Question : The China-Pakistan Economic Corridor (CPEC) is viewed as a cardinal subset of China’s larger “One Belt One Road” initiative. Give a brief description of CPEC and enumerate the reasons why India has distanced itself from the same.
(2018)
Answer : The China Pakistan Economic Corridor (CPEC) is a collection of infrastructure projects worth around $46 billion meant to deepen economic ties between China and Pakistan. The CPEC will connect China’s largest province Xinjiang with Pakistan’s Gwadar port in Baluchistan. It is part of BRI (Belt Road Initiative) of China.
India has distanced itself from the CPEC because:
While India’s overall stance on PoK remains understated, the commencement of the CPEC warrants more serious attention than what has been accorded so far. There is a need to carefully weigh the situation and devise a suitable and sustainable approach that could serve India’s long-term interests.
Question : Left Wing Extremism (LWE) is showing a downward trend, but still affects many parts of the country. Briefly explain the Government of India’s approach to counter the challengers posed by LWE.
(2018)
Answer : Forty-four districts in the country are no longer under the influence of Maoists or have negligible presence and most of the Left Wing Extremism is now confined only to 30 worst-hit districts. LWE violence has shrunk significantly in the last four years due to a multi-pronged strategy involving security and development-related measures.
In order to holistically address the LWE problem in an effective manner, Government has formulated National Policy and Action Plan adopting multi pronged strategy in the areas of security, development, ensuring rights and entitlements of local communities, etc.
Further, the Home Ministry has also enunciated an operational strategy ‘SAMADHAN’ to fight Left Wing Extremism. The elements of this strategy are S for Smart Leadership, A for Aggressive Strategy, M for Motivation and Training, A for Actionable Intelligence, D for Dashboard-based Key Result Areas and Key Performance Indicators, H for Harnessing Technology, A for Action Plan for Each Theatre and N for No access to Financing.
Question : Data security has assumed significant importance in the digitized world due to rising cybercrimes. The justice B.N Srikrishna Committee Report addresses issues related to data security. What, in your view, are the strengths and weaknesses of the Report relating the protection of personal data in cyberspace?
(2018)
Answer : India emerged as the third most vulnerable country in terms of risk of cyber threats, such as malware, spam and ransomware in 2017, moving up one place over previous year, according to a report by security solutions provider Symantec. In 2017, 5.09% of global threats detected were in India, slightly less than 5.11% in 2016.
The Srikrishna Committee’s report on data privacy and protection is a landmark report in many ways, given its multiple but critical touchpoints: a nascent but growing digital economy, the unmapped and uneasy relation between citizens (the committee calls them “data principals”) and data managers (“data fiduciaries”), the state’s contentious role, the legal dilemma of trying to constrain globally mobile data within local legislative jurisdictions, among many others.
Highlights of Srikrishna Committee Report on Data Protection
Loopholes in Recommendations
Question : India’s proximity to two of the world’s biggest illicit opium-growing states has enhanced her internal security concerns. Explain the linkages between drug trafficking and other illicit activities such as gunrunning, money laundering and human trafficking. What counter-measures should be taken to prevent the same?
(2018)
Answer : India is vulnerable to narcotic drug trafficking as it is located between two largest Opium producing regions of the world i.e. Golden Crescent in the West and Golden Triangle in the East. Drugs endanger peace, health and stability across regions. This increases the security concern of India across its borders.
These drug traffickers form cartels and organized crime collaborate once they get familiar with the ways to bypass the authorities and security to traffic human, drugs, money laundering, etc. Drug trafficking and organized crimes are intertwined and they are also correlated. Furthermore, drug trafficking has been the origin and is still the main source of income for many of the criminal organizations operating in the region.
The primary counter narcotics focus areas in India includes:
Other steps to be taken are:
Question : Discuss the potential threats of cyber attack and the security framework to prevent it.
