National Security and Cyber: Espionage and Warfare

Overview

Espionage and warfare evolve relentlessly. The history of digital networks is inextricably intertwined with spies and soldiers. 

This online lecture series starts by examining the complex mission of tracing state-sponsored hackers to their home countries. You will examine the dangers of false-flag operations that could contribute to international tensions and perhaps even the outbreak of hostilities. You will learn how cyber hacking capabilities are proliferating globally due to private sector cyber-espionage companies who have commercialised the hacking. The methods to limit this proliferation will be studied to understand whether the trend can be halted, or if it is a new reality that must be managed. 

Disinformation is a core practice to destabilise adversaries whilst operating below the threshold of war. You will explore its core features, understanding the impact of artificial intelligence, and the measures available to reduce its efficacy. Cyber-espionage is a critical capability that over time can help to change the balance of power between nations. You will learn how espionage went digital, and how this is perhaps the most seismic impact resulting from the emergence of hacking techniques. 

States are still experimenting with how to most effectively use hacking during war. You will examine how such techniques can be deployed before and during conflict to degrade the enemies’ capabilities and support conventional operations. 

Finally, you will examine the broad array of instruments at the disposal of the state to counter cyber threats. 

Please note:

  • Due to the nature of the contents of this day, this is not suitable for people under 18 years old.
  • This lecture series will close to enrolments at 23:59 BST on 23 April 2026.

Programme details

Lecture programme

Lectures take place on Wednesdays, from 6.15pm–7.45pm (UK time).

Tuesday 28 April 
Attributing Cyber Covert Actions: Unmasking the Hackers 

 This lecture explores the challenges of assigning cyber operations to their originators. We will examine what attribution is, why it is necessary, and how it is conducted. We will study attribution analysis frameworks, and how the process of public attribution occurs. Finally, we will explore how threat entities create false flags to misdirect investigators, and even to frame third parties. At the end of this lecture, you will understand the politics and practicalities of attribution.  

Tuesday 5 May 
Cyber Proliferation: Hacking for Sale  

This lecture surveys how cyber espionage capabilities have spread to numerous countries through commercial transaction. We first explore the conditions that created the market demand for private hacking products and services. We then analyse a contract from a commercial surveillance vendor to understand how hacking transactions are structured. Finally, we explore the instruments that are being deployed in an attempt to limit proliferation. 

Tuesday 12 May
Disinformation: Weakening Nations with Deception  

This session investigates how adversaries exploit and contaminate digital information ecosystems for strategic gain. We begin by unpacking the core principles of disinformation -where it flourishes, why certain environments become fertile ground for manipulation, and how psychological and social factors make individuals vulnerable to persuasive falsehoods. Next, we turn to synthetic media. With the rise of generative AI, threat actors can now deploy convincingly fabricated content - audio, images, and video - that transcends traditional limitations such as language barriers or cultural nuance, dramatically amplifying reach and impact. Finally, we assess countermeasures designed to detect, disrupt, and diminish the spread of disinformation. 

Tuesday 19 May
Cyber Espionage: Revolution or Evolution? 

This lecture examines the substantial impact hacking techniques are having on espionage. We start by exploring the new capabilities delivered by the digital revolution, before considering how traditional intelligence practices and cyber tradecraft interact. Then, we analyse the different use cases of cyber espionage, from gaining insight into foreign rivals to stealing an enemies' war plans. At the conclusion of this lecture students will have a strong foundational understanding of how cyber-espionage operates, and how it integrates into the wider portfolio of nation-state intelligence capabilities. 

Tuesday 26 May 
Cyber Warfare: The Future of Combat? 

This lecture first considers the history of cyber warfare, stretching back to the first Gulf War when US special forces considered using cyber sabotage to disable Iraqi air defences. We then study cyber warfare using three pillars: influence, espionage, sabotage. We consider how these pillars are employed before war, when they can contribute to pre-conflict advantage, and during the war, when they may aid conventional operations in numerous ways. 

Tuesday 2 June
Countering Cyber Threats  

This lecture analyses how states counter cyber threats, from criminal prosecutions to hacking the hackers. We start with reviewing the necessity of countering digital threats, before examining the core considerations in doing so. We then step through the portfolio of countermeasures whilst analysing each of the escalatory risks of each option. By the end of this lecture, you will have a thorough awareness of the measures that nation-states can deploy to attempt to counter cyber threats. 

How and when to watch

Please join the Zoom webinar in good time before the lectures to ensure that you have no connection problems. We recommend joining 10-15 minutes before the start time. Each lecture will last approximately 45 minutes to 1 hour, followed by questions. 

Fees

Description Costs
Event Fee £75.00

Funding

If you are in receipt of a UK state benefit or are a full-time student in the UK you may be eligible for a reduction of 50% of tuition fees.

Concessionary fees for short courses

Tutor

Dr Craig Jarvis

Course Director

Craig is an independent academic specialising in national security and technology. He lectures at Oxford, Cambridge, Imperial College London, and Royal Holloway. His next book, ‘Cyber Terrorism: Extremism & Hacking’ will be published in 2026. Previous works include 'CryptoWars: The Fight for Privacy in the Digital Age' and contributions to 'Next Generation Enterprise Security'. His research also appears in peer-reviewed journals, including 'Intelligence and National Security'.
Craig holds a PhD in cybersecurity and history and has earned master’s degrees in international security, information security, and classical music, studying at Oxford, King’s College London, and Royal Holloway.
With extensive industry experience, his last permanent role was Chief Technology Officer at DXC Security, then the world’s largest security services provider. At DXC, he founded DXC Security Labs, spearheading advancements in cybersecurity research and development.

Craig remains deeply engaged with the private sector, particularly in finance, where he advises major banks and private equity firms on security strategy, architecture, and cyber due diligence. As a member of the Offensive Cyber Working Group's College of Experts, he contributes to research and policy development in offensive cybersecurity. He is also the founding chair of the Geopolitics-Cyber Community of London Experts (GeoCyclone), an organisation bringing together business leaders, academics, and policy makers to share knowledge on national security and digital technologies.
He is currently studying Mandarin (HSK4).

Craig is active on LinkedIn, often posting details of upcoming courses and ongoing research.

Application

Please use the 'Book' button on this page. Alternatively, please contact us to obtain an application form.

IT requirements

Joining the series online

We will be using Zoom for the livestreaming of this lecture series. You’ll be able to see and hear the speaker, and to submit questions via the Zoom interface. Joining instructions will be sent out prior to the start date. We recommend that you join the sessions at least 10-15 minutes prior to the start time – just as you might arrive a bit early at our lecture theatre for an in-person event.

Please note that this series will not be recorded.