesch: 46 summary: Consequently, as the world moves towards an age of conflict that is perpetuated by soft violence and encompasses group versus group conflict, traditional notions of peacebuilding do not allow for peace zones to be created within conflict prone areas. While this form of warfare may encompass group vs group conflict, the state is still identified as a key actor for inciting violence amongst groups. keywords: conflict; generation; generation warfare; groups; peace; peacebuilding; violence; warfare cache: jicw-1061.pdf plain text: jicw-1061.txt item: #8 of 251 id: jicw-1062 author: Paktian, Faisal title: Handling the Iraqi Popular Mobilisation Forces In The Post-Islamic State Iraq date: 2021-12-27 words: 6587 flesch: 39 summary: Focusing only on Iraq and not Syria, it is visible that vast amounts of territory in Northern Iraq is actually under Kurdish control (highlighted in yellow) rather than the Iraqi government’s control (highlighted in red). Some of PMF militias were accused of such misconduct after the liberation of Tikrit in 2015 (Raineri, 2015). keywords: conflict; ddr; government; intelligence; iraq; isis; militias; pmf; state; threat; warfare cache: jicw-1062.pdf plain text: jicw-1062.txt item: #9 of 251 id: jicw-1063 author: CASIS-Vancouver title: Water Security as an Emergent Opportunity in Canada date: 2021-12-27 words: 1492 flesch: 38 summary: Due to the increased risk of water security threats, international institutions have collectively increased their attention to water security. Additionally, discussion centered around the policy implications of water security for indigenous communities and the possibility of triggering a collective consciousness for water issues. keywords: canada; security; threats; water cache: jicw-1063.pdf plain text: jicw-1063.txt item: #10 of 251 id: jicw-1064 author: CASIS-Vancouver title: Why is Canada Involved in Mali? date: 2021-12-27 words: 3228 flesch: 39 summary: In his presentation, Dr. Akuffo details the background context leading up to the Mali conflict, a summary of the Canadian African relations preceding Canada’s involvement in Mali, and the motivations and effects of Canada’s response through OP MINUSMA today. Shifting from the background of the conflict, Dr. Akuffo recounted the timeline of Canada’s engagement with OP MINUSMA through the Harper and Trudeau administrations. keywords: akuffo; canada; conflict; mali; peacekeeping; security cache: jicw-1064.pdf plain text: jicw-1064.txt item: #11 of 251 id: jicw-1065 author: CASIS-Vancouver title: Hate Speech In Canada: A New Democratic Threat Requiring Policy Incentives date: 2021-12-27 words: 2512 flesch: 40 summary: She later cited notable international examples aimed toward the effective reduction of hate speech, as well as holding social media corporations responsible for content regulation on their respective platforms. The roundtable discussion that followed examined the consequences of amending Canadian Charter rights to better address hate speech and the possibility that a myopic legal focus on hate speech may inspire individuals to join right-wing extremist (RWE) groups. keywords: hate; media; online; speech; tworek cache: jicw-1065.pdf plain text: jicw-1065.txt item: #12 of 251 id: jicw-1066 author: CASIS-Vancouver title: Understanding Terrorism Through the Fear of Death date: 2021-12-27 words: 2455 flesch: 41 summary: Dr. Farkasch seemed to stress CASIS-Vancouver 124 The Journal of Intelligence, Conflict, and Warfare Volume 2, Issue 2 that the current global wave of religious inspired terrorism is inherently rooted in the dread of mortality, such that this fear drives the desire to engage in perceived heroic acts. Extremist religious groups, committed to a faith-based doctrine, compel people to use violence and tend to share an unwillingness to compromise given that they are defending their identity and dignity. keywords: farkasch; groups; terrorism; violence cache: jicw-1066.pdf plain text: jicw-1066.txt item: #13 of 251 id: jicw-1067 author: CASIS-Vancouver title: CETA and Preserving Digital Society date: 2021-12-27 words: 1345 flesch: 42 summary: The purpose of the event was to discuss the Comprehensive Economic and Trade Agreement (CETA) between the EU and Canada in the context of preserving digital civil society. The preservation of digital civil society between Canada and the EU; 2. keywords: canada; ceta; trade cache: jicw-1067.pdf plain text: jicw-1067.txt item: #14 of 251 id: jicw-1183 author: Arnold, Jordan title: Predicting Escalation: Protecting Analysts Progress Report date: 2021-12-26 words: 2861 flesch: 48 summary: Dill & Brockmyer (2012) measured short term and long term psychophysiological and behavioural effects of exposure to media violence (p. 3-8). In both women and men, there was a link between greater habitual exposure to media violence and greater pleasant arousal as opposed to anxious arousal (Krahé, 2011, p. 21). keywords: conflict; effects; exposure; journal; media; violence cache: jicw-1183.pdf plain text: jicw-1183.txt item: #15 of 251 id: jicw-1184 author: Neal, Patrick title: The Dark Age of Online Civil Society : (AKA: A war of 1) date: 2021-12-26 words: 1189 flesch: 25 summary: The second perspective involves embracing online cyber deterrence at the citizen level in order to build out models of online cyber deterrence which can be used to promote and protect online civil society participants (citizens and consumers). Furthermore, what is not known is the ability to effectively measure the impact of online deterrence. keywords: cyber; deterrence; https://www.cnbc.com/2017/02/01/consumers-lost-more-than-16b-to-fraud-and-identity-theft-last-year.html https://www.cnbc.com/2017/02/01/consumers-lost-more-than-16b-to-fraud-and-identity-theft-last-year.html; society cache: jicw-1184.pdf plain text: jicw-1184.txt item: #16 of 251 id: jicw-1186 author: Richards, Julian title: Extremism and Intelligence: A Threat Analysis date: 2021-12-26 words: 4615 flesch: 42 summary: While such attacks have thankfully remained relatively rare, a hinterland of extreme- right ideology and mobilisation involving a bewildering range of organisations is causing considerable concern to Western security officials. Alongside such threats on the right and left must be added a perplexing array of loosely associated threats, which are as complex as they are unpredictable. keywords: conflict; groups; intelligence; issue; journal; new; richards; right; security; threats; warfare cache: jicw-1186.pdf plain text: jicw-1186.txt item: #17 of 251 id: jicw-1187 author: CASIS-Vancouver title: The Conflation of Organized Crime and Terrorism in Venezuela date: 2021-12-26 words: 1012 flesch: 47 summary: Terrorist groups benefit from illegal economies, meanwhile, organized crime groups adopt terrorist methods to achieve their goals. Venezuela has become a safe haven and centre of operations for violent non-state actors, organized crime groups, and terrorist organizations. keywords: actors; crime cache: jicw-1187.pdf plain text: jicw-1187.txt item: #18 of 251 id: jicw-1188 author: CASIS-Vancouver title: Big Data and the Fight Against Extremism date: 2021-12-26 words: 849 flesch: 45 summary: BACKGROUND Presentation Dr. Popowich studies NLP, a branch of artificial intelligence which assists computers in understanding, interpreting, and manipulating human language; BIG DATA AND THE FIGHT AGAINST EXTREMISM Date: November 22, 2019 Disclaimer: NATURE OF DISCUSSION Presentation Dr. Popowich began by defining big data as the ‘Vs’: velocity, volume, variety, veracity, visualization, and value—big data can be considered as data too vast for human analysis alone, thus requiring the assistance of Artificial Intelligence (AI). keywords: data; nlp cache: jicw-1188.pdf plain text: jicw-1188.txt item: #19 of 251 id: jicw-1189 author: CASIS-Vancouver title: Path to Violence date: 2021-12-26 words: 992 flesch: 42 summary: • Application of Path to Violence to Butt shows how it could have helped highlight opportunities for intervention and need for more resources in response to his escalation into the 2017 London Bridge Attack • Path to Violence for groups is not as accurate as it is for individuals Question Period • SATs are useful supplementary tools for detecting and predicting threats • Community engagement is a key element to addressing extremism • Evidence-based research on effective community engagement will be invaluable in light of current reliance on anecdotal evidence • Joint programs between interest groups should work together to address extremism CASIS-Vancouver 46 The Journal of Intelligence, Conflict, and Warfare Volume 2, Issue 3 The Joint Intelligence Group, in response to protests against the Vancouver 2010 Olympics, had developed the Path to Violence to help categorize and predict violence escalation of threat actors. keywords: intelligence; path; violence cache: jicw-1189.pdf plain text: jicw-1189.txt item: #20 of 251 id: jicw-1190 author: CASIS-Vancouver title: Illicit Drugs & the Impact of Canadian Organized Crime Groups date: 2022-02-19 words: 733 flesch: 52 summary: Currently, the buying and selling of drugs is the number one source of income for these groups; this was further amplified when organized crime groups started using the dark web to create new, discreet transactions of drugs. While cocaine has been a popular commodity within organized crime groups, trends have changed to where drugs such as fentanyl have become dominant in the sphere of crime • keywords: crime; drugs cache: jicw-1190.pdf plain text: jicw-1190.txt item: #21 of 251 id: jicw-2357 author: CASIS-Vancouver title: Data Analytics and Security Policy: The New Paradigm? date: 2021-10-31 words: 1344 flesch: 43 summary: Mr. Masongsong’s presentation focused on the development of data analytics technology, its utility in addressing recent security cases, and the projected future of the data analytics industry. NATURE OF DISCUSSION Presentation The emergence of data analytics technology is resulting in new tools, policies, and opportunities for security practitioners. keywords: analytics; data; security; technology cache: jicw-2357.pdf plain text: jicw-2357.txt item: #22 of 251 id: jicw-2358 author: CASIS-Vancouver title: The Security Implications of Brexit date: 2021-10-31 words: 1186 flesch: 47 summary: Unconfined by EU standards, the UK is now able to push forward with achieving universal human rights abroad with increased sanction measures. This presentation featured British Consul General Nicole Davison as speaker, and a case study focusing on the potential implications of the “Wexit” separatist movement on the West Coast of Canada. NATURE OF DISCUSSION Presentation With the United Kingdom (UK) having left the European Union (EU) on January 31st, 2020, new challenges and opportunities are emerging for the UK. keywords: canada cache: jicw-2358.pdf plain text: jicw-2358.txt item: #23 of 251 id: jicw-2359 author: Shanti, Davina title: A New State of Organized Crime: An Analysis of Cybercrime Networks, Activities, and Emerging Threats date: 2021-10-31 words: 3633 flesch: 48 summary: As shown in Table 1 (see below), the types of illicit activities conducted by organized cybercrime groups tend to be unique to operating in an online space, and arguably, are more complex than activities associated with traditional organized crime groups. This paper concludes that cybercrime groups are structured and operate similarly to traditional organized crime groups and should, therefore, be classified as a part of traditional organized crime; however, cybercrime groups are capable of conducting illicit activities that surpass those typically associated with traditional organized crime. keywords: activities; crime; cybercrime; groups cache: jicw-2359.pdf plain text: jicw-2359.txt item: #24 of 251 id: jicw-2360 author: Al-Rawi, Ahmed title: Kekistanis and the Meme War on Social Media date: 2021-10-31 words: 4161 flesch: 39 summary: If the alt- right has accomplished anything besides normalizing “ironic” expressions of intolerance and hate, it would be in their innovative infusion and deployment of political memes to various fan cultures. Meme wars: The creative destruction of neoclassical economics. keywords: alt; https://www.cnbc.com/2018/09/14/alex-jones-5-most-disturbing-ridiculous-conspiracy-theories.html; https://www.splcenter.org/hatewatch/2017/05/08/what-kek-explaining-alt-right-deity-behind-their-meme-magic; https://www.theguardian.com/technology/shortcuts/2016/jun/12/echoes-beating-the-far-right-two-triple-brackets-at-a-time; https://www.theguardian.com/technology/shortcuts/2016/jun/12/echoes-beating-the-far-right-two-triple-brackets-at-a-time https://www.theguardian.com/technology/shortcuts/2016/jun/12/echoes-beating-the-far-right-two-triple-brackets-at-a-time; media; memes; online; right; warfare cache: jicw-2360.pdf plain text: jicw-2360.txt item: #25 of 251 id: jicw-2361 author: Martin, Jenni title: Eliminate Hate: Hate Crimes and Hate Speech in Canada date: 2021-10-31 words: 5418 flesch: 18 summary: In the United States, hate speech is protected under freedom of speech, however, almost every state has enacted a form of hate crime law. Moreover, additional research determining causal linkages between hate speech and serious violent incidents of hate crimes would better solidify the need to address hate speech more seriously. keywords: canada; crime; groups; hate; hate speech; https://eds.b.ebscohost.com/eds/detail/detail?vid=1&sid=0783150e-433d-490e-9372-d5b973846334%40pdc-v-sessmgr06&bdata=jnnpdgu9zwrzlwxpdmu%3d#an=edsgcl.581366527&db=edsggo; https://nationalpost.com/news/politics/liberals-inching-closer-to-reviving-section-13-the-controversial-hate-speech-law-repealed-in-2013; https://nationalpost.com/news/politics/liberals-inching-closer-to-reviving-section-13-the-controversial-hate-speech-law-repealed-in-2013 https://nationalpost.com/news/politics/liberals-inching-closer-to-reviving-section-13-the-controversial-hate-speech-law-repealed-in-2013; speech cache: jicw-2361.pdf plain text: jicw-2361.txt item: #26 of 251 id: jicw-2362 author: CASIS-Vancouver title: Black Hebrew Israelites : From Soft Violence to Non-Kinetic Action date: 2021-10-31 words: 3183 flesch: 53 summary: In January 2019, BHI activists gathered on the Lincoln Memorial in Washington, D.C. Many BHI members see white people as almost subhuman, consequently dividing groups and leaving the potential to clash with other groups who may believe that their race is superior to others (Turner & Slick, 2019, para. 9–11). keywords: bhi; casis; city; conflict; intelligence; israelites; violence; warfare cache: jicw-2362.pdf plain text: jicw-2362.txt item: #27 of 251 id: jicw-2373 author: Tung, Gurpreet title: The Potential Threat of the Sinaloa Cartel to Canada : Production and Transportation of Fentanyl date: 2020-11-22 words: 2242 flesch: 12 summary: Tung G. 43 The Journal of Intelligence, Conflict, and Warfare Volume 3, Issue 2 Alternative Perspectives to be Considered • Is illicit fentanyl the only cause of the opioid crisis in Canada? Accessibility to fentanyl is becoming easier with online purchases and delivery services, such as Canada Post (Brownell, 2019; Howlett & Woo, n.d.). keywords: canada; fentanyl; https://vancouversun.com/news/local-news/most-overdose-deaths-ever-in-b-c-for-second-consecutive-month; https://vancouversun.com/news/local-news/most-overdose-deaths-ever-in-b-c-for-second-consecutive-month https://vancouversun.com/news/local-news/most-overdose-deaths-ever-in-b-c-for-second-consecutive-month; vice cache: jicw-2373.pdf plain text: jicw-2373.txt item: #28 of 251 id: jicw-2374 author: Padda, Karmvir title: Fake News on Twitter in 2016 U.S. Presidential Election: A Quantitative Approach date: 2020-11-22 words: 7516 flesch: 56 summary: Lastly, cluster analysis revealed that fake news tweets are more likely to be retweeted and use less analytical thinking. The current study measured fake news tweets that were posted by the Russian troll accounts to influence the 2016 U.S. presidential election. keywords: accounts; agenda; conflict; election; et al; intelligence; journal; media; news; padda; tweets; u.s; warfare cache: jicw-2374.pdf plain text: jicw-2374.txt item: #29 of 251 id: jicw-2378 author: Makosso, Amanda M. title: United Nations Peacekeeping Operations in the era of COVID-19 date: 2020-11-22 words: 4359 flesch: 34 summary: Consequently, the United Nations’ (UN) Department of Peacekeeping Operations (DPKO) emphasizes that the three essential factors of successful peace operations are legitimacy, credibility and local ownership: The experiences of the past 15 years have shown that in order to succeed, United Nations peacekeeping operations must also be perceived as legitimate and credible, particularly in the eyes of the local population … The manner in which a United Nations peacekeeping operation conducts Makosso A. M. 32 The Journal of Intelligence, Conflict, and Warfare Volume 3, Issue 2 itself may have a profound impact on its perceived legitimacy on the ground (UN DPKO, 2008, p. 36). UN peacekeeping missions have indeed incorporated a holistic approach to civilian protection by not only ensuring the physical protection of local communities from any threat of violence but also by pursuing dialogue and engagement with communities (Di Razza, 2020, para. 10). keywords: civilians; conflict; covid-19; nations; operations; peacekeepers; peacekeeping; protection; security; united; women cache: jicw-2378.pdf plain text: jicw-2378.txt item: #30 of 251 id: jicw-2407 author: CASIS-Vancouver title: Privacy and Security: Working Hand in Hand to Protect You Online date: 2020-11-22 words: 1034 flesch: 51 summary: Dr. Neal’s presentation focused on the cohesiveness of privacy and security in the near future, privacy constructs, myths and harms of privacy, and privacy enhancing technologies. Question Period Other suggestions for citizen protection against privacy breaches were discussed: • keywords: intelligence; privacy; security cache: jicw-2407.pdf plain text: jicw-2407.txt item: #31 of 251 id: jicw-2408 author: CASIS-Vancouver title: COVID-19: China's Foreign Policy in the South China Sea date: 2020-11-22 words: 1977 flesch: 59 summary: It can also be a means to see what China is doing in the SCS and how that extrapolates to other regions. NATURE OF DISCUSSION Presentation The SCS is an important factor that helps explain China’s aggressive foreign policy, which also has implications for Canada and the West Coast, such as an escalation of trade disputes. keywords: china; disputes; region; scs cache: jicw-2408.pdf plain text: jicw-2408.txt item: #32 of 251 id: jicw-2409 author: CASIS-Vancouver title: The Protective Power of Behavioural Threat Assessment (& Management) (BTAM) date: 2020-11-22 words: 1614 flesch: 43 summary: CASIS Vancouver 65 The Journal of Intelligence, Conflict, and Warfare Volume 3, Issue 2 it may be in everybody’s interest to learn the process for threat assessment and management in order to better prepare for threatening situations and/or persons at all levels, while keeping in mind threat enhancers and the implications that might ensue because of them. In addition to threat assessment, threat management is the next step after threat assessment. keywords: assessment; concern; threat cache: jicw-2409.pdf plain text: jicw-2409.txt item: #33 of 251 id: jicw-2410 author: CASIS-Vancouver title: Decoded Launch Roundtable date: 2020-11-22 words: 623 flesch: 42 summary: KEY EVENTS During the Decoded Launch Roundtable, presenters Candyce Kelshall and Natalie Archutowski discussed the reasoning and methods behind creating DECODED: Understanding the Post-COVID-19 Security Landscape Using Structured Models, Approaches, and Analytic Techniques. NATURE OF DISCUSSION Presentation The COVID-19 pandemic has created a ‘new normal’ which requires tools such as Structured Analytical Techniques (SATs) and Structured Models and Analytical Techniques (SMATs) to gain a comprehensive and nuanced understanding of how we might adapt to this new social, economic and political landscape. In order to navigate the ‘new normal’, the public must use critical thinking and maintain social cohesion. keywords: covid-19 cache: jicw-2410.pdf plain text: jicw-2410.txt item: #34 of 251 id: jicw-2411 author: CASIS-Vancouver title: Intrastate Warfare date: 2020-11-22 words: 1463 flesch: 53 summary: He described two types of war, interstate and intrastate, mentioning trends in intrastate war and the contrast to interstate war, as well as the consequences to life expectancy and infrastructure in the regions affected by intrastate wars. Data utilized in the presentation showed an increasing trend in the number of intrastate wars. keywords: conflict; intrastate; wars cache: jicw-2411.pdf plain text: jicw-2411.txt item: #35 of 251 id: jicw-2495 author: Johnson, Loch K. title: The Spy Power, Technological Innovations, and the Human Dimensions of Intelligence: Recent Presidential Abuse of America’s Secret Agencies date: 2021-01-31 words: 8296 flesch: 39 summary: Trump is said to set aside intelligence career intelligence briefer to hear from advisers instead. Not until 1975 did investigators on the Church Committee (led by Frank Church, D, Idaho) persuasively argued in the Senate, in the wake of a domestic spy scandal in the United States, that intelligence agencies should be “brought in from the cold” (a British intelligence expression meaning, in this instance, to make the spy agencies more acceptable in a democratic society by insisting that they conduct themselves within the law and honor moral guardrails) (Johnson, 1985). keywords: agencies; cia; committee; conflict; house; intelligence; johnson; journal; loch; national; new; power; president; spy; states; trump; united; warfare; white; york cache: jicw-2495.pdf plain text: jicw-2495.txt item: #36 of 251 id: jicw-2516 author: Dalip, Andrew title: Intelligence and Corruption date: 2021-01-31 words: 7548 flesch: 38 summary: Foreign