top of page
Search

India’s Emerging Counter-Terrorism Framework: Promise, Power, and Accountability

Updated: Jan 2

For the first time since independence, the Government of India is in the final stages of drafting a comprehensive national anti-terror policy aimed at providing a uniform framework for states to prevent, combat, and respond to terrorist activities. Coming in the wake of recent attacks, including the Pahalgam incident in April 2025, the policy reflects a strategic shift from fragmented, event-triggered responses to an integrated, intelligence-led security architecture. It represents a fundamental restructuring of how India's intelligence, law enforcement, and prosecution systems operate. 


It marks a critical moment in India’s long and complex engagement with terrorism, shaped by cross-border violence, proxy wars, insurgencies, and increasingly sophisticated forms of radicalization and ideological subversion.  From the Parliament attack of 2001 and the Mumbai terror strikes of 2008 to Pulwama in 2019 and the Pahalgam attack in April 2025, each major incident has exposed recurring gaps in intelligence sharing, coordination, and pre-emptive capacity. 


Taking this into consideration, the proposed policy reflects a conscious attempt to break from this redundant pattern. By integrating intelligence, law enforcement, and prosecution into a single national framework, it seeks to shift India’s counter-terror posture from post facto response to preemption. Crucially, it acknowledges the changing nature of the threat, where radicalization is increasingly digital, borders are exploited through informal routes, terror financing is embedded within legitimate economic channels, and organized crime networks operate in tandem with extremist groups.


Key Features of the Proposed Policy

The new proposed policy indicates a shift in how India approaches issues related to counter-terrorism and has created a national framework for the prevention, investigation, and response to terrorist acts. This framework is especially significant because it addresses the past problem of fragmentation among India's more than twenty central and state governmental agencies when collecting intelligence, investigating, and responding to terrorist incidents.


According to Home Minister Amit Shah, the goal of this comprehensive national policy is to shift India's security systems from being reactive to being proactive by bringing all aspects of the counter-terrorism effort together into one integrated model that enables India to identify potential threats prior to any activity occurring.


The policy also establishes a framework to address multiple dimensions of the terrorism threat, including social media as a means of recruiting and radicalizing individuals; the ability of terrorists to cross international borders without being stopped (especially through the India-Nepal border); the use by terrorist groups of foreign funding to support their operations; the acquisition by terrorist groups of chemical and/or biological weapons; the deployment of drones by terrorist groups; and the growing association between transnational organized crime syndicates and terrorist groups.


This policy calls for all states to create a uniform Anti-Terrorism Squad (ATS) structure. The move away from a decentralized policing system reflects a shift to establishing the previously isolated investigative processes for each state as common through standardization. A uniform investigation and prosecution approach means that there will be greater capacity to share and coordinate intelligence about terrorists using supporting technology, as Shah highlighted, and create common protocols and standards for investigations and evidence.


In addition to the ATS structure, the law also requires that certain forms of investigations be supported by the National Intelligence and Threat Assessment Systems (NATGRID) and the National Intelligence Database for Analysis of Data Against Norms (NIDAAN). The operational policies are to use both systems to reveal links between two or more investigations, effectively changing the process of prosecuting individual terrorist cases to identifying groups of criminals threatening society as a network of entities and their affiliates.


It also aims to enhance investigative capacity through updated tools. The NIA Crime Manual, as developed during the conference, is a standardization of recognized best practices in the investigation and prosecution of terrorism. The NIA has created two new databases to complement this investigative framework. The Organized Crime Network Database specifically pinpoints how transnational organized crime is intertwined with terrorism, as criminal organizations that are engaged in extortion or ransom "usually create connections with terrorist groups upon their escape from a country and use illegal financing to support terrorist operations." The Lost, Looted, and Recovered Weapons Database provides an ongoing, systematic level of accountability for weaponry that has been used in terrorist acts, thus facilitating the identification of both the supply chain and operational networks.


A major focus of the policy is to boost the preemptive operational capacity. It aims to institutionalize the intelligence-led operations exemplified by Operation Sindoor and Operation Mahadev. Through the use of a two-stage process, the two-pronged approach provides a response that addresses two major weaknesses associated with the historical approach taken by India about responding to terrorism: 1) The destruction of the infrastructure (such as training camps) used to plan terrorist attacks, which impedes the ability of future terrorists to plan future attacks for a period of 6–12 months, and 2) the rapid identification and elimination of terrorists from the field (or on-site) so that they cannot regroup. This approach enables India not only to respond but also to intervene during both phases of the cycle of terrorism.


International Context and Comparative Analysis

The first-ever unified counterterrorism policy in India exemplifies a global concern that has troubled democratic nations for more than 20 years now. Since the terrorist attacks on September 11, 2001, the United States, the United Kingdom, Canada, and Australia have dealt with the fundamental tension between having enough force to defend against terrorist attacks while still adhering to the legal limitations placed on their security powers and therefore upholding constitutional protection of human rights and democratic governance.


The United Kingdom's CONTEST framework, which was adopted throughout all Commonwealth nations, was a model for developing a four-pillar system that included Prevent, Pursue, Protect, and Prepare as a global template. The effectiveness of Australia's increased use of preventive detention and surveillance demonstrated statistical success, yet created serious concerns regarding human rights. Even the United States, which has established an extensive post-9/11 intelligence infrastructure, has had difficulty reconciling its preemptive doctrine with respect to international law and democratic accountability.


National Counterterrorism Center (NCTC)—United States


Following the terrorist attacks on September 11, 2001, the United States established the National Counterterrorism Center (NCTC) in 2003. This establishment created localized institutions based on a centralized model for intelligence fusion, providing a template for countering terrorism coordination worldwide. NCTC was established to address this fundamental shortcoming of the absence of an integrated system to allow disparate intelligence agencies to combine all intelligence related to terrorism in one, unprecedentedly centralized authority. 


NCTC is part of the Office of the Director of National Intelligence, with more than 1,000 personnel, making it the largest intelligence center for countering terrorism worldwide. NCTC has access to all information held by the United States government regarding terrorism, both foreign and domestic. In contrast to traditional firewalls (FBI–CIA), NCTC serves to ensure all information is accessible from either side of the border.


The structure of the NCTC serves as a model for the integration of intelligence in a systematic way. In particular, the database maintained by the NCTC (TIDE), containing biographical and biometric information about terrorists, provides an example of how India’s National Intelligence Grid (NATGRID) may also allow for cross-agency sharing of terrorism-related information without fragmentation. NCTC has faced criticism from many due to its mass surveillance capabilities, as well as due to its lack of safeguards for civil liberties, regardless of their level of sophistication.


CONTEST– The United Kingdom

The CONTEST counter-terrorism strategy that was created in 2003 in the United Kingdom and updated again in 2023 was the first to create an international model for comprehensive counter-terrorism policy, as established with four primary pillars. Whereas the American Counter-Terrorism Policy places heavy emphasis upon the use of a centralized "Fusion Center" for intelligence purposes, CONTEST employs a far wider perspective of utilizing essentially "every possible lever of the Government" to respond to the full "life cycle" of terrorism.


The CONTEST strategy is divided into four separate yet interrelated "pillars" that must operate in unison with one another: Prevent (to prevent radicalization), Pursue (to detect and expose active terrorists), Protect (to build a stronger defense against terrorist attacks), and Prepare (to manage the consequences of radicalization after it has occurred and minimize its effect on communities and society overall).

Prevent incorporates schools, universities, health-care facilities, and local authorities to identify individuals at risk of becoming radicalized, recommending them to the Channel (the Government's programme for de-radicalization) for assessment and intervention; Pursue utilizes dedicated Counter-terrorism Policing units in the United Kingdom, which are presently engaged in investigating approximately 800 persons nationally for terrorist offences; Protect employs methods such as coordinated border security and hardening against critical infrastructure, and increasing the safety and security of places of gatherings through active measures; Prepare makes use of the abilities of agencies and community first responders to manage terror attacks effectively through coordinated efforts from emergency responders at the local and national levels. CONTEST offers a model of counter-terrorism that goes beyond security-centric measures to a more holistic, whole-of-society prevention.


