Hub Podcast

Why our national security needs more empathy: Stephanie Carvin reassesses the threats facing Canada

Minister of National Defence Anita Anand takes part in the Ottawa Conference on Security and Defence in Ottawa, Friday, March 11, 2022. Sean Kilpatrick/The Canadian Press.

This episode of Hub Dialogues features host Sean Speer in conversation with Carleton University professor Stephanie Carvin about her interesting new book, Stand On Guard: Reassessing Threats to Canada’s National Security, which has been shortlisted for the prestigious Donner Prize for the best public policy book by a Canadian. The prize will be awarded on Tuesday, May 31.

The two discuss new and emerging challenges to Canada’s national security, including extremism driven by online radicalization, the differences between “mal-“, “mis-“, and “disinformation”, and the importance of empathy in tackling these problems.

You can listen to this episode of Hub Dialogues on Acast, Amazon, Apple, Google, Spotify, or YouTube. A transcript of the episode is available below.

Transcripts of our podcast episodes are not fully edited for grammar or spelling.

SEAN SPEER: Welcome to Hub Dialogues. I’m your host, Sean Speer, editor-at-large at The Hub. I’m honoured to be joined today by Carleton University professor Stephanie Carvin, whose book, Stand on Guard: Reassessing Threats to Canada’s National Security, has been shortlisted for the prestigious Donner Prize for the best public policy book by a Canadian. The prize will be awarded on Tuesday, May 31. Stephanie, thank you for joining us at Hub Dialogues, and congratulations on the book and its success.

STEPHANIE CARVIN: Well, thanks for having me, and thanks for the congrats.

SEAN SPEER: The book’s title calls for a reassessment of Canada’s national security threat. What did we used to think and why does it need to be reassessed now?

STEPHANIE CARVIN: So, I call for a reassessment in the sense that it’s not that I think a lot of the threats have changed. We’re still dealing with violent extremism; we’re still dealing with espionage; we’re still dealing with foreign interference. But the way we need to actually think about those threats needs to be what I described as responsibly—underscore, underscore, underscore—widened. And that’s not to say we need to turn everything into a national security threat issue. But when we think about violent extremism, I mean, for a long time we thought it only came from Al Qaeda and the Islamic State, when just based on the events of 2022 we can see that’s clearly not the case, that there are other major threats out there. And we also need to think about who’s impacted by these. 

A lot of the time when we think about violent extremism, we think about bombs going off. But really, there’s so much more that we have to worry about, and this includes, for example, people who fundraise for these movements; people who facilitate these actors; what happens to communities when radicalizers go and try to target children. That’s increasingly what we’re seeing. I mean, we can just look at the Buffalo attack, which although it was not in Canada, it’s very similar. We’ve seen other attacks, the London attack of 2021, where very young people are consuming radicalizing materials and then acting out in violence. So, these are the kinds of things that we need to think about as violent extremist activity. It’s not just the attacks in and of themselves. That’s what I mean effectively by widening, and that’s really what I mean by reassessing. 

The other thing I would add to this is that we need to do this not out of fear. I think when we have new and scary situations, we do so out of fear; we do so in a reactionary kind of way. And that’s something else that I’m trying to warn against, which is that we need to ground our responses, strangely enough, in empathy. This may seem counterintuitive because maybe we don’t think of CSIS as the most empathetic organization, and there are many historical reasons for that, but really, from a policy response, this is what we need. We need empathy with those communities that are experiencing these challenges. We have to think about the impact of when a company loses all of its intellectual property because it’s been hacked, the impact on workers, and things like that. So that’s kind of my reassessing approach.

SEAN SPEER: That’s great, and we’ll come back to the issue of empathy which really does run through the book. Let me ask about the source of these new and emerging threats. You observe that most national security threats today come from homegrown sources. 

What legal or operational gaps are there currently in our ability to identify, track, and even proactively intervene in these cases? Should the government be pursuing changes or reforms in order to strengthen our ability to mitigate some of these spectacular threats manifesting themselves?

STEPHANIE CARVIN: That’s a really good question. I think there are both cultural and legal barriers. So, cultural is kind of what I started out with. For a long time, we assumed that terrorism could only come from the Middle East or from Al Qaeda or the Islamic State, and we’ve seen that in our prosecutions. The vast majority of terrorism prosecutions in this country are for acts that were carried out to further the end of Al Qaeda or the Islamic state. But on the other hand, when we’re talking about white nationalists or white supremacists, they’re oftentimes for hate crimes. So, that’s an issue of hypocrisy that I think has impacted the way we look at these threats for a very long time. I do think it’s starting to change. But it is, I think, a cultural barrier. 

