0% found this document useful (0 votes)
30 views106 pages

Internal Security 2021 by Saurabh Kumar (SRIAS)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views106 pages

Internal Security 2021 by Saurabh Kumar (SRIAS)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 106

Internal Security

Mains 2021

By Saurabh Kumar (Faculty for Polity,


Governance, Indian Society and
Internal Security SRIAS)

Telegram ID:- Saurabh Polity


INTERNAL SECURITY BY SAURABH KUMAR (Faculty for Governance, Social
Issues and Internal Security at SRIAS)

Syllabus:-
● Linkages between development and spread of extremism.
● Role of external state and non-state actors in creating challenges to
internal security.
● Challenges to internal security through communication networks, role
of media and social networking sites in internal security challenges,
basics of cyber security; money-laundering and its prevention.
● Security challenges and their management in border areas; linkages of
organized crime with terrorism.
● Various Security forces and agencies and their mandate.

Basic Terms
Extremism:- It is a perception of US versus THEM ,intensified by conviction that success of
“US” is inseparable from hostile acts against “THEM”. The ‘Counter terrorism strategy 2015’
defines it as” Extremism is the vocal or active opposition to our fundamental values-Rule of
Law, Democracy, Liberty, and Tolerance for different beliefs.
Insurgency:- “Indian Sub conventional doctrine” defines insurgency as ‘Organised armed
struggle by section of population against the States, usually with foreign support.
Militancy:- It is a condition which experiences use of violence aimed at pressurizing the
government to concede the demand of the leader.
Terrorism:- As per Unlawful Activities Prevention Act 2012,any act that threaten the unity,
Integrity, security or sovereignty of India. The current UK definition of Terrorism is given by
Terrorism Act 2006:-
a. Violent action that endangers a person's life.
b. Violent action that causes damage to property.
c. It creates serious risk to public health and safety.

Telegram ID:- Saurabh Polity


d. When it disrupts the economic system.

Linkages between development and spread of extremism


First, we need to talk about Naxalism:-
What is Naxalism?
Ans:- Naxalism is a Violent movement that claims to fight for the social and economic rights
of underprivileged groups who want to overthrow the Indian Government and replace it
with a different regime. Charu Majumdar described the period of 1960-1970 as a “decade of
Repression” by the Indian State.

What is the ideology of Naxalism?


Ans:- The Naxalite ideology is broadly based on Comrade Charu Majumdar's historic Eight
Documents and creative application of Marxism-Leninism-Mao Tsetung thought in Indian
conditions.
The documents are historic as they initiated a sharp departure from the parliamentary
system and put forward revolutionary politics countering revisionism in Communist
movement of India.
Ideology of Mao :- Revolution comes through Barrel of Gun and Proletariat class needs to be
ready for Continuous. Maoism teaches to capture State power through a combination of
armed insurgency, mass mobilization and strategic alliances.
Ideology of Lenin:- Establishment of the dictatorship of the proletariat, led by a
revolutionary vanguard party.
Maoists spread their ideology very systematically and in a phased manner as follows:
1. Preparatory phase: Detailed survey of new areas identifying important people,
public issues on which masses can be mobilised.
2. Perspective phase: Mobilisation through frontal organizations staging demonstration
against Government or administration based on local public grievances.
3. Guerrilla phase: converting the public movement into violent guerrilla warfare.
4. Base phase: Establishment of their base and change the guerrilla zone into a
liberated zone.
5. Liberated phase: Establishment of people’s Government.

Slogan of Charu Majumdar :- China’s Chairman is our Chairman. The Chinese path is our
path”.

What is the Origin of Naxalism?

Telegram ID:- Saurabh Polity


Ans:- The birth of Naxalism is pinpointed to the Naxalbari uprising of spring 1967 instigated
by communist leaders against oppressive landowners of the State.

What are the different phases of Naxalism?


First Phase (1967-1975 :- Naxalite Movement began in 3 police areas – Naxalbari, Khoribari
and Phansidewa (Darjeeling district, WB) and LWE Group founded “All India Coordinated
Committee of Communist Revolutionaries”. At this time it spread in Bihar and also in
Srikakulam district of Andhra Pradesh.

Second Phase (1975-2003):- With the lifting of the emergency, leaders were released from
the jail. There emerged four main factions:- MCC, PWG, Party Unity and CPI(ML). The
strategy of ‘protracted war’ was updated.They were operating in different rural areas of
India, For Example:-
(a) MCC in Bihar and Jharkhand.
(b) PWG in Telangana
(c) CPI(ML) (Liberation) became active in Politics
➔ One of the important features of the period was the caste warfare in Bihar between
the lower caste Dalits supported by MCC against upper caste armies like Ranvir Sena.

Third Phase (2004-2013) :- The third phase of movement started with the merger of
PU,PWG, and MCC in 2004 to form a unified CPI-Maoist which has a Common Command
structure. This resulted in an upward trend in the pattern of death/incident. Ex:- Dantewada
in 2010 and Sukma in 2013 has brought Naxalim in International headlines.

Fourth Phase (2013-Today) :- The level of violence and overall incident related to Maoist
insurgency has been declining. There are two possible reasons for this recent decline:-
(a) The Counter insurgency efforts by the Central and State government like Integrated
Action Plan, Mobile tower, Road Building Project.
(b) The Maoist central leadership realized that the expansionist strategy after the merger in
2004 can’t be sustained. Thus, they decided to change the strategy of ‘tactical retreat’ to
stop the arrest and killing of top leaders.

Fifth Phase (Urban Terrorism) (Part of Fourth Phase) :- The strategies and tactics of Indian
revolution in 2004’ and Urban Perspective :-‘Our works in Urban areas in 2007’spelled out
strategies and those tactics to spread into urban areas for underground and overground
support for armed movement.

URBAN NAXALS:-

Telegram ID:- Saurabh Polity


Urban Naxals are educated people in academia, media, NGOs and urban civil society in India
who support violent insurrection against the State.

What is the strategy of Naxalis?


Ans:-
(1) Mobilising and organising Industrial workers
(2) Setting organisations like Secret Revolutionary mass organisation, and Legal mass
organisation that are not linked to CPI.
(3) Operating under the grab of the Human Right Organisation ,NGO, Anti Superstition
movement.

Why Urban Naxals?


Ans:-
❖ Logistical support
❖ Reach of Media Propaganda Machinery
❖ Safe Haven for Leader
❖ Recruitment feasibility

Evidence of Urban Naxalism:-


Govind Kutty leaked document CPI (Maoist)-Urban Perspective.has spelled out strategy to
be followed for Urban Naxals:-
1. Penetrate in Bureaucracy, Paramilitary Forces and Army.
2. Financial support to faculties in JNU, TISS to propagate the ideology of Naxalism
among students.
3. In the urban areas the main concentration has to be on the consolidation of the
vanguard elements from the industrial proletariat class. This is doubly important
considering the present weak working class composition of our Party.
4. A steady supply of urban cadre is necessary to fulfill the needs of the rural
movement and the people's war. This is necessary for providing working class
leadership, as well as technical skills to the people's war.
5. Use of computers and the Internet network to further the military objectives of the
revolution.

Urban Naxalism is a myth:-


Anybody raising strong questions against the government is being perceived as Urban Naxal.
This kind of approach may help in stifling some dissenting voices, but it will lead to the rise
of real Naxals.

Telegram ID:- Saurabh Polity


Why Naxalism?
Ans:-
Developmental Roots:- The sudden reduction in forest cover or vegetation leads to lack of
access to forest products and livelihood which decreases opportunity costs for tribals and
increases their chances of joining Maoists.
Ideological Roots:- Naxals promote an ideology of bringing about a “New Democratic
Revolution” by launching protracted people’s war, establish base areas ,organise People’s
army.
Administrative Failure:- The apathy of administrators in terms of providing traditional rights
in common property resources ,lack of robust PDS system, health architecture in rural areas.
Social Inequality and Exploitation:- The oppressed classes were not only exploited as
sharecroppers and landless labourers by the landlords - they also fell prey to money
lenders.In Srikakulam, a government sponsored study noted that “Chronic poverty and 18
destitution have become the patterns of tribal life”.
External links:- It has been established that Naxals have links with foreign Maoist
organisations in Philippines and Turkey and get support from several organisations in Europe
and are members of Maoist Parties and organisations of SouthEast Asia (CCOMPOSA).
Governance Failure:- The dream of “Sabka Saath Sabka Vikas” is incomplete unless all the
government functionaries works for the welfare of people in terms of-
a. Using Discretionary Power for common good
b. Ensuring rights granted to them under FRA,2005.
TO SUMMARISE:-

Telegram ID:- Saurabh Polity


What is the linkage between development and Extremism?
Development:- Campanian or antithetical to Tribals:-
A Report of Planning Commission “ Development Challenges in Extremist affected areas’
highlights the failure of development process in Tribal areas in terms of:-
❖ Land Alienation.
❖ Poverty amongst ST and Dalits.
❖ Lack of access to Basic forest Resources.
❖ Displacement with little or no rehabilitation.
❖ Adding to it is Economic Inequality.
❖ Skewed Mining Policy.
❖ Labour, Unemployment and issue of Minimum Wages
❖ Environmental Degradation.
❖ Lack of Implementation of PESA and FRA,2005.

How Land alienation results in the spread of Naxalism?


1. Land acquired for SEZ

Telegram ID:- Saurabh Polity


2. Insecurity, Exploitation of Tenants
3. Land Eviction
4. Failure of Land Reforms
5. Lack of Titles
Case Study
The Supreme Court in a case relating to acquisition of Tribal land in Orissa by Mahanadi
Coalfield Limited found that people have not been compensated.

How is Poverty leading to Naxalism?


Ans:- The National Family health survey shows 45.9% of ST members are in the lowest
wealth bracket. According to the World Bank briefing “India’s Adivasis” –Despite a decline of
1/3 rd of their poverty rate between 1983 to 2014,Poverty rates amongst them remain high.
Effect of Poverty leading to alienation
1. Malnutrition and Hunger
2. Social Exclusion from assessing
3. Government services

How is the Displacement leading to the rise of Naxalism?


Ans:- At 25th International Congress on Condition Monitoring and Diagnostic Engineering
says Country’s development projects have displaced more than 20 million since
independence.
Result:-
● Landlessness
● Joblessness
● Marginalisation
Case Study:-
The Sardar Sarovar Project displaced 57% of tribals among total displaced people.

How is the lack of FRA 2006 Implementation leading to Naxalism?


Ans:-
FRA,2006 is an attempt to undo historical injustice by providing individual and
community rights to ST and other forest dwellers over forest land.
Implementation Issue:-
(1) Majority of Titles issued so far are of individual rights.Only less than 4% titles recognize
Community forest rights.
(2) 83% of claims have been disposed of, but only 43% have been accepted by authorities
because of lack of data and map (Cornell University).

Telegram ID:- Saurabh Polity


(3) Forest Bureaucracy and Corporate are major impediments in full implementation of
FRA,2006.
(4) The CAMPA Act, creation of Land Banks, diversion of forest land without the consent of
Gram Sabha have worked to reverse the democratic governance framework set by FRA.

How is the lack of implementation of PESA leading to Naxalism?


Ans:-
PESA 1996 Can achieve three things:-
(a) Deprive the Naxals of fertile ground of backwardness and Poverty.
(b) Assimilate 8% of Tribals adivasis into mainstream Political Current.
(c) It will help in preserving Forest and Local ecology.
Lack of Implementation of PESA:-
(1) Exploitation of Tribals---------- Discontent----------- Alienation
(2) Land Alienation of Tribals------ Displacement-------- Alienation
(3) Corporate Profit --- Killing Tribal Sustainability-- Alienation
(4) Gram Sabha power seized by Naxals in case of improper Cooperation with Forest
Officials.
(5) Distrust with the Government is exploited by Naxals.

Case Study:-
Rise of Pathalgada movement in Jharkhand and Maharashtra.‘Pathalgadi’ literally means
carving a stone.The government in Jharkhand introduced amendments to the Chotanagpur
Tenancy Act (CNT) 1908 and the Santhal Pargana Tenancy (SPT) Act 1949. According to the
new amendments, governments could procure land from tribals for commercial use,
without the permission of the gram sabha in Violation of PESA.

What is the current situation of Naxalism?


Ans:-
Report of MHA:-
● Surrender:- It has increased by 400% compared to 2013.In 2017 itself, more than 30
maoist surrendered.
● No of districts affected by violence reduced from 96 districts in 10 states in 2010 to
41 now. (MHA)
● According to the report, Maoists are making a foray into Kerala, Karnataka and Tamil
Nadu, and planning to link the Western and Eastern Ghats through these states.
State Wise Status:-
1. Chattisgarh- Indian Tricolour was hoisted for the first time in Gompad Village
2. Odisha:- Fatalities of armed personnel decreased.

Telegram ID:- Saurabh Polity


3. Maharashtra:- shares its boundary with six states and districts of Gadchiroli and
Gondia have a huge disparity in per capita income. The interconnection with other
affected States allows the movement to retain its violence.
4. West Bengal:- The situation seems to have stabilized but the lines between politics
and extremists are blurred. The exact cadre strength cannot therefore be assessed. It
has a sub- surface potential which can be exploited at any time.
5. Bihar:- is a State with a border with Nepal and a huge inter-caste rivalry. The criminal
elements are the pseudo associates of Naxal organisations. It is therefore not
surprising that the activities are predominantly based on arson and kidnappings.

What are the steps taken by the Government to check Naxalism?


Ans:- The multi-pronged strategy primarily includes development and security aspects of
affected districts. Projects related to development include infrastructure, roads, cell phone
connectivity, bridges and schools.
Security Related Measures:-
(a) Operation Steeplechase (1970), Operation Green Hunt (2009) and Unified Command
system
(b) Special Battalion of CRPF
(c) Black Panther Combat Force for Chattisgarh on the lines of Greyhound in Telangana and
Andhra Pradesh.
Unified Command System:- In 2010, the Government established a Unified Command for
inter-state coordination (in intelligence gathering, information sharing and police responses)
between Chhattisgarh, Jharkhand, Odisha and West Bengal.The Unified Command will have
a retired major general asa member for advice and guidance in dealing with Naxalism.

Salwa judum was a group of forces fighting against Maoist.


Those in favour of the idea claim that the Judum was a “spontaneous uprising” of tribal
people against Maoist violence in Bastar, and helped in countering Naxals in the region.
The state government allegedly supplied arms and tacit support to the Judum, which had
turned into a vigilante group, recruiting poorly trained youth as “Koya Commandos”, or
“SPOs (Special Police Officers)”. Forces were basically the surrendered Maoist. Salwa
judum was provided training and salary by the state government. They were found
accused of human right violation, blatant use of power against the villagers. Considering
all this, the court held it unconstitutional in 2011.

Then what the government did, changed the name of the force and now knows as
"District reserve guard"with the same surrender Maoist.

Telegram ID:- Saurabh Polity


Development Related Measures:-
➢ Civic Action Program:- Under this scheme financial grants are sanctioned to CAPFs to
undertake civic action in the affected states. Objective is to build bridges between
the local population and the security forces.
➢ Road Requirement Plan:- This Scheme is being implemented by the Ministry of Road
Transport & Highways for improving road connectivity in 34 LWE affected districts of
8 States.
➢ LWE Mobile Tower Project: To improve mobile connectivity in the LWE areas, the
Government approved installation of mobile towers in LWE affected States and 2335
mobile towers have been installed in Phase-I.
➢ Skill Development Program:- ROSHNI
Case Study:-
SARANDA Model:-
❖ Focus on Infrastructure Development like Road & Offices.
❖ Integrated Development Centre will be opened that will provide subsidised ration
under PDS, generate Employment under MGNREGA.

Rights and Entitlement Related Measures:-


The Odisha Government’s decision to cover beneficiaries of the Forest Rights Act (FRA)
under different welfare schemes through convergence at the field level seems to have
yielded results as more than 2.3 lakh persons benefited from this new initiative

Media Management Measures:-


Activities like Tribal Youth Exchange programmes organised by NYKS, radio jingles,
documentaries, pamphlets etc. are being conducted to check false Propaganda of Naxalism.

You can remember this also:-


SAMADHAN It is a strategy of MHA to frame short term and long-term policies to tackle
LWE. It includes:

· S- Smart Leadership

· Aggressive Strategy

· M- Motivation and Training

· Actionable Intelligence

· D- Dashboard Based KPIs KRAs

Telegram ID:- Saurabh Polity


· H- Harnessing Technology

· Action plan for each Theatre

· N- No access to Financing

What are the challenges faced by the Government to check Naxalism even after such
elaborate plans?
Ans:-
1. Financial Support to Naxalism:- (Important for Exam, so covering Holistically)
A document titled “Our Financial Policy” adopted by the CPI-Maoists at the 9th
Unity Congress in 2007, the sources of funding come from membership fees and
contributions, extortion and confiscation of wealth and income of the enemy and
‘revolutionary taxes’.
New Areas to generate Finance:-
Organised Crime:- In 2018, Indian police seized an amount of crude heroin
equivalent to 700 million Rupees from Naxal areas. It is suspected that Naxali has
contact with Drug traffickers of Afghanistan and Pakistan Border.
Illegal opium cultivation:- Jharkhand is one of the Indian states heavily affected by
the Maoist insurgency and the Maoists have been using opium cultivation as a source
of revenue since 2007. Moreover, Maoists have been known to entail villagers in
opium production by providing them with seeds, start-up money and a reward of
10,000 Indian Rupees per kilogram of opium.
Naxalites are also profiting from harvesting and trafficking cannabis from Orissa,
parts of which are under Maoist control, to other parts of the country and the region.

2. Ties with different groups:-


➢ Maoists have allegedly sought the support of their comrades in insurgency in Assam
and Jammu & Kashmir to accomplish the goal of overthrowing the central Indian
government.
➢ The Indian government accuses the United Liberated Front of Assam (ULFA) of
working with the Naxalites to smuggle drugs and counterfeit money along the
Indian-Bangladeshi border, in exchange for weapons and explosives from the ISI.
➢ Sailen Sarkar, a member of the communist party of Bangladesh was accused of
training Naxalites in ISI sponsored camps in Bangladesh, and of participating in
organised crime activities alongside the Maoists and the ULFA.

3. Lack of Intelligence sharing between CRPF and State Police.

Telegram ID:- Saurabh Polity


Question on deployment of army officers OR CRPF officer for maoist Operation.
The fact is army personnel are not fit for such operations because of lack of experience in
dealing with maoist, lack of intelligence, and lack of knowledge about the social conditions
of these areas.
Capf is doing well and showed it's valour in:-
1. Indian peace keeping operation
2. Played its role during the Punjab insurgency.
3. Peace in northeast
4. Expert in guerrilla warfare.
5. The operation greyhound has been successful because of combined efforts of state
police and CRPF.

Conclusion :- In maoist Operation, neither the army nor the CRPF should play the leading
role. The state police officers should be supported by CRPF in operation as state police
have well connected intelligent networks in the areas. Army deployment may be
considered as an instrument of last resort, when all else has failed. The reality is, all else
has not even been tried.

4. Capacity Building of Forces is lacking to tackle Guerrilla warfare


5. Support from External Agents like China.
6. Strategic Communication Campaign is lacking .The need of the hour is to implement
‘Ugravad se kya khoya kya paya’ meeting held by Police in Jharkhand.
7. Corruption In Government Machinery.
8. Lapse in Surrender Cum Rehabilitation Policy
What is this Policy?
Ans:- Surrender-cum-Rehabilitation policy is part of the overall policy to build consensus and
evolve an acceptable and peaceful solution to violence perpetrated by extremist groups, to
usher in peace and development, especially in the disturbed regions.

The objectives of these Guidelines for surrender-cum-rehabilitation of naxalites in the naxal


affected States are:
● To wean away the misguided youth and hardcore naxalites who have strayed into the
fold of naxal movement and now find themselves trapped into that net.
● To ensure that the naxalites who surrender do not find it attractive to join the naxal
movement again.

Eligibility Criteria:
Telegram ID:- Saurabh Polity
● These guidelines are applicable to those naxalites who surrender with or without
arms.
● The eligibility of such naxalites for assistance under the scheme would be scrutinized
by the Screening cum Rehabilitation Committee constituted by the concerned State
Government.

Benefits:-
● Persons eligible under the scheme may be imparted training in a trade/vocation of
their liking or befitting their aptitude. They shall be paid a monthly stipend of Rs
2000/- each for a maximum period of 36 months. However, if the surrenderee
secures any employment in Government or any gainful self-employment, the
monthly stipend will be discontinued.
● An immediate grant of Rs. 1.5 lakh shall be kept in a bank in the name of surrenderee
as a fixed deposit which may be withdrawn by the surrenderee after completion of 3
years, subject to good behaviour to be certified by the authorities designated for this
purpose by the concerned States.

