
Junior engineering networking convocation held at Military College
Tired of too many ads? go ad free now
MCTE Deputy Commandant and Chief Instructor Major General Gautam Mahajan was the chief guest of the event and presented medals and trophies to the award winners. The Faculty of Communication Engineering commander, Brigadier Deven Makhija, administered the engineer's pledge.
In his valedictory address, Major General Mahajan complimented the officers for their performance during the course. He emphasised force modernisation, which is one of the thrust areas in all armies of the world today.
He reminded the graduating officers about the importance of the man behind the machine and exhorted them to keep pace with the phenomenal boom of technology in the field of communications and information technology, and to always strive for excellence.
An MCTE press release stated that the college has an impressive campus and laboratories for emerging technologies like 5G, AI, EM Spectrum Operations, Quantum Technology and VLSI. It is the only institution that provides training to military personnel in these specialised fields of information and communication technologies in the modern battlefield.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Business Standard
a day ago
- Business Standard
DroneAcharya Aerial Innovations wins order from Indian Army
For supply of drones and establishment of drone lab DroneAcharya Aerial Innovations announced that it has been awarded a work order worth Rs 99.67 lakh by the Indian Army Ministry of Defence for the supply of drones and the establishment of an advanced Drone Lab. The project will significantly enhance the Army's drone training capabilities, providing military personnel with hands-on experience in reconnaissance, surveillance, and FPV (First Person View) drone applications. The scope of work includes supplying a wide range of drones, such as Combat-Ready FPV Drones (10-inch and 7-inch), Surveillance Drones, Training Drones, and customized Nano Drones, along with setting up a state-of-the-art Drone Lab and integrated drone systems. This initiative is aimed at modernizing combat engineering training, improving real-time situational awareness, and boosting tactical efficiency within the regiment. The contract commenced on 08 August 2025 and is scheduled to be completed by 06 November 2025.


Hindustan Times
2 days ago
- Hindustan Times
Armies Tormented by Drones Innovate Ways to Spot, Jam and Zap on the Cheap
BEMOWO PISKIE, Poland—When U.S. Army Sgt. Sebastian Zouzoulas became an electronic-warfare specialist, his main focus was detecting remote-control roadside explosives. That was four years ago—a whole generation back on the battlefield. Today, his work is all about countering drones. Wars in Ukraine, the Middle East and across Africa are rewriting the rules of combat, with small, expendable and deadly drones increasingly critical. Militaries are sprinting to mass-produce the weapons and understand how best to fit them into target="_blank" class="backlink" data-vars-page-type="story" data-vars-link-type="Manual" data-vars-anchor-text="fighting plans">fighting plans. As with every new weapon, a parallel race is on to thwart the new killers. Tacticians are grappling with how to defend against attacks massing dozens or hundreds of drones—without spending a fortune. 'Whatever weapon system or munition you shoot at another adversary's capability, it should be cheaper than what you're shooting down,' Army Gen. Christopher Donahue, commander of U.S. land forces in Europe and Africa, recently told a gathering in Germany. Days after setting that challenge, Donahue was at an Army base in the Polish countryside, watching forces try to accomplish it at an exercise dubbed Project Flytrap 4.0. The fourth in a series of learn-by-doing events, the U.S.-British maneuvers brought together top brass, tech developers and soldiers like Zouzoulas. While troops staged engagements under drenching rain across the training grounds' woods and fields, officers and officials filled a base auditorium to absorb lessons from drone combat in Ukraine and hear about the efforts of the North Atlantic Treaty Organization to apply those lessons. Outside, soldiers and technicians exhibited some of the gear being tested. Stryker combat vehicles of the U.S. Army's 2nd Cavalry Regiment during the exercise in Poland.U.S. Army Sgt. Sebastian Zouzoulas with a Terrestrial Layer System-Brigade Combat Team Manpack. NATO, which recently agreed to a spending increase, must ensure 'that we are strong enough that we don't have to fight because no one wants to take us on—because we've deterred them,' said U.S. Ambassador to NATO