Strategic Technologies

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Agro-Warfare: Attack on Crops and Livestock

    One of the chief consequences of the world wars was the development of better and sophisticated weapon systems. It signified a transition from traditional to non-conventional means of warfare that included biological weapons (BW). These weapons are varied kinds and can also constitute the development of anti-crop agent which can trigger a famine across the country and the intentional outbreak of animal diseases to target the livestock of the nation. These attacks have a long term effect on the economy and health of the population. With weapons aiming to destroy the long term sustainability of a country, the need to enhance the security mechanisms, to mitigate their use becomes inevitable.

    January-June 2019

    United States Bio-surveillance Project in South Korea: A conflict between Traditional and Non-Traditional Security

    The Bio-surveillance project of United States in South Korea in facing a serious criticism as it is believed to be a threat to the safety and survival of the local population of South Korea. While both the United States as well as South Korea deny the allegations, and they fail to provide complete information on the issue in the name of so-called ‘national security issue’. The article brings out the contradiction between traditional and non-traditional security approach by putting United States Bio-surveillance Project in South Korea as a case in point.

    January-June 2019

    Time to Bolster Global Biological and Chemical Defense Capabilities

    Recent biological and chemical trends highlights a growing concern regarding an evident indifference with respect to the support of the long standing institution CWC and BWC. This can be attributed to three causes the lowering of thresholds for developing BW and using CW, the demonstrated international lack of will to support these key international institutions, and a questionable ability to deal with the types of mass casualty scenarios as a result of biological or chemical attack.

    January-June 2019

    US-China Trade War and the High Technology Sector

    In this era of complex interdependence, sudden disruptions in supply chains will not only hurt Chinese businesses in the US and elsewhere, but also damage the US economy as well as its reputation as a business destination.

    May 22, 2019

    Singapore’s Fake News Act: Lessons for India

    By implementing the Protection from Online Falsehood and Manipulation Act (POFMA) 2019, Singapore is demonstrating resolve to fight the growing spread of false news and misinformation campaigns.

    May 17, 2019

    Cyber Exercises and the Indian Armed Forces

    A cyber exercise – whether CyberEx or its successor – needs to be developed as a platform for practitioners and thinkers to test conceptual and technical skills under near-real-world whole-of-nation scenarios of cyber contingencies.

    May 16, 2019

    To Ban, or Not to Ban Huawei

    Given India’s dependence on imports for 90 per cent of its telecom equipment, the decision to allow Huawei to bid for 5G should be in line with the national interest, rather than taking sides and constraining options.

    April 03, 2019

    The Grandeur of GandCrab

    Every time a cyber security organisation comes out with a decrypter to counter the effect of GandCrab, a brand new version of the ransomware is generated by effecting a small fix in the code.

    March 22, 2019

    India’s Tryst with 5G

    A slight push in the right direction would be much more productive and efficient, such as treating telecommunications as a utility rather than a market, and building innovation and IPR ecosystems rather than incentivizing licensed production.

    March 20, 2019

    Why Creating an Indigenous LTE Chipset is Such a Big Deal

    India, the second largest smartphone market in the world, needs to encourage and incentivise its ICT industry to not only boost ‘Skill India’ and ‘Make in India’ initiatives but also provide cyber autonomy to its critical cyber assets.

    February 25, 2019

    Pages

    Top