Strategic Technologies: Publications

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • How North Korea was Armed

    China and to a lesser extent Pakistan have helped North Korea with its nuclear and missile development programmes.

    October 30, 2017

    EMP Weapons and the New Equation of War

    Besides military targets, a number of strategic civilian targets, like urban data and communication centres, stock exchanges, factories and other centres of gravity could also be attacked by e-bombs.

    October 13, 2017

    Does India Need Thermonuclear Weapons

    While thermonuclear weapons are not necessary for maintaining a credible deterrent, they serve the purpose of enabling India to make effective use of its relatively limited fissile material stockpile.

    September 22, 2017

    US ups the ante in Cyberspace

    The US decision to elevate its Cyber Command to that of a Unified Combatant Command sends a strong signal to entities and countries inimical to its interests to recalibrate their security calculus.

    August 25, 2017

    From Doklam Standoff to a Trade War? India initiates review of IT imports from China

    India’s decision to review the imports of IT products from China could turn out to be its Achilles Heel, given that they constitute a key constituent of Chinese exports to India.

    August 18, 2017

    Cryptocurrencies and the Regulators Dilemma

    This special feature explores the mechanics and attributes which have led to the steep rise in the popularity of cryptocurrencies, delves into the risks they pose to the user and the state, and evaluates the opportunities, risks and policy options for India.

    August 01, 2017

    Quantum Computing and its Impact on Cryptography

    Advances in technology has brought into focus the need to have double assurance on data security, especially with the world moving from classical to Quantum Computing, which latter has the power to unlock the toughest of cyber-locks.

    July 19, 2017

    The Petya Cyber-Attack

    Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.

    July 13, 2017

    Hypersonic Weapons

    Hypersonic weapons are weapons that move at speeds of Mach 5 or more. Presently, hypersonic weapon technology is a work in progress and these weapons are yet to become fully operational for military deployment.

    Voter’s Dilemma: Data Leaks and Electoral Interventions

    The DNC and En Marche hacking instances offer a peek into the future: data leaks and cyber means of electoral intervention are likely to become an unfortunate and inevitable part of the electoral process.

    May 22, 2017

    Pages

    Top