Interview with Young Aviation Enthusiasts

 

Enjoyed talking to and recording the event,  with the youngsters undergoing aviation courses conducted by MH Cockpits at Vels university. 

Click on the link above

 

Suggestions and value additions are most welcome

 

For regular updates, please register here

Subscribe

Disclaimer:

Information and data included in the blog are for educational & non-commercial purposes only and have been carefully adapted, excerpted, or edited from sources deemed reliable and accurate. All copyrighted material belongs to respective owners and is provided only for purposes of wider dissemination.

Celebrating Two years of Blogging with 300 posts

 

 

Topics Covered

 

Leadership, Motivation and Management
Decision making
Mental toughness
Earning respect
Good  leadership qualities and values
Science of Karma
Good working culture
Listening Skills
Be good feel good
Healthy working environment
importance of Tolerance
Lessons from Buddha
Difference between strength and courage
Lessons from rich and famous
Leadership lessons from Hollywood movies.
Shark in the tank theory of management
Car wheel theory of management
Aya Ram Gaya Ram syndrome – yes men.
Calculated Risks
Practical Leadership and management
Communication skills and body language
Lessons from Nanak
Being Responsible and Tolerant
Transferable Skills
Words of Wisdom
 

China

China’s Brain differently wired
China’s strategic thought
China’s military modernisation
China’s Defence industry
China – Pakistan Collusion
China – Art of deception
China: Kill Pigs List
China: Social score System
China: Active Defence Policy
China’s Joint Strategic support force (JSSF)
China – Joint Strategic Support Force.
Dealing with the Dragon
China’s grey zone operations
China: Flavours of military Reform
China: Pillars of Military Reform
China new diplomacy – drawing red lines in sand.
China – demographic analysis.
China through US Prism
China in South China Sea
China’s Military – Civil Fusion
PLAAF Analysis Strengths and weaknesses
Book review on China Airpower
Dealing with Dragon
Knowing China Better: lie flat and let it rot
Knowing China Better social life and customs
 

Geopolitics 

China
Pakistan – National security Policy, Turmoil
Afghanistan
India’s foreign policy
India’s neighbourhood
Quad
Indo – Russian relations
State of Airpower assets in Afghanistan
Indo – US relations
Afghanistan: Taliban runover
US-China shadow boxing over Taiwan
China spoiling Bhutan’s GNH.
South China sea
Gini Index and implications.
Multilateralism: Flexible Security Cooperation.
China Pak Collusivity
Collective Security
Sri Lanka Economic crisis: lessons and opportunity
Ukraine Conflict
Djibouti: Tug of war between USA and China
 

Air Power 

Airpower in Grey zone operations
Airpower in no war no peace situation
Air Power & Non-Kinetic warfare
Air Power in Multi-Domain warfare
Airpower in HADR ops and aid to civil authorities
Drone Threat the big picture
Fighter aircraft classifications by generations
Emerging Technologies and Air Defence
Air Power in Modern Day Warfare
S-400 SAM AD System
Combat Aviation
Changing nature of warfare
Air Defence operations
Air power concepts: Command / control the air, air supremacy, Air superiority & Favourable air situation.
 

Technology 

Hypersonics and hypersonic weapons
Technology and airpower
Future Trajectory of AI
Artificial intelligence
Unmanned Platforms and Swarms, Loyal wingman concept
AI and Fake News
AI: Digital twins and Surrogate models
 

Cyber Safety and Security 

Cyber warfare
Digital addiction
Economic Cyber Frauds
 

Space 

Space operations
Space warfare and organisation in India
Space-based ISR
 

Indian Air Force 

Capability development
Tejas and AMCA project
IAF role in HADR and aid to civil and other agencies
Network-centric operations
PLAAF and IAF comparative analysis
IAF Modernisation
Balakot Operations
Rafale induction and capability enhancement
S-400 Induction
Fire Power Demo: Ex Vayu Shakti
 

War and Warfare 

Types of war
Decoys and deception
Afghanistan Air Assets
Future Wars
warfare
Grey Zone Warfare
Classification of warfare into generations (Russian Thoughts)
Domains of warfare
C4ISR
Military Balance in the region
Ukraine War: Air Power aspects, a case of dog and the bone, Air superiority aspects, decoding Ukraine war
Operational Logistics
Lesser known facts about 1971the  War
Review of book on 1962 war
Review of book on 1965 war
India’s two-front challenge
Douhet theories
Duration of Conflict
Jasjit Singh on Airpower
Galwan stand off
Asymmetric Threat
Nuclear aspects revisited
Accelerating the paradigm Shift
National Security / Military Strategy
Urgent need for National Security Policy
Multilateralism: Relevance and changes
National Security Strategy
 

Military 

Military diplomacy
Military spending: trends and analysis.
Collusive threat and Deterrence: Air and Space Aspects
Integrated Capability Development.
Joint war game training systems
Fighter Pilot: Traits
Agni veer and Agnipath / Tour of duty / making best of the scheme
Andaman and Nicobar Command and Islands
Joint Operations and Joint man ship
 

Higher Defence Organisation 

Department of military affairs
Theaterisation
Air defence command
Civil-military fusion
 

Flight Safety 

Golden rules of safety
Importance of SOPs
A proactive approach to safety
Damage due to Bird Hits and Foreign Objects
Good safety Culture
 

Defence Industry 

Indigenous defence industry
HAL and DPSUs
Role of the private sector in defence production
Arms Transfer to Afghanistan
Defence Budget issues
Atmanirbharta
IAF and indigenisation
Indian Initiatives to promote self-reliance
 

Stories 

My tryst with HT-2 aircraft: The day god flew with me
The day I flew my dad’s car
Male Lake: Tale of two coursemates
Flying Tales

 

Suggestions and value additions are most welcome

 

For regular updates, please register here

Subscribe

 

 

References and credits

To all the online sites and channels.

 

Disclaimer:

Information and data included in the blog are for educational & non-commercial purposes only and have been carefully adapted, excerpted, or edited from sources deemed reliable and accurate. All copyrighted material belongs to respective owners and is provided only for purposes of wider dissemination.

 

 

 

Be Safe from Economic Cyber Frauds: Part 1

Reserve Bank of India had published a booklet to make everyone aware of the modus operandi followed by fraudsters for cyber economic crimes. The booklet also lists out do’s and don’ts. Relevant excerpts are summarised below.

 

  1. FRAUD THROUGH PHISHING LINKS : Obtaining your details through fraud KYC links.

Do

+Always cross-check the KYC status with your home branch or through your relationship manager when you receive calls, links or SMS from unknown sources requesting you to update KYC.

+Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https://cybercrime.gov.in

Don’t

– Don’t click on unknown/unsolicited links received on the phone/email without verifying it.

– Don’t share your confidential details with strangers.

  

  1. VISHING CALLS : Call regarding Activation or deactivation of insurance policy.

Do

+Always cross-check with your relationship manager or bank branch about any issue before trusting anyone.

+OTP is like a key to your safe wealth, so always keep it away from fraudsters.

+Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting  Portal at https://cybercrime.gov.in

Don’t

– Don’t trust unknown callers claiming to be speaking on behalf of banks asking for confidential information / details. Banks don’t seek such details over phone.

– Never trust strangers in the digital world easily, and be cautious while answering calls from unknown numbers.

 

  1. FRAUD USING ONLINE MARKETPLACES: Obtaining your account info through online selling and buying sites.

Do

+Always remember, UPI PIN is required only to make a payment and is not required to receive any payment.

+Always verify the mobile number In the UPI application before Initiating a payment.

+Report the incident to the nearest Cyber Crime Police Station and Notional Cyber Crime Reporting Portal at https://cybercrime.gov.in

Don’t

– Don’t shore OTP or confidential account details with strangers.

