Indian Strategic Studies
Pages
(Move to ...)
Home
Knowledge Online
ICTEC
Important Paper
Recommended Reading
Military Matters
Newsletters
Research Gate
Publications
PK's Corner
▼
28 May 2021
China’s Cyber-Influence Operations
›
Maj Gen PK Mallick, VSM (Retd) The digital era has transformed the way we communicate. Using social media like Facebook and Instagram, a...
Defining China’s Intelligentized Warfare and Role of Artificial Intelligence
›
Maj Gen P K Mallick, VSM (Retd) China feels that U.S. is its main adversary ... China is trying to match U.S. technological capabilities w...
What Is Happening to India’s COVID-19 Vaccine Program?
›
ARJUN KANG JOSEPH Source Link WHAT IS THE STATE OF INDIA’S VACCINATION PROGRAM AS OF MAY 2021? In October 2020, India’s minister of health a...
Kabul School Bombing Reinforces Fears Over Post-Withdrawal Security
›
BY: Belquis Ahmadi; Fatema Ahmadi Source Link For the Dasht-e-Barchi neighborhood of Kabul, home to the Hazara minority group, the devastati...
Sustaining China’s Sovereignty Claims: The PLA’s Embrace of Unmanned Logistics
›
By: Eli Tirk , Kieran Green Source Link Introduction The Chinese People’s Liberation Army (PLA) has tested the use of unmanned vehicles (UAV...
Low Fertility Trap Fears Cloud China’s Release of 2020 Census Data
›
By: Elizabeth Chen Source Link The results of China’s seventh national census were released by the National Bureau of Statistics (NBS) on Ma...
Opinion – Former China-Premier Wen Jiabao’s Censored Essay
›
Klaus Heinrich Raditio Source Link In April 2021, Wen Jiabao, who served as the Chinese Premier from 2003–2013 published an essay titled ‘My...
Adopting a Multifaceted Policy Toward U.S.-China Security Competition
›
PATRICIA M. KIM Source Link China’s growing influence and presence in the Middle East and North Africa (MENA) have raised concerns in Washi...
Three Myths About the Laws of War and the Israel-Hamas Conflict
›
Charli Carpenter Source Link After 11 days of rocket fire and air strikes, a tenuous cease-fire has brought to a close, at least for now, th...
Congratulations on the ceasefire. Now the hard work begins
›
Tamara Cofman Wittes Source Link As I noted last week, it’s well past time to dispel any illusions that the Israeli-Palestinian conflict was...
Gaza: Morality and Reality
›
By George Friedman Source Link Fighting is intensifying between Israelis and Palestinians, though it would be a mistake to think of this as ...
Sustainable States: Environment, Governance, and the Future of the Middle East
›
Source Link The importance of environmentally sustainable public utilities in the Middle East is an improbable topic for a Washington think...
10 Steps Washington Can Take After the De-escalation of the War on Gaza
›
BY: Ambassador Hesham Youssef Source Link In a call with Israeli Prime Minister Benjamin Netanyahu yesterday, President Biden said he was su...
What Explains America’s Antagonism Toward China?
›
ZHANG JUN Source Link SHANGHAI – Last month, the US Senate Foreign Relations Committee officially backed the Strategic Competition Act of 20...
Noah Feldman: Big cyber-attacks should be handled by nations, not lawyers
›
By NOAH FELDMAN Source Link CAMBRIDGE, Mass. — On New Year’s Eve of 1879, Gilbert and Sullivan’s “Pirates of Penzance” premiered, featuring ...
When will America protect itself against EMP, cyber and ransomware attacks?
›
BY PETER PRY Source Link “A long-term outage owing to EMP could disable most critical supply chains, leaving the U.S. population living in ...
Germany Without Merkel
›
By Inga Kristina Trauthig, Marcel Dirsus Source Link On Sept. 26, Germany will hold national elections that will determine Angela Merkel’s ...
Provoking to Avoid War: North Korea’s Hybrid Security Strategies
›
Sico van der Meer Source Link So-called ‘hybrid’ security strategies, sometimes also labelled ‘hybrid warfare’, are much discussed among mil...
Is China’s Digital Currency a National Security Threat? What You Need to Know
›
Virginia Allen Source Link Imagine a currency that can expire, or that the government can require citizens to use only for specific purchas...
The UN Struggles to Make Progress on Securing Cyberspace
›
ARINDRAJIT BASU, IRENE POETRANTO, JUSTIN LAU Source Link The stability of global financial, healthcare, and security systems is increasingly...
The Colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms
›
by Renee Dudley, Daniel Golden Source Link On January 11, antivirus company Bitdefender said it was “happy to announce” a startling breakt...
Know This: Hack Attacks are Acts of ‘Unrestricted Warfare’
›
by John Rossomando Source Link Constant cyberattacks against U.S. military and civilian targets from foreign adversaries need to be treated...
Meme Warfare: AI countermeasures to disinformation should focus on popular, not perfect, fakes
›
By Michael Yankoski, Walter Scheirer, Tim Weninger Source Link Despite several alarming headlines in the press last year like “Deepfakes are...
Don’t Vilify Insurers Over Ransomware Attacks
›
NICK BEECROFT Source Link The search for answers to the ransomware epidemic in the wake of the Colonial Pipeline hack has turned up an unlik...
Failed States and Terrorism: Engaging the Conventional Wisdom
›
Luigi Paoli Puccetti Source Link Failing states have potentially favorable conditions which can facilitate the settlement of terrorist group...
Space Organizations Partner To Boost Cybersecurity
›
By BRAD D. WILLIAMS Source Link WASHINGTON: Two prominent aerospace industry groups are cooperating on cyber information sharing, awarenes...
POPULATION-CENTRIC CYBERSECURITY: LESSONS FROM COUNTERINSURGENCY
›
Emma Schroeder, Simon Handler and Trey Herr Source Link Editor’s note: This article is the tenth in a series, “Full-Spectrum: Capabilities a...
Gaza's hybrid war
›
By Ilan Pomeranc Source Link Asymmetric kinetic attacks, psychological and economic warfare, cyber-attacks, the manipulation of the media a...
Nuclear Notebook: How many nuclear weapons does the United Kingdom have in 2021?
›
By Hans M. Kristensen, Matt Korda Source Link Of all the nuclear weapon states, the United Kingdom has moved the furthest toward establishin...
Future of Warfare, Strategy Will Dictate Special Ops Action
›
BY JIM GARAMONE Source Link The future of warfare will dictate how special operations forces operate, Army Gen. Richard Clarke, the commande...
27 May 2021
China’s Cyber-Influence Operations
›
Maj Gen PK Mallick, VSM (Retd) The digital era has transformed the way we communicate. Using social media like Facebook and Instagram, a...
China’s Nuclear and Missile Capabilities: An Overview
›
Maj Gen PK Mallick, VSM (Retd) Since China first conducted a nuclear weapon test in 1964, its nuclear doctrine has remained unchanged and ...
Afghanistan’s Importance to the Future of U.S. National Security
›
By David S. Clukey Source Link Introduction: September 11, 2021 will mark 20 years since the terrorist attacks of September 11, 2011 (911) ...
The American People Have Biden’s Back On Afghanistan
›
by William Ruger Source Link Bad news from Afghanistan following President Joe Biden’s withdrawal announcement was inevitable. We got it in ...
Do China and Vietnam Have Similar Alliance Policies?
›
By Khang Vu Source Link This year marks the 60th anniversary of the Sino-Korean Treaty of Friendship, Cooperation, and Mutual Assistance. ...
‹
›
Home
View web version