{"id":26228,"date":"2024-02-08T09:18:58","date_gmt":"2024-02-08T09:18:58","guid":{"rendered":"https:\/\/edukemy.com\/blog\/?p=26228"},"modified":"2024-02-08T09:19:03","modified_gmt":"2024-02-08T09:19:03","slug":"the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to","status":"publish","type":"post","link":"https:\/\/edukemy.com\/blog\/the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to\/","title":{"rendered":"The use of unmanned aerial vehicles (UAVs) by our adversaries across the borders to ferry arms\/ammunition, drugs, etc., is a serious threat to internal security. Comment on the measures being taken to tackle this threat. (10 Marks,150 Words)"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-gs-advance-and-mentorship-program-ampcsat?utm_source=Blog&amp;utm_medium=Link&amp;utm_campaign=GS+Advanced\" target=\"_blank\" rel=\"noreferrer noopener\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1280\" height=\"300\" src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8.png\" alt=\"\" class=\"wp-image-43397\" srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/07\/Attempt-our-Daily-Weekly-Current-Affairs-Quiz-now-8-585x137.png 585w\" sizes=\"(max-width: 1280px) 100vw, 1280px\" \/><\/a><\/figure><\/div>\n\n\n<p>The proliferation of unmanned aerial vehicles (UAVs) in the hands of adversaries poses a grave challenge to national security, particularly along border regions. These agile and discreet aircraft are increasingly utilized for nefarious purposes such as smuggling arms, ammunition, drugs, and other contraband across borders, circumventing traditional security measures. To counter this threat, comprehensive measures are being implemented. Firstly, advanced surveillance technologies including radar systems and drone detection software are being deployed to identify unauthorized UAV activity. Additionally, law enforcement agencies are enhancing coordination and intelligence-sharing to intercept and neutralize UAV threats swiftly. Moreover, legislative frameworks are being revised to regulate UAV ownership and usage, imposing stricter penalties for illegal activities. Furthermore, research and development initiatives focus on developing counter-drone technologies such as signal jamming and interception systems. The integration of these multifaceted approaches aims to safeguard internal security by effectively mitigating the risks posed by adversarial UAV operations.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<label for=\"ez-toc-cssicon-toggle-item-69d153e992d9e\" class=\"ez-toc-cssicon-toggle-label\"><p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69d153e992d9e\"  \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/edukemy.com\/blog\/the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to\/#Answer\" title=\"Answer:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\">Answer:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/edukemy.com\/blog\/the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to\/#Introduction\" title=\"Introduction:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\">Introduction:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/edukemy.com\/blog\/the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to\/#Body\" title=\"Body:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\">Body:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/edukemy.com\/blog\/the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to\/#Threat_to_Internal_Security_posed_by_UAVs\" title=\"Threat to Internal Security posed by UAVs:&nbsp;&nbsp;\">Threat to Internal Security posed by UAVs:&nbsp;&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/edukemy.com\/blog\/the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to\/#Measures_being_taken_to_tackle_this_threat\" title=\"Measures being taken to tackle this threat:&nbsp;&nbsp;\">Measures being taken to tackle this threat:&nbsp;&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/edukemy.com\/blog\/the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to\/#Issues_Faced_by_These_Measures\" title=\"Issues Faced by These Measures:&nbsp;\">Issues Faced by These Measures:&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/edukemy.com\/blog\/the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to\/#Way_forward\" title=\"Way forward:&nbsp;\">Way forward:&nbsp;<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/edukemy.com\/blog\/the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to\/#Conclusion\" title=\"Conclusion:&nbsp;&nbsp;&nbsp;\">Conclusion:&nbsp;&nbsp;&nbsp;<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/edukemy.com\/blog\/the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to\/#In_case_you_still_have_your_doubts_contact_us_on_9811333901\" title=\"In case you still have your doubts, contact us on 9811333901.&nbsp;\">In case you still have your doubts, contact us on 9811333901.