Essays on the legal justifications for the resort to force, nations hosting international terrorists and criminals, humanitarian relief efforts, post conflict stabilization, and case studies on Iraq and Afghanistan.
This paper describes a model of the flow of users between social media platforms and surface web pages to access jihadist content, which provides an approximate picture of the jihadist information ecosystem and how multiple platforms are used to disseminate content.
Debate continues as to how governments should manage the presence of Chinese technology in 5G telecommunications networks. But the argument risks obscuring the critical question of how states such as the UK will best achieve the cyber security they need.
How newly-elected Ukrainian President Volodymyr Zelenskiy responds to Moscow’s provision of Russian passports to residents in occupied Donbas will not only set the tone for his administration’s foreign policy, but could seriously unsettle Putin’s project of consolidating a sphere of influence in the post-Soviet region.
The 50th anniversary of the day that British troops first deployed to Northern Ireland offers an opportunity to reflect on the legacy of Operation Banner, and whether the security forces contributed to the troubles or prevented them.