Overview
Internal security encompasses all threats to the territorial integrity, sovereignty, and public order of India that originate within or across its borders but are managed by internal security forces (as distinguished from external defence handled by the armed forces).
India faces a complex internal security environment shaped by its geography, diversity, porous borders, and rapid digitalisation.
Internal Security Challenges
A. Terrorism
| Type | Description | Key Examples |
|---|---|---|
| Cross-border Terrorism | State-sponsored or non-state actors infiltrating from neighbouring countries | Infiltration from Pakistan via LoC; 26/11 Mumbai attacks (2008) |
| Homegrown Terrorism | Radicalisation of Indian citizens through ideology or online propaganda | Lone-wolf attacks, ISIS-inspired modules |
| Narco-terrorism | Drug trafficking funding terrorist operations | Golden Crescent (Afghanistan-Iran-Pakistan) route; Punjab drug menace |
B. Left Wing Extremism (LWE) / Naxalism
Origin: The Naxal movement traces its origin to the 1967 peasant uprising in Naxalbari, West Bengal.
| Parameter | Details |
|---|---|
| Ideology | Maoist — armed overthrow of the state through protracted people's war |
| Peak Spread | Nearly 180 districts across 10+ states in the late 2000s (the "Red Corridor") |
| Current Status (2025) | Reduced to approximately 11 affected districts; only 3 categorised as "Most LWE Affected" |
| Most Affected Districts | Bijapur, Sukma, Narayanpur (Chhattisgarh); West Singhbhum (Jharkhand); Gadchiroli (Maharashtra) |
| Violence Trend | LWE violence incidents declined from 1,936 in 2010 to 222 in 2025 — an 89% reduction |
| Recent Operations | Operation Black Forest (April–May 2025) — Chhattisgarh-Telangana border; 31 insurgents neutralised |
Government Strategy:
- Security approach — CRPF/COBRA deployment, area domination
- Development approach — road connectivity, mobile towers, banking access
- Rights-based approach — Forest Rights Act implementation, tribal welfare
C. Insurgency in North-East India
| State/Region | Key Groups | Current Status |
|---|---|---|
| Nagaland | NSCN (I-M), NSCN (K) | Ceasefire with NSCN (I-M) since 1997; Naga Peace Accord framework signed 2015 |
| Manipur | UNLF, PLA, PREPAK | Ethnic tensions between valley and hill communities |
| Assam | ULFA, NDFB | ULFA (Pro-talks) in peace process; significant reduction in violence |
| Mizoram | Peace since 1986 Mizo Accord | Model of successful conflict resolution |
| Tripura | NLFT, ATTF | Largely peaceful; groups surrendered |
| Meghalaya | GNLA, HNLC | Low-intensity activity |
Root Causes: Ethnic identity assertion, perceived neglect by mainland India, porous Myanmar border, demand for autonomy/sovereignty.
Cyber Security
Institutional Framework
| Organisation | Established | Parent Body | Mandate |
|---|---|---|---|
| CERT-In (Indian Computer Emergency Response Team) | 2004 | Ministry of Electronics & IT | National nodal agency for cyber incident response; issues alerts and advisories |
| NCIIPC (National Critical Information Infrastructure Protection Centre) | 2014 | National Technical Research Organisation (NTRO) | Protection of Critical Information Infrastructure (CII) — power, banking, telecom, transport, government, strategic sectors |
| National Cyber Coordination Centre (NCCC) | 2017 | MeitY | Real-time cyber threat monitoring and metadata analysis |
| Cyber Crime Coordination Centre (I4C) | 2020 | Ministry of Home Affairs | Coordination framework for law enforcement agencies on cybercrime |
Information Technology Act, 2000
The IT Act 2000 is India's primary legislation dealing with cybercrime and electronic commerce. It was passed on 9 May 2000 and came into force on 17 October 2000. The Act was significantly amended in 2008.
