IISPPR

Category: Blog

Public Policies
Azra T, Ritika, Anushka Verma, Prisca Ndoda, Surya Narayan, Vishakha and Modou Lamin Cham.

Cybersecurity Policies and Challenges in Public Sector Governance

INTRODUCTION In today’s hyper-connected world, digital technologies shape every aspect of our personal, economic, and political lives. From communication and banking to healthcare and critical infrastructure, nearly every sector relies on secure and stable digital systems. Yet, with these advancements come growing threats of cyberattacks, data breaches, misinformation, surveillance, and digital warfare. These threats do not respect national borders, and their impact can be devastating and far-reaching. As a result, cybersecurity has emerged as a top global priority, demanding robust and effective legal responses. It has become one of the most critical areas of concern for governments, businesses, and individuals across the world. As technology advances, so do the risks and threats to digital systems. Cyberattacks can target governments, critical infrastructure, hospitals, banks, and even personal devices.  GLOBAL APPROACHES TO POLICY REGULATION  Global legislative measures and compliance requirements in cybersecurity differ significantly across regions, reflecting varying regulatory philosophies, enforcement mechanisms, and national priorities. In the United States, cybersecurity regulation adopts a decentralised, sector-specific approach. This model provides flexibility for industries but also results in regulatory fragmentation. The Computer Fraud and Abuse Act (CFAA, 1986) is a foundational law addressing unauthorised access to computer systems. While pivotal, it has drawn criticism for being overly broad and outdated in an era of evolving cyber threats. Additionally, enforcement often falls under agencies like the Federal Trade Commission (FTC), which has played a central role in regulating cybersecurity through case law, as seen in FTC v. Wyndham Worldwide Corp. (2015), where the court held companies accountable for failing to implement reasonable cybersecurity practices. In contrast, the European Union has developed a more centralised and uniform regulatory framework. The General Data Protection Regulation (GDPR, 2018) is one of the world’s most comprehensive data protection laws, setting strict standards for data processing, consent, and breach notification, along with significant penalties for non-compliance. Complementing GDPR, the Network and Information Systems Directive (NISD, 2018) establishes security and incident reporting requirements for operators of essential services and digital service providers. Key rulings like Schrems II (2020), which invalidated the EU-U.S. Privacy Shield over surveillance concerns, have further complicated transatlantic data transfers and highlighted the global impact of EU regulations. The Asia-Pacific region exhibits a diverse regulatory landscape shaped by differing national priorities. China’s Cybersecurity Law (2017) is marked by its emphasis on data localisation, governmental oversight, and control over cross-border data flows, reinforcing state cybersecurity sovereignty. In Japan, the Basic Act on Cybersecurity (2014, updated 2021) empowers the National Centre of Incident Readiness and Strategy for Cybersecurity (NISC) to lead national cybersecurity policy, fostering public-private cooperation. India follows a hybrid model: the Information Technology Act (2000) addresses cyber crimes like hacking and identity theft, while the newer Digital Personal Data Protection Act (2023) strengthens privacy rights but allows exceptions for state interests. India also prioritises critical digital infrastructure, such as Aadhaar and UPI. Australia’s Security of Critical Infrastructure Act (SOCI, 2018; amended 2021) mandates incident reporting and imposes obligations on operators of essential infrastructure to maintain cyber resilience. In South Africa, a blend of criminal and data privacy laws has emerged through the Cybercrimes Act (2020) and the Protection of Personal Information Act (POPIA, 2013), aiming to combat digital offences while safeguarding personal data. Judicial decisions continue to shape global cybersecurity norms. India’s Shreya Singhal v. Union of India (2015) invalidated Section 66A of the IT Act, reinforcing free speech protections online. In the UK, R v. Andrew Skelton (2018) clarified corporate liability for internal data breaches. In China, Qihoo 360 v. Tencent (2013) exposed tensions between cybersecurity regulation and market competition. International Legal Instruments The Budapest Convention (2001) is the leading international treaty on cybercrime, promoting the criminalisation of offences like hacking and fostering cross-border cooperation (Council of Europe, 2001). However, key countries like India, China, and Russia have not signed it. India cites sovereignty concerns but supports many of its principles. The UN promotes responsible state behaviour through forums like the GGE and OEWG, though these often lack binding outcomes. Regional efforts such as the African Union’s Malabo Convention and frameworks from the Arab League and SCO remain limited by weak enforcement. Legal Challenges in Cyber Governance and the Way Forward One of the biggest legal challenges in cybersecurity is the lack of a global, binding treaty. This leads to conflicting national laws and confusion over jurisdiction when cybercrimes cross borders. Traditional mechanisms like Mutual Legal Assistance Treaties (MLATs) are often too slow for fast-moving digital threats. Another issue is that laws struggle to keep pace with rapidly evolving technologies. Areas like AI, cyber warfare, blockchain, and cloud regulation present new risks that most legal systems are not yet prepared for  To move forward, countries must harmonise key laws, improve cross-border cooperation, and build capacity through training and financial support. Public-private partnerships and awareness campaigns are also vital. Educational institutions should help train future legal and technical experts to ensure effective cybersecurity governance. ECONOMICS AND RESOURCES OF CYBERSECURITY In today’s digital world, cybersecurity is no longer just a technical issue. It has become an economic, political, and social challenge. As data, infrastructure, and services go online, protecting them involves not just money but also smart policy, strong partnerships, and proper regulations. Three main issues define the economics of cybersecurity: limited resources and outdated technology, the growing role of public-private partnerships, and different regulations across countries. Many organisations, especially small businesses and government departments, cannot afford the latest security tools. They often rely on old systems that cannot defend against modern cyber threats. For example, the 2017 WannaCry ransomware attack hit outdated Microsoft systems and caused damage in over 150 countries, affecting hospitals, businesses, and governments. There’s also a shortage of skilled cybersecurity professionals. As threats become more advanced, the number of trained experts is not enough. This creates a gap between the threats we face and our ability to deal with them. Wealthy companies can afford better security, while smaller ones remain vulnerable, increasing the overall risk. To handle these challenges, governments and private companies are

Read More »
International Relations
Authors: Bhumika Singh, Susanna Dasari, Deveshi Srivastava, Maryem Laghdaf, Abhishek

Multilateral Diplomacy in the 21st Century: Innovations and Global Challenges

Meta Description: Learn how multilateral diplomacy is evolving in the 21st century through innovation, digital tools, and inclusive platforms like Track II diplomacy.
Focus Keyword: Multilateral diplomacy
Secondary Keywords: 21st-century diplomacy, diplomatic innovations, global cooperation, digital diplomacy, Track II diplomacy.

Read More »
International Relations
Anjali Shah, Harsh Yadav, Sejal Barnwal, Nilesh Manickam, Nikita Suresh, Gauri Saraswat, Karthik Lal A.S

DATA WEAPONISATION BY STATE AND NON-STATE ACTORS DURING THE ONGOING CONFLICT IN WEST ASIA

ABSTRACT

The ongoing conflict in West Asia has underscored the increasing weaponisation of data by both state and non-state actors, fundamentally transforming the nature of warfare in the region. This paper explores how digital technologies, cyber capabilities, and propaganda networks are being strategically used to manipulate information, conduct surveillance, and disrupt critical infrastructure. Through a detailed analysis of the roles played by key state actors such as Israel and Iran, and non-state entities including Hezbollah, Hamas, and hacktivist groups, the study highlights the convergence of cyber warfare and psychological operations. 

It further examines global reactions, such as UN and EU interventions, and landmark case studies like the Pegasus spyware scandal and Iran-Israel cyber clashes. The paper critically evaluates the gaps in international legal frameworks that have failed to keep pace with the rapid evolution of data-driven conflict, emphasizing the need for robust international regulation and digital rights protection.

Finally, it assesses the profound impact on civilian populations, including the erosion of trust, violation of privacy, psychological harm, and restricted access to reliable information. The paper argues for a human security approach that integrates digital safety into conflict response mechanisms to mitigate the growing threats posed by data weaponisation in West Asia.

