A dominant paradigm for militarised cyber operations, owing to a growing interest in such actions, is seeking an ability to strike back and launch cyber counter attacks immediately after being attacked. This commentary challenges view based on the argument that it leads to a contra-productive tit-for-tat game with no decisive or deterrent outcome. It argues that cyber attacks are information, which an initially passive targeted society can gather to refine and consolidate its cybersecurity and over time receive an advantage over the initial attacker.
The term ‘hybrid warfare’ has been used by American military experts for more than a decade already. However, until recently, there was no officially accepted definition of the term, and, thus, an ambiguity existed over its meaning. As per the analysis of recent local conflicts in the Middle East and Ukraine by the US political and military elite, hybrid warfare is a conflict where actors blend techniques, capabilities and resources to achieve their objectives.
India’s decision to review the imports of IT products from China could turn out to be its Achilles Heel, given that they constitute a key constituent of Chinese exports to India.
This special feature explores the mechanics and attributes which have led to the steep rise in the popularity of cryptocurrencies, delves into the risks they pose to the user and the state, and evaluates the opportunities, risks and policy options for India.
Advances in technology has brought into focus the need to have double assurance on data security, especially with the world moving from classical to Quantum Computing, which latter has the power to unlock the toughest of cyber-locks.
Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.
Hypersonic weapons are weapons that move at speeds of Mach 5 or more. Presently, hypersonic weapon technology is a work in progress and these weapons are yet to become fully operational for military deployment.
In 2017, there have been two unrelated events where nerve agent have been used. This calls for close examination as the nerve agents are banned but can still be easily manufactured and are potent.
The 4th Review Conference to the 1993 Chemical Weapons Convention (CWC) will be held in 2018. The Member States will, in light of the recent experiences in Iraq and Syria and in accordance with the regime's seven core objectives, continue to clarify the focus and balance of activities going forward.
Yersinia pestis can cause any of three diseases – bubonic plague, pneumonic plague, and Septicemic plague. Bubonic and pneumonic plagues have in the past been weaponized by Japan and USSR. This article analyses whether terrorist groups will emulate these national biological warfare programs and thus will seek to develop weapons armed with Y. pestis.
From Doklam Standoff to a Trade War? India initiates review of IT imports from China
India’s decision to review the imports of IT products from China could turn out to be its Achilles Heel, given that they constitute a key constituent of Chinese exports to India.