intelligence services have an anti-corruption role at the strategic level through Intelligence Risk Assessments and at the operational level during post- conflict operations. The roles of security intelligence and foreign intelligence services are, however, no longer always discrete, particularly in the context of non-state actors. keywords: andrew; conflict; corruption; countries; country; dalip; fatf; information; intelligence; international; journal; military; page; security; states; warfare cache: jicw-2516.pdf plain text: jicw-2516.txt item: #37 of 251 id: jicw-2517 author: Richards , Julian title: Extremist Propaganda and the "Politics of the Internet" date: 2021-01-31 words: 4860 flesch: 46 summary: Although much debated, Marc Sageman’s “leaderless jihad” thesis, published in 2008, characterised how such groups had very effectively recognised and capitalised upon the notion of a dispersed and decentralised method of radical and extreme communication to drive diverse attacks around the globe (Sageman, 2008). Again, this suggests a smaller effect of such information on political opinion than is sometimes supposed, especially when it is placed within the context of the broad information landscape to which we are all irretrievably exposed in the contemporary environment. keywords: conflict; effect; intelligence; internet; journal; media; movements; power; richards; state cache: jicw-2517.pdf plain text: jicw-2517.txt item: #38 of 251 id: jicw-2529 author: Virk, Vincent title: Leading in a Data Centric Society date: 2021-02-12 words: 1007 flesch: 43 summary: Key points of discussion included: quality of data, the forms of bias, the gaps in data, verifying the data that one comes across, and finally, the limits of data in the context of leadership. Question Period During the question period, the discussion focused primarily on the benefits of data as a tool to promote interagency collaboration and share unique perspectives. keywords: bias; data; quality cache: jicw-2529.pdf plain text: jicw-2529.txt item: #39 of 251 id: jicw-2530 author: Masongsong, Mark title: Data Analytics and Public Safety date: 2021-02-12 words: 1231 flesch: 44 summary: The question period focused on issues of corporate data security, data governance, and concerns surrounding privacy and the ethical use of data. Machine learning is a more advanced subsection of artificial intelligence that relies on patterns of data. keywords: data; intelligence; masongsong; security cache: jicw-2530.pdf plain text: jicw-2530.txt item: #40 of 251 id: jicw-2539 author: Moskalenko, Sophia title: Radicalization in the Age of Social Media: Mass Identity Manipulations (MIMs) date: 2021-02-17 words: 880 flesch: 46 summary: NATURE OF DISCUSSION Presentation Dr. Moskalenko introduced the concept of MIMs as a possible contributor in mass radicalization and/or de-radicalization through the use of social media. Mass radicalization is not a new concept, but the accessibility of social media and its global platform have created a new dynamic of mass radicalization. keywords: mass; radicalization cache: jicw-2539.pdf plain text: jicw-2539.txt item: #41 of 251 id: jicw-2565 author: Vu, Duong title: Leveraging Big Data to Detect Amenity Gaps to Improve Public Safety date: 2021-02-23 words: 882 flesch: 43 summary: According to Duong Vu, an essential source for analyzing amenity gaps is big data that can be obtained from many different sources, and the most commonly used one is open source intelligence data (OSINT), which provides contextual information that most amenity gaps projects will need. • Detecting amenity gaps might aid in drafting long-term policies and solutions that could be used to improve public safety in the community. keywords: amenity; data; gaps cache: jicw-2565.pdf plain text: jicw-2565.txt item: #42 of 251 id: jicw-2566 author: Pili, Giangiuseppe title: Why HAL 9000 is not the future of intelligence analysis: Intelligence analysis in the 21st century date: 2021-05-31 words: 8627 flesch: 50 summary: While intelligence analysis is still a necessary tool for decision-makers, it is unclear who or what will perform this function in the future. Multinational companies invested in new technologies anticipating that the state of security intelligence would want to develop an intelligence capability to perform intelligence analysis. keywords: analysts; conflict; esms; future; giangiuseppe; human; information; intelligence; intelligence analysis; journal; machines; need; pili; process; warfare cache: jicw-2566.pdf plain text: jicw-2566.txt item: #43 of 251 id: jicw-2574 author: Bynoe, Chloe title: What Security Means to Me date: 2021-02-28 words: 680 flesch: 42 summary: • Gen Zs believe racial, gender, and LGBTQ+ injustice and discrimination are still prevalent issues, and individuals should be permitted to freely discover and express themselves. Ms. Bynoe also presented on the online environment and the pressures of conformity and offline social interactions. keywords: bynoe; security cache: jicw-2574.pdf plain text: jicw-2574.txt item: #44 of 251 id: jicw-2575 author: Palmer, Adam title: Artificial Intelligence and Police Decision Making Processes date: 2021-02-28 words: 759 flesch: 36 summary: NATURE OF DISCUSSION Presentation The speaker focused on the increased capabilities police forces have as a result of incorporating better business analytics, data sharing, and geospatial technology into policing. The increased efficiencies have led to more predictive policing initiatives, leading to a dramatic drop in residential break and enter crimes. keywords: data; policing; vpd cache: jicw-2575.pdf plain text: jicw-2575.txt item: #45 of 251 id: jicw-2580 author: Gratton, Phil title: Intelligence Challenges of the Data Rich World date: 2021-03-01 words: 1192 flesch: 41 summary: At CSIS, this means a more robust and sophisticated ability to analyze data in support of the operations to corroborate human and technical sources, to further identify individuals of interest and to generate new investigative leads. To assist analysts in their incorporation of data to their HUMINT expertise, CSIS relies upon a process that speaks to Canadian legislation, structures, and the established practices that are in place to assign authorities to find, decide, deliver, monitor, and report. keywords: csis; data; intelligence cache: jicw-2580.pdf plain text: jicw-2580.txt item: #46 of 251 id: jicw-2581 author: Sanchez Ortega, Antonio title: EU PROPHETS project on policing tools for terrorism date: 2021-03-01 words: 657 flesch: 33 summary: Antonio Sanchez Ortega Page 82 The Journal of Intelligence, Conflict, and Warfare • Tools and toolkits will be developed from PROPHETS research for use by law enforcement and government agencies. EU PROPHETS PROJECT ON POLICING TOOLS FOR TERRORISM Date: November 26th, 2020 keywords: information; prophets cache: jicw-2581.pdf plain text: jicw-2581.txt item: #47 of 251 id: jicw-2748 author: Adams Unger, Granite title: Red Scare Three: Now with Chinese Characteristics date: 2021-05-31 words: 7493 flesch: 58 summary: NOW WITH CHINESE CHARACTERISITCS Granite Adams Unger, Center for Military, Strategic and Security Studies, University of Calgary Abstract This article documents the history of united front work in Canada. This practice, according to Gill and Scheer (2018), is known as united front work and it can generally be defined as: “activities...that seek to bolster the legitimacy, longevity, and strategic interests of the [Chinese Communist Party (CCP)] by promoting and protecting the Party's image, record, and policy preferences including through monitoring, deflection and suppression of criticism and contrary positions. keywords: australia; canada; canadian; ccp; china; chinese; intelligence; journal; manthorpe; new; prc; united; work cache: jicw-2748.pdf plain text: jicw-2748.txt item: #48 of 251 id: jicw-2749 author: McAuley, William title: Jurisdictional Challenges in the 21st Century Security Environment: Subnational Design-Basis Threats date: 2021-05-31 words: 6148 flesch: 21 summary: This paper seeks to address the conspicuous absence of discourse on contemporary subnational security challenges, suggesting that subnational security strategies are an inescapable requirement of the 21st century security environment. Hence, subnational security strategy is arguably an inescapable, yet overlooked component of the contemporary security environment. keywords: basis; canada; conflict; design; governments; information; infrastructure; intelligence; journal; mcauley; national; page; security; threat; warfare; william cache: jicw-2749.pdf plain text: jicw-2749.txt item: #49 of 251 id: jicw-2752 author: Farid, Hany title: Detecting and Combating Deep Fakes date: 2021-03-11 words: 1630 flesch: 56 summary: The third type of deep fake video is a lip sync debate, in which only the mouth is modified to be consistent with a new audio track. Question Period During the question and answer session, the speaker discussed the constantly evolving nature of deep fakes techniques, the problem with the Good Samaritan law, and the inconspicuous problem of the liar’s dividend. keywords: fakes; images; person; technology cache: jicw-2752.pdf plain text: jicw-2752.txt item: #50 of 251 id: jicw-2753 author: Rashid, Asif title: How policing has changed since COVID-19 date: 2021-03-11 words: 788 flesch: 41 summary: The question period focused on mental health issues people faced, misinformation, and law enforcement responsibilities. • Continuity plans and emergency incident management teams are critical in maintaining service. keywords: covid-19; health; management cache: jicw-2753.pdf plain text: jicw-2753.txt item: #51 of 251 id: jicw-2754 author: Macdonald, Kathy title: Cyber investigation: A new frontier for police date: 2021-03-11 words: 1099 flesch: 39 summary: A lack of information sharing channels among practitioners and experts, as well as these types of crimes going under-reported provide further challenges to cybercrime investigations. • Law enforcement are overwhelmed with cybercrime investigations and need to be proactive in order to prevent crimes from happening in the first place. keywords: cybercrime; information; police cache: jicw-2754.pdf plain text: jicw-2754.txt item: #52 of 251 id: jicw-2764 author: Hennessy, Michael A. title: Revisiting Disruptive Technology and the Innovator’s Dilemma in the Age of Cybersecurity date: 2021-03-14 words: 891 flesch: 26 summary: Michael A. Hennessy Page 96 The Journal of Intelligence, Conflict, and Warfare innovative technologies in the cybersecurity industry, the Canadian Air Force and other military organisations have the potential to “transform the fight” against their opposition. Key points of discussion included: the difficulties of embracing major technological change in modern military bureaucracies; how organisational culture is an impediment to change; and how leadership and management in military organisations is out of step with the pace of change. keywords: cybersecurity; data cache: jicw-2764.pdf plain text: jicw-2764.txt item: #53 of 251 id: jicw-2765 author: Welch , James Patrick title: Drone Warfare in Transnational Armed Conflict and Counterterrorism date: 2021-03-15 words: 713 flesch: 53 summary: NATURE OF DISCUSSION Presentation Dr. James Patrick Welch discussed the emergence of drone warfare and the legal, ethical, and strategic use of drones in transnational armed conflict and counterterrorism. BACKGROUND Presentation While drone warfare has become a popular subject due to its increasing presence in headlines around the globe, the use of drones and drone warfare are hardly new concepts. keywords: drones; warfare cache: jicw-2765.pdf plain text: jicw-2765.txt item: #54 of 251 id: jicw-2766 author: Jenkins, Paul title: The Challenges of Data Acquisition and the Use of Artificial Intelligence/Machine Learning date: 2021-03-15 words: 1560 flesch: 40 summary: The exploitation of data can be considered as the ability to connect to stored data, combine different datasets, and provide visualized information and reports to inform actions and decisions. Main discussion topics included the importance of data when tackling organized crime; the challenges that the exponential growth of data presents; and the importance of having ethical and regulatory frameworks when dealing with data. keywords: data; enforcement; intelligence; law cache: jicw-2766.pdf plain text: jicw-2766.txt item: #55 of 251 id: jicw-2767 author: Johnson, Loch K. title: Spy watching: Intelligence accountability in the United States date: 2021-03-15 words: 1283 flesch: 39 summary: The key points discussed were the roles of intelligence in different eras; the usage differences of the various Presidential administrations; and the issues that affected the efficiency and autonomy of intelligence agencies. NATURE OF DISCUSSION Presentation Dr. Johnson presented on the roles of intelligence agencies in the United States; the issues that affect intelligence agencies’ efficiency and autonomy; and the usage of intelligence agencies by the Bush, Obama, and Trump administrations. keywords: administration; agencies; intelligence; trump cache: jicw-2767.pdf plain text: jicw-2767.txt item: #56 of 251 id: jicw-2768 author: Shaikh, Mubin title: Social Media as a Recruitment Tool by Extremist Groups date: 2021-03-15 words: 736 flesch: 49 summary: The key points of discussion focused on how the rise of social media has created recruitment opportunities for extremist groups, and how these opportunities have compounded during the COVID-19 pandemic. NATURE OF DISCUSSION Presentation Professor Mubin Shaikh discussed the emergence of social media as a recruitment tool for extremist groups, the difficulties introduced by COVID-19, and the implications for law enforcement. keywords: groups; media cache: jicw-2768.pdf plain text: jicw-2768.txt item: #57 of 251 id: jicw-2769 author: McDonald, Dwayne title: Policing in the 21st Century date: 2021-03-15 words: 804 flesch: 44 summary: For example, decryption can be challenging for law enforcement because encryption of data is much more prevalent. In addition, when trying to decrypt data, it is important that public trust is not breached and privacy policies are followed, especially within law enforcement. keywords: enforcement; law cache: jicw-2769.pdf plain text: jicw-2769.txt item: #58 of 251 id: jicw-2770 author: Frantz, Elaine title: The Use of Popular Culture and Norms by Extremists date: 2021-03-15 words: 710 flesch: 56 summary: Further, realizing the power of the media, KKK members used newspapers to advance their messaging by writing letters about their violent doings and taking credit for their actions. The key topic of Dr. Frantz’s presentation included the development and spread of the Ku Klux Klan (KKK) through the media in the 1860s and 1870s. keywords: culture; kkk cache: jicw-2770.pdf plain text: jicw-2770.txt item: #59 of 251 id: jicw-2774 author: Dalip, Andrew title: Intelligence and Risks Posed by Corruption date: 2021-03-17 words: 1628 flesch: 39 summary: KEY EVENTS On November 26, 2020, Andrew Dalip presented at the 2020 CASIS West Coast Security Conference, where he spoke about intelligence and corruption. Primary discussion topics included operational concerns for security in Trinidad and Tobago, corruption related to lack of due diligence and reporting, and the limitations for COVID-19 preparation that resulted from corruption in Trinidad and Tobago. keywords: agencies; corruption; dalip; intelligence cache: jicw-2774.pdf plain text: jicw-2774.txt item: #60 of 251 id: jicw-2775 author: Briant, Emma title: Lessons from the Cambridge Analytica Crisis: Confronting Today's (Dis)information Challenges date: 2021-03-17 words: 820 flesch: 42 summary: These organisational structures that companies such as Cambridge Analytica used, can obscure the links that these companies may have to nefarious actors. A licensing system that would create an incentive for companies that follow certain ethical rules could also be beneficial to prevent another Cambridge Analytica. keywords: companies; data cache: jicw-2775.pdf plain text: jicw-2775.txt item: #61 of 251 id: jicw-2778 author: D'Orsi, Lucy title: Policing During COVID-19: Perspectives from MET Police, UK date: 2021-03-19 words: 847 flesch: 42 summary: This gap is being filled by the “dare to share” program — thousands of organizations are registered with MET Police free e-learning platform. , Deputy Assistant Commissioner Lucy D'Orsi presented Policing During COVID-19: Perspectives from MET Police, UK at the 2020 CASIS West Coast Security Conference. keywords: information; police; public cache: jicw-2778.pdf plain text: jicw-2778.txt item: #62 of 251 id: jicw-2795 author: Ferris, John title: Behind the Enigma: The Authorized History of GCHQ, Britain's Secret Cyber-Intelligence Agency date: 2021-03-24 words: 1200 flesch: 48 summary: Bulk collection of information by government SIGINT agencies is necessary to protect against threats. The question and answer period focused on the increased use of the internet by extremist actors and the implications for SIGINT agencies, and the evolving relationships between the SIGINT agencies of Western countries. keywords: agencies; intelligence; sigint cache: jicw-2795.pdf plain text: jicw-2795.txt item: #63 of 251 id: jicw-2796 author: McCauley, Clark title: Countering Extremist Violence (CEV) date: 2021-03-24 words: 660 flesch: 44 summary: After outlining the origin of Muslim grievances, Dr. McCauley argued that violent extremists believe only violence can achieve change, and so a decline in sympathy for terrorist grievances could lead to a decline in terrorist attacks. Instead of writing off or suppressing Muslim grievances, the authorities working on deradicalization should focus on recognizing Muslim grievances and establishing a common ground to facilitate discussions to resolve them. keywords: grievances; violence cache: jicw-2796.pdf plain text: jicw-2796.txt item: #64 of 251 id: jicw-2798 author: Richards, Julian title: Extremist Propaganda and the 'Politics of the Internet' date: 2021-03-25 words: 684 flesch: 31 summary: The key points of discussion focused on the effectiveness of internet use by extremist groups to expand their networks and spread disinformation. The state maintains an advantage over extremist groups with respect to legislation, licensing, and intelligence activity; however, much more research about extremist actors and the effects of internet use to further their political agenda is required. keywords: intelligence; internet cache: jicw-2798.pdf plain text: jicw-2798.txt item: #65 of 251 id: jicw-2799 author: Dittmar, Victoria title: Organized Crime Groups in Latin America and TREX-Hybridity date: 2021-03-25 words: 872 flesch: 40 summary: The TREX Model’s purpose is to identify variations among different groups of violent non-state actors. Dealing with these groups will require increased international law enforcement cooperation and governments need to regain access to areas where non-state groups are exerting government-like control. keywords: actors; groups cache: jicw-2799.pdf plain text: jicw-2799.txt item: #66 of 251 id: jicw-2800 author: Kelshall, Candyce title: Soft Violence, Social Radicalisation, and Violent Transnational Social Movements (VTSMs) date: 2021-03-26 words: 2199 flesch: 32 summary: Primary discussion topics included the distinction between terrorists and violent extremists, weapons used by violent extremists, social radicalisation and self actualisation (SRSA), the production of lone actors, and the intersectionality of violent extremist actors. Within social radicalisation, violent extremist actors express their identity in their daily lives by joining communities with others who are like minded, leading to radicalisation through the normalisation of extremist sentiment. keywords: actors; extremist; kinetic; violence cache: jicw-2800.pdf plain text: jicw-2800.txt item: #67 of 251 id: jicw-2805 author: Mohamed Ali, Hanan title: “Norm Subsidiarity” or “Norm Diffusion”? A Cross-Regional Examination of Norms in ASEAN-GCC Cybersecurity Governance date: 2021-05-31 words: 9732 flesch: 33 summary: According to Broeders and van den Berg (2020), aiming to narrow the “digital divide”, the heads of ASEAN states agreed at the East Asia Summit in 2018 to foster cooperation: Promoting sustainable economic growth and prosperity, by supporting digital economy initiatives including investment and innovation, entrepreneurship, assisting Micro, Small and Medium Enterprises (MSMEs) to utilize ICTs and participate in the digital economy, developing a digital-ready workforce, and raising awareness of security in the use of ICTs. In other words, ambiguous domestic cybersecurity laws have enabled GCC states to diffuse international cyber norms while avoiding ideological disagreements that could potentially jeopardize efforts towards cooperation. keywords: ali; asean; conflict; cooperation; cyber; cybercrime; cybersecurity; cyberspace; gcc; hanan; intelligence; international; journal; member; mohamed; norms; regional; states cache: jicw-2805.pdf plain text: jicw-2805.txt item: #68 of 251 id: jicw-2808 author: Harris-Hogan, Shandon title: Countering Violent Extremism: Perspectives from the Australian Context date: 2021-03-29 words: 1482 flesch: 41 summary: So what are the other options to manage at risk individuals in Australia? • Most prevention efforts in Australia have been underpinned by the broad assumption that increasing community resilience or increasing social cohesion will decrease the number of radicalised individuals. keywords: australia; individuals; radicalization cache: jicw-2808.pdf plain text: jicw-2808.txt item: #69 of 251 id: jicw-2809 author: Archutowski, Natalie; Bergler, Serge title: Gen Z as Security Content Creators: Recreating the Terms of the Social Contract date: 2021-03-29 words: 2103 flesch: 38 summary: As a generational actor with technological fluency blurring the boundaries