Show me:
Newest to oldest
Building NHS Resilience to Ransomware: Central Oversight and Shared Capability
Kello, M., Hill, Z., Hill, S. & Stevens, T., 31 Mar 2026, Halcyon. 30 p.Research output: Book/Report › Commissioned report
Apartheid’s Hydra: Covert Action and the Counter-Revolutionary State in South Africa, 1965-1994
Long, M. (Editor), Cormac, R. (Editor), Stout, M. (Editor), Van Puyvelde, D. (Editor) & Lester, G. (Editor), Covert Action: National Approaches to Unacknowledged Intervention, 2024, Georgetown University Press.
Research output: Book/Report › Book › peer-review
International lulz: Exploring the strategic logic of trolling in diplomacy
Dylan, H. & Colley, T. P., 24 Oct 2025, In: European Journal of International Security.Research output: Contribution to journal › Article › peer-review

Give a shoutout to Meizhi Lang on social or copy the text below to attribute.
Smart new world: adapting human intelligence for the digital age
Gioe, David V.; Manganello, Tony, 21 October 2025, In: Intelligence and National Security, Online first
Research output: Contribution to journal › Article › peer-review

Photo by Killian Cartignies on Unsplash
Emerging technologies and national security intelligence
Dylan, H. & Stivang, N., 11 Oct 2025, In: Intelligence and National Security.40, 6, p. 988-100922 p.Research output: Contribution to journal › Article › peer-review

Photo by Steve Johnson on Unsplash
Spying in the digital era. An interview with David Omand and John Taylor
Goodman, Michael, 11 October 2025, In: Intelligence and National Security, Online first
Research output: Contribution to journal › Article › peer-review

