Lancaster University
Whilst both studying at and working for my alma mater, I have been heavily involved in a vast range of varied activities. During my time as a student many of these overlapped with the Lancaster University Students’ Union, but equally many have been with the university itself.
Throughout my studies I was a regular participant in various departments’ research projects, such as working as an RA for the Lancaster University Management School (LUMS). I also took part in a number of schemes within the School of Computing & Communications (SCC), such as Student Ambassador and Code Club.
I also took part in the Lancaster Award scheme throughout my undergraduate studies, as well as being heavily involved in my college.
Undergraduate modules taken
SSC.110 - Software Development
SSC.120 - Fundamentals of Computer Science
SSC.130 - Information Systems
SSC.140 - Creative Technology
SSC.150 - Digital Systems
SSC.160 - Fundamentals of Communication Systems
SSC.201 - Database
SSC.202 - Human-Computer Interaction
SSC.203 - Computer Networks
SSC.204 - Software Design
SSC.205 - Social, Ethical and Professional Issues in Computer Science
SSC.210 - Computer Science Group Project
SSC.211 - Operating Systems
SSC.212 - Advanced Programming
SSC.300 - Final Year Project
SSC.306 - Internet Applications Engineering
SSC.311 - Distributed Systems
SSC.312 - Languages and Compilation
SSC.360 - Computer Science Seminars
SSC.361 - Artificial Intelligence
SSC.363 - Security & Risk
SSC.365 - Advanced Networking (audited)
I then returned as a post-graduate student between 2017–18 to complete an MSc. in Cyber Security. I continued to involve myself in the life of my new college as well as the students’ union and wider university community.
Post-graduate modules taken
LL.M5230 - Introduction to Law
PPR.432 - Security and Conflict in the Digital Age
SCC.420 - MSc Dissertation
SCC.439 - Network and Systems Security
SCC.441 - Information System Security Management
SCC.442 - Information System Penetration and Countermeasures
SCC.443 - Information System Forensic Investigation
SCC.444 - Information System Risk Management
SOCL491 - Cybercrime
Finally (for now) I returned once again between 2019-–21 working on a Knowledge Transfer Project (KTP) between me, the university and a local information security company. I used this opportunity to audit additional university modules to add to my skillset, amongst other training and development activities, and I returned to my former undergraduate college.
Additional post-graduate modules audited
CFAS440 - Statistical Methods and Modelling
SCC.461 - Programming for Data Scientists
Blog Posts (33)
A study of how Egyptian Bloggers shaped the UK newspaper coverage of Political Events in Egypt
Published:
The Necro-Geopolitics of American Insecurity
Published:
28 Palestinians Died
A Cognitive Grammar analysis of mystification in press coverage of state violence on the Gaza border
Published:
The concept of disorder
Published:
From Albinism in Africa to the Lancashire Witches
Published:
Chinese public opinion’s role in crisis diplomacy
Preliminary findings from the field
Published:
Nurturing Dissent
Developing the Unruly Subject in Higher Education
Published:
Future Data Practices
Perpetuate Inequalities or Design for Change?
Published:
Violence and its Discontents
Groups and identities in security research
Published:
Interrogating Free Speech Versus Hate Speech on the Internet
A discourse perspective
Published:
Technosphere
Technology, Agency and the Future of the Earth Workshop
Published:
The Lancashire Constabulary Vulnerable Callers Initiative
Published:
Crime Journeys
High-Risk Offending Across Space and Time
Published:
Machine Learning for Cyber Security
Published:
Britain’s Role in a Future World
William Hague at the ISF
Published:
Why I Lost Friends and Alienated People
Published:
Cybervictims and Cyberharrassment and Cyberstalking
Oh my!
Published:
Shipping Containers, Russian Criminals, American Spooks and Nuclear Weapons
An intelligence-led case study of a cyber breach
Published:
Introduction, Social Theory and Hacking
Published:
BSides Leeds 2018
Published:
Earworms Make Bad Passwords
An Analysis of the Nokē Smart Lock Manual Override
Published:
Responsible Autonomy
AI, safety, ethics and legality
Published:
Are Sensor Networks a first step towards the Diamond Age?