| Section | Provision |
|---|---|
| Section 43 | Penalty for damage to computer systems — compensation up to Rs 5 crore |
| Section 43A | Organisations must implement reasonable security practices for sensitive data |
| Section 65 | Tampering with computer source documents — imprisonment up to 3 years |
| Section 66 | Computer-related offences (hacking, data theft) — imprisonment up to 3 years |
| Section 66F | Cyber terrorism — acts threatening sovereignty, integrity, or security of India; punishment up to life imprisonment |
| Section 69 | Power to intercept, monitor, or decrypt information for national security |
| Section 69A | Power to block public access to information on the internet |
| Section 79 | Safe harbour for intermediaries — conditional immunity from third-party content |
Digital Personal Data Protection Act, 2023
The DPDP Act received Presidential assent on 11 August 2023 — India's first comprehensive data protection law.
| Feature | Details |
|---|---|
| Scope | Applies to digital personal data processed within India and by foreign entities serving Indian users |
| Consent Framework | Data processing only for lawful purpose with consent; exemptions for legitimate uses (state services, voluntary sharing) |
| Children's Data | Verifiable parental consent required; no behavioural monitoring or targeted advertising for children |
| Significant Data Fiduciaries | Government can designate entities handling large-scale data; must appoint Data Protection Officers |
| Data Protection Board | Adjudicates disputes on data breaches |
| Penalties | Rs 50 crore to Rs 250 crore for non-compliance |
Major Cyber Threats to India
| Threat | Description |
|---|---|
| Phishing & Social Engineering | Fraudulent emails/messages to steal credentials |
| Ransomware | Encrypting systems and demanding payment for decryption |
| State-sponsored Cyber Attacks | Espionage targeting defence, nuclear, space infrastructure |
| Disinformation Campaigns | Coordinated fake news to influence public opinion or create communal tension |
| Critical Infrastructure Attacks | Targeting power grids, banking systems, transportation networks |
Border Management
India's Borders at a Glance
| Border | Length (approx.) | Guarding Force | Key Challenges |
|---|---|---|---|
| India–Pakistan | 3,323 km | BSF (Border Security Force) | Infiltration, terrorism, smuggling, ceasefire violations |
| India–China (LAC) | 3,488 km | ITBP (Indo-Tibetan Border Police) | Undefined boundary, standoffs, infrastructure asymmetry |
| India–Bangladesh | 4,096 km | BSF | Illegal immigration, cattle smuggling, narcotics |
| India–Myanmar | 1,643 km | Assam Rifles | Insurgent safe havens, arms and drug trafficking, Free Movement Regime |
| India–Nepal | 1,751 km | SSB (Sashastra Seema Bal) | Open border; misuse for smuggling and infiltration |
| India–Bhutan | 699 km | SSB | Relatively peaceful; some insurgent activity in past |
| Coastline | 7,516 km | Indian Coast Guard + state marine police | Maritime terrorism (post-26/11), smuggling, poaching |
Key Border Guarding Forces
| Force | Established | Key Facts |
|---|---|---|
| BSF | 1 December 1965 | Raised after the 1965 Indo-Pak War; world's largest border security force; ~2.65 lakh personnel |
| ITBP | 24 October 1962 | Raised after the 1962 Indo-China war; guards the LAC from Karakoram Pass to Jachep La |
| Assam Rifles | 1835 | Oldest paramilitary force in India; dual control — administrative under MHA, operational under Indian Army |
| SSB | 1963 | Originally for border areas development; re-designated for border guarding of Nepal and Bhutan borders |
| Indian Coast Guard | 1 February 1977 | Maritime law enforcement, coastal security, search and rescue |
Smart Fencing and Technology
| Technology | Application |
|---|---|
| CIBMS (Comprehensive Integrated Border Management System) | Sensors, cameras, laser barriers, radar on India-Pakistan and India-Bangladesh borders |
| BOLD-QIT (Border Electronically Dominated QRT Interception Technique) | Deployed in riverine/marshy areas of India-Bangladesh border |
| Drone surveillance | UAVs for border patrol in difficult terrain |
| Tunnel detection | Ground Penetrating Radar to detect cross-border tunnels |
Money Laundering
Prevention of Money Laundering Act (PMLA), 2002
The PMLA was enacted in January 2003 and came into force on 1 July 2005.
