Lecture programme
Lectures take place on Tuesdays, from 6.15–7:45pm GMT.
Tuesday 13 January 2026
The Dark Web: A Gangster’s Paradise?
This lecture explores the Dark Web’s mechanics, and how the cyber underworld collaborates. We analyse the history and architecture of the Dark Web (Tor), before considering its uses, ranging from protecting the privacy of individuals' legal browsing to enabling the uncensored browsing of dissidents within autocratic countries. Finally, we take a tour of a criminal marketplace to understand how it functions and creates trust amongst users. At the conclusion of this lecture, you will have a foundational understanding of the Dark Web and its history.
Tuesday 20 January 2026
Cybercrime: Illegality in the Digital World
Thie lecture considers how criminals use hacking for financial gain. First, we explore the primary attack types of data theft, extortion and fraud. We will then study how some nation-states use hacking to help finance their governments, before we examine the Dark Web ecosystem, a critical enabler for global cybercrime. Finally, we consider some of the options for countering criminal hackers.
Tuesday 27 January 2026
Ransomware: Disrupting Critical National Infrastructure
This lecture starts by travelling back to the 1980s, to study the origins of Ransomware. We trace its evolution through to the early 2010s and analyse the catalysts that turned it from a niche technical problem to an endemic threat to critical national infrastructure. We examine the tradecraft attackers employ, before considering the scale and impacts of the problem. Then, we assess the variables in deciding whether to capitulate to a ransom demand. Finally, we explore available countermeasures.
Tuesday 3 February 2026
Cyber Terrorism: A New Era of Extremism
This lecture first considers how online methods have enabled extremists to conduct traditional activities such as recruitment, financing, communications, open-source intelligence, and propaganda at new scales. Then, we focus on how hacking has introduced new opportunities within fields such as disinformation, espionage and sabotage.
Tuesday 10 February 2026
Seduction and Secrets: Extremism Honey Traps and Hacking
This lecture explores how extremists use social engineering to trick targets into downloading malware. We will study how extremists, who typically operate with lesser skills than organised crime groups and nation-state threat actors, embrace the manipulation of human emotions to breach the devices of their targets. We will examine how extremists create online honey traps, by posing as attractive young men or women, and approaching their targets via social media with the suggestion of a romantic relationship. You will learn how this leads to eventual intelligence extraction from the target, and the countermeasures that are being taken by victims.
Tuesday 17 February 2026
Lethal Cyber Terrorism: Murder via the Internet?
This lecture assesses whether terrorists can damage property, or harm people, exclusively using cyber. We will study the potential for extremists to acquire the necessary skills and resources to conduct lethal cyber operations. We examine the IRLPGS model created by Dr Jarvis to assess the various ways through which extremists could gain these capabilities, before assessing the likelihood of each potential acquisition pathway.
How and when to watch
Each lecture will last approximately 1 hour, followed by questions.
Please join in good time before each lecture to ensure that you have no connection problems. We recommend joining 10-15 minutes before the start time.