Professional Documents
Culture Documents
Regular Downloadable
Answer Writing Classes Class PPTs
Regular Validity
Doubt Sessions till 31st Dec’24
OPTIONALS WE HAVE
INDEX
1 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
1. BASICS OF SECURITY
• Internal Security: Maintaining unity, law and order, and national sovereignty.
• External Security: Protecting a country from foreign threats.
• Relationship between internal and external security: Intertwined, but distinct.
• Peace at the border and maintenance of law and order: Protecting sovereignty and maintaining peace, rule of law,
and order.
• Collaboration between internal security forces and external forces & intelligence agencies: Armed forces protect
against foreign aggression, while police oversee internal security.
• Economic growth and increased income level: Enhance stability and security.
• Classification Of Internal Security Threats: External threats; Internal Threats; Internally aided external Threats;
Externally aided internal Threats.
Social • Stringent law against communal and hate speech or propaganda; Regulation of social media
Economic • Targeted approach for poverty reduction; Comprehensive policy curb black money
Administrative • Police Reform; Reforming the criminal justice system; A comprehensive strategy combat
Naxalism; National Counter-Terrorism Centre
Military • Reform in CAPF; Border management
INITIATIVES
• National: Unlawful Activities Prevention (Amendment) Act, 2019 (2019); Modernization of Police (2018); SAMADHAN
Initiative (2015); National Policy and Action Plan on Left Wing Extremism 2015 (2015); Infrastructure development
(ongoing); Aspirational District Program (NITI Aayog) (2018); Civic Action Programme (2018); NATGRID (2012); Crime
and Criminal Tracking Network and System (CCTNS) (2009); Indian computer emergency response team (CERT-In)
(2004); National Critical Information Infrastructure Protection Centre (2013); National Cyber security policy 2020.
• International: Interpol; Vienna Convention on Money Laundering; UN Resolution 1624 (2005); Financial Action Task
Force (FATF); Counter-Terrorism Committee (CTC).
Scholars' View
•
India's nuclear doctrine plays a significant role in determining nuclear stability in South Asia, as it is often regarded
as constrained.
• Shivshankar Menon references Subramaniam's belief that perception is the key to deterrence, but first usage posture
can be upsetting.
• Advantages: Reduce Infrastructure cost; Saved India from the blame of War Initiation; No Chance of false alarm; Build
the International image; Responsible nuclear power
2 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
• Disadvantages: Removes Ambiguity; Continued Aggression from Advisory; Difficult to survive after the first attack;
Pakistan First Use policy; Inefficiency of deterrence; Chinese Expansionist Policy
Scholars View
According to Harsh V Pant, India's no-first-use principle faces challenges, including western non-proliferation
consensus suggesting it may abandon the strategy, and a military conflict between China and India requiring a first-use
strategy announcement.
HYBRID WARFARE
• Definition: Hybrid warfare combines conventional and unconventional methods, using economic, cyber, and diplomatic
tactics.
• Dimension Of Hybrid Warfare: Multiple Ways to Attack; Difficult to Trace; Difficult to Retaliate; Target Vulnerable
Fault Lines; Attack on democracy through coup; Flexibility in warfare; Long-term war; Psychological warfare.
• Solution: Wholesome approach; Need for Civilian sensitive Force; Regularly checking sector-specific vulnerability;
Training of armed forces; Infrastructure building; Strengthening democracy.
CONCLUSION
• Developing an internal security policy for managing multiple armed conflicts involves two components, physical,
focusing on a state's military capacity, intelligence services, economic development, and development aid, and
psychological, assessing citizens' readiness to support national objectives.
Student Note:
3 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
António Guterres
Today and every day, let us work together to build more peaceful, inclusive, and stable societies in which terror and
violent extremism have no home.
SDG-16
Promote peaceful and inclusive societies for sustainable development, provide access to justice for all and build effective,
accountable and inclusive institutions at all levels.
PM MANMOHAN SINGH
PM Manmohan Singh in 2005, described the LWE challenge as the most serious security threat to India and exhorted the
professionals to evolve appropriate responses.
FACT-WISE
• Left Wing Extremism (LWE) related violence in the country has declined by 77% from an all-time high of 2258
incidents in 2009 to 509 in 2021.
• Similarly, resultant deaths (Civilians + Security Forces) have declined by 85% from an all-time high of 1005 in 2010
to 147 in 2021.
• In the last two years, the incidents of LWE violence and the resultant deaths have come down by 24% and 27%,
respectively.
• 90% of all security personnel fatalities nationwide occurred in Chhattisgarh, which is followed by Jharkhand,
which reported 5 fatalities, in terms of overall statistics. In Chhattisgarh over the last three years, the number of
security force fatalities at the hands of Maoist insurgency has more than doubled.
ORIGIN OF NAXALISM
• Origin of Left-wing Extremism (LWE): Initial The LWE began in 1967 in the three areas of Naxalbari, Phansidewa,
and Khoribari in West Bengal's Darjeeling District; Charu Majumdar, Kanu Sanyal, and Jangal Santhal of the
Communist Party of India (Marxist) led the initial uprising; The first uprising took the form of a peasant revolt; The
Communist Party of India (Marxist-Leninist) was founded in 1969; Movement has spread to rural areas in Telangana,
Andhra Pradesh, Odisha, and Chhattisgarh.
• Aims and Objectives of LWE: Aim to overthrow the government through people's war; Seeks to disrupt government
and development activities, spreading fear among citizens; Goal is to attain political power through violence.
• Central Theme of Maoist Ideology: Use of Violent Means; Glorification of Guerrilla Warfare.
4 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
RED CORRIDOR
• The Red Corridor covers areas of Central, Eastern, and Southern India, and is plagued by severe Naxalite-Maoist
insurgency, high tribal population, and social and economic disparities. It spans from Nepal to Tamil Nadu's northern
fringes.
Case Study
Saranda Model Infrastructure development prioritized; integrated center for subsidized food and employment.
(2011)
Operation Green Massive security force deployments; Security force deployments in Naxal-affected areas decreased
Hunt (2010) from 223 in 2010 to 90 today.
Sandesh Model Bihar's Sandesh block freed from Naxal through panchayat elections, widening the gap between
locals and Naxal leaders, and forcing many to transition to farming.
Greyhound Andhra Pradesh's successful model includes infrastructure improvement, surrender and
Model (1989) rehabilitation policy, Greyhound Naxal combat squad, police leadership culture, incentives, local
intelligence, and grassroots involvement in anti-Naxal operations.
5 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
Nandan Nilekani
In his book "Imagining India," Nandan Nilekani makes the case that giving local tribal groups the authority to make
decisions about the environment and forest resources through the PESA and the Forest Rights Act can help them use their
lands for economic benefit.
URBAN NAXALS
• Definition: Urban Naxals are the ‘invisible enemies’ of India. The urban intellectual force provides logistical support
and works as a defender of the rural work of Maoists. One common thread amongst all of them is that they are all urban
intellectuals, influencers or activists of importance.
• Main Dimension: Urban Naxals; Naxalite mentality; Activists, advocates, and defenders of the ideology; Urban
perspective: Our work in urban areas; Mobilise urban poor like industrial workers; Creates a rift between government
and tribals; Old Maoist strategy; United front and engage in military tasks; Radicalize against the government; Mobilise
masses and strengthen organisational structures in urban areas; Formation of United Front; Legal Aid to Military Task;
Military wings of CPI-M, PGI, and PLGA.
WAY FORWARD
• UN Plan of Action to Prevent Violent Extremism (2016); Christchurch Call for Action; Policy for Deradicalization;
Comprehensive strategy; Root causes of radicalization; Critical security-based counterterrorism measures; Eliminating
terrorist and violent extremist content online; Legal framework; Combat radicalization.
Student Note:
6 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
Part IX-The • Article 243 M and Article 243 ZC: Part not to apply to Certain Areas
Panchayats
Part X- The Scheduled • Article 244: Administration of Scheduled Areas and Tribal Areas
and Tribal Areas • Article 244A: Formation of an autonomous State comprising certain tribal areas in
Assam and creation of local Legislature or Council of Ministers or both therefore.
• Article 371A: Special Provision with respect to the State of Nagaland
Part XXI – Temporary, • Article 371B: Special provision with respect to the State of Assam
Transitional and • Article 371C: Special provision with respect to the State of Manipur
Special Provisions • Article 371F: Special provisions with respect to the State of Sikkim
• Article 371G: Special provision with respect to the State of Mizoram
• Article 371H: Special provision with respect to the State of Arunachal Pradesh
Sixth Schedule • Articles 244(2) and 275(1): Provisions as to the Administration of Tribal Areas in the
States of Assam, Meghalaya, Tripura and Mizoram.
