Search: For - espionage

32 results found

APT36 ची लिनक्स मोहीम: भारत- पाकिस्तान सायबर संघर्षाचे नवे पर्व
Nov 19, 2025

APT36 ची लिनक्स मोहीम: भारत- पाकिस्तान सायबर संघर्षाचे नवे पर्व

भारताच्या BOSS लिनक्स प्रणालीवर APT36 या गटाने केलेल्या लक्ष्�

APT36’s Linux Campaign Marks New Phase in India-Pakistan Cyber War
Oct 14, 2025

APT36’s Linux Campaign Marks New Phase in India-Pakistan Cyber War

APT36’s targeting of India’s BOSS Linux system reveals the expanding scope of Pakistan’s cyber-espionage operations, underscoring the urgent nee

हिंद-प्रशांत क्षेत्र में चीन के साइबर प्रभुत्व के विरुद्ध प्रतिक्रियाएँ
Sep 17, 2025

हिंद-प्रशांत क्षेत्र में चीन के साइबर प्रभुत्व के विरुद्ध प्रतिक्रियाएँ

चीन के साइबर हमले हिंद-प्रशांत की दरार को पाट रहे हैं. अलग-�

China’s cyber aggression and the South China Sea dispute
Mar 25, 2025

China’s cyber aggression and the South China Sea dispute

Beijing’s cyber threat actors are ramping up attacks amid the South China Sea dispute, engulfing the Philippines, Vietnam, and other claimant countr

India’s thought-craft needs to be in tune with its statecraft
Aug 01, 2024

India’s thought-craft needs to be in tune with its statecraft

For starters, embed geopolitics into economic policy. For desserts, craft India’s grand strategy.

Comprehending the conduit: Spy capitals in a changing world order
Jul 29, 2024

Comprehending the conduit: Spy capitals in a changing world order

Despite advances in technological surveillance, key spy capitals continue to play a significant role in the world of geopolitics and international esp

India’s foreign intelligence and a need for narrative management
May 18, 2024

India’s foreign intelligence and a need for narrative management

As India’s international stature grows, its intelligence agencies will come under greater scrutiny. The R&AW should institute a PR mechanism to

States’ use of non-state actors in cyberspace
Aug 17, 2023

States’ use of non-state actors in cyberspace

Without proper legislation, states using non-state actors for cyberwarfare pose a significant threat to governments, businesses, and individuals

Expanding Chinese cyber-espionage threat against India
Apr 18, 2022

Expanding Chinese cyber-espionage threat against India

Adequate measures need to be adopted to strengthen India’s cyber defence as it has become increasingly susceptible to Chinese cyber attacks

Bundeswehr: Cyber security, the German way
Oct 20, 2016

Bundeswehr: Cyber security, the German way

There are a number of measures the Bundeswehr needs to take to fill the ranks of its planned cyber command.

China faces a new threat as US cracks down on economic espionage
Feb 24, 2020

China faces a new threat as US cracks down on economic espionage

US crackdown on economic espionage could hurt research and innovation

Chinese Global Exchange Diplomacy and Influence Operations: An Overview
Feb 15, 2024

Chinese Global Exchange Diplomacy and Influence Operations: An Overview

Since the onset of the twenty-first century, China has employed various instruments of exchange diplomacy to overcome its historical 'century of humiliation’ and realise its 'Middle Kingdom’ dream. Riding on the platform of the Belt and Road Initiative, China has leveraged its strong economy and large human resources through tourism, education, and sister-city arrangements to strengthen people-to-people contact between its citizens, diaspora,

Chinese Whispers and the Global Intelligence Landscape
Oct 20, 2025

Chinese Whispers and the Global Intelligence Landscape

Two separate cases underscore one of the most serious challenges that open democracies are facing today in managing Chinese aggressive tactics when it comes to influence operations.

Decoding motives behind the Kudankulam intrusion
Nov 25, 2019

Decoding motives behind the Kudankulam intrusion

Was the cyber espionage an effort to access nuclear technology? Was it engineered by strategic rivals?