Published:
Wot I Learnt in Second Year
Published:
Festageddon 2016
Published:
Rebuilding the Pendle College websites
Published:
Magna Carta
Its Resurrection, 1216–1616
Published:
Symbiotic Design
Published:
On the First Year of University
Or Fear & Loathing in Lancs Vegas
Published:
Writings (45)
subtext
stay home and read subtext
Published:
subtext
strike while the subtext is hot
Published:
subtext
fresh from the fridge
Published:
subtext
get subtext done
Published:
Mobile-based auditing of the DẼMOS 2 e-voting system
Published:
Between the Razors’ Edge
When might state security practices become counterproductive?
Published:
Strange Jurisdictions
The development of control systems outside of meatspace
Published:
An analysis of anti-forensic techniques, with a consideration of the future of digital forensics
Published:
Stop Waiting for Cyber-9/11
Published:
A Secure Messaging Protocol Proposal
Published:
An analysis of the HRO approach to risk management from an information security perspective
Published:
An Analysis of the OWASP Top Ten 2013
Published:
A review of Milaj (2015) and Rachovitsa (2016)
Published:
A case review of R (Catt) v Association of Chief Police Officers
Published:
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
Individual Report
Published:
GDPR: What will it mean for you?
(as presented to the University of Lancaster)
Published:
Can privacy be protected on social networks?
Published:
Critical Infrastructure Protection
The responsibility of Government or of companies?
Published:
Attack Assessment Report
Published:
Internet Applications Engineering
Consolidated Report
Published:
Thanks, ants. Thants.
Applying genetic algorithms to simulated ants to produce higher-fitness generations
Published:
Up the Backend
Published:
The Witch, Big Bad Freshers’ 2016 Issue
Published:
Lancaster is the eighth best university in the UK
Published:
The Witch, Summer 2016 Issue
Published:
Everything you learn studying Computer Science
Published:
Lancaster student who joined ISIS reportedly killed in Syria
Published:
Cumbria to compete in Roses 2016 after York pulls out
Published:
These are Lancaster University’s goofiest modules
Published:
Exams are meaningless, so why are we still doing them?
Published:
Which college has the most international students?
Published:
I mean it when I say it
CU are the nicest people on campus
Published:
Lancaster is one of the worst unis for free speech – and it’s embarrassing
Published:
Lonsdale gets almost 10 times as many disciplinaries as everyone else
Published:
Everyone sucks but us
Why Pendle own this joint
Published:
Pendle window is hanging on for dear life
Published:
Deputy Dean accidentally CC’s in entire undergrad cohort in private correspondence
Published:
Here’s every Freshers 2015 event by college
Published:
Introduction to Image, Video and Speech Processing
Published:
External Placement
Published:
On BAE Systems
Big bad BAE?
Published:
Web Sites (5)
subtext
Redesign & Content Management
Published:
Numerous e-commerce Web sites
Implementation, Troubleshooting & Technical Support
Published:
Lancaster University Pendle College Site
Redesign, Implementation, Technical Support & Content Management
Published:
Lancaster SU’s Pendle College Site
Redesign, Implementation, Technical Support & Content Management
Published:
subtext
Redesign & Content Management
Published:
Numerous e-commerce Web sites
Implementation, Troubleshooting & Technical Support
Published:
Lancaster University Pendle College Site
Redesign, Implementation, Technical Support & Content Management
Published:
Lancaster SU’s Pendle College Site
Redesign, Implementation, Technical Support & Content Management
Published:
Programs (29)
DẼMOS 2
Published:
micro:fit
Published:
EmerGen(e)tic
Exploring the use of genetic algorithms in emergent distributed systems
Published:
PcapCrack
Published:
FileTrans
Published:
Syntaxalyser
Published:
Scraping Alpha
Published:
AuctionProg
Published:
Revenge of the Towers of Hanoi
Published:
Benix
Published:
EEEEEEEEEEEEEEEAAAAAAAAAA!!!
A Reckless Disregard for Mercy
Published:
Solar
Published:
Threads
Published:
BombSweeper
Published:
6-Letter Pypher
Published:
150ASM Emulator
Published:
Moonlander
Published:
Ethiopian Multiplier
Published:
War Visualisation
Published:
ChessSim
Published:
Cipher-O-Matic
Published:
Barclays #openminds 2014
Information Beautification
Published:
Imagination Developer Day 2014
Maze-solving buggy simulator
Published:
8-Bit Counter
Published:
Etch-a-Sketch
Published: