Security
Security
• Setting up of the Enforcement Directorate (ED) which is the nodal agency to enforce
the provisions related to PMLA and FEMA
• Financial Intelligence Unit (FIU-IND) - It is responsible for receiving, processing,
analysing, and disseminating information related to suspect financial transactions. It
is also the nodal agency to cooperate with the FIUs of other countries. (India part of
FATF)- Providing intelligence inputs to ED or similar other agencies.
• RBI and SEBI have been provided with regulatory powers over the banks and
secondary markets to ensure their compliance with Anti Money Laundering
Provisions.
3) Policy Measures
• KYC guidelines require banks and financial institutions to verify the identity and the
address of their customers.
• India has entered into MLATs (Mutual Legal Assistance Treaties) with other countries
to facilitate cooperation in investigating and prosecuting money laundering-related
offenses.
• Awareness campaigns to educate the public about the risks and legal consequences
of money laundering.
PMLA 2002
• It was brought into force in 2005 and gave powers to the ED to enforce the
same. Some of the important components of this act are as follows:
1) It defines the offense of money laundering.
2) It provides a list of offenses that are prerequisites to prove the offense of money
laundering.
3) ED has been provided with powers to investigate including conducting search,
seizure, and arrest. It can even attach a property obtained through the proceeds of
crime.
4) Special courts may be set up to dispose of the cases swiftly.
5) Financial institutions need to observe certain compliances and reporting
requirements- track financial transactions of customers so that they can provide the
related data to ED when needed.
6) Reciprocal arrangements (MLATs) have been included to promote cooperation with
other countries in anti-money laundering investigations.
7) Financial institutions including crypto exchanges need to set up reporting
mechanisms to report suspicious financial transactions to the concerned authorities.
Q- Money laundering poses a serious threat to the economy and society. In this context,
discuss the various measures taken by India and the global community to overcome this
menace.
MEASURES TAKEN GLOBALLY TO COMBAT MONEY LAUNDERING
1) Setting up of Financial Action Task Force (FATF)- short note on this- functions
2) 1988 Vienna Convention - The convention against illicit traffic in narcotic Drugs and
Psychotropic Substances. The convention recognizes that illicit drug traffic generates
large financial profits enabling organized criminal groups (OCGs) to penetrate the
government and society at different levels. (election financing)
- It provides a comprehensive definition of money laundering and provides a
mechanism for mutual international assistance between various nations.
3) Strasbourg Convention -The Council of Europe's convention on laundering- search,
seizure, and confiscation of proceeds of crime was opened for signature in 1990. It
adopts the same definition as the Vienna Convention and includes provisions on
international cooperation in areas of seizure, confiscation, and mutual assistance in
investigations.
4) The OECD Convention on Corruption -The convention on combating bribery of
foreign public officials in international business transactions aims to protect
international trade from corrupt activities.
5) The UN Global Program Against Money Laundering
6) Basel Statement of Principles- KYC guidelines have originated from here.
7) Asia Pacific Group on Money Laundering
8) Egmont Group aims at improving cooperation by facilitating the sharing of
intelligence inputs between various FIUs- wrt esp trans-national criminals or OCGs.
9) IMOLIN - a platform to share real-time information with respect to suspicious
financial transactions and transnational criminals.
10) The New York Action Plan - adopted in 1988, provides an improved and updated
strategy to combat money laundering. It is the most widely accepted anti-money
laundering standard adopted by 185 members of the UN.
Q. Money laundering poses a serious threat to global financial stability. Despite several
domestic and international measures, India continues to suffer due to money laundering.
Comment.
CHALLENGES FACED IN COMBATING MONEY LAUNDERING
1) The enforcement agencies have been unable to cope with the speed of the growing
technology that facilitates money laundering (Technology - governance conundrum).
2) Multiple agencies have been set up to deal with various aspects of money
laundering but they lack convergence (lack of cooperation, overlapping functions,
lack of accountability) whereas criminals work in unison with each other. (Structural
challenges)
3) Increased competition in the banking sector has forced the banks to lower their
guard and as a result compliance with regulations such as KYC norms has become
much weaker. (Regulatory challenges)
4) Developing economies (tax havens) prioritize economic growth and foreign
investment over stringent AML measures (Economic challenge).
5) Enforcement agencies lack adequate funding and trained personnel (operational
challenge).
6) Money laundering investigations often involve cross-border cooperation but
differences in legal systems (corporate secrecy in Singapore-diffficult to identify the
owner of shell companies, if any) hamper these efforts. (structural challenge)
7) 85% of India's economy is informal in nature with a high prevalence of cash
transactions making it easier for money launderers. (Structural Challenge)
8) Political influence and corruption can undermine the effectiveness of AML
measures. Vested interests deliberately prevent desired investigations into such
issues. (Political challenges)
CHALLENGES POSED BY GLOBALISATION AND TECHNOLOGY IN COMBATING MONEY
LAUNDERING
Technology
• Emergence of newer forms of exchange of money (digital currencies- encrypted in
nature evading investigation). They offer anonymity and can be transferred across
borders without much regulation. Most countries have failed to develop regulations
on this issue.
• The volume of digital financial transactions has increased considerably making it
difficult for the enforcement agencies to identify suspicious financial
transactions. (Add data)
• Emergence of the dark web that provides unhindered access to laundering services.
• Blockchain technology can hinder access to tracking illicit transactions.
• The emergence of encrypted channels of communication makes it difficult for
security agencies to detect communication between criminals. (WhatsApp)
Globalization
• Globalisation has made it easier to move funds across borders allowing money
launderers to evade various regulations.
• The rise in offshore financial centres and tax havens has provided launderers with
jurisdictions that offer greater secrecy and a favourable banking environment. E.g.-
Panama Papers- Mossack Fonseca
• Emergence of a complex network of criminal groups that aid each other in illicit
activities.
• Different countries have varying levels of regulatory mechanisms making it easier
for launderers to evade the rules from one country to the other.
However, Globalisation has also facilitated the cooperation between investigation
agencies at global level. Ex- Vienna Convention.
HOW TECHNOLOGY IS AIDING IN OVERCOMING MONEY LAUNDERING
• OCGs are focused on earning money alone whereas TGs have several objectives
including social and political objectives.
• TGs deploy extremely violent means and sophisticated arms such as hand grenades,
AK-47 etc, whereas OCGs use less violent means such as small arms.
• OCGs do not prefer to get into conflict with the state whereas TGs are explicitly in
conflict with the state and aim at overthrowing the same.
• OCGs avoid public attention and try to maintain a low profile whereas TGs thrive on
publicity and seek media attention for their acts.
Similarities
• It acted as a force multiplier making it more challenging for the security agencies to
act against them.
• They have developed greater resilience to evade law enforcement and sustain their
operations.
• It has expanded its geographical reach due to the formation of transnational
networks.
• It has enhanced the access to funding for the terror organizations. Ex- nexus
between Naxalites and illegal mining mafia- Naxalism able to thrive due to this.
• It has increased instability and violence in regions where both groups operate. For
Example: In Somalia the alliance between terrorist groups and organized criminal
groups that has overtaken the state machinery.
• It has negative effect on the economy due to heightened illegal activities.
• Increased risk of terrorist attack and organized crime-related violence. Ex-
Insurgency in North East
CHALLENGES FACED WITH RESPECT TO COMBATTING SUCH LINKAGES
Legal Challenges:
• Inadequate legal framework: Only a few states have enacted a special legal
mechanism to deal with organized crime such as Delhi, Gujarat, Maharashtra, etc.
• The present provisions under the IPC are not enough to deal with the challenges
faced by security agencies in the case of organized crimes. IPC- doesn’t define
organised crime, BNS does.
• The lack of a comprehensive definition of terrorism globally is also a big challenge.
• The state police forces lack the weaponry as well as the capability to combat
organized criminals who often use sophisticated arms. CAG Report: 75% shortage in
weaponry in Rajasthan state police forces.
• These linkages often span across multiple geographies requiring cooperation
between various security agencies which is lacking.
• The use of advanced technologies has weakened surveillance and intelligence-
gathering efforts.
• Lack of awareness among the citizens and glorification of organised criminals in
cinemas has attracted the youth to such organisations.
• Terrorists and organized criminals are highly adaptive and often change tactics in
response to law enforcement measures, making it difficult for security agencies.
• Vested interests between criminals, politicians and bureaucrats have compromised
the investigation and prosecution of organized criminals and terrorists.
RECOMMENDATIONS AND WAY AHEAD
• Having a good understanding of the nexus between terrorist organizations and OCGs
is important for determining the policy choices to deal with these issues.
• In the absence of a uniform approach by the states on this problem, the Union
government may consider model laws on organized crime, that may be adopted by
various states.
• Enhancing coordination among the law enforcement agencies, customs and judicial
bodies.
• Providing specialized training to the law enforcement agencies and the judicial
officials.
• Multi-lateral and bilateral treaties to encourage intelligence-sharing
agreements/arrangements among the security forces.
• Regulating the use of cryptocurrencies to overcome the challenges posed to
financial agencies.
• Setting up of special crime cells within the state police departments to deal with the
problem in an effective manner.
• Enhancing public-private partnerships, especially in the banking sector to overcome
the threats posed by terror financing.
ROLE OF MEDIA IN INTERNAL SECURITY- Printed Notes -Important
• The media which is the fourth pillar of democracy has a very important role to play in
the formulation of public opinion.
• It plays a crucial role in holding the government accountable and promoting an
informed discussion among the citizens.
• On national security issues, the media plays a very crucial role.
• Some of the challenges thrown up by media while covering national security issues
are as follows:
1) Sensationalization of national security issues:
• Media especially TV news channels have often been guilty of sensationalizing
national security issues creating panic among political and security agencies at
times such acts further promote the objective of the terrorists. Ex- image as of
victims after Pulwama Attack
• For Example, The carelessness of the media during the coverage of the IC-814
hijacking costs India heavily.
• Report accurately the movement of security forces- after 2001 Parliament attack-
India on the verge of war with Pakistan
• The round-the-clock reporting (earlier in bulletin 5-6 hrs now 24 hrs) emboldened
the terrorists to think that they could get any concessions from the Indian
government with such pressure.
