You are on page 1of 42

UPSC Mains 2023: Paper II UPSC Mains 2023: Paper I

Login Register EN िहं दी

INTERNAL SECURITY

27 Solved Questions with Answers

2017
20. The scourge of terrorism is a grave challenge to national security. What solutions do
you suggest to curb this growing menace? What are the major sources of terrorist funding?
(2017)

HIDE ANSWER

India has been hit by terrorism since a long time, like, 1993 Bombay blasts, attack
on Parliament in 2011, the 26/11 Mumbai attacks, Pathankot attacks etc. In view of
such attacks it becomes imperative for India to check this rising menace, for which
the following steps can be taken:

Ensure co-ordination among the intelligence and security agencies to


check inKltration of terror activity.

Empowering and engaging with civil society and local communities can
help in countering radicalization and to stop the spread of violent
extremism.

Given the important role of educational establishments in promoting the


values of non-violence, peaceful coexistence and tolerance, education
must feature prominently in counter radicalization programs.

Several initiatives that promote alliance of civilizations and intercultural

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 1 of 46
:
Several initiatives that promote alliance of civilizations and intercultural
dialogue must be promoted to counter terrorism. For instance, the
Rashtriya Ekta Diwas celebrated on 31st October promotes unity in India.

Enhancing security presence along the international boundaries and seal


the porous borders.

Undertaking policies to tackle economic and social inequalities will help in


deterring disgruntled youth from being lured towards terrorism.

Terrorist organizations have successfully taken advantage of the great


beneKts of the Internet. Hence, countering radicalization on digital media
must be given priority. Governments should intervene in this matter through
monitoring and counter-propaganda programs

Incorporating ‘SAMADHAN’ in security operations in LWE affected areas


and at same time focusing on development projects in Red corridor
districts.

Sources of funding

NGO, charities and donations are an important sourcing of funds for


terrorism. These funds are mostly claimed through religious appeal,
coercion and fears of victimization.

Counterfeiting of Indian currency not only funds terrorism, but, more


importantly, it is used as a tool by neighboring states to destabilize the
Indian economy.

Drug Knancing are also a major sources of terrorism Knancing in India.

Biggest source of internal funding for terrorist groups in India remains


extortion. This is especially relevant for groups in the North-East and the
Maoist-affected areas.

2016

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 2 of 46
:
2016
20. Use of internet and social media by non-state actors for subversive activities is a major
security concern. How have these been misused in the recent past? Suggest effective
guidelines to curb the above threat. (2016)

HIDE ANSWER

The use of internet and social media has become a powerful tool in the hand of
non-state actors such as terrorist organizations.

Use of Internet, by terrorist organization such as ISIS in recruiting youth all around
the world has become a reality. Cyber warfare is gaining importance due to
increasing density of internet. The Stuxnet virus affected half of the world targeting
Iran nuclear facilities.

Cyber espionage is also a great threat that exposes the vulnerability of any
organization, or country. The recent theft of data of lakhs of ATMs cards in India is
recent example of misuse of internet by non-state actors.

Social media is also been used by the like-minded individuals as a tool for
radicalization. Muzaffarnagar riots in Uttar Pradesh got intensiKed because of
misuse of social media by non-state actors.

In these circumstances effective strategies should be adopted to curb the threat


posed by internet and social media. Following are some of the guidelines that can
be very useful.

India recently appointed Krst Chief Information Security O_cer (CISO). It


will help India in developing the vision and policy to Kght cyber crime and
manage cyber security more effectively.

Creation of National Cyber Security Agency (NCSA) would improve India’s


resilience and defense system.

Monitoring of content on internet by intelligence agencies such as


Intelligence Bureau, RAW can prevent any attempt to radicalize youths.

National Cyber Security Policy 2013 aims at protection of information


infrastructure in cyber space, reduce vulnerabilities. A National and sectoral
24×7 mechanism has been envisaged to deal with cyber threats through
National Critical Information Infrastructure Protection Centre (NCIIPC)

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 3 of 46
:
National Critical Information Infrastructure Protection Centre (NCIIPC)

Computer Emergency Response Team (CERT-In) has been designated to


act as Nodal agency for coordination of crisis management efforts.

2018
20. India’s proximity to the two of the world’s biggest illicit opium growing states has
enhanced her internal security concerns. Explain the linkages between drug traTcking and
other illicit activities such as gunrunning, money laundering and human traTcking. What
counter measures should be taken to prevent the same? (2018)

HIDE ANSWER

Geographically, India is placed between the two largest opium growing areas in the
world. To the west is the Golden Crescent (Afghanistan) and to the east is the
Golden Triangle (Myanmar). This makes India vulnerable to drug tra_cking through
its borders and other illicit activities, and has enhanced her internal security
concerns.

There exist linkages between drug tra_cking and other illicit activities such as
gunrunning, money laundering and human tra_cking, which are as follows:

An increasing interoperability has been witnessed between drug cartels


and other criminal groups. In Afghanistan around 85% of the opium
growing area falls under Taliban. Taliban uses the funds from drug trade in
many different ways like weapons smuggling, human tra_cking, and
proliferation of terrorism etc.

Drug tra_cking groups also get attracted to human tra_cking activities as


there is some overlap between the routes used and there are advantages to
be gained by sharing established logistical infrastructure, which includes
transportation and storage facilities.

Similarly, gunrunning and money laundering require logistics supports


which are shared by these organizations. At times these activities seem to

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 4 of 46
:
which are shared by these organizations. At times these activities seem to
sustain each other such as smuggling drugs by hiding it in human body
parts. The revenue generated from drug trade is laundered to create assets
such as casinos, bars, hotels etc. which again became breeding grounds
for other crimes. Nexus between drug lords and armed groups gives rise to
thriving weapons business.

Following counter-measures can be opted against these crimes:

As these crimes are trans-national in character, countering them requires


cooperation among all countries.

Making the border management more robust and plugging the gaps by
bringing in force the recommendations of Madhukar Gupta Committee on
border protection. The committee has given broad recommendations on
the issues of Threats and Border Protection, assessment of force level,
deployment on the border, infrastructure and technology issues for
protection of border and administrative issues

Making the police and the concerned authorities acquainted to dark web
and other modes of operation.

Sensitizing the public against negative fallouts of drugs and starting


rehabilitation programmes.

This drug problem is a serious menace giving impetus to various other crimes, so
strong political will and hard measures if required should be opted to tackle this
challenge. Technical solutions are also necessary to augment and complement the
traditional methods of border guarding. Working on both the front can probably
address the existing problems of internal security.

2019
20. Cross-border movement of insurgents is only one of the several security challenges
facing the policing of the border in North-East India. Examine the various challenges
currently emanating across the India-Myanmar border. Also, discuss the steps to counter
the challenges. (250 words)

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 5 of 46
:
HIDE ANSWER

India and Myanmar share a long 1,643 km geographical land border and maritime
boundary in the Bay of Bengal, which act as India’s gateway to South-East Asia.

India-Myanmar border is highly porous, poorly guarded and located along a remote,
underdeveloped, insurgency-prone region and proximate to opium producing area.

Various challenges across the India-Myanmar border

Cross-Border Terrorism: Indo-Myanmar border area have become a safe


haven for dozens of insurgent groups. These insurgent groups performs
offensive action in India and brings instability to the area by promoting
separatist tendencies and take an easy hide in Myanmar.

These groups also take advantage of loopholes in free movement


regime across border to supply arms and drugs in India.

Connectivity: Several connectivity projects like Kaladan Multi-Modal project


and IMT Trilateral Highway project are underway, but the ground level
progress is quite unfortunate.

Free Movement Regime: It permits tribals to travel 16 km across the


borders without any visa restrictions and allowed them to carry heavy
loads. This loophole is well utilized by insurgents for tra_cking of arms and
drugs and to Knd safe havens in Myanmar.

Boundary Agreement 1967: Though the agreement has delineated the


borders between the two countries but not much has been crystallised on
ground level.

Tribal Linkages: The Indo-Myanmar border is densely populated with


tribals, and these tribal communities have strong social-cultural linkages
across borders and they refuse to accept the artiKcial border lines.

Security Forces: Assam Riies had a responsibility of guarding the Indo-


Myanmar border, but most of it battalions are engaged in counter-

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 6 of 46
:
Myanmar border, but most of it battalions are engaged in counter-
insurgency operations. Therefore, it functions like counter-insurgency force
rather than border-guarding force.

Infrastructural Facility at Border Check-Points: The infrastructure facilities


at border check-points is not su_cient to meet the required challenge.
Moreh-Zokhawater point has been declared as Integrated Check-Point
(ICP) but nothing much have materialised on the ground.

DiTcult Terrain Across Border: The geographical terrain around border


areas is highly inaccessible, so it becomes quite di_cult to develop
communication and connectivity.

TraTcking: Proximity to ‘golden triangle’ has made Indo-Myanmar border


highly vulnerable to drug tra_cking and the border has become a gateway
for tra_cking of women and small children to South Asian Nations.

Rohingya Issue: Iniux of marginalised muslim minority rohingya


community has raised a serious sociocultural confrontations in the areas
due to increased burden on local resources.

Steps to Counter the Challenges


The vulnerability of the India-Myanmar border is posing a serious challenge to the
internal security of the country. The Government of India should pay immediate
attention to effectively manage this border.

It should strengthen the security of the border by either giving the Assam
Riies the single mandate of guarding the border or deploying another
border guarding force such as the Border Security Force (BSF).

It should initiate a revision of the FMR and reduce the permitted distance of
unrestricted travel.

The construction of the ICP along with other infrastructure should be


expedited.

The Comprehensive Integrated Border Management System (CIBMS)


which is touted as a robust and integrated system, is capable of addressing
the gaps in the present system of border security by seamlessly integrating

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 7 of 46
:
human resources, weapons, and high-tech surveillance equipment, should
be proactively deployed.

Sustained community interaction programmes so that the border tribal


communities can be sensitised to participate in the nation building on both
sides of the border.

India should endeavour to meaningfully engage with Myanmar and solicit its
cooperation in resolving all outstanding issues and better manage their mutual
border.

2020
20. Analyze internal security threats and transborder crimes along Myanmar, Bangladesh
and Pakistan borders including Line of Control (LoC). Also discuss the role played by
various security forces in this regard.

HIDE ANSWER

India has a large and complex border covering around 15106.7 km, which it shares
with Bangladesh, China, Pakistan, Nepal, Myanmar, Bhutan as well as a small
portion with Afghanistan.

Challenges in the effective border management particularly to Myanmar,


Bangladesh and Pakistan:

India-Myanmar Border: The northeastern states of Arunachal Pradesh,


Nagaland, Manipur, and Mizoram share the border with Myanmar. Some of
the insurgent groups like the National Socialist Council of Nagaland
(NSCN) and the United Liberation Front of Asom (ULFA) operate from
Myanmar, which threatens the security of India as well as Myanmar. Porous
nature of the border provides safe route to human tra_ckers, illegal arms
dealers, drug smugglers etc.

India-Bangladesh Border: The Indo-Bangladesh Border (4,096 km) passes


through West Bengal, Assam, Meghalaya, Tripura, and Mizoram. The entire

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 8 of 46
:
through West Bengal, Assam, Meghalaya, Tripura, and Mizoram. The entire
stretch consists of plains, riverine belts, hills and forests which make illegal
migration easy. Illegal migration across this border poses serious security
threats and acts as a fertile ground for organizations like the Inter-Services
Intelligence of Pakistan to penetrate and expand their activities. Also, the
poor law and order situation at the border has led to smuggling of arms
and drugs. Supply of arms help in sustaining any coniict.

India-Pakistan Border: Indo-Pakistan Border (3,323 km) runs along the


states of Gujarat, Rajasthan, Punjab and Jammu & Kashmir. Direct
accessibility of the borders and some technological developments
enabling quick passage of information and transfer of funds has changed
the focus and tenor of border security. Cross-border terrorism from
Pakistan has exacerbated due to non-recognition of boundaries by its
terrorist groups and their success in acquiring legitimacy due to religious or
ethnic identity.

Role played by various security forces in this regard

Assam Riaes: This force signiKcantly contributed to opening the region to


administration and commerce and over time they came to be known as the
right arm of the civil and left arm of the military.

Border Security Force: The BSF has air wing, marine wing, an artillery
regiment, and commando units. It currently stands as the world’s largest
border guarding force. BSF has been termed as the First Line of Defence of
Indian Territories. It is India’s primary border guarding organization on its
border with Pakistan and Bangladesh.

Sashastra Seema Bal: The sole objective of this force is achieving ‘total
security preparedness’ in the remote border areas for performing a ‘stay-
behind’ role in the event of a war. SSB is now spread along the International
Border across Uttarakhand, UP, Bihar, West Bengal, Sikkim, Assam, and
Arunachal Pradesh.

India should endeavor to meaningfully engage with Myanmar, Bangladesh and


Pakistan and solicit their cooperation in resolving all outstanding issues and better
manage their mutual border.

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 9 of 46
:
2021
20. Analyse the complexity and intensity of terrorism, its causes, linkages and obnoxious
nexus. Also suggest measures required to be taken to eradicate the menace of terrorism.

HIDE ANSWER

Terrorism can be deKned as the calculated use of violence or the threat of violence
to inculcate fear; intended to coerce or to intimidate governments or societies in
the pursuit of goals that are generally political, religious, or ideological.

Causes of terrorism:

Lack of political legitimacy and continuity, as well as a lack of integration


for the political fringes, encourages ideological terrorism.

Perceptions of deprivation and inequality, especially amongst culturally


deKned groups. This can lead to civil violence, of which terrorism may be a
part.

Terrorist tactics are used not out of a random desire to Kre rockets at
civilians but to leverage violence to gain speciKc concessions.

Socio-economic explanations of terrorism suggest that various forms of


deprivation drive people to terrorism, or that they are more susceptible to
recruitment by organisations using terrorist tactics. Poverty, lack of
education or lack of political freedom are a few examples.