Matthew Whitaker, who attended Flytrap. The base where Poland hosted the exercise sits about 50 miles from both the Russian exclave of Kaliningrad and the Polish city of Suwalki, which NATO fears that Russia considers a target because of its location between Kaliningrad and Moscow's ally Belarus. Project Flytrap began in March with initial research and testing. It has grown in scale and ambition, with 4.0 the first time troops integrated counterdrone systems into battalion-level fighting. The engagement scenario involved several dozen troops attacking roughly 180 defenders in traditional land battles augmented with hundreds of drones, employed in the most realistic ways possible short of lethality, said organizers. To crank up intensity, they packed into the four-day exercise a relentless series of attacks, engagements and threats modeled on fighting in Ukraine and other conflicts. 'It's terrifying, watching the drones counter each other,' said Zouzoulas of the scenes on Ukraine's front lines. Adapting to that reality is Flytrap's focus. Troops from the Army's 2nd Cavalry Regiment, based in Germany, and the U.K.'s Royal Yorkshire Regiment used new devices—some developed in-house and some from private companies—to track, jam and shoot down drones sent at them by other U.S. forces. A U.S. soldier with a drone detector and a jammer. 'It's very much a cat-and-mouse game,' said Army Lt. Col. Jeremy Medaris, a leader of the exercise. Drones keep adapting, 'so then you have to have an adaptation as well' to counter them. Instead of seeking a single solution, he said, the emphasis is on developing a flexible and layered approach with a range of tools. Zouzoulas's Terrestrial Layer System-Brigade Combat Team Manpack tackles the first stage in drone-fighting: spotting attackers. A sort of antenna, known as a Beast+, resembles a cactus growing out of a backpack, connected by wire to a screen the size of a smartphone. Designed for foot soldiers on the move, it scans for nearby drones' radio signals and jams them. An even smaller wearable system resembles two big walkie-talkies. Dubbed Wingman and Pitbull, they also seek and jam drones' radio signals. Using radio signals to spot air attacks began during World War II and until recently mostly focused on using radar to pinpoint large, fast objects. Engineers deliberately built systems to ignore small, low and slow objects to avoid alerts triggered by birds. Now engineers must be able to detect bird-size craft and ensure they are machines. Zouzoulas's unit moves on Stryker fighting vehicles, on which technicians at Bemowo Piskie mounted for test use a variety of drone-detection gear able to scan 360 degrees over a wide radius. Engineers are experimenting with precision radar and optical or infrared sensors, starting with upgrades to existing systems. Specialists from the Army Combat Capabilities Development Command Analysis Center have spent almost seven years creating software to boost the accuracy and range of widely used radar. It is used to target big guns deployed across the military, under the Common Remotely Operated Weapons System. Now it can detect drones at distances far greater than they might be targeted, said developers. Troops inside a Stryker can activate the system to shoot drones automatically with the vehicle's roof-mounted M2 Browning .50-caliber machine gun. The system's radar tracks the rounds it fires and adapts its targeting. To secure fixed positions like field headquarters, the Pentagon is also using acoustic sensors. Highly sensitive listening devices, trained to detect the sonic signatures of drone motors, don't hunt for radio waves or visual contact. That is critical at night and against autonomous or fiber-optic guided drones, which don't communicate with base by radio transceiver. A U.S. Army tactical operations center during the Project Flytrap conferring as they oversee maneuvers. One acoustic drone-warning system deployed during the Flytrap exercise creates what its developers at Norway's Squarehead Technology call a safety bubble around troops, in which they can be nearly certain they will know when drones are approaching. A full array, about the size of a campfire, addresses one of the drone attacks' most insidious features: dread. Ukrainian soldiers and civilians now live in almost constant fear of Russian drones, and Kyiv is working to inflict the same anxiety on Russian troops. 'Knowing there are no drones around you allows you to be a human,' said Squarehead's vice president of defense, Knut Torbjørn Moe. 