External State & Non-State Actors

External State & Non-State Actors | Legacy IAS GS3
GS Paper III · Internal Security · Unit 2 · April 2026

🌐 Role of External State & Non-State Actors

State-Sponsored Terrorism · Pakistan's Proxy War · China's Strategic Threat · Terrorism — ISIS, Al-Qaeda, Taliban · Drone Threat · Grey-Zone Warfare · OGWs · Sleeper Cells · Diaspora · India's Counter-Strategy · Operation Sindoor

🧭
Exam Compass — How to Approach Unit 2
What UPSC tests · Key distinctions · Must-know frameworks · Recent current affairs
🎯 What UPSC Wants
  • Distinguish state actors (Pakistan, China) from non-state actors (LeT, JeM, ISIS, Al-Qaeda)
  • Analyse how external actors create internal security challenges — not just border threats
  • Show knowledge of emerging threats: drones, grey-zone warfare, cyber, sleeper cells, diaspora radicalisation
  • Evaluate India's multi-pronged counter-strategy — legal, institutional, diplomatic, kinetic
  • Use Operation Sindoor (2025) as a current example of India's shift from strategic restraint to assertive posture
  • ⚠️ High-Value Distinctions
  • State Actor vs VNSA: State = Pakistan/China (government-directed). VNSA = LeT, JeM, ISIS (non-governmental but may have state support)
  • Proxy War vs Direct Conflict: Pakistan uses LeT/JeM to "bleed India with a thousand cuts" without direct war
  • OGW vs Sleeper Cell: OGW = above-ground logistical supporter. Sleeper Cell = dormant operative waiting for activation
  • Grey-Zone vs Conventional War: Grey-zone = coercive actions below the threshold of war (salami slicing, cyber, disinformation)
  • 📌 The Core Analytical Frame — Use in Every Answer External actors threaten India's internal security through four channels: (1) Direct violence (terror attacks, border incidents), (2) Economic warfare (FICN, narco-trafficking, trade coercion), (3) Information warfare (disinformation, radicalisation, propaganda), and (4) Proxy actors (insurgent groups, Over-Ground Workers, sleeper cells). A complete answer addresses all four channels, not just attacks.
    📌
    External Threats — The Big Picture
    State Actors vs Violent Non-State Actors · How They Create Internal Challenges
    🏛️ External State Actors
  • Pakistan — State-sponsored terrorism; ISI directs LeT, JeM, TRF; proxy war; FICN; narco-trafficking; radicalisation of J&K youth
  • China — Grey-zone warfare; salami slicing; cyber operations; support to NE insurgent groups; String of Pearls; CPEC through PoK; economic coercion
  • Other Neighbours — Myanmar (arms flow to NE groups, Rohingya influx); Bangladesh (illegal migration); Nepal/Bhutan (open border misuse by ISI, smugglers)
  • 💥 Violent Non-State Actors (VNSAs)
  • Terrorist Organisations — LeT, JeM, TRF (Pakistan-backed); ISIS, Al-Qaeda (global jihad; online recruitment of Indian youth); Taliban (Afghanistan spillover)
  • Insurgent Groups — NSCN-IM, ULFA, PLA (NE India); CPI(Maoist) (LWE)
  • Cyber Criminals & Hackers — State-sponsored hacking groups; ransomware; data espionage
  • Drug Cartels & Smugglers — Golden Crescent (Af-Pak-Iran) drug routes into India; FICN networks; hawala funding chains
  • 🔑 Key Definition — VNSA A Violent Non-State Actor (VNSA) is an organised group that uses violence to pursue political goals but is not part of any official state structure. They may be state-sponsored (like LeT by Pakistan's ISI) or independent (like ISIS). The defining feature: they create internal security threats without triggering the formal laws of inter-state war — giving their state-sponsors "plausible deniability."
    🇵🇰
    Pakistan — The Epicentre of State-Sponsored Terrorism
    "Bleeding India with a Thousand Cuts" · ISI · LeT · JeM · FICN · Narco-Terror · Operation Sindoor
    🎯 Core Concept — Asymmetric Proxy War After failing in three conventional wars, Pakistan adopted a state policy of low-cost proxy warfare — famously described as "bleeding India with a thousand cuts." The strategy: use non-state actors to inflict continuous damage on India's security, economy, and social fabric without triggering direct military conflict. This asymmetric calculus offers Pakistan plausible deniability while achieving strategic disruption at minimal cost. (The 9/11 attacks cost ~$500,000 to execute but caused $73 billion in direct US damages — illustrating terrorism's cost-benefit asymmetry.)
    Pakistan's Multi-Front Strategy Against IndiaState-Sponsored
    The Deep State & ISI
    The "Deep State" — a nexus of Pakistan's military and intelligence agencies — orchestrates the proxy war. Inter-Services Intelligence (ISI) is the primary agency: funding, training, and arming terror groups that target India. Key groups cultivated as strategic assets: Lashkar-e-Taiba (LeT), Jaish-e-Mohammed (JeM), The Resistance Front (TRF).
    Terror Proxies
    LeT and JeM operate with impunity from Pakistani soil. Responsible for: 2001 Parliament Attack, 26/11 Mumbai Attacks (2008), 2019 Pulwama suicide bombing, 2025 Pahalgam massacre (26 Hindu and Christian tourists killed; TRF — LeT front — claimed responsibility). These groups are ISI's "strategic assets" — maintained as instruments of coercive foreign policy.
    Destabilising J&K
    Pakistan's core Kashmir strategy: radicalising local youth, infiltrating foreign terrorists across the LoC, funding and arming separatist/militant groups, and ensuring constant personnel replacement to sustain the insurgency. Post-2019 (Article 370 abrogation), Pakistan shifted to targeting civilians — particularly tourists — to create communal polarisation.
