<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Between the Lines: Inner Circle Briefings]]></title><description><![CDATA[Exclusively for BTL Inner Circle Members. Members also gain access to exclusive one-on-one calls with Adam and discounted consulting services. ]]></description><link>https://www.btl-research.com/s/inner-circle-briefings</link><image><url>https://substackcdn.com/image/fetch/$s_!-B99!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb2b8d0f-7f85-4d51-aa5d-160c09a2114e_605x605.png</url><title>Between the Lines: Inner Circle Briefings</title><link>https://www.btl-research.com/s/inner-circle-briefings</link></image><generator>Substack</generator><lastBuildDate>Thu, 23 Apr 2026 22:38:18 GMT</lastBuildDate><atom:link href="https://www.btl-research.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Adam Rousselle]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[betweenthelines@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[betweenthelines@substack.com]]></itunes:email><itunes:name><![CDATA[Adam Rousselle]]></itunes:name></itunes:owner><itunes:author><![CDATA[Adam Rousselle]]></itunes:author><googleplay:owner><![CDATA[betweenthelines@substack.com]]></googleplay:owner><googleplay:email><![CDATA[betweenthelines@substack.com]]></googleplay:email><googleplay:author><![CDATA[Adam Rousselle]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Shadow Liquidity Doctrine: How Shadow Liquidity and Illicit Liquidity Shape Modern Conflict]]></title><description><![CDATA[Defining shadow liquidity as strategic infrastructure &#8212; the foundation of global conflict, gray zone operations, and covert power.]]></description><link>https://www.btl-research.com/p/the-shadow-liquidity-doctrine-how</link><guid isPermaLink="false">https://www.btl-research.com/p/the-shadow-liquidity-doctrine-how</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Thu, 03 Jul 2025 14:24:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0O_o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0O_o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0O_o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0O_o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2486167,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.btl-research.com/i/167437408?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0O_o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!0O_o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1e34e8c-14bf-4bdd-b70d-0998e6aeb6da_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h1>Personal Statement</h1><p><em>This doctrine represents the culmination of years of research and observation, developed with one goal in mind: to deepen our collective understanding of conflict and to strengthen global security. By exposing the hidden architectures of power that sustain violence and destabilization, my hope is to empower policymakers, analysts, and practitioners to act with greater precision and integrity.</em></p><h1>Introduction: Seeing Beyond the Surface</h1><p>Analysts and policymakers fixate on ideology, kinetic power, and narrative legitimacy. Although these are legitimate aspects of conflict, they are surface expressions&#8212;the visible faces of power. Beneath them flows a deeper, often invisible force: <strong>shadow liquidity</strong>.</p><p><strong>Shadow liquidity</strong>, together with its operational twin <strong>illicit liquidity</strong>, is not an accidental byproduct of corruption or desperation. These hidden financial flows are deliberate infrastructures&#8212;vast, adaptive rivers of value that sustain regimes, networks, and transnational movements long after their ideological or military foundations might otherwise collapse.</p><p>The <strong>Shadow Liquidity Doctrine</strong> asserts that these hidden liquidity systems are not simply criminal anomalies; they are core strategic infrastructures designed for plausible deniability, resilience, and speed. Understanding <strong>shadow liquidity</strong> and <strong>illicit liquidity as strategic infrastructures</strong> is essential for decoding modern conflict and global power dynamics.</p><p>At the core of this doctrine is a singular proposition: <strong>liquidity is sovereignty</strong>. A state&#8217;s ability to generate and control liquidity &#8212; to centralize flows, enforce trust, and maintain internal capital coherence &#8212; is the ultimate foundation of its strength. When liquidity fragments and escapes the core, sovereignty dissolves, often long before visible collapse.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.btl-research.com/subscribe?"><span>Subscribe now</span></a></p>
      <p>