2) Lack of training in covering War operations:
• For Example: During the Kargil conflict lagged in training and preparedness and
often irresponsibly covered the events.
• At times news about armed forces has been brought to the notice without any
thought of its impacts.
3) Irresponsible coverage of anti-terror operations:
• News channels have been often involved in irresponsible coverage of anti-terror
operations.
• For Example, the 26/11 Mumbai terror attack and counter-terror operation live
reporting by the media almost jeopardized the operation.
• During the Surgical operation against NSCN, the media agency published the
photographs of the team involved in these operations, therefore, risking their
lives.
4) Stereotyping of certain individuals or groups:
• The perennial war of ratings has led them to outdo their competitors, they often
report in a manner that instigates outrage rather than increase awareness and
initiate debate.
• They fuel prejudice and create conflict in society.
5) Fake News and speculation:
• The media issues the information before verifying it. Ex- 2000 rupees note with a
chip- US would also be curious!
• The distinction between facts, and opinions which are the basics of the media has
blurred.
• Indian news channels have become view channels.
• Reporting in subjudice matters needs to be careful.
6) Reporting on sub-judice matters and conducting parallel media trials
• They declare a person as guilty or innocent as per their vested interests, it
compromises the rule of law and the working of the enforcement agencies.
• Often the lines have been blurred between investigative journalism and
investigative agencies themselves. Ex- In Ryan International Murder case,
conductor responsible by media but another child responsible as per police
investigation
7) Lack of sensitivity in coverage of caste-based violence, sexual violence, communal
violence, terrorist attacks:
• They swarm the victims of violence. The news channel often portrays the state of
victims and other heinous crimes in a dramatized manner causing unnecessary
distress to victims and their families.
HOW MEDIA MAY BE USED AS A TOOL TO ENHANCE INTERNAL SECURITY
• Public awareness:
- It may be used for sharing important information and alerts about potential
security threats or natural disasters.
- The citizens can be made aware of issues such as Cybercrime-Phishing, Vishing
scams and educated them, how to protect them.
• Community engagement:
- The media may try to promote engagement and dialogue between different
communities that can prevent radicalization and other threats.
• Crime prevention and investigation:
- The media may be used to appeal to the public to share information about
suspects in various cases.
- It should expose the real motives of the extremists, break the propaganda and
myths spread by Naxalites.
- Media should support the functioning of security agencies and report facts and if
encountered any piece of information, then should report the security agencies in
timely manner.
• Highlighting India's position on important matters to the international community:
- For Example, like in Kargil War media through on ground coverage played
important role in highlighting India’s side and decrease the negative fervour
against India at global level; the news channel played an important role after the
shooting down of Pakistan's Navy plane by India.
Q- Media is double- edged sword when it comes to National Security Issues. Analyse in
context of India.
Suggestion or Way Forward:
1. There is an urgent need to follow self-discipline.
2. The media needs to ask mature questions to politicians and relevant authorities.
3. There is a need for some introspection before responding to sensitive matters that
could lead to unwanted disclosure of military plans.
4. Only trained and proficient media personnel knowing security issues must be allowed
to cover national security issues.
5. The media houses must make efforts to recruit from institutions that teach security
studies.
6. We must evolve detailed guidelines to ensure ethics and professionalism in media. For
Example, BBC has provided detailed guidelines concerning reporting on terror issues.
7. In India, PCI (Press Council of India) does not have the power to regulate electronic
media (two self-regulatory bodies- NBSA and BEA) and there is a need to enhance its
jurisdiction.
Ideally, media should be self-regulated but if govt regulating it, then much bigger
issue. Cross Media ownership should not be allowed.
8. Some countries such as the USA, and Canada have enacted specific laws to regulate
the coverage of national security issues, but India must also consider introducing such
a law.
ROLE OF SOCIAL MEDIA IN CREATING CHALLENGES TO INTERNAL SECURITY- HANDOUT
• Social media refers to a group of interactive web 2.0 internet-based applications that
facilitate the sharing of ideas, thoughts, and information by people. Statistics- how
much internet penetration, how much twitter accounts, how much data uploaded
every minute.
• It is different from traditional media as it has a broader reach and allows two-way
communication and instant exchange of information. For Example, Twitter,
WhatsApp, Facebook, Quora etc.
Challenges Posed by Social Media to India's Internal Security:
• Hate Mongering- Social media spreads hate speech and nuisance in society. It has
been used to spread hate speech which has often resulted in communal tensions and
riots. The Delhi riots in 2020 were instigated through misinformation and hateful
messages spread on social media.
• Fake news- leading to creating panic and anxiety. For Example, in 2012, a Doctored
video clip over the internet led to an exodus of Northeast Indians from major metro
cities.
• Radicalization of Individuals: social media has often been misused for the
radicalization of individuals, especially the youth. Ex- In 2016, 22 people from Kerala
were reported missing and later it was discovered that they had joined ISIS in Syria
and Iraq, the investigations revealed that they had been radicalized through social
media.
