Cyber: Also a Domain of War and Terror India, the IT nation, did not make a news splash at CyberTech 2014. That is worth a passing thought. Because cyber is the fifth and new domain of warfare, after land, sea, air and space. Suryakanthi Tripathi | January 2015 | Strategic Analysis
Beyond NJ 9842: The Siachen Saga by Nitin A. Gokhale The history of the 20th century has for a long time looked at the inhospitable Russian Tundra in winter as the most hostile battleground that armies could experience. Hitler’s defeat at Stalingrad in the bleak winter of 1942 and the decimation of his Panzer divisions by hardy and acclimatised Russian forces remains one of the key turning points of World War II. Arjun Subramaniam | January 2015 | Strategic Analysis
Experiences from the International Rhine Water Management Germany, located in Central Europe, has access to different national and international river basins and lakes, including the Rhine, Elbe, Danube and Lake Constance. Precipitation in Germany differs between comfortable amounts in the Alpine region (1500–2000 mm/a) to moderate amounts in the central and northern regions (600–800 mm/a). In brief, the geological conditions are in favour of successful groundwater storage. Martin G. Grambow | January 2015 | Strategic Analysis
Overcoming Pakistan’s Nuclear Dangers by Mark Fitzpatrick Mark Fitzpatrick’s book Overcoming Pakistan’s Nuclear Dangers makes a courageous attempt in advocating recognition of Pakistan as a ‘normal nuclear state’ (p. 12). The author asserts that the international community must now refrain from making Pakistan pay for its 2004 AQ Khan debacle and recognise that ‘the time has come to offer Pakistan a nuclear cooperation deal akin to India’ (p. 162). Reshmi Kazi | January 2015 | Strategic Analysis
The Articulated Strategy to Fight the Islamic State: Is It Self-Defeating? President Barack Obama has detailed his strategy to degrade, defeat and ultimately destroy the Islamic State (IS) (the IS is also referred to as the Islamic State of Iraq and Syria [ISIS]) currently considered the most threatening of the various terrorist groups operating primarily in the Middle East. Fundamental to the success of the strategy is military action aimed at degrading the combat capabilities of the fighting elements of the IS. Sanu Kainikara | January 2015 | Strategic Analysis
Maoist Insurgency and India’s Internal Security Architecture by E.N. Rammohan, Brigadier Amrit Pal Singh and Gp. Capt. A.K. Agarwal The Maoist insurgency and the internal security response, which in part flows from India’s security architecture, have become increasingly relevant in the recent past. The Maoist threat has repeatedly been referred to as the gravest internal challenge to India’s security. The impact of this threat, along with terrorism in the hinterland, has exposed the inadequacies of the country’s internal security capacities. Therefore, a book dealing with the two is a timely addition to the literature, in the Indian context. Vivek Chadha | January 2015 | Strategic Analysis
Tunisia stands out With the conclusion of the parliamentary and presidential elections, based on a constitution that finely balances the country’s Islamic heritage with the need for modernity, Tunisia has done what Egypt has failed to do. K. P. Fabian | December 31, 2014 | IDSA Comments
Of Agents and Agency Commission in Defence Of Agents and Agency Commission in Defence Amit Cowshish | December 31, 2014 | IDSA Comments
Taking Stock of the Public-Private Partnership in Cybersecurity Effective cybersecurity calls for a close partnership between the government in its role as custodian of the nation’s security, and the private sector, in both roles of information infrastructure provider as well as the provider of many critical services. Cherian Samuel | December 31, 2014 | IDSA Comments
Why Bodo Violence Continues to Recur? To prevent the recurring violence in Bodo areas, establish a land record system, improve the presence of both the state civil administration and the law enforcement agencies, and collate credible data on the flow of migrants. Namrata Goswami | December 29, 2014 | IDSA Comments