Impact Of Technology On International Relations

Introduction

Tech has played an indispensable role in forming relationships among nations, and the role of technology in international relations (IR) is no exception. The origins of technology can be traced back to the rudimentary tools of the Paleolithic era, and nowadays, it has reached the sophisticated digital technologies of the 21st century. It has always been a determining factor in states’ social, economic, and political dynamics. The development of technology not only improves the capacities of states and nations but also creates intricate issues that affect foreign relations on a global scale. While technological developments are basically restructuring international politics scales, they impact everything from diplomacy and warfare to economic development and international communication. As nations are navigating these changes, technology has become the central issue in the international arena today, dictating the new order of nations concerning the power and strategies of states.

Digital Diplomacy:

Digital tools have become essential in how states manage their external presence and relations. These media, from social media to virtual summits, are the tools that connect people who are geographically separated and offer a platform for real-time communication and diplomacy. This real-time lack of privacy can enhance the transparency level. Still, on the other hand, it may pose difficulties for diplomacy, as messages and policies are broadcasted and scrutinized worldwide simultaneously.

Cybersecurity:

As countries increasingly depend on digital platforms for governance and communication, cybersecurity becomes the core element in international relations. From cyber espionage and stealing national security secrets to attacks on critical infrastructure that can escalate international tension, a wide range of risks exist. This complex cybersecurity environment consists of state actors – governments -, non-state actors like hacker groups, and even private sector agents. An urgent need for strong cybersecurity and international collaboration among states to solve cyber threats has become unavoidable. The advent of technology, especially in information and communication, has brought forth a new era with technological advancements as pivotal factors in determining the distribution of power among nations. States that have developed the most advanced tech have very powerful means at their disposal in both economic and military sectors, thus changing the way power works worldwide and introducing a new hierarchy of digital power in international relations.

Artificial Intelligence (AI):

AI impacts global trade and economics by automating complex tasks automatically, optimizing logistics, and refining forecasting. AI trade systems expedite customs processes and trade documents; hence, cross-border dealings have no delays or costs. Economically, AI brings about substantial productivity improvements resulting from applying AI technology to optimize supply chains and manufacturing processes, as well as more precise demand forecasting and resource allocation. In addition, AI-assisted data mining assists nations and companies in finding economic trends. It helps them make strategic decisions more efficiently, affecting economic policies and trade agreements between states.

Blockchain Technology:

Blockchain’s effect on international economics is powerful, mainly because it gives more visibility and minimizes fraud in trade finance. Blockchain, as a distributed ledger technology, has an immutable and transparent mechanism for tracking the products from the point of making to its entry into the market. This technology is the basis for cryptocurrency currently fighting against traditional banking and monetary systems. It may force the people to have less faith in the central banks and fiat currencies. Additionally, blockchain gives smart contracts that run by themselves and veil the need for intermediaries while reducing transaction costs and increasing trade efficiency.

Economic Security and Policy:

Both AI and the blockchain interact with national security policies and economic operations. Countries are now realizing the crucial role of technological sovereignty for which they are pouring strategic investments in developing their technologies and reducing their reliance on alien AI and blockchain technologies. This change is also reflected in international talks, where technical skills are used as a main negotiation tool and become the key element of trade agreements and economic partnerships.

Global Shifts in Economic Power:

The use of these technologies is not the same for everyone, thus leading to a change in the economic power holders. Nations that are fast to adopt AI and blockchain into their economic system are gaining an advantage over others, which might gradually change the world economy map. Emerging states, specifically, can benefit from this leapfrogging by encompassing these technologies in their industrialization, where they restructure their positions in the global economy and challenge status quo developed states.

