Internal security PYQ
2024
Explain how narco-terrorism has emerged as a serious threat
across the country. Suggest suitable measures to counter narco-
terrorism. (10 M)
India has a long and troubled border with China and Pakistan,
fraught with contentious issues. Examine the conflicting issues
and security challenges along the border. Also give out the
development being undertaken in these areas under the Border
Area Development Programme (BADP) and Border Infrastructure
and Management (BIM) Scheme. (15 M)
Social media and encrypting messaging services pose a serious
security challenge. What measures have been adopted at various
levels to address the security implications of social media? Also
suggest any other remedies to address the problem. (15 M)
2023
Winning of ‘Hearts and Minds’ in terrorism-affected areas is an
essential step in restoring the trust of the population. Discuss the
measures adopted by the Government in this respect as part of
the conflict resolution in Jammu and Kashmir. (10 M)
The use of unmanned aerial vehicles (UAVs) by our adversaries
across the borders to ferry arms/ammunitions, drugs, etc., is a
serious threat to internal security. Comment on the measures
being taken to tackle this threat. (10 M)
What are the internal security challenges being faced by India?
Give out the role of Central Intelligence and Investigative
Agencies tasked to counter such threats. (15 M)
Give out the major sources of terror funding in India and the
efforts being made to curtail these sources. In this light, also
discuss the aim and objective of the No Money for Terror (NMPT)
Conference held in New Delhi in November 2022. (15 M)
Naxalism is a social, economic, and developmental issue
manifesting as a violent internal security threat. In this context,
discuss the emerging issues and a multilayered strategy to tackle
the menace of Naxalism. (15 M)
What are the different elements of cyber security? Keeping in
view the challenges in cyber security, examine the extent to
which India has successfully developed a comprehensive National
Cyber Security Strategy. (15 M)
What are the maritime security challenges in India? Discuss the
organisational, technical, and procedural initiatives taken to
improve maritime security. (10 M)
Discuss the types of organized crimes. Describe the linkages
between terrorists and organized crime that exist at the national
and transnational levels. (10 M)
2021
Analyse the multidimensional challenges posed by external state
and non-state actors to the internal security of India. Also, discuss
measures required to combat these threats. (15 M)
Keeping in view India’s internal security, analyze the impact of
cross-border cyber-attacks. Also, discuss defensive measures
against these sophisticated attacks. (10 M)
Discuss how emerging technologies and globalization contribute
to money laundering. Elaborate on measures to tackle the
problem of money laundering both at the national and
international levels. (10 M)
Analyse the complexity and intensity of terrorism, its causes,
linkages, and obnoxious nexus. Also, suggest measures required
to eradicate terrorism. (15 M)
2020
What are the determinants of left-wing extremism in the eastern
part of India? What strategy should the Government of India, civil
administration, and security forces adopt to counter the threat in
the affected areas? (15 M)
Discuss different types of cyber crimes and measures required to
be taken to fight the menace. (10 M)
For effective border area management, discuss the steps required
to deny local support to militants and also suggest ways to
manage favorable perception among locals. (10 M)
Analyze internal security threats and transborder crimes along
Myanmar, Bangladesh, and Pakistan borders, including the Line of
Control (LoC). Also, discuss the role played by various security
forces in this regard. (15 M)
2019
The banning of ‘Jamaat-e-Islami’ in Jammu and Kashmir brought
into focus the role of over-ground workers (OGWs) in assisting
terrorist organizations. Examine the role played by OGWs in
insurgency-affected areas and discuss measures to neutralize
their influence. (10 M)
What is the Cyber Dome Project? Explain how it can be useful in
controlling internet crimes in India. (10 M)
Cross-Border movement of insurgents is only one of the several
security challenges facing the policing of the border in North-East
India. Examine the various challenges currently emanating across
the India-Myanmar border. Also, discuss the steps to counter the
challenges. (15 M)
Indian Government has recently strengthened the anti-terrorism
laws by amending the Unlawful Activities (Prevention) Act (UAPA),
1967, and the NIA Act. Analyze the changes in the context of the
prevailing security environment while discussing the scope and
reasons for opposing the UAPA by human rights organizations. (15
M
2018
Left-Wing Extremism (LWE) is showing a downward trend but still
affects many parts of the country. Briefly explain the Government
of India’s approach to counter the challenges posed by LWE. (10
M)
The China-Pakistan Economic Corridor (CPEC) is viewed as a
cardinal subset of China’s larger ‘One Belt One Road’ initiative.
Give a brief description of CPEC and enumerate the reasons why
India has distanced itself from it. (10 M)
India’s proximity to two of the world’s biggest illicit opium-growing
states has enhanced her internal security concerns. Explain the
linkages between drug trafficking and other illicit activities such
as gunrunning, money laundering, and human trafficking. What
countermeasures should be taken to prevent the same? (15 M)
2017
Mob violence is emerging as a serious law and order problem in
India. By giving suitable examples, analyze the causes and
consequences of such violence. (15 M)
The north-eastern region of India has been infested with
insurgency for a very long time. Analyze the major reasons for the
survival of armed insurgency in this region. (10 M)
Discuss the potential threats of cyber-attacks and the security
framework to prevent them. (10 M)
The scourge of terrorism is a grave challenge to national security.
What solutions do you suggest to curb this growing menace?
What are the major sources of terrorist funding? (15 M)
2016
Border management is a complex task due to difficult terrain and
hostile relations with some countries. Elucidate the challenges
and strategies for effective border management. (12.5 M)
The use of the internet and social media by non-state actors for
subversive activities is a major security concern. How have these
been misused in the recent past? Suggest effective guidelines to
curb the above threat. (12.5 M)
The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in
connection with armed action against terrorist attacks. Discuss
the strategic impact of such actions. (12.5 M)
2015
The persisting drives of the government for the development of
large industries in backward areas have resulted in isolating the
tribal population and the farmers who face multiple
displacements. With Malkangiri and Naxalbari as focal points,
discuss the corrective strategies needed to win the Left-Wing
Extremism (LWE) doctrine-affected citizens back into the
mainstream of social and economic growth. (12.5 M)
Considering the threats cyberspace poses for the country, India
needs a “Digital Armed Forces” to prevent crimes. Critically
evaluate the National Cyber Security Policy, 2013, outlining the
challenges perceived in its effective implementation. (12.5 M
2013
Article 244 of the Indian Constitution relates to the administration
of scheduled areas and tribal areas. Analyse the impact of the
non-implementation of the provisions of the Fifth Schedule on the
growth of Left-Wing extremism. (10 M)
What are social networking sites, and what security implications
do these sites present? (10 M)
Cyber warfare is considered by some defense analysts to be a
larger threat than even Al-Qaeda or terrorism. What do you
understand by Cyber warfare? Outline the cyber threats which
India is vulnerable to and bring out the state of the country’s
preparedness to deal with the same. (10 M)
Money laundering poses a serious security threat to a country’s
economic sovereignty. What is its significance for India, and what
steps are required to control this menace? (10 M)
How far are India’s internal security challenges linked with border
management, particularly in view of the long porous borders with
most countries of South Asia and Myanmar? (10 M)