0% found this document useful (0 votes)
8 views28 pages

Internal Security

The document outlines the significance of current affairs in preparing for the Civil Services Examination (CSE) and presents a series by BYJU'S IAS to help students cover essential topics from May 2022 to April 2023. It includes statistics on the number of current affairs questions asked in previous UPSC Prelims and emphasizes the importance of connecting these topics with static portions of the syllabus. Additionally, it discusses critical information infrastructure and cybersecurity measures in India, highlighting the role of the National Critical Information Infrastructure Protection Centre and recent cybersecurity regulations by CERT-In.

Uploaded by

chphanikiran9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views28 pages

Internal Security

The document outlines the significance of current affairs in preparing for the Civil Services Examination (CSE) and presents a series by BYJU'S IAS to help students cover essential topics from May 2022 to April 2023. It includes statistics on the number of current affairs questions asked in previous UPSC Prelims and emphasizes the importance of connecting these topics with static portions of the syllabus. Additionally, it discusses critical information infrastructure and cybersecurity measures in India, highlighting the role of the National Critical Information Infrastructure Protection Centre and recent cybersecurity regulations by CERT-In.

Uploaded by

chphanikiran9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

2023

PART I
Dear Student,

As you know, current affairs is of utmost importance for clearing the preliminary stage of the
coveted Civil Services Examination (CSE). Therefore, we at BYJU'S IAS would like to help you
understand its importance. Below we have shared the number of questions asked from current
affairs in the past 4 years in UPSC Prelims.

Year No. of Questions from Current Affairs


2018 14
2019 22
2020 18
2021 27

We would also like to bring forth our Prelims Value Addition Series, an endeavour by BYJU’S
to help you score the maximum in this section.

This series will be released in four parts on a quarterly basis. In those four parts, we will
comprehensively cover the “Current events of national and international importance” from
May 2022 to April 2023, which is an integral part of the syllabus for the Civil Services Preliminary
Examination 2023. In the first part we will cover current affairs from the month of May 2021 to
till July 2022.

This series has been created keeping in mind the demand and evolving nature of CSE, time
constraint of the student to study and revise multiple subjects, and attempting test series, etc.
We have put in our sincere efforts to keep the series concise yet comprehensive to meet the
demands of the preliminary stage of CSE.

We advise the student to read this series, connect the topics with the static portion and revise it at
least twice before appearing for the examination.

1 | INTERNAL SECURITY
CONTENT
Challenges to Security through Communication Networks ________ 03-05
1.1 Critical Information Infrastructure

Cyber Security ________________________________________________ 06-13


2.1 Long-awaited National Cyber Security Strategy
2.2 CERT-In’s New Cybersecurity Norms
2.3 Pegasus Issue
2.4 Lapsus$ Cyberattacks

Various Securities Forces and Agencies and their Mandate ________ 14-18
3.1 NATGRID
3.2 Operation Satark
3.3 Operation Dudhi
3.4 Defence Exercises in the News

Miscellaneous ________________________________________________ 19-26


4.1 Operation Rakth Chandan
4.2 Operation Namkeen
4.3 Astra Mk1 Air-to-Air Missile
4.4 INS Surat and INS Udaygiri
4.5 INS Nirdeshak
4.6 INS Sindhudhvaj Decommissioned
4.7 China Launches Hi-Tech Carrier

2 | INTERNAL SECURITY
CHALLENGES TO SECURITY
THROUGH COMMUNICATION
NETWORKS
01
1.1 Critical Information
Infrastructure

1.1 Critical Information • Violation:


Infrastructure o Any person who secures access or
attempts to secure access to a
Context: Recently, the Union Ministry of protected system in violation of the
Electronics and Information Technology law can be punished with a jail term
(MeITy) has declared the IT resources of ICICI of up to 10 years.
Bank, HDFC Bank and National Payments
Corporation of India (NPCI) as Critical Need for classification and protection of CII
Information Infrastructure. • Interconnectedness of various sectors:
o IT resources form the backbone of
About Critical Information Infrastructure countless critical operations in a
(CII) country’s infrastructure and given
• Definition: their interconnectedness, disruptions
o Section 70 of the Information can have a cascading effect across
Technology Act, 2000, defines Critical sectors.
Information Infrastructure (CII) as a • New form of warfare:
“Computer resource, the o Cyber warfare opens the possibilities
incapacitation or destruction of which for state and non-state actors to target
shall have a debilitating impact on internet-dependent critical systems of
national security, economy, public other countries.
health or safety”. o It is necessary for a country to fortify its
o The Act designated any computer cyberspace and protect its Critical
resource which directly or indirectly Information Infrastructure (CII).
affects the facility of CII to be a o India: In October 2020, the electric grid
protected system. supply to Mumbai suddenly snapped,
o Failure of a Critical Information hitting the mega city’s hospitals, trains
Infrastructure will have a devastating and businesses. It could have been a
impact on: cyber attack, allegedly from a China-
▪ National economic strength linked group, aimed at critical
▪ National image. infrastructure.
▪ National defence and security o Global: In 2007, a wave of Denial-Of-
▪ Government's capability to Service (DOS) attacks, allegedly from
function Russian IP addresses, hit major
▪ Public health and safety Estonian banks, government bodies,
• Power of Government: Ministries and Parliament, and media
o Under the Act, the Central outlets.
government has the power to declare
any data, database, IT network or
communications infrastructure as CII
to protect that digital asset.

