Tag: Technology

  • China has achieved escape velocity: it is now unstoppable

    China has achieved escape velocity: it is now unstoppable

    The 21st century is shaping up to be the Asian, Eurasian, and Chinese century.

    While the Hegemon spent at least $7 trillion – and counting – on unwinnable Forever Wars, China is spending $1 trillion in an array of Belt and Road Initiative (BRI) projects across the Global South: the emphasis is digital/transportation connectivity corridors. Geoeconomic imperatives intertwined with rising geopolitical influence.

    The four-day, twice-a-decade plenum of the Communist Party of China that took place last week in Beijing, designing an economic road map all the way to 2029, was a stunning affair in more ways than one.

    Let’s start with continuity – and stability. There’s no question after the plenum that Xi Dada, or The Big Panda, will stay on the helm until 2029 – the end of the current five-year economic drive.

    And if Xi is healthy enough, he will stay until 2035: the fateful and uber-game-changing target year for China to exhibit a GDP per capita of $30,000, with massive worldwide reverberations.

    Here, we see the confluence between the progression of “socialism with Chinese characteristics” and the defining contours, if not of a Pax Sinica, at least of the non-Hegemon-centric, multi-nodal world (italics mine).

    The proverbial U.S. Think Tankland/Sinophobia axis has been hysterical on China not being able to sustain a 5% a year growth rate for the next few years – the target once again stressed at the plenum.

    The Chinese themselves have not bothered about the growth rate for a long time, since in 2018 they switched to a strategy of so-called qualitative development, that is, not at the expense of traditional industries, but on the basis of high technologies and the creation of new areas, such as the production of new energy sources and artificial intelligence.

    A Russian analysis by the Center for Geopolitical Forecasts makes a crucial point: “The Chinese themselves have not bothered about the growth rate for a long time, since in 2018 they switched to a strategy of so-called qualitative development, that is, not at the expense of traditional industries, but on the basis of high technologies and the creation of new areas, such as the production of new energy sources and artificial intelligence.”

    That’s the rationale behind Made in China 2025 – which is being implemented at breakneck speed: high-tech development leading the way towards a “high-level socialist market economy”, to be consolidated by 2025 and fully constructed by 2035.

    The next step will be to attain the status of “modernized socialist power” by 2049, at the 100th anniversary of the People’s Republic of China (PRC).

    The plenum proved once more that “socialism with Chinese characteristics” – or, for the recalcitrant, Chinese-modified capitalism – is “people-centric”. The supreme values are national interest and the people’s interests – attested by the fact that large private corporations remain under the strategic control of the CPC.

    It’s idle to try to find in the final communique at the end of the plenum any restrictions on private capital on the path to “universal prosperity”. The key point is that the role of capital should always be subordinated to the concept of “socialism with Chinese characteristics”.

    Watch the reform ship steadily sailing

    Everything is explained here in nearly didactic terms, chronicling the birth of the “Decision of the CPC Central Committee on further comprehensive deepening of reforms to promote Chinese modernization”.

    What is now already referred to colloquially all across China as “The Decision” spreads across 15 parts and 60 articles, divided into three main sections, proposing more than 300 important reforms.

    “The Decision”, in full, has not yet been published; only the road map of how Beijing planners got there. Of course, this is no mere policy paper; it’s a quintessentially CPC-style dissertation in which the details of economic and political measures are obscured by clouds of images and metaphors.

    Take a look, for instance, at this passage:

    “To ensure that the reform ship sails forward steadily, the ‘Decision’ proposes that further comprehensive deepening of reform must implement the “six principles”: adhere to the party’s overall leadership, adhere to the people-centred approach, adhere to the principle of maintaining the integrity and promoting innovation, adhere to system building as the main line, adhere to the comprehensive rule of law, and adhere to a systematic approach.”

    Most of the “Decision” – 6 parts in a total of 13 – is about economic reform. Will China pull it off? Of course, it will.

    Just look at the precedents. In 1979, the Little Helmsman Deng Xiaoping started to transform a nation of farmers and peasants into a well-oiled machine of efficient industrial workers. Along the way, GDP per capita was multiplied by no less than 30 times.

    Now, the ramifications of Made in China 2025 are turning a nation of factory workers into a nation of engineers. Of 10,5 million university graduates a year, a third are engineers.

    The emphasis on AI has led, among other examples, to the automobile industry being able to produce a $9,000 EV in complete automation and make a profit. China is already a global leader in EVs (BYD building plants in Brazil, Thailand, Turkey, Hungary), solar power, drones, telecom infrastructure (Huawei, ZTE), steel, shipbuilding – and soon, also semiconductors (thank you, Trump sanctions).

    While the Hegemon spent at least $7 trillion – and counting – on unwinnable Forever Wars, China is spending $1 trillion in an array of Belt and Road Initiative (BRI) projects across the Global South: the emphasis is digital/transportation connectivity corridors. Geoeconomic imperatives intertwined with rising geopolitical influence.

    Hegemon hysteria aside, the fact is the Chinese economy will grow by a whopping $1.7 trillion only in 2024. That is more than in all but the last three years – because of the Covid effect.

    And Beijing borrowed exactly zero yuan for this growth. The U.S. economy, by comparison, may grow by $300 billion in 2024, but Washington had to borrow $3.3 trillion for that to happen.

