Lancaster University
Whilst both studying at and working for my alma mater, I have been heavily involved in a vast range of varied activities. During my time as a student many of these overlapped with the Lancaster University Students’ Union, but equally many have been with the university itself.
Throughout my studies I was a regular participant in various departments’ research projects, such as working as an RA for the Lancaster University Management School (LUMS). I also took part in a number of schemes within the School of Computing & Communications (SCC), such as Student Ambassador and Code Club.
I also took part in the Lancaster Award scheme throughout my undergraduate studies, as well as being heavily involved in my college.
Undergraduate modules taken
SSC.110 - Software Development
SSC.120 - Fundamentals of Computer Science
SSC.130 - Information Systems
SSC.140 - Creative Technology
SSC.150 - Digital Systems
SSC.160 - Fundamentals of Communication Systems
SSC.201 - Database
SSC.202 - Human-Computer Interaction
SSC.203 - Computer Networks
SSC.204 - Software Design
SSC.205 - Social, Ethical and Professional Issues in Computer Science
SSC.210 - Computer Science Group Project
SSC.211 - Operating Systems
SSC.212 - Advanced Programming
SSC.300 - Final Year Project
SSC.306 - Internet Applications Engineering
SSC.311 - Distributed Systems
SSC.312 - Languages and Compilation
SSC.360 - Computer Science Seminars
SSC.361 - Artificial Intelligence
SSC.363 - Security & Risk
SSC.365 - Advanced Networking (audited)
I then returned as a post-graduate student between 2017–18 to complete an MSc. in Cyber Security. I continued to involve myself in the life of my new college as well as the students’ union and wider university community.
Post-graduate modules taken
LL.M5230 - Introduction to Law
PPR.432 - Security and Conflict in the Digital Age
SCC.420 - MSc Dissertation
SCC.439 - Network and Systems Security
SCC.441 - Information System Security Management
SCC.442 - Information System Penetration and Countermeasures
SCC.443 - Information System Forensic Investigation
SCC.444 - Information System Risk Management
SOCL491 - Cybercrime
Finally (for now) I returned once again between 2019-–21 working on a Knowledge Transfer Project (KTP) between me, the university and a local information security company. I used this opportunity to audit additional university modules to add to my skillset, amongst other training and development activities, and I returned to my former undergraduate college.
Additional post-graduate modules audited
CFAS440 - Statistical Methods and Modelling
SCC.461 - Programming for Data Scientists
Blog Posts (33)

A study of how Egyptian Bloggers shaped the UK newspaper coverage of Political Events in Egypt
Published:

The Necro-Geopolitics of American Insecurity
Published:

28 Palestinians Died
A Cognitive Grammar analysis of mystification in press coverage of state violence on the Gaza border
Published:

The concept of disorder
Published:

From Albinism in Africa to the Lancashire Witches
Published:

Chinese public opinion’s role in crisis diplomacy
Preliminary findings from the field
Published:

Nurturing Dissent
Developing the Unruly Subject in Higher Education
Published:

Future Data Practices
Perpetuate Inequalities or Design for Change?
Published:

Violence and its Discontents
Groups and identities in security research
Published:

Interrogating Free Speech Versus Hate Speech on the Internet
A discourse perspective
Published:

Technosphere
Technology, Agency and the Future of the Earth Workshop
Published:

The Lancashire Constabulary Vulnerable Callers Initiative
Published:

Crime Journeys
High-Risk Offending Across Space and Time
Published:

Machine Learning for Cyber Security
Published:

Britain’s Role in a Future World
William Hague at the ISF
Published:

Why I Lost Friends and Alienated People
Published:

Cybervictims and Cyberharrassment and Cyberstalking
Oh my!
Published:

Shipping Containers, Russian Criminals, American Spooks and Nuclear Weapons
An intelligence-led case study of a cyber breach
Published:

Introduction, Social Theory and Hacking
Published:

BSides Leeds 2018
Published:

Earworms Make Bad Passwords
An Analysis of the Nokē Smart Lock Manual Override
Published:

Responsible Autonomy
AI, safety, ethics and legality
Published:

Are Sensor Networks a first step towards the Diamond Age?
Published:

Wot I Learnt in Second Year
Published:

Festageddon 2016
Published:

Rebuilding the Pendle College websites
Published:

Magna Carta
Its Resurrection, 1216–1616
Published:

Symbiotic Design
Published:

On the First Year of University
Or Fear & Loathing in Lancs Vegas
Published:
Writings (45)

subtext
stay home and read subtext
Published:

subtext
strike while the subtext is hot
Published:

subtext
fresh from the fridge
Published:

subtext
get subtext done
Published:

Mobile-based auditing of the DẼMOS 2 e-voting system
Published:

Between the Razors’ Edge
When might state security practices become counterproductive?
Published:

Strange Jurisdictions
The development of control systems outside of meatspace
Published:

An analysis of anti-forensic techniques, with a consideration of the future of digital forensics
Published:

Stop Waiting for Cyber-9/11
Published:

A Secure Messaging Protocol Proposal
Published:

An analysis of the HRO approach to risk management from an information security perspective
Published:

An Analysis of the OWASP Top Ten 2013
Published:

A review of Milaj (2015) and Rachovitsa (2016)
Published:

A case review of R (Catt) v Association of Chief Police Officers
Published:

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
Individual Report
Published:

GDPR: What will it mean for you?
(as presented to the University of Lancaster)
Published:

Can privacy be protected on social networks?
Published:

Critical Infrastructure Protection
The responsibility of Government or of companies?
Published:

Attack Assessment Report
Published:

Internet Applications Engineering
Consolidated Report
Published:

Thanks, ants. Thants.
Applying genetic algorithms to simulated ants to produce higher-fitness generations
Published:

Up the Backend
Published:

The Witch, Big Bad Freshers’ 2016 Issue
Published:

Lancaster is the eighth best university in the UK
Published:

The Witch, Summer 2016 Issue
Published:

Everything you learn studying Computer Science
Published:

Lancaster student who joined ISIS reportedly killed in Syria
Published:

Cumbria to compete in Roses 2016 after York pulls out
Published:

These are Lancaster University’s goofiest modules
Published:

Exams are meaningless, so why are we still doing them?
Published:

Which college has the most international students?
Published:

I mean it when I say it
CU are the nicest people on campus
Published:

Lancaster is one of the worst unis for free speech – and it’s embarrassing
Published:

Lonsdale gets almost 10 times as many disciplinaries as everyone else
Published:

Everyone sucks but us
Why Pendle own this joint
Published:

Pendle window is hanging on for dear life
Published:

Deputy Dean accidentally CC’s in entire undergrad cohort in private correspondence
Published:

Here’s every Freshers 2015 event by college
Published:

Introduction to Image, Video and Speech Processing
Published:

External Placement
Published:

On BAE Systems
Big bad BAE?
Published:
Web Sites (5)
subtext
Redesign & Content Management
Published:
Numerous e-commerce Web sites
Implementation, Troubleshooting & Technical Support
Published:
Lancaster University Pendle College Site
Redesign, Implementation, Technical Support & Content Management
Published:
Lancaster SU’s Pendle College Site
Redesign, Implementation, Technical Support & Content Management
Published:

subtext
Redesign & Content Management
Published:

Numerous e-commerce Web sites
Implementation, Troubleshooting & Technical Support
Published:

Lancaster University Pendle College Site
Redesign, Implementation, Technical Support & Content Management
Published:

Lancaster SU’s Pendle College Site
Redesign, Implementation, Technical Support & Content Management
Published:
Programs (29)

DẼMOS 2
Published:

micro:fit
Published:

EmerGen(e)tic
Exploring the use of genetic algorithms in emergent distributed systems
Published:

PcapCrack
Published:

FileTrans
Published:

Syntaxalyser
Published:

Scraping Alpha
Published:

AuctionProg
Published:

Revenge of the Towers of Hanoi
Published:

Benix
Published:

EEEEEEEEEEEEEEEAAAAAAAAAA!!!
A Reckless Disregard for Mercy
Published:

Solar
Published:

Threads
Published:

BombSweeper
Published:

6-Letter Pypher
Published:

150ASM Emulator
Published:

Moonlander
Published:

Ethiopian Multiplier
Published:

War Visualisation
Published:

ChessSim
Published:

Cipher-O-Matic
Published:
Barclays #openminds 2014
Information Beautification
Published:

Imagination Developer Day 2014
Maze-solving buggy simulator
Published:

8-Bit Counter
Published:

Etch-a-Sketch
Published: