Updated: 26 December 2020. The UK and the European Union have finally delivered a deal – which some will see as a bitter end to 2020 or as a ‘Happy Brexmas’. However, what does this mean for cybersecurity? In summary – little is going to happen and it will limit the UK’s influence into the
CategoryCyber Security
International Encyclopedia of Human Geography – Cyber Security Entry
Nat O’Grady asked me a while ago to contribute to a new section in the recently released ‘International Encyclopedia of Human Geography 2e [2nd Edition]’ on ‘Cyber Security’. This was an interesting challenge, as there is relatively little written in human geography on cybersecurity – perhaps due to its connection with ‘cyberspace’. Indeed, when writing
Dangerous Gaming: Cyber-Attacks, Air-Strikes and Twitter
Yesterday, a short piece by Jan Silomon and myself went up on E-IR – accessible here. Here I offer some of my own thoughts on the article and hopefully some interpretations that I would like to be taken away and discussed further – on dehumanisation below life, the role of attribution and ‘quasi-state’ actors in
(Re)Cognition, computation, and war
I haven’t blogged for a long time, especially with doing the last edits to my thesis that I will hopefully submit in the next few weeks. So, this is a bit of break for me to think about what I have been partially doing as my time as a visiting fellow for the past five
Searching for maliciousness using newspapers and Google trends data
So, I thought I would do a quick blog post, just as I have reached a block in writing and thought this would help to get me back into the mood. A couple of years ago now(!), I did some archival research on how certain malware are consumed and practiced in the media and tie
Rethinking Space in Cybersecurity + ‘Algorithmic Dimensionality’
After initially volunteering to give a ‘lightning’ talk at the CDT in Cyber Security joint conference (Programme) at Royal Holloway next week (3 & 4 May), I was given the opportunity to speak at greater length for 30 minutes. This has provided me the breathing space to consider how I have been conceptualising space in
Strava, Sweat, Security
Wearable tech, the ability to share your fitness stats, suggest routes, follow them, and so on have been a growing feature of (certain) everyday lifestyles. This ability to share how the body moves, performs, and expresses itself gives many people much satisfaction. One of the popular methods is through Strava which is primarily used by runners
New Year, New Me
So, this year will hopefully be the one where I gain a driving licence, pass the DPhil, and at least have a clear idea of what I intend to do in 2019 (if not already doing it). One of my resolutions is to start writing blog posts alongside the writing of my thesis chapters, as
#NATOtalk16
This week I attended the #NATOtalk16 conference held at the (infamous) Hotel Adlon, along with a pre-session discussion with the youth arm of the German Atlantic Association (YATA). This was a great few days with a dedicated ‘cyber security’ group which was great. There are recommendations which were written by all participants (available here), where
CDT Open Day
I wish I could have attended my centre’s open day, from which I hear was a major success! It’s great to be part of a group of individuals pursuing some very different areas of cyber security across computer science, international relations, law, philosophy, and geography (well, only me, so far). Below is the poster that