Overview

Internal security encompasses all threats to the territorial integrity, sovereignty, and public order of India that originate within or across its borders but are managed by internal security forces (as distinguished from external defence handled by the armed forces).

India faces a complex internal security environment shaped by its geography, diversity, porous borders, and rapid digitalisation.


Internal Security Challenges

A. Terrorism

Type Description Key Examples
Cross-border Terrorism State-sponsored or non-state actors infiltrating from neighbouring countries Infiltration from Pakistan via LoC; 26/11 Mumbai attacks (2008)
Homegrown Terrorism Radicalisation of Indian citizens through ideology or online propaganda Lone-wolf attacks, ISIS-inspired modules
Narco-terrorism Drug trafficking funding terrorist operations Golden Crescent (Afghanistan-Iran-Pakistan) route; Punjab drug menace

B. Left Wing Extremism (LWE) / Naxalism

Origin: The Naxal movement traces its origin to the 1967 peasant uprising in Naxalbari, West Bengal.

Parameter Details
Ideology Maoist — armed overthrow of the state through protracted people's war
Peak Spread Nearly 180 districts across 10+ states in the late 2000s (the "Red Corridor")
Current Status (2025) Reduced to approximately 11 affected districts; only 3 categorised as "Most LWE Affected"
Most Affected Districts Bijapur, Sukma, Narayanpur (Chhattisgarh); West Singhbhum (Jharkhand); Gadchiroli (Maharashtra)
Violence Trend LWE violence incidents declined from 1,936 in 2010 to 222 in 2025 — an 89% reduction
Recent Operations Operation Black Forest (April–May 2025) — Chhattisgarh-Telangana border; 31 insurgents neutralised

Government Strategy:

  • Security approach — CRPF/COBRA deployment, area domination
  • Development approach — road connectivity, mobile towers, banking access
  • Rights-based approach — Forest Rights Act implementation, tribal welfare

C. Insurgency in North-East India

State/Region Key Groups Current Status
Nagaland NSCN (I-M), NSCN (K) Ceasefire with NSCN (I-M) since 1997; Naga Peace Accord framework signed 2015
Manipur UNLF, PLA, PREPAK Ethnic tensions between valley and hill communities
Assam ULFA, NDFB ULFA (Pro-talks) in peace process; significant reduction in violence
Mizoram Peace since 1986 Mizo Accord Model of successful conflict resolution
Tripura NLFT, ATTF Largely peaceful; groups surrendered
Meghalaya GNLA, HNLC Low-intensity activity

Root Causes: Ethnic identity assertion, perceived neglect by mainland India, porous Myanmar border, demand for autonomy/sovereignty.


Cyber Security

Institutional Framework

Organisation Established Parent Body Mandate
CERT-In (Indian Computer Emergency Response Team) 2004 Ministry of Electronics & IT National nodal agency for cyber incident response; issues alerts and advisories
NCIIPC (National Critical Information Infrastructure Protection Centre) 2014 National Technical Research Organisation (NTRO) Protection of Critical Information Infrastructure (CII) — power, banking, telecom, transport, government, strategic sectors
National Cyber Coordination Centre (NCCC) 2017 MeitY Real-time cyber threat monitoring and metadata analysis
Cyber Crime Coordination Centre (I4C) 2020 Ministry of Home Affairs Coordination framework for law enforcement agencies on cybercrime

Information Technology Act, 2000

The IT Act 2000 is India's primary legislation dealing with cybercrime and electronic commerce. It was passed on 9 May 2000 and came into force on 17 October 2000. The Act was significantly amended in 2008.

Section Provision
Section 43 Penalty for damage to computer systems — compensation up to Rs 5 crore
Section 43A Organisations must implement reasonable security practices for sensitive data
Section 65 Tampering with computer source documents — imprisonment up to 3 years
Section 66 Computer-related offences (hacking, data theft) — imprisonment up to 3 years
Section 66F Cyber terrorism — acts threatening sovereignty, integrity, or security of India; punishment up to life imprisonment
Section 69 Power to intercept, monitor, or decrypt information for national security
Section 69A Power to block public access to information on the internet
Section 79 Safe harbour for intermediaries — conditional immunity from third-party content

Digital Personal Data Protection Act, 2023

The DPDP Act received Presidential assent on 11 August 2023 — India's first comprehensive data protection law.