3 | INTERNAL SECURITY
• Global practices: Challenges in Protecting Critical
o Across the globe, countries are Infrastructure
formulating specific policies and • Private and Public Perspectives:
agencies dedicated to protecting o Critical Infrastructure Installations
critical infrastructures. developed under both private and
o Eg: The National Infrastructure public entities have diverse and
Protection Plan (NIPP, 2013 of US), divergent interests.
Critical Infrastructure Resilience o This induces issues related to sharing
Strategy of Australia, the European of responsibilities, implementation of
Programme for Critical Infrastructure regulations and division of powers
Protection (EPCIP), etc. among them.
• Information Sharing and Analysis:
How are Critical Information Infrastructures o In the absence of clearly defined roles
protected in India? and responsibilities, duties and a
• Nodal Agency: definite command structure,
o National Critical Information
information sharing among the entities
Infrastructure Protection Centre
is not seamless.
(NCIIPC) is the nodal agency for
• Scale and Unlimited Boundaries:
taking all measures to protect the
o Critical infrastructures are
nation’s critical information
geographically spread across the
infrastructure.
length and breadth of the country
• Mandate of NCIIPC:
which makes it a daunting task to affix
o NCIIPC is mandated to guard CIIs
the areas of responsibility.
from unauthorised access,
• Expanding Network:
modification, use, disclosure,
o Critical infrastructures are growing
disruption, incapacitation or
day by day, as new facilities,
distraction.
industries, technologies, equipment
o All the CII organisations are bound to
and processes are continuously being
operate under the guidelines of
added to the already existing massive
NCIIPC, covering various aspects of
network.
the cybersecurity life cycle and its
o Formulating policies and protection
effective implementation.
strategies need periodic calibration to
include the changes and risks brought
in by the expanding network of CIIs
• Complexity and Interdependencies:
o Critical infrastructures are complex
and difficult to understand in terms of
their behaviour.
o Failure of any CII will have a cascading
effect across other sectors and cause
unpredictable consequences.
• Human Element:
o There is always a possibility of
• Functions of NCIIPC: human-induced error or a deliberate
o It will monitor and forecast national- attempt on part of the employee(s),
level threats to CII for policy leading to compromise in the system
guidance, expertise sharing and itself or sensitive information relating
situational awareness for early to the critical infrastructure operations.
warning or alerts. • Endless Vulnerabilities and Limited
o In the event of any threat to Critical Knowledge:
Information Infrastructure, the o The knowledge and understanding of
NCIIPC may call for information and the technologies underpinning critical
give directions to the critical sectors or infrastructure, and their respective
persons serving or having a critical vulnerabilities, is limited and the
impact on Critical Information research in this field is at a nascent
Infrastructure. stage.

4 | INTERNAL SECURITY
Initiatives to Improve Cyber Security in India

5 | INTERNAL SECURITY
CYBER SECURITY
02
2.1 Long-awaited National Cyber 2.2 CERT-In’s New Cybersecurity
Security Strategy Norms
2.3 Pegasus Issue 2.4 Lapsus$ Cyberattacks

2.1 Long-awaited National Cyber Indian National Cyber Security Strategy 2021
Security Strategy • The strategy is prepared by the Data
Security Council of India (DSCI).
Context: Amid a surge in cyberattacks on • Objective: To ensure a safe, secure,
India’s networks, the Centre is yet to trusted, resilient, and vibrant cyberspace
implement the National Cyber Security for India.
Strategy which has been in the works since • It is based on 3 main pillars
2020. o Secure the National Cyber Space.
o Strengthen the Structure, Processes,
People and Capabilities.
o Synergise the Resources including
Cooperation and Collaboration.

Figure: Illustration on Cyber Security


Source: The Indian Express

What is Cyber Security?


• According to IBM, Cybersecurity is
protecting critical systems and sensitive
information from digital attacks.
• Cybersecurity measures are designed to
combat threats against networked Figure: facets of national Cyber Security
systems and applications, whether those Source: Data Security Council of India
threats originate from inside or outside of
an organisation. Main sectors of focus:
• Large-scale digitisation of public services:
o Focus on security in the early stages of
design in all digitisation initiatives.
o Developing institutional capability for
assessment, evaluation, certification.
o Rating of the core devices and timely
reporting of vulnerabilities and
incidents.

6 | INTERNAL SECURITY
• Supply chain security: 2.2 CERT-In’s New Cybersecurity
o Monitoring and mapping of the supply Norms
chain of the Integrated Circuits (IC)
and electronics products. Context: India's recently proposed
o Scaling up product testing and cybersecurity regulations by CERT-In are
certification. seeing more resistance.
o Leverage the country’s semiconductor
design capabilities globally at the
strategic, tactical and technical level.
• Critical information infrastructure
protection:
o Integrating Supervisory Control and
Data Acquisition (SCADA) security
with enterprise security.
o Maintaining a repository of
vulnerabilities, preparing an aggregate
level security baseline of the sector and
tracking its controls. Figure: CERT-In New Cyber Security
o Devising audit parameters for threat Directives
preparedness and developing cyber- Source: The Economic Times
insurance products.
• Digital payments: Details:
o Mapping and modelling of devices and • Recently, the Indian Computer Emergency
platforms deployed, supply chain, Response Team (CERT-In) notified a new
transacting entities, payment flows. set of directions relating to information
o Threat research and sharing of threat security practices, procedures, prevention,
intelligence, timely disclosure of response and reporting of cyber incidents
vulnerabilities. for a safe and trusted internet.
• State-level cyber security: o These directions were released under
o Developing state-level cybersecurity Section 70B(6) of the Information
policies. Technology Act, 2000.
o Allocation of dedicated funds, critical • One of the directions under these new
scrutiny of digitization plans, cybersecurity norms by CERT-In requires
guidelines for security architecture, virtual private networks (VPNs) to
operations, and governance. preserve a wide range of data on their
• Security of small and medium businesses: customers for five years.
o Policy intervention in cybersecurity o This regulation has received
granting incentives for a higher level of opposition letters from eleven industry
cybersecurity preparedness. organisations from around the world
o Developing security standards, including prominent VPN providers.
frameworks, and architectures for the ▪ The business of VPN providers
adoption of the Internet of Things (IoT) involves ensuring anonymity of
and industrialisation. their users on the Internet. Hence,
they have also threatened that they
may remove their servers from
India.
• As per reports, the Directive for VPNs to
preserve a wide range of data on their
customers for five years may not apply to
enterprise and corporate VPN providers.

