Chanakya's ancient wisdom guides modern Cyber Warfare: Unveiling the art of asymmetric tactics and righteous defense
December 6, 2025
  • Read Ecopy
  • Circulation
  • Advertise
  • Careers
  • About Us
  • Contact Us
Android AppiPhone AppArattai
Organiser
  • ‌
  • Bharat
    • Assam
    • Bihar
    • Chhattisgarh
    • Jharkhand
    • Maharashtra
    • View All States
  • World
    • Asia
    • Europe
    • North America
    • South America
    • Africa
    • Australia
  • Editorial
  • International
  • Opinion
  • RSS @ 100
  • More
    • Op Sindoor
    • Analysis
    • Sports
    • Defence
    • Politics
    • Business
    • Economy
    • Culture
    • Special Report
    • Sci & Tech
    • Entertainment
    • G20
    • Azadi Ka Amrit Mahotsav
    • Vocal4Local
    • Web Stories
    • Education
    • Employment
    • Books
    • Interviews
    • Travel
    • Law
    • Health
    • Obituary
  • Subscribe
    • Subscribe Print Edition
    • Subscribe Ecopy
    • Read Ecopy
  • ‌
  • Bharat
    • Assam
    • Bihar
    • Chhattisgarh
    • Jharkhand
    • Maharashtra
    • View All States
  • World
    • Asia
    • Europe
    • North America
    • South America
    • Africa
    • Australia
  • Editorial
  • International
  • Opinion
  • RSS @ 100
  • More
    • Op Sindoor
    • Analysis
    • Sports
    • Defence
    • Politics
    • Business
    • Economy
    • Culture
    • Special Report
    • Sci & Tech
    • Entertainment
    • G20
    • Azadi Ka Amrit Mahotsav
    • Vocal4Local
    • Web Stories
    • Education
    • Employment
    • Books
    • Interviews
    • Travel
    • Law
    • Health
    • Obituary
  • Subscribe
    • Subscribe Print Edition
    • Subscribe Ecopy
    • Read Ecopy
Organiser
  • Home
  • Bharat
  • World
  • Operation Sindoor
  • Editorial
  • Analysis
  • Opinion
  • Culture
  • Defence
  • International Edition
  • RSS @ 100
  • Magazine
  • Read Ecopy
Home Bharat

Chanakya’s ancient wisdom guides modern Cyber Warfare: Unveiling the art of asymmetric tactics and righteous defense

Asutosh MohantyAsutosh Mohanty
Feb 14, 2024, 04:00 pm IST
in Bharat, Sci & Tech
Follow on Google News
Representative Image

Representative Image

FacebookTwitterWhatsAppTelegramEmail

Chanakya is amongst the best Indian philosophers, economists, and political strategists who lived in the 4th century BCE. He is best known for his treatise on statecraft, the ARTHASHASTRA, which covers a wide range of topics, including warfare

One of Chanakya’s key theories of warfare is the concept of “Asymmetric Warfare,” which involves using unconventional tactics to defeat a stronger opponent. In the context of Cyber Warfare, this could involve using cyber-attacks to disrupt an enemy’s critical infrastructure, such as power grids, communication networks, and financial systems, rather than engaging in traditional military operations

Another key theory of Chanakya’s is the concept of “Dharma-Yuddha,” or “Righteous War“. According to Chanakya, a righteous war is one that is fought for a noble cause, such as self-defense or the defense of others, and is conducted in a manner that is consistent with ethical principles. In the context of cyber warfare, this could involve using cyber-attacks to defend against an enemy’s cyber-attacks, rather than using them to launch offensive operations

While Chanakya’s theories were developed in the context of ancient warfare, they continue to be relevant today, including in the context of Cyber Warfare.

Let’s decode Cyber Warfare

Cyber warfare is a term used to describe a series of cyber-attacks that target a country, with the potential to wreak havoc on government and civilian infrastructure and disrupt critical systems, resulting in damage to the State and even loss of life. Some consider cyber warfare to be a cyber-attack that can result in death. Cyber warfare typically involves a nation-state perpetrating cyber-attacks on another, but in some cases, the attacks are carried out by terrorist organisations or non-state actors seeking to further the goal of a hostile nation

There are several types of cyber warfare attacks, including espionage, sabotage, denial-of-service (DoS) attacks, electrical power grid attacks, propaganda attacks, economic disruption, and surprise attacks

  1. Espionage refers to monitoring other countries to steal secrets. In cyber warfare, this can involve using botnets or spear phishing attacks to compromise sensitive computer systems before exfiltrating sensitive information
  2. Sabotage involves hostile governments or terrorists stealing information, destroying it, or leveraging insider threats such as dissatisfied or careless employees, or government employees with affiliation to the attacking country
  3. DoS attacks prevent legitimate users from accessing a website by flooding it with fake requests and forcing the website to handle these requests. This type of attack can be used to disrupt critical operations and systems and block access to sensitive websites by civilians, military and security personnel, or research bodies
  4. Attacking the power grid allows attackers to disable critical systems, disrupt infrastructure, and potentially result in bodily harm. Attacks on the power grid can also disrupt communications and render services such as text messages and communications unusable
  5. Propaganda attacks attempt to control the minds and thoughts of people living in or fighting for a target country. Propaganda can be used to expose embarrassing truths, spread lies to make people lose trust in their country, or side with their enemies
  6. Economic Disruption: Most modern economic systems operate using computers. Attackers can target computer networks of economic establishments such as stock markets, payment systems, and banks to steal money or block people from accessing the funds they need
  7. Surprise attacks are the cyber equivalent of attacks like Pearl Harbor and 9/11

Is Cyber Warfare and Cyber Terrorism both the same?

Certainly! Cyber warfare and cyber terrorism are two distinct concepts, although they are often used interchangeably

Cyber warfare is the use of digital technology to attack a nation’s computer systems, networks, and infrastructure. It is typically carried out by one nation-state against another, with the goal of causing damage to the target’s military or economic capabilities. Cyber warfare can involve a range of tactics, including espionage, sabotage, and disruption of critical infrastructure

On the other hand, cyber terrorism is the use of digital technology to carry out acts of terror, such as causing physical harm or destruction of property. Unlike cyber warfare, cyber terrorism is not limited to nation-states and can be carried out by individuals or groups with political or social objectives

While there are some similarities between the two concepts, the key difference lies in their objectives. Cyber warfare is primarily aimed at weakening the military or economic capabilities of a nation-state, while cyber terrorism is aimed at causing fear and panic among the general public. For instance, a cyber-attack on a country’s power grid or military installations would be considered an act of cyber warfare, whereas a cyber-attack on a hospital’s computer systems or a bank’s website would be considered an act of cyber terrorism

Here are some examples of Cyber Warfare and Cyber Terrorism

Cyber Warfare

  1. In 2010, the United States and Israel allegedly used a computer virus called Stuxnet to attack Iran’s nuclear program. The virus was designed to damage the centrifuges used to enrich uranium, causing significant delays in Iran’s nuclear program
  2. In 2017, North Korea allegedly launched a cyber-attack on the British health service, causing widespread disruption and chaos
  3. In 2018, Russian hackers allegedly targeted the US power grid, gaining access to critical infrastructure and causing widespread concern about the vulnerability of the US electrical system

Cyber Terrorism

  1. In 2015, a group of hackers calling themselves the Cyber Caliphate took control of the Twitter and YouTube accounts of the US Central Command, posting messages in support of ISIS
  2. In 2016, a group of hackers calling themselves the Armada Collective launched a series of DDoS attacks on banks and financial institutions in Greece, causing widespread disruption and panic
  3. In 2017, the WannaCry ransomware attack affected more than 200,000 computers in 150 countries, causing significant damage to hospitals, banks, and other critical infrastructure

It is also important to note that in cyber warfare, the traditional deterrence of punishing a country doesn’t work. Holding individuals accountable, as many governments are increasingly doing, has far more potential. To protect themselves from cyber terrorism, nations can take a number of steps, including developing a comprehensive cybersecurity strategy, investing in cybersecurity infrastructure, collaborating with other nations, educating the public, and establishing legal frameworks to prosecute cyber criminals and terrorists

Topics: Cyber TerrorismCyber WarfareChanakya
Asutosh Mohanty
Asutosh Mohanty
Asutosh Mohanty comes with 17+ years of experience into Technology and Strategic Consulting with focus on GTM strategic pillars, SME (Cloud, Cyber Security, AI, Emerging Technologies), IT Roadmap, Digital Transformation, Analytics & Product Marketing [Read more]
ShareTweetSendShareSend
✮ Subscribe Organiser YouTube Channel. ✮
✮ Join Organiser's WhatsApp channel for Nationalist views beyond the news. ✮
Previous News

UAE: Dubai’s oldest Indian family reflects on legacy as Abu Dhabi welcomes first Hindu Mandir

Next News

UAE: PM Modi stresses “Minimum Government, Maximum Governance” principle at World Governments Summit

Related News

Chief of the Army Staff General Upendra Dwivedi

COAS Gen Dwivedi highlights unpredictability of wars, outlines three key aspects of modern military preparedness

Hoax threats to schools: A new dimension of terrorism

Jasim Shahnawaz Ansari (Right)

Gujarat: Teen Jasim Shahnawaz Ansari arrested for launching 50+ cyber attacks during Operation Sindoor

Authorities have traced one of the suspicious Indian mobile numbers - beginning with 73 - being used by the ISI operative

Is ISI calling you? Pakistan launches sophisticated cyber-espionage; Citizens urged to stay vigilant

Representative image

MHA directs states to crush anti-national propaganda networks fuelled by Pakistan post Operation Sindoor

Chanakya’s Administrative Policies: The blueprint for a strong Indian state

Load More

Comments

The comments posted here/below/in the given space are not on behalf of Organiser. The person posting the comment will be in sole ownership of its responsibility. According to the central government's IT rules, obscene or offensive statement made against a person, religion, community or nation is a punishable offense, and legal action would be taken against people who indulge in such activities.

Latest News

PM Modi presents Putin with Bhagavad Gita, chess set, and silver horse

Cultural ties strengthened: PM Modi presents Putin with Bhagavad Gita, chess set, and silver horse

Image for representational purpose only, Courtesy Vocal Media

Bihar to get ‘Special Economic Zones’ in Buxar and West Champaran

Thirupparankundram Karthigai Deepam utsav

Andhra Pradesh: AP Dy CM Pawan Kalyan reacts to Thirupparankundram row, flags concern over religious rights of Hindus

23rd India-Russia Annual Summit

India-Russia Summit heralds new chapter in time-tested ties: Inks MoUs in economic, defence, tourism & education

DGCA orders probe into IndiGo flight disruptions; Committee to report in 15 days

BJYM leader Shyamraj with Janaki

Kerala: Widow of BJP worker murdered in 1995 steps into electoral battle after three decades at Valancherry

Russian Sber bank has unveiled access to its retail investors to the Indian stock market by etching its mutual fund to Nifty50

Scripting economic bonhomie: Russian investors gain access to Indian stocks, Sber unveils Nifty50 pegged mutual funds

Petitioner S Vignesh Shishir speaking to the reporters about the Rahul Gandhi UK citizenship case outside the Raebareli court

Rahul Gandhi UK Citizenship Case: Congress supporters create ruckus in court; Foreign visit details shared with judge

(L) Kerala High Court (R) Bouncers in Trippoonithura temple

Kerala: HC slams CPM-controlled Kochi Devaswom Board for deploying bouncers for crowd management during festival

Fact Check: Rahul Gandhi false claim about govt blocking his meet with Russian President Putin exposed; MEA clears air

Load More
  • Privacy
  • Terms
  • Cookie Policy
  • Refund and Cancellation
  • Delivery and Shipping

© Bharat Prakashan (Delhi) Limited.
Tech-enabled by Ananthapuri Technologies

  • Home
  • Search Organiser
  • Bharat
    • Assam
    • Bihar
    • Chhattisgarh
    • Jharkhand
    • Maharashtra
    • View All States
  • World
    • Asia
    • Africa
    • North America
    • South America
    • Europe
    • Australia
  • Editorial
  • Operation Sindoor
  • Opinion
  • Analysis
  • Defence
  • Culture
  • Sports
  • Business
  • RSS @ 100
  • Entertainment
  • More ..
    • Sci & Tech
    • Vocal4Local
    • Special Report
    • Education
    • Employment
    • Books
    • Interviews
    • Travel
    • Health
    • Politics
    • Law
    • Economy
    • Obituary
  • Subscribe Magazine
  • Read Ecopy
  • Advertise
  • Circulation
  • Careers
  • About Us
  • Contact Us
  • Policies & Terms
    • Privacy Policy
    • Cookie Policy
    • Refund and Cancellation
    • Terms of Use

© Bharat Prakashan (Delhi) Limited.
Tech-enabled by Ananthapuri Technologies