Commentary
Find our newspaper columns, blogs, and other commentary pieces in this section. Our research focuses on Advanced Biology, High-Tech Geopolitics, Strategic Studies, Indo-Pacific Studies & Economic Policy
Securing India’s Cyberspace from Quantum Techniques
By Arjun Gargeyas and Sameer Patil
Last month, there were reports that the Indian Army is developing cryptographic techniques to make its networks resistant to attacks by systems with quantum capabilities. The Army has collaborated with industry and academia to build secure communications and cryptography applications. This step builds on last year’s initiative to establish a quantum computing laboratory at the military engineering institute in Mhow, Madhya Pradesh. With traditional encryption models at risk and increasing military applications of quantum technology, the deployment of “quantum-resistant” systems has become the need of the hour.
In an Era of Cyber Wars, India needs a Fortified Computing Ecosystem
By Arjun Gargeyas
Advanced mechanisms have taken over the field of computing, with nation-States, along with private companies, embroiled in a high-stakes race to increase indigenous computing power for economic and strategic purposes. With India’s data generation at an all time high, there is a need to improve computational capabilities by using advanced computing technologies. Recent progress by the State has showcased the government’s intent. But a holistic strategy is in need to facilitate its further advancement.
C is for Cyber
The book Listening In by Prof Susan Landau studies the clash between the individual’s need for privacy and the law enforcement agencies’ need for access to information. It traces the evolution of cyber security and is a must read for aspiring cyber security professionals and those interested in privacy debates and cyber wars.
Susan Landau’s Listening In is an encyclopedia of cyber security, but misses out on the opportunity to set the stage for policy dialogue.
After the San Bernadino terrorist shootings of 2015, the FBI recovered an iPhone belonging to one of the attackers. FBI and Apple Inc came to loggerheads when Apple declined the FBI’s request to create software that would unlock the security protection on the iPhone. FBI wanted “exceptional access” to be built into the encryption systems on Apple’s iPhone, using the pretext of national security. However, Apple argued that in an age of cyber attacks, weakening of security should be the last thing to do, even if that means that the data of terrorists and criminals remain hidden from law enforcement. The basis of Apple’s argument was that security loopholes would be eventually found and exploited by hackers, presumably causing more harm to national security.Using the above case as the background for her book Listening In Cyber Security in an Insecure Age, Susan Landau, a cryptography and cybersecurity expert, studies the clash between the individual’s need for privacy and the law enforcement agencies’ need for access to information. Landau unequivocally bats for not weakening security standards, even if that makes government investigations difficult. She sets the stage for her argument for stronger encryption standards by narrating one example after another of cyber espionage, exploits and attacks, and how these have been getting more sophisticated over time. She traces the first cyber espionage to 1986. With the involvement of the CIA, KGB, and a student in Germany hacking into systems at an energy research lab at Berkeley, this story makes for a fascinating read.Read more here>