0% found this document useful (0 votes)
11 views48 pages

Security

The document outlines the significance of internal security in exams, focusing on topics such as extremism, money laundering, and cyber security. It discusses the relationship between extremism and underdevelopment, particularly in the context of Naxalism in India, detailing its origins, phases, and the socio-economic factors contributing to its rise. Additionally, it highlights the measures taken by the Indian government to address Naxalism through developmental and law enforcement strategies, while also critiquing the coordination challenges faced in implementing these measures.

Uploaded by

Shruti Pathak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views48 pages

Security

The document outlines the significance of internal security in exams, focusing on topics such as extremism, money laundering, and cyber security. It discusses the relationship between extremism and underdevelopment, particularly in the context of Naxalism in India, detailing its origins, phases, and the socio-economic factors contributing to its rise. Additionally, it highlights the measures taken by the Indian government to address Naxalism through developmental and law enforcement strategies, while also critiquing the coordination challenges faced in implementing these measures.

Uploaded by

Shruti Pathak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 48

INTRODUCTION TO THE SUBJECT

• Weightage in mains Exam:


• About 50 Marks.
• Generally, the 9th and 10th questions (of 10 marks) and the 19th and 20th questions
(of 15 marks) are allotted to internal security.
• Questions are predictable.
SYLLABUS
1. Linkages between the development and spread of Extremism.
2. Money Laundering and its prevention.
3. Linkages between organised crime and Terrorism.
4. Basics of Cyber Security.
5. Role of Media and Social Media in Internal Security.
6. Security agencies and their mandate (Handout)- challenges and needed reforms
7. Border Management and Security Challenges in the Border Areas- (Role of tech in border
management- Land and Coastal Security- Maritime Anti-Piracy Act, 2022)
8. Role of external state in creating challenges to internal security.
9. Role of non-state actors in creating challenges to internal security.
SOURCES
• PYQs from 2013 onwards.
• Value Added Material- Good Compilation
• Class notes and Handouts
• Mains 365/ Monthly Current Affairs Magazine
Extra- 2nd ARC Report on Conflict Resolution (Chapter- Naxalism and Insurgency);
2nd ARC Report on law and order (Terrorism); Report of Parliamentary Standing
Committee- CAPF
Websites: ORF; CLAWS; IDSA; VIF.
DEVELOPMENT AND SPREAD OF EXTREMISM
- Under-development and extremism are the Vicious cycle.
- Naxalism is not only a law-and-order problem but a development issue.
1. Development is a dynamic concept that can mean different things to different people
but in a general sense, it refers to improvement in living conditions in the society.
2. It has multiple dimensions including social, economic, and political.
3. Even though it is generally perceived as a positive term, a flawed process of
development may result in unintended consequences as well.
4. For example, the displacement of indigenous communities due to a developmental
project- Tehri Dam Project- Govt report- 40% of displaced people in India are Adivasis.
5. Extremism refers to a situation where an individual or a group possesses extreme
views or thoughts without the scope of entertaining the views and opinions of others.
6. Individuals with an extremist ideology do not refrain from taking extreme actions
including resorting to violence to achieve their objectives.
7. Some of the forms of extremism include: Terrorism; Fascism; Left Wing Extremism;
Religious Fundamentalism; Insurgency, etc.
Question: Extremism and underdevelopment often go hand in hand. In this context, analyse
linkages btw both with practical examples from India.
HOW EXTREMISM RESULTS IN UNDER DEVELOPMENT/MALDEVELOPMENT
1. It results in the destruction of physical infrastructure holding back the development
of that place. Ex- Roads, Schools, Hospitals, etc
2. It may destroy social capital and adversely affect the demographic dividend in
society.
3. It adversely affects trade, economy, tourism, business sentiment, etc.
4. It creates threats to various agents of development including civil servants, civil
society, Media, etc.
5. Diversion of funds towards defence expenditure from the social sector.
6. The state may use force to overcome extremism often resulting in collateral damage
and therefore, creating a vicious cycle of violence in such areas. (violence begets
violence)
HOW UNDERDEVELOPMENT LEADS TO EXTREMISM
1. Underdevelopment is a violation of basic human rights that results in dissatisfaction
towards the state. Therefore, leading to people supporting extremist means.
2. Denial of social justice to the marginalized sections of society has also resulted in
anger towards the state. Ex- Rise of Naxalism in Bihar- Caste based violence resulted
in extremism (upper caste militias did violence→ lower caste militias), Naxalbari in
WB
3. Denial of recognition of ethnic identity for various ethnic groups has resulted in
rebellion and violence. Development not only eco but social and political also. Ex-
Assam, Bodos felt sidelined when Assamese made official language.
4. Unemployment and lack of constructive engagement for the youth have resulted in
dissatisfaction attracting many of them towards extremism.
In conclusion, one may say that there is a school of thought that believes that the only
way to break this vicious cycle of violence is to tackle extremism with the use of force
and development would follow naturally.
On the other hand, a set of people believe that without addressing underdevelopment
in society, it would be impossible to challenge extremism.
In India, therefore, the government has adopted a two-pronged approach to addressing
the developmental concerns as well as the extremist challenges in the disturbed areas.
(Radicalisation is the process of making someone extreme.)
NAXALISM (word origin from Naxalbari in WB)
1. The impoverished peasants and tribal communities in Naxalbari faced oppression
from wealthy landlords, money lenders, and government officials.
2. Dissatisfaction was channelled by the Communist-led revolutionaries under the
leadership of Charu Majumdar (radical one in CPI(M)), Jangal Santhal, and Kanu
Sanyal.
3. Inspired by the Maoist philosophy, they called for a similar communist revolution in
India.
4. In 1967, a violent movement erupted against the perceived class enemies.
5. Locals resorted to various forms of violence against the moneylenders and the
landlords sparking a cycle of violence, State Retaliation, and counter-retaliation by
the Extremists.
6. This marked the onset of the Left-wing Extremist movement in India characterised
by Mao as the Spring Thunder.
7. Though the situation in Naxalbari was contained within a few weeks.
8. It inspired similar groups throughout the nation.
9. Naxalism rooted in Left-wing Ideology originated in one district in 1967 and
eventually expanded over to 180 districts often referred to as Red Corridor (Jairam
Ramesh- Red corridor- Extends from Tirupati (AP) to Pashupati, Nepal)
10. By 2009, 1/3rd of districts in India affected by Naxal Violence; 2005- Manmohan
Singh- LWE as the biggest internal security threat; 2010-Chintanal- Dantewada,
Chhattisgarh-a convoy of 75 CAPF personnel gunned down by Maoists.
11. Burhapahad area, Chhattisgarh- India, since independence, was able to establish its
presence for the first time here in 2023.
IDEOLOGY OF NAXALITES
• Naxalites aimed at overthrowing the Indian state and establishing a communist
regime similar to China.
• They advocated for the use of extreme violence drawing inspiration from the Mao
concept of "Revolution through the barrel of a gun".
PRESENT STATUS OF NAXALISM IN INDIA
1. According to recent government reports, Naxalism remains a significant challenge in
India with ongoing activities impacting various regions.
2. The MHA has highlighted that Naxalism has resulted in the loss of over 13000 lives in
the past two decades including civilians and security personnel.
3. Initially rooted in agrarian and caste issues, Naxalism has expanded its agenda to
address various societal concerns across the country.
4. While it originally concentrated on the rural areas in West Bengal and Odisha, it has
gradually extended its reach to the underdeveloped rural and urban areas in other
states.
5. Despite its rural origins, Naxalism continued to receive its support from the
segments of the Urban intellectual class.
6. The recent assessment suggests that the government's counter-insurgency
operations have made some progress in containing Naxalism.
7. However, the movement's ability to sustain itself through local grievances and
external support networks remains a big challenge for the security forces.
NAXALISM
Phases of Naxalism in India-
• 1st Phase (1967-71)- Phase of origin and agrarian movement
- Begins with Naxalbari Movement and ends with death of Charu Majumdar
(founded CPI-ML which further broke up into multiple sprintler groups after his
death)
- During this phase, the movement emerged as a response to the exploitation of
poor peasants and tribal communities.
- Some of the issues - Caste conflict, alienation of land, and unemployment among
the youth.
- Regions of Influence- Rural areas of West Bengal, Odisha, and certain parts of
Bihar.
• 2nd Phase (1980-mid 1990)- Phase of extension and ideological development.
- Issues- Caste Conflict/operations (esp. Bihar), displacement due to various
developmental projects, displacement due to faulty policy of the government-
mega hydropower projects; displacement due to faulty policies of the govt
(Forest Conservation Act, 1980- tribals evicted from forested land)
- Areas of influence- Maharashtra, Jharkhand, West Bengal, Andhra Pradesh, Bihar
• 3rd phase (1990-2010)- Phase of aggressive expansion
- 2004- Two major Naxal groups joined hands- People war group and Maoist
communist centre + numerous sprintler groups→ CPI-M born
- During this phase, the Naxal movement expanded in India very aggressively.
- Issues- Increasing inequality in society (LPG Reforms-educated got jobs, many left
behind); displacement due to mining, and various developmental projects
- Areas of influence- Chhattisgarh, Jharkhand, Bihar, West Bengal, Maharashtra,
Andhra Pradesh, Tri-junction area of UP, MP, Bihar, Parts of Karnataka, Odisha
• 4th Phase (2010- till the present)- Phase of gradual decline and aggressive state
response
- Naxalism experienced a resurgence during the mid-2000s and during this phase,
the issues included - local grievances, tribal displacement, and resource
exploitation by corporate entities.
- Regions of influence- Chhattisgarh, Odisha, Jharkhand, certain parts of
Maharashtra, Kerala, UP.
REASONS FOR THE RISE OF NAXALISM
1. Land-related issues
- Displacement of the local population due to various developmental projects has
led to dissatisfaction and anger towards the Indian state.
- Most of the Naxal-affected areas are mineral-rich regions and exploitation of
these minerals has often resulted in forced displacement of locals.
- The eviction of the tribals and other forest dwellers from the forested lands and
derecognition of their rights over the forest produce (Forest Conservation
Act,1980)
- Land grabbing by the money lenders and outsiders (tribals followed barter
system but Britishers asked for taxes in money form→borrow money at
exorbitant rates)
2. Development-related factors
- Widespread poverty and Economic Inequality in the Naxal-affected areas have
been one of the major causes of the rise of Naxalism. For example, as per the
survey in Dantewada, only 26% of the households have access to clean tap water.
- The Aspirational District Program of NITI Aayog focuses on bringing
development to the most backward districts of India has 90% of districts common
with the Naxal affected areas, clearly reflecting the economic status of these
areas.
- The health and educational facilities are not up to the mark and pale in
comparison to the other parts of the country.
- These regions rank poorly on various development indices and post-globalisation
people in these districts have been exposed to development elsewhere, leading
to further discontent- feeling of relative deprivation.
- The local communities feel that the benefit of exploitation of natural resources
has not been passed on to them. Ex- Bhilai Steel plant- people displaced by
convincing them of employment and better standard of living but due lack of
skills and education, outsiders came and they were again deprived.
3. Political and social factors
- Several provisions of Schedule V have remained on paper and have not been
implemented in their true spirit. (‘Jal, Jangal, Jameen, Jameer’- principle of
Naxals)
- Often the interests and the voices of the marginalised have been ignored at the
interest of the rich and the powerful in the society.
- Caste-based violence in certain regions has resulted in retaliation and rebellion
from the oppressed classes.
4. Administrative factors
- The government machinery has failed to reach these areas creating a vacuum of
any formal administration and this void has been filled by the Naxalites who
have set up parallel healthcare facilities, courts, etc.
- Delay in scheme implementation: Popular schemes for the development of
these areas have taken too long to be designed and implemented.
- Skewed Development: Even the schemes that have been implemented have
