Sir Richard Dearlove’s assertion that counter-terrorism should no longer dominate UK national security planning raises questions over how the government prioritises risks and manages scarce resources <strong>(Free access)</strong>
This paper describes a model of the flow of users between social media platforms and surface web pages to access jihadist content, which provides an approximate picture of the jihadist information ecosystem and how multiple platforms are used to disseminate content.
Debate continues as to how governments should manage the presence of Chinese technology in 5G telecommunications networks. But the argument risks obscuring the critical question of how states such as the UK will best achieve the cyber security they need.
The 50th anniversary of the day that British troops first deployed to Northern Ireland offers an opportunity to reflect on the legacy of Operation Banner, and whether the security forces contributed to the troubles or prevented them.