Strategic Technologies

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • EMP Weapons and the New Equation of War

    Besides military targets, a number of strategic civilian targets, like urban data and communication centres, stock exchanges, factories and other centres of gravity could also be attacked by e-bombs.

    October 13, 2017

    Does India Need Thermonuclear Weapons

    While thermonuclear weapons are not necessary for maintaining a credible deterrent, they serve the purpose of enabling India to make effective use of its relatively limited fissile material stockpile.

    September 22, 2017

    US ups the ante in Cyberspace

    The US decision to elevate its Cyber Command to that of a Unified Combatant Command sends a strong signal to entities and countries inimical to its interests to recalibrate their security calculus.

    August 25, 2017

    The Flaw of Immediate Cyber Counter Strikes

    A dominant paradigm for militarised cyber operations, owing to a growing interest in such actions, is seeking an ability to strike back and launch cyber counter attacks immediately after being attacked. This commentary challenges view based on the argument that it leads to a contra-productive tit-for-tat game with no decisive or deterrent outcome. It argues that cyber attacks are information, which an initially passive targeted society can gather to refine and consolidate its cybersecurity and over time receive an advantage over the initial attacker.

    September 2017

    The US Concept and Practice of Hybrid Warfare

    The term ‘hybrid warfare’ has been used by American military experts for more than a decade already. However, until recently, there was no officially accepted definition of the term, and, thus, an ambiguity existed over its meaning. As per the analysis of recent local conflicts in the Middle East and Ukraine by the US political and military elite, hybrid warfare is a conflict where actors blend techniques, capabilities and resources to achieve their objectives.

    September 2017

    From Doklam Standoff to a Trade War? India initiates review of IT imports from China

    India’s decision to review the imports of IT products from China could turn out to be its Achilles Heel, given that they constitute a key constituent of Chinese exports to India.

    August 18, 2017

    Cryptocurrencies and the Regulators Dilemma

    This special feature explores the mechanics and attributes which have led to the steep rise in the popularity of cryptocurrencies, delves into the risks they pose to the user and the state, and evaluates the opportunities, risks and policy options for India.

    August 01, 2017

    Quantum Computing and its Impact on Cryptography

    Advances in technology has brought into focus the need to have double assurance on data security, especially with the world moving from classical to Quantum Computing, which latter has the power to unlock the toughest of cyber-locks.

    July 19, 2017

    The Petya Cyber-Attack

    Most attacks prior to Petya were carried out by criminals for financial gain, but some characteristics of the Petya malware have led to doubts as to whether the culprits are state actors.

    July 13, 2017

    Hypersonic Weapons

    Hypersonic weapons are weapons that move at speeds of Mach 5 or more. Presently, hypersonic weapon technology is a work in progress and these weapons are yet to become fully operational for military deployment.

    Pages

    Top