GS3 Internal Security PYQ 2013–2025 | UPSC Previous Year Questions

GS3 Internal Security PYQ 2013–2025 | UPSC Previous Year Questions | Legacy IAS Academy

Overview

Internal Security is one of the most dynamic sections of GS3, drawing from the UPSC syllabus on linkages between development and spread of extremism, role of external state and non-state actors, cybersecurity, border management, organized crime, and money laundering. Over the 2013–2025 cycle, 55 questions have been asked across eight broad thematic clusters.

The subject has witnessed a clear evolution: early years (2013–2016) were dominated by border management, LWE, and definitional questions on cyber threats. Post-2017, the paper shifted toward analytical questions on radicalization, terror funding, emerging technologies in security, and the North-East peace process. The 2025 paper reinforced terrorism (including LWE elimination), North-East peace accords, and maritime security as core topics.

Cyber Security (12 questions) and Border Management (13 questions) are the two largest clusters, together accounting for nearly half of all questions. LWE and Terrorism together account for another 14 questions, making the four themes a non-negotiable priority.

Syllabus Map

Click each theme to expand. Counts include 2025 questions.

Theme 1 — Kashmir Issue & J&K 2 questions
Over-ground workers (OGWs) in insurgency areas1
Winning hearts and minds — conflict resolution in J&K1
Theme 2 — Border Management 13 questions
Technology in border management (UAVs, drones)1
Maritime & coastal security3
Specific border issues (LOC, CPEC, hot pursuit, BADP)4
Border area local population management1
Border management & organized crime (drug trafficking)1
Generic border management challenges2
Airspace sovereignty1
Theme 3 — Role of Non-State Actors 5 questions
Central intelligence & investigative agencies1
Organized crime types and terror linkages1
External & internal non-state actors (generic)1
CPEC & OBOR — non-state dimension1
Internet/social media misuse by non-state actors1
Theme 4 — Terrorism & Radicalization 11 questions
Terror financing & narco-terrorism3
Generic counter-terrorism (solutions, complexity)3
UAPA & anti-terror legal framework1
Mob violence1
Radicalization (ISIS, digital media, religious indoctrination)2
Terrorism as competitive industry1
Theme 5 — Cyber Security 12 questions
National Cyber Security Policy / Strategy2
Cyber attacks & cross-border cyber threats2
Cyber crime types and measures1
Cyber warfare1
CyberDome project1
Data security & personal data protection1
Cloud hosting security1
Social networking & encrypted messaging2
National Cyber Security Challenges1
Theme 6 — Left Wing Extremism 7 questions
Fifth Schedule & tribal displacement linkage to LWE1
Corrective strategies for LWE-affected areas1
Government approach to countering LWE1
Determinants of LWE in eastern India1
Naxalism as social-economic-developmental issue1
LWE elimination by 2026 — understanding & measures1
Historical & socioeconomic roots of Naxalism1
Theme 7 — Money Laundering 2 questions
Money laundering as security & economic sovereignty threat1
Emerging tech & globalization in money laundering1
Theme 8 — North-East Insurgency 4 questions
AFSPA & human rights concerns1
Survival of armed insurgency in North-East1
India-Myanmar border challenges1
Internal security & peace process in North-East; peace accords1

Heatmap — Theme × Year

Darker = more questions that year. 2025 data from official UPSC paper.

Theme ’13’14’15’16’17 ’18’19’20’21’22 ’23’24’25Total
Kashmir / J&K 00000 01000 1002
Border Mgmt 13020 11201 11216
Non-State Actors 00010 10011 1006
Terrorism & Rad. 01112 01010 11111
Cyber Security 20211 11112 01014
LWE 10100 10101 0017
Money Laundering 10000 00010 0002
NE Insurgency 00101 01000 0014
Year Total 54554 55445 44559
0 1 2 3 4 5+
↑ Back to Top

Questions by Theme

Theme 1 — Kashmir Issue & J&K
2 questions
GS3 → Internal Security → Kashmir & Insurgency
2019 15m 250w
The banning of ‘Jamaat-e-Islami’ in Jammu and Kashmir brought into focus the role of over-ground workers (OGWs) in assisting terrorist organizations. Examine the role played by OGWs in insurgency-affected areas. Discuss measures to neutralize their influence.
Maps to: linkages between non-state actors, terrorist organizations, and ground-level support networks in insurgency-affected areas.
GS3-U08-T01-S01
2023 15m 250w
‘Winning of Hearts and Minds’ in terrorism-affected areas is an essential step in restoring the trust of the population. Discuss the measures adopted by the Government in this respect as part of conflict resolution in Jammu and Kashmir.
Maps to: government’s WHAM strategy, confidence-building, development-based counter-insurgency approach in J&K.
GS3-U08-T04-S01
↑ Back to Top
Theme 2 — Border Management
16 questions
GS3 → Internal Security → Border Management & Organized Crime
2013 15m 250w
How far are India’s internal security challenges linked with border management, particularly in view of the long, porous borders with most South Asian countries and Myanmar?
Maps to: linkages between border porosity, trans-border crime, and internal security challenges across South Asian neighbourhood.
2014 15m 250w
International civil aviation laws provide all countries complete and exclusive sovereignty over the airspace above their territory. What do you understand by ‘airspace’? What are the implications of these laws on the space above this airspace? Discuss the challenges posed and suggest ways to contain the threat.
Maps to: sovereignty dimensions of airspace and outer space, drone/satellite-based security threats, emerging challenges for border/airspace management.
2014 15m 250w
How does illegal trans-border migration pose a threat to India’s security? Discuss strategies to curb this, bringing out the factors that give impetus to such migration.
Maps to: illegal migration as a security challenge, border management strategies, push-pull factors for trans-border migration.
2014 15m 250w
China and Pakistan have entered into an agreement for the development of an economic corridor. What threat does this pose for India’s security? Critically examine.
Maps to: CPEC as strategic security threat — geo-strategic implications, sovereignty concerns over PoK corridor, India’s security calculus.
2014 15m 250w
In 2012, the longitudinal marking for high-risk areas for piracy was moved from 65° E to 78° E in the Arabian Sea by the International Maritime Organization. What impact does this have on India’s maritime security concerns?
Maps to: maritime security challenges, IMO piracy designations, India’s coastal and blue-water security interests.
GS3-U08-T02-S02
2016 15m 250w
Border management is a complex task due to difficult terrain and hostile relations with some countries. Elucidate the challenges and strategies for effective border management.
Maps to: multi-dimensional nature of border management — physical, technological, diplomatic, and socioeconomic dimensions.
2016 15m 250w
The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in connection with armed action against terrorist attacks. Discuss the strategic impact of such actions.
Maps to: cross-border counter-terrorism operations, strategic deterrence, international law implications of hot pursuit doctrine.
2018 15m 250w
India’s proximity to two of the world’s biggest illicit opium-growing states has enhanced its internal security concerns. Explain the linkages between drug trafficking and other illicit activities such as gunrunning, money laundering, and human trafficking. What countermeasures should be taken to prevent the same?
Maps to: border management and organized crime nexus — narco-trafficking, arms smuggling, money laundering as composite security threats.
2019 10m 150w
The banning of ‘Jamaat-e-Islami’ in Jammu and Kashmir brought into focus the role of over-ground workers (OGWs) in assisting terrorist organizations. Examine the role played by OGWs in insurgency-affected areas. Discuss measures to neutralize their influence.
Maps to: over-ground worker networks, support infrastructure for terrorism, counter-insurgency measures in conflict zones.
2020 10m 150w
For effective border area management, discuss the steps required to be taken to deny local support to militants, and also suggest ways to manage favorable perception among locals.
Maps to: WHAM doctrine, border area development, civil-military coordination in border management.
2020 15m 250w
Analyze internal security threats and trans-border crimes along Myanmar, Bangladesh, and Pakistan borders, including the Line of Control (LoC). Also discuss the role played by various security forces in this regard.
Maps to: multi-border security assessment — organized crime, insurgency, and terror nexus along India’s porous borders.
2022 15m 250w
What are the maritime security challenges in India? Discuss the organizational, technical, and procedural initiatives taken to improve maritime security.
Maps to: maritime security architecture — Coast Guard, IFC-IOR, SAGAR doctrine, multi-agency coordination for sea lane protection.
2023 10m 150w
The use of unmanned aerial vehicles (UAVs) by our adversaries across the borders to ferry arms/ammunition, drugs, etc., is a serious threat to internal security. Comment on the measures being taken to tackle this threat.
Maps to: emerging technology threats to border security — counter-drone systems, CADS, electronic jamming, and policy frameworks.