benefitted only certain sections of society who are socio-economically advanced
and not the ones who need them.
- Postings as Punishment: In the past, postings in these areas were considered as a
punishment and as a result often the demotivated officers were posted to such
areas resulting in poor governance.
- The propaganda machinery of the Naxalites has been able to convince the locals
that the state has failed to take good care of them and that their only hope is the
Naxalites.
5. Vested interests and external factors
- The unholiness nexus between the bureaucrats, politicians, and the mining mafia
who want to promote Naxalism for their private gains.
- The role of external state actors such as China in providing overt or covert
support to Naxalites or Maoists.
6. Environmental factors-
- Destruction of local Ecology: The tribal communities are heavily dependent upon
natural resources such as rivers, forests, etc. that have been degraded due to
mining and other polluting activities further pushing the tribals into a
marginalized position.
MEASURES TAKEN TO DEAL WITH NAXALISM
1. Developmental measures-
- Schemes such as PMGSY, Aspirational Districts program, and LWE Mobile Tower
project.
- Several state governments have initiated programs to renovate panchayats,
public health centres, school buildings, etc.
- The state government of Chhattisgarh launched the 'Choo-lo-aasman program'
to provide free coaching for competitive examinations to students in these
districts.
- Setting up of Eklavya Residential Model schools, and political empowerment of
local communities through programs, through policies, and laws such as PESA,
and the Forest Rights Act.
- Special central assistance to fill the gaps in critical infrastructure in such districts.
- Setting up multiple Skills developmental centres under PMKVY.
2. Law and order measures-
- On Capacity Building front, Modernization of the police force scheme
- Security-related expenditure scheme under which states are reimbursed
expenses related to security measures to combat Naxalites.
- Setting up of multi-agency centres at the national and at state levels to collect
actionable intelligence inputs.
- Some of the states have set up special Guerilla warfare units like the Greyhounds
of Andhra Pradesh.
- Introduction of helicopter services for logistical support.
- Deployment of CAPF such as the Cobra battalion of CRPF.
- Setting up of LWE division in MHA.
- Chief minister’s Group under the leadership of the union Home Minister to
provide a concreted response at the policy level.
- The SAMADHAAN Doctrine evolved by MHA in 2017 to put in place a common
policy for the entire country to deal with Naxalism.
- Building a positive perception of the government through Nukkad Nataks and
programs such as civic action plans.
CRITICAL ANALYSIS OF INDIAN STATE’s APPROACH
• Lack of coordination between the states. For example, the state police agencies
have been reluctant to share intelligence inputs with each other. Ex- Chhattisgarh DG
blame Andhra Pradesh for not sharing intelligence inputs; Chintanal massacre
• Lack of coordination between the state police and the central security forces- The
states have been guilty of showing an attitude of indifference towards Naxalism
leading the matters in the hands of the centre.
But Naxalism needs to be tackled at ground level where State police forces must be
trained and involved since they have the idea about the topography and local
conditions of the state.
• Lack of a uniform policy for surrender as well as a lack of emphasis on
rehabilitation once the surrender is done. (surrender arms→money given→again
buy arms) + Lack of common database (surrender in one→ work in other)
• Lack of coordination between Police forces and Civil administration. For Example,
often an area that has been cleared of Naxalite presence has faced the apathy of
civilian administration in bringing rapid development and as a result, these areas
have fallen back into the lap of the Naxalites.
Often the infrastructure developed by the civilian administration has not been
provided adequate protection by the security forces making the developmental
efforts a wasteful activity.
Andhra Pradesh model of combating Naxalism-
• Andhra Pradesh suffered massively from Naxalism in the 1980s and 1990s and to
deal with the problems comprehensively, the state adopted a comprehensive policy
on law and order and the developmental front.
• The government launched a revamped PDS under which the foodgrains were
provided to the most marginalized in the Naxal-affected districts.
• The government also focussed on rapid socio-economic development by improving
road connectivity and health facilities in such districts.
• A scheme named Jal Yagnam was introduced to provide access to clean tap water to
the marginalized.
• A massive program of land reforms was introduced that included the Digitization of
land records to stop exploitation at the hands of moneylenders and the reduction of
discretionary powers in the hands of lower bureaucracy which was considered to be
extremely corrupt.
• The state set up an elite Anti-Naxal force to combat the Naxalites in a specialized
manner- Greyhounds of AP- The members of this force were trained in guerilla
warfare and counter-Maoist strategy and carried out several surgical operations.
• As a result, more than 800 Naxalites were killed in operations forcing the others
either to retreat or surrender.
• Several surrendered Maoists became the eyes and ears of the security forces.
Hint for Questions- Multilayered strategy- strategy at national, state, local level OR political,
social, administrative, etc
WAY FORWARD
• Political measures
- Tribal advisory councils should be revamped along with Schedule V.
- The government should provide access to forest resources to tribals and also
help them protect their traditional knowledge and customs.
- Dilip Singh Bhuria's committee recommended that 50% of the ownership of the
developmental projects should be assigned to the local people.
- Encouragement of NGOs to seek their help in establishing a connect with the
people in these areas.
• Administrative measures
- Posting dedicated officers and giving them security of tenure.
- Rigorous monitoring of developmental schemes.
- Sensitizing the bureaucracy toward the problems of the marginalized.
- Compulsory field visits for administrative and police officers.
- Providing exemplary punishment to the officials having a nexus with the
Naxalites.
- The Union must design a model surrender cum rehabilitation policy.
- Involvement of the local population in drawing up developmental plans.
• Economic Measures
- Upgrading infra and improving connectivity of Naxal-affected districts with the
rest of the country
- Providing extensive skill training to the youth in LWE districts.
• Law and Order Measures
- Innovative measures are to be deployed to prevent IED-related incidents.
- Organization of security forces in smaller groups to ensure greater efficiency and
speed- imp for guerilla warfare.
- Holding peace talks with Naxalites willing to adopt a dialogue-based approach
- Bridging the trust deficit between the citizens and the security forces through
interventions exercised by the security forces.
MONEY LAUNDERING AND ITS PREVENTION
Definition, Process, Hawala Transactions, Impacts, AML measures by GoI- PMLA 2002,
Global Efforts, challenges wrt ML, Way forward
• Black Money- Unaccounted Money-Money you possess but authorities don’t know
about it- tax evaded money, illegal activities
• Money laundering in general refers to cleaning up illegally earned money (proceeds
of crime) and projecting it to be earned through legal sources.
• Ex- money earned from drug trafficking and to use it, person set up car wash and
thru overinvoicing (10 customer hai to 5k dikhayega ya $10 mai car wash $50 mai
dikhayega). He cannot put in bank and buy 1 cr car, PAN card details mangega-
authorities will get to know ki 1 cr kahan se aaya)
• The criminal activity ends up generating huge profits. Money laundering is the
process of disguising the illegal origin of such proceeds of crime. It is often used by
criminals involved in activities such as arms trafficking, drug trafficking, extortion,
bribery, etc.
• Money laundering primarily has two objectives: First to hide the source of the
proceeds of the crime; and second, to enjoy the money earned through illegal
sources.
Hawala Transaction/ Hundi
• It is a parallel remittance system to transfer money from one place to another
without the physical movement of the money. (Info in copy)
• It operates on the basis of the trust of various hawala agents who are involved in
such transactions. It is a powerful tool in the process of money laundering as it aims
at hiding the source of the proceeds of crime.
• It is used by corrupt politicians, bureaucrats, industrialists, and criminals to either
evade taxes or to hide their wealth.
• It is also used to fund terror activities making it difficult for the authorities to detect
the origin of funds for the terror organisations.
• In India, laws such as FEMA and PMLA deter individuals from hawala transactions.
• This system has been prevalent in South Asia for a very long time. It has been used as
a tool for transferring money due to the following reasons:
1. Anonymity
2. Lower transaction costs
3. Lesser paperwork
4. Lack of scrutiny from the authorities
5. Religious Reasons- banking system prohibited- earning interest on money
kept in banks.
Process of Money Laundering
1) Placement - It is the first stage in the process of money laundering and also the riskiest.
It refers to placing the proceeds of crime into the formal financial system for the first
time. Various tools that are used at this stage include:
- Structuring deposits or smurfing refers to breaking up large amounts of cash into
less obvious smaller sums which are then deposited directly in different bank
accounts.
- By purchasing a series of monetary instruments such as bank drafts that may be
collected and deposited into one or more accounts at different locations.
- buying luxury assets such as gold, gems, watches, real estate etc.
- Exchanging funds into foreign currency through a private exchange dealer and
sent money outside India in Swiss Banks as investments.
2) Layering -In this stage, money is taken through multiple transactions so that it becomes
impossible to detect the original source of the money.
- During this stage, the launderer engages in a series of transactions to distance
the money from its source. At times, money may be spread through numerous
accounts across the globe, especially in those countries that do not cooperate in
anti-money laundering investigations.
Some of the tools used at this stage include:
- Cross-border transfer of money
- Hawala transactions
- Investment in cryptocurrencies; and
- sale and purchase of luxury assets.
3) Integration - it is the last stage in which the laundered reintroduces the money into the
legitimate economy after mixing it up with legitimately earned money. Some of the tools
used at this stage include:
- Generating false export invoices- undervoicing and overinvoicing, setting up shell
companies, and generating false loans or false FDI receipts.
EFFECTS OF MONEY LAUNDERING
1) Economic Effects
• It distorts policy making and it becomes difficult to set the policy rates for
policymakers – can inflate the rates and difficult to assess the money supply.
• Reduced tax revenues - money laundering often involves tax evasion and
governments may lose significant tax revenues as a result.
• It may distort the level playing field in the economy, especially for the newer
businesses.
• Economic instability - It can lead to sudden and unpredictable inflows and outflows
of capital resulting in financial instability.
• It may damage the reputation of financial institutions leading to loss of customer
trust and increased scrutiny from the international regulators.
2) Political Effects
• It may provide financial support to terrorist organisations therefore creating security
threats.
• Corruption facilitated by money laundering can lead to manipulation of elections or
democratic processes and defections.
3) Societal Effects
• It may enable the criminals to profit from illegal activities further perpetuating crime
and corruption.
• Citizens may lose trust in financial and political institutions often resorting to taking
the law into their own hands (vigilante).
• It discourages an ethical way of life as in a materialist society, ends matter more
than the means.
4) Global Effects
• Countries perceived as 'havens' for money laundering may end up having a strained
relationship with other nations.
• Money laundering can contribute to global financial instability by compromising the
integrity of the international financial system.
Examples and Instances
• The Panama leaks in 2016 exposed how offshore tax havens are used by wealthy
individuals to launder money and evade taxes.
• The 1MDB scandal involved the laundering of billions of dollars from a Malaysian
state investment fund involving several high-level officials and financial institutions
worldwide. (highest FDI from Singapore, Malaysia-how?)
ANTI-MONEY LAUNDERING STEPS TAKEN BY INDIA
1) Legal Measures

• The Income Tax Act, 1961


• The Prevention of Money Laundering Act, 2002.
• The Benami Transactions Act 1988- Benami Property- Those held by the owner
through proxies- Beneficiary in the transaction related to property is not the owner
of the property.
• The Narcotics Drugs and Psychotropic Substances of 1985- non-bailable offences
• The Foreign Exchange Management Act of 2000
2) Institutional Measures

