Lecture programme
Lectures take place on Wednesdays, from 6.15pm–7.45pm (UK time).
Tuesday 28 April
Attributing Cyber Covert Actions: Unmasking the Hackers
This lecture explores the challenges of assigning cyber operations to their originators. We will examine what attribution is, why it is necessary, and how it is conducted. We will study attribution analysis frameworks, and how the process of public attribution occurs. Finally, we will explore how threat entities create false flags to misdirect investigators, and even to frame third parties. At the end of this lecture, you will understand the politics and practicalities of attribution.
Tuesday 5 May
Cyber Proliferation: Hacking for Sale
This lecture surveys how cyber espionage capabilities have spread to numerous countries through commercial transaction. We first explore the conditions that created the market demand for private hacking products and services. We then analyse a contract from a commercial surveillance vendor to understand how hacking transactions are structured. Finally, we explore the instruments that are being deployed in an attempt to limit proliferation.
Tuesday 12 May
Disinformation: Weakening Nations with Deception
This session investigates how adversaries exploit and contaminate digital information ecosystems for strategic gain. We begin by unpacking the core principles of disinformation -where it flourishes, why certain environments become fertile ground for manipulation, and how psychological and social factors make individuals vulnerable to persuasive falsehoods. Next, we turn to synthetic media. With the rise of generative AI, threat actors can now deploy convincingly fabricated content - audio, images, and video - that transcends traditional limitations such as language barriers or cultural nuance, dramatically amplifying reach and impact. Finally, we assess countermeasures designed to detect, disrupt, and diminish the spread of disinformation.
Tuesday 19 May
Cyber Espionage: Revolution or Evolution?
This lecture examines the substantial impact hacking techniques are having on espionage. We start by exploring the new capabilities delivered by the digital revolution, before considering how traditional intelligence practices and cyber tradecraft interact. Then, we analyse the different use cases of cyber espionage, from gaining insight into foreign rivals to stealing an enemies' war plans. At the conclusion of this lecture students will have a strong foundational understanding of how cyber-espionage operates, and how it integrates into the wider portfolio of nation-state intelligence capabilities.
Tuesday 26 May
Cyber Warfare: The Future of Combat?
This lecture first considers the history of cyber warfare, stretching back to the first Gulf War when US special forces considered using cyber sabotage to disable Iraqi air defences. We then study cyber warfare using three pillars: influence, espionage, sabotage. We consider how these pillars are employed before war, when they can contribute to pre-conflict advantage, and during the war, when they may aid conventional operations in numerous ways.
Tuesday 2 June
Countering Cyber Threats
This lecture analyses how states counter cyber threats, from criminal prosecutions to hacking the hackers. We start with reviewing the necessity of countering digital threats, before examining the core considerations in doing so. We then step through the portfolio of countermeasures whilst analysing each of the escalatory risks of each option. By the end of this lecture, you will have a thorough awareness of the measures that nation-states can deploy to attempt to counter cyber threats.
How and when to watch
Please join the Zoom webinar in good time before the lectures to ensure that you have no connection problems. We recommend joining 10-15 minutes before the start time. Each lecture will last approximately 45 minutes to 1 hour, followed by questions.