National Security and Strategic Studies
Cyber Security
Deterrence Theory– Is it Applicable in Cyber Domain?

… effective cyber deterrence policies require regular, sustained disruption of malicious cyber activity. Such disruption can be technical, legal, logistical, financial, diplomatic, and, in some extreme cases, kinetic. Increasing the scope, scale and tempo of disruption activities should impose high costs on adversaries …

Cyber Weapons – A Weapon of War?

… cyber weapons will be used individually and blended simultaneously with conventional kinetic weapons as force multipliers … for both attacker and defender, it is difficult to predict; cyber weapons often achieve things other than their intended purpose … strategic calculation for attackers thus becomes considerably more complex ... over-reliance by strategists and scholars on such imprecise terminology has significant risks for misinterpretation and premature prescription ...

China’s Cyber-Influence Operations

… With its growing assertiveness in the international arena, China uses new technologies to achieve its foreign policy goals and project an image of responsible global power … spending billions on influence operations across the world ... fits in with China’s larger aim of expanding its soft power alongside its growing economic and military power … reach of Beijing’s overseas media is impressive and should not be underestimated. But the results are mixed ...

Defining China’s Intelligentized Warfare and Role of Artificial Intelligence

China feels that U.S. is its main adversary ... China is trying to match U.S. technological capabilities with its own strength in AI as a leap frog technology and a new concept of war ... But there will be lot of problems in implementing this concept of Intelligentization Warfare to reality. However, President Xi Jinping has thrown the gauntlet, and it is up to the U.S. the other adversaries and the rest of the world to follow this concept keenly.

Cyber DNA of China –Deep, Focussed and Militarised

The strategic goals reconfirmed by the CCP, in late 1970’s, included maintaining domestic stability; sustaining economic growth and development; defending national sovereignty and territorial integrity; safeguarding China’s interest world over. The focus of the Fifth, Sixth and Seventh Five year Plans, was on investing in export industries, infrastructure, adaption and investment in technology development. China began opening its economy to the outside world and embraced market forces. Since then, China’s growth and development have been spectacular.

The Curious Case of Huawei

China’s journey from being an agrarian economy to one of the largest economies with a strong military and cyber capabilities is commendable. However, its military and cyber capabilities are built upon relentless efforts to steal critical military and technical information of other countries, mainly the United States (US). Leading Chinese companies, including one of the telecom giants—Huawei Technologies Co. Ltd. (hereafter Huawei), are taking advantage of China’s Belt and Road Initiative (BRI) projects to access the competitive neighbourhood nations.

Vimarsh on India's Digital Leap by Shri Ram Sewak Sharma, Former Chairman of the Telecom Regulatory Authority of India

India’s economic growth is accelerating at a steady pace with a glimpse of its true potential to become the world’s fastest-growing economy soon. In 2019, India ranked as the second-largest online market, after China. According to data by Statista, in 2020, India had 700 million internet subscribers across the nation; as a projection, these numbers will grow to over 974 million internet users by 2025.

India's Strategies for Information War & Cyber Deterrence

The concept of Information Warfare (IW) is as old as warfare itself but has gained in significance in recent times where we look at non-contact battles between two adversaries. This concept involves the use of information and communication technologies; and taking it a little further, it transforms into the use of computers and cyberspace in warfare. This book delves into this complex topic and brings out issues and facets especially pertaining to India. It emphasises that issues of National Security and Nation Building in this information age are intertwined.

Cyber Enabled Information Warfare: Are Cyber Borders the Solution We Seek?

… U.S election is one of the recent examples of the threat due to information warfare ... cyber borders similar to the treaty of Westphalia can result into a system where the progress of nations due to cyber connections is maintained and at the same time, there is a jurisdiction under which threats are curtailed ... without cyber borders, a legal jurisdiction, who do we blame, how do we punish, and when can we feel safe? ..

Cyber Attack on Kudankulam Nuclear Power Plant – A Wake Up Call

… India is among the top three countries in the world after the U.S. and China when it comes to phishing and malware attacks ... While governments can’t control every aspect of cyber security, they can certainly help shape the future of cyber security based on lessons learned from other nations, threats and technologies ... all stakeholders have to their heads together, identify the vulnerabilities in the critical information infrastructure and take remedial measures in a time bound manner …

Contact Us