Internal Security 2021 by Saurabh Kumar (SRIAS)
Internal Security 2021 by Saurabh Kumar (SRIAS)
Mains 2021
Syllabus:-
● Linkages between development and spread of extremism.
● Role of external state and non-state actors in creating challenges to
internal security.
● Challenges to internal security through communication networks, role
of media and social networking sites in internal security challenges,
basics of cyber security; money-laundering and its prevention.
● Security challenges and their management in border areas; linkages of
organized crime with terrorism.
● Various Security forces and agencies and their mandate.
Basic Terms
Extremism:- It is a perception of US versus THEM ,intensified by conviction that success of
“US” is inseparable from hostile acts against “THEM”. The ‘Counter terrorism strategy 2015’
defines it as” Extremism is the vocal or active opposition to our fundamental values-Rule of
Law, Democracy, Liberty, and Tolerance for different beliefs.
Insurgency:- “Indian Sub conventional doctrine” defines insurgency as ‘Organised armed
struggle by section of population against the States, usually with foreign support.
Militancy:- It is a condition which experiences use of violence aimed at pressurizing the
government to concede the demand of the leader.
Terrorism:- As per Unlawful Activities Prevention Act 2012,any act that threaten the unity,
Integrity, security or sovereignty of India. The current UK definition of Terrorism is given by
Terrorism Act 2006:-
a. Violent action that endangers a person's life.
b. Violent action that causes damage to property.
c. It creates serious risk to public health and safety.
Slogan of Charu Majumdar :- China’s Chairman is our Chairman. The Chinese path is our
path”.
Second Phase (1975-2003):- With the lifting of the emergency, leaders were released from
the jail. There emerged four main factions:- MCC, PWG, Party Unity and CPI(ML). The
strategy of ‘protracted war’ was updated.They were operating in different rural areas of
India, For Example:-
(a) MCC in Bihar and Jharkhand.
(b) PWG in Telangana
(c) CPI(ML) (Liberation) became active in Politics
➔ One of the important features of the period was the caste warfare in Bihar between
the lower caste Dalits supported by MCC against upper caste armies like Ranvir Sena.
Third Phase (2004-2013) :- The third phase of movement started with the merger of
PU,PWG, and MCC in 2004 to form a unified CPI-Maoist which has a Common Command
structure. This resulted in an upward trend in the pattern of death/incident. Ex:- Dantewada
in 2010 and Sukma in 2013 has brought Naxalim in International headlines.
Fourth Phase (2013-Today) :- The level of violence and overall incident related to Maoist
insurgency has been declining. There are two possible reasons for this recent decline:-
(a) The Counter insurgency efforts by the Central and State government like Integrated
Action Plan, Mobile tower, Road Building Project.
(b) The Maoist central leadership realized that the expansionist strategy after the merger in
2004 can’t be sustained. Thus, they decided to change the strategy of ‘tactical retreat’ to
stop the arrest and killing of top leaders.
Fifth Phase (Urban Terrorism) (Part of Fourth Phase) :- The strategies and tactics of Indian
revolution in 2004’ and Urban Perspective :-‘Our works in Urban areas in 2007’spelled out
strategies and those tactics to spread into urban areas for underground and overground
support for armed movement.
URBAN NAXALS:-
Case Study:-
Rise of Pathalgada movement in Jharkhand and Maharashtra.‘Pathalgadi’ literally means
carving a stone.The government in Jharkhand introduced amendments to the Chotanagpur
Tenancy Act (CNT) 1908 and the Santhal Pargana Tenancy (SPT) Act 1949. According to the
new amendments, governments could procure land from tribals for commercial use,
without the permission of the gram sabha in Violation of PESA.
Then what the government did, changed the name of the force and now knows as
"District reserve guard"with the same surrender Maoist.
· S- Smart Leadership
· Aggressive Strategy
· Actionable Intelligence
· N- No access to Financing
What are the challenges faced by the Government to check Naxalism even after such
elaborate plans?
Ans:-
1. Financial Support to Naxalism:- (Important for Exam, so covering Holistically)
A document titled “Our Financial Policy” adopted by the CPI-Maoists at the 9th
Unity Congress in 2007, the sources of funding come from membership fees and
contributions, extortion and confiscation of wealth and income of the enemy and
‘revolutionary taxes’.
New Areas to generate Finance:-
Organised Crime:- In 2018, Indian police seized an amount of crude heroin
equivalent to 700 million Rupees from Naxal areas. It is suspected that Naxali has
contact with Drug traffickers of Afghanistan and Pakistan Border.
Illegal opium cultivation:- Jharkhand is one of the Indian states heavily affected by
the Maoist insurgency and the Maoists have been using opium cultivation as a source
of revenue since 2007. Moreover, Maoists have been known to entail villagers in
opium production by providing them with seeds, start-up money and a reward of
10,000 Indian Rupees per kilogram of opium.
Naxalites are also profiting from harvesting and trafficking cannabis from Orissa,
parts of which are under Maoist control, to other parts of the country and the region.
Conclusion :- In maoist Operation, neither the army nor the CRPF should play the leading
role. The state police officers should be supported by CRPF in operation as state police
have well connected intelligent networks in the areas. Army deployment may be
considered as an instrument of last resort, when all else has failed. The reality is, all else
has not even been tried.
Eligibility Criteria:
Telegram ID:- Saurabh Polity
● These guidelines are applicable to those naxalites who surrender with or without
arms.
● The eligibility of such naxalites for assistance under the scheme would be scrutinized
by the Screening cum Rehabilitation Committee constituted by the concerned State
Government.
Benefits:-
● Persons eligible under the scheme may be imparted training in a trade/vocation of
their liking or befitting their aptitude. They shall be paid a monthly stipend of Rs
2000/- each for a maximum period of 36 months. However, if the surrenderee
secures any employment in Government or any gainful self-employment, the
monthly stipend will be discontinued.
● An immediate grant of Rs. 1.5 lakh shall be kept in a bank in the name of surrenderee
as a fixed deposit which may be withdrawn by the surrenderee after completion of 3
years, subject to good behaviour to be certified by the authorities designated for this
purpose by the concerned States.
CASE STUDY
In chattisgarh, The benefits that a surrendered Maoist is eligible for in Chhattisgarh are
₹ ₹
significant: 5 lakh for a high ranking Maoist (category 1), and 2.5 lakh for middle and
₹
lower cadre Maoists (category 2A and 2B respectively); a monthly stipend of 6,000 for a
maximum period of 36 months; additional incentives for recovered weapons; and study and
house-building grants. Only 3% of Maoists that surrendered in Chhattisgarh in the past three
years, have been passed by the Screening committee to be eligible for benefits under policy.
Role of external state and non-state actors in creating challenges to internal security.
KASHMIR ISSUE:-
Why is Kashmir boiling?
Ans:-
External Reason:-
1. The year 2013 started with the beheading of an Indian soldier by terrorists and
attacks on army patrols along the Line of Control (LoC) escalated sharply.
