Vol. 3 No. 3 (2021): 2020 West Coast Security Conference Proceedings on Contemporary Conflict
2020 West Coast Security Conference Proceedings on Contemporary Conflict

Technology’s role in spreading extremism and the development of cyber capabilities by non-state actors present new challenges to policing and defence in the 21st century. The third annual CASIS West Coast Security Conference presented an opportunity for academics and practitioners to share information regarding extremist movements, the role of data analytics, cyber aggression, and the impact of artificial intelligence in shaping the future of defence strategy. The following pieces are a reflection of presentations and discussion panels that took place during our five-day conference. This edition may be used to inform responses to emerging national and international security threats of a non-traditional and often ambiguous nature. 

JICW Editor-in-Chief's Note

I am pleased to present Volume 3 Issue 3 of the Journal of Intelligence, Conflict, and Warfare inspired by CASIS Vancouver’s 3rd Annual West Coast Security Conference: The Shape of Contemporary Conflict. Not only was this our most successful conference to date, but the insightful conversations that were borne from the many impactful presentations brought to light new and exciting ideas worth further exploration and research. The three thought provoking articles chosen for this issue represent some of these ideas which I hope inspire others to further discussion and research on contemporary threats and emerging trends in security.

The goal for this issue was to provide those who were unable to join us at our conference with a written synopsis of the themes and research presented. A key pillar of CASIS Vancouver is the dissemination of knowledge and research, which is predominantly achieved through the triannual publication of this journal. As the ever-present COVID-19 pandemic introduced a heightened sense of instability and insecurity around the world in 2020, our hope is that the research presented at the conference, and herewith, will bring a sense of reassurance as to the future of the security sphere. My hope is that, with a vaccine now being rolled out, my colleagues and my fellow academics and practitioners will be inspired and unencumbered to continue their research and writing. I look forward to the wide range of engaging submissions to this journal in the coming months.

Finally, I would like to thank my production team and those authors and reviewers who have risen to the occasion during these uncertain times to continue their hard work and dedication to this journal. I am immensely grateful to a new member of the production team, Nancy Mireles, who stepped into the production coordinator position and gracefully ensured that this 2020 Conference Proceedings Special Issue was published meticulously. Moreover, the reliability and hard work embodied by each member of the production team – Marco Autelitano, Eduardo Franco, Anika Kale, Jonathan Lee, Amanda Makosso, and Gurpreet Tung – has been a source of immense pride and comfort to myself and the rest of the Journal’s management team. Thank you.

Sincerely yours,

Candyce Kelshall

 

Note: All pieces published in this Conference Proceedings edition follow the same citing format as journal articles. To see different citation styles, click on the "More Citations Format" button located within each item's page.

Thought-Pieces

Andrew Dalip
34-54
Intelligence and Corruption
PDF

Conference Briefing Notes

Vincent Virk
55-58
Leading in a Data Centric Society
PDF
Mark Masongsong
59-62
Data Analytics and Public Safety
PDF
Sophia Moskalenko
63-65
Radicalization in the Age of Social Media: Mass Identity Manipulations (MIMs)
PDF
Duong Vu
66-69
Leveraging Big Data to Detect Amenity Gaps to Improve Public Safety
PDF
Chloe Bynoe
70-72
What Security Means to Me
PDF
Adam Palmer
73-75
Artificial Intelligence and Police Decision Making Processes
PDF
Phil Gratton
76-79
Intelligence Challenges of the Data Rich World
PDF
Antonio Sanchez Ortega
80-82
EU PROPHETS project on policing tools for terrorism
PDF
Hany Farid
83-87
Detecting and Combating Deep Fakes
PDF
Asif Rashid
88-90
How policing has changed since COVID-19
PDF
Kathy Macdonald
91-94
Cyber investigation: A new frontier for police
PDF
Michael A. Hennessy
95-97
Revisiting Disruptive Technology and the Innovator’s Dilemma in the Age of Cybersecurity
PDF
James Patrick Welch
98-100
Drone Warfare in Transnational Armed Conflict and Counterterrorism
PDF
Paul Jenkins
101-105
The Challenges of Data Acquisition and the Use of Artificial Intelligence/Machine Learning
PDF
Loch K. Johnson
106-110
Spy watching: Intelligence accountability in the United States
PDF
Mubin Shaikh
111-113
Social Media as a Recruitment Tool by Extremist Groups
PDF
Dwayne McDonald
114-116
Policing in the 21st Century
PDF
Elaine Frantz
117-119
The Use of Popular Culture and Norms by Extremists
PDF
Andrew Dalip
120-124
Intelligence and Risks Posed by Corruption
PDF
Emma Briant
125-127
Lessons from the Cambridge Analytica Crisis: Confronting Today's (Dis)information Challenges
PDF
Lucy D'Orsi
128-130
Policing During COVID-19: Perspectives from MET Police, UK
PDF
John Ferris
131-134
Behind the Enigma: The Authorized History of GCHQ, Britain's Secret Cyber-Intelligence Agency
PDF
Clark McCauley
135-137
Countering Extremist Violence (CEV)
PDF
Julian Richards
138-140
Extremist Propaganda and the 'Politics of the Internet'
PDF
Victoria Dittmar
141-143
Organized Crime Groups in Latin America and TREX-Hybridity
PDF
Candyce Kelshall
144-150
Soft Violence, Social Radicalisation, and Violent Transnational Social Movements (VTSMs)
PDF
Shandon Harris-Hogan
151-155
Countering Violent Extremism: Perspectives from the Australian Context
PDF
Natalie Archutowski, Serge Bergler
156-161
Gen Z as Security Content Creators: Recreating the Terms of the Social Contract
PDF
Julien Bellaiche
162-167
QAnon: A rising threat to democracy?
PDF
Archilus Phillips
168-173
Interagency Collaboration and National Security
PDF
Viveca S. Greene
174-175
The Use of Memes and Satire by the Alt-right and Gen Z Activists – Exclusion vs Inclusion
PDF
Andrew Hayes
176-179
Combatting Terrorism and Extremism in Wales: Operational Policing
PDF
John Ardis
180-184
Applied (Active Measures) Counterintelligence
PDF
Rizwan Mustafa
185-189
Islamic Extremism
PDF
Robert Gordon
190-193
Engaging the Private Sector for National Security
PDF
Kerry Waterman
194-198
How Small States Work Together for Regional Security in Complex Security Threat Environments
PDF