• Inner Line Permit (ILP): To preserve indigenous identity, Mizoram, Nagaland, and
Arunachal Pradesh impose entry restrictions on outsiders through Inner Line Permits
Other Administrative (ILP).
Provision • Ministry of Development of North Eastern Region (DoNER): To expedite socio-
economic development in the North Eastern Region, it is responsible for planning,
executing, and monitoring development schemes and projects.
Political • Strategic: Comprises 8% total area and 3.8% of total India’s population
• Act East Policy: Gateway to Southeast Asia and beyond, supporting the Act East Policy.
Economic • Natural Resources: Tea, oil, and lumber, hydroelectric potential of 50,000 MW.
• Trade: Its location supports trade and commercial linkages across the country
Ecological • Part of the Indo-Burma Biodiversity Hotspot.
• Its extensive forest cover contributes to India's commitment to carbon sink generation for the Paris
Summit.
Cultural • India's cultural diplomacy prioritizes ASEAN with flourishing civilizational ties and people-to-
people interactions.
Diplomatic • ASEAN's connectivity between two oceans shapes India's future Indo-Pacific policy.
7 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
8 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
• Mizoram: The Mizo National Front (MNF) used violence to advocate for the sovereign independence of Greater
Mizoram, leading to large-scale disturbances before signing a peace agreement in 1986, granting full statehood to
Mizoram and amnesty to MNF rebels and peace in the state.
Social Disintegrated Society; Alienation due to segregation and isolation from the mainland; Deprivation due
to lack of essential services like water, power etc.; Internal Displacement.
Economic Unemployment rate: Highest in Tripura (25.2%) followed by Nagaland (23.8%); Low levels of
economic development ( lower per capita income).
Administrative Political support for the insurgency (Vote-bank politics ); Political instability.
Cultural Complex Ethnic Relations (ethnic and linguistic diversity); Conflicts for Identity; Bengali immigrants.
Security hostile neighbour like China; Organized Crime (smuggling, drug trafficking etc.); Cross Border
Movement of Insurgents
Geographic Porous International Border; Dense forests (hampers surveillance); Topography Challenges.
NAGA ISSUE
• Key Demand Of The Group: Naga Yezabo (Naga Constitution); Naga national flag; Greater Nagalim (sovereign
statehood).
• Naga Peace Accord (2015): The Nagaland peace accord, signed in August 2015 between the Government of India and
the National Socialist Council of Nagaland (NSCN), aimed to end insurgency by having NSCN abandon its demand for
'Greater Nagaland,' pledging allegiance to the Indian constitution, while recognizing Naga people's unique history,
culture, and aspirations, with a focus on peace, prosperity, and equity in the NorthEast region.
• Developments On Post-Signing The Agreement: The Enlarged Peace Talks process includes Naga National Political
Groups, evolving from bilateral to multilateral negotiations; deadlock since Oct 2019 due to NSCN(IM) seeking separate
flag and constitution for a shared-sovereignty federal relationship, while some Naga groups differ on "Greater Nagalim"
demand.
• The Present Grievances Of NSCN-IM: Fear of Cultural Extinction; Tribal Rights; Interpretation of Agreement;
Grievances against Mr Ravi (Interlocutor and Nagaland Governor); Financial Autonomy; Lack of Jobs; Issues of
sovereignty and integrity; Surrender of Weapons; Role of External Factor.
• Way Forward: New Constitutional body for Naga rights; Proper understanding of the tribal issue; Open Channel of
Dialogue; Promote the Peace Accord Process; Recognize the unique history, culture, and position; Maximise
decentralisation; Proper Peace Framework; Provide Autonomy to Naga Community.
9 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
OTHER DISPUTES
• Assam-Mizoram: Assam-Mizoram border dispute rooted in British-era 1875 and 1933 notifications; Mizoram, despite
gaining statehood in 1987, clings to the 1875 line.
• Assam-Nagaland: Assam-Nagaland's longest-running border dispute began after Nagaland's statehood in 1963, with
Nagaland rejecting the proposed boundaries and demanding inclusion of all Naga-dominated areas in North Cachar and
Nagaon districts.
10 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
WAY FORWARD
• Accelerate development work; Active participation of youth; Socio-Economic Upliftment (employment opportunities);
Amalgamation of constructive political ideology; Sustained media campaign; Effective Surrender and rehabilitation
policy; Proper Check on Terrorist Funding.
CONCLUSION
• To resolve militancy in Jammu and Kashmir, a comprehensive approach is needed, addressing political grievances,
promoting dialogue, good governance, socio-economic improvement, and trust-building among stakeholders.
Strengthening security forces, intelligence networks, and border management is also vital to prevent infiltration and
counter-militant activities.
11 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
5. TERRORISM
• Meaning of Terrorism by the UN: The UN General Assembly Resolution 49/60 (1994) defines terrorism as a criminal
act designed or planned to induce a state of terror in the public, a group of persons, or persons for political reasons.
• According to the FBI: Terrorism is defined under two categories.
1. International terrorism: Violent, criminal acts committed by individuals and/or groups who are inspired by, or
associated with, designated foreign terrorist organizations or nations (state-sponsored).
2. Domestic terrorism: Violent, criminal acts by people or groups to further domestic ideological goals, such as
political, religious, social, racial, or environmental.
• The UAPA Bill in Section 15 defines a “terrorist act”: Any act intended to threaten or likely to threaten India's unity,
integrity, security, economic security, or sovereignty or to strike dread in the people or any segment of the people in
India or abroad.
FACT-WISE
• Provisions: The Indian Penal Code of 1860, as revised from time to time, does not mention terrorism as a crime. The
TADA, 1987 was the first special law in India to seek to define terrorism; it was followed by the POTA, 2002. The UAPA,
1967 was updated in 2019 to include the definition of a "terrorist act" following the abolition of the latter in 2004.
• Worst affected countries: India is one of the top 10 nations in the world that experience terrorist attacks. Lowest
fatalities: 2019 recorded the lowest number of fatalities in a year since 1986 except for the Covid19 Pandemic years.
There was a total of 621 fatalities in 2019.
• Jammu & Kashmir: The trend of increasing fatalities, on a year-on-year basis, established in 2016, had been reversed
in 2019.
• Global Terrorism Index, 2023: In the index, India placed 13th, a slight improvement from the year before. India
scored 7.175 on the GTI, making it one of the countries with the "highest" impact of terrorism.
POINTERS ON TERRORISM
• Ethno-Nationalist Terrorism (eg: Sri Lankan Tamil Nationalists and North East
Indian insurgents); Religious Terrorism (eg: the Afghan Taliban); Narco-terrorism
Variants Of Terrorism (eg: Golden Crescent and Golden Triangle); Ideology Oriented Terrorism types:
(2nd ARC) Left-wing Terrorism (eg: Indian and Nepalese Maoist groups), Right-wing
Terrorism (eg: Lashkar-e-Taiba); State-sponsored Terrorism (eg: Jaish-e-
Mohammed in Pulwama Attack); Lone Wolf Terrorism (eg: 2016 truck attack in
Nice, France).
Pak Sponsored/Cross- • Cross-Border Terrorism (eg: Drone Attack); The militancy in J&K (eg: Poonch
Border Terrorism Attack); Trust funding (eg: The Al-Rashid from Karachi); Hawala transactions
(eg: JeM, LeT and HM funded indirectly by the ISI).
Factors Facilitating Cross- • Geographical Factors (Porous Border, Complex Geography, Hard to protect);
Border Incursion Administrative Factors (Lack of Strategic Thinking, Internal Support, Corruption);
Foreign Support Factors (Support from Non-State Actors, Pakistan Role).
• Political Reasons (Oppression by Government); Social Reasons (Religion);
Reasons For The Spread Of Economic Reasons (Marxist view, Poorer Nations); Psychological Reasons
Terrorism (Personal Reasons); Ideological Reasons (Ideology); Technological Reasons
(Promotion through the Internet, Online Terrorism); Other Reasons (Spillover
Effect, Center stage in activities, Resource Control, International order of power).
Funding Source Of • Extortion And Taxation; Smuggling; Zakat (eg: Al Huda Educational Trust (AHET)
Terrorism terror funding case); Looting; NGOs, Charities; Monopolistic Control; State-
sponsored terrorism; Drug trafficking; Hawala; Counterfeiting of Indian currency.
