Internal Security For UPSC GS Paper 3 PCS Simplified English Medium
Internal Security For UPSC GS Paper 3 PCS Simplified English Medium
INDEX
Sr. No. TOPIC PAGE No.
Extremism
Security Challenges
5. Cybersecurity 59-70
QUESTIONS
Page |2
Non-State Actors
• Definition: Individuals or organizations that exert influence on domestic or international events without
formal state backing.
• Role in Internal Security:
o Operate independently or in loose networks.
o Can destabilize society by engaging in criminal activities, terrorism, or propaganda.
Naxalism:
Location & Socioeconomic Context: Originated in the Naxalbari region of West Bengal (1967).
• Key Grievances: Exploitation of poor peasants and tribal communities by landlords, moneylenders, and
corrupt officials.
• Catalyst: Communist revolutionaries led by Charu Mazumdar mobilized the discontented masses against
“class enemies.”
Initial Uprising (1967):
• Violent attacks on landlords and moneylenders.
• Triggered state retaliation, which led to a cycle of violence.
• Even though it was contained locally within weeks, it inspired similar movements in other parts of India.
2. Security Measures
Operational Strategies
• Ban on CPI (Maoist): Designated a terrorist organization under UAPA (1967).
• Forces Deployment:
o Central Armed Police Forces (CAPFs) and India Reserve (IR) Battalions (67 battalions sanctioned; 53
raised).
o Special Forces: Greyhounds (Telangana), Black Panthers (Odisha), COBRA (CRPF).
• Intelligence Strengthening:
o Multi-Agency Centres (MAC/SMACs) for real-time data sharing.
o Joint Command Centres in Jagdalpur (Chhattisgarh) and Gaya (Bihar).
• Counter-IED Measures:
o SOPs for handling IEDs; specialized training for CAPFs and police.
• Modernization of Police:
o Funding for training, weapons, and infrastructure under Modernization of Police Forces Scheme.
o Special Infrastructure Scheme (SIS): Fortification of 250 police stations (206 completed by 2024).
3. Development Initiatives
Infrastructure & Connectivity
• Road Projects:
o Road Requirement Plan-I (RRP-I): 5,148 km roads and 8 bridges completed.
o Road Connectivity Project: 12,163 km sanctioned; 8,904 km completed.
• Digital Connectivity:
o LWE Mobile Tower Project: 13,412 towers installed (Phases I & II).
P a g e | 13
• Electrification: Deen Dayal Upadhyay Gram Jyoti Yojana (DDUGJY) for rural power access.
Social & Economic Programs
• Employment: MGNREGA (rural jobs), Pradhan Mantri Kaushal Vikas Yojana (PMKVY) (skill
development).
• Education: Eklavya Model Residential Schools (EMRS) and Sarva Shiksha Abhiyan (SSA).
• Special Central Assistance (SCA): ₹3,450 crore released for infrastructure in LWE districts.
4. Tribal Empowerment
• Legal Safeguards:
o PESA Act 1996 and Forest Rights Act (FRA): Protect land rights and promote self-governance.
• Resource Rights:
o District Mineral Foundation (DMF): Ensures tribal communities benefit from local mineral wealth.
o Integrated Action Plan (IAP): Funds for healthcare, education, and livelihoods.
• Youth Engagement:
o Tribal Youth Exchange Programme (TYEP): 25,880 tribal youth trained (2006–23) in skill
development and cultural exposure.
5. SAMADHAN Doctrine
The SAMADHAN Doctrine is a comprehensive tactical framework formulated by the Ministry of Home Affairs to
counter Left Wing Extremism (LWE). It emphasizes a strategic blend of leadership, intelligence, technology, and
financial control to effectively curb extremist activities.
Way Ahead
Political Solutions
• Activate Tribal Advisory Councils:
o Functionalize councils under the Fifth Schedule to ensure tribal concerns are integrated into
governance.
• Strengthen Forest Rights Act (FRA), 2006:
o Reform FRA to truly empower tribal communities and prevent bureaucratic exploitation.
• Enact Strong Anti-Corruption Legislation:
o Tackle corruption among officials and politicians to build local trust.
• Dialogue with Marginalized Groups:
o Initiate sincere, continuous dialogue (with help from civil society) to bridge gaps between government
and local populations.
Administrative Solutions
• Selective and Motivated Postings:
o Deploy experienced, committed officers to Naxal-affected districts with special incentives.
• Community Involvement in Development:
o Engage local communities in planning and implementation of development projects to foster
ownership.
• Upgrade State Security Forces:
P a g e | 15
o Enhance training and equipment specifically tailored for counter-insurgency.
• Uniform Surrender and Rehabilitation Policy:
o Develop a central model policy to standardize rehabilitation and ensure smooth reintegration of
surrendered Naxalites.
Conclusion
• Existing Gaps:
o Lack of coordination, weak rehabilitation efforts, and disconnect between civilian administration and
security forces hinder lasting progress.
• Learning from Success:
o The Andhra Pradesh model demonstrates that combining law and order measures with socio-
economic development can effectively counter Naxalism.
• Future Focus:
o Political, administrative, and socio-economic reforms are essential to address underlying grievances
and achieve lasting peace in affected regions.
Challenges in Implementation
1. Limited Powers of TAC: Lacks legislative and executive powers like Autonomous District Councils (Sixth
Schedule).
2. Unclear Composition & Role: No clarity on the remaining ¼ members of TAC.
3. Governor’s Discretionary Powers: Ambiguity on whether the Governor can act independently or on
ministerial advice.
4. Encroachment of Tribal Lands: Weak land protection leads to exploitation by non-tribals.
5. Political Interference: State governments often frame TAC rules, allowing political manipulation.
Challenges in Implementation
• Limited Coverage – Tribals in non-Scheduled Areas don’t get PESA benefits.
• Lack of Awareness – Many tribal communities are unaware of their rights.
• Resource Constraints – Gram Sabhas lack funds and trained personnel.
• Political Interference – Decisions of Gram Sabhas are often overruled.
• Legal Conflicts – Overlaps with Forest Rights Act, Wildlife Protection Act, etc.
P a g e | 18
PESA is a landmark law that recognizes tribal autonomy and self-governance. However, its full potential remains
unrealized due to poor implementation. Strengthening awareness, resource allocation, and political commitment is
crucial to ensuring the true empowerment of tribal communities.
1. Insurgency
• Organized armed rebellion against a recognized authority (e.g., government) to achieve political/ideological
goals of separatism, autonomy, or political change.
• Key Traits:
o Large-scale, sustained conflict with control over territory.
o Uses guerrilla warfare, propaganda, and sometimes terrorism.
o Aims to replace or reform the existing system.
• Example: Naxalite Movement in India (Maoist insurgency), Kashmir Insurgency (some groups seek
independence or merger with Pakistan), Taliban in Afghanistan (initially an insurgency against foreign forces
and Afghan govt.)
2. Militancy
• The use of violent, aggressive tactics to further political, ideological, or religious objectives.
• Key Traits:
o Narrower scope than insurgency; may lack territorial control.
o Targets state forces, symbols, or rival groups (not always civilians).
o Can be part of insurgencies or operate independently.
o More region-specific than insurgency.
o May be linked to larger political movements but often lacks a structured military strategy.
o Primarily uses hit-and-run tactics and small-scale armed attacks.
• Example: Khalistani Militancy in Punjab (1980s-90s). Militant groups in the Northeast India (e.g., ULFA,
NSCN). Militant farmer movements or extremist labor unions.
3. Terrorism
• Definition: Use of violence or intimidation against civilians/non-combatants to instill fear and achieve
ideological/political objectives.
• Key Traits:
o Deliberate targeting of civilians to spread terror.
o No territorial control; relies on asymmetrical tactics (bombings, hijackings).
o May lack a clear political structure (e.g., lone-wolf attacks).
P a g e | 19
• Example: 26/11 Mumbai Attacks (Lashkar-e-Taiba), ISIS and Al-Qaeda attacks globally, Suicide bombings
by Boko Haram in Nigeria.
Bottomline:
• Insurgency = War against the state.
• Militancy = Aggressive armed activism. Militants use force to further a cause, but their scope is more
localized.
• Terrorism = Fear-driven violence against civilians. Terrorists seek to spread fear among civilians and
destabilize societies.
1. Objectives
• Insurgency: Focuses on broader political goals like overthrowing the government, gaining autonomy, or
driving social change. Example: Naxalite movement or Naga insurgency.
• Militancy: Often driven by ideological or religious objectives with an emphasis on immediate political
grievances or revenge. Example: ISIS or Khalistan-linked militant activities.
2. Tactics
• Insurgency: Utilizes guerrilla warfare, hit-and-run tactics, and sabotage to exhaust state forces. They may
also provide social services to gain local support.
• Militancy: Primarily employs acts of terrorism such as bombings, assassinations, and hostage-taking to instill
fear and force political concessions.
3. Recruitment
• Insurgency: Draws support from marginalized local populations, promising political representation or
economic upliftment.
• Militancy: Often recruits based on ideological or religious sentiments, leveraging radicalization through
social media, religious institutions, or community networks.
4. Scope
• Insurgency: Tends to operate on a larger scale with organized structures resembling a parallel government in
some cases.
• Militancy: Usually functions in smaller, decentralized cells with an emphasis on rapid, disruptive actions.
• In some cases, insurgent groups may adopt militant tactics, especially in response to aggressive state actions
or evolving conflict dynamics. This merging often leads to increased radicalization and heightened violence.
Example Distinction
• Naxalite Movement (Insurgency): Focuses on overthrowing the Indian state through prolonged guerrilla
warfare.
• ISIS (Militancy): Pursues extreme ideological goals using terrorist tactics to spread fear and chaos.
• Meghalaya:
o The region is generally peaceful.
o Bru Rehabilitation Program
o Relocation & Housing: 6,935 Bru families have been relocated to 12 designated resettlement
sites, 6,206 houses have been completed as part of this initiative.
o Immigration: There are ongoing concerns regarding the immigration of outsiders.
o Ethnic Conflicts & Statehood Demands:
▪ Tensions exist between the Khasis and the Garos.
▪ There is a demand for a separate state called Garoland.
o Security Measures: Only limited areas are under the provisions of ASFPA (Armed Forces
Special Powers Act).
• Nagaland:
• NSCN Factional Split: Major factions: NSCN (IM) and NSCN (K). Other factions currently under
ceasefire.
• Geographic Base: Active groups are predominantly based in Myanmar.
• Distinct Identity: They maintain a separate flag and constitution.
• Incident Statistics (2023)
▪ 35 insurgency incidents reported.
▪ 1 civilian death recorded.
▪ 161 insurgents arrested.
▪ 68 arms recovered from operations.
• Support from China:
o Both NSCN factions receive backing from China.
o Paresh Baruah is reportedly hiding in China.
• Demands & Future Needs
• Greater Nagalim: The insurgent groups demand an expanded Naga homeland.
• Arunachal Pradesh:
o Indigenous Insurgency: No active indigenous insurgent groups.
o Spill-Over Effects: Affected by insurgency spill-over from NSCN and ULFA in border areas,
Considered a safe haven for insurgents.
o Incident Statistics (2023)
▪ 13 incidents recorded.
P a g e | 22
▪ Casualties: 2 civilians and 1 SF personnel killed.
▪ 42 cadres surrendered.
o Recent Concerns: Growing worry about insurgent activities spilling in from neighboring states.
• Manipur:
o Insurgent & Ethnic Landscape
o Multiple Insurgent Groups:
▪ Involvement of Meitei, Naga, Kuki, Zomi, and Hmar insurgent factions.
o Ethnic Dynamics:
▪ Meitei tribes dominate the valley, controlling the state's politics and economics.
▪ Ongoing tensions: Nagas and Kukis versus Meitis, along with the Kukiland demand.
▪ More than 40 ethnic groups vie for dominance in the region.
o Ethnic Violence & Incident Overview
▪ Notable Ethnic Conflict:
• Violence between Meitei and Kuki communities on 03.05.2023.
▪ 2023 Violence Statistics:
• Manipur accounted for 77% of NE violent incidents (187 out of 243 incidents).
• Outcomes:
o 33 insurgents killed
o 184 insurgents arrested
o 80 cadres surrendered
o Peace Processes & Agreements
▪ Historic Peace Accord:
• A peace accord with the United National Liberation Front (UNLF) was signed on
29.11.2023.
• This accord is partly attributed to mitigating the effects of insurgency spillover from
Nagaland.
o Underlying Challenges
▪ Economic & Employment Issues: Lack of employment opportunities exacerbates regional
tensions.
▪ Security Force Conduct: Reports of high-handedness by security forces add to grievances.
▪ Agricultural Challenges: The practice of Jhum cultivation remains a significant problem
affecting local livelihoods.
• Colonial Legacy:
o Many North East regions were not directly governed by the British, creating a sense of alienation
from post-colonial Indian governance.
o This historical disconnect has fueled persistent insurgent sentiments.
2. Geographical Factors
P a g e | 23
• Challenging Terrain:
o Rugged hills and dense forests provide ideal conditions for guerrilla warfare, complicating state
control.
• Porous Borders:
o Shared borders with Myanmar, Bangladesh, Bhutan, and China enable insurgents to access safe
havens and engage in cross-border smuggling.
• Infrastructure Development Challenges:
o Difficult terrain hampers the construction and maintenance of infrastructure, isolating the region from
the rest of India.
3. Socio-Economic Factors
• Lack of Industrialization:
o Economic underdevelopment and scarce industrial opportunities result in high unemployment,
particularly among the youth, making insurgent recruitment easier.
• Deficient Infrastructure:
o Inadequate access to education, healthcare, and electricity reinforces dissatisfaction with the state and
contributes to anti-government sentiments.
4. Political Factors
6. External Factors
• Foreign Influence:
o Allegations persist that external actors, particularly China and Pakistan’s ISI, provide arms, training,
funds, and safe havens, sustaining insurgent activities.
The insurgency in North East India stems from a complex interplay of historical marginalization, geographical
isolation, socio-economic deprivation, political grievances, cultural alienation, and external interference.
Addressing these root causes through holistic development, inclusive political processes, and enhanced
border management is key to resolving the insurgency and bringing lasting peace to the region.
Consequences of insurgency
The ongoing insurgency in North East India has resulted in widespread negative impacts across multiple dimensions,
affecting not only the local population but also the nation at large.
1. Internal Displacement:
P a g e | 24
• Displacement of Population: Insurgency-induced conflicts have led to mass displacement of communities,
forcing many to leave their homes and livelihoods behind, creating refugee-like situations within their own
country.
2. Psychological Impact:
• Public Psyche Wounded: The frequent occurrences of kidnapping, extortion, and killings have instilled a
pervasive sense of fear and insecurity among the population. The constant threat of violence has scarred the
collective psyche of the region.
3. Human Rights Violations:
• Violation of Civilian Rights: Innocent civilians have become victims of human rights abuses by both
insurgents and security forces. Extra-judicial actions by security forces have been common due to the
inefficiency of the criminal justice system in handling insurgency.
4. Impact on Development:
• Infrastructure Damage: Insurgents frequently target critical infrastructure such as gas pipelines, railways,
and hospitals, disrupting development projects and creating a challenging environment for economic
progress.
• Diversion of Development Funds: A significant portion of development funds is often siphoned off by
insurgent groups, depriving the region of much-needed financial resources for growth.
5. Economic Consequences:
• Business Failure: Many businesses have either collapsed or left the region due to constant extortion by
insurgent groups, leading to a shrinking of the local economy.
• Decline in Tourism: The tourism industry in the region has suffered significantly, depriving the area of
potential employment opportunities and constructive engagement for the youth.
6. Strategic Setback:
• Hindrance to Look East Policy 2.0: Insurgency has jeopardized India’s plans to strengthen links with
South East Asia, including its "Look East Policy 2.0," impacting economic and strategic goals.
2. Developmental Initiatives:
• Dedicated Ministry: The formation of the Ministry of Development for North East Region (DoNER)
ensures a focused approach to the region’s development.
• Infrastructure Projects: Large-scale projects like the Trilateral Highway and the Kaladan Multimodal
Transport Project aim to improve connectivity and spur economic development.
• Economic Missions: Schemes like the National Bamboo Mission and the National Horticulture Mission
seek to bring sustainable economic growth while preserving the environment.
• Border Trade Initiatives: The promotion of border haats and the establishment of Integrated Check Posts
(ICPs) with Bangladesh encourage cross-border trade and strengthen cultural ties.
Conclusion
• Holistic Security Framework:
o The government’s multi-pronged strategy in the NE integrates robust security measures, intelligence
sharing, inter-state coordination, modernized police forces, and targeted developmental initiatives.
• Positive Outcomes:
o Significant reductions in insurgency incidents, casualties, and an increase in the surrender of insurgent
cadres.
• Focus Areas for Continued Efforts:
o Rehabilitation and reintegration of surrendered insurgents.
o Enhancing connectivity and infrastructure.
o Continued community outreach and civic action.
o Strict regulation of arms and continuous monitoring of security dynamics.
3. Objective of AFSPA
• Based on Article 355 of the Constitution:
o The Union has a duty to protect states from internal disturbances.
o Enables the Central Government to declare disturbed areas and deploy armed forces.
1. Use of Force
o Can fire upon or use force, even if it causes death, after due warning.
P a g e | 28
2. Destruction of Suspected Locations
o Can destroy arms dumps, hideouts, fortified positions, training camps.
3. Arrests Without Warrant
o Can arrest anyone suspected of committing a cognizable offense.
o Use of force allowed if required.
4. Search & Seizure
o Can enter & search premises without a warrant.
o Can seize arms, ammunition, explosives.
5. Vehicle/Vessel Check
o Can stop & search vehicles/vessels suspected of carrying armed militants.
6. Handover to Police
o Any arrested person must be presented to the police with least delay.
• No prosecution, suit, or legal proceeding can be initiated against army personnel without prior sanction
from the Central Government.
8. Way Forward
• Increased Transparency – Military must investigate violations and punish offenders.
• Periodic Review – Disturbed area status should be reassessed every 6 months.
• Balancing Security & Human Rights – AFSPA should be modified to ensure strict accountability.
• Trust-Building Measures – Encourage civilian-police cooperation over excessive militarization.
Terrorism
• Systematic use of violence to create a climate of fear in a population to achieve a particular political
objective.
• Unlawful use or threatened use of violence against civilians, often to fulfill political, religious, or
ideological goals.
Terrorism in India
Jammu and Kashmir Militancy
Roots of Insurgency in J&K
• Began in late 1940s when Pakistan attacked India to capture Jammu & Kashmir.
• Persistent secessionist movements within J&K, aided and abetted by Pakistan.
• Post-1971 war: Secessionist activities reduced but resurfaced in the 1980s with large-scale infiltration and
insurgency.
• 1990s:
o Large-scale deployment of security forces to combat insurgency.
o Rise of Islamist fundamentalism and Al-Qaeda-inspired groups.
o Pakistan-based terror groups like Lashkar-e-Taiba (LeT), Jaish-e-Mohammed (JeM), Harkat-
ul-Mujahideen (HuM), HUJI, and Al-Badr became active.
o Formation of JeM by Masood Azhar, who was released during IC-814 hijacking negotiations.
2. Religious Fundamentalism
3. Ethnic Conflicts
4. Political Factors
6. Economic Factors
Kinds of Terrorism
1. State-Sponsored Terrorism
State-sponsored terrorism refers to government support of violent non-state actors engaged in terrorism in other
countries.
Characteristics:
• Used as a deliberate instrument of foreign policy.
• Aimed at achieving clear foreign policy objectives, rather than merely grabbing media attention.
• Operates under fewer constraints, causing greater casualties.
• A cost-effective alternative to war, making accountability difficult.
Examples:
P a g e | 33
• Pakistan’s Proxy War in India: Support to terrorist organizations like Lashkar-e-Taiba (LeT), Jaish-e-
Mohammed (JeM), etc.
• Cold War Era: The U.S. supported anti-communist rebels, including the Mujahideen during the Soviet-
Afghan War.
• Soviet Union: Also engaged in funding and supporting armed groups in rival states.
• Iran, Iraq, North Korea, Sudan, and Libya: Have been accused of sponsoring terrorism against their
adversaries.
Characteristics:
• Operate independently but often receive indirect support from enemy states.
• Provide states with deniability.
Examples:
• Naxalites in India
• Lashkar-e-Taiba (LeT)
• Liberation Tigers of Tamil Eelam (LTTE)
• 26/11 Mumbai Attacks: The role of Pakistan's ISI in supporting non-state actors is well-documented.
3. Ideology-Oriented Terrorism
A. Left-Wing Terrorism
• Driven by Marxist and communist ideologies, targeting the ruling elite.
• Seeks to overthrow capitalist systems through violent revolution.
• Examples: Maoists in India and Nepal.
B. Right-Wing Terrorism
• Aims to maintain the status quo or return to a perceived "ideal past."
• Often associated with nationalist, racist, or xenophobic ideologies.
• Examples:
o Nazi Germany under Hitler.
o Fascists in Italy under Mussolini.
o White supremacy movements like the Ku Klux Klan (KKK) in the U.S.
C. Religious Terrorism
• Driven by the belief that violence is a divine duty or sacramental act.
• Example: Jihadi terrorism in various parts of the world.
D. Ethno-Nationalist Terrorism
• Involves violence by ethnic groups demanding separate statehood or dominance.
• Examples:
o Tamil Nationalist groups in Sri Lanka.
o Insurgent groups in Northeast India.
P a g e | 34
New Front Terror Organisations & Hybrid Terrorism
Targeted Killings
• Security personnel, Kashmiri Pandit government employees, and migrants have been specifically targeted in
J&K.
• Objective: To create fear and disrupt communal harmony.
Characteristics:
• Operate in small, loosely structured cells.
• Avoid social media exposure (unlike past terrorist groups).
• Lack advanced training—limited to using handguns and escaping.
• Target soft victims (unarmed civilians, off-duty security personnel).
• Not capable of large-scale or complex attacks.
2. Information Warfare
• Information warfare plays a key role in radicalization and propaganda.
• Pakistan and Turkey actively support propaganda against India.
• Tactics used in information war:
o Spreading fabricated stories to manufacture victimhood.
o Amplifying small incidents and blowing them out of proportion.
o Eliminating any Kashmiri who challenges the Pakistani narrative.
o Using social media platforms, online magazines, and pamphlets (in Hindi and other languages) to
spread jihadist propaganda.
A. Chemical Weapons
• Includes toxic chemicals like ricin, sarin, botulinum toxin, and nerve agents.
• Example: Chemical Weapons Convention (1993) restricts their use.
B. Nuclear Weapons
• Terrorist groups seek nuclear materials, but enrichment complexities limit access.
• Example: Al-Qaeda's attempts to acquire nuclear weapons.
3. Cyber Terrorism
Terrorism involving cyber-attacks against critical infrastructure.
4. Suicide Terrorism
• Attacks where terrorists willingly sacrifice their lives to inflict maximum damage.
Examples:
Examples:
Effects of Terrorism
Terrorism has far-reaching consequences that impact a country’s economy, society, governance, and politics. It
disrupts development, weakens governance structures, and creates psychological trauma among citizens. Below is an
analysis of its key effects:
1. Economic Effects
a) Disruption of Economic Activities
• Conflict and terrorism have hindered the economic growth of regions like Jammu & Kashmir.
• The industrial sector remains underdeveloped due to constant instability.
P a g e | 37
b) Damage to Property
• 9/11 attacks caused massive destruction of lives and infrastructure, with the Twin Towers reduced to
rubble.
• Blasts in Indian cities like Delhi and Mumbai have resulted in significant loss of property and human
lives.
e) Decline in Investments
• Investors hesitate to invest in terror-prone countries due to uncertainty.
• However, strategic projects like CPEC (China-Pakistan Economic Corridor) show that foreign
investments may still flow in, despite terrorism, if other economic incentives exist.
2. Psychological Effects
• Survivors and affected families suffer from acute stress disorder (ASD) and post-traumatic stress disorder
(PTSD).
• Psychological trauma lingers for years, impacting both victims and witnesses.
3. Political Effects
a) Non-engagement of Youth in Politics
• Radicalization leads to youth disengagement from politics and involvement in militant groups.
• Example: Youth in Kashmir are often misled by terror propaganda.
• The killing of Burhan Wani (2016) and low voter turnout in the 2017 Srinagar by-polls highlight
disillusionment with democracy.
4. Governance Effects
a) Erosion of Faith in Government
• In conflict zones like Kashmir, people lose trust in state institutions, leading to anti-government protests
and unrest.
• Example: Frequent incidents of stone-pelting in Kashmir show discontent with governance.
5. Social Effects
a) Disintegration of Society
• Terrorism creates deep divisions within society, forcing people to flee their homes.
• Example:
o Kashmiri Pandit exodus (1990s) due to insurgency.
o Tribal communities in Naxal-affected areas suffer harassment from both Maoists and security
forces.
The 26/11 attacks forced India to redefine its counterterrorism approach. The measures taken have significantly
strengthened India's intelligence-sharing, rapid response, coastal security, and counterterrorism infrastructure.
While challenges remain, these steps have enhanced India's preparedness against future threats.
Terror Financing
1. Importance of Countering Terror Financing (TF)
A. External Sources
• Counterfeit Currency: Fake Indian Currency Notes (FICN) produced in Pakistan and smuggled through
Nepal, Bangladesh, and Myanmar.
• Drug Trafficking (Narco-Finance): Afghanistan is a major opiate hub, with Pakistani groups exploiting drug
money for TF.
• Charities, NGOs & Donations:
o Radical charities and NGOs (e.g., Jamaat-ud-Dawa) collect funds under the guise of social work.
o Religious donations (Zakat) are sometimes diverted for TF.
o Funds flow into India through hawala networks, cash transactions, and legal banking routes.
• Diaspora Contributions:
o Some extremist elements within the diaspora financially support terrorist groups.
o Post-disaster relief efforts (e.g., after the 2005 Pakistan earthquake) have been misused for TF.
• Remittances:
o Gulf-based financiers have supported groups like SIMI & Indian Mujahideen.
o Large foreign remittance inflows into Kerala have raised concerns.
• State Sponsorship:
o Pakistan’s ISI directly funds terrorist activities, including the 26/11 Mumbai attacks.
o Uses charities, drug trafficking, counterfeiting, and zakat for TF.
B. Internal Sources
B. International Cooperation
C. Policy Interventions
• Demonetization (2016):
o Aimed to curb black money and terror financing.
o Though not a complete solution, it disrupted hawala and counterfeit currency networks.
• Regulation of NGOs & Donations:
o Foreign Contribution (Regulation) Act (FCRA) monitors foreign funding of NGOs.
• Suspicious Transaction Reporting & Financial Intelligence:
o Banks and financial institutions required to report high-risk transactions.
o FIU-IND tracks and analyzes financial data related to TF.
Counter-Terrorism Strategy
1. Preparedness Against Terrorism
• Intelligence Gathering: Crucial for prevention; NATGRID aids intelligence collation post-26/11.
• Training: CIATs established for counterterrorism training.
• Mock Drills: Regular security drills in vulnerable areas to minimize casualties.
• Securing Key Installations: Protection of army bases, police stations, and national buildings (e.g.,
Pathankot, Uri attacks).
2. Counter-Terrorism Operations
• Rapid Response: NSG plays a key role, but SOPs need standardization (e.g., Pathankot operation).
• Investigations: NIA is the primary agency; needs strengthening for better prosecution.
• Prosecution: Speedy and fair trials; false cases should be prevented.
3. Comprehensive Strategy to Counter Terrorism
P a g e | 42
• Multi-Pronged Approach: Socio-economic development and security must go hand in hand.
• Political Consensus: National strategy with state-specific plans for effective implementation.
• Good Governance & Development: Clean, corruption-free administration for effective policy
execution.
• Rule of Law: Government agencies must operate within legal frameworks, enacting new laws if needed.
• Countering Subversion: Address terrorist and Maoist propaganda using psychological warfare and
media management.
• Legal Framework: Special laws required to prosecute terrorists, ensuring safeguards against misuse.
• Capacity Building: Strengthening intelligence, security agencies, civil administration, and society.
• Crisis Management: A strategy covering prevention, mitigation, relief, and rehabilitation.
4. Role of Citizens, Civil Society & Media
• Education:
o Addresses root causes of alienation and discord.
o Madrassas should promote the true essence of Islam to counter jihadist propaganda.
o Changing mindsets through education to foster peace.
• Civil Society:
o Recognized in the UN Global Counter-Terrorism Strategy (2006).
o NGOs & local groups can provide grassroots intelligence.
o Advisory role in awareness campaigns and community healing.
• Media:
o Can shape public opinion positively or negatively.
o Terrorists exploit media coverage for publicity.
o A responsible media policy should ensure transparency, fairness, and self-restraint.
P a g e | 43
Direct destruction:
• Extremist violence: Attacks on infrastructure like schools, hospitals, and businesses cripple communities
and hamper economic progress.
o Naxalite-Maoist Insurgency: Attacks on infrastructure in Chhattisgarh, Jharkhand, and Odisha. For
instance, in 2021, Maoists burned a school in Sukma, Chhattisgarh, and frequently sabotage railway
tracks to disrupt government operations.
o Kashmir Conflict: Militant attacks on businesses and telecom infrastructure, such as the 2022
targeted killing of non-local laborers and traders, crippling economic activity.
• Displacement and migration: People fleeing violence lose homes, livelihoods, and access to essential
services, further straining resources.
o Kashmiri Pandit Exodus (1990s): Over 300,000 Hindus fled Kashmir due to militant threats,
losing homes and livelihoods.
o Northeast Displacement: Ethnic clashes in Manipur (2023) and Assam (Bodo conflicts) forced
thousands into camps, straining resources in cities like Guwahati.
• Disruption of trade and investment: Instability and insecurity scare away investors and businesses,
hindering economic growth.
o Jammu & Kashmir Tourism Decline: Militancy reduced tourist footfall from 1.2 million
(2012) to near-zero during peak conflict periods.
o Mining in Red Corridor: Rich mineral reserves in Dantewada (Chhattisgarh) remain untapped
due to Maoist threats, deterring companies like NMDC.
Indirect impacts:
• Increased militarization: Governments divert resources from development towards security, neglecting
crucial sectors like education and healthcare.
o Heavy military presence diverts funds from development. Reimbursement under the Security
Related Expenditure (SRE) scheme is recurring and continuous in nature. In last 05 years Rs.
1685.65 crore have been released to the Left Wing Extremism (LWE) affected states.
P a g e | 44
• Eroding trust and social cohesion: Fear and division make it difficult for communities to cooperate and
work together for progress.
o Manipur Ethnic Clashes (2023): Meitei-Kuki violence disrupted cooperative farming and trade.
• Restrictions on freedom and education: Extremism often seeks to control information and suppress
dissent, hindering critical thinking and innovation.
o Internet Shutdowns in Kashmir: Frequent blackouts (e.g., post-2019 Article 370 revocation) limit
access to education and dissent.
o Attacks on Schools: Maoists bomb government schools in Jharkhand to oppose "state
propaganda," depriving children of education.
• Psychological trauma: Violence and fear leave deep scars on individuals and communities, hindering
their ability to participate in development efforts.
o Nearly 1.8 million adults (45% of the population) in the Kashmir Valley show symptoms of
significant mental distress according to a comprehensive mental health survey conducted by the
medical humanitarian organisation Médecins Sans Frontières/Doctors Without Borders (MSF)
between October and December 2015.
