GS Paper III · Internal Security · All PYQs 2013–2025 · April 2026
🛡️ Internal Security — Complete PYQ Compendium
Every question from 2013–2025 with structured, colour-coded answer frameworks. Click any question to expand. Colour-coded rows: Intro · Body · Conclusion · Current Affairs · Way Forward.
🌱 LWE & Extremism🌐 External Actors💻 Cyber & Media & ML💰 Crime-Terror🗺️ Border Areas🛡️ Security Forces⚡ Master Tips
52
Total Questions
2013–25
Years Covered
5
New 2025 Qs
6
Units
📌 How to Use: Click any question to expand its full answer framework. Click again to close. Colour-coded rows: INTRO BODY CONC CURR AFFAIRS WAY FWD
🌱
Unit 1 — Linkages: Development & Spread of Extremism
LWE · Naxalism · North-East Insurgency · J&K · WHAM · 10 Questions
📋 Answer Framework — 15 Marks · 250 Words
INTRO
Northeast India — 200+ ethnic groups, 45+ insurgent groups — is India's most complex internal security mosaic. Historical alienation, ethnic identity, and underdevelopment have sustained decades of conflict. Yet the past decade marks unprecedented peace-building progress, with landmark accords in Bodo (2020) and Karbi (2021).
SECURITY CHALLENGES
External: Cross-border insurgent sanctuaries in Myanmar (FMR scrapped 2024; fencing underway); Golden Triangle narco-arms trafficking; China's historical support to NSCN factions. Internal: Manipur Meitei-Kuki conflict (2023–present; 200+ killed, 60,000+ displaced); AFSPA tensions; illegal migration (4,096 km porous Bangladesh border); parallel governance by armed groups; inter-state boundary disputes (Assam-Meghalaya, 2022 partial resolution).
PEACE ACCORDS
Bodo Peace Accord (Jan 2020): NDFB factions — ended 50-year insurgency; 1,600+ surrendered; Bodoland Territorial Council empowered. Karbi Anglong Agreement (2021): Five armed groups; enhanced Karbi Anglong Autonomous Council autonomy. Assam-Meghalaya Boundary (2022): 6 of 12 flash-points resolved. Naga Peace Process (ongoing): Framework Agreement (2015) with NSCN-IM — final settlement elusive; demand for separate flag and constitution is non-negotiable for India. SoO agreements: Multiple Suspension of Operations pacts with Manipur groups.
CURR AFFAIRS
Manipur (2023–25): Meitei-Kuki conflict — India's most acute active security crisis; Myanmar arms overflow + narco-trafficking fuelling it. Internet shutdowns (longest in democratic India). FMR Scrapped (2024): India ended Free Movement Regime with Myanmar; fencing entire 1,643 km; biometric passes (Dec 2024). Op Sindoor border dimension: Assam Rifles maintained NE border security during India-Pakistan confrontation (May 2025).
CONCLUSION
Bodo and Karbi accords prove that decades-long insurgencies end when legitimate political aspirations are addressed. Naga process and Manipur remain the unfinished agenda. Way forward: implement signed accords genuinely; accelerate Act East Policy; seal Myanmar border against arms; address Manipur through political dialogue — security operations alone cannot resolve ethnic conflict.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
LWE (Naxalism) is far-left Maoist armed insurgency seeking to overthrow India's democratic state through Protracted People's War. Once PM Manmohan Singh's "single biggest internal security challenge," it shows dramatic decline: affected districts reduced from 126 (2013) → 7 (Feb 2026) — an 85% reduction validating India's dual-track approach.
PEOPLE AFFECTED
Primarily tribal and rural populations in the Red Corridor — Chhattisgarh, Jharkhand, Odisha. Impact: displacement from mining/dam projects without rehabilitation; extortion of contractors, merchants; forced school and hospital closures; youth forced recruitment; denial of PESA and Forest Rights Act benefits. Paradox: Maoists claim to protect tribals yet destroy roads, schools, and towers that would benefit communities.
GOVT MEASURES
Security (SAMADHAN Doctrine, 2017): CRPF as lead force; Bastariya Battalion (local tribal recruits with language advantage); Cobra unit (jungle warfare); MAC intelligence fusion; drone surveillance. Development: Road Requirement Plan (RRP); Aspirational Districts Programme (30+ LWE districts); Roshni/Himayat skills; JAM trinity (financial inclusion). Rehabilitation: Surrender policies with stipends; protection from Maoist retaliation; vocational training.
2025 UPDATE
Nambala Keshava Rao (CPI-Maoist General Secretary) neutralised (2025) — biggest blow to Maoist leadership in decades. 1,500+ surrenders in 2025. Chhattisgarh: 287 killed, 927 arrests, 837 surrenders (2024). 78% decline in LWE violence since 2010. Malkanagiri model: road connectivity transforming former Maoist strongholds within 5 years.
CONCLUSION
2026 elimination target is achievable for organised Maoist violence but not underlying grievances. True elimination requires filling the governance vacuum in cleared areas immediately — or the next grievance cycle begins. Success measured not by body counts but by how quickly cleared areas receive roads, hospitals, schools, and functioning Gram Sabhas delivering rights under PESA and FRA.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
WHAM (Winning Hearts and Minds) recognises that sustainable peace requires community trust, not just military superiority. In J&K, decades of militancy created deep alienation. Post-Article 370 abrogation (2019), WHAM became central — but Pahalgam massacre (April 2025, TRF/LeT, 26 tourists killed by religion) showed adversaries now specifically target WHAM achievements to reverse them.
WHAM MEASURES
Military-led: Operation Sadbhavana — Army runs schools, medical camps, skill training in J&K/Ladakh; Rashtriya Rifles community interaction; Village Defence Guards (VDG) arming remote villagers as defence + HUMINT source; surrendered militant rehabilitation with state protection. Governance: J&K Assembly elections (Sept 2024 — first in 10 years; massive turnout); G20 in Srinagar (2023). Economic: PM Development Package; record tourist arrivals (2024); PM welfare schemes extended. Cultural: Kashmiri Pandit return initiatives; J&K statehood restoration commitment.
CURR AFFAIRS
Pahalgam massacre (April 22, 2025): TRF/LeT killed 26 tourists, selecting victims by religion — a deliberate strategy to trigger communal polarisation and destroy tourism revival (WHAM's biggest success). Op Sindoor (May 7, 2025): India struck Muridke (LeT HQ) and Bahawalpur (JeM HQ) — Pakistan's terror infrastructure punished directly. WHAM now must counter this new civilian-targeting psychological warfare dimension.
CONCLUSION
WHAM shows measurable results: record tourist arrivals (2024), declining insurgency incidents in the Valley. Pahalgam demonstrated adversaries will specifically target WHAM achievements because they are succeeding. Sustained economic development, democratic participation, and countering disinformation must work together. The best WHAM indicator: when local communities proactively report militant presence — which requires years of trust built through tangible, respectful governance.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
Naxalism's strength lies in exploiting real grievances — land alienation, forest rights denial, corporate-state nexus. Its decline (126 districts → 7, 2013–2026) validates the dual approach. But emerging issues require an updated strategy beyond conventional operations.
EMERGING ISSUES
Urban Naxalism: Intellectual support networks providing ideological cover and legal defence (Elgar Parishad 2018 case). Technology adoption: Encrypted communications; sophisticated IEDs; drone reconnaissance; social media propaganda. Funding diversification: Extortion → illegal mining → narco-trafficking linkages with organised crime. Geographic shift: As Bastar contracts, movement to Andhra-Odisha border areas. Ideological evolution: Weaponising environmental grievances, anti-mining sentiment, and tribal identity politics in more sophisticated ways.
MULTILAYERED STRATEGY
Security layer: SAMADHAN doctrine; Bastariya Battalion (local tribal recruits); OCTOPUS model (Andhra — intelligence + rapid response); deny safe havens. Development layer: Road Requirement Plan; Aspirational Districts; Forest Rights Act implementation. Rights layer: PESA 1996 genuine implementation — Gram Sabhas with real power over land, forests, and natural resources; stop mining leases without Gram Sabha consent. Political layer: Dignified surrender + rehabilitation; tribal land alienation redress through fast-track courts. Counter-narrative layer: Community radio in tribal languages; showcase development; counter urban Naxal propaganda.
CURR AFFAIRS (2025)
Neutralisation of CPI(Maoist) General Secretary (2025) is a watershed moment. Post-clearance governance model: Malkanagiri road connectivity transformed former Maoist strongholds within 5 years. This replication model must be systematised. 78% violence decline since 2010 validates the strategy; zero governance vacuum post-clearance is the next frontier.
CONCLUSION
Naxalism dies when the state is consistently present — through guns AND through schools, hospitals, roads, and courts. The multilayered strategy's power lies in simultaneity: Clear (military) → Hold (police + governance) → Build (development). Skipping any step allows Maoists to regroup in the vacuum. The 2026 elimination target demands completing all three stages, not just the security phase.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
"Resource curse" — Chhattisgarh produces 40% of India's steel but its tribal districts have HDI comparable to sub-Saharan Africa. LWE in eastern India is the security manifestation of this governance failure: mineral-rich land, marginalised tribal populations, and an absent or extractive state.
DETERMINANTS — 4-D FRAMEWORK
Development deficit: Poverty, unemployment, no roads/hospitals/schools; mass displacement from mining/dams without rehabilitation — "ecological refugees." Democratic deficit: PESA 1996 and FRA 2006 poorly implemented — Gram Sabhas have no real power; tribal voice absent despite reservations. Dignity deficit: Cultural humiliation, caste discrimination — Maoists weaponise these by providing "Jan Adalats" and alternative governance that feels responsive. Defence deficit: Administrative vacuum — courts, banks, schools absent; state present only through security forces, which can themselves alienate communities if poorly managed.
COUNTER STRATEGY
GoI: Enforce PESA and FRA genuinely; Aspirational Districts Programme; resolve land acquisition disputes; SAMADHAN doctrine; Special Infrastructure Fund. Civil administration: Fill governance vacuum post-clearance immediately; Jan Aushadhi, Ayushman Bharat in cleared areas; fast-track tribal land rights; e-governance to reduce corruption contact points. Security forces: Intelligence-led operations minimising collateral damage; community policing; Bastariya Battalion model (tribal recruits); protect surrendered militants from Maoist retaliation.
CONCLUSION
The Andhra Pradesh Greyhounds model (intelligence + precision) and the Malkanagiri model (roads + development + governance) together represent the optimal approach: security creates conditions for development, development makes security sustainable. Neither works without the other — and sequence matters: security first, development immediately after, governance concurrently.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
From peak LWE violence (2009-10) through sustained dual-track strategy, India reduced affected districts from 126 (2013) to 7 (Feb 2026) — 78% violence decline. Approach: security operations + developmental engagement, simultaneously and permanently.
GOI APPROACH
Security (SAMADHAN, 2017): CRPF as lead; Bastariya Battalion (local tribal recruits); coordinated intelligence through MAC; drone/satellite surveillance; anti-IED measures. Development: Integrated Action Plan (IAP); Road Requirement Plan (RRP — all-weather roads); mobile connectivity; BADP; PM Gram Sadak Yojana. Governance: Strengthen Gram Sabha functioning under PESA; Forest Rights Act implementation; Aspirational Districts Programme. Rehabilitation: Surrender policies with stipends; vocational training; state protection from Maoist retaliation.
2025 MILESTONE
Neutralisation of CPI(Maoist) General Secretary Nambala Keshava Rao (2025) — landmark event. 2026 elimination target: achievable for organised violence; governance fill-in must be simultaneous. Malkanagiri model: road connectivity and development transforming former strongholds — replicable across remaining 7 districts.
CONCLUSION
The downward trend validates the approach. Government must now ensure cleared areas don't become governance vacuums — development and governance must follow security gains within months, not years. The last 7 districts are hardest precisely because they are most remote and most alienated — requiring intensified development, not just intensified operations.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
Mob violence — collective extrajudicial violence by groups — has emerged as a recurring threat to India's internal security and constitutional values. Supreme Court (Tehseen Poonawala, 2018) called it a "horrendous act of mobocracy" that "cannot become the new normal." It reveals failures at the intersection of social media, governance, and community trust.
CAUSES
Social media misinformation: WhatsApp forwards trigger mob action before fact-checking — 2018 lynching epidemic based on child kidnapping rumours (5+ deaths in Balaghat, Bengaluru, etc.). Communal polarisation: Dadri lynching (2015 — beef rumour); Muzaffarnagar (2013 — doctored videos triggering riots). Political mobilisation along communal lines lowers threshold for violence. Police failure: Inadequate intelligence, slow response, sometimes partisan behaviour. Institutional vacuum: Where formal dispute resolution fails, communities resort to extrajudicial violence. Political impunity: When mob perpetrators are celebrated rather than prosecuted — signals permissiveness.
CONSEQUENCES
Rule of law: Normalises extrajudicial violence; undermines constitutional order. Social: Inter-community distrust; displacement; trauma; chilling effect on minority participation in public life. Economic: Disrupts trade and investment in affected areas. Democratic: Selective targeting of religious/caste minorities creates second-class citizenship. International reputational cost to India's image as pluralistic democracy.
WAY FORWARD
SC Tehseen Poonawala (2018): preventive action by governments; designate nodal officers; fast-track mob violence prosecution. WhatsApp forward limit (5 contacts — implemented post-2018, reduced viral spread). Digital literacy programmes. Strict police accountability for inaction. Community policing — early de-escalation far more effective than post-violence prosecution. Zero-impunity policy regardless of which community the mob belongs to.
CONCLUSION
Mob violence is not just a law and order problem — it is a constitutional crisis. India must combine: strict prosecution (deterrence), digital governance (preventing misinformation triggers), community policing (early warning), and political will to reject impunity — regardless of which community the mob belongs to. A state that cannot protect citizens from mob violence has failed its most fundamental constitutional duty.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
NE India's insurgency has survived 70+ years because the conditions that created it — historical alienation, ethnic identity claims, underdevelopment — have not been fully addressed. It is not one movement but a mosaic of 45+ groups with different grievances, different sponsors, and different political goals.
REASONS FOR SURVIVAL
Historical-Political: Post-independence merger perceived as forced; ethnic groups demand self-determination (Naga Greater Nagalim, Bodoland, Kuki homeland); colonial boundaries dividing ethnic communities across India-Myanmar border. External support: China's historical arms and training for NSCN factions; Myanmar safe havens (FMR until 2024 scrapping); ISI use of Bangladesh as sanctuary (largely reduced post-2009). Economic model: Extortion from contractors and businesses; narco-trafficking (Golden Triangle proximity); natural resources control — insurgency as livelihood, not just ideology. Geographic cover: Dense forests, mountains, porous borders — ideal insurgent terrain. Political stalemate: Some groups prefer ceasefire status quo (extracting extortion without resolution) over peace settlements.
2024-25 UPDATE
FMR scrapped (2024) — key safe haven route closing. Bodo (2020) and Karbi (2021) accords show large-scale resolution is possible when genuine political accommodation is offered. Manipur Meitei-Kuki conflict (2023–25) — new form of ethnic violence demonstrating unresolved tensions. Myanmar junta (post-2021 coup) has reduced cooperation on Indian insurgent expulsion.
CONCLUSION
NE insurgency survival is a governance failure, not just a security challenge. Political accommodation within constitutional framework (Bodo, Karbi accords), economic integration through Act East Policy, closing Myanmar safe havens (FMR scrapped 2024), and implementing peace accords in letter and spirit are the path forward. Security operations without political solutions only suppress — not resolve.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
The "development paradox": India's richest mineral regions (Bastar, Jharkhand) are home to its poorest people — because development has been extractive, not inclusive. Large industry without tribal consent has fuelled the very insurgency threatening development. Malkangiri (Odisha) — once India's most LWE-affected district — shows how road connectivity and development can transform a Maoist stronghold within years.
CORRECTIVE STRATEGIES
Land and rights: Enforce FRA 2006 genuinely — community forest rights; stop land acquisition without Gram Sabha consent (PESA mandate); ensure R&R before displacement. Economic inclusion: Benefit-sharing from mining profits with affected communities; local employment priority in industrial projects; microfinance and cooperative models. Democratic empowerment: Strengthen Gram Sabhas as real decision-makers; tribal language administration; fast-track tribal land rights adjudication. Development model shift: From "project-first" to "community-first" — involve tribal institutions in project design and benefit distribution. Trust-building: Independent rehabilitation monitors; ombudsman for tribal rights; fast-track courts for tribal land disputes.
MALKANGIRI MODEL
Malkangiri — once most LWE-affected — transformed by road connectivity and governance presence. Paved roads enabled governance, economic activity, and military logistics simultaneously. Schools opened. Health centres established. The "governance dividend" of security operations was immediately capitalised. 2025: district not in LWE-affected list for the first time in decades. This model must be systematically replicated in remaining 7 districts.
CONCLUSION
Winning back LWE-affected citizens requires acknowledging that state policies — not just Maoist propaganda — created their alienation. Genuine accountability, equitable benefit-sharing, and democratic participation are not concessions — they are preconditions for sustainable security. When communities feel the development is theirs, insurgency loses its recruitment pitch permanently.
📋 Answer Framework — 10 Marks · 200 Words
INTRO
Article 244 + Fifth Schedule + PESA 1996 create a protective constitutional architecture for tribal populations in Scheduled Areas — giving Gram Sabhas power to protect lands, culture, and resources. Non-implementation has directly fuelled LWE by betraying constitutional promises that Maoists then weaponise: "The government that made laws to protect you has violated them."
FIFTH SCHEDULE — PROVISIONS NOT IMPLEMENTED
Governor's powers: Can modify central/state laws for tribal areas — rarely invoked. Tribal Advisory Council: Advisory body for tribal welfare — often rubber-stamp. Land transfer prohibition: Land cannot be transferred to non-tribals — routinely violated through shell companies and benami transactions. PESA 1996: Gram Sabhas must consent to land acquisition, mining, displacement; manage minor forest produce; regulate money lending — bypassed for virtually every major mining lease in LWE-affected areas.
IMPACT ON LWE GROWTH
Constitutional betrayal becomes Maoist recruitment pitch. Land alienation without PESA consent = dispossessed communities. Administrative vacuum (Gram Sabha bypassed) filled by Maoist "Jan Adalats" and parallel governance that actually responds to community grievances. Studies show highest LWE intensity in areas with lowest PESA compliance — the correlation is statistically significant and causally plausible.
CONCLUSION
Implementing the Fifth Schedule and PESA genuinely is the most powerful anti-LWE strategy available. Genuine tribal self-governance removes the very conditions that make Maoist recruitment possible. The 2026 elimination target cannot be sustained without addressing this root cause — or the next grievance cycle will regenerate the insurgency in cleared areas within a decade.
🌐
Unit 2 — Role of External State & Non-State Actors
Terrorism · Pakistan · China · OGWs · Narco-Terror · Radicalisation · 8 Questions
📋 Answer Framework — 10 Marks · 150 Words
INTRO
Terrorism uses violence to instill fear for political objectives. India faces its most complex multi-front variant: Pakistan-sponsored cross-border terrorism, online radicalisation (lone wolves), and a new civilian-targeting strategy designed to trigger communal polarisation — as demonstrated by the Pahalgam massacre (April 22, 2025, TRF/LeT — 26 tourists killed by religion).
MANIFESTATION IN INDIA
Pakistan-sponsored: 26/11 Mumbai (2008, LeT — 166 killed); Pulwama (2019, JeM — 40 CRPF killed); Pahalgam 2025 (TRF — civilian communal targeting). Lone wolf/online radicalisation: Coimbatore car explosion (Oct 2022); Bengaluru Rameshwaram Café IED blast (March 2024) — fully online-radicalised, no direct handler. NE insurgency-terror nexus: Myanmar arms + extortion + narco-terror. Khalistan: Canada-based diaspora; Punjab radicalisation.
COUNTER MEASURES
Military/Kinetic: Surgical Strikes (2016, Uri) → Balakot Airstrikes (2019) → Operation Sindoor (May 7, 2025) — 9 terror camps struck including Muridke (LeT HQ) and Bahawalpur (JeM HQ). New doctrine: decisive retaliation, no nuclear blackmail, Cold Start operationalised. Legal: UAPA 2019 (individual designation); NIA (global jurisdiction). Financial: PMLA; FATF leverage (Pakistan $38B cost 2018–22); India sought Pakistan FATF re-listing post-Pahalgam 2025. Intelligence: NATGRID; MAC; multi-agency coordination.
CONCLUSION
Op Sindoor marks India's doctrinal shift from strategic restraint to assertive deterrence. But military responses must integrate with intelligence, counter-radicalisation, financial disruption (FATF), and diplomatic isolation. The Pahalgam attack's communal-targeting strategy requires India to additionally strengthen social cohesion — adversaries now target India's pluralistic fabric itself as the primary vulnerability.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
Narco-terrorism — using drug trafficking proceeds to fund terrorism — represents a lethal convergence of two independently dangerous threats. India's location between the Golden Crescent (Afghanistan-Pakistan-Iran) and Golden Triangle (Myanmar-Thailand-Laos) makes it especially vulnerable. The same drones that smuggle arms into Punjab carry narcotics — the convergence is literal and documented.
EMERGENCE IN INDIA
Pakistan-ISI nexus: ISI facilitates Golden Crescent heroin into Punjab and J&K; drug money funds LeT and JeM operations. Punjab "Drones and Discontent" (2025) — farmers recruited as drone pilots for simultaneous arms + narcotics smuggling. NE dimension: Myanmar civil war weapons + Golden Triangle drugs flow through same corridors, funding ethnic insurgent groups. Organised crime nexus: D-Company drug networks funded 1993 Mumbai blasts. Social impact: Punjab drug epidemic creates radicalisation-vulnerable population.
COUNTER MEASURES
Legal: NDPS Act (amended); PMLA applied to drug proceeds; UAPA for narco-terror links. Institutional: NCB; BSF anti-smuggling; D4 counter-drone system on Indo-Pak border; NIA Operation Dhvast (2023 — terrorist-gangster-drug nexus busted). International: UNODC cooperation; SCO narcotics coordination; India-Myanmar-Thailand trilateral on Golden Triangle. Intelligence: NATGRID tracking drug-terror financial flows; MAC cross-agency coordination.
CONCLUSION
Narco-terrorism must be fought on three simultaneous fronts: supply reduction (border interdiction + source country engagement), demand reduction (de-addiction — especially Punjab), and follow the money (PMLA/FIU targeting drug proceeds to terror financing). No single approach is sufficient. The cross-border dimension requires simultaneous diplomatic + intelligence + enforcement action — no domestic-only solution exists.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
External state and non-state actors exploit India's internal vulnerabilities through four channels: direct violence (terror attacks), economic warfare (FICN, narco), information warfare (disinformation, radicalisation), and proxy actors (OGWs, sleeper cells). The challenge is multidimensional — military responses alone are inadequate.
STATE ACTORS
Pakistan (ISI-directed): LeT, JeM, TRF — "bleeding India with a thousand cuts." FICN economic warfare. Narco-terror (Golden Crescent). Pahalgam massacre (April 2025): TRF killed 26 tourists by religion — new civilian communal-targeting doctrine. India's response: Operation Sindoor (May 2025) — 9 terror camps struck, Muridke (LeT HQ) + Bahawalpur (JeM HQ). New doctrine: decisive retaliation + no nuclear blackmail. China: LAC salami slicing (Galwan 2020 — 20 soldiers killed); cyber operations (Maharashtra power grid 2020); NE insurgent support; cartographic aggression (May 2025 — claiming Arunachal Pradesh); CPEC through PoK; String of Pearls maritime encirclement.
NON-STATE ACTORS
LeT, JeM, TRF (ISI-directed). ISIS virtual recruitment — Bengaluru Café (2024 — fully online-radicalised lone wolf). ISIS Pune module (2023–25 — NIA arrested bomb-making workshop). Khalistani diaspora (Canada-based; referendum coordination). OGWs — logistical backbone of J&K militancy (UAPA 2019 individual designation targets them). Sleeper cells — ISI-linked cells detected in Bengaluru and Delhi (2025).
COUNTER MEASURES
Military: Op Sindoor doctrine. Legal: UAPA 2019 (individual designation); NIA global jurisdiction (2019); BNS 2023. Financial: PMLA; FATF (Pakistan $38B cost); NMFT Conference (New Delhi, Nov 2022). Intelligence: NATGRID; MAC; IFC-IOR. CVE: Counter-radicalisation; digital literacy; community policing. Diplomatic: QUAD; India sought Pakistan FATF re-listing post-Pahalgam 2025.
CONCLUSION
India has moved from strategic restraint to assertive deterrence. But lasting security requires simultaneously hitting the financial backbone (PMLA, FATF), ideological infrastructure (CVE), information ecosystem (counter-disinformation), and kinetic threat (Op Sindoor). Op Sindoor's most important outcome: changing Pakistan's cost-benefit calculation for terror sponsorship — demonstrating that state sponsorship of terrorism carries direct, tangible military costs.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
Over-Ground Workers (OGWs) are the invisible logistical backbone of terrorism — not armed combatants but the "eyes, ears, and lifeline." The 2019 Pulwama attack succeeded because a local OGW network provided the explosives-laden vehicle and safe shelter. Defeating insurgency requires neutralising both armed cadres and their OGW support networks.
ROLE OF OGWs
Logistics: Safe houses, food, medical aid, transport for active militants. Intelligence: Track security force movements; identify soft targets; provide reconnaissance. Financing: Channel hawala funds; collect extortion. Recruitment: Identify and radicalise vulnerable youth. Communication: Relay messages between Pakistan-based handlers and Indian operatives. Cover: OGWs are teachers, shopkeepers, local leaders — civilian status makes detection extremely difficult; UAPA designation legally complex without direct violence evidence.
NEUTRALISATION MEASURES
Legal: UAPA 2019 — individual designation as terrorist allows targeting OGWs who fund/support terror without being combatants. Intelligence: HUMINT from community policing; NIA TFFC Cell tracking OGW-terror funding; monitoring financial flows. Socio-economic: Addressing root causes (employment, legitimate opportunity) that make OGW recruitment possible. De-radicalisation: Rehabilitation for surrendering OGWs with credible protection from militant retaliation. Community: Village Defence Guards (VDG) as counter-OGW intelligence network.
CONCLUSION
OGWs are the most difficult counter-terrorism challenge: they are among the general population, look civilian, and are nearly impossible to identify without community intelligence. India's answer must be winning communities so they choose to report OGW networks rather than shelter them. UAPA 2019's individual designation is the key legal tool — but community trust is the operational reality that makes any legal tool work.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
CPEC ($62B+) connects China's Xinjiang to Pakistan's Gwadar port on the Arabian Sea — passing through Pakistan-Occupied Kashmir (PoK), territory India claims as its own. For India, CPEC is simultaneously a sovereignty violation, strategic encirclement enabler, and amplifier of the China-Pakistan anti-India axis.
WHY INDIA DISTANCED
Sovereignty: CPEC traverses PoK — participating would implicitly accept Pakistani sovereignty over Indian-claimed territory. Non-negotiable principle. Strategic encirclement: Gwadar port = permanent Chinese military-logistical access to India's western maritime approaches. Part of "String of Pearls" (Gwadar + Hambantota + Kyaukpyu). Two-front threat amplification: CPEC deepens China-Pakistan nexus — coordinated LoC (west) + LAC (north) pressure becomes feasible. Debt trap dynamics: Pakistan's $23B+ CPEC debt gives China undue leverage over Pakistan's foreign policy — including anti-India positions. BRI governance deficit: No open tendering, multilateral oversight, or debt sustainability standards.
INDIA'S ALTERNATIVE
India's "Necklace of Diamonds" counter-strategy: Chabahar (Iran), Sittwe (Myanmar), Duqm (Oman), Agalega (Mauritius). INSTC (International North-South Transport Corridor). QUAD for multilateral Indo-Pacific balance. Post-Op Sindoor (2025): India demonstrated willingness to impose direct costs on Pakistan — sending a signal about the limits of the China-Pakistan nexus as a security guarantor.
CONCLUSION
India's CPEC opposition is principled on sovereignty AND strategic grounds — both non-negotiable. India will not participate in infrastructure traversing its claimed territory regardless of economic benefits. The challenge is building alternative connectivity (Chabahar, INSTC) that provides regional integration benefits without the sovereignty concession, backed by a QUAD-based security architecture to balance China's growing IOR presence.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
Terrorism's asymmetric calculus: 9/11 cost $500K to execute but caused $73B in direct damages. Cutting the financial lifeline is as important as military operations. India faces a sophisticated, multi-channel terror funding ecosystem requiring multi-dimensional counter-measures.
SOURCES OF TERROR FUNDING
ISI-Hawala: Most significant — ISI channels funds through hawala brokers. 26/11 funded via hawala from Pakistan. FIU-IND froze ₹1,200 crore in hawala (2022–23). FICN: ISI-backed fake Indian currency — finances J&K militancy; smuggled via Nepal, Bangladesh. Narco-trafficking: Golden Crescent heroin funds LeT/JeM; Punjab drone-based simultaneous arms + narcotics (2024–25). Extortion: NE insurgents extort contractors; Naxal "levy" from mining; Khalistan extortion from Punjabi diaspora (Canada/UK charities). Cryptocurrency: ISIS, Al-Qaeda using Bitcoin for anonymous transfers — FATF flags this; India's March 2023 PMLA extension to VDAs directly addresses it.
SOLUTIONS
Military: Op Sindoor doctrine (2025) — decisive retaliation + imposing tangible costs on state sponsors. Legal: UAPA (individual designation); NIA global jurisdiction; PMLA extension to crypto (2023). Financial: FIU-IND (Egmont Group); FATF (Pakistan grey-listing — $38B cost 2018-22); No Money for Terror Conference (New Delhi, Nov 2022). Diplomatic: CCIT advocacy at UN; QUAD; bilateral intelligence sharing. CVE: Counter-radicalisation; social media monitoring (90% radicalisation online); community policing.
CONCLUSION
Terrorism cannot be bombed away — its financial, ideological, and political roots must be simultaneously attacked. India's post-Op Sindoor doctrine correctly combines kinetic deterrence with financial counter-measures (FATF), diplomatic isolation (CCIT advocacy), and counter-radicalisation in a whole-of-government approach. Key lesson: Pakistan's FATF grey-listing ($38B cost) proved financial pressure can compel states to act against terror groups even when military pressure cannot.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
India's diversity — 6 major religions, 2,000+ languages, 4,000+ communities — is its greatest strength and most targeted vulnerability. Pakistan's state-sponsored Islamism, Afghanistan's Taliban, and Bangladesh's Islamist extremism create a radicalisation pressure that adversaries actively amplify, aiming to exploit communal fault lines from within.
MANIFESTATIONS
Online radicalisation: ISIS Dabiq + Telegram + YouTube — Indian youth recruited without physical handler contact (Coimbatore 2022, Bengaluru Café 2024). 90% of radicalisation cases involve social media. Pakistan-ISI: Social media targeting J&K youth; madrasa curricula with extremist content. Khalistan: Canada-based diaspora radicalising Sikh youth in Punjab. Communal violence: Weaponised misinformation triggering inter-community violence (Muzaffarnagar 2013; Delhi riots 2020).
COUNTER STRATEGIES
CVE: De-radicalisation programmes; Kerala CyberDome monitoring extremist content. Digital: Social media monitoring; PIB Fact Check; IT Rules 2021 (platform accountability). Community: Engagement with moderate religious leadership as most credible counter to extremist narratives; inter-faith dialogue. Economic: Targeted employment in vulnerable communities. Intelligence: IB monitoring; MAC; community policing — early identification before violence.
CONCLUSION
India's best counter-radicalisation is its democratic fabric itself — the lived experience of interfaith coexistence. Strengthening this through education, economic inclusion, inter-community dialogue, and media literacy is more powerful than any surveillance programme. The adversary's strategy is to make India feel like a hostile, communally polarised state — India's response must demonstrate that pluralism is lived reality, not just constitutional text.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
Article 1 of the Chicago Convention (1944) establishes complete and exclusive national sovereignty over airspace — defined as the atmosphere above national territory and territorial waters (12 NM) up to the Kármán Line (~100 km). Above this: outer space — governed by Outer Space Treaty 1967 (no sovereignty; peaceful use; no WMDs in orbit).
CHALLENGES TO INDIA
Sub-orbital threats: Hypersonic missiles travel at the airspace-space boundary — current air defence systems struggle to intercept at these altitudes and speeds. Satellite surveillance: Foreign satellites legally overfly Indian territory from outer space — limits military camouflage; China's surveillance satellites photograph Indian border areas routinely. Drone threats: UAVs operate within sovereign airspace — Pakistan uses drones to smuggle arms and narcotics into Punjab and J&K. Op Sindoor (2025): 300-400 Pakistani drones attacked India from 36 locations — India's Integrated Counter-UAS Grid neutralised the offensive, validating India's multi-layered air defence architecture.
CONTAINMENT MEASURES
India's D4 counter-drone system (DRDO + BEL); S-400 + Barak-8 MRSAM + Akash SAM — integrated counter-UAS grid (battle-tested, Op Sindoor 2025). Mission Shakti (2019) — ASAT capability demonstrated (satellite shot down at 300 km). Need: multilateral treaties preventing space weaponisation; precise legal airspace ceiling definition; ICAO oversight expansion to UAV threats; QUAD coordination on space security.
CONCLUSION
Op Sindoor validated the "fifth domain of warfare" concept — India faced simultaneous missile, drone, AND cyber warfare. The airspace-space challenge has evolved from conventional aircraft intrusions to drone swarms and hypersonic threats. India's integrated counter-UAS grid is now battle-tested (2025). The next frontier: hypersonic defence and space weaponisation treaties before the orbital commons become a battlefield.
💻
Unit 3 — Cyber Security, Media & Money Laundering
Cyber Warfare · Social Media · DPDPA · ML Prevention · 16 Questions
📋 Answer Framework — 15 Marks · 250 Words
INTRO
WEF Global Risk Report 2025 ranks misinformation the highest short-term global threat. India — 800M+ social media users — faces: radicalisation (90% cases involve social media), fake news triggering communal violence (2018 WhatsApp lynchings), and foreign disinformation (Op Sindoor 2025 — Pakistan coordinated 5 false narratives, causing WhatsApp panic and ATM queues in Indian towns).
MEASURES ADOPTED
Legal: IT Act 2000 (S.69A content blocking); IT (Intermediary) Rules 2021 — significant social media intermediaries must: appoint grievance officers, identify first originator of harmful content (traceability), remove content within 36 hours. DPDPA 2023 — data protection framework. Institutional: PIB Fact Check (official debunking unit); I4C (MHA) + helpline 1930; SOCMINT; NATGRID. Platform-level: WhatsApp message forwarding limit (5 contacts — post-2018; reduced viral spread); India asked X/Twitter to block 8,000+ Pakistan-linked disinformation accounts during Op Sindoor (2025). International: QUAD Cyber Group; UN Cybercrime Convention (2024).
ADDITIONAL REMEDIES
Statutory powers for PCI/NBDSA (currently self-regulatory); algorithmic transparency mandates — platforms must disclose content amplification mechanisms; deepfake legislation (urgently needed — India among most affected nations, lacks dedicated law); National Information Warfare Doctrine; Strategic Communications Unit at NSA level; digital literacy at scale (only 1 in 10 rural Indians can identify fake news per DEF 2025 study); mandatory pre-election social media audits.
ENCRYPTION DILEMMA
IT Rules 2021 traceability clause — contested by WhatsApp in Delhi HC (argues it breaks end-to-end encryption, harming privacy of all users to catch a few bad actors). This is the sharpest policy tension: privacy vs security. The answer is not censorship but precision governance — platform accountability for harmful content without building mass surveillance infrastructure. India must resolve this through clear parliamentary legislation, not ad hoc judicial interpretation.
CONCLUSION
Op Sindoor disinformation war (2025) proved India needs both rapid-response fact-checking capabilities AND a legal framework compelling platforms to act in real-time during national security situations. Social media governance requires walking the constitutional tightrope: protect free expression (Article 19) while preventing harms (Article 19(2)). Censorship is the easy wrong answer; platform accountability with judicial oversight is the hard right answer.
📋 Answer Framework — 10 Marks · 150 Words
CONTEXT
DPDPA 2023 is India's first comprehensive data protection legislation — enacted after Justice Puttaswamy judgment (2017, privacy as Art. 21 fundamental right). Triggered by: 820M+ internet users, major data breaches (AIIMS 2022 — 40M patient records; BSNL 2024), and FATF/international pressure for governance standards.
SALIENT FEATURES
Data Principals (individuals): Rights to access, correction, erasure, and nominating a representative. Data Fiduciaries (organisations): Obligations of purpose limitation, data minimisation, explicit consent, breach notification to Data Protection Board. Significant Data Fiduciaries: High-risk entities — enhanced obligations + mandatory Data Protection Impact Assessment. Children's data: Parental consent mandatory; no targeted advertising to minors. Cross-border transfers: Allowed to "trusted countries" notified by GoI — India retains data sovereignty. Data Protection Board: Adjudicates grievances; penalties up to ₹250 crore per violation.
SECURITY SIGNIFICANCE
Beyond privacy: DPDPA prevents "data colonisation" — foreign corporations cannot indefinitely harvest Indian user data for foreign intelligence services. Data minimisation reduces attack surface for cyberattacks (AIIMS breach — 40M patient records). Cross-border restrictions give India sovereignty over strategic data. India's most important digital governance legislation since IT Act 2000.
KEY GAP
Critical issue: broad government exemptions for national security surveillance. Citizens have privacy rights against corporations but not fully against the state — Srikrishna Committee (2018) specifically recommended a truly independent Data Protection Authority; DPDPA 2023 created a government-appointed Data Protection Board instead. An incomplete but crucial first step.
CONCLUSION
DPDPA 2023 is a landmark but imperfect law. Without robust oversight of government data processing, privacy protection is asymmetric — strong against corporations, weak against the state. Full implementation, including closing the government surveillance exemption gap through parliamentary legislation, is India's next critical data governance step.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
Low-cost commercial drones have transformed cross-border threat delivery — small size + low altitude = nearly invisible to conventional radar. Pakistan's ISI uses UAVs to smuggle arms, narcotics, FICN, and IED components into Punjab and J&K. Op Sindoor (May 2025) brought this to its most dramatic manifestation: 300-400 Pakistani drones from 36 locations — the first major unmanned aerial conflict between nuclear-armed states.
MEASURES TAKEN
Technology: D4 System (DRDO + BEL) — detects, tracks, neutralises micro/small UAVs using radar + jammer + kinetic kill. KAVACH laser walls (198 km Indo-Pak border, Jammu). VSHORAD systems (SAMAR-1, Igla-S). S-400 + Barak-8 MRSAM + Akash SAM — integrated counter-UAS grid battle-tested during Op Sindoor (neutralised 300-400 drone offensive May 8-9, 2025). Legal/Policy: National Counter-Rogue Drone Guidelines 2019; Anti-Rogue Drone Technology Committee (ARDTC, MHA); Drone Rules 2021 — mandatory UIN registration. Intelligence: IR sensors and cameras mapping border vulnerabilities.
OP SINDOOR LESSONS (2025)
India's Integrated Counter-UAS Grid successfully neutralised Pakistan's drone offensive — a real-world combat validation. Key lesson: the cost asymmetry problem. Pakistani drones cost hundreds of dollars; India's SAMs cost millions. India must invest in cheaper counter-drone solutions (laser directed energy weapons, signal jamming) alongside kinetic interceptors. Domestic Drone PLI scheme is both a security and economic imperative.
CONCLUSION
Drone warfare is now integral to modern conflict — a present reality, battle-tested in 2025. India's counter-UAS architecture is operational and proven. Priority: scale down the cost per intercept, develop offensive drone capabilities, and build stockpiles for sustained campaigns. The next conflict will use more drones, not fewer — India must be prepared for a 5,000-drone offensive, not just 300.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
"Cyberspace is the fifth domain of warfare." India faces 369 million malware attacks (2024), 1.5 million attacks during Op Sindoor (May 2025), and projected ₹1.2 lakh crore cybercrime losses (2025). ITU ranked India Tier 1 globally (2024). Yet only 24% of Indian organisations are adequately prepared (CISCO 2023).
ELEMENTS OF CYBER SECURITY
CIA Triad: Confidentiality (encryption, MFA, access control) + Integrity (digital signatures, hashing) + Availability (DDoS protection, backup, redundancy). Technical elements: Firewalls, IDS/IPS, Zero Trust Architecture, patch management, endpoint protection. Legal elements: IT Act 2000, DPDPA 2023, Telecom Cyber Security Rules 2024, NCSP 2013. Institutional elements: CERT-In, NCIIPC (CII), I4C + Chakshu AI, NCCC, Defence Cyber Agency. Human elements: Cyber hygiene training, CISO capacity building, Cyber Surakshit Bharat.
NCSP — ASSESSMENT
Achievements: ITU Tier 1 (2024); NCRF 2024 finalised; Bharat NCX 2024 (2,000 simulated scenarios, 150 agencies trained); Trusted Telecom Portal (excluding Huawei/ZTE); CERT-In handled 29.44 lakh incidents (2025); I4C + Chakshu AI real-time fraud blacklisting. Gaps: NCSP 2013 dangerously outdated — doesn't address AI malware, deepfakes, 5G, quantum computing, OT security, supply chain attacks. NCSP 2.0 still pending in 2026. 500K professional target unmet. No Dedicated Cyber Command. Conviction rate under cyber laws: ~0.5%. Only 24% organisations prepared.
CONCLUSION
India has built the right institutions but lacks strategic integration and a modern strategy document. Critical imperatives: NCSP 2.0 for 2025-era threats (AI, quantum, deepfakes); Dedicated Cyber Command integrating all agencies; Post-Quantum Cryptography migration roadmap before quantum computing breaks current encryption; closing the skills gap. ITU Tier 1 shows India's frameworks are internationally recognised — implementation and integration are the remaining bottlenecks.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
Cross-border cyber attacks are India's most consistently underestimated security challenge — invisible, deniable, and capable of kinetic consequences. Maharashtra power grid attack (2020, attributed to China's Red Echo group) caused Mumbai's power outage during the Galwan standoff — demonstrating that cyber attacks complement military pressure with total deniability. Op Sindoor (2025) brought this to full-scale integration.
IMPACT
CII disruption: Maharashtra power grid (2020 — Mumbai outage during Galwan); AIIMS ransomware (2022 — 40M patient records, ₹200 crore demanded); BSNL data breach (2024); Hathway breach (41M Aadhaar details). Espionage: APT36 (Pakistan's Transparent Tribe) using Crimson RAT to harvest defence/government data. Op Sindoor cyber warfare (2025): 1.5M attacks; DDoS on 15+ government sites (President's website offline 19 hours); Power Grid 200K+ attack attempts; APT36 targeting defence systems; GPS spoofing near border areas; 5 coordinated false narratives (disinformation as cyber warfare). Economic: ₹1.2 lakh crore projected cybercrime losses (2025).
DEFENSIVE MEASURES
CERT-In (29.44L incidents 2025); NCIIPC (CII protection); NATGRID; Defence Cyber Agency (est. 2019); Bharat NCX 2024; Zero Trust Architecture for government networks; Trusted Telecom Portal (excluding Chinese equipment); Cyber Swachhta Kendra; QUAD Cyber Working Group. Post-Op Sindoor: India's "Road of Sindoor" digital counter-offensive and rapid information warfare response proved effective.
CONCLUSION
India needs a Dedicated Cyber Command, National Cyber Warfare Doctrine, and pre-positioned Information Warfare Rapid Response capability. Op Sindoor proved kinetic and cyber warfare are now fully integrated. India's kinetic capabilities are world-class; its cyber warfare capabilities must reach the same level urgently. Immediate priority: PQC migration and Dedicated Cyber Command — before the next crisis tests both simultaneously.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
Technology is the new hawala — anonymous, borderless, faster than any regulatory response. $14 billion in illicit cryptocurrency transactions globally (2021). UNODC: India's criminal proceeds = 4.6% of GDP. Globalisation creates multi-jurisdictional complexity that evades single-country regulatory responses.
HOW TECHNOLOGY ENABLES ML
Cryptocurrencies: Bitcoin mixers/tumblers destroy transaction trails; pseudo-anonymous, decentralised. WazirX (India 2021) — ED froze ₹64 crore in crypto linked to loan app fraud. Cybercrime proceeds: Ransomware + phishing proceeds laundered via multi-jurisdiction crypto hops. P-Notes/securities: Offshore participatory notes enable "round-tripping" — Indian black money sent abroad, returned as FDI. AI-powered laundering: Automated micro-transactions (smurfing at algorithmic scale) to evade detection thresholds. Globalisation: Tax havens + financial secrecy jurisdictions prevent beneficial owner identification; India has 85+ DTAAs but Cayman/BVI secrecy remains impenetrable.
MEASURES
National: PMLA 2002 (VDAs under PMLA March 2023; NGOs + PEPs enhanced monitoring 2023); ED; FIU-IND; Benami Act; JAM Trinity (15% cash ML reduction — RBI 2024; ₹1.78L crore saved). International: FATF (40 Recommendations; Pakistan grey-listing $38B impact; India FATF 2024 — high technical compliance); Vienna Convention (1988); Palermo Convention (2000); Egmont Group (165 FIUs); DTAA (85+ countries); NMFT Conference (New Delhi, Nov 2022).
CONCLUSION
India's March 2023 PMLA extension to VDAs is the most important recent AML measure. But FATF's 2024 evaluation flagged the critical gap: only 15 convictions in 5,892 PMLA cases (2015–25) = 0.5% conviction rate. Technical compliance without prosecution outcomes undermines deterrence. Fast-tracking ML Special Courts is the single most impactful next step — the framework exists; the judicial prosecution pipeline does not.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
India recorded 370 million malware detections (2024) — 702 threats per minute. Cybercrime losses: ₹11,333 crore in 9 months of 2024. The variety of cybercrime is as vast as its impact — from financial fraud targeting individuals to state-sponsored attacks targeting critical infrastructure.
TYPES OF CYBERCRIME
Financial fraud: Phishing; UPI fraud; "Digital arrest" scams (₹120 crore in 3 months of 2024 — CBI/ED impersonation via fake video calls); ransomware (AIIMS 2022 — ₹200 crore demanded). Data theft: BSNL breach (2024); Hathway (41M Aadhaar). Cyber warfare: State-sponsored DDoS (Op Sindoor 2025 — 1.5M attacks); power grid (Maharashtra 2020). Social crimes: Cyber-bullying; sextortion; CSAM (POCSO + IT Act). Crypto crimes: Dark web drug/arms market payments; ransomware in Monero/Bitcoin.
MEASURES
Legal: IT Act 2000 (S.66); DPDPA 2023; BNS 2023. Institutional: I4C (MHA) + helpline 1930; Chakshu AI (2024 — blacklists repeat fraud callers across all telecoms in real-time); CERT-In; Cyber Swachhta Kendra. Public awareness: MHA Cyber Dost; digital literacy in schools; mandatory cyber hygiene training for government employees.
CONCLUSION
India's I4C + Chakshu AI combination is innovative — crowdsourcing fraud data into an AI engine that blacklists offenders across all telecoms instantly. But prosecution remains weak (0.5% conviction under cyber laws). Scale up Special Courts; mandatory cyber insurance for CII; Post-Quantum Cryptography migration before quantum computing breaks current encryption — the most important medium-term cybersecurity priority.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
CyberDome is Kerala Police's innovative Public-Private Partnership (PPP) cybersecurity initiative — established 2015 in Thiruvananthapuram. It is India's most successful model for community-based cybersecurity governance: linking police authority + ethical hacker expertise + academic research in a tri-sector model that became globally cited.
WHAT IT DOES
Structure: Police (legal authority) + Ethical hackers/cybersecurity professionals (technical expertise, volunteer basis) + Academia (research + capacity building). Functions: Real-time cyber threat monitoring; cybercrime investigation support; dark web monitoring (tracking criminal activities involving Keralites — drugs, child exploitation, fraud); social media SOCMINT for intelligence; training police in cyber investigation; government system vulnerability assessment; Hexnode MDM tool (developed in-house). First police department globally with such comprehensive PPP cybersecurity model.
NATIONAL RELEVANCE
PPP model solves the police technology gap: ethical hackers have cutting-edge expertise that police cannot recruit independently. CyberDome inspired: Telangana's CyberHub, Tamil Nadu's Cyber Crime Wing. National integration of state CyberDomes through I4C (MHA helpline 1930) would create India's most powerful distributed cyber threat intelligence network. I4C essentially scales the CyberDome model nationally — PPP becomes a governance paradigm, not just a Kerala experiment.
CONCLUSION
CyberDome represents a paradigm shift: from police as lone cyber warriors to police as coordinators of a citizen-expert ecosystem. Every state should adapt this model to its specific threat profile. The government has legal authority; the private sector has talent India needs. CyberDome proves they can work together effectively — making it a model for collaborative governance across cybersecurity and beyond.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
The Srikrishna Committee Report (2018) "A Free and Fair Digital Economy: Protecting Privacy, Empowering Indians" was India's first comprehensive personal data protection framework — laying the intellectual foundation for DPDPA 2023. Understanding its strengths and weaknesses explains why India's final law made the choices it did.
STRENGTHS
Constitutional grounding: Built on Puttaswamy judgment (2017, privacy as Art. 21 right) — gave constitutional legitimacy to data protection as a fundamental governance obligation. Comprehensive framework: Consent, data minimisation, purpose limitation, data localisation, fiduciary obligations — anticipated EU GDPR-level standards 5 years before the EU-India digital partnership. Independent DPA: Recommended truly independent Data Protection Authority insulated from government control — modelled on Election Commission's independence. Sensitive data: Health, financial, caste, religion, sexuality — higher protection standards with explicit consent. Data localisation: Critical personal data stored in India — addressed data sovereignty proactively.
WEAKNESSES
Government exemptions: Broad exemptions for state surveillance — committee acknowledged but did not adequately constrain executive overreach. Became the most contested aspect. Implementation lag: 2018 report → DPDPA 2023 = 5-year delay; AIIMS breach (2022) and BSNL breach (2024) occurred without comprehensive legal protection. Independent oversight weakened: Committee's truly independent DPA recommendation not implemented — DPDPA 2023 created government-appointed Data Protection Board instead. Social media regulation: Some recommendations superseded by IT Rules 2021 — creating legal inconsistency.
CONCLUSION
Srikrishna Committee was the intellectual foundation of India's data governance architecture. DPDPA 2023 implemented many recommendations but weakened the most important one — independent oversight of government's own data processing. India has strong privacy rights against corporations; it needs equivalent protection against state surveillance. This gap between recommendation and implementation remains the critical unresolved issue in India's data governance framework.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
Cyber attacks threaten the CIA Triad — Confidentiality (data theft), Integrity (data manipulation), Availability (service disruption). India: 369M malware detections (2024); 1.5M attacks during Op Sindoor (2025); AIIMS ransomware (2022); Maharashtra power grid DDoS (2020). The threat is existential — not theoretical.
THREATS
DDoS (Op Sindoor: President's website offline 19 hours); Ransomware (AIIMS — ₹200 crore demanded); Phishing (Income Tax impersonation 2025); Zero-day exploits (Pegasus — Indian journalists, politicians targeted); Supply chain attacks (NIC, MeitY, BHEL affected); AI-powered adaptive malware (evades signature detection); Deepfakes (Op Sindoor disinformation — 5 coordinated Pakistan false narratives); CII attacks (power grids, banking, defence).
SECURITY FRAMEWORK
Legal: IT Act 2000; DPDPA 2023; NCSP 2013 (outdated — NCSP 2.0 urgently needed); Telecom Cyber Security Rules 2024. Institutional: CERT-In (29.44L incidents 2025); NCIIPC (CII); I4C + Chakshu AI; NCCC; Defence Cyber Agency (est. 2019). Initiatives: Bharat NCX 2024; Cyber Swachhta Kendra; Trusted Telecom Portal (excluding Huawei/ZTE); ITU Tier 1 (2024).
CONCLUSION
Framework is structurally sound; implementation is fragmented. Priority: Dedicated Cyber Command integrating all agencies; NCSP 2.0 addressing AI/quantum-era threats; Zero Trust Architecture across government networks. ITU Tier 1 status shows India's frameworks are internationally recognised — execution and integration are the remaining gaps.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
Non-state actors have weaponised the internet's three defining features: borderlessness, anonymity, and viral reach. Social media features in 90% of radicalisation cases globally. India — 800M+ internet users — is simultaneously one of the world's largest digital democracies and one of its most targeted populations by adversarial information warfare.
RECENT MISUSE
Terrorism/Radicalisation: ISIS Dabiq + Telegram + YouTube — Coimbatore 2022 and Bengaluru Café 2024 lone wolves radicalised entirely online; no direct handler contact required. Communal violence: Muzaffarnagar 2013 (doctored videos); 2018 WhatsApp lynching epidemic (5+ deaths). State-sponsored disinformation: Op Sindoor 2025 — Pakistan coordinated 5 false narratives; WhatsApp panic causing ATM queues in Indian towns; India blocked 8,000+ Pakistan-linked accounts on X. Khalistan: Canada-based YouTube/Telegram for pro-Khalistan referendum organisation and violence coordination. Organised crime: Dark web coordination for narcotics and arms.
EFFECTIVE GUIDELINES
IT Rules 2021 (traceability, 36-hour takedown, grievance officers); deepfake legislation (urgently needed); National Information Warfare Doctrine + Strategic Communications Unit at NSA level; WhatsApp forward limits (5 contacts — implemented post-2018); platform accountability with financial penalties for verified disinformation; SOCMINT for early warning; digital literacy in school curriculum (mandatory); inter-agency rapid response team for disinformation during national security events (Op Sindoor model institutionalised).
CONCLUSION
Regulation must be surgical — targeting harmful content without creating state surveillance tools. The Op Sindoor experience (2025) showed India can effectively coordinate rapid platform action during national security crises. This capability must be institutionalised: a standing National Information Warfare Council with powers to direct platform action during declared security situations, with parliamentary oversight, would provide India the framework it needs for the information warfare era.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
ISIS (Islamic State/ISIL/Daesh) proclaimed a "caliphate" in 2014 across Iraq-Syria. Though militarily defeated (2019), it operates as a global virtual jihadist franchise — inspiring attacks through online content, Telegram channels, and dark web networks. India has been specifically declared "Hind province" of the ISIS caliphate — not just rhetoric but a recruitment and targeting priority.
ISIS MISSION AND INDIA THREAT
Mission: Establish pan-Islamic caliphate; governance by extremist Sharia; elimination of "apostates" and "mushrikeen" (polytheists — targeting India's Hindu majority). India-specific: 100+ Indians joined ISIS (2014-19, mainly Kerala, Maharashtra, Karnataka); ISIS Pune module (2023-25 — NIA arrested bomb-making workshop participants); ISIS social media content in Tamil and Malayalam; ISIS strategy: provoke Hindu-Muslim communal violence in India to create instability and recruitment pool. Online radicalisation: Coimbatore car explosion (Oct 2022); Bengaluru Rameshwaram Café IED (March 2024) — lone wolves radicalised entirely online, no formal ISIS membership needed.
INDIA'S RESPONSE
NIA investigation of ISIS modules (Pune 2025); UAPA 2019 individual designation (enables targeting ISIS supporters without formal membership); counter-radicalisation through credible Muslim scholars (most effective counter to ISIS narrative); social media monitoring (I4C + Kerala CyberDome); de-radicalisation in affected states. Key insight: moderate Islamic leadership is ISIS's most credible counter — government should amplify their voices systematically.