Conclusion

Technology has increasingly been seen as a mighty force that is changing the web of global interactions, redefining the dynamics of diplomacy, security and economic development. The birth of digital diplomacy and the rise of cybersecurity measures demonstrate that nations are increasingly using technology to strengthen international relations while, in turn, becoming vulnerable to cyber threats that can disrupt those partnerships. AI and blockchain-related developments in the economy are the engines of global trade and business transformation, which creates new feasibilities and at the same time puts a deal of responsibility on the countries as well as risks related to technological dependence and inequalities. The advancement of technology is fostering a new possibility of addressing global issues, from environmental to social issues. While it is an enabler, it should also be an incentive to re-establish international cooperation and to stay ethical in governing the world so that technology does not become a bridge but a barrier in international relations.




Technology Advancements and the Evolving Cyber Security Landscape

Introduction

Our world is undergoing a digital revolution and technology is fundamentally altering the entire digital ecosystem. From the proliferation of internet-connected devices to the rise of artificial intelligence (AI) and the Internet of Things (IoT), the IoT is a vast network of interconnected items that includes wearable technologies, industrial systems, smart appliances, and critical infrastructure. While these advancements offer incredible opportunities for progress, they also create a complex and ever-evolving cyber-security landscape. Cyber-security is the process of defending networks, data, and computer systems against online attacks that jeopardize the privacy, accuracy, and usability of information systems. Cyber-security is a top priority in today’s digital world due to the increasing tech advancements and frequency of cyber-attacks. It is critical for preserving the safety of individuals and businesses that rely heavily on digital technologies. Cyber security is used in a variety of applications, including health care facilities, financial institutions, smart cities, grid systems, government organizations, education, and the military. Cyber security faces a variety of threats from various sources, including hackers, cybercriminals, state actors, terrorists, and insiders (Admass et al., 2024).

A greater emphasis on cyber-security is required as the digital landscape changes due to developing technologies. In order to combat the growing threat of cyber-crime, organizations must place a high priority on protecting their digital assets, intellectual property, and consumer data. Businesses confront additional risks as they adopt digital technology, risks to their operations, company, and customer trust. Cyber-attacks are now more frequent, sophisticated, and have the ability to cause immense damage. Therefore, keeping information private, accessible, and of high quality while safeguarding digital assets has become a critical task in this regard (Mandal et al., 2023).

Technological Advancement: A Digital Dilemma

Rapid technology advancement poses a digital dilemma. While technology presents exciting potential to strengthen cyber-security defenses, these same developments create new vulnerabilities that malicious actors might exploit. Technological advancement, innovation, and scientific growth have long been hailed as drivers of social and economic progress. The last few centuries, particularly in recent decades, have seen incredible advances that have revolutionized digital world. But progress is not without its costs. The potential for exploitation and abuse grows significantly as society become more dependent on technology (Rolenc, 2020).

The emergence of sophisticated technologies poses a challenge to cyber-security. Conventional security methods are slow to adapt because they were created for less complex systems. This vulnerability results from incomplete knowledge of new technologies, a lack of comprehension of software, and insufficient security-related procedures used throughout the development process. In order to effectively combat the constantly changing landscape of cyber-attacks, a multi-layered security approach is essential. To maintain a robust defense, security frameworks must also be continuously monitored and evaluated (Kalra* et al., 2020).

Cyber-security is a major problem that is becoming more and more of an issue for developing countries (Otieno, 2020). These countries are facing challenges in utilizing technology for good while reducing its potential for harm. Several countries are susceptible to data breaches and network attacks because, in contrast to developed nations, they lack a strong cyber-security infrastructure. Cyber-attacks are not limited to individual and businesses in the modern world, but we have examples of disruption of vital national infrastructure, which hinder services and spreads instability. Moreover, anti-state actors may use cyber espionage to steal confidential government information, endangering national security leading to devastating consequences, For that matter, not only spreading awareness about emerging technologies is essential but prioritizing cyber-security by all the stakeholders from all sectors in order to address this threat is needed. Only through collective effort, countries can fully benefit from technological advancement and fortify their cyber-security defenses.