Terrorism Emerging As A • Competitive Industry; Sources (Funding, Market (public opinion) and Manpower;
Competitive Industry Role of Media; Industry.
Challenges Faced By The • External Challenges (Bitter Neighbours, Money Laundering); Internal Challenges
Government In Countering (Rapidly Evolving Situations, Unique situation of India, Unstable political structure,
The Terror Financing Crime and Political nexus, Low Manpower, Corruption).
Steps Taken To Check • Strengthening UAPA; Terror Funding and Fake Currency (TFFC) Cell; Renewed
Terror Funding focus on currency counterfeit; Training programs; Coordination Group (eg: FICN);
Centre-State Coordination; Security at the international borders.
Steps To Counter Terrorism • Intelligence gathering and analysis; Law enforcement and investigations; Border
and transportation security; Cybersecurity and information sharing; Counter-
radicalization and community engagement; Military action and operations;
12 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
OVERGROUND WORKERS:
• Definition: Overground workers (OGWs) are people who help militants, or terrorists, with logistical support, cash,
shelter, and other infrastructure with which armed groups and insurgency movements such as Hizbul Mujahideen and
Jaish-e-Muhammad in Jammu and Kashmir can operate.
• Role Of Overground Workers: Instrument For Communication; Recruitment; Attackers; Training; Brainwashing;
Helps infiltrators; Infrastructure Provider; Sleeper Cells; Protestors.
• Measures To Counteract Overground Worker's Influence: Effective funding control through greater monitoring;
Adding more intelligence and police officers; Stopping inmates behind the bar from talking to hardcore fundamentalists
and terrorists; Enlisting the assistance of Community leadership to combat OGW's militant propaganda; ensuring
inclusive growth to combat alienation sentiments.
HYBRID TERRORIST:
• Definition: Hybrid terrorists are individuals who are not classified as ultras but are radicalized enough to carry out a
terror attack and then return to normal life, according to security services and intelligence agencies in Kashmir. In other
words, they are the sleeper cells. Security agencies describe these terrorists as “boys next door” who are kept on
standby mode by terror groups.
• Main Challenge Posed By Hybrid Terrorists: Identification; Threat on Multiple Levels; Digital radicalization;
Cyberattacks; Cross-Border Infiltration; Networks of funding; Sleeper Cells; Technology weaponization; Coordinated
assaults.
RADICALISATION:
• Definition: A person or group can become radicalized when they adopt strong political, social, or religious goals and
aspirations. It rejects or undercuts the status quo as well as current national beliefs and representations.
• Factors Responsible For Radicalization: Political Factor (Weak and non-participatory political systems, Government
apathy and authoritarian tendencies); Socio-Economic Factor ( Poverty, social isolation, marginalization, and
discrimination, Restricted education and career opportunities); Administrative Factors (Land capture without adequate
compensation); Religious Intolerance (Religious intolerance, hate crimes, and mob lynchings, Insecurity among
minorities); Social Media (Facilitates virtual interaction, Utilized for terror funding and promoting violence);
Displacement (development and land acquisition, Emotions of injustice and rage).
• Variants Of Radicalization: Right-Wing Extremism (Aggressively defending racial, ethnic, or phoney national identity,
Strong animosity towards government officials, immigrants, minorities, and left-leaning political organizations); Left-
Wing Extremism (Anti-capitalist demands, Calls for political reform to address social inequalities leading to violence);
Politico-Religious Extremism (Political interpretation of religion).
• Key Dimensions Of Radicalization: Extreme views; Working; Fallout; New recruitment grounds; Problem of detection;
Influencing masses; Potent tool for radicalization; Tech-savvy militants; Terrorist recruitment; Overall new problem;
Reinforcing pathways; Violent extremism.
ONLINE RADICALISM:
• Definition: The process by which an individual is introduced to an ideological message and belief system that
encourages movement from mainstream beliefs toward extreme views, primarily using online media, including social
networks such as Facebook, Twitter, and YouTube.
• Mechanisms Of Online Radicalization: Compensation; Isolation; Facilitation; Echoing.
13 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
• Intelligence Bureau: The IB played the role of an intelligence agency which coordinated
the efforts of various state police forces.
Before The 26/11, • Creation of NSG: After the assassination of former PM Indira Gandhi, a special commando
2008 Mumbai attacks: force (NSG) was created to engage and neutralize the terrorist threats in specific
situations.
• Legislations: Such as UAPA 1967, NSA 1980, TADA, MCOCA, POTA.
• Coordination: Although the Mumbai Police and NSG were hailed for their 26/11 activities,
New Changes after the their early response and operating protocols revealed major communication issues.
26/11, 2008 Mumbai • New institutions: The Centre took various actions after 26/11. NIA, NATGRID, MAC
attacks: (revamping), and NCTC were also revealed. Legal actions were also taken.
• Introduction: Proposed overhaul using big data and analytics for analyzing intelligence and law
enforcement data to track potential terrorists.
• Purpose: Addresses real-time information gap in tracking terror suspects' movements, like US
NATGRID suspect David Fleadley's visits.
• Functions: Collects and collates data from government databases (tax, bank, credit card, visa,
travel) for sharing with 11 central agencies to counter terrorism.
• Establishment: After the Kargil war in 2001 by the Intelligence Bureau (IB).
• Functions: Serves as a node for multiple agencies to share terrorism-related intelligence inputs.
MULTI AGENCY • Location: Main centre is located in Delhi, with subsidiary MACs (SMACs) in state capitals for daily
CENTRE (MAC) meetings and review of contributions.
• Mandate: Shares terrorism-related intelligence inputs on a day-to-day basis.
• Membership: Involves all organizations fighting against terrorism in any capacity.
• Reason for Establishment: Response speed criticism during the 2008 Mumbai attacks led to
CREATION OF multiple stations for faster deployment.
FOUR NEW • Origin: Established in 1984 as the National Security Guard (NSG) for combating all dimensions
NATIONAL of terrorism as a Federal Contingency Deployment Force.
SECURITY • Specialization: Designed for "exceptional situations" as a specialized counterterrorism force.
GUARD HUBS • Functions: NSG hubs in Mumbai, Kolkata, Chennai, and Hyderabad were established for
improved crisis response times after Manesar.
• Significant Dimensions: Speedy Investigation and Prosecution of Scheduled Offenses; Insertion of New Offenses in the
Schedule; Expanded Jurisdiction for NIA Abroad; Investigation of Various Crimes; Establishment of Special Court in New
Delhi.
• Challenging The NIA Act Itself: Credibility of National Institutions; Lack of Timely Mechanism; Opposition from States;
Violation of Federal Framework; Political Interference; Limited Scope of Investigation.
• Way Forward: Increasing Credibility; Expanding NIA's Mandate; Crime Reduction; Upgrading Technology and
Procedures; Minimizing Political Interference.
Issues With Anti-Terror • Incoherence and Misuse (TADA); Increasing Misuse (POTA); Complexities of Indian
Legislations Federalism; Legislative Gap (UAPA); State-specific Problems (MCOCA, APCOCA).
• Realization of weakness (November 2008); NATGRID; Military inputs increased;
Evolving Trend in India’s National Security Guard; Regional Hubs; Streamlined coordination; Intelligence
Counterterrorism sharing; Deepening cooperation; Broadening counter-terrorism cooperation;
Response Countering extremist narratives; Strengthening cooperation; Counter-narratives; Use
of UAPA; Financial Intelligence Unit-IND (FIU-IND); Combating Financing of
Terrorism (CFT); Stated policy Missing.
Evaluation Of India’s • Lack of clarity; International collaboration; Centralized counterterrorism response;
Counter-Terrorism Evidentiary value; Intelligence-investigation; Institutionalization of Intelligence; Lack
Response of Exploitation of Data; Necessary Infrastructure; Legal Role.
Failure And Lacunas Of • Substandard surveillance; Lack of coordination; Hierarchical confusions; Integration;
Intelligence Accountability; No parliamentary or public debate happens on working of these
Agencies/Networks institutions.
Concerns About The • Specialists and technical skills; Education system; Database problem; Limitation of
Existing Intelligence traditional methods; Shortage of personnel; Internal armed conflicts; Failure of
Network traditional intelligence; Lack of parliamentary statute; Credibility of the data; National
Cyber Security Policy; Different mandates; Intelligence collection; Lack of reforms.
• Madhukar Gupta Committee (2016)(construction of border protection grids along the
eastern front); Information gaps; National Cyber Security Policy (2013); Intelligence
Way Forward sharing; Newer generation threats; Social Media and Youth; Comprehensive
convention against terrorism; Anticipation of threats; Comprehensive law; Rising
above the politics; Increasing capital outlays; Exponential thinking; Need for
comprehensive data on External Migration.
