Cyber Espionage, Influence and Warfare

Overview

In an era where digital conflict shapes global security, understanding the mechanics of cyber espionage and warfare is crucial. This event delves into the covert operations, geopolitical impact, and evolving tactics that define modern cyber threats. 

The first half explores attribution, uncovering the complexities of tracing cyber covert actions and identifying perpetrators behind sophisticated attacks. A deep dive into cyber espionage examines whether it represents a revolutionary shift or a natural evolution of traditional intelligence-gathering. Participants will also analyse digital deception, learning how disinformation campaigns erode trust, destabilize societies, and influence geopolitics. 

The latter half shifts to cyber proliferation and conflict. Participants will investigate the marketplace of cyber exploits, uncovering how cyber tools are bought, sold, and weaponised. A case study of cyber operations in the Russo-Ukraine war offers real-world insights into digital battlefield tactics. Finally, the event examines the future of warfare in a hyper-connected world before closing with strategies for countering cyber threats - balancing defence, policy, and proactive cybersecurity measures. 

Designed for professionals, researchers, and enthusiastic beginners, this event provides an engaging blend of technical insight and strategic analysis. Join us for a thought-provoking exploration of cyberspace as a contested domain of power, deception, and resilience. 

Please note:

  • Whilst this course does cover a technical topic, this is not a technical course. 
  • This event will close to enrolments at 23:59 BST on 6 May 2026.

  • Due to the nature of the contents of this day, this is not suitable for people under 18 years old.

Programme details

Saturday 9 May

9.45am
Registration at Rewley House reception

10am
Attributing Cyber Covert Actions: Unmasking the Hackers - Craig Jarvis
This lecture explores the challenges of assigning cyber operations to their originators. We will examine what attribution is, why it is necessary, and how it is conducted. We will study attribution analysis frameworks, and how the process of public attribution occurs. Finally, we will explore how threat entities create false flags to misdirect investigators, and even to frame third parties. At the end of this lecture, you will understand the politics and practicalities of attribution. 

11am
Tea and coffee break

11.30am
Cyber Espionage I: A New Spying Era? - Craig Jarvis
This lecture examines the history of cyber-espionage from the earliest known cases in the 1980s to the vast capabilities operated by today’s military and intelligence agencies. We analyse the components of a nation-state cyber-espionage programme, from the people beyond the keyboards, to the organisational processes that deliver high-calibre campaigns. Finally, we investigate the primary applications of cyber-espionage, including hack-and-leak operations, strategic intelligence acquisition, and the suppression of dissent.

1pm
Lunch break

2pm
Cyber Espionage: Revolution or Evolution? (II)  - Craig Jarvis
This lecture examines how digital technologies have affected agent running across all stages of the SADRAT framework (Spotting, Assessing, Developing, Recruiting, Agent Running, and Termination). In particular, it considers how hacking techniques can complement traditional agent-running operations. It then analyses how human intelligence can support and enable hacking activities. Next, the lecture explores the impact of digital technologies on counter-intelligence. Finally, it examines the potential of cyber espionage targeting supply chains, which have proven to be a highly effective attack vector for large-scale breaches that may yield significant intelligence gains.

3.30pm
Tea and coffee break

4pm
Disinformation: Weakening Nations with Deception - Craig Jarvis
This lecture investigates how adversaries exploit and contaminate digital information ecosystems for strategic gain. We begin by unpacking the core principles of disinformation - where it flourishes, why certain environments become fertile ground for manipulation, and how psychological and social factors make individuals vulnerable to persuasive falsehoods. Next, we turn to synthetic media. With the rise of generative AI, threat actors can now deploy convincingly fabricated content - audio, images, and video - that transcends traditional limitations such as language barriers or cultural nuance, dramatically amplifying reach and impact. Finally, we assess countermeasures designed to detect, disrupt, and diminish the spread of disinformation.

5pm
End of day

6.30pm
Dinner (optional)

Sunday 10 May  

8am
Breakfast (for those staying at Rewley House)

10am
Cyber Proliferation: Hacking for Sale - Craig Jarvis
This lecture surveys how cyber espionage capabilities have spread to numerous countries through commercial transaction. We first explore the conditions that created the market demand for private hacking products and services. We then analyse a contract from a commercial surveillance vendor to understand how hacking transactions are structured. Finally, we explore the instruments that are being deployed in an attempt to limit proliferation.