Read More »
Public Policies
Poorti

Health Insurance Penetration and Its Impact on Access to Healthcare in Developing Countries

1.Introduction 1.1 Understanding Relative Income in Economic Decision Making Relative income, as opposed to absolute income, refers to an individual or household’s economic position in comparison to others within their society or social reference group. James Duesenberry formulated the Relative Income Hypothesis (1949), which emphasized that individuals derive utility not only from their income but also from how that income compares to the income of others. In the school- and education-related context, this means that the decision regarding school type (public vs. private), tutoring, and other learning resources is dependent not only on the economic circumstances of the household but also on social norms and competitive pressures. Relative income shapes educational expenditures in both up and downward directions. Frank (2007) argues that families are often pushed to spend on visible status goods by perceived social comparisons, with education being one of the most important ones.  In a study by the Pew Research Center (2020), 62% of parents from urban areas in India reported “keeping up with peers” as a major consideration while spending on private tuitions and elite educational systems.This shows the non-linearity of educational investments: families will make a priority not due to their expectations of educational attainment, but because their sense of relative deprivation.   1.2 Link between Income and Educational Choices Statistical evidence from across the world and from Indian studies points toward strong concurrence between the income level of the household and the access to education. A significant proportion of high-income families can afford private schooling, extra tutoring, digital resources, and extracurriculars, all of which combine to enhance educational attainment. According to the National Family Health Survey (NFHS-5, 2019-21), the net attendance ratio for secondary education in India in the richest quintile is 71 percent, while in the poorest quintile, it is only 41 percent. According to UNESCO (2022), drop-out rates before completion of primary education are four times higher for children from bottom 20% income households than for those from the top 20%. Moreover, the Annual Status of Education Report (ASER) 2023 further indicates that the higher-income households consistently perform better than their peers in foundational numeracy and literacy, suggesting that income determines not only access but quality and outcomes too.   1.3 Income Tax Policies as a Determinant of Educational Investment Income tax policy is one of the most important tools through which wealth can be redistributed in an economy. The way such tax policies are structured at a given time can either alleviate or exacerbate economic inequality. For instance, progressive taxation whereby wealthier earners pay higher taxes in proportion to their income is almost invariably associated with greater redistribution and greater public services, education among them. Regressive taxation, or systems with very few tax brackets and fewer redistributive mechanisms, on the contrary, tend to increase inequality and limit the potential for public investment. Countries with more progressive taxes and more public education expenditure, such as Finland, Sweden, and Norway, are also among the best-performing and highly unequal societies in the world, according to the OECD (2023). The tax-to-GDP ratio of India, which hovers around 11.4% (2022-23), is far below that of the OECD average of 34%. Public expenditure on education is still much lower than the world average at 2.9%, notwithstanding the Kothari recommendation of at least 3% of GDP. Such low fiscal space means relatively poorer access to investment in quality schooling particularly in resource-poor rural and peri-urban areas. Further, amendments in income tax laws, such as increased deductions for education loans under Section 80E or the introduction of the new tax regime in 2020, have introduced differential effects on households and have sometimes acted as incentives while at other times tended to act as deterrence on private educational investment. 2.Objectives The link between tax policies and education has increasingly gained currency among economists, policy-makers, and social scientists. This study seeks to assess how changes in the system of taxation, especially income taxation, affect household decisions about children’s education. The objectives are designed to look into direct economic effects and indirect socio-psychological effects concerning income inequality triggered by taxation. To analyze the impact of income tax reforms on household income and child education outcomes. Income tax legislation directly affects households’ disposable income. Governments utilize progressive tax structures, tax rebates, deductions for education, and conditional cash transfers to increase or decrease private investment in education. Regressive tax structures, on the other hand, put a heavier burden on poorer households, making them less able to invest in education. The focus of the goal is to look into how historical changes in income taxation policies have resulted in measurable differences in educational enrollment ratios, quality of education, and dropout rates across different segments of income.    To analyze the role of income disparity in shaping aspiration for and access to quality schooling beyond absolute income, relative income- how well off a household is vis-a-vis all others within its reference group- can also influence attitudes regarding education. Children from poorer families might have lowered expectation and low motivation or feel stressed by trenchant socio-economic contrasts within school settings. Conversely, families feeling such pressure to “keep up” might invest heavily into education at the expense of basic necessities. This goal examines how such disparities, often exacerbated by uneven tax burdens and limited redistribution, shape aspirations and ultimately cascade down into education pathways.   Theoretical Framework 2.1 Human Capital Theory First conceived by Theodore Schultz in the year 1961 and later amplified by Gary Becker in the year 1964, the Human Capital Theory describes education as a form of investment, just like physical capital, which gives back dividends in the form of increased productivity, better employment alternatives, and much more enhanced overall economic growth; according to the theory, households and individuals behave rationally in cozying up or letting go from investing their resources into education according to analysis of costs (tuition materials, opportunity cost of time) vis—vis expected returns-future income, job security, among others. According to this framework, household income becomes a significant determinant of the ability