Artificial Intelligence (AI) and Cyber-security

The future of cyber-security is characterized by both impending threats and beneficial developments in the quickly expanding digital world. As artificial intelligence (AI) develops, both revolutionary advancements and new risks for cyber-threats are present. It is essential to develop AI-powered security systems that are capable of recognizing and responding to emerging threats. Moreover, it is imperative to ensure the ethical application of AI in cyber-security protocols, in order to curtail potential exploitation and mitigate adverse consequences of Artificial Intelligence (AI). Transparency and accountability are indeed fundamental in unlocking the true potential of AI for robust cyber-security.

Cyber threats present a variety of issues which require innovative and adaptive solutions that can keep up with the ever-changing landscape of digital risks. Therefore, there are several benefits of integrating artificial intelligence (AI) into cyber-security solutions but it also requires a complex approach due to ethical and privacy concerns. Artificial Intelligence (AI) refers to a variety of sophisticated methods and algorithms including data-driven learning, prediction, and information adaptation. AI-powered systems use machine learning algorithms and powerful data analytics to examine massive volumes of data in real-time. This feature makes it possible to spot unusual trends that can point to possible shortcomings in cyber-security.

Artificial intelligence (AI) has immense potential as a critical technology with unmatched capabilities to strengthen cyber-security defenses. AI can be used for cyber-security because it has great ability to improve threat detection, strengthen defenses, and reduce risks in the digital domain. Through this, AI can help businesses implement proactive defense systems by analyzing prior data and identifying current trends. These systems will help to detect new threats and take countermeasures before they develop into full-fledged cyber-attacks. This approach, facilitated by AI will help to strengthen an overall cyber-security posture (Camacho, 2024).

In addition, Artificial Intelligence is revolutionizing national security strategies and capacities worldwide; nonetheless, its impact on the Global South is more significant. With AI-driven projects like cyber security, autonomous technology, and surveillance, every country is actively seeking to bolster internal security. AI combined with data processing efficiency has opened up new strategic opportunities for countries, allowing them to step up efforts to protect national integrity, sovereignty, and peace. It is because AI can be used to proactively identify threats and advance intelligent surveillance, strong cyber resilience, thorough data analysis, and well-informed decision-making (Srivastava, 2023).

Conclusion

Technological advancements and the ever-evolving cyber security landscape are inextricably linked. These advancements, while offering significant benefits, create new avenues for cybercrime. This dynamic environment necessitates a flexible and responsive approach to security. Businesses must leverage emerging technologies, such as artificial intelligence and automation, to enhance their defenses and stay ahead of increasingly complex threats. Additionally, fostering a culture of cyber security awareness and prioritizing investments in robust security measures are critical for navigating digital landscape. Furthermore, governments should play their vital role in fostering a secure digital environment. This can be achieved through initiatives such as promoting international cooperation on cybercrime, establishing clear regulatory frameworks, and investing in research and development of advanced cyber-security solutions. Only through a collaborative effort, encompassing organizations, individuals, and governments, a secure digital future can be achieved.

Recommendations

• Standardize Cyber-security Frameworks: Moreover, establish common standards and protocols for secure development, deployment, and operation of new technologies. This promotes interoperability and reduces the attack surface across different systems.
• Embrace Regulatory Measures: Introduce clear and comprehensive regulations to address emerging cyber threats. Develop and enforce clear regulator measures for data privacy, breach notification, and security standards for critical infrastructure sectors. This will empower businesses and provide a baseline to operate on.
• Research and National Strategy: Countries must invest in research for cutting-edge security solutions for cyber-security threats and risks. A national cyber-security strategy is needed, outlining critical infrastructure protection and fostering collaboration between government, industry, and other relevant stakeholders.
• Invest in Cyber-security Education: Prioritize investment in research and development of advanced cyber-security solutions to stay ahead of evolving threats Equip the workforce with the skills needed to identify, prevent, and respond to cyber threats in the context of emerging technologies. This includes both technical training and awareness programs for all levels. Furthermore, educate the public on cyber security best practices to empower individuals to protect themselves online.
• Promote International Collaboration: Encourage information sharing and coordinated responses to cyber threats among different countries. This strengthens collective defenses against large-scale cyber-attacks and fosters international cooperation in developing cyber-security solutions.

