
Hybrid Warfare: Counter-Value or Counter-Force
The title of this article might have indicated that it will be about nuclear strategies of the Cold War that are still valid, but never
The title of this article might have indicated that it will be about nuclear strategies of the Cold War that are still valid, but never
16 December 2014 was not the first day when Tehreek-e-Taliban (TTP) or terrorists targeted a school, in the same year on 6 January 2014 terrorists
Maintaining regular armed forces serves to ensure national security. Military groups are well-suited to activities such as nation-building as well as ensuring national security. The
Terrorism and extremism are highly complex phenomena. Violence by individuals or by states has become a fundamental threat to safety. The use of modern technology
The changing nature of threats to mankind has continually evolved the concept of security. In modern times the security of individuals takes precedence over the
Cyber security is the protection of networks from external threats and helps in protecting critical information from any breach. Cyber refers to the interconnectedness of
Once united, now antagonists- Russia and Ukraine are witnessing another episode of escalation in their protracted conflict, but this time the episode is a full-scale
As a part of Washington’s “Beijing as the axis of evil” narrative, there have been persevering assaults on China’s multi-billion dollar Belt and Road Initiative
Technological advancements are a significant element in defining the contours of war and politics since the industrial revolution. In the contemporary period, technological innovations are
Purus ut praesent facilisi dictumst sollicitudin cubilia ridiculus.
Sign up our newsletter to get update information, news and free insight.