2. Just after India’s changing position on Article 370. In February 2019, an attack on the
convoy of Indian paramilitary forces in Indian-controlled Kashmir killed at least forty
soldiers.
Internal Reason:-
1. Social Media:- It was not only being used to mobilise the crowds for protests but also
to show the government and the security forces in very poor light through
sophisticated campaigns run on popular sites such as Facebook and Twitter.
Suggestion:-
★ Border Management:- BSF in the International boundary sector should be placed
under command of the army.
★ Development:- There are many non-controversial areas, such as tourism, roads and
education, which affect all three regions (Jammu, Kashmir and Ladakh) of the state
equally. These could be the focus areas for development.
★ Surrender and Rehabilitation Policy:-The success of any policy is not dependent on
the financial incentives for surrender but the successful rehabilitation into the
society. This is where the current policy is silent.
★ Employment Generation:- Udaan is an initiative by the Ministry of Home Affairs
(MHA) to provide skills and job opportunities to the youth. However, the scheme has
CONCEPT:-
The term Counter Radicalisation, De radicalisation and Anti Radicalisation is used
interchangeably,but they have different meaning:-
Counter Radicalisation:- Campaigns are launched in communities/societies that have
already contracted the virus of radicalisation and violent extremism.
De Radicalisation:- Treat violent extremists during their period of imprisonment or
incarceration, so that they do not practise or propagate ideas of violent extremism once
their jail term ends.
Best Model:- Saudi Arabia started its de-radicalization programme in 2004 focusing on
religious re-education and psychological counseling of terror suspects and convicts to
educate, monitor and reintegrate radical elements into society.
❖ Traditionally, China has provided financial aid, arms and sanctuaries to Naga, Mizo
and Meitei extremist’s right since the British Era.
❖ The Nagas were the first to approach Beijing, but China made best use of it. Other
groups like MNF, ULFA, PLA, ATTF and NDFB followed.
❖ The Maoist movement got ideological, moral, financial and intellectual backing from
China.
❖ According to a report by Munk Center for International Studies, University of
Toronto, more than 35 sensitive computers belonging to the Indian NSCS, Air Force,
the Army’s Military Intelligence and Indian missions in Kabul and Moscow were
accessed by a Chinese cyber network after they got infected by ‘GhostNet.
8. China is expanding the size of its nuclear arsenal by building more missile silos.
However the scope and size of the nuclear arsenal is not known exactly. According to
United Nations strategic command, China has nearly 200 nuclear warheads, might be
trying to o match USA 3800 warheads or also might be trying to showcase these 200
only to the world by making statements of increased nuclear head and not planning
for anymore. However, the report of having developed a site with 120 nuclear silos in
Gansu province is correct.
Why is China doing this?
Ans:-
● To deter the enemy's first strike.
● To match the USA nuclear arsenal.
● Missile Silos in Xinjiang and Gansu province are capable of carrying multiple
warheads.
Impact on India:-
● Intermediate range ballistic missiles are deployed in regions close to sion india
border.
● China is not entering into a tripartite agreement with USA and Russia, thus planning
for more nuclear arsenal.
● Impact on boundary dispute.
Arunachal Pradesh:- The State has remained peaceful after the cease-fire with NSCN which
was active in Tirap District. The recent clashes have been observed after the Citizenship
amendment act when Chakmas refugees were allowed to settle there.
Assam:-
1. Agitations against ‘influx of foreigners’:- Bengalis VS Assamese & Assamese VS
Bangladeshi Immigrants.
2. Escalating conflicts involving tribal communities who seek local autonomy.:- Ex:-
Bodoland Territorial Region
BODO Issue:-
Bodos are the single largest community among the notified Scheduled Tribes in Assam.
Bodos are a part of Bodo-Kachari and constitute about 5-6% of Assam’s population.
Background:-
ULFA:-The ULFA chief asked to mediate for peace talks with the central government. Already
the group has signed a ceasefire in may, which is again extended by next 3 months.
➔ The United Liberation Front of Asom (ULFA) is a militant outfit operating in Assam. It
seeks to establish an independent state of socialist Assam with an armed struggle.
➔ It was founded in 1979 by PareshBaruah. The organisation established ties with the
Nationalist Socialist Council of Nagaland in 1983, with the Burma based Kachin
Independence Army in 1987 and began its own operations in 1990.
Meghalaya:-
❖ Increasing clash of interest between the State Government and the Sixth Schedule
District Councils – the entire State is under that Schedule.
❖ Increasing inter-tribal rivalry.
❖ Emerging tensions about infiltration from Bangladesh particularly in the Garo Hills.
❖ Though Meghalaya has been the most peaceful state in North east, the recent death
of the leader of Hynniewtrep National Liberation Council (HNLC) by Police has
sparked stone pelting, vandalism.
Background
Mizoram:- Following an ‘accord’ between the Union Government and the Mizo National
Front in 1986 and conferment of statehood the next year, complete peace and harmony
prevails in Mizoram.
Nagaland:-
Challenges:-
Telegram ID:- Saurabh Polity
❏ NSCN (IM) is demanding a Separate Constitution and Flag for Nagas.
❏ Tangkul Community (Part of NSCN) will not accept any agreement that excludes areas
inhabited by them.
❏ There is a continuing confusion in Assam and Arunachal Pradesh over the ceding of
territory for Greater Nagalim.
Criticism of AFSPA:-
❏ The act fails to protect and uphold human rights; this can be witnessed in the case of
alleged custodial rape and killings of the Thangjam Manorama by the Assam rifles in
2004.
❏ The power of arbitrary arrest and detention given to the armed forces goes against
the fundamental right vested in Article 22.
❏ The greatest outrage against AFSPA is due to the immunity given to the armed
forces.This immunity which protects guards and also facilitates the armed forces to
take unwarranted decisions at times is clearly questionable.
SC Observation on AFSPA:-
Naga People Movement of Human Rights VS UOI:- Act cannot be considered as violative of
the Constitution and the powers conferred under the section 4 and 5 of the Act are not
arbitrary and unreasonable and therefore not in violation of the provisions of the
Constitution.
Guidelines given in this case:-
● A person arrested and taken to custody under section 4 has to be handed over to the
nearest police station within 24hours of such arrest.
● The act has to be reviewed every six months by the state.
● Not every armed person violating the prohibitory order in a disturbed area is an
enemy. Even though he is considered as an enemy a thorough investigation has to be
conducted, since every citizen of India is entitled to all the fundamental rights
including Article 21 of the constitution.
Conclusion:- It is high time that sincere and concerted efforts are made continuously by the
four stakeholders — civil society, the Armed Forces, the States and the Government of India
to find a lasting and peaceful solution to the problem.
Suggestion:-
Political:-
1. A system of work permits should be issued so that the illegal Bangladeshi migrants
do not end up as Indian citizens.
2. The Autonomous District Councils should be empowered.
Development:-
1. Pragmatic land use policy should be formulated for attracting industries in the
region. Micro, small and medium enterprises should be encouraged.
2. Local tourism should be promoted:- Niche tourism or high end tourism should be
encouraged. Medical and higher education tourism should be encouraged
Border Issues:-
1. The dual responsibility of Assam Rifles to enforce AFSPA and Border management
should be put to an end.
How is the Insurgency in the North East different from the situation in Kashmir?
Ans:-
Reasons:- The insurgency in Kashmir is different primarily because it arises from differing
perceptions with Pakistan and the people of Kashmir valley on the accession of the State of
There is no proper and agreed definition of Terrorism. But US Department of State says
"premeditated, politically motivated violence perpetrated against noncombatant targets by
subnational groups or clandestine agents"can be defined as terrorism.
Types of Terrorism:-
According to the National Advisory Committee on Criminal Justice Standards and Goals(US):-
1. Political terrorism:- is used by one political faction to intimidate another. Ex- RWE &
LWE
2. Non political terrorism:- is a terrorist act perpetrated by a group for any other
purpose, most often of a religious nature.
3. Quasi terrorism:- is a violent act that utilizes the same methods terrorists employ,
but does not have the same motivating factors. Cases like this usually involve an
armed criminal who is trying to escape from law enforcement utilizing civilians as
hostages to help them escape.
4. State terrorism:- defines any violent action initiated by an existing government to
achieve a particular goal.
Causes of Terrorism:-
❖ Ethno Nationalism:- The desire of a group of persons in the society to separate from
the existing government and formation of a new nation can cause the creation of
terrorist organisations. Example:- Hamas attacking against Israel, Chechen Terrorist
attacking against Russia, North East State-NSCN(IM),NSCN(K)
❖ Terrorism due to Alienation or Discrimination:- Due to these sentiments of
discrimination and isolation, these groups become more conservative and start
terrorist attack against original citizen and government. Example:- 9/11 Terrorist
Effect of Terrorism:-
➔ Psychological Impact:- Environment of Fear and terror disturbs the peace of mind.
➔ Economic Impact:- The terrorism effect’s economy in two ways- Destruction caused
by act of terrorism and its indirect costs. Indirect impact is declining FDI investment,
Service sector. Example- J and K Terrorism affect tourism. The structural damage post
26/11 attack was amounting to Rs 500 cr which burdened the Insurance Industry.
➔ Social Impact:- The threat of terrorism increases the stereotypes, leading to more
negative stereotyping by members of targeted society. Example:- Anti Arab
sentiments in Spain in the wake of 2004 Madrid train bombing.
➔ Political Impact:- The “Rally around Flag Syndrome” leads to silent public criticism of
the government and its policies.
➔ Financial Impact:- The financial market has been directly and indirectly the victims of
terrorist attacks. Example-After 26/11 attack financial capital of India incurred a
loss of 4000 cr approximately.
1. The Government is planning to ban moderate and extremist factions of All India
Hurriyat conference under UAPA.
2. Govt has already removed people having seperatist tendencies from govt jobs.
3. Deny the passport to stone throwers.
4. Seats allocated to Hurriyat leaders in colleges are being sold to channelise the funds
into terrorsim, and the Govt is planning to crack this also.
5. There is also a report of allotment of seats in medical and engineering colleges of
pakistan for kashmiri students, in order to prepare a generation of doctors and
technocrats in kashmir who will have leanings to pakistan.
Who is JeM?
Ans:-Jaish-e-Mohammad literally means the Army of Mohammad.Pakistan-based Muslim
cleric Masood Azhar founded the group after he was released by India in 1999. He was one
of three men set free in exchange for the crew and passengers of an Indian Airlines plane
hijacked and flown to Taliban-ruled Afghanistan.
Important points:-
● Most of the JEM’s cadre and material resources have been drawn from the militant
groups Harakat ul-Jihad-i-Islami and the Harakat ul-Mujahidin. The JEM had close ties
to Afghan Arabs and the Taliban.
● Collects funds through donation requests in magazines & pamphlets.
● Objective of the JeM is to liberate Kashmir and merge it with Pakistan.
Marry for jihad, give birth for jihad and earn money only for jihad till the cruelty of
America and India ends.
The National Investigation Agency has launched a continuous raids against The
Resistance Front (TRF) and overground workers (OGWs) of Pakistan backed terror outfits
Jaish-e-Mohammad, Lashkar-e-Taiba (LeT), Al Badr, Hizbul Mujahideen .
Their main responsibilities also include making false accusations of sacrilege, molestation,
and beatings of young and old civilians by security personnel, as well as disseminating the
militant commanders’ “virtues" and “righteousness."
If militants are seen as fish, OGWs are the water that ensures their survival.
TRF in many ways is different from the other well-known terrorist organisations that operate
in Kashmir like Lashkar-e-Taiba, Jaish-e-Mohammed, and Hizbul Mujahideen.
How is it different?
● Firstly, the name itself. While the names of the other three above mentioned terror
groups translate to Army of the Pure, Army of Mohammed, and the Party of Holy
Fighters respectively, the TRF's title is distinct because it makes absolutely no
reference to Islam or Jihad.
● Another distinguishing feature of TRF is maintaining strict secrecy about the identity
of its members.Unlike Hizbul Mujahideen's Burhan Wani, whose identity and face
was extensively used to build support for the group, TRF neither reveals the faces of
its militants, nor the existing chain of command.
● TRF is perhaps the only group which gives an explanation behind every killing,
irrespective of (whether there is) any semblance of truth in it or not.
● India recognises that terrorism are political issues and therefore solution should be
political. As Mr PM has also remarked in the G-20 meeting in Goa.
● Use of Minimum Force but it is changing as seen in Surgical strike.
● At UN High level Conference on heads of counter terrorism agencies, India has
spelled its Five Point formula to tackle terrorism.
➔ Exchange of timely and actionable intelligence
➔ Prevention of misuse and modern communication through collaboration with
the private sector.
➔ Improved Border management.
➔ Designation of counter terror focal point.
➔ Sharing of Information related to movement of passengers.
Negative Trends:-
1. Increased spread of disinformation, conspiracy theories and propaganda:- By
spreading disinformation, conspiracy theories and propaganda about the virus
through online and offline settings, violent extremist movements and terrorist
groups aim at sowing mistrust in authorities.
2. Increased recruitment online:- Young people remain particularly vulnerable as they
are likely to spend more time online due to closed schools, shut down of leisure
activities and lost employment opportunities.
3. Backfire of preventive COVID-19:- The UNDP report ‘Journey to Extremism’ has
found that law enforcement approaches lacking respect for fundamental rights may
provoke tension and could facilitate violent extremist recruitment from
disenfranchised populations.
Again the second thing is they ( Devangana and Natasha) are in jail for many months:-
In Union of India v. K A Najeeb (2021) the Supreme Court examined Section 43D (5) of
UAPA to hold that constitutional courts can grant bail to terror suspects, when their right
to a speedy trial is violated
Institutional Steps:-
● Recently Counter terrorism and counter radicalisation division has been set up in
Home ministry.
● Intelligence Agencies:- IB, RAW, NTRO Etc.
● National Counter Terrorism Centre (NCTC). (Just Proposed after 2008 Attack)
NCTC in Detail:-
What is NCTC?
Ans:- It is a single and effective point of control and coordination of all counter terrorism
measures like:-
● Conduct searches and arrests in any part of India.
● Maintain Database on Terrorism.
Technological Steps:-
NATGRID:- It is a counter terrorism measure that collects and collates a host of information
from government databases including tax and bank account details, credit card transactions,
visa and immigration records and itineraries of rail and air travel. This combined data will be
made available to 11 central agencies.
Crime and Criminal Tracking Network & Systems :- It aims at establishing seamless
connectivity among 15,000 police stations.
Relationship between Organised Crime and Terrorism:- You can use any
diagram mentioned below:-
SUGGESTION:-
DRUG DEALING:-
● India is geographically situated between the countries of Golden Triangle and Golden
Crescent and is a transit point for narcotic drugs produced in these regions to the
West.
● Illicit drug trade in India centres around five major substances, namely, heroin,
hashish, opium, cannabis and methaqualone. Seizures of cocaine, amphetamine, and
LSD are not unknown but are insignificant and rare.
Narco-Terrosrism and Kashmir:- Pakistan has started to fund terror organisations by pushing
narcotics and drug money into J&K and Punjab. The Afghan variety of drug is being pumped
into Kashmir, via Pakistan, which is further pushed into Punjab via Jammu. Army intelligence
sources are also said to have established strong links between Kashmiri terrorists and drug
trafficking in Punjab. The recent terror attack in Amritsar and the reported presence of Zakir
Musa in the holy city is believed to be part of the same chain.
Drug Routes:-
Nepal Border:- The prominent routes through which drugs are smuggled across the
border are:
1. Birgunj - Raxaul - Motihari - Patna;
2. Nepalganj - Rupaidiha – Bahraich - Barabanki - Lucknow
Telegram ID:- Saurabh Polity
3. Bhairahawa -Nautanwa - Gorakhpur.
Pakistan Border:- Enters India through Sunderbani and Rajouri and reaches Jammu by
the Poonch-Jammu highway. From there the route taken to traffick the consignments is
Pathankot-Gurdaspur-Amritsar-Faridkot.
Myanmar Border:- The most important route is the one which starts from Mandalay,
continues to Monya and Kalewa and then bifurcates to enter India at two points. The first
moves northwards, enters Moreh in Manipur through Tamu and travels then to Imphal and
Kohima via National Highway-39. The second branch moves southwards and enters Champai
in Mizoram through Rakhwaldar.
Executive Action:-
● The Centre has identified 272 districts as those hugely affected by drug abuse and it
is readying to roll out a Rs 336 crore national action plan this year for a ‘nasha mukt
Bharat’. Nasha Mukt Bharat – Main Components of the Action Plan 2020-21
❖ Awareness generation programs in University Campuses Higher Education
institutions, and schools.
❖ Building capacity for service providers.
❖ Focus on Treatment facilities in Hospital Settings.
❖ Identification of dependent population and community outreach.
Telegram ID:- Saurabh Polity
TRAFFICKING:- Human trafficking is the exploitation of the person through means of
force, fraud, coercion, or violence.
Suggestion:-
Recommendation by Observer Research Foundation:-
● Increasing the frequency of meetings of the Joint Task Force on India and
Bangladesh.
● Dissemination of the decisions of the meeting to all stakeholders.
● Formalising use of modern technology for speeding up the repatriation and
investigation.
● Establishment of a cross-border joint response team and arranging allocation of
finances for ensuring the smooth functioning of the team.
● The need for vulnerability mapping for identifying the major corridors
Supreme Court:-
● Organised crime is not restricted to a "particular state" and a trial court can take note
of charge sheets filed against offenders outside the State for invoking stringent
MCOCA.
Change in Procedural Law:-
● The police custody remand should be enhanced from 15 to 30 days in cases of grave
crime. Further, the police are mandated to file the charge sheet in 90 days from the
date of arrest of the accused. (United Nations Asia and Far East Institute for the
Prevention of Crime and the Treatment of Offenders)
Institutional Change:-
● It is suggested that each State/Metropolitan force should have an Organised Crime
Wing, the same at the State level as that of the apex body at the national level.
MONEY LAUNDERING
What is Money Laundering?
Ans:- Money laundering is the illegal process of making "dirty" money appear legitimate
instead of ill-gotten.
★ The United Nations Office on Drugs and Crime (UNODC) conducted and report
estimates that in 2015, criminal proceeds amounted to 4.6% of global GDP.
★ India was identified as a high risk zone for money Laundering by International Centre
for Asset Recovery in 2015.
Placement:- The placement makes the funds more liquid since by depositing cash into a
bank account can be transferred and manipulated easier.
Layering:- Layering is the process of separating the proceeds of criminal activity from their
origin through the use of many different techniques to layer the funds. These include using
multiple banks and accounts, having professionals act as intermediaries and transacting
through corporations and trusts, layers of complex financial transactions, such as converting
cash into traveler’s checks, money orders, wire transfers, letters of credit, stocks, bonds, or
purchasing valuable assets, such as art or jewelry.
Global Level:-
Telegram ID:- Saurabh Polity
1. Financial Action Task Force Strategy includes:-
● The criminalization of the laundering of the proceeds derived from all serious
crime.
● The forfeiture of property connected with a laundering offense or its
corresponding value.
● The establishment of customer identification and record keeping rule.
● The creation of financial intelligence units.
2. International Monetary Fund:-
● IMF provides substantial technical assistance to member countries on
strengthening their legal, regulatory, institutional and financial supervisory
frameworks for AML/CFT.
● Each evaluation of financial sector strengths and weaknesses conducted
under the Financial Sector Assessment Program of IMF.
3. Basel Committee:-
● Know Your Customer (KYC) - This mandates the bank to make reasonable
efforts to determine their customer’s true identity, and have effective
procedures for verifying the bonafides of a new customer.
4. Financial Crimes Enforcement Network (FinCEN):-It is a bureau of the United States
Department of the Treasury that collects and analyzes information about financial
transactions in order to combat domestic and international money laundering,
terrorist financing, and other financial crime.
5. The Vienna Convention:- It creates an obligation for signatory states to criminalize
the laundering of money from drug trafficking.
National Level:-
Legislative Framework:-
1. Prevention of Money Laundering Act, 2002:- The PMLA seeks to combat money
laundering in India and has three main objectives:-
➔ To prevent and control money laundering.
➔ To confiscate and seize the property obtained from the laundered money.
➔ To deal with any other issue connected with money laundering in India
Recent Amendment:-
● It deletes the provisos in sub-sections (1) of Section 17 (Search and Seizure) and
Section 18 (Search of Persons), thus doing away with the prerequisite of an FIR or
chargesheet by other agencies that are authorised to probe the offences listed in the
PMLA schedule.
● The scope of “proceeds of crime”, under Section 2, has been expanded to empower
the agency to act against even those properties which “may directly or indirectly be
Telegram ID:- Saurabh Polity
derived or obtained as a result of any criminal activity relatable to the scheduled
offence”.
● All PMLA offences will be cognisable and non-bailable. It implies that ED officers are
empowered to arrest an accused without warrant.
International Collaboration:-
● The Financial Intelligence Unit:- India (FIU IND) is the nodal agency in India for
managing the AML ecosystem and has significantly helped in coordinating and
strengthening efforts of national and international intelligence,investigation and
enforcement agencies in pursuing the global efforts against money laundering and
related crimes.
● Base Erosion and Profit Sharing:- BEPS is of major significance for developing
countries due to their heavy reliance on corporate income tax, particularly from
multinational enterprises.
Technological Aspect:-
● India has acceded to Society for Worldwide Interbank Financial Telecommunication
(SWIFT) which assigns each financial organisation a unique code that has either 8 or
11 characters.
Suggestion:-
● SIT has recommended that SEBI needs to have an effective monitoring mechanism to
study the unusual risk in stock prices of companies when such an increase takes
place.
● Special attention is required for the education sector, religious institutions and
charitable organizations.
● Devise a clear anti-Money Laundering Policy and anti money Laundering officer (EU).
● Use of Technology (AI):-
Telegram ID:- Saurabh Polity
1. Intelligent segmentation:- AI analysed transactions, observed patterns, and
created new and more relevant segments, placing customers in them based
on their behaviour.
2. Predictive modeling:- The advancement in statistical modelling tools is
helping banks proactively identify problem areas. The clustering techniques
bring the capability to easily modulate multidimensional data.
Rohingya as a threat:-
● Terrorism:- Recent arrest of hard core mujahideen, Samiun Rehman a British
national and a henchman of Al- Qaeda and Al-Noora commanders from
Vikaspuri-Delhi is an eye opener for everyone. His mission was to establish bases in
Delhi, Manipur, Mizoram for radicalization of Rohingyas and to wage a war against
Indian security forces and Myanmar army.
● Organised Crime:- Rohingyas have been found to indulge in crime, trafficking and
there are a number of FIRs lodged against them in certain police stations.There is a
possible links between Arakan Rohingya Salvation Army (ARSA) with terror
organisations and expressed grave concerns about their presence in Bangladesh.
6. Bhutan:- Many groups such as Bodo, ULFA etc. sneak into Bhutan for sanctuary
despite their army driving them out, Smuggling of goods such as Bhutanese cannabis,
China:- Creating Infrastructure + Army infrastructure projects within 100Km of LAC have
been exempted from forest clearance.
Bangladesh:- Border Protection Grid + A Crime free stretch has been established
between the BSF border posts at Gunarmath and Kalyani +Installation of Border
surveillance devices such as closed-circuit cameras, searchlights, thermal imaging devices.
Bhutan:- The Union environment ministry has given a “general approval” for the
diversion of forest land for major border infrastructure projects within a 16-km aerial
distance of the border with Bhutan
Application of Technology:-
Comprehensive Integrated Border Management System (CIBMS):-
The CIBMS is touted as a more robust and integrated system that is capable of addressing
the gaps in the present system of border security by seamlessly integrating human
resources, weapons, and high-tech surveillance equipment. It has three main components:
a) New high-tech surveillance devices such as sensors, detectors, cameras, ground-based
radar systems, micro-aerostats, lasers.
b) An efficient and dedicated communication network including fibre optic cables and
satellite communication
c) A command and control centre to which the data will be transmitted in order to apprise
the senior commanders about the happenings on the ground and thus providing a
composite picture of the international border.
What to do?
Ans:- Madhukar Gupta Committee:-
Indo-Bangladesh:- Fencing projects should be prioritised and, if fencing in such areas is
not feasible, then the Ministry must increase the deployment of forces and intensify
round-the-clock surveillance.
India-Pakistan:- A joint venture through public-private partnership between the
Government and a private company.
India-China:- The Committee also recommends that the proposal of construction of more
helipads in forward locations may be approved without any delay.
India-Nepal:- Frame a Standard Operating Procedure to be followed by both the Ministries
(MHA & MoEFCCC) in all such cases where transfer of forest land is required for border
infrastructure projects.
MILITARY MODERNISATION
What is meant by Military Modernisation?
Ans:-
● The first is modernisation of the three services and the joint staff, which includes
acquisition of new platforms, weapons systems.
● The second includes land acquisition and capital works for the services and capital
expenditure (both plant and machinery and capital works) of the Defence Research
and Development Organisation (DRDO) and Ordnance Factories.
● The third includes improvement in procedures of Procurement.
Concerns/ Challenges :-
● Budgetary Allocation:- According to CLAWS, at least 2.5% allocation should be
for the defence excluding Pension. And at least 40 % of the expenditure should be for
Capital goods and only 15 % expenditure has been done on this last year.
● Professional Military Education:- Sun Tzu said, if you know the enemy and
yourself, you don't need to fear a hundred battles, but if you know neither the
enemy nor yourself, you will succumb in every battle.
1. In india, most of the instructors have field experience of 2-3 years thereafter,
they move to Military institute, this lacks expertise.
2. We can't rely on guest lectures.
1. France where the theorist and practitioner from different fields are training the
junior military officers for example test flying theory and practice.
2. The US Air Force has its air University with a faculty of civilian academic who have
Suggestion:-
● Defence service staff College should have experts having knowledge of military
history, strategy, geopolitics etc.
● On the lines of vision for IIT, IIM, the government has laid down "Indian national
defence University", but it is in the pipeline.
● Mandate of CDS:-
1. There are communication issues, budgetary overruns by individual commands, now
will be under control after CDS.
2. CDS will ensure and promote the jointness (functioning together of the three
services independently) through joint planning of command operations, logistics,
transport, training, communications, repairs and maintenance of the three services
within three years of operation.
Policy Reform
4. Offsets:- A major policy change wherein offsets would now be applicable for those
cases only where indicative cost of procurement is Rs 2000 crores or more as against
Rs 300 crores till now.
OFFSETS IN DETAIL:-
What are defence offsets?
Ans:- The offset is an obligation by an international player to boost India’s domestic
defence industry if India is buying defence equipment from it.
Why Defence offsets?
Ans:- CAG has clarified the objectives of Offset Policy:- To leverage capital
acquisitions to develop Indian defence industry by
(i) fostering development of internationally competitive enterprises
(ii) augmenting capacity for Research, Design and Development related to defence
products and services
(iii) encouraging development of synergistic sectors like civil aerospace, and internal
security.
★ Direct purchase,or executing export orders for, eligible products manufactured by, or
services provided by Indian enterprises.
★ Foreign Direct Investment in joint ventures with Indian enterprises (equity
investment) for eligible products and services.