15 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
COMBATING BIOTERRORISM:
• Definition: Interpol defines bioterrorism as the purposeful release of biological agents or toxins to hurt or kill persons,
animals, or plants to intimidate or force a government or civilian population to promote political or social aims.
• Dimensions: Controlling Biological Agents; Need for Law; Security Against Biological Weapons; Seven-Point Action
Plan (improving disease surveillance, including at the animal-human interface, bio-weapon-related public health
emergency training, and diagnostics, vaccinations, and drug research and surveillance).
• Challenges Of Biological Weapons: Identifying the Motive; Limited Information; Deadly Nature of Agents; Time Lag
in Treatment and Vaccines; Problem of Detection and Control; Impact on Conventional Warfare; Non-State Actors and
Accidental Release; Threat to the Economy.
• Measures Need To Tackle Bio-Weapons: Integration with National Security; National Rapid Deployment Biosecurity
Force; National Strategies Development; Bio-safety of Research Facilities; Multilateral Bio-surveillance Mechanisms;
Controlling Dual-use Biological Technology; Transforming Medical Facilities for Biosecurity.
CYBER EXTREMISM:
• Definition: Cyberterrorism is the use of the Internet to conduct violent acts that result in or threaten, the loss of life or
significant bodily harm, to achieve political or ideological gains through threat or intimidation.
• Significant Dimension: Internet terrorism; Cause destruction; Shift in modus operandi (changed recruitment, training,
and deployment methods).
• Way Forward To Check Online Terror: Surveillance capabilities; Inter-agential coordination; Increasing Participation
of family; Respecting the Fundamental Rights; Multi-pronged strategy; International Cooperation; Comprehensive
Legislation; Use of Technology; Police forces.
16 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
• International Boundary (IB) refer to the Pakistan-India boundary, stretching 3,323 kilometres from
Jammu and Kashmir to the meeting point of Gujarat, India, and Sindh, Pakistan, at Zero Point.
• The porous nature of the border between India and Pakistan gives rise to significant security
Pakistan challenges such as:
o Inter-Services Intelligence presence in Nepal; Pakistan’s Ties with the Taliban and other radical
groups; Covert activities like training and facilitation of armed rebels by Pakistan; China-
Pakistan nexus; Pakistan military sponsorship to armed groups in J&K and Northeast; Fake
currency (FICN) rackets; Reinforcing Sikh separatism; Fuelling Kashmiri militants.
• 3,488 kilometres long Border.
• Himachal Pradesh, Uttarakhand, Arunachal Pradesh, Jammu and Kashmir, and Sikkim all share
the border.
• Borders of Concern: The McMahon Line & The Line of Actual Control (LAC).
China • It is a large empty zone that is mostly maintained by both countries’ armies. However, there are
security challenges such as:
o Support to extremist groups in the northeast (such as Naga, Mizo and Meitei); Strategic alliances
with countries like Myanmar, Bangladesh, and Pakistan; Border area construction; Fuel to
Maoist movements; China’s growing assertiveness in the region.
• Nepal shares a border of about 1850 km (Uttarakhand, Uttar Pradesh, Bihar, West Bengal and
Sikkim).
Nepal • India and Nepal have a special connection based on open borders and profound cultural and familial
ties. However, several security threats include:
o Open border with free exchange of people and currency across; Communist Party of Nepal
(Maoist) paves threat to India's internal security; Fueling anti-India emotions.
• Bangladesh and India share a 4,096-kilometre land border, the fifth-longest in the world, with 262
km in Assam, 856 km in Tripura, 318 km in Mizoram, 443 km in Meghalaya, and 2,217 km in West
Bengal.
Bangladesh • The border between India and Bangladesh is porous. Thus, it raises security concerns such as:
o Trans-border migration from Bangladesh; A haven for Islamic terrorists in South Asia; Terrorist
camps in Habiganj, Maulvi Bazaar, Chittagong, and Satcherri districts of Bangladesh; Communal
and minorities issue; Social and economic insecurity for local communities.
• Myanmar and India share a 1643-km land border and a Bay of Bengal marine boundary.
• Arunachal Pradesh, Nagaland, Manipur, and Mizoram border Myanmar.
• Due to the recent political condition in Myanmar, concerns regarding security have increased. It raises
security concerns such as:
Myanmar o The normality of crossing the border by Naga, Mizo, Meitei, and Assamese militants; Tacit
approval of the Myanmar government to these groups; Gun running and drug trafficking across
the India-Myanmar border; Proximity to Myanmar in the ‘Golden Triangle’ (Myanmar, Thailand
and Laos); The 1967 boundary agreement.
• India shares a 106 km land border with Afghanistan (Only with J&k i.e. POK).
• Recently, the Taliban took over Afghanistan. Thus, it raises concerns not only for India but also for
Afghanistan the world. It raises security concerns such as:
o Pakistan’s privileged position in Taliban-held Afghanistan; Drug trafficking in Afghanistan; Role
of China; Absence of a common border (no direct access).
17 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
WAY FORWARD
• Improve Centre-State dialogues through the National Integration Council (NIA), Development Council, etc.; Counter-
Terrorism measures; Curb the internal sources of terrorist funding; Bring the Police: Population Ratio to the UN-
prescribed norm (222Police/100,000People); Create a Border Management Commission (BMC) to establish policies
and strategies; Seek International Cooperation; Have extradition treaties and agreements on criminal matters; Create
Specialized Research Institutions to create internal security policies; Perception management; Curb radicalization
through Internet and social media; Cyber security reforms; Futuristic urban planning.
18 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
would sail around the Horn of Africa if banned. This would increase travel times, transit expenses, oil prices, and the
world economy); Real risk of an environmental catastrophe.
• Measures Taken: National And International: Operational Measures (Naval ships with armed helicopters patrol
piracy-prone areas); Organizational Measures (Establishment of Indian Ocean International Fusion Centre (IFC) for
sharing critical information); Institutional Measures(India's SAGAR policy, Maritime Anti-Piracy Act, 2022, etc.);
International Measures (India’s reaffirmation to UNCLOS).
• Way Forward: Strengthening of the Coast Guard (CG); Clearly defining statutory roles Lawful bodies and basic port
security standards; Addressing the problems of coordination arising out of the interactions of multiple agencies;
Comprehensive legislation to protect India’s maritime infrastructure; Surveillance and interagency coordination;
Stronger involvement of coastal police; National Commercial Maritime Security Policy document; Reinforce Coastal
Regulation Zone regulations; Coastguard drills like Sagar Kavach and sea to promote awareness of maritime issues.
• Conclusion: Combating maritime terrorism is a matter of public concern that calls for a vigilant, determined approach
to securing and obtaining oceanic lines; making significant assumptions for the age of opportune and significant insight;
strong inter-agency participation; and an integrated approach that can create a framework of effective law enforcement
in maritime waters.
Student Note:
19 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
FACT-WISE
• At the beginning of 2023, India had 692.0 million internet users, with internet penetration at 48.7 per cent. In
January 2023, India had 467.0 million social media users, accounting for 32.8 per cent of the total population.
• Challenges Of Regulating social media: Protecting user privacy clashes with the need for access to private data, while
ensuring freedom of expression is balanced against preventing content that threatens national security; Anonymity
allows for the spread of harmful messages, and encryption hampers traceability of messages; ever-evolving technology
demands adaptable regulations, but holding intermediaries accountable proves complex; Jurisdictional issues arise with
foreign-based companies; Fake news spreads easily, and data stored abroad poses legal challenges; Lack of international
consensus further complicates global regulation efforts.
WAY FORWARD
• Use of Technology; Authentication of information; Awareness creation; Regulations; Centralised monitoring system;
National Social Media Policy; Institutional framework; Experiments Like Social Media Lab; Self-Regulation and Code of
Conduct.
CONCLUSION
• Social media regulation requires a multi-faceted approach involving stakeholders from government, civil society, and
users to balance individual rights, public interests, and freedom of expression without limiting innovation.
21 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
• Positives: Citizen-led government through social media has increased awareness, accountability, and public
engagement; It enables rapid information dissemination, political awareness, and gives a voice to marginalized groups;
Social media fosters a sense of community, protects freedom of expression, and drives behavioural changes;
Additionally, it broadens access to information and enhances political participation.
