GS3 → Internal Security → Border Management & Organized Crime
2013
15m
250w
How far are India’s internal security challenges linked with border management, particularly in view of the long, porous borders with most South Asian countries and Myanmar?
Maps to: linkages between border porosity, trans-border crime, and internal security challenges across South Asian neighbourhood.
2014
15m
250w
International civil aviation laws provide all countries complete and exclusive sovereignty over the airspace above their territory. What do you understand by ‘airspace’? What are the implications of these laws on the space above this airspace? Discuss the challenges posed and suggest ways to contain the threat.
Maps to: sovereignty dimensions of airspace and outer space, drone/satellite-based security threats, emerging challenges for border/airspace management.
2014
15m
250w
How does illegal trans-border migration pose a threat to India’s security? Discuss strategies to curb this, bringing out the factors that give impetus to such migration.
Maps to: illegal migration as a security challenge, border management strategies, push-pull factors for trans-border migration.
2014
15m
250w
China and Pakistan have entered into an agreement for the development of an economic corridor. What threat does this pose for India’s security? Critically examine.
Maps to: CPEC as strategic security threat — geo-strategic implications, sovereignty concerns over PoK corridor, India’s security calculus.
2014
15m
250w
In 2012, the longitudinal marking for high-risk areas for piracy was moved from 65° E to 78° E in the Arabian Sea by the International Maritime Organization. What impact does this have on India’s maritime security concerns?
Maps to: maritime security challenges, IMO piracy designations, India’s coastal and blue-water security interests.
GS3-U08-T02-S02
2016
15m
250w
Border management is a complex task due to difficult terrain and hostile relations with some countries. Elucidate the challenges and strategies for effective border management.
Maps to: multi-dimensional nature of border management — physical, technological, diplomatic, and socioeconomic dimensions.
2016
15m
250w
The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in connection with armed action against terrorist attacks. Discuss the strategic impact of such actions.
Maps to: cross-border counter-terrorism operations, strategic deterrence, international law implications of hot pursuit doctrine.
2018
15m
250w
India’s proximity to two of the world’s biggest illicit opium-growing states has enhanced its internal security concerns. Explain the linkages between drug trafficking and other illicit activities such as gunrunning, money laundering, and human trafficking. What countermeasures should be taken to prevent the same?
Maps to: border management and organized crime nexus — narco-trafficking, arms smuggling, money laundering as composite security threats.
2019
10m
150w
The banning of ‘Jamaat-e-Islami’ in Jammu and Kashmir brought into focus the role of over-ground workers (OGWs) in assisting terrorist organizations. Examine the role played by OGWs in insurgency-affected areas. Discuss measures to neutralize their influence.
Maps to: over-ground worker networks, support infrastructure for terrorism, counter-insurgency measures in conflict zones.
2020
10m
150w
For effective border area management, discuss the steps required to be taken to deny local support to militants, and also suggest ways to manage favorable perception among locals.
Maps to: WHAM doctrine, border area development, civil-military coordination in border management.
2020
15m
250w
Analyze internal security threats and trans-border crimes along Myanmar, Bangladesh, and Pakistan borders, including the Line of Control (LoC). Also discuss the role played by various security forces in this regard.
Maps to: multi-border security assessment — organized crime, insurgency, and terror nexus along India’s porous borders.
2022
15m
250w
What are the maritime security challenges in India? Discuss the organizational, technical, and procedural initiatives taken to improve maritime security.
Maps to: maritime security architecture — Coast Guard, IFC-IOR, SAGAR doctrine, multi-agency coordination for sea lane protection.
2023
10m
150w
The use of unmanned aerial vehicles (UAVs) by our adversaries across the borders to ferry arms/ammunition, drugs, etc., is a serious threat to internal security. Comment on the measures being taken to tackle this threat.
Maps to: emerging technology threats to border security — counter-drone systems, CADS, electronic jamming, and policy frameworks.
2024
15m
250w
India has a long and troubled border with China and Pakistan fraught with contentious issues. Examine the conflicting issues and security challenges along the border. Also give out the development being undertaken in these areas under the Border Area Development Programme (BADP) and Border Infrastructure and Management (BIM) Scheme.
Maps to: border infrastructure development, BADP, BIM Scheme, dual-use border infrastructure for security and socioeconomic development.
2025
10m
150w
Terrorism is a global scourge. How has it manifested in India? Elaborate with contemporary examples. What are the counter measures adopted by the State? Explain.