• Setting up of the Enforcement Directorate (ED) which is the nodal agency to enforce
the provisions related to PMLA and FEMA
• Financial Intelligence Unit (FIU-IND) - It is responsible for receiving, processing,
analysing, and disseminating information related to suspect financial transactions. It
is also the nodal agency to cooperate with the FIUs of other countries. (India part of
FATF)- Providing intelligence inputs to ED or similar other agencies.
• RBI and SEBI have been provided with regulatory powers over the banks and
secondary markets to ensure their compliance with Anti Money Laundering
Provisions.
3) Policy Measures
• KYC guidelines require banks and financial institutions to verify the identity and the
address of their customers.
• India has entered into MLATs (Mutual Legal Assistance Treaties) with other countries
to facilitate cooperation in investigating and prosecuting money laundering-related
offenses.
• Awareness campaigns to educate the public about the risks and legal consequences
of money laundering.
PMLA 2002

• It was brought into force in 2005 and gave powers to the ED to enforce the
same. Some of the important components of this act are as follows:
1) It defines the offense of money laundering.
2) It provides a list of offenses that are prerequisites to prove the offense of money
laundering.
3) ED has been provided with powers to investigate including conducting search,
seizure, and arrest. It can even attach a property obtained through the proceeds of
crime.
4) Special courts may be set up to dispose of the cases swiftly.
5) Financial institutions need to observe certain compliances and reporting
requirements- track financial transactions of customers so that they can provide the
related data to ED when needed.
6) Reciprocal arrangements (MLATs) have been included to promote cooperation with
other countries in anti-money laundering investigations.
7) Financial institutions including crypto exchanges need to set up reporting
mechanisms to report suspicious financial transactions to the concerned authorities.
Q- Money laundering poses a serious threat to the economy and society. In this context,
discuss the various measures taken by India and the global community to overcome this
menace.
MEASURES TAKEN GLOBALLY TO COMBAT MONEY LAUNDERING
1) Setting up of Financial Action Task Force (FATF)- short note on this- functions
2) 1988 Vienna Convention - The convention against illicit traffic in narcotic Drugs and
Psychotropic Substances. The convention recognizes that illicit drug traffic generates
large financial profits enabling organized criminal groups (OCGs) to penetrate the
government and society at different levels. (election financing)
- It provides a comprehensive definition of money laundering and provides a
mechanism for mutual international assistance between various nations.
3) Strasbourg Convention -The Council of Europe's convention on laundering- search,
seizure, and confiscation of proceeds of crime was opened for signature in 1990. It
adopts the same definition as the Vienna Convention and includes provisions on
international cooperation in areas of seizure, confiscation, and mutual assistance in
investigations.
4) The OECD Convention on Corruption -The convention on combating bribery of
foreign public officials in international business transactions aims to protect
international trade from corrupt activities.
5) The UN Global Program Against Money Laundering
6) Basel Statement of Principles- KYC guidelines have originated from here.
7) Asia Pacific Group on Money Laundering
8) Egmont Group aims at improving cooperation by facilitating the sharing of
intelligence inputs between various FIUs- wrt esp trans-national criminals or OCGs.
9) IMOLIN - a platform to share real-time information with respect to suspicious
financial transactions and transnational criminals.
10) The New York Action Plan - adopted in 1988, provides an improved and updated
strategy to combat money laundering. It is the most widely accepted anti-money
laundering standard adopted by 185 members of the UN.
Q. Money laundering poses a serious threat to global financial stability. Despite several
domestic and international measures, India continues to suffer due to money laundering.
Comment.
CHALLENGES FACED IN COMBATING MONEY LAUNDERING
1) The enforcement agencies have been unable to cope with the speed of the growing
technology that facilitates money laundering (Technology - governance conundrum).
2) Multiple agencies have been set up to deal with various aspects of money
laundering but they lack convergence (lack of cooperation, overlapping functions,
lack of accountability) whereas criminals work in unison with each other. (Structural
challenges)
3) Increased competition in the banking sector has forced the banks to lower their
guard and as a result compliance with regulations such as KYC norms has become
much weaker. (Regulatory challenges)
4) Developing economies (tax havens) prioritize economic growth and foreign
investment over stringent AML measures (Economic challenge).
5) Enforcement agencies lack adequate funding and trained personnel (operational
challenge).
6) Money laundering investigations often involve cross-border cooperation but
differences in legal systems (corporate secrecy in Singapore-diffficult to identify the
owner of shell companies, if any) hamper these efforts. (structural challenge)
7) 85% of India's economy is informal in nature with a high prevalence of cash
transactions making it easier for money launderers. (Structural Challenge)
8) Political influence and corruption can undermine the effectiveness of AML
measures. Vested interests deliberately prevent desired investigations into such
issues. (Political challenges)
CHALLENGES POSED BY GLOBALISATION AND TECHNOLOGY IN COMBATING MONEY
LAUNDERING
Technology
• Emergence of newer forms of exchange of money (digital currencies- encrypted in
nature evading investigation). They offer anonymity and can be transferred across
borders without much regulation. Most countries have failed to develop regulations
on this issue.
• The volume of digital financial transactions has increased considerably making it
difficult for the enforcement agencies to identify suspicious financial
transactions. (Add data)
• Emergence of the dark web that provides unhindered access to laundering services.
• Blockchain technology can hinder access to tracking illicit transactions.
• The emergence of encrypted channels of communication makes it difficult for
security agencies to detect communication between criminals. (WhatsApp)
Globalization

• Globalisation has made it easier to move funds across borders allowing money
launderers to evade various regulations.
• The rise in offshore financial centres and tax havens has provided launderers with
jurisdictions that offer greater secrecy and a favourable banking environment. E.g.-
Panama Papers- Mossack Fonseca
• Emergence of a complex network of criminal groups that aid each other in illicit
activities.
• Different countries have varying levels of regulatory mechanisms making it easier
for launderers to evade the rules from one country to the other.
However, Globalisation has also facilitated the cooperation between investigation
agencies at global level. Ex- Vienna Convention.
HOW TECHNOLOGY IS AIDING IN OVERCOMING MONEY LAUNDERING

• Digital KYC solutions to authenticate the identities of banking customers.


• AI and ML tools analyse transaction patterns to detect unusual activities related to
money laundering. For example - HSBC
• Deployment of blockchain technology to track the history of transactions making it
harder to hide illegal activities.
• Use of advanced data analytics and data mining techniques by FIU India.
• NPCI monitors UPI transactions for suspicious patterns and potential money
laundering activities.
WAY AHEAD

• Strict penalties must be imposed on financial institutions that do not report


suspicious transactions to the concerned authorities.
• Employees of financial institutions must be trained adequately to spot potentially
suspicious transactions.
• Creating public awareness as the masses often do not understand the disastrous
consequences of availing services such as hawala.
• Investigation agencies such as the CBI and state police should be trained more
effectively to conduct quality investigations in predicate offenses- accused needs to
be proven that he/she is involved in criminal offense too- drug trafficking, terrorism,
etc- That’s why conviction rate under PMLA is so low.
• Money laundering is a transnational problem, and unless coordination is secured
between the security agencies of various countries, combating it would be an uphill
task. (Add specific examples yourself)
• Developing public-private partnerships and strengthening the role of the private
sector in combating money laundering.
LINKAGES BETWEEN ORGANISED CRIME AND TERRORISM

• Organised crime is a well-planned sophisticated crime usually performed by a group


of people whose business is crime.
• It is a criminal activity that is performed with the objective of earning money. (*Ex-
Twitter account of ISIS handled by engineer in Bangalore)
• As per MCOCA, it is defined as an unlawful activity by an individual usually as a
member of a criminal syndicate by the use of violent means or other unlawful means
to gain undue economic or other advantage. (*Ex- movie American Gangster,
Jamtara, Godfather)
• Some examples of organized crime include counterfeiting of currency, human
trafficking, illegal mining, etc.
• Some of the characteristics of organized crime include –
- Use of violence
- Driven by monetary objectives
- Strict hierarchy within the organization
- Division and specialization of work.
- Strict membership criteria and stringent loyalty standards.
- Underground/clandestine nature of functioning.
DIFFERENCES AND SIMILARITIES BETWEEN ORGANISED CRIMINAL GROUPS AND TERROR
GROUPS
Differences

• OCGs are focused on earning money alone whereas TGs have several objectives
including social and political objectives.
• TGs deploy extremely violent means and sophisticated arms such as hand grenades,
AK-47 etc, whereas OCGs use less violent means such as small arms.
• OCGs do not prefer to get into conflict with the state whereas TGs are explicitly in
conflict with the state and aim at overthrowing the same.
• OCGs avoid public attention and try to maintain a low profile whereas TGs thrive on
publicity and seek media attention for their acts.
Similarities

• Both are criminals in the eyes of the law.


• Both use violence as a means to achieve their final objective.
• Both are highly adaptive, innovative, and resilient.
LINKAGES BETWEEN ORGANISED CRIMINAL GROUPS AND TERROR GROUPS

• Co-existence - OCGs and TGs exist simultaneously in geography but operate


independently without a common area.
• Co-operation -OCGs and TGs develop a symbiotic relationship and provide formal
support to each other. For example - the OCGs may provide support to TGs for the
procurement of explosives, forged documents, cross-border movement through
trafficking routes, and funding. Example - 2004 Madrid bombings – Al Qaeda sourced
explosives from OCGs based out of East Europe.
- OCGs may also rely on TGs for their survival. TGs can provide training in the use
of arms and since they have a territory under their control, they may provide safe
refuge to the OCGs.
- Ex - In 1993, Bomb blasts in Bombay were carried out with the support of D
company (Dawood Ibrahim group)
• Confluence -At this stage, the OCGs and the TGs combine and pursue objectives as a
single identity. For example - the Taliban controls a large part of the poppy cultivation
and opium trade in Afghanistan. Similarly, ISIS is engaged in selling oil from the oil
wells in Syria and Iraq in the International markets.
LINKAGES BETWEEN OCGs AND TGs IN CONTEXT OF INDIA
1) Naxal Affected Areas - Naxals are often engaged in extortion of public officials in
areas under their control. They charge extortion fees from local businesses and
traders which they call the 'levy.' Illegal mining in such areas is also carried out under
the protection of the Naxals.
- A large part of cannabis production and trade in India is controlled by the
Naxalites.
2) Insurgency-affected areas in the North East -Insurgent groups protect the OCGs
involved in activities such as narco-trafficking, human trafficking, illicit wildlife trade,
extortion, etc.
- A number of former insurgents are now involved in organized crimes themselves.
OCGs provide support to the insurgent groups to move to and fro between India
and the neighbouring countries. (Parliamentary Committee Report)
3) Kashmir -In Kashmir, the militants are not dependent on organized crime for their
survival, as they are supported by external state funding. Despite that, some of the
government reports do suggest the involvement of terror groups in narco-trafficking
and FICN (fake Indian currency notes) trade.
- Also, certain organizations (CSOs) provide support to the militants as over-the-
ground workers (OTG). They aid the militant groups in the following manner:
1. Raising funds
2. Spreading false propaganda.
3. Radicalisation of youth
4. Finding new recruits
5. Providing safe refuge for wanted terrorists
Q. Complicated linkages between terror groups and OCGs have become a source of
headache for security agencies across the world. Elucidate. What are the reasons for the
growing proximity in recent times between OCGs and TGs?
Reasons for Growing Proximity:
1. Forces of globalization and modern means of communication have made it easier
for the two to develop alliances with each other.
2. Technological advancements such as the rise of the dark web and encrypted
channels of communication have enabled them to collaborate more effectively.
3. The global war on terror after the 9/11 attacks and the withdrawal of the Soviet
forces from Afghanistan (CIA of US stopped sponsoring after this to resist Soviet)
dried up funding for the terror groups making their reliance on OCGs inevitable.
4. Ongoing conflicts and political instability in different regions have created a
governance vacuum that has been filled by alliances of OCGs and TGs. (Africa and
Middle East)
5. OCGs believe that developing stronger linkages with terror groups would help them
in expanding their global footprint.
6. Economic crisis and widespread poverty have driven individuals to engage in various
crimes creating a large pool of potential recruits for both OCGs and TGs.
CONSEQUENCES OF LINKAGES BETWEEN OCGs AND TERRORIST GROUPS

