DAILY
CLASS NOTES
Internal Security
Unit 1 Introduction to Internal Security
Topics Covered:
z Syllabus
z PYQs
Unit 1 2
Space for Notes UNIT 1: INTRODUCTION TO INTERNAL SECURITY
Syllabus
z Internal Security is an important topic of General Studies 3.
z It contains various aspects like,
z Role of external state and non-state actors in creating challenges to internal security.
Challenges to internal security through communication networks
The role of media and social networking sites in internal security challenges
Basics of cyber security
Money laundering, and its prevention.
Linkages between development and spread of extremism.
Security challenges and their management in border areas link organised crime with
terrorism.
Various Security forces and agencies and their mandate.
DCN | Internal Security | Introduction to Internal Security
3 Unit 1
Space for Notes
PREVIOUS YEARS QUESTIONS
Year Questions
2024 1. Explain how narco-terrorism has emerged as a serious threat across the
country. Suggest suitable measures to counter narco-terrorism.
2. Describe the context and salient features of the Digital Personal Data
Protection Act, 2023.
3. India has a long and troubled border with China and Pakistan fraught with
contentious issues. Examine the conflicting issues and security challenges
along the border. Also give out the development being undertaken in these
areas under the Border Area Development Programme (BADP) and Border
Infrastructure and Management (BIM) Scheme.
4. Social media and encrypting messaging services pose a serious security
challenge. What measures have been adopted at various levels to address the
security implications of social media? Also suggest any other remedies to
address the problem.
2023 1. Winning of Hearts and Minds’ in terrorism-affected areas is an essential
step in restoring the trust of the population. Discuss the measures adopted
by the Government in this respect as part of the conflict resolution in
Jammu and Kashmir
2. The use of unmanned aerial vehicles (UAVs) by our adversaries across the
borders to ferry arms/ammunition, drugs, etc., is a serious threat to internal
security. Comment on the measures being taken to tackle this threat.
3. What are the internal security challenges being faced by India? Give out
the role of Central Intelligence and Investigative Agencies tasked to counter
such threats.
4. Give out the major sources of terror funding in India and the efforts being
made to curtail these sources. In the light of this, also discuss the aim and
objective of the ‘No Money for Terror (NMFT)’ Conference recently held at
New Delhi in November 2022.
2022 1. Discuss the types of organised crimes. Describe the linkages between
terrorists and organised crime that exist at the national and transnational
levels.
2. What are the maritime security challenges in India? Discuss the
organisational, technical and procedural initiatives taken to improve maritime
security.
3. What are the different elements of cyber security? Keeping in view
the challenges in cyber security, examine the extent to which India has
successfully developed a comprehensive National Cyber Security Strategy.
Introduction to Internal Security | Internal Security | DCN
Unit 1 4
Space for Notes
4. Naxalism is a social, economic and developmental issue manifesting as a
violent internal security threat. In this context, discuss the emerging issues
and suggest a multilayered strategy to tackle the menace of Naxalism.
2021 1. Discuss how emerging technologies and globalisation contribute to money
laundering. Elaborate measures to tackle the problem of money laundering
both at national and international levels.
2. Keeping in view of India’s internal security, analyse the impact of
cross-border cyber-attacks. Also, discuss defensive measures against these
sophisticated attacks.
3. Analyse the multidimensional challenges posed by external state and non-
state actors, to the internal security of India. Also discuss measures required
to be taken to combat these threats.
4. Analyse the complexity and intensity of terrorism, its causes, linkages and
obnoxious nexus. Also suggest measures required to be taken to eradicate the
menace of terrorism.
2020 1. Discuss different types of cyber crimes and measures required to be taken
to fight the menace.
2. For effective border area management, discuss the steps required to be
taken to deny local support to militants and also suggest ways to manage
favourable perception among locals.
3. What are the determinants of left-wing extremism in the Eastern part
of India? What strategy should the Government of India, civil administration
and security forces adopt to counter the threat in the affected areas?
4. Analyse internal security threats and transborder crimes along Myanmar,
Bangladesh and Pakistan borders including Line of Control (LoC). Also
discuss the role played by various security forces in this regard.
2019 1. The banning of ‘Jamaat-e-Islami’ in Jammu and Kashmir brought into focus
the role of over-ground workers (OGWs) in assisting terrorist organisations.
Examine the role played by OGWs in assisting terrorist organisations in
insurgency affected areas. Discuss measures to neutralise the influence of
OGWs.
2. What is the CyberDome Project? Explain how it can be useful in controlling
internet crimes in India.
3. Indian Government has recently strengthened the anti-terrorism laws
by amending the unlawful Activities (Prevention) Act (UAPA), 1967 and
the NIA act. Analyse the changes in the context of the prevailing security
environment while discussing the scope and reasons for opposing the UAPA
by human rights organisations.
DCN | Internal Security | Introduction to Internal Security
5 Unit 1
4. Cross-Border movement of insurgents is only one of the several security Space for Notes
challenges facing the policing of the border in North-East India. Examine
the various challenges currently emanating across the India-Myanmar border.
Also, discuss the steps to counter the challenges.
2018 1. The China-Pakistan Economic Corridor (CPEC) is viewed as a cardinal
subset of China’s larger ‘One Belt One Road’ initiative. Give a brief description
of CPEC and enumerate the reasons why India has distanced itself from the
same.
2. Left Wing Extremism (LWE) is showing a downward trend, but still
affects many parts of the country. Briefly explain the Government of India’s
approach to counter the challenges posed by LWE.
3. Data security has assumed significant importance in the digitised world
due to rising cyber crimes. The Justice B.N. Srikrishna Committee Report
addresses issues related to data security. What, in your view, are the strengths
and weaknesses of the Report relating to protection of personal data in
cyberspace?
4. India’s proximity to the two of the world’s biggest illicit opium growing
states has enhanced her internal security concerns. Explain the linkages
between drug trafficking and other illicit activities such as gunrunning,
money laundering and human trafficking. What counter measures should be
taken to prevent the same?
2017 1. Discuss the potential threats of Cyber attack and the security framework
to prevent it.
2. The North-Eastern region of India has been infested with insurgency
for a very long time. Analyse the major reasons for the survival of armed
insurgency in this region.
3. Mob violence is emerging as a serious law and order problem in India.
By giving suitable examples, analyse the causes and consequences of such
violence.
4. The scourge of terrorism is a grave challenge to national security. What
solutions do you suggest to curb this growing menace? What are the major
sources of terrorist funding?
2016 1. The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in connection
with armed action against terrorist attacks. Discuss the strategic impact of
such actions.
2. ‘Terrorism is emerging as a competitive industry over the last few decades.”
Analyse the above statement.
3. Border management is a complex task due to difficult terrain and hostile
relations with some countries. Elucidate the challenges and strategies for
effective border management.
Introduction to Internal Security | Internal Security | DCN
Unit 1 6
Space for Notes 4. Use of the internet and social media by non-state actors for subversive
activities is a major security concern. How have these been misused in the
recent past? Suggest effective guidelines to curb the above threat.
2015 1. Discuss the advantages and security implications of cloud hosting of
servers vis-a-vis in-house machine-based hosting for government businesses.
2. Human right activists constantly highlight the view that the Armed Forces
(Special Powers) Act, 1958 (AFSPA) is a draconian act leading to cases of
human rights abuses by the security forces. What sections of AFSPA are
opposed by the activists? Critically evaluate the requirement with reference
to the view held by the Apex Court.
3. Religious indoctrination via digital media has resulted in Indian youth
joining ISIS. What is ISIS and its mission? How can ISIS be dangerous to
the internal security of our country?
4. The persisting drives of the Government for development of large industries
in backward areas have resulted in isolating the tribal population and the
farmers who face multiple displacements. With Malkangiri and Naxalbari foci,
discuss the corrective strategies needed to win the Left Wing Extremism
(LWE) doctrine that affected citizens back into the mainstream of social
and economic growth.
5. Considering the threats cyberspace poses for the country, India needs a
“Digital Armed Forces” to prevent crimes. Critically evaluate the National
Cyber Security Policy, 2013 outlining the challenges perceived in its effective
implementation.
2014 1. “The diverse nature of India as a multi-religious and multi-ethnic society is
not immune to the impact of radicalism which is seen in her neighbourhood.”
Discuss along with strategies to be adopted to counter this environment.
2. International civil aviation laws provide all countries complete and exclusive
sovereignty over the airspace above their territory. What do you understand
by ‘airspace? What are the implications of these laws on the space above
this airspace? Discuss the challenges which this poses and suggest ways to
contain the threat.
3. How does illegal transborder migration pose a threat to India’s security?
Discuss the strategies to curb this, bringing out the factors which give
impetus to such migration.
4. In 2012, the longitudinal marking for high-risk areas for piracy was
moved from 65 degrees east to 78 degrees east in the Arabian Sea by the
International Maritime Organization. What impact does this have on India’s
maritime security concerns?
DCN | Internal Security | Introduction to Internal Security
7 Unit 1
5. China and Pakistan have entered into an agreement for development of an Space for Notes
economic corridor. What threat does this pose for India’s security? Critically
examine.
2013 1. Money laundering poses a serious security threat to a country’s economic
sovereignty. What is its significance for India and what steps are required to
be taken to control this menace?
2. What are social networking sites and what security implications do these
sites present?
3. Cyber warfare is considered by some defence analysts to be a larger threat
than even Al Qaeda or terrorism. What do you understand by Cyber Warfare?
Outline the cyber threats which India is vulnerable to and bring out the state
of the country’s preparedness to deal with the same.
4. Article 244 of the Indian Constitution relates to the administration of
scheduled areas and tribal areas. Analyse the impact of non-implementation
of the provisions of the Fifth Schedule on the growth of Left Wing extremism.
Introduction to Internal Security | Internal Security | DCN