Daily schedule
Seminars meet each weekday morning after breakfast.
After lunch, afternoons are free for individual study or exploring the many places of interest in and around the city. Optional plenary excursions and social activities including walking tours will also be available.
The course fee includes breakfasts Monday-Saturday (residential guests only), lunches Sunday-Friday, and three-course dinners Sunday-Thursday. All meals are taken in Christ Church’s spectacular dining hall.
On Friday, there will be a special four-course gala dinner to celebrate the closing of the week.
Seminars
Monday seminars
Cyber Espionage: Revolution or Evolution?
This lecture examines the substantial impact hacking techniques are having on espionage. We start by exploring the new capabilities delivered by the digital revolution, before considering how traditional intelligence practices and cyber tradecraft interact. Then, we analyse the different use cases of cyber espionage, from gaining insight into foreign rivals to stealing an enemies' war plans. At the conclusion of this lecture students will have a strong foundational understanding of how cyber-espionage operates, and how it integrates into the wider portfolio of nation-state intelligence capabilities.
Tuesday seminars
Seduction and Secrets: Extremist Honey Traps and Hacking
This lecture explores how extremists use social engineering to trick targets into downloading malware. We will study how extremists, who typically operate with lesser skills than organised crime groups and nation-state threat actors, embrace the manipulation of human emotions to breach the devices of their targets. We will examine how extremists create online honey traps, by posing as attractive young men or women, and approaching their targets via social media with the suggestion of a romantic relationship. You will discover how this leads to eventual intelligence extraction from the target, and the countermeasures that are being taken by victims.
Wednesday seminars
Attributing Cyber Covert Actions: Unmasking the Hackers
This lecture explores the challenges of assigning cyber operations to their originators. We will examine what attribution is, why it is necessary, and how it is conducted. We will study attribution analysis frameworks, and how the process of public attribution occurs. Finally, we will explore how threat entities create false flags to misdirect investigators, and even to frame third parties. At the end of this lecture, you will understand the politics and practicalities of attribution.
Thursday seminars
Cyber Proliferation: Hacking for Sale
This lecture surveys how cyber espionage capabilities have spread to numerous countries through commercial transaction. We first explore the conditions that created the market demand for private hacking products and services. We then analyse a contract from a commercial surveillance vendor to understand how hacking transactions are structured. Finally, we explore the instruments that are being deployed in an attempt to limit proliferation.
Friday seminars
Countering Cyber Threats
This lecture analyses how states counter cyber threats, from criminal prosecutions to hacking the hackers. We start with reviewing the necessity of countering digital threats, before examining the core considerations in doing so. We then step through the portfolio of countermeasures whilst analysing each the escalatory risks of each option. By the end of this lecture, you will have a thorough awareness of the measures that nation-states can deploy to attempt to counter cyber threats.