• Radicalization of youth: Young people exposed to extremist narratives lose opportunities for education
and positive engagement, perpetuating the cycle of violence.
o Kashmir Militancy: Burhan Wani’s death (2016) spurred youth recruitment into groups like
Hizbul Mujahideen.
o Online Radicalization: Kerala cases (e.g., 2016 ISIS recruitment) show vulnerable youths
targeted via social media.
• Environmental degradation: Conflict often leads to unsustainable resource exploitation and pollution,
harming the environment and impacting livelihoods.
o Illegal Mining in Bastar: Maoists exploit forests for funding, causing deforestation.
o Oil Spills in Assam: ULFA militants sabotage pipelines, polluting ecosystems (e.g., 2020
Dibrugarh spill affecting Brahmaputra tributaries).
Broken Ground:
• Weak governance and corruption: When institutions fail to address people's concerns and corruption
runs rampant, trust erodes. This creates a vacuum where extremist groups can promise security and
justice, even if through violent means. Kanglei Yawol Kanna Lup
P a g e | 45
o MGNREGA Scams in Odisha: Funds meant for rural employment are siphoned by corrupt
officials, leaving villagers jobless and angry. Maoists exploit this to recruit (e.g., Koraput
district).
• Discrimination and marginalization: Feeling excluded based on religion, ethnicity, or other factors
breeds alienation and fuels the perception of "us vs. them." This makes individuals more likely to join
groups claiming to champion their identity and fight for their rights.
• Conflicts and instability: Ongoing violence and insecurity create chaos and fear. This breakdown of
social order weakens communities and provides extremist groups with opportunities to recruit and
expand their influence.
o Manipur Ethnic Violence (2023): State failure to address Kuki-Meitei tensions led to arson and
displacement, allowing militant groups (e.g., KNA, UNLF) to expand recruitment.
Solutions:
1. Economic Development
• Skill India with Localized Vocational Hubs
o Implementation: Partner with industries to design
region-specific training (e.g., agri-tech in Punjab,
handicrafts in Kashmir, mining safety in
Jharkhand).
o Example: Telangana’s "KCR Kit" for ITI
graduates includes tools and stipends to start
micro-enterprises.
• Land Rights and Resource Equity
o Implementation: Expedite Forest Rights Act (2006) claims for tribal communities in Maoist-affected
states (Chhattisgarh, Odisha) to reduce alienation.
• SMEs with Conflict-Zone Incentives
o Implementation: Tax holidays and subsidies for SMEs in Jammu & Kashmir, Northeast, and Red
Corridor districts.
2. Social Development
Strategic Actions:
• Universal Basic Services with Conflict Sensitivity
o Implementation: Expand Ayushman Bharat to include trauma care in conflict zones (e.g., mobile
clinics in Manipur).
• Social Inclusion via Grassroots Platforms
o Implementation: Revive "Peace Committees" with mixed ethnic/religious representation (e.g.,
Nagaland’s tribal councils).
• Youth Engagement Beyond Tokenism
o Implementation: Expand "Yuva Sangam" to include conflict-zone youth in national exchange
programs.
3. Governance & Justice
Strategic Actions:
• Anti-Corruption with Tech-Driven Transparency
o Implementation: Mandate social audits for schemes like MGNREGA in high-risk districts using
blockchain (e.g., Andhra’s "Real-Time Monitoring System").
• Decentralized Conflict Resolution
o Implementation: Train panchayats in mediation for land disputes and ethnic tensions (modeled on
Kerala’s "Janamaithri" police initiative).
• Fast-Track Courts for Hate Crimes
o Implementation: Special NIA courts for communal violence and extremist crimes to deter impunity.
By investing in sustainable development, promoting good governance, fostering social inclusion, and countering
violent extremism, we can break the cycle of underdevelopment and extremism, creating a more peaceful and
prosperous future for all.
P a g e | 47
Corrupt public officials, attorneys, and businessmen protect the criminal group through abuses of status or
privilege. Their efforts insulate the group from civil and criminal government actions. Central tool of protection
is Corruption along with a network of corrupt officials shields the group from the justice system.
• Organized Criminal Groups: Aim to gain and enlarge their own profit and achieve economic power,
eventually legalizing these profits.
• Terrorist Groups: Act on idealistic goals aimed at reforming social reality and accomplishing particular
political aims.
3. Visibility of Activities
• Weak Governance:
o Developing countries with weak rule of law are particularly vulnerable to penetration by these
networks.
o Such linkages can lead to state co-option or further weakening of governance.
• Economic & Security Impact:
o Undermines stability and free markets.
o Promotes excessive corruption in governance.
o Example: In Somalia, the control of territory and illegal activities by both groups acts as a force
multiplier, making it harder for security agencies to intervene.
• Resource Sharing & Operational Synergy:
o Close cooperation leads to the sharing of resources, making the combined entities more
dangerous.
o Organized criminal groups provide steady alternate funding, complicating counter-terrorism
efforts.
o Their strong alliance makes it increasingly difficult for law enforcement to capture and dismantle
them.
Regional Linkages
Naxal-Affected Areas
Kashmir
• External Funding:
o Militancy in Kashmir is primarily funded by external state funds rather than through organized
crime.
• Criminal Activities:
o Terror groups in Kashmir are involved in narco-trafficking and smuggling fake currency.
• Operational Support:
o Organized crime supports terror groups with ground workers who help with logistics, fundraising,
propaganda, recruitment, and planning of attacks.
• Counterfeit Operations:
o Terrorists play a major role in circulating counterfeit currency that fuels terrorism and spreads to
other parts of India.
North-East India
Maoist-Affected Regions
Global Initiatives
Media refers to the diverse array of channels, tools, and institutions used to communicate information,
entertainment, education, and cultural content to audiences. It encompasses both traditional forms (e.g., print
newspapers, television, radio) and modern digital platforms (e.g., social media, streaming services, websites).
Democratic nations must balance press freedom with media regulation to prevent internal security challenges. This
balance can be achieved through clear legal frameworks, independent oversight, strict adherence to ethical journalism,
and robust public education on media literacy, ensuring that the media serves as a tool for informed, responsible, and
security-enhancing communication.
CYBERSECURITY
According to the IT Act 2000, Cyber security refers to securing computer devices, networks, and
information stored on them from unauthorized access, disclosure, disruption, modification, or destruction.
Types of Malware
Virus Infects files and spreads when executed. Stuxnet (Targeted Iranian nuclear
plants).
Trojan Disguised as a legitimate program but performs malicious Xafecopy (Bypasses CAPTCHA).
actions.
Spyware Secretly monitors user activity & steals information. Pegasus (Developed by NSO
Group).
Ransomware Encrypts files & demands payment for decryption. WannaCry, Locky Ransomware.
Phishing Fraudulent emails that trick users into revealing sensitive Fake banking emails requesting login
information. details.
Spear Attackers pose as trusted contacts (vendors, auditors) to Business Email Compromise (BEC)
Phishing hack businesses. scams.
9. Social Engineering
• Definition: Manipulating people into revealing confidential information.
• Example:
o Fake social media profiles impersonating friends to trick users into transferring money.
Definition Part of the internet that is not indexed by search A hidden part of the internet requiring
engines. special software to access.
Content Medical records, academic databases, confidential Illegal black markets, hacked data
Examples corporate pages, government records, paywalled exchanges, anonymous forums, illicit
sites. trade.
Legality Mostly legal (private and protected data). Mostly illegal (used for illicit activities).
Loss of Integrity Unauthorized changes to data or IT systems lead to fraud, errors, and loss of
trust.
Loss of Confidentiality Unauthorized disclosure of sensitive data can threaten national security and
public trust.
Physical Destruction Cyber-attacks can cause actual physical damage (e.g., Stuxnet worm targeting
Iranian nuclear facilities).
Impact on Critical Information Cyber-attacks on critical infrastructure (e.g., Mumbai power grid attack by
Infrastructure (CII) China) can disrupt essential services.
P a g e | 64
Financial Loss India was the 2nd most cyber-attack affected country (2016-2018) per Data
Security Council of India.
Impact on National Security Cyber warfare and espionage can destabilize peace and security in a country.
NCIIPC (National Critical Information - Nodal agency (established in 2013) to protect critical infrastructure
Infrastructure Protection Centre) from cyberattacks.
- Identifies risks, develops strategies, and coordinates responses with
stakeholders.
CERT-In (Indian Computer - National cyber emergency response agency working 24x7 to
Emergency Response Team) detect, prevent, and mitigate cyber threats.
- Coordinates with Sector-CERTs (banking, power, healthcare, etc.).
National Cyber Security Coordinator - Senior officer responsible for formulating & implementing cyber
security policy.
- Ensures coordination between government and private agencies.
P a g e | 65
National Cyber Crime Coordination - Investigates cyber crimes with national security implications.
Center (MHA) - Coordinates with law enforcement agencies for prosecution.
Defense Cyber Agency (2019, MoD) - Ensures security of military networks and systems.
NTRO (National Technical Research - Cyber intelligence & threat monitoring for national security.
Organization)
IT Act, 2000 (Amended 2008) - Governs electronic data, digital signatures, transactions, and
cybercrimes.
Cyber Crisis Management Plan - Outlines emergency response strategies for cyber incidents.
(CCMP)
Cyber Surakshit Bharat (2019) Trained 10,000 personnel in government & private sector.
RBI’s UDAAN Exercise Cyber drills for banks to test response strategies.
Global Cyber Security Index (ITU) India ranked 23rd among 165 countries—indicating strong efforts but
room for improvement.
Section 66F (IT Act) Cyber Terrorism – Covers data breaches, infrastructure disruption, theft
of sensitive data, and provides lifetime imprisonment as punishment.
National Cyber Security Policy 2013 Established NCIIPC, workforce training, and cyber crisis management.
P a g e | 66
NCIIPC (National Nodal Agency) Functions under NTRO, secures critical information infrastructure.
Cyber Surakshit Bharat (2018) Awareness & training initiative for Chief Information Security Officers
(CISOs) in government departments.
National Cyber Coordination Generates situational awareness of cyber threats for proactive action.
Centre (NCCC)
Cyber Swachhta Kendra Botnet cleaning & malware analysis center under Digital India
initiative (CERT-In).
Information Security Education & Training programs for cyber security professionals.
Awareness (ISEA)
TECHSAGAR (Cyber Capabilities Developed by NCSC & DSCI—provides data on IoT, AI, and cyber
Portal) capabilities in India.
Data Security Council of India NASSCOM-led industry body focusing on data protection & cyber
(DSCI) security awareness.
Salient Features
1. 24×7 Cyber Threat Response System
o National Critical Information Infrastructure Protection Centre (NCIIPC) to protect critical
sectors.
o CERT-In designated as the nodal agency for cyber crisis management.
2. Threat Intelligence & Crisis Management
o Mechanism to identify, analyze, and respond to cyber threats.
3. Public-Private Partnerships (PPP)
o Enhanced collaboration with industries & academia for cyber defense.
4. R&D and Advanced Cybersecurity Technologies
o Establish Centres of Excellence for cutting-edge research.
5. Cybersecurity Workforce Development
o Cyber training for law enforcement agencies.
o Encourage businesses to appoint a Chief Information Security Officer (CISO).
6. Incentives for Cybersecurity Adoption
o Fiscal benefits for businesses implementing cybersecurity standards.
Way Forward
1. Increased Budgetary Allocation for Cybersecurity
• India should allocate 0.25% of its annual budget for cybersecurity, with a roadmap to increase it to 1% in
the future.
• Additional funding is necessary to enhance cybersecurity infrastructure, research capabilities, and
workforce training.
2. Strengthening Cybersecurity R&D and Industry-Academia Collaboration
• Boost research and development (R&D) to develop indigenous cybersecurity solutions.
• Enhance cooperation between industry and academic institutions to foster innovation in cyber defense
technologies.
3. Building a Robust Cybersecurity Workforce
• Strengthen the workforce by including officers from the Indian Engineering Services (IES) cadre in
cybersecurity roles.
• Conduct nationwide cybersecurity training programs to educate both professionals and the general public
on cyber threats and protection strategies.
4. Regular Cybersecurity Drills and Preparedness
• Government and private agencies should conduct frequent cybersecurity drills to simulate and counter
cyberattacks.
• Establish a National Cyber Emergency Response Framework to deal with large-scale attacks.
5. Updating the National Cyber Security Policy (NCSP) 2013
• The existing NCSP 2013 needs urgent revision to address modern cybersecurity challenges such as:
o AI-based cyber threats
o Cloud security risks
o Ransomware and malware attacks
o Cyber terrorism and state-sponsored attacks
6. Action Plan for State-Sponsored Cyber Attacks
• The government should develop a strategic action plan to counter state-sponsored cyber warfare.
• Focus on protecting critical government and private sector infrastructure from foreign cyber intrusions.
7. Establishing an SOS Lockdown Policy for National Security
• Implement a mechanism to immediately disconnect nuclear grids, power grids, financial institutions, and
satellite communications from the internet in case of a major national security breach.
8. Strengthening Cybersecurity Laws and Judicial Reforms
• Introduce new cybersecurity laws to tackle contemporary threats like data theft, hacking, and digital
fraud.
• Reduce the burden on the judiciary by fast-tracking cybercrime cases and enhancing investigative
capabilities.
9. Enforcing Cybersecurity Standards for the Private Sector
• Cybersecurity guidelines must be mandated for private companies, especially those handling sensitive user
data.
• Develop a standard compliance checklist for businesses to adhere to.
10. Promoting International Cybersecurity Cooperation
• Strengthen bilateral and multilateral collaborations for cyber intelligence sharing.
• Establish joint task forces with international agencies to track and combat global cyber threats.
P a g e | 71
XII. Conclusion
• Integrated Approach:
o Effective border management is a blend of physical security, technological integration, and socio-
economic development.
• Strategic Importance:
o Secures national frontiers, prevents hostile infiltration, and facilitates economic and cultural
exchange with neighboring countries.
• Ongoing Reforms:
o Continued emphasis on modernizing infrastructure, deploying advanced surveillance systems,
and ensuring inter-agency coordination to address emerging challenges.
II. Integrated Check Posts (ICPs) & Land Ports Authority of India
(LPAI)
A. Land Ports Authority of India (LPAI)
• Establishment:
o Recommended by the Cabinet Committee on Security (2006) and formally established in 2012
under an Act of Parliament.
• Objective:
o Develop Integrated Check Posts (ICPs) to provide enhanced border infrastructure.
o House multiple regulatory agencies within one complex.
o Facilitate efficient movement of passengers and goods along international borders.
B. Infrastructural Facilities at ICPs
1. Trade Facilities:
o Warehouse/Refrigerated storage space.
o Duty-free shops, Forex services, cafeterias, parking.
o Cargo complexes, driver rest areas, electronic weighbridges.
o Inspection sheds, CCTV surveillance, and customs facilities.
2. Passenger Facilities:
o Bus services, waiting areas, ATMs, health checkup units.
o Trolley/wheelchair support, washrooms, parking, taxi services.
o Childcare rooms and immigration counters.
C. Operationalized ICPs (Examples)
• Locations and Dates of Operationalization:
o Attari (Punjab – Indo-Pakistan)
o Agartala (Tripura – Indo-Bangladesh)
o Petrapole (West Bengal – Indo-Bangladesh)
o Raxaul (Bihar – Indo-Nepal)
o Jogbani (Bihar – Indo-Nepal)
o Moreh (Manipur – Indo-Myanmar)
o Srimantpur (Assam – Indo-Bangladesh)
o PTB Dera Baba Nanak (Punjab – Indo-Pakistan)
o Sutarkandi (West Bengal – Indo-Bangladesh)
o Dawki (Meghalaya – Indo-Bangladesh)
o Rupaidiha (Uttar Pradesh – Indo-Nepal)
o Sabroom (Tripura – Indo-Bangladesh)
• Additional ICPs:
o 11 new locations identified for further development (e.g., Sunauli in UP, Banbasa in Uttarakhand,
Bhithamore in Bihar).
P a g e | 83
o Many projects are in the development phase, with land acquisition and tendering processes
underway.
D. Additional Development and Upgradation Initiatives
• ICP Sutarkandi:
o Operational since 07.09.2019; ongoing work on boundary walls, earth filling, and facility
upgrades.
• Passenger Terminal Building (PTB) at Petrapole:
o Construction in progress (70% complete); expected to finish by August 2024.
• Radiation Detection Equipment (RDE):
o Installation at 8 ICPs currently under progress.
• BGF (Border Guard Force) Accommodation:
o New accommodations at ICPs such as Jogbani (inaugurated on 16.09.2023) and ongoing
construction at other sites.
Coastal Security
A. India's Coastline
• Total Length:
o Officially 7,516.6 km (under review with new measurements suggesting >11,000 km).
• Geographical Coverage:
o Borders three major water bodies:
▪ Bay of Bengal (East)
▪ Indian Ocean (South)
▪ Arabian Sea (West)
• Coastal States & Union Territories:
o States: Gujarat, Maharashtra, Goa, Karnataka, Kerala, Tamil Nadu, Andhra Pradesh, Odisha,
West Bengal.
o UTs: Daman & Diu, Lakshadweep, Puducherry, Andaman & Nicobar Islands.
• Measurement Revision:
o New Terms of Reference by NMSC (National Maritime Search Committee) have led to re-
verification and an increase in the reported length.
Indian Army
• Background: Known as Bhartiya Thal Sena, it traces its roots to the East India Company, evolving into the
British Indian Army and, post-independence, the modern Indian Army.
• Leadership: Commanded by the Chief of Army Staff (COAS).
• Scale: Recognized as the world’s second-largest active army.
• Mission: Protects India’s sovereignty and territorial integrity while aiding humanitarian efforts during natural
disasters.
• Special Forces: The Para Commandos undertake covert missions, counter-terrorism, counterinsurgency, and
disaster rescues.
P a g e | 87
Indian Navy
• Overview: A three-dimensional force operating above, on, and below the sea to safeguard national interests.
• Leadership: Led by the Chief of the Naval Staff (CNS), supported by the Vice Chief (VCNS) and three
Principal Staff Officers at the Integrated Headquarters.
• Commands: Western (Mumbai), Eastern (Visakhapatnam), and Southern (Kochi) Naval Commands.
• Operational Reach: Features Western and Eastern Fleets and flotillas in Mumbai, Visakhapatnam, and Port
Blair.
• Tri-Service Command: The Andaman & Nicobar Command, India’s sole tri-service unit, defends the
Andaman and Nicobar Islands under a rotating Commander-in-Chief.
• Special Forces: The Marine Commando Force (MARCOS) excels in anti-terrorism, anti-piracy, and maritime
special operations.
Recommended in 2001 post-Kargil, the CDS role was formalized in 2019, with General Bipin Rawat as the first
appointee.
Responsibilities
Significance
The CDS fosters inter-service collaboration, expediting decision-making and bolstering military readiness.
The CAPFs, primarily under the MHA (except Assam Rifles, operationally controlled by the MoD), are union police
forces that support state police in maintaining law and order. They include seven organizations, each led by a Director
General of Police:
1. Assam Rifles (AR): Guards Northeast borders and aids in disaster response.
2. Border Security Force (BSF): Secures land borders with Pakistan and Bangladesh.
3. Central Industrial Security Force (CISF): Protects critical infrastructure.
4. Central Reserve Police Force (CRPF): Tackles internal security challenges.
5. Indo-Tibetan Border Police (ITBP): Guards the India-China border.
6. National Security Guard (NSG): Handles counter-terrorism operations.
7. Sashastra Seema Bal (SSB): Secures Indo-Nepal and Indo-Bhutan borders.
P a g e | 88
Detailed Roles
• CRPF: Established in 1939, it manages riots, counters insurgency, protects VIPs, and supports disaster relief.
It played a key role in integrating princely states post-independence.
• BSF: Formed in 1965, it prevents smuggling and cross-border crimes in peacetime and supports the Army in
wartime with limited offensive actions and intelligence tasks.
• SSB: Created in 1963, it promotes security along Indo-Nepal and Indo-Bhutan borders, engaging 78,000
villages across 15 states as a “Peoples Force.”
• ITBP: Established in 1962, it secures the 3,488 km India-China border and serves as a first responder in
Himalayan disasters.
• NSG: Set up in 1984, it neutralizes terrorist threats, handles hijackings, and conducts bomb disposal, notably
during the 26/11 Mumbai attacks.
Other Institutions
• Intelligence Bureau (IB): Gathers domestic intelligence using technical and human sources.
• Research and Analysis Wing (R&AW): Monitors foreign threats, particularly from Pakistan and China.
• National Technical Research Organisation (NTRO): Provides technical intelligence under the National
Security Advisor since 2004.
• CERT-In: Mitigates cybersecurity threats.
• CCTNS: Digitally links police stations for crime tracking.
Proposed Reforms
• Legal Framework: Legislation to define roles and ensure accountability.
• Recruitment Overhaul: Hire private-sector experts in IT, science, and technology.
• Unified Oversight: Centralize control under the National Security Advisor.
• Transparency: Promote openness with enhanced oversight and empowerment of officials.
P a g e | 91
Special Operations Forces in India
National Security Guard (NSG)
• Foundation: Established in 1984 as a federal contingency force.
• Roles: Neutralizes terrorists, handles hijackings, conducts bomb disposal, and rescues hostages, notably
during 26/11.
India’s security framework is a complex and dynamic tapestry, woven from the collective efforts of the Indian Armed
Forces, Central Armed Police Forces (CAPFs), intelligence agencies, and state police, each tasked with protecting the
nation from a diverse array of threats. The Indian Armed Forces stand as a formidable shield against external
aggression, while the CAPFs and state police work tirelessly to maintain internal stability, supported by specialized
units and institutions like the NIA, NATGRID, and intelligence bodies such as IB and R&AW. Government initiatives
like UAPA, SAMADHAN, and police modernization schemes reflect a proactive approach to addressing emerging
challenges, from terrorism and Left-Wing Extremism to cyber threats and terror financing.
However, this robust system is not without its vulnerabilities. Overburdened CAPFs, understaffed state police forces,
and intelligence agencies hampered by infighting and a lack of legal oversight reveal significant operational,
structural, and resource-related gaps. High vacancy rates, inadequate infrastructure, and poor coordination between
agencies undermine efficiency, while political interference and low public trust further complicate the landscape.
These challenges highlight the urgent need for comprehensive reforms legal frameworks for intelligence agencies,
enhanced recruitment and training processes, and better integration of state and central forces to strengthen
accountability and effectiveness.
As India navigates an increasingly complex security environment, both domestically and globally, the synergy
between its various agencies will be paramount. By addressing these systemic issues and fostering a culture of
transparency, modernization, and collaboration, India can bolster its security apparatus to not only meet current
demands but also anticipate future threats. A resilient and adaptive security framework is essential to safeguarding the
nation’s sovereignty, integrity, and the well-being of its citizens in an ever-evolving world.
P a g e | 92
2023
Q1. साइबर अपराधोों से दे श की सुरक्षा को बडा खतरा है । इन अपराधोों से दे श को कैसे बचाया जा सकता है ?
Cyber crimes are a big threat to national security. How can a country be protected from these
crimes? (8)
Q2. भारतीय सुरक्षा बलोों को अधधक सशक्त कैसे बनाया जा सकता है ? अपने सुझाव दीधजये।
How can India's security forces be strengthened? Give your suggestions. (8)
Q3. आणधवक प्रसार के मुद्ोों पर भारत का दृधिकोण क्या है ? स्पि कीधजये ।
What is India's stand on the issues of nuclear proliferation? Explain. (8)
Q4. "अवैध धन स्थानान्तरण दे श की आधथिक प्रभुसत्ता के धलए गम्भीर खतरा है। सूचना और सोंचार प्रौद्योधगकी ने
इसे ज्यादा चुनौतीपूणि बना धदया है।" व्याख्या कीधजए।
"Money laundering poses a serious threat to a country's economic sovereignty. Information and
communication technology has made it more challenging." Explain. (12)
Q5. भारत तथा धवश्व में मीधिया से क्या सकारात्मक व नकारात्मक पररवतिन हुए है ? रािर ीय व अन्तराििरीय सुरक्षा में
मीधिया का क्या योगदान है ?
What positive and negative changes occurred due to the media revolution in India and around the
world? Explain the role of media in national and international security. (12)
2022
Q1. रािरीय सुरक्षा में धवज्ञान एवों प्रौद्योधगकी की भूधमका की धववेचना कीधजए ।
Discuss the role of science and technology in national security. (8)
Q2. भारत की रक्षा आवश्यकताओों को दृधिगत रखते हुये भारत सरकार की 'अधिवीर' योजना का धवश्लेषण
कीधजए।
Analyse Government of India's 'Agniveer' plan in the light of India's defence needs. (8)
Q3. सैन्य तथा असैन्य क्षेत्ोों में कृधत्म बुद्धि की भूधमका और प्रभावोों की ताधकिक व्याख्या कीधजए।
Explain logically the role and effects of artificial intelligence in military and civil sectors. (12)
Q4. स्वतोंत्ता के उपराोंत पू वोत्तर भारत में व्याप्त धवद्रोह की द्धस्थधत को धवस्तार से समझाइए।
Explain in detail the state of insurgency in North-Eastern India after independence. (12)
2021
Q1. धवद्रोह (धवप्लव) से क्या तात्पयि है ? व्याख्या कीधजए।
What is meant by insurgency? Explain. (8)
Q2. आों तररक सुरक्षा में मीधिया और सोशल नेटवधकिंग की भूधमका महत्वपूणि है। धवश्लेषण कीधजए।
Role of media and social networking is important in internal security. Analyse. (8)
Q3. आतोंकवाद और भ्रिाचार धकसी दे श की आों तररक सुरक्षा बाधधत करते हैं। समीक्षा कीधजए।
Terrorism and corruption hinder the internal security of any nation. Critically examine. (12)
Q4. धवधभन्न प्रकार के साइबर अपराधोों के बारे में बताइए। आप अपने को साइबर अपराधोों से कैसे सुरधक्षत रख
सकते हैं ?
What are various types of cyber crimes? How can you protect yourself against cyber crimes? (12)
P a g e | 93
Q5. साइबर िोम पररयोजना क्या है ? भारत में इों टरनेट अपराध रोकने में यह कैसे उपयोगी है ? व्याख्या कीधजए।
Describe about Cyber Dome. Explain how it can be useful in controllign internet crimes in India.
(12)
Q6. नागररक सुरक्षा के प्रकार एवों कायों की धववेचना कीधजए। उत्तर प्रदे श में यह धकतना प्रभावी है ? उल्लेख
कीधजए।
Discuss the kinds and functions of civil defence. How much is it effective in Uttar Pradesh? Explain.
(12)
2020
Q1. भारत के सुरक्षा पररदृश्य में ररवॉल्यूश न इन धमलटर ी अफेयसि क्या है ?
What is 'Revolution in millitary affairs (RMA)' in security perspective of India? (8)
Q2. "नाको आतोंकवाद" भारत की आों तररक सुरक्षा के धलए खतरा है इसकी धववेचना कीधजए|
Narco terrorism is a threat to India's internal security. Discuss it. (8)
Q3. 'मनी लाोंधिर ों ग 'एवों मानव तस्करी की गैर परों परागत सुरक्षा चुनौधतयोों के रूप में समीक्षा कीधजए |
Analyse 'Money Laundering' and 'Human Trafficking' as a non-traditional security challenges. (8)
Q4. भारत में नक्सलवाद का सामना करने के धलए सरकार द्वारा उठाए गए कदमोों को समझाइये |
Explain the steps taken by the government to counter Naxalism in India. (12)
Q5. नाधभकीय प्रसार के मुद्ोों एवों धवद्यमान धनयोंत्ण तोंत् का धवस्तारपूविक वणिन कीधजए |
Describe in detail the issues of nuclear proliferation and existing control mechanism. (12)
Q6. भारत में उच्चतर रक्षा सोंगठन को समझाइये |
Explain the 'Higher defense organisation of India'. (12)
Q7. वतिमान भती सुरक्षा चुनौधतयोों में नाधभकीय हधथयार भारत की सुरक्षा प्रबोंधन में धकस प्रकार लाभदायक हो
सकता है ? इसको समझाइए|
At present in emerging security challenges, how nuclear weapons can be advantageous in India's
security management? Explain it. (12)
2019
Q1. आों तररक सुरक्षा के प्रधत खतरे के रूप में भ्रिाचार का धववेचना कीधजए |
Analyse corruption as a threat to internal security. (8)
Q2. भारतीय सोंसद के 'सशस्त्र सेना धवशेषाधधकार कानून' की आलोचना राज्योों द्वारा कठोरता एवों कभी-कभी
असोंवैधाधनकता के धलए की जाती रही है | धववेचना कीधजए|
Armed forces special powers act' of the parliament of India has come under criticism by the states as
being draconian and sometimes as un-constitutional. Examine analytically. (8)
Q3. धवगत दो दशकोों में अधनयोंधत्त ढों ग से बढ़ते अोंतररािरीय आतोंकवाद से धवश्व शाोंधत को गोंभीर खतरा पैदा हो गया
है| इससे धनपटने के धलए प्रतीक रािर को वैधश्वक स्तर पर एक साथ धमलकर लडना होगा |" इस कथन की
व्याख्या कीधजए|
"With unbrindled escalation in the international terrorism activities during the past two decades a
great threat looms large before world peace. Every Nation has to join hand in the Global fight unto
the last against it." Explain this statement. (12)
Q4. " नाधभकीय भयादोहन (परमाणु धनरोध) भीषण नरसोंहार वाले आणधवक हधथयारोों के प्रधतकार एकमात् कारगर
उपाय है ?" समझाइए |
Nuclear deterrence is the only effective alternative to counter the Deadly genocidal nuclear
weapons. Analytically explain this statement. (12)
Q5. "सोशल मीधिया को रािरीय सुरक्षा सोंवधिन के एक महत्वपूणि साधन के रूप में धकस तरह उपयोग में लाया जा
सकता है " समझाइए|
"How power social media can be utilised as a significant tool in strengthening national security"?
Explain. (12)
P a g e | 94
2018
Q1. साइबर सुरक्षा धवज्ञान क्या है ? इसका महत्व बताएों ।
What is Cyber Security Science? Mention its importance.
Q2. वामपोंथी उग्रवादी धवचारधारा से प्रभाधवत नागररकोों को सामाधजक और आधथिक सोंवृद्धि की मुख्यधारा में आने
की सुधारक रणनीधतयोों पर चचाि करें ।
Discuss the corrective strategies needed to win the Left Wing Extremism (LWE) Doctrine affected
citizens back into the mainstream of social and economic growth.
Q3. भारत की रािरीय रक्षा पररषद् ' पर प्रकाश िालें ।
Elaborate on the ‘National Defence Council’ of India.
.Q4. वैश्वीकरण के युग में रािरीय सुरक्षा की चुनौधतयोों की धववे चना कीधजए ।
Discuss the challenges of National Security in the age of globalization
Q5. वतिमान समय में उत्तर प्रदे श में कानून और व्यवस्था के धलए चुनौधतयााँ तथा उनके समाधान पर धटप्पणी
कीधजए।
Write a note on the challenges and their solutions for law and order in Uttar Pradesh at the present
time.