GS-III: Internal & External Security

Last modified: Jan 08, 2018

A committee under Gulshan Rai, National Cyber Security Coordinator was constituted by the NDA Government in December 2014. It has recently submitted its report on “Roadmap for Effectively Tackling Cyber Crimes in the Country” to Home Ministry. This committee has made some important recommendations such as: Establish a new Indian…
Last modified: Feb 14, 2018

On 25th September, the NDA government has cleared the Gujarat Control of Terrorism and Organised Crime (GCTOC) Bill, 2015 and sent it to President Pranab Mukherjee for his assent. Currently, presidential approval is pending. There is no time limit for President to give assent or return this bill. Background The…
Last modified: Jan 08, 2018

In earlier modules we have discussed that DTTI (Defence Trade and Technology Initiative) is one of the main vehicles for bilateral security ties between United States and India. DTTI is neither a treaty nor law. Its objective is to strengthen India-US cooperative research, co-production, and co-development of capabilities. As of…
Last modified: Feb 11, 2018

India’s first Integrated Defence Communication Network (DCN) was dedicated to the nation by the Defence Minister on 1 July 2016.  DCN is a state-of-the-art strategic, exclusive, secure communication network. It is imperative for augmenting Network-Centric Warfare (NCW). DCN will ensure Network Centricity across the three services, Integrated Defence staff (IDS)…
Last modified: Jan 08, 2018

Digital Terrorism or Cyber terrorism is a new breed of terrorism which has gained significant relevance in today’s computer-dependent society. It can sabotage critical information networks of a country to intimidate or coerce a government for furthering some hidden social or political aim. The victims are usually non-combatant targets. It…
Last modified: Jan 08, 2018

Digital sovereignty or Data sovereignty is all about storage and protection of an individual’s personal data in digital form on cloud. Data sovereignty demands that the individual’s data which is stored in the binary digital form in the cloud, must be kept within the country in which the individual resides…
Last modified: Jan 08, 2018

Serious doubts were raised on India’s Coastal security framework in the aftermath of 26-11-2008 Mumbai attacks. There was a need for complete overhaul of the coastal security system of the country. This article briefly reviews the changes in security apparatus, coastal security scheme and lacunae in the same. Key features of…
Last modified: Jan 08, 2018

Fake news refers to the fictitious articles / media that are deliberately circulated in the internet with the aim of deceiving the readers. The news creator earns a profit with every user clicking to view it. The visitors are given an impression that they are visiting a trusted source of…
Last modified: Feb 11, 2018

Recently, the Joint Armed Force Doctrine of India has been unveiled. It is a document that gives out the guiding principles behind the approach of the Indian military towards war fighting. They revolve around the approach towards the security concerns and tackling the threats in terms of military conflict. Origin…
Last modified: Jan 08, 2018

Currently, the Maoists are active in at least nine out of the 28 states making the dreaded red corridor. Because the Maoist insurgency so far has been a purely indigenous, mostly localized phenomenon, each state has developed its own approach to tackling Maoist violence according to that state government's own…