Feature Details
Scope Applies to digital personal data processed within India and by foreign entities serving Indian users
Consent Framework Data processing only for lawful purpose with consent; exemptions for legitimate uses (state services, voluntary sharing)
Children's Data Verifiable parental consent required; no behavioural monitoring or targeted advertising for children
Significant Data Fiduciaries Government can designate entities handling large-scale data; must appoint Data Protection Officers
Data Protection Board Adjudicates disputes on data breaches
Penalties Rs 50 crore to Rs 250 crore for non-compliance

Major Cyber Threats to India

Threat Description
Phishing & Social Engineering Fraudulent emails/messages to steal credentials
Ransomware Encrypting systems and demanding payment for decryption
State-sponsored Cyber Attacks Espionage targeting defence, nuclear, space infrastructure
Disinformation Campaigns Coordinated fake news to influence public opinion or create communal tension
Critical Infrastructure Attacks Targeting power grids, banking systems, transportation networks

Border Management

India's Borders at a Glance

Border Length (approx.) Guarding Force Key Challenges
India–Pakistan 3,323 km BSF (Border Security Force) Infiltration, terrorism, smuggling, ceasefire violations
India–China (LAC) 3,488 km ITBP (Indo-Tibetan Border Police) Undefined boundary, standoffs, infrastructure asymmetry
India–Bangladesh 4,096 km BSF Illegal immigration, cattle smuggling, narcotics
India–Myanmar 1,643 km Assam Rifles Insurgent safe havens, arms and drug trafficking, Free Movement Regime
India–Nepal 1,751 km SSB (Sashastra Seema Bal) Open border; misuse for smuggling and infiltration
India–Bhutan 699 km SSB Relatively peaceful; some insurgent activity in past
Coastline 7,516 km Indian Coast Guard + state marine police Maritime terrorism (post-26/11), smuggling, poaching

Key Border Guarding Forces

Force Established Key Facts
BSF 1 December 1965 Raised after the 1965 Indo-Pak War; world's largest border security force; ~2.65 lakh personnel
ITBP 24 October 1962 Raised after the 1962 Indo-China war; guards the LAC from Karakoram Pass to Jachep La
Assam Rifles 1835 Oldest paramilitary force in India; dual control — administrative under MHA, operational under Indian Army
SSB 1963 Originally for border areas development; re-designated for border guarding of Nepal and Bhutan borders
Indian Coast Guard 1 February 1977 Maritime law enforcement, coastal security, search and rescue

Smart Fencing and Technology

Technology Application
CIBMS (Comprehensive Integrated Border Management System) Sensors, cameras, laser barriers, radar on India-Pakistan and India-Bangladesh borders
BOLD-QIT (Border Electronically Dominated QRT Interception Technique) Deployed in riverine/marshy areas of India-Bangladesh border
Drone surveillance UAVs for border patrol in difficult terrain
Tunnel detection Ground Penetrating Radar to detect cross-border tunnels

Money Laundering

Prevention of Money Laundering Act (PMLA), 2002

The PMLA was enacted in January 2003 and came into force on 1 July 2005.

Feature Details
Definition (Section 3) Any process or activity connected with proceeds of crime, projecting it as untainted property
Punishment Rigorous imprisonment 3–7 years; up to 10 years for narcotics-related offences
Property Attachment Provisional attachment of proceeds of crime for 180 days by ED (Enforcement Directorate)
Adjudicating Authority Confirms attachment or orders confiscation
Appellate Tribunal Hears appeals against Adjudicating Authority orders
Special Courts Sessions courts designated to try PMLA offences
FIU-IND Financial Intelligence Unit — receives suspicious transaction reports from banks and financial institutions

FATF (Financial Action Task Force)

Parameter Details
Established 1989 at the G7 Summit in Paris
Headquarters Paris, France
Members 40 member jurisdictions (as of 2023)
Purpose Sets international standards to combat money laundering and terrorist financing
Key Tools 40 Recommendations on money laundering; 9 Special Recommendations on terrorist financing
Grey List Countries with strategic deficiencies in AML/CFT — subject to increased monitoring
Black List High-risk jurisdictions — counter-measures applied
India's Status Full member since 2010; currently not on grey or black list

Organised Crime

Type Description Key Legislation
Drug Trafficking International cartels and local networks NDPS Act, 1985
Human Trafficking Forced labour, sexual exploitation, organ trade IPC Sections 370-373; Immoral Traffic (Prevention) Act, 1956
Arms Smuggling Illegal weapons supply to insurgents and criminals Arms Act, 1959
Hawala Transactions Informal value transfer system bypassing banking channels FEMA, 1999; PMLA, 2002
Counterfeit Currency Fake Indian Currency Notes (FICN) — threats to economic stability IPC Sections 489A-489E
Extortion & Protection Rackets Organised gangs extracting payments from businesses MCOCA, 1999 (Maharashtra); KOCA (Karnataka)

Role of Media & Social Media in Security

Aspect Positive Role Negative Role
Information Raises awareness about security threats Can leak sensitive operational details
Accountability Holds security forces accountable for excesses Trial by media undermines due process
Counter-narrative Platforms for government to counter extremist propaganda Used for radicalisation, recruitment by terrorist groups
Community policing Citizens report suspicious activity via social media Fake news triggers mob violence, communal riots
Crisis communication Real-time disaster/emergency alerts Panic spreading through unverified rumours