– Don’t enter the UPI PIN to receive on amount from another person.

 

  1. CREDIT CARD ANNUAL FEE WAIVER- FAKE OFFER : Obtaining OTP on this pretext.

Do

+ Be cautious while responding to calls from unknown numbers claiming to be from your bank.

+ Report to your Home branch immediately on realizing the fraud.

+ Block your card to prevent further financial loss.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https:// cybercrime.gov.in

Don’t

– Don’t share your OTP with anyone. Fraudsters might be able to collect your account details. but transactions can only happen if you share the confidential OTP sent to your phone.

 

  1. ATM CARD SKIMMING FRAUD

Do

+ Before initiating any transaction in the ATM machines, ensure that skimming devices ore not present. Skimming devices are hidden by fraudsters by overlapping them with the card insertion slot.

+ Report the fraud to the bank within 3 days of the card cloning incident.

+ Check your transaction history frequently to verify all transactions.

+ Report the incident to the nearest Cyber Crime Police Station and Notional Cyber Crime Reporting Portal at (https:/Icybercrime.gov.in)

 Don’t

– Don’t give your ATM card to anyone on the ATM premises to transect on your behalf. This kind of social engineering is being used to target senior citizens/semi-educated persons who have difficulty operating ATMs.

 

  1. FRAUD USING SCREEN SHARING APP/REMOTE ACCESS : Using a screen sharing app to obtain your info.

Do

+ Verify the authenticity of the offer on the official website of the entity concerned.

+ Install antivirus/spam blocking software on your mobile phone.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https://cybercrime.gov.in

Don’t

– Don’t download any applications over links sent through SMS, Email or instant messaging applications.

– Don’t download the screen-sharing application shared by any unknown persons.

– Screen sharing codes generated by these apps should not be shared with unknown persons.

 

  1. SIM SWAP/ SIM CLONING : Obtaining your Sim info and deactivating it at the same time cloning it to carry out the fraud.

Do

+ Verify the status of the SIM card with your Telecom Service Provider when in doubt instead of believing unknown callers.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https://cybercrime.gov.in

 Don’t

– Don’t share confidential details like Aadhaar number and SIM number with unknown callers.

 

  1. FRAUDS BY COMPROMISING CREDENTIALS THROUGH SEARCH ENGINES: Making payment on unknown link.

Do

+ Always obtain the contact details/customer service number, etc. from the official website of the service provider only.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https:/ /cybercrime.gov.in

Don’t

– Don’t contact random phone numbers obtained from web search engines, especially for doing financial translation.

 

  1. SCAM THROUGH QR CODE SCAN: Scanning QR code from unknown source and entering pin.

Do

+ Educate yourself about QR codes before using them.

+ Report the transaction immediately to your bank.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https://cybercrime.gov.in

Dont

– Don’t enter your UPI PIN to receive money from another person. UPI PIN is required only for sending a payment, not for receiving.

– Don’t scan QR codes to receive any payment. QR code needs to be scanned for sending a payment, not for receiving Money.

  

  1. IMPERSONATION THROUGH SOCIAL MEDIA : Impersonation on social media and asking for monetary help.

 Do

+ Verify by calling/meeting the real person before making a payment.

+ Always check the account details before making any payment.

+ Report the incident to the nearest Cyber Crime Police Station and National Cyber Crime Reporting Portal at https://cybercrime.gov.in

Dont

– Don’t keep your personal information like mobile number, email id and friend list open to the public.

– Don’t accept friend requests/ follow requests from people you have never met in person.

 

Bottom Line

It is better to be aware and always play safe.

 

Suggestions and value additions are most welcome

 

For regular updates, please register here

Subscribe

References and credits

Reserve Bank of India.

Disclaimer:

Information and data included in the blog are for educational & non-commercial purposes only and have been carefully adapted, excerpted, or edited from sources deemed reliable and accurate. All copyrighted material belongs to respective owners and is provided only for purposes of wider dissemination.