CONCLUSION
ISIS's strength is ideological, not just military. India's counter cannot be only surveillance — it must be a credible alternative narrative. The Bengaluru Café attack (2024) showed the lone wolf threat is growing: meaning counter-radicalisation (preventing radicalisation) must be prioritised over de-radicalisation (reversing it), because at the lone wolf stage without handler contact, traditional interdiction mechanisms may not intervene in time.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
NCSP 2013 was India's first dedicated cybersecurity framework — pioneering but now critically outdated after a decade. It could not have anticipated AI-powered malware, deepfakes, 5G supply chain attacks, quantum computing threats, or state-integrated cyber warfare of the kind seen during Op Sindoor 2025.
NCSP 2013 — WHAT IT PROVIDED
Secure cyberspace for citizens, businesses, government. CII protection with NCIIPC as nodal. CERT-In as national incident response. Target: 500,000 cybersecurity professionals. PPP model for cyber resilience. 24/7 national cyber incident response. International cooperation. Indigenous R&D promotion. Creation of National Cyber Coordination Centre (NCCC).
IMPLEMENTATION CHALLENGES
Skills gap: 500K professional target substantially unmet — most cybersecurity graduates work for private sector/MNCs, not government agencies. Obsolescence: Doesn't address AI malware, deepfakes, 5G security, quantum computing, IoT threats, OT security, supply chain attacks — defining threats of 2025. Coordination failure: CERT-In + NCIIPC + NCCC + state cyber cells + Defence Cyber Agency = fragmented architecture with no unified command. Encryption dilemma unresolved: Security vs privacy tension unaddressed. No NCSP 2.0: 10+ years without revision — longest any major nation has gone without updating national cybersecurity strategy.
CONCLUSION
India needs the "Digital Armed Forces" — the Defence Cyber Agency (established 2019) is the institutional start; Op Sindoor (2025) battle-tested the architecture. But NCSP 2.0 is urgently required: addressing AI, quantum, deepfakes, 5G. A Dedicated Cyber Command integrating all agencies would resolve fragmentation. The encryption dilemma must be resolved through parliamentary legislation — not endless court battles. ITU Tier 1 (2024) shows India's frameworks are recognised; modernisation and integration are the remaining gaps.
📋 Answer Framework — 10 Marks · 200 Words
INTRO
"Money laundering is the financial reflex to crime." — FATF. IMF: 2-5% of global GDP laundered annually. UNODC: India's criminal proceeds = 4.6% of GDP. ML is not merely economic crime — it funds terrorism (26/11 via hawala), corrupts politics (1991 Hawala Scandal — politicians to Hizbul Mujahideen), and undermines India's financial sovereignty.
SIGNIFICANCE FOR INDIA
Economic: Distorts markets; deters FDI; deprives state tax revenue; enables criminal enterprises through legitimate business fronts. Security: Funds LeT, JeM (ISI-hawala-terror nexus); fuels NE insurgency (extortion + narco laundering); FICN financing J&K militancy. Political: Criminalises politics through illegal electoral funding; criminal-politician nexus. Three-stage model: Placement (hawala, smurfing) → Layering (shell companies, offshore) → Integration (luxury assets, real estate).
STEPS TO CONTROL
Legal: PMLA 2002 (amended — VDAs 2023, PEPs/NGOs 2023, stand-alone crime, beneficial ownership 10%); Benami Act; Black Money Act 2015 (30% tax + 90% penalty + 7 years); FEMA. Institutional: ED; FIU-IND (Egmont Group); JAM Trinity (15% cash laundering reduction — RBI 2024; ₹1.78L crore saved). International: FATF (India high compliance 2024); DTAA (85+ countries); NMFT Conference (New Delhi, Nov 2022); Egmont Group (165 FIUs globally).
CONCLUSION
FATF's 2024 evaluation reveals the paradox: high technical compliance but only 15 convictions in 5,892 PMLA cases = 0.5% conviction rate. Legal framework is world-class; prosecution pipeline is broken. Fast-tracking ML Special Courts is the single most impactful next step — the institutional architecture exists; judicial capacity to deliver convictions at scale does not.
📋 Answer Framework — 10 Marks · 200 Words
INTRO
Social networking sites (SNS) are digital platforms facilitating user-generated content, community building, and information sharing. Facebook/Meta (3.5B users), X/Twitter, Instagram, YouTube, Telegram, WhatsApp — each with distinct architecture and security implications. India's 800M+ social media users make its SNS vulnerabilities national security concerns.
SECURITY IMPLICATIONS
Radicalisation: ISIS, Khalistan groups use SNS for ideology + recruitment. 90% of radicalisation cases globally involve social media. Communal violence: Muzaffarnagar 2013 (doctored videos); 2018 lynching epidemic (WhatsApp rumours). Intelligence gathering: Foreign agencies harvest open-source intelligence; profile potential agents; track military movements from careless posts. Espionage: Honey traps through fake social media profiles; social engineering targeting defence personnel. Data colonisation: Foreign corporations hold Indian user data — strategic intelligence vulnerability (Zhenhua Data leak — 10,000 Indian public figures profiled by Chinese firm). Foreign interference: Op Sindoor disinformation campaign (Pakistan 5 false narratives; 8,000+ accounts blocked).
REGULATORY RESPONSE
IT Rules 2021 (traceability, 36-hour takedown); IT Act S.69A (content blocking); PIB Fact Check; SOCMINT; I4C + Chakshu AI. Key constitutional tension: SNS enable both democratic expression (Article 19) and security threats — precision governance with judicial oversight, not broad censorship, is the constitutionally appropriate answer.
CONCLUSION
SNS governance is a constitutional balancing act. India has progressively expanded its framework (IT Act → IT Rules 2021 → DPDPA 2023) but each step has been contested in courts. The Op Sindoor disinformation offensive (2025) proved India can organise rapid-response platform action during national security events — the next step is institutionalising this capability through standing legislation, not crisis-by-crisis improvisation.
📋 Answer Framework — 10 Marks · 200 Words
INTRO
Cyber warfare is state-sponsored digital aggression targeting an adversary's information systems and critical infrastructure — operating below the armed conflict threshold with plausible deniability. Stuxnet (2010) physically destroyed 1,000 Iranian nuclear centrifuges through software alone — demonstrating cyber warfare's kinetic potential. Op Sindoor (May 2025) brought this to India directly: 1.5M attacks integrated with Pakistan's missile and drone offensive.
INDIA'S VULNERABILITIES
CII: Maharashtra power grid (2020 — Mumbai outage during Galwan, attributed to China's Red Echo APT); AIIMS ransomware (2022); BSNL breach (2024). Defence systems: APT36 (Pakistan's Transparent Tribe) — Crimson RAT harvesting intelligence from defence personnel via phishing. Op Sindoor (2025): 1.5M attacks; DDoS on 15+ government sites (President's website offline 19 hours); 200K+ power grid attack attempts; GPS spoofing near border areas; coordinated 5-narrative disinformation campaign. Emerging: AI-powered adaptive malware; quantum computing threatening current encryption; 5G supply chain attacks.
PREPAREDNESS
Achievements: ITU Tier 1 (2024); CERT-In (29.44L incidents 2025); NCRF 2024; Bharat NCX 2024; Defence Cyber Agency (est. 2019); Trusted Telecom Portal. Op Sindoor cyber defence validated India's architecture — both D4 counter-drone and cyber defence were tested simultaneously. Gaps: No Dedicated Cyber Command; NCSP 2013 outdated; 0.5% conviction under cyber laws; no PQC migration roadmap; no deepfake legislation.
CONCLUSION
Op Sindoor validated the "fifth domain of warfare" — India faced simultaneous missile, drone, AND cyber warfare and repelled all three. India's kinetic response was decisive; its cyber response was largely reactive but effective. The imperative: Dedicated Cyber Command, NCSP 2.0, and Post-Quantum Cryptography migration. India cannot afford world-class kinetic capabilities and second-tier cyber capabilities — the next conflict will test both simultaneously, as Sindoor demonstrated.
🗺️
Unit 4 — Security Challenges in Border Areas & Crime-Terror Nexus
Pakistan · China · Bangladesh · Myanmar · Coastal · NMFT · Organised Crime · 17 Questions
📋 Answer Framework — 15 Marks · 250 Words
INTRO
India's 7,517 km coastline and 95%-seaborne trade make maritime security existential. The Indian Ocean Region carries 40% of global trade and 65% of oil shipments. A maritime threat is directly an economic and security threat — as 26/11 (terrorists landed by sea) and Houthi Red Sea attacks (2024, disrupting 25% Europe-Asia trade) both demonstrate vividly.
MARITIME CHALLENGES
Terrorism: 26/11 — 10 terrorists landed unchallenged on Mumbai shore; Sir Creek facilitates infiltration. Piracy: Houthi attacks on Red Sea shipping (2024) disrupted India's trade routes; Arabian Sea Somali piracy extended range to 78°E (India's EEZ). Smuggling: Arms, narcotics, FICN via sea routes — same channels 26/11 terrorists used; India seized 3,000+ kg narcotics in Arabian Sea (2024-25). China's String of Pearls: Hambantota (Sri Lanka, 99-year lease), Gwadar (Pakistan), Kyaukpyu (Myanmar) — naval encirclement. Inter-agency silos: Navy-Coast Guard-Marine Police coordination gaps persist even in 2024 despite SOPs and joint exercises.
WAY FORWARD — ORGANISATIONAL
Three-tier system: Navy (beyond EEZ) + Coast Guard (territorial waters + EEZ) + Marine Police (shallow coastal) — resolve coordination silos through unified Maritime Domain Awareness (MDA) platform. Unified Maritime Command Authority. SAGAR policy (Security And Growth for All in the Region) — India as IOR net security provider. IFC-IOR (2018) — regional maritime information hub.
WAY FORWARD — TECHNICAL
Technical: NC3I (National Command Control Communication Intelligence — real-time sensor integration); Coastal Surveillance Network (CSN — 7,500 km coverage); IFC-IOR; Anti-Piracy Act 2022 — dedicated domestic legal framework. Strategic: QUAD maritime partnership; "Necklace of Diamonds" (Chabahar, Sittwe, Duqm, Agalega) countering China's String of Pearls; fishermen biometric ID cards and coastal community engagement — alienated fishing communities are the weakest link in coastal security.
CONCLUSION
Post-26/11 reforms created NC3I, Coastal Surveillance Network, and strengthened ICG — a comprehensive architecture. But integration remains the gap: three agencies still operate in silos. India's SAGAR vision requires a seamlessly integrated maritime security architecture. The Houthi Red Sea crisis (2024) showed India's maritime security threats are IOR-wide — requiring true blue-water maritime security capability that current architecture is still developing.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
"Border management is not just about fences and guns — it is creating a seamless interface between security and development." India's most complex frontiers — Pakistan (3,323 km) and China (3,488 km) — present the full security spectrum: cross-border terrorism to grey-zone warfare to cartographic aggression. Both frontiers are simultaneously contested and under intensive development.
PAKISTAN BORDER CHALLENGES
Cross-border terror infiltration (ISI → LeT, JeM, TRF); drone-based arms + narcotics smuggling (Punjab "Drones and Discontent" 2025 — farmers recruited as drone pilots); FICN; ceasefire violations. Pahalgam massacre (April 2025) → Operation Sindoor (May 2025) — India struck 9 terror camps including Muridke (LeT HQ) and Bahawalpur (JeM HQ). Territorial disputes: Siachen (India preempted 1984 — world's highest battlefield); Sir Creek (Thalweg vs Pakistan's total creek claim). BSF thwarted IB infiltration during Op Sindoor; Excalibur precision artillery deployed on LoC.
CHINA BORDER CHALLENGES
LAC (3,488 km) — un-demarcated, differing perceptions. Salami Slicing + Grey-Zone Warfare. Doklam (2017, 73-day standoff). Galwan (2020, 20 soldiers killed — worst clash in 45 years). CPEC through PoK — sovereignty violation. China Cartographic Aggression (May 2025) — new "standard maps" claiming Arunachal Pradesh. Infrastructure asymmetry: China's $245B defence budget vs India's BRO closing the gap (Atal Tunnel, DSDBO Road — completed under strategic urgency post-Galwan).
BADP AND BIM SCHEME
BADP (Border Area Development Programme): Centrally sponsored — health, education, connectivity, agriculture in remote border areas; reduces alienation; ₹2,500+ crore (2024-25). Converts border communities into security stakeholders. BIM (Border Infrastructure and Management) Scheme: Border outposts, strategic roads, bridges, Integrated Check Posts (ICPs), fencing + floodlighting, technology deployment (CIBMS smart fence, KAVACH laser). BRO's Atal Tunnel and DSDBO Road are flagship BIM outcomes. Vibrant Villages Programme (2022): 663 villages across 19 districts in 4 border states along China border — retains population, addresses "ghost village" vulnerability where Chinese infrastructure contrasts with abandoned Indian villages.
CONCLUSION
India's border management has evolved from passive defence to active deterrence (Op Sindoor) and proactive development (BADP, Vibrant Villages). The most durable security: when border communities see the state as their protector, not an absent landlord. Development must follow security operations immediately — adversaries fill governance vacuums. The 2024-25 data: 1,200+ border outposts upgraded under BIM; BADP roads reduced military logistics time by 40% in critical border sectors.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
Terror financing is the financial oxygen of terrorism — cut the money, and the organisation withers. India faces a sophisticated, multi-channel terror funding ecosystem: from Pakistan's ISI-hawala networks to cryptocurrency channels that evade traditional FATF monitoring frameworks.