    Researcher Geoff Roberts has compiled a very useful list of what China is doing right.

    And when it comes to the nitty gritty, the numbers are staggering. Here are just a few, apart from GDP growth:

    • Foreign goods trade is up 6.1% to $2.9 trillion year-on-year.
    • The trade surplus is at $85 billion, up 12% compared to 2023.
    • ASEAN trade is up by 10.5% to $80 billion; China is the number one trade partner of individual ASEAN members.
    • China had a record crop of 150 million tons of cereal grains.
    • The courier sector handled 80 billion parcels, up 23% year-on-year.
    • SMIC is the world’s number two pure-play foundry after Taiwan’s TSMC.
    • China Telecom paid $265 million for 23% of QuantumCTek, the patenter of Micius, the world’s first quantum communications satellite.
    • Commercial aerospace launched 39% of China’s 26 rockets.
    • Invention patents rose 43% to 524,000. China is the first country with 4 million domestic invention patents in force.
    • Baidu’s 1,000 robotaxis in Wuhan will break even in Q4 and will be profitable next year.
    • China has 47% of the world’s top AI talent. It added no less than 2000 AI courses to school and college curricula since 2019.
    • On world-class institutions doubling as research leaders, 7 out of 10 are Chinese, including the top one: the Chinese Academy of Sciences, ahead of Harvard.

    Exceptionalist China “experts” believe their own fantasy that the U.S. allied with occupied Japan, Germany and South Korea would be able to match and surpass China’s pull with the Global Majority, because they have more resources and more capital.

    Nonsense. Even more nonsense is to believe that the Hegemon’s NATO “partners” – as in vassals – will follow the leader in creating cutting-edge technology.

    The high-speed train that matters has already left the station. The 21st century is shaping up to be the ‘Asian, Eurasian, and Chinese’ century.

     

    Feature Image Credit: The Diplomat

    The article is republished from the Strategic Culture Foundation.

  • Technological Challenges to Becoming a Developed Country by 2047

    Technological Challenges to Becoming a Developed Country by 2047

    For a developed India, bulkier investment and technological changes are required to keep up in the race with other developed nations. In doing so, the country should not be afraid of failure. After all, Chandrayaan 3 was made possible by the lessons from the failure of Chandrayaan 2.

    THE Prime Minister has set the goal of India becoming a developed country by 2047.

    On the way, India’s Gross Domestic Product (GDP) is soon going to surpass that of Germany and Japan, if the current official rates of growth are maintained.

    In today’s world, projecting five years or 24 years ahead is fraught with challenges. Who could have foreseen the Covid pandemic in 2020 and the war in Ukraine in 2022?

    Successful landing of Chandrayaan 3 near the South Pole of the Moon is undoubtedly a great achievement for the nation. But that does not make India a developed nation.

    Major challenges confront the nation, such as providing good education and healthcare. This can only be achieved if the number of schools and health facilities in rural and semi-rural areas is increased substantially.

    [powerkit_button size=”lg” style=”info” block=”true” url=”https://theleaflet.in/technological-challenges-to-becoming-a-developed-country-by-2047/” target=”_blank” nofollow=”false”]
    Read More
    [/powerkit_button]

  • Ghosts in the Machine: The Past, Present, and Future of India’s Cyber Security

    Ghosts in the Machine: The Past, Present, and Future of India’s Cyber Security

    [powerkit_button size=”lg” style=”info” block=”false” url=”https://admin.thepeninsula.org.in/wp-content/uploads/2022/10/Research-Paper-TPF-1.pdf” target=”_blank” nofollow=”false”]
    Download
    [/powerkit_button]

    Introduction

    When the National Cybersecurity Policy was released in 2013, the response from experts was rather underwhelming [1], [2]. A reaction to a string of unpalatable incidents, from Snowden’s revelations [3] and massive compromise of India’s civilian and military infrastructure [4] to the growing international pressure on Indian IT companies to fix their frequent data breaches [5], the 2013 policy was a macro example of weak structures finding refuge in a haphazard post-incident response. The next iteration of the policy is in formulation under the National Cybersecurity Coordinator. However, before we embark upon solving our cyber-physical domain’s future threat environment, it is perhaps wise to look back upon the perilous path that has brought us here.  

    Early History of Electronic Communications in India

    The institutional “cybersecurity thinking” of post-independence Indian government structures can be traced to 1839 when the East India Company’s then Governor-General of India, Lord Dalhousie, had asked a telegraph system to be built in Kolkata, the then capital of the British Raj. By 1851, the British had deployed the first trans-India telegraph line, and by 1854, the first Telegraph Act had been passed. Similar to the 2008 amendment to the IT Act which allowed the government to intercept, monitor and decrypt any information on any computer, the 1860 amendment to the Telegraph Act too granted the British to take over any leased telegraph lines to access any of the telegraphs transmitted. After all, the new wired communication technology of the day had become an unforeseen flashpoint during the 1857 rebellion.

    Post-independence, under the socialist fervour of Nehruvian politics, the government further nationalised all foreign telecommunications companies and continued the British policy of total control over telecommunications under its own civil service structure, which too came pre-packaged from the British.