7 | INTERNAL SECURITY
o Sovereignty and Integrity of
Virtual Private Network (VPN)
India: Protect India's sovereignty
• As the name suggests, VPN helps in
or integrity, as well as public order,
establishing a secure connection when
defence, state security, good
using a public network.
relations with other countries, and
• The internet traffic of a VPN user is
the prevention of any crimes
encrypted and their online identity is
committed utilising computer
disguised. The encryption takes place in
resources.
real time.
• Thus, third party tracking and data theft of (B) Synchronisation of ICT System Clocks:
online activities of a VPN user is made
• For synchronisation of their
difficult.
information and communications
• The IP address of a VPN user is hidden by technology (ICT) system clocks,
letting the network redirect it through a covered persons and government
specially configured remote server run by a organisations are obligated to connect
VPN host. This means that the VPN server to:
becomes the source of the data. o Network Time Protocol (NTP)
• This hides the information about the server of the National Informatics
websites visited, or the data sent or received Centre (NIC), or
online by the VPN user from Internet o The National Physical Laboratory
Service Provider (ISP) and other third (NPL), or
parties. o To servers traceable to these NTP
o The VPN, basically. converts the data in servers.
incomprehensible form which cannot • In case of covered persons having
be read by the ISP or third party. operations spread across multiple
geographies, other accurate and
Computer Emergency Response Team - India standard time sources can also be used
(CERT-In) by them.
• CERT-In is an organisation of the Ministry o These sources can be used as long
of Electronics & Information Technology as their time source does not
(Me&ITy), Government of India. deviate from NTP of NIC or NPL.
• Its mission is to enhance the security of
India’s Communications and Information
Infrastructure through proactive actions Time Servers or National Time
and effective collaborations. Protocol (NTP)
• It provides Incident Prevention and • The information and
Response Services as well as Security communications technology (ICT)
Quality Management Services. clock times can be synchronised in
a network using this protocol.
• The time acquired from external
About CERT-In Directions:
source is used by the protocol to
These guidelines aim to improve the nation's
maintain time within its local
overall cyber security posture and guarantee a
internal clock, and then, relay to
secure and reliable Internet.
connected network.
• It serves the purposes of time
(A) Objectives of the Directions:
stamping.
• The directions by CERT-In to increase
o Time stamping is essential for
and enhance India's cyber security
determining the chain of events
resilience have two main objectives
that occurred on the network.
which are discussed below.
o Close Information Flow Gap: In
order to undertake analysis,
investigations, and coordination
on the occurrence of a cyber event,
it is important to close the
information flow gap connected to
cyber occurrences.

8 | INTERNAL SECURITY
(C) Mandatory Reporting of Cyber Incidents 2.3 Pegasus Issue
to CERT-In
• All covered entities must notify CERT- Context:
In of cybersecurity problems within • The Supreme Court of India would be
six hours of noticing such incidents or hearing the case pertaining to the alleged
receiving knowledge about them, use of the Pegasus spyware software later
according to the organisation's this month (July 2022).
cybersecurity mandate. • A year has passed since the disclosures
• It also enlists 20 incidents which need about the potential use of Pegasus spyware
to be reported such as targeted on targets in India including journalists,
scanning of critical network/systems, politicians, Cabinet Ministers, holders of
compromises of critical systems, constitutional positions, etc.
unauthorised access of IT systems and
data assets, malicious code attacks,
identity theft, fake apps, spoofing and
phishing attacks, incidents affecting
digital payment systems, etc.
• Hence, it tightens the timeline and
adds 10 new items to the list of
reportable incidents.

(D) Powers of CERT-In:


• As per the Directions, for purposes of
cyber incident response, CERT-In can
issue certain orders/directions to
Covered Persons that it deems fit for Figure: Pegasus Spyware
cyber security mitigation actions and Source: The Quint
situational awareness.
• A Point of Contact (POC) needs to be Details about the news:
designated by every Covered Person • Till now, the Indian government has
and government organisation. CERT- neither confirmed nor denied that it has
In shall interface with POC for cyber deployed Pegasus for any operation.
incidents, information requisitions, • The Centre has also refused to file a public
and issuance of directions. affidavit before the Supreme Court
arguing that such a public affidavit would
(E) Log Retention: compromise national security.
• Logs of all ICT systems used by all • The Supreme Court in October 2021 has
Covered Persons and government appointed a three-member Technical
organisations must be enabled and Committee, headed by retired Supreme
kept for 180 days within India. Court judge R V Raveendran, to inquire,
• These should be given whenever an investigate and determine, among other
event is reported, or as and when things, if Pegasus was used to eavesdrop
instructed by CERT-In. on phones and other devices of Indian
citizens.
(F) User Data Collection and Retention:
• The directives require data centres,
providers of virtual private servers,
cloud services, and virtual private
network services to accurately collect
and store certain subscriber-related
information for at least five years after
the subscriber stops using the
underlying services.

9 | INTERNAL SECURITY
About Pegasus: • Impact of spyware:
• What is Pegasus? o The Pegasus spyware can not only
o Pegasus is a spyware that is installed provide access to virtually all the data,
on the phones of the target victims including texts, emails, photos and
without their knowledge. WhatsApp chats but can also activate a
o It is introduced via an innocuous link phone’s camera and microphone and
that downloads the malware onto the turn it into a spying device without the
device and uses “zero-click” attacks owner’s knowledge.
wherein the phones are infected o The devices affected by the spyware
without any action from the target will end up giving total control to the
individual. person spying on the user.
o It can also be delivered through a • Targets:
nearby wireless transmitter, or o The potential targets in India include
manually inserted if the target phone is journalists, politicians, Cabinet
physically available. Ministers, holders of constitutional
o Once inside the phone, Pegasus can positions, etc.
start transmitting any data stored on • Detection:
the phone to its command-and-control o The presence of spyware in the phone
centres. cannot be ascertained until a thorough
• Manufacturer: forensic examination is done.
o Pegasus is manufactured by Israel's
NSO Group.
• Customers:
o As per Israeli law, Pegasus is graded as
a cyber weapon and can only be sold to
authorised government entities.
o So most reports suggest that “vetted
governments” across the world are the
clients of the spyware.
Figure: Working of Pegasus Spyware

Figure: Issues with the use of Pegasus


Spyware

Figure: What Pegasus spyware can do


Source: Pegasus project

10 | INTERNAL SECURITY
• Legality: All spyware-related activities are ▪ However, the interception has to
illegal in India under the Information be done in accordance with the
Technology Act (IT Act), 2000. Information Technology
o Unauthorised access: Activities of (Procedure and Safeguards for
spyware are tantamount to Interception, Monitoring and
unauthorisedly accessing computer Decryption of Information)
resources without the permission of Rules, 2009.
the user or owner of the computer ▪ Thus, the interception can only be
resource. done through legal means and the
o Inserting spyware: The act of inserting Information Technology Act, 2000
spyware into a mobile or computer is a clearly prohibits interception
cybercrime under the Information through spyware.
Technology Act, 2000 (Section 43 read  Spyware is itself illegal in
with Section 66). India and hence doing
o Interception: interception through spyware
▪ Section 5(2) of the Indian is also in the realm of illegality.
Telegraph Act, 1885, states that the  There Parliament has passed
government can intercept a no law that authorises the
“message or class of messages” government to use spyware
when it is “in the interests of: for interception.
 Sovereignty or integrity of • No public interest involved:
India, o This surveillance by Pegasus is into the
 Security of the State and private and intimate lives of targets,
Defence of India which has no bearing on any public
 Friendly relations with foreign interest.
states • Breach of privacy: The use of spyware
 Public order violates the fundamental right to privacy:
 Preventing incitement to the o The Supreme Court in the case of
commission of a cognisable Justice Puttaswamy versus Union of
offence (relating to the above) India has held the right to privacy as a
 For investigation of any fundamental right under Article 21 of
offence the Constitution of India.
▪ The operational process for it is • Compromising democracy:
mentioned in Rule 419A of the o The Information obtained illegally
Indian Telegraph Rules, 1951. through the spyware may have been
▪ The Supreme Court in the People’s used to compromise institutions,
Union for Civil Liberties (PUCL) sabotage opposition campaigns, steal
vs Union of India case said elections and even dislodge an
telephonic conversations are opposition government.
covered by the right to privacy, • Framing of targets: Advanced spyware can
which can be breached only if there also be used to frame innocent targets.
are established procedures. o The accused in the Bhima Koregaon
▪ The second legislation enabling case had their computer devices
surveillance is Section 69 of the breached by unknown groups to plant
Information Technology Act, 2000 evidence. The prosecution is now using
 It facilitates government this evidence against them.
“interception or monitoring or
decryption of any information
through any computer
resource” in similar conditions
stated above.

