Security
Security
TSAS WP16-14: Talking to Foreign Fighters: Socio-Economic Push versus Existential Pull Factors
The research acquired primary data through interviews with foreign fighters in Syria and Iraq, the families and friends of such fighters, and other online supporters of jihadism, to better understand – …
TSAS WP16-13: Trying to Talk to Terrorists: Ethical and Methodological Challenges in Canada
Scholars have long shied away from talking to terrorists. This is because there are significant methodological and ethical problems posed by such research. How can we manage those challenges and – …
Making CVE Work: A Focused Approach Based on Process Disruption
Abstract: One of the biggest barriers to designing a comprehensive Countering Violent Extremism (CVE) programme is defining its scope. This paper argues for a narrow approach, focusing on disengagement and – …
Towards a Guide for Constructing and Disseminating Counternarratives to Reduce Support for Terrorism
Abstract: Despite widespread recognition that the use of counternarratives is an important strategic component of countering violent extremism, to date, there are no comprehensive guidelines on how to develop and – …
Expressions of political practice: Collective angst moderates politicized collective identity to predict support for political protest (peaceful or violent) among diaspora group members
Abstract: In two studies, we examined an ethnic group (Tamil or Somali) at a key point in their history – when violent conflict rages in their homeland that will determine – …
The Psychology of Military Decision Making: Inertia, Expertise, and Least-Worse Decisions
Civilian casualties in Afghanistan
The monthly tally of civilian casualties in Afghanistan traces the war’s grim trajectory. Thousands of Afghan bystanders are killed and maimed each year in clashes between insurgents and the coalition – …
Visible War: Information War, Surveillance and Speed
The Routledge Handbook of Surveillance Studies
Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance – …
Review of Fallout: Nuclear Diplomacy in an Age of Global Fracture,
Women as Professional Soldiers: Canadian Values on the Front Line
Cowardly Traitor or Heroic Whistleblower? The Impact of Edward Snowden’s Disclosures on Canada and the United Kingdom’s Security Establishments
The Dallas Patrol Management Experiment: Can AVL Technologies be Used to Harness Unallocated Patrol Time For Crime Prevention?
Police Work in International Peace Operations Environments: A Perspective From Canadian Police Officers in the MINUSTAH
Police Work and New ‘Security Devices’: A Tale from the Beat
Beyond the Castle Model of Cybersecurity
Police and Cameras
From Protection to Resilience: Critical Infrastructure Security in Canada
Developing a Typology of Terrorism Involvement as a Basis to Planning for Sentencing, Management, Risk Reduction, Release and Monitoring of Terrorist Offenders
‘Questions about Dawlah. DM me, plz.’ The Sock Puppet Problem in Online Terrorism Research
Identifying Digital Threats in a Hacker Web Forum
To prevent the Existence of People Dedicated to Causing Trouble: Dirty Work, Social Control and Paramilitaries in Colombia
Defence Policy, ‘Walmart Style’: Canadian lessons in ‘not-so-grand’ strategy
‘This Isn’t What I Signed Up For’: When Officer Role Expectations Conflict with the Realities of General Duty Work in Rural Communities
Abstract: Although some insight into the sources and scope of occupational stress among rural police officers exists, historically, researchers have focused largely on their policing styles, rather than the relationship – …
From Seeds to Orchards: Using Evidence-Based Policing to Address Canada’s Policing Research Needs.
Stumbling Toward Total Information Awareness: The Security of Canada Information Sharing Act
Neutrality Law, Anti-terrorism and Foreign Fighters: Legal Solutions to the Recruitment of Canadians to Foreign Insurgencies
The ecology of trust among hackers
Abstract: Malicious hackers profit from the division of labour among highly skilled associates. However, duplicity and betrayal form an intrinsic part of their daily operations. This article examines how a – …
Comment le jihadisme est-il devenu numérique ? Évolutions, tendances et ripostes,
Abstract: Twitter constitue un terrain de jeu de prédilection pour le groupe État islamique (EI) : espace de médiatisation, de revendication et de mobilisation. Depuis sa matrice de naissance afghane – …
Toward a Framework Understanding of Online Programs for Countering Violent Extremism
Abstract: There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means – …
Voices of the Caucasus Emirate: Mapping and analyzing North Caucasus insurgency websites.
Abstract: This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. Using a mixed methods research design that – …
‘Just Being Mean to Somebody Isn’t a Police Matter’: Police Perspectives on Policing Cyber-bullying
Abstract: Increasing public awareness of cyberbullying, coupled with several highly publicized youth suicides linked to electronic bullying, have led lawmakers and politicians to consider new criminal legislation specifically related to – …
Iterations of Olympic security: Montreal and Vancouver
Abstract: This article compares security dynamics at two Olympic Games hosted by Canada: Montreal (1976) and Vancouver (2010). It is the first study of security at the Montreal Olympics and – …
L’analyse du risque géopolitique: du plausible au probable
Abstract: This paper is going to explore the logical process behind risk analysis, particularly in geopolitics. The main goal is to demonstrate the ambiguities behind risk calculation and to highlight – …
A group-based recidivist sentencing premium? The role of context and cohort effects in the sentencing of terrorist offenders
Despite recent interest in terrorism little is known about the sentencing of terrorist offenders, and the impact of cohort effects on the sentencing patterns of offenders over the course of – …
Current National Security and Human Rights Issues in the UK, Canada and Hong Kong
Counter-Insurgency Intelligence: Looking Forward by Looking Back.
About the Book: This thought-provoking work analyzes the major debates surrounding counterinsurgency campaigns and uncovers the internal security problems derailing effective strategies for restoring stability. As countries across the globe – …
A Pragmatic approach to the online risk assessment of violent extremists
About the Book: Advances in digital technologies have provided ample positive impacts to modern society; however, in addition to such benefits, these innovations have inadvertently created a new venue for – …
High Visibility Policing: Policing on Camera and the Crisis of Police Legitimacy
The public now expects that police work will be video recorded. This challenges the foundational axiom that police work is a “low-visibility” occupation. Technological and social developments are rapidly making – …
Private Eyes: Private Policing and Surveillance
About the Book: The increasing privatization of security across the globe has been the subject of much debate and controversy, inciting fears of private warfare and even the collapse of – …