Intelligence quotient
Jun 21, 2006

Intelligence quotient

Intelligence and the world of espionage are as old as history. Rameshwar Nath Kao, the first chief of R, used to say that his friend, Comte Alexandre de Marenches, the French chief of intelligence during the Seventies, described this world as the best. Marenches used to say that espionage was an unscrupulous game played by gentlemen.

North Korea’s Cyber Strategy: An Initial Analysis
Nov 21, 2024

North Korea’s Cyber Strategy: An Initial Analysis

North Korea is among the states that stand out for their often defiant behaviour, divergent from typical diplomatic niceties and non-compliant with widely accepted international liberal norms and rules. This ‘uniqueness’ is seen, for instance, in the country’s nuclear weapons development programme, which has been the object of global attention since the early 1990s. North Korea has now extended this behaviour to the cyber domain, marked by

Securing the Critical Technology Supply Chain as a Function of National Intelligence
Aug 21, 2024

Securing the Critical Technology Supply Chain as a Function of National Intelligence

This paper examines the role that national intelligence agencies may play in helping to secure critical technology supply chains. As the race for scientific advantage becomes increasingly characteristic of national security concerns amid growing multipolarity and interstate competition, national intelligence agencies are paying greater attention to the security of critical and emerging technologies. This paper analyses how intelligence agencies m

Snowden effect
Jun 25, 2013

Snowden effect

It is not often that China defends the rights of whistleblowers against the state and America finds itself defensive about internet freedom. That precisely is what Edward Snowden, the young American who has exposed the expansive cyber espionage activities of the National Security Agency in the United States against its own citizens and the rest of the world, has achieved.

Spy Game in Afghanistan
Jun 05, 2015

Spy Game in Afghanistan

The MoU between the espionage agencies of Afghanistan and Pakistan is a case of the latter showing India the finger, never mind that it flies in the face of history and logic

The Road to 5G Innovation: Exploring O-RAN Through Experimentation
May 12, 2025

The Road to 5G Innovation: Exploring O-RAN Through Experimentation

With its higher speeds, ultra-low latency, and massive connectivity capabilities, 5G technology represents a new era in telecommunications that promises to redefine industries and everyday life. Chinese telecom companies have taken the lead in developing and commercialising 5G technology, threatening the commercial prospects of Western telecom firms and giving rise to fears of surveillance and espionage. The open radio access network (O-RAN) is a

Virtual Alarm: Social Engineering Attacks Imperil Cyber Security
Aug 23, 2023

Virtual Alarm: Social Engineering Attacks Imperil Cyber Security

Cyber security threats have amplified significantly in the last decade, creating security concerns across the globe. Media reports during this period have highlighted how information network systems have been exploited by cyber criminals-as well as States-on numerous occasions for espionage and intelligence gathering. In this backdrop, this Paper focuses on cyber security concerns related to Social Engineering.

अमेरिका-चीनमधील ‘गुप्त’ हेराफेरी
Feb 28, 2020

अमेरिका-चीनमधील ‘गुप्त’ हेराफेरी

चीनने जर स्वतःची सामरिक उद्दिष्ट्ये साध्य करण्यासाठी कुरापती करण्याचा प्रयत्न केला तर चीनला त्याच भाषेत उत्तर देण्यास अमेरिका मागेपुढे पाहणार नाही.

नवीन निर्बंध लागू करत चीनच्या चिप उद्योगाला चाप
Oct 20, 2023

नवीन निर्बंध लागू करत चीनच्या चिप उद्योगाला चाप

अमेरिकेने घातलेल्या बंदीमुळे “चीनला कायमचे थांबवता येणार नाही”, अमेरिका आणि त्याच्या मित्र राष्ट्रांची आगेकूच कायम राहावी, म्हणून त्यांना चीनला रोखायचे होते.

भारताविरुद्ध चिनी सायबर हेरगिरीचा धोका वाढतोय
Jan 06, 2023

भारताविरुद्ध चिनी सायबर हेरगिरीचा धोका वाढतोय

भारताचे सायबर संरक्षण मजबूत करण्यासाठी पुरेशा उपायांचा अवलंब करणे आवश्यक आहे, कारण ते चीनच्या सायबर हल्ल्यांनी अधिकाधिक संवेदनशील बनले आहे.