During the 12th convocation of the Defence Institute of Advanced Technology (DIAT) in Girinagar, Pune, the defence minister emphasized the emergence of non-kinetic warfare and the accompanying need for advanced technology in the defence sector. As a UPSC aspirant, it is crucial to understand the concept of non-kinetic warfare, its importance, and its role in the defence & security segments.

Understanding Non-Kinetic Warfare for UPSC Exams
Defining Non-Kinetic Warfare
- Emerging and critical technologies (CETs) can be categorized based on their application in warfare, such as battlefield and over-the-horizon (OTH) technologies.
- Battlefield CETs are technologies specifically designed for warfighting and are used directly on the battlefield.
- OTH CETs include technologies that can be applied in non-kinetic domains, including cyber-physical attacks, influence operations, and big data analytics.
- Non-kinetic warfare generally refers to actions taken against an adversary that do not involve direct conventional military action. This could include information warfare, cyber warfare, psychological operations, electromagnetic offensives, and cryptographic warfare.
The Evolving Nature of War – The Need for Advanced Defence Technology
- The global political and economic landscape is continuously evolving, leading to significant changes in the dynamics and methods of warfare.
- War has transitioned from a contact-based, kinetic approach to a non-contact, non-kinetic character. Violence is no longer the primary platform for warfare.
- Threats are not only limited to the surface and air domain but also extend to cyber and space domains.
- The emergence of non-kinetic or contactless warfare has emphasized the need for advanced technology in the defence sector.
- The possession of more advanced technologies by our adversaries can pose significant threats. Therefore, it is important to stay updated with technological advancements in line with changing global perspectives.
The Importance of Non-Kinetic Warfare
- Encouraging innovation in the defence sector is crucial, as these advancements can also be beneficial for civil applications.
- CETs have become a vital part of the warfighting domain. For instance, GPS navigation systems initially developed for defence requirements are now an integral part of civilian life.
- As per World Bank estimates, nearly 60 per cent of the global population has an active internet connection, and there are almost 5.5 billion unique mobile phone users worldwide.
- This increasing global connectivity and the vast amount of real-time data being generated worldwide have significant implications. Almost all aspects of human activity, including biometrics, social interactions, finances, entertainment, politics, and ideologies, are being moderated through these devices and platforms.
- The potential for influencing individuals across countries, coordinating actions, and radicalizing individuals is immense, leading to national security vulnerabilities.
- Non-kinetic warfare tools have been used to weaponize civilian domains. Examples include election fraud, genocide, export controls against certain countries in specific technological fields, cyber-attacks against power grids, and disinformation campaigns.
Moving Forward:
- Self-reliance in the defence sector: The goal of self-reliance is to meet the needs of the Armed Forces through indigenous capacity building and fulfil the security requirements of our allies through exports.
- Data policies: There is a need for a robust data governance policy within the forces that aligns with the national data governance policy framework but is sufficiently firewalled to prevent accidental leaks of sensitive data.
- All electronic components should be inspected for hardware trojans, and only certified components should be used in the military.
- Exploiting commonalities: Leveraging common requirements between different ministries will ensure that private companies can achieve economies of scale and expedite delivery.
- Cybersecurity standards: In the case of software, stringent cybersecurity standards need to be established and implemented. This is particularly important as the defence sector sees an influx of private players, necessitating the coordination of cybersecurity measures.
- Collaborative competition: Defence companies can explore the consortium method, combining their strengths to 'collaborate and compete' rather than just compete.
- Attracting talent: Bright young minds can be brought on board through initiatives like the Atal Tinkering Labs and other similar young science incubators.
Conclusion: Thus, it is essential to undertake serious discussions within the forces regarding the future force structures necessary for winning in the competition continuum, as merely inducting or absorbing technologies without a corresponding change in structures may not yield the desired outcomes.
More Articles for IAS Preparation
- Non-Sugar Sweeteners: WHO Guidelines and Types - UPSC Notes | Testbook.com
- Non-Patent Drug Cost Control Mechanism - UPSC Notes | Testbook.com
- Nobel Prize Winners 2022 - Complete List, Facts & Related Questions
- North Sea Summit 2023 - UPSC Notes - Testbook
- Noxious Gases Issue in India - Industrial Disasters & Solutions | UPSC Notes
- Northern Ireland Conflict - UPSC Notes | Testbook.com
Frequently Asked Questions

UPSC Beginners Program
Get UPSC Beginners Program - 60 Days Foundation Course SuperCoaching @ just
₹50000₹0
🪙 Your Total Savings ₹50000
People also like