11 | INTERNAL SECURITY
Spyware 2.4 Lapsus$ Cyberattacks
• Spyware is loosely defined as malicious
software (or malware) designed to enter Context:
your computer device (or any other device • Recently, a hacking group named Lapsus$
like phone), gather data about you, and shared on social media that they had stolen
forward it to a third party without your source codes from a number of large tech
consent. firms and claimed responsibility for the
breach and dissemination of confidential
Ransomware data.
• Ransomware is a type of malware that
prevents users from accessing their
system or personal files and demands a
ransom payment in order to regain access.

Zero-click Attack
• It is a type of attack which does not require
any action from the user of the device.
• It helps spyware like Pegasus gain control
over a device without human interaction or
human error.
• It can exploit software which receives data
even before it can determine whether what
is coming in is trustworthy or not. Figure: Lapsus$ Cyberattacks
• For instance, an incoming Whatsapp call, Source: The Hacker News
even if not picked up, can infect the device.
Background:
Steps that can be taken to prevent zero-click • The cyber-crime group Lapsus$ is said to
attacks be based in South America.
• Update the software: Updating all • The group is relatively new but has
operating systems and software and successfully breached major firms like
making them up to date can make sure Microsoft.
that they would have the patches for at • Recently, Lapsus$ shared screengrabs of
least vulnerabilities that have been spotted. authentication platform Okta’s internal
• Download only from authentic sources: systems on messaging platform
Users should make sure that they Telegram.
download only via Google Play or Apple’s • Okta confirmed that hackers had tried
App Store. intruding into its system three months
• Switch to Browser: One extreme but earlier.
effective step would be to stop using apps
altogether and switch to the browser for Techniques Used in Hacking:
checking mails or social media, even on the • The tactics used for hacking by Lapsus$
phone. As per experts, it is more secure. include phone-based social engineering,
SIM-swapping to facilitate account
takeover, accessing personal email
accounts of employees at target
organisations, and paying employees, or
business partners to get their multifactor
authentication (MFA) approval.
o Multi-factor Authentication (MFA) is
an authentication method that requires
the user to provide two or more
verification factors to gain access to a
resource such as an application, online
account, or a VPN.

12 | INTERNAL SECURITY
• The hackers used Remote Desktop
Protocol (RDP) to compromise and control
the computer through the RDP session.
o RDP is a protocol or technical standard
that provides a user with a graphical
interface to connect to a desktop
computer remotely.
o The user uses RDP client software for
this purpose, while the other computer
must run RDP server software.
• Hackers spam a target with MFA prompts
and call the organisation’s help desk to
reset a target’s credentials.
• On obtaining an employee’s credentials
they connect to that person’s organisation’s
VPN (virtual private network) to exploit
unpatched vulnerabilities to intrude into
internal servers.
o A virtual private network, or VPN, is
an encrypted connection over the
Internet from a device to a network.
o The encrypted connection helps ensure
that sensitive data is safely
transmitted.
o It prevents unauthorised people from
eavesdropping on the traffic and
allows the user to conduct work
remotely.

13 | INTERNAL SECURITY
VARIOUS SECURITIES FORCES
AND AGENCIES AND THEIR
MANDATE
03
3.1 NATGRID 3.2 Operation Satark
3.3 Operation Dudhi 3.4 Defence Exercises in the News

3.1 NATGRID • The NATGRID was formally established as


an office attached to the Ministry of Home
Context: The Union home minister recently Affairs.
inaugurated the Bengaluru campus of
National Intelligence Grid (NATGRID). NATGRID:
• NATGRID aims to provide a one-stop
destination for security and intelligence
organisations.
o NATGRID is a master database
consisting of 21 databases designed to
offer real-time information to counter
terrorist and criminal activity.
o The NATGRID database contains
information about
▪ Credit and debit cards
▪ Taxes
Figure: NATGRID ▪ Telecom
Source: India Today ▪ Immigration, airline and train
tickets.
Details: ▪ Passports, and driving licenses.
• The minister emphasised the importance of • NATGRID will also have access to the
providing security agencies with Crime and Criminal Tracking Network
immediate and automated access to and Systems, a database that connects
information from reliable sources. crime data, including First Information
• According to the home minister, the Reports, from 14,000 police stations across
government would also create a national India.
database to track hawala transactions, • It will grant access to the collective data to
terrorist financing, fake money, drugs, 11 agencies, including the RAW, the IB, the
bomb threats, illicit arms trafficking, and ED, the National Investigation Agency, the
other terrorist operations. CBI, the Directorate of Revenue
Intelligence, and the Narcotics Control
Background: Bureau.
• Many experts felt that a system like • NATGRID will link user agencies with
NATGRID was required to combat similar data holders, providing them with real-
dangers in the future after the 26/11 time information required for intelligence
terrorist attack. services and investigations.
• The Rs 3,400 crore project was approved by
the cabinet committee on security in 2011,
but it faced obstacles in implementation.
• Later the NATGRID gained momentum in
2016, when the government appointed
Intelligence Bureau (IB) officer Ashok
Patnaik as CEO.

14 | INTERNAL SECURITY
3.2 Operation Satark Railway Protection Force
• The Union Government's Railway
Context: "Operation Satark" was recently Protection Force is tasked with
launched by the Railway Protection Force maintaining the safety of railway
(RPF). property, the passenger area, and the
travelling public.
• It is the top security organisation in the
country of India for railway security.

3.3 Operation Dudhi

Context: The paramilitary Assam Rifles


recently honoured the remaining members of
Operation Dudhi, which was India's most
effective counter-insurgency operation more
than 30 years ago.

Figure: RPF with Seized Products During the


Operation Satark
Source: bhaskar.com

Details:
• Forces hostile to the nation sometimes
transfer weapons, ammunition, and
explosives so that criminal activity or evil
plans can be carried out across the nation.
• To prevent the design of such elements, Figure: Assam Rifles Displaying Weapons
RPF has been performing rigorous seized During Operation Dudhi
inspections of stations, trains, and the Source: salute.co.in
surrounding railway environment as part
of "Operation Satark". Details:
• The operation's goals include taking action • During a recent trip to Nepal, Director-
against; General of Assam Rifles had the
o Illicit liquor/FICN/illegal tobacco opportunity to meet some of the Op Dudhi
products heroes and decided to felicitate them on
o Unaccounted gold/cash/precious their great achievement, which has yet to
items be matched.
o Any other items being transported • On the 31st anniversary of Operation
through railway network for the Dudhi, they were honoured in Shillong,
purpose of tax evasion according to a spokeswoman for the Assam
o Smuggling Rifles.
o Commission of crime
o Acts of terror. Operation Dudhi:
• Since Indian Railways is the main mode of • The operation, carried out by the battalion
transportation in the country, hostile between 1990 and 1992 while it was
elements would utilise it to convey illicit stationed in Jammu & Kashmir, continues
goods to various locations around the to be the most effective counter-insurgency
nation in order to carry out their evil plans. operation ever carried out by a security
force.
• The battalion not only killed 72 insurgents
in that operation, but it also captured 13
more.

15 | INTERNAL SECURITY
• Operation Dudhi was carried out on May
o Due to the nature of the Indo-
3rd, 1991, by a column led by Naib Subedar
Myanmar Border, the battalions of
Padam Bahadur Chhetri and made up of a
the Assam Rifles are organised with a
Junior Commissioned Officer (JCO) and 14
dual mandate;
other ranks.
▪ To protect the Indo-Myanmar
• The column had left Battalion border as their primary duty and
Headquarters in Chowkibal to conduct a to carry out counterinsurgency
regular patrol to inspect the station of missions as their secondary duty.
Dudhi, which had been abandoned for the
winter. Paramilitary Forces in India - The Central
• The militants, who had infiltrated into Armed Police Forces (CAPF)
Indian territory after crossing the 14,000- • Formerly referred to as Paramilitary
foot high Eagle Pass, started firing at the Forces, the Union Ministry of Home
column. Affairs adopted a uniform nomenclature
• The column then carried out a for them of Central Armed Police Forces
reconnaissance and found more than 100 to avoid confusion from 2011.
insurgents, according to the Assam Rifles. • There are seven Central Armed Police
• The troops were vastly outnumbered, yet Forces (CAPF).
they showed no signs of fear. • Each of these forces performs a separate
o The soldiers, equipped only with 7.62 function.
mm self-loading rifles and a light • They operate under the Ministry of
machine gun, manoeuvred to encircle Home affairs, Government of India.
the militants, who were in possession • The term “paramilitary forces” in India
of highly developed weaponry and has not been defined in any act of
engaged in a retaliatory onslaught. Parliament or by the authorities.
• Before reinforcements in the form of three • The list of Paramilitary Forces of India
columns and a medical team showed up is given below, followed by the
there, the combat continued for six hours. description of each:
• The area was sanitised and search efforts 1. Assam Rifles
were conducted over the course of the 2. Border Security Force (BSF)
following four days. 3. Central Industrial Security Force
• There was a significant amount of ammo (CISF)
and weapons found. 4. Central Reserve Police Force (CRPF)
5. Indo-Tibetan Border Police (ITBF)
Assam Rifles 6. National Security Guard (NSG)
• The Assam Rifles, which were established 7. Sashastra Seema Bal (SSB)
in 1835, are the oldest paramilitary force.
• It is frequently referred to as the
"Sentinels of the North East" and the
"Friends of the Hill People."
• Originally known as the Cachar Levy, the
Force underwent reorganisation and
changed its name to the Frontier Force.
• Force activities Post Independence
o After we gained independence, the
Assam Rifles showed their military
prowess.
o The organisation operated under the
Ministry of External Affairs as part
of the policy established for the North
East Frontier Agency.

16 | INTERNAL SECURITY
3.4 Defence Exercises in the News 3.4.2 IND-INDO CORPAT

3.4.1 Exercise Bongosagar Context: The Indian Navy and Indonesian


Navy conducted the 38th edition of the India-
Context: The third edition of the bilateral Indonesia Coordinated Patrol (IND-INDO
exercise "Bongosagar," between the Indian CORPAT) in June 2022.
Navy (IN) and the Bangladesh Navy (BN),
concluded in May 2022 in Port Mongla,
Bangladesh.

Figure: 38TH INDIA – INDONESIA


COORDINATED PATROL (IND-INDO
CORPAT)
Source: Indian Navy

Details:
Figure: Navies During Exercise ‘Bongosagar’ • Since 2002, the two navies have conducted
Source: PIB CORPATs along the International
Maritime Boundary Line (IMBL) in an
Details: effort to maintain the safety and security
• Through the performance of a broad range of this crucial area of the Indian Ocean
of maritime exercises and operations Region for commercial shipping and
between the two navies, Exercise international commerce.
Bongosagar aims to achieve a high degree o Along with a Dornier Maritime Patrol
of interoperability and combined Aircraft, the Indian Naval Ship INS
operational skills. Karmuk, an indigenously constructed
• The Indian Naval Ships Kora, a Guided Missile Corvette stationed in the
Missile Corvette, and Sumedha, an Andaman and Nicobar Command took
Offshore Patrol Vessel took part in the part in CORPAT.
exercise. o KRI Cut Nyak Dien, a corvette of the
• The two guided missile frigates BNS Abu Kapitan Pattimura (PARCHIM I)
Ubaidah and Ali Haider are standing in Class, represented the Indonesian
for the Bangladesh Navy. Navy.
• The exercise's harbour phase also involved • The Indonesian warship engaged in a
professional and social interactions as variety of activities during its three-day
well as friendly sporting events. port visit to Port Blair, including
o It also included tactical level planning professional discussions, pre-sail
discussions on the conduct of the conference and various sports fixtures.
exercises at sea • The CORPAT has benefited both navies in
• During the exercise's sea phase, ships from improving interoperability and
both navies took part in rigorous surface understanding of each other's operational
warfare drills, weapon fire practice, procedures while supporting institutional
seamanship advancements, and mechanisms for preventing/suppressing
coordinated air operations in a tactical Illegal Unreported Unregulated (IUU)
scenario. fishing, drug trafficking, maritime
terrorism, armed robbery and piracy in the
region.

17 | INTERNAL SECURITY
• The 38th edition of CORPAT's maritime
phase was conducted in June 2022 along
the IMBL in the Andaman Sea.

Significance:
• With regular port visits, involvement in
bilateral and multilateral exercises, and
training exchanges, maritime cooperation
between India and Indonesia has
significantly increased.
• The CORPAT has also improved
communication and coordination between
the navies and aided in the implementation
of measures to stop illegal maritime
activity and carry out Search and Rescue
(SAR) missions.

18 | INTERNAL SECURITY
MISCELLANEOUS
04
4.1 Operation Rakth Chandan 4.2 Operation Namkeen
4.3 Astra Mk1 Air-to-Air Missile 4.4 INS Surat and INS Udaygiri
4.5 INS Nirdeshak 4.6 INS Sindhudhvaj
Decommissioned
4.7 China Launches Hi-Tech Carrier

4.1 Operation Rakth Chandan • Range Forest Officers' preliminary


assessment of the wooden logs revealed
Context: Recently, 14.63 MT of Red Sanders that they are of Red Sandalwood, which is
worth an estimated Rs 11.70 crore were not permitted for export.
confiscated by the Directorate of Revenue • As a result, they were seized in accordance
Intelligence (DRI). with the Customs Act of 1962.
• The investigation regarding domestic
movement of the goods, their
transportation and the exporter concerned
is in progress.
• During its operations across the nation in
the fiscal years 2021–22 and 2020–21, DRI
seized 95 and 96 MT of Red Sanders,
Figure: Seized Red Sanders valued at more than Rs. 150 crore in the
Source: PIB international market, respectively.

Details:
• The recently confiscated Red Sanders by
the DRI was found in a consignment that
was filled at ICD Sabarmati and intended
to be shipped to Sharjah, United Arab
Emirates.
• DRI gathered information indicating that
Red Sanders logs were being smuggled
out of the country by hiding them in an
export cargo.
• Operation Rakth Chandan was
consequently started, and the suspect
export consignment was under close
observation.
• A "container scanning device" was used to
scan the suspicious container, which
proved the presence of some products in
the form of logs and the lack of stated
commodities, such as various toiletries.
o DRI thus checked the container, which
Figure: Red Sanders Potential and Problems
showed that it was completely filled
Source: Times of India
with reddish-colored timber logs that
seemed to be Red Sandalwood.

19 | INTERNAL SECURITY
Red Sanders o Appendix II also includes so-called
"look-alike species".
▪ Look-alike species are those
species whose specimens in trade
look like those of species listed for
conservation reasons.
o The authorisation of international
trade in specimens of Appendix-II
species is done by the granting of an
export permit or re-export certificate.
No import permit is necessary for
these species under CITES.
Figure: A living red sanders tree ▪ Although a permit is needed in
Source: Wikimedia Commons / By some countries that have taken
Adityamadhav83 - Own work, CC BY-SA stricter measures than CITES
4.0 requires.
• A specific area of forests in Andhra o Permits or certificates should only
Pradesh's Eastern Ghats is home to the be granted if the relevant authorities
indigenous plant species known as Red are satisfied that certain conditions
Sanders. are met, above all that trade will not
be detrimental to the survival of the
species in the wild.
• Export Policy: In 2019, the Directorate
General of Foreign Trade, an agency of the
Ministry of Commerce and Industry,
revised its export policy to permit the
export of red sander timber, if it is
obtained from cultivated land.
• Properties and Use:
o These trees are known for their rich
hue and therapeutic properties.
o They are high in demand across Asia,
particularly in China and Japan, for
use in
▪ Cosmetics
▪ Medicinal products
▪ Making furniture, woodcraft and
Figure: Red Sanders Distribution musical instruments
Source: The Indian Express o It is so popular that a tonne of it costs
between Rs 50 lakh to Rs 1 crore in the
• The International Union for Conservation international market.
of Nature (IUCN) Red List classifies them
as being on the "endangered list".
• Additionally, Red Sanders is provided
protection from over-exploitation under
Appendix II of the Convention on
International Trade in Endangered
Species of Wildlife, Fauna, and Flora's
(CITES).
o Appendix II contains the list of species
that are not necessarily threatened with
extinction at present. But, in absence of a
close control on their trade, they run the
risk of becoming threatened with
extinction in the future.

20 | INTERNAL SECURITY
• Proceedings for examination and seizure
Directorate of Revenue Intelligence:
are ongoing under the Narcotic Drugs and
• The Directorate of Revenue Intelligence
Psychotropic Substances Act, 1985.
is the apex anti-smuggling agency of
India, working under the Central Board
of Indirect Taxes & Customs, Ministry 4.3 Astra Mk1 Air-to-Air Missile
of Finance, Government of India.
• It is the country's top anti-smuggling Context: Recently, the Ministry of Defence said
agency. that it has signed a contract with the
• Some important duties of the DRI is Hyderabad-based public-sector company
detection and curbing of smuggling of Bharat Dynamics Ltd (BDL) for the supply of
contraband, including drug trafficking the Astra Mark-1 Air-to-Air missile.
and illicit international trade in
wildlife and environmentally sensitive
items, as well as combating commercial
frauds related to international trade and
evasion of Customs duty.

4.2 Operation Namkeen

Context: At the Mundra port in Gujarat's Kutch


area, the Directorate of Revenue Intelligence Figure: Astra Missile
recovered 52 kilos of cocaine worth more than Source: India Times
Rs 500 crore.
About Astra MK1 Air to Air Missile:
• Background: Astra project was officially
launched in the early 2000s to develop
indigenous Beyond Visual Range Missiles
(BVM).
o BVM missiles are capable of
engaging targets beyond the visual
range of 20 nautical miles or 37
kilometres.
Figure: Cocaine Seized During OP Namkeen. • About:
Source: PIB o The Astra Mk-1 is a beyond visual
range (BVR), air-to-air missile (AAM).
Details: o The first version of Astra-Mark-1 was
• The DRI launched "Operation Namkeen" developed in 2017 and has been tested
because some imports from Iran were successfully.
suspected of containing narcotics based on o The Astra-Mk-1 has a maximum speed
the intelligence inputs. of Mach 4.5 (over 5,500 kmph) and
• The assessment took place over the course comes with a range of 110 km.
of three days in a row. • Design and Development:
o Some bags were discovered to be o The Astra Mk-1 missile has been
suspicious since they included a indigenously designed and developed
chemical in powder form with a by the Defence Research and
particular odour. Development Organisation (DRDO).
• The Directorate of Forensic Sciences, o Astra Mk-1 Missile has been developed
Government of Gujarat, officers took for deployment on fighter jets like
samples from the suspicious bags and Sukhoi-30 MKI and Tejas of the IAF
tested them. and the Mig-29K of the Navy.
• Cocaine was found in these samples, o DRDO is also developing Astra-2 with
according to the tests. a range of 150-160 km and a smaller
• 52 kilograms of cocaine have been found so range of Astra as well.
far by DRI. o The Mk-3 version with a longer range
of 300km is also being envisaged.

21 | INTERNAL SECURITY
• Features:
MICA
o The Astra Mk-1 missile can travel at
speeds more than four times that of
sound and can reach a maximum
altitude of 20 km, making it extremely
flexible for air combat.
o The missile is designed to engage and
destroy highly manoeuvring
supersonic aircraft. It has all-weather
day and night capability.
o The missile is fully integrated on the
Sukhoi 30 MKI I and will be
integrated with other fighter aircraft
Figure: MICA Missile
in a phased manner, including the
Source: airforce-technology.com
Light Combat Aircraft (LCA) Tejas.
o The Indian Navy will integrate the
• The MICA is an anti-air multi-target
missile on the MiG-29K fighter
missile system.
aircraft thus adding to the lethality of
• It is designed and developed by
India’s Aircraft carriers.
European missile systems producer,
Matra BAE Dynamics Alenia (MBDA).
Other Air-to-Air missiles with IAF • It is a short and medium-range missile
with an operational range of 500 m to 80
Novator KS-172 km.
• It is available in two versions, MICA IR
(infrared) and MICA RF (radio
frequency).
• MICA is mounted on the 36 Rafale
combat jets that India has purchased
from France.

4.4 INS Surat and INS Udaygiri

Figure: Novator KS-172 Context: Recently, two warships, INS Udaygiri


Source: Vayu India and INS Surat of the Indian Navy were
launched simultaneously at Mumbai's
• Novator KS-172 is a Russian air-to-air Mazagon Dock Ltd. (MDL) in a historic
missile project designed as an "AWACS occasion for domestic warship construction.
killer".
• It is the heaviest air-to-air missile that Details:
India ever had and has a range of 400 • The warships are the Project 15B Destroyer
km. India and Russia have the Novator known as Indian Naval Ship (INS) Surat
KS-172 for their forces. and the Project 17A Frigate INS Udaygiri,
both of which were developed by the
Directorate of Naval Design (DND) and
wholly constructed at Mazagon Dock Ltd.
(MDL).

22 | INTERNAL SECURITY
• The ship Surat was constructed using the
Directorate of Naval Design (DND)
‘Block Construction’ method, which
• Directorate of Naval Design (DND) is a
involved building the hull at two separate
premier organisation of the Indian Navy
locations before joining them together at
related to design of warships, submarines,
MDL, Mumbai.
etc.
• A vertically launched missile system for
Mazagon Dock Limited (MDL), Mumbai long-range attack of shore-based and sea-
• Mazagon Dock Limited (MDL), Mumbai is based targets is among the improved
one of India’s leading Defence public weapons mentioned by the Indian Navy.
sector undertaking shipyards under the • Two multi-role helicopters will be able to
Ministry of Defence, Government of India. be carried on board and operated by these
• It is also sometimes known as “Ship ships.
Builder to the Nation” with facilities
situated at Mumbai and Nhava (under Project 15B
development). • The Project 15 Bravo or P-15B or
• The main activities of MDL are Project 15B is the project of
construction of warships and submarines. construction of a series of guided-
It has the capability of building warships, missile warships by the Indian Navy.
submarines, merchant ships up to 40,000 • The Destroyers, also known as the
DWT since 1979. Visakhapatnam Class Destroyers,
o DWT stands for Deadweight are currently under construction for
Tonnage. It is the maximum the Indian Navy.
deadweight of the ship and measure • The P-15B Class is an updated
of the ship's carrying capacity. version of its forerunner, the Kolkata
▪ It takes into consideration the Class (Project 15A), with enhanced
weight of the cargo on board, fuel, stealth, mechanisation, and
ballast water, fresh water, crew, armament capabilities.
provisions for the crew, excluding • Mazagon Dock Limited (MDL) is
the weight of the ship in the building four ships conceived by the
calculation. Directorate of Naval Design (DND)
as part of the Make in India project.
INS Surat • INS Visakhapatnam, the class’s
premiere ship, was commissioned in
November 2021.
• By the year 2024, the Indian Navy
aims to get all four Destroyers
operational.
• These are envisaged to act as a
supplement to the Kolkata Class
warships by the Defence Acquisition
Council (DAC).
Figure: Stealth Guided Missile Destroyer o Defence Acquisition Council
INS Surat (DAC) is India’s leading
Source: Mint armaments procurement
• The Project 15B Class or Vishakhapatnam authority, which is subsidiary to
Class of ships are the stealth guided the Ministry of Defence (MoD),
missile destroyers. Government of India.
• ‘Surat’ is the fourth ship of Project 15B • Four warships built under the
Destroyers which heralds a significant Project 15B include:
makeover of the P15A (Kolkata Class) o INS Visakhapatnam
Destroyers. o INS Mormugao
o It is named after the commercial capital o INS Imphal
of the state of Gujarat and also the o INS Surat
second largest commercial hub of
western India after Mumbai.