'You can do the things you need to do, like go to the bathroom or sleep or do other soldier work.' Once drones are detected, neutralizing them at low cost is the next hurdle. A natural response for soldiers is to shoot at them with their personal rifles, but hitting a drone is much harder than hitting a bird. Troops at Flytrap improved their odds with computerized targeting equipment from the Israeli technology company Smart Shooter mounted on U.S. Army standard-issue M4 rifles. The fire-control system consists of a high-tech sight that is slightly larger than a big telescopic scope and a replacement trigger. The shooter aims at a drone and pulls the trigger, but bullets only fire when the system has calculated that a hit is likely. A U.S. soldier carries an M4 rifle fitted with a Smart Shooter sight. Soldiers at Flytrap also tested an array of point-and-shoot jammers that resemble oversize laser guns from a science-fiction movie. Most emit strong radio signals that disrupt a drone's operation. Bigger threats, such as drone swarms or attacks on armored vehicles, need a bigger response. That is what the San Francisco startup Mara aims to tackle with what it calls 'ubiquitous antiswarm' technology, which detects incoming drones and autonomously launches compact interceptors. The company is a finalist in a continuing Army competition seeking innovative tech solutions to a range of battlefield problems. Chief Executive Daniel Kofman, adjusting an antenna array on a Stryker, said he aims for 'one-to-one cost with the drone coming at us' using inexpensive hardware and what he called 'novel AI.' A full system, with 48 interceptors, costs 'less than a new truck,' he said, without specifying what kind of truck. Once troops in an equipped vehicle activate their system, it seeks and shoots down attacks without human input, Kofman said. The equipment is designed to withstand jamming and guard against fully autonomous drones, like fiber-guided ones, freeing troops to focus on their mission—not drones. 'That's the whole point of our system,' Kofman said. Write to Daniel Michaels at Armies Tormented by Drones Innovate Ways to Spot, Jam and Zap on the Cheap Armies Tormented by Drones Innovate Ways to Spot, Jam and Zap on the Cheap Armies Tormented by Drones Innovate Ways to Spot, Jam and Zap on the Cheap Armies Tormented by Drones Innovate Ways to Spot, Jam and Zap on the Cheap Armies Tormented by Drones Innovate Ways to Spot, Jam and Zap on the Cheap


Indian Express
2 days ago
- Indian Express
India's cyber doctrine has an ambitious vision, but there are implementation challenges
On August 7 this year, the Chief of Defence Staff of India, General Anil Chauhan, released the Joint Doctrine for Cyberspace Operations. The unveiling of this declassified document represents India's formal acknowledgement that future warfare will be as much about bytes as bullets. While the doctrine articulates laudable strategic ambitions, its success will ultimately depend on addressing several practical challenges that need to be discussed, explored and harmonised. The doctrine's core premise — that cyber threats transcend traditional service boundaries — reflects hard-learned lessons from global conflicts. The 2007 cyber attacks on Estonia, which paralysed the nation's digital infrastructure, demonstrated how adversaries could achieve strategic objectives without firing a single shot. Similarly, the 2010 Stuxnet attack on Iran's nuclear facilities showed how cyber operations could achieve kinetic effects, blurring the lines between digital and physical warfare. India's own experience reinforces this reality. The 2020 Mumbai power grid attack, allegedly linked to Chinese hackers, illustrated how critical infrastructure vulnerabilities could be exploited during military tensions. Not to miss the recent info war using digital media and cyber attacks during Operation Sindoor. The doctrine's emphasis on 'threat-informed planning and real-time intelligence integration' acknowledges cyber warfare's unique characteristics. Unlike conventional military operations that follow established patterns, cyber attacks can emerge from state actors, criminal networks, or lone hackers with equal destructive potential. The 2017 WannaCry ransomware attack, which affected over 300,000 computers globally within days, exemplifies how rapidly cyber threats can escalate beyond traditional containment strategies. However, the doctrine's most ambitious goal — achieving true jointness in cyberspace — faces significant structural obstacles. The Indian military's historical tendency toward service-specific cultures runs deep. Each service has developed distinct procurement systems, operational protocols, and technological preferences over decades. The Army's focus on tactical cyber capabilities, the Navy's emphasis on maritime