SOURCES OF TERROR FUNDING
Hawala (Most significant): ISI-directed funds through hawala brokers. 26/11 funded via hawala from Pakistan. FIU-IND froze ₹1,200 crore in hawala (2022-23). FICN: ISI-backed fake Indian currency finances J&K militancy; smuggled via Nepal, Bangladesh. MHA's FCORD + NIA TFFC Cell. Narco-trafficking: Golden Crescent heroin funds LeT/JeM; Punjab drones carry arms + narcotics simultaneously (2024-25). Extortion: NE insurgent extortion from contractors; Naxal "levy" from mining. Diaspora: Khalistan funding from Canada/UK charities (Referendum 2020 coordination). Cryptocurrency: FATF flags post-Pulwama use; India's March 2023 PMLA extension to VDAs directly addresses this.
COUNTER EFFORTS
Legal: PMLA + ED; UAPA (terror financing criminalised); NIA TFFC Cell (Terror Funding and Fake Currency — dedicated investigation). Financial: FIU-IND (Egmont Group — 165 FIUs globally); FATF leverage (Pakistan grey-listing $38B cost; India sought Pakistan re-listing post-Pahalgam 2025). Institutional: MHA's FCORD (FICN Coordination Group). Intelligence: NATGRID; MAC; IFC-IOR.
NMFT CONFERENCE (Nov 2022, New Delhi)
Aim: Build global consensus to disrupt terror financing networks. India hosted 72 countries + FATF + multilateral organisations. Objectives: (1) Counter hawala and state-directed terror financing — indirectly targeting Pakistan-ISI-LeT nexus without naming Pakistan; (2) Develop global framework for cryptocurrency terror financing regulation; (3) Strengthen AML/CFT international cooperation; (4) Position India as global leader in counter-terror financing — leveraging G20 presidency (2023) to advance this agenda internationally.
CONCLUSION
FATF's 2024 evaluation reveals the paradox: high technical compliance but only 15 convictions in 5,892 PMLA cases = 0.5% conviction rate. NMFT Conference was India's most important diplomatic initiative in counter-terror financing — proof that India's preferred instrument against Pakistan is also financial pressure. The framework is built; the prosecution pipeline must urgently follow. Fast-tracking ML/terror financing Special Courts is the single most impactful next step.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
India's 7,517 km coastline and 95%-seaborne trade make maritime security a national security imperative. 26/11 (terrorists landed by sea) and Houthi Red Sea attacks (2024 — disrupting India's trade routes) demonstrate that maritime threats are both existential and immediate.
CHALLENGES
Terrorism (26/11 — sea-borne attack); piracy (Arabian Sea — Houthi disruption 2024; Somali groups extended to 78°E); smuggling (arms, narcotics, FICN); China's String of Pearls (Hambantota + Gwadar + Kyaukpyu encirclement); inter-agency coordination silos (Navy-Coast Guard-Marine Police); non-traditional threats (climate-displaced illegal migration by sea).
INITIATIVES
Organisational: Three-tier system (Navy + Coast Guard + Marine Police); NCS-MCS (apex coordination); IFC-IOR (2018 — regional information sharing hub); SAGAR policy; QUAD maritime cooperation. Technical: NC3I (centralised sensor integration); Coastal Surveillance Network (CSN — 7,500 km radars, AIS, cameras); Anti-Piracy Act 2022; Cartosat satellites. Procedural: Fishermen biometric ID cards; SAREX-2024 and Sagar Kavach inter-agency exercises; mandatory pre-departure registration for fishing vessels.
REMAINING CHALLENGE
Navy-Coast Guard-Marine Police coordination silos persist despite SOPs and joint exercises. A unified Maritime Command Authority resolving the structural coordination problem is the single most important pending reform. Without it, India's three maritime agencies will remain parallel systems that cooperate intermittently rather than an integrated maritime security architecture serving India's SAGAR vision.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
The crime-terror continuum ranges from loose cooperation (fake documents, transport) to complete confluence where criminal and terror operations are indistinguishable — D-Company + ISI in the 1993 Mumbai blasts is the paradigmatic Indian example. UNTOC definition: 3+ persons, structured, operating for material benefit.
TYPES IN INDIA
Drug trafficking (Golden Crescent + Golden Triangle); Arms smuggling (Myanmar-NE corridor); Human trafficking (source/transit/destination country); FICN counterfeiting (ISI-backed); Cybercrime (ransomware syndicates); Extortion + kidnapping (NE insurgent groups); Wildlife trafficking (IWT funds NE insurgents; same routes as drugs/arms); Hawala networks; Illegal mining (Jharkhand + Chhattisgarh, funds Naxals).
CRIME-TERROR LINKAGES
National: D-Company + ISI (1993 Mumbai blasts) — Dawood Ibrahim's smuggling networks brought RDX via coast. NE insurgents + Golden Triangle drug traffickers — same routes, mutual benefit. Naxal extortion + illegal mining = self-funding insurgency. Transnational: ISI-D-Company nexus (Pakistan-India-Gulf); LeT using Golden Crescent narco proceeds; ISIS cryptocurrency channels across jurisdictions; international cartels funding domestic terror networks.
CONCLUSION
The crime-terror force multiplier: crime gives terror — financial infrastructure, logistical networks, money laundering capacity, arms supply chains. Terror gives crime — political protection, intimidation muscle. Both are more dangerous together. Operation Dhvast (2023) — NIA busted a terrorist-gangster-drug trafficking nexus — is the model for integrated NIA + NCB + ED simultaneous response.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
Terrorism's complexity lies in its multi-causality, multi-dimensionality, and adaptability — simultaneously an ideological construct, political instrument, business model, and military tactic. "Terrorism is emerging as a competitive industry" — each iteration learns from previous failures, evolving faster than most counter-terrorism frameworks.
CAUSES AND LINKAGES
Causes: Political (unresolved conflicts, perceived injustice — Kashmir, NE identity); Economic (unemployment, poverty — recruitment pool); Ideological (religious extremism, ethnic nationalism); State sponsorship (Pakistan's ISI — systematic terror infrastructure). Nexus: Crime-terror (D-Company + ISI — 1993 blasts; drug money funds LeT/JeM; NE narco-terror). State-terror (Pakistan-ISI-LeT-JeM-TRF — state-directed with plausible deniability; Pahalgam 2025 — civilian communal-targeting). Diaspora-terror (Khalistan — Canada/UK). Technology-terror (drone warfare — Op Sindoor 2025, 300-400 Pakistani drones; crypto financing; deepfake disinformation).
MEASURES TO ERADICATE
Military: Op Sindoor doctrine (2025) — decisive retaliation, Cold Start operationalised, no nuclear blackmail, no distinction between terrorists and state sponsors. Legal: UAPA 2019 (individual designation); NIA global jurisdiction; BNS 2023. Financial: PMLA; FATF (Pakistan $38B cost 2018-22); NMFT 2022. Intelligence: NATGRID; MAC; HUMINT from communities; IFC-IOR. Political: Resolve legitimate political grievances; dialogue with groups accepting constitutional framework (Bodo 2020, Karbi 2021 models). CVE: Counter-radicalisation; digital literacy; community policing.
CONCLUSION
There is no purely military solution to terrorism. India's most successful counter-terrorism achievement — NE peace accords (Bodo 2020, Karbi 2021) — happened through negotiation, not battlefields. Op Sindoor is necessary (deterrence) but not sufficient (it doesn't prevent the next Pahalgam). Political accommodation of legitimate grievances + economic inclusion + counter-radicalisation must be pursued simultaneously with kinetic operations.
📋 Answer Framework — 10 Marks · 150 Words
INTRO
Militants are parasitic — depending on local communities for intelligence, logistics, shelter, recruits, and finance. Severing these links isolates militants. But severing links requires trust — which can only be built by addressing community grievances. WHAM is not "soft" — it is the hardest, most durable element of counter-insurgency.
DENYING LOCAL SUPPORT
Intelligence-led identification of OGW networks; UAPA 2019 individual designation (targeting OGW supporters); community policing with trusted informant networks; Village Defence Guards (VDG) in J&K — arming villagers as defence + HUMINT sources; economic alternatives to extortion-based livelihoods (BADP, skill development); surrender + rehabilitation with credible protection from militant retaliation; fast-track justice for militant-related crimes — impunity breeds complicity.
MANAGING FAVOURABLE PERCEPTION — WHAM
Operation Sadbhavana (Army — schools, medical camps, skill training, sports in J&K/Ladakh); Civic Action Programmes by border guarding forces; fast-track infrastructure in cleared areas; Vibrant Villages Programme (China border); counter-narrative to militant propaganda through community radio and local media; working grievance redressal mechanisms (not just formal structures that don't actually function). Punjab "Drones and Discontent" (2025) — lesson that WHAM failure creates security vulnerabilities when border communities lack legitimate economic opportunities.
CONCLUSION
The UK's Operation Banner in Northern Ireland (1969-2007) showed how long-term militarisation erodes community trust even in democratic states. The most important WHAM metric: when border communities proactively report militant presence — which requires years of sustained trust-building through visible, tangible development and respectful, accountable security force behaviour. No surveillance technology replaces a community member who trusts security forces enough to share intelligence.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
India's eastern and western frontiers (9,062 km collectively) carry threats as diverse as cross-border terrorism (LoC), insurgent safe havens (Myanmar), illegal migration (Bangladesh), and narco-trafficking (all three). Each border has unique geography, threat profile, and guarding force — requiring tailored responses within an integrated national security framework.
PAKISTAN BORDER / LoC
Threats: Cross-border terror infiltration (ISI → LeT, JeM, TRF); FICN; narco-trafficking; drone-based arms + narcotics (Punjab 2025). Pahalgam massacre (April 2025) → Op Sindoor (May 2025) — 9 terror camps struck. Force: BSF — manages IB + LoC. Op Sindoor: BSF thwarted IB infiltration; KAVACH laser walls (198 km Jammu) detected breaches; Army deployed Excalibur precision artillery on LoC.
BANGLADESH BORDER
Threats: Illegal migration (demographic changes in Assam, WB); cattle smuggling (1 lakh cattle annually); FICN transit; human trafficking. Post-August 2024 concern: Sheikh Hasina fell — new government's security cooperation stance requires active monitoring. Force: BSF with BOLD-QIT (CIBMS variant for riverine sections where physical fencing is impossible due to shifting river courses).
MYANMAR BORDER
Threats: Insurgent safe havens (NSCN factions, ULFA); arms trafficking from civil war conflict zones; narco-trafficking (Golden Triangle); Rohingya influx; Myanmar arms fuelling Manipur ethnic violence (2023-25). FMR Scrapped (2024): India ended Free Movement Regime; fencing underway; biometric passes (Dec 2024). Force: Assam Rifles — border guarding + counter-insurgency in NE India (oldest CAPF, 1835; dual MoD/MHA oversight).
CONCLUSION
Each border requires tailored response. Common thread: security operations + development (BADP) + community engagement (WHAM) + technology (CIBMS, BOLD-QIT, D4 counter-drone, KAVACH laser). FMR scrapping and Myanmar fencing (2024) represent India's most significant border policy shift in a decade — recognising that open borders with unstable neighbours are security liabilities requiring active management.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
The 1,643 km India-Myanmar border passes through rugged terrain and dense forests — providing natural cover for insurgents, smugglers, and traffickers. Myanmar's military coup (2021) and subsequent civil war have dramatically worsened an already complex security environment, creating the most difficult border management situation India currently faces.
CHALLENGES AT INDIA-MYANMAR BORDER
Insurgent safe havens: NSCN factions, ULFA maintain camps in Myanmar. Post-coup, junta no longer cooperates on Indian insurgent expulsion. Arms trafficking: Civil war creates massive arms overflow — weapons flow to NE insurgents (Manipur conflict directly fuelled by Myanmar arms). Narco-trafficking: Golden Triangle proximity — heroin, methamphetamine (Manipur's drug crisis directly linked). Same routes carry drugs, arms, and insurgents simultaneously. Rohingya influx: Myanmar Rohingya fleeing junta → Bangladesh → India. Radicalisation concerns; illegal immigration; Jammu Rohingya settlements creating communal friction. Manipur ethnic violence (2023-25): 200+ killed, 60,000+ displaced — fuelled partly by Myanmar arms overflow. India's most active internal security crisis.
COUNTER STEPS
Policy shift (2024-25): FMR scrapped; border fencing of entire 1,643 km underway; biometric border passes (Dec 2024) — India's most significant Myanmar border policy shift in decades. Security: Assam Rifles (border guarding + counter-insurgency); increased CRPF in Manipur; intelligence-led operations targeting infiltration corridors. Development: Act East Policy connectivity; BADP; tribal community engagement. Diplomacy: Engagement with Myanmar's multiple power centres (junta + resistance groups + ASEAN) — extremely complex post-coup landscape.
CONCLUSION
Myanmar's instability is India's instability — by geography. India cannot completely seal a 1,643 km forested border — but layered responses reduce vulnerabilities: physical barriers (fencing) + community intelligence (tribal leaders as informants) + development (reducing insurgent recruitment base) + creative diplomacy in a post-coup Myanmar. The FMR scrapping is necessary — but must be combined with sustained development investment and the most sophisticated diplomatic engagement India can muster with Myanmar's complex political landscape.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
India's strategic location between the Golden Triangle (Myanmar-Thailand-Laos) and Golden Crescent (Afghanistan-Pakistan-Iran) makes it a major transit and destination country for narcotics — and drug trade proceeds fund virtually every other category of organised crime and terrorism.
LINKAGES
Drug ↔ Gunrunning: Same porous border routes carry both — Myanmar civil war weapons flow into NE India through Golden Triangle corridors. Punjab: Pakistan drones carry arms + narcotics simultaneously (2024-25 documented pattern). Insurgents trade drugs for weapons — barter-based narco-arms exchange documented by Assam Rifles. Drug ↔ Money Laundering: Drug proceeds are the largest global ML source. India: Golden Crescent heroin → Punjab dealers → hawala → J&K militancy funding. Same hawala networks launder both drug money and terror financing simultaneously. Drug ↔ Human Trafficking: Same criminal networks traffic both drugs and humans — maximising revenue from shared infrastructure. Traffickers use victims as "mules" to carry narcotics. NE India and Bangladesh border: insurgent networks, drug routes, and human trafficking corridors overlap completely.