Government Measures

  • IT Act Section 69A — power to block online content threatening national security
  • IT Rules, 2021 — intermediary guidelines requiring traceability and content moderation
  • Social media monitoring cells by state police and intelligence agencies
  • Fact-checking units to counter disinformation

Security Forces and Their Mandate

Force Ministry Primary Mandate
CRPF (Central Reserve Police Force) MHA Internal security, counter-insurgency, anti-Naxal operations
BSF (Border Security Force) MHA Border guarding (India-Pakistan, India-Bangladesh)
CISF (Central Industrial Security Force) MHA Protection of critical infrastructure — airports, nuclear plants, metro
ITBP (Indo-Tibetan Border Police) MHA India-China border guarding
SSB (Sashastra Seema Bal) MHA India-Nepal and India-Bhutan border guarding
Assam Rifles MHA (admin) / Army (ops) Counter-insurgency in NE India; India-Myanmar border
NSG (National Security Guard) MHA Counter-terrorism, hostage rescue (Black Cat commandos)
NIA (National Investigation Agency) MHA Investigation of terrorism and national security offences (NIA Act, 2008)
RAW (Research & Analysis Wing) Cabinet Secretariat External intelligence
IB (Intelligence Bureau) MHA Domestic intelligence

Important for UPSC

Prelims Focus

  • CERT-In establishment (2004), parent ministry (MeitY)
  • IT Act 2000 — key sections (66, 66F, 69A)
  • DPDP Act, 2023 — date, penalties, scope
  • FATF — establishment (1989), headquarters (Paris), members (40)
  • PMLA, 2002 — enacted January 2003, enforced 1 July 2005
  • BSF (1965), ITBP (1962), Assam Rifles (1835), NDRF (2006)
  • Naxal movement origin — Naxalbari, 1967

Mains Dimensions

  • Linkages between terrorism, organised crime, and money laundering — how PMLA and FATF address the financing chain
  • Cyber security as the fifth domain of warfare — need for cyber doctrine, critical infrastructure protection
  • Border management challenges — technology vs manpower, riverine borders, Free Movement Regime
  • LWE — security vs development debate — is the decline sustainable without addressing root causes?
  • Social media regulation — balancing national security with freedom of expression

Interview Angles

  • "How would you handle fake news spreading communal tension in your district?"
  • "Should India have a dedicated cyber command?"
  • "What is the biggest internal security challenge India faces today?"
  • "How can technology improve border management?"

Previous Year Questions (PYQs)

Prelims

Q1. (2019): Consider the following statements about the National Investigation Agency (NIA):

  1. It was established under the NIA Act, 2008.
  2. It can investigate terror-related cases across India without requiring permission from the state government.

Which of the statements given above is/are correct? (a) 1 only (b) 2 only (c) Both 1 and 2 (d) Neither 1 nor 2 Answer: (c) (Prelims PYQ, GS Paper I)

Q2. (2018): Consider the following statements about CERT-In:

  1. It is the national nodal agency for responding to computer security incidents.
  2. It functions under the Ministry of Electronics and Information Technology.

Which of the statements given above is/are correct? (a) 1 only (b) 2 only (c) Both 1 and 2 (d) Neither 1 nor 2 Answer: (c) (Prelims PYQ, GS Paper I)

Q3. (2020): Consider the following statements about the Financial Action Task Force (FATF):

  1. It was established in 1989 at the G7 Summit.
  2. Its headquarters is in Paris, France.
  3. India is a full member of the FATF.

Which of the above statements is/are correct? (a) 1 and 2 only (b) 2 and 3 only (c) 1 and 3 only (d) 1, 2 and 3 Answer: (d) (Prelims PYQ, GS Paper I)

Mains

Q4. (2019): Indian Government has recently strengthened the anti-terrorism laws by amending the Unlawful Activities (Prevention) Act (UAPA), 1967 and the NIA Act. Analyze the changes in the context of prevailing security environment while discussing the scope and reasons for opposing the UAPA by human rights organizations. (GS Paper III, 250 words)

Q5. (2019): Cross-border movement of insurgents is only one of the several security challenges facing the policing of the border in North-East India. Examine the various challenges currently emanating across the India-Myanmar border. Also, discuss the steps to counter the challenges. (GS Paper III, 250 words)

Q6. (2020): Analyze internal security threats and transborder crimes along Myanmar, Bangladesh and Pakistan borders including Line of Control (LoC). Also discuss the role played by various security forces in this regard. (GS Paper III, 250 words)


Current Affairs Connect

Resource Link
Ujiyari — Security News Ujiyari — Security News
Ujiyari — Editorials Ujiyari — Editorials
Ujiyari — Daily Updates Ujiyari — Daily Updates

Sources: Ministry of Home Affairs — LWE Division (mha.gov.in); PIB Press Releases on LWE and border management; CERT-In (cert-in.org.in); NDMA (ndma.gov.in); FATF (fatf-gafi.org); IT Act 2000 (indiacode.nic.in); DPDP Act 2023 (meity.gov.in).