    Historians note that the telegraph operators working for the British quickly became targets of intrigues and lethal violence during the mutiny [6], somewhat akin to today’s Sysadmins being a top social engineering priority for cyber threat actors [7]. One of the sepoy mutineers of 1857, while on his way to the hangman’s halter, famously cried out at a telegraph line calling it the cursed string that had strangled the Indians [8]. On the other side of affairs, after having successfully suppressed the mutiny, Robert Montgomery famously remarked that the telegraph had just saved India [9]. Within the telegraph system, the problems of information security popped up fairly quickly after its introduction in India. Scholars note that commercial intelligence was frequently peddled in underground Indian markets by government telegraph clerks [10], in what can perhaps be described as one of the first “data breaches” that bureaucrats in India had to deal with. 

    British had formulated different rules for telecommunications in India and England. While they did not have the total monopoly and access rights over all transmissions in Britain, for the purpose of maintaining political control, in India they did [11]. Post-independence, under the socialist fervour of Nehruvian politics, the government further nationalised all foreign telecommunications companies and continued the British policy of total control over telecommunications under its own civil service structure, which too came pre-packaged from the British.

    The Computer and “The System”

    Major reforms are often preceded by major failures. The government imported its first computer in 1955 but did not show any interest in any policy regarding these new machines. That only changed in 1963, when the government under the pressure to reform after a shameful military defeat and the loss of significant territory to China, instituted a Committee on Electronics under Homi Jehangir Bhabha to assess the strategic utilities that computers might provide to the military [12].  

    In 1965, as punitive sanctions for the war with Pakistan, the US cut off India’s supply of all electronics, including computers. This forced the government to set up the Electronics Committee of India which worked alongside the Electronics Corporation of India (ECIL), mandated to build indigenous design and electronic manufacturing capabilities. But their approach was considered highly restrictive and discretionary, which instead of facilitating, further constrained the development of computers, related electronics, and correspondingly useful policies in India [13]. Moreover, no one was even writing commercial software in India, while at the same the demand for export-quality software was rising. The situation was such that ECIL had to publish full-page advertisements for the development of export-quality software [12]. Consequently, in the early 1970s, Mumbai-based Tata Consultancy Services managed to become the first company to export software from India. As the 1970s progressed and India moved into the 1980s, it gradually became clearer to more and more people in the government that their socialist policies were not working [14]. 

    In 1984, the same year when the word ‘Cyberspace’ appeared in a sci-fi novel called Neuromancer, a policy shift towards computing and communications technologies was seen in the newly formed government under Rajiv Gandhi [12]. The new computer policy, shaped largely by N. Sheshagiri who was the Director General of the National Informatics Centre, significantly simplified procedures for private actors and was released within twenty days of the prime minister taking the oath. Owing to this liberalisation, the software industry in India took off and in 1988, 38 leading software companies in India came together to establish the National Association of Software and Service Companies (NASSCOM) with the intent to shape the government’s cyber policy agendas. As we are mostly concerned about cybersecurity, it should be noted that in 1990, it was NASSCOM that carried out probably the first IT security-related public awareness campaign in India which called for reducing software piracy and increasing the lawful use of IT [5].   

    Unfortunately, India’s 1990s were mired by coalition governments and a lack of coherent policy focus. In 1998, when Atal Bihari Vajpayee became the Prime Minister, the cyber policy took the most defining turn with the development of the National IT Policy. The IT Act, thus released in 2000 and amended further in 2008, became the first document explicitly dealing with cybercrime. Interestingly, the spokesman and a key member of the task force behind the national IT policy was Dewang Mehta, the then president of NASSCOM. Nevertheless, while computer network operations had become regular in international affairs [15], there was still no cyber policy framework or doctrine to deal with the risks from sophisticated (and state-backed) APT actors that were residing outside the jurisdiction of Indian authorities. There still is not.  

    In 2008, NASSCOM established the Data Security Council of India (DSCI), which along with its parent body took it upon itself to run cybersecurity awareness campaigns for law enforcement and other public sector organisations in India. However, the “awareness campaign” centric model of cybersecurity strategy does not really work against APT actors, as became apparent soon when researchers at the University of Toronto discovered the most massive infiltration of India’s civilian and military computers by APT actors [4]. In 2013, the Snowden revelations about unrestrained US spying on India also ruffled domestic feathers for lack of any defensive measures or policies [3]. Coupled with these surprise(?) and unpalatable revelations, there was also the increasing and recurring international pressure on Indian IT to put an end to the rising cases of data theft where sensitive data of their overseas customers was regularly found in online underground markets [16].  

    Therefore, with the government facing growing domestic and international pressure to revamp its approach towards cybersecurity, MeitY released India’s first National Cybersecurity Policy in 2013 [17]. Ministry of Home Affairs (MHA) also released detailed guidelines “in the wake of persistent threats” [18]. However, the government admitted to not having the required expertise in the matter, and thus the preparation of the MHA document was outsourced to DSCI. Notwithstanding that, MHA’s document was largely an extension of the Manual on Departmental Security Instructions released in 1994 which had addressed the security of paper-based information. Consequently, the MHA document produced less of a national policy and more of a set of instructions to departments about sanitising their computer networks and resources, including a section on instructions to personnel over social media usage. 