| Feature | Details |
|---|---|
| Definition (Section 3) | Any process or activity connected with proceeds of crime, projecting it as untainted property |
| Punishment | Rigorous imprisonment 3–7 years; up to 10 years for narcotics-related offences |
| Property Attachment | Provisional attachment of proceeds of crime for 180 days by ED (Enforcement Directorate) |
| Adjudicating Authority | Confirms attachment or orders confiscation |
| Appellate Tribunal | Hears appeals against Adjudicating Authority orders |
| Special Courts | Sessions courts designated to try PMLA offences |
| FIU-IND | Financial Intelligence Unit — receives suspicious transaction reports from banks and financial institutions |
FATF (Financial Action Task Force)
| Parameter | Details |
|---|---|
| Established | 1989 at the G7 Summit in Paris |
| Headquarters | Paris, France |
| Members | 40 member jurisdictions (as of 2023) |
| Purpose | Sets international standards to combat money laundering and terrorist financing |
| Key Tools | 40 Recommendations on money laundering; 9 Special Recommendations on terrorist financing |
| Grey List | Countries with strategic deficiencies in AML/CFT — subject to increased monitoring |
| Black List | High-risk jurisdictions — counter-measures applied |
| India's Status | Full member since 2010; currently not on grey or black list |
Organised Crime
| Type | Description | Key Legislation |
|---|---|---|
| Drug Trafficking | International cartels and local networks | NDPS Act, 1985 |
| Human Trafficking | Forced labour, sexual exploitation, organ trade | IPC Sections 370-373; Immoral Traffic (Prevention) Act, 1956 |
| Arms Smuggling | Illegal weapons supply to insurgents and criminals | Arms Act, 1959 |
| Hawala Transactions | Informal value transfer system bypassing banking channels | FEMA, 1999; PMLA, 2002 |
| Counterfeit Currency | Fake Indian Currency Notes (FICN) — threats to economic stability | IPC Sections 489A-489E |
| Extortion & Protection Rackets | Organised gangs extracting payments from businesses | MCOCA, 1999 (Maharashtra); KOCA (Karnataka) |
Role of Media & Social Media in Security
| Aspect | Positive Role | Negative Role |
|---|---|---|
| Information | Raises awareness about security threats | Can leak sensitive operational details |
| Accountability | Holds security forces accountable for excesses | Trial by media undermines due process |
| Counter-narrative | Platforms for government to counter extremist propaganda | Used for radicalisation, recruitment by terrorist groups |
| Community policing | Citizens report suspicious activity via social media | Fake news triggers mob violence, communal riots |
| Crisis communication | Real-time disaster/emergency alerts | Panic spreading through unverified rumours |
Government Measures
- IT Act Section 69A — power to block online content threatening national security
- IT Rules, 2021 — intermediary guidelines requiring traceability and content moderation
- Social media monitoring cells by state police and intelligence agencies
- Fact-checking units to counter disinformation
Security Forces and Their Mandate
| Force | Ministry | Primary Mandate |
|---|---|---|
| CRPF (Central Reserve Police Force) | MHA | Internal security, counter-insurgency, anti-Naxal operations |
| BSF (Border Security Force) | MHA | Border guarding (India-Pakistan, India-Bangladesh) |
| CISF (Central Industrial Security Force) | MHA | Protection of critical infrastructure — airports, nuclear plants, metro |
| ITBP (Indo-Tibetan Border Police) | MHA | India-China border guarding |
| SSB (Sashastra Seema Bal) | MHA | India-Nepal and India-Bhutan border guarding |
| Assam Rifles | MHA (admin) / Army (ops) | Counter-insurgency in NE India; India-Myanmar border |
| NSG (National Security Guard) | MHA | Counter-terrorism, hostage rescue (Black Cat commandos) |
| NIA (National Investigation Agency) | MHA | Investigation of terrorism and national security offences (NIA Act, 2008) |
| RAW (Research & Analysis Wing) | Cabinet Secretariat | External intelligence |
| IB (Intelligence Bureau) | MHA | Domestic intelligence |
Important for UPSC
Prelims Focus
- CERT-In establishment (2004), parent ministry (MeitY)
- IT Act 2000 — key sections (66, 66F, 69A)
- DPDP Act, 2023 — date, penalties, scope
- FATF — establishment (1989), headquarters (Paris), members (40)
- PMLA, 2002 — enacted January 2003, enforced 1 July 2005
- BSF (1965), ITBP (1962), Assam Rifles (1835), NDRF (2006)
- Naxal movement origin — Naxalbari, 1967
Mains Dimensions
- Linkages between terrorism, organised crime, and money laundering — how PMLA and FATF address the financing chain
- Cyber security as the fifth domain of warfare — need for cyber doctrine, critical infrastructure protection
- Border management challenges — technology vs manpower, riverine borders, Free Movement Regime
- LWE — security vs development debate — is the decline sustainable without addressing root causes?