2024 15m 250w
India has a long and troubled border with China and Pakistan fraught with contentious issues. Examine the conflicting issues and security challenges along the border. Also give out the development being undertaken in these areas under the Border Area Development Programme (BADP) and Border Infrastructure and Management (BIM) Scheme.
Maps to: border infrastructure development, BADP, BIM Scheme, dual-use border infrastructure for security and socioeconomic development.
2025 10m 150w
Terrorism is a global scourge. How has it manifested in India? Elaborate with contemporary examples. What are the counter measures adopted by the State? Explain.
Maps to: manifestations of terrorism in India (cross-border, urban, lone-wolf), state counter-terrorism measures including legal, intelligence, and operational dimensions.
GS3-U08-T04-S01
2025 15m 250w
Why is maritime security vital to protect India’s sea trade? Discuss maritime and coastal security challenges and the way forward.
Maps to: India’s blue economy, sea lanes of communication, coastal security apparatus, piracy, and SAGAR doctrine challenges.
GS3-U08-T02-S02
↑ Back to Top
Theme 3 — Role of Non-State Actors
6 questions
GS3 → Internal Security → Non-State Actors & Organized Crime
2016 15m 250w
Use of the internet and social media by non-state actors for subversive activities is a major security concern. How have these been misused in the recent past? Suggest effective guidelines to curb the threat.
Maps to: technology exploitation by non-state actors, digital radicalization, information warfare, regulatory frameworks for social media.
GS3-U08-T05-S08
2018 15m 250w
The China-Pakistan Economic Corridor (CPEC) is viewed as a cardinal subset of China’s larger ‘One Belt One Road’ initiative. Give a brief description of CPEC and enumerate the reasons why India has distanced itself from the same.
Maps to: geo-strategic threats from external state actors, sovereignty concerns, and India’s objections to CPEC routing through PoK.
2021 15m 250w
Analyze the multidimensional challenges posed by external state and non-state actors to the internal security of India. Also discuss measures required to be taken to combat these threats.
Maps to: comprehensive analysis of external state sponsorship of terror, proxy actors, and non-state armed groups threatening India’s internal security.
2022 15m 250w
Discuss the types of organized crime. Describe the linkages between terrorists and organized crime at the national and transnational levels.
Maps to: organized crime typology, terror-crime nexus, convergence of trafficking, smuggling, and terrorism financing at transnational level.
2023 15m 250w
What are the internal security challenges being faced by India? Give out the role of Central Intelligence and Investigative Agencies tasked to counter such threats.
Maps to: role of IB, RAW, NIA, NSG, and NATGRID in India’s internal security architecture; intelligence coordination and counter-terrorism frameworks.
2014 15m 250w
“The diverse nature of India as a multi-religious and multi-ethnic society is not immune to the impact of radicalism seen in her neighbourhood.” Discuss along with strategies to be adopted to counter this environment.
Maps to: socio-religious radicalization, external influence on domestic security, soft power and counter-radicalization strategies.
GS3-U08-T04-S05
↑ Back to Top
Theme 4 — Terrorism & Radicalization
11 questions
GS3 → Internal Security → Terrorism, Radicalization & Extremism
2015 15m 250w
Religious indoctrination via digital media has resulted in Indian youth joining ISIS. What is ISIS and its mission? How can ISIS be dangerous to the internal security of our country?
Maps to: online radicalization, ISIS ideology and recruitment, lone-wolf terrorism, and threat to India’s internal security from transnational jihadi groups.
2016 15m 250w
“Terrorism is emerging as a competitive industry over the last few decades.” Analyze the statement.
Maps to: commercialization of terrorism — recruitment ecosystem, branding of terror groups, financing methods, and industry-like operational structures.
2017 15m 250w
The scourge of terrorism is a grave challenge to national security. What solutions do you suggest to curb this growing menace? What are the major sources of terrorist funding?
Maps to: counter-terrorism strategies, terror financing sources (hawala, drug trade, state sponsors), multi-pronged solutions including legal and economic measures.
2017 10m 150w
Mob violence is emerging as a serious law and order problem in India. By giving suitable examples, analyze the causes and consequences of such violence.
Maps to: communal violence, mob lynching, law and order breakdown, role of social media in inciting mob violence and its socioeconomic consequences.
2019 15m 250w
The Indian government has recently strengthened anti-terrorism laws by amending the Unlawful Activities (Prevention) Act (UAPA), 1967 and the NIA Act. Analyze these changes in the context of the prevailing security environment while discussing the scope and reasons for opposing the UAPA by human rights organizations.
Maps to: UAPA amendments, NIA Act expansion, balance between national security imperatives and civil liberties in anti-terror legislation.
2021 15m 250w
Analyze the complexity and intensity of terrorism, its causes, linkages, and obnoxious nexus. Also suggest measures required to eradicate the menace of terrorism.
Maps to: root causes of terrorism (political, social, economic), terror-crime-drug-hawala nexus, comprehensive national and international counter-terrorism approach.
2023 15m 250w
