Internal Security·Revision Notes

ISI Operations in India — Revision Notes

Constitution VerifiedUPSC Verified
Version 1Updated 7 Mar 2026

⚡ 30-Second Revision

  • ISI: Pakistan's premier intelligence agency, established 1948.
  • Mandate: Covert ops, destabilization, proxy warfare in India.
  • Key Operations: Operation Gulmarg (1947), Operation Tupac (1980s Kashmir), 26/11 Mumbai (2008), Pathankot (2016), Pulwama (2019).
  • Major Proxies: Lashkar-e-Taiba (LeT), Jaish-e-Mohammed (JeM), Hizbul Mujahideen (HM).
  • Methods: Terror sponsorship, cyber warfare, narco-terrorism, fake currency (FICN), radicalization, espionage, drone drops.
  • Legal Framework: UAPA 1967 (amended 2019), NIA Act 2008, Official Secrets Act 1923, FCRA 2010.
  • Constitutional Basis: Article 355 (Union's duty to protect states).
  • Key Judgments: Ajmal Kasab case, Headley-Rana case.
  • Counter-Agencies: RAW, IB, NIA, BSF.
  • Diplomatic Pressure: FATF, UN forums.
  • Vyyuha's IMPACT Framework: Infiltration, Major ops, Proxy orgs, Anti-India obj, Counter-measures, Tech evolution.

2-Minute Revision

ISI operations in India represent a persistent, multi-faceted threat from Pakistan's premier intelligence agency, aiming to destabilize India through proxy warfare. Historically, ISI shifted from supporting the Khalistan movement to orchestrating the Kashmir insurgency via 'Operation Tupac,' providing extensive support to groups like LeT and JeM.

Major attacks like 26/11 Mumbai, Pathankot, and Pulwama underscore ISI's direct involvement in planning and execution. Modern tactics include cyber warfare, drone-based arms/drug smuggling (narco-terrorism), and online radicalization, alongside traditional espionage and fake currency circulation.

India's robust response involves intelligence agencies (RAW, IB), a dedicated investigative body (NIA), and strong legal frameworks like the UAPA (especially 2019 amendments) and NIA Act. Border security is continuously enhanced, and diplomatic pressure, particularly through FATF, is applied to counter terror financing.

Understanding this dynamic interplay between ISI's evolving threats and India's adaptive counter-strategies is crucial for UPSC aspirants, highlighting the complex nature of internal security challenges.

5-Minute Revision

ISI operations in India are a cornerstone of Pakistan's asymmetric warfare doctrine, designed to inflict 'a thousand cuts' and prevent India's rise. The Inter-Services Intelligence (ISI), established in 1948, has consistently pursued a mandate of destabilization, subversion, and intelligence gathering against India.

Its historical evolution saw initial support for tribal incursions in Kashmir, followed by significant backing for the Khalistan movement in the 1980s. Post-1990, the focus intensified on Jammu and Kashmir, with 'Operation Tupac' becoming a blueprint for sustaining insurgency through extensive training, funding, and arming of militant groups like Lashkar-e-Taiba (LeT), Jaish-e-Mohammed (JeM), and Hizbul Mujahideen.

Landmark events like the 26/11 Mumbai attacks (2008), Pathankot (2016), and Pulwama (2019) unequivocally demonstrated the deep ISI-terror group nexus, with operatives like David Headley providing crucial evidence of ISI's direct planning and logistical support.

Contemporary ISI operational patterns have diversified to include sophisticated cyber warfare (espionage, disinformation), drone-based smuggling of arms and narcotics (narco-terrorism), and extensive online radicalization and recruitment networks.

The circulation of high-quality counterfeit Indian currency (FICN) remains a key method for terror financing and economic destabilization. India's multi-pronged counter-response is robust and adaptive.

Intelligence agencies like RAW and IB work on external and internal intelligence gathering respectively, while the National Investigation Agency (NIA) spearheads investigations and prosecutions of terror cases.

The legal framework is formidable, centered on the Unlawful Activities (Prevention) Act (UAPA), particularly its 2019 amendments that empower the government to designate individuals as terrorists and streamline property seizures.

The NIA Act, Official Secrets Act, and FCRA further strengthen this legal shield. Border security forces employ advanced technology to counter infiltration and drone threats. Diplomatically, India leverages international forums like the FATF to exert pressure on Pakistan to dismantle terror infrastructure.

The 'ISI Operational Matrix' (Tactical, Strategic, Systemic) provides a Vyyuha-specific analytical lens, highlighting the layered objectives behind ISI's actions, from immediate disruption to long-term regional destabilization, which informs India's comprehensive counter-strategies.

Prelims Revision Notes

  • ISI Formation & Mandate:1948, Pakistan's premier intelligence agency. Covert ops, proxy war against India.
  • Historical Evolution:

- Post-1947: Tribal incursions (Gulmarg). - 1980s: Khalistan movement support. - 1990s: Kashmir insurgency (Operation Tupac). Focus on LeT, JeM, HM.

  • Major Operations/Attacks:

- 26/11 Mumbai (2008): LeT, ISI handlers, David Headley testimony. - Pathankot (2016): JeM, cross-border infiltration. - Pulwama (2019): JeM, suicide attack, ISI facilitation.

  • Operational Methods:

- Terror Sponsorship: LeT, JeM, HM as proxies. - Cyber Warfare: Espionage, disinformation, radicalization. - Narco-Terrorism: Drug-arms nexus, drone drops (Punjab border). - FICN: Counterfeit Indian Currency for funding & economic destabilization. - Recruitment: Online radicalization, exploiting grievances, sleeper cells.

  • India's Counter-Agencies:

- RAW: External intelligence. - IB: Internal intelligence, counter-intelligence. - NIA: Investigates & prosecutes terror cases (pan-India jurisdiction). - BSF/Army: Border security, LoC management.

  • Legal Framework:

- Article 355: Union's duty to protect states. - UAPA 1967 (amended 2019): Designates individuals as terrorists, property seizure by NIA DG. - NIA Act 2008: Established NIA, specific terror offenses. - Official Secrets Act 1923: Espionage, classified info. - FCRA 2010: Regulates foreign contributions, prevents terror financing.

  • Landmark Cases:Ajmal Kasab (26/11 conviction), Headley-Rana (ISI-LeT nexus).
  • Diplomatic Front:FATF pressure, UN resolutions, bilateral talks (often stalled).
  • Current Trends:Increased drone usage, cyber threats, online radicalization, narco-terrorism.

Mains Revision Notes

  • ISI's Strategic Objectives:Destabilization, proxy war, bleeding India, preventing regional dominance, exploiting internal fault lines.
  • Evolution of Tactics:From conventional support to hybrid warfare (terror + cyber + info ops + narco-terrorism).
  • Kashmir as a Core Focus:Operation Tupac, continuous support to militancy, infiltration, radicalization.
  • ISI-Terror Group Nexus:Deep operational, financial, and logistical links with LeT, JeM, HM. Use of 'deniable assets' for plausible deniability.
  • Emerging Threats:

- Cyber Warfare: Espionage, critical infrastructure targeting, disinformation, online radicalization. - Drone Warfare: Arms, drugs, explosives smuggling, surveillance. - Narco-Terrorism: Funding terror through drug trade, destabilizing border regions. - FICN: Economic destabilization and terror financing.

  • India's Comprehensive Counter-Strategy:

- Intelligence: Robust human and technical intelligence gathering by RAW, IB. - Law Enforcement: Proactive investigations by NIA, swift prosecution, disruption of modules. - Legal Framework: UAPA (2019 amendments for individual designation, property seizure), NIA Act, OSA, FCRA – providing strong legal teeth.

- Border Management: Enhanced surveillance, anti-infiltration grid, counter-drone technologies. - Technological Response: Cybersecurity, AI for intelligence analysis, counter-drone systems. - Diplomacy: International pressure (FATF, UN), exposing state sponsorship, building global consensus.

  • Vyyuha Analysis - ISI Operational Matrix:Understand operations at Tactical (immediate), Strategic (long-term), and Systemic (regional destabilization) levels to grasp the full scope of the threat and inform India's layered response.
  • Challenges:Adapting to evolving tactics, maintaining vigilance, balancing security with civil liberties, international cooperation hurdles.

Vyyuha Quick Recall

Remember the 'IMPACT Framework' for ISI Operations:

  • IInfiltration methods (cross-border, drone drops, sleeper cells)
  • MMajor operations (26/11 Mumbai, Kashmir insurgency, Pulwama)
  • PProxy organizations (LeT, JeM, Hizbul Mujahideen)
  • AAnti-India objectives (destabilization, radicalization, economic harm)
  • CCounter-measures by India (NIA, UAPA, RAW, IB, border security, diplomacy)
  • TTechnological evolution (Cyber warfare, narco-terrorism, drone usage)
Featured
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.
Ad Space
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.