SAFER–Australia

This strategy provides a comprehensive approach to addressing both terrorism and violent extremism through working with the community to equip people with the tools to build resilience and capacity. Australia's unique approach to counter-terrorism and counter-violent extremism blends both concepts into one continuum and provides a greater strategic advantage by preventing radicalization and operational terrorism than by relying solely on prosecution after an event has occurred.


The SAFER model has three main objectives: intervene to prevent radicalization before attacks occur, provide operational resources to law enforcement and intelligence agencies, and maintain resilient, collaborative, and proportionate counter-terrorism policies. Each state and territory maintains Joint Counter-Terrorism Teams supported by the National Support and Intervention Program (NSIP). This program takes a whole-of-Australia approach to supporting individuals through all stages of radicalization, from those just starting to explore violent extremist ideas to those who are preparing to carry out attacks.


The NSIP framework provides a basis for an implementation strategy that integrates community-based partnerships as well as surveillance in support of the de-radicalization efforts in India. Australia's commitment to being transparent regarding threat assessment levels demonstrates that governments can effectively communicate regarding security threats without driving fear and panic. It is a method that the Indian model of counter-terrorism could replicate as well.


Emerging Threat Landscape


Digital radicalization poses an increasing existential threat due to the shift of terrorist organizations to a model of "slow-burn, digitally driven radicalization." The increase in digital radicalization will be spurred on by the penetration of smartphones in India (470 million smartphone owners), the youth demographic in India (median age of 27), and the growth of open online discussions. Encrypted applications provide an avenue for terrorist organizations to recruit individuals outside of traditional intelligence surveillance, as they escape detection through traditional intelligence-gathering techniques. The NIA investigations of digital radicalization in India are underreported, and the actual online recruitment pipeline remains cloaked in mystery due to end-to-end encryption, making it impossible to prevent criminal activity through surveilling online activity. 


White-collar terrorism is the most significant emergent threat to India. The Red Fort blast investigation revealed the existence of a highly sophisticated pan-India white-collar terror module composed of doctors, engineers, and other university-educated professionals, who were using their access to institutions and their financial legitimacy to weaponize extremism. 


The proliferation of synthetic media and generative AI poses significant risks of destabilization due to the leverage of these technologies by terrorist groups around the globe, who have quickly begun to use them as tools for propaganda, recruitment, and operational coordination.


ISIS has been at the forefront of the use of AI-generated video bulletins, using AI-generated "news anchors" in a style that replicates the aesthetics of international news organizations such as CNN and Al Jazeera to create authentic-looking content that embeds extremist narratives. As a result, the creation of this type of media allows for circumvention of social media's moderation filters; Al-Qaeda-affiliated groups have also distributed AI-generated deepfakes that purport to show injured civilians, fabricated war crimes, and clerics calling for radicalization and violence, all of which serve to generate emotional radicalization without the risk of employing actual video footage or risking the lives of individual propagandists.


Forward Vision

The counter-terrorism policy framework in India is now entering a crucial stage of implementation, which will require continued institutional momentum and careful democratic oversight. Amit Shah has stated that this policy is a shift in the culture of the organization for security agencies; the transition from "need to know" to "duty to share" will require that all data and technology developed be fully integrated into one seamless intelligence network.


The presence of Common ATSs throughout all 28 states and union territories is necessary in order to achieve the uniformity necessary for operations, consistent threat assessments, intelligence sharing, and coordinated action from investigation through prosecution. The success of this policy is contingent upon three interdependent factors: continued political commitment beyond the electoral cycle; appropriate budgetary allocation for training and technology upgrades across state agencies with tremendously different levels of institutional capacity; and, most importantly, independent oversight mechanisms & legislative support, which turn executive discretion into accountable, transparent governance.


References

 
 
 

Recent Posts

See All
The Plight of the Indian Social Contract

On March 1, 2026, a visceral yet perplexing spectacle unfolded across India. While the international community was occupied in calculating the strategic debris of the US-Israel airstrikes in Tehran; I

 
 
 

Comments


bottom of page