COUNTERMEASURES
Legal: NDPS Act 1985 (amended; heavier penalties); PMLA (drug crime proceeds); UAPA (narco-terror links); UN Vienna Convention (1988 — India signatory). Institutional: NCB; Customs Intelligence (DRI); BSF anti-smuggling; NIA Operation Dhvast (2023 — terrorist-gangster-drug nexus busted). International: UNODC cooperation; India-Myanmar-Thailand trilateral; SCO narcotic counter-measures; Indian Ocean anti-trafficking coordination. Social: De-addiction in Punjab (severe epidemic — 75%+ of young men in some border districts); community awareness; alternative livelihoods in poppy-cultivating border areas.
CONCLUSION
The drug-crime-terror triangle cannot be broken at one point — it must be broken simultaneously at all three vertices. Supply reduction (border interdiction + source country engagement) + demand reduction (de-addiction, education — especially Punjab) + follow the money (PMLA/FIU tracing drug proceeds to terror financing) = the integrated approach. And the international dimension requires simultaneous diplomatic + intelligence + enforcement action — no domestic-only solution exists for transnational organised crime.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
"Hot pursuit" (immediate cross-border chase) and "surgical strikes" (precision offensive operations) represent India's progressive embrace of assertive deterrence — reaching its most decisive expression with Operation Sindoor (May 2025), India's deepest strike inside Pakistan since 1971.
STRATEGIC IMPACT
Deterrence: Surgical Strikes (2016, Uri response) — first acknowledged cross-LoC strike; signalled willingness to impose costs. Balakot Airstrikes (2019, Pulwama response) — first strike on Pakistani soil since 1971. Op Sindoor (May 2025): 9 terror camps struck including Muridke (LeT HQ) and Bahawalpur (JeM HQ) — deepest India has ever struck inside Pakistan. New doctrine: decisive retaliation, no nuclear blackmail, no distinction between terrorists and state sponsors. Domestic impact: Demonstrates political will; boosts military morale; tests new weapons systems (Excalibur artillery, SkyStriker, Harop loitering munitions — all battle-proven). Diplomatic impact: Forces international community to acknowledge India's right to self-defence; complicates Pakistan's victim narrative; India sought FATF re-listing of Pakistan post-Pahalgam 2025. Escalation dynamics: Both nations nuclear-armed — Op Sindoor demonstrated precise conventional strikes can be executed without triggering nuclear escalation, validating Cold Start doctrine's non-escalation ladder concept.
CONCLUSION
India's post-Op Sindoor security doctrine: decisive retaliation; no distinction between terrorists and state sponsors; nuclear blackmail rejected as a constraint. Strikes must be integrated with intelligence, financial (FATF), and diplomatic tools. Most important Op Sindoor outcome: not the physical destruction of 9 camps but the psychological and political signal that Pakistan's cost-benefit calculation for terror sponsorship has permanently changed.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
The characterisation of terrorism as a "competitive industry" captures an uncomfortable truth: modern terrorism exhibits features of a diversified, innovation-driven business enterprise — with R&D (bomb-making innovation), marketing (propaganda), supply chains (arms networks), HR (recruitment), finance (money laundering), and competitive positioning (ISIS vs Al-Qaeda brand competition).
EVIDENCE OF INDUSTRY FEATURES
Competition: ISIS, Al-Qaeda, Taliban, LeT, JeM — compete for recruits, donors, ideological territory. ISIS explicitly marketed itself as more "effective" than Al-Qaeda — demonstrating competitive brand differentiation. Innovation (R&D): Conventional explosives → suicide bombers → IEDs → drone-mounted weapons (Op Sindoor 2025, Pakistan's 300-400 drones) → deepfake disinformation. Innovation curve mirrors competitive industries. Supply chain management: D-Company logistics + ISI financing + LeT operatives = vertically integrated supply chain. Dark web arms markets = platform economy for weapon acquisition. Brand management: ISIS's multimedia production (Dabiq magazine, nasheed music, high-quality videos) is indistinguishable from professional marketing. Financial sophistication: Hawala → cryptocurrency → DeFi — terror financing evolves faster than AML regulation.
CONCLUSION
If terrorism is an industry, counter-terrorism must adopt industry-disruption thinking: cut the supply chains (PMLA, FATF, NCB); destroy the brand (counter-narratives); eliminate the talent pipeline (CVE, de-radicalisation); disrupt the technology advantage (cyber capabilities, drone counter-measures). Military strikes are necessary — but they are the equivalent of factory raids in a knowledge economy. The "industry" survives and relocates unless its entire business model is disrupted simultaneously.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
India's 15,107 km land border with 7 countries and 7,517 km coastline present the world's most complex border management challenge. Security, development, and community trust must all function simultaneously — any single-pillar approach fails.
CHALLENGES
Geographical: Siachen (-60°C, avalanches); Bangladesh riverine border (shifting courses prevent fencing); Myanmar dense forest; Rann of Kutch marshes; Thar Desert. Political: Undecided LAC (China; Galwan 2020; Cartographic Aggression May 2025); unresolved LoC; Pakistan-China two-front nexus; CPEC through PoK. Administrative: Multiple forces with overlapping jurisdictions; inter-agency coordination gaps. Socio-economic: Border community alienation; Punjab farmers recruited as drone smugglers (2025); Manipur ethnic conflict exploited by Myanmar-based armed groups.
STRATEGIES
Forces: BSF (Pakistan+Bangladesh); ITBP (China-LAC); SSB (Nepal+Bhutan); Assam Rifles (Myanmar+NE). Technology: CIBMS smart fence; BOLD-QIT (Bangladesh riverine); KAVACH laser (Indo-Pak Jammu, 198 km); D4 counter-drone; thermal imagers; Cartosat satellites. Development: BADP; Vibrant Villages (2022); BRO roads + tunnels; Integrated Check Posts. Community: WHAM; VDG; Op Sadbhavana; community policing — alienated border communities are both the biggest vulnerability and, when engaged, the most valuable security asset.
CONCLUSION
The most secure border is one where the community on India's side is a security stakeholder, not a bystander. Technology and forces secure the physical border; development and community engagement secure the human dimension. BADP + Vibrant Villages + WHAM is India's most powerful integrated border security strategy — security creates conditions for development, and development makes security sustainable and community-owned.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
Illegal transborder migration — primarily from Bangladesh (demographic pressure) and Myanmar (Rohingya crisis) — poses security threats beyond demographic change. It provides cover for infiltration of militants, FICN networks, and narcotics carriers, and creates ethnic tensions that insurgent groups weaponise for recruitment.
SECURITY THREATS
Demographic: Assam's ethnic composition changing → ethnic tensions → insurgency fodder (Assam Accord 1985 still unresolved; NRC process). Infiltration: ISI uses Bangladesh route for agent movement; FICN transit. Rohingya: Radicalisation vulnerability; communal friction in Jammu settlements; security concerns about ISIS targeting Rohingya camps. Resource strain: Pressure on land, employment → social conflict → extremist recruitment pool. Drivers of migration: Bangladesh (economic disparity, climate change floods, political instability — August 2024 political change adds new uncertainty); Myanmar (Rohingya persecution, junta violence, civil war, ethnic cleansing).
STRATEGIES
BSF enhanced surveillance; Bangladesh border fencing (largely complete for non-riverine sections); biometric ID for border crossers; CIBMS BOLD-QIT for riverine gaps; Foreigners Tribunals + NRC; diplomatic engagement (Land Boundary Agreement 2015 — model for cooperative border management); Myanmar: FMR scrapped (2024), entire 1,643 km fencing underway, biometric passes (Dec 2024) — India's most significant border security policy shift in a decade.
CONCLUSION
Illegal migration cannot be stopped at the border alone — root causes in source countries (poverty, conflict, climate) must also be addressed through development partnerships and diplomacy. India's 2015 Land Boundary Agreement remains the best model: diplomatic resolution reducing migration pressure while maintaining security cooperation. Post-Hasina Bangladesh (August 2024) requires maintaining security cooperation with the new government while managing political sensitivities.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
CPEC ($62B+) connects China's Xinjiang to Pakistan's Gwadar on the Arabian Sea — passing through Pakistan-Occupied Kashmir. For India, CPEC is simultaneously a sovereignty violation, strategic encirclement enabler, and amplifier of the China-Pakistan anti-India axis.
SECURITY THREATS TO INDIA
Sovereignty: CPEC traverses PoK — India cannot participate without implicitly accepting Pakistani sovereignty over its claimed territory. Non-negotiable. Strategic encirclement: Gwadar = permanent Chinese naval access to Arabian Sea — part of String of Pearls (Gwadar + Hambantota + Kyaukpyu). Two-front threat: CPEC deepens China-Pakistan nexus — coordinated LoC (west) + LAC (north) pressure simultaneously feasible. Intelligence: Chinese workers + surveillance infrastructure along CPEC = intelligence collection near Indian borders. Pakistan reduced autonomy: $23B+ CPEC debt gives China leverage — making Pakistan more willing to support anti-India objectives. Militarisation: China deploying "security personnel" to protect CPEC — de facto military presence in Pakistan.
INDIA'S RESPONSE
Consistent opposition at all forums; "Necklace of Diamonds" counter-strategy (Chabahar, Sittwe, Duqm, Agalega); QUAD for multilateral Indo-Pacific balancing; INSTC (bypasses Pakistan); Op Sindoor (2025) — India demonstrated willingness to impose direct costs on Pakistan, signalling to China about the limits of the nexus.
CONCLUSION
India's CPEC opposition is principled on sovereignty AND strategic grounds — both non-negotiable. India will not participate in infrastructure traversing its claimed territory regardless of economic benefits. The challenge is building alternative connectivity (Chabahar, INSTC) providing regional integration benefits without the sovereignty concession, backed by a QUAD-based security architecture to balance China's growing IOR presence.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
IMO's 2012 revision of piracy High-Risk Areas (HRA) from 65°E to 78°E in the Arabian Sea brought India's western EEZ within the designated high-risk zone — with significant implications for trade costs, naval responsibilities, and India's strategic positioning in the Indian Ocean Region.
IMPACT ON INDIA'S MARITIME SECURITY
Trade costs: Ships in HRA operate with enhanced protocols — higher insurance premiums, armed guards. Mumbai-Suez lane (India's most critical trade route) now within HRA; increases cost of India's seaborne trade. Naval responsibility: India's Navy and Coast Guard now operationally responsible for patrolling expanded HRA adjacent to Indian waters — increased burden and resource requirement. Somali piracy extension: Somali pirates extended operational range into Arabia Sea — threatening Indian fishermen, offshore oil installations (ONGC Mumbai High), and cargo vessels. Strategic opportunity: HRA extension validates India's case for a larger IOR security role — SAGAR vision gains strategic logic. India becomes the most capable IOR power to provide maritime security.
INDIA'S RESPONSE
Post-2012: intensified Arabian Sea naval patrols; ICG expanded with new vessels; anti-piracy operations with Combined Maritime Forces; IFC-IOR (2018) — regional maritime information hub; Anti-Piracy Act 2022 — dedicated domestic legal framework. 2024-25: 3,000+ kg narcotics seized in Arabian Sea; 47+ ships escorted through high-risk areas by Indian Navy.
CONCLUSION
The 2012 HRA expansion was an inflection point that operationalised India's maritime security responsibilities — from passive observer to active IOR security provider. This directly shaped the SAGAR doctrine (2015) and IFC-IOR establishment (2018). The Houthi Red Sea crisis (2024) further validates this trajectory — India's role as IOR net security provider is now both a strategic aspiration and an operational necessity.
📋 Answer Framework — 10 Marks · 200 Words
INTRO
India's porous borders are not merely administrative challenges — they are the primary vectors through which external threats become internal security crises. Every major internal security challenge India faces today has a significant cross-border dimension that cannot be addressed through domestic-only responses.
THE LINKS
Pakistan border → J&K terrorism: ISI-directed militants cross LoC; FICN smuggled; narcotics transit; Pahalgam 2025 — TRF coordinated from Pakistan; Op Sindoor (2025) demonstrated the cost India is now willing to impose for border-enabled terrorism. Myanmar border → NE insurgency: Safe havens, arms trafficking (civil war overflow), Golden Triangle drugs sustain NE insurgent groups; Manipur ethnic violence (2023-25) fuelled by Myanmar arms — direct border-security link. Bangladesh border → Illegal migration + FICN: Large-scale migration creates demographic-security complications; FICN transit; post-2024 political change — new uncertainty. Nepal/Bhutan → ISI transit: IC-814 hijacking (Nepal, 1999); Yasin Bhatkal captured at India-Nepal border (2013); FICN + narcotics transit through open border areas.
CONCLUSION
India's internal security is only as strong as its border management. Every improvement (CIBMS, KAVACH, D4 counter-drone, FMR scrapping) reduces internal security threats downstream. But border security must be complemented by WHAM and development — secure borders with alienated communities are still porous, just in less visible ways. The 2026 security environment validates this comprehensively: Op Sindoor addressed the Pakistan border-terrorism link directly; Manipur demonstrates the Myanmar border-insurgency link still requires sustained, patient attention.
🛡️
Unit 5 — Various Security Forces & Their Mandates
Intelligence · NIA · CBI · ED · CAPFs · UAPA · AFSPA · CAPF Bill 2026 · 4 Questions
📋 Answer Framework — 15 Marks · 250 Words
INTRO
India's internal security (2026) presents a complex multi-threat matrix: Pakistan-sponsored cross-border terrorism (Pahalgam 2025 → Op Sindoor), LWE decline but persistence (7 districts), NE insurgency flux (Manipur crisis), cyber threats (1.5M attacks during Op Sindoor), and money laundering-terror nexus. Intelligence and investigative agencies are the first line of detection and disruption.