domain awareness, and the Air Force's space-cyber integration represent fundamentally different approaches to the same domain. Consider the ongoing challenges with India's Defence Cyber Agency, established in 2019. Despite its mandate to coordinate tri-service cyber operations, reports suggest that resource allocation, operational authority, and intelligence sharing still remain non-optimal. The doctrine's success will require overcoming these institutional barriers that have proven resistant to reform efforts. The US offers a cautionary tale. Despite establishing Cyber Command in 2009, American forces still struggle with inter-service coordination in cyberspace. The complexity of integrating Army network operations, Navy information warfare, and Air Force cyber capabilities has required constant organizational adjustments. If the world's most technologically advanced military faces such challenges, India's path toward cyber jointness will likely be even more complex. The doctrine's emphasis on human capital development reveals perhaps its most critical vulnerability. India faces a severe cybersecurity talent shortage, with industry estimates suggesting a deficit of over 10 lakh skilled professionals. The military's ability to compete with private sector salaries and work conditions for top cyber talent remains challenging but not impossible. This challenge is compounded by the specialised nature of military cyber operations. Unlike traditional military skills that can be developed through established training programs, cyber warfare requires continuous adaptation to evolving threats. The half-life of cybersecurity knowledge is measured in months, not years, requiring unprecedented investment in continuous learning and development. The doctrine's call for 'indigenous cyber capabilities' also raises practical concerns about India's technological ecosystem. While initiatives like the more than decade old National Cyber Security Strategy emphasize self-reliance, India's cybersecurity industry remains heavily dependent on foreign technologies and expertise. Building truly indigenous capabilities would require massive investments in research and development, with uncertain timelines for operational readiness. No doubt many start-ups have come up but they are mostly acquired by deep pocket foreign IT giants. The doctrine's analysis of international approaches, while informative, may oversimplify complex realities. China's cyber doctrine, for instance, isn't just about 'comprehensive national power' — it reflects a fundamentally different relationship between state and society. China's ability to mobilise private sector cyber capabilities through national intelligence laws has no equivalent in India's democratic framework. Similarly, the Russian model of leveraging 'non-state actors' for strategic objectives operates within a governance structure that tolerates criminal cyber activities when they serve state interests. India's approach to cyber deterrence must account for these fundamental differences in political systems and strategic cultures. The US model of 'persistent engagement' has also faced criticism for its potential to escalate conflicts and blur attribution lines. India's adoption of similar approaches could complicate its relationships with neighbors and create new vulnerabilities in an already complex regional security environment. Despite these challenges, the doctrine represents necessary progress in India's cyber evolution. Its public release serves important strategic communication purposes, signaling serious intent while maintaining operational ambiguity. However, several critical gaps require urgent attention. First, the doctrine lacks specific timelines and resource commitments for implementation. Without concrete benchmarks, it risks becoming another aspirational document rather than an operational blueprint. Second, the integration of civilian cybersecurity infrastructure with military operations remains underexplored. Given that most of India's critical infrastructure operates in the private sector, effective cyber defence requires unprecedented civil-military cooperation. Finally, the doctrine's deterrence strategy needs clearer articulation. Unlike nuclear deterrence, cyber deterrence operates in a domain where attribution is often uncertain and escalation dynamics are poorly understood. Translating doctrinal ambitions into operational capabilities, therefore, will require sustained political commitment, significant resource allocation, and institutional reforms that extend far beyond military structures. The writer, a defence and cyber security analyst, is former country head of General Dynamics