• Negatives: Social media poses challenges to democratic values by enabling hate speech, spreading misinformation, and
fostering trolling; Fake news and unregulated political influence can affect free and fair elections; The digital divide
creates inequality, and lack of privacy undermines personal rights; Social media also leads to radicalization and echo
chambers, limiting diversity and constructive dialogue.
• Way Forward: Integration with traditional media to counter fake news; Higher journalism standards in social media
reporting; Political parties adopt responsible social media guidelines; Government regulations to prevent misuse;
Election Commission needs more power for social media regulation; Promote diversity of perspectives for constructive
dialogue.
FAKE NEWS
• Causes: Media lacks integrity, spreading fake news for TRP and political propaganda; Sensationalism drives fake news
for profit; Lack of proper regulation, awareness, and digital literacy contribute to the problem; Confirmation bias and
profit motives perpetuate fake news; Increasing internet use and social media algorithms also play a role in its spread.
• Challenges: Data encryption hinders message verification, difficulty in tracing sources, global reach complicates legal
actions, manipulation of public opinion, legal and ethical issues, security threats, and lack of digital literacy among users.
• Way Forward: To combat fake news, media literacy skills, fact-checking, and independent journalism are crucial;
Ethical standards for media organizations are necessary; Technology solutions like fake news detection algorithms and
fact-checking labels can help; Government regulations should hold spreading organizations accountable with fines and
punishment.
• Conclusion: Fake news threatens democracy, social cohesion, and personal well-being. Collaboration between
individuals, media organizations, governments, and technology companies can reduce it, promoting informed and
democratic societies.
Recent Incidents
• In February 2020, communal violence in Delhi resulted in over 50 deaths and hundreds of injuries, mainly
between Hindu and Muslim communities.
• In August 2020, Bengaluru riots occurred over a religiously offensive social media post, causing injuries and three
deaths.
22 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
o Management of religious affairs: Code of conduct for religious festivals, protection of places of worship, and strict
legal provisions.
o Measures during an outbreak of violence: Preventive arrest, deployment of police and central forces, imposition
of Section 144.
o Measures during violence: Use of force, guidelines and standard operating procedures, effective utilization of
central forces, standby teams, and media restrictions.
o Citizen-oriented measures: Promote nationalism, peace committees, and impart liberal values through
education.
• Post Violence Measures to Address Communal/Mob Violence: Fast track courts for quick justice and punishment;
Enforcement and monitoring of guidelines; Special investigation teams for impartial investigations; Effective
monitoring to prevent future violence; Unbiased relief and rehabilitation efforts; Deep penetration of schemes to reach
victims; Immediate interim relief and essential services for affected individuals.
• Way Forward: Awareness and education to combat communalism and misinformation; Effective monitoring and
removal of hate speech on social media; Early warning systems to identify potential outbreaks; Collaboration between
social media, law enforcement, and civil society; Community engagement to promote understanding and tolerance;
Accountability through legal action against offenders.
• Conclusion: Social media can both trigger and prevent communal violence, but effective measures like awareness,
education, monitoring, early warning systems, collaboration, community engagement, and accountability are crucial for
preventing it in the age of social media.
Student Note:
23 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
8. BASICS OF CYBERSECURITY
• Cyber security involves understanding cyber threats, safeguarding devices and networks, and implementing best
practices to mitigate risks.
• According to the Information Technology Act, of 2000, “Cyber security means protecting information, equipment,
devices computer, computer resource, communication device and information stored therein from unauthorised access,
use, disclosure, disruption, modification or destruction.”
Fact-Wise
• India ranks second in cyber-attacks and has the highest number of targeted attacks. The country's cyber security
market was worth $10 billion in 2021, with a CAGR of 40% over the last two years.
• With digital adoption and increased online attacks, the market is expected to reach $15 billion by 2023. In 2020, India
experienced an 11.8% increase in cybercrime.
• The Delhi AIIMS cyberattack was caused by improper network segmentation, with the global average cost of a data
breach in 2022 being $4.35 million, the highest in the healthcare sector.
CYBER CRIMES
• Financial Frauds, Child Pornography, Cyber Bullying, Copyright Infringement, Misuse of Social Media, Identity Theft,
Cyber Phishing, Women's Vulnerability to Cybercrimes.
24 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
• Cyber warfare by nation-states for eg. the Stuxnet virus targeting the Irans Nuclear power plant; Snowden revelations
highlighted cyberspace as a 21st-century warfare theatre; Global Cybersecurity Outlook report shows 125% increase
in cyberattacks between 2021-2023.
• Features: Cyberwar Viz-A-Viz Traditional War: Cyberspace as an independent theatre of war, borderless and
international nature, disguised attackers, contactless war, rapid deployment, low cost, wide range of targets.
CYBER TERRORISM
• Cyber-terrorism involves using computer network tools to disrupt critical national infrastructures or intimidate
governments and populations; Groups like G-Force and Doctor Nuker have targeted major entities in India; Cyber-
terrorism methods include physical attacks, syntactic attacks using ransomware and viruses, and semantic attacks
modifying system data without the user's knowledge.
25 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
• Factors Making Critical Infrastructure Preferred Targets: Global rivalry drives sophisticated cyber operations by
governments; Global supply chain exposes embedded systems to potential tampering; Insider threats from disgruntled
employees or compromised individuals pose risks; Lack of training increases the likelihood of accidental disruptions;
Technology enables concealed attacks, attracting state and non-state actors; Cyber-attacks can be launched from any
location, bypassing restrictions.
• Issues & Challenges: Capability asymmetry, Lack of indigenous cybersecurity tools, Insider threats, Reluctance in
information sharing, Lack of cyber deterrence strategy, Vulnerability of smart systems, Complexity, Ageing
infrastructure, Interconnectivity, Lack of resources, Evolving threat landscape.
• Way Forward: Increase in Standards, Funding for Cybersecurity, Strengthen Rules & Regulations, Need for
Cybersecurity Policy, Training and Awareness programs for Protection, Skilled Workforce for Cybersecurity, Developing
Resilience in Critical Infrastructure, Conducting Risk Assessments for Vulnerabilities, Implementing Best Practices for
Critical Infrastructure Operators.
GLOBAL INITIATIVES
• The World Economic Forum's Cyber Risk Framework emphasizes interdependence and leadership in fostering a
resilient digital ecosystem; The Budapest Convention harmonizes laws and enhances international cooperation on
cybercrime; ICANN ensures the smooth functioning of the cybernetic framework; The Paris Call promotes common
principles against cyber threats; Ground Zero Summit and Global Cyber Alliance offer platforms for cybersecurity
collaboration; The EU Cybersecurity Act strengthens cybersecurity capabilities; GFCE fosters knowledge sharing in
cybersecurity; The Commonwealth Cyber Declaration enhances cooperation among Commonwealth countries; ICRI
combats ransomware through global cooperation.
26 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
WAY FORWARD
• Building capabilities and capacity, investing in human resource development and research & development, adopting a
Public-Private Partnership model, implementing strong policies and governance, raising awareness through campaigns,
strengthening public-private partnerships, fostering collaboration and information-sharing, emphasizing risk
management, and investing in cybersecurity infrastructure to protect against cyber threats.
27 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
Pegasus Spyware
• Pegasus is an advanced spyware that can infiltrate a user's phone through an exploit link, granting full access to the
device.
• It can collect private data like passwords, contacts, messages, and calls, and even activate the phone's camera and
microphone for comprehensive surveillance.
28 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
verification. The system will be interconnected with existing databases like CCTNS, ICJS, State-specific systems, and the
Khoya-Paya portal.
• Need: Authentication and identification with a 75% success rate; Increased security for identifying terrorists and
criminals; Faster processing for efficient identity verification; Deterrence against crime, especially petty offenses; Acts
as a force multiplier for law enforcement in India.
• Challenges: Cybersecurity risks and potential data breaches; Accuracy and bias in facial recognition algorithms; High
infrastructural costs and lack of data storage facilities; Violation of privacy and conflicts with data protection goals;
Reliability and admissibility of data in criminal trials; Absence of data protection laws and safeguards.
• Way Forward: Enact a strong data protection law to safeguard civil liberties; Develop expertise in the field and ensure
the authenticity of data; Implement adequate safeguards, penalties, and accountability measures; Establish statutory
authorization and deployment guidelines for NAFRS; Balance facial recognition technology with democratic values and
freedoms.
Exercise Synergy
CERT-In and the Cyber Security Agency of Singapore (CSA) conducted the "Synergy" cybersecurity exercise, simulating a
small-scale ransomware attack that escalated into a global cybersecurity crisis. The exercise aimed to test and enhance the
readiness and response capabilities of both agencies in handling cyber threats effectively.
