Published on 06 Feb 2025
In the present world, drones have found applications across manifold domains ranging from agriculture to disaster management. On the other hand, drones are also actively used in defence for delivering weapons and for mass surveillance. This raises questions regarding the militarization of drones in the modern world.
Challenges associated with militarization of drones
Casualties and collateral damage: Drones can inadvertently cause civilian casualties and collateral damage, as remote operators may have limited situational awareness compared to troops on the ground.
Example: U.S. drone strikes in Pakistan and Afghanistan have faced criticism for causing civilian casualties
Erosion of accountability: The remote nature of drone warfare can reduce the direct accountability of military personnel for their actions, potentially leading to a detachment from the consequences of their decisions.
Escalation of tension: The availability of armed drones can lower the threshold for conflict initiation and escalation, potentially leading to increased tensions between states.
Example: The availability and use of drones by rebel Houthis have escalated tension in Yemen.
Violation of sovereignty: The use of armed drones for targeted killings in foreign territories can violate the sovereignty of other nations.
Example: US using militarized drones against Taliban was considered by many as an interference into Afghan sovereignty, which led to erosion of trust for the Afghan civilian government.
Misuse by non-state actors: The accessibility of drone technology can lead to its use by non-state actors for malicious purposes, including terrorism.
Example: The Islamic State (ISIS) has employed drones for smuggling arms and drugs across Indian border
Lethal autonomous weapons: The development of fully autonomous drones that can make decisions about the use of lethal force without human intervention raises ethical and legal concerns.
Privacy concern: The deployment of drones for surveillance raises concerns about privacy infringements and the potential for mass surveillance.
Example: Use of drones by China for mass surveillance of Uighur Muslims raises privacy concerns for these people.
Ethical dilemma: The use of drones in conflict raises complex ethical and legal questions, including issues related to proportionality, distinction, and adherence to international humanitarian law.
Example: The targeted killing of individuals in areas like Yemen and Somalia using drones has sparked debates about the legality and morality of such operations.
India’s capability to address these threats
Development of indigenous counter drone technology: To detect and neutralize unauthorized drones which aims to protect critical installations and military bases.
Example: Indrajaal is an anti-drone dome developed by Grene Robotics, a Hyderabad-based company
Regulatory measures: The guidelines issued by the Ministry of Civil Aviation regarding registration of drones, restricted areas etc. to prevent unauthorised drone flights.
Example: Recent drone rules by the Director General of Civil Aviation which impose restrictions on flying near airports and other sensitive areas.
Awareness and training: This aids security personnel to identify suspicious drone activity and respond effectively.
Example: National Security Guard conducted training programmes for security personnel to enhance their skill in countering drone threats.
Advanced surveillance and monitoring: Use of radars and sensors to detect and track drones that may attempt to breach security perimeters.
Example: BSF deployed surveillance radars along the India Pakistan border to detect unauthorized drone activity.
International collaboration: India’s participation in international forums allows India to learn from global experience and share best practices among one another.
Collaboration with industry: Collaboration with public and private entities contributes to development of effective solutions to address evolving drone threats.
Example: DRDO has collaborated with BEL to develop counter drone solutions.
Research and development: Indian research institutions and technology organizations are investing in research and development to innovate solutions for countering drone threats.
Example: Indian start-up named Staqu has developed an AI based system that uses computer vision to detect drone
Challenges of emerging technology to national security
Emerging technologies bring about new opportunities for innovation and progress, but they also pose several challenges to national security. These challenges arise from the potential for misuse, vulnerabilities, and the rapid pace of technological advancements.
Cyber vulnerabilities: Emerging technologies often have vulnerabilities that can be exploited by malicious actors, leading to cyber-attacks and data breaches.
Example: The WannaCry attack exposed the vulnerability of organizations to large scale cyber-attack.
Disinformation: Emerging technologies can be used to spread disinformation and misinformation, undermining public trust and causing social divisions.
Example: Russia has used disinformation campaigns to influence the US Presidential election.
Weaponization of technology: The rise of cyber and hybrid warfare has indicated the scope for weaponization of technology.
Example: Chinese attacks on Indian critical infrastructures indicate the potential for hybrid warfare.
Dual use technology: Technologies with both civilian and military applications can create challenges in distinguishing between peaceful and harmful uses.
Example: The drone attack on the Indian Air Force base in Jammu in 2021 raised concerns about the potential military applications of consumer-grade drones for surveillance and attacks.
Supply chain vulnerabilities: The global nature of supply chains for emerging technologies can introduce security risks, including potential backdoors and compromises.
AI and Deep Fake threats: The advancement of AI technology can lead to the creation of convincing deep fake videos and audio, enabling sophisticated deception and manipulation.
How to address these security threats
Legislations: The government should make legislations which counter these emerging threats and ensure watertight enforcement.
Example: National Cyber Security Policy and Data Protection bill.
Institutional mechanisms: Organised bodies which ensure coordination in policy implementation enables efficient protection from threats.
Example: National Critical Information Infrastructure Protection Centre
Specialized training: Training the security forces to get equipped with upgraded technology can aid in hunting down such crimes.
Example: National Cybercrime Training centre to make forces more adept at dealing with cybercrime.
Incorporation of technology: Technology driven threats could be effectively countered only when the security forces are well equipped with new age technology.
Regional and international engagements: Since new age threats are transnational, frequent engagements to ensure coordination among nations are critical to counter these threats.
Security
Militarization of Drones
National security
Internal security
Border area management
General Studies Paper 3
Cybersecurity
Related Articles
Maoist Menace
Manipur Violence
India and Neighbourhood
Emergency in the context of Samvidhan Hathya Divas
RISE IN MILITANCY IN JAMMU AND KASHMIR
Acing Development of Innovative Technologies with iDEX (ADITI) Scheme
Rampage Missiles
VL-SRSAM Missile
AKASH NG Missile
National Terrorism Data Fusion & Analysis Centre
Shaksgam Valley
Free Movement Regime
T 50 Tunnel
Article 370
Operation Sarvashakti