National Security and Cyber: Crime and Terrorism

Overview

Criminals and extremists thrive in cyberspace. 

This online lecture series delves into the world of the dark web to study the eco-system that has proved a critical cybercrime enabler. You will explore a dark web marketplace, to understand its operating concepts, before seeing how stolen information is bought and sold. Then you will survey the panoply of cybercrimes used to separate citizens from their cash. We also examine the links to modern slavery that have resulted in hundreds of thousands of people being enslaved and forced to conduct online scams. Completing your cybercrime tour, you study the extortion-based cybercrime known as ransomware that is increasingly disrupting critical national infrastructure. 

The emergence of groups such as Islamic State was at least partly due to the expansion of their reach through cyberspace. Extremists have not only projected their propaganda, aiding recruitment, they have used hacking to gain intelligence and even conduct sabotage. Having lesser technical skills, you will examine the advanced social engineering techniques deployed by extremists that entice their targets with the promise of romance, before fooling them into installing malware-laden intelligence collection apps on their own devices. Finally, you will examine lethal terrorism – the taking of lives through the hacking and manipulation of digital technologies, such as autonomous vehicles.  

Please note:

  • Whilst this lecture series examines a technical subject matter, it is not a technical course. 
  • Due to the nature of the contents of this series, this is not suitable for people under 18 years old. 
  • This event will close to enrolments at 23:59 GMT on 8 January 2026.

Programme details

Lecture programme

Lectures take place on Tuesdays, from 6.15–7:45pm GMT.

Tuesday 13 January 2026 

The Dark Web: A Gangster’s Paradise?

This lecture explores the Dark Web’s mechanics, and how the cyber underworld collaborates. We analyse the history and architecture of the Dark Web (Tor), before considering its uses, ranging from protecting the privacy of individuals' legal browsing to enabling the uncensored browsing of dissidents within autocratic countries. Finally, we take a tour of a criminal marketplace to understand how it functions and creates trust amongst users. At the conclusion of this lecture, you will have a foundational understanding of the Dark Web and its history. 

Tuesday 20 January 2026 
Cybercrime: Illegality in the Digital World 

Thie lecture considers how criminals use hacking for financial gain. First, we explore the primary attack types of data theft, extortion and fraud. We will then study how some nation-states use hacking to help finance their governments, before we examine the Dark Web ecosystem, a critical enabler for global cybercrime. Finally, we consider some of the options for countering criminal hackers. 

Tuesday 27 January 2026
Ransomware: Disrupting Critical National Infrastructure

This lecture starts by travelling back to the 1980s, to study the origins of Ransomware. We trace its evolution through to the early 2010s and analyse the catalysts that turned it from a niche technical problem to an endemic threat to critical national infrastructure. We examine the tradecraft attackers employ, before considering the scale and impacts of the problem. Then, we assess the variables in deciding whether to capitulate to a ransom demand. Finally, we explore available countermeasures. 

Tuesday 3 February 2026 
Cyber Terrorism: A New Era of Extremism  

This lecture first considers how online methods have enabled extremists to conduct traditional activities such as recruitment, financing, communications, open-source intelligence, and propaganda at new scales. Then, we focus on how hacking has introduced new opportunities within fields such as disinformation, espionage and sabotage.  

Tuesday 10 February 2026
Seduction and Secrets: Extremism Honey Traps and Hacking  

This lecture explores how extremists use social engineering to trick targets into downloading malware. We will study how extremists, who typically operate with lesser skills than organised crime groups and nation-state threat actors, embrace the manipulation of human emotions to breach the devices of their targets. We will examine how extremists create online honey traps, by posing as attractive young men or women, and approaching their targets via social media with the suggestion of a romantic relationship. You will learn how this leads to eventual intelligence extraction from the target, and the countermeasures that are being taken by victims. 

Tuesday 17 February 2026
Lethal Cyber Terrorism: Murder via the Internet?  

This lecture assesses whether terrorists can damage property, or harm people, exclusively using cyber. We will study the potential for extremists to acquire the necessary skills and resources to conduct lethal cyber operations. We examine the IRLPGS model created by Dr Jarvis to assess the various ways through which extremists could gain these capabilities, before assessing the likelihood of each potential acquisition pathway.  

How and when to watch

Each lecture will last approximately 1 hour, followed by questions.

Please join in good time before each lecture to ensure that you have no connection problems. We recommend joining 10-15 minutes before the start time.

Fees

Description Costs
Event Fee £75.00

Funding

If you are in receipt of a UK state benefit or are a full-time student in the UK you may be eligible for a reduction of 50% of tuition fees.

Concessionary fees for short courses

Tutor

Dr Craig Jarvis

Course Director

Craig is an independent academic specialising in national security and technology. He lectures at Oxford, Cambridge, Imperial College London, and Royal Holloway. His next book, ‘Cyber Terrorism: Extremism & Hacking’ will be published in 2026. Previous works include 'CryptoWars: The Fight for Privacy in the Digital Age' and contributions to 'Next Generation Enterprise Security'. His research also appears in peer-reviewed journals, including 'Intelligence and National Security'.
Craig holds a PhD in cybersecurity and history and has earned master’s degrees in international security, information security, and classical music, studying at Oxford, King’s College London, and Royal Holloway.
With extensive industry experience, his last permanent role was Chief Technology Officer at DXC Security, then the world’s largest security services provider. At DXC, he founded DXC Security Labs, spearheading advancements in cybersecurity research and development.

Craig remains deeply engaged with the private sector, particularly in finance, where he advises major banks and private equity firms on security strategy, architecture, and cyber due diligence. As a member of the Offensive Cyber Working Group's College of Experts, he contributes to research and policy development in offensive cybersecurity. He is also the founding chair of the Geopolitics-Cyber Community of London Experts (GeoCyclone), an organisation bringing together business leaders, academics, and policy makers to share knowledge on national security and digital technologies.
He is currently studying Mandarin (HSK4).

Craig is active on LinkedIn, often posting details of upcoming courses and ongoing research.

Application

Please use the 'Book' button on this page. Alternatively, please contact us to obtain an application form.

 

IT requirements

We will be using Zoom for the livestreaming of this lecture series, and you will be able to submit questions via the Zoom interface. Joining instructions will be sent out prior to the start date. We recommend that you join the session at least 10-15 minutes prior to the start time – just as you might arrive a bit early at our lecture theatre for an in-person event.

Please note that this course will not be recorded.