Maps to: manifestations of terrorism in India (cross-border, urban, lone-wolf), state counter-terrorism measures including legal, intelligence, and operational dimensions.
GS3-U08-T04-S01
2025
15m
250w
Why is maritime security vital to protect India’s sea trade? Discuss maritime and coastal security challenges and the way forward.
Maps to: India’s blue economy, sea lanes of communication, coastal security apparatus, piracy, and SAGAR doctrine challenges.
GS3-U08-T02-S02
↑ Back to Top
GS3 → Internal Security → Non-State Actors & Organized Crime
2016
15m
250w
Use of the internet and social media by non-state actors for subversive activities is a major security concern. How have these been misused in the recent past? Suggest effective guidelines to curb the threat.
Maps to: technology exploitation by non-state actors, digital radicalization, information warfare, regulatory frameworks for social media.
GS3-U08-T05-S08
2018
15m
250w
The China-Pakistan Economic Corridor (CPEC) is viewed as a cardinal subset of China’s larger ‘One Belt One Road’ initiative. Give a brief description of CPEC and enumerate the reasons why India has distanced itself from the same.
Maps to: geo-strategic threats from external state actors, sovereignty concerns, and India’s objections to CPEC routing through PoK.
2021
15m
250w
Analyze the multidimensional challenges posed by external state and non-state actors to the internal security of India. Also discuss measures required to be taken to combat these threats.
Maps to: comprehensive analysis of external state sponsorship of terror, proxy actors, and non-state armed groups threatening India’s internal security.
2022
15m
250w
Discuss the types of organized crime. Describe the linkages between terrorists and organized crime at the national and transnational levels.
Maps to: organized crime typology, terror-crime nexus, convergence of trafficking, smuggling, and terrorism financing at transnational level.
2023
15m
250w
What are the internal security challenges being faced by India? Give out the role of Central Intelligence and Investigative Agencies tasked to counter such threats.
Maps to: role of IB, RAW, NIA, NSG, and NATGRID in India’s internal security architecture; intelligence coordination and counter-terrorism frameworks.
2014
15m
250w
“The diverse nature of India as a multi-religious and multi-ethnic society is not immune to the impact of radicalism seen in her neighbourhood.” Discuss along with strategies to be adopted to counter this environment.
Maps to: socio-religious radicalization, external influence on domestic security, soft power and counter-radicalization strategies.
GS3-U08-T04-S05
↑ Back to Top
GS3 → Internal Security → Terrorism, Radicalization & Extremism
2015
15m
250w
Religious indoctrination via digital media has resulted in Indian youth joining ISIS. What is ISIS and its mission? How can ISIS be dangerous to the internal security of our country?
Maps to: online radicalization, ISIS ideology and recruitment, lone-wolf terrorism, and threat to India’s internal security from transnational jihadi groups.
2016
15m
250w
“Terrorism is emerging as a competitive industry over the last few decades.” Analyze the statement.
Maps to: commercialization of terrorism — recruitment ecosystem, branding of terror groups, financing methods, and industry-like operational structures.
2017
15m
250w
The scourge of terrorism is a grave challenge to national security. What solutions do you suggest to curb this growing menace? What are the major sources of terrorist funding?
Maps to: counter-terrorism strategies, terror financing sources (hawala, drug trade, state sponsors), multi-pronged solutions including legal and economic measures.
2017
10m
150w
Mob violence is emerging as a serious law and order problem in India. By giving suitable examples, analyze the causes and consequences of such violence.
Maps to: communal violence, mob lynching, law and order breakdown, role of social media in inciting mob violence and its socioeconomic consequences.
2019
15m
250w
The Indian government has recently strengthened anti-terrorism laws by amending the Unlawful Activities (Prevention) Act (UAPA), 1967 and the NIA Act. Analyze these changes in the context of the prevailing security environment while discussing the scope and reasons for opposing the UAPA by human rights organizations.
Maps to: UAPA amendments, NIA Act expansion, balance between national security imperatives and civil liberties in anti-terror legislation.
2021
15m
250w
Analyze the complexity and intensity of terrorism, its causes, linkages, and obnoxious nexus. Also suggest measures required to eradicate the menace of terrorism.
Maps to: root causes of terrorism (political, social, economic), terror-crime-drug-hawala nexus, comprehensive national and international counter-terrorism approach.
2023
15m
250w
Give out the major sources of terror funding in India and the efforts being made to curtail these sources. In light of this, also discuss the aim and objective of the ‘No Money for Terror (NMFT)’ Conference recently held in New Delhi (Nov 2022).
Maps to: terror financing ecosystem, FATF compliance, NMFT Conference significance, PMLA and related legislation as tools to choke terror funds.
2024
15m
250w
Explain how narco-terrorism has emerged as a serious threat across the country. Suggest suitable measures to counter narco-terrorism.
Maps to: narco-terrorism linkage, drug-terror funding nexus, golden crescent and triangle threats, NDPS Act, and multi-agency counter-narco frameworks.
GS3-U08-T02-S05
2025
10m
150w
Terrorism is a global scourge. How has it manifested in India? Elaborate with contemporary examples. What are the counter measures adopted by the State? Explain.
Maps to: contemporary manifestations of terrorism (cross-border, urban, cyber), NIA, NSG, UAPA, and India’s anti-terrorism architecture as countermeasures.
2014
15m
250w
“The diverse nature of India as a multi-religious and multi-ethnic society is not immune to the impact of radicalism seen in her neighbourhood.” Discuss along with strategies to be adopted to counter this environment.
Maps to: external radicalization influences, multi-ethnic societal vulnerabilities, de-radicalization and counter-narrative strategies.
2015
10m
150w
Religious indoctrination via digital media has resulted in Indian youth joining ISIS. What is ISIS and its mission? How can ISIS be dangerous to the internal security of our country?
Maps to: digital radicalization pipeline, ISIS threat assessment, and vulnerability of Indian youth to transnational jihadist recruitment.
↑ Back to Top
GS3 → Internal Security → Cyber Security & Digital Threats
2013
15m
250w
What are social networking sites, and what security implications do these sites present?
Maps to: social media as a vector for security threats — data harvesting, radicalization, coordinated misinformation, and national security risks.
2013
15m
250w
Cyber warfare is considered by some defense analysts to be a larger threat than even Al Qaeda or terrorism. What do you understand by cyber warfare? Outline the cyber threats India is vulnerable to, and bring out the state of India’s preparedness to deal with the same.
Maps to: cyber warfare definitions, India’s critical infrastructure vulnerabilities, CERT-In, and National Cyber Security Policy as preparedness framework.
2015
15m
250w
Discuss the advantages and security implications of cloud hosting of servers vis-à-vis in-house machine-based hosting for government businesses.
Maps to: government IT security — cloud computing benefits vs data sovereignty risks, MEITY cloud policy, and critical data protection frameworks.
2015
15m
250w
Considering the threats cyberspace poses for the country, India needs “Digital Armed Forces” to prevent crimes. Critically evaluate the National Cyber Security Policy (2013), outlining the challenges perceived in its effective implementation.
Maps to: NCSP 2013 analysis — gaps in implementation, need for dedicated cyber command, and challenges in India’s cyber defence architecture.
2016
10m
150w
Use of the internet and social media by non-state actors for subversive activities is a major security concern. How have these been misused in the recent past? Suggest effective guidelines to curb the threat.
Maps to: cyber-enabled subversion, social media guidelines, IT Rules applicability to security threats from non-state digital actors.
2017
10m
150w
Discuss the potential threats of cyberattack and the security framework to prevent it.
Maps to: cyberattack vectors (DDoS, APT, ransomware), India’s security framework including CERT-In, NCIIPC, and NTRO for critical infrastructure protection.
2018
15m
250w
Data security has assumed significant importance in the digitized world due to rising cybercrimes. The Justice B.N. Srikrishna Committee Report addresses issues related to data security. What, in your view, are the strengths and weaknesses of the Report relating to the protection of personal data in cyberspace?
Maps to: personal data protection framework, Srikrishna Committee recommendations, precursor analysis to the DPDP Act 2023.
2019
10m
150w
What is the CyberDome Project? Explain how it can be useful in controlling internet crimes in India.
Maps to: Kerala Police’s CyberDome model — public-private partnership for cyber crime control, replicability as national cyber crime response framework.
2020
10m
150w
Discuss different types of cybercrimes and measures required to fight the menace.
Maps to: cybercrime taxonomy (financial fraud, hacking, cyberstalking, ransomware), IT Act provisions, I4C, and inter-agency coordination.
2021
15m
250w
Keeping in view India’s internal security, analyze the impact of cross-border cyberattacks. Also discuss defensive measures against these sophisticated attacks.
Maps to: state-sponsored cyberattacks, APT groups targeting Indian infrastructure, cyber deterrence, and NCIIPC defensive architecture.
2022
15m
250w
What are the different elements of cybersecurity? Keeping in view the challenges in cybersecurity, examine the extent to which India has successfully developed a comprehensive National Cyber Security Strategy.
Maps to: National Cyber Security Strategy 2020, elements of cybersecurity (confidentiality, integrity, availability), gaps in India’s cyber resilience.
2022
10m
150w
Starlink will change internet connectivity. Discuss the utility of the project in bringing remote connectivity.
Maps to: satellite internet as dual-use technology — connectivity benefits vs strategic security concerns about foreign-controlled communication infrastructure.
2024
10m
150w
Social media and encrypted messaging services pose a serious security challenge. What measures have been adopted at various levels to address the security implications of social media? Also, suggest any other remedies to address the problem.
Maps to: IT (Intermediary Guidelines) Rules 2021, traceability requirements for encrypted messaging, platform accountability for security threats.
↑ Back to Top
GS3 → Internal Security → LWE & Organized Crime
2013
15m
250w
Article 244 of the Indian Constitution relates to the administration of Scheduled Areas and Tribal Areas. Analyze the impact of non-implementation of the provisions of the Fifth Schedule on the growth of Left Wing Extremism.
Maps to: governance deficit in tribal areas, Fifth Schedule non-implementation, and its causal link to alienation fueling LWE/Naxalism.
2015
15m
250w
The persisting drives of the government for developing large industries in backward areas have resulted in isolating tribal populations and farmers who face multiple displacements. With Malkangiri and Naxalbari as foci, discuss the corrective strategies needed to bring LWE-affected citizens back into the mainstream of social and economic growth.
Maps to: displacement-LWE nexus, SAMADHAN strategy, development-centric approach to LWE eradication, and tribal mainstreaming.
2018
10m
150w
Left-Wing Extremism (LWE) is showing a downward trend, but still affects many parts of the country. Briefly explain the Government of India’s approach to countering the challenges posed by LWE.
Maps to: SAMADHAN doctrine, National Policy and Action Plan on LWE, security and development dual-track approach, surrender-and-rehabilitation policies.
2020
15m
250w
What are the determinants of left-wing extremism in the eastern part of India? What strategy should the Government of India, civil administration, and security forces adopt to counter the threat in the affected areas?
Maps to: structural determinants of Naxalism (land, forest rights, mining displacement), SAMADHAN framework, and tri-directional counter-strategy.
2022
15m
250w
Naxalism is a social, economic, and developmental issue manifesting violent internal security threats. In this context, discuss the emerging issues and suggest a multilayered strategy to tackle the menace of Naxalism.
Maps to: urban Naxalism, technological adaptation by Maoists, multi-layered counter-strategy combining security operations with governance and development.
2025
10m
150w
The Government of India recently stated that Left Wing Extremism (LWE) will be eliminated by 2026. What do you understand by LWE and how are the people affected by it? What measures have been taken by the government to eliminate LWE?
Maps to: LWE definition, socioeconomic impact on affected communities, SAMADHAN strategy, and recent achievements in Naxal-affected Red Corridor districts.
↑ Back to Top
GS3 → Internal Security → North-East Challenges & Peace Process
2015
15m
250w
Human rights activists constantly highlight the view that the Armed Forces (Special Powers) Act (AFSPA), 1958 is a draconian act leading to cases of human rights abuses by security forces. Which sections of AFSPA are opposed by the activists? Critically evaluate the requirement with reference to the view held by the Apex Court.
Maps to: AFSPA debate — security imperatives vs human rights, Supreme Court guidelines, Reddy Committee recommendations, and NHRC concerns.
2017
15m
250w
The North-Eastern region of India has been infested with insurgency for a very long time. Analyze the major reasons for the survival of armed insurgency in this region.
Maps to: structural factors sustaining NE insurgency — ethnic fragmentation, historical grievances, porous borders, and safe havens in neighbouring countries.
2019
15m
250w
Cross-border movement of insurgents is only one of the several security challenges facing the policing of the border in Northeast India. Examine the various challenges currently emanating across the India-Myanmar border. Also, discuss steps to counter these challenges.
Maps to: India-Myanmar border challenges — insurgent sanctuaries, narco-trafficking, FMR implications, and Kaladan Multi-Modal project security dimensions.
2025
15m
250w
What are the major challenges to internal security and peace process in the North-Eastern States? Map the various peace accords and agreements initiated by the government in the past decade.
Maps to: NE peace process architecture — Naga Accord, Bodo Accord 2020, NLFT settlement, Bru-Reang accord, and challenges to sustainable peace in the region.
↑ Back to Top