Publication Filter

China’s 2014 Defence Budget: An Assessment

Following on Xi Jinping vision of ‘fight war, win war’, the Chinese military spending is shifting towards higher technology weapons and equipment and training and also illustrates its aim to institute reforms related to troop’s operational commands, organisation and training.

For Now, it is Ballot over Bullet in Afghanistan

It is not merely about change in leadership; it is about ushering the country into a ‘decade of transformation’. The most immediate challenge before the incumbent government and the relevant election and security institutions is to sustain and strengthen the people’s engagement in the process.

The New Soldier in the Age of Asymmetric Conflict, by Rumu Sarkar

Asymmetric warfare has existed from the time of the famous tale of David and Goliath. Post-World War II, the world has witnessed these conflicts in Vietnam, Palestine, Iraq, Syria and Afghanistan. The United States (US) is currently the sole superpower, and even countries with strong armed forces are developing asymmetric capabilities to respond to military threats posed by the US. Countries like China, Russia, Israel, Syria and India have to respond to asymmetric challenges which require innovative tactics in comparison to regular conventional warfare.

Proxy Warfare, by Andrew Mumford, Cambridge: Polity Press, 2013

Proxy war, over the centuries, has become a significant attribute in shaping the desired strategic outcome of a conflict through indirect engagement. History is strewn with numerous conflicts where proxy war has been used by states to achieve their strategic goals without committing their own troops, resources and finances. Although large research material is available on contemporary warfare, international relations and related security studies, there is, however, a void existing in analysing proxy warfare and its tenets. This book by Andrew Mumford is a serious effort to bridge this gap.

Marine Eco-concern and its Impact on the Indian Maritime Strategy

Maritime strategic planning cannot be done in isolation of marine eco-concerns. Marine species are known to perceive the environment around them through acoustic signals, and depend on sound for numerous functions like foraging, communication and navigation. Noise as a pollutant has found scant reference in the United Nations Environmental Programme (UNEP) document of 1982—the United Nations Convention on the Laws of the Seas (UNCLOS). The International Maritime Organization (IMO) is yet to include noise as a pollutant in its 1978 MARPOL Convention.

Pakistan and Biological Weapons

Pakistan is a state party to the Biological Weapons Convention, yet at least part of its related outward conduct is rather exhibitory, aiming to foster the image of an obedient, sheer science- and protection-oriented profile. Although it is publicly accentuated that an ongoing Pakistani biological weapons (BW) programme cannot be proved, it is fairly clear that some Western intelligence agencies possess classified information that is highly supportive of such an active programme taking place in actuality.

Relevance of Cloud Computing for Defence

Technology has always played the key role in defining the outcome of war. A modern-day military is investing in cutting-edge technologies to leverage their benefits in the evolving nature of warfare, which encompasses every aspect of science. In the case of information and communication technology (ICT), the research and development has unleashed vast potential for civilian and military applications, which vary from simple logic execution to high-end supercomputing.

Troubled Waters: Exploring the Emerging Dynamics between Navies and Private Security Companies in Anti-piracy Operations

The return of piracy to the Indian Ocean in modern times has culminated in the resurgence of the private violence industry in the maritime domain. For the first time in modern history, the private military security industry will work alongside traditional navies on the field. The dynamics between the two major security actors in the anti-piracy operations make for an interesting study. This article argues that there exists much potential for fruitful engagement between the two actors: PMSCs and navies.