attributing cyber-attacks Courtesy: Shutterstock
15 July 2021

Attributing cyber-attacks

A ransomware attack recently targeted Kaseya, a software services company in the U.S., for $70 million, incapacitating hundreds of its clients globally. There is an increasing incidence of such attacks, with perpetrators targeting government agencies and high-tech companies, leading to considerable economic losses. How can governments mitigate these threats and attribute responsibility to those accountable?

sanctions and counter-sanctions Courtesy: Shutterstock
15 July 2021

Sanctions and counter-sanctions

For years, Western countries have used sanctions as a means of economic warfare against their adversaries. Now, China and Russia are utilising the same tactic against the West. The United Nations Security Council is paralysed by differences between the five permanent members, leaving the tools of unilateral sanctions and counter-sanctions to proliferate at the cost of UN-approved multilateral sanctions.

cyber attacks on critical infrastructure: is india ready? Courtesy: Twitter | @ColPipe
27 May 2021

Cyber attacks on critical infrastructure: Is India ready?

The ransomware attack on Colonial Pipeline in the U.S. has underlined the importance of cyber security in critical infrastructure. India has not escaped the brunt of a recent global surge in cyber attacks. Though New Delhi has taken steps to protect critical infrastructure, problems in information sharing of threat vulnerabilities impede an effective response.

india-u.s.-israel emtech partnership Courtesy: Shutterstock
29 April 2021

India-U.S.-Israel EmTech partnership

As new technological advances take place every day, India must keep up. While the U.S. is still a front-runner in defence technologies, China and Russia are catching up quickly. In order to counter this, India can insert itself into the pre-existing bilateral co-operation between the U.S. and Israel. Sameer Patil, Fellow, International Security Studies Programme tells us how.

a model for global data regulation Courtesy: Shutterstock
31 March 2021

A model for global data regulation

Individuals now generate copious amounts of personal data everyday – both online and offline. Devices and infrastructure extract data, which can be shared instantly across borders with diverse entities - without consent. It is imperative that countries come together to create regulations to protect individuals who are unable to control how their data is shared and processed. A model already exists in the Paris Climate Agreement.

emergence of crypto-currencies Courtesy: Gateway House
11 February 2021

Emergence of crypto-currencies

With the Cryptocurrency and Regulation of Official Digital Currency Bill 2021 set to be introduced during parliament’s on-going budget session, India is now ready to introduce its own official digital currency—following in the footsteps of China and Russia. So far, Indian regulations prohibited the public from trading in crypto-currencies. However, the investor community has an interest in them, as an asset that is not subject to government devaluation, unlike regular fiat currency in circulation. This infographic traces the evolution of crypto-currencies since the launch of Bitcoin in 2009.

CG Courtesy: USGS/Wikimedia
6 August 2020

Geospatial shutter control for India

The recent use of geospatial analyses by Indian social and mainstream media for near real-time defence and military intelligence in Ladakh has been made possible because of the lower cost of earth-observation satellite construction, and thereby, easy access to satellite imagery on the internet. While independent analysis is useful, the same intelligence can be also used against the interests of a sovereign nation by an adversary, especially border imagery. India must find innovative methods to reduce this vulnerability of commercial satellite imagery.

shutterstock_1023930217 Courtesy: Shutterstock
22 August 2019

The Telegram phenomenon

The tool used to sustain and coordinate protests is a young, encrypted messaging service called Telegram. Its unique privacy and security features and resistance to the state has made Telegram more popular than its larger rivals, WhatsApp and WeChat. What is this communication phenomenon?

Capture Courtesy: Debating Security Plus
16 October 2018

Countering Hybrid Threats in the Cyber Age

From 19-20 June, Brussels-based think tank, Friends of Europe organised an online brainstorming on global security issues called Debating Security Plus 2018. As part of this, Gateway House co-moderated the discussion on hybrid and asymmetric warfare. Below is the summary of that discussion, from the final report of the Debating Security Plus.

so18_cover_large_0 Courtesy: Foreign Affairs
1 October 2018

Battlefield Internet

The immediate threat is more corrosive than explosive. States are using the tools of cyberwarfare to undermine the very foundation of the Internet: trust. The result is that an arena that the world relies on for economic and informational exchange has turned into an active battlefield.