China

‘China in SAARC? To What Effect?’: A Response to the Debate

The responses to the arguments that I forwarded in my initial essay, ‘China in SAARC? To What Effect?’, have introduced interesting dimensions to this debate. While most of the respondents have agreed with my proposition that it is premature to think about China's entry into the South Asian regionalist project and that it would introduce complex challenges that would be difficult to manage, they disagree with some of the reasons that I have cited.

‘China in SAARC? To What Effect?’: A Response

Sujit Dutta's article, ‘China in SAARC? To What Effect?’ is a thought-provoking essay. It raises an appropriate and timely debate on a theme that is of vital significance for the peace and prosperity of South Asia. Sujit has given a sound conceptual background on regionalism and has strongly argued against supporting China's membership in SAARC.

A recognised China specialist like Sujit sees the writing on the wall in view of the proposal of some of India's neighbours to include China in SAARC.

China’s Expanding Footprint in Nepal: Threats to India

Nepal used to be a safe zone for India. China was least interested in Nepal till 1950s. But strategic design changed once China forcefully occupied Tibet. Nehru tried to strengthen the Indian positioning in Himalayan sphere vis-àvis China. Things became more complicated once China started intruding in Nepal. This article tries to see the emerging Chinese threats from Nepal. Since 1,751 km India-Nepal border runs through 20 districts of five Indian states. The India-Nepal border is open. China has tried through its long strategy to erase Nepalese dependency on India.

China’s Cyber Warfare Capability and India’s Concerns

The Chinese cyber warfare department’s multiple agencies and individuals are seriously working towards the overall objective of instantly disrupting or at least weakening the adversary’s computer networks so as to paralyse his decision making capability at the very commencement of hostilities. It is very difficult to protect networks from such attacks. The weakest link in cyber security measures are the persons operating the system who often, knowingly or unknowingly, default on cyber security measures.