    The 2013 National Cybersecurity Policy proposed certain goals and “5-year objectives” toward building national resilience in cyberspace. At the end of a long list of aims, the 2013 policy suggested adopting a “prioritised approach” for implementation which will be operationalised in the future by a detailed guide and plan of action at national, sectoral, state, ministry, department, and enterprise levels. However, as of this writing the promised implementation details, or any teeth, are still missing from the National Cybersecurity Policy. As continued APT activities [19] show, the measures towards creating situation awareness have also not permeated beyond the technical/collection layer.

    In 2014, the National Cyber Coordination Centre (NCCC) was established, with the primary aim of building situational awareness of cyber threats in India. Given the underwhelming response to the 2013 policy [1], [2], the National Cybersecurity Policy was surmised to be updated in 2020, but as of this writing, the update is still being formulated by the National Cybersecurity Coordinator who heads the NCCC. The present policy gap makes it an opportune subject to discuss certain fundamental issues with cyber situation awareness and the future of cyber defences in the context of the trends in APT activities. 

    Much to Catch Up

    Recently, the Government of India’s Kavach (an employee authentication app for anyone using a ‘gov.in’ or ‘nic.in’ emails-id) was besieged by APT36 [20]. APT36 is a Pak-affiliated actor and what one might call a tier-3 APT i.e., what they lack in technical sophistication, they try to make up for that with passion and perseverance. What makes it interesting is that the malicious activity went on for over a year, before a third-party threat observer flagged it. Post-pandemic, APT activities have not just increased but also shown an inclination towards integrating online disinformation into the malware capabilities [21]. APT actors (and bots), who have increasingly gotten better at hiding in plain sight over social networks, have now a variety of AI techniques to integrate into their command and control – we’ve seen the use of GANs to mimic traffic of popular social media sites for hiding command and control traffic [22], an IoT botnet that had a machine-learning component which the attacker could switch on/off depending upon people’s responses in online social networks [21], as well as malware that can “autonomously” locate its command and control node over public communication platforms without having any hard-coded information about the attacker [23]. 

    Post-pandemic, APT activities have not just increased but also shown an inclination towards integrating online disinformation into the malware capabilities.

    This is an offence-persistent environment. In this “space”, there always exists an information asymmetry where the defender generally knows less about the attacker than the opposite being true. Wargaming results have shown that unlike conventional conflicts, where an attack induces the fear of death and destruction, a cyber-attack generally induces anxiety [24], and consequently, people dealing with cyber attacks act to offset those anxieties and not their primal fears. Thus, in response to cyber-attacks, their policies reflect risk aversion, not courage, physical or moral. It need not be the case if policymakers recognise this and integrate it into their decision-making heuristics. Unfortunately, the National Cybersecurity Policy released in 2013 stands out to be a fairly risk-averse and a placeholder document. Among many other, key issues are: 

    • The policy makes zero references to automation and AI capabilities. This would have been understandable in other domains, like poultry perhaps, but is not even comprehensible in present-day cybersecurity.   
    • The policy makes zero references to hardware attacks. Consequently, developing any capability for assessing insecurity at hardware/firmware levels, which is a difficult job, is also overlooked at the national level itself. 
    • There are several organisations within the state, civilian and military, that have stakes and roles of varying degrees in a robust National Cybersecurity Policy. However, the policy makes zero attempts at recognising and addressing these specific roles and responsibilities, or any areas of overlap therein.
    • The policy does not approach cyber activity as an overarching operational construct that permeates all domains, but rather as activity in a specific domain called “cyberspace”. Consequently, it lacks the doctrinal thinking that would integrate cyber capabilities with the use of force. A good example of this is outer space, where cyber capabilities are emerging as a potent destabiliser [25] and cybersecurity constitutes the operational foundation of space security, again completely missing from the National Cybersecurity Policy.   
    • The policy is also light on subjects critical to cybersecurity implementation, such as the approach towards internet governance, platform regulation, national encryption regime, and the governance of underlying technologies. 

    A Note on the Human Dimension of Cybersecurity

    There exist two very broad types of malicious behaviour online, one that is rapid and superficial, and another that are deep and persistent. The present approaches to building situation awareness in cyberspace are geared towards the former, leading to spatiotemporally “localised and prioritised” assessments [26], matters pertaining to the immediate law and order situations and not stealthy year-long campaigns. Thus, while situation awareness itself is a psychological construct dealing with decision-making, in cybersecurity operations it overwhelmingly has turned into software-based visualisation of the incoming situational data. This is a growing gap that must also be addressed by the National Cybersecurity Policy. 

    The use of computational tools and techniques to automate and optimise the social interactions of a software agent presents itself as a significant force multiplier for cyber threat actors.

    In technology-mediated environments, people have to share the actual situation awareness with the technology artifacts [27]. Complete dependence on technology for cyber situation awareness has proven to be problematic, for example in the case of Stuxnet, where the operators at the targeted plant saw on their computer screens that the centrifuges were running normally, and simply believed that to be true. The 2016 US election interference only became clearer at the institutional level after several months of active social messaging and doxing operations had already been underway [28], and the story of Telebots’ attack on Ukrainian electricity grids is even more telling – a powerplant employee whose computer was being remotely manipulated, sat making a video of this activity, asking his colleague if it could be their own organisation’s IT staff “doing their thing” [29].