References

Admass, W.S., Munaye, Y.Y. and Diro, A.A. (2024) ‘Cyber Security: State of the Art, Challenges and Future Directions’. Cyber Security and Applications, 2, p. 100031. DOI: 10.1016/j.csa.2023.100031.
Camacho, N.G. (2024) ‘The Role of AI in Cybersecurity: Addressing Threats in the Digital Age’. Journal of Artificial Intelligence General Science (JAIGS) ISSN:3006-4023, 3(1), pp. 143–154. DOI: 10.60087/jaigs.v3i1.75.
Kalra*, Y., Upadhyay, S. and Patheja, Dr.P.S. (2020) ‘Advancements in Cyber Attacks and Security’. International Journal of Innovative Technology and Exploring Engineering, 9(4), pp. 1520–1528. DOI: 10.35940/ijitee.D1678.029420.
Mandal, D.K., Singhal, D.N. and Tyagi, M.D. (2023) ‘Cybersecurity in the Era of Emerging Technology’.
Otieno, D.O. (2020) ‘Cyber Security Challenges: The Case of Developing Countries’.
Rolenc, J.M. (2020) ‘Technological Change and Innovation as Security Threats’ Kliestik, T. (ed.). SHS Web of Conferences, 74, p. 02015. DOI: 10.1051/shsconf/20207402015.
Srivastava, K. (2023) ‘ARTIFICIAL INTELLIGENCE AND NATIONAL SECURITY: PERSPECTIVE OF THE GLOBAL SOUTH’. International Journal of Law in Changing World, 2(2), pp. 77–87. DOI: 10.54934/ijlcw.v2i2.63.




Artificial Intelligence

Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience.

All but the simplest human behaviour is ascribed to intelligence, while even the most complicated insect behaviour is never taken as an indication of intelligence. What is the difference? Consider the behaviour of the digger wasp, Sphex ichneumoneus. When the female wasp returns to her burrow with food, she first deposits it on the threshold, checks for intruders inside her burrow, and only then, if the coast is clear, carries her food inside. The real nature of the wasp’s instinctual behaviour is revealed if the food is moved a few inches away from the entrance to her burrow while she is inside: on emerging, she will repeat the whole procedure as often as the food is displaced. Intelligence conspicuously absent in the case of Sphex must include the ability to adapt to new circumstances.

The ideal characteristic of artificial intelligence is its ability to rationalize and take actions that have the best chance of achieving a specific goal. A subset of artificial intelligence is machine learning, which refers to the concept that computer programs can automatically learn from and adapt to new data without being assisted by humans. Deep learning techniques enable this automatic learning through the absorption of huge amounts of unstructured data such as text, images, or video.

KEY TAKEAWAYS

  • Artificial intelligence refers to the simulation of human intelligence in machines.
  • The goals of artificial intelligence include learning, reasoning, and perception.
  • AI is being used across different industries including finance and healthcare.

Weak AI tends to be simple and single-task oriented, while strong AI carries on tasks that are more complex and human-like. Things might have changed in the time

TO UNDERSTAND ARTIFICIAL INTELLIGENCE

When most people hear the term artificial intelligence, the first thing they usually think of is robots. That’s because big-budget films and novels weave stories about human-like machines that wreak havoc on Earth. But nothing could be further from the truth. Artificial intelligence is based on the principle that human intelligence can be defined in a way that a machine can easily mimic it and execute tasks, from the most simple to those that are even more complex. The goals of artificial intelligence include mimicking human cognitive activity. Researchers and developers in the field are making surprisingly rapid strides in mimicking activities such as learning, reasoning, and perception, to the extent that these can be concretely defined. Some believe that innovators may soon be able to develop systems that exceed the capacity of humans to learn or reason out any subject. But others remain skeptical because all cognitive activity is laced with value judgments that are subject to human experience.