• It acted as a force multiplier making it more challenging for the security agencies to
act against them.
• They have developed greater resilience to evade law enforcement and sustain their
operations.
• It has expanded its geographical reach due to the formation of transnational
networks.
• It has enhanced the access to funding for the terror organizations. Ex- nexus
between Naxalites and illegal mining mafia- Naxalism able to thrive due to this.
• It has increased instability and violence in regions where both groups operate. For
Example: In Somalia the alliance between terrorist groups and organized criminal
groups that has overtaken the state machinery.
• It has negative effect on the economy due to heightened illegal activities.
• Increased risk of terrorist attack and organized crime-related violence. Ex-
Insurgency in North East
CHALLENGES FACED WITH RESPECT TO COMBATTING SUCH LINKAGES
Legal Challenges:

• Inadequate legal framework: Only a few states have enacted a special legal
mechanism to deal with organized crime such as Delhi, Gujarat, Maharashtra, etc.
• The present provisions under the IPC are not enough to deal with the challenges
faced by security agencies in the case of organized crimes. IPC- doesn’t define
organised crime, BNS does.
• The lack of a comprehensive definition of terrorism globally is also a big challenge.
• The state police forces lack the weaponry as well as the capability to combat
organized criminals who often use sophisticated arms. CAG Report: 75% shortage in
weaponry in Rajasthan state police forces.
• These linkages often span across multiple geographies requiring cooperation
between various security agencies which is lacking.
• The use of advanced technologies has weakened surveillance and intelligence-
gathering efforts.
• Lack of awareness among the citizens and glorification of organised criminals in
cinemas has attracted the youth to such organisations.
• Terrorists and organized criminals are highly adaptive and often change tactics in
response to law enforcement measures, making it difficult for security agencies.
• Vested interests between criminals, politicians and bureaucrats have compromised
the investigation and prosecution of organized criminals and terrorists.
RECOMMENDATIONS AND WAY AHEAD

• Having a good understanding of the nexus between terrorist organizations and OCGs
is important for determining the policy choices to deal with these issues.
• In the absence of a uniform approach by the states on this problem, the Union
government may consider model laws on organized crime, that may be adopted by
various states.
• Enhancing coordination among the law enforcement agencies, customs and judicial
bodies.
• Providing specialized training to the law enforcement agencies and the judicial
officials.
• Multi-lateral and bilateral treaties to encourage intelligence-sharing
agreements/arrangements among the security forces.
• Regulating the use of cryptocurrencies to overcome the challenges posed to
financial agencies.
• Setting up of special crime cells within the state police departments to deal with the
problem in an effective manner.
• Enhancing public-private partnerships, especially in the banking sector to overcome
the threats posed by terror financing.
ROLE OF MEDIA IN INTERNAL SECURITY- Printed Notes -Important

• The media which is the fourth pillar of democracy has a very important role to play in
the formulation of public opinion.
• It plays a crucial role in holding the government accountable and promoting an
informed discussion among the citizens.
• On national security issues, the media plays a very crucial role.
• Some of the challenges thrown up by media while covering national security issues
are as follows:
1) Sensationalization of national security issues:
• Media especially TV news channels have often been guilty of sensationalizing
national security issues creating panic among political and security agencies at
times such acts further promote the objective of the terrorists. Ex- image as of
victims after Pulwama Attack
• For Example, The carelessness of the media during the coverage of the IC-814
hijacking costs India heavily.
• Report accurately the movement of security forces- after 2001 Parliament attack-
India on the verge of war with Pakistan
• The round-the-clock reporting (earlier in bulletin 5-6 hrs now 24 hrs) emboldened
the terrorists to think that they could get any concessions from the Indian
government with such pressure.
2) Lack of training in covering War operations:
• For Example: During the Kargil conflict lagged in training and preparedness and
often irresponsibly covered the events.
• At times news about armed forces has been brought to the notice without any
thought of its impacts.
3) Irresponsible coverage of anti-terror operations:
• News channels have been often involved in irresponsible coverage of anti-terror
operations.
• For Example, the 26/11 Mumbai terror attack and counter-terror operation live
reporting by the media almost jeopardized the operation.
• During the Surgical operation against NSCN, the media agency published the
photographs of the team involved in these operations, therefore, risking their
lives.
4) Stereotyping of certain individuals or groups:
• The perennial war of ratings has led them to outdo their competitors, they often
report in a manner that instigates outrage rather than increase awareness and
initiate debate.
• They fuel prejudice and create conflict in society.
5) Fake News and speculation:
• The media issues the information before verifying it. Ex- 2000 rupees note with a
chip- US would also be curious!
• The distinction between facts, and opinions which are the basics of the media has
blurred.
• Indian news channels have become view channels.
• Reporting in subjudice matters needs to be careful.
6) Reporting on sub-judice matters and conducting parallel media trials
• They declare a person as guilty or innocent as per their vested interests, it
compromises the rule of law and the working of the enforcement agencies.
• Often the lines have been blurred between investigative journalism and
investigative agencies themselves. Ex- In Ryan International Murder case,
conductor responsible by media but another child responsible as per police
investigation
7) Lack of sensitivity in coverage of caste-based violence, sexual violence, communal
violence, terrorist attacks:
• They swarm the victims of violence. The news channel often portrays the state of
victims and other heinous crimes in a dramatized manner causing unnecessary
distress to victims and their families.
HOW MEDIA MAY BE USED AS A TOOL TO ENHANCE INTERNAL SECURITY

• Public awareness:
- It may be used for sharing important information and alerts about potential
security threats or natural disasters.
- The citizens can be made aware of issues such as Cybercrime-Phishing, Vishing
scams and educated them, how to protect them.
• Community engagement:
- The media may try to promote engagement and dialogue between different
communities that can prevent radicalization and other threats.
• Crime prevention and investigation:
- The media may be used to appeal to the public to share information about
suspects in various cases.
- It should expose the real motives of the extremists, break the propaganda and
myths spread by Naxalites.
- Media should support the functioning of security agencies and report facts and if
encountered any piece of information, then should report the security agencies in
timely manner.
• Highlighting India's position on important matters to the international community:
- For Example, like in Kargil War media through on ground coverage played
important role in highlighting India’s side and decrease the negative fervour
against India at global level; the news channel played an important role after the
shooting down of Pakistan's Navy plane by India.
Q- Media is double- edged sword when it comes to National Security Issues. Analyse in
context of India.
Suggestion or Way Forward:
1. There is an urgent need to follow self-discipline.
2. The media needs to ask mature questions to politicians and relevant authorities.
3. There is a need for some introspection before responding to sensitive matters that
could lead to unwanted disclosure of military plans.
4. Only trained and proficient media personnel knowing security issues must be allowed
to cover national security issues.
5. The media houses must make efforts to recruit from institutions that teach security
studies.
6. We must evolve detailed guidelines to ensure ethics and professionalism in media. For
Example, BBC has provided detailed guidelines concerning reporting on terror issues.
7. In India, PCI (Press Council of India) does not have the power to regulate electronic
media (two self-regulatory bodies- NBSA and BEA) and there is a need to enhance its
jurisdiction.
Ideally, media should be self-regulated but if govt regulating it, then much bigger
issue. Cross Media ownership should not be allowed.
8. Some countries such as the USA, and Canada have enacted specific laws to regulate
the coverage of national security issues, but India must also consider introducing such
a law.
ROLE OF SOCIAL MEDIA IN CREATING CHALLENGES TO INTERNAL SECURITY- HANDOUT

• Social media refers to a group of interactive web 2.0 internet-based applications that
facilitate the sharing of ideas, thoughts, and information by people. Statistics- how
much internet penetration, how much twitter accounts, how much data uploaded
every minute.
• It is different from traditional media as it has a broader reach and allows two-way
communication and instant exchange of information. For Example, Twitter,
WhatsApp, Facebook, Quora etc.
Challenges Posed by Social Media to India's Internal Security:

• Hate Mongering- Social media spreads hate speech and nuisance in society. It has
been used to spread hate speech which has often resulted in communal tensions and
riots. The Delhi riots in 2020 were instigated through misinformation and hateful
messages spread on social media.
• Fake news- leading to creating panic and anxiety. For Example, in 2012, a Doctored
video clip over the internet led to an exodus of Northeast Indians from major metro
cities.
• Radicalization of Individuals: social media has often been misused for the
radicalization of individuals, especially the youth. Ex- In 2016, 22 people from Kerala
were reported missing and later it was discovered that they had joined ISIS in Syria
and Iraq, the investigations revealed that they had been radicalized through social
media.
- For Example, in 2017, A terror attack in London was carried out by an individual,
who had been radicalized through social media platforms.
- In 2017, a city in the Philippines was attacked by militants, who had been
radicalized through social media.
• For Spreading propaganda by extremist organizations: Naxalite groups often use
social media to spread misinformation about government schemes and programs. Ex-
5 operatives of CPI-M arresting by police radicalised by social media
• Targeting security personnel and their families: This phenomenon is known as
"Doxxing". In 2020, terrorists in J&K released a hit list of police officers and their
families on social media, urging their followers to attack them.
• Cyberbullying: Social media has become a tool for inflicting trauma and harassment,
especially against women. Ex- simply Virat could not score, people giving death
threats and rape threats to his wife and daughter.
• For performing Cybercrimes: It has been used to do cyber-crimes such as identity
theft (mera account hack ho gya-mere account se money mangna), phishing scams,
and sharing of obscene content.
- Cybercriminals are actively using social media to steal personal information.
- The promotion of Pornography and obscene content through social media
platforms can have adverse effects on the psychology of children.
• For Manipulating election outcomes and democratic processes: There have been
several allegations about the misuse of social media by foreign actors to interfere in
the domestic processes of other countries.
- For Example, Cambridge Analytica was accused of manipulating the voting
behaviour in the 2014 elections via information sourced from Facebook.
CYBER SECURITY
Definition in IT ACT,2000 section 2: It refers to protecting computer devices (any device with
computing ability- mobile), networks, and the information stored or transmitted to them
from unauthorized access, use, disclosure, disruption, modification, and destruction.
CYBER THREATS
1. Cybercrimes
2. Cyber terrorism
3. Cyberwarfare- 5th Generational Warfare
1. CYBER CRIMES

• It is conducted in Cyberspace.
• Crimes in the real world with the help of cyberspace.

