Lesson 3 of 14

Previous Years UPSC CSE Papers

Terrorism, Extremists (LWE, NE)

GS3 Syllabus Topics

  1. Linkages between Development & spread of Extremism;
  2. Linkages of Organized crime and Terrorism
  3. Linkages of Pakistan and Terrorism
The banning of ‘Jamaat-e –islaami’ in Jammu and Kashmir brought into focus the role of over-ground workers (OGWs) in assisting terrorist organizations. Examine the role played by OGWs in assisting terrorist organizations in insurgency affected areas. Discuss measures to neutralize influence of OGWs. (Answer in 150 words)2019
Left Wing Extremism (LWE) is showing a downward trend, but still affects many parts of the country. Briefly explain the Government of India’s approach to counter the challenges posed by LWE
2018
Mob violence is emerging as a serious law and order problem in India. By giving suitable examples, analyze the causes and consequences of such violence.
2017
The scourge of terrorism is a grave challenge to national security. What solutions do you suggest to curb this growing menace? What are the major sources of terrorist funding?
2017
The north-eastern region of India has been infested with insurgency for a very long time. Analyze the major reasons for the survival of armed insurgency in this region.
2017
“Terrorism is emerging as a competitive industry over the last few decades.” Analyse the above statement.
2016
The persisting drives of the government for development of large industries in backward areas have resulted in isolating the tribal population and the farmers who face multiple displacements with Malkangiri and Naxalbari foci, discuss the corrective strategies needed to win the left wing extremism (LWE) doctrine affected citizens back into the mainstream of social and economic growth.
2015
Religious indoctrination via digital media has resulted in Indian youth joining the ISIS. What is ISIS and its mission? How can ISIS be dangerous for the internal security of our country?
2015
Article 244 of Indian Constitution relates to Administration of Scheduled areas and tribal areas. Analyze the impact of non-implementation of the provisions of fifth schedule on the growth of Left Wing Extremism.2013

Cross border

GS3 Syllabus Topic: Border Areas (security challenges and management thereof); Security forces & agencies (mandate); Role of External State & Non-State actors in creating internal security challenges

Cross-border movement of insurgents is only one of the several security challenges facing the policing of the border in North-East India. Examine the various challenges currently emanating across the India-Myanmar border. Also discuss the steps to counter the challenges. (Answer in 250 words)
2019
The China-Pakistan Economic Corridor (CPEC) is viewed as a cardinal subset of China’s larger ‘One Belt One Road’ initiative. Give a brief description of CPEC and enumerate the reasons why India has distanced itself from the same.
2018
The terms ‘Hot Pursuit’ and ‘Surgical Strikes’ are often used in connection with armed action against terrorist attacks. Discuss the strategic impact of such actions.
2016
Border management is a complex task due to difficult terrain and hostile relations with some countries. Elucidate the challenges and strategies for effective border management.
2016
International civil aviation laws provide all countries complete and exclusive sovereignty over the airspace above the territory. What do you understand by airspace? What are the implications of these laws on the space above this airspace? Discuss the challenges which this poses and suggests ways to contain the threat.
2014
The diverse nature of India as a multireligious and multi-ethnic society is not immune to the impact of radicalism which has been in her neighbourhood. Discuss along with the strategies to be adopted to counter this environment.
2014
How illegal transborder migration does pose a threat to India’s security? Discuss the strategies to curb this, bring out the factors which give impetus to such migration.
2014
In 2012, the longitudinal marking of the high-risk areas for piracy was moved from 65° East to 78° east in the Arabian Sea by International Maritime organisation. What impact does this have on India’s maritime security concerns?
2014
China and Pakistan have entered into an agreement for development of an economic corridor. What thread does it dispose for India’s security? Critically examine.
2014
How far are India’s internal security challenges linked with border management, particularly in view of the long porous borders with most countries of South Asia and Myanmar?
2013

Organisational crime & money laundering

GS3 Syllabus Topic: 
Money laundering & Prevention

India’s proximity to two of the world’s biggest illicit opium-growing states has enhanced her internal security concerns. Explain the linkages between drug trafficking and other illicit activities such as gunrunning, money laundering and human trafficking. What counter-measures should be taken to prevent the same?
2018
Money laundering poses a serious threat to country’s economic sovereignty. What is its significance for India and what steps are required to be taken to control this menace?2013

Cyber security and social media

GS3 Syllabus Topic: Basics of Cyber Security; Role of media and social-networking sites in internal security challenges; Internal security challenges through communication networks

What is Cyber Dome Project? Explain how it can be useful in controlling internet crimes in India. (Answer in 150 words)2019
Data security has assumed significant importance in the digitized world due to rising cyber crimes. The Justice B. N. Srikrishna Committee Report addresses issues related to data security. What, in your view, are the strengths and weakness sof the Report relating to protection of personal data in cyber space?
2018 
Discuss the potential threats of Cyber attack and the security framework to prevent it.
2017 
Use of Internet and social media by non-state actors for subversive activities is a major concern. How have these have misused in the recent past? Suggest effective guidelines to curb the above threat.
2016 
Discuss the advantage and security implications of cloud hosting of server vis-a-vis in-house machine-based hosting for government businesses.
2015 
Considering the threats cyberspace poses for the country, India needs a “Digital Armed Force” to prevent crimes. Critically evaluate the National Cyber Security Policy, 2013 outlining the challenges perceived in its effective implementation.
2015 
What is digital signature? What does its authentication mean? Giver various salient built in features of a digital signature.
2013 
What are social networking site and what security implications do these sites present?
2013 
Cyber warfare is considered by some defense analysts to be a larger threat than even Al Qaeda or terrorism. What do you understand by Cyber warfare? Outline the cyber threats which India is vulnerable to and bring out the state of the country’s preparedness to deal with the same.2013 

Security Forces

Indian government has recently strengthened the anti-terrorism laws by amending the unlawful activities (Prevention) act (UAPA), 1967 and the NIA Act. Analyze the changes in the context of prevailing security environment while discussing the scope and reasons for opposing the UAPA by human rights organizations. (Answer in 250 words)
2019
Human rights activists constantly highlight the view that the Armed Forces (Special Powers) Act, 1958 (AFSPA) is a draconian act leading to cases of human rights abuses by the security forces. What sections of AFSPA are opposed by the activists? Critically evaluate the requirement with reference to the view held by the Apex Court.2015