Read More »
Public Policies
Poorti

Relative Income and it’s effects on Child Education

In a country as socioeconomically diverse as India, the decision to invest in a child’s education is rarely dictated by income alone. Instead, it is shaped by a complex interplay of household earnings, perceived social standing, and the broader fiscal policies that govern disposable income. As income tax reforms continue to redefine the contours of economic opportunity, their ripple effects on educational choices—whether to pursue private schooling, supplemental tutoring, or higher education—become increasingly significant. This paper explores how relative income and income tax structures together influence household education decisions, not just through the lens of affordability, but also through social pressures, aspirations, and perceived deprivation. Drawing on Human Capital and Relative Deprivation theories, the study interrogates how inequality—both economic and psychological—translates into educational access and outcomes in contemporary India.

Read More »
Blog
1. Gauri Sankhla 2. Sreeja Mukherjee 3. Paridhi Madhukallya 4. Rishav Saha 5. Anwesha Roygupta 6. Ikechukwu Francis Ikebuaso 7. Freshta Naim

Gendering The Green Agenda: The Role of Women in Environmental Governance at Local and Global levels

The article “Gendering The Green Agenda” examines the crucial yet underrepresented role of women in environmental governance at both local and global levels. Despite women’s historical contributions to conservation and their disproportionate vulnerability to ecological degradation, they face significant barriers to participation in formal decision-making processes, including institutional bias, limited educational opportunities, financial constraints, and entrenched cultural norms. Drawing from case studies like India’s Chipko Movement and Kenya’s Green Belt Movement, the article demonstrates how women’s leadership fosters more inclusive, equitable, and effective environmental outcomes through diverse perspectives, enhanced community engagement, and innovative solutions. While international frameworks increasingly recognize the importance of gender inclusion in environmental policy, implementation remains inconsistent. The article concludes that bridging the gap between women’s grassroots activism and formal policymaking is essential for sustainable development and climate resilience, requiring structural reforms, capacity-building initiatives, targeted funding, and cultural shifts in gender norms.

Read More »
International Relations
Rudrakshi Bisht, Farhat Habibi, Tanu Nagar, Ravinandan Bajpai, Tavneet Kour, and Mahek Agarwal

DIPLOMACY IN CONFLICT REGIONS

ABSTRACT Diplomacy in conflict region’s failure is not measured in policy terms, but in human lives. In volatile zones such as Gaza, Sudan, or Eastern Ukraine, diplomacy transcends quiet negotiations; it becomes an urgent, high-risk pursuit of stability amid violence and fractured authority. One of the central challenges is the absence of a neutral ground. In asymmetric conflicts—where governments, insurgents, and foreign proxies simultaneously claim legitimacy—diplomats confront an ethical dilemma: to engage may risk legitimising violence, yet to disengage may prolong suffering. Sovereignty and humanitarian duty often collide. The 2011 Libya intervention, which began as a humanitarian effort and swiftly turned into regime change, underscores the tension between moral responsibility and political consequence. Impartiality is also fragile. In arenas where great powers support opposing sides—such as Syria or Yemen—diplomatic credibility is compromised, and multilateral institutions like the UN or African Union struggle to mediate with authority. Realpolitik casts a long shadow. Strategic interests—alliances with authoritarian regimes, energy corridors, or migration control—often overshadow human rights, transforming diplomacy into a quiet enabler of instability. Yet history also offers lessons in resilience. Peace-building efforts in Colombia or post-genocide Rwanda highlight the potential of diplomacy when it is inclusive, sustained, and locally grounded. In these fragile contexts, diplomacy must be more than negotiation. It requires moral clarity, cultural fluency, and principled resolve. Diplomats must engage not only with governments but also with the voices of the displaced, the silenced, and the scarred. Ultimately, diplomacy in conflict zones must evolve beyond crisis management. It must become a force for structural transformation—dismantling the systems that sustain violence and rebuilding futures rooted in justice, dignity, and peace.   KEYWORDS: Conflict Diplomacy, Asymmetric Warfare, Humanitarian Intervention, Sovereignty vs Human Rights, Ethical Dilemmas in Diplomacy, and Structural Transformation.   INTRODUCTION In conflict zones, diplomacy is no longer a quiet, behind-the-scenes craft—it becomes a high-stakes mission where words can save lives or deepen wounds. As the world grapples with protracted crises in Gaza, Sudan, Eastern Ukraine, Syria, and beyond, the traditional frameworks of diplomatic engagement are being tested like never before. The boundaries between state and non-state actors blur. Legitimacy is contested. Neutral ground is elusive. In such volatile terrains, diplomacy becomes not just a matter of negotiation, but of survival, ethics, and strategy. This article explores the complex dimensions of diplomacy in conflict regions, where each decision carries profound humanitarian, political, and moral consequences. It examines how diplomats navigate contested sovereignty, asymmetrical warfare, and fractured authority structures—often under pressure from competing global interests. Through real-world cases, it analyses the ethical dilemmas of engagement: when speaking to violent actors risks legitimising them, but silence may mean abandoning the vulnerable. Furthermore, the article interrogates the role of multilateral institutions such as the United Nations and African Union, whose efforts are often constrained by limited authority and geopolitical influence. It explores how realpolitik—strategic alliances, energy dependencies, and migration controls—can distort diplomatic priorities, sometimes at the cost of long-term peace. Yet amid these challenges, the article also highlights pathways forward. Drawing on examples of transformative peace building efforts, it argues that diplomacy in conflict zones must evolve beyond reactive crisis management. It must become a proactive force for structural change—one that listens to the displaced, centre’s justice, and rebuilds war-torn societies with dignity. By tracing the tensions between principle and pragmatism, this article aims to provoke fresh thinking about diplomacy’s role in the world’s most fragile regions—and to imagine a future where diplomacy becomes a genuine instrument of peace.   