- For Example, in 2017, A terror attack in London was carried out by an individual,
who had been radicalized through social media platforms.
- In 2017, a city in the Philippines was attacked by militants, who had been
radicalized through social media.
• For Spreading propaganda by extremist organizations: Naxalite groups often use
social media to spread misinformation about government schemes and programs. Ex-
5 operatives of CPI-M arresting by police radicalised by social media
• Targeting security personnel and their families: This phenomenon is known as
"Doxxing". In 2020, terrorists in J&K released a hit list of police officers and their
families on social media, urging their followers to attack them.
• Cyberbullying: Social media has become a tool for inflicting trauma and harassment,
especially against women. Ex- simply Virat could not score, people giving death
threats and rape threats to his wife and daughter.
• For performing Cybercrimes: It has been used to do cyber-crimes such as identity
theft (mera account hack ho gya-mere account se money mangna), phishing scams,
and sharing of obscene content.
- Cybercriminals are actively using social media to steal personal information.
- The promotion of Pornography and obscene content through social media
platforms can have adverse effects on the psychology of children.
• For Manipulating election outcomes and democratic processes: There have been
several allegations about the misuse of social media by foreign actors to interfere in
the domestic processes of other countries.
- For Example, Cambridge Analytica was accused of manipulating the voting
behaviour in the 2014 elections via information sourced from Facebook.
CYBER SECURITY
Definition in IT ACT,2000 section 2: It refers to protecting computer devices (any device with
computing ability- mobile), networks, and the information stored or transmitted to them
from unauthorized access, use, disclosure, disruption, modification, and destruction.
CYBER THREATS
1. Cybercrimes
2. Cyber terrorism
3. Cyberwarfare- 5th Generational Warfare
1. CYBER CRIMES
• It is conducted in Cyberspace.
• Crimes in the real world with the help of cyberspace.
Q1) Cyberterrorism has become a big menace for security agencies across the world. Highlight
the reason for the terror group to increasingly use cyberspace for their activities.
Reason for a terror group using cyberspace:
1. Cost effectiveness.
2. Cyberspace provides anonymity.
3. Remotely carried out the terror attacks.
4. Wider Reach for disseminate information and spread propaganda to indoctrinate people.
Ex- Al Qaeda brings magazine ‘INSPIRE’
5. Recruitment Purposes- Bangalore man handling ISIS Twitter Account
6. Encrypted communication over cyberspace is easy to coordinate to plan terror attacks.
7. Mass training through online sources- hacking tutorials
8. Fundraising activity- Dark web, crowd funding, cryptocurrencies
3. CYBER WARFARE
• It is also termed as the 5th generation or the invisible warfare. (Air, water, land,
space- post WW-2, cyber)
• It refers to the use of digital technologies to conduct military operations against
other adversary states.
• It has become a preferred mode to cause damage by disabling a country's
communication and command system stealing sensitive information and spreading
misinformation.
• Cyber warfare aims to achieve strategic military-political advantages over an
adversary state and targets critical information infrastructure (Airports, Railways,
energy production, Banking), military assets, and govt systems.
Some of the examples of cyber warfare in the recent times include:
• 2017 Kudankulam Nuclear power plant was attacked by a malware named D-track
which is believed to have originated in North Korea.
• 2010: A virus named Stuxnet targeted Iran's nuclear facilities which is widely
believed to have been developed by US and Israel.
• 2016: Ukraine's power grid was attacked by Russian hackers.
• 2014: Operation Desert Eagle Target govt and military website of Israel.
• 2007: NATO and Govt websites were targeted in Estonia possibly by Russian state
troops.
Q2) Discuss India's vulnerability and strategy with respect to modern-day cyber threats.
• The ransomware attack on the AIIMS facility and the attack on the Mumbai power
grid are some examples.
• As per NCRB data, there has been a jump of over 4 times in cyber-crimes over the
last 5 years.
• Data breaches leading to Identity theft and financial fraud have become a menace
for security agencies.
• As per a report, India is among the top 5 targets in the Asia Pacific region with
respect to Cyber Espionage.
• India's internet penetration has gone up from a mere 4% in 2007 to over 45% in
2021 which has further increased the chances of cyber-attacks.
• India's Renewed digital governance means that the govt is storing huge amounts of
citizen data across various levels further increasing our vulnerability.
• Several other countries China, the US, and Israel have developed cyber warfare
capabilities increasing our vulnerability to cyber warfare.
Q3) To deal with various cyber security threats India's cyber security infrastructure needs
to be more than a mere patchwork. Comment.
INSTITUTIONAL MEASURES
A. National Critical Information Infrastructure Protection Centre (NCIIPC).
• It is a nodal agency to protect CII (Critical Information Infrastructure) from
cyberthreats.
Some of the functions:
• Identification of CII
• Assessing the risk and vulnerabilities of CII.
• Development and implementation of strategy for the protection of CII.
• Cooperation with other agencies about various threats faced by CII
• Capacity building of various stakeholders to combat challenges
B. The CERT-In (Cyber Emergency Response Team - India)
SAFE HARBOUR PROVISON: According to the safe harbour principle, an online platform
such as Facebook or Twitter cannot be held accountable for the content posted on it by
users. The safe harbour provision has been given under Section 79 of the IT Act 2000.
