Transnational Threats and Political Risk

Transnational Threats and Political Risk

This programme's broad range of research reflects the ever-changing nature of asymmetric threats and transnational security risks. Its four main strands are: cyber security and cyber warfare; organised crime; terrorism and counter-terrorism; intelligence and security.

Expert: Nigel Inkster

Niger Inkster 2

Director of Transnational Threats and Political Risk

New Publication

Armed Conflict Survey

War in Ukraine, years of civil conflict in Syria and ISIS over-running Iraqi cities – all seem to signal a new, more dangerous phase of history. The new IISS Armed Conflict Survey provides a reference guide to the state of the world, with statistics and details on more than 40 of the world’s major conflicts – from Afghanistan to Yemen – plus essays on hybrid war, global jihad and much more.

  • Events

    Strategy for the Twenty-First Century

    12 October 2015. 

    Discussion Meeting
    Harlan Ullman, Chairman, CNIGuard
    Arundel House, London
    Wednesday 7 October, 12-1pm

  • Events

    World Order and Strategic Stability: Managing the US-China Cyber Relationship

    07 October 2015. 

    Discussion Meeting
    John C. Mallery, Research Scientist, MIT Computer Science and Artificial Intelligence Laboratory
    Arundel House, London
    Wednesday 7 October, 12:30-1:30pm

  • Events

    Cold wars, hot wars

    15 September 2015. 

    Geopolitics and Business Seminar
    Arundel House, London
    Tuesday 15 September 2015

  • Events

    Press Launch - Strategic Survey 2015

    15 September 2015. 

    Press Launch
    Arundel House, London
    Tuesday 15 September 2015

  • IISS Voices

    Defining a 'full-spectrum' counter-terrorism strategy

    22 July 2015.  Guest post by Alia Brahimi, Visiting Research Fellow at Oxford University and IISS Armed Conflict Survery contributor, and Chris Mackmurdo, Director, Contest Global On 9 July the UK Foreign and Commonwealth Office (FCO) took the extraordinary step of urging all British nationals, including roughly 3,000 tourists, to leave Tunisia. This tightened travel advice followed the Sousse attack by the Islamic State of Iraq and al-Sham (ISIS) that left 38 people dead, including 30 British holidaymakers...

  • Events

    Cyber Governance and Security: the Struggle for the Soul of the Future

    22 July 2015. 

    Corporate Breakfast
    Nigel Inkster, Director of Transnational Threats and Political Risk

    Arundel House, London 

    Wednesday 22 July 2015, 8–9am 

  • IISS Voices

    Hebatalla Taha: ‘Sinai Province’s’ incursion into Sheikh Zuweid town

    09 July 2015.  Sinai Province launched a coordinated attack against the Egyptian army in al-Arish and Sheikh Zuweid in North Sinai on 1 July. The attack showed that the intensified security presence has failed to deter the group. As the military continues to escalate its operations in North Sinai, civilians fear that they will bear the brunt of the response.

  • Strategic Comments

    Communications interception: UK report seeks legal reform

    08 July 2015. 

    British spies’ bulk collection of citizens’ phone and internet metadata doesn’t breach EU law, a new government report says. However, the document does recommend an overhaul of the complex UK law governing the field.

  • Events

    Improving Global Drug Policy: Comparative Perspectives and UNGASS 2016

    19 June 2015. 

    Discussion Meeting
    Caroline Chatwin
    Senior Lecturer in Criminology at the University of Kent
    Martin Jelsma
    Director of the Drugs and Democracy Programme at the Transnational Institute
    Vanda Felbab-Brown
    Senior Fellow and Co-Director of Improving Global Drug Policy: Comparative Perspectives & UNGASS 2016 at The Brookings Institution
    James Windle
    Senior Lecturer in Criminology and Criminal Justice at the University of East London
    Arundel House, London
    Friday 19 June 2015, 10am-12pm

  • Armed Conflict Survey

    Armed Conflict Survey 2015

    20 May 2015.  The worldwide review of political, military and humanitarian trends in current conflicts.

China's Cyber Policy

A Revolution in Military Affairs with Chinese Characteristics

A key facet of China’s military modernisation has been its efforts to digitise its armed forces and to develop capabilities for information warfare in which cyber activities would be used to degrade an opponent’s will and capacity to fight. In this fourth in a series of fourth in a series of five lectures on China’s cyber policies and capabilities, Nigel Inkster looks at the evolution of China’s military cyber capabilities and doctrines.

Read more >

Lecture Series: China's Cyber Policy >

armed conflict database

Armed Conflict Database

A regularly updated IISS online resource providing detailed information on more than 70 conflicts worldwide.