Govt clears building of 6 attack submarines
Context: The Defence Acquisition Council (DAC) gave the Indian Navy the go-ahead Friday to select an Indian strategic partner company which, in collaboration with a foreign Original Equipment Manufacturer (OEM), will build six conventional attack submarines in the country. Relevance: GS-III: Internal Security Challenges Dimensions of the Article: Defence Acquisition Council (DAC) About the 6 […]
Data Protection in India & WhatsApp’s privacy policy
Context: Instant messaging platform WhatsApp may face legal action in India by May 25 if it does not send a satisfactory reply to a new notice sent by the Ministry of Electronics and Information Technology asking the company to withdraw its latest privacy policy update. Relevance: GS-III: Internal Security Challenges (Cyber Security), Science and Technology […]
What is Facebook’s Oversight Board?
Context: Trump had been banned indefinitely by Facebook from posting or accessing his page on January 2021 following the chaotic situation of US Capitol Hill Siege. Facebook’s Oversight Board upheld the social media network’s decision to indefinitely block Mr. Trump for using the platform to “incite violent insurrection against a democratically elected government.” Recently the […]
India 3rd highest military spender: SIPRI Report
Context: Stockholm International Peace Research Institute (SIPRI) recently published the latest data on the military spending across the world – which has increased to USD 1,981 billion in 2020, during Covid-19 pandemic. Relevance: GS-III: Internal Security Challenges (Security Challenges & their Management), GS-III: Indian Economy (Budgeting) Dimensions of the Article: About SIPRI India-Specific Highlights of […]
WHY THE PERSONAL DATA PROTECTION BILL MATTERS?
Context: The number of personal data breaches from major digital service providers has increased worryingly in the same period as the pandemic has forced more people to participate in the digital economy. The Personal Data Protection Bill, 2019, now under scrutiny by a Joint Parliamentary Committee, could play a big role in providing robust protections […]
PERSISTENT MINDLESSNESS: ON MAOIST ENCOUNTER
Context: The deaths of over 20 paramilitary personnel in an encounter with the Maoists in the Tarrem area near Chhattisgarh’s Sukma district once again puts the spotlight on the long-running conflict in this remote tribal region. Relevance: GS-III: Internal Security Challenges (Linkages of Organized Crime with Terrorism, Left-Wing Extremism) Mains Questions: Is lack of development […]
MAOIST ATTACKS IN CHHATTISGARH’S SUKMA
Context: A day after the encounter between central paramilitary forces and Maoists in Chhattisgarh’s Sukma, bodies of 22 personnel were recovered, 31 were injured and one commando was still missing, according to Chattisgarh police. Relevance: GS-III: Internal Security Challenges (Linkages of Organized Crime with Terrorism, Left-Wing Extremism) Dimensions of the Article: Background to the recent […]
The forgotten fact of China-Occupied Kashmir
Context: On November 1, observed every year in Gilgit-Baltistan as “Independence Day”, Pakistan Prime Minister Imran Khan announced that his government would give the region “provisional provincial status”. Relevance: GS Paper 3: Border Areas (security challenges and management thereof); Security forces & agencies (mandate); Role of External State & Non-State actors in creating internal security […]
MHA TELLS STATES TO REGISTER MORE FIRS FOR CYBERCRIME
Focus: GS-III Internal Security Challenges Why in news? The Ministry of Home Affairs (MHA) has written to all States to examine and register FIRs based on the complaints received on National Cybercrime Reporting Portal. Details As per data available with the Ministry, only 2.5% of total complaints registered on the portal are converted into First […]
Countering deepfakes, the most serious AI threat
Context: The debate around “deepfakes” has been rekindled recently with the popularity of applications such as FaceApp (for photo-editing) and DeepNude ( that produces fake nudes of women). Relevance: GS Paper 3: Basics of Cyber Security; Role of media and social-networking sites in internal security challenges; Internal security challenges through communication networks Mains questions: It […]