Strategic Technologies

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • The Flaw of Immediate Cyber Counter Strikes

    A dominant paradigm for militarised cyber operations, owing to a growing interest in such actions, is seeking an ability to strike back and launch cyber counter attacks immediately after being attacked. This commentary challenges view based on the argument that it leads to a contra-productive tit-for-tat game with no decisive or deterrent outcome. It argues that cyber attacks are information, which an initially passive targeted society can gather to refine and consolidate its cybersecurity and over time receive an advantage over the initial attacker.

    September 2017

    The US Concept and Practice of Hybrid Warfare

    The term ‘hybrid warfare’ has been used by American military experts for more than a decade already. However, until recently, there was no officially accepted definition of the term, and, thus, an ambiguity existed over its meaning. As per the analysis of recent local conflicts in the Middle East and Ukraine by the US political and military elite, hybrid warfare is a conflict where actors blend techniques, capabilities and resources to achieve their objectives.

    September 2017

    From Doklam Standoff to a Trade War? India initiates review of IT imports from China

    India’s decision to review the imports of IT products from China could turn out to be its Achilles Heel, given that they constitute a key constituent of Chinese exports to India.

    August 18, 2017

    Cryptocurrencies and the Regulators Dilemma

    This special feature explores the mechanics and attributes which have led to the steep rise in the popularity of cryptocurrencies, delves into the risks they pose to the user and the state, and evaluates the opportunities, risks and policy options for India.

    August 01, 2017

    Quantum Computing and its Impact on Cryptography

    Advances in technology has brought into focus the need to have double assurance on data security, especially with the world moving from classical to Quantum Computing, which latter has the power to unlock the toughest of cyber-locks.

    July 19, 2017

    The Petya Cyber-Attack

    Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.

    July 13, 2017

    Hypersonic Weapons

    Hypersonic weapons are weapons that move at speeds of Mach 5 or more. Presently, hypersonic weapon technology is a work in progress and these weapons are yet to become fully operational for military deployment.

    ‘Nerve Agents’: Potent Chemical Weapon for War, Terrorism and Assassinations!

    In 2017, there have been two unrelated events where nerve agent have been used. This calls for close examination as the nerve agents are banned but can still be easily manufactured and are potent.

    January-June 2017

    Preparing For The 4th Review Conference Of The Chemical Weapons Convention: Some Observations On Process And Outcomes

    The 4th Review Conference to the 1993 Chemical Weapons Convention (CWC) will be held in 2018. The Member States will, in light of the recent experiences in Iraq and Syria and in accordance with the regime's seven core objectives, continue to clarify the focus and balance of activities going forward.

    January-June 2017

    Yersinia pestis, Biological Warfare, and Bioterrorism

    Yersinia pestis can cause any of three diseases – bubonic plague, pneumonic plague, and Septicemic plague. Bubonic and pneumonic plagues have in the past been weaponized by Japan and USSR. This article analyses whether terrorist groups will emulate these national biological warfare programs and thus will seek to develop weapons armed with Y. pestis.

    January-June 2017

    Pages

    Top