4. Regulatory agencies such as RBI and IRDA have released detailed sets of regulatory
guidelines to be followed by the institution to avoid cyber threats.
5. Personal Data Protection Act, 2023: A comprehensive legislation aims at protecting
personal data and privacy.
6. IT Rules (Intermediary Guidelines) 2021, outline the responsibilities of intermediaries
including social media platforms and digital news publishers to ensure accountability and
transparency in their operations.
7. SPDI rules: Made under Section 43A of the IT Act which mandates that organisations
handling sensitive personal data implements reasonable security practices and procedures.
AWARENESS CREATION MEASURES
• In 2021, govt conducted cyber exercise 2021, a mock drill to test the preparedness of
various ministries and departments in the event of a cyber-attack.
• In 2019, Cyber security War games called "The Shield" were organized that involved
simulating cyber-attacks on CII (critical information infrastructure) to test their
preparedness and to identify the gaps in their capacity.
• Cyber Surakshit Bharat aims to train 10,000 personnel from various govt agencies and
private organizations on the best practices for cyber security.
• National Cyber Security Awareness Month organised by CERT-in where they conduct
webinars, various awareness camps in govt offices, schools, colleges to create
awareness on cyber threats.
• SVPNPA, Hyderabad has been conducting cybersecurity and forensics courses for the
officers of law enforcement agencies including the judiciary.
• MeiTY, Information security education and awareness- ISEA-that focuses on
developing content for cyber security, conducting training programs and certification
for professionals and govt officials.
GLOBAL COOPERATION/MEASURES
MEASURES TAKEN FOR GLOBAL COOPERATION IN CYBER SECURITY
• India has actively engaged with other countries by signing 14 MoUs on exchanging
information and technology inputs with respect to cyber-crimes.
• The Government has made several efforts to push for a globally accepted equitable
convention to regulate cyberspace effectively. (not part of Budapest convention-as
would compromise our sovereignty and initially not part of it as a founders)
• India has played a seminal role in promoting discussions between intermediaries
(Apple, Amazon, Facebook), service providers, and national governments to evolve
a common strategy for dealing with such challenges. Ex- Christ Church Call to Action,
Delhi Declaration on Cyber Security
Enhancing the capability of the private sector:
• CERT-IN has released a detailed set of guidelines according to which information has
to be shared related to cyber threats faced by private agencies.
• The government has laid down stringent standards to be adhered to by private firms
to avoid any cyber threats.
• The government is encouraging the adoption of emerging technologies such as AI,
ML, and blockchain to enhance the cyber security of private agencies.
CHALLENGES WITH RESPECT TO INDIA'S CYBER SECURITY STRATEGY
Legal Challenges:
• Laws related to cyber-crimes in India are outdated and several newer crimes have
not been defined in the law.
• We do not have a dedicated procedural law related to IT offences and as a result,
the enforcement agencies have to rely upon outdated or archaic procedural laws
which are not very effective.
Infrastructural challenges:
• India imports almost 70% of its telecom equipment requirement making the cyber
security infrastructure vulnerable to supply chain bugs/defects. Ex- Guidelines
prohibited the use of Chaome and Guame devices by govt officials and armed forces
personnel.
• Most forensic labs in India are not equipped to carry out investigations in cases of
cyber security breaches.
• Most tech companies in India do not store data on local servers as a result,
investigation into cyber offenses becomes difficult.
• India spends a very small percentage (0.64% of GDP) of its annual budget on
Research and development in cyber technologies which has adversely affected our
preparedness to combat cyber-crimes.
• Lack of coherence between multiple agencies has resulted in duplication of functions
and a lack of accountability for the institutions.
• Lack of awareness and capability in the state police machinery with respect to
cyber-crimes and provisions of the IT Act.
Human resource-related challenges:
• Increase the budgetary allocation for cyber security initiatives. Increasing the budget
to 0.2% of the annual budget in the short term and eventually increasing it to 1%.
• Promoting linkages between industry and academia to encourage developing
cutting-edge technologies for cyber security.
• Development of a competent infrastructure including to train a large number of
individuals in cyber security.
• Introduction of cyber security services from among the IES officers to create a pool
of leaders for cyber security within the government.
• Developing a robust audit ecosystem to evaluate the preparedness of various
entities.
• Conducting regular cyber security drills to prepare individuals on cyber security.
• Enhancing data governance capabilities and effective implementation of data privacy
law on a priority basis.
• Promoting cyber security insurance as a key instrument for cyber risk management.
• Promote cooperation and preparedness of other nations through platforms such as
G-20, BIMSTEC, SCO, etc.
BORDER MANAGEMENT (BM)- HANDOUT- PYQs
• Border security refers to securing our territories from infiltrates, hostile elements,
etc. Border management is a broader term, and here the role is performed by
different agencies as well. It is one step ahead of border security.
• It is focused on how border infrastructure is developed and promotes economic, and
social cooperation with other countries.