between online and offline spheres, with communication and messaging mastery, it can be said that Gen Zs social role is distinctively different from previous generations. NATURE OF DISCUSSION Presentation Natalie Archutowski and Serge Bergler discussed the topic of Gen Z’s; why they have different perspectives, their creation of a unique identity rather than one imposed on them, identity fluidity, and what role they might play in shaping today and tomorrow’s social landscape. keywords: gen; identity; movements; security cache: jicw-2809.pdf plain text: jicw-2809.txt item: #70 of 251 id: jicw-2814 author: Bajwa, Aman title: The Threat of ISIS-Affiliated Foreign Terrorist Fighters Towards Canadian National Security: Making the Case for the Development of a Prosecutorial-Reintegrative Model for Returnees date: 2021-05-31 words: 13129 flesch: 38 summary: The Canadian government, for the first time, faced the issue of repatriating Canadian foreign fighters. Wickson (2019) notes that extraterritorial exceptions allow Canada to enforce relevant provisions on Canadian foreign fighters that have committed crimes against humanity in the form of war crimes, torture, and genocide, as well as treason and terrorism from the Criminal Code (p. 59). keywords: aman; bajwa; canada; canadian; conflict; countries; deradicalization; fighters; intelligence; iraq; isis; journal; page; reintegration; returnees; rights; security; state; support; syria; terrorist; war; warfare cache: jicw-2814.pdf plain text: jicw-2814.txt item: #71 of 251 id: jicw-2816 author: Bellaiche, Julien title: QAnon: A rising threat to democracy? date: 2021-04-03 words: 1581 flesch: 47 summary: Many local and national branches of the movement such as QAnon France, QAnon UK, and QAnon Germany have also been identified. The anti- vaccine demonstrations in Germany and the Save the Children rallies campaign in the UK are examples of potential QAnon movements. keywords: bellaiche; intelligence; movement; qanon cache: jicw-2816.pdf plain text: jicw-2816.txt item: #72 of 251 id: jicw-2817 author: Phillips, Archilus title: Interagency Collaboration and National Security date: 2021-04-03 words: 2098 flesch: 38 summary: Firstly, Bishop observed that there was continued ambivalence at the political level that resulted in various challenges for regional security at that time. Due to their small size, diversity, and possibly having fewer resources than developed nations, IAC may be considered imperative in addressing security challenges in Caribbean countries. keywords: bishop; caribbean; security; tobago; trinidad cache: jicw-2817.pdf plain text: jicw-2817.txt item: #73 of 251 id: jicw-2818 author: Greene, Viveca S. title: The Use of Memes and Satire by the Alt-right and Gen Z Activists – Exclusion vs Inclusion date: 2021-04-03 words: 529 flesch: 45 summary: NATURE OF DISCUSSION Presentation Dr. Greene conceptualized the link between humour studies and alt-right extremism; memes and dark humour; and how humour is used to disseminate extremist sentiments. BACKGROUND Presentation Through examining various memes in a chronological order, using the 2016 United States presidential election as a starting point, Dr. Greene illustrated how the alt-right uses memes and satire to disseminate values. keywords: memes; right cache: jicw-2818.pdf plain text: jicw-2818.txt item: #74 of 251 id: jicw-2819 author: Hayes, Andrew title: Combatting Terrorism and Extremism in Wales: Operational Policing date: 2021-04-03 words: 1393 flesch: 39 summary: Extremist individuals can be categorized into three tiers. NATURE OF DISCUSSION Detective Chief Inspector Hayes discussed terrorism and extremism threats in Wales, how extremist organizations are targeting vulnerable individuals, and the importance of understanding how technology and social media can influence and impact individuals. keywords: extremism; individuals; radicalization cache: jicw-2819.pdf plain text: jicw-2819.txt item: #75 of 251 id: jicw-2820 author: Tung, Gurpreet title: Technology as a Tool for Transnational Organized Crime : Networking and Money Laundering date: 2021-05-31 words: 3429 flesch: 41 summary: Technology has extended boundaries and reach for several businesses, including organized crime entities (Kassab & Rosen, 2019; Kruisbergen et al., 2019; Saito, 2021). Therefore, this demonstrates that technology is a powerful aid that organized crime entities use not only to communicate with local networks but also with international networks. keywords: crime; kruisbergen; money; rosen cache: jicw-2820.pdf plain text: jicw-2820.txt item: #76 of 251 id: jicw-2823 author: Mustafa, Rizwan title: Islamic Extremism date: 2021-04-13 words: 1561 flesch: 49 summary: , Dr. Rizwan Mustafa presented Islamic Extremism at the 2020 CASIS West Coast Security Conference. Additionally, Dr. Mustafa discussed how organisations such as Daesh (Islamic State) and Al-Qaeda use Jihad to justify their violent actions. keywords: daesh; islam; mustafa cache: jicw-2823.pdf plain text: jicw-2823.txt item: #77 of 251 id: jicw-2824 author: Davies, Garth title: Radicalization and Violent Extremism in the Era of COVID-19 date: 2021-05-31 words: 1290 flesch: 42 summary: Yet, the increased use of the Internet does not immediately imply that online radicalization is occurring at a higher rate. Question Period During the question and answer period, the prevalence of radicalization was discussed, particularly with regard to RWE and online radicalization. keywords: covid-19; davies; radicalization cache: jicw-2824.pdf plain text: jicw-2824.txt item: #78 of 251 id: jicw-2825 author: Makosso, Amanda; Collinet, Auréole title: Islamic State Central Africa Province (ISCAP): A threat to regional stability and security date: 2021-05-31 words: 5847 flesch: 28 summary: Finally, ISCAP activists appear also to employ techniques and strategies used by other groups, such as the Somali group, Al-Shabaab, during the food crisis in Somalia, through the distribution of food and other services to the local populations (Rono 2017; Fabre & Mélyon, n.d.). Yesterday, jihadists groups were prominent in North Africa, Mali, and Nigeria. keywords: adf; africa; ansar; conflict; group; intelligence; iscap; isis; islamic; journal; mozambique; nations; para; security; state cache: jicw-2825.pdf plain text: jicw-2825.txt item: #79 of 251 id: jicw-2841 author: Roach, Kent title: Improving Law Enforcement and Indigenous Relations date: 2021-06-14 words: 1284 flesch: 40 summary: A change in approach towards a more inclusive and holistic form of community safety could improve the safety and security of Indigenous Peoples within Canada. A turn towards a more holistic approach to community safety is required to improve the security of Indigenous Peoples and Canada as a whole. keywords: canada; peoples; policing cache: jicw-2841.pdf plain text: jicw-2841.txt item: #80 of 251 id: jicw-2901 author: Perry, Barbara title: Right Wing Extremism and Youth Recruitment date: 2021-05-31 words: 1292 flesch: 51 summary: In addition, the 2015 report showed that OC groups and RWE groups can work together for mutual benefits. The link between far-right movements and OC groups observed mostly in the U.S. can be explained by the financial benefits that OC groups receive in exchange for providing protection to RWE groups. keywords: groups; perry; rwe cache: jicw-2901.pdf plain text: jicw-2901.txt item: #81 of 251 id: jicw-2906 author: Sehijpaul, Vishaal title: Offline Activism: Does It Take More than Online Social Justice Warriors? date: 2021-05-31 words: 1102 flesch: 47 summary: Online activism is a form of activism done through an online platform of some sort, such as Instagram or TikTok. Online activism may be useful, as it arguably results in sharing valuable information that may not be common knowledge, attracts audiences, and has platforms to educate a wide range of people used by SJWs. keywords: activism; safety; slacktivism cache: jicw-2906.pdf plain text: jicw-2906.txt item: #82 of 251 id: jicw-2907 author: Chu, Paige title: Technology and Racism: An Environment for Violence? date: 2021-05-31 words: 1443 flesch: 40 summary: Question Period During the question period, the discussion focused primarily on potential solutions to the problem of technology and racism, the speaker’s opinion on facial recognition technology, and the speaker’s personal concerns about the internet. Key points of discussion included: how technology has allowed for public issues to be absorbed into private spaces, the differential experiences with the use of technology, how technology has been used to perpetuate racism, and the difficulties with holding tech companies accountable. keywords: online; racism; technology cache: jicw-2907.pdf plain text: jicw-2907.txt item: #83 of 251 id: jicw-2908 author: Tiku, Neor title: A world without digital inclusivity: What it means to securitize technology date: 2021-05-31 words: 1582 flesch: 39 summary: Technology access should be prioritized as a critical necessity within our society and Canada should lead by example, ensuring that digital access is distributed through a fair, equitable, and egalitarian system. Some of the measures discussed included policy changes and a general educational framework to understand digital access. keywords: access; canada; divide cache: jicw-2908.pdf plain text: jicw-2908.txt item: #84 of 251 id: jicw-2909 author: Bynoe, Chloe title: What Does Safety Look Like for Young Women on the Internet? date: 2021-05-31 words: 1124 flesch: 55 summary: The second point regarding Internet safety and security was about minors’ psychological wellbeing as Internet users. This presentation was followed by a group panel for questions and answers, whereby congress attendees were provided with an opportunity to engage in discussion with Ms. Bynoe. keywords: bynoe; internet cache: jicw-2909.pdf plain text: jicw-2909.txt item: #85 of 251 id: jicw-2910 author: Lee Acham Chen, Erita title: Arts Education: An Unexpected Tool in the Quest for a Safer World date: 2021-05-31 words: 1306 flesch: 51 summary: Overall, students involved in NGO arts programs displayed higher self-esteem, improved confidence, and a general shift to socially productive behaviours. The discussion focused primarily on the positive outcomes of students involved in two NGO performing arts programs, Jazzart Dance Theatre and Amoyo Performing Arts Foundation, as well as the benefit to society in reducing gang involvement, substance abuse, and unsafe reproductive health. keywords: arts; skills; students cache: jicw-2910.pdf plain text: jicw-2910.txt item: #86 of 251 id: jicw-2952 author: Adela, Gershon title: “Small Fires Causing Large Fires”: The rise of Boko Haram in Northeastern Nigeria and its Transnational Posture in the Lake Chad Basin date: 2021-11-23 words: 7806 flesch: 45 summary: Elite politics and the emergence of Boko Haram insurgency in Nigeria. The majority of Boko Haram members are youth from the Kanuri ethnic group, which comprises the largest ethnic community in Nigeria’s Borno state but also straddles the border into Cameroon, Niger, and Chad (Ojochenemi et al., 2015). keywords: adela; basin; boko haram; chad; conflict; education; gershon; group; insurgency; intelligence; islamic; journal; lake; nigeria; percent; region; state; warfare; yusuf cache: jicw-2952.pdf plain text: jicw-2952.txt item: #87 of 251 id: jicw-2953 author: Schirch, Lisa title: Social Cohesion and Conflict Dynamics on Social Media date: 2021-11-23 words: 2115 flesch: 49 summary: Dr. Schirch began by discussing shifting beliefs about the impact that social media can have. Dr. Schirch then highlighted how social media can be a tool for the dissemination of disinformation and offered some real-world examples. keywords: conflict; media; online; schirch; speech cache: jicw-2953.pdf plain text: jicw-2953.txt item: #88 of 251 id: jicw-2962 author: Greene, Viveca S.; Rasmussen, Makena; Clark, Dutch title: Memeology: Normalizing Hate Through Humour? date: 2021-11-23 words: 1815 flesch: 51 summary: In this context, the funnel effect occurs when “normies” want to understand the Viveca S. Greene, Makena Rasmussen, and Dutch Clark The Journal of Intelligence, Conflict, and Warfare Volume 4, Issue 2 77 jokes behind the memes and join said meme communities, which exposes them to RWE views and can lead to radicalization. Additionally, Dr. Greene provided an overview of right-wing extremism (RWE) and its influence on memes, with RWE memes successfully disseminating ideology through “meme magic”. keywords: greene; makena; memes; rasmussen cache: jicw-2962.pdf plain text: jicw-2962.txt item: #89 of 251 id: jicw-3067 author: Bajwa, Aman title: Information disorder, the Triumvirate, and COVID-19: How media outlets, foreign state intrusion, and the far-right diaspora drive the COVID-19 anti-vaccination movement date: 2021-11-23 words: 11440 flesch: 34 summary: Social media, political polarization, and political disinformation: A review of the scientific literature. Since 2008, the Kremlin has utilized disinformation campaigns in countries such as Georgia, France, Ukraine, United Kingdom, and the Baltic states. keywords: aman; anti; bajwa; conflict; covid-19; disinformation; et al; identity; intelligence; issue; journal; media; news; research; right; spread; volume; warfare cache: jicw-3067.pdf plain text: jicw-3067.txt item: #90 of 251 id: jicw-3068 author: McGuinty, David J. title: National Security and Parliamentary Review Four Years On: Is it Working? date: 2021-11-23 words: 1957 flesch: 40 summary: In 2010, it was realized the importance of having a group of parliamentarians, all with high-level security clearance, to effectively review national security issues. The presentation was conducted by the Honourable David J. McGuinty, founding chair of the National Security and Intelligence Committee of Parliamentarians (NSICOP). keywords: intelligence; nsicop; review; security cache: jicw-3068.pdf plain text: jicw-3068.txt item: #91 of 251 id: jicw-3623 author: Gilmour, John title: Does Canada have anything in the way of a strategic warning intelligence culture (and does it need one)? date: 2021-11-23 words: 5596 flesch: 45 summary: Another key question for SWI practitioners is: what is the optimum temporal horizon for SWI analysis? In order for SWI analysis to result in something that leads to an assessment that is actionable, decision makers must be presented with something that resembles at least a best guess. keywords: analysis; canada; conflict; decision; intelligence; issue; makers; need; security; swi; warning cache: jicw-3623.pdf plain text: jicw-3623.txt item: #92 of 251 id: jicw-3720 author: Farid, Hany title: The Weaponization of Deep Fakes: Threats and Responses date: 2021-11-23 words: 2469 flesch: 43 summary: In terms of individual protective measures, Dr. Farid stated that it is too late for this generation to combat deep fake technology because AI has already evolved to the point where a single image of an individual can be used to create deep fake videos of them through a software called Puppetmaster. In addition to creating better tools to counter deep fake media, corporations need to be held responsible for what is circulating on their networks, and governmental regulation of these sites need to be developed and enforced in order to limit the weaponization of deep fakes. keywords: fake; farid; media; technology cache: jicw-3720.pdf plain text: jicw-3720.txt item: #93 of 251 id: jicw-3727 author: Gordon, Robert title: Engaging the Private Sector for National Security date: 2021-10-19 words: 1063 flesch: 47 summary: Statistics Canada now estimates that 20% of Canadian businesses are being impacted by cyber threats. Sharing cyber threat information should not be considered a competitive issue; all companies should understand the threat Robert Gordon Page 192 The Journal of Intelligence, Conflict, and Warfare environment that they are working in. keywords: data; sector cache: jicw-3727.pdf plain text: jicw-3727.txt item: #94 of 251 id: jicw-3728 author: Waterman, Kerry title: How Small States Work Together for Regional Security in Complex Security Threat Environments date: 2021-10-19 words: 1308 flesch: 39 summary: The RSS compliments state security operations through cooperation, collaboration, and the sharing of resources, with an ultimate goal of maximizing regional security and preserving the socioeconomic development of their citizens. The RSS compliments such state security operations through cooperation, collaboration, HOW SMALL STATES WORK TOGETHER FOR REGIONAL SECURITY IN COMPLEX SECURITY THREAT ENVIRONMENTS Date: November 23, 2020 Disclaimer: keywords: data; rss; security; states cache: jicw-3728.pdf plain text: jicw-3728.txt item: #95 of 251 id: jicw-3751 author: Steeves, Valerie title: Big Data Surveillance: Privacy and Trust Implications date: 2021-11-23 words: 1382 flesch: 48 summary: Dr. Steeves then noted that young children are aware of how vulnerable the information they place online is. Young children also recognize the issues that persist online and how popular social media sites use their content to evoke societal expectations Valerie Steeves 97 The Journal of Intelligence, Conflict, and Warfare Volume 4, Issue 2 through existing algorithms. keywords: children; information; steeves cache: jicw-3751.pdf plain text: jicw-3751.txt item: #96 of 251 id: jicw-3752 author: CASIS-Vancouver title: Introduction to the Defence and Security Advisory Network Report date: 2021-11-23 words: 1345 flesch: 28 summary: The network establishes a defence and security research hub which maintains a centralised list of research interests, biographies, and papers - both research and opinion pieces on members’ current work, which focuses on a range of topics including the extent to which violent transnational movements affect the stability of the nation-state and the prevention of the normalization of extremism rhetoric through various research projects - and provides a forum for researchers to discuss their current work on the nature and causes of divisive discourse within online communities and how to address emerging challenges for the defense and security fields. INTRODUCTION TO THE DEFENCE AND SECURITY ADVISORY NETWORK REPORT Canadian Association for Security and Intelligence Studies – Vancouver Since 2019, the Defence and Security Advisory Network has been actively promoting new research in the security and public safety spheres. keywords: conflict; defence; intelligence; research; security cache: jicw-3752.pdf plain text: jicw-3752.txt item: #97 of 251 id: jicw-3753 author: Askanius, Tina title: Memes and Media's Role in Radicalization date: 2021-11-23 words: 1824 flesch: 42 summary: Memes are considered to be ‘cultural units of meaning’, in that they are developed and spread virally by relating to and intersecting with other memes transnationally. Background Dr. Askanius argued that a mass-following of those attracted by extremist ideologies was triggered by activities such as violent memes, viral murder fantasies, and the banalization of white supremacist violence. keywords: askanius; memes; right; tina cache: jicw-3753.pdf plain text: jicw-3753.txt item: #98 of 251 id: jicw-3754 author: Champion, Amanda R. title: Exploring the Radicalization Pipeline on YouTube date: 2021-11-23 words: 1501 flesch: 37 summary: In mapping out the network of recommended incel and misogynist videos, Ms. Champion has found that exploring the pipeline of radicalized incel groups can “identify central, influential or popular video content within the broader community and this gives researchers great insight to infer shared beliefs or perspectives, especially when paired with additional information.” As the study of the online radicalization pipeline uses the incel group of a study focus, Champion offered a thorough background on incel groups to explain the effect of the multiple networks of online incel communities and their increasing contribution to offline violent attacks (using several recent high profile incel- related attacks (Elliot Rodger (2014), Chris Harper-Mercer (2015), Alek Minassian (2018), etc.as case studies). keywords: champion; groups; incel; radicalization; youtube cache: jicw-3754.pdf plain text: jicw-3754.txt item: #99 of 251 id: jicw-3755 author: Kelshall, Candyce; Archutowski, Natalie title: Concept of Soft Violence in Critical Security Studies date: 2021-11-23 words: 1762 flesch: 42 summary: THE CONCEPT OF SOFT VIOLENCE IN CRITICAL SECURITY STUDIES Candyce Kelshall, President – Canadian Association for Security and Intelligence Studies Vancouver, Canada Natalie Archutowski, Executive Officer – Canadian Centre for Identity Based Conflict, Canada Disclaimer: Primary topics included: evaluating violence as soft in nature, how and where soft violence might fit in the realm of critical security studies, violent transnational social movements (VTSMs), sharp power, and soft power. keywords: conflict; kelshall; power; violence cache: jicw-3755.pdf plain text: jicw-3755.txt item: #100 of 251 id: jicw-3756 author: Moskalenko, Sophia title: Evolution of QAnon & Radicalization by Conspiracy Theories date: 2021-11-23 words: 1736 flesch: 42 summary: A large portion of the American population either partially believes in, or fully believes in QAnon conspiracies, indicating the penetration the collective has on the wider American society. Furthermore, a Sophia Moskalenko 111 The Journal of Intelligence, Conflict, and Warfare Volume 4, Issue 2 large portion of the American population partially believes, or at least engages with QAnon linked conspiracies, pointing to deep rooted connections within American society. keywords: american; conspiracy; moskalenko; qanon cache: jicw-3756.pdf plain text: jicw-3756.txt item: #101 of 251 id: jicw-3757 author: CASIS-Vancouver title: Conclusion: Defence and Security Advisory Network Report date: 2021-11-23 words: 485 flesch: 20 summary: This research comes at a time of uncertainty and despair, which, largely brought