And, you know, one of the things I have to think of is—I want to be careful what I say here because the Freedom Convoy is a very large and complex movement—but within that movement, there were extremists at the core of it, but also, I think, some who tried to latch on to it as well. And if that group had been any other group, if these people had been doing this for pretty much any other kind of extremist cause, we would have probably had a very different response from the police. Would they have let them come into town and do these kinds of things? When you had an extremist group, Diagolon, for example, coming in and recording themselves saying, “Hey, let’s turn this into Canada’s January 6,” before the event, and the police still kind of welcoming them in, you wonder like, “Are there systemic biases inherent?” And the answer is almost certainly, yes. So, I think that there are those cultural challenges. 

But legally, there are a lot of challenges too, and some of them relate to inertia. We just are really bad at updating our national security legislation. But I would say in addition to that, a lot of the questions we have to answer are complex, and I think there are some challenges here. So, for one example with violent extremism, the priority threat becomes what we call ideologically motivated violent extremism, which we usually associate with, not perfectly, the far-right, white supremacists—but you know, even in some cases the far left, it depends what we’re talking about. The distinctions aren’t always clear, even to the movements themselves. These movements exist online, right? They’re really online movements. 

So, to what extent do we want our national security agencies going online into these spaces and looking for threat-related activity? Do we want CSIS monitoring the internet is the question that we have to ask ourselves. And if so, to what extent? Because that’s a really tough question to answer. And a lot of people, a lot of civil liberties groups, have raised serious questions about how this is done, how data is absorbed, ingested, retained, and then eventually turned into products. These are very good questions. 

Another good question is even in the area of critical infrastructure protection, where you have problems with different—particularly given the Russia-Ukraine war—we’re worried about attacks on our critical infrastructure. And most critical infrastructure in Canada, as in most Western countries, is in private sector hands. But the CSIS Act actually limits who that organization can talk to. It can only really advise the government of Canada; it doesn’t give it permission to talk outside the government of Canada. So, do we actually want our national security agencies being able to talk to the private sector?

But again, civil liberties groups raise the question, “So are you going to then talk about Indigenous protesters to logging companies and mining companies? And who would do the oversight of this and these kinds of activities?” So, yes it’s a very long answer, but the answer is we have both these kinds of cultural issues. But also, we have to make some very hard decisions about how we want our national security agencies to engage in this space. It is hard to hit that right balance.

SEAN SPEER: The books definitely also talk about the human resource and operational capacity of our national security organizations. You’ve worked in these organizations and even interviewed many of the current officials for your academic scholarship. 

What’s your sense of how we compare to peer jurisdictions when it comes to human resources and overall capacity? What are our strengths and weaknesses?

STEPHANIE CARVIN: So, one of the issues is that generally speaking, and the national security intelligence committee of parliamentarians, which is one of the review bodies we have set up in Canada, did a study on Human Resources issues in Canada, including equality, diversity, and inclusion issues, and they found that while some organizations are doing okay, by and large, national security agencies are still behind other government agencies when it comes to recruiting more diverse individuals. That impacts how these organizations run, how they look at issues. 

The other thing we found is—I wrote a book separate from this one, everyone should just buy all my books, that should be the theme of this podcast—but another book that I think you definitely featured on The Hub, I believe last December, was the Intelligence of Policymaking in Canada, and for that, we actually asked officials in Canada how they felt about diversity. What was really interesting is that there were clearly two different ways they thought about diversity in the national security establishment. Some people were actually talking about EDI issues. Representation and how that matters. But it was also clear that people were thinking of like neurodiversity, and diversity in the way that people think, and that you need people who think differently. That’s a different kind of diversity than EDI. 

So, it’s funny. I’m not sure that the community itself has really thought about what it means. You can bring in people who are diverse ethnically and religiously into an organization. But if that organization still has systemic barriers in it, it’s not going to be very different. If everyone still thinks the same way, it’s not going to be very different. But then again, you can bring in people who are neurodiverse, but that doesn’t necessarily mean that you’re hitting various EDI goals. So, there’s a lot more that we need to do. 

