Download
This Policy Brief provides empirical evidence on how corruption affects foreign direct investment (FDI) in Pakistan. Despite the country’s persistently low Corruption Perceptions Index (CPI) score of 27, there is limited empirical research on the relationship between corruption and investment within Pakistan.…
Download
Cyber warfare has emerged as a prominent method for states to pursue strategic objectives by targeting digital infrastructure, disrupting essential services, and spreading disinformation, all without engaging in traditional military action. These operations often evade attribution and accountability, complicating legal responses and…
Download
The term “Non-State Actors” (NSAs) remains ambiguous in international law, despite various interpretations by different scholars and entities. This ambiguity stems from the complex nature of NSAs, which gives rise to both conceptual and dynamic issues. NSAs have become a significant force…
Download
Download
In recent days, there have been attempts to put legal flesh on the bones of India’s declared policy of holding the Indus Waters Treaty in “abeyance”. These initiatives have taken the form of seemingly coordinated published pieces by Indian authors that advance…
Download
India is pushing for modification of the Indus Waters Treaty (“IWT”), a long-standing water-sharing instrument between India and Pakistan. However, its arguments—based on population growth and climate change—fail to meet the legal criteria under international law for invoking the doctrine of rebus…
Download
This Policy Brief examines the impact of Free Trade Agreements (FTAs) on Pakistan’s trade performance. It highlights that, over the years, Pakistan has concentrated on increasing the number of FTAs. However, there is inadequate empirical evidence to determine whether these FTAs have…
Download
The rapid advancement of deepfake technology has introduced unprecedented challenges in modern warfare, particularly in the realms of deception, disinformation, and psychological operations. Utilizing Artificial Intelligence (AI) and machine learning, deepfakes generate hyper-realistic yet fabricated digital content, making them a powerful…
Download
Due to their integral role in the preservation of natural resources, dams are prime targets for terrorist attacks. Along with the ‘traditional’ threat to the physicality of the structures themselves, a new, potentially more destructive threat has emerged: that of a cyber…
Download
The Prevention of Electronic Crimes Act (PECA) 2016 was Pakistan’s initial effort to combat cybercrime. Recently, it has been updated through the 2025 amendment to address the rapidly evolving digital landscape. This amendment aims to modernize the legal framework, equipping the state…