    Economic Warfare
    FICN (Fake Indian Currency Notes): High-quality counterfeit Indian currency pushed through ISI-linked networks to finance terrorism and disrupt the economy. Narco-trafficking: Pakistan leverages proximity to the "Golden Crescent" (Afghanistan-Pakistan-Iran) — the world's largest opium-producing region — to facilitate drug smuggling into India, generating terror funding through narco-terrorism.
    Information Warfare
    Radicalisation of Indian Muslims through social media, madrasas with extremist content, and online platforms. Disinformation campaigns to inflame communal tensions, especially around J&K narratives. Financing of separatist media and political narratives through hawala networks to maintain anti-India sentiment.
    📋 Key Terror Attacks — Pakistan-Linked
    2001
    Parliament Attack — JeM + LeT attacked India's Parliament. 14 killed including attackers. Led to Operation Parakram — near-war mobilisation.
    2008
    26/11 Mumbai Attacks — 10 LeT fidayeen from Pakistan killed 166 people across 12 coordinated strikes including Taj Hotel, CST, Chabad House. ISI involvement confirmed. Led to post-26/11 coastal security overhaul.
    2016
    Uri Attack — JeM attacked Army camp in Uri, J&K — 19 soldiers killed. India responded with Surgical Strikes across LoC — marking shift from strategic restraint to assertive posture.
    2019
    Pulwama Attack — JeM suicide bomber killed 40 CRPF personnel in convoy. India retaliated with Balakot Airstrikes — first strike on Pakistani territory since 1971 war.
    2025
    Pahalgam Massacre — TRF (LeT front) killed 26 tourists (25 Hindu, 1 Christian) in Pahalgam after separating them by religion. India launched Operation Sindoor (May 7, 2025) — strikes on 9 terror camps in Pakistan and PoK including LeT's Muridke HQ and JeM's Bahawalpur HQ.
    🔍 FATF's Economic Pressure — Effective Tool FATF's grey-listing of Pakistan (2018–2022) inflicted an estimated $38 billion in economic pain. Under this pressure, Pakistan convicted Hafiz Saeed on terror financing charges. Despite China providing diplomatic cover at FATF, this exemplifies how global financial pressure can compel even reluctant states to act against terrorist financing. India actively used FATF as a multilateral lever against Pakistan — a key example of economic counter-terrorism.
    🇨🇳
    China — Multi-Dimensional Strategic Threat
    Grey-Zone Warfare · Salami Slicing · Cyber Operations · NE Support · String of Pearls · CPEC
    🎯 Core Concept — Multi-Domain, Long-Term Containment China's challenge to India is strategic, long-term, and multi-dimensional — aimed at containing India's rise and undermining its stability. Unlike Pakistan's direct terror sponsorship, China works through a broader spectrum: military coercion, cyber operations, economic leverage, insurgent support, and maritime encirclement — all designed to keep India preoccupied internally while China expands regionally.
    China's Five-Dimensional Threat to India's SecurityStrategic
    Military & Border
    Grey-Zone Warfare on LAC: "Salami Slicing" — gradual territorial capture through minor transgressions and infrastructure construction in disputed areas. Aggressive patrolling, standoffs. Key incidents: Doklam (2017), Galwan Valley (2020) — deadliest confrontation in decades, 20 Indian soldiers killed. China's defence budget: $245 billion (2025). High-altitude warfare capabilities, rapid LAC infrastructure enabling swift troop mobilisation.
    Two-Front Challenge
    China-Pakistan "all-weather strategic nexus" amplifies the threat. CPEC (China-Pakistan Economic Corridor) passes through PoK — directly undermines India's sovereignty while cementing strategic encirclement. India faces the unique challenge of managing two nuclear-armed adversaries who coordinate against it.
    Cyber & Hybrid
    Chinese state-linked hacking groups conduct cyber operations against India's critical infrastructure, government agencies, financial institutions, and media. Hybrid warfare: combines cyberattacks with disinformation campaigns and proxy actor support to destabilise India's internal environment. Data espionage through Chinese apps and telecom hardware (backdoor access concerns).
    Economic Coercion
    India's dependence on Chinese imports in electronics, telecom, and APIs (Active Pharmaceutical Ingredients) creates strategic vulnerability. Beijing can weaponise this dependency. Chinese firms and apps implicated in collecting personal/strategic data. Shell company networks used for economic espionage and influencing Indian firms through investments.
    Insurgent Support
    China has a documented history of providing arms, training, financial support, and sanctuary to NE India insurgent groups — NSCN, Mizo, Meitei, ULFA outfits — as leverage to keep the region destabilised. Also believed to provide ideological, moral, and financial support to CPI (Maoist) groups, leveraging shared Maoist ideology to brew internal challenges.
    Maritime Encirclement
    "String of Pearls": China develops ports and naval facilities along key maritime trade routes — Sri Lanka (Hambantota), Pakistan (Gwadar), Myanmar — to encircle India and threaten sea lanes of communication. India's counter: "Necklace of Diamonds" — ports at Chabahar (Iran), Sittwe (Myanmar), Duqm (Oman), Agalega (Mauritius) + QUAD partnerships.
    🗺️
    Spillover Threats from Other Neighbours
    Myanmar · Bangladesh · Nepal · Bhutan — Porous Borders, Instability, and Misuse
    🔍 Key Analytical Point Spillover threats are not necessarily state-sponsored action — they arise as a direct result of internal instability and weak governance in neighbouring countries. India has limited leverage over these because the threat-generating state may not even control the threat actors.
    🇲🇲 Myanmar — Porous Border & Arms Flow
    1,643 km porous border with dense forest = safe havens and operational bases for NE insurgent groups. Military coup (2021) worsened security — the Chin National Army (CNA) operates near the Indian border, facilitating arms trafficking to NE groups. Rohingya refugees: influx poses radicalization concerns. India's response: Scrapped Free Movement Regime (FMR); began fencing the border.
    🇧🇩 Bangladesh — Migration & Past Sanctuaries
    Despite improved security cooperation, large-scale illegal migration continues — demographic changes and ethnic tensions in Assam and West Bengal. Historical issue: ULFA used Bangladesh as a sanctuary (now cracked down on). Post-2024 political change in Bangladesh requires careful monitoring of whether previous security cooperation is sustained.
    🇳🇵🇧🇹 Nepal & Bhutan — Open Border Misuse
    Open borders symbolise friendship but are misused as transit routes for terrorists, criminals, and smugglers. ISI exploits this vulnerability: IC-814 hijacking (1999, originated from Nepal); Yasin Bhatkal (Indian Mujahideen) caught at India-Nepal border (2013). FICN and narcotics also transit through these routes.
    💥
    Non-State Actors — Terrorism in the Indian Context
    Defining Terrorism · Types · ISIS/Al-Qaeda/Taliban · Khalistan · Two-Front War
    📖 Defining Terrorism — The Challenge Terrorism resists a universal definition — "one person's terrorist is another person's freedom fighter." Key frameworks:
    UNGA Resolution 49/60 (1994): Criminalises acts "intended to provoke a state of terror in the general public for political purposes" — without giving ideological justification
    Bharatiya Nyaya Sanhita (BNS), 2023: Classifies a terrorist act as "any act intended to threaten the unity, integrity, sovereignty, or economic security of India, or to strike terror in the people, typically involving violence for ideological or social objectives"
    • India's UAPA: Allows designation of organisations AND individuals as terrorists (amended 2019)
    🌍 Terrorism Classifications in the Indian Context
    India's Two-Front War on TerrorStrategic Framework
    Front 1: Pakistan-Backed
    Primary internal threat: LeT, JeM, TRF, Hizbul Mujahideen — state-sponsored, ISI-directed, J&K-focused. Tactics: fidayeen attacks, IED blasts, targeted killings, radicalisation of local youth, infiltration across LoC, OGW networks, sleeper cells. Now increasingly targeting civilians for communal polarisation rather than military targets.
    Front 2: Global Jihad
    ISIS, Al-Qaeda, Taliban: Use online radicalisation to recruit Indian youth. ISIS operates through social media, encrypted apps, and online magazines to inspire "lone wolf" attacks. Estimated social media plays a role in up to 90% of radicalisation cases. India has seen ISIS-linked sleeper cells (e.g., 2025: NIA arrested two Indians linked to ISIS bomb-making workshops). Al-Qaeda in Indian Subcontinent (AQIS) targets Indian Muslims.
    Khalistan
    Largely suppressed within India but gaining momentum through diaspora support in Canada, UK, Australia. Online radicalisation funds pro-Khalistan violence. Khalistani groups — Sikhs for Justice, Babbar Khalsa — operate from abroad, exploiting liberal democratic freedoms in host countries. Key challenge: India-Canada diplomatic tensions (2023-24) over Canadian government's reluctance to act against Khalistani elements.
    Northeast Insurgency
    NE groups (NSCN-IM, ULFA, PLA in Manipur) use Myanmar's porous border and China's historical support. Now aided by arms smuggling from Myanmar conflict zones (CNA territory). Many groups in peace talks (Naga peace process, Bodo agreement 2020) — but Manipur ethnic violence (Meitei-Kuki conflict) represents a new fault line exploitable by external actors.
    💻 Drug Cartels, Smugglers & Narco-Terror
    💊 Golden Crescent Route
    Afghanistan-Pakistan-Iran = world's largest opium/heroin producing region. Narco-terrorism: drug money funds LeT, JeM operations. Punjab and J&K are primary entry points. Pakistan's ISI uses narco-trafficking as economic warfare — simultaneously addicting Indian youth and generating terror funding. Drug mules also carry FICN and explosives.
    💵 FICN & Hawala Networks
    Fake Indian Currency Notes of ₹500 and ₹2000 denomination (pre-demonetisation) printed in Pakistan with ISI backing. Pushed through Nepal, Bangladesh, and Gulf routes. Hawala networks — value transfer without physical currency movement — fund both terrorism and FICN operations. Banned under PMLA and FEMA. 26/11 Mumbai attack was financed through Hawala from Pakistan.
    🆕
    The Modern Playbook of Terrorism
    Technology as Weapon · Drones · Urban Terror · OGWs · Sleeper Cells · Grey-Zone Warfare · Diaspora Radicalisation
    📌 UPSC Specifically Tests This UPSC has increasingly asked about emerging and non-traditional threats — drones, OGWs, sleeper cells, grey-zone warfare, lone wolf attacks. This section contains the most examinable new content for 2026.
    🌐 Technology as a Weapon — The Digital Battlefield
    Propaganda & Recruitment: Social media + encrypted apps spread extremist ideology. High-quality videos, online magazines, AI-generated deepfakes justify violence and recruit youth. Social media plays a role in up to 90% of radicalisation cases.

    Financing: Online payment systems, cryptocurrencies (Bitcoin) — used by ISIS — allow terror financing that evades state monitoring (anonymous, decentralised, global reach).

    Planning & Coordination: Encrypted communication allows cells across continents to plan attacks securely. Online manuals provide bomb-making and counter-intelligence instructions.

    Deepfakes & AI Content: AI-generated videos to defame public figures, fabricate evidence, incite social unrest — making it harder to distinguish fact from fiction.
    🚁 The Drone/UAV Threat — New Dimension
    Cross-Border Smuggling: Pakistan increasingly uses low-cost drones to smuggle arms, ammunition, and narcotics into Punjab and J&K. Small size + low altitude = difficult to detect with conventional radar.

    Weaponised Drones: Drones modified with IEDs can target security installations, critical infrastructure, public gatherings.

    Operation Sindoor (2025): First conflict between India-Pakistan where drones played a central, coordinated role. India used SkyStriker suicide drones and Israeli Harop drones. Pakistan launched 300-400 drones (Turkish Asisguard Songar) from 36 locations in Operation Bunyan al-Marsus.

    India's Counter-Drone Systems: D4 System (DRDO+BEL), VSHORAD missile system, S-400, Barak-8 MRSAM, Akash, Integrated Counter-UAS Grid. ARDTC (MHA) evaluates and certifies counter-drone tech.
    🏙️ Urban Terrorism & Lone Wolf Attacks
    Why Cities? Anonymity in dense populations; logistical ease (transport, communication, arms); high-impact targets (critical infrastructure, mass gatherings, landmarks); media amplification maximises fear.

    Lone Wolf Terrorism: Individuals radicalized in isolation, acting without group support — extremely difficult to detect. Recent India cases:
    Coimbatore car explosion (Oct 2022) near a temple — single attacker, homemade bombs
    Bengaluru Rameshwaram Café IED blast (Mar 2024) — single attacker, minimal external support

    These lone wolves are fueled by online extremist content and represent a major intelligence challenge — no group to infiltrate, no communication to intercept.
    👁️ OGWs & Sleeper Cells — The Invisible Ecosystem
    Over-Ground Workers (OGWs): Not armed combatants, but the logistical and ideological backbone of terrorism. OGWs are the "eyes and ears" — providing safe houses, food, transport, information to active terrorists. They blend into civilian life, making detection difficult. OGW networks are what make large-scale attacks like 26/11 possible — without them, fidayeen cannot operate.

    Sleeper Cells: Dormant operatives embedded in civilian life — waiting for activation by handlers across borders. Use encrypted communication, long-term planning. 2025 example: NIA arrested two Indians linked to an ISIS module conducting bomb-making workshops. Extremely difficult to detect because members fully integrate into local communities.
    🌫️ Grey-Zone Warfare — Below the Threshold of War
    Definition: Use of unconventional tactics that fall just below the threshold of traditional war — weakening an adversary without triggering a full military response.

    Key Tools used against India:
    Cyber operations: attacks on critical infrastructure (power grids, banking, healthcare)
    Disinformation campaigns: fake news, social discord, polarisation
    Proxy actors: state-supported but deniable groups (LeT for Pakistan; NE insurgents for China)
    Economic coercion: trade manipulation, supply chain weaponization
    Salami slicing (China on LAC): gradual territorial encroachment below war threshold

    India's challenge: conventional military doctrine is poorly suited to grey-zone threats that require intelligence, cyber, diplomatic, and economic responses simultaneously.
    🌍 Diaspora Radicalisation — Khalistan & Beyond
    Khalistan Movement: Largely suppressed within India but resurgent through diaspora support in Canada, UK, Australia. Online radicalisation, foreign funding, and exploitation of liberal democratic freedoms in host countries.

    Key groups: Sikhs for Justice (banned in India), Babbar Khalsa International. India-Canada tensions (2023-24) over Hardeep Singh Nijjar killing highlight the diplomatic dimension of diaspora-based terrorism.

    ISIS Diaspora Angle: Indian youth in Gulf countries and beyond recruited online into ISIS networks — "virtual planners" coordinate with sleeper cells inside India via encrypted platforms without ever entering the country.
    🛡️
    India's Multi-Pronged Counter-Strategy
    Legal · Institutional · Diplomatic · Economic · Military · Kinetic
    📌 Answer Structure for Counter-Strategy Questions Organise India's counter-strategy across five domains: (1) Legal & institutional framework, (2) Intelligence & border management, (3) Military & kinetic responses, (4) Diplomatic & multilateral, (5) Counter-financing. UPSC rewards breadth — an answer that only mentions military strikes will score poorly.
    ⚖️ Legal & Institutional Framework
    UAPA (amended 2019): Empowers GoI to designate individuals (not just organisations) as terrorists. Enables preventive detention and asset seizure.
    NIA Act (amended 2019): Enables NIA to investigate terror crimes outside India — global jurisdiction.
    BNS 2023: Modernised terrorism definition and penalties.
    NIA (National Investigation Agency): Premier agency for inter-state and international terror crimes.
    NATGRID: National Intelligence Grid — centralised, integrated security database for real-time intelligence sharing across agencies.
    🔍 Intelligence & Border Management
    MAC (Multi-Agency Centre): Real-time intelligence sharing between IB, RAW, military, state police.
    CIBMS (Comprehensive Integrated Border Management System): Smart fence with sensors, cameras, night-vision along sensitive borders.
    NATGRID: Integrates 21 sets of databases for terror tracking.
    Indo-Myanmar border fencing: Scrapping FMR + border fencing to check arms smuggling and insurgent movement.
    Coastal security overhaul post-26/11: National Command Control Communication Intelligence Network (NC3I); Marine Police, Coast Guard, Navy coordination.
    ⚔️ Military & Kinetic Responses
    Surgical Strikes (2016): Indian Special Forces crossed LoC to destroy terror launch pads in PoK — response to Uri attack. First public acknowledgement of cross-LoC strike — signalled end of pure strategic restraint.
    Balakot Airstrikes (2019): IAF strike on JeM training camp in Balakot (inside Pakistan) — first strike on Pakistani territory since 1971.
    Operation Sindoor (2025): 9 terror camps struck in Pakistan/PoK — including LeT's Muridke HQ and JeM's Bahawalpur HQ. Drone warfare debut. India's new security doctrine formalised.
    🌐 Diplomatic & Multilateral
    FATF: India pushed for Pakistan's grey-listing (2018-2022, $38B economic impact). Advocates for CCIT (Comprehensive Convention on International Terrorism) at UN to criminalise all forms of international terrorism.
    SCO-RATS: Regional Anti-Terrorist Structure of Shanghai Cooperation Organisation — multilateral counter-terrorism coordination.
    QUAD: India-USA-Japan-Australia security partnership — counters China's maritime expansion.
    Bilateral agreements with key partners (USA, Israel, France, Russia) for intelligence sharing and counter-terrorism cooperation.
    💰 Counter-Terror Financing
    PMLA (Prevention of Money Laundering Act): Financial tracking to choke terror financing. ED conducts asset attachments under PMLA against terror-linked entities.
    FIU-IND (Financial Intelligence Unit): Analyses and disseminates financial intelligence; coordinates with FATF.
    NMFT (No Money for Terror): India hosted the Ministerial Conference (2022, New Delhi) to build global consensus on disrupting terror financing.
    Terror Funding & Fake Currency Cell: Constituted within NIA for focused investigation.
    🧠 Counter-Radicalisation (CVE)
    Countering Violent Extremism (CVE): De-radicalisation programs, counselling of youth identified as vulnerable to online radicalisation.
    Social media monitoring: MHA and state police monitor platforms for radicalising content; coordination with platforms for takedown.
    Community policing — building trust between minority communities and police to create early warning systems.
    Operation Sindoor aftermath: Curbing Pakistan-linked disinformation during the conflict — platforms asked to block 8,000+ accounts.
    ⚔️
    Operation Sindoor (May 2025) — India's Strategic Shift
    Pahalgam → Sindoor → New Security Doctrine · End of Strategic Restraint · Drone War
    🚨 Most Important Current Affairs for UPSC 2026 Operation Sindoor (May 2025) is the single most important internal/external security current event for UPSC 2026. It represents a paradigm shift in India's security doctrine and will likely feature directly or indirectly in GS3 Mains. Know the trigger, response, doctrine, and implications cold.
    Operation Sindoor — Complete PictureCurrent Affairs 2025
    Trigger
    Pahalgam Massacre (April 22, 2025): TRF (LeT front) militants separated tourists by religion in Pahalgam, J&K — killed 25 Hindu and 1 Christian tourists. Religion-based targeting designed to spark communal polarisation within India and internationally signal Pakistan's communal agenda.
    India's Response
    Operation Sindoor launched May 7, 2025. Indian fighter jets used advanced stand-off weapons to strike 9 terror camps in Pakistan and PoK. Key targets: Muridke (LeT HQ, near Lahore), Bahawalpur (JeM HQ), and 7 other operational hubs. SkyStriker kamikaze drones used in initial assault. Israeli Harop drones later used to destroy Pakistani air defence and radar sites.
    Drone War
    First India-Pakistan conflict where unmanned systems played a central, coordinated role — marking a new chapter in modern warfare. Pakistan's counter-attack ("Operation Bunyan al-Marsus"): launched 300-400 Turkish Asisguard Songar drones from 36 locations targeting Indian military across J&K, Punjab, Rajasthan, Gujarat. India's Integrated Counter-UAS Grid — S-400, Barak-8 MRSAM, Akash, Harpy — neutralised the threat.
    New Doctrine (2025)
    PM Modi outlined India's New Security Doctrine — 3 Pillars:
    Decisive Retaliation: Swift, forceful response to terrorism — nuclear blackmail not accepted
    No Distinction: Terror and state sponsoring terrorism treated equally — "redlines" established
    Cold Start in Action: Precise conventional strikes inside Pakistan without nuclear escalation

    NSA confirmed: "State-sponsored terrorism is an act of war." End of the era of strategic restraint formalised.
    Significance
    Operational Sindoor marks India's progression: Uri → Surgical Strikes (2016) → Balakot Airstrikes (2019) → Operation Sindoor (2025, deepest strike inside Pakistan). Each step has pushed India's response further into Pakistani territory. International community mostly supported India's right to self-defence. China's role as Pakistan's shield at UNSC was again visible — reinforcing the China-Pakistan strategic nexus.
    📝
    UPSC Mains PYQs & Probable Questions 2026
    All External Actors PYQs · Answer Frameworks · 4 Probable Qs
    📌 Previous Year Questions — External Actors & Terrorism
    GS Paper 3 — Relevant PYQsKey PYQs
    2021 ⭐⭐
    10 Marks Analyse the multidimensional challenges posed by external state and non-state actors to India's internal security. Also discuss India's response to these challenges.
    2021 ⭐
    10 Marks Assess the emerging challenges to internal security in India with focus on the role of social media in facilitating radicalization.
    2019 ⭐⭐
    15 Marks What are the determinants of left-wing extremism in the eastern part of India? What strategy should the Government of India, civil administration, and security forces adopt to counter the threat?
    2018 ⭐
    10 Marks Discuss the role of the government in controlling the arms trafficking across the border with Myanmar.
    2016 ⭐
    10 Marks The "Balakot strikes" have altered the parameters of India's security doctrine. Discuss. (Applicable to 2019 Balakot and extended to 2025 Op Sindoor context)
    2015 ⭐
    10 Marks The use of the internet and social media by non-state actors for subversive activities is a major threat to internal security. Analyze with examples and suggest counter-measures.
    🎯 Probable Questions — UPSC Mains 2026
    🎯 Probable Q1 — Pakistan's Proxy War (250W, 15M) ⭐⭐ Highest Probability
    "Pakistan's strategy of 'bleeding India with a thousand cuts' through state-sponsored terrorism poses a more complex challenge than conventional warfare." Critically examine Pakistan's proxy war strategy and evaluate India's evolving response, with special reference to Operation Sindoor (2025).
    Intro: Asymmetric calculus — 9/11 cost $500,000 to execute, caused $73B in direct damages. Pakistan's proxy war uses this calculus with plausible deniability through non-state actors.

    Pakistan's Multi-Front Strategy:
    • Deep State/ISI: Cultivates LeT, JeM, TRF as strategic assets
    • Attacks: Parliament (2001), 26/11 (2008), Uri (2016), Pulwama (2019), Pahalgam (2025)
    • Economic warfare: FICN (counterfeit currency), narco-trafficking (Golden Crescent)
    • J&K: Radicalisation, cross-LoC infiltration, OGW networks, civilian targeting post-2019
    • Information warfare: Disinformation, communal polarisation narratives

    India's Evolving Response — The Escalation Ladder:
    Pre-2016: Strategic restraint — diplomatic protests, dossiers to Pakistan
    2016: Surgical Strikes — acknowledged cross-LoC action (Uri response)
    2019: Balakot Airstrikes — struck inside Pakistani territory (Pulwama response)
    2025: Operation Sindoor — 9 terror camps in Pakistan/PoK including LeT HQ Muridke; drone war; new security doctrine

    New Security Doctrine (2025): Decisive retaliation; no distinction between terrorists and state sponsors; Cold Start doctrine operationalised; nuclear blackmail not accepted as constraint

    Legal & Diplomatic: UAPA (individual designation), NIA, NATGRID, FATF grey-listing ($38B impact on Pakistan), CCIT advocacy, SCO-RATS, bilateral intelligence sharing

    Way Forward: Sustained diplomatic isolation of Pakistan; stronger counter-financing (PMLA/ED); enhanced CVE programs; CIBMS for smart borders; CCIT at UN

    Conclusion: India has moved from absorbing terror attacks diplomatically to imposing clear costs. Operation Sindoor signals that "strategic restraint" is no longer the default — but lasting security requires simultaneously addressing the conditions that make Pakistan's proxy war effective: J&K's development deficit and global isolation of state terrorism.
    🎯 Probable Q2 — Modern Threats: Drones, OGWs, Grey-Zone (150W, 10M) ⭐⭐ High Probability
    "The modern playbook of terrorism has moved from conventional attacks to technology-enabled, below-threshold operations that challenge traditional security frameworks." Discuss the emerging security challenges facing India with special reference to drones, Over-Ground Workers, and grey-zone warfare.
    Intro: Modern terrorism is no longer just bombs and fidayeen — it is a sophisticated blend of technology, psychology, and economics. Three emerging dimensions challenge India's traditional security architecture.

    Drone Threat:
    • Low-cost commercial drones used by Pakistan to smuggle arms/drugs into Punjab/J&K
    • Weaponised drones (IED-carrying) can target installations and public gatherings
    • Op Sindoor 2025: 300-400 Pakistani drones launched; India's Integrated Counter-UAS Grid (S-400, Barak-8, Akash, Harpy) used
    • India's response: D4 System (DRDO/BEL), VSHORAD, ARDTC (MHA), National Counter-Drone Guidelines 2019

    Over-Ground Workers (OGWs):
    • Logistical/intelligence backbone of terror — safe houses, transport, food for active terrorists
    • Not armed combatants → harder to prosecute under terror laws; blend into civilian life
    • OGW networks enabled 26/11 — local facilitation made multi-point attack possible
    • India's approach: UAPA individual designation allows targeting OGWs; NIA investigates OGW networks

    Grey-Zone Warfare:
    • Pakistan: FICN, narco-trafficking, cyber attacks, proxy groups — all below war threshold
    • China: Salami slicing on LAC, cyber operations, disinformation, insurgent support
    • Challenge: Conventional military doctrine poorly suited — requires intelligence, cyber, economic, diplomatic responses simultaneously

    Way Forward: Whole-of-government approach; invest in cyber capabilities; counter-drone infrastructure; CVE programs; intelligence fusion centres

    Conclusion: India's security architecture was built for 20th-century threats. The 21st-century adversary fights below the threshold of war, using technology as a weapon. Adapting requires investing equally in intelligence, cyber, and economic counter-measures as in conventional military capability.
    🎯 Probable Q3 — China's Threat (150W, 10M) ⭐ Moderate Probability
    China's challenge to India's internal security is multi-dimensional and long-term. Analyse the various dimensions of China's threat and India's counter-strategy.
    Intro: Unlike Pakistan's direct terror sponsorship, China's challenge is strategic, long-term, and multi-dimensional — containment of India's rise through five simultaneous domains.

    Five Dimensions:
    1. Military/Border: Grey-zone warfare, Salami Slicing, LAC standoffs (Doklam 2017, Galwan 2020, 20 Indians killed). China's $245B defence budget (2025). Two-front challenge with China-Pakistan nexus.
    2. Cyber/Hybrid: State-linked hackers attack critical infrastructure, financial institutions. Hybrid tactics: cyberattacks + disinformation + proxy actor support
    3. Economic Coercion: India's dependence on Chinese APIs, electronics, telecom hardware. Supply chain weaponization. Data espionage through apps and shell companies
    4. Insurgent Support: Historical support to NSCN, ULFA, Meitei groups. Ideological/financial support to CPI(Maoist). Keeps India's northeast destabilised as strategic leverage
    5. Maritime Encirclement: String of Pearls (Hambantota, Gwadar, Kyaukpyu). CPEC through PoK challenges India's sovereignty

    India's Counter-Strategy:
    • Necklace of Diamonds (Chabahar, Sittwe, Duqm, Agalega)
    • QUAD (India-USA-Japan-Australia) for Indo-Pacific security
    • Reducing import dependence (PLI scheme for critical sectors, APls)
    • Banning Chinese apps (TikTok, PUBG etc.) for data security
    • Forward infrastructure on LAC — roads, tunnels, villages
    • Cyber security architecture — CERT-In, NCSC, NCA framework

    Conclusion: China's challenge requires India to fight across all five domains simultaneously while managing the China-Pakistan two-front challenge — the most complex security environment independent India has faced.
    🎯 Probable Q4 — Social Media & Radicalisation (150W, 10M) ⭐⭐ High Probability
    Social media has emerged as the most powerful tool for radicalisation and recruitment by terrorist organisations. Examine the threat and suggest a comprehensive counter-strategy for India.
    Intro: Social media plays a role in up to 90% of radicalisation cases. It has transformed terrorism from a geographically bounded to a globally networked phenomenon — enabling virtual planners to create real-world violence without ever entering India.

    How Social Media Enables Terrorism:
    Propaganda & Recruitment: ISIS online magazines (Dabiq), YouTube channels, encrypted Telegram groups spread ideology and recruit. High-quality deepfake videos and AI-generated content make propaganda more convincing
    Financing: Crowdfunding through seemingly legitimate charities; cryptocurrency (Bitcoin) for anonymous, untraceable transfer
    Planning: Encrypted apps (Signal, Telegram) allow global coordination without physical meetings. Virtual planners direct lone wolves inside India
    Psychological warfare: Disinformation campaigns to inflame communal tensions (Pahalgam massacre used to spread communal narratives on social media)
    Lone wolf creation: Coimbatore (2022), Bengaluru Rameshwaram Café (2024) — individuals radicalized entirely online, no physical group contact

    India's Current Measures: Social media monitoring by MHA and state police; platform coordination for content takedown; NIA investigation of online ISIS modules; Operation Sindoor — blocking 8,000+ Pakistan-linked accounts

    Gaps: Encryption creates "going dark" problem; cross-border servers beyond Indian jurisdiction; no comprehensive CVE framework; social media companies slow to respond

    Way Forward:
    • Comprehensive CVE (Countering Violent Extremism) national framework
    • Mandatory reporting obligations on platforms for terror content
    • Intermediary liability for radicalising content
    • International cooperation (QUAD, bilateral) for cross-border content enforcement
    • AI-based content detection at scale
    • Community engagement programs to create early warning systems

    Conclusion: The digital battlefield requires digital warriors — India needs not just an army of soldiers but an army of cyber analysts, community counsellors, and platform regulators to fight the radicalisation epidemic online.
    ⚡ Quick Revision — External State & Non-State Actors
    🏛️ External State Actors
    Formula
    Pakistan: ISI + LeT + JeM + TRF; "1000 cuts"; FICN; narco-terror (Golden Crescent); J&K radicalisation; Pahalgam (2025) → Op Sindoor | China: Salami slicing; Galwan (2020); $245B defence; CPEC/PoK; String of Pearls; NE insurgent support; cyber; economic coercion (APIs) | Neighbours: Myanmar (arms flow, Rohingya); Bangladesh (migration); Nepal/Bhutan (ISI misuse, FICN transit)
    💥 Non-State Actors
    Formula
    Pakistan-backed: LeT (26/11), JeM (Pulwama), TRF (Pahalgam) — ISI-directed | Global jihad: ISIS (online recruitment, lone wolves, crypto funding); Al-Qaeda/AQIS | Khalistan: Diaspora-driven, Canada-based, SFJ | NE Insurgents: NSCN-IM, ULFA, Manipur ethnic groups — China/Myanmar-linked | Crime-Terror: Drug cartels, FICN networks, hawala
    🆕 Modern Playbook — Emerging Threats
    Formula
    Drones: Smuggling (Pakistan→Punjab/J&K); weaponised IEDs; Op Sindoor drone war (300-400 Pakistan drones); India's D4, VSHORAD, S-400, Barak-8 counter | Tech: Social media (90% radicalisation cases), deepfakes, crypto (Bitcoin terror funding) | OGWs: Above-ground logistical backbone — not armed but enable attacks | Sleeper Cells: Dormant, encrypted, long-term | Lone Wolf: Coimbatore (2022), Bengaluru Café (2024) | Grey-Zone: Cyber + proxy + disinformation + economic coercion
    🛡️ Counter-Strategy — 5 Domains
    Formula
    Legal: UAPA (individual designation), NIA, BNS 2023, NATGRID | Intelligence: MAC, CIBMS smart fence, coastal NC3I | Military/Kinetic: Surgical Strikes (2016) → Balakot (2019) → Op Sindoor (2025, new doctrine) | Diplomatic: FATF grey-listing Pakistan ($38B), CCIT advocacy, SCO-RATS, QUAD | Financing: PMLA/ED, FIU-IND, NMFT Conference | CVE: De-radicalisation, social media monitoring
    ⚔️ Operation Sindoor — Must Know
    Formula
    Trigger: Pahalgam massacre (Apr 22, 2025) — 26 tourists killed by TRF (LeT front) by religion | Response: Op Sindoor (May 7, 2025) — 9 terror camps struck including Muridke (LeT HQ) + Bahawalpur (JeM HQ) | Drone war: India (SkyStriker, Harop) vs Pakistan (300-400 Songar drones from 36 locations) | India's counter-UAS: S-400 + Barak-8 + Akash + Harpy | New doctrine (PM Modi): Decisive retaliation + no distinction terrorists/state sponsors + Cold Start operationalised
    🚨 5 Analytical Points for Mains Answers:

    ① The Four Channels of External Threat: External actors threaten India through: direct violence, economic warfare (FICN/narco), information warfare (radicalisation/disinformation), and proxy actors (OGWs/sleeper cells). An answer covering all four scores significantly higher than one focused only on terror attacks.

    ② Asymmetric Calculus — Always Explain: Pakistan uses terrorism because it's cheap and effective — 9/11 cost $500,000 but caused $73B in US damages. This asymmetric cost-benefit is why proxy war is rational for a weaker state. It also explains why FATF's $38B economic pressure on Pakistan was effective — economic pain changes the calculus.

    ③ India's Escalation Ladder: Strategic restraint (pre-2016) → Surgical Strikes (2016, LoC) → Balakot Airstrikes (2019, Pakistani soil) → Operation Sindoor (2025, deepest strike, new doctrine). Each step pushed further into Pakistan's territory. This escalation ladder demonstrates India's shift from absorbing attacks to imposing costs — use this narrative arc in every Pakistan-related question.

    ④ China-Pakistan Nexus — The Two-Front Challenge: India faces the unique challenge of two nuclear-armed adversaries who coordinate against it. CPEC passes through PoK (China supports Pakistan's territorial claim). China shields Pakistan at FATF and UNSC. This nexus makes India's security challenge qualitatively different from any other country — always flag this in China or Pakistan questions.

    ⑤ Modern Terrorism ≠ Conventional Terrorism: Today's terrorism is technology-enabled, below-threshold, and often individual (lone wolf). Drones, cryptocurrency, deepfakes, and encrypted apps have fundamentally changed the threat. India's security response must be equally multi-domain — not just military, but cyber, financial, psychological, and diplomatic simultaneously.

    Book a Free Demo Class

    April 2026
    M T W T F S S
     12345
    6789101112
    13141516171819
    20212223242526
    27282930  
    Categories

    Get free Counselling and ₹25,000 Discount

    Fill the form – Our experts will call you within 30 mins.