&nbsp;<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/edukemy.com\/blog\/the-use-of-unmanned-aerial-vehicles-uavs-by-our-adversaries-across-the-borders-to-ferry-arms-ammunition-drugs-etc-is-a-serious-threat-to-internal-security-comment-on-the-measures-being-taken-to\/#Visit_our_YouTube_Channel_%E2%80%93_here\" title=\"Visit our YouTube Channel &#8211;&nbsp;here\">Visit our YouTube Channel &#8211;&nbsp;here<\/a><\/li><\/ul><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Answer\"><\/span><strong>Answer:&nbsp;&nbsp;&nbsp;&nbsp;<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Introduction\"><\/span><strong>Introduction:&nbsp;&nbsp;<\/strong>&nbsp;&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>&#8220;Unmanned Aerial Vehicles (UAVs), often referred to as drones, are remotely controlled aircraft that have become widely popular and utilised across diverse sectors like agriculture, photography, surveillance, and logistics. However, their growing accessibility has raised concerns about their misuse, both domestically and internationally.&#8221;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Body\"><\/span><strong>Body:&nbsp;<\/strong>&nbsp;&nbsp;&nbsp;&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Threat_to_Internal_Security_posed_by_UAVs\"><\/span><strong>Threat to Internal Security posed by UAVs:&nbsp;<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Arms and Ammunition Delivery:<\/strong> Multiple instances of cross-border drone threats by Pakistan-sponsored terror groups for the delivery of arms, ammunition, and equipment.\u00a0<\/li><li><strong>Drug Trafficking: <\/strong>UAVs have been employed for drug drops within Indian territory, facilitating the distribution of narcotics to local communities, contributing to social and security challenges.<\/li><li><strong>IED Attacks: <\/strong>Terrorist groups near India&#8217;s borders have begun to use UAVs for reconnaissance and potentially as delivery systems for improvised explosive devices (IEDs) and other forms of attack.Ex: Recent utilisation of drones to drop explosives at the Jammu airbase, marking the first such occurrence.\u00a0<\/li><li><strong>Geopolitical Escalation:<\/strong> Adversaries employ UAVs to breach Indian airspace along border regions, raising concerns about territorial integrity and airspace violations. China has also engaged in drone activity over sections of the Line of Actual Control (LAC).\u00a0<\/li><li><strong>Critical Infrastructure Surveillance:<\/strong> UAVs used for reconnaissance on critical infrastructure, military installations, and sensitive government buildings, posing a threat to national security.\u00a0<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Measures_being_taken_to_tackle_this_threat\"><\/span><strong>Measures being taken to tackle this threat:&nbsp;<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Anti-Drone Technologies: <\/strong>Drone rules 2021 attempt to regulate the internal movement of drones while incentivizing the indigenous drone manufacturing industry. like the 2022 Republic Day to jam or disable rogue UAVs.\u00a0<\/li><li><strong>Intelligence Sharing:<\/strong> Collaboration with agencies and friendly nations, including the United States, on intelligence-sharing related to UAV activities.\u00a0<\/li><li><strong>Legal Framework:<\/strong> DGCA&#8217;s guidelines establish a legal framework for UAV operations, with offenders facing imprisonment for offences.\u00a0<\/li><li><strong>Research and Development: <\/strong>Investment in advanced technologies like &#8220;soft kill&#8221; measures by DRDO to counter UAV threats effectively.\u00a0<\/li><li><strong>Training and Capacity Building:<\/strong> Special units in the military and paramilitary forces receive specific training to counter UAV threats.\u00a0<\/li><li><strong>Collaboration with Tech Companies:<\/strong> Partnerships with companies like Tata and Reliance to develop geo-fencing technologies preventing UAVs from entering sensitive areas.\u00a0<\/li><li><strong>Community Engagement<\/strong>: Involving border communities in vigilance activities, as seen in Punjab where local farmers report suspicious UAV sightings.\u00a0<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Essay\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1280\" height=\"300\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10.png\" alt=\"\" class=\"wp-image-42412 lazyload\" data-srcset=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10.png 1280w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10-1170x274.png 1170w, https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/10-585x137.png 585w\" data-sizes=\"(max-width: 1280px) 100vw, 1280px\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 1280px; --smush-placeholder-aspect-ratio: 1280\/300;\" \/><\/a><figcaption><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Link&amp;utm_campaign=Essay\">UPSC Essay Course<\/a><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Issues_Faced_by_These_Measures\"><\/span><strong>Issues Faced by These Measures:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Technological Limitations<\/strong>: Challenges in detecting small, low-flying drones, as witnessed in the 2019 Saudi Arabia drone attack.\u00a0<\/li><li><strong>Coordination Issues:<\/strong> Gaps in coordination between military, intelligence, and local law enforcement, exposed vulnerabilities during the 2016 Pathankot Airbase attack.\u00a0<\/li><li><strong>False Alarms: <\/strong>Vulnerability to false alarms, as bird movements triggered drone-detection systems in some international airports.\u00a0<\/li><li><strong>Geographical Challenges:<\/strong> Complex implementation due to India&#8217;s diverse geography, as seen in equipment issues during exercises in the Thar Desert.\u00a0<\/li><li><strong>Cybersecurity: <\/strong>Risks associated with cyber-attacks on anti-drone systems, highlighted by Iran&#8217;s 2011 capture of an American UAV.\u00a0<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Way_forward\"><\/span><strong>Way forward:<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Advanced Research:<\/strong> Encourage advanced research with incentives like &#8220;Drone Defense X-Prizes&#8221; to promote drone detection and neutralisation breakthroughs.\u00a0<\/li><li><strong>Collaborative Approaches:<\/strong> Establish a &#8220;UAV Regulatory Sandbox&#8221; for feedback from tech companies, policy experts, and the public to create practical drone regulations.\u00a0<\/li><li><strong>Industry Regulations:<\/strong> Enforce new laws requiring manufacturers to include standardised &#8220;Geo-Fencing&#8221; features in UAVs to prevent entry into restricted zones.\u00a0<\/li><li><strong>Capacity Building:<\/strong> Develop training modules with Machine Learning algorithms for security forces to stay ahead in countering evolving threats.\u00a0<\/li><li><strong>Ethical Guidelines:<\/strong> Establish an &#8220;Drone Ethics Board&#8221; comprising ethicists, lawyers, technologists, and community representatives to issue guidelines on ethical UAV use.\u00a0<\/li><li><strong>Youth Engagement:<\/strong> Organise national hackathons and &#8220;Drone Innovation Camps&#8221; to encourage innovation and development of anti-drone technologies\u00a0<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion:&nbsp;&nbsp;<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Thus, the multifaceted threat to India&#8217;s internal security through the illicit use of UAVs requires a proactive, cooperative, and diversified strategy. By embracing these innovative methods, India can not only successfully combat the escalating drone-related security risks but also promote a balanced and responsible adoption of this transformative technology.\u00a0\u00a0\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/edukemy.com\/upsc\/upsc-essay?utm_source=Blog&amp;utm_medium=Banner&amp;utm_campaign=Essay\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" data-src=\"https:\/\/edukemy.com\/blog\/wp-content\/uploads\/2024\/06\/UPSC-Essay-Course-1280\u00d7300-1-3.svg\" alt=\"\" class=\"wp-image-42688 lazyload\" width=\"781\" height=\"182\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" style=\"--smush-placeholder-width: 781px; --smush-placeholder-aspect-ratio: 781\/182;\" \/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"In_case_you_still_have_your_doubts_contact_us_on_9811333901\"><\/span><strong>In case you still have your doubts, contact us on 9811333901.<\/strong>&nbsp;<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>For UPSC Prelims Resources,&nbsp;<a href=\"https:\/\/edukemy.com\/upsc-cse-prelims-resource-centre\" target=\"_blank\" rel=\"noreferrer noopener\">Click here<\/a><\/p>\n\n\n\n<p>For Daily Updates and Study Material:<\/p>\n\n\n\n<p>Join our Telegram Channel &#8211;&nbsp;<a href=\"https:\/\/t.me\/WithEdukemy4IAS\" target=\"_blank\" rel=\"noreferrer noopener\">Edukemy for IAS<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>1. Learn through Videos &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3vOD8sU\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>2. Be Exam Ready by Practicing Daily MCQs &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3Q9z2nF\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>3. Daily Newsletter &#8211; Get all your Current Affairs Covered &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3bE2y5J\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><li>4. Mains Answer Writing Practice &#8211;&nbsp;<a href=\"https:\/\/bit.ly\/3mZuVxl\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Visit_our_YouTube_Channel_%E2%80%93_here\"><\/span>Visit our YouTube Channel &#8211;&nbsp;<a href=\"https:\/\/www.youtube.com\/@ShabbirsEduKemyforIAS\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><span class=\"ez-toc-section-end\"><\/span><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>The proliferation of unmanned aerial vehicles (UAVs) in the hands of adversaries poses a grave challenge to national security, particularly along border regions. <\/p>\n","protected":false},"author":17,"featured_media":26230,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[1524],"tags":[1788,142,232,145,140],"class_list":["post-26228","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-upsc-mains-solved-paper-gs-3","tag-aerial-vehicles","tag-previous_year_questions","tag-upsc","tag-upsc-mains-question-paper","tag-upsc_preparation_strategy"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/26228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/comments?post=26228"}],"version-history":[{"count":1,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/26228\/revisions"}],"predecessor-version":[{"id":26231,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/posts\/26228\/revisions\/26231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media\/26230"}],"wp:attachment":[{"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/media?parent=26228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/categories?post=26228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edukemy.com\/blog\/wp-json\/wp\/v2\/tags?post=26228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}