(2017)
Answer : As the World is modernising, it is grappling with new avenues of attack, warfare and security. Before Wright Brothers invented airplane, there was no air force. Similarly, we have a new arena of virtual world, known as cyber world. This cyber world touches every aspect of human life and nation through internet, computer and other digital mediums. Therefore, potential threat of cyber attack may be more dangerous than physical attack.
Potential threats of cyber attack:
Security framework to prevent it
As every part of the World is developing cyber security, India is also preparing for it. Various initiatives by India are–
All these and many other initiatives are coordinated through National Cyber Security Policy, 2013. CERT-In is the nodal agency for all cyber security efforts. The post of National Cyber Security Coordinator was created in 2014. All of these create a very strong cyber security framework to prevent cyber attacks.
Works have been initiated to set up Indian Cyber Crime Coordination centre on the recommendation of Gulshan Rai Committee. But more needs to be done in the fields of creating cyber security experts. India has very few skilled cyber security experts. However, initiatives have been taken in this direction also. India and the World need the cyber army of cyber security experts to prevent the potential threat of cyber attacks.
Question : The North-East region of India has been infested with insurgency for a very long time. Analyze the major reasons for the survival of armed insurgency in this region.
(2017)
Answer : For a very long period North-East region played the role of Buffer region. Development had eluded the region. In this background, we have to analyse various complex reasons for survival of armed insurgency in the region.
Analysis of major reasons:
Lack of development is not only hindering the trade and business opportunities but affecting every aspect of the Indian citizens of North East India. Only few medical colleges and engineering colleges are there. Most of the regions are not even having higher education institutions for normal graduation. This fuels the feeling of alienation among the society of North East.
But, now the interest in North East development has revived and soon there will be effects of two pronged strategy to curb armed insurgency with development and strict law & order.
Question : Mob violence is emerging as a serious law and order problem in India. By giving suitable examples, analyze the causes and consequences of such violence.
(2017)
Answer : Law and order is a State Subject in the Indian Constitutional scheme. But, recent incidences of mob violence are not the case of simple law and order problem. It has become a complex issue with involvement of emotive public sentiment, ICT-based social media, religion and many other issues. Taking note of various example will help to analyse cause and consequence of such violence.
Various example of mob violence
There are many other examples also. These examples clearly indicate that in every part of India such mob violence is going on. It is not related with just 1-2 state’s law & order problem. There are many underlying trigger points, ranging from religion to political motivation. But these visible causes are not real. Real cause lies elsewhere.
Causes of Mob Violence
All the above-mentioned incidents and causes were the mere trigger points. The real cause lies in the criminal justice system, rule of law and public perception of it—
Consequences of mob violence
There are many legal consequences but economy and society is also affected badly.
[A] Legal & administrative consequences
[B] Economic consequences
Social consequence
Question : The scourge of terrorism is a grave challenge to national security. What solutions do you suggest to curb this growing menace? What are the major sources of terrorist funding?
(2017)
Answer : Terrorism is use of fear, terror and violence to achieve one’s objective. After the rise of ISIS to control terrorism has become further challenging.
Solution to the growing menace of terrorism
Major sources of terrorist funding
Question : The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in connection with armed action against terrorist attacks. Discuss the strategic impact of such actions.
(2016)
Answer : Surgical strike refers to swift and targeted attack on specific targets such as on enemy base located behind enemy lines, with an aim to neutralise them while ensuring minimum collateral damage to the surrounding areas and civilians. Hot pursuit means chasing an enemy behind the border of another nation when he is retracting.
The terms ‘hot pursuit’ and ‘surgical strike’ become a matter of public discussion after the Indian army carried out a surgical strike against terrorists along Indo-Pak border and the hot pursuit of Naga rebels behind Myanmar border.
Strategic impacts:
Question : “Terrorism is emerging as a competitive industry over the last few decades.” Analyze the above statement.
(2016)
Answer : Terrorism refers to unlawful use of violence in order to further the social, political or religious ideology of a group of people, referred to as terrorists.
Question : Border management is a complex task due to difficult terrain and hostile relations with some countries. Elucidate the challenges and strategies for effective border management.
(2016)
Answer : For India, with its 15,000 km of land border running through 17 states and coastline of 7500 km touching 12 states and union Territories, border management always poses a complex challenge. The international border traverses through different and adverse climatic conditions, physiography and relief.
Suggestions:
Question : Use of internet and social media by non-state actors for subversive activities is a major security concern. How have these been misused in the recent past? Suggest effective guidelines to curb the above threat.
(2016)
Answer : With the rise of Islamic State (IS) and the massive propaganda of their ideology through online platforms, the security challenge faced by intelligence agencies has become much more complex. Thousands have joined the ranks of terror outfits after being persuaded by the constant propaganda; and the ideology inspired lone-wolf attacks are on the rise throughout the world.
Suggestions:
Question : Human rights activists constantly highlight the view that the Armed Forces (Special Powers) Act, 1958 (AFSPA) is a draconian act leading to cases of human rights abuses by the security forces. What sections of AFSPA are opposed by the activists? Critically evaluate the requirement with reference to the view held by the Apex Court.
(2016)
Answer : The essence of the important sections of AFSPA, opposed by activists are as follows:
(a)Sec 4. gives the army powers to search premises and make arrests without warrants, to use force even to the extent of causing death, destroy arms/ammunition dumps, fortifications, shelters and hideouts and to stop, search and seize any vehicles.
(b)Sec 6. stipulates that arrested persons and seized property is to be handed over to the police with least possible delay.
(c)Sec 7. offers protection of personnel acting in good faith in their official capacity. Prosecution is permitted only with the sanction of the Central Govt.
Question : Religious indoctrination via digital media has resulted in Indian youth joining the ISIS. What is ISIS and its mission? How can ISIS be dangerous for the internal security of our country?
(2015)
Answer : The Islamic State of Iraq and the Syria is a Salafi jihadist militant group that adheres to an Islamic fundamentalist, Wahhabi doctrine of Sunni Islam. The mission of ISIS encompasses establishing a worldwide caliphate which is basically an idea of an enormous Islamic state that encompasses all Muslims worldwide. The group has named Abu Bakr al-Baghdadi as its caliph. As a caliphate, it claims religious, political and military authority over all Muslims worldwide. ISIS’s apparent strategy seems to be to overthrow the existing governments of unstable, heavily Muslim nations and establish their own theocratic state in its place. The path to this full-fledged Islamic State may be a very bloody one. Most Muslims won’t submit to Al-Baghdadi’s particularly brutal interpretation of Islam and ISIS’ have its own atrocious ways of dealing with such nonbelievers.
Question : The persisting drives of the government for development of large industries in backward areas have resulted in isolating the tribal population and the farmers who face multiple displacements with Malkangiri and naxalbari foci, discuss the corrective strategies needed to win the left wing extremism (LWE) doctrine affected citizens back into the mainstream of social and economic growth.
(2015)
Answer : According to RAW, Naxalism is the biggest internal security threat to India. The people in Naxalite zone want exactly the same things we want. They want basic amenities, infrastructure and opportunities to grow. Oppressed population, including tribes and rural dalits, wanted their share of land which was denied to them for generations. These conflicts go back to the failure to implement the 5th and 6th Schedules of the Constitution of India. Consider Odisha, one of the most mineral-rich states in the country. Like its mineral-rich neighbours Jharkhand and Chhattisgarh, Orissa is also encouraging steel, aluminium and power companies like POSCO, Vedanta etc to set up factories, promising them mines to extract iron ore, bauxite and coal, but it is witnessing people’s resistance to these projects because as per critics the state government signed pacts with various companies promising them thousands of acres of land without taking into account the concerns of locals. Such issues gave rise to the menace of naxalism. Landless farmers and peasants feel cheated for being denied cultivable lands on which they toiled for a pittance. Naxalite groups systematically capitalize on this resentment.
Question : Considering the threats cyberspace poses for the country, India needs a “Digital Armed Force” to prevent crimes. Critically evaluate the National Cyber Security Policy, 2013 outlining the challenges perceived in its effective implementation.
(2015)
Answer : With an aim to monitor and protect information and strengthen defenses from cyber attacks, the National Cyber Security Policy 2013 was released on July 2, 2013 by the Government of India. The purpose of this framework document is to ensure a secure and resilient cyberspace for citizens, businesses and the government. With rapid urbanization and the concept of smart cities, which mainly depends on information and communication technologies (ICT) to provide public services, we can expect cyber attacks on important infrastructures of the smart cities that are facilitated by ICT and technology. The Cyber Security Policy aims at protection of information infrastructure in cyberspace, reduce vulnerabilities, build capabilities to prevent and respond to cyber threats and minimize damage from cyber incidents through a combination of institutional structures, people, process, technology and cooperation.
Question : Foreign Direct Investment (fdi) in the defence sector is now said to be liberalised. What influence this is expected to have on Indian defence and economy in the short and long run?
(2015)
Answer : Production of the Indian defence product was entirely lying up in the government hands. The Defence sector was totally restricted for the private players to enter, until the defence industry in India was thrown open to the private sector in May 2001. However, the policy of increasing the FDI to 26% has failed to attract any substantive FDI in the defence Sector. With the increase in the cap to 49%, there will be following changes in the Indian Economy:
Question : “The diverse nature of India as a multi-religious and multi-ethnic society is not immune to the impact of radicalism which is seen in her neighbourhood”. Discuss along with the strategies to be adopted to counter this environment.
(2014)
Answer : India does remain threatened by terrorist attacks and, like all governments facing such dangers, has to defend the country against further deadly incidents. Counterterrorism measures need to be adopted to deal with the different ways in which these attacks are administered. The problems of terrorism are grave and real, and India needs to confront these challenges in a vigorous and forceful manner to prevent attacks from happening, and to prepare an adequate response mechanism when attacks occur.
Different strategies –
Question : How does illegal transborder migration pose a threat to India’s security? Discuss the strategies to curb this, bringing out the factors which give impetus to such migration.
(2014)
Answer : Large-scale and unchecked illegal immigration from neighboring countries like Bangladesh and Nepal has tremendous implications on India. India’s border states – North-East states and West Bengal – have been major entry points for millions of illegal immigrants from neighbouring countries.
For the Indian state, the security implications of large-scale migration from both Bangladesh and Nepal are varied but inter-related, given the complex nature of migration and the multiple identities that migrants profess. They cover demographic changes, growth of radicalism, particularly Islamic fundamentalism, regionalism, and more importantly, involvement and even encroachment of foreign powers on the country’s sovereign space. All these threats to territorial integrity, core values or socio-political practices of the Indian state interact, sometimes reinforcing each other.
Factors that give impetus to such migration are:
Strategies to curb
Question : In 2012, the longitudinal marking of the high-risk areas for piracy was moved from 65° East to 78° east in the Arabian Sea by the International Maritime Organisation. What impact does this have on India’s maritime security concerns?
(2014)
Answer : Following increasing cases of piracy near Somalia that occasionally extended as far as Lakshadweep, industry bodies working in tandem with International Maritime Organisation (IMO) and the Contact Group on Piracy off the Coast of Somalia (CGPCS) — constituted in 2009 following a U.N. resolution with States and international bodies as members to work together to rid the seas of piracy — decided to move the longitude marking off the high-risk area in the Arabian Sea from 65 degrees to 78 east. The new classification extended the high-risk area much closer to the Indian coast barring the nation’s territorial waters of 12 nautical miles. The guidelines for ships advise them on evasive action against piracy.
The changed classification resulted in ships hugging the Indian coast and often cruising in Indian territorial waters — from Mangalore to Kanyakumari — while transiting the Arabian Sea. Many of these merchant vessels have armed guards as allowed by IMO. The fallout of the classification was an exorbitant hike in insurance premiums of vessels bound for zones with enhanced risk. The premiums came down following deployment of armed guards on their ships, as most providers of security collaborated with insurance groups.
Question : China and Pakistan have entered into an agreement for development of an economic corridor. What threat does this pose for India’s security? Critically examine.
(2014)
Answer : China and Pakistan have kicked off their multi-billion dollar Economic Corridor project that passes through Pakistan-occupied Kashmir (PoK) by laying the foundation of a fenced four-lane motorway. Planned to connect Kashgar in China’s Xinjiang with Pakistan’s Gwadar Port in Balochistan province, the corridor is expected to serve as a terminal for China to pump oil procurement from Persian Gulf.
According to China, the Corridor a “flagship” project to strengthen its connectivity with neighbouring countries and an initiative set to aid strategic framework for pragmatic cooperation between the two nations. The two countries should facilitate the development of Gwadar Port in south-western Pakistan, strengthen cooperation in energy and electricity projects and the planned industrial parks along the corridor,
India has expressed its reservations to China over the corridor as it will pass through the PoK. It may weaken the claim of India over the PoK and it will make the issues of PoK an international dispute by China making claim about its interest in the region. China, meanwhile, defends the project saying it will help in regional development.
Question : Money Laundering poses a serious security threat to a country’s economic sovereignty. What is its significance for India and what steps are required to be taken to control this menace?
(2013)
Answer : India’s emerging status as financial centre, large system of cross border money flows and widely perceived tax avoidance problems, all constitute to money laundering. This process is of critical importance, as it enables the criminal to enjoy these profits without jeopardising their source.
Illegal arms sales, smuggling, and the activities of organised crime, including for example, drug trafficking and prostitution rings, can generate huge sums. Embezzlement, insider trading, bribery and computer fraud schemes can also produce large profits and create the incentive to “legitimise” the ill-gotten gains through money laundering.
Steps which are required to control this menace are as follows:
India has amended its Act recently in 2012, that is, Prevention of Money Laundering Act (2002) amendment in 2012 included clauses like concept of “reporting entity” and “corresponding laws” to link with law of other countries. It has also joined FATF (Financial Action Task Force) and various other international groups like Egmont group, etc. at global level in crusade against this menace. India has also gained Membership of the Eurasian Group (EAG).
India has joined the Task Force on Financial Integrity and Economic Development in order to bring greater transparency and accountability in the financial system.
Question : What are social networking sites and what security implications do these sites present?
(2013)
Answer : Social networking sites are broadly defined as, web based services that allow individuals to construct a public or semi-public profile within a bounded system, articulate a list of other users with whom they share a connection, and view and traverse their list of connection and those made by others within the system.
Example of some of the social networking sites are Face book, Twitter, LinkedIn, etc.
Security challenges which these sites present:
Question : Cyber warfare is considered by some defense analysts to be a larger threat than even Al Qaeda or terrorism. What do you understand by cyber warfare? Outline the cyber threats which India is vulnerable to and bring out the state of the country’s preparedness to deal with same.
(2013)
Answer : Cyber warfare is the fourth dimension of warfare apart from land, air and water arena. Cyber warfare is Internet-based conflict involving politically motivated attacks on information and information systems. Cyber warfare attacks can disable official websites and networks, disrupt or disable essential services, steal or alter classified data, and cripple financial systems -- among many other possibilities. In other words, it is a form of information warfare which is politically motivated to conduct sabotage and espionage.
The cyber threats to which India is vulnerable are:
The recent DRDO breach was a classical case of cyber war attack rather than mere hacking. It was an attack on India’s critical information infrastructure. Over the past few years, India has witnessed a growing number of cyber assaults, with government departments, particularly defence establishments, coming under attack. Hacker group ‘Anonymous’ carried out a series of Distributed Denial of Service (DDoS) attacks against a number of government websites, in retaliation against the alleged Internet censorship.
