‘Outgoing PM asked me to brief details of N-programme to Vajpayeeji’
the political system. Of course, after taking over as PM in 1998, the first task given by Vajpayeeji to us was to conduct the nuclear test at the earliest. Both these leaders had the courage to take difficult decisions boldly, even though the consequences of such a decision had great national and geopolitical significance... great leadership has to respect the fact that the nation is bigger than any organisation or the political system.
TECHNOLOGY AS A GREAT UNIFIER
Here, I would like to discuss only two aspects. One is cyber terrorism and counter-measures. Another is cyber war. The world has changed dramatically since the Cold War era. During those years, the enemy was clear... Today, we are faced with a new world in which change occurs very rapidly, and the enemy is asymmetric and poses a very different challenge; the most significant threat today is foreign terrorists and terrorist networks whose identities and whereabouts we do not always know. In today's world, IT plays a crucial role in overcoming this challenge. Some core IT areas we consider crucial for counterterrorism are: collaboration, analysis and decision support tools; foreign language tools; pattern analysis tools; and predictive (or anticipatory) modelling tools.
Cyber war can be fought by anyone; even an individual using his hacking skills against huge corporations, nations or even different civilisations... The individual could be acting alone; he could be part of a group pursuing its inimical agenda or could be state supported, working to further the plans of the state. Amongst various types of warfare, cyber war is the low-cost option. I have two suggestions for countering the cyber security threat. One is technology upgrade in cyber security, and second is investment and education in cyber security...
One possible solution to counter threats is by being visible in the public domain and creating greater awareness breaking the traditional masks of secrecy that surround intelligence operations. This exercise of being present in the event, dominating social media to garner support from the public and managing social media through well orchestrated planning, would be the greatest challenge for RAW in the years to come... Predicting cascade effects in social media and the ability to alter the outcome of such cascades and arrest them when needed or directing to them one's own advantage requires the symbiotic convergence of not merely the technology and social sciences, but also watchful monitoring. The technologies underpinning social media should be used to the advantage of unifying people for national growth and security. This will form the major thrust of all intelligence activities.