    This lack of emphasis on human factors has been a key gap in cybersecurity, which APTs never fail to exploit. Further, such actors rely upon considerable social engineering in initial access phases, a process which is also getting automated faster than policymakers can play catchup to [30]. The use of computational tools and techniques to automate and optimise the social interactions of a software agent presents itself as a significant force multiplier for cyber threat actors. Therefore, it is also paramount to develop precise policy guidelines that implement the specific institutional structures, processes, and technological affordances required to mitigate the risks of malicious social automation on the unsuspecting population, as well as on government institutions.  

    Concluding Remarks

    There is a running joke that India’s strategic planning is overseen by accountants and reading through the document of National Cybersecurity Policy 2013, that does not seem surprising. We have had a troubling policy history when it comes to electronics and communications and are still in the process of shedding our colonial burden. A poorly framed National Cybersecurity Policy will only take us away from self-reliance in cyberspace and towards an alliance with principal offenders themselves. Notwithstanding, an information-abundant organisation like NCCC has undoubtedly to make some choices about where and what to concentrate its attentional resources upon, however, the present National Cybersecurity Policy appears neither to be a component of any broader national security strategy nor effective or comprehensive enough for practical implementation in responding to the emerging threat environment. 

    References

    [1] N. Alawadhi, “Cyber security policy must be practical: Experts,” The Economic Times, Oct. 22, 2014. Accessed: Sep. 14, 2022. [Online]. Available: https://economictimes.indiatimes.com/tech/internet/cyber-security-policy-must-be-practical-experts/articleshow/44904596.cms

    [2] A. Saksena, “India Scrambles on Cyber Security,” The Diplomat, Jun. 18, 2014. https://thediplomat.com/2014/06/india-scrambles-on-cyber-security/ (accessed Sep. 18, 2022).

    [3] C. R. Mohan, “Snowden Effect,” Carnegie India, 2013. https://carnegieindia.org/2013/06/19/snowden-effect-pub-52148 (accessed Sep. 18, 2022).

    [4] R. Dharmakumar and S. Prasad, “Hackers’ Haven,” Forbes India, Sep. 19, 2011. https://www.forbesindia.com/printcontent/28462 (accessed Sep. 18, 2022).

    [5] D. Karthik and R. S. Upadhyayula, “NASSCOM: Is it time to retrospect and reinvent,” Indian Inst. Manag. Ahmedabad, 2014.

    [6] H. C. Fanshawe, Delhi past and present. J. Murray, 1902.

    [7] C. Simms, “Is Social Engineering the Easy Way in?,” Itnow, vol. 58, no. 2, pp. 24–25, 2016.

    [8] J. Lienhard, “No. 1380: Indian telegraph,” Engines Our Ingen., 1998.

    [9] A. Vatsa, “When telegraph saved the empire – Indian Express,” Nov. 18, 2012. http://archive.indianexpress.com/news/when-telegraph-saved-the-empire/1032618/0 (accessed Sep. 17, 2022).

    [10] L. Hoskins, BRITISH ROUTES TO INDIA. ROUTLEDGE, 2020.

    [11] D. R. Headrick, The invisible weapon: Telecommunications and international politics, 1851-1945. Oxford University Press on Demand, 1991.

    [12] B. Parthasarathy, “Globalizing information technology: The domestic policy context for India’s software production and exports,” Iterations Interdiscip. J. Softw. Hist., vol. 3, pp. 1–38, 2004.

    [13] I. J. Ahluwalia, “Industrial Growth in India: Stagnation Since the Mid-Sixties,” J. Asian Stud., vol. 48, pp. 413–414, 1989.

    [14] R. Subramanian, “Historical Consciousness of Cyber Security in India,” IEEE Ann. Hist. Comput., vol. 42, no. 4, pp. 71–93, 2020.

    [15] C. Wiener, “Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation,” PhD Thesis, 2016.

    [16] N. Kshetri, “Cybersecurity in India: Regulations, governance, institutional capacity and market mechanisms,” Asian Res. Policy, vol. 8, no. 1, pp. 64–76, 2017.

    [17] MeitY, “National Cybersecurity Policy.” Government of India, 2013.

    [18] MHA, “NATIONAL INFORMATION SECURITY POLICY AND GUIDELINES.” Government of India, 2014.

    [19] S. Patil, “Cyber Attacks, Pakistan emerges as China’s proxy against India,” Obs. Res. Found., 2022.

    [20] A. Malhotra, V. Svajcer, and J. Thattil, “Operation ‘Armor Piercer:’ Targeted attacks in the Indian subcontinent using commercial RATs,” Sep. 23, 2021. http://blog.talosintelligence.com/2021/09/operation-armor-piercer.html (accessed Sep. 02, 2022).

    [21] NISOS, “Fronton: A Botnet for Creation, Command, and Control of Coordinated Inauthentic Behavior.” May 2022.

    [22] M. Rigaki, “Arming Malware with GANs,” presented at the Stratosphere IPS, Apr. 2018. Accessed: Oct. 19, 2021. [Online]. Available: https://www.stratosphereips.org/publications/2018/5/5/arming-malware-with-gans

    [23] Z. Wang et al., “DeepC2: AI-Powered Covert Command and Control on OSNs,” in Information and Communications Security, vol. 13407, C. Alcaraz, L. Chen, S. Li, and P. Samarati, Eds. Cham: Springer International Publishing, 2022, pp. 394–414. doi: 10.1007/978-3-031-15777-6_22.

