Overview
Internal security encompasses all threats to the territorial integrity, sovereignty, and public order of India that originate within or across its borders but are managed by internal security forces. India faces a complex internal security environment shaped by its geography, diversity, porous borders, and rapid digitalisation.
This topic is divided into 26 detailed chapters covering the full spectrum of GS3 Internal Security. Work through them sequentially for a complete understanding, or jump to any chapter for targeted revision.
What You'll Cover
| Chapter | Theme | Key Highlights |
|---|---|---|
| Ch 01 | Internal Security — Threats & Challenges | Terrorism, LWE overview, NE insurgency, money laundering, organised crime, security forces |
| Ch 02 | Left Wing Extremism & Insurgency | Naxalism origins, SAMADHAN doctrine, NE insurgent groups, AFSPA, peace accords |
| Ch 03 | Development-Extremism Nexus | Underdevelopment as security threat, tribal displacement, LWE areas & development deficit, SAMADHAN, aspirational districts in conflict zones |
| Ch 04 | Insurgency in Northeast India | AFSPA, peace accords, Naga issue, Manipur, Assam, development strategy, Act East connectivity |
| Ch 05 | Border Management | India's borders, guarding forces (BSF, ITBP, SSB, AR), smart fencing, coastal security |
| Ch 06 | LoC, LAC & Maritime Border Challenges | Line of Control dynamics, Line of Actual Control standoffs, maritime boundary disputes, Siachen, island territories |
| Ch 07 | Maritime & Coastal Security | Coastal security scheme, Indian Navy & Coast Guard roles, island territories, maritime zones, blue economy threats, piracy, port security |
| Ch 08 | Proxy War, Hybrid Threats & Radicalisation | Non-traditional security, cross-border terrorism, hybrid warfare, counter-radicalisation, de-radicalisation |
| Ch 09 | Counterterrorism & Intelligence | NIA, NSA, RAW, IB, NATGRID, MAC, UAPA, counter-radicalisation, Pulwama response |
| Ch 10 | Organised Crime & Terrorism Financing | Drug trafficking, human trafficking, PMLA, FATF, hawala, NIA, counterfeit currency |
| Ch 11 | Drug Trafficking & Narcotics | NDPS Act 1985, NCB, golden crescent & golden triangle, darknet trafficking, de-addiction policy |
| Ch 12 | Human Trafficking & Modern Slavery | Legal framework, ITPA, Trafficking Bill, rescue & rehabilitation, forced labour, child trafficking |
| Ch 13 | Radicalization & Counter-Radicalization | UAPA 2019, NIA, MHA CT division, ISIS recruitment in India, Kerala Operation Pigeon, Saudi MNCC, UK CHANNEL, deradicalization models |
| Ch 14 | Cyber Security | CERT-In, NCIIPC, IT Act 2000, DPDP Act 2023, cyber warfare, critical infrastructure |
| Ch 15 | Cybercrime, IT Laws & Digital Forensics | IT Act 2000 (S.43/65/66/66A struck down/67/69), Shreya Singhal 2015, DPDP Act 2023 (₹250 crore penalty), CERT-In 6-hr reporting, I4C (1930 helpline), NCRB 2023 (86,420 cases), dark web, digital forensics, Budapest Convention non-signatory |
| Ch 16 | Information Warfare & PsyOps | Propaganda, psychological operations, disinformation campaigns, state-sponsored information warfare, social media manipulation |
| Ch 17 | Emerging Tech in Security — AI Surveillance & Cyber Warfare | AI surveillance, facial recognition controversy, deepfakes, LAWS, NCIIPC, CCTNS, AFIS, Puttaswamy judgment, predictive policing |
| Ch 18 | CBRN Threats & WMD Terrorism | Chemical, biological, radiological and nuclear threat landscape, CBRN response framework, WMD conventions, India's preparedness |
| Ch 19 | Critical Infrastructure Protection & Space Security | NCIIPC, ASAT, space debris, satellite security, critical infrastructure threats, emerging tech risks |
| Ch 20 | Non-Traditional Security Threats | Climate security, resource conflicts, pandemics, food & water security, migration as security challenge |
| Ch 21 | Intelligence Agencies, NIA & NATGRID | IB (1887), RAW (1968, R.N. Kao), DIA (2002), NTRO (2004), NSC/NSA/NSAB, MAC, NATGRID (21 databases, fully operational 2020), NIA Act 2008, UAPA 2019 individual designation, Kargil Review Committee, Naresh Chandra Committee 2012 |
| Ch 22 | Role of Media & Social Networking | Fake news, radicalisation, IT Rules 2021, internet shutdowns, deepfakes, regulation |
| Ch 23 | Security Forces & Paramilitary — CAPF Structure & Mandate | BSF (1965, ~2.57L), CRPF (1939, ~3.31L, largest CAPF), CISF (1969), ITBP (1962, LAC), SSB (2001), NSG Black Cats (1984), SPG (1985); MHA vs MoD; AFSPA; coordination challenges; modernisation |
| Ch 24 | Police Reforms & Criminal Justice | Police modernisation, Prakash Singh judgment, new criminal laws (BNS/BNSS/BSA), accountability |
| Ch 25 | New Criminal Laws — BNS, BNSS & BSA | Bharatiya Nyaya Sanhita, Bharatiya Nagarik Suraksha Sanhita, Bharatiya Sakshya Adhiniyam — replacing IPC/CrPC/Evidence Act; key changes, implementation challenges |
| Ch 26 | Prison Reforms & Rehabilitation | Prison conditions, overcrowding, Model Prison Manual 2016, undertrials, rehabilitation programmes, Prison Statistics India |
Exam Strategy: Internal Security is among the highest-scoring GS3 topics. Prelims tests institutional facts (CERT-In, FATF, BSF establishment year, IT Act sections). Mains demands analytical answers linking security with development (LWE), technology with rights (cyber security), and national security with free speech (media regulation). Always present both dimensions in your answers.
Sources: Ministry of Home Affairs (mha.gov.in), PIB Press Releases, CERT-In (cert-in.org.in), FATF (fatf-gafi.org), IT Act 2000 (indiacode.nic.in), DPDP Act 2023 (meity.gov.in)
BharatNotes