Overview
India faces a complex web of non-traditional security challenges that blur the lines between war and peace, state and non-state actors, and physical and cyber domains. Proxy warfare --- particularly Pakistan-sponsored terrorism --- has been a persistent threat since the late 1980s. Hybrid threats have evolved to combine conventional military postures with cyber attacks, information warfare, drone technology, and economic coercion. Online radicalisation has emerged as a new vector for terrorism, with social media enabling recruitment, propaganda, and lone wolf attacks.
The Russia-Ukraine conflict (since 2022) has provided a live case study of modern hybrid warfare, while the proliferation of deepfakes, AI-generated propaganda, and encrypted communications has added new dimensions to these challenges.
For UPSC, proxy war and hybrid threats are frequently asked in GS-III Mains, often linked to cyber security, terrorism financing, and border management.
Proxy War
Concept
| Aspect | Detail |
|---|---|
| Definition | A proxy war is a conflict where a state uses third parties (non-state actors, militant groups, or another state's forces) to fight on its behalf, avoiding direct military confrontation |
| State vs non-state actors | The sponsoring state provides funding, arms, training, intelligence, and safe havens; non-state actors carry out operations |
| Plausible deniability | The key advantage for the sponsoring state is the ability to deny direct involvement |
Pakistan's Proxy War Against India
| Phase | Period | Key Features |
|---|---|---|
| Phase 1: Punjab insurgency | 1980s-1993 | ISI-backed Khalistani militants; arms and training provided through Pakistan; Operation Black Thunder (1988) and police-led counter-insurgency ended the movement by mid-1990s |
| Phase 2: Kashmir insurgency | 1989-present | ISI redirected resources to J&K after Punjab stabilised; infiltration of militants through the LoC; groups like Lashkar-e-Taiba (LeT), Jaish-e-Mohammed (JeM), and Hizbul Mujahideen |
| Phase 3: Internationalised terrorism | 2001-present | 2001 Parliament attack (JeM), 26/11 Mumbai attacks (LeT, 2008); cross-border terrorism combined with international jihadi networks |
| Phase 4: Hybrid proxy war | 2016-present | Combination of physical terrorism with narco-terrorism (drone-dropped drugs and arms along Punjab border), social media radicalisation, and terror financing through cryptocurrency and hawala |
Key Incidents of Pakistan-Sponsored Terrorism
| Incident | Date | Detail |
|---|---|---|
| Parliament attack | 13 December 2001 | JeM and LeT operatives attacked the Indian Parliament; all five attackers killed; triggered Operation Parakram (India-Pakistan military standoff) |
| 26/11 Mumbai attacks | 26 November 2008 | 10 LeT operatives infiltrated from Karachi via sea; 166 people killed; attacked Taj Mahal Hotel, Oberoi, CST station, Nariman House |
| Pathankot airbase attack | 2 January 2016 | JeM operatives attacked the Indian Air Force base |
| Uri attack | 18 September 2016 | JeM fidayeen attacked an Army brigade HQ in Uri; 19 soldiers killed; India responded with "surgical strikes" across the LoC |
| Pulwama attack | 14 February 2019 | JeM suicide bomber killed 40 CRPF personnel on Jammu-Srinagar highway; India responded with the Balakot airstrikes (26 February 2019) |
| Pahalgam attack | 22 April 2025 | Terrorist attack on tourists at Baisaran meadow near Pahalgam, J&K; India launched Operation Sindoor (May 2025) targeting terror infrastructure in Pakistan and PoJK |
For Mains: Pakistan's proxy war strategy has evolved from conventional infiltration to a multi-domain hybrid approach combining physical terrorism, drone-delivered narcotics and arms, social media radicalisation, and terror financing. India's response has progressively escalated from diplomatic protests (pre-2016) to surgical strikes (2016), airstrikes (Balakot 2019), and direct military operations (Operation Sindoor 2025).
Hybrid Warfare
Concept and Characteristics
| Feature | Detail |
|---|---|
| Definition | Hybrid warfare is the blending of conventional military operations with irregular warfare, cyber attacks, information operations, economic coercion, and political subversion --- often below the threshold of traditional war |
| Grey zone tactics | Actions that fall between peace and war; designed to achieve strategic objectives without triggering a conventional military response |
| Attribution challenge | Hybrid operations are designed to be difficult to attribute to a specific state actor |
Components of Hybrid Warfare
| Domain | Examples |
|---|---|
| Military | Use of proxy forces, irregular fighters, private military companies; conventional forces used for coercion or posturing |
| Cyber | State-sponsored cyber attacks on critical infrastructure (power grids, financial systems, government networks); espionage and data theft |
| Information | Propaganda, fake news, social media manipulation, deepfakes; aimed at undermining public trust, social cohesion, and democratic institutions |
| Economic | Sanctions, trade warfare, debt-trap diplomacy, supply chain disruption |
| Political | Election interference, funding of political parties or extremist groups, diplomatic coercion |
| Technological | Weaponised drones, AI-enabled surveillance, GPS spoofing |
Russia-Ukraine Conflict: Lessons for India
| Lesson | Detail |
|---|---|
| Drone warfare | Extensive use of commercial and military drones for surveillance, targeting, and kamikaze attacks; India faces similar drone threats on its western border (narco-drones from Pakistan) |
| Cyber operations | Russia launched massive cyber attacks on Ukrainian infrastructure before and during the invasion; highlights vulnerability of India's critical infrastructure |
| Information warfare | Both sides used social media, deepfakes, and propaganda to shape global narratives; India faces similar challenges with fake news and hostile information operations |
| Supply chain disruption | Sanctions and supply chain disruptions affected global food and energy markets; underscores India's need for self-reliance in defence and critical technologies |
Online Radicalisation
Process and Pathways
| Stage | Description |
|---|---|
| Pre-radicalisation | Individual has personal grievances (perceived injustice, identity crisis, socioeconomic marginalisation) |
| Self-identification | Begins exploring extremist content online; engages with propaganda on social media, messaging apps, and dark web forums |
| Indoctrination | Deep immersion in extremist ideology; online mentors and peer networks reinforce beliefs; echo chambers and algorithm-driven content amplify radical views |
| Action | Individual commits or plans to commit a violent act; may act alone (lone wolf) or join an organised group |
Key Threats in India
| Threat | Detail |
|---|---|
| ISIS recruitment | India has seen cases of individuals being radicalised online by ISIS; over 100 Indians reportedly travelled to Iraq/Syria between 2014 and 2017; NIA has arrested multiple ISIS-inspired cells |
| Social media propaganda | Platforms like Telegram, encrypted messaging apps, and dark web channels used for disseminating extremist content and coordinating operations |
| Al-Qaeda in the Indian Subcontinent (AQIS) | Established in 2014; seeks to recruit from India, Bangladesh, and Myanmar |
| Right-wing and left-wing radicalisation | Online platforms also enable radicalisation across the ideological spectrum --- not limited to jihadi extremism |
Deepfakes and AI-Generated Threats
| Threat | Detail |
|---|---|
| Deepfake videos | AI-generated realistic videos of public figures used to spread disinformation; can incite communal violence or undermine democratic processes |
| AI-generated propaganda | Large language models and image generators can produce convincing propaganda at scale; lowering the technical barrier for extremist content creation |
| Automated recruitment | Chatbots and AI tools can engage potential recruits in personalised radicalisation dialogues |
| Challenge | Detection lags behind generation; current AI detection tools are imperfect and constantly evolving |
Lone Wolf Attacks
Concept
| Aspect | Detail |
|---|---|
| Definition | Violent attacks carried out by individuals acting alone, inspired by extremist ideology but without direct operational guidance from an organised group |
| Motivation | Ideological radicalisation (often online), personal grievances, or psychological factors |
| Examples globally | Christchurch mosque shootings (New Zealand, 2019), Orlando nightclub shooting (US, 2016), Nice truck attack (France, 2016) |
| Detection challenge | Lone wolves are extremely difficult to detect through conventional intelligence methods because they operate outside organisational structures and communication networks |
India's Vulnerability
| Factor | Detail |
|---|---|
| Large digital population | Over 800 million internet users; extensive social media penetration creates a large potential audience for radicalisation |
| Communal tensions | Periodic communal incidents can provide the emotional trigger for lone wolf actions |
| Precedents | Multiple NIA cases have involved individuals self-radicalised through online content, planning attacks without direct organisational links |
| Soft targets | Public spaces, religious sites, tourist destinations, and transport infrastructure are vulnerable to lone wolf attacks |
Information Warfare and Fake News as Security Threats
Dimensions
| Dimension | Detail |
|---|---|
| State-sponsored disinformation | Foreign states use social media bots, troll farms, and deepfakes to spread divisive narratives in India; aim to polarise society and undermine institutions |
| Communal disinformation | Fake news and manipulated images circulated on WhatsApp and social media have triggered mob violence and lynchings |
| Election interference | Fake news campaigns targeting electoral processes; concerns about AI-generated deepfakes during election seasons |
| Cognitive warfare | Systematic efforts to manipulate public perception and decision-making through targeted information operations |
India's Response to Fake News
| Measure | Detail |
|---|---|
| IT Act provisions | Section 69A of the IT Act, 2000 allows blocking of online content; intermediary guidelines (2021) require social media platforms to identify the first originator of messages |
| PIB Fact Check Unit | Government established a fact-check unit under the Press Information Bureau |
| Social media regulation | IT (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 mandate due diligence by social media platforms |
| Digital Personal Data Protection Act, 2023 | Provides a framework for data protection that indirectly helps address data-driven disinformation |
India's Counter-Radicalisation Framework
Legal Framework
| Law | Role |
|---|---|
| UAPA (Unlawful Activities Prevention Act), 1967 | Primary anti-terror law; amended multiple times (most recently 2019); allows designation of individuals as terrorists; empowers NIA to seize properties of banned organisations |
| UAPA 2019 amendments | Key changes: allows Central Government to designate individuals (not just organisations) as terrorists; NIA empowered to attach properties without prior permission of DGP |
| National Security Act (NSA), 1980 | Allows preventive detention for up to 12 months |
| IT Act, 2000 (Section 66A repealed; Section 69A active) | Government can block online content in the interest of national security |
Institutional Framework
| Body | Role |
|---|---|
| NIA (National Investigation Agency) | India's primary counter-terrorism investigation agency; established after 26/11 (2008); has pan-India jurisdiction |
| CTCR Division | Counter Terrorism and Counter Radicalization Division under MHA; policy formulation, coordination, and implementation |
| Multi-Agency Centre (MAC) | Intelligence-sharing platform operated by the Intelligence Bureau (IB); 24/7 operations for real-time intelligence sharing among central and state agencies |
| NATGRID | National Intelligence Grid; integrates databases of multiple security agencies for pattern analysis and counter-terrorism |
| NCTC (proposed) | National Counter Terrorism Centre; proposed after 26/11 but never established due to state opposition (concerns over federal balance) |
PRAHAAR Policy Framework (2026)
| Feature | Detail |
|---|---|
| Full form | Seven pillars: Prevention, Response, Aggregation of capacities, Human rights and rule of law, Attenuation of radicalisation, Aligning international alignment, Recovery |
| Nature | India's first published comprehensive counter-terrorism policy document (released February 2026) |
| Key features | Integrates intelligence-led prevention, inter-agency coordination, cyber-threat management, counter-radicalisation, and post-attack recovery into a single policy architecture |
| Community engagement | Emphasises engagement with community and religious leaders, moderate voices, and NGOs to counter radicalisation at the grassroots level |
De-Radicalisation Programmes
| Programme | Detail |
|---|---|
| Community engagement | Religious leaders, moderate preachers, and NGOs engaged to spread awareness about consequences of radicalisation |
| Youth engagement | Constructive engagement of youth through education, sports, skill development, and employment programmes |
| Rehabilitation | State-level de-radicalisation programmes (Maharashtra's anti-radicalisation cell; Kerala's counter-radicalisation programme) |
| Surrender and rehabilitation policies | Multiple states have surrender policies for insurgents/militants offering stipends, training, and reintegration support |
For Mains: India's counter-radicalisation approach combines legal measures (UAPA, NIA), institutional mechanisms (MAC, NATGRID), and community engagement. The PRAHAAR policy (2026) represents a shift from a reactive, incident-based approach to a comprehensive, preventive framework. For answer writing, emphasise the need for a "whole-of-society" approach that addresses root causes (socioeconomic marginalisation, identity grievances) alongside security measures.
Operation Sindoor (2025) --- Case Study in India's Evolving Response
| Aspect | Detail |
|---|---|
| Trigger | Pahalgam terror attack (22 April 2025) targeting tourists at Baisaran meadow in J&K |
| Response | India launched Operation Sindoor in May 2025, targeting terror infrastructure in Pakistan and PoJK |
| Significance | Represents a further escalation in India's response ladder --- from diplomatic protests (pre-2016) to surgical strikes (2016), airstrikes (Balakot 2019), to comprehensive military operations |
| Diplomatic context | India framed the operation as a counter-terrorism action against non-state actors; international community's response was mixed |
| Implications | Demonstrates India's willingness to use kinetic force against proxy war infrastructure; raises the escalation calculus for Pakistan-sponsored terrorism |
Narco-Terrorism and Drone Threats
Drug-Terror Nexus
| Aspect | Detail |
|---|---|
| Concept | Narco-terrorism involves the use of drug trafficking to finance terrorist operations; creates a symbiotic relationship between drug cartels and terror groups |
| Pakistan border | Drones from Pakistan drop drugs (heroin, synthetic drugs) and arms along the Punjab and J&K borders; over 300 drone incursions detected in 2023-24 |
| Golden Crescent | Afghanistan-Pakistan-Iran triangle; world's largest opium producer; heroin from this region reaches India via maritime and land routes |
| India's response | Anti-drone systems deployed along the western border; BSF authorised to shoot down drones; laser-based anti-drone systems under procurement |
Weaponised Drones
| Threat | Detail |
|---|---|
| Payload delivery | Commercial drones modified to drop weapons, drugs, and explosives across borders |
| Jammu airbase attack (2021) | Two drones dropped explosives on the IAF station in Jammu --- first drone attack on a military installation in India |
| Counter-measures | Anti-drone dome systems, RF jammers, directed energy weapons, and integrated air defence systems being deployed at critical installations |
Cyber-Enabled Terrorism
| Dimension | Detail |
|---|---|
| Dark web | Encrypted platforms used for arms trade, terror financing, and coordination; difficult to monitor |
| Cryptocurrency | Bitcoin and other cryptocurrencies used for anonymous terror financing; India has been strengthening PMLA provisions to cover virtual digital assets |
| Encrypted communications | End-to-end encryption on platforms like Signal and Telegram complicates intelligence interception; debate over "lawful access" vs privacy |
| Critical infrastructure attacks | Hospitals, power grids, banking systems vulnerable to cyber attacks linked to state-sponsored terror groups; India's CERT-In monitors and responds |
International Cooperation on Counter-Terrorism
| Framework | Detail |
|---|---|
| FATF (Financial Action Task Force) | Global body setting standards against money laundering and terrorist financing; Pakistan was on the FATF Grey List (2018-2022); India uses FATF standards to strengthen its AML/CFT framework |
| UN Counter-Terrorism Committee | India chairs/participates in UN CTC proceedings; advocates for a Comprehensive Convention on International Terrorism (CCIT), proposed by India in 1996 |
| No Money for Terror (NMFT) | India hosted the 3rd NMFT Ministerial Conference in November 2022; focuses on cutting terror financing |
| Bilateral cooperation | India has counter-terrorism cooperation agreements with US, France, UK, Israel, and several other countries; joint exercises, intelligence sharing, and technology transfer |
Mains Previous Year Question Themes
Common UPSC Mains themes on proxy war and hybrid threats:
- "What is hybrid warfare? Discuss the challenges it poses to India's internal security."
- "Discuss the evolving nature of Pakistan-sponsored proxy war against India."
- "Examine the threat of online radicalisation in India. What steps has the government taken?"
- "Discuss the role of social media in radicalisation and suggest counter-measures."
- "What are lone wolf attacks? Why are they difficult to prevent?"
- "Critically examine India's legal framework for counter-terrorism."
- "Discuss the implications of drone technology for India's border security."
Key Terms for Quick Revision
| Term | Meaning |
|---|---|
| Proxy war | Conflict where a state uses non-state actors to fight on its behalf; Pakistan-sponsored terrorism in India is the primary example |
| Hybrid warfare | Blending of military, cyber, information, and economic operations below the threshold of conventional war |
| Grey zone | The space between peace and war; hybrid operations are designed to remain in this zone |
| Lone wolf | Individual acting alone, inspired by extremist ideology, without direct organisational guidance |
| Radicalisation | Process by which an individual adopts extreme views and is willing to use violence to achieve ideological goals |
| UAPA | Unlawful Activities (Prevention) Act, 1967; India's primary anti-terror legislation |
| NIA | National Investigation Agency; established 2008 post-26/11; pan-India counter-terrorism jurisdiction |
| MAC | Multi-Agency Centre; IB-operated intelligence-sharing platform |
| NATGRID | National Intelligence Grid; integrates databases of security agencies |
| PRAHAAR | India's comprehensive counter-terrorism policy framework (2026); seven-pillar approach |
| Deepfake | AI-generated synthetic media (video, audio) designed to appear authentic; used for disinformation and propaganda |
| Dark web | Encrypted portion of the internet accessible through special browsers (Tor); used for illegal activities including terror financing and arms trade |
Exam Strategy
For Mains Answer Writing: Questions on proxy war and hybrid threats require a structured approach. Start with the evolving nature of threats (from conventional proxy war to multi-domain hybrid operations), discuss specific examples (Pakistan-sponsored terrorism, Russia-Ukraine lessons), explain India's legal and institutional framework (UAPA, NIA, NATGRID), and conclude with the way forward (PRAHAAR framework, community engagement, AI-based detection). Always distinguish between radicalisation, de-radicalisation, and counter-radicalisation in your answers.
For Prelims: Focus on UAPA (1967, amended 2019), NIA (established 2008), NATGRID (intelligence grid), PRAHAAR (counter-terrorism policy 2026), and the distinction between proxy war and hybrid warfare. Key attack dates: Parliament attack (2001), 26/11 (2008), Uri (September 2016), Pulwama (February 2019), and Pahalgam (April 2025).
For current affairs on security threats, counter-terrorism operations, and policy developments, visit Ujiyari.com.
BharatNotes