We do have trouble recruiting generally. If you want to work in national security, it’s a long process that can take up to 18 months for security clearance. It’s a black box. Often you don’t know what’s happening. You’re just kind of waiting for, every few months, an email from HR. Some organizations have identified recruitment as possibly even one of their chief threats. Like the fact that if you are trying to recruit cyber talent, well, you’re competing with Google, you’re competing with organizations that can pay a lot more money. So, it’s all these are huge challenges that we’re facing from an HR perspective. And yeah, I’m not sure we’ve squared the circle on that either.

SEAN SPEER: If I could just follow up with a supplementary question. Today is May 26th. We released an episode of Hub Dialogues with former Canadian ambassador to China David Mulroney earlier today in which, amongst other things, he argued that the government of Canada needs to up its China competency. 

So, maybe just more broadly, are we within our national security organizations developing capacities in these new areas of potential threat from new and emerging geopolitical risks? You mentioned cyber attacks and other forms of technological attacks on Canada. Like, do you have a sense, Stephanie, in addition to the big question of EDI, if we have the right set of skills and talents and experiences to carry out the kind of national security operations that we need to in the new world you described in the book?

STEPHANIE CARVIN: I’ll answer this with two points. The first point is that one of the things that when it comes to—I agree very much with David Mulroney and what he’s saying. We don’t actually do area studies in this country. We don’t, and I think that’s a huge problem. We don’t really teach people French. You know, in Ontario you can kind of get out of it pretty early in your education. And I think that’s something we really lacked. If you go to a lot of countries around the world people are speaking like three, four languages, and it’s so important, right? And then even at the tertiary level of education, we’re not teaching the area studies in the way that I think would be useful and promote cultural exchange and understanding. So, I think that’s another issue. 

But also, I think there’s an issue that’s structural in national security agencies, which is that we have, in many of them—I can speak specifically to RCMP and CSIS—which is that they have a generalist model. If you work for the RCMP, you go, you do your training in Depot, Saskatchewan, and then you probably spend a couple of years doing rural policing somewhere on a contract basis. And then suddenly, you’re put on a complex national security file, and you’re not necessarily given the kind of training that you need in order to run this. 

We’ve had time and time again, problems with the way evidence is collected, understood, done, because we don’t really develop specialization. And I find that in Canada we don’t do training; we don’t do a lot of language training; we don’t do area training; we don’t invest in education. There’s that aspect of the training and education element, which should be ongoing. 

I mean, one of the things that—there’s a lot to criticize with the U.S. military, and let’s just say that—but one of the things they’re always doing is investing in their top leadership. There are a lot of generals, and their senior leadership have masters and PhDs. They go out and do that. Canada, we don’t really invest in that way. Then on top of that, this generalist model, which assumes that you can be put into any role and do any kind of investigation and be fine because you’ve been trained as an intelligence officer, I don’t think that’s right. I think we actually need to have a mix of generalists and specialists within our national security organizations. But this is actually just a holdover from colonial days, back to the RCMP back in the 1870s.

SEAN SPEER: That’s a great answer. A lot of food for thought there, Stephanie. If I can shift the subject to another topic, the book takes on which is the somewhat controversial issue of misinformation and disinformation. If you’ll permit me, let me ask a three-part question. 

First, how do you define these terms? Second, how do you differentiate between state-sponsored efforts versus individual activities? And three, how can we ensure that efforts to challenge or even remove misinformation and disinformation from the internet don’t threaten debatable yet legitimate ideas or arguments?

STEPHANIE CARVIN: Wow, those are some heavy questions. I feel like this can be a podcast in and of itself. So there’s disinformation. Disinformation is where you’re trying to actively promote something that’s false. Like you’re trying to promote a rumor. For example, we have seen from Russia a lot of effort to promote this idea that 5G causes COVID right at the beginning of the pandemic, or that vaccines are bad for you. All these kinds of things. Then you have misinformation, which is where the intention is a little bit different. Some people who are just misinformed are spreading bad information to people who are out there. It’s not really the same kind of intention as disinformation, but it can be just as harmful. So, someone who is reading some of these things and then is posting their own information about them and that information is wrong. 

And then I’ve actually had a third category to that, which is sometimes called malinformation. Malinformation is where you have information that’s actually hacked on the internet. So, they call it doxxing someone, D-O-X-X-I-N-G, where you get someone’s personal information then you dump it all over the internet and then you spread it for malicious purposes. Perhaps the most famous example of this is the John Podesta emails. They took the emails of a senior Democratic adviser and Hillary Clinton, and by they I mean Russia, and they spread it all over the internet. That’s a kind of malinformation. 

