Talk about the Special Frontier Force’s mission. What successes has it had in guaranteeing India’s security? (Answer in 150 words)
Imagine you need to transmit confidential information. Encryption acts as a digital lock, safeguarding your message from unauthorized access. There are two main encryption methods, each with distinct advantages: Symmetric Encryption: This method utilizes a single, shared secret key for both eRead more
Imagine you need to transmit confidential information. Encryption acts as a digital lock, safeguarding your message from unauthorized access. There are two main encryption methods, each with distinct advantages:
Symmetric Encryption:
This method utilizes a single, shared secret key for both encryption and decryption. It functions similarly to a padlock with one key – whoever possesses the key can unlock the message. This approach offers exceptional speed and efficiency, making it ideal for encrypting large data volumes. However, you have to securely share the secret key beforehand, and if the secret key is found by anyone else they can also access the information.
Asymmetric Encryption:
This method uses a pair of mathematically linked keys: a public key and a private key. The public key is widely available, allowing anyone to encrypt messages intended for you. The private key, however, remains strictly confidential and is used solely for decryption.
Think of it as a secure mailbox with a public slot for anyone to deposit messages and a private key, only you possess, to retrieve them. This method prioritizes security since the private key is in your control.
Here are some other common use cases for symmetric encryption:
- Encrypting files or entire disks on your computer: This protects your data even if your device is lost or stolen.
- Securing communication channels between applications: Messaging apps often use a combination of symmetric and asymmetric encryption to establish secure connections and then use symmetric encryption for faster message exchange.
Here are some other common use cases for asymmetric encryption:
- Sending secure emails to people you don’t know well: You can encrypt the email content with their public key for safe transmission.
- Securely logging in to websites: Many websites use asymmetric encryption to establish secure connections during login, protecting your password information.
The Special Frontier Force (SFF) was raised by the Intelligence Bureau after the 1962 China-India war. This covert paramilitary unit primarily recruited Tibetan exiles, but currently it consists of a mixture of Tibetans and Gorkhas. The SFF is controlled by India's external intelligence agency, theRead more
The Special Frontier Force (SFF) was raised by the Intelligence Bureau after the 1962 China-India war. This covert paramilitary unit primarily recruited Tibetan exiles, but currently it consists of a mixture of Tibetans and Gorkhas. The SFF is controlled by India’s external intelligence agency, the Research and Analysis Wing (R&AW). Though it is headed by an Inspector General who is an Army officer, it reports directly to the Cabinet Secretariat under the Prime Minister’s Office (PMO).
Mandate of SFF
The SFF’s original mandate was to infiltrate as guerrillas and conduct covert operations in Tibet. It aims to destroy Chinese strategic infrastructure; and create insurgency and rebellion in Tibet, which would in turn help the Indian Army in engaging the Chinese at the border. Over time its role has evolved and it has been used in a variety of roles such as counter-insurgency operations, infiltrating enemy lines, camouflage, and tactical and special operations.
Achievements of SFF
The SFF has a glorious history of protecting the nation from internal and external security threats by making supreme sacrifices. Their impact is not only limited to the tactical domain but also to strategic domains, particularly in the context of relations with China.
See less