A ransomware attack recently targeted Kaseya, a software services company in the U.S., for $70 million, incapacitating hundreds of its clients globally. There is an increasing incidence of such attacks, with perpetrators targeting government agencies and high-tech companies, leading to considerable economic losses. How can governments mitigate these threats and attribute responsibility to those accountable?
- Central Asia
- East Asia
- South Asia
- South East Asia
- West Asia
- Global Commons
- Book Reviews
- Conference Reports
- GH in the Media
- GH Wiki
- Maps and Infographics
- Partner Publication
- Podcasts and Videos
- Research Papers
- Research Reports
The ransomware attack on Colonial Pipeline in the U.S. has underlined the importance of cyber security in critical infrastructure. India has not escaped the brunt of a recent global surge in cyber attacks. Though New Delhi has taken steps to protect critical infrastructure, problems in information sharing of threat vulnerabilities impede an effective response.
We hosted a webcast with Konrad-Adenauer-Stiftung on, Myanmar: Hundred days after the coup on 13 May 2021 at 5:30 PM IST. This webcast discussed the conflict in Myanmar, the pulse of the protesters’ fight for democracy, the ominous presence of China as well as Russia and multilateral measures that the neighbouring countries including India can take towards restoring democratic processes in Myanmar.
On 18 Feb 2021, China and India completed a week-long border disengagement at Pangong Tso, ending a 10-month standoff. The Indian Army's Operation Snow Leopard, launched in late August 2020, provided India with strategic and tactical leverage during the negotiations. More broadly, India combined its political, technological, economic and diplomatic forces, creating a Comprehensive National Defense to counter Chinese adventurism. This infographic tracks the chronology of Indian actions, starting with the border standoff from Jan 2020 to last month's disengagement, nearly a year later.
On 21 October, Gateway House and the Institute of Chinese Studies, Delhi jointly hosted a webcast with Ambassador (Lt. Gen.) Karl Eikenberry, Sinologist, Deputy Chairman, NATO Military Committee; former Director of the U.S.-Asia Security Initiative at the Shorenstein Asia-Pacific Research Center, Stanford University on the Growing Sino-American Military Rivalry
The recent use of geospatial analyses by Indian social and mainstream media for near real-time defence and military intelligence in Ladakh has been made possible because of the lower cost of earth-observation satellite construction, and thereby, easy access to satellite imagery on the internet. While independent analysis is useful, the same intelligence can be also used against the interests of a sovereign nation by an adversary, especially border imagery. India must find innovative methods to reduce this vulnerability of commercial satellite imagery.
India has used military and diplomatic offensives against Pakistan as a response to the February 14 terrorist attack in Pulwama, Jammu and Kashmir. There are two more options available - legal, through sanctions, and economic - to curb Pakistan's dangerous adventurism. Gateway House explores both in the infographic below
After the Pulwama attack of 14 February 2019, Pakistan has come under the international scanner for its support and financing of terrorist groups. At a meeting of the Financial Action Task Force (FATF) in Paris last week, it was pulled up for its inability to choke terrorist financing. This primer illustrates the role of the FATF in tackling terrorist financing and money-laundering, and studies its recent review of Pakistan
The recent opening of the Kartarpur corridor in Punjab and the release of a Canadian parliamentary report on the security breach during Prime Minister Justin Trudeau’s India visit are important developments. They present a good opportunity for New Delhi to step up cooperation with Ottawa on countering terrorism and violent extremism
The immediate threat is more corrosive than explosive. States are using the tools of cyberwarfare to undermine the very foundation of the Internet: trust. The result is that an arena that the world relies on for economic and informational exchange has turned into an active battlefield.