KAVACH-2023
• KAVACH-2023 is a joint initiative of AICTE and BPR&D, launched in February 2021, aiming to provide cybersecurity
training to police personnel in India.
• This initiative is a positive step towards enhancing the cybersecurity capabilities of law enforcement officers and will
aid in combatting cybercrime effectively in the country.
Student Note:
29 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
• Terrorism and money laundering are interconnected global issues posing threats to security and stability.
• Terrorism often requires a significant amount of funding to carry out attacks, and money laundering is one of the
primary methods used to finance terrorist activities.
• Money laundering aids terrorism in several ways such as hiding the source of funds, facilitating the transfer of
funds, financing terrorist activities, and undermining law enforcement efforts
31 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
Fact- Wise
• Total undisclosed credits amounting to Rs 20,353 crore have been detected with respect to 930 India-linked entities
in the Panama and Paradise Paper Leaks.
• According to a secret study commissioned by the Finance Ministry concluded in 2014 that about 90% of unaccounted
wealth, or black money, was lying within India and not outside.
32 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
• Activities under the parallel economy are not under the purview of tax authorities hence no tax has been paid for it
which results in a loss of revenue to the government.
• Reasons Of Parallel Economy: Increase in black money, Higher tax rate, Lack of trust in government, and
Ineffectiveness of laws.
Fact-Wise
According to the National Institute of Public Finance and Policy, the parallel economy accounted for almost 75% of the
GDP in 2013.
• Tax rationalization
• Voluntary disclosure scheme, 2016
• Prevention of Money-laundering Act, 2002
Legislative • Benami Transaction Prohibition Act, 1988
Measures • Lokpal and Lokayukta Act, 2013
• Black Money (Undisclosed Foreign Income and Assets) and Imposition of Tax Act, 2015
• The Smugglers and Foreign Exchange Manipulators (Forfeiture of Property) Act, 1976
• The Narcotic Drugs and Psychotropic Substances Act of 1985
• Central Board of direct taxes (CBDT)
• Enforcement Directorate
Institutional • Financial Intelligence Unit
Measures • Directorate of revenue intelligence
• CBI,
• Serious Fraud Investigation Office,
• National Intelligence Agency,
International • The OECD Base Erosion and Profit Shifting (BEPS) Project
Measures • Double Taxation Avoidance Agreements
• Multilateral Convention of Mutual Administrative Assistance in Tax Matters
• Financial Action Task Force
• Project Insight: For tax compliance and efficient information use.
• PAN for Transaction: Government enforces reporting of PAN for transactions exceeding 2.5
Other Measures lakhs, prohibits 2 lakhs cash receipts, and imposes fines for violators.
• Operation Clean Money: Launched in 2017 to collect data and analyze cash transactions
using technology and analytics and take appropriate enforcement actions.
WAY FORWARD
• Effective legislative changes for curbing black money, Capacity building of govt. officials, Election reform, Use of
technology, Boosting digital transactions, Tax on agricultural income, Promoting the use of plastic currency, Fast Track
Investigation, Increasing Tax Compliance, and Broad-based information and intelligence gathering mechanism.
CONCLUSION
• No one silver bullet can eradicate this threat from society, according to a thorough review of the causes of the creation
of black money in India and the numerous approaches that have been tried to combat it. The central and state
governments will need to pursue a comprehensive mix of well-defined strategies with patience and perseverance, and
all agencies will need to implement them in a coordinated manner if the fight against the creation and accumulation of
black money is to be successful.
Student Note:
34 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
Definition • Border management is a security function that calls for coordination and concerted action by
various government agencies within our country.
Nodal Agency • The Department of Border Management in the Ministry of Home Affairs
Principle • Deployment of forces along the borders is based on the principle of ‘One border, One Force -
Guarding Force’ (BGF).
• Accessibility (Hostile elements have access to the latest technology, money and other
resources); Lack of proper demarcation of both maritime and land borders; Porosity of borders
(diverse terrain); Contested International borders (e.g, border skirmishes with Pakistan along
Issues the LoC); Lack of critical infrastructure (e.g, towers, bunkers, Border Flood Lights etc.); Poor
intelligence and resource efficiency; Ethnic conflicts and separatist movements;
Overpopulation in the border areas (approximately 700-800 persons per square km in some
areas); Political instability and disorder (Proxy Wars).
Challenges in • Complex topography (complex land border of 15000+kms); Unsettled land borders; Border-
managing land guarding forces are often short on resources; Imperfect Intelligence Gathering; Ambiguity
border among different agencies ( multiple instructions trickling down).
• Electronic Surveillance (e.g, National Command Control Communication and Intelligence
GoI Intervention Network (NC3I)); Comprehensive Integrated Border Management Systems (CIBMS); Border
Area Development Project (BADP); Integrated Check Posts (ICP); Border Infrastructure And
Management Scheme; Vibrant Villages Programme (VVP) Scheme.
• Integrated Border Management; Technological Use (e.g., technology-satellite-guided friend or
Way Forward foe identification system of the ISRO); Local Community Participation; Creating local
employment opportunities (prevent the pull towards illegal activities); Capacity Building.
• Sir Creek is a 96 km tidal estuary that opens into the Arabian Sea and divides the
Gujarat state of India from the Sindh province of Pakistan.
• Pakistan's Position: Pakistan claims the entire Sir Creek, with its eastern bank
defined by a "green line'' and represented on a 1914 map, belongs to it.
Sir Creek • India’s Position: India says that the green line is an indicative line and feels the
Dispute boundary should be defined by the "mid-channel'' of the Creek as shown on a map
dated 1925.
Disputes • Suggestions: Designate the area as a maritime-sensitive zone, A transboundary
management approach.
35 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
River • As a result, of numerous dialogues and careful negotiations, both countries signed an
Disputes accord called the Indus Waters Treaty in 1960, which clearly determined how the
region’s rivers are to be divided.
• IWT: Three "eastern rivers" — the Beas, Ravi and Sutlej with to India, while control
over the waters of the three "western rivers" — the Indus, Chenab and Jhelum to
Pakistan.
• Current Status of Gilgit-Baltistan: With this elevation, it will move up to the status
of a province and become an autonomous area.
• Currently, Pakistan is divided into four provinces: Sindh, Punjab, Khyber
Gilgit Pakhtunkhwa, and Balochistan.
Baltistan • India’s position: By virtue of its entirely legal and irrevocable accession, India has
Issue made it abundantly plain to Pakistan that the entirety of the Union Territories of
Jammu and Kashmir and Ladakh, including the regions of Gilgit and Baltistan, are a
part of it.
Government • Fencing (2041 km covered); Use of technology (five-layer elaborate plan); Outposts (700 border
Initiatives outposts, one Integrated Check post); Program (Optimal Utilization of Waters of Eastern Rivers);
To Protect People (comprising the various types of forces and manpower); etc.
India And
Pakistan
Borders
• Western Sector-Aksai Chin: Originally a part of the state of J&K is claimed by China as
part of its autonomous Xinjiang region. After the 1962 war, it was administered by China.
• Middle Sector- Himachal Pradesh & Uttarakhand: Here LAC is the least controversial
Boundary Dispute • Eastern Sector-Sikkim to Arunachal Pradesh: In the Simla Accord (1913-14), the
boundary between Tibet and British India was defined
• Water disputes: Brahmaputra River, the lifeline of Bangladesh and northeastern India.
• Recent Dispute: Doklam Standoff (2017); Galwan Valley Clash (2020).
Initiatives For Border • Border talks (initiation of High-Level border talks in 1981); Creating infrastructure
Management Between (Note: Army infrastructure projects within 100 Km of LAC have been exempted from
India And China forest clearance); Spy Cam Project (Putting up cameras with 20-25 km range at 50
locations), etc.
• Border Infrastructure with advanced logistical support; Battle Ready Troops for
delivering massive artillery fire in a minimal time span; Balancing Border Security (e.g,
Way Forward ITBP should not be used by the Home Ministry for internal security duties); Diplomatic
Communication Improvement (e.g, hydrological data and exchange of information
regarding infrastructural development).
INDIA-BANGLADESH BORDER
• The India-Bangladesh border is India’s longest border measuring 4096.7 km and passes
Background through five Indian states. The entire border consists of varied geographical features
like plains, hills, riverine stretches, etc. with hardly any natural obstacles.
36 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
Challenges • Illegal Migration (e.g, Rohingyas easily migrated to India from Bangladesh); Terrorism and
Insurgency ( a congenial environment for insurgency in the North Eastern states); Trans-
border Smuggling; Trans-border River Dispute (Feni River, and Teesta River, construction
of a Dam by India on Barak River); Porous nature of the border.
• Technologically advanced surveillance (BOLD-QIT (Border Electronically Dominated QTR
Initiatives For Interception Technique) and other border surveillance ); Border Protection Grid; Fencing
India-Bangladesh (presently 3141 km); Road construction (3,585.53 km of border patrol roads have been
Border constructed additionally); Bilateral cooperation ( e.g, ‘Sundarban Moitry'); Land Boundary
Management Agreement, 2015; Border Infrastructure and Management (BIM) Scheme;
Comprehensive Integrated Border Management System (CIBMS).
• More Personnel Deployment; Balance of Manpower and Technology; Re-strengthen its
Way Forward relationship with lower riparian countries; Greater participation of the people; Institutional
Mechanisms.
INDIA-NEPAL BORDER
• Nepal shares a 1751 Km long border across five Indian states Uttarakhand, Uttar Pradesh,
Background Bihar, West Bengal and Sikkim. The Indo-Nepal border is governed under the Sugauli Treaty of
1816.
• Misuse of Open Border (pushing of terrorists and fake Indian currency notes (FICN)); Maoist
Challenges insurgency; Issue of land grabbing; Trafficking; Territorial Issues (While 98% of the border
between India and Nepal was marked, Susta and Kalapani were still up in the air).
• Under the provisions of the Sugauli Treaty:
o Nepal lost the Sikkim, Kumaon, Garhwal and Western Terai (Flat) areas.
o River Mechi became the eastern border with India
o River Kali (called Mahakali in Nepal) was demarcated as the north-western border.
o The Treaty of Sagauli also defined Gandak as the international boundary between India
Indo-Nepal and Nepal.
Border Dispute • India’s Stand:
o Kali originates in springs well below the Lipulekh pass, and the Sugauli treaty does not
demarcate the area north of these streams.
o Administrative and revenue records going back to the nineteenth century show that
Kalapani was on the Indian side, and counted as part of Pithoragarh district, now in
Uttarakhand.
Initiatives • Establishment of a new intelligence section in SSB; Bilateral mechanisms and Joint Working
Groups; Border District Coordination Committee; Border Infrastructure.
Way Forward • Coordination among agencies; increased use of technology; Joint Boundary Demarcation
Committee; Implementation of a Comprehensive Integrated Border Management System.
INDIA-BHUTAN BORDER
• India and Bhutan share about 669 km long boundary. The boundary is demarcated except along
Background the tri-junction with China.
• India has a Friendship treaty with Bhutan which was re-negotiated in 2007 under which India has
a huge stake in safeguarding the interests of Bhutan
Challenges • Insurgency (e.g, Bodo, ULFA etc. sneak into Bhutan for sanctuary); Smuggling and trafficking;
Environmental concerns (e.g, deforestation, poaching, and wildlife smuggling).
• Doklam plateau is a part of Bhutan disputed by China which can provide China leverage to choke
Doklam India's “Chicken Neck” - the narrow Siliguri corridor which links the northeast with the rest of India.
Issue • In 2017, India successfully deployed its troops to counter the Chinese design to build a road in
Doklam.
• Bilateral cooperation (India-Bhutan Group on Border Management and Security); Deployment of
Initiatives forces; Border District Coordination Meeting (BDCM) Mechanism; Road construction (GoI has
approved the construction of a 313 km road in Assam along the Indo-Bhutan border); Check Post
Development.
INDIA-MYANMAR BORDER
37 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
• India shares a 1,643 km long border across four states (Arunachal Pradesh, Nagaland, Manipur
Background and Mizoram) with Myanmar.
• India and Myanmar permit a Free Movement Regime (FMR) for tribes residing along the border
to travel up to 16 km across the border.
Challenges • Civil War In Myanmar (e.g, White Elephant Democracy); Free Movement Regime (FMR:
Insurgents are misusing FMR to cross over to Myanmar and receive training and acquire arms);
Weak vigilance; Insurgency; Drugs menace (Golden Triangle); Inadequate attention in
policymaking.
Initiatives • Deployment of force; Panel to study Free Movement Regime ( to stop misuse of FMR); Setting up of
Integrated Check Posts (ICPs); Joint Intelligence Committee (JIC) chaired by R N Ravi.
Way • Policy Formulation to strengthen the security of the border; Revision of FMR; Infrastructure
Forward Development (construction of the ICP); Engagement with Myanmar.
• India has a 7,516-kilometer coastline, of which 5,422 are on the mainland and 2,094 are
Background on islands that are owned by nine states and four Union Territories.
• 90% of the nation's trade is conducted along its coastline.
• Maritime Terrorism (e.g, hostage-taking, hijacking, attacking, and sinking ships ); Attacks
Need For The on business areas (e.g, 26/11 attack); Attacks on ports and other important facilities;
Security Of The Attacks on ports and other important facilities; Piracy: (e.g, in the shallow waterways of
Coastal Region the Sundarbans); Smuggling and trafficking (Gold, electronics, narcotics, and weapons);
Infiltration, illegal migration and refugee influx.
Challenges In • Unguarded Coastal (due to diverse range of topography); Unsettled maritime boundaries;
Managing Coastal Physical proximity with other countries; Lack of Coordination between the states and
Border the centre; Non-State Actors (Highest vulnerability is penetration); Straying of fishermen
beyond the maritime boundary.
• Indian Maritime Security Strategy (IMSS) 2015 of Indian Navy; Coastal Security Scheme
(CSS); Joint Operations Centres (JOCs); Enhance Maritime Domain Awareness;
Initiatives Operation Sagar Kavach (post 26/11 to improve coordination between security agencies);
Increased cooperation with littoral countries (multilateral exercises like MILAN and
CORPAT); Electronic Surveillance.
• Full-time National Security Adviser; Kargil highlighted the gross inadequacies in the nation’s
Kargil Review surveillance capability; Restructuring of the Role of Paramilitary Forces; Detailed study in
Committee: K. order to evolve force structures and procedures; Enhance Defense Outlays; Enhance
Subrahmanyam Industrial Capacity to facilitate defence exports; Civil-military liaison Mechanism.
(1999)
Shekatkar • Fasten road construction; Mandatory to adopt the Engineering Procurement Contract (EPC);
Committee (2015) Delegating enhanced procurement powers to BRO; Technological Intervention.
Other Key • Optimization of Signals Establishments; Redeployment of Ordnance echelons; Military
Recommendations Farms and Army Postal Establishments; Increase in Defense Budget; Training Institute e.g., a
Joint Services War College; Military Intelligence School.
INDIA’S PRESENCE IN INDIAN OCEAN REGION (IOR): ANDAMAN & NICOBAR ISLAND
• More than sixty thousand commercial vessels traverse each year through the Six Degree
Background and the Ten Degree Channels.
• The Andaman and Nicobar Islands constitute just 0.2 per cent of India’s landmass but
provide 30% of its Exclusive Economic Zone (EEZ).
Strategic • Close to Malacca Strait (spans 450 nautical miles north-south); Links Two Subcontinents
Significance Of (South Asia with South-East Asia); Important Pillar of Foreign Policy (Act East Policy);
Andaman & Nicobar Commercial Potential (trans-shipment hub at Car Nicobar); Tri-Service Security
Island Strategy; Tackling Chinese Presence in the Region.
Issues And • Lack of clarity in approach; Lack of Infrastructure & Communication; Restricting
Challenges Geographic factors; Sensitive ecology.
38 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
•
Military Exercises (the multilateral exercises like MILAN and Malabar, coordinated patrol
CORPAT exercises; etc); Logistics-sharing agreements (with the US and Australia, as well as
Initiatives with France, Singapore, and South Korea); A&N Command (Tri-Service theatre command of
the Indian Armed Forces); Connectivity (Submarine Optical Fibre Cable (OFC) connecting
Chennai and Port Blair).
ROLE OF TECHNOLOGY IN BORDER MANAGEMENT
• India has around 15,106.7 km of border with varied terrain, climatic conditions and relationship
Background with some of the neighbouring countries further increasing the complexity and criticality of border
management.
• Integrating Technology with the existing systems; Checking infiltration via land, underwater, air and
Significance tunnels; Facilitate Cross Border Trade (through Blockchain technology, etc); Improved Intelligence
inputs and Surveillance; Advance technology (LIDAR sensors, infrared sensors and cameras).
Way • Smart border management; Monitoring and surveillance systems act as force multipliers; Agencies
Forward develop and embrace these new innovations; etc.
• ILP is an official travel document issued by the Government of India to grant inward travel of
Inner Line an Indian citizen into a protected area for a limited period.
Permit • Protected States: Currently, in North Eastern states of Arunachal Pradesh, Nagaland and
Mizoram are protected by the Inner Line, and lately, Manipur was added (in December last year).
Protected Area • The Foreigners (Protected Areas) Order 1958: It states that a Protected Area Permit (PAP) is
Permit required for non-Indian citizens to visit certain areas in India.
• Restricted Areas: Under the Foreigners (Restricted) Areas Order, 1963, the following areas
Restricted Area have been declared as ‘Restricted Areas’: Andaman & Nicobar Islands - Entire UT; Sikkim -
Permit Part of the State.
• Provision: It provides for the administration of tribal areas in Assam, Meghalaya, Tripura and
Mizoram to safeguard the rights of the tribal population in these states.
Sixth Schedule • Articles: Article 244(2) and Article 275(1) of the Constitution.
• Committee: It was based on the reports of the Bordoloi Committee.
• Autonomous Districts: The tribal areas in the four states of Assam, Meghalaya, Tripura and
Mizoram have been constituted.
BORDER INFRASTRUCTURE
Student Note:
39 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
40 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
Region (Generating a major source of funding for the Maoists is poppy or opium
cultivation).
• Inadequate Legal Structure to deal with organised crime; Anonymity of leadership
(due to hierarchical structure); Lack of Resources (police is a state subject. But many
states are not able to invest); No Central Agency to coordinate with state
Issues And Challenges agencies; Trans-national presence (e.g, Tough terrain in India’s neighbourhood
provides safe havens); Poor criminal justice system (e.g, there are 3 crore pending
cases in the Indian judiciary); Dual Criminality (e.g, Some crimes, most notably drug
trafficking, are planned in one region of the world and carried out in a different one).
• Legislative action: UAPA Amendment Act, 2019 (made it possible for the Union
Government to designate individuals as terrorists without following any formal judicial
process); NIA Amendment Act, 2019 (It expands the NIA's scope of power in terms of
the types of crimes it is permitted to investigate, regardless of where the crime occurred);
Govt Initiatives Narcotics Drug Psychotropic Substances Act (NDPS),1985.
• National Policy On Narcotic Drugs And Psychotropic Substances 2014: It provides
Better Medical Access, Consumption Reduction, Use of satellite imageries to detect illicit
crops of poppy and cannabis, A time-bound plan of action, etc.
• Other Initiative: NATGRID for intelligence gathering; Setting up of Anti-Trafficking
Nodal Cell under MHA.
Second ARC • Need for a Comprehensive Anti-Terrorist Legislation; Need for a Proper Definition of
Recommendations On Terrorism; Confession before a Police Officer; Measures against Financing of Terrorism;
Combatting Terrorism Role of Citizens, Civil Society and Media in Combatting Terrorism.
• Strengthening of Criminal Laws; Witness Protection Programme; Confiscating Proceeds
Way Forward of Crime; Need for Speedy Trial; Multilateral arrangements to break the linkage; Common
Database for Enforcement Agencies; Defending Honest Officers.
CONCLUSION
• Organised crime now poses a worldwide threat that requires a coordinated international response from all nations, in
addition to a national one. To combat organised crime in India, technology, manpower, and intelligence must all work
together.
41 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
Indian Army The Indian Army's HQ is in New Delhi and functions under the Chief of Army Staff (CoAS), who is
Personnel responsible for command, control, and administration.
Indian Navy The Headquarters of the Indian Navy is in New Delhi and is under the command of the Chief of
Personnel the naval staff – an Admiral.
Indian Air Force The Indian Air Force was officially established on 8th October 1932 and on 1st April 1954.
Personnel
42 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
SPACE SECURITY
• In recent years, India has taken several steps to enhance its space security, including the establishment of the Defence
Space Agency (DSA) and the Indian Space Defence and Communication System (ISDCS).
WAY FORWARD
• Transparent policies; Frequent communication and grievance redressal; Infrastructure development; Providing better
medical facilities; Better compensation allowance; Identity management; Ending IPS hegemony.
CONCLUSION
• CAPF personnel gives a semblance of the existence of government administration even in the remotest corners of the
country. Their versatile experience can be utilised to the nation’s advantage. However, there is a need to address the
underlying issues that affect the efficient working of CAPFs.
Student Note:
43 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
FACT-WISE
• Vacancy in Police: 5,42,091 police posts are vacant in India.
• Police per lakh of Population: Till 2022, the ratio is 196.23 as compared to the U.S. sanctioned ratio of 222 per lakh
population.
• Police Area Ratio: Sanctioned Police Area Ratio (PAR) per 100 sq km is 79.80 till 2020.
• Working Hours: Police staff must work at least 11 hours or more per day.
functions; Transparent appointment procedures; Creating independent inspectorate for audit of police stations;
Improvement of Forensic Science Infrastructure- Professionalization of Investigation; Appointment of chief of police
training on the recommendation of the police performance and accountability commission.
THE SUPREME COURT JUDGEMENT ON POLICE REFORMS IN THE PRAKASH SINGH CASE 2006
• Directives: Constitution of State Security Commission; Merit-based and transparent appointment of DGP; Two-year
security of tenure; Separation of investigation and law and order functions of police; Setting up Police Establishment
Board to decide transfer, promotion etc.; Setting up Police complaint authority in the state to see public complaints
against police; Setting up National security commission.
SMART POLICING
• SMART stands for S-sensitive and Strict; M-Modern with Mobility; A- Alert and Accountable; R- Reliable and
Responsive; T- Trained and Techno-savvy. The concept was introduced by the Prime Minister during the 49th annual
conference of Directors-General and Inspectors-General of Police in Guwahati on November 30, 2014 .
• Benefits: Strict and sensitive rule of law enforcement; Boosting capacity and infrastructure of the police system;
Technological Upgradation of Police; Customised solutions for victims; Reliable and Responsive police system; Making
citizens more alert and accountable; Techno-savvy and Trained police officials.
CONCLUSION
• In India, police and law and order come under the purview of state governments. Accordingly, each state has its police
force for maintaining law and order and investigating crimes. However, due to financial and other constraints, states
have critical gaps in their policing infrastructure. Thus, the Ministry of Home Affairs has been supplementing the
resources of states under the Modernisation of Police Forces (MPF) scheme.
Student Note:
45 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
FACT-WISE
• Expenditure on defence Procurement from Foreign Sources: 36.7% of overall expenditure in 2022 (46% in 2018-
19)
• Exports: Defence exports reach a record high of over INR 16,000 crore in FY 2022–23, a rise of more than ten times
since 2016–17.
• Contract to Indian Company: in 2020-21, 74% of contracts by Army to Indian Vendors.
• Defence technology firms: Around 194 such firms are operating in India.
To make India's defence ready for battles; To boost Absence of a dispute settlement body; Lack of institutional
India's confidence; Improve strategic capability; capacity; Infrastructural deficit; Lack of institutional
Employment generation in the defence sector; Reducing capacity; land acquisition restrictions; less private sector
fiscal deficit. participation
WAY AHEAD
• Improved research and development; Increased autonomy of DRDO; Increased private sector involvement; Boost
infrastructural capabilities; Improved export capability; Implementation of the recommendation of Vijay Kelkar
committee.
DEFENCE MODERNISATION
• Defence modernization is a complex process that includes simple changes in elements’ competencies to execute all the
strategic objectives. It enhances a nation’s military ability to safeguard itself from hostile countries. Therefore, it is in
India's favour to upgrade its military power in line with its economic growth and broaden its strategic horizon to ensure
the country's territorial integrity.
46 TELEGRAM | WEBSITE
PRAHAAR ReDEFINED 3.0 SUMMARY: INTERNAL SECURITY
CONCLUSION
• Improving defence capability, preserving national sovereignty, and achieving military superiority all depend on self-
reliance in defence production. Additionally, the Indian government has stated that it intends to invest 130 billion USD
in military modernization over the next five years.
Student Note:
47 TELEGRAM | WEBSITE
PW
ONLYIAS
HYBRID
PW
PSC
ONLYIAS
WALLAH
ONLINE
*
PW
ONLYIAS PW
OFFLINE STORE
INDIA’S
MOST LOVED
Educational Channel
And Platform
4.8 10M+
Rating Downloads
20M+
Subscribers
8000hrs
Video Content/Week
THANKYou