USAGE 1. Narcotics and drug trade. 2. Cyber crime (cracking, file corruption, etc.) 3. File shari
It refers to the deep hidden internet platform that can only be accessed with specific software, con
It is the nodal drug law enforcement and intelligence agency of India. It is responsible for fighti
A terror organization who is responsibility for the recent attack on Army in J&K.
It is designed and developed by Directorate General of Civil Aviation (DGCA). It is launched for pr
Of the Indian Armed Forces envisages swift deployment of troops on the western border within days if
Global Terrorism Index is released by Australian Think Tank Institute for Economics and peace. The
The e-eye is a software-based system where high resolution thermal and infrared cameras capture all
Voice phishing is a form of criminal phone fraud, using social engineering over the telephone system
An online portal launched by National Cyber Security Coordinator's office in partnership wit