There really are different kinds of actors in this space. You’re right, there are both state actors and individuals in this space. I actually think the state actor aspect to this can be overrated. For a number of reasons. One, the vast majority of mis-dis-malinformation that we receive in Canada is almost certainly from the United States, and from actors in the United States. Non-state actors. There was a survey, I think, that was done by the Global Rapid Reaction Mechanism, the GRRM, at Global Affairs Canada looking at potential sources of disinformation in one of the Alberta elections, and they found that the vast majority of it, like the vast, vast, vast majority, almost all of it, was from Albertans themselves. From Canadians themselves. So, there’s that aspect of it. 

And then there’s a second part of it here, too, which is that just because a campaign exists doesn’t necessarily mean it’s going to work. A lot of times you have people who are already predisposed to believe certain ideas. They see this and they agree with it, so they put it out. But just because you see a piece of disinformation doesn’t automatically make you believe it. It’s actually hard to hack human brains that are out there. There’s a lot more that’s happening than just mis-dis-malinformation. And, you know, that gets to problems of trust and beliefs, so it’s a side unit of extremism and populism and all these other questions. 

So yeah, I would actually say the individual or non-state level here is probably actually the more complex, and then that speaks to your third question: what do you then do about it? I think to a large extent, it’s gonna depend on when we can find things that are artificially amplified by states. 

One of the things that we saw—there’s this extremely tragic case that’s happening right now in the United States with the shooting in Texas at a school. Almost immediately after malicious actors were trying to blame a transgendered individual for having committed the act. And we’ve already seen some transgender violence as directly as a result of that disinformation campaign about it. I think we have to do something about it. The social media platforms themselves are aware of this, they have been pretty successful in some aspects of this. 

So, for example, the Buffalo shooter, when he started live-streaming his attacks they were able to take down the live video, I believe, within two minutes of that. That’s actually relatively impressive. The fact that the Christchurch shooting, after the video was uploaded, Facebook ended up—there was I think 1.6 million attempts to upload the video which Facebook was able to take down 1.3 very, very quickly. But that still left 300,000 attempts that they had to then go in and find and take down as well. So we are seeing the social media companies themselves learning how to respond to this and in a much more quick fashion. 

The problem is, though, it’s the more slow-moving radicalization material that these individuals are consuming over time. You can take down videos of someone shooting someone, but the fact is we know from the manifestos in both of those incidents that these people had been consuming far-right materials for a very long period of time, and that’s where we need to focus our efforts. How we do that in a democratic way is an extremely complicated question.

I mean, we do have laws in Canada about hate speech and things like this, we just don’t seem to be able to enforce them online and in a way that is easy. I think the other thing here that’s a challenge is the takedown orders. This can sometimes impede police investigations o researchers who are trying to understand this phenomenon. There are a lot of hard questions here. 

I do note that the government has set up a committee of experts that includes both lawyers and experts on extremism who will be reporting by the end of the summer on a procedure to follow. So I’m just going to cop out of this long answer. Although to be fair, it’s a long question. I get a cop-out of this by saying I know we are expecting a report and I eagerly await the recommendations of it that I believe will be going to the heritage Minister sometime later this year.

SEAN SPEER: Stephanie, in effect, I think what I’m hearing from you is that this will necessarily require a process of trial and error and something of an iterative legal regime as opposed to a big bang. Do you want to just talk a bit about how this would involve policymakers rethinking the way that they do national security legislation from a tendency in the past to think you just need to pass a law that solves our problems versus this process of trial-and-error iteration that you’ve just outlined?

STEPHANIE CARVIN: What my concern is when we answer these questions is really how we’re not going to answer this with platitudes. Like, the best answer to hate speech is more speech. I mean, the fact is this is going to be messy, and we’re going to get things wrong. I just think the idea that we’re going to have this perfect policy is going to be a problem. And actually, I think that’s a problem for national security policy generally, which is that in Canada, we don’t actually pass a lot of legislation very often. We have this idea that, okay, we’re gonna pass this omnibus bill, usually in the wake of a tragedy like 9/11 or the October 2014 shootings, that we pass these large bills thinking, “Okay, we’ve solved the problem and we don’t have to think about this again for another 10 years.” Whereas other jurisdictions they’ll pass little small bills every other year.

The fact is we need to get used to having policies that are much more flexible and laws that can be updated much more quickly, especially when we’re dealing with these kinds of fluid issues. Because we have to work with the assumption that our first attempts to do this are going to be flawed, whether it is trying to restrict the amount of information, or how we do these things in terms of the information space. But also things like restricting funding from China when it comes to our research labs.