    [24] J. Schneider, “Cyber and crisis escalation: insights from wargaming,” 2017.

    [25] J. Pavur, “Securing new space: on satellite cyber-security,” PhD Thesis, University of Oxford, 2021.

    [26] U. Franke and J. Brynielsson, “Cyber situational awareness – A systematic review of the literature,” Comput. Secur., vol. 46, pp. 18–31, Oct. 2014, doi: 10.1016/j.cose.2014.06.008.

    [27] N. A. Stanton, P. M. Salmon, G. H. Walker, E. Salas, and P. A. Hancock, “State-of-science: situation awareness in individuals, teams and systems,” Ergonomics, vol. 60, no. 4, pp. 449–466, Apr. 2017, doi: 10.1080/00140139.2017.1278796.

    [28] “Open Hearing On The Intelligence Community’s Assessment on Russian Activities and Intentions in the 2016 U.S. Elections.” Jan. 10, 2017. Accessed: Dec. 22, 2021. [Online]. Available: https://www.intelligence.senate.gov/hearings/open-hearing-intelligence-communitys-assessment-russian-activities-and-intentions-2016-us#

    [29] R. Lipovsky, “Tactics, Techniques, and Procedures of the World’s Most Dangerous Attackers,” presented at the Microsoft BlueHat 2020, 2020. [Online]. Available: https://www.youtube.com/watch?v=9LAFV6XDctY

    [30] D. Ariu, E. Frumento, and G. Fumera, “Social engineering 2.0: A foundational work,” in Proceedings of the Computing Frontiers Conference, 2017, pp. 319–325.

    [powerkit_button size=”lg” style=”info” block=”true” url=”https://admin.thepeninsula.org.in/wp-content/uploads/2022/10/Research-Paper-TPF-1.pdf” target=”_blank” nofollow=”false”]
    Download
    [/powerkit_button]

  • On Metaverse & Geospatial Digital Twinning: Techno-Strategic Opportunities for India

    On Metaverse & Geospatial Digital Twinning: Techno-Strategic Opportunities for India

    [powerkit_button size=”lg” style=”info” block=”true” url=”https://admin.thepeninsula.org.in/wp-content/uploads/2022/07/TPF_Working-Paper_MetaGDT-1.pdf” target=”_blank” nofollow=”false”]
    Download
    [/powerkit_button]

    Abstract:

    With the advent of satellite imagery and smartphone sensors, cartographic expertise has reached everyone’s pocket and we’re witnessing a software-isation of maps that will underlie a symbiotic relationship between our physical spaces and virtual environments. This extended reality comes with enormous economic, military, and technological potential. While there exist a range of technical, social and ethical issues still to be worked out – time and tide wait for no one is a metaphor well applied to the Metaverse and its development. This article briefly introduces the technological landscape, and then moves over to a discussion of Geospatial Digital Twinning and its techno-strategic utility and implications. We suggest that India should, continue on the existing dichotomy of Open Series and Defence Series Maps, initiate Geospatial Digital Twins of specific areas of interest as a pilot for the development, testing, and integration of national metaverse standards and rules. Further, a working group in collaboration with a body like NASSCOM needs to be formed to develop the architecture and norms that facilitate Indian economic and strategic interests through the Metaverse and other extended reality solutions.

    Introduction

    Cartographers argue that maps are value-laden images, which do not just represent a geographical reality but also become an essential tool for political discourse and military planning. Not surprisingly then, early scholars had termed cartography as a science of the princes. In fact, the history of maps is deeply intertwined with the emergence of the Westphalian nation-state itself, with the states being the primary sponsors of any cartographic activity in and around their territories[1].
    Earlier the outcome of such activities even constituted secret knowledge, for example, it was the British Military Intelligence HQ in Shimla which ran and coordinated many of the cartographic activities for the British in the subcontinent[2]. Thus, given our post-independence love for Victorian institutions, until 2021 even Google Maps had remained an illegal service in India[3].

    One of the key stressors which brought this long-awaited change in policy was the increased availability of relatively low-cost but high-resolution satellite imagery in open online markets. But this remote sensing is only one of the developments impacting modern mapmaking. A host of varied but converging technologies particularly Artificial Intelligence, advanced sensors, Virtual and Augmented Reality, and the increasing bandwidth for data transmission – are enabling a new kind of map. This new kind of map will not just be a model of reality, but rather a live and immersive simulation of reality. We can call it a Geospatial Digital Twin (GDT) – and it will be a 4D artefact, i.e. given its predictive component and temporal data assimilation, a user could also explore the hologram/VR through time and evaluate possible what-if scenarios.

    [powerkit_button size=”lg” style=”info” block=”true” url=”https://admin.thepeninsula.org.in/wp-content/uploads/2022/07/TPF_Working-Paper_MetaGDT-1.pdf” target=”_blank” nofollow=”false”]
    Read the Full Paper
    [/powerkit_button]

  • Technology, Politics and China’s Quest for Energy Dominance

    Technology, Politics and China’s Quest for Energy Dominance

    [powerkit_button size=”lg” style=”info” block=”false” url=”https://admin.thepeninsula.org.in/wp-content/uploads/2022/05/Technology-Politics-and-Chinas-Quest-for-Renewable-Energy-Dominance-3.pdf” target=”_blank” nofollow=”false”]
    Download
    [/powerkit_button]

    Abstract:

    This paper will empirically investigate the role of technology in international politics through a case study of China’s development of renewable energy infrastructure (solar PV and wind energy) and its impact on international politics. This paper looks at how technology helps shape a state’s identity using renewable energy technology as an explanatory variable. The paper employs Grygiel’s Model of Geopolitics to analyse the case study; geopolitics because much of China’s development in the renewable sector has been a function of its geography and abundance of natural resources.

