UK Cyber Effects Network

About
The UK Cyber Effects Network seeks to build and strengthen a UK community of interest that fosters informed debate around the theory and practice of offensive cyber and other cyber effects operations.
Context
In 2023's Responsible Cyber Power in Practice, the UK set out how it will use cyber effects in a legal, ethical and responsible way. The publication of the document by the National Cyber Force (NCF) marked a significant step from the UK government in signalling more transparency regarding its approach to offensive cyber operations. In it, the NCF set out three principles for its operations — that they be accountable, precise and calibrated. In doing so, the NCF explicitly recognises it needs a 'license to operate' from the public, and that achieving this requires more openness and engagement.
This thinking opens up an opportunity for the research and practitioner community: to connect, reflect and develop further thinking on topics concerning the effects of offensive cyber operations within the UK and beyond. Offensive cyber operations are defined by 2022 UK National Cyber Strategy as 'adding, deleting or manipulating data on systems or networks to deliver a physical, virtual or cognitive effect'. At a time of heightened geopolitical competition, it is more critical than ever to reflect on when, how and under which conditions the theory and practice of such operations is evolving.
Mission Statement
The UK Cyber Effects Network seeks to build and strengthen a community of interest focused on cyber effects issues. The Network aims to generate new thinking on the theory and practice of offensive cyber operations, and help develop the next generation of UK experts. The Network is administered by RUSI and funded by the National Cyber Force.
The Network will further these aims through three main pathways:
- Developing the next generation of researchers, policymakers and practitioners through the Cyber Effects Fellowship Programme.
- Providing intellectual contributions by publishing novel research.
- Convening experts through workshops, scenarios and other interactive activities to build a stronger knowledge base for a UK community of interest on cyber effects issues.
Project Team
Jamie MacColl
Senior Research Fellow
Cyber and Tech

Conrad Prince CB
Distinguished Fellow and Senior Cyber Adviser

Dr Pia Hüsch
Research Fellow
Cyber and Tech

Louise Marie Hurel
Research Fellow
Cyber and Tech

Sophie Williams-Dunning
Research Analyst
Cyber and Tech

Hugh Oberlander
Programme Manager, Cyber and Tech
Cyber and Tech

Marike Woollard
Programme Manager
Military Sciences
Dr Tim Stevens
RUSI Associate Fellow, Cyber and Tech

Rob Black
Cyber security leader
About the Cyber Effects Fellowship Programme
This six-month programme is for early-career professionals who are keen to deepen their knowledge and engage with the theory and practice of offensive cyber operations. Fellows will enhance their networks with like-minded researchers and practitioners, enhance writing and policy skills, and engage with practitioners from the UK cyber effects community.
We welcome applications from UK citizens or citizens from NATO member states working or studying in the UK.
Fellows will deepen their knowledge on offensive cyber operations and cyber conflict by engaging with a range of perspectives. Successful applicants will investigate contemporary issues and debates on cyber operations in competition, crisis and conflict and will build practical skills in debate and analysis.
The Fellowship also provides an opportunity for Fellows to connect with senior officials and top international experts, participate in scenario-based discussions and exercises and receive professional development support.
Fellowship programming will include:
- At least two in-person workshops, with the potential for additional in-person activities.
- Six online professional development seminars.
- Opportunities to showcase research and expertise to RUSI’s network and community.
- Development of policy briefs, with the option to write short-form commentaries related to the UK Cyber Effects Network areas of focus.
- Mentorship from the RUSI Cyber and Tech team in developing skills.
We are committed to creating an inclusive, respectful environment where diverse perspectives are valued and welcomed. Fellows will represent a broad range of viewpoints and backgrounds and must, therefore, embrace an open mindset and voice disagreements respectfully.
Cyber Effects Papers
As part of this Cyber Effects Network, RUSI will publish an Edited Collection of Papers on offensive cyber and other cyber effects operations in spring 2026.
Call for Abstracts
We are pleased to announce an open call for original papers that address conceptual, doctrinal, legal, policy, capability and technological aspects of offensive cyber operations.Â
We encourage submissions based on new and original research in alignment with the themes outlined below, and welcome a variety of papers including essays, conceptual notes, analytical case studies and inter-disciplinary interventions. We particularly welcome papers that have direct policy relevance for UK thinking and practice of offensive cyber operations, including lessons learned from international experiences.Â
We are especially keen to receive submissions from scholars and practitioners in the early stages of their careers.
Abstracts are due by 23:59 BST on 30 September 2025
Themes and questions of interest
We welcome submissions related (but not limited) to the following themes and questions.
Concepts and doctrine
- Are offensive cyber operations escalatory? How should they be calibrated for competition, crisis and conflict?
- Is there a specific UK approach to cyber warfare? If not, should there be – and if so, what?
- What have we learned (or not learned) about the role of cyber operations in wartime from recent conflicts?
- Have there been any changes to adversaries’ concepts and doctrines for offensive cyber operations? If so, how should this influence the UK’s approach?
Legal and policy
- How can responsible cyber power be used for national advantage? Are these concepts contradictory?
- What are the legal and policy implications of non-state actors conducting cyber operations, including hacktivists and the private sector?
- What legal or policy measures would provide the public with assurance about how cyber effects operations are being delivered? If so, how can these disadvantages be overcome?
- How does just war theory apply when it comes to competition and conflict in (and through) cyberspace?
- Is the UK disadvantaged in comparison to its adversaries by its commitment to 'precision, accountability and calibration' in delivering responsible cyber operations?
Capability and technology
- What are the next generation capabilities the UK does or doesn’t need?
- What are the implications of optimising cyber effects capabilities for contingency use?
- How can the UK develop, test and sustain agile, multi-purpose cyber capabilities?
- How can industry help scale UK offensive cyber capabilities?
- What sort of frameworks should guide and bound the development and use of the next generation of offensive cyber capabilities (e.g. AI-generated or automated capabilities)?
Guidelines
- Abstracts should be no longer than 250 words, including the research question, methodology and key findings.
- Please include a CV for each author.
- Final abstract submission deadline 23:59, 30Â September 2025.
- Authors whose abstracts have been selected will be notified by 17 October 2025.
- Please note that the full paper submissions must be between 3,000-5,000 words including references.
- Deadline for full paper submission will be 30 January 2026.
- Please note that if AI tools have been used in the drafting of the paper and/or methodology, this should be clearly noted at the time of submission.
- Contributors in sensitive roles can contribute anonymously. If you are interested in publishing a paper anonymously, please reach out to the team via the main Cyber Effects Network contact form.