CASE STUDY
In chattisgarh, The benefits that a surrendered Maoist is eligible for in Chhattisgarh are
₹ ₹
significant: 5 lakh for a high ranking Maoist (category 1), and 2.5 lakh for middle and

lower cadre Maoists (category 2A and 2B respectively); a monthly stipend of 6,000 for a
maximum period of 36 months; additional incentives for recovered weapons; and study and
house-building grants. Only 3% of Maoists that surrendered in Chhattisgarh in the past three
years, have been passed by the Screening committee to be eligible for benefits under policy.

So, here the problem lies:-


1. Only those Maoists who have rewards on their heads and have police records are
considered for compensation under governments’ surrender and rehabilitation
policy, and that too if the surrender is approved by the state-level committee.
2. Government doesn’t compensate lower cadres because they are not active. The aim
of these small cadres when they surrender is to remove themselves from polices’ list
and live a life without police fear. So their name is not sent to the screening
committee.
3. Even in the case of cadres with bounties, there are bureaucratic challenges, such as
what lists their names appear on because the name in the list will decide the
quantum of compensation.

Telegram ID:- Saurabh Polity


What are the suggestions to check Naxalism?
❖ New Deal:- Colombian Peace deal can provide a blueprint for tackling Naxal
Operation .This deal is based on few underlying provisions such as Comprehensive
Rural Reform,Improving Citizen Participation.
❖ Perception Management:- The tribal way of life should be celebrated on AIR.
❖ UNESCO advises for soft power augmentation with focus on-Education, Youth
Empowerment. Gender Equality and Internet and Social Media.
❖ SDG:- Implementation of SDG 16
❖ XAXA Committee:-
➔ Land Acquisition- G Sabha consent if forged, there should be Penalty.
➔ G Sabha:- Empower it to restore alienated land back to original owner ,even
while a case is pending in the court.
➔ Mining:- It should be done by Tribal Cooperatives only as in Andhra.
➔ Participative Policy:- Like Tribal Health Policy with Special focus on Tribal
health.
❖ Modernisation of Law Enforcement Agencies.

Role of external state and non-state actors in creating challenges to internal security.

Who are external actors?


Ans:- Major grounds for India’s security circles include Nuclear Competences of China and
Pakistan and String of Pearls strategy of China and Pakistan Military assertiveness.
Who are Non State actors?
Ans:- Non-state actors are individuals or organizations that have powerful economic,
political or social power and are able to influence at a national and sometimes
international level but do not belong to or allied themselves to any particular country or
state. But sometimes these Non state actors are used by the State to destabilise its enemy.
1. Terrorist Organisation
2. Drug Cartels
3. Smugglers and Pirates in Ocean
4. Trafficking cartels
5. Fake currency cartels
6. NGO/MNC/TNC

The entire matter can be divided into following:

Telegram ID:- Saurabh Polity


- Role of state and non-state actors in Pakistan .
- Role of state and non-state actors in China.
- Role of state and non-state actors in Nepal .
- Role of actors in Bangladesh.

Role of State and Non State actors by Pakistan


❖ State Sponsored Terrorism:- Islamic terrorist groups like the Al-Qaeda,
Lashkar-e-Toiba, Harkat-ul-Jihad Islami, Jaish-e-Mohammad, the Pakistani Taliban
along with various other groups.
❖ Supply of Fake Currency Notes through Nepal, UAE, and Waters of Srilanka and
Thailand
❖ Hawala Transactions.

Analysis of Role of Pakistan :-


❖ Bleed India with a Thousand Cuts is a military doctrine followed by Pakistan against
India. It consists of waging covert war against India using insurgents at multiple
locations.
❖ Pakistan's intelligence agency ISI created a special Punjab cell in its headquarters to
support the militant Sikh followers of Bhindranwale.
❖ War between India and Pakistan:-
1. The first India-Pakistan war over Kashmir was fought, after armed tribesmen
(lashkars) from Pakistan's North-West Frontier Province (now called
Khyber-Pakhtunkhwa) tried to invade the disputed territory in October 1947.
2. 1965 War:- The war began following operation Gibraltor which was designed
to infiltarate irregular Jihadi forces into Jammu and Kashmir to precipitate an
insurgency against rule by India.
3. 1971 War:- This war was a significant departure from earlier military attacks
because it was not a direct attack on Pakistan but a coordinated move to
dismantle Pakistan presence in Bangladesh which was a cause of internal
security for India. India has adopted a highly aggressive operation Jackpot to
increase speed and penetration.
4. 1984:- India got intelligence inputs that Pakistan is planning to occupy
Siachen glacier. The major strategic point here is the Saltoro ridge. India
launched Operation Meghdoot on 13 April 1984 and occupied strategic
positions along the Saltoro ridge and since then the glacier is under the
administrative control of India.

Why this controversy even after the Shimla Agreement?

Telegram ID:- Saurabh Polity


ANS:- Most of the India-Pakistan border remains delineated as the LOC or
Line of Control with their respective troops on either side. Most of these
positions were delineated as per the 1972 Shimla Agreement; however, the
boundary line was specified to only a point known as NJ 9842. The Shimla
agreement provided that after NJ 9842, boundaries would proceed “north to
the glaciers“. However, the agreement did not specify which nation would
have control over which area.
What are the options available ?
Ans:-
● Both countries can agree to a glacier of peace with neither side
occupying it.
● The second option is mutual withdrawal of forces without delineation
and authentication. This is both undesirable and unlikely.
● The third option is mutual withdrawal after jointly recording current
military positions and exchanging them.
● It can also be converted into an international destination for glacial
research and other scientific experiments.
Recent Issue:-
● The International Crisis group published a report titled “Pakisatn Jihadist Heartland
:- Southern Punjab”:- The report stated a Jaish-e Mohammad attack on Pathankot
IAF base has raised the terror groups profile in Punjab in Pakistan.
● MHA’s Annual report noted:- “The year 2017 witnessed 6.21 percent increase and
166.66 percent increase in the number of terrorist incidents and fatalities of civilians
respectively in comparison to the corresponding period of 2016.

KASHMIR ISSUE:-
Why is Kashmir boiling?
Ans:-
External Reason:-
1. The year 2013 started with the beheading of an Indian soldier by terrorists and
attacks on army patrols along the Line of Control (LoC) escalated sharply.
2. Just after India’s changing position on Article 370. In February 2019, an attack on the
convoy of Indian paramilitary forces in Indian-controlled Kashmir killed at least forty
soldiers.
Internal Reason:-
1. Social Media:- It was not only being used to mobilise the crowds for protests but also
to show the government and the security forces in very poor light through
sophisticated campaigns run on popular sites such as Facebook and Twitter.

Telegram ID:- Saurabh Polity


2. Fears of the ‘Kashmiri identity’ being swamped by outsiders were played up, both in
social media and by the separatists
3. Radicalisation:- There had also been growing radicalisation among the people of
J&K. It is often debated whether this radicalisation had a greater religious or political
character, but what was clear was that there was greater acceptance in the society of
violence as a tool.
4. Unemployment:- As per Economic survey, Nearly a quarter of its population in the
age group of 18 to 29 years is unemployed, which is far more than the national rate
of 13.2 percent.
5. Political :- David A Lake and Donald Rothchild in their paper, “Containing Fear: The
Origins and Management of Ethnic Conflict”, argue that “intense ethnic conflict is
most often caused by collective fears of the future”. This fear of how the future may
unfold is exploited by ‘ethnic activists’ and political entrepreneurs and parties of
Kashmir valley.

Security Condition in J&K after abrogation of Article 370:-


❏ According to a report by the Union Ministry of Home Affairs, incidents of terrorism in
Jammu and Kashmir have declined by about 36% after the abrogation of Article 370.
❏ The Hurriyat Conference, which promotes terrorism and violence, was also jolted this
year when its leader Syed Ali Shah Geelani separated himself from the Hurriyat
Conference.
❏ There has also been a decline of 40% in the involvement of local youth in terrorist
outfits, this year.
❏ There has been a 40% decrease of involvement of local youth in terrorist
organizations as only 67 youths of Kashmir valley were brainwashed and made to
pick up guns against India.

Suggestion:-
★ Border Management:- BSF in the International boundary sector should be placed
under command of the army.
★ Development:- There are many non-controversial areas, such as tourism, roads and
education, which affect all three regions (Jammu, Kashmir and Ladakh) of the state
equally. These could be the focus areas for development.
★ Surrender and Rehabilitation Policy:-The success of any policy is not dependent on
the financial incentives for surrender but the successful rehabilitation into the
society. This is where the current policy is silent.
★ Employment Generation:- Udaan is an initiative by the Ministry of Home Affairs
(MHA) to provide skills and job opportunities to the youth. However, the scheme has

Telegram ID:- Saurabh Polity


not seen much success because the jobs are largely outside the state and the salaries
are very modest.
★ Cracking Down the Groups in Jammu and Kashmir:- The crackdown on the Jamaat-e-
Islami is aimed at throttling the network of over-ground workers of terror groups.
The National Investigative Agency had established links between terrorists, Hurriyat
and stone-pelters, tracking the flow of funds, which led to charge sheeting. On 30th
August 2018, Syed Saluddin’s son, Shakeel was arrested by NIA for funding terrorist
activities through Hawala racket.

➔ Over Ground Workers:-


OGWs were primarily involved in logistics support and intelligence gathering and also
capable of carrying out small scale strikes.
Categories of OGW:-
❏ OGWs for Logistic Support (OGWLS) to Strike teams.
❏ OGWs managing Funding (OGWF).
❏ OGWs provide Ideological Support (OGWIS).
❏ OGWs providing Radicalisation Support (OGWRS).
❏ OGWs for Recruitment of Terrorists (OGWR).
❏ OGWs generate negative Perceptions and Sentiment amongst the Awaam.

❖ Anti radicalisation of Youth:- The ‘anti-radicalisation’ programmes are meant to


protect those segments of population that have only recently come under the
influence of radicalisation and cover measures related to early detection of trends
toward violent extremism and radicalisation as well as developing immunity and
deterrence against the propagation of hateful and violent indoctrination.

Why are our youth getting radicalised?


❖ Social media was one of the major tools being used by the militants to “propagate
their ideology and to reach the young minds and to corrupt the young minds of the
Valley.
❖ Frustration because of Injustice, starvation, Poverty.
❖ Social Inequality

Telegram ID:- Saurabh Polity


❖ Pakistan Proxy war.

CONCEPT:-
The term Counter Radicalisation, De radicalisation and Anti Radicalisation is used
interchangeably,but they have different meaning:-
Counter Radicalisation:- Campaigns are launched in communities/societies that have
already contracted the virus of radicalisation and violent extremism.
De Radicalisation:- Treat violent extremists during their period of imprisonment or
incarceration, so that they do not practise or propagate ideas of violent extremism once
their jail term ends.

Steps taken by Government for Anti Radicalisation:-


Maharashtra Government:-

Karnataka Government:- An intensive survey of madrasa and mosque ,creating a detailed


database.
Home Ministry:- The Home Ministry has recently operationalised the newly created Counter
Terrorism and Counter Radicalisation Division in which IB is a major stakeholder and will
work with other agencies.

Best Model:- Saudi Arabia started its de-radicalization programme in 2004 focusing on
religious re-education and psychological counseling of terror suspects and convicts to
educate, monitor and reintegrate radical elements into society.

Telegram ID:- Saurabh Polity


Role of State and Non State actors by China:-

❖ Traditionally, China has provided financial aid, arms and sanctuaries to Naga, Mizo
and Meitei extremist’s right since the British Era.
❖ The Nagas were the first to approach Beijing, but China made best use of it. Other
groups like MNF, ULFA, PLA, ATTF and NDFB followed.
❖ The Maoist movement got ideological, moral, financial and intellectual backing from
China.
❖ According to a report by Munk Center for International Studies, University of
Toronto, more than 35 sensitive computers belonging to the Indian NSCS, Air Force,
the Army’s Military Intelligence and Indian missions in Kabul and Moscow were
accessed by a Chinese cyber network after they got infected by ‘GhostNet.

Analysis of Role of China:-


What is China’s grand strategy?
Ans:- It is based on three “ E”:- Encirclement (Strings of Pearls), Envelopment (Financial aid
to neighbours) and Entanglement (Exploiting domestic crisis like Naxalism and Insurgency)

Evidence of Threat from China:-


1. War of 1962 on Tibet Issue and misinterpretation of Mcmahon line in Eastern sector
and Johnson line over Aksai Chin in Western sector.
2. Nathu La and Cho La clashes of 1967:- The Competition to control the disputed
border land in Chumbi valley is seen as a major cause for heightening tension.
3. Sumdorong Chu Valley in Arunachal Pradesh of 1987:- It was in retaliation of India’s
Operation Chequerboard to see how quickly troops based in Assam Plains could take
position at border
4. April 2013:- A Chinese platoon advanced 12 miles into Indian-held territory near
Daulat Beg Oldi in Kashmir.
5. June 2016:- Incursion by Helicopter in chamoli district of Uttarakhand.Official figures
of Ministry of Home Affairs said while in 2015 about 500 transgressions were
reported along the border.
6. 2017 In Doklam:- Doklam is strategically located close to the Siliguri Corridor, which
connects mainland India with its north-eastern region. Once China gets control over
the Doklam, it has the potential to disconnect North East from Indian Mainland.China

Telegram ID:- Saurabh Polity


was playing a mind game and uses its Three Warfare’s Strategy which involves a triad
of media war, psychological war and legal war.
7. 2020 In Western Sector:- It is said the border clashes of 2020 are different from
earlier times. HOW?
● Area of Conflict:- At multiple locations at the same time ie:- Gogra Post,
Galwan valley, Pangong Tso and Naku La in Sikkim.
● Catastrophic changes:- Some scholars view that Abrogation of Article 370 and
Comment on Aksai Chin by MPs has resulted in Chinese aggressiveness.
● China saw India’s recent road construction work in the area as a change to the
status quo and a challenge to its strategic position.
● China dislikes India drawing closer to the United States and its allies in Asia.
● China seeks to distract attention from its part in the global pandemic.

8. China is expanding the size of its nuclear arsenal by building more missile silos.
However the scope and size of the nuclear arsenal is not known exactly. According to
United Nations strategic command, China has nearly 200 nuclear warheads, might be
trying to o match USA 3800 warheads or also might be trying to showcase these 200
only to the world by making statements of increased nuclear head and not planning
for anymore. However, the report of having developed a site with 120 nuclear silos in
Gansu province is correct.
Why is China doing this?
Ans:-
● To deter the enemy's first strike.
● To match the USA nuclear arsenal.
● Missile Silos in Xinjiang and Gansu province are capable of carrying multiple
warheads.
Impact on India:-
● Intermediate range ballistic missiles are deployed in regions close to sion india
border.
● China is not entering into a tripartite agreement with USA and Russia, thus planning
for more nuclear arsenal.
● Impact on boundary dispute.

What is the approach of GOI to deal with China at the Border?


Ans:- Four types of border activities by both India and China to tackle internal security:-
deployment of defence apparatus, troop reinforcements, construction of rail and road links,
and military exercises.

Telegram ID:- Saurabh Polity


Defence Apparatus:- India moved T-72 battle tanks and formal induction of Sukhoi 30, MiG
29 and Mirage 2000s.
Troop Reinforcement:- An additional 35,000 troops along the disputed Himalayan border
with China.
Infrastructure Creation:-
❏ Inauguration of the Bogibeel Bridge:- Facilitating swift movement of defence forces.
❏ Pakyong airport in Sikkim is located around 60 km from the India-China border.
❏ Darbuk-Shyok-Daulat Beg Oldie Road:- This road joins Leh to the Karakoram Pass,
which divides Ladakh from China’s Xinjiang province.
❏ BRO and CPWD are currently engaged in the construction of 73 strategic roads
measuring 4,643 km along the India-China border.
Military Exercises:- The integrated exercise named ‘Chang Thang’.

Role of State and Non State actors in Bangladesh:-

❖ Refugee Crisis leading to ethnic and communal tension.


❖ Issue of Trafficking through West Bengal Border.
❖ The exploitation of diversities has caused breakdown of the cohesiveness of the
society, created uncertainty of cultural identity, stimulated religious revivalism in its
fundamentalist form

Insurgents in North East (Non State Actor)


Conflicts in the region range from insurgency for secession to insurgency for autonomy; from
‘sponsored terrorism’ to ethnic clashes, to conflicts generated as a result of continuous
inflow of migrants from across the borders as well as from other States. Conflicts in the
region can be broadly grouped under the following categories:-
1. National Conflicts:- Demand for Distinct Homelands.
2. Ethnic Conflicts:- Conflicts between insider and outsider OR Conflicts between
different Tribal groups like Kukis and Meities in Manipur
3. Sub Regional Conflicts:- Demand for Autonomy. Ex:- Bodoland Territorial Council

State Wise Understanding of Conflict:-

Arunachal Pradesh:- The State has remained peaceful after the cease-fire with NSCN which
was active in Tirap District. The recent clashes have been observed after the Citizenship
amendment act when Chakmas refugees were allowed to settle there.

Telegram ID:- Saurabh Polity


Manipur:- Most Violent State
❖ There was resentment in a section of the Meitei society about the merger of the
State with the Indian Union – a resentment which led to the Meitei insurgency from
the 1960s.
❖ There is considerable tension among the tribes over land and boundaries and
violence between Nagas and Kukis.
❖ In the southern parts of the state Hmars, Paite and other tribes have been waging
violent struggles partly for local hegemony and partly for their own enclave in the
form of a Union Territory called “Zoland Territorial Council’.
❖ It is reported that today militant organisations are virtually running a parallel
government in many districts of Manipur and they are able to influence the decision
of the State Government in awarding contracts, supply orders and appointments in
government service.
❖ It is also reported that militant organisations indulge in widespread extortion and
hold ‘courts’ and dispense justice in their areas of influence.

Assam:-
1. Agitations against ‘influx of foreigners’:- Bengalis VS Assamese & Assamese VS
Bangladeshi Immigrants.
2. Escalating conflicts involving tribal communities who seek local autonomy.:- Ex:-
Bodoland Territorial Region

BODO Issue:-
Bodos are the single largest community among the notified Scheduled Tribes in Assam.
Bodos are a part of Bodo-Kachari and constitute about 5-6% of Assam’s population.
Background:-

Telegram ID:- Saurabh Polity


First Bodo Accord:- It led to the creation of the Bodoland Autonomous Council with some
limited political powers.
Second Bodo Accord:- This led to the creation of BTC, which is an autonomous body under
the Sixth Schedule of the Constitution.
Third Bodo Accord:-
❖ A new Bodoland Territorial Region would include the villages which are dominated by
Bodos but are outside BTAD presently. Villages with non-Bodo population would be
excluded from it.
❖ Bodos living in the hills would be conferred a Scheduled Hill Tribe status.
❖ Bodo language with Devanagari script would be the associate official language for
the entire Assam.

❖ A Special Development Package of 1500 crore would be given by the Centre to
undertake specific projects for the development of Bodo areas.

ULFA:-The ULFA chief asked to mediate for peace talks with the central government. Already
the group has signed a ceasefire in may, which is again extended by next 3 months.
➔ The United Liberation Front of Asom (ULFA) is a militant outfit operating in Assam. It
seeks to establish an independent state of socialist Assam with an armed struggle.
➔ It was founded in 1979 by PareshBaruah. The organisation established ties with the
Nationalist Socialist Council of Nagaland in 1983, with the Burma based Kachin
Independence Army in 1987 and began its own operations in 1990.

Telegram ID:- Saurabh Polity


Challenges:-
❖ ULFA has links with ISI of Pakistan and GDFI of Bangladesh. It has been alleged to
launch a proxy war against India.
❖ This outfit had its support base in Brahmaputra Valley, with training camps and
sanctuaries in Nagaland, Arunachal Pradesh as well as in Bhutan, Bangladesh and
Myanmar. It has operational links with other factions particularly with the NSCN.

Meghalaya:-
❖ Increasing clash of interest between the State Government and the Sixth Schedule
District Councils – the entire State is under that Schedule.
❖ Increasing inter-tribal rivalry.
❖ Emerging tensions about infiltration from Bangladesh particularly in the Garo Hills.
❖ Though Meghalaya has been the most peaceful state in North east, the recent death
of the leader of Hynniewtrep National Liberation Council (HNLC) by Police has
sparked stone pelting, vandalism.
Background

❖ Insurgency in Meghalaya “started as a movement against the domination of the


‘dkhars’ (outsiders)”.
❖ The first prominent separatist militant tribal organisation of the state, Hynniewtrep
Achik Liberation Council (HALC), was formed in the mid-1980s,referring to the Khasi
and Jaintia communities, and ‘Achik’ to the Garo community. The HALC later split into
HNLC, which represented the Khasis and the Jaintias, and the Achik Matgrik
Liberation Army, which represented the Garos and was subsequently replaced by the
Achik National Volunteers Council.
❖ Now this Achik National Volunteers Council has been in a ceasefire agreement with
GOI since 2004.
❖ While HNLC’s top leadership, based in Bangladesh, continue to resist any type of
peace deals,

Mizoram:- Following an ‘accord’ between the Union Government and the Mizo National
Front in 1986 and conferment of statehood the next year, complete peace and harmony
prevails in Mizoram.

Nagaland:-

Telegram ID:- Saurabh Polity


What is the demand of NSCN (IM)?
Ans:- A “Greater Nagalim” comprising “all contiguous Naga-inhabited areas”, along with
Nagaland. That included several districts of Assam, Arunachal and Manipur, as also a large
tract of Myanmar.
The Nagaland Assembly has endorsed the ‘Greater Nagalim’ demand — “Integration of all
Naga-inhabited contiguous areas under one administrative umbrella” — as many as five
times: in December 1964, August 1970, September 1994, December 2003 and as recently as
on July 27, 2015.

Relation between Government and NSCN (IM):-


1. The Government of India signed a ceasefire agreement with NSCN (IM) on July 25,
1997.
2. Territorial Framework Agreement in 2015:-
Features:-
★ It does not change the boundary of different States to include the aspiration of
Greater Nagalim where Nagas live in different States.
★ It provides for an Autonomous Naga territorial Council for Arunachal Pradesh and
Manipur for Nagas living here.
★ A common cultural body for Nagas across States.
★ Specific Institutions for State’s Development Integration and Rehabilitation of Non
State Naga Militia.
★ Removal of AFSPA wherever Possible.

Challenges:-
Telegram ID:- Saurabh Polity
❏ NSCN (IM) is demanding a Separate Constitution and Flag for Nagas.
❏ Tangkul Community (Part of NSCN) will not accept any agreement that excludes areas
inhabited by them.
❏ There is a continuing confusion in Assam and Arunachal Pradesh over the ceding of
territory for Greater Nagalim.

Analysis of What is going on in North East:-


➢ Armed separatist groups in India’s north-east recently united under the banner of a
so-called ‘United Liberation Front of Western South Asia’.
➢ There is a 17 per cent decline in total incidents and a 38 per cent reduction in the
casualties of civilians.(Home Ministry)
➢ Strictly speaking, the situation is under control in most parts of the region, except for
in Manipur, parts of Northern Assam and some areas around the Assam-Arunachal
and Assam-Meghalaya borders.
➢ All of the three militant groups namely NSCN (K), NSCN (KK) and NSCN (M) are trying
to enhance their area of influence and also dominate towns like Dimapur where
‘funds’ are available. Thus, Inter-Factional Clashes (IFC) among the insurgent groups
are quite common

What are the main factors for the Insurgents ?


Ans:-
Political Mobilization by Insurgents :-
● ULFA claims Assamese will get due recognition only when Assam becomes separate
Swadhin Asom.
● Mizo National Front :- Manipur forcely merged by India on a gunpoint.
● NSCN (IM):- The agenda for political mobilization for NSCN (IM) is the Naga Territorial
unification and sovereignty based on its own narrative of independence of Nagas.

Porous International Border and Availability of Arms :-


● Border passes for people living in border areas to travel within 16 km of the border
without special permit acts as a conduit for delivery of arms, drugs and transit points
for trafficking.
● Certain insurgent groups such as UNLF, NSCN (IM) and NSCN (K) have been found to
be involved in Drug trade along with the Karens and the Kachins in Myanmar.
Tough Geography:-
● Due to supportive terrain he groups are able to surprise the Military by tactics of
guerrilla warfare and hit and run.

Telegram ID:- Saurabh Polity


● The ULFA takes advantage of less connectivity of districts and thickly forested areas
in the Assam-Arunachal Pradesh-Bhutan border.
Ethnic / Factional Violence:-
● The Kukis who are sandwiched between the Nagas and the Meities constitute 7.5
percent of the population and are demanding a separate Kuki State,a concern of
violence.
Statehood Demands:-
● Dimsa people demanding a separate state called Dimaraji or "Dimaland" comprise
the Dimasa inhabited Areas.
● Demand of state in North West Bengal and Assam by the KochRajbanshis
(Rajbongshis) people.
● Demand of Greater Nagalim and Kukiland.
Issues of Governance:-
● Problems such as corruption, bureaucratic delays, power shortages and poor work
culture delay implementation of projects serves as a fertile ground for insurgent
groups to thrive in the region.
Demand for Revocation of Armed Force (Special Power Act)
● AFSPA violates the Universal Declaration of Human Rights (UDHR), the International
Covenant on Civil and Political Rights (ICCPR), and the Convention against Torture(
India is a signatory, but it has not ratified it).
● BP Jeevan Reddy committee examining it in relation to the Northeast in 2005, and
the Veerappa Moily report of the Second Administrative Reforms Commission of
2007, recommended that the Act be repealed.
Details of AFSPA:-
Features of the Act:-
➔ Section (3) of AFSPA provides that, if the governor of a state issues an official
notification in The Gazette of India then the Central government has the authority to
deploy armed forces for assisting the civilian authorities.
➔ Section (4) of AFSPA gives special powers to army officers in disturbed areas to shoot
any individual who violates law / or is suspected to violate law. The only condition is
that the officer has to give a warning before opening fire.
➔ Security forces can arrest anybody even without a warrant, and carry out searches
without consent.
➔ Once a person is taken into custody, he/she has to be handed over to the nearest
police station as soon as possible.
➔ Prosecution of the officer on duty for alleged violation of human rights requires the
prior permission of the Central Government.

Telegram ID:- Saurabh Polity


Advantages of AFSPA:-
★ The agreement signed with NSCN (IM) has become possible because of AFSPA.
★ It provides protection to armed forces during high risk operations.
★ Army officers can work without pressure to restore normalcy in the region.

Criticism of AFSPA:-
❏ The act fails to protect and uphold human rights; this can be witnessed in the case of
alleged custodial rape and killings of the Thangjam Manorama by the Assam rifles in
2004.
❏ The power of arbitrary arrest and detention given to the armed forces goes against
the fundamental right vested in Article 22.
❏ The greatest outrage against AFSPA is due to the immunity given to the armed
forces.This immunity which protects guards and also facilitates the armed forces to
take unwarranted decisions at times is clearly questionable.

SC Observation on AFSPA:-
Naga People Movement of Human Rights VS UOI:- Act cannot be considered as violative of
the Constitution and the powers conferred under the section 4 and 5 of the Act are not
arbitrary and unreasonable and therefore not in violation of the provisions of the
Constitution.
Guidelines given in this case:-
● A person arrested and taken to custody under section 4 has to be handed over to the
nearest police station within 24hours of such arrest.
● The act has to be reviewed every six months by the state.
● Not every armed person violating the prohibitory order in a disturbed area is an
enemy. Even though he is considered as an enemy a thorough investigation has to be
conducted, since every citizen of India is entitled to all the fundamental rights
including Article 21 of the constitution.

Conclusion:- It is high time that sincere and concerted efforts are made continuously by the
four stakeholders — civil society, the Armed Forces, the States and the Government of India
to find a lasting and peaceful solution to the problem.

What are the Government steps taken to check Insurgency?


Ans:-

Telegram ID:- Saurabh Polity


(i) More local autonomy through mechanisms such as conferment of Statehood, the Sixth
Schedule, Article 371 C of the Constitution in case of Manipur and through ‘tribe specific
accords’ in Assam etc
(ii) Negotiations with insurgent outfits. Ex:- Territorial Framework Agreement
(iii) Development activities including special economic packages:- Ex:- North East Special
Infrastructure Development Scheme
(iv) International Agreements:- Ex:- Kaladan Corridor

Suggestion:-

Political:-
1. A system of work permits should be issued so that the illegal Bangladeshi migrants
do not end up as Indian citizens.
2. The Autonomous District Councils should be empowered.

Development:-
1. Pragmatic land use policy should be formulated for attracting industries in the
region. Micro, small and medium enterprises should be encouraged.
2. Local tourism should be promoted:- Niche tourism or high end tourism should be
encouraged. Medical and higher education tourism should be encouraged

Act East Policy:-


1. The North East region must be included in the India-ASEAN Vision for trade and
cooperation. Development Plan for the North East should factor India-ASEAN
strategic cooperation.
2. Centres/Departments for the studies of neighbouring countries like Myanmar,
Bangladesh, Tibet, Bhutan and Nepal in Universities should be set up in N east
Universities to understand India’s neighbours better.

Border Issues:-
1. The dual responsibility of Assam Rifles to enforce AFSPA and Border management
should be put to an end.

How is the Insurgency in the North East different from the situation in Kashmir?
Ans:-
Reasons:- The insurgency in Kashmir is different primarily because it arises from differing
perceptions with Pakistan and the people of Kashmir valley on the accession of the State of

Telegram ID:- Saurabh Polity


Jammu and Kashmir to the Indian Union While insurgency in North East has a reason ranging
from demand of autonomy, secessionist, Illegal migration, and greater autonomy.
Role of External actor:- The insurgency in J&K has been actively assisted by the Government
of Pakistan While China in the case of insurgents of North east is providing safe havens to
them in addition to supply of arms through rebel insurgents of myanmar.
Medium of sustenance:- Terrorist groups in J and K depend on hawala transactions and
money laundering While insurgents of North East are running a parallel government and
depend on extortion, kidnapping, and distortion of government schemes.
Perspective of Government :- In the case of J and K, though it is a mix of security and
developmental aspects but relies heavily on security aspects While in the case of North East,
it is a mix of political, developmental, ceasefire agreement and bilateral engagements.

TERRORISM (Non State Actor)

There is no proper and agreed definition of Terrorism. But US Department of State says
"premeditated, politically motivated violence perpetrated against noncombatant targets by
subnational groups or clandestine agents"can be defined as terrorism.
Types of Terrorism:-
According to the National Advisory Committee on Criminal Justice Standards and Goals(US):-
1. Political terrorism:- is used by one political faction to intimidate another. Ex- RWE &
LWE
2. Non political terrorism:- is a terrorist act perpetrated by a group for any other
purpose, most often of a religious nature.
3. Quasi terrorism:- is a violent act that utilizes the same methods terrorists employ,
but does not have the same motivating factors. Cases like this usually involve an
armed criminal who is trying to escape from law enforcement utilizing civilians as
hostages to help them escape.
4. State terrorism:- defines any violent action initiated by an existing government to
achieve a particular goal.
Causes of Terrorism:-
❖ Ethno Nationalism:- The desire of a group of persons in the society to separate from
the existing government and formation of a new nation can cause the creation of
terrorist organisations. Example:- Hamas attacking against Israel, Chechen Terrorist
attacking against Russia, North East State-NSCN(IM),NSCN(K)
❖ Terrorism due to Alienation or Discrimination:- Due to these sentiments of
discrimination and isolation, these groups become more conservative and start
terrorist attack against original citizen and government. Example:- 9/11 Terrorist

Telegram ID:- Saurabh Polity


attack in USA is the best example where the persons involved in the attack were
migrant muslims who went to Germany were discriminated against.
❖ Religion :- The global Salafi jihad is a worldwide religious revivalist movement with
the goal of re-establishing past Muslim glory in a great Islamist State stretching from
Morocco to the Philippinnes.
❖ Socio-Economic status:- Due to the economic differences between the rich countries
and poor countries led to the humiliation ,frustration and victimization in a group of
persons belonging to poor countries.
❖ Globalisation and Terrorism:- Approximately 15% of world population utilizes 85%
of total resources (UN).

Globalisation, Technology and Terrorism


Modern terrorism is sometime portrayed as brain child of Globalisation. Technology have
improved capability of groups and cells in following areas:-
● Proselytizing:- The electronic publication Inspire of Alqaeda produced recorded
messages for proselytizing.
● Coordination:- They conduct multiple attacks in different locations such as
simultaneous bombing at US embassies in Kenya and Tanzania.
● Mobility:- Globalisation and technology has increased avenues of Air and Ship
route,an easy movement for terrorists.
● Lethality:- Use of IED, WMD, Chemical and Biological weapons.

Effect of Terrorism:-
➔ Psychological Impact:- Environment of Fear and terror disturbs the peace of mind.
➔ Economic Impact:- The terrorism effect’s economy in two ways- Destruction caused
by act of terrorism and its indirect costs. Indirect impact is declining FDI investment,
Service sector. Example- J and K Terrorism affect tourism. The structural damage post
26/11 attack was amounting to Rs 500 cr which burdened the Insurance Industry.
➔ Social Impact:- The threat of terrorism increases the stereotypes, leading to more
negative stereotyping by members of targeted society. Example:- Anti Arab
sentiments in Spain in the wake of 2004 Madrid train bombing.
➔ Political Impact:- The “Rally around Flag Syndrome” leads to silent public criticism of
the government and its policies.
➔ Financial Impact:- The financial market has been directly and indirectly the victims of
terrorist attacks. Example-After 26/11 attack financial capital of India incurred a
loss of 4000 cr approximately.

India’s Experience with Terrorism:-

Telegram ID:- Saurabh Polity


India’s experience with terrorism can be discussed into three broad categories:- Cross
border, Home grown Jihad and Global Jihad.
Cross Border:- Pakistan ISI .In 2016,Delhi Police has bursted “ Delhi module” of Masood
Azhar where the plan is to indoctrinate Indian Youths and prepare them for terror attacks.
Homegrown Jihad:- Feeling of discrimination among Muslim Community.Series of blast in
1993 can be traced back to Tanzim Islahul Musalimeen ,trained by LeT operative.
Global Jihad:- According to AlQaeda “Resurgence Magazine”, its narrative is based on
Ghazwa-al –Hind which would free the Sub continent from apostate rule and re establish a
caliphate reminiscent of the erstwhile Mughal empire.

India and ISIS


What is ISIS?
Ans:- It is a millitant Islamist group that follows fundamentalist, Salafi Doctrine of Sunni
Islam. It gained global prominence in early 2014, when it drove Iraqi government forces out
of key cities in western Iraq by capture of Mosul.The idea of ISIS is based on “Eschatology”:-
Division of world based on Righteous and wicked on final day of judgement .
Propaganda by ISIS:- It uses a version of Muslim Black standard flag and developed an
emblem videos shown by ISIS are accompained by Chants ( Dawat -al-islam qamat) which
came to be viewed as unofficial anthem of ISIL.
Source of Revenue for ISIS:-
● Proceeds from occupation of territory and selling its resources like Oil.
● Kidnapping
● Donation from Gulf States
● Fundraising through modern communication

What is the status of ISIS Today?


Ans:-
❏ The dominant hold of ISIS in Raqqa and Mosul is now free from their control along
with Ramadi in Iraq. However the US Department of Defence says ISIS could likely
resume in Syria within 6 to 12 months and regain limited territory in the Middle
Euphrates river valley.
❏ UNSC says:- ISIS is organising cells at provincial level. Cells appear to be planning
activities that undermine government authority, create an atmosphere of
lawlessness, sabotage, societal reconciliation and increase the cost of terrorism.
❏ Use of Media:- The Islamic State creates its own online content such as videos,
magazines (like Dabiq), and flyers.
❏ Moving to South Asia:- Some factions of Taliban groups have Joined ISIS. Recently,
ISIS cells in India have been busted by Delhi Police

Telegram ID:- Saurabh Polity


India and Islamic State:-
❖ According to an analysis of Socio economic profile of IS sympathisers interrogated by
security agencies since 2014,educated middle class youngsters in India appeared to
be more drawn to ISIS.
❖ The core component of Indians in ISIS is from Indian Mujahideen whose members
started fleeing in batches to Nepal to enter Pakistan.
❖ The ISIS plan to destabilize India was revealed in the online magazine “Dabiq”.
❖ ISIS intended to use its fighters in Pakistan and Bangladesh to mount a “Guerrilla
attack inside India. (IB Report)
❖ ISIS has launched a special operation to train cadres in Nangarhar camp in
Afghanistan. (RAW report)

Kashmir and Terrorism:-


Revocation of Article 370 and current security situation in Kashmir
According to a report by the Union Ministry of Home Affairs, incidents of terrorism in Jammu
and Kashmir have declined by about 36% after the abrogation of Article 370.

1. The Government is planning to ban moderate and extremist factions of All India
Hurriyat conference under UAPA.
2. Govt has already removed people having seperatist tendencies from govt jobs.
3. Deny the passport to stone throwers.
4. Seats allocated to Hurriyat leaders in colleges are being sold to channelise the funds
into terrorsim, and the Govt is planning to crack this also.
5. There is also a report of allotment of seats in medical and engineering colleges of
pakistan for kashmiri students, in order to prepare a generation of doctors and
technocrats in kashmir who will have leanings to pakistan.

Taliban and Terrorsim in Kashmir


There is a probability of rise in militants in kashmir after more than 100 militants of jaise e
mohammad (JeM) were freed from afghanistan jail
★ The sidelining of the militant Jammu Kashmir Liberation Front (JKLF) and downsizing
of the Hizbul Mujahideen has seen an increase in foreign terrorists, who are more
ruthless.

Telegram ID:- Saurabh Polity


★ There has been a modus operandi adopted by militant handlers across the border to
recruit local overground cells to provide logistics to foreign militants who focus only
on the aims pre-assigned across the LoC.

Who is JeM?
Ans:-Jaish-e-Mohammad literally means the Army of Mohammad.Pakistan-based Muslim
cleric Masood Azhar founded the group after he was released by India in 1999. He was one
of three men set free in exchange for the crew and passengers of an Indian Airlines plane
hijacked and flown to Taliban-ruled Afghanistan.

Threats from JeM:-


● Carried suicide attacks on j and k legislative building,And on indian parliament
● Pulwama attack, uri attack

Important points:-
● Most of the JEM’s cadre and material resources have been drawn from the militant
groups Harakat ul-Jihad-i-Islami and the Harakat ul-Mujahidin. The JEM had close ties
to Afghan Arabs and the Taliban.
● Collects funds through donation requests in magazines & pamphlets.
● Objective of the JeM is to liberate Kashmir and merge it with Pakistan.

Marry for jihad, give birth for jihad and earn money only for jihad till the cruelty of
America and India ends.

NIA AND KASHMIR

The National Investigation Agency has launched a continuous raids against The
Resistance Front (TRF) and overground workers (OGWs) of Pakistan backed terror outfits
Jaish-e-Mohammad, Lashkar-e-Taiba (LeT), Al Badr, Hizbul Mujahideen .

Who are Overground workers?


Ans:-
Overground workers (OGWs) are those that provide logistical support, cash,
accommodation, and other facilities to militants or terrorists in Jammu and Kashmir. The
police classify an OGW as “anyone who supports the insurgents." A person who provides a
safe house, passage, information, or acts as a messenger for suspected militants is
immediately labelled as an OGW by the authorities.

Telegram ID:- Saurabh Polity


OGWs “act as eyes and ears of the underground militants", arranging hideouts, transporting
weapons from safe havens to places where militants plan to carry out strikes, keeping an eye
on security forces’ movements, distributing separatist literature, and engaging in hate
campaigns against security forces.

Their main responsibilities also include making false accusations of sacrilege, molestation,
and beatings of young and old civilians by security personnel, as well as disseminating the
militant commanders’ “virtues" and “righteousness."

If militants are seen as fish, OGWs are the water that ensures their survival.

What is The Resistance Front?


Ans:-
TRF is a Pakistani/ISI effort "to give terrorism in Jammu and Kashmir (J&K) an ‘indigenous’
face, and to provide Pakistan’s deep state, an alibi," according to the South Asia Terrorism
Portal (SATP).

TRF in many ways is different from the other well-known terrorist organisations that operate
in Kashmir like Lashkar-e-Taiba, Jaish-e-Mohammed, and Hizbul Mujahideen.

How is it different?

● Firstly, the name itself. While the names of the other three above mentioned terror
groups translate to Army of the Pure, Army of Mohammed, and the Party of Holy
Fighters respectively, the TRF's title is distinct because it makes absolutely no
reference to Islam or Jihad.
● Another distinguishing feature of TRF is maintaining strict secrecy about the identity
of its members.Unlike Hizbul Mujahideen's Burhan Wani, whose identity and face
was extensively used to build support for the group, TRF neither reveals the faces of
its militants, nor the existing chain of command.
● TRF is perhaps the only group which gives an explanation behind every killing,
irrespective of (whether there is) any semblance of truth in it or not.

Changing Nature of Terrorism (Important)


★ Privatisation of Terrorism:- It means when AlQaeda camps destroyed in Afghanistan,
it becomes more decentralized and contracted out and inspired terrorist attack by
regional grouping.

Telegram ID:- Saurabh Polity


★ Religious Extremism:- Earlier it was a great power game like rebels against the US.
Today, Religious extremism coupled with desire for revenge is an explosive condition.
★ Urban Terrorism:- In less than a decade, there have been about 20 major attacks in
urban areas, averaging two a year.
Why Urban Terrorism?
Ans:- Maximum Damage and Minimum Risk
❖ Density and Heterogeneity of Urban areas provides an escape route to them.
❖ Logistical support is easy.
❖ By attacking high profile symbolic targets, the terrorists wish to make a point
that if a government fails to protect high value targets, it is obvious that it
may not be in a position to protect the normal ones.
❖ Hyper Media attention
★ Competition for Horror between different groups for Finance and Recruitment.
★ Adopted New Method:- Lone Wolf Attack. Example:- Attack on Coffee shop in
Bangladesh.
Lone Wolf Attack (An Analysis)
➢ Complex to identify as they may or may not belong to any network command
structure or external groups.
➢ They tend to strike at a place associated with their personal frustration from
school, college or mall.
➢ Attacks may also result from their larger disillusionment or anger with society.
➢ Radicalisation process is different from well known terrorist cells ie- By
following Literature on the Internet.
★ Bio Terrorism:- Bioterrorism is the deliberate release of viruses, bacteria, toxins, or
other agents to cause illness or death in people, animals, or plants. In October 2001,
bioterrorism became a reality when letters containing powdered anthrax were sent
through the U.S. Postal Service.
What are the Types of Bioterrorism Agents?
Ans:- There are 3 types of agents used based on the ability and extent of damage
that can be caused. They are:-
• Category A: High-priority agents. Example: Anthrax, Ebola virus.
• Category B: Moderate-priority agents. Example: Brucellosis, Q fever
• Category C: Low-priority agents. Example: Yellow fever virus, Hantavirus

Why Terrorist prefer for Bio Terrorism?


Ans:-
● Biological agents are in some ways the perfect weapons of terror. They can be
spread through the air, water, or food.

Telegram ID:- Saurabh Polity


● Terrorists may choose these agents because they can be extremely difficult to
detect and do not cause illness for several hours to several days after
exposure, meaning that public health officials may not notice the attack until
it is too late.
● Deadly pathogens are highly accessible. With the exception of smallpox , they
all occur naturally in the wild—in soil, air, water, and animals.
● Skills and equipment for making a biological weapon are widely known
because they are the same as those required for cutting-edge work in
medicine, agriculture, and other fields.

Is COVID a kind of Bio Terrorism ?


Ans:- Some intelligence agencies initially proclaimed that coronavirus occurred
naturally but later on, they claimed that the pandemic might have begun from the
Wuhan lab in China after the researchers were probably able to figure out how bat
coronaviruses could mutate to attack humans. However, there is no proof that the
pandemic virus was engineered or manipulated, yet. But having a hostile and fragile
neighbour, India can’t deny the potential threat of Bio Terrorism.
Vice Chief of the Army Staff Lieutenant General S.K. Saini has said that “future wars
may gravitate towards zero cost wars, wherein a very virulent pathogen may
immobilise high-technology arsenal”.

What are the effective Control Measures?


Ans:-
BioSecurity:- Biosecurity is a strategic and integrated approach to analysing and
managing relevant risks to human, animal and plant life and health and associated
risks for the environment. It encompasses:-
1. National stakeholders include relevant government agencies, agricultural
producers and the food industry, scientific research institutes, specialist
interest groups, nongovernmental organizations (NGOs) and the general
public.
2. International standard-setting organizations, international bodies and
international legal instruments and agreements provide a governance
framework for biosecurity.

Bio Defence:- Biodefense uses medical measures to protect people against


bioterrorism. This includes medicines and vaccinations. It also includes medical
research and preparations to defend against bioterrorist attacks.

Telegram ID:- Saurabh Polity


Is India immune from Bio Terrorism?
Ans:- NO, Incidences of Bio terrorism are:-
1.Scrub Typhus attack during 1965 war.
2.Bubonic Plague
3.Nipah Virus, H1N1

What is India’s Preparedness:-


● National Disaster Management Authority (NDMA) has taken several
initiatives, has existing battalions of National Disaster Response Force (NDRF)
trained to deal with chemical, biological, radiological, and nuclear (CBRN)
threats.
● Specific surveillance systems that have the capacity to recognise patterns of
non-specific threats have been installed.
● Disease Surveillance Project , a decentralized and state-based surveillance
program was formulated in 2004, which integrates the public sector, private
sector, rural and urban health system, and has incorporation of
communicable and non-communicable systems (unusual clinical syndromes
may be included during public health emergencies).
● The government has established nuclear, biological, and chemical (NBC)
warfare directorates in the armed forces, as well as an inter-services
coordination committee to monitor their training and preparation. The
military has set up an NBC cell at Army Headquarters as well.
● In June 2015, India and the US signed a 10-year defence framework
agreement for cooperation in the development of defence capabilities,
including “a lightweight protective suit effective in chemical and biological
hazard environments.

Efforts at Global level:-


Biological Weapon Convention:- The Biological Weapons Convention (BWC)
effectively prohibits the development, production, acquisition, transfer, stockpiling
and use of biological and toxin weapons. It was the first multilateral disarmament
treaty banning an entire category of weapons of mass destruction (WMD).

How can we counter Bioterrorism?


Ans:-
1. Deterrence:- Have a law like the US have Bioterrorism act 2002.
2. Prevention:- Reduce the opportunity of bioterror by increasing intelligence.

Telegram ID:- Saurabh Polity


Surveillance:- Vaccines for immunizing the public against bioterrorism-caused
diseases; Diagnostic tests to help first responders and other medical staff
detect exposure quickly and provide treatment; and therapies to assist the
recovery of patients exposed to bioterrorism.
Conclusion:- Adherence to the Biological Weapons Convention, reinforced by
confidence-building measures is indeed, an important and necessary step in reducing and
eliminating the threats of biological warfare and bioterrorism. After COVID, it is a high time
for global leaders to come together to find the modalities to counter Bio terror.

India’s Strategy to tackle Terrorism

First Understand Government Policy

● India recognises that terrorism are political issues and therefore solution should be
political. As Mr PM has also remarked in the G-20 meeting in Goa.
● Use of Minimum Force but it is changing as seen in Surgical strike.
● At UN High level Conference on heads of counter terrorism agencies, India has
spelled its Five Point formula to tackle terrorism.
➔ Exchange of timely and actionable intelligence
➔ Prevention of misuse and modern communication through collaboration with
the private sector.
➔ Improved Border management.
➔ Designation of counter terror focal point.
➔ Sharing of Information related to movement of passengers.

Terrorism at the time of COVID:-


The report says the instances of terror attack have diminished at the time of COVID because
of lack of financial and logistical support from the supporters. So we will look into positive
and negative trends at the time of Pandemic.
Positive Trends:-
According to UNITAR
1. Decreased recruitment activities in public spaces and other offline settings.
2. Decreased visibility for violent extremist and terrorist groups in media:- One main
objective of terrorism and violent extremism is gaining outreach by spreading fear.
Due to a greater focus on COVID-19 in international and national media, violent
extremist groups are expected to attract less coverage by media and thus less
visibility.

Telegram ID:- Saurabh Polity


3. Potential discontent towards leaders of violent extremist and terrorist groups:- A
common thread that runs through many violent extremist and terrorist groups
regardless of their ideological orientation is a strong cult of charismatic leaders. If
those leaders fail to protect their members against COVID-19, some followers could
lose faith in their leadership and may turn against the group.

Negative Trends:-
1. Increased spread of disinformation, conspiracy theories and propaganda:- By
spreading disinformation, conspiracy theories and propaganda about the virus
through online and offline settings, violent extremist movements and terrorist
groups aim at sowing mistrust in authorities.
2. Increased recruitment online:- Young people remain particularly vulnerable as they
are likely to spend more time online due to closed schools, shut down of leisure
activities and lost employment opportunities.
3. Backfire of preventive COVID-19:- The UNDP report ‘Journey to Extremism’ has
found that law enforcement approaches lacking respect for fundamental rights may
provoke tension and could facilitate violent extremist recruitment from
disenfranchised populations.

What are the challenges to Counterterrorism?


Ans:-
1. Venue might be shifted:- Attack of Terrorist may shift from Public place to critical
Infrastructure.
2. Halted and reduced international security assistance missions:- Halted and reduced
support to training activities for military and police forces may severely affect the
capacities of local security forces in the fight against terrorism.
3. Halted peacebuilding and development initiatives:- Halted activities due to
COVID-19 may create a vacuum where terrorist groups may seek to undermine the
credibility of authorities and development actors.

2nd Aspect:- Rising Taliban Profile and Impact on India’s Security


1. The Taliban’s extremist interpretation of Islam and understanding of Islamic
jurisprudence or sharia law would directly threaten the many political, judicial, social
and cultural reforms made by the Afghan government post 2001. It would embolden
the Haqqani Network, with one leg in Kabul, to support other groups such as the
al-Qaeda.
2. Al Qaeda in Indian Subcontinent has also been successful in bringing different groups
and organisations across state boundaries together under the al-Qaeda banner,

Telegram ID:- Saurabh Polity


including the Ansar Ghazwat ul-Hind, Harkat ul-Mujahideen and Indian Mujahideen
in India and Ansar al-Islam and Jammat ul-Mujaideen in Bangladesh.
3. Al Qaeda jihadist magazine regularly publishes calls for Muslims to support the
Afghan Taliban and adhere to Islamic sharia laws.
4. Groups such as Jaish-e-Mohammad (JeM) and Lashkar-e-Taiba have previously
cooperated with the Taliban. The Pulwama was inspired by the victory of the Taliban
in Afghanistan.

Steps taken by Government


Legislative Steps:-
1. Unlawful Activities Prevention Act 1967 Amended in 2019:-
● Now Individuals can be designated as terrorists on certain grounds provided in the
Act. Earlier, Only Organisation can be designated as terrorist only .
● The Act empowers the Director General of National Investigation Agency to grant
approval of seizure or attachment of property when the case is investigated by the
said agency. Earlier, Seizure can be done only after the approval of the DG of the
concerned State.
● The Act empowers the officers of the NIA, of the rank of Inspector or above, to
investigate cases of terrorism in addition to those conducted by the DSP or ACP or
above rank officer in the state.

Devangana Kalita vs State) (Natasha Narwal vs State).


Section 43 D(5) says there cannot be bail if the accusation against the person is Prima
facie true.Thus these protestors were not allowed for bail once jailed after active
involvement in CAA protest. But, Delhi HC has denied for any factual and prima facie
allegations true,Thus granted bail.

Again the second thing is they ( Devangana and Natasha) are in jail for many months:-
In Union of India v. K A Najeeb (2021) the Supreme Court examined Section 43D (5) of
UAPA to hold that constitutional courts can grant bail to terror suspects, when their right
to a speedy trial is violated

2. National Investigation Agency Act 2008, Amended in 2019:-


● The amended Act empowered the agency to investigate offences committed outside
India also.
Telegram ID:- Saurabh Polity
● The amendment has allowed the NIA to investigate, in addition, cases related to (i)
human trafficking, (ii) counterfeit currency or banknotes, (iii) manufacture or sale of
prohibited arms, (iv) cyber-terrorism, and (v) offences under the Explosive
Substances Act, 1908.
● The 2019 amendment allowed the central government to designate Sessions Courts
as Special Courts for the trial of scheduled offences under the Act. The central
government is required to consult the Chief Justice of the High Court under which
the Sessions Court is functioning, before designating it as a Special Court.

Institutional Steps:-
● Recently Counter terrorism and counter radicalisation division has been set up in
Home ministry.
● Intelligence Agencies:- IB, RAW, NTRO Etc.
● National Counter Terrorism Centre (NCTC). (Just Proposed after 2008 Attack)
NCTC in Detail:-

What is NCTC?
Ans:- It is a single and effective point of control and coordination of all counter terrorism
measures like:-
● Conduct searches and arrests in any part of India.
● Maintain Database on Terrorism.

Challenges before NCTC:-


❖ Overlapping with NIA
❖ Police is a State Subject.
❖ Turf War between different Intelligence agencies hampering the establishment of
NCTC.

Technological Steps:-
NATGRID:- It is a counter terrorism measure that collects and collates a host of information
from government databases including tax and bank account details, credit card transactions,
visa and immigration records and itineraries of rail and air travel. This combined data will be
made available to 11 central agencies.
Crime and Criminal Tracking Network & Systems :- It aims at establishing seamless
connectivity among 15,000 police stations.

Telegram ID:- Saurabh Polity


Steps for International Collaboration:-
● India has always urged the international community to make concerted effort to
comply with UNSC resolution 1267,2253,1988,2249.
● India has presented report titled “Comprehenive Convention on International
Terrorism”in UN:-
★ Universal definition of terrorism: no good terrorist or bad terrorist.
★ Ban on all groups regardless of country of operation, cut off access to funds
and safe havens.
★ Prosecution of all groups including cross border groups.
★ Amending domestic laws to make cross-border terror an extraditable offence.

What is missing in India’s Approcah to tackle Terrorism?


Ans:-
1. Knee Jerk Reaction:- Ex:- NIA After 2008 attack
2. Centre-State Issue:- Ex:- Non Finalisation on NCTC

Telegram ID:- Saurabh Polity


3. Issue with NIA:-It should be re-modelled on the lines of the US Federal Bureau of
Investigation to give it both preventive and investigative powers.
4. Lack of Infrastructure and Training to Police Forces

GLOBAL STEPS TO TACKLE TERRORISM:-


UN and Terrorism:-
(1) UNSC adopted resolution 1373 to prevent financing of terrorism, criminalize the
collection of funds.
(2) UNSC adopted resolution 1540 obliging States to refrain from any support to non-state
actors.
(3) UN adopted resolution 2309 in 2016 to ensure safety of global air service.

ORGANISED CRIME & TERRORISM


What is Organised Crime?
Ans:- The Oxford handbook on organised crime defines Organised Crime as:-
(a) A set of stable organisations illegal per se or whose members systematically
engage in crime.
(b) A set of curious criminal activities mostly carried out for monetary gain.
Characteristics of Organised crime:-
(1) Continuity:- It operates beyond the life time of individual; members and is
structured to survive changes in leadership.
(2) Structure:- Ranks are based on power and authority.
(3) Membership:- Based on common traits such as ethnicity, criminal background, or
common interest.
(4) Goal:- Profit and power is the sole goal of such an organisation.

Telegram ID:- Saurabh Polity


Comparison:- The Red one in below table shows the difference and black one
shows similarity

Relationship between Organised Crime and Terrorism:- You can use any
diagram mentioned below:-

Telegram ID:- Saurabh Polity


The relationship can be understood as following:-
Fake Currency Notes:- Investigations reveal that Rs 50 million that was incurred by the
terrorists to trigger blasts in Hyderabad in 2007 and Rs three million spent on the attack on
the Indian Institute of Science, Bangalore, in 2005 were generated mainly through fake
currency.
Detail Analysis:-
The Nayak Committee, appointed to assess the menace of fake currency, estimated the total
amount of fake currency in circulation in India at about Rs 1,69,000 crore as of 2000 (in
other words, eight per million were fake).
How the Fake currency notes are circulated in India?
Ans:- Fake Indian currency notes principally originate from Pakistan, but smuggled through
various routes, using different modalities .
(1) Directly, smugglers make best use of train services and commercial trucks that run
between Pakistan and India to push counterfeits into India
(2) The most popular indirect routes are via UAE, Nepal and Bangladesh. Fake notes from
Dubai are transported through air with the help of bonafide passengers or couriers
appointed for the purpose
(3) Thailand, Malaysia, Myanmar and Sri Lanka are also used as transit points.
(4) Porous and weak land borders respectively with Nepal and Bangladesh are utilised by
organised gangs to smuggle fake currency into India.
(5) It is also carried by infiltrators from Pakistan. Making use of weak maritime security,
counterfeits have also been routed through sea.
★ Once smuggled, the fake money is exchanged for original notes at roughly 2:1 ratio
or even higher.
ISSUES WITH COUNTERFEIT CURRENCY:-
● Apart from security, fake currency poses huge socio-economic problems.Its impact
on general crime on society is serious as more and more educated unemployed
youth are attracted towards the counterfeit racket. In short, this can be dubbed as a
dangerous facet of ‘economic terrorism’ confronted by India.

SUGGESTION:-

Telegram ID:- Saurabh Polity


● The Reserve Bank of India should constantly upgrade both paper-based (security
thread, watermark, fluorescent fibres and physical and chemical characteristics of
the paper) and print-based (anti-photo copying feature, optically variable ink – OVI –
see through effect, intaglio printing etc) security features of Indian currency.
● Create Awareness:- Example:- optically variable ink feature in Rs 1000 and Rs 500
notes where the color of the denominational value that appears in the center of
notes appears green when the note is held flat but would change to blue when the
note is held at an angle.
● Focus on cashless Transaction Example-BHIM app.
● Effective sharing of real time intelligence and relevant information among different
agencies.
● External dependence on security paper and ink should be reduced by increasing
indigenous production.
● India should offer to train Nepalese and Bangladeshi customs and immigration
officials in identifying and keeping watch over frequent travellers to Dubai, Dhaka,
Colombo and other neighbouring countries.
● India could also help the installation of hi-tech luggage scanners at the international
airports of Nepal and Bangladesh.

DRUG DEALING:-
● India is geographically situated between the countries of Golden Triangle and Golden
Crescent and is a transit point for narcotic drugs produced in these regions to the
West.
● Illicit drug trade in India centres around five major substances, namely, heroin,
hashish, opium, cannabis and methaqualone. Seizures of cocaine, amphetamine, and
LSD are not unknown but are insignificant and rare.

Narco-Terrosrism and Kashmir:- Pakistan has started to fund terror organisations by pushing
narcotics and drug money into J&K and Punjab. The Afghan variety of drug is being pumped
into Kashmir, via Pakistan, which is further pushed into Punjab via Jammu. Army intelligence
sources are also said to have established strong links between Kashmiri terrorists and drug
trafficking in Punjab. The recent terror attack in Amritsar and the reported presence of Zakir
Musa in the holy city is believed to be part of the same chain.
Drug Routes:-
Nepal Border:- The prominent routes through which drugs are smuggled across the
border are:
1. Birgunj - Raxaul - Motihari - Patna;
2. Nepalganj - Rupaidiha – Bahraich - Barabanki - Lucknow
Telegram ID:- Saurabh Polity
3. Bhairahawa -Nautanwa - Gorakhpur.
Pakistan Border:- Enters India through Sunderbani and Rajouri and reaches Jammu by
the Poonch-Jammu highway. From there the route taken to traffick the consignments is
Pathankot-Gurdaspur-Amritsar-Faridkot.
Myanmar Border:- The most important route is the one which starts from Mandalay,
continues to Monya and Kalewa and then bifurcates to enter India at two points. The first
moves northwards, enters Moreh in Manipur through Tamu and travels then to Imphal and
Kohima via National Highway-39. The second branch moves southwards and enters Champai
in Mizoram through Rakhwaldar.

Gravity of the Issue:-


● The prevalence of opioid use in India is three times the global average, as per the
2019 All India Institute of Medical Sciences (AIIMS) study which is key to the
national plan.
● The statistics for treatment availability for such addictions also clearly show a big gap
- 75% of the drug addicts who try quitting do not receive any treatment and the few
who do get it at government de-addiction centres.

Steps taken by the Government:-


Legislative Action:-
Narcotics Drug Psychotropic Substances Act:-
● The Act provides stringent provisions for the control and regulation of operations
relating to narcotic drugs and psychotropic substances.
● It also provides for forfeiture of property derived from, or used in, illicit traffic in
narcotic drugs and psychotropic substances.
● It also provides for death penalty in some cases where a person is a repeat offender.

Executive Action:-
● The Centre has identified 272 districts as those hugely affected by drug abuse and it
is readying to roll out a Rs 336 crore national action plan this year for a ‘nasha mukt
Bharat’. Nasha Mukt Bharat – Main Components of the Action Plan 2020-21
❖ Awareness generation programs in University Campuses Higher Education
institutions, and schools.
❖ Building capacity for service providers.
❖ Focus on Treatment facilities in Hospital Settings.
❖ Identification of dependent population and community outreach.
Telegram ID:- Saurabh Polity
TRAFFICKING:- Human trafficking is the exploitation of the person through means of
force, fraud, coercion, or violence.

TRAFFICKING AND TERRORISM


According to Financial Action Task Force (FATF) report (2018), there is a strong link between
the human trafficking and terrorist organisations.
● Human trafficking within and into conflict and terrorist affected areas is primarily for
domestic servitude, sexual slavery, forced armed recruitment, forced labour and
forced marriage.
● It has also been observed that terrorist organisations use human trafficking as a way
to raise funds to nurture their organisations and to support their terrorist activities.
● ISIL fighters have used the encrypted communications app Telegram and applications
such as WhatsApp, Twitter and Threema to auction enslaved Yazidi women and
launder the resulting profits.
● Apart from labour activities there is a gigantic demand for children for their
commercial sexual exploitation which involves offline as well as online sexual abuse
such as child sexual abuse explicit materials; use of children for pornography.
● The porous nature of the border makes its management difficult and the criminal
networks take advantage of this feature of the border. Example- India-Bangladesh
borer is a conduit for women trafficking to West Bengal then to Arab Countries.

Steps Taken to check Trafficking:-


● Administrative measures :-
1. Anti Trafficking Cell (ATC): Anti-Trafficking Nodal Cell was set up in the
Ministry of Home Affairs (MHA) (CS Division in 2006 to act as a focal point for
communicating various decisions and follow up on action taken by the State
Governments to combat the crime of Human Trafficking.
2. India has ratified the United Nations Convention on Transnational Organised
Crime (UNCTOC) which has as one of its Protocols Prevention, Suppression
and Punishment of Trafficking in Persons, particularly Women and Children.
3. Bilateral mechanism:- A Task Force of India and Bangladesh was constituted.

What are the lapses in Effort to check Organised Crime?


Ans:-
Inadequate Legal Structure:- The existing law is inadequate as it targets individuals and not
the criminal groups or criminal enterprises.

Telegram ID:- Saurabh Polity


● Difficulties in Obtaining Proof:- As organised criminal groups are structured in a
hierarchical manner, the higher echelons of leadership are insulated from law
enforcement.
● Lack of Resource and Training:- Most of the States face a resources crunch and are
not in the position to spare adequate resources for the criminal justice system
agencies.
● Lack of Coordination:- Apart from lack of institutional frame-work, there are
problems of coordination between the Central Government and the State
Governments and between one State Government and another State Government
due to differences in political perceptions.
● Dual Criminality:- The crime syndicates do not respect national boundaries. Certain
crimes, particularly drug trafficking, are planned in one part of the world and
executed in another. Criminals also move fast from one part of the globe to another.
● Criminal Political, Bureaucratic Nexus:-

Suggestion:-
Recommendation by Observer Research Foundation:-
● Increasing the frequency of meetings of the Joint Task Force on India and
Bangladesh.
● Dissemination of the decisions of the meeting to all stakeholders.
● Formalising use of modern technology for speeding up the repatriation and
investigation.
● Establishment of a cross-border joint response team and arranging allocation of
finances for ensuring the smooth functioning of the team.
● The need for vulnerability mapping for identifying the major corridors
Supreme Court:-
● Organised crime is not restricted to a "particular state" and a trial court can take note
of charge sheets filed against offenders outside the State for invoking stringent
MCOCA.
Change in Procedural Law:-
● The police custody remand should be enhanced from 15 to 30 days in cases of grave
crime. Further, the police are mandated to file the charge sheet in 90 days from the
date of arrest of the accused. (United Nations Asia and Far East Institute for the
Prevention of Crime and the Treatment of Offenders)
Institutional Change:-
● It is suggested that each State/Metropolitan force should have an Organised Crime
Wing, the same at the State level as that of the apex body at the national level.

Telegram ID:- Saurabh Polity


(United Nations Asia and Far East Institute for the Prevention of Crime and the
Treatment of Offenders)

FINANCE, TERRORISM & MONEY LAUNDERING


“If radical ideology and extremism are at the heart of terrorism today, finance
is its lifeblood.

Telegram ID:- Saurabh Polity


● The ISI uses various sources for funding terrorism including charities, NGOs, drug
trafficking, zakat donations, counterfeit and trading amongst others.
● It has also used its links with terrorists turned businessmen like Dawood Ibrahim,
who is a front for funding activities.
Telegram ID:- Saurabh Polity
● State sponsorship of terrorism finance is also evident in the case of terrorist groups
demanding Khalistan, and their close association with ISI and ISI backed groups like
LeT.
● Trade-based money laundering method involves the use of commodities, false
invoicing, and other trade manipulation to move funds. Examples of this include the
Black Market Peso Exchange in the Western Hemisphere, the use of gold in the
Middle East and the use of precious gems in Africa.
● Some terrorist groups may also use Islamic banks to move funds.
● Both terrorists and traffickers have used alternative remittance systems, such as
"hawala" or "hundi".

MONEY LAUNDERING
What is Money Laundering?
Ans:- Money laundering is the illegal process of making "dirty" money appear legitimate
instead of ill-gotten.
★ The United Nations Office on Drugs and Crime (UNODC) conducted and report
estimates that in 2015, criminal proceeds amounted to 4.6% of global GDP.
★ India was identified as a high risk zone for money Laundering by International Centre
for Asset Recovery in 2015.

How is Money Laundered?


Ans:-

Placement:- The placement makes the funds more liquid since by depositing cash into a
bank account can be transferred and manipulated easier.
Layering:- Layering is the process of separating the proceeds of criminal activity from their
origin through the use of many different techniques to layer the funds. These include using
multiple banks and accounts, having professionals act as intermediaries and transacting
through corporations and trusts, layers of complex financial transactions, such as converting
cash into traveler’s checks, money orders, wire transfers, letters of credit, stocks, bonds, or
purchasing valuable assets, such as art or jewelry.

Telegram ID:- Saurabh Polity


Integration:- It is the stage at which laundered funds are reintroduced into the legitimate
economy, appearing to have originated from a legitimate source.

Impact of Money Laundering:-


● Economic Impact:- It allows drug traffickers, smugglers, and other criminals to
expand their operations. This drives up the cost of government due to the need for
increased law enforcement and health care expenditures to combat the serious
consequences that result.
● Social Impact:- The economic and political influence of criminal organisations can
weaken the social fabric, collective ethical standards, and ultimately the democratic
institutions of society.
● The External Sector:- Excessive illicit capital flight from a state may be facilitated by
either domestic financial institutions or by foreign financial institutions. That illicit
capital flight drains scarce resources specially from developing economies; so by that
way economic growth of respective economies is adversely affected.
● The Real Sector:- Money laundering adversely affects economic growth through the
real sector by diverting resources to less productive activities and by facilitating
domestic corruption and crime.

Measures taken to check Money Laundering:-

Global Level:-
Telegram ID:- Saurabh Polity
1. Financial Action Task Force Strategy includes:-
● The criminalization of the laundering of the proceeds derived from all serious
crime.
● The forfeiture of property connected with a laundering offense or its
corresponding value.
● The establishment of customer identification and record keeping rule.
● The creation of financial intelligence units.
2. International Monetary Fund:-
● IMF provides substantial technical assistance to member countries on
strengthening their legal, regulatory, institutional and financial supervisory
frameworks for AML/CFT.
● Each evaluation of financial sector strengths and weaknesses conducted
under the Financial Sector Assessment Program of IMF.
3. Basel Committee:-
● Know Your Customer (KYC) - This mandates the bank to make reasonable
efforts to determine their customer’s true identity, and have effective
procedures for verifying the bonafides of a new customer.
4. Financial Crimes Enforcement Network (FinCEN):-It is a bureau of the United States
Department of the Treasury that collects and analyzes information about financial
transactions in order to combat domestic and international money laundering,
terrorist financing, and other financial crime.
5. The Vienna Convention:- It creates an obligation for signatory states to criminalize
the laundering of money from drug trafficking.

National Level:-

Legislative Framework:-
1. Prevention of Money Laundering Act, 2002:- The PMLA seeks to combat money
laundering in India and has three main objectives:-
➔ To prevent and control money laundering.
➔ To confiscate and seize the property obtained from the laundered money.
➔ To deal with any other issue connected with money laundering in India
Recent Amendment:-
● It deletes the provisos in sub-sections (1) of Section 17 (Search and Seizure) and
Section 18 (Search of Persons), thus doing away with the prerequisite of an FIR or
chargesheet by other agencies that are authorised to probe the offences listed in the
PMLA schedule.
● The scope of “proceeds of crime”, under Section 2, has been expanded to empower
the agency to act against even those properties which “may directly or indirectly be
Telegram ID:- Saurabh Polity
derived or obtained as a result of any criminal activity relatable to the scheduled
offence”.
● All PMLA offences will be cognisable and non-bailable. It implies that ED officers are
empowered to arrest an accused without warrant.

2. Benami Transactions Prohibition Act, 1988 (Amended in 2016)


3. Fugitive Economic Offender Act

International Collaboration:-
● The Financial Intelligence Unit:- India (FIU IND) is the nodal agency in India for
managing the AML ecosystem and has significantly helped in coordinating and
strengthening efforts of national and international intelligence,investigation and
enforcement agencies in pursuing the global efforts against money laundering and
related crimes.
● Base Erosion and Profit Sharing:- BEPS is of major significance for developing
countries due to their heavy reliance on corporate income tax, particularly from
multinational enterprises.
Technological Aspect:-
● India has acceded to Society for Worldwide Interbank Financial Telecommunication
(SWIFT) which assigns each financial organisation a unique code that has either 8 or
11 characters.

Challenges in dealing AML


● Data Quality:- Poor-quality data, nonstandard data structures, and fragmented
sources make data aggregation by legal entities, subsidiaries, and vendors difficult.
● Lack of Investigation
● Lack of Reporting
● Lack of Risk Management
● Judicial Delay in Conviction

Suggestion:-
● SIT has recommended that SEBI needs to have an effective monitoring mechanism to
study the unusual risk in stock prices of companies when such an increase takes
place.
● Special attention is required for the education sector, religious institutions and
charitable organizations.
● Devise a clear anti-Money Laundering Policy and anti money Laundering officer (EU).
● Use of Technology (AI):-
Telegram ID:- Saurabh Polity
1. Intelligent segmentation:- AI analysed transactions, observed patterns, and
created new and more relevant segments, placing customers in them based
on their behaviour.
2. Predictive modeling:- The advancement in statistical modelling tools is
helping banks proactively identify problem areas. The clustering techniques
bring the capability to easily modulate multidimensional data.

BORDER MANAGEMENT TO DEAL WITH SECURITY CONDITIONS


What is Border Management?
Ans:- Border management is a multifaceted term and includes, the regulation of legal and
illegal immigration, ensuring safe and secure movement of authorised people and goods,
and prevention of Smuggling, human trafficking and infilteration.
Why does the management of border areas need attention?
● Political:- India’s geostrategic location, surrounded by neighbours having fragile
economic and political systems have induced the government to undertake proper
management of Indian borders, which is vital to national security.
● Economical:- Combined with liberal trade regimes and business-friendly
environments, efficient customs and border control can significantly improve
prospects of trade relations and economic growth.
● Geographical:- India shares 15,106.7 km of its boundary with seven nations-
Pakistan, China, Nepal, Bhutan, Myanmar, Bangladesh and Afghanistan. In addition
India has a coastal boundary of 7,516.6 km, which includes 5,422.6 km of coastline in
the mainland and 2,094 km of coastline bordering islands.
● Illegal Migration:- India needs to not only ensure seamlessness in the legitimate
movement of people and goods across its borders but also undertake reforms to curb
illegal flow.

Why is Border management a complex and enormous task?

(1) Border Disputes:-China , Pakistan, Bangladesh, Nepal


(2) Terrains—Namely deserts, fertile lands, swampy marshes, snow-covered peaks and
tropical evergreen jungles.
(3) Fragile Neighbours:- Bangladesh, Nepal
(4) Asymmetrical warfare and State Sponsored Terrorism

Glimpses of Issue at the Border

Telegram ID:- Saurabh Polity


1. China:- Border Issue, Smuggling of electronic items through Bhutan Border, Support
to Insurgents of Myanmar.
2. Pakistan:- Kashmir Issue, Water Issue, Hawala Transaction, Drug from Afghanistan
through Pakistan.
3. Bangladesh:- Illegal Immigrants, Trafficking of women, Anti Indian sentiments.
Trafficking of goods like jamdani sarees, rice salt etc. as well as cattle smuggling.
4. Nepal:- Smuggling of Fake Currency, Ammunition, Escape route for ULFA, Fear of
spread of Maoist insurgency due to links of Nepal’s Maoists in India. In 2013 two
Terrorists – Abdul karim Tunda and Yasin Bhatkal were arrested from this border.
5. Myanmar:- Drug trafficking, 16 Km Free Movement Regime facilitates easy
movement, Rohingya Issue.

Rohingya as a threat:-
● Terrorism:- Recent arrest of hard core mujahideen, Samiun Rehman a British
national and a henchman of Al- Qaeda and Al-Noora commanders from
Vikaspuri-Delhi is an eye opener for everyone. His mission was to establish bases in
Delhi, Manipur, Mizoram for radicalization of Rohingyas and to wage a war against
Indian security forces and Myanmar army.
● Organised Crime:- Rohingyas have been found to indulge in crime, trafficking and
there are a number of FIRs lodged against them in certain police stations.There is a
possible links between Arakan Rohingya Salvation Army (ARSA) with terror
organisations and expressed grave concerns about their presence in Bangladesh.

India’s Response to Rohingyas:-


● First Phase:- In the first phase Delhi considered it an ‘internal affair’ but was
sympathetic to Myanmar and announced a US$ 1-million package of relief 10
assistance to Myanmar.
● Second Phase:-The second phase of India’s Rohingya approach began with
“Operation Insaniyat” to provide relief assistance for the refugee camps in 20
Bangladesh.
● Third Phase:- India stressed the importance of “safe, speedy and sustainable return
of 40 displaced persons to Rakhine State.

6. Bhutan:- Many groups such as Bodo, ULFA etc. sneak into Bhutan for sanctuary
despite their army driving them out, Smuggling of goods such as Bhutanese cannabis,

Telegram ID:- Saurabh Polity


liquor and forest products. Free movement of people and vehicles leading to issues
such as during the Gorkhaland movement in West Bengal.

Steps Taken at the Border

China:- Creating Infrastructure + Army infrastructure projects within 100Km of LAC have
been exempted from forest clearance.

Pakistan:- Deployment of National Security Guard + CIBMS

Bangladesh:- Border Protection Grid + A Crime free stretch has been established
between the BSF border posts at Gunarmath and Kalyani +Installation of Border
surveillance devices such as closed-circuit cameras, searchlights, thermal imaging devices.

Nepal:- Establishment of a new intelligence section in SSB border to ensure better


operational efficiency + Establishment of Border District Coordination Committee at the
level of district officials of the two countries to discuss issues of mutual concern.

Myanmar:- Integrated Check Posts at the border.

Bhutan:- The Union environment ministry has given a “general approval” for the
diversion of forest land for major border infrastructure projects within a 16-km aerial
distance of the border with Bhutan

What has been the approach of GOI for Border Management?

Telegram ID:- Saurabh Polity


People:-
● The Bangladesh and Pakistan border is looked after by BSF.
● The security of the China border is entrusted to (ITBP).
● The Nepal and Bhutan border is looked after by SSB and Assam Rifles deployed at
the Myanmar Border.
● The LoC on the Indo-Pakistan border and the LoAC on the Indo-China border is
protected by the Indian Army.
● The security of the coastal borders lies with the Indian Navy and Coast Guard, with
the State (Marine) Police acting as the second line of defence.

Process:- The main facets of border management are as follows:


• Coordination within services:- Civilian and Military department
• Coordination between services:- Army, Navy, Air Force.
• International coordination:-

Technology:- Surveillance and communication.


What is the importance of communication and surveillance?
At Field Location:-

Telegram ID:- Saurabh Polity


❖ Threat detection
❖ Classification of Threats.(Armed and Unarmed)
❖ Identification of friend and foe.
❖ Availability of time and resources for incident response
At Command centre:-
❖ Decision Making
❖ Options available for response
❖ Information-based timely response
❖ Post-incident analysis
❖ Forecasting-based incident pattern analysis

Application of Technology:-
Comprehensive Integrated Border Management System (CIBMS):-
The CIBMS is touted as a more robust and integrated system that is capable of addressing
the gaps in the present system of border security by seamlessly integrating human
resources, weapons, and high-tech surveillance equipment. It has three main components:
a) New high-tech surveillance devices such as sensors, detectors, cameras, ground-based
radar systems, micro-aerostats, lasers.
b) An efficient and dedicated communication network including fibre optic cables and
satellite communication
c) A command and control centre to which the data will be transmitted in order to apprise
the senior commanders about the happenings on the ground and thus providing a
composite picture of the international border.

What to do?
Ans:- Madhukar Gupta Committee:-
Indo-Bangladesh:- Fencing projects should be prioritised and, if fencing in such areas is
not feasible, then the Ministry must increase the deployment of forces and intensify
round-the-clock surveillance.
India-Pakistan:- A joint venture through public-private partnership between the
Government and a private company.
India-China:- The Committee also recommends that the proposal of construction of more
helipads in forward locations may be approved without any delay.
India-Nepal:- Frame a Standard Operating Procedure to be followed by both the Ministries
(MHA & MoEFCCC) in all such cases where transfer of forest land is required for border
infrastructure projects.

Telegram ID:- Saurabh Polity


India-Myanmar:- Since the Assam Rifles is not a dedicated Border Guard Force, the
Ministry should explore the possibility of One Border One Force Principle.

Conclusion:- The Smart Management framework consists of the


following elements:-

The objective of security and surveillance systems deployed at each layer is


D4R2 (deter, detect, discriminate, delay, respond and recover).

MARITIME BORDER MANAGEMENT


What is Maritime Security?
Ans:- The term maritime security is defined as comprising those issues which pertain to the
sea and have a critical bearing on the country’s security. The threats are of Traditional and
Non traditional (Pirates, Climate Change, Smuggling) types.

What is the objective of Maritime Security?


Ans:-
● To deter conflict and coercion against India.
● To conduct maritime military operations in a manner that enables early termination
of conflict on terms favourable to India.
● To shape a favourable and positive maritime environment, for enhancing net security
in India’s areas of maritime interest.
● To protect Indian coastal and offshore assets against attacks and threats emanating
from or at sea.
● Enhance maritime security worldwide through cooperation, including removing
barriers to legitimate maritime trade.
● Settling maritime disputes peacefully and based on international law.

Telegram ID:- Saurabh Polity


● Jointly facing natural disasters and maritime threats created by non-state actors.
● Preserving the maritime environment and resources.
● Encouraging responsible maritime connectivity.

How is India defining its Maritime strategy?


Ans:- International Institute of strategic Studies defines Modi’s strategy for Maritime
domain:-
● The Indian Ocean is part of India’s immediate and extended neighbourhood and thus
deepens economic and strategic cooperation.
● Ensuring Maritime domain awareness:- As a part of it, 8 coastal surveillance radar
systems in seychelles.
● Being Net security Provider in Indian Ocean:- India had trilateral security agreements
with Maldives and Srilanka focussing on counter terrorism, hydrography and
intelligence gathering.
● Limiting Maritime engagement with China
● Establishment of Naval force at Andaman and Nicobar

What are the issues at the Maritime Border?


Ans:-
India-Pakistan:- The Maritime boundary dispute between India and Pakistan is primarily
centred on Sir Creek, which is 96-KM of a water body.
● The primary reason for the two countries not being able to sort out such issues Is the
result of Pakistan‟s insistence to link every other issue with the resolution of the
Kashmir problem.
● The reason why the dispute has become important in recent times is because the
river boundary delimitation will affect the determination of the maritime boundary,
the EEZ (Exclusive Economic Zone), and the Continental Shelf.
● Studies have shown that this region is rich in petroleum, oil, and gas, minerals and
plant life and therefore has potential for commercial exploitation.
● As of now, India asserts that the boundary lies in the middle of the Creek. Pakistan
claims that the line lies on the Creek‟s eastern bank and, therefore, the entire Creek
belongs to Pakistan.
● India wanted the Thalweg principle to be the basis of the settlement according to
which the boundary should be defined where a river or a channel is at its deepest.
Pakistan‟s contention is that the Thalweg principle cannot be applied in this case
since the channel is non-navigable during most of the times in a year.