    Introduction:

    China has experienced decades of near double-digit economic growth and since the 2000s, has witnessed a growing population and rapid industrialization that has correspondingly driven demand for energy. Its expeditious implementation of economic reforms has elevated it to the status of a global power capable of challenging the US-established status quo. Stability is increasingly being viewed as a function of China’s behaviour vis-à-vis its strategic rivals, primarily the US, and to a lesser extent Japan, India, Russia and the littoral states of Southeast Asia. But more importantly, it has been China’s near fanatic fervour to rise as a technologically superior state, as the US emerged post the World Wars, that has generated interest. The modernization of its military, near the meteoric rise of installed capacities for renewable sources of energy and technological revolution, underscores the importance and role technological advancement plays in a state’s development. Technology and international politics have a near symbiotic relationship and the former has the potential to fundamentally alter the way states exercise their sovereignty in pursuit of their national interests.

    [powerkit_button size=”lg” style=”info” block=”true” url=”https://admin.thepeninsula.org.in/wp-content/uploads/2022/05/Technology-Politics-and-Chinas-Quest-for-Renewable-Energy-Dominance-3.pdf” target=”_blank” nofollow=”false”]
    Read the Full Paper
    [/powerkit_button]

  • The Rich World’s Climate Hypocrisy

    The Rich World’s Climate Hypocrisy

    Many people around the world already consider the United Nations Climate Change Conference (COP26) in Glasgow a disappointment. That is a massive understatement. Global leaders – especially in the developed world – still fail to grasp the gravity of the climate challenge. Although they acknowledge its severity and urgency in their speeches, they mostly pursue short-term national interests and make conveniently distant “” emissions pledges without clear and immediate commitments to act.

    Many of the statements by developed-country leaders at the COP26 summit in Glasgow are at odds with their actual climate policies, and with what they say in other settings. Their short-sighted strategy ultimately benefits no one – including the powerful corporate interests whose immediate financial interests it serves

    For example, could the real US government please stand up and declare itself? In his recent address in Glasgow, President Joe Biden said that “as we see current volatility in energy prices, rather than cast it as a reason to back off our clean energy goals, we must view it as a call to action.” Indeed, “high energy prices only reinforce the urgent need to diversify sources, double down on clean energy deployment, and adapt promising new clean-energy technologies.”

    But just three days later, the Biden administration claimed that OPEC+ is endangering the global economic recovery by not increasing oil production. It even warned that the United States is prepared to use “all tools” necessary to reduce fuel prices.

    This is one of the most blatant recent examples of climate hypocrisy by a developed-country leader, but it is by no means the only one. And the duplicity extends to the proceedings at COP26 itself, where developing-country negotiators are apparently finding that advanced economies’ positions in closed-door meetings are quite different from their public stances.

    Rich countries, which are responsible for the dominant share of global carbon-dioxide emissions to date, are dithering on longstanding commitments to provide climate finance to developing countries. They are also resisting a proposed operational definition that would prevent them from fudging what counts as climate finance. And they are still treating adaptation to climate change as a separate stream and refusing to provide finance to avert, minimize, and address the loss and damage associated with climate change in the worst-affected countries.

    The declared COP26 promises also reveal the developed world’s double standards. A group of 20 countries, including the US, pledged to end public financing for “unabated” fossil-fuel projects, including those powered by coal, by the end of 2022. But the prohibition applies only to international projects, not domestic ones. Significantly, the US and several other signatories refused to join the 23 countries that separately committed to stop new coal-power projects within their borders and phase out existing coal infrastructure.

    But even if the pledges in Glasgow had been more solid, rich-country governments, in particular, face a major credibility problem. They have previously made too many empty climate promises, undermining the interests of developing countries that have contributed little to climate change. Advanced economies have made emissions-reduction commitments that they have not kept, and reneged on their assurances to developing countries regarding not only climate finance but also technology transfer.

    The climate finance commitment is now 12 years old. At COP15 in Copenhagen, advanced economies promised to provide $100 billion per year to the developing world, and the 2015 Paris climate agreement made it clear that all developing countries would be eligible for such financing. This amount is trivial relative to developing countries’ need, which is in the trillions of dollars, and also when compared to the vast sums that rich countries have spent on fiscal and monetary support for their economies during the COVID-19 pandemic.

    But the developed world has not fulfilled even this relatively modest pledge. In 2019, total climate finance channeled to developing countries was less than $80 billion; the average amount each year since 2013 was only $67 billion. And this figure massively overstated the actual flows from developed-country governments, because bilateral public climate finance (which should have been provided to the developing world under the Paris accord) averaged less than $27 billion per year. The remainder came from multilateral institutions – including development banks – and private finance, which rich-country governments sought to take credit for mobilizing. Compared to this paltry sum, global fossil-fuel subsidies amounted to an estimated $555 billion per year from 2017 to 2019.