Applications of Artificial Intelligence

The applications for artificial intelligence are endless. The technology can be applied to many different sectors and industries. AI is being tested and used in the healthcare industry for dosing drugs and different treatments in patients, and for surgical procedures in the operating room. Other examples of machines with artificial intelligence include computers that play chess and self-driving cars. Each of these machines must weigh the consequences of any action they take, as each action will impact the end result. In chess, the end result is winning the game. For self-driving cars, the computer system must account for all external data and compute it to act in a way that prevents a collision.

Categorization of Artificial Intelligence

Artificial intelligence can be divided into two different categories: weak and strong. Weak artificial intelligence embodies a system designed to carry out one particular job. Weak AI systems include video games such as the chess example from above and personal assistants such as Amazon’s Alexa and Apple’s Siri. You ask the assistant a question, it answers it for you. Strong artificial intelligence systems are systems that carry on the tasks considered to be human-like. These tend to be more complex and complicated systems. They are programmed to handle situations in which they may be required to problem solve without having a person intervene. These kinds of systems can be found in applications like self-driving cars or in hospital operating rooms.

Four types of artificial intelligence?

Arend Hintze, an assistant professor of integrative biology and computer science and engineering at Michigan State University, explained in a 2016 article that AI can be categorized into four types, beginning with the task-specific intelligent systems in wide use today and progressing to sentient systems, which do not yet exist. The categories are as follows:
Type 1: Reactive machines. These AI systems have no memory and are task specific. An example is Deep Blue, the IBM chess program that beat Garry Kasparov in the 1990s. Deep Blue can identify pieces on the chessboard and make predictions, but because it has no memory, it cannot use past experiences to inform future ones.

Type 2: Limited memory. These AI systems have memory, so they can use past experiences to inform future decisions. Some of the decision-making functions in self-driving cars are designed this way.

Type 3: Theory of mind. Theory of mind is a psychology term. When applied to AI, it means that the system would have the social intelligence to understand emotions. This type of AI will be able to infer human intentions and predict behavior, a necessary skill for AI systems to become integral members of human teams.

Type 4: Self-awareness. In this category, AI systems have a sense of self, which gives them consciousness. Machines with self-awareness understand their own current state. This type of AI does not yet exist.




Artificial Intelligence and Machine Learning in Cybersecurity

World is an ever changing place. Contemporary world has revealed new notions such as Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL). AL, ML and DL have the capacity of various uses including increasing the potential to increase the efficiency and output in multiple fields. Machine Learning is commonly known in the world of cybersecurity when it comes to general application of Artificial Intelligence. Artificial Intelligence, Machine Learning and Deep Learning share many traits which seem similar and are often confused with one another.

The main purpose and goal of Artificial Intelligence is to develop computer programs having the ability to achieve intelligent functions just as they are carried out by human brains. It cannot be said when the first ever programming idea related to Artificial Intelligence was formulated but it can be traced back to the late 1940s and early 1950s. One significant development in the world of Artificial Intelligence was the creation of LISP or list processing language by John McCarthy in the year of 1957. Then in 2016, Sophia, a programmed humanoid, was introduced to the world. Artificial Intelligence also has some day-to-day occurrences in our daily lives including speech recognition, mapping, finding best possible routes when travelling, smart phones and devices that can perform independently etc.

