Articles and Commentaries

The Making of a Swadeshi Data Movement

Former chairman of the Unique Identification Authority of India (UIDAI) and architect of the Aadhaar initiative Nandan Nilekani recently made the case for a “data inversion” policy, requiring businesses operating in India to return the data they collect to the user.1 Over several iterations of this proposal, Mr. Nilekani has argued data of Indians is at…
Read more

Prospects for Effective International Cooperation on Cyber Security

When the first building blocks of cyber space1 emerged in the 1960s, the concept of effective international cooperation for cybers ecurity was not a priority. Today, an ever-expanding information-based global cyber domain, dominated by wireless and fixed broadband, smartphones, the mobile Internet, cloud computing, open data, big data and social media, and linked infrastructures for transmission…
Read more

Cyber Threats and Risk Mitigation

“The single biggest existential threat that's out there, I think, is cyber.” Michael Mullen Introduction Digital is the new paradigm. All facets of life today are being disrupted by digital technology, changing the way things were done or are being done. This disruption is all around us, in day to day life as well as…
Read more

PLA in Electromagnetic Domain

Introduction The PLA expects to fight intense short wars that will be very decisive. The ability of  military forces to communicate and coordinate rapidly through Command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) networks means that military forces in Local Wars at the operational level will be agile, capable of high-tempo deep operations, resource-intensive,…
Read more