★ Investment in ‘kind’ in terms of transfer of technology (TOT) to Indian enterprises,
through joint ventures or through the non-equity route for eligible products and
services.
Telegram ID:- Saurabh Polity
★ Investment in ‘kind’ in Indian enterprises in terms of provision of equipment through
the non-equity route for manufacture and/or maintenance of products and services.
★ Technology acquisition by DRDO in areas of high technology.
Issue with Offset Policy:-
▶The exemption of single vendor cases covered by the intergovernmental agreements and
Foreign Military Sales programme,will shrink the offset-related business opportunities
available to the Indian defence companies.
▶Any differences or disputes with vendors will be settled through discussion and, if not
resolved, will be referred to the Independent Monitors (IMs) for advice with the approval of
the Secretary (Defence Production).This is not in line with arbitration clause of the main
contract which is also applicable to the offset contracts.
▶The offset guideline lacks clear guidelines or criteria for signifying who will be Indian offset
partners.
Case Study:-
CAG has observed Dassault , the French manufacturer of Rafale, has not fulfilled its offset
commitment to transfer technology to India as part of the 2016 contract for 36 combat jets.
Government Clarification:- We have made a change in policy that from now onwards, there
would be no offset clause in government-to-government, inter-government and single
vendor defence agreement.
The government is reportedly planning to reorganize the military into a theatre command
under the chief of defence staff (CDS) in which the assets of the Air Force will be split into
four and distributed among four operational theatres.
ISSUES:-
1. When everything will be under CDS, the Chief of staff committee (CSC) will be of
no use or you can say its use will be limited to training, maintenance, and support,
which is nothing but a gross misutilisation of CSC.
2. As per Naresh Chandra Committee, The CDS was to exercise operational control
only of the Strategic Force Command and the Andaman Nicobar Command. But
now CDS is being overpowered and indirectly the Army will be more powerful than
IAF.
3. Then , One should not expect the current level of efficiency to be maintained if the
combat inventory of the Air Force is split into smaller units in 4 different theaters.
The idea should be to reduce the responsibilities of the chiefs of staff by introducing the
CDS who were to take only non-operational responsibilities.
The second argument is: While it has been decided to consolidate the operational assets
of the Navy under Maritime Theatre Command, then why the Air Force should be
parcelled into smaller units.
Challenges to internal security through communication networks, role of media and social
networking sites in internal security challenges, basics of cyber security; money-laundering
and its prevention.
BASIC CONCEPT
What are the methods used for Communication by Non State actors?
Ans:-
1. Dead Drops:- A message is prepared in draft but not sent. The intended receiver is
then separately given the sender's login details so they can view the draft message
and if necessary reply.
2. Steganography:- A message within the message. Ex:- JPEG OR GIFS
3. Email and SMS text message:- Terrorists have tended to communicate in code or use
metaphors when discussing targets, knowing they may well be intercepted. For
example, 9/11 planners referred to the World Trade Centre as "architecture", the
Pentagon as "arts" and the White House as "politics".
4. Social media, chat rooms and gaming:- Some jihadi websites have even offered
video games in which users can pretend to be holy warriors killing U.S. soldiers.
5. Deep web, Deep web and Dark Net:-
Are Dark Web and Deep Web one and the same?
● Deep Web is the area of the Internet which is not accessible through search engines.
What can be accessed through search engines is called Surface Web.
● To get into the Deep Web one should know the right address.
● The Dark Web is part of the Deep Web. · While the Deep Web is accessible, the Dark
Web is deliberately hidden.
● While incognito mode disables browsing history and web cache, the Dark Web is
shielded by specialised software.
● Since the real word money trail carries the danger of exposure, Dark Web operators
transact in virtual currencies, the most popular being Bitcoins.
Terrorism:-
❖ The Internet is a powerful tool for terrorists, who use online message boards and
chat rooms to share information, coordinate attacks, spread propaganda, raise funds,
and recruit.
❖ Terrorist websites can serve as virtual training grounds, offering tutorials on building
bombs, firing surface-to-air missiles, shooting at U.S. soldiers.
❖ Terrorist sites also host messages and propaganda videos which help to raise morale
and further the expansion of recruitment and fundraising networks. Al-Qaeda’s
media arm, As-Sahab, is among the most visible.
❖ Revenge videos:- The video showed off a large group of Kalashnikov-wielding
jihadists, allegedly from India, fighting against the Syrian forces in the Homs province
and urging Indian Muslims to avenge the Babri Masjid Demolition and atrocities on
Muslims in Kashmir by joining the holy fight.
Case Study:-
In the 26/11 attack, the handlers of the terrorist used the media coverage to tell them the
exact locations of the policemen and advised them about the best way to attack the police.
Thus the thoughtless media coverage, in a way helped the terrorist.
Communalism:-
Telegram ID:- Saurabh Polity
❖ In September 2013,a morphed video on YouTube was used to fan communal riots in
Muzaffarnagar in Uttar Pradesh and led to mass panic.
❖ The social media and the SMS were blamed for rumour mongering during the Assam
unrest. They were alleged of misrepresentation of facts and doctoring news which
incited the opposing factions and led to huge migration of north easterners across
the country.
❖ Rioters in London Riots of 2011 used a smartphone app called Sukey to identify
physical location of police forces in real time and used Blackberry messenger to
coordinate attacks.
Naxalism:-
❖ The media engages in highlighting naxalism as warriors and Government as
oppressor is a serious threat to the Counter Insurgency Strategy.
Fake News:-
● Following the murder of a two-and-a-half-year-old in Aligarh in 2019, misinformation
related to the brutalities of the incident was viral on the social media. Such
misinformation results in chaos and anarchy in society.
● Recent Balakot Strike resulted in fake news where the Pakistani side has used our old
Jodhpur fighter jet crash video as their video of shooting down an Indian fighter jet.
Such news results in unnecessary pressure on the government and fear amongst
citizens.
● Potential for Mob Lynching:- Palghar Incident where two saints were lynched on the
fake news pf being child kidnappers.
These collectively represent the Fake News Triangle: without any one of these factors, it is
unable to spread and reach its target audience.
International users:-
Virtual Community:-
❖ Popular social networking websites are another means of attracting potential
members and followers. These types of virtual communities are growing increasingly
popular all over the world, especially among younger demographics. This can build
Anti-national Sentiments among Society.
Hate Speech:-
❖ There is a growing trend of trolling, threatening and systematic online and offline
abuse of activists, journalists and individuals. The victims are targeted due to a list of
reasons including religious beliefs, gender, sexual orientation, ideology.
❖ In Germany a correlation was found between anti-refugee Facebook posts by the
far-right Alternative for Germany party and attacks on refugees.
❖ In the United States, perpetrators of recent white supremacist attacks have circulated
among racist communities online, and also embraced social media to publicize their
acts.
❖ Sri Lanka has similarly seen vigilantism inspired by rumors spread online, targeting
the Tamil Muslim minority.