Extreme ideologies may sometime result in hatred towards other sections


of society and may lead to terrorism. Examples of terrorist groups
motivated by ideology include the Irish Republican Army (IRA) and the
Liberation Tigers of Tamal Eelam (LTTE).

The linkages and obnoxious nexus of terrorism include:

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 10 of 46
:
Terrorism and organised crime aid each other to thrive and survive. The
Knancial proceeds of organised crime such as extortion/kidnapping are
made legal through money laundering and then used to fund terrorist
activities.

Terrorist groups levy taxes on drug tra_ckers to provide security to


criminals in their controlled area.

Terrorist groups act as proxies of enemy governments which in turn


provide them funding and shelter.

The measures undertaken to combat terrorism are:

Adoption of a Comprehensive Convention on International Terrorism.

Strengthening national coordination mechanisms to promote inter-agency


participation and information exchange, facilitating joint monitoring, threat
assessment.

Updating national legislation to ensure that terrorist and organised crime


offences are precisely deKned.

Awareness generation and deradicalization of the youth to wean them


away from the clutches of their iniuencers.

2022
20. Naxalism is a social, economic and developmental issue manifesting as a violent
internal security threat. In this context, discuss the emerging issues and suggest a
multilayered strategy to tackle the menace of Naxalism.

HIDE ANSWER

Naxalism is considered as the biggest security threat to the country. The term
Naxalism derives its name from the village Naxalbari of West Bengal. The Naxal

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 11 of 46
:
Naxalism derives its name from the village Naxalbari of West Bengal. The Naxal
Movement started in 1967 under the leadership of Kanu Sanyal and Jagan Santhal
as a rebellion against the local landlords over a land dispute. The movement was
spread across the eastern Indian and in less developed states like Odisha,
Chhattisgarh, and Andhra Pradesh.

Emerging Issues

The Forest (Conservation) Act, 1980 deprives tribal to depend upon forests
produces and there is a massive displacement of tribal population due to
developmental and mining projects.

The administration fails to provide essential services to the people of


Naxalite affected regions such as education, freedom, sanitation, and food.
There is a confusion over tackling Naxalism as a social issue or as a
security threat.

Some villages suffer with infrastructural problems such as communication


and connectivity. There is absence of technical intelligence to Kght with
Naxalites.

Lack of political participation by the tribal community and the inability of


political authority to provide avenues for structural uplift to the deprived
sections.

Strategy to Tackle the Menace of Naxalism

Social Dimensions

Aspirational District Programme deals with Left Wing Extremism (LWE) in a


holistic manner for ensuring rights and entitlements of local communities
and improvement in governance and management.

Security Related Expenditure (SRE) Scheme is implemented by the Central


Government to reimburses needs of security forces like ex-gratia payment
to the family of civilians/security forces killed/injured in LWE violence,
compensation to Left Wing Extremist cadres who surrendered in
accordance with the surrender and rehabilitation policy.

The government should initiate more dialogues between the Naxalites and

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 12 of 46
:
the government o_cials. Equal participation in casting votes and
contesting elections can make the conditions better.

Providing access to the basic resources such as forests, education,


sanitation, and food. There is a need to emphasis on rehabilitation and
resettlement of the affected population.

Economic Dimensions

Removing economic disparity could contribute to tackle the growth of


Naxalism.

Generation of more employment with higher wages will help the people of
that region in uplifting their skills.

There is a need of coherent national strategy to be implemented by Central


Government to end Naxalism.

Developmental Dimensions

Road Connectivity Project for LWE affected areas (RCPLWE) is


implemented for further improving road connectivity in LWE affected
States.

LWE Mobile Tower Project is implemented to improve mobile connectivity


in the LWE areas.

The concern of infrastructure needs to be addressed in the Naxalite


affected regions.

India has made little success tackling Naxalism, but the root causes have not been
addressed yet. The central and the State Governments should continue to work
together and come up with common strategy.

2017
19. Mob violence is emerging as a serious law and order problem in India. By giving
suitable examples, analyze the causes and consequences of such violence. (2017)

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 13 of 46
:
suitable examples, analyze the causes and consequences of such violence. (2017)

HIDE ANSWER

Over the past few years, there have been increasing incidents of loss of life and
property due to mob violence – whether it be in Jharkhand over rumours of child
kidnapping, in UP and Rajasthan by cow vigilantes, in Kashmir by violent crowds or
over reservation by Jats in Haryana. Mob violence can be seen as a reiection of
the displacement of responsibility by the state, which blames people for taking law
into their own hands, and by citizens, who justify their actions on state inaction.

Causes for Increasing Mob Violence

Motivated rumours spread through social media which acts as an


anonymous force multiplier.

Climate of impunity - Mob violence and vigilantism happens because


criminals expect to get away with it. State deterrence is not perceived to be
credible, especially when policemen are rendered as mere by-standers at
the scene of violence.

General erosion of law and order situation - inadequate response to


societal disorder, and its inability to aggressively prosecute those involved
in vigilante killings further encourages mob violence.

Silence by society – People who are mute witnesses to such incidents, are
just as responsible when they stay away from expressing their disapproval
to such incidents for the fear of being caught in the cross-Kre.

Consequences of increasing Mob Violence

There is deKcit of justice when incidents of lynching across states happen,


without those responsible being held accountable.

There is perversion of democracy, which confers upon the people an


absolute monopoly on violence.

Mob Violence threatens the very existence of digniKed and meaningful

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 14 of 46
:
existence in India enshrined in one of the Fundamental rights i.e. “Right to
Life” (Art 21).

Therefore, there is need


for comprehensive police reforms and e_cient criminal justice delivery system
which acts as a deterrence to people from resorting to mob violence in the name of
justice.

2016
19. Border management is a complex task due to diTcult terrain and hostile relations with
some countries. Elucidate the challenges and strategies for effective border management.
(2016)

HIDE ANSWER

India has a very large and complex border covering around 15106.7km, which it
shares with Bangladesh, China, Pakistan, Nepal, Myanmar, Bhutan as well as small
portion with Afghanistan. Challenges in the effective border management particular
to some neighbours are:

Varied Terrain: India-China Border as comprising of di_cult Himalayan


terrain that is reason for di_culty in border management.

Climatic Condition: Due to Himalayan polar condition, it is tough to guard


border due to adverse climatic conditions. Ex: China, Pakistan

Bitter relations with some of the neighbouring countries. Ex: Pakistan

Porous nature of border with some countries that provides safe route to
human tra_ckers, illegal arms dealers, drug smugglers etc. Ex: Myanmar

Owing to such peculiarities, having infrastructure and technology does not alone
su_ce for effective border management. Following strategies can be adopted for
effective border management.

Co-ordination among various agencies such as customs, immigration,

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 15 of 46
:
Co-ordination among various agencies such as customs, immigration,
armed forces, border security and intelligence agencies is required that will
strengthen the border guarding and management.

Smart border management to identify and implement controls which aim to


improve border security by enabling effective communication and
coordination.

Use of Drone, Night vision cameras, sensors to check the illegal migration,
terrorist movement can help in effective border management.

Border fencing along the border such as with Bangladesh, Myanmar, Nepal
can help in better border management.

