Monday, July 14, 2025
Advertise with us
Support us
Write for us
No Result
View All Result
claws
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact
No Result
View All Result
CLAWS
No Result
View All Result
Home Intern Articles

Kashmir Conflict: Militancy in the Digital Age

Shreyanka ChandelbyShreyanka Chandel
September 18, 2020
in Intern Articles
A A
0
Post Views: 84

Jammu and Kashmir have been a source of conflict between India and Pakistan for more than 70 years. The volatile security situation in the region is a manifestation of Pakistan’s proxy war in India, combined with the unsettled political, social, and economic issues of the state. Historically, Pakistan’s external influence on Kashmir has been one of the major factors for the persistence of the conflict. But in recent years, with the advancement in technology and enhancement of globalisation, the conflict has extended to other equally important dimensions which have dramatically changed the security dynamics in the Valley. These include the use of technology in terrorism; structures of terrorist financing; transnational linkages with external and/or non-state actors; in addition to the internal political instability.

Innovations in computing and telecommunications over the past decade- like rising use of smartphones, access to the internet, social media, encrypted networks, and servers, etc –  have proved to be a “double-edged weapon”.  Such platforms are increasingly used by terrorist groups (like Lashkar-e-Taiba and Jaish-e-Mohammed in Jammu and Kashmir) and militants as well. These developments significantly impacted the situation in Jammu and Kashmir, with more people being connected online, but at the same time, having easier access to terrorist and militant propaganda. Therefore, making them more vulnerable targets.

Internet and modern technology are misused by terrorist groups for purposes such as – propaganda (including recruitment, radicalisation, and incitement to terrorism); financing; training; planning  and  execution of attacks.

Social media is used to publish militant content, aimed at reaching a large population and to garner support from Kashmiri youth. Platforms such as WhatsApp, YouTube, Telegram are used to spread misinformation through targeted videos and pictures —  including sharing memes, videos of training, dying declarations of militants, and other extremist content on WhatsApp groups. Lashkar-e-Taiba promotes its ideology and propaganda through its cyber cell, launched in 2015, and Hizbul Mujahideen’s social media campaign includes sharing anti-India and anti-Indian security forces material through WhatsApp groups and rap music videos on YouTube. In fact, social media now drives the recruitment of local militants.

Terror groups have started using the internet as a training ground for militants, by providing training materials in the form of online manuals, information, videos — with detailed instructions covering bomb-making, undercover operations, identity forging, etc. Internet-based technology also provides terror groups with secure channels of communication to plan, coordinate, and execute attacks. Moreover, modern methods of fund transfers also facilitate the easier acquisition of funds and resources from across the border.

With regard to restricting the use of the internet and social media for the above purposes, the response capacities of security agencies are limited. For example, the use of international mobile numbers, WhatsApp’s encryption policies, and other privacy regulations makes it difficult for the security agencies to trace the mobile numbers engaged in the misinformation campaigns.

There is also a need to review India’s counter-terrorism and counter-insurgency strategies for Jammu and Kashmir in light of the changing technological dimensions. The state still views successes in conventional terms such as killing/surrender of militants, but for the local population, these serve as signs of the defeat of the state. Social media — through sharing of videos of large funeral processions, gun salutes for killed militants — glorifies militancy, and militant deaths inspire more locals to join the call for Jihad, making the efforts of security forces futile. As stated by Khalid Shah, ‘Guns cannot kill clicks, constructs and imaginative heroism, as social media activity and the narrative of the gun goes unchallenged. The jihad now plays out in virtual space‘

The Indian state needs to craft a more comprehensive conflict resolution strategy, which also addresses the political objective of peaceful psychological integration of the Kashmiri population with the rest of India, in addition to continued counter-terrorism operations.

Internet shutdowns have been used as a tool to prevent potentially violent activities and security threats, and immobilise terror outfits. The move may have led to a decline in recruitments as the militant groups have not been able to push their propaganda as effectively. However, it is not a hidden fact that the internet shutdown is not a sustainable option for the future. While internet shutdowns act as a successful short term solution, the policy is not sustainable for preventing violence in the long run— as people find alternate means of communication.  For instance, after the elimination of Burhan Wani in 2016, large scale violent protests broke out and Wani’s funeral was attended by thousands, despite the implementation of an internet shutdown. Therefore, deeper academic research is required to ascertain the effectiveness of internet shutdowns as a means of containing national security threats. In the long term, a communication lockdown would have larger economic, psychological, and political ramifications that must be considered.

To successfully tackle challenges posed in the cyber domain, a targeted policy that follows technological solutions to security questions would be beneficial.

Cybersecurity agencies are already involved in media surveillance and monitoring content on the internet. Further, it is important to develop strict legislation that strikes a balance between powers of the state to monitor internet activity for the sake of national security, while also maintaining constitutional rights and privacy of citizens’ data. The government, security agencies, data protection experts and civil society organisations should work together to develop a framework defining the government’s legitimate rights to access information, and clearly defining extremist/terrorist content without infringing on civil liberties.

There is also a  necessity for the government to maintain a full-time digital team based in Jammu and Kashmir that takes into consideration the suggestions of security officials on the ground that are tackling the threat, in a constitutional manner. Further, Social media platforms can set up local micro research units in Srinagar in association with Indian research or educational institutions, to better understand the misuse of the digital space in the region.

More responses to the current web-based challenges include creating a counter-narrative online, to delegitimise and reduce the digital expansion of terrorist and extremist ideologies. Currently, the state has no policy to counter extremist propaganda online, other than reporting the content to social media platforms who then take it down. According to security officials as well, it is crucial to create online counter-narratives with the assistance of trained digital experts, who can effectively manage and create powerful videos and other content, to dissuade vulnerable individuals from being attracted to militant groups. Such counter-messaging efforts have been undertaken in West Asia as well, to counter the rising online presence of the Islamic State of Iraq and Syria, under the ‘ISIS Defectors Interviews Project’.

A program for youth and student engagement may prove to be beneficial as a means of addressing issues of de-radicalisation and rehabilitation. It is very important to start counseling sessions for the youth, so as to prevent them from going the wrong direction. Generating employment opportunities in the region, would is likely to have a positive impact on the population. Additionally, it is equally important to understand the role played by factors such as identity, grievances, and despair in the process of radicalisation of individuals and tackle the causes of violent extremism.

References:

  1. Combating Terrorism: Evolving Asian Perspectives – Shruti Pandalai, Institute for Defence

Studies and Analyses, Pentagon Press LLP, 2019

  1. Demystifying Kashmir – Navnita Chadha Behera, Brookings Institution Press, 2006
  2. Ideological Shift, Public Support and Social Media: The ‘New’ in Kashmir’s New

Militancy – Khalid Shah, Observer Research Foundation, 2020

  1. The use of the Internet for terrorist purposes – United Nations Office on Drugs and

Crime, United Nations, 2012

  1. The Conflict in Jammu and Kashmir and the Convergence of Technology and Terrorism –

Kabir Taneja and Kriti M Shah, (Global Research Network on Terrorism and Technology:

Paper No. 11) Royal United Services Institute for Defence and Security Studies, Observer

Research Foundation, 2019

Tags: India’s National Security ChallengesJammu-KashmirRadicalisation
Previous Post

PROTECTION OF CIVILIANS : United Nations Peacekeeping Missions in the Democratic Republic of Congo and the Republic of South Sudan

Next Post

Review Essay: Annual Reports on the Development of International Relations in the Indian Ocean Region (2014-2018), Edited by Rong Wang and Zhu Cuiping.

Shreyanka Chandel

Shreyanka Chandel

Next Post

Review Essay: Annual Reports on the Development of International Relations in the Indian Ocean Region (2014-2018), Edited by Rong Wang and Zhu Cuiping.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Support Us Donate Now

Web Updates

List of Shortlisted Officers / Candidates: PhD Batch – 7

Field Marshal Manekshaw Essay Competiton 2025

Guidelines to Publish with CLAWS

Summer Internship Capsule 2025

Application Form – Study Mtrl for DSSC 2025

[NEW] Application Form for membership for PROMEX (PART B or D)

  • Trending
  • Comments
  • Latest

Summer Internship Capsule 2025

April 8, 2025
Results | Field Marshal Manekshaw Essay Competition – 2024

Field Marshal Manekshaw Essay Competiton 2025

May 23, 2025
Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

May 21, 2025
Pahalgam Response: Why India Must Fight Smart?

Pahalgam Response: Why India Must Fight Smart?

May 2, 2025

Front Organisations: The Valley’s Homegrown ‘Resistance’ or Pakistan’s Evolving Terrorism Tactics?

2
DefAI: Cyber & AI Frontiers for Defence | The Third Cyber Workshop from CLAWS & HACKTIFY

DefAI: Cyber & AI Frontiers for Defence | The Third Cyber Workshop from CLAWS & HACKTIFY

2
Great Power Rivalry in the Arctic and India

Great Power Rivalry in the Arctic and India

2

Clausewitz, pagers, and the evolving art of supply chain attacks

1
Combat Motivation in Contemporary Military Environment: An Appraisal

Combat Motivation in Contemporary Military Environment: An Appraisal

July 10, 2025
Rearming the Indian Military: A National Defence Reset for Being Future Ready

Rearming the Indian Military: A National Defence Reset for Being Future Ready

July 10, 2025
China Talkies: Reading Chinese Signals on QUAD Foreign Ministers’ Meeting

China Talkies: Reading Chinese Signals on QUAD Foreign Ministers’ Meeting

July 7, 2025
Operation Sindoor : The New Normal in Old Rivalry

Operation Sindoor : The New Normal in Old Rivalry

July 6, 2025

Popular Stories

  • Summer Internship Capsule 2025

    0 shares
    Share 0 Tweet 0
  • Field Marshal Manekshaw Essay Competiton 2025

    0 shares
    Share 0 Tweet 0
  • Op Sindoor 2.0: Why & How India Must Prepare for the Next Round?

    0 shares
    Share 0 Tweet 0
  • Pahalgam Response: Why India Must Fight Smart?

    0 shares
    Share 0 Tweet 0
  • DefAI: Cyber & AI Frontiers for Defence | The Third Cyber Workshop from CLAWS & HACKTIFY

    0 shares
    Share 0 Tweet 0

About us

CLAWS

The Centre for Land Warfare Studies (CLAWS), New Delhi, India is an independent think tank on strategic studies and land warfare. The mandate of CLAWS covers national security issues, conventional military operations and sub-conventional warfare.

Follow Us

Browse by Category

  • Articles
  • Autumn 2019
  • Autumn 2020
  • Books
  • CLAWS Focus
  • CLAWS Journal
  • Essay
  • Events
  • External Publications
  • FMMEC
  • Intern Articles
  • Issue Briefs
  • Jottings by Director General Emiritus
  • Manekshaw Papers
  • Newsletter
  • Round Tables
  • Scholar Warrior
  • Seminars
  • Uncategorized
  • Web Updates
  • Winter 2019
  • YouTube Podcast

Recent News

Combat Motivation in Contemporary Military Environment: An Appraisal

Combat Motivation in Contemporary Military Environment: An Appraisal

July 10, 2025
Rearming the Indian Military: A National Defence Reset for Being Future Ready

Rearming the Indian Military: A National Defence Reset for Being Future Ready

July 10, 2025
  • Site Map
  • Tenders
  • Advertise With Us
  • Terms of use
  • Privacy Policy
  • Other Think Tanks

© 2008-2024 Centre for Land Warfare Studies (CLAWS).

No Result
View All Result
  • Home
  • About Us
    • Director General
    • Additional Director General
    • Jottings by Director General Emiritus
    • CLAWS Membership
    • Faculty
  • Publication
    • Web Articles
    • Issue Briefs
    • Manekshaw Papers
    • Newsletter
    • CLAWS Journal
    • Scholar Warrior
    • Books
    • Essay
    • Intern Articles
    • External Publications
  • Research Areas
    • Global & Regional Security
      • China
      • Pakistan
      • Afghanistan
      • South Asia
      • Indo Pacific
      • US, EU & Russia
      • MENA
      • CAR
    • National Security
      • National Security Strategy
      • Nuclear Deterrence
      • Non Traditional Threats
      • Intelligence
      • Terrorism & Internal Security
      • Grey Z & IW
      • Security Laws
    • Military Studies
      • Military Doctrine
      • Military Strategy
      • Peace Keeping Ops
      • Military History
      • Military Logistics
      • Out of Area Contingency Ops
      • Leadership
    • Military Technology & Defence Acquisition
      • Military Technology
      • Defence Acqn
      • Budgets & Finance
      • Defence Infrastructure
      • Human Resources
    • Multi Domain Studies
      • Jointmanship & Integration
      • Space
      • Cyber
      • Spl Operations
      • Energy & Environment
      • Defence Eco System
      • Defence Diplomacy
      • HADR
  • Web Archive
  • Events
    • Seminars
    • Webinars/RTD
  • PROMEX
  • University Cell
    • About The Initiative
    • Admission: Eligibility and Procedure
    • Important Information
    • Administration
    • Guides | Supervisors
  • Careers
  • Contact

© 2008-2024 Centre for Land Warfare Studies (CLAWS).