Overview

Internal security encompasses all threats to the territorial integrity, sovereignty, and public order of India that originate within or across its borders but are managed by internal security forces. India faces a complex internal security environment shaped by its geography, diversity, porous borders, and rapid digitalisation.

This topic is divided into 26 detailed chapters covering the full spectrum of GS3 Internal Security. Work through them sequentially for a complete understanding, or jump to any chapter for targeted revision.

What You'll Cover

ChapterThemeKey Highlights
Ch 01Internal Security — Threats & ChallengesTerrorism, LWE overview, NE insurgency, money laundering, organised crime, security forces
Ch 02Left Wing Extremism & InsurgencyNaxalism origins, SAMADHAN doctrine, NE insurgent groups, AFSPA, peace accords
Ch 03Development-Extremism NexusUnderdevelopment as security threat, tribal displacement, LWE areas & development deficit, SAMADHAN, aspirational districts in conflict zones
Ch 04Insurgency in Northeast IndiaAFSPA, peace accords, Naga issue, Manipur, Assam, development strategy, Act East connectivity
Ch 05Border ManagementIndia's borders, guarding forces (BSF, ITBP, SSB, AR), smart fencing, coastal security
Ch 06LoC, LAC & Maritime Border ChallengesLine of Control dynamics, Line of Actual Control standoffs, maritime boundary disputes, Siachen, island territories
Ch 07Maritime & Coastal SecurityCoastal security scheme, Indian Navy & Coast Guard roles, island territories, maritime zones, blue economy threats, piracy, port security
Ch 08Proxy War, Hybrid Threats & RadicalisationNon-traditional security, cross-border terrorism, hybrid warfare, counter-radicalisation, de-radicalisation
Ch 09Counterterrorism & IntelligenceNIA, NSA, RAW, IB, NATGRID, MAC, UAPA, counter-radicalisation, Pulwama response
Ch 10Organised Crime & Terrorism FinancingDrug trafficking, human trafficking, PMLA, FATF, hawala, NIA, counterfeit currency
Ch 11Drug Trafficking & NarcoticsNDPS Act 1985, NCB, golden crescent & golden triangle, darknet trafficking, de-addiction policy
Ch 12Human Trafficking & Modern SlaveryLegal framework, ITPA, Trafficking Bill, rescue & rehabilitation, forced labour, child trafficking
Ch 13Radicalization & Counter-RadicalizationUAPA 2019, NIA, MHA CT division, ISIS recruitment in India, Kerala Operation Pigeon, Saudi MNCC, UK CHANNEL, deradicalization models
Ch 14Cyber SecurityCERT-In, NCIIPC, IT Act 2000, DPDP Act 2023, cyber warfare, critical infrastructure
Ch 15Cybercrime, IT Laws & Digital ForensicsIT Act 2000 (S.43/65/66/66A struck down/67/69), Shreya Singhal 2015, DPDP Act 2023 (₹250 crore penalty), CERT-In 6-hr reporting, I4C (1930 helpline), NCRB 2023 (86,420 cases), dark web, digital forensics, Budapest Convention non-signatory
Ch 16Information Warfare & PsyOpsPropaganda, psychological operations, disinformation campaigns, state-sponsored information warfare, social media manipulation
Ch 17Emerging Tech in Security — AI Surveillance & Cyber WarfareAI surveillance, facial recognition controversy, deepfakes, LAWS, NCIIPC, CCTNS, AFIS, Puttaswamy judgment, predictive policing
Ch 18CBRN Threats & WMD TerrorismChemical, biological, radiological and nuclear threat landscape, CBRN response framework, WMD conventions, India's preparedness
Ch 19Critical Infrastructure Protection & Space SecurityNCIIPC, ASAT, space debris, satellite security, critical infrastructure threats, emerging tech risks
Ch 20Non-Traditional Security ThreatsClimate security, resource conflicts, pandemics, food & water security, migration as security challenge
Ch 21Intelligence Agencies, NIA & NATGRIDIB (1887), RAW (1968, R.N. Kao), DIA (2002), NTRO (2004), NSC/NSA/NSAB, MAC, NATGRID (21 databases, fully operational 2020), NIA Act 2008, UAPA 2019 individual designation, Kargil Review Committee, Naresh Chandra Committee 2012
Ch 22Role of Media & Social NetworkingFake news, radicalisation, IT Rules 2021, internet shutdowns, deepfakes, regulation
Ch 23Security Forces & Paramilitary — CAPF Structure & MandateBSF (1965, ~2.57L), CRPF (1939, ~3.31L, largest CAPF), CISF (1969), ITBP (1962, LAC), SSB (2001), NSG Black Cats (1984), SPG (1985); MHA vs MoD; AFSPA; coordination challenges; modernisation
Ch 24Police Reforms & Criminal JusticePolice modernisation, Prakash Singh judgment, new criminal laws (BNS/BNSS/BSA), accountability
Ch 25New Criminal Laws — BNS, BNSS & BSABharatiya Nyaya Sanhita, Bharatiya Nagarik Suraksha Sanhita, Bharatiya Sakshya Adhiniyam — replacing IPC/CrPC/Evidence Act; key changes, implementation challenges
Ch 26Prison Reforms & RehabilitationPrison conditions, overcrowding, Model Prison Manual 2016, undertrials, rehabilitation programmes, Prison Statistics India

Exam Strategy: Internal Security is among the highest-scoring GS3 topics. Prelims tests institutional facts (CERT-In, FATF, BSF establishment year, IT Act sections). Mains demands analytical answers linking security with development (LWE), technology with rights (cyber security), and national security with free speech (media regulation). Always present both dimensions in your answers.


Sources: Ministry of Home Affairs (mha.gov.in), PIB Press Releases, CERT-In (cert-in.org.in), FATF (fatf-gafi.org), IT Act 2000 (indiacode.nic.in), DPDP Act 2023 (meity.gov.in)