See alsoBlogs (2)Resources (5)
From our blog
Cyberterrorism: What are we (not) talking about?
03 August 2017
Cyberconflict and warfare, Cybercrime, Digital diplomacy, Diplomatic theory and practice, Internet governance and digital policy, Terrorism
In 2016, according to a Gallup poll, 73% of Americans cited cyberterrorism as a leading threat to vital US interests in the next 10 years. However, what does it really mean when we deduce that there is a threat of cyb...
Countering terrorist narratives online: A balancing act
04 July 2016
Cybersecurity, Freedom of expression, Human rights principles, Internet governance and digital policy, Terrorism
Terrorists are using the Internet for a wide-range of purposes. On the operational side, terrorist organisations use ICTs for internal communication and fundraising, while on the public relations side, the Internet ha...
Post Cold War diplomatic training
Victor Shale's paper refers to a specific time period: the post-Cold War period which brought about new forms of conflicts, and high levels of terrorism. In the light of the change in traditional diplomacy, his paper examines multistakeholder diplomatic training and it... Read more...
DC Confidential: The controversial memoirs of Britain’s ambassador to the U.S. at the time of 9/11 and the Iraq War
The publication of these memoirs in autumn 2005 caused a public furore in Britain so I shall not waste time giving any background on Sir Christopher Meyer. (Just punch his name into Google, which will enable you in the blink of an eye even to find out from the BBC webs... Read more...
Against All Enemies: Inside America’s War on Terror
All memoirs are incomplete; instant ones even more so; and memoirs about security matters are the worst, in this respect. The book, however, manages to disappoint in an unusual way.... Read more...