The government has come in and introduced all these policies now about if you want federal funding, we’re going to restrict which partners you can use. They’ve put in these policies, and there are already concerns being raised about prejudice against Asian-American or Asian-Canadian scholars, that they are being left out of applications because there’s too much fear that they’re going to be rejected by the government because they’re Chinese. That’s a real problem.

The fact is when you put these policies in place, we need to be much more nimble about them and not just see them as “Okay, we fixed this problem. Now let’s go to the next problem. Now let’s go to the next problem.” We need to have a much more robust policy. But this gets into problems of Parliament and how we don’t pass a lot of bills anymore, and that’s another issue entirely, but it does impact national security.

SEAN SPEER: Stephanie, let me ask a penultimate question about cyber attacks. It’s something you mentioned earlier, but it’s worth expanding upon because it’s a topic that the book directly addresses. How well is Canada prepared today for cyber attacks? And what should be the role of the public and private sectors to improve our capacity to defend against such attacks on our critical infrastructure?

STEPHANIE CARVIN: There’s a lot we do actually don’t know about cyber attacks in Canada and for important structural reasons. The government doesn’t like to give a lot of its secret classified information to the private sector, and the private sector doesn’t like to raise up its hand and say, “Hey, look, we got hacked,” because that’s not good for its reputation or investment that’s often needed. So they often keep these things very quiet. Or if they’re subject to a ransomware attack or their data is being held hostage, they often will find a middleman to deal with it and then pay the ransom, get the information back, rather than exposing it. And the only time we ever know if that’s the case is if personal information is taken, then it has to be reported to the Privacy Commissioner. 

So all that being said, we don’t actually have great insight into how badly Canada’s being hacked. I think there’s a large assumption that with the work from home environment we now seem to be in, even as we’re getting out of the pandemic, that there has been a surge of cybercrime because people are no longer behind corporate machines and things like that, they’re working on their home computer that maybe does not have the best up to date software and things like this. And also a lot of the hackers we’ve seen recently have been very creative with how they’re doing their crime; effectively by saying, “Oh, here’s your COVID test results,” and sending a malicious link and things like this. So, there’s a lot we don’t know and that’s a problem. 

At this wider scale of critical infrastructure, it’s interesting. Harvard University’s Belfer Center ranked Canada as number eight in the world, really, for its cyber defensive capabilities. Like we’re doing a not totally terrible job. One of the advantages that Canada has over its allies is that we’re much more nimble. We’ve really centralized our cyber responses in the Communications Security Establishment and the Canada Centre for Cybersecurity. And that’s good. Because in the U.S. cyber defense is across something like thirteen different agencies that all have to coordinate their responses when a major incident happens. And so we’re much more nimble in that respect, and I think that’s a good thing. But we have a long way to go.

Companies would rather invest or pay dividends to their shareholders. They don’t want to invest in cybersecurity. Hospitals would rather hire nurses or buy machinery rather than invest in cybersecurity. And then you have cases like in Newfoundland, last year, where where your entire hospital system goes down because it’s subject to what was almost certainly a ransomware attack. We are still exceptionally vulnerable in these ways, and we really need to encourage the private sector to be investing in these ways. So, it’s gonna be interesting to see. 

The government did just announce, of course, that it is banning, or it’s coming up with—sorry, I should say more correctly—it’s coming up with a process by which Huawei and ZTE, two Chinese companies, will be banned from 5G and therefore important parts of our critical infrastructure. But accompanying that is going to be legislation that’s going to enhance cybersecurity. Because people think that just simply banning Huawei or ZTE is going to fix the problem. It’s not right. 

The problem is that in all technology there are these gaping holes. Something we often call zero-days, where there are security flaws that we don’t know about that can be exploited by malicious actors. We need the government to do more in terms of regulation, and in terms of requirements, and possibly introducing policies that will help plug some of these holes so that if things start really going bad in the Russia-Ukraine war, that we don’t have to worry about things like our dams or electrical grids and things like this.

SEAN SPEER: You’ve been so generous with your time, Stephanie. Let me wrap up with a final question that comes back to a point you made earlier about empathy. Just have you elaborate a bit on the book’s argument that Canada should avoid, quote, “Securitizing every threat and instead deploy empathy to deal with some of these national security issues.” What do you mean by that? And why is empathy a better approach than securitization?