Machine learning is defined “as the ability (for computers) to learn without being explicitly programmed.” Machine Learning has the capability to learn from large amount of data available using algorithm that are man built to complete tasks and it can also be seen as a data mining since it processes large amount of data. There are two kinds of learnings that fall under Machine Learning; Supervised Learning and Unsupervised Learning. In Supervised Learning, computer is given parameters to equate the data whereas in Unsupervised Learning, computer does that comparison and finds relationship from the data available independently. One of the pioneer of Machine Learning, Arthur Samuel, stated in his 1959 IBM paper that “programming computers to learn from experience should eventually eliminate the need for much of this detailed programming effort.” Machine Learning programs independently improves basing upon old and new data with a little help of humans. Machine Learning helps in designing cybersecurity algorithms that flag the unauthorized and unnecessary access. It also helps in flagging the security risks if there is any breaching or hacking taking place.

Machine Learning shows great commitment in cybersecurity and Artificial Intelligence. Machine Learning has the ability to extend great help when it comes to IT or cybersecurity. Machine Learning can acquire results from the past existing data to recommend the appropriate responses and predictions. It can build profiles of the hackers and how they attempt to breach from previous data breaches. As per Amir Kanaan, as it expands its knowledge, it can start to make proactive recommendations on how to reduce risk. Also, the advantages of Machine Learning in security can help us in areas such as Anti-malware, Dynamic Risk Analysis, and anomaly detection.

According to Rob Sobers, some benefits of Machine Learning include:

Classification: Programs classify data based on predetermined parameters.

Clustering: For data that does not fit preset parameters, Machine Learning group’s data based on their similarities or anomalies.

Recommendations: Programs learn from past choices, inputs and associations to recommend approaches and decisions.

Generative frameworks: Based on past data inputs, programs generate possibilities that can be applied to data that had not encountered those specific inputs before.

Predictions: Programs forecast based on data sets and past outcomes.

Machine Learning can be very beneficial in case of cybersecurity because it can generate an alert when there is a data breach, theft or other attacks that can cause strain financially. Machine Learning also helps in minimizing the workload for security teams, decreases the risks of human error and cater the specific requirements. Although Machine Learning has benefits, it is not entirely invincible. Machine Learning and Artificial Intelligence are becoming an essential part in the world of cybersecurity to run the matters more smoothly and timely. It is still not clear if Machine Learning will complete take over the tasks that require human brain. Complete reliance on Machine Learning and Artificial Intelligence can cause a false sense of safety and security, which is why it is important for both humans and technology to work hand-in-hand to stand against ever powerful cybersecurity threats.




Electromagnetic Pulse: Weapon of Today

In contemporary world we are surrounded by the most sophisticated technology having the capability of controlling and monitoring finance, electricity, travelling and communications. United States carried out its last above the surface nuclear test in the South Pacific in 1962 and world was exposed to deadly side effects of gamma rays that are electromagnetic pulse. In today’s world possessing nuclear weapons other than deterring offensive enemy or self-defense is considered unnecessary. Now world is shifting to practical application of weapons for target engagement using hi-tech. Another product of hi-tech is Electromagnetic Pulse or EMP.

Electromagnetic Pulse is described as a weapon possibly intimidating to national security. EMP can be created by two traditional methods: microwave emission and overhead nuclear burst. High power microwave electromagnetic energy can be produced as a direct pulse via special electrical equipment that transforms battery power into intense microwaves that are very damaging to electronics falling in much smaller area. Electromagnetic pulse is an instant electromagnetic field that is produced in the atmosphere by the radiation and power of a nuclear explosion. The damage to electrical equipment via EMP also covers wide area but it depends upon device’s design and altitude of the burst. The obligatory contrivance for the production of EMP is ionization of air molecules by gamma rays generated from nuclear detonation.

Electromagnetic Pulse of high altitude and High Power Microwave technology have advanced to the extent where Electromagnetic bombs are becoming viable. EMP is not radioactive, as said, it is a pulse that is formed as a side effect of electromagnetic or nuclear bomb detonation. It is also claimed that EMP has no direct side effects on living organisms. It is mainly used to everlastingly or briefly inactivate electrical and electronic equipment because electromagnetic energy travels at the speed of light. Most of the electrical systems are controlled by semiconductors and they fail while becoming in contact with EMP. Failure of semiconductors can potentially terminate railway, industrial, phone, water and power system.