Telegram ID:- Saurabh Polity


India-Srilanka:-
What is the issue even after the Maritime Boundary Agreement?
● In India, dispute chiefly began with internal debate about sovereignty related to
ceding of the island of Kachchatheevu to Sri Lanka.
● The main problem with Indian Fishermen is that a large number of them are
dependent for fishing on Srilankan waters, which is prohibited by Maritime Boundary
agreement.
● Indian fishermen use Trawlers which are banned in Sri Lanka.
● The Indians mostly fish at night for shrimp and their use of synthetic nets has caused
severe damage to ordinary nets of Sri Lankan fishermen.

Mechanism to solve Dispute:-


(1) Joint Working Group:- India and Sri Lanka have agreed to set up a Joint Working Group
(JWG) on Fisheries and a hotline between their Coast Guards to address long-standing issues
of fishermen.

Recent steps taken by Government:-


(A) These include launching of a programme on diversification of bottom trawlers into Deep
Sea Fishing Vessels for tuna long lining under Blue Revolution Scheme,
(B) Construction of Mookaiyur and Poompuhar fishing harbours.
(C) Capacity building programmes for fishermen of the Palk Bay area in deep sea tuna long
lining.
(D) Fresh registration for bottom trawlers in the Palk Bay area has been banned by the
Government of Tamil Nadu.
SUGGESTION:-
(1) Former President Dr APJ Abdul Kalam once opined that an apparent arrangement could
be alternate day fishing on Palk Bay and Palk strait by fisherman from both the sides.
(2) India should develop Inland fishing.
(3) An appropriate response of Tamil Nadu should be to expedite the conversion of its
trawlers to deep sea fishing vessels, not to condemn it.

26/11 & Aftermath for Maritime Security


● An existing coastal security scheme (originally instituted in 2005) was expedited, with
greater fund allocations for coastal infrastructure, including police stations and radar
stations along India’s coastline.

Telegram ID:- Saurabh Polity


● The inclusion of the fishing community :- as the “eyes and ears” of coastal security
establishment as Sagar Suraksha Dal.
● The Sagar Prahari Bal (SPB) meaning Ocean Sentinels, is a unit of the Indian Navy
formed in March 2009.
● The National Committee on Strengthening Maritime and Coastal Security (NCSMCS)
with cabinet secretary at the helm was established to review important matters
pertaining to coastal security and for effective centre-state coordination.
● Real-time information sharing through the national command, control,
communication and intelligence (NC3I) network.

What is the Coastal Security scheme?


Ans:-India has a three tier security system made of Indian Navy, Indian Coast Guard and
Marine Police.
● The Indian navy is responsible for protecting the outermost areas of India’s territorial
waters beyond 200 nautical miles.
● Indian Coast Guard safeguards the intermediate layer (between coast and 12
nautical miles of territorial waters to 200 nautical miles.
● Marine police safeguards the shallow coastlines and inland waters within 12 nautical
miles.

Features of Coastal Security Scheme:-


● Surveillance:-
● Joint Operation centres:-
● Exercises:-
Issues in Maritime Security:-
➔ Multi-level structure:- There are approximately 15 agencies involved in various
facets of coastal security that lead to inadequate utilization of resources, which is
one of the major impediments to the implementation of the coastal security
initiatives.
➔ Structural Gap:- Sufficient attention has not been paid to provide police stations with
essential requirements.
➔ Technology:- The latest audit showed only about 1,000 vessels were actually
equipped with the tracking facility.
➔ Domestic industrial base:- There is a lack of industrial base to reduce the demand for
security related equipment.
➔ Absence of a comprehensive policy formulation mechanism:- The National
Committee for Strengthening Coastal and Maritime Security (NSCMSC), mandate is
Telegram ID:- Saurabh Polity
limited to overseeing the implementation of various measures. There is no
coordinating body which could formulate national strategies for countering existing
and emergent threats.
➔ Discontent in fishermen communities:- Growing discontent among them due to the
loss of their ‘traditional’ fishing harbors to sensitive and strategic establishments like
naval bases, coast guard headquarters, etc. have also led to the generation of tension
between the local population and these law enforcement.
➔ Coastal Regulation Zone regulations:- There is an apprehension that CRZ laws are
being diluted in favour of tourism and shrimp farming, without taking into
consideration the security point of views.

Recent Steps Taken


International Collaboration:-
❖ India currently has White Shipping agreements with Bangladesh, Myanmar, and Sri
Lanka,USA.
❖ France and India commit to utilizing every opportunity of their naval ships calling at
each other's ports for holding passage exercises (PASSEX).
❖ India has signed the ascension agreement to the Trans Regional Maritime Network
(T-RMN). The network facilitates information exchange on the movement of
commercial traffic on the high seas.
Institutional Mechanism:-
❖ Indian Ocean Naval Symposium:- Is a voluntary initiative that seeks to increase
maritime cooperation among navies of the littoral states of the Indian Ocean Region
❖ Indian Ocean Rim Organisation:- It is a regional forum, tripartite in nature,
bringing together representatives of Government, Business and Academia, for
promoting co-operation and closer interaction among them.

Infrastructural Enhancement in Littoral Countries:-


➢ Coastal surveillance radar System at Seychelles.
➢ Infrastructure development (Dual use Logistic facilities) at Agalega Island(Mauritius)
➢ Twinning Agreement with Seychelles .The agreement is for inviting Seychelles for
ITEC program.
➢ Indian access to port DUQM in Oman for military use and Logistical support.
➢ Indian Navy offshore Listening Post in Madagascar.

Development of Andaman & Nicobar Island:-

Telegram ID:- Saurabh Polity


Why is India Developing Andaman & Nicobar?
❖ It is located(Largest of Nicobar Island) at just 90 kms from Malacca strait enough to
irritate China’s Malacca Dilemma.
❖ It provides an active ground for active surveillance and submarine hunting.
❖ To Pursue India’s Maritime strategy.
Recent Developments
❖ Construction of the Airport at Minicoy.
❖ Eco -Tourism is being developed in Smith Island.
❖ Plan to infuse an Amphibious plane which can land and take off from anywhere.
❖ Air Base at Car Nicobar.
❖ Tri Service Command:- The Andaman and Nicobar Command (ANC) is the first tri
services command in the country where officers and men from all three services
work under the leadership of a three-star officer from the Navy.

INDIA CHAIRS UNSC MEETING ON MARITIME SECURITY


1. The debate must focus on ensuring equal and unrestricted access to SLOCs by
states while resolving differences through peaceful means.
2. Sharing data on threats to commercial shipping is an important component of
enhancing maritime security.
3. An effective legal policy framework must underpin a rule-of-law based approach to
securing the maritime domain

MILITARY MODERNISATION
What is meant by Military Modernisation?
Ans:-
● The first is modernisation of the three services and the joint staff, which includes
acquisition of new platforms, weapons systems.
● The second includes land acquisition and capital works for the services and capital
expenditure (both plant and machinery and capital works) of the Defence Research
and Development Organisation (DRDO) and Ordnance Factories.
● The third includes improvement in procedures of Procurement.
Concerns/ Challenges :-
● Budgetary Allocation:- According to CLAWS, at least 2.5% allocation should be
for the defence excluding Pension. And at least 40 % of the expenditure should be for
Capital goods and only 15 % expenditure has been done on this last year.

Telegram ID:- Saurabh Polity


● Procurement Process:- Getting a license for defence production is a cumbersome
process. Award process for selecting Indian Companies requires more transparency.
● Lack of Expertise:- There is not enough expertise within the Army in the field of
weapon design and technology, resulting in lack of meaningful inputs for the
indigenous defence industry. An Army Design Bureau (ADB) has been inaugurated
recently to address this shortfall.
● Lack of Indigenisation:- India is the largest arms importer according to Stockholm
International Peace Research Institute. It impacts strategic depth for India.
● Delayed Acquisition:- Lack of modernisation and an alarmingly large percentage
of old equipment are still in use because several proposals for acquisition of new
equipment and upgradation of existing equipment have been inordinately delayed.

CASE STUDY OF HAL:-


(A) Dwindling Finance:- It has to borrow money to pay salaries to employees
(B) Inventory Management is lacking.
(C) Prolong approval process of any project from MOD and Armed forces.
(D) Lack of domestic market Competition.

CASE STUDY ON RAFALE:-


The acquisition process was delayed by more than 15 years, initiated in 2000,
finally concluded in 2020. CAG has highlighted it has been due to Indian Air
Force not getting ready for the Competitive bidding Process in 2004.

● Professional Military Education:- Sun Tzu said, if you know the enemy and
yourself, you don't need to fear a hundred battles, but if you know neither the
enemy nor yourself, you will succumb in every battle.
1. In india, most of the instructors have field experience of 2-3 years thereafter,
they move to Military institute, this lacks expertise.
2. We can't rely on guest lectures.

1. France where the theorist and practitioner from different fields are training the
junior military officers for example test flying theory and practice.
2. The US Air Force has its air University with a faculty of civilian academic who have

Telegram ID:- Saurabh Polity


dedicated their lives in one particular field only.
3. The naval war College in Goa invites an eminent academic from abroad to run
modules on operation of naval warfare. Also the national defence College in Delhi
has retired scholars which is heartening.
4. Also government has set up Rastriya raksha University in gujarat.

Suggestion:-
● Defence service staff College should have experts having knowledge of military
history, strategy, geopolitics etc.
● On the lines of vision for IIT, IIM, the government has laid down "Indian national
defence University", but it is in the pipeline.

Steps taken by the Government


Institutional Reform:-
1. Establishment of Defence Planning Committee:-
● Composition:- The Committee has a cross-section of members drawn from the
higher echelons of the civil and military services including the three service chiefs,
the Defence Secretary, Foreign Secretary, and Secretary (Expenditure) of the Ministry
of Finance (MoF), with the chief of Headquarters Integrated Defence Staff (HQ IDS)
performing the task of member secretary.
● Structure:- The Committee will operate through four sub committees:- Policy and
strategy,Plans and capability development,Defence diplomacy, and Defence
Manufacturing Ecosystem.
● Benefits:-
1. Consensus Generation:- It will Bridge the Civilian and Military divide by
bringing different components of Defence Planning on a single Platform.
2. Integrated Approach:- DPC will bring synchronization in the working of
defence preparedness.
3. Long term Perspective:-The DPC will prepare military doctrines and, in turn,
define Indian military objectives for the future.

2. Establishment of Chief of Defence Staff:-


● The CDS will be a four-star General/Officer who will act as the Principal Military
Advisor to the Defence Minister on all tri-services (Army, Navy and Indian Air Force)
matters.

Telegram ID:- Saurabh Polity


● The CDS will be the permanent Chairman of the Chiefs of Staff Committee (COSC).
However, CDS will not exercise any military command over the three service chiefs.
● Responsibility of CDS:-
➔ CDS will administer the tri-services organisations/agencies related to Cyber
and Space.
➔ CDS will look into monitoring of contracts, promoting the use of indigenous
equipment, leveraging of current systems and transforming them, and
prioritising the procurement of defence equipment in a better way.
➔ He will also assign inter-services prioritisation to capital acquisition proposals
based on the anticipated budget.

● Mandate of CDS:-
1. There are communication issues, budgetary overruns by individual commands, now
will be under control after CDS.
2. CDS will ensure and promote the jointness (functioning together of the three
services independently) through joint planning of command operations, logistics,
transport, training, communications, repairs and maintenance of the three services
within three years of operation.

Policy Reform

Defence Procurement Policy 2016:-


What changes in 2016 from 2013 Policy?
Ans:-
1. New Categories Added in BUY Category:- DPP-2016 introduces a new
category besides the existing five categories. Buy (Indian-IDDM), the most favoured
category. It refers to the procurement of products from an Indian vendor meeting
one of the two conditions
● Products that have been indigenously designed, developed and manufactured
with a minimum of 40% Indigenous Content (IC) on cost basis of the total
contract value.
● Products having 60% IC on cost basis of the total contract value, which may
not have been designed and developed indigenously.

Telegram ID:- Saurabh Polity


2. MAKE’ Category of Acquisition:- Policies and procedures for procurement
under MAKE Category have undergone a total change from that of DPP-2013.
➔ Make will have two sub categories, Make-I and Make-II.
➔ Cases under Make-I would be Government funded whereas cases under
make-II would have no government funding. Government funding for Make-I
cases has been increased from 80% to 90% of Prototype Development cost.

3. Introduction of L1-T1 Methodology for award of Contracts:- The new


methodology means that the final bidder would not necessarily be selected on the
basis of lowest price , but by a combination of price and superior technology offered
by qualified vendors.

4. Offsets:- A major policy change wherein offsets would now be applicable for those
cases only where indicative cost of procurement is Rs 2000 crores or more as against
Rs 300 crores till now.
OFFSETS IN DETAIL:-
What are defence offsets?
Ans:- The offset is an obligation by an international player to boost India’s domestic
defence industry if India is buying defence equipment from it.
Why Defence offsets?
Ans:- CAG has clarified the objectives of Offset Policy:- To leverage capital
acquisitions to develop Indian defence industry by
(i) fostering development of internationally competitive enterprises
(ii) augmenting capacity for Research, Design and Development related to defence
products and services
(iii) encouraging development of synergistic sectors like civil aerospace, and internal
security.

How can a foreign vendor fulfil its offset obligations?

★ Direct purchase,or executing export orders for, eligible products manufactured by, or
services provided by Indian enterprises.
★ Foreign Direct Investment in joint ventures with Indian enterprises (equity
investment) for eligible products and services.
★ Investment in ‘kind’ in terms of transfer of technology (TOT) to Indian enterprises,
through joint ventures or through the non-equity route for eligible products and
services.
Telegram ID:- Saurabh Polity
★ Investment in ‘kind’ in Indian enterprises in terms of provision of equipment through
the non-equity route for manufacture and/or maintenance of products and services.
★ Technology acquisition by DRDO in areas of high technology.
Issue with Offset Policy:-

▶The exemption of single vendor cases covered by the intergovernmental agreements and
Foreign Military Sales programme,will shrink the offset-related business opportunities
available to the Indian defence companies.

▶Any differences or disputes with vendors will be settled through discussion and, if not
resolved, will be referred to the Independent Monitors (IMs) for advice with the approval of
the Secretary (Defence Production).This is not in line with arbitration clause of the main
contract which is also applicable to the offset contracts.

▶The offset guideline lacks clear guidelines or criteria for signifying who will be Indian offset
partners.

Case Study:-
CAG has observed Dassault , the French manufacturer of Rafale, has not fulfilled its offset
commitment to transfer technology to India as part of the 2016 contract for 36 combat jets.
Government Clarification:- We have made a change in policy that from now onwards, there
would be no offset clause in government-to-government, inter-government and single
vendor defence agreement.

5. Defence Procurement Procedure 2020:- What changes from 2016 is the


demand of More indigenous content in BUY Category.
A. Leasing has been introduced in the draft DPP 2020 as another category of
acquisition in addition to the existing ‘Buy’ and ‘Make’ acquisition templates for
the first time. Under this Option, equipment or platforms may be leased from
defence firms or countries rather than purchased for ownership by the armed
forces.
B. Another Changes:- DPP 2016 ⇨⇩

Telegram ID:- Saurabh Polity


6. Equality in Business:-To establish a level-playing field between Indian private
sector and the public sector, the anomalies in excise duty/ custom duty have been
removed.
7. New Model:- Army Base Workshop will now be operated under ‘Government
owned contractor Managed Model. The contractor who is managing the facilities will
be responsible to get required licences.
8. Draft Defence Production and Export Promotion Policy:-
Vision :- To make India among the top five countries of the world in Aerospace and
Defence industries, with active participation of the public and private sector, fulfilling
the objective of self-reliance as well as demand of other friendly countries.
Objectives:-
➢ To achieve export of Rs 35,000 Crores in defence goods and services by 2025.
➢ To facilitate faster absorption of technology and create a tiered defence
industrial ecosystem in the country.
Strategies:-
➢ “Competency Mapping” of private defence industry including MSMEs,to
establish their core competence/ability to absorb various technologies.
➢ “Defence Investor Cell” in the Department of Defence Production to resolve
issues with Central, State and other authorities.
➢ FDI up to 74% under automatic route will be allowed in niche technology
areas.
➢ An Intellectual Property Cell will be set up in the Department of Defence
Production for promoting creation of Intellectual property in the sector.
➢ Defence Industry Corridors to provide state-of-the-art infrastructure and
facilities for setting up defence production facilities.

9. Demand of Theatre Command:-


What is the theatre command??

Telegram ID:- Saurabh Polity


Ans:- Theaterisation refers to placing specific units of army, navy, and air force under
a theatre commander. Such commands are led by officers from any of the three
services.
❖ India currently has two fully functioning unified commands — the Andaman
and Nicobar Command (ANC) set up in 2001 and the Strategic Forces
Command (SFC) set up in 2003.
❖ While the ANC is an integrated theatre command, SFC is an integrated
functional command (or specified combatant command. There are currently
17 single service commands — 7 of the Army, 7 of the Air Force and 3 of the
Navy. Each of these commands is located at a separate base.

The government is reportedly planning to reorganize the military into a theatre command
under the chief of defence staff (CDS) in which the assets of the Air Force will be split into
four and distributed among four operational theatres.

ISSUES:-
1. When everything will be under CDS, the Chief of staff committee (CSC) will be of
no use or you can say its use will be limited to training, maintenance, and support,
which is nothing but a gross misutilisation of CSC.
2. As per Naresh Chandra Committee, The CDS was to exercise operational control
only of the Strategic Force Command and the Andaman Nicobar Command. But
now CDS is being overpowered and indirectly the Army will be more powerful than
IAF.
3. Then , One should not expect the current level of efficiency to be maintained if the
combat inventory of the Air Force is split into smaller units in 4 different theaters.

The idea should be to reduce the responsibilities of the chiefs of staff by introducing the
CDS who were to take only non-operational responsibilities.

The second argument is: While it has been decided to consolidate the operational assets
of the Navy under Maritime Theatre Command, then why the Air Force should be
parcelled into smaller units.

10. Corporatisation of Ordnance Factories:- The assets, staff, and operations of 41


ordnance factories will be transferred to seven defence public sector units (DPSUs) from 1st
of October.
Why is the Government doing corporatisation?
Telegram ID:- Saurabh Polity
Ans:-
OFB’s monopoly has led to innovation almost drying up, low productivity, high costs of
production, and lack of flexibility at the higher managerial levels.
The corporatisation of OFB has been supported by different committees like TKS Nair, Vijay
kelkar and Raman Puri committee.

Why is it criticised now?


Ans:-
1. Prospect of their selective privatisation or even sale in due course.
2. The organisation has around 81,500 employees. Converting these divisions into
seven companies is not going to be an easy task.
3. Its turnover is even larger than high profile Hindustan Aeronautics Limited and
Bharat electronics limited.

11. Defence Corridor:-


What is the Defence corridor?
Ans:- It is a route along which domestic productions of defence equipment by public sector,
private sector and MSMEs are lined up to enhance the operational capability of the defence
forces.
Significance:
● Making the nation self-reliant in the field of defense production
● Promoting 'Make in India', which will reduce our imports and promote exports.
● Synergise the development of technologies, promote the growth of private domestic
manufacturers, including MSMEs and Start up.

Telegram ID:- Saurabh Polity


CONCLUSION:- The critical capabilities that are needed to be enhanced (as Lieutenant
General JP Singh noted in an interview with Centre for Land and Warfare Studies, New
Delhi) are “battlefield transparency, battlefield management systems, night-fighting
capability, enhanced firepower, including terminally guided munitions, integrated
manoeuvre capability to include self-propelled artillery, quick reaction surface-to-air
missiles, the latest assault engineer equipment, tactical control systems, integral combat
aviation support, and network centricity.”

Challenges to internal security through communication networks, role of media and social
networking sites in internal security challenges, basics of cyber security; money-laundering
and its prevention.

BASIC CONCEPT

What are Communication Networks?

Telegram ID:- Saurabh Polity


Ans:- A part of Critical Information Infrastructure ,defined in the IT Act, 2000 as “the
computer resource, the incapacitation or destruction of which shall have debilitating impact
on national security, economy, public health or safety.
The threats to the communication network can be from both through the networks as well
as to the networks.

What is the broad division of Communication warfare?


