Virtual Reality and Data (Part 1)
A National Security Perspective
Virtual Reality (VR), often projected as a future state of current tech improvisation, is, on the contrary, one of the earliest...
Boardroom Spymaster
Countering Private Intelligence Companies
Archisman Goswami
Once more, as in centuries past, wars are rather easily started and then fought without perceptible restraint – remarked noted...
Anti-India Forces at Work
With Prosperity Comes Rivalry
A range of actors are working to undermine India's unity and integrity. These forces include foreign governments and organizations that support...
Proven Cases of Espionage in the US
READ ALSO: Chinese Espionage Operations and Tactics – Part 1
Chinese Espionage Operations and Tactics – Part 2
Case of Edward Peng Xuehua
Edward Peng Xuehua's case exposed...
Series of CT Summits Held in Nov 22-Jan 23
India Places High Priority to Counter-Terrorism
India-Central Asia Meeting of NSAs
At the first India-Central Asia meeting of NSAs/secretaries of security councils, involving Kazakhstan, Kyrgyzstan, Tajikistan,...
Peng Cheng Laboratory
One Among 19 Cyber Ranges in China
With government funding, massive computational capacity, and ties to the military, Peng Cheng Lab is likely to be...
China’s Cyber Ranges for Attack and Defence
State, PLA and Private Companies’ Collaboration
China is rapidly building cyber ranges that allow cybersecurity teams to test new tools, practice attack and defence, and...
Cyber Year in Review
What to Expect in 2023?
India, US, Indonesia, and China accounted for 45% of total cyberattacks on government agencies worldwide in the second half of...
Spreading the Narrative Through Youtube
The CCP believes that China's ability to tell the party's political story is still not commensurate with the country's rise and its current place...
Chinese Espionage Operations and Tactics – Part 1
READ ALSO: Chinese Espionage Operations and Tactics – Part 2
China's main espionage activities in the United States are the illegal export of military and dual...