Indian Computer Emergency Response Team (CERT-In) and other agencies regularly review India’s preparedness to fight/ward off various cyber security threats including security on a regular basis. The Government has also set up a Committee to look into the aspects of interception of encrypted communications comprehensively for all types of services so as to address the needs of security agencies. Besides, the Government of India has showed its preparedness to tackle cyber threat by releasing National Cyber Security Policy, 2013.
The provisions of National Cyber Security Policy 2013, endorse India’s preparedness to address cyber threats. The provisions are:
Question : Article 244 of the Indian Constitution relates to administration of scheduled areas and tribal areas. Analyze the impact of non-implementation of the provisions of the Fifth Schedule on the growth of Left Wing Extremism.
(2013)
Answer : Article 244 (1) lays down the provisions of Fifth Schedule wherein Tribal Advisory Council need to be constituted, with (3/4) representative of scheduled tribe in the legislative assembly of state. It shall be the duty of TAC to advice on such matters pertaining to the welfare and advancement of scheduled tribe in the state, as referred by governor. Similarly, Article 244(2) deals with the provisions of regional and district councils in states like Meghalaya, Assam, Tripura and Mizoram.
Subjects of both Article 244(1) and 244 (2) deal with constituents like management of forests, allocation, occupation and the use of land, social customs and inheritance of property.
However, non-implementation of the provisions of 5th Schedule has had a considerable impact on the growth of left wing extremism. Under the Fifth Schedule, the Governors can not only direct that any particular law or part thereof may not apply to a Scheduled Area, but also make regulation for good governance and peace in these areas. The Governors can intervene in areas relating to-prohibition or restriction of the transfer of land by or among Scheduled Tribe members; regulation of allotment of land in such areas; and the regulation of money-lending activities. Hence, it is not merely a matter of coincidence that Left-Wing Extremism is prevalent in the Schedule V areas.
Reasons can be traced to:
Question : How far are India’s internal security challenges linked with border management particularly in view of the long porous borders with most countries of South Asia and Myanmar?
(2013)
Answer : India’s internal security is very complex and dynamic because of its diversified socio-economic and political background. Having hostile neighbours stretched on most of our north and west border also doesn’t help ease these problems and instead from time to time external forces have helped domestic dissidents in order to jeopardize India’s internal security. The infiltration of armed mercenary terrorists from Pakistan, mass migrations from Bangladesh into lower Assam, the smuggling of consumer goods and fake Indian currency from Nepal, the operations of ULFA militants from safe hideouts in Bhutan and the sanctuaries available to the insurgent groups of the north-eastern states in Myanmar and Bangladesh, have all posed serious security challenges before India.
Question : "The situation today is far different to that prevalent fifty years back when the Indus water treaty was signed." Highlight the complexity of the current challenges on both sides of the border in this regard. Do you think a review of the treaty is in India's best interest?
(2013)
Answer : The Indus Water Treaty was brokered between India and Pakistan by the World Bank in 1960. The treaty was a result of Pakistani fear that since the Source Rivers of the Indus basin were in India, it could potentially create droughts and famines in Pakistan, especially at times of war. As per the treaty, the water usage pattern was divided with India getting approximately 20% control over Indus water resources and the rest should be left untouched for Pakistan.
Question : Measures taken by the Indian Government to combat piracy in the Indian Ocean.
(2011)
Answer : Marine piracy has become a huge threat to the international marine shipping community. Laws recommending severe punitive actions are being written to penalise the wrongdoers. On account of increasing piracy threats in the oceanic area surrounding the country and other oceanic routes taken by Indian vessels, Indian authorities have also started taking serious measures to actively combat the insurgence of marine pirates.
Some of the oceanic channels highly tormented by ship piracy are the Gulf of Aden and the areas off Somali coast. The pirates’ insurgency causes to draft several proposals to counter the threat of maritime piracy. Some of the measures taken by Indian authorities are:-
Question : Critically examine the security and strategic implications of the so-called 'String of Pearls theory' for India.
