Balochistan, the British and the Great Game: The Struggle for the Bolan Pass, Gateway to India by T.A. Heathcote The book traces the history and events of the nineteenth century in a sparsely populated desert area of Asia, Balochistan, an area (inhabited by the tribal Baloch people) and brings out the strategic importance attached to the Bolan Pass by the colonial British. Y.M. Bammi | January-March 2018 | Journal of Defence Studies
Compact Fusion: Are the Energy Equations About to Change? Advanced technologies and supercomputing have accelerated the pace of research and development in the field of nuclear fusion. Atul Pant | January 10, 2018 | IDSA Comments
Drones: An Emerging Terror Tool From the days of their inception, remotely piloted aero models (known popularly as drones) have been feared as a means of spreading terror. Recently, the use of drones by terrorist outfits like the Islamic State of Iraq and Syria (ISIS), also known as the Islamic State (IS), has seen an increase and this has brought those fears to the fore. Experts fear that the drones have given terrorists a near-perfect solution for spreading terror and a major terror act may be around the corner as legal and illegal drone activities are on the rise. Atul Pant | January-March 2018 | Journal of Defence Studies
Doklam and the Indo-China Boundary On 19 December 2017, three days ahead of the scheduled 20th Round of Indo-China border talk between the Indian National Security Advisor (NSA), Ajit Doval, and China’s State Councillor, Yang Jiechi (the details of which are yet to be made public), the daily Times of India reported a statement by China that the Doklam standoff posed a ‘major test’ for the bilateral ties and that lessons should be learnt from it to avoid a similar situation of its kind in the future.1 China’s statement was made in the context of the face-off between Indian Army and China’s People’s Liberation Army (PL A.K. Bardalai | January-March 2018 | Journal of Defence Studies
Inside the Enemy’s Computer: Identifying Cyber-Attackers, by Clement Guitton Attribution of cyberattacks is an impending issue in enabling a credible deterrent against both state and non-state actors. It applies equally to cases of a criminal nature as well as to those with implications for national security. The technology underlying cyberspace facilitates anonymity and thus affixing responsibility, that is, attributability, is not merely a technological challenge but a political one as well, especially when nation states have proven prowess in engaging their adversaries in cyberspace. Munish Sharma | January-March 2018 | Journal of Defence Studies
The Food versus Fuel Debate The Food and Agricultural Organization (FAO) has proposed that the terms of the debate be moved from food versus fuel to food and fuel. Ekta Niranjan | January 04, 2018 | Backgrounder
The India-ASEAN Partnership at 25 A stronger partnership and enhanced cooperation should be prioritised by both sides if the full potential of this engagement is to be realised. Ashok Sajjanhar | January 04, 2018 | IDSA Comments
Publication of the National Register of Citizens: a positive step, but what next Since the deportation of illegal migrants is not feasible, the only option before the government is to let them reside in the country on humanitarian grounds but after stripping them of all citizenship rights. Pushpita Das | January 04, 2018 | IDSA Comments
Post Doklam, India needs to watch China’s bullish economics led cultural embrace of South Asia Doklam brought into perspective the fractured relationship between India and China on the global stage and increased fears of China’s growing unilateralism as it inexorably broadens its interests and sphere of influence, especially in South Asia. Shruti Pandalai | January 01, 2018 | Issue Brief
India’s Strategic Options in a Changing Cyberspace Publisher: Pentagon Press The book is structured to perform a role both as a primer to those who wish to understand the strategic issues and key concepts in cyberspace, as well as to provide sufficient pointers to those who wish to have an in-depth understanding on specific issues. Among the major issues examined are the efficacy of the concept of cyber deterrence, the troubled history of norm-making in cyberspace, protecting critical infrastructure from crippling cyber attacks, the viability of Active Cyber Defence as a means of responding to the sheer scale of attacks, and its attendant legal and ethical issues. Emerging technologies and their potential impact on an already dynamic domain are also the subject to scrutiny, as also the various models of public-Private Partnership in cybersecurity around the world. ISBN: 978-93-86618-66-5, Price: ?.746/- E-copy available Cherian Samuel , Munish Sharma | | Book