23 | INTERNAL SECURITY
INS Udaygiri
• The 7 frigates are intended to be a
“follow on series” to the Shivalik Class
Frigates (Project 17), that were also
being constructed for the Indian Navy at
the same time except with more
advanced capabilities.
• The first six ships of the series were
Figure: The Third Ship of Project 17A allotted the names utilised by the older
Frigates - INS Udaygiri class, namely – Nilgiri, Himgiri,
Source: Mint Taragiri, Udaygiri, Dunagiri, and
Vindhyagiri.
• The ship 'Udaygiri' is named after a o The seventh and final vessel of the
mountain range in the state of Andhra P-17A series, which did not have a
Pradesh. namesake from the older class, was
• It is the third ship of Project 17A Frigates. given the new name of
These are intended to be the “follow on Mahendragiri.
series” to the P17 Frigates (Shivalik Class),
with increased stealth characteristics, 4.5 INS Nirdeshak
upgraded weaponry and sensors and
platform management systems. Context: The second of the four ‘Survey
• "Udaygiri" is the reincarnation of the Vessels (Large) (SVL) Project’ vessels, named
former "Udaygiri", a Leander Class ASW Nirdeshak, was launched in May 2022 at
Frigate that served the nation for nearly Kattupalli, Chennai by Garden Reach
three decades and experienced a number of Shipbuilders & Engineers (GRSE) and Larsen &
difficult missions. Toubro (L&T) Shipbuilding.
• Seven ships are being built as part of the
P17A program, with four at MDL and three
at Garden Reach Shipbuilders & Engineers
(GRSE).
• For the first time in indigenous warship
design and construction, a number of
cutting-edge ideas and technologies,
including integrated construction, mega
block outsourcing, project data
management/project lifecycle
management (PDM/PLM), etc., have been
used in this project.
• It has increased stealth capabilities,
enhanced anti-air and surface battle
capabilities, and platform management Figure: Visual of INS Nirdeshak
systems with cutting-edge missiles, Source: The Print
sensors, and platform management
systems. Details:
• The first of the Survey Vessels (Large)
(SVL) INS Sandhayak was launched in
Project 17A Kolkata in December 2021.
• Project-17 Alpha or Project 17A or P- • The ship's name is derived from the former
17A is a project of construction of a line Nirdeshak, an Indian Naval Survey vessel
of guided-missile frigates. that served for 32 years in valour before
• Also known as the Nilgiri Class being retired in December 2014.
Frigates, they are 7 stealthy frigates
being manufactured for the Indian Navy
by Mazagon Dock Shipbuilders (MDL)
as well as Garden Reach Shipbuilders &
Engineers (GRSE).

24 | INTERNAL SECURITY
Capabilities: Details:
• The more sophisticated, state-of-the-art, • Sindhudhvaj, one of the 10 Kilo-class
bigger ship "Nirdeshak" will be more submarines India received from Russia
competent, equipped with cutting-edge between 1986 and 2000, was commissioned
propulsion and manoeuvrability, and into the Navy in June 1987.
able to control autonomous and remotely • Being the Russian-built Sindhughosh class
controlled systems. submarines throughout her career in the
• These survey ships are equipped to military, Sindhudhvaj served as the
determine navigation channels and routes symbol of indigenisation and the Indian
and conduct full-scale coastal and deep- Navy's attempts to achieve Atmanirbharta.
water hydrographic surveys of port and • She achieved several firsts, including the
harbour approaches. following:
o In addition to acting as hospital ships o Operation of the locally developed
in times of need, the ships may also sonar USHUS.
provide minimal defence in their o Rukmani and MSS are indigenous
secondary roles. satellite communication systems.
• The Survey Vessel (Large) ships can carry o Indigenized torpedo fire control
235 crew members and have a deep system and inertial navigation
displacement of roughly 3400 tons. system.
• The vessel can go at a maximum speed of • The customary ceremony took place at
18 knots and a cruising speed of 14 knots. sunset, and the cloudy sky added to the
• For improved manoeuvrability at low occasion's solemnity as the
speeds necessary during shallow water Decommissioning Pennant was lowered
survey activities, bow and stern thrusters and the submarine was paid off.
have been added. • With the decommissioning, the Navy has
• These ships' hulls are constructed of DMR 15 operational conventional submarines.
249-A steel, which Steel Authority of India • Seven Russian Kilo-class submarines,
Limited produced domestically. four German HDW submarines, and four
• It is capable of transporting a helicopter French Scorpene submarines make up the
and four survey motorboats. Navy's current sub-surface force.
• The last two Scorpene class submarines are
4.6 INS Sindhudhvaj through different testing and outfitting
Decommissioned phases.
• The nuclear ballistic missile submarine INS
Context: After 35 years of service, INS Arihant is another asset to the Navy.
Sindhudhvaj, was recently decommissioned in
Visakhapatnam. 4.7 China Launches Hi-Tech Carrier

Context:
• China has recently launched a new-
generation aircraft carrier, the Type 003
carrier, named Fujian.

Figure: Decommissioning of Sindhudhvaj


Source: Indian Navy

Figure: The Fujian, China’s third aircraft


carrier
Source: The Diplomat

25 | INTERNAL SECURITY
Fujian:
• Fujian is the first such ship to be both
designed and built in China.
• It marks a major step for the country as it
seeks to strengthen its navy and turn its
navy, which is already the world’s largest,
into a multi-carrier force.
• Type 003 employs a launch system known
as a catapult launch which is an
electromagnetic-type system. That system
was first developed by the U.S. Navy.
o The system will permit the ship to
launch more kinds of aircraft, which is
necessary for China to expand its naval
power.
• Fujian has replaced the short takeoff but
arrested recovery (STOBAR) system, and
the ski-jump ramp it requires, used on both
Liaoning and Shandong (the previous two
aircraft carriers).
o STOBAR allows jets to take off on
shorter decks but limits how much fuel
and weaponry they can carry when
taking off.
• It is believed to use an electromagnetic
aircraft launch system (EMALS) that can
launch aircraft more efficiently and more
frequently than steam-powered catapults.

Other China’s Aircraft:


• China’s first aircraft carrier Type 001
Liaoning was a repurposed Soviet ship.
• Its second Type 002 Shandong was built in
China but based on a Soviet design.
• Type 001 Liaoning is a Soviet-designed
Kuznetsov-class carrier that China bought
in 1998 and modified extensively before
commissioning it into service in 2012.
• Type 002 Shandong was based on Liaoning
and entered service in 2019.
• All three of China's carriers use
conventional engines rather than nuclear
reactors, limiting the power they can
generate and the time they can spend at
sea.

26 | INTERNAL SECURITY
Incredible results year after year!

2013 2014 2015 2016 2017 2018 2019 2020 2021


62 out of 82 out of 162 out of 215 out of 236 out of 183 out of 165 out of 281 out of 188 out of
1228 vacancies 1364 vacancies 1164 vacancies 1209 vacancies 1058 vacancies 812 vacancies 829 vacancies 761 vacancies 685 vacancies

To book a FREE COUNSELLING SESSION with our IAS Mentors call: 9241333666
Visit https://byjus.com/ias/ for more details

byjus.com

Awards

VCCIRCLE
AWA R D S

Education Company Business Standard Google Play’s ‘Best Self Improvement’


Of The Year 2016, 2018 Start-up of the year 2017 App in India – 2016

Google Design Deloitte Technology Fast 50 India


Award 2018 and Fast 500 Asia Award Year
NASSCOM Design4India Design
Award 2018 for the ‘Best Design’
2012, 2013, 2014, 2015, 2016, 2017 Express IT Awards for IT newsmaker
Mobile Category – 2018
of the year 2017

You might also like