• It is the task of not only border security forces, but also of other agencies as well like
diplomatic agencies.
• The term border management in its widest sense implies co-ordination and
concerted action by political leadership and administrative, diplomatic, security,
intelligence, legal, regulatory and economic agencies of the country to secure our
frontiers and subserve the best interests of the country.
• BM division of the Ministry of Home Affairs says that “Border management is
securing the country’s borders against interests hostile to the country and putting in
place the systems that are able to prohibit such elements while facilitating legitimate
trade and commerce.”
CHALLENGES TO BORDER MANAGEMENT
• Some of our maritime boundaries are still undefined and much of our land borders
are not demarcated on the ground. The disputed and unsettled nature of our
boundaries has made them a source of tension and made their policing much more
difficult.
• Since many of our borders are man-made artificial boundaries and not based on
natural features such as rivers, watersheds etc, they are extremely porous and easy
to cross.
• Multiplicity of forces on the same borders has inevitably led to the lack of
accountability as well as problems of command and control.
• Border Guarding Forces need to be distinguished from central police organizations.
Being more akin to the Army and different from central police organizations which
are called in aid of civil power from time to time, they need to be appropriately
strengthened both in terms of equipment and manpower.
• The repeated withdrawal, in large numbers, of para-military forces from border
guarding duties for internal security and counter-insurgency duties has led to a
neglect of the borders. These forces have also been unable to perform optimally due
to the cannibalisation of battalions and even companies.
• Lack of institutionalised arrangements for sharing and co-ordination of intelligence at
various levels and particularly at the field level, is a primary weakness in proper
management of borders. Army under MoD and CAPF under MHA
• The present tendency on the part of each agency to guard its turf, even at the cost of
compromising national security interests, needs to be deprecated and put down
sternly.
• Inadequate attention to the concerns of local people in border areas turning to ghost
villages- first line of defence like in Kargil war
• Improper physical infrastructure in border areas of the country making movement
and mobilization of forces difficult- Prone to indulgence in Organized crimes.
• Political instability in the neighbouring countries. Ex- Islamic Fundamentalism in
Bangladesh, Civil War in Myanmar, Pakistan political instability
• A deficiency of trust between local communities and security organisations.
EFFECTS OF POOR BORDER MANAGEMENT
1) Illegal immigration continues due to poor border management- leading to insurgency
in Tripura, Assam, and Meghalaya, this creates economic and social problems.
2) Many separation forces have been able to make their way into India and prevent
themselves from the security agencies.
3) Radicalization of the youth- Massive headache.
4) The mobilization of the armed forces has been hampered due to poor infrastructure.
5) The influx of fake Indian Currency Notes (FICN) made its way into India, and it led to a
massive impact on India's economic sovereignty.
ROLE OF TECHNOLOGY IN BM
Technology like (UAVs, infrared cameras, radars, etc) comes with its own set of advantages in
terms of BM:
1. It reduces the errors associated with human intervention.
2. It can work 24X7 therefore addressing the issue of soldier fatigue.
3. It has greater accessibility in unreachable areas like in Siachen.
4. Reduces the loss of human lives due to extreme climatic conditions.
CHALLENGES IN DEPLOYMENT OF TECHNOLOGY FOR BM
Inputs into
Survelliance Analysis Command
Output
devices Centre and Control
Centre
• “The Border Security Force (BSF) hopes that the new technological equipment would
provide feeds to BSF personnel at the border outposts, where monitors would be
installed. In case of a threat, quick reaction teams (QRT) will intervene and neutralise
it. The BSF plans to put up a CIBMS in areas all along the Indo-Pak and India-
Bangladesh border,”
WAYS TO OVERCOME CHALLENGES WITH RESPECT TO POOR BM
Various Security
Agencies and their
mandate
Investigation
Agencies-CBI, NIA,ED-
Enforcement Agencies Intelligence Agencies
Mandate and Issues in
Handout
VARIOUS CHALLENGES AND ISSUES ASSOCIATED WITH THE FUNCTIONING OF STATE POLICE
FORCES IN INDIA
HUMAN RESOURCES RELATED ISSUES
1. Large number of vacancies in state police forces: As per data from 2014, state police
forces face a shortage of more than 5.6 Lakh police personnel. In India, police to
population ratio is 120 per million population whereas the prescribed standard by
the UN is 222 per million population.
2. Diversion of police personnel toward VIP duties.
3. Lack of diversity especially in terms of representation of women in the police forces.
Training and recruitment:
1. Outdated training system especially in contemporary areas such as cyber-crimes,
forensics, etc.
2. Outdated recruitment techniques: Recruitment for top positions follows a one-size-
fits-all approach. (UPSC for IAS, IPS, IFS, etc- no emphasis on specific skills)
3. Undue emphasis on physical fitness and multiple entry points (at constable, SP, ACP,
IPS) leading to wide differences between top leadership and the ones on the ground.
4. Career progression at the junior level is poor and disincentivises hard work and
improvement. (80% of police forces are Constables)
Operational and infrastructural challenges:
1. As per a survey conducted by BPRD, there is a significant shortage of arms and
ammunition in the police force.