on by the pandemic, has caused many to isolate and join online communities in order to find comfort and a sense of belonging. With a rise in polarization, distrust in institutions, and no clear ending in sight to the current pandemic, scholars like Professor Kelshall, Ms. Archutowski, Dr. Moskalenko, Dr. Askainus, and Ms. Champion bring up the notion of multi- jurisdictional approaches in order to understand and combat a rise in extremism, recommending new theories fitting within the realm of critical security studies and countermeasures such as online risk assessment tools and digital literacy. keywords: isbn-10; vancouver cache: jicw-3757.pdf plain text: jicw-3757.txt item: #102 of 251 id: jicw-3791 author: Riehle, Kevin P. title: Information Power and Russia’s National Security Objectives date: 2022-01-31 words: 6494 flesch: 42 summary: However, Russian information operations are not standalone activities but work in concert with all other levers of national power to achieve Russia’s overarching objectives. Russian National Security Objectives To understand Russian information power, or any of Russia’s levers of national power for that matter, we first need to determine what Russia’s overarching national security objectives are. keywords: conflict; information; intelligence; journal; national; nato; objectives; operations; power; putin; riehle; russia; security; ukraine; volume; warfare; world cache: jicw-3791.pdf plain text: jicw-3791.txt item: #103 of 251 id: jicw-3802 author: Anning, Stephen; Fenton, Toby; Muraszkiewicz, Julia; Watson, Hayley title: Operationalising Human Security in the Contemporary Operating Environment: Proposing Population Intelligence (POPINT) date: 2022-01-31 words: 9925 flesch: 40 summary: Without data we are fighting blind: The need for human security data in defence sector responses to human trafficking. Stephen Anning, Toby Fenton, Dr. Julia Muraszkiewicz, Dr. Hayley Watson, Trilateral Research, United Kingdom Abstract Drawing upon primary research funded by the UK Defence and Security Accelerator (DASA), this article is about using data analytics and artificial intelligence (AI) for operationalising human security in the contemporary operating environment. keywords: anning; conflict; data; et al; human; intelligence; issue; journal; knowledge; military; popint; population; research; security; volume; warfare cache: jicw-3802.pdf plain text: jicw-3802.txt item: #104 of 251 id: jicw-3817 author: Moskalenko, Sophia; González, Juncal Fernández-Garayzábal; Kates, Naama; Morton, Jesse title: Incel Ideology, Radicalization and Mental Health: A Survey Study date: 2022-01-31 words: 8488 flesch: 50 summary: Filling this gap, this study presents an important empirical datum by reaching beyond media headlines and online activity, to assess Incel ideology, mental health, and radical intentions through in-depth surveys of 274 active Incels. Incel ideology was only weakly correlated with radicalization, and ideology and radicalization were differentially correlated with mental health measures. keywords: conflict; et al; health; ideology; incel; intelligence; journal; mental; moskalenko; online; participants; radical; self; study; warfare cache: jicw-3817.pdf plain text: jicw-3817.txt item: #105 of 251 id: jicw-3818 author: Cline, Lawrence title: Sharing intelligence culture: Working with foreign intelligence services date: 2022-11-06 words: 7576 flesch: 43 summary: This statement indicates that intelligence services likely will receive additional taskings for which they have not had traditional responsibilities: What we need is cultural intelligence. The third — particularly germane more recently — has been an emphasis on what has become known as cultural intelligence. keywords: cline; conflict; countries; culture; intelligence; intelligence services; issue; journal; lawrence; services; u.s; warfare cache: jicw-3818.pdf plain text: jicw-3818.txt item: #106 of 251 id: jicw-4152 author: Lackenbauer, Whitney title: Canadian Sovereignty in the Arctic date: 2022-01-31 words: 1445 flesch: 47 summary: Dr. Lackenbauer reiterated that Arctic threats are against North America and not just intrinsic threats to Canada or its sovereignty. However, Dr. Lackenbauer questions whether these are Arctic threats or whether these technologies are global strategic threats that should first be considered on that scale. keywords: arctic; canada; threats cache: jicw-4152.pdf plain text: jicw-4152.txt item: #107 of 251 id: jicw-4153 author: Butterfield, Alexander title: Asymmetric Attack: A Quantum of Warning date: 2022-01-31 words: 1088 flesch: 36 summary: Ultimately, small improvements are big improvements when it affects lives, especially with concepts such as asymmetric attacks and operational warning systems. The systematisation of asymmetric warning is not easy but a slow, patient process that allows better understanding of the complete signature profile of an asymmetric adversary. keywords: asymmetric; intelligence; warning cache: jicw-4153.pdf plain text: jicw-4153.txt item: #108 of 251 id: jicw-4154 author: Charron, Andrea title: Arctic Security and Defence in a Competitive World date: 2022-01-31 words: 1630 flesch: 41 summary: Trust is an important element to ensure that competition stays at a healthy, stable state and so continued promotion of cooperation between Arctic states is helpful to the Arctic and elsewhere. In addition, the Arctic Council does most of its work via six scientific working groups that include observer and Arctic states focused on transArctic issues, such as black carbon pollution or accident preparedness. keywords: arctic; charron cache: jicw-4154.pdf plain text: jicw-4154.txt item: #109 of 251 id: jicw-4155 author: Dumaine, Carol title: Adapting to New Security Realities in a Climate-Disrupted World date: 2022-01-31 words: 2238 flesch: 40 summary: After highlighting the disadvantages of traditional frameworks to address climate change, Ms. Dumaine outlined alternative solutions to improve such frameworks. The question period highlighted the issues posed by the lack of consensus on ‘security’ in the context of climate change and how climate change security conditions have changed. keywords: change; climate; dumaine; security cache: jicw-4155.pdf plain text: jicw-4155.txt item: #110 of 251 id: jicw-4156 author: Briant, Emma title: Global Information and Digitalized Influence in a Data-driven World date: 2022-01-31 words: 1517 flesch: 43 summary: At this point in the presentation, Dr. Briant highlighted a clear parallel between the tactics being used by Cambridge Analytica behind political campaigns and the tactics used by anti-vaxxers to drive disinformation. In conjunction with a religious app company, Cambridge Analytica was retained by the Philanthropy Roundtable organization to produce a church survey and Facebook micro-targeting campaign so they could reach their congregations. keywords: briant; fear cache: jicw-4156.pdf plain text: jicw-4156.txt item: #111 of 251 id: jicw-4157 author: Fyffe, Greg title: Canadian Intelligence for the Dangerous Decades date: 2022-01-31 words: 1694 flesch: 37 summary: Question Period During the question and answer period, Mr. Fyffe talked about the need to protect democratic conversations regarding Canadian intelligence, by having understood and accepted procedures for dealing with sensitive information. Mr. Fyffe concluded his presentation by noting that if the government of Canada were to consider CIGI’s initiative on security policy, it would lead to good strategic and tactical warnings, improve the intelligence culture, and support a strong foreign policy backed up by intelligence. keywords: fyffe; intelligence cache: jicw-4157.pdf plain text: jicw-4157.txt item: #112 of 251 id: jicw-4158 author: Koehler, Daniel title: The Internationalisation of Far-Right Terror? History and Examples of International Far-Right Networks date: 2022-01-31 words: 1778 flesch: 40 summary: • New or renewed trends in right wing extremism include the increase of neo- Nazis getting involved in the drug or gun trade; increase of foreign fighters; young right-wing extremists; increased collaboration between neo-Nazi groups; reciprocal radicalisation among Islamist extremists, the far right, and the far left; increased CBRN terrorism; increased infiltration of military and police; and the potential convergence of Islamist and far-right tactics. Question period During the question and answer period, Dr. Koehler discussed how counter- disinformation campaigns affect those already radicalised and those who have the potential to be radicalised in the future. keywords: koehler; right; terror cache: jicw-4158.pdf plain text: jicw-4158.txt item: #113 of 251 id: jicw-4159 author: Kouwenberg, Jonathan A title: Authenticity, Adversity and Accountability in the Context of Uniformed Leadership date: 2022-01-31 words: 1954 flesch: 46 summary: Further, authentic leaders will work to create an environment where the entire team feels valued and operates in an atmosphere of trust. Authentic leaders acknowledge when mistakes have been made and apologize in a direct and public manner. keywords: commander; kouwenberg; leaders; team cache: jicw-4159.pdf plain text: jicw-4159.txt item: #114 of 251 id: jicw-4160 author: Kaati, Lisa title: Dehumanization, Hate Speech, and Violence in Right-Wing Extremist Environments date: 2022-01-31 words: 1326 flesch: 45 summary: Dr. Kaati also discussed how Siege Culture has been a common tool used to inspire and reach individuals who are likely to join the cause and how threat assessment in the digital space could help monitor, profile, and prevent the escalation of violence. Question Period During the question and answer period, Dr. Kaati discussed the importance of ethics in research relating to online extremism. keywords: kaati; online; violence cache: jicw-4160.pdf plain text: jicw-4160.txt item: #115 of 251 id: jicw-4161 author: Mandel, David title: Communicating Uncertainty in Warning Intelligence date: 2022-01-31 words: 1503 flesch: 35 summary: Dr. Mandel suggested that using numeric probabilities does not have to be precise, it merely has to be clear and not vague. However, Dr. Mandel found that analysts declared numeric probability to be more informative. keywords: mandel; probabilities cache: jicw-4161.pdf plain text: jicw-4161.txt item: #116 of 251 id: jicw-4162 author: Goodman, Michael title: The Joint Intelligence Committee and Reading the Russian Mindset date: 2022-01-31 words: 1227 flesch: 45 summary: The JIC’s assessment failures, in terms of Russia, was the attempt to join political assessments with military assessments and trying to get into the Russian perspective. The JIC is a committee based on consensus, and it is responsible for coordinating intelligence assessments, scrutinising the THE JOINT INTELLIGENCE COMMITTEE AND READING THE RUSSIAN MINDSET: keywords: assessments; intelligence; jic cache: jicw-4162.pdf plain text: jicw-4162.txt item: #117 of 251 id: jicw-4163 author: Hennessy, Michael title: Great Leadership is Timeless: Lessons from Outstanding Military Leaders date: 2022-01-31 words: 1560 flesch: 43 summary: NATURE OF DISCUSSION Presentation Dr. Hennessy began by identifying the typical tools utilized in the selection of military leaders and highlighted how they can be useful but do not accurately capture the stress and burden of leading in difficult situations. Secondly, military drill training can be problematic as soldiers are taught specific and exact responses to situations, causing military leaders to be lost when facing difficult crises and novel emergencies. keywords: hennessy; leaders; military cache: jicw-4163.pdf plain text: jicw-4163.txt item: #118 of 251 id: jicw-4164 author: Gratton, Phil title: Leadership, Technology and National Security date: 2022-01-31 words: 1597 flesch: 45 summary: Managers and employees must integrate into the realm of the technological world to combat new digital threats. To ensure that leaders can deal with the complexity of new digital threats, they must be able to trust in the technology workforce, who can be highly specialized in their respective fields and understand the technical and legal frameworks they need to work within. keywords: gratton; technology cache: jicw-4164.pdf plain text: jicw-4164.txt item: #119 of 251 id: jicw-4165 author: Lewis, Richard title: Police Ethics date: 2022-01-31 words: 1197 flesch: 53 summary: The key points discussed were police ethics in the United Kingdom (UK), the role of the National Police Ethics Committee, and public involvement to maintain a trusting relationship between the public and law enforcement. BACKGROUND Presentation Lately, police ethics has been a prominent topic of conversation across the world. keywords: ethics; national; police cache: jicw-4165.pdf plain text: jicw-4165.txt item: #120 of 251 id: jicw-4166 author: Marrin, Stephen title: The Changing Nature of Intelligence Education date: 2022-01-31 words: 1087 flesch: 38 summary: The key points discussed included the nature of intelligence studies, the importance of having diverse perspectives in the intelligence and national security space, and the importance of bridging gaps between scholars and practitioners. To contextualize the discussion topic, Dr. Marrin characterized the nature of intelligence study as an interdisciplinary approach to a body of knowledge that is not intrinsically instrumental, which is partly because this body of knowledge can serve several purposes. keywords: intelligence; marrin; studies cache: jicw-4166.pdf plain text: jicw-4166.txt item: #121 of 251 id: jicw-4167 author: Kawasaki, Tsuyoshi title: Re-Envisioning Canada as a Peninsula State date: 2022-01-31 words: 1305 flesch: 52 summary: NATURE OF DISCUSSION Presentation The central theme during Dr. Kawasaki’s presentation was the conceptualization of Canada as a peninsula state as the Arctic ice continues to melt and great powers strategize in the area. Question Period During the question and answer period, Dr. Kawasaki noted that Arctic issues go beyond Russia, China, or the US. keywords: arctic; canada; peninsula cache: jicw-4167.pdf plain text: jicw-4167.txt item: #122 of 251 id: jicw-4172 author: Kelshall, Candyce title: Identity Exclusive Violent Transnational Social Movements and 5th Generation Civic Warfare date: 2022-02-01 words: 1782 flesch: 38 summary: Professor Kelshall also touched upon the concept of fifth generation warfare when examining contemporary conflict and the importance of encouraging IDENTITY EXCLUSIVE VIOLENT TRANSNATIONAL SOCIAL MOVEMENTS AND 5TH GENERATION CIVIC WARFARE Date: November 24, 2021 Disclaimer: Professor Kelshall also noted that despite fifth generation warfare possibly being a return to pre-Westphalian order, it is important to understand that modern contemporary conflict has become hybrid, transnational, and ever-changing due to technological advances. keywords: kelshall; professor; warfare cache: jicw-4172.pdf plain text: jicw-4172.txt item: #123 of 251 id: jicw-4181 author: Floyd, Rita title: The Morality of Security date: 2022-02-11 words: 1448 flesch: 39 summary: Dr. Floyd’s presentation focused on securitization and its emergence within politics, with some primary concepts centering around security threats being politically and socially constructed and the criteria for when securitization is morally justifiable. NATURE OF DISCUSSION Presentation The primary focus of Dr. Floyd’s presentation was the importance of just securitization, as well as emergency politics as a recurring phenomenon and the nature of securitization for different types of threats. keywords: floyd; securitization cache: jicw-4181.pdf plain text: jicw-4181.txt item: #124 of 251 id: jicw-4182 author: Ghosh, Ratna title: Bridging Education and Law Enforcement for Countering Violent Extremism date: 2022-02-11 words: 1369 flesch: 28 summary: Question Period During the question and answer period, Dr. Ghosh reiterated the importance of training teachers on how to handle sensitive topics such as violent extremism despite the fact that education is not incorporated in counter-terrorism policies in Canada which also does not have a national education ministry. Dr. Ghosh noted that according to the Brookings Institute, violent extremism is defined as ideologically-motivated violence, beliefs, and acts that individuals implement to achieve socio-economic and political goals. keywords: extremism; ghosh; radicalization cache: jicw-4182.pdf plain text: jicw-4182.txt item: #125 of 251 id: jicw-4183 author: Shull, Aaron title: Reimaging a Canadian National Security Strategy date: 2022-02-11 words: 1416 flesch: 38 summary: • National security is interconnected to more than just borders, the threat of war, and espionage; pandemics, biosecurity, climate change, intellectual property theft, and data governance add new dimensions to national security. Mr. Shull stated that it is time for Canada to engage with and educate the public on national security issues. keywords: security; shull cache: jicw-4183.pdf plain text: jicw-4183.txt item: #126 of 251 id: jicw-4184 author: Lucki, Brenda title: Repairing the Relationship between Law Enforcement and the Public date: 2022-02-11 words: 2321 flesch: 38 summary: Commissioner Lucki noted that de-escalation is the most effective tactic for peaceful, lawful, and safe resolutions and that the overwhelming majority of RCMP interactions are resolved in this manner. With respect to how the RCMP’s role is evolving to engage minority, Indigenous, and northern communities in community policing, Commissioner Lucki referred to Robert Peele's principles in adopting community policing and focusing on a client centred model. keywords: commissioner; lucki; public; rcmp; trust cache: jicw-4184.pdf plain text: jicw-4184.txt item: #127 of 251 id: jicw-4185 author: Bajon, Theò title: Deep learning small arms recognition: Development of a basic model and prospects for its use in the field of conventional disarmament date: 2022-05-31 words: 4772 flesch: 39 summary: For this purpose, it was decided to test each of the categories of the model, with inputs from small arms models contained in the model database but different pictures from inputs already present in the model database, as well as with small arms models not present in the model. It is important to reiterate that having an exhaustive initial database in terms of small arms models allows this model to base its recognitions on inputs that are not totally unknown to it, giving a better chance of success in its recognitions. keywords: arms; arms recognition; category; identification; learning; model; recognition; recognition model cache: jicw-4185.pdf plain text: jicw-4185.txt item: #128 of 251 id: jicw-4187 author: Hopkins, Ian title: Don’t Ever Think You’ve Cracked It! date: 2022-02-18 words: 2073 flesch: 48 summary: Question Period During the question and answer period, Mr. Hopkins discussed the role of future proofing policing in improving diversity and inclusion in the criminal justice system, police workforce, and the broader community. Mr. Hopkins also explored the increasingly digital nature of terror threats and the challenges they bring for law enforcement, as well as the interoperability between legislators, policymakers, and law enforcement. keywords: hopkins; police; policing cache: jicw-4187.pdf plain text: jicw-4187.txt item: #129 of 251 id: jicw-4188 author: Pherson, Randolph title: The Tradecraft of Warning: Warning Intelligence in the 21st Century date: 2022-02-18 words: 1691 flesch: 43 summary: To wrap up his presentation, Mr. Pherson highlighted that understanding who is requesting the warning intelligence and determining their level in the policy chain of command is essential to successfully communicating warning Randolph Pherson 201 The Journal of Intelligence, Conflict, and Warfare Volume 4, Issue 3 intelligence to the stakeholder. KEY EVENTS On November 23, 2021, Mr. Randolph Pherson, Chief Executive Officer of Globalytica and President of Pherson Associates, presented on The Tradecraft of Warning: Warning Intelligence in the 21st Century at the 2021 CASIS West Coast Security Conference. keywords: intelligence; pherson; warning cache: jicw-4188.pdf plain text: jicw-4188.txt item: #130 of 251 id: jicw-4189 author: Sanchez Ortega, Antonio title: From Liberal to Liberal Global Order: Implications for Western Security date: 2022-02-18 words: 1188 flesch: 44 summary: KEY EVENTS On November 26, 2021, Dr. Antonio Sanchez Ortega, Assistant Professor at the University of Granada in Spain, presented From Liberal to Liberal Global Order: Implications for Western Security at the 2021 CASIS Vancouver West Coast Security Conference. Western states have intervened in other nations under the guise of democracy and human rights, but these interventions did not do any good to affirm Liberal Order, Dr. Ortega argued. keywords: order; ortega cache: jicw-4189.pdf plain text: jicw-4189.txt item: #131 of 251 id: jicw-4190 author: Hyland, Jennifer title: Building a Police Service in Challenging and Changing Times date: 2022-02-18 words: 1151 flesch: 48 summary: Community policing is an important part of several police forces, but it is everyone’s responsibility to keep communities safe. Therefore, for future proofing policing to succeed, it is important for police officers to encourage diversity. keywords: community; police cache: jicw-4190.pdf plain text: jicw-4190.txt item: #132 of 251 id: jicw-4191 author: Archutowski, Natalie title: Predicting the Escalation to Violence of Online Hate Groups date: 2022-02-18 words: 1880 flesch: 37 summary: To conclude, Ms. Archutowski noted that the team found that online actions of soft violence and doxing identified on the forum Daily Stormer had the potential for physical impact on the wellbeing of recipients. Therefore, Ms. Archutowski and her team chose to rewrite their algorithm using a special white supremacist/extremist lexicon in order to identify the cultural nuances to tell if there was violence present in the dataset and if it could lead to physical violence. keywords: archutowski; hate; model; violence cache: jicw-4191.pdf plain text: jicw-4191.txt item: #133 of 251 id: jicw-4196 author: Virk, Vincent title: Effective Leadership in Times of Uncertainty date: 2022-02-27 words: 1249 flesch: 50 summary: NATURE OF DISCUSSION Presentation In the Canadian Armed Forces (CAF), leadership is broken into three spheres: institutional leadership, leading people, and leadership of self. In the Canadian Armed Forces (CAF), leadership is broken into three spheres: institutional leadership, leading people, and leadership of self. keywords: caf; leadership; self cache: jicw-4196.pdf plain text: jicw-4196.txt item: #134 of 251 id: jicw-4197 author: Wilczynski, Artur title: Equity, Diversity, and Inclusion in National Security Intelligence date: 2022-02-27 words: 1444 flesch: 40 summary: The key points discussed included how a lack of diversity in intelligence can negatively contribute to Canada’s national security, how diversity broadens the effectiveness of organizations, and how Canadian national security institutions must be in service to all Canadians. NATURE OF DISCUSSION Presentation Mr. Wilczynski focused on how a lack of diversity in the workforce negatively affects Canadian intelligence organizations and how diversity can broaden organizational efficiency and fulfil their core mandates. The national security and intelligence community needs to be determined and deliberate to reach out and convince those who have been wronged in the past—such as victims of the LGBT Purge—that the community has changed. keywords: intelligence; national; security cache: jicw-4197.pdf plain text: jicw-4197.txt item: #135 of 251 id: jicw-4198 author: Macdonald, Kathy title: Online Neighbourhood Patrol: How to Best Understand the Changing Online Social Contract date: 2022-03-15 words: 2015 flesch: 46 summary: The Internet of Things is a very dynamic area, and it is a new frontier for police services and one that Ms. Macdonald believes will become a greater challenge for police in the future. NATURE OF DISCUSSION Presentation Ms. Macdonald’s presentation centered around the challenges that advances in technology has brought for police services, as well as the integration of community policing with online communities as the advent of social media has led to the formation of more online networks. keywords: community; macdonald; police cache: jicw-4198.pdf plain text: jicw-4198.txt item: #136 of 251 id: jicw-4199 author: Walsh, Patrick title: Post-COVID World: Dealing with Future Health Crises and the Role of the National Intelligence Community date: 2022-02-27 words: 1893 flesch: 39 summary: Dr. Walsh also discussed some of the areas that need to be looked at in order to improve the effectiveness of the intelligence community's response to health security threats. There are some pockets of excellence in the Five Eyes agencies regarding the analysis of health security threats, but they are at the low level. keywords: health; intelligence; security; walsh cache: jicw-4199.pdf plain text: jicw-4199.txt item: #137 of 251 id: jicw-4200 author: Huebert, Robert title: Canadian American Solutions to the Questions of Arctic Security date: 2022-02-27 words: 1729 flesch: 38 summary: In terms of international terrorism, potential future engagement from terrorist organizations will distract states—as it has happened in the past, particularly post 9/11 events—from Arctic security issues. Likewise, focus on domestic terrorism and right-wing extremism will likely result in decision makers placing less emphasis on Arctic security issues. keywords: arctic; huebert; new; security cache: jicw-4200.pdf plain text: jicw-4200.txt item: #138 of 251 id: jicw-4201 author: Omand, Sir David title: How Spies Think: Ten Lessons in Intelligence date: 2022-02-27 words: 2459 flesch: 46 summary: Paradoxically, however, crossing the intelligence line into the policy territory to become an advocate of a particular point of view, might not be a recommended practice by intelligence analysts. KEY EVENTS On November 23, 2021, Sir David Omand, visiting Professor in War Studies at King’s College London and Former Director General of the Government Communications Headquarters (GCHQ), presented on How Spies Think: Ten Lessons in Intelligence at the 2021 CASIS West Coast Security Conference. keywords: david; decision; intelligence; security; sir cache: jicw-4201.pdf plain text: jicw-4201.txt item: #139 of 251 id: jicw-4202 author: Finkelstein, Joel title: Memes, Violence, and Viruses: A Nation's Guide to Global Contagious Threats date: 2022-03-01 words: 1384 flesch: 37 summary: Joel Finkelstein 253 The Journal of Intelligence, Conflict, and Warfare Volume 4, Issue 3 Dr. Finkelstein stated that segregated online communities accumulate hostilities, which are expressed through memes to generate a demand for conspiracy. Dr. Finkelstein pointed out that the Network Contagion Research Institute has developed PushShift, a machine-learning big data platform that surveys segregated online communities for hostile memes and changes in hateful online rhetoric associated with these memes. keywords: finkelstein; memes cache: jicw-4202.pdf plain text: jicw-4202.txt item: #140 of 251 id: jicw-4205 author: Labott, Elise title: A Solution-Based Approach to Civil Discourse date: 2022-03-08 words: 1351 flesch: 49 summary: Question Period During the question and answer period, Ms. Labott discussed the ways in which a broken media system may be more prevalent in the United State than elsewhere. Ms. Labott noted that bias is shown through the failure to present all sides, leading to a lack of consensus and fueling polarization. keywords: labott; media cache: jicw-4205.pdf plain text: jicw-4205.txt item: #141 of 251 id: jicw-4206 author: Riehle, Kevin title: Russia and Information Power date: 2022-03-08 words: 1567 flesch: 38 summary: Dr. Riehle also discussed how Russia has justified its military activities based upon narratives regarding NATO and US aggression and how Russian covert sabotage operations have occurred in the same space as information activities. The Journal of Intelligence, Conflict, and Warfare Volume 4, Issue 3 BACKGROUND Presentation Dr. Riehle began his presentation by expressing that to understand Russian information warfare, we need to establish what Russia is trying to achieve. keywords: information; riehle; russia cache: jicw-4206.pdf plain text: jicw-4206.txt item: #142 of 251 id: jicw-4207 author: Kelshall, Richard title: Leadership, Intelligence Management, and Complex Crises date: 2022-03-08 words: 1057 flesch: 59 summary: The key points discussed included the characteristics of effective leadership, problems that might impede good leadership, and the changing nature of leadership. RAdm Kelshall then provided a number of leadership lessons as he reflected on memorable events at the Britannia Royal Naval College and with the Royal Navy. keywords: kelshall; leadership cache: jicw-4207.pdf plain text: jicw-4207.txt item: #143 of 251 id: jicw-4208 author: Anning, Stephen title: Operationalizing Human Security in Contemporary Operating Environment date: 2022-03-08 words: 1471 flesch: 29 summary: Mr. Anning also discussed the challenges of operationalizing human security and the role of data analytics in operationalizing human security. Mr. Anning argued that human security is a response to many of the population’s problems in contemporary operating environments. keywords: human; intelligence; security cache: jicw-4208.pdf plain text: jicw-4208.txt item: #144 of 251 id: jicw-4209 author: Kilcullen, David title: The Importance of Warning Intelligence When Dealing with Dragons and Snakes date: 2022-03-08 words: 1195 flesch: 45 summary: Dr. Kilcullen suggested that traditional and linear understandings of strategic warning are outdated and do not accurately reflect the intent of Dragons (state actors) and Snakes (non-state actors). Therefore, Dr. Kilcullen stated, the linear assumptions that have formed the basis of strategic warning must be reassessed given the gray conflict. keywords: kilcullen; warning cache: jicw-4209.pdf plain text: jicw-4209.txt item: #145 of 251 id: jicw-4212 author: Hodgins, Julia title: Would artificial intelligence make strategy ‘less human’? date: 2022-05-31 words: 3445 flesch: 42 summary: Integrating Narrow AI in data management and analysis at the service of strategy formulation provides a sustainable advantage which unfolds more successfully under a human-machine cooperation, where machines are ‘team-mates’ as their capabilities are in constant expansion (Coker, 2019; Dear, 2019). This approach accommodates diverse tasks ranging from self- awareness to problem-solving, while disarticulating the human monopoly of intelligence without closing the main gap between human and artificial intelligences stated by AI theorists, that Narrow AI lacks body and emotions (Payne, 2018), discussed later. keywords: ayoub; conflict; intelligence; journal; julia; payne; strategy; warfare cache: jicw-4212.pdf plain text: jicw-4212.txt item: #146 of 251 id: jicw-4214 author: Bloom, Mia M title: The first incel? The legacy of Marc Lépine date: 2022-05-31 words: 13328 flesch: 57 summary: However, the recently released Manhattan District Attorney’s briefing on the subject begins its chronology of incel attacks with Marc Lépine (p.17), despite the fact that the term did not exist in 1989. On page 17 of the mostly infographic report, the DA’s chronology lists Marc Lépine as the first incel attacker (see Appendix) but then provides no additional biographical information about Lépine in the rest of the report. keywords: abuse; attack; bloom; case; community; conflict; elliot; et al; incel; intelligence; issue; journal; lépine; marc; mia; para; rodger; suicide; terrorism; trauma; violence; volume; warfare; women cache: jicw-4214.pdf plain text: jicw-4214.txt item: #147 of 251 id: jicw-4242 author: Balgord, Evan title: Far-right populism in Canada: From M103 to the Ottawa occupation date: 2022-05-31 words: 1690 flesch: 46 summary: Mr. Balgord concluded by suggesting several paths forward, such as more regulation on social media to target hate at the outset, rather than responding to it once it has already occurred and done damage; reinstating section 13 of the Human Rights Act to allow victims to hold perpetrators accountable for defamation towards their group; amending the criminal code to make it clearer Evan Balgord 99 The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 1 that certain symbols, like the swastika and the Confederate flag, are in violation of section 319(2) and represents the willful promotion of hate propaganda. KEY EVENTS On March 17, 2022, Mr. Evan Balgord, Executive Director of the Canadian Anti- Hate Network, presented Far-Right Populism in Canada: From M103 to the Ottawa Occupation at the March Digital Roundtable event, hosted by the Canadian Association for Security and Intelligence Studies (CASIS)-Vancouver. keywords: balgord; movement; right cache: jicw-4242.pdf plain text: jicw-4242.txt item: #148 of 251 id: jicw-4250 author: Finkelstein, Joel title: Memes, viruses, and violence: A nation guide to managing contagious threats date: 2022-05-31 words: 1764 flesch: 39 summary: PushShift, which was developed by Dr. Finkelstein, is a satellite engine that collects social media content which is then processed through the Natural Language Processing analytic device and forecasts the potential escalation of memetic violence. Joel Finkelstein The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 1 86 BACKGROUND Presentation Dr. Finkelstein began his presentation by noting that memes, the modern-age communication medium, have enhanced people’s ability to communicate across traditionally isolated networks. keywords: finkelstein; memes; violence cache: jicw-4250.pdf plain text: jicw-4250.txt item: #149 of 251 id: jicw-4267 author: Huebert, Robert title: Health security, environmental security, and hard security in the Arctic: A complex relationship date: 2022-05-31 words: 1963 flesch: 40 summary: Dr. Huebert suggested Canada should approach Arctic security with a wider and more determined outlook, while still adhering to the core values of Canadian interests in the region. Dr. Huebert argued that if Canada is to take on a serious role in developing and maintaining its sovereignty over the region, the challenges and issues regarding climate change must be addressed. keywords: arctic; canada; huebert; security cache: jicw-4267.pdf plain text: jicw-4267.txt item: #150 of 251 id: jicw-4280 author: Sundstrom, Lisa title: Domestic Russian politics and comparative democratization date: 2022-05-31 words: 2036 flesch: 45 summary: In terms of how opposition could grow and lead to change, Dr. Sundstrom stated that although many people place their faith in a mass uprising of Russian citizens, the government has increased measures of repression and censorship, which makes it incredibly risky to engage in protest. Russian military casualties could also impact the public support for the war. keywords: putin; sundstrom; war cache: jicw-4280.pdf plain text: jicw-4280.txt item: #151 of 251 id: jicw-4339 author: Shaikh, Mubin title: Security and Cyber Intelligence: Where is the Line? date: 2022-11-24 words: 1907 flesch: 36 summary: Next, Mr. Shaikh discussed how contemporary barriers to counter online radicalization, such as the market-driven nature of social media corporations, may prime these corporations to be incentivized by the demand for social media Mubin Shaikh The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 2 However, Mr. Shaikh argued that these kinds of operations are now carried out by non-state actors; for instance, the Elderwood group targets human rights groups in China that denounce the government or show potential to promote human rights activism. keywords: intelligence; security; shaikh cache: jicw-4339.pdf plain text: jicw-4339.txt item: #152 of 251 id: jicw-4340 author: Hung, Ho Ting (Bosco) title: Keep Your Eyes on China’s Metaverse: Another Tool for Maintaining its National Security date: 2022-11-24 words: 8659 flesch: 49 summary: Therefore, China’s metaverse will be an isolated metaverse, having limited connections with foreign metaverses. States could therefore utilise metaverses to manipulate behaviours and alter users’ norms to their (i.e. states’) advantage” (p. 9). keywords: bosco; china; chinese; conflict; government; hung; information; intelligence; internet; journal; metaverse; people; security; ting; volume; warfare cache: jicw-4340.pdf plain text: jicw-4340.txt item: #153 of 251 id: jicw-443 author: Manz, Caitlin title: The Increased National Threat of Domestic, Right-Wing Extremist Terrorism date: 2018-05-17 words: 1477 flesch: 44 summary: Increased mobilization and cooperation of RWE groups is evident via the right- wing rally in Vancouver in August, 2017, which involved numerous groups such as the Soldiers of Odin, the Cultural Action Party, and the Worldwide Coalition Against Islam gathering in supportive response to the Charlottesville RWE rally (Ball, 2017; Eagland, 2017). RWE groups will remain fragmented, and therefore will primarily pose a threat to public order, not national security (Ellis & Parent, 2016). keywords: canada; parent; rwe; scrivens cache: jicw-443.pdf plain text: jicw-443.txt item: #154 of 251 id: jicw-445 author: Rai, Gurpreet title: States’ Use of Psychological Warfare to Deter Threats date: 2018-05-17 words: 4556 flesch: 42 summary: Keywords: Psychological warfare, states, intelligence, US In an attempt to answer this question, this paper will focus on three countries as the main case studies and delve into their adoption and employment of psychological methods: The United States (US), Russia, and India. Similarly, Russia has also actively engaged with psychological warfare methods in its military and “counter-information” operations (Kovalev, 2017). keywords: india; intelligence; methods; operations; psychological; russia; terrorism; use; warfare cache: jicw-445.pdf plain text: jicw-445.txt item: #155 of 251 id: jicw-450 author: Zhou, Kevin title: Is It Time for the Beaver to Hop off the Eagle? A Case for Canada to Reconsider Its Geopolitical Alignment with the United States date: 2018-05-17 words: 8854 flesch: 53 summary: When it comes to military affairs, France and the UK built nuclear arsenals just big enough to be considered great powers, and other European Kevin Zhou Page 10 The Journal of Intelligence, Conflict and Warfare states, much like Canada, built a conventional military with just the right strength to defend collectively against the Soviet threat as well as secure a voice in NATO decision-making and in turn influence the direction of US military pre-eminence (Kissinger, 2015). A Case for Canada to Reconsider Its Geopolitical Alignment with the United States Kevin Zhou, Simon Fraser University Disclaimer: keywords: american; canada; conflict; defence; europe; european; intelligence; international; journal; military; nato; november; ottawa; policy; power; security; states; war; warfare cache: jicw-450.pdf plain text: jicw-450.txt item: #156 of 251 id: jicw-459 author: Kurliak, Michael title: Applying the Revolution in Military Affairs to Intelligence date: 2018-05-17 words: 2636 flesch: 45 summary: Additionally, at least part of the costs could be addressed by restructuring existing intelligence agencies around a centralized information database and cutting the costs of hiring separate information collectors and intelligence analysts to produce intelligence. Keywords: Revolution in Military Affairs (RMA), intelligence, information The concept of the ‘Revolution in Military Affairs’ (RMA) goes back as early as the 1970s (Metz and Kievit, 1995), and theorizes that information technology is altering the “knowledge available to armed forces, and thus the nature of war” (Ferris, 2009, 455). keywords: decision; ferris; information; intelligence; warfare cache: jicw-459.pdf plain text: jicw-459.txt item: #157 of 251 id: jicw-463 author: Van den Boom, Rob title: Shifting Political Discourse: A Post-Structural Analysis of Power and Big Data date: 2018-05-17 words: 3254 flesch: 62 summary: A critique of the above conception of political power through a post- structuralist lens is CA’s lack of power to shift discourse from state-centric to people-centric. 5G warfare, as it’s colloquially known, is the assumption that groups vie for power against other groups, and not necessarily the state. keywords: data; discourse; people; post; power; state; warfare cache: jicw-463.pdf plain text: jicw-463.txt item: #158 of 251 id: jicw-467 author: Vancouver, CASIS title: Chinese-Russian Collaboration: The Ice Road in the Arctic date: 2018-05-17 words: 1217 flesch: 38 summary: Yamal LNG is an LNG plant and port in Russia’s Arctic Yamal peninsula whose purpose is to produce and transport LNG to East Asian markets via Russia’s Arctic coast, the Barents Sea, and the Suez Canal. The presentation given by Dr. Busza explored the involvement of Yamal LNG in pursuing an Arctic BRI through investment in a northern sea route and future plans for an Arctic Corridor between Finland and Norway, in attempts to insulate against the power of the United States (US). keywords: arctic; data; discussion; use cache: jicw-467.pdf plain text: jicw-467.txt item: #159 of 251 id: jicw-468 author: Vancouver, CASIS title: NATO and Canadian Responses to Russia since its Annexation of Crimea in 2014 date: 2018-05-17 words: 1265 flesch: 38 summary:  Russian policies should be openly debated amongst academics, the public, practitioners, etc., to ensure that policies are aligned with a coherent strategy, meeting Canada’s long-term objectives. This has created gaps in Canadian and NATO policies on coherent Russian responses. keywords: canada; nato; russia cache: jicw-468.pdf plain text: jicw-468.txt item: #160 of 251 id: jicw-476 author: candyce kelshall title: jicw-476 date: 2018-05-23 words: 5696 flesch: 44 summary: The purpose of this paper is to examine the existing approaches to police accountability and how they may or may not address changing norms and expectations of civil society. Originality/Value An exploration of the relationship between the ‘critical friend’ Community engagement model of the UK independent police advisor and the role played by this approach in reconceptualising police accountability. keywords: accountability; advisors; communities; community; enforcement; intelligence; law; police; policing; security; society; state cache: jicw-476.docx plain text: jicw-476.txt item: #161 of 251 id: jicw-483 author: Robinsmith, Hailey title: Female Radicalization in Canada: Motivations and Security Challenges date: 2018-05-24 words: 19209 flesch: 39 summary: This is also linked to the term ‘hijra’ – the term used to describe migration from “lands inhabited by infidels to Muslim lands” which has also been a way for women to contribute to jihad.9 By using the term ‘muhajirat,’ (Ottawa, Ontario: RCMP, 2009): 1.
