Cyber Security
Deterrence Theory– Is it Applicable in Cyber Domain?

… effective cyber deterrence policies require regular, sustained disruption of malicious cyber activity. Such disruption can be technical, legal, logistical, financial, diplomatic, and, in some extreme cases, kinetic. Increasing the scope, scale an....

Cyber Weapons – A Weapon of War?

… cyber weapons will be used individually and blended simultaneously with conventional kinetic weapons as force multipliers … for both attacker and defender, it is difficult to predict; cyber weapons often achieve things other than their intended....

China’s Cyber-Influence Operations

… With its growing assertiveness in the international arena, China uses new technologies to achieve its foreign policy goals and project an image of responsible global power … spending billions on influence operations across the world ... fits i....

Defining China’s Intelligentized Warfare and Role of Artificial Intelligence

China feels that U.S. is its main adversary ... China is trying to match U.S. technological capabilities with its own strength in AI as a leap frog technology and a new concept of war ... But there will be lot of problems in implementing this concept....

Cyber DNA of China –Deep, Focussed and Militarised

The strategic goals reconfirmed by the CCP, in late 1970’s, included maintaining domestic stability; sustaining economic growth and development; defending national sovereignty and territorial integrity; safeguarding China’s interest world over. T....

Internet Lockdowns: Is There Any Other Way Out?

India's internet revolution is fast transforming its political, social, cultural, and technological landscape. One of the most critical factors that ensured the landslide victory of PM Modi with his razor-sharp and a straight-forward nationalist dis....

India’s Cyber Deterrence Against China

Cyber Threats from China: Chinese Offensive Capabilities and Modus Operandi
China raised cyber war units way back in 20031. Major objectives of these units has been cyber surveillance, manipulating network data, disseminating p....

The Curious Case of Huawei

China’s journey from being an agrarian economy to one of the largest economies with a strong military and cyber capabilities is commendable. However, its military and cyber capabilities are built upon relentless efforts to steal critical military a....

International Security: Review of 2020 & Projections for 2021

The year 2020 shall be recorded as an unprecedented year in the modern history of humankind. The outbreak of China-origin Coronavirus (also known as COVID-19) has eclipsed the events in global security. On one side, the spread of coronavirus enforced....

The New National Security Directive will Strengthen Telecom Security

In a landmark decision, the Cabinet Committee on Security has taken steps to strengthen the security of telecom networks in India.1 Henceforth, it will be mandatory for the telecom network providers to use only ‘trusted products’ from....

Contact Us