2. As per a report by CAG, there is a 30% shortage of vehicles and as much as 76%
shortage in weaponry in some states.
3. As per the latest reply given in the Parliament, 2700 police stations all across the
country do not have CCTV cameras and 628 police stations do not have telephone
connections.
4. Several forensic labs are outdated or understaffed. (samples sent to Hyderabad)
5. Excessive interference of the political executive in the day-to-day functioning of the
police.
6. Poor quality of investigation and as a result, the conviction rate in India is one of the
lowest in the world.
7. No separate or defined mechanism for entertaining complaints against police
officials.
8. Appointments and postings are dependent on political considerations, therefore,
undermining the independence of the police forces.
Structural Challenges:
1. The law and order and investigation are vested in the same wing and as a result,
there is a lack of accountability (also conflict of interest- investigation by the same
police chief who enforces law and order will tend to hide the inefficiencies of the
police department) and specialisation in the functioning of the police.
2. Basis of Performance Appraisal: Either the citizens are afraid of approaching the
police or the police deliberately try to suppress the cases as their performance is
judged on the basis of the number of cases solved. Police many times does not
register FIR for cases difficult to solve to maintain higher % of cases solved.
MOSPI in its report stated that there is a significant underreporting of crimes in India.
3. Police is top heavy and bottom heavy: Shortage of police officials at crucial positions
especially in the middle hierarchy. These officers form backbone of police force as
these are investigating officers and due to this shortage, one such officer is
investigating 8-10 cases.
4. Policing being a state subject lacks uniformity across the country.
POLICE REFORMS
Accountability and oversight reforms:
• Establishing independent police complaint authority at the state and district level.
• Strengthening the role of the State human Rights Commission to oversee complaints
against police officials.
• Formulation of comprehensive guidelines for appointments, postings and transfers.
Training and Capacity Building:
• Enhancing training on human rights, community policing (every policeman is a
citizen with uniform and every citizen is policeman without uniform), and the use of
modern investigation techniques, forensics, etc.
• Training on handling sensitive cases, especially on gender violence.
• Establishing community outreach programs to improve public image. For example,
the Friends of Police program of Kerala Police, Neighbourhood Watch scheme of
Delhi Police
Legal and Procedural Reforms:
• RAW, or the Research and Analysis Wing, stands as one of India's premier
intelligence agencies, playing a critical role in safeguarding the nation's security
interests.
• Established in 1968, RAW was created primarily to focus on external intelligence
gathering, especially concerning India's neighbouring countries, particularly Pakistan
and China.
• Before the formation of RAW, the Intelligence Bureau (IB) handled both internal and
external intelligence matters. However, recognizing the need for a dedicated agency
to address the complexities of external threats, RAW was established under the
leadership of then-Prime Minister Indira Gandhi.
Functions:
1. External Intelligence Gathering: RAW's primary mandate revolves around gathering
intelligence pertaining to India's external security threats, particularly from
neighbouring countries like Pakistan and China. It monitors political, military, and
strategic developments in these nations, providing critical insights to policymakers.
2. Counterterrorism Operations: RAW also plays a significant role in gathering
intelligence related to terrorist activities and extremist organizations operating in the
region. Its efforts contribute to India's counterterrorism strategies and initiatives.
3. Foreign Policy Support: RAW's intelligence assessments serve as a cornerstone for
India's foreign policy formulation. By monitoring political and military developments
in neighbouring countries, RAW helps shape India's strategic engagements and
responses to regional challenges.
4. Strategic Analysis: RAW conducts an in-depth analysis of geopolitical trends, regional
conflicts, and emerging threats to India's security interests. Its assessments guide
policymakers in making informed decisions on matters of national security and
defence. Ex- types of alliances emerging and how India can be part of it?
5. Covert Operations: RAW is known for its ability to conduct covert operations to
gather intelligence and disrupt hostile activities aimed at India's interests. These
operations are conducted with utmost secrecy and precision, often in collaboration
with other intelligence agencies and special forces units.
6. Parliamentary Oversight: Unlike other government agencies, RAW operates with a
degree of autonomy and is not subject to direct parliamentary oversight on many
issues. This independence allows RAW to maintain secrecy and operational flexibility
in carrying out its missions.
NATIONAL TECHNICAL RESEARCH ORGANISATION
The National Technical Research Organisation (NTRO) stands as a crucial component of
India's intelligence apparatus, focusing on technical intelligence gathering and analysis.
Established in 2004 under the National Security Advisor in the Prime Minister's Office, NTRO
plays a pivotal role in enhancing India's technological capabilities to address emerging
security challenges.
IB and RAW uses human network for intelligence operations and NTRO uses secondary
sources like technology, internet, radars, surveillance devices,etc
Functions and responsibilities:
1. Aviation and remote sensing: Uses advanced technologies to gather intelligence
from aerial platforms.
2. Data gathering and processing: Collects and analyses data from various sources,
including satellite imagery.
3. Cyber security: Safeguards India's cyberspace from threats.
4. Cryptology systems: Develops secure communications systems.
5. Strategic hardware and software development: Designs and deploys strategic
hardware and software solutions.
