The Centre tracks relations between India and the countries of North America. US and Canadian internal developments are also monitored to have a better understanding of their role as drivers of foreign and domestic policies. The large Indian diaspora in these two countries also serves as a bridge for strengthening bilateral relations.
The Centre also actively tracks and analyses trends in strategic technologies, with principal focus on critical technologies and their implications for national security. It addresses evolving threats in space security and cyber security, ensuring comprehensive research into these critical domains. The other mandate of the Centre is to undertake research on Biological and Chemical Weapons with a focus on studying the dangers of proliferation and terrorism.
No posts of Books and Monograph.
The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model.
While India’s decision to ban Chinese apps is legally tenable under both domestic IT laws and international trade rules, it is important that any ambiguity in the ban order that can be challenged at WTO is effectively addressed.
With the adoption of varied digital means in times of pandemic, the states are likely to witness increased cyberattacks. Absence of an effective response would only mean an open playground for perpetrators.
With digital threats becoming trickier, a more holistic approach towards cybersecurity would help create a vibrant digital healthcare environment.
It might be difficult to prove any weaponisation intent or man-made origins to the SARS-CoV-2. Yet, the mass deaths and disruption caused by the virus forebodes imminent exploitation of biological agents for political ends.
Riding the technology wave, China eyes global dominance of RMB as a reserve currency and a favourable international monetary environment for its economic development.
Humanity is much better equipped today to mitigate the loss in life and collateral economic damage resulting from a pandemic, as demonstrated through the deployment of new-age tools such as artificial intelligence, big data, machine learning, neural networks and internet of things.
With a new found celebrity status among the video conferencing applications, Zoom now faces a massive privacy and security threat as the platform’s default settings are not secure enough.
COVID-19 presents a unique opportunity to the global new-age mega corporations to up their game and showcase their innovativeness and resourcefulness.
Even after five decades of its entry-into-force, the Nuclear Non-Proliferation Treaty (NPT) is largely seen as a Cold War era instrument that has failed to fulfill the objective of creating a pathway towards a credible disarmament process.
While maintaining cyber hygiene in these disruptive times is indeed a challenge, each organisation should work towards putting in place a tailor-made work-from-home cyber defence strategy.