    Likewise, the rich world’s promises of green technology transfer have become mere lip service. Developed-country governments allowed domestic companies to cling to intellectual-property rights that block the spread of critical knowledge for climate mitigation and adaptation. When countries like China and India have sought to encourage their own renewable-energy industries, the US, in particular, has filed complaints with the World Trade Organization.

    This short-sighted strategy ultimately benefits no one, including the firms whose immediate financial interests it serves, because it accelerates the planet’s destruction and the revenge of nature on what now appears to be terminally stupid humanity. The student and activist marches in Glasgow against this myopic approach are important but are nowhere near enough to force governments to change course.

    The problem is that powerful corporate interests are clearly intertwined with political leadership. People around the world, and especially in the Global North, must become much more vociferous in insisting on meaningful climate action and a real change in economic strategy that resonates beyond national borders. Only that can end the rich world’s green hypocrisy and save us all.

    This article was published earlier in project-syndicate.org

  • COVID-19: Need for technology intervention in India

    COVID-19: Need for technology intervention in India

    Much of the globalized world is experiencing a standstill due to the COVID-19 Pandemic Crisis. While world leaders are establishing measures to cope with the large scale outbreak, technology has been in the forefront as a crucial aspect of recovery. From sanitizer drones to virtual workspaces — the adoption of computing technology in healthcare, businesses and governance has seen an unprecedented rise.

    However, due to India’s unique factors of dense population and per capita poverty — the country’s response to this crisis will be an important case study. The World Health Organization’s guidelines insist that people should wash their hands regularly but over 163 million people residing in India do not have access to clean water. When access to fundamental resources are limited, one can only assume that access to robust healthcare facilities are also limited. The stark contrast in the capacity to handle this crisis will be tested when the local communication of COVID-19 reaches the second and third tier cities. As a primary effort in flattening the curve, the government has announced a 21 day country-wide lockdown. In spite of the measure being welcomed, if the country fails to control the spread, the lack of modern infrastructure and medical professionals will result in catastrophic consequences.

    This is reflected in the adoption of technology in primary healthcare centres. Medical professionals say there is a shortage of around 70,000 ventilators and the existing resources are being utilized by critical at-risk patients. The surging requirement of intensive care medical devices, including ventilators and high-end diagnostic and robotic surgery instruments is a growing concern. While domestic manufacturing and innovation have been scarce, Indian companies like Skanray Technologies are struggling to meet the immediate demand due to the international airline ban. Companies find it difficult to import crucial equipment such as chips, controllers and sensors from China — hindering their ability to produce these equipment on time.

    Globally, innovative technologies that seemed gimmicky in the past are being brought into mainstream practice. Drones have been deployed to carry medical samples and to spray disinfectants across the country. Robots are put in hospitals which aid in remote diagnosing and thermal sensing of the patients. The same is also used as service bots that bring food and toiletries to people.

    Facial recognition cameras are commonplace in China and a growing trend in other countries. Technology companies like SenseTime have built contactless temperature detection software that have been integrated into the cameras for wider coverage of people with fever. Big data analytics being done on these massive feeds has resulted in prediction algorithms which can determine whether a person has come in contact with another infected person. This data is then relayed via telecom companies to inform the individuals to self-quarantine.

    Complex surveillance systems come with their share of privacy concerns. While the lines between responsible surveillance and invasion of privacy become blurred, one cannot overlook the fact that some of these drastic measures are working. In China, the official reports indicate that the domestic cases are under control and newer cases of the virus are classified as imported. In a time of crisis, an open-minded analysis of these “draconian” measures would seem justified. However, this pandemic has not provided any justification of collecting these sensitive data in secrecy.

    Flawless implementation of such systems in India would have to hurdle through multiple policy hoops and comprehensive definitions of data privacy. However, inexpensive technologies such as drones and robotics should spark interest in the country. Medical professionals at the forefront of this battle could benefit from such technology that can reduce their risk of contracting the virus. Alongside technology, modern day practices of preliminary diagnoses such as telemedicine should be encouraged.

    Information and communication technologies across the country have made this battle a lighter burden than what it could have been. While the rate of awareness is significantly higher in the age of social media, it is important to note its duality. Online medical information and guidelines are accessible by at least 34% of the total population compared to the 7.5% in 2010. However, this information influx has also resulted in rumour mongering and exaggeration of outlier incidents — causing trivial worry and needless panic. In the past five years, rapid penetration of the internet has occurred in all sections of society but it has not ensured awareness in responsible use of the technology.

    On the other hand, the quarantined lifestyle has increased the need for virtual workspace. Facebook’s CEO, Mark Zuckerberg reported that traffic for their video streaming and messaging platform had grown multifold. Microsoft also reported a 40% increase in their active user base of collaboration software. High speed fiber internet’s extension throughout India will help in fragmenting this dense working population to multiple locations. With virology experts anticipating an effective vaccine at the earliest of 18 months — some of these altered lifestyles could become the new norm.

    Years following the second world war, measures were actively put in place to prevent another global conflict. The COVID-19 Crisis could leave a similar impact on the world where pandemic response and technology experience drastic reforms. However, the lens of India should vision this wake up call towards something more fundamental — uniformity in primary healthcare, civic infrastructure and technology intervention.

    Views expressed are author’s own.