(2011)
Answer : The "String of Pearls" refers to China's supposed aim to leverage diplomatic and commercial ties to build strategic bases stretching from the Middle East to southern China in order to protect its energy interests as well as "broader security objectives". The "String of Pearls" theory is based partially on the fact that China possesses one of the world's largest commercial shipping fleets and relies heavily on international maritime commerce. Energy imports carried on tankers from the Persian Gulf and Africa traverse often treacherous regions, including the threat of long-range pirates operating from Somalia. In accordance with those threats, China has developed diplomatic, economic and military relations with respective Indian Ocean countries. However, it is a large hypothetical leap to assert these relations are driven by a longer-term desire to construct actual military bases along its SLOC. There is no denying that China has an interest in building relations with strategically located countries, it is important to understand the great power context these countries face. To openly side with China over other regional powers, including India and the United States, would be extremely risky diplomacy for these smaller countries. Bangladesh's Chittagong port is the country's principal seaport, currently handling around 92% of its import-export trade. The cash-strapped government in Dhaka does not have the finances needed to modernize the port and China, a long standing ally, recently agreed to help fund upgrades. The strengthening of Sino-Bangladeshi relations is a matter of strategic concern for both India and the US. China's involvement in building a deep sea port was only for economic purposes. Prime Minister Sheikh Hasina said that Bangladesh was acting as a "bridge" between China and India and would never let its territory be used for military attacks. She said that the plans were part of her government's strategy to connect Bangladesh to the greater Asian region in order to develop its markets and promote economic growth "in the interest of the people of this country". China is also using the current port at Sittwe but its main interest is in the Kyaukphyu port in Rakine state and its access to the Bay of Bengal in order to pipe oil and gas from the Middle East and Africa to its land-locked southern and western hinterlands. Beijing is currently building two parallel oil and gas pipelines that will connect Kyaukphyu port to the Chinese city of Kunming in southern Yunnan province. It has also been interpreted by New Delhi as Chinese strategy to encircle India and its long term policy to reduce India's influence within South Asia. Growing Chinese influence in Indian Ocean region is a challenge to India's geopolitical importance in the region. As geopolitical influence is a zero sum game, increase in Chinese influence will lead to decrease in Indian influence.
Question : Trace the progress of India's efforts for a joint counter-terrorism strategy with China. What are the likely implications of the recent Xinjiang violence on these efforts?
(2011)
Answer : India signed the Joint Counter-terrorism mechanism with China in 2002 recognizing that "terrorism anywhere is a threat everywhere." It was one among many such bilateral mechanisms signed by India with other countries after the 9/11 attacks. A significant addition was made to this mechanism in 2005, the Joint counter-terrorism was extended to include "separatism and extremism", so as to suit Chinese problem of Uighur extremism and Dalai Lama's separatism movement. Despite the working of this bilateral mechanism since 2002, Beijing's policy, like that of the US, shows a marked disinclination to hold Pakistan accountable for the jihadi terrorism in the Indian Territory. The recent incidents in Xinjiang and its probable links with the ISI, though has not led to any change in China's policy except supporting Pakistan for its efforts towards dismantling terrorism, and it is this aspect which has strategic implication for India.
Question : You arrive first at the scene where a bus accident has just occurred. What emergency measures should you immediately and safely adopt?
(2010)
Question : Critically examine the implications of the disintegration of the Soviet Union on India’s security and responses would you suggest in India’s foreign policy to accommodate these implications.
(2010)
Answer : During the Cold War years, India while not a member of any bloc due to her non-aligned activism enjoyed a proximate relationship with Soviet Union. This proximate relationship embraced intense political, economic and military cooperation. With the disintegration of Soviet Union in 1991, India’s security and strategic interests were badly impacted. At that time Soviet Union was one of the largest and most trusted suppliers of defence equipments and technology to India. As Soviet Union disintegrated and consequently the United States emerged as the only super-power, Russian defence supplies to India declined to a great extent. With pressure from the United States, which believed the engines and technology could be diverted to ballistic missile development, led the Russians to cancel most of the deal in July 1993.