 6 David A. Lake, “Rational Extremism: Understanding Terrorism in the Twenty-first Century,” Dialogue IO 1, no.1 (2002): 16. 7 Ibid., 17.; Kathleen M. Blee, “Women and Organized Racial Terrorism in the United States,” Studies in Conflict & Terrorism 28, no.5 (2005): 422. 8 The Soufan Group, “Foreign Fighters: An Updated Assessment of the Flow of Foreign Fighters into Syria and Iraq,” (2015): 4.; Jon Hembrey, “ISIS recruits: Radicalized young women motivated by ideology, sense of adventure,” CBC News, February 27, 2015, accessed May 18, 2016, http://www.cbc.ca/news/isis-recruits-radicalized-young-women-motivated-by- ideology-sense-of-adventure-1.2973691.; Anita Peresin and Alberto Cervone, “The Western Muhajirat of ISIS,” Studies in Conflict & Terrorism 38, no.7 (2015): 495-6. 9 Peresin and Cervone, “The Western Muhajirat,” 495-6. Hailey Robinsmith Page 5 The Journal of Intelligence, Conflict and Warfare Western women proclaim three things: a clear discontent with their life or way of living in the West, a desire to migrate to a place of ideal perfection – the caliphate, and the religious motivation for undertaking such changes. While women seek to join any number of terrorist organizations, this paper will primarily concern itself with the women that have joined ISIS, as the radicalization of Western women into this group has grown into an exponential phenomenon over the past decade with little indication that the trend is slowing down. keywords: canada; conflict; counter; female; groups; hailey; ibid; intelligence; isis; islam; jihad; journal; media; muslim; page; radicalization; robinsmith; security; social; studies; terrorism; warfare; western; women cache: jicw-483.pdf plain text: jicw-483.txt item: #162 of 251 id: jicw-5032 author: Moskalenko, Sophia; Romanova, Ekaterina title: Deadly Disinformation: Viral Conspiracy Theories as a Radicalization Mechanism date: 2022-11-24 words: 7975 flesch: 44 summary: Interestingly, although Russian disinformation targeted different countries and communities, it was about nine times more effective in English (in terms of reaching and engaging the audience rather than their content) in than it was in Russian and other languages (Poulsen, 2018). Russian disinformation’s focus on two different narratives suggests that each narrative might serve to mobilize a particular demographic. keywords: campaigns; conflict; conspiracy; disinformation; ekaterina; intelligence; journal; lgbtq; masculinity; moskalenko; qanon; romanova; russian; sophia; u.s; volume; warfare cache: jicw-5032.pdf plain text: jicw-5032.txt item: #163 of 251 id: jicw-5035 author: Gibbs Van Brunschot, Erin title: Jurisdiction and Security date: 2022-11-24 words: 1623 flesch: 30 summary: During the question-and-answer period, Dr. Gibbs Van Brunschot explored how the notion of legitimacy in jurisdiction is central to maintaining state security, and how businesses, states, and security networks must exercise their jurisdictional powers to ensure security. Dr. Gibbs Van Brunschot noted that the cases of the Freedom Convoy occupation of Ottawa and sexual assaults within the CAF represent two different types of jurisdictional challenges found in the 21st century security landscape. keywords: brunschot; gibbs; van cache: jicw-5035.pdf plain text: jicw-5035.txt item: #164 of 251 id: jicw-5038 author: Bajwa, Aman title: Malevolent Creativity & the Metaverse: How the immersive properties of the metaverse may facilitate the spread of a mass shooter’s culture date: 2022-11-24 words: 7509 flesch: 39 summary: In addition to the normalization of extremist culture, such recruitment tactics could streamline the process of radicalization, making it easier to influence vulnerable targets as AI-driven avatars in online metaverse spaces that are connected through interoperability beset them constantly. To that end, it applied the model of malevolent creativity to the extremist use of online spaces to gain insight on how such properties could aid online extremists towards mobilization. keywords: aman; bajwa; conflict; extremists; intelligence; issue; journal; mass; metaverse; online; radicalization; shootings; spaces; violence; volume; warfare cache: jicw-5038.pdf plain text: jicw-5038.txt item: #165 of 251 id: jicw-5041 author: Ortiz, Laura title: Risks of the Metaverse: A VRChat Study Case date: 2022-11-24 words: 27063 flesch: 71 summary: It's not because I'm unhappy with one update that I'll start screaming at people online and move to other games. For that reason, I'll move on to other games. keywords: avatars; community; conflict; content; devs; eac; experience; friends; game; good; intelligence; issue; journal; laura; laura ortiz; life; mods; ortiz; people; play; reviews; time; users; volume; vrchat; warfare; warfare volume; way; worlds; ♥ ♥ cache: jicw-5041.pdf plain text: jicw-5041.txt item: #166 of 251 id: jicw-5042 author: Daniele, John title: Malign Influence Operations in Narrative Warfare date: 2022-11-24 words: 1869 flesch: 35 summary: The major points discussed throughout the event included how malign influence manipulates public opinion and causes social disruption; the key tools used in this form of persuasion; the online network effect of operations that involve fake accounts and state-sponsored trolling; and possible solutions to malign influence operations. Mr. Daniele stated that through the nexus of these goals, malign influence operators can significantly enhance their ability to fracture social cohesion which is one of the real-world consequences of malign influence. keywords: daniele; influence; malign cache: jicw-5042.pdf plain text: jicw-5042.txt item: #167 of 251 id: jicw-5046 author: Adlakha-Hutcheon, Gitanjali title: MAD* Beyond Defence : *Methodology for Assessing Disruptions date: 2022-11-24 words: 5649 flesch: 48 summary: Gitanjali Adlakha-Hutcheon The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 2 160 Figure 2 Sample Concept System Card Created During an Iteration of MAD Part I Source: Adlakha-Hutcheon, 2018 presentation at CORS MAD Part II In Part II, the disruptive impact of selected CS cards formulated in Part I is assessed by two teams of experienced operators, mostly uniformed personnel, in a series of realistic operational vignettes. MAD Part II plays out as a seminar table-top wargame, where two teams develop outlines of their respective Plan of Action (POA) in response to an operational/ tactical vignette set in the future. keywords: adlakha; cards; conflict; defence; hutcheon; intelligence; journal; mad; personnel; security; warfare cache: jicw-5046.pdf plain text: jicw-5046.txt item: #168 of 251 id: jicw-5047 author: Tertzakian, Peter title: Canada's Energy Security in the Context of Global Instability date: 2022-11-24 words: 1443 flesch: 42 summary: Mr. Tertzakian also discussed how the demand for each source of energy has changed as societies evolve and priorities shift, as well as how breakpoints in the energy transition cycle can work towards progressive transitions in the long run. Question & Answer Period During the question-and-answer periods, Mr. Tertzakian emphasised the role that cultural values and social beliefs play on energy supply and demand. Exposing the effects of COVID-19 on energy supply and demand, Mr. Tertzakian illustrated how difficult it is to get off oil and shift energy sources since, in 2020, the average oil consumption was only down by 6%. keywords: energy; tertzakian cache: jicw-5047.pdf plain text: jicw-5047.txt item: #169 of 251 id: jicw-5054 author: Aziz, Navaid title: Community Centred Approach to Rehabilitation and Reintegration of Returnees date: 2022-11-24 words: 1193 flesch: 39 summary: With approximately 30-40 returnees estimated to arrive in Canada over the next few Navaid Aziz The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 2 216 months, Mr. Aziz stressed the importance of reintegrating them into the community, rather than alienating and isolating them. KEY EVENTS On September 8, 2022, Mr. Navaid Aziz, an Imam and Director at the Islamic Information Society of Calgary, presented Community Centred Approach to Rehabilitation and Reintegration of Returnees at the 2022 CASIS Vancouver Defence and Security Advisory Network (DSAN). keywords: aziz cache: jicw-5054.pdf plain text: jicw-5054.txt item: #170 of 251 id: jicw-5056 author: Prox, Ryan title: Algorithmic Technology: Fueling AI in an Ethical & Transparent Way date: 2022-11-24 words: 2198 flesch: 36 summary: Bill C-27’s intent is to ensure AI systems are developed and deployed in a transparent and ethical way that protects the rights of Canadians. Bill C-27 establishes a new regulatory framework for the development of AI systems under three acts: the Artificial Intelligence and Data Act, Personal Information and Data Protection Tribunal Act, and Consumer Privacy Protection Act. keywords: data; intelligence; learning; prox cache: jicw-5056.pdf plain text: jicw-5056.txt item: #171 of 251 id: jicw-5057 author: Knight, W. Andy title: Resiliency to Vulnerabilities and Violence in the Caribbean date: 2022-11-24 words: 1397 flesch: 24 summary: Dr. Knight also provided some policy recommendations for Canada that can aid in mitigating the violence while reinforcing the structural complex of the Caribbean. Question & Answer Period During the question-and-answer period, Dr. Knight touched upon some of the Caribbean success stories that involved the transition from independent state- based security to regional security cooperation, how the Caribbean can protect W. Andy Knight The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 2 210 itself from external economic shocks, and how the Canadian government can promote diversity and inclusion of Caribbean Canadians. To address the last question, Dr. Knight delved into ways to improve social integration of Caribbean Canadians within Canada and proposed that community initiatives focus on developing the personal identities of individual Caribbean W. Andy Knight The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 2 212 Canadians while considering the intersectionality between different identity markers (i.e., gender, religion, sexual orientation, etc.). keywords: caribbean; knight cache: jicw-5057.pdf plain text: jicw-5057.txt item: #172 of 251 id: jicw-5060 author: Cook, Joana title: Assessing the Implications for Children in Violent Extremist Families date: 2022-11-24 words: 1114 flesch: 46 summary: NATURE OF DISCUSSION Presentation Dr. Cook highlighted the importance of understanding the context of children who are part of VE families. During the question-and-answer period, Dr. Cook emphasized the importance of not stigmatizing children or women about their affiliations because they often lack any agency over their decisions. keywords: children; cook cache: jicw-5060.pdf plain text: jicw-5060.txt item: #173 of 251 id: jicw-5061 author: Yauri-Miranda, Jaseff Raziel title: The Role of the Media and Civil Society in Intelligence Accountability: The Cases of Spain and Brazil date: 2023-02-06 words: 13223 flesch: 43 summary: Microsoft Word - 23-58_COPYEDITEDThe+role+of+the+media+and+civil+society_.docx THE ROLE OF THE MEDIA AND CIVIL SOCIETY IN INTELLIGENCE ACCOUNTABILITY: THE CASES OF SPAIN AND BRAZIL Jaseff Raziel Yauri-Miranda, University of Deusto Spain Abstract This article analyses the accountability of intelligence agencies in Spain and Brazil. Keywords: intelligence accountability; the media; whistleblowers; scholars; fiction Jaseff Raziel Yauri-Miranda The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 3 24 Introduction This article is inserted in Critical Intelligence Studies (CIS)—a branch that interprets intelligence organization and knowledge as a sub-product deriving from power disputes within a sociopolitical context and historical time. keywords: accountability; actors; brazil; case; civil; conflict; government; information; intelligence; issue; jaseff; journal; media; miranda; power; public; raziel; role; security; social; society; spain; studies; volume; warfare; yauri cache: jicw-5061.pdf plain text: jicw-5061.txt item: #174 of 251 id: jicw-5068 author: Bajon, Theò title: Proliferation and Use of Improvised Explosive Devices in West Africa: A Sub-regional Approach to the Intensity of Proliferation and the Nature of Use date: 2023-01-31 words: 6337 flesch: 44 summary: Careful observation of the occurrences of IEDs incidents in the region over the period studied shows the evolution of the intensity of IEDs use with an important proliferation (Figure 5). Figure 4 Heatmap of IEDs incident densities in West Africa between 2010 and mid-2022 Theò Bajon The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 3 69 The map of incident densities over the period studied provides several distinct geographical areas characterised by a concentration of incidents. keywords: africa; conflict; devices; explosive; ieds; incidents; journal; proliferation; region; types; use; west; west africa cache: jicw-5068.pdf plain text: jicw-5068.txt item: #175 of 251 id: jicw-5071 author: Huey, Laura title: The Implications of Misinformation for Public Order Policing date: 2022-11-24 words: 1381 flesch: 50 summary: Unfortunately, very little information Laura Huey The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 2 206 is being made public about such incidents, but we need to pay attention to these kinds of tactics as they also threaten democracy, Dr. Huey stated. KEY EVENTS On September 8th, 2022, Dr. Laura Huey, a professor of Sociology at the University of Western Ontario, presented on The Implications of Misinformation for Public Order Policing. keywords: huey; police cache: jicw-5071.pdf plain text: jicw-5071.txt item: #176 of 251 id: jicw-5086 author: Celso, Anthony N title: Zawahiri’s General Guidelines and the Collapse of Al Qaeda’s Levant Network date: 2023-05-31 words: 7610 flesch: 50 summary: Decoding Al Qaeda strategy: The deep battle against America’s enemies. Al Qaeda success in Syria?. keywords: al qaeda; anthony; bin; celso; conflict; enemy; intelligence; iraq; jihadi; jihadist; journal; network; qaeda; syria; volume; warfare; zawahiri cache: jicw-5086.pdf plain text: jicw-5086.txt item: #177 of 251 id: jicw-5126 author: Gratton, Phil title: THREAT RESILIENCE IN THE REALM OF MISINFORMATION, DISINFORMATION, AND TRUST date: 2023-01-31 words: 1431 flesch: 33 summary: One of the primary concerns of disinformation campaigns is foreign interference and espionage, in which hostile state actors spread disinformation to discredit other governments’ institutions to reach their strategic goals. Ostensibly well- educated, arguably more intelligent, prominent figures can fall for disinformation just as easily as anyone, so well designed are disinformation campaigns today. keywords: disinformation; gratton; institutions cache: jicw-5126.pdf plain text: jicw-5126.txt item: #178 of 251 id: jicw-5129 author: Gibbs Van Brunschot, Erin title: Introduction to special issue - Security and the Centrality of Jurisdiction date: 2021-05-31 words: 1794 flesch: 38 summary: Private security beyond private military and security companies: Exploring diversity within private-public collaborations and its consequences for security governance. Drawing on the insights of geography, Valverde (2009), for example, explains the importance of ‘scale’ to understanding governance as it applies to security threats. keywords: governance; jurisdiction; security; threats cache: jicw-5129.pdf plain text: jicw-5129.txt item: #179 of 251 id: jicw-5148 author: Niemann, Emily title: FUTURE OF SECURITY THROUGH UX DESIGN: A CASE STUDY OF MySOS date: 2023-01-31 words: 1470 flesch: 48 summary: The key points of discussion were the UX design process, human and user-centric focuses on UX design, a case study of the MySOS app in Japan, and the impact of old processes and norms in Japanese society. Navigation is also a serious issue to be considered in UX design as too many submenus can be tricky. keywords: app; design; niemann cache: jicw-5148.pdf plain text: jicw-5148.txt item: #180 of 251 id: jicw-5170 author: Kelshall, Candyce title: 2022 WEST COAST SECURITY CONFERENCE WELCOMING REMARKS date: 2023-01-31 words: 1173 flesch: 48 summary: Kelshall spoke about the importance of the public safety community considering the emergence of new threat actors and new technologies, changing from state-based responses to identity-based responses when assessing new threats, adapting to changing norms, and collaborating beyond boundaries. She then pointed out that the law seems to be static even though we are facing new threat actors and people from a new generation become the authors, content creators, organizers, and even agitators when they cannot voice their desire for policy changes through other means. keywords: kelshall; law; safety cache: jicw-5170.pdf plain text: jicw-5170.txt item: #181 of 251 id: jicw-5171 author: Moskalenko, Sophia title: DEADLY DISINFORMATION: LGBTQ CONTAGION NARRATIVES AS RADICALIZING DISINFORMATION IN RUSSIAN PROPAGANDA date: 2023-01-31 words: 1157 flesch: 29 summary: Lastly, disinformation campaigns can be utilized to emasculate men. Dr. Moskalenko stated that disinformation narratives utilize children as a way to illustrate how a particular community is under attack by outside forces. keywords: disinformation; moskalenko cache: jicw-5171.pdf plain text: jicw-5171.txt item: #182 of 251 id: jicw-5173 author: Kupchan, Charles title: WHY NATO HAS BECOME A FLASHPOINT WITH RUSSIA IN UKRAINE date: 2023-01-31 words: 906 flesch: 55 summary: However, NATO members have decisions to make about when and how to bring the war to an end, and some questions in need of answers include: • How do we manage the risk of escalation? BACKGROUND Presentation Dr. Kupchan began his presentation with a brief summary of the values of NATO. keywords: kupchan; nato cache: jicw-5173.pdf plain text: jicw-5173.txt item: #183 of 251 id: jicw-5174 author: Janzen, Jay title: NATO’S CONCEPT FOR THE DETERRENCE AND DEFENCE OF THE EURO-ATLANTIC AREA date: 2023-01-31 words: 1543 flesch: 44 summary: The same is true with NATO communications to Allied citizens, which are always truthful and transparent. Microsoft Word - 91-95_Janzen BN_2022 ConferencePUB.docx KEY EVENTS On November 21, 2022, Brigadier-General (retired) Jay Janzen, Director of Strategic Communications with the North Atlantic Treaty Organization, presented NATO’s Concept for the Deterrence and Defence of the Euro-Atlantic Area at the 2022 West Coast Security Conference. keywords: deter; janzen; nato cache: jicw-5174.pdf plain text: jicw-5174.txt item: #184 of 251 id: jicw-5175 author: Kelshall, Candyce title: DISRUPTION: HIDING IN PLAIN SIGHT date: 2023-01-31 words: 1313 flesch: 42 summary: Ms. Kelshall then discussed the evolution of soft war between Russia and the West, beginning in 2014 with the Internet Research Agency—a Russian company known for political and business influence campaigns—committing operations consisting of troll farming and the dissemination of mis/disinformation. The presentation closed with an examination of the nuance of Russian motives in the current Russian-Ukrainian conflict BACKGROUND Ms. Kelshall began with a discussion of Generations Z and Alpha, stating that generational diversity is a key consideration in critical issues of the present and that Z and Alpha will be the driving forces in future conflict and warfare narratives. keywords: conflict; kelshall; war cache: jicw-5175.pdf plain text: jicw-5175.txt item: #185 of 251 id: jicw-5176 author: Adlakha-Hutcheon, Gitanjali title: DO DISRUPTION, IDEATION, AND INNOVATION FEED ONE ANOTHER? date: 2023-01-31 words: 1472 flesch: 32 summary: Ideation must continually be converted to innovation as a means of outpacing and avoiding ongoing disruption. In order to facilitate this process, there must be an innovative collaboration between the cutting-edge hard technologies and soft human skills, resulting in an adaptive agility and layered resilience to ongoing disruption. keywords: disruption; ideation; innovation cache: jicw-5176.pdf plain text: jicw-5176.txt item: #186 of 251 id: jicw-5177 author: Lee, Carrie title: CIVIL-MILITARY RELATIONS AND POLITICAL MILITARY RELATIONS IN THE CONTEXT OF THREAT RESILIENCY date: 2023-01-31 words: 1011 flesch: 35 summary: BACKGROUND Dr. Lee argued that even though we tend to think we are in the most complex, unique, and rapidly changing era the world has ever seen, historically speaking, that is not the case because we now have a good idea of what trending challenges await in the future. However, Dr. Lee noted that we are still unprepared to face these threats. keywords: military; relations cache: jicw-5177.pdf plain text: jicw-5177.txt item: #187 of 251 id: jicw-5178 author: Forrest, Jackie title: CANADIAN ENERGY SECURITY date: 2023-01-31 words: 1276 flesch: 46 summary: Ms. Forrest also looked at the Ukraine war as an early warning for Canadian energy security policy, as well as threats from China’s control over critical minerals and clean technologies. Further, Ms. Forrest clarified the global context of energy transition, stating that it is going to take longer than most people think, in Canada and abroad, and will require an energy mix of clean and green and fossil fuels—which industry must continue to make cleaner. keywords: canada; energy; forrest cache: jicw-5178.pdf plain text: jicw-5178.txt item: #188 of 251 id: jicw-5179 author: Prox, Ryan title: DATA & INFRASTRUCTURE SECURITY: THE RISK OF AI ENABLED CYBER ATTACKS AND QUANTUM HACKING date: 2023-02-03 words: 1686 flesch: 38 summary: Question & Answer Period Dr. Prox suggested that the profit-driven nature of the private sector has led to gaps in forward-thinking investment regarding critical infrastructure. Dr. Prox noted that in the past five years there has been a transition from data stored on simple networks to Cloud Services capable of consuming entire industrial centres containing thousands of processing cores. keywords: infrastructure; prox; security cache: jicw-5179.pdf plain text: jicw-5179.txt item: #189 of 251 id: jicw-5180 author: Tessier, Michelle title: LEVERAGING DIVERSITY, EQUALITY, AND INCLUSION (DEI) IN MEETING MODERN INTELLIGENCE CHALLENGES date: 2023-01-31 words: 971 flesch: 30 summary: Ms. Tessier suggested that DEI strategy is an effective way to address a recently observed downward trend in governmental and institutional trust, in that it allows the building and sustaining of critical relationships. The key points discussed were the ways in which DEI strategy helps the government of Canada deliver programs and services to all Canadians and examples of steps taken to ensure the implementation of such strategy. keywords: dei; intelligence; tessier cache: jicw-5180.pdf plain text: jicw-5180.txt item: #190 of 251 id: jicw-5181 author: McGuinty, David title: EMERGING NATIONAL SECURITY CONCERNS AND BUILDING STATE RESILIENCE date: 2023-01-31 words: 1487 flesch: 29 summary: NATURE OF DISCUSSION Presentation Chairman McGuinty discussed aspects of the NSICOP Act that enable NSICOP to gather information and the criteria the Committee uses for examining an issue, furthering NSCIOP’s goal of providing critical review of the NSI Community and contributing to an informed public debate on NSI issues. Committee members must obtain and maintain a Top Secret clearance and swear an oath of secrecy. keywords: committee; intelligence; nsicop; review cache: jicw-5181.pdf plain text: jicw-5181.txt item: #191 of 251 id: jicw-5182 author: Nacos, Brigitte title: INTERSECTIONS OF MASS MEDIA, TERRORISM, AND POLICY RESPONSE: HOW MASS MEDIATED REPRESENTATIONS OF TERRORISM MAY INFLUENCE COUNTERTERRORIST POLICIES date: 2023-01-31 words: 1504 flesch: 41 summary: Even though the beheadings were posted on social media, the majority of people learned about the beheadings after mainstream media picked up the stories. Dr. Brigitte Nacos The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 3 132 Question & Answer Period During the question-and-answer period, Dr. Nacos discussed the competition between mainstream media and newer forms of media, as well as the issue of censoring hate-speech on social media platforms. keywords: media; public cache: jicw-5182.pdf plain text: jicw-5182.txt item: #192 of 251 id: jicw-5183 author: Briant, Emma title: ETHICS IN DYSTOPIA? DIGITAL ADAPTATION AND US MILITARY INFORMATION OPERATIONS date: 2023-01-31 words: 1606 flesch: 35 summary: In addition, the suppression of overt forms of Russian propaganda by the U.S. has led to Russian influence operations being used covertly online, and in a similar fashion to the U.S. military’s PSYOPS. Overall, the haphazard nature in how domestic audiences are being targeted suggests more clarity is needed for the public to understand the nuances of current influence operations and how they are targeted by them. keywords: briant; information; operations; u.s cache: jicw-5183.pdf plain text: jicw-5183.txt item: #193 of 251 id: jicw-5184 author: Pherson, Randolph H. title: STRENGTHENING ANALYSIS AND CRITICAL THINKING IN TIMES OF GEOPOLITICAL UNCERTAINTY date: 2023-01-31 words: 1181 flesch: 40 summary: The third threat to intelligence Pherson put forward is climate change. Microsoft Word - 141-144_Pherson BN_2022 ConferencePUB.docx KEY EVENTS On November 22, 2022, Randolph H. Pherson, Chief Executive Officer of Globalytica, presented on Strengthening Analysis and Critical Thinking in Times of Geopolitical Uncertainty. keywords: disinformation; intelligence; pherson cache: jicw-5184.pdf plain text: jicw-5184.txt item: #194 of 251 id: jicw-5185 author: Peters, Michael title: DIVERSITY DISCUSSION: INTENTIONALITY AND BLINDSPOTS date: 2023-01-31 words: 1232 flesch: 29 summary: Regarding the challenges facing D&I programs, Dr. Peters suggested that they fall in two principal categories: institutional and conceptual. He also noted the challenge of “diversity fatigue,” in which members of organisations lack motivation in pursuing D&I programs owing to the perceived lack of substance in the process. keywords: diversity; peters; programs cache: jicw-5185.pdf plain text: jicw-5185.txt item: #195 of 251 id: jicw-5186 author: Jones, Alan title: INFORMATION INTEGRITY LAB AND THE IMPORTANCE OF CONTINUING DIGITAL EDUCATION FOR INTELLIGENCE PROFESSIONALS date: 2023-01-31 words: 820 flesch: 35 summary: The focus of the presentation was the role of uOttawa PDI in regard to educating on national security. A part of this is due to the common preconception that national security is a narrow matter and not one that is connected to other issues, such as environmental impact, societal health and well-being, the economy, or financial stability. keywords: jones; security cache: jicw-5186.pdf plain text: jicw-5186.txt item: #196 of 251 id: jicw-5187 author: Mendoza, Roberto title: PROFESSIONALIZING AND STANDARDIZING INTELLIGENCE PRACTICE IN THE CONTEXT OF NATIONAL SECURITY date: 2023-01-31 words: 1625 flesch: 21 summary: NATURE OF DISCUSSION Presentation Mr. Mendoza presented on the value of professionalizing and standardizing intelligence practices in the context of national security, the need to continue to incorporate interdisciplinary expertise into intelligence analysis, and the greater role that academia could play in the S&I Community. Question & Answer Period Drawing on lessons from Bill C-51 (otherwise known as the Anti-terrorism Act of 2015), Mr. Mendoza emphasized that having a communication strategy with Canadians is critical when implementing large or significant changes to government practices, such as introducing new comprehensive legislation. Roberto Mendoza The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 3 155 Lastly, in the context of professionalizing and standardizing intelligence practice for Canada’s national security, Mr. Mendoza made an open call to academia highlighting that there is a need for a shift in thinking within the academic community. keywords: community; intelligence; mendoza; security cache: jicw-5187.pdf plain text: jicw-5187.txt item: #197 of 251 id: jicw-5188 author: Gurski, Phil title: WHERE IS TERRORISM GOING AND ARE CANADIAN AGENCIES PREPARED TO CONFRONT IT? date: 2023-01-31 words: 1135 flesch: 33 summary: The changes to the definition of security threats broadens the scope that security agencies need to address, increasing the different types of groups that may fall within this definition, further making the definition of IMVEs unclear. When asked about potentially expanding or narrowing the mandate of the national security agency, Mr. Gurski warned that expanding the mandate can lead to an erosion of public trust—the public belief that national security agencies already have too much power. keywords: gurski; security cache: jicw-5188.pdf plain text: jicw-5188.txt item: #198 of 251 id: jicw-5189 author: Dumbrille, Charles title: PANEL TWO CLOSING REMARKS date: 2023-01-31 words: 694 flesch: 39 summary: NATURE OF DISCUSSION Mr. Dumbrille focused on the evolving challenges that rapid technological advances have presented to the intelligence and security community. Mr. Dumbrille acknowledged how the speed and scale of technological change has impacted the ISC, from the increased role assigned to intelligence analysts instead of intelligence officers, to new tracking and intelligence collection PANEL TWO CLOSING REMARKS Date: November 22, 2022 Disclaimer: keywords: dumbrille; intelligence cache: jicw-5189.pdf plain text: jicw-5189.txt item: #199 of 251 id: jicw-5190 author: Miller-Idriss, Cynthia title: EXTREMIST RECRUITMENT AND EXTREMIST SENTIMENT NORMALIZATION date: 2023-01-31 words: 1575 flesch: 34 summary: NATURE OF DISCUSSION Presentation Dr. Miller-Idriss presented an overview of the global far-right movement, highlighting the ambiguity, development, and trends therein. Cynthia Miller-Idriss The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 3 165 BACKGROUND Presentation Dr. Miller-Idriss outlined the lack of consensus regarding the terminology used to describe the global far-right movement but stated that the general ideology consists of antigovernment and antidemocratic practices and ideals, exclusionary beliefs, existential threats and conspiracies, and apocalyptic fantasies. keywords: idriss; individuals; miller; right cache: jicw-5190.pdf plain text: jicw-5190.txt item: #200 of 251 id: jicw-5191 author: Bloom, Mia title: EN(COUNTERING) TERRORISM date: 2023-01-31 words: 1309 flesch: 41 summary: NATURE OF DISCUSSION Dr. Bloom presented her research and findings on the roles of women and social media usage across several terrorist groups, drawing on her 35 years of experience in the field of terrorism studies. In the past, the face of jihadi terrorism had been typically male, but Dr. Bloom pointed to research that shows women are now on the front lines of terrorism—for example, 54% of suicide bombers in Boko Haram were female. keywords: bloom; groups; women cache: jicw-5191.pdf plain text: jicw-5191.txt item: #201 of 251 id: jicw-5192 author: Hayes, Andrew title: COUNTERING THE THREAT FROM RADICALISING INFLUENCES AND FOCUSING ON PROTECTING VULNERABLE COMMUNITIES date: 2023-01-31 words: 1675 flesch: 33 summary: CI Hayes noted that while there has been progress in decreasing extremism in individuals, supported interventions should place more emphasis on managing vulnerabilities in autistic individuals to prevent their re- entry into the criminal justice system. Andrew Hayes The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 3 174 Question & Answer Period CI Hayes elucidated on the current trend in extremist recruitment and policy implementation, the efficacy of using positive outlets for autistic individuals vulnerable to radicalization, and the recent phenomenon of extremists resorting to end-to-end encryption channels to conceal detection of their discussions and content. keywords: hayes; interests; risk cache: jicw-5192.pdf plain text: jicw-5192.txt item: #202 of 251 id: jicw-5194 author: Orr Bueno, Caroline title: FRACTURES: THE IMPACT OF DISCORD, DISINFORMATION, AND DAMAGED DEMOCRACY date: 2023-01-31 words: 1137 flesch: 36 summary: NATURE OF DISCUSSION Presentation Dr. Orr Bueno discussed the difficulty of defining disinformation, its major forms (propaganda, conspiracy theories, narratives, and memes), and what makes extremist disinformation content effective vis-a-vis the human brain and its vulnerabilities. Dr. Orr Bueno discussed what makes extremist disinformation effective, including appeals to shared moral values and grievances, blaming and scapegoating, establishing a common enemy, utilising emotion, and transference. keywords: bueno; disinformation; orr cache: jicw-5194.pdf plain text: jicw-5194.txt item: #203 of 251 id: jicw-5195 author: Kriner, Matt title: MILITANT ACCELERATIONISM date: 2023-01-31 words: 923 flesch: 42 summary: Mr. Kriner also shared three mechanisms that militant accelerationist groups participate in to pursue their manifesto and build tensions. The key points discussed were militant accelerationism, its actors, and the strategies of accelerationist groups to pursue their goals of societal collapse. keywords: accelerationism; militant cache: jicw-5195.pdf plain text: jicw-5195.txt item: #204 of 251 id: jicw-5196 author: Rowley, Chris title: BUILDING A WORKFORCE WHICH HAS THE RESILIENCE TO DEAL WITH THE DEMANDS OF POLICING date: 2023-01-31 words: 1632 flesch: 31 summary: C.C. Rowley pointed to studies in Sweden and the UK that provided empirical evidence supporting the positive implications of resilience training for law enforcement staff, citing a reduction in PTSD symptoms, correction of negative sleep patterns, and greater ability to regulate emotional responses to trauma. C.C. Rowley emphasised that the process of building resilience is not about eliminating risk and stress, as these are unavoidable. keywords: c.c; individuals; resilience; rowley cache: jicw-5196.pdf plain text: jicw-5196.txt item: #205 of 251 id: jicw-5198 author: Palmer, John title: MILITARY POLICE TRAUMA AND MENTAL HEALTH SUPPORT date: 2023-05-01 words: 1127 flesch: 40 summary: The key points discussed were the mental health and impact of trauma on Military Police (MP) personnel, the diverse range of services which are coordinated through the different Canadian Armed Forces (CAF) programs, and the realization of how MP personnel are continually exposed to trauma sources (domestic and outside of Canada deployments). The question-and-answer period brought out one of the major challenges the MP faces in terms of recruitment, the potential benefit (for MP personnel) of dealing with a different operational tempo from other police forces, and the CAF’s changes in dealing with mental health challenges. keywords: health; personnel cache: jicw-5198.pdf plain text: jicw-5198.txt item: #206 of 251 id: jicw-5199 author: Lawrence, David title: MENTAL HEALTH AND WELLBEING IN THE POLICE AND EMERGENCY SERVICES SECTOR date: 2023-01-31 words: 1809 flesch: 34 summary: The overcoming of these personal challenges can foster the view that mental health conditions are a weakness, and this exacerbates the lack of mental health literacy regarding their own issues surrounding mental health, causing symptoms to go unaddressed for many years. ● Due to the nature of these professions, personnel will encounter obstacles to their mental health; however, individual protective factors such as, good sleep quality, good physical health, use of available supports, and strong social support can promote positive mental wellbeing ● Perceived stigma—that is, individual thoughts and beliefs regarding the attitudes of others towards mental health conditions—appears to be the biggest driver in preventing personnel from seeking help, and this can be compounded by a lack of mental health literacy. keywords: health; lawrence; personnel; police cache: jicw-5199.pdf plain text: jicw-5199.txt item: #207 of 251 id: jicw-5200 author: Codrington, Thomas title: OPENING REMARKS: POLICING AND PUBLIC ORDER PANEL date: 2023-01-31 words: 573 flesch: 39 summary: To conclude, Mr. Codrington stated that the UK and Canada have agreed to deepen their national security partnership and response, which include providing citizens the necessary information they need to be more resilient against challenges, such as cyber threats or disinformation. This collaboration goes from front line policing to national security and public safety perspectives. keywords: security cache: jicw-5200.pdf plain text: jicw-5200.txt item: #208 of 251 id: jicw-5201 author: Murray, Dennis title: BUILDING TRUST IN COMMUNITIES: STRATEGIC AND TACTICAL CONSIDERATIONS date: 2023-01-31 words: 1618 flesch: 27 summary: The key points discussed were the ways in which legitimacy influences community trust, the strategic and tactical considerations for organisations seeking to raise legitimacy, and the ways in which law enforcement can successfully build long-term and sustained trust in communities. NATURE OF DISCUSSION Presentation ACC Murray discussed the importance of building community trust for police services, a process that is a direct outcome of the perceived legal, moral, political, and technical legitimacy of the organisations. keywords: community; police; trust cache: jicw-5201.pdf plain text: jicw-5201.txt item: #209 of 251 id: jicw-5202 author: Aplin, Rachael title: INDEPENDENT ADVISORY GROUPS (IAG): MANAGING THE DIVIDE BETWEEN COMMUNITIES AND POLICE IN KNOWLEDGE SHARING AND UNDERSTANDING date: 2023-01-31 words: 1716 flesch: 38 summary: Dr. Aplin noted that, in spite of benefits, IAGs can still be perceived as problematic by senior officials and it is necessary to change this narrative within police services. Dr. Aplin concluded that IAGs are under-utilised at present but represent a highly effective operational resource for police services. keywords: aplin; iags; police cache: jicw-5202.pdf plain text: jicw-5202.txt item: #210 of 251 id: jicw-5203 author: Price, Colum title: POLICING PUBLIC PROTESTS date: 2023-01-31 words: 1295 flesch: 44 summary: The implications of social disobedience falling below the criminal threshold, the future of protests, how to counter unlawful protests, and intelligence for crisis management were discussed by Mr. Price. Mr. Price stated that the challenge of protests from the perspective of law enforcement is keeping people safe, and a lack of planning, resources, coordination and communication can lead to situations that threaten life, property, and the credibility of law enforcement. keywords: price; protests; public cache: jicw-5203.pdf plain text: jicw-5203.txt item: #211 of 251 id: jicw-5204 author: Brewer, John title: STRATEGIC CONSIDERATIONS FOR MANAGING PROTESTS: A NEW ERA date: 2023-01-31 words: 759 flesch: 41 summary: CS Brewer recommended that police forces liaise with protest organizers to understand the primary objective of the movement and the overlapping issues to mitigate security threats. CS Brewer noted that proactive engagement with protest organizers and peaceful resolutions should be the main objective of police forces; however, all options should still remain available and utilized if necessary. keywords: brewer; protest cache: jicw-5204.pdf plain text: jicw-5204.txt item: #212 of 251 id: jicw-5205 author: Manak, Del title: POLICING DURING CRISES AND IN AN ERA OF NEW CHALLENGES date: 2023-01-31 words: 1647 flesch: 44 summary: Chief Manak remarked that the police must be able to maintain the public’s trust and confidence when managing public protests by ensuring officers exercise a high degree of neutrality and impartiality and enforce the law where possible. Chief Manak commented that his officers in Victoria were able to respond professionally during hundreds of public protests in 2021, even when they were instigated and taunted heavily by agitators. keywords: chief; manak; police; protest cache: jicw-5205.pdf plain text: jicw-5205.txt item: #213 of 251 id: jicw-5206 author: Hyland, Jennifer title: LESSONS LEARNED AS A NEW POLICE FORCE date: 2023-01-31 words: 1054 flesch: 34 summary: This briefing note contains the encapsulation of views presented by the speaker and does not exclusively represent the views of the Canadian Association for Security and Intelligence Studies Jennifer Hyland The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 3 234 BACKGROUND Presentation DCC Hyland began by discussing the gradual evolution of the SPS since Surrey’s 2018 decision to transition from RCMP to municipal police, stating that the organisation has been constructed from the ground up through the development of policy and mission values. DCC Hyland concluded that the SPS is committed to the community it serves, and seeks to ensure its safety through the valuing of Jennifer Hyland The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 3 235 individual experiences and collective vision, and the practice of flexibility, humility, and patience. keywords: dcc; hyland; sps cache: jicw-5206.pdf plain text: jicw-5206.txt item: #214 of 251 id: jicw-5207 author: Shaikh, Mubin title: ETHICS AND EXCELLENCE IN UNDERCOVER OPERATIONS: A HUMAN SOURCE PERSPECTIVE date: 2023-01-31 words: 1267 flesch: 39 summary: NATURE OF DISCUSSION Presentation Mr. Shaikh presented on human intelligence, human sources, motivations of undercover work, and factors that keep a human source effective and viable while undercover. Question & Answer Period During the question-and-answer period, Mr. Shaikh considered disruptions in police and undercover work, solutions that can mitigate these disruptions, weaponization of narratives, and information flow. Mubin Shaikh The Journal of Intelligence, Conflict, and Warfare Volume 5, Issue 3 238 BACKGROUND Presentation Mr. Shaikh began the presentation with terms that define human intelligence— specifically with policing, intelligence, and counter-terrorism—human source is the most accurate term that defines the individuals who work in the undercover space. keywords: shaikh; source cache: jicw-5207.pdf plain text: jicw-5207.txt item: #215 of 251 id: jicw-5208 author: Makosso, Anatole Collinet title: EMERGING SECURITY THREATS IN AFRICA date: 2023-01-31 words: 1257 flesch: 35 summary: His Excellency Prime Minister Dr. Collinet Makosso concluded the presentation by reiterating that to meet the challenges posed by emerging security threats in Africa and today's geopolitical shifts, African countries must have the capacity to strengthen resilience against these threats and work together, in active solidarity, with other countries. His Excellency the Prime Minister, Dr. Collinet Makosso suggested that there is an increasingly clear link between drug trafficking and terrorist groups, particularly on the use of the proceeds of the illicit drug trade to finance terrorist activities. keywords: collinet; makosso; prime cache: jicw-5208.pdf plain text: jicw-5208.txt item: #216 of 251 id: jicw-5209 author: Godnick, William title: MILITARY RESPONSES TO PRISON VIOLENCE IN LATIN AMERICA: A BIG MISTAKE OR A NECESSARY EVIL? date: 2023-02-02 words: 1301 flesch: 40 summary: The key points of discussion included the overpopulation of prisons in Latin America, how this can contribute to the reproduction of crime, a brief overview of prison riots in Latin America, and the interventions implemented to deal with these riots. NATURE OF DISCUSSION Presentation Dr. Godnick presented the findings of his research on prison riots in Latin America and highlighted the likely human rights violations and reproduction of crime happening within prisons. keywords: godnick; latin; prisons cache: jicw-5209.pdf plain text: jicw-5209.txt item: #217 of 251 id: jicw-5210 author: Richards, Julian title: OPENING REMARKS: CYBER RESILIENCE AND INTERNATIONAL PERSPECTIVES PANEL date: 2023-01-31 words: 723 flesch: 46 summary: To conclude, Professor Richards stated that cyber threats are not something people can completely protect themselves against. ● As cyber continues to become a more complex and interesting phenomenon, understanding cyber threats and where they are coming from is at the centre of the critical notion of resilience. keywords: cyber; threats cache: jicw-5210.pdf plain text: jicw-5210.txt item: #218 of 251 id: jicw-5211 author: Tworek, Heidi title: MEDIA/DIGITAL LITERACY IN AN ERA OF DISINFORMATION date: 2023-01-31 words: 1256 flesch: 34 summary: Individuals are more likely to seek information from people who have similar characteristics, backgrounds, and experiences to themselves, so a good way to address mis/disinformation would be to have high quality information being reported by diverse professionals. Microsoft Word - 252-256_Tworek BN_2022 ConferencePUB.docx KEY EVENTS On November 25, 2022, Dr. Heidi Tworek, Associate Professor of International History and Public Policy at the University of British Columbia, presented Media/Digital Literacy in an Era of Disinformation. keywords: abuse; disinformation; tworek cache: jicw-5211.pdf plain text: jicw-5211.txt item: #219 of 251 