          <a href="https://www.btl-research.com/p/the-shadow-liquidity-doctrine-how">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Shadow Capital and Strategic Risk in the Canadian Financial System]]></title><description><![CDATA[Mapping the Silent Threat of Opaque Capital in Canadian Markets]]></description><link>https://www.btl-research.com/p/shadow-capital-and-strategic-risk</link><guid isPermaLink="false">https://www.btl-research.com/p/shadow-capital-and-strategic-risk</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Wed, 25 Jun 2025 17:53:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-B99!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb2b8d0f-7f85-4d51-aa5d-160c09a2114e_605x605.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h1><strong>Executive Summary</strong></h1><p>Canada&#8217;s financial system is increasingly exposed to opaque capital flows that originate in or move through offshore ecosystems dominated by Chinese actors, dollarized crypto corridors, and hybrid gray-market financial networks. While typically viewed as niche laundering threats, these systems now function as <strong>infrastructure</strong>&#8212;supporting dual-use tech acquisition, sanctions evasion, and the quiet relocation of elite capital from authoritarian regimes. However, a growing body of evidence suggests this capital is heavily tied to adversarial state and criminal risks. If and when sanctions come for these systems, Canada&#8217;s capital markets will face systemic challenges.</p><p>This briefing argues that <strong>illicit liquidity is not just a criminal threat&#8212;it&#8217;s a strategic vulnerability.</strong> Without stronger typology mapping and enforcement mechanisms, Canadian institutions may unwittingly enable flows that expose them to retroactive U.S. enforcement, institutional reputation loss, and broader geopolitical entanglement.</p><p><em>Those who wait for regulators will lose first. Founding Members get there before the fallout.</em></p>
      <p>
          <a href="https://www.btl-research.com/p/shadow-capital-and-strategic-risk">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Inner Circle Briefing I: Shadow Finance, Stablecoins, and the Future of Conflict]]></title><description><![CDATA[The financial frontier of modern conflict isn&#8217;t just on-chain&#8212;it&#8217;s embedded in gray networks, proxy intermediaries, and stablecoins governments can&#8217;t stop.]]></description><link>https://www.btl-research.com/p/inner-circle-briefing-i-shadow-finance</link><guid isPermaLink="false">https://www.btl-research.com/p/inner-circle-briefing-i-shadow-finance</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Tue, 24 Jun 2025 17:41:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-B99!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb2b8d0f-7f85-4d51-aa5d-160c09a2114e_605x605.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Executive Summary</strong></p><p>This briefing draws on recent investigations conducted by Between the Lines Research and intersects with blockchain analytics firms public-sector and regional priorities. It outlines how sanctioned states and affiliated actors are constructing adaptive informal financial infrastructures to bypass AML/KYC enforcement, using stablecoins (especially USDT on TRON), OTC brokers, shell firms, and hybrid cash-crypto settlement systems. The goal is to provide typologies and behavioral insight that can enhance public-private threat finance collaboration and complement on-chain attribution efforts.</p><p>This briefing synthesizes findings from three recent investigations:</p><p>&#183; Iran&#8217;s asymmetric crypto finance architecture</p><p>&#183; China's informal capital networks and global laundering architecture</p><p>&#183; Hezbollah-linked activity in Latin America</p><p>&#183; Houthi oil and stablecoin laundering ecosystems</p><p>Each section includes behavioral patterns, regional risk zones, and key implications for compliance, tracing, and enforcement.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.btl-research.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This post is exclusively for Inner Circle Members. For exclusive access to this and other briefings, plus additional perks, become an Inner Circle Member . </p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>
      <p>
          <a href="https://www.btl-research.com/p/inner-circle-briefing-i-shadow-finance">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Inner Circle Briefing: Illicit Rosewood & Timber Exports from the Central African Republic (CAR)]]></title><description><![CDATA[Illicit Timber as Financial Infrastructure in Russian and Chinese Gray Zone Operations]]></description><link>https://www.btl-research.com/p/founding-member-briefing-illicit</link><guid isPermaLink="false">https://www.btl-research.com/p/founding-member-briefing-illicit</guid><dc:creator><![CDATA[Adam Rousselle]]></dc:creator><pubDate>Tue, 24 Jun 2025 17:31:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-B99!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb2b8d0f-7f85-4d51-aa5d-160c09a2114e_605x605.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Note: This report is available exclusivey to Between the Lines founding members. For questions, citations, or private briefing requests related to this work, please contact me directly.</em></p><p><strong>Executive Summary</strong></p><p>Illicit rosewood exports from the Central African Republic (CAR) have become a strategic revenue stream for armed groups, corrupt intermediaries, and transnational facilitators. While CAR is not the region&#8217;s largest rosewood source, it&#8217;s an increasingly important transit and laundering hub for Pterocarpus erinaceus (Kosso), Entandrophragma cylindricum (Sapelli/African Mahogany), and Triplochiton scleroxylon (Ayous/Obeche). These woods are trafficked via transit corridors through Cameroon (Douala) and the Republic of the Congo<strong> </strong>(Pointe&#8209;Noire), using falsified documentation, shell firms, and weak enforcement.</p>
      <p>
          <a href="https://www.btl-research.com/p/founding-member-briefing-illicit">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>