11.15am
Tea and coffee break

11.45am
Cyber Conflict in the Russo-Ukraine War - Neil Ashdown
This lecture will reveal how cyber conflict has evolved in the Russo-Ukraine War, tracing the digital battlefront from before the full-scale 2022 invasion to the present day. We will break down the operations conducted by Russia, Ukraine, and other actors, providing a clear understanding of who is fighting and what their strategic objectives are. Using real-world case studies and 'what if' scenarios, you will be able to assess the true significance of this ongoing conflict in the digital world.

1pm
Lunch break

2pm
The Future of Warfare in the Digital Age - Neil Ashdown 
This lecture will explore how digital technologies are fundamentally reshaping modern warfare and the battlefield. This lecture uses case studies from global conflicts – from the Falklands to Armenia-Azerbaijan to Iran – to provide an understanding of contemporary military operations on land, sea, air, space, and cyberspace. Attendees will learn about key concepts such as "multi-domain operations" and examine likely trends for the future of warfare, alongside disruptive alternative scenarios.

3.15pm
Tea and coffee break

3.45pm
Countering Cyber Threats - Craig Jarvis
This lecture analyses how states counter cyber threats, from criminal prosecutions to hacking the hackers. We start with reviewing the necessity of countering digital threats, before examining the core considerations in doing so. We then step through the portfolio of countermeasures whilst analysing each the escalatory risks of each option. By the end of this lecture, you will have a thorough awareness of the measures that nation-states can deploy to attempt to counter cyber threats.

5pm
End of weekend

Fees

Description Costs
Event Fee (includes tea/coffee) £230.00
Saturday baguette lunch £7.50
Saturday dinner £31.50
Saturday hot lunch £21.25
Single B&B (Saturday night) £121.50
Sunday baguette lunch £7.50
Sunday hot lunch £21.25

Funding

If you are in receipt of a UK state benefit or are a full-time student in the UK, you may be eligible for a reduction of 50% of the event fee. Please note that the discount does not apply to catering or accommodation.

Concessionary fees for short courses

 

Tutors

Dr Neil Ashdown

Dr Neil Ashdown is a researcher and consultant who has written extensively on security and intelligence matters. Neil holds a PhD from Royal Holloway and is a member of the Offensive Cyber Working Group’s steering committee. He previously worked in commercial open-source intelligence, including as the deputy editor of Jane’s Intelligence Review. His undergraduate degree was in Philosophy, Politics, and Economics at Balliol College, Oxford. 

Dr Craig Jarvis - Course Director

Craig is an independent academic specialising in national security and technology. He lectures at Oxford, Cambridge, Imperial College London, and Royal Holloway. His next book, ‘Cyber Terrorism: Extremism & Hacking’ will be published in 2026. Previous works include 'CryptoWars: The Fight for Privacy in the Digital Age' and contributions to 'Next Generation Enterprise Security'. His research also appears in peer-reviewed journals, including 'Intelligence and National Security'.
Craig holds a PhD in cybersecurity and history and has earned master’s degrees in international security, information security, and classical music, studying at Oxford, King’s College London, and Royal Holloway.
With extensive industry experience, his last permanent role was Chief Technology Officer at DXC Security, then the world’s largest security services provider. At DXC, he founded DXC Security Labs, spearheading advancements in cybersecurity research and development.

Craig remains deeply engaged with the private sector, particularly in finance, where he advises major banks and private equity firms on security strategy, architecture, and cyber due diligence. As a member of the Offensive Cyber Working Group's College of Experts, he contributes to research and policy development in offensive cybersecurity. He is also the founding chair of the Geopolitics-Cyber Community of London Experts (GeoCyclone), an organisation bringing together business leaders, academics, and policy makers to share knowledge on national security and digital technologies.
He is currently studying Mandarin (HSK4).

Craig is active on LinkedIn, often posting details of upcoming courses and ongoing research.

Application

Please use the 'Book' button on this page. Alternatively, please contact us to obtain an application form.

Accommodation

Accommodation for Saturday night can be booked directly online, subject to availability, when you register your place. This includes a buffet breakfast on the Sunday morning.

Our accommodation in Wellington Square has been rated as 4-Star Campus Accommodation under Visit England. All bedrooms are modern, comfortably furnished with tea/coffee making facilities, Freeview television, private bath/shower rooms and free WiFi. For more details see our accommodation information.

If you wish to extend your stay with us, either before and/or after the event, please contact our Residential Centre for availability and discounted rates.

Call +44 (0) 1865 270362 or email res-ctr@conted.ox.ac.uk