Ans:-
➔ Substantive destruction, the use of hard weapons to destroy enemy headquarters,
command posts, and command and control (C2) information centres
➔ Electronic warfare, the use of electronic means of jamming or the use of
anti-radiation [electromagnetic] weapons to attack enemy information and
intelligence collection systems such as communications and radar.
➔ Military deception, the use of operations such as simulated attacks to shield or
deceive enemy intelligence collection systems.
➔ Operational secrecy, the use of all means to maintain secrecy and keep the enemy
from collecting intelligence on our operations.
➔ Psychological warfare, the use of TV, radio, and leaflets to undermine the enemy’s
military morale.

What are the methods used for Communication by Non State actors?
Ans:-
1. Dead Drops:- A message is prepared in draft but not sent. The intended receiver is
then separately given the sender's login details so they can view the draft message
and if necessary reply.
2. Steganography:- A message within the message. Ex:- JPEG OR GIFS
3. Email and SMS text message:- Terrorists have tended to communicate in code or use
metaphors when discussing targets, knowing they may well be intercepted. For
example, 9/11 planners referred to the World Trade Centre as "architecture", the
Pentagon as "arts" and the White House as "politics".
4. Social media, chat rooms and gaming:- Some jihadi websites have even offered
video games in which users can pretend to be holy warriors killing U.S. soldiers.
5. Deep web, Deep web and Dark Net:-

Telegram ID:- Saurabh Polity


❖ Dark Net is an umbrella term describing the portions of the Internet not
open to public view or hidden networks whose architecture is superimposed
on that of the Internet. · Darknet provides anonymity to the users.
❖ Darknet is often associated with the encrypted part of the Internet called Tor
network where illicit trading takes place such as the infamous online drug
bazaar.
❖ A variety of Darknet markets (black markets) allow for the anonymous, illegal
buying and selling of drugs and other illegal or controlled substances, such as
pharmaceuticals, and weapons.
❖ The services and websites running on the Darknet are the dark web.

Are Dark Web and Deep Web one and the same?
● Deep Web is the area of the Internet which is not accessible through search engines.
What can be accessed through search engines is called Surface Web.
● To get into the Deep Web one should know the right address.
● The Dark Web is part of the Deep Web. · While the Deep Web is accessible, the Dark
Web is deliberately hidden.
● While incognito mode disables browsing history and web cache, the Dark Web is
shielded by specialised software.
● Since the real word money trail carries the danger of exposure, Dark Web operators
transact in virtual currencies, the most popular being Bitcoins.

6. Juice Jacking:- is a type of cyber-attack involving a charging port that doubles as a


data connection, typically over USB. A regular USB connector has five pins, where
only one is needed to charge the receiving end. Two of the others are used by default
for data transfers.Unless you have made changes in your settings, the data transfer
mode is disabled by default, except on devices running older Android versions.That

Telegram ID:- Saurabh Polity


means, anytime a user connects to a USB port for a charge, they could also be
opening up a pathway to move data between devices—a capability threat actors
could abuse to steal data or install malware. There are two ways juice jacking could
work:
★ Data theft: During the charge, data is stolen from the connected device.
★ Malware installation: As soon as the connection is established, malware is
dropped on the connected device. The malware remains on the device until it
is detected and removed by the user.

MEDIA AND SECURITY CHALLENGES


What could be the internal security threats facing India-
Ans:-
1. Terrorism
2. Communalism
3. Naxalism
4. Cyber hacking and its aftermath.

Terrorism:-
❖ The Internet is a powerful tool for terrorists, who use online message boards and
chat rooms to share information, coordinate attacks, spread propaganda, raise funds,
and recruit.
❖ Terrorist websites can serve as virtual training grounds, offering tutorials on building
bombs, firing surface-to-air missiles, shooting at U.S. soldiers.
❖ Terrorist sites also host messages and propaganda videos which help to raise morale
and further the expansion of recruitment and fundraising networks. Al-Qaeda’s
media arm, As-Sahab, is among the most visible.
❖ Revenge videos:- The video showed off a large group of Kalashnikov-wielding
jihadists, allegedly from India, fighting against the Syrian forces in the Homs province
and urging Indian Muslims to avenge the Babri Masjid Demolition and atrocities on
Muslims in Kashmir by joining the holy fight.

Case Study:-
In the 26/11 attack, the handlers of the terrorist used the media coverage to tell them the
exact locations of the policemen and advised them about the best way to attack the police.
Thus the thoughtless media coverage, in a way helped the terrorist.

Communalism:-
Telegram ID:- Saurabh Polity
❖ In September 2013,a morphed video on YouTube was used to fan communal riots in
Muzaffarnagar in Uttar Pradesh and led to mass panic.
❖ The social media and the SMS were blamed for rumour mongering during the Assam
unrest. They were alleged of misrepresentation of facts and doctoring news which
incited the opposing factions and led to huge migration of north easterners across
the country.
❖ Rioters in London Riots of 2011 used a smartphone app called Sukey to identify
physical location of police forces in real time and used Blackberry messenger to
coordinate attacks.

Naxalism:-
❖ The media engages in highlighting naxalism as warriors and Government as
oppressor is a serious threat to the Counter Insurgency Strategy.

Fake News:-
● Following the murder of a two-and-a-half-year-old in Aligarh in 2019, misinformation
related to the brutalities of the incident was viral on the social media. Such
misinformation results in chaos and anarchy in society.
● Recent Balakot Strike resulted in fake news where the Pakistani side has used our old
Jodhpur fighter jet crash video as their video of shooting down an Indian fighter jet.
Such news results in unnecessary pressure on the government and fear amongst
citizens.
● Potential for Mob Lynching:- Palghar Incident where two saints were lynched on the
fake news pf being child kidnappers.

These collectively represent the Fake News Triangle: without any one of these factors, it is
unable to spread and reach its target audience.

International users:-

Telegram ID:- Saurabh Polity


❖ The other national and international users such as the political parties, NGO's,
hackers pose a serious threat using social media. For example, during the civil turmoil
in the Arab Spring Uprising, the various governments were threatened through social
media.

Virtual Community:-
❖ Popular social networking websites are another means of attracting potential
members and followers. These types of virtual communities are growing increasingly
popular all over the world, especially among younger demographics. This can build
Anti-national Sentiments among Society.

Hate Speech:-
❖ There is a growing trend of trolling, threatening and systematic online and offline
abuse of activists, journalists and individuals. The victims are targeted due to a list of
reasons including religious beliefs, gender, sexual orientation, ideology.
❖ In Germany a correlation was found between anti-refugee Facebook posts by the
far-right Alternative for Germany party and attacks on refugees.
❖ In the United States, perpetrators of recent white supremacist attacks have circulated
among racist communities online, and also embraced social media to publicize their
acts.
❖ Sri Lanka has similarly seen vigilantism inspired by rumors spread online, targeting
the Tamil Muslim minority.

Deep fakes:-
Ans:- Deepfakes are digital media manipulated using Artificial Intelligence. Deep fakes are
also called Synthetic Data/ Media.

How are they generated?


Ans:-

● The main ingredient in deep fakes is machine learning, which has made it possible to
produce deep fakes much faster at a lower cost.
● Generative Adversarial Networks (Deep learning Algorithm) will be the main engine
of deepfakes development in the future. GAN generated Videos are near-impossible
to tell from real faces.

Impact of Deep fakes:-

Telegram ID:- Saurabh Polity


Ans:-
▶Social Impact:-
➡The clearest threat that deepfakes pose right now is to women, nonconsensual
pornography accounts for 96 % of deep fakes currently deployed on the Internet.
➡Pronograhic deep fakes can threaten, intimidate and inflict psychological harm and reduce
women to sexual objects.

Political Impact:-

➡Manipulation of Media narratives using deep fakes damages institutions, businesses and
democracy.

➡It has the potential to erode trust in the news media.

➡A deep fake of a leader relating to his remarks on caste,religion can result in Riots and
violence.

➡Leaders may weaponise deep fakes and use fake news and an alternative facts narrative to
replace an actual piece of media and truth.

➡A deep fake Political candidate can sabotage their image and reputation.

Solutions:-

● Media literacy for consumers and journalists is the most effective tool to combat
disinformation and deep fakes.
● Collaborative actions and collective techniques across legislative regulations,
technology intervention and platform policies.
● Easy to use and accessible technology solutions to detect deep fakes.

CASE STUDY:-
Two Programs called Reality defender & Diptrace, aim to keep deepfakes out of your life.

● Diptrace works on an API that will act like a hybrid antivirus/spam filter, prescreening
incoming media and diverting obvious manipulations to a quarantine zone, much like
how Gmail automatically diverts spam before it reaches your inbox.

Telegram ID:- Saurabh Polity


● Reality Defender, a platform under construction by the company AI Foundation ,
similarly hopes to tag and bag manipulated images and video before they can do any
damage.

Disinformation as a Threat
What is Disinformation?
Ans:- Disinformation is false or misleading information that is spread deliberately to deceive.
Disinformation is primarily carried out by government intelligence agencies, but has also
been used by non-governmental organizations and businesses.

Front Groups are a form of disinformation, as they mislead the public about their true
objectives and who their controllers are.Most recently, disinformation has been deliberately
spread through social media in the form of "fake news", disinformation masked as legitimate
news articles and meant to mislead readers or viewers.
Difference between the Disinformation and cyber security threats:-
1. Cyberattacks are aimed at computer infrastructure while disinformation exploits our
inherent cognitive biases and logical fallacies.
2. Cyber security attacks are executed using malware virus trojans, disinformation is
manipulated and misappropriated information.
3. Like phishing attacks compromise IT Systems, Disinformation campaigns play on
emotions.
Disinformation is basically cognitive hacking:- Cognitive hacking is a threat from
disinformation and computational propaganda. This attack exploits psychological
vulnerabilities and the best example is the attack on the US Capitol.

Regulation of Social Media


(1) Legislative:-IT Amendment Act:-
➔ Section 69 gives power to issue directions for interception or monitoring or
decryption of any information through any computer source.
➔ Section 69B authorizes to monitor and collect traffic data or information through any
computer resource for Cyber security.
➔ The amended Section 79 of the 2000 Act provided that “an intermediary shall not be
liable for any third party information, data, or communication link made available or
hosted by him.
(2) Private Party:-

Telegram ID:- Saurabh Polity


➔ Facebook has partnered with fact checkers and, like Twitter, ramped up efforts to
block fake accounts.
➔ Facebook’s popular messaging app WhatsApp has launched newspaper and radio
campaigns to deter the spread of misinformation.
➔ Google has partnered with fact-checkers to train 10,000 journalists this year to better
tackle fake news.

How is social Media is being used by Law agencies?


Ans:-
Social Media Lab Project:- The Social Media Lab shall track public views and sentiments
on various social media platforms enabling police to enhance its preparedness in handling
sensitive issues and protests. The Social Media Lab shall provide public sentiment analysis,
identify behavioural patterns, influences and advocates, track the change and increase in
chatter and generate alerts in real time for police to take suitable action.
CyberDome:- Cyberdome is a Centre of Excellence for Kerala Police, to meet the long term
security challenges in the digital arena of the modern world, by bridging the gap between
the latest changes and innovations in the cyber space and the skill set development of Kerala
Police, in combating the emerging cyber threats. It is envisaged as a collaboration Centre for
both the public and private fraternity to converge and share information, as well as
resources, that will escalate the safety of our cyberspace.

Flickr Software :- After 2011 London Riots,The Metropolitan Police (MET) and the Greater
Manchester Police (GMP) used Twitter extensively to support investigations and to seek
information on offenders. Both forces also used the photo-sharing site Flickr to publish
photos of perpetrators captured on CCTV.

Challenges in Monitoring Social Media:-


1. Server Location and Laws of Different Countries:- Major Complicating Factors to
secure the networks and Media Much of the hardware and software that make up
the communications ecosystem is sourced externally.
2. Fears of censorship of freedom of speech and expression.
3. Encrypted Message:- Use of phones/whatsapp to send and receive messages,
concerns the government because the communications sent via such devices and
applications are encrypted and could not be monitored and consequently hinders the
country's efforts to fight terrorism and crime.
4. Complicated Networks:- The task of securing the networks is also complicated by the
fact that much of the infrastructure is in the hands of private companies who see
Telegram ID:- Saurabh Polity
measures such as security auditing and other regulations and frameworks as adding
to their costs. Source of Origin is difficult to find.

What to do?
➔ Institutionalise the blueprint for a National Social Media Policy.
➔ Inclusion of lateral entry specialists to handle specific requirements like 24x7
tech-support/or soft skills, etc., need to be debated.
➔ Replicate “Social Media Labs” across the country.
➔ Expand and define scope of public-private partnerships.
➔ Demarcate budgets, standardise tools and platforms.

CYBER SECURITY

Definition of CyberSpace:- A global domain within the information environment


consisting of the interdependent network of information technology infrastructures,
including the Internet, telecommunications networks, computer systems, and embedded
processors and controllers.

Types of Cyber Threat


Cyber threats can be disaggregated, based on the perpetrators and their
motives, into four baskets:
1. Cyber Espionage.
2. Cyber Crime
3. Cyber Terrorism
4. Cyber Warfare
Cyber Espionage:- Using Stealthy Malware to penetrate military and corporate data
servers in order to obtain plans and intelligence.
➔ Cyber attack by Chinese crackers at the computers in the Prime Minister’s
Office(PMO) was reported in 2009.
➔ In August 2015, security firm FireEye revealed an intense activity of hackers based in
China particularly interested in entities and organizations linked to the Indian
Government as well as in information on Tibetan activists.

Telegram ID:- Saurabh Polity


Cyber Crime:- People engaged in crime for Seeking Commercial gains from hacking banks
and financial institutions as well as Phishing scams and computer Ransomware.
➔ The creation of sophisticated information-stealing malware is facilitated by toolkits
such as ZueS.
➔ India is the third largest generator of spam worldwide, accounting for 35% of spam
zombies and 11% of phishing hosts in the Asia-Pacific-Japan region.
Cyber Terrorism:- Cyber-terrorism can also be as “the use of computer network tools to
shut down critical national infrastructures (such as energy, transportation, government
operations) or to coerce or intimidate a government or civilian population.
➔ Groups such as G-Force and Doctor Nuker have defaced or disrupted service to
several major entities in India such as the Zee TV Network, The Indian Institute of
Science and the Bhabha Atomic Research Center.
Cyber Warfare (Fifth Domain of Warfare):- Actions by a nation-state or its proxies to
penetrate another nation’s computers or networks for the purposes of espionage, causing
damage or disruption.
➔ In 2010, Stuxnet, which was designed to attack industrial Programmable logic
controllers, was directed against the Iranian nuclear programme.
➔ Wiper, a new virus, infected networks in Iran .

Methods of Attacks Most popular weapon in cyber terrorism is the use of computer
viruses and worms. Yet these attacks can be classified into three different categories
● Physical Attack:- Using conventional methods like bombs, fire etc to harm the cyber
infrastructure.
● Syntactic Attack:- The computer infrastructure is damaged by modifying the logic of
the system in order to introduce delay or make the system unpredictable. Computer
viruses and Trojans, Ransomware are used in this type of attack.
● Semantic Attack:- During the attack the information keyed in the system during
entering and exiting the system is modified without the user’s knowledge in order to
induce errors. Ex:- Data Diddling, Phishing, DDOS.

To Summarize the complexity:-

Telegram ID:- Saurabh Polity


As per the Verizon's 2014 Data Breach Investigations Report, 92% of cyber-attacks
in the past 10 years :-
● Data Diddling:- Valid data intended for a recipient is hijacked or intercepted and
then is replaced with an erroneous one.
● Ransomware:- Ransomware is a form of malicious software that locks up files on
the computer, encrypts them, and demands ransom/pay to return the files back.
Example-Wanna Cry and Petya Ransomware.

Darkside Group:-
This is a relatively new criminal group believed to have roots in Eastern Europe,
exposing the remarkable vulnerability of key American infrastructure using
Ransomware.

How to stop Ransomware?


● Keep your operating system patched and up-to-date.
● Don't install software or give it administrative privileges unless you know
exactly what it is and what it does.
● Install antivirus software, which detects malicious programs like
ransomware as they arrive, and whitelisting software, which prevents
unauthorized applications from executing in the first place.
● Back up your files, frequently and automatically! That won't stop a malware
attack, but it can make the damage caused by one much less significant.

Telegram ID:- Saurabh Polity


● Phishing:- is a cybercrime in which a target or targets are contacted by email,
telephone or text message by someone posing as a legitimate institution to lure
individuals into providing sensitive data
● Skimming:- is the act of obtaining data from an unknowing end user who is not
willingly submitting the sample at that time.
● Denial of Service attack:- Prevents or impairs the authorized use of
information system resources or services

According to this definition, cyber attackers don't fit into the definition of Combatants
under International Convention

1. Cyber warriors don't carry arms openly.


2. Their arms are malicious software which is invisible
3. Source of attack is lone software.

So it raise two questions:-


1. If a nation like China is employing people to attack another country, will it be a violation
of laws of war or not?
2. How the country will counter attack in self defence as they are not combatants as per
international definition.

India’s Vulnerability:-
➔ According to Symantec Corp, India was ranked among the top five countries to be
affected by cybercrime.
➔ Average cost of data breach for firms in India sees an increase of 12.3%:- The
Ponemon Institute Report.

Why such a scenario? Is it because of growing interconnectedness or


technical and specific flaws.?
Ans:-
Yes:-
Growing Interconnectedness:-
(1) Digital Push-Example- Aadhar, E governance, Digital India,BHIM
Telegram ID:- Saurabh Polity
(2) Growing technological Entrepreneurship.
(3) Increasing Online transactions
(4) Banking Transactions

There are other reasons also:-


● Underreporting:- A large Indian bank faced a major cybersecurity breach and was
forced to replace 24 million credit cards. The Reserve Bank of India didn't reveal
anything about the case due to the fear of loss of credibility.
● Lack of trained staff:- There are about 30k vacancies in cyber agencies today.
● Import dependence:- For the majority of electronic devices from cellphones to
equipment used in the power sector, defence and other critical infrastructure put
India into a vulnerable situation.
● Rampant use of unlicensed software and underpaid licenses also make them
vulnerable.
● Lack of Digital Literacy.
● New automation technology without Security:- CCTV cameras, connected devices,
and toys can all be turned into bots if they are unprotected.
● Unencrypted Data:- The majority of data breaches happen due to improper
encryption and stolen data immediately accessible after being stolen.
● Unprotected Third Party Services:- The Internet is a universal connector, therefore
the unprotected third-party services can open the door for cyber attackers to access
data.
● One of the reasons that Cyberspace is under threat is low conviction. One of the
reasons for low conviction is low FIR in cybercrime cases. As per the MHA, only 2.5%
of complaints registered on Portal are converted in FIR.

PEGASUS, CYBER SECURITY, PRIVACY

Pegasus, Spyware that can stealthily enter a smartphone and gain access to
everything on it, including its camera and microphone. Pegasus is designed to
infiltrate devices running Android, Blackberry, iOS and Symbian operating system
and turn them into surveillance devices.

Why is it called a cyber weapon?


Ans:- It can copy messages,harvest photos, activate a microphone to record
conversation and can also pinpoint the location of an individual . An earlier version
of Pegasus is "Spear phishing" which was used to exploit vulnerabilities of
operating systems.

Telegram ID:- Saurabh Polity


How Does It Work?
Ans:-
● A hacker would typically try to infect a victim’s device with Pegasus using a
phishing link, mostly sent via a text message that looks innocent and
benign.
● Clicking on the phishing link would (without the victim’s knowledge) start
the download of Pegasus on the device and set up a connection with a
hacker’s command computer that could be thousands of miles away.
● The hacker can then communicate with the Pegasus spyware via the
remote command centre and issue directions for what information the
spyware should send back to the hacker’s server.

According to The Citizen Lab, in this way Pegasus can be used to gather a vast
amount of victim information: “Passwords, contact lists, calendar events, text
messages, and live voice calls from popular mobile messaging apps.” According to
this report, “Pegasus could even listen to encrypted audio streams and read
encrypted messages”.

Do security agencies in India use Pegasus?


Ans:- There is no clarity. However, this question has been asked by the DMK Leader
in the Parliament. The response has been following

1. “Section 69 of the Information Technology Act, 2000 empowers the Central


Government or a State Government to intercept, monitor or decrypt…any
information generated…or stored in any computer resource.
2. Section 5 of the Indian Telegraph Act, 1885 empowers lawful interception
of messages on occurrence of public emergency or in the interest of public
safety.
3. The response also listed the 10 agencies that can intercept messages under
the law and a Standard Operating Procedure (SOP). Such agencies allowed
to intercept messages include the Intelligence Bureau, Enforcement
Directorate, Cabinet Secretariat (RAW), and Commissioner of Police, Delhi.

