Cyber Warfare and Strategic Stability in South Asia: A Securitization Analysis of India–Pakistan Cyber Incidents (2016 –2025)
DOI:
https://doi.org/10.63468/jpsa.4.1.44Keywords:
Cyberspace, Warfare, Existential Threat, Security, Securitization Theory, FramingAbstract
The strategic competition between India and Pakistan has grown significantly as a result of their cyberwarfare. Critical cyber-attacks and espionage are replacing their neutral utilization of digital innovations. This study would examine how India and Pakistan have securitized cyberspace via the prism of securitization theory, which attempted to explain how both countries have defined cyberspace as an existential threat that necessitates drastic measures. It looks at the major cyberattacks that occurred between 1999 and 2025, including malware, espionage, website hacking, and attacks on government and military networks. To analyze the core components of securitization theory such as referent objects of digital sovereignty and critical infrastructure, the presence of securitizing actors, and a process of framing cyber threats as existential in character, this study uses qualitative content analysis of cybersecurity reports, academic research, government documents, and open-source intelligence. According to the report, both countries have justified increased monitoring, the development of offensive capabilities in cyberspace, and cyber militarization by pointing to cyber events. This research is significant because it combines the ideas of strategic regional instability and cyber conflict, as well as the idea that the digital world should follow certain norms. By following the strategic logic of the designated cyber activities, the study also contributes to the understanding of cyber deterrence, escalation dynamics, and the absence of formalization in the interstate contacts in the cyber sector in South Asia. Cyberspace will become a unregulated battlefield in the existing inadequate security system unless both governments demonstrate a shared interest in some bilateral cyber confidence-building measures and join global cyber rules.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Jannat Naseeb, Dr. Syedah Sadia Kazmi

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.