Give out the major sources of terror funding in India and the efforts being made to curtail these sources. In light of this, also discuss the aim and objective of the ‘No Money for Terror (NMFT)’ Conference recently held in New Delhi (Nov 2022).
Maps to: terror financing ecosystem, FATF compliance, NMFT Conference significance, PMLA and related legislation as tools to choke terror funds.
2024 15m 250w
Explain how narco-terrorism has emerged as a serious threat across the country. Suggest suitable measures to counter narco-terrorism.
Maps to: narco-terrorism linkage, drug-terror funding nexus, golden crescent and triangle threats, NDPS Act, and multi-agency counter-narco frameworks.
GS3-U08-T02-S05
2025 10m 150w
Terrorism is a global scourge. How has it manifested in India? Elaborate with contemporary examples. What are the counter measures adopted by the State? Explain.
Maps to: contemporary manifestations of terrorism (cross-border, urban, cyber), NIA, NSG, UAPA, and India’s anti-terrorism architecture as countermeasures.
2014 15m 250w
“The diverse nature of India as a multi-religious and multi-ethnic society is not immune to the impact of radicalism seen in her neighbourhood.” Discuss along with strategies to be adopted to counter this environment.
Maps to: external radicalization influences, multi-ethnic societal vulnerabilities, de-radicalization and counter-narrative strategies.
2015 10m 150w
Religious indoctrination via digital media has resulted in Indian youth joining ISIS. What is ISIS and its mission? How can ISIS be dangerous to the internal security of our country?
Maps to: digital radicalization pipeline, ISIS threat assessment, and vulnerability of Indian youth to transnational jihadist recruitment.
↑ Back to Top
Theme 5 — Cyber Security
14 questions
GS3 → Internal Security → Cyber Security & Digital Threats
2013 15m 250w
What are social networking sites, and what security implications do these sites present?
Maps to: social media as a vector for security threats — data harvesting, radicalization, coordinated misinformation, and national security risks.
2013 15m 250w
Cyber warfare is considered by some defense analysts to be a larger threat than even Al Qaeda or terrorism. What do you understand by cyber warfare? Outline the cyber threats India is vulnerable to, and bring out the state of India’s preparedness to deal with the same.
Maps to: cyber warfare definitions, India’s critical infrastructure vulnerabilities, CERT-In, and National Cyber Security Policy as preparedness framework.
2015 15m 250w
Discuss the advantages and security implications of cloud hosting of servers vis-à-vis in-house machine-based hosting for government businesses.
Maps to: government IT security — cloud computing benefits vs data sovereignty risks, MEITY cloud policy, and critical data protection frameworks.
2015 15m 250w
Considering the threats cyberspace poses for the country, India needs “Digital Armed Forces” to prevent crimes. Critically evaluate the National Cyber Security Policy (2013), outlining the challenges perceived in its effective implementation.
Maps to: NCSP 2013 analysis — gaps in implementation, need for dedicated cyber command, and challenges in India’s cyber defence architecture.
2016 10m 150w
Use of the internet and social media by non-state actors for subversive activities is a major security concern. How have these been misused in the recent past? Suggest effective guidelines to curb the threat.
Maps to: cyber-enabled subversion, social media guidelines, IT Rules applicability to security threats from non-state digital actors.
2017 10m 150w
Discuss the potential threats of cyberattack and the security framework to prevent it.
Maps to: cyberattack vectors (DDoS, APT, ransomware), India’s security framework including CERT-In, NCIIPC, and NTRO for critical infrastructure protection.
2018 15m 250w
Data security has assumed significant importance in the digitized world due to rising cybercrimes. The Justice B.N. Srikrishna Committee Report addresses issues related to data security. What, in your view, are the strengths and weaknesses of the Report relating to the protection of personal data in cyberspace?
Maps to: personal data protection framework, Srikrishna Committee recommendations, precursor analysis to the DPDP Act 2023.
2019 10m 150w
What is the CyberDome Project? Explain how it can be useful in controlling internet crimes in India.
Maps to: Kerala Police’s CyberDome model — public-private partnership for cyber crime control, replicability as national cyber crime response framework.
2020 10m 150w
Discuss different types of cybercrimes and measures required to fight the menace.
Maps to: cybercrime taxonomy (financial fraud, hacking, cyberstalking, ransomware), IT Act provisions, I4C, and inter-agency coordination.
2021 15m 250w
Keeping in view India’s internal security, analyze the impact of cross-border cyberattacks. Also discuss defensive measures against these sophisticated attacks.
Maps to: state-sponsored cyberattacks, APT groups targeting Indian infrastructure, cyber deterrence, and NCIIPC defensive architecture.
2022 15m 250w
What are the different elements of cybersecurity? Keeping in view the challenges in cybersecurity, examine the extent to which India has successfully developed a comprehensive National Cyber Security Strategy.
Maps to: National Cyber Security Strategy 2020, elements of cybersecurity (confidentiality, integrity, availability), gaps in India’s cyber resilience.
2022 10m 150w
Starlink will change internet connectivity. Discuss the utility of the project in bringing remote connectivity.
Maps to: satellite internet as dual-use technology — connectivity benefits vs strategic security concerns about foreign-controlled communication infrastructure.
2024 10m 150w
Social media and encrypted messaging services pose a serious security challenge. What measures have been adopted at various levels to address the security implications of social media? Also, suggest any other remedies to address the problem.
Maps to: IT (Intermediary Guidelines) Rules 2021, traceability requirements for encrypted messaging, platform accountability for security threats.
↑ Back to Top
Theme 6 — Left Wing Extremism
7 questions
GS3 → Internal Security → LWE & Organized Crime
2013 15m 250w
Article 244 of the Indian Constitution relates to the administration of Scheduled Areas and Tribal Areas. Analyze the impact of non-implementation of the provisions of the Fifth Schedule on the growth of Left Wing Extremism.
Maps to: governance deficit in tribal areas, Fifth Schedule non-implementation, and its causal link to alienation fueling LWE/Naxalism.
2015 15m 250w
The persisting drives of the government for developing large industries in backward areas have resulted in isolating tribal populations and farmers who face multiple displacements. With Malkangiri and Naxalbari as foci, discuss the corrective strategies needed to bring LWE-affected citizens back into the mainstream of social and economic growth.
Maps to: displacement-LWE nexus, SAMADHAN strategy, development-centric approach to LWE eradication, and tribal mainstreaming.
2018 10m 150w
Left-Wing Extremism (LWE) is showing a downward trend, but still affects many parts of the country. Briefly explain the Government of India’s approach to countering the challenges posed by LWE.
Maps to: SAMADHAN doctrine, National Policy and Action Plan on LWE, security and development dual-track approach, surrender-and-rehabilitation policies.
2020 15m 250w
What are the determinants of left-wing extremism in the eastern part of India? What strategy should the Government of India, civil administration, and security forces adopt to counter the threat in the affected areas?
Maps to: structural determinants of Naxalism (land, forest rights, mining displacement), SAMADHAN framework, and tri-directional counter-strategy.
2022 15m 250w
Naxalism is a social, economic, and developmental issue manifesting violent internal security threats. In this context, discuss the emerging issues and suggest a multilayered strategy to tackle the menace of Naxalism.
Maps to: urban Naxalism, technological adaptation by Maoists, multi-layered counter-strategy combining security operations with governance and development.
2025 10m 150w
The Government of India recently stated that Left Wing Extremism (LWE) will be eliminated by 2026. What do you understand by LWE and how are the people affected by it? What measures have been taken by the government to eliminate LWE?
Maps to: LWE definition, socioeconomic impact on affected communities, SAMADHAN strategy, and recent achievements in Naxal-affected Red Corridor districts.
↑ Back to Top
Theme 7 — Money Laundering
2 questions
GS3 → Internal Security → Money Laundering & Terror Financing
2013 15m 250w
Money laundering poses a serious security threat to a country’s economic sovereignty. What is its significance for India, and what steps need to be taken to control this menace?
Maps to: money laundering as economic sovereignty threat, PMLA framework, FIU-IND, and India’s anti-money laundering ecosystem.
2021 15m 250w
Discuss how emerging technologies and globalization contribute to money laundering. Elaborate measures to tackle the problem of money laundering both at national and international levels.
Maps to: cryptocurrency-enabled money laundering, hawala 2.0, FATF recommendations, Egmont Group, and PMLA amendments as global-national response.
↑ Back to Top
Theme 8 — North-East Insurgency
4 questions
GS3 → Internal Security → North-East Challenges & Peace Process
2015 15m 250w
Human rights activists constantly highlight the view that the Armed Forces (Special Powers) Act (AFSPA), 1958 is a draconian act leading to cases of human rights abuses by security forces. Which sections of AFSPA are opposed by the activists? Critically evaluate the requirement with reference to the view held by the Apex Court.
Maps to: AFSPA debate — security imperatives vs human rights, Supreme Court guidelines, Reddy Committee recommendations, and NHRC concerns.
2017 15m 250w
The North-Eastern region of India has been infested with insurgency for a very long time. Analyze the major reasons for the survival of armed insurgency in this region.
Maps to: structural factors sustaining NE insurgency — ethnic fragmentation, historical grievances, porous borders, and safe havens in neighbouring countries.
2019 15m 250w
Cross-border movement of insurgents is only one of the several security challenges facing the policing of the border in Northeast India. Examine the various challenges currently emanating across the India-Myanmar border. Also, discuss steps to counter these challenges.
Maps to: India-Myanmar border challenges — insurgent sanctuaries, narco-trafficking, FMR implications, and Kaladan Multi-Modal project security dimensions.
2025 15m 250w
What are the major challenges to internal security and peace process in the North-Eastern States? Map the various peace accords and agreements initiated by the government in the past decade.
Maps to: NE peace process architecture — Naga Accord, Bodo Accord 2020, NLFT settlement, Bru-Reang accord, and challenges to sustainable peace in the region.
↑ Back to Top

Insights

How to use: Prioritise high-frequency themes (Border Mgmt + Cyber = ~50% of questions). Master the SAMADHAN doctrine for LWE, NCSP framework for cyber, and peace accord sequence for NE. Directive verbs shift from “Examine” to “Analyze” post-2017 — write multi-dimensional answers.

High Yield Topics (Non-Negotiable)

Border Management (16 questions) and Cyber Security (14 questions) together form the backbone of this section. No year between 2013 and 2025 was without at least one question from each. Within border management, maritime security has become increasingly important — asked in 2014, 2022, and 2025. Within cyber security, the trajectory has moved from definitional questions (2013) to policy critique (2015) to cross-border cyberattack analysis (2021) and social media regulation (2024). Terrorism and its financing (11 questions) has been present every single year except 2020, making it the most chronologically consistent theme.

Trend Shifts (2013–2025)

Three clear phases are visible. Phase I (2013–2016) featured definitional and descriptive questions — “What is cyber warfare?”, “What are social networking sites?” Phase II (2017–2021) saw analytical demands — causality, nexus analysis, multi-dimensional strategies. Phase III (2022–2025) emphasizes contemporary specificity — NMFT Conference, DPDP Act, UAVs on borders, LWE elimination timeline, and NE peace accords mapping. The 2025 paper’s return to terrorism manifestations and LWE with a policy-delivery frame (elimination by 2026) signals UPSC expects candidates to track real-time policy milestones.

Recurring Question Frames & Directive Verbs

The dominant directive is Discuss (approx. 28 questions), followed by Analyze/Analyse (14), Examine (8), and Explain (5). “Discuss” questions demand breadth — causes, manifestations, and countermeasures in a single response. “Analyze” questions demand deeper structural reasoning. A common pattern is the compound question: definition/understanding + impact/manifestation + government measures. Candidates who master this three-part structure will cover most Internal Security questions effectively.

Coverage Gaps (Low-Frequency but Syllabus-Listed)

Money Laundering has been asked only twice despite being a listed syllabus topic — its cryptocurrency and hawala dimensions are ripe for examination. The role of the media in internal security has not been directly asked. Disaster management’s overlap with internal security (humanitarian operations by armed forces) has been underexplored. The J&K theme has only 2 questions — post-Article 370 abrogation dynamics, integration challenges, and new UT governance model may emerge as future question areas. Narco-terrorism, asked first in 2024, is likely to reappear given its rising policy salience.

↑ Back to Top

Book a Free Demo Class

March 2026
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
Categories

Get free Counselling and ₹25,000 Discount

Fill the form – Our experts will call you within 30 mins.