The response of the Minister on the floor of the house said that “there is no
blanket permission to any agency for interception or monitoring or decryption and
that permission from competent authority is required, as per due process of law
and rules, in each case”.

Telegram ID:- Saurabh Polity


Pegasus and Fundamental Rights

● According to the Centre for Internet & Society, the gaps in laws allow
surveillance and affect privacy. For example: Ambiguity on issues like type
of interception, granularity of information that can be intercepted and the
degree of assistance from service providers helps in bypassing the law and
aids surveillance by the state.
● Affects Fundamental Rights: The very existence of a surveillance system
impacts the right to privacy and the exercise of freedom of speech and
personal liberty under Article 19 and 21 of the Constitution.
● Authoritarian Regime: The surveillance promotes spread of
authoritarianism in the government functioning since it allows the
executive to exercise a disproportionate amount of power on the citizen
and impacts their personal lives.
● Threat to Freedom of Press: Current revelations over the use of Pegasus
highlights that surveillance was also conducted on many journalists. This
affects freedom of press.

SC understanding on petition for invasion of Privacy:-

1. Court cannot coerce the government for not sharing details of surveillance as
National security is undoubtedly in the hands of the government.

2. But any kind of surveillance that violates right to privacy must follow the
principle of proportionality

What is this?
Ans:- The honourable court in Puttaswamy case or in Anuradha Bhasin case has
propounded this doctrine:-
1. State action must have a legislative mandate.
2. The action must show that the objective of its law is founded on a
legitimate governmental aim.
3. It must be proportionate, i.e., such state action — both in its nature and
extent, must be necessary for a democratic society. Further, such action
must have no alternative and less intrusive measures available to achieve
the same objective

Democracy run by rule of law, Indiscriminate spying cannot be allowed or can be


allowed only if it follows the above mentioned doctrine.

Telegram ID:- Saurabh Polity


Cyber Security Hierarchy in India

Approach to Cyber Security


There are four major areas in dealing with the cyber security crimes viz.
deterrence, prevention, detection and reaction.
★ For deterrence, there is law.
★ For prevention, there is a need to design and use more secure systems,
better security management.

Telegram ID:- Saurabh Polity


★ For detection, focus needs to be on policing mechanisms and early
warning of attacks.
★ For reaction, there is a need for the design of stronger information
infrastructures, crisis management programs.

Steps taken for Cyber Security

Legislative Framework
❖ The Information Technology ( IT ) Act 2000, later amended in 2008to define Data
Protection & Cyber crimes.
❖ Section 66 F of IT Act deals with Cyber Terrorism.
Policy Framework
National Cyber Security Policy
Features:-
❖ Set up of a 24×7 National Critical Information Infrastructure Protection Centre
(NCIIPC) for obtaining strategic information regarding threats to ICT infrastructure
❖ Creation of a task force consisting of 5,00,000 cyber security professionals in next five
years through capacity building, skill development and training.
❖ Provision for fiscal schemes and incentives to encourage entities to install,
strengthen and upgrade information infrastructure with respect to cyber security.
❖ Designation of CERT-In as the national nodal agency to coordinate cyber security
related matters and have the local (state) CERT bodies to co-ordinate at the
respective levels.
❖ Encouragement of wider use of Public Key Infrastructure (PKI) for government
services.
Executive Framework:-
● National Critical Information Infrastructure Protection Centre (NCIIPC):- NCIIPC's
vision is to facilitate safe, secure and resilient Information Infrastructure for Critical
Sectors of the Nation. NCIIPC aims to create a resilient and robust framework for
protection of CII by building collaborative frameworks among various stakeholders
and supporting stronger communities.
● National Cyber Crime Coordination centre:-
➔ To act as a nodal point in the fight against cybercrime.
➔ Identify the research problems/needs of LEAs and take up R&D activities in
developing new technologies and forensic tools in collaboration with
academia / research institutes within India and abroad.

Telegram ID:- Saurabh Polity


● CERT-in:- CERT-In has been designated to serve as the national agency to perform the
following functions in the area of cyber security:
❏ Collection, analysis and dissemination of information on cyber incidents.
❏ Forecast and alerts of cyber security incidents.
❏ Emergency measures for handling cyber security incidents
❏ Coordination of cyber incident response activities.
● The “Cyber Swachhta Kendra” (Botnet Cleaning and Malware Analysis Centre) is a
part of the Government of India's Digital India initiative.
● The cyber crime coordination centre under the Ministry of Home Affairs has
launched the cyber crime volunteer program. It will help law enforcement agencies
in identifying , reporting and in the removal of illegal and unlawful online content.
This form of surveillance where citizens are putting watch over another citizen is
called "Lateral surveillance".. (Vertical surveillance means citizens are being watched
by the State.) Example of lateral surveillance is C- Plan in UP, for keeping a tab on
anti-social elements is designed to receive inputs from certain individuals in villages
across State.

International Level:-
(A) Cyber Diplomacy:-
● Global Conference on Cyber Space (GCCS), one of the world’s largest conferences in
the field of CyberSpace, which is being hosted by India for the first time.
● The Third India-Japan Cyber Dialogue was held in Tokyo on February 27, 2019. Japan
and India shared views on cyber security.
● Asia Pacific Computer Emergency Response Team:- Its operational mandate is to
contribute to Internet security within the region, based on information sharing, trust
and cooperation.
● Budapest Convention:- It serves as a guideline for any country developing
comprehensive national legislation against Cybercrime and as a framework for
international cooperation between State Parties to this treaty. India is not yet party
to this convention.
Private Party
● NASSCOM has planned to introduce training programs with focus on usage of cyber
forensic tools at cyber labs.
● Technology and security firms led by Microsoft have signed “Cyber Security Tech
Accord” to defend people from malicious attacks by cyber criminals.

What are the gaps in the Cyber Security Policy in India?


Ans:-
Telegram ID:- Saurabh Polity
● The policy does not contain parameters for effective implementation. The policy also
does not mention the Information Technology Act of 2000 which is significant in the
event of a conflict.
● Cyber security, privacy and civil rights or liberties constitute the three components of
the triangle that is integral to the subject at hand. It does not detail the parameters
of privacy in the context of cyber security.
● Further, the policy does not speak about how the data will be collected, how it will
be processed and how it will be used.
● The policy is silent about the Central Monitoring System, snooping surveillance
interception, monitoring and scrutiny activities by other nations.

Suggestion:-
PROMOTE LOCAL CYBER SECURITY INDUSTRY:-
● Dedicated Incubator for Cyber Security Startups.
● Annual Cyber Security Expo

STRATEGIC PARTNERSHIP:-
● Collaboration with the Private Sector for R&D.
● Partnering with Service Providers, Private Sectors.
ROLE OF STAKEHOLDERS:-
A. Citizens :-
● Follow cyber hygiene while interacting in cyberspace.
● Be aware of the ever changing threat landscape and adopt safety measures
B. Private Sector:-
● Be accountable for the products and services they provide and provide
adequate guidance for the users.
● Adopt ‘security by design’ and ‘privacy by design’ principles into their
standard.
● Invest in training and capacity building to meet future cyber security needs.
C. Government :- Gulshan Rai Committee has recommended for:-
● Establish a new Indian Cyber Crime Coordination Centre which would be
linked to NATGRID and CCTNS.
● Establish a separate agency for online cybercrime registration, monitoring
and integration of CCTNS data with the same.
USE OF TECHNOLOGY
● Cyber Deception:-The technology works by generating traps or deception decoys
that mimic legitimate technology assets throughout the infrastructure. Attackers
won’t know which aspects of a business’s operations are real and which are fake.

Telegram ID:- Saurabh Polity


● Regular patching
● Security Firewall
These all are basically the Defense in depth model which is an information
assurance strategy that provides defensive measures..

HYBRID WARFARE where Cyber attack is a part of Hybrid warfare


It is an emerging, but ill-defined notion in conflict studies. It refers to the use of
unconventional methods as part of a multi-domain warfighting approach. These methods
aim to disrupt and disable an opponent’s actions without engaging in open hostilities.
● Russia’s approach to Ukraine is an example of this form of warfare. It has involved a
combination of activities, including disinformation, economic manipulation, use of
proxies and insurgencies, diplomatic pressure and military actions.

● The term hybrid warfare originally referred to irregular non-state actors with
advanced military capabilities. For example, in the 2006 Israel-Lebanon War,
Hezbollah employed a host of different tactics against Israel. They included guerilla
warfare,innovative use of technology and effective information campaigning.
● Following that war, in 2007, American defence researcher Frank Hoffman expanded
on the terms “hybrid threat” and “hybrid warfare” to describe employing multiple,
diverse tactics simultaneously against an opponent.
Telegram ID:- Saurabh Polity
Such warfare is conducted in the “grey zone” of conflict, meaning operations may not clearly
cross the threshold of war. That might be due to the ambiguity of international law,
ambiguity of actions and attribution, or because the impact of the activities does not justify
a response.

SPACE WEAPONIZATION
The paradox of today’s world, where peace comes from deterrence
and weaponization; and even outer space, God’s sole preserve, has
not been left out.
Concept of Weaponization of Space
The concept for space weaponization came up in the early 1980s through the “Strategic
Defence Initiative” (SDI) also known as the “Star Wars” programme of the United States. The
idea was to put a large number of satellites into orbit that would detect the launch of enemy
missiles and then shoot them down.
Subsets of Weaponization:-
1. Space Control:- It involves protecting orbit assets of own and friendly countries,
and denying enemy access to space.
2. Space Force Application:- It envisages attacking terrestrial targets from
space-based weapons which would reduce the reaction time, the cost of human
attrition.
What are the issues with Weaponization ?
Ans:-
❖ Create an environment of uncertainty, suspicion, miscalculations, competition.
❖ It would put at risk the entire range of commercial satellites as well as those involved
in scientific explorations.
❖ Another problem is that countries, particularly developed ones like the United States,

may reserve an orbital slot and may not use it for several years, thus, monopolising
the diminishing number of orbital slots.
❖ Issue of Space Debris
India has recently tested Mission Shakti, Anti Satellite Weapon. How to
Justify it?
● Anti-satellite technology has so far been in the hands of very few countries: the
United States, Russia and China.

Telegram ID:- Saurabh Polity


● The acquisition and demonstration of this technology make India a member of an
elite group of countries.
● China launched the Aolong-1 spacecraft,equipped with a robotic arm, is a dual-use
ASAT weapon.
● US Defence Projects is working on a weapon which will shoot molten metal, with the
help of electromagnets – known as Magneto Hydrodynamic Explosive Munition
(MAHEM). MAHEM can be attached to a missile and has greater control and
destructiveness in hitting targets compared to existing weapons.

India’s Position on ASAT


● India is signatory to the Outer Space Treaty,1967 and ratified it in 1982.
● India supported UNGA resolution 69/32 on No First Placement of Weapons on Outer
Space.
● India supports the substantive consideration of the issue of Prevention of an Arms
Race in Outer Space (PAROS) in the Conference on Disarmament

Outer Space Treaty:-


● Outer space is not subject to national appropriation by claim of sovereignty, by
means of use or occupation, or by any other means.
● States shall not place nuclear weapons or other weapons of mass destruction in orbit
or on celestial bodies or station them in outer space in any other manner.
● The Moon and other celestial bodies shall be used exclusively for peaceful purposes.
● States shall be liable for damage caused by their space objects
·
Challenges to the Treaty:-
★ The treaty has been challenged by Bagota Declaration when 8 equatorial countries
claimed ownership over orbit.
★ The Outer Space Treaty of 1967 neglected to define where space began and
demarcation between Outer space and Air space.
★ The treaty applied to only the Government of the countries not on the Private Party.
Many private companies, such as Lunarland, have exploited this and have offered to
sell plots of land on celestial bodies such as the moon.
★ The treaty does not prohibit the placement of conventional weapons in orbit.

India’s Effort:-
Features of Space activities bill 2017:-

Telegram ID:- Saurabh Polity


1. The provisions of this Act shall apply to every citizen of India and to all sectors
engaged in any space activity in India or outside India.
2. A non-transferable licence shall be provided by the Central Government to any
person carrying out commercial space activity.
3. The Central Government will formulate the appropriate mechanism for licensing,
eligibility criteria, and fees for licence.
4. The government will maintain a register of all space objects.
5. It will provide professional and technical support for commercial space activity and
regulate the procedures for conduct and operation of space activity.
6. If any person undertakes any commercial space activity without authorisation they
shall be punished with imprisonment up to 3 years or fined more than 1 crore or
both.

● Various Security forces and agencies and their mandate.

The defence forces (Indian Armed Force) are the primary force responsible for the security
of the country, and they come under the authority of the Ministry of Defense. Central Armed
Police Force (CAPF) aid in combating external threats (they mainly manage internal security
issues) but are managed by the Ministry of Home Affairs.

The defence forces are divided into four sub-heads.


1. Indian Army Personnel.
2. Indian Air Force Personnel.
3. Indian Navy Personnel.
4. Indian Coast Guard Personnel.

Central Armed Police Force (CAPF)

Assam Rifles (AR)


1. The Assam Rifles was established in 1835.
2. It is often referred to as the“Friends of the Hill People”, “Friends of the North East
People” and the “Sentinels of the North East”.
3. It is headed by an Army officer of the rank of Lieutenant General. It currently reports
to the Ministry of Home Affairs.

Telegram ID:- Saurabh Polity


4. The administrative control of Assam Rifles is with MHA while the operational control
is with the Ministry of Defence.

Border Security Force (BSF)


1. It ensures the security of the borders of India and is headed by an officer from the
Indian Police Service.
2. It also undertakes defensive actions during wartime to free up Indian Army troops for
offensive operations.
3. Of late, the BSF has also been tasked with assisting the CRPF and army in
counter-insurgency operations.

Recent notification by MHA which directs the Border security force to arrest, seize and
seizure within 50 km of international boundary at punjab, jammu, Assam, west Bengal,
earlier it was only 15 km

Analysis:-
1. It is considered against the spirit of federalism and it is a kind of encroachment in the
state police domain.
2. It will reduce the capability of BSF also, as they will be more involved in hinterland
activities after this notification.

BSF said it will establish uniformity in defining the area within which bsf can operate. And
BSF cannot prosecute criminals and they will have to hand it over to the local police. So
there is nothing like federalism is under threat.

Central Industrial Security Force (CISF)


1. The Central Industrial Security Force (CISF) was established in 1969, under an Act of
Parliament, “Central Industrial Security Force Act, 1968.”
2. It provides integrated security cover to the Public Sector Undertakings, airports and
SEZs on a case to case basis.
3. It is currently providing security cover to nuclear installations, space establishments,
airports, seaports, power plants, sensitive Government buildings, heritage
monuments and large special economic zones.

Telegram ID:- Saurabh Polity


4. CISF is also responsible to provide protection to the persons classified as Z Plus, Z, X,
Y.

Z+ category has a security cover of 36 personnel:-


● It offers a security cover of 55 personnel, including 10+ NSG Commandos + Police
Personnel.
● Each commando is an expert in martial arts and unarmed combat.
● Z+ security is provided by the NSG commandos equipped with sophisticated MP5
guns, and modern communication gadgets.
Z category has a security cover of 22 personnel:-
● Z category provides a security cover of 22 personnel, including 4 or 5 NSG
Commandos + Police Personnel.
● It is provided by the Delhi police or the ITBP or CRPF personnel along with one
escort car.
Y category has a security cover of 11 personnel:-
● Y category has a security cover of 11 personnel, including 1 or 2 Commandos +
Police Personnel.
● It offers two personal security officers (PSOs).
X category has a security cover of 2 personnel:-
● X category has a security cover of 2 personnel (No Commando, Only Armed Police
Personnel).
● It is provided by one PSO (personal security officer). Again, a considerable number
of people get this category of protection in India.

Central Reserve Police Force (CRPF)


1. The primary mission of the Central Reserve Police Force is counter-insurgency
operations.
2. It also assists the State and Union Territories in police operations to maintain law and
order.
3. Apart from this, the force participates as a police force in the UN peace-keeping
missions.
4. The CRPF maintains a special operation unit known as Commando Battalion for
Resolute Action(COBRA) to combat Maoist insurgents.

Indo Tibetan Border Police (ITBP)


1. It was created under the CRPF Act.

Telegram ID:- Saurabh Polity


2. It guards the Indo-Tibetan border and the mountainous regions of the India-China
border and monitors the northern borders.
3. ITBP replaced Assam Rifles in Sikkim and Arunachal Pradesh in 2004. The Indi-China
border covering the following state is guarded by the ITBP (From the Karakoram pass
in Jammu & Kashmir to Jechap La in Arunachal Pradesh):
4. The force also keeps a check on illegal immigration and trans-border smuggling.
5. It has been deployed in UN peacekeeping missions in Kosovo, Sierra Leone, Haiti,
Western Sahara, Bosnia, Herzegovina, Afghanistan and Sudan.

Sashastra Seema Bal (SSB)


1. They guard Indo-Nepal and Indo-Bhutan Borders.
2. They are also deployed during elections as polling booth security.

Need of tribunals in capf where officers( gazetted and non gazetted) are going for leave
for indefinite period.

Already there is a mechanism of departmental inquiry, which settles the issue of


overstaying leave for non gazetted officers within 3-6 months. But when it comes to
Gazetted officer, there is a delay in settling the issue and reason is:-
1. The involvement of other institutions like central vigilance commission, department of
personnel and training, CVC for legal opinion results in delay.
2. Busy schedule of inquiring authority, defence assistant , officer on which charges are
framed, and presenting office who presents the case of the charged officer.
3. Delay in giving documents to the charged officials, which he demands to put in his
defence.

Looking at this , the Home ministry has asked to set up a Security force court manned by a
retired officer as inquiring authority. This will be purely a judicial process while
department Inquiry is a quasi judicial.

SPECIAL FORCES IN INDIA

National Security Guard


1. The National Security Guards is a special forces unit under the Ministry of Home
affairs.
2. It is established to counter the surge of militancy in the country.
Telegram ID:- Saurabh Polity
3. It has a highly trained force which deals with exceptional situations when local police
and special forces need assistance.
4. It was raised to combat terrorist activities and to guarantee the states do not
experience any internal disturbances.

Special Protection Group


1. The Special Protection Group is the most elite, nodal protection agency in the
country.
2. It is an armed force of the Union for providing immediate security to the Prime
Minister of India, the former Prime Minister and members of their close family
members.
3. The Special Protection Group (SPG) under the Cabinet Secretariat commences under
Special Protection Group Act, 1988.

Special Frontier Force (SFF)


The mountain and jungle warfare unit, trained in guerilla warfare, is a part of the Para
Military Force and is under the supervision of the Research and Analysis Wing (RAW) ?
India's external intelligence agency. It was originally set up in 1962 to conduct operations
along the Indo-China border, but has been used in the 1971 Bangladesh Liberation War and
in combating communal riots in the '70s

Para Commandos
They are a part of the Indian Army's Parachute Regiment, the first special operations unit of
the Indian Army created in 1966. They played a key role in Operation Pawan during the Sri
Lankan civil war in the Eighties and in the Kargil War against Pakistan in 1999.

MARCOS
Set up by the Indian Navy in 1987 for special reconnaissance and anti-terrorism warfare, the
Marine Commandos specialise in maritime operations and have fought with other special
forces in a series of operations including 1988's Operation Pawan and Operation Cactus and
in the 2008 Mumbai terror attacks.

Garud Commando Force


The Indian Air Force's counter-terrorism unit was set up in 2004 mainly to protect air force
installations across the country from terrorist attacks. However, some advanced Garud units
undergo additional training for conducting search and rescue operations and combat
warfare behind enemy lines.

Telegram ID:- Saurabh Polity


Miscelleneous
Concept of Human Security
● The human security approach was introduced in the 1994 global Human
Development Report. The 1994 HDR highlighted two major components of human
security: ‘freedom from fear’ and ‘freedom from want’. These freedoms, from the
preamble to the Universal Declaration of Human Rights.
● Central to the approach is the idea that people have ‘the right to live in freedom and
dignity, free from poverty and despair with an equal opportunity to enjoy all their
rights and fully develop their human potential.
● Components of Human Security:-

Additional Information:-
Human Development and Human Security: How Do They Differ? Human development and
human security are interlinked but are by no means identical. Human development is a
broad concept, aiming at enlarging people’s choices and freedoms. Human security is about
ensuring priority freedoms so that ‘people can exercise choices safely and freely’

THANKING YOU……...BEST OF LUCK

Telegram ID:- Saurabh Polity

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy