Cyber war | what is cyber warefare| cyberspace
No commentsWednesday, 24 June 2020
June 24, 2020India china border tension explained
1 commentSunday, 21 June 2020
June 21, 2020The Pangong Lake
The Galwan valley and the Hot springs
Galwan Valley
Spotlight on the Gurkha regiments: Beyond the call of duty
2 commentsSaturday, 30 May 2020
May 30, 2020Spotlight on the Gurkha regiments:beyond the call of duty
The war cry of the Gorkha Regiments is ‘Jai Maha Kali, Ayo Gorkhali’ .
Hong Kong will no longer autonomous from china
No commentsWednesday, 27 May 2020
May 27, 2020History of Hong Kong
Shimla Convention and McMahon line
No commentsTuesday, 26 May 2020
May 26, 2020- Easy access to outer-line areas due to Williamsom episode,
- Fall of Qing dynasty led to a weak Central government in Peking,
- the Ambans got crushed due to a mutiny in Tibet.
- India will get Tawang region.
- Tibet will be divided into outer Tibet (Red line) and inner Tibet (Blue line).
- Outer Tibet to have a boundary with India and our have a with India and outer Tibet to have Dalai Lama.
China Standoff : Importance of Pangong Tso Lake and Galwan Valley , China's presence in Ladakh
No commentsHistory of Aksai chin and 1962 war
Top 12 Biggest Cyber Attacks in The World
No commentsSunday, 24 May 2020
May 24, 2020Here is the list of top Cyber Attacks that happened in the world.
1.In 1988, a cyber attack had happened on embassies of Sri Lanka with 800 emails a day. The message which was appearing was “We are the Internet Black Tigers and we are doing this to disrupt your communications.” Department of Intelligence characterizes the attack as a terrorist attack on government computer systems.2.On 3 June 1998, the "mealworm" hacking group attacked Web site of the Indian Bhabha Atomic Research Centre and stole e-mails from the same center. The three anonymous saboteurs through online interviews claimed that.
3.In July 1997, the leader of the Chinese hacker group claimed that temporarily disallowed Chinese satellite and announced that hackers set up a new global organization to protest and prevent investment by Western countries in China.Red hacker alliance |
4.In 1998, at the time of parliamentary elections in Sweden, Anonymous attacked the Web site of the political party pornographic sites. The same month, saboteurs attacked the website of the Mexican government in protest against government corruption and censorship.
Romanian hackers on one occasion managed to intrude into the computer systems controlling the life support systems at an Antarctic research station, endangering the 58 scientists involved. Fortunately, their activity is stopped before any accident occurred.
5.During the Kosovo conflict, Belgrade hackers conducted a denial of service attack (DoS) on the NATO servers. They typically used for diagnostic or control purposes or generated in response to errors in IP operations.
6.During the Palestinian-Israeli cyberwar in 2000, ProPalestinian hackers used DoS tools to attack Israel’s ISP, Netvision managed to resist subsequent attacks by increasing its safety.
ProPalestinian hackers attack Israel's ISP
7.In late 2008, when a group of hackers called the “Greek Security Team”, “intrude” into CERN computer systems (European Center for Nuclear Research) so deep, that they were very close to taking control of one of the detectors at LHC (Large Hadron Collider), whose aim was to defame the experts responsible for the computer system, calling them “a group of students.”
8.In April 2007, the “Associated Press” reported that cyber attacks on critical information infrastructure on Estonia DoS attacks carried out by different locations around the world (U.S., Canada, Brazil, Vietnam, and other locations). Of course, the locations of the computers involved in the attack do not always show the location of the direct participants in the attack. It is actually the location of the so-called “zombie” machines that act as intermediaries during the attack, without their knowledge or without any knowledge of the direct attackers. The attack completely put out the function of the Web sites of many governmental, media, and Þ financial institutions and leads to diplomatic talks which were a reason to examine the possibility of creating a NATO-supported research center capable of identifying the source of cyberattacks. In August 2008, a similar attack was conducted against Georgia. It is assumed that the attack was perpetrated by Russian hackers.
Estonia cyber-attack 2007
9.In 2007, hackers attacked the Ukrainian President Viktor Yushchenko's website. The attack was carried out by the radical Russian nationalist youth group, the Eurasian Youth Movement.
An analyst from the U.S. Central Intelligence Agency (CIA) publicly revealed that in January 2008, hackers successfully stopped power supply networks in several U.S. cities.
In November 2008, the Pentagon had a problem with cyber attacks carried out by computer virus, prompting the Department of Defense (DoD) to take the unprecedented step of banning the use of external hardware devices, such as flash memory devices and DVDs.Officially, the U.S. never felt a cyber-terrorist attack.
Border Dispute Between India and Nepal: Know what's the issue and history of Nepal's relationship with India
No commentsThursday, 21 May 2020
May 21, 2020Maj General Ian Cardoso: who chopped his leg with his own khukri
No commentsWednesday, 20 May 2020
May 20, 2020Kautilya's Arthashastra in 1948 and 1962 war
No commentsThursday, 14 May 2020
May 14, 2020We know how Kautilya's Arthashastra was used by Chandragupta Maurya to defeat Nanda and also to stop the advancement of Alexander, leading to the formation of a united India. Kautilya has explained state priorities and economic conditions and has propounded that the power of the state rests on seven Prakriti, and if any one of the seven Prakriti is weak the state is fragile. We need to understand the contemporary security environment by applying his theories.
According to the political theories of Max Weber, a state could be said to succeed in it maintains a monopoly on the legitimate use of physical force within its borders. When this is broken (for instance, through the dominant presence of warlords, paramilitary groups, or terrorism), the very existence of the state becomes dubious, and the state becomes a failed state.
Political scholar Queenie Hanlon says that states are of three categories-weak, failing, and failed. Hanlon says that half of this world is in the fragile category today and it is that which leads to instability conflict and war which provide conditions for terrorism, militias, and crime in the twenty-first century. Fund for Peace Fragile States Index underlines the democratic character of state institutions in order to determine its level of failure.
Kautilya's Arthashastra in 1948 War
The Indian Army could have marched ahead in the POK zone to drive out Pakistan, but the hostile climate and Pakistani guerrilla tactics prevented India from taking these measures. Kautilya clarifies that a state should not go and fight in an area that has a territory that is ungovernable. The inhospitable terrain of POK and its hostile climate made India land up in a situation where it could not, finally, capture POK. The logistics kept India back while poor military infrastructure compounded upon it to complicate issues.
The two concepts of Kautilya, Bhumisandhi (not entering in the territory which is ungovernable) and Vyasana (a state needs to take precautions and ensure logistics before the war), were both missing.