- Social media regulation — balancing national security with freedom of expression
Interview Angles
- "How would you handle fake news spreading communal tension in your district?"
- "Should India have a dedicated cyber command?"
- "What is the biggest internal security challenge India faces today?"
- "How can technology improve border management?"
Previous Year Questions (PYQs)
Prelims
Q1. (2019): Consider the following statements about the National Investigation Agency (NIA):
- It was established under the NIA Act, 2008.
- It can investigate terror-related cases across India without requiring permission from the state government.
Which of the statements given above is/are correct? (a) 1 only (b) 2 only (c) Both 1 and 2 (d) Neither 1 nor 2 Answer: (c) (Prelims PYQ, GS Paper I)
Q2. (2018): Consider the following statements about CERT-In:
- It is the national nodal agency for responding to computer security incidents.
- It functions under the Ministry of Electronics and Information Technology.
Which of the statements given above is/are correct? (a) 1 only (b) 2 only (c) Both 1 and 2 (d) Neither 1 nor 2 Answer: (c) (Prelims PYQ, GS Paper I)
Q3. (2020): Consider the following statements about the Financial Action Task Force (FATF):
- It was established in 1989 at the G7 Summit.
- Its headquarters is in Paris, France.
- India is a full member of the FATF.
Which of the above statements is/are correct? (a) 1 and 2 only (b) 2 and 3 only (c) 1 and 3 only (d) 1, 2 and 3 Answer: (d) (Prelims PYQ, GS Paper I)
Mains
Q4. (2019): Indian Government has recently strengthened the anti-terrorism laws by amending the Unlawful Activities (Prevention) Act (UAPA), 1967 and the NIA Act. Analyze the changes in the context of prevailing security environment while discussing the scope and reasons for opposing the UAPA by human rights organizations. (GS Paper III, 250 words)
Q5. (2019): Cross-border movement of insurgents is only one of the several security challenges facing the policing of the border in North-East India. Examine the various challenges currently emanating across the India-Myanmar border. Also, discuss the steps to counter the challenges. (GS Paper III, 250 words)
Q6. (2020): Analyze internal security threats and transborder crimes along Myanmar, Bangladesh and Pakistan borders including Line of Control (LoC). Also discuss the role played by various security forces in this regard. (GS Paper III, 250 words)
Current Affairs Connect
| Resource | Link |
|---|---|
| Ujiyari — Security News | Ujiyari — Security News |
| Ujiyari — Editorials | Ujiyari — Editorials |
| Ujiyari — Daily Updates | Ujiyari — Daily Updates |
Sources: Ministry of Home Affairs — LWE Division (mha.gov.in); PIB Press Releases on LWE and border management; CERT-In (cert-in.org.in); NDMA (ndma.gov.in); FATF (fatf-gafi.org); IT Act 2000 (indiacode.nic.in); DPDP Act 2023 (meity.gov.in).