Lessons from BRICS: Developing an Indian Strategy on Global Internet Governance

image: 
Thumbnail images: 

In between headlines of a BRICS bank and other successes at Fortaleza, Brazil in July 2014, there was another aspect to India’s Prime Minister Narendra Modi’s speech that had special relevance to cyber analysts. Addressing the conference, he said, “…while cyber space is a source of great opportunity, cyber security has become a major concern. BRICS countries, should take the lead in preserving Cyber Space, as a global common good. I am happy we are cooperating on this through our National Security Advisors.”

Achieving Human Well-Being - A Control System Framework

image: 
Thumbnail images: 

'Security'implies the state of being free from danger. Therefore, national security should mean that the nation state is free from any danger or threat. However, the state is not only the physical manifestation of land borders, but comprises of its people, for whom the state exists. Hence security of the society, groups and individuals from both military and non-military threats is paramount.

The New Cold War and India - Part 4 of 4

image: 
Thumbnail images: 

One of the successful manoeuvres China undertook (from the late 1970s and 1980s) for a seat at the global high table was the “polar” international structure. In the 1980s China projected a tri-polar power balance with the USA and the Soviet Union as the strong poles and China as the third pole weak but growing. This was the theory necessitated the two powers to strengthen China to maintain global stability.

 

The New Cold War and India - Part 3 of 4

image: 
Thumbnail images: 

President Xi Jinping appears to have taken full control of the PLA, especially following the recent anti-corruption drive, bringing down heavy weight power centres in the armed forces. As chairman of the Central Military Commission (CMC), he made emphatically dear to modernize a military that can “fight wars and win wars”.

 

The New Cold War and India - Part 2 of 4

image: 
Thumbnail images: 

By 2010 China felt that it was strong enough to establish its own “Monroe Doctrine”. But it wanted in a manner, US blessings. A senior Chinese official indicated off the table to US Secretary of State Hillary Clinton that Washington accept the South China Sea as China’s “core interest” that is, South China Sea was Chinese sovereign territory, and China would accept USA’s domination elsewhere. Clinton declined the proposal.

The New Cold War and India - Part 1 of 4

image: 
Thumbnail images: 

The old cold war between the US and the Soviet Union, or the NATO and the Warsaw Pact countries, had some clear lines of division. China gradually moved from the anti-US camp to the anti-Soviet comp and in the course maximised its benefits, proving self-interest and not ideology was the essence.

 

Competition for Hydropower in the Himalayan Region: The Complex Regional Scenario

Author name: 
Aakriti Sethi, Research Intern, Institute of Defence Studies Analyses, New Delhi
Images: 

Natural resources are one of the primary determinants of any nation’s development. And the need for uninterrupted access to these resources has led to increasing competition among nation states. The present tug of war for resources in the Himalayan region is the most recent example of this. The Himalayan fresh water reserves are highly crucial for the sustenance of the region. The Himalayas is the source for the Indus, Ganga, Yarlung, Yangtze, Yellow, Mekong, and Nuijang rivers.

Wang Yi's India Visit: China Revitalizing its Engagement with India

The bilateral relationship between states is one of the most important aspects in International Relations. Relations between India and China have geared up since the last few years. To continue the improved relations, it is of pivotal importance for China to prioritize engaging with the changing leaderships in India.

Bleeding Security: Vulnerabilities in Protocols, Standards and Software

The internet has become the primary medium of communication in the era of globalization, which is highly dominated by the information and communication technologies. The internet – network of networks – deals with massive data which is transmitted over secure as well as insecure channels and media. The security requirement of data is determined by the value or importance of data.

The ISIS and Conflicts in Syria and Iraq: A Threat Analysis

The ISIS – Islamic State of Iraq and Syria, previously called al-Qaeda in Iraq under the leadership of Abu Musab Al-Zarqawi and currently called the Islamic state (after declaring Iraq a ‘Caliphate’) – has become a major non-state player in the conflict in Iraq as well as Syria. The organisation, which has its origins in Iraq, had shifted its base of operations to Syria when the civil war began in the country to oust the Assad regime.