STEPHANIE CARVIN: Securitization is the process by which you take an issue, a political issue, and you say, “This is now a security threat,” and therefore you’re taking it out of the realm of normal politics. And you’re kind of saying we need extra-legal means or special emergency powers to actually deal with this thing. No shade on the Emergencies Act, which can be a whole different podcast as well. But the fact is that there was a lot of people saying the pandemic is a national security threat. Because of the impact that it has on our economy, on our lives, and all these things. And I would say, no, the pandemic is not a national security threat. It is a public health emergency with national security elements in it. Climate change is not a national security threat. It is a policy challenge, and it’s definitely a crisis. But it’s not one that we should be dealing with. 

I don’t think CSIS should have a climate change bureau. I mean, what it should be studying are the impacts that climate change could have on the international security environment. That makes a lot more sense. That’s what I mean. We need to right-size our understanding of what security is, and just because something’s bad doesn’t mean it’s a national security threat. There are a lot of people who want to widen the idea of security, and I’ve argued for widening the idea of threat but not necessarily our conception of security. I try to keep it fairly minimal because I don’t want CSIS pontificating on these issues. They have enough to deal with right now. So, I actually think the better response is empathy in a lot of ways.

It’s like how do we partner with communities where we know radicalizers are going in and targeting children or that have just suffered a violent extremist attack? How do we work with companies that are under the pressure of possibly being hacked and deal with them in such a way and help them recover, while perhaps being mindful of what they need in order to continue to thrive and things like that? 

One of the key issues here, too, is foreign interference, or what I call clandestine foreign influence in the book. For a long time, we’ve seen communities in Canada, the Tamil community, the Chinese community, and aspects of the Indian diaspora, they’ve been targeted by state actors and harassed. And the fact is, we’ve always seen this as a foreign issue. We don’t see these groups as Canadians, right? We don’t see them as a part of our country, a part of our fabric. But the fact is, they are and it’s unacceptable that they are being hacked, that they’re being tracked, that they’re being threatened by foreign states while they’re on Canadian territory. 

So, we need to react in such a way that’s empathetic. And perhaps most controversially, I’ll end on a controversial note, because why not be interesting, but even with the convoys in Ottawa. Not everyone there is or was a Nazi. Not everyone there was a malicious actor. This was a populist movement, and the way we need to understand the vast majority of people who participated, at least in the opening days, they were frustrated. Like, I’m frustrated with the pandemic. I’m tired of lockdowns. I’m tired of having my life restricted. Now, I’m not going to go out and protest in the streets, but I’m tired too, right? And suddenly, you have a group that offers a policy solution, which is let’s just drop everything. We’re gonna drop everything. We’re going to get rid of all the mandates and we’re gonna protest so we have it. And you know what, they offered a solution where government at all levels, municipal, provincial, and federal, didn’t offer anything. They weren’t offering hope. They were just saying, “Well, you know, we’ll wait and see.” Like, they didn’t offer any kind of hope. And I think that’s where we needed to be empathetic. I think that was the missed opportunity for this. 

So, I think when we look back at this, we have to do so through empathetic eyes and people who were tired of—and again, I’m not excusing the behavior of the organizers or the neo-Nazi groups that were trying to take advantage of this—but some of the perhaps initial supporters of this wave who saw a policy solution being offered and were supportive of that because they’re just so tired of everything. And that’s a kind of empathy.

It doesn’t mean we have to agree with them, but we have to understand their perspective in doing so. I think if we did this, then it might offer us some ways out. Again, we have to be super careful here. I don’t want to do legitimate disinformation and things like that, but understanding perhaps the policy failures that led to this movement, I think it’s gonna be really important in terms of countering it as we go forward.

SEAN SPEER: That’s just one of the many key insights of Stephanie Carvin’s book Stand on Guard: Reassessing Threats to Canada’s National Security. It’s up for the Donner Prize. This episode will be released on May 31, which happens to be the day the Donner Prize will be awarded. Stephanie, thank you so much for joining us at Hub Dialogues, and good luck on the awarding of the prize on May 31st. 

STEPHANIE CARVIN: You know honestly, they say it’s an honour to be nominated, and I really mean that. I’m up against some crazy, amazing competition, some just brilliant authors, and just to even see my name out there is like winning the prize itself. So, I’m happy as we are, this is good, this is good, this is great. And to have this come out that day, that’s even better. So, thank you for having me on.

Sign up for FREE and receive The Hub’s weekly email newsletter.

You'll get our weekly newsletter featuring The Hub’s thought-provoking insights and analysis of Canadian policy issues and in-depth interviews with the world’s sharpest minds and thinkers.