Question : Your view on the recent 'Gilgit-Baltistan Empowerment and Self Governance Order 2009'
(2009)
Answer : The Gilgit-Baltistan Empowerment and Self Governance Order 2009' seemed to have further strengthen the terrorist foot hold in the region. The ordinance had granted the political autonomy to Pakistan's Northern Areas. It assigned the region a new identity of Gilgit-Baltistan. The granting of Legislative Assembly of Gilgit-Baltistan the autonomy in making laws on certain subjects of internal security and governance will substantially empower the extremists to expand their power and activities that would have anticipated implications on India's internal security.
Question : In the Context of recent incidents, suggest measures on how security of passengers and property can be improved over Indian railways?
(2009)
Answer : The Indian Railways is the third largest railway network of the world, but in the context of the people that it carries every day, it is the largest transportation system of the world. On the contrary, everyday Indian railway carries single Australia in itself.
Question : Write brief notes on Wakhan Corridor
(2009)
Answer : The Wakhan Corridor is roughly 210 kilometres long land corridor that forms the northeastern extremity of Afghanistan in the Pamir Mountains. It is a sparsely located place with geostrategical importance. It separates the Gorno-Badakhshan region of Tajikistan from the North-West Frontier Province and Gilgit-Baltistan of Pakistan. Afghanistan has asked China on several occasions to open the border in the Wakhan Corridor as an alternative supply route for fighting the Taliban, however China has resisted, largely due to unrest in its far western province of Xinjiang which borders the corridor.
Question : What, in your opinion, are the causes of terrorism? Suggest suitable measures to deal with the threat of terrorism in India.
(2008)
Answer : Terrorism is not a new phenomenon. Over the years the face of terrorism has changed. It has become more lethal, more widespread more different to control. Terrorism is the random use of violence to achieve political ends that inflicts damage on innocent people and property, creating terror or fear in them. The terrorist aim at focusing, attention on his problem by destroying innocent people besides property. Almost all the countries are facing the problem of terrorism. Political, economic and social causes are some of the causes for mushrooming of terrorism.
Question : Write about Terrorism sources in Pakistan and Afghanistan.
(2006)
Answer : Whether it's 9/11, the Bali bomb blast, Indian parliament attack or Mumbai local train blast, Pakistan is always the connection. That's raises some questions. The roots of Pakistan's reputation as a haven for jihadists run deep. It was, after all, in the city of Peshawar that Al-Qaeda was born after ISI, Pakistan's military intelligence, started to recruit Arabs to fight in the Afghan jihad. It was ISI that turned the Taliban from a bunch of religious students into a movement that took over Afghanistan. According to Hamid Karzai, president of Afghanistan, ISI continues to provide a safe haven, training them to fight British soldiers in Helmand. According to one source, in 1987, 90% of all reported terrorist activities worldwide were located in Pakistan. Intelligence agencies around the world have long suspected Pakistan as the source of extremism, and terrorism. The culture of unregulated madrassas have made Pakistan ideally situated to house terrorist training camps that carry out operations in South Asia and around the world. Pakistan has between 10000 and 40000 religious schools or madrassas. A small number of these are supposed to provide military training which give inspiration to European extremists of South Asian descent. Pakistan has used Islamist militants to fight its wars in Afghanistan and Kashmir.
Question : What are Cyber Crimes? How are these protected?
(2004)
Answer : Cyber Crimes consist of specific crimes dealing with computers and networks (such as hacking) and the facilitation of traditional crime through the use of computer (child pornography, hate crimes, telemarketing/internet fraud). Cyber-crimes can be protected by passing stringent laws, developing security codes and use of digital signatures.