Vincent Briscoe lecture recordings
2017 Vincent Briscoe Lecture
Previous Vincent Briscoe Lectures
60 Yrs of Nuclear Nonproliferation: Who's the Adversary Now?
Eminent US nuclear non-proliferation leader Anne Harrington presents ISST's 2016 Briscoe Lecture
9 November 2016
In this lecture, NNSA Deputy Administrator Anne Harrington describes the historical development of nuclear nonproliferation, whether our technical and dialogue-based means for nonproliferation are still appropriate, and what the international policy and science community must do to maintain and further advance efforts towards nuclear threat reduction.
Space, science & security
David Willetts considers issues for safe and secure space access
The Rt Hon Baron David Willetts
28 October 2015
Former UK Science Minister David Willetts considers ways in which a safe and secure space environment can be sustained and how we must work with international partners and the industrial and academic community to safeguard this 'global commons' which is so important to our critical infrastructure.
The dark net: inside the digital underworld
Jamie Bartlett investigates the dark net and its implications
29 October 2014
Jamie Bartlett (Demos) explores dark internet subcultures, hidden encrypted websites and the people behind them. He covers the rise of citizen-led encryption systems, the crypto-currency bitcoin, the anonymous browser 'Tor', online drugs markets, and how extremist groups and criminals use the internet. Jamie explains how this world operates, and what it means for public safety and security.
Modern terrorism's technological trajectory
Bruce Hoffman explores terrorism's use of technology
Professor Bruce Hoffman
20 November 2013
Terrorist success depends not only on an ability to keep one step ahead of the authorities, but also one step ahead of counter-terrorist technology. But curiously, as radical or fanatical as terrorists may be, both politically and ideologically, they are technologically conservative. Bruce Hoffman (Georgetown University) explores this paradox and assesses terrorism’s ongoing technological trajectory.
Legal and ethical boundaries at the cyber frontier
Michael Chertoff outlines legal issues for cyber security
17 October 2012
Former US Secretary of Homeland Security, Michael Chertoff asks when is a cyber attack a genuine act of war? What is the line between the development of offensive versus defensive cyber capabilities? How can law enforcement most effectively combat cyber crime and cyber terrorism while maintaining civil liberties and privacy?
Spies, secrets and science
Keith Jeffery reflects on science and the early years of MI6
Professor Keith Jeffery
23 November 2011
Author of the first official history of MI6, Keith Jeffery (Queens University Belfast) investigates the extent to which the profession of intelligence might be described as a science, and also explores the role of science itself in both the working and the targeting of British intelligence operations in peace and war.
Science, technology and secret intelligence
Christopher Andrew delivers the inaugural Briscoe Lecture
Professor Christopher Andrew
25th October 2010
MI5's first official historian, Christopher Andrew, delivers the inaugural Vincent Briscoe annual security lecture. In it he explores the interaction between science, technology and secret intelligence over the last century, from the world wars to the era of transnational terrorism.