6. Strategic monitoring: Conducts strategic monitoring of global events and emerging
threats.
7. Satellite access and utilization: Accesses data from satellites for intelligence
gathering.
Q- Multiple Terror attacks in the recent past can be attributed to a collective failure of
intelligence agencies in India. Examine the shortcomings in the functioning of intelligence
architecture in India and suggest the reforms for the same.
SHORTCOMINGS IN THE FUNCTIONING OF INTELLIGENCE AGENCIES
• Turf War: Internal rivalries and lack of cooperation among Indian intelligence
agencies hamper collective efforts and compromise security.
• Lack of coordination, information sharing, and joint operations result in gaps
in intelligence gathering and analysis.
• Limited oversight, accountability, and transparency mechanisms increase the risk
of abuse of power and undermine public trust.
• Secrecy and lack of disclosure erode public confidence and hinder accountability.
• Political interference compromises the neutrality and objectivity of intelligence
agencies, eroding public confidence. Ex- if they are tracking the movement of
opposition political leader.
• Resource constraints, including funding, technology, and manpower shortages, limit
the effectiveness and operational capabilities of intelligence agencies.
REFORMS NEEDED IN THE INTELLIGENCE AGENCIES
MEASURES TO BE TAKEN:
Diplomatic initiatives:
- Resolving border disputes.
- Strengthening of alliances- Security issues can be discussed on Platforms like
BIMSTEC and SCO can be taken.
- Raise the issue at UNGA and define terrorism and militancy and bring different
countries on board.
Military initiatives:
- Joint exercises- Operation All Clear in Bhutan against operations of NDFB and
ULFA.
- Upgradation of border infrastructure through surveillance.
Economic initiatives:
- Economic sanctions if they don’t cooperation and proactively promote militancy
- Promoting cross border trade like setting up of Border haats- markets in border
villages for trade and exchange; ICPs- customs, security, economic agencies and
all facilities in one building
Technology: Use of technology, using space technology- CARTOSAT, CIBMS, UAVs, electric
fencing on key vulnerable points on border, etc.
INSURGENCY IN NE:
Read Conflict resolution chapter in 2nd ARC for its history and P Chidambaram report-
Security Situation in NE
Topics: Factors for the rise of insurgency in Northeast: Historical, geographical, cultural
reasons etc.
Consequences of Insurgency in NE
Step Taken; Persistent issues that fuel insurgency; Reasons for decline in insurgency in last
20-30 years; Way Ahead; how Insurgency linked to Organized crime; Insurgency linked
with border management
Insurgency vs Militancy: Rebel or fighters from outside like in Kashmir; by local people like in
NE- Naxalism
Naga insurgency is backbone of NE insurgency.
Q- NE India has suffered insurgency from long time. Analyse the main reasons for armed
insurgency in NE.
SEE PYQs
• Nagaland- ‘Doyen of Insurgency’:
- Separate flag and constitution.
- Ongoing conflicts between the tribes in Nagaland.
- NSCN IM and NSCN K are the major insurgent groups.
- Support of China.
- Naga club>> NNC>> NSCN.
- They demand greater Nagalim.
- Need to develop and bring economic reforms.
• Insurgency in Manipur:
- Attributed to the insurgency in Nagaland.
- Geography>> Meiti tribes in the valley.
- Control politics and economics of the state- earlier part of Assam
- Lack of employment.
- High-handedness of the security forces.
• Mizoram:
- started in 1960s.
- Part of Assam>> Mautam famine >> locals died in large numbers.
- Mizo national front>> led by Lal Denga.
- Mizo accord in 1986 with the government of India, Mizoram state, and Mizo
national front.
- A separate state for Mizoram.
• Assam:
- First movement led by ULFA.
- The Second was led by NDFB.
- Another was led by Bodo liberation tigers.
- AASU>>Movement to throw out outsiders.
- Issue of outsiders like Bengalis taking jobs etc.
- issue of illegal immigration.
- 1979>>Insurgent group>> ULFA.
- Assamese wants self-determination.
- Bodos also started their movement.
- All Bodo student unions were formed.
- Demand for a separate state of Bodoland.
- The Assam Accord was signed in 1985.
• Tripura;
- Majorly Bengali dominated state.
- insurgent groups>> separation of Tripura from India.
- 2015>> AFSPA removed>> normalcy retuned.
• Arunachal Pradesh:
- Recently>> concern insurgency from neighbouring states.
- safe havens for insurgents.
• Handouts are to be provided for the same.
TERRORISM: HANDOUT
SEE PYQs -Topics- Definition, causes and factors for it, sources of funding, implications,
suggestions to overcome, strategy deployed till now, how it is a global problem and how to
solve it globally
Linkages btw terrorism and organised crimes
Linkages btw terrorism and state sponsored activities like by Pak on Indian border
TERROR FINANCING EXAMPLES:
- ISIS- selling oil in black market
- Naxalites raising money through cannabis trade
- Insurgent groups in NE raise money through OCGs
- LTTE raising money through illegal poaching and cutting down of forests and
timber
- Taliban- Poppy Cultivation