{"id":43592,"date":"2025-05-17T20:39:26","date_gmt":"2025-05-17T15:09:26","guid":{"rendered":"https:\/\/www.nextias.com\/ca\/?p=43592"},"modified":"2025-05-17T20:39:38","modified_gmt":"2025-05-17T15:09:38","slug":"hybrid-and-proxy-warfare","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/17-05-2025\/hybrid-and-proxy-warfare","title":{"rendered":"Hybrid &amp; Proxy Warfare"},"content":{"rendered":"\n<p><strong>Syllabus: GS3\/Security<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Context<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Recently, the Union Defence Minister emphasized that <strong>India\u2019s fight against terrorism<\/strong> is now part of its <a href=\"https:\/\/www.nextias.com\/ca\/editorial-analysis\/10-05-2025\/national-security-doctrine-india\"><strong>National Defence Doctrine<\/strong><\/a>, reinforcing its commitment to eliminating <strong>hybrid and proxy threats.<\/strong><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Understanding Hybrid Warfare<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It is designed to destabilize adversaries without direct military confrontation. It involves a <strong>mix of kinetic <\/strong>(traditional military operations)<strong> and non-kinetic <\/strong>(extends beyond usual military operations)<strong> tactics,<\/strong> including:\n<ul class=\"wp-block-list\">\n<li><strong>Cyber warfare:<\/strong> Attacks on critical infrastructure, financial systems, and government networks.<\/li>\n\n\n\n<li><strong>Disinformation campaigns:<\/strong> Manipulating public perception through fake news and propaganda.<\/li>\n\n\n\n<li><strong>Economic coercion:<\/strong> Trade restrictions, sanctions, and financial manipulation.<\/li>\n\n\n\n<li><strong>Proxy conflicts:<\/strong> Supporting insurgent groups or non-state actors to destabilize adversaries.\u00a0\u00a0<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>The <strong>Russia-Ukraine conflict<\/strong> is a prime example, where cyberattacks, drone warfare, and economic sanctions have played a crucial role.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Understanding Proxy Warfare: Indirect Conflict Through Third Parties<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Proxy warfare <strong>involves state or non-state actors<\/strong> supporting armed groups or insurgencies to achieve strategic objectives without direct involvement.\u00a0<\/li>\n\n\n\n<li>India has consistently faced<strong> cross-border terrorism,<\/strong> with Pakistan-backed groups engaging in proxy conflicts.<\/li>\n\n\n\n<li><strong>Pakistan\u2019s Proxy War Against India:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Cross-Border Terrorism<\/strong> targeting Indian security forces and civilians.<\/li>\n\n\n\n<li><strong>Drug and Weapon Smuggling <\/strong>into Punjab, aiming to create internal disturbances.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>India\u2019s Response to Hybrid &amp; Proxy Warfare<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-background\" style=\"background-color:#ebecf0\"><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\" colspan=\"3\"><strong>Key Insights on India\u2019s Hybrid Warfare Strategy<\/strong><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Aspect<\/strong><\/td><td><strong>Current Threats<\/strong><\/td><td><strong>Preparedness Measures<\/strong><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Cyber Warfare<\/strong><\/td><td>State-sponsored attacks (e.g., Chinese malware, Pegasus)<\/td><td>CERT-In, Defence Cyber Agency, Cyber Security Policy<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Information Warfare<\/strong><\/td><td>Fake news, disinfo campaigns, deep fakes<\/td><td>PIB fact-check unit, Draft Digital India Bill (2023)<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Terrorism \/ Proxy Warfare<\/strong><\/td><td>Cross-border terrorism, insurgent funding<\/td><td>NIA, UAPA strengthening, FATF compliance<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Military Doctrine<\/strong><\/td><td>Gray zone ops, maritime salami slicing<\/td><td>Theatre commands, tri-service exercises, DSA<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong>Legal\/Institutional Gaps<\/strong><\/td><td>No unified hybrid warfare law or body<\/td><td>Need for national hybrid warfare policy<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Strengthening Cyber Defenses:<\/strong> Enhancing cybersecurity infrastructure to prevent cyber espionage and attacks.<\/li>\n\n\n\n<li><strong>Military Modernization:<\/strong> Investing and Strengthening cyber defenses, AI-based warfare, electromagnetic warfare, and space-based security.<\/li>\n\n\n\n<li><strong>Institutional Reforms:<\/strong> Like Chief of Defence Staff (CDS), Integrated Battle Groups (IBGs) and Military Theaterisation etc.<\/li>\n\n\n\n<li><strong>Intelligence Agencies:<\/strong> Research and Analysis Wing (RAW), Intelligence Bureau (IB), and National Technical Research Organisation (NTRO).<\/li>\n\n\n\n<li><strong>Strategic Partnerships: <\/strong>Collaborating with global allies to counter misinformation and economic coercion.\n<ul class=\"wp-block-list\">\n<li>Example: Quadrilateral Security Dialogue (QUAD)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.pib.gov.in\/PressReleasePage.aspx?PRID=2129052\" rel=\"nofollow noopener\" target=\"_blank\">Source: PIB<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<h3><strong>Context<\/strong><\/h3>\n<li class=\"ms-5\">Recently, the Union Defence Minister emphasized that India\u2019s fight against terrorism is now part of its National Defence Doctrine, reinforcing its commitment to eliminating hybrid and proxy threats.<\/li>\n<p><\/p>\n<h3><strong>Understanding Proxy Warfare: Indirect Conflict Through Third Parties<\/strong><\/h3>\n<li class=\"ms-5\">Proxy warfare involves state or non-state actors supporting armed groups or insurgencies to achieve strategic objectives without direct involvement.\u00a0<\/li>\n<li class=\"ms-5\">India has consistently faced cross-border terrorism, with Pakistan-backed groups engaging in proxy conflicts.<\/li>\n<p><a href=\"https:\/\/www.nextias.com\/ca\/current-affairs\/17-05-2025\/hybrid-and-proxy-warfare\" class=\"btn btn-primary btn-sm float-end\">Read\u00a0More<\/a><\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[],"class_list":["post-43592","post","type-post","status-publish","format-standard","hentry","category-current-affairs"],"acf":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/43592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=43592"}],"version-history":[{"count":2,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/43592\/revisions"}],"predecessor-version":[{"id":43605,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/43592\/revisions\/43605"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=43592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=43592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=43592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}