Coordination among neighbouring countries would also strengthen the


measures taken for border management.

2018
19. Data security has assumed signigcant importance in the digitized world due to rising
cyber crimes. The Justice B.N. Srikrishna Committee Report addresses issues related to
data security. What, in your view, are the strengths and weaknesses of the Report relating
to protection of personal data in cyber space? (2018)

HIDE ANSWER

The threat from cyber crime is multi-dimensional, targeting citizens, businesses,


and governments at a rapidly growing rate. The Committee under the chairmanship
of Justice B. N. Srikrishna was constituted to examine issues related to data
protection, recommend methods to address them, and draft a data protection law.
The objective was to ensure growth of the digital economy while keeping personal
data of citizens secure and protected. The report inter alia presented a draft
Personal Data Protection Act.

Some of the Important Strengths and Weakness of the Report:

The Committee noted that consent is treated as one of the grounds for

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 16 of 46
:
The Committee noted that consent is treated as one of the grounds for
processing personal data.

One in three internet users across the world is children under the age of 18.
A data protection law must su_ciently protect their interests, while
considering their vulnerability, and exposure to risks online.

It discussed the principle where personal data must be collected for a


speciKed purpose only.

One of the principles of data protection is that a person whose data is


being processed should be able to iniuence the processing. This includes
the right to conKrm, access, and rectify the data.

Weakness

Who owns the data of the individuals is a question not answered by the
Committee as against the TRAI recommendation that ownership of data
must rest with the individual.

Globally, the right to be forgotten refers to the right to erase data. Srikrishna
panel, says “...data principal shall have the right to restrict or prevent
continuing disclosure of personal data by a data Kduciary related to the
data principal where such disclosure has served the purpose for which it
was made or is no longer necessary; was made on the basis of consent...
and such consent has since been withdrawn; was made contrary to the
provisions of this Act or any other law made by Parliament or any State
Legislature.”

On data breach, the Committee recommended that such a breach must


Krst be reported to the Authority. This suggestion has been criticized and it
is argued that it should be Krst reported to the subject of the breach
instead.

2019

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 17 of 46
:
19. Indian government has recently strengthed the anti-terrorism laws by amending the
unlawful activities (Prevention) Act, (UAPA), 1967 and the NIA Act. Analyze the changes in
the context of prevailing security environment while discussing scope and reasons for
opposing the UAPA by human rights organisations.

HIDE ANSWER

The Union Government by amending NIA Act and UAPA Act seeks to provide more
powers to India’s anti-terror agency and expand the scope of India’s anti-terror
law, thereby providing a big push to India’s internal security machinery.

Under the UAPA Act, the Central Government can designate an organisation as a
terrorist organisation if it commits or participates in acts of terrorism; promotes
terrorism; or is otherwise involved in terrorism. Currently, only an organisation can
be declared a terrorist. The amendment allows government to designate
individuals suspected to have terror links as 'terrorists'.

Likewise, the amendment to NIA Act widens the powers of the National
Investigation Agency (NIA) to investigate crimes related to human tra_cking,
counterfeit currency, dealing in prohibited arms, and cyber-terrorism. These were
earlier under State police. NIA can also investigate a crime irrespective of its place
of occurrence.

These amendments are in pursuance of the government’s zero-tolerance policy


against terrorism. These hold signiKcance in the context of the prevailing security
environment.

Terrorism emanating from Pakistan has been a consistent challenge


whereby terrorist organisations have been devising new methods to
threaten the stability of the region.

This often included formation of new terrorist outKt by the individuals if


their previous organisation was banned. This issue emerged during India’s
efforts to designate Masood Azhar as terrorist when some foreign
diplomats questioned India’s domestic law which didn’t provide for
individual’s designation. Now, declaring an individual as a terrorist will help
the government to deal with such situations.

Besides, there is growing menace of terror Knancing and organised crimes

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 18 of 46
:
like human tra_cking, cyber terrorism etc. An empowered NIA is a good
step in this direction

However, human rights organisations allege that these amendments violate the
basic human rights and seek to create a police state.

The UAPA does not clearly deKne a ‘terrorist act’.

The presumption of innocence is considered a universal human rights


principle but the UAPA creates a presumption of guilt for terrorist offences
based on the seized evidence.

Moreover, there is no set procedure for designation as a terrorist. By


excluding judiciary and empowering the executive to designate, it dilutes
the difference between a terrorist and a terror accused.

Similarly, the term 'affecting the interest of India' in NIA act is undeKned
and the civil society fears that it can be used to curb freedom of speech
and expression.

Thus, though the changes are required to meet the prevailing security environment,
the policy framework dealing with terrorism must incorporate the state duty to
protect against human rights abuses and greater access of victims to remedies.
Apart from dealing with terrorism, emphasis should be on to improve the functioing
of the police force and to make India’s judicial mechanism faster.

2020
19. What are the determinants of left-wing extremism in Eastern part of India? What
strategy should the Government of India, civil administration and security forces adopt to
counter the threat in the affected areas?

HIDE ANSWER

Left Wing Extremism (LWE) organizations are the groups that try to bring change
through violent revolution. They are against democratic institutions and use

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 19 of 46
:
through violent revolution. They are against democratic institutions and use
violence to subvert the democratic processes at ground level.

Determinants of Left-Wing Extremism in Eastern Part of India

India’s land reform policy: The land reform policies of India could not be
successful in some parts of the nation post-independence, which led to the
growth of Maoists and Naxals in India.

Tribal issues: Tribals face exploitation and harassment from government


and corporate bodies to extract resources since eastern region is rich in
natural resources including forests, minerals and mines. Also, issues of
tra_cking of women and girls are mostly seen among tribal groups.

Development degcit and forced displacement: In this region, people are


solely dependent on the primary sector since the region has signiKcant
natural resources. Exploitation of the natural resources for economic
progress has led to the forceful displacement of tribal which results into
the alienation of tribal community.

Government degcit: Government is unable to provide su_cient education


facilities, basic healthcare facilities, employment, etc. in eastern part of
India. Also, there are issues related to law and order and grievance
redressal. Poor implementation of special laws and mismanagement of
schemes like PDS.

Strategies to be taken to counter such menace:

Innovative measures are required to be employed in preventing IED


(Improvised Explosive Device) related incidents which have caused
signiKcant casualties in recent years.

States play a vital role in maintaining law and order. So, emphasis should
be laid on the capacity-building and modernization of the local police
forces. Local forces can e_ciently and effectively neutralize the LWE
organizations.

States should rationalize their surrender policy to bring innocent individuals


caught in the trap of LWE in the mainstream.

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 20 of 46
:
Rehabilitation plans for surrendered Naxalites.

National Policy and Action plan to address LWE.

For the holistic last-mile development of “New India”, it is necessary to get rid of the
menace of such radicalized groups and the synergized efforts of the Centre and the
States are crucial in achieving the same.

2021
19. Analyse the multidimensional challenges posed by external state and non-state actors,
to the internal security of India. Also discuss measures required to be taken to combat
these threats.