id: jicw-5212 author: Anning, Stephen title: THE ROLE OF AI IN SAFEGUARDING CHILDREN: A CESIUM CASE STUDY date: 2023-01-31 words: 1433 flesch: 37 summary: Discussing CESIUM, Mr. Anning purported that the above safeguarding arrangement is underpinned by a need for logistical coordination amongst partners with regards to user data. In terms of auditing CESIUM for evidence disclosure and the possibility of exporting system data into software for link analysis, Mr. Anning stated that CESIUM contains a monitoring and auditing system that keeps detailed logs of pertinent information related to records and users, but that there are no current plans to integrate it elsewhere. keywords: anning; cesium; data cache: jicw-5212.pdf plain text: jicw-5212.txt item: #220 of 251 id: jicw-5213 author: Masongsong, Mark title: UNCONVENTIONAL DATA USAGE FOR THREAT RESILIENCE: A CASE STUDY date: 2023-01-31 words: 1044 flesch: 32 summary: Question & Answer Period Mr. Masongsong expanded on how the use of data and AI technologies can aid in disaster mitigation and other security issues, such as hostile social movements. KEY POINTS OF DISCUSSION Presentation ● As insightful as data collection may be, protecting individuals’ privacy is crucial and may raise ethical concerns regarding the collection and release of data. keywords: data; masongsong cache: jicw-5213.pdf plain text: jicw-5213.txt item: #221 of 251 id: jicw-5214 author: Shull, Aaron title: CYBER SECURITY, DATA PROTECTION, AND PRIVACY IN A CONTESTED GEO-POLITICAL ENVIRONMENT date: 2023-01-31 words: 1602 flesch: 30 summary: Question & Answer Period Mr. Shull provided clarity on his discussion of privacy rights, reiterating that, while the right to privacy was being undermined by state actors, one should not expect this right to extend towards cybersecurity. Question & Answer Period Mr. Shull discussed privacy rights—their limitations, overall value, and relationship with technological comfort—as well as the possibility of personal data exploitation within future theatres of war. keywords: cyber; privacy; shull cache: jicw-5214.pdf plain text: jicw-5214.txt item: #222 of 251 id: jicw-5215 author: Kelshall, Richard title: CLOSING REMARKS: CYBER RESILIENCE AND INTERNATIONAL PERSPECTIVES PANEL — 2022 WEST COAST SECURITY CONFERENCE date: 2023-01-31 words: 801 flesch: 27 summary: Technology has created a sense of interconnectedness which has never been seen before, and needs to be taken advantage of to combat security threats. Rear Admiral Kelshall suggested that Canada could potentially follow a similar model of information sharing, where provinces and territories would have a regional joint-agency centre assessing security threats, while reporting to a central multi-agency command centre in Ottawa. keywords: kelshall; rear cache: jicw-5215.pdf plain text: jicw-5215.txt item: #223 of 251 id: jicw-524 author: Dittmar Penski, Victoria title: Why Are Violent Non-State Actors Able to Persist in the Context of the Modern State? The Case of the Maras in the Northern Triangle date: 2018-06-05 words: 8898 flesch: 48 summary: According to Avant (2005), a transnational market for force – both legal and illegal – now exists alongside the system of states, and many actors including state forces, multinational corporations, international organizations, and individuals are demanding non- state forces for the provision of security. Being secure meant, for modern states, to be in a position where they would be free of intervention by other states, or where they would be able to defend themselves in case of armed conflict (Baldwin, Victoria, Dittmar Penski Page 10 The Journal of Intelligence, Conflict and Warfare 1995). keywords: actors; case; conflict; crime; dittmar; gangs; journal; maras; penski; private; security; state; triangle; violence cache: jicw-524.pdf plain text: jicw-524.txt item: #224 of 251 id: jicw-5404 author: Shaikh, Mubin title: Radicalization Convoy: Concerns Of Domestic Extremism In Canada. date: 2023-05-31 words: 1493 flesch: 32 summary: NATURE OF DISCUSSION Mr. Shaikh framed his presentation on domestic extremism in Canada around the 2022 Freedom Convoy, highlighting the ways in which the event is the most recent event in a long lineage of extremism in the nation. Mr. Shaikh discussed the heightened attention of the security and intelligence community on jihadist terrorism following the attacks on September 11, 2001, noting that this mass casualty attack by an international terrorist group galvanized attention and resources—rightfully—away from domestic extremism. keywords: extremism; shaikh cache: jicw-5404.pdf plain text: jicw-5404.txt item: #225 of 251 id: jicw-5405 author: De Melo, Royce title: The Implications of the Wagner group in Africa and the Middle East date: 2023-05-31 words: 1450 flesch: 39 summary: Mr. De Melo asserted that Wagner group is an extension of Putin’s interests, and that Putin used the ambiguous relationship with Wagner to further foreign policy objectives by other means. Mr. De Melo contended that what differentiates Wagner group from western PMCs is that Wagner is an extension of the Russian state, while western PMCs are entirely separate from the state, being privately owned and operated. keywords: group; melo; wagner cache: jicw-5405.pdf plain text: jicw-5405.txt item: #226 of 251 id: jicw-5406 author: Stanton, Daniel title: Counterintelligence and the Changing Threat Landscape date: 2023-05-31 words: 1867 flesch: 31 summary: NATURE OF DISCUSSION Mr. Stanton outlined purpose and outcomes of CI operations—both historically and at present—while also providing a review of key players in CI globally. Mr. Stanton pointed to the aggressive, but sometimes ineffective, nature of CI operations run by PRC. keywords: intelligence; stanton cache: jicw-5406.pdf plain text: jicw-5406.txt item: #227 of 251 id: jicw-5407 author: Neal, Patrick title: Information Through the Lens of Safety and Security date: 2023-05-31 words: 975 flesch: 39 summary: Regarding the role of the Intelligence Commissioner of Canada in providing oversight of the intelligence community over datasets information, Dr. Neal stated that the Intelligence Commissioner would be involved in creating guidelines and regulations regarding datasets, but the Privacy Commissioner and constitutional lawyers would play a larger role in terms of intervention. NATURE OF DISCUSSION Dr. Neal discussed the difference between information and data, as well as how information can be used to create violent individuals. keywords: information; neal cache: jicw-5407.pdf plain text: jicw-5407.txt item: #228 of 251 id: jicw-5408 author: Anker, Lane title: Canada's Defence Intelligence Toolkit date: 2023-05-31 words: 1283 flesch: 23 summary: ● CFINTCOM and the wider Defence Intelligence Enterprise (DIE) is adapting to meet these new threats, namely through a comprehensive Defence Intelligence Enterprise Renewal (DIER) that lists key problem definition statements. Mr. Anker explained that the Commander of CFINTCOM is dual-hatted as Chief of Defence Intelligence (CDI), serving as the functional authority for intelligence across the DIE, within the Department of National Defence (DND) and Canadian Armed Forces (CAF). keywords: anker; defence; intelligence cache: jicw-5408.pdf plain text: jicw-5408.txt item: #229 of 251 id: jicw-5409 author: Straarup, Heidi title: Canadian Armed Forces Assistance to Law Enforcement and Civil Authorities date: 2023-05-31 words: 1625 flesch: 43 summary: There are specific circumstances, however, where CAF assistance to civil and LEAs can be requested pursuant to the National Defence Act (NDA)—namely, law enforcement pursuant to Public Service s. 273.6(2) and Aid of the Civil Power under Part VI—and the process for granting statutory authority is situationally dependent. LCDR Straarup emphasised that CAF assistance is in the support of the LEA of jurisdiction, and that the LEA retains full responsibility for the conduct of all law-enforcement operations. keywords: assistance; caf; law cache: jicw-5409.pdf plain text: jicw-5409.txt item: #230 of 251 id: jicw-5410 author: Adlakha-Hutcheon, Gitanjali title: Invisible Insecurity date: 2023-05-31 words: 1494 flesch: 34 summary: Dr. Adlakha-Hutcheon suggested that society has become accustomed to the preservation of security from the perspective of obvious and visible disruptors, and that there must be increased attention paid to discovering subsurface threats. Dr. Adlakha-Hutcheon presented the convergence between big and biological data; AI and machine learning; the Metaverse and multiple-identity potential; and the outsourcing of spontaneity to algorithms as the areas gaining the most momentum as subsurface threats or the not quite so visible disruptors of security. keywords: adlakha; hutcheon; security cache: jicw-5410.pdf plain text: jicw-5410.txt item: #231 of 251 id: jicw-635 author: Celso, Anthony title: The Islamic State Threat to European and North American Security date: 2018-11-15 words: 7333 flesch: 50 summary: Undaunted by the caliphate’s military reversals Islamic State supporters between 2017-2018 attacked in Stockholm, London, New York, Manchester, Toronto, Edmonton, Barcelona and Paris. Islamic State militants have used such operations to devastating effect in Nigeria, Iraq, Egypt and Indonesia. keywords: anthony; attacks; caliphate; celso; conflict; europe; fighters; intelligence; islamic; issue; jihadi; journal; page; state; terror; terrorism; volume; warfare; west cache: jicw-635.pdf plain text: jicw-635.txt item: #232 of 251 id: jicw-638 author: Vancouver, CASIS title: Jackpotting and the Canadian Banking Environment date: 2018-11-16 words: 1929 flesch: 47 summary: ATM attacks consist of physical attacks and network-based malware attacks. Retrieved from www.fireeye.com/blog/threat- research/2017/01/new_ploutus_variant.html Seifert, D. (2013) 'Criminal flash mob' accused of stealing $45 million in hours with coordinated ATM attacks. keywords: atm; attacks; cyber; dam; intelligence; issue; security cache: jicw-638.pdf plain text: jicw-638.txt item: #233 of 251 id: jicw-641 author: Vancouver, CASIS title: Russian Deep-Sea Operations and Canadian Cybersecurity Issues date: 2018-11-16 words: 1079 flesch: 43 summary: According to public sources, “participants struggled to determine whose responsibility it was to restore the cables – the grey zone between state and private ownership of sea cables was a significant hurdle for policy- makers” (Buchanan, 2018). Sea cables in a thawing Arctic. keywords: arctic; canada; intelligence; sea cache: jicw-641.pdf plain text: jicw-641.txt item: #234 of 251 id: jicw-644 author: Vancouver, CASIS title: The Dutch Terror Plot: A Cultural Motive date: 2018-11-16 words: 1756 flesch: 63 summary: 5GW Research Team Page 2 The Journal of Intelligence, Conflict, and Warfare attacks and terror plots in Europe and Canada? Arguably, it is not unreasonable that terror plots, like the Dutch terror plot, could occur in BC. keywords: conflict; dyer; para; tingle cache: jicw-644.pdf plain text: jicw-644.txt item: #235 of 251 id: jicw-646 author: Pearce, Evan title: The Night Wolves Motorcycle Club date: 2018-11-16 words: 1529 flesch: 53 summary: Moreover, both the Donbass region and the Crimea have large Russian populations and the NWMC has emphasized the well-being of Russian populations as a primary concern. The Group is active in EU and non-EU countries throughout Europe where they promote a strong right wing and pro-Russian narrative. keywords: europe; night; nwmc; wolves cache: jicw-646.pdf plain text: jicw-646.txt item: #236 of 251 id: jicw-650 author: Vancouver, CASIS title: European Energy: The Mediterranean Sea, North America as New Suppliers date: 2018-11-16 words: 1402 flesch: 47 summary: His specific focus was the future of energy security in Eurasia and how the unpredictability of geo-politics remains a dominant issue. Nature of Discussion The presentation focused on the unpredictability of geo-politics in the European theater and how this has a direct impact on energy security, as well as how North America, with Mexico excluded, could solve this issue. keywords: energy; gas; security cache: jicw-650.pdf plain text: jicw-650.txt item: #237 of 251 id: jicw-652 author: Vancouver, CASIS title: Cyber Security in an Information Warfare Age date: 2018-11-16 words: 2482 flesch: 43 summary: Key Points of Discussion and West Coast Perspectives Presentation - The distinction between information warfare and cyberwarfare should be made in order to formulate effective defences against both: information warfare is the weaponization of information, cyberwarfare is an attack on information systems. The surveillance state has arguably changed information technology security, launching momentous increases in defence spending. keywords: conflict; information; intelligence; security; warfare cache: jicw-652.pdf plain text: jicw-652.txt item: #238 of 251 id: jicw-653 author: Vancouver, CASIS title: Night Wolves Club's Influence on Kinetic Activity in Host Populations date: 2018-11-16 words: 2534 flesch: 37 summary: Particular attention may be considered to focus on NWMC’s activities in Slovakia, Germany, Australia, and the U.S. Available Options Potential increase in CAF and/or NATO personnel to Central and Eastern Europe to monitor NWMC activity; an increased pro-NATO and EU presence in Slovakia could particularly aid in countering anti- Western narratives likely to increase due to the establishment of NWMC’s new base (Peter, 2018). The NWMC’s youth NGO Night Wolves MANO, works as a soft propaganda campaign aimed at a young demographic, promoting anti-Western views and pro-Russian nationalism domestically, as well CASIS-Vancouver The Journal of Intelligence, Conflict, and Warfare Volume 1, Issue 2 Page 3 as in Crimea (see Appendix A: v) (Harris, 2018; Zabyelina, 2017). keywords: club; conflict; harris; intelligence; nwmc; russian; zabyelina cache: jicw-653.pdf plain text: jicw-653.txt item: #239 of 251 id: jicw-819 author: Bergler, Serge title: Yellow Vests, Right-Wing Extremism and the Threat to Canadian Democracy date: 2019-02-01 words: 2358 flesch: 52 summary: Beginning as a non-partisan protest against projected 2019 increases to fuel taxes, the goals of Gilets Jaunes movement have expanded to include a wide range of working and middle class economic and political grievances (Williamson, 2018). NEXT STEPS Some of the leaders of different YVC groups have been planning to protest every weekend for the foreseeable future. keywords: canada; december; movement; warfare; yellow; yvc cache: jicw-819.pdf plain text: jicw-819.txt item: #240 of 251 id: jicw-821 author: CASIS-Vancouver title: Threats to Electronic Voting Systems in Canada date: 2019-02-01 words: 1241 flesch: 42 summary: Should the province begin to expand the accessibility of convenience voting (advanced polls and absentee ballots) to include electronic voting machines and/or remote voting systems that would allow electors to cast a ballot from potentially insecure places and networks? Electronic voting introduces one more level of accountability, but it also increases levels of vulnerability. keywords: election; security; systems; voting cache: jicw-821.pdf plain text: jicw-821.txt item: #241 of 251 id: jicw-822 author: Perry, Barbara; Hofmann, David; Scrivens, Ryan title: Anti-Authority and Militia Movements in Canada date: 2019-02-01 words: 9371 flesch: 48 summary: Canadian Anti-Authority Factions We identified five distinct variants of anti-authority adherents in Canada. The final class of anti-authority adherents active in Canada are those who are either genuinely connected to Indigenous communities or who make false claims Perry, Hofmann, Scrivens 3 The Journal of Intelligence, Conflict, and Warfare Volume 1, Issue 3 to such affiliations. keywords: adherents; anti; authority; canada; canadian; conflict; fotl; government; hofmann; intelligence; issue; journal; law; movement; perry; police; scrivens; violence; volume; warfare cache: jicw-822.pdf plain text: jicw-822.txt item: #242 of 251 id: jicw-827 author: Shaikh, Mubin title: 2018 CASIS Vancouver Conference Reflections: Terrorism in Islamic Custom date: 2019-02-01 words: 830 flesch: 46 summary: I worked multiple investigations in human networks as well as password protected chat forums. There are underlying issues of ideology and grievances, interplaying between them, as well as human factors of mental health, personal failures, and personal networks from where the journey begins. keywords: http://creativecommons.org/licenses/by-nc-nd/4.0/; intelligence; isis cache: jicw-827.pdf plain text: jicw-827.txt item: #243 of 251 id: jicw-862 author: Fyffe, Greg title: Canada and the Five Eyes Partnership: Looking Ahead date: 2019-02-01 words: 3492 flesch: 50 summary: Canada was not part of the armed coalition and there was a serious threat of diminished access to US intelligence, and to our standing within the alliance. The same could apply to US intelligence used by an ally to argue against US policies. keywords: alliance; canada; conflict; eyes; intelligence; partners; partnership; security cache: jicw-862.pdf plain text: jicw-862.txt item: #244 of 251 id: jicw-951 author: Rautenbach, Peter title: The Subtle Knife: A Discussion on Hybrid Warfare and The Deterioration of Nuclear Deterrence date: 2019-12-06 words: 8693 flesch: 57 summary: Nuclear warfare has the unlimited potential for destruction, while hybrid warfare often lacks any open aggression. This will be achieved by demonstrating a scenario where hybrid warfare could escalate to actual war, thus creating a fertile ground for nuclear weapons use. keywords: attack; conflict; cyber; deterrence; hybrid; intelligence; journal; nato; states; use; warfare; weapons cache: jicw-951.pdf plain text: jicw-951.txt item: #245 of 251 id: jicw-952 author: Kocsis, Michael title: The Gaza Riots: November 2018 date: 2019-05-17 words: 1802 flesch: 54 summary: Gaza Violence: Gaza Protests: Thousands Mark ‘Great Return’ Anniversary. keywords: bbc; gaza; hamas; israel; news cache: jicw-952.pdf plain text: jicw-952.txt item: #246 of 251 id: jicw-954 author: CASIS title: The Alberta Clann and the Threat of a United Right-Wing Movement date: 2019-05-17 words: 2070 flesch: 48 summary: In a context of increasing racial tensions, grassroots activists and aspiring candidates may be tempted to CASIS Vancouver The Journal of Intelligence, Conflict, and Warfare Volume 2, Issue 1 Page 5 bend too far to the right on hot button immigration issues — and flirting with extremist groups online — to try to bring in more voters. CASIS Vancouver The Journal of Intelligence, Conflict, and Warfare Volume 2, Issue 1 Page 4 More importantly, the Royal Canadian Mounted Police has expressed its concerns that RWE groups in Canada have become enabled and empowered by the resurgent anti- immigrant and anti-Muslim rhetoric coming from the United States and Europe. keywords: canada; canadian; february; groups; intelligence; right cache: jicw-954.pdf plain text: jicw-954.txt item: #247 of 251 id: jicw-955 author: CASIS title: Canadian Supercomputer Threat Assessment and Potential Responses date: 2019-05-17 words: 3216 flesch: 36 summary: Given that Canada does not allow this bidding, there are still concerns that “the Shenzhen-based firm (Huawei Canada) has established relationships with leading research universities in Canada to create a steady pipeline of intellectual property to underpin its market position in 5G technology” (Fife & Chase, 2018 para. This briefing note is particularly relevant as Compute Canada is now preparing for 2019 resource allocation; there may be a raised/elevated security risk of economic espionage intellectual property theft and abusing education access privileges which needs to be considered (SFU Innovates Staff, 2018). keywords: access; canada; conflict; huawei; innovation; intelligence; research; security; volume; warfare cache: jicw-955.pdf plain text: jicw-955.txt item: #248 of 251 id: jicw-958 author: CASIS title: A Brief History of Social Movements in North America date: 2019-05-17 words: 3151 flesch: 56 summary: Key Differences The key differences between social movements in the 60s and 70s, illustrated by the Black Panther Party and Hippie Movement compared to current movements like the Yellow Vest Canada Movement (YVC) are the objectives of the group and the nature of the threat. Purpose Statement The purpose of this analysis is to differentiate social movements. keywords: conflict; movement; party; state; vancouver; warfare; yvc cache: jicw-958.pdf plain text: jicw-958.txt item: #249 of 251 id: jicw-959 author: CASIS title: The Role of the Dark Web in the Crime and Terrorism Nexus date: 2019-05-17 words: 2468 flesch: 53 summary: The internet is viewed as three layers: the surface web, deep web, and dark web. The internet is viewed as three layers: the surface web, deep web, and Dark Web. keywords: dark; dark web; intelligence; web cache: jicw-959.pdf plain text: jicw-959.txt item: #250 of 251 id: jicw-960 author: CASIS title: The Cyber Kinetic Singularity Affecting National Security date: 2019-05-17 words: 1233 flesch: 46 summary: In his presentation, Dr. Neal was determined to tell a story to better connect with the audience with the complexities of cyber kinetic singularities. Dr. Neal used the Alberta oil fields as an example of a prime physical structure that could be vulnerable to such malware. keywords: intelligence; neal cache: jicw-960.pdf plain text: jicw-960.txt item: #251 of 251 id: jicw-962 author: CASIS title: Canadian Intelligence Operations Overseas date: 2019-05-17 words: 904 flesch: 40 summary: Inputs range from human intelligence to sensors, but the risks associated with intelligence gathering are high. Background Presentation Captain Kempton began by explaining the basis for military intelligence and its role in preparing a commander or force for the battlefield. keywords: intelligence; peacekeeping cache: jicw-962.pdf plain text: jicw-962.txt