Q. What is the news? Recently 1,040 militants of five militant groups of Karbi Anglong district ceremonially laid down arms at an event in Guwahati in the presence of Chief Minister Sarbananda Sonowal, a development which further bolsters the ‘terrorism-free Assam’ image of the current BJP-led government. Among the surrendered militants is Ingti Kathar Songbijit, a primary accused in multiple casesRead more
Tag Archives: internal Security
The Naga insurgency has been a major threat to India’s security and integrity and can destabilize multiple states in north-eastern India. Elaborate. Also discuss various measures taken by the governments in handling the issue.
Approach: Introduce the issue of Naga insurgency. Explain its impact on security of India as well as that in northeastern states. Provide measures undertaken by Government especially Naga peace accord. Conclude appropriately. Model Answer : Ever since Indian Independence, the Naga Insurgency has taken many forms, including the demands for secessionism to wanton violence. The Naga Insurgency at present isRead more
In Jammu & Kashmir, Pakistan is fighting a hybrid war, and Indian response should also be in the hybrid domain”. Discuss.
Approach: Introduce with Hybrid conflict Talk about how Pakistan indulges in regular and hybrid wars against India and India’s response Discuss why India needs to engage in hybrid war and what it involves Conclude appropriately Model Answer : Hybrid war is one fought through a combination of conventional, irregular (efforts to win legitimacy and influence over the populations), and asymmetricRead more
Proactive policing Security forces are no longer reactive. Example of Gariaband region in Chhattisgarh: When the Maoists decided to deepen their roots into Gariaband, the State government notified this division as a new district (in 2012). This gave a fillip to development work. Many new police stations and security camps were set up to prevent any major Maoist attack. The cadreRead more
What is Cyberwar? Cyberwar is a form of war which takes places on computers and the Internet, through electronic means rather than physical ones. With an increasing global reliance on technology for everything from managing national electrical grids to ordering supplies for troops, cyberwar is a method of attack which many nations are vulnerable to. In cyberwar, people use technologicalRead more
It is a malicious software that blocks access to computers and data until a sum of money is paid. NotPetya is the second major global ransomware since WannaCry, which had infected about 3,00,000 computers across 200 countries in May. Similar to WannaCry, one of the means by which Petya spread was by exploiting the MS12-010 vulnerability, also known as EternalBlue.Read more