Why in News: The National Investigation Agency launched a massive nationwide search operation in connection with anti-terror activities. The operation, being described as the “largest ever”, involves searches across 10 states, and has so far led to the arrest of …
What is a look out circular? It is a notice to stop any individual wanted by the police, investigating agency or even a bank from leaving or entering the country through designated land, air and sea ports. The immigration is …
Context The annual report of the Ministry of Home Affairs (MHA) released recently said that the Isak-Muivah faction of the National Socialist Council of Nagaland (NSCN-IM) was involved in 44% of insurgency-related incidents in Nagaland in 2020. One of the …
Why in News: On January 31 2022, the Information and Broadcasting Ministry barred the transmission of Malayalam news channel Media One citing ‘security reasons‘. Later, the Kerala High Court granted a stay, allowing the channel to continue functioning. Recently, the …
India borders Bangladesh, China, Pakistan, Nepal, Bhutan, and Bangladesh. Borders in India are highly complicated, with practically every form of extreme terrain present, such as deserts, rich fields, muddy marshes, or tropical evergreen jungles. It has 14818 kilometres of land …
From 1989, insurgents, whose aim was the secession of J&K from India, began to use violent means to achieve their goal. This led to strong counter-insurgency operations. The Public Safety Act of 1978 and the Armed Forces (Special Powers) Act …
Why in news? The Indian Navy demonstrated its submarine rescue capability, available with very few countries in the Indian Ocean Region (IOR), during the Goa Maritime Conclave (GMC) 2021. To read about GMC- https://officerspulse.com/goa-maritime-conclave/ About submarine rescue mechanism The Navy …
A cyberattack is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization. Usually, the attacker seeks some type of benefit from disrupting the victim’s network. Below are some of …