HIDE ANSWER

Internal security has assumed core importance for India. As India now aspires and
rises to taking the high seat in the comity of nations, the security challenges
become more compounded and complex. India faces multifold threats from
external states and non-state actors on the internal security front. State actors
include the foreign government representative and their agencies. Non-state actors
may include NGOs, multinational companies, terrorist and religious groups,
hackers, etc.

Challenge posed by external state actors:

A few of India’s bordering countries support the insurgent groups through


funding, training, or coordination. For example, China is alleged to support
insurgents in the North-East.

There have been instances where state actors have been responsible for
carrying out cyber warfare through hacking and other espionage.

State actors also fund their proxies in and out of India to spread instability
within the country and tarnish its stature at the global platforms.

Challenges posed by non-state actors:

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 21 of 46
:
Challenges posed by non-state actors:

Multi-national Companies (MNCs) have the potential to threaten national


security, especially in the data security and cyberspace domains, and by
iniuencing the policies of their respective governments. It is the reason
several Chinese apps were blocked in India recently.

Non-state organisations with anarchic and fundamentalist ideologies


repugnant to the secularist credentials of India are potential threats to the
peaceful internal security environment of the nation.

Propagandas are run and funded by enemy countries and other non-state
actors (NGOs and civil society organisations) to destabilise India by
damaging the socio-religious fabric and ensure riots.

Following measures shall be undertaken to combat the internal security


challenges:

There must be effective communication and coordination between


intelligence agencies and law enforcement agencies.

Sound cyber security measures must be in place to prevent any attempt of


cyber attacks.

Collaboration should be there between the government, media and the


public to ensure quick and e_cient sharing of information about
suspicious activities to the law enforcement agencies.

We need to understand national security in a comprehensive sense and not in


narrow military terms only. While it is imperative to guard our borders and
strengthen our diplomacy, we also need to check the various non-state actors who
come in hidden forms. There is a need for a national internal security doctrine to
deal with various challenges.

2022
19. What are the different elements of cyber security? Keeping in view the challenges in
cyber security, examine the extent to which India has successfully developed a

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 22 of 46
:
cyber security, examine the extent to which India has successfully developed a
comprehensive National Cyber Security Strategy.

HIDE ANSWER

Cyber security means the protection of cyberspace including critical information


infrastructure from attacks, damage, misuse and economic espionage. It also
includes the set of technologies and practices designed to prevent various types of
cybercrimes.

There are certain key elements of cyber security such as:

Application Security: It includes measures that are taken during an


application’s development process to protect it from threats emerging from
iaws in the app design, development, deployment, etc.

Information security: It is related to protecting information from


unauthorized access to avoid identity theft and protect privacy.

Network Security: It includes activities to protect the network's usability,


reliability, integrity and safety.

Disaster Recovery Planning: It is a process that includes performing risk


assessment, establishing priorities and developing recovery strategies in
case of a cyber-attack.

End-user awareness: This includes the dissemination of information and


raising awareness about the various facets of cybersecurity among the
larger public

Challenges related to cyber security are centred around certain key issues such as:

An increase in cyber-attacks on critical infrastructure has been witnessed


in recent times.

The lack of adequate necessary infrastructure and human resources


trained in dealing with cybersecurity-related issues.

Inadequate focus on cyber security by the private sector on developing

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 23 of 46
:
Inadequate focus on cyber security by the private sector on developing
preparedness for dealing with cyber-attacks.

The country's expanding digital ecosystem and inadequate infrastructure


and procedures render large amounts of data vulnerable to cyber-attacks.

Further, India is not a signatory to the Budapest Convention which seeks to


address cybercrimes by improving investigative techniques and increasing
cooperation among nations.

India has adopted a multi-faceted National Cyber Security Strategy to deal with
cybercrime.

The Information Technology Act, passed in 2000 and amended in 2008,


deals with the mitigation of cybercrime and related issues.

The constitution of specialised agencies dealing with cybercrime such as


the Indian Computer Emergency Response Team (CERT-In), National
Critical Information Infrastructure Protection Centre (NCIIPC) and Indian
Cyber Crime Coordination Centre (I4C).

Other government initiatives related to spreading awareness about and


mitigating cybercrime-related threats are the Cyber Surakshit Bharat
Initiative, National Cyber Security Coordination Centre (NCCC), Cyber
Swachhta Kendra and Information Security Education and Awareness
Project (ISEA).

A National Cyber Security Policy was implemented by the government in


2013 for dealing with cybercrimes.

Further, in 2020, the National Cyber Security Strategy was conceptualised


by the Data Security Council of India (DSCI) headed by Lt General Rajesh
Pant. This is yet to be implemented by the Centre.

Thus, with the changing nature of cybercrimes, India has also made efforts at
meeting the challenges emanating from them. However, more needs to be done to
effectively address the threats posed by cybercrimes.

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 24 of 46
:
2016
18. ‘Terrorism is emerging as a competitive industry over the last few decades.” Analyse
the above statement. (2016)

HIDE ANSWER

In recent years, with the emergence of new terrorist organizations like ISIS, Boko
Haram etc. terrorism has become a competitive industry. Like maKa organizations,
where one-upmanship is often based on who has the most guns, money or local
power, terrorist groups too have a pecking order.

The current competitive market in terrorism means that groups are trying to
distinguish each other through the practice of more memorable violence (like the
Charlie Hebdo attacks or the Peshawar attacks in December 2014). They need to
do so because this is the only way in which they can be heard, become popular
enough to attract recruits and distinguish themselves from other similar groups. In
order to do so the terrorist groups are trying to out-do each other in the intensity
and scope of violence and bloodshed they can cause so that more people can
identify with them and join them. For example- while some years back, Al-Qaeda
was the most dreaded terrorist group of the world, this position has now been
overtaken by ISIS. One of the reasons for this can be because ISIS encourages
lone-wolf attacks which are easier for its followers to carry out without actually
travelling to join the group to Kght in combat.

Various terrorist organizations are also in competition with each other to get
control of various natural resources such as oil reserves in Middle East countries,
cultivation of Opium, arms dealing etc.

Competition over establishing their ideologies all around the world has also
instigated terrorist organization for example multiple groups are Kghting with each
other in Syria. So in recent time terrorism has become a competitive industry that
has spread its iniuence all over the world.

2016
17. The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in connection with armed

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 25 of 46
:
action against terrorist attacks. Discuss the strategic impact of such actions. (2016)

HIDE ANSWER

With the Indian forces carrying out “surgical strikes” across the Line of Control,
India seems to have abandoned the self-proclaimed policy of “strategic restraint”
adopted in the face of earlier provocations by terrorists believed to be backed by
Pakistan. This may not be the Krst time India has undertaken quick cross-LoC
operations, but it has never before chosen to share information so publicly.

Strategic impact of this action can be following.

This surgical strike indicates that India’s technical capabilities (Command,


Control, Communications, Computers, Intelligence, Surveillance and
Reconnaissance — C4ISR) have improved a great deal.

The terms “surgical strike” and “pre-emptive strike” used by India were
intended to make it clear to the enemy that there will be repercussions and
crossing the border does not guarantee immunity

The strikes proved to be an important element for maintaining the morale


of the people of India and the armed forces.

The strike reinforced the credibility of the government and displayed its
resolve, even as justiKed restraint and maturity was on display. This act
would also counter India’s image of being a soft state.

Russia has also backed India, saying Pakistan should take effective steps
in order to stop activities of terrorist groups in its territory. India seems to
have played its cards well by seeking international and regional isolation of
Pakistan before striking inKltrator targets across the LOC.

There are also several negative impacts of these types of acts as it may escalate
the coniict especially in case of Pakistan, Security forces can be trapped in enemy
territory. It could be a cause of international censure for violating other country’s
border.

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 26 of 46
:
2017
10. The North-Eastern region of India has been infested with insurgency for a very long
time. Analyze the major reasons for the survival of armed insurgency in this region. (2017)

HIDE ANSWER

Due to its distinct socio-cultural background and particular historical evolution, the
North-East region of India holds several fault lines around which many insurgent
groups have been thriving for a very long time. The major reasons behind the
evolution and survival of armed insurgency in this region are-

This region has been one of the most neglected regions in terms of
developments and is the main cause behind the resentment of the people
living in this area. The insurgent groups take advantage of resentment of
people and get support base.

Alienation of population from mainstream political process, where the


insurgent group continue to boycott the dialogue and electoral process. (Ex
– NSCN-Khaplang group)

Hilly terrain, dense forest and porous borders give strategic advantages for
the insurgent Guerilla groups and at the same time it creates big hurdle for
the counter insurgency operations.

Racial clashes are very common here due to diverse racial proKle of the
region. In a fractured society the insurgent groups penetrate easily.

Active and covert foreign support to these insurgent groups, through


training, logistic and moral support has also been a big hurdle to eradicate
these groups.

The twin approach of development and counter insurgency operations coupled with
honest political dialogue process may provide the best answer to the long infested
insurgency in the North-East.

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 27 of 46
:
2018
10. Left Wing Extremism (LWE) is showing a downward trend, but still affects many parts
of the country. Brieay explain the Government of India’s approach to counter the
challenges posed by LWE. (2018)

HIDE ANSWER

The Government’s approach is to deal with Left Wing Extremism in a holistic


manner, in the areas of security, development, improvement in governance and
public perception management. Recently, Government has come out with
operational strategy ‘SAMADHAN’ to Kght Left Wing Extremism in the country.

Government’s Approach:

Governance and Development: The foremost focus of Government is to


strengthen the connectivity in these areas so as to improve its engagement
with the rest of the country. Infrastructural enhancements like road,
railways and airport construction, instalment of mobile towers are taking
place. For example- National Policy and Action Plan.

Smart Leadership and better coordination with the State governments is


being encouraged by the Government to expand its reach in the LWE
affected areas.

An aggressive strategy is being followed to modernise and strengthen the


capacity of armed forces.

Special emphasis is being laid on the implementation of Forest Rights Act


and ensuring entitlement of local communities over Minor Forest Produce.

No Access to Financing: To stop the maintenance and sustained survival


of Left Wing Extremism, the Government is attempting to block Left Wing
Extremist outKts’ access to Knancing.

Rehabilitation and Surrender: Surrender-cum-Rehabilitation Scheme is

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 28 of 46
:
being implemented to ensure militants’ rehabilitation and return to the
mainstream.

Public Perception Management: To counter the ideological effect of Left


Wing Extremism on people, gaps between Security Forces and local people
are being bridged through close interactions, Tribal Youth Exchange
programmes, radio jingles, documentaries, pamphlets etc.

2019
10. What is CyberDome Project? Explain how it can be useful in controlling internet crimes
in India.

HIDE ANSWER

CyberDome project is a technological research and development centre of Kerala


Police Department, conceived as a cyber centre of excellence in cyber security, as
well as technology augmentation for effective policing.

It envisages as a high tech public-private partnership centre of collaboration for


different stakeholders in the domain of cyber security and handling of cyber crimes
in a proactive manner.

India has witnessed a 457% rise in cybercrime incidents under the Information
Technology (IT) Act, 2000 from the year 2011 to 2016.

CyberDome project can be useful in controlling these internet


crimes in India

The project can help in preventing cyber crimes through development of a


cyber threat resilient ecosystem in the country to defend against the
growing threat of cyber attacks. To effectively tackle cybercrime, the
Government has collaborated with private sector and academia to conform
rapidly changing technology world.

The Cyberdome will act as an online police patrol. Through its Anti-Cyber

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 29 of 46
:
Terror Cell and a cybersecurity training unit, its o_cers will generate
intelligence on various cyber threats in near real time and track fugitives
online by monitoring their online activities, including social networking
sites.

It will create a digital repository of stolen and lost vehicles and travel
documents, track online payments to prevent money laundering and
channelling of funds to dubious organisations and issue cyber security
advisories.

Cyberdome would have centres for social media awareness, protection of


children on the Internet, Internet monitoring and ICT (Information and
Communication Technology) in service delivery.

Cyberdome in collaboration with the RBI, Banks, payment gateways and


other wallet groups can tackle Knancial fraud.

Through its ransomware school, CyberDome can understand, analyse and


mitigate ransomware infections, create standard operating procedures to
deal with ransomware, creating awareness among the public as well as
government departments about ransomware and its precautionary steps.

The Cyberdome is expected to enable sleuths to obtain vital leads in cases


of cyber-related offences using advancements in the Keld of information
technology.

Of late, Cyberdome has used social engineering as the lynchpin of its


policing strategy to snoop on radical groups that use the net for extremist
activities.

Cyberdome has made successful propaganda war against online games


such as Blue Whale.

Of late, Cyberdome has launched a covert cyber-surveillance and inKltration


programme to crack down on child pornography. Thus, Cyberdome project
has great potential to control internet crimes and must be replicated at the
national level.

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 30 of 46
:
2020
10. For effective border area management, discuss the steps required to be taken to deny
local support to militants and also suggest ways to manage favourable perception among
locals.

HIDE ANSWER

India shares its border with seven countries, and it occupies a major strategic position in
Southern Asia, therefore, it is necessary to manage the borders properly. Governments
make a huge investment and provide good support for border security. Still, border
management poses major challenges around the world.

Steps required to be taken

Employment opportunities: Provide employment opportunities to the youth so that


they can do away with the militancy and therefore instead of supporting the militants,
they will oppose them.

Grassroot Democracy: Conducting local body elections in re-establishing the


grassroot level democracy which results into the extended support from community in
development processes.

Media Facilitation Centers: Setting up of Media Facilitation centers to reduce the trust
deKcit since these centers provide internet services to the reporters and freelancers.

Intelligence Grid: Strengthening the technical intelligence grid to track any terror
suspect and prevent terrorist attacks with real time data. It will also enhance human
intelligence networking.

Way Forward

Without the development process, there will be no organic end of the causes of
discontent and unrest.

Social empowerment by means of skills, education, employment opportunities, human


rights, rule of law have enough potential in tackling the unfavorable perception among
the locals.

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 31 of 46
:
the locals.

Also, controlling the misinterpretation of culture, hate speeches and ignorance will
enhance the process of persuasion and cognitive change.

2021
10. Keeping in view of India’s internal security, analyse the impact of cross-border cyber-
attacks. Also, discuss defensive measures against these sophisticated attacks.

HIDE ANSWER

A cyber-attack is a type of attack that targets computer systems, infrastructures,


networks, or personal computer devices using various methods at hands.
Depending on the context, cyberattacks can be part of cyberwarfare or
cyberterrorism. A cyber-attack can be employed by sovereign states, individuals,
groups, society, or organisations, and it may originate from an anonymous source.

The term ‘cross-border’ implies a movement or an activity across a border


between the two countries. Impact of cross-border cyber-attacks include:

Debilitating impact on Critical Information Infrastructure (power plants,


nuclear plants, telecommunications etc.).

It can be used as spyware to get sensitive information.

Terrorists may use social media to plan and execute terror attacks and for
virulent propaganda to incite hatred and violence.

The defensive measures undertaken to counter cross-border cyber-attacks are:

Coordination with different agencies at the national level.

The government needs to issue alerts and advisories regarding the latest
cyber threats and countermeasures on a regular basis.

The Information Technology Act, 2000 has deterrent provisions to deal with

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 32 of 46
:
The Information Technology Act, 2000 has deterrent provisions to deal with
cyber-attacks.

National Critical Information Infrastructure Protection Centre (NCIIPC) has


been established to deal with cyber security issues.

The National Cyber Coordination Centre (NCCC) has been set up for timely
sharing of information with individual entities.

Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre)


has been launched for detection of malicious programs and provide free
tools to remove the same.

The Technology Development Board and Data Security Council of India


(DSCI) have jointly decided to promote cyber security start-ups in India.

The need of the hour is to produce a futuristic National Cyber-Security Policy which
allocates adequate resources and addresses the concerns of the stakeholders.

2022
10. What are the maritime security challenges in India? Discuss the organisational,
technical and procedural initiatives taken to improve the maritime security.

HIDE ANSWER

India has more than 7000 km long maritime border shared with seven nations.
Instruments of maritime security protects the territorial sovereignty of nation from
possible marine threats.

Challenges-

Issues of smuggling and human tra_cking across the marine border.

Issues of cross border terrorism.

InKltration of illegal migration.

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 33 of 46
:
InKltration of illegal migration.

Issues of piracy in maritime trade.

Maritime environmental hazards.

Some Initiatives taken by India-

Organisational-

India launched security and growth for all (SAGAR) policy to integrated
collaboration with Indian ocean region nations.

India introduced the establishment of integrated theatre command.

India set up an International fusion centre (IFC) for Indian ocean region in
Gurugram.

Recently quad launched Indo-paciKc partnership for maritime domain


awareness (IPMDA) for better coordination and awareness.

India is part of various organisations and dialogue like IONS, IORA and
India- EU maritime dialogue.

Technical-

Mission based deployment of naval ships and aircrafts. Like, INS Vikrant,
Nuclear Submarines and project 75I etc.

India is working on digital cargo and bay arrangement optimization to


enhance e_ciency of maritime security.

India introduced advanced Electronic Warfare System ‘Shakti’ in Indian


Navy.

India used advance electronic and digital surveillance over the marine
border.

Procedural-

Being signatory of United Nations Convention on the Law of the Sea

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 34 of 46
:
(UNCLOS), India adheres all its rules and regulations.

India follows the procedure of operational interactions with friendly nations


via joint exclusive economic zones (EEZ) surveillance.

Way forward

Swift coordination and collaboration of various security institution is much


needed. It can enhance the e_ciency in maritime security services.

Multilateral information sharing is key to prevent marine threats. So, there


should be an integrated multilateral data sharing platform.

Best practices of other marine nations should be shared among all friendly
nations holistically.

2017
9. Discuss the potential threats of Cyber attack and the security framework to prevent it.
(2017)

HIDE ANSWER

The beneKts of cyberspace to citizens, businesses and governments are


considerable and far reaching. While technologies are overwhelmingly created for
positive use, they can be exploited as well. Crimes in cyberspace cost the global
economy around $450 billion a year.

Potential threat

Cyber attack is a particularly major threat to sectors identiKed under Critical


Information Infrastructure (CII) that include Knancial systems, air tra_c control and
telecommunications.

First, all the sectors identiKed as CII are dependent on connectivity. Debilitating
attack on any one system can cause a cascading effect, disrupting the functioning
of other systems.

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 35 of 46
:
Second, CII is highly dependent on industrial control systems, which depend on
digital instructions. Any malicious takeover of these systems will not only disrupt
but also seize functioning of CII.

Third, many CII, such as air tra_c control, is dependent on navigational data, which
is especially vulnerable to spooKng. If the integrity of this data cannot be ensured,
the input of false data can have disastrous consequences.

Security Framework

The Indian government has also been aggressively addressing the rising
prevalence of cyber threats. National Cyber Security Policy 2013 has been framed
to create a secure cyber ecosystem, ensure compliance with global security
systems and strengthen the regulatory framework. The union budget for 2017
included the formation of Computer Emergency Response Team (CERT) for the
Knancial sector.

The government has also sought data security protocol details from several smart
phone manufacturers insisting that mobile manufacturing units be security-
compliant. The Technology Development Board and Data Security Council of India
(DSCI) have jointly decided to promote cyber security startups in India.

NASSCOM and DSCI Cyber security Task Force have also launched a roadmap to
develop the cyber security ecosystem to $35 USD billion by 2025.

2019
9. The banning of ‘Jamaat-e-islaami’ in Jammu and Kashmir brought into focus the role of
over-ground workers (OGWs) in assisting terrorist organizations. Examine the role played
by OGWs in assisting terrorist organizations in insurgency affected areas. Discuss
measures to neutralize the inauence of OGWs.

HIDE ANSWER

Terrorism instils an innate sense of fear in the citizen and dilutes the perceived
control of the state over law and order. This state of lawlessness creates
conditions which help the terrorist group achieve its political aims. Overground
workers(OGWs) provide a support system to terrorist groups and networks in
carrying out their activities in insurgency affected areas.

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 36 of 46
:
carrying out their activities in insurgency affected areas.

The role played by OGWs

Food and Logistics support: OGWs assist terror networks to meet their
basic needs.

Propaganda and radical narrative: This provide the ideological background


to the terror outKts.

Finding new recruits: Pool of Disgruntled youth provide a fertile ground for
OGWs to propagate radicalisation and hire new recruits.

Coordination with other stakeholders: OGWs coordinate with secessionist


leaders, and Organised crime Networks to meet their political objectives.

Conduit for Illegal Money: This is done through illegal trade, counterfeit
currency, Tax evasion and Hawala transactions. These funds are also used
to instigate anti-state protest like stone-pelting.

Assist in the planning and execution of terror plans: They provide


operational planning, intelligence information, safety routes, maps and
other inputs that are needed for terror operations.

Measures to neutralize the iniuence of OGWs

Address the root cause of alienation among affected communities: This is


done by addressing genuine concerns and through awareness campaigns
that dispel false propaganda.

Rehabilitating orphans and women: This would fulKl the state’s duty to
ensure Social welfare. Also, It would counter the iniuence of OGWs to Knd
new recruits.

Intelligence Infrastructure: To keep track of radicalisation attempts by


OGWs and recruitment agents in order to stop this process at its inception.

Human and Electronic Surveillance: This is used to tap into existing


networks to pre-empt terror attempts.

International cooperation: To facilitates follow up on suspects and terror

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 37 of 46
:
International cooperation: To facilitates follow up on suspects and terror
networks.

Fast track courts: Laws like Public Safety acts for the speedy conviction of
terrorists and OGWs through fast track special courts.

However, Misuse of the legal provision in the random booking of youth on mere
suspicion should be avoided. The best defence against terrorism is to ensure that
the people do not have the incentive to pick up arms against the country by
providing them equitable political, social and economic opportunities.

2020
9. Discuss different types of cyber crimes and measures required to be taken to gght the
menace.

HIDE ANSWER

Cyber crime is a criminal activity thatinvolves computersor


anynetworkdevicesthattargetindividuals, companies, and governments for direct
Knancial gain or to sabotage or disrupt operations. Cyber crime is a major threat to
sectors identiKed under Critical Information Infrastructure (CII) that include
Knancial systems, air tra_c control and telecommunications.

Different types of Cyber crimes

Malware, short for malicious software, refers to any kind of software that is
designed to cause damage to a single computer, server, or computer
network. Ransomware, Spyware, Worms, viruses, and Trojans are all
varieties of malware.

Phishing: It is the method of trying to gather personal information using


deceptive e-mails and websites.

Denial of Service attacks: A Denial-of-Service (DoS) attack is an attack


meant to shut down a machine or network, making it inaccessible to its

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 38 of 46
:
intended users. DoS attacks accomplish this by iooding the target with
tra_c or sending it information that triggers a crash.

Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks,


occur when attackers insert themselves into a two-party transaction. Once
the attackers interrupt the tra_c, they can Klter and steal data.

Social engineering is an attack that relies on human interaction to trick


usersinto breaking security procedures to gain sensitive information that is
typically protected.

Measures to be taken

Real-time intelligence is required for preventing and containing cyber-


attacks.

Periodical ‘Backup of Data’ is a solution to ransomware.

Using ArtiKcial Intelligence (AI) for predicting and accurately identifying


attacks.

Using the knowledge gained from actual attacks that have already taken
place in building effective and pragmatic defense.

Increased awareness about cyber threats for which digital literacy is


required Krst.

There is a need to secure the computing environment and IoT with current
tools, patches, updates and bestknown methods in a timely manner.

The need of the hour isto develop core skillsin cybersecurity, data integrity
and data security Kelds while also setting stringent cyber security
standards to protect banks and Knancial institutions.

One of the highest numbers of cyber threats have been detected in India, and the
country ranks second in terms of targeted attacks. Banking and Telecom are the
most attacked sectors, but manufacturing, healthcare, and retail have also faced a
signiKcant number of cyber-attacks. Thus, there is an urgent need to take protective
measures to tackle this menace.

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 39 of 46
:
2021
9. Discuss how emerging technologies and globalisation contribute to money laundering.
Elaborate measures to tackle the problem of money laundering both at national and
international levels.

HIDE ANSWER

Money laundering is deKned as the process that disguises illegal proKts without
compromising the criminals who wish to beneKt from the proceeds.

Emerging technologies contribute to money laundering in following ways:

Structuring deposits, involvement of a lot of channels popularly called as


smurfs, to hide from the anti-money laundering reporting.

Use of cryptocurrencies and alternate Knance that are unregulated by


governments.

Large volume of digital transactions at online market places is used to


disguise the structured chunks of layered money.

Globalisation contributes to money laundering in following ways:

Placement of money in global Knancial system creates problems of


coordination between multiple jurisdictions.

Shell companies lie within the sovereign border without active business
operations in the guise of legitimate transactions through fake invoices and
balance sheets wherein they channel the laundered money into illegitimate
businesses.

Tax haven countries like Cayman Island, Panama etc. have structured their
economies around assistance in tax evasion.

Measures at national level:

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 40 of 46
:
Measures at national level:

Prevention of Money Laundering Act (PMLA), 2002 criminalises money


laundering as a cognisable, non-bailable offence.

Financial Intelligence Unit – India (FIU-IND) coordinates efforts of national


and international intelligence, investigation and enforcement agencies
against money laundering.

The Black money (undisclosed foreign income and assets) and Imposition
of Tax Act, 2015 deals with the menace of the black money existing in the
form of undisclosed foreign income and assets.

Measures at international level:

The Vienna Convention makes it obligatory for signatory states to


criminalise the laundering of money from drug tra_cking.

The Financial Action Task Force (FATF) sets standards and promotes
effective implementation of legal, regulatory and operational measures
against money laundering and terror Knancing.

The OECD forum has adopted convention against money laundering. It


supports appropriate safeguards, access to tax administration in
suspicious transaction based on information received from FIUs.

The International Organisation of Securities Commissions (IOSCO) takes


necessary steps to combat money laundering in securities and futures
markets.

Money Laundering is a global menace which require global effort to curb it. Both
international and national stakeholders need to come together by strengthening
data sharing mechanisms and adopting a multilateral approach to effectively
eliminate the problem of money laundering.

2022
9. Discuss the types of organised crimes. Describe the linkages between terrorists and

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 41 of 46
:
9. Discuss the types of organised crimes. Describe the linkages between terrorists and
organised crime that exist at the national and transnational levels.

HIDE ANSWER

Illegal activities carried out at a large scale for proKt through organisation and
planning by powerful criminal groups are known as organised crime.

Some major types of organised crime are smuggling, racketeering, drug and human
tra_cking, etc.

Organised crime can be broadly categorised as ‘traditional’ and ‘non-traditional’.


The former includes activities such as extortion, contract killings, smuggling, etc.,
while the latter includes cybercrime, enterprise and political corruption, white collar
crimes, etc.

Terrorism is not classiKed as an organised crime since it is driven by a political and


ideological agenda and not proKt-making. Nevertheless, both organised crime and
terrorism often complement each other.

Terrorists primarily require two things for carrying out their activities — Knancing
and logistical support, often provided by entities engaged in organised crime.
Sometimes, even terrorists carry out activities that fall under the purview of
organised crime. For example, extortion by Left Wing Extremists for Knancing their
activities against the state.

Further, as showcased by the 1993 bombings in Mumbai, entities and individuals in


organised crime also provide logistical support to terrorists such as smuggling of
dangerous material(s), providing human resources, communication network(s) and
information, arranging Knancial help etc.

Thus, organised crime and terrorism share close linkages at both national and
transnational levels and pose a signiKcant threat to the security of the country.

SEND TO MY PROGRESS SEND TO MY BOOKMARKS

Tell us what you think!


35 Responses

https://www.drishtiias.com/upsc-mains-solved-papers/subject/internal%20security 16/10/23, 6 56 PM
Page 42 of 46
:

You might also like