INTELLIGENCE AGENCIES
IB (Intelligence Bureau): Internal intelligence — est. 1887 (oldest surviving intelligence organisation globally). Counter-terrorism (tracks LeT, ISIS modules); counter-intelligence; monitors extremist movements. MAC coordinator — real-time sharing with state agencies. Under MHA. Op Sindoor: IB's intelligence on LeT-JeM-TRF network contributed to target selection for 9 terror camps struck. RAW (Research and Analysis Wing, est. 1968): External intelligence. No statutory basis — operates under Cabinet Secretariat/PMO (itself a governance gap; RAW has no parliamentary oversight). Controls Special Frontier Force. Bangladesh creation (1971) — RAW's greatest strategic achievement. Op Sindoor: deep intelligence on Pakistan terror infrastructure foundational to target selection. NTRO: Technical intelligence — Cartosat satellites, SIGINT, cyber threat monitoring. Under PMO/NSA.
INVESTIGATIVE AGENCIES
NIA: Premier anti-terrorism agency (est. 2008, post-26/11). Can investigate outside India (2019 amendment). ISIS module investigations (2023-25); Operation Dhvast (2023 — terrorist-gangster-drug nexus busted); TFFC Cell (Terror Funding and Fake Currency). CBI: Major crimes of national importance. "Caged parrot" criticism; general consent withdrawal by states complicates multi-state investigations. ED: Financial crimes under PMLA and FEMA. FATF 2024: 0.5% conviction rate (15/5,892 cases) — the critical gap. FIU-IND: AML — hawala crackdowns (₹1,200 crore 2022-23); Egmont Group (165 FIUs globally).
COORDINATION MECHANISMS
MAC (Multi-Agency Centre) — real-time intelligence sharing hub. NATGRID — integrated crime and intelligence database. NSCS (National Security Council Secretariat) — apex policy coordination under NSA. IFC-IOR — maritime intelligence. Key gap: IB-RAW inter-agency turf wars delay intelligence sharing; RAW's lack of statutory basis means no parliamentary oversight or accountability framework — a democratic deficit.
CONCLUSION
India's intelligence architecture is comprehensive in coverage (IB-internal, RAW-external, NTRO-technical) but fragmented in coordination. Op Sindoor demonstrated what coordinated intelligence can achieve — the objective is making this coordination institutional, not exceptional. The democratic imperative: RAW needs statutory backing for oversight and accountability. MAC must be strengthened with mandatory state participation. India's intelligence community is capable; its institutional architecture must match its operational performance.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
UAPA 2019 amendment and NIA Act amendment respond to the evolved terrorism landscape: ISIS individual radicalisation (lone wolves can't be prosecuted through organisational membership), cross-border planning (Balakot revealed Pakistan-based terror infrastructure), and financial complexity requiring individual-level targeting. India's most significant counter-terrorism legislative upgrade since the original acts.
KEY CHANGES — UAPA 2019
Individual designation: Government can now designate individuals (not just organisations) as terrorists — directly targeting OGWs, lone wolves, and financiers who support terror without formal organisational membership. Enables prosecution of Pulwama-type support networks. NIA as nodal: Director General of NIA designated authority to propose individual designations — centralises counter-terrorism intelligence and prosecution. Seizure authority: NIA can attach and seize property of designated individuals. NIA Act 2019: Can now investigate terror crimes outside India — responds to Pakistan-based planning of 26/11, Pulwama, Pahalgam 2025. Can investigate: cyber-terrorism, WMD trafficking, crimes against Indians or Indian interests abroad.
SECURITY JUSTIFICATION
Pahalgam (2025) — TRF handlers in Pakistan directing operatives in India; without NIA's cross-border jurisdiction, investigation is legally impossible in India. ISIS Pune module (2023-25) — virtual handlers directing Indian sleeper cells; individual designation needed to target financiers and supporters without formal ISIS membership card. Bengaluru Café (2024) — lone wolf radicalised entirely online; no organisational affiliation; requires individual targeting powers, not organisational designation.
HUMAN RIGHTS OPPOSITION
Due process: Individual designation without trial — no judicial oversight at designation stage; presumption of innocence reversed (bail is extremely difficult once designated). Political misuse: Broad "terror" definitions could criminalise legitimate dissent, protest, and journalism. Bail stringency: UAPA makes bail nearly impossible — effectively detention without trial for designated individuals. Elgar Parishad case: Multiple activists, academics, and lawyers arrested — human rights community argues political targeting. Chilling effect: UAPA designation fear deters civil society advocacy in security-sensitive areas.
CONCLUSION
UAPA amendments are operationally necessary — modern terrorism requires individual-level targeting and cross-border jurisdiction. But human rights concerns are not frivolous: any law making bail nearly impossible and reversing presumption of innocence requires robust judicial oversight and transparent accountability for designations. India must build both: effective counter-terrorism powers AND strong judicial review mechanisms preventing political misuse. The test of UAPA's legitimacy is whether its use is proportionate, judicially overseen, and limited to genuine security threats — not political opponents.
📋 Answer Framework — 12.5 Marks · 200 Words
INTRO
AFSPA 1958 grants extraordinary powers to armed forces in "disturbed areas" — a necessary instrument in genuine conflict zones, repeatedly implicated in human rights violations. As of July 2025, it remains in force in parts of Nagaland, Manipur, and Arunachal Pradesh — down from near-total NE application two decades ago, reflecting cautious graduated withdrawal as security improves.
CONTESTED SECTIONS
Section 4(a): Power to use lethal force — activists argue "fire if necessary" standard lacks proportionality criteria and civilian protection standards. Section 4(c): Arrest without warrant — creates potential for arbitrary detention of innocent civilians. Section 6 (most contested): Immunity from prosecution without Central Government sanction — creates de facto blanket immunity for genuine abuses. Oting killings (Nagaland, Dec 2021): Army killed 13 civilians in mistaken identity case — Section 6 prevented immediate prosecution; led to partial AFSPA revocation in Nagaland (2022-23). This is the provision activists most consistently demand be repealed or substantially reformed.
SUPREME COURT'S POSITION
Extra-Judicial Execution Victim Families Association vs UoI (2016): "Even in disturbed areas, every death caused by security forces must be independently examined; AFSPA is not a licence for abuse." Minimum force principle applies — no blanket immunity for disproportionate force. 2017 reiteration: security forces cannot escape accountability for genuine excesses. Jeevan Reddy Committee (2005): Recommended complete repeal — replace with more humane provisions in existing laws. Second ARC: Recommended replacement with new legislation incorporating human rights safeguards.
BALANCED ASSESSMENT
AFSPA's operational necessity in genuine conflict zones is real — applying peacetime criminal law while fighting armed insurgents creates impossible standards that could result in force reluctance. But Section 6's blanket immunity is constitutionally questionable and operationally counterproductive — it creates the very community alienation that sustains insurgency. Path forward: retain operational powers with tighter use-of-force rules; remove blanket prosecutorial immunity (replace Section 6 with mandatory independent investigation of all civilian deaths). Graduated AFSPA revocation in Nagaland (2022-23) and partial Manipur revocation (2022) show the right trajectory — security improvement followed by AFSPA withdrawal.
📋 Answer Framework — 15 Marks · 250 Words
INTRO
India's CAPFs — 10 lakh personnel, 13,000 officers — are the first line of internal security: anti-Naxal (CRPF), border defence (BSF, ITBP, SSB), airport security (CISF). Their morale is a national security issue. The CAPF Bill 2026, which received Presidential assent on April 9, 2026, has created the most significant governance controversy in Indian paramilitary history — pitting cadre officers against the IPS establishment in a constitutional flashpoint.
WHAT THE BILL DOES AND THE CONTROVERSY
The Bill unifies service rules for CRPF, BSF, ITBP, CISF, SSB under one statute (positive administrative consolidation). But it controversially reserves: 50% of IG posts, 67%+ of ADG posts, and 100% of DG posts for IPS officers — effectively blocking CAPF cadre officers from the apex of their own organisations. Introduced in Rajya Sabha (March 25, 2026); passed Parliament; Presidential assent April 9, 2026.
THE SC CONTRADICTION
SC judgment (May 23, 2025, Justice A.S. Oka + Ujjal Bhuyan): Granted CAPF officers OGAS (Organised Group A Service) status on par with IAS/IPS. Directed MHA to progressively reduce IPS deputation to Senior Administrative Grade level. Centre's review petition rejected (October 2025). The 2026 Bill does the exact opposite — institutionalises and expands IPS deputation through statute. Critics call this a "legislative override" of a SC order. Constitutional dimension: Parliament has sovereign legislative authority over service rules — but overriding a SC administrative direction through legislation sets a dangerous precedent.
THE MORALE CRISIS (2021-25 DATA)
Between 2021-2025: 749 CAPF jawans committed suicide; ~10,000 resigned; ~46,000 took voluntary retirement. Career stagnation (promotion bottlenecks stretching 10+ years for cadre officers) is a key driver. Protest at Rajghat, April 9, 2026: families of serving personnel demanded Bill withdrawal + OROP for CAPFs. Alliance of All Ex-Paramilitary Forces Welfare Association (20 lakh members) demanded Home Minister meeting — denied.
WAY FORWARD
Implement SC OGAS judgment — merit-based promotion pathway for cadre officers up to DG level; reduce IPS deputation to SAG level. OROP for CAPFs: Pension parity with armed forces — 13 lakh CAPF personnel face lower pensions despite equivalent risk. Welfare: Mandatory mental health counselling; better leave policies; family support infrastructure. Process: Mandatory consultation with CAPF officer associations before major service rule changes; Parliamentary standing committee review with all stakeholders. A force that cannot see a career future cannot effectively protect India's frontiers.
CONCLUSION
A demoralised force that sees no career future and feels its SC-guaranteed rights are being overridden cannot be India's effective first line of internal security. The CAPF Bill may achieve administrative consolidation — but at the cost of the human capital that makes these forces effective. India must find a path that respects parliamentary sovereignty AND the legitimate aspirations of 10 lakh personnel guarding its borders, fighting its insurgencies, and protecting its airports. That path: implement the SC OGAS judgment + OROP + welfare improvements + genuine consultation — neither parliamentary sovereignty nor Supreme Court orders require sacrificing the other.
⚡
Master Tips — Score 12+/15 in Internal Security
Non-negotiable patterns · Data anchors · Op Sindoor leverage · Conclusion template
🎯 Non-Negotiable Opening Framework
Open EVERY Internal Security answer with ONE of: (a) A defining quote ["bleeding India with 1000 cuts"; "fifth domain of warfare"; "money laundering is the financial reflex to crime"] — (b) A data anchor [126 LWE districts → 7; PMLA 0.5% conviction; Pakistan FATF $38B; 749 CAPF suicides; 369M malware detections] — (c) A news hook [Pahalgam → Op Sindoor; CAPF Bill April 2026; FMR Scrapped 2024; China Cartographic Aggression May 2025]. The first sentence determines whether the examiner reads carefully or skims.
📊 The 10 Data Points That Score in EVERY Answer
Memorise cold: (1) LWE districts: 126 (2013) → 7 (Feb 2026) — (2) PMLA conviction: 15/5,892 = 0.5% — (3) Pakistan FATF grey-listing cost: $38 billion (2018–22) — (4) Op Sindoor: 9 camps, Muridke (LeT HQ) + Bahawalpur (JeM HQ) — (5) Cyber: 369M malware detections 2024 — (6) ITU Tier 1 status: 2024 — (7) CAPF suicides 2021–25: 749; 10K resignations; 46K voluntary retirements — (8) JAM Trinity: 15% ML reduction; &x20B9;1.78L crore saved (RBI 2024) — (9) FMR Scrapped: 2024; Myanmar 1,643 km fencing underway; biometric passes Dec 2024 — (10) CERT-In 2025: 29.44 lakh incidents handled.
🔄 Op Sindoor (May 2025) — Use in EVERY Unit
Unit 1 (J&K WHAM): Pahalgam attack → civilian communal targeting strategy → WHAM's new challenge. Unit 2 (External Actors): 9 camps struck, new doctrine (decisive retaliation, no nuclear blackmail). Unit 3 (Cyber): 1.5M attacks, APT36, GPS spoofing, 5 Pakistan false narratives, 8,000+ accounts blocked. Unit 4 (Terror Financing): India sought Pakistan FATF re-listing post-Pahalgam. Unit 4 (Border): BSF thwarted IB infiltration; Excalibur artillery on LoC; 300-400 Pakistani drones neutralised. Unit 5 (Forces): IB + RAW intelligence underpinned target selection for 9 terror camps. Op Sindoor is the single most powerful current affairs anchor for UPSC 2026.
📋 Force-Mandate Mapping — Non-Negotiable
Wrong attribution = guaranteed mark loss. BSF = Pakistan + Bangladesh. ITBP = China (LAC; Galwan 2020). SSB = Nepal + Bhutan (open borders; intelligence-led). Assam Rifles = Myanmar + NE India (oldest CAPF, 1835; dual MoD/MHA oversight). CRPF = counter-insurgency + anti-Naxal (largest CAPF; Bastariya Battalion; Cobra unit). CISF = critical infrastructure + airports (65+). NSG = CT + hostage rescue (Black Cats; 26/11; metro hubs post-26/11). IB = internal, RAW = external (no statutory basis — no parliamentary oversight).
🚨 CAPF Bill 2026 — Highest Probability New Question
Presidential assent: April 9, 2026. Reserves 50% IG, 67% ADG, 100% DG posts for IPS officers. SC contradiction: May 2025 SC judgment directed progressive IPS deputation reduction (OGAS status for CAPF cadre officers); Centre's review petition rejected October 2025; Bill does the opposite. Protest at Rajghat, April 9, 2026. Numbers: 749 suicides, 10K resignations, 46K voluntary retirements (2021–25). OROP demand for 13 lakh CAPF personnel. Probable 2026 question — prepare thoroughly.
🔺 Conclusion Template That Always Scores
End every answer with three elements: (1) What's working — specific data. (2) What gap remains — specific and actionable. (3) One forward-looking sentence. Example: "India's FATF 2024 high compliance rating validates its framework. But the 0.5% PMLA conviction rate (15/5,892 cases) reveals the gap between institutional architecture and operational delivery. Fast-tracking Special ML Courts and resolving the crypto regulation gap are India's two most urgent AML priorities — the framework is built; the prosecution pipeline must follow." Knowledge + analysis + solutions in three sentences = full marks framework.


