GS-III: Internal & External Security

Internal Security: Various Problems Faced by CRPF

May 20, 2017

The Central Reserve Police Force or CRPF is the largest of India’s Central Armed Police Forces. It functions under the aegis of Ministry of Home Affairs (MHA) of the Government of India. The CRPF’s primary role lies in assisting the State/Union Territories in police operations to maintain law and...

Internal Security: How technology can help in surveillance in red corridor area?

May 7, 2017

Currently, the Maoists are active in at least nine out of the 28 states making the dreaded red corridor. Because the Maoist insurgency so far has been a purely indigenous, mostly localized phenomenon, each state has developed its own approach to tackling Maoist violence according to that state government’s...

Joint Armed Force Doctrine

May 3, 2017

Recently, the Joint Armed Force Doctrine of India has been unveiled. It is a document that gives out the guiding principles behind the approach of the Indian military towards war fighting. They revolve around the approach towards the security concerns and tackling the threats in terms of military conflict....

Fake News: Meaning, Issues and Implications

May 3, 2017

Fake news refers to the fictitious articles / media that are deliberately circulated in the internet with the aim of deceiving the readers. The news creator earns a profit with every user clicking to view it. The visitors are given an impression that they are visiting a trusted source...

Indian Coastal Security Apparatus: Key Features and Progress post 26/11

May 1, 2017

Serious doubts were raised on India’s Coastal security framework in the aftermath of 26-11-2008 Mumbai attacks. There was a need for complete overhaul of the coastal security system of the country. This article briefly reviews the changes in security apparatus, coastal security scheme and lacunae in the same. Key features...

Digital Sovereignty: Meaning, Importance and Issues

April 23, 2017

Digital sovereignty or Data sovereignty is all about storage and protection of an individual’s personal data in digital form on cloud. Data sovereignty demands that the individual’s data which is stored in the binary digital form in the cloud, must be kept within the country in which the individual...

India’s Digital Terrorism Preparedness

November 6, 2016

Digital Terrorism or Cyber terrorism is a new breed of terrorism which has gained significant relevance in today’s computer-dependent society. It can sabotage critical information networks of a country to intimidate or coerce a government for furthering some hidden social or political aim. The victims are usually non-combatant targets....

India’s Integrated Defence Communication Network (DCN)

October 4, 2016

India’s first Integrated Defence Communication Network (DCN) was dedicated to the nation by the Defence Minister on 1 July 2016.  DCN is a state-of-the-art strategic, exclusive, secure communication network. It is imperative for augmenting Network-Centric Warfare (NCW). DCN will ensure Network Centricity across the three services, Integrated Defence staff...

LSA, CISMOA and BECA Agreements

February 16, 2016

In earlier modules we have discussed that DTTI (Defence Trade and Technology Initiative) is one of the main vehicles for bilateral security ties between United States and India. DTTI is neither a treaty nor law. Its objective is to strengthen India-US cooperative research, co-production, and co-development of capabilities. As...

Gujarat Control of Terrorism and Organised Crime (GCTOC) Bill, 2015

October 20, 2015

On 25th September, the NDA government has cleared the Gujarat Control of Terrorism and Organised Crime (GCTOC) Bill, 2015 and sent it to President Pranab Mukherjee for his assent. Currently, presidential approval is pending. There is no time limit for President to give assent or return this bill. Background...
12

Advertisement