EMP has the ability to destroy or burn out specified path range electronic equipment. EMP weapon has the ability to offer an edge in army combat and it can lead to very lethal affects in the battlefield. Developed EMP has range covering meters and kilometers. Reach of an EMP bomb depends upon its size and output power source. US Air Force Laboratory has developed an EMP called Counter-electronics High-powered Microwave Advanced Missile Project or CHAMP. CHAMP is capable of bursting high frequency energy destroying the adversary’s data and electronic system. EMP can be a device as small that it can fit in a regular sized briefcase. These bombs are thought to be developed to deter or to defeat an enemy with any nuclear confrontation. The smallest EMP devices are powered by AA battery and have the ability to deprogram a circuitry in a computer system frim 15 meters away. Electromagnetic pulse weapons are a lot larger in scale than microwave emission pulse. The technology used for microwave pulse is of such lower scale that non-state actors or organizations can acquire or make it to damage the computer devises.

Other States like Russia and China are also in a race of developing EMP weapons capable of destroying electronic equipment and systems. According to a Russian News Agency, TASS, the Russian EMP weapon, known as EMP Cannons, produces a high beam of electromagnetic pulse that can travel up to 10 km against aerial targets. TASS further explained that airborne targets can be destroyed from the range of 10 km because their electrical system burns down due to the heat and electromagnetic energy exposure. Russia aims to install EMP cannons in unmanned version of Russian sixth generation fighter jet because EMP cannons cannot be installed in an aircraft with a piolet due to the risk high EMP energy signals. USA has been accusing Russia for exposing several American soldiers and diplomates, inside and outside Russia, to electromagnetic waves silently. Many cases of sharp pain in head and throwing up have been reported which was later named “Havana Syndrome.”

There are no compelling proofs that Russia is behind exposing American diplomates to such affects. USA is still adamant by comparing situations to 1953-79 when Soviets barraged US embassy in Moscow microwave radiation leaving American diplomate’s white blood cells abnormal and many adverse health issues. USA claims that fire swept through the block right opposite to US embassy in Moscow and there were no radiations detected. By July of the same year, microwave radiations were detected again and another fire broke out in the same block. There are two explanations given by the USA that Russia has been using EMP as a weapon against them for years: one notion is that Russia has been using microwave to listen to American devise installed in the embassy or that they were used to freeze or burn out American electrical devise. Despite all the theories and accusations, it is not proved that Havana Syndrome is caused by electromagnetic energy radiations.

China has also been recently accused of using microwaves against Indian soldiers in the mountains range of Himalaya. The reports suggest that healthy Indian soldiers suddenly started feeling weak and violent vomiting. According to professor Jin Canrong at Renmin University in Beijing, China used microwave energy and exposed Indian soldiers to high frequency electromagnetic pulse which increased the heat in their body, leaving them feel vexed and irritated. By using that technique China turned the Himalayan hilltop into a giant microwave threatening the lives of Indians soldiers to be cooked alive from the inside. It made Indian solders to leave the premises of the hilltop unprotected for Chinese soldiers to occupy without even releasing a single bullet. India has dismissed the news by calling it “fake.” It has also been reported that China has “first strike” capability to melt and burn down and entire US power grid with the use of EMP radiation.

It is believed that the effects of being exposed to EMP energy are not long lasting and wear off in a span of weeks. Though EMP weapons require hi-tech and advanced power system, they are still less expensive than producing aircraft carriers, fifth generation fighter jets and nuclear bombs. EMP is not just a dream or a movie plot, it is a reality. EMP weapon can take down an entire State or a specific area by frying every electrical system and not shedding a drop of blood.