Deep fakes:-
Ans:- Deepfakes are digital media manipulated using Artificial Intelligence. Deep fakes are
also called Synthetic Data/ Media.
● The main ingredient in deep fakes is machine learning, which has made it possible to
produce deep fakes much faster at a lower cost.
● Generative Adversarial Networks (Deep learning Algorithm) will be the main engine
of deepfakes development in the future. GAN generated Videos are near-impossible
to tell from real faces.
Political Impact:-
➡Manipulation of Media narratives using deep fakes damages institutions, businesses and
democracy.
➡A deep fake of a leader relating to his remarks on caste,religion can result in Riots and
violence.
➡Leaders may weaponise deep fakes and use fake news and an alternative facts narrative to
replace an actual piece of media and truth.
➡A deep fake Political candidate can sabotage their image and reputation.
Solutions:-
● Media literacy for consumers and journalists is the most effective tool to combat
disinformation and deep fakes.
● Collaborative actions and collective techniques across legislative regulations,
technology intervention and platform policies.
● Easy to use and accessible technology solutions to detect deep fakes.
CASE STUDY:-
Two Programs called Reality defender & Diptrace, aim to keep deepfakes out of your life.
● Diptrace works on an API that will act like a hybrid antivirus/spam filter, prescreening
incoming media and diverting obvious manipulations to a quarantine zone, much like
how Gmail automatically diverts spam before it reaches your inbox.
Disinformation as a Threat
What is Disinformation?
Ans:- Disinformation is false or misleading information that is spread deliberately to deceive.
Disinformation is primarily carried out by government intelligence agencies, but has also
been used by non-governmental organizations and businesses.
Front Groups are a form of disinformation, as they mislead the public about their true
objectives and who their controllers are.Most recently, disinformation has been deliberately
spread through social media in the form of "fake news", disinformation masked as legitimate
news articles and meant to mislead readers or viewers.
Difference between the Disinformation and cyber security threats:-
1. Cyberattacks are aimed at computer infrastructure while disinformation exploits our
inherent cognitive biases and logical fallacies.
2. Cyber security attacks are executed using malware virus trojans, disinformation is
manipulated and misappropriated information.
3. Like phishing attacks compromise IT Systems, Disinformation campaigns play on
emotions.
Disinformation is basically cognitive hacking:- Cognitive hacking is a threat from
disinformation and computational propaganda. This attack exploits psychological
vulnerabilities and the best example is the attack on the US Capitol.
Flickr Software :- After 2011 London Riots,The Metropolitan Police (MET) and the Greater
Manchester Police (GMP) used Twitter extensively to support investigations and to seek
information on offenders. Both forces also used the photo-sharing site Flickr to publish
photos of perpetrators captured on CCTV.
What to do?
➔ Institutionalise the blueprint for a National Social Media Policy.
➔ Inclusion of lateral entry specialists to handle specific requirements like 24x7
tech-support/or soft skills, etc., need to be debated.
➔ Replicate “Social Media Labs” across the country.
➔ Expand and define scope of public-private partnerships.
➔ Demarcate budgets, standardise tools and platforms.
CYBER SECURITY
Methods of Attacks Most popular weapon in cyber terrorism is the use of computer
viruses and worms. Yet these attacks can be classified into three different categories
● Physical Attack:- Using conventional methods like bombs, fire etc to harm the cyber
infrastructure.
● Syntactic Attack:- The computer infrastructure is damaged by modifying the logic of
the system in order to introduce delay or make the system unpredictable. Computer
viruses and Trojans, Ransomware are used in this type of attack.
● Semantic Attack:- During the attack the information keyed in the system during
entering and exiting the system is modified without the user’s knowledge in order to
induce errors. Ex:- Data Diddling, Phishing, DDOS.
Darkside Group:-
This is a relatively new criminal group believed to have roots in Eastern Europe,
exposing the remarkable vulnerability of key American infrastructure using
Ransomware.
According to this definition, cyber attackers don't fit into the definition of Combatants
under International Convention
India’s Vulnerability:-
➔ According to Symantec Corp, India was ranked among the top five countries to be
affected by cybercrime.
➔ Average cost of data breach for firms in India sees an increase of 12.3%:- The
Ponemon Institute Report.
Pegasus, Spyware that can stealthily enter a smartphone and gain access to
everything on it, including its camera and microphone. Pegasus is designed to
infiltrate devices running Android, Blackberry, iOS and Symbian operating system
and turn them into surveillance devices.
According to The Citizen Lab, in this way Pegasus can be used to gather a vast
amount of victim information: “Passwords, contact lists, calendar events, text
messages, and live voice calls from popular mobile messaging apps.” According to
this report, “Pegasus could even listen to encrypted audio streams and read
encrypted messages”.
The response of the Minister on the floor of the house said that “there is no
blanket permission to any agency for interception or monitoring or decryption and
that permission from competent authority is required, as per due process of law
and rules, in each case”.
● According to the Centre for Internet & Society, the gaps in laws allow
surveillance and affect privacy. For example: Ambiguity on issues like type
of interception, granularity of information that can be intercepted and the
degree of assistance from service providers helps in bypassing the law and
aids surveillance by the state.
● Affects Fundamental Rights: The very existence of a surveillance system
impacts the right to privacy and the exercise of freedom of speech and
personal liberty under Article 19 and 21 of the Constitution.
● Authoritarian Regime: The surveillance promotes spread of
authoritarianism in the government functioning since it allows the
executive to exercise a disproportionate amount of power on the citizen
and impacts their personal lives.
● Threat to Freedom of Press: Current revelations over the use of Pegasus
highlights that surveillance was also conducted on many journalists. This
affects freedom of press.
1. Court cannot coerce the government for not sharing details of surveillance as
National security is undoubtedly in the hands of the government.
2. But any kind of surveillance that violates right to privacy must follow the
principle of proportionality
What is this?
Ans:- The honourable court in Puttaswamy case or in Anuradha Bhasin case has
propounded this doctrine:-
1. State action must have a legislative mandate.
2. The action must show that the objective of its law is founded on a
legitimate governmental aim.
3. It must be proportionate, i.e., such state action — both in its nature and
extent, must be necessary for a democratic society. Further, such action
must have no alternative and less intrusive measures available to achieve
the same objective
Legislative Framework
❖ The Information Technology ( IT ) Act 2000, later amended in 2008to define Data
Protection & Cyber crimes.
❖ Section 66 F of IT Act deals with Cyber Terrorism.
Policy Framework
National Cyber Security Policy
Features:-
❖ Set up of a 24×7 National Critical Information Infrastructure Protection Centre
(NCIIPC) for obtaining strategic information regarding threats to ICT infrastructure
❖ Creation of a task force consisting of 5,00,000 cyber security professionals in next five
years through capacity building, skill development and training.
❖ Provision for fiscal schemes and incentives to encourage entities to install,
strengthen and upgrade information infrastructure with respect to cyber security.
❖ Designation of CERT-In as the national nodal agency to coordinate cyber security
related matters and have the local (state) CERT bodies to co-ordinate at the
respective levels.
❖ Encouragement of wider use of Public Key Infrastructure (PKI) for government
services.
Executive Framework:-
● National Critical Information Infrastructure Protection Centre (NCIIPC):- NCIIPC's
vision is to facilitate safe, secure and resilient Information Infrastructure for Critical
Sectors of the Nation. NCIIPC aims to create a resilient and robust framework for
protection of CII by building collaborative frameworks among various stakeholders
and supporting stronger communities.
● National Cyber Crime Coordination centre:-
➔ To act as a nodal point in the fight against cybercrime.
➔ Identify the research problems/needs of LEAs and take up R&D activities in
developing new technologies and forensic tools in collaboration with
academia / research institutes within India and abroad.
International Level:-
(A) Cyber Diplomacy:-
● Global Conference on Cyber Space (GCCS), one of the world’s largest conferences in
the field of CyberSpace, which is being hosted by India for the first time.
● The Third India-Japan Cyber Dialogue was held in Tokyo on February 27, 2019. Japan
and India shared views on cyber security.
● Asia Pacific Computer Emergency Response Team:- Its operational mandate is to
contribute to Internet security within the region, based on information sharing, trust
and cooperation.
● Budapest Convention:- It serves as a guideline for any country developing
comprehensive national legislation against Cybercrime and as a framework for
international cooperation between State Parties to this treaty. India is not yet party
to this convention.
Private Party
● NASSCOM has planned to introduce training programs with focus on usage of cyber
forensic tools at cyber labs.
● Technology and security firms led by Microsoft have signed “Cyber Security Tech
Accord” to defend people from malicious attacks by cyber criminals.
Suggestion:-
PROMOTE LOCAL CYBER SECURITY INDUSTRY:-
● Dedicated Incubator for Cyber Security Startups.
● Annual Cyber Security Expo
STRATEGIC PARTNERSHIP:-
● Collaboration with the Private Sector for R&D.
● Partnering with Service Providers, Private Sectors.
ROLE OF STAKEHOLDERS:-
A. Citizens :-
● Follow cyber hygiene while interacting in cyberspace.
● Be aware of the ever changing threat landscape and adopt safety measures
B. Private Sector:-
● Be accountable for the products and services they provide and provide
adequate guidance for the users.
● Adopt ‘security by design’ and ‘privacy by design’ principles into their
standard.
● Invest in training and capacity building to meet future cyber security needs.
C. Government :- Gulshan Rai Committee has recommended for:-
● Establish a new Indian Cyber Crime Coordination Centre which would be
linked to NATGRID and CCTNS.
● Establish a separate agency for online cybercrime registration, monitoring
and integration of CCTNS data with the same.
USE OF TECHNOLOGY
● Cyber Deception:-The technology works by generating traps or deception decoys
that mimic legitimate technology assets throughout the infrastructure. Attackers
won’t know which aspects of a business’s operations are real and which are fake.
● The term hybrid warfare originally referred to irregular non-state actors with
advanced military capabilities. For example, in the 2006 Israel-Lebanon War,
Hezbollah employed a host of different tactics against Israel. They included guerilla
warfare,innovative use of technology and effective information campaigning.
● Following that war, in 2007, American defence researcher Frank Hoffman expanded
on the terms “hybrid threat” and “hybrid warfare” to describe employing multiple,
diverse tactics simultaneously against an opponent.
Telegram ID:- Saurabh Polity
Such warfare is conducted in the “grey zone” of conflict, meaning operations may not clearly
cross the threshold of war. That might be due to the ambiguity of international law,
ambiguity of actions and attribution, or because the impact of the activities does not justify
a response.
SPACE WEAPONIZATION
The paradox of today’s world, where peace comes from deterrence
and weaponization; and even outer space, God’s sole preserve, has
not been left out.
Concept of Weaponization of Space
The concept for space weaponization came up in the early 1980s through the “Strategic
Defence Initiative” (SDI) also known as the “Star Wars” programme of the United States. The
idea was to put a large number of satellites into orbit that would detect the launch of enemy
missiles and then shoot them down.
Subsets of Weaponization:-
1. Space Control:- It involves protecting orbit assets of own and friendly countries,
and denying enemy access to space.
2. Space Force Application:- It envisages attacking terrestrial targets from
space-based weapons which would reduce the reaction time, the cost of human
attrition.
What are the issues with Weaponization ?
Ans:-
❖ Create an environment of uncertainty, suspicion, miscalculations, competition.
❖ It would put at risk the entire range of commercial satellites as well as those involved
in scientific explorations.
❖ Another problem is that countries, particularly developed ones like the United States,
may reserve an orbital slot and may not use it for several years, thus, monopolising
the diminishing number of orbital slots.
❖ Issue of Space Debris
India has recently tested Mission Shakti, Anti Satellite Weapon. How to
Justify it?
● Anti-satellite technology has so far been in the hands of very few countries: the
United States, Russia and China.
India’s Effort:-
Features of Space activities bill 2017:-
The defence forces (Indian Armed Force) are the primary force responsible for the security
of the country, and they come under the authority of the Ministry of Defense. Central Armed
Police Force (CAPF) aid in combating external threats (they mainly manage internal security
issues) but are managed by the Ministry of Home Affairs.
Recent notification by MHA which directs the Border security force to arrest, seize and
seizure within 50 km of international boundary at punjab, jammu, Assam, west Bengal,
earlier it was only 15 km
Analysis:-
1. It is considered against the spirit of federalism and it is a kind of encroachment in the
state police domain.
2. It will reduce the capability of BSF also, as they will be more involved in hinterland
activities after this notification.
BSF said it will establish uniformity in defining the area within which bsf can operate. And
BSF cannot prosecute criminals and they will have to hand it over to the local police. So
there is nothing like federalism is under threat.
Need of tribunals in capf where officers( gazetted and non gazetted) are going for leave
for indefinite period.
Looking at this , the Home ministry has asked to set up a Security force court manned by a
retired officer as inquiring authority. This will be purely a judicial process while
department Inquiry is a quasi judicial.
Para Commandos
They are a part of the Indian Army's Parachute Regiment, the first special operations unit of
the Indian Army created in 1966. They played a key role in Operation Pawan during the Sri
Lankan civil war in the Eighties and in the Kargil War against Pakistan in 1999.
MARCOS
Set up by the Indian Navy in 1987 for special reconnaissance and anti-terrorism warfare, the
Marine Commandos specialise in maritime operations and have fought with other special
forces in a series of operations including 1988's Operation Pawan and Operation Cactus and
in the 2008 Mumbai terror attacks.
Additional Information:-
Human Development and Human Security: How Do They Differ? Human development and
human security are interlinked but are by no means identical. Human development is a
broad concept, aiming at enlarging people’s choices and freedoms. Human security is about
ensuring priority freedoms so that ‘people can exercise choices safely and freely’