TYPES OF CONFLICT AREAS AND THEIR UNIQUE CHALLENGES Typologies of conflict zones and their distinct challenges. In a world increasingly shaped by geopolitical tensions and internal fractures, understanding the types of conflict zones is essential for developing sustainable peace frameworks. While conflicts often overlap in causes and outcomes, they are commonly categorised as ethnic, ideological, resource-based, territorial, and political. Each presents a distinct set of challenges for policymakers, peace builders, and affected communities.   Ethnic Conflicts Ethnic conflicts stem from historical grievances, cultural exclusion, or contested national identities. Since 1946, nearly 40% of armed conflicts have had ethnic dimensions.¹ South Sudan and the Balkans exemplify how deeply rooted ethnic divisions disrupt state-building and require long-term reconciliation efforts that go beyond ceasefires.   Ideological Conflicts Ideologically driven conflicts are marked by clashes in political, religious, or philosophical beliefs. The Taliban in Afghanistan or ISIS in the Levant illustrate how such rigid ideologies threaten pluralism.² These conflicts resist resolution through military means alone and demand counter-radicalisation, education, and ideological reintegration.   Resource-Based Conflicts Over 45% of civil wars since 1990 have been linked to disputes over natural resources.³ In places like the Niger Delta and the DRC, the struggle over oil or minerals is intensified by environmental degradation, corruption, and foreign exploitation. These dynamics turn local grievances into protracted violence.   Territorial Conflicts Disputes involving borders—such as Kashmir, the South China Sea, or Israel-Palestine—are rooted in sovereignty claims, national identity, and legal ambiguity.⁴ These conflicts often become internationalised, with negotiation complicated by competing historical narratives and strategic interests.   Political Conflicts Political instability frequently emerges in fragile democracies or autocracies. Myanmar’s 2021 coup and Venezuela’s constitutional crisis show how governance failures and power struggles trigger civil unrest and legitimatise institutions.⁵ Restoring trust and accountability in such contexts is a long, delicate process. Therefore, each conflict zone carries unique historical, political, and socioeconomic complexities. Lasting peace cannot emerge from generic solutions; it requires tailored, inclusive strategies that address root causes, not just symptoms. By appreciating the distinctions between conflict types, global actors can better foster durable and just peace.   DIPLOMATIC METHODS USED IN CONFLICTS Diplomacy continues to be one of the pillars of conflict resolution and transformation across the world. Diplomacy involves a range of formal and informal dialogue and negotiations, and efforts to mitigate hostility, promote cooperation and sustain peace in the long-term. Particularly when applied in conflict-ridden areas, like the middle east, sub-saharan Africa and certain areas of South Asia, diplomacy encompasses both formal and informal methods of statecraft and peace-building. The

Read More »
Blog
Rudrakshi Bisht, Farhat Habibi, Tanu Nagar, Ravinandan Bajpai, Tavneet Kour, and Mahek Agarwal

CYBERWARFARE AND AI IN DIPLOMACY

ABSTRACT In an era where technological warfare dictates geopolitical power, Cyber Warfare and AI in Diplomacy have become pivotal yet dangerously unregulated domains. The increasing reliance on AI-driven cyber operations, digital espionage, and strategic cyber-attacks has reshaped global diplomacy, yet the absence of legally binding international frameworks leaves nations vulnerable. While world leaders acknowledge the risks, consensus on governance remains elusive, creating a policy vacuum that adversaries continue to exploit. This article examines the evolution of cyber warfare, the integration of AI in statecraft, and the geopolitical implications of cyber conflicts. Through case studies of major cyber incidents, we analyse how nations leverage cyber warfare as a tool of power projection and diplomatic leverage. The research further explores how AI amplifies both offensive and defensive cyber capabilities, blurring the lines between warfare and diplomacy. Our methodology is multi-disciplinary, with each team member analyzing distinct aspects—historical evolution, contemporary threats, and policy gaps. By integrating real-world incidents, strategic analyses, and diplomatic challenges, we underscore the urgent need for global AI cybersecurity regulations. The findings suggest that without proactive international cooperation, cyber conflicts will escalate, destabilizing global security and reshaping diplomatic engagement.     KEYWORDS: Cyber Warfare, Digital Diplomacy, Global Security, AI Policy, Cybersecurity, Autonomous Systems, and Conflict Prevention.   INTRODUCTION The emergence of new technologies is largely responsible for the rapid changes in the global security landscape. Among these, governments, organizations, and society around the world are increasingly concerned about cyber warfare. Cyber attacks are a serious threat to infrastructure, national security, and even the balance of power in the world, making what was previously a theoretical or future idea an indisputable reality. In the context of cyber warfare and international relations, artificial intelligence (AI) has become both a tool and a challenge as the complexity and reach of cyber threats increase. The way battles are fought and settled has fundamentally changed as a result of the convergence of AI and cyber warfare. AI is transforming both military and diplomatic tactics with its capacity to process enormous volumes of data, anticipate cyber threats, and even make judgments in real-time.   The lines separating classic combat from contemporary diplomacy are blurring as nation-states and other actors depend more and more on AI-driven systems. AI-powered cyber attacks can now do more than simply take down networks; they are instruments that can change the balance of power in the world and the way countries interact and negotiate with one another. This aim to investigate the expanding importance of artificial intelligence (AI) in the fields of diplomacy and cyber warfare, with an emphasis on how it affects security plans and conflict resolution. This article explores how technology is changing the character of diplomacy and conflict, from analyzing important case studies of cyber events to comprehending the moral and legal conundrums raised by AI. We’ll also examine how international organizations like the UN and NATO might address the issues raised by AI’s impact on international security. As we look to the future, understanding how AI will continue to shape both the battlefield and diplomatic discussions is crucial for navigating an increasingly complex geopolitical environment. This paper provides an in-depth analysis of these emerging trends and their potential implications for the future of international relations and cyber security.     EVOLUTION OF CYBER-WARFARE Cybersecurity has evolved from an experimental field into a cornerstone of global security. In the 1970s, interconnected computing began with ARPANET, revealing vulnerabilities that led to the first self-replicating program, Creeper (1971). Though non-malicious, it prompted the creation of Reaper, the first antivirus. By the 1980s, as personal computing expanded, cyber threats became more sophisticated. The Morris Worm (1988), infecting 10% of the internet, marked a turning point, leading to the establishment of the Computer Emergency Response Team (CERT). The late 1990s and early 2000s saw cybercrime become organized. The ILOVEYOU virus (2000) exploited email vulnerabilities, infecting millions. The 2000s also witnessed a shift from disruption to financial and geopolitical motives. The SQL Slammer (2003) and Conficker (2008) worms demonstrated large-scale vulnerabilities, while the Stuxnet attack (2010), allegedly by the U.S. and Israel, introduced cyber warfare into physical systems by crippling Iran’s nuclear program. By the 2010s, cyber warfare expanded with the rise of ransomware, AI-driven hacking, and disinformation campaigns. The WannaCry (2017) attack disrupted global infrastructure, while deepfake-driven misinformation fueled cyber fraud, election interference, and identity theft. By the 2020s, cyber threats became more advanced, with AI-powered phishing and autonomous hacking targeting critical sectors, while deepfake technology became a tool for large-scale digital deception. In 2025, quantum computing threatens modern encryption, and AI-driven cyberattacks are increasingly weaponized. Recent incidents, such as the Ukraine Railway Cyberattack (March 2025) and suspected sabotage of Baltic Sea cables (November 2024), signal how cyber warfare is now an essential tool in geopolitical conflicts. As these threats escalate, global cybersecurity strategies must evolve rapidly to counter this new digital battlefield.       AI IN CYBER-WARFARE   The advent of Artificial Intelligence (AI) has triggered a paradigm shift in global security dynamics, particularly in the realm of cyberwarfare. As AI continues to evolve, its applications in digital warfare have become increasingly sophisticated, making both defensive and offensive cyber operations more potent. While AI enhances national security through automated threat detection and response, it also presents unprecedented risks if exploited by malicious actors. The dystopian possibilities of unchecked AI in cyberwarfare have been explored in various academic and literary works. One such notable reference is Martin C. Libicki’s “Cyber deterrence and Cyberwar”, which warns of AI’s potential to escalate digital conflicts beyond human control. The surge in cyberattacks worldwide is a testament to the growing role of AI in warfare. In recent years, nation-state actors and independent hacker groups have employed AI-driven malware, deepfake technology, and automated phishing campaigns to target governments, corporations, and even individuals. The SolarWinds hack and the Colonial Pipeline attack serve as stark reminders of how AI-enhanced cyber threats can cripple critical infrastructure. Additionally, AI-powered bots have been increasingly used in disinformation campaigns, manipulating public opinion

Read More »
Blog
admin

The Impact of Artificial Intelligence, Robotics, and Automation on Employment Trends and Income Inequality – Copy

This article talks about how automation, robotics, and AI are reshaping the global job market, bringing both progress and challenges. While these technologies enhance productivity and create new opportunities, they also threaten routine and mid-level jobs, potentially deepening income inequality. The text stresses the importance of government action, investment in digital infrastructure, and a focus on education and reskilling to ensure that technological advancement benefits everyone and no one is left behind.

Read More »
International Relations
Anto Mariya M M

Maritime Security in the Indo-Pacific: Assessing the Role of Key State Actors

Maritime Security in the Indo-Pacific: Assessing the Role of Key State Actors Author: Anto Mariya M M Introduction The Indo-Pacific is a maritime region which has become an arena for geopolitical competition. The region has become the contemporary strategic interest of state as well as non-state actors. With the challenges of territorial disputes, IUU fishing and piracy, cooperation for maritime security becomes imperative (Maritime Security – Pacific Forum, 2024). Power politics also play out in the region. Maritime security can mean the strategies adopted to safeguard the maritime infrastructure from vulnerabilities. It encompasses a range of activities aimed at safeguarding maritime assets, ensuring the safety and security of trade routes, and preventing illicit activities at sea (Windward, 2024). Major powers like the USA and China, as well as regional players like India and Japan, have a strategic interest in safeguarding the maritime region of the volatile Indo-Pacific. Even the often-ignored small island and littoral states play an important role. This article examines the roles of different state actors from a broad power spectrum in the region’s maritime security. Role of State Actors United States The United States has the largest military presence in the Indo-Pacific region, sustained by its naval bases and fleets. The US’s presence in the region started primarily as a move to curtail communism in the area during the Cold War (Gopal, 2017). However, the United States’ interests have widened, and so has its naval force in the region. One of its goals in the region is safeguarding important shipping routes in the Indo-Pacific and the free flow of trade supported by its allies. India, Japan and Australia are some of the key partners of the United States in the Indo-Pacific’s security domain. However, the primary target in maritime security of the Indo-Pacific is to tame the Chinese dragon from expanding its territory and influence, mainly in the East and South China Seas. To cut back Beijing’s regional dominance, the US has even encouraged India, another regional player, to take the role of ‘Net Security Provider’. It includes President Donald Trump preferring the term Indo-Pacific over Asia-Pacific in light of China’s expanding politico-military activities. Thus, the United States’ maritime security focus has been to increase regional stability and stop nuclear proliferation and terrorism, including its many other security initiatives. The global power, the USA, conducts the world’s largest international maritime exercise, the Rim of the Pacific (RIMPAC) exercise. It has also emphasised partnerships such as AUKUS with Australia and the United Kingdom, as well as the Quadrilateral Security Dialogue with the democratic nations of Japan, India, and Australia. These military exercises and alliances are also part of the US’s greater role in the Indo-Pacific region. China China’s imperial aspirations of becoming Zhongguo, or the ‘Middle Kingdom’, which refers to being the centre of the world, are still very much present (Air University (AU), 2024). China realises its path to superpower status through regional hegemony. It forms the rationale why China spends a great deal of effort exerting control over the Asia-Pacific, such as its Belt and Road Initiative and its components like the Maritime Silk Road, or making expansive jurisdictional claims in the South China Sea – the Nine-Dash Line. International law, even the United Nations Convention on the Law of the Sea, signed by China, takes a back seat in this matter. This assertion by China has caused the South China Sea to emerge as a flashpoint in the region. Beijing wants to reduce the presence of the United States in the region to a great extent. Oftentimes, the Indo-Pacific has become a stage where the power politics between the USA and China play out. The Chinese want the United States’ military forces, its allies and security partners farther away from its shores. It is the only way they can protect themselves from frequent maritime challenges. Thus, China aims to reach an unassailable strength to have control over the economy and military in the region and extend its global influence. India The adoption of the concept of Indo-Pacific, replacing Asia-Pacific, emphasised a bigger role for India. However, it was initially cautious. Nations like the US wanted India to be part of the security architecture of the region. The assertiveness of China in the Indian Ocean called for India to take a proactive role. In the confluence of the Indian and Pacific Oceans, India’s position and interests in the Indian Ocean overtook the Pacific, unlike the US, Japan and Australia (The Indo-Pacific in Indian Foreign Policy, n.d.). India’s main priorities for involvement in the region are energy security and economic prosperity. It needs to secure sea lanes for its oil imports and trade routes from Maritime threats. To counter the aggressive Chinese behaviour, India engages with like-minded partners through the Quad, BIMSTEC, IORA, and ASEAN forums. New Delhi also endorses the vision of a ‘free and open Indo-Pacific. Thus, India is a regional power with a crucial role to play in the maritime security of the Indo-Pacific region. Japan Japan, a keen player in the Indo-Pacific geopolitical domain, takes up the Free and Open Indo-Pacific (FOIP) Strategy. It is often overlooked, but Japan plays a crucial role in reducing the small Pacific nations’ reliance on China. Japan aids these small maritime nations in protecting their water with various capacity-building measures. For instance, Japan engages with small island states in the Pacific, such as Fiji, Micronesia, and Palau, to promote their maritime security capability. Tokyo’s initiatives support a rules-based maritime order and help stabilise the Pacific region against external coercion (IPDForum, 2024). Japan also partners with the United States and Australia to secure the sea lanes and strives for the same through initiatives like the Blue Dot Network and the Indo-Pacific Partnership for Maritime Domain Awareness (IPMDA). Japan is thus a key regional power, addressing challenges of illegal fishing and environmental threats and, by and large, fortifying maritime security in the region. Small Maritime States The littoral and island states in the Indian and Pacific oceans are

Read More »