Ransomware: Ransomware is a type of malicious software (malware) that threatens


to publish or block access to data or a computer system, usually by encrypting it,
until the victim pays a ransom fee to the attacker. Ex. Attack on AIMS server; Akira
Ransomware.
Phishing: It refers to an attempt to steal sensitive information in the form of
usernames, passwords, credit card numbers, bank account information, or other
important data to utilize or sell the stolen information.
Distributed denial of service attack (DDoS)- It is a variant of the denial-of-service
attack that uses a coordinated attack from a distributed system of computers rather
than a single source. It often makes use of worms to spread to multiple computers
that can then attack the target.
• These are those crimes performed either with the help of a computer device (in real
word like hacking CCTV then crime) or in which the computer device itself is a target.
Ex. Identity theft, Ransomware, Hacking, Denial of service attack, Cyber Stalking.
• Under the IT Act, the following crimes have been defined
- Section 67B related to child pornography. (by 2008 Amendment Act)
- Section 66B: Offence of dishonestly receiving stolen computer or communication
device.
- Section 66C: Offence of identity theft- using other person password and digital
signature
- Section 66E: When a person takes a photograph or a published picture in private
areas without consent.
- Section 67: Transmission of offense or sexually explicit content through electronic
mode.
• Recent instances of Cyber Crime in India:
- In 2017, more than 17 million accounts of users of e-commerce platform
Zomato were compromised.
- In May 2021, a ransomware attack on AIR INDIA temporarily shut down its
website and the attack demanded a sum of 5 million dollars.
- In 2023, Haldiram suffered a ransomware attack.
- In 2018, Cosmos Cooperative Bank in Pune was hit by cyber-attacks where the
hackers siphoned off 94 crore rupees by hacking the bank ATM server.
- In 2020, A Bollywood actress faced cyberbullying and was subjected to abusive
comments, threats and harassment on social media after announcing her
decision to quit acting.
2. CYBER TERRORISM

• According to section 66F of the IT Act, if a person is denied access to a computer


resource or if a person penetrates a computer resource without authorization to
threaten the unity, Integrity, and sovereignty of the nation, he/she shall be charged
with the offence of cyber terrorism.
• In simple words, it refers to either convectional terror activity carried out with the
help of cyberspace or the use of computer networks and other technologies to steal
sensitive information and spread propaganda or to create fear and terror in society
with or without physical violence.
• Funding-raising activity, Recruitment, and Radicalisation by terror organizations may
be termed as acts of Cyber Terrorism.
• As per experts to be classified as an act of Cyberterrorism, it should result in the
violence against person’s and property or at least cause enough harm to generate
fear of the same.
• Example- In 2020, Mumbai Power Grid was attacked by the Chinese group leading to
a power outage and disrupting cities electricity supply.
- In 2019, ISRO's computer systems were targeted around the launch of the
Chandrayan 2 Mission, the attacks believed to have originated from North Korea.
- In 2017, a Ransomware named PETYA disrupted the container facility at Nhava
Sheva port.
- In 2012, ARAMCO, the world's largest oil company faced a cyber terror attack
wiping out data of approximately 30,000 computers.
- 2013, the Muzaffarnagar riots were sparked by fake or doctored video clips
spread over the internet by terror organizations to create unrest and panic in the
society.

Q1) Cyberterrorism has become a big menace for security agencies across the world. Highlight
the reason for the terror group to increasingly use cyberspace for their activities.
Reason for a terror group using cyberspace:
1. Cost effectiveness.
2. Cyberspace provides anonymity.
3. Remotely carried out the terror attacks.
4. Wider Reach for disseminate information and spread propaganda to indoctrinate people.
Ex- Al Qaeda brings magazine ‘INSPIRE’
5. Recruitment Purposes- Bangalore man handling ISIS Twitter Account
6. Encrypted communication over cyberspace is easy to coordinate to plan terror attacks.
7. Mass training through online sources- hacking tutorials
8. Fundraising activity- Dark web, crowd funding, cryptocurrencies

3. CYBER WARFARE

• It is also termed as the 5th generation or the invisible warfare. (Air, water, land,
space- post WW-2, cyber)
• It refers to the use of digital technologies to conduct military operations against
other adversary states.
• It has become a preferred mode to cause damage by disabling a country's
communication and command system stealing sensitive information and spreading
misinformation.
• Cyber warfare aims to achieve strategic military-political advantages over an
adversary state and targets critical information infrastructure (Airports, Railways,
energy production, Banking), military assets, and govt systems.
Some of the examples of cyber warfare in the recent times include:

• 2017 Kudankulam Nuclear power plant was attacked by a malware named D-track
which is believed to have originated in North Korea.
• 2010: A virus named Stuxnet targeted Iran's nuclear facilities which is widely
believed to have been developed by US and Israel.
• 2016: Ukraine's power grid was attacked by Russian hackers.
• 2014: Operation Desert Eagle Target govt and military website of Israel.
• 2007: NATO and Govt websites were targeted in Estonia possibly by Russian state
troops.
Q2) Discuss India's vulnerability and strategy with respect to modern-day cyber threats.

INDIA'S VULNERABILITY TO CYBER THREATS


The critical information infrastructure in India has witnessed consistent attacks in the last 5
years.

• The ransomware attack on the AIIMS facility and the attack on the Mumbai power
grid are some examples.
• As per NCRB data, there has been a jump of over 4 times in cyber-crimes over the
last 5 years.
• Data breaches leading to Identity theft and financial fraud have become a menace
for security agencies.
• As per a report, India is among the top 5 targets in the Asia Pacific region with
respect to Cyber Espionage.
• India's internet penetration has gone up from a mere 4% in 2007 to over 45% in
2021 which has further increased the chances of cyber-attacks.
• India's Renewed digital governance means that the govt is storing huge amounts of
citizen data across various levels further increasing our vulnerability.
• Several other countries China, the US, and Israel have developed cyber warfare
capabilities increasing our vulnerability to cyber warfare.

Q3) To deal with various cyber security threats India's cyber security infrastructure needs
to be more than a mere patchwork. Comment.

INSTITUTIONAL MEASURES
A. National Critical Information Infrastructure Protection Centre (NCIIPC).
• It is a nodal agency to protect CII (Critical Information Infrastructure) from
cyberthreats.
Some of the functions:

• Identification of CII
• Assessing the risk and vulnerabilities of CII.
• Development and implementation of strategy for the protection of CII.
• Cooperation with other agencies about various threats faced by CII
• Capacity building of various stakeholders to combat challenges
B. The CERT-In (Cyber Emergency Response Team - India)

• Established in 2004 as a nodal agency to scan cyberspace 24×7 and to provide a


reactive and proactive (beforehand) response to various threats.
Specific Functions Performed:
- Dissemination of information related to cyber-attacks.
- Provide recommendations for strengthening of security of the computer systems,
working with Internet service providers to identify the systems that are
compromised and isolating them as well as taking corrective action to clean them
up.
- Collaborating with CERTs of other countries and disabling Phishing websites.
- Working with various sectoral CERTs to share intelligence and inputs of cyber
threats.
C. National Cyber Crime Coordination Centre (NCCCC):
• It is a specialized agency under MHA that tackles cyber-crimes especially ones having
implications for India's national security.
• It coordinates actions to various security agencies and investigates the cybercrime
and supports the prosecution.
D. National Technical Research Organisation- NTR
• It is responsible for the collection of intelligence, monitoring of cyber threats affecting
India's national security.
E. Defence cyber security.
• Set up under MoDefence, protecting India's military assets from Cyber-attacks.
LEGAL MEASURES
1. Nation cyber security policy, 2013
It was enacted with the overall objective of securing India's cyberspace and creating a road
map for providing a comprehensive and collective response to deal with the issues of Cyber
security.
NOTE: Prepare salient features and criticisms of national cyber security policy, 2013 from
value-added material.
2. IT Act, 2000: Subsequent amendments made in 2008 included definitions and
punishments for various cyber threats. Above Sections specified
3. National Cyber Crisis Management Plan: It outlines a comprehensive strategy and a
detailed procedure to be followed in the event of cyber security breaches.

SAFE HARBOUR PROVISON: According to the safe harbour principle, an online platform
such as Facebook or Twitter cannot be held accountable for the content posted on it by
users. The safe harbour provision has been given under Section 79 of the IT Act 2000.

4. Regulatory agencies such as RBI and IRDA have released detailed sets of regulatory
guidelines to be followed by the institution to avoid cyber threats.
5. Personal Data Protection Act, 2023: A comprehensive legislation aims at protecting
personal data and privacy.
6. IT Rules (Intermediary Guidelines) 2021, outline the responsibilities of intermediaries
including social media platforms and digital news publishers to ensure accountability and
transparency in their operations.
7. SPDI rules: Made under Section 43A of the IT Act which mandates that organisations
handling sensitive personal data implements reasonable security practices and procedures.
AWARENESS CREATION MEASURES

• In 2021, govt conducted cyber exercise 2021, a mock drill to test the preparedness of
various ministries and departments in the event of a cyber-attack.
• In 2019, Cyber security War games called "The Shield" were organized that involved
simulating cyber-attacks on CII (critical information infrastructure) to test their
preparedness and to identify the gaps in their capacity.
• Cyber Surakshit Bharat aims to train 10,000 personnel from various govt agencies and
private organizations on the best practices for cyber security.
• National Cyber Security Awareness Month organised by CERT-in where they conduct
webinars, various awareness camps in govt offices, schools, colleges to create
awareness on cyber threats.
• SVPNPA, Hyderabad has been conducting cybersecurity and forensics courses for the
officers of law enforcement agencies including the judiciary.
• MeiTY, Information security education and awareness- ISEA-that focuses on
developing content for cyber security, conducting training programs and certification
for professionals and govt officials.
GLOBAL COOPERATION/MEASURES
MEASURES TAKEN FOR GLOBAL COOPERATION IN CYBER SECURITY

• India has actively engaged with other countries by signing 14 MoUs on exchanging
information and technology inputs with respect to cyber-crimes.
• The Government has made several efforts to push for a globally accepted equitable
convention to regulate cyberspace effectively. (not part of Budapest convention-as
would compromise our sovereignty and initially not part of it as a founders)
• India has played a seminal role in promoting discussions between intermediaries
(Apple, Amazon, Facebook), service providers, and national governments to evolve
a common strategy for dealing with such challenges. Ex- Christ Church Call to Action,
Delhi Declaration on Cyber Security
Enhancing the capability of the private sector:

• CERT-IN has released a detailed set of guidelines according to which information has
to be shared related to cyber threats faced by private agencies.
• The government has laid down stringent standards to be adhered to by private firms
to avoid any cyber threats.
• The government is encouraging the adoption of emerging technologies such as AI,
ML, and blockchain to enhance the cyber security of private agencies.
CHALLENGES WITH RESPECT TO INDIA'S CYBER SECURITY STRATEGY
Legal Challenges:

• Laws related to cyber-crimes in India are outdated and several newer crimes have
not been defined in the law.
• We do not have a dedicated procedural law related to IT offences and as a result,
the enforcement agencies have to rely upon outdated or archaic procedural laws
which are not very effective.
Infrastructural challenges:

• India imports almost 70% of its telecom equipment requirement making the cyber
security infrastructure vulnerable to supply chain bugs/defects. Ex- Guidelines
prohibited the use of Chaome and Guame devices by govt officials and armed forces
personnel.
• Most forensic labs in India are not equipped to carry out investigations in cases of
cyber security breaches.
• Most tech companies in India do not store data on local servers as a result,
investigation into cyber offenses becomes difficult.
• India spends a very small percentage (0.64% of GDP) of its annual budget on
Research and development in cyber technologies which has adversely affected our
preparedness to combat cyber-crimes.
• Lack of coherence between multiple agencies has resulted in duplication of functions
and a lack of accountability for the institutions.
• Lack of awareness and capability in the state police machinery with respect to
cyber-crimes and provisions of the IT Act.
Human resource-related challenges:

• Shortage of skilled human resources in the area of cybersecurity.


• Lack of coherence between the private sector and the Academia to develop
indigenous capabilities in cyber security.
Awareness related challenges:
• Lack of awareness related to effective cyber security practices among the citizens,
government officers as well as private entities.
• Most private enterprises esp. financial firms have made minimal investments in the
upgradation of their capabilities to deal with cyber threats.
RECOMMENDATIONS/WAY AHEAD

• Increase the budgetary allocation for cyber security initiatives. Increasing the budget
to 0.2% of the annual budget in the short term and eventually increasing it to 1%.
• Promoting linkages between industry and academia to encourage developing
cutting-edge technologies for cyber security.
• Development of a competent infrastructure including to train a large number of
individuals in cyber security.
• Introduction of cyber security services from among the IES officers to create a pool
of leaders for cyber security within the government.
• Developing a robust audit ecosystem to evaluate the preparedness of various
entities.
• Conducting regular cyber security drills to prepare individuals on cyber security.
• Enhancing data governance capabilities and effective implementation of data privacy
law on a priority basis.
• Promoting cyber security insurance as a key instrument for cyber risk management.
• Promote cooperation and preparedness of other nations through platforms such as
G-20, BIMSTEC, SCO, etc.
BORDER MANAGEMENT (BM)- HANDOUT- PYQs

• Border security refers to securing our territories from infiltrates, hostile elements,
etc. Border management is a broader term, and here the role is performed by
different agencies as well. It is one step ahead of border security.
• It is focused on how border infrastructure is developed and promotes economic, and
social cooperation with other countries.
• It is the task of not only border security forces, but also of other agencies as well like
diplomatic agencies.
• The term border management in its widest sense implies co-ordination and
concerted action by political leadership and administrative, diplomatic, security,
intelligence, legal, regulatory and economic agencies of the country to secure our
frontiers and subserve the best interests of the country.
• BM division of the Ministry of Home Affairs says that “Border management is
securing the country’s borders against interests hostile to the country and putting in
place the systems that are able to prohibit such elements while facilitating legitimate
trade and commerce.”
CHALLENGES TO BORDER MANAGEMENT

• Some of our maritime boundaries are still undefined and much of our land borders
are not demarcated on the ground. The disputed and unsettled nature of our
boundaries has made them a source of tension and made their policing much more
difficult.
• Since many of our borders are man-made artificial boundaries and not based on
natural features such as rivers, watersheds etc, they are extremely porous and easy
to cross.
• Multiplicity of forces on the same borders has inevitably led to the lack of
accountability as well as problems of command and control.
• Border Guarding Forces need to be distinguished from central police organizations.
Being more akin to the Army and different from central police organizations which
are called in aid of civil power from time to time, they need to be appropriately
strengthened both in terms of equipment and manpower.
• The repeated withdrawal, in large numbers, of para-military forces from border
guarding duties for internal security and counter-insurgency duties has led to a
neglect of the borders. These forces have also been unable to perform optimally due
to the cannibalisation of battalions and even companies.
• Lack of institutionalised arrangements for sharing and co-ordination of intelligence at
various levels and particularly at the field level, is a primary weakness in proper
management of borders. Army under MoD and CAPF under MHA
• The present tendency on the part of each agency to guard its turf, even at the cost of
compromising national security interests, needs to be deprecated and put down
sternly.
• Inadequate attention to the concerns of local people in border areas turning to ghost
villages- first line of defence like in Kargil war
• Improper physical infrastructure in border areas of the country making movement
and mobilization of forces difficult- Prone to indulgence in Organized crimes.
• Political instability in the neighbouring countries. Ex- Islamic Fundamentalism in
Bangladesh, Civil War in Myanmar, Pakistan political instability
• A deficiency of trust between local communities and security organisations.
EFFECTS OF POOR BORDER MANAGEMENT
1) Illegal immigration continues due to poor border management- leading to insurgency
in Tripura, Assam, and Meghalaya, this creates economic and social problems.
2) Many separation forces have been able to make their way into India and prevent
themselves from the security agencies.
3) Radicalization of the youth- Massive headache.
4) The mobilization of the armed forces has been hampered due to poor infrastructure.
5) The influx of fake Indian Currency Notes (FICN) made its way into India, and it led to a
massive impact on India's economic sovereignty.
ROLE OF TECHNOLOGY IN BM
Technology like (UAVs, infrared cameras, radars, etc) comes with its own set of advantages in
terms of BM:
1. It reduces the errors associated with human intervention.
2. It can work 24X7 therefore addressing the issue of soldier fatigue.
3. It has greater accessibility in unreachable areas like in Siachen.
4. Reduces the loss of human lives due to extreme climatic conditions.
CHALLENGES IN DEPLOYMENT OF TECHNOLOGY FOR BM

• It is expensive and requires a lot of capital investment.


• Deployment of technology alone is not enough, electricity, internet, etc are required
for its own effective functioning.
• The data of Comprehensive Integrated Border Management System (CIBMS) has to
be ultimately analysed by human beings which requires extensive training.
CIBMS (COMPREHENSIVE INTEGRATED BORDER MANAGEMENT SYSTEM)

Inputs into
Survelliance Analysis Command
Output
devices Centre and Control
Centre

• CIBMS is an integration of a number of new gadgets and technologies to ensure


electronic surveillance of borders. “Integration of humans and technology with the
Command and Control centre at the heart of it.”
Can CIBMS alone resolve the border issues?

• “The Border Security Force (BSF) hopes that the new technological equipment would
provide feeds to BSF personnel at the border outposts, where monitors would be
installed. In case of a threat, quick reaction teams (QRT) will intervene and neutralise
it. The BSF plans to put up a CIBMS in areas all along the Indo-Pak and India-
Bangladesh border,”
WAYS TO OVERCOME CHALLENGES WITH RESPECT TO POOR BM

• Role of local community in Border management. In the setting of Village Defence


Communities, here locals act as eyes and ears of the security and administrative
agencies. Here members of VDC, are been provided with arms and training.
• We must outsource the infrastructure to the private sector on border road
management considering the workload of BRO.
• Continuous diplomatic engagement - like integrated checkposts, and border haats, so
that border movement of trucks and goods can be made smoother.
• Deployment of technology to increase surveillance and technology to prevent illegal
migration.
Q- Involvement of local communities in BM is a key component of national security
strategy. In this context, analyse some of the crucial challenges faced in involvement of
local communities.

MARITIME SECURITY CHALLENGES- IN HANDOUT


1. Terrorism and infiltration: 26/11 Attacks.
2. Maritime piracy: 70% of our trade through maritime route; 90% of energy
requirements though maritime route- Economic Prosperity; Energy Security.
3. Smuggling, trafficking.
4. Influx of illegal immigrants.
5. Increasing footprint of China in the Indian Ocean Region-due to Strategic reasons.
6. Attacks on Indian fishermen- at Palk Strait
INITIATIVES
Institutional initiatives:
1. 3 tier Security Architecture- State Marine Police; Indian Coast Guard at EEZs; Indian
Navy in deep waters
2. National Committee for Strengthening Maritime Coastal Security;
3. Joint operation centres: Established in Mumbai, Chennai, Vishakhapatnam, Port
Blair, etc to coordinate real-time maritime operations and intelligence sharing.
4. National maritime security coordination: To coordinate at the central level the
action of three security agencies.
Technical initiatives:
1. Improved surveillance: Deployed more RADARS today.
2. RFID-based identification system: Keeping a check on entry and exit of vessels.
3. Surveillance system by satellites: GSAT 7
4. IMAC: Information Management and Analysis Centre. Analyse data from surveillance
devices like radars and information of the other operation centres which is helpful for
security agencies.
Procedural initiatives:
1. Renewed emphasis on training and capacity building of state marine police force.
2. Joint coastal security exercises- For example, SIMBEX, MILAN, Operation SAGAR
KAVACH.
3. Legislations such as the Maritime Anti-Piracy Act.
4. National Maritime Security Policy
5. Fishermen Watch Groups in coastal areas
CHALLENGES WITH RESPECT TO MARITIME SECURITY
Coordination issues:
1. Effective communication and coordination between multiple agencies like the Indian
Navy, Coast Guard, Marine Police Force, etc.
2. Overlap of jurisdiction between various security agencies leading to confusion and
loss of accountability.
Human Resource Challenges:
1. Acute shortage of manpower especially state marine police forces.
2. Inadequate funding to provide state-of-the-art training facilities to the members of
security agencies, especially the state marine police force.
Infrastructural challenges: Shortage of financial resources leading to inadequate
infrastructure for surveillance and port security.
Geopolitical challenges:
1. Increasing presence of China in IOR and India's neighbourhood.
2. Political instability in neighbouring countries such as Somalia creating maritime
piracy issues.
Q- Maritime Security holds an important significance due to economic, geopolitical and
security reasons. Discuss the recommendations provided by expert committees on
improving India’s Coastal Security Architecture.
RECOMMENDATIONS BY EXPERT COMMITTEES
Naresh Chandra committee: Setting up of National Maritime Authority for improving the
inter-agency coordination.
Kargil Review Committee, 1999: Recommended improving coastal surveillance and
modernisation of State Marine Police.
Shekatkar Committee:
- Suggested optimisation of existing resources and deploying modern technology.
- Recommended reforms to enhance cooperation between the Indian Navy and
the Coast Guard.
REST IN HANDOUT
Q- Analyse recent amendments in reference to prevailing security situation in India.
(UPSC2019)- Current Affairs Based
2019 Amendment in UAPA- individuals allowed to recognised as terrorists due to rise in lone
wolf terror attacks happening in India. UAPA- twin bail conditions- non bailable offence-
inconsistent with Article 21 and 22.
VARIOUS SECURITY AGENCIES AND THEIR MANDATES- VALUE ADDED MATERIAL
and PYQs

Various Security
Agencies and their
mandate

Investigation
Agencies-CBI, NIA,ED-
Enforcement Agencies Intelligence Agencies
Mandate and Issues in
Handout

Defence forces- Army, State Police Forces- 50 IB, NTRO, RAW-


Navy, Air forces- words note on CAPF NSG mandate in Handout-
function 5 points each function issues in class

Role of CRPF, CISF;


Border Guarding
forces- BSF(current
affairs), ITBP, SSB

VARIOUS CHALLENGES AND ISSUES ASSOCIATED WITH THE FUNCTIONING OF STATE POLICE
FORCES IN INDIA
HUMAN RESOURCES RELATED ISSUES
1. Large number of vacancies in state police forces: As per data from 2014, state police
forces face a shortage of more than 5.6 Lakh police personnel. In India, police to
population ratio is 120 per million population whereas the prescribed standard by
the UN is 222 per million population.
2. Diversion of police personnel toward VIP duties.
3. Lack of diversity especially in terms of representation of women in the police forces.
Training and recruitment:
1. Outdated training system especially in contemporary areas such as cyber-crimes,
forensics, etc.
2. Outdated recruitment techniques: Recruitment for top positions follows a one-size-
fits-all approach. (UPSC for IAS, IPS, IFS, etc- no emphasis on specific skills)
3. Undue emphasis on physical fitness and multiple entry points (at constable, SP, ACP,
IPS) leading to wide differences between top leadership and the ones on the ground.
4. Career progression at the junior level is poor and disincentivises hard work and
improvement. (80% of police forces are Constables)
Operational and infrastructural challenges:
1. As per a survey conducted by BPRD, there is a significant shortage of arms and
ammunition in the police force.
2. As per a report by CAG, there is a 30% shortage of vehicles and as much as 76%
shortage in weaponry in some states.
3. As per the latest reply given in the Parliament, 2700 police stations all across the
country do not have CCTV cameras and 628 police stations do not have telephone
connections.
4. Several forensic labs are outdated or understaffed. (samples sent to Hyderabad)
5. Excessive interference of the political executive in the day-to-day functioning of the
police.
6. Poor quality of investigation and as a result, the conviction rate in India is one of the
lowest in the world.
7. No separate or defined mechanism for entertaining complaints against police
officials.
8. Appointments and postings are dependent on political considerations, therefore,
undermining the independence of the police forces.
Structural Challenges:
1. The law and order and investigation are vested in the same wing and as a result,
there is a lack of accountability (also conflict of interest- investigation by the same
police chief who enforces law and order will tend to hide the inefficiencies of the
police department) and specialisation in the functioning of the police.
2. Basis of Performance Appraisal: Either the citizens are afraid of approaching the
police or the police deliberately try to suppress the cases as their performance is
judged on the basis of the number of cases solved. Police many times does not
register FIR for cases difficult to solve to maintain higher % of cases solved.
MOSPI in its report stated that there is a significant underreporting of crimes in India.
3. Police is top heavy and bottom heavy: Shortage of police officials at crucial positions
especially in the middle hierarchy. These officers form backbone of police force as
these are investigating officers and due to this shortage, one such officer is
investigating 8-10 cases.
4. Policing being a state subject lacks uniformity across the country.
POLICE REFORMS
Accountability and oversight reforms:

• Establishing independent police complaint authority at the state and district level.
• Strengthening the role of the State human Rights Commission to oversee complaints
against police officials.
• Formulation of comprehensive guidelines for appointments, postings and transfers.
Training and Capacity Building:
• Enhancing training on human rights, community policing (every policeman is a
citizen with uniform and every citizen is policeman without uniform), and the use of
modern investigation techniques, forensics, etc.
• Training on handling sensitive cases, especially on gender violence.
• Establishing community outreach programs to improve public image. For example,
the Friends of Police program of Kerala Police, Neighbourhood Watch scheme of
Delhi Police
Legal and Procedural Reforms:

• Reviewing and updating the outdated laws governing police conduct.


• Standardising the procedure for arrest, detention, and interrogation.
• Ensuring timely and transparent investigations into complaints of police misconduct.
• Zero tolerance policy for the use of excessive force by police officials. In Developed
countries, police keep the arms hidden or does not bear arms, so that citizens are not
intimidated to approach the police.
Police modernisation:

• Establishing specialised divisions for counter-terrorism, cyber-crimes and organised


crimes.
• Investing in the upgradation of modern equipment and technologies available to the
police.
Human Resource Reforms:

• Supporting mental health and welfare by providing counselling services to police


personnel.
• Supporting diversity and inclusivity by recruiting personnel from different
backgrounds.
• Collaborating with the NGOs and CSOs to provide holistic support from the police to
victims and survivors.
NOTE: Prakash Singh vs UoI (2006)- Court gave 7 directives to states and centre wrt police
reforms- can be used as way ahead and recommendations.
INTELLIGENCE BUREAU (wrt security threats within India)- HANDOUT
Functions:
1. Counterintelligence: IB is tasked with identifying and neutralizing threats posed by
foreign intelligence agencies and espionage activities within India.
2. Counterterrorism: IB plays a crucial role in identifying and thwarting terrorist threats
within the country, working closely with law enforcement agencies to prevent
terrorist attacks.
3. VIP Security: IB is responsible for providing security assessments and protection to
designated VIPs, including political leaders, government officials, and visiting
dignitaries.
4. Anti-secession Activities: IB monitors and counters activities aimed at promoting
secessionist movements or undermining the integrity of the nation.
5. Intelligence Collection in Border Areas: IB gathers intelligence from India's border
regions to assess security threats and prevent infiltration by hostile elements.
6. Infrastructure Protection: IB assesses and protects critical infrastructure assets vital
to national security, such as transportation networks, energy facilities, and
communication systems.
Overall, the Intelligence Bureau serves as a vital component of India's national security
architecture, working tirelessly to safeguard the country's interests and protect its citizens
from internal and external threats.
RESEARCH AND ANALYSIS WING

• RAW, or the Research and Analysis Wing, stands as one of India's premier
intelligence agencies, playing a critical role in safeguarding the nation's security
interests.
• Established in 1968, RAW was created primarily to focus on external intelligence
gathering, especially concerning India's neighbouring countries, particularly Pakistan
and China.
• Before the formation of RAW, the Intelligence Bureau (IB) handled both internal and
external intelligence matters. However, recognizing the need for a dedicated agency
to address the complexities of external threats, RAW was established under the
leadership of then-Prime Minister Indira Gandhi.
Functions:
1. External Intelligence Gathering: RAW's primary mandate revolves around gathering
intelligence pertaining to India's external security threats, particularly from
neighbouring countries like Pakistan and China. It monitors political, military, and
strategic developments in these nations, providing critical insights to policymakers.
2. Counterterrorism Operations: RAW also plays a significant role in gathering
intelligence related to terrorist activities and extremist organizations operating in the
region. Its efforts contribute to India's counterterrorism strategies and initiatives.
3. Foreign Policy Support: RAW's intelligence assessments serve as a cornerstone for
India's foreign policy formulation. By monitoring political and military developments
in neighbouring countries, RAW helps shape India's strategic engagements and
responses to regional challenges.
4. Strategic Analysis: RAW conducts an in-depth analysis of geopolitical trends, regional
conflicts, and emerging threats to India's security interests. Its assessments guide
policymakers in making informed decisions on matters of national security and
defence. Ex- types of alliances emerging and how India can be part of it?
5. Covert Operations: RAW is known for its ability to conduct covert operations to
gather intelligence and disrupt hostile activities aimed at India's interests. These
operations are conducted with utmost secrecy and precision, often in collaboration
with other intelligence agencies and special forces units.
6. Parliamentary Oversight: Unlike other government agencies, RAW operates with a
degree of autonomy and is not subject to direct parliamentary oversight on many
issues. This independence allows RAW to maintain secrecy and operational flexibility
in carrying out its missions.
NATIONAL TECHNICAL RESEARCH ORGANISATION
The National Technical Research Organisation (NTRO) stands as a crucial component of
India's intelligence apparatus, focusing on technical intelligence gathering and analysis.
Established in 2004 under the National Security Advisor in the Prime Minister's Office, NTRO
plays a pivotal role in enhancing India's technological capabilities to address emerging
security challenges.
IB and RAW uses human network for intelligence operations and NTRO uses secondary
sources like technology, internet, radars, surveillance devices,etc
Functions and responsibilities:
1. Aviation and remote sensing: Uses advanced technologies to gather intelligence
from aerial platforms.
2. Data gathering and processing: Collects and analyses data from various sources,
including satellite imagery.
3. Cyber security: Safeguards India's cyberspace from threats.
4. Cryptology systems: Develops secure communications systems.
5. Strategic hardware and software development: Designs and deploys strategic
hardware and software solutions.
6. Strategic monitoring: Conducts strategic monitoring of global events and emerging
threats.
7. Satellite access and utilization: Accesses data from satellites for intelligence
gathering.
Q- Multiple Terror attacks in the recent past can be attributed to a collective failure of
intelligence agencies in India. Examine the shortcomings in the functioning of intelligence
architecture in India and suggest the reforms for the same.
SHORTCOMINGS IN THE FUNCTIONING OF INTELLIGENCE AGENCIES

• Turf War: Internal rivalries and lack of cooperation among Indian intelligence
agencies hamper collective efforts and compromise security.
• Lack of coordination, information sharing, and joint operations result in gaps
in intelligence gathering and analysis.
• Limited oversight, accountability, and transparency mechanisms increase the risk
of abuse of power and undermine public trust.
• Secrecy and lack of disclosure erode public confidence and hinder accountability.
• Political interference compromises the neutrality and objectivity of intelligence
agencies, eroding public confidence. Ex- if they are tracking the movement of
opposition political leader.
• Resource constraints, including funding, technology, and manpower shortages, limit
the effectiveness and operational capabilities of intelligence agencies.
REFORMS NEEDED IN THE INTELLIGENCE AGENCIES

• Intelligence agencies in India must be provided a legal-framework for their existence


and functioning and their functioning must be under Parliamentary oversight and
scrutiny.
• Reforms in the recruitment and training processes of their personnel, their pay
structures and career progression to attract the best talent available in the country.
- Recruitment to these agencies should be broad-based so as experts from myriad
fields, such as Science and Technology, IT, Communications etc could be brought,
in rather than reserving these agencies exclusively for the Police Sector.
• There should be a single authority exercising supervisory and other control over
the intelligence agencies. It could be the National Security Advisor (NSA) in a
modified role, Director of National Intelligence or even a minister for national
Intelligence, answerable to the Parliament.
• Culture of Transparency should be promoted and inculcated as in the case of MI5
• Greater empowerment of intelligence officials should be accompanied by a
simultaneous strengthening of oversight.
Q- CAPF play a crucial role in overcoming various Internal Security problems as well as
guarding India’s borders from hostile elements. Elucidate. Critically evaluate the functioning
of CAPF in India.
CAPF (CENTRAL ARMED POLICE FORCES)
CHALLENGES FACED BY CAPF- HANDOUT
Human resource related issue:
1. Extremely overburdened and understaffed (30% shortage): The latest report suggests
that more than 84000 posts are lying vacant in CAPF. It results in the denial of leaves.
States overdependent on CAPF for any law and order situation.
2. Psychological and mental stress.
3. High suicide rates (436 suicides in three years).
4. Till recently, pay was not at par with the armed forces.
5. Relatively poor promotional avenues as compared to IPS or the armed forces.
6. Paradropping of IPS officers as chiefs has a demotivating effect on the cadre- 50
years of hard work then also cannot acquire CAPF.
7. Training curriculum not updated.
Operational challenges:
1. States are over-dependent on CAPF- CAPF is not able to get enough time for rest,
recuperation, and training.
2. Lack of coordination between state police and CAPF.
3. Diversion of border guarding forces such as BSF towards other law and order duties.
Infrastructural challenges:
1. Shortage of arms.
2. The problem of poor-quality food, medical facilities, and accommodation has a
demotivating effect on CAPF.
REFORMS SUGGESTED- HANDOUT
• Training:
• While purchasing state-of-the-art equipment, the government should ensure that
training needs are taken care of and if needed, it may be included in the purchase
agreement itself.
• Further, it recommended that the training should be a mix of conventional matters
and the latest technology like IT, cyber security, and cybercrime.
• Modernisation:
• Bottlenecks in procurement should be identified and corrective action taken.
• Further, the Ministry of Home Affairs and CAPFs should hold negotiations with
ordnance factories and manufacturers in the public or private sector to ensure an
uninterrupted supply of equipment and other infrastructure.
• Promotion of CAPF:
• The Committee recommended that top positions should be filled from the respective
cadre of the CAPF.
• In addition, there was frustration in CAPFs due to stagnation in promotions and lack
of cadre review.
• The Committee recommended that a cadre review of all the CAPFs should be carried
out within a defined timeline.
NIA- HANDOUT
Q-SC of India in its landmark judgement criticised the CBI for being the caged parrot of the
Union. Critically Examine the challenges faced wrt autonomous functioning of the CBI. What
are some other challenges that plague the functioning of this organisation?
CBI-HANDOUT
Functions:
1. Investigative Authority: The CBI is empowered to investigate notified offences such
as prevention of corruption independently. For other offences like murder in any
state, it requires the consent of the concerned states or orders from higher courts to
investigate.
2. Scope of Investigations: The CBI is renowned for investigating economic crimes,
special crimes, cases of corruption, and other high-profile cases. It handles cases of
national importance and significance.
3. Role in National Security: The CBI's role extends beyond conventional crime
investigation to matters of national security, including counterterrorism and
intelligence gathering.
4. Collaboration and Coordination: The CBI collaborates with other law
enforcement agencies, both domestically and internationally, to address
transnational crimes and enhance investigative capabilities.
Problems associated with CBI:
1. Loss of Public Confidence: The Supreme Court's scathing characterization of the CBI
as a 'caged parrot' significantly tarnished its reputation and integrity. Political
pressure and interference have further eroded public trust in the organization.
2. Delays and Inefficiencies: The CBI has been criticized for extensive delays in
concluding investigations, leading to perceptions of ineffectiveness. Former Central
Vigilance Commissioner likened the CBI to a 'black hole' where cases seemingly
disappear without resolution.
3. Reports of Misconduct: Numerous reports have surfaced alleging dishonesty and
harassment of the public by CBI personnel, casting doubts on the agency's ethical
standards and professionalism.
4. Dependence on State Governments: Despite being a central agency, the CBI relies
on state governments to invoke its authority to investigate cases within their
jurisdiction. This dependency poses significant challenges, particularly when
investigating cases involving central government employees.
5. Lack of Autonomy and Cadre: The CBI lacks functional autonomy, relying on the
home ministry for staffing and the law ministry for legal support. Its dependence on
IPS officers, who are susceptible to government influence, further undermines its
autonomy and impartiality.
6. Vulnerability to Government Influence: The CBI's structure, run by IPS officers
on deputation, makes it susceptible to manipulation by the government, which holds
control over senior officer postings and career advancement.
7. Jurisdictional Constraints: While the CBI operates under the provisions of the Code
of Criminal Procedure (CrPC), its jurisdiction is subject to the consent of state
governments, hindering its ability to operate effectively across the country.
Way forward:
- CBI needs an autonomous legal framework and quality supervision.
- Political interference in CBI appointments must end.
- CBI should have its own cadre of officers, free from transfers.
- Granting autonomy to CBI and other agencies with parliamentary oversight can
ensure accountability.
- Improve service conditions and emoluments for direct recruits to attract skilled
people.
ROLE OF EXTERNAL STATE ACTORS IN CREATING CHALLENGES TO INDIA'S INTERNAL
SECURITY
SEE PYQs- challenges on Indo Myanmar Border- while reading IR, see the security dimension
of International Relations especially wrt neighbouring countries.
Read this topic with IR
BANGLADESH
a) Illegal immigration→ Insurgency in NE, conflicts in NE, involvement in criminal
activities (MHA-2002- 12mn illegal immigrants)
b) Ongoing radicalization/increasing fundamentalism in Bangladesh Society will have
spillover effects in India even promoting communal tensions.
c) Refugee crisis (Rohingyas) which may create conflicts in Indian society, pressure on
our resources, and security threats.
d) Safe refuge for insurgents, for example, ULFA found safe place in Bangladesh.
e) Illegal cattle smuggling of over 1 lakh cattle from India have been illegally smuggled
to Bangladesh. This may create conflicts and polarisation in the Indian Society.
f) Human Trafficking (from Bangladesh- women and children forced into prostitution
and sent to middle east in India) on the Bangladesh border. This is sponsoring various
other criminal activities and insurgency.
g) Increasing proximity of Bangladesh and China→strategic challenges- affecting India’s
strategic autonomy in Indian Ocean Region
Challenges to border management: intermingled language and culture and thus difficult to
differentiate, porous border
NEPAL -open border
a) Cross-border criminal activities: Drug trafficking, human trafficking, gold trafficking-
promotes organised crimes
b) Safe passage for various organised crimes.
c) The influx of FICNs compromising our economic sovereignty.
d) Various extremist groups receiving training and support from Nepal: As per, the
2008 MHA Report 40 Maoist received training in Nepal.
e) Political instability in Nepal has repercussions in India for example radicalisation of
youth in border districts.
f) Growing proximity between Nepal and China- military aid, investment by China
MYANMAR
a) Cross-border movement of insurgent groups such as the Nationalist Socialist Council
of Nagaland and ULFA across the Indo-Myanmar border has supported the thriving of
the insurgency in India's North-East.
b) Drug Trafficking: Myanmar is a part of the infamous Golden Triangle and Smuggling
of Narcotics into India poses a significant security threat. Myanmar one of the largest
drug producing countries in the world.
(Both as destination and conduit- as destination- demographic dividend, society
eaten from within, affects social fabric, youth destroyed- as conduit- promotes
organised crime, further sponsoring insurgency)
c) The Rohingya Refugee crisis has a spillover effect onto India's northeast creating
multi-dimensional challenges for India's internal security.
d) Political instability in Myanmar has weakened the rule of law in the country and has
allowed the thriving of insurgent groups and Organised Criminal Groups (OCGs) in
the region.
e) Activities of transnational OCGs operating near the Indo-Myanmar border pose
challenges to India's border management forces.
AFGHANISTAN
a) It is a major producer of opium and has fuelled drug trafficking and addiction in India
posing several social and security challenges to India- part of Golden Crescent.
b) Afghanistan's geopolitical instability and power struggle within the various factions
have created insecurity and security dilemmas for India.
c) Pakistan continues to use Afghanistan's territory for training militants and terrorists
as well as for strategic depth.
PAKISTAN
a) Pakistan's support for terror groups such as Lashkar-e-Taiba, and Hizbul Mujahiddin
pose a significant security threat to India.
b) Involvement in drug trafficking via Indo - Pakistan border in Punjab, Rajasthan, and
Gujarat.
c) The influx of Fake Indian Currency Notes (FICN) via Pakistan is a threat to India's
Economic Sovereignty.
d) Pakistan's suppression of minority rights and support for fundamentalist ideology
has contributed to radicalisation within Indian society.
e) All weather friendship between Pakistan and China and the increasing presence of
the Chinese military is a cause of strategic and security concern for India.
f) Border Dispute in Kutch and LoC
CHINA
a) Border incursions by PLA with respect to territorial disputes.
b) Assertive and aggressive Chinese expansionist policy in Ladakh, Arunachal, South
China Sea is a matter of concern.
c) Controlling the river flow of Brahmaputra by building 1000 dams
d) Strategic Encirclement of India by establishing deeper diplomatic ties
e) Dumping cheap Chinese Goods→ compromising India’s economic sovereignty
CHALLENGES POSED BY SRILANKA TO INDIA'S INTERNAL SECURITY:
a) The proximity of China and increasing influence of Chinese in Sri Lanka especially in
the context of the militarization of Hambantota Port.
b) Maritime disputes and conflicts between Indian and SL fishermen over the fishing
rights in Palk Strait have led to tensions. In fact, several Indian fishermen have been
arrested and detained.
c) Civil War between Sinhalese and Tamils poses significant challenges for India
especially due to ties between LTTE and several Indian insurgent groups.
d) Sri Lanka serves as a transit point for drug trafficking that has spillover effects over
India's internal security.
BHUTAN:
a) Bhutan has faced challenges from ethnic Nepalese separatist groups which has also
raised concerns about them infiltrating towards Indian side of the border.
b) In the past, insurgent groups like NDFB and ULFA have enjoyed safe sanctuaries in
Bhutan.

MEASURES TO BE TAKEN:
Diplomatic initiatives:
- Resolving border disputes.
- Strengthening of alliances- Security issues can be discussed on Platforms like
BIMSTEC and SCO can be taken.
- Raise the issue at UNGA and define terrorism and militancy and bring different
countries on board.
Military initiatives:
- Joint exercises- Operation All Clear in Bhutan against operations of NDFB and
ULFA.
- Upgradation of border infrastructure through surveillance.
Economic initiatives:
- Economic sanctions if they don’t cooperation and proactively promote militancy
- Promoting cross border trade like setting up of Border haats- markets in border
villages for trade and exchange; ICPs- customs, security, economic agencies and
all facilities in one building
Technology: Use of technology, using space technology- CARTOSAT, CIBMS, UAVs, electric
fencing on key vulnerable points on border, etc.
INSURGENCY IN NE:
Read Conflict resolution chapter in 2nd ARC for its history and P Chidambaram report-
Security Situation in NE

• Insurgency is armed rebellion by local people. The objective is usually political in


nature and gains sovereignty over its people.
• AFSPA is still in place.

Topics: Factors for the rise of insurgency in Northeast: Historical, geographical, cultural
reasons etc.
Consequences of Insurgency in NE
Step Taken; Persistent issues that fuel insurgency; Reasons for decline in insurgency in last
20-30 years; Way Ahead; how Insurgency linked to Organized crime; Insurgency linked
with border management
Insurgency vs Militancy: Rebel or fighters from outside like in Kashmir; by local people like in
NE- Naxalism
Naga insurgency is backbone of NE insurgency.
Q- NE India has suffered insurgency from long time. Analyse the main reasons for armed
insurgency in NE.
SEE PYQs
• Nagaland- ‘Doyen of Insurgency’:
- Separate flag and constitution.
- Ongoing conflicts between the tribes in Nagaland.
- NSCN IM and NSCN K are the major insurgent groups.
- Support of China.
- Naga club>> NNC>> NSCN.
- They demand greater Nagalim.
- Need to develop and bring economic reforms.
• Insurgency in Manipur:
- Attributed to the insurgency in Nagaland.
- Geography>> Meiti tribes in the valley.
- Control politics and economics of the state- earlier part of Assam
- Lack of employment.
- High-handedness of the security forces.
• Mizoram:
- started in 1960s.
- Part of Assam>> Mautam famine >> locals died in large numbers.
- Mizo national front>> led by Lal Denga.
- Mizo accord in 1986 with the government of India, Mizoram state, and Mizo
national front.
- A separate state for Mizoram.
• Assam:
- First movement led by ULFA.
- The Second was led by NDFB.
- Another was led by Bodo liberation tigers.
- AASU>>Movement to throw out outsiders.
- Issue of outsiders like Bengalis taking jobs etc.
- issue of illegal immigration.
- 1979>>Insurgent group>> ULFA.
- Assamese wants self-determination.
- Bodos also started their movement.
- All Bodo student unions were formed.
- Demand for a separate state of Bodoland.
- The Assam Accord was signed in 1985.
• Tripura;
- Majorly Bengali dominated state.
- insurgent groups>> separation of Tripura from India.
- 2015>> AFSPA removed>> normalcy retuned.
• Arunachal Pradesh:
- Recently>> concern insurgency from neighbouring states.
- safe havens for insurgents.
• Handouts are to be provided for the same.
TERRORISM: HANDOUT
SEE PYQs -Topics- Definition, causes and factors for it, sources of funding, implications,
suggestions to overcome, strategy deployed till now, how it is a global problem and how to
solve it globally
Linkages btw terrorism and organised crimes
Linkages btw terrorism and state sponsored activities like by Pak on Indian border
TERROR FINANCING EXAMPLES:
- ISIS- selling oil in black market
- Naxalites raising money through cannabis trade
- Insurgent groups in NE raise money through OCGs
- LTTE raising money through illegal poaching and cutting down of forests and
timber
- Taliban- Poppy Cultivation

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy