attributing cyber-attacks Courtesy: Shutterstock
15 July 2021

Attributing cyber-attacks

A ransomware attack recently targeted Kaseya, a software services company in the U.S., for $70 million, incapacitating hundreds of its clients globally. There is an increasing incidence of such attacks, with perpetrators targeting government agencies and high-tech companies, leading to considerable economic losses. How can governments mitigate these threats and attribute responsibility to those accountable?

cyber attacks on critical infrastructure: is india ready? Courtesy: Twitter | @ColPipe
27 May 2021

Cyber attacks on critical infrastructure: Is India ready?

The ransomware attack on Colonial Pipeline in the U.S. has underlined the importance of cyber security in critical infrastructure. India has not escaped the brunt of a recent global surge in cyber attacks. Though New Delhi has taken steps to protect critical infrastructure, problems in information sharing of threat vulnerabilities impede an effective response.

Myanmar event Courtesy: Gateway House
20 May 2021

Myanmar: Hundred days after the coup

We hosted a webcast with Konrad-Adenauer-Stiftung on, Myanmar: Hundred days after the coup on 13 May 2021 at 5:30 PM IST. This webcast discussed the conflict in Myanmar, the pulse of the protesters’ fight for democracy, the ominous presence of China as well as Russia and multilateral measures that the neighbouring countries including India can take towards restoring democratic processes in Myanmar.

CG Courtesy: USGS/Wikimedia
6 August 2020

Geospatial shutter control for India

The recent use of geospatial analyses by Indian social and mainstream media for near real-time defence and military intelligence in Ladakh has been made possible because of the lower cost of earth-observation satellite construction, and thereby, easy access to satellite imagery on the internet. While independent analysis is useful, the same intelligence can be also used against the interests of a sovereign nation by an adversary, especially border imagery. India must find innovative methods to reduce this vulnerability of commercial satellite imagery.

so18_cover_large_0 Courtesy: Foreign Affairs
1 October 2018

Battlefield Internet

The immediate threat is more corrosive than explosive. States are using the tools of cyberwarfare to undermine the very foundation of the Internet: trust. The result is that an arena that the world relies on for economic and informational exchange has turned into an active battlefield.

2-8-18 CableMap-02 - Copy Courtesy: Gateway House
2 August 2018

Version 2: Mapping China’s global telecom empire

This version of the Gateway House Map on China’s Expanding Global Telecom Empire identifies some more telecommunication assets -- optic-fibre and satellite ground stations -- that Beijing is working on in South and Central America, Africa, Myanmar, the Indian Ocean Region and mainland China besides the existing ones, such as the Pakistan East Africa Cable Express (PEACE). It shows the direction China’s investment is taking, its diplomatic overtures and the larger geopolitical implications of its growing telecom empire

admin-ajax Courtesy: Debating Security Plus
6 December 2017

Deterring the hybrid threat

From 26-28 September, Brussels-based think tank, Friends of Europe organised an online brainstorming on global security issues called Debating Security Plus 2017. As part of this, Gateway House moderated the discussion on hybrid and asymmetric warfare. Below is the summary of that discussion, from the final report of the Debating Security Plus.