Technology, harms and security in public and personal life
Venue
Seminar Room 2, Chrystal Macmillan Building and ZoomDescription
Part of the Controversies in the Data Society 2025 series
A cross-disciplinary series of public lectures and discussion on AI and the datafication of society
The internet was designed for free and open communication in what we would now recognise as a rather more innocent stage of the Information Age. Modern information technology has created a vast scope for new harms, including hacking business and government, undermining critical infrastructures, and causing harm in our everyday domestic and intimate lives. In this session we have two specialists associated with the Cambridge Cybercrime Centre (CCC). Dr Ben Collier is a Lecturer in Science, Technology and Innovation Studies (STIS) at the University of Edinburgh and associate at Cambridge Computer Laboratory; Kieron Ivy Turk is a PhD student at the Cambridge Cybercrime Centre.
Speakers

Dr Ben Collier
Science, Technology and Innovation studies
Ben's research sits at the intersection of Criminology and Science and Technology Studies, drawing theory and methods from both. He studies how digital infrastructures become sites where power of different kinds is exerted. Using qualitative, computational, and statistical approaches, his research falls into three strands.
The first involves large-scale ethnographic studies of digital infrastructure, such as his research on the Tor network (the subject of a book with MIT Press: https://mitpress.mit.edu/9780262548182/tor/). The second focuses on how digital technologies and infrastructures become used for crime and resistance, drawing on a mix of ethnographic and AI/data science approaches. The third looks at digital infrastructure and state power, including in-depth studies and evaluations of law-enforcement interventions (such as FBI takedowns) and a recent project looking at the use of digital influence campaigns by law enforcement and government to shape the behaviour and culture of the public and achieve preventative policy goals. He draws on a range of theoretical perspectives in his work, most prominently Stuart Hall's cultural studies scholarship and Susan Leigh Star's approach to studying the social worlds of digital infrastructure.
Never mind the bollards: Exploring the role of GCHQ and MI5 in strategically shaping security markets in the UK
This seminar explores the role played by the security services - namely, GCHQ and MI5 - in securing public life in the UK. It focuses in particular on two of the three National Technical Authorities set up to allow spy agencies to shape security markets in the United Kingdom: the National Cyber Security Centre (NCSC) run by GCHQ and the National Protective Security Authority (NPSA) run by MI5. Interventions by these agencies take the form of radical attempts to secure the physical and digital built environment of the UK, from the bollards on the street to the passwords on your phone - not directly, but through strategically shaping markets and co-ordinating the information order which underpins them. Much of the UK’s critical national infrastructure and public services is now run by major private sector providers. These providers are generally not incentivised to spend resources in securing and maintaining this infrastructure to a high standard; the state has little power, authority, or political will to compel them to do so, or to step in and secure it themselves. With the rise of unignorable risks that the state clearly has a symbolic duty to prevent - namely, spectacular mass casualty terror attacks on public spaces, sabotage attacks, and nation state hacking, ransomware, and wider cybercrime threats - the UK has responded to these problems of the neoliberal order with post-neoliberal solutions. Through the NTAs, the UK is mobilising the security services to shape the market and correct the areas in which it is perceived to be failing. It is doing this through mobilising information, through researching and setting material standards, through shaping the education, public research, and skills environment, and finally through deploying the symbolic power and authority of the spy agencies.
- Recommended reading
- Hannigan (2018), Organising a Government for Cyber, https://static.rusi.org/20190227_hannigan_final_web.pdf
- Zedner, L. (2006). Liquid security: Managing the market for crime control. Criminology & criminal justice, 6(3), 267-288.
Kieron Ivy Turk
Kieron is a PhD student at the Department of Computer Science and Technology at the University of Cambridge, studying interactions between technology and domestic abuse. This follows two main paths: making it safer for victim-survivors to access support, and creating/improving technical interventions for specific abuses of technology. He is supervised by Alice Hutchings, and part of the Cambridge Cybercrime Centre.
https://www.cl.cam.ac.uk/~kst36/
Technical Tactics Targeting Tech-Abuse: Tales of AirTag and IoT Misuse
Technology is now near-universal in domestic abuse cases, misused for a wide array of malicious purposes including stalking, manipulation, and harassment. Despite this, there exist very few real-world defences against common forms of technology-facilitated abuse. In this seminar, Kieron Ivy (either name, they/she) explores the abuse of AirTags and similar devices for stalking, the anti-stalking features created in response, and a "gamified" study involving the Assassins' Guild student society that identified the many shortcomings of these protective measures. Following her study, a collaborative standard between Apple and Google was announced to universally improve unwanted tracker detection for all.
Taking inspiration from this tale, Ivy investigates forms of Internet of Things (IoT) abuse through an "abusability" study. They find a range of abusable features of multiple IoT devices, locating early intervention opportunities to prevent the misuse of these systems.
- Recommended reading
- Kieron Ivy Turk and Alice Hutchings. 2024. Stop Following Me! Evaluating the Malicious Uses of Personal Item Tracking Devices and Their Anti-Stalking Features. In Proceedings of the 2024 European Symposium on Usable Security (EuroUSEC '24). Association for Computing Machinery, New York, NY, USA, 277–289. https://doi.org/10.1145/3688459.3688477 (Open access: https://www.cl.cam.ac.uk/~kst36/documents/stop-following-me.pdf)
- Alexander Heinrich, Niklas Bittner, and Matthias Hollick. AirGuard – Protecting Android users from stalking attacks by Apple Find My devices. https://arxiv.org/abs/2202.11813, 2022.