Approved work: Prison populations
This POSTnote will outline current figures on prison populations, implications of an increasing UK prison population and prisoners’ welfare and safety.

States are increasingly engaging in cyber operations to support their strategic aims. This POSTnote considers hostile state-backed cyber activities against the UK. It looks at how and why states use cyber operations against other nations and the threats these pose to the UK. It also considers mitigation measures, both internationally and in the UK.
POSTnote 684 States' Use of Cyber Operations (443 KB , PDF)
‘Cyberspace’ typically refers to digital networks used to store, modify, and communicate information. It includes the internet but also other information systems that support businesses, services and infrastructure.
‘Cyber operations’ aim to achieve objectives in or via cyberspace. They can include gaining unauthorized access to computers, systems or networks to obtain information; and altering, deleting, corrupting or denying access to data or software.
States conduct cyber operations against adversaries for reasons including to gather information, influence political decisions, support military action or gain financially. Potential impacts include data breaches, website outages, and disruption to online services, telecommunications and supply chains.
The number and sophistication of cyber-attacks on the UK are increasing. In 2020/21, the National Cyber Security Centre (NSCS) dealt with 777 incidents (from non-state, as well as state, attackers), a rise of just over 30% in four years.
The UK Government set out plans for protecting and promoting UK interests in cyberspace in the National Cyber Strategy 2022. This included £114 m of extra funding for the National Cyber Security Programme to help deliver the Strategy over the next three years, which is part of a wider £2.6 bn investment in cyber and legacy IT. The Government is reviewing the Computer Misuse Act and has introduced the National Security Bill, which may help to strengthen the UK’s response to cyber threats from hostile states. It has also said it is willing to use cyber operations alongside its diplomatic, economic and military activities.
Key points
Acknowledgements
POSTnotes are based on literature reviews and interviews with a range of stakeholders and are externally peer reviewed. POST would like to thank interviewees and peer reviewers for kindly giving up their time during the preparation of this briefing, including:
*denotes people and organisations who acted as external reviewers of the briefing.
POSTnote 684 States' Use of Cyber Operations (443 KB , PDF)
This POSTnote will outline current figures on prison populations, implications of an increasing UK prison population and prisoners’ welfare and safety.
This POSTbrief will be a technical explainer introducing AI technologies. It will explain the main types of AI, give examples of their current and potential future applications, and provide a glossary of common terminology.
Applications are open for the 2024 Centre for Postdoctoral Development in Infrastructure, Cities and Energy (C-DICE) Fellowship.